pk: fix documentation for mbedtls_pk_setup_opaque()

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
This commit is contained in:
Valerio Setti 2024-03-19 11:32:51 +01:00
parent b711a987d3
commit 3c5ea11284

View File

@ -373,9 +373,9 @@ int mbedtls_pk_setup(mbedtls_pk_context *ctx, const mbedtls_pk_info_t *info);
* Under the hood PSA functions are used to perform the required
* operations and, based on the key type, used algorithms will be:
* * EC:
* * verify: #PSA_ALG_ECDSA_ANY;
* * sign: try #PSA_ALG_DETERMINISTIC_ECDSA() first and, in
* case it fails, try with #PSA_ALG_ECDSA().
* * verify, verify_ext: #PSA_ALG_ECDSA_ANY;
* * sign, sign_ext: try #PSA_ALG_DETERMINISTIC_ECDSA()
* first and, in case it fails, try with #PSA_ALG_ECDSA().
* * RSA:
* * sign: #PSA_ALG_RSA_PKCS1V15_SIGN();
* * sign_ext: use the algorithm associated with the wrapped
@ -384,9 +384,8 @@ int mbedtls_pk_setup(mbedtls_pk_context *ctx, const mbedtls_pk_info_t *info);
* * verify_ext: not supported;
* * decrypt: #PSA_ALG_RSA_PKCS1V15_CRYPT;
* * encrypt: not supported.
* In order to have above mentioned operations to succeed it is
* mandatory that the wrapped PSA key allows the specified
* algorithm in its policy.
* In order for the above operations to succeed, the policy of
* the wrapped PSA key must allow the specified algorithm.
*
* \param ctx The context to initialize. It must be empty (type NONE).
* \param key The PSA key to wrap, which must hold an ECC or RSA key