Commit 8c734df4 authored by Tim Rühsen's avatar Tim Rühsen 🛠
Browse files

Use https:// in lib/, src/, and m4/


Signed-off-by: Tim Rühsen's avatarTim Rühsen <tim.ruehsen@gmx.de>
parent 699cd8bd
......@@ -5,8 +5,8 @@
## By Mike Hamburg (Stanford University), 2009
## Public domain.
##
## For details see http://shiftleft.org/papers/vector_aes/ and
## http://crypto.stanford.edu/vpaes/.
## For details see https://shiftleft.org/papers/vector_aes/ and
## https://crypto.stanford.edu/vpaes/.
#
# *** This file is auto-generated ***
#
......
......@@ -5,8 +5,8 @@
## By Mike Hamburg (Stanford University), 2009
## Public domain.
##
## For details see http://shiftleft.org/papers/vector_aes/ and
## http://crypto.stanford.edu/vpaes/.
## For details see https://shiftleft.org/papers/vector_aes/ and
## https://crypto.stanford.edu/vpaes/.
#
# *** This file is auto-generated ***
#
......
......@@ -5,8 +5,8 @@
## By Mike Hamburg (Stanford University), 2009
## Public domain.
##
## For details see http://shiftleft.org/papers/vector_aes/ and
## http://crypto.stanford.edu/vpaes/.
## For details see https://shiftleft.org/papers/vector_aes/ and
## https://crypto.stanford.edu/vpaes/.
#
# *** This file is auto-generated ***
#
......
......@@ -5,8 +5,8 @@
## By Mike Hamburg (Stanford University), 2009
## Public domain.
##
## For details see http://shiftleft.org/papers/vector_aes/ and
## http://crypto.stanford.edu/vpaes/.
## For details see https://shiftleft.org/papers/vector_aes/ and
## https://crypto.stanford.edu/vpaes/.
#
# *** This file is auto-generated ***
#
......
......@@ -2,7 +2,7 @@
Written by Andy Polyakov <appro@fy.chalmers.se> for the OpenSSL
project. The module is, however, dual licensed under OpenSSL and
CRYPTOGAMS licenses depending on where you obtain it. For further
details see http://www.openssl.org/~appro/cryptogams/.
details see https://www.openssl.org/~appro/cryptogams/.
====================================================================
Copyright (c) 2006-2012, CRYPTOGAMS by <appro@openssl.org>
......@@ -50,5 +50,5 @@ OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
## By Mike Hamburg (Stanford University), 2009
## Public domain.
##
## For details see http://shiftleft.org/papers/vector_aes/ and
## http://crypto.stanford.edu/vpaes/.
## For details see https://shiftleft.org/papers/vector_aes/ and
## https://crypto.stanford.edu/vpaes/.
......@@ -5,8 +5,8 @@
## By Mike Hamburg (Stanford University), 2009
## Public domain.
##
## For details see http://shiftleft.org/papers/vector_aes/ and
## http://crypto.stanford.edu/vpaes/.
## For details see https://shiftleft.org/papers/vector_aes/ and
## https://crypto.stanford.edu/vpaes/.
#
# *** This file is auto-generated ***
#
......
......@@ -5,8 +5,8 @@
## By Mike Hamburg (Stanford University), 2009
## Public domain.
##
## For details see http://shiftleft.org/papers/vector_aes/ and
## http://crypto.stanford.edu/vpaes/.
## For details see https://shiftleft.org/papers/vector_aes/ and
## https://crypto.stanford.edu/vpaes/.
#
# *** This file is auto-generated ***
#
......
......@@ -30,7 +30,7 @@
* data that are between 256 and 511 bytes, and this extension will
* make sure that client hello isn't in this range.
*
* [0]. http://www.ietf.org/mail-archive/web/tls/current/msg10423.html
* [0]. https://www.ietf.org/mail-archive/web/tls/current/msg10423.html
*/
static int _gnutls_dumbfw_send_params(gnutls_session_t session,
......
......@@ -197,7 +197,7 @@ _gnutls_signature_algorithm_recv_params(gnutls_session_t session,
gnutls_assert();
/* Although TLS 1.2 mandates that we must not accept reply
* to this message, there are good reasons to just ignore it. Check
* http://www.ietf.org/mail-archive/web/tls/current/msg03880.html
* https://www.ietf.org/mail-archive/web/tls/current/msg03880.html
*/
/* return GNUTLS_E_UNEXPECTED_PACKET; */
} else {
......
......@@ -16,7 +16,7 @@ includedir=@includedir@
Name: GnuTLS
Description: Transport Security Layer implementation for the GNU system
URL: http://www.gnutls.org/
URL: https://www.gnutls.org/
Version: @VERSION@
Libs: -L${libdir} -lgnutls
Libs.private: @LIBINTL@ @LIBSOCKET@ @INET_PTON_LIB@ @LIBPTHREAD@ @LIB_SELECT@ @TSS_LIBS@ @GMP_LIBS@ @LIBUNISTRING@ @LIBIDN2_LIBS@ @LIBATOMIC_LIBS@
......
......@@ -40,7 +40,7 @@ extern mutex_unlock_func gnutls_mutex_unlock;
# include <windows.h>
/* Idea based based on comment 2 at:
* http://stackoverflow.com/questions/3555859/is-it-possible-to-do-static-initialization-of-mutexes-in-windows
* https://stackoverflow.com/questions/3555859/is-it-possible-to-do-static-initialization-of-mutexes-in-windows
*/
# define GNUTLS_STATIC_MUTEX(mutex) \
static CRITICAL_SECTION *mutex = NULL
......
......@@ -853,7 +853,7 @@ int gnutls_pkcs12_set_bag(gnutls_pkcs12_t pkcs12, gnutls_pkcs12_bag_t bag)
* Russian differs from PKCS#12 here. It described proprietary way
* to obtain MAC key instead of using standard mechanism.
*
* See http://wwwold.tc26.ru/standard/rs/%D0%A0%2050.1.112-2016.pdf
* See https://wwwold.tc26.ru/standard/rs/%D0%A0%2050.1.112-2016.pdf
* section 5.
*/
static int
......
......@@ -346,7 +346,7 @@ LIBTASN1_MINIMUM=4.9
AM_CONDITIONAL(ENABLE_OCSP, test "$ac_enable_ocsp" != "no")
# For storing integers in pointers without warnings
# http://developer.gnome.org/doc/API/2.0/glib/glib-Type-Conversion-Macros.html#desc
# https://developer.gnome.org/doc/API/2.0/glib/glib-Type-Conversion-Macros.html#desc
AC_CHECK_SIZEOF(void *)
AC_CHECK_SIZEOF(long long)
AC_CHECK_SIZEOF(long)
......
......@@ -951,7 +951,7 @@ challenge_password = 123456
# An URL that has CRLs (certificate revocation lists)
# available. Needed in CA certificates.
#crl_dist_points = "http://www.getcrl.crl/getcrl/"
#crl_dist_points = "https://www.getcrl.crl/getcrl/"
# Whether this is a CA certificate or not
#ca
......@@ -1074,10 +1074,10 @@ encryption_key
#path_len = 2
# OCSP URI
# ocsp_uri = http://my.ocsp.server/ocsp
# ocsp_uri = https://my.ocsp.server/ocsp
# CA issuers URI
# ca_issuers_uri = http://my.ca.issuer
# ca_issuers_uri = https://my.ca.issuer
# Certificate policies
#policy1 = 1.3.6.1.4.1.5484.1.10.99.1.0
......
......@@ -651,7 +651,7 @@ generate_certificate(gnutls_privkey_t * ret_key,
get_ca_issuers_set(crt);
if (usage != 0) {
/* http://tools.ietf.org/html/rfc4945#section-5.1.3.2: if any KU is
/* https://tools.ietf.org/html/rfc4945#section-5.1.3.2: if any KU is
set, then either digitalSignature or the nonRepudiation bits in the
KeyUsage extension MUST for all IKE certs */
if (is_ike && (get_sign_status(server) != 1))
......
......@@ -21,7 +21,7 @@
#include <config.h>
/* Work around problem reported in
<http://permalink.gmane.org/gmane.comp.lib.gnulib.bugs/15755>.*/
<https://permalink.gmane.org/gmane.comp.lib.gnulib.bugs/15755>.*/
#if GETTIMEOFDAY_CLOBBERS_LOCALTIME
#undef localtime
#endif
......
......@@ -293,7 +293,7 @@ this information:
@example
Authority Information Access Information (not critical):
Access Method: 1.3.6.1.5.5.7.48.1 (id-ad-ocsp)
Access Location URI: http://ocsp.CAcert.org/
Access Location URI: https://ocsp.CAcert.org/
@end example
This means that ocsptool can discover the servers to contact over HTTP.
......@@ -309,7 +309,7 @@ OCSP server as well as ask information on a particular certificate
using --load-cert and --load-issuer.
@example
$ ocsptool --ask http://ocsp.CAcert.org/ --load-chain chain.pem
$ ocsptool --ask https://ocsp.CAcert.org/ --load-chain chain.pem
@end example
_EOF_;
......
......@@ -508,7 +508,7 @@ gnutls_session_t initialize_session(int dtls)
static const char DEFAULT_DATA[] =
"This is the default message reported by the GnuTLS implementation. "
"For more information please visit "
"<a href=\"http://www.gnutls.org/\">http://www.gnutls.org/</a>.";
"<a href=\"https://www.gnutls.org/\">https://www.gnutls.org/</a>.";
/* Creates html with the current session information.
*/
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment