| // Copyright 2021 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| // Proto definitions supporting the Chrome Root Store. |
| // This file should be manually kept in sync with the corresponding google3 |
| // file. |
| |
| syntax = "proto3"; |
| |
| package chrome_root_store; |
| |
| // Specifies a set of constraints, all of which that have values must be |
| // satisfied for the ConstraintSet to be satisfied. |
| message ConstraintSet { |
| // The leaf certificate must have at least one valid SCT timestamp that is |
| // not after the specified value, specified in seconds since the unix epoch. |
| optional int64 sct_not_after_sec = 1; |
| |
| // The leaf certificate must have at least one valid SCT timestamp and all |
| // valid SCT timestamps must be after the specified value, specified in |
| // seconds since the unix epoch. |
| optional int64 sct_all_after_sec = 2; |
| |
| // The browser version must be equal to or greater than the specified version. |
| // Specified as a dotted version string, for example, "121.0.6167.160". A |
| // partial version is also allowed, for example min_version="121" will match |
| // any M-121 version or later. |
| optional string min_version = 3; |
| |
| // The browser version must be less than the specified version. |
| // For example, max_version_exclusive="122" will match any M-121 or earlier |
| // version, and will not match any M-122 version. |
| optional string max_version_exclusive = 4; |
| |
| // All DNS names in the leaf certificate subjectAltNames must fall within the |
| // subtrees defined by `permitted_dns_names`. The constraints are interpereted |
| // as described in RFC 5280 section 4.2.1.10. |
| repeated string permitted_dns_names = 5; |
| |
| // `enforce_anchor_expiry` and `enforce_anchor_constraints` were briefly |
| // represented in this message, but moved to TrustAnchor. |
| reserved 6, 7; |
| } |
| |
| message TrustAnchor { |
| // The human-editable textproto version of the root store references roots in |
| // a separate file by SHA-256 hash for convenience. It is converted to the DER |
| // representation as part of the build process. |
| oneof certificate { |
| bytes der = 1; |
| string sha256_hex = 2; |
| } |
| |
| // OID should be expressed as dotted-decimal text (e.g. "1.3.159.1.17.1") |
| repeated string ev_policy_oids = 3; |
| |
| // If not empty, the anchor is only trusted if at least one of the |
| // ConstraintSets is satisfied. |
| repeated ConstraintSet constraints = 4; |
| |
| // Human-readable display name used to identify the certificate. |
| optional string display_name = 5; |
| |
| // If true, indicates that this certificate is trusted to issue QWACs. |
| optional bool eutl = 6; |
| |
| reserved 7; |
| |
| // When set to true, Chrome will enforce certificate expiry for this |
| // TrustAnchor using the notBefore and notAfter from the corresponding |
| // certificate. |
| optional bool enforce_anchor_expiry = 8; |
| |
| // When set to true, Chrome will enforce X.509 constraints for this |
| // TrustAnchor using the constraints expressed in the corresponding |
| // certificate. |
| optional bool enforce_anchor_constraints = 9; |
| |
| // If true, indicates that this certificate is a trust anchor for TLS |
| // connections. |
| optional bool tls_trust_anchor = 10; |
| |
| // A unique identifier for a trust anchor, in binary representation. |
| // Specified in |
| // https://www.ietf.org/archive/id/draft-ietf-tls-trust-anchor-ids-00.html, |
| // Trust Anchor IDs are represented as relative OID suffixes of the Private |
| // Enterprise Number (PEN) OID prefix of "1.3.6.1.4.1.". |
| optional bytes trust_anchor_id = 11; |
| } |
| |
| // Message storing a complete Chrome Root Store. |
| message RootStore { |
| // Certificates in this list are expected to have |tls_trust_anchor| unset, |
| // because all |trust_anchors| are TLS trust anchors. This field exists as a |
| // separate, TLS-trust-anchor-only list from |additional_certs| just for |
| // historical reasons. |
| repeated TrustAnchor trust_anchors = 1; |
| |
| // Major version # of the Chrome Root Store. It is assumed that if |
| // root_store_1.version_major > root_store_2.version_major, then root_store_1 |
| // is newer and should be preferred over root_store_2. |
| int64 version_major = 2; |
| |
| // Additional certificates that are shipped as part of the Chrome Root Store |
| // but convey different trust information than those in trust_anchors. |
| repeated TrustAnchor additional_certs = 3; |
| } |