@@ -232,6 +232,10 @@ Returns `this` for method chaining.
232
232
### cipher.update(data[ , input_encoding] [ , output_encoding ] )
233
233
<!-- YAML
234
234
added: v0.1.94
235
+ changes:
236
+ - version: v6.0.0
237
+ pr-url: https://github.com/nodejs/node/pull/5522
238
+ description: The default `input_encoding` changed from `binary` to `utf8`.
235
239
-->
236
240
237
241
Updates the cipher with ` data ` . If the ` input_encoding ` argument is given,
@@ -330,6 +334,10 @@ than once will result in an error being thrown.
330
334
### decipher.setAAD(buffer)
331
335
<!-- YAML
332
336
added: v1.0.0
337
+ changes:
338
+ - version: v7.2.0
339
+ pr-url: https://github.com/nodejs/node/pull/9398
340
+ description: This method now returns a reference to `decipher`.
333
341
-->
334
342
335
343
When using an authenticated encryption mode (only ` GCM ` is currently
@@ -343,6 +351,10 @@ Returns `this` for method chaining.
343
351
### decipher.setAuthTag(buffer)
344
352
<!-- YAML
345
353
added: v1.0.0
354
+ changes:
355
+ - version: v7.2.0
356
+ pr-url: https://github.com/nodejs/node/pull/9398
357
+ description: This method now returns a reference to `decipher`.
346
358
-->
347
359
348
360
When using an authenticated encryption mode (only ` GCM ` is currently
@@ -376,6 +388,10 @@ Returns `this` for method chaining.
376
388
### decipher.update(data[ , input_encoding] [ , output_encoding ] )
377
389
<!-- YAML
378
390
added: v0.1.94
391
+ changes:
392
+ - version: v6.0.0
393
+ pr-url: https://github.com/nodejs/node/pull/5522
394
+ description: The default `input_encoding` changed from `binary` to `utf8`.
379
395
-->
380
396
381
397
Updates the decipher with ` data ` . If the ` input_encoding ` argument is given,
@@ -556,6 +572,10 @@ assert.strictEqual(aliceSecret.toString('hex'), bobSecret.toString('hex'));
556
572
### ecdh.computeSecret(other_public_key[ , input_encoding] [ , output_encoding ] )
557
573
<!-- YAML
558
574
added: v0.11.14
575
+ changes:
576
+ - version: v6.0.0
577
+ pr-url: https://github.com/nodejs/node/pull/5522
578
+ description: The default `input_encoding` changed from `binary` to `utf8`.
559
579
-->
560
580
561
581
Computes the shared secret using ` other_public_key ` as the other
@@ -739,6 +759,10 @@ called. Multiple calls will cause an error to be thrown.
739
759
### hash.update(data[ , input_encoding] )
740
760
<!-- YAML
741
761
added: v0.1.92
762
+ changes:
763
+ - version: v6.0.0
764
+ pr-url: https://github.com/nodejs/node/pull/5522
765
+ description: The default `input_encoding` changed from `binary` to `utf8`.
742
766
-->
743
767
744
768
Updates the hash content with the given ` data ` , the encoding of which
@@ -821,6 +845,10 @@ called. Multiple calls to `hmac.digest()` will result in an error being thrown.
821
845
### hmac.update(data[ , input_encoding] )
822
846
<!-- YAML
823
847
added: v0.1.94
848
+ changes:
849
+ - version: v6.0.0
850
+ pr-url: https://github.com/nodejs/node/pull/5522
851
+ description: The default `input_encoding` changed from `binary` to `utf8`.
824
852
-->
825
853
826
854
Updates the ` Hmac ` content with the given ` data ` , the encoding of which
@@ -922,6 +950,10 @@ called. Multiple calls to `sign.sign()` will result in an error being thrown.
922
950
### sign.update(data[ , input_encoding] )
923
951
<!-- YAML
924
952
added: v0.1.92
953
+ changes:
954
+ - version: v6.0.0
955
+ pr-url: https://github.com/nodejs/node/pull/5522
956
+ description: The default `input_encoding` changed from `binary` to `utf8`.
925
957
-->
926
958
927
959
Updates the ` Sign ` content with the given ` data ` , the encoding of which
@@ -980,6 +1012,10 @@ console.log(verify.verify(publicKey, signature));
980
1012
### verifier.update(data[ , input_encoding] )
981
1013
<!-- YAML
982
1014
added: v0.1.92
1015
+ changes:
1016
+ - version: v6.0.0
1017
+ pr-url: https://github.com/nodejs/node/pull/5522
1018
+ description: The default `input_encoding` changed from `binary` to `utf8`.
983
1019
-->
984
1020
985
1021
Updates the ` Verify ` content with the given ` data ` , the encoding of which
@@ -1141,6 +1177,11 @@ The `key` is the raw key used by the `algorithm` and `iv` is an
1141
1177
### crypto.createDiffieHellman(prime[ , prime_encoding] [ , generator ] [ , generator_encoding] )
1142
1178
<!-- YAML
1143
1179
added: v0.11.12
1180
+ changes:
1181
+ - version: v6.0.0
1182
+ pr-url: https://github.com/nodejs/node/pull/5522
1183
+ description: The default for the encoding parameters changed
1184
+ from `binary` to `utf8`.
1144
1185
-->
1145
1186
1146
1187
Creates a ` DiffieHellman ` key exchange object using the supplied ` prime ` and an
@@ -1342,6 +1383,15 @@ console.log(hashes); // ['DSA', 'DSA-SHA', 'DSA-SHA1', ...]
1342
1383
### crypto.pbkdf2(password, salt, iterations, keylen, digest, callback)
1343
1384
<!-- YAML
1344
1385
added: v0.5.5
1386
+ changes:
1387
+ - version: v6.0.0
1388
+ pr-url: https://github.com/nodejs/node/pull/4047
1389
+ description: Calling this function without passing the `digest` parameter
1390
+ is deprecated now and will emit a warning.
1391
+ - version: v6.0.0
1392
+ pr-url: https://github.com/nodejs/node/pull/5522
1393
+ description: The default encoding for `password` if it is a string changed
1394
+ from `binary` to `utf8`.
1345
1395
-->
1346
1396
1347
1397
Provides an asynchronous Password-Based Key Derivation Function 2 (PBKDF2)
@@ -1377,6 +1427,15 @@ An array of supported digest functions can be retrieved using
1377
1427
### crypto.pbkdf2Sync(password, salt, iterations, keylen, digest)
1378
1428
<!-- YAML
1379
1429
added: v0.9.3
1430
+ changes:
1431
+ - version: v6.0.0
1432
+ pr-url: https://github.com/nodejs/node/pull/4047
1433
+ description: Calling this function without passing the `digest` parameter
1434
+ is deprecated now and will emit a warning.
1435
+ - version: v6.0.0
1436
+ pr-url: https://github.com/nodejs/node/pull/5522
1437
+ description: The default encoding for `password` if it is a string changed
1438
+ from `binary` to `utf8`.
1380
1439
-->
1381
1440
1382
1441
Provides a synchronous Password-Based Key Derivation Function 2 (PBKDF2)
0 commit comments