all: update comment URLs from HTTP to HTTPS, where possible

Each URL was manually verified to ensure it did not serve up incorrect
content.

Change-Id: I4dc846227af95a73ee9a3074d0c379ff0fa955df
Reviewed-on: https://go-review.googlesource.com/115798
Reviewed-by: Ian Lance Taylor <iant@golang.org>
Run-TryBot: Ian Lance Taylor <iant@golang.org>
This commit is contained in:
Tim Cooper 2018-06-01 17:29:59 -03:00 committed by Ian Lance Taylor
parent 2da7203eca
commit 99371c4e8c
5 changed files with 17 additions and 17 deletions

View file

@ -246,19 +246,19 @@ type ClientHelloInfo struct {
// ServerName indicates the name of the server requested by the client // ServerName indicates the name of the server requested by the client
// in order to support virtual hosting. ServerName is only set if the // in order to support virtual hosting. ServerName is only set if the
// client is using SNI (see // client is using SNI (see
// http://tools.ietf.org/html/rfc4366#section-3.1). // https://tools.ietf.org/html/rfc4366#section-3.1).
ServerName string ServerName string
// SupportedCurves lists the elliptic curves supported by the client. // SupportedCurves lists the elliptic curves supported by the client.
// SupportedCurves is set only if the Supported Elliptic Curves // SupportedCurves is set only if the Supported Elliptic Curves
// Extension is being used (see // Extension is being used (see
// http://tools.ietf.org/html/rfc4492#section-5.1.1). // https://tools.ietf.org/html/rfc4492#section-5.1.1).
SupportedCurves []CurveID SupportedCurves []CurveID
// SupportedPoints lists the point formats supported by the client. // SupportedPoints lists the point formats supported by the client.
// SupportedPoints is set only if the Supported Point Formats Extension // SupportedPoints is set only if the Supported Point Formats Extension
// is being used (see // is being used (see
// http://tools.ietf.org/html/rfc4492#section-5.1.2). // https://tools.ietf.org/html/rfc4492#section-5.1.2).
SupportedPoints []uint8 SupportedPoints []uint8
// SignatureSchemes lists the signature and hash schemes that the client // SignatureSchemes lists the signature and hash schemes that the client

View file

@ -1061,9 +1061,9 @@ func (c *Conn) Write(b []byte) (int, error) {
// This can be prevented by splitting each Application Data // This can be prevented by splitting each Application Data
// record into two records, effectively randomizing the IV. // record into two records, effectively randomizing the IV.
// //
// http://www.openssl.org/~bodo/tls-cbc.txt // https://www.openssl.org/~bodo/tls-cbc.txt
// https://bugzilla.mozilla.org/show_bug.cgi?id=665814 // https://bugzilla.mozilla.org/show_bug.cgi?id=665814
// http://www.imperialviolet.org/2012/01/15/beastfollowup.html // https://www.imperialviolet.org/2012/01/15/beastfollowup.html
var m int var m int
if len(b) > 1 && c.vers <= VersionTLS10 { if len(b) > 1 && c.vers <= VersionTLS10 {

View file

@ -192,7 +192,7 @@ func (m *clientHelloMsg) marshal() []byte {
z = z[9:] z = z[9:]
} }
if len(m.supportedCurves) > 0 { if len(m.supportedCurves) > 0 {
// http://tools.ietf.org/html/rfc4492#section-5.5.1 // https://tools.ietf.org/html/rfc4492#section-5.5.1
z[0] = byte(extensionSupportedCurves >> 8) z[0] = byte(extensionSupportedCurves >> 8)
z[1] = byte(extensionSupportedCurves) z[1] = byte(extensionSupportedCurves)
l := 2 + 2*len(m.supportedCurves) l := 2 + 2*len(m.supportedCurves)
@ -209,7 +209,7 @@ func (m *clientHelloMsg) marshal() []byte {
} }
} }
if len(m.supportedPoints) > 0 { if len(m.supportedPoints) > 0 {
// http://tools.ietf.org/html/rfc4492#section-5.5.2 // https://tools.ietf.org/html/rfc4492#section-5.5.2
z[0] = byte(extensionSupportedPoints >> 8) z[0] = byte(extensionSupportedPoints >> 8)
z[1] = byte(extensionSupportedPoints) z[1] = byte(extensionSupportedPoints)
l := 1 + len(m.supportedPoints) l := 1 + len(m.supportedPoints)
@ -224,7 +224,7 @@ func (m *clientHelloMsg) marshal() []byte {
} }
} }
if m.ticketSupported { if m.ticketSupported {
// http://tools.ietf.org/html/rfc5077#section-3.2 // https://tools.ietf.org/html/rfc5077#section-3.2
z[0] = byte(extensionSessionTicket >> 8) z[0] = byte(extensionSessionTicket >> 8)
z[1] = byte(extensionSessionTicket) z[1] = byte(extensionSessionTicket)
l := len(m.sessionTicket) l := len(m.sessionTicket)
@ -414,7 +414,7 @@ func (m *clientHelloMsg) unmarshal(data []byte) bool {
case extensionStatusRequest: case extensionStatusRequest:
m.ocspStapling = length > 0 && data[0] == statusTypeOCSP m.ocspStapling = length > 0 && data[0] == statusTypeOCSP
case extensionSupportedCurves: case extensionSupportedCurves:
// http://tools.ietf.org/html/rfc4492#section-5.5.1 // https://tools.ietf.org/html/rfc4492#section-5.5.1
if length < 2 { if length < 2 {
return false return false
} }
@ -430,7 +430,7 @@ func (m *clientHelloMsg) unmarshal(data []byte) bool {
d = d[2:] d = d[2:]
} }
case extensionSupportedPoints: case extensionSupportedPoints:
// http://tools.ietf.org/html/rfc4492#section-5.5.2 // https://tools.ietf.org/html/rfc4492#section-5.5.2
if length < 1 { if length < 1 {
return false return false
} }
@ -441,7 +441,7 @@ func (m *clientHelloMsg) unmarshal(data []byte) bool {
m.supportedPoints = make([]uint8, l) m.supportedPoints = make([]uint8, l)
copy(m.supportedPoints, data[1:]) copy(m.supportedPoints, data[1:])
case extensionSessionTicket: case extensionSessionTicket:
// http://tools.ietf.org/html/rfc5077#section-3.2 // https://tools.ietf.org/html/rfc5077#section-3.2
m.ticketSupported = true m.ticketSupported = true
m.sessionTicket = data[:length] m.sessionTicket = data[:length]
case extensionSignatureAlgorithms: case extensionSignatureAlgorithms:
@ -1224,7 +1224,7 @@ func (m *certificateRequestMsg) marshal() (x []byte) {
return m.raw return m.raw
} }
// See http://tools.ietf.org/html/rfc4346#section-7.4.4 // See https://tools.ietf.org/html/rfc4346#section-7.4.4
length := 1 + len(m.certificateTypes) + 2 length := 1 + len(m.certificateTypes) + 2
casLength := 0 casLength := 0
for _, ca := range m.certificateAuthorities { for _, ca := range m.certificateAuthorities {
@ -1374,7 +1374,7 @@ func (m *certificateVerifyMsg) marshal() (x []byte) {
return m.raw return m.raw
} }
// See http://tools.ietf.org/html/rfc4346#section-7.4.8 // See https://tools.ietf.org/html/rfc4346#section-7.4.8
siglength := len(m.signature) siglength := len(m.signature)
length := 2 + siglength length := 2 + siglength
if m.hasSignatureAndHash { if m.hasSignatureAndHash {
@ -1452,7 +1452,7 @@ func (m *newSessionTicketMsg) marshal() (x []byte) {
return m.raw return m.raw
} }
// See http://tools.ietf.org/html/rfc5077#section-3.3 // See https://tools.ietf.org/html/rfc5077#section-3.3
ticketLen := len(m.ticket) ticketLen := len(m.ticket)
length := 2 + 4 + ticketLen length := 2 + 4 + ticketLen
x = make([]byte, 4+length) x = make([]byte, 4+length)

View file

@ -141,7 +141,7 @@ func pickTLS12HashForSignature(sigType uint8, clientList []SignatureScheme) (Sig
if len(clientList) == 0 { if len(clientList) == 0 {
// If the client didn't specify any signature_algorithms // If the client didn't specify any signature_algorithms
// extension then we can assume that it supports SHA1. See // extension then we can assume that it supports SHA1. See
// http://tools.ietf.org/html/rfc5246#section-7.4.1.4.1 // https://tools.ietf.org/html/rfc5246#section-7.4.1.4.1
switch sigType { switch sigType {
case signatureRSA: case signatureRSA:
return PKCS1WithSHA1, nil return PKCS1WithSHA1, nil
@ -239,7 +239,7 @@ NextCandidate:
ecdhePublic = elliptic.Marshal(curve, x, y) ecdhePublic = elliptic.Marshal(curve, x, y)
} }
// http://tools.ietf.org/html/rfc4492#section-5.4 // https://tools.ietf.org/html/rfc4492#section-5.4
serverECDHParams := make([]byte, 1+2+1+len(ecdhePublic)) serverECDHParams := make([]byte, 1+2+1+len(ecdhePublic))
serverECDHParams[0] = 3 // named curve serverECDHParams[0] = 3 // named curve
serverECDHParams[1] = byte(ka.curveid >> 8) serverECDHParams[1] = byte(ka.curveid >> 8)

2
prf.go
View file

@ -140,7 +140,7 @@ func prfForVersion(version uint16, suite *cipherSuite) func(result, secret, labe
} }
// masterFromPreMasterSecret generates the master secret from the pre-master // masterFromPreMasterSecret generates the master secret from the pre-master
// secret. See http://tools.ietf.org/html/rfc5246#section-8.1 // secret. See https://tools.ietf.org/html/rfc5246#section-8.1
func masterFromPreMasterSecret(version uint16, suite *cipherSuite, preMasterSecret, clientRandom, serverRandom []byte) []byte { func masterFromPreMasterSecret(version uint16, suite *cipherSuite, preMasterSecret, clientRandom, serverRandom []byte) []byte {
seed := make([]byte, 0, len(clientRandom)+len(serverRandom)) seed := make([]byte, 0, len(clientRandom)+len(serverRandom))
seed = append(seed, clientRandom...) seed = append(seed, clientRandom...)