Fix typos

Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
diff --git a/docs/proposed/psa-driver-interface.md b/docs/proposed/psa-driver-interface.md
index 0e9877d..9e46eb0 100644
--- a/docs/proposed/psa-driver-interface.md
+++ b/docs/proposed/psa-driver-interface.md
@@ -309,8 +309,8 @@
 * `"key_derivation_input_key"` (opaque drivers only)
 * `"key_derivation_output_bytes"`: called by `psa_key_derivation_output_bytes()`; also by `psa_key_derivation_output_key()` for transparent drivers.
 * `"key_derivation_output_key"`: called by `psa_key_derivation_output_key()` for transparent drivers when deriving an asymmetric key pair, and also for opaque drivers.
-* `"key_derivation_verify_output_bytes"` (opaque drivers only).
-* `"key_derivation_verify_output_key"` (opaque drivers only).
+* `"key_derivation_verify_bytes"` (opaque drivers only).
+* `"key_derivation_verify_key"` (opaque drivers only).
 * `"key_derivation_abort"`: called by all key derivation functions of the PSA Cryptography API.
 
 TODO: key input and output for opaque drivers; deterministic key generation for transparent drivers
diff --git a/include/psa/crypto_values.h b/include/psa/crypto_values.h
index f7d8302..722f5ba 100644
--- a/include/psa/crypto_values.h
+++ b/include/psa/crypto_values.h
@@ -425,7 +425,7 @@
  * This key type is suitable for passwords and passphrases which are typically
  * intended to be memorizable by humans, and have a low entropy relative to
  * their size. It can be used for randomly generated or derived keys with
- * maximum or near-maximum entropy, but PSA_KEY_TYPE_DERIVE is more suitable
+ * maximum or near-maximum entropy, but #PSA_KEY_TYPE_DERIVE is more suitable
  * for such keys. It is not suitable for passwords with extremely low entropy,
  * such as numerical PINs.
  *