@@ -18,7 +18,7 @@ static VALUE mKDF, eKDF;
1818 * of _length_ bytes.
1919 *
2020 * For more information about PBKDF2, see RFC 2898 Section 5.2
21- * (https://tools.ietf .org/html /rfc2898#section-5.2).
21+ * (https://www.rfc-editor .org/rfc /rfc2898#section-5.2).
2222 *
2323 * === Parameters
2424 * pass :: The password.
@@ -81,10 +81,10 @@ kdf_pbkdf2_hmac(int argc, VALUE *argv, VALUE self)
8181 * bcrypt.
8282 *
8383 * The keyword arguments _N_, _r_ and _p_ can be used to tune scrypt. RFC 7914
84- * (published on 2016-08, https://tools.ietf .org/html /rfc7914#section-2) states
84+ * (published on 2016-08, https://www.rfc-editor .org/rfc /rfc7914#section-2) states
8585 * that using values r=8 and p=1 appears to yield good results.
8686 *
87- * See RFC 7914 (https://tools.ietf .org/html /rfc7914) for more information.
87+ * See RFC 7914 (https://www.rfc-editor .org/rfc /rfc7914) for more information.
8888 *
8989 * === Parameters
9090 * pass :: Passphrase.
@@ -147,7 +147,7 @@ kdf_scrypt(int argc, VALUE *argv, VALUE self)
147147 * KDF.hkdf(ikm, salt:, info:, length:, hash:) -> String
148148 *
149149 * HMAC-based Extract-and-Expand Key Derivation Function (HKDF) as specified in
150- * {RFC 5869}[https://tools.ietf .org/html /rfc5869].
150+ * {RFC 5869}[https://www.rfc-editor .org/rfc /rfc5869].
151151 *
152152 * New in OpenSSL 1.1.0.
153153 *
@@ -165,7 +165,7 @@ kdf_scrypt(int argc, VALUE *argv, VALUE self)
165165 * The hash function.
166166 *
167167 * === Example
168- * # The values from https://datatracker.ietf .org/doc/html /rfc5869#appendix-A.1
168+ * # The values from https://www.rfc-editor .org/rfc /rfc5869#appendix-A.1
169169 * ikm = ["0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"].pack("H*")
170170 * salt = ["000102030405060708090a0b0c"].pack("H*")
171171 * info = ["f0f1f2f3f4f5f6f7f8f9"].pack("H*")
0 commit comments