[svn] GnuPG - r5198 - trunk/sm

svn author wk cvs at cvs.gnupg.org
Tue Nov 10 17:36:00 CET 2009


Author: wk
Date: 2009-11-10 17:35:59 +0100 (Tue, 10 Nov 2009)
New Revision: 5198

Modified:
   trunk/sm/ChangeLog
   trunk/sm/certreqgen.c
Log:
Change fallback keysize to 2048


Modified: trunk/sm/ChangeLog
===================================================================
--- trunk/sm/ChangeLog	2009-11-10 09:04:17 UTC (rev 5197)
+++ trunk/sm/ChangeLog	2009-11-10 16:35:59 UTC (rev 5198)
@@ -10,6 +10,9 @@
 
 2009-11-04  Werner Koch  <wk at g10code.com>
 
+	* certreqgen.c (proc_parameters): Change fallback key length to
+	2048.
+
 	* server.c (register_commands): Add help arg to
 	assuan_register_command.  Provide help strings for all commands.
 

Modified: trunk/sm/certreqgen.c
===================================================================
--- trunk/sm/certreqgen.c	2009-11-10 09:04:17 UTC (rev 5197)
+++ trunk/sm/certreqgen.c	2009-11-10 16:35:59 UTC (rev 5198)
@@ -61,7 +61,7 @@
 	This is a required parameter.  For now the only supported
         algorithm is "rsa".
      Key-Length: <length-in-bits>
-	Length of the key in bits.  Default is 1024.
+	Length of the key in bits.  Default is 2048.
      Key-Grip: hexstring
         This is optional and used to generate a request for an already
         existing key.  Key-Length will be ignored when given,
@@ -83,7 +83,7 @@
 $ cat >foo <<EOF
 %echo Generating a standard key
 Key-Type: RSA
-Key-Length: 1024
+Key-Length: 2048
 Name-DN: CN=test cert 1,OU=Aegypten Project,O=g10 Code GmbH,L=Düsseldorf,C=DE
 Name-Email: joe at foo.bar
 # Do a commit here, so that we can later print "done" :-)
@@ -477,7 +477,7 @@
   
   /* Check the keylength. */
   if (!get_parameter (para, pKEYLENGTH, 0))
-    nbits = 1024;
+    nbits = 2048;
   else
     nbits = get_parameter_uint (para, pKEYLENGTH);
   if ((nbits < 1024 || nbits > 4096) && !cardkeyid)




More information about the Gnupg-commits mailing list