From a65b0b90c96546a33b0c9d52c9c7024df201d6b1 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Tobias=20Nie=C3=9Fen?= Date: Sun, 21 Jan 2018 14:13:38 +0100 Subject: [PATCH] doc: use PBKDF2 in text MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Use upper case variant in text in compliance with RFC 2898. PR-URL: https://github.com/nodejs/node/pull/18279 Reviewed-By: Michaƫl Zasso Reviewed-By: Vladimir Kurchatkin Reviewed-By: Ruben Bridgewater --- doc/api/crypto.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/doc/api/crypto.md b/doc/api/crypto.md index d873ac578342f1..b9f3b95c0a9c96 100644 --- a/doc/api/crypto.md +++ b/doc/api/crypto.md @@ -1260,7 +1260,7 @@ password always creates the same key. The low iteration count and non-cryptographically secure hash algorithm allow passwords to be tested very rapidly. -In line with OpenSSL's recommendation to use pbkdf2 instead of +In line with OpenSSL's recommendation to use PBKDF2 instead of [`EVP_BytesToKey`][] it is recommended that developers derive a key and IV on their own using [`crypto.pbkdf2()`][] and to use [`crypto.createCipheriv()`][] to create the `Cipher` object. Users should not use ciphers with counter mode @@ -1322,7 +1322,7 @@ password always creates the same key. The low iteration count and non-cryptographically secure hash algorithm allow passwords to be tested very rapidly. -In line with OpenSSL's recommendation to use pbkdf2 instead of +In line with OpenSSL's recommendation to use PBKDF2 instead of [`EVP_BytesToKey`][] it is recommended that developers derive a key and IV on their own using [`crypto.pbkdf2()`][] and to use [`crypto.createDecipheriv()`][] to create the `Decipher` object.