On Tue, 18 Jan 2022 15:59, Bernd Graf said:
> How can I require `gpg --verify` to only accept keys from my keyring
> with a certain trust level and fail otherwise (rc!=0)
Use gpgv instead of gpg.
Salam-Shalom,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
On Dienstag, 18. Januar 2022 15:59:11 CET Bernd Graf via Gnupg-users wrote:
> How can I require `gpg --verify` to only accept keys from my keyring
> with a certain trust level and fail otherwise (rc!=0)
>
> Alternatively, how can I check that a signature was done with a specific
> key?
Use gpgv
Hi,
for a backup integrity protection, I want to add a signature check to
the restore script to reject the backup files that are not properly
signed. So far, so good.
#$ gpg --verify backup.tar.sig
#$ if [ $? -ne 0 ]; then echo "backup is not properly signed!"; exit 1; fi
#$ tar xzvf
Hi,
for a backup integrity protection, I want to add a signature check to
the restore script to reject the backup files that are not properly
signed. So far, so good.
#$ gpg --verify backup.tar.sig
#$ if [ $? -ne 0 ]; then echo "backup is not properly signed!"; exit 1; fi
#$ tar xzvf