Skip to content

Commit d49881c

Browse files
vszakatsjay
authored andcommitted
URLs: change more http to https
1 parent 742deff commit d49881c

18 files changed

+46
-44
lines changed

CHANGES.0

+19-19
Original file line numberDiff line numberDiff line change
@@ -343,7 +343,7 @@ Daniel Stenberg (23 Mar 2010)
343343
(https://curl.haxx.se/bug/view.cgi?id=2963679)
344344

345345
- Akos Pasztory filed debian bug report #572276
346-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572276 mentioning a problem
346+
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572276 mentioning a problem
347347
with a resource that returns chunked-encoded _and_ with a Content-Length
348348
and libcurl failed to properly ignore the latter information.
349349

@@ -1608,7 +1608,7 @@ Daniel Stenberg (28 Apr 2009)
16081608
- Constantine Sapuntzakis filed bug report #2783090
16091609
(https://curl.haxx.se/bug/view.cgi?id=2783090) pointing out that on windows
16101610
we need to grow the SO_SNDBUF buffer somewhat to get really good upload
1611-
speeds. http://support.microsoft.com/kb/823764 has the details. Friends
1611+
speeds. https://support.microsoft.com/kb/823764 has the details. Friends
16121612
confirmed that simply adding 32 to CURL_MAX_WRITE_SIZE is enough.
16131613

16141614
- Bug report #2709004 (https://curl.haxx.se/bug/view.cgi?id=2709004) by Tim
@@ -3290,7 +3290,7 @@ Daniel Fandrich (25 Jun 2008)
32903290

32913291
Daniel Stenberg (22 Jun 2008)
32923292
- Eduard Bloch filed the debian bug report #487567
3293-
(http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487567) pointing out that
3293+
(https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487567) pointing out that
32943294
libcurl used Content-Range: instead of Range when doing a range request with
32953295
--head (CURLOPT_NOBODY). This is now fixed and test case 1032 was added to
32963296
verify.
@@ -3486,7 +3486,7 @@ Michal Marek (9 May 2008)
34863486

34873487
Daniel Stenberg (7 May 2008)
34883488
- Liam Healy filed the debian bug report #480044
3489-
(http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480044) identifying a
3489+
(https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480044) identifying a
34903490
segfault when using krb5 ftp, but the krb4 code had the same problem.
34913491

34923492
Yang Tse (7 May 2008)
@@ -3896,7 +3896,7 @@ Daniel S (3 Feb 2008)
38963896
Daniel S (31 Jan 2008)
38973897
- Niklas Angebrand made the cookie support in libcurl properly deal with the
38983898
"HttpOnly" feature introduced by Microsoft and apparently also supported by
3899-
Firefox: http://msdn2.microsoft.com/en-us/library/ms533046.aspx . HttpOnly
3899+
Firefox: https://msdn.microsoft.com/en-us/library/ms533046.aspx . HttpOnly
39003900
is now supported when received from servers in HTTP headers, when written to
39013901
cookie jars and when read from existing cookie jars.
39023902

@@ -5538,7 +5538,7 @@ Daniel (13 February 2007)
55385538

55395539
Daniel (12 February 2007)
55405540
- Rob Crittenden added support for NSS (Network Security Service) for the
5541-
SSL/TLS layer. http://www.mozilla.org/projects/security/pki/nss/
5541+
SSL/TLS layer. https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS
55425542

55435543
This is the fourth supported library for TLS/SSL that libcurl supports!
55445544

@@ -5696,7 +5696,7 @@ Daniel (2 January 2007)
56965696
- Modified libcurl.pc.in to use Libs.private for the libs libcurl itself needs
56975697
to get built static. It has been mentioned before and was again brought to
56985698
our attention by Nathanael Nerode who filed debian bug report #405226
5699-
(http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405226).
5699+
(https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405226).
57005700

57015701
Daniel (29 December 2006)
57025702
- Make curl_easy_duphandle() set the magic number in the new handle.
@@ -6287,7 +6287,7 @@ Daniel (8 June 2006)
62876287
route of skipping them for *-*-cygwin*.
62886288

62896289
The third patch replaces all uses of the ancient and obsolete __CYGWIN32__
6290-
with __CYGWIN__. Ref: <http://cygwin.com/ml/cygwin/2003-09/msg01520.html>.
6290+
with __CYGWIN__. Ref: <https://cygwin.com/ml/cygwin/2003-09/msg01520.html>.
62916291

62926292
Daniel (7 June 2006)
62936293
- Mikael Sennerholm provided a patch that added NTLM2 session response support
@@ -6854,7 +6854,7 @@ Daniel (14 November 2005)
68546854
but it should not do any harm. https://curl.haxx.se/bug/view.cgi?id=1356715
68556855

68566856
- Jan Kunder's debian bug report
6857-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338680 identified a weird
6857+
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338680 identified a weird
68586858
error message for when you try to upload a file and the requested directory
68596859
doesn't exist on the target server.
68606860

@@ -6864,7 +6864,7 @@ Daniel (14 November 2005)
68646864
Daniel (13 November 2005)
68656865
- Debian bug report 338681 by Jan Kunder: make curl better detect and report
68666866
bad limit-rate units:
6867-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338681 Now curl will return
6867+
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338681 Now curl will return
68686868
error if a bad unit is used.
68696869

68706870
- Thanks to this nice summary of poll() implementations:
@@ -7040,15 +7040,15 @@ Daniel (27 September 2005)
70407040

70417041
Daniel (21 September 2005)
70427042
- Fixed "cut off" sentence in the libcurl-tutorial man page:
7043-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329305
7043+
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329305
70447044

70457045
- Clarified in the curl_easy_setopt man page what the default
70467046
CURLOPT_WRITEFUNCTION and CURLOPT_WRITEDATA mean:
7047-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329311
7047+
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329311
70487048

70497049
- Clarified in the curl_easy_setopt man page that CURLOPT_ERRORBUFFER
70507050
sometimes doesn't fill in the buffer even though it is supposed to:
7051-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329313
7051+
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329313
70527052

70537053
- When CURLE_URL_MALFORMAT is returned due to a missing URL, it now has an
70547054
error string set.
@@ -7075,7 +7075,7 @@ Daniel (6 September 2005)
70757075
Daniel (4 September 2005)
70767076
- I applied Nicolas Fran�ois' man page patch he posted to the Debian bug
70777077
tracker. It corrected two lines that started with apostrophes, which isn't
7078-
legal nroff format. http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326511
7078+
legal nroff format. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326511
70797079

70807080
- Added --ftp-skip-pasv-ip to the command line tool, that sets the new
70817081
CURLOPT_FTP_SKIP_PASV_IP option. It makes libcurl re-use the control
@@ -7301,7 +7301,7 @@ Daniel (30 May 2005)
73017301
- Eric Cooper reported about a problem with HTTP servers that responds with
73027302
binary zeroes within the headers. They confused libcurl to do wrong so the
73037303
downloaded headers become incomplete. The fix is now verified with test case
7304-
262. http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=310948
7304+
262. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=310948
73057305

73067306
Daniel (25 May 2005)
73077307
- Fixed problems with the test suite, and in particular the FTP test cases
@@ -7658,7 +7658,7 @@ Daniel (4 March 2005)
76587658
Daniel (22 February 2005)
76597659
- NTLM and ftp-krb4 buffer overflow fixed, as reported here:
76607660
http://www.securityfocus.com/archive/1/391042 and the CAN report here:
7661-
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490
7661+
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490
76627662

76637663
If these security guys were serious, we'd been notified in advance and we
76647664
could've saved a few of you a little surprise, but now we weren't.
@@ -7918,7 +7918,7 @@ Daniel (13 January 2005)
79187918
http://www.greenhills.co.uk/mak/gentoo/curl-eintr-bug.c, I now made the
79197919
select() and poll() calls properly loop if they return -1 and errno is
79207920
EINTR. glibc docs for this is found here:
7921-
http://www.gnu.org/software/libc/manual/html_node/Interrupted-Primitives.html
7921+
https://www.gnu.org/software/libc/manual/html_node/Interrupted-Primitives.html
79227922

79237923
This last link says BSD doesn't have this "effect". Will there be a problem
79247924
if we do this unconditionally?
@@ -12542,7 +12542,7 @@ Daniel (16 March 2002)
1254212542
PASV ftp transfers. It could make libcurl crash.
1254312543

1254412544
Details in bug report #530562:
12545-
http://sourceforge.net/tracker/?func=detail&atid=100976&aid=530562&group_id=976
12545+
https://sourceforge.net/p/curl/bugs/178/
1254612546

1254712547
Daniel (15 March 2002)
1254812548
- Jun-ichiro itojun Hagino filed bug report #530204 that clearly pointed out
@@ -12922,7 +12922,7 @@ Daniel (17 January 2002)
1292212922

1292312923
- Richard Archer brought back the ability to compile and build with OpenSSL
1292412924
versions before 0.9.5.
12925-
[http://sourceforge.net/tracker/?func=detail&atid=100976&aid=504163&group_id=976]
12925+
[https://sourceforge.net/p/curl/bugs/149/]
1292612926

1292712927
- The DNS cache code didn't take the port number into account, which made it
1292812928
work rather bad on IPv6-enabled hosts (especially when doing passive

docs/FAQ

+1-1
Original file line numberDiff line numberDiff line change
@@ -1402,7 +1402,7 @@ FAQ
14021402
to do "LIST -a" or similar to see them.
14031403

14041404
The application thus needs to parse the LIST output. One such existing
1405-
list parser is available at http://cr.yp.to/ftpparse.html Versions of
1405+
list parser is available at https://cr.yp.to/ftpparse.html Versions of
14061406
libcurl since 7.21.0 also provide the ability to specify a wildcard to
14071407
download multiple files from one FTP directory.
14081408

docs/libcurl/libcurl-tutorial.3

+1-1
Original file line numberDiff line numberDiff line change
@@ -1046,7 +1046,7 @@ input from potentially untrusted users. Following is a discussion about
10461046
some risks in the ways in which applications commonly use libcurl and
10471047
potential mitigations of those risks. It is by no means comprehensive, but
10481048
shows classes of attacks that robust applications should consider. The
1049-
Common Weakness Enumeration project at http://cwe.mitre.org/ is a good
1049+
Common Weakness Enumeration project at https://cwe.mitre.org/ is a good
10501050
reference for many of these and similar types of weaknesses of which
10511051
application writers should be aware.
10521052

lib/connect.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -912,7 +912,7 @@ static void nosigpipe(struct connectdata *conn,
912912
/* When you run a program that uses the Windows Sockets API, you may
913913
experience slow performance when you copy data to a TCP server.
914914
915-
http://support.microsoft.com/kb/823764
915+
https://support.microsoft.com/kb/823764
916916
917917
Work-around: Make the Socket Send Buffer Size Larger Than the Program Send
918918
Buffer Size

lib/connect.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ curl_socket_t Curl_getconnectinfo(struct SessionHandle *data,
5656
/* When you run a program that uses the Windows Sockets API, you may
5757
experience slow performance when you copy data to a TCP server.
5858
59-
http://support.microsoft.com/kb/823764
59+
https://support.microsoft.com/kb/823764
6060
6161
Work-around: Make the Socket Send Buffer Size Larger Than the Program Send
6262
Buffer Size

lib/curl_ntlm_wb.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -373,8 +373,8 @@ CURLcode Curl_output_ntlm_wb(struct connectdata *conn,
373373
* by delegating the NTLM challenge/response protocal to a helper
374374
* in ntlm_auth.
375375
* http://devel.squid-cache.org/ntlm/squid_helper_protocol.html
376-
* http://www.samba.org/samba/docs/man/manpages-3/winbindd.8.html
377-
* http://www.samba.org/samba/docs/man/manpages-3/ntlm_auth.1.html
376+
* https://www.samba.org/samba/docs/man/manpages-3/winbindd.8.html
377+
* https://www.samba.org/samba/docs/man/manpages-3/ntlm_auth.1.html
378378
* Preprocessor symbol 'NTLM_WB_ENABLED' is defined when this
379379
* feature is enabled and 'NTLM_WB_FILE' symbol holds absolute
380380
* filename of ntlm_auth helper.

lib/curl_rtmp.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ static Curl_recv rtmp_recv;
5555
static Curl_send rtmp_send;
5656

5757
/*
58-
* RTMP protocol handler.h, based on http://rtmpdump.mplayerhq.hu
58+
* RTMP protocol handler.h, based on https://rtmpdump.mplayerhq.hu
5959
*/
6060

6161
const struct Curl_handler Curl_handler_rtmp = {

lib/dotdot.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@
3030

3131
/*
3232
* "Remove Dot Segments"
33-
* http://tools.ietf.org/html/rfc3986#section-5.2.4
33+
* https://tools.ietf.org/html/rfc3986#section-5.2.4
3434
*/
3535

3636
/*

lib/escape.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939

4040
/* Portable character check (remember EBCDIC). Do not use isalnum() because
4141
its behavior is altered by the current locale.
42-
See http://tools.ietf.org/html/rfc3986#section-2.3
42+
See https://tools.ietf.org/html/rfc3986#section-2.3
4343
*/
4444
static bool Curl_isunreserved(unsigned char in)
4545
{

lib/hostcheck.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
* "foo.host.com" matches "*.host.com".
4444
*
4545
* We use the matching rule described in RFC6125, section 6.4.3.
46-
* http://tools.ietf.org/html/rfc6125#section-6.4.3
46+
* https://tools.ietf.org/html/rfc6125#section-6.4.3
4747
*
4848
* In addition: ignore trailing dots in the host names and wildcards, so that
4949
* the names are used normalized. This is what the browsers do.

lib/http_digest.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ CURLcode Curl_output_digest(struct connectdata *conn,
135135
136136
Apache servers can be set to do the Digest IE-style automatically using
137137
the BrowserMatch feature:
138-
http://httpd.apache.org/docs/2.2/mod/mod_auth_digest.html#msie
138+
https://httpd.apache.org/docs/2.2/mod/mod_auth_digest.html#msie
139139
140140
Further details on Digest implementation differences:
141141
http://www.fngtps.com/2006/09/http-authentication

lib/vtls/gtls.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@
6262

6363
/*
6464
Some hackish cast macros based on:
65-
http://library.gnome.org/devel/glib/unstable/glib-Type-Conversion-Macros.html
65+
https://developer.gnome.org/glib/unstable/glib-Type-Conversion-Macros.html
6666
*/
6767
#ifndef GNUTLS_POINTER_TO_INT_CAST
6868
#define GNUTLS_POINTER_TO_INT_CAST(p) ((int) (long) (p))

lib/vtls/schannel.c

+9-7
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,8 @@ schannel_connect_step1(struct connectdata *conn, int sockindex)
189189
}
190190
memset(connssl->cred, 0, sizeof(struct curl_schannel_cred));
191191

192-
/* http://msdn.microsoft.com/en-us/library/windows/desktop/aa374716.aspx */
192+
/* https://msdn.microsoft.com/en-us/library/windows/desktop/aa374716.aspx
193+
*/
193194
sspi_status =
194195
s_pSecFn->AcquireCredentialsHandle(NULL, (TCHAR *)UNISP_NAME,
195196
SECPKG_CRED_OUTBOUND, NULL,
@@ -240,7 +241,7 @@ schannel_connect_step1(struct connectdata *conn, int sockindex)
240241
if(!host_name)
241242
return CURLE_OUT_OF_MEMORY;
242243

243-
/* http://msdn.microsoft.com/en-us/library/windows/desktop/aa375924.aspx */
244+
/* https://msdn.microsoft.com/en-us/library/windows/desktop/aa375924.aspx */
244245

245246
sspi_status = s_pSecFn->InitializeSecurityContext(
246247
&connssl->cred->cred_handle, NULL, host_name,
@@ -407,8 +408,8 @@ schannel_connect_step2(struct connectdata *conn, int sockindex)
407408
if(!host_name)
408409
return CURLE_OUT_OF_MEMORY;
409410

410-
/* http://msdn.microsoft.com/en-us/library/windows/desktop/aa375924.aspx */
411-
411+
/* https://msdn.microsoft.com/en-us/library/windows/desktop/aa375924.aspx
412+
*/
412413
sspi_status = s_pSecFn->InitializeSecurityContext(
413414
&connssl->cred->cred_handle, &connssl->ctxt->ctxt_handle,
414415
host_name, connssl->req_flags, 0, 0, &inbuf_desc, 0, NULL,
@@ -759,7 +760,7 @@ schannel_send(struct connectdata *conn, int sockindex,
759760
/* copy data into output buffer */
760761
memcpy(outbuf[1].pvBuffer, buf, len);
761762

762-
/* http://msdn.microsoft.com/en-us/library/windows/desktop/aa375390.aspx */
763+
/* https://msdn.microsoft.com/en-us/library/windows/desktop/aa375390.aspx */
763764
sspi_status = s_pSecFn->EncryptMessage(&connssl->ctxt->ctxt_handle, 0,
764765
&outbuf_desc, 0);
765766

@@ -973,7 +974,8 @@ schannel_recv(struct connectdata *conn, int sockindex,
973974
InitSecBuffer(&inbuf[3], SECBUFFER_EMPTY, NULL, 0);
974975
InitSecBufferDesc(&inbuf_desc, inbuf, 4);
975976

976-
/* http://msdn.microsoft.com/en-us/library/windows/desktop/aa375348.aspx */
977+
/* https://msdn.microsoft.com/en-us/library/windows/desktop/aa375348.aspx
978+
*/
977979
sspi_status = s_pSecFn->DecryptMessage(&connssl->ctxt->ctxt_handle,
978980
&inbuf_desc, 0, NULL);
979981

@@ -1234,7 +1236,7 @@ void Curl_schannel_close(struct connectdata *conn, int sockindex)
12341236

12351237
int Curl_schannel_shutdown(struct connectdata *conn, int sockindex)
12361238
{
1237-
/* See http://msdn.microsoft.com/en-us/library/windows/desktop/aa380138.aspx
1239+
/* See https://msdn.microsoft.com/en-us/library/windows/desktop/aa380138.aspx
12381240
* Shutting Down an Schannel Connection
12391241
*/
12401242
struct SessionHandle *data = conn->data;

lib/vtls/vtls.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@
4141
defines/macros #defined by the lib-specific header files.
4242
4343
"SSL/TLS Strong Encryption: An Introduction"
44-
http://httpd.apache.org/docs-2.0/ssl/ssl_intro.html
44+
https://httpd.apache.org/docs/2.0/ssl/ssl_intro.html
4545
*/
4646

4747
#include "curl_setup.h"

lib/vtls/vtls.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@
4646
#define SHA256_DIGEST_LENGTH 32 /* fixed size */
4747
#endif
4848

49-
/* see http://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-04 */
49+
/* see https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-04 */
5050
#define ALPN_HTTP_1_1_LENGTH 8
5151
#define ALPN_HTTP_1_1 "http/1.1"
5252

projects/generate.bat

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ rem NOTES
2525
rem
2626
rem Do not set %ERRORLEVEL% to anything. %ERRORLEVEL% is a special variable
2727
rem that only contains errorlevel when %ERRORLEVEL% is not set. Same for %CD%.
28-
rem http://blogs.msdn.com/b/oldnewthing/archive/2008/09/26/8965755.aspx
28+
rem https://blogs.msdn.microsoft.com/oldnewthing/20080926-00/?p=20743/
2929
rem If you need to set the errorlevel do this instead: CALL :seterr [#]
3030

3131
:begin

tests/http_pipe.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
# you may not use this file except in compliance with the License.
77
# You may obtain a copy of the License at
88
#
9-
# http://www.apache.org/licenses/LICENSE-2.0
9+
# https://www.apache.org/licenses/LICENSE-2.0
1010
#
1111
# Unless required by applicable law or agreed to in writing, software
1212
# distributed under the License is distributed on an "AS IS" BASIS,

tests/server/sockfilt.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -509,8 +509,8 @@ static void lograw(unsigned char *buffer, ssize_t len)
509509
* other handle types supported by WaitForMultipleObjectsEx() as
510510
* well as disk files, anonymous and names pipes, and character input.
511511
*
512-
* http://msdn.microsoft.com/en-us/library/windows/desktop/ms687028.aspx
513-
* http://msdn.microsoft.com/en-us/library/windows/desktop/ms741572.aspx
512+
* https://msdn.microsoft.com/en-us/library/windows/desktop/ms687028.aspx
513+
* https://msdn.microsoft.com/en-us/library/windows/desktop/ms741572.aspx
514514
*/
515515
struct select_ws_wait_data {
516516
HANDLE handle; /* actual handle to wait for during select */

0 commit comments

Comments
 (0)