4 # This file defines ciphers, hash functions, HMACs and PKCS algorithms that
5 # can be used. This file can be included into different configuration files.
7 # You should not change the contents of this file unless you know what you
10 # The first algorithm defined is always the default one to use.
16 # The "name" is unique name to the cipher. The "keylength" defines the
17 # length of the key (bytes), and the "blocklength" defines the block size
18 # of the cipher (bytes).
51 name = "twofish-256-cbc";
56 name = "twofish-192-cbc";
61 name = "twofish-128-cbc";
67 # Configured hash functions
86 # Configured HMAC functions. The hash function used in the HMAC must
87 # be configured in the hash section.
90 name = "hmac-sha256-96";
95 name = "hmac-sha1-96";
100 name = "hmac-md5-96";