Files
ServerSync/lib/paramiko/__pycache__/agent.cpython-314.pyc

191 lines
22 KiB
Plaintext
Raw Normal View History

2026-02-12 02:28:23 +02:00
+
u<10>i><00><00><00>Rt^RIt^RIt^RIt^RIt^RIt^RIt^RIt^RIt^RI H
t
^RI H t ^RI H t Ht^RIHtHt^RIHt^RIHtHt^RIHtHt]!^ 4t^ t]!^ 4t^t^t^tR ]R
]/t ]!!] PE44Fwt#t$]$] ]# R 2&K !R R 4t%!RR]PL4t'!RR]'4t(!RR]'4t)Rt*!RR4t+!RR]%4t,!RR4t-!RR]%4t.!RR]4t/R#)z
SSH Agent interface
N)<01>DEBUG)<01>select)<02>io_sleep<65>byte_chr)<02> SSHException<6F>AuthenticationException)<01>Message)<02>PKey<65>UnknownKeyType)<02>asbytes<65>
get_loggerz rsa-sha2-256z rsa-sha2-512z-cert-v01@openssh.comc<00>Da<00>]tRt^=toRtRtRtRtRtRt Rt
Vt R#) <09>AgentSSHc<08>"<00>RVnRVnR#<00>N<><00><02>_conn<6E>_keys<79><01>selfs&<26>5/tmp/pip-target-zhdecbcm/lib/python/paramiko/agent.py<70>__init__<5F>AgentSSH.__init__>s<00><00><19><04>
<EFBFBD><17><04>
<EFBFBD>c <0C><00>VP#)a_
Return the list of keys available through the SSH agent, if any. If
no SSH agent was running (or it couldn't be contacted), an empty list
will be returned.
This method performs no IO, just returns the list of keys retrieved
when the connection was made.
:return:
a tuple of `.AgentKey` objects representing keys available on the
SSH agent
)rrs&r<00>get_keys<79>AgentSSH.get_keysBs<00><00><14>z<EFBFBD>z<EFBFBD>rc <08>B<00>WnVP\4wr#V\8wd \ R4h.p\ VP 44F<pVP\VVP4VP4R74K> \V4Vn R#)z!could not get keys from ssh-agent)<03>agent<6E>blob<6F>commentN) r<00> _send_message<67>cSSH2_AGENTC_REQUEST_IDENTITIES<45>SSH2_AGENT_IDENTITIES_ANSWERr<00>range<67>get_int<6E>append<6E>AgentKey<65>
get_binary<EFBFBD>get_text<78>tupler)r<00>conn<6E>ptype<70>result<6C>keys<79>is&& r<00>_connect<63>AgentSSH._connectQs<><00><00><19>
<EFBFBD><1C>*<2A>*<2A>+J<>K<> <0A><05> <10>0<> 0<><1E>B<>C<> C<><11><04><16>v<EFBFBD>~<7E>~<7E>'<27>(<28>A<EFBFBD> <10>K<EFBFBD>K<EFBFBD><18><1E><1F>*<2A>*<2A>,<2C>"<22>O<EFBFBD>O<EFBFBD>-<2D><12> <0E>)<29><1B>4<EFBFBD>[<5B><04>
rc<08>r<00>VPeVPP4RVnRVnR#r)r<00>closerrs&r<00>_close<73>AgentSSH._closeas*<00><00> <0F>:<3A>:<3A> !<21> <10>J<EFBFBD>J<EFBFBD> <1C> <1C> <1E><19><04>
<EFBFBD><17><04>
rc<08>\<00>\V4pVPP\P!R\ V44V,4VP ^4p\VP \P!RV4^,44p\VP44V3#)z>I) r r<00>send<6E>struct<63>pack<63>len<65> _read_allr<00>unpack<63>ord<72>get_byte)r<00>msg<73>datas&& rr"<00>AgentSSH._send_messagegsv<00><00><15>c<EFBFBD>l<EFBFBD><03> <0C>
<EFBFBD>
<EFBFBD><0F><0F><06> <0B> <0B>D<EFBFBD>#<23>c<EFBFBD>(<28>3<>c<EFBFBD>9<>:<3A><13>~<7E>~<7E>a<EFBFBD> <20><04><15>d<EFBFBD>n<EFBFBD>n<EFBFBD>V<EFBFBD>]<5D>]<5D>4<EFBFBD><14>%><3E>q<EFBFBD>%A<>B<>C<><03><12>3<EFBFBD><<3C><<3C>><3E>"<22>C<EFBFBD>'<27>'rc<08>2<00>VPPV4p\V4V8dl\V4^8Xd \R4hVPPV\V4,
4p\V4^8Xd \R4hW#, pK{V#)<02><00>lost ssh-agent)r<00>recvr;r)r<00>wantedr.<00>extras&& rr<<00>AgentSSH._read_allnsv<00><00><15><1A><1A><1F><1F><16>(<28><06><11>&<26>k<EFBFBD>F<EFBFBD>"<22><12>6<EFBFBD>{<7B>a<EFBFBD><1F>"<22>#3<>4<>4<><18>J<EFBFBD>J<EFBFBD>O<EFBFBD>O<EFBFBD>F<EFBFBD>S<EFBFBD><16>[<5B>$8<>9<>E<EFBFBD><12>5<EFBFBD>z<EFBFBD>Q<EFBFBD><EFBFBD>"<22>#3<>4<>4<> <12>O<EFBFBD>F<EFBFBD><15> rrN) <0C>__name__<5F>
__module__<EFBFBD> __qualname__<5F>__firstlineno__rrr1r5r"r<<00>__static_attributes__<5F>__classdictcell__<5F><01> __classdict__s@rrr=s(<00><><00><00><18> <1A>!<21> <18> (<28> <16> rrc<00><a<00>]tRt^ztoRtRtRtRtRtRt Vt
R#)<08>AgentProxyThreadz8
Class in charge of communication between two channels.
c<08>t<00>\PPWPR7WnRVnR#))<01>targetFN)<06> threading<6E>Threadr<00>run<75>_agent<6E>_exit<69>rrs&&rr<00>AgentProxyThread.__init__s)<00><00><11><18><18>!<21>!<21>$<24>x<EFBFBD>x<EFBFBD>!<21>8<><1B> <0B><1A><04>
rc<08>v<00>VP4wrWnW nVPP 4\ VP\ 4'gJVPPe'\VPPR4'g \R4hVP4R# h;i)N<>filenozUnable to connect to SSH agent) <0B>get_connection<6F>_AgentProxyThread__inr<6E>_AgentProxyThread__addrrY<00>connect<63>
isinstance<EFBFBD>intr<00>hasattrr<00> _communicate)r<00>r<>addrs& rrX<00>AgentProxyThread.run<75>s<><00><00> <12><1C>+<2B>+<2B>-<2D>I<EFBFBD>Q<EFBFBD><1B>J<EFBFBD><1E>K<EFBFBD> <10>K<EFBFBD>K<EFBFBD> <1F> <1F> !<21><1D>d<EFBFBD>k<EFBFBD>k<EFBFBD>3<EFBFBD>/<2F>/<2F><14> <0B> <0B>!<21>!<21>)<29><1E>t<EFBFBD>{<7B>{<7B>0<>0<>(<28>;<3B>;<3B>-<2D>.N<>O<>O<> <10> <1D> <1D> <1F><> <12> <11>s <00>B1B5<00>5B8c<08><><00>^RIpVPVPVP4pVPVPVPV\P
,4VP 'EgP\VPPVP...R4pV^,F<>pVPPV8XdeVPPPR4p\V4^8wdVPPV4KpVP4MyVPV8XgK<>VPPR4p\V4^8wd(VPPPV4K<>VP4M \P!\ 4EKbR#)rDNg<00>?i)<11>fcntlr`<00>F_GETFL<46>F_SETFL<46>os<6F>
O_NONBLOCKrZrrYrrFr;r8r5<00>time<6D>sleepr)rrk<00>oldflags<67>events<74>fdrAs& rrf<00>AgentProxyThread._communicate<74>s-<00><00><14><18>;<3B>;<3B>t<EFBFBD>z<EFBFBD>z<EFBFBD>5<EFBFBD>=<3D>=<3D>9<><08> <0A> <0B> <0B>D<EFBFBD>J<EFBFBD>J<EFBFBD><05> <0A> <0A>x<EFBFBD>"<22>-<2D>-<2D>/G<>H<><16>*<2A>*<2A>*<2A><1B>T<EFBFBD>[<5B>[<5B>.<2E>.<2E><04>
<EFBFBD>
<EFBFBD>;<3B>R<EFBFBD><12>S<EFBFBD>I<>F<EFBFBD><1C>Q<EFBFBD>i<EFBFBD>i<EFBFBD><02><17>;<3B>;<3B>$<24>$<24><02>*<2A><1F>;<3B>;<3B>,<2C>,<2C>1<>1<>#<23>6<>D<EFBFBD><1A>4<EFBFBD>y<EFBFBD>A<EFBFBD>~<7E><1C>
<EFBFBD>
<EFBFBD><0F><0F><04>-<2D><1C> <0B> <0B> <0A><1D><19>Z<EFBFBD>Z<EFBFBD>2<EFBFBD>%<25><1F>:<3A>:<3A>?<3F>?<3F>3<EFBFBD>/<2F>D<EFBFBD><1A>4<EFBFBD>y<EFBFBD>A<EFBFBD>~<7E><1C> <0B> <0B>)<29>)<29>.<2E>.<2E>t<EFBFBD>4<><1C> <0B> <0B> <0A><1D> <20> <11>J<EFBFBD>J<EFBFBD>x<EFBFBD> <20>#rc<08><><00>RVnVPP4VPPP4R#)TN)rZr`r4rYrrs&rr5<00>AgentProxyThread._close<73>s/<00><00><19><04>
<EFBFBD> <0C>
<EFBFBD>
<EFBFBD><18><18><1A> <0C> <0B> <0B><19><19><1F><1F>!r)<04>__addr<64>__inrrYrZN) rJrKrLrM<00>__doc__rrXrfr5rNrOrPs@rrSrSzs#<00><><00><00><08><1B>
<12>&!<21>0"<22>"rrSc<00>0a<00>]tRt^<5E>toRtRtRtRtVtR#)<06>AgentLocalProxyz|
Class to be used when wanting to ask a local SSH Agent being
asked from a remote fake agent (so use a unix socket for ex.)
c<08>0<00>\PW4R#<00>N)rSrr[s&&rr<00>AgentLocalProxy.__init__<5F>s<00><00><18>!<21>!<21>$<24>.rc <0C><00>\P!\P\P4pVPVPP 44VP ^4VP4wr#W#3# h;i)z@
Return a pair of socket object and string address.
May block!
)<08>socket<65>AF_UNIX<49> SOCK_STREAM<41>bindrY<00> _get_filename<6D>listen<65>accept)rr,rgrhs& rr_<00>AgentLocalProxy.get_connection<6F>se<00><00> <16>}<7D>}<7D>V<EFBFBD>^<5E>^<5E>V<EFBFBD>-?<3F>-?<3F>@<40><04> <12> <10>I<EFBFBD>I<EFBFBD>d<EFBFBD>k<EFBFBD>k<EFBFBD>/<2F>/<2F>1<> 2<> <10>K<EFBFBD>K<EFBFBD><01>N<EFBFBD><1C> <0B> <0B> <0A>I<EFBFBD>Q<EFBFBD><14>7<EFBFBD>N<EFBFBD><4E> <12> <11>s <00>AB<00>BrN<> rJrKrLrMrzrr_rNrOrPs@rr|r|<00>s<00><><00><00><08>
/<2F> <12> rr|c<00>0a<00>]tRt^<5E>toRtRtRtRtVtR#)<06>AgentRemoteProxyz9
Class to be used when wanting to ask a remote SSH Agent
c<08><<00>\PW4W nR#r~)rSr<00>_AgentRemoteProxy__chan)rr<00>chans&&&rr<00>AgentRemoteProxy.__init__<5F>s<00><00><18>!<21>!<21>$<24>.<2E><1A> rc<08><00>VPR3#r~)r<>rs&rr_<00>AgentRemoteProxy.get_connection<6F>s<00><00><13>{<7B>{<7B>D<EFBFBD> <20> r)<01>__chanNr<4E>rPs@rr<>r<><00>s<00><><00><00><08><1B>!<21>!rr<>c<04><00>R\P9dr\PR8wd]\P!\P
\P 4pVP\PR,4V#\PR8Xd[^RIH pH
pRpVP4'dVP4pV#VP4'dVP4pV#R# R#;i)z^
Returns some SSH agent object, or None if none were found/supported.
.. versionadded:: 2.10
<EFBFBD> SSH_AUTH_SOCK<43>win32N)<02> win_pageant<6E> win_openssh)rn<00>environ<6F>sys<79>platformr<6D>r<>r<>rb<00>r<>r<><00>can_talk_to_agent<6E>PageantConnection<6F>OpenSSHAgentConnection)r,r<>r<>s r<00>get_agent_connectionr<6E><00>s<><00><00> <18>2<EFBFBD>:<3A>:<3A>%<25>C<EFBFBD>L<EFBFBD>L<EFBFBD>G<EFBFBD>,C<><15>}<7D>}<7D>V<EFBFBD>^<5E>^<5E>V<EFBFBD>-?<3F>-?<3F>@<40><04> <13> <10>L<EFBFBD>L<EFBFBD><12><1A><1A>O<EFBFBD>4<> 5<><17>K<EFBFBD>
<0A><1C><1C><17> <20>.<2E><13><04> <16> (<28> (<28> *<2A> *<2A><1E>0<>0<>2<>D<EFBFBD><14> <0B><19> *<2A> *<2A> ,<2C> ,<2C><1E>5<>5<>7<>D<EFBFBD><13> <0B> <0F><> <13> <12>s <00>'C8<00>8C=c<00><a<00>]tRt^<5E>toRtRtRtRtRtRt Vt
R#)<08>AgentClientProxyat
Class proxying request as a client:
#. client ask for a request_forward_agent()
#. server creates a proxy and a fake SSH Agent
#. server ask for establishing a connection when needed,
calling the forward_agent_handler at client side.
#. the forward_agent_handler launch a thread for connecting
the remote fake agent and the local agent
#. Communication occurs ...
c<08>t<00>RVnWn\W4VnVPP 4R#r~)r<00>_AgentClientProxy__chanRr<52><00>thread<61>start<72>r<00>
chanRemotes&&rr<00>AgentClientProxy.__init__s*<00><00><19><04>
<EFBFBD>!<21> <0C>&<26>t<EFBFBD>8<><04> <0B> <0C> <0B> <0B><19><19>rc<08>&<00>VP4R#r~<00>r4rs&r<00>__del__<5F>AgentClientProxy.__del__
<00> <00><00> <0C>
<EFBFBD>
<EFBFBD> rc <0C>:<00>\4pV'gR#WnR#)z:
Method automatically called by ``AgentProxyThread.run``.
N)r<>r<00>rr,s& rrb<00>AgentClientProxy.connect s<00><00>$<24>%<25><04><13> <12><19>
rc <0C><><00>\VR4'd-RVPnVPPR4VPeVPP 4R#R#)zP
Close the current connection and terminate the agent
Should be called manually
r<EFBFBD>T<><54>N)rer<>rZ<00>joinrr4rs&rr4<00>AgentClientProxy.closesN<00><00>
<13>4<EFBFBD><18> "<22> "<22> $<24>D<EFBFBD>K<EFBFBD>K<EFBFBD> <1D> <10>K<EFBFBD>K<EFBFBD> <1C> <1C>T<EFBFBD> "<22> <0F>:<3A>:<3A> !<21> <10>J<EFBFBD>J<EFBFBD> <1C> <1C> <1E> "r)<03>__chanRrr<>N) rJrKrLrMrzrr<>rbr4rNrOrPs@rr<>r<><00>s#<00><><00><00>
<08><1C> <15><1A> <1F> rr<>c<00>Ha<00>]tRtRtoRtRtRtRtRtRt Rt
R t Vt R
#) <0B>AgentServerProxyi"ap
Allows an SSH server to access a forwarded agent.
This also creates a unix domain socket on the system to allow external
programs to also access the agent. For this reason, you probably only want
to create one of these.
:meth:`connect` must be called before it is usable. This will also load the
list of keys the agent contains. You must also call :meth:`close` in
order to clean up the unix socket and the thread that maintains it.
(:class:`contextlib.closing` might be helpful to you.)
:param .Transport t: Transport used for SSH Agent communication forwarding
:raises: `.SSHException` -- mostly if we lost the agent
c<08>T<00>\PV4Wn\P!R4Vn\ P!VP
\P4VP
R,Vn
\V4Vn VPP4R#)<03>sshproxyz /sshproxy.sshN)rr<00>_AgentServerProxy__t<5F>tempfile<6C>mkdtemp<6D>_dirrn<00>chmod<6F>stat<61>S_IRWXU<58>_filer|r<>r<>)r<00>ts&&rr<00>AgentServerProxy.__init__4si<00><00><10><19><19>$<24><1F><14><08><1C>$<24>$<24>Z<EFBFBD>0<><04> <09>
<EFBFBD><08><08><14><19><19>D<EFBFBD>L<EFBFBD>L<EFBFBD>)<29><19>Y<EFBFBD>Y<EFBFBD><1F>0<><04>
<EFBFBD>%<25>d<EFBFBD>+<2B><04> <0B> <0C> <0B> <0B><19><19>rc<08>&<00>VP4R#r~r<>rs&rr<><00>AgentServerProxy.__del__=r<>rc<08><><00>VPP4pVf \R4hVPR4VP V4R#)NrEz
auth-agent)r<><00>open_forward_agent_channelr<00>set_namer1)r<00> conn_socks& rrb<00>AgentServerProxy.connect@s@<00><00><18>H<EFBFBD>H<EFBFBD>7<>7<>9<> <09> <14> <1C><1E>/<2F>0<> 0<><11><1A><1A><<3C>(<28> <0C> <0A> <0A>i<EFBFBD> rc <0C><><00>\P!VP4\P!VP4RVP
nVP
PR4VP4R#)zS
Terminate the agent, clean the files, close connections
Should be called manually
Tr<EFBFBD>N) rn<00>remover<65><00>rmdirr<72>r<>rZr<>r5rs&rr4<00>AgentServerProxy.closeGsK<00><00>
<0B> <09> <09>$<24>*<2A>*<2A><1D>
<EFBFBD><08><08><14><19><19><1B> <20><04> <0B> <0B><19> <0C> <0B> <0B><18><18><14><1E> <0C> <0B> <0B> rc <0C>&<00>RVP4/#)zs
Helper for the environment under unix
:return:
a dict containing the ``SSH_AUTH_SOCK`` environment variables
r<EFBFBD>)r<>rs&r<00>get_env<6E>AgentServerProxy.get_envRs<00><00> <20><14>!3<>!3<>!5<>6<>6rc<08><00>VP#r~)r<>rs&rr<><00>AgentServerProxy._get_filename[s <00><00><13>z<EFBFBD>z<EFBFBD>r)<04>__tr<74>r<>r<>N) rJrKrLrMrzrr<>rbr4r<>r<>rNrOrPs@rr<>r<>"s-<00><><00><00><08>"<1C><15>!<21> <16>7<><1A>rr<>c<00><a<00>]tRtRtoRtRtRtRtRtRt Vt
R#) <09>AgentRequestHandleri_ae
Primary/default implementation of SSH agent forwarding functionality.
Simply instantiate this class, handing it a live command-executing session
object, and it will handle forwarding any local SSH agent processes it
finds.
For example::
# Connect
client = SSHClient()
client.connect(host, port, username)
# Obtain session
session = client.get_transport().open_session()
# Forward local agent
AgentRequestHandler(session)
# Commands executed after this point will see the forwarded agent on
# the remote end.
session.exec_command("git clone https://my.git.repository/")
c<08>d<00>RVnWnVPVP4.VnR#r~)r<00>_AgentRequestHandler__chanC<6E>request_forward_agent<6E>_forward_agent_handler<65>"_AgentRequestHandler__clientProxys)r<00>
chanClients&&rr<00>AgentRequestHandler.__init__us*<00><00><19><04>
<EFBFBD>!<21> <0C><12>(<28>(<28><14>)D<>)D<>E<> <20><04>rc<08>N<00>VPP\V44R#r~)r<>r'r<>r<>s&&rr<><00>*AgentRequestHandler._forward_agent_handler{s<00><00> <0C><1B><1B>"<22>"<22>#3<>J<EFBFBD>#?<3F>@rc<08>&<00>VP4R#r~r<>rs&rr<><00>AgentRequestHandler.__del__~r<>rc<08>L<00>VPFpVP4K R#r~)r<>r4)r<00>ps& rr4<00>AgentRequestHandler.close<73>s<00><00><15>$<24>$<24>A<EFBFBD> <0A>G<EFBFBD>G<EFBFBD>I<EFBFBD>%r)<03>__chanC<6E>__clientProxysrN) rJrKrLrMrzrr<>r<>r4rNrOrPs@rr<>r<>_s$<00><><00><00><08>*!<21> A<01><15><16>rr<>c<00>0a<00>]tRtRtoRtRtRtRtVtR#)<07>Agenti<74>a<>
Client interface for using private keys from an SSH agent running on the
local machine. If an SSH agent is running, this class can be used to
connect to it and retrieve `.PKey` objects which can be used when
attempting to authenticate to remote SSH servers.
Upon initialization, a session with the local machine's SSH agent is
opened, if one is running. If no agent is running, initialization will
succeed, but `get_keys` will return an empty tuple.
:raises: `.SSHException` --
if an SSH agent is found, but speaks an incompatible protocol
.. versionchanged:: 2.10
Added support for native openssh agent on windows (extending previous
putty pageant support)
c<08>z<00>\PV4\4pV'gR#VPV4R#r~)rrr<>r1r<>s& rr<00>Agent.__init__<5F>s*<00><00><10><19><19>$<24><1F>#<23>%<25><04><13> <12> <0C> <0A> <0A>d<EFBFBD>rc <0C>&<00>VP4R#)z!
Close the SSH agent connection.
N)r5rs&rr4<00> Agent.close<73>s <00><00> <0A> <0B> <0B> rrN) rJrKrLrMrzrr4rNrOrPs@rr<>r<><00>s<00><><00><00><08>$<1C><16>rr<>c<00>raa<01>]tRtRtoRtR RltRtRtRtV3Rlt Rt
] R 4t R R
lt R tVtV;t#)r(i<>a<>
Private key held in a local SSH agent. This type of key can be used for
authenticating to a remote server (signing). Most other key operations
work as expected.
.. versionchanged:: 3.2
Added the ``comment`` kwarg and attribute.
.. versionchanged:: 3.2
Added the ``.inner_key`` attribute holding a reference to the 'real'
key instance this key is a proxy for, if one was obtainable, else None.
c<08>v<00>WnW nW0n\V4pVP 4Vn\ \4VnRVn \P!VP
VR7Vn R# \d6RpTP\TPTP
44R#i;i)N)<02>key_type<70> key_bytesz5Unable to derive inner_key for agent key of type {!r})rr r!rr*<00>namer <00>__file__<5F>_logger<65> inner_keyr <00>from_type_stringr
<00>logr<00>format)rrr r!r@<00>errs&&&& rr<00>AgentKey.__init__<5F>s<><00><00><1A>
<EFBFBD><18> <09><1E> <0C><15>d<EFBFBD>m<EFBFBD><03><17>L<EFBFBD>L<EFBFBD>N<EFBFBD><04> <09>!<21>(<28>+<2B><04> <0C><1D><04><0E> 3<>!<21>2<>2<><1D><19><19>d<EFBFBD><0E>D<EFBFBD>N<EFBFBD><4E><1E> 3<>I<>C<EFBFBD> <10>H<EFBFBD>H<EFBFBD>U<EFBFBD>C<EFBFBD>J<EFBFBD>J<EFBFBD>t<EFBFBD>y<EFBFBD>y<EFBFBD>1<> 2<> 3<>s<00>'A8<00>8<B8<03>7B8c<08>:<00>VPP!V/VB#r~)r<>r<>)r<00>args<67>kwargss&*,rr<><00> AgentKey.log<6F>s<00><00><13>|<7C>|<7C><1F><1F><14>0<><16>0<>0rc<08>r<00>VP'dVPP4#VP#r~)r<>r r rs&rr <00>AgentKey.asbytes<65>s&<00><00>+/<2F>><3E>><3E>><3E>t<EFBFBD>~<7E>~<7E>%<25>%<25>'<27>H<>t<EFBFBD>y<EFBFBD>y<EFBFBD>Hrc<08><00>VP#r~)r<>rs&r<00>get_name<6D>AgentKey.get_name<6D>s <00><00><13>y<EFBFBD>y<EFBFBD>rc<08>p<<01>VPeVPP4#\SV`4#r~)r<><00>get_bits<74>super)r<00> __class__s&<26>rr<00>AgentKey.get_bits<74>s.<00><><00> <0F>><3E>><3E> %<25><17>><3E>><3E>*<2A>*<2A>,<2C> ,<2C><14>w<EFBFBD><1F>!<21>!rc <0C>`<00>VPf \V4h\VPV4#)z?
Proxy any un-implemented methods/properties to the inner_key.
)r<><00>AttributeError<6F>getattr)rr<>s&&r<00> __getattr__<5F>AgentKey.__getattr__<5F>s*<00><00> <10>><3E>><3E> !<21> <20><14>&<26> &<26><16>t<EFBFBD>~<7E>~<7E>t<EFBFBD>,<2C>,rc<08><><00>VP4VP.pVP'dVPP#T#r~)rr r<><00>_fields)r<00>fallbacks& rr<00>AgentKey._fields<64>s3<00><00><18>M<EFBFBD>M<EFBFBD>O<EFBFBD>T<EFBFBD>Y<EFBFBD>Y<EFBFBD>/<2F><08>)-<2D><1E><1E><1E>t<EFBFBD>~<7E>~<7E>%<25>%<25>E<>X<EFBFBD>Erc<08>p<00>\4pVP\4VPVP 44VPV4VP \ PV^44VPPV4wrEV\8wd \R4hVP4#)rDzkey cannot be used for signing) r<00>add_byte<74>cSSH2_AGENTC_SIGN_REQUEST<53>
add_stringr <00>add_int<6E>ALGORITHM_FLAG_MAP<41>getrr"<00>SSH2_AGENT_SIGN_RESPONSErr))rrA<00> algorithmr@r-r.s&&& r<00> sign_ssh_data<74>AgentKey.sign_ssh_data<74>s<><00><00><15>i<EFBFBD><03> <0B> <0C> <0C>.<2E>/<2F>
<0C><0E><0E>t<EFBFBD>|<7C>|<7C>~<7E>&<26> <0B><0E><0E>t<EFBFBD><1C> <0B> <0B> <0B>&<26>*<2A>*<2A>9<EFBFBD>a<EFBFBD>8<>9<><1C>
<EFBFBD>
<EFBFBD>0<>0<><13>5<> <0A><05> <10>,<2C> ,<2C><1E>?<3F>@<40> @<40><15> <20> <20>"<22>"r)r<>rr r!r<>r<>)r<>r~)rJrKrLrMrzrr<>r rrr <00>propertyrrrNrO<00> __classcell__)rrQs@@rr(r(<00>sI<00><><00><00> <08>3<>"1<>I<01><19>"<22> -<2D><0E>F<01><0E>F<01> #<23> #rr()0rzrnr<>r9r<>rVrpr<>r<><00>loggingrr<00>paramiko.commonrr<00>paramiko.ssh_exceptionrr<00>paramiko.messager<00> paramiko.pkeyr r
<00> paramiko.utilr r r#r$rr<00>SSH_AGENT_RSA_SHA2_256<35>SSH_AGENT_RSA_SHA2_512r<00>list<73>items<6D>key<65>valuerrWrSr|r<>r<>r<>r<>r<>r<>r(rrr<00><module>r*s(<00><01>&<04>
<EFBFBD> <0A> <0A>
<EFBFBD><10> <0B><0F> <0B><19><19>.<2E>H<>$<24>.<2E>-<2D>"*<2A>2<EFBFBD>,<2C><1F>!<21><1C>$<24>R<EFBFBD>L<EFBFBD><19><1D><18><1A><16><1A><16><13>*<2A><12>*<2A><02><12><17>)<29>/<2F>/<2F>1<>2<>J<EFBFBD>C<EFBFBD><15>8=<3D><16>#<23><15>3<>4<>5<>3<>
:<16>:<16>z8"<22>y<EFBFBD>'<27>'<27>8"<22>v<12>&<26><12>2
!<21>'<27>
!<21><0F>8(<1F>(<1F>V:<1A>x<EFBFBD>:<1A>z$<16>$<16>N<16>H<EFBFBD><16>DI#<23>t<EFBFBD>I#r