Skip to content

Commit b58c5a0

Browse files
more fix
1 parent 7cd8874 commit b58c5a0

File tree

3 files changed

+7
-16
lines changed

3 files changed

+7
-16
lines changed

src/aws_encryption_sdk/internal/utils/__init__.py

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,6 @@ def prepare_data_keys(primary_master_key, master_keys, algorithm, encryption_con
115115
encrypted_data_encryption_key = None
116116
data_encryption_key = primary_master_key.generate_data_key(algorithm, encryption_context)
117117
_LOGGER.debug("encryption data generated with master key: %s", data_encryption_key.key_provider)
118-
input(f"{master_keys=}")
119118
for master_key in master_keys:
120119
# Don't re-encrypt the encryption data key; we already have the ciphertext
121120
if master_key is primary_master_key:
@@ -129,8 +128,6 @@ def prepare_data_keys(primary_master_key, master_keys, algorithm, encryption_con
129128
)
130129
encrypted_data_keys.add(encrypted_key)
131130
_LOGGER.debug("encryption key encrypted with master key: %s", master_key.key_provider)
132-
input(f"{data_encryption_key=}")
133-
input(f"{encrypted_data_keys=}")
134131
return data_encryption_key, encrypted_data_keys
135132

136133

test_vector_handlers/src/awses_test_vectors/manifests/full_message/encrypt.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,6 @@ def run(self, materials_manager=None):
168168
else:
169169
raise TypeError(f"Unrecognized master_key_provider_fn return type: {self.master_key_provider_fn()}")
170170
ciphertext, _header = client.encrypt(**encrypt_kwargs)
171-
input(f"{_header=}")
172171
return ciphertext
173172

174173

test_vector_handlers/src/awses_test_vectors/manifests/mpl_keyring.py

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,6 @@ def keyring(self, keys_uri, mode):
109109
if input_kwargs["key"] == "rsa-4096-private" \
110110
and mode in ("decrypt-generate", "encrypt"):
111111
changed_key_name_from_private_to_public = True
112-
input("YUP")
113112
input_kwargs["key"] = "rsa-4096-public"
114113
# Specify default padding-hash
115114
if "padding-hash" not in input_kwargs:
@@ -124,8 +123,6 @@ def keyring(self, keys_uri, mode):
124123
GetKeyDescriptionInput(json=encoded_json)
125124
)
126125

127-
input(f"{output.key_description=}")
128-
129126
keyring: IKeyring = keyvectors.create_test_vector_keyring(
130127
TestVectorKeyringInput(
131128
key_description=output.key_description
@@ -162,13 +159,13 @@ def keyring(self, keys_uri, mode):
162159
# This configuration seems to be correct, because
163160
# all of the test vectors (master keys and MPL) pass with these two hacks.
164161
# But this seems weird, and we didn't have to do this in Java.
165-
# if hasattr(keyring, "_impl"): # pylint: disable=protected-access
166-
# if hasattr(keyring._impl, "_keyName"): # pylint: disable=protected-access
167-
# if keyring._impl._keyName == UTF8.default__.Encode(_dafny.Seq("rsa-4096-public")).value \
168-
# and mode in ("decrypt-generate", "encrypt"): # pylint: disable=protected-access
169-
# if changed_key_name_from_private_to_public:
170-
# # pylint: disable=protected-access
171-
# keyring._impl._keyName = UTF8.default__.Encode(_dafny.Seq("rsa-4096-private")).value
162+
if hasattr(keyring, "_impl"): # pylint: disable=protected-access
163+
if hasattr(keyring._impl, "_keyName"): # pylint: disable=protected-access
164+
if keyring._impl._keyName == UTF8.default__.Encode(_dafny.Seq("rsa-4096-public")).value \
165+
and mode in ("decrypt-generate", "encrypt"): # pylint: disable=protected-access
166+
if changed_key_name_from_private_to_public:
167+
# pylint: disable=protected-access
168+
keyring._impl._keyName = UTF8.default__.Encode(_dafny.Seq("rsa-4096-private")).value
172169

173170
return keyring
174171

@@ -201,9 +198,7 @@ def keyring_from_master_key_specs(keys_uri, master_key_specs, mode):
201198
"""
202199
keyrings = [spec.keyring(keys_uri, mode) for spec in master_key_specs]
203200
primary = keyrings[0]
204-
input(f"{primary=}")
205201
others = keyrings[1:]
206-
input(f"{others=}")
207202

208203
mpl: AwsCryptographicMaterialProviders = AwsCryptographicMaterialProviders(
209204
MaterialProvidersConfig()

0 commit comments

Comments
 (0)