Skip to content

Commit f637b3b

Browse files
geoffw0mchammer01
andauthored
Apply suggestions from code review
Co-authored-by: mc <[email protected]>
1 parent 129f21a commit f637b3b

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,8 +42,8 @@
4242
<sample src="BrokenCryptoAlgorithmBad.rs" />
4343

4444
<p>
45-
Instead we should use a strong modern algorithm. In this
46-
case we have selected the 256-bit version of the AES
45+
Instead, we should use a strong modern algorithm. In this
46+
case, we have selected the 256-bit version of the AES
4747
algorithm.
4848
</p>
4949

@@ -52,8 +52,8 @@
5252
</example>
5353

5454
<references>
55-
<li>NIST, FIPS 140 Annex a: <a href="http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf"> Approved Security Functions</a>.</li>
56-
<li>NIST, SP 800-131A: <a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf"> Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths</a>.</li>
55+
<li>NIST, FIPS 140 Annex A: <a href="http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf"> Approved Security Functions</a>.</li>
56+
<li>NIST, SP 800-131A Revision 2: <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf">Transitioning the Use of Cryptographic Algorithms and Key Lengths</a>.</li>
5757
<li>OWASP: <a
5858
href="https://cheatsheetseries.owasp.org/cheatsheets/Cryptographic_Storage_Cheat_Sheet.html#algorithms"> Cryptographic Storage Cheat Sheet - Algorithms</a>.
5959
</li>

0 commit comments

Comments
 (0)