Skip to content

Commit 4be5ada

Browse files
committed
https
1 parent 7275fcf commit 4be5ada

File tree

6 files changed

+10
-10
lines changed

6 files changed

+10
-10
lines changed

docs/advanced/ecdsa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -94,23 +94,23 @@ server sends an `CAP ACK`, authentication can begin.
9494
The mechanism makes use of the NIST P-256 curve (`NID_X9_62_prime256v1` in OpenSSL) which
9595
(per the name) is defined over a 256 bit prime finite field. The parameters for this curve
9696
are available [from the NSA](https://www.nsa.gov/ia/_files/nist-routines.pdf) in section 4.3.
97-
The curve itself doesn't fit the [SafeCurves requirements](http://safecurves.cr.yp.to/).
97+
The curve itself doesn't fit the [SafeCurves requirements](https://safecurves.cr.yp.to/).
9898

9999
Atheme is the only IRC services software that appears to implement this authentication method.
100100
Atheme's implementation requires that:
101101

102102
* Users make use of the `/msg NickServ SET PUBKEY <pubkey>` command to tell the services
103103
package their public key
104104
* `<pubkey>` in this case is the **point compressed** X9.62 representation of the public
105-
key which is then base64 encoded. Please see section 2.3.3 of the [SEC1](http://www.secg.org/sec1-v2.pdf)
105+
key which is then base64 encoded. Please see section 2.3.3 of the [SEC1](https://www.secg.org/sec1-v2.pdf)
106106
spec for more information. Public keys making use of the uncompressed or hybrid forms will
107107
**not work**. Java users may wish to implement their own method for applying point compression
108108
since it is unavailable in the standard library. See the implementation in [KICL](https://github.com/KittehOrg/KittehIRCClientLib/commit/448ae6bf18956b5a38e0da8f87486c5db85db880).
109109

110110
#### Step 1 - Begin authentication
111111

112112
The client sends `AUTHENTICATE ECDSA-NIST256P-CHALLENGE` to request that the authentication
113-
process be started. See the [SASL documentation](http://ircv3.net/specs/extensions/sasl-3.1.html)
113+
process be started. See the [SASL documentation](https://ircv3.net/specs/extensions/sasl-3.1.html)
114114
for more information on the SASL process.
115115

116116
#### Step 2 - Wait for server acknowledgement

docs/advanced/sasl.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
KICL supports using SASL to authenticate with an IRC server. As described in the
2-
[IRCv3.1 spec](http://ircv3.net/specs/extensions/sasl-3.1.html), SASL allows the client to authenticate using a SASL
2+
[IRCv3.1 spec](https://ircv3.net/specs/extensions/sasl-3.1.html), SASL allows the client to authenticate using a SASL
33
mechanism and the `AUTHENTICATE` command. The client must have requested the `sasl` capability to be able to use the
44
AUTHENTICATE command.
55

66
KICL's SASL support can be configured by calling the `Client#getAuthManager` method which returns an
7-
[AuthManager](http://kittehorg.github.io/KittehIRCClientLib/org/kitteh/irc/client/library/auth/AuthManager.html). The
7+
[AuthManager](https://kittehorg.github.io/KittehIRCClientLib/org/kitteh/irc/client/library/auth/AuthManager.html). The
88
manager can be used to manage authentication protocols. For SASL, there are currently three available authentication
9-
protocols which [extend](http://kittehorg.github.io/KittehIRCClientLib/org/kitteh/irc/client/library/auth/protocol/class-use/AbstractSaslProtocol.html)
9+
protocols which [extend](https://kittehorg.github.io/KittehIRCClientLib/org/kitteh/irc/client/library/auth/protocol/class-use/AbstractSaslProtocol.html)
1010
the `AbstractSaslProtocol` class. It's also possible to add [non-SASL](alt_auth.md) authentication protocols.
1111

1212
Protocols can be added by calling the `AuthManager#addProtocol` method, for example:

docs/advanced/sts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ a secure connection if they haven't yet rolled out TLS.
2323

2424
To use STS, the client needs some way to persist information about the policies it encounters during the connection
2525
process. Within the codebase, an interface
26-
[org.kitteh.irc.client.library.feature.sts.StsStorageManager](http://kittehorg.github.io/KittehIRCClientLib/org/kitteh/irc/client/library/feature/sts/StsStorageManager.html)
26+
[org.kitteh.irc.client.library.feature.sts.StsStorageManager](https://kittehorg.github.io/KittehIRCClientLib/org/kitteh/irc/client/library/feature/sts/StsStorageManager.html)
2727
is available which you can implement yourself for complete control over policy storage.
2828

2929
Alternatively, a default class (currently `StsPropertiesStorageManager`) which stores the STS policies in a properties

docs/events.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ listen to the exact class, utilize the annotation's `rejectSubtypes` value.
3737

3838
## KICL Events
3939
KICL events cover nearly all common IRC interactions. See the
40-
[JavaDocs](http://kittehorg.github.io/KittehIRCClientLib/) for the complete listing.
40+
[JavaDocs](https://kittehorg.github.io/KittehIRCClientLib/) for the complete listing.
4141

4242
For all situations where KICL doesn't provide the event you need, you can listen to the server's
4343
messages. The `ClientReceiveCommandEvent` and `ClientReceiveNumericEvent` classes let you listen

docs/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ public class FriendlyBot {
107107

108108
## More information
109109

110-
Consult the [JavaDocs](http://kittehorg.github.io/KittehIRCClientLib/) to answer most questions.
110+
Consult the [JavaDocs](https://kittehorg.github.io/KittehIRCClientLib/) to answer most questions.
111111

112112
Visit us in `#kitteh.org` on `irc.esper.net` for a chat (click
113113
[here](https://webchat.esper.net/?nick=kicl_...&channels=%23kitteh.org) to join), or check out the

src/main/java/org/kitteh/irc/client/library/feature/auth/SaslEcdsaNist256PChallenge.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ protected void toString(final ToStringer stringer) {
206206
* Applies point compression to a public key and returns the result,
207207
* encoded with base64.
208208
*
209-
* See http://www.secg.org/sec1-v2.pdf section 2.3.3 for more info.
209+
* See https://www.secg.org/sec1-v2.pdf section 2.3.3 for more info.
210210
*
211211
* @param publicKey the public key to get the compressed X9.62
212212
* representation for

0 commit comments

Comments
 (0)