@@ -44,7 +44,7 @@ added: v0.11.8
44
44
SPKAC is a Certificate Signing Request mechanism originally implemented by
45
45
Netscape and was specified formally as part of [ HTML5's ` keygen ` element] [ ] .
46
46
47
- Note that ` <keygen> ` is deprecated since [ HTML 5.2] [ ] and new projects
47
+ ` <keygen> ` is deprecated since [ HTML 5.2] [ ] and new projects
48
48
should not use this element anymore.
49
49
50
50
The ` crypto ` module provides the ` Certificate ` class for working with SPKAC
@@ -887,7 +887,7 @@ Sets the EC Diffie-Hellman public key.
887
887
If ` encoding ` is provided ` publicKey ` is expected to
888
888
be a string; otherwise a [ ` Buffer ` ] [ ] , ` TypedArray ` , or ` DataView ` is expected.
889
889
890
- Note that there is not normally a reason to call this method because ` ECDH `
890
+ There is not normally a reason to call this method because ` ECDH `
891
891
only requires a private key and the other party's public key to compute the
892
892
shared secret. Typically either [ ` ecdh.generateKeys() ` ] [ ] or
893
893
[ ` ecdh.setPrivateKey() ` ] [ ] will be called. The [ ` ecdh.setPrivateKey() ` ] [ ] method
@@ -1311,7 +1311,7 @@ object, the following additional properties can be passed:
1311
1311
* ` crypto.constants.RSA_PKCS1_PADDING ` (default)
1312
1312
* ` crypto.constants.RSA_PKCS1_PSS_PADDING `
1313
1313
1314
- Note that ` RSA_PKCS1_PSS_PADDING ` will use MGF1 with the same hash function
1314
+ ` RSA_PKCS1_PSS_PADDING ` will use MGF1 with the same hash function
1315
1315
used to sign the message as specified in section 3.1 of [ RFC 4055] [ ] , unless
1316
1316
an MGF1 hash function has been specified as part of the key in compliance with
1317
1317
section 3.3 of [ RFC 4055] [ ] .
@@ -1415,7 +1415,7 @@ object, the following additional properties can be passed:
1415
1415
* ` crypto.constants.RSA_PKCS1_PADDING ` (default)
1416
1416
* ` crypto.constants.RSA_PKCS1_PSS_PADDING `
1417
1417
1418
- Note that ` RSA_PKCS1_PSS_PADDING ` will use MGF1 with the same hash function
1418
+ ` RSA_PKCS1_PSS_PADDING ` will use MGF1 with the same hash function
1419
1419
used to verify the message as specified in section 3.1 of [ RFC 4055] [ ] , unless
1420
1420
an MGF1 hash function has been specified as part of the key in compliance with
1421
1421
section 3.3 of [ RFC 4055] [ ] .
@@ -2200,8 +2200,8 @@ crypto.pbkdf2('secret', 'salt', 100000, 512, 'sha512', (err, derivedKey) => {
2200
2200
An array of supported digest functions can be retrieved using
2201
2201
[ ` crypto.getHashes() ` ] [ ] .
2202
2202
2203
- Note that this API uses libuv's threadpool, which can have surprising and
2204
- negative performance implications for some applications, see the
2203
+ This API uses libuv's threadpool, which can have surprising and
2204
+ negative performance implications for some applications; see the
2205
2205
[ ` UV_THREADPOOL_SIZE ` ] [ ] documentation for more information.
2206
2206
2207
2207
### crypto.pbkdf2Sync(password, salt, iterations, keylen, digest)
@@ -2417,8 +2417,8 @@ This should normally never take longer than a few milliseconds. The only time
2417
2417
when generating the random bytes may conceivably block for a longer period of
2418
2418
time is right after boot, when the whole system is still low on entropy.
2419
2419
2420
- Note that this API uses libuv's threadpool, which can have surprising and
2421
- negative performance implications for some applications, see the
2420
+ This API uses libuv's threadpool, which can have surprising and
2421
+ negative performance implications for some applications; see the
2422
2422
[ ` UV_THREADPOOL_SIZE ` ] [ ] documentation for more information.
2423
2423
2424
2424
The asynchronous version of ` crypto.randomBytes() ` is carried out in a single
@@ -2538,8 +2538,8 @@ crypto.randomFill(c, (err, buf) => {
2538
2538
});
2539
2539
```
2540
2540
2541
- Note that this API uses libuv's threadpool, which can have surprising and
2542
- negative performance implications for some applications, see the
2541
+ This API uses libuv's threadpool, which can have surprising and
2542
+ negative performance implications for some applications; see the
2543
2543
[ ` UV_THREADPOOL_SIZE ` ] [ ] documentation for more information.
2544
2544
2545
2545
The asynchronous version of ` crypto.randomFill() ` is carried out in a single
@@ -2711,7 +2711,7 @@ additional properties can be passed:
2711
2711
* ` crypto.constants.RSA_PKCS1_PADDING ` (default)
2712
2712
* ` crypto.constants.RSA_PKCS1_PSS_PADDING `
2713
2713
2714
- Note that ` RSA_PKCS1_PSS_PADDING ` will use MGF1 with the same hash function
2714
+ ` RSA_PKCS1_PSS_PADDING ` will use MGF1 with the same hash function
2715
2715
used to sign the message as specified in section 3.1 of [ RFC 4055] [ ] .
2716
2716
* ` saltLength ` : {integer} - salt length for when padding is
2717
2717
` RSA_PKCS1_PSS_PADDING ` . The special value
@@ -2762,7 +2762,7 @@ additional properties can be passed:
2762
2762
* ` crypto.constants.RSA_PKCS1_PADDING ` (default)
2763
2763
* ` crypto.constants.RSA_PKCS1_PSS_PADDING `
2764
2764
2765
- Note that ` RSA_PKCS1_PSS_PADDING ` will use MGF1 with the same hash function
2765
+ ` RSA_PKCS1_PSS_PADDING ` will use MGF1 with the same hash function
2766
2766
used to sign the message as specified in section 3.1 of [ RFC 4055] [ ] .
2767
2767
* ` saltLength ` : {integer} - salt length for when padding is
2768
2768
` RSA_PKCS1_PSS_PADDING ` . The special value
0 commit comments