Whitespace fixes.

pull/34/head
Ben Low 7 years ago
parent a010a2a752
commit bcada3f2cc

@ -202,13 +202,13 @@ Generate a new key with GPG, selecting RSA (sign only) and the appropriate keysi
Your selection? 4 Your selection? 4
RSA keys may be between 1024 and 4096 bits long. RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048) 4096 What keysize do you want? (2048) 4096
Requested keysize is 4096 bits Requested keysize is 4096 bits
Please specify how long the key should be valid. Please specify how long the key should be valid.
0 = key does not expire 0 = key does not expire
<n> = key expires in n days <n> = key expires in n days
<n>w = key expires in n weeks <n>w = key expires in n weeks
<n>m = key expires in n months <n>m = key expires in n months
<n>y = key expires in n years <n>y = key expires in n years
Key is valid for? (0) 0 Key is valid for? (0) 0
Key does not expire at all Key does not expire at all
Is this correct? (y/N) y Is this correct? (y/N) y
@ -239,7 +239,7 @@ as you'll need it throughout.*
Note that this key cannot be used for encryption. You may want to use Note that this key cannot be used for encryption. You may want to use
the command "--edit-key" to generate a subkey for this purpose. the command "--edit-key" to generate a subkey for this purpose.
pub rsa4096/0xFF3E7D88647EBCDB 2017-10-09 [SC] pub rsa4096/0xFF3E7D88647EBCDB 2017-10-09 [SC]
Key fingerprint = 011C E16B D45B 27A5 5BA8 776D FF3E 7D88 647E BCDB Key fingerprint = 011C E16B D45B 27A5 5BA8 776D FF3E 7D88 647E BCDB
uid Dr Duh <doc@duh.to> uid Dr Duh <doc@duh.to>
Note that as of [v2.1](https://www.gnupg.org/faq/whats-new-in-2.1.html#autorev), gpg automatically generates a revocation certificate. Note that as of [v2.1](https://www.gnupg.org/faq/whats-new-in-2.1.html#autorev), gpg automatically generates a revocation certificate.
@ -326,17 +326,17 @@ Next, create an [encryption key](https://www.cs.cornell.edu/courses/cs5430/2015s
Your selection? 6 Your selection? 6
RSA keys may be between 1024 and 4096 bits long. RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048) 4096 What keysize do you want? (2048) 4096
Requested keysize is 4096 bits Requested keysize is 4096 bits
Please specify how long the key should be valid. Please specify how long the key should be valid.
0 = key does not expire 0 = key does not expire
<n> = key expires in n days <n> = key expires in n days
<n>w = key expires in n weeks <n>w = key expires in n weeks
<n>m = key expires in n months <n>m = key expires in n months
<n>y = key expires in n years <n>y = key expires in n years
Key is valid for? (0) 0 Key is valid for? (0) 0
Key does not expire at all Key does not expire at all
Is this correct? (y/N) y Is this correct? (y/N) y
Really create? (y/N) y Really create? (y/N) y
We need to generate a lot of random bytes. It is a good idea to perform We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number disks) during the prime generation; this gives the random number
@ -370,59 +370,59 @@ GPG doesn't provide a 'RSA (authenticate only)' key type out of the box, so sele
(12) ECC (encrypt only) (12) ECC (encrypt only)
(13) Existing key (13) Existing key
Your selection? 8 Your selection? 8
Possible actions for a RSA key: Sign Encrypt Authenticate Possible actions for a RSA key: Sign Encrypt Authenticate
Current allowed actions: Sign Encrypt Current allowed actions: Sign Encrypt
(S) Toggle the sign capability (S) Toggle the sign capability
(E) Toggle the encrypt capability (E) Toggle the encrypt capability
(A) Toggle the authenticate capability (A) Toggle the authenticate capability
(Q) Finished (Q) Finished
Your selection? S Your selection? S
Possible actions for a RSA key: Sign Encrypt Authenticate Possible actions for a RSA key: Sign Encrypt Authenticate
Current allowed actions: Encrypt Current allowed actions: Encrypt
(S) Toggle the sign capability (S) Toggle the sign capability
(E) Toggle the encrypt capability (E) Toggle the encrypt capability
(A) Toggle the authenticate capability (A) Toggle the authenticate capability
(Q) Finished (Q) Finished
Your selection? E Your selection? E
Possible actions for a RSA key: Sign Encrypt Authenticate Possible actions for a RSA key: Sign Encrypt Authenticate
Current allowed actions: Current allowed actions:
(S) Toggle the sign capability (S) Toggle the sign capability
(E) Toggle the encrypt capability (E) Toggle the encrypt capability
(A) Toggle the authenticate capability (A) Toggle the authenticate capability
(Q) Finished (Q) Finished
Your selection? A Your selection? A
Possible actions for a RSA key: Sign Encrypt Authenticate Possible actions for a RSA key: Sign Encrypt Authenticate
Current allowed actions: Authenticate Current allowed actions: Authenticate
(S) Toggle the sign capability (S) Toggle the sign capability
(E) Toggle the encrypt capability (E) Toggle the encrypt capability
(A) Toggle the authenticate capability (A) Toggle the authenticate capability
(Q) Finished (Q) Finished
Your selection? q Your selection? q
RSA keys may be between 1024 and 4096 bits long. RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048) 4096 What keysize do you want? (2048) 4096
Requested keysize is 4096 bits Requested keysize is 4096 bits
Please specify how long the key should be valid. Please specify how long the key should be valid.
0 = key does not expire 0 = key does not expire
<n> = key expires in n days <n> = key expires in n days
<n>w = key expires in n weeks <n>w = key expires in n weeks
<n>m = key expires in n months <n>m = key expires in n months
<n>y = key expires in n years <n>y = key expires in n years
Key is valid for? (0) 0 Key is valid for? (0) 0
Key does not expire at all Key does not expire at all
Is this correct? (y/N) y Is this correct? (y/N) y
Really create? (y/N) y Really create? (y/N) y
We need to generate a lot of random bytes. It is a good idea to perform We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number disks) during the prime generation; this gives the random number
@ -450,7 +450,7 @@ List your new secret keys:
/tmp.FLZC0xcM/pubring.kbx /tmp.FLZC0xcM/pubring.kbx
------------------------------------------------------------------------- -------------------------------------------------------------------------
sec rsa4096/0xFF3E7D88647EBCDB 2017-10-09 [SC] sec rsa4096/0xFF3E7D88647EBCDB 2017-10-09 [SC]
Key fingerprint = 011C E16B D45B 27A5 5BA8 776D FF3E 7D88 647E BCDB Key fingerprint = 011C E16B D45B 27A5 5BA8 776D FF3E 7D88 647E BCDB
uid Dr Duh <doc@duh.to> uid Dr Duh <doc@duh.to>
ssb rsa4096/0xBECFA3C1AE191D15 2017-10-09 [S] ssb rsa4096/0xBECFA3C1AE191D15 2017-10-09 [S]
ssb rsa4096/0x5912A795E90DD2CF 2017-10-09 [E] ssb rsa4096/0x5912A795E90DD2CF 2017-10-09 [E]
@ -729,7 +729,7 @@ Some fields are optional:
Transferring keys to YubiKey hardware is a one-way operation only, so make sure you've made a backup before proceeding. Previous gpg versions required the 'toggle' command before selecting keys. The currently selected key(s) are indicated with an `*`. When moving keys only one key should be selected at a time. Transferring keys to YubiKey hardware is a one-way operation only, so make sure you've made a backup before proceeding. Previous gpg versions required the 'toggle' command before selecting keys. The currently selected key(s) are indicated with an `*`. When moving keys only one key should be selected at a time.
% gpg --edit-key $KEYID % gpg --edit-key $KEYID
Secret key is available. Secret key is available.

Loading…
Cancel
Save