Type fixes and wording improvements
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
diff --git a/docs/driver-only-builds.md b/docs/driver-only-builds.md
index a20b24a..3b61329 100644
--- a/docs/driver-only-builds.md
+++ b/docs/driver-only-builds.md
@@ -3,7 +3,7 @@
built-in implementation of those algorithms), from a user's perspective.
This is useful to save code size for people who are using either a hardware
-accelerator, or an alternative software implementation that's more
+accelerator, or an alternative software implementation that is more
aggressively optimized for code size than the default one in Mbed TLS.
General considerations
@@ -71,7 +71,7 @@
Hashes
------
-If is possible to have all hash operations provided only by a driver.
+It is possible to have all hash operations provided only by a driver.
More precisely:
- you can enable `PSA_WANT_ALG_SHA_256` without `MBEDTLS_SHA256_C`, provided
@@ -85,8 +85,8 @@
to low-level hash APIs (`mbedtls_sha256()` etc.) are not possible for the
modules that are disabled.
-You'll need to call `psa_crypto_init()` before any crypto operation that uses
-a hash algorithm that's provided only by a driver, as mentioned in [General
+You need to call `psa_crypto_init()` before any crypto operation that uses
+a hash algorithm that is provided only by a driver, as mentioned in [General
considerations](#general-considerations) above.
If you want to check at compile-time whether a certain hash algorithm is
@@ -94,7 +94,7 @@
provided by a driver or built-in, you should use the following macros:
- for code that uses only the PSA Crypto API: `PSA_WANT_ALG_xxx` from
`psa/crypto.h`;
-- for code that may also use non-PSA crypto APIs: `MBEDTLS_MD_CAN_xxx` from
+- for code that uses non-PSA crypto APIs: `MBEDTLS_MD_CAN_xxx` from
`mbedtls/md.h`.
Elliptic-curve cryptography (ECC)