Skip to content

Commit 4def7c4

Browse files
TrottRaisinTen
authored andcommitted
doc: standardize on pseudorandom
Our docs use both _pseudo-random_ and _pseudorandom_. Standardize on _pseudorandom_. PR-URL: #38196 Reviewed-By: Michaël Zasso <[email protected]> Reviewed-By: Colin Ihrig <[email protected]> Reviewed-By: Darshan Sen <[email protected]> Reviewed-By: James M Snell <[email protected]> Reviewed-By: Luigi Pinca <[email protected]>
1 parent f1027ec commit 4def7c4

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

doc/api/crypto.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -3605,7 +3605,7 @@ added: v15.8.0
36053605
* `err` {Error}
36063606
* `prime` {ArrayBuffer|bigint}
36073607

3608-
Generates a pseudo-random prime of `size` bits.
3608+
Generates a pseudorandom prime of `size` bits.
36093609

36103610
If `options.safe` is `true`, the prime will be a safe prime -- that is,
36113611
`(prime - 1) / 2` will also be a prime.
@@ -3645,7 +3645,7 @@ added: v15.8.0
36453645
as a `bigint`.
36463646
* Returns: {ArrayBuffer|bigint}
36473647

3648-
Generates a pseudo-random prime of `size` bits.
3648+
Generates a pseudorandom prime of `size` bits.
36493649

36503650
If `options.safe` is `true`, the prime will be a safe prime -- that is,
36513651
`(prime - 1) / 2` will also be a prime.
@@ -4316,7 +4316,7 @@ changes:
43164316
* `buf` {Buffer}
43174317
* Returns: {Buffer} if the `callback` function is not provided.
43184318

4319-
Generates cryptographically strong pseudo-random data. The `size` argument
4319+
Generates cryptographically strong pseudorandom data. The `size` argument
43204320
is a number indicating the number of bytes to generate.
43214321

43224322
If a `callback` function is provided, the bytes are generated asynchronously
@@ -5101,10 +5101,10 @@ When passing strings to cryptographic APIs, consider the following factors.
51015101

51025102
* Not all byte sequences are valid UTF-8 strings. Therefore, when a byte
51035103
sequence of length `n` is derived from a string, its entropy is generally
5104-
lower than the entropy of a random or pseudo-random `n` byte sequence.
5104+
lower than the entropy of a random or pseudorandom `n` byte sequence.
51055105
For example, no UTF-8 string will result in the byte sequence `c0 af`. Secret
5106-
keys should almost exclusively be random or pseudo-random byte sequences.
5107-
* Similarly, when converting random or pseudo-random byte sequences to UTF-8
5106+
keys should almost exclusively be random or pseudorandom byte sequences.
5107+
* Similarly, when converting random or pseudorandom byte sequences to UTF-8
51085108
strings, subsequences that do not represent valid code points may be replaced
51095109
by the Unicode replacement character (`U+FFFD`). The byte representation of
51105110
the resulting Unicode string may, therefore, not be equal to the byte sequence
@@ -5119,7 +5119,7 @@ When passing strings to cryptographic APIs, consider the following factors.
51195119
```
51205120

51215121
The outputs of ciphers, hash functions, signature algorithms, and key
5122-
derivation functions are pseudo-random byte sequences and should not be
5122+
derivation functions are pseudorandom byte sequences and should not be
51235123
used as Unicode strings.
51245124
* When strings are obtained from user input, some Unicode characters can be
51255125
represented in multiple equivalent ways that result in different byte

doc/api/tls.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1772,7 +1772,7 @@ changes:
17721772
**Default:** none, see `minVersion`.
17731773
* `sessionIdContext` {string} Opaque identifier used by servers to ensure
17741774
session state is not shared between applications. Unused by clients.
1775-
* `ticketKeys`: {Buffer} 48-bytes of cryptographically strong pseudo-random
1775+
* `ticketKeys`: {Buffer} 48-bytes of cryptographically strong pseudorandom
17761776
data. See [Session Resumption][] for more information.
17771777
* `sessionTimeout` {number} The number of seconds after which a TLS session
17781778
created by the server will no longer be resumable. See
@@ -1915,7 +1915,7 @@ changes:
19151915
If `callback` is called with a falsy `ctx` argument, the default secure
19161916
context of the server will be used. If `SNICallback` wasn't provided the
19171917
default callback with high-level API will be used (see below).
1918-
* `ticketKeys`: {Buffer} 48-bytes of cryptographically strong pseudo-random
1918+
* `ticketKeys`: {Buffer} 48-bytes of cryptographically strong pseudorandom
19191919
data. See [Session Resumption][] for more information.
19201920
* `pskCallback` {Function}
19211921
* socket: {tls.TLSSocket} the server [`tls.TLSSocket`][] instance for

doc/api/webcrypto.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1175,7 +1175,7 @@ added: v15.0.0
11751175
* Type: {ArrayBuffer|TypedArray|DataView|Buffer}
11761176

11771177
The salt value significantly improves the strength of the HKDF algorithm.
1178-
It should be random or pseudo-random and should be the same length as the
1178+
It should be random or pseudorandom and should be the same length as the
11791179
output of the digest function (for instance, if using `'SHA-256'` as the
11801180
digest, the salt should be 256-bits of random data).
11811181

@@ -1327,7 +1327,7 @@ added: v15.0.0
13271327

13281328
* Type: {ArrayBuffer|TypedArray|DataView|Buffer}
13291329

1330-
Should be at least 16 random or pseudo-random bytes.
1330+
Should be at least 16 random or pseudorandom bytes.
13311331

13321332
### Class: `RsaHashedImportParams`
13331333
<!-- YAML

0 commit comments

Comments
 (0)