Back to product page

CryptoTypes Enumeration


These are algorithms wodCrypt can used in their operations.

Remarks

Items from 0-9 are used for symmetric encryption, 100-106 are used for hashing, and 1000-1002 used for asymmetric encryption.

Although they are listed together, they cannot all be used with every wodCrypt method. For example, you cannot encrypt while Type = MD5 - because MD5 is not an encryption/decryption algorithm.

Possible values for CryptoTypes:

Constant Value Description
DES 0 DES.
TripleDES 1 TripleDES.
AES 2 AES.
AES192 3 AES192.
AES256 4 AES256.
Blowfish 5 Blowfish.
Cast 6 Cast.
RC2 7 RC2.
RC4 8 RC4.
RC5 9 RC5.
UNIXcrypt 10 UNIX crypt command. Often referred as crypt(1).
UNIXcrypt3 11 UNIX crypt C function. Often referred as crypt(3).
MD5 100 MD5.
SHA1 101 SHA1.
SHA256 102 SHA256.
SHA512 103 SHA512.
SHA384 104 SHA384.
CRC16 105 CRC16.
CRC32 106 CRC32.
RSA 1000 RSA (RSA+MD5 if digest is needed, such as in Sign/Verify).
DSA 1001 DSA (DSA+MD5 if digest is needed, such as in Sign/Verify).
RSA+SHA1 1101 RSA+SHA1.
DSA+SHA1 1102 DSA+SHA1.
None 65535 No encryption involved. Data is just passed to output blob. Can be used for compression on the fly.

Platforms

Windows