1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-12-22 10:19:57 +01:00
Werner Koch d1f2a6d9f7
gpg: Switch to AES256 for symmetric encryption in de-vs mode.
* g10/gpg.c (set_compliance_option): For AES256 and SHA256 in de-vs
mode.
* g10/encrypt.c (setup_symkey): Add extra compliance check.
(encrypt_simple): Avoid printing a second error oncplinace failure.
--

Because we used the RFC4880 mode as base for the de-vs mode we got
3DES as symmetric encryption algorithm.  With the default gnupg mode
that was already used.  The new extra compliance checks are added to
detect whether a --personal-cipher-preference or --cipher-algo option
tried to override the algorithms.  They are still possible but now
non-compliant algorithms will throw an error.

Manual testing can be done with commands like this:

  gpg --no-options --compliance=de-vs \
   --personal-cipher-preferences "S1 S7" \
   --pinentry-mode loopback -v --passphrase abc -ac </etc/motd

Here the command fails due to IDEA (S1) being the preferred cipher
algorithm.  Using "--s2k-digest-algo SHA1" instead of
--personal-cipher-preferences will also fail.

Signed-off-by: Werner Koch <wk@gnupg.org>
2020-11-03 15:37:40 +01:00
..
2019-05-14 11:20:07 +09:00
2018-11-08 12:14:23 +09:00
2018-05-29 12:42:52 +02:00
2020-08-24 19:47:26 +02:00
2020-09-21 09:20:47 +02:00
2015-02-04 09:15:34 +01:00
2015-02-04 09:15:34 +01:00
2017-03-07 20:25:54 +09:00
2017-03-07 20:25:54 +09:00
2018-10-25 16:53:05 -04:00
2020-08-07 13:02:47 +09:00
2020-11-02 09:14:03 +01:00
2020-10-28 17:06:27 +01:00
2020-08-07 13:02:47 +09:00
2020-10-28 17:06:27 +01:00
2017-03-07 20:25:54 +09:00
2020-02-18 18:07:46 -05:00
2019-07-11 12:32:44 +09:00
2020-06-08 15:22:58 +02:00
2019-07-23 12:04:21 +09:00
2020-06-09 11:00:16 +02:00
2020-06-09 15:45:51 +09:00
2017-03-07 20:25:54 +09:00
2017-01-23 19:16:55 +01:00
2020-10-28 17:06:27 +01:00
2017-02-21 13:11:46 -05:00
2017-03-07 20:32:09 +09:00
2017-03-07 20:25:54 +09:00
2019-09-09 15:01:47 +02:00
2016-03-08 14:08:49 +01:00
2016-12-06 12:16:56 +01:00