DOCS: Replaces broken links

Replaces all links in the docs which have become outdated. This also
includes email addresses which are no longer active.

Change-Id: I6830237c311d2785efd78d5753b8393b1ba06234
Signed-off-by: Matthew Dalzell <matthew.dalzell@arm.com>
diff --git a/docs/design_docs/booting/secure_boot_hw_key_integration.rst b/docs/design_docs/booting/secure_boot_hw_key_integration.rst
index c0d5ec0..21d382a 100644
--- a/docs/design_docs/booting/secure_boot_hw_key_integration.rst
+++ b/docs/design_docs/booting/secure_boot_hw_key_integration.rst
@@ -8,7 +8,7 @@
 Abstract
 --------
 
-`PSA Trusted Boot and Firmware Update <https://pages.arm.com/psa-resources-tbfu.html>`__
+`PSA Trusted Boot and Firmware Update <https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/PSA/DEN0072-PSA_TBFU_1.1-BETA0.pdf?revision=3ce2513a-ae0f-4b43-96a0-851ed67a640b>`__
 specification requires the support of at least one immutable root of trust
 public key (ROTPK) for firmware verification. This can be stored using a locked
 on-chip flash memory, a secure-element or on-chip OTP memory. It also beneficial
diff --git a/docs/design_docs/booting/tfm_secure_boot.rst b/docs/design_docs/booting/tfm_secure_boot.rst
index 3a3f271..cf441c5 100644
--- a/docs/design_docs/booting/tfm_secure_boot.rst
+++ b/docs/design_docs/booting/tfm_secure_boot.rst
@@ -42,7 +42,7 @@
 CMake variable. If you wish to use a locally downloaded copy, the CMake variable
 ``MCUBOOT_PATH`` can be set to its location. This document contains information
 about how MCUboot has been integrated to TF-M. For further information about
-MCUboot design please refer to the `MCUBoot homepage <https://www.mcuboot.com/>`__.
+MCUboot design please refer to the `MCUBoot homepage <https://www.trustedfirmware.org/projects/mcuboot/index.html>`__.
 
 Bootloader is started when CPU is released from reset. It runs in secure mode.
 It authenticates the firmware image by hash (SHA-256) and digital signature
diff --git a/docs/design_docs/ff_isolation.rst b/docs/design_docs/ff_isolation.rst
index f078dc2..288d963 100644
--- a/docs/design_docs/ff_isolation.rst
+++ b/docs/design_docs/ff_isolation.rst
@@ -436,7 +436,7 @@
 
 .. [1] `Arm PSA Firmware Framework for M 1.0 (FF-M 1.0) <https://developer.arm.com/documentation/den0063/latest/>`_
 .. [2] `Arm Firmware Framework for M 1.1 Extension (FF-M 1.1) <https://developer.arm.com/documentation/aes0039/latest/>`_
-.. [3] `Arm Trusted Base System Architecture for M (TBSA-M) <https://www.arm.com/en/architecture/security-features/platform-security>`_
+.. [3] `Arm Trusted Base System Architecture for M (TBSA-M) <https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/PSA/DEN0083_PSA_TBSA-M_1.0-bet2.pdf?revision=5f9de99f-a7b5-4851-b041-f698521bf6bf>`_
 
 --------------
 
diff --git a/docs/design_docs/services/ps_key_management.rst b/docs/design_docs/services/ps_key_management.rst
index 6ce540f..5345722 100644
--- a/docs/design_docs/services/ps_key_management.rst
+++ b/docs/design_docs/services/ps_key_management.rst
@@ -4,7 +4,6 @@
 
 :Author: Jamie Fox
 :Organization: Arm Limited
-:Contact: Jamie Fox <jamie.fox@arm.com>
 
 Background
 ==========
@@ -115,13 +114,11 @@
 
 References
 ==========
-.. [TBSA-M] Arm Platform Security Architecture Trusted Base System Architecture
-   for Armv6-M, Armv7-M and Armv8-M, version 1.0
-.. [HKDF] Hugo Krawczyk. 2010. Cryptographic extraction and key derivation: the
-   HKDF scheme. In Proceedings of the 30th annual conference on Advances in
-   cryptology (CRYPTO'10)
-.. [RFC5869] IETF RFC 5869: HMAC-based Extract-and-Expand Key Derivation
-   Function (HKDF)
+.. [TBSA-M] `Arm Platform Security Architecture Trusted Base System Architecture for Armv6-M, Armv7-M and Armv8-M, version 1.0  <https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/PSA/DEN0083_PSA_TBSA-M_1.0-bet2.pdf?revision=5f9de99f-a7b5-4851-b041-f698521bf6bf>`_
+
+.. [HKDF] `Hugo Krawczyk. 2010. Cryptographic extraction and key derivation: the HKDF scheme. In Proceedings of the 30th annual conference on Advances in cryptology (CRYPTO'10) <https://eprint.iacr.org/2010/264.pdf>`_
+
+.. [RFC5869] `IETF RFC 5869: HMAC-based Extract-and-Expand Key Derivation Function (HKDF) <https://datatracker.ietf.org/doc/html/rfc5869>`_
 
 --------------
 
diff --git a/docs/design_docs/services/stateless_rot_service.rst b/docs/design_docs/services/stateless_rot_service.rst
index 4e3f47e..f137ee3 100644
--- a/docs/design_docs/services/stateless_rot_service.rst
+++ b/docs/design_docs/services/stateless_rot_service.rst
@@ -4,7 +4,6 @@
 
 :Author: Mingyang Sun
 :Organization: Arm Limited
-:Contact: mingyang.sun@arm.com
 
 
 ************
diff --git a/docs/design_docs/services/symmetric_initial_attest.rst b/docs/design_docs/services/symmetric_initial_attest.rst
index ca6d2b6..23586b9 100644
--- a/docs/design_docs/services/symmetric_initial_attest.rst
+++ b/docs/design_docs/services/symmetric_initial_attest.rst
@@ -325,7 +325,7 @@
 
 .. [3] :doc:`Initial Attestation Service Integration Guide </integration_guide/services/tfm_attestation_integration_guide>`
 
-.. [4] `t_cose library <https://github.com/laurencelundblade/t_cose/blob/v2.0-alpha-2/inc/t_cose/t_cose_mac_compute.h>`_
+.. [4] `MAC compute in t_cose library <https://github.com/laurencelundblade/t_cose/blob/v2.0-alpha-2/inc/t_cose/t_cose_mac_compute.h>`_
 
 .. [5] `HMAC: Keyed-Hashing for Message Authentication <https://tools.ietf.org/html/rfc2104>`_
 
diff --git a/docs/design_docs/services/tfm_crypto_design.rst b/docs/design_docs/services/tfm_crypto_design.rst
index 5279332..ab9dec5 100644
--- a/docs/design_docs/services/tfm_crypto_design.rst
+++ b/docs/design_docs/services/tfm_crypto_design.rst
@@ -355,7 +355,7 @@
 .. [1] PSA Certified Crypto API specifications: \ https://arm-software.github.io/psa-api/crypto/
 .. [2] Using PSA - Getting started in Mbed TLS: \ https://mbed-tls.readthedocs.io/en/latest/getting_started/psa/
 .. [3] ``Mbed TLS`` repository which holds the reference implementation as a `C` software library: \ https://github.com/Mbed-TLS
-.. [4] PSA Unified Driver Interface for Cryptoprocessors: \ https://github.com/Mbed-TLS/mbedtls/blob/development/docs/proposed/psa-driver-interface.md
+.. [4] PSA Unified Driver Interface for Cryptoprocessors: \ https://github.com/Mbed-TLS/TF-PSA-Crypto/blob/development/docs/proposed/psa-driver-interface.md
 .. [5] TF-M Builtin Key Loader driver, normally described as :ref:`tfm_builtin_key_loader <tfm-builtin-keys-label>`
 
 --------------
diff --git a/docs/design_docs/services/tfm_fwu_service.rst b/docs/design_docs/services/tfm_fwu_service.rst
index ade3541..ca543dc 100644
--- a/docs/design_docs/services/tfm_fwu_service.rst
+++ b/docs/design_docs/services/tfm_fwu_service.rst
@@ -4,7 +4,6 @@
 
 :Author: Sherry Zhang
 :Organization: Arm Limited
-:Contact: Sherry Zhang <Sherry.Zhang2@arm.com>
 
 .. contents:: Table of Contents
    :depth: 3
diff --git a/docs/design_docs/services/tfm_its_service.rst b/docs/design_docs/services/tfm_its_service.rst
index efa9a21..3fe53f9 100644
--- a/docs/design_docs/services/tfm_its_service.rst
+++ b/docs/design_docs/services/tfm_its_service.rst
@@ -4,7 +4,6 @@
 
 :Author: Jamie Fox
 :Organization: Arm Limited
-:Contact: Jamie Fox <jamie.fox@arm.com>
 
 .. toctree::
     :maxdepth: 1
diff --git a/docs/design_docs/services/tfm_psa_inter_process_communication.rst b/docs/design_docs/services/tfm_psa_inter_process_communication.rst
index 8393a17..26e5528 100644
--- a/docs/design_docs/services/tfm_psa_inter_process_communication.rst
+++ b/docs/design_docs/services/tfm_psa_inter_process_communication.rst
@@ -4,7 +4,6 @@
 
 :Authors: Ken Liu, Mingyang Sun
 :Organization: Arm Limited
-:Contact: ken.liu@arm.com, mingyang.sun@arm.com
 
 ***********
 Terminology
diff --git a/docs/design_docs/software/enum_implicit_casting.rst b/docs/design_docs/software/enum_implicit_casting.rst
index 3c1e453..a928b8a 100644
--- a/docs/design_docs/software/enum_implicit_casting.rst
+++ b/docs/design_docs/software/enum_implicit_casting.rst
@@ -4,7 +4,6 @@
 
 :Author: Hugues de Valon
 :Organization: Arm Limited
-:Contact: hugues.devalon@arm.com
 
 ********
 Abstract
diff --git a/docs/design_docs/software/tfm_code_generation_with_jinja2.rst b/docs/design_docs/software/tfm_code_generation_with_jinja2.rst
index fbdfbbc..05e6ba2 100644
--- a/docs/design_docs/software/tfm_code_generation_with_jinja2.rst
+++ b/docs/design_docs/software/tfm_code_generation_with_jinja2.rst
@@ -34,7 +34,7 @@
 call the Jinja2 template engine library from
 ``tools/tfm_parse_manifest_list.py`` to do the substitution.
 
-More information on jinja2: http://jinja.pocoo.org/
+More information on jinja2: https://jinja.palletsprojects.com/en/stable/
 
 Changes needed:
 ===============
diff --git a/docs/design_docs/software/tfm_cooperative_scheduling_rules.rst b/docs/design_docs/software/tfm_cooperative_scheduling_rules.rst
index 0b96f94..39f3edb 100644
--- a/docs/design_docs/software/tfm_cooperative_scheduling_rules.rst
+++ b/docs/design_docs/software/tfm_cooperative_scheduling_rules.rst
@@ -4,7 +4,6 @@
 
 :Author: Ashutosh Singh
 :Organization: Arm Limited
-:Contact: Ashutosh Singh <ashutosh.singh@arm.com>
 
 TF-M Scheduler - Rules
 ======================
diff --git a/docs/design_docs/tfm_builtin_keys.rst b/docs/design_docs/tfm_builtin_keys.rst
index b500932..907783c 100644
--- a/docs/design_docs/tfm_builtin_keys.rst
+++ b/docs/design_docs/tfm_builtin_keys.rst
@@ -259,9 +259,9 @@
 References
 **********
 
-.. [1] PSA cryptoprocessor driver interface: \ https://github.com/Mbed-TLS/mbedtls/blob/development/docs/proposed/psa-driver-interface.md
+.. [1] PSA cryptoprocessor driver interface: \ https://github.com/Mbed-TLS/TF-PSA-Crypto/blob/development/docs/proposed/psa-driver-interface.md
 .. [2] Definition of psa_key_location_t type in the PSA spec: \ https://arm-software.github.io/psa-api/crypto/1.1/api/keys/lifetimes.html#c.psa_key_location_t
-.. [3] Interface for platform keys: \ https://github.com/ARM-software/psa-crypto-api/issues/550
+.. [3] Interface for platform keys:  `https://github.com/ARM-software/psa-crypto-api/issues/550` (private)
 
 --------------
 
diff --git a/docs/design_docs/tfm_physical_attack_mitigation.rst b/docs/design_docs/tfm_physical_attack_mitigation.rst
index 29630ea..d91e5c0 100644
--- a/docs/design_docs/tfm_physical_attack_mitigation.rst
+++ b/docs/design_docs/tfm_physical_attack_mitigation.rst
@@ -625,7 +625,7 @@
 
 .. [1] `PSA Certified Level 3 Lightweight Protection Profile <https://www.psacertified.org/app/uploads/2020/11/JSADEN009-PSA_Certified_Level_3_LW_PP-1.0-ALP02.pdf>`_
 
-.. [2] `MCUboot project <https://github.com/mcu-tools/mcuboot/blob/master/boot/bootutil/include/bootutil/fault_injection_hardening.h>`_
+.. [2] `MCUboot project - fault injection hardening <https://github.com/mcu-tools/mcuboot/blob/master/boot/bootutil/include/bootutil/fault_injection_hardening.h>`_
 
 .. [3] `MCUboot fault injection mitigation <https://www.trustedfirmware.org/docs/TF-M_fault_injection_mitigation.pdf>`_