Anons79 Mini Shell

Directory : /lib/python2.7/site-packages/ansible/modules/crypto/
Upload File :
Current File : //lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyo

�
�Udac@`s}ddlmZmZmZeZidd6dgd6dd6ZdZd	Zd
Z	ddl
Z
ddlZddlZddl
mZd
ZdZdZy/ddlZddlmZeej�ZWn#ek
r�ej�ZeZnXeZdZysddlZddlZddlZddl Zddl!Zddl"Zddl#Zddl$Zeej�Z%Wn#ek
r�ej�ZeZ&nXeZ&ddl'm(Z(m)Z)m*Z*m+Z+m,Z,ddl-mZ.ddl/m0Z0m1Z1ddl2m3Z3m4Z4de.j5fd��YZ6de.j7fd��YZ8de8fd��YZ9de8fd��YZ:d�Z;e<dkrye;�ndS(i(tabsolute_importtdivisiontprint_functions1.1tmetadata_versiontpreviewtstatust	communitytsupported_bys�
---
module: openssl_privatekey
version_added: "2.3"
short_description: Generate OpenSSL private keys
description:
    - This module allows one to (re)generate OpenSSL private keys.
    - One can generate L(RSA,https://en.wikipedia.org/wiki/RSA_%28cryptosystem%29),
      L(DSA,https://en.wikipedia.org/wiki/Digital_Signature_Algorithm),
      L(ECC,https://en.wikipedia.org/wiki/Elliptic-curve_cryptography) or
      L(EdDSA,https://en.wikipedia.org/wiki/EdDSA) private keys.
    - Keys are generated in PEM format.
    - "Please note that the module regenerates private keys if they don't match
      the module's options. In particular, if you provide another passphrase
      (or specify none), change the keysize, etc., the private key will be
      regenerated. If you are concerned that this could **overwrite your private key**,
      consider using the I(backup) option."
    - The module can use the cryptography Python library, or the pyOpenSSL Python
      library. By default, it tries to detect which one is available. This can be
      overridden with the I(select_crypto_backend) option. Please note that the
      PyOpenSSL backend was deprecated in Ansible 2.9 and will be removed in Ansible 2.13."
requirements:
    - Either cryptography >= 1.2.3 (older versions might work as well)
    - Or pyOpenSSL
author:
    - Yanis Guenane (@Spredzy)
    - Felix Fontein (@felixfontein)
options:
    state:
        description:
            - Whether the private key should exist or not, taking action if the state is different from what is stated.
        type: str
        default: present
        choices: [ absent, present ]
    size:
        description:
            - Size (in bits) of the TLS/SSL key to generate.
        type: int
        default: 4096
    type:
        description:
            - The algorithm used to generate the TLS/SSL private key.
            - Note that C(ECC), C(X25519), C(X448), C(Ed25519) and C(Ed448) require the C(cryptography) backend.
              C(X25519) needs cryptography 2.5 or newer, while C(X448), C(Ed25519) and C(Ed448) require
              cryptography 2.6 or newer. For C(ECC), the minimal cryptography version required depends on the
              I(curve) option.
        type: str
        default: RSA
        choices: [ DSA, ECC, Ed25519, Ed448, RSA, X25519, X448 ]
    curve:
        description:
            - Note that not all curves are supported by all versions of C(cryptography).
            - For maximal interoperability, C(secp384r1) or C(secp256r1) should be used.
            - We use the curve names as defined in the
              L(IANA registry for TLS,https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8).
        type: str
        choices:
            - secp384r1
            - secp521r1
            - secp224r1
            - secp192r1
            - secp256r1
            - secp256k1
            - brainpoolP256r1
            - brainpoolP384r1
            - brainpoolP512r1
            - sect571k1
            - sect409k1
            - sect283k1
            - sect233k1
            - sect163k1
            - sect571r1
            - sect409r1
            - sect283r1
            - sect233r1
            - sect163r2
        version_added: "2.8"
    force:
        description:
            - Should the key be regenerated even if it already exists.
        type: bool
        default: no
    path:
        description:
            - Name of the file in which the generated TLS/SSL private key will be written. It will have 0600 mode.
        type: path
        required: true
    passphrase:
        description:
            - The passphrase for the private key.
        type: str
        version_added: "2.4"
    cipher:
        description:
            - The cipher to encrypt the private key. (Valid values can be found by
              running `openssl list -cipher-algorithms` or `openssl list-cipher-algorithms`,
              depending on your OpenSSL version.)
            - When using the C(cryptography) backend, use C(auto).
        type: str
        version_added: "2.4"
    select_crypto_backend:
        description:
            - Determines which crypto backend to use.
            - The default choice is C(auto), which tries to use C(cryptography) if available, and falls back to C(pyopenssl).
            - If set to C(pyopenssl), will try to use the L(pyOpenSSL,https://pypi.org/project/pyOpenSSL/) library.
            - If set to C(cryptography), will try to use the L(cryptography,https://cryptography.io/) library.
            - Please note that the C(pyopenssl) backend has been deprecated in Ansible 2.9, and will be removed in Ansible 2.13.
              From that point on, only the C(cryptography) backend will be available.
        type: str
        default: auto
        choices: [ auto, cryptography, pyopenssl ]
        version_added: "2.8"
    backup:
        description:
            - Create a backup file including a timestamp so you can get
              the original private key back if you overwrote it with a new one by accident.
        type: bool
        default: no
        version_added: "2.8"
extends_documentation_fragment:
- files
seealso:
- module: openssl_certificate
- module: openssl_csr
- module: openssl_dhparam
- module: openssl_pkcs12
- module: openssl_publickey
s,
- name: Generate an OpenSSL private key with the default values (4096 bits, RSA)
  openssl_privatekey:
    path: /etc/ssl/private/ansible.com.pem

- name: Generate an OpenSSL private key with the default values (4096 bits, RSA) and a passphrase
  openssl_privatekey:
    path: /etc/ssl/private/ansible.com.pem
    passphrase: ansible
    cipher: aes256

- name: Generate an OpenSSL private key with a different size (2048 bits)
  openssl_privatekey:
    path: /etc/ssl/private/ansible.com.pem
    size: 2048

- name: Force regenerate an OpenSSL private key if it already exists
  openssl_privatekey:
    path: /etc/ssl/private/ansible.com.pem
    force: yes

- name: Generate an OpenSSL private key with a different algorithm (DSA)
  openssl_privatekey:
    path: /etc/ssl/private/ansible.com.pem
    type: DSA
s�
size:
    description: Size (in bits) of the TLS/SSL private key.
    returned: changed or success
    type: int
    sample: 4096
type:
    description: Algorithm used to generate the TLS/SSL private key.
    returned: changed or success
    type: str
    sample: RSA
curve:
    description: Elliptic curve used to generate the TLS/SSL private key.
    returned: changed or success, and I(type) is C(ECC)
    type: str
    sample: secp256r1
filename:
    description: Path to the generated TLS/SSL private key file.
    returned: changed or success
    type: str
    sample: /etc/ssl/private/ansible.com.pem
fingerprint:
    description:
    - The fingerprint of the public key. Fingerprint will be generated for each C(hashlib.algorithms) available.
    - The PyOpenSSL backend requires PyOpenSSL >= 16.0 for meaningful output.
    returned: changed or success
    type: dict
    sample:
      md5: "84:75:71:72:8d:04:b5:6c:4d:37:6d:66:83:f5:4c:29"
      sha1: "51:cc:7c:68:5d:eb:41:43:88:7e:1a:ae:c7:f8:24:72:ee:71:f6:10"
      sha224: "b1:19:a6:6c:14:ac:33:1d:ed:18:50:d3:06:5c:b2:32:91:f1:f1:52:8c:cb:d5:75:e9:f5:9b:46"
      sha256: "41:ab:c7:cb:d5:5f:30:60:46:99:ac:d4:00:70:cf:a1:76:4f:24:5d:10:24:57:5d:51:6e:09:97:df:2f:de:c7"
      sha384: "85:39:50:4e:de:d9:19:33:40:70:ae:10:ab:59:24:19:51:c3:a2:e4:0b:1c:b1:6e:dd:b3:0c:d9:9e:6a:46:af:da:18:f8:ef:ae:2e:c0:9a:75:2c:9b:b3:0f:3a:5f:3d"
      sha512: "fd:ed:5e:39:48:5f:9f:fe:7f:25:06:3f:79:08:cd:ee:a5:e7:b3:3d:13:82:87:1f:84:e1:f5:c7:28:77:53:94:86:56:38:69:f0:d9:35:22:01:1e:a6:60:...:0f:9b"
backup_file:
    description: Name of backup file created.
    returned: changed and if I(backup) is C(yes)
    type: str
    sample: /path/to/privatekey.pem.2019-03-09@11:22~
N(tLooseVersions0.6s1.2.3(tcrypto(tCRYPTOGRAPHY_HAS_X25519tCRYPTOGRAPHY_HAS_X25519_FULLtCRYPTOGRAPHY_HAS_X448tCRYPTOGRAPHY_HAS_ED25519tCRYPTOGRAPHY_HAS_ED448(t	to_nativetto_bytes(t
AnsibleModuletmissing_required_libtPrivateKeyErrorcB`seZRS((t__name__t
__module__(((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyRstPrivateKeyBasecB`s�eZd�Zejd��Zejd��Zd�Zd�Zejd��Z	ejd��Z
ed�Zd�Z
RS(	cC`s�tt|�j|jd|jd|jd|j�|jd|_|jd|_|jd|_d|_	i|_
|jd|_d|_|jddkr�d	|jd<ndS(
Ntpathtstatetforcetsizet
passphrasetciphertbackuptmodet0600(
tsuperRt__init__tparamst
check_modeRRRtNonet
privatekeytfingerprintRtbackup_file(tselftmodule((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR!
s



			cC`sdS(N((R(((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyt_generate_private_key_datascC`sdS(N((R(((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyt_get_fingerprint!scC`s�|j|dt�s|jrk|jr@|j|j�|_n|j�}tj	||d�t
|_n|j�|_
|j|j�}|j|t�r�t
|_ndS(sGenerate a keypair.tperms_requiredi�N(tchecktFalseRRtbackup_localRR'R*tcrypto_utilst
write_filetTruetchangedR+R&tload_file_common_argumentsR"tset_fs_attributes_if_different(R(R)tprivatekey_datat	file_args((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pytgenerate%s	cC`s;|jr!|j|j�|_ntt|�j|�dS(N(RR/RR'R Rtremove(R(R)((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR94s	cC`sdS(N((R(((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyt_check_passphrase9scC`sdS(N((R(((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyt_check_size_and_type=scC`s=tt|�j||�}|s/|j�r3tS|j�S(s,Ensure the resource is in its desired state.(R RR-R:R.R;(R(R)R,tstate_and_perms((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR-AscC`sKi|jd6|jd6|jd6|jd6}|jrG|j|d<n|S(s'Serialize the object into a dictionary.RtfilenameR3R&R'(RRR3R&R'(R(tresult((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pytdumpKs



	(RRR!tabctabstractmethodR*R+R8R9R:R;R2R-R?(((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyRs			
tPrivateKeyPyOpenSSLcB`s>eZd�Zd�Zd�Zd�Zd�Zd�ZRS(cC`sntt|�j|�|jddkr8tj|_n2|jddkrZtj|_n|jdd�dS(NttypetRSAtDSAtmsgs1PyOpenSSL backend only supports RSA and DSA keys.(	R RBR!R"R	tTYPE_RSARCtTYPE_DSAt	fail_json(R(R)((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR!]scC`s�tj�|_y|jj|j|j�Wn%ttfk
rS}t|��nX|j	r�|j
r�tjtj|j|j	t
|j
��Stjtj|j�SdS(N(R	tPKeyR%tgenerate_keyRCRt	TypeErrort
ValueErrorRRRtdump_privatekeytFILETYPE_PEMR(R(texc((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR*gscC`stj|j|j�S(N(R0tget_fingerprintRR(R(((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR+uscC`s9ytj|j|j�tSWntk
r4}tSXdS(N(R0tload_privatekeyRRR2t	ExceptionR.(R(tdummy((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR:xs
c`su�fd�}�fd�}ytj�j�j�}Wn"tjk
r^}t|��nX||�ot||�S(Nc`s�j|j�kS(N(Rtbits(R%(R((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyt_check_size�sc`s�j|j�kS(N(RC(R%(R((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyt_check_type�s(R0RRRRtOpenSSLBadPassphraseErrorR(R(RVRWR%RP((R(sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR;scC`sBtt|�j�}|jtjkr4d|d<n
d|d<|S(s'Serialize the object into a dictionary.RDRCRE(R RBR?RCR	RG(R(R>((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR?�s


(RRR!R*R+R:R;R?(((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyRB[s	
				tPrivateKeyCryptographycB`s\eZd�Zed�Zd�Zd�Zd�Zd�Zd�Z	d�Z
d�ZRS(	cC`sMtjjjjjj|�}|dkrI|jj	ddj
|��n|S(NRFs.Your cryptography version does not support {0}(tcryptographythazmatt
primitivest
asymmetrictect__dict__tgetR$R)RItformat(R(tectypetecclass((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyt
_get_ec_class�sc`sJ��fd�}��fd�}i|d6|d6|d6�j|<dS(Nc`s�j��}|�S(N(Rd(RRc(RbR((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pytcreate�sc`s(�j��}t|j�jj|�S(N(Rdt
isinstancetprivate_numberstpublic_numberstcurve(R%Rc(RbR((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pytverify�sReRjt
deprecated(tcurves(R(tnameRbRkReRj((RbR(sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyt
_add_curve�scC`s�tt|�j|�t�|_|jdd�|jdd�|jdd�|jdd�|jd	d
�|jdd�|jd
ddt�|jdddt�|jdddt�|jdddt�|jdddt�|jdddt�|jdddt�|jdddt�|jdddt�|jd d!dt�|jd"d#dt�|jd$d%dt�|jd&d'dt�||_tj	j
j�|_|j
d(|_|j
d)|_tr
|jd*kr
|jjd+d,�ntr6|jd*kr6|jjd+d-�ntrb|jd.krb|jjd+d/�ntr�|jd0kr�|jjd+d1�ntr�|jd2kr�|jjd+d3�ndS(4Nt	secp384r1t	SECP384R1t	secp521r1t	SECP521R1t	secp224r1t	SECP224R1t	secp192r1t	SECP192R1t	secp256r1t	SECP256R1t	secp256k1t	SECP256K1tbrainpoolP256r1tBrainpoolP256R1RktbrainpoolP384r1tBrainpoolP384R1tbrainpoolP512r1tBrainpoolP512R1t	sect571k1t	SECT571K1t	sect409k1t	SECT409K1t	sect283k1t	SECT283K1t	sect233k1t	SECT233K1t	sect163k1t	SECT163K1t	sect571r1t	SECT571R1t	sect409r1t	SECT409R1t	sect283r1t	SECT283R1t	sect233r1t	SECT233R1t	sect163r2t	SECT163R2RCRitX25519RFs1Your cryptography version does not support X25519s?Your cryptography version does not support X25519 serializationtX448s/Your cryptography version does not support X448tEd25519s2Your cryptography version does not support Ed25519tEd448s0Your cryptography version does not support Ed448(R RYR!tdictRlRnR2R)RZR[tbackendstdefault_backendtcryptography_backendR"RCRiR
RIRRR
R(R(R)((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR!�sF	c
C`s:tjjjjj}yL|jdkr]tjjjjj	ddd|j
d|j�|_n|jdkr�tjjjj
j	d|j
d|j�|_ntr�|jdkr�tjjjjjj�|_tjjjjj}ntr2|jdkr2tjjjjjj�|_tjjjjj}ntr}|jd	kr}tjjjjjj�|_tjjjjj}ntr�|jd
kr�tjjjjjj�|_tjjjjj}n|jdkr`|j|jkr`|j|jdr|jjd
j |j��ntjjjj!j	d|j|jd|j
�d|j�|_nWn8tj"j#k
r�}|jj$ddj |j��nXtjjjj%�}|j&r|j'r|j&dkr�tjjjj(t)|j'��}q|jj$dd�n|jj*dtjjjj+j,d|d|�S(NRDtpublic_exponentitkey_sizetbackendRER�R�R�R�tECCRks<Elliptic curves of type {0} should not be used for new keys!RiReRFsDCryptography backend does not support the algorithm required for {0}tautos;Cryptography backend can only use "auto" for cipher option.tencodingRatencryption_algorithm(-RZR[R\t
serializationt
PrivateFormattTraditionalOpenSSLRCR]trsatgenerate_private_keyRR�R%tdsaRtx25519tX25519PrivateKeyR8tPKCS8Rtx448tX448PrivateKeyR
ted25519tEd25519PrivateKeyRted448tEd448PrivateKeyRiRlR)twarnRaR^t
exceptionstUnsupportedAlgorithmRItNoEncryptionRRtBestAvailableEncryptionRt
private_bytestEncodingtPEM(R(t
export_formatRTR�((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR*�sP		!#$c	C`s�yet|jd��M}tjjjj|j�|jdkrEdnt
|j�d|j�SWdQXWntk
r�}t
|��nXdS(NtrbR�(topenRRZR[R\R�tload_pem_private_keytreadRR$RR�RSR(R(tfte((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyt_load_privatekey
s	$cC`sU|j�}|j�}|jtjjjjjtjjjj	j
�}tj|�S(N(
R�t
public_keytpublic_bytesRZR[R\R�R�tDERtPublicFormattSubjectPublicKeyInfoR0tget_fingerprint_of_bytes(R(tprivate_keyR�tpublic_key_bytes((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR+sc	C`s�yit|jd��M}tjjjj|j�|jdkrEdnt
|j�d|j�SWdQXtSWnt
k
r}tSXdS(NR�R�(R�RRZR[R\R�R�R�RR$RR�R2RSR.(R(R�RT((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR:#s	$c	C`s�|j�}t|tjjjjj�rI|jdkoH|j	|j
kSt|tjjjjj�r�|jdko�|j	|j
kSt
r�t|tjjjjj�r�|jdkStr�t|tjjjjj�r�|jdkStrt|tjjjjj�r|jdkStrJt|tjjjjj�rJ|jdkSt|tjjjjj�r�|jdkr{tS|j|jkr�tS|j|jd|�StS(	NRDRER�R�R�R�R�Rj(R�RfRZR[R\R]R�t
RSAPrivateKeyRCRR�R�t
DSAPrivateKeyR
R�R�RR�R�R
R�R�RR�R�R^tEllipticCurvePrivateKeyR.RiRl(R(R%((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR;/s($
$
$
$
cC`sEtt|�j�}|j|d<|jdkrA|j|d<n|S(s'Serialize the object into a dictionary.RCR�Ri(R RYR?RCRi(R(R>((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyR?Gs

(RRRdR.RnR!R*R�R+R:R;R?(((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyRY�s		(	3				c!C`sWtdtdtdddddddg�d	tdd
dd�dtdddddd
ddddddg�dtdddddddddddddddd d!d"d#d$d%d&g�d'tdd(dt�d)tdd)d*t�d+tddd,t�d-tdd�d.tdd(dt�d/tdddd0d1d2gdd0��
d3td4td5d-d+ggd6dddggg�}tjj|jd)�p�d7}tjj|�s�|j	d8|d9d:|�n|jd/}|d0kr�t
o�ttt
�k}tottt�k}|jd-rb|jd+rb|jd-d0krb|rPd1}q�|r�d2}q�n|rqd2}n|r�d1}n|d0kr�|j	d9d;jt
t��q�nyv|d1kr
ts�|j	d9td<jt��d=t�n|jd>d?d@�t|�}nI|d2krVt
sG|j	d9tdAjt
��d=t�nt|�}n|jdkr�|jr�|j�}|jd'p�|j|�|dB<|j|�n|j|�nO|jr�|j�}tjj|jd)�|dB<|j|�n|j|�|j�}|j|�Wn,t j!k
rR}|j	d9t"|��nXdS(CNt
argument_specRRCtstrtdefaulttpresenttchoicestabsentRtintiRDRER�R�R�R�R�RiRoRqRsRuRwRyR{R}RR�R�R�R�R�R�R�R�R�R�RtboolRtrequiredRtno_logRRtselect_crypto_backendR�t	pyopensslRZtsupports_check_modetadd_file_common_argstrequired_togethertrequired_ift.RmRFs>The directory %s does not exist or the file is not a directorys]Can't detect any of the required Python libraries cryptography (>= {0}) or PyOpenSSL (>= {1})spyOpenSSL >= {0}t	exceptionsKThe module is using the PyOpenSSL backend. This backend has been deprecatedtversions2.13scryptography >= {0}R3(#RR�R.R2tosRtdirnameR"tisdirRItCRYPTOGRAPHY_FOUNDtCRYPTOGRAPHY_VERSIONRtMINIMAL_CRYPTOGRAPHY_VERSIONtPYOPENSSL_FOUNDtPYOPENSSL_VERSIONtMINIMAL_PYOPENSSL_VERSIONRaRtPYOPENSSL_IMP_ERRt	deprecateRBtCRYPTOGRAPHY_IMP_ERRRYRR#R?R-t	exit_jsonR8texistsR9R0tOpenSSLObjectErrorR(R)tbase_dirR�tcan_use_cryptographytcan_use_pyopensslR�R>RP((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pytmainPs�!'	
-			

	!	
t__main__(=t
__future__RRRRCt
__metaclass__tANSIBLE_METADATAt
DOCUMENTATIONtEXAMPLEStRETURNR@R�t	tracebacktdistutils.versionRR�R�R$R�tOpenSSLR	t__version__R�tImportErrort
format_excR.R�R2R�RZtcryptography.exceptionstcryptography.hazmat.backendst,cryptography.hazmat.primitives.serializationt-cryptography.hazmat.primitives.asymmetric.rsat-cryptography.hazmat.primitives.asymmetric.dsat,cryptography.hazmat.primitives.asymmetric.ect/cryptography.hazmat.primitives.asymmetric.utilsR�R�tansible.module_utils.cryptoR
RRR
Rtansible.module_utilsR0tansible.module_utils._textRRtansible.module_utils.basicRRR�Rt
OpenSSLObjectRRBRYR�R(((sM/usr/lib/python2.7/site-packages/ansible/modules/crypto/openssl_privatekey.pyt<module>s`


�)



(S@�	c

Anons79 File Manager Version 1.0, Coded By Anons79
Email: [email protected]