Skip to content

Commit 7c90d96

Browse files
kobelbMyles Borins
authored and
Myles Borins
committed
doc: update OpenSSL links
PR-URL: #9338 Reviewed-By: James M Snell <[email protected]> Reviewed-By: Sam Roberts <[email protected]> Reviewed-By: Roman Reiss <[email protected]>
1 parent bec1cca commit 7c90d96

File tree

4 files changed

+15
-15
lines changed

4 files changed

+15
-15
lines changed

BUILDING.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -230,7 +230,7 @@ as `deps/icu` (You'll have: `deps/icu/source/...`)
230230
NOTE: Windows is not yet supported
231231

232232
It is possible to build Node.js with
233-
[OpenSSL FIPS module](https://www.openssl.org/docs/fips/fipsnotes.html).
233+
[OpenSSL FIPS module](https://www.openssl.org/docs/fipsnotes.html).
234234

235235
**Note**: building in this way does **not** allow you to claim that the
236236
runtime is FIPS 140-2 validated. Instead you can indicate that the runtime

doc/api/crypto.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -1633,20 +1633,20 @@ the `crypto`, `tls`, and `https` modules and are generally specific to OpenSSL.
16331633
<tr>
16341634
<td><code>SSL_OP_ALL</code></td>
16351635
<td>Applies multiple bug workarounds within OpenSSL. See
1636-
https://www.openssl.org/docs/manmaster/ssl/SSL_CTX_set_options.html for
1636+
https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html for
16371637
detail.</td>
16381638
</tr>
16391639
<tr>
16401640
<td><code>SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION</code></td>
16411641
<td>Allows legacy insecure renegotiation between OpenSSL and unpatched
16421642
clients or servers. See
1643-
https://www.openssl.org/docs/manmaster/ssl/SSL_CTX_set_options.html.</td>
1643+
https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html.</td>
16441644
</tr>
16451645
<tr>
16461646
<td><code>SSL_OP_CIPHER_SERVER_PREFERENCE</code></td>
16471647
<td>Uses the server's preferences instead of the clients when selecting a
16481648
cipher. See
1649-
https://www.openssl.org/docs/manmaster/ssl/SSL_CTX_set_options.html.</td>
1649+
https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html.</td>
16501650
</tr>
16511651
<tr>
16521652
<td><code>SSL_OP_CISCO_ANYCONNECT</code></td>
@@ -1949,7 +1949,7 @@ the `crypto`, `tls`, and `https` modules and are generally specific to OpenSSL.
19491949
[`ecdh.generateKeys()`]: #crypto_ecdh_generatekeys_encoding_format
19501950
[`ecdh.setPrivateKey()`]: #crypto_ecdh_setprivatekey_private_key_encoding
19511951
[`ecdh.setPublicKey()`]: #crypto_ecdh_setpublickey_public_key_encoding
1952-
[`EVP_BytesToKey`]: https://www.openssl.org/docs/crypto/EVP_BytesToKey.html
1952+
[`EVP_BytesToKey`]: https://www.openssl.org/docs/man1.0.2/crypto/EVP_BytesToKey.html
19531953
[`hash.digest()`]: #crypto_hash_digest_encoding
19541954
[`hash.update()`]: #crypto_hash_update_data_input_encoding
19551955
[`hmac.digest()`]: #crypto_hmac_digest_encoding
@@ -1964,8 +1964,8 @@ the `crypto`, `tls`, and `https` modules and are generally specific to OpenSSL.
19641964
[initialization vector]: https://en.wikipedia.org/wiki/Initialization_vector
19651965
[NIST SP 800-131A]: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf
19661966
[NIST SP 800-132]: http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf
1967-
[OpenSSL cipher list format]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT
1968-
[OpenSSL's SPKAC implementation]: https://www.openssl.org/docs/apps/spkac.html
1967+
[OpenSSL cipher list format]: https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT
1968+
[OpenSSL's SPKAC implementation]: https://www.openssl.org/docs/man1.0.2/apps/spkac.html
19691969
[publicly trusted list of CAs]: https://mxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/certdata.txt
19701970
[RFC 2412]: https://www.rfc-editor.org/rfc/rfc2412.txt
19711971
[RFC 3526]: https://www.rfc-editor.org/rfc/rfc3526.txt

doc/api/https.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ The following options from [`tls.connect()`][] can also be specified. However, a
203203
certificates in PEM format. If this is omitted several well known "root"
204204
CAs will be used, like VeriSign. These are used to authorize connections.
205205
- `ciphers`: A string describing the ciphers to use or exclude. Consult
206-
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT> for
206+
<https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT> for
207207
details on the format.
208208
- `rejectUnauthorized`: If `true`, the server certificate is verified against
209209
the list of supplied CAs. An `'error'` event is emitted if verification
@@ -267,7 +267,7 @@ var req = https.request(options, (res) => {
267267
[`http.Server`]: http.html#http_class_http_server
268268
[`https.Agent`]: #https_class_https_agent
269269
[`https.request()`]: #https_https_request_options_callback
270-
[`SSL_METHODS`]: https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
270+
[`SSL_METHODS`]: https://www.openssl.org/docs/man1.0.2/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
271271
[`tls.connect()`]: tls.html#tls_tls_connect_options_callback
272272
[`tls.createServer()`]: tls.html#tls_tls_createserver_options_secureconnectionlistener
273273
[`url.parse()`]: url.html#url_url_parse_urlstring_parsequerystring_slashesdenotehost

doc/api/tls.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -535,7 +535,7 @@ that first defined the cipher.
535535
For example: `{ name: 'AES256-SHA', version: 'TLSv1/SSLv3' }`
536536

537537
See `SSL_CIPHER_get_name()` and `SSL_CIPHER_get_version()` in
538-
https://www.openssl.org/docs/manmaster/ssl/SSL_CIPHER_get_name.html for more
538+
https://www.openssl.org/docs/man1.0.2/ssl/SSL_CIPHER_get_name.html for more
539539
information.
540540

541541
### tlsSocket.getEphemeralKeyInfo()
@@ -611,7 +611,7 @@ Example responses include:
611611
* `TLSv1.2`
612612
* `unknown`
613613

614-
See https://www.openssl.org/docs/manmaster/ssl/SSL_get_version.html for more
614+
See https://www.openssl.org/docs/man1.0.2/ssl/SSL_get_version.html for more
615615
information.
616616

617617
### tlsSocket.getSession()
@@ -936,7 +936,7 @@ added: v0.11.13
936936
CRLs (Certificate Revocation List).
937937
* `ciphers` {string} A string describing the ciphers to use or exclude.
938938
Consult
939-
<https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT>
939+
<https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT>
940940
for details on the format.
941941
* `honorCipherOrder` {boolean} If `true`, when a cipher is being selected,
942942
the server's preferences will be used instead of the client preferences.
@@ -1252,7 +1252,7 @@ secure_socket = tls.TLSSocket(socket, options);
12521252

12531253
where `secure_socket` has the same API as `pair.cleartext`.
12541254

1255-
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT
1255+
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/man1.0.2/apps/ciphers.html#CIPHER-LIST-FORMAT
12561256
[Chrome's 'modern cryptography' setting]: https://www.chromium.org/Home/chromium-security/education/tls#TOC-Cipher-Suites
12571257
[specific attacks affecting larger AES key sizes]: https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
12581258
[`crypto.getCurves()`]: crypto.html#crypto_crypto_getcurves
@@ -1266,9 +1266,9 @@ where `secure_socket` has the same API as `pair.cleartext`.
12661266
[`'secureConnection'`]: #tls_event_secureconnection
12671267
[Perfect Forward Secrecy]: #tls_perfect_forward_secrecy
12681268
[Stream]: stream.html#stream_stream
1269-
[SSL_METHODS]: https://www.openssl.org/docs/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
1269+
[SSL_METHODS]: https://www.openssl.org/docs/man1.0.2/ssl/ssl.html#DEALING-WITH-PROTOCOL-METHODS
12701270
[tls.Server]: #tls_class_tls_server
1271-
[SSL_CTX_set_timeout]: https://www.openssl.org/docs/ssl/SSL_CTX_set_timeout.html
1271+
[SSL_CTX_set_timeout]: https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_timeout.html
12721272
[Forward secrecy]: https://en.wikipedia.org/wiki/Perfect_forward_secrecy
12731273
[DHE]: https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
12741274
[ECDHE]: https://en.wikipedia.org/wiki/Elliptic_curve_Diffie%E2%80%93Hellman

0 commit comments

Comments
 (0)