Only in pgp-2.6.3usa.orig/: pgp263ii.tar
diff -cr pgp-2.6.3usa.orig/rsaref/source/rsaref.h pgp-2.6.3engsoc8k/rsaref/source/rsaref.h
*** pgp-2.6.3usa.orig/rsaref/source/rsaref.h Sat Feb 29 12:13:09 1992
--- pgp-2.6.3engsoc8k/rsaref/source/rsaref.h Mon Oct 25 15:57:38 1999
***************
*** 13,19 ****
/* RSA key lengths.
*/
#define MIN_RSA_MODULUS_BITS 508
! #define MAX_RSA_MODULUS_BITS 1024
#define MAX_RSA_MODULUS_LEN ((MAX_RSA_MODULUS_BITS + 7) / 8)
#define MAX_RSA_PRIME_BITS ((MAX_RSA_MODULUS_BITS + 1) / 2)
#define MAX_RSA_PRIME_LEN ((MAX_RSA_PRIME_BITS + 7) / 8)
--- 13,19 ----
/* RSA key lengths.
*/
#define MIN_RSA_MODULUS_BITS 508
! #define MAX_RSA_MODULUS_BITS 8192
#define MAX_RSA_MODULUS_LEN ((MAX_RSA_MODULUS_BITS + 7) / 8)
#define MAX_RSA_PRIME_BITS ((MAX_RSA_MODULUS_BITS + 1) / 2)
#define MAX_RSA_PRIME_LEN ((MAX_RSA_PRIME_BITS + 7) / 8)
diff -cr pgp-2.6.3usa.orig/src/crypto.c pgp-2.6.3engsoc8k/src/crypto.c
*** pgp-2.6.3usa.orig/src/crypto.c Mon Jan 15 15:37:59 1996
--- pgp-2.6.3engsoc8k/src/crypto.c Mon Oct 25 15:58:44 1999
***************
*** 772,778 ****
"\n\007Error: RSA key length must be at least 256 bits.\n");
} else if (i == -3) {
fputs(
! "\a\nError: key is too large. RSA keys may be no longer than 1024 bits\
,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
} else {
fprintf(pgpout,"\a\nUnexpected error %d signing\n", i);
--- 772,778 ----
"\n\007Error: RSA key length must be at least 256 bits.\n");
} else if (i == -3) {
fputs(
! "\a\nError: key is too large. RSA keys may be no longer than 8192 bits\
,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
} else {
fprintf(pgpout,"\a\nUnexpected error %d signing\n", i);
***************
*** 2585,2591 ****
"\n\007Error: RSA key length must be at least 256 bits.\n");
} else if (i == -3) {
fputs(
! "\a\nError: key is too large. RSA keys may be no longer than 1024 bits\
,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
} else {
fprintf(pgpout,
--- 2585,2591 ----
"\n\007Error: RSA key length must be at least 256 bits.\n");
} else if (i == -3) {
fputs(
! "\a\nError: key is too large. RSA keys may be no longer than 8192 bits\
,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
} else {
fprintf(pgpout,
***************
*** 3080,3086 ****
if (count < 0) {
if (count == -3) {
fputs(
! "\a\nError: key is too large. RSA keys may be no longer than 1024 bits\
,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
} else if (count == -9 || count == -7) {
fprintf(pgpout,
--- 3080,3086 ----
if (count < 0) {
if (count == -3) {
fputs(
! "\a\nError: key is too large. RSA keys may be no longer than 8192 bits\
,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
} else if (count == -9 || count == -7) {
fprintf(pgpout,
diff -cr pgp-2.6.3usa.orig/src/keymgmt.c pgp-2.6.3engsoc8k/src/keymgmt.c
*** pgp-2.6.3usa.orig/src/keymgmt.c Mon Oct 25 16:15:29 1999
--- pgp-2.6.3engsoc8k/src/keymgmt.c Mon Oct 25 16:07:26 1999
***************
*** 2726,2733 ****
fputs(LANG("Pick your RSA key size:\n\
1) 512 bits- Low commercial grade, fast but less secure\n\
2) 768 bits- High commercial grade, medium speed, good security\n\
! 3) 1024 bits- \"Military\" grade, slow, highest security\n\
! Choose 1, 2, or 3, or enter desired number of bits: "), pgpout);
#ifdef MACTC5
fprintf(pgpout, "%s\n",numstr);
#else
--- 2726,2736 ----
fputs(LANG("Pick your RSA key size:\n\
1) 512 bits- Low commercial grade, fast but less secure\n\
2) 768 bits- High commercial grade, medium speed, good security\n\
! 3) 1024 bits- \"Military\" grade, slow, more security\n\
! 4) 2048 bits- \"Paranoid\" grade, quite slow, quite secure\n\
! 5) 4096 bits- \"No Life\" grade, very slow, extream security\n\
! 6) 8192 bits- \"CPU Burnin'\" grade, put-put, highest security\n\
! Choose 1, 2, 3, 4, 5, 6 or enter desired number of bits: "), pgpout);
#ifdef MACTC5
fprintf(pgpout, "%s\n",numstr);
#else
***************
*** 2754,2759 ****
--- 2757,2768 ----
keybits = 768; /* High commercial grade */
if (keybits == 3)
keybits = 1024; /* Military grade */
+ if (keybits == 4)
+ keybits = 2048; /* Paranoid grade */
+ if (keybits == 5)
+ keybits = 4096; /* No Life grade */
+ if (keybits == 6)
+ keybits = 8192; /* CPU Burnin' grade */
#ifndef DEBUG
if (keybits < MIN_KEY_BITS)
Only in pgp-2.6.3usa.orig/src: makefile.orig
diff -cr pgp-2.6.3usa.orig/src/mpilib.h pgp-2.6.3engsoc8k/src/mpilib.h
*** pgp-2.6.3usa.orig/src/mpilib.h Tue Aug 29 08:03:30 1995
--- pgp-2.6.3engsoc8k/src/mpilib.h Mon Oct 25 16:11:48 1999
***************
*** 321,327 ****
#endif /* mp_smul */
#define MIN_KEY_BITS 384
! #define MAX_KEY_BITS 2048
/* MAX_BIT_PRECISION is upper limit that assembly primitives can handle.
It must be less than 32704 bits, or 4088 bytes. It should be an
--- 321,327 ----
#endif /* mp_smul */
#define MIN_KEY_BITS 384
! #define MAX_KEY_BITS 8192
/* MAX_BIT_PRECISION is upper limit that assembly primitives can handle.
It must be less than 32704 bits, or 4088 bytes. It should be an
diff -cr pgp-2.6.3usa.orig/src/randpool.h pgp-2.6.3engsoc8k/src/randpool.h
*** pgp-2.6.3usa.orig/src/randpool.h Fri Jul 15 08:59:32 1994
--- pgp-2.6.3engsoc8k/src/randpool.h Mon Oct 25 16:11:09 1999
***************
*** 1,7 ****
#include "usuals.h"
/* Set this to whatever you need (must be > 512) */
! #define RANDPOOLBITS 3072
void randPoolStir(void);
void randPoolAddBytes(byte const *buf, unsigned len);
--- 1,7 ----
#include "usuals.h"
/* Set this to whatever you need (must be > 512) */
! #define RANDPOOLBITS 11264
void randPoolStir(void);
void randPoolAddBytes(byte const *buf, unsigned len);