use secure URLs in secadv docs
authorViktor Szakats <vszakats@users.noreply.github.com>
Thu, 29 Oct 2015 19:15:25 +0000 (20:15 +0100)
committerRich Salz <rsalz@akamai.com>
Thu, 29 Oct 2015 19:25:56 +0000 (15:25 -0400)
Also remove some trailing whitespace.

Signed-off-by: Rich Salz <rsalz@akamai.com>
33 files changed:
docs/faq.txt
news/secadv/20020730.txt [changed mode: 0644->0755]
news/secadv/20030219.txt [changed mode: 0644->0755]
news/secadv/20030319.txt [changed mode: 0644->0755]
news/secadv/20030930.txt [changed mode: 0644->0755]
news/secadv/20031104.txt [changed mode: 0644->0755]
news/secadv/20040317.txt [changed mode: 0644->0755]
news/secadv/20051011.txt [changed mode: 0644->0755]
news/secadv/20060905.txt [changed mode: 0644->0755]
news/secadv/20060928.txt [changed mode: 0644->0755]
news/secadv/20071129.txt [changed mode: 0644->0755]
news/secadv/20090107.txt [changed mode: 0644->0755]
news/secadv/20090325.txt [changed mode: 0644->0755]
news/secadv/20091111.txt [changed mode: 0644->0755]
news/secadv/20100324.txt [changed mode: 0644->0755]
news/secadv/20100601.txt [changed mode: 0644->0755]
news/secadv/20101116-2.txt [changed mode: 0644->0755]
news/secadv/20101116.txt [changed mode: 0644->0755]
news/secadv/20101202.txt [changed mode: 0644->0755]
news/secadv/20110208.txt [changed mode: 0644->0755]
news/secadv/20110906.txt [changed mode: 0644->0755]
news/secadv/20120104.txt [changed mode: 0644->0755]
news/secadv/20120118.txt [changed mode: 0644->0755]
news/secadv/20120312.txt [changed mode: 0644->0755]
news/secadv/20120419.txt [changed mode: 0644->0755]
news/secadv/20120424.txt [changed mode: 0644->0755]
news/secadv/20120510.txt [changed mode: 0644->0755]
news/secadv/20130205.txt [changed mode: 0644->0755]
news/secadv/20140605.txt [changed mode: 0644->0755]
news/secadv/20140806.txt [changed mode: 0644->0755]
news/secadv/20150108.txt
news/secadv/prng.txt [changed mode: 0644->0755]
support/acks.html

index 85b8092ca84d4d064f11a8bbcea768510577f513..dde39c08d66222cd9de1c39a3788250febf91722 100644 (file)
@@ -15,7 +15,7 @@ OpenSSL  -  Frequently Asked Questions
 [LEGAL] Legal questions
 
 * Do I need patent licenses to use OpenSSL?
-* Can I use OpenSSL with GPL software? 
+* Can I use OpenSSL with GPL software?
 
 [USER] Questions on using the OpenSSL applications
 
@@ -174,9 +174,9 @@ just do:
 
 * How does the versioning scheme work?
 
-After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter 
+After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter
 releases (e.g. 1.0.1a) can only contain bug and security fixes and no
-new features. Minor releases change the last number (e.g. 1.0.2) and 
+new features. Minor releases change the last number (e.g. 1.0.2) and
 can contain new features that retain binary compatibility. Changes to
 the middle number are considered major releases and neither source nor
 binary compatibility is guaranteed.
@@ -543,7 +543,7 @@ that the OpenSSL bntest throws at it.  This gets triggered when you run the
 test suite (using "make test").  The message returned is "bc: stack empty".
 
 The best way to deal with this is to find another implementation of bc
-and compile/install it.  GNU bc (see <URL: http://www.gnu.org/software/software.html>
+and compile/install it.  GNU bc (see <URL: https://www.gnu.org/software/software.html>
 for download instructions) can be safely used, for example.
 
 
@@ -582,7 +582,7 @@ This will only compile sha_dgst.c with -O0, the rest with the optimization
 level chosen by the configuration process.  When the above is done, do the
 test and installation and you're set.
 
-3. Reconfigure the toolkit with no-sha0 option to leave out SHA0. It 
+3. Reconfigure the toolkit with no-sha0 option to leave out SHA0. It
 should not be used and is not used in SSL/TLS nor any other recognized
 protocol in either case.
 
@@ -774,14 +774,14 @@ See also <URL: https://www.openssl.org/community>
 * I've found a security issue, how do I report it?
 
 If you think your bug has security implications then please send it to
-openssl-security@openssl.org if you don't get a prompt reply at least 
+openssl-security@openssl.org if you don't get a prompt reply at least
 acknowledging receipt then resend or mail it directly to one of the
 more active team members (e.g. Steve). If you wish to use PGP to send
 in a report please use one or more of the keys of the team members listed
 at <URL: https://www.openssl.org/community/team.html>
 
 Note that bugs only present in the openssl utility are not in general
-considered to be security issues. 
+considered to be security issues.
 
 [PROG] ========================================================================
 
@@ -931,7 +931,7 @@ macros with a C++ compiler. There is hardly ever any need to use the
 PKCS#12 macros in a program, it is much easier to parse and create
 PKCS#12 files using the PKCS12_parse() and PKCS12_create() functions
 documented in doc/openssl.txt and with examples in demos/pkcs12. The
-'pkcs12' application has to use the macros because it prints out 
+'pkcs12' application has to use the macros because it prints out
 debugging information.
 
 
old mode 100644 (file)
new mode 100755 (executable)
index 918b764..464307c
@@ -56,7 +56,7 @@ Apply the attached patch to OpenSSL 0.9.6d, or upgrade to OpenSSL
 TLS.
 
 A patch for 0.9.7 is available from the OpenSSL website
-(http://www.openssl.org/).
+(https://www.openssl.org/).
 
 Servers can disable SSL2, alternatively disable all applications using
 SSL or TLS until the patches are applied. Users of 0.9.7 pre-release
@@ -74,9 +74,9 @@ possible, but have not released the exploit code.
 References
 ----------
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0655
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0656
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0657
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0655
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0656
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0657
 
 Acknowledgements
 ----------------
@@ -126,7 +126,7 @@ There are no known exploits for this vulnerability.
 References
 ----------
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0659
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0659
 
 Acknowledgements
 ----------------
@@ -141,10 +141,10 @@ The patch and advisory were prepared by Dr. Stephen Henson.
 
 
 Combined patches for OpenSSL 0.9.6d:
-http://www.openssl.org/news/patch_20020730_0_9_6d.txt
+https://www.openssl.org/news/patch_20020730_0_9_6d.txt
 
 Combined patches for OpenSSL 0.9.7 beta 2:
-http://www.openssl.org/news/patch_20020730_0_9_7.txt
+https://www.openssl.org/news/patch_20020730_0_9_7.txt
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20020730.txt
+https://www.openssl.org/news/secadv_20020730.txt
old mode 100644 (file)
new mode 100755 (executable)
index 647373a..d8266ba
@@ -48,7 +48,7 @@ plaintext block.
 
 OpenSSL version since 0.9.6c supposedly treat block cipher padding
 errors like MAC verification errors during record decryption
-(see http://www.openssl.org/~bodo/tls-cbc.txt), but MAC verification
+(see https://www.openssl.org/~bodo/tls-cbc.txt), but MAC verification
 was still skipped after detection of a padding error, which allowed
 the timing attack.  (Note that it is likely that other SSL/TLS
 implementations will have similar problems.)
@@ -208,7 +208,7 @@ http://lasecwww.epfl.ch/memo_ssl.shtml
 
 The Common Vulnerabilities and Exposures project (cve.mitre.org) has
 assigned the name CAN-2003-0078 to this issue:
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0078
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0078
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20030219.txt
+https://www.openssl.org/news/secadv_20030219.txt
old mode 100644 (file)
new mode 100755 (executable)
index f868198..778f9e2
@@ -44,7 +44,7 @@ The following patch can be applied to OpenSSL releases 0.9.6b up to 0.9.6i,
 +                              /* SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_PROTOCOL_VERSION_NUMBER); */
 +
 +                              /* The Klima-Pokorny-Rosa extension of Bleichenbacher's attack
-+                               * (http://eprint.iacr.org/2003/052/) exploits the version
++                               * (https://eprint.iacr.org/2003/052/) exploits the version
 +                               * number check as a "bad version oracle" -- an alert would
 +                               * reveal that the plaintext corresponding to some ciphertext
 +                               * made up by the adversary is properly formatted except
@@ -84,11 +84,11 @@ References
 
 Report "Attacking RSA-based Sessions in SSL/TLS" by V. Klima, O. Pokorny,
 and T. Rosa:
-http://eprint.iacr.org/2003/052/
+https://eprint.iacr.org/2003/052/
 
 The Common Vulnerabilities and Exposures project (cve.mitre.org) has
 assigned the name CAN-2003-0131 to this issue.
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0131
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0131
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20030319.txt
+https://www.openssl.org/news/secadv_20030319.txt
old mode 100644 (file)
new mode 100755 (executable)
index 72aee84..ad0b90e
@@ -61,12 +61,12 @@ References
 The Common Vulnerabilities and Exposures project (cve.mitre.org) has
 assigned the name CAN-2003-0545 for issue 1:
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545
 
 and CAN-2003-0543 and CAN-2003-0544 for issue 2:
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20030930.txt
+https://www.openssl.org/news/secadv_20030930.txt
old mode 100644 (file)
new mode 100755 (executable)
index 2cd2fb8..31b332c
@@ -42,9 +42,9 @@ applications statically linked to OpenSSL libraries.
 
 OpenSSL 0.9.6l is available for download via HTTP and FTP from the
 following master locations (you can find the various FTP mirrors under
-http://www.openssl.org/source/mirror.html):
+https://www.openssl.org/source/mirror.html):
 
-    o http://www.openssl.org/source/
+    o https://www.openssl.org/source/
     o ftp://ftp.openssl.org/source/
 
 The distribution file name is:
@@ -65,7 +65,7 @@ References
 The Common Vulnerabilities and Exposures project (cve.mitre.org) has
 assigned the name CAN-2003-0851 to this issue.
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0851
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0851
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20031104.txt
+https://www.openssl.org/news/secadv_20031104.txt
old mode 100644 (file)
new mode 100755 (executable)
index daf0b67..15879c6
@@ -48,7 +48,7 @@ statically linked to OpenSSL libraries.
 
 OpenSSL 0.9.7d and OpenSSL 0.9.6m are available for download via HTTP and
 FTP from the following master locations (you can find the various FTP
-mirrors under http://www.openssl.org/source/mirror.html):
+mirrors under https://www.openssl.org/source/mirror.html):
 
     ftp://ftp.openssl.org/source/
 
@@ -79,10 +79,10 @@ References
 ----------
 
 http://www.codenomicon.com/testtools/tls/
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20040317.txt
+https://www.openssl.org/news/secadv_20040317.txt
 
 
old mode 100644 (file)
new mode 100755 (executable)
index c4fd001..1fadb6f
@@ -63,9 +63,9 @@ following measures is sufficient.
 
     OpenSSL 0.9.8a and OpenSSL 0.9.7h are available for download via
     HTTP and FTP from the following master locations (you can find the
-    various FTP mirrors under http://www.openssl.org/source/mirror.html):
+    various FTP mirrors under https://www.openssl.org/source/mirror.html):
 
-        o http://www.openssl.org/source/
+        o https://www.openssl.org/source/
         o ftp://ftp.openssl.org/source/
 
     The distribution file names are:
@@ -88,7 +88,7 @@ following measures is sufficient.
     source code to resolve the problem.  The patch is compatible with
     the 0.9.6, 0.9.7, and 0.9.8 branches of OpenSSL.
 
-        o http://www.openssl.org/news/patch-CAN-2005-2969.txt
+        o https://www.openssl.org/news/patch-CAN-2005-2969.txt
 
     Whether you choose to upgrade to a new version or to apply the
     patch, make sure to recompile any applications statically linked
@@ -108,7 +108,7 @@ problem.
 References
 ----------
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20051011.txt
+https://www.openssl.org/news/secadv_20051011.txt
old mode 100644 (file)
new mode 100755 (executable)
index 45c9e7f..9865eee
@@ -38,9 +38,9 @@ following measures is sufficient.
 
     OpenSSL 0.9.8c and OpenSSL 0.9.7k are available for download via
     HTTP and FTP from the following master locations (you can find the
-    various FTP mirrors under http://www.openssl.org/source/mirror.html):
+    various FTP mirrors under https://www.openssl.org/source/mirror.html):
 
-        o http://www.openssl.org/source/
+        o https://www.openssl.org/source/
         o ftp://ftp.openssl.org/source/
 
     The distribution file names are:
@@ -63,7 +63,7 @@ following measures is sufficient.
     source code to resolve the problem.  The patch is compatible with
     the 0.9.6, 0.9.7, 0.9.8, and 0.9.9 branches of OpenSSL.
 
-        o http://www.openssl.org/news/patch-CVE-2006-4339.txt
+        o https://www.openssl.org/news/patch-CVE-2006-4339.txt
 
 Whether you choose to upgrade to a new version or to apply the patch,
 make sure to recompile any applications statically linked to OpenSSL
@@ -82,9 +82,9 @@ to fix the problems.
 References
 ----------
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339
 http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20060905.txt
+https://www.openssl.org/news/secadv_20060905.txt
 
old mode 100644 (file)
new mode 100755 (executable)
index 9c2c1e1..50a2f09
@@ -79,9 +79,9 @@ These vulnerabilities are resolved in the following versions of OpenSSL:
 
 OpenSSL 0.9.8d and OpenSSL 0.9.7l are available for download via
 HTTP and FTP from the following master locations (you can find the
-various FTP mirrors under http://www.openssl.org/source/mirror.html):
+various FTP mirrors under https://www.openssl.org/source/mirror.html):
 
-    o http://www.openssl.org/source/
+    o https://www.openssl.org/source/
     o ftp://ftp.openssl.org/source/
 
 The distribution file names are:
@@ -108,4 +108,4 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20060928.txt
+https://www.openssl.org/news/secadv_20060928.txt
old mode 100644 (file)
new mode 100755 (executable)
index 52e7c5f..d3f0be3
@@ -4,7 +4,7 @@ OpenSSL FIPS Object Module Vulnerabilities
 ------------------------------------------
 
 A significant flaw in the PRNG implementation for the OpenSSL FIPS Object 
-Module v1.1.1 (http://openssl.org/source/openssl-fips-1.1.1.tar.gz, FIPS 
+Module v1.1.1 (https://www.openssl.org/source/openssl-fips-1.1.1.tar.gz, FIPS 
 140-2 validation certificate #733, 
 http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#733) has 
 been reported by Geoff Lowe of Secure Computing Corporation.  Due to a coding 
@@ -32,11 +32,11 @@ Wait for official approval of a patched distribution.
 
 For reference purposes the patches
 
-        http://www.openssl.org/news/patch-CVE-2007-5502-1.txt 
+        https://www.openssl.org/news/patch-CVE-2007-5502-1.txt 
 
 (the simplest direct fix) and: 
 
-         http://www.openssl.org/news/patch-CVE-2007-5502-2.txt 
+         https://www.openssl.org/news/patch-CVE-2007-5502-2.txt 
 
 (a workaround which avoids touching the PRNG code directly) demonstrate two 
 different fixes that independently address the vulnerability.  However, for 
@@ -49,7 +49,7 @@ Institute (OSSI), has supplied the information needed for a "letter change"
 update request based on the latter of these two patches to the FIPS 140-2 
 test lab to be submitted for official approval.  Once (and if) approved the 
 new distribution containing this patch will be posted as 
-http://openssl.org/source/openssl-fips-1.1.2.tar.gz.  The timeline for this 
+https://www.openssl.org/source/openssl-fips-1.1.2.tar.gz.  The timeline for this 
 approval is presently unknown.
 
 
old mode 100644 (file)
new mode 100755 (executable)
index b2816c9..4e06b88
@@ -63,7 +63,7 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20090107.txt
+https://www.openssl.org/news/secadv_20090107.txt
 
 
 diff -ur openssl-0.9.8i-ORIG/apps/speed.c openssl-0.9.8i/apps/speed.c
old mode 100644 (file)
new mode 100755 (executable)
index 4e90a20..de84b65
@@ -60,5 +60,5 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20090325.txt
+https://www.openssl.org/news/secadv_20090325.txt
 
old mode 100644 (file)
new mode 100755 (executable)
index 62af9e9..b21eec9
@@ -83,11 +83,11 @@ References
 ===========
 
 CVE-2009-3555:
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
 
 TLS extension:
 https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20091111.txt
+https://www.openssl.org/news/secadv_20091111.txt
 
old mode 100644 (file)
new mode 100755 (executable)
index aabb4d3..0127494
@@ -45,4 +45,4 @@ References
 This vulnerability is tracked as CVE-2010-0740.
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20100324.txt
+https://www.openssl.org/news/secadv_20100324.txt
old mode 100644 (file)
new mode 100755 (executable)
index 6d874e3..709370c
@@ -41,5 +41,5 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20100601.txt
+https://www.openssl.org/news/secadv_20100601.txt
 
old mode 100644 (file)
new mode 100755 (executable)
index e624bb3..4d6e0bf
@@ -203,6 +203,6 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20101116-2.txt
+https://www.openssl.org/news/secadv_20101116-2.txt
 
 
old mode 100644 (file)
new mode 100755 (executable)
index 7273c81..bc392f1
@@ -199,6 +199,6 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20101116.txt
+https://www.openssl.org/news/secadv_20101116.txt
 
 
old mode 100644 (file)
new mode 100755 (executable)
index 22a31c6..0d4d91a
@@ -119,9 +119,9 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20101202.txt
+https://www.openssl.org/news/secadv_20101202.txt
 
 URL for updated CVS-2010-3864 Security Advisory:
-http://www.openssl.org/news/secadv_20101116-2.txt
+https://www.openssl.org/news/secadv_20101116-2.txt
 
 
old mode 100644 (file)
new mode 100755 (executable)
index 9c1e951..ee46181
@@ -72,7 +72,7 @@ References
 This vulnerability is tracked as CVE-2011-0014.
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20110208.txt
+https://www.openssl.org/news/secadv_20110208.txt
 
 OCSP stapling is defined in RFC 6066 (previously RFC 3546), section
 "Certificate Status Request".
old mode 100644 (file)
new mode 100755 (executable)
index f95aa02..db8cba1
@@ -58,5 +58,5 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20110906.txt
+https://www.openssl.org/news/secadv_20110906.txt
 
old mode 100644 (file)
new mode 100755 (executable)
index 6763fb4..d015463
@@ -105,5 +105,5 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120104.txt
+https://www.openssl.org/news/secadv_20120104.txt
 
old mode 100644 (file)
new mode 100755 (executable)
index 64d3502..4ac82c3
@@ -19,5 +19,5 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120118.txt
+https://www.openssl.org/news/secadv_20120118.txt
 
old mode 100644 (file)
new mode 100755 (executable)
index d584f62..1ee42d9
@@ -29,5 +29,5 @@ References
 RFC3218
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120312.txt
+https://www.openssl.org/news/secadv_20120312.txt
 
old mode 100644 (file)
new mode 100755 (executable)
index ca9bd34..617f8d7
@@ -35,6 +35,6 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120419.txt
+https://www.openssl.org/news/secadv_20120419.txt
 
 
old mode 100644 (file)
new mode 100755 (executable)
index 5929329..21ff332
@@ -7,7 +7,7 @@ ASN1 BIO incomplete fix (CVE-2012-2131)
 It was discovered that the fix for CVE-2012-2110 released on 19 Apr
 2012 was not sufficient to correct the issue for OpenSSL 0.9.8.
 
-Please see http://www.openssl.org/news/secadv_20120419.txt for details
+Please see https://www.openssl.org/news/secadv_20120419.txt for details
 of that vulnerability.
 
 This issue only affects OpenSSL 0.9.8v.  OpenSSL 1.0.1a and 1.0.0i
@@ -21,4 +21,4 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120424.txt
+https://www.openssl.org/news/secadv_20120424.txt
old mode 100644 (file)
new mode 100755 (executable)
index 441b835..be085ed
@@ -22,6 +22,6 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120510.txt
+https://www.openssl.org/news/secadv_20120510.txt
 
 
old mode 100644 (file)
new mode 100755 (executable)
index 4d4a610..1a278f6
@@ -57,7 +57,7 @@ Affected users should upgrade to OpenSSL 1.0.1d, 1.0.0k or 0.9.8y.
 References
 ==========
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20130204.txt
+https://www.openssl.org/news/secadv_20130204.txt
 Wikipedia AES-NI description:
 https://en.wikipedia.org/wiki/AES-NI
 
old mode 100644 (file)
new mode 100755 (executable)
index a86051d..514929e
@@ -117,7 +117,7 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20140605.txt
+https://www.openssl.org/news/secadv_20140605.txt
 
 Note: the online version of the advisory may be updated with additional
 details over time.
old mode 100644 (file)
new mode 100755 (executable)
index d2e7e53..0146712
@@ -157,7 +157,7 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20140806.txt
+https://www.openssl.org/news/secadv_20140806.txt
 
 Note: the online version of the advisory may be updated with additional
 details over time.
index a4e68a8c48866cb1fcc619e19cbd1c73ec86d8ee..c3fe15fe6f03d207881a2c61ac7289c42aed856a 100644 (file)
@@ -193,7 +193,7 @@ conducted by the OpenSSL development team and Adam Langley of
 Google. The final fix was developed by Andy Polyakov of the OpenSSL
 core team.
 
-[1] http://css.csail.mit.edu/6.858/2013/readings/rsa-bug-attacks.pdf
+[1] https://css.csail.mit.edu/6.858/2013/readings/rsa-bug-attacks.pdf
 
 Note
 ====
@@ -215,4 +215,3 @@ details over time.
 
 For details of OpenSSL severity classifications please see:
 https://www.openssl.org/about/secpolicy.html
-
old mode 100644 (file)
new mode 100755 (executable)
index a923174..981b062
@@ -23,7 +23,7 @@ MD5 checksums:
      openssl-engine-0.9.6b.tar.gz   ab5ca5b157459c49bdab06a7db8a5a47
 
 OpenSSL source code can also be obtained from a number of mirror sites.
-For a list, see <URL: http://www.openssl.org/source/mirror.html>.
+For a list, see <URL: https://www.openssl.org/source/mirror.html>.
 
 If you are using a pre-compiled OpenSSL package, please look for update
 information from the respective software distributor.  The OpenSSL
@@ -216,4 +216,4 @@ for discovering the PRNG problem and bringing it to our attention.
 
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_prng.txt
+https://www.openssl.org/news/secadv_prng.txt
index 0118b3e8e5a5f817e090e79695a34f253be78876..29bb761f5e59ac299f182a7483088fc69d8bdb0c 100644 (file)
@@ -25,7 +25,7 @@
 
          <hr noshade size=1>
          <p>Exceptional support:</p>
-         <a href="http://www.linux-foundation.org/"><img src="/img/lf-logo-med.png"></a>
+         <a href="http://www.linuxfoundation.org/"><img src="/img/lf-logo-med.png"></a>
 
          <a href="http://www.linuxfoundation.org/programs/core-infrastructure-initiative"><img src="/img/cii-logo-med.png"></a>
          <a href="http://www.smartisan.com/"><img src="/img/smartisan-logo-med.png"></a>