@@ -1909,7 +1909,7 @@ def test_lib_reason(self):
19091909 self .assertEqual (cm .exception .library , 'PEM' )
19101910 regex = "(NO_START_LINE|UNSUPPORTED_PUBLIC_KEY_TYPE)"
19111911 self .assertRegex (cm .exception .reason , regex )
1912- self .assertTrue (len (cm .exception .error_queue >= 1 ) )
1912+ self .assertTrue (len (cm .exception .error_queue ) >= 1 )
19131913 s = str (cm .exception )
19141914 self .assertIn ("NO_START_LINE" , s )
19151915
@@ -4689,7 +4689,7 @@ def cb_returning_alert(ssl_sock, server_name, initial_context):
46894689 chatty = False ,
46904690 sni_name = 'supermessage' )
46914691 self .assertEqual (cm .exception .reason , 'TLSV1_ALERT_ACCESS_DENIED' )
4692- self .assertTrue (len (cm .exception .error_queue >= 1 ) )
4692+ self .assertTrue (len (cm .exception .error_queue ) >= 1 )
46934693
46944694 def test_sni_callback_raising (self ):
46954695 # Raising fails the connection with a TLS handshake failure alert.
@@ -4710,7 +4710,7 @@ def cb_raising(ssl_sock, server_name, initial_context):
47104710 "|SSLV3_ALERT_HANDSHAKE_FAILURE"
47114711 "|NO_PRIVATE_VALUE)" )
47124712 self .assertRegex (cm .exception .reason , regex )
4713- self .assertTrue (len (cm .exception .error_queue >= 1 ) )
4713+ self .assertTrue (len (cm .exception .error_queue ) >= 1 )
47144714 self .assertEqual (catch .unraisable .exc_type , ZeroDivisionError )
47154715
47164716 def test_sni_callback_wrong_return_type (self ):
@@ -4730,7 +4730,7 @@ def cb_wrong_return_type(ssl_sock, server_name, initial_context):
47304730
47314731
47324732 self .assertEqual (cm .exception .reason , 'TLSV1_ALERT_INTERNAL_ERROR' )
4733- self .assertTrue (len (cm .exception .error_queue >= 1 ) )
4733+ self .assertTrue (len (cm .exception .error_queue ) >= 1 )
47344734 self .assertEqual (catch .unraisable .exc_type , TypeError )
47354735
47364736 def test_shared_ciphers (self ):
0 commit comments