From 74d104d66c6bb3cd3a27d28e998848cbd1c80caa Mon Sep 17 00:00:00 2001 From: "Miss Islington (bot)" <31488909+miss-islington@users.noreply.github.com> Date: Mon, 23 Mar 2026 23:36:40 +0100 Subject: [PATCH] [3.14] gh-145305: Update ocert.org URLs in docs from http to https (GH-145304) (GH-145322) (cherry picked from commit 11eec7a492670fff67fc083036d595f8498217db) Co-authored-by: indoor47 Co-authored-by: Adam (indoor47) --- Doc/reference/datamodel.rst | 2 +- Doc/using/cmdline.rst | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/Doc/reference/datamodel.rst b/Doc/reference/datamodel.rst index 01b51ac636eb..960b6c6e81da 100644 --- a/Doc/reference/datamodel.rst +++ b/Doc/reference/datamodel.rst @@ -2282,7 +2282,7 @@ Basic customization This is intended to provide protection against a denial-of-service caused by carefully chosen inputs that exploit the worst case performance of a dict insertion, *O*\ (*n*\ :sup:`2`) complexity. See - http://ocert.org/advisories/ocert-2011-003.html for details. + https://ocert.org/advisories/ocert-2011-003.html for details. Changing hash values affects the iteration order of sets. Python has never made guarantees about this ordering diff --git a/Doc/using/cmdline.rst b/Doc/using/cmdline.rst index 09be3af0abe1..cb646d6d4021 100644 --- a/Doc/using/cmdline.rst +++ b/Doc/using/cmdline.rst @@ -381,7 +381,7 @@ Miscellaneous options Hash randomization is intended to provide protection against a denial-of-service caused by carefully chosen inputs that exploit the worst case performance of a dict construction, *O*\ (*n*\ :sup:`2`) complexity. See - http://ocert.org/advisories/ocert-2011-003.html for details. + https://ocert.org/advisories/ocert-2011-003.html for details. :envvar:`PYTHONHASHSEED` allows you to set a fixed value for the hash seed secret. -- 2.47.3