Skip to content

Commit e8be423

Browse files
MiguelCompanymergify[bot]
authored andcommitted
Document new transmit_algorithms_as_legacy on builtin security plugins (#974)
* Refs #19925. Add documentation of new property in PKIDH. Signed-off-by: Miguel Company <miguelcompany@eprosima.com> * Refs #19925. Add documentation of new property in Permissions. Signed-off-by: Miguel Company <miguelcompany@eprosima.com> * Apply suggestions from code review Co-authored-by: Mario Domínguez López <116071334+Mario-DL@users.noreply.github.com> Signed-off-by: Miguel Company <miguelcompany@eprosima.com> --------- Signed-off-by: Miguel Company <miguelcompany@eprosima.com> Co-authored-by: Mario Domínguez López <116071334+Mario-DL@users.noreply.github.com> (cherry picked from commit cc95496) # Conflicts: # code/DDSCodeTester.cpp # code/XMLTester.xml # docs/fastdds/property_policies/security.rst # docs/fastdds/security/auth_plugin/auth_plugin.rst
1 parent d6af1b7 commit e8be423

File tree

5 files changed

+56
-0
lines changed

5 files changed

+56
-0
lines changed

code/DDSCodeTester.cpp

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -593,6 +593,15 @@ void dds_domain_examples()
593593
pqos.properties().properties().emplace_back(
594594
"dds.sec.auth.builtin.PKI-DH.password",
595595
"domainParticipantPassword");
596+
<<<<<<< HEAD
597+
=======
598+
pqos.properties().properties().emplace_back(
599+
"dds.sec.auth.builtin.PKI-DH.preferred_key_agreement",
600+
"ECDH");
601+
pqos.properties().properties().emplace_back(
602+
"dds.sec.auth.builtin.PKI-DH.transmit_algorithms_as_legacy",
603+
"true");
604+
>>>>>>> cc95496 (Document new `transmit_algorithms_as_legacy` on builtin security plugins (#974))
596605
//!--
597606
}
598607
{
@@ -628,6 +637,9 @@ void dds_domain_examples()
628637
pqos.properties().properties().emplace_back(
629638
"dds.sec.access.builtin.Access-Permissions.permissions",
630639
"file://certs/permissions.smime");
640+
pqos.properties().properties().emplace_back(
641+
"dds.sec.access.builtin.Access-Permissions.transmit_algorithms_as_legacy",
642+
"true");
631643
//!--
632644
}
633645
{

code/XMLTester.xml

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3108,6 +3108,17 @@
31083108
<name>dds.sec.auth.builtin.PKI-DH.password</name>
31093109
<value>domainParticipantPassword</value>
31103110
</property>
3111+
<<<<<<< HEAD
3112+
=======
3113+
<property>
3114+
<name>dds.sec.auth.builtin.PKI-DH.preferred_key_agreement</name>
3115+
<value>ECDH</value>
3116+
</property>
3117+
<property>
3118+
<name>dds.sec.auth.builtin.PKI-DH.transmit_algorithms_as_legacy</name>
3119+
<value>true</value>
3120+
</property>
3121+
>>>>>>> cc95496 (Document new `transmit_algorithms_as_legacy` on builtin security plugins (#974))
31113122
</properties>
31123123
</propertiesPolicy>
31133124
</rtps>
@@ -3160,6 +3171,10 @@
31603171
<name>dds.sec.access.builtin.Access-Permissions.permissions</name>
31613172
<value>file://permissions.smime</value>
31623173
</property>
3174+
<property>
3175+
<name>dds.sec.access.builtin.Access-Permissions.transmit_algorithms_as_legacy</name>
3176+
<value>true</value>
3177+
</property>
31633178
</properties>
31643179
</propertiesPolicy>
31653180
</rtps>

docs/fastdds/property_policies/security.rst

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,19 @@ The following table outlines the properties used for the :ref:`DDS\:Auth\:PKI-DH
4242
If the *password* property is not present, then the value supplied in the |br|
4343
*private_key* property must contain the decrypted private key. |br|
4444
The *password* property is ignored if the *private_key* is given in PKCS#11 scheme.
45+
<<<<<<< HEAD
46+
=======
47+
* - ``preferred_key_agreement`` *(optional)*
48+
- The preferred algorithm to use for generating the session's shared secret |br|
49+
at the end of the authentication phase. Supported values are: |br|
50+
a) ``DH``, ``DH+MODP-2048-256`` for Diffie-Hellman Ephemeral with 2048-bit MODP Group parameters. |br|
51+
b) ``ECDH``, ``ECDH+prime256v1-CEUM`` for Elliptic Curve Diffie-Hellman Ephemeral with the NIST P-256 curve. |br|
52+
c) ``AUTO`` for selecting the key agreement based on the signature algorithm in the Identity CA's certificate. |br|
53+
Will default to ``AUTO`` if the property is not present.
54+
* - ``transmit_algorithms_as_legacy`` *(optional)*
55+
- Whether to transmit algorithm identifiers in non-standard legacy format. |br|
56+
Will default to ``false`` if the property is not present.
57+
>>>>>>> cc95496 (Document new `transmit_algorithms_as_legacy` on builtin security plugins (#974))
4558

4659
.. note::
4760
All properties listed above have the ``dds.sec.auth.builtin.PKI-DH."`` prefix.

docs/fastdds/security/access_control_plugin/access_control_plugin.rst

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,9 @@ The following table outlines the properties used for the DDS\:Access\:Permission
5555
* - permissions
5656
- URI to the Participant permissions document signed by the |br| Permissions CA in S/MIME format. |br|
5757
Supported URI schemes: file.
58+
* - transmit_algorithms_as_legacy *(optional)*
59+
- Whether to transmit algorithm identifiers in non-standard legacy format. |br|
60+
Will default to ``false`` if the property is not present.
5861

5962
.. note::
6063
All listed properties have "dds.sec.access.builtin.Access-Permissions." prefix.

docs/fastdds/security/auth_plugin/auth_plugin.rst

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,19 @@ The following table outlines the properties used for the DDS:\Auth\:PKI-DH plugi
5656
If the *password* property is not present, then the value supplied in the |br|
5757
*private_key* property must contain the decrypted private key. |br|
5858
The *password* property is ignored if the *private_key* is given in PKCS#11 scheme.
59+
<<<<<<< HEAD
60+
=======
61+
* - preferred_key_agreement *(optional)*
62+
- The preferred algorithm to use for generating the session's shared secret |br|
63+
at the end of the authentication phase. Supported values are: |br|
64+
a) ``DH``, ``DH+MODP-2048-256`` for Diffie-Hellman Ephemeral with 2048-bit MODP Group parameters. |br|
65+
b) ``ECDH``, ``ECDH+prime256v1-CEUM`` for Elliptic Curve Diffie-Hellman Ephemeral with the NIST P-256 curve. |br|
66+
c) ``AUTO`` for selecting the key agreement based on the signature algorithm in the Identity CA's certificate. |br|
67+
Will default to ``AUTO`` if the property is not present.
68+
* - transmit_algorithms_as_legacy *(optional)*
69+
- Whether to transmit algorithm identifiers in non-standard legacy format. |br|
70+
Will default to ``false`` if the property is not present.
71+
>>>>>>> cc95496 (Document new `transmit_algorithms_as_legacy` on builtin security plugins (#974))
5972

6073
.. note::
6174
All listed properties have "dds.sec.auth.builtin.PKI-DH." prefix.

0 commit comments

Comments
 (0)