U
    
W[¾½  ć                   @   sĢ   d Z ddlmZmZ ddlmZ edZedkr4dZedZerXerXddl	m
Z
mZmZ ddlZddlZdd	lmZ dd
lmZ ddlmZ ddlmZ ddlmZ G dd dejZG dd dejZdS )z&
Tests for L{twisted.conch.ssh.keys}.
é    )Śabsolute_importŚdivision)ŚrequireModuleŚcryptographyNz Cannot run without cryptography.Śpyasn1)ŚkeysŚcommonŚsexpy)Śkeydata)Ś	randbytes)Śunittest)Ślong)ŚFilePathc                   @   s$  e Zd ZedkreZedkr dZdd Zdd Zdd Z	d	d
 Z
dd Zdd Zdd Zdd Zdd Zdd Zdd Zdd Zdd Zdd Zdd  Zd!d" Zd#d$ Zd%d& Zd'd( Zd)d* Zd+d, Zd-d. Zd/d0 Zd1d2 Zd3d4 Zd5d6 Z d7d8 Z!d9d: Z"d;d< Z#d=d> Z$d?d@ Z%dAdB Z&dCdD Z'dEdF Z(dGdH Z)dIdJ Z*dKdL Z+dMdN Z,dOdP Z-dQdR Z.dSdT Z/dUdV Z0dWdX Z1dYdZ Z2d[d\ Z3d]d^ Z4d_d` Z5dadb Z6dcdd Z7dedf Z8dgdh Z9didj Z:dkdl Z;dmdn Z<dodp Z=dqdr Z>dsdt Z?dudv Z@dwdx ZAdydz ZBd{d| ZCd}d~ ZDdd ZEdd ZFdS )ŚKeyTestsNzCannot run without PyASN1c              	   C   sX  t jjtjd tjd tjd tjd tjd tjd dj| _t jjtjd tjd tjd tjd	 tjd
 dj| _	t jj
tjd
 tjd tjd tjd dj| _t jj
tjd
 tjd tjd tjd dj| _t jj
tjd
 tjd tjd tjd dj| _d| _d| _|  tddd ” |  ” | _t| jd}| tj” W 5 Q R X d S )NŚnŚeŚdŚpŚqŚu)r   r   r   r   r   r   ŚyŚgŚx)r   r   r   r   r   ŚprivateValueŚcurve)r   r   r   r   s     ssh-rsa   ~Y£×żWĘpu@Ų1”SóOŚEō/xńįG3ŁÖUŁĮŲdÉē²É,'=QgēxµjŪIĄŽÆb×@ŹrĪ£zM1q5Žś{wjKNĖCåĆłiŪŹ}ŪRTłDJHĻló[¢żĪ|ū^nŌķāŃ·aYB¤Ē¾7µ9j¤.÷šŚ×Ņł9pż?ņNĻ/)
>AĀµjłUWŌ®Bęt¢y¢ŖfĖåkćĪąuėNÉYĆ.V±L44`CĒ¦6ÆśYś¤%Õ 4^¹rYŗ ł.%H¾As7      ssh-dss   (?Ēė;ÕTFA“ßÄE@4,d¼	Ł®Ż[ķ-nQfčįjrgp<ZsecureRandomc                 S   s   d|  S )Nó   ’© )r   r   r   ś>/usr/lib/python3/dist-packages/twisted/conch/test/test_keys.pyŚ<lambda>_   ó    z KeyTests.setUp.<locals>.<lambda>Śwb)r   ŚKeyŚ_fromRSAComponentsr
   ŚRSADataŚ
_keyObjectŚrsaObjZ_fromDSAComponentsŚDSADataŚdsaObjZ_fromECComponentsŚECDatanistp256ŚecObjZECDatanistp384ŚecObj384ZECDatanistp521ŚecObj521ŚrsaSignatureŚdsaSignatureZpatchr   ŚmktempŚkeyFileŚopenŚwriteŚprivateRSA_lsh)ŚselfŚfr   r   r   ŚsetUp)   sR    ś
ū
ü
ü
ü
’’
zKeyTests.setUpc                 C   s   t  | j” d S ©N)ŚosŚunlinkr/   ©r3   r   r   r   ŚtearDowne   s    zKeyTests.tearDownc                 C   s|   |   t | j” ” d” |   t | j” ” d” |   t | j” ” d” |   t | j” ” d” |   t | j” ” d” dS )zU
        The L{keys.Key.size} method returns the size of key object in bits.
        i   é   é   i  i	  N)	ŚassertEqualr   r!   r%   Śsizer'   r)   r*   r+   r9   r   r   r   Ś	test_sizeh   s
    zKeyTests.test_sizec                 C   sH  |   tj tj”d” |   tj tj”d” |   tj tj”d” |   tj tj”d” |   tj tj	”d” |   tj tj
”d” |   tj tj”d” |   tj tj”d” |   tj tj”d” |   tj tj”d” |   tj tj”d” |   tj tj”d” |   tj d”d” |   tj d”d” |   tj d	”d
” d
S )z_
        Test that the _guessStringType method guesses string types
        correctly.
        Zpublic_opensshZprivate_opensshZ
public_lshZprivate_lshŚagentv3s      ssh-rsa   Śblobs      ssh-dss   s	   not a keyN)r=   r   r!   Z_guessStringTyper
   ŚpublicRSA_opensshŚpublicDSA_opensshŚpublicECDSA_opensshŚprivateRSA_opensshŚprivateDSA_opensshŚprivateECDSA_opensshŚpublicRSA_lshŚpublicDSA_lshr2   ŚprivateDSA_lshŚprivateRSA_agentv3ŚprivateDSA_agentv3r9   r   r   r   Śtest__guessStringTypet   sv    ’’’
’’
’’
’’’’’’
’’
’’
’ž
’ž’zKeyTests.test__guessStringTypec                 C   s   t j tj”}t j tj”}|  | ” | ” ” t j tj”}t j tj	”}|  | ” | ” ” t j tj
”}t j tj”}|  | ” | ” ” dS )zn
        The L{keys.Key.public} method returns a public key for both
        public and private keys.
        N)r   r!   Ś
fromStringr
   rE   rB   r=   ŚpublicrF   rC   rG   rD   )r3   ZprivateRSAKeyZpublicRSAKeyZprivateDSAKeyZpublicDSAKeyZprivateECDSAKeyZpublicECDSAKeyr   r   r   Śtest_public   s    zKeyTests.test_publicc                 C   s   t j tj”}t j tj”}t j tj”}|  | ”  	” ” |  
| 	” ” |  | ”  	” ” |  
| 	” ” |  | ”  	” ” |  
| 	” ” dS )zg
        The L{keys.Key.isPublic} method returns True for public keys
        otherwise False.
        N)r   r!   rN   r
   rE   rF   rG   Ś
assertTruerO   ŚisPublicŚassertFalse)r3   ŚrsaKeyŚdsaKeyZecdsaKeyr   r   r   Śtest_isPublicÆ   s    zKeyTests.test_isPublicc                 C   s    |   |||” |  |||” d S r6   )Ś_testPublicFromStringŚ_testPrivateFromString)r3   rO   ŚprivateŚtypeŚdatar   r   r   Ś_testPublicPrivateFromStringĄ   s    z%KeyTests._testPublicPrivateFromStringc                 C   sT   t j |”}|  | ” ” |  | ” |” | ”  ” D ]\}}|  || |” q6d S r6   )	r   r!   rN   rQ   rR   r=   rZ   r[   Śitems)r3   rO   rZ   r[   Z	publicKeyŚkŚvr   r   r   rW   Å   s
    zKeyTests._testPublicFromStringc                 C   sT   t j |”}|  | ” ” |  | ” |” | ” D ]\}}|  | ” | |” q2d S r6   )	r   r!   rN   rS   rR   r=   rZ   r]   r[   )r3   rY   rZ   r[   Z
privateKeyr^   r_   r   r   r   rX   Ķ   s
    zKeyTests._testPrivateFromStringc                 C   s   |   tjtjdtj” |   tjtjdtj” |  t	j
jtjddt	j
 tj”” |  t	j
 tj”t	j
 tj”” |   tjtjdtj” dS )zN
        Test that keys are correctly generated from OpenSSH strings.
        ŚECŚRSAó	   encrypted©Z
passphraseŚDSAN)r\   r
   rD   rG   r(   rB   rE   r#   r=   r   r!   rN   ŚprivateRSA_openssh_encryptedZprivateRSA_openssh_alternaterC   rF   r&   r9   r   r   r   Śtest_fromOpenSSHÕ   s4      ’  ’
žż
’ž  ’zKeyTests.test_fromOpenSSHc                 C   s   d}|   tjtjj|d” dS )z.
        Tests for invalid key types.
        s   -----BEGIN FOO PRIVATE KEY-----
MIGkAgEBBDAtAi7I8j73WCX20qUM5hhHwHuFzYWYYILs2Sh8UZ+awNkARZ/Fu2LU
LLl5RtOQpbWgBwYFK4EEACKhZANiAATU17sA9P5FRwSknKcFsjjsk0+E3CeXPYX0
Tk/M0HK3PpWQWgrO8JdRHP9eFE9O/23P8BumwFt7F/AvPlCzVd35VfraFT0o4cCW
G0RqpQ+np31aKmeJshkcYALEchnU+tQ=
-----END EC PRIVATE KEY-----N)ŚassertRaisesr   ŚBadKeyErrorr!   Z_fromString_PRIVATE_OPENSSH©r3   ZbadKeyr   r   r   Śtest_fromOpenSSHErrorsē   s      ’zKeyTests.test_fromOpenSSHErrorsc                 C   s(   d}|   tj |”tj |d ”” dS )zP
        If key strings have trailing whitespace, it should be ignored.
        ó  -----BEGIN DSA PRIVATE KEY-----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-----END DSA PRIVATE KEY-----ó   
N)r=   r   r!   rN   ©r3   ZprivateDSADatar   r   r   Ś test_fromOpenSSH_with_whitespaceõ   s    ’z)KeyTests.test_fromOpenSSH_with_whitespacec                 C   sH   t jjtjdd}|  | ” d” t jjtjd dd}|  ||” dS )z
        Newer versions of OpenSSH generate encrypted keys which have a longer
        IV than the older versions.  These newer keys are also loaded.
        s   testxprc   ra   rl   N)r   r!   rN   r
   Z privateRSA_openssh_encrypted_aesr=   rZ   )r3   ŚkeyZkey2r   r   r   Śtest_fromNewerOpenSSH  s    
’žzKeyTests.test_fromNewerOpenSSHc              	   C   s,   d}|   tj |”tj | dd””” dS )zp
        Test that keys are correctly generated from OpenSSH strings with Windows
        line endings.
        rk   rl   s   
N)r=   r   r!   rN   Śreplacerm   r   r   r   Ś%test_fromOpenSSH_windows_line_endings  s
    
žz.KeyTests.test_fromOpenSSH_windows_line_endingsc                 C   s@   t  ddddgggg”}| jtjtjjdt |” d d dS )	za
        C{BadKeyError} exception is raised when public key has an unknown
        type.
        s
   public-keyó   bad-keyó   pó   2ó   {ó   })r[   N)	r	   Śpackrg   r   rh   r!   rN   Śbase64Zencodestring©r3   Zsexpr   r   r   Ś!test_fromLSHPublicUnsupportedType/  s     žz*KeyTests.test_fromLSHPublicUnsupportedTypec                 C   s0   t  ddddgggg”}|  tjtjj|” dS )zb
        C{BadKeyError} exception is raised when private key has an unknown
        type.
        s   private-keyrs   rt   ru   N)r	   rx   rg   r   rh   r!   rN   rz   r   r   r   Ś"test_fromLSHPrivateUnsupportedType<  s     žz+KeyTests.test_fromLSHPrivateUnsupportedTypec                 C   s   |   tjtjdtj” dS )zR
        RSA public and private keys can be generated from a LSH strings.
        ra   N)r\   r
   rH   r2   r#   r9   r   r   r   Śtest_fromLSHRSAI  s    üzKeyTests.test_fromLSHRSAc                 C   s   |   tjtjdtj” dS )zH
        DSA public and private key can be generated from LSHs.
        rd   N)r\   r
   rI   rJ   r&   r9   r   r   r   Śtest_fromLSHDSAU  s    üzKeyTests.test_fromLSHDSAc                 C   s<   |   tjdtj” |   tjdtj” |  tjtj	j
d” dS )zO
        Test that keys are correctly generated from Agent v3 strings.
        ra   rd   s$      ssh-foo               N)rX   r
   rK   r#   rL   r&   rg   r   rh   r!   rN   r9   r   r   r   Śtest_fromAgentv3a  s    
’
’’zKeyTests.test_fromAgentv3c                 C   są   |   tjtjjd” |   tjtjjdd” | j tjtjjtjdd |   tjtjjt | j” 	dd”” |   tjtjjd” | j tjtjjdd	d | j tjtjjd
d	d | j tjtjjdd	d | j tjtjjdd	d dS )zW
        keys.Key.fromString should raise BadKeyError when the key is invalid.
        r   Śbad_types   unencryptedrc   Śopensshrb   s   -----BEGIN RSA KEY-----
wA==
sÅ  -----BEGIN ENCRYPTED RSA KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: weird type

4Ed/a9OgJWHJsne7yOGWeWMzHYKsxuP9w1v0aYcp+puS75wvhHLiUnNwxz0KDi6n
T3YkKLBsoCWS68ApR2J9yeQ6R+EyS+UQDrO9nwqo3DB5BT3Ggt8S1wE7vjNLQD0H
g/SJnlqwsECNhh8aAx+Ag0m3ZKOZiRD5mCkcDQsZET7URSmFytDKOjhFn3u6ZFVB
sXrfpYc6TJtOQlHd/52JB6aAbjt6afSv955Z7enIi+5yEJ5y7oYQTaE5zrFMP7N5
9LbfJFlKXxEddy/DErRLxEjmC+t4svHesoJKc2jjjyNPiOoGGF3kJXea62vsjdNV
gMK5Eged3TBVIk2dv8rtJUvyFeCUtjQ1UJZIebScRR47KrbsIpCmU8I4/uHWm5hW
0mOwvdx1L/mqx/BHqVU9Dw2COhOdLbFxlFI92chkovkmNk4P48ziyVnpm7ME22sE
vfCMsyirdqB1mrL4CSM7FXONv+CgfBfeYVkYW8RfJac9U1L/O+JNn7yee414O/rS
hRYw4UdWnH6Gg6niklVKWNY0ZwUZC8zgm2iqy8YCYuneS37jC+OEKP+/s6HSKuqk
2bzcl3/TcZXNSM815hnFRpz0anuyAsvwPNRyvxG2/DacJHL1f6luV4B0o6W410yf
qXQx01DLo7nuyhJqoH3UGCyyXB+/QUs0mbG2PAEn3f5dVs31JMdbt+PrxURXXjKk
4cexpUcIpqqlfpIRe3RD0sDVbH4OXsGhi2kiTfPZu7mgyFxKopRbn1KwU1qKinfY
EU9O4PoTak/tPT+5jFNhaP+HrURoi/pU8EAUNSktl7xAkHYwkN/9Cm7DeBghgf3n
8+tyCGYDsB5utPD0/Xe9yx0Qhc/kMm4xIyQDyA937dk3mUvLC9vulnAP8I+Izim0
fZ182+D1bWwykoD0997mUHG/AUChWR01V1OLwRyPv2wUtiS8VNG76Y2aqKlgqP1P
V+IvIEqR4ERvSBVFzXNF8Y6j/sVxo8+aZw+d0L1Ns/R55deErGg3B8i/2EqGd3r+
0jps9BqFHHWW87n3VyEB3jWCMj8Vi2EJIfa/7pSaViFIQn8LiBLf+zxG5LTOToK5
xkN42fReDcqi3UNfKNGnv4dsplyTR2hyx65lsj4bRKDGLKOuB1y7iB0AGb0LtcAI
dcsVlcCeUquDXtqKvRnwfIMg+ZunyjqHBhj3qgRgbXbT6zjaSdNnih569aTg0Vup
VykzZ7+n/KVcGLmvX0NesdoI7TKbq4TnEIOynuG5Sf+2GpARO5bjcWKSZeN/Ybgk
gccf8Cqf6XWqiwlWd0B7BR3SymeHIaSymC45wmbgdstrbk7Ppa2Tp9AZku8M2Y7c
8mY9b+onK075/ypiwBm4L4GRNTFLnoNQJXx0OSl4FNRWsn6ztbD+jZhu8Seu10Jw
SEJVJ+gmTKdRLYORJKyqhDet6g7kAxs4EoJ25WsOnX5nNr00rit+NkMPA7xbJT+7
CfI51GQLw7pUPeO2WNt6yZO/YkzZrqvTj5FEwybkUyBv7L0gkqu9wjfDdUw0fVHE
xEm4DxjEoaIp8dW/JOzXQ2EF+WaSOgdYsw3Ac+rnnjnNptCdOEDGP6QBkt+oXj4P
-----END RSA PRIVATE KEY-----Z	encryptedsĻ  -----BEGIN ENCRYPTED RSA KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: FOO-123-BAR,01234567
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-----END RSA PRIVATE KEY-----sĢ  -----BEGIN ENCRYPTED RSA KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: AES-128-CBC,01234

4Ed/a9OgJWHJsne7yOGWeWMzHYKsxuP9w1v0aYcp+puS75wvhHLiUnNwxz0KDi6n
T3YkKLBsoCWS68ApR2J9yeQ6R+EyS+UQDrO9nwqo3DB5BT3Ggt8S1wE7vjNLQD0H
g/SJnlqwsECNhh8aAx+Ag0m3ZKOZiRD5mCkcDQsZET7URSmFytDKOjhFn3u6ZFVB
sXrfpYc6TJtOQlHd/52JB6aAbjt6afSv955Z7enIi+5yEJ5y7oYQTaE5zrFMP7N5
9LbfJFlKXxEddy/DErRLxEjmC+t4svHesoJKc2jjjyNPiOoGGF3kJXea62vsjdNV
gMK5Eged3TBVIk2dv8rtJUvyFeCUtjQ1UJZIebScRR47KrbsIpCmU8I4/uHWm5hW
0mOwvdx1L/mqx/BHqVU9Dw2COhOdLbFxlFI92chkovkmNk4P48ziyVnpm7ME22sE
vfCMsyirdqB1mrL4CSM7FXONv+CgfBfeYVkYW8RfJac9U1L/O+JNn7yee414O/rS
hRYw4UdWnH6Gg6niklVKWNY0ZwUZC8zgm2iqy8YCYuneS37jC+OEKP+/s6HSKuqk
2bzcl3/TcZXNSM815hnFRpz0anuyAsvwPNRyvxG2/DacJHL1f6luV4B0o6W410yf
qXQx01DLo7nuyhJqoH3UGCyyXB+/QUs0mbG2PAEn3f5dVs31JMdbt+PrxURXXjKk
4cexpUcIpqqlfpIRe3RD0sDVbH4OXsGhi2kiTfPZu7mgyFxKopRbn1KwU1qKinfY
EU9O4PoTak/tPT+5jFNhaP+HrURoi/pU8EAUNSktl7xAkHYwkN/9Cm7DeBghgf3n
8+tyCGYDsB5utPD0/Xe9yx0Qhc/kMm4xIyQDyA937dk3mUvLC9vulnAP8I+Izim0
fZ182+D1bWwykoD0997mUHG/AUChWR01V1OLwRyPv2wUtiS8VNG76Y2aqKlgqP1P
V+IvIEqR4ERvSBVFzXNF8Y6j/sVxo8+aZw+d0L1Ns/R55deErGg3B8i/2EqGd3r+
0jps9BqFHHWW87n3VyEB3jWCMj8Vi2EJIfa/7pSaViFIQn8LiBLf+zxG5LTOToK5
xkN42fReDcqi3UNfKNGnv4dsplyTR2hyx65lsj4bRKDGLKOuB1y7iB0AGb0LtcAI
dcsVlcCeUquDXtqKvRnwfIMg+ZunyjqHBhj3qgRgbXbT6zjaSdNnih569aTg0Vup
VykzZ7+n/KVcGLmvX0NesdoI7TKbq4TnEIOynuG5Sf+2GpARO5bjcWKSZeN/Ybgk
gccf8Cqf6XWqiwlWd0B7BR3SymeHIaSymC45wmbgdstrbk7Ppa2Tp9AZku8M2Y7c
8mY9b+onK075/ypiwBm4L4GRNTFLnoNQJXx0OSl4FNRWsn6ztbD+jZhu8Seu10Jw
SEJVJ+gmTKdRLYORJKyqhDet6g7kAxs4EoJ25WsOnX5nNr00rit+NkMPA7xbJT+7
CfI51GQLw7pUPeO2WNt6yZO/YkzZrqvTj5FEwybkUyBv7L0gkqu9wjfDdUw0fVHE
xEm4DxjEoaIp8dW/JOzXQ2EF+WaSOgdYsw3Ac+rnnjnNptCdOEDGP6QBkt+oXj4P
-----END RSA PRIVATE KEY-----sĶ  -----BEGIN ENCRYPTED RSA KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,01234
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-----END RSA PRIVATE KEY-----N)
rg   r   rh   r!   rN   r
   rH   ZEncryptedKeyErrorr%   ŚtoStringr9   r   r   r   Śtest_fromStringErrorsm  sL    ’ ’’’ į! į! į! įzKeyTests.test_fromStringErrorsc                 C   sV   |   tj | j”tj tj”” |  tj	tjj| jd” | jtj	tjj| jdd dS )z5
        Test that fromFile works correctly.
        r   Zunencryptedrc   N)
r=   r   r!   ZfromFiler/   rN   r
   r2   rg   rh   r9   r   r   r   Śtest_fromFile  s    ’ ’ ’zKeyTests.test_fromFilec                 C   s6   t jjtdtddj}t  |”}|  |j|” dS )zJ
        Test that the PublicKey object is initialized correctly.
        é   é   ©r   r   N)r   r!   r"   r   r$   r=   )r3   Śobjro   r   r   r   Ś	test_init  s    
zKeyTests.test_initc                 C   s   t  | j”}t  | j”}t  t jjtdtddj”}t  | j”}|  ||k” |  ||k” |  ||k” |  |t	k” |  |dk” dS )z?
        Test that Key objects are compared correctly.
        r   r   r   N)
r   r!   r%   r"   r   r$   r'   rQ   rS   Śobject©r3   Zrsa1Zrsa2Zrsa3Zdsar   r   r   Ś
test_equal  s    ’zKeyTests.test_equalc                 C   s   t  | j”}t  | j”}t  t jjtdtddj”}t  | j”}|  ||k” |  ||k” |  ||k” |  |t	k” |  |dk” dS )zC
        Test that Key objects are not-compared correctly.
        r   r   r   N)
r   r!   r%   r"   r   r$   r'   rS   rQ   r   r   r   r   r   Śtest_notEqual)  s    ’zKeyTests.test_notEqualc                 C   s   t  d”}|  t|j” dS )zO
        The L{keys.Key.data} method raises RuntimeError for bad keys.
        r   N)r   r!   rg   ŚRuntimeErrorr[   ri   r   r   r   Śtest_dataError9  s    
zKeyTests.test_dataErrorc                 C   s4   |   t | j” ” d” |   t | j” ” d” dS )z
        Test that the fingerprint method returns fingerprint in
        L{FingerprintFormats.MD5-HEX} format by default.
        ś/85:25:04:32:58:55:96:9f:57:ee:fb:a8:1a:ea:69:daś/63:15:b3:0e:e6:4f:50:de:91:48:3d:01:6b:b3:13:c1N)r=   r   r!   r%   Śfingerprintr'   r9   r   r   r   Śtest_fingerprintdefaultA  s    ’’z KeyTests.test_fingerprintdefaultc                 C   s@   |   t | j” tjj”d” |   t | j” tjj”d” dS )z
        fingerprint method generates key fingerprint in
        L{FingerprintFormats.MD5-HEX} format if explicitly specified.
        r   r   N)r=   r   r!   r%   r   ŚFingerprintFormatsZMD5_HEXr'   r9   r   r   r   Śtest_fingerprint_md5_hexL  s    ’ż’żz!KeyTests.test_fingerprint_md5_hexc                 C   s@   |   t | j” tjj”d” |   t | j” tjj”d” dS )z
        fingerprint method generates key fingerprint in
        L{FingerprintFormats.SHA256-BASE64} format if explicitly specified.
        z,FBTCOoknq0mHy+kpfnY9tDdcAJuWtCpuQMaV3EsvbUI=z,Wz5o2YbKyxOEcJn1au/UaALSVruUzfz0vaLI1xiIGyY=N)r=   r   r!   r%   r   r   ZSHA256_BASE64r'   r9   r   r   r   Śtest_fingerprintsha256[  s    ’ż’żzKeyTests.test_fingerprintsha256c              	   C   sB   |   tj”}t | j” d” W 5 Q R X |  d|jjd ” dS )zk
        A C{BadFingerPrintFormat} error is raised when unsupported
        formats are requested.
        zsha256-basez+Unsupported fingerprint format: sha256-baser   N)	rg   r   ZBadFingerPrintFormatr!   r%   r   r=   Z	exceptionŚargs)r3   Zemr   r   r   Śtest_fingerprintBadFormatj  s
    
’z"KeyTests.test_fingerprintBadFormatc                 C   sź   |   t | j” ” d” |   t | j” ” d” |   t | j” ” d” |   t | j” ” d” |   t | j” ” d” |   t | j” ” tj	d ” |  
tt d”j” |  
tt d”j” |  
tt | ”j” |  
tt | ”j” dS )zS
        Test that the type method returns the correct type for an object.
        ra   ó   ssh-rsard   ó   ssh-dssr`   r   N)r=   r   r!   r%   rZ   ZsshTyper'   r)   r
   r(   rg   r   r9   r   r   r   Ś	test_typeu  s    ’zKeyTests.test_typec                 C   s"   t  d”}|  tjtjj|” dS )ze
        A C{BadKeyError} error is raised whey the blob has an unsupported
        key type.
        ó   ssh-badN)r   ŚNSrg   r   rh   r!   rN   ©r3   ZbadBlobr   r   r   Śtest_fromBlobUnsupportedType  s
    
 ’z%KeyTests.test_fromBlobUnsupportedTypec                 C   sj   t jd t jd d}t d”t |d ” t |d ” }tj |”}|  | 	” ” |  
|| ” ” dS )zQ
        A public RSA key is correctly generated from a public key blob.
        r   r   r   r   N)r
   r#   r   r   ŚMPr   r!   rN   rQ   rR   r=   r[   )r3   ZrsaPublicDataŚrsaBlobrT   r   r   r   Śtest_fromBlobRSA  s    ž’ž’zKeyTests.test_fromBlobRSAc                 C   s   t jd t jd t jd t jd d}t d”t |d ” t |d ” t |d ” t |d ” }tj |”}|  | 	” ” |  
|| ” ” dS )zQ
        A public DSA key is correctly generated from a public key blob.
        r   r   r   r   )r   r   r   r   r   N)r
   r&   r   r   r    r   r!   rN   rQ   rR   r=   r[   )r3   ZdsaPublicDataŚdsaBlobrU   r   r   r   Śtest_fromBlobDSA£  s$    ü’žżü’zKeyTests.test_fromBlobDSAc                 C   s¦   ddl m} tjd tjd tjd d}t |d ”t |d dd ” t d	| |d d
” | |d d
” ” }tj 	|”}|  
| ” ” |  || ” ” dS )zA
        Key.fromString generates ECDSA keys from blobs.
        r   ©Śutilsr   r   r   )r   r   r   éų’’’Nó   é    )r   r¦   r
   r(   r   r   Śint_to_bytesr   r!   rN   rQ   rR   r=   r[   )r3   r¦   ZecPublicDataŚecblobŚeckeyr   r   r   Śtest_fromBlobECDSAŗ  s"    ż’’žžzKeyTests.test_fromBlobECDSAc                 C   s"   t  d”}|  tjtjj|” dS )zh
        C{BadKeyError} is raised when loading a private blob with an
        unsupported type.
        r   N)r   r   rg   r   rh   r!   Ś_fromString_PRIVATE_BLOBr   r   r   r   Ś#test_fromPrivateBlobUnsupportedTypeŃ  s    
  ’z,KeyTests.test_fromPrivateBlobUnsupportedTypec                 C   s   t  d”t  tjd ” t  tjd ” t  tjd ” t  tjd ” t  tjd ” t  tjd ” }tj |”}|  | 	” ” |  
tj| ” ” dS )	zS
        A private RSA key is correctly generated from a private key blob.
        r   r   r   r   r   r   r   N)r   r   r    r
   r#   r   r!   r®   rS   rR   r=   r[   )r3   r”   rT   r   r   r   Śtest_fromPrivateBlobRSAÜ  s"    ’žżüūś’
z KeyTests.test_fromPrivateBlobRSAc                 C   s   t  d”t  tjd ” t  tjd ” t  tjd ” t  tjd ” t  tjd ” }tj |”}|  | 	” ” |  
tj| ” ” dS )zS
        A private DSA key is correctly generated from a private key blob.
        r   r   r   r   r   r   N)r   r   r    r
   r&   r   r!   r®   rS   rR   r=   r[   )r3   r£   rU   r   r   r   Śtest_fromPrivateBlobDSAš  s    ’žżüū’	z KeyTests.test_fromPrivateBlobDSAc                 C   sp   t  tjd ”t  tjd ” t  tjd ” t  tjd ” }tj |”}|  | 	” ” |  
tj| ” ” dS )zR
        A private EC key is correctly generated from a private key blob.
        r   r   r   r   N)r   r   r
   r(   r    r   r!   r®   rS   rR   r=   r[   )r3   r«   r¬   r   r   r   Śtest_fromPrivateBlobECDSA  s    ’žż’z"KeyTests.test_fromPrivateBlobECDSAc                 C   sJ   |   t | j” ” t d”t | j ” j	j
” t | j ” j	j” ” dS )zL
        Return the over-the-wire SSH format of the RSA public key.
        r   N)r=   r   r!   r%   rA   r   r   r    Śprivate_numbersŚpublic_numbersr   r   r9   r   r   r   Śtest_blobRSA  s    ’žžzKeyTests.test_blobRSAc                 C   sd   | j  ” j}|  t | j ” ” t d”t 	|j
j” t 	|j
j” t 	|j
j” t 	|j” ” dS )zL
        Return the over-the-wire SSH format of the DSA public key.
        r   N)r'   r³   r“   r=   r   r!   rA   r   r   r    Śparameter_numbersr   r   r   r   ©r3   ZpublicNumbersr   r   r   Śtest_blobDSA   s    ’žż
üžzKeyTests.test_blobDSAc                 C   s   ddl m} | jjjd d }|  t | j” ” t	 
tjd ”t	 
tjd dd ” t	 
d| | j ” jj|” | | j ” jj|” ” ” dS )	zK
        Return the over-the-wire SSH format of the EC public key.
        r   r„   é   é   r   r§   NrØ   )r   r¦   r)   r   Zkey_sizer=   r   r!   rA   r   r   r
   r(   rŖ   r³   r“   r   r   )r3   r¦   Z
byteLengthr   r   r   Śtest_blobEC0  s(    ’ ’’ ’żžžzKeyTests.test_blobECc                 C   s   t  d”}|  t|j” dS )zx
        C{RuntimeError} is raised when the blob is requested for a Key
        which is not wrapping anything.
        N)r   r!   rg   r   rA   ri   r   r   r   Śtest_blobNoKeyC  s    
zKeyTests.test_blobNoKeyc                 C   s°   ddl m} | j ” }| |j|j”}|  t 	| j” 
” t d”t | j ” jj” t | j ” jj” t | j ” j” t |” t | j ” j” t | j ” j” ” dS )zn
        L{keys.Key.privateBlob} returns the SSH protocol-level format of an
        RSA private key.
        r   )Śrsar   N)Z)cryptography.hazmat.primitives.asymmetricr½   r%   r³   Zrsa_crt_iqmpr   r   r=   r   r!   ŚprivateBlobr   r   r    r“   r   r   r   )r3   r½   Znumbersr   r   r   r   Śtest_privateBlobRSAM  s&    
’žżüūśžzKeyTests.test_privateBlobRSAc                 C   sv   | j  ” j}|  t | j ” ” t d”t 	|j
j” t 	|j
j” t 	|j
j” t 	|j” t 	| j  ” j” ” dS )zm
        L{keys.Key.privateBlob} returns the SSH protocol-level format of a DSA
        private key.
        r   N)r'   r³   r“   r=   r   r!   r¾   r   r   r    r¶   r   r   r   r   r   r·   r   r   r   Śtest_privateBlobDSAa  s    ’žż
üūžzKeyTests.test_privateBlobDSAc                 C   sb   |   t | j” ” t tjd ”t 	| j 
” jj” t 	| j 
” jj” t 	| j 
” j” ” dS )zj
        L{keys.Key.privateBlob} returns the SSH ptotocol-level format of EC
        private key.
        r   N)r=   r   r!   r)   r¾   r   r   r
   r(   r    r³   r“   r   r   Zprivate_valuer9   r   r   r   Śtest_privateBlobECs  s    ’žżžzKeyTests.test_privateBlobECc                 C   s   t  d”}|  t|j” dS )zV
        Raises L{RuntimeError} if the underlying key object does not exists.
        N)r   r!   rg   r   r¾   ri   r   r   r   Śtest_privateBlobNoKeyObject  s    
z$KeyTests.test_privateBlobNoKeyObjectc                 C   sv   t j tj”}|  | d”tj” |  | dd”tj” |  | 	”  d”tj
dd ” |  | 	”  dd”tj
” dS )zO
        L{keys.Key.toString} serializes an RSA key in OpenSSH format.
        r   rb   Nr§   ó   comment)r   r!   rN   r
   rK   r=   r   rE   re   rO   rB   ©r3   ro   r   r   r   Śtest_toOpenSSHRSA  s    ’’’zKeyTests.test_toOpenSSHRSAc                 C   s`   t j tj”}|  | d”tj” |  | ”  dd”tj	” |  | ”  d”tj	dd ” dS )zN
        L{keys.Key.toString} serializes a DSA key in OpenSSH format.
        r   rĆ   Nr§   )
r   r!   rN   r
   rJ   r=   r   rF   rO   rC   rÄ   r   r   r   Śtest_toOpenSSHDSA  s    ’’zKeyTests.test_toOpenSSHDSAc                 C   sL   t j tj”}|  | ”  dd”tj” |  | ”  d”tjdd ” dS )zP
        L{keys.Key.toString} serializes a ECDSA key in OpenSSH format.
        r   rĆ   Nr§   )	r   r!   rN   r
   rG   r=   rO   r   rD   rÄ   r   r   r   Śtest_toOpenSSHECDSA¤  s    ’’zKeyTests.test_toOpenSSHECDSAc                 C   s>   t j tj”}|  | d”tj” |  | ”  d”tj	” dS )zK
        L{keys.Key.toString} serializes an RSA key in LSH format.
        ŚlshN)
r   r!   rN   r
   rE   r=   r   r2   rO   rH   rÄ   r   r   r   Śtest_toLSHRSAÆ  s
    ’zKeyTests.test_toLSHRSAc                 C   s>   t j tj”}|  | d”tj” |  | ”  d”tj	” dS )zJ
        L{keys.Key.toString} serializes a DSA key in LSH format.
        rČ   N)
r   r!   rN   r
   rF   r=   r   rJ   rO   rI   rÄ   r   r   r   Śtest_toLSHDSA¹  s
    ’zKeyTests.test_toLSHDSAc                 C   s&   t j tj”}|  | d”tj” dS )zP
        L{keys.Key.toString} serializes an RSA key in Agent v3 format.
        r@   N)r   r!   rN   r
   rE   r=   r   rK   rÄ   r   r   r   Śtest_toAgentv3RSAĆ  s    zKeyTests.test_toAgentv3RSAc                 C   s&   t j tj”}|  | d”tj” dS )zO
        L{keys.Key.toString} serializes a DSA key in Agent v3 format.
        r@   N)r   r!   rN   r
   rF   r=   r   rL   rÄ   r   r   r   Śtest_toAgentv3DSAĖ  s    zKeyTests.test_toAgentv3DSAc                 C   s   |   tjt | j”jd” dS )zm
        L{keys.Key.toString} raises L{keys.BadKeyError} when passed an invalid
        format type.
        r   N)rg   r   rh   r!   r%   r   r9   r   r   r   Śtest_toStringErrorsÓ  s    ’zKeyTests.test_toStringErrorsc                 C   sH   d}t j tj”}| |”}|  | ”  ||”” |  | ||”” dS )z8
        Signed data can be verified using RSA.
        ó	   some-dataN)	r   r!   rN   r
   rE   ŚsignrQ   rO   Śverify©r3   r[   ro   Ś	signaturer   r   r   Śtest_signAndVerifyRSAÜ  s
    
zKeyTests.test_signAndVerifyRSAc                 C   sH   d}t j tj”}| |”}|  | ”  ||”” |  | ||”” dS )z8
        Signed data can be verified using DSA.
        rĪ   N)	r   r!   rN   r
   rF   rĻ   rQ   rO   rŠ   rŃ   r   r   r   Śtest_signAndVerifyDSAē  s
    
zKeyTests.test_signAndVerifyDSAc                 C   sČ   d}t j tj”}| |”}t j tj”}| |”}t j tj”}| |”}|  | 	”  
||”” |  | 
||”” |  | 	”  
||”” |  | 
||”” |  | 	”  
||”” |  | 
||”” dS )z7
        Signed data can be verified using EC.
        rĪ   N)r   r!   rN   r
   rG   rĻ   ZprivateECDSA_openssh384ZprivateECDSA_openssh521rQ   rO   rŠ   )r3   r[   ro   rŅ   Zkey384Zsignature384Zkey521Zsignature521r   r   r   Śtest_signAndVerifyECņ  s    


zKeyTests.test_signAndVerifyECc                 C   sN   t j tj”}|  | | jd”” |  | | jd”” |  | | j	d”” dS )zC
        A known-good RSA signature verifies successfully.
        r   ó   aN)
r   r!   rN   r
   rB   rQ   rŠ   r,   rS   r-   rÄ   r   r   r   Śtest_verifyRSA  s    zKeyTests.test_verifyRSAc                 C   sN   t j tj”}|  | | jd”” |  | | jd”” |  | | j	d”” dS )zC
        A known-good DSA signature verifies successfully.
        r   rÖ   N)
r   r!   rN   r
   rC   rQ   rŠ   r-   rS   r,   rÄ   r   r   r   Śtest_verifyDSA  s    zKeyTests.test_verifyDSAc                 C   s.   t j tj”}|  | | jdd d”” dS )z
        Some commercial SSH servers send DSA keys as 2 20-byte numbers;
        they are still verified as valid keys.
        iŲ’’’Nr   )r   r!   rN   r
   rC   rQ   rŠ   r-   rÄ   r   r   r   Śtest_verifyDSANoPrefix  s    zKeyTests.test_verifyDSANoPrefixc                 C   s   |   tt | j”d” dS )zn
        The repr of a L{keys.Key} contains all of the RSA components for an RSA
        private key.
        a\  <RSA Private Key (2048 bits)
attr d:
	21:4c:08:66:a2:28:d5:b4:fb:8e:0f:72:1b:85:09:
	00:b9:f2:4e:37:f0:1c:57:4b:e3:51:7f:9e:23:a7:
	e4:3a:98:55:1b:ea:8b:7a:98:1e:bc:d8:ba:b1:f9:
	89:12:18:60:ac:e8:cc:0b:4e:09:5a:40:6a:ba:2f:
	99:f8:b3:24:60:84:b9:ce:69:95:9a:f9:e2:fc:1f:
	51:4d:27:15:db:2b:27:ad:ef:b4:69:ac:be:7d:10:
	eb:86:47:70:73:b4:00:87:95:15:3b:37:f9:e7:14:
	e7:80:bb:68:1e:1b:e6:dd:bb:73:63:b9:67:e6:b2:
	27:7f:cf:cf:30:9b:c2:98:fd:d9:18:36:2f:36:2e:
	f1:3d:81:7a:9f:e1:03:2d:47:db:34:51:62:39:dd:
	4f:e9:ac:a8:8b:d9:d6:f3:84:c4:17:b9:71:9d:06:
	08:42:78:4d:bb:c5:2a:f4:c3:58:cd:55:2b:ed:be:
	33:5f:04:ea:7b:e6:04:24:63:f2:2d:d7:3d:1b:6c:
	d5:9c:63:43:2f:92:88:8d:3e:6e:da:18:37:d8:0f:
	25:67:89:1d:b9:46:34:5e:c9:ce:c4:8b:ed:92:5a:
	33:07:0f:df:86:08:f9:92:e9:db:eb:38:08:36:c9:
	cd:cd:0a:01:48:5b:39:3e:7a:ca:c6:80:a9:dc:d4:
	39
attr e:
	01:00:01
attr n:
	00:d5:6a:ac:78:23:d6:d6:1b:ec:25:a1:50:c4:77:
	63:50:84:45:01:55:42:14:2a:2a:e0:d0:60:ee:d4:
	e9:a3:ad:4a:fa:39:06:5e:84:55:75:5f:00:36:bf:
	6f:aa:2a:3f:83:26:37:c1:69:2e:5b:fd:f0:f3:d2:
	7d:d6:98:cd:3a:40:78:d5:ca:a8:18:c0:11:93:24:
	09:0c:81:4c:8f:f7:9c:ed:13:16:6a:a4:04:e9:49:
	77:c3:e4:55:64:b3:79:68:9e:2c:08:eb:ac:e8:04:
	2d:21:77:05:a7:8e:ef:53:30:0d:a5:e5:bb:3d:6a:
	e2:09:36:6f:fd:34:d3:7d:6f:46:ff:87:da:a9:29:
	27:aa:ff:ad:f5:85:e6:3e:1a:b8:7a:1d:4a:b1:ea:
	c0:5a:f7:30:df:1f:c2:a4:e4:ef:3f:91:49:96:40:
	d5:19:77:2d:37:c3:5e:ec:9d:a6:3a:44:a5:c2:a4:
	29:dd:d5:ba:9c:3d:45:b3:c6:2c:18:64:d5:ba:3d:
	df:ab:7f:cd:42:ac:a7:f1:18:0b:a0:58:15:62:0b:
	a4:2a:6e:43:c3:e4:04:9f:35:a3:47:8e:46:ed:33:
	a5:65:bd:bc:3b:29:6e:02:0b:57:df:74:e8:13:b4:
	37:35:7e:83:5f:20:26:60:a6:dc:ad:8b:c6:6c:79:
	98:f7
attr p:
	00:d9:70:06:d8:e2:bc:d4:78:91:50:94:d4:c1:1b:
	89:38:6c:46:64:5a:51:a0:9a:07:3d:48:8f:03:51:
	cc:6b:12:8e:7d:1a:b1:65:e7:71:75:39:e0:32:05:
	75:8d:18:4c:af:93:b1:49:b1:66:5f:78:62:7a:d1:
	0c:ca:e6:4d:43:b3:9c:f4:6b:7d:e6:0c:98:dc:cf:
	21:62:8e:d5:2e:12:de:04:ae:d7:24:6e:83:31:a2:
	15:a2:44:3d:22:a9:62:26:22:b9:b2:ed:54:0a:9d:
	08:83:a7:07:0d:ff:19:18:8e:d8:ab:1d:da:48:9c:
	31:68:11:a1:66:6d:e3:d8:1d
attr q:
	00:fb:44:17:8b:a4:36:be:1e:37:1d:a7:f6:61:6c:
	04:c4:aa:dd:78:3e:07:8c:1e:33:02:ae:03:14:87:
	83:7a:e5:9e:7d:08:67:a8:f2:aa:bf:12:70:cf:72:
	a9:a7:c7:0b:1d:88:d5:20:fd:9c:63:ca:47:30:55:
	4e:8b:c4:cf:f4:7f:16:a4:92:12:74:a1:09:c2:c4:
	6e:9c:8c:33:ef:a5:e5:f7:e0:2b:ad:4f:5c:11:aa:
	1a:84:37:5b:fd:7a:ea:c3:cd:7c:b0:c8:e4:1f:54:
	63:b5:c7:af:df:f4:09:a7:fc:c7:25:fc:5c:e9:91:
	d7:92:c5:98:1e:56:d3:b1:23
attr u:
	00:85:4b:1b:7a:9b:12:10:37:9e:1f:ad:5e:da:fe:
	c6:96:fe:df:35:6b:b9:34:e2:16:97:92:26:09:bd:
	bd:70:20:03:a7:35:bd:2d:1b:a0:d2:07:47:2b:d4:
	de:a8:a8:07:07:1b:b8:04:20:a7:27:41:3c:6c:39:
	39:e9:41:ce:e7:17:1d:d1:4c:5c:bc:3d:d2:26:26:
	fe:6a:d6:fd:48:72:ae:46:fa:7b:c3:d3:19:60:44:
	1d:a5:13:a7:80:f5:63:29:d4:7a:5d:06:07:16:5d:
	f6:8b:3d:cb:64:3a:e2:84:5a:4d:8c:06:2d:2d:9d:
	1c:eb:83:4c:78:3d:79:54:ce>N)r=   Śreprr   r!   r%   r9   r   r   r   Śtest_reprPrivateRSA%  s    ’zKeyTests.test_reprPrivateRSAc                 C   s    |   tt | j” ” d” dS )zm
        The repr of a L{keys.Key} contains all of the RSA components for an RSA
        public key.
        a\  <RSA Public Key (2048 bits)
attr e:
	01:00:01
attr n:
	00:d5:6a:ac:78:23:d6:d6:1b:ec:25:a1:50:c4:77:
	63:50:84:45:01:55:42:14:2a:2a:e0:d0:60:ee:d4:
	e9:a3:ad:4a:fa:39:06:5e:84:55:75:5f:00:36:bf:
	6f:aa:2a:3f:83:26:37:c1:69:2e:5b:fd:f0:f3:d2:
	7d:d6:98:cd:3a:40:78:d5:ca:a8:18:c0:11:93:24:
	09:0c:81:4c:8f:f7:9c:ed:13:16:6a:a4:04:e9:49:
	77:c3:e4:55:64:b3:79:68:9e:2c:08:eb:ac:e8:04:
	2d:21:77:05:a7:8e:ef:53:30:0d:a5:e5:bb:3d:6a:
	e2:09:36:6f:fd:34:d3:7d:6f:46:ff:87:da:a9:29:
	27:aa:ff:ad:f5:85:e6:3e:1a:b8:7a:1d:4a:b1:ea:
	c0:5a:f7:30:df:1f:c2:a4:e4:ef:3f:91:49:96:40:
	d5:19:77:2d:37:c3:5e:ec:9d:a6:3a:44:a5:c2:a4:
	29:dd:d5:ba:9c:3d:45:b3:c6:2c:18:64:d5:ba:3d:
	df:ab:7f:cd:42:ac:a7:f1:18:0b:a0:58:15:62:0b:
	a4:2a:6e:43:c3:e4:04:9f:35:a3:47:8e:46:ed:33:
	a5:65:bd:bc:3b:29:6e:02:0b:57:df:74:e8:13:b4:
	37:35:7e:83:5f:20:26:60:a6:dc:ad:8b:c6:6c:79:
	98:f7>N)r=   rŚ   r   r!   r%   rO   r9   r   r   r   Śtest_reprPublicRSAt  s    ’zKeyTests.test_reprPublicRSAc                 C   s    |   tt | j” ” d” dS )zl
        The repr of a L{keys.Key} contains all the OpenSSH format for an ECDSA
        public key.
        zē<Elliptic Curve Public Key (256 bits)
curve:
	ecdsa-sha2-nistp256
x:
	76282513020392096317118503144964731774299773481750550543382904345687059013883
y:
	81543197864602852632265664769441647534344375894314319681061137159310646683104>
N)r=   rŚ   r   r!   r)   rO   r9   r   r   r   Śtest_reprPublicECDSA  s    ’zKeyTests.test_reprPublicECDSAc                 C   s   |   tt | j”d” dS )zm
        The repr of a L{keys.Key} contains all the OpenSSH format for an ECDSA
        private key.
        aE  <Elliptic Curve Private Key (256 bits)
curve:
	ecdsa-sha2-nistp256
privateValue:
	34638743477210341700964008455655698253555655678826059678074967909361042656500
x:
	76282513020392096317118503144964731774299773481750550543382904345687059013883
y:
	81543197864602852632265664769441647534344375894314319681061137159310646683104>
N)r=   rŚ   r   r!   r)   r9   r   r   r   Śtest_reprPrivateECDSA¢  s    ’zKeyTests.test_reprPrivateECDSA)GŚ__name__Ś
__module__Ś__qualname__r   ŚskipCryptographyŚskipr   r5   r:   r?   rM   rP   rV   r\   rW   rX   rf   rj   rn   rp   rr   r{   r|   r}   r~   r   r   r   r   r   r   r   r   r   r   r   r   r   r¢   r¤   r­   rÆ   r°   r±   r²   rµ   rø   r»   r¼   ræ   rĄ   rĮ   rĀ   rÅ   rĘ   rĒ   rÉ   rŹ   rĖ   rĢ   rĶ   rÓ   rŌ   rÕ   r×   rŲ   rŁ   rŪ   rÜ   rŻ   rŽ   r   r   r   r   r   !   s   <' 	

	

	

	Or   c                   @   s4   e Zd ZdZedkreZdd Zdd Zdd Z	dS )	ŚPersistentRSAKeyTestsz1
    Tests for L{keys._getPersistentRSAKey}.
    Nc                 C   sF   t |  ” }| d”}tj|dd}|  | ” d” |  | ” ” dS )z
        L{keys._getPersistentRSAKey} will put the key in
        C{directory}/C{filename}, with the key length of C{keySize}.
        ś	mykey.pemé   ©ZkeySizeN)	r   r.   Śchildr   Ś_getPersistentRSAKeyr=   r>   rQ   Śexists©r3   ŚtempDirr/   ro   r   r   r   Śtest_providedArguments¾  s
    
z,PersistentRSAKeyTests.test_providedArgumentsc                 C   s|   t |  ” }| d”}tj|dd}|  | ” d” |  | ” ” | 	” }tj|dd}|  | ” d” |  | 	” |” dS )zm
        L{keys._getPersistentRSAKey} will not regenerate the key if the key
        already exists.
        rå   rę   rē   r;   N)
r   r.   rč   r   ré   r=   r>   rQ   rź   Z
getContent)r3   rģ   r/   ro   Z
keyContentr   r   r   Śtest_noRegenerationĖ  s    
z)PersistentRSAKeyTests.test_noRegenerationc                 C   s>   t |  ” }| d”}tj|dd}d|_|  | ” d” dS )z
        If the key generated by L{keys.getPersistentRSAKey} is set to None
        the key size should then become 0.
        rå   rę   rē   Nr   )r   r.   rč   r   ré   r$   r=   r>   rė   r   r   r   Śtest_keySizeZeroß  s
    
z&PersistentRSAKeyTests.test_keySizeZero)
rß   rą   rį   Ś__doc__r   rā   rć   rķ   rī   rļ   r   r   r   r   rä   µ  s   rä   )rš   Z
__future__r   r   Ztwisted.python.reflectr   r   rā   r   Ztwisted.conch.sshr   r   r	   ry   r7   Ztwisted.conch.testr
   Ztwisted.pythonr   Ztwisted.trialr   Ztwisted.python.compatr   Ztwisted.python.filepathr   ZTestCaser   rä   r   r   r   r   Ś<module>   s4            