diff options
author | Sanyam Khurana <8039608+CuriousLearner@users.noreply.github.com> | 2018-01-20 00:25:37 (GMT) |
---|---|---|
committer | Victor Stinner <victor.stinner@gmail.com> | 2018-01-20 00:25:37 (GMT) |
commit | 338cd83c5dceaed785f5bf613e2122f871908e2a (patch) | |
tree | f75ff3700e2f2c6a98b34728568e2e8a53cf0adf /Doc/library/ssl.rst | |
parent | 7464e87a6511d3626b04c9833a262a77b1f21e23 (diff) | |
download | cpython-338cd83c5dceaed785f5bf613e2122f871908e2a.zip cpython-338cd83c5dceaed785f5bf613e2122f871908e2a.tar.gz cpython-338cd83c5dceaed785f5bf613e2122f871908e2a.tar.bz2 |
bpo-25910: Link redirections in docs (#1933)
Fixes some redirection links in docs.
Diffstat (limited to 'Doc/library/ssl.rst')
-rw-r--r-- | Doc/library/ssl.rst | 21 |
1 files changed, 10 insertions, 11 deletions
diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst index b40d958..4c44ffa 100644 --- a/Doc/library/ssl.rst +++ b/Doc/library/ssl.rst @@ -868,9 +868,9 @@ Constants .. data:: HAS_NPN Whether the OpenSSL library has built-in support for *Next Protocol - Negotiation* as described in the `NPN draft specification - <https://tools.ietf.org/html/draft-agl-tls-nextprotoneg>`_. When true, - you can use the :meth:`SSLContext.set_npn_protocols` method to advertise + Negotiation* as described in the `Application Layer Protocol + Negotiation <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_. + When true, you can use the :meth:`SSLContext.set_npn_protocols` method to advertise which protocols you want to support. .. versionadded:: 3.3 @@ -1374,7 +1374,7 @@ to speed up repeated connections from the same clients. The *capath* string, if present, is the path to a directory containing several CA certificates in PEM format, following an `OpenSSL specific layout - <https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_load_verify_locations.html>`_. + <https://www.openssl.org/docs/manmaster/man3/SSL_CTX_load_verify_locations.html>`_. The *cadata* object, if present, is either an ASCII string of one or more PEM-encoded certificates or a :term:`bytes-like object` of DER-encoded @@ -1501,8 +1501,8 @@ to speed up repeated connections from the same clients. Specify which protocols the socket should advertise during the SSL/TLS handshake. It should be a list of strings, like ``['http/1.1', 'spdy/2']``, ordered by preference. The selection of a protocol will happen during the - handshake, and will play out according to the `NPN draft specification - <https://tools.ietf.org/html/draft-agl-tls-nextprotoneg>`_. After a + handshake, and will play out according to the `Application Layer Protocol Negotiation + <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_. After a successful handshake, the :meth:`SSLSocket.selected_npn_protocol` method will return the agreed-upon protocol. @@ -1663,8 +1663,7 @@ to speed up repeated connections from the same clients. .. method:: SSLContext.session_stats() Get statistics about the SSL sessions created or managed by this context. - A dictionary is returned which maps the names of each `piece of information - <https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_sess_number.html>`_ to their + A dictionary is returned which maps the names of each `piece of information <https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_sess_number.html>`_ to their numeric values. For example, here is the total number of hits and misses in the session cache since the context was created:: @@ -2365,7 +2364,7 @@ enabled when negotiating a SSL session is possible through the :meth:`SSLContext.set_ciphers` method. Starting from Python 3.2.3, the ssl module disables certain weak ciphers by default, but you may want to further restrict the cipher choice. Be sure to read OpenSSL's documentation -about the `cipher list format <https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT>`_. +about the `cipher list format <https://www.openssl.org/docs/manmaster/man1/ciphers.html#CIPHER-LIST-FORMAT>`_. If you want to check which ciphers are enabled by a given cipher list, use :meth:`SSLContext.get_ciphers` or the ``openssl ciphers`` command on your system. @@ -2393,10 +2392,10 @@ successful call of :func:`~ssl.RAND_add`, :func:`~ssl.RAND_bytes` or `RFC 1422: Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management <https://www.ietf.org/rfc/rfc1422>`_ Steve Kent - `RFC 4086: Randomness Requirements for Security <http://datatracker.ietf.org/doc/rfc4086/>`_ + `RFC 4086: Randomness Requirements for Security <https://datatracker.ietf.org/doc/rfc4086/>`_ Donald E., Jeffrey I. Schiller - `RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile <http://datatracker.ietf.org/doc/rfc5280/>`_ + `RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile <https://datatracker.ietf.org/doc/rfc5280/>`_ D. Cooper `RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2 <https://tools.ietf.org/html/rfc5246>`_ |