pk: fix documentation for mbedtls_pk_setup_opaque()

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
diff --git a/include/mbedtls/pk.h b/include/mbedtls/pk.h
index 4113895..60942d7e 100644
--- a/include/mbedtls/pk.h
+++ b/include/mbedtls/pk.h
@@ -373,9 +373,9 @@
  *                  Under the hood PSA functions are used to perform the required
  *                  operations and, based on the key type, used algorithms will be:
  *                  * EC:
- *                      * verify: #PSA_ALG_ECDSA_ANY;
- *                      * sign: try #PSA_ALG_DETERMINISTIC_ECDSA() first and, in
- *                        case it fails, try with #PSA_ALG_ECDSA().
+ *                      * verify, verify_ext: #PSA_ALG_ECDSA_ANY;
+ *                      * sign, sign_ext: try #PSA_ALG_DETERMINISTIC_ECDSA()
+ *                        first and, in case it fails, try with #PSA_ALG_ECDSA().
  *                  * RSA:
  *                      * sign: #PSA_ALG_RSA_PKCS1V15_SIGN();
  *                      * sign_ext: use the algorithm associated with the wrapped
@@ -384,9 +384,8 @@
  *                      * verify_ext: not supported;
  *                      * decrypt: #PSA_ALG_RSA_PKCS1V15_CRYPT;
  *                      * encrypt: not supported.
- *                  In order to have above mentioned operations to succeed it is
- *                  mandatory that the wrapped PSA key allows the specified
- *                  algorithm in its policy.
+ *                  In order for the above operations to succeed, the policy of
+ *                  the wrapped PSA key must allow the specified algorithm.
  *
  * \param ctx       The context to initialize. It must be empty (type NONE).
  * \param key       The PSA key to wrap, which must hold an ECC or RSA key