diff options
author | Sawyer Billings <sawpaw19@gmail.com> | 2020-12-30 21:49:12 -0500 |
---|---|---|
committer | fanquake <fanquake@gmail.com> | 2021-01-04 12:23:16 +0800 |
commit | e8640849c775efcf202dbd34736fed8d61379c49 (patch) | |
tree | 61f54fc033bdd157d33e6afd89a96c929592beb3 /src/crypto/chacha_poly_aead.h | |
parent | f52f427b8eece858844c395e47c378864acc242d (diff) |
doc: Use https URLs where possible
Diffstat (limited to 'src/crypto/chacha_poly_aead.h')
-rw-r--r-- | src/crypto/chacha_poly_aead.h | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypto/chacha_poly_aead.h b/src/crypto/chacha_poly_aead.h index b3ba781cdd..0afe8fcc14 100644 --- a/src/crypto/chacha_poly_aead.h +++ b/src/crypto/chacha_poly_aead.h @@ -17,12 +17,12 @@ static constexpr int AAD_PACKAGES_PER_ROUND = 21; /* 64 / 3 round down*/ /* A AEAD class for ChaCha20-Poly1305@bitcoin. * * ChaCha20 is a stream cipher designed by Daniel Bernstein and described in - * <ref>[http://cr.yp.to/chacha/chacha-20080128.pdf ChaCha20]</ref>. It operates + * <ref>[https://cr.yp.to/chacha/chacha-20080128.pdf ChaCha20]</ref>. It operates * by permuting 128 fixed bits, 128 or 256 bits of key, a 64 bit nonce and a 64 * bit counter into 64 bytes of output. This output is used as a keystream, with * any unused bytes simply discarded. * - * Poly1305 <ref>[http://cr.yp.to/mac/poly1305-20050329.pdf Poly1305]</ref>, also + * Poly1305 <ref>[https://cr.yp.to/mac/poly1305-20050329.pdf Poly1305]</ref>, also * by Daniel Bernstein, is a one-time Carter-Wegman MAC that computes a 128 bit * integrity tag given a message and a single-use 256 bit secret key. * |