From e23598d09fee25dba8a05df04b8c49bdd801aa97 Mon Sep 17 00:00:00 2001 From: Anna Henningsen Date: Tue, 21 Feb 2017 23:38:44 +0100 Subject: [PATCH] doc: add changelogs for crypto PR-URL: https://github.com/nodejs/node/pull/11489 Reviewed-By: Ben Noordhuis Reviewed-By: Sam Roberts Reviewed-By: Roman Reiss Reviewed-By: James M Snell Reviewed-By: Italo A. Casas --- doc/api/crypto.md | 59 +++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 59 insertions(+) diff --git a/doc/api/crypto.md b/doc/api/crypto.md index 9102f2e89c03c4..045c1dd6c174eb 100644 --- a/doc/api/crypto.md +++ b/doc/api/crypto.md @@ -229,6 +229,10 @@ Returns `this` for method chaining. ### cipher.update(data[, input_encoding][, output_encoding]) Updates the cipher with `data`. If the `input_encoding` argument is given, @@ -327,6 +331,10 @@ than once will result in an error being thrown. ### decipher.setAAD(buffer) When using an authenticated encryption mode (only `GCM` is currently @@ -338,6 +346,10 @@ Returns `this` for method chaining. ### decipher.setAuthTag(buffer) When using an authenticated encryption mode (only `GCM` is currently @@ -368,6 +380,10 @@ Returns `this` for method chaining. ### decipher.update(data[, input_encoding][, output_encoding]) Updates the decipher with `data`. If the `input_encoding` argument is given, @@ -548,6 +564,10 @@ assert.strictEqual(aliceSecret.toString('hex'), bobSecret.toString('hex')); ### ecdh.computeSecret(other_public_key[, input_encoding][, output_encoding]) Computes the shared secret using `other_public_key` as the other @@ -731,6 +751,10 @@ called. Multiple calls will cause an error to be thrown. ### hash.update(data[, input_encoding]) Updates the hash content with the given `data`, the encoding of which @@ -813,6 +837,10 @@ called. Multiple calls to `hmac.digest()` will result in an error being thrown. ### hmac.update(data[, input_encoding]) Updates the `Hmac` content with the given `data`, the encoding of which @@ -914,6 +942,10 @@ called. Multiple calls to `sign.sign()` will result in an error being thrown. ### sign.update(data[, input_encoding]) Updates the `Sign` content with the given `data`, the encoding of which @@ -972,6 +1004,10 @@ console.log(verify.verify(publicKey, signature)); ### verifier.update(data[, input_encoding]) Updates the `Verify` content with the given `data`, the encoding of which @@ -1133,6 +1169,11 @@ The `key` is the raw key used by the `algorithm` and `iv` is an ### crypto.createDiffieHellman(prime[, prime_encoding][, generator][, generator_encoding]) Creates a `DiffieHellman` key exchange object using the supplied `prime` and an @@ -1334,6 +1375,15 @@ console.log(hashes); // ['DSA', 'DSA-SHA', 'DSA-SHA1', ...] ### crypto.pbkdf2(password, salt, iterations, keylen, digest, callback) Provides an asynchronous Password-Based Key Derivation Function 2 (PBKDF2) @@ -1369,6 +1419,15 @@ An array of supported digest functions can be retrieved using ### crypto.pbkdf2Sync(password, salt, iterations, keylen, digest) Provides a synchronous Password-Based Key Derivation Function 2 (PBKDF2)