diff --git a/doc/api/crypto.md b/doc/api/crypto.md index c713f563a19..a36fc7c730a 100644 --- a/doc/api/crypto.md +++ b/doc/api/crypto.md @@ -232,6 +232,10 @@ Returns `this` for method chaining. ### cipher.update(data[, input_encoding][, output_encoding]) Updates the cipher with `data`. If the `input_encoding` argument is given, @@ -330,6 +334,10 @@ than once will result in an error being thrown. ### decipher.setAAD(buffer) When using an authenticated encryption mode (only `GCM` is currently @@ -343,6 +351,10 @@ Returns `this` for method chaining. ### decipher.setAuthTag(buffer) When using an authenticated encryption mode (only `GCM` is currently @@ -376,6 +388,10 @@ Returns `this` for method chaining. ### decipher.update(data[, input_encoding][, output_encoding]) Updates the decipher with `data`. If the `input_encoding` argument is given, @@ -556,6 +572,10 @@ assert.strictEqual(aliceSecret.toString('hex'), bobSecret.toString('hex')); ### ecdh.computeSecret(other_public_key[, input_encoding][, output_encoding]) Computes the shared secret using `other_public_key` as the other @@ -739,6 +759,10 @@ called. Multiple calls will cause an error to be thrown. ### hash.update(data[, input_encoding]) Updates the hash content with the given `data`, the encoding of which @@ -821,6 +845,10 @@ called. Multiple calls to `hmac.digest()` will result in an error being thrown. ### hmac.update(data[, input_encoding]) Updates the `Hmac` content with the given `data`, the encoding of which @@ -922,6 +950,10 @@ called. Multiple calls to `sign.sign()` will result in an error being thrown. ### sign.update(data[, input_encoding]) Updates the `Sign` content with the given `data`, the encoding of which @@ -980,6 +1012,10 @@ console.log(verify.verify(publicKey, signature)); ### verifier.update(data[, input_encoding]) Updates the `Verify` content with the given `data`, the encoding of which @@ -1141,6 +1177,11 @@ The `key` is the raw key used by the `algorithm` and `iv` is an ### crypto.createDiffieHellman(prime[, prime_encoding][, generator][, generator_encoding]) Creates a `DiffieHellman` key exchange object using the supplied `prime` and an @@ -1342,6 +1383,15 @@ console.log(hashes); // ['DSA', 'DSA-SHA', 'DSA-SHA1', ...] ### crypto.pbkdf2(password, salt, iterations, keylen, digest, callback) Provides an asynchronous Password-Based Key Derivation Function 2 (PBKDF2) @@ -1377,6 +1427,15 @@ An array of supported digest functions can be retrieved using ### crypto.pbkdf2Sync(password, salt, iterations, keylen, digest) Provides a synchronous Password-Based Key Derivation Function 2 (PBKDF2)