Outils pour utilisateurs

Outils du site


doc:dak:sortie_gpg_--gen-key

Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

doc:dak:sortie_gpg_--gen-key [2005/08/03 17:58] (Version actuelle)
lehobey créée
Ligne 1: Ligne 1:
 +<​code>​
 +gpg (GnuPG) 1.4.1; Copyright (C) 2005 Free Software Foundation, Inc.
 +This program comes with ABSOLUTELY NO WARRANTY.
 +This is free software, and you are welcome to redistribute it
 +under certain conditions. See the file COPYING for details.
  
 +gpg: keyring `/​var/​lib/​dak/​.gnupg/​pubring.gpg'​ created
 +Please select what kind of key you want:
 +   (1) DSA and Elgamal (default)
 +   (2) DSA (sign only)
 +   (5) RSA (sign only)
 +Your selection? ​
 +DSA keypair will have 1024 bits.
 +ELG-E keys may be between 1024 and 4096 bits long.
 +What keysize do you want? (2048) ​
 +Requested keysize is 2048 bits
 +Please specify how long the key should be valid.
 +         0 = key does not expire
 +      <​n> ​ = key expires in n days
 +      <n>w = key expires in n weeks
 +      <n>m = key expires in n months
 +      <n>y = key expires in n years
 +Key is valid for? (0) 
 +Key does not expire at all
 +Is this correct? (y/N) y
 +
 +You need a user ID to identify your key; the software constructs the user ID
 +from the Real Name, Comment and Email Address in this form:
 +    "​Heinrich Heine (Der Dichter) <​heinrichh@duesseldorf.de>"​
 +
 +Real name: FDL ondine
 +Email address: deb-dak@ondine
 +Comment: FDL ondine deb-dak ​      
 +You selected this USER-ID:
 +    "FDL ondine (FDL ondine deb-dak) <​deb-dak@ondine>"​
 +
 +Change (N)ame, (C)omment, (E)mail or (O)kay/​(Q)uit?​ O
 +You need a Passphrase to protect your secret key.
 +
 +You don't want a passphrase - this is probably a *bad* idea!
 +I will do it anyway. ​ You can change your passphrase at any time,
 +using this program with the option "​--edit-key"​.
 +
 +We need to generate a lot of random bytes. It is a good idea to perform
 +some other action (type on the keyboard, move the mouse, utilize the
 +disks) during the prime generation; this gives the random number
 +generator a better chance to gain enough entropy.
 ++++++.+++++++++++++++++++++++++.+++++++++++++++.++++++++++.+++++.++++++++++++++++++++.++++++++++.+++++.++++++++++++++++++++++++++++++.+++++>​++++++++++..........+++++
 +We need to generate a lot of random bytes. It is a good idea to perform
 +some other action (type on the keyboard, move the mouse, utilize the
 +disks) during the prime generation; this gives the random number
 +generator a better chance to gain enough entropy.
 ++++++...++++++++++++++++++++.+++++.++++++++++++++++++++...+++++++++++++++++++++++++....+++++.+++++..+++++.+++++++++++++++++++++++++++++++++++......+++++.+++++.++++++++++>​++++++++++...>​.+++++..............................................................................................>​.+++++...<​+++++.......................................................+++++^^^
 +gpg: key 401FAEF5 marked as ultimately trusted
 +public and secret key created and signed.
 +
 +gpg: checking the trustdb
 +gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
 +gpg: depth: 0  valid: ​  ​1 ​ signed: ​  ​0 ​ trust: 0-, 0q, 0n, 0m, 0f, 1u
 +pub   ​1024D/​401FAEF5 2005-08-03
 +      Key fingerprint = 8293 4CA4 6B05 BB73 A1BE  2B4D E072 D708 401F AEF5
 +uid                  FDL ondine (FDL ondine deb-dak) <​deb-dak@ondine>​
 +sub   ​2048g/​38F9B416 2005-08-03
 +
 +</​code>​
doc/dak/sortie_gpg_--gen-key.txt · Dernière modification: 2005/08/03 17:58 par lehobey