mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-03 22:56:33 +02:00
gpgsm: New option --require-compliance
* sm/gpgsm.c (oRequireCompliance): New. (opts): Add --require-compliance. (main): Set option. * sm/gpgsm.h (opt): Add field require_compliance. (gpgsm_errors_seen): Declare. * sm/verify.c (gpgsm_verify): Emit error if non de-vs compliant. * sm/encrypt.c (gpgsm_encrypt): Ditto. * sm/decrypt.c (gpgsm_decrypt): Ditto. --
This commit is contained in:
parent
ee013c5350
commit
f8075257af
6 changed files with 46 additions and 3 deletions
|
@ -699,6 +699,17 @@ This option adjusts the compliance mode "de-vs" for stricter key size
|
|||
requirements. For example, a value of 3000 turns rsa2048 and dsa2048
|
||||
keys into non-VS-NfD compliant keys.
|
||||
|
||||
@item --require-compliance
|
||||
@opindex require-compliance
|
||||
To check that data has been encrypted according to the rules of the
|
||||
current compliance mode, a gpgsm user needs to evaluate the status
|
||||
lines. This is allows frontends to handle compliance check in a more
|
||||
flexible way. However, for scripted use the required evaluation of
|
||||
the status-line requires quite some effort; this option can be used
|
||||
instead to make sure that the gpgsm process exits with a failure if
|
||||
the compliance rules are not fulfilled. Note that this option has
|
||||
currently an effect only in "de-vs" mode.
|
||||
|
||||
@item --ignore-cert-with-oid @var{oid}
|
||||
@opindex ignore-cert-with-oid
|
||||
Add @var{oid} to the list of OIDs to be checked while reading
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue