@@ -65,7 +65,7 @@ class Keypair(object):
6565 :vartype key: RSAKey or ECDSAKey
6666 :ivar key: private key
6767
68- :vartype certificates: list of X509
68+ :vartype certificates: list( X509)
6969 :ivar certificates: the certificates to send to peer if the key is selected
7070 for use. The first one MUST include the public key of the ``key``
7171 """
@@ -89,22 +89,22 @@ class VirtualHost(object):
8989 TODO: support SRP as alternative to certificates
9090 TODO: support PSK as alternative to certificates
9191
92- :vartype keys: list of :ref:`~ Keypair`
92+ :vartype keys: list( Keypair)
9393 :ivar keys: List of certificates and keys to be used in this
9494 virtual host. First keypair able to server ClientHello will be used.
9595
96- :vartype hostnames: set of bytes
96+ :vartype hostnames: set( bytes)
9797 :ivar hostnames: all the hostnames that server supports
98- please use :ref :`matches_hostname` to verify if the VirtualHost
98+ please use :py:meth :`matches_hostname` to verify if the VirtualHost
9999 can serve a request to a given hostname as that allows wildcard hosts
100100 that always reply True.
101101
102- :vartype trust_anchors: list of X509
102+ :vartype trust_anchors: list( X509)
103103 :ivar trust_anchors: list of CA certificates supported for client
104104 certificate authentication, sent in CertificateRequest
105105
106- :ivar app_protocols: all the application protocols that the server supports
107- (for ALPN)
106+ :ivar list(bytes) app_protocols: all the application protocols that the
107+ server supports (for ALPN)
108108 """
109109
110110 def __init__ (self ):
@@ -146,7 +146,7 @@ class HandshakeSettings(object):
146146 parameters larger than this length, an alert will be signalled.
147147 The default is 8193.
148148
149- :vartype cipherNames: list
149+ :vartype cipherNames: list(str)
150150 :ivar cipherNames: The allowed ciphers.
151151
152152 The allowed values in this list are 'chacha20-poly1305', 'aes256gcm',
@@ -160,22 +160,18 @@ class HandshakeSettings(object):
160160 choose whichever ciphersuite matches the earliest entry in this
161161 list.
162162
163- .. note:: If '3des' is used in this list, but TLS Lite can't find an
164- add-on library that supports 3DES, then '3des' will be silently
165- removed.
166-
167163 The default value is list that excludes 'rc4', 'null' and
168164 'chacha20-poly1305_draft00'.
169165
170- :vartype macNames: list
166+ :vartype macNames: list(str)
171167 :ivar macNames: The allowed MAC algorithms.
172168
173169 The allowed values in this list are 'sha384', 'sha256', 'aead', 'sha'
174170 and 'md5'.
175171
176172 The default value is list that excludes 'md5'.
177173
178- :vartype certificateTypes: list
174+ :vartype certificateTypes: list(str)
179175 :ivar certificateTypes: The allowed certificate types.
180176
181177 The only allowed certificate type is 'x509'. This list is only used
@@ -219,7 +215,7 @@ class HandshakeSettings(object):
219215 :vartype sendFallbackSCSV: bool
220216 :ivar sendFallbackSCSV: Whether to, as a client, send FALLBACK_SCSV.
221217
222- :vartype rsaSigHashes: list
218+ :vartype rsaSigHashes: list(str)
223219 :ivar rsaSigHashes: List of hashes supported (and advertised as such) for
224220 TLS 1.2 signatures over Server Key Exchange or Certificate Verify with
225221 RSA signature algorithm.
@@ -229,7 +225,7 @@ class HandshakeSettings(object):
229225 The allowed hashes are: "md5", "sha1", "sha224", "sha256",
230226 "sha384" and "sha512". The default list does not include md5.
231227
232- :vartype ecdsaSigHashes: list
228+ :vartype ecdsaSigHashes: list(str)
233229 :ivar ecdsaSigHashes: List of hashes supported (and advertised as such) for
234230 TLS 1.2 signatures over Server Key Exchange or Certificate Verify with
235231 ECDSA signature algorithm.
@@ -239,7 +235,7 @@ class HandshakeSettings(object):
239235 The allowed hashes are: "sha1", "sha224", "sha256",
240236 "sha384" and "sha512".
241237
242- :vartype eccCurves: list
238+ :vartype eccCurves: list(str)
243239 :ivar eccCurves: List of named curves that are to be supported
244240
245241 :vartype useEncryptThenMAC: bool
@@ -261,21 +257,22 @@ class HandshakeSettings(object):
261257 first curve for eccCurves and may be distinct from curves from that
262258 list.
263259
264- :vartype keyShares: list
260+ :vartype keyShares: list(str)
265261 :ivar keyShares: list of TLS 1.3 key shares to include in Client Hello
266262
267263 :vartype padding_cb: func
268264 :ivar padding_cb: Callback to function computing number of padding bytes
269265 for TLS 1.3. Signature is cb_func(msg_size, content_type, max_size).
270266
271- :vartype pskConfigs: list of tuples
267+ :vartype pskConfigs: list(tuple(bytearray, bytearray, bytearray))
272268 :ivar pskConfigs: list of tuples, first element of the tuple is the
273269 human readable, UTF-8 encoded, "identity" of the associated secret
274270 (bytearray, can be empty for TLS 1.2 and earlier), second element is
275271 the binary secret (bytearray), third is an optional parameter
276- specifying the PRF hash to be used in TLS 1.3 ('sha256' or 'sha384')
272+ specifying the PRF hash to be used in TLS 1.3 (``sha256`` or
273+ ``sha384``)
277274
278- :vartype ticketKeys: list of bytearray
275+ :vartype ticketKeys: list( bytearray)
279276 :ivar ticketKeys: keys to be used for encrypting and decrypting session
280277 tickets. First entry is the encryption key for new tickets and the
281278 default decryption key, subsequent entries are the fallback keys
@@ -296,7 +293,7 @@ class HandshakeSettings(object):
296293 :ivar ticketLifetime: maximum allowed lifetime of ticket encryption key,
297294 in seconds. 1 day by default
298295
299- :vartype psk_modes: list
296+ :vartype psk_modes: list(str)
300297 :ivar psk_modes: acceptable modes for the PSK key exchange in TLS 1.3
301298
302299 :ivar int max_early_data: maximum number of bytes acceptable for 0-RTT
@@ -312,8 +309,8 @@ class HandshakeSettings(object):
312309 :ivar heartbeat_response_callback: Callback to function when Heartbeat
313310 response is received.
314311
315- :vartype record_size_limit: int
316- :ivar record_size_limit: maximum size of records we are willing to process
312+ :vartype ~. record_size_limit: int
313+ :ivar ~. record_size_limit: maximum size of records we are willing to process
317314 (value advertised to the other side). It must not be larger than
318315 2**14+1 (the maximum for TLS 1.3) and will be reduced to 2**14 if TLS
319316 1.2 or lower is the highest enabled version. Must not be set to values
0 commit comments