Skip to content
Browse files

doc: replace wrong U+00A0 by common spaces

PR-URL: #17940
Reviewed-By: Anna Henningsen <>
Reviewed-By: Jon Moss <>
  • Loading branch information
vsemozhetbyt committed Jan 1, 2018
1 parent 47ee340 commit 11a1bc11364ea88091b73cec5d5f69bdccb03ac1
Showing with 3 additions and 3 deletions.
  1. +1 −1 doc/api/
  2. +1 −1 doc/api/
  3. +1 −1 doc/api/
@@ -295,7 +295,7 @@ If `msg` is a `String`, then it is automatically converted to a `Buffer`
with `'utf8'` encoding. With messages that
contain multi-byte characters, `offset` and `length` will be calculated with
respect to [byte length][] and not the character position.
If `msg` is an array, `offset` and `length` must not be specified.
If `msg` is an array, `offset` and `length` must not be specified.

The `address` argument is a string. If the value of `address` is a host name,
DNS will be used to resolve the address of the host. If `address` is not
@@ -2044,7 +2044,7 @@ the status message for HTTP codes is ignored.
### ALPN negotiation

ALPN negotiation allows to support both [HTTPS][] and HTTP/2 over
the same socket. The `req` and `res` objects can be either HTTP/1 or
the same socket. The `req` and `res` objects can be either HTTP/1 or
HTTP/2, and an application **must** restrict itself to the public API of
[HTTP/1][], and detect if it is possible to use the more advanced
features of HTTP/2.
@@ -846,7 +846,7 @@ changes:
* `servername`: {string} Server name for the SNI (Server Name Indication) TLS
* `checkServerIdentity(servername, cert)` {Function} A callback function
   to be used (instead of the builtin `tls.checkServerIdentity()` function)
to be used (instead of the builtin `tls.checkServerIdentity()` function)
when checking the server's hostname (or the provided `servername` when
explicitly set) against the certificate. This should return an {Error} if
verification fails. The method should return `undefined` if the `servername`

0 comments on commit 11a1bc1

Please sign in to comment.
You can’t perform that action at this time.