From e8640849c775efcf202dbd34736fed8d61379c49 Mon Sep 17 00:00:00 2001 From: Sawyer Billings Date: Wed, 30 Dec 2020 21:49:12 -0500 Subject: doc: Use https URLs where possible --- src/crypto/chacha_poly_aead.h | 4 ++-- src/crypto/sha256_sse4.cpp | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) (limited to 'src/crypto') diff --git a/src/crypto/chacha_poly_aead.h b/src/crypto/chacha_poly_aead.h index b3ba781cdd..0afe8fcc14 100644 --- a/src/crypto/chacha_poly_aead.h +++ b/src/crypto/chacha_poly_aead.h @@ -17,12 +17,12 @@ static constexpr int AAD_PACKAGES_PER_ROUND = 21; /* 64 / 3 round down*/ /* A AEAD class for ChaCha20-Poly1305@bitcoin. * * ChaCha20 is a stream cipher designed by Daniel Bernstein and described in - * [http://cr.yp.to/chacha/chacha-20080128.pdf ChaCha20]. It operates + * [https://cr.yp.to/chacha/chacha-20080128.pdf ChaCha20]. It operates * by permuting 128 fixed bits, 128 or 256 bits of key, a 64 bit nonce and a 64 * bit counter into 64 bytes of output. This output is used as a keystream, with * any unused bytes simply discarded. * - * Poly1305 [http://cr.yp.to/mac/poly1305-20050329.pdf Poly1305], also + * Poly1305 [https://cr.yp.to/mac/poly1305-20050329.pdf Poly1305], also * by Daniel Bernstein, is a one-time Carter-Wegman MAC that computes a 128 bit * integrity tag given a message and a single-use 256 bit secret key. * diff --git a/src/crypto/sha256_sse4.cpp b/src/crypto/sha256_sse4.cpp index 89f529a3ab..143752c7cf 100644 --- a/src/crypto/sha256_sse4.cpp +++ b/src/crypto/sha256_sse4.cpp @@ -1001,7 +1001,7 @@ void Transform(uint32_t* s, const unsigned char* chunk, size_t blocks) ; This code is described in an Intel White-Paper: ; "Fast SHA-256 Implementations on Intel Architecture Processors" ; -; To find it, surf to http://www.intel.com/p/en_US/embedded +; To find it, surf to https://www.intel.com/p/en_US/embedded ; and search for that title. ; The paper is expected to be released roughly at the end of April, 2012 ; -- cgit v1.2.3