aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2013-08-30 08:19:14 +0000
committerWerner Koch <[email protected]>2013-08-30 08:19:14 +0000
commit6ed7056197e7ede1305b25457e4633c4ac4301d4 (patch)
treea45774df9b85b33ab518cf44e6a3da4dae0bbc18
parentgpg: No need to create a trustdb when encrypting with --always-trust. (diff)
downloadgnupg-6ed7056197e7ede1305b25457e4633c4ac4301d4.tar.gz
gnupg-6ed7056197e7ede1305b25457e4633c4ac4301d4.zip
gpg: Use 2048 as the default keysize in batch mode.
* g10/keygen.c (gen_elg, gen_dsa, gen_rsa): Set default keysize to 2048. Signed-off-by: Werner Koch <[email protected]>
-rw-r--r--g10/keygen.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/g10/keygen.c b/g10/keygen.c
index 30ec370c6..8353f36f0 100644
--- a/g10/keygen.c
+++ b/g10/keygen.c
@@ -1043,7 +1043,7 @@ gen_elg(int algo, unsigned nbits, KBNODE pub_root, KBNODE sec_root, DEK *dek,
assert( is_ELGAMAL(algo) );
if( nbits < 512 ) {
- nbits = 1024;
+ nbits = 2048;
log_info(_("keysize invalid; using %u bits\n"), nbits );
}
@@ -1126,7 +1126,7 @@ gen_dsa(unsigned int nbits, KBNODE pub_root, KBNODE sec_root, DEK *dek,
if( nbits < 512)
{
- nbits = 1024;
+ nbits = 2048;
log_info(_("keysize invalid; using %u bits\n"), nbits );
}
else if(nbits>3072)
@@ -1256,7 +1256,7 @@ gen_rsa(int algo, unsigned nbits, KBNODE pub_root, KBNODE sec_root, DEK *dek,
assert( is_RSA(algo) );
if( nbits < 1024 ) {
- nbits = 1024;
+ nbits = 2048;
log_info(_("keysize invalid; using %u bits\n"), nbits );
}