Skip to content

Commit bdcdbf9

Browse files
authored
markdig fixes - Part 8 (#2565)
* markdig fixes - bare URLs * feedback
1 parent 6d75173 commit bdcdbf9

19 files changed

+67
-67
lines changed

xml/System.IO.IsolatedStorage/INormalizeForIsolatedStorage.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939
]]></format>
4040
</remarks>
4141
<block subset="none" type="overrides">
42-
<para>Implement this interface when you are implementing custom evidence and need to determine if a store already exists. Serialized objects should not be used for comparisons in some instances, such as that of case sensitive strings. For example, www.MSN.com is equal to WWW.msn.com and will return a <see langword="true" /> when compared. To create an <see cref="T:System.IO.IsolatedStorage.INormalizeForIsolatedStorage" /> object, you need to implement the <see cref="M:System.IO.IsolatedStorage.INormalizeForIsolatedStorage.Normalize" /> method.</para>
42+
<para>Implement this interface when you are implementing custom evidence and need to determine if a store already exists. Serialized objects should not be used for comparisons in some instances, such as that of case sensitive strings. For example, `www.MSN.com` is equal to `WWW.msn.com` and will return a <see langword="true" /> when compared. To create an <see cref="T:System.IO.IsolatedStorage.INormalizeForIsolatedStorage" /> object, you need to implement the <see cref="M:System.IO.IsolatedStorage.INormalizeForIsolatedStorage.Normalize" /> method.</para>
4343
</block>
4444
<block subset="none" type="usage">
4545
<para>Call the methods of this interface to normalize the instance before making comparisons between an assembly's evidence and currently existing isolated stores.</para>

xml/System.Net.NetworkInformation/IPStatus.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -342,7 +342,7 @@
342342
</ReturnValue>
343343
<MemberValue>11004</MemberValue>
344344
<Docs>
345-
<summary>The ICMP echo request failed because the destination computer that is specified in an ICMP echo message is not reachable, because it does not support the packet's protocol. This value applies only to IPv4. This value is described in IETF RFC 1812 as Communication Administratively Prohibited.</summary>
345+
<summary>The ICMP echo request failed because the destination computer that is specified in an ICMP echo message is not reachable, because it does not support the packet's protocol. This value applies only to IPv4. This value is described in <see href="https://tools.ietf.org/html/rfc1812">IETF RFC 1812</see> as Communication Administratively Prohibited.</summary>
346346
</Docs>
347347
</Member>
348348
<Member MemberName="DestinationScopeMismatch">
@@ -771,7 +771,7 @@
771771
</ReturnValue>
772772
<MemberValue>11014</MemberValue>
773773
<Docs>
774-
<summary>The ICMP echo request failed because the packet was divided into fragments for transmission and all of the fragments were not received within the time allotted for reassembly. RFC 2460 (available at www.ietf.org) specifies 60 seconds as the time limit within which all packet fragments must be received.</summary>
774+
<summary>The ICMP echo request failed because the packet was divided into fragments for transmission and all of the fragments were not received within the time allotted for reassembly. <see href="https://tools.ietf.org/html/rfc2460">RFC 2460</see> specifies 60 seconds as the time limit within which all packet fragments must be received.</summary>
775775
</Docs>
776776
</Member>
777777
<Member MemberName="Unknown">

xml/System.Net/IPHostEntry.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@
4040
4141
4242
## Examples
43-
The following example queries the DNS database for information on the host www.contoso.com and returns the information in an <xref:System.Net.IPHostEntry> instance.
43+
The following example queries the DNS database for information on the host `www.contoso.com` and returns the information in an <xref:System.Net.IPHostEntry> instance.
4444
4545
[!code-cpp[Classic Dns Example#1](~/samples/snippets/cpp/VS_Snippets_Remoting/Classic Dns Example/CPP/source.cpp#1)]
4646
[!code-csharp[Classic Dns Example#1](~/samples/snippets/csharp/VS_Snippets_Remoting/Classic Dns Example/CS/source.cs#1)]

xml/System.Net/ServicePoint.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@
5151
5252
5353
## Examples
54-
The following code example creates a <xref:System.Net.ServicePoint> object that connects to the URI www.contoso.com.
54+
The following code example creates a <xref:System.Net.ServicePoint> object that connects to the URI `www.contoso.com`.
5555
5656
[!code-cpp[System.Net.ServicePoint#1](~/samples/snippets/cpp/VS_Snippets_Remoting/System.Net.ServicePoint/CPP/servicepoint.cpp#1)]
5757
[!code-csharp[System.Net.ServicePoint#1](~/samples/snippets/csharp/VS_Snippets_Remoting/System.Net.ServicePoint/CS/servicepoint.cs#1)]

xml/System.Net/ServicePointManager.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
4444
4545
## Examples
46-
The following code example creates a <xref:System.Net.ServicePoint> object for connections to the URI www.contoso.com.
46+
The following code example creates a <xref:System.Net.ServicePoint> object for connections to the URI `www.contoso.com`.
4747
4848
[!code-cpp[Classic ServicePoint Example#1](~/samples/snippets/cpp/VS_Snippets_Remoting/Classic ServicePoint Example/CPP/source.cpp#1)]
4949
[!code-csharp[Classic ServicePoint Example#1](~/samples/snippets/csharp/VS_Snippets_Remoting/Classic ServicePoint Example/CS/source.cs#1)]
@@ -996,7 +996,7 @@ For versions of the .NET Framework through the .NET Framework 4.6.2, no default
996996
## Remarks
997997
An application can set the <xref:System.Net.ServicePointManager.ServerCertificateValidationCallback%2A> property to a method to use for custom validation by the client of the server certificate. When doing custom validation, the `sender` parameter passed to the <xref:System.Net.Security.RemoteCertificateValidationCallback> can be a host string name or an object derived from <xref:System.Net.WebRequest> (<xref:System.Net.HttpWebRequest>, for example) depending on the <xref:System.Net.ServicePointManager.CertificatePolicy%2A> property.
998998
999-
When custom validation is not used, the certificate name is compared with the host name used to create the request. For example, if <xref:System.Net.WebRequest.Create%28System.String%29> was passed a parameter of "https://www.contoso.com/default.html", the default behavior is for the client to check the certificate against www.contoso.com.
999+
When custom validation is not used, the certificate name is compared with the host name used to create the request. For example, if <xref:System.Net.WebRequest.Create%28System.String%29> was passed a parameter of `"https://www.contoso.com/default.html"`, the default behavior is for the client to check the certificate against `www.contoso.com`.
10001000
10011001
Despite being a multicast delegate, only the value returned from the last-executed event handler is considered authoritative.
10021002
In other words, you can attach multiple delegates, and they all get a callback from <xref:System.Net.ServicePointManager.ServerCertificateValidationCallback%2A>.

xml/System.Security.Cryptography.Xml/RSAKeyValue.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@
3333
3434
If a key is not explicitly supplied to the constructor, a new <xref:System.Security.Cryptography.RSA> key pair is randomly generated.
3535
36-
For more information about the `<RSAKeyValue>` element, see the W3C specification at www.w3.org/TR/xmldsig-core/.
36+
For more information about the `<RSAKeyValue>` element, see the [W3C specification](https://www.w3.org/TR/xmldsig-core/).
3737
3838
3939
@@ -209,7 +209,7 @@ Based upon [The RSAKeyValue Element](https://www.w3.org/TR/2002/REC-xmldsig-core
209209
## Remarks
210210
The <xref:System.Security.Cryptography.Xml.RSAKeyValue.Key%2A> property represents the public key to add to an XML digital signature using the `<Modulus>` subelement and the `<Exponent>` subelement of the `<RSAKeyValue>` element.
211211
212-
For more information about XML digital signatures, see the W3C specification at www.w3.org/TR/xmldsig-core/.
212+
For more information about XML digital signatures, see the [W3C specification](https://www.w3.org/TR/xmldsig-core/).
213213
214214
]]></format>
215215
</remarks>

xml/System.Security.Cryptography.Xml/Reference.xml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
<format type="text/markdown"><![CDATA[
2828
2929
## Remarks
30-
The <xref:System.Security.Cryptography.Xml.Reference> object represents the <`reference`> element of an XML digital signature defined by the XML digital signature specification.
30+
The <xref:System.Security.Cryptography.Xml.Reference> object represents the `<reference>` element of an XML digital signature defined by the XML digital signature specification.
3131
3232
Use the <xref:System.Security.Cryptography.Xml.Reference> object to specify the following information:
3333
@@ -41,7 +41,7 @@
4141
4242
- A unique identifier used to reference the current `<reference>` element. This value is optional.
4343
44-
For more information about the <`reference`> element, see the W3C specification at www.w3.org/TR/xmldsig-core/.
44+
For more information about the `<reference>` element, see the [W3C specification](https://www.w3.org/TR/xmldsig-core/).
4545
4646
4747
@@ -223,7 +223,7 @@
223223
224224
Transforms are applied in the order in which they were added. If no transforms are specified, the minimum required transforms are added automatically.
225225
226-
For more information about XML digital signatures, see the W3C specification at www.w3.org/TR/xmldsig-core/.
226+
For more information about XML digital signatures, see the [W3C specification](https://www.w3.org/TR/xmldsig-core/).
227227
228228
229229
@@ -275,11 +275,11 @@
275275
<format type="text/markdown"><![CDATA[
276276
277277
## Remarks
278-
The <xref:System.Security.Cryptography.Xml.Reference.DigestMethod%2A> property uses a URI string to represent the <`DigestMethod`> element of an XML digital signature.
278+
The <xref:System.Security.Cryptography.Xml.Reference.DigestMethod%2A> property uses a URI string to represent the `<DigestMethod>` element of an XML digital signature.
279279
280280
The digest method is the algorithm used to hash the <xref:System.Security.Cryptography.Xml.Reference>. The default algorithm is <xref:System.Security.Cryptography.SHA1>.
281281
282-
For more information about XML digital signatures, see the W3C specification at www.w3.org/TR/xmldsig-core/.
282+
For more information about XML digital signatures, see the [W3C specification](https://www.w3.org/TR/xmldsig-core/).
283283
284284
]]></format>
285285
</remarks>
@@ -315,13 +315,13 @@
315315
<format type="text/markdown"><![CDATA[
316316
317317
## Remarks
318-
The <xref:System.Security.Cryptography.Xml.Reference.DigestValue%2A> property uses an array of bytes to represent the <`DigestValue`> element of an XML digital signature.
318+
The <xref:System.Security.Cryptography.Xml.Reference.DigestValue%2A> property uses an array of bytes to represent the `<DigestValue>` element of an XML digital signature.
319319
320320
The <xref:System.Security.Cryptography.Xml.Reference.DigestValue%2A> property contains the Base 64 encoded value of the digest of the object described by the <xref:System.Security.Cryptography.Xml.Reference.Uri%2A> property.
321321
322322
The <xref:System.Security.Cryptography.Xml.Reference.DigestValue%2A> property is automatically populated with the appropriate value whenever you make a call to <xref:System.Security.Cryptography.Pkcs.SignedCms.ComputeSignature%2A>.
323323
324-
For more information about XML digital signatures, see the W3C specification at www.w3.org/TR/xmldsig-core/.
324+
For more information about XML digital signatures, see the [W3C specification](https://www.w3.org/TR/xmldsig-core/).
325325
326326
]]></format>
327327
</remarks>
@@ -471,11 +471,11 @@
471471
<format type="text/markdown"><![CDATA[
472472
473473
## Remarks
474-
The <xref:System.Security.Cryptography.Xml.Reference.TransformChain%2A> property represents the <`Transform`> element and associated subelements of an XML digital signature.
474+
The <xref:System.Security.Cryptography.Xml.Reference.TransformChain%2A> property represents the `<Transform>` element and associated subelements of an XML digital signature.
475475
476476
The transform chain is an ordered list of transforms. The output of these transforms constitutes the input to the hash algorithm specified in the <xref:System.Security.Cryptography.Xml.Reference.DigestMethod%2A> property.
477477
478-
For more information about XML digital signatures, see the W3C specification at www.w3.org/TR/xmldsig-core/.
478+
For more information about XML digital signatures, see the [W3C specification](https://www.w3.org/TR/xmldsig-core/).
479479
480480
]]></format>
481481
</remarks>
@@ -540,7 +540,7 @@
540540
<format type="text/markdown"><![CDATA[
541541
542542
## Remarks
543-
The <xref:System.Security.Cryptography.Xml.Reference.Uri%2A> property uses a string Uniform Resource Identifier (URI) to represent the <`URI`> element of an XML digital signature.
543+
The <xref:System.Security.Cryptography.Xml.Reference.Uri%2A> property uses a string Uniform Resource Identifier (URI) to represent the `<URI>` element of an XML digital signature.
544544
545545
Use the <xref:System.Security.Cryptography.Xml.Reference.Uri%2A> property to specify the location of a document to sign, and to specify which element of the current XML document to sign or to indicate that the entire document should be signed.
546546

xml/System.Security.Cryptography.Xml/XmlDsigBase64Transform.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131
3232
The Uniform Resource Identifier (URI) that describes the <xref:System.Security.Cryptography.Xml.XmlDsigBase64Transform> object is defined by the <xref:System.Security.Cryptography.Xml.SignedXml.XmlDsigBase64TransformUrl> field.
3333
34-
For more information about the `Base64` decoding transform, see Section 6.6.2 of the XMLDSIG specification, which is available from the W3C at www.w3.org/TR/xmldsig-core/.
34+
For more information about the `Base64` decoding transform, see Section 6.6.2 of the W3C [XMLDSIG specification](https://www.w3.org/TR/xmldsig-core/).
3535
3636
3737

xml/System.Security.Cryptography.Xml/XmlDsigC14NTransform.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@
3737
3838
You would only need to create a new instance of a canonicalization transform class for manually hashing an XML document or for using your own canonicalization algorithm.
3939
40-
For more information about the C14N transform, see Sections 6.5 and 6.6.1 of the XMLDSIG specification, which is available from the World Wide Web Consortium (W3C) at www.w3.org/TR/xmldsig-core/. The canonicalization algorithm is defined in the W3C Canonical XML specification, which is available at www.w3.org/TR/xml-c14n.
40+
For more information about the C14N transform, see Sections 6.5 and 6.6.1 of the W3C [XMLDSIG specification](https://www.w3.org/TR/xmldsig-core/). The canonicalization algorithm is defined in the W3C [Canonical XML specification](https://www.w3.org/TR/xml-c14n).
4141
4242
4343

xml/System.Security.Cryptography.Xml/XmlDsigC14NWithCommentsTransform.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,12 +37,12 @@
3737
3838
The URI that describes the <xref:System.Security.Cryptography.Xml.XmlDsigC14NWithCommentsTransform> class is defined by the <xref:System.Security.Cryptography.Xml.SignedXml.XmlDsigC14NWithCommentsTransformUrl> field and the <xref:System.Security.Cryptography.Xml.SignedXml.XmlDsigCanonicalizationWithCommentsUrl> field.
3939
40-
For more information about the C14N with comments transform, see Sections 6.5 and 6.6.1 of the XMLDSIG specification, which is available from the World Wide Web Consortium (W3C) at www.w3.org/TR/xmldsig-core/. The canonicalization algorithm is defined in the W3C Canonical XML specification, which is available at www.w3.org/TR/xml-c14n.
40+
For more information about the C14N with comments transform, see Sections 6.5 and 6.6.1 of the W3C [XMLDSIG specification](https://www.w3.org/TR/xmldsig-core/). The canonicalization algorithm is defined in the W3C [Canonical XML specification](https://www.w3.org/TR/xml-c14n).
4141
4242
4343
4444
## Examples
45-
This section contains two code examples. The first example demonstrates how to sign an XML file using a detached signature. This example creates a signature of www.microsoft.com in an XML file and then verifies the file. The second example demonstrates how to sign an XML file using an envelope signature. This example creates a signature of an XML file and then saves the signature in new XML file.
45+
This section contains two code examples. The first example demonstrates how to sign an XML file using a detached signature. This example creates a signature of `www.microsoft.com` in an XML file and then verifies the file. The second example demonstrates how to sign an XML file using an envelope signature. This example creates a signature of an XML file and then saves the signature in new XML file.
4646
4747
**Example #1**
4848
@@ -86,7 +86,7 @@
8686
<format type="text/markdown"><![CDATA[
8787
8888
## Examples
89-
This section contains two code examples. The first example demonstrates how to sign an XML file using a detached signature. This example creates a signature of www.microsoft.com in an XML file and then verifies the file. The second example demonstrates how to sign an XML file using an envelope signature. This example creates a signature of an XML file and then saves the signature in new XML file.
89+
This section contains two code examples. The first example demonstrates how to sign an XML file using a detached signature. This example creates a signature of `www.microsoft.com` in an XML file and then verifies the file. The second example demonstrates how to sign an XML file using an envelope signature. This example creates a signature of an XML file and then saves the signature in new XML file.
9090
9191
**Example #1**
9292

0 commit comments

Comments
 (0)