ssl.SSLSocket.cipher()
  • References/Python/Python/Networking

SSLSocket.cipher() Returns a three-value tuple containing the name of the cipher being used, the version of the SSL protocol

2025-01-10 15:47:30
asyncore.dispatcher.listen()
  • References/Python/Python/Networking

listen(backlog) Listen for connections made to the socket. The backlog argument specifies the maximum number of queued

2025-01-10 15:47:30
ssl.OP_NO_TLSv1_1
  • References/Python/Python/Networking

ssl.OP_NO_TLSv1_1 Prevents a TLSv1.1 connection. This option is only applicable in conjunction with PROTOCOL_SSLv23

2025-01-10 15:47:30
socket.socket.ioctl()
  • References/Python/Python/Networking

socket.ioctl(control, option)

2025-01-10 15:47:30
ssl.SSLWantReadError
  • References/Python/Python/Networking

exception ssl.SSLWantReadError A subclass of SSLError raised by a non-blocking SSL socket when trying

2025-01-10 15:47:30
ssl.get_server_certificate()
  • References/Python/Python/Networking

ssl.get_server_certificate(addr, ssl_version=PROTOCOL_SSLv23, ca_certs=None) Given the address addr of an SSL-protected

2025-01-10 15:47:30
ssl.SSLSocket.getpeercert()
  • References/Python/Python/Networking

SSLSocket.getpeercert(binary_form=False) If there is no certificate for the peer on the other end of the connection, return

2025-01-10 15:47:30
ssl.SSLContext.set_npn_protocols()
  • References/Python/Python/Networking

SSLContext.set_npn_protocols(protocols) Specify which protocols the socket should advertise during the SSL/TLS handshake. It

2025-01-10 15:47:30
ssl.SSLSocket.compression()
  • References/Python/Python/Networking

SSLSocket.compression() Return the compression algorithm being used as a string, or None if the connection isn’t

2025-01-10 15:47:30
asyncore.dispatcher.handle_expt()
  • References/Python/Python/Networking

handle_expt() Called when there is out of band (OOB) data for a socket connection. This will almost never happen, as OOB is

2025-01-10 15:47:30