summaryrefslogtreecommitdiff
path: root/m4
diff options
context:
space:
mode:
authorPaul Eggert <eggert@cs.ucla.edu>2019-09-22 23:23:20 -0700
committerPaul Eggert <eggert@cs.ucla.edu>2019-09-22 23:25:29 -0700
commit9e78024bad107fe786cc3e5e328a475921ea0873 (patch)
tree15cecf41e2eb10fdca8b44a78379cea6c20a87f1 /m4
parentcb5185a539e681cbe26a6ee0de6f0f214d0ca5c0 (diff)
downloadgnulib-9e78024bad107fe786cc3e5e328a475921ea0873.tar.gz
Update some URLs
This is a clerical change that mostly changes http: to https: in URLs where either will work. It also updates some URLs that have moved, removes some URLs that no longer work, and fixes related text.
Diffstat (limited to 'm4')
-rw-r--r--m4/extern-inline.m42
-rw-r--r--m4/fflush.m42
-rw-r--r--m4/ftruncate.m42
-rw-r--r--m4/getdomainname.m42
-rw-r--r--m4/gnulib-common.m42
-rw-r--r--m4/largefile.m42
-rw-r--r--m4/nocrash.m44
-rw-r--r--m4/pthread_rwlock_rdlock.m42
-rw-r--r--m4/relocatable.m42
-rw-r--r--m4/truncate.m42
10 files changed, 11 insertions, 11 deletions
diff --git a/m4/extern-inline.m4 b/m4/extern-inline.m4
index ec9f2218bf..84421cef84 100644
--- a/m4/extern-inline.m4
+++ b/m4/extern-inline.m4
@@ -32,7 +32,7 @@ AC_DEFUN([gl_EXTERN_INLINE],
https://lists.gnu.org/r/bug-gnulib/2012-12/msg00023.html
DragonFly; see
- http://muscles.dragonflybsd.org/bulk/bleeding-edge-potential/latest-per-pkg/ah-tty-0.3.12.log
+ http://muscles.dragonflybsd.org/bulk/clang-master-potential/20141111_102002/logs/ah-tty-0.3.12.log
FreeBSD; see:
https://lists.gnu.org/r/bug-gnulib/2014-07/msg00104.html
diff --git a/m4/fflush.m4 b/m4/fflush.m4
index 2df3b4ecf5..666e60105b 100644
--- a/m4/fflush.m4
+++ b/m4/fflush.m4
@@ -57,7 +57,7 @@ AC_DEFUN([gl_FUNC_FFLUSH_STDIN],
if (lseek (fd, 0, SEEK_CUR) != 5)
{ fclose (f); return 5; }
/* Verify behaviour of fflush after ungetc. See
- <http://www.opengroup.org/austin/aardvark/latest/xshbug3.txt> */
+ <https://www.opengroup.org/austin/aardvark/latest/xshbug3.txt> */
/* Verify behaviour of fflush after a backup ungetc. This fails on
mingw. */
c = fgetc (f);
diff --git a/m4/ftruncate.m4 b/m4/ftruncate.m4
index 5151bdcafe..ca67d2c514 100644
--- a/m4/ftruncate.m4
+++ b/m4/ftruncate.m4
@@ -20,7 +20,7 @@ AC_DEFUN([gl_FUNC_FTRUNCATE],
dnl The MSVCRT _chsize() function only accepts a 32-bit file size,
dnl and the mingw64 ftruncate64() function is unreliable (it may
dnl delete the file, see
- dnl <http://mingw-w64.sourcearchive.com/documentation/2.0-1/ftruncate64_8c_source.html>).
+ dnl <https://web.archive.org/web/20160425005423/http://mingw-w64.sourcearchive.com/documentation/2.0-1/ftruncate64_8c_source.html>).
dnl Use gnulib's ftruncate() implementation instead.
REPLACE_FTRUNCATE=1
;;
diff --git a/m4/getdomainname.m4 b/m4/getdomainname.m4
index 9020b7eb8c..96bca55e13 100644
--- a/m4/getdomainname.m4
+++ b/m4/getdomainname.m4
@@ -16,7 +16,7 @@ AC_DEFUN([gl_FUNC_GETDOMAINNAME],
dnl Where is getdomainname() defined?
dnl - On Solaris, it is in libnsl. But this function is not declared and
dnl is discouraged, see
- dnl <http://www.sun.com/software/solaris/programs/abi/appcert_faq.xml#q18>.
+ dnl <https://web.archive.org/web/20100121182558/http://www.sun.com/software/solaris/programs/abi/appcert_faq.xml#q18>.
dnl We need to avoid a collision with this function.
dnl - Otherwise it is in libc.
AC_CHECK_FUNCS([getdomainname], , [
diff --git a/m4/gnulib-common.m4 b/m4/gnulib-common.m4
index ee85250f48..479c9de9ea 100644
--- a/m4/gnulib-common.m4
+++ b/m4/gnulib-common.m4
@@ -94,7 +94,7 @@ AC_DEFUN([gl_COMMON_BODY], [
invoked from such signal handlers. Such functions have some restrictions:
* All functions that it calls should be marked _GL_ASYNC_SAFE as well,
or should be listed as async-signal-safe in POSIX
- <http://pubs.opengroup.org/onlinepubs/9699919799/functions/V2_chap02.html#tag_15_04>
+ <https://pubs.opengroup.org/onlinepubs/9699919799/functions/V2_chap02.html#tag_15_04>
section 2.4.3. Note that malloc(), sprintf(), and fwrite(), in
particular, are NOT async-signal-safe.
* All memory locations (variables and struct fields) that these functions
diff --git a/m4/largefile.m4 b/m4/largefile.m4
index 1938188c17..c6dd9a1003 100644
--- a/m4/largefile.m4
+++ b/m4/largefile.m4
@@ -56,7 +56,7 @@ rm -rf conftest*[]dnl
# By default, many hosts won't let programs access large files;
# one must use special compiler options to get large-file access to work.
# For more details about this brain damage please see:
-# http://www.unix-systems.org/version2/whatsnew/lfs20mar.html
+# http://www.unix.org/version2/whatsnew/lfs20mar.html
AC_DEFUN([AC_SYS_LARGEFILE],
[AC_ARG_ENABLE(largefile,
[ --disable-largefile omit support for large files])
diff --git a/m4/nocrash.m4 b/m4/nocrash.m4
index 4d9f022690..8577038d79 100644
--- a/m4/nocrash.m4
+++ b/m4/nocrash.m4
@@ -53,7 +53,7 @@ nocrash_init (void)
/* Allocate a port on which the thread shall listen for exceptions. */
if (mach_port_allocate (self, MACH_PORT_RIGHT_RECEIVE, &our_exception_port)
== KERN_SUCCESS) {
- /* See http://web.mit.edu/darwin/src/modules/xnu/osfmk/man/mach_port_insert_right.html. */
+ /* See https://web.mit.edu/darwin/src/modules/xnu/osfmk/man/mach_port_insert_right.html. */
if (mach_port_insert_right (self, our_exception_port, our_exception_port,
MACH_MSG_TYPE_MAKE_SEND)
== KERN_SUCCESS) {
@@ -72,7 +72,7 @@ nocrash_init (void)
for a particular thread. This has the effect that when our exception
port gets the message, the thread specific exception port has already
been asked, and we don't need to bother about it.
- See http://web.mit.edu/darwin/src/modules/xnu/osfmk/man/task_set_exception_ports.html. */
+ See https://web.mit.edu/darwin/src/modules/xnu/osfmk/man/task_set_exception_ports.html. */
task_set_exception_ports (self, mask, our_exception_port,
EXCEPTION_DEFAULT, MACHINE_THREAD_STATE);
}
diff --git a/m4/pthread_rwlock_rdlock.m4 b/m4/pthread_rwlock_rdlock.m4
index cbc2df81d2..87886a3b10 100644
--- a/m4/pthread_rwlock_rdlock.m4
+++ b/m4/pthread_rwlock_rdlock.m4
@@ -26,7 +26,7 @@ dnl
dnl POSIX:2017 makes this requirement only for implementations that support TPS
dnl (Thread Priority Scheduling) and only for the scheduling policies SCHED_FIFO
dnl and SCHED_RR, see
-dnl http://pubs.opengroup.org/onlinepubs/9699919799/functions/pthread_rwlock_rdlock.html
+dnl https://pubs.opengroup.org/onlinepubs/9699919799/functions/pthread_rwlock_rdlock.html
dnl but this test verifies the guarantee regardless of TPS and regardless of
dnl scheduling policy.
dnl Glibc does not provide this guarantee (and never will on Linux), see
diff --git a/m4/relocatable.m4 b/m4/relocatable.m4
index bbfb44ccfe..0ba1352c72 100644
--- a/m4/relocatable.m4
+++ b/m4/relocatable.m4
@@ -57,7 +57,7 @@ AC_DEFUN([gl_RELOCATABLE_BODY],
# glibc systems, Linux with musl libc: yes. Android: no.
linux*-android*) ;;
linux* | kfreebsd*) use_elf_origin_trick=yes ;;
- # Hurd: <http://lists.gnu.org/archive/html/bug-hurd/2019-02/msg00049.html>
+ # Hurd: <https://lists.gnu.org/r/bug-hurd/2019-02/msg00049.html>
# only after the glibc commit from 2018-01-08
# <https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=311ba8dc4416467947eff2ab327854f124226309>
gnu*)
diff --git a/m4/truncate.m4 b/m4/truncate.m4
index ada0fcdfa9..80b550e1df 100644
--- a/m4/truncate.m4
+++ b/m4/truncate.m4
@@ -21,7 +21,7 @@ AC_DEFUN([gl_FUNC_TRUNCATE],
dnl Native Windows, and Large File Support is requested.
dnl The mingw64 truncate64() function is based on ftruncate64(),
dnl which is unreliable (it may delete the file, see
- dnl <http://mingw-w64.sourcearchive.com/documentation/2.0-1/ftruncate64_8c_source.html>).
+ dnl <https://web.archive.org/web/20160425005423/http://mingw-w64.sourcearchive.com/documentation/2.0-1/ftruncate64_8c_source.html>).
dnl Use gnulib's ftruncate() and truncate() implementation instead.
REPLACE_TRUNCATE=1
;;