diff --git a/.github/PULL_REQUEST_TEMPLATE.md b/.github/PULL_REQUEST_TEMPLATE.md --- a/.github/PULL_REQUEST_TEMPLATE.md +++ b/.github/PULL_REQUEST_TEMPLATE.md @@ -1,5 +1,5 @@ # **DO NOT FILE A PULL REQUEST** -This repository does not accept pull requests. Please follow http://llvm.org/docs/Contributing.html#how-to-submit-a-patch for contribution to LLVM. +This repository does not accept pull requests. Please follow https://llvm.org/docs/Contributing.html#how-to-submit-a-patch for contribution to LLVM. # **DO NOT FILE A PULL REQUEST** diff --git a/.github/workflows/repo-lockdown.yml b/.github/workflows/repo-lockdown.yml --- a/.github/workflows/repo-lockdown.yml +++ b/.github/workflows/repo-lockdown.yml @@ -16,4 +16,4 @@ process-only: 'prs' pr-comment: > This repository does not accept pull requests. - Please follow http://llvm.org/docs/Contributing.html#how-to-submit-a-patch for contribution to LLVM. + Please follow https://llvm.org/docs/Contributing.html#how-to-submit-a-patch for contribution to LLVM. diff --git a/.gitignore b/.gitignore --- a/.gitignore +++ b/.gitignore @@ -1,6 +1,6 @@ #==============================================================================# # This file specifies intentionally untracked files that git should ignore. -# See: http://www.kernel.org/pub/software/scm/git/docs/gitignore.html +# See: https://www.kernel.org/pub/software/scm/git/docs/gitignore.html # # This file is intentionally different from the output of `git svn show-ignore`, # as most of those are useless. diff --git a/README.md b/README.md --- a/README.md +++ b/README.md @@ -23,7 +23,7 @@ object files. Tools include an assembler, disassembler, bitcode analyzer, and bitcode optimizer. It also contains basic regression tests. -C-like languages use the [Clang](http://clang.llvm.org/) frontend. This +C-like languages use the [Clang](https://clang.llvm.org/) frontend. This component compiles C, C++, Objective-C, and Objective-C++ code into LLVM bitcode -- and from there into object files, using LLVM. @@ -34,7 +34,7 @@ ### Getting the Source Code and Building LLVM The LLVM Getting Started documentation may be out of date. The [Clang -Getting Started](http://clang.llvm.org/get_started.html) page might have more +Getting Started](https://clang.llvm.org/get_started.html) page might have more accurate information. This is an example work-flow and configuration to get and build the LLVM source: diff --git a/bolt/docs/CMakeLists.txt b/bolt/docs/CMakeLists.txt --- a/bolt/docs/CMakeLists.txt +++ b/bolt/docs/CMakeLists.txt @@ -30,9 +30,9 @@ set(BOLT_DOXYGEN_QHP_NAMESPACE "org.llvm.bolt" CACHE STRING "Namespace under which the intermediate Qt Help Project file lives") set(BOLT_DOXYGEN_QHP_CUST_FILTER_NAME "Clang ${BOLT_VERSION}" CACHE STRING - "See http://qt-project.org/doc/qt-4.8/qthelpproject.html#custom-filters") + "See https://qt-project.org/doc/qt-4.8/qthelpproject.html#custom-filters") set(BOLT_DOXYGEN_QHP_CUST_FILTER_ATTRS "Clang,${BOLT_VERSION}" CACHE STRING - "See http://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes") + "See https://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes") set(bolt_doxygen_generate_qhp "YES") set(bolt_doxygen_qch_filename "${BOLT_DOXYGEN_QCH_FILENAME}") set(bolt_doxygen_qhp_namespace "${BOLT_DOXYGEN_QHP_NAMESPACE}") @@ -102,4 +102,3 @@ endif() endif() endif() - diff --git a/bolt/docs/OptimizingClang.md b/bolt/docs/OptimizingClang.md --- a/bolt/docs/OptimizingClang.md +++ b/bolt/docs/OptimizingClang.md @@ -23,7 +23,7 @@ ## Building Clang The process of getting Clang sources and performing the build is very similar to the -one described at http://clang.llvm.org/get_started.html. For completeness, we provide the detailed steps +one described at https://clang.llvm.org/get_started.html. For completeness, we provide the detailed steps on how to obtain and build Clang in [Bootstrapping Clang-7 with PGO and LTO](#bootstrapping-clang-7-with-pgo-and-lto) section. The only difference from the standard Clang build is that we require the `-Wl,-q` flag to be present during diff --git a/bolt/docs/doxygen.cfg.in b/bolt/docs/doxygen.cfg.in --- a/bolt/docs/doxygen.cfg.in +++ b/bolt/docs/doxygen.cfg.in @@ -20,7 +20,7 @@ # This tag specifies the encoding used for all characters in the config file # that follow. The default is UTF-8 which is also the encoding used for all text # before the first occurrence of this tag. Doxygen uses libiconv (or the iconv -# built into libc) for the transcoding. See http://www.gnu.org/software/libiconv +# built into libc) for the transcoding. See https://www.gnu.org/software/libiconv # for the list of possible encodings. # The default value is: UTF-8. @@ -276,7 +276,7 @@ # If the MARKDOWN_SUPPORT tag is enabled then doxygen pre-processes all comments # according to the Markdown format, which allows for more readable -# documentation. See http://daringfireball.net/projects/markdown/ for details. +# documentation. See https://daringfireball.net/projects/markdown/ for details. # The output of markdown processing is further processed by doxygen, so you can # mix doxygen, HTML, and XML commands with Markdown formatting. Disable only in # case of backward compatibilities issues. @@ -309,7 +309,7 @@ CPP_CLI_SUPPORT = NO # Set the SIP_SUPPORT tag to YES if your project consists of sip (see: -# http://www.riverbankcomputing.co.uk/software/sip/intro) sources only. Doxygen +# https://www.riverbankcomputing.co.uk/software/sip/intro) sources only. Doxygen # will parse them like normal C++ but will assume all classes use public instead # of private inheritance when no explicit protection keyword is present. # The default value is: NO. @@ -668,7 +668,7 @@ # The CITE_BIB_FILES tag can be used to specify one or more bib files containing # the reference definitions. This must be a list of .bib files. The .bib # extension is automatically appended if omitted. This requires the bibtex tool -# to be installed. See also http://en.wikipedia.org/wiki/BibTeX for more info. +# to be installed. See also https://en.wikipedia.org/wiki/BibTeX for more info. # For LaTeX the style of the bibliography can be controlled using # LATEX_BIB_STYLE. To use this feature you need bibtex and perl available in the # search path. Do not use file names with spaces, bibtex cannot handle them. See @@ -755,7 +755,7 @@ # This tag can be used to specify the character encoding of the source files # that doxygen parses. Internally doxygen uses the UTF-8 encoding. Doxygen uses # libiconv (or the iconv built into libc) for the transcoding. See the libiconv -# documentation (see: http://www.gnu.org/software/libiconv) for the list of +# documentation (see: https://www.gnu.org/software/libiconv) for the list of # possible encodings. # The default value is: UTF-8. @@ -947,7 +947,7 @@ # If the USE_HTAGS tag is set to YES then the references to source code will # point to the HTML generated by the htags(1) tool instead of doxygen built-in # source browser. The htags tool is part of GNU's global source tagging system -# (see http://www.gnu.org/software/global/global.html). You will need version +# (see https://www.gnu.org/software/global/global.html). You will need version # 4.8.6 or higher. # # To use it do the following: @@ -1090,7 +1090,7 @@ # The HTML_COLORSTYLE_HUE tag controls the color of the HTML output. Doxygen # will adjust the colors in the stylesheet and background images according to # this color. Hue is specified as an angle on a colorwheel, see -# http://en.wikipedia.org/wiki/Hue for more information. For instance the value +# https://en.wikipedia.org/wiki/Hue for more information. For instance the value # 0 represents red, 60 is yellow, 120 is green, 180 is cyan, 240 is blue, 300 # purple, and 360 is red again. # Minimum value: 0, maximum value: 359, default value: 220. @@ -1148,12 +1148,12 @@ # If the GENERATE_DOCSET tag is set to YES, additional index files will be # generated that can be used as input for Apple's Xcode 3 integrated development -# environment (see: http://developer.apple.com/tools/xcode/), introduced with +# environment (see: https://developer.apple.com/tools/xcode/), introduced with # OSX 10.5 (Leopard). To create a documentation set, doxygen will generate a # Makefile in the HTML output directory. Running make will produce the docset in # that directory and running make install will install the docset in # ~/Library/Developer/Shared/Documentation/DocSets so that Xcode will find it at -# startup. See http://developer.apple.com/tools/creatingdocsetswithdoxygen.html +# startup. See https://developer.apple.com/tools/creatingdocsetswithdoxygen.html # for more information. # The default value is: NO. # This tag requires that the tag GENERATE_HTML is set to YES. @@ -1193,7 +1193,7 @@ # If the GENERATE_HTMLHELP tag is set to YES then doxygen generates three # additional HTML index files: index.hhp, index.hhc, and index.hhk. The # index.hhp is a project file that can be read by Microsoft's HTML Help Workshop -# (see: http://www.microsoft.com/en-us/download/details.aspx?id=21138) on +# (see: https://www.microsoft.com/en-us/download/details.aspx?id=21138) on # Windows. # # The HTML Help Workshop contains a compiler that can convert all HTML output @@ -1268,7 +1268,7 @@ # The QHP_NAMESPACE tag specifies the namespace to use when generating Qt Help # Project output. For more information please see Qt Help Project / Namespace -# (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#namespace). +# (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#namespace). # The default value is: org.doxygen.Project. # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1276,7 +1276,7 @@ # The QHP_VIRTUAL_FOLDER tag specifies the namespace to use when generating Qt # Help Project output. For more information please see Qt Help Project / Virtual -# Folders (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#virtual- +# Folders (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#virtual- # folders). # The default value is: doc. # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1285,7 +1285,7 @@ # If the QHP_CUST_FILTER_NAME tag is set, it specifies the name of a custom # filter to add. For more information please see Qt Help Project / Custom -# Filters (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- +# Filters (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- # filters). # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1293,7 +1293,7 @@ # The QHP_CUST_FILTER_ATTRS tag specifies the list of the attributes of the # custom filter to add. For more information please see Qt Help Project / Custom -# Filters (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- +# Filters (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- # filters). # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1301,7 +1301,7 @@ # The QHP_SECT_FILTER_ATTRS tag specifies the list of the attributes this # project's filter section matches. Qt Help Project / Filter Attributes (see: -# http://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes). +# https://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes). # This tag requires that the tag GENERATE_QHP is set to YES. QHP_SECT_FILTER_ATTRS = @@ -1406,7 +1406,7 @@ FORMULA_TRANSPARENT = YES # Enable the USE_MATHJAX option to render LaTeX formulas using MathJax (see -# http://www.mathjax.org) which uses client side Javascript for the rendering +# https://www.mathjax.org) which uses client side Javascript for the rendering # instead of using prerendered bitmaps. Use this if you do not have LaTeX # installed or if you want to formulas look prettier in the HTML output. When # enabled you may also need to install MathJax separately and configure the path @@ -1418,7 +1418,7 @@ # When MathJax is enabled you can set the default output format to be used for # the MathJax output. See the MathJax site (see: -# http://docs.mathjax.org/en/latest/output.html) for more details. +# https://docs.mathjax.org/en/latest/output.html) for more details. # Possible values are: HTML-CSS (which is slower, but has the best # compatibility), NativeMML (i.e. MathML) and SVG. # The default value is: HTML-CSS. @@ -1433,11 +1433,11 @@ # MATHJAX_RELPATH should be ../mathjax. The default value points to the MathJax # Content Delivery Network so you can quickly see the result without installing # MathJax. However, it is strongly recommended to install a local copy of -# MathJax from http://www.mathjax.org before deployment. -# The default value is: http://cdn.mathjax.org/mathjax/latest. +# MathJax from https://www.mathjax.org before deployment. +# The default value is: https://cdn.mathjax.org/mathjax/latest. # This tag requires that the tag USE_MATHJAX is set to YES. -MATHJAX_RELPATH = http://cdn.mathjax.org/mathjax/latest +MATHJAX_RELPATH = https://cdn.mathjax.org/mathjax/latest # The MATHJAX_EXTENSIONS tag can be used to specify one or more MathJax # extension names that should be enabled during MathJax rendering. For example @@ -1448,7 +1448,7 @@ # The MATHJAX_CODEFILE tag can be used to specify a file with javascript pieces # of code that will be used on startup of the MathJax code. See the MathJax site -# (see: http://docs.mathjax.org/en/latest/output.html) for more details. For an +# (see: https://docs.mathjax.org/en/latest/output.html) for more details. For an # example see the documentation. # This tag requires that the tag USE_MATHJAX is set to YES. @@ -1495,7 +1495,7 @@ # # Doxygen ships with an example indexer ( doxyindexer) and search engine # (doxysearch.cgi) which are based on the open source search engine library -# Xapian (see: http://xapian.org/). +# Xapian (see: https://xapian.org/). # # See the section "External Indexing and Searching" for details. # The default value is: NO. @@ -1508,7 +1508,7 @@ # # Doxygen ships with an example indexer ( doxyindexer) and search engine # (doxysearch.cgi) which are based on the open source search engine library -# Xapian (see: http://xapian.org/). See the section "External Indexing and +# Xapian (see: https://xapian.org/). See the section "External Indexing and # Searching" for details. # This tag requires that the tag SEARCHENGINE is set to YES. @@ -1679,7 +1679,7 @@ # The LATEX_BIB_STYLE tag can be used to specify the style to use for the # bibliography, e.g. plainnat, or ieeetr. See -# http://en.wikipedia.org/wiki/BibTeX and \cite for more info. +# https://en.wikipedia.org/wiki/BibTeX and \cite for more info. # The default value is: plain. # This tag requires that the tag GENERATE_LATEX is set to YES. @@ -1840,7 +1840,7 @@ #--------------------------------------------------------------------------- # If the GENERATE_AUTOGEN_DEF tag is set to YES doxygen will generate an AutoGen -# Definitions (see http://autogen.sf.net) file that captures the structure of +# Definitions (see https://autogen.sf.net) file that captures the structure of # the code including all documentation. Note that this feature is still # experimental and incomplete at the moment. # The default value is: NO. @@ -2029,7 +2029,7 @@ # You can define message sequence charts within doxygen comments using the \msc # command. Doxygen will then run the mscgen tool (see: -# http://www.mcternan.me.uk/mscgen/)) to produce the chart and insert it in the +# https://www.mcternan.me.uk/mscgen/)) to produce the chart and insert it in the # documentation. The MSCGEN_PATH tag allows you to specify the directory where # the mscgen tool resides. If left empty the tool is assumed to be found in the # default search path. @@ -2051,7 +2051,7 @@ # If you set the HAVE_DOT tag to YES then doxygen will assume the dot tool is # available from the path. This tool is part of Graphviz (see: -# http://www.graphviz.org/), a graph visualization toolkit from AT&T and Lucent +# https://www.graphviz.org/), a graph visualization toolkit from AT&T and Lucent # Bell Labs. The other options in this section have no effect if this option is # set to NO # The default value is: NO. diff --git a/clang-tools-extra/.gitignore b/clang-tools-extra/.gitignore --- a/clang-tools-extra/.gitignore +++ b/clang-tools-extra/.gitignore @@ -1,6 +1,6 @@ #==============================================================================# # This file specifies intentionally untracked files that git should ignore. -# See: http://www.kernel.org/pub/software/scm/git/docs/gitignore.html +# See: https://www.kernel.org/pub/software/scm/git/docs/gitignore.html # # This file is intentionally different from the output of `git svn show-ignore`, # as most of those are useless. diff --git a/clang-tools-extra/README.txt b/clang-tools-extra/README.txt --- a/clang-tools-extra/README.txt +++ b/clang-tools-extra/README.txt @@ -13,7 +13,7 @@ Code review for this tree should take place on the standard Clang patch and commit lists: - http://lists.llvm.org/mailman/listinfo/cfe-commits + https://lists.llvm.org/mailman/listinfo/cfe-commits If you find a bug in these tools, please file it in the LLVM bug tracker: https://github.com/llvm/llvm-project/issues/ diff --git a/clang-tools-extra/clang-doc/Representation.cpp b/clang-tools-extra/clang-doc/Representation.cpp --- a/clang-tools-extra/clang-doc/Representation.cpp +++ b/clang-tools-extra/clang-doc/Representation.cpp @@ -335,7 +335,7 @@ this->SourceRoot = std::string(SourceRootDir.str()); if (!RepositoryUrl.empty()) { this->RepositoryUrl = std::string(RepositoryUrl); - if (!RepositoryUrl.empty() && RepositoryUrl.find("http://") != 0 && + if (!RepositoryUrl.empty() && RepositoryUrl.find("https://") != 0 && RepositoryUrl.find("https://") != 0) this->RepositoryUrl->insert(0, "https://"); } diff --git a/clang-tools-extra/clang-doc/assets/clang-doc-default-stylesheet.css b/clang-tools-extra/clang-doc/assets/clang-doc-default-stylesheet.css --- a/clang-tools-extra/clang-doc/assets/clang-doc-default-stylesheet.css +++ b/clang-tools-extra/clang-doc/assets/clang-doc-default-stylesheet.css @@ -554,7 +554,7 @@ } .gt-separated li:before { - background-image: url("data:image/svg+xml;utf8,"); + background-image: url("data:image/svg+xml;utf8,"); background-position: center; content: "\00a0"; margin: 0 6px 0 4px; @@ -562,7 +562,7 @@ } .gt-separated.dark li:before { - background-image: url("data:image/svg+xml;utf8,"); + background-image: url("data:image/svg+xml;utf8,"); } .gt-separated li:first-child:before { @@ -760,7 +760,7 @@ @media screen and (max-width:768px) { #sidenav-left-toggle { display: inline; - background: no-repeat url("data:image/svg+xml;utf8,"); + background: no-repeat url("data:image/svg+xml;utf8,"); background-position: center; width: 24px; height: 24px; @@ -966,4 +966,4 @@ a[href]:after { content:"" !important; } -} \ No newline at end of file +} diff --git a/clang-tools-extra/clang-include-fixer/find-all-symbols/tool/run-find-all-symbols.py b/clang-tools-extra/clang-include-fixer/find-all-symbols/tool/run-find-all-symbols.py --- a/clang-tools-extra/clang-include-fixer/find-all-symbols/tool/run-find-all-symbols.py +++ b/clang-tools-extra/clang-include-fixer/find-all-symbols/tool/run-find-all-symbols.py @@ -19,7 +19,7 @@ run-find-all-symbols.py Compilation database setup: -http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html """ import argparse diff --git a/clang-tools-extra/clang-include-fixer/tool/clang-include-fixer.el b/clang-tools-extra/clang-include-fixer/tool/clang-include-fixer.el --- a/clang-tools-extra/clang-include-fixer/tool/clang-include-fixer.el +++ b/clang-tools-extra/clang-include-fixer/tool/clang-include-fixer.el @@ -8,7 +8,7 @@ ;; This package allows Emacs users to invoke the 'clang-include-fixer' within ;; Emacs. 'clang-include-fixer' provides an automated way of adding #include ;; directives for missing symbols in one translation unit, see -;; . +;; . ;;; Code: diff --git a/clang-tools-extra/clang-include-fixer/tool/clang-include-fixer.py b/clang-tools-extra/clang-include-fixer/tool/clang-include-fixer.py --- a/clang-tools-extra/clang-include-fixer/tool/clang-include-fixer.py +++ b/clang-tools-extra/clang-include-fixer/tool/clang-include-fixer.py @@ -9,7 +9,7 @@ # different key. # # To set up clang-include-fixer, see -# http://clang.llvm.org/extra/clang-include-fixer.html +# https://clang.llvm.org/extra/clang-include-fixer.html # # With this integration you can press the bound key and clang-include-fixer will # be run on the current buffer. diff --git a/clang-tools-extra/clang-tidy/ClangTidy.cpp b/clang-tools-extra/clang-tidy/ClangTidy.cpp --- a/clang-tools-extra/clang-tidy/ClangTidy.cpp +++ b/clang-tools-extra/clang-tidy/ClangTidy.cpp @@ -9,7 +9,7 @@ /// \file This file implements a clang-tidy tool. /// /// This tool uses the Clang Tooling infrastructure, see -/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html /// for details on setting it up with LLVM source tree. /// //===----------------------------------------------------------------------===// diff --git a/clang-tools-extra/clang-tidy/ClangTidyDiagnosticConsumer.cpp b/clang-tools-extra/clang-tidy/ClangTidyDiagnosticConsumer.cpp --- a/clang-tools-extra/clang-tidy/ClangTidyDiagnosticConsumer.cpp +++ b/clang-tools-extra/clang-tidy/ClangTidyDiagnosticConsumer.cpp @@ -10,7 +10,7 @@ /// and ClangTidyError classes. /// /// This tool uses the Clang Tooling infrastructure, see -/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html /// for details on setting it up with LLVM source tree. /// //===----------------------------------------------------------------------===// diff --git a/clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h b/clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h --- a/clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h @@ -20,7 +20,7 @@ /// deduction (CTAD), in C++17 and higher. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-cleanup-ctad.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-cleanup-ctad.html class CleanupCtadCheck : public utils::TransformerClangTidyCheck { public: CleanupCtadCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h --- a/clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h @@ -19,7 +19,7 @@ /// ``absl::Time`` domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-addition.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-addition.html class DurationAdditionCheck : public ClangTidyCheck { public: DurationAdditionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h --- a/clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h @@ -19,7 +19,7 @@ /// domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-comparison.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-comparison.html class DurationComparisonCheck : public ClangTidyCheck { public: DurationComparisonCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h --- a/clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h @@ -19,7 +19,7 @@ /// the right conversion function instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-conversion-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-conversion-cast.html class DurationConversionCastCheck : public ClangTidyCheck { public: DurationConversionCastCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h --- a/clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h @@ -18,7 +18,7 @@ // Find potential incorrect uses of integer division of absl::Duration objects. // // For the user-facing documentation see: -// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-division.html +// https://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-division.html class DurationDivisionCheck : public ClangTidyCheck { public: diff --git a/clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h --- a/clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h @@ -21,7 +21,7 @@ /// component. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-factory-float.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-factory-float.html class DurationFactoryFloatCheck : public ClangTidyCheck { public: DurationFactoryFloatCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h --- a/clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h @@ -21,7 +21,7 @@ /// case of zero and suggests `ZeroDuration()`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-factory-scale.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-factory-scale.html class DurationFactoryScaleCheck : public ClangTidyCheck { public: DurationFactoryScaleCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h --- a/clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h @@ -19,7 +19,7 @@ /// `absl::Duration` domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-subtraction.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-subtraction.html class DurationSubtractionCheck : public ClangTidyCheck { public: DurationSubtractionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h --- a/clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h @@ -19,7 +19,7 @@ /// to numeric types and back again. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-unnecessary-conversion.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-unnecessary-conversion.html class DurationUnnecessaryConversionCheck : public ClangTidyCheck { public: DurationUnnecessaryConversionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h b/clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h --- a/clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h @@ -19,7 +19,7 @@ /// is a single character string literal and replaces it with a character. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-faster-strsplit-delimiter.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-faster-strsplit-delimiter.html class FasterStrsplitDelimiterCheck : public ClangTidyCheck { public: FasterStrsplitDelimiterCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h b/clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h --- a/clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h @@ -19,7 +19,7 @@ /// against doing so. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-no-internal-dependencies.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-no-internal-dependencies.html class NoInternalDependenciesCheck : public ClangTidyCheck { public: NoInternalDependenciesCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h b/clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h --- a/clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h @@ -19,7 +19,7 @@ /// Abseil's compatibility guidelines. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-no-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-no-namespace.html class NoNamespaceCheck : public ClangTidyCheck { public: NoNamespaceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h b/clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h --- a/clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h @@ -22,7 +22,7 @@ /// StrCat(1, StrCat(2, 3)) ==> StrCat(1, 2, 3) /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-redundant-strcat-calls.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-redundant-strcat-calls.html class RedundantStrcatCallsCheck : public ClangTidyCheck { public: RedundantStrcatCallsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h b/clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h --- a/clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h @@ -19,7 +19,7 @@ /// should be used instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-str-cat-append.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-str-cat-append.html class StrCatAppendCheck : public ClangTidyCheck { public: StrCatAppendCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h b/clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h --- a/clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h @@ -20,7 +20,7 @@ /// types) and suggests replacing with absl::StrContains. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-string-find-str-contains.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-string-find-str-contains.html class StringFindStrContainsCheck : public utils::TransformerClangTidyCheck { public: StringFindStrContainsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h b/clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h --- a/clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h @@ -19,7 +19,7 @@ /// domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-time-comparison.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-time-comparison.html class TimeComparisonCheck : public ClangTidyCheck { public: TimeComparisonCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h b/clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h --- a/clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h @@ -19,7 +19,7 @@ /// in the time domain instead of the numeric domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-time-subtraction.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-time-subtraction.html class TimeSubtractionCheck : public ClangTidyCheck { public: TimeSubtractionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h b/clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h --- a/clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h @@ -21,7 +21,7 @@ /// Finds deprecated uses of `absl::Duration` arithmetic operators and factories. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-upgrade-duration-conversions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil-upgrade-duration-conversions.html class UpgradeDurationConversionsCheck : public ClangTidyCheck { public: UpgradeDurationConversionsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/add_new_check.py b/clang-tools-extra/clang-tidy/add_new_check.py --- a/clang-tools-extra/clang-tidy/add_new_check.py +++ b/clang-tools-extra/clang-tidy/add_new_check.py @@ -85,7 +85,7 @@ /// FIXME: Write a short description. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/%(check_name_dashes)s.html +/// https://clang.llvm.org/extra/clang-tidy/checks/%(check_name_dashes)s.html class %(check_name)s : public ClangTidyCheck { public: %(check_name)s(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h b/clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h --- a/clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h +++ b/clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h @@ -20,7 +20,7 @@ /// degradation. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera-id-dependent-backward-branch.html +/// https://clang.llvm.org/extra/clang-tidy/checks/altera-id-dependent-backward-branch.html class IdDependentBackwardBranchCheck : public ClangTidyCheck { private: enum LoopType { UnknownLoop = -1, DoLoop = 0, WhileLoop = 1, ForLoop = 2 }; diff --git a/clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h b/clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h --- a/clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h +++ b/clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h @@ -19,7 +19,7 @@ /// `Verilog.cl`, or `VHDL.cl`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera-kernel-name-restriction.html +/// https://clang.llvm.org/extra/clang-tidy/checks/altera-kernel-name-restriction.html class KernelNameRestrictionCheck : public ClangTidyCheck { public: KernelNameRestrictionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h b/clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h --- a/clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h +++ b/clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h @@ -20,7 +20,7 @@ /// kernels, which may be inefficient or cause an error. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/opencl-single-work-item-barrier.html +/// https://clang.llvm.org/extra/clang-tidy/checks/opencl-single-work-item-barrier.html class SingleWorkItemBarrierCheck : public ClangTidyCheck { const unsigned AOCVersion; diff --git a/clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h b/clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h --- a/clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h +++ b/clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h @@ -19,7 +19,7 @@ /// packing and/or aligning of said structs as needed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera-struct-pack-align.html +/// https://clang.llvm.org/extra/clang-tidy/checks/altera-struct-pack-align.html class StructPackAlignCheck : public ClangTidyCheck { public: StructPackAlignCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h b/clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h --- a/clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h +++ b/clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h @@ -23,7 +23,7 @@ /// they cannot be fully unrolled, and should be partially unrolled. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera-unroll-loops.html +/// https://clang.llvm.org/extra/clang-tidy/checks/altera-unroll-loops.html class UnrollLoopsCheck : public ClangTidyCheck { public: UnrollLoopsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h b/clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h --- a/clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h +++ b/clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h @@ -18,7 +18,7 @@ /// Finds code that uses accept4() without using the SOCK_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-accept4.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-accept4.html class CloexecAccept4Check : public CloexecCheck { public: CloexecAccept4Check(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h b/clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h --- a/clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h @@ -18,7 +18,7 @@ /// accept() is better to be replaced by accept4(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-accept.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-accept.html class CloexecAcceptCheck : public CloexecCheck { public: CloexecAcceptCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h b/clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h --- a/clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h @@ -18,7 +18,7 @@ /// creat() is better to be replaced by open(). /// Find the usage of creat() and redirect user to use open(). -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-creat.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-creat.html class CloexecCreatCheck : public CloexecCheck { public: CloexecCreatCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h b/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h --- a/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h @@ -19,7 +19,7 @@ /// Find the usage of dup() and redirect user to use fcntl(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-dup.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-dup.html class CloexecDupCheck : public CloexecCheck { public: CloexecDupCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h b/clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h --- a/clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h +++ b/clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h @@ -18,7 +18,7 @@ /// Finds code that uses epoll_create1() without using the EPOLL_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-epoll-create1.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-epoll-create1.html class CloexecEpollCreate1Check : public CloexecCheck { public: CloexecEpollCreate1Check(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h b/clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h --- a/clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h @@ -18,7 +18,7 @@ /// epoll_create() is better to be replaced by epoll_create1(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-epoll-create.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-epoll-create.html class CloexecEpollCreateCheck : public CloexecCheck { public: CloexecEpollCreateCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h b/clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h --- a/clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h @@ -21,7 +21,7 @@ /// This check only works when corresponding argument is StringLiteral. No /// constant propagation. /// -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-fopen.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-fopen.html class CloexecFopenCheck : public CloexecCheck { public: CloexecFopenCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h b/clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h --- a/clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h +++ b/clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h @@ -18,7 +18,7 @@ /// Finds code that uses inotify_init1() without using the IN_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-inotify-init1.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-inotify-init1.html class CloexecInotifyInit1Check : public CloexecCheck { public: CloexecInotifyInit1Check(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h b/clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h --- a/clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h @@ -18,7 +18,7 @@ /// inotify_init() is better to be replaced by inotify_init1(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-inotify-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-inotify-init.html class CloexecInotifyInitCheck : public CloexecCheck { public: CloexecInotifyInitCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h b/clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h --- a/clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h @@ -18,7 +18,7 @@ /// Finds code that uses memfd_create() without using the MFD_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-memfd-create.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-memfd-create.html class CloexecMemfdCreateCheck : public CloexecCheck { public: CloexecMemfdCreateCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h b/clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h --- a/clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h +++ b/clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h @@ -18,7 +18,7 @@ /// Finds code that uses pipe2() without using the O_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-pipe2.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-pipe2.html class CloexecPipe2Check : public CloexecCheck { public: CloexecPipe2Check(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h b/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h --- a/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h @@ -18,7 +18,7 @@ /// Suggests to replace calls to pipe() with calls to pipe2(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-pipe.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-pipe.html class CloexecPipeCheck : public CloexecCheck { public: CloexecPipeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h b/clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h --- a/clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h @@ -18,7 +18,7 @@ /// Finds code that uses socket() without using the SOCK_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-socket.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-socket.html class CloexecSocketCheck : public CloexecCheck { public: CloexecSocketCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/boost/UseToStringCheck.h b/clang-tools-extra/clang-tidy/boost/UseToStringCheck.h --- a/clang-tools-extra/clang-tidy/boost/UseToStringCheck.h +++ b/clang-tools-extra/clang-tidy/boost/UseToStringCheck.h @@ -20,7 +20,7 @@ /// ``std::to_string`` and ``std::to_wstring`` calls. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/boost-use-to-string.html +/// https://clang.llvm.org/extra/clang-tidy/checks/boost-use-to-string.html class UseToStringCheck : public ClangTidyCheck { public: UseToStringCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h b/clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h @@ -18,7 +18,7 @@ /// Finds ``pthread_kill`` function calls when thread is terminated by /// ``SIGTERM`` signal. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-bad-signal-to-kill-thread.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-bad-signal-to-kill-thread.html class BadSignalToKillThreadCheck : public ClangTidyCheck { public: BadSignalToKillThreadCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h b/clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h @@ -22,7 +22,7 @@ /// the true and false expressions are Type I clones of each other. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-branch-clone.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-branch-clone.html class BranchCloneCheck : public ClangTidyCheck { public: BranchCloneCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h b/clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h @@ -19,7 +19,7 @@ /// the base class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-copy-constructor-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc-copy-constructor-init.html class CopyConstructorInitCheck : public ClangTidyCheck { public: CopyConstructorInitCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h b/clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h @@ -19,7 +19,7 @@ /// std::experimental::string_view. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-dangling-handle.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-dangling-handle.html class DanglingHandleCheck : public ClangTidyCheck { public: DanglingHandleCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h b/clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h @@ -20,7 +20,7 @@ /// swapped (or badly ordered) arguments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-easily-swappable-parameters.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-easily-swappable-parameters.html class EasilySwappableParametersCheck : public ClangTidyCheck { public: EasilySwappableParametersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h b/clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h @@ -23,7 +23,7 @@ /// given as option to the checker. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-exception-escape.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-exception-escape.html class ExceptionEscapeCheck : public ClangTidyCheck { public: ExceptionEscapeCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h b/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h @@ -23,7 +23,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-fold-init-type.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-fold-init-type.html class FoldInitTypeCheck : public ClangTidyCheck { public: FoldInitTypeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h b/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h @@ -36,7 +36,7 @@ /// point. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-forward-declaration-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-forward-declaration-namespace.html class ForwardDeclarationNamespaceCheck : public ClangTidyCheck { public: ForwardDeclarationNamespaceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h b/clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h @@ -25,7 +25,7 @@ /// C++ Design, item 26. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-forwarding-reference-overload.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-forwarding-reference-overload.html class ForwardingReferenceOverloadCheck : public ClangTidyCheck { public: ForwardingReferenceOverloadCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h b/clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h @@ -19,7 +19,7 @@ /// Diagnoses instances of an implicit widening of multiplication result. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-implicit-widening-of-multiplication-result.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-implicit-widening-of-multiplication-result.html class ImplicitWideningOfMultiplicationResultCheck : public ClangTidyCheck { const ast_matchers::MatchFinder::MatchResult *Result; bool ShouldUseCXXStaticCast; diff --git a/clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h b/clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h @@ -19,7 +19,7 @@ /// not changed at all). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-infinite-loop.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-infinite-loop.html class InfiniteLoopCheck : public ClangTidyCheck { public: InfiniteLoopCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h b/clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h @@ -19,7 +19,7 @@ /// cause unintended loss of precision. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-integer-division.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-integer-division.html class IntegerDivisionCheck : public ClangTidyCheck { public: IntegerDivisionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h b/clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h @@ -20,7 +20,7 @@ /// (i.e., `operator()`). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-lambda-function-name.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-lambda-function-name.html class LambdaFunctionNameCheck : public ClangTidyCheck { public: struct SourceRangeLessThan { diff --git a/clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h b/clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h @@ -20,7 +20,7 @@ /// argument to a memory allocation function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.html class MisplacedOperatorInStrlenInAllocCheck : public ClangTidyCheck { public: MisplacedOperatorInStrlenInAllocCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h b/clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h @@ -19,7 +19,7 @@ /// memory allocation function instead of its argument. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-misplaced-operator-in-alloc.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-misplaced-operator-in-alloc.html class MisplacedPointerArithmeticInAllocCheck : public ClangTidyCheck { public: MisplacedPointerArithmeticInAllocCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h b/clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h @@ -26,7 +26,7 @@ // be the most common case. Enabled by default. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-misplaced-widening-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-misplaced-widening-cast.html class MisplacedWideningCastCheck : public ClangTidyCheck { public: MisplacedWideningCastCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h b/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h @@ -32,7 +32,7 @@ /// The check suggests replacing the std::move with a std::forward. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-move-forwarding-reference.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-move-forwarding-reference.html class MoveForwardingReferenceCheck : public ClangTidyCheck { public: MoveForwardingReferenceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h b/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h @@ -20,7 +20,7 @@ /// other ones will be executed unconditionally. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-multiple-statement-macro.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-multiple-statement-macro.html class MultipleStatementMacroCheck : public ClangTidyCheck { public: MultipleStatementMacroCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h b/clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h @@ -20,7 +20,7 @@ /// attribute, then we warn the user of their error. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-no-escape.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-no-escape.html class NoEscapeCheck : public ClangTidyCheck { public: NoEscapeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h b/clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h @@ -22,7 +22,7 @@ /// when the string is read. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-not-null-terminated-result.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-not-null-terminated-result.html class NotNullTerminatedResultCheck : public ClangTidyCheck { public: NotNullTerminatedResultCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h b/clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h @@ -18,7 +18,7 @@ /// Finds calls to grand..-parent virtual methods instead of parent's. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-parent-virtual-call.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-parent-virtual-call.html class ParentVirtualCallCheck : public ClangTidyCheck { public: ParentVirtualCallCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h b/clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h @@ -19,7 +19,7 @@ /// in the outer `if` statement and were not changed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-redundant-branch-condition.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-redundant-branch-condition.html class RedundantBranchConditionCheck : public ClangTidyCheck { public: RedundantBranchConditionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h b/clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h @@ -29,7 +29,7 @@ /// double underscore occurring anywhere. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-reserved-identifier.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-reserved-identifier.html class ReservedIdentifierCheck final : public RenamerClangTidyCheck { const bool Invert; const std::vector AllowedIdentifiers; diff --git a/clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h b/clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h @@ -21,7 +21,7 @@ /// Checker for signal handler functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-signal-handler-check.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-signal-handler-check.html class SignalHandlerCheck : public ClangTidyCheck { public: enum class AsyncSafeFunctionSetKind { Minimal, POSIX }; diff --git a/clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h b/clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h @@ -22,7 +22,7 @@ /// implicit conversion happens. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-signed-char-misuse.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-signed-char-misuse.html class SignedCharMisuseCheck : public ClangTidyCheck { public: SignedCharMisuseCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h b/clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h @@ -19,7 +19,7 @@ /// user wanted to use `.size()` instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-sizeof-container.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-sizeof-container.html class SizeofContainerCheck : public ClangTidyCheck { public: SizeofContainerCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h b/clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h @@ -18,7 +18,7 @@ /// Find suspicious usages of sizeof expression. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-sizeof-expression.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-sizeof-expression.html class SizeofExpressionCheck : public ClangTidyCheck { public: SizeofExpressionCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h b/clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h @@ -21,7 +21,7 @@ /// condition parameter. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-spuriously-wake-up-functions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-spuriously-wake-up-functions.html class SpuriouslyWakeUpFunctionsCheck : public ClangTidyCheck { public: SpuriouslyWakeUpFunctionsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h b/clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h @@ -18,7 +18,7 @@ /// Finds suspicious string constructor and check their parameters. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-string-constructor.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-string-constructor.html class StringConstructorCheck : public ClangTidyCheck { public: StringConstructorCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h b/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h @@ -18,7 +18,7 @@ /// Finds instances where an integer is assigned to a string. /// /// For more details see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-string-assignment.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc-string-assignment.html class StringIntegerAssignmentCheck : public ClangTidyCheck { public: StringIntegerAssignmentCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h b/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h @@ -18,7 +18,7 @@ /// Find suspicious string literals with embedded NUL characters. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.html class StringLiteralWithEmbeddedNulCheck : public ClangTidyCheck { public: StringLiteralWithEmbeddedNulCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h b/clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h @@ -32,7 +32,7 @@ /// to `nullptr`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-stringview-nullptr.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-stringview-nullptr.html class StringviewNullptrCheck : public utils::TransformerClangTidyCheck { public: StringviewNullptrCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h @@ -18,7 +18,7 @@ /// The checker detects various cases when an enum is probably misused (as a /// bitmask). /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-enum-usage.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-enum-usage.html class SuspiciousEnumUsageCheck : public ClangTidyCheck { public: SuspiciousEnumUsageCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h @@ -34,7 +34,7 @@ /// filename extensions of implementation files. "c;cc;cpp;cxx" by default. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-include.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-include.html class SuspiciousIncludeCheck : public ClangTidyCheck { public: SuspiciousIncludeCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h @@ -19,7 +19,7 @@ /// arguments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-memory-comparison.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-memory-comparison.html class SuspiciousMemoryComparisonCheck : public ClangTidyCheck { public: SuspiciousMemoryComparisonCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h @@ -18,7 +18,7 @@ /// Finds memset calls with potential mistakes in their arguments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-memset-usage.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-memset-usage.html class SuspiciousMemsetUsageCheck : public ClangTidyCheck { public: SuspiciousMemsetUsageCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h @@ -19,7 +19,7 @@ /// accidentally. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-missing-comma.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-missing-comma.html class SuspiciousMissingCommaCheck : public ClangTidyCheck { public: SuspiciousMissingCommaCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h @@ -19,7 +19,7 @@ /// unintendedly. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-semicolon.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-semicolon.html class SuspiciousSemicolonCheck : public ClangTidyCheck { public: SuspiciousSemicolonCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h @@ -18,7 +18,7 @@ /// Find suspicious calls to string compare functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-string-compare.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-string-compare.html class SuspiciousStringCompareCheck : public ClangTidyCheck { public: SuspiciousStringCompareCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h b/clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h @@ -19,7 +19,7 @@ /// a condition which always evaluates to false). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-terminating-continue.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-terminating-continue.html class TerminatingContinueCheck : public ClangTidyCheck { public: TerminatingContinueCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h b/clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h @@ -19,7 +19,7 @@ /// class that has 'EXCEPTION', 'Exception' or 'exception' in its name. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-throw-keyword-missing.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-throw-keyword-missing.html class ThrowKeywordMissingCheck : public ClangTidyCheck { public: ThrowKeywordMissingCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h b/clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h @@ -26,7 +26,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-too-small-loop-variable.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-too-small-loop-variable.html class TooSmallLoopVariableCheck : public ClangTidyCheck { public: TooSmallLoopVariableCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h b/clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h @@ -20,7 +20,7 @@ /// or `base::Optional` object without assuring that it contains a value. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-unchecked-optional-access.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-unchecked-optional-access.html class UncheckedOptionalAccessCheck : public ClangTidyCheck { public: UncheckedOptionalAccessCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h b/clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h @@ -20,7 +20,7 @@ /// behavior. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-undefined-memory-manipulation.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-undefined-memory-manipulation.html class UndefinedMemoryManipulationCheck : public ClangTidyCheck { public: UndefinedMemoryManipulationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h @@ -19,7 +19,7 @@ /// failure. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-unhandled-exception-at-new.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-unhandled-exception-at-new.html class UnhandledExceptionAtNewCheck : public ClangTidyCheck { public: UnhandledExceptionAtNewCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h @@ -20,7 +20,7 @@ /// using the copy-and-swap or the copy-and-move method. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-unhandled-self-assignment.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-unhandled-self-assignment.html class UnhandledSelfAssignmentCheck : public ClangTidyCheck { public: UnhandledSelfAssignmentCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h @@ -18,7 +18,7 @@ /// Finds temporaries that look like RAII objects. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-unused-raii.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-unused-raii.html class UnusedRaiiCheck : public ClangTidyCheck { public: UnusedRaiiCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h @@ -19,7 +19,7 @@ /// Detects function calls where the return value is unused. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-unused-return-value.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-unused-return-value.html class UnusedReturnValueCheck : public ClangTidyCheck { public: UnusedReturnValueCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h b/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h @@ -19,7 +19,7 @@ /// intervening reinitialization. /// /// For details, see the user-facing documentation: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-use-after-move.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-use-after-move.html class UseAfterMoveCheck : public ClangTidyCheck { public: UseAfterMoveCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h b/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h --- a/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h @@ -22,7 +22,7 @@ /// very similar name and an identical signature defined in a base class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-virtual-near-miss.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone-virtual-near-miss.html class VirtualNearMissCheck : public ClangTidyCheck { public: VirtualNearMissCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h b/clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h --- a/clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h +++ b/clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h @@ -21,7 +21,7 @@ /// actually launched. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-env33-c.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-env33-c.html class CommandProcessorCheck : public ClangTidyCheck { public: CommandProcessorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h b/clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h --- a/clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h +++ b/clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h @@ -19,7 +19,7 @@ /// the default operator new. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-mem57-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-mem57-cpp.html class DefaultOperatorNewAlignmentCheck : public ClangTidyCheck { public: DefaultOperatorNewAlignmentCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h b/clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h --- a/clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h +++ b/clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h @@ -20,7 +20,7 @@ /// https://www.securecoding.cert.org/confluence/display/c/FLP30-C.+Do+not+use+floating-point+variables+as+loop+counters /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-flp30-c.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-flp30-c.html class FloatLoopCounter : public ClangTidyCheck { public: FloatLoopCounter(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h b/clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h --- a/clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h +++ b/clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h @@ -21,7 +21,7 @@ /// This check warns for the usage of std::rand() function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-msc50-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-msc50-cpp.html class LimitedRandomnessCheck : public ClangTidyCheck { public: LimitedRandomnessCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h b/clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h --- a/clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h +++ b/clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h @@ -19,7 +19,7 @@ /// in copy constructors and copy assignment operators. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-oop58-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-oop58-cpp.html class MutatingCopyCheck : public ClangTidyCheck { public: MutatingCopyCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h b/clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h --- a/clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h +++ b/clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h @@ -19,7 +19,7 @@ /// 'memcmp' and similar derivatives on non-trivial types. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-oop57-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-oop57-cpp.html class NonTrivialTypesLibcMemoryCallsCheck : public ClangTidyCheck { public: NonTrivialTypesLibcMemoryCallsCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h b/clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h --- a/clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h +++ b/clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h @@ -22,7 +22,7 @@ /// constant expression is a security vulnerability. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-properly-seeded-random-generator.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-properly-seeded-random-generator.html class ProperlySeededRandomGeneratorCheck : public ClangTidyCheck { public: ProperlySeededRandomGeneratorCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cert/SetLongJmpCheck.h b/clang-tools-extra/clang-tidy/cert/SetLongJmpCheck.h --- a/clang-tools-extra/clang-tidy/cert/SetLongJmpCheck.h +++ b/clang-tools-extra/clang-tidy/cert/SetLongJmpCheck.h @@ -18,7 +18,7 @@ /// Guards against use of setjmp/longjmp in C++ code /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-err52-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-err52-cpp.html class SetLongJmpCheck : public ClangTidyCheck { public: SetLongJmpCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/StaticObjectExceptionCheck.h b/clang-tools-extra/clang-tidy/cert/StaticObjectExceptionCheck.h --- a/clang-tools-extra/clang-tidy/cert/StaticObjectExceptionCheck.h +++ b/clang-tools-extra/clang-tidy/cert/StaticObjectExceptionCheck.h @@ -19,7 +19,7 @@ /// throw. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-err58-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-err58-cpp.html class StaticObjectExceptionCheck : public ClangTidyCheck { public: StaticObjectExceptionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/StrToNumCheck.h b/clang-tools-extra/clang-tidy/cert/StrToNumCheck.h --- a/clang-tools-extra/clang-tidy/cert/StrToNumCheck.h +++ b/clang-tools-extra/clang-tidy/cert/StrToNumCheck.h @@ -19,7 +19,7 @@ /// reasonable error handling for conversion errors. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-err34-c.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-err34-c.html class StrToNumCheck : public ClangTidyCheck { public: StrToNumCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h b/clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h --- a/clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h +++ b/clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h @@ -18,7 +18,7 @@ /// Checks whether a thrown object is nothrow copy constructible. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-err60-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-err60-cpp.html class ThrownExceptionTypeCheck : public ClangTidyCheck { public: ThrownExceptionTypeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/VariadicFunctionDefCheck.h b/clang-tools-extra/clang-tidy/cert/VariadicFunctionDefCheck.h --- a/clang-tools-extra/clang-tidy/cert/VariadicFunctionDefCheck.h +++ b/clang-tools-extra/clang-tidy/cert/VariadicFunctionDefCheck.h @@ -18,7 +18,7 @@ /// Guards against any C-style variadic function definitions (not declarations). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-dcl50-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert-dcl50-cpp.html class VariadicFunctionDefCheck : public ClangTidyCheck { public: VariadicFunctionDefCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/concurrency/MtUnsafeCheck.h b/clang-tools-extra/clang-tidy/concurrency/MtUnsafeCheck.h --- a/clang-tools-extra/clang-tidy/concurrency/MtUnsafeCheck.h +++ b/clang-tools-extra/clang-tidy/concurrency/MtUnsafeCheck.h @@ -18,7 +18,7 @@ /// Checks that non-thread-safe functions are not used. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/threads-mt-unsafe.html +/// https://clang.llvm.org/extra/clang-tidy/checks/threads-mt-unsafe.html class MtUnsafeCheck : public ClangTidyCheck { public: MtUnsafeCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h b/clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h --- a/clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h +++ b/clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h @@ -18,7 +18,7 @@ /// Finds ``pthread_setcanceltype`` function calls where a thread's /// cancellation type is set to asynchronous. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/concurrency-thread-canceltype-asynchronous.html +/// https://clang.llvm.org/extra/clang-tidy/checks/concurrency-thread-canceltype-asynchronous.html class ThreadCanceltypeAsynchronousCheck : public ClangTidyCheck { public: ThreadCanceltypeAsynchronousCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h @@ -19,7 +19,7 @@ /// with looping constructs. Only forward jumps in nested loops are accepted. // /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-avoid-goto.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-avoid-goto.html class AvoidGotoCheck : public ClangTidyCheck { public: AvoidGotoCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h @@ -19,7 +19,7 @@ /// subject to unpredictable changes. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-avoid-non-const-global-variables.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-avoid-non-const-global-variables.html class AvoidNonConstGlobalVariablesCheck : public ClangTidyCheck { public: AvoidNonConstGlobalVariablesCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h @@ -20,7 +20,7 @@ /// Find uninitialized local variables. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-init-variables.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-init-variables.html class InitVariablesCheck : public ClangTidyCheck { public: InitVariablesCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h @@ -18,7 +18,7 @@ /// Flags possible initialization order issues of static variables. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-interfaces-global-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-interfaces-global-init.html class InterfacesGlobalInitCheck : public ClangTidyCheck { public: InterfacesGlobalInitCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h @@ -22,7 +22,7 @@ /// constructs exist for the task. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-macro-usage.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-macro-usage.html class MacroUsageCheck : public ClangTidyCheck { public: MacroUsageCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/NarrowingConversionsCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/NarrowingConversionsCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/NarrowingConversionsCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/NarrowingConversionsCheck.h @@ -20,7 +20,7 @@ /// i += 0.1; /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-narrowing-conversions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-narrowing-conversions.html class NarrowingConversionsCheck : public ClangTidyCheck { public: NarrowingConversionsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h @@ -21,7 +21,7 @@ /// Static Analyzer - unix.Malloc. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-no-malloc.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-no-malloc.html class NoMallocCheck : public ClangTidyCheck { public: /// Construct Checker and read in configuration for function names. diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h @@ -19,7 +19,7 @@ /// nature of it whenever possible. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-owning-memory.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-owning-memory.html class OwningMemoryCheck : public ClangTidyCheck { public: OwningMemoryCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h @@ -19,7 +19,7 @@ /// into the initialization list instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-prefer-member-initializer.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-prefer-member-initializer.html class PreferMemberInitializerCheck : public ClangTidyCheck { public: PreferMemberInitializerCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h @@ -18,7 +18,7 @@ /// This check flags all array to pointer decays /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-bounds-array-to-pointer-decay.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-bounds-array-to-pointer-decay.html class ProBoundsArrayToPointerDecayCheck : public ClangTidyCheck { public: ProBoundsArrayToPointerDecayCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h @@ -20,7 +20,7 @@ /// have a constant index and are within bounds /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-bounds-constant-array-index.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-bounds-constant-array-index.html class ProBoundsConstantArrayIndexCheck : public ClangTidyCheck { const StringRef GslHeader; utils::IncludeInserter Inserter; diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h @@ -20,7 +20,7 @@ /// arrays) is flagged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-bounds-pointer-arithmetic.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-bounds-pointer-arithmetic.html class ProBoundsPointerArithmeticCheck : public ClangTidyCheck { public: ProBoundsPointerArithmeticCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h @@ -18,7 +18,7 @@ /// This check flags all instances of const_cast /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-const-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-const-cast.html class ProTypeConstCastCheck : public ClangTidyCheck { public: ProTypeConstCastCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h @@ -19,7 +19,7 @@ /// downcast, const_cast, or reinterpret_cast. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-cstyle-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-cstyle-cast.html class ProTypeCstyleCastCheck : public ClangTidyCheck { public: ProTypeCstyleCastCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h @@ -27,7 +27,7 @@ /// will result in false positives. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-member-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-member-init.html /// TODO: See if 'fixes' for false positives are optimized away by the compiler. /// TODO: For classes with multiple constructors, make sure that we don't offer /// multiple in-class initializer fixits for the same member. diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h @@ -18,7 +18,7 @@ /// Flags all occurrences of reinterpret_cast /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-reinterpret-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-reinterpret-cast.html class ProTypeReinterpretCastCheck : public ClangTidyCheck { public: ProTypeReinterpretCastCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h @@ -19,7 +19,7 @@ /// derived class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-static-cast-downcast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-static-cast-downcast.html class ProTypeStaticCastDowncastCheck : public ClangTidyCheck { public: ProTypeStaticCastDowncastCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h @@ -19,7 +19,7 @@ /// Access to a union as a whole (e.g. passing to a function) is not flagged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-union-access.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-union-access.html class ProTypeUnionAccessCheck : public ClangTidyCheck { public: ProTypeUnionAccessCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h @@ -19,7 +19,7 @@ /// of va_arg. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-vararg.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-vararg.html class ProTypeVarargCheck : public ClangTidyCheck { public: ProTypeVarargCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h @@ -23,7 +23,7 @@ /// for the latter /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-slicing.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-slicing.html class SlicingCheck : public ClangTidyCheck { public: SlicingCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h @@ -21,7 +21,7 @@ /// are defined. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-special-member-functions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-special-member-functions.html class SpecialMemberFunctionsCheck : public ClangTidyCheck { public: SpecialMemberFunctionsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h @@ -20,7 +20,7 @@ /// nor protected and non-virtual. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.html class VirtualClassDestructorCheck : public ClangTidyCheck { public: VirtualClassDestructorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h b/clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h --- a/clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h +++ b/clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h @@ -19,7 +19,7 @@ /// problems. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/darwin-avoid-spinlock.html +/// https://clang.llvm.org/extra/clang-tidy/checks/darwin-avoid-spinlock.html class AvoidSpinlockCheck : public ClangTidyCheck { public: AvoidSpinlockCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h b/clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h --- a/clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h +++ b/clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h @@ -19,7 +19,7 @@ /// storage duration, as required by the libdispatch documentation. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/darwin-dispatch-once-nonstatic.html +/// https://clang.llvm.org/extra/clang-tidy/checks/darwin-dispatch-once-nonstatic.html class DispatchOnceNonstaticCheck : public ClangTidyCheck { public: DispatchOnceNonstaticCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h b/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h --- a/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h @@ -18,7 +18,7 @@ /// Default arguments are not allowed in called functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-default-arguments-calls.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia-default-arguments-calls.html class DefaultArgumentsCallsCheck : public ClangTidyCheck { public: DefaultArgumentsCallsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h b/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h --- a/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h @@ -18,7 +18,7 @@ /// Default parameters are not allowed in declared functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-default-parameters.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia-default-parameters.html class DefaultArgumentsDeclarationsCheck : public ClangTidyCheck { public: DefaultArgumentsDeclarationsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h b/clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h --- a/clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h @@ -18,7 +18,7 @@ /// Multiple implementation inheritance is discouraged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-multiple-inheritance.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia-multiple-inheritance.html class MultipleInheritanceCheck : public ClangTidyCheck { public: MultipleInheritanceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h b/clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h --- a/clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h @@ -18,7 +18,7 @@ /// Overloading operators is disallowed by the Fuchsia coding standard. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-overloaded-operator.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia-overloaded-operator.html class OverloadedOperatorCheck : public ClangTidyCheck { public: OverloadedOperatorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h b/clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h --- a/clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h @@ -20,7 +20,7 @@ /// constructor or has no explicit constructor. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-statically-constructed-objects.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia-statically-constructed-objects.html class StaticallyConstructedObjectsCheck : public ClangTidyCheck { public: StaticallyConstructedObjectsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h b/clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h --- a/clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h @@ -20,7 +20,7 @@ /// return types. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-trailing-return.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia-trailing-return.html class TrailingReturnCheck : public ClangTidyCheck { public: TrailingReturnCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h b/clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h --- a/clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h @@ -18,7 +18,7 @@ /// Defining classes with virtual inheritance is disallowed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-virtual-inheritance.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia-virtual-inheritance.html class VirtualInheritanceCheck : public ClangTidyCheck { public: VirtualInheritanceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h b/clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h --- a/clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h +++ b/clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h @@ -27,7 +27,7 @@ /// ones generated by `-Wold-style-cast`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-readability-casting.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-readability-casting.html class AvoidCStyleCastsCheck : public ClangTidyCheck { public: AvoidCStyleCastsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h b/clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h --- a/clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h +++ b/clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h @@ -21,7 +21,7 @@ /// style guide. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-avoid-nsobject-new.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-avoid-nsobject-new.html class AvoidNSObjectNewCheck : public ClangTidyCheck { public: AvoidNSObjectNewCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h b/clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h --- a/clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h +++ b/clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h @@ -21,7 +21,7 @@ /// the Google Objective-C Style Guide. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-objc-avoid-throwing-exception.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-objc-avoid-throwing-exception.html class AvoidThrowingObjCExceptionCheck : public ClangTidyCheck { public: AvoidThrowingObjCExceptionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h b/clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h --- a/clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h +++ b/clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h @@ -20,7 +20,7 @@ // https://github.com/google/googletest/blob/master/docs/faq.md#why-should-test-suite-names-and-test-names-not-contain-underscore /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-readability-avoid-underscore-in-googletest-name.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-readability-avoid-underscore-in-googletest-name.html class AvoidUnderscoreInGoogletestNameCheck : public ClangTidyCheck { public: using ClangTidyCheck::ClangTidyCheck; diff --git a/clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h b/clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h --- a/clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h +++ b/clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h @@ -20,7 +20,7 @@ /// See https://google.github.io/styleguide/cppguide.html#Default_Arguments /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-default-arguments.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-default-arguments.html class DefaultArgumentsCheck : public ClangTidyCheck { public: DefaultArgumentsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h b/clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h --- a/clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h +++ b/clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h @@ -20,7 +20,7 @@ /// See https://google.github.io/styleguide/cppguide.html#Explicit_Constructors /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-explicit-constructor.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-explicit-constructor.html class ExplicitConstructorCheck : public ClangTidyCheck { public: ExplicitConstructorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h b/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h --- a/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h +++ b/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h @@ -24,7 +24,7 @@ /// Corresponding cpplint.py check name: 'build/explicit_make_pair'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-build-explicit-make-pair.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-build-explicit-make-pair.html class ExplicitMakePairCheck : public ClangTidyCheck { public: ExplicitMakePairCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h b/clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h --- a/clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h +++ b/clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h @@ -25,7 +25,7 @@ /// method or property declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-objc-function-naming.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-objc-function-naming.html class FunctionNamingCheck : public ClangTidyCheck { public: FunctionNamingCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h b/clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h --- a/clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h +++ b/clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h @@ -29,7 +29,7 @@ /// empty string between ";" if there are other filename extensions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-global-names-in-headers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-global-names-in-headers.html class GlobalNamesInHeadersCheck : public ClangTidyCheck { public: GlobalNamesInHeadersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h b/clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h --- a/clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h +++ b/clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h @@ -21,7 +21,7 @@ /// 'g[A-Z].*' (variables). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-objc-global-variable-declaration.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-objc-global-variable-declaration.html class GlobalVariableDeclarationCheck : public ClangTidyCheck { public: GlobalVariableDeclarationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h b/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h --- a/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h +++ b/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h @@ -27,7 +27,7 @@ /// Corresponding cpplint.py check: 'runtime/int'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-runtime-int.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-runtime-int.html class IntegerTypesCheck : public ClangTidyCheck { public: IntegerTypesCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.cpp b/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.cpp --- a/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.cpp +++ b/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.cpp @@ -55,7 +55,7 @@ void IntegerTypesCheck::registerMatchers(MatchFinder *Finder) { // Match any integer types, unless they are passed to a printf-based API: // - // http://google.github.io/styleguide/cppguide.html#64-bit_Portability + // https://google.github.io/styleguide/cppguide.html#64-bit_Portability // "Where possible, avoid passing arguments of types specified by // bitwidth typedefs to printf-based APIs." Finder->addMatcher(typeLoc(loc(isInteger()), diff --git a/clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h b/clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h --- a/clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h +++ b/clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h @@ -23,7 +23,7 @@ /// Corresponding cpplint.py check name: 'runtime/operator'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-runtime-operator.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-runtime-operator.html class OverloadedUnaryAndCheck : public ClangTidyCheck { public: OverloadedUnaryAndCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/TodoCommentCheck.h b/clang-tools-extra/clang-tidy/google/TodoCommentCheck.h --- a/clang-tools-extra/clang-tidy/google/TodoCommentCheck.h +++ b/clang-tools-extra/clang-tidy/google/TodoCommentCheck.h @@ -21,7 +21,7 @@ /// Corresponding cpplint.py check: 'readability/todo' /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-readability-todo.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-readability-todo.html class TodoCommentCheck : public ClangTidyCheck { public: TodoCommentCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h b/clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h --- a/clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h +++ b/clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h @@ -32,7 +32,7 @@ /// Corresponding cpplint.py check name: 'build/namespaces'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-build-namespaces.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google-build-namespaces.html class UnnamedNamespaceInHeaderCheck : public ClangTidyCheck { public: UnnamedNamespaceInHeaderCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/hicpp/ExceptionBaseclassCheck.h b/clang-tools-extra/clang-tidy/hicpp/ExceptionBaseclassCheck.h --- a/clang-tools-extra/clang-tidy/hicpp/ExceptionBaseclassCheck.h +++ b/clang-tools-extra/clang-tidy/hicpp/ExceptionBaseclassCheck.h @@ -18,7 +18,7 @@ /// Check for thrown exceptions and enforce they are all derived from std::exception. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/hicpp-exception-baseclass.html +/// https://clang.llvm.org/extra/clang-tidy/checks/hicpp-exception-baseclass.html class ExceptionBaseclassCheck : public ClangTidyCheck { public: ExceptionBaseclassCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.h b/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.h --- a/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.h +++ b/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.h @@ -20,7 +20,7 @@ /// without a final 'else'-branch. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/hicpp-multiway-paths-covered.html +/// https://clang.llvm.org/extra/clang-tidy/checks/hicpp-multiway-paths-covered.html class MultiwayPathsCoveredCheck : public ClangTidyCheck { public: MultiwayPathsCoveredCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/hicpp/NoAssemblerCheck.h b/clang-tools-extra/clang-tidy/hicpp/NoAssemblerCheck.h --- a/clang-tools-extra/clang-tidy/hicpp/NoAssemblerCheck.h +++ b/clang-tools-extra/clang-tidy/hicpp/NoAssemblerCheck.h @@ -18,7 +18,7 @@ /// Find assembler statements. No fix is offered. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/hicpp-no-assembler.html +/// https://clang.llvm.org/extra/clang-tidy/checks/hicpp-no-assembler.html class NoAssemblerCheck : public ClangTidyCheck { public: NoAssemblerCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/hicpp/SignedBitwiseCheck.h b/clang-tools-extra/clang-tidy/hicpp/SignedBitwiseCheck.h --- a/clang-tools-extra/clang-tidy/hicpp/SignedBitwiseCheck.h +++ b/clang-tools-extra/clang-tidy/hicpp/SignedBitwiseCheck.h @@ -19,7 +19,7 @@ /// bitwise operations on signed integer types. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/hicpp-signed-bitwise.html +/// https://clang.llvm.org/extra/clang-tidy/checks/hicpp-signed-bitwise.html class SignedBitwiseCheck : public ClangTidyCheck { public: SignedBitwiseCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h b/clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h --- a/clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h +++ b/clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h @@ -27,7 +27,7 @@ /// this warning enabled for clang. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/linuxkernel-must-use-errs.html +/// https://clang.llvm.org/extra/clang-tidy/checks/linuxkernel-must-use-errs.html class MustCheckErrsCheck : public ClangTidyCheck { public: MustCheckErrsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h b/clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h --- a/clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h +++ b/clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h @@ -17,7 +17,7 @@ /// Finds and fixes header guards that do not adhere to LLVM style. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm-header-guard.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvm-header-guard.html /// The check supports these options: /// - `HeaderFileExtensions`: a semicolon-separated list of filename /// extensions of header files (The filename extension should not contain diff --git a/clang-tools-extra/clang-tidy/llvm/IncludeOrderCheck.h b/clang-tools-extra/clang-tidy/llvm/IncludeOrderCheck.h --- a/clang-tools-extra/clang-tidy/llvm/IncludeOrderCheck.h +++ b/clang-tools-extra/clang-tidy/llvm/IncludeOrderCheck.h @@ -17,7 +17,7 @@ /// Checks the correct order of `#includes`. /// -/// See http://llvm.org/docs/CodingStandards.html#include-style +/// See https://llvm.org/docs/CodingStandards.html#include-style class IncludeOrderCheck : public ClangTidyCheck { public: IncludeOrderCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h b/clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h --- a/clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h +++ b/clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h @@ -47,7 +47,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm-prefer-isa-or-dyn-cast-in-conditionals.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvm-prefer-isa-or-dyn-cast-in-conditionals.html class PreferIsaOrDynCastInConditionalsCheck : public ClangTidyCheck { public: PreferIsaOrDynCastInConditionalsCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h b/clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h --- a/clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h +++ b/clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h @@ -20,7 +20,7 @@ /// the code more explicit. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm-prefer-register-over-unsigned.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvm-prefer-register-over-unsigned.html class PreferRegisterOverUnsignedCheck : public ClangTidyCheck { public: PreferRegisterOverUnsignedCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h b/clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h --- a/clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h @@ -18,7 +18,7 @@ /// Checks all calls resolve to functions within __llvm_libc namespace. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc-callee-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvmlibc-callee-namespace.html class CalleeNamespaceCheck : public ClangTidyCheck { public: CalleeNamespaceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h b/clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h --- a/clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h @@ -18,7 +18,7 @@ /// Checks all llvm-libc implementation is within the correct namespace. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc-implementation-in-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvmlibc-implementation-in-namespace.html class ImplementationInNamespaceCheck : public ClangTidyCheck { public: ImplementationInNamespaceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h b/clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h --- a/clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h +++ b/clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h @@ -20,7 +20,7 @@ /// compiler provided. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc-restrict-system-libc-headers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvmlibc-restrict-system-libc-headers.html class RestrictSystemLibcHeadersCheck : public portability::RestrictSystemIncludesCheck { public: diff --git a/clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h b/clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h --- a/clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h +++ b/clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h @@ -30,7 +30,7 @@ /// empty string between ";" if there are other filename extensions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-definitions-in-headers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc-definitions-in-headers.html class DefinitionsInHeadersCheck : public ClangTidyCheck { public: DefinitionsInHeadersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h b/clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h --- a/clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h +++ b/clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h @@ -19,7 +19,7 @@ /// pointer type rather than to the pointee. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-misplaced-const.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc-misplaced-const.html class MisplacedConstCheck : public ClangTidyCheck { public: MisplacedConstCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h b/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h --- a/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h +++ b/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h @@ -23,7 +23,7 @@ /// and displays one example of possible call graph loop (recursion). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-no-recursion.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc-no-recursion.html class NoRecursionCheck : public ClangTidyCheck { public: NoRecursionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h b/clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h --- a/clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h +++ b/clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h @@ -25,7 +25,7 @@ /// ignored and optionally all `public` member variables could be ignored. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-non-private-member-variables-in-classes.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc-non-private-member-variables-in-classes.html class NonPrivateMemberVariablesInClassesCheck : public ClangTidyCheck { public: NonPrivateMemberVariablesInClassesCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h b/clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h --- a/clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h +++ b/clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h @@ -19,7 +19,7 @@ /// ineffective, useless parts. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-redundant-expression.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc-redundant-expression.html class RedundantExpressionCheck : public ClangTidyCheck { public: RedundantExpressionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h b/clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h --- a/clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h +++ b/clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h @@ -25,7 +25,7 @@ /// * The operator must always return ``*this``. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-unconventional-assign-operator.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc-unconventional-assign-operator.html class UnconventionalAssignOperatorCheck : public ClangTidyCheck { public: UnconventionalAssignOperatorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h b/clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h --- a/clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h +++ b/clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h @@ -20,7 +20,7 @@ /// Finds unused using declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-unused-using-decls.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc-unused-using-decls.html class UnusedUsingDeclsCheck : public ClangTidyCheck { public: UnusedUsingDeclsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h b/clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h --- a/clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h @@ -20,7 +20,7 @@ /// FIXME: Add support for function references and member function references. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-avoid-std-bind.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-avoid-std-bind.html class AvoidBindCheck : public ClangTidyCheck { public: AvoidBindCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h b/clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h --- a/clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h @@ -18,7 +18,7 @@ /// Find C-style array types and recommend to use std::array<> / std::vector<>. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-avoid-c-arrays.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-avoid-c-arrays.html class AvoidCArraysCheck : public ClangTidyCheck { public: AvoidCArraysCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h b/clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h --- a/clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h @@ -31,7 +31,7 @@ /// Example: `` => `` /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-deprecated-headers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-deprecated-headers.html class DeprecatedHeadersCheck : public ClangTidyCheck { public: DeprecatedHeadersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h b/clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h --- a/clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h @@ -19,7 +19,7 @@ /// and replaces those that have a non-deprecated equivalent. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-deprecated-ios-base-aliases.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-deprecated-ios-base-aliases.html class DeprecatedIosBaseAliasesCheck : public ClangTidyCheck { public: DeprecatedIosBaseAliasesCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h b/clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h --- a/clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h @@ -20,7 +20,7 @@ /// Replaces groups of related macros with an unscoped anonymous enum. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-macro-to-enum.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-macro-to-enum.html class MacroToEnumCheck : public ClangTidyCheck { public: MacroToEnumCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h b/clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h --- a/clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h @@ -26,7 +26,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-make-shared.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-make-shared.html class MakeSharedCheck : public MakeSmartPtrCheck { public: MakeSharedCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h b/clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h --- a/clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h @@ -22,7 +22,7 @@ /// raw string literals. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-raw-string-literal.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-raw-string-literal.html class RawStringLiteralCheck : public ClangTidyCheck { public: RawStringLiteralCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h b/clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h --- a/clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h @@ -37,7 +37,7 @@ /// ~~~ /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-replace-disallow-copy-and-assign-macro.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-replace-disallow-copy-and-assign-macro.html class ReplaceDisallowCopyAndAssignMacroCheck : public ClangTidyCheck { public: ReplaceDisallowCopyAndAssignMacroCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h b/clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h --- a/clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h @@ -20,7 +20,7 @@ /// replace all occurrences of std::random_shuffle with std::shuffle. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-replace-random-shuffle.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-replace-random-shuffle.html class ReplaceRandomShuffleCheck : public ClangTidyCheck { public: ReplaceRandomShuffleCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h b/clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h --- a/clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h @@ -19,7 +19,7 @@ /// repeating the return type name. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-return-braced-init-list.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-return-braced-init-list.html class ReturnBracedInitListCheck : public ClangTidyCheck { public: ReturnBracedInitListCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h b/clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h @@ -19,7 +19,7 @@ /// with the unary version. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-unary-static-assert.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-unary-static-assert.html class UnaryStaticAssertCheck : public ClangTidyCheck { public: UnaryStaticAssertCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h b/clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h @@ -18,7 +18,7 @@ /// Finds integer literals which are cast to bool. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-bool-literals.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-use-bool-literals.html class UseBoolLiteralsCheck : public ClangTidyCheck { public: UseBoolLiteralsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h b/clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h @@ -20,7 +20,7 @@ /// member initializer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-default-member-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-use-default-member-init.html class UseDefaultMemberInitCheck : public ClangTidyCheck { public: UseDefaultMemberInitCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h b/clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h @@ -33,7 +33,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-equals-default.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-use-equals-default.html class UseEqualsDefaultCheck : public ClangTidyCheck { public: UseEqualsDefaultCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h b/clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h @@ -33,7 +33,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-equals-delete.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-use-equals-delete.html class UseEqualsDeleteCheck : public ClangTidyCheck { public: UseEqualsDeleteCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h b/clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h @@ -30,7 +30,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-nodiscard.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-use-nodiscard.html class UseNodiscardCheck : public ClangTidyCheck { public: UseNodiscardCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h b/clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h @@ -28,7 +28,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-noexcept.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-use-noexcept.html class UseNoexceptCheck : public ClangTidyCheck { public: UseNoexceptCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h b/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h @@ -25,7 +25,7 @@ /// Rewrites function signatures to use a trailing return type. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-trailing-type-return.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-use-trailing-type-return.html class UseTrailingReturnTypeCheck : public ClangTidyCheck { public: UseTrailingReturnTypeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h b/clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h @@ -18,7 +18,7 @@ /// Prefer using transparent functors to non-transparent ones. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-transparent-functors.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-use-transparent-functors.html class UseTransparentFunctorsCheck : public ClangTidyCheck { public: UseTransparentFunctorsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h b/clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h @@ -20,7 +20,7 @@ /// macro ID there will be only a warning without fixits. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-uncaught-exceptions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-use-uncaught-exceptions.html class UseUncaughtExceptionsCheck : public ClangTidyCheck { public: UseUncaughtExceptionsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h b/clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h --- a/clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h @@ -18,7 +18,7 @@ /// Check finds typedefs and replaces it with usings. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-using.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize-use-using.html class UseUsingCheck : public ClangTidyCheck { const bool IgnoreMacros; diff --git a/clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h b/clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h --- a/clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h +++ b/clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h @@ -24,7 +24,7 @@ /// emitted. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/mpi-buffer-deref.html +/// https://clang.llvm.org/extra/clang-tidy/checks/mpi-buffer-deref.html class BufferDerefCheck : public ClangTidyCheck { public: BufferDerefCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h b/clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h --- a/clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h +++ b/clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h @@ -23,7 +23,7 @@ /// null pointer constants are skipped, in the course of verification. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/mpi-type-mismatch.html +/// https://clang.llvm.org/extra/clang-tidy/checks/mpi-type-mismatch.html class TypeMismatchCheck : public ClangTidyCheck { public: TypeMismatchCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/AssertEquals.h b/clang-tools-extra/clang-tidy/objc/AssertEquals.h --- a/clang-tools-extra/clang-tidy/objc/AssertEquals.h +++ b/clang-tools-extra/clang-tidy/objc/AssertEquals.h @@ -20,7 +20,7 @@ /// operands of type NSString*. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-assert-equals.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc-assert-equals.html class AssertEquals final : public ClangTidyCheck { public: AssertEquals(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h b/clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h --- a/clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h +++ b/clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h @@ -19,7 +19,7 @@ /// NSError. errorWithDomain:code:userInfo: should be used instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-avoid-nserror-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc-avoid-nserror-init.html class AvoidNSErrorInitCheck : public ClangTidyCheck { public: AvoidNSErrorInitCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h b/clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h --- a/clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h +++ b/clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h @@ -20,7 +20,7 @@ /// potentially causing issues. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-dealloc-in-category.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc-dealloc-in-category.html class DeallocInCategoryCheck final : public ClangTidyCheck { public: DeallocInCategoryCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h b/clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h --- a/clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h +++ b/clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h @@ -21,7 +21,7 @@ /// documented to not support subclassing. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-forbidden-subclassing.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc-forbidden-subclassing.html class ForbiddenSubclassingCheck : public ClangTidyCheck { public: ForbiddenSubclassingCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/objc/MissingHashCheck.h b/clang-tools-extra/clang-tidy/objc/MissingHashCheck.h --- a/clang-tools-extra/clang-tidy/objc/MissingHashCheck.h +++ b/clang-tools-extra/clang-tidy/objc/MissingHashCheck.h @@ -19,7 +19,7 @@ /// appropriately implementing -hash. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-missing-hash.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc-missing-hash.html class MissingHashCheck : public ClangTidyCheck { public: MissingHashCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h b/clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h --- a/clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h +++ b/clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h @@ -20,7 +20,7 @@ /// argument object lifetimes. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-nsinvocation-argument-lifetime.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc-nsinvocation-argument-lifetime.html class NSInvocationArgumentLifetimeCheck : public ClangTidyCheck { public: NSInvocationArgumentLifetimeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h b/clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h --- a/clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h +++ b/clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h @@ -22,7 +22,7 @@ /// @property(nonatomic) NSString *lowerCamelCase; /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-property-declaration.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc-property-declaration.html class PropertyDeclarationCheck : public ClangTidyCheck { public: PropertyDeclarationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h b/clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h --- a/clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h +++ b/clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h @@ -19,7 +19,7 @@ /// of NSObject and recommends calling a superclass initializer instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-super-self.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc-super-self.html class SuperSelfCheck : public ClangTidyCheck { public: SuperSelfCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h b/clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h --- a/clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h +++ b/clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h @@ -20,7 +20,7 @@ /// out of the Structured Block it was thrown in. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/openmp-exception-escape.html +/// https://clang.llvm.org/extra/clang-tidy/checks/openmp-exception-escape.html class ExceptionEscapeCheck : public ClangTidyCheck { public: ExceptionEscapeCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h b/clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h --- a/clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h +++ b/clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h @@ -20,7 +20,7 @@ /// other than ``none``, and suggests to use the ``default(none)`` clause. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/openmp-use-default-none.html +/// https://clang.llvm.org/extra/clang-tidy/checks/openmp-use-default-none.html class UseDefaultNoneCheck : public ClangTidyCheck { public: UseDefaultNoneCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h b/clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h --- a/clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h +++ b/clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h @@ -23,7 +23,7 @@ /// The character literal overload is more efficient. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-faster-string-find.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance-faster-string-find.html class FasterStringFindCheck : public ClangTidyCheck { public: FasterStringFindCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h b/clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h --- a/clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h +++ b/clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h @@ -18,7 +18,7 @@ /// A check that detects copied loop variables and suggests using const /// references. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-for-range-copy.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance-for-range-copy.html class ForRangeCopyCheck : public ClangTidyCheck { public: ForRangeCopyCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h b/clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h --- a/clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h +++ b/clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h @@ -20,7 +20,7 @@ /// concatenating strings, using the operator+, instead of operator+=. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-inefficient-string-concatenation.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance-inefficient-string-concatenation.html class InefficientStringConcatenationCheck : public ClangTidyCheck { public: InefficientStringConcatenationCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h b/clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h --- a/clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h +++ b/clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h @@ -22,7 +22,7 @@ /// field without calling Reserve() first. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-inefficient-vector-operation.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance-inefficient-vector-operation.html class InefficientVectorOperationCheck : public ClangTidyCheck { public: InefficientVectorOperationCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h b/clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h --- a/clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h +++ b/clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h @@ -19,7 +19,7 @@ /// initializing a member or base class through a copy constructor instead of a /// move constructor. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-move-constructor-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance-move-constructor-init.html class MoveConstructorInitCheck : public ClangTidyCheck { public: MoveConstructorInitCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h b/clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h --- a/clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h +++ b/clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h @@ -17,7 +17,7 @@ /// Finds local variables that cannot be automatically moved due to constness. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-no-automatic-move.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance-no-automatic-move.html class NoAutomaticMoveCheck : public ClangTidyCheck { public: NoAutomaticMoveCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h b/clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h --- a/clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h +++ b/clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h @@ -18,7 +18,7 @@ /// Diagnoses every integer to pointer cast. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-no-int-to-ptr.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance-no-int-to-ptr.html class NoIntToPtrCheck : public ClangTidyCheck { public: NoIntToPtrCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h b/clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h --- a/clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h +++ b/clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h @@ -24,7 +24,7 @@ /// A::~A() = default; /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-trivially-destructible.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance-trivially-destructible.html class TriviallyDestructibleCheck : public ClangTidyCheck { public: TriviallyDestructibleCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h b/clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h --- a/clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h +++ b/clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h @@ -24,7 +24,7 @@ /// C). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-type-promotion-in-math-fn.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance-type-promotion-in-math-fn.html class TypePromotionInMathFnCheck : public ClangTidyCheck { public: TypePromotionInMathFnCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h b/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h --- a/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h +++ b/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h @@ -21,7 +21,7 @@ /// can safely be converted to const references. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-unnecessary-value-param.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance-unnecessary-value-param.html class UnnecessaryValueParamCheck : public ClangTidyCheck { public: UnnecessaryValueParamCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h b/clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h --- a/clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h +++ b/clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h @@ -21,7 +21,7 @@ /// includes are specified, the check will exit without issuing any warnings. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability-restrict-system-includes.html +/// https://clang.llvm.org/extra/clang-tidy/checks/portability-restrict-system-includes.html class RestrictSystemIncludesCheck : public ClangTidyCheck { public: RestrictSystemIncludesCheck(StringRef Name, ClangTidyContext *Context, diff --git a/clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h b/clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h --- a/clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h +++ b/clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h @@ -20,7 +20,7 @@ /// Find SIMD intrinsics calls and suggest std::experimental::simd alternatives. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability-simd-intrinsics.html +/// https://clang.llvm.org/extra/clang-tidy/checks/portability-simd-intrinsics.html class SIMDIntrinsicsCheck : public ClangTidyCheck { public: SIMDIntrinsicsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h b/clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h --- a/clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h +++ b/clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h @@ -20,7 +20,7 @@ /// ``std::allocator``. They do not compile with libstdc++ or MSVC. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability-std-allocator-const.html +/// https://clang.llvm.org/extra/clang-tidy/checks/portability-std-allocator-const.html class StdAllocatorConstCheck : public ClangTidyCheck { public: StdAllocatorConstCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h b/clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h --- a/clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h +++ b/clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h @@ -19,7 +19,7 @@ /// the `const` qualifier from that return type. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-const-return-type.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-const-return-type.html class ConstReturnTypeCheck : public ClangTidyCheck { public: using ClangTidyCheck::ClangTidyCheck; diff --git a/clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h b/clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h --- a/clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h +++ b/clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h @@ -19,7 +19,7 @@ /// replaced by a call to the `container.contains()` method introduced in C++20. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-container-contains.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-container-contains.html class ContainerContainsCheck : public ClangTidyCheck { public: ContainerContainsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/ConvertMemberFunctionsToStatic.h b/clang-tools-extra/clang-tidy/readability/ConvertMemberFunctionsToStatic.h --- a/clang-tools-extra/clang-tidy/readability/ConvertMemberFunctionsToStatic.h +++ b/clang-tools-extra/clang-tidy/readability/ConvertMemberFunctionsToStatic.h @@ -19,7 +19,7 @@ /// because they don't use the 'this' pointer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/ +/// https://clang.llvm.org/extra/clang-tidy/checks/ /// readability-convert-member-functions-to-static.html class ConvertMemberFunctionsToStatic : public ClangTidyCheck { public: diff --git a/clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h b/clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h --- a/clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h +++ b/clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h @@ -19,7 +19,7 @@ /// pointer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-delete-null-pointer.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-delete-null-pointer.html class DeleteNullPointerCheck : public ClangTidyCheck { public: DeleteNullPointerCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/ElseAfterReturnCheck.h b/clang-tools-extra/clang-tidy/readability/ElseAfterReturnCheck.h --- a/clang-tools-extra/clang-tidy/readability/ElseAfterReturnCheck.h +++ b/clang-tools-extra/clang-tidy/readability/ElseAfterReturnCheck.h @@ -18,7 +18,7 @@ /// Flags the usages of `else` after `return`. /// -/// http://llvm.org/docs/CodingStandards.html#don-t-use-else-after-a-return +/// https://llvm.org/docs/CodingStandards.html#don-t-use-else-after-a-return class ElseAfterReturnCheck : public ClangTidyCheck { public: ElseAfterReturnCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h b/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h --- a/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h +++ b/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h @@ -30,7 +30,7 @@ /// macros. Default is `false`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-function-cognitive-complexity.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-function-cognitive-complexity.html class FunctionCognitiveComplexityCheck : public ClangTidyCheck { public: FunctionCognitiveComplexityCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp b/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp --- a/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp +++ b/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp @@ -43,7 +43,7 @@ // For details you can look at the Specification at // https://www.sonarsource.com/docs/CognitiveComplexity.pdf // or user-facing docs at - // http://clang.llvm.org/extra/clang-tidy/checks/readability-function-cognitive-complexity.html + // https://clang.llvm.org/extra/clang-tidy/checks/readability-function-cognitive-complexity.html // Here are all the possible reasons: enum Criteria : uint8_t { None = 0U, diff --git a/clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h b/clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h --- a/clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h +++ b/clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h @@ -20,7 +20,7 @@ /// Warns about identifiers names whose length is too short. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-identifier-length.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-identifier-length.html class IdentifierLengthCheck : public ClangTidyCheck { public: IdentifierLengthCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h b/clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h --- a/clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h +++ b/clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h @@ -18,7 +18,7 @@ /// Checks for use of implicit bool conversions in expressions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-implicit-bool-conversion.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-implicit-bool-conversion.html class ImplicitBoolConversionCheck : public ClangTidyCheck { public: ImplicitBoolConversionCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h b/clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h --- a/clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h +++ b/clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h @@ -20,7 +20,7 @@ /// Checks for declarations of functions which differ in parameter names. /// /// For detailed documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-inconsistent-declaration-parameter-name.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-inconsistent-declaration-parameter-name.html /// class InconsistentDeclarationParameterNameCheck : public ClangTidyCheck { public: diff --git a/clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h b/clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h --- a/clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h +++ b/clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h @@ -19,7 +19,7 @@ /// tries to refactor the code to one statement per declaration. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-isolate-declaration.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-isolate-declaration.html class IsolateDeclarationCheck : public ClangTidyCheck { public: IsolateDeclarationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h b/clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h --- a/clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h +++ b/clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h @@ -21,7 +21,7 @@ /// Detects magic numbers, integer and floating point literals embedded in code. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-magic-numbers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-magic-numbers.html class MagicNumbersCheck : public ClangTidyCheck { public: MagicNumbersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h b/clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h --- a/clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h +++ b/clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h @@ -18,7 +18,7 @@ /// Finds non-static member functions that can be made 'const'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-make-member-function-const.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-make-member-function-const.html class MakeMemberFunctionConstCheck : public ClangTidyCheck { public: MakeMemberFunctionConstCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h b/clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h --- a/clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h +++ b/clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h @@ -20,7 +20,7 @@ /// or spaces are used consistently and not mixed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-misleading-indentation.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-misleading-indentation.html class MisleadingIndentationCheck : public ClangTidyCheck { public: MisleadingIndentationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h b/clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h --- a/clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h +++ b/clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h @@ -19,7 +19,7 @@ /// `array[index]`). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-misplaced-array-index.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-misplaced-array-index.html class MisplacedArrayIndexCheck : public ClangTidyCheck { public: MisplacedArrayIndexCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/NamespaceCommentCheck.h b/clang-tools-extra/clang-tidy/readability/NamespaceCommentCheck.h --- a/clang-tools-extra/clang-tidy/readability/NamespaceCommentCheck.h +++ b/clang-tools-extra/clang-tidy/readability/NamespaceCommentCheck.h @@ -18,7 +18,7 @@ /// Checks that long namespaces have a closing comment. /// -/// http://llvm.org/docs/CodingStandards.html#namespace-indentation +/// https://llvm.org/docs/CodingStandards.html#namespace-indentation /// /// https://google.github.io/styleguide/cppguide.html#Namespaces class NamespaceCommentCheck : public ClangTidyCheck { diff --git a/clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h b/clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h --- a/clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h +++ b/clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h @@ -18,7 +18,7 @@ /// Warn when a pointer function parameter can be const. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-non-const-parameter.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-non-const-parameter.html class NonConstParameterCheck : public ClangTidyCheck { public: NonConstParameterCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h b/clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h --- a/clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h +++ b/clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h @@ -20,7 +20,7 @@ /// 'const auto &'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-qualified-auto.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-qualified-auto.html class QualifiedAutoCheck : public ClangTidyCheck { public: QualifiedAutoCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h --- a/clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h @@ -18,7 +18,7 @@ /// Detects redundant access specifiers inside classes, structs, and unions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-access-specifiers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-access-specifiers.html class RedundantAccessSpecifiersCheck : public ClangTidyCheck { public: RedundantAccessSpecifiersCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h --- a/clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h @@ -21,7 +21,7 @@ /// Eliminates redundant `continue` statements at the end of a loop body. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-control-flow.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-control-flow.html class RedundantControlFlowCheck : public ClangTidyCheck { public: RedundantControlFlowCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h --- a/clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h @@ -18,7 +18,7 @@ /// Find redundant variable declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-declaration.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-declaration.html class RedundantDeclarationCheck : public ClangTidyCheck { public: RedundantDeclarationCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h --- a/clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h @@ -18,7 +18,7 @@ /// Eliminate redundant dereferences of a function pointer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-function-ptr-dereference.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-function-ptr-dereference.html class RedundantFunctionPtrDereferenceCheck : public ClangTidyCheck { public: RedundantFunctionPtrDereferenceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h --- a/clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h @@ -19,7 +19,7 @@ /// constructor would be called if they were not present. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-member-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-member-init.html class RedundantMemberInitCheck : public ClangTidyCheck { public: RedundantMemberInitCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h --- a/clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h @@ -19,7 +19,7 @@ /// the same condition. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-preprocessor.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-preprocessor.html class RedundantPreprocessorCheck : public ClangTidyCheck { public: RedundantPreprocessorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h b/clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h --- a/clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h +++ b/clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h @@ -19,7 +19,7 @@ /// them to use the appropriate boolean expression directly. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-simplify-boolean-expr.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-simplify-boolean-expr.html class SimplifyBooleanExprCheck : public ClangTidyCheck { public: SimplifyBooleanExprCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h b/clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h --- a/clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h +++ b/clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h @@ -18,7 +18,7 @@ /// Simplifies subscript expressions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-simplify-subscript-expr.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-simplify-subscript-expr.html class SimplifySubscriptExprCheck : public ClangTidyCheck { public: SimplifySubscriptExprCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h b/clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h --- a/clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h +++ b/clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h @@ -19,7 +19,7 @@ /// instances and replaces them with uses of the appropriate qualified-id. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-static-accessed-through-instance.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-static-accessed-through-instance.html class StaticAccessedThroughInstanceCheck : public ClangTidyCheck { public: StaticAccessedThroughInstanceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h b/clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h --- a/clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h @@ -18,7 +18,7 @@ /// Finds static function and variable definitions in anonymous namespace. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-static-definition-in-anonymous-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-static-definition-in-anonymous-namespace.html class StaticDefinitionInAnonymousNamespaceCheck : public ClangTidyCheck { public: StaticDefinitionInAnonymousNamespaceCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/readability/StringCompareCheck.h b/clang-tools-extra/clang-tidy/readability/StringCompareCheck.h --- a/clang-tools-extra/clang-tidy/readability/StringCompareCheck.h +++ b/clang-tools-extra/clang-tidy/readability/StringCompareCheck.h @@ -19,7 +19,7 @@ /// equality or inequality. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-string-compare.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-string-compare.html class StringCompareCheck : public ClangTidyCheck { public: StringCompareCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h b/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h --- a/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h +++ b/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h @@ -21,7 +21,7 @@ /// of the function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-suspicious-call-argument.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-suspicious-call-argument.html class SuspiciousCallArgumentCheck : public ClangTidyCheck { enum class Heuristic { Equality, diff --git a/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.cpp b/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.cpp --- a/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.cpp +++ b/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.cpp @@ -210,7 +210,7 @@ return Dist > Threshold; } -// Based on http://en.wikipedia.org/wiki/Jaro–Winkler_distance. +// Based on https://en.wikipedia.org/wiki/Jaro–Winkler_distance. static bool applyJaroWinklerHeuristic(StringRef Arg, StringRef Param, int8_t Threshold) { std::size_t Match = 0, Transpos = 0; @@ -271,7 +271,7 @@ return Dist > Threshold; } -// Based on http://en.wikipedia.org/wiki/Sørensen–Dice_coefficient +// Based on https://en.wikipedia.org/wiki/Sørensen–Dice_coefficient static bool applyDiceHeuristic(StringRef Arg, StringRef Param, int8_t Threshold) { llvm::StringSet<> ArgBigrams; diff --git a/clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h b/clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h --- a/clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h +++ b/clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h @@ -19,7 +19,7 @@ /// replaces them with: `` = nullptr;`` /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-uniqueptr-delete-release.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-uniqueptr-delete-release.html class UniqueptrDeleteReleaseCheck : public ClangTidyCheck { public: UniqueptrDeleteReleaseCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h b/clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h --- a/clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h +++ b/clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h @@ -21,7 +21,7 @@ /// Alternatively, a list of destination suffixes can be provided. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-uppercase-literal-suffix.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-uppercase-literal-suffix.html class UppercaseLiteralSuffixCheck : public ClangTidyCheck { public: UppercaseLiteralSuffixCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h b/clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h --- a/clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h +++ b/clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h @@ -20,7 +20,7 @@ /// or std::all_of. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-use-anyofallof.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability-use-anyofallof.html class UseAnyOfAllOfCheck : public ClangTidyCheck { public: using ClangTidyCheck::ClangTidyCheck; diff --git a/clang-tools-extra/clang-tidy/tool/ClangTidyMain.h b/clang-tools-extra/clang-tidy/tool/ClangTidyMain.h --- a/clang-tools-extra/clang-tidy/tool/ClangTidyMain.h +++ b/clang-tools-extra/clang-tidy/tool/ClangTidyMain.h @@ -9,7 +9,7 @@ /// \file This file declares the main function for the clang-tidy tool. /// /// This tool uses the Clang Tooling infrastructure, see -/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html /// for details on setting it up with LLVM source tree. /// //===----------------------------------------------------------------------===// diff --git a/clang-tools-extra/clang-tidy/tool/ClangTidyMain.cpp b/clang-tools-extra/clang-tidy/tool/ClangTidyMain.cpp --- a/clang-tools-extra/clang-tidy/tool/ClangTidyMain.cpp +++ b/clang-tools-extra/clang-tidy/tool/ClangTidyMain.cpp @@ -9,7 +9,7 @@ /// \file This file implements a clang-tidy tool. /// /// This tool uses the Clang Tooling infrastructure, see -/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html /// for details on setting it up with LLVM source tree. /// //===----------------------------------------------------------------------===// diff --git a/clang-tools-extra/clang-tidy/tool/ClangTidyToolMain.cpp b/clang-tools-extra/clang-tidy/tool/ClangTidyToolMain.cpp --- a/clang-tools-extra/clang-tidy/tool/ClangTidyToolMain.cpp +++ b/clang-tools-extra/clang-tidy/tool/ClangTidyToolMain.cpp @@ -9,7 +9,7 @@ /// \file This file contains clang-tidy tool entry point main function. /// /// This tool uses the Clang Tooling infrastructure, see -/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html /// for details on setting it up with LLVM source tree. /// //===----------------------------------------------------------------------===// diff --git a/clang-tools-extra/clang-tidy/tool/run-clang-tidy.py b/clang-tools-extra/clang-tidy/tool/run-clang-tidy.py --- a/clang-tools-extra/clang-tidy/tool/run-clang-tidy.py +++ b/clang-tools-extra/clang-tidy/tool/run-clang-tidy.py @@ -31,7 +31,7 @@ -header-filter=extra/clang-tidy Compilation database setup: -http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html """ from __future__ import print_function diff --git a/clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h b/clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h --- a/clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h +++ b/clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h @@ -20,7 +20,7 @@ /// discouraged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/zircon-temporary-objects.html +/// https://clang.llvm.org/extra/clang-tidy/checks/zircon-temporary-objects.html class TemporaryObjectsCheck : public ClangTidyCheck { public: TemporaryObjectsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clangd/unittests/support/MarkupTests.cpp b/clang-tools-extra/clangd/unittests/support/MarkupTests.cpp --- a/clang-tools-extra/clangd/unittests/support/MarkupTests.cpp +++ b/clang-tools-extra/clangd/unittests/support/MarkupTests.cpp @@ -65,7 +65,7 @@ EXPECT_THAT(escape("std::map"), escapedNone()); // Autolinks EXPECT_THAT(escape("Email "), escapedNone()); - EXPECT_THAT(escape("Website "), escapedNone()); + EXPECT_THAT(escape("Website "), escapedNone()); // Bullet lists. EXPECT_THAT(escape("- foo"), escaped('-')); diff --git a/clang-tools-extra/clangd/xpc/cmake/Info.plist.in b/clang-tools-extra/clangd/xpc/cmake/Info.plist.in --- a/clang-tools-extra/clangd/xpc/cmake/Info.plist.in +++ b/clang-tools-extra/clangd/xpc/cmake/Info.plist.in @@ -1,5 +1,5 @@ - + CFBundleDevelopmentRegion diff --git a/clang-tools-extra/clangd/xpc/cmake/XPCServiceInfo.plist.in b/clang-tools-extra/clangd/xpc/cmake/XPCServiceInfo.plist.in --- a/clang-tools-extra/clangd/xpc/cmake/XPCServiceInfo.plist.in +++ b/clang-tools-extra/clangd/xpc/cmake/XPCServiceInfo.plist.in @@ -1,5 +1,5 @@ - + CFBundleExecutable diff --git a/clang-tools-extra/docs/CMakeLists.txt b/clang-tools-extra/docs/CMakeLists.txt --- a/clang-tools-extra/docs/CMakeLists.txt +++ b/clang-tools-extra/docs/CMakeLists.txt @@ -28,9 +28,9 @@ set(CLANG_TOOLS_DOXYGEN_QHP_NAMESPACE "org.llvm.clang" CACHE STRING "Namespace under which the intermediate Qt Help Project file lives") set(CLANG_TOOLS_DOXYGEN_QHP_CUST_FILTER_NAME "Clang ${CLANG_VERSION}" CACHE STRING - "See http://qt-project.org/doc/qt-4.8/qthelpproject.html#custom-filters") + "See https://qt-project.org/doc/qt-4.8/qthelpproject.html#custom-filters") set(CLANG_TOOLS_DOXYGEN_QHP_CUST_FILTER_ATTRS "Clang,${CLANG_VERSION}" CACHE STRING - "See http://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes") + "See https://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes") set(clang_tools_doxygen_generate_qhp "YES") set(clang_tools_doxygen_qch_filename "${CLANG_DOXYGEN_QCH_FILENAME}") set(clang_tools_doxygen_qhp_namespace "${CLANG_DOXYGEN_QHP_NAMESPACE}") diff --git a/clang-tools-extra/docs/clang-include-fixer.rst b/clang-tools-extra/docs/clang-include-fixer.rst --- a/clang-tools-extra/docs/clang-include-fixer.rst +++ b/clang-tools-extra/docs/clang-include-fixer.rst @@ -69,7 +69,7 @@ This enables `clang-include-fixer` for NORMAL and VISUAL mode. Change `cf` to another binding if you need clang-include-fixer on a different key. The ` key -`_ +`_ is a reference to a specific key defined by the mapleader variable and is bound to backslash by default. diff --git a/clang-tools-extra/docs/clang-rename.rst b/clang-tools-extra/docs/clang-rename.rst --- a/clang-tools-extra/docs/clang-rename.rst +++ b/clang-tools-extra/docs/clang-rename.rst @@ -149,7 +149,7 @@ Once installed, you can point your cursor to symbols you want to rename, press `cr` and type new desired name. The ` key -`_ +`_ is a reference to a specific key defined by the mapleader variable and is bound to backslash by default. diff --git a/clang-tools-extra/docs/clang-tidy/Integrations.rst b/clang-tools-extra/docs/clang-tidy/Integrations.rst --- a/clang-tools-extra/docs/clang-tidy/Integrations.rst +++ b/clang-tools-extra/docs/clang-tidy/Integrations.rst @@ -2,7 +2,7 @@ Clang-tidy IDE/Editor Integrations ================================== -.. _clangd: http://clangd.llvm.org/ +.. _clangd: https://clangd.llvm.org/ .. _is available: https://clangd.llvm.org/installation.html#editor-plugins .. _more: https://langserver.org/#implementations-client diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone-move-forwarding-reference.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-move-forwarding-reference.rst --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone-move-forwarding-reference.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-move-forwarding-reference.rst @@ -13,7 +13,7 @@ } `Forwarding references -`_ should +`_ should typically be passed to ``std::forward`` instead of ``std::move``, and this is the fix that will be suggested. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-avoid-goto.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-avoid-goto.rst --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-avoid-goto.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-avoid-goto.rst @@ -8,7 +8,7 @@ This check implements `ES.76 `_ from the CppCoreGuidelines and -`6.3.1 from High Integrity C++ `_. +`6.3.1 from High Integrity C++ `_. For more information on why to avoid programming with ``goto`` you can read the famous paper `A Case against the GO TO Statement. `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.rst --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.rst @@ -8,7 +8,7 @@ in one of these ways to prevent undefined behavior. This check implements -`C.35 `_ +`C.35 `_ from the CppCoreGuidelines. Note that this check will diagnose a class with a virtual method regardless of diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-avoid-goto.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-avoid-goto.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-avoid-goto.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-avoid-goto.rst @@ -5,7 +5,7 @@ The `hicpp-avoid-goto` check is an alias to `cppcoreguidelines-avoid-goto `_. -Rule `6.3.1 High Integrity C++ `_ +Rule `6.3.1 High Integrity C++ `_ requires that ``goto`` only skips parts of a block and is not used for other reasons. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-braces-around-statements.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-braces-around-statements.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-braces-around-statements.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-braces-around-statements.rst @@ -8,4 +8,4 @@ The `hicpp-braces-around-statements` check is an alias, please see `readability-braces-around-statements `_ for more information. -It enforces the `rule 6.1.1 `_. +It enforces the `rule 6.1.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-deprecated-headers.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-deprecated-headers.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-deprecated-headers.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-deprecated-headers.rst @@ -8,4 +8,4 @@ The `hicpp-deprecated-headers` check is an alias, please see `modernize-deprecated-headers `_ for more information. -It enforces the `rule 1.3.3 `_. +It enforces the `rule 1.3.3 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-exception-baseclass.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-exception-baseclass.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-exception-baseclass.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-exception-baseclass.rst @@ -6,7 +6,7 @@ Ensure that every value that in a ``throw`` expression is an instance of ``std::exception``. -This enforces `rule 15.1 `_ +This enforces `rule 15.1 `_ of the High Integrity C++ Coding Standard. .. code-block:: c++ diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-explicit-conversions.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-explicit-conversions.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-explicit-conversions.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-explicit-conversions.rst @@ -6,7 +6,7 @@ ========================== This check is an alias for `google-explicit-constructor `_. -Used to enforce parts of `rule 5.4.1 `_. +Used to enforce parts of `rule 5.4.1 `_. This check will enforce that constructors and conversion operators are marked `explicit`. Other forms of casting checks are implemented in other places. The following checks can be used to check for more forms of casting: diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-function-size.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-function-size.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-function-size.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-function-size.rst @@ -8,6 +8,6 @@ This check is an alias for `readability-function-size `_. Useful to enforce multiple sections on function complexity. -- `rule 8.2.2 `_ -- `rule 8.3.1 `_ -- `rule 8.3.2 `_ +- `rule 8.2.2 `_ +- `rule 8.3.1 `_ +- `rule 8.3.2 `_ diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-invalid-access-moved.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-invalid-access-moved.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-invalid-access-moved.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-invalid-access-moved.rst @@ -7,4 +7,4 @@ This check is an alias for `bugprone-use-after-move `_. -Implements parts of the `rule 8.4.1 `_ to check if moved-from objects are accessed. +Implements parts of the `rule 8.4.1 `_ to check if moved-from objects are accessed. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-member-init.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-member-init.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-member-init.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-member-init.rst @@ -7,5 +7,5 @@ This check is an alias for `cppcoreguidelines-pro-type-member-init `_. Implements the check for -`rule 12.4.2 `_ +`rule 12.4.2 `_ to initialize class members in the right order. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-move-const-arg.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-move-const-arg.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-move-const-arg.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-move-const-arg.rst @@ -7,4 +7,4 @@ The `hicpp-move-const-arg` check is an alias, please see `performance-move-const-arg `_ for more information. -It enforces the `rule 17.3.1 `_. +It enforces the `rule 17.3.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-multiway-paths-covered.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-multiway-paths-covered.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-multiway-paths-covered.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-multiway-paths-covered.rst @@ -5,8 +5,8 @@ This check discovers situations where code paths are not fully-covered. It furthermore suggests using ``if`` instead of ``switch`` if the code will be more clear. -The `rule 6.1.2 `_ -and `rule 6.1.4 `_ +The `rule 6.1.2 `_ +and `rule 6.1.4 `_ of the High Integrity C++ Coding Standard are enforced. ``if-else if`` chains that miss a final ``else`` branch might lead to unexpected @@ -57,7 +57,7 @@ } -The `rule 6.1.4 `_ +The `rule 6.1.4 `_ requires every ``switch`` statement to have at least two ``case`` labels other than a `default` label. Otherwise, the ``switch`` could be better expressed with an ``if`` statement. Degenerated ``switch`` statements without any labels are caught as well. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-named-parameter.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-named-parameter.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-named-parameter.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-named-parameter.rst @@ -7,4 +7,4 @@ This check is an alias for `readability-named-parameter `_. -Implements `rule 8.2.1 `_. +Implements `rule 8.2.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-new-delete-operators.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-new-delete-operators.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-new-delete-operators.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-new-delete-operators.rst @@ -6,5 +6,5 @@ ========================== This check is an alias for `misc-new-delete-overloads `_. -Implements `rule 12.3.1 `_ to ensure +Implements `rule 12.3.1 `_ to ensure the `new` and `delete` operators have the correct signature. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-array-decay.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-array-decay.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-array-decay.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-array-decay.rst @@ -8,4 +8,4 @@ The `hicpp-no-array-decay` check is an alias, please see `cppcoreguidelines-pro-bounds-array-to-pointer-decay `_ for more information. -It enforces the `rule 4.1.1 `_. +It enforces the `rule 4.1.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-assembler.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-assembler.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-assembler.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-assembler.rst @@ -6,5 +6,5 @@ Check for assembler statements. No fix is offered. Inline assembler is forbidden by the `High Integrity C++ Coding Standard -`_ +`_ as it restricts the portability of code. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-malloc.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-malloc.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-malloc.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-no-malloc.rst @@ -8,4 +8,4 @@ The `hicpp-no-malloc` check is an alias, please see `cppcoreguidelines-no-malloc `_ for more information. -It enforces the `rule 5.3.2 `_. +It enforces the `rule 5.3.2 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-noexcept-move.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-noexcept-move.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-noexcept-move.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-noexcept-move.rst @@ -6,4 +6,4 @@ =================== This check is an alias for `performance-noexcept-move-constructor `_. -Checks `rule 12.5.4 `_ to mark move assignment and move construction `noexcept`. +Checks `rule 12.5.4 `_ to mark move assignment and move construction `noexcept`. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-signed-bitwise.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-signed-bitwise.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-signed-bitwise.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-signed-bitwise.rst @@ -6,7 +6,7 @@ Finds uses of bitwise operations on signed integer types, which may lead to undefined or implementation defined behavior. -The according rule is defined in the `High Integrity C++ Standard, Section 5.6.1 `_. +The according rule is defined in the `High Integrity C++ Standard, Section 5.6.1 `_. Options ------- diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-special-member-functions.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-special-member-functions.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-special-member-functions.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-special-member-functions.rst @@ -6,4 +6,4 @@ ============================== This check is an alias for `cppcoreguidelines-special-member-functions `_. -Checks that special member functions have the correct signature, according to `rule 12.5.7 `_. +Checks that special member functions have the correct signature, according to `rule 12.5.7 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-static-assert.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-static-assert.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-static-assert.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-static-assert.rst @@ -7,4 +7,4 @@ The `hicpp-static-assert` check is an alias, please see `misc-static-assert `_ for more information. -It enforces the `rule 7.1.10 `_. +It enforces the `rule 7.1.10 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-undelegated-constructor.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-undelegated-constructor.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-undelegated-constructor.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-undelegated-constructor.rst @@ -6,7 +6,7 @@ ============================= This check is an alias for `bugprone-undelegated-constructor `_. -Partially implements `rule 12.4.5 `_ +Partially implements `rule 12.4.5 `_ to find misplaced constructor calls inside a constructor. .. code-block:: c++ diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-auto.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-auto.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-auto.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-auto.rst @@ -7,4 +7,4 @@ The `hicpp-use-auto` check is an alias, please see `modernize-use-auto `_ for more information. -It enforces the `rule 7.1.8 `_. +It enforces the `rule 7.1.8 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-emplace.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-emplace.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-emplace.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-emplace.rst @@ -7,4 +7,4 @@ The `hicpp-use-emplace` check is an alias, please see `modernize-use-emplace `_ for more information. -It enforces the `rule 17.4.2 `_. +It enforces the `rule 17.4.2 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-equals-default.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-equals-default.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-equals-default.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-equals-default.rst @@ -6,4 +6,4 @@ ======================== This check is an alias for `modernize-use-equals-default `_. -Implements `rule 12.5.1 `_ to explicitly default special member functions. +Implements `rule 12.5.1 `_ to explicitly default special member functions. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-equals-delete.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-equals-delete.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-equals-delete.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-equals-delete.rst @@ -6,5 +6,5 @@ ======================= This check is an alias for `modernize-use-equals-delete `_. -Implements `rule 12.5.1 `_ +Implements `rule 12.5.1 `_ to explicitly default or delete special member functions. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-noexcept.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-noexcept.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-noexcept.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-noexcept.rst @@ -7,4 +7,4 @@ The `hicpp-use-noexcept` check is an alias, please see `modernize-use-noexcept `_ for more information. -It enforces the `rule 1.3.5 `_. +It enforces the `rule 1.3.5 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-nullptr.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-nullptr.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-nullptr.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-nullptr.rst @@ -7,4 +7,4 @@ The `hicpp-use-nullptr` check is an alias, please see `modernize-use-nullptr `_ for more information. -It enforces the `rule 2.5.3 `_. +It enforces the `rule 2.5.3 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-override.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-override.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-override.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-use-override.rst @@ -6,5 +6,5 @@ ================== This check is an alias for `modernize-use-override `_. -Implements `rule 10.2.1 `_ to +Implements `rule 10.2.1 `_ to declare a virtual function `override` when overriding. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-vararg.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-vararg.rst --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-vararg.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-vararg.rst @@ -8,4 +8,4 @@ The `hicpp-vararg` check is an alias, please see `cppcoreguidelines-pro-type-vararg `_ for more information. -It enforces the `rule 14.1.1 `_. +It enforces the `rule 14.1.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/modernize-pass-by-value.rst b/clang-tools-extra/docs/clang-tidy/checks/modernize-pass-by-value.rst --- a/clang-tools-extra/docs/clang-tidy/checks/modernize-pass-by-value.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/modernize-pass-by-value.rst @@ -150,7 +150,7 @@ For more information about the pass-by-value idiom, read: `Want Speed? Pass by Value`_. - .. _Want Speed? Pass by Value: https://web.archive.org/web/20140205194657/http://cpp-next.com/archive/2009/08/want-speed-pass-by-value/ + .. _Want Speed? Pass by Value: https://web.archive.org/web/20140205194657/https://cpp-next.com/archive/2009/08/want-speed-pass-by-value/ Options ------- diff --git a/clang-tools-extra/docs/clang-tidy/checks/readability-magic-numbers.rst b/clang-tools-extra/docs/clang-tidy/checks/readability-magic-numbers.rst --- a/clang-tools-extra/docs/clang-tidy/checks/readability-magic-numbers.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/readability-magic-numbers.rst @@ -10,14 +10,14 @@ constants to improve readability. Here are a few references: * `Rule ES.45: Avoid "magic constants"; use symbolic constants in C++ Core Guidelines `_ - * `Rule 5.1.1 Use symbolic names instead of literal values in code in High Integrity C++ `_ + * `Rule 5.1.1 Use symbolic names instead of literal values in code in High Integrity C++ `_ * Item 17 in "C++ Coding Standards: 101 Rules, Guidelines and Best Practices" by Herb Sutter and Andrei Alexandrescu * Chapter 17 in "Clean Code - A handbook of agile software craftsmanship." by Robert C. Martin * Rule 20701 in "TRAIN REAL TIME DATA PROTOCOL Coding Rules" by Armin-Hagen Weiss, Bombardier - * http://wiki.c2.com/?MagicNumber + * https://wiki.c2.com/?MagicNumber Examples of magic values: diff --git a/clang-tools-extra/docs/clang-tidy/checks/readability-suspicious-call-argument.rst b/clang-tools-extra/docs/clang-tidy/checks/readability-suspicious-call-argument.rst --- a/clang-tools-extra/docs/clang-tidy/checks/readability-suspicious-call-argument.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/readability-suspicious-call-argument.rst @@ -95,7 +95,7 @@ Levenshtein distance (as `Levenshtein`) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -The `Levenshtein distance `_ +The `Levenshtein distance `_ describes how many single-character changes (additions, changes, or removals) must be applied to transform one string into another. @@ -112,7 +112,7 @@ Jaro--Winkler distance (as `JaroWinkler`) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -The `Jaro--Winkler distance `_ +The `Jaro--Winkler distance `_ is an edit distance like the Levenshtein distance. It is calculated from the amount of common characters that are sufficiently close to each other in position, and to-be-changed characters. @@ -128,7 +128,7 @@ Sørensen--Dice coefficient (as `Dice`) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -The `Sørensen--Dice coefficient `_ +The `Sørensen--Dice coefficient `_ was originally defined to measure the similarity of two sets. Formally, the coefficient is calculated by dividing `2 * #(intersection)` with `#(set1) + #(set2)`, where `#()` is the cardinality function of sets. diff --git a/clang-tools-extra/docs/doxygen.cfg.in b/clang-tools-extra/docs/doxygen.cfg.in --- a/clang-tools-extra/docs/doxygen.cfg.in +++ b/clang-tools-extra/docs/doxygen.cfg.in @@ -20,7 +20,7 @@ # This tag specifies the encoding used for all characters in the config file # that follow. The default is UTF-8 which is also the encoding used for all text # before the first occurrence of this tag. Doxygen uses libiconv (or the iconv -# built into libc) for the transcoding. See http://www.gnu.org/software/libiconv +# built into libc) for the transcoding. See https://www.gnu.org/software/libiconv # for the list of possible encodings. # The default value is: UTF-8. @@ -274,7 +274,7 @@ # If the MARKDOWN_SUPPORT tag is enabled then doxygen pre-processes all comments # according to the Markdown format, which allows for more readable -# documentation. See http://daringfireball.net/projects/markdown/ for details. +# documentation. See https://daringfireball.net/projects/markdown/ for details. # The output of markdown processing is further processed by doxygen, so you can # mix doxygen, HTML, and XML commands with Markdown formatting. Disable only in # case of backward compatibilities issues. @@ -307,7 +307,7 @@ CPP_CLI_SUPPORT = NO # Set the SIP_SUPPORT tag to YES if your project consists of sip (see: -# http://www.riverbankcomputing.co.uk/software/sip/intro) sources only. Doxygen +# https://www.riverbankcomputing.co.uk/software/sip/intro) sources only. Doxygen # will parse them like normal C++ but will assume all classes use public instead # of private inheritance when no explicit protection keyword is present. # The default value is: NO. @@ -666,7 +666,7 @@ # The CITE_BIB_FILES tag can be used to specify one or more bib files containing # the reference definitions. This must be a list of .bib files. The .bib # extension is automatically appended if omitted. This requires the bibtex tool -# to be installed. See also http://en.wikipedia.org/wiki/BibTeX for more info. +# to be installed. See also https://en.wikipedia.org/wiki/BibTeX for more info. # For LaTeX the style of the bibliography can be controlled using # LATEX_BIB_STYLE. To use this feature you need bibtex and perl available in the # search path. Do not use file names with spaces, bibtex cannot handle them. See @@ -761,7 +761,7 @@ # This tag can be used to specify the character encoding of the source files # that doxygen parses. Internally doxygen uses the UTF-8 encoding. Doxygen uses # libiconv (or the iconv built into libc) for the transcoding. See the libiconv -# documentation (see: http://www.gnu.org/software/libiconv) for the list of +# documentation (see: https://www.gnu.org/software/libiconv) for the list of # possible encodings. # The default value is: UTF-8. @@ -953,7 +953,7 @@ # If the USE_HTAGS tag is set to YES then the references to source code will # point to the HTML generated by the htags(1) tool instead of doxygen built-in # source browser. The htags tool is part of GNU's global source tagging system -# (see http://www.gnu.org/software/global/global.html). You will need version +# (see https://www.gnu.org/software/global/global.html). You will need version # 4.8.6 or higher. # # To use it do the following: @@ -1096,7 +1096,7 @@ # The HTML_COLORSTYLE_HUE tag controls the color of the HTML output. Doxygen # will adjust the colors in the stylesheet and background images according to # this color. Hue is specified as an angle on a colorwheel, see -# http://en.wikipedia.org/wiki/Hue for more information. For instance the value +# https://en.wikipedia.org/wiki/Hue for more information. For instance the value # 0 represents red, 60 is yellow, 120 is green, 180 is cyan, 240 is blue, 300 # purple, and 360 is red again. # Minimum value: 0, maximum value: 359, default value: 220. @@ -1154,12 +1154,12 @@ # If the GENERATE_DOCSET tag is set to YES, additional index files will be # generated that can be used as input for Apple's Xcode 3 integrated development -# environment (see: http://developer.apple.com/tools/xcode/), introduced with +# environment (see: https://developer.apple.com/tools/xcode/), introduced with # OSX 10.5 (Leopard). To create a documentation set, doxygen will generate a # Makefile in the HTML output directory. Running make will produce the docset in # that directory and running make install will install the docset in # ~/Library/Developer/Shared/Documentation/DocSets so that Xcode will find it at -# startup. See http://developer.apple.com/tools/creatingdocsetswithdoxygen.html +# startup. See https://developer.apple.com/tools/creatingdocsetswithdoxygen.html # for more information. # The default value is: NO. # This tag requires that the tag GENERATE_HTML is set to YES. @@ -1199,7 +1199,7 @@ # If the GENERATE_HTMLHELP tag is set to YES then doxygen generates three # additional HTML index files: index.hhp, index.hhc, and index.hhk. The # index.hhp is a project file that can be read by Microsoft's HTML Help Workshop -# (see: http://www.microsoft.com/en-us/download/details.aspx?id=21138) on +# (see: https://www.microsoft.com/en-us/download/details.aspx?id=21138) on # Windows. # # The HTML Help Workshop contains a compiler that can convert all HTML output @@ -1274,7 +1274,7 @@ # The QHP_NAMESPACE tag specifies the namespace to use when generating Qt Help # Project output. For more information please see Qt Help Project / Namespace -# (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#namespace). +# (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#namespace). # The default value is: org.doxygen.Project. # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1282,7 +1282,7 @@ # The QHP_VIRTUAL_FOLDER tag specifies the namespace to use when generating Qt # Help Project output. For more information please see Qt Help Project / Virtual -# Folders (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#virtual- +# Folders (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#virtual- # folders). # The default value is: doc. # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1291,7 +1291,7 @@ # If the QHP_CUST_FILTER_NAME tag is set, it specifies the name of a custom # filter to add. For more information please see Qt Help Project / Custom -# Filters (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- +# Filters (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- # filters). # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1299,7 +1299,7 @@ # The QHP_CUST_FILTER_ATTRS tag specifies the list of the attributes of the # custom filter to add. For more information please see Qt Help Project / Custom -# Filters (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- +# Filters (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- # filters). # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1307,7 +1307,7 @@ # The QHP_SECT_FILTER_ATTRS tag specifies the list of the attributes this # project's filter section matches. Qt Help Project / Filter Attributes (see: -# http://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes). +# https://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes). # This tag requires that the tag GENERATE_QHP is set to YES. QHP_SECT_FILTER_ATTRS = @@ -1412,7 +1412,7 @@ FORMULA_TRANSPARENT = YES # Enable the USE_MATHJAX option to render LaTeX formulas using MathJax (see -# http://www.mathjax.org) which uses client side Javascript for the rendering +# https://www.mathjax.org) which uses client side Javascript for the rendering # instead of using prerendered bitmaps. Use this if you do not have LaTeX # installed or if you want to formulas look prettier in the HTML output. When # enabled you may also need to install MathJax separately and configure the path @@ -1424,7 +1424,7 @@ # When MathJax is enabled you can set the default output format to be used for # the MathJax output. See the MathJax site (see: -# http://docs.mathjax.org/en/latest/output.html) for more details. +# https://docs.mathjax.org/en/latest/output.html) for more details. # Possible values are: HTML-CSS (which is slower, but has the best # compatibility), NativeMML (i.e. MathML) and SVG. # The default value is: HTML-CSS. @@ -1439,11 +1439,11 @@ # MATHJAX_RELPATH should be ../mathjax. The default value points to the MathJax # Content Delivery Network so you can quickly see the result without installing # MathJax. However, it is strongly recommended to install a local copy of -# MathJax from http://www.mathjax.org before deployment. -# The default value is: http://cdn.mathjax.org/mathjax/latest. +# MathJax from https://www.mathjax.org before deployment. +# The default value is: https://cdn.mathjax.org/mathjax/latest. # This tag requires that the tag USE_MATHJAX is set to YES. -MATHJAX_RELPATH = http://cdn.mathjax.org/mathjax/latest +MATHJAX_RELPATH = https://cdn.mathjax.org/mathjax/latest # The MATHJAX_EXTENSIONS tag can be used to specify one or more MathJax # extension names that should be enabled during MathJax rendering. For example @@ -1454,7 +1454,7 @@ # The MATHJAX_CODEFILE tag can be used to specify a file with javascript pieces # of code that will be used on startup of the MathJax code. See the MathJax site -# (see: http://docs.mathjax.org/en/latest/output.html) for more details. For an +# (see: https://docs.mathjax.org/en/latest/output.html) for more details. For an # example see the documentation. # This tag requires that the tag USE_MATHJAX is set to YES. @@ -1501,7 +1501,7 @@ # # Doxygen ships with an example indexer ( doxyindexer) and search engine # (doxysearch.cgi) which are based on the open source search engine library -# Xapian (see: http://xapian.org/). +# Xapian (see: https://xapian.org/). # # See the section "External Indexing and Searching" for details. # The default value is: NO. @@ -1514,7 +1514,7 @@ # # Doxygen ships with an example indexer ( doxyindexer) and search engine # (doxysearch.cgi) which are based on the open source search engine library -# Xapian (see: http://xapian.org/). See the section "External Indexing and +# Xapian (see: https://xapian.org/). See the section "External Indexing and # Searching" for details. # This tag requires that the tag SEARCHENGINE is set to YES. @@ -1685,7 +1685,7 @@ # The LATEX_BIB_STYLE tag can be used to specify the style to use for the # bibliography, e.g. plainnat, or ieeetr. See -# http://en.wikipedia.org/wiki/BibTeX and \cite for more info. +# https://en.wikipedia.org/wiki/BibTeX and \cite for more info. # The default value is: plain. # This tag requires that the tag GENERATE_LATEX is set to YES. @@ -1834,7 +1834,7 @@ #--------------------------------------------------------------------------- # If the GENERATE_AUTOGEN_DEF tag is set to YES doxygen will generate an AutoGen -# Definitions (see http://autogen.sf.net) file that captures the structure of +# Definitions (see https://autogen.sf.net) file that captures the structure of # the code including all documentation. Note that this feature is still # experimental and incomplete at the moment. # The default value is: NO. @@ -2024,7 +2024,7 @@ # You can define message sequence charts within doxygen comments using the \msc # command. Doxygen will then run the mscgen tool (see: -# http://www.mcternan.me.uk/mscgen/)) to produce the chart and insert it in the +# https://www.mcternan.me.uk/mscgen/)) to produce the chart and insert it in the # documentation. The MSCGEN_PATH tag allows you to specify the directory where # the mscgen tool resides. If left empty the tool is assumed to be found in the # default search path. @@ -2046,7 +2046,7 @@ # If you set the HAVE_DOT tag to YES then doxygen will assume the dot tool is # available from the path. This tool is part of Graphviz (see: -# http://www.graphviz.org/), a graph visualization toolkit from AT&T and Lucent +# https://www.graphviz.org/), a graph visualization toolkit from AT&T and Lucent # Bell Labs. The other options in this section have no effect if this option is # set to NO # The default value is: NO. diff --git a/clang-tools-extra/unittests/clang-doc/HTMLGeneratorTest.cpp b/clang-tools-extra/unittests/clang-doc/HTMLGeneratorTest.cpp --- a/clang-tools-extra/unittests/clang-doc/HTMLGeneratorTest.cpp +++ b/clang-tools-extra/unittests/clang-doc/HTMLGeneratorTest.cpp @@ -168,7 +168,7 @@ assert(G); std::string Buffer; llvm::raw_string_ostream Actual(Buffer); - ClangDocContext CDCtx = getClangDocContext({}, "http://www.repository.com"); + ClangDocContext CDCtx = getClangDocContext({}, "https://www.repository.com"); auto Err = G->generateDocForInfo(&I, Actual, CDCtx); assert(!Err); std::string Expected = R"raw( @@ -183,9 +183,9 @@

class r

Defined at line - 10 + 10 of file - test.cpp + test.cpp

Inherits from diff --git a/clang/.gitignore b/clang/.gitignore --- a/clang/.gitignore +++ b/clang/.gitignore @@ -1,6 +1,6 @@ #==============================================================================# # This file specifies intentionally untracked files that git should ignore. -# See: http://www.kernel.org/pub/software/scm/git/docs/gitignore.html +# See: https://www.kernel.org/pub/software/scm/git/docs/gitignore.html #==============================================================================# #==============================================================================# @@ -33,4 +33,3 @@ # VS2017 and VSCode config files. .vscode .vs - diff --git a/clang/NOTES.txt b/clang/NOTES.txt --- a/clang/NOTES.txt +++ b/clang/NOTES.txt @@ -11,7 +11,7 @@ //===---------------------------------------------------------------------===// C++ Template Instantiation benchmark: - http://users.rcn.com/abrahams/instantiation_speed/index.html + https://users.rcn.com/abrahams/instantiation_speed/index.html //===---------------------------------------------------------------------===// diff --git a/clang/README.txt b/clang/README.txt --- a/clang/README.txt +++ b/clang/README.txt @@ -13,14 +13,14 @@ If you're interested in more (including how to build Clang) it is best to read the relevant web sites. Here are some pointers: -Information on Clang: http://clang.llvm.org/ -Building and using Clang: http://clang.llvm.org/get_started.html -Clang Static Analyzer: http://clang-analyzer.llvm.org/ -Information on the LLVM project: http://llvm.org/ +Information on Clang: https://clang.llvm.org/ +Building and using Clang: https://clang.llvm.org/get_started.html +Clang Static Analyzer: https://clang-analyzer.llvm.org/ +Information on the LLVM project: https://llvm.org/ If you have questions or comments about Clang, a great place to discuss them is on the Clang forums: https://discourse.llvm.org/c/clang/ If you find a bug in Clang, please file it in the LLVM bug tracker: - http://llvm.org/bugs/ + https://llvm.org/bugs/ diff --git a/clang/bindings/xml/comment-xml-schema.rng b/clang/bindings/xml/comment-xml-schema.rng --- a/clang/bindings/xml/comment-xml-schema.rng +++ b/clang/bindings/xml/comment-xml-schema.rng @@ -1,7 +1,7 @@ - + @@ -605,4 +605,3 @@ - diff --git a/clang/cmake/caches/Apple-stage2.cmake b/clang/cmake/caches/Apple-stage2.cmake --- a/clang/cmake/caches/Apple-stage2.cmake +++ b/clang/cmake/caches/Apple-stage2.cmake @@ -17,7 +17,7 @@ set(LLVM_EXTERNALIZE_DEBUGINFO ON CACHE BOOL "") set(CLANG_PLUGIN_SUPPORT OFF CACHE BOOL "") set(CLANG_SPAWN_CC1 ON CACHE BOOL "") -set(BUG_REPORT_URL "http://developer.apple.com/bugreporter/" CACHE STRING "") +set(BUG_REPORT_URL "https://developer.apple.com/bugreporter/" CACHE STRING "") set(LLVM_BUILD_EXTERNAL_COMPILER_RT ON CACHE BOOL "Build Compiler-RT with just-built clang") set(COMPILER_RT_ENABLE_IOS ON CACHE BOOL "Build iOS Compiler-RT libraries") diff --git a/clang/docs/CMakeLists.txt b/clang/docs/CMakeLists.txt --- a/clang/docs/CMakeLists.txt +++ b/clang/docs/CMakeLists.txt @@ -29,9 +29,9 @@ set(CLANG_DOXYGEN_QHP_NAMESPACE "org.llvm.clang" CACHE STRING "Namespace under which the intermediate Qt Help Project file lives") set(CLANG_DOXYGEN_QHP_CUST_FILTER_NAME "Clang ${CLANG_VERSION}" CACHE STRING - "See http://qt-project.org/doc/qt-4.8/qthelpproject.html#custom-filters") + "See https://qt-project.org/doc/qt-4.8/qthelpproject.html#custom-filters") set(CLANG_DOXYGEN_QHP_CUST_FILTER_ATTRS "Clang,${CLANG_VERSION}" CACHE STRING - "See http://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes") + "See https://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes") set(clang_doxygen_generate_qhp "YES") set(clang_doxygen_qch_filename "${CLANG_DOXYGEN_QCH_FILENAME}") set(clang_doxygen_qhp_namespace "${CLANG_DOXYGEN_QHP_NAMESPACE}") diff --git a/clang/docs/ClangTools.rst b/clang/docs/ClangTools.rst --- a/clang/docs/ClangTools.rst +++ b/clang/docs/ClangTools.rst @@ -139,7 +139,7 @@ control over their code. * C++14: less verbose operator function objects (`N3421 - `_). + `_). For example: .. code-block:: c++ @@ -151,4 +151,3 @@ .. code-block:: c++ sort(v.begin(), v.end(), greater<>()); - diff --git a/clang/docs/ControlFlowIntegrity.rst b/clang/docs/ControlFlowIntegrity.rst --- a/clang/docs/ControlFlowIntegrity.rst +++ b/clang/docs/ControlFlowIntegrity.rst @@ -387,6 +387,6 @@ `Control-Flow Integrity: Principles, Implementations, and Applications `_. Martin Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti. -`Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM `_. +`Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM `_. Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, Geoff Pike. diff --git a/clang/docs/DataFlowAnalysisIntro.md b/clang/docs/DataFlowAnalysisIntro.md --- a/clang/docs/DataFlowAnalysisIntro.md +++ b/clang/docs/DataFlowAnalysisIntro.md @@ -21,7 +21,7 @@ [#24](https://www.youtube.com/watch?v=KRkHwQtW6Cc), [#25](https://www.youtube.com/watch?v=7Gwzsc4rAgw). * [Introduction to Dataflow Analysis](https://www.youtube.com/watch?v=OROXJ9-wUQE) -* [Introduction to abstract interpretation](http://www.cs.tau.ac.il/~msagiv/courses/asv/absint-1.pdf). +* [Introduction to abstract interpretation](https://www.cs.tau.ac.il/~msagiv/courses/asv/absint-1.pdf). * [Introduction to symbolic execution](https://www.cs.umd.edu/~mwh/se-tutorial/symbolic-exec.pdf). * [Static Program Analysis by Anders Møller and Michael I. Schwartzbach](https://cs.au.dk/~amoeller/spa/). * [EXE: automatically generating inputs of death](https://css.csail.mit.edu/6.858/2020/readings/exe.pdf) diff --git a/clang/docs/DataFlowAnalysisIntroImages/CFGExample.svg b/clang/docs/DataFlowAnalysisIntroImages/CFGExample.svg --- a/clang/docs/DataFlowAnalysisIntroImages/CFGExample.svg +++ b/clang/docs/DataFlowAnalysisIntroImages/CFGExample.svg @@ -1,12 +1,12 @@ `_ "The simplest Clang plugin implementing a semantic check for Objective-C. This example shows how to use the ``DiagnosticsEngine`` (emit warnings, - errors, fixit hints). See also ``_ for + errors, fixit hints). See also ``_ for step-by-step instructions." ``_ diff --git a/clang/docs/HardwareAssistedAddressSanitizerDesign.rst b/clang/docs/HardwareAssistedAddressSanitizerDesign.rst --- a/clang/docs/HardwareAssistedAddressSanitizerDesign.rst +++ b/clang/docs/HardwareAssistedAddressSanitizerDesign.rst @@ -295,5 +295,5 @@ .. _Effective and Efficient Memory Protection Using Dynamic Tainting: https://www.cc.gatech.edu/~orso/papers/clause.doudalis.orso.prvulovic.pdf .. _SPARC ADI: https://lazytyped.blogspot.com/2017/09/getting-started-with-adi.html .. _AddressSanitizer paper: https://www.usenix.org/system/files/conference/atc12/atc12-final39.pdf -.. _Address Tagging: http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.den0024a/ch12s05s01.html +.. _Address Tagging: https://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.den0024a/ch12s05s01.html .. _Linear Address Masking: https://software.intel.com/content/www/us/en/develop/download/intel-architecture-instruction-set-extensions-programming-reference.html diff --git a/clang/docs/LanguageExtensions.rst b/clang/docs/LanguageExtensions.rst --- a/clang/docs/LanguageExtensions.rst +++ b/clang/docs/LanguageExtensions.rst @@ -756,7 +756,7 @@ ``__fp16`` is a storage and interchange format only. This means that values of ``__fp16`` are immediately promoted to (at least) ``float`` when used in arithmetic operations, so that e.g. the result of adding two ``__fp16`` values has type ``float``. -The behavior of ``__fp16`` is specified by the ARM C Language Extensions (`ACLE `_). +The behavior of ``__fp16`` is specified by the ARM C Language Extensions (`ACLE `_). Clang uses the ``binary16`` format from IEEE 754-2008 for ``__fp16``, not the ARM alternative format. @@ -927,7 +927,7 @@ ``__has_extension(cxx_access_control_sfinae)`` to determine whether access-control errors (e.g., calling a private constructor) are considered to be template argument deduction errors (aka SFINAE errors), per `C++ DR1170 -`_. +`_. C++11 alias templates ^^^^^^^^^^^^^^^^^^^^^ @@ -1336,7 +1336,7 @@ `_, as well as nearly all of the `Embarcadero C++ type traits -`_. +`_. The following type trait primitives are supported by Clang. Those traits marked (C++) provide implementations for type traits specified by the C++ standard; @@ -3614,7 +3614,7 @@ ^^^^^^^^^^^^^^^^^^^^^^^^^ Clang implements the ``__dmb``, ``__dsb`` and ``__isb`` intrinsics as defined in the `ARM C Language Extensions Release 2.0 -`_. +`_. Note that these intrinsics are implemented as motion barriers that block reordering of memory accesses and side effect instructions. Other instructions like simple arithmetic may be reordered around the intrinsic. If you expect to @@ -4058,7 +4058,7 @@ ``#pragma clang fp exceptions`` specifies floating point exception behavior. It may take one of the values: ``ignore``, ``maytrap`` or ``strict``. Meaning of -these values is same as for `constrained floating point intrinsics `_. +these values is same as for `constrained floating point intrinsics `_. .. code-block:: c++ diff --git a/clang/docs/LibASTMatchersReference.html b/clang/docs/LibASTMatchersReference.html --- a/clang/docs/LibASTMatchersReference.html +++ b/clang/docs/LibASTMatchersReference.html @@ -1,5 +1,5 @@ + "https://www.w3.org/TR/html4/strict.dtd"> AST Matcher Reference @@ -9919,5 +9919,3 @@ - - diff --git a/clang/docs/LibFormat.rst b/clang/docs/LibFormat.rst --- a/clang/docs/LibFormat.rst +++ b/clang/docs/LibFormat.rst @@ -49,7 +49,7 @@ FormatStyle getLLVMStyle(); /// Returns a format style complying with Google's C++ style guide: - /// http://google-styleguide.googlecode.com/svn/trunk/cppguide.xml. + /// https://google-styleguide.googlecode.com/svn/trunk/cppguide.xml. FormatStyle getGoogleStyle(); /// Returns a format style complying with Chromium's style guide: diff --git a/clang/docs/PCHLayout.graffle b/clang/docs/PCHLayout.graffle --- a/clang/docs/PCHLayout.graffle +++ b/clang/docs/PCHLayout.graffle @@ -1,5 +1,5 @@ - + ActiveLayerIndex diff --git a/clang/docs/ReleaseNotes.rst b/clang/docs/ReleaseNotes.rst --- a/clang/docs/ReleaseNotes.rst +++ b/clang/docs/ReleaseNotes.rst @@ -310,7 +310,7 @@ - Removed the ``-fno-concept-satisfaction-caching`` flag. The flag was added at the time when the draft of C++20 standard did not permit caching of atomic constraints. The final standard permits such caching, see - `WG21 P2104R0 `_. + `WG21 P2104R0 `_. New Pragmas in Clang -------------------- @@ -384,13 +384,13 @@ C2x Feature Support ------------------- -- Implemented `WG14 N2674 The noreturn attribute `_. -- Implemented `WG14 N2935 Make false and true first-class language features `_. -- Implemented `WG14 N2763 Adding a fundamental type for N-bit integers `_. -- Implemented `WG14 N2775 Literal suffixes for bit-precise integers `_. +- Implemented `WG14 N2674 The noreturn attribute `_. +- Implemented `WG14 N2935 Make false and true first-class language features `_. +- Implemented `WG14 N2763 Adding a fundamental type for N-bit integers `_. +- Implemented `WG14 N2775 Literal suffixes for bit-precise integers `_. - Implemented the ``*_WIDTH`` macros to complete support for `WG14 N2412 Two's complement sign representation for C2x `_. -- Implemented `WG14 N2418 Adding the u8 character prefix `_. +- Implemented `WG14 N2418 Adding the u8 character prefix `_. - Removed support for implicit function declarations. This was a C89 feature that was removed in C99, but cannot be supported in C2x because it requires support for functions without prototypes, which no longer exist in C2x. diff --git a/clang/docs/ThinLTO.rst b/clang/docs/ThinLTO.rst --- a/clang/docs/ThinLTO.rst +++ b/clang/docs/ThinLTO.rst @@ -31,7 +31,7 @@ For more information on the ThinLTO design and current performance, see the LLVM blog post `ThinLTO: Scalable and Incremental LTO -`_. +`_. While tuning is still in progress, results in the blog post show that ThinLTO already performs well compared to LTO, in many cases matching the performance improvement. @@ -244,4 +244,4 @@ * From LLVM project blog: `ThinLTO: Scalable and Incremental LTO - `_ + `_ diff --git a/clang/docs/UndefinedBehaviorSanitizer.rst b/clang/docs/UndefinedBehaviorSanitizer.rst --- a/clang/docs/UndefinedBehaviorSanitizer.rst +++ b/clang/docs/UndefinedBehaviorSanitizer.rst @@ -365,7 +365,7 @@ `_ * From LLVM project blog: `What Every C Programmer Should Know About Undefined Behavior - `_ + `_ * From John Regehr's *Embedded in Academia* blog: `A Guide to Undefined Behavior in C and C++ `_ diff --git a/clang/docs/UsersManual.rst b/clang/docs/UsersManual.rst --- a/clang/docs/UsersManual.rst +++ b/clang/docs/UsersManual.rst @@ -2200,7 +2200,7 @@ b. [OPTIONAL] Discriminator. This is used if the sampled program was compiled with DWARF discriminator support - (http://wiki.dwarfstd.org/index.php?title=Path_Discriminators). + (https://wiki.dwarfstd.org/index.php?title=Path_Discriminators). DWARF discriminators are unsigned integer values that allow the compiler to distinguish between multiple execution paths on the same source line location. @@ -2714,7 +2714,7 @@ Controlling Debugger "Tuning" ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -While Clang generally emits standard DWARF debug info (http://dwarfstd.org), +While Clang generally emits standard DWARF debug info (https://dwarfstd.org), different debuggers may know how to take advantage of different specific DWARF features. You can "tune" the debug info for one of several different debuggers. @@ -3207,7 +3207,7 @@ work-items on the fly using hardware, which covers practically all non-GPU devices such as CPUs and DSPs, additional processing is needed for the kernels to support multiple work-item execution. For this, a 3rd party toolchain, - such as for example `POCL `_, can be used. + such as for example `POCL `_, can be used. This target does not support multiple memory segments and, therefore, the fake address space map can be added using the :ref:`-ffake-address-space-map @@ -3618,7 +3618,7 @@ - ``some_directory/bin/../include`` This directory layout is standard for any toolchain you will find on the -official `MinGW-w64 website `_. +official `MinGW-w64 website `_. Clang expects the GCC executable "gcc.exe" compiled for ``i686-w64-mingw32`` (or ``x86_64-w64-mingw32``) to be present on PATH. diff --git a/clang/docs/analyzer/checkers.rst b/clang/docs/analyzer/checkers.rst --- a/clang/docs/analyzer/checkers.rst +++ b/clang/docs/analyzer/checkers.rst @@ -2397,7 +2397,7 @@ The user can configure taint sources, sinks, and propagation rules by providing a configuration file via checker option ``alpha.security.taint.TaintPropagation:Config``. -External taint configuration is in `YAML `_ format. The taint-related options defined in the config file extend but do not override the built-in sources, rules, sinks. +External taint configuration is in `YAML `_ format. The taint-related options defined in the config file extend but do not override the built-in sources, rules, sinks. The format of the external taint configuration file is not stable, and could change without any notice even in a non-backward compatible way. For a more detailed description of configuration options, please see the :doc:`user-docs/TaintAnalysisConfiguration`. For an example see :ref:`clangsa-taint-configuration-example`. @@ -2963,4 +2963,3 @@ debug.ViewExplodedGraph """"""""""""""""""""""" View Exploded Graphs using GraphViz. - diff --git a/clang/docs/analyzer/conf.py b/clang/docs/analyzer/conf.py --- a/clang/docs/analyzer/conf.py +++ b/clang/docs/analyzer/conf.py @@ -244,4 +244,4 @@ # Example configuration for intersphinx: refer to the Python standard library. -intersphinx_mapping = {'http://docs.python.org/': None} +intersphinx_mapping = {'https://docs.python.org/': None} diff --git a/clang/docs/analyzer/user-docs/CrossTranslationUnit.rst b/clang/docs/analyzer/user-docs/CrossTranslationUnit.rst --- a/clang/docs/analyzer/user-docs/CrossTranslationUnit.rst +++ b/clang/docs/analyzer/user-docs/CrossTranslationUnit.rst @@ -194,7 +194,7 @@ $ /your/path/to/llvm-project/clang/tools/scan-build-py/bin/analyze-build --ctu analyze-build: Run 'scan-view /tmp/scan-build-2019-07-17-17-53-33-810365-7fqgWk' to examine bug reports. $ /your/path/to/llvm-project/clang/tools/scan-view/bin/scan-view /tmp/scan-build-2019-07-17-17-53-33-810365-7fqgWk - Starting scan-view at: http://127.0.0.1:8181 + Starting scan-view at: https://127.0.0.1:8181 Use Ctrl-C to exit. [6336:6431:0717/175357.633914:ERROR:browser_process_sub_thread.cc(209)] Waited 5 ms for network service Opening in existing browser session. diff --git a/clang/docs/analyzer/user-docs/TaintAnalysisConfiguration.rst b/clang/docs/analyzer/user-docs/TaintAnalysisConfiguration.rst --- a/clang/docs/analyzer/user-docs/TaintAnalysisConfiguration.rst +++ b/clang/docs/analyzer/user-docs/TaintAnalysisConfiguration.rst @@ -5,7 +5,7 @@ The Clang Static Analyzer uses taint analysis to detect security-related issues in code. The backbone of taint analysis in the Clang SA is the `GenericTaintChecker`, which the user can access via the :ref:`alpha-security-taint-TaintPropagation` checker alias and this checker has a default taint-related configuration. The built-in default settings are defined in code, and they are always in effect once the checker is enabled, either directly or via the alias. -The checker also provides a configuration interface for extending the default settings by providing a configuration file in `YAML `_ format. +The checker also provides a configuration interface for extending the default settings by providing a configuration file in `YAML `_ format. This documentation describes the syntax of the configuration file and gives the informal semantics of the configuration options. .. contents:: @@ -97,7 +97,7 @@ Configuration file syntax and semantics _______________________________________ -The configuration file should have valid `YAML `_ syntax. +The configuration file should have valid `YAML `_ syntax. The configuration file can have the following top-level keys: - Filters @@ -118,7 +118,7 @@ Filter syntax and semantics ########################### -An entry under `Filters` is a `YAML `_ object with the following mandatory keys: +An entry under `Filters` is a `YAML `_ object with the following mandatory keys: - `Name` is a string that specifies the name of a function. Encountering this function during symbolic execution the checker will sanitize taint from the memory region referred to by the given arguments or return a sanitized value. - `Args` is a list of numbers in the range of ``[-1..int_max]``. @@ -134,7 +134,7 @@ Propagation syntax and semantics ################################ -An entry under `Propagation` is a `YAML `_ object with the following mandatory keys: +An entry under `Propagation` is a `YAML `_ object with the following mandatory keys: - `Name` is a string that specifies the name of a function. Encountering this function during symbolic execution propagate taint from one or more arguments to other arguments and possibly the return value. It helps model the taint-related behavior of functions that are not analyzable otherwise. @@ -160,7 +160,7 @@ Sink syntax and semantics ######################### -An entry under `Sinks` is a `YAML `_ object with the following mandatory keys: +An entry under `Sinks` is a `YAML `_ object with the following mandatory keys: - `Name` is a string that specifies the name of a function. Encountering this function during symbolic execution will emit a taint-related diagnostic if any of the arguments specified with `Args` are tainted at the call site. - `Args` is a list of numbers in the range of ``[0..int_max]`` that indicates the indexes of arguments in the function call. diff --git a/clang/docs/conf.py b/clang/docs/conf.py --- a/clang/docs/conf.py +++ b/clang/docs/conf.py @@ -232,7 +232,7 @@ # Automatically derive the list of man pages from the contents of the command # guide subdirectory. This was copied from llvm/docs/conf.py. basedir = os.path.dirname(__file__) -man_page_authors = u'Maintained by the Clang / LLVM Team ()' +man_page_authors = u'Maintained by the Clang / LLVM Team ()' command_guide_subpath = 'CommandGuide' command_guide_path = os.path.join(basedir, command_guide_subpath) for name in os.listdir(command_guide_path): diff --git a/clang/docs/doxygen.cfg.in b/clang/docs/doxygen.cfg.in --- a/clang/docs/doxygen.cfg.in +++ b/clang/docs/doxygen.cfg.in @@ -20,7 +20,7 @@ # This tag specifies the encoding used for all characters in the config file # that follow. The default is UTF-8 which is also the encoding used for all text # before the first occurrence of this tag. Doxygen uses libiconv (or the iconv -# built into libc) for the transcoding. See http://www.gnu.org/software/libiconv +# built into libc) for the transcoding. See https://www.gnu.org/software/libiconv # for the list of possible encodings. # The default value is: UTF-8. @@ -274,7 +274,7 @@ # If the MARKDOWN_SUPPORT tag is enabled then doxygen pre-processes all comments # according to the Markdown format, which allows for more readable -# documentation. See http://daringfireball.net/projects/markdown/ for details. +# documentation. See https://daringfireball.net/projects/markdown/ for details. # The output of markdown processing is further processed by doxygen, so you can # mix doxygen, HTML, and XML commands with Markdown formatting. Disable only in # case of backward compatibilities issues. @@ -307,7 +307,7 @@ CPP_CLI_SUPPORT = NO # Set the SIP_SUPPORT tag to YES if your project consists of sip (see: -# http://www.riverbankcomputing.co.uk/software/sip/intro) sources only. Doxygen +# https://www.riverbankcomputing.co.uk/software/sip/intro) sources only. Doxygen # will parse them like normal C++ but will assume all classes use public instead # of private inheritance when no explicit protection keyword is present. # The default value is: NO. @@ -666,7 +666,7 @@ # The CITE_BIB_FILES tag can be used to specify one or more bib files containing # the reference definitions. This must be a list of .bib files. The .bib # extension is automatically appended if omitted. This requires the bibtex tool -# to be installed. See also http://en.wikipedia.org/wiki/BibTeX for more info. +# to be installed. See also https://en.wikipedia.org/wiki/BibTeX for more info. # For LaTeX the style of the bibliography can be controlled using # LATEX_BIB_STYLE. To use this feature you need bibtex and perl available in the # search path. Do not use file names with spaces, bibtex cannot handle them. See @@ -750,7 +750,7 @@ # This tag can be used to specify the character encoding of the source files # that doxygen parses. Internally doxygen uses the UTF-8 encoding. Doxygen uses # libiconv (or the iconv built into libc) for the transcoding. See the libiconv -# documentation (see: http://www.gnu.org/software/libiconv) for the list of +# documentation (see: https://www.gnu.org/software/libiconv) for the list of # possible encodings. # The default value is: UTF-8. @@ -942,7 +942,7 @@ # If the USE_HTAGS tag is set to YES then the references to source code will # point to the HTML generated by the htags(1) tool instead of doxygen built-in # source browser. The htags tool is part of GNU's global source tagging system -# (see http://www.gnu.org/software/global/global.html). You will need version +# (see https://www.gnu.org/software/global/global.html). You will need version # 4.8.6 or higher. # # To use it do the following: @@ -1085,7 +1085,7 @@ # The HTML_COLORSTYLE_HUE tag controls the color of the HTML output. Doxygen # will adjust the colors in the stylesheet and background images according to # this color. Hue is specified as an angle on a colorwheel, see -# http://en.wikipedia.org/wiki/Hue for more information. For instance the value +# https://en.wikipedia.org/wiki/Hue for more information. For instance the value # 0 represents red, 60 is yellow, 120 is green, 180 is cyan, 240 is blue, 300 # purple, and 360 is red again. # Minimum value: 0, maximum value: 359, default value: 220. @@ -1143,12 +1143,12 @@ # If the GENERATE_DOCSET tag is set to YES, additional index files will be # generated that can be used as input for Apple's Xcode 3 integrated development -# environment (see: http://developer.apple.com/tools/xcode/), introduced with +# environment (see: https://developer.apple.com/tools/xcode/), introduced with # OSX 10.5 (Leopard). To create a documentation set, doxygen will generate a # Makefile in the HTML output directory. Running make will produce the docset in # that directory and running make install will install the docset in # ~/Library/Developer/Shared/Documentation/DocSets so that Xcode will find it at -# startup. See http://developer.apple.com/tools/creatingdocsetswithdoxygen.html +# startup. See https://developer.apple.com/tools/creatingdocsetswithdoxygen.html # for more information. # The default value is: NO. # This tag requires that the tag GENERATE_HTML is set to YES. @@ -1188,7 +1188,7 @@ # If the GENERATE_HTMLHELP tag is set to YES then doxygen generates three # additional HTML index files: index.hhp, index.hhc, and index.hhk. The # index.hhp is a project file that can be read by Microsoft's HTML Help Workshop -# (see: http://www.microsoft.com/en-us/download/details.aspx?id=21138) on +# (see: https://www.microsoft.com/en-us/download/details.aspx?id=21138) on # Windows. # # The HTML Help Workshop contains a compiler that can convert all HTML output @@ -1263,7 +1263,7 @@ # The QHP_NAMESPACE tag specifies the namespace to use when generating Qt Help # Project output. For more information please see Qt Help Project / Namespace -# (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#namespace). +# (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#namespace). # The default value is: org.doxygen.Project. # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1271,7 +1271,7 @@ # The QHP_VIRTUAL_FOLDER tag specifies the namespace to use when generating Qt # Help Project output. For more information please see Qt Help Project / Virtual -# Folders (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#virtual- +# Folders (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#virtual- # folders). # The default value is: doc. # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1280,7 +1280,7 @@ # If the QHP_CUST_FILTER_NAME tag is set, it specifies the name of a custom # filter to add. For more information please see Qt Help Project / Custom -# Filters (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- +# Filters (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- # filters). # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1288,7 +1288,7 @@ # The QHP_CUST_FILTER_ATTRS tag specifies the list of the attributes of the # custom filter to add. For more information please see Qt Help Project / Custom -# Filters (see: http://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- +# Filters (see: https://qt-project.org/doc/qt-4.8/qthelpproject.html#custom- # filters). # This tag requires that the tag GENERATE_QHP is set to YES. @@ -1296,7 +1296,7 @@ # The QHP_SECT_FILTER_ATTRS tag specifies the list of the attributes this # project's filter section matches. Qt Help Project / Filter Attributes (see: -# http://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes). +# https://qt-project.org/doc/qt-4.8/qthelpproject.html#filter-attributes). # This tag requires that the tag GENERATE_QHP is set to YES. QHP_SECT_FILTER_ATTRS = @@ -1401,7 +1401,7 @@ FORMULA_TRANSPARENT = YES # Enable the USE_MATHJAX option to render LaTeX formulas using MathJax (see -# http://www.mathjax.org) which uses client side Javascript for the rendering +# https://www.mathjax.org) which uses client side Javascript for the rendering # instead of using prerendered bitmaps. Use this if you do not have LaTeX # installed or if you want to formulas look prettier in the HTML output. When # enabled you may also need to install MathJax separately and configure the path @@ -1413,7 +1413,7 @@ # When MathJax is enabled you can set the default output format to be used for # the MathJax output. See the MathJax site (see: -# http://docs.mathjax.org/en/latest/output.html) for more details. +# https://docs.mathjax.org/en/latest/output.html) for more details. # Possible values are: HTML-CSS (which is slower, but has the best # compatibility), NativeMML (i.e. MathML) and SVG. # The default value is: HTML-CSS. @@ -1428,11 +1428,11 @@ # MATHJAX_RELPATH should be ../mathjax. The default value points to the MathJax # Content Delivery Network so you can quickly see the result without installing # MathJax. However, it is strongly recommended to install a local copy of -# MathJax from http://www.mathjax.org before deployment. -# The default value is: http://cdn.mathjax.org/mathjax/latest. +# MathJax from https://www.mathjax.org before deployment. +# The default value is: https://cdn.mathjax.org/mathjax/latest. # This tag requires that the tag USE_MATHJAX is set to YES. -MATHJAX_RELPATH = http://cdn.mathjax.org/mathjax/latest +MATHJAX_RELPATH = https://cdn.mathjax.org/mathjax/latest # The MATHJAX_EXTENSIONS tag can be used to specify one or more MathJax # extension names that should be enabled during MathJax rendering. For example @@ -1443,7 +1443,7 @@ # The MATHJAX_CODEFILE tag can be used to specify a file with javascript pieces # of code that will be used on startup of the MathJax code. See the MathJax site -# (see: http://docs.mathjax.org/en/latest/output.html) for more details. For an +# (see: https://docs.mathjax.org/en/latest/output.html) for more details. For an # example see the documentation. # This tag requires that the tag USE_MATHJAX is set to YES. @@ -1490,7 +1490,7 @@ # # Doxygen ships with an example indexer ( doxyindexer) and search engine # (doxysearch.cgi) which are based on the open source search engine library -# Xapian (see: http://xapian.org/). +# Xapian (see: https://xapian.org/). # # See the section "External Indexing and Searching" for details. # The default value is: NO. @@ -1503,7 +1503,7 @@ # # Doxygen ships with an example indexer ( doxyindexer) and search engine # (doxysearch.cgi) which are based on the open source search engine library -# Xapian (see: http://xapian.org/). See the section "External Indexing and +# Xapian (see: https://xapian.org/). See the section "External Indexing and # Searching" for details. # This tag requires that the tag SEARCHENGINE is set to YES. @@ -1674,7 +1674,7 @@ # The LATEX_BIB_STYLE tag can be used to specify the style to use for the # bibliography, e.g. plainnat, or ieeetr. See -# http://en.wikipedia.org/wiki/BibTeX and \cite for more info. +# https://en.wikipedia.org/wiki/BibTeX and \cite for more info. # The default value is: plain. # This tag requires that the tag GENERATE_LATEX is set to YES. @@ -1823,7 +1823,7 @@ #--------------------------------------------------------------------------- # If the GENERATE_AUTOGEN_DEF tag is set to YES doxygen will generate an AutoGen -# Definitions (see http://autogen.sf.net) file that captures the structure of +# Definitions (see https://autogen.sf.net) file that captures the structure of # the code including all documentation. Note that this feature is still # experimental and incomplete at the moment. # The default value is: NO. @@ -2012,7 +2012,7 @@ # You can define message sequence charts within doxygen comments using the \msc # command. Doxygen will then run the mscgen tool (see: -# http://www.mcternan.me.uk/mscgen/)) to produce the chart and insert it in the +# https://www.mcternan.me.uk/mscgen/)) to produce the chart and insert it in the # documentation. The MSCGEN_PATH tag allows you to specify the directory where # the mscgen tool resides. If left empty the tool is assumed to be found in the # default search path. @@ -2034,7 +2034,7 @@ # If you set the HAVE_DOT tag to YES then doxygen will assume the dot tool is # available from the path. This tool is part of Graphviz (see: -# http://www.graphviz.org/), a graph visualization toolkit from AT&T and Lucent +# https://www.graphviz.org/), a graph visualization toolkit from AT&T and Lucent # Bell Labs. The other options in this section have no effect if this option is # set to NO # The default value is: NO. diff --git a/clang/include/clang-c/Documentation.h b/clang/include/clang-c/Documentation.h --- a/clang/include/clang-c/Documentation.h +++ b/clang/include/clang-c/Documentation.h @@ -75,7 +75,7 @@ * * For example: * \verbatim - *

+ *

* \endverbatim */ CXComment_HTMLStartTag = 3, @@ -552,4 +552,3 @@ LLVM_CLANG_C_EXTERN_C_END #endif /* CLANG_C_DOCUMENTATION_H */ - diff --git a/clang/include/clang/AST/CommentHTMLNamedCharacterReferences.td b/clang/include/clang/AST/CommentHTMLNamedCharacterReferences.td --- a/clang/include/clang/AST/CommentHTMLNamedCharacterReferences.td +++ b/clang/include/clang/AST/CommentHTMLNamedCharacterReferences.td @@ -5,12 +5,12 @@ } // The list below includes named character references supported by Doxygen: -// http://www.stack.nl/~dimitri/doxygen/manual/htmlcmds.html +// https://www.stack.nl/~dimitri/doxygen/manual/htmlcmds.html // // It does not include all HTML 5 named character references. // // Corresponding code point values can be found here: -// http://www.w3.org/TR/2011/WD-html5-20110113/named-character-references.html +// https://www.w3.org/TR/2011/WD-html5-20110113/named-character-references.html def : NCR<"copy", 0x000A9>; def : NCR<"COPY", 0x000A9>; @@ -174,4 +174,3 @@ def : NCR<"rceil", 0x02309>; def : NCR<"lfloor", 0x0230A>; def : NCR<"rfloor", 0x0230B>; - diff --git a/clang/include/clang/AST/Expr.h b/clang/include/clang/AST/Expr.h --- a/clang/include/clang/AST/Expr.h +++ b/clang/include/clang/AST/Expr.h @@ -762,7 +762,7 @@ /// expression that is not a simple, possibly parenthesized, zero literal. /// C++ Core Issue 903 will classify these expressions as "not pointers" /// once it is adopted. - /// http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#903 + /// https://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#903 NPCK_ZeroExpression, /// Expression is a Null pointer constant built from a literal zero. diff --git a/clang/include/clang/AST/FormatString.h b/clang/include/clang/AST/FormatString.h --- a/clang/include/clang/AST/FormatString.h +++ b/clang/include/clang/AST/FormatString.h @@ -403,7 +403,7 @@ /// Positional arguments, an IEEE extension: /// IEEE Std 1003.1, 2004 Edition - /// http://www.opengroup.org/onlinepubs/009695399/functions/printf.html + /// https://www.opengroup.org/onlinepubs/009695399/functions/printf.html bool UsesPositionalArg; unsigned argIndex; public: diff --git a/clang/include/clang/AST/RecursiveASTVisitor.h b/clang/include/clang/AST/RecursiveASTVisitor.h --- a/clang/include/clang/AST/RecursiveASTVisitor.h +++ b/clang/include/clang/AST/RecursiveASTVisitor.h @@ -2318,7 +2318,7 @@ // though sometimes the range is empty). Each individual Traverse* // method only needs to worry about children other than those. To see // what children() does for a given class, see, e.g., -// http://clang.llvm.org/doxygen/Stmt_8cpp_source.html +// https://clang.llvm.org/doxygen/Stmt_8cpp_source.html // This macro makes available a variable S, the passed-in stmt. #define DEF_TRAVERSE_STMT(STMT, CODE) \ @@ -3831,9 +3831,9 @@ // create new types, and recurse on the types (TypeLocs?) of those. // Candidates: // -// http://clang.llvm.org/doxygen/classclang_1_1CXXTypeidExpr.html -// http://clang.llvm.org/doxygen/classclang_1_1UnaryExprOrTypeTraitExpr.html -// http://clang.llvm.org/doxygen/classclang_1_1TypesCompatibleExpr.html +// https://clang.llvm.org/doxygen/classclang_1_1CXXTypeidExpr.html +// https://clang.llvm.org/doxygen/classclang_1_1UnaryExprOrTypeTraitExpr.html +// https://clang.llvm.org/doxygen/classclang_1_1TypesCompatibleExpr.html // Every class that has getQualifier. #undef DEF_TRAVERSE_STMT diff --git a/clang/include/clang/Basic/AttrDocs.td b/clang/include/clang/Basic/AttrDocs.td --- a/clang/include/clang/Basic/AttrDocs.td +++ b/clang/include/clang/Basic/AttrDocs.td @@ -144,7 +144,7 @@ after the standard ``.CRT$XCU`` sections. See the init_seg_ documentation on MSDN for more information. -.. _init_seg: http://msdn.microsoft.com/en-us/library/7977wcck(v=vs.110).aspx +.. _init_seg: https://msdn.microsoft.com/en-us/library/7977wcck(v=vs.110).aspx }]; } @@ -202,7 +202,7 @@ storage. It is available under the ``-fms-extensions`` flag for MSVC compatibility. See the documentation for `__declspec(thread)`_ on MSDN. -.. _`__declspec(thread)`: http://msdn.microsoft.com/en-us/library/9w1sdazb.aspx +.. _`__declspec(thread)`: https://msdn.microsoft.com/en-us/library/9w1sdazb.aspx In Clang, ``__declspec(thread)`` is generally equivalent in functionality to the GNU ``__thread`` keyword. The variable must not have a destructor and must have @@ -685,7 +685,7 @@ is used to control the placement of instantiated templates and compiler-generated code. See the documentation for `__declspec(code_seg)`_ on MSDN. -.. _`__declspec(code_seg)`: http://msdn.microsoft.com/en-us/library/dn636922.aspx +.. _`__declspec(code_seg)`: https://msdn.microsoft.com/en-us/library/dn636922.aspx }]; } @@ -1670,7 +1670,7 @@ #pragma clang attribute pop Also see the documentation for `@available -`_ +`_ }]; } @@ -1737,7 +1737,7 @@ let Heading = "require_constant_initialization, constinit (C++20)"; let Content = [{ This attribute specifies that the variable to which it is attached is intended -to have a `constant initializer `_ +to have a `constant initializer `_ according to the rules of [basic.start.static]. The variable is required to have static or thread storage duration. If the initialization of the variable is not a constant initializer an error will be produced. This attribute may @@ -2618,7 +2618,7 @@ x86_64 targets. This calling convention is used widely by the Windows API and COM applications. See the documentation for `__stdcall`_ on MSDN. -.. _`__stdcall`: http://msdn.microsoft.com/en-us/library/zxk0tw93.aspx +.. _`__stdcall`: https://msdn.microsoft.com/en-us/library/zxk0tw93.aspx }]; } @@ -2633,7 +2633,7 @@ seeking register parameters should use the ``regparm`` attribute, which does not require callee-cleanup. See the documentation for `__fastcall`_ on MSDN. -.. _`__fastcall`: http://msdn.microsoft.com/en-us/library/6xa169sk.aspx +.. _`__fastcall`: https://msdn.microsoft.com/en-us/library/6xa169sk.aspx }]; } @@ -2659,7 +2659,7 @@ has no effect on x86_64 targets. See the documentation for `__thiscall`_ on MSDN. -.. _`__thiscall`: http://msdn.microsoft.com/en-us/library/ek8tkfbw.aspx +.. _`__thiscall`: https://msdn.microsoft.com/en-us/library/ek8tkfbw.aspx }]; } @@ -2685,7 +2685,7 @@ See the documentation for `__vectorcall`_ on MSDN for more details. -.. _`__vectorcall`: http://msdn.microsoft.com/en-us/library/dn375768.aspx +.. _`__vectorcall`: https://msdn.microsoft.com/en-us/library/dn375768.aspx }]; } @@ -3092,7 +3092,7 @@ arguments or a ``va_list`` that contains these arguments. Please see `GCC documentation about format attribute -`_ to find details +`_ to find details about attribute syntax. Clang implements two kinds of checks with this attribute. @@ -3330,7 +3330,7 @@ }; This attribute is inspired by the C++ committee paper `P0936R0 -`_, but does not affect whether temporary objects +`_, but does not affect whether temporary objects have their lifetimes extended. }]; } @@ -3466,7 +3466,7 @@ be enabled or disabled. Vector width, vector predication, interleave count, unrolling count, and the initiation interval for pipelining can be explicitly specified. See `language extensions -`_ +`_ for details. }]; } @@ -3523,7 +3523,7 @@ ``#pragma clang loop unroll_count(_value_)`` respectively. ``#pragma nounroll`` is equivalent to ``#pragma clang loop unroll(disable)``. See `language extensions -`_ +`_ for further details including limitations of the unroll hints. }]; } @@ -5604,7 +5604,7 @@ the callback attribute. The ``callback`` attribute, which is directly translated to ``callback`` -metadata , make the +metadata , make the connection between the call to the annotated function and the callback callee. This can enable interprocedural optimizations which were otherwise impossible. If a function parameter is mentioned in the ``callback`` attribute, through its diff --git a/clang/include/clang/Basic/PlistSupport.h b/clang/include/clang/Basic/PlistSupport.h --- a/clang/include/clang/Basic/PlistSupport.h +++ b/clang/include/clang/Basic/PlistSupport.h @@ -63,7 +63,7 @@ static const char *PlistHeader = "\n" "\n" + "\"https://www.apple.com/DTDs/PropertyList-1.0.dtd\">\n" "\n"; return o << PlistHeader; } diff --git a/clang/include/clang/Basic/TargetCXXABI.def b/clang/include/clang/Basic/TargetCXXABI.def --- a/clang/include/clang/Basic/TargetCXXABI.def +++ b/clang/include/clang/Basic/TargetCXXABI.def @@ -29,7 +29,7 @@ /// many compilers, including Clang and GCC. /// /// It is documented here: -/// http://www.codesourcery.com/public/cxx-abi/ +/// https://www.codesourcery.com/public/cxx-abi/ ITANIUM_CXXABI(GenericItanium, "itanium") /// The generic ARM ABI is a modified version of the Itanium ABI @@ -46,7 +46,7 @@ /// - and more! /// /// It is documented here: -/// http://infocenter.arm.com +/// https://infocenter.arm.com /// /help/topic/com.arm.doc.ihi0041c/IHI0041C_cppabi.pdf ITANIUM_CXXABI(GenericARM, "arm") @@ -65,7 +65,7 @@ /// ABI more closely, but we don't guarantee to follow it perfectly. /// /// It is documented here: -/// http://infocenter.arm.com +/// https://infocenter.arm.com /// /help/topic/com.arm.doc.ihi0059a/IHI0059A_cppabi64.pdf ITANIUM_CXXABI(AppleARM64, "applearm64") diff --git a/clang/include/clang/Basic/TargetInfo.h b/clang/include/clang/Basic/TargetInfo.h --- a/clang/include/clang/Basic/TargetInfo.h +++ b/clang/include/clang/Basic/TargetInfo.h @@ -275,11 +275,11 @@ VoidPtrBuiltinVaList, /// __builtin_va_list as defined by the AArch64 ABI - /// http://infocenter.arm.com/help/topic/com.arm.doc.ihi0055a/IHI0055A_aapcs64.pdf + /// https://infocenter.arm.com/help/topic/com.arm.doc.ihi0055a/IHI0055A_aapcs64.pdf AArch64ABIBuiltinVaList, /// __builtin_va_list as defined by the PNaCl ABI: - /// http://www.chromium.org/nativeclient/pnacl/bitcode-abi#TOC-Machine-Types + /// https://www.chromium.org/nativeclient/pnacl/bitcode-abi#TOC-Machine-Types PNaClABIBuiltinVaList, /// __builtin_va_list as defined by the Power ABI: @@ -288,11 +288,11 @@ PowerABIBuiltinVaList, /// __builtin_va_list as defined by the x86-64 ABI: - /// http://refspecs.linuxbase.org/elf/x86_64-abi-0.21.pdf + /// https://refspecs.linuxbase.org/elf/x86_64-abi-0.21.pdf X86_64ABIBuiltinVaList, /// __builtin_va_list as defined by ARM AAPCS ABI - /// http://infocenter.arm.com + /// https://infocenter.arm.com // /help/topic/com.arm.doc.ihi0042d/IHI0042D_aapcs.pdf AAPCSABIBuiltinVaList, diff --git a/clang/include/clang/Format/Format.h b/clang/include/clang/Format/Format.h --- a/clang/include/clang/Format/Format.h +++ b/clang/include/clang/Format/Format.h @@ -4030,18 +4030,18 @@ }; /// Returns a format style complying with the LLVM coding standards: -/// http://llvm.org/docs/CodingStandards.html. +/// https://llvm.org/docs/CodingStandards.html. FormatStyle getLLVMStyle( FormatStyle::LanguageKind Language = FormatStyle::LanguageKind::LK_Cpp); /// Returns a format style complying with one of Google's style guides: -/// http://google-styleguide.googlecode.com/svn/trunk/cppguide.xml. -/// http://google-styleguide.googlecode.com/svn/trunk/javascriptguide.xml. +/// https://google-styleguide.googlecode.com/svn/trunk/cppguide.xml. +/// https://google-styleguide.googlecode.com/svn/trunk/javascriptguide.xml. /// https://developers.google.com/protocol-buffers/docs/style. FormatStyle getGoogleStyle(FormatStyle::LanguageKind Language); /// Returns a format style complying with Chromium's style guide: -/// http://www.chromium.org/developers/coding-style. +/// https://www.chromium.org/developers/coding-style. FormatStyle getChromiumStyle(FormatStyle::LanguageKind Language); /// Returns a format style complying with Mozilla's style guide: @@ -4049,11 +4049,11 @@ FormatStyle getMozillaStyle(); /// Returns a format style complying with Webkit's style guide: -/// http://www.webkit.org/coding/coding-style.html +/// https://www.webkit.org/coding/coding-style.html FormatStyle getWebKitStyle(); /// Returns a format style complying with GNU Coding Standards: -/// http://www.gnu.org/prep/standards/standards.html +/// https://www.gnu.org/prep/standards/standards.html FormatStyle getGNUStyle(); /// Returns a format style complying with Microsoft style guide: diff --git a/clang/include/clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h b/clang/include/clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h --- a/clang/include/clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h +++ b/clang/include/clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h @@ -1062,7 +1062,7 @@ // some those that are in the standard library, like the no-throw or align_val // versions. // Some pointers: -// http://lists.llvm.org/pipermail/cfe-dev/2020-April/065080.html +// https://lists.llvm.org/pipermail/cfe-dev/2020-April/065080.html // clang/test/Analysis/cxx-dynamic-memory-analysis-order.cpp // clang/unittests/StaticAnalyzer/CallEventTest.cpp class CXXDeallocatorCall : public AnyFunctionCall { diff --git a/clang/include/clang/StaticAnalyzer/Core/PathSensitive/ExplodedGraph.h b/clang/include/clang/StaticAnalyzer/Core/PathSensitive/ExplodedGraph.h --- a/clang/include/clang/StaticAnalyzer/Core/PathSensitive/ExplodedGraph.h +++ b/clang/include/clang/StaticAnalyzer/Core/PathSensitive/ExplodedGraph.h @@ -10,7 +10,7 @@ // which represent a path-sensitive, intra-procedural "exploded graph." // See "Precise interprocedural dataflow analysis via graph reachability" // by Reps, Horwitz, and Sagiv -// (http://portal.acm.org/citation.cfm?id=199462) for the definition of an +// (https://portal.acm.org/citation.cfm?id=199462) for the definition of an // exploded graph. // //===----------------------------------------------------------------------===// diff --git a/clang/include/clang/StaticAnalyzer/Frontend/CheckerRegistry.h b/clang/include/clang/StaticAnalyzer/Frontend/CheckerRegistry.h --- a/clang/include/clang/StaticAnalyzer/Frontend/CheckerRegistry.h +++ b/clang/include/clang/StaticAnalyzer/Frontend/CheckerRegistry.h @@ -128,7 +128,7 @@ void addChecker(StringRef FullName, StringRef Desc, StringRef DocsUri, bool IsHidden = false) { // Avoid MSVC's Compiler Error C2276: - // http://msdn.microsoft.com/en-us/library/850cstw1(v=VS.80).aspx + // https://msdn.microsoft.com/en-us/library/850cstw1(v=VS.80).aspx addChecker(&CheckerRegistry::initializeManager, &CheckerRegistry::returnTrue, FullName, Desc, DocsUri, IsHidden); diff --git a/clang/include/clang/Tooling/CommonOptionsParser.h b/clang/include/clang/Tooling/CommonOptionsParser.h --- a/clang/include/clang/Tooling/CommonOptionsParser.h +++ b/clang/include/clang/Tooling/CommonOptionsParser.h @@ -18,7 +18,7 @@ // It creates a CompilationDatabase and reads common command-line options. // // This class uses the Clang Tooling infrastructure, see -// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html // for details on setting it up with LLVM source tree. // //===----------------------------------------------------------------------===// diff --git a/clang/lib/AST/ASTContext.cpp b/clang/lib/AST/ASTContext.cpp --- a/clang/lib/AST/ASTContext.cpp +++ b/clang/lib/AST/ASTContext.cpp @@ -11335,7 +11335,7 @@ static GVALinkage adjustGVALinkageForAttributes(const ASTContext &Context, const Decl *D, GVALinkage L) { - // See http://msdn.microsoft.com/en-us/library/xa0d9ste.aspx + // See https://msdn.microsoft.com/en-us/library/xa0d9ste.aspx // dllexport/dllimport on inline functions. if (D->hasAttr()) { if (L == GVA_DiscardableODR || L == GVA_StrongODR) diff --git a/clang/lib/AST/ExprConstant.cpp b/clang/lib/AST/ExprConstant.cpp --- a/clang/lib/AST/ExprConstant.cpp +++ b/clang/lib/AST/ExprConstant.cpp @@ -2331,7 +2331,7 @@ // static const foo_t x = {{0}}; // because "i" is a subobject with non-literal initialization (due to the // volatile member of the union). See: - // http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#1677 + // https://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#1677 // Therefore, we use the C++1y behavior. if (This && Info.EvaluatingDecl == This->getLValueBase()) return true; diff --git a/clang/lib/AST/ItaniumCXXABI.cpp b/clang/lib/AST/ItaniumCXXABI.cpp --- a/clang/lib/AST/ItaniumCXXABI.cpp +++ b/clang/lib/AST/ItaniumCXXABI.cpp @@ -8,11 +8,11 @@ // // This provides C++ AST support targeting the Itanium C++ ABI, which is // documented at: -// http://www.codesourcery.com/public/cxx-abi/abi.html -// http://www.codesourcery.com/public/cxx-abi/abi-eh.html +// https://www.codesourcery.com/public/cxx-abi/abi.html +// https://www.codesourcery.com/public/cxx-abi/abi-eh.html // // It also supports the closely-related ARM C++ ABI, documented at: -// http://infocenter.arm.com/help/topic/com.arm.doc.ihi0041c/IHI0041C_cppabi.pdf +// https://infocenter.arm.com/help/topic/com.arm.doc.ihi0041c/IHI0041C_cppabi.pdf // //===----------------------------------------------------------------------===// diff --git a/clang/lib/AST/ItaniumMangle.cpp b/clang/lib/AST/ItaniumMangle.cpp --- a/clang/lib/AST/ItaniumMangle.cpp +++ b/clang/lib/AST/ItaniumMangle.cpp @@ -10,7 +10,7 @@ // which is used in GCC 3.2 and newer (and many compilers that are // ABI-compatible with GCC): // -// http://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangling +// https://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangling // //===----------------------------------------------------------------------===// @@ -5577,7 +5577,7 @@ DiagnosticsEngine &Diags, const FieldDecl *FD) { // According to: - // http://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangling.anonymous + // https://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangling.anonymous // For the purposes of mangling, the name of an anonymous union is considered // to be the name of the first named data member found by a pre-order, // depth-first, declaration-order walk of the data members of the anonymous diff --git a/clang/lib/AST/RecordLayoutBuilder.cpp b/clang/lib/AST/RecordLayoutBuilder.cpp --- a/clang/lib/AST/RecordLayoutBuilder.cpp +++ b/clang/lib/AST/RecordLayoutBuilder.cpp @@ -2402,7 +2402,7 @@ // rules, we should implement the restrictions about over-sized // bitfields: // - // http://itanium-cxx-abi.github.io/cxx-abi/abi.html#POD : + // https://itanium-cxx-abi.github.io/cxx-abi/abi.html#POD : // In general, a type is considered a POD for the purposes of // layout if it is a POD type (in the sense of ISO C++ // [basic.types]). However, a POD-struct or POD-union (in the diff --git a/clang/lib/Analysis/CFG.cpp b/clang/lib/Analysis/CFG.cpp --- a/clang/lib/Analysis/CFG.cpp +++ b/clang/lib/Analysis/CFG.cpp @@ -3585,7 +3585,7 @@ CFGBlock *CFGBuilder::VisitObjCForCollectionStmt(ObjCForCollectionStmt *S) { // Objective-C fast enumeration 'for' statements: - // http://developer.apple.com/documentation/Cocoa/Conceptual/ObjectiveC + // https://developer.apple.com/documentation/Cocoa/Conceptual/ObjectiveC // // for ( Type newVariable in collection_expression ) { statements } // diff --git a/clang/lib/Analysis/RetainSummaryManager.cpp b/clang/lib/Analysis/RetainSummaryManager.cpp --- a/clang/lib/Analysis/RetainSummaryManager.cpp +++ b/clang/lib/Analysis/RetainSummaryManager.cpp @@ -1243,7 +1243,7 @@ // self-own themselves. However, they only do this once they are displayed. // Thus, we need to track an NSWindow's display status. // This is tracked in . - // See also http://llvm.org/bugs/show_bug.cgi?id=3714. + // See also https://llvm.org/bugs/show_bug.cgi?id=3714. const RetainSummary *NoTrackYet = getPersistentSummary(RetEffect::MakeNoRet(), ScratchArgs, ArgEffect(StopTracking), ArgEffect(StopTracking)); diff --git a/clang/lib/Analysis/ThreadSafety.cpp b/clang/lib/Analysis/ThreadSafety.cpp --- a/clang/lib/Analysis/ThreadSafety.cpp +++ b/clang/lib/Analysis/ThreadSafety.cpp @@ -9,7 +9,7 @@ // A intra-procedural analysis for thread safety (e.g. deadlocks and race // conditions), based off of an annotation system. // -// See http://clang.llvm.org/docs/ThreadSafetyAnalysis.html +// See https://clang.llvm.org/docs/ThreadSafetyAnalysis.html // for more information. // //===----------------------------------------------------------------------===// diff --git a/clang/lib/Basic/SourceManager.cpp b/clang/lib/Basic/SourceManager.cpp --- a/clang/lib/Basic/SourceManager.cpp +++ b/clang/lib/Basic/SourceManager.cpp @@ -78,7 +78,7 @@ const char *ContentCache::getInvalidBOM(StringRef BufStr) { // If the buffer is valid, check to see if it has a UTF Byte Order Mark // (BOM). We only support UTF-8 with and without a BOM right now. See - // http://en.wikipedia.org/wiki/Byte_order_mark for more information. + // https://en.wikipedia.org/wiki/Byte_order_mark for more information. const char *InvalidBOM = llvm::StringSwitch(BufStr) .StartsWith(llvm::StringLiteral::withInnerNUL("\x00\x00\xFE\xFF"), @@ -172,7 +172,7 @@ // If the buffer is valid, check to see if it has a UTF Byte Order Mark // (BOM). We only support UTF-8 with and without a BOM right now. See - // http://en.wikipedia.org/wiki/Byte_order_mark for more information. + // https://en.wikipedia.org/wiki/Byte_order_mark for more information. StringRef BufStr = Buffer->getBuffer(); const char *InvalidBOM = getInvalidBOM(BufStr); @@ -1253,7 +1253,7 @@ // Check if mutli-byte word x has bytes between m and n, included. This may also // catch bytes equal to n + 1. // The returned value holds a 0x80 at each byte position that holds a match. -// see http://graphics.stanford.edu/~seander/bithacks.html#HasBetweenInWord +// see https://graphics.stanford.edu/~seander/bithacks.html#HasBetweenInWord template static constexpr inline T likelyhasbetween(T x, unsigned char m, unsigned char n) { diff --git a/clang/lib/Basic/Targets/PPC.h b/clang/lib/Basic/Targets/PPC.h --- a/clang/lib/Basic/Targets/PPC.h +++ b/clang/lib/Basic/Targets/PPC.h @@ -487,7 +487,7 @@ : DarwinTargetInfo(Triple, Opts) { HasAlignMac68kSupport = true; BoolWidth = BoolAlign = 32; // XXX support -mone-byte-bool? - PtrDiffType = SignedInt; // for http://llvm.org/bugs/show_bug.cgi?id=15726 + PtrDiffType = SignedInt; // for https://llvm.org/bugs/show_bug.cgi?id=15726 LongLongAlign = 32; resetDataLayout("E-m:o-p:32:32-f64:32:64-n32", "_"); } diff --git a/clang/lib/Basic/Targets/TCE.h b/clang/lib/Basic/Targets/TCE.h --- a/clang/lib/Basic/Targets/TCE.h +++ b/clang/lib/Basic/Targets/TCE.h @@ -27,7 +27,7 @@ // // TCE uses the llvm bitcode as input and uses it for generating customized // target processor and program binary. TCE co-design environment is -// publicly available in http://tce.cs.tut.fi +// publicly available in https://tce.cs.tut.fi static const unsigned TCEOpenCLAddrSpaceMap[] = { 0, // Default diff --git a/clang/lib/Basic/Targets/X86.cpp b/clang/lib/Basic/Targets/X86.cpp --- a/clang/lib/Basic/Targets/X86.cpp +++ b/clang/lib/Basic/Targets/X86.cpp @@ -1278,7 +1278,7 @@ // | Processor Name | Cache Line Size (Bytes) | Source | // +------------------------------------+-------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------+ // | i386 | 64 | https://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-optimization-manual.pdf | -// | i486 | 16 | "four doublewords" (doubleword = 32 bits, 4 bits * 32 bits = 16 bytes) https://en.wikichip.org/w/images/d/d3/i486_MICROPROCESSOR_HARDWARE_REFERENCE_MANUAL_%281990%29.pdf and http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.126.4216&rep=rep1&type=pdf (page 29) | +// | i486 | 16 | "four doublewords" (doubleword = 32 bits, 4 bits * 32 bits = 16 bytes) https://en.wikichip.org/w/images/d/d3/i486_MICROPROCESSOR_HARDWARE_REFERENCE_MANUAL_%281990%29.pdf and https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.126.4216&rep=rep1&type=pdf (page 29) | // | i586/Pentium MMX | 32 | https://www.7-cpu.com/cpu/P-MMX.html | // | i686/Pentium | 32 | https://www.7-cpu.com/cpu/P6.html | // | Netburst/Pentium4 | 64 | https://www.7-cpu.com/cpu/P4-180.html | diff --git a/clang/lib/CodeGen/CGAtomic.cpp b/clang/lib/CodeGen/CGAtomic.cpp --- a/clang/lib/CodeGen/CGAtomic.cpp +++ b/clang/lib/CodeGen/CGAtomic.cpp @@ -988,7 +988,7 @@ Dest = Atomics.emitCastToAtomicIntPointer(Dest); } - // Use a library call. See: http://gcc.gnu.org/wiki/Atomic/GCCMM/LIbrary . + // Use a library call. See: https://gcc.gnu.org/wiki/Atomic/GCCMM/LIbrary . if (UseLibcall) { bool UseOptimizedLibcall = false; switch (E->getOp()) { diff --git a/clang/lib/CodeGen/CGBuiltin.cpp b/clang/lib/CodeGen/CGBuiltin.cpp --- a/clang/lib/CodeGen/CGBuiltin.cpp +++ b/clang/lib/CodeGen/CGBuiltin.cpp @@ -3727,7 +3727,7 @@ // addressing, we need to make sure we zext / sext based on // the platform's expectations. // - // See: http://gcc.gnu.org/ml/gcc-bugs/2002-02/msg00237.html + // See: https://gcc.gnu.org/ml/gcc-bugs/2002-02/msg00237.html // Cast the pointer to intptr_t. Value *Ptr = EmitScalarExpr(E->getArg(0)); diff --git a/clang/lib/CodeGen/CGCall.cpp b/clang/lib/CodeGen/CGCall.cpp --- a/clang/lib/CodeGen/CGCall.cpp +++ b/clang/lib/CodeGen/CGCall.cpp @@ -2800,7 +2800,7 @@ // Prepare parameter attributes. So far, only attributes for pointer // parameters are prepared. See - // http://llvm.org/docs/LangRef.html#paramattrs. + // https://llvm.org/docs/LangRef.html#paramattrs. if (ArgI.getDirectOffset() == 0 && LTy->isPointerTy() && ArgI.getCoerceToType()->isPointerTy()) { assert(NumIRArgs == 1); diff --git a/clang/lib/CodeGen/CGException.cpp b/clang/lib/CodeGen/CGException.cpp --- a/clang/lib/CodeGen/CGException.cpp +++ b/clang/lib/CodeGen/CGException.cpp @@ -628,7 +628,7 @@ // semantics for pointers. Unfortunately, this is what all // existing compilers do, and it's not clear that the standard // personality routine is capable of doing this right. See C++ DR 388: - // http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#388 + // https://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#388 Qualifiers CaughtTypeQuals; QualType CaughtType = CGM.getContext().getUnqualifiedArrayType( C->getCaughtType().getNonReferenceType(), CaughtTypeQuals); diff --git a/clang/lib/CodeGen/CodeGenModule.cpp b/clang/lib/CodeGen/CodeGenModule.cpp --- a/clang/lib/CodeGen/CodeGenModule.cpp +++ b/clang/lib/CodeGen/CodeGenModule.cpp @@ -4953,7 +4953,7 @@ // selectany symbols are externally visible, so use weak instead of // linkonce. MSVC optimizes away references to const selectany globals, so // all definitions should be the same and ODR linkage should be used. - // http://msdn.microsoft.com/en-us/library/5tkz6s71.aspx + // https://msdn.microsoft.com/en-us/library/5tkz6s71.aspx if (D->hasAttr()) return llvm::GlobalVariable::WeakODRLinkage; diff --git a/clang/lib/CodeGen/TargetInfo.cpp b/clang/lib/CodeGen/TargetInfo.cpp --- a/clang/lib/CodeGen/TargetInfo.cpp +++ b/clang/lib/CodeGen/TargetInfo.cpp @@ -8446,7 +8446,7 @@ } //===----------------------------------------------------------------------===// -// TCE ABI Implementation (see http://tce.cs.tut.fi). Uses mostly the defaults. +// TCE ABI Implementation (see https://tce.cs.tut.fi). Uses mostly the defaults. // Currently subclassed only to implement custom OpenCL C function attribute // handling. //===----------------------------------------------------------------------===// diff --git a/clang/lib/DirectoryWatcher/linux/DirectoryWatcher-linux.cpp b/clang/lib/DirectoryWatcher/linux/DirectoryWatcher-linux.cpp --- a/clang/lib/DirectoryWatcher/linux/DirectoryWatcher-linux.cpp +++ b/clang/lib/DirectoryWatcher/linux/DirectoryWatcher-linux.cpp @@ -177,7 +177,7 @@ // (obscenely long filenames). constexpr size_t EventBufferLength = 30 * (sizeof(struct inotify_event) + NAME_MAX + 1); - // http://man7.org/linux/man-pages/man7/inotify.7.html + // https://man7.org/linux/man-pages/man7/inotify.7.html // Some systems cannot read integer variables if they are not // properly aligned. On other systems, incorrect alignment may // decrease performance. Hence, the buffer used for reading from diff --git a/clang/lib/Driver/ToolChains/Cuda.cpp b/clang/lib/Driver/ToolChains/Cuda.cpp --- a/clang/lib/Driver/ToolChains/Cuda.cpp +++ b/clang/lib/Driver/ToolChains/Cuda.cpp @@ -168,7 +168,7 @@ Distro Dist(FS, llvm::Triple(llvm::sys::getProcessTriple())); if (Dist.IsDebian() || Dist.IsUbuntu()) // Special case for Debian to have nvidia-cuda-toolkit work - // out of the box. More info on http://bugs.debian.org/882505 + // out of the box. More info on https://bugs.debian.org/882505 Candidates.emplace_back(D.SysRoot + "/usr/lib/cuda"); } diff --git a/clang/lib/Driver/ToolChains/TCE.h b/clang/lib/Driver/ToolChains/TCE.h --- a/clang/lib/Driver/ToolChains/TCE.h +++ b/clang/lib/Driver/ToolChains/TCE.h @@ -18,7 +18,7 @@ namespace toolchains { /// TCEToolChain - A tool chain using the llvm bitcode tools to perform -/// all subcommands. See http://tce.cs.tut.fi for our peculiar target. +/// all subcommands. See https://tce.cs.tut.fi for our peculiar target. class LLVM_LIBRARY_VISIBILITY TCEToolChain : public ToolChain { public: TCEToolChain(const Driver &D, const llvm::Triple &Triple, diff --git a/clang/lib/Driver/ToolChains/TCE.cpp b/clang/lib/Driver/ToolChains/TCE.cpp --- a/clang/lib/Driver/ToolChains/TCE.cpp +++ b/clang/lib/Driver/ToolChains/TCE.cpp @@ -15,7 +15,7 @@ using namespace llvm::opt; /// TCEToolChain - A tool chain using the llvm bitcode tools to perform -/// all subcommands. See http://tce.cs.tut.fi for our peculiar target. +/// all subcommands. See https://tce.cs.tut.fi for our peculiar target. /// Currently does not support anything else but compilation. TCEToolChain::TCEToolChain(const Driver &D, const llvm::Triple &Triple, diff --git a/clang/lib/Format/Format.cpp b/clang/lib/Format/Format.cpp --- a/clang/lib/Format/Format.cpp +++ b/clang/lib/Format/Format.cpp @@ -2772,7 +2772,7 @@ // In compiled files, consider the first #include to be the main #include of // the file if it is not a system #include. This ensures that the header // doesn't have hidden dependencies - // (http://llvm.org/docs/CodingStandards.html#include-style). + // (https://llvm.org/docs/CodingStandards.html#include-style). // // FIXME: Do some validation, e.g. edit distance of the base name, to fix // cases where the first #include is unlikely to be the main header. diff --git a/clang/lib/Format/FormatTokenLexer.cpp b/clang/lib/Format/FormatTokenLexer.cpp --- a/clang/lib/Format/FormatTokenLexer.cpp +++ b/clang/lib/Format/FormatTokenLexer.cpp @@ -543,7 +543,7 @@ for (; !HaveClosingSlash && Offset != Buffer.end(); ++Offset) { // Regular expressions are terminated with a '/', which can only be // escaped using '\' or a character class between '[' and ']'. - // See http://www.ecma-international.org/ecma-262/5.1/#sec-7.8.5. + // See https://www.ecma-international.org/ecma-262/5.1/#sec-7.8.5. switch (*Offset) { case '\\': // Skip the escaped character. diff --git a/clang/lib/Format/SortJavaScriptImports.cpp b/clang/lib/Format/SortJavaScriptImports.cpp --- a/clang/lib/Format/SortJavaScriptImports.cpp +++ b/clang/lib/Format/SortJavaScriptImports.cpp @@ -439,7 +439,7 @@ } // Parses a JavaScript/ECMAScript 6 module reference. - // See http://www.ecma-international.org/ecma-262/6.0/#sec-scripts-and-modules + // See https://www.ecma-international.org/ecma-262/6.0/#sec-scripts-and-modules // for grammar EBNF (production ModuleItem). bool parseModuleReference(const AdditionalKeywords &Keywords, JsModuleReference &Reference) { diff --git a/clang/lib/Format/UnwrappedLineParser.cpp b/clang/lib/Format/UnwrappedLineParser.cpp --- a/clang/lib/Format/UnwrappedLineParser.cpp +++ b/clang/lib/Format/UnwrappedLineParser.cpp @@ -1753,7 +1753,7 @@ if (Style.isJavaScript() && FormatTok && FormatTok->Tok.getIdentifierInfo()) { // JavaScript only has pseudo keywords, all keywords are allowed to - // appear in "IdentifierName" positions. See http://es5.github.io/#x7.6 + // appear in "IdentifierName" positions. See https://es5.github.io/#x7.6 nextToken(); } break; diff --git a/clang/lib/Format/WhitespaceManager.cpp b/clang/lib/Format/WhitespaceManager.cpp --- a/clang/lib/Format/WhitespaceManager.cpp +++ b/clang/lib/Format/WhitespaceManager.cpp @@ -339,7 +339,7 @@ Changes[i].StartOfTokenColumn; Changes[i].Spaces += Shift; // FIXME: This is a workaround that should be removed when we fix - // http://llvm.org/PR53699. An assertion later below verifies this. + // https://llvm.org/PR53699. An assertion later below verifies this. if (Changes[i].NewlinesBefore == 0) { Changes[i].Spaces = std::max(Changes[i].Spaces, diff --git a/clang/lib/Frontend/Rewrite/InclusionRewriter.cpp b/clang/lib/Frontend/Rewrite/InclusionRewriter.cpp --- a/clang/lib/Frontend/Rewrite/InclusionRewriter.cpp +++ b/clang/lib/Frontend/Rewrite/InclusionRewriter.cpp @@ -122,7 +122,7 @@ OS << '"'; } else { // Use GNU linemarkers as described here: - // http://gcc.gnu.org/onlinedocs/cpp/Preprocessor-Output.html + // https://gcc.gnu.org/onlinedocs/cpp/Preprocessor-Output.html OS << '#' << ' ' << Line << ' ' << '"'; OS.write_escaped(Filename); OS << '"'; diff --git a/clang/lib/FrontendTool/ExecuteCompilerInvocation.cpp b/clang/lib/FrontendTool/ExecuteCompilerInvocation.cpp --- a/clang/lib/FrontendTool/ExecuteCompilerInvocation.cpp +++ b/clang/lib/FrontendTool/ExecuteCompilerInvocation.cpp @@ -194,7 +194,7 @@ if (Clang->getFrontendOpts().ShowHelp) { driver::getDriverOptTable().printHelp( llvm::outs(), "clang -cc1 [options] file...", - "LLVM 'Clang' Compiler: http://clang.llvm.org", + "LLVM 'Clang' Compiler: https://clang.llvm.org", /*Include=*/driver::options::CC1Option, /*Exclude=*/0, /*ShowAllAliases=*/false); return true; diff --git a/clang/lib/Headers/__clang_cuda_device_functions.h b/clang/lib/Headers/__clang_cuda_device_functions.h --- a/clang/lib/Headers/__clang_cuda_device_functions.h +++ b/clang/lib/Headers/__clang_cuda_device_functions.h @@ -1379,7 +1379,7 @@ return __bool2mask(__vsetne4(__a, __b), 8); } -// Based on ITEM 23 in AIM-239: http://dspace.mit.edu/handle/1721.1/6086 +// Based on ITEM 23 in AIM-239: https://dspace.mit.edu/handle/1721.1/6086 // (a & b) + (a | b) = a + b = (a ^ b) + 2 * (a & b) => // (a + b) / 2 = ((a ^ b) >> 1) + (a & b) // To operate on multiple sub-elements we need to make sure to mask out bits diff --git a/clang/lib/Headers/__clang_cuda_runtime_wrapper.h b/clang/lib/Headers/__clang_cuda_runtime_wrapper.h --- a/clang/lib/Headers/__clang_cuda_runtime_wrapper.h +++ b/clang/lib/Headers/__clang_cuda_runtime_wrapper.h @@ -397,7 +397,7 @@ extern "C" { // Device-side CUDA system calls. -// http://docs.nvidia.com/cuda/ptx-writers-guide-to-interoperability/index.html#system-calls +// https://docs.nvidia.com/cuda/ptx-writers-guide-to-interoperability/index.html#system-calls // We need these declarations and wrappers for device-side // malloc/free/printf calls to work without relying on // -fcuda-disable-target-call-checks option. diff --git a/clang/lib/Headers/float.h b/clang/lib/Headers/float.h --- a/clang/lib/Headers/float.h +++ b/clang/lib/Headers/float.h @@ -12,7 +12,7 @@ /* If we're on MinGW, fall back to the system's float.h, which might have * additional definitions provided for Windows. - * For more details see http://msdn.microsoft.com/en-us/library/y0ybw9fy.aspx + * For more details see https://msdn.microsoft.com/en-us/library/y0ybw9fy.aspx * * Also fall back on Darwin and AIX to allow additional definitions and * implementation-defined values. diff --git a/clang/lib/Lex/LiteralSupport.cpp b/clang/lib/Lex/LiteralSupport.cpp --- a/clang/lib/Lex/LiteralSupport.cpp +++ b/clang/lib/Lex/LiteralSupport.cpp @@ -590,7 +590,7 @@ // Now that we've parsed/checked the UCN, we convert from UTF32->UTF8. // The conversion below was inspired by: - // http://www.unicode.org/Public/PROGRAMS/CVTUTF/ConvertUTF.c + // https://www.unicode.org/Public/PROGRAMS/CVTUTF/ConvertUTF.c // First, we determine how many bytes the result will require. typedef uint8_t UTF8; diff --git a/clang/lib/Lex/PPDirectives.cpp b/clang/lib/Lex/PPDirectives.cpp --- a/clang/lib/Lex/PPDirectives.cpp +++ b/clang/lib/Lex/PPDirectives.cpp @@ -920,7 +920,7 @@ // MSVC searches the current include stack from top to bottom for // headers included by quoted include directives. - // See: http://msdn.microsoft.com/en-us/library/36k2cdd4.aspx + // See: https://msdn.microsoft.com/en-us/library/36k2cdd4.aspx if (LangOpts.MSVCCompat && !isAngled) { for (IncludeStackInfo &ISEntry : llvm::reverse(IncludeMacroStack)) { if (IsFileLexer(ISEntry)) diff --git a/clang/lib/Lex/Pragma.cpp b/clang/lib/Lex/Pragma.cpp --- a/clang/lib/Lex/Pragma.cpp +++ b/clang/lib/Lex/Pragma.cpp @@ -1926,7 +1926,7 @@ /// \endcode /// /// \note This is -/// editor-only +/// editor-only /// pragma, just skipped by compiler. struct PragmaRegionHandler : public PragmaHandler { PragmaRegionHandler(const char *pragma) : PragmaHandler(pragma) {} diff --git a/clang/lib/Sema/SemaCoroutine.cpp b/clang/lib/Sema/SemaCoroutine.cpp --- a/clang/lib/Sema/SemaCoroutine.cpp +++ b/clang/lib/Sema/SemaCoroutine.cpp @@ -9,7 +9,7 @@ // This file implements semantic analysis for C++ Coroutines. // // This file contains references to sections of the Coroutines TS, which -// can be found at http://wg21.link/coroutines. +// can be found at https://wg21.link/coroutines. // //===----------------------------------------------------------------------===// diff --git a/clang/lib/Sema/SemaDecl.cpp b/clang/lib/Sema/SemaDecl.cpp --- a/clang/lib/Sema/SemaDecl.cpp +++ b/clang/lib/Sema/SemaDecl.cpp @@ -5542,7 +5542,7 @@ /// BuildMicrosoftCAnonymousStruct - Handle the declaration of an /// Microsoft C anonymous structure. -/// Ref: http://msdn.microsoft.com/en-us/library/z2cx9y4f.aspx +/// Ref: https://msdn.microsoft.com/en-us/library/z2cx9y4f.aspx /// Example: /// /// struct A { int a; }; @@ -16405,7 +16405,7 @@ // This is also okay for elaborated-type-specifiers, which is // technically forbidden by the current standard but which is // okay according to the likely resolution of an open issue; - // see http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#407 + // see https://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#407 if (getLangOpts().CPlusPlus) { if (TypedefNameDecl *TD = dyn_cast(PrevDecl)) { if (const TagType *TT = TD->getUnderlyingType()->getAs()) { diff --git a/clang/lib/Sema/SemaDeclAttr.cpp b/clang/lib/Sema/SemaDeclAttr.cpp --- a/clang/lib/Sema/SemaDeclAttr.cpp +++ b/clang/lib/Sema/SemaDeclAttr.cpp @@ -3653,7 +3653,7 @@ } /// Handle __attribute__((format_arg((idx)))) attribute based on -/// http://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html +/// https://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html static void handleFormatArgAttr(Sema &S, Decl *D, const ParsedAttr &AL) { Expr *IdxExpr = AL.getArgAsExpr(0); ParamIdx Idx; @@ -3724,7 +3724,7 @@ } /// Handle __attribute__((init_priority(priority))) attributes based on -/// http://gcc.gnu.org/onlinedocs/gcc/C_002b_002b-Attributes.html +/// https://gcc.gnu.org/onlinedocs/gcc/C_002b_002b-Attributes.html static void handleInitPriorityAttr(Sema &S, Decl *D, const ParsedAttr &AL) { if (!S.getLangOpts().CPlusPlus) { S.Diag(AL.getLoc(), diag::warn_attribute_ignored) << AL; @@ -3808,7 +3808,7 @@ } /// Handle __attribute__((format(type,idx,firstarg))) attributes based on -/// http://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html +/// https://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html static void handleFormatAttr(Sema &S, Decl *D, const ParsedAttr &AL) { if (!AL.isArgIdent(0)) { S.Diag(AL.getLoc(), diag::err_attribute_argument_n_type) diff --git a/clang/lib/Sema/SemaExprCXX.cpp b/clang/lib/Sema/SemaExprCXX.cpp --- a/clang/lib/Sema/SemaExprCXX.cpp +++ b/clang/lib/Sema/SemaExprCXX.cpp @@ -4997,8 +4997,8 @@ // GCC[1] and the Embarcadero C++ compiler[2], and Clang implements those // specifications. // - // 1: http://gcc.gnu/.org/onlinedocs/gcc/Type-Traits.html - // 2: http://docwiki.embarcadero.com/RADStudio/XE/en/Type_Trait_Functions_(C%2B%2B0x)_Index + // 1: https://gcc.gnu/.org/onlinedocs/gcc/Type-Traits.html + // 2: https://docwiki.embarcadero.com/RADStudio/XE/en/Type_Trait_Functions_(C%2B%2B0x)_Index // // Note that these builtins do not behave as documented in g++: if a class // has both a trivial and a non-trivial special member of a particular kind, @@ -5007,7 +5007,7 @@ // does not correctly compute triviality in the presence of multiple special // members of the same kind. Revisit this once the g++ bug is fixed. case UTT_HasTrivialDefaultConstructor: - // http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: + // https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: // If __is_pod (type) is true then the trait is true, else if type is // a cv class or union type (or array thereof) with a trivial default // constructor ([class.ctor]) then the trait is true, else it is false. @@ -5027,7 +5027,7 @@ return RD->hasTrivialMoveConstructor() && !RD->hasNonTrivialMoveConstructor(); return false; case UTT_HasTrivialCopy: - // http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: + // https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: // If __is_pod (type) is true or type is a reference type then // the trait is true, else if type is a cv class or union type // with a trivial copy constructor ([class.copy]) then the trait @@ -5048,7 +5048,7 @@ return RD->hasTrivialMoveAssignment() && !RD->hasNonTrivialMoveAssignment(); return false; case UTT_HasTrivialAssign: - // http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: + // https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: // If type is const qualified or is a reference type then the // trait is false. Otherwise if __is_pod (type) is true then the // trait is true, else if type is a cv class or union type with @@ -5117,7 +5117,7 @@ return true; case UTT_HasTrivialDestructor: - // http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html + // https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html // If __is_pod (type) is true or type is a reference type // then the trait is true, else if type is a cv class or union // type (or array thereof) with a trivial destructor @@ -5136,7 +5136,7 @@ return false; // TODO: Propagate nothrowness for implicitly declared special members. case UTT_HasNothrowAssign: - // http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: + // https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: // If type is const qualified or is a reference type then the // trait is false. Otherwise if __has_trivial_assign (type) // is true then the trait is true, else if type is a cv class @@ -5170,7 +5170,7 @@ &CXXMethodDecl::isMoveAssignmentOperator); return false; case UTT_HasNothrowCopy: - // http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: + // https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: // If __has_trivial_copy (type) is true then the trait is true, else // if type is a cv class or union type with copy constructors that are // known not to throw an exception then the trait is true, else it is @@ -5211,7 +5211,7 @@ } return false; case UTT_HasNothrowConstructor: - // http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html + // https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html // If __has_trivial_constructor (type) is true then the trait is // true, else if type is a cv class or union type (or array // thereof) with a default constructor that is known not to @@ -5248,7 +5248,7 @@ } return false; case UTT_HasVirtualDestructor: - // http://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: + // https://gcc.gnu.org/onlinedocs/gcc/Type-Traits.html: // If type is a class type with a virtual destructor ([class.dtor]) // then the trait is true, else it is false. if (CXXRecordDecl *RD = T->getAsCXXRecordDecl()) @@ -5258,9 +5258,9 @@ // These type trait expressions are modeled on the specifications for the // Embarcadero C++0x type trait functions: - // http://docwiki.embarcadero.com/RADStudio/XE/en/Type_Trait_Functions_(C%2B%2B0x)_Index + // https://docwiki.embarcadero.com/RADStudio/XE/en/Type_Trait_Functions_(C%2B%2B0x)_Index case UTT_IsCompleteType: - // http://docwiki.embarcadero.com/RADStudio/XE/en/Is_complete_type_(typename_T_): + // https://docwiki.embarcadero.com/RADStudio/XE/en/Is_complete_type_(typename_T_): // Returns True if and only if T is a complete type at the point of the // function call. return !T->isIncompleteType(); diff --git a/clang/lib/Sema/SemaOverload.cpp b/clang/lib/Sema/SemaOverload.cpp --- a/clang/lib/Sema/SemaOverload.cpp +++ b/clang/lib/Sema/SemaOverload.cpp @@ -2316,7 +2316,7 @@ bool InOverloadResolution, ASTContext &Context) { // Handle value-dependent integral null pointer constants correctly. - // http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#903 + // https://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#903 if (Expr->isValueDependent() && !Expr->isTypeDependent() && Expr->getType()->isIntegerType() && !Expr->getType()->isEnumeralType()) return !InOverloadResolution; diff --git a/clang/lib/Sema/SemaTemplate.cpp b/clang/lib/Sema/SemaTemplate.cpp --- a/clang/lib/Sema/SemaTemplate.cpp +++ b/clang/lib/Sema/SemaTemplate.cpp @@ -6469,7 +6469,7 @@ // corresponding template-parameter is a reference; or // In C++98/03 mode, give an extension warning on any extra parentheses. - // See http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#773 + // See https://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#773 bool ExtraParens = false; while (ParenExpr *Parens = dyn_cast(Arg)) { if (!Invalid && !ExtraParens) { @@ -6685,7 +6685,7 @@ DeclRefExpr *DRE = nullptr; // In C++98/03 mode, give an extension warning on any extra parentheses. - // See http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#773 + // See https://www.open-std.org/jtc1/sc22/wg21/docs/cwg_defects.html#773 bool ExtraParens = false; while (ParenExpr *Parens = dyn_cast(Arg)) { if (!Invalid && !ExtraParens) { diff --git a/clang/lib/Sema/SemaTemplateDeduction.cpp b/clang/lib/Sema/SemaTemplateDeduction.cpp --- a/clang/lib/Sema/SemaTemplateDeduction.cpp +++ b/clang/lib/Sema/SemaTemplateDeduction.cpp @@ -1464,7 +1464,7 @@ } // Do not match a function type with a cv-qualified type. - // http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#1584 + // https://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#1584 if (A->isFunctionType() && P.hasQualifiers()) return Sema::TDK_NonDeducedMismatch; diff --git a/clang/lib/Sema/SemaType.cpp b/clang/lib/Sema/SemaType.cpp --- a/clang/lib/Sema/SemaType.cpp +++ b/clang/lib/Sema/SemaType.cpp @@ -4963,7 +4963,7 @@ if (ASM == ArrayType::Star && !D.isPrototypeContext()) { // FIXME: This check isn't quite right: it allows star in prototypes // for function definitions, and disallows some edge cases detailed - // in http://gcc.gnu.org/ml/gcc-patches/2009-02/msg00133.html + // in https://gcc.gnu.org/ml/gcc-patches/2009-02/msg00133.html S.Diag(DeclType.Loc, diag::err_array_star_outside_prototype); ASM = ArrayType::Normal; D.setInvalidType(true); diff --git a/clang/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp b/clang/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp --- a/clang/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp @@ -1019,7 +1019,7 @@ // FIXME: For now, ignore classes that subclass SenTestCase and XCTestCase, // as these don't need to implement -dealloc. They implement tear down in // another way, which we should try and catch later. - // http://llvm.org/bugs/show_bug.cgi?id=3187 + // https://llvm.org/bugs/show_bug.cgi?id=3187 if (II == XCTestCaseII || II == SenTestCaseII) return true; } diff --git a/clang/lib/StaticAnalyzer/Checkers/MallocChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/MallocChecker.cpp --- a/clang/lib/StaticAnalyzer/Checkers/MallocChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/MallocChecker.cpp @@ -3238,7 +3238,7 @@ // Do not warn on pointers passed to 'setbuf' when used with std streams, // these leaks might be intentional when setting the buffer for stdio. - // http://stackoverflow.com/questions/2671151/who-frees-setvbuf-buffer + // https://stackoverflow.com/questions/2671151/who-frees-setvbuf-buffer if (FName == "setbuf" || FName =="setbuffer" || FName == "setlinebuf" || FName == "setvbuf") { if (Call->getNumArgs() >= 1) { diff --git a/clang/lib/StaticAnalyzer/Checkers/PointerArithChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/PointerArithChecker.cpp --- a/clang/lib/StaticAnalyzer/Checkers/PointerArithChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/PointerArithChecker.cpp @@ -76,7 +76,7 @@ void PointerArithChecker::checkDeadSymbols(SymbolReaper &SR, CheckerContext &C) const { // TODO: intentional leak. Some information is garbage collected too early, - // see http://reviews.llvm.org/D14203 for further information. + // see https://reviews.llvm.org/D14203 for further information. /*ProgramStateRef State = C.getState(); RegionStateTy RegionStates = State->get(); for (RegionStateTy::iterator I = RegionStates.begin(), E = RegionStates.end(); diff --git a/clang/lib/StaticAnalyzer/Checkers/VforkChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/VforkChecker.cpp --- a/clang/lib/StaticAnalyzer/Checkers/VforkChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/VforkChecker.cpp @@ -10,7 +10,7 @@ // Vforked process shares memory (including stack) with parent so it's // range of actions is significantly limited: can't write variables, // can't call functions not in the allowed list, etc. For more details, see -// http://man7.org/linux/man-pages/man2/vfork.2.html +// https://man7.org/linux/man-pages/man2/vfork.2.html // // This checker checks for prohibited constructs in vforked process. // The state transition diagram: diff --git a/clang/lib/StaticAnalyzer/Core/HTMLDiagnostics.cpp b/clang/lib/StaticAnalyzer/Core/HTMLDiagnostics.cpp --- a/clang/lib/StaticAnalyzer/Core/HTMLDiagnostics.cpp +++ b/clang/lib/StaticAnalyzer/Core/HTMLDiagnostics.cpp @@ -1166,7 +1166,7 @@ fill: blue; } - + -// CHECK: +// CHECK: // CHECK: // CHECK: // CHECK: files @@ -48,4 +48,3 @@ // CHECK: // CHECK: // CHECK: - diff --git a/clang/test/ARCMT/objcmt-arc-cf-annotations.m b/clang/test/ARCMT/objcmt-arc-cf-annotations.m --- a/clang/test/ARCMT/objcmt-arc-cf-annotations.m +++ b/clang/test/ARCMT/objcmt-arc-cf-annotations.m @@ -430,7 +430,7 @@ // Handle DiskArbitration API: // -// http://developer.apple.com/DOCUMENTATION/DARWIN/Reference/DiscArbitrationFramework/ +// https://developer.apple.com/DOCUMENTATION/DARWIN/Reference/DiscArbitrationFramework/ // void f10(io_service_t media, DADiskRef d, CFStringRef s) { DADiskRef disk = DADiskCreateFromBSDName(kCFAllocatorDefault, 0, "hello"); // expected-warning{{leak}} diff --git a/clang/test/ARCMT/objcmt-arc-cf-annotations.m.result b/clang/test/ARCMT/objcmt-arc-cf-annotations.m.result --- a/clang/test/ARCMT/objcmt-arc-cf-annotations.m.result +++ b/clang/test/ARCMT/objcmt-arc-cf-annotations.m.result @@ -466,7 +466,7 @@ // Handle DiskArbitration API: // -// http://developer.apple.com/DOCUMENTATION/DARWIN/Reference/DiscArbitrationFramework/ +// https://developer.apple.com/DOCUMENTATION/DARWIN/Reference/DiscArbitrationFramework/ // void f10(io_service_t media, DADiskRef d, CFStringRef s) { DADiskRef disk = DADiskCreateFromBSDName(kCFAllocatorDefault, 0, "hello"); // expected-warning{{leak}} diff --git a/clang/test/Analysis/CFRetainRelease_NSAssertionHandler.m b/clang/test/Analysis/CFRetainRelease_NSAssertionHandler.m --- a/clang/test/Analysis/CFRetainRelease_NSAssertionHandler.m +++ b/clang/test/Analysis/CFRetainRelease_NSAssertionHandler.m @@ -26,7 +26,7 @@ //----------------------------------------------------------------------------// // The following test case was filed in PR 2593: -// http://llvm.org/bugs/show_bug.cgi?id=2593 +// https://llvm.org/bugs/show_bug.cgi?id=2593 // // There should be no null dereference flagged by the checker because of // NSParameterAssert and NSAssert. diff --git a/clang/test/Analysis/Inputs/expected-plists/NewDelete-path-notes.cpp.plist b/clang/test/Analysis/Inputs/expected-plists/NewDelete-path-notes.cpp.plist --- a/clang/test/Analysis/Inputs/expected-plists/NewDelete-path-notes.cpp.plist +++ b/clang/test/Analysis/Inputs/expected-plists/NewDelete-path-notes.cpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/conditional-path-notes.c.plist b/clang/test/Analysis/Inputs/expected-plists/conditional-path-notes.c.plist --- a/clang/test/Analysis/Inputs/expected-plists/conditional-path-notes.c.plist +++ b/clang/test/Analysis/Inputs/expected-plists/conditional-path-notes.c.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/cxx-for-range.cpp.plist b/clang/test/Analysis/Inputs/expected-plists/cxx-for-range.cpp.plist --- a/clang/test/Analysis/Inputs/expected-plists/cxx-for-range.cpp.plist +++ b/clang/test/Analysis/Inputs/expected-plists/cxx-for-range.cpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/edges-new.mm.plist b/clang/test/Analysis/Inputs/expected-plists/edges-new.mm.plist --- a/clang/test/Analysis/Inputs/expected-plists/edges-new.mm.plist +++ b/clang/test/Analysis/Inputs/expected-plists/edges-new.mm.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/generics.m.plist b/clang/test/Analysis/Inputs/expected-plists/generics.m.plist --- a/clang/test/Analysis/Inputs/expected-plists/generics.m.plist +++ b/clang/test/Analysis/Inputs/expected-plists/generics.m.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/inline-plist.c.plist b/clang/test/Analysis/Inputs/expected-plists/inline-plist.c.plist --- a/clang/test/Analysis/Inputs/expected-plists/inline-plist.c.plist +++ b/clang/test/Analysis/Inputs/expected-plists/inline-plist.c.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/inline-unique-reports.c.plist b/clang/test/Analysis/Inputs/expected-plists/inline-unique-reports.c.plist --- a/clang/test/Analysis/Inputs/expected-plists/inline-unique-reports.c.plist +++ b/clang/test/Analysis/Inputs/expected-plists/inline-unique-reports.c.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/method-call-path-notes.cpp.plist b/clang/test/Analysis/Inputs/expected-plists/method-call-path-notes.cpp.plist --- a/clang/test/Analysis/Inputs/expected-plists/method-call-path-notes.cpp.plist +++ b/clang/test/Analysis/Inputs/expected-plists/method-call-path-notes.cpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/model-file.cpp.plist b/clang/test/Analysis/Inputs/expected-plists/model-file.cpp.plist --- a/clang/test/Analysis/Inputs/expected-plists/model-file.cpp.plist +++ b/clang/test/Analysis/Inputs/expected-plists/model-file.cpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/null-deref-path-notes.m.plist b/clang/test/Analysis/Inputs/expected-plists/null-deref-path-notes.m.plist --- a/clang/test/Analysis/Inputs/expected-plists/null-deref-path-notes.m.plist +++ b/clang/test/Analysis/Inputs/expected-plists/null-deref-path-notes.m.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/nullability-notes.m.plist b/clang/test/Analysis/Inputs/expected-plists/nullability-notes.m.plist --- a/clang/test/Analysis/Inputs/expected-plists/nullability-notes.m.plist +++ b/clang/test/Analysis/Inputs/expected-plists/nullability-notes.m.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/objc-arc.m.plist b/clang/test/Analysis/Inputs/expected-plists/objc-arc.m.plist --- a/clang/test/Analysis/Inputs/expected-plists/objc-arc.m.plist +++ b/clang/test/Analysis/Inputs/expected-plists/objc-arc.m.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/objc-radar17039661.m.plist b/clang/test/Analysis/Inputs/expected-plists/objc-radar17039661.m.plist --- a/clang/test/Analysis/Inputs/expected-plists/objc-radar17039661.m.plist +++ b/clang/test/Analysis/Inputs/expected-plists/objc-radar17039661.m.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/plist-macros.cpp.plist b/clang/test/Analysis/Inputs/expected-plists/plist-macros.cpp.plist --- a/clang/test/Analysis/Inputs/expected-plists/plist-macros.cpp.plist +++ b/clang/test/Analysis/Inputs/expected-plists/plist-macros.cpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/plist-output-alternate.m.plist b/clang/test/Analysis/Inputs/expected-plists/plist-output-alternate.m.plist --- a/clang/test/Analysis/Inputs/expected-plists/plist-output-alternate.m.plist +++ b/clang/test/Analysis/Inputs/expected-plists/plist-output-alternate.m.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/plist-output.m.plist b/clang/test/Analysis/Inputs/expected-plists/plist-output.m.plist --- a/clang/test/Analysis/Inputs/expected-plists/plist-output.m.plist +++ b/clang/test/Analysis/Inputs/expected-plists/plist-output.m.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/retain-release-path-notes.m.plist b/clang/test/Analysis/Inputs/expected-plists/retain-release-path-notes.m.plist --- a/clang/test/Analysis/Inputs/expected-plists/retain-release-path-notes.m.plist +++ b/clang/test/Analysis/Inputs/expected-plists/retain-release-path-notes.m.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/retain-release.m.objc.plist b/clang/test/Analysis/Inputs/expected-plists/retain-release.m.objc.plist --- a/clang/test/Analysis/Inputs/expected-plists/retain-release.m.objc.plist +++ b/clang/test/Analysis/Inputs/expected-plists/retain-release.m.objc.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/retain-release.m.objcpp.plist b/clang/test/Analysis/Inputs/expected-plists/retain-release.m.objcpp.plist --- a/clang/test/Analysis/Inputs/expected-plists/retain-release.m.objcpp.plist +++ b/clang/test/Analysis/Inputs/expected-plists/retain-release.m.objcpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/Inputs/expected-plists/unix-fns.c.plist b/clang/test/Analysis/Inputs/expected-plists/unix-fns.c.plist --- a/clang/test/Analysis/Inputs/expected-plists/unix-fns.c.plist +++ b/clang/test/Analysis/Inputs/expected-plists/unix-fns.c.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/MissingDealloc.m b/clang/test/Analysis/MissingDealloc.m --- a/clang/test/Analysis/MissingDealloc.m +++ b/clang/test/Analysis/MissingDealloc.m @@ -143,7 +143,7 @@ @end //===------------------------------------------------------------------------=== -// PR 3187: http://llvm.org/bugs/show_bug.cgi?id=3187 +// PR 3187: https://llvm.org/bugs/show_bug.cgi?id=3187 // - Disable the missing -dealloc check for classes that subclass SenTestCase @class NSString; diff --git a/clang/test/Analysis/PR24184.cpp b/clang/test/Analysis/PR24184.cpp --- a/clang/test/Analysis/PR24184.cpp +++ b/clang/test/Analysis/PR24184.cpp @@ -2,7 +2,7 @@ // RUN: %clang_analyze_cc1 -w -fcxx-exceptions -analyzer-checker=core -analyzer-checker=alpha.core.PointerArithm,alpha.core.CastToStruct -analyzer-max-loop 64 -verify %s // RUN: %clang_analyze_cc1 -w -analyzer-checker=core -analyzer-checker=cplusplus -fcxx-exceptions -analyzer-checker alpha.core.PointerArithm,alpha.core.CastToStruct -analyzer-max-loop 63 -verify %s -// These tests used to hit an assertion in the bug report. Test case from http://llvm.org/PR24184. +// These tests used to hit an assertion in the bug report. Test case from https://llvm.org/PR24184. typedef struct { int cbData; unsigned pbData; diff --git a/clang/test/Analysis/copypaste/Inputs/expected-plists/plist-diagnostics-notes-as-events.cpp.plist b/clang/test/Analysis/copypaste/Inputs/expected-plists/plist-diagnostics-notes-as-events.cpp.plist --- a/clang/test/Analysis/copypaste/Inputs/expected-plists/plist-diagnostics-notes-as-events.cpp.plist +++ b/clang/test/Analysis/copypaste/Inputs/expected-plists/plist-diagnostics-notes-as-events.cpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/copypaste/Inputs/expected-plists/plist-diagnostics.cpp.plist b/clang/test/Analysis/copypaste/Inputs/expected-plists/plist-diagnostics.cpp.plist --- a/clang/test/Analysis/copypaste/Inputs/expected-plists/plist-diagnostics.cpp.plist +++ b/clang/test/Analysis/copypaste/Inputs/expected-plists/plist-diagnostics.cpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/cxx-uninitialized-object.cpp b/clang/test/Analysis/cxx-uninitialized-object.cpp --- a/clang/test/Analysis/cxx-uninitialized-object.cpp +++ b/clang/test/Analysis/cxx-uninitialized-object.cpp @@ -410,7 +410,7 @@ // FIXME: As of writing this checker, there is no good support for union types // in the Static Analyzer. Here is non-exhaustive list of cases. // Note that the rules for unions are different in C and C++. -// http://lists.llvm.org/pipermail/cfe-dev/2017-March/052910.html +// https://lists.llvm.org/pipermail/cfe-dev/2017-March/052910.html class ContainsSimpleUnionTest1 { union SimpleUnion { diff --git a/clang/test/Analysis/dead-stores.c b/clang/test/Analysis/dead-stores.c --- a/clang/test/Analysis/dead-stores.c +++ b/clang/test/Analysis/dead-stores.c @@ -218,7 +218,7 @@ } // PR 3514: false positive `dead initialization` warning for init to global -// http://llvm.org/bugs/show_bug.cgi?id=3514 +// https://llvm.org/bugs/show_bug.cgi?id=3514 extern const int MyConstant; int f19(void) { int x = MyConstant; // no-warning diff --git a/clang/test/Analysis/dead-stores.m b/clang/test/Analysis/dead-stores.m --- a/clang/test/Analysis/dead-stores.m +++ b/clang/test/Analysis/dead-stores.m @@ -27,7 +27,7 @@ // This test case was reported as a false positive due to a bug in the // LiveVariables <-> deadcode.DeadStores interplay. We should not flag a warning // here. The test case was reported in: -// http://lists.llvm.org/pipermail/cfe-dev/2008-July/002157.html +// https://lists.llvm.org/pipermail/cfe-dev/2008-July/002157.html void DeadStoreTest(NSObject *anObject) { NSArray *keys; if ((keys = [anObject exposedBindings]) && // no-warning diff --git a/clang/test/Analysis/diagnostics/Inputs/expected-plists/deref-track-symbolic-region.c.plist b/clang/test/Analysis/diagnostics/Inputs/expected-plists/deref-track-symbolic-region.c.plist --- a/clang/test/Analysis/diagnostics/Inputs/expected-plists/deref-track-symbolic-region.c.plist +++ b/clang/test/Analysis/diagnostics/Inputs/expected-plists/deref-track-symbolic-region.c.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/diagnostics/Inputs/expected-plists/report-issues-within-main-file.cpp.plist b/clang/test/Analysis/diagnostics/Inputs/expected-plists/report-issues-within-main-file.cpp.plist --- a/clang/test/Analysis/diagnostics/Inputs/expected-plists/report-issues-within-main-file.cpp.plist +++ b/clang/test/Analysis/diagnostics/Inputs/expected-plists/report-issues-within-main-file.cpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-caller.c.plist b/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-caller.c.plist --- a/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-caller.c.plist +++ b/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-caller.c.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-param.c.plist b/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-param.c.plist --- a/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-param.c.plist +++ b/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-param.c.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-param.m.plist b/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-param.m.plist --- a/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-param.m.plist +++ b/clang/test/Analysis/diagnostics/Inputs/expected-plists/undef-value-param.m.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/inlining/Inputs/expected-plists/eager-reclamation-path-notes.c.plist b/clang/test/Analysis/inlining/Inputs/expected-plists/eager-reclamation-path-notes.c.plist --- a/clang/test/Analysis/inlining/Inputs/expected-plists/eager-reclamation-path-notes.c.plist +++ b/clang/test/Analysis/inlining/Inputs/expected-plists/eager-reclamation-path-notes.c.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/inlining/Inputs/expected-plists/eager-reclamation-path-notes.cpp.plist b/clang/test/Analysis/inlining/Inputs/expected-plists/eager-reclamation-path-notes.cpp.plist --- a/clang/test/Analysis/inlining/Inputs/expected-plists/eager-reclamation-path-notes.cpp.plist +++ b/clang/test/Analysis/inlining/Inputs/expected-plists/eager-reclamation-path-notes.cpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.c.plist b/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.c.plist --- a/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.c.plist +++ b/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.c.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.cpp.plist b/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.cpp.plist --- a/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.cpp.plist +++ b/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.cpp.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.m.plist b/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.m.plist --- a/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.m.plist +++ b/clang/test/Analysis/inlining/Inputs/expected-plists/path-notes.m.plist @@ -1,5 +1,5 @@ - + clang_version diff --git a/clang/test/Analysis/misc-ps-eager-assume.m b/clang/test/Analysis/misc-ps-eager-assume.m --- a/clang/test/Analysis/misc-ps-eager-assume.m +++ b/clang/test/Analysis/misc-ps-eager-assume.m @@ -64,7 +64,7 @@ [pool drain]; } -// From PR 3836 (http://llvm.org/bugs/show_bug.cgi?id=3836) +// From PR 3836 (https://llvm.org/bugs/show_bug.cgi?id=3836) // // In this test case, the double '!' works fine with our symbolic constraints, // but we don't support comparing SymConstraint != SymConstraint. By eagerly @@ -124,7 +124,7 @@ } //===---------------------------------------------------------------------===// -// PR 5627 - http://llvm.org/bugs/show_bug.cgi?id=5627 +// PR 5627 - https://llvm.org/bugs/show_bug.cgi?id=5627 // This test case depends on using -analyzer-config eagerly-assume=true and // -analyzer-store=region. The 'eagerly-assume=true' causes the path // to bifurcate when evaluating the function call argument, and a state @@ -144,4 +144,3 @@ p = pr5627_f(!x); return p; // no-warning } - diff --git a/clang/test/Analysis/misc-ps.m b/clang/test/Analysis/misc-ps.m --- a/clang/test/Analysis/misc-ps.m +++ b/clang/test/Analysis/misc-ps.m @@ -68,7 +68,7 @@ @end // Reduced test case from crash in PR 2796; -// http://llvm.org/bugs/show_bug.cgi?id=2796 +// https://llvm.org/bugs/show_bug.cgi?id=2796 unsigned foo(unsigned x) { return __alignof__((x)) + sizeof(x); } @@ -119,7 +119,7 @@ } // sizeof(void) -// - Tests a regression reported in PR 3211: http://llvm.org/bugs/show_bug.cgi?id=3211 +// - Tests a regression reported in PR 3211: https://llvm.org/bugs/show_bug.cgi?id=3211 void handle_sizeof_void(unsigned flag) { int* p = 0; @@ -1356,5 +1356,3 @@ static void rdar1196620(struct rdar1196620_s* s) { rdar1196620_call_assert(s); } - - diff --git a/clang/test/Analysis/no-exit-cfg.c b/clang/test/Analysis/no-exit-cfg.c --- a/clang/test/Analysis/no-exit-cfg.c +++ b/clang/test/Analysis/no-exit-cfg.c @@ -2,7 +2,7 @@ // expected-no-diagnostics // This is a test case for the issue reported in PR 2819: -// http://llvm.org/bugs/show_bug.cgi?id=2819 +// https://llvm.org/bugs/show_bug.cgi?id=2819 // The flow-sensitive dataflow solver should work even when no block in // the CFG reaches the exit block. diff --git a/clang/test/Analysis/pr_4164.c b/clang/test/Analysis/pr_4164.c --- a/clang/test/Analysis/pr_4164.c +++ b/clang/test/Analysis/pr_4164.c @@ -1,7 +1,7 @@ // RUN: %clang_analyze_cc1 -triple x86_64-apple-darwin9 -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s // expected-no-diagnostics -// PR 4164: http://llvm.org/bugs/show_bug.cgi?id=4164 +// PR 4164: https://llvm.org/bugs/show_bug.cgi?id=4164 // // Eventually this should be pulled into misc-ps.m. This is in a separate test // file for now to play around with the specific issues for BasicStoreManager @@ -38,4 +38,3 @@ return -1; return size; // no-warning } - diff --git a/clang/test/Analysis/retain-release.m b/clang/test/Analysis/retain-release.m --- a/clang/test/Analysis/retain-release.m +++ b/clang/test/Analysis/retain-release.m @@ -445,7 +445,7 @@ // Handle DiskArbitration API: // -// http://developer.apple.com/DOCUMENTATION/DARWIN/Reference/DiscArbitrationFramework/ +// https://developer.apple.com/DOCUMENTATION/DARWIN/Reference/DiscArbitrationFramework/ // void f10(io_service_t media, DADiskRef d, CFStringRef s) { DADiskRef disk = DADiskCreateFromBSDName(kCFAllocatorDefault, 0, "hello"); // expected-warning{{leak}} diff --git a/clang/test/Analysis/svalbuilder-logic.c b/clang/test/Analysis/svalbuilder-logic.c --- a/clang/test/Analysis/svalbuilder-logic.c +++ b/clang/test/Analysis/svalbuilder-logic.c @@ -7,7 +7,7 @@ return 3 - (int)(x +3); } -// http://llvm.org/bugs/show_bug.cgi?id=15863 +// https://llvm.org/bugs/show_bug.cgi?id=15863 // Don't crash when mixing 'bool' and 'int' in implicit comparisons to 0. void pr15863(void) { extern int getBool(void); diff --git a/clang/test/Analysis/vfork.c b/clang/test/Analysis/vfork.c --- a/clang/test/Analysis/vfork.c +++ b/clang/test/Analysis/vfork.c @@ -127,10 +127,9 @@ void f5(void) { // See "libxtables: move some code to avoid cautions in vfork man page" - // (http://lists.netfilter.org/pipermail/netfilter-buglog/2014-October/003280.html). + // (https://lists.netfilter.org/pipermail/netfilter-buglog/2014-October/003280.html). if (vfork() == 0) { // expected-warning{{Call to function 'vfork' is insecure}} execl("prog", "arg1", 0); // no-warning exit(1); // expected-warning{{This function call is prohibited after a successful vfork}} } } - diff --git a/clang/test/CodeGen/2002-03-14-BrokenSSA.c b/clang/test/CodeGen/2002-03-14-BrokenSSA.c --- a/clang/test/CodeGen/2002-03-14-BrokenSSA.c +++ b/clang/test/CodeGen/2002-03-14-BrokenSSA.c @@ -2,7 +2,7 @@ /* This code used to break GCC's SSA computation code. It would create uses of B & C that are not dominated by their definitions. See: - http://gcc.gnu.org/ml/gcc/2002-03/msg00697.html + https://gcc.gnu.org/ml/gcc/2002-03/msg00697.html */ int bar(void); int foo(void) @@ -14,4 +14,3 @@ c = bar(); return a + b + c; } - diff --git a/clang/test/CodeGen/X86/x86_64-PR42672.c b/clang/test/CodeGen/X86/x86_64-PR42672.c --- a/clang/test/CodeGen/X86/x86_64-PR42672.c +++ b/clang/test/CodeGen/X86/x86_64-PR42672.c @@ -103,7 +103,7 @@ // CHECK-IMPOSSIBLE_X: invalid output size for constraint -// http://crbug.com/999160 +// https://crbug.com/999160 // Clang used to report the following message: // "impossible constraint in asm: can't store struct into a register" // for the assembly directive below, although there's no struct. diff --git a/clang/test/CodeGen/atomic-ops.c b/clang/test/CodeGen/atomic-ops.c --- a/clang/test/CodeGen/atomic-ops.c +++ b/clang/test/CodeGen/atomic-ops.c @@ -375,7 +375,7 @@ // Tests for atomic operations on big values. These should call the functions // defined here: -// http://gcc.gnu.org/wiki/Atomic/GCCMM/LIbrary#The_Library_interface +// https://gcc.gnu.org/wiki/Atomic/GCCMM/LIbrary#The_Library_interface struct foo { int big[128]; diff --git a/clang/test/CodeGen/big-atomic-ops.c b/clang/test/CodeGen/big-atomic-ops.c --- a/clang/test/CodeGen/big-atomic-ops.c +++ b/clang/test/CodeGen/big-atomic-ops.c @@ -230,7 +230,7 @@ // Tests for atomic operations on big values. These should call the functions // defined here: -// http://gcc.gnu.org/wiki/Atomic/GCCMM/LIbrary#The_Library_interface +// https://gcc.gnu.org/wiki/Atomic/GCCMM/LIbrary#The_Library_interface struct foo { int big[128]; diff --git a/clang/test/CodeGen/vla.c b/clang/test/CodeGen/vla.c --- a/clang/test/CodeGen/vla.c +++ b/clang/test/CodeGen/vla.c @@ -86,7 +86,7 @@ return GLOB; } -// http://llvm.org/PR8567 +// https://llvm.org/PR8567 // CHECK-LABEL: define{{.*}} double @test_PR8567 double test_PR8567(int n, double (*p)[n][5]) { // CHECK: [[NV:%.*]] = alloca i32, align 4 diff --git a/clang/test/CodeGenCUDA/link-device-bitcode.cu b/clang/test/CodeGenCUDA/link-device-bitcode.cu --- a/clang/test/CodeGenCUDA/link-device-bitcode.cu +++ b/clang/test/CodeGenCUDA/link-device-bitcode.cu @@ -1,5 +1,5 @@ // Test for linking with CUDA's libdevice as outlined in -// http://llvm.org/docs/NVPTXUsage.html#linking-with-libdevice +// https://llvm.org/docs/NVPTXUsage.html#linking-with-libdevice // // REQUIRES: nvptx-registered-target // diff --git a/clang/test/CodeGenCXX/cfi-nvcall.cpp b/clang/test/CodeGenCXX/cfi-nvcall.cpp --- a/clang/test/CodeGenCXX/cfi-nvcall.cpp +++ b/clang/test/CodeGenCXX/cfi-nvcall.cpp @@ -25,7 +25,7 @@ // CHECK-LABEL: @cg // CHECK-STRICT-LABEL: @cg extern "C" void cg(C *c) { - // http://clang.llvm.org/docs/ControlFlowIntegrity.html#strictness + // https://clang.llvm.org/docs/ControlFlowIntegrity.html#strictness // In this case C's layout is the same as its base class, so we allow // c to be of type A in non-strict mode. diff --git a/clang/test/CodeGenCXX/microsoft-abi-array-cookies.cpp b/clang/test/CodeGenCXX/microsoft-abi-array-cookies.cpp --- a/clang/test/CodeGenCXX/microsoft-abi-array-cookies.cpp +++ b/clang/test/CodeGenCXX/microsoft-abi-array-cookies.cpp @@ -38,7 +38,7 @@ struct __attribute__((aligned(8))) ClassWithAlignment { // FIXME: replace __attribute__((aligned(8))) with __declspec(align(8)) once - // http://llvm.org/bugs/show_bug.cgi?id=12631 is fixed. + // https://llvm.org/bugs/show_bug.cgi?id=12631 is fixed. int *x, *y; ~ClassWithAlignment() {} }; diff --git a/clang/test/CodeGenCXX/nrvo.cpp b/clang/test/CodeGenCXX/nrvo.cpp --- a/clang/test/CodeGenCXX/nrvo.cpp +++ b/clang/test/CodeGenCXX/nrvo.cpp @@ -74,7 +74,7 @@ // CHECK-EH-11: nrvo.skipdtor: // CHECK-EH-11-NEXT: ret void // -X test0() { // http://wg21.link/p2025r2#ex-2 +X test0() { // https://wg21.link/p2025r2#ex-2 X x; return x; // NRVO happens } @@ -499,7 +499,7 @@ // CHECK-EH-11-NEXT: [[LPAD_VAL1:%.*]] = insertvalue { i8*, i32 } [[LPAD_VAL]], i32 [[SEL]], 1 // CHECK-EH-11-NEXT: resume { i8*, i32 } [[LPAD_VAL1]] // -X test3(bool B) { // http://wg21.link/p2025r2#ex-4 +X test3(bool B) { // https://wg21.link/p2025r2#ex-4 if (B) { X y; return y; // NRVO happens @@ -798,7 +798,7 @@ // CHECK-EH-11-NEXT: call void @__clang_call_terminate(i8* [[TMP15]]) // CHECK-EH-11-NEXT: unreachable // -X test5() { // http://wg21.link/p2025r2#ex-14 +X test5() { // https://wg21.link/p2025r2#ex-14 try { may_throw(); } catch (X x) { @@ -1273,7 +1273,7 @@ // CHECK-EH-11-NEXT: [[LPAD_VAL3:%.*]] = insertvalue { i8*, i32 } [[LPAD_VAL]], i32 [[SEL]], 1 // CHECK-EH-11-NEXT: resume { i8*, i32 } [[LPAD_VAL3]] // -X test10(bool b) { // http://wg21.link/p2025r2#ex-3 +X test10(bool b) { // https://wg21.link/p2025r2#ex-3 X x; if (b) return x; // NRVO is impossible @@ -1409,7 +1409,7 @@ // CHECK-EH-11-NEXT: [[LPAD_VAL3:%.*]] = insertvalue { i8*, i32 } [[LPAD_VAL]], i32 [[SEL]], 1 // CHECK-EH-11-NEXT: resume { i8*, i32 } [[LPAD_VAL3]] // -X test11(bool b) { // http://wg21.link/p2025r2#ex-5 +X test11(bool b) { // https://wg21.link/p2025r2#ex-5 X x; if (b) return X(); @@ -1548,7 +1548,7 @@ // CHECK-EH-11: unreachable: // CHECK-EH-11-NEXT: unreachable // -X test12(bool b) { // http://wg21.link/p2025r2#ex-6 +X test12(bool b) { // https://wg21.link/p2025r2#ex-6 do { X x; if (b) @@ -1673,7 +1673,7 @@ // CHECK-EH-11-NEXT: [[LPAD_VAL1:%.*]] = insertvalue { i8*, i32 } [[LPAD_VAL]], i32 [[SEL]], 1 // CHECK-EH-11-NEXT: resume { i8*, i32 } [[LPAD_VAL1]] // -X test13(bool b) { // http://wg21.link/p2025r2#ex-7 +X test13(bool b) { // https://wg21.link/p2025r2#ex-7 if (b) return X(); X x; @@ -1847,7 +1847,7 @@ // CHECK-EH-11-NEXT: [[LPAD_VAL8:%.*]] = insertvalue { i8*, i32 } [[LPAD_VAL]], i32 [[SEL]], 1 // CHECK-EH-11-NEXT: resume { i8*, i32 } [[LPAD_VAL8]] // -X test14(bool b) { // http://wg21.link/p2025r2#ex-8 +X test14(bool b) { // https://wg21.link/p2025r2#ex-8 X x; if (b) return x; @@ -2022,7 +2022,7 @@ // CHECK-EH-11-NEXT: [[LPAD_VAL8:%.*]] = insertvalue { i8*, i32 } [[LPAD_VAL]], i32 [[SEL]], 1 // CHECK-EH-11-NEXT: resume { i8*, i32 } [[LPAD_VAL8]] // -X test15(bool b) { // http://wg21.link/p2025r2#ex-15 +X test15(bool b) { // https://wg21.link/p2025r2#ex-15 X x; if (b) return (x); @@ -2077,7 +2077,7 @@ // CHECK-EH-11-NEXT: [[LPAD_VAL5:%.*]] = insertvalue { i8*, i32 } [[LPAD_VAL]], i32 [[SEL]], 1 // CHECK-EH-11-NEXT: resume { i8*, i32 } [[LPAD_VAL5]] // -void test16() { // http://wg21.link/p2025r2#ex-9 +void test16() { // https://wg21.link/p2025r2#ex-9 X x; ConsumeX([&] { X y(x); @@ -2377,7 +2377,7 @@ // CHECK-EH-11: unreachable: // CHECK-EH-11-NEXT: unreachable // -X test17(int i) { // http://wg21.link/p2025r2#ex-10 +X test17(int i) { // https://wg21.link/p2025r2#ex-10 if (false) { impossible: if (i == 3) @@ -2667,7 +2667,7 @@ // CHECK-EH-11: unreachable: // CHECK-EH-11-NEXT: unreachable // -X test18(int i) { // http://wg21.link/p2025r2#ex-11 +X test18(int i) { // https://wg21.link/p2025r2#ex-11 { { X x; @@ -2725,7 +2725,7 @@ // CHECK-EH-11-NEXT: [[LPAD_VAL1:%.*]] = insertvalue { i8*, i32 } [[LPAD_VAL]], i32 [[SEL]], 1 // CHECK-EH-11-NEXT: resume { i8*, i32 } [[LPAD_VAL1]] // -X test19() { // http://wg21.link/p2025r2#ex-12 +X test19() { // https://wg21.link/p2025r2#ex-12 X x; struct S { X f() { return X(); } @@ -2738,7 +2738,7 @@ } template -X test20() { // http://wg21.link/p2025r2#ex-18 +X test20() { // https://wg21.link/p2025r2#ex-18 X x; if constexpr (B) { if (false) @@ -2814,7 +2814,7 @@ // CHECK-EH-11: nrvo.skipdtor: // CHECK-EH-11-NEXT: ret void // -const volatile X test21() { // http://wg21.link/p2025r2#ex-19 +const volatile X test21() { // https://wg21.link/p2025r2#ex-19 X x; return x; // NRVO happens } @@ -2898,7 +2898,7 @@ // CHECK-EH-11-NEXT: [[LPAD_VAL1:%.*]] = insertvalue { i8*, i32 } [[LPAD_VAL]], i32 [[SEL]], 1 // CHECK-EH-11-NEXT: resume { i8*, i32 } [[LPAD_VAL1]] // -X test22() { // http://wg21.link/p2025r2#ex-19 +X test22() { // https://wg21.link/p2025r2#ex-19 volatile X x; return x; // NRVO is impossible } @@ -3045,7 +3045,7 @@ // CHECK-EH-11-NEXT: [[LPAD_VAL1:%.*]] = insertvalue { i8*, i32 } [[LPAD_VAL]], i32 [[SEL]], 1 // CHECK-EH-11-NEXT: resume { i8*, i32 } [[LPAD_VAL1]] // -X test23(bool b) { // http://wg21.link/p2025r2#ex-19 +X test23(bool b) { // https://wg21.link/p2025r2#ex-19 if (b) { const X x; return x; // NRVO happens @@ -3089,7 +3089,7 @@ // CHECK-EH-11: nrvo.skipdtor: // CHECK-EH-11-NEXT: ret void // -X test24() { // http://wg21.link/p2025r2#ex-20 +X test24() { // https://wg21.link/p2025r2#ex-20 X x; if (&x == &OuterX) throw 0; diff --git a/clang/test/CodeGenCXX/vtable-layout-abi-examples.cpp b/clang/test/CodeGenCXX/vtable-layout-abi-examples.cpp --- a/clang/test/CodeGenCXX/vtable-layout-abi-examples.cpp +++ b/clang/test/CodeGenCXX/vtable-layout-abi-examples.cpp @@ -12,11 +12,11 @@ // RUN: FileCheck --check-prefix=CHECK-11 %s < %t /// Examples from the Itanium C++ ABI specification. -/// http://www.codesourcery.com/public/cxx-abi/ +/// https://www.codesourcery.com/public/cxx-abi/ namespace Test1 { -// This is from http://www.codesourcery.com/public/cxx-abi/cxx-vtable-ex.html +// This is from https://www.codesourcery.com/public/cxx-abi/cxx-vtable-ex.html // CHECK-1: Vtable for 'Test1::A' (5 entries). // CHECK-1-NEXT: 0 | offset_to_top (0) @@ -169,7 +169,7 @@ namespace Test2 { -// From http://www.codesourcery.com/public/cxx-abi/abi.html#class-types. +// From https://www.codesourcery.com/public/cxx-abi/abi.html#class-types. struct A { virtual void f(); }; struct B : virtual public A { int i; }; @@ -200,7 +200,7 @@ namespace Test3 { -// From http://www.codesourcery.com/public/cxx-abi/abi-examples.html#vtable-ctor +// From https://www.codesourcery.com/public/cxx-abi/abi-examples.html#vtable-ctor struct V1 { int v1; diff --git a/clang/test/CodeGenCoroutines/coro-await-resume-eh-exp-namespace.cpp b/clang/test/CodeGenCoroutines/coro-await-resume-eh-exp-namespace.cpp --- a/clang/test/CodeGenCoroutines/coro-await-resume-eh-exp-namespace.cpp +++ b/clang/test/CodeGenCoroutines/coro-await-resume-eh-exp-namespace.cpp @@ -1,4 +1,4 @@ -// Test the behavior of http://wg21.link/P0664, a proposal to catch any +// Test the behavior of https://wg21.link/P0664, a proposal to catch any // exceptions thrown after the initial suspend point of a coroutine by // executing the handler specified by the promise type's 'unhandled_exception' // member function. diff --git a/clang/test/CodeGenCoroutines/coro-await-resume-eh.cpp b/clang/test/CodeGenCoroutines/coro-await-resume-eh.cpp --- a/clang/test/CodeGenCoroutines/coro-await-resume-eh.cpp +++ b/clang/test/CodeGenCoroutines/coro-await-resume-eh.cpp @@ -1,4 +1,4 @@ -// Test the behavior of http://wg21.link/P0664, a proposal to catch any +// Test the behavior of https://wg21.link/P0664, a proposal to catch any // exceptions thrown after the initial suspend point of a coroutine by // executing the handler specified by the promise type's 'unhandled_exception' // member function. diff --git a/clang/test/CodeGenObjCXX/encode.mm b/clang/test/CodeGenObjCXX/encode.mm --- a/clang/test/CodeGenObjCXX/encode.mm +++ b/clang/test/CodeGenObjCXX/encode.mm @@ -159,7 +159,7 @@ // CHECK: @g4 ={{.*}} constant [19 x i8] c"{Sub2=^^?qcf^^?cd}\00" extern const char g4[] = @encode(Sub2); -// http://llvm.org/PR9927 +// https://llvm.org/PR9927 class allocator { }; class basic_string { diff --git a/clang/test/CodeGenOpenCL/vector_shufflevector.cl b/clang/test/CodeGenOpenCL/vector_shufflevector.cl --- a/clang/test/CodeGenOpenCL/vector_shufflevector.cl +++ b/clang/test/CodeGenOpenCL/vector_shufflevector.cl @@ -1,7 +1,7 @@ // RUN: %clang_cc1 -emit-llvm -O0 %s -o - | FileCheck %s // The shuffle vector mask must always be of i32 vector type -// See http://reviews.llvm.org/D10838 and https://llvm.org/bugs/show_bug.cgi?id=23800#c2 +// See https://reviews.llvm.org/D10838 and https://llvm.org/bugs/show_bug.cgi?id=23800#c2 // for more information about a bug where a 64 bit index operand causes the generation // of an invalid mask diff --git a/clang/test/Driver/cuda-simple.cu b/clang/test/Driver/cuda-simple.cu --- a/clang/test/Driver/cuda-simple.cu +++ b/clang/test/Driver/cuda-simple.cu @@ -1,5 +1,5 @@ // Verify that we can parse a simple CUDA file with or without -save-temps -// http://llvm.org/PR22936 +// https://llvm.org/PR22936 // RUN: %clang --cuda-path=%S/Inputs/CUDA/usr/local/cuda \ // RUN: -nocudainc -nocudalib -Werror -fsyntax-only -c %s // diff --git a/clang/test/Frontend/ast-main.cpp b/clang/test/Frontend/ast-main.cpp --- a/clang/test/Frontend/ast-main.cpp +++ b/clang/test/Frontend/ast-main.cpp @@ -3,7 +3,7 @@ // RUN: env SDKROOT="/" %clang -emit-llvm -S -o %t2.ll -x ast - < %t.ast // RUN: diff %t1.ll %t2.ll -// http://llvm.org/bugs/show_bug.cgi?id=15377 +// https://llvm.org/bugs/show_bug.cgi?id=15377 template struct S { T *mf(); diff --git a/clang/test/Headers/float.c b/clang/test/Headers/float.c --- a/clang/test/Headers/float.c +++ b/clang/test/Headers/float.c @@ -9,7 +9,7 @@ /* Basic floating point conformance checks against: - N1570 draft of C11 Std. - N1256 draft of C99 Std. - - http://port70.net/~nsz/c/c89/c89-draft.html draft of C89/C90 Std. + - https://port70.net/~nsz/c/c89/c89-draft.html draft of C89/C90 Std. */ /* C11, 5.2.4.2.2p11, pp. 30 diff --git a/clang/test/Lexer/gnu-flags.c b/clang/test/Lexer/gnu-flags.c --- a/clang/test/Lexer/gnu-flags.c +++ b/clang/test/Lexer/gnu-flags.c @@ -46,7 +46,7 @@ // This case is handled differently because lit has a bug whereby #line 0 is reported to be on line 4294967295 -// http://llvm.org/bugs/show_bug.cgi?id=16952 +// https://llvm.org/bugs/show_bug.cgi?id=16952 #if ALL || LINE0 #line 0 // expected-warning {{#line directive with zero argument is a GNU extension}} #else diff --git a/clang/test/Lexer/pragma-message.c b/clang/test/Lexer/pragma-message.c --- a/clang/test/Lexer/pragma-message.c +++ b/clang/test/Lexer/pragma-message.c @@ -1,5 +1,5 @@ /* Test pragma message directive from - http://msdn.microsoft.com/en-us/library/x7dkzch2.aspx */ + https://msdn.microsoft.com/en-us/library/x7dkzch2.aspx */ // message: Sends a string literal to the standard output without terminating // the compilation. // #pragma message(messagestring) diff --git a/clang/test/Lexer/pragma-region.c b/clang/test/Lexer/pragma-region.c --- a/clang/test/Lexer/pragma-region.c +++ b/clang/test/Lexer/pragma-region.c @@ -1,5 +1,5 @@ /* Test pragma region directive from - http://msdn.microsoft.com/en-us/library/b6xkz944(v=vs.80).aspx */ + https://msdn.microsoft.com/en-us/library/b6xkz944(v=vs.80).aspx */ // Editor-only pragma, just skipped by compiler. // Syntax: diff --git a/clang/test/Misc/diag-trailing-null-bytes.cpp b/clang/test/Misc/diag-trailing-null-bytes.cpp --- a/clang/test/Misc/diag-trailing-null-bytes.cpp +++ b/clang/test/Misc/diag-trailing-null-bytes.cpp @@ -1,10 +1,9 @@ // RUN: not %clang_cc1 -fsyntax-only %s 2>&1 | FileCheck -strict-whitespace %s // CHECK: {{ERR_DNS_SERVER_REQUIRES_TCP$}} -// http://llvm.org/PR12674 +// https://llvm.org/PR12674 #define NET_ERROR(label, value) ERR_ ## label = value, NET_ERROR(DNS_SERVER_REQUIRES_TCP, -801) #undef NET_ERROR - diff --git a/clang/test/PCH/objc_methods.h b/clang/test/PCH/objc_methods.h --- a/clang/test/PCH/objc_methods.h +++ b/clang/test/PCH/objc_methods.h @@ -9,7 +9,7 @@ // FIXME: @compatibility_alias AliasForTestPCH TestPCH; -// http://llvm.org/PR12689 +// https://llvm.org/PR12689 @interface PR12689 @end diff --git a/clang/test/Parser/cxx2a-template-lambdas.cpp b/clang/test/Parser/cxx2a-template-lambdas.cpp --- a/clang/test/Parser/cxx2a-template-lambdas.cpp +++ b/clang/test/Parser/cxx2a-template-lambdas.cpp @@ -8,7 +8,7 @@ auto L3 = [](auto arg) { T t; }; auto L4 = []() { }; -// http://llvm.org/PR49736 +// https://llvm.org/PR49736 auto L5 = [](){}; auto L6 = []{}; auto L7 = []() noexcept {}; diff --git a/clang/test/Parser/cxx2b-lambdas.cpp b/clang/test/Parser/cxx2b-lambdas.cpp --- a/clang/test/Parser/cxx2b-lambdas.cpp +++ b/clang/test/Parser/cxx2b-lambdas.cpp @@ -34,7 +34,7 @@ // expected-error{{expected body}} \ // expected-warning{{duplicate 'constexpr'}} -// http://llvm.org/PR49736 +// https://llvm.org/PR49736 auto XL4 = [] requires true {}; // expected-error{{expected body}} auto XL5 = [] requires true requires true {}; // expected-error{{expected body}} auto XL6 = [] requires true noexcept requires true {}; // expected-error{{expected body}} diff --git a/clang/test/Preprocessor/pp-record.c b/clang/test/Preprocessor/pp-record.c --- a/clang/test/Preprocessor/pp-record.c +++ b/clang/test/Preprocessor/pp-record.c @@ -1,6 +1,6 @@ // RUN: %clang_cc1 -fsyntax-only -detailed-preprocessing-record %s -// http://llvm.org/PR11120 +// https://llvm.org/PR11120 #define STRINGIZE(text) STRINGIZE_I(text) #define STRINGIZE_I(text) #text diff --git a/clang/test/Preprocessor/pragma-pushpop-macro.c b/clang/test/Preprocessor/pragma-pushpop-macro.c --- a/clang/test/Preprocessor/pragma-pushpop-macro.c +++ b/clang/test/Preprocessor/pragma-pushpop-macro.c @@ -1,5 +1,5 @@ /* Test pragma pop_macro and push_macro directives from - http://msdn.microsoft.com/en-us/library/hsttss76.aspx */ + https://msdn.microsoft.com/en-us/library/hsttss76.aspx */ // pop_macro: Sets the value of the macro_name macro to the value on the top of // the stack for this macro. diff --git a/clang/test/Preprocessor/traditional-cpp.c b/clang/test/Preprocessor/traditional-cpp.c --- a/clang/test/Preprocessor/traditional-cpp.c +++ b/clang/test/Preprocessor/traditional-cpp.c @@ -87,8 +87,8 @@ * CHECK-NOT: {{^}}/* Comments are whitespace too */ -Preserve URLs: http://clang.llvm.org -/* CHECK: {{^}}Preserve URLs: http://clang.llvm.org{{$}} +Preserve URLs: https://clang.llvm.org +/* CHECK: {{^}}Preserve URLs: https://clang.llvm.org{{$}} */ /* The following tests ensure we ignore # and ## in macro bodies */ diff --git a/clang/test/Sema/PR2923.c b/clang/test/Sema/PR2923.c --- a/clang/test/Sema/PR2923.c +++ b/clang/test/Sema/PR2923.c @@ -3,7 +3,7 @@ // Test for absence of crash reported in PR 2923: // -// http://llvm.org/bugs/show_bug.cgi?id=2923 +// https://llvm.org/bugs/show_bug.cgi?id=2923 // // Previously we had a crash when deallocating the FunctionDecl for 'bar' // because FunctionDecl::getNumParams() just used the type of foo to determine diff --git a/clang/test/Sema/types.c b/clang/test/Sema/types.c --- a/clang/test/Sema/types.c +++ b/clang/test/Sema/types.c @@ -61,7 +61,7 @@ char c = (char __attribute__((aligned(8)))) i; // expected-warning {{'aligned' attribute ignored when parsing type}} } -// http://llvm.org/PR11082 +// https://llvm.org/PR11082 // // FIXME: This may or may not be the correct approach (no warning or error), // but large amounts of Linux and FreeBSD code need this attribute to not be diff --git a/clang/test/SemaCXX/__try.cpp b/clang/test/SemaCXX/__try.cpp --- a/clang/test/SemaCXX/__try.cpp +++ b/clang/test/SemaCXX/__try.cpp @@ -1,6 +1,6 @@ // RUN: %clang_cc1 -triple x86_64-windows -fsyntax-only -verify -fborland-extensions -fcxx-exceptions %s -// This test is from http://docwiki.embarcadero.com/RADStudio/en/Try +// This test is from https://docwiki.embarcadero.com/RADStudio/en/Try int puts(const char *); diff --git a/clang/test/SemaCXX/compound-literal.cpp b/clang/test/SemaCXX/compound-literal.cpp --- a/clang/test/SemaCXX/compound-literal.cpp +++ b/clang/test/SemaCXX/compound-literal.cpp @@ -4,7 +4,7 @@ // RUN: FileCheck --input-file=%t-11 %s // RUN: FileCheck --input-file=%t-11 %s --check-prefix=CHECK-CXX11 -// http://llvm.org/PR7905 +// https://llvm.org/PR7905 namespace PR7905 { struct S; // expected-note {{forward declaration}} void foo1() { diff --git a/clang/test/SemaCXX/coroutine-final-suspend-noexcept-exp-namespace.cpp b/clang/test/SemaCXX/coroutine-final-suspend-noexcept-exp-namespace.cpp --- a/clang/test/SemaCXX/coroutine-final-suspend-noexcept-exp-namespace.cpp +++ b/clang/test/SemaCXX/coroutine-final-suspend-noexcept-exp-namespace.cpp @@ -1,5 +1,5 @@ // This file contains references to sections of the Coroutines TS, which can be -// found at http://wg21.link/coroutines. +// found at https://wg21.link/coroutines. // RUN: %clang_cc1 -std=c++14 -fcoroutines-ts -verify %s -fcxx-exceptions -fexceptions -Wunused-result diff --git a/clang/test/SemaCXX/coroutine-final-suspend-noexcept.cpp b/clang/test/SemaCXX/coroutine-final-suspend-noexcept.cpp --- a/clang/test/SemaCXX/coroutine-final-suspend-noexcept.cpp +++ b/clang/test/SemaCXX/coroutine-final-suspend-noexcept.cpp @@ -1,5 +1,5 @@ // This file contains references to sections of the Coroutines TS, which can be -// found at http://wg21.link/coroutines. +// found at https://wg21.link/coroutines. // RUN: %clang_cc1 -std=c++20 -verify %s -fcxx-exceptions -fexceptions -Wunused-result diff --git a/clang/test/SemaCXX/coroutine-traits-undefined-template-exp-namespace.cpp b/clang/test/SemaCXX/coroutine-traits-undefined-template-exp-namespace.cpp --- a/clang/test/SemaCXX/coroutine-traits-undefined-template-exp-namespace.cpp +++ b/clang/test/SemaCXX/coroutine-traits-undefined-template-exp-namespace.cpp @@ -1,5 +1,5 @@ // This file contains references to sections of the Coroutines TS, which can be -// found at http://wg21.link/coroutines. +// found at https://wg21.link/coroutines. // RUN: %clang_cc1 -std=c++14 -fcoroutines-ts -verify %s -fcxx-exceptions -fexceptions -Wunused-result diff --git a/clang/test/SemaCXX/coroutine-traits-undefined-template.cpp b/clang/test/SemaCXX/coroutine-traits-undefined-template.cpp --- a/clang/test/SemaCXX/coroutine-traits-undefined-template.cpp +++ b/clang/test/SemaCXX/coroutine-traits-undefined-template.cpp @@ -1,5 +1,5 @@ // This file contains references to sections of the Coroutines TS, which can be -// found at http://wg21.link/coroutines. +// found at https://wg21.link/coroutines. // RUN: %clang_cc1 -std=c++20 -verify %s -fcxx-exceptions -fexceptions -Wunused-result diff --git a/clang/test/SemaCXX/coroutines.cpp b/clang/test/SemaCXX/coroutines.cpp --- a/clang/test/SemaCXX/coroutines.cpp +++ b/clang/test/SemaCXX/coroutines.cpp @@ -1,5 +1,5 @@ // This file contains references to sections of the Coroutines TS, which can be -// found at http://wg21.link/coroutines. +// found at https://wg21.link/coroutines. // RUN: %clang_cc1 -std=c++2b -fsyntax-only -verify=expected,cxx20_2b,cxx2b %s -fcxx-exceptions -fexceptions -Wunused-result // RUN: %clang_cc1 -std=c++20 -fsyntax-only -verify=expected,cxx14_20,cxx20_2b %s -fcxx-exceptions -fexceptions -Wunused-result diff --git a/clang/test/SemaCXX/crashes.cpp b/clang/test/SemaCXX/crashes.cpp --- a/clang/test/SemaCXX/crashes.cpp +++ b/clang/test/SemaCXX/crashes.cpp @@ -48,7 +48,7 @@ }; } -// http://llvm.org/PR8234 +// https://llvm.org/PR8234 namespace PR8234 { template class callback @@ -240,4 +240,3 @@ appendList(int[]...); // expected-error {{a type specifier is required for all declarations}} appendList(int[]...) { } // expected-error {{a type specifier is required for all declarations}} } - diff --git a/clang/test/SemaCXX/default2.cpp b/clang/test/SemaCXX/default2.cpp --- a/clang/test/SemaCXX/default2.cpp +++ b/clang/test/SemaCXX/default2.cpp @@ -111,7 +111,7 @@ ZZ(ZZ&, int = 17); // expected-note{{candidate constructor}} }; -// http://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#325 +// https://www.open-std.org/jtc1/sc22/wg21/docs/cwg_active.html#325 class C2 { static void g(int = f()); // expected-error{{use of default argument to function 'f' that is declared later in class 'C2'}} static int f(int = 10); // expected-note{{default argument declared here}} diff --git a/clang/test/SemaCXX/expression-traits.cpp b/clang/test/SemaCXX/expression-traits.cpp --- a/clang/test/SemaCXX/expression-traits.cpp +++ b/clang/test/SemaCXX/expression-traits.cpp @@ -5,7 +5,7 @@ // // For the time being, these tests are written against the 2003 C++ // standard (ISO/IEC 14882:2003 -- see draft at -// http://www.open-std.org/JTC1/SC22/WG21/docs/papers/2001/n1316/). +// https://www.open-std.org/JTC1/SC22/WG21/docs/papers/2001/n1316/). // // C++0x has its own, more-refined, idea of lvalues and rvalues. // If/when we need to support those, we'll need to track both @@ -430,7 +430,7 @@ // // The mention of "lvalue" in the text above appears to be a // defect that is being corrected by the response to UK65 (see -// http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2009/n2841.html). +// https://www.open-std.org/jtc1/sc22/wg21/docs/papers/2009/n2841.html). #if 0 void expr_typeid_1() diff --git a/clang/test/SemaCXX/member-pointer-ms.cpp b/clang/test/SemaCXX/member-pointer-ms.cpp --- a/clang/test/SemaCXX/member-pointer-ms.cpp +++ b/clang/test/SemaCXX/member-pointer-ms.cpp @@ -13,7 +13,7 @@ // - templated with declared specializations with annotations // - template that can be instantiated -// http://llvm.org/PR12070 +// https://llvm.org/PR12070 struct Foo { typedef int Foo::*FooInt; int f; diff --git a/clang/test/SemaCXX/missing-namespace-qualifier-typo-corrections.cpp b/clang/test/SemaCXX/missing-namespace-qualifier-typo-corrections.cpp --- a/clang/test/SemaCXX/missing-namespace-qualifier-typo-corrections.cpp +++ b/clang/test/SemaCXX/missing-namespace-qualifier-typo-corrections.cpp @@ -62,7 +62,7 @@ nylinkedlist w; // expected-error{{unknown type name 'nylinkedlist'; did you mean 'realstd::mylinkedlist'?}} } -// Test case from http://llvm.org/bugs/show_bug.cgi?id=10318 +// Test case from https://llvm.org/bugs/show_bug.cgi?id=10318 namespace llvm { template class GraphWriter {}; // expected-note 3{{declared here}} } diff --git a/clang/test/SemaCXX/nested-name-spec.cpp b/clang/test/SemaCXX/nested-name-spec.cpp --- a/clang/test/SemaCXX/nested-name-spec.cpp +++ b/clang/test/SemaCXX/nested-name-spec.cpp @@ -274,7 +274,7 @@ namespace alias = A; double *dp = (alias::C*)0; // expected-error{{cannot initialize a variable of type 'double *' with an rvalue of type 'alias::C *'}} -// http://llvm.org/PR10109 +// https://llvm.org/PR10109 namespace PR10109 { template struct A { diff --git a/clang/test/SemaCXX/scope-check.cpp b/clang/test/SemaCXX/scope-check.cpp --- a/clang/test/SemaCXX/scope-check.cpp +++ b/clang/test/SemaCXX/scope-check.cpp @@ -184,7 +184,7 @@ } } -// http://llvm.org/PR10462 +// https://llvm.org/PR10462 namespace PR10462 { enum MyEnum { something_valid, diff --git a/clang/test/SemaCXX/warn-memset-bad-sizeof.cpp b/clang/test/SemaCXX/warn-memset-bad-sizeof.cpp --- a/clang/test/SemaCXX/warn-memset-bad-sizeof.cpp +++ b/clang/test/SemaCXX/warn-memset-bad-sizeof.cpp @@ -24,7 +24,7 @@ return dest; } -// http://www.lysator.liu.se/c/c-faq/c-2.html#2-6 +// https://www.lysator.liu.se/c/c-faq/c-2.html#2-6 void f(Mat m, const Foo& const_foo, char *buffer) { S s; S* ps = &s; diff --git a/clang/test/SemaCXX/warn-shadow.cpp b/clang/test/SemaCXX/warn-shadow.cpp --- a/clang/test/SemaCXX/warn-shadow.cpp +++ b/clang/test/SemaCXX/warn-shadow.cpp @@ -59,13 +59,13 @@ // expected-warning-re@+1 4 {{constructor parameter 'f{{[0-4]}}' shadows the field 'f{{[0-9]}}' of 'A'}} A(int f1, int f2, int f3, int f4, double overload_dummy) {} - void test() { - char *field; // expected-warning {{declaration shadows a field of 'A'}} - char *data; // expected-warning {{declaration shadows a static data member of 'A'}} + void test() { + char *field; // expected-warning {{declaration shadows a field of 'A'}} + char *data; // expected-warning {{declaration shadows a static data member of 'A'}} char *a1; // no warning - char *a2; // no warning - char *jj; // no warning - char *jjj; // no warning + char *a2; // no warning + char *jj; // no warning + char *jjj; // no warning } void test2() { @@ -126,7 +126,7 @@ } } -// http://llvm.org/PR9160 +// https://llvm.org/PR9160 namespace PR9160 { struct V { V(int); @@ -196,14 +196,14 @@ int k; // expected-note {{previous definition is here}} typedef int k; // expected-error {{redefinition of 'k'}} - using l=char; // no warning or error. - using l=char; // no warning or error. - typedef char l; // no warning or error. + using l=char; // no warning or error. + using l=char; // no warning or error. + typedef char l; // no warning or error. typedef char n; // no warning or error. typedef char n; // no warning or error. - using n=char; // no warning or error. -} + using n=char; // no warning or error. +} } @@ -219,42 +219,42 @@ struct A { void g(int a) {} A() { int a; } - }; -} -} - -namespace PR34120 { -struct A { - int B; // expected-note 2 {{declared here}} -}; - -class C : public A { - void D(int B) {} // expected-warning {{parameter 'B' shadows member inherited from type 'A'}} - void E() { - extern void f(int B); // Ok - } - void F(int B); // Ok, declaration; not definition. - void G(int B); -}; - -void C::G(int B) { // expected-warning {{parameter 'B' shadows member inherited from type 'A'}} -} - -class Private { - int B; -}; -class Derived : Private { - void D(int B) {} // Ok -}; - -struct Static { - static int B; -}; - -struct Derived2 : Static { - void D(int B) {} -}; -} + }; +} +} + +namespace PR34120 { +struct A { + int B; // expected-note 2 {{declared here}} +}; + +class C : public A { + void D(int B) {} // expected-warning {{parameter 'B' shadows member inherited from type 'A'}} + void E() { + extern void f(int B); // Ok + } + void F(int B); // Ok, declaration; not definition. + void G(int B); +}; + +void C::G(int B) { // expected-warning {{parameter 'B' shadows member inherited from type 'A'}} +} + +class Private { + int B; +}; +class Derived : Private { + void D(int B) {} // Ok +}; + +struct Static { + static int B; +}; + +struct Derived2 : Static { + void D(int B) {} +}; +} int PR24718; enum class X { PR24718 }; // Ok, not shadowing @@ -305,4 +305,4 @@ } } -}; // namespace structured_binding_tests \ No newline at end of file +}; // namespace structured_binding_tests diff --git a/clang/test/SemaObjC/comptypes-9.m b/clang/test/SemaObjC/comptypes-9.m --- a/clang/test/SemaObjC/comptypes-9.m +++ b/clang/test/SemaObjC/comptypes-9.m @@ -1,5 +1,5 @@ // RUN: %clang_cc1 -fsyntax-only %s -// FIXME: This test case tests the patch applied in: http://lists.llvm.org/pipermail/cfe-commits/Week-of-Mon-20080602/006017.html +// FIXME: This test case tests the patch applied in: https://lists.llvm.org/pipermail/cfe-commits/Week-of-Mon-20080602/006017.html // Eventually that logic should be treated as an extension. typedef signed char BOOL; diff --git a/clang/test/SemaObjC/format-strings-objc.m b/clang/test/SemaObjC/format-strings-objc.m --- a/clang/test/SemaObjC/format-strings-objc.m +++ b/clang/test/SemaObjC/format-strings-objc.m @@ -166,7 +166,7 @@ typedef __WCHAR_TYPE__ wchar_t; // Test that %S, %C, %ls check for 16 bit types in ObjC strings, as described at -// http://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/Strings/Articles/formatSpecifiers.html#//apple_ref/doc/uid/TP40004265 +// https://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/Strings/Articles/formatSpecifiers.html#//apple_ref/doc/uid/TP40004265 void test_percent_S(void) { const unsigned short data[] = { 'a', 'b', 0 }; diff --git a/clang/test/SemaTemplate/inject-templated-friend-post.cpp b/clang/test/SemaTemplate/inject-templated-friend-post.cpp --- a/clang/test/SemaTemplate/inject-templated-friend-post.cpp +++ b/clang/test/SemaTemplate/inject-templated-friend-post.cpp @@ -5,7 +5,7 @@ // RUN: %clang_cc1 %s -DREDEFINE -verify // RUN: %clang_cc1 %s -DPROTOTYPE -DREDEFINE -verify // PR8007: friend function not instantiated, reordered version. -// Corresponds to http://gcc.gnu.org/bugzilla/show_bug.cgi?id=38392 +// Corresponds to https://gcc.gnu.org/bugzilla/show_bug.cgi?id=38392 // CHECK: define linkonce_odr{{.*}}_ZlsR11std_ostreamRK8StreamerI3FooE // CHECK-PROTOTYPE: define linkonce_odr{{.*}}_ZlsR11std_ostreamRK8StreamerI3FooE @@ -74,4 +74,3 @@ Foo foo; test(foo); } - diff --git a/clang/tools/clang-check/ClangCheck.cpp b/clang/tools/clang-check/ClangCheck.cpp --- a/clang/tools/clang-check/ClangCheck.cpp +++ b/clang/tools/clang-check/ClangCheck.cpp @@ -10,7 +10,7 @@ // stored in a compilation database. // // This tool uses the Clang Tooling infrastructure, see -// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html // for details on setting it up with LLVM source tree. // //===----------------------------------------------------------------------===// diff --git a/clang/tools/clang-format-vs/ClangFormat/ClangFormat.csproj b/clang/tools/clang-format-vs/ClangFormat/ClangFormat.csproj --- a/clang/tools/clang-format-vs/ClangFormat/ClangFormat.csproj +++ b/clang/tools/clang-format-vs/ClangFormat/ClangFormat.csproj @@ -1,5 +1,5 @@  - + Debug diff --git a/clang/tools/clang-format-vs/ClangFormat/ClangFormat.vsct b/clang/tools/clang-format-vs/ClangFormat/ClangFormat.vsct --- a/clang/tools/clang-format-vs/ClangFormat/ClangFormat.vsct +++ b/clang/tools/clang-format-vs/ClangFormat/ClangFormat.vsct @@ -1,5 +1,5 @@  - + - - + + @@ -126,4 +126,4 @@ System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 - \ No newline at end of file + diff --git a/clang/tools/clang-format-vs/ClangFormat/VSPackage.resx b/clang/tools/clang-format-vs/ClangFormat/VSPackage.resx --- a/clang/tools/clang-format-vs/ClangFormat/VSPackage.resx +++ b/clang/tools/clang-format-vs/ClangFormat/VSPackage.resx @@ -69,8 +69,8 @@ : using a System.ComponentModel.TypeConverter : and then encoded with base64 encoding. --> - - + + @@ -137,4 +137,4 @@ Resources\Package.ico;System.Drawing.Icon, System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a - \ No newline at end of file + diff --git a/clang/tools/clang-format-vs/ClangFormat/Vsix.cs b/clang/tools/clang-format-vs/ClangFormat/Vsix.cs --- a/clang/tools/clang-format-vs/ClangFormat/Vsix.cs +++ b/clang/tools/clang-format-vs/ClangFormat/Vsix.cs @@ -53,7 +53,7 @@ public static IVsTextView GetVsTextViewFrompPath(string filePath) { - // From http://stackoverflow.com/a/2427368/4039972 + // From https://stackoverflow.com/a/2427368/4039972 var dte2 = (EnvDTE80.DTE2)Package.GetGlobalService(typeof(SDTE)); var sp = (Microsoft.VisualStudio.OLE.Interop.IServiceProvider)dte2; var serviceProvider = new Microsoft.VisualStudio.Shell.ServiceProvider(sp); diff --git a/clang/tools/clang-format-vs/ClangFormat/license.txt b/clang/tools/clang-format-vs/ClangFormat/license.txt --- a/clang/tools/clang-format-vs/ClangFormat/license.txt +++ b/clang/tools/clang-format-vs/ClangFormat/license.txt @@ -4,7 +4,7 @@ Apache License Version 2.0, January 2004 - http://www.apache.org/licenses/ + https://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION @@ -196,7 +196,7 @@ you may not use this file except in compliance with the License. You may obtain a copy of the License at - http://www.apache.org/licenses/LICENSE-2.0 + https://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, @@ -248,7 +248,7 @@ University of Illinois at Urbana-Champaign - http://llvm.org + https://llvm.org Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal with the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: diff --git a/clang/tools/clang-format-vs/source.extension.vsixmanifest.in b/clang/tools/clang-format-vs/source.extension.vsixmanifest.in --- a/clang/tools/clang-format-vs/source.extension.vsixmanifest.in +++ b/clang/tools/clang-format-vs/source.extension.vsixmanifest.in @@ -1,10 +1,10 @@  - + ClangFormat A tool to format C/C++/Obj-C code. - http://clang.llvm.org/docs/ClangFormat.html + https://clang.llvm.org/docs/ClangFormat.html license.txt diff --git a/clang/tools/clang-format/clang-format.el b/clang/tools/clang-format/clang-format.el --- a/clang/tools/clang-format/clang-format.el +++ b/clang/tools/clang-format/clang-format.el @@ -8,14 +8,14 @@ ;; This package allows to filter code through clang-format to fix its formatting. ;; clang-format is a tool that formats C/C++/Obj-C code according to a set of -;; style options, see . +;; style options, see . ;; Note that clang-format 3.4 or newer is required. ;; clang-format.el is available via MELPA and can be installed via ;; ;; M-x package-install clang-format ;; -;; when ("melpa" . "http://melpa.org/packages/") is included in +;; when ("melpa" . "https://melpa.org/packages/") is included in ;; `package-archives'. Alternatively, ensure the directory of this ;; file is in your `load-path' and add ;; diff --git a/clang/tools/clang-fuzzer/Dockerfile b/clang/tools/clang-fuzzer/Dockerfile --- a/clang/tools/clang-fuzzer/Dockerfile +++ b/clang/tools/clang-fuzzer/Dockerfile @@ -18,9 +18,9 @@ RUN wget -qO- https://github.com/google/protobuf/releases/download/v3.3.0/protobuf-cpp-3.3.0.tar.gz | tar zxf - RUN cd protobuf-3.3.0 && ./autogen.sh && ./configure && make -j $(nproc) && make check -j $(nproc) && make install && ldconfig # Get LLVM -RUN svn co http://llvm.org/svn/llvm-project/llvm/trunk llvm -RUN cd llvm/tools && svn co http://llvm.org/svn/llvm-project/cfe/trunk clang -r $(cd ../ && svn info | grep Revision | awk '{print $2}') -RUN cd llvm/projects && svn co http://llvm.org/svn/llvm-project/compiler-rt/trunk compiler-rt -r $(cd ../ && svn info | grep Revision | awk '{print $2}') +RUN svn co https://llvm.org/svn/llvm-project/llvm/trunk llvm +RUN cd llvm/tools && svn co https://llvm.org/svn/llvm-project/cfe/trunk clang -r $(cd ../ && svn info | grep Revision | awk '{print $2}') +RUN cd llvm/projects && svn co https://llvm.org/svn/llvm-project/compiler-rt/trunk compiler-rt -r $(cd ../ && svn info | grep Revision | awk '{print $2}') # Build plain LLVM (stage 0) RUN mkdir build0 && cd build0 && cmake -GNinja -DCMAKE_BUILD_TYPE=Release ../llvm && ninja # Configure instrumented LLVM (stage 1) diff --git a/clang/tools/driver/Info.plist.in b/clang/tools/driver/Info.plist.in --- a/clang/tools/driver/Info.plist.in +++ b/clang/tools/driver/Info.plist.in @@ -1,5 +1,5 @@ - + CFBundleIdentifier diff --git a/clang/tools/scan-build-py/README.md b/clang/tools/scan-build-py/README.md --- a/clang/tools/scan-build-py/README.md +++ b/clang/tools/scan-build-py/README.md @@ -141,6 +141,6 @@ The project is licensed under Apache-2.0 with LLVM exceptions. See LICENSE.TXT for details. - [1]: http://clang.llvm.org/docs/JSONCompilationDatabase.html + [1]: https://clang.llvm.org/docs/JSONCompilationDatabase.html [2]: https://pypi.python.org/pypi/scan-build [3]: https://llvm.org/bugs/enter_bug.cgi?product=clang diff --git a/clang/tools/scan-build-py/lib/libscanbuild/resources/sorttable.js b/clang/tools/scan-build-py/lib/libscanbuild/resources/sorttable.js --- a/clang/tools/scan-build-py/lib/libscanbuild/resources/sorttable.js +++ b/clang/tools/scan-build-py/lib/libscanbuild/resources/sorttable.js @@ -2,7 +2,7 @@ SortTable version 2 7th April 2007 - Stuart Langridge, http://www.kryogenix.org/code/browser/sorttable/ + Stuart Langridge, https://www.kryogenix.org/code/browser/sorttable/ Instructions: Download this file @@ -11,7 +11,7 @@ Click on the headers to sort Thanks to many, many people for contributions and suggestions. - Licenced as X11: http://www.kryogenix.org/code/browser/licence.html + Licenced as X11: https://www.kryogenix.org/code/browser/licence.html This basically means: do what you want with it. */ @@ -337,7 +337,7 @@ shaker_sort : function(list, comp_func) { // A stable sort function to allow multi-level sorting of data - // see: http://en.wikipedia.org/wiki/Cocktail_sort + // see: https://en.wikipedia.org/wiki/Cocktail_sort // thanks to Joseph Nahmias var b = 0; var t = list.length - 1; @@ -410,7 +410,7 @@ // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini -// http://dean.edwards.name/weblog/2005/10/add-event/ +// https://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { @@ -480,11 +480,11 @@ fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } -// Dean's forEach: http://dean.edwards.name/base/forEach.js +// Dean's forEach: https://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards - License: http://www.opensource.org/licenses/mit-license.php + License: https://www.opensource.org/licenses/mit-license.php */ // array-like enumeration @@ -532,4 +532,4 @@ } resolve.forEach(object, block, context); } -}; \ No newline at end of file +}; diff --git a/clang/tools/scan-build/bin/scan-build b/clang/tools/scan-build/bin/scan-build --- a/clang/tools/scan-build/bin/scan-build +++ b/clang/tools/scan-build/bin/scan-build @@ -106,7 +106,7 @@ Diag ("The analyzer encountered problems on some source files.\n"); Diag ("Preprocessed versions of these sources were deposited in '$Dir/failures'.\n"); Diag ("Please consider submitting a bug report using these files:\n"); - Diag (" http://clang-analyzer.llvm.org/filing_bugs.html\n") + Diag (" https://clang-analyzer.llvm.org/filing_bugs.html\n") } sub DieDiag { @@ -883,7 +883,7 @@ } print OUT "\n"; } - print OUT "

Please consider submitting preprocessed files as bug reports.

\n"; + print OUT "

Please consider submitting preprocessed files as bug reports.

\n"; } print OUT "\n"; diff --git a/clang/tools/scan-view/bin/scan-view b/clang/tools/scan-view/bin/scan-view --- a/clang/tools/scan-view/bin/scan-view +++ b/clang/tools/scan-view/bin/scan-view @@ -42,7 +42,7 @@ def start_browser(port, options): import webbrowser - url = 'http://%s:%d' % (options.host, port) + url = 'https://%s:%d' % (options.host, port) # Wait for server to start... if options.debug: @@ -73,7 +73,7 @@ import ScanView try: - print('Starting scan-view at: http://%s:%d' % (options.host, + print('Starting scan-view at: https://%s:%d' % (options.host, port)) print(' Use Ctrl-C to exit.') httpd = ScanView.create_server((options.host, port), diff --git a/clang/tools/scan-view/share/startfile.py b/clang/tools/scan-view/share/startfile.py --- a/clang/tools/scan-view/share/startfile.py +++ b/clang/tools/scan-view/share/startfile.py @@ -2,7 +2,7 @@ # -*- coding: utf-8 -*- """Utility for opening a file using the default application in a cross-platform -manner. Modified from http://code.activestate.com/recipes/511443/. +manner. Modified from https://code.activestate.com/recipes/511443/. """ __version__ = '1.1x' diff --git a/clang/unittests/Driver/DistroTest.cpp b/clang/unittests/Driver/DistroTest.cpp --- a/clang/unittests/Driver/DistroTest.cpp +++ b/clang/unittests/Driver/DistroTest.cpp @@ -42,9 +42,9 @@ "ID_LIKE=debian\n" "PRETTY_NAME=\"Ubuntu 14.04 LTS\"\n" "VERSION_ID=\"14.04\"\n" - "HOME_URL=\"http://www.ubuntu.com/\"\n" - "SUPPORT_URL=\"http://help.ubuntu.com/\"\n" - "BUG_REPORT_URL=\"http://bugs.launchpad.net/ubuntu/\"\n")); + "HOME_URL=\"https://www.ubuntu.com/\"\n" + "SUPPORT_URL=\"https://help.ubuntu.com/\"\n" + "BUG_REPORT_URL=\"https://bugs.launchpad.net/ubuntu/\"\n")); Distro UbuntuTrusty{UbuntuTrustyFileSystem, llvm::Triple("unknown-pc-linux")}; ASSERT_EQ(Distro(Distro::UbuntuTrusty), UbuntuTrusty); @@ -72,10 +72,10 @@ "ID_LIKE=debian\n" "PRETTY_NAME=\"Ubuntu 16.10\"\n" "VERSION_ID=\"16.10\"\n" - "HOME_URL=\"http://www.ubuntu.com/\"\n" - "SUPPORT_URL=\"http://help.ubuntu.com/\"\n" - "BUG_REPORT_URL=\"http://bugs.launchpad.net/ubuntu/\"\n" - "PRIVACY_POLICY_URL=\"http://www.ubuntu.com/legal/terms-and-policies/privacy-policy\"\n" + "HOME_URL=\"https://www.ubuntu.com/\"\n" + "SUPPORT_URL=\"https://help.ubuntu.com/\"\n" + "BUG_REPORT_URL=\"https://bugs.launchpad.net/ubuntu/\"\n" + "PRIVACY_POLICY_URL=\"https://www.ubuntu.com/legal/terms-and-policies/privacy-policy\"\n" "VERSION_CODENAME=yakkety\n" "UBUNTU_CODENAME=yakkety\n")); @@ -241,8 +241,8 @@ "VERSION_ID=\"8\"\n" "VERSION=\"8 (jessie)\"\n" "ID=debian\n" - "HOME_URL=\"http://www.debian.org/\"\n" - "SUPPORT_URL=\"http://www.debian.org/support\"\n" + "HOME_URL=\"https://www.debian.org/\"\n" + "SUPPORT_URL=\"https://www.debian.org/support\"\n" "BUG_REPORT_URL=\"https://bugs.debian.org/\"\n")); Distro DebianJessie{DebianJessieFileSystem, llvm::Triple("unknown-pc-linux")}; @@ -260,8 +260,8 @@ llvm::MemoryBuffer::getMemBuffer("PRETTY_NAME=\"Debian GNU/Linux stretch/sid\"\n" "NAME=\"Debian GNU/Linux\"\n" "ID=debian\n" - "HOME_URL=\"http://www.debian.org/\"\n" - "SUPPORT_URL=\"http://www.debian.org/support\"\n" + "HOME_URL=\"https://www.debian.org/\"\n" + "SUPPORT_URL=\"https://www.debian.org/support\"\n" "BUG_REPORT_URL=\"https://bugs.debian.org/\"\n")); Distro DebianStretchSid{DebianStretchSidFileSystem, llvm::Triple("unknown-pc-linux")}; diff --git a/clang/unittests/Format/FormatTest.cpp b/clang/unittests/Format/FormatTest.cpp --- a/clang/unittests/Format/FormatTest.cpp +++ b/clang/unittests/Format/FormatTest.cpp @@ -17600,7 +17600,7 @@ " double bar();\n" "};\n", Alignment); - // http://llvm.org/PR52914 + // https://llvm.org/PR52914 verifyFormat("char *a[] = {\"a\", // comment\n" " \"bb\"};\n" "int bbbbbbb = 0;", diff --git a/clang/unittests/Format/FormatTestJS.cpp b/clang/unittests/Format/FormatTestJS.cpp --- a/clang/unittests/Format/FormatTestJS.cpp +++ b/clang/unittests/Format/FormatTestJS.cpp @@ -1327,7 +1327,7 @@ TEST_F(FormatTestJS, WrapRespectsAutomaticSemicolonInsertion) { // The following statements must not wrap, as otherwise the program meaning // would change due to automatic semicolon insertion. - // See http://www.ecma-international.org/ecma-262/5.1/#sec-7.9.1. + // See https://www.ecma-international.org/ecma-262/5.1/#sec-7.9.1. verifyFormat("return aaaaa;", getGoogleJSStyleWithColumns(10)); verifyFormat("yield aaaaa;", getGoogleJSStyleWithColumns(10)); verifyFormat("return /* hello! */ aaaaa;", getGoogleJSStyleWithColumns(10)); @@ -2301,10 +2301,10 @@ " */", getGoogleJSStyleWithColumns(13)); verifyFormat("/**\n" - " * @see http://very/very/long/url/is/long\n" + " * @see https://very/very/long/url/is/long\n" " */", "/**\n" - " * @see http://very/very/long/url/is/long\n" + " * @see https://very/very/long/url/is/long\n" " */", getGoogleJSStyleWithColumns(20)); verifyFormat("/**\n" diff --git a/clang/unittests/Format/FormatTestTextProto.cpp b/clang/unittests/Format/FormatTestTextProto.cpp --- a/clang/unittests/Format/FormatTestTextProto.cpp +++ b/clang/unittests/Format/FormatTestTextProto.cpp @@ -572,7 +572,7 @@ TEST_F(FormatTestTextProto, PutsMultipleEntriesInExtensionsOnNewlines) { FormatStyle Style = getGoogleStyle(FormatStyle::LK_TextProto); verifyFormat("pppppppppp: {\n" - " ssssss: \"http://example.com/blahblahblah\"\n" + " ssssss: \"https://example.com/blahblahblah\"\n" " ppppppp: \"sssss/MMMMMMMMMMMM\"\n" " [ns.sssss.eeeeeeeee.eeeeeeeeeeeeeee] { begin: 24 end: 252 }\n" " [ns.sssss.eeeeeeeee.eeeeeeeeeeeeeee] {\n" diff --git a/clang/unittests/Format/TokenAnnotatorTest.cpp b/clang/unittests/Format/TokenAnnotatorTest.cpp --- a/clang/unittests/Format/TokenAnnotatorTest.cpp +++ b/clang/unittests/Format/TokenAnnotatorTest.cpp @@ -483,7 +483,7 @@ EXPECT_TOKEN(Tokens[29], tok::kw_requires, TT_RequiresClauseInARequiresExpression); - // Invalid Code, but we don't want to crash. See http://llvm.org/PR54350. + // Invalid Code, but we don't want to crash. See https://llvm.org/PR54350. Tokens = annotate("bool r10 = requires (struct new_struct { int x; } s) { " "requires true; };"); ASSERT_EQ(Tokens.size(), 21u) << Tokens; diff --git a/clang/utils/ClangVisualizers/clang.natvis b/clang/utils/ClangVisualizers/clang.natvis --- a/clang/utils/ClangVisualizers/clang.natvis +++ b/clang/utils/ClangVisualizers/clang.natvis @@ -6,7 +6,7 @@ "%USERPROFILE%\Documents\Visual Studio 2013\Visualizers" or create a symbolic link so it updates automatically. For later versions of Visual Studio, no setup is required--> - + + diff --git a/clang/www/demo/what is this directory.txt b/clang/www/demo/what is this directory.txt --- a/clang/www/demo/what is this directory.txt +++ b/clang/www/demo/what is this directory.txt @@ -1,5 +1,5 @@ This is for the LLVM+Clang browser based demo. -It is supposed to work like the LLVM+GCC demo here: http://llvm.org/demo/ but for the BSD licensed Clang instead. +It is supposed to work like the LLVM+GCC demo here: https://llvm.org/demo/ but for the BSD licensed Clang instead. Perhaps it could also be used for getting crash information and details on errors.... I'm not sure if this would require some major changes or not to report this info. Maybe also adding ways that people can use it to test for errors and a way to report such errors would also be good. @@ -12,4 +12,4 @@ -- BTW, once this feature was working, my intention was to link to it from the index.html page in the section entitled: -Try Clang \ No newline at end of file +Try Clang diff --git a/clang/www/diagnostics.html b/clang/www/diagnostics.html --- a/clang/www/diagnostics.html +++ b/clang/www/diagnostics.html @@ -1,5 +1,5 @@ + "https://www.w3.org/TR/html4/strict.dtd"> diff --git a/clang/www/features.html b/clang/www/features.html --- a/clang/www/features.html +++ b/clang/www/features.html @@ -1,5 +1,5 @@ + "https://www.w3.org/TR/html4/strict.dtd"> diff --git a/clang/www/get_involved.html b/clang/www/get_involved.html --- a/clang/www/get_involved.html +++ b/clang/www/get_involved.html @@ -1,5 +1,5 @@ + "https://www.w3.org/TR/html4/strict.dtd"> @@ -59,7 +59,7 @@ list. All of these lists have archives, so you can browse through previous discussions or follow the list development on the web if you prefer.

-

You can also follow the Planet Clang +

You can also follow the Planet Clang community news feed which offers a window into the world, work and lives of Clang developers, contributors and the standards they implement.

diff --git a/clang/www/get_started.html b/clang/www/get_started.html --- a/clang/www/get_started.html +++ b/clang/www/get_started.html @@ -1,5 +1,5 @@ + "https://www.w3.org/TR/html4/strict.dtd"> @@ -136,8 +136,8 @@ MSys utilities provided by git for Windows have been known to work. Cygwin has worked in the past, but is not well tested. If you don't already have the core utilies from some other source, get - gnuwin32 from - http://getgnuwin32.sourceforge.net/. + gnuwin32 from + https://getgnuwin32.sourceforge.net/. @@ -240,7 +240,7 @@

Examples of using Clang

diff --git a/clang/www/hacking.html b/clang/www/hacking.html --- a/clang/www/hacking.html +++ b/clang/www/hacking.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + @@ -183,8 +183,8 @@ Download the latest stable version.

The GnuWin32 tools are also necessary for running the tests. - Get them from - http://getgnuwin32.sourceforge.net/. + Get them from + https://getgnuwin32.sourceforge.net/. If the environment variable %PATH% does not have GnuWin32, or if other grep(s) supercedes GnuWin32 on %PATH%, you should specify LLVM_LIT_TOOLS_DIR diff --git a/clang/www/index.html b/clang/www/index.html --- a/clang/www/index.html +++ b/clang/www/index.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + diff --git a/clang/www/libstdc++4.4-clang0x.patch b/clang/www/libstdc++4.4-clang0x.patch --- a/clang/www/libstdc++4.4-clang0x.patch +++ b/clang/www/libstdc++4.4-clang0x.patch @@ -300,7 +300,7 @@ @@ -107,11 +118,19 @@ second(std::move(__p.second)) { } - // http://gcc.gnu.org/ml/libstdc++/2007-08/msg00052.html + // https://gcc.gnu.org/ml/libstdc++/2007-08/msg00052.html + +#if 0 + // This constructor is incompatible with libstdc++-4.6, and it diff --git a/clang/www/make_cxx_dr_status b/clang/www/make_cxx_dr_status --- a/clang/www/make_cxx_dr_status +++ b/clang/www/make_cxx_dr_status @@ -49,7 +49,7 @@ out_file = open(output, 'w') out_file.write('''\ + "https://www.w3.org/TR/html4/strict.dtd"> @@ -192,4 +192,3 @@ ''') out_file.close() - diff --git a/clang/www/menu.html.incl b/clang/www/menu.html.incl --- a/clang/www/menu.html.incl +++ b/clang/www/menu.html.incl @@ -1,11 +1,11 @@

diff --git a/clang/www/related.html b/clang/www/related.html --- a/clang/www/related.html +++ b/clang/www/related.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + @@ -75,7 +75,7 @@

Site: - http://oclint.org/ + https://oclint.org/

OCLint is a static code analysis tool for improving quality and reducing defects by inspecting C, C++ and Objective-C code. diff --git a/compiler-rt/CREDITS.TXT b/compiler-rt/CREDITS.TXT --- a/compiler-rt/CREDITS.TXT +++ b/compiler-rt/CREDITS.TXT @@ -10,12 +10,12 @@ N: Craig van Vliet E: cvanvliet@auroraux.org -W: http://www.auroraux.org +W: https://www.auroraux.org D: Code style and Readability fixes. N: Edward O'Callaghan E: eocallaghan@auroraux.org -W: http://www.auroraux.org +W: https://www.auroraux.org D: CMake'ify Compiler-RT build system D: Maintain Solaris & AuroraUX ports of Compiler-RT diff --git a/compiler-rt/cmake/Modules/CompilerRTCompile.cmake b/compiler-rt/cmake/Modules/CompilerRTCompile.cmake --- a/compiler-rt/cmake/Modules/CompilerRTCompile.cmake +++ b/compiler-rt/cmake/Modules/CompilerRTCompile.cmake @@ -133,7 +133,7 @@ " fi" " echo 'This can also be fixed by checking out the libcxx project from llvm.org and installing the headers'" " echo 'into your build directory:'" - " echo ' cd ${LLVM_MAIN_SRC_DIR}/projects && svn co http://llvm.org/svn/llvm-project/libcxx/trunk libcxx'" + " echo ' cd ${LLVM_MAIN_SRC_DIR}/projects && svn co https://llvm.org/svn/llvm-project/libcxx/trunk libcxx'" " echo ' cd ${LLVM_BINARY_DIR} && make -C ${LLVM_MAIN_SRC_DIR}/projects/libcxx installheaders HEADER_DIR=${LLVM_BINARY_DIR}/include'" " echo" " false" diff --git a/compiler-rt/lib/asan/asan_ignorelist.txt b/compiler-rt/lib/asan/asan_ignorelist.txt --- a/compiler-rt/lib/asan/asan_ignorelist.txt +++ b/compiler-rt/lib/asan/asan_ignorelist.txt @@ -9,5 +9,5 @@ # global:*global_with_initialization_issues*=init # type:*Namespace::ClassName*=init -# Stack buffer overflow in VC/INCLUDE/xlocnum, see http://goo.gl/L4qqUG +# Stack buffer overflow in VC/INCLUDE/xlocnum, see https://goo.gl/L4qqUG fun:*_Find_elem@*@std* diff --git a/compiler-rt/lib/asan/asan_interceptors_memintrinsics.h b/compiler-rt/lib/asan/asan_interceptors_memintrinsics.h --- a/compiler-rt/lib/asan/asan_interceptors_memintrinsics.h +++ b/compiler-rt/lib/asan/asan_interceptors_memintrinsics.h @@ -77,7 +77,7 @@ // memcpy is called during __asan_init() from the internals of printf(...). // We do not treat memcpy with to==from as a bug. -// See http://llvm.org/bugs/show_bug.cgi?id=11763. +// See https://llvm.org/bugs/show_bug.cgi?id=11763. #define ASAN_MEMCPY_IMPL(ctx, to, from, size) \ do { \ if (UNLIKELY(!asan_inited)) return internal_memcpy(to, from, size); \ diff --git a/compiler-rt/lib/asan/asan_mac.cpp b/compiler-rt/lib/asan/asan_mac.cpp --- a/compiler-rt/lib/asan/asan_mac.cpp +++ b/compiler-rt/lib/asan/asan_mac.cpp @@ -124,9 +124,9 @@ // dispatch_source_set_event_handler() // // The reference manual for Grand Central Dispatch is available at -// http://developer.apple.com/library/mac/#documentation/Performance/Reference/GCD_libdispatch_Ref/Reference/reference.html +// https://developer.apple.com/library/mac/#documentation/Performance/Reference/GCD_libdispatch_Ref/Reference/reference.html // The implementation details are at -// http://libdispatch.macosforge.org/trac/browser/trunk/src/queue.c +// https://libdispatch.macosforge.org/trac/browser/trunk/src/queue.c typedef void* dispatch_group_t; typedef void* dispatch_queue_t; diff --git a/compiler-rt/lib/asan/asan_new_delete.cpp b/compiler-rt/lib/asan/asan_new_delete.cpp --- a/compiler-rt/lib/asan/asan_new_delete.cpp +++ b/compiler-rt/lib/asan/asan_new_delete.cpp @@ -49,7 +49,7 @@ using namespace __asan; // FreeBSD prior v9.2 have wrong definition of 'size_t'. -// http://svnweb.freebsd.org/base?view=revision&revision=232261 +// https://svnweb.freebsd.org/base?view=revision&revision=232261 #if SANITIZER_FREEBSD && SANITIZER_WORDSIZE == 32 #include #if __FreeBSD_version <= 902001 // v9.2 diff --git a/compiler-rt/lib/asan/tests/asan_exceptions_test.cpp b/compiler-rt/lib/asan/tests/asan_exceptions_test.cpp --- a/compiler-rt/lib/asan/tests/asan_exceptions_test.cpp +++ b/compiler-rt/lib/asan/tests/asan_exceptions_test.cpp @@ -1,4 +1,4 @@ -// See http://llvm.org/bugs/show_bug.cgi?id=11468 +// See https://llvm.org/bugs/show_bug.cgi?id=11468 #include #include diff --git a/compiler-rt/lib/asan/tests/asan_mac_test_helpers.mm b/compiler-rt/lib/asan/tests/asan_mac_test_helpers.mm --- a/compiler-rt/lib/asan/tests/asan_mac_test_helpers.mm +++ b/compiler-rt/lib/asan/tests/asan_mac_test_helpers.mm @@ -87,7 +87,7 @@ } // Tests for the Grand Central Dispatch. See -// http://developer.apple.com/library/mac/#documentation/Performance/Reference/GCD_libdispatch_Ref/Reference/reference.html +// https://developer.apple.com/library/mac/#documentation/Performance/Reference/GCD_libdispatch_Ref/Reference/reference.html // for the reference. void TestGCDDispatchAsync() { dispatch_queue_t queue = dispatch_get_global_queue(0, 0); diff --git a/compiler-rt/lib/asan/tests/asan_str_test.cpp b/compiler-rt/lib/asan/tests/asan_str_test.cpp --- a/compiler-rt/lib/asan/tests/asan_str_test.cpp +++ b/compiler-rt/lib/asan/tests/asan_str_test.cpp @@ -503,7 +503,7 @@ #endif // We do not treat memcpy with to==from as a bug. - // See http://llvm.org/bugs/show_bug.cgi?id=11763. + // See https://llvm.org/bugs/show_bug.cgi?id=11763. // EXPECT_DEATH(Ident(memcpy)(str + 20, str + 20, 1), // OverlapErrorMessage("memcpy")); diff --git a/compiler-rt/lib/asan/tests/asan_test.cpp b/compiler-rt/lib/asan/tests/asan_test.cpp --- a/compiler-rt/lib/asan/tests/asan_test.cpp +++ b/compiler-rt/lib/asan/tests/asan_test.cpp @@ -1173,7 +1173,7 @@ int foo[100]; }; -// Test for bug http://llvm.org/bugs/show_bug.cgi?id=11763. +// Test for bug https://llvm.org/bugs/show_bug.cgi?id=11763. // Struct copy should not cause asan warning even if lhs == rhs. TEST(AddressSanitizer, LargeStructCopyTest) { LargeStruct a; @@ -1314,7 +1314,7 @@ // Test that instrumentation of stack allocations takes into account // AllocSize of a type, and not its StoreSize (16 vs 10 bytes for long double). -// See http://llvm.org/bugs/show_bug.cgi?id=12047 for more details. +// See https://llvm.org/bugs/show_bug.cgi?id=12047 for more details. TEST(AddressSanitizer, LongDoubleNegativeTest) { long double a, b; static long double c; diff --git a/compiler-rt/lib/builtins/README.txt b/compiler-rt/lib/builtins/README.txt --- a/compiler-rt/lib/builtins/README.txt +++ b/compiler-rt/lib/builtins/README.txt @@ -18,7 +18,7 @@ Here is the specification for this library: -http://gcc.gnu.org/onlinedocs/gccint/Libgcc.html#Libgcc +https://gcc.gnu.org/onlinedocs/gccint/Libgcc.html#Libgcc Please note that the libgcc specification explicitly mentions actual types of arguments and returned values being expressed with machine modes. @@ -347,7 +347,7 @@ Preconditions are listed for each function at the definition when there are any. Any preconditions reflect the specification at -http://gcc.gnu.org/onlinedocs/gccint/Libgcc.html#Libgcc. +https://gcc.gnu.org/onlinedocs/gccint/Libgcc.html#Libgcc. Assumptions are listed in "int_lib.h", and in individual files. Where possible assumptions are checked at compile time. diff --git a/compiler-rt/lib/builtins/aarch64/chkstk.S b/compiler-rt/lib/builtins/aarch64/chkstk.S --- a/compiler-rt/lib/builtins/aarch64/chkstk.S +++ b/compiler-rt/lib/builtins/aarch64/chkstk.S @@ -6,7 +6,7 @@ // __chkstk routine // This routine is windows specific. -// http://msdn.microsoft.com/en-us/library/ms648426.aspx +// https://msdn.microsoft.com/en-us/library/ms648426.aspx // This clobbers registers x16 and x17. // Does not modify any memory or the stack pointer. diff --git a/compiler-rt/lib/builtins/arm/chkstk.S b/compiler-rt/lib/builtins/arm/chkstk.S --- a/compiler-rt/lib/builtins/arm/chkstk.S +++ b/compiler-rt/lib/builtins/arm/chkstk.S @@ -6,7 +6,7 @@ // __chkstk routine // This routine is windows specific. -// http://msdn.microsoft.com/en-us/library/ms648426.aspx +// https://msdn.microsoft.com/en-us/library/ms648426.aspx // This clobbers the register r12, and the condition codes, and uses r5 and r6 // as temporaries by backing them up and restoring them afterwards. diff --git a/compiler-rt/lib/builtins/gcc_personality_v0.c b/compiler-rt/lib/builtins/gcc_personality_v0.c --- a/compiler-rt/lib/builtins/gcc_personality_v0.c +++ b/compiler-rt/lib/builtins/gcc_personality_v0.c @@ -31,7 +31,7 @@ #endif // Pointer encodings documented at: -// http://refspecs.freestandards.org/LSB_1.3.0/gLSB/gLSB/ehframehdr.html +// https://refspecs.freestandards.org/LSB_1.3.0/gLSB/gLSB/ehframehdr.html #define DW_EH_PE_omit 0xff // no data follows diff --git a/compiler-rt/lib/builtins/i386/chkstk.S b/compiler-rt/lib/builtins/i386/chkstk.S --- a/compiler-rt/lib/builtins/i386/chkstk.S +++ b/compiler-rt/lib/builtins/i386/chkstk.S @@ -6,7 +6,7 @@ // _chkstk routine // This routine is windows specific -// http://msdn.microsoft.com/en-us/library/ms648426.aspx +// https://msdn.microsoft.com/en-us/library/ms648426.aspx #ifdef __i386__ diff --git a/compiler-rt/lib/builtins/i386/chkstk2.S b/compiler-rt/lib/builtins/i386/chkstk2.S --- a/compiler-rt/lib/builtins/i386/chkstk2.S +++ b/compiler-rt/lib/builtins/i386/chkstk2.S @@ -9,7 +9,7 @@ // _chkstk (_alloca) routine - probe stack between %esp and (%esp-%eax) in 4k increments, // then decrement %esp by %eax. Preserves all registers except %esp and flags. // This routine is windows specific -// http://msdn.microsoft.com/en-us/library/ms648426.aspx +// https://msdn.microsoft.com/en-us/library/ms648426.aspx .text .balign 4 diff --git a/compiler-rt/lib/builtins/x86_64/chkstk.S b/compiler-rt/lib/builtins/x86_64/chkstk.S --- a/compiler-rt/lib/builtins/x86_64/chkstk.S +++ b/compiler-rt/lib/builtins/x86_64/chkstk.S @@ -6,7 +6,7 @@ // _chkstk routine // This routine is windows specific -// http://msdn.microsoft.com/en-us/library/ms648426.aspx +// https://msdn.microsoft.com/en-us/library/ms648426.aspx // Notes from r227519 // MSVC x64s __chkstk and cygmings ___chkstk_ms do not adjust %rsp diff --git a/compiler-rt/lib/builtins/x86_64/chkstk2.S b/compiler-rt/lib/builtins/x86_64/chkstk2.S --- a/compiler-rt/lib/builtins/x86_64/chkstk2.S +++ b/compiler-rt/lib/builtins/x86_64/chkstk2.S @@ -9,7 +9,7 @@ // _chkstk (_alloca) routine - probe stack between %rsp and (%rsp-%rax) in 4k increments, // then decrement %rsp by %rax. Preserves all registers except %rsp and flags. // This routine is windows specific -// http://msdn.microsoft.com/en-us/library/ms648426.aspx +// https://msdn.microsoft.com/en-us/library/ms648426.aspx .text .balign 4 diff --git a/compiler-rt/lib/fuzzer/FuzzerSHA1.cpp b/compiler-rt/lib/fuzzer/FuzzerSHA1.cpp --- a/compiler-rt/lib/fuzzer/FuzzerSHA1.cpp +++ b/compiler-rt/lib/fuzzer/FuzzerSHA1.cpp @@ -6,7 +6,7 @@ // //===----------------------------------------------------------------------===// // This code is taken from public domain -// (http://oauth.googlecode.com/svn/code/c/liboauth/src/sha1.c) +// (https://oauth.googlecode.com/svn/code/c/liboauth/src/sha1.c) // and modified by adding anonymous namespace, adding an interface // function fuzzer::ComputeSHA1() and removing unnecessary code. // diff --git a/compiler-rt/lib/fuzzer/FuzzerTracePC.h b/compiler-rt/lib/fuzzer/FuzzerTracePC.h --- a/compiler-rt/lib/fuzzer/FuzzerTracePC.h +++ b/compiler-rt/lib/fuzzer/FuzzerTracePC.h @@ -218,7 +218,7 @@ // Feature number: 0 1 2 3 4 5 6 7 // // This is a heuristic taken from AFL (see - // http://lcamtuf.coredump.cx/afl/technical_details.txt). + // https://lcamtuf.coredump.cx/afl/technical_details.txt). // // This implementation may change in the future so clients should // not rely on it. diff --git a/compiler-rt/lib/fuzzer/README.txt b/compiler-rt/lib/fuzzer/README.txt --- a/compiler-rt/lib/fuzzer/README.txt +++ b/compiler-rt/lib/fuzzer/README.txt @@ -1 +1 @@ -See http://llvm.org/docs/LibFuzzer.html +See https://llvm.org/docs/LibFuzzer.html diff --git a/compiler-rt/lib/gwp_asan/guarded_pool_allocator.h b/compiler-rt/lib/gwp_asan/guarded_pool_allocator.h --- a/compiler-rt/lib/gwp_asan/guarded_pool_allocator.h +++ b/compiler-rt/lib/gwp_asan/guarded_pool_allocator.h @@ -98,7 +98,7 @@ // nullptr if the pool is empty, if the alignnment is not a power of two, or // if the size/alignment makes the allocation too large for this pool to // handle. By default, uses strong alignment (i.e. `max_align_t`), see - // http://www.open-std.org/jtc1/sc22/wg14/www/docs/n2293.htm for discussion of + // https://www.open-std.org/jtc1/sc22/wg14/www/docs/n2293.htm for discussion of // alignment issues in the standard. void *allocate(size_t Size, size_t Alignment = alignof(max_align_t)); diff --git a/compiler-rt/lib/lsan/lsan_mac.cpp b/compiler-rt/lib/lsan/lsan_mac.cpp --- a/compiler-rt/lib/lsan/lsan_mac.cpp +++ b/compiler-rt/lib/lsan/lsan_mac.cpp @@ -47,9 +47,9 @@ // dispatch_source_set_event_handler() // // The reference manual for Grand Central Dispatch is available at -// http://developer.apple.com/library/mac/#documentation/Performance/Reference/GCD_libdispatch_Ref/Reference/reference.html +// https://developer.apple.com/library/mac/#documentation/Performance/Reference/GCD_libdispatch_Ref/Reference/reference.html // The implementation details are at -// http://libdispatch.macosforge.org/trac/browser/trunk/src/queue.c +// https://libdispatch.macosforge.org/trac/browser/trunk/src/queue.c typedef void *dispatch_group_t; typedef void *dispatch_queue_t; diff --git a/compiler-rt/lib/memprof/memprof_interceptors_memintrinsics.h b/compiler-rt/lib/memprof/memprof_interceptors_memintrinsics.h --- a/compiler-rt/lib/memprof/memprof_interceptors_memintrinsics.h +++ b/compiler-rt/lib/memprof/memprof_interceptors_memintrinsics.h @@ -34,7 +34,7 @@ // memcpy is called during __memprof_init() from the internals of printf(...). // We do not treat memcpy with to==from as a bug. -// See http://llvm.org/bugs/show_bug.cgi?id=11763. +// See https://llvm.org/bugs/show_bug.cgi?id=11763. #define MEMPROF_MEMCPY_IMPL(to, from, size) \ do { \ if (UNLIKELY(!memprof_inited)) \ diff --git a/compiler-rt/lib/profile/WindowsMMap.c b/compiler-rt/lib/profile/WindowsMMap.c --- a/compiler-rt/lib/profile/WindowsMMap.c +++ b/compiler-rt/lib/profile/WindowsMMap.c @@ -9,10 +9,10 @@ */ /* References: - * CreateFileMapping: http://msdn.microsoft.com/en-us/library/aa366537(VS.85).aspx - * CloseHandle: http://msdn.microsoft.com/en-us/library/ms724211(VS.85).aspx - * MapViewOfFile: http://msdn.microsoft.com/en-us/library/aa366761(VS.85).aspx - * UnmapViewOfFile: http://msdn.microsoft.com/en-us/library/aa366882(VS.85).aspx + * CreateFileMapping: https://msdn.microsoft.com/en-us/library/aa366537(VS.85).aspx + * CloseHandle: https://msdn.microsoft.com/en-us/library/ms724211(VS.85).aspx + * MapViewOfFile: https://msdn.microsoft.com/en-us/library/aa366761(VS.85).aspx + * UnmapViewOfFile: https://msdn.microsoft.com/en-us/library/aa366882(VS.85).aspx */ #if defined(_WIN32) diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_atomic_clang.h b/compiler-rt/lib/sanitizer_common/sanitizer_atomic_clang.h --- a/compiler-rt/lib/sanitizer_common/sanitizer_atomic_clang.h +++ b/compiler-rt/lib/sanitizer_common/sanitizer_atomic_clang.h @@ -25,13 +25,13 @@ // We would like to just use compiler builtin atomic operations // for loads and stores, but they are mostly broken in clang: // - they lead to vastly inefficient code generation -// (http://llvm.org/bugs/show_bug.cgi?id=17281) +// (https://llvm.org/bugs/show_bug.cgi?id=17281) // - 64-bit atomic operations are not implemented on x86_32 -// (http://llvm.org/bugs/show_bug.cgi?id=15034) +// (https://llvm.org/bugs/show_bug.cgi?id=15034) // - they are not implemented on ARM // error: undefined reference to '__atomic_load_4' -// See http://www.cl.cam.ac.uk/~pes20/cpp/cpp0xmappings.html +// See https://www.cl.cam.ac.uk/~pes20/cpp/cpp0xmappings.html // for mappings of the memory model to different processors. inline void atomic_signal_fence(memory_order) { diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_format.inc b/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_format.inc --- a/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_format.inc +++ b/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_format.inc @@ -7,8 +7,8 @@ //===----------------------------------------------------------------------===// // // Scanf/printf implementation for use in *Sanitizer interceptors. -// Follows http://pubs.opengroup.org/onlinepubs/9699919799/functions/fscanf.html -// and http://pubs.opengroup.org/onlinepubs/9699919799/functions/fprintf.html +// Follows https://pubs.opengroup.org/onlinepubs/9699919799/functions/fscanf.html +// and https://pubs.opengroup.org/onlinepubs/9699919799/functions/fprintf.html // with a few common GNU extensions. // //===----------------------------------------------------------------------===// diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_syscall_linux_riscv64.inc b/compiler-rt/lib/sanitizer_common/sanitizer_syscall_linux_riscv64.inc --- a/compiler-rt/lib/sanitizer_common/sanitizer_syscall_linux_riscv64.inc +++ b/compiler-rt/lib/sanitizer_common/sanitizer_syscall_linux_riscv64.inc @@ -17,8 +17,8 @@ // To my surprise I haven't found much information regarding it. // Kernel source and internet browsing shows that: // syscall number is passed in a7 -// (http://man7.org/linux/man-pages/man2/syscall.2.html) results are return in -// a0 and a1 (http://man7.org/linux/man-pages/man2/syscall.2.html) arguments +// (https://man7.org/linux/man-pages/man2/syscall.2.html) results are return in +// a0 and a1 (https://man7.org/linux/man-pages/man2/syscall.2.html) arguments // are passed in: a0-a7 (see below) // // Regarding the arguments. The only "documentation" I could find is diff --git a/compiler-rt/lib/sanitizer_common/symbolizer/scripts/build_symbolizer.sh b/compiler-rt/lib/sanitizer_common/symbolizer/scripts/build_symbolizer.sh --- a/compiler-rt/lib/sanitizer_common/symbolizer/scripts/build_symbolizer.sh +++ b/compiler-rt/lib/sanitizer_common/symbolizer/scripts/build_symbolizer.sh @@ -2,7 +2,7 @@ # # Run as: CLANG=bin/clang ZLIB_SRC=src/zlib \ # build_symbolizer.sh runtime_build/lib/clang/4.0.0/lib/linux/ -# zlib can be downloaded from http://www.zlib.net. +# zlib can be downloaded from https://www.zlib.net. # # Script compiles self-contained object file with symbolization code and injects # it into the given set of runtime libraries. Script updates only libraries diff --git a/compiler-rt/lib/sanitizer_common/tests/sanitizer_atomic_test.cpp b/compiler-rt/lib/sanitizer_common/tests/sanitizer_atomic_test.cpp --- a/compiler-rt/lib/sanitizer_common/tests/sanitizer_atomic_test.cpp +++ b/compiler-rt/lib/sanitizer_common/tests/sanitizer_atomic_test.cpp @@ -106,7 +106,7 @@ } // Clang crashes while compiling this test for Android: -// http://llvm.org/bugs/show_bug.cgi?id=15587 +// https://llvm.org/bugs/show_bug.cgi?id=15587 #if !SANITIZER_ANDROID template void CheckAtomicCompareExchange() { diff --git a/compiler-rt/lib/tsan/rtl-old/tsan_interface_atomic.cpp b/compiler-rt/lib/tsan/rtl-old/tsan_interface_atomic.cpp --- a/compiler-rt/lib/tsan/rtl-old/tsan_interface_atomic.cpp +++ b/compiler-rt/lib/tsan/rtl-old/tsan_interface_atomic.cpp @@ -14,9 +14,9 @@ // For background see C++11 standard. A slightly older, publicly // available draft of the standard (not entirely up-to-date, but close enough // for casual browsing) is available here: -// http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2011/n3242.pdf +// https://www.open-std.org/jtc1/sc22/wg21/docs/papers/2011/n3242.pdf // The following page contains more background information: -// http://www.hpl.hp.com/personal/Hans_Boehm/c++mm/ +// https://www.hpl.hp.com/personal/Hans_Boehm/c++mm/ #include "sanitizer_common/sanitizer_placement_new.h" #include "sanitizer_common/sanitizer_stacktrace.h" diff --git a/compiler-rt/lib/tsan/rtl-old/tsan_rtl_report.cpp b/compiler-rt/lib/tsan/rtl-old/tsan_rtl_report.cpp --- a/compiler-rt/lib/tsan/rtl-old/tsan_rtl_report.cpp +++ b/compiler-rt/lib/tsan/rtl-old/tsan_rtl_report.cpp @@ -955,7 +955,7 @@ // tail-call to PrintCurrentStackSlow breaks this assumption because // __sanitizer_print_stack_trace disappears after tail-call. // However, this solution is not reliable enough, please see dvyukov's comment -// http://reviews.llvm.org/D19148#406208 +// https://reviews.llvm.org/D19148#406208 // Also see PR27280 comment 2 and 3 for breaking examples and analysis. ALWAYS_INLINE USED void PrintCurrentStackSlow(uptr pc) { #if !SANITIZER_GO diff --git a/compiler-rt/lib/tsan/rtl-old/tsan_suppressions.cpp b/compiler-rt/lib/tsan/rtl-old/tsan_suppressions.cpp --- a/compiler-rt/lib/tsan/rtl-old/tsan_suppressions.cpp +++ b/compiler-rt/lib/tsan/rtl-old/tsan_suppressions.cpp @@ -24,12 +24,12 @@ // Suppressions for true/false positives in standard libraries. static const char *const std_suppressions = // Libstdc++ 4.4 has data races in std::string. -// See http://crbug.com/181502 for an example. +// See https://crbug.com/181502 for an example. "race:^_M_rep$\n" "race:^_M_is_leaked$\n" // False positive when using std . // Happens because we miss atomic synchronization in libstdc++. -// See http://llvm.org/bugs/show_bug.cgi?id=17066 for details. +// See https://llvm.org/bugs/show_bug.cgi?id=17066 for details. "race:std::_Sp_counted_ptr_inplace. // Happens because we miss atomic synchronization in libstdc++. -// See http://llvm.org/bugs/show_bug.cgi?id=17066 for details. +// See https://llvm.org/bugs/show_bug.cgi?id=17066 for details. "race:std::_Sp_counted_ptr_inplace::e.foo(); } - diff --git a/compiler-rt/test/asan/TestCases/Linux/stack-overflow-sigbus.cpp b/compiler-rt/test/asan/TestCases/Linux/stack-overflow-sigbus.cpp --- a/compiler-rt/test/asan/TestCases/Linux/stack-overflow-sigbus.cpp +++ b/compiler-rt/test/asan/TestCases/Linux/stack-overflow-sigbus.cpp @@ -45,7 +45,7 @@ // Map some memory just before the start of the current stack vma. // When the stack grows down and crashes into it, Linux can send // SIGBUS instead of SIGSEGV. See: - // http://lkml.iu.edu/hypermail/linux/kernel/1008.1/02299.html + // https://lkml.iu.edu/hypermail/linux/kernel/1008.1/02299.html const long pagesize = sysconf(_SC_PAGESIZE); FILE *f = fopen("/proc/self/maps", "r"); char a[1000]; diff --git a/compiler-rt/test/asan/TestCases/Posix/dlclose-test.cpp b/compiler-rt/test/asan/TestCases/Posix/dlclose-test.cpp --- a/compiler-rt/test/asan/TestCases/Posix/dlclose-test.cpp +++ b/compiler-rt/test/asan/TestCases/Posix/dlclose-test.cpp @@ -1,5 +1,5 @@ // Regression test for -// http://code.google.com/p/address-sanitizer/issues/detail?id=19 +// https://code.google.com/p/address-sanitizer/issues/detail?id=19 // Bug description: // 1. application dlopens foo.so // 2. asan registers all globals from foo.so diff --git a/compiler-rt/test/asan/TestCases/Windows/crt_initializers.cpp b/compiler-rt/test/asan/TestCases/Windows/crt_initializers.cpp --- a/compiler-rt/test/asan/TestCases/Windows/crt_initializers.cpp +++ b/compiler-rt/test/asan/TestCases/Windows/crt_initializers.cpp @@ -1,7 +1,7 @@ // RUN: %clang_cl_asan -Od %s -Fe%t // RUN: %run %t | FileCheck %s -// This is a test for http://code.google.com/p/address-sanitizer/issues/detail?id=305 +// This is a test for https://code.google.com/p/address-sanitizer/issues/detail?id=305 #include diff --git a/compiler-rt/test/asan/TestCases/ill.cpp b/compiler-rt/test/asan/TestCases/ill.cpp --- a/compiler-rt/test/asan/TestCases/ill.cpp +++ b/compiler-rt/test/asan/TestCases/ill.cpp @@ -15,7 +15,7 @@ SEM_NOGPFAULTERRORBOX | SEM_NOOPENFILEERRORBOX; // Preserve existing error mode, as discussed at - // http://blogs.msdn.com/oldnewthing/archive/2004/07/27/198410.aspx + // https://blogs.msdn.com/oldnewthing/archive/2004/07/27/198410.aspx UINT existing_flags = SetErrorMode(new_flags); SetErrorMode(existing_flags | new_flags); #endif diff --git a/compiler-rt/test/asan/TestCases/throw_call_test.cpp b/compiler-rt/test/asan/TestCases/throw_call_test.cpp --- a/compiler-rt/test/asan/TestCases/throw_call_test.cpp +++ b/compiler-rt/test/asan/TestCases/throw_call_test.cpp @@ -1,5 +1,5 @@ // RUN: %clangxx_asan %s -o %t && %run %t -// http://code.google.com/p/address-sanitizer/issues/detail?id=147 (not fixed). +// https://code.google.com/p/address-sanitizer/issues/detail?id=147 (not fixed). // BROKEN: %clangxx_asan %s -o %t -static-libstdc++ && %run %t #include diff --git a/compiler-rt/test/asan/TestCases/vla_chrome_testcase.cpp b/compiler-rt/test/asan/TestCases/vla_chrome_testcase.cpp --- a/compiler-rt/test/asan/TestCases/vla_chrome_testcase.cpp +++ b/compiler-rt/test/asan/TestCases/vla_chrome_testcase.cpp @@ -3,7 +3,7 @@ // // This is reduced testcase based on Chromium code. -// See http://reviews.llvm.org/D6055?vs=on&id=15616&whitespace=ignore-all#toc. +// See https://reviews.llvm.org/D6055?vs=on&id=15616&whitespace=ignore-all#toc. #include #include diff --git a/compiler-rt/test/builtins/Unit/atomic_test.c b/compiler-rt/test/builtins/Unit/atomic_test.c --- a/compiler-rt/test/builtins/Unit/atomic_test.c +++ b/compiler-rt/test/builtins/Unit/atomic_test.c @@ -335,7 +335,7 @@ for (int m1 = 0; m1 < LEN(atomic_compare_exchange_models); m1++) { // Skip the last two: __ATOMIC_RELEASE and __ATOMIC_ACQ_REL. - // See for details. + // See for details. for (int m2 = 0; m2 < LEN(atomic_compare_exchange_models) - 2; m2++) { int m_succ = atomic_compare_exchange_models[m1]; int m_fail = atomic_compare_exchange_models[m2]; diff --git a/compiler-rt/test/cfi/CMakeLists.txt b/compiler-rt/test/cfi/CMakeLists.txt --- a/compiler-rt/test/cfi/CMakeLists.txt +++ b/compiler-rt/test/cfi/CMakeLists.txt @@ -39,7 +39,7 @@ set(CFI_TEST_TARGET_ARCH ${arch}) get_test_cc_for_arch(${arch} CFI_TEST_TARGET_CC CFI_TEST_TARGET_CFLAGS) if (APPLE) - # FIXME: enable ThinLTO tests after fixing http://llvm.org/pr32741 + # FIXME: enable ThinLTO tests after fixing https://llvm.org/pr32741 add_cfi_test_suites(False False False) elseif(WIN32) add_cfi_test_suites(True False) diff --git a/compiler-rt/test/hwasan/TestCases/hwasan_symbolize.cpp b/compiler-rt/test/hwasan/TestCases/hwasan_symbolize.cpp --- a/compiler-rt/test/hwasan/TestCases/hwasan_symbolize.cpp +++ b/compiler-rt/test/hwasan/TestCases/hwasan_symbolize.cpp @@ -1,5 +1,5 @@ // RUN: %clang_hwasan -Wl,--build-id -g %s -o %t -// RUN: echo '[{"prefix": "'"$(realpath $(dirname %s))"'/", "link": "http://test.invalid/{file}:{line}"}]' > %t.linkify +// RUN: echo '[{"prefix": "'"$(realpath $(dirname %s))"'/", "link": "https://test.invalid/{file}:{line}"}]' > %t.linkify // RUN: %env_hwasan_opts=symbolize=0 not %run %t 2>&1 | hwasan_symbolize --html --symbols $(dirname %t) --index | FileCheck %s // RUN: %env_hwasan_opts=symbolize=0 not %run %t 2>&1 | hwasan_symbolize --html --linkify %t.linkify --symbols $(dirname %t) --index | FileCheck --check-prefixes=CHECK,LINKIFY %s // RUN: %env_hwasan_opts=symbolize=0 not %run %t 2>&1 | hwasan_symbolize --symbols $(dirname %t) --index | FileCheck %s @@ -15,11 +15,11 @@ __hwasan_enable_allocator_tagging(); char *volatile x = (char *)malloc(10); sink = x[100]; - // LINKIFY: + // LINKIFY: // CHECK: hwasan_symbolize.cpp:[[@LINE-2]] // CHECK: Cause: heap-buffer-overflow // CHECK: allocated here: - // LINKIFY: + // LINKIFY: // CHECK: hwasan_symbolize.cpp:[[@LINE-7]] return 0; } diff --git a/compiler-rt/test/lsan/TestCases/Darwin/dispatch.mm b/compiler-rt/test/lsan/TestCases/Darwin/dispatch.mm --- a/compiler-rt/test/lsan/TestCases/Darwin/dispatch.mm +++ b/compiler-rt/test/lsan/TestCases/Darwin/dispatch.mm @@ -20,7 +20,7 @@ #if DISPATCH_ASYNC // Tests for the Grand Central Dispatch. See -// http://developer.apple.com/library/mac/#documentation/Performance/Reference/GCD_libdispatch_Ref/Reference/reference.html +// https://developer.apple.com/library/mac/#documentation/Performance/Reference/GCD_libdispatch_Ref/Reference/reference.html // for the reference. void TestGCDDispatch() { dispatch_queue_t queue = dispatch_get_global_queue(0, 0); diff --git a/compiler-rt/test/lsan/TestCases/leak_check_before_thread_started.cpp b/compiler-rt/test/lsan/TestCases/leak_check_before_thread_started.cpp --- a/compiler-rt/test/lsan/TestCases/leak_check_before_thread_started.cpp +++ b/compiler-rt/test/lsan/TestCases/leak_check_before_thread_started.cpp @@ -1,4 +1,4 @@ -// Regression test for http://llvm.org/bugs/show_bug.cgi?id=21621 +// Regression test for https://llvm.org/bugs/show_bug.cgi?id=21621 // This test relies on timing between threads, so any failures will be flaky. // RUN: %clangxx_lsan %s -o %t // RUN: %env_lsan_opts="log_pointers=1:log_threads=1" %run %t diff --git a/compiler-rt/test/sanitizer_common/TestCases/Linux/clock_gettime.c b/compiler-rt/test/sanitizer_common/TestCases/Linux/clock_gettime.c --- a/compiler-rt/test/sanitizer_common/TestCases/Linux/clock_gettime.c +++ b/compiler-rt/test/sanitizer_common/TestCases/Linux/clock_gettime.c @@ -1,6 +1,6 @@ // RUN: %clang %s -Wl,-as-needed -o %t && %run %t // Regression test for PR15823 -// (http://llvm.org/bugs/show_bug.cgi?id=15823). +// (https://llvm.org/bugs/show_bug.cgi?id=15823). #include #include diff --git a/compiler-rt/www/index.html b/compiler-rt/www/index.html --- a/compiler-rt/www/index.html +++ b/compiler-rt/www/index.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + diff --git a/compiler-rt/www/menu.html.incl b/compiler-rt/www/menu.html.incl --- a/compiler-rt/www/menu.html.incl +++ b/compiler-rt/www/menu.html.incl @@ -1,6 +1,6 @@

- diff --git a/polly/www/documentation/gpgpucodegen.html b/polly/www/documentation/gpgpucodegen.html --- a/polly/www/documentation/gpgpucodegen.html +++ b/polly/www/documentation/gpgpucodegen.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + @@ -213,7 +213,7 @@ International Conference on Compiler Construction (CC) 2010.
  • PPCG Project
    -http://freecode.com/projects/ppcg +https://freecode.com/projects/ppcg
  • Where is the Data? Why You Cannot Debate GPU vs. CPU Performance Without the diff --git a/polly/www/documentation/passes.html b/polly/www/documentation/passes.html --- a/polly/www/documentation/passes.html +++ b/polly/www/documentation/passes.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + diff --git a/polly/www/get_started.html b/polly/www/get_started.html --- a/polly/www/get_started.html +++ b/polly/www/get_started.html @@ -1,5 +1,5 @@ + "https://www.w3.org/TR/html4/strict.dtd"> diff --git a/polly/www/index.html b/polly/www/index.html --- a/polly/www/index.html +++ b/polly/www/index.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + @@ -61,7 +61,7 @@ 2017

    January

    - IMPACT 2017 program + IMPACT 2017 program announced. Join IMPACT 2017 on January 23rd in Stockholm @HiPEAC'17. @@ -69,7 +69,7 @@ 2016

    August

    - IMPACT 2017 the 7th + IMPACT 2017 the 7th International Workshop on Polyhedral Compilation Techniques will take place at January 23-25, 2017 together with HiPEAC 2017 in Stockholm, Sweden. It is a great opportunity to discuss and present work on Polyhedral Compilation, @@ -190,7 +190,7 @@ href="https://fosdem.org/2014/schedule/event/polly/">presented at the FOSDEM LLVM developer's meeting.

    New LLVM test-suite buildbots

    - The set of Polly + The set of Polly buildbots has been extended. We now have 16 new blades that track correctness and performance when compiling the LLVM test-suite. For now five of them are used to provide isl manual. + href="https://www.kotnet.org/~skimo/isl/manual.pdf">isl manual.

    July

    Polly can now be directly linked to the Pluto optimizer. We were +href="https://pluto-compiler.sourceforge.net/">Pluto optimizer. We were already able to perform Pluto-like optimizations with Polly, as a similar algorithm was added to isl half a year ago. However, being able to directly compare with the original implementation will not only bring in competition in @@ -327,7 +327,7 @@

    July

    Polly builder as part of the LLVM Buildbots + href="https://lab.llvm.org:8011/console">LLVM Buildbots

    @@ -358,7 +358,7 @@

    March

    Presentation at CGO/IMPACT

    + href="https://impact2011.inrialpes.fr/">CGO/IMPACT

    Polly can compile polybench 2.0 with vectorization and OpenMP code generation

    diff --git a/polly/www/menu.html.incl b/polly/www/menu.html.incl --- a/polly/www/menu.html.incl +++ b/polly/www/menu.html.incl @@ -8,7 +8,7 @@
  • "; } - str = str + "
  • ... more news
  • "; + str = str + "
  • ... more news
  • "; str = str + ""; $( ".inner_pollylabs" ).append(str); }, "jsonp"); @@ -102,7 +102,7 @@ str = str + "(" + date + ")"; str = str + ""; } - str = str + "
  • ... more news
  • "; + str = str + "
  • ... more news
  • "; str = str + ""; $( ".inner_polyinfo" ).append(str); console.log(str); diff --git a/polly/www/performance.html b/polly/www/performance.html --- a/polly/www/performance.html +++ b/polly/www/performance.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + Polly - Performance @@ -18,7 +18,7 @@ 2.0 benchmark suite. Each benchmark was run with double precision floating point values on an Intel Core Xeon X5670 CPU @ 2.93GHz (12 cores, 24 thread) system. We used PoCC and the included Pluto transformations to optimize the +href="https://pluto-compiler.sf.net">Pluto transformations to optimize the code. The source code of Polly and LLVM/clang was checked out on 25/03/2011.

    diff --git a/polly/www/phonecall.html b/polly/www/phonecall.html --- a/polly/www/phonecall.html +++ b/polly/www/phonecall.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + @@ -26,7 +26,7 @@
  • Traditional Dial In Numbers:
    To use your normal land line phone to connect to the conference dial one of the many available dial in + href="https://www.sipbroker.com/sipbroker/action/pstnNumbers">dial in numbers. When asked for the number to connect type: *011497659.
    Attention: Some of the dial in numbers do not work reliably. If you are not diff --git a/polly/www/projects.html b/polly/www/projects.html --- a/polly/www/projects.html +++ b/polly/www/projects.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + diff --git a/polly/www/publications.html b/polly/www/publications.html --- a/polly/www/publications.html +++ b/polly/www/publications.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + @@ -67,12 +67,12 @@
  • On recovering multi-dimensional arrays in Polly
    Tobias Grosser, Sebastian Pop, J. Ramanujam, P. Sadayappan
    Impact2015 at HiPEAC, Amsterdam, The Netherlands
    - Slides & Paper: Impact 2015 + Slides & Paper: Impact 2015
  • Polly's polyhedral scheduling in the presence of reductions
    Johannes Doerfert, Kevin Streit, Sebastian Hack, Zino Benaissa
    Impact2015 at HiPEAC, Amsterdam, The Netherlands
    - Slides & Paper: Impact 2015 + Slides & Paper: Impact 2015
  • 2014

    diff --git a/polly/www/todo.html b/polly/www/todo.html --- a/polly/www/todo.html +++ b/polly/www/todo.html @@ -1,6 +1,6 @@ - + "https://www.w3.org/TR/html4/strict.dtd"> + Polly - Todo @@ -435,7 +435,7 @@ Buildbot that runs 'make polly-test' -Buildbot +Buildbot Tobias, Andreas diff --git a/polly/www/video-js/video-js.css b/polly/www/video-js/video-js.css --- a/polly/www/video-js/video-js.css +++ b/polly/www/video-js/video-js.css @@ -1,5 +1,5 @@ /* -VideoJS Default Styles (http://videojs.com) +VideoJS Default Styles (https://videojs.com) Version 2.0.2 REQUIRED STYLES (be careful overriding) @@ -99,7 +99,7 @@ .vjs-play-control span { display: block; font-size: 0; line-height: 0; } .vjs-paused .vjs-play-control span { width: 0; height: 0; margin: 8px 0 0 8px; - /* Drawing the play triangle with borders - http://www.infimum.dk/HTML/slantinfo.html */ + /* Drawing the play triangle with borders - https://www.infimum.dk/HTML/slantinfo.html */ border-left: 10px solid #fff; /* Width & Color of play icon */ /* Height of play icon is total top & bottom border widths. Color is transparent. */ border-top: 5px solid rgba(0,0,0,0); border-bottom: 5px solid rgba(0,0,0,0); @@ -213,7 +213,7 @@ div.vjs-big-play-button span { display: block; font-size: 0; line-height: 0; width: 0; height: 0; margin: 20px 0 0 23px; - /* Drawing the play triangle with borders - http://www.infimum.dk/HTML/slantinfo.html */ + /* Drawing the play triangle with borders - https://www.infimum.dk/HTML/slantinfo.html */ border-left: 40px solid #fff; /* Width & Color of play icon */ /* Height of play icon is total top & bottom border widths. Color is transparent. */ border-top: 20px solid rgba(0,0,0,0); border-bottom: 20px solid rgba(0,0,0,0); @@ -221,7 +221,7 @@ /* Spinner Styles ---------------------------------------------------------*/ -/* CSS Spinners by Kilian Valkhof - http://kilianvalkhof.com/2010/css-xhtml/css3-loading-spinners-without-images/ */ +/* CSS Spinners by Kilian Valkhof - https://kilianvalkhof.com/2010/css-xhtml/css3-loading-spinners-without-images/ */ .vjs-spinner { display: none; position: absolute; top: 50%; left: 50%; width: 100px; height: 100px; z-index: 1; margin: -50px 0 0 -50px; /* Scaling makes the circles look smoother. */ transform: scale(0.5); -webkit-transform:scale(0.5); -moz-transform:scale(0.5); @@ -239,4 +239,4 @@ .vjs-spinner div:nth-child(5) { opacity: 0.62; transform: rotate(180deg) translate(0, -40px) scale(0.8); -webkit-transform: rotate(180deg) translate(0, -40px) scale(0.8); -moz-transform: rotate(180deg) translate(0, -40px) scale(0.8); } .vjs-spinner div:nth-child(6) { opacity: 0.75; transform: rotate(225deg) translate(0, -40px) scale(1.0); -webkit-transform: rotate(225deg) translate(0, -40px) scale(1.0); -moz-transform: rotate(225deg) translate(0, -40px) scale(1.0); } .vjs-spinner div:nth-child(7) { opacity: 0.87; transform: rotate(270deg) translate(0, -40px) scale(1.1); -webkit-transform: rotate(270deg) translate(0, -40px) scale(1.1); -moz-transform: rotate(270deg) translate(0, -40px) scale(1.1); } -.vjs-spinner div:nth-child(8) { opacity: 1.00; transform: rotate(315deg) translate(0, -40px) scale(1.3); -webkit-transform: rotate(315deg) translate(0, -40px) scale(1.3); -moz-transform: rotate(315deg) translate(0, -40px) scale(1.3); } \ No newline at end of file +.vjs-spinner div:nth-child(8) { opacity: 1.00; transform: rotate(315deg) translate(0, -40px) scale(1.3); -webkit-transform: rotate(315deg) translate(0, -40px) scale(1.3); -moz-transform: rotate(315deg) translate(0, -40px) scale(1.3); } diff --git a/polly/www/video-js/video.js b/polly/www/video-js/video.js --- a/polly/www/video-js/video.js +++ b/polly/www/video-js/video.js @@ -15,14 +15,14 @@ GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License -along with VideoJS. If not, see . +along with VideoJS. If not, see . */ // Self-executing function to prevent global vars and help with minification (function(window, undefined){ var document = window.document; -// Using jresig's Class implementation http://ejohn.org/blog/simple-javascript-inheritance/ +// Using jresig's Class implementation https://ejohn.org/blog/simple-javascript-inheritance/ (function(){var initializing=false, fnTest=/xyz/.test(function(){xyz;}) ? /\b_super\b/ : /.*/; this.JRClass = function(){}; JRClass.extend = function(prop) { var _super = this.prototype; initializing = true; var prototype = new this(); initializing = false; for (var name in prop) { prototype[name] = typeof prop[name] == "function" && typeof _super[name] == "function" && fnTest.test(prop[name]) ? (function(name, fn){ return function() { var tmp = this._super; this._super = _super[name]; var ret = fn.apply(this, arguments); this._super = tmp; return ret; }; })(name, prop[name]) : prop[name]; } function JRClass() { if ( !initializing && this.init ) this.init.apply(this, arguments); } JRClass.prototype = prototype; JRClass.constructor = JRClass; JRClass.extend = arguments.callee; return JRClass;};})(); // Video JS Player Class @@ -1644,7 +1644,7 @@ trim: function(string){ return string.toString().replace(/^\s+/, "").replace(/\s+$/, ""); }, - // DOM Ready functionality adapted from jQuery. http://jquery.com/ + // DOM Ready functionality adapted from jQuery. https://jquery.com/ bindDOMReady: function(){ if (document.readyState === "complete") { return VideoJS.onDOMReady(); @@ -1755,4 +1755,4 @@ window.VideoJS = window._V_ = VideoJS; // End self-executing function -})(window); \ No newline at end of file +})(window); diff --git a/pstl/CREDITS.txt b/pstl/CREDITS.txt --- a/pstl/CREDITS.txt +++ b/pstl/CREDITS.txt @@ -9,7 +9,7 @@ (S). N: Intel Corporation -W: http://www.intel.com +W: https://www.intel.com D: Created the initial implementation. N: Thomas Rodgers diff --git a/third-party/benchmark/.ycm_extra_conf.py b/third-party/benchmark/.ycm_extra_conf.py --- a/third-party/benchmark/.ycm_extra_conf.py +++ b/third-party/benchmark/.ycm_extra_conf.py @@ -25,7 +25,7 @@ # Set this to the absolute path to the folder (NOT the file!) containing the # compile_commands.json file to use that instead of 'flags'. See here for -# more details: http://clang.llvm.org/docs/JSONCompilationDatabase.html +# more details: https://clang.llvm.org/docs/JSONCompilationDatabase.html # # Most projects will NOT need to set this to anything; you can just change the # 'flags' list of compilation flags. Notice that YCM itself uses that approach. diff --git a/third-party/benchmark/CONTRIBUTING.md b/third-party/benchmark/CONTRIBUTING.md --- a/third-party/benchmark/CONTRIBUTING.md +++ b/third-party/benchmark/CONTRIBUTING.md @@ -54,5 +54,5 @@ 1. Finally, push the commits to your fork and submit a [pull request][]. [forking]: https://help.github.com/articles/fork-a-repo -[well-formed commit messages]: http://tbaggery.com/2008/04/19/a-note-about-git-commit-messages.html +[well-formed commit messages]: https://tbaggery.com/2008/04/19/a-note-about-git-commit-messages.html [pull request]: https://help.github.com/articles/creating-a-pull-request diff --git a/third-party/benchmark/bindings/python/google_benchmark/__init__.py b/third-party/benchmark/bindings/python/google_benchmark/__init__.py --- a/third-party/benchmark/bindings/python/google_benchmark/__init__.py +++ b/third-party/benchmark/bindings/python/google_benchmark/__init__.py @@ -4,7 +4,7 @@ # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # -# http://www.apache.org/licenses/LICENSE-2.0 +# https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/bindings/python/google_benchmark/example.py b/third-party/benchmark/bindings/python/google_benchmark/example.py --- a/third-party/benchmark/bindings/python/google_benchmark/example.py +++ b/third-party/benchmark/bindings/python/google_benchmark/example.py @@ -4,7 +4,7 @@ # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # -# http://www.apache.org/licenses/LICENSE-2.0 +# https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/cmake/Modules/FindPFM.cmake b/third-party/benchmark/cmake/Modules/FindPFM.cmake --- a/third-party/benchmark/cmake/Modules/FindPFM.cmake +++ b/third-party/benchmark/cmake/Modules/FindPFM.cmake @@ -7,7 +7,7 @@ enable_language(C) set_package_properties(PFM PROPERTIES - URL http://perfmon2.sourceforge.net/ + URL https://perfmon2.sourceforge.net/ DESCRIPTION "a helper library to develop monitoring tools" PURPOSE "Used to program specific performance monitoring events") diff --git a/third-party/benchmark/docs/perf_counters.md b/third-party/benchmark/docs/perf_counters.md --- a/third-party/benchmark/docs/perf_counters.md +++ b/third-party/benchmark/docs/perf_counters.md @@ -12,7 +12,7 @@ * The benchmark is run on an architecture featuring a Performance Monitoring Unit (PMU), * The benchmark is compiled with support for collecting counters. Currently, - this requires [libpfm](http://perfmon2.sourceforge.net/) be available at build + this requires [libpfm](https://perfmon2.sourceforge.net/) be available at build time The feature does not require modifying benchmark code. Counter collection is @@ -27,8 +27,8 @@ `--benchmark_perf_counters` flag. The names are decoded through libpfm - meaning, they are platform specific, but some (e.g. `CYCLES` or `INSTRUCTIONS`) are mapped by libpfm to platform-specifics - see libpfm -[documentation](http://perfmon2.sourceforge.net/docs.html) for more details. +[documentation](https://perfmon2.sourceforge.net/docs.html) for more details. The counter values are reported back through the [User Counters](../README.md#custom-counters) mechanism, meaning, they are available in all the formats (e.g. JSON) supported -by User Counters. \ No newline at end of file +by User Counters. diff --git a/third-party/benchmark/include/benchmark/benchmark.h b/third-party/benchmark/include/benchmark/benchmark.h --- a/third-party/benchmark/include/benchmark/benchmark.h +++ b/third-party/benchmark/include/benchmark/benchmark.h @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/benchmark.cc b/third-party/benchmark/src/benchmark.cc --- a/third-party/benchmark/src/benchmark.cc +++ b/third-party/benchmark/src/benchmark.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, @@ -77,7 +77,7 @@ BM_DEFINE_int32(benchmark_repetitions, 1); // If set, enable random interleaving of repetitions of all benchmarks. -// See http://github.com/google/benchmark/issues/1051 for details. +// See https://github.com/google/benchmark/issues/1051 for details. BM_DEFINE_bool(benchmark_enable_random_interleaving, false); // Report the result of each benchmark repetitions. When 'true' is specified diff --git a/third-party/benchmark/src/benchmark_main.cc b/third-party/benchmark/src/benchmark_main.cc --- a/third-party/benchmark/src/benchmark_main.cc +++ b/third-party/benchmark/src/benchmark_main.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/benchmark_name.cc b/third-party/benchmark/src/benchmark_name.cc --- a/third-party/benchmark/src/benchmark_name.cc +++ b/third-party/benchmark/src/benchmark_name.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/benchmark_register.cc b/third-party/benchmark/src/benchmark_register.cc --- a/third-party/benchmark/src/benchmark_register.cc +++ b/third-party/benchmark/src/benchmark_register.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/benchmark_runner.h b/third-party/benchmark/src/benchmark_runner.h --- a/third-party/benchmark/src/benchmark_runner.h +++ b/third-party/benchmark/src/benchmark_runner.h @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/benchmark_runner.cc b/third-party/benchmark/src/benchmark_runner.cc --- a/third-party/benchmark/src/benchmark_runner.cc +++ b/third-party/benchmark/src/benchmark_runner.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/colorprint.cc b/third-party/benchmark/src/colorprint.cc --- a/third-party/benchmark/src/colorprint.cc +++ b/third-party/benchmark/src/colorprint.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/commandlineflags.cc b/third-party/benchmark/src/commandlineflags.cc --- a/third-party/benchmark/src/commandlineflags.cc +++ b/third-party/benchmark/src/commandlineflags.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/complexity.h b/third-party/benchmark/src/complexity.h --- a/third-party/benchmark/src/complexity.h +++ b/third-party/benchmark/src/complexity.h @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/complexity.cc b/third-party/benchmark/src/complexity.cc --- a/third-party/benchmark/src/complexity.cc +++ b/third-party/benchmark/src/complexity.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/console_reporter.cc b/third-party/benchmark/src/console_reporter.cc --- a/third-party/benchmark/src/console_reporter.cc +++ b/third-party/benchmark/src/console_reporter.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/counter.cc b/third-party/benchmark/src/counter.cc --- a/third-party/benchmark/src/counter.cc +++ b/third-party/benchmark/src/counter.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/csv_reporter.cc b/third-party/benchmark/src/csv_reporter.cc --- a/third-party/benchmark/src/csv_reporter.cc +++ b/third-party/benchmark/src/csv_reporter.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, @@ -25,7 +25,7 @@ #include "string_util.h" #include "timers.h" -// File format reference: http://edoceo.com/utilitas/csv-file-format. +// File format reference: https://edoceo.com/utilitas/csv-file-format. namespace benchmark { diff --git a/third-party/benchmark/src/cycleclock.h b/third-party/benchmark/src/cycleclock.h --- a/third-party/benchmark/src/cycleclock.h +++ b/third-party/benchmark/src/cycleclock.h @@ -35,7 +35,7 @@ // environments, and have conflicting // declarations of some other intrinsics, breaking compilation. // Therefore, we simply declare __rdtsc ourselves. See also -// http://connect.microsoft.com/VisualStudio/feedback/details/262047 +// https://connect.microsoft.com/VisualStudio/feedback/details/262047 #if defined(COMPILER_MSVC) && !defined(_M_IX86) && !defined(_M_ARM64) extern "C" uint64_t __rdtsc(); #pragma intrinsic(__rdtsc) @@ -53,7 +53,7 @@ namespace benchmark { // NOTE: only i386 and x86_64 have been well tested. // PPC, sparc, alpha, and ia64 are based on -// http://peter.kuscsik.com/wordpress/?p=14 +// https://peter.kuscsik.com/wordpress/?p=14 // with modifications by m3b. See also // https://setisvn.ssl.berkeley.edu/svn/lib/fftw-3.0.1/kernel/cycle.h namespace cycleclock { diff --git a/third-party/benchmark/src/json_reporter.cc b/third-party/benchmark/src/json_reporter.cc --- a/third-party/benchmark/src/json_reporter.cc +++ b/third-party/benchmark/src/json_reporter.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/perf_counters.h b/third-party/benchmark/src/perf_counters.h --- a/third-party/benchmark/src/perf_counters.h +++ b/third-party/benchmark/src/perf_counters.h @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/perf_counters.cc b/third-party/benchmark/src/perf_counters.cc --- a/third-party/benchmark/src/perf_counters.cc +++ b/third-party/benchmark/src/perf_counters.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/re.h b/third-party/benchmark/src/re.h --- a/third-party/benchmark/src/re.h +++ b/third-party/benchmark/src/re.h @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/reporter.cc b/third-party/benchmark/src/reporter.cc --- a/third-party/benchmark/src/reporter.cc +++ b/third-party/benchmark/src/reporter.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/sleep.cc b/third-party/benchmark/src/sleep.cc --- a/third-party/benchmark/src/sleep.cc +++ b/third-party/benchmark/src/sleep.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/statistics.h b/third-party/benchmark/src/statistics.h --- a/third-party/benchmark/src/statistics.h +++ b/third-party/benchmark/src/statistics.h @@ -5,7 +5,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/statistics.cc b/third-party/benchmark/src/statistics.cc --- a/third-party/benchmark/src/statistics.cc +++ b/third-party/benchmark/src/statistics.cc @@ -5,7 +5,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/sysinfo.cc b/third-party/benchmark/src/sysinfo.cc --- a/third-party/benchmark/src/sysinfo.cc +++ b/third-party/benchmark/src/sysinfo.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/third-party/benchmark/src/timers.cc b/third-party/benchmark/src/timers.cc --- a/third-party/benchmark/src/timers.cc +++ b/third-party/benchmark/src/timers.cc @@ -4,7 +4,7 @@ // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // -// http://www.apache.org/licenses/LICENSE-2.0 +// https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, diff --git a/utils/bazel/llvm-project-overlay/llvm/tblgen.bzl b/utils/bazel/llvm-project-overlay/llvm/tblgen.bzl --- a/utils/bazel/llvm-project-overlay/llvm/tblgen.bzl +++ b/utils/bazel/llvm-project-overlay/llvm/tblgen.bzl @@ -5,7 +5,7 @@ """This file contains BUILD extensions for generating source code from LLVM's table definition files using the TableGen tool. -See http://llvm.org/cmds/tblgen.html for more information on the TableGen +See https://llvm.org/cmds/tblgen.html for more information on the TableGen tool. TODO(chandlerc): Currently this expresses include-based dependencies as "sources", and has no transitive understanding due to these files not being