summaryrefslogtreecommitdiffstats
path: root/jwcrypto/jwe.py
diff options
context:
space:
mode:
authorSimo Sorce <simo@redhat.com>2015-03-18 14:12:09 -0400
committerSimo Sorce <simo@redhat.com>2015-03-18 14:12:09 -0400
commit3481090ea41b4a04552da580f44d229735f5dd7e (patch)
treee8456b1c881fa039ec7e8bdb32d2974e28400d4e /jwcrypto/jwe.py
parent33f36ea10c1db2aaa74818c60933a20a9abe672f (diff)
downloadjwcrypto-3481090ea41b4a04552da580f44d229735f5dd7e.tar.gz
jwcrypto-3481090ea41b4a04552da580f44d229735f5dd7e.tar.xz
jwcrypto-3481090ea41b4a04552da580f44d229735f5dd7e.zip
Change the way operation keys are retrieved
This way we have less confusion about what the function is supposed to do and less code duplication. Signed-off-by: Simo Sorce <simo@redhat.com>
Diffstat (limited to 'jwcrypto/jwe.py')
-rw-r--r--jwcrypto/jwe.py12
1 files changed, 6 insertions, 6 deletions
diff --git a/jwcrypto/jwe.py b/jwcrypto/jwe.py
index a44b7fe..8a9e4b6 100644
--- a/jwcrypto/jwe.py
+++ b/jwcrypto/jwe.py
@@ -106,13 +106,13 @@ class _rsa(_raw_key_mgmt):
self.check_key(key)
if not cek:
cek = os.urandom(keylen)
- rk = key.encrypt_key()
+ rk = key.get_op_key('encrypt')
ek = rk.encrypt(cek, self.padfn)
return (cek, ek)
def unwrap(self, key, ek):
self.check_key(key)
- rk = key.decrypt_key()
+ rk = key.get_op_key('decrypt')
cek = rk.decrypt(ek, self.padfn)
return cek
@@ -131,7 +131,7 @@ class _aes_kw(_raw_key_mgmt):
self.check_key(key)
if not cek:
cek = os.urandom(keylen)
- rk = base64url_decode(key.encrypt_key())
+ rk = base64url_decode(key.get_op_key('encrypt'))
# Implement RFC 3994 Key Unwrap - 2.2.2
# TODO: Use cryptography once issue #1733 is resolved
@@ -153,7 +153,7 @@ class _aes_kw(_raw_key_mgmt):
def unwrap(self, key, ek):
self.check_key(key)
- rk = base64url_decode(key.decrypt_key())
+ rk = base64url_decode(key.get_op_key('decrypt'))
# Implement RFC 3994 Key Unwrap - 2.2.3
# TODO: Use cryptography once issue #1733 is resolved
@@ -189,7 +189,7 @@ class _direct(_raw_key_mgmt):
self.check_key(key)
if cek:
return (cek, None)
- k = base64url_decode(key.encrypt_key())
+ k = base64url_decode(key.get_op_key('encrypt'))
if len(k) != keylen:
raise InvalidCEKeyLength(keylen, len(k))
return (k, '')
@@ -198,7 +198,7 @@ class _direct(_raw_key_mgmt):
self.check_key(key)
if ek != '':
raise InvalidJWEData('Invalid Encryption Key.')
- return base64url_decode(key.decrypt_key())
+ return base64url_decode(key.get_op_key('decrypt'))
class _raw_jwe(object):