address initial review comments
diff --git a/cryptography/hazmat/bindings/openssl/backend.py b/cryptography/hazmat/bindings/openssl/backend.py
index db5a9e1..635d6a0 100644
--- a/cryptography/hazmat/bindings/openssl/backend.py
+++ b/cryptography/hazmat/bindings/openssl/backend.py
@@ -283,8 +283,7 @@
def finalize_ctx(self, ctx, digest_size):
buf = self._backend.ffi.new("unsigned char[]", digest_size)
- buflen = self._backend.ffi.new("unsigned int *")
- buflen[0] = digest_size
+ buflen = self._backend.ffi.new("unsigned int *", digest_size)
res = self._backend.lib.HMAC_Final(ctx, buf, buflen)
assert res != 0
self._backend.lib.HMAC_CTX_cleanup(ctx)
diff --git a/tests/utils.py b/tests/utils.py
index a97cdf7..25291d5 100644
--- a/tests/utils.py
+++ b/tests/utils.py
@@ -127,6 +127,7 @@
def load_hash_vectors(vector_data):
vectors = []
+ key, msg, md = None, None, None
for line in vector_data:
line = line.strip()
@@ -151,9 +152,9 @@
elif line.startswith("MD"):
md = line.split(" = ")[1]
# after MD is found the Msg+MD (+ potential key) tuple is complete
- try:
+ if key is not None:
vectors.append((msg, md, key))
- except:
+ else:
vectors.append((msg, md))
else:
raise ValueError("Unknown line in hash vector")