GnuPG 1.1.90 released ('diskperf -y' )

Leigh S. Jones, KR6X kr6x@kr6x.com
Mon Jul 1 19:52:02 2002


I see.  The diskperf message then is not produced when
the RNG is used for encrypting?

----- Original Message -----
From: "Keith Ray" <keith@nullify.org>
To: <gnupg-users@gnupg.org>
Sent: Monday, July 01, 2002 10:24
Subject: Re: GnuPG 1.1.90 released ('diskperf -y' )


> Quoting "Leigh S. Jones, KR6X" <kr6x@kr6x.com>:
>
> > When 'diskperf -y' is enabled I no longer see that message
> > on the WinNT and Win2K operating systems.  Does that
> > mean that on these two operating systems the calls do not
> > fail?
>
> Let me demonstrate:
>
> C:\Downloads\gnupg-w32-1.1.90>diskperf
>
> Physical Disk Performance counters on this system are currently set to
start at
> boot.
>
> C:\Downloads\gnupg-w32-1.1.90>gpg --version
> gpg (GnuPG) 1.1.90
> Copyright (C) 2002 Free Software Foundation, Inc.
> This program comes with ABSOLUTELY NO WARRANTY.
> This is free software, and you are welcome to redistribute it
> under certain conditions. See the file COPYING for details.
>
> Home: P:/GnuPG
> Supported algorithms:
> Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA, ELG
> Cipher: 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, DUMMY
> Hash: MD5, SHA1, RIPEMD160
> Compress: Uncompressed, ZIP, ZLIB
>
> C:\Downloads\gnupg-w32-1.1.90>gpg --homedir . --gen-key
> gpg (GnuPG) 1.1.90; Copyright (C) 2002 Free Software Foundation, Inc.
> This program comes with ABSOLUTELY NO WARRANTY.
> This is free software, and you are welcome to redistribute it
> under certain conditions. See the file COPYING for details.
>
> gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
> gpg: It is only intended for test purposes and should NOT be
> gpg: used in a production environment or with production keys!
> Please select what kind of key you want:
>    (1) DSA and ElGamal (default)
>    (2) DSA (sign only)
>    (5) RSA (sign only)
> Your selection? 2
> What keysize do you want? (1024)
> Requested keysize is 1024 bits
> Please specify how long the key should be valid.
>          0 = key does not expire
>       <n>  = key expires in n days
>       <n>w = key expires in n weeks
>       <n>m = key expires in n months
>       <n>y = key expires in n years
> Key is valid for? (0)
> Key does not expire at all
> Is this correct (y/n)? y
>
> You need a User-ID to identify your key; the software constructs the user
id
> from Real Name, Comment and Email Address in this form:
>     "Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>"
>
> Real name: Test DSA Key
> Email address:
> Comment:
> You selected this USER-ID:
>     "Test DSA Key"
>
> Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
> You need a Passphrase to protect your secret key.
>
> You don't want a passphrase - this is probably a *bad* idea!
> I will do it anyway.  You can change your passphrase at any time,
> using this program with the option "--edit-key".
>
> We need to generate a lot of random bytes. It is a good idea to perform
> some other action (type on the keyboard, move the mouse, utilize the
> disks) during the prime generation; this gives the random number
> generator a better chance to gain enough entropy.
>
++++++++++++++++++++.+++++++++++++++++++++++++..++++++++++..+++++++++++++++.
++++++++++++++++++++.++++++++++++++++++++.++++++++++++++
> +++++++++++...............+++++
> gpg: NOTE: you should run 'diskperf -y' to enable the disk statistics
> gpg: NOTE: you should run 'diskperf -y' to enable the disk statistics
> gpg: .\trustdb.gpg: trustdb created
> public and secret key created and signed.
> key marked as ultimately trusted.
>
> pub  1024D/F011EB1F 2002-07-01 Test DSA Key
>      Key fingerprint = A000 E909 9190 E97F 755B  3EA6 806B 85AD F011 EB1F
>
> Note that this key cannot be used for encryption.  You may want to use
> the command "--edit-key" to generate a secondary key for this purpose.
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>