[svn] GnuPG - r5198 - trunk/sm
svn author wk
cvs at cvs.gnupg.org
Tue Nov 10 17:36:00 CET 2009
Author: wk
Date: 2009-11-10 17:35:59 +0100 (Tue, 10 Nov 2009)
New Revision: 5198
Modified:
trunk/sm/ChangeLog
trunk/sm/certreqgen.c
Log:
Change fallback keysize to 2048
Modified: trunk/sm/ChangeLog
===================================================================
--- trunk/sm/ChangeLog 2009-11-10 09:04:17 UTC (rev 5197)
+++ trunk/sm/ChangeLog 2009-11-10 16:35:59 UTC (rev 5198)
@@ -10,6 +10,9 @@
2009-11-04 Werner Koch <wk at g10code.com>
+ * certreqgen.c (proc_parameters): Change fallback key length to
+ 2048.
+
* server.c (register_commands): Add help arg to
assuan_register_command. Provide help strings for all commands.
Modified: trunk/sm/certreqgen.c
===================================================================
--- trunk/sm/certreqgen.c 2009-11-10 09:04:17 UTC (rev 5197)
+++ trunk/sm/certreqgen.c 2009-11-10 16:35:59 UTC (rev 5198)
@@ -61,7 +61,7 @@
This is a required parameter. For now the only supported
algorithm is "rsa".
Key-Length: <length-in-bits>
- Length of the key in bits. Default is 1024.
+ Length of the key in bits. Default is 2048.
Key-Grip: hexstring
This is optional and used to generate a request for an already
existing key. Key-Length will be ignored when given,
@@ -83,7 +83,7 @@
$ cat >foo <<EOF
%echo Generating a standard key
Key-Type: RSA
-Key-Length: 1024
+Key-Length: 2048
Name-DN: CN=test cert 1,OU=Aegypten Project,O=g10 Code GmbH,L=Düsseldorf,C=DE
Name-Email: joe at foo.bar
# Do a commit here, so that we can later print "done" :-)
@@ -477,7 +477,7 @@
/* Check the keylength. */
if (!get_parameter (para, pKEYLENGTH, 0))
- nbits = 1024;
+ nbits = 2048;
else
nbits = get_parameter_uint (para, pKEYLENGTH);
if ((nbits < 1024 || nbits > 4096) && !cardkeyid)
More information about the Gnupg-commits
mailing list