doc: move support for invalid GCM tags to EOL

PR-URL: https://github.com/nodejs/node/pull/17825
Refs: https://github.com/nodejs/node/issues/17523
Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
Reviewed-By: Joyee Cheung <joyeec9h3@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
This commit is contained in:
Tobias Nießen 2018-04-11 13:52:51 +02:00 committed by James M Snell
parent cf350856cf
commit 985d180855

View File

@ -823,14 +823,13 @@ same as the legacy assert but it will always use strict equality checks.
<a id="DEP0090"></a> <a id="DEP0090"></a>
### DEP0090: Invalid GCM authentication tag lengths ### DEP0090: Invalid GCM authentication tag lengths
Type: Runtime Type: End-of-Life
Node.js supports all GCM authentication tag lengths which are accepted by Node.js used to support all GCM authentication tag lengths which are accepted by
OpenSSL when calling [`decipher.setAuthTag()`][]. This behavior will change in OpenSSL when calling [`decipher.setAuthTag()`][]. Beginning with node REPLACEME,
a future version at which point only authentication tag lengths of 128, 120, only authentication tag lengths of 128, 120, 112, 104, 96, 64, and 32 bits are
112, 104, 96, 64, and 32 bits will be allowed. Authentication tags whose length allowed. Authentication tags whose length is not included in this list are
is not included in this list will be considered invalid in compliance with considered invalid in compliance with [NIST SP 800-38D][].
[NIST SP 800-38D][].
<a id="DEP0091"></a> <a id="DEP0091"></a>
### DEP0091: crypto.DEFAULT_ENCODING ### DEP0091: crypto.DEFAULT_ENCODING