In contrast, --decrypt honors gcrypt not claiming compliance:
% gpg --quick-generate-key 'rsa' default default never
gpg: keybox '/tmp/tmp.aDPFCt4wI2/pubring.kbx' created
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: /tmp/tmp.aDPFCt4wI2/trustdb.gpg: trustdb created
gpg: directory '/tmp/tmp.aDPFCt4wI2/openpgp-revocs.d' created
gpg: revocation certificate stored as '/tmp/tmp.aDPFCt4wI2/openpgp-revocs.d/D3F6ACB7B660B54779727A5F514BBADC83BBF12F.rev'
public and secret key created and signed.
pub rsa3072 2022-09-28 [SC]
D3F6ACB7B660B54779727A5F514BBADC83BBF12F
uid rsa
sub rsa3072 2022-09-28 [E]
% echo huch | gpg --status-fd=1 --always-trust --encrypt --recipient D3F6ACB7B660B54779727A5F514BBADC83BBF12F --output cyphertext.pgp
[GNUPG:] KEY_CONSIDERED D3F6ACB7B660B54779727A5F514BBADC83BBF12F 0
[GNUPG:] ENCRYPTION_COMPLIANCE_MODE 23
[GNUPG:] BEGIN_ENCRYPTION 2 9
[GNUPG:] END_ENCRYPTION
% gpg --status-fd=1 --decrypt --output /dev/null cyphertext.pgp
[GNUPG:] ENC_TO B6CFBECFADDEB0C7 1 0
[GNUPG:] KEY_CONSIDERED D3F6ACB7B660B54779727A5F514BBADC83BBF12F 0
[GNUPG:] KEY_CONSIDERED D3F6ACB7B660B54779727A5F514BBADC83BBF12F 0
[GNUPG:] DECRYPTION_KEY 1144D2BBE4438F40699D2008B6CFBECFADDEB0C7 D3F6ACB7B660B54779727A5F514BBADC83BBF12F u
[GNUPG:] KEY_CONSIDERED D3F6ACB7B660B54779727A5F514BBADC83BBF12F 0
gpg: encrypted with 3072-bit RSA key, ID B6CFBECFADDEB0C7, created 2022-09-28
"rsa"
[GNUPG:] BEGIN_DECRYPTION
[GNUPG:] DECRYPTION_INFO 2 9 0
[GNUPG:] PLAINTEXT 62 1664364604
[GNUPG:] PLAINTEXT_LENGTH 5
[GNUPG:] DECRYPTION_OKAY
[GNUPG:] GOODMDC
[GNUPG:] END_DECRYPTION