OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ | 5 #ifndef NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ |
6 #define NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ | 6 #define NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "net/base/net_export.h" | 10 #include "net/base/net_export.h" |
(...skipping 92 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
103 const QuicTag kCIDK = TAG('C', 'I', 'D', 'K'); // ChannelID key | 103 const QuicTag kCIDK = TAG('C', 'I', 'D', 'K'); // ChannelID key |
104 const QuicTag kCIDS = TAG('C', 'I', 'D', 'S'); // ChannelID signature | 104 const QuicTag kCIDS = TAG('C', 'I', 'D', 'S'); // ChannelID signature |
105 | 105 |
106 // Public reset tags | 106 // Public reset tags |
107 const QuicTag kRNON = TAG('R', 'N', 'O', 'N'); // Public reset nonce proof | 107 const QuicTag kRNON = TAG('R', 'N', 'O', 'N'); // Public reset nonce proof |
108 const QuicTag kRSEQ = TAG('R', 'S', 'E', 'Q'); // Rejected sequence number | 108 const QuicTag kRSEQ = TAG('R', 'S', 'E', 'Q'); // Rejected sequence number |
109 | 109 |
110 // Universal tags | 110 // Universal tags |
111 const QuicTag kPAD = TAG('P', 'A', 'D', '\0'); // Padding | 111 const QuicTag kPAD = TAG('P', 'A', 'D', '\0'); // Padding |
112 | 112 |
113 // Reasons for server sending rejection message tag. | |
114 const QuicTag kRREJ = TAG('R', 'R', 'E', 'J'); | |
wtc
2014/06/19 19:58:42
Nit: please make this change in your new CL.
Move
ramant (doing other things)
2014/06/20 23:20:47
Fixed in CL: https://codereview.chromium.org/33627
| |
115 | |
113 // These tags have a special form so that they appear either at the beginning | 116 // These tags have a special form so that they appear either at the beginning |
114 // or the end of a handshake message. Since handshake messages are sorted by | 117 // or the end of a handshake message. Since handshake messages are sorted by |
115 // tag value, the tags with 0 at the end will sort first and those with 255 at | 118 // tag value, the tags with 0 at the end will sort first and those with 255 at |
116 // the end will sort last. | 119 // the end will sort last. |
117 // | 120 // |
118 // The certificate chain should have a tag that will cause it to be sorted at | 121 // The certificate chain should have a tag that will cause it to be sorted at |
119 // the end of any handshake messages because it's likely to be large and the | 122 // the end of any handshake messages because it's likely to be large and the |
120 // client might be able to get everything that it needs from the small values at | 123 // client might be able to get everything that it needs from the small values at |
121 // the beginning. | 124 // the beginning. |
122 // | 125 // |
(...skipping 26 matching lines...) Expand all Loading... | |
149 // amplification factor of any mirror DoS attack. | 152 // amplification factor of any mirror DoS attack. |
150 // | 153 // |
151 // A client may pad an inchoate client hello to a size larger than | 154 // A client may pad an inchoate client hello to a size larger than |
152 // kClientHelloMinimumSize to make it more likely to receive a complete | 155 // kClientHelloMinimumSize to make it more likely to receive a complete |
153 // rejection message. | 156 // rejection message. |
154 const size_t kClientHelloMinimumSize = 1024; | 157 const size_t kClientHelloMinimumSize = 1024; |
155 | 158 |
156 } // namespace net | 159 } // namespace net |
157 | 160 |
158 #endif // NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ | 161 #endif // NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ |
OLD | NEW |