Skip to content

Commit 055fa53

Browse files
committed
cryptography angle bracket and para cleanup
1 parent 6ae313d commit 055fa53

File tree

12 files changed

+115
-115
lines changed

12 files changed

+115
-115
lines changed

xml/System.Security.Cryptography/AsymmetricAlgorithm.xml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -706,9 +706,9 @@ This method is obsolete in .NET 5 and later versions.
706706
<summary>Exports the current key in the PKCS#8 EncryptedPrivateKeyInfo format with a byte-based password, PEM encoded.</summary>
707707
<returns>A string containing the PEM-encoded PKCS#8 EncryptedPrivateKeyInfo.</returns>
708708
<remarks>
709-
<para> A PEM-encoded PKCS#8 EncryptedPrivateKeyInfo will begin with <c>-----BEGIN ENCRYPTED PRIVATE KEY-----</c> and end with <c>-----END ENCRYPTED PRIVATE KEY-----</c>, with the base64 encoded DER contents of the key between the PEM boundaries.
709+
<para>A PEM-encoded PKCS#8 EncryptedPrivateKeyInfo will begin with <c>-----BEGIN ENCRYPTED PRIVATE KEY-----</c> and end with <c>-----END ENCRYPTED PRIVATE KEY-----</c>, with the base64 encoded DER contents of the key between the PEM boundaries.
710710
</para>
711-
<para> The PEM is encoded according to the IETF RFC 7468 "strict" encoding rules.
711+
<para>The PEM is encoded according to the IETF RFC 7468 "strict" encoding rules.
712712
</para>
713713
</remarks>
714714
<exception cref="T:System.NotImplementedException">An implementation for <see cref="M:System.Security.Cryptography.AsymmetricAlgorithm.ExportEncryptedPkcs8PrivateKey(System.ReadOnlySpan{System.Byte},System.Security.Cryptography.PbeParameters)" /> or
@@ -2168,9 +2168,9 @@ This member is an explicit interface member implementation. It can be used only
21682168
<returns>
21692169
<see langword="true" /> if <paramref name="destination" /> is big enough to receive the output; otherwise, <see langword="false" />.</returns>
21702170
<remarks>
2171-
<para> A PEM-encoded PKCS#8 EncryptedPrivateKeyInfo will begin with <c>-----BEGIN ENCRYPTED PRIVATE KEY-----</c> and end with <c>-----END ENCRYPTED PRIVATE KEY-----</c>, with the base64 encoded DER contents of the key between the PEM boundaries.
2171+
<para>A PEM-encoded PKCS#8 EncryptedPrivateKeyInfo will begin with <c>-----BEGIN ENCRYPTED PRIVATE KEY-----</c> and end with <c>-----END ENCRYPTED PRIVATE KEY-----</c>, with the base64 encoded DER contents of the key between the PEM boundaries.
21722172
</para>
2173-
<para> The PEM is encoded according to the IETF RFC 7468 "strict" encoding rules.
2173+
<para>The PEM is encoded according to the IETF RFC 7468 "strict" encoding rules.
21742174
</para>
21752175
</remarks>
21762176
<exception cref="T:System.NotImplementedException">An implementation for <see cref="M:System.Security.Cryptography.AsymmetricAlgorithm.TryExportEncryptedPkcs8PrivateKey(System.ReadOnlySpan{System.Byte},System.Security.Cryptography.PbeParameters,System.Span{System.Byte},System.Int32@)" />

xml/System.Security.Cryptography/CompositeMLDsa.xml

Lines changed: 22 additions & 22 deletions
Large diffs are not rendered by default.

xml/System.Security.Cryptography/CompositeMLDsaCng.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
</Attributes>
2626
<Docs>
2727
<summary>Provides a Cryptography Next Generation (CNG) implementation of Composite ML-DSA.</summary>
28-
<remarks>&lt;para&gt;&lt;para&gt; Developers are encouraged to program against the &lt;see cref="T:System.Security.Cryptography.CompositeMLDsa" /&gt; base class, rather than any specific derived class.&lt;/para&gt;&lt;para&gt;The derived classes are intended for interop with the underlying system cryptographic libraries.&lt;/para&gt;&lt;para&gt;&lt;/para&gt;</remarks>
28+
<remarks><para>Developers are encouraged to program against the <see cref="T:System.Security.Cryptography.CompositeMLDsa" /> base class, rather than any specific derived class.</para><para>The derived classes are intended for interop with the underlying system cryptographic libraries.</para></remarks>
2929
</Docs>
3030
<Members>
3131
<Member MemberName=".ctor">

xml/System.Security.Cryptography/HMACSHA3_256.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@
4646
<para>
4747
<see cref="T:System.Security.Cryptography.HMACSHA3_256" /> is a type of keyed hash algorithm that is constructed from the SHA-3-256 hash function and used as a Hash-based Message Authentication Code (HMAC). The HMAC process mixes a secret key with the message data, hashes the result with the hash function, mixes that hash value with the secret key again, and then applies the hash function a second time. The output hash is 256 bits in length.
4848
</para>
49-
<para> This constructor uses a 136-byte, randomly generated key.
49+
<para>This constructor uses a 136-byte, randomly generated key.
5050
</para>
5151
</remarks>
5252
</Docs>

xml/System.Security.Cryptography/HMACSHA3_384.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@
4646
<para>
4747
<see cref="T:System.Security.Cryptography.HMACSHA3_384" /> is a type of keyed hash algorithm that is constructed from the SHA-3-384 hash function and used as a Hash-based Message Authentication Code (HMAC). The HMAC process mixes a secret key with the message data, hashes the result with the hash function, mixes that hash value with the secret key again, and then applies the hash function a second time. The output hash is 384 bits in length.
4848
</para>
49-
<para> This constructor uses a 104-byte, randomly generated key.
49+
<para>This constructor uses a 104-byte, randomly generated key.
5050
</para>
5151
</remarks>
5252
</Docs>

xml/System.Security.Cryptography/HMACSHA3_512.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@
4646
<para>
4747
<see cref="T:System.Security.Cryptography.HMACSHA3_512" /> is a type of keyed hash algorithm that is constructed from the SHA-3-512 hash function and used as a Hash-based Message Authentication Code (HMAC). The HMAC process mixes a secret key with the message data, hashes the result with the hash function, mixes that hash value with the secret key again, and then applies the hash function a second time. The output hash is 512 bits in length.
4848
</para>
49-
<para> This constructor uses a 72-byte, randomly generated key.
49+
<para>This constructor uses a 72-byte, randomly generated key.
5050
</para>
5151
</remarks>
5252
</Docs>

0 commit comments

Comments
 (0)