Lines Matching defs:for
1 # Wrapper module for _ssl, providing some additional facilities
4 """This module provides some more Pythonic support for SSL.
12 SSLError -- exception raised for I/O errors
16 cert_time_to_seconds -- convert time string used for certificate
154 _PROTOCOL_NAMES = {value: name for name, value in _SSLMethod.__members__.items()}
187 """Alert types for TLSContentType.ALERT messages
263 import base64 # for DER-to-PEM translation
347 # refuse for short IPv4 notation and additional trailing data
367 RFC 6125 explicitly doesn't define an algorithm for this
405 for key, value in san:
417 for sub in cert.get('subject', ()):
418 for key, value in sub:
544 for protocol in npn_protocols:
568 for protocol in alpn_protocols:
580 for cert, encoding, trust in enum_certificates(storename):
595 for storename in self._windows_cert_stores:
648 connections. The callback is called for any TLS protocol message
649 (header, handshake, alert, and more), but not for application data.
663 :class:`TLSVersion` enum member or int for unknown version. For a
666 :class:`_TLSContentType` enum member or int for unsupported
669 Either a :class:`_TLSContentType` enum number for a header
670 message, a :class:`_TLSAlertType` enum member for an alert
671 message, a :class:`_TLSMessageType` enum member for other
672 messages, or int for unsupported message types.
774 # root CA certificates for the given purpose. This may fail silently.
787 """Create a SSLContext object for Python stdlib modules
828 # root CA certificates for the given purpose. This may fail silently.
853 that want to implement asynchronous IO for SSL through memory buffers.
889 """The SSLSession for client socket."""
908 """The currently set server hostname (for SNI), or ``None`` if no
986 """Get channel binding data for current connection. Raise ValueError
1068 # EINVAL occurs for recv(1) on non-connected on unix sockets.
1103 raise ValueError("do_handshake_on_connect should not be specified for non-blocking sockets")
1143 # raise an exception here if you wish to check for spurious closes
1463 raise ValueError("certfile must be specified for server-side "
1522 ss += [f[i:i+64] for i in range(0, len(f), 64)]