From dbe2500e0e36aefcbb1888a295492accd143609a Mon Sep 17 00:00:00 2001 From: "Miss Islington (bot)" <31488909+miss-islington@users.noreply.github.com> Date: Tue, 24 Mar 2026 02:51:43 +0100 Subject: [PATCH] [3.13] gh-145305: Update ocert.org URLs in docs from http to https (GH-145304) (GH-145323) (cherry picked from commit 11eec7a492670fff67fc083036d595f8498217db) Co-authored-by: indoor47 Co-authored-by: Adam (indoor47) --- Doc/reference/datamodel.rst | 2 +- Doc/using/cmdline.rst | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/Doc/reference/datamodel.rst b/Doc/reference/datamodel.rst index ed3337db21d5..bfb06d6e4461 100644 --- a/Doc/reference/datamodel.rst +++ b/Doc/reference/datamodel.rst @@ -2205,7 +2205,7 @@ Basic customization This is intended to provide protection against a denial-of-service caused by carefully chosen inputs that exploit the worst case performance of a dict insertion, *O*\ (*n*\ :sup:`2`) complexity. See - http://ocert.org/advisories/ocert-2011-003.html for details. + https://ocert.org/advisories/ocert-2011-003.html for details. Changing hash values affects the iteration order of sets. Python has never made guarantees about this ordering diff --git a/Doc/using/cmdline.rst b/Doc/using/cmdline.rst index 762579abeaf9..38c4e9e0bb90 100644 --- a/Doc/using/cmdline.rst +++ b/Doc/using/cmdline.rst @@ -378,7 +378,7 @@ Miscellaneous options Hash randomization is intended to provide protection against a denial-of-service caused by carefully chosen inputs that exploit the worst case performance of a dict construction, *O*\ (*n*\ :sup:`2`) complexity. See - http://ocert.org/advisories/ocert-2011-003.html for details. + https://ocert.org/advisories/ocert-2011-003.html for details. :envvar:`PYTHONHASHSEED` allows you to set a fixed value for the hash seed secret. -- 2.47.3