aboutsummaryrefslogtreecommitdiffstats
path: root/lib
diff options
context:
space:
mode:
authorIngela Anderton Andin <[email protected]>2016-06-16 15:15:25 +0200
committerIngela Anderton Andin <[email protected]>2016-06-16 15:15:25 +0200
commit06052cba84436becbef02a571d15c55e2ffdab31 (patch)
tree11f44ba099242f72a252da227fd8984bcfa0e420 /lib
parentde8a3598cd8886fcf4542c20914c3d9b5863ad66 (diff)
parent263414018d721bb3c74be5bd96b30ab0cec54403 (diff)
downloadotp-06052cba84436becbef02a571d15c55e2ffdab31.tar.gz
otp-06052cba84436becbef02a571d15c55e2ffdab31.tar.bz2
otp-06052cba84436becbef02a571d15c55e2ffdab31.zip
Merge branch 'ingela/ssl/xmllint-doc'
* ingela/ssl/xmllint-doc: ssl: Fix Xmllint errors
Diffstat (limited to 'lib')
-rw-r--r--lib/ssl/doc/src/ssl.xml19
-rw-r--r--lib/ssl/doc/src/ssl_app.xml4
2 files changed, 12 insertions, 11 deletions
diff --git a/lib/ssl/doc/src/ssl.xml b/lib/ssl/doc/src/ssl.xml
index 4ea000802f..abba5aaf59 100644
--- a/lib/ssl/doc/src/ssl.xml
+++ b/lib/ssl/doc/src/ssl.xml
@@ -464,10 +464,12 @@ fun(srp, Username :: string(), UserState :: term()) ->
<tag><c>{padding_check, boolean()}</c></tag>
<item><p>Affects TLS-1.0 connections only.
If set to <c>false</c>, it disables the block cipher padding check
- to be able to interoperate with legacy software.</p></item>
-
- <warning><p>Using <c>{padding_check, boolean()}</c> makes TLS
+ to be able to interoperate with legacy software.</p>
+ <warning><p>Using <c>{padding_check, boolean()}</c> makes TLS
vulnerable to the Poodle attack.</p></warning>
+ </item>
+
+
<tag><c>{beast_mitigation, one_n_minus_one | zero_n | disabled}</c></tag>
<item><p>Affects SSL-3.0 and TLS-1.0 connections only. Used to change the BEAST
@@ -478,11 +480,12 @@ fun(srp, Username :: string(), UserState :: term()) ->
<p><c>zero_n</c> - Perform 0/n BEAST mitigation.</p>
- <p><c>disabled</c> - Disable BEAST mitigation.</p></item>
+ <p><c>disabled</c> - Disable BEAST mitigation.</p>
- <warning><p>Using <c>{beast_mitigation, disabled}</c> makes SSL or TLS
+ <warning><p>Using <c>{beast_mitigation, disabled}</c> makes SSL or TLS
vulnerable to the BEAST attack.</p></warning>
- </taglist>
+ </item>
+ </taglist>
</section>
@@ -595,7 +598,7 @@ fun(srp, Username :: string(), UserState :: term()) ->
TLS handshake. If no lower TLS versions than 1.2 are supported,
the client will send a TLS signature algorithm extension
with the algorithms specified by this option.
- Defaults to
+ Defaults to</p>
<code>[
%% SHA2
@@ -612,7 +615,7 @@ fun(srp, Username :: string(), UserState :: term()) ->
{sha, rsa},
{sha, dsa},
]</code>
-
+<p>
The algorithms should be in the preferred order.
Selected signature algorithm can restrict which hash functions
that may be selected. Default support for {md5, rsa} removed in ssl-8.0
diff --git a/lib/ssl/doc/src/ssl_app.xml b/lib/ssl/doc/src/ssl_app.xml
index e50ffdbfe6..0b3fa9a8a9 100644
--- a/lib/ssl/doc/src/ssl_app.xml
+++ b/lib/ssl/doc/src/ssl_app.xml
@@ -109,7 +109,7 @@
<item><p>List of extra user-defined arguments to the <c>init</c> function
in the session cache callback module. Defaults to <c>[]</c>.</p></item>
- <tag><c><![CDATA[session_cache_client_max = integer() <optional>]]></c><br/>
+ <tag><c><![CDATA[session_cache_client_max = integer() <optional>]]></c><br/></tag>
<item><p>Limits the growth of the clients session cache, that is
how many sessions towards servers that are cached to be used by
new client connections. If the maximum number of sessions is
@@ -142,8 +142,6 @@
shutdown gracefully. Defaults to 5000 milliseconds.
</p>
</item>
- </tag>
-
</taglist>
</section>