ssl.OP_NO_TLSv1_2

ssl.OP_NO_TLSv1_2 Prevents a TLSv1.2 connection. This option is only applicable in conjunction with PROTOCOL_SSLv23

2016-10-07 17:42:47
socket.socket.accept()

socket.accept() Accept a connection. The socket must be bound to an address and listening for connections. The return value

2016-10-07 17:42:18
ssl.SSLContext.set_servername_callback()

SSLContext.set_servername_callback(server_name_callback) Register a callback function that will be called after the TLS Client

2016-10-07 17:42:53
socket.setdefaulttimeout()

socket.setdefaulttimeout(timeout) Set the default timeout in seconds (float) for new socket objects. When the socket module

2016-10-07 17:42:17
socket.inet_ntoa()

socket.inet_ntoa(packed_ip) Convert a 32-bit packed IPv4 address (a bytes-like object

2016-10-07 17:42:16
socket.socket.getsockopt()

socket.getsockopt(level, optname[, buflen]) Return the value of the given socket option (see the Unix man page

2016-10-07 17:42:20
mmap.mmap.closed

closed True if the file is closed. New

2016-10-07 17:37:18
asyncore.dispatcher.handle_accepted()

handle_accepted(sock, addr) Called on listening channels (passive openers) when a connection has been established with a new

2016-10-07 17:27:09
signal.sigtimedwait()

signal.sigtimedwait(sigset, timeout) Like sigwaitinfo(), but takes an additional timeout argument specifying

2016-10-07 17:42:00
ssl.RAND_status()

ssl.RAND_status() Return True if the SSL pseudo-random number generator has been seeded with ‘enough’ randomness

2016-10-07 17:42:49