From 68c3ea8e791b1b77298cd2a2248f9e25250a1c168e3013219051e77e41d2c8d0 Mon Sep 17 00:00:00 2001 From: Sergey Matveev Date: Sat, 2 Aug 2025 14:48:02 +0300 Subject: [PATCH] Unify RFC URLs --- spec/Integrity | 2 +- spec/cm/dem/xchacha-krmr | 2 +- spec/cm/dem/xchapoly-krkc | 2 +- spec/cm/hashed/Merkle | 2 +- spec/cm/hashed/index | 2 +- spec/cm/kem/mceliece6960119-x25519-hkdf-shake256 | 2 +- spec/cm/kem/sntrup761-x25519-hkdf-blake2b | 4 ++-- spec/cm/keywrap/xchapoly | 2 +- spec/cm/prv/ed25519-blake2b | 2 +- spec/cm/prv/mceliece6960119-x25519 | 2 +- spec/cm/prv/sntrup761-x25519 | 2 +- spec/cm/pub/mceliece6960119-x25519 | 2 +- spec/cm/pub/sntrup761-x25519 | 2 +- spec/cm/signed/ed25519-blake2b | 2 +- spec/codecs | 4 ++-- spec/encoding/HEXLET | 2 +- spec/schema/cmds | 2 +- 17 files changed, 19 insertions(+), 19 deletions(-) diff --git a/spec/Integrity b/spec/Integrity index a6de51b..c73d166 100644 --- a/spec/Integrity +++ b/spec/Integrity @@ -6,7 +6,7 @@ Metalink4 file contains its OpenSSH signature. => PUBKEY-SSH.pub.asc => https://www.openssh.com/ OpenSSH => https://gnupg.org/ GnuPG -=> https://datatracker.ietf.org/doc/html/rfc5854 Metalink4 +=> https://datatracker.ietf.org/doc/html/rfc5854.html Metalink4 [cm/signed/] .sig file can be verified with: => PUBKEY-CM.pub diff --git a/spec/cm/dem/xchacha-krmr b/spec/cm/dem/xchacha-krmr index 9a2d1b3..09d602f 100644 --- a/spec/cm/dem/xchacha-krmr +++ b/spec/cm/dem/xchacha-krmr @@ -27,5 +27,5 @@ MACs are ordered the same way as KEMs in the list. => https://datatracker.ietf.org/doc/html/rfc5869.html RFC 5869, HKDF => https://datatracker.ietf.org/doc/html/rfc7693.html RFC 7693, BLAKE2b -=> https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha XChaCha20-Poly1305 AEAD +=> https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha.html XChaCha20-Poly1305 AEAD => https://datatracker.ietf.org/doc/html/rfc8439.html RFC 8439 diff --git a/spec/cm/dem/xchapoly-krkc b/spec/cm/dem/xchapoly-krkc index 88f831d..bb2b14e 100644 --- a/spec/cm/dem/xchapoly-krkc +++ b/spec/cm/dem/xchapoly-krkc @@ -22,5 +22,5 @@ Nonce's lowest bit is set only if this is the last chunk we encrypting. => https://datatracker.ietf.org/doc/html/rfc5869.html RFC 5869, HKDF => https://datatracker.ietf.org/doc/html/rfc7693.html RFC 7693, BLAKE2b -=> https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha XChaCha20-Poly1305 AEAD +=> https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha.html XChaCha20-Poly1305 AEAD => https://datatracker.ietf.org/doc/html/rfc8439.html RFC 8439 diff --git a/spec/cm/hashed/Merkle b/spec/cm/hashed/Merkle index 5cbbafe..c6cfc9d 100644 --- a/spec/cm/hashed/Merkle +++ b/spec/cm/hashed/Merkle @@ -1,4 +1,4 @@ Merkle trees are very convenient way to parallelise data hashing. RFC 9162 is used as a base for all Merkle-tree based hashers. -=> https://datatracker.ietf.org/doc/html/rfc9162 RFC 9162 +=> https://datatracker.ietf.org/doc/html/rfc9162.html RFC 9162 By default 128KiB chunks are used. diff --git a/spec/cm/hashed/index b/spec/cm/hashed/index index 17db7aa..0d9ed69 100644 --- a/spec/cm/hashed/index +++ b/spec/cm/hashed/index @@ -1,6 +1,6 @@ do-backs Integrity protected container, analogue to ASN.1-based CMS DigestedData. -=> https://datatracker.ietf.org/doc/html/rfc5652 CMS +=> https://datatracker.ietf.org/doc/html/rfc5652.html CMS Stored in a file, it should begin with "cm/hashed" [encoding/MAGIC]. diff --git a/spec/cm/kem/mceliece6960119-x25519-hkdf-shake256 b/spec/cm/kem/mceliece6960119-x25519-hkdf-shake256 index 5ecc89e..01342bd 100644 --- a/spec/cm/kem/mceliece6960119-x25519-hkdf-shake256 +++ b/spec/cm/kem/mceliece6960119-x25519-hkdf-shake256 @@ -1,6 +1,6 @@ Classic McEliece 6960-119 + X25519 + HKDF-SHAKE256 KEM. => https://classic.mceliece.org/ Classic McEliece -=> https://datatracker.ietf.org/doc/html/rfc7748 X25519 +=> https://datatracker.ietf.org/doc/html/rfc7748.html X25519 => https://datatracker.ietf.org/doc/html/rfc5869.html RFC 5869, HKDF => https://keccak.team/ SHAKE XOF function diff --git a/spec/cm/kem/sntrup761-x25519-hkdf-blake2b b/spec/cm/kem/sntrup761-x25519-hkdf-blake2b index 9362d67..608122a 100644 --- a/spec/cm/kem/sntrup761-x25519-hkdf-blake2b +++ b/spec/cm/kem/sntrup761-x25519-hkdf-blake2b @@ -1,6 +1,6 @@ Streamlined NTRU Prime 761 + X25519 + HKDF-BLAKE2b KEM. => https://ntruprime.cr.yp.to/ Streamlined NTRU Prime KEM algorithm -=> https://datatracker.ietf.org/doc/html/rfc7748 X25519 +=> https://datatracker.ietf.org/doc/html/rfc7748.html X25519 => https://datatracker.ietf.org/doc/html/rfc5869.html RFC 5869, HKDF => https://datatracker.ietf.org/doc/html/rfc7693.html RFC 7693, BLAKE2b @@ -40,4 +40,4 @@ key of the CEK. "/kem/*/cek" is wrapped with [cm/keywrap/xchapoly] mechanism. KEM combiner nearly fully resembles: -=> https://datatracker.ietf.org/doc/draft-josefsson-chempat/ Chempat +=> https://datatracker.ietf.org/doc/draft-josefsson-chempat/.html Chempat diff --git a/spec/cm/keywrap/xchapoly b/spec/cm/keywrap/xchapoly index 355d4cd..9a7dd95 100644 --- a/spec/cm/keywrap/xchapoly +++ b/spec/cm/keywrap/xchapoly @@ -1,6 +1,6 @@ XChaCha20-Poly1305 key wrapping mechanism. Key is encrypted using XChaCha20-Poly1305 algorithm. -=> https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha XChaCha20-Poly1305 +=> https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha.html XChaCha20-Poly1305 Random 192-bit nonce is prepended to the ciphertext. KEK has 256-bit length. diff --git a/spec/cm/prv/ed25519-blake2b b/spec/cm/prv/ed25519-blake2b index e839d8c..c81cc1c 100644 --- a/spec/cm/prv/ed25519-blake2b +++ b/spec/cm/prv/ed25519-blake2b @@ -1,6 +1,6 @@ [cm/prv/] with Ed25519-BLAKE2b. 32-byte Ed25519 private key is used, as described in EdDSA RFC. In many libraries it is called "seed". -=> https://datatracker.ietf.org/doc/html/rfc8032 EdDSA +=> https://datatracker.ietf.org/doc/html/rfc8032.html EdDSA "ed25519-blake2b" algorithm identifier is used, however actually no hash is involved in private key storage. diff --git a/spec/cm/prv/mceliece6960119-x25519 b/spec/cm/prv/mceliece6960119-x25519 index 0629193..e2aebe7 100644 --- a/spec/cm/prv/mceliece6960119-x25519 +++ b/spec/cm/prv/mceliece6960119-x25519 @@ -1,6 +1,6 @@ [cm/prv/] with Classic McEliece 6960-119 + X25519. => https://classic.mceliece.org/ Classic McEliece -=> https://datatracker.ietf.org/doc/html/rfc7748 X25519 +=> https://datatracker.ietf.org/doc/html/rfc7748.html X25519 Concatenation of Classic McEliece 6960-119 13948-byte private key and X25519's 32-byte one. "mceliece6960119-x25519" algorithm identifier is used. diff --git a/spec/cm/prv/sntrup761-x25519 b/spec/cm/prv/sntrup761-x25519 index a41dff2..8810f75 100644 --- a/spec/cm/prv/sntrup761-x25519 +++ b/spec/cm/prv/sntrup761-x25519 @@ -1,5 +1,5 @@ [cm/prv/] with Streamlined NTRU Prime 761 + X25519. => https://ntruprime.cr.yp.to/ NTRU Prime -=> https://datatracker.ietf.org/doc/html/rfc7748 X25519 +=> https://datatracker.ietf.org/doc/html/rfc7748.html X25519 It is a concatenation of SNTRUP's 1763-byte and X25519's 32-byte keys. "sntrup761-x25519" algorithm identifier is used. diff --git a/spec/cm/pub/mceliece6960119-x25519 b/spec/cm/pub/mceliece6960119-x25519 index 3dedeb7..68599cf 100644 --- a/spec/cm/pub/mceliece6960119-x25519 +++ b/spec/cm/pub/mceliece6960119-x25519 @@ -1,6 +1,6 @@ [cm/pub/] with Classic McEliece 6960-119 + X25519. => https://classic.mceliece.org/ Classic McEliece -=> https://datatracker.ietf.org/doc/html/rfc7748 X25519 +=> https://datatracker.ietf.org/doc/html/rfc7748.html X25519 Combined Classic McEliece 6960-119 and X25519 public keys are used for KEM purposes, so should have "kem" key usage set. diff --git a/spec/cm/pub/sntrup761-x25519 b/spec/cm/pub/sntrup761-x25519 index 21635e9..96afab5 100644 --- a/spec/cm/pub/sntrup761-x25519 +++ b/spec/cm/pub/sntrup761-x25519 @@ -1,6 +1,6 @@ [cm/pub/] with Streamlined NTRU Prime 761 + X25519. => https://ntruprime.cr.yp.to/ Streamlined NTRU Prime KEM algorithm -=> https://datatracker.ietf.org/doc/html/rfc7748 X25519 +=> https://datatracker.ietf.org/doc/html/rfc7748.html X25519 Combined Streamlined NTRU Prime 761 and X25519 public keys are used for KEM purposes, so should have "kem" key usage set. diff --git a/spec/cm/signed/ed25519-blake2b b/spec/cm/signed/ed25519-blake2b index 13245d8..6d95709 100644 --- a/spec/cm/signed/ed25519-blake2b +++ b/spec/cm/signed/ed25519-blake2b @@ -2,7 +2,7 @@ EdDSA with Edwards25519 is used similarly as in RFC 8032. But BLAKE2b is used instead of SHA2-512 hash. -=> https://datatracker.ietf.org/doc/html/rfc8032 RFC 8032, EdDSA +=> https://datatracker.ietf.org/doc/html/rfc8032.html RFC 8032, EdDSA Strict ZIP-0215 validation rules should be used while verifying the signature. => https://zips.z.cash/zip-0215 ZIP-0215 diff --git a/spec/codecs b/spec/codecs index 2feca8c..05fd2d7 100644 --- a/spec/codecs +++ b/spec/codecs @@ -3,8 +3,8 @@ => https://www.JSON.org/json-en.html JSON => https://bsonspec.org/ BSON => https://msgpack.org/ MessagePack -=> https://datatracker.ietf.org/doc/html/rfc8949 CBOR -=> https://datatracker.ietf.org/doc/html/draft-mcnally-deterministic-cbor-11 dCBOR +=> https://datatracker.ietf.org/doc/html/rfc8949.html CBOR +=> https://datatracker.ietf.org/doc/html/draft-mcnally-deterministic-cbor-11.html dCBOR => http://cr.yp.to/proto/netstrings.txt Netstrings => https://wiki.theory.org/BitTorrentSpecification#Bencoding Bencode => https://en.wikipedia.org/wiki/Canonical_S-expressions Canonical S-expressions diff --git a/spec/encoding/HEXLET b/spec/encoding/HEXLET index 1d41584..7d2c3be 100644 --- a/spec/encoding/HEXLET +++ b/spec/encoding/HEXLET @@ -2,7 +2,7 @@ 16-byte binary strings, which will be pretty printed as UUID or IPv6 address. -=> https://datatracker.ietf.org/doc/html/rfc9562 UUID +=> https://datatracker.ietf.org/doc/html/rfc9562.html UUID Application is left responsible for UUID validation. diff --git a/spec/schema/cmds b/spec/schema/cmds index 0285094..5a4b8c0 100644 --- a/spec/schema/cmds +++ b/spec/schema/cmds @@ -74,7 +74,7 @@ EQ | ["=", v] Check that chosen (if it exists) element's value equals to binary string "v". -=> https://datatracker.ietf.org/doc/html/rfc8610 CDDL +=> https://datatracker.ietf.org/doc/html/rfc8610.html CDDL For example let's check "our" structure, described in CDDL as: ai = text .gt 0 -- 2.50.0