From f9a68ad62a5ea783f1c3a6ad51ced87cabf36a80 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Manuel=20P=C3=A9gouri=C3=A9-Gonnard?= Date: Fri, 7 May 2021 12:11:38 +0200 Subject: [PATCH] Fix typos MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Manuel Pégourié-Gonnard --- docs/proposed/psa-driver-interface.md | 4 ++-- include/psa/crypto_values.h | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/docs/proposed/psa-driver-interface.md b/docs/proposed/psa-driver-interface.md index 0e9877df5..9e46eb0bd 100644 --- a/docs/proposed/psa-driver-interface.md +++ b/docs/proposed/psa-driver-interface.md @@ -309,8 +309,8 @@ This family requires the following type and entry points: * `"key_derivation_input_key"` (opaque drivers only) * `"key_derivation_output_bytes"`: called by `psa_key_derivation_output_bytes()`; also by `psa_key_derivation_output_key()` for transparent drivers. * `"key_derivation_output_key"`: called by `psa_key_derivation_output_key()` for transparent drivers when deriving an asymmetric key pair, and also for opaque drivers. -* `"key_derivation_verify_output_bytes"` (opaque drivers only). -* `"key_derivation_verify_output_key"` (opaque drivers only). +* `"key_derivation_verify_bytes"` (opaque drivers only). +* `"key_derivation_verify_key"` (opaque drivers only). * `"key_derivation_abort"`: called by all key derivation functions of the PSA Cryptography API. TODO: key input and output for opaque drivers; deterministic key generation for transparent drivers diff --git a/include/psa/crypto_values.h b/include/psa/crypto_values.h index f7d83020b..722f5bafe 100644 --- a/include/psa/crypto_values.h +++ b/include/psa/crypto_values.h @@ -425,7 +425,7 @@ * This key type is suitable for passwords and passphrases which are typically * intended to be memorizable by humans, and have a low entropy relative to * their size. It can be used for randomly generated or derived keys with - * maximum or near-maximum entropy, but PSA_KEY_TYPE_DERIVE is more suitable + * maximum or near-maximum entropy, but #PSA_KEY_TYPE_DERIVE is more suitable * for such keys. It is not suitable for passwords with extremely low entropy, * such as numerical PINs. *