summaryrefslogtreecommitdiffstats
path: root/Doc/library/ssl.rst
diff options
context:
space:
mode:
authorSanyam Khurana <8039608+CuriousLearner@users.noreply.github.com>2018-01-20 00:25:37 (GMT)
committerVictor Stinner <victor.stinner@gmail.com>2018-01-20 00:25:37 (GMT)
commit338cd83c5dceaed785f5bf613e2122f871908e2a (patch)
treef75ff3700e2f2c6a98b34728568e2e8a53cf0adf /Doc/library/ssl.rst
parent7464e87a6511d3626b04c9833a262a77b1f21e23 (diff)
downloadcpython-338cd83c5dceaed785f5bf613e2122f871908e2a.zip
cpython-338cd83c5dceaed785f5bf613e2122f871908e2a.tar.gz
cpython-338cd83c5dceaed785f5bf613e2122f871908e2a.tar.bz2
bpo-25910: Link redirections in docs (#1933)
Fixes some redirection links in docs.
Diffstat (limited to 'Doc/library/ssl.rst')
-rw-r--r--Doc/library/ssl.rst21
1 files changed, 10 insertions, 11 deletions
diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst
index b40d958..4c44ffa 100644
--- a/Doc/library/ssl.rst
+++ b/Doc/library/ssl.rst
@@ -868,9 +868,9 @@ Constants
.. data:: HAS_NPN
Whether the OpenSSL library has built-in support for *Next Protocol
- Negotiation* as described in the `NPN draft specification
- <https://tools.ietf.org/html/draft-agl-tls-nextprotoneg>`_. When true,
- you can use the :meth:`SSLContext.set_npn_protocols` method to advertise
+ Negotiation* as described in the `Application Layer Protocol
+ Negotiation <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_.
+ When true, you can use the :meth:`SSLContext.set_npn_protocols` method to advertise
which protocols you want to support.
.. versionadded:: 3.3
@@ -1374,7 +1374,7 @@ to speed up repeated connections from the same clients.
The *capath* string, if present, is
the path to a directory containing several CA certificates in PEM format,
following an `OpenSSL specific layout
- <https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_load_verify_locations.html>`_.
+ <https://www.openssl.org/docs/manmaster/man3/SSL_CTX_load_verify_locations.html>`_.
The *cadata* object, if present, is either an ASCII string of one or more
PEM-encoded certificates or a :term:`bytes-like object` of DER-encoded
@@ -1501,8 +1501,8 @@ to speed up repeated connections from the same clients.
Specify which protocols the socket should advertise during the SSL/TLS
handshake. It should be a list of strings, like ``['http/1.1', 'spdy/2']``,
ordered by preference. The selection of a protocol will happen during the
- handshake, and will play out according to the `NPN draft specification
- <https://tools.ietf.org/html/draft-agl-tls-nextprotoneg>`_. After a
+ handshake, and will play out according to the `Application Layer Protocol Negotiation
+ <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_. After a
successful handshake, the :meth:`SSLSocket.selected_npn_protocol` method will
return the agreed-upon protocol.
@@ -1663,8 +1663,7 @@ to speed up repeated connections from the same clients.
.. method:: SSLContext.session_stats()
Get statistics about the SSL sessions created or managed by this context.
- A dictionary is returned which maps the names of each `piece of information
- <https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_sess_number.html>`_ to their
+ A dictionary is returned which maps the names of each `piece of information <https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_sess_number.html>`_ to their
numeric values. For example, here is the total number of hits and misses
in the session cache since the context was created::
@@ -2365,7 +2364,7 @@ enabled when negotiating a SSL session is possible through the
:meth:`SSLContext.set_ciphers` method. Starting from Python 3.2.3, the
ssl module disables certain weak ciphers by default, but you may want
to further restrict the cipher choice. Be sure to read OpenSSL's documentation
-about the `cipher list format <https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT>`_.
+about the `cipher list format <https://www.openssl.org/docs/manmaster/man1/ciphers.html#CIPHER-LIST-FORMAT>`_.
If you want to check which ciphers are enabled by a given cipher list, use
:meth:`SSLContext.get_ciphers` or the ``openssl ciphers`` command on your
system.
@@ -2393,10 +2392,10 @@ successful call of :func:`~ssl.RAND_add`, :func:`~ssl.RAND_bytes` or
`RFC 1422: Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management <https://www.ietf.org/rfc/rfc1422>`_
Steve Kent
- `RFC 4086: Randomness Requirements for Security <http://datatracker.ietf.org/doc/rfc4086/>`_
+ `RFC 4086: Randomness Requirements for Security <https://datatracker.ietf.org/doc/rfc4086/>`_
Donald E., Jeffrey I. Schiller
- `RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile <http://datatracker.ietf.org/doc/rfc5280/>`_
+ `RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile <https://datatracker.ietf.org/doc/rfc5280/>`_
D. Cooper
`RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2 <https://tools.ietf.org/html/rfc5246>`_