aboutsummaryrefslogtreecommitdiffstats
path: root/cryptography
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2014-03-19 18:41:35 -0400
committerPaul Kehrer <paul.l.kehrer@gmail.com>2014-03-19 18:41:35 -0400
commit798c03456d6f1fa8f27433a7e3928d583e1e120f (patch)
treeb97df27c8c25d8372e13f6d75a5cf1dff68cf590 /cryptography
parenta3bb335b2bfec37b0a37be1f5525d70945d4d815 (diff)
downloadcryptography-798c03456d6f1fa8f27433a7e3928d583e1e120f.tar.gz
cryptography-798c03456d6f1fa8f27433a7e3928d583e1e120f.tar.bz2
cryptography-798c03456d6f1fa8f27433a7e3928d583e1e120f.zip
document the ValueError
Diffstat (limited to 'cryptography')
-rw-r--r--cryptography/hazmat/backends/openssl/backend.py4
1 files changed, 2 insertions, 2 deletions
diff --git a/cryptography/hazmat/backends/openssl/backend.py b/cryptography/hazmat/backends/openssl/backend.py
index d7c0f882..fa50fcab 100644
--- a/cryptography/hazmat/backends/openssl/backend.py
+++ b/cryptography/hazmat/backends/openssl/backend.py
@@ -712,7 +712,6 @@ class _RSASignatureContext(object):
def __init__(self, backend, private_key, padding, algorithm):
self._backend = backend
self._private_key = private_key
- key_size_bytes = int(math.ceil(private_key.key_size / 8.0))
if not isinstance(padding, interfaces.AsymmetricPadding):
raise TypeError(
@@ -732,6 +731,7 @@ class _RSASignatureContext(object):
# Size of key in bytes - 2 is the maximum
# PSS signature length (salt length is checked later)
+ key_size_bytes = int(math.ceil(private_key.key_size / 8.0))
if key_size_bytes - algorithm.digest_size - 2 < 0:
raise ValueError("Digest too large for key size.")
@@ -891,7 +891,6 @@ class _RSAVerificationContext(object):
self._backend = backend
self._public_key = public_key
self._signature = signature
- key_size_bytes = int(math.ceil(public_key.key_size / 8.0))
if not isinstance(padding, interfaces.AsymmetricPadding):
raise TypeError(
@@ -911,6 +910,7 @@ class _RSAVerificationContext(object):
# Size of key in bytes - 2 is the maximum
# PSS signature length (salt length is checked later)
+ key_size_bytes = int(math.ceil(public_key.key_size / 8.0))
if key_size_bytes - algorithm.digest_size - 2 < 0:
raise ValueError("Digest too large for key size.")