X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=doc%2FGnuPG-signature.html;h=50b904d5e3da4b58a4d481fb889148ac9e9be3e8;hb=e6c7e336637f82b1073b63f3cc6c8887c37c647f;hp=c187c996bcbe00fd4a27de277bac1030ea804079;hpb=62a5ba083d5137feaef9f4293c401521bad603b0;p=github%2Fshaarli%2FShaarli.git diff --git a/doc/GnuPG-signature.html b/doc/GnuPG-signature.html index c187c996..50b904d5 100644 --- a/doc/GnuPG-signature.html +++ b/doc/GnuPG-signature.html @@ -52,18 +52,17 @@ code > span.in { color: #60a0b0; font-weight: bold; font-style: italic; } /* Inf
@@ -130,26 +127,26 @@ Keys$ gpg --gen-key
+$ gpg --gen-key
-gpg (GnuPG) 2.1.6; Copyright (C) 2015 Free Software Foundation, Inc.
-This is free software: you are free to change and redistribute it.
-There is NO WARRANTY, to the extent permitted by law.
+gpg (GnuPG) 2.1.6; Copyright (C) 2015 Free Software Foundation, Inc.
+This is free software: you are free to change and redistribute it.
+There is NO WARRANTY, to the extent permitted by law.
-Note: Use "gpg2 --full-gen-key" for a full featured key generation dialog.
+Note: Use "gpg2 --full-gen-key" for a full featured key generation dialog.
-GnuPG needs to construct a user ID to identify your key.
+GnuPG needs to construct a user ID to identify your key.
-Real name: Marvin the Paranoid Android
-Email address: marvin@h2g2.net
-You selected this USER-ID:
+Real name: Marvin the Paranoid Android
+Email address: marvin@h2g2.net
+You selected this USER-ID:
"Marvin the Paranoid Android <marvin@h2g2.net>"
-Change (N)ame, (E)mail, or (O)kay/(Q)uit? o
-We need to generate a lot of random bytes. It is a good idea to perform
-some other action (type on the keyboard, move the mouse, utilize the
-disks) during the prime generation; this gives the random number
-generator a better chance to gain enough entropy.
+Change (N)ame, (E)mail, or (O)kay/(Q)uit? o
+We need to generate a lot of random bytes. It is a good idea to perform
+some other action (type on the keyboard, move the mouse, utilize the
+disks) during the prime generation; this gives the random number
+generator a better chance to gain enough entropy.
At this point, you will:
gpg: key A9D53A3E marked as ultimately trusted
-public and secret key created and signed.
+gpg: key A9D53A3E marked as ultimately trusted
+public and secret key created and signed.
-gpg: checking the trustdb
-gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
-gpg: depth: 0 valid: 2 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 2u
-pub rsa2048/A9D53A3E 2015-07-31
- Key fingerprint = AF2A 5381 E54B 2FD2 14C4 A9A3 0E35 ACA4 A9D5 3A3E
-uid [ultimate] Marvin the Paranoid Android <marvin@h2g2.net>[](.html)
-sub rsa2048/8C0EACF1 2015-07-31
+gpg: checking the trustdb
+gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
+gpg: depth: 0 valid: 2 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 2u
+pub rsa2048/A9D53A3E 2015-07-31
+ Key fingerprint = AF2A 5381 E54B 2FD2 14C4 A9A3 0E35 ACA4 A9D5 3A3E
+uid [ultimate] Marvin the Paranoid Android <marvin@h2g2.net>[](.html)
+sub rsa2048/8C0EACF1 2015-07-31
$ gpg --keyserver pgp.mit.edu --send-keys A9D53A3E
-gpg: sending key A9D53A3E to hkp server pgp.mit.edu
$ gpg --keyserver pgp.mit.edu --send-keys A9D53A3E
+gpg: sending key A9D53A3E to hkp server pgp.mit.edu
See Release Shaarli.