From b279863acb9ae3ade833ea00bcb17f22001e20db Mon Sep 17 00:00:00 2001 From: Robby Date: Sat, 10 Nov 2018 15:15:05 +0100 Subject: Update most URLs to use HTTPS if available, and fix some dead ones too. --- modules/encryption/enc_bcrypt.cpp | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'modules/encryption/enc_bcrypt.cpp') diff --git a/modules/encryption/enc_bcrypt.cpp b/modules/encryption/enc_bcrypt.cpp index de92535ea..57707e1e2 100644 --- a/modules/encryption/enc_bcrypt.cpp +++ b/modules/encryption/enc_bcrypt.cpp @@ -7,13 +7,13 @@ * details. * * Most of the code in this file is taken from - * http://openwall.com/crypt/crypt_blowfish-1.2.tar.gz + * https://www.openwall.com/crypt/crypt_blowfish-1.2.tar.gz */ /* * The crypt_blowfish homepage is: * - * http://www.openwall.com/crypt/ + * https://www.openwall.com/crypt/ * * This code comes from John the Ripper password cracker, with reentrant * and crypt(3) interfaces added, but optimizations specific to password @@ -48,7 +48,7 @@ * * There's a paper on the algorithm that explains its design decisions: * - * http://www.usenix.org/events/usenix99/provos.html + * https://www.usenix.org/legacy/events/usenix99/provos.html * * Some of the tricks in BF_ROUND might be inspired by Eric Young's * Blowfish library (I can't be sure if I would think of something if I -- cgit