mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-12-09 14:11:29 +00:00
Restyling redundant 'except Exception' form
This commit is contained in:
@@ -24,7 +24,7 @@ def beep():
|
||||
_linux_wav_play(BEEP_WAV_FILENAME)
|
||||
else:
|
||||
_speaker_beep()
|
||||
except Exception:
|
||||
except:
|
||||
_speaker_beep()
|
||||
|
||||
def _speaker_beep():
|
||||
|
||||
@@ -3192,7 +3192,7 @@ def decodeHexValue(value):
|
||||
|
||||
try:
|
||||
retVal = applyFunctionRecursively(value, _)
|
||||
except Exception:
|
||||
except:
|
||||
singleTimeWarnMessage("there was a problem decoding value '%s' from expected hexadecimal form" % value)
|
||||
|
||||
return retVal
|
||||
|
||||
@@ -639,7 +639,7 @@ def _setMetasploit():
|
||||
_ = ConnectRegistry(None, HKEY_LOCAL_MACHINE)
|
||||
_ = OpenKey(_, key)
|
||||
retVal = QueryValueEx(_, value)[0]
|
||||
except Exception:
|
||||
except:
|
||||
logger.debug("unable to identify Metasploit installation path via registry key")
|
||||
|
||||
return retVal
|
||||
|
||||
@@ -500,7 +500,7 @@ def _bruteProcessVariantA(attack_info, hash_regex, suffix, retVal, proc_id, proc
|
||||
except (UnicodeEncodeError, UnicodeDecodeError):
|
||||
pass # ignore possible encoding problems caused by some words in custom dictionaries
|
||||
|
||||
except Exception:
|
||||
except:
|
||||
warnMsg = "there was a problem while hashing entry: %s. " % repr(word)
|
||||
warnMsg += "Please report by e-mail to %s" % ML
|
||||
logger.critical(warnMsg)
|
||||
|
||||
Reference in New Issue
Block a user