@@ -1079,8 +1079,9 @@ console.log(tls.getCiphers()); // ['AES128-SHA', 'AES256-SHA', ...]
1079
1079
1080
1080
## tls.DEFAULT_ECDH_CURVE
1081
1081
1082
- The default curve name to use for ECDH key agreement. The default value is
1083
- ` 'prime256v1' ` (NIST P-256). Consult [ RFC 4492] for more details.
1082
+ The default curve name to use for ECDH key agreement in a tls server. The
1083
+ default value is ` 'prime256v1' ` (NIST P-256). Consult [ RFC 4492] and
1084
+ [ FIPS.186-4] for more details.
1084
1085
1085
1086
1086
1087
## Deprecated APIs
@@ -1190,33 +1191,35 @@ secure_socket = tls.TLSSocket(socket, options);
1190
1191
1191
1192
where ` secure_socket ` has the same API as ` pair.cleartext ` .
1192
1193
1193
- [ OpenSSL cipher list format documentation ] : https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT
1194
1194
[ Chrome's 'modern cryptography' setting ] : https://www.chromium.org/Home/chromium-security/education/tls#TOC-Cipher-Suites
1195
- [ OpenSSL Options ] : crypto.html#crypto_openssl_options
1196
- [ modifying the default cipher suite ] : #tls_modifying_the_default_tls_cipher_suite
1197
- [ specific attacks affecting larger AES key sizes ] : https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
1198
- [ `crypto.getCurves()` ] : crypto.html#crypto_crypto_getcurves
1199
- [ `tls.createServer()` ] : #tls_tls_createserver_options_secureconnectionlistener
1200
- [ `tls.createSecurePair()` ] : #tls_tls_createsecurepair_context_isserver_requestcert_rejectunauthorized_options
1201
- [ `tls.TLSSocket` ] : #tls_class_tls_tlssocket
1202
- [ `net.Server` ] : net.html#net_class_net_server
1203
- [ `net.Socket` ] : net.html#net_class_net_socket
1204
- [ `net.Server.address()` ] : net.html#net_server_address
1205
- [ `'secureConnect'` ] : #tls_event_secureconnect
1206
- [ `'secureConnection'` ] : #tls_event_secureconnection
1207
- [ Perfect Forward Secrecy ] : #tls_perfect_forward_secrecy
1208
- [ Stream ] : stream.html#stream_stream
1209
- [ SSL_METHODS ] : https://www.openssl.org/docs/man1.0.2/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
1210
- [ tls.Server ] : #tls_class_tls_server
1211
- [ SSL_CTX_set_timeout ] : https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_timeout.html
1212
- [ Forward secrecy ] : https://en.wikipedia.org/wiki/Perfect_forward_secrecy
1213
1195
[ DHE ] : https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
1214
1196
[ ECDHE ] : https://en.wikipedia.org/wiki/Elliptic_curve_Diffie%E2%80%93Hellman
1215
- [ asn1.js ] : https://npmjs.org/package/asn1.js
1197
+ [ FIPS.186-4 ] : http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
1198
+ [ Forward secrecy ] : https://en.wikipedia.org/wiki/Perfect_forward_secrecy
1216
1199
[ OCSP request ] : https://en.wikipedia.org/wiki/OCSP_stapling
1217
- [ TLS recommendations ] : https://wiki.mozilla.org/Security/Server_Side_TLS
1200
+ [ OpenSSL Options ] : crypto.html#crypto_openssl_options
1201
+ [ OpenSSL cipher list format documentation ] : https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT
1202
+ [ Perfect Forward Secrecy ] : #tls_perfect_forward_secrecy
1203
+ [ RFC 4492 ] : https://www.rfc-editor.org/rfc/rfc4492.txt
1204
+ [ SSL_CTX_set_timeout ] : https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_timeout.html
1205
+ [ SSL_METHODS ] : https://www.openssl.org/docs/man1.0.2/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
1206
+ [ Stream ] : stream.html#stream_stream
1218
1207
[ TLS Session Tickets ] : https://www.ietf.org/rfc/rfc5077.txt
1208
+ [ TLS recommendations ] : https://wiki.mozilla.org/Security/Server_Side_TLS
1209
+ [ `'secureConnect'` ] : #tls_event_secureconnect
1210
+ [ `'secureConnection'` ] : #tls_event_secureconnection
1211
+ [ `crypto.getCurves()` ] : crypto.html#crypto_crypto_getcurves
1212
+ [ `net.Server.address()` ] : net.html#net_server_address
1213
+ [ `net.Server` ] : net.html#net_class_net_server
1214
+ [ `net.Socket` ] : net.html#net_class_net_socket
1219
1215
[ `tls.DEFAULT_ECDH_CURVE` ] : #tls_tls_default_ecdh_curve
1220
1216
[ `tls.TLSSocket.getPeerCertificate()` ] : #tls_tlssocket_getpeercertificate_detailed
1221
- [ `tls.createSecureContext() ` ] : #tls_tls_createsecurecontext_options
1217
+ [ `tls.TLSSocket ` ] : #tls_class_tls_tlssocket
1222
1218
[ `tls.connect()` ] : #tls_tls_connect_options_callback
1219
+ [ `tls.createSecureContext()` ] : #tls_tls_createsecurecontext_options
1220
+ [ `tls.createSecurePair()` ] : #tls_tls_createsecurepair_context_isserver_requestcert_rejectunauthorized_options
1221
+ [ `tls.createServer()` ] : #tls_tls_createserver_options_secureconnectionlistener
1222
+ [ asn1.js ] : https://npmjs.org/package/asn1.js
1223
+ [ modifying the default cipher suite ] : #tls_modifying_the_default_tls_cipher_suite
1224
+ [ specific attacks affecting larger AES key sizes ] : https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
1225
+ [ tls.Server ] : #tls_class_tls_server
0 commit comments