[pkg-gnupg-maint] diverging from upstream defaults
Werner Koch
wk at gnupg.org
Fri Sep 8 05:43:39 UTC 2017
On Fri, 8 Sep 2017 02:04, dkg at fifthhorseman.net said:
>> * default RSA key size: 2048 → 3072
>>
>> * default cipher algorithm: AES128 → AES256
>>
>> * default signature digest: SHA256 → SHA512
>>
>> * digests in default personal-digest-preferences : SHA-256,SHA-384,SHA-512,SHA-224,SHA-1 → SHA-512,SHA-384,SHA-256,SHA-224,SHA-1
>>
>> * default s2k duration (calibrated by agent): 100ms → 300ms
>
>
> I didn't need to do this one, because upstream has already done it, yay!:
Nope, we only swapped the AES variants:
#define DEFAULT_STD_KEY_PARAM "rsa2048/cert,sign+rsa2048/encr"
#define FUTURE_STD_KEY_PARAM "ed25519/cert,sign+cv25519/encr"
if ( !openpgp_cipher_test_algo (CIPHER_ALGO_AES256) )
strcat(dummy_string,"S9 ");
if ( !openpgp_cipher_test_algo (CIPHER_ALGO_AES192) )
strcat(dummy_string,"S8 ");
if ( !openpgp_cipher_test_algo (CIPHER_ALGO_AES) )
strcat(dummy_string,"S7 ");
/* The default hash algo order is:
SHA-256, SHA-384, SHA-512, SHA-224, SHA-1.
log_info ("S2K calibration: %lu -> %lums\n", count, ms);
if (ms > 100)
break;
Salam-Shalom,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 227 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnupg-maint/attachments/20170908/e9ded2a0/attachment.sig>
More information about the pkg-gnupg-maint
mailing list