@@ -182,8 +182,7 @@ PySSL_SetError(PySSLObject *obj, int ret, char *filename, int lineno)
182182 break ;
183183 case SSL_ERROR_WANT_X509_LOOKUP :
184184 p = PY_SSL_ERROR_WANT_X509_LOOKUP ;
185- errstr =
186- "The operation did not complete (X509 lookup)" ;
185+ errstr = "The operation did not complete (X509 lookup)" ;
187186 break ;
188187 case SSL_ERROR_WANT_CONNECT :
189188 p = PY_SSL_ERROR_WANT_CONNECT ;
@@ -196,15 +195,14 @@ PySSL_SetError(PySSLObject *obj, int ret, char *filename, int lineno)
196195 PySocketSockObject * s
197196 = (PySocketSockObject * ) PyWeakref_GetObject (obj -> Socket );
198197 if (ret == 0 || (((PyObject * )s ) == Py_None )) {
199- p = PY_SSL_ERROR_EOF ;
200- errstr =
201- "EOF occurred in violation of protocol" ;
198+ p = PY_SSL_ERROR_EOF ;
199+ errstr = "EOF occurred in violation of protocol" ;
202200 } else if (ret == -1 ) {
203- /* underlying BIO reported an I/O error */
204- return s -> errorhandler ();
201+ /* underlying BIO reported an I/O error */
202+ return s -> errorhandler ();
205203 } else { /* possible? */
206- p = PY_SSL_ERROR_SYSCALL ;
207- errstr = "Some I/O error occurred" ;
204+ p = PY_SSL_ERROR_SYSCALL ;
205+ errstr = "Some I/O error occurred" ;
208206 }
209207 } else {
210208 p = PY_SSL_ERROR_SYSCALL ;
@@ -221,8 +219,7 @@ PySSL_SetError(PySSLObject *obj, int ret, char *filename, int lineno)
221219 /* XXX Protected by global interpreter lock */
222220 errstr = ERR_error_string (e , NULL );
223221 else { /* possible? */
224- errstr =
225- "A failure in the SSL library occurred" ;
222+ errstr = "A failure in the SSL library occurred" ;
226223 }
227224 break ;
228225 }
@@ -325,7 +322,7 @@ newPySSLObject(PySocketSockObject *Sock, char *key_file, char *cert_file,
325322 if (certreq != PY_SSL_CERT_NONE ) {
326323 if (cacerts_file == NULL ) {
327324 errstr = ERRSTR ("No root certificates specified for "
328- "verification of other-side certificates." );
325+ "verification of other-side certificates." );
329326 goto fail ;
330327 } else {
331328 PySSL_BEGIN_ALLOW_THREADS
@@ -490,15 +487,15 @@ static PyObject *PySSL_SSLdo_handshake(PySSLObject *self)
490487 }
491488 if (sockstate == SOCKET_HAS_TIMED_OUT ) {
492489 PyErr_SetString (PySSLErrorObject ,
493- ERRSTR ("The handshake operation timed out" ));
490+ ERRSTR ("The handshake operation timed out" ));
494491 return NULL ;
495492 } else if (sockstate == SOCKET_HAS_BEEN_CLOSED ) {
496493 PyErr_SetString (PySSLErrorObject ,
497- ERRSTR ("Underlying socket has been closed." ));
494+ ERRSTR ("Underlying socket has been closed." ));
498495 return NULL ;
499496 } else if (sockstate == SOCKET_TOO_LARGE_FOR_SELECT ) {
500497 PyErr_SetString (PySSLErrorObject ,
501- ERRSTR ("Underlying socket too large for select()." ));
498+ ERRSTR ("Underlying socket too large for select()." ));
502499 return NULL ;
503500 } else if (sockstate == SOCKET_IS_NONBLOCKING ) {
504501 break ;
@@ -544,7 +541,7 @@ _create_tuple_for_attribute (ASN1_OBJECT *name, ASN1_STRING *value) {
544541 goto fail ;
545542 }
546543 value_obj = PyUnicode_DecodeUTF8 ((char * ) valuebuf ,
547- buflen , "strict" );
544+ buflen , "strict" );
548545 OPENSSL_free (valuebuf );
549546 if (value_obj == NULL ) {
550547 Py_DECREF (name_obj );
@@ -1217,11 +1214,9 @@ static PyObject *PySSL_SSLwrite(PySSLObject *self, PyObject *args)
12171214 goto error ;
12181215 }
12191216 if (err == SSL_ERROR_WANT_READ ) {
1220- sockstate =
1221- check_socket_and_wait_for_timeout (sock , 0 );
1217+ sockstate = check_socket_and_wait_for_timeout (sock , 0 );
12221218 } else if (err == SSL_ERROR_WANT_WRITE ) {
1223- sockstate =
1224- check_socket_and_wait_for_timeout (sock , 1 );
1219+ sockstate = check_socket_and_wait_for_timeout (sock , 1 );
12251220 } else {
12261221 sockstate = SOCKET_OPERATION_OK ;
12271222 }
@@ -1334,7 +1329,7 @@ static PyObject *PySSL_SSLread(PySSLObject *self, PyObject *args)
13341329 goto error ;
13351330 } else if (sockstate == SOCKET_TOO_LARGE_FOR_SELECT ) {
13361331 PyErr_SetString (PySSLErrorObject ,
1337- "Underlying socket too large for select()." );
1332+ "Underlying socket too large for select()." );
13381333 goto error ;
13391334 } else if (sockstate == SOCKET_HAS_BEEN_CLOSED ) {
13401335 count = 0 ;
@@ -1350,11 +1345,9 @@ static PyObject *PySSL_SSLread(PySSLObject *self, PyObject *args)
13501345 if (PyErr_CheckSignals ())
13511346 goto error ;
13521347 if (err == SSL_ERROR_WANT_READ ) {
1353- sockstate =
1354- check_socket_and_wait_for_timeout (sock , 0 );
1348+ sockstate = check_socket_and_wait_for_timeout (sock , 0 );
13551349 } else if (err == SSL_ERROR_WANT_WRITE ) {
1356- sockstate =
1357- check_socket_and_wait_for_timeout (sock , 1 );
1350+ sockstate = check_socket_and_wait_for_timeout (sock , 1 );
13581351 } else if ((err == SSL_ERROR_ZERO_RETURN ) &&
13591352 (SSL_get_shutdown (self -> ssl ) ==
13601353 SSL_RECEIVED_SHUTDOWN ))
@@ -1547,7 +1540,7 @@ PySSL_RAND_add(PyObject *self, PyObject *args)
15471540 double entropy ;
15481541
15491542 if (!PyArg_ParseTuple (args , "s#d:RAND_add" , & buf , & len , & entropy ))
1550- return NULL ;
1543+ return NULL ;
15511544 RAND_add (buf , len , entropy );
15521545 Py_INCREF (Py_None );
15531546 return Py_None ;
@@ -1578,15 +1571,15 @@ PySSL_RAND_egd(PyObject *self, PyObject *arg)
15781571 int bytes ;
15791572
15801573 if (!PyUnicode_Check (arg ))
1581- return PyErr_Format (PyExc_TypeError ,
1582- "RAND_egd() expected string, found %s" ,
1583- Py_TYPE (arg )-> tp_name );
1574+ return PyErr_Format (PyExc_TypeError ,
1575+ "RAND_egd() expected string, found %s" ,
1576+ Py_TYPE (arg )-> tp_name );
15841577 bytes = RAND_egd (_PyUnicode_AsString (arg ));
15851578 if (bytes == -1 ) {
1586- PyErr_SetString (PySSLErrorObject ,
1587- "EGD connection failed or EGD did not return "
1588- "enough data to seed the PRNG" );
1589- return NULL ;
1579+ PyErr_SetString (PySSLErrorObject ,
1580+ "EGD connection failed or EGD did not return "
1581+ "enough data to seed the PRNG" );
1582+ return NULL ;
15901583 }
15911584 return PyLong_FromLong (bytes );
15921585}
0 commit comments