A bound value is a reference
that points to an element that is included in a cryptographic binding. A bound
value is only meaningful in the context of a BoundValueList.
Used to indicate whether or
not to include element StatementMetadata when referencing an Assertion. In the
case of signatures and binding, this attribute indicates whether or not the
statement metadata is covered by the signature or binding. If not, it cannot be
cryptographically verified and should be considered informative only.
IncludesStatementMetadata should never be set on SignatureValue if there is a
boundValueList, because the BoundValue elements in the list each have their own
explicit includesStatementMetadata attribute.
A URI that provides guidance
on how to format the included values such as whitespace, attributes, and child
nodes in a universally consistent manner. The normalization method is essential
to prevent formatting such as whitespace and order from interfering with the
validation of the cryptographic integrity of data.
Source
<xs:complexType name="BoundValueType"><xs:annotation><xs:documentation><p xmlns="http://www.w3.org/1999/xhtml" ism:classification="U" ism:ownerProducer="USA">A bound value is a reference that points to an element that is included in a cryptographic binding. A bound value is only meaningful in the context of a BoundValueList.</p></xs:documentation></xs:annotation><xs:simpleContent><xs:extension base="xs:base64Binary"><xs:attribute ref="idRef" use="required"/><xs:attribute name="hashAlgorithm" type="tdfhashal:CVEnumTDFHashAlgorithm" use="required"><xs:annotation><xs:documentation><p xmlns="http://www.w3.org/1999/xhtml" ism:classification="U" ism:ownerProducer="USA">The hash algorithm used in the cryptographic binding.</p></xs:documentation></xs:annotation></xs:attribute><xs:attribute ref="normalizationMethod" use="required"/><xs:attribute ref="includesStatementMetadata" use="optional"/></xs:extension></xs:simpleContent></xs:complexType>
Schema location
IC-TDF.xsd Copy and paste this link to your file browser, clicking the link MAY open in the browser. Opening in an XML aware editor is best.
Secure Hash Algorithm (SHA) with a 160 bit message digest. SHA-1 is the most widely
used of the existing SHA hash functions, and is employed in several widely used applications
and protocols.
enumeration
SHA256
Secure Hash Algorithm (SHA) with a 256 bit message digest.
enumeration
SHA384
Secure Hash Algorithm (SHA) with a 384 bit message digest.
enumeration
SHA512
Secure Hash Algorithm (SHA) with a 512 bit message digest.
<xs:attribute name="hashAlgorithm" type="tdfhashal:CVEnumTDFHashAlgorithm" use="required"><xs:annotation><xs:documentation><p xmlns="http://www.w3.org/1999/xhtml" ism:classification="U" ism:ownerProducer="USA">The hash algorithm used in the cryptographic binding.</p></xs:documentation></xs:annotation></xs:attribute>
Schema location
IC-TDF.xsd Copy and paste this link to your file browser, clicking the link MAY open in the browser. Opening in an XML aware editor is best.
This document has been approved for Public Release by the Office of the Director of National Intelligence. See Distribution Notice for details.
Click Here