Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Commit 840c094

Browse filesBrowse files
silverwindMyles Borins
authored andcommitted
doc: update openssl.org hash links
The hash link format has changed from #HASH_LINK to #HASH-LINK. PR-URL: #6817 Reviewed-By: Roman Klauke <romankl@users.noreply.github.com> Reviewed-By: James M Snell <jasnell@gmail.com>
1 parent 9a8b531 commit 840c094
Copy full SHA for 840c094

File tree

Expand file treeCollapse file tree

3 files changed

+7
-7
lines changed
Open diff view settings
Filter options
Expand file treeCollapse file tree

3 files changed

+7
-7
lines changed
Open diff view settings
Collapse file

‎doc/api/crypto.markdown‎

Copy file name to clipboardExpand all lines: doc/api/crypto.markdown
+1-1Lines changed: 1 addition & 1 deletion
  • Display the source diff
  • Display the rich diff
Original file line numberDiff line numberDiff line change
@@ -1398,7 +1398,7 @@ See the reference for other recommendations and details.
13981398
[initialization vector]: https://en.wikipedia.org/wiki/Initialization_vector
13991399
[NIST SP 800-131A]: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf
14001400
[NIST SP 800-132]: http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf
1401-
[OpenSSL cipher list format]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT
1401+
[OpenSSL cipher list format]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT
14021402
[OpenSSL's SPKAC implementation]: https://www.openssl.org/docs/apps/spkac.html
14031403
[publicly trusted list of CAs]: https://mxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt
14041404
[RFC 2412]: https://www.rfc-editor.org/rfc/rfc2412.txt
Collapse file

‎doc/api/https.markdown‎

Copy file name to clipboardExpand all lines: doc/api/https.markdown
+2-2Lines changed: 2 additions & 2 deletions
  • Display the source diff
  • Display the rich diff
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ The following options from [`tls.connect()`][] can also be specified. However, a
176176
certificates in PEM format. If this is omitted several well known "root"
177177
CAs will be used, like VeriSign. These are used to authorize connections.
178178
- `ciphers`: A string describing the ciphers to use or exclude. Consult
179-
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT> for
179+
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT> for
180180
details on the format.
181181
- `rejectUnauthorized`: If `true`, the server certificate is verified against
182182
the list of supplied CAs. An `'error'` event is emitted if verification
@@ -240,7 +240,7 @@ var req = https.request(options, (res) => {
240240
[`http.Server`]: http.html#http_class_http_server
241241
[`https.Agent`]: #https_class_https_agent
242242
[`https.request()`]: #https_https_request_options_callback
243-
[`SSL_METHODS`]: https://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS
243+
[`SSL_METHODS`]: https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
244244
[`tls.connect()`]: tls.html#tls_tls_connect_options_callback
245245
[`tls.createServer()`]: tls.html#tls_tls_createserver_options_secureconnectionlistener
246246
[`url.parse()`]: url.html#url_url_parse_urlstr_parsequerystring_slashesdenotehost
Collapse file

‎doc/api/tls.markdown‎

Copy file name to clipboardExpand all lines: doc/api/tls.markdown
+4-4Lines changed: 4 additions & 4 deletions
  • Display the source diff
  • Display the rich diff
Original file line numberDiff line numberDiff line change
@@ -439,7 +439,7 @@ Example:
439439
{ name: 'AES256-SHA', version: 'TLSv1/SSLv3' }
440440

441441
See SSL_CIPHER_get_name() and SSL_CIPHER_get_version() in
442-
https://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_CIPHERS for more
442+
https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-CIPHERS for more
443443
information.
444444

445445
### tlsSocket.getPeerCertificate([ detailed ])
@@ -673,7 +673,7 @@ dictionary with keys:
673673
(Certificate Revocation List)
674674
* `ciphers`: A string describing the ciphers to use or exclude.
675675
Consult
676-
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT>
676+
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT>
677677
for details on the format.
678678
* `honorCipherOrder` : When choosing a cipher, use the server's preferences
679679
instead of the client preferences. For further details see `tls` module
@@ -911,7 +911,7 @@ var ciphers = tls.getCiphers();
911911
console.log(ciphers); // ['AES128-SHA', 'AES256-SHA', ...]
912912
```
913913

914-
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT
914+
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT
915915
[Chrome's 'modern cryptography' setting]: https://www.chromium.org/Home/chromium-security/education/tls#TOC-Deprecation-of-TLS-Features-Algorithms-in-Chrome
916916
[specific attacks affecting larger AES key sizes]: https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
917917
[BEAST attacks]: https://blog.ivanristic.com/2011/10/mitigating-the-beast-attack-on-tls.html
@@ -925,7 +925,7 @@ console.log(ciphers); // ['AES128-SHA', 'AES256-SHA', ...]
925925
[`'secureConnect'`]: #tls_event_secureconnect
926926
[`'secureConnection'`]: #tls_event_secureconnection
927927
[Stream]: stream.html#stream_stream
928-
[SSL_METHODS]: https://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS
928+
[SSL_METHODS]: https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
929929
[tls.Server]: #tls_class_tls_server
930930
[SSL_CTX_set_timeout]: https://www.openssl.org/docs/ssl/SSL_CTX_set_timeout.html
931931
[RFC 4492]: https://www.rfc-editor.org/rfc/rfc4492.txt

0 commit comments

Comments
0 (0)
Morty Proxy This is a proxified and sanitized view of the page, visit original site.