@@ -3179,7 +3179,7 @@ <h2>Integrity of Related Resources</h2>
3179
3179
Implementers are urged to consult appropriate sources, such as the
3180
3180
< a href ="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf ">
3181
3181
FIPS 180-4 Secure Hash Standard</ a > and the
3182
- < a href ="https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF ">
3182
+ < a href ="https://en.wikipedia.org/wiki/Commercial_National_Security_Algorithm_Suite ">
3183
3183
Commercial National Security Algorithm Suite 2.0</ a > to ensure that they are
3184
3184
choosing a current and reliable hash algorithm. At the time of this writing
3185
3185
`sha384` SHOULD be considered the minimum strength hash algorithm for use by
@@ -4493,7 +4493,7 @@ <h3>Media Type Precision</h3>
4493
4493
credentials=] and [=verifiable presentations=] in accept headers and when
4494
4494
indicating content types. Implementers are warned that HTTP servers might ignore
4495
4495
the accept header and return another content type, or return an error code such
4496
- as < a data-cite ="RFC7231#section- 6.5.13 "> `415 Unsupported Media Type`</ a > .
4496
+ as < a data-cite ="RFC7231#rfc. section. 6.5.13 "> `415 Unsupported Media Type`</ a > .
4497
4497
</ p >
4498
4498
</ section >
4499
4499
</ section >
@@ -7727,7 +7727,6 @@ <h2>Acknowledgements</h2>
7727
7727
Devin Rousso,
7728
7728
Dmitri Zagidulin,
7729
7729
Dominique Hazael-Massieux,
7730
- < a href ="https://github.com/Dostkamp "> Dostkamp</ a > ,
7731
7730
Drummond Reed,
7732
7731
< a href ="https://github.com/Emmanuel "> Emmanuel</ a > ,
7733
7732
< a href ="https://github.com/enuoCM "> enuoCM</ a > ,
@@ -7747,7 +7746,6 @@ <h2>Acknowledgements</h2>
7747
7746
Grant Noble,
7748
7747
Greg Bernstein,
7749
7748
Gregg Kellogg,
7750
- < a href ="https://github.com/Haber "> Haber</ a > ,
7751
7749
Heather Vescent,
7752
7750
Henry Andrews,
7753
7751
Henry Story,
0 commit comments