Skip to content

Commit 840c094

Browse files
silverwindMyles Borins
authored and
Myles Borins
committed
doc: update openssl.org hash links
The hash link format has changed from #HASH_LINK to #HASH-LINK. PR-URL: #6817 Reviewed-By: Roman Klauke <romankl@users.noreply.github.com> Reviewed-By: James M Snell <jasnell@gmail.com>
1 parent 9a8b531 commit 840c094

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

doc/api/crypto.markdown

+1-1
Original file line numberDiff line numberDiff line change
@@ -1398,7 +1398,7 @@ See the reference for other recommendations and details.
13981398
[initialization vector]: https://en.wikipedia.org/wiki/Initialization_vector
13991399
[NIST SP 800-131A]: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf
14001400
[NIST SP 800-132]: http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf
1401-
[OpenSSL cipher list format]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT
1401+
[OpenSSL cipher list format]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT
14021402
[OpenSSL's SPKAC implementation]: https://www.openssl.org/docs/apps/spkac.html
14031403
[publicly trusted list of CAs]: https://mxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt
14041404
[RFC 2412]: https://www.rfc-editor.org/rfc/rfc2412.txt

doc/api/https.markdown

+2-2
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ The following options from [`tls.connect()`][] can also be specified. However, a
176176
certificates in PEM format. If this is omitted several well known "root"
177177
CAs will be used, like VeriSign. These are used to authorize connections.
178178
- `ciphers`: A string describing the ciphers to use or exclude. Consult
179-
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT> for
179+
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT> for
180180
details on the format.
181181
- `rejectUnauthorized`: If `true`, the server certificate is verified against
182182
the list of supplied CAs. An `'error'` event is emitted if verification
@@ -240,7 +240,7 @@ var req = https.request(options, (res) => {
240240
[`http.Server`]: http.html#http_class_http_server
241241
[`https.Agent`]: #https_class_https_agent
242242
[`https.request()`]: #https_https_request_options_callback
243-
[`SSL_METHODS`]: https://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS
243+
[`SSL_METHODS`]: https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
244244
[`tls.connect()`]: tls.html#tls_tls_connect_options_callback
245245
[`tls.createServer()`]: tls.html#tls_tls_createserver_options_secureconnectionlistener
246246
[`url.parse()`]: url.html#url_url_parse_urlstr_parsequerystring_slashesdenotehost

doc/api/tls.markdown

+4-4
Original file line numberDiff line numberDiff line change
@@ -439,7 +439,7 @@ Example:
439439
{ name: 'AES256-SHA', version: 'TLSv1/SSLv3' }
440440

441441
See SSL_CIPHER_get_name() and SSL_CIPHER_get_version() in
442-
https://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_CIPHERS for more
442+
https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-CIPHERS for more
443443
information.
444444

445445
### tlsSocket.getPeerCertificate([ detailed ])
@@ -673,7 +673,7 @@ dictionary with keys:
673673
(Certificate Revocation List)
674674
* `ciphers`: A string describing the ciphers to use or exclude.
675675
Consult
676-
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT>
676+
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT>
677677
for details on the format.
678678
* `honorCipherOrder` : When choosing a cipher, use the server's preferences
679679
instead of the client preferences. For further details see `tls` module
@@ -911,7 +911,7 @@ var ciphers = tls.getCiphers();
911911
console.log(ciphers); // ['AES128-SHA', 'AES256-SHA', ...]
912912
```
913913

914-
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT
914+
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT
915915
[Chrome's 'modern cryptography' setting]: https://www.chromium.org/Home/chromium-security/education/tls#TOC-Deprecation-of-TLS-Features-Algorithms-in-Chrome
916916
[specific attacks affecting larger AES key sizes]: https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
917917
[BEAST attacks]: https://blog.ivanristic.com/2011/10/mitigating-the-beast-attack-on-tls.html
@@ -925,7 +925,7 @@ console.log(ciphers); // ['AES128-SHA', 'AES256-SHA', ...]
925925
[`'secureConnect'`]: #tls_event_secureconnect
926926
[`'secureConnection'`]: #tls_event_secureconnection
927927
[Stream]: stream.html#stream_stream
928-
[SSL_METHODS]: https://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS
928+
[SSL_METHODS]: https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
929929
[tls.Server]: #tls_class_tls_server
930930
[SSL_CTX_set_timeout]: https://www.openssl.org/docs/ssl/SSL_CTX_set_timeout.html
931931
[RFC 4492]: https://www.rfc-editor.org/rfc/rfc4492.txt

0 commit comments

Comments
 (0)