From fe148cb1ad4b3f85fa6768480acaf9c95e3ee168 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 18:14:44 +0200 Subject: Setting default key algorithm to "ed25519/cert,sign+cv25519/encr". Signed-off-by: Daniel Baumann --- .../progress-linux/0003-gpg-default-key-to-ed25519.patch | 15 +++++++++++++++ debian/patches/series | 1 + 2 files changed, 16 insertions(+) create mode 100644 debian/patches/progress-linux/0003-gpg-default-key-to-ed25519.patch diff --git a/debian/patches/progress-linux/0003-gpg-default-key-to-ed25519.patch b/debian/patches/progress-linux/0003-gpg-default-key-to-ed25519.patch new file mode 100644 index 0000000..53ffa83 --- /dev/null +++ b/debian/patches/progress-linux/0003-gpg-default-key-to-ed25519.patch @@ -0,0 +1,15 @@ +Author: Daniel Baumann +Description: Setting default key algorithm to "ed25519/cert,sign+cv25519/encr". + +diff -Naurp gnupg2.orig/g10/keygen.c gnupg2/g10/keygen.c +--- gnupg2.orig/g10/keygen.c ++++ gnupg2/g10/keygen.c +@@ -49,7 +49,7 @@ + /* The default algorithms. You should also check that the value + is inside the bounds enforced by ask_keysize and gen_xxx. See also + get_keysize_range which encodes the allowed ranges. */ +-#define DEFAULT_STD_KEY_PARAM "rsa4096/cert,sign+rsa4096/encr" ++#define DEFAULT_STD_KEY_PARAM "ed25519/cert,sign+cv25519/encr" + #define FUTURE_STD_KEY_PARAM "ed25519/cert,sign+cv25519/encr" + + /* When generating keys using the streamlined key generation dialog, diff --git a/debian/patches/series b/debian/patches/series index ea7ef45..cafba80 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -26,3 +26,4 @@ from-upstream/dirmngr-Fix-build-with-no-LDAP-support.patch from-upstream/gpg-Move-NETLIBS-after-GPG_ERROR_LIBS-another.patch progress-linux/0001-gpgsm-default-to-4096-bit-keys.patch progress-linux/0002-gpg-default-to-4096-bit-keys.patch +progress-linux/0003-gpg-default-key-to-ed25519.patch -- cgit v1.2.3