-
Key: DDSSEC11-122
-
Status: closed
-
Source: Real-Time Innovations ( Dr. Gerardo Pardo-Castellote, Ph.D.)
-
Summary:
The fact that we are calling encode_serialized_submessage on top of the result of encode_serialized_payload allows the use of different key material. This is in fact needed to support the relay mode.
However the spec is confusing regarding this. In several places (e.g. register_local_datawriter in Table 55) and likewise in create_local_datawroter_cryptotokens seems to indicate that a single KeyMaterial is created.
This should all be clarified so it is possible to use separate key material for the two operations.
Seems like this should be stated in register_local_datawriter and register_matched_remote_datareader
-
Reported: DDS-SECURITY 1.0 — Tue, 18 Jul 2017 14:33 GMT
-
Disposition: Duplicate or Merged — DDS-SECURITY 1.1
-
Disposition Summary:
Duplicates
DDSSEC11-11(and its resolution)This issue is already handled by the resolution of
DDSSEC11-14(DDSSEC11-126) -
Updated: Tue, 19 Dec 2017 20:03 GMT
DDSSEC11 — Spec does not explain how t would use different keys for the encode_serialized_payload versus encode_serialized_submessage
- Key: DDSSEC11-122
- OMG Task Force: DDS Security 1.1 RTF