https://github.com/python/cpython/commit/dbd8985e8262055ed091de9a72660b7c112a4ce7
commit: dbd8985e8262055ed091de9a72660b7c112a4ce7
branch: main
author: Jan Brasna <[email protected]>
committer: gpshead <[email protected]>
date: 2026-05-18T18:01:56Z
summary:
gh-95816: Fix TLS version range example in docs (GH-148574)
docs(ssl): Fix TLS version range example
files:
M Doc/library/ssl.rst
diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst
index d9c736d27dcaec..b180673f22973e 100644
--- a/Doc/library/ssl.rst
+++ b/Doc/library/ssl.rst
@@ -2076,7 +2076,7 @@ to speed up repeated connections from the same clients.
:attr:`~SSLContext.minimum_version` and
:attr:`SSLContext.options` all affect the supported SSL
and TLS versions of the context. The implementation does not prevent
- invalid combination. For example a context with
+ invalid combinations. For example a context with
:attr:`OP_NO_TLSv1_2` in :attr:`~SSLContext.options` and
:attr:`~SSLContext.maximum_version` set to :attr:`TLSVersion.TLSv1_2`
will not be able to establish a TLS 1.2 connection.
@@ -2891,11 +2891,11 @@ disabled by default.
::
>>> client_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
- >>> client_context.minimum_version = ssl.TLSVersion.TLSv1_3
+ >>> client_context.minimum_version = ssl.TLSVersion.TLSv1_2
>>> client_context.maximum_version = ssl.TLSVersion.TLSv1_3
-The SSL context created above will only allow TLSv1.3 and later (if
+The SSL client context created above will only allow TLSv1.2 and TLSv1.3 (if
supported by your system) connections to a server. :const:`PROTOCOL_TLS_CLIENT`
implies certificate validation and hostname checks by default. You have to
load certificates into the context.
_______________________________________________
Python-checkins mailing list -- [email protected]
To unsubscribe send an email to [email protected]
https://mail.python.org/mailman3//lists/python-checkins.python.org
Member address: [email protected]