Advertisement
Guest User

Untitled

a guest
Jun 16th, 2017
576
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.69 KB | None | 0 0
  1. stefan@stefan-laptop:~$ gpg --gen-key
  2. gpg (GnuPG) 1.4.10; Copyright (C) 2008 Free Software Foundation, Inc.
  3. This is free software: you are free to change and redistribute it.
  4. There is NO WARRANTY, to the extent permitted by law.
  5.  
  6. Please select what kind of key you want:
  7. (1) RSA and RSA (default)
  8. (2) DSA and Elgamal
  9. (3) DSA (sign only)
  10. (4) RSA (sign only)
  11. Your selection? 1
  12. RSA keys may be between 1024 and 4096 bits long.
  13. What keysize do you want? (2048) 4096
  14. Requested keysize is 4096 bits
  15. Please specify how long the key should be valid.
  16. 0 = key does not expire
  17. <n> = key expires in n days
  18. <n>w = key expires in n weeks
  19. <n>m = key expires in n months
  20. <n>y = key expires in n years
  21. Key is valid for? (0) 0
  22. Key does not expire at all
  23. Is this correct? (y/N) y
  24.  
  25. You need a user ID to identify your key; the software constructs the user ID
  26. from the Real Name, Comment and Email Address in this form:
  27. "Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>"
  28.  
  29. Real name: Stefan Bernhardsgrütter
  30. Email address: s.bernhardsgruetter@gmail.com
  31. Comment:
  32. You are using the `utf-8' character set.
  33. You selected this USER-ID:
  34. "Stefan Bernhardsgrütter <s.bernhardsgruetter@gmail.com>"
  35.  
  36. Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
  37. You need a Passphrase to protect your secret key.
  38.  
  39. gpg: gpg-agent is not available in this session
  40. We need to generate a lot of random bytes. It is a good idea to perform
  41. some other action (type on the keyboard, move the mouse, utilize the
  42. disks) during the prime generation; this gives the random number
  43. generator a better chance to gain enough entropy.
  44.  
  45. Not enough random bytes available. Please do some other work to give
  46. the OS a chance to collect more entropy! (Need 276 more bytes)
  47. ...........+++++
  48.  
  49. Not enough random bytes available. Please do some other work to give
  50. the OS a chance to collect more entropy! (Need 163 more bytes)
  51. ................+++++
  52. We need to generate a lot of random bytes. It is a good idea to perform
  53. some other action (type on the keyboard, move the mouse, utilize the
  54. disks) during the prime generation; this gives the random number
  55. generator a better chance to gain enough entropy.
  56.  
  57. gpg: /home/stefan/.gnupg/trustdb.gpg: trustdb created
  58. gpg: key E6E1851A marked as ultimately trusted
  59. public and secret key created and signed.
  60.  
  61. gpg: checking the trustdb
  62. gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
  63. gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
  64. pub 4096R/E6E1851A 2010-09-05
  65. Key fingerprint = D6F7 04E8 C8CE A7E4 948B 35AD EE5D CCA3 E6E1 851A
  66. uid Stefan Bernhardsgrütter <s.bernhardsgruetter@gmail.com>
  67. sub 4096R/1DC6A0D1 2010-09-05
  68.  
  69. stefan@stefan-laptop:~$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement