evp_bytestokey
Advanced tools
The insecure key derivation algorithm from OpenSSL
Weekly downloads
Readme
The insecure key derivation algorithm from OpenSSL.
WARNING: DO NOT USE, except for compatibility reasons.
MD5 is insecure.
Use at least scrypt
or pbkdf2-hmac-sha256
instead.
EVP_BytesToKey(password, salt, keyLen, ivLen)
password
- Buffer
, password used to derive the key data.salt
- 8 byte Buffer
or null
, salt is used as a salt in the derivation.keyBits
- number
, key length in bits.ivLen
- number
, iv length in bytes.Returns: { key: Buffer, iv: Buffer }
MD5 with aes-256-cbc
:
const crypto = require('crypto')
const EVP_BytesToKey = require('evp_bytestokey')
const result = EVP_BytesToKey(
'my-secret-password',
null,
32,
16
)
// =>
// { key: <Buffer e3 4f 96 f3 86 24 82 7c c2 5d ff 23 18 6f 77 72 54 45 7f 49 d4 be 4b dd 4f 6e 1b cc 92 a4 27 33>,
// iv: <Buffer 85 71 9a bf ae f4 1e 74 dd 46 b6 13 79 56 f5 5b> }
const cipher = crypto.createCipheriv('aes-256-cbc', result.key, result.iv)
The insecure key derivation algorithm from OpenSSL
The npm package evp_bytestokey receives a total of 9,638,420 weekly downloads. As such, evp_bytestokey popularity was classified as popular.
We found that evp_bytestokey demonstrated a not healthy version release cadence and project activity. It has 2 open source maintainers collaborating on the project.