[Python-checkins] [docs] Correct typos in SSLContext.sni_callback (GH-30623)

JelleZijlstra webhook-mailer at python.org
Fri Feb 18 20:49:15 EST 2022


https://github.com/python/cpython/commit/f80a97b492f41afd3c42bb2bd6da7b2828dca215
commit: f80a97b492f41afd3c42bb2bd6da7b2828dca215
branch: main
author: Jörn Heissler <joernheissler at users.noreply.github.com>
committer: JelleZijlstra <jelle.zijlstra at gmail.com>
date: 2022-02-18T17:49:04-08:00
summary:

[docs] Correct typos in SSLContext.sni_callback (GH-30623)

Co-authored-by: Jörn Heissler <nosuchaddress at joern-heissler.de>

files:
M Doc/library/ssl.rst

diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst
index 151f2546eeb60..8e5554ee4b842 100644
--- a/Doc/library/ssl.rst
+++ b/Doc/library/ssl.rst
@@ -1753,10 +1753,10 @@ to speed up repeated connections from the same clients.
    Due to the early negotiation phase of the TLS connection, only limited
    methods and attributes are usable like
    :meth:`SSLSocket.selected_alpn_protocol` and :attr:`SSLSocket.context`.
-   :meth:`SSLSocket.getpeercert`, :meth:`SSLSocket.getpeercert`,
-   :meth:`SSLSocket.cipher` and :meth:`SSLSocket.compress` methods require that
+   The :meth:`SSLSocket.getpeercert`,
+   :meth:`SSLSocket.cipher` and :meth:`SSLSocket.compression` methods require that
    the TLS connection has progressed beyond the TLS Client Hello and therefore
-   will not contain return meaningful values nor can they be called safely.
+   will not return meaningful values nor can they be called safely.
 
    The *sni_callback* function must return ``None`` to allow the
    TLS negotiation to continue.  If a TLS failure is required, a constant



More information about the Python-checkins mailing list