doc: fix some cross-references
authorAlexander Gromnitsky <alexander.gromnitsky@gmail.com>
Sat, 2 May 2015 03:58:40 +0000 (06:58 +0300)
committerRoman Reiss <me@silverwind.io>
Sat, 2 May 2015 12:07:21 +0000 (14:07 +0200)
PR-URL: https://github.com/iojs/io.js/pull/1584
Reviewed-By: Roman Reiss <me@silverwind.io>
doc/api/crypto.markdown
doc/api/http.markdown
doc/api/https.markdown
doc/api/net.markdown
doc/api/process.markdown
doc/api/tls.markdown

index 03687c7..1a181e7 100644 (file)
@@ -763,10 +763,10 @@ temporary measure.
 
 [createCipher()]: #crypto_crypto_createcipher_algorithm_password
 [createCipheriv()]: #crypto_crypto_createcipheriv_algorithm_key_iv
-[crypto.createDiffieHellman()]: #crypto_crypto_creatediffiehellman_prime_encoding
+[crypto.createDiffieHellman()]: #crypto_crypto_creatediffiehellman_prime_prime_encoding_generator_generator_encoding
 [tls.createSecureContext]: tls.html#tls_tls_createsecurecontext_details
 [diffieHellman.setPublicKey()]: #crypto_diffiehellman_setpublickey_public_key_encoding
 [RFC 2412]: http://www.rfc-editor.org/rfc/rfc2412.txt
 [RFC 3526]: http://www.rfc-editor.org/rfc/rfc3526.txt
-[crypto.pbkdf2]: #crypto_crypto_pbkdf2_password_salt_iterations_keylen_callback
+[crypto.pbkdf2]: #crypto_crypto_pbkdf2_password_salt_iterations_keylen_digest_callback
 [EVP_BytesToKey]: https://www.openssl.org/docs/crypto/EVP_BytesToKey.html
index 2c4e268..245b5d7 100644 (file)
@@ -201,7 +201,7 @@ already been bound to a port or domain socket.
 Listening on a file descriptor is not supported on Windows.
 
 This function is asynchronous. The last parameter `callback` will be added as
-a listener for the ['listening'](net.html#event_listening_) event.
+a listener for the ['listening'](net.html#net_event_listening) event.
 See also [net.Server.listen()](net.html#net_server_listen_handle_callback).
 
 ### server.close([callback])
@@ -1082,11 +1082,11 @@ authentication details.
 [http.request()]: #http_http_request_options_callback
 [net.Server.close()]: net.html#net_server_close_callback
 [net.Server.listen(path)]: net.html#net_server_listen_path_callback
-[net.Server.listen(port)]: net.html#net_server_listen_port_host_backlog_callback
-[response.end()]: #http_response_end_data_encoding
-[response.write()]: #http_response_write_chunk_encoding
+[net.Server.listen(port)]: net.html#net_server_listen_port_hostname_backlog_callback
+[response.end()]: #http_response_end_data_encoding_callback
+[response.write()]: #http_response_write_chunk_encoding_callback
 [response.writeContinue()]: #http_response_writecontinue
-[response.writeHead()]: #http_response_writehead_statuscode_reasonphrase_headers
+[response.writeHead()]: #http_response_writehead_statuscode_statusmessage_headers
 [socket.setKeepAlive()]: net.html#net_socket_setkeepalive_enable_initialdelay
 [socket.setNoDelay()]: net.html#net_socket_setnodelay_nodelay
 [socket.setTimeout()]: net.html#net_socket_settimeout_timeout_callback
index 8a44c27..4a46760 100644 (file)
@@ -70,7 +70,7 @@ See [http.close()][] for details.
 Makes a request to a secure web server.
 
 `options` can be an object or a string. If `options` is a string, it is
-automatically parsed with [url.parse()](url.html#url.parse).
+automatically parsed with [url.parse()](url.html#url_url_parse_urlstr_parsequerystring_slashesdenotehost).
 
 All options from [http.request()][] are valid.
 
@@ -187,7 +187,7 @@ Example:
 Like `http.get()` but for HTTPS.
 
 `options` can be an object or a string. If `options` is a string, it is
-automatically parsed with [url.parse()](url.html#url.parse).
+automatically parsed with [url.parse()](url.html#url_url_parse_urlstr_parsequerystring_slashesdenotehost).
 
 Example:
 
index aadf8a8..0c61d4c 100644 (file)
@@ -209,7 +209,7 @@ the last parameter `callback` will be added as an listener for the
 The `port`, `host`, and `backlog` properties of `options`, as well as the
 optional callback function, behave as they do on a call to
 [server.listen(port, \[host\], \[backlog\], \[callback\])
-](#net_server_listen_port_host_backlog_callback). Alternatively, the `path`
+](#net_server_listen_port_hostname_backlog_callback). Alternatively, the `path`
 option can be used to specify a UNIX socket.
 
 If `exclusive` is `false` (default), then cluster workers will use the same
@@ -610,5 +610,5 @@ Returns true if input is a version 6 IP address, otherwise returns false.
 ['listening']: #net_event_listening
 [server.getConnections()]: #net_server_getconnections_callback
 [Readable Stream]: stream.html#stream_class_stream_readable
-[stream.setEncoding()]: stream.html#stream_stream_setencoding_encoding
-[dns.lookup()]: dns.html#dns_dns_lookup_domain_family_callback
+[stream.setEncoding()]: stream.html#stream_readable_setencoding_encoding
+[dns.lookup()]: dns.html#dns_dns_lookup_hostname_options_callback
index 179d39b..ebff3d6 100644 (file)
@@ -304,7 +304,7 @@ Example of opening standard input and listening for both events:
 As a Stream, `process.stdin` can also be used in "old" mode that is compatible
 with scripts written for node.js prior to v0.10.
 For more information see
-[Stream compatibility](stream.html#stream_compatibility_with_older_node_versions).
+[Stream compatibility](stream.html#stream_compatibility_with_older_node_js_versions).
 
 In "old" Streams mode the stdin stream is paused by default, so one
 must call `process.stdin.resume()` to read from it. Note also that calling
index 38649b5..a44d4dd 100644 (file)
@@ -786,7 +786,7 @@ The numeric representation of the local port.
 [OpenSSL cipher list format documentation]: http://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT
 [BEAST attacks]: http://blog.ivanristic.com/2011/10/mitigating-the-beast-attack-on-tls.html
 [tls.createServer]: #tls_tls_createserver_options_secureconnectionlistener
-[tls.createSecurePair]: #tls_tls_createsecurepair_credentials_isserver_requestcert_rejectunauthorized
+[tls.createSecurePair]: #tls_tls_createsecurepair_context_isserver_requestcert_rejectunauthorized
 [tls.TLSSocket]: #tls_class_tls_tlssocket
 [net.Server]: net.html#net_class_net_server
 [net.Socket]: net.html#net_class_net_socket