Skip to content

Commit d3d857c

Browse files
authored
Merge pull request #737 from ruby/update-rfc-reference
Use www.rfc-editor.org for RFC text.
2 parents a8caa63 + 01b9cf8 commit d3d857c

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

ext/openssl/ossl_kdf.c

+5-5
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ static VALUE mKDF, eKDF;
1818
* of _length_ bytes.
1919
*
2020
* For more information about PBKDF2, see RFC 2898 Section 5.2
21-
* (https://tools.ietf.org/html/rfc2898#section-5.2).
21+
* (https://www.rfc-editor.org/rfc/rfc2898#section-5.2).
2222
*
2323
* === Parameters
2424
* pass :: The password.
@@ -81,10 +81,10 @@ kdf_pbkdf2_hmac(int argc, VALUE *argv, VALUE self)
8181
* bcrypt.
8282
*
8383
* The keyword arguments _N_, _r_ and _p_ can be used to tune scrypt. RFC 7914
84-
* (published on 2016-08, https://tools.ietf.org/html/rfc7914#section-2) states
84+
* (published on 2016-08, https://www.rfc-editor.org/rfc/rfc7914#section-2) states
8585
* that using values r=8 and p=1 appears to yield good results.
8686
*
87-
* See RFC 7914 (https://tools.ietf.org/html/rfc7914) for more information.
87+
* See RFC 7914 (https://www.rfc-editor.org/rfc/rfc7914) for more information.
8888
*
8989
* === Parameters
9090
* pass :: Passphrase.
@@ -147,7 +147,7 @@ kdf_scrypt(int argc, VALUE *argv, VALUE self)
147147
* KDF.hkdf(ikm, salt:, info:, length:, hash:) -> String
148148
*
149149
* HMAC-based Extract-and-Expand Key Derivation Function (HKDF) as specified in
150-
* {RFC 5869}[https://tools.ietf.org/html/rfc5869].
150+
* {RFC 5869}[https://www.rfc-editor.org/rfc/rfc5869].
151151
*
152152
* New in OpenSSL 1.1.0.
153153
*
@@ -165,7 +165,7 @@ kdf_scrypt(int argc, VALUE *argv, VALUE self)
165165
* The hash function.
166166
*
167167
* === Example
168-
* # The values from https://datatracker.ietf.org/doc/html/rfc5869#appendix-A.1
168+
* # The values from https://www.rfc-editor.org/rfc/rfc5869#appendix-A.1
169169
* ikm = ["0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"].pack("H*")
170170
* salt = ["000102030405060708090a0b0c"].pack("H*")
171171
* info = ["f0f1f2f3f4f5f6f7f8f9"].pack("H*")

ext/openssl/ossl_ns_spki.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -365,8 +365,8 @@ ossl_spki_verify(VALUE self, VALUE key)
365365
*
366366
* OpenSSL::Netscape is a namespace for SPKI (Simple Public Key
367367
* Infrastructure) which implements Signed Public Key and Challenge.
368-
* See {RFC 2692}[http://tools.ietf.org/html/rfc2692] and {RFC
369-
* 2693}[http://tools.ietf.org/html/rfc2692] for details.
368+
* See {RFC 2692}[https://www.rfc-editor.org/rfc/rfc2692] and {RFC
369+
* 2693}[https://www.rfc-editor.org/rfc/rfc2692] for details.
370370
*/
371371

372372
/* Document-class: OpenSSL::Netscape::SPKIError

test/openssl/test_ssl.rb

+1-1
Original file line numberDiff line numberDiff line change
@@ -691,7 +691,7 @@ def test_verify_wildcard
691691
assert_equal(true, OpenSSL::SSL.verify_wildcard("xn--qdk4b9b", "xn--qdk4b9b"))
692692
end
693693

694-
# Comments in this test is excerpted from http://tools.ietf.org/html/rfc6125#page-27
694+
# Comments in this test is excerpted from https://www.rfc-editor.org/rfc/rfc6125#page-27
695695
def test_post_connection_check_wildcard_san
696696
# case-insensitive ASCII comparison
697697
# RFC 6125, section 6.4.1

0 commit comments

Comments
 (0)