1
0
Fork 0
mirror of https://github.com/pgpainless/pgpainless.git synced 2024-11-05 20:15:59 +01:00

Convert links in javadoc to html

This commit is contained in:
Paul Schaub 2022-09-29 13:14:32 +02:00
parent 73cdf34b02
commit 17f90eb721
6 changed files with 10 additions and 8 deletions

View file

@ -28,7 +28,7 @@ public enum PublicKeyAlgorithm {
/**
* RSA with usage encryption.
*
* @deprecated see https://tools.ietf.org/html/rfc4880#section-13.5
* @deprecated see <a href="https://tools.ietf.org/html/rfc4880#section-13.5">Deprecation notice</a>
*/
@Deprecated
RSA_ENCRYPT (PublicKeyAlgorithmTags.RSA_ENCRYPT, false, true),
@ -36,7 +36,7 @@ public enum PublicKeyAlgorithm {
/**
* RSA with usage of creating signatures.
*
* @deprecated see https://tools.ietf.org/html/rfc4880#section-13.5
* @deprecated see <a href="https://tools.ietf.org/html/rfc4880#section-13.5">Deprecation notice</a>
*/
@Deprecated
RSA_SIGN (PublicKeyAlgorithmTags.RSA_SIGN, true, false),
@ -71,7 +71,7 @@ public enum PublicKeyAlgorithm {
/**
* ElGamal General.
*
* @deprecated see https://tools.ietf.org/html/rfc4880#section-13.8
* @deprecated see <a href="https://tools.ietf.org/html/rfc4880#section-13.8">Deprecation notice</a>
*/
@Deprecated
ELGAMAL_GENERAL (PublicKeyAlgorithmTags.ELGAMAL_GENERAL, true, true),

View file

@ -20,11 +20,13 @@ public interface MissingPublicKeyCallback {
* you may not only search for the key-id on the key rings primary key!
*
* It would be super cool to provide the OpenPgp fingerprint here, but unfortunately one-pass-signatures
* only contain the key id (see https://datatracker.ietf.org/doc/html/rfc4880#section-5.4)
* only contain the key id.
*
* @param keyId ID of the missing signing (sub)key
*
* @return keyring containing the key or null
*
* @see <a href="https://datatracker.ietf.org/doc/html/rfc4880#section-5.4">RFC</a>
*/
@Nullable PGPPublicKeyRing onMissingPublicKeyEncountered(@Nonnull Long keyId);

View file

@ -237,7 +237,7 @@ public class PublicKeyParameterValidationUtil {
* Validate ElGamal public key parameters.
*
* Original implementation by the openpgpjs authors:
* https://github.com/openpgpjs/openpgpjs/blob/main/src/crypto/public_key/elgamal.js#L76-L143
* <a href="https://github.com/openpgpjs/openpgpjs/blob/main/src/crypto/public_key/elgamal.js#L76-L143>OpenPGP.js source</a>
* @param secretKey secret key
* @param publicKey public key
* @return true if supposedly valid, false if invalid

View file

@ -28,7 +28,7 @@ public class PGPPublicKeyRingTest {
* Learning test to see if BC also makes userids available on subkeys.
* It does not.
*
* see also https://security.stackexchange.com/questions/92635/is-it-possible-to-assign-different-uids-to-subkeys-for-the-purpose-of-having-mul
* @see <a href="https://security.stackexchange.com/questions/92635/is-it-possible-to-assign-different-uids-to-subkeys-for-the-purpose-of-having-mul>Stackexchange link</a>
*/
@Test
public void subkeysDoNotHaveUserIDsTest() throws InvalidAlgorithmParameterException, NoSuchAlgorithmException, PGPException {

View file

@ -13,7 +13,7 @@ import org.pgpainless.PGPainless;
* This class contains a set of slightly out of spec or weird keys.
* Those are used to test whether implementations behave correctly when dealing with such keys.
*
* Original source: https://gitlab.com/sequoia-pgp/weird-keys
* @see <a href="https://gitlab.com/sequoia-pgp/weird-keys">Original Source</a>
*/
public class WeirdKeys {

View file

@ -20,7 +20,7 @@ import org.pgpainless.util.TestAllImplementations;
import org.pgpainless.util.Passphrase;
/**
* Reproduce behavior of https://github.com/pgpainless/pgpainless/issues/16
* Reproduce behavior of <a href="https://github.com/pgpainless/pgpainless/issues/16>this issue</a>
* and verify that the fix is working.
*
* The issue is that the implementation of {@link Passphrase#emptyPassphrase()} would set the underlying