Skip to content

Commit 4c6cdda

Browse files
committed
Fix hyphenation
1 parent 01196f5 commit 4c6cdda

File tree

2 files changed

+38
-38
lines changed

2 files changed

+38
-38
lines changed

doc/crypto/api/keys/management.rst

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -725,15 +725,15 @@ Interruptible key generation
725725
Generation of some key types can be computationally expensive.
726726
For example, RSA keys, and elliptic curve public keys.
727727

728-
For such keys, an interruptible key generation operation can be used instead of calling `psa_generate_key()`, in applications that have bounded execution requirements for use cases that require key generation.
728+
For such keys, an interruptible key-generation operation can be used instead of calling `psa_generate_key()`, in applications that have bounded execution requirements for use cases that require key generation.
729729

730730
.. note::
731731
An implementation of the |API| does not need to provide incremental generation for all key types supported by the implementation.
732732
Use `psa_generate_key()` to create keys for types that do not need to be incrementally generated.
733733

734-
An interruptible key generation operation is used as follows:
734+
An interruptible key-generation operation is used as follows:
735735

736-
1. Allocate an interruptible key generation operation object, of type `psa_generate_key_iop_t`, which will be passed to all the functions listed here.
736+
1. Allocate an interruptible key-generation operation object, of type `psa_generate_key_iop_t`, which will be passed to all the functions listed here.
737737
#. Initialize the operation object with one of the methods described in the documentation for `psa_generate_key_iop_t`, for example, `PSA_GENERATE_KEY_IOP_INIT`.
738738
#. Call `psa_generate_key_iop_setup()` to specify the key attributes.
739739
#. Call `psa_generate_key_iop_complete()` to finish generating the key, until this function does not return :code:`PSA_OPERATION_INCOMPLETE`.
@@ -742,11 +742,11 @@ An interruptible key generation operation is used as follows:
742742
.. typedef:: /* implementation-defined type */ psa_generate_key_iop_t
743743

744744
.. summary::
745-
The type of the state data structure for an interruptible key generation operation.
745+
The type of the state data structure for an interruptible key-generation operation.
746746

747747
.. versionadded:: 1.x
748748

749-
Before calling any function on an interruptible key generation operation object, the application must initialize it by any of the following means:
749+
Before calling any function on an interruptible key-generation operation object, the application must initialize it by any of the following means:
750750

751751
* Set the object to all-bits-zero, for example:
752752

@@ -781,14 +781,14 @@ An interruptible key generation operation is used as follows:
781781
:definition: /* implementation-defined value */
782782
783783
.. summary::
784-
This macro evaluates to an initializer for an interruptible key generation operation object of type `psa_generate_key_iop_t`.
784+
This macro evaluates to an initializer for an interruptible key-generation operation object of type `psa_generate_key_iop_t`.
785785

786786
.. versionadded:: 1.x
787787

788788
.. function:: psa_generate_key_iop_init
789789

790790
.. summary::
791-
Return an initial value for an interruptible key generation operation object.
791+
Return an initial value for an interruptible key-generation operation object.
792792

793793
.. versionadded:: 1.x
794794

@@ -797,12 +797,12 @@ An interruptible key generation operation is used as follows:
797797
.. function:: psa_generate_key_iop_get_num_ops
798798

799799
.. summary::
800-
Get the number of *ops* that an interruptible key generation operation has taken so far.
800+
Get the number of *ops* that an interruptible key-generation operation has taken so far.
801801

802802
.. versionadded:: 1.x
803803

804804
.. param:: psa_generate_key_iop_t * operation
805-
The interruptible key generation operation to inspect.
805+
The interruptible key-generation operation to inspect.
806806

807807
.. return:: uint32_t
808808
Number of *ops* that the operation has taken so far.
@@ -822,7 +822,7 @@ An interruptible key generation operation is used as follows:
822822
.. versionadded:: 1.x
823823

824824
.. param:: psa_generate_key_iop_t * operation
825-
The interruptible key generation operation to set up.
825+
The interruptible key-generation operation to set up.
826826
It must have been initialized as per the documentation for `psa_generate_key_iop_t`, and be inactive.
827827
.. param:: const psa_key_attributes_t * attributes
828828
The attributes for the new key.
@@ -910,7 +910,7 @@ An interruptible key generation operation is used as follows:
910910
.. versionadded:: 1.x
911911

912912
.. param:: psa_generate_key_iop_t * operation
913-
The interruptible key generation operation to use.
913+
The interruptible key-generation operation to use.
914914
The operation must be active.
915915
.. param:: psa_key_id_t * key
916916
On success, an identifier for the newly created key.
@@ -951,12 +951,12 @@ An interruptible key generation operation is used as follows:
951951
.. function:: psa_generate_key_iop_abort
952952

953953
.. summary::
954-
Abort an interruptible key generation operation.
954+
Abort an interruptible key-generation operation.
955955

956956
.. versionadded:: 1.x
957957

958958
.. param:: psa_generate_key_iop_t * operation
959-
The interruptible key generation operation to abort.
959+
The interruptible key-generation operation to abort.
960960

961961
.. return:: psa_status_t
962962
.. retval:: PSA_SUCCESS
@@ -979,7 +979,7 @@ An interruptible key generation operation is used as follows:
979979
Interruptible public-key export
980980
-------------------------------
981981

982-
Extracting a public key from an asymmetric key-pair can be computationally expensive.
982+
Extracting a public key from an asymmetric key pair can be computationally expensive.
983983
For example, computing an elliptic curve public key from the private key.
984984

985985
An interruptible public-key export operation can be used instead of calling `psa_export_public_key()`, in applications that have bounded execution requirements for use cases that require public-key export.

doc/crypto/api/ops/key-agreement.rst

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ Three functions are provided for a Diffie-Hellman-style key agreement where each
1717

1818
* Where an application needs direct access to the shared secret, it can call `psa_raw_key_agreement()` instead.
1919

20-
If an application requires bounded execution during a key agreement, it can use an interruptible key agreement operation.
20+
If an application requires bounded execution during a key agreement, it can use an interruptible key-agreement operation.
2121
See :secref:`interruptible-key-agreement`.
2222

23-
Using `psa_key_agreement()`, `psa_key_derivation_key_agreement()`, or an interruptible key agreement operation is recommended, as these do not expose the shared secret to the application.
23+
Using `psa_key_agreement()`, `psa_key_derivation_key_agreement()`, or an interruptible key-agreement operation is recommended, as these do not expose the shared secret to the application.
2424

2525
.. note::
2626

@@ -231,7 +231,7 @@ Standalone key agreement
231231
.. warning::
232232
The shared secret resulting from a key-agreement algorithm such as finite-field Diffie-Hellman or elliptic curve Diffie-Hellman has biases. This makes it unsuitable for use as key material, for example, as an AES key. Instead, it is recommended that a key-derivation algorithm is applied to the result, to derive unbiased cryptographic keys.
233233

234-
If an application requires bounded execution during key agreement, it can use an interruptible key agreement operation.
234+
If an application requires bounded execution during key agreement, it can use an interruptible key-agreement operation.
235235
See :secref:`interruptible-key-agreement`.
236236

237237
.. function:: psa_raw_key_agreement
@@ -363,13 +363,13 @@ Combining key agreement and key derivation
363363
Interruptible key agreement
364364
---------------------------
365365

366-
Most key agreement algorithms are computationally expensive.
366+
Most key-agreement algorithms are computationally expensive.
367367

368-
An interruptible key agreement operation can be used instead of calling `psa_key_agreement()`, in applications that have bounded execution requirements for use cases involving key agreement.
368+
An interruptible key-agreement operation can be used instead of calling `psa_key_agreement()`, in applications that have bounded execution requirements for use cases involving key agreement.
369369

370-
An interruptible key agreement operation is used as follows:
370+
An interruptible key-agreement operation is used as follows:
371371

372-
1. Allocate an interruptible key agreement operation object, of type `psa_key_agreement_iop_t`, which will be passed to all the functions listed here.
372+
1. Allocate an interruptible key-agreement operation object, of type `psa_key_agreement_iop_t`, which will be passed to all the functions listed here.
373373
#. Initialize the operation object with one of the methods described in the documentation for `psa_key_agreement_iop_t`, for example, `PSA_KEY_AGREEMENT_IOP_INIT`.
374374
#. Call `psa_key_agreement_iop_setup()` to specify the algorithm, and provide the private key and the peer public key.
375375
#. Call `psa_key_agreement_iop_complete()` to finish the key agreement and output the shared secret, until this function does not return :code:`PSA_OPERATION_INCOMPLETE`.
@@ -379,11 +379,11 @@ An interruptible key agreement operation is used as follows:
379379
.. typedef:: /* implementation-defined type */ psa_key_agreement_iop_t
380380

381381
.. summary::
382-
The type of the state data structure for an interruptible key agreement operation.
382+
The type of the state data structure for an interruptible key-agreement operation.
383383

384384
.. versionadded:: 1.x
385385

386-
Before calling any function on an interruptible key agreement operation object, the application must initialize it by any of the following means:
386+
Before calling any function on an interruptible key-agreement operation object, the application must initialize it by any of the following means:
387387

388388
* Set the object to all-bits-zero, for example:
389389

@@ -418,14 +418,14 @@ An interruptible key agreement operation is used as follows:
418418
:definition: /* implementation-defined value */
419419
420420
.. summary::
421-
This macro evaluates to an initializer for an interruptible key agreement operation object of type `psa_key_agreement_iop_t`.
421+
This macro evaluates to an initializer for an interruptible key-agreement operation object of type `psa_key_agreement_iop_t`.
422422

423423
.. versionadded:: 1.x
424424

425425
.. function:: psa_key_agreement_iop_init
426426

427427
.. summary::
428-
Return an initial value for an interruptible key agreement operation object.
428+
Return an initial value for an interruptible key-agreement operation object.
429429

430430
.. versionadded:: 1.x
431431

@@ -434,12 +434,12 @@ An interruptible key agreement operation is used as follows:
434434
.. function:: psa_key_agreement_iop_get_num_ops
435435

436436
.. summary::
437-
Get the number of *ops* that an interruptible key agreement operation has taken so far.
437+
Get the number of *ops* that an interruptible key-agreement operation has taken so far.
438438

439439
.. versionadded:: 1.x
440440

441441
.. param:: psa_key_agreement_iop_t * operation
442-
The interruptible key agreement operation to inspect.
442+
The interruptible key-agreement operation to inspect.
443443

444444
.. return:: uint32_t
445445
Number of *ops* that the operation has taken so far.
@@ -459,7 +459,7 @@ An interruptible key agreement operation is used as follows:
459459
.. versionadded:: 1.x
460460

461461
.. param:: psa_key_agreement_iop_t * operation
462-
The interruptible key agreement operation to set up.
462+
The interruptible key-agreement operation to set up.
463463
It must have been initialized as per the documentation for `psa_key_agreement_iop_t`, and be inactive.
464464
.. param:: psa_key_id_t private_key
465465
Identifier of the private key to use.
@@ -472,7 +472,7 @@ An interruptible key agreement operation is used as follows:
472472
.. param:: size_t peer_key_length
473473
Size of ``peer_key`` in bytes.
474474
.. param:: psa_algorithm_t alg
475-
The standalone key agreement algorithm to compute: a value of type `psa_algorithm_t` such that :code:`PSA_ALG_IS_STANDALONE_KEY_AGREEMENT(alg)` is true.
475+
The standalone key-agreement algorithm to compute: a value of type `psa_algorithm_t` such that :code:`PSA_ALG_IS_STANDALONE_KEY_AGREEMENT(alg)` is true.
476476
.. param:: const psa_key_attributes_t * attributes
477477
The attributes for the key to be output on completion.
478478

@@ -518,12 +518,12 @@ An interruptible key agreement operation is used as follows:
518518
.. retval:: PSA_ERROR_INVALID_ARGUMENT
519519
The following conditions can result in this error:
520520

521-
* ``alg`` is not a key agreement algorithm.
521+
* ``alg`` is not a key-agreement algorithm.
522522
* ``private_key`` is not compatible with ``alg``.
523523
* ``peer_key`` is not a valid public key corresponding to ``private_key``.
524524
* The output key attributes in ``attributes`` are not valid :
525525

526-
- The key type is not valid for key agreement output.
526+
- The key type is not valid for key-agreement output.
527527
- The key size is nonzero, and is not the size of the shared secret.
528528
- The key lifetime is invalid.
529529
- The key identifier is not valid for the key lifetime.
@@ -534,7 +534,7 @@ An interruptible key agreement operation is used as follows:
534534
.. retval:: PSA_ERROR_NOT_SUPPORTED
535535
The following conditions can result in this error:
536536

537-
* ``alg`` is not supported or is not a key agreement algorithm.
537+
* ``alg`` is not supported or is not a key-agreement algorithm.
538538
* ``private_key`` is not supported for use with ``alg``.
539539
* The output key attributes, as a whole, are not supported, either by the implementation in general or in the specified storage location.
540540
.. retval:: PSA_ERROR_BAD_STATE
@@ -550,8 +550,8 @@ An interruptible key agreement operation is used as follows:
550550
.. retval:: PSA_ERROR_DATA_INVALID
551551
.. retval:: PSA_ERROR_INSUFFICIENT_STORAGE
552552

553-
This function sets up an interruptible operation to perform a key agreement.
554-
A key agreement algorithm takes two inputs: a private key ``private_key``, and a public key ``peer_key``.
553+
This function sets up an interruptible operation to perform a key-agreement.
554+
A key-agreement algorithm takes two inputs: a private key ``private_key``, and a public key ``peer_key``.
555555

556556
When the interruptible operation completes, the shared secret is output in a key. The key's location, policy, and type are taken from ``attributes``. The size of the key is always the bit-size of the shared secret, rounded up to a whole number of bytes.
557557

@@ -573,7 +573,7 @@ An interruptible key agreement operation is used as follows:
573573
.. versionadded:: 1.x
574574

575575
.. param:: psa_key_agreement_iop_t * operation
576-
The interruptible key agreement operation to use.
576+
The interruptible key-agreement operation to use.
577577
The operation must be active.
578578
.. param:: psa_key_id_t * key
579579
On success, an identifier for the newly created key.
@@ -610,7 +610,7 @@ An interruptible key agreement operation is used as follows:
610610
This key can be input to a key derivation operation using `psa_key_derivation_input_key()`.
611611

612612
.. warning::
613-
The shared secret resulting from a key agreement algorithm such as finite-field Diffie-Hellman or elliptic curve Diffie-Hellman has biases. This makes it unsuitable for use as key material, for example, as an AES key. Instead, it is recommended that a key derivation algorithm is applied to the result, to derive unbiased cryptographic keys.
613+
The shared secret resulting from a key-agreement algorithm such as finite-field Diffie-Hellman or elliptic curve Diffie-Hellman has biases. This makes it unsuitable for use as key material, for example, as an AES key. Instead, it is recommended that a key derivation algorithm is applied to the result, to derive unbiased cryptographic keys.
614614

615615
If this function returns :code:`PSA_OPERATION_INCOMPLETE`, no key is returned, and this function must be called again to continue the operation.
616616
If this function returns an error status, the operation enters an error state and must be aborted by calling `psa_key_agreement_iop_abort()`.
@@ -620,12 +620,12 @@ An interruptible key agreement operation is used as follows:
620620
.. function:: psa_key_agreement_iop_abort
621621

622622
.. summary::
623-
Abort an interruptible key agreement operation.
623+
Abort an interruptible key-agreement operation.
624624

625625
.. versionadded:: 1.x
626626

627627
.. param:: psa_key_agreement_iop_t * operation
628-
The interruptible key agreement operation to abort.
628+
The interruptible key-agreement operation to abort.
629629

630630
.. return:: psa_status_t
631631
.. retval:: PSA_SUCCESS

0 commit comments

Comments
 (0)