You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: xml/System.Security.Cryptography/AsymmetricAlgorithm.xml
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -706,9 +706,9 @@ This method is obsolete in .NET 5 and later versions.
706
706
<summary>Exports the current key in the PKCS#8 EncryptedPrivateKeyInfo format with a byte-based password, PEM encoded.</summary>
707
707
<returns>A string containing the PEM-encoded PKCS#8 EncryptedPrivateKeyInfo.</returns>
708
708
<remarks>
709
-
<para>A PEM-encoded PKCS#8 EncryptedPrivateKeyInfo will begin with <c>-----BEGIN ENCRYPTED PRIVATE KEY-----</c> and end with <c>-----END ENCRYPTED PRIVATE KEY-----</c>, with the base64 encoded DER contents of the key between the PEM boundaries.
709
+
<para>A PEM-encoded PKCS#8 EncryptedPrivateKeyInfo will begin with <c>-----BEGIN ENCRYPTED PRIVATE KEY-----</c> and end with <c>-----END ENCRYPTED PRIVATE KEY-----</c>, with the base64 encoded DER contents of the key between the PEM boundaries.
710
710
</para>
711
-
<para>The PEM is encoded according to the IETF RFC 7468 "strict" encoding rules.
711
+
<para>The PEM is encoded according to the IETF RFC 7468 "strict" encoding rules.
712
712
</para>
713
713
</remarks>
714
714
<exceptioncref="T:System.NotImplementedException">An implementation for <seecref="M:System.Security.Cryptography.AsymmetricAlgorithm.ExportEncryptedPkcs8PrivateKey(System.ReadOnlySpan{System.Byte},System.Security.Cryptography.PbeParameters)" /> or
@@ -2168,9 +2168,9 @@ This member is an explicit interface member implementation. It can be used only
2168
2168
<returns>
2169
2169
<seelangword="true" /> if <paramrefname="destination" /> is big enough to receive the output; otherwise, <seelangword="false" />.</returns>
2170
2170
<remarks>
2171
-
<para>A PEM-encoded PKCS#8 EncryptedPrivateKeyInfo will begin with <c>-----BEGIN ENCRYPTED PRIVATE KEY-----</c> and end with <c>-----END ENCRYPTED PRIVATE KEY-----</c>, with the base64 encoded DER contents of the key between the PEM boundaries.
2171
+
<para>A PEM-encoded PKCS#8 EncryptedPrivateKeyInfo will begin with <c>-----BEGIN ENCRYPTED PRIVATE KEY-----</c> and end with <c>-----END ENCRYPTED PRIVATE KEY-----</c>, with the base64 encoded DER contents of the key between the PEM boundaries.
2172
2172
</para>
2173
-
<para>The PEM is encoded according to the IETF RFC 7468 "strict" encoding rules.
2173
+
<para>The PEM is encoded according to the IETF RFC 7468 "strict" encoding rules.
2174
2174
</para>
2175
2175
</remarks>
2176
2176
<exceptioncref="T:System.NotImplementedException">An implementation for <seecref="M:System.Security.Cryptography.AsymmetricAlgorithm.TryExportEncryptedPkcs8PrivateKey(System.ReadOnlySpan{System.Byte},System.Security.Cryptography.PbeParameters,System.Span{System.Byte},System.Int32@)" />
Copy file name to clipboardExpand all lines: xml/System.Security.Cryptography/CompositeMLDsaCng.xml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@
25
25
</Attributes>
26
26
<Docs>
27
27
<summary>Provides a Cryptography Next Generation (CNG) implementation of Composite ML-DSA.</summary>
28
-
<remarks><para><para>Developers are encouraged to program against the <see cref="T:System.Security.Cryptography.CompositeMLDsa" /> base class, rather than any specific derived class.</para><para>The derived classes are intended for interop with the underlying system cryptographic libraries.</para><para></para></remarks>
28
+
<remarks><para>Developers are encouraged to program against the <seecref="T:System.Security.Cryptography.CompositeMLDsa" /> base class, rather than any specific derived class.</para><para>The derived classes are intended for interop with the underlying system cryptographic libraries.</para></remarks>
Copy file name to clipboardExpand all lines: xml/System.Security.Cryptography/HMACSHA3_256.xml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@
46
46
<para>
47
47
<seecref="T:System.Security.Cryptography.HMACSHA3_256" /> is a type of keyed hash algorithm that is constructed from the SHA-3-256 hash function and used as a Hash-based Message Authentication Code (HMAC). The HMAC process mixes a secret key with the message data, hashes the result with the hash function, mixes that hash value with the secret key again, and then applies the hash function a second time. The output hash is 256 bits in length.
48
48
</para>
49
-
<para>This constructor uses a 136-byte, randomly generated key.
49
+
<para>This constructor uses a 136-byte, randomly generated key.
Copy file name to clipboardExpand all lines: xml/System.Security.Cryptography/HMACSHA3_384.xml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@
46
46
<para>
47
47
<seecref="T:System.Security.Cryptography.HMACSHA3_384" /> is a type of keyed hash algorithm that is constructed from the SHA-3-384 hash function and used as a Hash-based Message Authentication Code (HMAC). The HMAC process mixes a secret key with the message data, hashes the result with the hash function, mixes that hash value with the secret key again, and then applies the hash function a second time. The output hash is 384 bits in length.
48
48
</para>
49
-
<para>This constructor uses a 104-byte, randomly generated key.
49
+
<para>This constructor uses a 104-byte, randomly generated key.
Copy file name to clipboardExpand all lines: xml/System.Security.Cryptography/HMACSHA3_512.xml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@
46
46
<para>
47
47
<seecref="T:System.Security.Cryptography.HMACSHA3_512" /> is a type of keyed hash algorithm that is constructed from the SHA-3-512 hash function and used as a Hash-based Message Authentication Code (HMAC). The HMAC process mixes a secret key with the message data, hashes the result with the hash function, mixes that hash value with the secret key again, and then applies the hash function a second time. The output hash is 512 bits in length.
48
48
</para>
49
-
<para>This constructor uses a 72-byte, randomly generated key.
49
+
<para>This constructor uses a 72-byte, randomly generated key.
0 commit comments