From 7090827c70d21826c66fed092247e3773c318150 Mon Sep 17 00:00:00 2001
From: Ingela Anderton Andin
Date: Tue, 7 Apr 2015 16:05:41 +0200
Subject: ssl: Align with editorial changes
---
lib/ssl/doc/src/ssl.xml | 22 +++++++++++-----------
lib/ssl/doc/src/ssl_crl_cache_api.xml | 2 +-
2 files changed, 12 insertions(+), 12 deletions(-)
(limited to 'lib')
diff --git a/lib/ssl/doc/src/ssl.xml b/lib/ssl/doc/src/ssl.xml
index eb31b35e1e..f357e90526 100644
--- a/lib/ssl/doc/src/ssl.xml
+++ b/lib/ssl/doc/src/ssl.xml
@@ -345,7 +345,7 @@ marker="public_key:public_key#pkix_path_validation-3">public_key:pkix_path_valid
- {crl_check, boolean() | peer | best_effort }
+ {crl_check, boolean() | peer | best_effort }
-
Perform CRL (Certificate Revocation List) verification
@@ -368,12 +368,12 @@ marker="public_key:public_key#pkix_path_validation-3">public_key:pkix_path_valid
ssl_crl_cache_api(3).
- {crl_cache, {Module :: atom(), {DbHandle :: internal | term(), Args :: list()}}}
+ {crl_cache, {Module :: atom(), {DbHandle :: internal | term(), Args :: list()}}}
-
Module defaults to ssl_crl_cache with DbHandle internal and an
empty argument list. The following arguments may be specified for the internal cache.
- {http, timeout()}
+ {http, timeout()}
-
Enables fetching of CRLs specified as http URIs in X509 cerificate extensions.
@@ -462,7 +462,7 @@ fun(srp, Username :: string(), UserState :: term()) ->
client certificate chain.
- {alpn_advertised_protocols, [binary()]}
+ {{alpn_advertised_protocols, [binary()]}
-
The list of protocols supported by the client to be sent to the
server to be used for an Application-Layer Protocol Negotiation (ALPN).
@@ -475,8 +475,8 @@ fun(srp, Username :: string(), UserState :: term()) ->
The negotiated protocol can be retrieved using the negotiated_protocol/1 function.
- {client_preferred_next_protocols, {Precedence :: server | client, ClientPrefs :: [binary()]}}
- {client_preferred_next_protocols, {Precedence :: server | client, ClientPrefs :: [binary()], Default :: binary()}}
+ {client_preferred_next_protocols, {Precedence :: server | client, ClientPrefs :: [binary()]}}
+ {client_preferred_next_protocols, {Precedence :: server | client, ClientPrefs :: [binary()], Default :: binary()}}
-
Indicates that the client is to try to perform Next Protocol
Negotiation.
@@ -518,7 +518,7 @@ fun(srp, Username :: string(), UserState :: term()) ->
Indication extension is sent if possible. This option can also be
used to disable that behavior.
- {fallback, boolean()}
+ {fallback, boolean()}
-
Send special cipher suite TLS_FALLBACK_SCSV to avoid undesired TLS version downgrade.
Defaults to false
@@ -594,7 +594,7 @@ fun(srp, Username :: string(), UserState :: term()) ->
a DER-encoded certificate, Compression is an enumeration integer,
and CipherSuite is of type ciphersuite().
- {alpn_preferred_protocols, [binary()]}
+ {alpn_preferred_protocols, [binary()]}
-
Indicates the server will try to perform Application-Layer
Protocol Negotiation (ALPN).
@@ -1066,10 +1066,10 @@ fun(srp, Username :: string(), UserState :: term()) ->
Returns version information relevant for the ssl
application.
- app_vsn
+ app_vsn
- The application version of the ssl application.
- supported
+ supported
- TLS/SSL versions supported by default.
Overridden by a version option on
connect/[2,3,4],
@@ -1079,7 +1079,7 @@ fun(srp, Username :: string(), UserState :: term()) ->
marker="#connection_info-1">ssl:connection_info/1
.
- available
+ available
- All TLS/SSL versions supported by the ssl application.
TLS 1.2 requires sufficient support from the crypto
application.
diff --git a/lib/ssl/doc/src/ssl_crl_cache_api.xml b/lib/ssl/doc/src/ssl_crl_cache_api.xml
index d18eadd2f2..dafb067131 100644
--- a/lib/ssl/doc/src/ssl_crl_cache_api.xml
+++ b/lib/ssl/doc/src/ssl_crl_cache_api.xml
@@ -40,7 +40,7 @@
- Common Data Types
+ DATA TYPES
The following data types are used in the functions below:
--
cgit v1.2.3