Did I find the right examples for you? yes no      Crawl my project      Python Jobs

All Samples(12)  |  Call(12)  |  Derive(0)  |  Import(0)
Update read IOMonitor to register or unregister based on if there are
any handlers attached to the read signals.  If there are no handlers,
there is no point in reading data from the channel since it will go 
nowhere.  This also allows us to push back the read buffer to the OS.

We must call this immediately after reading a block, and not defer
it until the end of the mainloop iteration via a timer in order not
to lose incoming data between read() calls.

src/k/a/kaa-base-0.99.2dev-384-2b73caca/src/net/tls/m2.py   kaa-base(Download)
            # TLS handshake completed successfully, peer cert validated.
            self._handshake = False
            self._update_read_monitor()
            self._tls_ip.finish(True)
 
            # We probably no longer need to read from the socket, given that we
            # have user data.
            self._update_read_monitor()
 
        if not decrypted:
    def _starttls(self, **kwargs):
        self._is_client = kwargs['client']
        self._handshake = True
        self._update_read_monitor()
 
                        # SSL BIO should read, allowing us to read from the socket to
                        # satisfy whatever the underlying SSL protocol is doing.
                        self._update_read_monitor()
                else:
                    if encrypting:

src/k/a/kaa-base-HEAD/src/net/tls/m2.py   kaa-base(Download)
            # TLS handshake completed successfully, peer cert validated.
            self._handshake = False
            self._update_read_monitor()
            self._tls_ip.finish(True)
 
            # We probably no longer need to read from the socket, given that we
            # have user data.
            self._update_read_monitor()
 
        if not decrypted:
    def _starttls(self, **kwargs):
        self._is_client = kwargs['client']
        self._handshake = True
        self._update_read_monitor()
 
                        # SSL BIO should read, allowing us to read from the socket to
                        # satisfy whatever the underlying SSL protocol is doing.
                        self._update_read_monitor()
                else:
                    if encrypting:

src/k/a/kaa-base-0.99.2dev-384-2b73caca/src/net/tls/tlslite.py   kaa-base(Download)
            self.signals['tls'].emit()
        finally:
            self._update_read_monitor()
            self._handshake = False
 

src/k/a/kaa-base-0.99.2dev-384-2b73caca/src/net/tls/gnutls.py   kaa-base(Download)
                disp.unregister()
        self._channel = session
        self._update_read_monitor()
        self._handshake = False
 

src/k/a/kaa-base-HEAD/src/net/tls/tlslite.py   kaa-base(Download)
            self.signals['tls'].emit()
        finally:
            self._update_read_monitor()
            self._handshake = False
 

src/k/a/kaa-base-HEAD/src/net/tls/gnutls.py   kaa-base(Download)
                disp.unregister()
        self._channel = session
        self._update_read_monitor()
        self._handshake = False