Skip to content

Commit 20155a3

Browse files
committed
Maybe I can get isort and black to agree.
1 parent 70e2ed8 commit 20155a3

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+148
-447
lines changed

.isort.cfg

Lines changed: 0 additions & 4 deletions
This file was deleted.

.travis.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ install:
1717
script:
1818
- codecov --version
1919
- tox
20-
- isort -sl --check src tests
21-
- black --check src tests
20+
- isort --check src tests
21+
- black -l 100 --check src tests
2222
after_success:
2323
- codecov
2424
notifications:

setup.cfg

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
[isort]
2-
multi_line_output = 3
2+
force_single_line = 1
3+
known_first_party = cryptojwt
34
include_trailing_comma = True
45
force_grid_wrap = 0
56
use_parentheses = True
6-
line_length = 88
7+
line_length = 100

src/cryptojwt/jwe/__init__.py

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,7 @@
2222
"ECDH-ES+A192KW",
2323
"ECDH-ES+A256KW",
2424
],
25-
"enc": [
26-
"A128CBC-HS256",
27-
"A192CBC-HS384",
28-
"A256CBC-HS512",
29-
"A128GCM",
30-
"A192GCM",
31-
"A256GCM",
32-
],
25+
"enc": ["A128CBC-HS256", "A192CBC-HS384", "A256CBC-HS512", "A128GCM", "A192GCM", "A256GCM",],
3326
}
3427

3528

src/cryptojwt/jwe/aes.py

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,7 @@ def encrypt(self, msg, iv="", auth_data=b""):
5555

5656
hash_key, enc_key, key_len, hash_func = get_keys_seclen_dgst(self.key, iv)
5757

58-
cipher = Cipher(
59-
algorithms.AES(enc_key), modes.CBC(iv), backend=default_backend()
60-
)
58+
cipher = Cipher(algorithms.AES(enc_key), modes.CBC(iv), backend=default_backend())
6159
encryptor = cipher.encryptor()
6260

6361
pmsg = self.padder.update(msg)
@@ -80,9 +78,7 @@ def decrypt(self, msg, iv="", auth_data=b"", tag=b"", key=None):
8078
if comp_tag != tag:
8179
raise VerificationError("AES-CBC HMAC")
8280

83-
cipher = Cipher(
84-
algorithms.AES(enc_key), modes.CBC(iv), backend=default_backend()
85-
)
81+
cipher = Cipher(algorithms.AES(enc_key), modes.CBC(iv), backend=default_backend())
8682
decryptor = cipher.decryptor()
8783

8884
ctext = decryptor.update(msg)

src/cryptojwt/jwe/jwe_ec.py

Lines changed: 5 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -87,9 +87,7 @@ def enc_setup(self, msg, key=None, auth_data=b"", **kwargs):
8787
try:
8888
_epk = kwargs["epk"]
8989
except KeyError:
90-
_epk = ec.generate_private_key(
91-
NIST2SEC[as_unicode(key.crv)], default_backend()
92-
)
90+
_epk = ec.generate_private_key(NIST2SEC[as_unicode(key.crv)], default_backend())
9391
epk = ECKey().load_key(_epk.public_key())
9492
else:
9593
if isinstance(_epk, ec.EllipticCurvePrivateKey):
@@ -116,15 +114,11 @@ def enc_setup(self, msg, key=None, auth_data=b"", **kwargs):
116114
except KeyError:
117115
raise ValueError("Unknown key length for algorithm %s" % self.enc)
118116

119-
cek = ecdh_derive_key(
120-
_epk, key.pub_key, apu, apv, str(self.enc).encode(), dk_len
121-
)
117+
cek = ecdh_derive_key(_epk, key.pub_key, apu, apv, str(self.enc).encode(), dk_len)
122118
elif self.alg in ["ECDH-ES+A128KW", "ECDH-ES+A192KW", "ECDH-ES+A256KW"]:
123119
_pre, _post = self.alg.split("+")
124120
klen = int(_post[1:4])
125-
kek = ecdh_derive_key(
126-
_epk, key.pub_key, apu, apv, str(_post).encode(), klen
127-
)
121+
kek = ecdh_derive_key(_epk, key.pub_key, apu, apv, str(_post).encode(), klen)
128122
cek = self._generate_key(self.enc, cek=cek)
129123
encrypted_key = aes_key_wrap(kek, cek, default_backend())
130124
else:
@@ -163,12 +157,7 @@ def dec_setup(self, token, key=None, **kwargs):
163157
raise Exception("Unknown key length for algorithm")
164158

165159
self.cek = ecdh_derive_key(
166-
key,
167-
epubkey.pub_key,
168-
apu,
169-
apv,
170-
str(self.headers["enc"]).encode(),
171-
dk_len,
160+
key, epubkey.pub_key, apu, apv, str(self.headers["enc"]).encode(), dk_len,
172161
)
173162
elif self.headers["alg"] in [
174163
"ECDH-ES+A128KW",
@@ -177,9 +166,7 @@ def dec_setup(self, token, key=None, **kwargs):
177166
]:
178167
_pre, _post = self.headers["alg"].split("+")
179168
klen = int(_post[1:4])
180-
kek = ecdh_derive_key(
181-
key, epubkey.pub_key, apu, apv, str(_post).encode(), klen
182-
)
169+
kek = ecdh_derive_key(key, epubkey.pub_key, apu, apv, str(_post).encode(), klen)
183170
self.cek = aes_key_unwrap(kek, token.encrypted_key(), default_backend())
184171
else:
185172
raise Exception("Unsupported algorithm %s" % self.headers["alg"])

src/cryptojwt/jwe/jwe_hmac.py

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,9 +61,7 @@ def encrypt(self, key, iv="", cek="", **kwargs):
6161

6262
_enc = self["enc"]
6363
_auth_data = jwe.b64_encode_header()
64-
ctxt, tag, cek = self.enc_setup(
65-
_enc, _msg, auth_data=_auth_data, key=cek, iv=iv
66-
)
64+
ctxt, tag, cek = self.enc_setup(_enc, _msg, auth_data=_auth_data, key=cek, iv=iv)
6765
return jwe.pack(parts=[jek, iv, ctxt, tag])
6866

6967
def decrypt(self, token, key=None, cek=None):

src/cryptojwt/jwe/jwe_rsa.py

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,9 +81,7 @@ def encrypt(self, key, iv="", cek="", **kwargs):
8181
except KeyError:
8282
_auth_data = jwe.b64_encode_header()
8383

84-
ctxt, tag, key = self.enc_setup(
85-
_enc, _msg, key=cek, iv=iv, auth_data=_auth_data
86-
)
84+
ctxt, tag, key = self.enc_setup(_enc, _msg, key=cek, iv=iv, auth_data=_auth_data)
8785
return jwe.pack(parts=[jwe_enc_key, iv, ctxt, tag])
8886

8987
def decrypt(self, token, key, cek=None):

src/cryptojwt/jwe/jwenc.py

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,9 +48,7 @@ def is_jwe(self):
4848
if "alg" in self.headers and "enc" in self.headers:
4949
for typ in ["alg", "enc"]:
5050
if self.headers[typ] not in SUPPORTED[typ]:
51-
logger.debug(
52-
"Not supported %s algorithm: %s" % (typ, self.headers[typ])
53-
)
51+
logger.debug("Not supported %s algorithm: %s" % (typ, self.headers[typ]))
5452
return False
5553
else:
5654
return False

src/cryptojwt/jwe/rsa.py

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,7 @@ def encrypt(self, msg, key, sign_padding="pkcs1_padding"):
2020
return key.encrypt(
2121
msg,
2222
_padding(
23-
mgf=padding.MGF1(algorithm=_chosen_hash()),
24-
algorithm=_chosen_hash(),
25-
label=None,
23+
mgf=padding.MGF1(algorithm=_chosen_hash()), algorithm=_chosen_hash(), label=None,
2624
),
2725
)
2826

0 commit comments

Comments
 (0)