doc: correct pbkdf2 salt length recommendation

According to the linked document: "The length of the randomly-generated
portion of the salt shall be at least 128 bits." [NIST SP 800-132]

PR-URL: https://github.com/nodejs/node/pull/17524
Reviewed-By: Tobias Nießen <tniessen@tnie.de>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: Daniel Bevenius <daniel.bevenius@gmail.com>
Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
This commit is contained in:
Will Clark 2017-12-07 13:06:41 +01:00 committed by Tobias Nießen
parent a893e79a69
commit 560c18238b
No known key found for this signature in database
GPG Key ID: 718207F8FD156B70

View File

@ -1622,7 +1622,7 @@ higher the number of iterations, the more secure the derived key will be,
but will take a longer amount of time to complete.
The `salt` should also be as unique as possible. It is recommended that the
salts are random and their lengths are greater than 16 bytes. See
salts are random and their lengths are at least 16 bytes. See
[NIST SP 800-132][] for details.
Example:
@ -1686,7 +1686,7 @@ higher the number of iterations, the more secure the derived key will be,
but will take a longer amount of time to complete.
The `salt` should also be as unique as possible. It is recommended that the
salts are random and their lengths are greater than 16 bytes. See
salts are random and their lengths are at least 16 bytes. See
[NIST SP 800-132][] for details.
Example: