diff options
-rw-r--r-- | doc/manual/building.rst | 6 | ||||
-rw-r--r-- | doc/manual/fpe.rst | 4 | ||||
-rw-r--r-- | doc/manual/fuzzing.rst | 4 | ||||
-rw-r--r-- | doc/manual/side_channels.rst | 10 |
4 files changed, 12 insertions, 12 deletions
diff --git a/doc/manual/building.rst b/doc/manual/building.rst index 6d9a1ba95..b3dbc97bb 100644 --- a/doc/manual/building.rst +++ b/doc/manual/building.rst @@ -10,7 +10,7 @@ the build system, primarily due to lack of access. Please contact the maintainer if you would like to build Botan on such a system. Botan's build is controlled by configure.py, which is a `Python -<http://www.python.org>`_ script. Python 2.6 or later is required. +<https://www.python.org>`_ script. Python 2.6 or later is required. .. highlight:: none @@ -237,7 +237,7 @@ For Android ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Instructions for building the library on Android can be found -`here <http://www.tiwoc.de/blog/2013/03/building-the-botan-library-for-android/>`_. +`here <https://www.danielseither.de/blog/2013/03/building-the-botan-library-for-android/>`_. Other Build-Related Tasks ---------------------------------------- @@ -334,7 +334,7 @@ distribution this build is from. Applications can test this value by checking the string value of the macro ``BOTAN_DISTRIBUTION_INFO``. It can be set using the ``--distribution-info`` flag to ``configure.py``, and otherwise defaults to "unspecified". For instance, a `Gentoo -<http://www.gentoo.org>`_ ebuild might set it with +<https://www.gentoo.org>`_ ebuild might set it with ``--distribution-info="Gentoo ${PVR}"`` where ``${PVR}`` is an ebuild variable automatically set to a combination of the library and ebuild versions. diff --git a/doc/manual/fpe.rst b/doc/manual/fpe.rst index 0de603217..3ce541558 100644 --- a/doc/manual/fpe.rst +++ b/doc/manual/fpe.rst @@ -13,7 +13,7 @@ mappings like English words onto other English words. The scheme currently implemented in botan is called FE1, and described in the paper `Format Preserving Encryption -<http://eprint.iacr.org/2009/251>`_ by Mihir Bellare, Thomas +<https://eprint.iacr.org/2009/251>`_ by Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, and Till Stegers. FPE is an area of ongoing standardization and it is likely that other schemes will be included in the future. @@ -50,7 +50,7 @@ To use FE1, use these functions, from ``fpe_fe1.h``: simply a random integer. This example encrypts a credit card number with a valid -`Luhn checksum <http://en.wikipedia.org/wiki/Luhn_algorithm>`_ to +`Luhn checksum <https://en.wikipedia.org/wiki/Luhn_algorithm>`_ to another number with the same format, including a correct checksum. .. literalinclude:: ../../src/cli/cc_enc.cpp diff --git a/doc/manual/fuzzing.rst b/doc/manual/fuzzing.rst index 1f596f6da..8260582d6 100644 --- a/doc/manual/fuzzing.rst +++ b/doc/manual/fuzzing.rst @@ -9,10 +9,10 @@ the library. Fuzzing with libFuzzer ------------------------ -To fuzz with libFuzzer (http://llvm.org/docs/LibFuzzer.html), you'll first +To fuzz with libFuzzer (https://llvm.org/docs/LibFuzzer.html), you'll first need to compile libFuzzer:: - $ svn co http://llvm.org/svn/llvm-project/compiler-rt/trunk/lib/fuzzer libFuzzer + $ svn co https://llvm.org/svn/llvm-project/compiler-rt/trunk/lib/fuzzer libFuzzer $ cd libFuzzer && clang -c -g -O2 -std=c++11 *.cpp $ ar cr libFuzzer.a libFuzzer/*.o diff --git a/doc/manual/side_channels.rst b/doc/manual/side_channels.rst index 5656001e4..7cf8a7b35 100644 --- a/doc/manual/side_channels.rst +++ b/doc/manual/side_channels.rst @@ -355,25 +355,25 @@ References [CoronDpa] Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems" -(http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695) +(https://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695) [InvalidCurve] Biehl, Meyer, Müller: Differential fault attacks on elliptic curve cryptosystems -(http://www.iacr.org/archive/crypto2000/18800131/18800131.pdf) +(https://www.iacr.org/archive/crypto2000/18800131/18800131.pdf) [InvalidCurveTLS] Jager, Schwenk, Somorovsky: Practical Invalid Curve Attacks on TLS-ECDH (https://www.nds.rub.de/research/publications/ESORICS15/) [SafeCurves] Bernstein, Lange: SafeCurves: choosing safe curves for -elliptic-curve cryptography. (http://safecurves.cr.yp.to) +elliptic-curve cryptography. (https://safecurves.cr.yp.to) [Lucky13] AlFardan, Paterson "Lucky Thirteen: Breaking the TLS and DTLS Record Protocols" (http://www.isg.rhul.ac.uk/tls/TLStiming.pdf) [MillionMsg] Bleichenbacher "Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS1" -(http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.8543) +(https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.8543) [MillionMsgTiming] Meyer, Somorovsky, Weiss, Schwenk, Schinzel, Tews: Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks @@ -385,7 +385,7 @@ Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0" [RsaFault] Boneh, Demillo, Lipton "On the importance of checking cryptographic protocols for faults" -(http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.48.9764) +(https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.48.9764) [RandomMonty] Le, Tan, Tunstall "Randomizing the Montgomery Powering Ladder" (https://eprint.iacr.org/2015/657) |