@@ -422,7 +422,7 @@ Example:
422
422
{ name: 'AES256-SHA', version: 'TLSv1/SSLv3' }
423
423
424
424
See SSL_CIPHER_get_name() and SSL_CIPHER_get_version() in
425
- http ://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_CIPHERS for more
425
+ https ://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_CIPHERS for more
426
426
information.
427
427
428
428
### tlsSocket.getPeerCertificate([ detailed ] )
@@ -650,7 +650,7 @@ dictionary with keys:
650
650
(Certificate Revocation List)
651
651
* ` ciphers ` : A string describing the ciphers to use or exclude.
652
652
Consult
653
- < http ://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT>
653
+ < https ://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT>
654
654
for details on the format.
655
655
* ` honorCipherOrder ` : When choosing a cipher, use the server's preferences
656
656
instead of the client preferences. For further details see ` tls ` module
@@ -876,10 +876,10 @@ Example:
876
876
var ciphers = tls.getCiphers();
877
877
console.log(ciphers); // ['AES128-SHA', 'AES256-SHA', ...]
878
878
879
- [ OpenSSL cipher list format documentation ] : http ://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT
880
- [ Chrome's 'modern cryptography' setting ] : http ://www.chromium.org/Home/chromium-security/education/tls#TOC-Deprecation-of-TLS-Features-Algorithms-in-Chrome
879
+ [ OpenSSL cipher list format documentation ] : https ://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT
880
+ [ Chrome's 'modern cryptography' setting ] : https ://www.chromium.org/Home/chromium-security/education/tls#TOC-Deprecation-of-TLS-Features-Algorithms-in-Chrome
881
881
[ specific attacks affecting larger AES key sizes ] : https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
882
- [ BEAST attacks ] : http ://blog.ivanristic.com/2011/10/mitigating-the-beast-attack-on-tls.html
882
+ [ BEAST attacks ] : https ://blog.ivanristic.com/2011/10/mitigating-the-beast-attack-on-tls.html
883
883
[ crypto.getCurves() ] : crypto.html#crypto_crypto_getcurves
884
884
[ tls.createServer ] : #tls_tls_createserver_options_secureconnectionlistener
885
885
[ tls.createSecurePair ] : #tls_tls_createsecurepair_context_isserver_requestcert_rejectunauthorized_options
@@ -890,15 +890,15 @@ Example:
890
890
[ `'secureConnect'` ] : #tls_event_secureconnect
891
891
[ `'secureConnection'` ] : #tls_event_secureconnection
892
892
[ Stream ] : stream.html#stream_stream
893
- [ SSL_METHODS ] : http ://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS
893
+ [ SSL_METHODS ] : https ://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS
894
894
[ tls.Server ] : #tls_class_tls_server
895
- [ SSL_CTX_set_timeout ] : http ://www.openssl.org/docs/ssl/SSL_CTX_set_timeout.html
896
- [ RFC 4492 ] : http ://www.rfc-editor.org/rfc/rfc4492.txt
897
- [ Forward secrecy ] : http ://en.wikipedia.org/wiki/Perfect_forward_secrecy
895
+ [ SSL_CTX_set_timeout ] : https ://www.openssl.org/docs/ssl/SSL_CTX_set_timeout.html
896
+ [ RFC 4492 ] : https ://www.rfc-editor.org/rfc/rfc4492.txt
897
+ [ Forward secrecy ] : https ://en.wikipedia.org/wiki/Perfect_forward_secrecy
898
898
[ DHE ] : https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
899
899
[ ECDHE ] : https://en.wikipedia.org/wiki/Elliptic_curve_Diffie%E2%80%93Hellman
900
- [ asn1.js ] : http ://npmjs.org/package/asn1.js
901
- [ OCSP request ] : http ://en.wikipedia.org/wiki/OCSP_stapling
900
+ [ asn1.js ] : https ://npmjs.org/package/asn1.js
901
+ [ OCSP request ] : https ://en.wikipedia.org/wiki/OCSP_stapling
902
902
[ TLS recommendations ] : https://wiki.mozilla.org/Security/Server_Side_TLS
903
903
[ TLS Session Tickets ] : https://www.ietf.org/rfc/rfc5077.txt
904
904
[ getPeerCertificate ] : #tls_tlssocket_getpeercertificate_detailed
0 commit comments