diff options
author | silverwind <me@silverwind.io> | 2016-05-17 19:52:54 +0200 |
---|---|---|
committer | silverwind <me@silverwind.io> | 2016-05-17 21:24:41 +0200 |
commit | 50261929bdfe489384cedf8dfd3f2e8e98b6dbb5 (patch) | |
tree | 39a218b67685f24468dfa4618bc708913107c111 /doc | |
parent | dcccbfdc799d174901c29d82874457367231fec5 (diff) | |
download | node-new-50261929bdfe489384cedf8dfd3f2e8e98b6dbb5.tar.gz |
doc: update openssl.org hash links
The hash link format has changed from #HASH_LINK to #HASH-LINK.
PR-URL: https://github.com/nodejs/node/pull/6817
Reviewed-By: Roman Klauke <romankl@users.noreply.github.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
Diffstat (limited to 'doc')
-rw-r--r-- | doc/api/crypto.md | 2 | ||||
-rw-r--r-- | doc/api/https.md | 4 | ||||
-rw-r--r-- | doc/api/tls.md | 6 |
3 files changed, 6 insertions, 6 deletions
diff --git a/doc/api/crypto.md b/doc/api/crypto.md index aac0c6eed6..6fa3b1e132 100644 --- a/doc/api/crypto.md +++ b/doc/api/crypto.md @@ -1732,7 +1732,7 @@ the `crypto`, `tls`, and `https` modules and are generally specific to OpenSSL. [initialization vector]: https://en.wikipedia.org/wiki/Initialization_vector [NIST SP 800-131A]: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf [NIST SP 800-132]: http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf -[OpenSSL cipher list format]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT +[OpenSSL cipher list format]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT [OpenSSL's SPKAC implementation]: https://www.openssl.org/docs/apps/spkac.html [publicly trusted list of CAs]: https://mxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt [RFC 2412]: https://www.rfc-editor.org/rfc/rfc2412.txt diff --git a/doc/api/https.md b/doc/api/https.md index 69b5f41846..09c4b5d2b9 100644 --- a/doc/api/https.md +++ b/doc/api/https.md @@ -176,7 +176,7 @@ The following options from [`tls.connect()`][] can also be specified. However, a certificates in PEM format. If this is omitted several well known "root" CAs will be used, like VeriSign. These are used to authorize connections. - `ciphers`: A string describing the ciphers to use or exclude. Consult - <https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT> for + <https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT> for details on the format. - `rejectUnauthorized`: If `true`, the server certificate is verified against the list of supplied CAs. An `'error'` event is emitted if verification @@ -240,7 +240,7 @@ var req = https.request(options, (res) => { [`http.Server`]: http.html#http_class_http_server [`https.Agent`]: #https_class_https_agent [`https.request()`]: #https_https_request_options_callback -[`SSL_METHODS`]: https://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS +[`SSL_METHODS`]: https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS [`tls.connect()`]: tls.html#tls_tls_connect_options_callback [`tls.createServer()`]: tls.html#tls_tls_createserver_options_secureconnectionlistener [`url.parse()`]: url.html#url_url_parse_urlstr_parsequerystring_slashesdenotehost diff --git a/doc/api/tls.md b/doc/api/tls.md index a0068f5f9b..f820946f6c 100644 --- a/doc/api/tls.md +++ b/doc/api/tls.md @@ -735,7 +735,7 @@ fields: (Certificate Revocation List). * `ciphers`: A string describing the ciphers to use or exclude. Consult - <https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT> + <https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT> for details on the format. * `honorCipherOrder` : When choosing a cipher, use the server's preferences instead of the client preferences. For further details see `tls` module @@ -998,7 +998,7 @@ console.log(ciphers); // ['AES128-SHA', 'AES256-SHA', ...] ``` -[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT +[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT [Chrome's 'modern cryptography' setting]: https://www.chromium.org/Home/chromium-security/education/tls#TOC-Deprecation-of-TLS-Features-Algorithms-in-Chrome [specific attacks affecting larger AES key sizes]: https://www.schneier.com/blog/archives/2009/07/another_new_aes.html [BEAST attacks]: https://blog.ivanristic.com/2011/10/mitigating-the-beast-attack-on-tls.html @@ -1013,7 +1013,7 @@ console.log(ciphers); // ['AES128-SHA', 'AES256-SHA', ...] [`'secureConnection'`]: #tls_event_secureconnection [Perfect Forward Secrecy]: #tls_perfect_forward_secrecy [Stream]: stream.html#stream_stream -[SSL_METHODS]: https://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS +[SSL_METHODS]: https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS [tls.Server]: #tls_class_tls_server [SSL_CTX_set_timeout]: https://www.openssl.org/docs/ssl/SSL_CTX_set_timeout.html [RFC 4492]: https://www.rfc-editor.org/rfc/rfc4492.txt |