Reviewed-by: coffeys
This commit is contained in:
Luis Pinto 2022-04-01 13:26:20 +00:00 committed by Sean Coffey
parent dbfac3c99c
commit 63fec5da27
32 changed files with 60 additions and 60 deletions

View file

@ -63,7 +63,7 @@ package java.security;
* </pre>
*
* For more information, see
* <a href="http://tools.ietf.org/html/rfc5280">RFC 5280:
* <a href="https://tools.ietf.org/html/rfc5280">RFC 5280:
* Internet X.509 Public Key Infrastructure Certificate and CRL Profile</a>.
*
* <LI>A Format

View file

@ -50,7 +50,7 @@ import sun.security.util.Debug;
* Therefore any seed material passed to a {@code SecureRandom} object must be
* unpredictable, and all {@code SecureRandom} output sequences must be
* cryptographically strong, as described in
* <a href="http://tools.ietf.org/html/rfc4086">
* <a href="https://tools.ietf.org/html/rfc4086">
* <i>RFC 4086: Randomness Requirements for Security</i></a>.
*
* <p> Many {@code SecureRandom} implementations are in the form of a

View file

@ -27,7 +27,7 @@ package java.security.cert;
/**
* The CRLReason enumeration specifies the reason that a certificate
* is revoked, as defined in <a href="http://tools.ietf.org/html/rfc5280">
* is revoked, as defined in <a href="https://tools.ietf.org/html/rfc5280">
* RFC 5280: Internet X.509 Public Key Infrastructure Certificate and CRL
* Profile</a>.
*

View file

@ -84,7 +84,7 @@ public class TrustAnchor {
* The name constraints are specified as a byte array. This byte array
* should contain the DER encoded form of the name constraints, as they
* would appear in the NameConstraints structure defined in
* <a href="http://tools.ietf.org/html/rfc5280">RFC 5280</a>
* <a href="https://tools.ietf.org/html/rfc5280">RFC 5280</a>
* and X.509. The ASN.1 definition of this structure appears below.
*
* <pre>{@code

View file

@ -66,7 +66,7 @@ import sun.security.util.SignatureUtil;
* </pre>
* <p>
* More information can be found in
* <a href="http://tools.ietf.org/html/rfc5280">RFC 5280: Internet X.509
* <a href="https://tools.ietf.org/html/rfc5280">RFC 5280: Internet X.509
* Public Key Infrastructure Certificate and CRL Profile</a>.
* <p>
* The ASN.1 definition of {@code tbsCertList} is:

View file

@ -53,7 +53,7 @@ import sun.security.x509.X500Name;
* {@link CertStore#getCRLs CertStore.getCRLs} or some similar
* method.
* <p>
* Please refer to <a href="http://tools.ietf.org/html/rfc5280">RFC 5280:
* Please refer to <a href="https://tools.ietf.org/html/rfc5280">RFC 5280:
* Internet X.509 Public Key Infrastructure Certificate and CRL Profile</a>
* for definitions of the X.509 CRL fields and extensions mentioned below.
* <p>

View file

@ -62,7 +62,7 @@ import sun.security.x509.*;
* number. Other unique combinations include the issuer, subject,
* subjectKeyIdentifier and/or the subjectPublicKey criteria.
* <p>
* Please refer to <a href="http://tools.ietf.org/html/rfc5280">RFC 5280:
* Please refer to <a href="https://tools.ietf.org/html/rfc5280">RFC 5280:
* Internet X.509 Public Key Infrastructure Certificate and CRL Profile</a> for
* definitions of the X.509 certificate extensions mentioned below.
* <p>

View file

@ -65,7 +65,7 @@ import sun.security.util.SignatureUtil;
* CA such as a "root" CA.
* <p>
* More information can be found in
* <a href="http://tools.ietf.org/html/rfc5280">RFC 5280: Internet X.509
* <a href="https://tools.ietf.org/html/rfc5280">RFC 5280: Internet X.509
* Public Key Infrastructure Certificate and CRL Profile</a>.
* <p>
* The ASN.1 definition of {@code tbsCertificate} is: