summaryrefslogtreecommitdiff
path: root/paramiko/ecdsakey.py
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2017-06-03 06:58:38 -1000
committerPaul Kehrer <paul.l.kehrer@gmail.com>2017-06-05 15:14:05 -1000
commitfdc09c9f93fd189a6398d5b350a3c91011d9b4cb (patch)
tree9f71ecfeccf1cf79a03e10adad8a8529bda83607 /paramiko/ecdsakey.py
parentaac89b5127675b8b8100eba08b397c913c752ea0 (diff)
downloadparamiko-fdc09c9f93fd189a6398d5b350a3c91011d9b4cb.tar.gz
use cryptography's sign/verify methods instead of signer/verifier
Diffstat (limited to 'paramiko/ecdsakey.py')
-rw-r--r--paramiko/ecdsakey.py12
1 files changed, 4 insertions, 8 deletions
diff --git a/paramiko/ecdsakey.py b/paramiko/ecdsakey.py
index 51f8d8ce..b13b9a3c 100644
--- a/paramiko/ecdsakey.py
+++ b/paramiko/ecdsakey.py
@@ -181,9 +181,7 @@ class ECDSAKey(PKey):
def sign_ssh_data(self, data):
ecdsa = ec.ECDSA(self.ecdsa_curve.hash_object())
- signer = self.signing_key.signer(ecdsa)
- signer.update(data)
- sig = signer.finalize()
+ sig = self.signing_key.sign(data, ecdsa)
r, s = decode_dss_signature(sig)
m = Message()
@@ -198,12 +196,10 @@ class ECDSAKey(PKey):
sigR, sigS = self._sigdecode(sig)
signature = encode_dss_signature(sigR, sigS)
- verifier = self.verifying_key.verifier(
- signature, ec.ECDSA(self.ecdsa_curve.hash_object())
- )
- verifier.update(data)
try:
- verifier.verify()
+ self.verifying_key.verify(
+ signature, data, ec.ECDSA(self.ecdsa_curve.hash_object())
+ )
except InvalidSignature:
return False
else: