beautopia  9:19:14pm  Tue  contrib % gpg --version
gpg: Command not found.
beautopia  9:19:15pm  Tue  contrib % rehash 
beautopia  9:19:16pm  Tue  contrib % gpg --version
gpg (GnuPG) 1.0.6
Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.

Home: ~/.gnupg
Supported algorithms:
Cipher: 3DES, CAST5, BLOWFISH, RIJNDAEL, RIJNDAEL192, RIJNDAEL256, TWOFISH
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA, ELG
Hash: MD5, SHA1, RIPEMD160
beautopia  9:19:18pm  Tue  contrib % gpg --gen-key 
gpg (GnuPG) 1.0.6; Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.

gpg: Warning: using insecure memory!
gpg: /home/ptudor/.gnupg: directory created
gpg: /home/ptudor/.gnupg/options: new options file created
gpg: you have to start GnuPG again, so it can read the new options file
beautopia  9:19:19pm  Tue  contrib % gpg --gen-key 
gpg (GnuPG) 1.0.6; Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.

gpg: Warning: using insecure memory!
gpg: /home/ptudor/.gnupg/secring.gpg: keyring created
gpg: /home/ptudor/.gnupg/pubring.gpg: keyring created
Please select what kind of key you want:
   (1) DSA and ElGamal (default)
   (2) DSA (sign only)
   (4) ElGamal (sign and encrypt)
Your selection? 4 
The use of this algorithm is deprecated - create anyway? n
Your selection? 1                                          
DSA keypair will have 1024 bits.
About to generate a new ELG-E keypair.
              minimum keysize is  768 bits
              default keysize is 1024 bits
    highest suggested keysize is 2048 bits
What keysize do you want? (1024) -cr-  
Requested keysize is 1024 bits   
Please specify how long the key should be valid.
         0 = key does not expire
        = key expires in n days
      w = key expires in n weeks
      m = key expires in n months
      y = key expires in n years
Key is valid for? (0) -cr-
Key does not expire at all
Is this correct (y/n)? y
                        
You need a User-ID to identify your key; the software constructs the user id
from Real Name, Comment and Email Address in this form:
    "Heinrich Heine (Der Dichter) "

Real name: Patrick Tudor   
Email address: ptudor@ptudor.net
Comment: pht #1 - personal      
You selected this USER-ID:
    "Patrick Tudor (pht #1 - personal) "

Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
You need a Passphrase to protect your secret key.    

We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
++++++++++.++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++..+++++++++++++++.++++++++++++++++++++.++++++++++++++++++++...++++++++++.....+++++
fsfghadfgdfghjadfgertWe need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
+++++.++++++++++..+++++.+++++...++++++++++.++++++++++.++++++++++...+++++..+++++++++++++++.++++++++++...+++++++++++++++++++++++++++++++++++.++++++++++........................>+++++...a.df.g......asd.fg........ae.r.g.<+++++....a.df.g......a.sdf.g.>..+++++........tr.wy..wy...et..y.ur...gf..s.hg..<+++++asdgf..s.df......>s+++++dbf..s...weyutr..y....djg.h..j..i.7..yuir...hjkf..m.cnb++e++yt5+^672354^ ^
public and secret key created and signed.
beautopia  9:22:03pm  Tue  contrib % gpg --list-keys
gpg: Warning: using insecure memory!
/home/ptudor/.gnupg/pubring.gpg
-------------------------------
pub  1024D/C75862A2 2001-07-04 Patrick Tudor (pht #1 - personal) 
sub  1024g/6017D381 2001-07-04

beautopia  9:22:04pm  Tue  contrib % gpg --edit-key
gpg (GnuPG) 1.0.6; Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.

gpg: Warning: using insecure memory!
usage: gpg [options] --edit-key user-id [commands]
beautopia  9:24:08pm  Tue  contrib % gpg --edit-key ptudor
gpg (GnuPG) 1.0.6; Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.

gpg: Warning: using insecure memory!
Secret key is available.

gpg: /home/ptudor/.gnupg/trustdb.gpg: trustdb created
pub  1024D/C75862A2  created: 2001-07-04 expires: never      trust: -/u
sub  1024g/6017D381  created: 2001-07-04 expires: never     
(1). Patrick Tudor (pht #1 - personal) 

Command> adduid
Real name: Patrick Tudor
Email address: ptudor@monster.com
Comment: pht #2 - work           
You selected this USER-ID:
    "Patrick Tudor (pht #2 - work) "

Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
                                                     
You need a passphrase to unlock the secret key for
user: "Patrick Tudor (pht #1 - personal) "
1024-bit DSA key, ID C75862A2, created 2001-07-04

                  
pub  1024D/C75862A2  created: 2001-07-04 expires: never      trust: -/u
sub  1024g/6017D381  created: 2001-07-04 expires: never     
(1). Patrick Tudor (pht #1 - personal) 
(2)  Patrick Tudor (pht #2 - work) 

Save changes? y               
beautopia  9:27:06pm  Tue  contrib % gpg --armor --export 
gpg: Warning: using insecure memory!
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (OpenBSD)
Comment: For info see http://www.gnupg.org
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=3EqS
-----END PGP PUBLIC KEY BLOCK-----
beautopia  9:27:08pm  Tue  contrib % more /usr/local/doc/mutt/samples/gpg.rc
# -*-muttrc-*-
#
# Command formats for gpg.
# 
# This version uses gpg-2comp from 
#   http://muppet.faveve.uni-stuttgart.de/~gero/gpg-2comp.tar.gz
#
# $Id: gpg.rc,v 1.5.2.1 2000/05/23 08:15:02 roessler Exp $
#
# %p    The empty string when no passphrase is needed,
#       the string "PGPPASSFD=0" if one is needed.
#
#       This is mostly used in conditional % sequences.
#
# %f    Most PGP commands operate on a single file or a file
#       containing a message.  %f expands to this file's name.
#
# %s    When verifying signatures, there is another temporary file
#       containing the detached signature.  %s expands to this
#       file's name.
#
# %a    In "signing" contexts, this expands to the value of the
#       configuration variable $pgp_sign_as.  You probably need to
#       use this within a conditional % sequence.
#
# %r    In many contexts, mutt passes key IDs to pgp.  %r expands to
#       a list of key IDs.

# decode application/pgp
set pgp_decode_command="gpg %?p?--passphrase-fd 0? --no-verbose --batch --output - %f"

# verify a pgp/mime signature
set pgp_verify_command="gpg --no-verbose --batch --output - --verify %s %f"

# decrypt a pgp/mime attachment
set pgp_decrypt_command="gpg --passphrase-fd 0 --no-verbose --batch --output - %f"

# create a pgp/mime signed attachment
# set pgp_sign_command="gpg-2comp --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f"
set pgp_sign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f"

# create a application/pgp signed (old-style) message
# set pgp_clearsign_command="gpg-2comp --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? 
%f"
set pgp_clearsign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f"

# create a pgp/mime encrypted attachment
# set pgp_encrypt_only_command="pgpewrap gpg-2comp -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f
"
set pgp_encrypt_only_command="pgpewrap gpg -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f"

# create a pgp/mime encrypted and signed attachment
# set pgp_encrypt_sign_command="pgpewrap gpg-2comp --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --al
ways-trust -- -r %r -- %f"
set pgp_encrypt_sign_command="pgpewrap gpg --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-tru
st -- -r %r -- %f"

# import a key into the public key ring
set pgp_import_command="gpg --no-verbose --import -v %f"

# export a key from the public key ring
set pgp_export_command="gpg --no-verbose --export --armor %r"

# verify a key
set pgp_verify_key_command="gpg --no-verbose --batch --fingerprint --check-sigs %r"

# read in the public key ring
set pgp_list_pubring_command="gpg --no-verbose --batch --with-colons --list-keys %r" 

# read in the secret key ring
set pgp_list_secring_command="gpg --no-verbose --batch --with-colons --list-secret-keys %r" 

# receive key from keyserver:
#set pgp_getkeys_command="wrap.sh -g %r"
set pgp_getkeys_command=""


ptudor@ptudor.net



junia  2:07:05pm  Wed  gnupg-2.1.7   ./g10/gpg2 --full-gen-key --enable-large-rsa
gpg: WARNING: gpg not built with large secure memory buffer.  Ignoring --enable-large-rsa
gpg (GnuPG) 2.1.7; Copyright (C) 2015 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

gpg: Warning: using insecure memory!
Please select what kind of key you want:
   (1) RSA and RSA (default)
   (2) DSA and Elgamal
   (3) DSA (sign only)
   (4) RSA (sign only)
Your selection? 
RSA keys may be between 1024 and 8192 bits long.
What keysize do you want? (2048) 8192
Requested keysize is 8192 bits
Please specify how long the key should be valid.
         0 = key does not expire
        = key expires in n days
      w = key expires in n weeks
      m = key expires in n months
      y = key expires in n years
Key is valid for? (0) 14y
Key expires at Wed Aug 22 14:11:07 2029 PDT
Is this correct? (y/N) y

GnuPG needs to construct a user ID to identify your key.

Real name: Patrick Tudor
Email address: ptudor@ptudor.net
Comment: 
You selected this USER-ID:
    "Patrick Tudor "

Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
Please enter the passphrase to
protect your new key
 Passphrase: 
Repeat: 
Please re-enter this passphrase
 Passphrase: 
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: key 0D6BE98A marked as ultimately trusted
gpg: directory '/home/ptudor/.gnupg/openpgp-revocs.d' created
public and secret key created and signed.

gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: next trustdb check due at 2029-08-22
pub   rsa8192/0D6BE98A 2015-08-26 [expires: 2029-08-22]
      Key fingerprint = B343 DED3 E491 CDF5 EA4A  DDB0 697B E47A 0D6B E98A
uid         [ultimate] Patrick Tudor 
sub   rsa8192/C825F868 2015-08-26 [expires: 2029-08-22]

root has logged on pts/4 from ::1.
junia  2:21:37pm  Wed  gnupg-2.1.7   ./g10/gpg2 --list-keys
gpg: Warning: using insecure memory!
/home/ptudor/.gnupg/pubring.gpg
-------------------------------
pub   dsa1024/9EC2F3CB 2003-05-21 [expired: 2015-05-30]
uid         [ expired] Patrick Tudor 
uid         [ expired] Patrick Tudor 
uid         [ expired] Patrick Tudor 

pub   dsa1024/115DE037 2002-02-09
uid         [ unknown] Patrick Lynch 
uid         [ unknown] Patrick Lynch 
sub   elg1024/C37F9209 2002-02-09

pub   rsa4096/32336E46 2013-09-07
uid         [ unknown] Patrick Tudor (2013-09-06) 
sub   rsa4096/32A6DEC1 2013-09-07

pub   rsa4096/1727B27A 2014-03-10 [expires: 2028-03-06]
uid         [ unknown] Patrick Tudor (Patrick Tudor) 
uid         [ unknown] Patrick Tudor (smime preferred) 
uid         [ unknown] Patrick Tudor 
sub   rsa4096/646942B6 2014-03-10 [expires: 2028-03-06]

pub   rsa4096/99A0CA6A 2014-04-20
uid         [ unknown] Dale Bewley (dlbewley) 
sub   rsa4096/73987790 2014-04-20

pub   rsa2048/0C2A97FE 2013-10-21 [expires: 2017-10-21]
uid         [ unknown] KennethWhite 
sub   rsa2048/0542E458 2013-10-21 [expires: 2017-10-21]

pub   dsa1024/B91E3698 2003-05-21 [expired: 2015-05-18]
uid         [ expired] Patrick Tudor 

pub   rsa4096/32336E46 2013-09-07
uid         [ unknown] Patrick Tudor (2013-09-06) 
sub   rsa4096/32A6DEC1 2013-09-07

pub   rsa4096/1727B27A 2014-03-10 [expires: 2028-03-06]
uid         [ unknown] Patrick Tudor (smime preferred) 
uid         [ unknown] Patrick Tudor (Patrick Tudor) 
uid         [ unknown] Patrick Tudor 
sub   rsa4096/646942B6 2014-03-10 [expires: 2028-03-06]

pub   rsa4096/EC8C9492 2014-04-26
uid         [ unknown] Keybase.io Merkle Signing (v1) 
sub   rsa4096/8080955B 2014-04-26
sub   rsa4096/49DA99D5 2014-04-26 [expires: 2024-04-23]

pub   rsa8192/0D6BE98A 2015-08-26 [expires: 2029-08-22]
uid         [ultimate] Patrick Tudor 
sub   rsa8192/C825F868 2015-08-26 [expires: 2029-08-22]

junia  3:10:57pm  Wed  gnupg-2.1.7   ./g10/gpg2 --edit-key 0D6BE98A
gpg (GnuPG) 2.1.7; Copyright (C) 2015 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

gpg: Warning: using insecure memory!
Secret key is available.

sec  rsa8192/0D6BE98A
     created: 2015-08-26  expires: 2029-08-22  usage: SC  
     trust: ultimate      validity: ultimate
ssb  rsa8192/C825F868
     created: 2015-08-26  expires: 2029-08-22  usage: E   
[ultimate] (1). Patrick Tudor 

gpg> adduid
Real name: Patrick Tudor
Email address: ptudor@mac.com
Comment: (S/MIME Preferred)
Invalid character in comment
Comment: S/MIME Preferred
You selected this USER-ID:
    "Patrick Tudor (S/MIME Preferred) "

Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
Please enter the passphrase to unlock the OpenPGP secret key:
"Patrick Tudor "
8192-bit RSA key, ID 0D6BE98A,
created 2015-08-26.

 Passphrase: 
Please enter the passphrase to unlock the OpenPGP secret key:
"Patrick Tudor "
8192-bit RSA key, ID 0D6BE98A,
created 2015-08-26.

 Passphrase: