diff options
author | Werner Koch <wk@gnupg.org> | 2023-01-20 11:02:02 +0100 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2023-01-20 11:03:40 +0100 |
commit | d98bf02a036321c8450cc836dea39671da5cfa83 (patch) | |
tree | c35eddad9c21b8b28148a7716c0b0575713fa54a /common | |
parent | gpg: Do not require --status-fd along with --require-compliance. (diff) | |
download | gnupg2-d98bf02a036321c8450cc836dea39671da5cfa83.tar.xz gnupg2-d98bf02a036321c8450cc836dea39671da5cfa83.zip |
gpg: Replace --override-compliance-check by a real fix.
* common/compliance.c (gnupg_pk_is_allowed): Handle EdDSA.
* g10/gpg.c (oOverrideComplianceCheck): Remove.
(opts): Turn --override-compliance-check into a dummy option.
* g10/options.h (opt): Remove override_compliance_check.
* g10/sig-check.c (check_key_verify_compliance): Remove use of that
option.
--
The introduction of --override-compliance-check actually hid the real
cause for the signature verification problem in de-vs mode for the
Ed25519 key. The real fix is to handle the EdDSA algorithm in
gnupg_pk_is_allowed.
Fixes-commit: fb26e144adfd93051501d58f5d0d4f8826ddf436
GnuPG-bug-id: 5655
Diffstat (limited to 'common')
-rw-r--r-- | common/compliance.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/common/compliance.c b/common/compliance.c index 315927575..59d94038d 100644 --- a/common/compliance.c +++ b/common/compliance.c @@ -353,6 +353,10 @@ gnupg_pk_is_allowed (enum gnupg_compliance_mode compliance, case PUBKEY_ALGO_EDDSA: + if (use == PK_USE_VERIFICATION) + result = 1; + else /* We may not create such signatures in de-vs mode. */ + result = 0; break; default: |