diff --git a/src/commands/newopenpgpcertificatecommand.cpp b/src/commands/newopenpgpcertificatecommand.cpp
index f8a0a3159..46bd1ab17 100644
--- a/src/commands/newopenpgpcertificatecommand.cpp
+++ b/src/commands/newopenpgpcertificatecommand.cpp
@@ -1,275 +1,271 @@
 /* -*- mode: c++; c-basic-offset:4 -*-
     commands/newopenpgpcertificatecommand.cpp
 
     This file is part of Kleopatra, the KDE keymanager
     SPDX-FileCopyrightText: 2008 Klarälvdalens Datakonsult AB
     SPDX-FileCopyrightText: 2022 g10 Code GmbH
     SPDX-FileContributor: Ingo Klöcker <dev@ingo-kloecker.de>
 
     SPDX-License-Identifier: GPL-2.0-or-later
 */
 
 #include <config-kleopatra.h>
 
 #include "newopenpgpcertificatecommand.h"
 
 #include "command_p.h"
 
 #include "dialogs/newopenpgpcertificatedetailsdialog.h"
 #include "kleopatraapplication.h"
 #include "utils/emptypassphraseprovider.h"
 #include "utils/keyparameters.h"
 #include "utils/userinfo.h"
 
 #include <settings.h>
 
 #include <Libkleo/Formatting>
 #include <Libkleo/KeyCache>
 
 #include <KConfigGroup>
 #include <KLocalizedString>
 #include <KMessageBox>
 #include <KSharedConfig>
 
 #include <QGpgME/KeyGenerationJob>
 #include <QGpgME/Protocol>
 
 #include <QProgressDialog>
 #include <QSettings>
 
 #include <gpgme++/context.h>
 #include <gpgme++/keygenerationresult.h>
 
 #include <kleopatra_debug.h>
 
 using namespace Kleo;
 using namespace GpgME;
 
 class NewOpenPGPCertificateCommand::Private : public Command::Private
 {
     friend class ::Kleo::NewOpenPGPCertificateCommand;
     NewOpenPGPCertificateCommand *q_func() const
     {
         return static_cast<NewOpenPGPCertificateCommand *>(q);
     }
 
 public:
     explicit Private(NewOpenPGPCertificateCommand *qq, KeyListController *c)
         : Command::Private{qq, c}
     {
     }
 
     void getCertificateDetails();
     void createCertificate();
     void showResult(const KeyGenerationResult &result);
     void showErrorDialog(const KeyGenerationResult &result);
 
 private:
     KeyParameters keyParameters;
     bool protectKeyWithPassword = false;
     EmptyPassphraseProvider emptyPassphraseProvider;
     QPointer<NewOpenPGPCertificateDetailsDialog> detailsDialog;
     QPointer<QGpgME::Job> job;
     QPointer<QProgressDialog> progressDialog;
 };
 
 NewOpenPGPCertificateCommand::Private *NewOpenPGPCertificateCommand::d_func()
 {
     return static_cast<Private *>(d.get());
 }
 const NewOpenPGPCertificateCommand::Private *NewOpenPGPCertificateCommand::d_func() const
 {
     return static_cast<const Private *>(d.get());
 }
 
 #define d d_func()
 #define q q_func()
 
 void NewOpenPGPCertificateCommand::Private::getCertificateDetails()
 {
     detailsDialog = new NewOpenPGPCertificateDetailsDialog;
     detailsDialog->setAttribute(Qt::WA_DeleteOnClose);
     applyWindowID(detailsDialog);
 
     if (keyParameters.protocol() == KeyParameters::NoProtocol) {
         const auto settings = Kleo::Settings{};
         const KConfigGroup config{KSharedConfig::openConfig(), "CertificateCreationWizard"};
         // prefer the last used name and email address over the values retrieved from the system
         detailsDialog->setName(config.readEntry("NAME", QString{}));
         if (detailsDialog->name().isEmpty() && settings.prefillName()) {
             detailsDialog->setName(userFullName());
         }
         detailsDialog->setEmail(config.readEntry("EMAIL", QString{}));
         if (detailsDialog->email().isEmpty() && settings.prefillEmail()) {
             detailsDialog->setEmail(userEmailAddress());
         }
     } else {
         detailsDialog->setKeyParameters(keyParameters);
         detailsDialog->setProtectKeyWithPassword(protectKeyWithPassword);
     }
 
     connect(detailsDialog, &QDialog::accepted, q, [this]() {
         keyParameters = detailsDialog->keyParameters();
         protectKeyWithPassword = detailsDialog->protectKeyWithPassword();
         QMetaObject::invokeMethod(
             q,
             [this] {
                 createCertificate();
             },
             Qt::QueuedConnection);
     });
     connect(detailsDialog, &QDialog::rejected, q, [this]() {
         canceled();
     });
 
     detailsDialog->show();
 }
 
 void NewOpenPGPCertificateCommand::Private::createCertificate()
 {
     Q_ASSERT(keyParameters.protocol() == KeyParameters::OpenPGP);
 
     auto keyGenJob = QGpgME::openpgp()->keyGenerationJob();
     if (!keyGenJob) {
         finished();
         return;
     }
     if (!protectKeyWithPassword) {
         auto ctx = QGpgME::Job::context(keyGenJob);
         ctx->setPassphraseProvider(&emptyPassphraseProvider);
         ctx->setPinentryMode(Context::PinentryLoopback);
     }
 
     auto settings = KleopatraApplication::instance()->distributionSettings();
     if (settings) {
         keyParameters.setComment(settings->value(QStringLiteral("uidcomment"), {}).toString());
     }
 
-    if (auto settings = Settings{}; !settings.designatedRevoker().isEmpty()) {
-        keyParameters.addDesignatedRevoker(settings.designatedRevoker());
-    }
-
     connect(keyGenJob, &QGpgME::KeyGenerationJob::result, q, [this](const KeyGenerationResult &result) {
         QMetaObject::invokeMethod(
             q,
             [this, result] {
                 showResult(result);
             },
             Qt::QueuedConnection);
     });
     if (const Error err = keyGenJob->start(keyParameters.toString())) {
         error(i18n("Could not start key pair creation: %1", Formatting::errorAsString(err)));
         finished();
         return;
     } else {
         job = keyGenJob;
     }
     progressDialog = new QProgressDialog;
     progressDialog->setAttribute(Qt::WA_DeleteOnClose);
     applyWindowID(progressDialog);
     progressDialog->setModal(true);
     progressDialog->setWindowTitle(i18nc("@title", "Creating Key Pair..."));
     progressDialog->setLabelText(i18n("The process of creating a key requires large amounts of random numbers. This may require several minutes..."));
     progressDialog->setRange(0, 0);
     connect(progressDialog, &QProgressDialog::canceled, job, &QGpgME::Job::slotCancel);
     connect(job, &QGpgME::Job::done, q, [this]() {
         if (progressDialog) {
             progressDialog->accept();
         }
     });
     progressDialog->show();
 }
 
 void NewOpenPGPCertificateCommand::Private::showResult(const KeyGenerationResult &result)
 {
     if (result.error().isCanceled()) {
         finished();
         return;
     }
 
     // Ensure that we have the key in the cache
     Key key;
     if (!result.error().code() && result.fingerprint()) {
         std::unique_ptr<Context> ctx{Context::createForProtocol(OpenPGP)};
         if (ctx) {
             Error err;
             key = ctx->key(result.fingerprint(), err, /*secret=*/true);
             if (!key.isNull()) {
                 KeyCache::mutableInstance()->insert(key);
             }
         }
     }
 
     if (!key.isNull()) {
         success(
             xi18n("<para>A new OpenPGP certificate was created successfully.</para>"
                   "<para>Fingerprint of the new certificate: %1</para>",
                   Formatting::prettyID(key.primaryFingerprint())));
         finished();
     } else {
         showErrorDialog(result);
     }
 }
 
 void NewOpenPGPCertificateCommand::Private::showErrorDialog(const KeyGenerationResult &result)
 {
     QString text;
     if (result.error() || !result.fingerprint()) {
         text = xi18n(
             "<para>The creation of a new OpenPGP certificate failed.</para>"
             "<para>Error: <message>%1</message></para>",
             Formatting::errorAsString(result.error()));
     } else {
         // no error and we have a fingerprint, but there was no corresponding key in the key ring
         text = xi18n(
             "<para>A new OpenPGP certificate was created successfully, but it has not been found in the key ring.</para>"
             "<para>Fingerprint of the new certificate:<nl/>%1</para>",
             Formatting::prettyID(result.fingerprint()));
     }
 
     auto dialog = new QDialog;
     applyWindowID(dialog);
     dialog->setWindowTitle(i18nc("@title:window", "Error"));
     auto buttonBox = new QDialogButtonBox{QDialogButtonBox::Retry | QDialogButtonBox::Ok, dialog};
     const auto buttonCode = KMessageBox::createKMessageBox(dialog, buttonBox, QMessageBox::Critical, text, {}, {}, nullptr, {});
     if (buttonCode == QDialogButtonBox::Retry) {
         QMetaObject::invokeMethod(
             q,
             [this]() {
                 getCertificateDetails();
             },
             Qt::QueuedConnection);
     } else {
         finished();
     }
 }
 
 NewOpenPGPCertificateCommand::NewOpenPGPCertificateCommand()
     : NewOpenPGPCertificateCommand(nullptr, nullptr)
 {
 }
 
 NewOpenPGPCertificateCommand::NewOpenPGPCertificateCommand(QAbstractItemView *v, KeyListController *c)
     : Command(v, new Private(this, c))
 {
 }
 
 NewOpenPGPCertificateCommand::~NewOpenPGPCertificateCommand() = default;
 
 void NewOpenPGPCertificateCommand::doStart()
 {
     d->getCertificateDetails();
 }
 
 void NewOpenPGPCertificateCommand::doCancel()
 {
     if (d->detailsDialog) {
         d->detailsDialog->close();
     }
     if (d->job) {
         d->job->slotCancel();
     }
 }
 
 #undef d
 #undef q
diff --git a/src/kcfg/settings.kcfg b/src/kcfg/settings.kcfg
index 659e13872..a2e4dc144 100644
--- a/src/kcfg/settings.kcfg
+++ b/src/kcfg/settings.kcfg
@@ -1,220 +1,215 @@
 <?xml version="1.0" encoding="UTF-8"?>
 <kcfg xmlns="http://www.kde.org/standards/kcfg/1.0"
       xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
       xsi:schemaLocation="http://www.kde.org/standards/kcfg/1.0
       http://www.kde.org/standards/kcfg/1.0/kcfg.xsd" >
  <kcfgfile name="kleopatrarc" />
  <group name="CertificateCreationWizard">
    <entry key="CN_placeholder" name="cnPlaceholder" type="String">
      <label>Placeholder for CN</label>
      <whatsthis>This text will be used as placeholder text for the common name (CN) field of S/MIME certificates.</whatsthis>
      <default></default>
    </entry>
    <entry key="CN_prefill" name="prefillCN" type="Bool">
      <label>Prefill CN automatically</label>
      <whatsthis>If true, then the common name (CN) field of S/MIME certificates will be prefilled with information gathered from the system,
          e.g., from the email settings of the desktop or, on Windows, from the Active Directory.</whatsthis>
      <default>true</default>
    </entry>
    <entry key="EMAIL_placeholder" name="emailPlaceholder" type="String">
      <label>Hint for EMAIL</label>
      <whatsthis>This text will be shown above the email address field of OpenPGP certificates and as placeholder in that field for S/MIME certificates.</whatsthis>
      <default></default>
    </entry>
    <entry key="EMAIL_prefill" name="prefillEmail" type="Bool">
      <label>Prefill EMAIL automatically</label>
      <whatsthis>If true, then the email address field of OpenPGP and S/MIME certificates will be prefilled with information gathered from the system,
          e.g., from the email settings of the desktop or, on Windows, from the Active Directory.</whatsthis>
      <default>true</default>
    </entry>
    <entry key="EMAIL" name="email" type="String">
      <label>Value of EMAIL</label>
      <whatsthis>Prefilled value for the email address field of OpenPGP and S/MIME certificates. This will override EMAIL_prefill. It is useful if no or unsuitable system settings are found for EMAIL_prefill.</whatsthis>
      <default></default>
    </entry>
    <entry key="NAME_placeholder" name="namePlaceholder" type="String">
      <label>Hint for NAME</label>
      <whatsthis>This text will be shown above the name field of OpenPGP certificates.</whatsthis>
      <default></default>
    </entry>
    <entry key="NAME_prefill" name="prefillName" type="Bool">
      <label>Prefill NAME automatically</label>
      <whatsthis>If true, then the name field of OpenPGP certificates will be prefilled with information gathered from the system,
          e.g., from the email settings of the desktop or, on Windows, from the Active Directory.</whatsthis>
      <default>true</default>
    </entry>
    <entry key="NAME" name="name" type="String">
      <label>Value of NAME</label>
      <whatsthis>Prefilled value for the name field of OpenPGP certificates. This will override NAME_prefill. It is useful if no or an unsuitable system setting is found for NAME_prefill.</whatsthis>
      <default></default>
    </entry>
    <entry key="ValidityPeriodInDays" type="Int">
      <label>Default validity period</label>
      <tooltip>Specifies the default validity period of new or extended OpenPGP keys in days.</tooltip>
      <whatsthis>This setting specifies how many days an OpenPGP key will be valid by default at creation or change of validity, or, in other words, after how many days the key will expire. Set this to 0 for unlimited validity. If this setting is not set or is set to a negative value, then new or extended OpenPGP keys will be valid for three years (possibly clamped to the allowed minimum or maximum validity period) by default.</whatsthis>
      <default>-1</default>
    </entry>
    <entry key="ValidityPeriodInDaysMin" type="Int">
      <label>Minimum validity period</label>
      <tooltip>Specifies the minimum allowed validity period of new or extended OpenPGP keys in days.</tooltip>
      <whatsthis>This setting specifies the minimum number of days a user can choose for the validity period of OpenPGP certificates. It applies at key creation and change of validity.</whatsthis>
      <default>1</default>
    </entry>
    <entry key="ValidityPeriodInDaysMax" type="Int">
      <label>Maximum validity period</label>
      <tooltip>Specifies the maximum allowed validity period of new or extended OpenPGP keys in days.</tooltip>
      <whatsthis>This setting specifies the maximum number of days a user can choose for the validity period of OpenPGP certificates. It applies at key creation and change of validity. If this setting is not set or is set to a negative value, then unlimited validity is allowed.</whatsthis>
      <default>-1</default>
    </entry>
-   <entry key="DesignatedRevoker" type="String">
-     <label>Designated revoker</label>
-     <whatsthis>The fingerprint of a designated revoker to be added to each new key. Must be given in the form "algo:fpr [sensitive]". Algo is the public key algorithm of the designated revoker (i.e. RSA=1, DSA=17, etc.) fpr is the fingerprint of the designated revoker. The optional ‘sensitive’ flag marks the designated revoker as sensitive information. Only v4 keys may be designated revokers. GnuPG 2.4.4 is required for adding sensitive revokers.</whatsthis>
-     <default></default>
-   </entry>
    <entry key="HideAdvanced" type="Bool">
      <label>Hide advanced settings</label>
      <whatsthis>If true, hides the advanced settings button in the new certificate wizard.</whatsthis>
      <default>false</default>
    </entry>
  </group>
  <group name="Certification">
    <entry key="CertificationValidityInDays" type="Int">
      <label>Default certification validity</label>
      <tooltip>Specifies the default validity of certifications in days.</tooltip>
      <whatsthis>This setting specifies how many days a certification is valid by default, or, in other words, after how many days a new certification will expire. Set this to 0 for unlimited validity of certifications.</whatsthis>
      <default>0</default>
    </entry>
  </group>
  <group name="ChecksumOperations">
      <entry key="checksum-definition-id" name="ChecksumDefinitionId" type="String">
         <label>Checksum program to use when creating checksum files</label>
         <default>sha256sum</default>
      </entry>
  </group>
  <group name="Clipboard">
     <entry key="ShowResultsAfterSigning" name="ShowResultsAfterSigningClipboard" type="Bool">
       <label>Show results after signing</label>
       <whatsthis>If true, then the results are shown after successfully signing the clipboard.</whatsthis>
       <default>true</default>
     </entry>
     <entry key="ShowResultsAfterEncryption" name="ShowResultsAfterEncryptingClipboard" type="Bool">
       <label>Show results after encryption</label>
       <whatsthis>If true, then the results are shown after successfully encrypting the clipboard.</whatsthis>
       <default>true</default>
     </entry>
  </group>
  <group name="CMS">
    <entry key="Enabled" name="cmsEnabled" type="Bool">
      <label>Enable S/MIME</label>
      <tooltip>Enables support for S/MIME (CMS).</tooltip>
      <whatsthis>If false, then Kleopatra's main UI will not offer any functionality related to S/MIME (CMS).</whatsthis>
      <default>true</default>
    </entry>
    <entry key="AllowCertificateCreation" name="cmsCertificateCreationAllowed" type="Bool">
      <label>Allow S/MIME certificate creation</label>
      <tooltip>Allows the creation of S/MIME certificate signing requests.</tooltip>
      <whatsthis>If false, then Kleopatra will not offer the creation of S/MIME certificate signing requests.</whatsthis>
      <default>true</default>
    </entry>
    <entry key="AllowSigning" name="cmsSigningAllowed" type="Bool">
      <label>Allow signing with S/MIME certificates</label>
      <tooltip>Allows signing of text or files with S/MIME certificates.</tooltip>
      <whatsthis>If false, then Kleopatra will not offer functionality for creating signatures with S/MIME certificates.</whatsthis>
      <default>true</default>
    </entry>
  </group>
  <group name="ConfigurationDialog">
    <entry name="ShowAppearanceConfiguration" type="Bool">
      <label>Show appearance configuration</label>
      <default>true</default>
    </entry>
    <entry name="ShowCryptoOperationsConfiguration" type="Bool">
      <label>Show crypto operations configuration</label>
      <default>true</default>
    </entry>
    <entry name="ShowDirectoryServicesConfiguration" type="Bool">
      <label>Show directory services configuration</label>
      <default>true</default>
    </entry>
    <entry name="ShowGnuPGSystemConfiguration" type="Bool">
      <label>Show GnuPG system configuration</label>
      <default>true</default>
    </entry>
    <entry name="ShowSmartCardsConfiguration" type="Bool">
      <label>Show smart cards configuration</label>
      <default>true</default>
    </entry>
    <entry name="ShowSMimeValidationConfiguration" type="Bool">
      <label>Show S/MIME validation configuration</label>
      <default>true</default>
    </entry>
  </group>
  <group name="DN">
    <entry name="AttributeOrder" type="StringList">
      <label>DN-Attribute Order</label>
      <tooltip>Specifies the display order of the DN attributes of X.509 certificates.</tooltip>
      <default></default>
    </entry>
  </group>
  <group name="Groups">
    <entry name="GroupsEnabled" type="Bool">
      <label>Enable Groups</label>
      <tooltip>Enable usage of groups of keys.</tooltip>
      <whatsthis>Enable usage of groups of keys to create lists of recipients.</whatsthis>
      <default>true</default>
    </entry>
  </group>
  <group name="Import">
    <entry name="RetrieveSignerKeysAfterImport" type="Bool">
      <label>Retrieve signer keys after import</label>
      <whatsthis>If enabled, then Kleopatra will automatically try to retrieve the keys
          that were used to certify the user ids of newly imported OpenPGP keys. This is
          useful in combination with trusted introducers.</whatsthis>
      <default>false</default>
    </entry>
    <entry name="QueryWKDsForAllUserIDs" type="Bool">
      <label>Query certificate directories of providers for all user IDs</label>
      <whatsthis>By default, Kleopatra only queries the certificate directories of providers (WKD)
          for user IDs that were originally retrieved from a WKD when you update an OpenPGP certificate.
          If this option is enabled, then Kleopatra will query WKDs for all user IDs.</whatsthis>
      <default>false</default>
    </entry>
  </group>
  <group name="Notifications">
    <entry name="ShowExpiryNotifications" type="Bool">
      <label>Notify about upcoming certificate expiration</label>
      <whatsthis>If enabled, then Kleopatra will show notifications in some place when using
         certificates that are about to expire soon.</whatsthis>
      <default>true</default>
    </entry>
  </group>
  <group name="Privacy">
    <entry name="BlockedUrlSchemes" type="StringList">
      <label>URL schemes to block</label>
      <whatsthis>This is a list of URL schemes that shall be blocked by the application.
          This can be used to prevent the application from opening external applications for certain URLs.</whatsthis>
      <default></default>
    </entry>
  </group>
  <group name="Smartcard">
    <entry name="AlwaysSearchCardOnKeyserver" type="Bool">
      <label>Always search smartcard certificates on keyserver</label>
      <tooltip>Searches for the certificates belonging the smartcard keys on the configured keyserver.</tooltip>
      <whatsthis>Searches on keyservers regardless of the protocol for the smartcards key, regardless
         of the keyserver protocol. Default behavior is to only do this for LDAP keyservers.</whatsthis>
      <default>false</default>
    </entry>
    <entry key="AutoLoadP15Certs" name="autoLoadP15Certs" type="Bool">
      <label>Try to load S/MIME certificates from PKCS#15 smartcards</label>
      <tooltip>Automatically load S/MIME certificates from PKCS#15 (CardOS) smartcards</tooltip>
      <whatsthis>If true, then Kleopatra will call gpgsm --learn if a PKCS#15 Smartcard is inserted with unknown certificates. This can take a while and blocks the smartcard while the command is running.</whatsthis>
      <default>true</default>
    </entry>
  </group>
  <group name="General">
      <entry name="ProfilesDisabled" type="Bool">
         <label>Disable profile settings</label>
         <default>false</default>
      </entry>
  </group>
 </kcfg>
diff --git a/src/utils/keyparameters.cpp b/src/utils/keyparameters.cpp
index 83db94796..448bec389 100644
--- a/src/utils/keyparameters.cpp
+++ b/src/utils/keyparameters.cpp
@@ -1,394 +1,380 @@
 /* -*- mode: c++; c-basic-offset:4 -*-
     utils/keyparameters.cpp
 
     This file is part of Kleopatra, the KDE keymanager
     SPDX-FileCopyrightText: 2008 Klarälvdalens Datakonsult AB
 
     SPDX-FileCopyrightText: 2020, 2022 g10 Code GmbH
     SPDX-FileContributor: Ingo Klöcker <dev@ingo-kloecker.de>
 
     SPDX-License-Identifier: GPL-2.0-or-later
 */
 
 #include "keyparameters.h"
 
 #include <Libkleo/KeyUsage>
 
 #include <QDate>
 #include <QUrl>
 
 #include "kleopatra_debug.h"
 
 using namespace Kleo;
 using namespace GpgME;
 
 namespace
 {
 QString encodeDomainName(const QString &domain)
 {
     const QByteArray encodedDomain = QUrl::toAce(domain);
     return encodedDomain.isEmpty() ? domain : QString::fromLatin1(encodedDomain);
 }
 
 QString encodeEmail(const QString &email)
 {
     const int at = email.lastIndexOf(QLatin1Char('@'));
     if (at < 0) {
         return email;
     }
     return email.left(at + 1) + encodeDomainName(email.mid(at + 1));
 }
 }
 
 class KeyParameters::Private
 {
     friend class ::Kleo::KeyParameters;
 
     Protocol protocol;
 
     Subkey::PubkeyAlgo keyType = Subkey::AlgoUnknown;
     QString cardKeyRef;
     unsigned int keyLength = 0;
     QString keyCurve;
     KeyUsage keyUsage;
 
     Subkey::PubkeyAlgo subkeyType = Subkey::AlgoUnknown;
     unsigned int subkeyLength = 0;
     QString subkeyCurve;
     KeyUsage subkeyUsage;
 
     QString name;
     QString comment;
     QString dn;
     std::vector<QString> emailAdresses;
     std::vector<QString> domainNames;
     std::vector<QString> uris;
-    std::vector<QString> designatedRevokers;
 
     QDate expirationDate;
 
 public:
     explicit Private(Protocol proto)
         : protocol(proto)
     {
     }
 };
 
 KeyParameters::KeyParameters()
     : KeyParameters{NoProtocol}
 {
 }
 
 KeyParameters::KeyParameters(Protocol protocol)
     : d{new Private{protocol}}
 {
 }
 
 KeyParameters::~KeyParameters() = default;
 
 KeyParameters::KeyParameters(const KeyParameters &other)
     : d{new Private{*other.d}}
 {
 }
 
 KeyParameters &KeyParameters::operator=(const KeyParameters &other)
 {
     *d = *other.d;
     return *this;
 }
 
 KeyParameters::KeyParameters(KeyParameters &&other) = default;
 
 KeyParameters &KeyParameters::operator=(KeyParameters &&other) = default;
 
 KeyParameters::Protocol KeyParameters::protocol() const
 {
     return d->protocol;
 }
 
 void KeyParameters::setKeyType(Subkey::PubkeyAlgo type)
 {
     d->keyType = type;
 }
 
 GpgME::Subkey::PubkeyAlgo KeyParameters::keyType() const
 {
     return d->keyType;
 }
 
 void KeyParameters::setCardKeyRef(const QString &cardKeyRef)
 {
     d->cardKeyRef = cardKeyRef;
 }
 
 QString KeyParameters::cardKeyRef() const
 {
     return d->cardKeyRef;
 }
 
 void KeyParameters::setKeyLength(unsigned int length)
 {
     d->keyLength = length;
 }
 
 unsigned int KeyParameters::keyLength() const
 {
     return d->keyLength;
 }
 
 void KeyParameters::setKeyCurve(const QString &curve)
 {
     d->keyCurve = curve;
 }
 
 QString KeyParameters::keyCurve() const
 {
     return d->keyCurve;
 }
 
 void KeyParameters::setKeyUsage(const KeyUsage &usage)
 {
     d->keyUsage = usage;
 }
 
 KeyUsage KeyParameters::keyUsage() const
 {
     return d->keyUsage;
 }
 
 void KeyParameters::setSubkeyType(Subkey::PubkeyAlgo type)
 {
     d->subkeyType = type;
 }
 
 Subkey::PubkeyAlgo KeyParameters::subkeyType() const
 {
     return d->subkeyType;
 }
 
 void KeyParameters::setSubkeyLength(unsigned int length)
 {
     d->subkeyLength = length;
 }
 
 unsigned int KeyParameters::subkeyLength() const
 {
     return d->subkeyLength;
 }
 
 void KeyParameters::setSubkeyCurve(const QString &curve)
 {
     d->subkeyCurve = curve;
 }
 
 QString KeyParameters::subkeyCurve() const
 {
     return d->subkeyCurve;
 }
 
 void KeyParameters::setSubkeyUsage(const KeyUsage &usage)
 {
     d->subkeyUsage = usage;
 }
 
 KeyUsage KeyParameters::subkeyUsage() const
 {
     return d->subkeyUsage;
 }
 
 void KeyParameters::setExpirationDate(const QDate &date)
 {
     d->expirationDate = date;
 }
 
 QDate KeyParameters::expirationDate() const
 {
     return d->expirationDate;
 }
 
 void KeyParameters::setName(const QString &name)
 {
     d->name = name;
 }
 
 QString KeyParameters::name() const
 {
     return d->name;
 }
 
 void KeyParameters::setComment(const QString &comment)
 {
     d->comment = comment;
 }
 
 QString KeyParameters::comment() const
 {
     return d->comment;
 }
 
 void KeyParameters::setDN(const QString &dn)
 {
     d->dn = dn;
 }
 
 QString KeyParameters::dn() const
 {
     return d->dn;
 }
 
 void KeyParameters::setEmail(const QString &email)
 {
     d->emailAdresses = {email};
 }
 
 void KeyParameters::addEmail(const QString &email)
 {
     d->emailAdresses.push_back(email);
 }
 
 std::vector<QString> KeyParameters::emails() const
 {
     return d->emailAdresses;
 }
 
 void KeyParameters::addDomainName(const QString &domain)
 {
     d->domainNames.push_back(domain);
 }
 
 std::vector<QString> KeyParameters::domainNames() const
 {
     return d->domainNames;
 }
 
 void KeyParameters::addURI(const QString &uri)
 {
     d->uris.push_back(uri);
 }
 
 std::vector<QString> KeyParameters::uris() const
 {
     return d->uris;
 }
 
-void KeyParameters::addDesignatedRevoker(const QString &fpr)
-{
-    d->designatedRevokers.push_back(fpr);
-}
-
-std::vector<QString> KeyParameters::designatedRevokers() const
-{
-    return d->designatedRevokers;
-}
-
 namespace
 {
 QString serialize(Subkey::PubkeyAlgo algo)
 {
     return QString::fromLatin1(Subkey::publicKeyAlgorithmAsString(algo));
 }
 
 QString serialize(unsigned int number)
 {
     return QString::number(number);
 }
 
 QString serialize(KeyUsage keyUsage)
 {
     QStringList usages;
     if (keyUsage.canSign()) {
         usages << QStringLiteral("sign");
     }
     if (keyUsage.canEncrypt()) {
         usages << QStringLiteral("encrypt");
     }
     if (keyUsage.canAuthenticate()) {
         usages << QStringLiteral("auth");
     }
     if (keyUsage.canCertify()) {
         usages << QStringLiteral("cert");
     }
     return usages.join(QLatin1Char{' '});
 }
 
 QString serialize(const QDate &date)
 {
     return date.toString(Qt::ISODate);
 }
 
 QString serialize(const char *key, const QString &value)
 {
     return QString::fromLatin1(key) + QLatin1Char(':') + value;
 }
 }
 
 QString KeyParameters::toString() const
 {
     QStringList keyParameters;
 
     keyParameters.push_back(QLatin1String("<GnupgKeyParms format=\"internal\">"));
 
     if (d->protocol == OpenPGP) {
         // for backward compatibility with GnuPG 2.0 and earlier
         keyParameters.push_back(QStringLiteral("%ask-passphrase"));
     }
 
     // add Key-Type as first parameter
     if (!d->cardKeyRef.isEmpty()) {
         keyParameters.push_back(serialize("Key-Type", QLatin1String{"card:"} + d->cardKeyRef));
     } else if (d->keyType != Subkey::AlgoUnknown) {
         keyParameters.push_back(serialize("Key-Type", serialize(d->keyType)));
     } else {
         qCWarning(KLEOPATRA_LOG) << "KeyParameters::toString(): Key type is unset/empty";
     }
     if (d->keyLength) {
         keyParameters.push_back(serialize("Key-Length", serialize(d->keyLength)));
     }
     if (!d->keyCurve.isEmpty()) {
         keyParameters.push_back(serialize("Key-Curve", d->keyCurve));
     }
     keyParameters.push_back(serialize("Key-Usage", serialize(d->keyUsage)));
 
     if (d->subkeyType != Subkey::AlgoUnknown) {
         keyParameters.push_back(serialize("Subkey-Type", serialize(d->subkeyType)));
         if (d->subkeyUsage.value()) {
             keyParameters.push_back(serialize("Subkey-Usage", serialize(d->subkeyUsage)));
         }
         if (d->subkeyLength) {
             keyParameters.push_back(serialize("Subkey-Length", serialize(d->subkeyLength)));
         }
         if (!d->subkeyCurve.isEmpty()) {
             keyParameters.push_back(serialize("Subkey-Curve", d->subkeyCurve));
         }
     }
 
     if (d->expirationDate.isValid()) {
         keyParameters.push_back(serialize("Expire-Date", serialize(d->expirationDate)));
     }
 
     if (!d->name.isEmpty()) {
         keyParameters.push_back(serialize("Name-Real", d->name));
     }
     if (!d->comment.isEmpty()) {
         keyParameters.push_back(serialize("Name-Comment", d->comment));
     }
     if (!d->dn.isEmpty()) {
         keyParameters.push_back(serialize("Name-DN", d->dn));
     }
     std::transform(std::cbegin(d->emailAdresses), std::cend(d->emailAdresses), std::back_inserter(keyParameters), [this](const auto &email) {
         return serialize("Name-Email", (d->protocol == CMS) ? encodeEmail(email) : email);
     });
     std::transform(std::cbegin(d->domainNames), std::cend(d->domainNames), std::back_inserter(keyParameters), [](const auto &domain) {
         return serialize("Name-DNS", encodeDomainName(domain));
     });
     std::transform(std::cbegin(d->uris), std::cend(d->uris), std::back_inserter(keyParameters), [](const auto &uri) {
         return serialize("Name-URI", uri);
     });
-    std::transform(std::cbegin(d->designatedRevokers), std::cend(d->designatedRevokers), std::back_inserter(keyParameters), [](const auto &designatedRevoker) {
-        return serialize("Revoker", designatedRevoker);
-    });
 
     keyParameters.push_back(QLatin1String("</GnupgKeyParms>"));
 
     return keyParameters.join(QLatin1Char('\n'));
 }
diff --git a/src/utils/keyparameters.h b/src/utils/keyparameters.h
index b486e1501..9eb3536bc 100644
--- a/src/utils/keyparameters.h
+++ b/src/utils/keyparameters.h
@@ -1,92 +1,89 @@
 /* -*- mode: c++; c-basic-offset:4 -*-
     utils/keyparameters.h
 
     This file is part of Kleopatra, the KDE keymanager
     SPDX-FileCopyrightText: 2020, 2022 g10 Code GmbH
     SPDX-FileContributor: Ingo Klöcker <dev@ingo-kloecker.de>
 
     SPDX-License-Identifier: GPL-2.0-or-later
 */
 
 #pragma once
 
 #include <gpgme++/key.h>
 
 #include <memory>
 
 class QDate;
 class QString;
 
 namespace Kleo
 {
 class KeyUsage;
 
 class KeyParameters
 {
 public:
     enum Protocol {
         NoProtocol,
         OpenPGP,
         CMS,
     };
 
     KeyParameters();
     explicit KeyParameters(Protocol protocol);
     ~KeyParameters();
 
     KeyParameters(const KeyParameters &other);
     KeyParameters &operator=(const KeyParameters &other);
 
     KeyParameters(KeyParameters &&other);
     KeyParameters &operator=(KeyParameters &&other);
 
     Protocol protocol() const;
 
     void setKeyType(GpgME::Subkey::PubkeyAlgo type);
     GpgME::Subkey::PubkeyAlgo keyType() const;
     void setCardKeyRef(const QString &cardKeyRef);
     QString cardKeyRef() const;
     void setKeyLength(unsigned int length);
     unsigned int keyLength() const;
     void setKeyCurve(const QString &curve);
     QString keyCurve() const;
     void setKeyUsage(const KeyUsage &usage);
     KeyUsage keyUsage() const;
 
     void setSubkeyType(GpgME::Subkey::PubkeyAlgo type);
     GpgME::Subkey::PubkeyAlgo subkeyType() const;
     void setSubkeyLength(unsigned int length);
     unsigned int subkeyLength() const;
     void setSubkeyCurve(const QString &curve);
     QString subkeyCurve() const;
     void setSubkeyUsage(const KeyUsage &usage);
     KeyUsage subkeyUsage() const;
 
     void setExpirationDate(const QDate &date);
     QDate expirationDate() const;
 
     void setName(const QString &name);
     QString name() const;
     void setComment(const QString &comment);
     QString comment() const;
     void setDN(const QString &dn);
     QString dn() const;
     void setEmail(const QString &email);
     void addEmail(const QString &email);
     std::vector<QString> emails() const;
     void addDomainName(const QString &domain);
     std::vector<QString> domainNames() const;
     void addURI(const QString &uri);
     std::vector<QString> uris() const;
 
-    void addDesignatedRevoker(const QString &fpr);
-    std::vector<QString> designatedRevokers() const;
-
     QString toString() const;
 
 private:
     class Private;
     std::unique_ptr<Private> d;
 };
 
 }