aboutsummaryrefslogtreecommitdiffstats
path: root/mitmproxy/protocol/tls.py
diff options
context:
space:
mode:
authorThomas Kriechbaumer <thomas@kriechbaumer.name>2016-05-28 22:39:30 +0200
committerThomas Kriechbaumer <thomas@kriechbaumer.name>2016-05-28 22:45:15 +0200
commit7971dce2231bc32c25b962d425d8ad935568a699 (patch)
tree094947e14d55fdf14dfb3bf2fab0eff76f7a1172 /mitmproxy/protocol/tls.py
parente4045dc7f858e1e7d2368819e7ad251f4e1d7f90 (diff)
downloadmitmproxy-7971dce2231bc32c25b962d425d8ad935568a699.tar.gz
mitmproxy-7971dce2231bc32c25b962d425d8ad935568a699.tar.bz2
mitmproxy-7971dce2231bc32c25b962d425d8ad935568a699.zip
mitmproxy: fix most flake8 offenses
Diffstat (limited to 'mitmproxy/protocol/tls.py')
-rw-r--r--mitmproxy/protocol/tls.py7
1 files changed, 4 insertions, 3 deletions
diff --git a/mitmproxy/protocol/tls.py b/mitmproxy/protocol/tls.py
index 74c55ab4..5facff73 100644
--- a/mitmproxy/protocol/tls.py
+++ b/mitmproxy/protocol/tls.py
@@ -312,6 +312,7 @@ class TlsClientHello(object):
class TlsLayer(Layer):
+
"""
The TLS layer implements transparent TLS connections.
@@ -469,9 +470,9 @@ class TlsLayer(Layer):
cert, key, chain_file = self._find_cert()
if self.config.add_upstream_certs_to_client_chain:
- extra_certs = self.server_conn.server_certs
+ extra_certs = self.server_conn.server_certs
else:
- extra_certs = None
+ extra_certs = None
try:
self.client_conn.convert_to_ssl(
@@ -482,7 +483,7 @@ class TlsLayer(Layer):
dhparams=self.config.certstore.dhparams,
chain_file=chain_file,
alpn_select_callback=self.__alpn_select_callback,
- extra_chain_certs = extra_certs,
+ extra_chain_certs=extra_certs,
)
# Some TLS clients will not fail the handshake,
# but will immediately throw an "unexpected eof" error on the first read.