diff -r c424150d2ac8 -r ef1b3cd9a6ca src/eric7/Utilities/crypto/py3AES.py --- a/src/eric7/Utilities/crypto/py3AES.py Tue Sep 03 17:28:40 2024 +0200 +++ b/src/eric7/Utilities/crypto/py3AES.py Tue Sep 03 17:42:44 2024 +0200 @@ -1625,7 +1625,7 @@ if keysize not in AES.KeySize.values(): raise ValueError("invalid key size: {0}".format(keysize)) # create a new iv using random data - iv = bytearray([i for i in os.urandom(16)]) + iv = bytearray(list(os.urandom(16))) moo = AESModeOfOperation() _mode, _length, ciph = moo.encrypt(data, mode, key, keysize, iv) # With padding, the original length does not need to be known. It's a bad