diff options
| author | Daniel Kahn Gillmor <dkg@fifthhorseman.net> | 2019-05-14 13:53:04 -0400 |
|---|---|---|
| committer | Daniel Kahn Gillmor <dkg@fifthhorseman.net> | 2019-05-14 16:26:02 -0400 |
| commit | 0df498e81fd36fb9af1916dcc5f05536fbc9e29f (patch) | |
| tree | 428cf3fc40199effdc98378a62539f1d713ad064 /doc/gcrypt.texi | |
| parent | 34e9306a66b47785ddbab6594ae4c23581d35b5a (diff) | |
| download | libgcrypt-http-to-https.tar.gz | |
use https instead of cleartext http where possiblehttp-to-https
The following domains all offer https, so use it:
- creativecommons.org
- cr.yp.to
- cryptojedi.org
- crypto.stanford.edu
- csrc.nist.gov
- donate.fsf.org
- ed25519.cr.yp.to
- eprint.iacr.org
- git.savannah.gnu.org
- gnu.org
- graphics.stanford.edu
- info.isl.ntt.co.jp
- lists.gnu.org
- lists.gnupg.org
- people.csail.mit.edu
- shiftleft.org
- software.intel.com
- tools.ietf.org
- web.archive.org
- web.cs.ucdavis.edu
- www.calcurco.cat
- www.columbia.edu
- www.cs.tau.ac.il
- www.cs.technion.ac.il
- www.cs.ucdavis.edu
- www.g10code.com
- www.gnu.org
- www.gnupg.org
- www.ii.uib.no
- www.intel.com
- www.larc.usp.br
Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Diffstat (limited to 'doc/gcrypt.texi')
| -rw-r--r-- | doc/gcrypt.texi | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/doc/gcrypt.texi b/doc/gcrypt.texi index d7bfa4c2..4873c5e7 100644 --- a/doc/gcrypt.texi +++ b/doc/gcrypt.texi @@ -508,7 +508,7 @@ Just like the function @code{gpg_strerror}, the function @anchor{enabling fips mode} Libgcrypt may be used in a FIPS 140-2 mode. Note, that this does not necessary mean that Libcgrypt is an appoved FIPS 140-2 module. Check the -NIST database at @url{http://csrc.nist.gov/groups/STM/cmvp/} to see what +NIST database at @url{https://csrc.nist.gov/groups/STM/cmvp/} to see what versions of Libgcrypt are approved. Because FIPS 140 has certain restrictions on the use of cryptography @@ -1615,7 +1615,7 @@ A 128 bit cipher as described by RFC4269. @itemx GCRY_CIPHER_CAMELLIA256 @cindex Camellia The Camellia cipher by NTT. See -@uref{http://info.isl.ntt.co.jp/@/crypt/@/eng/@/camellia/@/specifications.html}. +@uref{https://info.isl.ntt.co.jp/@/crypt/@/eng/@/camellia/@/specifications.html}. @item GCRY_CIPHER_SALSA20 @cindex Salsa20 @@ -1737,7 +1737,7 @@ of sequential data units. @cindex EAX, EAX mode EAX is an Authenticated Encryption with Associated Data (AEAD) block cipher mode by Bellare, Rogaway, and Wagner (see -@uref{http://web.cs.ucdavis.edu/~rogaway/papers/eax.html}). +@uref{https://web.cs.ucdavis.edu/~rogaway/papers/eax.html}). @end table @@ -2137,7 +2137,7 @@ interface allows to add more algorithms in the future. Libgcrypt's API for asymmetric cryptography is based on data structures called S-expressions (see -@uref{http://people.csail.mit.edu/@/rivest/@/sexp.html}) and does not work +@uref{https://people.csail.mit.edu/@/rivest/@/sexp.html}) and does not work with contexts as most of the other building blocks of Libgcrypt do. @noindent @@ -5651,7 +5651,7 @@ used. These tarballs are available from several places with the master copy at @indicateurl{ftp://ftp.gnupg.org/gcrypt/libgcrypt/}. Announcements of new releases are posted to the @indicateurl{gnupg-announce@@gnupg.org} mailing list@footnote{See -@url{http://www.gnupg.org/documentation/mailing-lists.en.html} for +@url{https://www.gnupg.org/documentation/mailing-lists.en.html} for details.}. |
