diff options
author | Tobias Nießen <tniessen@tnie.de> | 2022-01-31 10:47:13 +0300 |
---|---|---|
committer | GitHub <noreply@github.com> | 2022-01-31 10:47:13 +0300 |
commit | 6b428e72f92192f255f9c9364073593a52ee0e5b (patch) | |
tree | 301365f599b580ee24bbbbfa5e23e6a02f783b91 /doc/api/crypto.md | |
parent | 96e81df24a4d276e86e1175d7242ce583d6ae203 (diff) |
doc: remove section on "recent" ECDH changes
The ECDH API changes were made more than six years ago and this
section is not helpful for new applications. The behavior of the ECDH
APIs should be explained in the relevant sections, not in a note.
Refs: https://github.com/nodejs/node/pull/3511
PR-URL: https://github.com/nodejs/node/pull/41773
Reviewed-By: Rich Trott <rtrott@gmail.com>
Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
Reviewed-By: Benjamin Gruenbaum <benjamingr@gmail.com>
Diffstat (limited to 'doc/api/crypto.md')
-rw-r--r-- | doc/api/crypto.md | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/doc/api/crypto.md b/doc/api/crypto.md index 4b1a5432629..6d1fc3a5672 100644 --- a/doc/api/crypto.md +++ b/doc/api/crypto.md @@ -5464,21 +5464,6 @@ and returned `'latin1'` encoded strings by default rather than `Buffer`s. This default was changed after Node.js v0.8 to use [`Buffer`][] objects by default instead. -### Recent ECDH changes - -Usage of `ECDH` with non-dynamically generated key pairs has been simplified. -Now, [`ecdh.setPrivateKey()`][] can be called with a preselected private key -and the associated public point (key) will be computed and stored in the object. -This allows code to only store and provide the private part of the EC key pair. -[`ecdh.setPrivateKey()`][] now also validates that the private key is valid for -the selected curve. - -The [`ecdh.setPublicKey()`][] method is now deprecated as its inclusion in the -API is not useful. Either a previously stored private key should be set, which -automatically generates the associated public key, or [`ecdh.generateKeys()`][] -should be called. The main drawback of using [`ecdh.setPublicKey()`][] is that -it can be used to put the ECDH key pair into an inconsistent state. - ### Support for weak or compromised algorithms The `crypto` module still supports some algorithms which are already @@ -6028,7 +6013,6 @@ See the [list of SSL OP Flags][] for details. [`diffieHellman.setPublicKey()`]: #diffiehellmansetpublickeypublickey-encoding [`ecdh.generateKeys()`]: #ecdhgeneratekeysencoding-format [`ecdh.setPrivateKey()`]: #ecdhsetprivatekeyprivatekey-encoding -[`ecdh.setPublicKey()`]: #ecdhsetpublickeypublickey-encoding [`hash.digest()`]: #hashdigestencoding [`hash.update()`]: #hashupdatedata-inputencoding [`hmac.digest()`]: #hmacdigestencoding |