Difference between revisions of "Gpg --generate-key"
Jump to navigation
Jump to search
Line 29: | Line 29: | ||
GnuPG needs to construct a user ID to identify your key. | GnuPG needs to construct a user ID to identify your key. | ||
+ | |||
+ | Real name: your real name | ||
+ | Email address: [email protected] | ||
+ | Comment: your comment | ||
+ | You selected this USER-ID: | ||
+ | "your real name (your comment) <[email protected]>" | ||
+ | |||
+ | Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O | ||
+ | We need to generate a lot of random bytes. It is a good idea to perform | ||
+ | some other action (type on the keyboard, move the mouse, utilize the | ||
+ | disks) during the prime generation; this gives the random number | ||
+ | generator a better chance to gain enough entropy. | ||
+ | We need to generate a lot of random bytes. It is a good idea to perform | ||
+ | some other action (type on the keyboard, move the mouse, utilize the | ||
+ | disks) during the prime generation; this gives the random number | ||
+ | generator a better chance to gain enough entropy. | ||
+ | gpg: key 12345677899 marked as ultimately trusted | ||
+ | gpg: directory '[[/root/.gnupg/openpgp-revocs.d]]' created | ||
+ | gpg: revocation certificate stored as '[[/root/.gnupg/openpgp-revocs.d/]]1234562E3EA0D54744C1C82C296123456.rev' | ||
+ | public and secret key created and signed. | ||
+ | |||
+ | pub rsa3072 2022-11-09 [SC] | ||
+ | 1234562E3EA0D54744C1C82C296123456 | ||
+ | uid your real name (your comment) <[email protected]> | ||
+ | sub rsa3072 2022-11-09 [E] | ||
Revision as of 09:20, 9 November 2022
https://www.gnupg.org/documentation/manpage.html
gpg --full-generate-key gpg (GnuPG) 2.2.27; Copyright (C) 2021 Free Software Foundation, Inc. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Please select what kind of key you want: (1) RSA and RSA (default) (2) DSA and Elgamal (3) DSA (sign only) (4) RSA (sign only) (14) Existing key from card Your selection? 1 RSA keys may be between 1024 and 4096 bits long. What keysize do you want? (3072) Requested keysize is 3072 bits Please specify how long the key should be valid. 0 = key does not expire <n> = key expires in n days <n>w = key expires in n weeks <n>m = key expires in n months <n>y = key expires in n years Key is valid for? (0) 0 Key does not expire at all Is this correct? (y/N) y GnuPG needs to construct a user ID to identify your key.
Real name: your real name Email address: [email protected] Comment: your comment You selected this USER-ID:
"your real name (your comment) <[email protected]>"
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. gpg: key 12345677899 marked as ultimately trusted gpg: directory '/root/.gnupg/openpgp-revocs.d' created gpg: revocation certificate stored as '/root/.gnupg/openpgp-revocs.d/1234562E3EA0D54744C1C82C296123456.rev' public and secret key created and signed.
pub rsa3072 2022-11-09 [SC] 1234562E3EA0D54744C1C82C296123456 uid your real name (your comment) <[email protected]> sub rsa3072 2022-11-09 [E]
Related
See also
gpg, --batch | --generate-key | --full-generate-key | --recv-keys | --export | --encrypt | --import | --list-keys | --list-secret-key | --gen-key | --armor | --dearmor | --send-keys | --search-keys | --quick-set-expire | --keyserver | --delete-keys | --full-generate-key | --armor --export | gpg --help
Advertising: