Skip to content

Commit 0a85136

Browse files
committed
Merge branch 'pgpainless-documentSKTags'
2 parents 433fc69 + d67d1d9 commit 0a85136

File tree

1 file changed

+68
-15
lines changed

1 file changed

+68
-15
lines changed
Lines changed: 68 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,75 @@
11
package org.bouncycastle.bcpg;
22

33
/**
4-
* Basic tags for symmetric key algorithms
4+
* Basic tags for symmetric key algorithms.
5+
*
6+
* @see <a href="https://www.rfc-editor.org/rfc/rfc4880.html#section-9.2">
7+
* RFC4880 - Symmetric-Key Algorithms</a>
8+
* @see <a href="https://www.ietf.org/archive/id/draft-koch-librepgp-00.html#name-symmetric-key-algorithms">
9+
* LibrePGP - Symmetric-Key Algorithms</a>
10+
* @see <a href="https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-13.html#name-symmetric-key-algorithms">
11+
* Crypto-Refresh - Symmetric-Key Algorithms</a>
512
*/
613
public interface SymmetricKeyAlgorithmTags
714
{
8-
int NULL = 0; // Plaintext or unencrypted data
9-
int IDEA = 1; // IDEA [IDEA]
10-
int TRIPLE_DES = 2; // Triple-DES (DES-EDE, as per spec -168 bit key derived from 192)
11-
int CAST5 = 3; // CAST5 (128 bit key, as per RFC 2144)
12-
int BLOWFISH = 4; // Blowfish (128 bit key, 16 rounds) [BLOWFISH]
13-
int SAFER = 5; // SAFER-SK128 (13 rounds) [SAFER]
14-
int DES = 6; // Reserved for DES/SK
15-
int AES_128 = 7; // Reserved for AES with 128-bit key
16-
int AES_192 = 8; // Reserved for AES with 192-bit key
17-
int AES_256 = 9; // Reserved for AES with 256-bit key
18-
int TWOFISH = 10; // Reserved for Twofish
19-
int CAMELLIA_128 = 11; // Reserved for Camellia with 128-bit key
20-
int CAMELLIA_192 = 12; // Reserved for Camellia with 192-bit key
21-
int CAMELLIA_256 = 13; // Reserved for Camellia with 256-bit key
15+
/**
16+
* Plaintext or unencrypted data.
17+
*/
18+
int NULL = 0;
19+
/**
20+
* IDEA.
21+
*/
22+
int IDEA = 1;
23+
/**
24+
* Triple-DES (DES-EDE, as per spec - 168-bit key derived from 192).
25+
*/
26+
int TRIPLE_DES = 2;
27+
/**
28+
* CAST5 (128-bit key, as per RFC 2144).
29+
*/
30+
int CAST5 = 3;
31+
/**
32+
* Blowfish (128-bit key, 16 rounds).
33+
*/
34+
int BLOWFISH = 4;
35+
/**
36+
* Reserved for SAFER-SK128 (13 rounds).
37+
*/
38+
int SAFER = 5;
39+
/**
40+
* Reserved for DES/SK.
41+
*/
42+
int DES = 6;
43+
/**
44+
* AES with 128-bit key.
45+
*/
46+
int AES_128 = 7;
47+
/**
48+
* AES with 192-bit key.
49+
*/
50+
int AES_192 = 8;
51+
/**
52+
* AES with 256-bit key.
53+
*/
54+
int AES_256 = 9;
55+
/**
56+
* Twofish with 256-bit key.
57+
*/
58+
int TWOFISH = 10;
59+
/**
60+
* Camellia with 128-bit key.
61+
*/
62+
int CAMELLIA_128 = 11;
63+
/**
64+
* Camellia with 192-bit key.
65+
*/
66+
int CAMELLIA_192 = 12;
67+
/**
68+
* Camellia with 256-bit key.
69+
*/
70+
int CAMELLIA_256 = 13;
71+
72+
// 100 to 110: Private/Experimental algorithms
73+
74+
// 253, 254, 255 reserved to avoid collision with secret key encryption
2275
}

0 commit comments

Comments
 (0)