Skip to content

Commit 2bb8bae

Browse files
Correcting optional state for crypto assetType
Signed-off-by: Steve Springett <[email protected]>
1 parent f34a832 commit 2bb8bae

File tree

3 files changed

+5
-2
lines changed

3 files changed

+5
-2
lines changed

schema/bom-1.6.proto

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2188,7 +2188,7 @@ message CryptoProperties {
21882188
optional Ikev2TransformTypes ikev2TransformTypes = 4;
21892189
} // end of ProtocolProperties
21902190
// Cryptographic assets occur in several forms. Algorithms and protocols are most commonly implemented in specialized cryptographic libraries. They may, however, also be 'hardcoded' in software components. Certificates and related cryptographic material like keys, tokens, secrets or passwords are other cryptographic assets to be modelled.
2191-
optional CryptoAssetType assetType = 1;
2191+
CryptoAssetType assetType = 1;
21922192
// Additional properties specific to a cryptographic algorithm.
21932193
optional AlgorithmProperties algorithmProperties = 2;
21942194
// Properties for cryptographic assets of asset type 'certificate'

schema/bom-1.6.schema.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5020,6 +5020,9 @@
50205020
"title": "Cryptographic Properties",
50215021
"description": "Cryptographic assets have properties that uniquely define them and that make them actionable for further reasoning. As an example, it makes a difference if one knows the algorithm family (e.g. AES) or the specific variant or instantiation (e.g. AES-128-GCM). This is because the security level and the algorithm primitive (authenticated encryption) are only defined by the definition of the algorithm variant. The presence of a weak cryptographic algorithm like SHA1 vs. HMAC-SHA1 also makes a difference.",
50225022
"additionalProperties": false,
5023+
"required": [
5024+
"assetType"
5025+
],
50235026
"properties": {
50245027
"assetType": {
50255028
"type": "string",

schema/bom-1.6.xsd

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6176,7 +6176,7 @@ limitations under the License.
61766176
</xs:documentation>
61776177
</xs:annotation>
61786178
<xs:sequence>
6179-
<xs:element name="assetType" minOccurs="0" maxOccurs="1">
6179+
<xs:element name="assetType" minOccurs="1" maxOccurs="1">
61806180
<xs:annotation>
61816181
<xs:documentation>
61826182
Cryptographic assets occur in several forms. Algorithms and protocols are most commonly

0 commit comments

Comments
 (0)