@@ -1525,8 +1525,7 @@ def _use_certificate_chain_file_test(self, certdir):
1525
1525
it with a client which trusts cacert and requires verification to
1526
1526
succeed.
1527
1527
"""
1528
- chain = _create_certificate_chain ()
1529
- [(cakey , cacert ), (ikey , icert ), (skey , scert )] = chain
1528
+ [(_ , cacert ), (_ , icert ), (skey , scert )] = _create_certificate_chain ()
1530
1529
1531
1530
makedirs (certdir )
1532
1531
@@ -2470,7 +2469,7 @@ def test_shutdown_closed(self):
2470
2469
If the underlying socket is closed, `Connection.shutdown` propagates
2471
2470
the write error from the low level write call.
2472
2471
"""
2473
- server , client = loopback ()
2472
+ server , _ = loopback ()
2474
2473
server .sock_shutdown (2 )
2475
2474
with pytest .raises (SysCallError ) as exc :
2476
2475
server .shutdown ()
@@ -2554,8 +2553,7 @@ def test_get_certificate(self):
2554
2553
"""
2555
2554
`Connection.get_certificate` returns the local certificate.
2556
2555
"""
2557
- chain = _create_certificate_chain ()
2558
- [(cakey , cacert ), (ikey , icert ), (skey , scert )] = chain
2556
+ [_ , _ , (_ , scert )] = _create_certificate_chain ()
2559
2557
2560
2558
context = Context (SSLv23_METHOD )
2561
2559
context .use_certificate (scert )
@@ -2587,8 +2585,7 @@ def test_get_peer_cert_chain(self):
2587
2585
`Connection.get_peer_cert_chain` returns a list of certificates
2588
2586
which the connected server returned for the certification verification.
2589
2587
"""
2590
- chain = _create_certificate_chain ()
2591
- [(cakey , cacert ), (ikey , icert ), (skey , scert )] = chain
2588
+ [(_ , cacert ), (_ , icert ), (skey , scert )] = _create_certificate_chain ()
2592
2589
2593
2590
serverContext = Context (SSLv23_METHOD )
2594
2591
serverContext .use_privatekey (skey )
@@ -2647,8 +2644,7 @@ def test_get_verified_chain(self):
2647
2644
`Connection.get_verified_chain` returns a list of certificates
2648
2645
which the connected server returned for the certification verification.
2649
2646
"""
2650
- chain = _create_certificate_chain ()
2651
- [(cakey , cacert ), (ikey , icert ), (skey , scert )] = chain
2647
+ [(_ , cacert ), (_ , icert ), (skey , scert )] = _create_certificate_chain ()
2652
2648
2653
2649
serverContext = Context (SSLv23_METHOD )
2654
2650
serverContext .use_privatekey (skey )
@@ -2759,7 +2755,7 @@ def test_server_get_session(self):
2759
2755
On the server side of a connection, `Connection.get_session` returns a
2760
2756
`Session` instance representing the SSL session for that connection.
2761
2757
"""
2762
- server , client = loopback ()
2758
+ server , _ = loopback ()
2763
2759
session = server .get_session ()
2764
2760
assert isinstance (session , Session )
2765
2761
@@ -2769,7 +2765,7 @@ def test_client_get_session(self):
2769
2765
returns a `Session` instance representing the SSL session for
2770
2766
that connection.
2771
2767
"""
2772
- server , client = loopback ()
2768
+ _ , client = loopback ()
2773
2769
session = client .get_session ()
2774
2770
assert isinstance (session , Session )
2775
2771
@@ -2813,7 +2809,7 @@ def makeClient(socket):
2813
2809
client .set_session (originalSession )
2814
2810
return client
2815
2811
2816
- resumedServer , resumedClient = loopback (
2812
+ resumedServer , _ = loopback (
2817
2813
server_factory = makeServer , client_factory = makeClient
2818
2814
)
2819
2815
@@ -2851,7 +2847,7 @@ def makeOriginalClient(socket):
2851
2847
client .set_connect_state ()
2852
2848
return client
2853
2849
2854
- originalServer , originalClient = loopback (
2850
+ _ , originalClient = loopback (
2855
2851
server_factory = makeServer , client_factory = makeOriginalClient
2856
2852
)
2857
2853
originalSession = originalClient .get_session ()
@@ -2872,7 +2868,7 @@ def test_wantWriteError(self):
2872
2868
`OpenSSL.SSL.WantWriteError` if writing to the connection's BIO
2873
2869
fail indicating a should-write state.
2874
2870
"""
2875
- client_socket , server_socket = socket_pair ()
2871
+ client_socket , _ = socket_pair ()
2876
2872
# Fill up the client's send buffer so Connection won't be able to write
2877
2873
# anything. Start by sending larger chunks (Windows Socket I/O is slow)
2878
2874
# and continue by writing a single byte at a time so we can be sure we
@@ -2926,7 +2922,7 @@ def test_get_finished(self):
2926
2922
from client, or server. Finished messages are send during
2927
2923
TLS handshake.
2928
2924
"""
2929
- server , client = loopback ()
2925
+ server , _ = loopback ()
2930
2926
2931
2927
assert server .get_finished () is not None
2932
2928
assert len (server .get_finished ()) > 0
@@ -2937,7 +2933,7 @@ def test_get_peer_finished(self):
2937
2933
message received from client, or server. Finished messages are send
2938
2934
during TLS handshake.
2939
2935
"""
2940
- server , client = loopback ()
2936
+ server , _ = loopback ()
2941
2937
2942
2938
assert server .get_peer_finished () is not None
2943
2939
assert len (server .get_peer_finished ()) > 0
@@ -3402,7 +3398,7 @@ def test_closed(self):
3402
3398
If the underlying socket is closed, `Connection.sendall` propagates the
3403
3399
write error from the low level write call.
3404
3400
"""
3405
- server , client = loopback ()
3401
+ server , _ = loopback ()
3406
3402
server .sock_shutdown (2 )
3407
3403
with pytest .raises (SysCallError ) as err :
3408
3404
server .sendall (b"hello, world" )
0 commit comments