Skip to content

Commit 04dc773

Browse files
authored
remove extra summary text (dotnet#7123)
1 parent ca99212 commit 04dc773

File tree

3 files changed

+6
-24
lines changed

3 files changed

+6
-24
lines changed

xml/System.Security.Cryptography/DSASignatureFormat.xml

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,7 @@
4545
</ReturnValue>
4646
<MemberValue>0</MemberValue>
4747
<Docs>
48-
<summary>
49-
<para>The signature format from IEEE P1363, which produces a fixed size signature for a given key.</para>
50-
<para>This signature format encodes the <c>(r, s)</c> tuple as the concatenation of the big-endian representation of <c>r</c> and the big-endian representation of <c>s</c>. Each of these values is encoded using the number of bytes required to encode the maximum integer value in the key's mathematical field. For example, an ECDSA signature from the curve <c>secp521r1</c> (a 521-bit field) encodes each of <c>r</c> and <c>s</c> as 66 bytes, and produces a signature output of 132 bytes.</para>
51-
</summary>
48+
<summary>The signature format from IEEE P1363, which produces a fixed-size signature for a given key.</summary>
5249
<remarks>
5350
<format type="text/markdown"><![CDATA[
5451
@@ -83,10 +80,7 @@ This signature format encodes the `(r, s)` tuple as the concatenation of the
8380
</ReturnValue>
8481
<MemberValue>1</MemberValue>
8582
<Docs>
86-
<summary>
87-
<para>The signature format from IETF RFC 3279, which produces a variably-sized signature.</para>
88-
<para>This signature format encodes the <c>(r, s)</c> tuple as the DER encoding of <c>SEQUENCE(INTEGER(r), INTEGER(s))</c>. Because the length of a DER INTEGER encoding varies according to the value being encoded, this signature format does not produce a consistent signature length. Signatures in this format always start with <c>0x30</c>, and on average are 7 bytes longer than signatures in the <see cref="F:System.Security.Cryptography.DSASignatureFormat.IeeeP1363FixedFieldConcatenation" /> format.</para>
89-
</summary>
83+
<summary>The signature format from IETF RFC 3279, which produces a variably-sized signature.</summary>
9084
<remarks>
9185
<format type="text/markdown"><![CDATA[
9286

xml/System.Security.Cryptography/RSAEncryptionPaddingMode.xml

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -81,10 +81,7 @@ The `Oaep` mode corresponds to the RSAES-OEAP encryption scheme described in the
8181
</ReturnValue>
8282
<MemberValue>1</MemberValue>
8383
<Docs>
84-
<summary>
85-
<para>Optimal Asymmetric Encryption Padding. It is recommended for new applications.</para>
86-
<para>This mode corresponds to the RSAES-OEAP encryption scheme described in the PKCS #1 RSA Encryption Standard. It is recommended for new applications.</para>
87-
</summary>
84+
<summary>Optimal Asymmetric Encryption Padding. It is recommended for new applications.</summary>
8885
<remarks>
8986
<format type="text/markdown"><![CDATA[
9087
@@ -131,10 +128,7 @@ This mode corresponds to the RSAES-OEAP encryption scheme described in the PKCS
131128
</ReturnValue>
132129
<MemberValue>0</MemberValue>
133130
<Docs>
134-
<summary>
135-
<para>PKCS #1 v1.5. It is supported for compatibility with existing applications.</para>
136-
<para>This mode corresponds to the RSAES-PKCS1-v1_5 encryption scheme described in the PKCS #1 RSA Encryption Standard. It is supported for compatibility with existing applications.</para>
137-
</summary>
131+
<summary>PKCS #1 v1.5. It is supported for compatibility with existing applications.</summary>
138132
<remarks>
139133
<format type="text/markdown"><![CDATA[
140134

xml/System.Security.Cryptography/RSASignaturePaddingMode.xml

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,7 @@
8383
</ReturnValue>
8484
<MemberValue>0</MemberValue>
8585
<Docs>
86-
<summary>
87-
<para>PKCS #1 v1.5.</para>
88-
<para>This corresponds to the RSASSA-PKCS1-v1.5 signature scheme of the PKCS #1 RSA Encryption Standard. It is supported for compatibility with existing applications.</para>
89-
</summary>
86+
<summary>PKCS #1 v1.5.</summary>
9087
<remarks>
9188
<format type="text/markdown"><![CDATA[
9289
@@ -133,10 +130,7 @@ This corresponds to the RSASSA-PKCS1-v1.5 signature scheme of the PKCS #1 RSA En
133130
</ReturnValue>
134131
<MemberValue>1</MemberValue>
135132
<Docs>
136-
<summary>
137-
<para>Probabilistic Signature Scheme.</para>
138-
<para>This corresponds to the Probabilistic Signature Scheme (RSASSA-PSS) of the PKCS #1 RSA Encryption Standard. It is recommended for new applications.</para>
139-
</summary>
133+
<summary>Probabilistic Signature Scheme.</summary>
140134
<remarks>
141135
<format type="text/markdown"><![CDATA[
142136

0 commit comments

Comments
 (0)