Lots of random cleanups, mostly for native_theme_win.cc:
[chromium-blink-merge.git] / net / quic / crypto / crypto_protocol.h
blob07fe17c92f63e17ebefcc1ba8291daaa39c96b7c
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_
6 #define NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_
8 #include <string>
10 #include "net/base/net_export.h"
11 #include "net/quic/quic_protocol.h"
13 // Version and Crypto tags are written to the wire with a big-endian
14 // representation of the name of the tag. For example
15 // the client hello tag (CHLO) will be written as the
16 // following 4 bytes: 'C' 'H' 'L' 'O'. Since it is
17 // stored in memory as a little endian uint32, we need
18 // to reverse the order of the bytes.
20 // We use a macro to ensure that no static initialisers are created. Use the
21 // MakeQuicTag function in normal code.
22 #define TAG(a, b, c, d) \
23 static_cast<QuicTag>((d << 24) + (c << 16) + (b << 8) + a)
25 namespace net {
27 typedef std::string ServerConfigID;
29 const QuicTag kCHLO = TAG('C', 'H', 'L', 'O'); // Client hello
30 const QuicTag kSHLO = TAG('S', 'H', 'L', 'O'); // Server hello
31 const QuicTag kSCFG = TAG('S', 'C', 'F', 'G'); // Server config
32 const QuicTag kREJ = TAG('R', 'E', 'J', '\0'); // Reject
33 const QuicTag kCETV = TAG('C', 'E', 'T', 'V'); // Client encrypted tag-value
34 // pairs
35 const QuicTag kPRST = TAG('P', 'R', 'S', 'T'); // Public reset
37 // Key exchange methods
38 const QuicTag kP256 = TAG('P', '2', '5', '6'); // ECDH, Curve P-256
39 const QuicTag kC255 = TAG('C', '2', '5', '5'); // ECDH, Curve25519
41 // AEAD algorithms
42 const QuicTag kNULL = TAG('N', 'U', 'L', 'N'); // null algorithm
43 const QuicTag kAESG = TAG('A', 'E', 'S', 'G'); // AES128 + GCM-12
44 const QuicTag kCC12 = TAG('C', 'C', '1', '2'); // ChaCha20 + Poly1305
46 // Congestion control feedback types
47 const QuicTag kQBIC = TAG('Q', 'B', 'I', 'C'); // TCP cubic
48 const QuicTag kPACE = TAG('P', 'A', 'C', 'E'); // Paced TCP cubic
49 const QuicTag kINAR = TAG('I', 'N', 'A', 'R'); // Inter arrival
51 // Congestion control options
52 const QuicTag kTBBR = TAG('T', 'B', 'B', 'R'); // Reduced Buffer Bloat TCP
54 // Loss detection algorithm types
55 const QuicTag kNACK = TAG('N', 'A', 'C', 'K'); // TCP style nack counting
56 const QuicTag kTIME = TAG('T', 'I', 'M', 'E'); // Time based
58 // FEC options
59 const QuicTag kFHDR = TAG('F', 'H', 'D', 'R'); // FEC protect headers
61 // Proof types (i.e. certificate types)
62 // NOTE: although it would be silly to do so, specifying both kX509 and kX59R
63 // is allowed and is equivalent to specifying only kX509.
64 const QuicTag kX509 = TAG('X', '5', '0', '9'); // X.509 certificate, all key
65 // types
66 const QuicTag kX59R = TAG('X', '5', '9', 'R'); // X.509 certificate, RSA keys
67 // only
68 const QuicTag kCHID = TAG('C', 'H', 'I', 'D'); // Channel ID.
70 // Client hello tags
71 const QuicTag kVER = TAG('V', 'E', 'R', '\0'); // Version (new)
72 const QuicTag kNONC = TAG('N', 'O', 'N', 'C'); // The client's nonce
73 const QuicTag kKEXS = TAG('K', 'E', 'X', 'S'); // Key exchange methods
74 const QuicTag kAEAD = TAG('A', 'E', 'A', 'D'); // Authenticated
75 // encryption algorithms
76 const QuicTag kCGST = TAG('C', 'G', 'S', 'T'); // Congestion control
77 // feedback types
78 const QuicTag kCOPT = TAG('C', 'O', 'P', 'T'); // Congestion control options
79 // kLOSS was 'L', 'O', 'S', 'S', but was changed from a tag vector to a tag.
80 const QuicTag kLOSS = TAG('L', 'O', 'S', 'A'); // Loss detection algorithms
81 const QuicTag kICSL = TAG('I', 'C', 'S', 'L'); // Idle connection state
82 // lifetime
83 const QuicTag kKATO = TAG('K', 'A', 'T', 'O'); // Keepalive timeout
84 const QuicTag kMSPC = TAG('M', 'S', 'P', 'C'); // Max streams per connection.
85 const QuicTag kIRTT = TAG('I', 'R', 'T', 'T'); // Estimated initial RTT in us.
86 const QuicTag kSWND = TAG('S', 'W', 'N', 'D'); // Server's Initial congestion
87 // window.
88 const QuicTag kSNI = TAG('S', 'N', 'I', '\0'); // Server name
89 // indication
90 const QuicTag kPUBS = TAG('P', 'U', 'B', 'S'); // Public key values
91 const QuicTag kSCID = TAG('S', 'C', 'I', 'D'); // Server config id
92 const QuicTag kORBT = TAG('O', 'B', 'I', 'T'); // Server orbit.
93 const QuicTag kPDMD = TAG('P', 'D', 'M', 'D'); // Proof demand.
94 const QuicTag kPROF = TAG('P', 'R', 'O', 'F'); // Proof (signature).
95 const QuicTag kCCS = TAG('C', 'C', 'S', 0); // Common certificate set
96 const QuicTag kCCRT = TAG('C', 'C', 'R', 'T'); // Cached certificate
97 const QuicTag kEXPY = TAG('E', 'X', 'P', 'Y'); // Expiry
98 // TODO(rjshade): Remove kIFCW when removing QUIC_VERSION_19.
99 const QuicTag kIFCW = TAG('I', 'F', 'C', 'W'); // Initial flow control receive
100 // window.
101 const QuicTag kSFCW = TAG('S', 'F', 'C', 'W'); // Initial stream flow control
102 // receive window.
103 const QuicTag kCFCW = TAG('C', 'F', 'C', 'W'); // Initial session/connection
104 // flow control receive window.
105 const QuicTag kUAID = TAG('U', 'A', 'I', 'D'); // Client's User Agent ID.
107 // Rejection tags
108 const QuicTag kRREJ = TAG('R', 'R', 'E', 'J'); // Reasons for server sending
109 // rejection message tag.
111 // Server hello tags
112 const QuicTag kCADR = TAG('C', 'A', 'D', 'R'); // Client IP address and port
114 // CETV tags
115 const QuicTag kCIDK = TAG('C', 'I', 'D', 'K'); // ChannelID key
116 const QuicTag kCIDS = TAG('C', 'I', 'D', 'S'); // ChannelID signature
118 // Public reset tags
119 const QuicTag kRNON = TAG('R', 'N', 'O', 'N'); // Public reset nonce proof
120 const QuicTag kRSEQ = TAG('R', 'S', 'E', 'Q'); // Rejected sequence number
122 // Universal tags
123 const QuicTag kPAD = TAG('P', 'A', 'D', '\0'); // Padding
125 // These tags have a special form so that they appear either at the beginning
126 // or the end of a handshake message. Since handshake messages are sorted by
127 // tag value, the tags with 0 at the end will sort first and those with 255 at
128 // the end will sort last.
130 // The certificate chain should have a tag that will cause it to be sorted at
131 // the end of any handshake messages because it's likely to be large and the
132 // client might be able to get everything that it needs from the small values at
133 // the beginning.
135 // Likewise tags with random values should be towards the beginning of the
136 // message because the server mightn't hold state for a rejected client hello
137 // and therefore the client may have issues reassembling the rejection message
138 // in the event that it sent two client hellos.
139 const QuicTag kServerNonceTag =
140 TAG('S', 'N', 'O', 0); // The server's nonce
141 const QuicTag kSourceAddressTokenTag =
142 TAG('S', 'T', 'K', 0); // Source-address token
143 const QuicTag kCertificateTag =
144 TAG('C', 'R', 'T', 255); // Certificate chain
146 #undef TAG
148 const size_t kMaxEntries = 128; // Max number of entries in a message.
150 const size_t kNonceSize = 32; // Size in bytes of the connection nonce.
152 const size_t kOrbitSize = 8; // Number of bytes in an orbit value.
154 // kProofSignatureLabel is prepended to server configs before signing to avoid
155 // any cross-protocol attacks on the signature.
156 const char kProofSignatureLabel[] = "QUIC server config signature";
158 // kClientHelloMinimumSize is the minimum size of a client hello. Client hellos
159 // will have PAD tags added in order to ensure this minimum is met and client
160 // hellos smaller than this will be an error. This minimum size reduces the
161 // amplification factor of any mirror DoS attack.
163 // A client may pad an inchoate client hello to a size larger than
164 // kClientHelloMinimumSize to make it more likely to receive a complete
165 // rejection message.
166 const size_t kClientHelloMinimumSize = 1024;
168 } // namespace net
170 #endif // NET_QUIC_CRYPTO_CRYPTO_PROTOCOL_H_