@@ -153,8 +153,7 @@ def __new__(cls, kid_or_data: int | bytes, kvn: int | None = None):
153153 raise ValueError ("kvn can only be provided if kid_or_data is a kid" )
154154 data = kid_or_data
155155
156- # mypy thinks this is wrong
157- return super (KeyRef , cls ).__new__ (cls , data ) # type: ignore
156+ return super (KeyRef , cls ).__new__ (cls , data )
158157
159158 def __init__ (self , kid_or_data : int | bytes , kvn : int | None = None ):
160159 if len (self ) != 2 :
@@ -354,7 +353,7 @@ def scp11_init(
354353 # GPC v2.3 Amendment F (SCP11) v1.3 §3.1.2 Key Derivation
355354 key_agreement_data = data + epk_sd_ecka_tlv
356355 sharedinfo = key_usage + key_type + key_len
357- keys = X963KDF (hashes .SHA256 (), 5 * key_len [0 ], sharedinfo ).derive (
356+ keybytes = X963KDF (hashes .SHA256 (), 5 * key_len [0 ], sharedinfo ).derive (
358357 esk_oce_ecka .exchange (
359358 ec .ECDH (),
360359 ec .EllipticCurvePublicKey .from_encoded_point (
@@ -366,7 +365,7 @@ def scp11_init(
366365
367366 # 5 keys were derived, one for verification of receipt
368367 ln = key_len [0 ]
369- keys = [keys [i : i + ln ] for i in range (0 , ln * 5 , ln )]
368+ keys = [keybytes [i : i + ln ] for i in range (0 , ln * 5 , ln )]
370369 c = cmac .CMAC (algorithms .AES (keys .pop (0 )))
371370 c .update (key_agreement_data )
372371 c .verify (receipt )
0 commit comments