You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Doc/howto/unicode.rst
+1-1
Original file line number
Diff line number
Diff line change
@@ -214,7 +214,7 @@ difficult reading. `A chronology <http://www.unicode.org/history/>`_ of the
214
214
origin and development of Unicode is also available on the site.
215
215
216
216
To help understand the standard, Jukka Korpela has written `an introductory
217
-
guide <https://www.cs.tut.fi/~jkorpela/unicode/guide.html>`_ to reading the
217
+
guide <http://jkorpela.fi/unicode/guide.html>`_ to reading the
218
218
Unicode character tables.
219
219
220
220
Another `good introductory article <https://www.joelonsoftware.com/2003/10/08/the-absolute-minimum-every-software-developer-absolutely-positively-must-know-about-unicode-and-character-sets-no-excuses/>`_
The *cadata* object, if present, is either an ASCII string of one or more
1380
1380
PEM-encoded certificates or a :term:`bytes-like object` of DER-encoded
@@ -1501,8 +1501,8 @@ to speed up repeated connections from the same clients.
1501
1501
Specify which protocols the socket should advertise during the SSL/TLS
1502
1502
handshake. It should be a list of strings, like ``['http/1.1', 'spdy/2']``,
1503
1503
ordered by preference. The selection of a protocol will happen during the
1504
-
handshake, and will play out according to the `NPN draft specification
1505
-
<https://tools.ietf.org/html/draft-agl-tls-nextprotoneg>`_. After a
1504
+
handshake, and will play out according to the `Application Layer Protocol Negotiation
1505
+
<https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_. After a
1506
1506
successful handshake, the :meth:`SSLSocket.selected_npn_protocol` method will
1507
1507
return the agreed-upon protocol.
1508
1508
@@ -1663,8 +1663,7 @@ to speed up repeated connections from the same clients.
1663
1663
.. method:: SSLContext.session_stats()
1664
1664
1665
1665
Get statistics about the SSL sessions created or managed by this context.
1666
-
A dictionary is returned which maps the names of each `piece of information
1667
-
<https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_sess_number.html>`_ to their
1666
+
A dictionary is returned which maps the names of each `piece of information <https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_sess_number.html>`_ to their
1668
1667
numeric values. For example, here is the total number of hits and misses
1669
1668
in the session cache since the context was created::
1670
1669
@@ -2365,7 +2364,7 @@ enabled when negotiating a SSL session is possible through the
2365
2364
:meth:`SSLContext.set_ciphers` method. Starting from Python 3.2.3, the
2366
2365
ssl module disables certain weak ciphers by default, but you may want
2367
2366
to further restrict the cipher choice. Be sure to read OpenSSL's documentation
2368
-
about the `cipher list format <https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT>`_.
2367
+
about the `cipher list format <https://www.openssl.org/docs/manmaster/man1/ciphers.html#CIPHER-LIST-FORMAT>`_.
2369
2368
If you want to check which ciphers are enabled by a given cipher list, use
2370
2369
:meth:`SSLContext.get_ciphers` or the ``openssl ciphers`` command on your
2371
2370
system.
@@ -2393,10 +2392,10 @@ successful call of :func:`~ssl.RAND_add`, :func:`~ssl.RAND_bytes` or
2393
2392
`RFC 1422: Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management <https://www.ietf.org/rfc/rfc1422>`_
2394
2393
Steve Kent
2395
2394
2396
-
`RFC 4086: Randomness Requirements for Security <http://datatracker.ietf.org/doc/rfc4086/>`_
2395
+
`RFC 4086: Randomness Requirements for Security <https://datatracker.ietf.org/doc/rfc4086/>`_
2397
2396
Donald E., Jeffrey I. Schiller
2398
2397
2399
-
`RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile <http://datatracker.ietf.org/doc/rfc5280/>`_
2398
+
`RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile <https://datatracker.ietf.org/doc/rfc5280/>`_
2400
2399
D. Cooper
2401
2400
2402
2401
`RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2 <https://tools.ietf.org/html/rfc5246>`_
0 commit comments