crypto.createDecipheriv()

crypto.createDecipheriv(algorithm, key, iv) Creates and returns a Decipher object that uses the given algorithm, key and initialization vector (iv). The algorithm is dependent on OpenSSL, examples are 'aes192', etc. On recent OpenSSL releases, openssl list-cipher-algorithms will display the available cipher algorithms. The key is the raw key used by the algorithm and iv is an initialization vector. Both arguments must be 'binary' encoded strings or buffers.

crypto.createDecipher()

crypto.createDecipher(algorithm, password) Creates and returns a Decipher object that uses the given algorithm and password (key). The implementation of crypto.createDecipher() derives keys using the OpenSSL function EVP_BytesToKey with the digest algorithm set to MD5, one iteration, and no salt. The lack of salt allows dictionary attacks as the same password always creates the same key. The low iteration count and non-cryptographically secure hash algorithm allow passwords to be tested very r

crypto.createCredentials()

crypto.createCredentials(details) Stability: 0 - Deprecated: Use tls.createSecureContext() instead. The crypto.createCredentials() method is a deprecated alias for creating and returning a tls.SecureContext object. The crypto.createCredentials() method should not be used. The optional details argument is a hash object with keys: pfx : {String|Buffer} - PFX or PKCS12 encoded private key, certificate and CA certificates key : {String} - PEM encoded private key passphrase : {String} - passphr

crypto.createCipheriv()

crypto.createCipheriv(algorithm, key, iv) Creates and returns a Cipher object, with the given algorithm, key and initialization vector (iv). The algorithm is dependent on OpenSSL, examples are 'aes192', etc. On recent OpenSSL releases, openssl list-cipher-algorithms will display the available cipher algorithms. The key is the raw key used by the algorithm and iv is an initialization vector. Both arguments must be 'binary' encoded strings or buffers.

crypto.createCipher()

crypto.createCipher(algorithm, password) Creates and returns a Cipher object that uses the given algorithm and password. The algorithm is dependent on OpenSSL, examples are 'aes192', etc. On recent OpenSSL releases, openssl list-cipher-algorithms will display the available cipher algorithms. The password is used to derive the cipher key and initialization vector (IV). The value must be either a 'binary' encoded string or a Buffer. The implementation of crypto.createCipher() derives keys usin

continue event (http.ClientRequest)

Event: 'continue' function () { } Emitted when the server sends a '100 Continue' HTTP response, usually because the request contained 'Expect: 100-continue'. This is an instruction that the client should send the request body.

console.warn()

console.warn([data][, ...]) The console.warn() function is an alias for console.error().

console.trace()

console.trace(message[, ...]) Prints to stderr the string 'Trace :', followed by the util.format() formatted message and stack trace to the current position in the code. console.trace('Show me'); // Prints: (stack trace will vary based on where trace is called) // Trace: Show me // at repl:2:9 // at REPLServer.defaultEval (repl.js:248:27) // at bound (domain.js:287:14) // at REPLServer.runBound [as eval] (domain.js:300:12) // at REPLServer.<anonymous> (repl.

console.timeEnd()

console.timeEnd(label) Stops a timer that was previously started by calling console.time() and prints the result to stdout: console.time('100-elements'); for (var i = 0; i < 100; i++) { ; } console.timeEnd('100-elements'); // prints 100-elements: 225.438ms

console.time()

console.time(label) Starts a timer that can be used to compute the duration of an operation. Timers are identified by a unique label. Use the same label when you call console.timeEnd() to stop the timer and output the elapsed time in milliseconds to stdout. Timer durations are accurate to the sub-millisecond.