@@ -3602,18 +3602,18 @@ changes:
3602
3602
`ERR_INVALID_CALLBACK`.
3603
3603
-->
3604
3604
3605
- * ` type ` : {string} The intended use of the generated secret key. Currently
3605
+ * ` type ` {string} The intended use of the generated secret key. Currently
3606
3606
accepted values are ` 'hmac' ` and ` 'aes' ` .
3607
- * ` options ` : {Object}
3608
- * ` length ` : {number} The bit length of the key to generate. This must be a
3607
+ * ` options ` {Object}
3608
+ * ` length ` {number} The bit length of the key to generate. This must be a
3609
3609
value greater than 0.
3610
3610
* If ` type ` is ` 'hmac' ` , the minimum is 8, and the maximum length is
3611
3611
2<sup >31</sup >-1. If the value is not a multiple of 8, the generated
3612
3612
key will be truncated to ` Math.floor(length / 8) ` .
3613
3613
* If ` type ` is ` 'aes' ` , the length must be one of ` 128 ` , ` 192 ` , or ` 256 ` .
3614
- * ` callback ` : {Function}
3615
- * ` err ` : {Error}
3616
- * ` key ` : {KeyObject}
3614
+ * ` callback ` {Function}
3615
+ * ` err ` {Error}
3616
+ * ` key ` {KeyObject}
3617
3617
3618
3618
Asynchronously generates a new random secret key of the given ` length ` . The
3619
3619
` type ` will determine which validations will be performed on the ` length ` .
@@ -3677,30 +3677,30 @@ changes:
3677
3677
produce key objects if no encoding was specified.
3678
3678
-->
3679
3679
3680
- * ` type ` : {string} Must be ` 'rsa' ` , ` 'rsa-pss' ` , ` 'dsa' ` , ` 'ec' ` , ` 'ed25519' ` ,
3680
+ * ` type ` {string} Must be ` 'rsa' ` , ` 'rsa-pss' ` , ` 'dsa' ` , ` 'ec' ` , ` 'ed25519' ` ,
3681
3681
` 'ed448' ` , ` 'x25519' ` , ` 'x448' ` , or ` 'dh' ` .
3682
- * ` options ` : {Object}
3683
- * ` modulusLength ` : {number} Key size in bits (RSA, DSA).
3684
- * ` publicExponent ` : {number} Public exponent (RSA). ** Default:** ` 0x10001 ` .
3685
- * ` hashAlgorithm ` : {string} Name of the message digest (RSA-PSS).
3686
- * ` mgf1HashAlgorithm ` : {string} Name of the message digest used by
3682
+ * ` options ` {Object}
3683
+ * ` modulusLength ` {number} Key size in bits (RSA, DSA).
3684
+ * ` publicExponent ` {number} Public exponent (RSA). ** Default:** ` 0x10001 ` .
3685
+ * ` hashAlgorithm ` {string} Name of the message digest (RSA-PSS).
3686
+ * ` mgf1HashAlgorithm ` {string} Name of the message digest used by
3687
3687
MGF1 (RSA-PSS).
3688
- * ` saltLength ` : {number} Minimal salt length in bytes (RSA-PSS).
3689
- * ` divisorLength ` : {number} Size of ` q ` in bits (DSA).
3690
- * ` namedCurve ` : {string} Name of the curve to use (EC).
3691
- * ` prime ` : {Buffer} The prime parameter (DH).
3692
- * ` primeLength ` : {number} Prime length in bits (DH).
3693
- * ` generator ` : {number} Custom generator (DH). ** Default:** ` 2 ` .
3694
- * ` groupName ` : {string} Diffie-Hellman group name (DH). See
3688
+ * ` saltLength ` {number} Minimal salt length in bytes (RSA-PSS).
3689
+ * ` divisorLength ` {number} Size of ` q ` in bits (DSA).
3690
+ * ` namedCurve ` {string} Name of the curve to use (EC).
3691
+ * ` prime ` {Buffer} The prime parameter (DH).
3692
+ * ` primeLength ` {number} Prime length in bits (DH).
3693
+ * ` generator ` {number} Custom generator (DH). ** Default:** ` 2 ` .
3694
+ * ` groupName ` {string} Diffie-Hellman group name (DH). See
3695
3695
[ ` crypto.getDiffieHellman() ` ] [ ] .
3696
- * ` paramEncoding ` : {string} Must be ` 'named' ` or ` 'explicit' ` (EC).
3696
+ * ` paramEncoding ` {string} Must be ` 'named' ` or ` 'explicit' ` (EC).
3697
3697
** Default:** ` 'named' ` .
3698
- * ` publicKeyEncoding ` : {Object} See [ ` keyObject.export() ` ] [ ] .
3699
- * ` privateKeyEncoding ` : {Object} See [ ` keyObject.export() ` ] [ ] .
3700
- * ` callback ` : {Function}
3701
- * ` err ` : {Error}
3702
- * ` publicKey ` : {string | Buffer | KeyObject}
3703
- * ` privateKey ` : {string | Buffer | KeyObject}
3698
+ * ` publicKeyEncoding ` {Object} See [ ` keyObject.export() ` ] [ ] .
3699
+ * ` privateKeyEncoding ` {Object} See [ ` keyObject.export() ` ] [ ] .
3700
+ * ` callback ` {Function}
3701
+ * ` err ` {Error}
3702
+ * ` publicKey ` {string | Buffer | KeyObject}
3703
+ * ` privateKey ` {string | Buffer | KeyObject}
3704
3704
3705
3705
Generates a new asymmetric key pair of the given ` type ` . RSA, RSA-PSS, DSA, EC,
3706
3706
Ed25519, Ed448, X25519, X448, and DH are currently supported.
@@ -3791,29 +3791,29 @@ changes:
3791
3791
produce key objects if no encoding was specified.
3792
3792
-->
3793
3793
3794
- * ` type ` : {string} Must be ` 'rsa' ` , ` 'rsa-pss' ` , ` 'dsa' ` , ` 'ec' ` , ` 'ed25519' ` ,
3794
+ * ` type ` {string} Must be ` 'rsa' ` , ` 'rsa-pss' ` , ` 'dsa' ` , ` 'ec' ` , ` 'ed25519' ` ,
3795
3795
` 'ed448' ` , ` 'x25519' ` , ` 'x448' ` , or ` 'dh' ` .
3796
- * ` options ` : {Object}
3797
- * ` modulusLength ` : {number} Key size in bits (RSA, DSA).
3798
- * ` publicExponent ` : {number} Public exponent (RSA). ** Default:** ` 0x10001 ` .
3799
- * ` hashAlgorithm ` : {string} Name of the message digest (RSA-PSS).
3800
- * ` mgf1HashAlgorithm ` : {string} Name of the message digest used by
3796
+ * ` options ` {Object}
3797
+ * ` modulusLength ` {number} Key size in bits (RSA, DSA).
3798
+ * ` publicExponent ` {number} Public exponent (RSA). ** Default:** ` 0x10001 ` .
3799
+ * ` hashAlgorithm ` {string} Name of the message digest (RSA-PSS).
3800
+ * ` mgf1HashAlgorithm ` {string} Name of the message digest used by
3801
3801
MGF1 (RSA-PSS).
3802
- * ` saltLength ` : {number} Minimal salt length in bytes (RSA-PSS).
3803
- * ` divisorLength ` : {number} Size of ` q ` in bits (DSA).
3804
- * ` namedCurve ` : {string} Name of the curve to use (EC).
3805
- * ` prime ` : {Buffer} The prime parameter (DH).
3806
- * ` primeLength ` : {number} Prime length in bits (DH).
3807
- * ` generator ` : {number} Custom generator (DH). ** Default:** ` 2 ` .
3808
- * ` groupName ` : {string} Diffie-Hellman group name (DH). See
3802
+ * ` saltLength ` {number} Minimal salt length in bytes (RSA-PSS).
3803
+ * ` divisorLength ` {number} Size of ` q ` in bits (DSA).
3804
+ * ` namedCurve ` {string} Name of the curve to use (EC).
3805
+ * ` prime ` {Buffer} The prime parameter (DH).
3806
+ * ` primeLength ` {number} Prime length in bits (DH).
3807
+ * ` generator ` {number} Custom generator (DH). ** Default:** ` 2 ` .
3808
+ * ` groupName ` {string} Diffie-Hellman group name (DH). See
3809
3809
[ ` crypto.getDiffieHellman() ` ] [ ] .
3810
- * ` paramEncoding ` : {string} Must be ` 'named' ` or ` 'explicit' ` (EC).
3810
+ * ` paramEncoding ` {string} Must be ` 'named' ` or ` 'explicit' ` (EC).
3811
3811
** Default:** ` 'named' ` .
3812
- * ` publicKeyEncoding ` : {Object} See [ ` keyObject.export() ` ] [ ] .
3813
- * ` privateKeyEncoding ` : {Object} See [ ` keyObject.export() ` ] [ ] .
3812
+ * ` publicKeyEncoding ` {Object} See [ ` keyObject.export() ` ] [ ] .
3813
+ * ` privateKeyEncoding ` {Object} See [ ` keyObject.export() ` ] [ ] .
3814
3814
* Returns: {Object}
3815
- * ` publicKey ` : {string | Buffer | KeyObject}
3816
- * ` privateKey ` : {string | Buffer | KeyObject}
3815
+ * ` publicKey ` {string | Buffer | KeyObject}
3816
+ * ` privateKey ` {string | Buffer | KeyObject}
3817
3817
3818
3818
Generates a new asymmetric key pair of the given ` type ` . RSA, RSA-PSS, DSA, EC,
3819
3819
Ed25519, Ed448, X25519, X448, and DH are currently supported.
@@ -3882,10 +3882,10 @@ it will be a buffer containing the data encoded as DER.
3882
3882
added: v15.0.0
3883
3883
-->
3884
3884
3885
- * ` type ` : {string} The intended use of the generated secret key. Currently
3885
+ * ` type ` {string} The intended use of the generated secret key. Currently
3886
3886
accepted values are ` 'hmac' ` and ` 'aes' ` .
3887
- * ` options ` : {Object}
3888
- * ` length ` : {number} The bit length of the key to generate.
3887
+ * ` options ` {Object}
3888
+ * ` length ` {number} The bit length of the key to generate.
3889
3889
* If ` type ` is ` 'hmac' ` , the minimum is 8, and the maximum length is
3890
3890
2<sup >31</sup >-1. If the value is not a multiple of 8, the generated
3891
3891
key will be truncated to ` Math.floor(length / 8) ` .
@@ -4026,10 +4026,10 @@ the process unresponsive.
4026
4026
added: v15.0.0
4027
4027
-->
4028
4028
4029
- * ` nameOrNid ` : {string|number} The name or nid of the cipher to query.
4030
- * ` options ` : {Object}
4031
- * ` keyLength ` : {number} A test key length.
4032
- * ` ivLength ` : {number} A test IV length.
4029
+ * ` nameOrNid ` {string|number} The name or nid of the cipher to query.
4030
+ * ` options ` {Object}
4031
+ * ` keyLength ` {number} A test key length.
4032
+ * ` ivLength ` {number} A test IV length.
4033
4033
* Returns: {Object}
4034
4034
* ` name ` {string} The name of the cipher
4035
4035
* ` nid ` {number} The nid of the cipher
0 commit comments