Hans Fugal wrote:

[EMAIL PROTECTED]:~$ gpg --gen-key
gpg (GnuPG) 1.2.1; Copyright (C) 2002 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.

Please select what kind of key you want:
(1) DSA and ElGamal (default)
(2) DSA (sign only)
(5) RSA (sign only)
Your selection? DSA keypair will have 1024 bits.
About to generate a new ELG-E keypair.
minimum keysize is 768 bits
default keysize is 1024 bits
highest suggested keysize is 2048 bits
What keysize do you want? (1024) Requested keysize is 1024 bits Please specify how long the key should be valid.
0 = key does not expire
<n> = key expires in n days
<n>w = key expires in n weeks
<n>m = key expires in n months
<n>y = key expires in n years
Key is valid for? (0) Key does not expire at all
Is this correct (y/n)? y
You need a User-ID to identify your key; the software constructs the user id
from Real Name, Comment and Email Address in this form:
"Heinrich Heine (Der Dichter) <[EMAIL PROTECTED]>"


Real name: Foo Bar
Email address: [EMAIL PROTECTED]
Comment: You selected this USER-ID:
"Foo Bar <[EMAIL PROTECTED]>"


Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
You need a Passphrase to protect your secret key.


We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
++++++++++++++++++++++++++++++++++++++++.++++++++++++++++++++++++++++++++++++++++++++++++++.++++++++++++++++++++++++++++++++++++++++>.++++++++++...........................................................................................................................+++++
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
++++++++++.+++++.+++++++++++++++...+++++++++++++++++++++++++.++++++++++++++++++++.+++++++++++++++++++++++++++++++++++.++++++++++.++++++++++>+++++.....>+++++...<+++++..........................................+++++^^^^
public and secret key created and signed.
key marked as ultimately trusted.

pub  1024D/04BA40E4 2003-03-19 Foo Bar <[EMAIL PROTECTED]>
    Key fingerprint = 4D27 E130 B2FB BB7D 5F65  98A7 2FA9 3E26 04BA 40E4
sub  1024g/A983F074 2003-03-19


I did all the foregoing as directed, but my output stops at "public and secret key created and signed." I don't get the keys displayed and my .gnupg directory (and the local dir) doesn't seem to contain any keys. Any ideas? Running Debian stable. Running gpg 1.0.6.


--Dave


____________________
BYU Unix Users Group http://uug.byu.edu/ ___________________________________________________________________
List Info: http://phantom.byu.edu/cgi-bin/mailman/listinfo/uug-list

Reply via email to