diff --git a/src/sd_jwt/common.py b/src/sd_jwt/common.py index a76793f..abad28e 100644 --- a/src/sd_jwt/common.py +++ b/src/sd_jwt/common.py @@ -128,7 +128,7 @@ def _parse_sd_jwt(self, sd_jwt): ( self._unverified_input_sd_jwt, *self._input_disclosures, - self._unverified_input_key_binding_jwt, + self._unverified_input_key_binding_jwt ) = self._split(sd_jwt) # Extract only the body from SD-JWT without verifying the signature @@ -164,7 +164,7 @@ def _parse_sd_jwt(self, sd_jwt): [ self._unverified_input_sd_jwt_parsed["protected"], self._unverified_input_sd_jwt_parsed["payload"], - self._unverified_input_sd_jwt_parsed["signature"], + self._unverified_input_sd_jwt_parsed["signature"] ] ) @@ -199,6 +199,6 @@ def _calculate_kb_hash(self, disclosures): string_to_hash = self._combine( self._unverified_compact_serialized_input_sd_jwt, *disclosures, - "", + "" ) return self._b64hash(string_to_hash.encode("ascii")) diff --git a/tests/test_disclose_all_shortcut.py b/tests/test_disclose_all_shortcut.py index b34cfae..fb99d2b 100644 --- a/tests/test_disclose_all_shortcut.py +++ b/tests/test_disclose_all_shortcut.py @@ -70,7 +70,7 @@ def cb_get_issuer_key(issuer, header_parameters): expected_header_parameters = { "alg": testcase.get("sign_alg", "ES256"), - "typ": "testcase+sd-jwt", + "typ": "testcase+sd-jwt" } expected_header_parameters.update(extra_header_parameters)