@@ -40,8 +40,8 @@ When invoking the function,
.I key
indicates the key that will provide the cryptographic material and
.I info
-points to a comma-separated string of "key[=value]" parameters that indicate
-things like encoding forms and passwords to unlock the key; see
+points to a space- or tab-separated string of "key[=value]" parameters that
+indicate things like encoding forms and passwords to unlock the key; see
asymmetric-key(7) for more information.
.PP
.IR data " and " datalen
@@ -32,7 +32,7 @@ When invoking the function,
.I key
indicates the key to be queried,
.I info
-points to a comma-separated string of "key[=value]" parameters and
+points to a space- or tab-separated string of "key[=value]" parameters and
.I result
points to a buffer in which the result will be placed.
.PP
@@ -44,8 +44,8 @@ When invoking the function,
.I key
indicates the key that will provide the cryptographic material and
.I info
-points to a comma-separated string of "key[=value]" parameters that indicate
-things like encoding forms and passwords to unlock the key; see
+points to a space- or tab-separated string of "key[=value]" parameters that
+indicate things like encoding forms and passwords to unlock the key; see
asymmetric-key(7) for more information.
.PP
.IR data " and " datalen