Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- stefan@stefan-laptop:~$ gpg --gen-key
- gpg (GnuPG) 1.4.10; Copyright (C) 2008 Free Software Foundation, Inc.
- This is free software: you are free to change and redistribute it.
- There is NO WARRANTY, to the extent permitted by law.
- Please select what kind of key you want:
- (1) RSA and RSA (default)
- (2) DSA and Elgamal
- (3) DSA (sign only)
- (4) RSA (sign only)
- Your selection? 1
- RSA keys may be between 1024 and 4096 bits long.
- What keysize do you want? (2048) 4096
- Requested keysize is 4096 bits
- Please specify how long the key should be valid.
- 0 = key does not expire
- <n> = key expires in n days
- <n>w = key expires in n weeks
- <n>m = key expires in n months
- <n>y = key expires in n years
- Key is valid for? (0) 0
- Key does not expire at all
- Is this correct? (y/N) y
- You need a user ID to identify your key; the software constructs the user ID
- from the Real Name, Comment and Email Address in this form:
- "Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>"
- Real name: Stefan Bernhardsgrütter
- Email address: s.bernhardsgruetter@gmail.com
- Comment:
- You are using the `utf-8' character set.
- You selected this USER-ID:
- "Stefan Bernhardsgrütter <s.bernhardsgruetter@gmail.com>"
- Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
- You need a Passphrase to protect your secret key.
- gpg: gpg-agent is not available in this session
- We need to generate a lot of random bytes. It is a good idea to perform
- some other action (type on the keyboard, move the mouse, utilize the
- disks) during the prime generation; this gives the random number
- generator a better chance to gain enough entropy.
- Not enough random bytes available. Please do some other work to give
- the OS a chance to collect more entropy! (Need 276 more bytes)
- ...........+++++
- Not enough random bytes available. Please do some other work to give
- the OS a chance to collect more entropy! (Need 163 more bytes)
- ................+++++
- We need to generate a lot of random bytes. It is a good idea to perform
- some other action (type on the keyboard, move the mouse, utilize the
- disks) during the prime generation; this gives the random number
- generator a better chance to gain enough entropy.
- gpg: /home/stefan/.gnupg/trustdb.gpg: trustdb created
- gpg: key E6E1851A marked as ultimately trusted
- public and secret key created and signed.
- gpg: checking the trustdb
- gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
- gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
- pub 4096R/E6E1851A 2010-09-05
- Key fingerprint = D6F7 04E8 C8CE A7E4 948B 35AD EE5D CCA3 E6E1 851A
- uid Stefan Bernhardsgrütter <s.bernhardsgruetter@gmail.com>
- sub 4096R/1DC6A0D1 2010-09-05
- stefan@stefan-laptop:~$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement