webkit
2cdf99a9e3038c7e01b3c37e8ad903ecbe5eecf1
https://github.com/WebKit/webkit
Source
ThirdParty
libwebrtc
Source
third_party
libsrtp
crypto
include
crypto_types.h
Go to the documentation of this file.
1
/*
2
* crypto_types.h
3
*
4
* constants for cipher types and auth func types
5
*
6
* David A. McGrew
7
* Cisco Systems, Inc.
8
*/
9
/*
10
*
11
* Copyright(c) 2001-2006,2013 Cisco Systems, Inc.
12
* All rights reserved.
13
*
14
* Redistribution and use in source and binary forms, with or without
15
* modification, are permitted provided that the following conditions
16
* are met:
17
*
18
* Redistributions of source code must retain the above copyright
19
* notice, this list of conditions and the following disclaimer.
20
*
21
* Redistributions in binary form must reproduce the above
22
* copyright notice, this list of conditions and the following
23
* disclaimer in the documentation and/or other materials provided
24
* with the distribution.
25
*
26
* Neither the name of the Cisco Systems, Inc. nor the names of its
27
* contributors may be used to endorse or promote products derived
28
* from this software without specific prior written permission.
29
*
30
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
31
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
32
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
33
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
34
* COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
35
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
36
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
37
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
38
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
39
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
40
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
41
* OF THE POSSIBILITY OF SUCH DAMAGE.
42
*
43
*/
44
45
#ifndef CRYPTO_TYPES_H
46
#define CRYPTO_TYPES_H
47
48
/*
49
* The null cipher performs no encryption.
50
*
51
* The SRTP_NULL_CIPHER leaves its inputs unaltered, during both the
52
* encryption and decryption operations. This cipher can be chosen
53
* to indicate that no encryption is to be performed.
54
*/
55
#define SRTP_NULL_CIPHER 0
56
57
/*
58
* AES Integer Counter Mode (AES ICM)
59
*
60
* AES ICM is the variant of counter mode that is used by Secure RTP.
61
* This cipher uses a 16-, 24-, or 32-octet key concatenated with a
62
* 14-octet offset (or salt) value.
63
*/
64
#define SRTP_AES_ICM 1
65
66
/*
67
* AES-128 Integer Counter Mode (AES ICM)
68
* AES-128 ICM is a deprecated alternate name for AES ICM.
69
*/
70
#define SRTP_AES_128_ICM SRTP_AES_ICM
71
72
/*
73
* AES-192 Integer Counter Mode (AES ICM)
74
* AES-192 ICM is a deprecated alternate name for AES ICM.
75
*/
76
#define SRTP_AES_192_ICM 4
77
78
/*
79
* AES-256 Integer Counter Mode (AES ICM)
80
* AES-256 ICM is a deprecated alternate name for AES ICM.
81
*/
82
#define SRTP_AES_256_ICM 5
83
84
/*
85
* AES-128_GCM Galois Counter Mode (AES GCM)
86
*
87
* AES-128 GCM is the variant of galois counter mode that is used by
88
* Secure RTP. This cipher uses a 16-octet key.
89
*/
90
#define SRTP_AES_128_GCM 6
91
92
/*
93
* AES-256_GCM Galois Counter Mode (AES GCM)
94
*
95
* AES-256 GCM is the variant of galois counter mode that is used by
96
* Secure RTP. This cipher uses a 32-octet key.
97
*/
98
#define SRTP_AES_256_GCM 7
99
100
/*
101
* The null authentication function performs no authentication.
102
*
103
* The NULL_AUTH function does nothing, and can be selected to indicate
104
* that authentication should not be performed.
105
*/
106
#define SRTP_NULL_AUTH 0
107
108
/*
109
* HMAC-SHA1
110
*
111
* SRTP_HMAC_SHA1 implements the Hash-based MAC using the NIST Secure
112
* Hash Algorithm version 1 (SHA1).
113
*/
114
#define SRTP_HMAC_SHA1 3
115
116
#endif
/* CRYPTO_TYPES_H */
Generated by
1.8.13