You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: schema/bom-1.7.proto
+196-9Lines changed: 196 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -2078,6 +2078,8 @@ message CryptoProperties {
2078
2078
CRYPTO_PRIMITIVE_AE=14;
2079
2079
// A combiner aggregates many candidates for a cryptographic primitive and generates a new candidate for the same primitive.
2080
2080
CRYPTO_PRIMITIVE_COMBINER=15;
2081
+
// Key-wrap is a cryptographic technique used to securely encrypt and protect cryptographic keys using algorithms like AES.
2082
+
CRYPTO_PRIMITIVE_KEY_WRAP=16;
2081
2083
}
2082
2084
2083
2085
// Execution Environment
@@ -2209,6 +2211,41 @@ message CryptoProperties {
2209
2211
optionalint32nistQuantumSecurityLevel=11;
2210
2212
} // end of AlgorithmProperties
2211
2213
2214
+
// Certificate State
2215
+
messageCertificateState {
2216
+
// Pre-defined certificate states
2217
+
enumPredefinedState {
2218
+
// ProtoBuff's default value
2219
+
PREDEFINED_STATE_UNSPECIFIED=0;
2220
+
// The certificate has been issued by the issuing certificate authority (CA) but has not been authorized for use.
2221
+
PREDEFINED_STATE_PRE_ACTIVATION=1;
2222
+
// The certificate may be used to cryptographically protect information, cryptographically process previously protected information, or both.
2223
+
PREDEFINED_STATE_ACTIVE=2;
2224
+
// The use of a certificate may be suspended for several possible reasons.
2225
+
PREDEFINED_STATE_SUSPENDED=3;
2226
+
// Certificates in the deactivated state shall not be used to apply cryptographic protection but, in some cases, may be used to process cryptographically protected information.
2227
+
PREDEFINED_STATE_DEACTIVATED=4;
2228
+
// A revoked certificate is a digital certificate that has been invalidated by the issuing certificate authority (CA) before its scheduled expiration date.
2229
+
PREDEFINED_STATE_REVOKED=5;
2230
+
// The certificate has been destroyed.
2231
+
PREDEFINED_STATE_DESTROYED=6;
2232
+
}
2233
+
2234
+
// A reason for the certificate being in this state.
2235
+
optionalstringreason=1;
2236
+
2237
+
// The state can be either a predefined state or a custom state
2238
+
oneofstate {
2239
+
// A pre-defined state in the certificate lifecycle.
2240
+
PredefinedStatepredefined_state=2;
2241
+
// The name of the certificate lifecycle state for custom states.
2242
+
stringname=3;
2243
+
}
2244
+
2245
+
// The description of the certificate lifecycle state (only used with custom states).
// The date and time according to ISO-8601 standard from which the certificate is not valid anymore
2221
2258
optionalgoogle.protobuf.TimestampnotValidAfter=4;
2222
-
// The bom-ref to signature algorithm used by the certificate
2259
+
// [DEPRECATED] Use relatedCryptographicAssets instead. The bom-ref to signature algorithm used by the certificate
2223
2260
optionalstringsignatureAlgorithmRef=5;
2224
-
// The bom-ref to the public key of the subject
2261
+
// [DEPRECATED] Use relatedCryptographicAssets instead. The bom-ref to the public key of the subject
2225
2262
optionalstringsubjectPublicKeyRef=6;
2226
2263
// The format of the certificate. Examples include X.509, PEM, DER, and CVC.
2227
2264
optionalstringcertificateFormat=7;
2228
-
// The file extension of the certificate. Examples include crt, pem, cer, der, and p12.
2265
+
// [DEPRECATED] Use certificateFileExtension instead. The file extension of the certificate. Examples include crt, pem, cer, der, and p12.
2229
2266
optionalstringcertificateExtension=8;
2267
+
// The serial number is a unique identifier for the certificate issued by a CA.
2268
+
optionalstringserialNumber=9;
2269
+
// The file extension of the certificate. Examples include crt, pem, cer, der, and p12.
2270
+
optionalstringcertificateFileExtension=10;
2271
+
// The fingerprint is a cryptographic hash of the certificate excluding it's signature.
2272
+
optionalHashfingerprint=11;
2273
+
// The certificate lifecycle is a comprehensive process that manages digital certificates from their initial creation to eventual expiration or revocation. It typically involves several stages.
2274
+
repeatedCertificateStatecertificateState=12;
2275
+
// The date and time (timestamp) when the certificate was created or pre-activated.
2276
+
optionalgoogle.protobuf.TimestampcreationDate=13;
2277
+
// The date and time (timestamp) when the certificate was activated.
// A certificate extension is an optional field that provides additional information about the certificate or its use. Extensions are used to convey additional information beyond the standard fields.
// A list of common identifiers for the cipher suite. For example: 0xC0 and 0x9E
2338
2477
repeatedstringidentifiers=3;
2478
+
// A list of TLS named groups (formerly known as curves) for this cipher suite. These groups define the parameters for key exchange algorithms like ECDHE.
2479
+
repeatedstringtlsGroups=4;
2480
+
// A list of signature schemes supported for cipher suite. These schemes specify the algorithms used for digital signatures in TLS handshakes and certificate verification.
2481
+
repeatedstringtlsSignatureSchemes=5;
2482
+
}
2483
+
2484
+
// Encryption Algorithm (ENCR)
2485
+
messageIkeV2Enc {
2486
+
// A name for the encryption method
2487
+
optionalstringname=1;
2488
+
// The key length of the encryption algorithm
2489
+
optionalint32keyLength=2;
2490
+
// The bom-ref to algorithm cryptographic asset
2491
+
optionalstringalgorithm=3;
2492
+
}
2493
+
2494
+
// Pseudorandom Function (PRF)
2495
+
messageIkeV2Prf {
2496
+
// A name for the pseudorandom function
2497
+
optionalstringname=1;
2498
+
// The bom-ref to algorithm cryptographic asset
2499
+
optionalstringalgorithm=2;
2500
+
}
2501
+
2502
+
// Integrity Algorithm (INTEG)
2503
+
messageIkeV2Integ {
2504
+
// A name for the integrity algorithm
2505
+
optionalstringname=1;
2506
+
// The bom-ref to algorithm cryptographic asset
2507
+
optionalstringalgorithm=2;
2508
+
}
2509
+
2510
+
// Key Exchange Method (KE)
2511
+
messageIkeV2Ke {
2512
+
// A group identifier for the key exchange algorithm
2513
+
optionalint32group=1;
2514
+
// The bom-ref to algorithm cryptographic asset
2515
+
optionalstringalgorithm=2;
2516
+
}
2517
+
2518
+
// IKEv2 Authentication method
2519
+
messageIkeV2Auth {
2520
+
// A name for the authentication method
2521
+
optionalstringname=1;
2522
+
// The bom-ref to algorithm cryptographic asset
2523
+
optionalstringalgorithm=2;
2339
2524
}
2340
2525
2341
2526
// IKEv2 Transform Types
2342
2527
messageIkev2TransformTypes {
2343
2528
// Transform Type 1: encryption algorithms
2344
-
repeatedstringencr=1;
2529
+
repeatedIkeV2Encencr=1;
2345
2530
// Transform Type 2: pseudorandom functions
2346
-
repeatedstringprf=2;
2531
+
repeatedIkeV2Prfprf=2;
2347
2532
// Transform Type 3: integrity algorithms
2348
-
repeatedstringinteg=3;
2533
+
repeatedIkeV2Integinteg=3;
2349
2534
// Transform Type 4: Key Exchange Method (KE) per RFC9370, formerly called Diffie-Hellman Group (D-H)
2350
-
repeatedstringke=4;
2535
+
repeatedIkeV2Keke=4;
2351
2536
// Specifies if an Extended Sequence Number (ESN) is used.
2352
2537
optionalboolesn=5;
2353
2538
// IKEv2 Authentication method
2354
-
repeatedstringauth=6;
2539
+
repeatedIkeV2Authauth=6;
2355
2540
}
2356
2541
2357
2542
// The concrete protocol type.
@@ -2364,6 +2549,8 @@ message CryptoProperties {
2364
2549
optionalIkev2TransformTypesikev2TransformTypes=4;
2365
2550
// The bom-ref(s) to protocol-related cryptographic assets
2366
2551
repeatedstringcryptoRef=5;
2552
+
// A list of cryptographic assets related to this component.
// Cryptographic assets occur in several forms. Algorithms and protocols are most commonly implemented in specialized cryptographic libraries. They may, however, also be 'hardcoded' in software components. Certificates and related cryptographic material like keys, tokens, secrets or passwords are other cryptographic assets to be modelled.
0 commit comments