Browse Source

doc: fix some cross-references

PR-URL: https://github.com/iojs/io.js/pull/1584
Reviewed-By: Roman Reiss <me@silverwind.io>
v2.0.2
Alexander Gromnitsky 10 years ago
committed by Roman Reiss
parent
commit
02388dbf40
  1. 4
      doc/api/crypto.markdown
  2. 10
      doc/api/http.markdown
  3. 4
      doc/api/https.markdown
  4. 6
      doc/api/net.markdown
  5. 2
      doc/api/process.markdown
  6. 2
      doc/api/tls.markdown

4
doc/api/crypto.markdown

@ -763,10 +763,10 @@ temporary measure.
[createCipher()]: #crypto_crypto_createcipher_algorithm_password
[createCipheriv()]: #crypto_crypto_createcipheriv_algorithm_key_iv
[crypto.createDiffieHellman()]: #crypto_crypto_creatediffiehellman_prime_encoding
[crypto.createDiffieHellman()]: #crypto_crypto_creatediffiehellman_prime_prime_encoding_generator_generator_encoding
[tls.createSecureContext]: tls.html#tls_tls_createsecurecontext_details
[diffieHellman.setPublicKey()]: #crypto_diffiehellman_setpublickey_public_key_encoding
[RFC 2412]: http://www.rfc-editor.org/rfc/rfc2412.txt
[RFC 3526]: http://www.rfc-editor.org/rfc/rfc3526.txt
[crypto.pbkdf2]: #crypto_crypto_pbkdf2_password_salt_iterations_keylen_callback
[crypto.pbkdf2]: #crypto_crypto_pbkdf2_password_salt_iterations_keylen_digest_callback
[EVP_BytesToKey]: https://www.openssl.org/docs/crypto/EVP_BytesToKey.html

10
doc/api/http.markdown

@ -201,7 +201,7 @@ already been bound to a port or domain socket.
Listening on a file descriptor is not supported on Windows.
This function is asynchronous. The last parameter `callback` will be added as
a listener for the ['listening'](net.html#event_listening_) event.
a listener for the ['listening'](net.html#net_event_listening) event.
See also [net.Server.listen()](net.html#net_server_listen_handle_callback).
### server.close([callback])
@ -1082,11 +1082,11 @@ authentication details.
[http.request()]: #http_http_request_options_callback
[net.Server.close()]: net.html#net_server_close_callback
[net.Server.listen(path)]: net.html#net_server_listen_path_callback
[net.Server.listen(port)]: net.html#net_server_listen_port_host_backlog_callback
[response.end()]: #http_response_end_data_encoding
[response.write()]: #http_response_write_chunk_encoding
[net.Server.listen(port)]: net.html#net_server_listen_port_hostname_backlog_callback
[response.end()]: #http_response_end_data_encoding_callback
[response.write()]: #http_response_write_chunk_encoding_callback
[response.writeContinue()]: #http_response_writecontinue
[response.writeHead()]: #http_response_writehead_statuscode_reasonphrase_headers
[response.writeHead()]: #http_response_writehead_statuscode_statusmessage_headers
[socket.setKeepAlive()]: net.html#net_socket_setkeepalive_enable_initialdelay
[socket.setNoDelay()]: net.html#net_socket_setnodelay_nodelay
[socket.setTimeout()]: net.html#net_socket_settimeout_timeout_callback

4
doc/api/https.markdown

@ -70,7 +70,7 @@ See [http.close()][] for details.
Makes a request to a secure web server.
`options` can be an object or a string. If `options` is a string, it is
automatically parsed with [url.parse()](url.html#url.parse).
automatically parsed with [url.parse()](url.html#url_url_parse_urlstr_parsequerystring_slashesdenotehost).
All options from [http.request()][] are valid.
@ -187,7 +187,7 @@ Example:
Like `http.get()` but for HTTPS.
`options` can be an object or a string. If `options` is a string, it is
automatically parsed with [url.parse()](url.html#url.parse).
automatically parsed with [url.parse()](url.html#url_url_parse_urlstr_parsequerystring_slashesdenotehost).
Example:

6
doc/api/net.markdown

@ -209,7 +209,7 @@ the last parameter `callback` will be added as an listener for the
The `port`, `host`, and `backlog` properties of `options`, as well as the
optional callback function, behave as they do on a call to
[server.listen(port, \[host\], \[backlog\], \[callback\])
](#net_server_listen_port_host_backlog_callback). Alternatively, the `path`
](#net_server_listen_port_hostname_backlog_callback). Alternatively, the `path`
option can be used to specify a UNIX socket.
If `exclusive` is `false` (default), then cluster workers will use the same
@ -610,5 +610,5 @@ Returns true if input is a version 6 IP address, otherwise returns false.
['listening']: #net_event_listening
[server.getConnections()]: #net_server_getconnections_callback
[Readable Stream]: stream.html#stream_class_stream_readable
[stream.setEncoding()]: stream.html#stream_stream_setencoding_encoding
[dns.lookup()]: dns.html#dns_dns_lookup_domain_family_callback
[stream.setEncoding()]: stream.html#stream_readable_setencoding_encoding
[dns.lookup()]: dns.html#dns_dns_lookup_hostname_options_callback

2
doc/api/process.markdown

@ -304,7 +304,7 @@ Example of opening standard input and listening for both events:
As a Stream, `process.stdin` can also be used in "old" mode that is compatible
with scripts written for node.js prior to v0.10.
For more information see
[Stream compatibility](stream.html#stream_compatibility_with_older_node_versions).
[Stream compatibility](stream.html#stream_compatibility_with_older_node_js_versions).
In "old" Streams mode the stdin stream is paused by default, so one
must call `process.stdin.resume()` to read from it. Note also that calling

2
doc/api/tls.markdown

@ -786,7 +786,7 @@ The numeric representation of the local port.
[OpenSSL cipher list format documentation]: http://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT
[BEAST attacks]: http://blog.ivanristic.com/2011/10/mitigating-the-beast-attack-on-tls.html
[tls.createServer]: #tls_tls_createserver_options_secureconnectionlistener
[tls.createSecurePair]: #tls_tls_createsecurepair_credentials_isserver_requestcert_rejectunauthorized
[tls.createSecurePair]: #tls_tls_createsecurepair_context_isserver_requestcert_rejectunauthorized
[tls.TLSSocket]: #tls_class_tls_tlssocket
[net.Server]: net.html#net_class_net_server
[net.Socket]: net.html#net_class_net_socket

Loading…
Cancel
Save