$ gpg --expert --edit-key 0 gpg (GnuPG) 2.3.4; Copyright (C) 2021 g10 Code GmbH This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law.
Secret key is available.
sec rsa4096/C163760892C70B65 created: 2022-04-16 expires: never usage: SCA trust: ultimate validity: ultimate ssb rsa4096/8A4B8653339FE236 created: 2022-04-16 expires: never usage: E [ultimate] (1). xiaoyv_404 (OutLook) <xiaoyv_404@outlook.com> [ultimate] (2) xiaoyv_404 <xiaoyv_404@xiaoyv404.top> gpg> addkey Please select what kind of key you want: (3) DSA (sign only) (4) RSA (sign only) (5) Elgamal (encrypt only) (6) RSA (encrypt only) (7) DSA (set your own capabilities) (8) RSA (set your own capabilities) (10) ECC (sign only) (11) ECC (set your own capabilities) (12) ECC (encrypt only) (13) Existing key (14) Existing key from card Your selection? 10 Please select which elliptic curve you want: (1) Curve 25519 *default* (2) Curve 448 (3) NIST P-256 (4) NIST P-384 (5) NIST P-521 (6) Brainpool P-256 (7) Brainpool P-384 (8) Brainpool P-512 (9) secp256k1 Your selection? Please specify how long the key should be valid. 0 = key does not expire <n> = key expires in n days <n>w = key expires in n weeks <n>m = key expires in n months <n>y = key expires in n years Key is valid for? (0) 5y Key expires at 2028/1/29 16:34:19 �й���ʱ�� Is this correct? (y/N) y Really create? (y/N) y We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy.
sec rsa4096/C163760892C70B65 created: 2022-04-16 expires: never usage: SCA trust: ultimate validity: ultimate ssb rsa4096/8A4B8653339FE236 created: 2022-04-16 expires: never usage: E ssb ed25519/1F9E54CC2965751B created: 2023-01-30 expires: 2028-01-29 usage: S [ultimate] (1). xiaoyv_404 (OutLook) <xiaoyv_404@outlook.com> [ultimate] (2) xiaoyv_404 <xiaoyv_404@xiaoyv404.top>