summaryrefslogtreecommitdiff
path: root/doc/api/tls.md
diff options
context:
space:
mode:
authorVse Mozhet Byt <vsemozhetbyt@gmail.com>2018-04-02 08:38:48 +0300
committerVse Mozhet Byt <vsemozhetbyt@gmail.com>2018-04-04 13:45:39 +0300
commitde0053cc3280bdf72c9010f383290f79120a1e98 (patch)
tree493fc9bd84c3d8e97342202d0a840b4fe29bdd6e /doc/api/tls.md
parent237cbe10fb82ba6ec69b14193a4a970e184306e7 (diff)
downloadandroid-node-v8-de0053cc3280bdf72c9010f383290f79120a1e98.tar.gz
android-node-v8-de0053cc3280bdf72c9010f383290f79120a1e98.tar.bz2
android-node-v8-de0053cc3280bdf72c9010f383290f79120a1e98.zip
doc: fix various nits
* Replace 2 hyphens (--) by spaced m-dashes (—) as per STYLE_GUIDE.md. * Space infix operators. * Unify quotes in inline code spans (use only single quotes). * Unify `* Returns:` (eliminate deviations). * Dedupe spaces. PR-URL: https://github.com/nodejs/node/pull/19743 Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Trivikram Kamat <trivikr.dev@gmail.com>
Diffstat (limited to 'doc/api/tls.md')
-rw-r--r--doc/api/tls.md16
1 files changed, 8 insertions, 8 deletions
diff --git a/doc/api/tls.md b/doc/api/tls.md
index a4328eda31..4eb4898a32 100644
--- a/doc/api/tls.md
+++ b/doc/api/tls.md
@@ -366,7 +366,7 @@ added: v0.6.0
-->
Returns the bound address, the address family name, and port of the
-server as reported by the operating system. See [`net.Server.address()`][] for
+server as reported by the operating system. See [`net.Server.address()`][] for
more information.
### server.close([callback])
@@ -628,7 +628,7 @@ For example:
raw: < RAW DER buffer >,
pubkey: < RAW DER buffer >,
valid_from: 'Nov 11 09:52:22 2009 GMT',
- valid_to: 'Nov 6 09:52:22 2029 GMT',
+ valid_to: 'Nov 6 09:52:22 2029 GMT',
fingerprint: '2A:7A:C2:DD:E5:F9:CC:53:72:35:99:7A:02:5A:71:38:52:EC:8A:DF',
fingerprint256: '2A:7A:C2:DD:E5:F9:CC:53:72:35:99:7A:02:5A:71:38:52:EC:8A:DF:00:11:22:33:44:55:66:77:88:99:AA:BB',
serialNumber: 'B9B0D332A1AA5635' }
@@ -851,7 +851,7 @@ changes:
rather than creating a new socket. Typically, this is an instance of
[`net.Socket`][], but any `Duplex` stream is allowed.
If this option is specified, `path`, `host` and `port` are ignored,
- except for certificate validation. Usually, a socket is already connected
+ except for certificate validation. Usually, a socket is already connected
when passed to `tls.connect()`, but it can be connected later. Note that
connection/disconnection/destruction of `socket` is the user's
responsibility, calling `tls.connect()` will not cause `net.connect()` to be
@@ -1010,7 +1010,7 @@ changes:
it is not.
* `key` {string|string[]|Buffer|Buffer[]|Object[]} Optional private keys in
PEM format. PEM allows the option of private keys being encrypted. Encrypted
- keys will be decrypted with `options.passphrase`. Multiple keys using
+ keys will be decrypted with `options.passphrase`. Multiple keys using
different algorithms can be provided either as an array of unencrypted key
strings or buffers, or an array of objects in the form `{pem:
<string|buffer>[, passphrase: <string>]}`. The object form can only occur in
@@ -1023,7 +1023,7 @@ changes:
consist of the PEM formatted certificate for a provided private `key`,
followed by the PEM formatted intermediate certificates (if any), in order,
and not including the root CA (the root CA must be pre-known to the peer,
- see `ca`). When providing multiple cert chains, they do not have to be in
+ see `ca`). When providing multiple cert chains, they do not have to be in
the same order as their private keys in `key`. If the intermediate
certificates are not provided, the peer will not be able to validate the
certificate, and the handshake will fail.
@@ -1033,7 +1033,7 @@ changes:
using this option. The value can be a string or Buffer, or an Array of
strings and/or Buffers. Any string or Buffer can contain multiple PEM CAs
concatenated together. The peer's certificate must be chainable to a CA
- trusted by the server for the connection to be authenticated. When using
+ trusted by the server for the connection to be authenticated. When using
certificates that are not chainable to a well-known CA, the certificate's CA
must be explicitly specified as a trusted or the connection will fail to
authenticate.
@@ -1043,7 +1043,7 @@ changes:
For self-signed certificates, the certificate is its own CA, and must be
provided.
* `ciphers` {string} Optional cipher suite specification, replacing the
- default. For more information, see [modifying the default cipher suite][].
+ default. For more information, see [modifying the default cipher suite][].
* `honorCipherOrder` {boolean} Attempt to use the server's cipher suite
preferences instead of the client's. When `true`, causes
`SSL_OP_CIPHER_SERVER_PREFERENCE` to be set in `secureOptions`, see
@@ -1144,7 +1144,7 @@ changes:
servers, the identity options (`pfx` or `key`/`cert`) are usually required.
* `secureConnectionListener` {Function}
-Creates a new [tls.Server][]. The `secureConnectionListener`, if provided, is
+Creates a new [tls.Server][]. The `secureConnectionListener`, if provided, is
automatically set as a listener for the [`'secureConnection'`][] event.
The `ticketKeys` options is automatically shared between `cluster` module