5.4. Cryptography

5.4.1. [Major] Non-random initial session ID for entities other than Secure Key Exchange Channel

For entities other than the Secure Key Exchange Channel, the initial Session ID was always set to 0x00000001. This behavior violated section 9.5.3.3.2 of the DDS Security specification, which states that the Session ID is initially a random value.

The initial Session ID is now a random value for all entities.

[RTI Issue ID SEC-2220]

5.4.2. [Major] Memory leak when calling set_qos() without changing pre-shared key seed ID *

A memory leak happened if Pre-Shared Key Protection was enabled and the DomainParticipant’s set_qos() API was called without changing the value of the cryptography.rtps_protection_preshared_key property. The number of bytes leaked was the same as the length of the pre-shared key seed. This issue affects the Security Plugins 7.2.0 release.

[RTI Issue ID SEC-2292]



* This bug does not affect you if you are upgrading from 6.1.x or earlier.