|
enum | IG.Crypto.HashType : int {
IG.Crypto.HashType.None = 0,
IG.Crypto.HashType.Default = SHA512,
IG.Crypto.HashType.MD5 = 1,
IG.Crypto.HashType.SHA1 = 2,
IG.Crypto.HashType.SHA256 = 4,
IG.Crypto.HashType.SHA512 = 8
} |
| Enumeration for selecting the hashing algorithm. More...
|
|
enum | IG.Crypto.PasswordAlgorithmType : int {
IG.Crypto.PasswordAlgorithmType.None = 0,
IG.Crypto.PasswordAlgorithmType.Default = Rfc2898,
IG.Crypto.PasswordAlgorithmType.Rfc = Rfc2898,
IG.Crypto.PasswordAlgorithmType.Rfc2898 = 1,
IG.Crypto.PasswordAlgorithmType.DeriveBytes = 2
} |
| Enumeration for selecting the algorithm for generation of secret keys, initialization vectors, etc., on basis of provided passwords, keys, and salts. More...
|
|
enum | IG.Crypto.SymmetricAlgorithmType : int {
IG.Crypto.SymmetricAlgorithmType.None = 0,
IG.Crypto.SymmetricAlgorithmType.Default = Rijndael,
IG.Crypto.SymmetricAlgorithmType.RD = Rijndael,
IG.Crypto.SymmetricAlgorithmType.Rijndael = 1,
IG.Crypto.SymmetricAlgorithmType.AES = 2,
IG.Crypto.SymmetricAlgorithmType.TripleDES = 4,
IG.Crypto.SymmetricAlgorithmType.DES = 8,
IG.Crypto.SymmetricAlgorithmType.RC2 = 16
} |
| Enumeration for selecting the symmetric encryption algorithm. More...
|
|
enum | IG.Crypto.AsymmetricAlgorithmType : int { IG.Crypto.AsymmetricAlgorithmType.None = 0,
IG.Crypto.AsymmetricAlgorithmType.Default = RSA,
IG.Crypto.AsymmetricAlgorithmType.RSA = 1,
IG.Crypto.AsymmetricAlgorithmType.DSA = 2
} |
| Enumeration for selecting the asymmetric cryptographic algorithm. More...
|
|
enum | IG.Crypto.CryptoFlags : int {
IG.Crypto.CryptoFlags.None = 0,
IG.Crypto.CryptoFlags.EncryptionError = -1,
IG.Crypto.CryptoFlags.DecryptionError = -2,
IG.Crypto.CryptoFlags.Error = EncryptionError | DecryptionError,
IG.Crypto.CryptoFlags.Hashing = 1,
IG.Crypto.CryptoFlags.KeyGeneration = 2,
IG.Crypto.CryptoFlags.SymmetricEncryption = 4,
IG.Crypto.CryptoFlags.AsymmetricEncryption = 8,
IG.Crypto.CryptoFlags.Signing = 16,
IG.Crypto.CryptoFlags.Public = 32,
IG.Crypto.CryptoFlags.Private = 64
} |
| Flags for cryptographic operations. More...
|
|