def encrypt(plaintext_bytes): key = encrypted_cookie_key() if not key: raise ValueError('The ENCRYPTED_COOKIE_KEY and SECRET_KEY settings must not both be empty.') secret = Secret() secret.encrypt(plaintext_bytes, key) return secret.serialize()
def decrypt(encrypted_bytes): if use_m2crypto: secret = Secret() secret.deserialize(encrypted_bytes) return secret.decrypt(encrypted_cookie_key()) else: cipher = pycrypto_cipher() return cipher.decrypt(encrypted_bytes)
def encrypt(plaintext_bytes): key = encrypted_cookie_key() if not key: raise ValueError('The ENCRYPTED_COOKIE_KEY and SECRET_KEY settings must not both be empty.') if use_m2crypto: secret = Secret() secret.encrypt(plaintext_bytes, key) return secret.serialize() else: cipher = pycrypto_cipher() return cipher.encrypt(plaintext_bytes)
def test_unicode(self): secret = Secret() secret.encrypt(u'foo', 'some-key') res = secret.serialize() reverse = Secret() reverse.deserialize(res) assert reverse.decrypt('some-key') == b'foo'
def _decrypt(self, value): secret = Secret() secret.deserialize(value) return smart_text(secret.decrypt(self.get_aes_key()))
def _encrypt(self, value): secret = Secret() secret.encrypt(smart_bytes(value), self.get_aes_key()) return secret.serialize()
def test_legacy_compatibility(self, expected, serialized_secret): secret = Secret() secret.deserialize(serialized_secret) assert secret.decrypt('super-secret-encryption-key') == expected
def _encrypt(self, value): secret = Secret() secret.encrypt(smart_bytes(value), self.get_aes_key()) return smart_text(secret.serialize())
def decrypt(encrypted_bytes): secret = Secret() secret.deserialize(encrypted_bytes) return secret.decrypt(encrypted_cookie_key())
def _encrypt(self, value): secret = Secret() secret.encrypt(value, self.get_aes_key()) return secret.serialize()