File 0726-Small-cosmetic-fixes-in-Using-SSL-docs.patch of Package erlang

From e36ec2dc11cd0dac4d9296d63cd1e8cbbdafa4ad Mon Sep 17 00:00:00 2001
From: Andrea Leopardi <an.leopardi@gmail.com>
Date: Thu, 26 Sep 2024 10:01:03 +0200
Subject: [PATCH] Small cosmetic fixes in "Using SSL" docs

---
 lib/ssl/doc/guides/using_ssl.md | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/lib/ssl/doc/src/using_ssl.xml b/lib/ssl/doc/src/using_ssl.xml
index 4ea9f7fa0c..1f14dd28b2 100644
--- a/lib/ssl/doc/src/using_ssl.xml
+++ b/lib/ssl/doc/src/using_ssl.xml
@@ -38,14 +38,14 @@
     
   <p>To see all supported cipher suites, call <seemfa
   marker="ssl:ssl#cipher_suites/2"><c>ssl:cipher_suites(all,
-  'tlsv1.3')</c> </seemfa>.  The available cipher suites for a
+  'tlsv1.3')</c></seemfa>.  The available cipher suites for a
   connection depend on the TLS version and pre TLS-1.3 also on the
   certificate. To see the default cipher suite list change <c>all</c>
   to <c>default</c>.  Note that TLS 1.3 and previous versions do not
   have any cipher suites in common, for listing cipher suites for a
   specific version use <seemfa
   marker="ssl:ssl#cipher_suites/2"><c>ssl:cipher_suites(exclusive,
-  'tlsv1.3')</c> </seemfa>.  Specific cipher suites that you want your
+  'tlsv1.3')</c></seemfa>.  Specific cipher suites that you want your
   connection to use can also be specified. Default is to use the
   strongest available.</p>
 
@@ -96,7 +96,7 @@ ssl:listen(9999, [{certs_keys, [#{certfi
 {ok,{sslsocket, [...]}}</code>
 
 
-<note><p> ssl:transport_accept/1 and ssl:handshake/2 are separate functions so that
+<note><p> <c>ssl:transport_accept/1</c> and <c>ssl:handshake/2</c> are separate functions so that
 the handshake part can be called in a new erlang process dedicated to handling the
 connection</p>
 </note>
@@ -114,8 +114,8 @@ ok</code>
       <code type="erl">4 server> {ok, Socket} = ssl:handshake(TLSTransportSocket).
 {ok,{sslsocket, [...]}}</code>
 
-<note><p> A real server should use ssl:handshake/2 that has a timeout
-to avoid DoS attacks. In the example the timeout defaults to infinty.</p>
+<note><p> A real server should use <c>ssl:handshake/2</c> that has a timeout
+to avoid DoS attacks. In the example the timeout defaults to <c>infinty</c>.</p>
 </note>
 
       <p><em>Step 6:</em> Send a message over TLS:</p>
-- 
2.43.0

openSUSE Build Service is sponsored by