Commit 5b3707eb authored by Yann Leboulanger's avatar Yann Leboulanger
Browse files

[NooN8] Checks with None should be made with is or is not

parent b3fdc536
......@@ -193,7 +193,7 @@ class SASL(PlugIn):
# If the server supports a mechanism disable all weaker mechanisms.
password_auth_mechs_strength = ['SCRAM-SHA-1-PLUS', 'SCRAM-SHA-1',
if self.channel_binding == None:
if self.channel_binding is None:
for i in range(0, len(password_auth_mechs_strength)):
if password_auth_mechs_strength[i] in self.mecs:
......@@ -243,7 +243,7 @@ class SASL(PlugIn):
raise NodeProcessed
except kerberos.GSSError as e:'GSSAPI authentication failed: %s' % str(e))
if 'SCRAM-SHA-1-PLUS' in self.mecs and self.channel_binding != None:
if 'SCRAM-SHA-1-PLUS' in self.mecs and self.channel_binding is not None:
self.mechanism = 'SCRAM-SHA-1-PLUS'
self._owner._caller.get_password(self.set_password, self.mechanism)
......@@ -501,7 +501,7 @@ class SASL(PlugIn):
self.client_nonce = '%x' % rndg.getrandbits(196)
self.scram_soup = 'n=' + self.username + ',r=' + self.client_nonce
if self.mechanism == 'SCRAM-SHA-1':
if self.channel_binding == None:
if self.channel_binding is None:
# Client doesn't support Channel Binding
self.scram_gs2 = 'n,,' # No CB yet.
......@@ -499,10 +499,10 @@ class NonBlockingClient:
if self.protocol_type != 'BOSH':
self._channel_binding = self.Connection.NonBlockingTLS.get_channel_binding()
# TLS handshake is finished so channel binding data muss exist
assert (self._channel_binding != None)
assert (self._channel_binding is not None)
except NotImplementedError:
if auth_mechs == None:
if auth_mechs is None:
self._auth_mechs = SASL_AUTHENTICATION_MECHANISMS | set(['XEP-0078'])
self._auth_mechs = auth_mechs
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment