File 0726-Small-cosmetic-fixes-in-Using-SSL-docs.patch of Package erlang
From e36ec2dc11cd0dac4d9296d63cd1e8cbbdafa4ad Mon Sep 17 00:00:00 2001
From: Andrea Leopardi <an.leopardi@gmail.com>
Date: Thu, 26 Sep 2024 10:01:03 +0200
Subject: [PATCH] Small cosmetic fixes in "Using SSL" docs
---
lib/ssl/doc/guides/using_ssl.md | 12 ++++++------
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/lib/ssl/doc/src/using_ssl.xml b/lib/ssl/doc/src/using_ssl.xml
index 4ea9f7fa0c..1f14dd28b2 100644
--- a/lib/ssl/doc/src/using_ssl.xml
+++ b/lib/ssl/doc/src/using_ssl.xml
@@ -38,14 +38,14 @@
<p>To see all supported cipher suites, call <seemfa
marker="ssl:ssl#cipher_suites/2"><c>ssl:cipher_suites(all,
- 'tlsv1.3')</c> </seemfa>. The available cipher suites for a
+ 'tlsv1.3')</c></seemfa>. The available cipher suites for a
connection depend on the TLS version and pre TLS-1.3 also on the
certificate. To see the default cipher suite list change <c>all</c>
to <c>default</c>. Note that TLS 1.3 and previous versions do not
have any cipher suites in common, for listing cipher suites for a
specific version use <seemfa
marker="ssl:ssl#cipher_suites/2"><c>ssl:cipher_suites(exclusive,
- 'tlsv1.3')</c> </seemfa>. Specific cipher suites that you want your
+ 'tlsv1.3')</c></seemfa>. Specific cipher suites that you want your
connection to use can also be specified. Default is to use the
strongest available.</p>
@@ -96,7 +96,7 @@ ssl:listen(9999, [{certs_keys, [#{certfi
{ok,{sslsocket, [...]}}</code>
-<note><p> ssl:transport_accept/1 and ssl:handshake/2 are separate functions so that
+<note><p> <c>ssl:transport_accept/1</c> and <c>ssl:handshake/2</c> are separate functions so that
the handshake part can be called in a new erlang process dedicated to handling the
connection</p>
</note>
@@ -114,8 +114,8 @@ ok</code>
<code type="erl">4 server> {ok, Socket} = ssl:handshake(TLSTransportSocket).
{ok,{sslsocket, [...]}}</code>
-<note><p> A real server should use ssl:handshake/2 that has a timeout
-to avoid DoS attacks. In the example the timeout defaults to infinty.</p>
+<note><p> A real server should use <c>ssl:handshake/2</c> that has a timeout
+to avoid DoS attacks. In the example the timeout defaults to <c>infinty</c>.</p>
</note>
<p><em>Step 6:</em> Send a message over TLS:</p>
--
2.43.0