Skip to content

Commit 10f1f8a

Browse files
Update dated/broken links in the docs (#1940)
1 parent 8d67a60 commit 10f1f8a

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -655,7 +655,7 @@ private void crcTest() throws IOException {
655655

656656
When providing integrity on the storage itself, you can either create an HMAC over a given key-value pair (as for the Android `SharedPreferences`) or create an HMAC over a complete file that's provided by the file system.
657657

658-
When using an HMAC, you can [use a bouncy castle implementation or the AndroidKeyStore to HMAC the given content](https://cseweb.ucsd.edu/~mihir/papers/oem.html "Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm").
658+
When using an HMAC, you can [use a bouncy castle implementation or the AndroidKeyStore to HMAC the given content](https://web.archive.org/web/20210804035343/https://cseweb.ucsd.edu/~mihir/papers/oem.html "Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm").
659659

660660
Complete the following procedure when generating an HMAC with BouncyCastle:
661661

Document/0x06j-Testing-Resiliency-Against-Reverse-Engineering.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -480,7 +480,7 @@ int xyz(char *dst) {
480480
#### Sample Implementation - Storage
481481
482482
When ensuring the integrity of the application storage itself, you can create an HMAC or signature over either a given key-value pair or a file stored on the device. The CommonCrypto implementation is best for creating an HMAC.
483-
If you need encryption, make sure that you encrypt and then HMAC as described in [Authenticated Encryption](https://cseweb.ucsd.edu/~mihir/papers/oem.html "Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm").
483+
If you need encryption, make sure that you encrypt and then HMAC as described in [Authenticated Encryption](https://web.archive.org/web/20210804035343/https://cseweb.ucsd.edu/~mihir/papers/oem.html "Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm").
484484
485485
When you generate an HMAC with CC:
486486

0 commit comments

Comments
 (0)