summary refs log tree commit diff
path: root/crypto/src/bcpg
diff options
context:
space:
mode:
authorDavid Hook <dgh@cryptoworkshop.com>2014-01-15 21:04:44 +1100
committerDavid Hook <dgh@cryptoworkshop.com>2014-01-15 21:04:44 +1100
commit0c945d556ab7f78aae78941f214474d73f240db1 (patch)
tree991a7e1ff08660d26d05eceb2cdc09f3addfd9a9 /crypto/src/bcpg
parentRegisterize top accumulator word in Montgomery multiplication/squaring (diff)
downloadBouncyCastle.NET-ed25519-0c945d556ab7f78aae78941f214474d73f240db1.tar.xz
added Camellia tags
Diffstat (limited to 'crypto/src/bcpg')
-rw-r--r--crypto/src/bcpg/SymmetricKeyAlgorithmTags.cs25
1 files changed, 14 insertions, 11 deletions
diff --git a/crypto/src/bcpg/SymmetricKeyAlgorithmTags.cs b/crypto/src/bcpg/SymmetricKeyAlgorithmTags.cs
index 7633b1dba..e05a48616 100644
--- a/crypto/src/bcpg/SymmetricKeyAlgorithmTags.cs
+++ b/crypto/src/bcpg/SymmetricKeyAlgorithmTags.cs
@@ -5,16 +5,19 @@ namespace Org.BouncyCastle.Bcpg
     */
     public enum SymmetricKeyAlgorithmTag
     {
-        Null = 0,        // Plaintext or unencrypted data
-        Idea = 1,        // IDEA [IDEA]
-        TripleDes = 2,  // Triple-DES (DES-EDE, as per spec -168 bit key derived from 192)
-        Cast5 = 3,       // Cast5 (128 bit key, as per RFC 2144)
-        Blowfish = 4,    // Blowfish (128 bit key, 16 rounds) [Blowfish]
-        Safer = 5,       // Safer-SK128 (13 rounds) [Safer]
-        Des = 6,         // Reserved for DES/SK
-        Aes128 = 7,     // Reserved for AES with 128-bit key
-        Aes192 = 8,     // Reserved for AES with 192-bit key
-        Aes256 = 9,     // Reserved for AES with 256-bit key
-        Twofish = 10     // Reserved for Twofish
+        Null = 0,         // Plaintext or unencrypted data
+        Idea = 1,         // IDEA [IDEA]
+        TripleDes = 2,    // Triple-DES (DES-EDE, as per spec -168 bit key derived from 192)
+        Cast5 = 3,        // Cast5 (128 bit key, as per RFC 2144)
+        Blowfish = 4,     // Blowfish (128 bit key, 16 rounds) [Blowfish]
+        Safer = 5,        // Safer-SK128 (13 rounds) [Safer]
+        Des = 6,          // Reserved for DES/SK
+        Aes128 = 7,       // Reserved for AES with 128-bit key
+        Aes192 = 8,       // Reserved for AES with 192-bit key
+        Aes256 = 9,       // Reserved for AES with 256-bit key
+        Twofish = 10,     // Reserved for Twofish
+        Camellia128 = 11, // Reserved for AES with 128-bit key
+        Camellia192 = 12, // Reserved for AES with 192-bit key
+        Camellia256 = 13  // Reserved for AES with 256-bit key
     }
 }