Fix typos
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
This commit is contained in:
parent
ece9087b93
commit
f9a68ad62a
2 changed files with 3 additions and 3 deletions
|
@ -309,8 +309,8 @@ This family requires the following type and entry points:
|
||||||
* `"key_derivation_input_key"` (opaque drivers only)
|
* `"key_derivation_input_key"` (opaque drivers only)
|
||||||
* `"key_derivation_output_bytes"`: called by `psa_key_derivation_output_bytes()`; also by `psa_key_derivation_output_key()` for transparent drivers.
|
* `"key_derivation_output_bytes"`: called by `psa_key_derivation_output_bytes()`; also by `psa_key_derivation_output_key()` for transparent drivers.
|
||||||
* `"key_derivation_output_key"`: called by `psa_key_derivation_output_key()` for transparent drivers when deriving an asymmetric key pair, and also for opaque drivers.
|
* `"key_derivation_output_key"`: called by `psa_key_derivation_output_key()` for transparent drivers when deriving an asymmetric key pair, and also for opaque drivers.
|
||||||
* `"key_derivation_verify_output_bytes"` (opaque drivers only).
|
* `"key_derivation_verify_bytes"` (opaque drivers only).
|
||||||
* `"key_derivation_verify_output_key"` (opaque drivers only).
|
* `"key_derivation_verify_key"` (opaque drivers only).
|
||||||
* `"key_derivation_abort"`: called by all key derivation functions of the PSA Cryptography API.
|
* `"key_derivation_abort"`: called by all key derivation functions of the PSA Cryptography API.
|
||||||
|
|
||||||
TODO: key input and output for opaque drivers; deterministic key generation for transparent drivers
|
TODO: key input and output for opaque drivers; deterministic key generation for transparent drivers
|
||||||
|
|
|
@ -425,7 +425,7 @@
|
||||||
* This key type is suitable for passwords and passphrases which are typically
|
* This key type is suitable for passwords and passphrases which are typically
|
||||||
* intended to be memorizable by humans, and have a low entropy relative to
|
* intended to be memorizable by humans, and have a low entropy relative to
|
||||||
* their size. It can be used for randomly generated or derived keys with
|
* their size. It can be used for randomly generated or derived keys with
|
||||||
* maximum or near-maximum entropy, but PSA_KEY_TYPE_DERIVE is more suitable
|
* maximum or near-maximum entropy, but #PSA_KEY_TYPE_DERIVE is more suitable
|
||||||
* for such keys. It is not suitable for passwords with extremely low entropy,
|
* for such keys. It is not suitable for passwords with extremely low entropy,
|
||||||
* such as numerical PINs.
|
* such as numerical PINs.
|
||||||
*
|
*
|
||||||
|
|
Loading…
Reference in a new issue