-
Key: DDSSEC12-55
-
Status: closed
-
Source: Object Computing, Inc. - OCI ( Mr. Adam Mitz)
-
Summary:
In the definition of the various Handshake Tokens, certain property values are specified with literal strings in the spec (such as "RSASSA-PSA-SHA256"). Since these are inserted into binary_properties, the spec should describe the encoding: is there a length prefix (like CDR string?), is there a trailing nul (like CDR string?), assume the encoding is ASCII but it would be good to specify this.
-
Reported: DDS-SECURITY 1.1b1 — Wed, 11 Apr 2018 18:24 GMT
-
Disposition: Duplicate or Merged — DDS-SECURITY 1.2
-
Disposition Summary:
Merge with
DDSSEC12-90DDSSEC12-90is already making similar clarifications and adds the following explanation to 7.3.3.1:When setting the BinaryProperty_t value octet sequence from an ASCII string, the length of the sequence shall be set to the number of characters in the string, counting the NUL terminating character, and each octet in the sequene shall be set to the ASCII value of the corresponding character in the string, including the NUL terminating character.
For example, if an object the string “ECDSA-SHA256” shall result in an octet sequence value with length 13 where the first octet is 0x45 (ASCII code for ‘E’) and the last octet is 0x00.So we can mark this issue as duplicate of
DDSSEC12-90 -
Updated: Mon, 17 Jun 2024 13:36 GMT
DDSSEC12 — Using string literals as binary_property values inside Handshake Tokens
- Key: DDSSEC12-55
- OMG Task Force: DDS Security 1.2 RTF