diff -r aff39db4dacc -r 7c017076c12e eric6/Utilities/crypto/py3AES.py --- a/eric6/Utilities/crypto/py3AES.py Mon Sep 23 19:10:42 2019 +0200 +++ b/eric6/Utilities/crypto/py3AES.py Mon Sep 23 19:22:12 2019 +0200 @@ -236,8 +236,10 @@ t = self.__core(t, rconIteration) rconIteration += 1 # For 256-bit keys, we add an extra sbox to the calculation - if size == self.KeySize["SIZE_256"] and \ - ((currentSize % size) == 16): + if ( + size == self.KeySize["SIZE_256"] and + ((currentSize % size) == 16) + ): for l in range(4): t[l] = self.__getSBoxValue(t[l]) @@ -245,8 +247,9 @@ # expanded key. This becomes the next four bytes in the expanded # key. for m in range(4): - expandedKey[currentSize] = \ + expandedKey[currentSize] = ( expandedKey[currentSize - size] ^ t[m] + ) currentSize += 1 return expandedKey @@ -345,13 +348,15 @@ state = state[:] for _ in range(nbr): if isInv: - state[statePointer:statePointer + 4] = \ - state[statePointer + 3:statePointer + 4] + \ + state[statePointer:statePointer + 4] = ( + state[statePointer + 3:statePointer + 4] + state[statePointer:statePointer + 3] + ) else: - state[statePointer:statePointer + 4] = \ - state[statePointer + 1:statePointer + 4] + \ + state[statePointer:statePointer + 4] = ( + state[statePointer + 1:statePointer + 4] + state[statePointer:statePointer + 1] + ) return state def __mixColumns(self, state, isInv):