File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -2076,7 +2076,7 @@ to speed up repeated connections from the same clients.
20762076 :attr: `~SSLContext.minimum_version ` and
20772077 :attr: `SSLContext.options ` all affect the supported SSL
20782078 and TLS versions of the context. The implementation does not prevent
2079- invalid combination . For example a context with
2079+ invalid combinations . For example a context with
20802080 :attr: `OP_NO_TLSv1_2 ` in :attr: `~SSLContext.options ` and
20812081 :attr: `~SSLContext.maximum_version ` set to :attr: `TLSVersion.TLSv1_2 `
20822082 will not be able to establish a TLS 1.2 connection.
@@ -2879,11 +2879,11 @@ disabled by default.
28792879::
28802880
28812881 >>> client_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
2882- >>> client_context.minimum_version = ssl.TLSVersion.TLSv1_3
2882+ >>> client_context.minimum_version = ssl.TLSVersion.TLSv1_2
28832883 >>> client_context.maximum_version = ssl.TLSVersion.TLSv1_3
28842884
28852885
2886- The SSL context created above will only allow TLSv1.3 and later (if
2886+ The SSL client context created above will only allow TLSv1.2 and TLSv1.3 (if
28872887supported by your system) connections to a server. :const: `PROTOCOL_TLS_CLIENT `
28882888implies certificate validation and hostname checks by default. You have to
28892889load certificates into the context.
You can’t perform that action at this time.
0 commit comments