In contrast, --decrypt honors gcrypt not claiming compliance:
% gpg --quick-generate-key 'rsa' default default never gpg: keybox '/tmp/tmp.aDPFCt4wI2/pubring.kbx' created We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. gpg: /tmp/tmp.aDPFCt4wI2/trustdb.gpg: trustdb created gpg: directory '/tmp/tmp.aDPFCt4wI2/openpgp-revocs.d' created gpg: revocation certificate stored as '/tmp/tmp.aDPFCt4wI2/openpgp-revocs.d/D3F6ACB7B660B54779727A5F514BBADC83BBF12F.rev' public and secret key created and signed. pub rsa3072 2022-09-28 [SC] D3F6ACB7B660B54779727A5F514BBADC83BBF12F uid rsa sub rsa3072 2022-09-28 [E] % echo huch | gpg --status-fd=1 --always-trust --encrypt --recipient D3F6ACB7B660B54779727A5F514BBADC83BBF12F --output cyphertext.pgp [GNUPG:] KEY_CONSIDERED D3F6ACB7B660B54779727A5F514BBADC83BBF12F 0 [GNUPG:] ENCRYPTION_COMPLIANCE_MODE 23 [GNUPG:] BEGIN_ENCRYPTION 2 9 [GNUPG:] END_ENCRYPTION % gpg --status-fd=1 --decrypt --output /dev/null cyphertext.pgp [GNUPG:] ENC_TO B6CFBECFADDEB0C7 1 0 [GNUPG:] KEY_CONSIDERED D3F6ACB7B660B54779727A5F514BBADC83BBF12F 0 [GNUPG:] KEY_CONSIDERED D3F6ACB7B660B54779727A5F514BBADC83BBF12F 0 [GNUPG:] DECRYPTION_KEY 1144D2BBE4438F40699D2008B6CFBECFADDEB0C7 D3F6ACB7B660B54779727A5F514BBADC83BBF12F u [GNUPG:] KEY_CONSIDERED D3F6ACB7B660B54779727A5F514BBADC83BBF12F 0 gpg: encrypted with 3072-bit RSA key, ID B6CFBECFADDEB0C7, created 2022-09-28 "rsa" [GNUPG:] BEGIN_DECRYPTION [GNUPG:] DECRYPTION_INFO 2 9 0 [GNUPG:] PLAINTEXT 62 1664364604 [GNUPG:] PLAINTEXT_LENGTH 5 [GNUPG:] DECRYPTION_OKAY [GNUPG:] GOODMDC [GNUPG:] END_DECRYPTION