| SOPV-INLINE-VERIFY(1) | Stateless OpenPGP Signature Verification | SOPV-INLINE-VERIFY(1) |
sopv-inline-verify - Verify OpenPGP signed message
sopv [--debug] inline-verify [--not-before=DATE] [--not-after=DATE] [--verifications-out=VERIFICATIONS] [--] CERTS [CERTS...] <INLINESIGNED
sopv inline-verify evaluates OpenPGP signatures bundled in a message. Its standard input can be either an OpenPGP Signed Message or a message signed with the OpenPGP Cleartext Signing Framework. If a valid signature is found, it returns 0 and emits the contents of the message (without any signatures) on standard output.
If no valid OpenPGP signature is found, sopv inline-verify returns non-zero.
if sopv inline-verify signer.cert < message.signed > message.txt; then
echo "The information found in message.txt was signed" else
rm message.txt
echo "no valid signature found" fi
One or more CERTS arguments should point to OpenPGP certificates that would be acceptable signers.
sopv inline-verify returns 0 to indicate that at least one valid signature was found.
It may fail for other reasons, but NO_SIGNATURE (3) is a likely failure mode when the message contains no valid signature from any of the CERTS.
This manual page was written by Daniel Kahn Gillmor. Your implementation of sopv is likely written by someone else in alignment with the SOP specification. Please run sopv version to learn more about your implementation.
sopv(1), sopv-version(1), sopv-inline-verify(1), Stateless OpenPGP Command Line Interface https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/, RFC 9580 https://www.rfc-editor.org/rfc/rfc9580.html
| March 2025 | sopv 1.1 |