summaryrefslogtreecommitdiffstats
path: root/thirdparties/wince/include/srtp/crypto_types.h
diff options
context:
space:
mode:
Diffstat (limited to 'thirdparties/wince/include/srtp/crypto_types.h')
-rwxr-xr-xthirdparties/wince/include/srtp/crypto_types.h102
1 files changed, 51 insertions, 51 deletions
diff --git a/thirdparties/wince/include/srtp/crypto_types.h b/thirdparties/wince/include/srtp/crypto_types.h
index dbb50c3..0699862 100755
--- a/thirdparties/wince/include/srtp/crypto_types.h
+++ b/thirdparties/wince/include/srtp/crypto_types.h
@@ -7,26 +7,26 @@
* Cisco Systems, Inc.
*/
/*
- *
+ *
* Copyright(c) 2001-2006,2013 Cisco Systems, Inc.
* All rights reserved.
- *
+ *
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
- *
+ *
* Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
- *
+ *
* Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following
* disclaimer in the documentation and/or other materials provided
* with the distribution.
- *
+ *
* Neither the name of the Cisco Systems, Inc. nor the names of its
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
- *
+ *
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
@@ -57,14 +57,14 @@
* (UST) must be used in conjunction with a cipher other than the null
* cipher. These functions require a per-message pseudorandom input
* that is generated by the cipher.
- *
+ *
* The identifiers STRONGHOLD_AUTH and STRONGHOLD_CIPHER identify the
* strongest available authentication function and cipher,
* respectively. They are resolved at compile time to the strongest
* available algorithm. The stronghold algorithms can serve as did
* the keep of a medieval fortification; they provide the strongest
* defense (or the last refuge).
- *
+ *
* @{
*/
@@ -72,7 +72,7 @@
* @defgroup Ciphers Cipher Types
*
* @brief Each cipher type is identified by an unsigned integer. The
- * cipher types available in this edition of libSRTP are given
+ * cipher types available in this edition of libSRTP are given
* by the #defines below.
*
* A cipher_type_id_t is an identifier for a cipher_type; only values
@@ -90,84 +90,84 @@
/**
* @brief The null cipher performs no encryption.
*
- * The NULL_CIPHER leaves its inputs unaltered, during both the
+ * The NULL_CIPHER leaves its inputs unaltered, during both the
* encryption and decryption operations. This cipher can be chosen
* to indicate that no encryption is to be performed.
*/
-#define NULL_CIPHER 0
+#define NULL_CIPHER 0
-/**
- * @brief AES Integer Counter Mode (AES ICM)
+/**
+ * @brief AES Integer Counter Mode (AES ICM)
*
- * AES ICM is the variant of counter mode that is used by Secure RTP.
+ * AES ICM is the variant of counter mode that is used by Secure RTP.
* This cipher uses a 16-, 24-, or 32-octet key concatenated with a
* 14-octet offset (or salt) value.
*/
-#define AES_ICM 1
+#define AES_ICM 1
-/**
- * @brief AES-128 Integer Counter Mode (AES ICM)
+/**
+ * @brief AES-128 Integer Counter Mode (AES ICM)
* AES-128 ICM is a deprecated alternate name for AES ICM.
*/
#define AES_128_ICM AES_ICM
/**
- * @brief SEAL 3.0
- *
+ * @brief SEAL 3.0
+ *
* SEAL is the Software-Optimized Encryption Algorithm of Coppersmith
* and Rogaway. Nota bene: this cipher is IBM proprietary.
*/
-#define SEAL 2
+#define SEAL 2
-/**
- * @brief AES Cipher Block Chaining mode (AES CBC)
+/**
+ * @brief AES Cipher Block Chaining mode (AES CBC)
*
* AES CBC is the AES Cipher Block Chaining mode.
* This cipher uses a 16-, 24-, or 32-octet key.
*/
-#define AES_CBC 3
+#define AES_CBC 3
-/**
- * @brief AES-128 Cipher Block Chaining mode (AES CBC)
+/**
+ * @brief AES-128 Cipher Block Chaining mode (AES CBC)
*
* AES-128 CBC is a deprecated alternate name for AES CBC.
*/
-#define AES_128_CBC AES_CBC
+#define AES_128_CBC AES_CBC
/**
* @brief Strongest available cipher.
*
* This identifier resolves to the strongest cipher type available.
*/
-#define STRONGHOLD_CIPHER AES_ICM
+#define STRONGHOLD_CIPHER AES_ICM
-/**
- * @brief AES-192 Integer Counter Mode (AES ICM)
+/**
+ * @brief AES-192 Integer Counter Mode (AES ICM)
* AES-192 ICM is a deprecated alternate name for AES ICM.
*/
-#define AES_192_ICM 4
+#define AES_192_ICM 4
-/**
- * @brief AES-256 Integer Counter Mode (AES ICM)
+/**
+ * @brief AES-256 Integer Counter Mode (AES ICM)
* AES-256 ICM is a deprecated alternate name for AES ICM.
*/
-#define AES_256_ICM 5
+#define AES_256_ICM 5
-/**
- * @brief AES-128_GCM Galois Counter Mode (AES GCM)
+/**
+ * @brief AES-128_GCM Galois Counter Mode (AES GCM)
*
- * AES-128 GCM is the variant of galois counter mode that is used by
+ * AES-128 GCM is the variant of galois counter mode that is used by
* Secure RTP. This cipher uses a 16-octet key.
*/
-#define AES_128_GCM 6
+#define AES_128_GCM 6
-/**
- * @brief AES-256_GCM Galois Counter Mode (AES GCM)
+/**
+ * @brief AES-256_GCM Galois Counter Mode (AES GCM)
*
- * AES-256 GCM is the variant of galois counter mode that is used by
+ * AES-256 GCM is the variant of galois counter mode that is used by
* Secure RTP. This cipher uses a 32-octet key.
*/
-#define AES_256_GCM 7
+#define AES_256_GCM 7
/**
* @}
@@ -177,14 +177,14 @@
/**
* @defgroup Authentication Authentication Function Types
- *
+ *
* @brief Each authentication function type is identified by an
* unsigned integer. The authentication function types available in
* this edition of libSRTP are given by the #defines below.
*
* An auth_type_id_t is an identifier for an authentication function type;
- * only values given by the #defines above (or those present in the
- * file crypto_types.h) should be used.
+ * only values given by the #defines above (or those present in the
+ * file crypto_types.h) should be used.
*
* The identifier STRONGHOLD_AUTH indicates the strongest available
* authentication function, allowing an application to choose the
@@ -201,8 +201,8 @@
*
* The NULL_AUTH function does nothing, and can be selected to indicate
* that authentication should not be performed.
- */
-#define NULL_AUTH 0
+ */
+#define NULL_AUTH 0
/**
* @brief UST with TMMH Version 2
@@ -212,15 +212,15 @@
* than the null cipher.
* with a cipher.
*/
-#define UST_TMMHv2 1
+#define UST_TMMHv2 1
/**
- * @brief (UST) AES-128 XORMAC
+ * @brief (UST) AES-128 XORMAC
*
* UST_AES_128_XMAC implements AES-128 XORMAC, using UST. Nota bene:
* the XORMAC algorithm is IBM proprietary.
*/
-#define UST_AES_128_XMAC 2
+#define UST_AES_128_XMAC 2
/**
* @brief HMAC-SHA1
@@ -228,7 +228,7 @@
* HMAC_SHA1 implements the Hash-based MAC using the NIST Secure
* Hash Algorithm version 1 (SHA1).
*/
-#define HMAC_SHA1 3
+#define HMAC_SHA1 3
/**
* @brief Strongest available authentication function.
@@ -236,7 +236,7 @@
* This identifier resolves to the strongest available authentication
* function.
*/
-#define STRONGHOLD_AUTH HMAC_SHA1
+#define STRONGHOLD_AUTH HMAC_SHA1
/**
* @}
OpenPOWER on IntegriCloud