Marcus Meissner
7b529e951d
- Temporarily revert back to the pre-2.4 default for key generation. The new rfc4880bis has been set as the default in 2.4 version and might create incompatible keys. Note that, rfc4880bis can still be used with the option flag --rfc4880bis as in previous versions. * More info in the gnupg-devel ML: https://lists.gnupg.org/pipermail/gnupg-devel/2022-December/035183.html * Reverted commit https://dev.gnupg.org/rGcaf4b3fc16e9 * Add gnupg-revert-rfc4880bis.patch - Allow 8192 bit RSA keys in keygen UI when large_rsa is set * Add gnupg-allow-large-rsa.patch - Enable the regression tests: Fix the regression test suite that fails with the IBM TPM Software stack. Builds fine using the Intel TPM; use the swtpm and tpm2-0-tss-devel packages instead of ibmswtpm2 and ibmtss-devel. OBS-URL: https://build.opensuse.org/request/show/1083635 OBS-URL: https://build.opensuse.org/package/show/Base:System/gpg2?expand=0&rev=285
14 lines
411 B
Diff
14 lines
411 B
Diff
Index: gnupg-2.4.1/g10/keygen.c
|
|
===================================================================
|
|
--- gnupg-2.4.1.orig/g10/keygen.c
|
|
+++ gnupg-2.4.1/g10/keygen.c
|
|
@@ -2456,7 +2456,7 @@ get_keysize_range (int algo, unsigned in
|
|
|
|
default:
|
|
*min = opt.compliance == CO_DE_VS ? 2048: 1024;
|
|
- *max = 4096;
|
|
+ *max = opt.flags.large_rsa == 1 ? 8192 : 4096;
|
|
def = 3072;
|
|
break;
|
|
}
|