[Python-checkins] [docs] Correct typos in SSLContext.sni_callback (GH-30623)
JelleZijlstra
webhook-mailer at python.org
Fri Feb 18 20:49:15 EST 2022
https://github.com/python/cpython/commit/f80a97b492f41afd3c42bb2bd6da7b2828dca215
commit: f80a97b492f41afd3c42bb2bd6da7b2828dca215
branch: main
author: Jörn Heissler <joernheissler at users.noreply.github.com>
committer: JelleZijlstra <jelle.zijlstra at gmail.com>
date: 2022-02-18T17:49:04-08:00
summary:
[docs] Correct typos in SSLContext.sni_callback (GH-30623)
Co-authored-by: Jörn Heissler <nosuchaddress at joern-heissler.de>
files:
M Doc/library/ssl.rst
diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst
index 151f2546eeb60..8e5554ee4b842 100644
--- a/Doc/library/ssl.rst
+++ b/Doc/library/ssl.rst
@@ -1753,10 +1753,10 @@ to speed up repeated connections from the same clients.
Due to the early negotiation phase of the TLS connection, only limited
methods and attributes are usable like
:meth:`SSLSocket.selected_alpn_protocol` and :attr:`SSLSocket.context`.
- :meth:`SSLSocket.getpeercert`, :meth:`SSLSocket.getpeercert`,
- :meth:`SSLSocket.cipher` and :meth:`SSLSocket.compress` methods require that
+ The :meth:`SSLSocket.getpeercert`,
+ :meth:`SSLSocket.cipher` and :meth:`SSLSocket.compression` methods require that
the TLS connection has progressed beyond the TLS Client Hello and therefore
- will not contain return meaningful values nor can they be called safely.
+ will not return meaningful values nor can they be called safely.
The *sni_callback* function must return ``None`` to allow the
TLS negotiation to continue. If a TLS failure is required, a constant
More information about the Python-checkins
mailing list