mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-02-03 13:14:13 +03:00
Restyling redundant 'except Exception' form
This commit is contained in:
parent
acfeeb4f51
commit
834be1eddc
|
@ -24,7 +24,7 @@ def beep():
|
|||
_linux_wav_play(BEEP_WAV_FILENAME)
|
||||
else:
|
||||
_speaker_beep()
|
||||
except Exception:
|
||||
except:
|
||||
_speaker_beep()
|
||||
|
||||
def _speaker_beep():
|
||||
|
|
|
@ -3192,7 +3192,7 @@ def decodeHexValue(value):
|
|||
|
||||
try:
|
||||
retVal = applyFunctionRecursively(value, _)
|
||||
except Exception:
|
||||
except:
|
||||
singleTimeWarnMessage("there was a problem decoding value '%s' from expected hexadecimal form" % value)
|
||||
|
||||
return retVal
|
||||
|
|
|
@ -639,7 +639,7 @@ def _setMetasploit():
|
|||
_ = ConnectRegistry(None, HKEY_LOCAL_MACHINE)
|
||||
_ = OpenKey(_, key)
|
||||
retVal = QueryValueEx(_, value)[0]
|
||||
except Exception:
|
||||
except:
|
||||
logger.debug("unable to identify Metasploit installation path via registry key")
|
||||
|
||||
return retVal
|
||||
|
|
|
@ -500,7 +500,7 @@ def _bruteProcessVariantA(attack_info, hash_regex, suffix, retVal, proc_id, proc
|
|||
except (UnicodeEncodeError, UnicodeDecodeError):
|
||||
pass # ignore possible encoding problems caused by some words in custom dictionaries
|
||||
|
||||
except Exception:
|
||||
except:
|
||||
warnMsg = "there was a problem while hashing entry: %s. " % repr(word)
|
||||
warnMsg += "Please report by e-mail to %s" % ML
|
||||
logger.critical(warnMsg)
|
||||
|
|
Loading…
Reference in New Issue
Block a user