aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--doc/manual/building.rst6
-rw-r--r--doc/manual/fpe.rst4
-rw-r--r--doc/manual/fuzzing.rst4
-rw-r--r--doc/manual/side_channels.rst10
4 files changed, 12 insertions, 12 deletions
diff --git a/doc/manual/building.rst b/doc/manual/building.rst
index 6d9a1ba95..b3dbc97bb 100644
--- a/doc/manual/building.rst
+++ b/doc/manual/building.rst
@@ -10,7 +10,7 @@ the build system, primarily due to lack of access. Please contact the
maintainer if you would like to build Botan on such a system.
Botan's build is controlled by configure.py, which is a `Python
-<http://www.python.org>`_ script. Python 2.6 or later is required.
+<https://www.python.org>`_ script. Python 2.6 or later is required.
.. highlight:: none
@@ -237,7 +237,7 @@ For Android
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Instructions for building the library on Android can be found
-`here <http://www.tiwoc.de/blog/2013/03/building-the-botan-library-for-android/>`_.
+`here <https://www.danielseither.de/blog/2013/03/building-the-botan-library-for-android/>`_.
Other Build-Related Tasks
----------------------------------------
@@ -334,7 +334,7 @@ distribution this build is from. Applications can test this value by
checking the string value of the macro ``BOTAN_DISTRIBUTION_INFO``. It
can be set using the ``--distribution-info`` flag to ``configure.py``,
and otherwise defaults to "unspecified". For instance, a `Gentoo
-<http://www.gentoo.org>`_ ebuild might set it with
+<https://www.gentoo.org>`_ ebuild might set it with
``--distribution-info="Gentoo ${PVR}"`` where ``${PVR}`` is an ebuild
variable automatically set to a combination of the library and ebuild
versions.
diff --git a/doc/manual/fpe.rst b/doc/manual/fpe.rst
index 0de603217..3ce541558 100644
--- a/doc/manual/fpe.rst
+++ b/doc/manual/fpe.rst
@@ -13,7 +13,7 @@ mappings like English words onto other English words.
The scheme currently implemented in botan is called FE1, and described
in the paper `Format Preserving Encryption
-<http://eprint.iacr.org/2009/251>`_ by Mihir Bellare, Thomas
+<https://eprint.iacr.org/2009/251>`_ by Mihir Bellare, Thomas
Ristenpart, Phillip Rogaway, and Till Stegers. FPE is an area of
ongoing standardization and it is likely that other schemes will be
included in the future.
@@ -50,7 +50,7 @@ To use FE1, use these functions, from ``fpe_fe1.h``:
simply a random integer.
This example encrypts a credit card number with a valid
-`Luhn checksum <http://en.wikipedia.org/wiki/Luhn_algorithm>`_ to
+`Luhn checksum <https://en.wikipedia.org/wiki/Luhn_algorithm>`_ to
another number with the same format, including a correct checksum.
.. literalinclude:: ../../src/cli/cc_enc.cpp
diff --git a/doc/manual/fuzzing.rst b/doc/manual/fuzzing.rst
index 1f596f6da..8260582d6 100644
--- a/doc/manual/fuzzing.rst
+++ b/doc/manual/fuzzing.rst
@@ -9,10 +9,10 @@ the library.
Fuzzing with libFuzzer
------------------------
-To fuzz with libFuzzer (http://llvm.org/docs/LibFuzzer.html), you'll first
+To fuzz with libFuzzer (https://llvm.org/docs/LibFuzzer.html), you'll first
need to compile libFuzzer::
- $ svn co http://llvm.org/svn/llvm-project/compiler-rt/trunk/lib/fuzzer libFuzzer
+ $ svn co https://llvm.org/svn/llvm-project/compiler-rt/trunk/lib/fuzzer libFuzzer
$ cd libFuzzer && clang -c -g -O2 -std=c++11 *.cpp
$ ar cr libFuzzer.a libFuzzer/*.o
diff --git a/doc/manual/side_channels.rst b/doc/manual/side_channels.rst
index 5656001e4..7cf8a7b35 100644
--- a/doc/manual/side_channels.rst
+++ b/doc/manual/side_channels.rst
@@ -355,25 +355,25 @@ References
[CoronDpa] Coron,
"Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems"
-(http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695)
+(https://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695)
[InvalidCurve] Biehl, Meyer, Müller: Differential fault attacks on
elliptic curve cryptosystems
-(http://www.iacr.org/archive/crypto2000/18800131/18800131.pdf)
+(https://www.iacr.org/archive/crypto2000/18800131/18800131.pdf)
[InvalidCurveTLS] Jager, Schwenk, Somorovsky: Practical Invalid Curve
Attacks on TLS-ECDH
(https://www.nds.rub.de/research/publications/ESORICS15/)
[SafeCurves] Bernstein, Lange: SafeCurves: choosing safe curves for
-elliptic-curve cryptography. (http://safecurves.cr.yp.to)
+elliptic-curve cryptography. (https://safecurves.cr.yp.to)
[Lucky13] AlFardan, Paterson "Lucky Thirteen: Breaking the TLS and DTLS Record Protocols"
(http://www.isg.rhul.ac.uk/tls/TLStiming.pdf)
[MillionMsg] Bleichenbacher "Chosen Ciphertext Attacks Against Protocols Based
on the RSA Encryption Standard PKCS1"
-(http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.8543)
+(https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.8543)
[MillionMsgTiming] Meyer, Somorovsky, Weiss, Schwenk, Schinzel, Tews: Revisiting
SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks
@@ -385,7 +385,7 @@ Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0"
[RsaFault] Boneh, Demillo, Lipton
"On the importance of checking cryptographic protocols for faults"
-(http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.48.9764)
+(https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.48.9764)
[RandomMonty] Le, Tan, Tunstall "Randomizing the Montgomery Powering Ladder"
(https://eprint.iacr.org/2015/657)