blob: a9fc393679a6c8093d671cff7c61889205c3f9f1 [file] [log] [blame]
// Copyright 2019 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CHROMEOS_SERVICES_DEVICE_SYNC_CRYPTAUTH_CONSTANTS_H_
#define CHROMEOS_SERVICES_DEVICE_SYNC_CRYPTAUTH_CONSTANTS_H_
namespace chromeos {
namespace device_sync {
// The special strings used in SyncSingleKeyRequest::key_name. These strings are
// not arbitrary; CryptAuth must be able to identify these names.
extern const char kCryptAuthUserKeyPairName[];
extern const char kCryptAuthLegacyMasterKeyName[];
extern const char kCryptAuthDeviceSyncBetterTogetherKeyName[];
// CryptAuth demands that the kUserKeyPair key bundle have a lone key with this
// handle for backward compatibility reasons.
extern const char kCryptAuthFixedUserKeyPairHandle[];
// The salt used in HKDF to derive symmetric keys from Diffie-Hellman handshake.
// This value is part of the CryptAuth v2 Enrollment specifications.
extern const char kCryptAuthSymmetricKeyDerivationSalt[];
// The salt used in HKDF for symmetric key proofs. Also, for asymmetric key
// proofs, the salt is prepended to the payload before being signed by the
// private key. This value is part of the CryptAuth v2 Enrollment
// specifications.
extern const char kCryptAuthKeyProofSalt[];
// The client version sent to CryptAuth in the SyncKeysRequest.
extern const char kCryptAuthClientVersion[];
} // namespace device_sync
} // namespace chromeos
#endif // CHROMEOS_SERVICES_DEVICE_SYNC_CRYPTAUTH_CONSTANTS_H_