6969from lib .core .enums import MOBILES
7070from lib .core .enums import PAYLOAD
7171from lib .core .enums import PRIORITY
72- from lib .core .enums import PROXYTYPE
72+ from lib .core .enums import PROXY_TYPE
7373from lib .core .enums import REFLECTIVE_COUNTER
7474from lib .core .enums import WIZARD
7575from lib .core .exception import sqlmapConnectionException
@@ -924,8 +924,8 @@ def __setHTTPProxy():
924924 except :
925925 pass #drops into the next check block
926926
927- if not all ((scheme , hasattr (PROXYTYPE , scheme ), hostname , port )):
928- errMsg = "proxy value must be in format '(%s)://url:port'" % "|" .join (_ [0 ].lower () for _ in getPublicTypeMembers (PROXYTYPE ))
927+ if not all ((scheme , hasattr (PROXY_TYPE , scheme ), hostname , port )):
928+ errMsg = "proxy value must be in format '(%s)://url:port'" % "|" .join (_ [0 ].lower () for _ in getPublicTypeMembers (PROXY_TYPE ))
929929 raise sqlmapSyntaxException , errMsg
930930
931931 if conf .pCred :
@@ -938,8 +938,8 @@ def __setHTTPProxy():
938938 username = _ .group (1 )
939939 password = _ .group (2 )
940940
941- if scheme in (PROXYTYPE .SOCKS4 , PROXYTYPE .SOCKS5 ):
942- socks .setdefaultproxy (socks .PROXY_TYPE_SOCKS5 if scheme == PROXYTYPE .SOCKS5 else socks .PROXY_TYPE_SOCKS4 , hostname , port , username = username , password = password )
941+ if scheme in (PROXY_TYPE .SOCKS4 , PROXY_TYPE .SOCKS5 ):
942+ socks .setdefaultproxy (socks .PROXY_TYPE_SOCKS5 if scheme == PROXY_TYPE .SOCKS5 else socks .PROXY_TYPE_SOCKS4 , hostname , port , username = username , password = password )
943943 socks .wrapmodule (urllib2 )
944944 else :
945945 if conf .pCred :
@@ -1813,7 +1813,7 @@ def __setTorProxySettings():
18131813 if not conf .tor :
18141814 return
18151815
1816- if conf .torType == PROXYTYPE .HTTP :
1816+ if conf .torType == PROXY_TYPE .HTTP :
18171817 __setTorHttpProxySettings ()
18181818 else :
18191819 __setTorSocksProxySettings ()
@@ -1864,7 +1864,7 @@ def __setTorSocksProxySettings():
18641864 logger .info (infoMsg )
18651865
18661866 # Has to be SOCKS5 to prevent DNS leaks (http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29)
1867- socks .setdefaultproxy (socks .PROXY_TYPE_SOCKS5 if conf .torType == PROXYTYPE .SOCKS5 else socks .PROXY_TYPE_SOCKS4 , LOCALHOST , conf .torPort or DEFAULT_TOR_SOCKS_PORT )
1867+ socks .setdefaultproxy (socks .PROXY_TYPE_SOCKS5 if conf .torType == PROXY_TYPE .SOCKS5 else socks .PROXY_TYPE_SOCKS4 , LOCALHOST , conf .torPort or DEFAULT_TOR_SOCKS_PORT )
18681868 socks .wrapmodule (urllib2 )
18691869
18701870def __checkTor ():
@@ -1973,8 +1973,8 @@ def __basicOptionValidation():
19731973 errMsg = "value for option '--tor-port' must be a positive integer"
19741974 raise sqlmapSyntaxException , errMsg
19751975
1976- if conf .torType not in getPublicTypeMembers (PROXYTYPE , True ):
1977- errMsg = "option '--tor-type' accepts one of following values: %s" % ", " .join (getPublicTypeMembers (PROXYTYPE , True ))
1976+ if conf .torType not in getPublicTypeMembers (PROXY_TYPE , True ):
1977+ errMsg = "option '--tor-type' accepts one of following values: %s" % ", " .join (getPublicTypeMembers (PROXY_TYPE , True ))
19781978 raise sqlmapSyntaxException , errMsg
19791979
19801980 if conf .dumpFormat not in getPublicTypeMembers (DUMP_FORMAT , True ):
0 commit comments