@@ -3179,7 +3179,7 @@ <h2>Integrity of Related Resources</h2>
31793179Implementers are urged to consult appropriate sources, such as the
31803180< a href ="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf ">
31813181FIPS 180-4 Secure Hash Standard</ a > and the
3182- < a href ="https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF ">
3182+ < a href ="https://en.wikipedia.org/wiki/Commercial_National_Security_Algorithm_Suite ">
31833183Commercial National Security Algorithm Suite 2.0</ a > to ensure that they are
31843184choosing a current and reliable hash algorithm. At the time of this writing
31853185`sha384` SHOULD be considered the minimum strength hash algorithm for use by
@@ -4493,7 +4493,7 @@ <h3>Media Type Precision</h3>
44934493credentials=] and [=verifiable presentations=] in accept headers and when
44944494indicating content types. Implementers are warned that HTTP servers might ignore
44954495the accept header and return another content type, or return an error code such
4496- as < a data-cite ="RFC7231#section- 6.5.13 "> `415 Unsupported Media Type`</ a > .
4496+ as < a data-cite ="RFC7231#rfc. section. 6.5.13 "> `415 Unsupported Media Type`</ a > .
44974497 </ p >
44984498 </ section >
44994499 </ section >
@@ -7727,7 +7727,6 @@ <h2>Acknowledgements</h2>
77277727Devin Rousso,
77287728Dmitri Zagidulin,
77297729Dominique Hazael-Massieux,
7730- < a href ="https://github.com/Dostkamp "> Dostkamp</ a > ,
77317730Drummond Reed,
77327731< a href ="https://github.com/Emmanuel "> Emmanuel</ a > ,
77337732< a href ="https://github.com/enuoCM "> enuoCM</ a > ,
@@ -7747,7 +7746,6 @@ <h2>Acknowledgements</h2>
77477746Grant Noble,
77487747Greg Bernstein,
77497748Gregg Kellogg,
7750- < a href ="https://github.com/Haber "> Haber</ a > ,
77517749Heather Vescent,
77527750Henry Andrews,
77537751Henry Story,
0 commit comments