summaryrefslogtreecommitdiff
path: root/paramiko/rsakey.py
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2017-06-03 06:58:38 -1000
committerPaul Kehrer <paul.l.kehrer@gmail.com>2017-06-05 15:14:05 -1000
commitfdc09c9f93fd189a6398d5b350a3c91011d9b4cb (patch)
tree9f71ecfeccf1cf79a03e10adad8a8529bda83607 /paramiko/rsakey.py
parentaac89b5127675b8b8100eba08b397c913c752ea0 (diff)
downloadparamiko-fdc09c9f93fd189a6398d5b350a3c91011d9b4cb.tar.gz
use cryptography's sign/verify methods instead of signer/verifier
Diffstat (limited to 'paramiko/rsakey.py')
-rw-r--r--paramiko/rsakey.py15
1 files changed, 5 insertions, 10 deletions
diff --git a/paramiko/rsakey.py b/paramiko/rsakey.py
index 8ccf4c30..8953a626 100644
--- a/paramiko/rsakey.py
+++ b/paramiko/rsakey.py
@@ -105,12 +105,11 @@ class RSAKey(PKey):
return isinstance(self.key, rsa.RSAPrivateKey)
def sign_ssh_data(self, data):
- signer = self.key.signer(
+ sig = self.key.sign(
+ data,
padding=padding.PKCS1v15(),
algorithm=hashes.SHA1(),
)
- signer.update(data)
- sig = signer.finalize()
m = Message()
m.add_string('ssh-rsa')
@@ -124,14 +123,10 @@ class RSAKey(PKey):
if isinstance(key, rsa.RSAPrivateKey):
key = key.public_key()
- verifier = key.verifier(
- signature=msg.get_binary(),
- padding=padding.PKCS1v15(),
- algorithm=hashes.SHA1(),
- )
- verifier.update(data)
try:
- verifier.verify()
+ key.verify(
+ msg.get_binary(), data, padding.PKCS1v15(), hashes.SHA1()
+ )
except InvalidSignature:
return False
else: