| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ | 5 #ifndef NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ |
| 6 #define NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ | 6 #define NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ |
| 7 | 7 |
| 8 #include <string> | 8 #include <string> |
| 9 | 9 |
| 10 #include "net/base/net_export.h" | 10 #include "net/base/net_export.h" |
| (...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 64 const QuicTag kTIME = TAG('T', 'I', 'M', 'E'); // Time based | 64 const QuicTag kTIME = TAG('T', 'I', 'M', 'E'); // Time based |
| 65 | 65 |
| 66 // Optional support of truncated Connection IDs. If sent by a peer, the value | 66 // Optional support of truncated Connection IDs. If sent by a peer, the value |
| 67 // is the minimum number of bytes allowed for the connection ID sent to the | 67 // is the minimum number of bytes allowed for the connection ID sent to the |
| 68 // peer. | 68 // peer. |
| 69 const QuicTag kTCID = TAG('T', 'C', 'I', 'D'); // Connection ID truncation. | 69 const QuicTag kTCID = TAG('T', 'C', 'I', 'D'); // Connection ID truncation. |
| 70 | 70 |
| 71 // FEC options | 71 // FEC options |
| 72 const QuicTag kFHDR = TAG('F', 'H', 'D', 'R'); // FEC protect headers | 72 const QuicTag kFHDR = TAG('F', 'H', 'D', 'R'); // FEC protect headers |
| 73 | 73 |
| 74 // Enable bandwidth resumption experiment. |
| 75 const QuicTag kBWRE = TAG('B', 'W', 'R', 'E'); // Bandwidth resumption. |
| 76 |
| 74 // Proof types (i.e. certificate types) | 77 // Proof types (i.e. certificate types) |
| 75 // NOTE: although it would be silly to do so, specifying both kX509 and kX59R | 78 // NOTE: although it would be silly to do so, specifying both kX509 and kX59R |
| 76 // is allowed and is equivalent to specifying only kX509. | 79 // is allowed and is equivalent to specifying only kX509. |
| 77 const QuicTag kX509 = TAG('X', '5', '0', '9'); // X.509 certificate, all key | 80 const QuicTag kX509 = TAG('X', '5', '0', '9'); // X.509 certificate, all key |
| 78 // types | 81 // types |
| 79 const QuicTag kX59R = TAG('X', '5', '9', 'R'); // X.509 certificate, RSA keys | 82 const QuicTag kX59R = TAG('X', '5', '9', 'R'); // X.509 certificate, RSA keys |
| 80 // only | 83 // only |
| 81 const QuicTag kCHID = TAG('C', 'H', 'I', 'D'); // Channel ID. | 84 const QuicTag kCHID = TAG('C', 'H', 'I', 'D'); // Channel ID. |
| 82 | 85 |
| 83 // Client hello tags | 86 // Client hello tags |
| (...skipping 88 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 172 // amplification factor of any mirror DoS attack. | 175 // amplification factor of any mirror DoS attack. |
| 173 // | 176 // |
| 174 // A client may pad an inchoate client hello to a size larger than | 177 // A client may pad an inchoate client hello to a size larger than |
| 175 // kClientHelloMinimumSize to make it more likely to receive a complete | 178 // kClientHelloMinimumSize to make it more likely to receive a complete |
| 176 // rejection message. | 179 // rejection message. |
| 177 const size_t kClientHelloMinimumSize = 1024; | 180 const size_t kClientHelloMinimumSize = 1024; |
| 178 | 181 |
| 179 } // namespace net | 182 } // namespace net |
| 180 | 183 |
| 181 #endif // NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ | 184 #endif // NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_ |
| OLD | NEW |