Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove TODOs to put into github issues #195

Merged
merged 2 commits into from
Jul 22, 2020

Conversation

@@ -381,10 +381,6 @@ and MUST release the message footer.
The encrypted message outputted by this operation MUST have a message footer equal
to the message footer calculated in this step.

## Security Considerations

[TODO]
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.


## Security Considerations

[TODO]
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@@ -345,5 +341,3 @@ C051AD55 A437F6BC 139E9E55 6199FD60
B66B6A5A 80FDB433 8A48D6A4 21CB
811234FD 8D589683 51F6F39A 040B3E3B Final Frame, Authentication Tag
```

### TODO - ADD example for single frame
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@@ -191,10 +191,6 @@ It is used to authenticate the final frame.
The authentication tag length MUST be equal to the authentication tag length of the algorithm suite
specified by the [Algorithm Suite ID](message-header.md#algorithm-suite-id) field.

## Test Vectors

[TODO](https://github.com/awslabs/aws-crypto-tools-test-vector-framework)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@@ -100,7 +100,7 @@ The purpose of the message ID is to:
- protect against accidental reuse of a derived data key or the wearing out of derived data keys in
the AWS Encryption SDK
- uniquely identify the [message](message.md)
- bind the message header to the [message body](message-body.md) [TODO "bind" wording]
- bind the message header to the [message body](message-body.md)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Leaving word as is. Exactly what security property is associated with this word will be addressed as part of #200

@@ -173,10 +173,6 @@ the caching CMM MUST add the decryption materials obtained from the underlying C
If the [algorithm suite](algorithm-suites.md) requested contains an Identity KDF,
the caching CMM MUST NOT store the decryption materials in the underlying CMC.

## Security Considerations

[TODO: What security properties can the caching CMM guarantee?]
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@@ -386,11 +386,6 @@ These goals can be reduced to the following two requirements:
that is an error and encryption MUST halt.
1. On decrypt, the keyring MUST NOT halt decryption because of a failure to decrypt.

## Security Considerations

[TODO: What security properties are guaranteed by this keyring? Also, note how the security properties
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@@ -118,9 +118,6 @@ still do not contain a plaintext data key:

## Security Considerations

TODO: what security guarantees does this keyring have?
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

#12


## Security Considerations

[TODO: What security properties are guaranteed by this keyring]
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.


## Security Considerations

[TODO: What security properties does this keyring guarantee?]
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lavaleri lavaleri merged commit 01fd996 into awslabs:master Jul 22, 2020
@lavaleri lavaleri deleted the remove-todos branch July 22, 2020 21:11
lavaleri added a commit to lavaleri/aws-encryption-sdk-specification that referenced this pull request Jul 22, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants