@@ -754,7 +754,7 @@ psa_status_t psa_export_public_key(psa_key_handle_t handle,
754
754
* to another. The target key retains its lifetime and location.
755
755
*
756
756
* In an implementation where slots have different ownerships,
757
- * this functin may be used to share a key with a different party,
757
+ * this function may be used to share a key with a different party,
758
758
* subject to implementation-defined restrictions on key sharing.
759
759
* In this case \p constraint would typically prevent the recipient
760
760
* from exporting the key.
@@ -830,8 +830,7 @@ psa_status_t psa_copy_key(psa_key_handle_t source_handle,
830
830
* \param hash_size Size of the \p hash buffer in bytes.
831
831
* \param[out] hash_length On success, the number of bytes
832
832
* that make up the hash value. This is always
833
- * #PSA_HASH_SIZE(\c alg) where \c alg is the
834
- * hash algorithm that is calculated.
833
+ * #PSA_HASH_SIZE(\p alg).
835
834
*
836
835
* \retval #PSA_SUCCESS
837
836
* Success.
@@ -1139,15 +1138,13 @@ psa_status_t psa_hash_clone(const psa_hash_operation_t *source_operation,
1139
1138
*
1140
1139
* \param handle Handle to the key to use for the operation.
1141
1140
* \param alg The MAC algorithm to compute (\c PSA_ALG_XXX value
1142
- * such that #PSA_ALG_IS_MAC(alg) is true).
1141
+ * such that #PSA_ALG_IS_MAC(\p alg) is true).
1143
1142
* \param[in] input Buffer containing the input message.
1144
1143
* \param input_length Size of the \p input buffer in bytes.
1145
1144
* \param[out] mac Buffer where the MAC value is to be written.
1146
1145
* \param mac_size Size of the \p mac buffer in bytes.
1147
1146
* \param[out] mac_length On success, the number of bytes
1148
- * that make up the mac value. This is always
1149
- * #PSA_HASH_SIZE(\c alg) where \c alg is the
1150
- * hash algorithm that is calculated.
1147
+ * that make up the MAC value.
1151
1148
*
1152
1149
* \retval #PSA_SUCCESS
1153
1150
* Success.
@@ -1179,7 +1176,7 @@ psa_status_t psa_mac_compute(psa_key_handle_t handle,
1179
1176
*
1180
1177
* \param handle Handle to the key to use for the operation.
1181
1178
* \param alg The MAC algorithm to compute (\c PSA_ALG_XXX value
1182
- * such that #PSA_ALG_IS_MAC(alg) is true).
1179
+ * such that #PSA_ALG_IS_MAC(\p alg) is true).
1183
1180
* \param[in] input Buffer containing the input message.
1184
1181
* \param input_length Size of the \p input buffer in bytes.
1185
1182
* \param[out] mac Buffer containing the expected MAC value.
@@ -1289,7 +1286,7 @@ static psa_mac_operation_t psa_mac_operation_init(void);
1289
1286
* It must remain valid until the operation
1290
1287
* terminates.
1291
1288
* \param alg The MAC algorithm to compute (\c PSA_ALG_XXX value
1292
- * such that #PSA_ALG_IS_MAC(alg) is true).
1289
+ * such that #PSA_ALG_IS_MAC(\p alg) is true).
1293
1290
*
1294
1291
* \retval #PSA_SUCCESS
1295
1292
* Success.
@@ -1962,7 +1959,7 @@ psa_status_t psa_cipher_abort(psa_cipher_operation_t *operation);
1962
1959
* #PSA_AEAD_ENCRYPT_OUTPUT_SIZE(\p alg,
1963
1960
* \p plaintext_length).
1964
1961
* \param[out] ciphertext_length On success, the size of the output
1965
- * in the \b ciphertext buffer.
1962
+ * in the \p ciphertext buffer.
1966
1963
*
1967
1964
* \retval #PSA_SUCCESS
1968
1965
* Success.
@@ -2018,7 +2015,7 @@ psa_status_t psa_aead_encrypt(psa_key_handle_t handle,
2018
2015
* #PSA_AEAD_DECRYPT_OUTPUT_SIZE(\p alg,
2019
2016
* \p ciphertext_length).
2020
2017
* \param[out] plaintext_length On success, the size of the output
2021
- * in the \b plaintext buffer.
2018
+ * in the \p plaintext buffer.
2022
2019
*
2023
2020
* \retval #PSA_SUCCESS
2024
2021
* Success.
@@ -3129,9 +3126,9 @@ psa_status_t psa_key_derivation_input_key(psa_crypto_generator_t *generator,
3129
3126
* public key type corresponding to the type of
3130
3127
* private_key. That is, this function performs the
3131
3128
* equivalent of
3132
- * ` psa_import_key(internal_public_key_handle,
3133
- * PSA_KEY_TYPE_PUBLIC_KEY_OF_KEYPAIR(private_key_type),
3134
- * peer_key, peer_key_length)` where
3129
+ * # psa_import_key(` internal_public_key_handle` ,
3130
+ * # PSA_KEY_TYPE_PUBLIC_KEY_OF_KEYPAIR(` private_key_type` ),
3131
+ * ` peer_key`, ` peer_key_length`) where
3135
3132
* `private_key_type` is the type of `private_key`.
3136
3133
* For example, for EC keys, this means that peer_key
3137
3134
* is interpreted as a point on the curve that the
@@ -3175,6 +3172,10 @@ psa_status_t psa_key_agreement(psa_crypto_generator_t *generator,
3175
3172
* a key derivation, use psa_key_agreement() and other functions from
3176
3173
* the key derivation and generator interface.
3177
3174
*
3175
+ * \param alg The key agreement algorithm to compute
3176
+ * (\c PSA_ALG_XXX value such that
3177
+ * #PSA_ALG_IS_RAW_KEY_AGREEMENT(\p alg)
3178
+ * is true).
3178
3179
* \param private_key Handle to the private key to use.
3179
3180
* \param[in] peer_key Public key of the peer. It must be
3180
3181
* in the same format that psa_import_key()
0 commit comments