summaryrefslogtreecommitdiff
path: root/doc/gcrypt.texi
diff options
context:
space:
mode:
authorDaniel Kahn Gillmor <dkg@fifthhorseman.net>2019-05-14 13:53:04 -0400
committerDaniel Kahn Gillmor <dkg@fifthhorseman.net>2019-05-14 16:26:02 -0400
commit0df498e81fd36fb9af1916dcc5f05536fbc9e29f (patch)
tree428cf3fc40199effdc98378a62539f1d713ad064 /doc/gcrypt.texi
parent34e9306a66b47785ddbab6594ae4c23581d35b5a (diff)
downloadlibgcrypt-http-to-https.tar.gz
use https instead of cleartext http where possiblehttp-to-https
The following domains all offer https, so use it: - creativecommons.org - cr.yp.to - cryptojedi.org - crypto.stanford.edu - csrc.nist.gov - donate.fsf.org - ed25519.cr.yp.to - eprint.iacr.org - git.savannah.gnu.org - gnu.org - graphics.stanford.edu - info.isl.ntt.co.jp - lists.gnu.org - lists.gnupg.org - people.csail.mit.edu - shiftleft.org - software.intel.com - tools.ietf.org - web.archive.org - web.cs.ucdavis.edu - www.calcurco.cat - www.columbia.edu - www.cs.tau.ac.il - www.cs.technion.ac.il - www.cs.ucdavis.edu - www.g10code.com - www.gnu.org - www.gnupg.org - www.ii.uib.no - www.intel.com - www.larc.usp.br Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Diffstat (limited to 'doc/gcrypt.texi')
-rw-r--r--doc/gcrypt.texi10
1 files changed, 5 insertions, 5 deletions
diff --git a/doc/gcrypt.texi b/doc/gcrypt.texi
index d7bfa4c2..4873c5e7 100644
--- a/doc/gcrypt.texi
+++ b/doc/gcrypt.texi
@@ -508,7 +508,7 @@ Just like the function @code{gpg_strerror}, the function
@anchor{enabling fips mode}
Libgcrypt may be used in a FIPS 140-2 mode. Note, that this does not
necessary mean that Libcgrypt is an appoved FIPS 140-2 module. Check the
-NIST database at @url{http://csrc.nist.gov/groups/STM/cmvp/} to see what
+NIST database at @url{https://csrc.nist.gov/groups/STM/cmvp/} to see what
versions of Libgcrypt are approved.
Because FIPS 140 has certain restrictions on the use of cryptography
@@ -1615,7 +1615,7 @@ A 128 bit cipher as described by RFC4269.
@itemx GCRY_CIPHER_CAMELLIA256
@cindex Camellia
The Camellia cipher by NTT. See
-@uref{http://info.isl.ntt.co.jp/@/crypt/@/eng/@/camellia/@/specifications.html}.
+@uref{https://info.isl.ntt.co.jp/@/crypt/@/eng/@/camellia/@/specifications.html}.
@item GCRY_CIPHER_SALSA20
@cindex Salsa20
@@ -1737,7 +1737,7 @@ of sequential data units.
@cindex EAX, EAX mode
EAX is an Authenticated Encryption with Associated Data (AEAD) block cipher
mode by Bellare, Rogaway, and Wagner (see
-@uref{http://web.cs.ucdavis.edu/~rogaway/papers/eax.html}).
+@uref{https://web.cs.ucdavis.edu/~rogaway/papers/eax.html}).
@end table
@@ -2137,7 +2137,7 @@ interface allows to add more algorithms in the future.
Libgcrypt's API for asymmetric cryptography is based on data structures
called S-expressions (see
-@uref{http://people.csail.mit.edu/@/rivest/@/sexp.html}) and does not work
+@uref{https://people.csail.mit.edu/@/rivest/@/sexp.html}) and does not work
with contexts as most of the other building blocks of Libgcrypt do.
@noindent
@@ -5651,7 +5651,7 @@ used. These tarballs are available from several places with the master
copy at @indicateurl{ftp://ftp.gnupg.org/gcrypt/libgcrypt/}.
Announcements of new releases are posted to the
@indicateurl{gnupg-announce@@gnupg.org} mailing list@footnote{See
-@url{http://www.gnupg.org/documentation/mailing-lists.en.html} for
+@url{https://www.gnupg.org/documentation/mailing-lists.en.html} for
details.}.