4 # This file defines ciphers, hash functions, HMACs and PKCS algorithms that
5 # can be used. This file can be included into different configuration files.
7 # You should not change the contents of this file unless you know what you
10 # The first algorithm defined is always the default one to use.
16 # The "name" is unique name to the cipher. The "keylength" defines the
17 # length of the key (bytes), and the "blocklength" defines the block size
18 # of the cipher (bytes).
36 name = "twofish-256-cbc";
41 name = "twofish-192-cbc";
46 name = "twofish-128-cbc";
51 # "none" cipher should not be used
59 # Configured hash functions
78 # Configured HMAC functions. The hash function used in the HMAC must
79 # be configured in the hash section.
82 name = "hmac-sha256-96";
87 name = "hmac-sha1-96";