mirror of
git://git.gnupg.org/gnupg.git
synced 2025-03-25 22:19:59 +01:00
gpg: New option --disable-pqc-encryption.
* g10/options.h (flags): Add field disable_pqc_encryption. * g10/gpg.c (oDisablePQCEncryption): New. (opts): Add --option. (main): Set option. * g10/getkey.c (finish_lookup): Skip subkeys if option is set. -- This option can be used to avoid the use of Kyber encryption subkeys if this does not make sense (i.e. protection of local files).
This commit is contained in:
parent
da9fb6bd16
commit
00c31f8b04
@ -3157,6 +3157,13 @@ ML-KEM1024) algorithms and AES-256 are considered quantum-resistant;
|
||||
Kyber is always used in a composite scheme along with a classic ECC
|
||||
algorithm.
|
||||
|
||||
@item --disable-pqc-encryption
|
||||
@opindex disable-pqc-encryption
|
||||
This option disables the use of quantum-resistant subkeys and uses a
|
||||
subkey with a non-quantum-resistant algorithm if available or throw an
|
||||
error otherwise. The option is ignored if
|
||||
@option{--require-pqc-encryption} is active.
|
||||
|
||||
@item --require-compliance
|
||||
@opindex require-compliance
|
||||
To check that data has been encrypted according to the rules of the
|
||||
|
@ -89,6 +89,10 @@ The UTC time the key was created in ISO compressed format
|
||||
(yyyymmddThhmmss). This information can be used to re-create an
|
||||
OpenPGP key.
|
||||
|
||||
*** Link
|
||||
For a composite key this item gives the keygrip of the other key part.
|
||||
In particular Kyber keys may use this to link to the ECC part and vice versa.
|
||||
|
||||
*** Label
|
||||
This is a short human readable description for the key which can be
|
||||
used by the software to describe the key in a user interface. For
|
||||
|
@ -3804,6 +3804,14 @@ finish_lookup (kbnode_t keyblock, unsigned int req_usage, int want_exact,
|
||||
req_usage, pk->pubkey_usage);
|
||||
continue;
|
||||
}
|
||||
if (opt.flags.disable_pqc_encryption
|
||||
&& pk->pubkey_algo == PUBKEY_ALGO_KYBER)
|
||||
{
|
||||
if (DBG_LOOKUP)
|
||||
log_debug ("\tsubkey skipped due to option %s\n",
|
||||
"--disable-pqc-encryption");
|
||||
continue;
|
||||
}
|
||||
|
||||
n_subkeys++;
|
||||
if (pk->flags.revoked)
|
||||
|
@ -461,6 +461,7 @@ enum cmd_and_opt_values
|
||||
oAssertPubkeyAlgo,
|
||||
oKbxBufferSize,
|
||||
oRequirePQCEncryption,
|
||||
oDisablePQCEncryption,
|
||||
oProcAllSigs,
|
||||
|
||||
oNoop
|
||||
@ -907,6 +908,7 @@ static gpgrt_opt_t opts[] = {
|
||||
ARGPARSE_s_s (oDigestAlgo, "digest-algo", "@"),
|
||||
ARGPARSE_s_s (oCertDigestAlgo, "cert-digest-algo", "@"),
|
||||
ARGPARSE_s_n (oRequirePQCEncryption, "require-pqc-encryption", "@"),
|
||||
ARGPARSE_s_n (oDisablePQCEncryption, "disable-pqc-encryption", "@"),
|
||||
|
||||
ARGPARSE_header (NULL, N_("Options for unattended use")),
|
||||
|
||||
@ -3095,6 +3097,11 @@ main (int argc, char **argv)
|
||||
case oMinRSALength: opt.min_rsa_length = pargs.r.ret_ulong; break;
|
||||
case oRequirePQCEncryption:
|
||||
opt.flags.require_pqc_encryption = 1;
|
||||
opt.flags.disable_pqc_encryption = 0;
|
||||
break;
|
||||
case oDisablePQCEncryption:
|
||||
if (!opt.flags.require_pqc_encryption)
|
||||
opt.flags.disable_pqc_encryption = 1;
|
||||
break;
|
||||
|
||||
case oRFC2440Text: opt.rfc2440_text=1; break;
|
||||
|
@ -308,6 +308,9 @@ struct
|
||||
unsigned int require_compliance:1;
|
||||
/* Fail encryption unless a PQC algorithm is used. */
|
||||
unsigned int require_pqc_encryption:1;
|
||||
/* Do not use PQC subkeys for encryption. This is never set if
|
||||
* require_pqc_encryption is also set. */
|
||||
unsigned int disable_pqc_encryption:1;
|
||||
/* Process all signatures even in batch mode. */
|
||||
unsigned int proc_all_sigs:1;
|
||||
} flags;
|
||||
|
Loading…
x
Reference in New Issue
Block a user