From: Miss Islington (bot) <31488909+miss-islington@users.noreply.github.com> Date: Mon, 21 Feb 2022 00:17:56 +0000 (-0800) Subject: [docs] Correct typos in SSLContext.sni_callback (GH-30623) (GH-31421) X-Git-Tag: v3.10.3~71 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=a2e13ec0ce050a9050ec195ec0cc2a540912480d;p=thirdparty%2FPython%2Fcpython.git [docs] Correct typos in SSLContext.sni_callback (GH-30623) (GH-31421) Co-authored-by: Jörn Heissler (cherry picked from commit f80a97b492f41afd3c42bb2bd6da7b2828dca215) Co-authored-by: Jörn Heissler --- diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst index a20f97a26535..3531cc3413af 100644 --- a/Doc/library/ssl.rst +++ b/Doc/library/ssl.rst @@ -1753,10 +1753,10 @@ to speed up repeated connections from the same clients. Due to the early negotiation phase of the TLS connection, only limited methods and attributes are usable like :meth:`SSLSocket.selected_alpn_protocol` and :attr:`SSLSocket.context`. - :meth:`SSLSocket.getpeercert`, :meth:`SSLSocket.getpeercert`, - :meth:`SSLSocket.cipher` and :meth:`SSLSocket.compress` methods require that + The :meth:`SSLSocket.getpeercert`, + :meth:`SSLSocket.cipher` and :meth:`SSLSocket.compression` methods require that the TLS connection has progressed beyond the TLS Client Hello and therefore - will not contain return meaningful values nor can they be called safely. + will not return meaningful values nor can they be called safely. The *sni_callback* function must return ``None`` to allow the TLS negotiation to continue. If a TLS failure is required, a constant