Upon request.  Made with an unpackaged set of keyrings[0].

(/tmp/keyrings/debian-keyring.gpg)
Total primary keys: 994
Key versions: 
    994 4
Primary key pubkey algorithms: 
    550 "DSA"
    444 "RSA"
Primary key pubkey sizes: 
    551 1024
     28 2048
      3 3072
    409 4096
      2 8192
      1 10240
Judgment on preferred hash algorithms of "best" uid/uat: 
    575 null
    418 "weak hash with higher preference"
Judgment on expiration times of "best" uid/uat: 
      9 "expiration passed"
     30 "expiration too far in future"
    873 "no expiration set"
     81 null
Total number of UIDs + UAts: 4267
Hash algorithm used for most recent self-sig: 
      1 "RIPEMD160"
   2856 "SHA1"
   1224 "SHA256"
      5 "SHA384"
    181 "SHA512"
Judgment on preferred hash algorithms: 
   1411 null
   2856 "weak hash algorithm"
Judgment on expiration times: 
     59 "expiration passed"
    107 "expiration too far in future"
   3773 "no expiration set"
    328 null
==========================================
(/tmp/keyrings/debian-maintainers.gpg)
Total primary keys: 215
Key versions: 
    215 4
Primary key pubkey algorithms: 
     52 "DSA"
    163 "RSA"
Primary key pubkey sizes: 
     52 1024
      1 1280
     17 2048
      1 3072
    143 4096
      1 8192
Judgment on preferred hash algorithms of "best" uid/uat: 
    181 null
     34 "weak hash with higher preference"
Judgment on expiration times of "best" uid/uat: 
      2 "expiration passed"
      7 "expiration too far in future"
    168 "no expiration set"
     38 null
Total number of UIDs + UAts: 646
Hash algorithm used for most recent self-sig: 
    327 "SHA1"
    234 "SHA256"
     85 "SHA512"
Judgment on preferred hash algorithms: 
    319 null
    327 "weak hash algorithm"
Judgment on expiration times: 
      6 "expiration passed"
     20 "expiration too far in future"
    523 "no expiration set"
     97 null
==========================================
(/tmp/keyrings/debian-nonupload.gpg)
Total primary keys: 9
Key versions: 
      9 4
Primary key pubkey algorithms: 
      9 "RSA"
Primary key pubkey sizes: 
      1 2048
      8 4096
Judgment on preferred hash algorithms of "best" uid/uat: 
      9 null
Judgment on expiration times of "best" uid/uat: 
      6 "no expiration set"
      3 null
Total number of UIDs + UAts: 26
Hash algorithm used for most recent self-sig: 
      7 "SHA1"
     17 "SHA256"
      2 "SHA512"
Judgment on preferred hash algorithms: 
     19 null
      7 "weak hash algorithm"
Judgment on expiration times: 
     15 "no expiration set"
     11 null
==========================================

[0] rsync -a keyring.debian.org::keyrings/keyrings /tmp; for i in 
/tmp/keyrings/{debian-keyring,debian-maintainers,debian-nonupload}.gpg; do 
print "($i)"; /tmp/keystats.zsh $i; done


-- 
To UNSUBSCRIBE, email to debian-project-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140419214140.ga...@scru.org

Reply via email to