@@ -1339,20 +1339,9 @@ If you are going to require validation of the other side of the connection's
13391339certificate, you need to provide a "CA certs" file, filled with the certificate
13401340chains for each issuer you are willing to trust. Again, this file just contains
13411341these chains concatenated together. For validation, Python will use the first
1342- chain it finds in the file which matches. Some "standard" root certificates are
1343- available from various certification authorities: `CACert.org
1344- <http://www.cacert.org/index.php?id=3> `_, `Thawte
1345- <http://www.thawte.com/roots/> `_, `Verisign
1346- <http://www.verisign.com/support/roots.html> `_, `Positive SSL
1347- <http://www.PositiveSSL.com/ssl-certificate-support/cert_installation/UTN-USERFirst-Hardware.crt> `_
1348- (used by python.org), `Equifax and GeoTrust
1349- <http://www.geotrust.com/resources/root_certificates/index.asp> `_.
1350-
1351- In general, if you are using SSL3 or TLS1, you don't need to put the full chain
1352- in your "CA certs" file; you only need the root certificates, and the remote
1353- peer is supposed to furnish the other certificates necessary to chain from its
1354- certificate to a root certificate. See :rfc: `4158 ` for more discussion of the
1355- way in which certification chains can be built.
1342+ chain it finds in the file which matches. The platform's certificates file can
1343+ be used by calling :meth: `SSLContext.load_default_certs `, this is done
1344+ automatically with :func: `.create_default_context `.
13561345
13571346Combined key and certificate
13581347^^^^^^^^^^^^^^^^^^^^^^^^^^^^
0 commit comments