Only in pgp-2.6.3usa.orig/: pgp263ii.tar
diff -cr pgp-2.6.3usa.orig/rsaref/source/rsaref.h pgp-2.6.3engsoc8k/rsaref/source/rsaref.h
*** pgp-2.6.3usa.orig/rsaref/source/rsaref.h	Sat Feb 29 12:13:09 1992
--- pgp-2.6.3engsoc8k/rsaref/source/rsaref.h	Mon Oct 25 15:57:38 1999
***************
*** 13,19 ****
  /* RSA key lengths.
   */
  #define MIN_RSA_MODULUS_BITS 508
! #define MAX_RSA_MODULUS_BITS 1024
  #define MAX_RSA_MODULUS_LEN ((MAX_RSA_MODULUS_BITS + 7) / 8)
  #define MAX_RSA_PRIME_BITS ((MAX_RSA_MODULUS_BITS + 1) / 2)
  #define MAX_RSA_PRIME_LEN ((MAX_RSA_PRIME_BITS + 7) / 8)
--- 13,19 ----
  /* RSA key lengths.
   */
  #define MIN_RSA_MODULUS_BITS 508
! #define MAX_RSA_MODULUS_BITS 8192
  #define MAX_RSA_MODULUS_LEN ((MAX_RSA_MODULUS_BITS + 7) / 8)
  #define MAX_RSA_PRIME_BITS ((MAX_RSA_MODULUS_BITS + 1) / 2)
  #define MAX_RSA_PRIME_LEN ((MAX_RSA_PRIME_BITS + 7) / 8)
diff -cr pgp-2.6.3usa.orig/src/crypto.c pgp-2.6.3engsoc8k/src/crypto.c
*** pgp-2.6.3usa.orig/src/crypto.c	Mon Jan 15 15:37:59 1996
--- pgp-2.6.3engsoc8k/src/crypto.c	Mon Oct 25 15:58:44 1999
***************
*** 772,778 ****
     "\n\007Error: RSA key length must be at least 256 bits.\n");
  		} else if (i == -3) {
  			fputs(
! "\a\nError: key is too large.  RSA keys may be no longer than 1024 bits\
  ,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
  		} else {
  			fprintf(pgpout,"\a\nUnexpected error %d signing\n", i);
--- 772,778 ----
     "\n\007Error: RSA key length must be at least 256 bits.\n");
  		} else if (i == -3) {
  			fputs(
! "\a\nError: key is too large.  RSA keys may be no longer than 8192 bits\
  ,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
  		} else {
  			fprintf(pgpout,"\a\nUnexpected error %d signing\n", i);
***************
*** 2585,2591 ****
  "\n\007Error: RSA key length must be at least 256 bits.\n");
  			} else if (i == -3) {
  				fputs(
! "\a\nError: key is too large.  RSA keys may be no longer than 1024 bits\
  ,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
  			} else {
  				fprintf(pgpout,
--- 2585,2591 ----
  "\n\007Error: RSA key length must be at least 256 bits.\n");
  			} else if (i == -3) {
  				fputs(
! "\a\nError: key is too large.  RSA keys may be no longer than 8192 bits\
  ,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
  			} else {
  				fprintf(pgpout,
***************
*** 3080,3086 ****
  			if (count < 0) {
  				if (count == -3) {
  					fputs(
! "\a\nError: key is too large.  RSA keys may be no longer than 1024 bits\
  ,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
  				} else if (count == -9 || count == -7) {
  					fprintf(pgpout,
--- 3080,3086 ----
  			if (count < 0) {
  				if (count == -3) {
  					fputs(
! "\a\nError: key is too large.  RSA keys may be no longer than 8192 bits\
  ,\ndue to limitations imposed by software provided by RSADSI.\n", pgpout);
  				} else if (count == -9 || count == -7) {
  					fprintf(pgpout,
diff -cr pgp-2.6.3usa.orig/src/keymgmt.c pgp-2.6.3engsoc8k/src/keymgmt.c
*** pgp-2.6.3usa.orig/src/keymgmt.c	Mon Oct 25 16:15:29 1999
--- pgp-2.6.3engsoc8k/src/keymgmt.c	Mon Oct 25 16:07:26 1999
***************
*** 2726,2733 ****
  	fputs(LANG("Pick your RSA key size:\n\
      1)   512 bits- Low commercial grade, fast but less secure\n\
      2)   768 bits- High commercial grade, medium speed, good security\n\
!     3)  1024 bits- \"Military\" grade, slow, highest security\n\
! Choose 1, 2, or 3, or enter desired number of bits: "), pgpout);
  #ifdef MACTC5
  		fprintf(pgpout, "%s\n",numstr);
  #else
--- 2726,2736 ----
  	fputs(LANG("Pick your RSA key size:\n\
      1)   512 bits- Low commercial grade, fast but less secure\n\
      2)   768 bits- High commercial grade, medium speed, good security\n\
!     3)  1024 bits- \"Military\" grade, slow, more security\n\
!     4)  2048 bits- \"Paranoid\" grade, quite slow, quite secure\n\
!     5)  4096 bits- \"No Life\" grade, very slow, extream security\n\
!     6)  8192 bits- \"CPU Burnin'\" grade, put-put, highest security\n\
! Choose 1, 2, 3, 4, 5, 6 or enter desired number of bits: "), pgpout);
  #ifdef MACTC5
  		fprintf(pgpout, "%s\n",numstr);
  #else
***************
*** 2754,2759 ****
--- 2757,2768 ----
  	keybits = 768;		/* High commercial grade */
      if (keybits == 3)
  	keybits = 1024;		/* Military grade */
+     if (keybits == 4)
+ 	keybits = 2048;		/* Paranoid grade */
+     if (keybits == 5)
+ 	keybits = 4096;		/* No Life grade */
+     if (keybits == 6)
+ 	keybits = 8192;		/* CPU Burnin' grade */
  
  #ifndef DEBUG
      if (keybits < MIN_KEY_BITS)
Only in pgp-2.6.3usa.orig/src: makefile.orig
diff -cr pgp-2.6.3usa.orig/src/mpilib.h pgp-2.6.3engsoc8k/src/mpilib.h
*** pgp-2.6.3usa.orig/src/mpilib.h	Tue Aug 29 08:03:30 1995
--- pgp-2.6.3engsoc8k/src/mpilib.h	Mon Oct 25 16:11:48 1999
***************
*** 321,327 ****
  #endif /* mp_smul */
  
  #define MIN_KEY_BITS  384
! #define MAX_KEY_BITS 2048
  
  /*	MAX_BIT_PRECISION is upper limit that assembly primitives can handle.
  	It must be less than 32704 bits, or 4088 bytes.  It should be an
--- 321,327 ----
  #endif /* mp_smul */
  
  #define MIN_KEY_BITS  384
! #define MAX_KEY_BITS 8192
  
  /*	MAX_BIT_PRECISION is upper limit that assembly primitives can handle.
  	It must be less than 32704 bits, or 4088 bytes.  It should be an
diff -cr pgp-2.6.3usa.orig/src/randpool.h pgp-2.6.3engsoc8k/src/randpool.h
*** pgp-2.6.3usa.orig/src/randpool.h	Fri Jul 15 08:59:32 1994
--- pgp-2.6.3engsoc8k/src/randpool.h	Mon Oct 25 16:11:09 1999
***************
*** 1,7 ****
  #include "usuals.h"
  
  /* Set this to whatever you need (must be > 512) */
! #define RANDPOOLBITS 3072
  
  void randPoolStir(void);
  void randPoolAddBytes(byte const *buf, unsigned len);
--- 1,7 ----
  #include "usuals.h"
  
  /* Set this to whatever you need (must be > 512) */
! #define RANDPOOLBITS 11264
  
  void randPoolStir(void);
  void randPoolAddBytes(byte const *buf, unsigned len);
