Skip to content

Commit be0c2af

Browse files
authored
docs(ssl): Fix TLS version range example
1 parent 5c3deca commit be0c2af

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

Doc/library/ssl.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2076,7 +2076,7 @@ to speed up repeated connections from the same clients.
20762076
:attr:`~SSLContext.minimum_version` and
20772077
:attr:`SSLContext.options` all affect the supported SSL
20782078
and TLS versions of the context. The implementation does not prevent
2079-
invalid combination. For example a context with
2079+
invalid combinations. For example a context with
20802080
:attr:`OP_NO_TLSv1_2` in :attr:`~SSLContext.options` and
20812081
:attr:`~SSLContext.maximum_version` set to :attr:`TLSVersion.TLSv1_2`
20822082
will not be able to establish a TLS 1.2 connection.
@@ -2879,11 +2879,11 @@ disabled by default.
28792879
::
28802880

28812881
>>> client_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
2882-
>>> client_context.minimum_version = ssl.TLSVersion.TLSv1_3
2882+
>>> client_context.minimum_version = ssl.TLSVersion.TLSv1_2
28832883
>>> client_context.maximum_version = ssl.TLSVersion.TLSv1_3
28842884

28852885

2886-
The SSL context created above will only allow TLSv1.3 and later (if
2886+
The SSL client context created above will only allow TLSv1.2 and TLSv1.3 (if
28872887
supported by your system) connections to a server. :const:`PROTOCOL_TLS_CLIENT`
28882888
implies certificate validation and hostname checks by default. You have to
28892889
load certificates into the context.

0 commit comments

Comments
 (0)