Skip to content

Commit 228e079

Browse files
committed
removed http
1 parent 9acdbae commit 228e079

File tree

19 files changed

+29
-29
lines changed

19 files changed

+29
-29
lines changed

Diff for: core/src/main/java/org/bouncycastle/crypto/digests/KeccakDigest.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
import org.bouncycastle.util.encoders.Hex;
77

88
/**
9-
* implementation of Keccak based on following KeccakNISTInterface.c from http://keccak.noekeon.org/
9+
* implementation of Keccak based on following KeccakNISTInterface.c from https://keccak.noekeon.org/
1010
* <p>
1111
* Following the naming conventions used in the C source code to enable easy review of the implementation.
1212
*/

Diff for: core/src/main/java/org/bouncycastle/crypto/digests/SHA3Digest.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33

44
/**
5-
* implementation of SHA-3 based on following KeccakNISTInterface.c from http://keccak.noekeon.org/
5+
* implementation of SHA-3 based on following KeccakNISTInterface.c from https://keccak.noekeon.org/
66
* <p>
77
* Following the naming conventions used in the C source code to enable easy review of the implementation.
88
*/

Diff for: core/src/main/java/org/bouncycastle/crypto/digests/SHAKEDigest.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55

66
/**
7-
* implementation of SHAKE based on following KeccakNISTInterface.c from http://keccak.noekeon.org/
7+
* implementation of SHAKE based on following KeccakNISTInterface.c from https://keccak.noekeon.org/
88
* <p>
99
* Following the naming conventions used in the C source code to enable easy review of the implementation.
1010
*/

Diff for: core/src/main/java/org/bouncycastle/crypto/engines/GOST28147Engine.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,8 @@ public class GOST28147Engine
3939

4040
/*
4141
* class content S-box parameters for encrypting
42-
* getting from, see: http://tools.ietf.org/id/draft-popov-cryptopro-cpalgs-01.txt
43-
* http://tools.ietf.org/id/draft-popov-cryptopro-cpalgs-02.txt
42+
* getting from, see: https://tools.ietf.org/id/draft-popov-cryptopro-cpalgs-01.txt
43+
* https://tools.ietf.org/id/draft-popov-cryptopro-cpalgs-02.txt
4444
*/
4545
private static byte[] ESbox_Test = {
4646
0x4,0x2,0xF,0x5,0x9,0x1,0x0,0x8,0xE,0x3,0xB,0xC,0xD,0x7,0xA,0x6,

Diff for: core/src/main/java/org/bouncycastle/crypto/engines/SM4Engine.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
/**
1111
* SM4 Block Cipher - SM4 is a 128 bit block cipher with a 128 bit key.
1212
* <p>
13-
* The implementation here is based on the document <a href="http://eprint.iacr.org/2008/329.pdf">http://eprint.iacr.org/2008/329.pdf</a>
13+
* The implementation here is based on the document <a href="https://eprint.iacr.org/2008/329.pdf">https://eprint.iacr.org/2008/329.pdf</a>
1414
* by Whitfield Diffie and George Ledin, which is a translation of Prof. LU Shu-wang's original standard.
1515
* </p>
1616
*/

Diff for: core/src/main/java/org/bouncycastle/crypto/engines/Shacal2Engine.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
* using SHA-256-Initialization-Values as data and SHA-256-Data as key.
1414
* <p>
1515
* A description of Shacal can be found at:
16-
* http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.4066
16+
* https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.4066
1717
* Best known cryptanalytic (Wikipedia 11.2013):
1818
* Related-key rectangle attack on 44-rounds (Jiqiang Lu, Jongsung Kim).
1919
* Comments are related to SHA-256-Naming as described in FIPS PUB 180-2

Diff for: core/src/main/java/org/bouncycastle/pqc/math/linearalgebra/GF2nONBField.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
* This class implements the abstract class <tt>GF2nField</tt> for ONB
1111
* representation. It computes the fieldpolynomial, multiplication matrix and
1212
* one of its roots mONBRoot, (see for example <a
13-
* href=http://www2.certicom.com/ecc/intro.htm>Certicoms Whitepapers</a>).
13+
* href=https://www2.certicom.com/ecc/intro.htm>Certicoms Whitepapers</a>).
1414
* GF2nField is used by GF2nONBElement which implements the elements of this
1515
* field.
1616
*

Diff for: core/src/main/java/org/bouncycastle/pqc/math/ntru/euclid/BigIntEuclidean.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ private BigIntEuclidean()
1515

1616
/**
1717
* Runs the EEA on two <code>BigInteger</code>s<br>
18-
* Implemented from pseudocode on <a href="http://en.wikipedia.org/wiki/Extended_Euclidean_algorithm">Wikipedia</a>.
18+
* Implemented from pseudocode on <a href="https://en.wikipedia.org/wiki/Extended_Euclidean_algorithm">Wikipedia</a>.
1919
*
2020
* @param a
2121
* @param b
@@ -51,4 +51,4 @@ public static BigIntEuclidean calculate(BigInteger a, BigInteger b)
5151
result.gcd = a;
5252
return result;
5353
}
54-
}
54+
}

Diff for: core/src/main/java/org/bouncycastle/pqc/math/ntru/euclid/IntEuclidean.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ private IntEuclidean()
1313

1414
/**
1515
* Runs the EEA on two <code>int</code>s<br>
16-
* Implemented from pseudocode on <a href="http://en.wikipedia.org/wiki/Extended_Euclidean_algorithm">Wikipedia</a>.
16+
* Implemented from pseudocode on <a href="https://en.wikipedia.org/wiki/Extended_Euclidean_algorithm">Wikipedia</a>.
1717
*
1818
* @param a
1919
* @param b
@@ -48,4 +48,4 @@ public static IntEuclidean calculate(int a, int b)
4848
result.gcd = a;
4949
return result;
5050
}
51-
}
51+
}

Diff for: core/src/main/java/org/bouncycastle/pqc/math/ntru/polynomial/IntegerPolynomial.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -684,7 +684,7 @@ public Resultant resultantMultiThread()
684684
int N = coeffs.length;
685685

686686
// upper bound for resultant(f, g) = ||f, 2||^deg(g) * ||g, 2||^deg(f) = squaresum(f)^(N/2) * 2^(deg(f)/2) because g(x)=x^N-1
687-
// see http://jondalon.mathematik.uni-osnabrueck.de/staff/phpages/brunsw/CompAlg.pdf chapter 3
687+
// see https://jondalon.mathematik.uni-osnabrueck.de/staff/phpages/brunsw/CompAlg.pdf chapter 3
688688
BigInteger max = squareSum().pow((N + 1) / 2);
689689
max = max.multiply(BigInteger.valueOf(2).pow((degree() + 1) / 2));
690690
BigInteger max2 = max.multiply(BigInteger.valueOf(2));

Diff for: core/src/main/java/org/bouncycastle/pqc/math/ntru/util/ArrayEncoder.java

+3-3
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ public class ArrayEncoder
1313
{
1414
/**
1515
* Bit string to coefficient conversion table from P1363.1. Also found at
16-
* {@link http://stackoverflow.com/questions/1562548/how-to-make-a-message-into-a-polynomial}
16+
* {@link https://stackoverflow.com/questions/1562548/how-to-make-a-message-into-a-polynomial}
1717
* <p>
1818
* Convert each three-bit quantity to two ternary coefficients as follows, and concatenate the resulting
1919
* ternary quantities to obtain [the output].
@@ -34,7 +34,7 @@ public class ArrayEncoder
3434
private static final int[] COEFF2_TABLE = {0, 1, -1, 0, 1, -1, 0, 1};
3535
/**
3636
* Coefficient to bit string conversion table from P1363.1. Also found at
37-
* {@link http://stackoverflow.com/questions/1562548/how-to-make-a-message-into-a-polynomial}
37+
* {@link https://stackoverflow.com/questions/1562548/how-to-make-a-message-into-a-polynomial}
3838
* <p>
3939
* Convert each set of two ternary coefficients to three bits as follows, and concatenate the resulting bit
4040
* quantities to obtain [the output]:
@@ -291,4 +291,4 @@ private static int getBit(byte[] arr, int bitIndex)
291291
int arrElem = arr[byteIndex] & 0xFF;
292292
return (arrElem >> (bitIndex % 8)) & 1;
293293
}
294-
}
294+
}

Diff for: core/src/test/java/org/bouncycastle/crypto/test/SM4Test.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
import org.bouncycastle.util.test.SimpleTest;
1313

1414
/**
15-
* SM4 tester, vectors from <a href="http://eprint.iacr.org/2008/329.pdf">http://eprint.iacr.org/2008/329.pdf</a>
15+
* SM4 tester, vectors from <a href="https://eprint.iacr.org/2008/329.pdf">http://eprint.iacr.org/2008/329.pdf</a>
1616
*/
1717
public class SM4Test
1818
extends CipherTest

Diff for: core/src/test/java/org/bouncycastle/crypto/test/speedy/Poly1305Reference.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
* consisting of a 128 bit key applied to an underlying cipher, and a 128 bit key (with 106
1717
* effective key bits) used in the authenticator.
1818
* <p>
19-
* This implementation is adapted from the public domain <a href="http://nacl.cr.yp.to/">nacl</a>
19+
* This implementation is adapted from the public domain <a href="https://nacl.cr.yp.to/">nacl</a>
2020
* <code>ref</code> implementation, and is probably too slow for real usage.
2121
*
2222
* @see Poly1305KeyGenerator

Diff for: jce/src/main/java/javax/crypto/Cipher.java

+4-4
Original file line numberDiff line numberDiff line change
@@ -409,7 +409,7 @@ public final ExemptionMechanism getExemptionMechanism()
409409
* <p>
410410
* If this cipher (including its underlying feedback or padding scheme)
411411
* requires any random bytes (e.g., for parameter generation), it will get
412-
* them using the <a href="http://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
412+
* them using the <a href="https://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
413413
* <code>SecureRandom</code></a> implementation of the highest-priority
414414
* installed provider as the source of randomness.
415415
* (If none of the installed providers supply an implementation of
@@ -511,7 +511,7 @@ public final void init(
511511
* If this cipher (including its underlying feedback or padding scheme)
512512
* requires any random bytes (e.g., for parameter generation), it will get
513513
* them using the
514-
* <a href="http://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
514+
* <a href="https://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
515515
* <code>SecureRandom</code></a> implementation of the highest-priority
516516
* installed provider as the source of randomness.
517517
* (If none of the installed providers supply an implementation of
@@ -626,7 +626,7 @@ public final void init(
626626
* If this cipher (including its underlying feedback or padding scheme)
627627
* requires any random bytes (e.g., for parameter generation), it will get
628628
* them using the
629-
* <a href="http://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
629+
* <a href="https://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
630630
* <code>SecureRandom</code></a> implementation of the highest-priority
631631
* installed provider as the source of randomness.
632632
* (If none of the installed providers supply an implementation of
@@ -752,7 +752,7 @@ public final void init(
752752
* If this cipher (including its underlying feedback or padding scheme)
753753
* requires any random bytes (e.g., for parameter generation), it will get
754754
* them using the
755-
* <a href="http://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
755+
* <a href="https://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
756756
* <code>SecureRandom</code></a>
757757
* implementation of the highest-priority installed provider as the source of randomness.
758758
* (If none of the installed providers supply an implementation of

Diff for: jce/src/main/java/javax/crypto/KeyAgreement.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ public final Provider getProvider()
193193
* contain all the algorithm parameters required for this key agreement.
194194
* <p>
195195
* If this key agreement requires any random bytes, it will get
196-
* them using the <a href="http://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
196+
* them using the <a href="https://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
197197
* <code>SecureRandom</code></a> implementation of the highest-priority
198198
* installed provider as the source of randomness.
199199
* (If none of the installed providers supply an implementation of
@@ -245,7 +245,7 @@ public final void init(
245245
* algorithm parameters.
246246
* <p>
247247
* If this key agreement requires any random bytes, it will get
248-
* them using the <a href="http://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
248+
* them using the <a href="https://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
249249
* <code>SecureRandom</code></a> implementation of the highest-priority
250250
* installed provider as the source of randomness.
251251
* (If none of the installed providers supply an implementation of

Diff for: jce/src/main/java/javax/crypto/KeyGenerator.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@ public final void init(
226226
* Initializes this key generator with the specified parameter set.
227227
* <p>
228228
* If this key generator requires any random bytes, it will get them
229-
* using the * <a href="http://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
229+
* using the * <a href="https://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
230230
* <code>SecureRandom</code></a> implementation of the highest-priority installed
231231
* provider as the source of randomness.
232232
* (If none of the installed providers supply an implementation of
@@ -262,7 +262,7 @@ public final void init(
262262
* Initializes this key generator for a certain keysize.
263263
* <p>
264264
* If this key generator requires any random bytes, it will get them using the
265-
* <a href="http://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
265+
* <a href="https://java.sun.com/products/jdk/1.2/docs/api/java.security.SecureRandom.html">
266266
* <code>SecureRandom</code></a> implementation of the highest-priority installed provider as
267267
* the source of randomness. (If none of the installed providers supply an implementation of
268268
* SecureRandom, a system-provided source of randomness will be used.)

Diff for: jce/src/main/java/javax/crypto/spec/DHGenParameterSpec.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ public class DHGenParameterSpec
2020
/**
2121
* Constructs a parameter set for the generation of Diffie-Hellman
2222
* (system) parameters. The constructed parameter set can be used to
23-
* initialize an <a href="http://java.sun.com/products/jdk/1.2/docs/api/java.security.AlgorithmParameterGenerator.html"><code>AlgorithmParameterGenerator</code></a>
23+
* initialize an <a href="https://java.sun.com/products/jdk/1.2/docs/api/java.security.AlgorithmParameterGenerator.html"><code>AlgorithmParameterGenerator</code></a>
2424
* object for the generation of Diffie-Hellman parameters.
2525
*
2626
* @param primeSize the size (in bits) of the prime modulus.

Diff for: prov/src/main/java/org/bouncycastle/x509/util/LDAPStoreHelper.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@
5858
* <ul>
5959
* <li><a href="https://www.ietf.org/rfc/rfc2587.txt">RFC 2587</a>
6060
* <li><a
61-
* href="http://www3.ietf.org/proceedings/01mar/I-D/pkix-ldap-schema-01.txt">Internet
61+
* href="https://www3.ietf.org/proceedings/01mar/I-D/pkix-ldap-schema-01.txt">Internet
6262
* X.509 Public Key Infrastructure Additional LDAP Schema for PKIs and PMIs</a>
6363
* </ul>
6464
*/

Diff for: prov/src/main/jdk1.4/org/bouncycastle/x509/util/LDAPStoreHelper.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@
5858
* <ul>
5959
* <li><a href="https://www.ietf.org/rfc/rfc2587.txt">RFC 2587</a>
6060
* <li><a
61-
* href="http://www3.ietf.org/proceedings/01mar/I-D/pkix-ldap-schema-01.txt">Internet
61+
* href="https://www3.ietf.org/proceedings/01mar/I-D/pkix-ldap-schema-01.txt">Internet
6262
* X.509 Public Key Infrastructure Additional LDAP Schema for PKIs and PMIs</a>
6363
* </ul>
6464
* </p>

0 commit comments

Comments
 (0)