Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 3b6f83a

Browse files
committedDec 21, 2016
fixup! doc: add tls.DEFAULT_ECDH_CURVE
1 parent 8517058 commit 3b6f83a

File tree

1 file changed

+27
-24
lines changed

1 file changed

+27
-24
lines changed
 

‎doc/api/tls.md

+27-24
Original file line numberDiff line numberDiff line change
@@ -1079,8 +1079,9 @@ console.log(tls.getCiphers()); // ['AES128-SHA', 'AES256-SHA', ...]
10791079

10801080
## tls.DEFAULT_ECDH_CURVE
10811081

1082-
The default curve name to use for ECDH key agreement. The default value is
1083-
`'prime256v1'` (NIST P-256). Consult [RFC 4492] for more details.
1082+
The default curve name to use for ECDH key agreement in a tls server. The
1083+
default value is `'prime256v1'` (NIST P-256). Consult [RFC 4492] and
1084+
[FIPS.186-4] for more details.
10841085

10851086

10861087
## Deprecated APIs
@@ -1190,33 +1191,35 @@ secure_socket = tls.TLSSocket(socket, options);
11901191

11911192
where `secure_socket` has the same API as `pair.cleartext`.
11921193

1193-
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT
11941194
[Chrome's 'modern cryptography' setting]: https://www.chromium.org/Home/chromium-security/education/tls#TOC-Cipher-Suites
1195-
[OpenSSL Options]: crypto.html#crypto_openssl_options
1196-
[modifying the default cipher suite]: #tls_modifying_the_default_tls_cipher_suite
1197-
[specific attacks affecting larger AES key sizes]: https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
1198-
[`crypto.getCurves()`]: crypto.html#crypto_crypto_getcurves
1199-
[`tls.createServer()`]: #tls_tls_createserver_options_secureconnectionlistener
1200-
[`tls.createSecurePair()`]: #tls_tls_createsecurepair_context_isserver_requestcert_rejectunauthorized_options
1201-
[`tls.TLSSocket`]: #tls_class_tls_tlssocket
1202-
[`net.Server`]: net.html#net_class_net_server
1203-
[`net.Socket`]: net.html#net_class_net_socket
1204-
[`net.Server.address()`]: net.html#net_server_address
1205-
[`'secureConnect'`]: #tls_event_secureconnect
1206-
[`'secureConnection'`]: #tls_event_secureconnection
1207-
[Perfect Forward Secrecy]: #tls_perfect_forward_secrecy
1208-
[Stream]: stream.html#stream_stream
1209-
[SSL_METHODS]: https://www.openssl.org/docs/man1.0.2/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
1210-
[tls.Server]: #tls_class_tls_server
1211-
[SSL_CTX_set_timeout]: https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_timeout.html
1212-
[Forward secrecy]: https://en.wikipedia.org/wiki/Perfect_forward_secrecy
12131195
[DHE]: https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
12141196
[ECDHE]: https://en.wikipedia.org/wiki/Elliptic_curve_Diffie%E2%80%93Hellman
1215-
[asn1.js]: https://npmjs.org/package/asn1.js
1197+
[FIPS.186-4]: http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
1198+
[Forward secrecy]: https://en.wikipedia.org/wiki/Perfect_forward_secrecy
12161199
[OCSP request]: https://en.wikipedia.org/wiki/OCSP_stapling
1217-
[TLS recommendations]: https://wiki.mozilla.org/Security/Server_Side_TLS
1200+
[OpenSSL Options]: crypto.html#crypto_openssl_options
1201+
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT
1202+
[Perfect Forward Secrecy]: #tls_perfect_forward_secrecy
1203+
[RFC 4492]: https://www.rfc-editor.org/rfc/rfc4492.txt
1204+
[SSL_CTX_set_timeout]: https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_timeout.html
1205+
[SSL_METHODS]: https://www.openssl.org/docs/man1.0.2/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
1206+
[Stream]: stream.html#stream_stream
12181207
[TLS Session Tickets]: https://www.ietf.org/rfc/rfc5077.txt
1208+
[TLS recommendations]: https://wiki.mozilla.org/Security/Server_Side_TLS
1209+
[`'secureConnect'`]: #tls_event_secureconnect
1210+
[`'secureConnection'`]: #tls_event_secureconnection
1211+
[`crypto.getCurves()`]: crypto.html#crypto_crypto_getcurves
1212+
[`net.Server.address()`]: net.html#net_server_address
1213+
[`net.Server`]: net.html#net_class_net_server
1214+
[`net.Socket`]: net.html#net_class_net_socket
12191215
[`tls.DEFAULT_ECDH_CURVE`]: #tls_tls_default_ecdh_curve
12201216
[`tls.TLSSocket.getPeerCertificate()`]: #tls_tlssocket_getpeercertificate_detailed
1221-
[`tls.createSecureContext()`]: #tls_tls_createsecurecontext_options
1217+
[`tls.TLSSocket`]: #tls_class_tls_tlssocket
12221218
[`tls.connect()`]: #tls_tls_connect_options_callback
1219+
[`tls.createSecureContext()`]: #tls_tls_createsecurecontext_options
1220+
[`tls.createSecurePair()`]: #tls_tls_createsecurepair_context_isserver_requestcert_rejectunauthorized_options
1221+
[`tls.createServer()`]: #tls_tls_createserver_options_secureconnectionlistener
1222+
[asn1.js]: https://npmjs.org/package/asn1.js
1223+
[modifying the default cipher suite]: #tls_modifying_the_default_tls_cipher_suite
1224+
[specific attacks affecting larger AES key sizes]: https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
1225+
[tls.Server]: #tls_class_tls_server

0 commit comments

Comments
 (0)
Please sign in to comment.