Skip to content

Commit fc6145f

Browse files
Zuzana SvetlikovaMylesBorins
Zuzana Svetlikova
authored andcommitted
docs: Fix broken links in crypto.md
PR-URL: #15182 Reviewed-By: Michaël Zasso <mic.besace@gmail.com> Reviewed-By: Colin Ihrig <cjihrig@gmail.com> Reviewed-By: Luigi Pinca <luigipinca@gmail.com> Reviewed-By: Roman Reiss <me@silverwind.io> Reviewed-By: Daniel Bevenius <daniel.bevenius@gmail.com>
1 parent 5422eb8 commit fc6145f

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

doc/api/crypto.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -1592,7 +1592,7 @@ See the reference for other recommendations and details.
15921592
[`ecdh.generateKeys()`]: #crypto_ecdh_generatekeys_encoding_format
15931593
[`ecdh.setPrivateKey()`]: #crypto_ecdh_setprivatekey_private_key_encoding
15941594
[`ecdh.setPublicKey()`]: #crypto_ecdh_setpublickey_public_key_encoding
1595-
[`EVP_BytesToKey`]: https://www.openssl.org/docs/crypto/EVP_BytesToKey.html
1595+
[`EVP_BytesToKey`]: https://www.openssl.org/docs/man1.0.2/crypto/EVP_BytesToKey.html
15961596
[`hash.digest()`]: #crypto_hash_digest_encoding
15971597
[`hash.update()`]: #crypto_hash_update_data_input_encoding
15981598
[`hmac.digest()`]: #crypto_hmac_digest_encoding
@@ -1607,8 +1607,8 @@ See the reference for other recommendations and details.
16071607
[initialization vector]: https://en.wikipedia.org/wiki/Initialization_vector
16081608
[NIST SP 800-131A]: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf
16091609
[NIST SP 800-132]: http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf
1610-
[OpenSSL cipher list format]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT
1611-
[OpenSSL's SPKAC implementation]: https://www.openssl.org/docs/apps/spkac.html
1610+
[OpenSSL cipher list format]: https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT
1611+
[OpenSSL's SPKAC implementation]: https://www.openssl.org/docs/man1.0.2/apps/spkac.html
16121612
[publicly trusted list of CAs]: https://mxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt
16131613
[RFC 2412]: https://www.rfc-editor.org/rfc/rfc2412.txt
16141614
[RFC 3526]: https://www.rfc-editor.org/rfc/rfc3526.txt

doc/api/https.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ The following options from [`tls.connect()`][] can also be specified:
202202
certificates in PEM format. If this is omitted several well known "root"
203203
CAs will be used, like VeriSign. These are used to authorize connections.
204204
- `ciphers`: A string describing the ciphers to use or exclude. Consult
205-
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT> for
205+
<https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT for
206206
details on the format.
207207
- `rejectUnauthorized`: If `true`, the server certificate is verified against
208208
the list of supplied CAs. An `'error'` event is emitted if verification
@@ -266,7 +266,7 @@ var req = https.request(options, (res) => {
266266
[`http.Server`]: http.html#http_class_http_server
267267
[`https.Agent`]: #https_class_https_agent
268268
[`https.request()`]: #https_https_request_options_callback
269-
[`SSL_METHODS`]: https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
269+
[`SSL_METHODS`]: https://www.openssl.org/docs/man1.0.2/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
270270
[`tls.connect()`]: tls.html#tls_tls_connect_options_callback
271271
[`tls.createServer()`]: tls.html#tls_tls_createserver_options_secureconnectionlistener
272272
[`url.parse()`]: url.html#url_url_parse_urlstr_parsequerystring_slashesdenotehost

doc/api/tls.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -519,7 +519,7 @@ Example:
519519
{ name: 'AES256-SHA', version: 'TLSv1/SSLv3' }
520520

521521
See SSL_CIPHER_get_name() and SSL_CIPHER_get_version() in
522-
https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-CIPHERS for more
522+
https://www.openssl.org/docs/man1.0.2/ssl/ssl.html#DEALING-WITH-CIPHERS for more
523523
information.
524524

525525
### tlsSocket.getPeerCertificate([ detailed ])
@@ -799,7 +799,7 @@ dictionary with keys:
799799
(Certificate Revocation List)
800800
* `ciphers`: A string describing the ciphers to use or exclude.
801801
Consult
802-
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT>
802+
<https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT>
803803
for details on the format.
804804
* `honorCipherOrder` : When choosing a cipher, use the server's preferences
805805
instead of the client preferences. For further details see `tls` module
@@ -1049,7 +1049,7 @@ var ciphers = tls.getCiphers();
10491049
console.log(ciphers); // ['AES128-SHA', 'AES256-SHA', ...]
10501050
```
10511051

1052-
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT
1052+
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT
10531053
[Chrome's 'modern cryptography' setting]: https://www.chromium.org/Home/chromium-security/education/tls#TOC-Deprecation-of-TLS-Features-Algorithms-in-Chrome
10541054
[specific attacks affecting larger AES key sizes]: https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
10551055
[BEAST attacks]: https://blog.ivanristic.com/2011/10/mitigating-the-beast-attack-on-tls.html
@@ -1063,9 +1063,9 @@ console.log(ciphers); // ['AES128-SHA', 'AES256-SHA', ...]
10631063
[`'secureConnect'`]: #tls_event_secureconnect
10641064
[`'secureConnection'`]: #tls_event_secureconnection
10651065
[Stream]: stream.html#stream_stream
1066-
[SSL_METHODS]: https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
1066+
[SSL_METHODS]: https://www.openssl.org/docs/man1.0.2/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
10671067
[tls.Server]: #tls_class_tls_server
1068-
[SSL_CTX_set_timeout]: https://www.openssl.org/docs/ssl/SSL_CTX_set_timeout.html
1068+
[SSL_CTX_set_timeout]: https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_timeout.html
10691069
[RFC 4492]: https://www.rfc-editor.org/rfc/rfc4492.txt
10701070
[Forward secrecy]: https://en.wikipedia.org/wiki/Perfect_forward_secrecy
10711071
[DHE]: https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange

0 commit comments

Comments
 (0)