crypto.createDiffieHellman()

crypto.createDiffieHellman(prime[, prime_encoding][, generator][, generator_encoding]) Creates a DiffieHellman key exchange object using the supplied prime and an optional specific generator. The generator argument can be a number, string, or Buffer. If generator is not specified, the value 2 is used. The prime_encoding and generator_encoding arguments can be 'binary', 'hex', or 'base64'. If prime_encoding is specified, prime is expected to be a string; otherwise a Buffer is expected. If ge

crypto.createCipheriv()

crypto.createCipheriv(algorithm, key, iv) Creates and returns a Cipher object, with the given algorithm, key and initialization vector (iv). The algorithm is dependent on OpenSSL, examples are 'aes192', etc. On recent OpenSSL releases, openssl list-cipher-algorithms will display the available cipher algorithms. The key is the raw key used by the algorithm and iv is an initialization vector. Both arguments must be 'binary' encoded strings or buffers.

crypto.createCredentials()

crypto.createCredentials(details) Stability: 0 - Deprecated: Use tls.createSecureContext() instead. The crypto.createCredentials() method is a deprecated alias for creating and returning a tls.SecureContext object. The crypto.createCredentials() method should not be used. The optional details argument is a hash object with keys: pfx : {String|Buffer} - PFX or PKCS12 encoded private key, certificate and CA certificates key : {String} - PEM encoded private key passphrase : {String} - passphr

crypto.createDecipher()

crypto.createDecipher(algorithm, password) Creates and returns a Decipher object that uses the given algorithm and password (key). The implementation of crypto.createDecipher() derives keys using the OpenSSL function EVP_BytesToKey with the digest algorithm set to MD5, one iteration, and no salt. The lack of salt allows dictionary attacks as the same password always creates the same key. The low iteration count and non-cryptographically secure hash algorithm allow passwords to be tested very r

crypto.createCipher()

crypto.createCipher(algorithm, password) Creates and returns a Cipher object that uses the given algorithm and password. The algorithm is dependent on OpenSSL, examples are 'aes192', etc. On recent OpenSSL releases, openssl list-cipher-algorithms will display the available cipher algorithms. The password is used to derive the cipher key and initialization vector (IV). The value must be either a 'binary' encoded string or a Buffer. The implementation of crypto.createCipher() derives keys usin

console.trace()

console.trace(message[, ...]) Prints to stderr the string 'Trace :', followed by the util.format() formatted message and stack trace to the current position in the code. console.trace('Show me'); // Prints: (stack trace will vary based on where trace is called) // Trace: Show me // at repl:2:9 // at REPLServer.defaultEval (repl.js:248:27) // at bound (domain.js:287:14) // at REPLServer.runBound [as eval] (domain.js:300:12) // at REPLServer.<anonymous> (repl.

console.warn()

console.warn([data][, ...]) The console.warn() function is an alias for console.error().

continue event (http.ClientRequest)

Event: 'continue' function () { } Emitted when the server sends a '100 Continue' HTTP response, usually because the request contained 'Expect: 100-continue'. This is an instruction that the client should send the request body.

console.time()

console.time(label) Starts a timer that can be used to compute the duration of an operation. Timers are identified by a unique label. Use the same label when you call console.timeEnd() to stop the timer and output the elapsed time in milliseconds to stdout. Timer durations are accurate to the sub-millisecond.

console.timeEnd()

console.timeEnd(label) Stops a timer that was previously started by calling console.time() and prints the result to stdout: console.time('100-elements'); for (var i = 0; i < 100; i++) { ; } console.timeEnd('100-elements'); // prints 100-elements: 225.438ms