Difference between revisions of "Gpg --generate-key"

From wikieduonline
Jump to navigation Jump to search
Line 29: Line 29:
 
   
 
   
 
  GnuPG needs to construct a user ID to identify your key.
 
  GnuPG needs to construct a user ID to identify your key.
 +
 +
Real name: your real name
 +
Email address: [email protected]
 +
Comment: your comment
 +
You selected this USER-ID:
 +
    "your real name (your comment) <[email protected]>"
 +
 +
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
 +
We need to generate a lot of random bytes. It is a good idea to perform
 +
some other action (type on the keyboard, move the mouse, utilize the
 +
disks) during the prime generation; this gives the random number
 +
generator a better chance to gain enough entropy.
 +
We need to generate a lot of random bytes. It is a good idea to perform
 +
some other action (type on the keyboard, move the mouse, utilize the
 +
disks) during the prime generation; this gives the random number
 +
generator a better chance to gain enough entropy.
 +
gpg: key 12345677899 marked as ultimately trusted
 +
gpg: directory '[[/root/.gnupg/openpgp-revocs.d]]' created
 +
gpg: revocation certificate stored as '[[/root/.gnupg/openpgp-revocs.d/]]1234562E3EA0D54744C1C82C296123456.rev'
 +
public and secret key created and signed.
 +
 +
pub  rsa3072 2022-11-09 [SC]
 +
      1234562E3EA0D54744C1C82C296123456
 +
uid                      your real name (your comment) <[email protected]>
 +
sub  rsa3072 2022-11-09 [E]
  
  

Revision as of 09:20, 9 November 2022

https://www.gnupg.org/documentation/manpage.html


gpg --full-generate-key
gpg (GnuPG) 2.2.27; Copyright (C) 2021 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. 

Please select what kind of key you want:
   (1) RSA and RSA (default)
   (2) DSA and Elgamal
   (3) DSA (sign only)
   (4) RSA (sign only)
  (14) Existing key from card
Your selection? 1
RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (3072)
Requested keysize is 3072 bits
Please specify how long the key should be valid.
         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years
Key is valid for? (0) 0
Key does not expire at all
Is this correct? (y/N) y

GnuPG needs to construct a user ID to identify your key.

Real name: your real name Email address: [email protected] Comment: your comment You selected this USER-ID:

   "your real name (your comment) <[email protected]>"
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: key 12345677899 marked as ultimately trusted
gpg: directory '/root/.gnupg/openpgp-revocs.d' created
gpg: revocation certificate stored as '/root/.gnupg/openpgp-revocs.d/1234562E3EA0D54744C1C82C296123456.rev'
public and secret key created and signed. 
pub   rsa3072 2022-11-09 [SC]
      1234562E3EA0D54744C1C82C296123456
uid                      your real name (your comment) <[email protected]>
sub   rsa3072 2022-11-09 [E]


Related

See also

Advertising: