@@ -307,27 +307,27 @@ Accounts.prototype.decrypt = function (v3Keystore, password, nonStrict) {
307307 kdfparams = json . crypto . kdfparams ;
308308
309309 // FIXME: support progress reporting callback
310- derivedKey = scryptsy ( new Buffer ( password ) , new Buffer ( kdfparams . salt , 'hex' ) , kdfparams . n , kdfparams . r , kdfparams . p , kdfparams . dklen ) ;
310+ derivedKey = scryptsy ( Buffer . from ( password ) , Buffer . from ( kdfparams . salt , 'hex' ) , kdfparams . n , kdfparams . r , kdfparams . p , kdfparams . dklen ) ;
311311 } else if ( json . crypto . kdf === 'pbkdf2' ) {
312312 kdfparams = json . crypto . kdfparams ;
313313
314314 if ( kdfparams . prf !== 'hmac-sha256' ) {
315315 throw new Error ( 'Unsupported parameters to PBKDF2' ) ;
316316 }
317317
318- derivedKey = cryp . pbkdf2Sync ( new Buffer ( password ) , new Buffer ( kdfparams . salt , 'hex' ) , kdfparams . c , kdfparams . dklen , 'sha256' ) ;
318+ derivedKey = cryp . pbkdf2Sync ( Buffer . from ( password ) , Buffer . from ( kdfparams . salt , 'hex' ) , kdfparams . c , kdfparams . dklen , 'sha256' ) ;
319319 } else {
320320 throw new Error ( 'Unsupported key derivation scheme' ) ;
321321 }
322322
323- var ciphertext = new Buffer ( json . crypto . ciphertext , 'hex' ) ;
323+ var ciphertext = Buffer . from ( json . crypto . ciphertext , 'hex' ) ;
324324
325325 var mac = utils . sha3 ( Buffer . concat ( [ derivedKey . slice ( 16 , 32 ) , ciphertext ] ) ) . replace ( '0x' , '' ) ;
326326 if ( mac !== json . crypto . mac ) {
327327 throw new Error ( 'Key derivation failed - possibly wrong password' ) ;
328328 }
329329
330- var decipher = cryp . createDecipheriv ( json . crypto . cipher , derivedKey . slice ( 0 , 16 ) , new Buffer ( json . crypto . cipherparams . iv , 'hex' ) ) ;
330+ var decipher = cryp . createDecipheriv ( json . crypto . cipher , derivedKey . slice ( 0 , 16 ) , Buffer . from ( json . crypto . cipherparams . iv , 'hex' ) ) ;
331331 var seed = '0x' + Buffer . concat ( [ decipher . update ( ciphertext ) , decipher . final ( ) ] ) . toString ( 'hex' ) ;
332332
333333 return this . privateKeyToAccount ( seed ) ;
@@ -351,13 +351,13 @@ Accounts.prototype.encrypt = function (privateKey, password, options) {
351351 if ( kdf === 'pbkdf2' ) {
352352 kdfparams . c = options . c || 262144 ;
353353 kdfparams . prf = 'hmac-sha256' ;
354- derivedKey = cryp . pbkdf2Sync ( new Buffer ( password ) , salt , kdfparams . c , kdfparams . dklen , 'sha256' ) ;
354+ derivedKey = cryp . pbkdf2Sync ( Buffer . from ( password ) , salt , kdfparams . c , kdfparams . dklen , 'sha256' ) ;
355355 } else if ( kdf === 'scrypt' ) {
356356 // FIXME: support progress reporting callback
357357 kdfparams . n = options . n || 8192 ; // 2048 4096 8192 16384
358358 kdfparams . r = options . r || 8 ;
359359 kdfparams . p = options . p || 1 ;
360- derivedKey = scryptsy ( new Buffer ( password ) , salt , kdfparams . n , kdfparams . r , kdfparams . p , kdfparams . dklen ) ;
360+ derivedKey = scryptsy ( Buffer . from ( password ) , salt , kdfparams . n , kdfparams . r , kdfparams . p , kdfparams . dklen ) ;
361361 } else {
362362 throw new Error ( 'Unsupported kdf' ) ;
363363 }
@@ -367,9 +367,9 @@ Accounts.prototype.encrypt = function (privateKey, password, options) {
367367 throw new Error ( 'Unsupported cipher' ) ;
368368 }
369369
370- var ciphertext = Buffer . concat ( [ cipher . update ( new Buffer ( account . privateKey . replace ( '0x' , '' ) , 'hex' ) ) , cipher . final ( ) ] ) ;
370+ var ciphertext = Buffer . concat ( [ cipher . update ( Buffer . from ( account . privateKey . replace ( '0x' , '' ) , 'hex' ) ) , cipher . final ( ) ] ) ;
371371
372- var mac = utils . sha3 ( Buffer . concat ( [ derivedKey . slice ( 16 , 32 ) , new Buffer ( ciphertext , 'hex' ) ] ) ) . replace ( '0x' , '' ) ;
372+ var mac = utils . sha3 ( Buffer . concat ( [ derivedKey . slice ( 16 , 32 ) , Buffer . from ( ciphertext , 'hex' ) ] ) ) . replace ( '0x' , '' ) ;
373373
374374 return {
375375 version : 3 ,
0 commit comments