DOCS: Replaces broken links
Replaces all links in the docs which have become outdated. This also
includes email addresses which are no longer active.
Change-Id: I6830237c311d2785efd78d5753b8393b1ba06234
Signed-off-by: Matthew Dalzell <matthew.dalzell@arm.com>
diff --git a/docs/design_docs/booting/secure_boot_hw_key_integration.rst b/docs/design_docs/booting/secure_boot_hw_key_integration.rst
index c0d5ec0..21d382a 100644
--- a/docs/design_docs/booting/secure_boot_hw_key_integration.rst
+++ b/docs/design_docs/booting/secure_boot_hw_key_integration.rst
@@ -8,7 +8,7 @@
Abstract
--------
-`PSA Trusted Boot and Firmware Update <https://pages.arm.com/psa-resources-tbfu.html>`__
+`PSA Trusted Boot and Firmware Update <https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/PSA/DEN0072-PSA_TBFU_1.1-BETA0.pdf?revision=3ce2513a-ae0f-4b43-96a0-851ed67a640b>`__
specification requires the support of at least one immutable root of trust
public key (ROTPK) for firmware verification. This can be stored using a locked
on-chip flash memory, a secure-element or on-chip OTP memory. It also beneficial
diff --git a/docs/design_docs/booting/tfm_secure_boot.rst b/docs/design_docs/booting/tfm_secure_boot.rst
index 3a3f271..cf441c5 100644
--- a/docs/design_docs/booting/tfm_secure_boot.rst
+++ b/docs/design_docs/booting/tfm_secure_boot.rst
@@ -42,7 +42,7 @@
CMake variable. If you wish to use a locally downloaded copy, the CMake variable
``MCUBOOT_PATH`` can be set to its location. This document contains information
about how MCUboot has been integrated to TF-M. For further information about
-MCUboot design please refer to the `MCUBoot homepage <https://www.mcuboot.com/>`__.
+MCUboot design please refer to the `MCUBoot homepage <https://www.trustedfirmware.org/projects/mcuboot/index.html>`__.
Bootloader is started when CPU is released from reset. It runs in secure mode.
It authenticates the firmware image by hash (SHA-256) and digital signature
diff --git a/docs/design_docs/ff_isolation.rst b/docs/design_docs/ff_isolation.rst
index f078dc2..288d963 100644
--- a/docs/design_docs/ff_isolation.rst
+++ b/docs/design_docs/ff_isolation.rst
@@ -436,7 +436,7 @@
.. [1] `Arm PSA Firmware Framework for M 1.0 (FF-M 1.0) <https://developer.arm.com/documentation/den0063/latest/>`_
.. [2] `Arm Firmware Framework for M 1.1 Extension (FF-M 1.1) <https://developer.arm.com/documentation/aes0039/latest/>`_
-.. [3] `Arm Trusted Base System Architecture for M (TBSA-M) <https://www.arm.com/en/architecture/security-features/platform-security>`_
+.. [3] `Arm Trusted Base System Architecture for M (TBSA-M) <https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/PSA/DEN0083_PSA_TBSA-M_1.0-bet2.pdf?revision=5f9de99f-a7b5-4851-b041-f698521bf6bf>`_
--------------
diff --git a/docs/design_docs/services/ps_key_management.rst b/docs/design_docs/services/ps_key_management.rst
index 6ce540f..5345722 100644
--- a/docs/design_docs/services/ps_key_management.rst
+++ b/docs/design_docs/services/ps_key_management.rst
@@ -4,7 +4,6 @@
:Author: Jamie Fox
:Organization: Arm Limited
-:Contact: Jamie Fox <jamie.fox@arm.com>
Background
==========
@@ -115,13 +114,11 @@
References
==========
-.. [TBSA-M] Arm Platform Security Architecture Trusted Base System Architecture
- for Armv6-M, Armv7-M and Armv8-M, version 1.0
-.. [HKDF] Hugo Krawczyk. 2010. Cryptographic extraction and key derivation: the
- HKDF scheme. In Proceedings of the 30th annual conference on Advances in
- cryptology (CRYPTO'10)
-.. [RFC5869] IETF RFC 5869: HMAC-based Extract-and-Expand Key Derivation
- Function (HKDF)
+.. [TBSA-M] `Arm Platform Security Architecture Trusted Base System Architecture for Armv6-M, Armv7-M and Armv8-M, version 1.0 <https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/PSA/DEN0083_PSA_TBSA-M_1.0-bet2.pdf?revision=5f9de99f-a7b5-4851-b041-f698521bf6bf>`_
+
+.. [HKDF] `Hugo Krawczyk. 2010. Cryptographic extraction and key derivation: the HKDF scheme. In Proceedings of the 30th annual conference on Advances in cryptology (CRYPTO'10) <https://eprint.iacr.org/2010/264.pdf>`_
+
+.. [RFC5869] `IETF RFC 5869: HMAC-based Extract-and-Expand Key Derivation Function (HKDF) <https://datatracker.ietf.org/doc/html/rfc5869>`_
--------------
diff --git a/docs/design_docs/services/stateless_rot_service.rst b/docs/design_docs/services/stateless_rot_service.rst
index 4e3f47e..f137ee3 100644
--- a/docs/design_docs/services/stateless_rot_service.rst
+++ b/docs/design_docs/services/stateless_rot_service.rst
@@ -4,7 +4,6 @@
:Author: Mingyang Sun
:Organization: Arm Limited
-:Contact: mingyang.sun@arm.com
************
diff --git a/docs/design_docs/services/symmetric_initial_attest.rst b/docs/design_docs/services/symmetric_initial_attest.rst
index ca6d2b6..23586b9 100644
--- a/docs/design_docs/services/symmetric_initial_attest.rst
+++ b/docs/design_docs/services/symmetric_initial_attest.rst
@@ -325,7 +325,7 @@
.. [3] :doc:`Initial Attestation Service Integration Guide </integration_guide/services/tfm_attestation_integration_guide>`
-.. [4] `t_cose library <https://github.com/laurencelundblade/t_cose/blob/v2.0-alpha-2/inc/t_cose/t_cose_mac_compute.h>`_
+.. [4] `MAC compute in t_cose library <https://github.com/laurencelundblade/t_cose/blob/v2.0-alpha-2/inc/t_cose/t_cose_mac_compute.h>`_
.. [5] `HMAC: Keyed-Hashing for Message Authentication <https://tools.ietf.org/html/rfc2104>`_
diff --git a/docs/design_docs/services/tfm_crypto_design.rst b/docs/design_docs/services/tfm_crypto_design.rst
index 5279332..ab9dec5 100644
--- a/docs/design_docs/services/tfm_crypto_design.rst
+++ b/docs/design_docs/services/tfm_crypto_design.rst
@@ -355,7 +355,7 @@
.. [1] PSA Certified Crypto API specifications: \ https://arm-software.github.io/psa-api/crypto/
.. [2] Using PSA - Getting started in Mbed TLS: \ https://mbed-tls.readthedocs.io/en/latest/getting_started/psa/
.. [3] ``Mbed TLS`` repository which holds the reference implementation as a `C` software library: \ https://github.com/Mbed-TLS
-.. [4] PSA Unified Driver Interface for Cryptoprocessors: \ https://github.com/Mbed-TLS/mbedtls/blob/development/docs/proposed/psa-driver-interface.md
+.. [4] PSA Unified Driver Interface for Cryptoprocessors: \ https://github.com/Mbed-TLS/TF-PSA-Crypto/blob/development/docs/proposed/psa-driver-interface.md
.. [5] TF-M Builtin Key Loader driver, normally described as :ref:`tfm_builtin_key_loader <tfm-builtin-keys-label>`
--------------
diff --git a/docs/design_docs/services/tfm_fwu_service.rst b/docs/design_docs/services/tfm_fwu_service.rst
index ade3541..ca543dc 100644
--- a/docs/design_docs/services/tfm_fwu_service.rst
+++ b/docs/design_docs/services/tfm_fwu_service.rst
@@ -4,7 +4,6 @@
:Author: Sherry Zhang
:Organization: Arm Limited
-:Contact: Sherry Zhang <Sherry.Zhang2@arm.com>
.. contents:: Table of Contents
:depth: 3
diff --git a/docs/design_docs/services/tfm_its_service.rst b/docs/design_docs/services/tfm_its_service.rst
index efa9a21..3fe53f9 100644
--- a/docs/design_docs/services/tfm_its_service.rst
+++ b/docs/design_docs/services/tfm_its_service.rst
@@ -4,7 +4,6 @@
:Author: Jamie Fox
:Organization: Arm Limited
-:Contact: Jamie Fox <jamie.fox@arm.com>
.. toctree::
:maxdepth: 1
diff --git a/docs/design_docs/services/tfm_psa_inter_process_communication.rst b/docs/design_docs/services/tfm_psa_inter_process_communication.rst
index 8393a17..26e5528 100644
--- a/docs/design_docs/services/tfm_psa_inter_process_communication.rst
+++ b/docs/design_docs/services/tfm_psa_inter_process_communication.rst
@@ -4,7 +4,6 @@
:Authors: Ken Liu, Mingyang Sun
:Organization: Arm Limited
-:Contact: ken.liu@arm.com, mingyang.sun@arm.com
***********
Terminology
diff --git a/docs/design_docs/software/enum_implicit_casting.rst b/docs/design_docs/software/enum_implicit_casting.rst
index 3c1e453..a928b8a 100644
--- a/docs/design_docs/software/enum_implicit_casting.rst
+++ b/docs/design_docs/software/enum_implicit_casting.rst
@@ -4,7 +4,6 @@
:Author: Hugues de Valon
:Organization: Arm Limited
-:Contact: hugues.devalon@arm.com
********
Abstract
diff --git a/docs/design_docs/software/tfm_code_generation_with_jinja2.rst b/docs/design_docs/software/tfm_code_generation_with_jinja2.rst
index fbdfbbc..05e6ba2 100644
--- a/docs/design_docs/software/tfm_code_generation_with_jinja2.rst
+++ b/docs/design_docs/software/tfm_code_generation_with_jinja2.rst
@@ -34,7 +34,7 @@
call the Jinja2 template engine library from
``tools/tfm_parse_manifest_list.py`` to do the substitution.
-More information on jinja2: http://jinja.pocoo.org/
+More information on jinja2: https://jinja.palletsprojects.com/en/stable/
Changes needed:
===============
diff --git a/docs/design_docs/software/tfm_cooperative_scheduling_rules.rst b/docs/design_docs/software/tfm_cooperative_scheduling_rules.rst
index 0b96f94..39f3edb 100644
--- a/docs/design_docs/software/tfm_cooperative_scheduling_rules.rst
+++ b/docs/design_docs/software/tfm_cooperative_scheduling_rules.rst
@@ -4,7 +4,6 @@
:Author: Ashutosh Singh
:Organization: Arm Limited
-:Contact: Ashutosh Singh <ashutosh.singh@arm.com>
TF-M Scheduler - Rules
======================
diff --git a/docs/design_docs/tfm_builtin_keys.rst b/docs/design_docs/tfm_builtin_keys.rst
index b500932..907783c 100644
--- a/docs/design_docs/tfm_builtin_keys.rst
+++ b/docs/design_docs/tfm_builtin_keys.rst
@@ -259,9 +259,9 @@
References
**********
-.. [1] PSA cryptoprocessor driver interface: \ https://github.com/Mbed-TLS/mbedtls/blob/development/docs/proposed/psa-driver-interface.md
+.. [1] PSA cryptoprocessor driver interface: \ https://github.com/Mbed-TLS/TF-PSA-Crypto/blob/development/docs/proposed/psa-driver-interface.md
.. [2] Definition of psa_key_location_t type in the PSA spec: \ https://arm-software.github.io/psa-api/crypto/1.1/api/keys/lifetimes.html#c.psa_key_location_t
-.. [3] Interface for platform keys: \ https://github.com/ARM-software/psa-crypto-api/issues/550
+.. [3] Interface for platform keys: `https://github.com/ARM-software/psa-crypto-api/issues/550` (private)
--------------
diff --git a/docs/design_docs/tfm_physical_attack_mitigation.rst b/docs/design_docs/tfm_physical_attack_mitigation.rst
index 29630ea..d91e5c0 100644
--- a/docs/design_docs/tfm_physical_attack_mitigation.rst
+++ b/docs/design_docs/tfm_physical_attack_mitigation.rst
@@ -625,7 +625,7 @@
.. [1] `PSA Certified Level 3 Lightweight Protection Profile <https://www.psacertified.org/app/uploads/2020/11/JSADEN009-PSA_Certified_Level_3_LW_PP-1.0-ALP02.pdf>`_
-.. [2] `MCUboot project <https://github.com/mcu-tools/mcuboot/blob/master/boot/bootutil/include/bootutil/fault_injection_hardening.h>`_
+.. [2] `MCUboot project - fault injection hardening <https://github.com/mcu-tools/mcuboot/blob/master/boot/bootutil/include/bootutil/fault_injection_hardening.h>`_
.. [3] `MCUboot fault injection mitigation <https://www.trustedfirmware.org/docs/TF-M_fault_injection_mitigation.pdf>`_