Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(303)

Side by Side Diff: net/third_party/nss/ssl/sslproto.h

Issue 21696002: Implement the AES GCM cipher suites for TLS. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Also update the ecdhe_ecdsa_suites and ecdhe_rsa_suites arrays Created 7 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 /* 1 /*
2 * Various and sundry protocol constants. DON'T CHANGE THESE. These values 2 * Various and sundry protocol constants. DON'T CHANGE THESE. These values
3 * are mostly defined by the SSL2, SSL3, or TLS protocol specifications. 3 * are mostly defined by the SSL2, SSL3, or TLS protocol specifications.
4 * Cipher kinds and ciphersuites are part of the public API. 4 * Cipher kinds and ciphersuites are part of the public API.
5 * 5 *
6 * This Source Code Form is subject to the terms of the Mozilla Public 6 * This Source Code Form is subject to the terms of the Mozilla Public
7 * License, v. 2.0. If a copy of the MPL was not distributed with this 7 * License, v. 2.0. If a copy of the MPL was not distributed with this
8 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ 8 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
9 9
10 #ifndef __sslproto_h_ 10 #ifndef __sslproto_h_
(...skipping 144 matching lines...) Expand 10 before | Expand all | Expand 10 after
155 155
156 #define TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x0084 156 #define TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x0084
157 #define TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA 0x0085 157 #define TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA 0x0085
158 #define TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA 0x0086 158 #define TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA 0x0086
159 #define TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA 0x0087 159 #define TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA 0x0087
160 #define TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x0088 160 #define TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x0088
161 #define TLS_DH_ANON_WITH_CAMELLIA_256_CBC_SHA 0x0089 161 #define TLS_DH_ANON_WITH_CAMELLIA_256_CBC_SHA 0x0089
162 162
163 #define TLS_RSA_WITH_SEED_CBC_SHA 0x0096 163 #define TLS_RSA_WITH_SEED_CBC_SHA 0x0096
164 164
165 #define TLS_RSA_WITH_AES_128_GCM_SHA256 0x009C
166
165 /* TLS "Signaling Cipher Suite Value" (SCSV). May be requested by client. 167 /* TLS "Signaling Cipher Suite Value" (SCSV). May be requested by client.
166 * Must NEVER be chosen by server. SSL 3.0 server acknowledges by sending 168 * Must NEVER be chosen by server. SSL 3.0 server acknowledges by sending
167 * back an empty Renegotiation Info (RI) server hello extension. 169 * back an empty Renegotiation Info (RI) server hello extension.
168 */ 170 */
169 #define TLS_EMPTY_RENEGOTIATION_INFO_SCSV 0x00FF 171 #define TLS_EMPTY_RENEGOTIATION_INFO_SCSV 0x00FF
170 172
171 /* Cipher Suite Values starting with 0xC000 are defined in informational 173 /* Cipher Suite Values starting with 0xC000 are defined in informational
172 * RFCs. 174 * RFCs.
173 */ 175 */
174 #define TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 176 #define TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001
(...skipping 22 matching lines...) Expand all
197 199
198 #define TLS_ECDH_anon_WITH_NULL_SHA 0xC015 200 #define TLS_ECDH_anon_WITH_NULL_SHA 0xC015
199 #define TLS_ECDH_anon_WITH_RC4_128_SHA 0xC016 201 #define TLS_ECDH_anon_WITH_RC4_128_SHA 0xC016
200 #define TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA 0xC017 202 #define TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA 0xC017
201 #define TLS_ECDH_anon_WITH_AES_128_CBC_SHA 0xC018 203 #define TLS_ECDH_anon_WITH_AES_128_CBC_SHA 0xC018
202 #define TLS_ECDH_anon_WITH_AES_256_CBC_SHA 0xC019 204 #define TLS_ECDH_anon_WITH_AES_256_CBC_SHA 0xC019
203 205
204 #define TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 206 #define TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023
205 #define TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 207 #define TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027
206 208
209 #define TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B
210 #define TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F
211
207 /* Netscape "experimental" cipher suites. */ 212 /* Netscape "experimental" cipher suites. */
208 #define SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA 0xffe0 213 #define SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA 0xffe0
209 #define SSL_RSA_OLDFIPS_WITH_DES_CBC_SHA 0xffe1 214 #define SSL_RSA_OLDFIPS_WITH_DES_CBC_SHA 0xffe1
210 215
211 /* New non-experimental openly spec'ed versions of those cipher suites. */ 216 /* New non-experimental openly spec'ed versions of those cipher suites. */
212 #define SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA 0xfeff 217 #define SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA 0xfeff
213 #define SSL_RSA_FIPS_WITH_DES_CBC_SHA 0xfefe 218 #define SSL_RSA_FIPS_WITH_DES_CBC_SHA 0xfefe
214 219
215 /* DTLS-SRTP cipher suites from RFC 5764 */ 220 /* DTLS-SRTP cipher suites from RFC 5764 */
216 /* If you modify this, also modify MAX_DTLS_SRTP_CIPHER_SUITES in sslimpl.h */ 221 /* If you modify this, also modify MAX_DTLS_SRTP_CIPHER_SUITES in sslimpl.h */
217 #define SRTP_AES128_CM_HMAC_SHA1_80 0x0001 222 #define SRTP_AES128_CM_HMAC_SHA1_80 0x0001
218 #define SRTP_AES128_CM_HMAC_SHA1_32 0x0002 223 #define SRTP_AES128_CM_HMAC_SHA1_32 0x0002
219 #define SRTP_NULL_HMAC_SHA1_80 0x0005 224 #define SRTP_NULL_HMAC_SHA1_80 0x0005
220 #define SRTP_NULL_HMAC_SHA1_32 0x0006 225 #define SRTP_NULL_HMAC_SHA1_32 0x0006
221 226
222 #endif /* __sslproto_h_ */ 227 #endif /* __sslproto_h_ */
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698