@@ -229,6 +229,10 @@ Returns `this` for method chaining.
229
229
### cipher.update(data[ , input_encoding] [ , output_encoding ] )
230
230
<!-- YAML
231
231
added: v0.1.94
232
+ changes:
233
+ - version: v6.0.0
234
+ pr-url: https://github.com/nodejs/node/pull/5522
235
+ description: The default `input_encoding` changed from `binary` to `utf8`.
232
236
-->
233
237
234
238
Updates the cipher with ` data ` . If the ` input_encoding ` argument is given,
@@ -327,6 +331,10 @@ than once will result in an error being thrown.
327
331
### decipher.setAAD(buffer)
328
332
<!-- YAML
329
333
added: v1.0.0
334
+ changes:
335
+ - version: v7.2.0
336
+ pr-url: https://github.com/nodejs/node/pull/9398
337
+ description: This method now returns a reference to `decipher`.
330
338
-->
331
339
332
340
When using an authenticated encryption mode (only ` GCM ` is currently
@@ -338,6 +346,10 @@ Returns `this` for method chaining.
338
346
### decipher.setAuthTag(buffer)
339
347
<!-- YAML
340
348
added: v1.0.0
349
+ changes:
350
+ - version: v7.2.0
351
+ pr-url: https://github.com/nodejs/node/pull/9398
352
+ description: This method now returns a reference to `decipher`.
341
353
-->
342
354
343
355
When using an authenticated encryption mode (only ` GCM ` is currently
@@ -368,6 +380,10 @@ Returns `this` for method chaining.
368
380
### decipher.update(data[ , input_encoding] [ , output_encoding ] )
369
381
<!-- YAML
370
382
added: v0.1.94
383
+ changes:
384
+ - version: v6.0.0
385
+ pr-url: https://github.com/nodejs/node/pull/5522
386
+ description: The default `input_encoding` changed from `binary` to `utf8`.
371
387
-->
372
388
373
389
Updates the decipher with ` data ` . If the ` input_encoding ` argument is given,
@@ -548,6 +564,10 @@ assert.strictEqual(aliceSecret.toString('hex'), bobSecret.toString('hex'));
548
564
### ecdh.computeSecret(other_public_key[ , input_encoding] [ , output_encoding ] )
549
565
<!-- YAML
550
566
added: v0.11.14
567
+ changes:
568
+ - version: v6.0.0
569
+ pr-url: https://github.com/nodejs/node/pull/5522
570
+ description: The default `input_encoding` changed from `binary` to `utf8`.
551
571
-->
552
572
553
573
Computes the shared secret using ` other_public_key ` as the other
@@ -731,6 +751,10 @@ called. Multiple calls will cause an error to be thrown.
731
751
### hash.update(data[ , input_encoding] )
732
752
<!-- YAML
733
753
added: v0.1.92
754
+ changes:
755
+ - version: v6.0.0
756
+ pr-url: https://github.com/nodejs/node/pull/5522
757
+ description: The default `input_encoding` changed from `binary` to `utf8`.
734
758
-->
735
759
736
760
Updates the hash content with the given ` data ` , the encoding of which
@@ -813,6 +837,10 @@ called. Multiple calls to `hmac.digest()` will result in an error being thrown.
813
837
### hmac.update(data[ , input_encoding] )
814
838
<!-- YAML
815
839
added: v0.1.94
840
+ changes:
841
+ - version: v6.0.0
842
+ pr-url: https://github.com/nodejs/node/pull/5522
843
+ description: The default `input_encoding` changed from `binary` to `utf8`.
816
844
-->
817
845
818
846
Updates the ` Hmac ` content with the given ` data ` , the encoding of which
@@ -914,6 +942,10 @@ called. Multiple calls to `sign.sign()` will result in an error being thrown.
914
942
### sign.update(data[ , input_encoding] )
915
943
<!-- YAML
916
944
added: v0.1.92
945
+ changes:
946
+ - version: v6.0.0
947
+ pr-url: https://github.com/nodejs/node/pull/5522
948
+ description: The default `input_encoding` changed from `binary` to `utf8`.
917
949
-->
918
950
919
951
Updates the ` Sign ` content with the given ` data ` , the encoding of which
@@ -972,6 +1004,10 @@ console.log(verify.verify(publicKey, signature));
972
1004
### verifier.update(data[ , input_encoding] )
973
1005
<!-- YAML
974
1006
added: v0.1.92
1007
+ changes:
1008
+ - version: v6.0.0
1009
+ pr-url: https://github.com/nodejs/node/pull/5522
1010
+ description: The default `input_encoding` changed from `binary` to `utf8`.
975
1011
-->
976
1012
977
1013
Updates the ` Verify ` content with the given ` data ` , the encoding of which
@@ -1133,6 +1169,11 @@ The `key` is the raw key used by the `algorithm` and `iv` is an
1133
1169
### crypto.createDiffieHellman(prime[ , prime_encoding] [ , generator ] [ , generator_encoding] )
1134
1170
<!-- YAML
1135
1171
added: v0.11.12
1172
+ changes:
1173
+ - version: v6.0.0
1174
+ pr-url: https://github.com/nodejs/node/pull/5522
1175
+ description: The default for the encoding parameters changed
1176
+ from `binary` to `utf8`.
1136
1177
-->
1137
1178
1138
1179
Creates a ` DiffieHellman ` key exchange object using the supplied ` prime ` and an
@@ -1334,6 +1375,15 @@ console.log(hashes); // ['DSA', 'DSA-SHA', 'DSA-SHA1', ...]
1334
1375
### crypto.pbkdf2(password, salt, iterations, keylen, digest, callback)
1335
1376
<!-- YAML
1336
1377
added: v0.5.5
1378
+ changes:
1379
+ - version: v6.0.0
1380
+ pr-url: https://github.com/nodejs/node/pull/4047
1381
+ description: Calling this function without passing the `digest` parameter
1382
+ is deprecated now and will emit a warning.
1383
+ - version: v6.0.0
1384
+ pr-url: https://github.com/nodejs/node/pull/5522
1385
+ description: The default encoding for `password` if it is a string changed
1386
+ from `binary` to `utf8`.
1337
1387
-->
1338
1388
1339
1389
Provides an asynchronous Password-Based Key Derivation Function 2 (PBKDF2)
@@ -1369,6 +1419,15 @@ An array of supported digest functions can be retrieved using
1369
1419
### crypto.pbkdf2Sync(password, salt, iterations, keylen, digest)
1370
1420
<!-- YAML
1371
1421
added: v0.9.3
1422
+ changes:
1423
+ - version: v6.0.0
1424
+ pr-url: https://github.com/nodejs/node/pull/4047
1425
+ description: Calling this function without passing the `digest` parameter
1426
+ is deprecated now and will emit a warning.
1427
+ - version: v6.0.0
1428
+ pr-url: https://github.com/nodejs/node/pull/5522
1429
+ description: The default encoding for `password` if it is a string changed
1430
+ from `binary` to `utf8`.
1372
1431
-->
1373
1432
1374
1433
Provides a synchronous Password-Based Key Derivation Function 2 (PBKDF2)
0 commit comments