@@ -1039,7 +1039,7 @@ For more information about PBKDF2, see [RFC 2898](https://www.rfc-editor.org/inf
1039
1039
<param name =" salt" >The key salt used to derive the key.</param >
1040
1040
<param name =" iterations" >The number of iterations for the operation.</param >
1041
1041
<param name =" hashAlgorithm" >The hash algorithm to use to derive the key.</param >
1042
- <param name =" outputLength" >The size of key to derive (that is, the number of elements in the byte array) .</param >
1042
+ <param name =" outputLength" >The size of the key to derive, in bytes .</param >
1043
1043
<summary >Creates a PBKDF2 derived key from password bytes.</summary >
1044
1044
<returns >A byte array containing the created PBKDF2 derived key.</returns >
1045
1045
<remarks >To be added.</remarks >
@@ -1100,7 +1100,7 @@ For more information about PBKDF2, see [RFC 2898](https://www.rfc-editor.org/inf
1100
1100
<param name =" salt" >The key salt used to derive the key.</param >
1101
1101
<param name =" iterations" >The number of iterations for the operation.</param >
1102
1102
<param name =" hashAlgorithm" >The hash algorithm to use to derive the key.</param >
1103
- <param name =" outputLength" >The size of key to derive (that is, the number of elements in the byte array) .</param >
1103
+ <param name =" outputLength" >The size of the key to derive, in bytes .</param >
1104
1104
<summary >Creates a PBKDF2 derived key from password bytes.</summary >
1105
1105
<returns >A byte array containing the created PBKDF2 derived key.</returns >
1106
1106
<remarks >To be added.</remarks >
@@ -1207,9 +1207,9 @@ For more information about PBKDF2, see [RFC 2898](https://www.rfc-editor.org/inf
1207
1207
<param name =" salt" >The key salt used to derive the key.</param >
1208
1208
<param name =" iterations" >The number of iterations for the operation.</param >
1209
1209
<param name =" hashAlgorithm" >The hash algorithm to use to derive the key.</param >
1210
- <param name =" outputLength" >The size of key to derive (that is, the number of elements in the byte array) .</param >
1210
+ <param name =" outputLength" >The size of the key to derive, in bytes .</param >
1211
1211
<summary >Creates a PBKDF2 derived key from a password.</summary >
1212
- <returns >A byte array of length <paramref name =" outputLength" /> that's filled with pseudo-random key bytes.</returns >
1212
+ <returns >A byte array of length <paramref name =" outputLength" /> that is filled with pseudo-random key bytes.</returns >
1213
1213
<remarks >
1214
1214
<format type =" text/markdown" ><![CDATA[
1215
1215
@@ -1330,9 +1330,9 @@ The `password` will be converted to bytes using the UTF8 encoding. For
1330
1330
<param name =" salt" >The key salt used to derive the key.</param >
1331
1331
<param name =" iterations" >The number of iterations for the operation.</param >
1332
1332
<param name =" hashAlgorithm" >The hash algorithm to use to derive the key.</param >
1333
- <param name =" outputLength" >The size of key to derive (that is, the number of elements in the byte array) .</param >
1333
+ <param name =" outputLength" >The size of the key to derive, in bytes .</param >
1334
1334
<summary >Creates a PBKDF2 derived key from a password.</summary >
1335
- <returns >A byte array of length <paramref name =" outputLength" /> that's filled with pseudo-random key bytes.</returns >
1335
+ <returns >A byte array of length <paramref name =" outputLength" /> that is filled with pseudo-random key bytes.</returns >
1336
1336
<remarks >
1337
1337
<format type =" text/markdown" ><![CDATA[
1338
1338
0 commit comments