@@ -3586,18 +3586,18 @@ changes:
3586
3586
`ERR_INVALID_CALLBACK`.
3587
3587
-->
3588
3588
3589
- * ` type ` : {string} The intended use of the generated secret key. Currently
3589
+ * ` type ` {string} The intended use of the generated secret key. Currently
3590
3590
accepted values are ` 'hmac' ` and ` 'aes' ` .
3591
- * ` options ` : {Object}
3592
- * ` length ` : {number} The bit length of the key to generate. This must be a
3591
+ * ` options ` {Object}
3592
+ * ` length ` {number} The bit length of the key to generate. This must be a
3593
3593
value greater than 0.
3594
3594
* If ` type ` is ` 'hmac' ` , the minimum is 8, and the maximum length is
3595
3595
2<sup >31</sup >-1. If the value is not a multiple of 8, the generated
3596
3596
key will be truncated to ` Math.floor(length / 8) ` .
3597
3597
* If ` type ` is ` 'aes' ` , the length must be one of ` 128 ` , ` 192 ` , or ` 256 ` .
3598
- * ` callback ` : {Function}
3599
- * ` err ` : {Error}
3600
- * ` key ` : {KeyObject}
3598
+ * ` callback ` {Function}
3599
+ * ` err ` {Error}
3600
+ * ` key ` {KeyObject}
3601
3601
3602
3602
Asynchronously generates a new random secret key of the given ` length ` . The
3603
3603
` type ` will determine which validations will be performed on the ` length ` .
@@ -3661,30 +3661,30 @@ changes:
3661
3661
produce key objects if no encoding was specified.
3662
3662
-->
3663
3663
3664
- * ` type ` : {string} Must be ` 'rsa' ` , ` 'rsa-pss' ` , ` 'dsa' ` , ` 'ec' ` , ` 'ed25519' ` ,
3664
+ * ` type ` {string} Must be ` 'rsa' ` , ` 'rsa-pss' ` , ` 'dsa' ` , ` 'ec' ` , ` 'ed25519' ` ,
3665
3665
` 'ed448' ` , ` 'x25519' ` , ` 'x448' ` , or ` 'dh' ` .
3666
- * ` options ` : {Object}
3667
- * ` modulusLength ` : {number} Key size in bits (RSA, DSA).
3668
- * ` publicExponent ` : {number} Public exponent (RSA). ** Default:** ` 0x10001 ` .
3669
- * ` hashAlgorithm ` : {string} Name of the message digest (RSA-PSS).
3670
- * ` mgf1HashAlgorithm ` : {string} Name of the message digest used by
3666
+ * ` options ` {Object}
3667
+ * ` modulusLength ` {number} Key size in bits (RSA, DSA).
3668
+ * ` publicExponent ` {number} Public exponent (RSA). ** Default:** ` 0x10001 ` .
3669
+ * ` hashAlgorithm ` {string} Name of the message digest (RSA-PSS).
3670
+ * ` mgf1HashAlgorithm ` {string} Name of the message digest used by
3671
3671
MGF1 (RSA-PSS).
3672
- * ` saltLength ` : {number} Minimal salt length in bytes (RSA-PSS).
3673
- * ` divisorLength ` : {number} Size of ` q ` in bits (DSA).
3674
- * ` namedCurve ` : {string} Name of the curve to use (EC).
3675
- * ` prime ` : {Buffer} The prime parameter (DH).
3676
- * ` primeLength ` : {number} Prime length in bits (DH).
3677
- * ` generator ` : {number} Custom generator (DH). ** Default:** ` 2 ` .
3678
- * ` groupName ` : {string} Diffie-Hellman group name (DH). See
3672
+ * ` saltLength ` {number} Minimal salt length in bytes (RSA-PSS).
3673
+ * ` divisorLength ` {number} Size of ` q ` in bits (DSA).
3674
+ * ` namedCurve ` {string} Name of the curve to use (EC).
3675
+ * ` prime ` {Buffer} The prime parameter (DH).
3676
+ * ` primeLength ` {number} Prime length in bits (DH).
3677
+ * ` generator ` {number} Custom generator (DH). ** Default:** ` 2 ` .
3678
+ * ` groupName ` {string} Diffie-Hellman group name (DH). See
3679
3679
[ ` crypto.getDiffieHellman() ` ] [ ] .
3680
- * ` paramEncoding ` : {string} Must be ` 'named' ` or ` 'explicit' ` (EC).
3680
+ * ` paramEncoding ` {string} Must be ` 'named' ` or ` 'explicit' ` (EC).
3681
3681
** Default:** ` 'named' ` .
3682
- * ` publicKeyEncoding ` : {Object} See [ ` keyObject.export() ` ] [ ] .
3683
- * ` privateKeyEncoding ` : {Object} See [ ` keyObject.export() ` ] [ ] .
3684
- * ` callback ` : {Function}
3685
- * ` err ` : {Error}
3686
- * ` publicKey ` : {string | Buffer | KeyObject}
3687
- * ` privateKey ` : {string | Buffer | KeyObject}
3682
+ * ` publicKeyEncoding ` {Object} See [ ` keyObject.export() ` ] [ ] .
3683
+ * ` privateKeyEncoding ` {Object} See [ ` keyObject.export() ` ] [ ] .
3684
+ * ` callback ` {Function}
3685
+ * ` err ` {Error}
3686
+ * ` publicKey ` {string | Buffer | KeyObject}
3687
+ * ` privateKey ` {string | Buffer | KeyObject}
3688
3688
3689
3689
Generates a new asymmetric key pair of the given ` type ` . RSA, RSA-PSS, DSA, EC,
3690
3690
Ed25519, Ed448, X25519, X448, and DH are currently supported.
@@ -3775,29 +3775,29 @@ changes:
3775
3775
produce key objects if no encoding was specified.
3776
3776
-->
3777
3777
3778
- * ` type ` : {string} Must be ` 'rsa' ` , ` 'rsa-pss' ` , ` 'dsa' ` , ` 'ec' ` , ` 'ed25519' ` ,
3778
+ * ` type ` {string} Must be ` 'rsa' ` , ` 'rsa-pss' ` , ` 'dsa' ` , ` 'ec' ` , ` 'ed25519' ` ,
3779
3779
` 'ed448' ` , ` 'x25519' ` , ` 'x448' ` , or ` 'dh' ` .
3780
- * ` options ` : {Object}
3781
- * ` modulusLength ` : {number} Key size in bits (RSA, DSA).
3782
- * ` publicExponent ` : {number} Public exponent (RSA). ** Default:** ` 0x10001 ` .
3783
- * ` hashAlgorithm ` : {string} Name of the message digest (RSA-PSS).
3784
- * ` mgf1HashAlgorithm ` : {string} Name of the message digest used by
3780
+ * ` options ` {Object}
3781
+ * ` modulusLength ` {number} Key size in bits (RSA, DSA).
3782
+ * ` publicExponent ` {number} Public exponent (RSA). ** Default:** ` 0x10001 ` .
3783
+ * ` hashAlgorithm ` {string} Name of the message digest (RSA-PSS).
3784
+ * ` mgf1HashAlgorithm ` {string} Name of the message digest used by
3785
3785
MGF1 (RSA-PSS).
3786
- * ` saltLength ` : {number} Minimal salt length in bytes (RSA-PSS).
3787
- * ` divisorLength ` : {number} Size of ` q ` in bits (DSA).
3788
- * ` namedCurve ` : {string} Name of the curve to use (EC).
3789
- * ` prime ` : {Buffer} The prime parameter (DH).
3790
- * ` primeLength ` : {number} Prime length in bits (DH).
3791
- * ` generator ` : {number} Custom generator (DH). ** Default:** ` 2 ` .
3792
- * ` groupName ` : {string} Diffie-Hellman group name (DH). See
3786
+ * ` saltLength ` {number} Minimal salt length in bytes (RSA-PSS).
3787
+ * ` divisorLength ` {number} Size of ` q ` in bits (DSA).
3788
+ * ` namedCurve ` {string} Name of the curve to use (EC).
3789
+ * ` prime ` {Buffer} The prime parameter (DH).
3790
+ * ` primeLength ` {number} Prime length in bits (DH).
3791
+ * ` generator ` {number} Custom generator (DH). ** Default:** ` 2 ` .
3792
+ * ` groupName ` {string} Diffie-Hellman group name (DH). See
3793
3793
[ ` crypto.getDiffieHellman() ` ] [ ] .
3794
- * ` paramEncoding ` : {string} Must be ` 'named' ` or ` 'explicit' ` (EC).
3794
+ * ` paramEncoding ` {string} Must be ` 'named' ` or ` 'explicit' ` (EC).
3795
3795
** Default:** ` 'named' ` .
3796
- * ` publicKeyEncoding ` : {Object} See [ ` keyObject.export() ` ] [ ] .
3797
- * ` privateKeyEncoding ` : {Object} See [ ` keyObject.export() ` ] [ ] .
3796
+ * ` publicKeyEncoding ` {Object} See [ ` keyObject.export() ` ] [ ] .
3797
+ * ` privateKeyEncoding ` {Object} See [ ` keyObject.export() ` ] [ ] .
3798
3798
* Returns: {Object}
3799
- * ` publicKey ` : {string | Buffer | KeyObject}
3800
- * ` privateKey ` : {string | Buffer | KeyObject}
3799
+ * ` publicKey ` {string | Buffer | KeyObject}
3800
+ * ` privateKey ` {string | Buffer | KeyObject}
3801
3801
3802
3802
Generates a new asymmetric key pair of the given ` type ` . RSA, RSA-PSS, DSA, EC,
3803
3803
Ed25519, Ed448, X25519, X448, and DH are currently supported.
@@ -3866,10 +3866,10 @@ it will be a buffer containing the data encoded as DER.
3866
3866
added: v15.0.0
3867
3867
-->
3868
3868
3869
- * ` type ` : {string} The intended use of the generated secret key. Currently
3869
+ * ` type ` {string} The intended use of the generated secret key. Currently
3870
3870
accepted values are ` 'hmac' ` and ` 'aes' ` .
3871
- * ` options ` : {Object}
3872
- * ` length ` : {number} The bit length of the key to generate.
3871
+ * ` options ` {Object}
3872
+ * ` length ` {number} The bit length of the key to generate.
3873
3873
* If ` type ` is ` 'hmac' ` , the minimum is 8, and the maximum length is
3874
3874
2<sup >31</sup >-1. If the value is not a multiple of 8, the generated
3875
3875
key will be truncated to ` Math.floor(length / 8) ` .
@@ -4010,10 +4010,10 @@ the process unresponsive.
4010
4010
added: v15.0.0
4011
4011
-->
4012
4012
4013
- * ` nameOrNid ` : {string|number} The name or nid of the cipher to query.
4014
- * ` options ` : {Object}
4015
- * ` keyLength ` : {number} A test key length.
4016
- * ` ivLength ` : {number} A test IV length.
4013
+ * ` nameOrNid ` {string|number} The name or nid of the cipher to query.
4014
+ * ` options ` {Object}
4015
+ * ` keyLength ` {number} A test key length.
4016
+ * ` ivLength ` {number} A test IV length.
4017
4017
* Returns: {Object}
4018
4018
* ` name ` {string} The name of the cipher
4019
4019
* ` nid ` {number} The nid of the cipher
0 commit comments