1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108
|
// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
// Proto definitions supporting the Chrome Root Store.
// This file should be manually kept in sync with the corresponding google3
// file.
syntax = "proto3";
package chrome_root_store;
// Specifies a set of constraints, all of which that have values must be
// satisfied for the ConstraintSet to be satisfied.
message ConstraintSet {
// The leaf certificate must have at least one valid SCT timestamp that is
// not after the specified value, specified in seconds since the unix epoch.
optional int64 sct_not_after_sec = 1;
// The leaf certificate must have at least one valid SCT timestamp and all
// valid SCT timestamps must be after the specified value, specified in
// seconds since the unix epoch.
optional int64 sct_all_after_sec = 2;
// The browser version must be equal to or greater than the specified version.
// Specified as a dotted version string, for example, "121.0.6167.160". A
// partial version is also allowed, for example min_version="121" will match
// any M-121 version or later.
optional string min_version = 3;
// The browser version must be less than the specified version.
// For example, max_version_exclusive="122" will match any M-121 or earlier
// version, and will not match any M-122 version.
optional string max_version_exclusive = 4;
// All DNS names in the leaf certificate subjectAltNames must fall within the
// subtrees defined by `permitted_dns_names`. The constraints are interpereted
// as described in RFC 5280 section 4.2.1.10.
repeated string permitted_dns_names = 5;
// `enforce_anchor_expiry` and `enforce_anchor_constraints` were briefly
// represented in this message, but moved to TrustAnchor.
reserved 6, 7;
}
message TrustAnchor {
// The human-editable textproto version of the root store references roots in
// a separate file by SHA-256 hash for convenience. It is converted to the DER
// representation as part of the build process.
oneof certificate {
bytes der = 1;
string sha256_hex = 2;
}
// OID should be expressed as dotted-decimal text (e.g. "1.3.159.1.17.1")
repeated string ev_policy_oids = 3;
// If not empty, the anchor is only trusted if at least one of the
// ConstraintSets is satisfied.
repeated ConstraintSet constraints = 4;
// Human-readable display name used to identify the certificate.
optional string display_name = 5;
// If true, indicates that this certificate is trusted to issue QWACs.
optional bool eutl = 6;
reserved 7;
// When set to true, Chrome will enforce certificate expiry for this
// TrustAnchor using the notBefore and notAfter from the corresponding
// certificate.
optional bool enforce_anchor_expiry = 8;
// When set to true, Chrome will enforce X.509 constraints for this
// TrustAnchor using the constraints expressed in the corresponding
// certificate.
optional bool enforce_anchor_constraints = 9;
// If true, indicates that this certificate is a trust anchor for TLS
// connections.
optional bool tls_trust_anchor = 10;
// A unique identifier for a trust anchor, in binary representation.
// Specified in
// https://www.ietf.org/archive/id/draft-ietf-tls-trust-anchor-ids-00.html,
// Trust Anchor IDs are represented as relative OID suffixes of the Private
// Enterprise Number (PEN) OID prefix of "1.3.6.1.4.1.".
optional bytes trust_anchor_id = 11;
}
// Message storing a complete Chrome Root Store.
message RootStore {
// Certificates in this list are expected to have |tls_trust_anchor| unset,
// because all |trust_anchors| are TLS trust anchors. This field exists as a
// separate, TLS-trust-anchor-only list from |additional_certs| just for
// historical reasons.
repeated TrustAnchor trust_anchors = 1;
// Major version # of the Chrome Root Store. It is assumed that if
// root_store_1.version_major > root_store_2.version_major, then root_store_1
// is newer and should be preferred over root_store_2.
int64 version_major = 2;
// Additional certificates that are shipped as part of the Chrome Root Store
// but convey different trust information than those in trust_anchors.
repeated TrustAnchor additional_certs = 3;
}
|