@@ -170,13 +170,14 @@ def decrypt_message_hf(
170
170
)
171
171
172
172
173
- def decrypt_message (msg , private_key ):
173
+ def decrypt_message (msg , private_key , ignore_warnings = False ):
174
174
# type: (Union[bytes, str], str) -> Tuple[datetime, Any]
175
175
"""
176
176
Simple base64 wrapper for rsa_decrypt_message
177
177
178
178
:param msg: b64 encoded original rsa encrypted data
179
179
:param private_key: rsa private key
180
+ :param ignore_warnings: whether to ignore warnings
180
181
:return: (bytes): rsa decrypted data
181
182
"""
182
183
verify_key (private_key , "RSA PRIVATE" )
@@ -187,16 +188,17 @@ def decrypt_message(msg, private_key):
187
188
"decrypt_message accepts b64 encoded byte objects"
188
189
) # pylint: disable=W0707,raise-missing-from
189
190
190
- return rsa_decrypt_message (decoded_msg , private_key )
191
+ return rsa_decrypt_message (decoded_msg , private_key , ignore_warnings )
191
192
192
193
193
- def rsa_decrypt_message (msg , private_key ):
194
+ def rsa_decrypt_message (msg , private_key , ignore_warnings = False ):
194
195
# type: (bytes, str) -> Tuple[datetime, Any]
195
196
"""
196
197
RSA decrypt a python object / bytes / string and check the encryption timestamp
197
198
198
199
:param msg: original rsa encrypted data
199
200
:param private_key: rsa encryption key
201
+ :param ignore_warnings: whether to ignore warnings
200
202
:return: original data
201
203
"""
202
204
private_key = RSA .import_key (private_key )
@@ -226,4 +228,4 @@ def rsa_decrypt_message(msg, private_key):
226
228
else :
227
229
exec (err + " from None" )
228
230
229
- return aes_decrypt_message (aes_encrypted_msg , session_key )
231
+ return aes_decrypt_message (aes_encrypted_msg , session_key , ignore_warnings )
0 commit comments