docs: switch http to https in links (#419)

pull/420/head
Marius Kjærstad 5 years ago committed by Pavol Rusnak
parent 0b66050a55
commit 1d6ea33ec6

@ -124,7 +124,7 @@
### Dev Board ### Dev Board
* [STM32F429ZIT6](http://www.st.com/en/microcontrollers/stm32f429zi.html) * [STM32F429ZIT6](https://www.st.com/en/microcontrollers-microprocessors/stm32f429zi.html)
* HSE / High-Speed External Crystal: 8 MHz * HSE / High-Speed External Crystal: 8 MHz
* Integrated STMicroelectronics ST-LINK/V2.1 debugger * Integrated STMicroelectronics ST-LINK/V2.1 debugger
@ -147,7 +147,7 @@ The metal tray is attached to the board with double stick tape. You just have to
Minimum MCU requirements: Minimum MCU requirements:
* STM32F4 family [STM32F427VIT6](http://www.st.com/en/microcontrollers/stm32f427vi.html) * STM32F4 family [STM32F427VIT6](https://www.st.com/en/microcontrollers-microprocessors/stm32f427vi.html)
* 168 MHz, 8 MHz HSE * 168 MHz, 8 MHz HSE
* 2048 KB Flash memory * 2048 KB Flash memory
* 192 KB SRAM * 192 KB SRAM

@ -5,4 +5,4 @@ We use [Protobuf v2](https://developers.google.com/protocol-buffers/) for host-d
## Definitions ## Definitions
Protobuf messages are defined in the [Common](http://github.com/trezor/trezor-firmware/blob/master/common) project, which is part of this monorepo. This repository is also exported to [trezor/trezor-common](https://github.com/trezor/trezor-common) to be used by third parties, which prefer not to include the whole monorepo. This copy is read-only and all changes are happening in this monorepo. Protobuf messages are defined in the [Common](https://github.com/trezor/trezor-firmware/tree/master/common) project, which is part of this monorepo. This repository is also exported to [trezor/trezor-common](https://github.com/trezor/trezor-common) to be used by third parties, which prefer not to include the whole monorepo. This copy is read-only and all changes are happening in this monorepo.

@ -91,7 +91,7 @@ class TestAddress(unittest.TestCase):
def test_multisig_address_p2sh(self): def test_multisig_address_p2sh(self):
# # test data from # # test data from
# # http://www.soroushjp.com/2014/12/20/bitcoin-multisig-the-hard-way-understanding-raw-multisignature-bitcoin-transactions/ # # https://www.soroushjp.com/2014/12/20/bitcoin-multisig-the-hard-way-understanding-raw-multisignature-bitcoin-transactions/
# # commented out because uncompressed public keys are not supported # # commented out because uncompressed public keys are not supported
# coin = coins.by_name('Bitcoin') # coin = coins.by_name('Bitcoin')
# pubkeys = [ # pubkeys = [

@ -5,7 +5,7 @@ from trezor.crypto import hashlib
class TestCryptoSha1(unittest.TestCase): class TestCryptoSha1(unittest.TestCase):
# vectors from http://www.di-mgt.com.au/sha_testvectors.html # vectors from https://www.di-mgt.com.au/sha_testvectors.html
vectors = [ vectors = [
(b'', 'da39a3ee5e6b4b0d3255bfef95601890afd80709'), (b'', 'da39a3ee5e6b4b0d3255bfef95601890afd80709'),
(b'abc', 'a9993e364706816aba3e25717850c26c9cd0d89d'), (b'abc', 'a9993e364706816aba3e25717850c26c9cd0d89d'),

@ -5,7 +5,7 @@ from trezor.crypto import hashlib
class TestCryptoSha3_512(unittest.TestCase): class TestCryptoSha3_512(unittest.TestCase):
# vectors from http://www.di-mgt.com.au/sha_testvectors.html # vectors from https://www.di-mgt.com.au/sha_testvectors.html
vectors = [ vectors = [
(b'', 'a69f73cca23a9ac5c8b567dc185a756e97c982164fe25859e0d1dcc1475c80a615b2123af1f5f94c11e3e9402c3ac558f500199d95b6d3e301758586281dcd26'), (b'', 'a69f73cca23a9ac5c8b567dc185a756e97c982164fe25859e0d1dcc1475c80a615b2123af1f5f94c11e3e9402c3ac558f500199d95b6d3e301758586281dcd26'),
(b'abc', 'b751850b1a57168a5693cd924b6b096e08f621827444f70d884f5d0240d2712e10e116e9192af3c91a7ec57647e3934057340b4cf408d5a56592f8274eec53f0'), (b'abc', 'b751850b1a57168a5693cd924b6b096e08f621827444f70d884f5d0240d2712e10e116e9192af3c91a7ec57647e3934057340b4cf408d5a56592f8274eec53f0'),

@ -1,10 +1,10 @@
[ed25519](http://ed25519.cr.yp.to/) is an [ed25519](https://ed25519.cr.yp.to) is an
[Elliptic Curve Digital Signature Algortithm](http://en.wikipedia.org/wiki/Elliptic_Curve_DSA), [Elliptic Curve Digital Signature Algortithm](https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm),
developed by [Dan Bernstein](http://cr.yp.to/djb.html), developed by [Dan Bernstein](https://cr.yp.to/djb.html),
[Niels Duif](http://www.nielsduif.nl/), [Niels Duif](https://www.nielsduif.nl),
[Tanja Lange](http://hyperelliptic.org/tanja), [Tanja Lange](https://hyperelliptic.org/tanja),
[Peter Schwabe](http://www.cryptojedi.org/users/peter/), [Peter Schwabe](https://cryptojedi.org/peter),
and [Bo-Yin Yang](http://www.iis.sinica.edu.tw/pages/byyang/). and [Bo-Yin Yang](https://www.iis.sinica.edu.tw/pages/byyang).
This project provides performant, portable 32-bit & 64-bit implementations. All implementations are This project provides performant, portable 32-bit & 64-bit implementations. All implementations are
of course constant time in regard to secret data. of course constant time in regard to secret data.
@ -81,7 +81,7 @@ custom hash implementation in ed25519-randombytes-custom.h. The random function
void ED25519_FN(ed25519_randombytes_unsafe) (void *p, size_t len); void ED25519_FN(ed25519_randombytes_unsafe) (void *p, size_t len);
Use `-DED25519_TEST` when compiling `ed25519.c` to use a deterministically seeded, non-thread safe CSPRNG Use `-DED25519_TEST` when compiling `ed25519.c` to use a deterministically seeded, non-thread safe CSPRNG
variant of Bob Jenkins [ISAAC](http://en.wikipedia.org/wiki/ISAAC_%28cipher%29) variant of Bob Jenkins [ISAAC](https://en.wikipedia.org/wiki/ISAAC_%28cipher%29)
##### Minor options ##### Minor options
@ -148,7 +148,7 @@ To batch verify signatures:
`ed25519-randombytes.h`, to generate random scalars for the verification code. `ed25519-randombytes.h`, to generate random scalars for the verification code.
The default implementation now uses OpenSSLs `RAND_bytes`. The default implementation now uses OpenSSLs `RAND_bytes`.
Unlike the [SUPERCOP](http://bench.cr.yp.to/supercop.html) version, signatures are Unlike the [SUPERCOP](https://bench.cr.yp.to/supercop.html) version, signatures are
not appended to messages, and there is no need for padding in front of messages. not appended to messages, and there is no need for padding in front of messages.
Additionally, the secret key does not contain a copy of the public key, so it is Additionally, the secret key does not contain a copy of the public key, so it is
32 bytes instead of 64 bytes, and the public key must be provided to the signing 32 bytes instead of 64 bytes, and the public key must be provided to the signing
@ -157,7 +157,7 @@ function.
##### Curve25519 ##### Curve25519
Curve25519 public keys can be generated thanks to Curve25519 public keys can be generated thanks to
[Adam Langley](http://www.imperialviolet.org/2013/05/10/fastercurve25519.html) [Adam Langley](https://www.imperialviolet.org/2013/05/10/fastercurve25519.html)
leveraging Ed25519's precomputed basepoint scalar multiplication. leveraging Ed25519's precomputed basepoint scalar multiplication.
curved25519_key sk, pk; curved25519_key sk, pk;
@ -180,4 +180,4 @@ with extreme values to ensure they function correctly. SSE2 is now supported.
#### Papers #### Papers
[Available on the Ed25519 website](http://ed25519.cr.yp.to/papers.html) [Available on the Ed25519 website](https://ed25519.cr.yp.to/papers.html)

@ -2,9 +2,9 @@
All notable changes to this project will be documented in this file. All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/). The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
_At the moment, the project does **not** adhere to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). That is expected to change with version 1.0._ _At the moment, the project does **not** adhere to [Semantic Versioning](https://semver.org/spec/v2.0.0.html). That is expected to change with version 1.0._
## [0.11.4] - 2019-07-31 ## [0.11.4] - 2019-07-31

Loading…
Cancel
Save