summaryrefslogtreecommitdiffstats
path: root/g10/options.h
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>2023-01-20 11:02:02 +0100
committerWerner Koch <wk@gnupg.org>2023-01-20 11:03:40 +0100
commitd98bf02a036321c8450cc836dea39671da5cfa83 (patch)
treec35eddad9c21b8b28148a7716c0b0575713fa54a /g10/options.h
parentgpg: Do not require --status-fd along with --require-compliance. (diff)
downloadgnupg2-d98bf02a036321c8450cc836dea39671da5cfa83.tar.xz
gnupg2-d98bf02a036321c8450cc836dea39671da5cfa83.zip
gpg: Replace --override-compliance-check by a real fix.
* common/compliance.c (gnupg_pk_is_allowed): Handle EdDSA. * g10/gpg.c (oOverrideComplianceCheck): Remove. (opts): Turn --override-compliance-check into a dummy option. * g10/options.h (opt): Remove override_compliance_check. * g10/sig-check.c (check_key_verify_compliance): Remove use of that option. -- The introduction of --override-compliance-check actually hid the real cause for the signature verification problem in de-vs mode for the Ed25519 key. The real fix is to handle the EdDSA algorithm in gnupg_pk_is_allowed. Fixes-commit: fb26e144adfd93051501d58f5d0d4f8826ddf436 GnuPG-bug-id: 5655
Diffstat (limited to 'g10/options.h')
-rw-r--r--g10/options.h1
1 files changed, 0 insertions, 1 deletions
diff --git a/g10/options.h b/g10/options.h
index fa649f8ca..74a6cdb16 100644
--- a/g10/options.h
+++ b/g10/options.h
@@ -245,7 +245,6 @@ struct
unsigned int allow_old_cipher_algos:1;
unsigned int allow_weak_digest_algos:1;
unsigned int allow_weak_key_signatures:1;
- unsigned int override_compliance_check:1;
unsigned int large_rsa:1;
unsigned int disable_signer_uid:1;
unsigned int include_key_block:1;