\De 0-1;_ϸ (2Ex2Ϲ72:Dm.I7+c ֻ-$Fk+&# (.Wp ˽ (*Sl $޾&0W,r ȿ!߿2Mh'-HGa   #</$l% '!2OTG5"&<c!"$*""M]p$S@x&"]Ra0 &=VkP0 <Ki|!!9(0$Y,~'&/E aB=7!Y3t"%&!7%Y"#' ,A^s($#7$V{!@&X"$/#;R/mB5"N$q)#8V&n%  : P0\,'0&4WMH # - : GSArfry% WDu-0.IHP*+':b} "0(J+s& 5&<cs3 4-I*w#!'."Q#n$ $ -?^{$?45:j&;Uj88 P#[&(&.%*-?mv7P6-EAs@G3>9r0<LGg@>+/=[FH,An " ::Pc#x;0-E$s'8&.)*X!0&,*D,` 5#2CJ"H"($FkE1,Ga8" %=Rr)EXtB.>P%g.# Z/^\"FXi\Zz~ (   )47Kap-J\y. +BY $ .'O+wE@4*:_#!#50:6kB9" E&=l(,-(.'W<2&6+Q"}1",""(E5n2IE!g(*+2#D'h*/"-#/Q*) !=%_) % 3 N f    F  1 %9  _  l z  %       ( E E pS  -   + = I-=w@=P4S>=V<5NKU)pc*D!#-9+g)&-[Xx 7@+\,35 '13e({)#+"+A"m% ?%+Q ly  (.3,b( }Wt-{-?%2%X/~%) - /K 0{     !! ,!9!!M!o!!!!!!!%"*"?" R"/\" "6"-""1#7#+V##Y#l#SQ$Y$$Q%%j&K)'Fu'K'C(IL( (( ((@(A9)4{)d)f*1|*-*9*0+/G+5w++'+.++ ,3L,,5,-,H-eL-----!.$.,../T)/~///~0i0.0*1I1\1!y11 1%111(2,C22p2(2.2*2)&3AP3=3=304+?4.k4=4'5"6#6?6[6 t666H67 07Q7Fl7*767%89;8Fu8 88829=69t9r9>g:1:=:I;9`;4;;#;.<?A<D<@<E=+M=1y=N=I=ID>1>->%>S?:h?;???H@-h@"@H@BAAEAA?BQBBlB)BCB)C.GC>vC2CLC=5D<sD@DFDH8EUE$E-E2*F1]FIF@F>GKYGBG@G5)H,_H*H7H.H,I0KI0|I4IIcIx_J1JZ KeK+>M%jM'MIMHN:KN8NN.OOPPP7PP*Q&Q1Q#R2)R\RHR*2S=]S0S9S0T"7T&ZT!T%T,T5T,U XSHX=X5X4YEY$bY+Y(YYYZ#Z 8Z EZ#SZCwZ'Z Z Z"Z [#@[-d[[[[.[\,\B\ Q\\\w\\!\ \\"]6]S]Bo]]]5]$^-C^q^^2^!^1^//___u____8_5_`.4`-c`(`+`(`a5&a6\a%aHaFbIb!dbb"b bbbc4c,Qc~c"c%c2c+d=d,Rdddddd!d! e0-e"^ee!e-e ee f;f<Tf&f*ff g g+gEg^g~ggg0ggh4hThqh/hhh)h&i=i1Siii3i6i@)j8jj5j2j. k(;k!dk%kkkkkk l'lGl:]llllllm&mFmWm"qmm&m3m.n/n#Knon8n-n1n o*,oWo<uoAo(o6pTpjpp*p(p+p#qCqbq~q q!qqqqr2*r2]r#r'rrrs/s1Gsysssssstt,7t%dt'ttt#tHu\uvu"u1uu)u!)v KvWv(`v*v.v%v/ w,9w)fw'w!w0w x*x&Bxix x+x%xx#y5yPy(ny)y$y3yz 0z;zPzcz zzzzz0z{$+{%P{%v{#{{1{!| 1|R|q|,|6|| }!}*?},j}2}}}~'~"D~g~ ~+~~-~"!.D&s*'!.>W#r$5׀) 7#T'x*(ˁ #0T(t&$  !BU%l3%ƃ3# D^%v "))8(b Ʌ!) -N&n()! !(Jc0+!܇ !;]&x4#Ԉ+$ De#}&!!:*\"Š*& 4Oj!Ƌ ΋ ڋ/4 HT#o,/"K3_($& ()(R3{)3َ %,$Rw'%*ޏ$ &.$Uz0DȐ! '/Wu"1̑($7\l+Q; E=LƓ!˓ );!Su/) # .#Os=+.6E0|#͖#.3D!x'—ޗ#%/Iy#"&Ҙ($"G_%w%9Ù8$6![>}&$%6O$`.˛%-=Vf/&֜2/bz$/Ν$3'X!/&*+?kz$&$ޟ''GoH,ՠ"%4Sk(!ɡ>*%.T h1$.,?l֤"# ;!\~ӥ*- F$R'w .+)5E#{-&#%86^5/˨"'>f;0"%/72g!Ъ:!&!H(j+8"48m26֬) 97qLGH1Bzٮ*1@r˯%6Mf#а"-7%e/7."">a"~&,Ȳ*4 U-u+ ϳ(#9-] ʴ޴&E [eε"ߵ8:U')  '3[w'ʷ (2=p!$ = CNb(z Ĺ<)""Lo*"׺#%>d-2 3S&"#Ѽ%*>N:n!˽%8^c} 1ɾ%!$Af&i )Ŀ-+$= b=+ #6D3{-' 6 B7O&&(76U$6-:J#F-  9D`x"-%Dj,!5"&1X$t.3*fAl.2!a$#:!SuIF NY,q16N01#9#]+,((!F2h/,5*b2.2*"Mb* & ?0\&!1S-i%/' We#30%d*%+*2Ha&}"(-92'l 6: E,Y0/.7B*z.7;0Y1;%!G)V36:&7 LWj9}5- ':4b" -=FX r5$+ 5S$q'04%$Jg(C*9(R0{$%.-L*z(6+_G2/%?Fe#!,.Hw"-/,, Y"c)   %2F1y'##!A"c-:A&P5w" 9P f" 2Q#k&0 .Ob*|U 4M`6x$  0Q-`"*:Vu!-% )G1y /'&6/].(-,0]wE7L077>%&d&' $= U)v3#%';'c)+6 2S$n '9#6#Z%~$/('X\G% 8EC04/">%a%$? '3.[,7(%$>YcD+A'\&*'F$n 7Ri).$K.p"B-.JyI-; FOg5If2/Li6;6D0.uI7&CSk$ 2 O l +~ & # (  7  P ] r     (  3 R  c q  $   &  ,9  f r  !     / J 'e      G(p  <$7\x% !OGo5&.K%j&( .&0aW$>@c&"]RL0(AVkP4+:Xk!!9($H,m'&4 T!uB=7P3k"%&!.%P"v#' #8Uj($# ".$Qv!D&W&~$3#BY/tF 'H&e(#- '$ 8L  & %   ! (!5! E!R!m! !0!!!,!!'"I"4#'E#0m#4#Q#H%$ n$ x% % %"%A%f&j&&'')' ((:(Z(n(Wt(H(-)0C).t)I)P)*>*+i*'*** *++(+D+L+"[+~++(++++&,E,d,,,&,,,,--37-k-4s---*-#.%.!7.'Y....#..$. /)/$=/ b/-p////$/0'080L0?T040:01&1A1`1~111181!202J2d2{22 2#2&2(3&.3.U333-33373P46m4-4A4@5GU535950 6<<6Py6G6@7>S7+7=7F7C8S8H[8,8889 9$9"49 W9:b9999#99:$:;C:::-:$::';8,;&e;.;.;!;0 <&=<,d<<<,< <=5=#P=t====="h>>H(?"q?(?$??E?1=@o@@@@"@8@4AHA&gAAAAAABBBBB C$C?CBXCCCCC%CDD,DCD._D#DZD^ E\lE"EXE\EFZFFG G(&GOG kGGG GGGGGGH$H@HZHpHHHHHHII3I.NI}I I+IIYUJ J J+J+KE2K@xK4K:K#)L!ML#oL9L0L6LB5MxM9?N"yNNENAN,AO0nO1O,O+O<*P6gPP&PP+Q&,Q1SQ"Q0Q"Q(Q5%R2[RMRER"S(>S*gS+SSSS#S'#TKT*`T/T&T-T/U*@UkUsUU)U U!U%V)DVnVV V%VV W%W >WLWF^W W1W%W X +X9X>X%BXhXXXX XXXEYEYpZ Z-ZZb[+[=[I[=6\@t\=\P\SD]>]=]^<^5^N_U]__)7`a`c`]aD}a!a#a-b+6b)bb&b-bbc_d+eKekeee eeeee ff+/f,[f3ff5f f1g8g(Ng-wg#g+g"g+h"Dh%gh hh?h%i(i CiPigiwiiiiii i. j,9j(fj j}j.lKl-Rl-ll?l% m%/m/Um%m)mmmn/"n0Rnnnnnnn oo!$oFo\orooooo%opp )p33p gp6rp-pp5pq+5qaqYiqlqS0rYrrQgssjtKuFTuKuCuI+v uvv vv@vAw<Zwlwnx1sx-x=x0y/By5ryy'y.y+z3Gz{z5z-zLzeK{{{{{!|$|,|| }T(}}}}}}~i~.~)H[)x % (%,N2{(.׀*)1A[==ہ0+J.vA+"6Rr$фP B$cF*:)P=zJ #*2N=r?>1=#Ia94#9.]?D̊@ER+1ċNIEI5ٌ-%=Sc:;?.Hn-"HBQA֏C`B)C,)p.>ɑ2L;=<ƒ@FDHUԓ$*-O2}1MD0BuOFDO90Ζ.;.2j00Η040ec~x1[^/ś)+IKH:ޜ8R.SʞR**G1r#6ȠH*ա=0>9o0"ڢ&!$)F0p9ۣ6_3    (  %@Vj {    /̥0#-8Q5>WAW58ϧ$%+J(vר  #C:+~  &é # -/]y.ߪ +Fe! ƫ""B>!5(-Hc2!1ԭ/6Lcj85.->(l+(567%nHFݰ$!?a"x ܱ00a"|%2Ų+$,9f{ !ܳ!0 "Qt%-  ;<K&*ڵ $&D#a0ж;[x/Ʒ޷)&D1Z3Ÿ6@08q52.(B!k%Ժ.N:dػ-M^"x&3Ӽ.6#Rv8-Ž5 )*7!b<A(:,g}*0ݿ3#Bf !92U2#'$AZ5r$5M,f)'#"HF"5):!d (..%"/H,x)'!0Ji& +%8#Pt(-(3-a w 0$U$r%%#1$!V x,6<Tl*,23L'g" +->"l.&*'!8.Z#$5")X#'*( ?`#{(&$/T l%7%3;#o% " /I)a)( !4)V &()!;]!{0+!/Q$m%&4#/+S #&B]|!*"*=&h!! ) 5A/_ #0/"OKr7($&D k((3)3<p%$'%*A$l&$0D+!p'&13e,u$+Q";t=#5!: \g)! /!Q)V  #=+]260$-#D#h.3!'9Yo#/'".&Q(x$%%9B8|$!>&;b$j)( .#R%p-/ &:a#}2 $(8/a (+!A/\*+$9&^$'' H;,&" "(:c!>)$'Lh1$.,3W#` !&'$%;!a.1 A$M'r 2+)5D#z-&#%76]53"'Ai;0"%/:2j!:%)!O(q+8""4?t!26)=BLGH@B$=5W!@Qh#"/-R%/72A"]"&0.4G|1/ (H#h-  +BUt "1O k:') J_'r' (7J(S2|!( $ E _ b     ( $  <) f -i "   * "" E #e % !   - > R 6o 7 & & ', )T ~    : ! .La|% 10%b$& )+-J+x$ =/E u(:752+h  7&&=(d6$@Qi6>#<J[- 3Kf|"-% ,(!U5w&&(@.Z3*flO.!$*Oa#d!/JPUIdF ,E\{ 68Mi01##+4,`,()2+^t/,*) 2T . 2 . !-!L!*e!!! !&! ! "0'"X"&r"""""!"#-4#b#%####/# "$0$O$"n$$#$$$$3%%7%*]%%%+%*%&&4&*P&"{&(&&-&9 ''C' k'''6':'(,0(0](/(((.(7)*Q).|))7);)00*1a*;***%*+)-+3W+6+:++, #,.,A,9T,,5,-,'-49-"n-- ----..3. Q.5r.$../.!/:/$X/'}/0/8/%050R0,n000C0*1,1,E10r1(11%11.2-G2*u22(13/Z3G3323/4%>4Fd4#44!45+5.G5v55"5-5/5,+6 X6"b6)666 6 7$$72I71|7'777#7# 8!D8"f8-88:8A9&S95z9"99 99::":@:W:$q:":$:#: ;#;8;"Q;t;#;&;;; <4(< ]<~<<*<U< ,=6=K=c=|==:===>$>>$c>>1>>>?&?=?*V????!?-?#@%=@ c@p@Gx@@@ @3 A'AAiA&A/A.A(B0B-MB,{BBBBBC*C?CRCUCEYC7C0C7D7@D>xD&D&D'E-E?E]EwEE E)E3E#'F%KFqF'F'F)F+G64GkG GG$G GH''H9OH#H#H%HHI$6I[I/{I'I\IG0JxJ JEJ0J K4,K/aK"K%K%K$L?%L eL'L.L,L7 M(BM%kM$MYMDNUN+hNN'NN&NO7OQO*nO'O$OOOP +PLPjPPPPPPQQ.Q)BQlQQ$Q.QQ" RB,R-oR.RRpc3 O,hw:`Hj+(a_1k+T7B>O36|QpE9>Hj)bM.7S=UG% Hct(siQaO!v>[R4u,\C7^Wt0&L"C^mEkgD&[7q &Wg8X VHo/O e'Jz9:~_@bf/-Y2 @fy3R7C`.0+;>#&<2 5< HE{]=64!F9a-y)nG2t8 d9CA_tq p/Yj}5'RjI0w5Pc]^K<fae,\Q B_D=]Fe5v%"@zZtbm.d$^G}b_?DmNypB>$mlVA x[\?(qF.N7,VSnuOUcI:|xy X^(`p6KB l!{H } z^~wt& #rAhlD}x:kIIH4|rNPT0`y lR9%amX\#d@Yn*ua^j]ZoJ?yoEaTwU6>;XPb-=9AygJ U|3N W=G$) 2!!se8Q 2 *WNN ^MLG?G Vr*: W @,MA6Gs r88.BO 'Bs<  N#F 7 sg*hX[q'Al}aJ>(JGY1dRWs*\(3[yS.1 :)KDcqY!?:='O <F2#AA|</gSXT% vKRf| -q +z'^ox)PUd;%m+~z5;p8*,08)C]TE$iR5L;U)1}1EP$LtI(Xx1/IZSnb"f$ 2~x9 hvg jixj"f3d{ cb}Suw~0`i&5KM`Kz"$2f=RLtuWv-nvJ]:J3rWj/M;[SsU5e0)VTc:;tcL"Ya'+u{.U{Psi*MPZp`gOz"?QIJev<.z6 6. ri/-J-V)?"!x3*M\&ZS_}Epu1,h~fG/Is!4;9dq;7B?|Qq~k}*~P"@<DoLkbw@-eC<hK`bzLg #,lY&f@r0S1_ U|ou[qi'ki ,T XKmv9rZ]AN$oYnVBFdN+41CnyCF]4#M&_HZhBwOV|CQw$7Eh%( I-5ZlT#c{W/rFYg([%elX4>u48n+j~'+Vw! P?T`ke2lh{v>x{\p@HDoK\ F0nkRZ[4Q#i Dk]==_{3 Q\do%D%mM6LmE68 Enter the user ID. End with an empty line: GnuPG needs to construct a user ID to identify your key. Pick an image to use for your photo ID. The image must be a JPEG file. Remember that the image is stored within your public key. If you use a very large picture, your key will become very large as well! Keeping the image close to 240x288 is a good size to use. Supported algorithms: You need a user ID to identify your key; the software constructs the user ID from the Real Name, Comment and Email Address in this form: "Heinrich Heine (Der Dichter) " aka aka "%s" issuer "%s" using %s key %s imported: %lu unchanged: %lu new subkeys: %lu trusted certificates: %u (%u,%u,%u,%u) new user IDs: %lu not imported: %lu w/o user IDs: %lu "%s": preference for cipher algorithm %s "%s": preference for compression algorithm %s "%s": preference for digest algorithm %s It is not certain that the signature belongs to the owner. The signature is probably a FORGERY. There is no indication that the signature belongs to the owner. This could mean that the signature is forged. new signatures: %lu "%s" Card serial no. = Key fingerprint = Subkey fingerprint: secret keys read: %lu skipped new keys: %lu user IDs cleaned: %lu Subkey fingerprint: runtime cached certificates: %u signatures cleaned: %lu skipped PGP-2 keys: %lu (%c) Finished (%c) Toggle the authenticate capability (%c) Toggle the encrypt capability (%c) Toggle the sign capability (%d) DSA (set your own capabilities) (%d) DSA (sign only) (%d) DSA and Elgamal (%d) ECC (%d) ECC and ECC (%d) Elgamal (encrypt only) (%d) Existing key (%d) Existing key from card (%d) RSA (%d) RSA (encrypt only) (%d) RSA (set your own capabilities) (%d) RSA (sign only) (%d) RSA and RSA (default) (%d) encrypt (%d) sign (%d) sign, encrypt (0) I will not answer.%s (1) I have not checked at all.%s (1) Signature key (2) Encryption key (2) I have done casual checking.%s (3) Authentication key (3) I have done very careful checking.%s issuer = new key revocations: %lu %d = I do NOT trust %d = I don't know or won't say %d = I trust fully %d = I trust marginally %d = I trust ultimately ( issuer valid from ( signature created at (%d) ECC (encrypt only) (%d) ECC (set your own capabilities) (%d) ECC (sign only) (%d) Existing key (%d) Existing key from card (certificate created at (certificate valid from SHA1 fingerprint = %s Since this binding's policy was 'auto', it has been changed to 'ask'. Unable to sign. aka "%s" m = back to the main menu q = quit s = skip this key secret keys imported: %lu subject = (%d validity count cleared) (%d validity counts cleared) (%lu signature) (%lu signatures) (end with an empty line): (main key ID %s) (non-exportable) (non-revocable) (optional; end with an empty line): (reordered signatures follow) - skipped ERROR: The CRL will not be used ERROR: The CRL will not be used because it was still too old after an update! ERROR: The CRL will not be used due to an unknown critical extension! ERROR: This cached CRL may have been tampered with! Primary key fingerprint: WARNING: invalid cache record length secret keys unchanged: %lu "%s" is not a fingerprint "%s" is not a proper fingerprint "%s" is not a proper mail address "%s" is not the primary fingerprint "%s" not a key ID: skipping "%s" was already locally signed by key %s "%s" was already signed by key %s # List of assigned trustvalues, created %s # (Use "gpg --import-ownertrust" to restore them) %d Admin PIN attempt remaining before card is permanently locked %d Admin PIN attempts remaining before card is permanently locked %d bad signature %d bad signatures %d duplicate signature removed %d duplicate signatures removed %d good signature %d good signatures %d key processed%d keys processed%d signature not checked due to a missing key %d signatures not checked due to missing keys %d signature not checked due to an error %d signatures not checked due to errors %d signature reordered %d signatures reordered %lld~day%lld~days%lld~hour%lld~hours%lld~minute%lld~minutes%lld~month%lld~months%lld~second%lld~seconds%lld~week%lld~weeks%lld~year%lld~years%lu key cached%lu keys cached%lu keys cached so far (%lu signature) %lu keys cached so far (%lu signatures) %lu keys processed so far %s "%.*s" %u-bit %s key, ID %s, created %s%s. %s%s %s stopped %s does not yet work with %s %s encrypted data %s encrypted session key %s encryption will be used %s is not compliant with %s mode %s is too old (need %s, have %s) %s key %s requires a %zu bit or larger hash (hash is %s) %s key %s uses an unsafe (%zu bit) hash %s key uses an unsafe (%u bit) hash %s keys may be between %u and %u bits long. %s keysizes must be in the range %u-%u %s makes no sense with %s! %s not allowed with %s! %s signature, digest algorithm %s%s%s %s.%s encrypted data %s/%s signature from: "%s" %s/%s signature using %s key %s %s/%s.%s encrypted for: "%s" %s: There is limited assurance this key belongs to the named user %s: There is no assurance this key belongs to the named user %s: This key is bad! It has been marked as untrusted! %s: Verified 0 signatures.%s: Verified 0~signatures and encrypted 0~messages.%s: directory does not exist! %s: error reading free record: %s %s: error reading version record: %s %s: error updating version record: %s %s: error writing dir record: %s %s: error writing version record: %s %s: failed to append a record: %s %s: failed to create hashtable: %s %s: failed to create version record: %s%s: failed to zero a record: %s %s: invalid file version %d %s: invalid trustdb %s: invalid trustdb created %s: keyring created %s: not a trustdb file %s: skipped: %s %s: skipped: public key already present %s: skipped: public key is disabled %s: trustdb created %s: unknown suffix %s: version record with recnum %lu %s:%d: deprecated option "%s" %s:%d: invalid auto-key-locate list %s:%d: invalid export options %s:%d: invalid import options %s:%d: invalid keyserver options %s:%d: invalid list options %s:%d: invalid verify options %s:%u: "%s" is obsolete in this file - it only has effect in %s %s:%u: garbage at end of line ignored %s:%u: ignoring unknown flag '%s' %s:%u: invalid fingerprint detected %s:%u: line too long - skipped %s:%u: obsolete option "%s" - it has no effect %s:%u: password given without user %s:%u: read error: %s %s:%u: skipping this line %sNumber: %s%%0AHolder: %s%%0ACounter: %lu%s%sNumber: %s%%0AHolder: %s%s'%s' already compressed '%s' does not appear to be a valid key ID, fingerprint or keygrip '%s' is an invalid LDAP URL '%s' is not a JPEG file '%s' is not a valid character set '%s' is not a valid expiration time '%s' is not a valid long keyID '%s' is not a valid signature expiration '%s' is not an LDAP URL '%s' matches multiple secret keys: (G)ood, (A)ccept once, (U)nknown, (R)eject once, (B)ad? (No description given) (Probably you want to select %d here) (This is a sensitive revocation key) (Use the '%s' command.) (check argument of option '%s') (deadlock?) (further info: (policy: %s)(reported error: %s <%s>) (reported error: %s) (sensitive)(this does not seem to be an encrypted message) (this is the MD2 algorithm) (this is the RC2 algorithm) (unless you specify the key by fingerprint) (use "help" to list choices) * The 'sign' command may be prefixed with an 'l' for local signatures (lsign), a 't' for trust signatures (tsign), an 'nr' for non-revocable signatures (nrsign), or any combination thereof (ltsign, tnrsign, etc.). , key algorithm --output doesn't work for this command 10 translator see trust.c:uid_trust_string_fixed22 translator: see certreg-ui.c:gpgsm_gencertreq_tty@ (See the "info" manual for a complete listing of all commands and options) @ (See the man page for a complete listing of all commands and options) @ Examples: -se -r Bob [file] sign and encrypt for user Bob --clear-sign [file] make a clear text signature --detach-sign [file] make a detached signature --list-keys [names] show keys --fingerprint [names] show fingerprints @ Options: @Commands: @Options: A key for "%s" already exists A passphrase may not be a known term or match%%0Acertain pattern.A passphrase should be at least %u character long.A passphrase should be at least %u characters long.A passphrase should contain at least %u digit or%%0Aspecial character.A passphrase should contain at least %u digits or%%0Aspecial characters.A revocation certificate is a kind of "kill switch" to publicly declare that a key shall not anymore be used. It is not possible to retract such a revocation certificate once it has been published.AEAD: ASCII armored output forced. About to create a key for: "%s" Admin PINAdmin commands are allowed Admin commands are not allowed Admin-only command AllowAn ssh process requested the use of key%%0A %s%%0A (%s)%%0ADo you want to allow this?Are you sure that you want to sign this key with your key "%s" (%s) Are you sure you still want to add it? (y/N) Are you sure you still want to revoke it? (y/N) Are you sure you still want to sign it? (y/N) Are you sure you want to appoint this key as a designated revoker? (y/N) Are you sure you want to change the expiration time for multiple subkeys? (y/N) Are you sure you want to delete it? (y/N) Are you sure you want to replace it? (y/N) Are you sure you want to use it? (y/N) Assuan accept problem: %s Assuan processing failed: %s AuthenticateAuthentication key Available keys: BAD signature from "%s"Bad PINBad PassphraseBegin CRL dump (retrieved via %s) CA fingerprint: CRC error; %06lX - %06lX CRL access not possible due to Tor mode CRL access not possible due to disabled %s CRL checking too deeply nested CRL signature verification failed: %s CRL/OCSP check of certificatesCan't check signature: %s Can't open '%s': %s CancelCannot revoke the last valid user ID. Caps Lock is onCardholder's given name: Cardholder's surname: Certificate chain availableCertificate chain validCertificates leading to an ultimately trusted key: CertifyChange (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? Change (N)ame, (C)omment, (E)mail or (Q)uit? Change (N)ame, (E)mail, or (O)kay/(Q)uit? Change (N)ame, (E)mail, or (Q)uit? Change passphraseChanging card key attribute for: Changing expiration time for a subkey. Changing expiration time for the primary key. Changing usage of a subkey. Changing usage of the primary key. Cipher: Command expects a filename argument Comment: Component not foundComponent not suitable for launchingCompression: Configuration file of component %s is broken Configuration for HTTP serversConfiguration for KeyserversConfiguration for OCSPConfiguration of LDAP servers to useContinue? (Y/n) Continue? (y/N) Control-D detected CorrectCreate a designated revocation certificate for this key? (y/N) Create a revocation certificate for this key? (y/N) Create a revocation certificate for this signature? (y/N) Create anyway? (y/N) Create self-signed certificate? (y/N) Critical preferred keyserver: Critical signature notation: Critical signature policy: Current allowed actions: Current recipients: DNS is not properly configuredDSA requires the hash length to be a multiple of 8 bits Data availableData decryption succeededData encryption succeededData signing succeededData verification succeededDefaulting to unknown. Delete keyDelete this good signature? (y/N/q)Delete this invalid signature? (y/N/q)Delete this key from the keyring? (y/N) Delete this unknown signature? (y/N/q)Deleted %d signature. Deleted %d signatures. DenyDetached signature. Did you specify the fingerprint of a subkey? Digest: Dirmngr usableDisplaying %s photo ID of size %ld for key %s (uid %d) Do you really want to delete the key identified by keygrip%%0A %s%%0A %%C%%0A?Do you really want to delete the selected keys? (y/N) Do you really want to delete this key? (y/N) Do you really want to make your passphrase visible on the screen?Do you really want to permanently delete the OpenPGP secret key:Do you really want to permanently delete the OpenPGP secret subkey key:Do you really want to revoke the entire key? (y/N) Do you really want to revoke the selected subkeys? (y/N) Do you really want to revoke this subkey? (y/N) Do you really want to set this key to ultimate trust? (y/N) Do you ultimately trust%%0A "%s"%%0Ato correctly certify user certificates?Do you want to issue a new signature to replace the expired one? (y/N) Do you want to promote it to a full exportable signature? (y/N) Do you want to promote it to an OpenPGP self-signature? (y/N) Do you want to sign it again anyway? (y/N) Do you want your signature to expire at the same time? (Y/n) ECDSA public key is expected to be in SEC encoding multiple of 8 bits Email address: EncryptEncrypted %d message in the future.Encrypted %d messages in the future.Encrypted %d message.Encrypted %d messages.Encrypted 0 messages.Encryption algorithm supportedEncryption key End CRL dump Enter DNS namesEnter JPEG filename for photo ID: Enter URIsEnter an optional description; end it with an empty line: Enter email addressesEnter new filenameEnter new passphraseEnter number(s), N)ext, or Q)uit > Enter passphrase Enter passphrase: Enter the X.509 subject name: Enter the fingerprint of the additional decryption subkey: Enter the keygrip: Enter the notation: Enter the user ID of the designated revoker: Enter your preferred keyserver URL: Error - Error reading backup key from '%s': %s Error: Combined name too long (limit is %d characters). Error: Double spaces are not allowed. Error: Only plain ASCII is currently allowed. Error: The "<" character may not be used. Error: The trustdb is corrupted. Error: invalid characters in preference string. Error: invalid formatted fingerprint. Error: invalid length of preference string. Error: invalid response. Expired signature from "%s"External verification of component %s failedFeatures: File '%s' exists. GPG_TTY has not been set - using maybe bogus default Go ahead and type your message ... Good signature fromGood signature from "%s"Gpg-Agent usableHash: Hint: If this message was created before the year 2003 it is likely that this message is legitimate. This is because back then integrity protection was not widely used. Hint: Select the user IDs to sign How carefully have you verified the key you are about to sign actually belongs to the person named above? If you don't know what to answer, enter "0". How much do you trust that this key actually belongs to the named user? I have checked this key casually. I have checked this key very carefully. I have not checked this key at all. I'll change it laterIDEA cipher unavailable, optimistically attempting to use %s instead If that does not work, please consult the manual Included certificatesInvalid character in comment Invalid character in name Invalid characters in PINInvalid command (try "help") Invalid key %s made valid by --allow-non-selfsigned-uid Invalid selection. Invalid subject name '%s' Invalid subject name label '%.*s' Invalid user ID '%s': %s Is this correct? (y/N) Is this okay? (y/N) Is this photo correct (y/N/q)? It is NOT certain that the key belongs to the person named in the user ID. If you *really* know what you are doing, you may answer the next question with yes. KEYTOCARD failed: %s Key %s is already revoked. Key available at: Key does not expire at all Key expires at %s Key generation canceled. Key generation failed: %s Key has been compromisedKey has only stub or on-card key items - no passphrase to change. Key is no longer usedKey is revoked.Key is supersededKey is valid for? (0) Key not changed so no update needed. KeyringKeyserver no-modifyLanguage preferences: Login data (account name): Make off-card backup of encryption key? (Y/n) Messages encrypted in the past: %d.Messages encrypted over the past %d day: %d.Messages encrypted over the past %d days: %d.Messages encrypted over the past %d month: %d.Messages encrypted over the past %d months: %d.Messages encrypted over the past %d year: %d.Messages encrypted over the past %d years: %d.Messages verified in the past: %d.Messages verified over the past %d day: %d.Messages verified over the past %d days: %d.Messages verified over the past %d month: %d.Messages verified over the past %d months: %d.Messages verified over the past %d year: %d.Messages verified over the past %d years: %d.Mr.Ms.Name may not start with a digit Name must be at least 5 characters long Need one component argumentNeed the secret key to do this. NetworkNetwork related optionsNnCcEeOoQqNoNo argument allowedNo audit log entries.No fingerprintNo help availableNo help available for '%s'No help available for '%s'.No key with this keygrip No matching user IDs.No reason specifiedNo subject name given No subkey with index %d No subkey with key ID '%s'. No such user ID. No trust value assigned to: No user ID with hash %s No user ID with index %d Not a valid email address Not a valid keygrip (expecting 40 hex digits) Not signed by you. Notations: Note that group specifications are ignored Note that this key cannot be used for encryption. You may want to use the command "--edit-key" to generate a subkey for this purpose. Note, that this software is not officially approved to create or verify such signatures. Note: %s Note: %s is not for normal use! Note: '%s' is not considered an option Note: ADSK key has been used for decryptionNote: Only the secret part of the shown primary key will be deleted. Note: Only the secret part of the shown subkey will be deleted. Note: Only the shown public subkey will be deleted. Note: Outdated servers may lack important security fixes. Note: PIN has not yet been enabled.Note: Request from a remote site.Note: Request from the web browser.Note: Signer's address '%s' does not match DNS entry Note: The blanks are not part of the passphrase.Note: The key has been created with one or more ADSK! Note: The public primary key and all its subkeys will be deleted. Note: There is no guarantee that the card supports the requested size. If the key generation does not succeed, please check the documentation of your card to see what sizes are allowed. Note: This command destroys all keys stored on the card! Note: This key has been disabled. Note: This key has expired! Note: This passphrase has never been changed.%0APlease change it now.Note: Use "%s %s" for a full featured key generation dialog. Note: Use '%s' to make use of this info Note: Use the command "%s" to restart them. Note: Use the command "%s%s" to get details. Note: Verified signer's address is '%s' Note: backup of card key saved to '%s' Note: creating subkeys for v3 keys is not OpenPGP compliant Note: ignoring option "--%s" due to global config Note: key %s has no %s feature Note: key %s has no preference for %s Note: key has been revokedNote: keys are already stored on the card! Note: no default option file '%s' Note: non-critical certificate policy not allowedNote: secret key %s expired at %s Note: sender requested "for-your-eyes-only" Note: signature key %s expired %s Note: signature key %s has been revoked Note: signatures using the %s algorithm are rejected Note: simple S2K mode (0) is strongly discouraged Note: the local copy of the secret key will only be deleted with "save". Note: third-party key signatures using the %s algorithm are rejected Note: trustdb not writable Note: ultimately trusted key %s expired Note: ultimately trusted key %s not found Note: won't be able to encrypt to '%s': %s Nothing deleted. Nothing to sign with key %s Nothing to sign. Now creating certificate request. Now creating self-signed certificate. Number of recipientsOCSP request not possible due to Tor mode OCSP request not possible due to disabled HTTP OCSP responder at '%s' status: %s OCSP responder returned a non-current status OCSP responder returned a status in the future OCSP responder returned an too old status OpenPGPOpenPGP card no. %s detected OpenPGP card not available: %s Options controlling key import and exportOptions controlling key listingsOptions controlling the PIN-EntryOptions controlling the configurationOptions controlling the diagnostic outputOptions controlling the inputOptions controlling the outputOptions controlling the securityOptions enforcing a passphrase policyOptions for unattended useOptions to specify keysOptions used for startupOther optionsOverwrite? (y/N) Owner trust may not be set while using a user provided trust database PIN callback returned error: %s PIN for CHV%d is too short; minimum length is %d PIN not correctly repeated; try againPIN too longPIN too shortPIN:PUKPUK not correctly repeated; try againParsing data succeededPassphrase EntryPassphrase Not AllowedPassphrase too longPassphrase:Please correct the error first Please decide how far you trust this user to correctly verify other users' keys (by looking at passports, checking fingerprints from different sources, etc.) Please don't put the email address into the real name or the comment Please enter a domain to restrict this signature, or enter for none. Please enter a passphrase to protect the received secret key%%0A %s%%0A %s%%0Awithin gpg-agent's key storagePlease enter name of data file: Please enter the PIN%s%s%s to unlock the cardPlease enter the depth of this trust signature. A depth greater than 1 allows the key you are signing to make trust signatures on your behalf. Please enter the new passphrasePlease enter the passphrase for decryption.Please enter the passphrase for the ssh key%%0A %F%%0A (%c)Please enter the passphrase or the PIN needed to complete this operation.Please enter the passphrase to export the OpenPGP secret key:Please enter the passphrase to export the OpenPGP secret subkey:Please enter the passphrase to import the OpenPGP secret key:Please enter the passphrase to protect the imported object within the %s system.Please enter the passphrase to protect the imported object within the GnuPG system.Please enter the passphrase to protect the new PKCS#12 object.Please enter the passphrase to unlock the OpenPGP secret key:Please enter the passphrase to unlock the secret key for the X.509 certificate: "%s" S/N %s, ID 0x%08lX, created %s, expires %s. Please enter the passphrase to unprotect the PKCS#12 object.Please enter the passphrase to%0Aprotect your new keyPlease enter your PIN, so that the secret key can be unlocked for this sessionPlease enter your passphrase, so that the secret key can be unlocked for this sessionPlease indicate whether this email address should be associated with key %s or whether you think someone is impersonating "%s".Please insert the card with serial numberPlease note that the factory settings of the PINs are PIN = '%s' Admin PIN = '%s' You should change them using the command --change-pin Please note that the shown key validity is not necessarily correct unless you restart the program. Please re-enter this passphrasePlease remove the current card and insert the one with serial numberPlease report bugs to <@EMAIL@>. Please select exactly one user ID. Please select the reason for the revocation: Please select the type of key to generate: Please select what kind of key you want: Please select where to store the key: Please select which elliptic curve you want: Please specify how long the key should be valid. 0 = key does not expire = key expires in n days w = key expires in n weeks m = key expires in n months y = key expires in n years Please specify how long the signature should be valid. 0 = signature does not expire = signature expires in n days w = signature expires in n weeks m = signature expires in n months y = signature expires in n years Please verify that the certificate identified as:%%0A "%s"%%0Ahas the fingerprint:%%0A %sPossible actions for a %s key: Possible actions for a %s key: Preferred keyserver: Primary key fingerprint:Private DO data: Private KeysProceed? (y/N) Pubkey: Public key is disabled. Push ACK button on card/token.Quality:Quit without saving? (y/N) RSA modulus missing or not of size %d bits RSA prime %s missing or not of size %d bits RSA public exponent missing or larger than %d bits Ready. Ready. You should now send this request to your CA. Real name: Really create the revocation certificates? (y/N) Really create? (y/N) Really delete this self-signature? (y/N)Really do a factory reset? (enter "yes") Really move the primary key? (y/N) Really remove all selected user IDs? (y/N) Really remove this user ID? (y/N) Really revoke all selected user IDs? (y/N) Really revoke this user ID? (y/N) Really sign all text user IDs? (y/N) Really sign all user IDs? (y/N) Really sign? (y/N) Really update the preferences for the selected user IDs? (y/N) Really update the preferences? (y/N) Reason for revocation: %s Recipient %dRemaining attempts: %dRepeat this PINRepeat this PUKRepeat this Reset CodeRepeat:Replace existing key? (y/N) Replace existing keys? (y/N) Requested keysize is %u bits Reset CodeReset Code is too short; minimum length is %d Reset Code not correctly repeated; try againReset Code not or not anymore available Revocation certificate created. Revocation certificate created. Please move it to a medium which you can hide away; if Mallory gets access to this certificate he can use it to make your key unusable. It is smart to print this certificate and store it away, just in case your media become unreadable. But have some caution: The print system of your machine might store the data and make it available to others! Root certificate trustworthyS/MIMES/N %s is not valid; reason=%02X date=%.15s S/N %s is valid, it is not listed in the CRL SETERROR %s (try %d of %d)SIGHUP received - re-reading configuration and flushing caches SIGINT received - immediate shutdown SIGTERM received - shutting down ... SIGTERM received - still %d active connections SIGUSR2 received - no action defined Salutation (M = Mr., F = Ms., or space): Save changes? (y/N) Secret key is available. Secret key is not available. Secret parts of primary key are not available. Secret parts of primary key are stored on-card. Secret subkeys are available. Serial number of the card: %s Session key createdSet preference list to: SignSign it? (y/N) Signature %dSignature availableSignature does not expire at all Signature expired %s Signature expires %s Signature expires at %s Signature is valid for? (%s) Signature key Signature made Signature made %s Signature made %s using %s key ID %s Signature notation: Signature policy: Signer %dSkipping user ID "%s", which is not a text ID. SmartcardsSorry, no terminal at all requested - can't get input Sorry, we are in batchmode - can't get input SsEeAaQqStatistics for keys with the email address "%s": Subkey %s is already revoked. Such a user ID already exists on this key! SuggestSyntax: @DIRMNGR@ [options] [command [args]] Keyserver, CRL, and OCSP access for @GNUPG@ Syntax: @GPG@ [options] [files] Sign, check, encrypt or decrypt Default operation depends on the input data Syntax: @GPG@-connect-agent [options] Connect to a running agent and send commands Syntax: @GPGCONF@ [options] Manage configuration options for tools of the @GNUPG@ system Syntax: @GPGSM@ [options] [files] Sign, check, encrypt or decrypt using the S/MIME protocol Default operation depends on the input data Syntax: @GPG_AGENT@ [options] [command [args]] Secret key management for @GNUPG@ Syntax: dirmngr-client [options] [certfile|pattern] Test an X.509 certificate against a CRL or do an OCSP check The process returns 0 if the certificate is valid, 1 if it is not valid and other error codes for general failures Syntax: gpg-check-pattern [options] patternfile Check a passphrase given on stdin against the patternfile Syntax: gpg-preset-passphrase [options] KEYGRIP Password cache maintenance Syntax: gpg-protect-tool [options] [args] Secret key maintenance tool Syntax: gpgv [options] [files] Check signatures against known trusted keys Syntax: kbxutil [options] [files] List, export, import Keybox data Syntax: scdaemon [options] [command [args]] Smartcard daemon for @GNUPG@ TOFU DB errorTOFU db corruption detected. TOFU detected a binding conflictTake this one anywayThe card will now be re-configured to generate a key of %u bits The card will now be re-configured to generate a key of type: %s The characters '%s' and '%s' may not appear in name The email address "%s" is associated with %d key!The email address "%s" is associated with %d keys!The email address "%s" is associated with %d key: The email address "%s" is associated with %d keys: The following key was revoked on %s by %s key %s The minimum trust level for this key is: %s The self-signature on "%s" is a PGP 2.x-style signature. The signature will be marked as non-exportable. The signature will be marked as non-revocable. There are no preferences on a PGP 2.x-style user ID. These parameters are used: This JPEG is really large (%d bytes) ! This command is not allowed while in %s mode. This command is not supported by this card This command is only available for version 2 cards This is a qualified signature This is a revocation certificate for the OpenPGP key:This is a secret key! - really delete? (y/N) This is the first time the email address "%s" is being used with key %s.This key (or subkey) is not protected with a passphrase. Please enter a new passphrase to export it.This key belongs to us This key has been disabledThis key has expired!This key is bad! It has been marked as untrusted! If you *really* know what you are doing, you may answer the next question with yes. This key is due to expire on %s. This key may be revoked by %s key %sThis key probably belongs to the named user This key's user IDs: This may take a while ... This passphrase has not been changed%%0Asince %.4s-%.2s-%.2s. Please change it now.This signature expired on %s. This will be a self-signature. To avoid an accidental use of this file, a colon has been inserted before the 5 dashes below. Remove this colon with a text editor before importing and publishing this revocation certificate.To be revoked by: To complete this certificate request please enter the passphrase for the key you just created once more. To migrate '%s', with each smartcard, run: %s Tor is not properly configuredTor is not runningTotal number processed: %lu URL '%s' redirected to '%s' (%u) URL to retrieve public key: UncompressedUnknown critical signature notation: Unknown operationUnknown signature type '%s' Usage: @DIRMNGR@ [options] (-h for help)Usage: @GPG@ [options] [files] (-h for help)Usage: @GPG@-connect-agent [options] (-h for help)Usage: @GPGCONF@ [options] (-h for help)Usage: @GPGSM@ [options] [files] (-h for help)Usage: @GPG_AGENT@ [options] (-h for help)Usage: @SCDAEMON@ [options] (-h for help)Usage: dirmngr-client [options] [certfile|pattern] (-h for help) Usage: gpg-check-pattern [options] patternfile (-h for help) Usage: gpg-preset-passphrase [options] KEYGRIP (-h for help) Usage: gpg-protect-tool [options] (-h for help) Usage: gpgv [options] [files] (-h for help)Usage: kbxutil [options] [files] (-h for help)Use it to revoke this key in case of a compromise or loss of the secret key. However, if the secret key is still accessible, it is better to generate a new revocation certificate and give a reason for the revocation. For details see the description of of the gpg command "--generate-revocation" in the GnuPG manual.Use the option '%s' to decrypt anyway. Use the reader's pinpad for input.Use this key anyway? (y/N) User ID "%s" compacted: %s User ID "%s" is expired.User ID "%s" is not self-signed.User ID "%s" is revoked.User ID "%s" is signable. User ID "%s": %d signature removed User ID "%s": %d signatures removed User ID "%s": already clean User ID "%s": already minimized User ID is no longer validVerified %d message in the future.Verified %d messages in the future.Verified %d message.Verified %d messages.WARNING: "%s" is a deprecated command - do not use it WARNING: "%s" is a deprecated option WARNING: "%s%s" is an obsolete option - it has no effect WARNING: "%s%s" is an obsolete option - it has no effect except on %s WARNING: %s WARNING: %s overrides %s WARNING: '%s' is an empty file WARNING: Elgamal sign+encrypt keys are deprecated WARNING: Encrypting to %s, which has no non-revoked user ids WARNING: This is a PGP 2.x-style key. Adding a designated revoker may cause some versions of PGP to reject this key. WARNING: This is a PGP2-style key. Adding a photo ID may cause some versions of PGP to reject this key. WARNING: This key has been revoked by its designated revoker! WARNING: This key has been revoked by its owner! WARNING: This key is not certified with a trusted signature! WARNING: This key is not certified with sufficiently trusted signatures! WARNING: This key is not suitable for signing in %s mode WARNING: This subkey has been revoked by its owner! WARNING: Using untrusted key! WARNING: We do NOT trust this key! WARNING: Your encryption subkey expires soon. WARNING: a user ID signature is dated %d seconds in the future WARNING: appointing a key as a designated revoker cannot be undone! WARNING: cipher algorithm %s not found in recipient preferences WARNING: creation time of signature not known - assuming current timeWARNING: digest algorithm %s is deprecated WARNING: encrypted message has been manipulated! WARNING: forcing compression algorithm %s (%d) violates recipient preferences WARNING: forcing digest algorithm %s (%d) violates recipient preferences WARNING: forcing symmetric cipher %s (%d) violates recipient preferences WARNING: invalid cache file hash in '%s' line %u WARNING: invalid cache record length for S/N WARNING: invalid notation data found WARNING: key %s contains preferences for unavailable algorithms on these user IDs: WARNING: key %s is not suitable for encryption in %s mode WARNING: key %s may be revoked: fetching revocation key %s WARNING: key %s may be revoked: revocation key %s not present. WARNING: message was encrypted with a weak key in the symmetric cipher. WARNING: message was not integrity protected WARNING: multiple plaintexts seen WARNING: multiple signatures detected. Only the first will be checked. WARNING: new CRL still too old; it expired on %s - loading anyway WARNING: no command supplied. Trying to guess what you mean ... WARNING: no user ID has been marked as primary. This command may cause a different user ID to become the assumed primary. WARNING: not a detached signature; file '%s' was NOT verified! WARNING: nothing exported WARNING: potentially insecure symmetrically encrypted session key WARNING: program may create a core file! WARNING: recipients (-r) given without using public key encryption WARNING: running with faked system time: WARNING: signature digest conflict in message WARNING: signing subkey %s has an invalid cross-certification WARNING: signing subkey %s is not cross-certified WARNING: some OpenPGP programs can't handle a DSA key with this digest size WARNING: the signature will not be marked as non-exportable. WARNING: the signature will not be marked as non-revocable. WARNING: this key might be revoked (revocation key not present) WARNING: unable to %%-expand notation (too large). Using unexpanded. WARNING: unable to %%-expand policy URL (too large). Using unexpanded. WARNING: unable to %%-expand preferred keyserver URL (too large). Using unexpanded. WARNING: unable to fetch URI %s: %s WARNING: unable to refresh key %s via %s: %s WARNING: unable to remove temp directory '%s': %s WARNING: unable to remove tempfile (%s) '%s': %s WARNING: unsafe enclosing directory ownership on configuration file '%s' WARNING: unsafe enclosing directory ownership on extension '%s' WARNING: unsafe enclosing directory ownership on homedir '%s' WARNING: unsafe enclosing directory permissions on configuration file '%s' WARNING: unsafe enclosing directory permissions on extension '%s' WARNING: unsafe enclosing directory permissions on homedir '%s' WARNING: unsafe ownership on configuration file '%s' WARNING: unsafe ownership on extension '%s' WARNING: unsafe ownership on homedir '%s' WARNING: unsafe permissions on configuration file '%s' WARNING: unsafe permissions on extension '%s' WARNING: unsafe permissions on homedir '%s' WARNING: using experimental cipher algorithm %s WARNING: using experimental digest algorithm %s WARNING: using experimental public key algorithm %s WKD uses a cached resultWarning: %lu key skipped due to its large size Warning: %lu keys skipped due to their large sizes Warning: This key is also listed for use with SSH! Deleting the key might remove your ability to access remote machines.Warning: You have entered an insecure passphrase.Warning: errors found and only checked self-signatures, run '%s' to check all signatures. Warning: if you think you've seen more signatures by this key and user id, then this key might be a forgery! Carefully examine the email address for small variations. If the key is suspect, then use %s to mark it as being bad. Warning: if you think you've seen more signatures by this key and these user ids, then this key might be a forgery! Carefully examine the email addresses for small variations. If the key is suspect, then use %s to mark it as being bad. Warning: not using '%s' as default key: %s Warning: unsafe ownership on %s "%s" Warning: unsafe permissions on %s "%s" Warning: we have yet to see a message signed using this key and user id! Warning: we've only seen one message signed using this key and user id! Warning: you have only encrypted one message to this key! Warning: you have yet to encrypt a message to this key! We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. What keysize do you want for the subkey? (%u) What keysize do you want? (%u) WrongYesYes, protection is not neededYou are about to create a signature using your certificate: "%s" Note, that this certificate will NOT create a qualified signature!You are about to create a signature using your certificate: "%s" This will create a qualified signature by law equated to a handwritten signature. %s%sAre you really sure that you want to do this?You are about to revoke these signatures: You are using the '%s' character set. You can't change the expiration date of a v3 key You can't delete the last user ID! You did not specify a user ID. (you may use "-r") You have not entered a passphrase - this is in general a bad idea!%0APlease confirm that you do not want to have any protection on your key.You have not entered a passphrase!%0AAn empty passphrase is not allowed.You have signed these user IDs on key %s: You may not add a designated revoker to a PGP 2.x-style key. You may not add a photo ID to a PGP2-style key. You may try to re-create the trustdb using the commands: You may want to change its expiration date too. You must select at least one key. You must select at least one user ID. You must select exactly one key. You selected this USER-ID: "%s" Your current signature on "%s" has expired. Your current signature on "%s" is a local signature. Your decision? Your selection? Your selection? (enter '?' for more information): Your system can't display dates beyond 2038. However, it will be correctly handled up to 2106. [ full ][ never ][ undef ][ expired][ not human readable (%zu bytes: %s%s) ][ revoked][ unknown][Error - No name][Error - invalid DN][Error - invalid encoding][Error - out of core][User ID not found][date not given][marginal][none][not set][revocation][self-signature][ultimate][uncertain]a %u bit hash is not valid for a %u bit %s key a %zu bit hash is not valid for a %u bit %s key a dirmngr daemon is up and running a gpg-agent is already running - not starting a new one a notation name may not contain an '=' character a notation name must have only printable characters or spaces a notation name must have only printable characters or spaces, and end with an '=' a notation name must not contain more than one '@' character a notation value must not use any control characters a user notation name must contain the '@' character absolute file name expected accepting root CA not marked as a CAaccess to admin commands is not configured activate changes at runtime, if possibleadd a certificate to the cacheadd a key to a smartcardadd a photo IDadd a revocation keyadd a subkeyadd a user IDadd an additional decryption subkeyadd new servers discovered in CRL distribution points to serverlistadding '%s:%d' to the ldap server list algorithm:algorithm: %sall values passed to '%s' ignored allocating list item failed: %s allow online software version checkallow passphrase to be prompted through Emacsallow presetting passphraseallow sending OCSP requestsambiguous option '%s' anonymous recipient; trying secret key %s ... apply global default valuesargument not expectedarmor header: armor: %s assuan_inquire failed: %s assuan_inquire(%s) failed: %s assume input is in PEM formatassume input is in base-64 formatassume input is in binary formatassume no on most questionsassume the GnuPG key backup formatassume yes on most questionsassuming %s encrypted data assuming bad signature from key %s due to an unknown critical bit assuming signed data in '%s' attr hash algorithm: %sautomatically retrieve keys when verifying signaturesautomatically retrieved '%s' via %s available CRL for issuer ID %s can't be used bad URL encoding detected bad data hash algorithm: %sbad data signature from key %s: %s (0x%02x, 0x%x) bad fingerprint in '%s', line %d bad key signature from key %s: %s (0x%02x, 0x%x) basic certificate checks failed - not imported batch mode: never askbe somewhat more quietbinarybuild_packet failed: %s cCcached CRL for issuer id %s tampered; we need to update cached CRL for issuer id %s too old; update required caching keyring '%s' caller did not return the issuing certificate caller did not return the target certificate calling unlock_db_file on a closed file calling unlock_db_file on an unlocked file can't access %s - invalid OpenPGP card? can't access '%s': %s can't acquire read lock on the certificate cache: %s can't acquire write lock on the certificate cache: %s can't allocate control structure: %s can't check signature with unsupported message-digest algorithm %d: %s. can't check signature with unsupported public-key algorithm (%d): %s. can't connect to '%s': %s can't connect to the dirmngr: %s can't create '%s': %s can't create backup file '%s': %s can't create directory '%s': %s can't create lock for '%s' can't create socket: %s can't disable core dumps: %s can't do this in batch mode can't do this in batch mode without "--yes" can't encrypt to '%s' can't get authorityInfoAccess: %s can't handle public key algorithm %d can't handle text lines longer than %d characters can't handle this ambiguous signature data can't hash '%s': %s can't initialize certificate cache lock: %s can't lock '%s' can't open '%s' can't open '%s': %s can't open fd %d: %s can't open signed data '%s' can't open signed data fd=%d: %s can't parse certificate '%s': %s can't release lock on the certificate cache: %s can't set permissions of '%s': %s can't sign using '%s': %s can't use '%s' as home directory can't use a SKESK packet due to the S2K mode cancelled cancelled by user cancel|cancelcannot appoint a PGP 2.x style key as a designated revoker cannot avoid weak key for symmetric cipher; tried %d times! cannot revoke the last valid user ID. card does not support digest algorithm %s card is permanently locked! card-no: certificate '%s' already cached certificate '%s' deleted certificate '%s' loaded certificate '%s' not found: %s certificate already cached certificate cached certificate chain is good certificate chain longer than allowed by CA (%d)certificate chain too long certificate check failed: %s certificate has a BAD signaturecertificate has been revokedcertificate has been revoked certificate has been revoked at: %s due to: %s certificate has expiredcertificate is good certificate is not usable for encryption certificate is not usable for signing certificate is valid certificate not created during lifetime of issuercertificate not yet validcertificate policy not allowedcertificate search not possible due to disabled %s certificate should not have been used for CRL signing certificate should not have been used for OCSP response signing certificate should not have been used for certification certificate should not have been used for encryption certificate should not have been used for signing certificate status is: %s (this=%s next=%s) certificate too large to make any sense certificate with invalid validitycertificate with invalid validity: %schainchange URL to retrieve keychange a CA fingerprintchange a card's PINchange a passphrasechange card holder's namechange card holder's salutationchange data on a cardchange the expiration date for the key or selected subkeyschange the key attributechange the language preferenceschange the login namechange the ownertrustchange the passphrasecheck all programscheck global configuration filecheck signaturescheck validity using OCSPcheck whether a dirmngr is runningchecking CRL forchecking created signature failed: %s checking for a fresh copy of an expired key via %s checking for qualified certificate failed: %s checking the CRL failed: %schecking the trust list failed: %s checking the trustdb checking trustworthiness of root certificate failed: %s cipher algorithm %d%s is unknown or disabled cipher algorithm '%s' may not be used in %s mode colon missingcolons are not allowed in the socket name command "%.50s" is ambiguous compact unusable user IDs and remove all signatures from keycompact unusable user IDs and remove unusable signatures from keycompletes-needed must be greater than 0 compression algorithm '%s' may not be used in %s mode conflicting commands connect to the dirmngrconnection to %s established connection to agent is in restricted mode conversion from '%s' to '%s' failed: %s conversion from '%s' to '%s' not available converting S-expression failed: %s could not parse keyserver URL create ascii armored outputcreate base-64 encoded outputcreated: %screating S-expression failed: %s creating anyway creating cache file '%s' creating directory '%s' creation timestamp missing critical certificate extension %s is not supportedcritical marked policy without configured policiescrl_cache_insert via DP failed: %s crl_cache_insert via issuer failed: %s crl_fetch via DP failed: %s crl_parse_insert failed: %s csh-style command outputdata hash algorithm: %sdata not saved; use option "--output" to save it dearmoring failed: %s decode received data linesdecrypt data (default)decryption failed: %s decryption forced to fail! decryption okay delete selected subkeysdelete selected user IDsdelete signatures from the selected user IDsdeleting certificate "%s" failed: %s deleting copy of secret key failed: %s deleting keyblock failed: %s deleting secret %s failed: %s deny the use of admin card commandsdepth: %d valid: %3d signed: %3d trust: %d-, %dq, %dn, %dm, %df, %du destroy all keys and datadetected card with S/N: %s detected errors in cache dir file digest algorithm '%s' may not be used in %s mode directory '%s' created dirmngr cache-only key lookup failed: %s disable all access to the dirmngrdisable keydisableddisallow caller to override the pinentrydisallow clients to mark keys as "trusted"disallow the use of an external password cachedisplay photo IDs during key listingsdisplay photo IDs during signature verificationdo not allow bypassing the passphrase policydo not allow the reuse of old passphrasesdo not check CRLs for root certificatesdo not check certificate policiesdo not clear the ownertrust values during importdo not detach from the consoledo not make any changesdo not update the trustdb after importdo not use a reader's pinpaddo not use extended connect modedo not use fallback hosts with --ldap-proxydo not use the PIN cache when signingdo not use the SCdaemondo not use the internal CCID driverdoes not match - try againdon't use the terminal at alldropping %u certificates from the cache duplicate entry detected in '%s' line %u duplicated certificate '%s' deleted elevate the trust of signatures with valid PKA dataenable full debuggingenable keyenable putty supportenable ssh supportenarmoring failed: %s encrypt dataencrypted to %s key %s encrypted with %lu passphrases encrypted with %s key, ID %s encrypted with %u-bit %s key, ID %s, created %s encrypted with 1 passphrase encrypted with unknown algorithm %d encryption only with symmetric ciphererror accessing '%s': http status %u error allocating enough memory: %s error allocating memory: %s error beginning transaction on TOFU database: %s error binding socket to '%s': %s error building OCSP request: %s error caching certificate: %s error changing TOFU policy: %s error changing key attribute for key %d: %s error checking validity of CRL issuer certificate: %s error closing '%s' error closing '%s': %s error closing cache file: %s error closing new cache dir file '%s': %s error closing temporary cache file '%s': %s error committing transaction on TOFU database: %s error connecting to '%s': %s error creating '%s': %s error creating a pipe: %s error creating a stream for a pipe: %s error creating directory '%s': %s error creating keybox '%s': %s error creating keyring '%s': %s error creating new cache dir file '%s': %s error creating passphrase: %s error creating temporary cache file '%s': %s error creating temporary file: %s error determining TOFU database's version: %s error fetching certificate by S/N: %s error fetching certificate by subject: %s error finding trust record in '%s': %s error finding writable keyDB: %s error finishing temporary cache file '%s': %s error for setup KDF: %s error forking process: %s error gathering other user IDs: %s error gathering signature stats: %s error getting CRL item: %s error getting OCSP status for target certificate: %s error getting authorityKeyIdentifier: %s error getting card info: %s error getting current key info: %s error getting data from cache file: %s error getting exit code of process %d: %s error getting key usage information: %s error getting list of cards: %s error getting new PIN: %s error getting nonce for the socket error getting responder ID: %s error getting serial number of card: %s error getting stored flags: %s error getting update times of CRL: %s error getting version from '%s': %s error hashing '%s': %s error importing certificate: %s error in '%s': %s error in trailer line error initializing TOFU database: %s error initializing cache file '%s' for reading: %s error initializing reader object: %s error inserting item into temporary cache file: %s error loading certificate '%s': %s error locking keybox: %s error opening '%s': %s error opening TOFU database '%s': %s error opening TOFU database: %s error opening cache file '%s': %s error opening key DB: %s error parsing '%s' error parsing OCSP response for '%s': %s error parsing key specification '%s': %s error parsing value for option '%s': %s error printing log line: %s error reading '%s', line %d: %s error reading '%s': %s error reading CRL extensions: %s error reading HTTP response for '%s': %s error reading TOFU database: %s error reading application data error reading cache entry from db: %s error reading certificate from '%s': %s error reading certificate from stdin: %s error reading directory '%s': %s error reading fingerprint DO error reading from responder: %s error reading input: %s error reading keyblock: %s error reading list of trusted root certificates error reading log from ldap wrapper %d: %s error reading nonce on fd %d: %s error reading the card: %s error renaming '%s' to '%s': %s error retrieving '%s' via %s: %s error retrieving '%s': %s error retrieving CHV status from card error rolling back transaction on TOFU database: %s error running '%s': exit status %d error running '%s': probably not installed error running '%s': terminated error searching the keyring: %s error sending data: %s error sending standard options: %s error setting OCSP target: %s error setting up MD5 hash context: %s error storing certificate error storing certificate: %s error storing flags: %s error updating TOFU database: %s error while asking for the passphrase: %s error writing '%s': %s error writing base64 encoding: %s error writing keyring '%s': %s error writing new cache dir file '%s': %s error writing public keyring '%s': %s error writing to '%s': %s error writing to pipe: %s existing key will be replaced expect an URL for --lookupexpect certificates in PEM formatexpiredexpired: %sexpires: %sexport as ssh key failed: %s export attribute user IDs (generally photo IDs)export certificatesexport keysexport keys to a keyserverexport only revocation certificatesexport revocation keys marked as "sensitive"export signatures that are marked as local-onlyexporting secret keys not allowed external program calls are disabled due to unsafe options file permissions extra field detected in crl record of '%s' line %u failed to acquire the pinentry lock: %s failed to allocate OCSP context: %s failed to allocate assuan context: %s failed to allocate keyDB handle failed to create a new cache object: %s failed to create stream from socket: %s failed to create temporary cache dir file '%s': %s failed to create temporary file '%s': %s failed to establish a hashing context for OCSP: %s failed to get the fingerprint failed to initialize the TrustDB: %s failed to initialize the server: %s failed to open '%s': %s failed to open cache dir file '%s': %s failed to proxy %s inquiry to client failed to re-open cache dir file '%s': %s failed to rebuild keyring cache: %s failed to store the creation date: %s failed to store the fingerprint: %s failed to store the key: %s failed to the register commands with Assuan: %s failed to use default PIN as %s: %s - disabling further default use fetch missing issuer certificatesfetch the key specified in the card URLfetch_cert_by_url failed: %s fetch_next_cert failed: %s fetching CRL from '%s' failed: %s file '%s', line %d: %s fingerprint on card does not match requested one fingerprint=%s first record of '%s' is not the version flag the selected user ID as primaryflush the cacheforce loading of outdated CRLsforce the use of the default OCSP responderforce-crl-refresh active and %d minutes passed for issuer id %s; update required force-crl-refresh active for issuer id %s; update required forcedfound another possible matching CA certificate - trying againfstat of '%s' failed in %s: %s fstat(%d) failed in %s: %s fullfull featured key pair generationgGaAuUrRbBgcry_md_open failed: %s gcry_md_open for algorithm %d failed: %s generate a new key pairgenerate a revocation certificategenerate new keysgenerating key failed generating new key get the configuration directories for @GPGCONF@goodgot an invalid S-expression from libksba got status: '%s' gpg/card> handler 0x%lx for fd %d started handler 0x%lx for fd %d terminated handler for fd %d started handler for fd %d terminated hash algorithm %d (%s) for signer %d not supported; using %s hash algorithm used for signer %d: %s (%s) hashing the OCSP response for '%s' failed: %s honor the PKA record set on a key when retrieving keyshonor the preferred keyserver URL set on the keyiImMqQsSiconv_open failed: %s ignore HTTP CRL distribution pointsignore LDAP CRL distribution pointsignore certificate contained OCSP service URLsignore key-signatures which are not self-signaturesignore requests to change the TTYignore requests to change the X displayignoring database dir '%s' ignoring garbage lineimport certificatesimport keys from a keyserverimport missing key from a signatureimport signatures that are marked as local-onlyimport/merge keysimporting common certificates '%s' importing secret keys not allowed include revoked keys in search resultsinclude subkeys when searching by key IDinclude the public key in signaturesinhibit the use of HTTPinhibit the use of LDAPinput line %u too long or missing LF input line longer than %d characters interactive marking as trusted disabled for this session interactive marking as trusted not enabled in gpg-agent intermediate certificate has expiredintermediate certificate is good intermediate certificate not created during lifetime of issuerintermediate certificate not yet validinvalidinvalid S2K mode; must be 0, 1 or 3 invalid SHA1 fingerprint string '%s' invalid alias definitioninvalid argumentinvalid argument for option "%.50s" invalid armor header: invalid armor: line longer than %d characters invalid auto-key-locate list invalid canonical S-expression found invalid char 0x%02x in host name - not added invalid clearsig header invalid commandinvalid command "%.50s" invalid command (there is no implicit command) invalid country code in '%s', line %d invalid dash escaped line: invalid debug-level '%s' given invalid default preferences invalid default-cert-level; must be 0, 1, 2, or 3 invalid export options invalid filter option: %s invalid fingerprintinvalid formatted checksum for '%s' invalid formatted fingerprint in '%s', line %d invalid hash algorithm '%s' invalid import options invalid issuer hash in '%s' line %u invalid item '%s' in preference string invalid keyflag in '%s', line %d invalid keyserver options invalid keyserver protocol (us %d!=handler %d) invalid line detected in '%s' line %u invalid list options invalid meta commandinvalid min-cert-level; must be 1, 2, or 3 invalid optioninvalid option "%.50s" invalid personal cipher preferences invalid personal compress preferences invalid personal digest preferences invalid pinentry mode '%s' invalid radix64 character %02X skipped invalid radix64 character %02x skipped invalid request origin '%s' invalid signature: message digest attribute does not match computed one invalid structure of OpenPGP card (DO 0x93) invalid timestamp in '%s' line %u invalid value invalid value for option '%s' invalid verify options invoke gpg-protect-toolissuer certificate is not marked as a CAissuer certificate not foundissuer certificate not found: %s it is strongly suggested that you update your preferences and keykey "%s" is already on this keyblock key "%s" not found key "%s" not found on keyserver key "%s" not found: %s key %s has no user IDs key %s is not suitable for decryption in %s mode key %s marked as ultimately trusted key %s may not be used for signing in %s mode key %s occurs more than once in the trustdb key %s was created %lu day in the future (time warp or clock problem) key %s was created %lu days in the future (time warp or clock problem) key %s was created %lu second in the future (time warp or clock problem) key %s was created %lu seconds in the future (time warp or clock problem) key %s: key %s: "%s" %d new signatures key %s: "%s" %d new subkeys key %s: "%s" %d new user IDs key %s: "%s" %d signature cleaned key %s: "%s" %d signatures cleaned key %s: "%s" %d user ID cleaned key %s: "%s" %d user IDs cleaned key %s: "%s" 1 new signature key %s: "%s" 1 new subkey key %s: "%s" 1 new user ID key %s: "%s" not changed key %s: "%s" revocation certificate added key %s: "%s" revocation certificate imported key %s: %s key %s: PGP 2.x style key - skipped key %s: PKS subkey corruption repaired key %s: accepted as trusted key key %s: accepted non self-signed user ID "%s" key %s: can't locate original keyblock: %s key %s: can't read original keyblock: %s key %s: card reference is overridden by key material key %s: direct key signature added key %s: doesn't match our copy key %s: duplicated user ID detected - merged key %s: error changing passphrase: %s key %s: error sending to agent: %s key %s: invalid direct key signature key %s: invalid revocation certificate: %s - rejected key %s: invalid revocation certificate: %s - skipped key %s: invalid self-signature on user ID "%s" key %s: invalid subkey binding key %s: invalid subkey revocation key %s: key material on-card - skipped key %s: new key - skipped key %s: no public key - can't apply revocation certificate key %s: no public key for trusted key - skipped key %s: no subkey for key binding key %s: no subkey for key revocation key %s: no subkey for subkey binding signature key %s: no subkey for subkey revocation signature key %s: no user ID key %s: no user ID for signature key %s: no valid user IDs key %s: non exportable signature (class 0x%02X) - skipped key %s: public key "%s" imported key %s: public key not found: %s key %s: removed multiple subkey binding key %s: removed multiple subkey revocation key %s: revocation certificate at wrong place - skipped key %s: secret key already exists key %s: secret key imported key %s: secret key with invalid cipher %d - skipped key %s: skipped subkey key %s: skipped user ID "%s" key %s: subkey signature in wrong place - skipped key %s: unexpected signature class (0x%02X) - skipped key %s: unsupported public key algorithm key %s: unsupported public key algorithm on user ID "%s" key already exists key export failed: %s key generation completed (%d second) key generation completed (%d seconds) key has been created %lu second in future (time warp or clock problem) key has been created %lu seconds in future (time warp or clock problem) key is not flagged as insecure - can't use it with the faked RNG! key not found on keyserver key operation not possible: %s keyblock resource '%s': %s keybox '%s' created keyring '%s' created keyserver option "%s" may not be used in %s mode keyserver receive failed: %s keyserver refresh failed: %s keyserver search failed: %s keyserver send failed: %s keysize invalid; using %u bits keysize rounded up to %u bits keyword too longkill a given componentksba_crl_new failed: %s ksba_crl_parse failed: %s ksba_crl_set_reader failed: %s launch a given componentldap wrapper %d readyldap wrapper %d ready: exitcode=%d ldap wrapper %d ready: timeout ldap wrapper %d stalled - killing ldap_search hit the size limit of the server let PIN-Entry grab keyboard and mouseline %d: error getting key by keygrip '%s': %s line %d: error getting signing key by keygrip '%s': %s line %d: error reading key '%s' from card: %s line %d: invalid algorithm line %d: invalid authority-key-id line %d: invalid date given line %d: invalid extension syntax line %d: invalid hash algorithm given line %d: invalid issuer name '%s' at pos %d line %d: invalid issuer name label '%.*s' line %d: invalid key length %u (valid are %d to %d) line %d: invalid serial number line %d: invalid subject name '%s' at pos %d line %d: invalid subject name label '%.*s' line %d: invalid subject-key-id line %d: key generation failed: %s <%s> line %d: no subject name given line %d: not a valid email address line shortened due to embedded Nul character line too longline too long - skipped list all available datalist all componentslist and check key signatureslist certificate chainlist external keyslist global configuration filelist key and user IDslist keyslist keys and fingerprintslist keys and signatureslist preferences (expert)list preferences (verbose)list secret keyslist the contents of the CRL cachelistening on socket '%s' load a CRL into the dirmngrloading CRL '%s' failed: %s locating CRL issuer certificate by authorityKeyIdentifier lock '%s' not made: %s looking up '%s' looking up issuer at external location looking up issuer from the Dirmngr cache lookup a certificatelookup failed: %s lookup only locally stored certificatesmake a clear text signaturemake a detached signaturemake a signaturemake timestamp conflicts only a warningmake_keysig_packet failed: %s malformed CRC malloc failed: %s marginalmarginals-needed must be greater than 1 max-cert-depth must be in the range from 1 to 255 max_replies %d exceeded menu to change or unblock the PINmissing argumentmissing argument for option "%.50s" move a backup key to a smartcardmove a key to a smartcardnNnested clear text signatures nevernever never consult a CRLnever use the PIN-entrynew CRL still too old; it expired on %s new cache dir file '%s' created next trustdb check due at %s nextUpdate not given; assuming a validity period of one day nono = sign found in group definition '%s' no CRL available for issuer id %s no CRL found for certificateno CRL issuer found in CRL: %s no authentication key for ssh on card: %s no default OCSP responder defined no default OCSP signer defined no dirmngr running in this session no gpg-agent running in this session no issuer DN in '%s' line %u no issuer found in certificateno issuer found in certificate no key usage specified - assuming all usages no keyserver known no need for a trustdb check no need for a trustdb check with '%s' trust model no need for a trustdb update with '%s' trust model no remote program execution supported no revocation keys found for "%s" no running Dirmngr - starting '%s' no running gpg-agent - starting '%s' no secret key no signature found no signed data no suitable card key found: %s no suitable certificate found to verify the OCSP response no ultimately trusted keys found no valid OpenPGP data found. no valid addressees no valid recipients given no writable keyring found: %s no writable public keyring found: %s nonenot a detached signature not an OpenPGP cardnot checking CRL fornot forcednot removing file '%s' not signed by a default OCSP signer's certificatenpth_pselect failed: %s - waiting 1s number of issuers matching: %d number of matching certificates: %d oOokay, we are the anonymous recipient. okay|okayold encoding of the DEK is not supported old style (PGP 2.x) signature old version of cache directory - cleaning up old version of cache directory - giving up only accept updates to existing keysoops: ksba_cert_hash failed: %s opening cache file '%s' operation forced to fail due to unfulfilled compliance rules option "%.50s" does not expect an argument option "%.50s" is ambiguous option "%s" ignored due to "%s" option "%s" requires a program and optional arguments option '%s' given, but no valid default keys given option '%s' given, but option '%s' not given option '%s' may not be used in %s mode option file '%s': %s original file name='%.*s' out of coreout of core out of core in secure memory while allocating %lu bytesout of core while allocating %lu bytesoverride proxy options set for dirmngroverride timeout options set for dirmngrownertrust information cleared ownertrust value missingpass a command to the dirmngrpassphrase generated with unknown digest algorithm %d permanently loaded certificates: %u permission errorpinentry.genpin.tooltippinentry.qualitybar.tooltipplease check the reason and manually delete that file please do a --check-trustdb please make sure that the "dirmngr" is properly installed please see %s for more information please use "%s%s" instead please use the option '--daemon' to run the program in the background please wait while key is being generated ... policy: %spreference '%s' duplicated premature eof (in CRC) premature eof (in trailer) premature eof (no CRC) print data out hex encodedprint message digestsprint the card statusproblem handling encrypted packet problem looking for existing certificate: %s problem re-searching certificate: %s problem reading cache key: %s problem reading cache record for S/N %s: %s problem reading cache record: %s problem removing stale temporary cache file '%s': %s problem renaming '%s' to '%s': %s problem setting the gpg-agent options problem with the agent: %s processing CRL from '%s' failed: %s prompt before overwritingprotection algorithm %d (%s) is not supported protection hash algorithm %d (%s) is not supported public and secret key created and signed. public key %s is %lu day newer than the signature public key %s is %lu days newer than the signature public key %s is %lu second newer than the signature public key %s is %lu seconds newer than the signature public key %s not found: %s public key algorithm %d (%s) is not supported public key decryption failed: %s public key encrypted data: good DEK public key is %s qQquery the software version databasequickly add a new user-idquickly generate a new key pairquickly revoke a key signaturequickly revoke a user-idquickly set a new expiration datequickly sign a keyquickly sign a key locallyquietquitquit this menuquoted printable character in armor - probably a buggy MTA has been used re-distribute this key to avoid potential algorithm mismatch problems read errorread error in '%s': %s reader to file mapping table full - waiting reading from '%s' reading options from '%s' reading public key failed: %s reading stdin ... reason for revocation: receiving line failed: %s redirection changed to '%s' refreshing %d key from %s refreshing %d keys from %s register a smartcardrejected by import screenerreload all or a given componentremove as much as possible from key after importremove as much as possible from key during exportremove keys from the public keyringremove keys from the secret keyringremove unusable parts from key after importremove unusable parts from key during exportremoved stale temporary cache file '%s' removing cache file '%s' removing stale lockfile (created by %d) renaming '%s' to '%s' failed: %s repair damage from the pks keyserver during importrepair keys on importrequesting key %s from %s requesting key from '%s' required certificate attributes missing: %s%s%sresource problem: out of core response does not contain the EC public key response does not contain the RSA modulus response does not contain the RSA public exponent response does not contain the public key data response from server too large; limit is %d bytes revocation certificate stored as '%s.rev' revocation comment: revoke key or selected subkeysrevoke selected user IDsrevoke signatures on the selected user IDsrevokedrevoked by your key %s on %s revoked: %srevoking the key signature failed: %s revoking the user ID failed: %s root certificate has expiredroot certificate has now been marked as trusted root certificate is good root certificate is not marked trustedroot certificate missingroot certificate not yet validrounded to %u bits rounded up to %u bits route all network traffic via Torrun /subst on startuprun import filters and export key immediatelyrun in daemon mode (background)run in multi server mode (foreground)run in server moderun in server mode (foreground)run in supervised moderun the Assuan server given on the command linesave and quitsearch for keys on a keyserversecret key "%s" not found secret key "%s" not found: %s secret key %s: %s secret key parts are not available seems to be not encryptedselect subkey Nselect user ID Nselected certification digest algorithm is invalid selected cipher algorithm is invalid selected compression algorithm is invalid selected digest algorithm is invalid self-signed certificate has a BAD signatureselfsigned certificate has a BAD signaturesending key %s to %s sending line failed: %s serialno missing in cert IDserver '%s' is older than us (%s < %s)server uses an invalid certificateset a notation for the selected user IDsset debugging flagsset preference list for the selected user IDsset the preferred keyserver URL for the selected user IDssetting the primary user ID failed: %s setup KDF for PIN authenticationsh-style command outputshellshow IETF standard notations during signature listingsshow IETF standard notations during signature verificationshow admin commandsshow all notations during signature listingsshow all notations during signature verificationshow expiration dates during signature listingsshow key during importshow key fingerprintshow key usage information during key listingsshow only the primary user ID in signature verificationshow policy URLs during signature listingsshow policy URLs during signature verificationshow preferencesshow preferred keyserver URLs during signature listingsshow preferred keyserver URLs during signature verificationshow revoked and expired subkeys in key listingsshow revoked and expired user IDs in key listingsshow revoked and expired user IDs in signature verificationshow selected photo IDsshow the keygripshow the keyring name in key listingsshow this helpshow user ID validity during key listingsshow user ID validity during signature verificationshow user-supplied notations during signature listingsshow user-supplied notations during signature verificationshutdown forced shutdown the dirmngrsign a keysign a key locallysign or edit a keysign selected user IDs [* see below for related commands]sign selected user IDs locallysign selected user IDs with a non-revocable signaturesign selected user IDs with a trust signaturesignal %d received - no action defined signature not created during lifetime of certificatesignature verification suppressed signatures created so far: %lu signed by your key %s on %s%s%s signing failed: %s signing subkey %s is already cross-certified signing:skipped "%s": %s skipped "%s": duplicated skipped: public key already set skipped: public key already set as default recipient skipped: secret key already present skipping block of type %d skipping v3 self-signature on user ID "%s" socket name '%s' is too long special mode for use by Squidssh handler 0x%lx for fd %d started ssh handler 0x%lx for fd %d terminated ssh keys greater than %d bits are not supported standalone revocation - use "gpg --import" to apply standalone signature of class 0x%02x start_cert_fetch failed: %s stat() failed for '%s': %s statement "%s" ignored in '%s', line %d subkeysubkey "%s" not found subkey %s does not sign and so does not need to be cross-certified subpacket of type %d has critical bit set switching to chain modelsymmetric encryption of '%s' failed: %s system error while calling external program: %s system trustlist '%s' not available textmodethe NullPIN has not yet been changed the available CRL is too oldthe given certification policy URL is invalid the given preferred keyserver URL is invalid the given signature policy URL is invalid the signature could not be verified. Please remember that the signature file (.sig or .asc) should be the first file given on the command line. the status of the certificate is unknownthere is a secret key for public key "%s"! this is a PGP generated Elgamal key which is not secure for signatures!this keythis key has already been designated as a revoker this may be caused by a missing self-signature this message may not be usable by %s this platform requires temporary files when calling external programs toggle the signature force PIN flagtoo many cipher preferences too many compression preferences too many digest preferences too many errors; giving up too many open cache files; can't open anymore too many redirections total number processed: %lu tried to revoke a non-user ID: %s trust record %lu is not of requested type %d trust record %lu, req type %d: read failed: %s trust record %lu, type %d: write failed: %s trust: %strustdb rec %lu: lseek failed: %s trustdb rec %lu: write failed (n=%d): %s trustdb transaction too large trustdb: lseek failed: %s trustdb: read failed (n=%d): %s trustdb: sync failed: %s trusted certificate '%s' loaded trustlevel adjusted to FULL due to valid PKA info trustlevel adjusted to NEVER due to bad PKA info trying to steal socket from running %s ultimateunable to display photo ID! unable to execute external program unable to execute program '%s': %s unable to execute shell '%s': %s unable to open JPEG file '%s': %s unable to read external program response: %s unable to set exec-path to %s unable to update trustdb version record: write failed: %s unable to use unknown trust model (%d) - assuming %s trust model unacceptable HTTP redirect from serverunacceptable HTTP redirect from server was cleaned upunblock the PIN using a Reset Codeuncompressed|noneundefinedunexpected armor: unexpected meta commandunknownunknown TOFU policy '%s' unknown armor header: unknown command '%s' unknown configuration item '%s' unknown critical CRL extension %s unknown debug flag '%s' ignored unknown default recipient "%s" unknown hash algorithm '%s' unknown meta commandunknown option '%s' unknown validation model '%s' unknown weak digest '%s' unnatural exit of external program unsupported TOFU database version: %s unsupported algorithm: %sunsupported curve unsupported inquiry '%s' unsupported record type in '%s' line %u skipped update all keys from a keyserverupdate failed: %s update the trust databaseupdate times of this CRL: this=%s next=%s updating the DIR file failed - cache entry will get lost with the next program start usage: %susage: %s [options] usage: %s [options] %s use OCSP instead of CRLsuse as output fileuse canonical text modeuse option "--delete-secret-keys" to delete it first. use strict OpenPGP behavioruse system's HTTP proxy settinguse the GnuPG key backup formatuse variable length input for pinpaduser ID "%s" is already revoked user ID: "%s" using "%s" as default secret key for signing using %s trust model using OCSP responder '%s' using cipher %s.%s using default OCSP responder '%s' using default PIN as %s using subkey %s instead of primary key %s valid debug levels are: %s valid values for option '%s': validate a certificatevalidate signatures with PKA datavalidation model requested by certificate: %svalidation model used: %svalidation of certificate failed: %s validity: %sverboseverification of Admin PIN is currently prohibited through this command verify CHV%d failed: %s verify a signatureverify the PIN and list all datawaiting for file '%s' to become accessible ... waiting for ldap wrapper %d failed: %s waiting for lock %s... waiting for lock (held by %d%s) %s... waiting for process %d to terminate failed: %s waiting for processes to terminate failed: %s waiting for the %s to come up ... (%ds) weak key created - retrying weird size for an encrypted session key (%d) will not run with insecure memory due to %s writing direct signature writing key binding signature writing new key writing public key to '%s' writing self signature writing to '%s' writing to stdout yYyesyou can update your preferences with: gpg --edit-key %s updpref save you cannot appoint a key as its own designated revoker you cannot use --symmetric --encrypt in %s mode you cannot use --symmetric --encrypt with --s2k-mode 0 you cannot use --symmetric --sign --encrypt in %s mode you cannot use --symmetric --sign --encrypt with --s2k-mode 0 |ADDR|connect to Assuan server at ADDR|ALGO|reject signatures made with ALGO|ALGO|use ALGO to show ssh fingerprints|AN|New Admin PIN|A|Please enter the Admin PIN|COMPONENT|change options|COMPONENT|check options|COMPONENT|list options|FD|write status info to this FD|FILE|add keyring to the list of keyrings|FILE|check new passphrases against pattern in FILE|FILE|load CRL from FILE into cache|FILE|read LDAP server list from FILE|FILE|read options from FILE|FILE|run commands from FILE on startup|FILE|take policy information from FILE|FILE|take the keys from the keyring FILE|FILE|update configuration files using FILE|FILE|use the CA certificates in FILE for HKP over TLS|FILE|write a log to FILE|FILE|write an audit log to FILE|FILE|write output to FILE|FILE|write server mode logs to FILE|FPR|OCSP response signed by FPR|HOST|use HOST for LDAP queries|LEVEL|set the debugging level to LEVEL|MECHANISMS|use MECHANISMS to locate keys by mail address|NAME|accept some commands via NAME|NAME|connect to Assuan socket NAME|NAME|encrypt to user ID NAME as well|NAME|use NAME as PC/SC driver|NAME|use NAME as ct-API driver|NAME|use NAME as default secret key|NAME|use cipher algorithm NAME|NAME|use encoding NAME for PKCS#12 passphrases|NAME|use message digest algorithm NAME|NP|Please enter a new PIN Unblocking Code (PUK) for the key to create qualified signatures.|NP|Please enter a new PIN Unblocking Code (PUK) for the standard keys.|N|Initial New PIN|N|New PIN|N|Please enter a new PIN for the key to create qualified signatures.|N|Please enter a new PIN for the standard keys.|N|connect to reader at port N|N|disconnect the card after N seconds of inactivity|N|do not return more than N items in one query|N|expire SSH keys after N seconds|N|expire cached PINs after N seconds|N|expire the passphrase after N days|N|number of certificates to include|N|require at least N non-alpha characters for a new passphrase|N|set LDAP timeout to N seconds|N|set compress level to N (0 disables)|N|set maximum PIN cache lifetime to N seconds|N|set maximum SSH key lifetime to N seconds|N|set minimal required length for new passphrases to N|N|set the Pinentry timeout to N seconds|PGM|use PGM as the PIN-Entry program|PGM|use PGM as the SCdaemon program|P|Please enter the PIN Unblocking Code (PUK) for the key to create qualified signatures.|P|Please enter the PIN Unblocking Code (PUK) for the standard keys.|RN|New Reset Code|R|Please enter the Reset Code for the card|SPEC|set up email aliases|SPEC|use this keyserver to lookup keys|URL|fetch a CRL from URL|URL|redirect all HTTP requests to URL|URL|use OCSP responder at URL|URL|use keyserver at URL|USER-ID|encrypt for USER-ID|USER-ID|use USER-ID as default secret key|USER-ID|use USER-ID to sign or decrypt|VALUE|set the TOFU policy for a key|audit-log-result|Bad|audit-log-result|Error|audit-log-result|Good|audit-log-result|No certificate|audit-log-result|Not enabled|audit-log-result|Not supported|audit-log-result|Not used|audit-log-result|Okay|audit-log-result|Skipped|audit-log-result|Some|pinentry-label|PIN:|pinentry-label|_Cancel|pinentry-label|_No|pinentry-label|_OK|pinentry-label|_Save in password manager|pinentry-label|_Yes|pinentry-tt|Hide passphrase|pinentry-tt|Make passphrase visible||Please enter the Admin PIN and New Admin PIN||Please enter the PIN||Please enter the PIN and New PIN||Please enter the PIN for the key to create qualified signatures.||Please enter the PIN for the standard keys.||Please enter your PIN at the reader's pinpad||Please unlock the cardProject-Id-Version: GNU gnupg 2.2.45 Report-Msgid-Bugs-To: translations@gnupg.org PO-Revision-Date: 2024-10-22 15:55+0200 Last-Translator: Automatically generated Language-Team: none Language: en MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Plural-Forms: nplurals=2; plural=(n != 1); Enter the user ID. End with an empty line: GnuPG needs to construct a user ID to identify your key. Pick an image to use for your photo ID. The image must be a JPEG file. Remember that the image is stored within your public key. If you use a very large picture, your key will become very large as well! Keeping the image close to 240x288 is a good size to use. Supported algorithms: You need a user ID to identify your key; the software constructs the user ID from the Real Name, Comment and Email Address in this form: “Heinrich Heine (Der Dichter) ” aka aka “%s” issuer “%s” using %s key %s imported: %lu unchanged: %lu new subkeys: %lu trusted certificates: %u (%u,%u,%u,%u) new user IDs: %lu not imported: %lu w/o user IDs: %lu “%s”: preference for cipher algorithm %s “%s”: preference for compression algorithm %s “%s”: preference for digest algorithm %s It is not certain that the signature belongs to the owner. The signature is probably a FORGERY. There is no indication that the signature belongs to the owner. This could mean that the signature is forged. new signatures: %lu “%s” Card serial no. = Key fingerprint = Subkey fingerprint: secret keys read: %lu skipped new keys: %lu user IDs cleaned: %lu Subkey fingerprint: runtime cached certificates: %u signatures cleaned: %lu skipped PGP-2 keys: %lu (%c) Finished (%c) Toggle the authenticate capability (%c) Toggle the encrypt capability (%c) Toggle the sign capability (%d) DSA (set your own capabilities) (%d) DSA (sign only) (%d) DSA and Elgamal (%d) ECC (%d) ECC and ECC (%d) Elgamal (encrypt only) (%d) Existing key (%d) Existing key from card (%d) RSA (%d) RSA (encrypt only) (%d) RSA (set your own capabilities) (%d) RSA (sign only) (%d) RSA and RSA (default) (%d) encrypt (%d) sign (%d) sign, encrypt (0) I will not answer.%s (1) I have not checked at all.%s (1) Signature key (2) Encryption key (2) I have done casual checking.%s (3) Authentication key (3) I have done very careful checking.%s issuer = new key revocations: %lu %d = I do NOT trust %d = I don't know or won't say %d = I trust fully %d = I trust marginally %d = I trust ultimately ( issuer valid from ( signature created at (%d) ECC (encrypt only) (%d) ECC (set your own capabilities) (%d) ECC (sign only) (%d) Existing key (%d) Existing key from card (certificate created at (certificate valid from SHA1 fingerprint = %s Since this binding's policy was 'auto', it has been changed to 'ask'. Unable to sign. aka “%s” m = back to the main menu q = quit s = skip this key secret keys imported: %lu subject = (%d validity count cleared) (%d validity counts cleared) (%lu signature) (%lu signatures) (end with an empty line): (main key ID %s) (non-exportable) (non-revocable) (optional; end with an empty line): (reordered signatures follow) - skipped ERROR: The CRL will not be used ERROR: The CRL will not be used because it was still too old after an update! ERROR: The CRL will not be used due to an unknown critical extension! ERROR: This cached CRL may have been tampered with! Primary key fingerprint: WARNING: invalid cache record length secret keys unchanged: %lu “%s” is not a fingerprint “%s” is not a proper fingerprint “%s” is not a proper mail address “%s” is not the primary fingerprint “%s” not a key ID: skipping “%s” was already locally signed by key %s “%s” was already signed by key %s # List of assigned trustvalues, created %s # (Use “gpg --import-ownertrust” to restore them) %d Admin PIN attempt remaining before card is permanently locked %d Admin PIN attempts remaining before card is permanently locked %d bad signature %d bad signatures %d duplicate signature removed %d duplicate signatures removed %d good signature %d good signatures %d key processed%d keys processed%d signature not checked due to a missing key %d signatures not checked due to missing keys %d signature not checked due to an error %d signatures not checked due to errors %d signature reordered %d signatures reordered %lld~day%lld~days%lld~hour%lld~hours%lld~minute%lld~minutes%lld~month%lld~months%lld~second%lld~seconds%lld~week%lld~weeks%lld~year%lld~years%lu key cached%lu keys cached%lu keys cached so far (%lu signature) %lu keys cached so far (%lu signatures) %lu keys processed so far %s “%.*s” %u-bit %s key, ID %s, created %s%s. %s%s %s stopped %s does not yet work with %s %s encrypted data %s encrypted session key %s encryption will be used %s is not compliant with %s mode %s is too old (need %s, have %s) %s key %s requires a %zu bit or larger hash (hash is %s) %s key %s uses an unsafe (%zu bit) hash %s key uses an unsafe (%u bit) hash %s keys may be between %u and %u bits long. %s keysizes must be in the range %u-%u %s makes no sense with %s! %s not allowed with %s! %s signature, digest algorithm %s%s%s %s.%s encrypted data %s/%s signature from: “%s” %s/%s signature using %s key %s %s/%s.%s encrypted for: “%s” %s: There is limited assurance this key belongs to the named user %s: There is no assurance this key belongs to the named user %s: This key is bad! It has been marked as untrusted! %s: Verified 0 signatures.%s: Verified 0~signatures and encrypted 0~messages.%s: directory does not exist! %s: error reading free record: %s %s: error reading version record: %s %s: error updating version record: %s %s: error writing dir record: %s %s: error writing version record: %s %s: failed to append a record: %s %s: failed to create hashtable: %s %s: failed to create version record: %s%s: failed to zero a record: %s %s: invalid file version %d %s: invalid trustdb %s: invalid trustdb created %s: keyring created %s: not a trustdb file %s: skipped: %s %s: skipped: public key already present %s: skipped: public key is disabled %s: trustdb created %s: unknown suffix %s: version record with recnum %lu %s:%d: deprecated option “%s” %s:%d: invalid auto-key-locate list %s:%d: invalid export options %s:%d: invalid import options %s:%d: invalid keyserver options %s:%d: invalid list options %s:%d: invalid verify options %s:%u: “%s” is obsolete in this file - it only has effect in %s %s:%u: garbage at end of line ignored %s:%u: ignoring unknown flag ‘%s’ %s:%u: invalid fingerprint detected %s:%u: line too long - skipped %s:%u: obsolete option “%s” - it has no effect %s:%u: password given without user %s:%u: read error: %s %s:%u: skipping this line %sNumber: %s%%0AHolder: %s%%0ACounter: %lu%s%sNumber: %s%%0AHolder: %s%s‘%s’ already compressed ‘%s’ does not appear to be a valid key ID, fingerprint or keygrip ‘%s’ is an invalid LDAP URL ‘%s’ is not a JPEG file ‘%s’ is not a valid character set ‘%s’ is not a valid expiration time ‘%s’ is not a valid long keyID ‘%s’ is not a valid signature expiration ‘%s’ is not an LDAP URL ‘%s’ matches multiple secret keys: (G)ood, (A)ccept once, (U)nknown, (R)eject once, (B)ad? (No description given) (Probably you want to select %d here) (This is a sensitive revocation key) (Use the ‘%s’ command.) (check argument of option '%s') (deadlock?) (further info: (policy: %s)(reported error: %s <%s>) (reported error: %s) (sensitive)(this does not seem to be an encrypted message) (this is the MD2 algorithm) (this is the RC2 algorithm) (unless you specify the key by fingerprint) (use “help” to list choices) * The ‘sign’ command may be prefixed with an ‘l’ for local signatures (lsign), a ‘t’ for trust signatures (tsign), an ‘nr’ for non-revocable signatures (nrsign), or any combination thereof (ltsign, tnrsign, etc.). , key algorithm --output doesn't work for this command 10 translator see trust.c:uid_trust_string_fixed22 translator: see certreg-ui.c:gpgsm_gencertreq_tty@ (See the “info” manual for a complete listing of all commands and options) @ (See the man page for a complete listing of all commands and options) @ Examples: -se -r Bob [file] sign and encrypt for user Bob --clear-sign [file] make a clear text signature --detach-sign [file] make a detached signature --list-keys [names] show keys --fingerprint [names] show fingerprints @ Options: @Commands: @Options: A key for “%s” already exists A passphrase may not be a known term or match%%0Acertain pattern.A passphrase should be at least %u character long.A passphrase should be at least %u characters long.A passphrase should contain at least %u digit or%%0Aspecial character.A passphrase should contain at least %u digits or%%0Aspecial characters.A revocation certificate is a kind of “kill switch” to publicly declare that a key shall not anymore be used. It is not possible to retract such a revocation certificate once it has been published.AEAD: ASCII armored output forced. About to create a key for: “%s” Admin PINAdmin commands are allowed Admin commands are not allowed Admin-only command AllowAn ssh process requested the use of key%%0A %s%%0A (%s)%%0ADo you want to allow this?Are you sure that you want to sign this key with your key “%s” (%s) Are you sure you still want to add it? (y/N) Are you sure you still want to revoke it? (y/N) Are you sure you still want to sign it? (y/N) Are you sure you want to appoint this key as a designated revoker? (y/N) Are you sure you want to change the expiration time for multiple subkeys? (y/N) Are you sure you want to delete it? (y/N) Are you sure you want to replace it? (y/N) Are you sure you want to use it? (y/N) Assuan accept problem: %s Assuan processing failed: %s AuthenticateAuthentication key Available keys: BAD signature from “%s”Bad PINBad PassphraseBegin CRL dump (retrieved via %s) CA fingerprint: CRC error; %06lX - %06lX CRL access not possible due to Tor mode CRL access not possible due to disabled %s CRL checking too deeply nested CRL signature verification failed: %s CRL/OCSP check of certificatesCan't check signature: %s Can't open '%s': %s CancelCannot revoke the last valid user ID. Caps Lock is onCardholder's given name: Cardholder's surname: Certificate chain availableCertificate chain validCertificates leading to an ultimately trusted key: CertifyChange (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? Change (N)ame, (C)omment, (E)mail or (Q)uit? Change (N)ame, (E)mail, or (O)kay/(Q)uit? Change (N)ame, (E)mail, or (Q)uit? Change passphraseChanging card key attribute for: Changing expiration time for a subkey. Changing expiration time for the primary key. Changing usage of a subkey. Changing usage of the primary key. Cipher: Command expects a filename argument Comment: Component not foundComponent not suitable for launchingCompression: Configuration file of component %s is broken Configuration for HTTP serversConfiguration for KeyserversConfiguration for OCSPConfiguration of LDAP servers to useContinue? (Y/n) Continue? (y/N) Control-D detected CorrectCreate a designated revocation certificate for this key? (y/N) Create a revocation certificate for this key? (y/N) Create a revocation certificate for this signature? (y/N) Create anyway? (y/N) Create self-signed certificate? (y/N) Critical preferred keyserver: Critical signature notation: Critical signature policy: Current allowed actions: Current recipients: DNS is not properly configuredDSA requires the hash length to be a multiple of 8 bits Data availableData decryption succeededData encryption succeededData signing succeededData verification succeededDefaulting to unknown. Delete keyDelete this good signature? (y/N/q)Delete this invalid signature? (y/N/q)Delete this key from the keyring? (y/N) Delete this unknown signature? (y/N/q)Deleted %d signature. Deleted %d signatures. DenyDetached signature. Did you specify the fingerprint of a subkey? Digest: Dirmngr usableDisplaying %s photo ID of size %ld for key %s (uid %d) Do you really want to delete the key identified by keygrip%%0A %s%%0A %%C%%0A?Do you really want to delete the selected keys? (y/N) Do you really want to delete this key? (y/N) Do you really want to make your passphrase visible on the screen?Do you really want to permanently delete the OpenPGP secret key:Do you really want to permanently delete the OpenPGP secret subkey key:Do you really want to revoke the entire key? (y/N) Do you really want to revoke the selected subkeys? (y/N) Do you really want to revoke this subkey? (y/N) Do you really want to set this key to ultimate trust? (y/N) Do you ultimately trust%%0A “%s”%%0Ato correctly certify user certificates?Do you want to issue a new signature to replace the expired one? (y/N) Do you want to promote it to a full exportable signature? (y/N) Do you want to promote it to an OpenPGP self-signature? (y/N) Do you want to sign it again anyway? (y/N) Do you want your signature to expire at the same time? (Y/n) ECDSA public key is expected to be in SEC encoding multiple of 8 bits Email address: EncryptEncrypted %d message in the future.Encrypted %d messages in the future.Encrypted %d message.Encrypted %d messages.Encrypted 0 messages.Encryption algorithm supportedEncryption key End CRL dump Enter DNS namesEnter JPEG filename for photo ID: Enter URIsEnter an optional description; end it with an empty line: Enter email addressesEnter new filenameEnter new passphraseEnter number(s), N)ext, or Q)uit > Enter passphrase Enter passphrase: Enter the X.509 subject name: Enter the fingerprint of the additional decryption subkey: Enter the keygrip: Enter the notation: Enter the user ID of the designated revoker: Enter your preferred keyserver URL: Error - Error reading backup key from '%s': %s Error: Combined name too long (limit is %d characters). Error: Double spaces are not allowed. Error: Only plain ASCII is currently allowed. Error: The “<” character may not be used. Error: The trustdb is corrupted. Error: invalid characters in preference string. Error: invalid formatted fingerprint. Error: invalid length of preference string. Error: invalid response. Expired signature from “%s”External verification of component %s failedFeatures: File ‘%s’ exists. GPG_TTY has not been set - using maybe bogus default Go ahead and type your message ... Good signature fromGood signature from “%s”Gpg-Agent usableHash: Hint: If this message was created before the year 2003 it is likely that this message is legitimate. This is because back then integrity protection was not widely used. Hint: Select the user IDs to sign How carefully have you verified the key you are about to sign actually belongs to the person named above? If you don't know what to answer, enter “0”. How much do you trust that this key actually belongs to the named user? I have checked this key casually. I have checked this key very carefully. I have not checked this key at all. I'll change it laterIDEA cipher unavailable, optimistically attempting to use %s instead If that does not work, please consult the manual Included certificatesInvalid character in comment Invalid character in name Invalid characters in PINInvalid command (try “help”) Invalid key %s made valid by --allow-non-selfsigned-uid Invalid selection. Invalid subject name ‘%s’ Invalid subject name label ‘%.*s’ Invalid user ID '%s': %s Is this correct? (y/N) Is this okay? (y/N) Is this photo correct (y/N/q)? It is NOT certain that the key belongs to the person named in the user ID. If you *really* know what you are doing, you may answer the next question with yes. KEYTOCARD failed: %s Key %s is already revoked. Key available at: Key does not expire at all Key expires at %s Key generation canceled. Key generation failed: %s Key has been compromisedKey has only stub or on-card key items - no passphrase to change. Key is no longer usedKey is revoked.Key is supersededKey is valid for? (0) Key not changed so no update needed. KeyringKeyserver no-modifyLanguage preferences: Login data (account name): Make off-card backup of encryption key? (Y/n) Messages encrypted in the past: %d.Messages encrypted over the past %d day: %d.Messages encrypted over the past %d days: %d.Messages encrypted over the past %d month: %d.Messages encrypted over the past %d months: %d.Messages encrypted over the past %d year: %d.Messages encrypted over the past %d years: %d.Messages verified in the past: %d.Messages verified over the past %d day: %d.Messages verified over the past %d days: %d.Messages verified over the past %d month: %d.Messages verified over the past %d months: %d.Messages verified over the past %d year: %d.Messages verified over the past %d years: %d.Mr.Ms.Name may not start with a digit Name must be at least 5 characters long Need one component argumentNeed the secret key to do this. NetworkNetwork related optionsNnCcEeOoQqNoNo argument allowedNo audit log entries.No fingerprintNo help availableNo help available for ‘%s’No help available for '%s'.No key with this keygrip No matching user IDs.No reason specifiedNo subject name given No subkey with index %d No subkey with key ID '%s'. No such user ID. No trust value assigned to: No user ID with hash %s No user ID with index %d Not a valid email address Not a valid keygrip (expecting 40 hex digits) Not signed by you. Notations: Note that group specifications are ignored Note that this key cannot be used for encryption. You may want to use the command “--edit-key” to generate a subkey for this purpose. Note, that this software is not officially approved to create or verify such signatures. Note: %s Note: %s is not for normal use! Note: ‘%s’ is not considered an option Note: ADSK key has been used for decryptionNote: Only the secret part of the shown primary key will be deleted. Note: Only the secret part of the shown subkey will be deleted. Note: Only the shown public subkey will be deleted. Note: Outdated servers may lack important security fixes. Note: PIN has not yet been enabled.Note: Request from a remote site.Note: Request from the web browser.Note: Signer's address ‘%s’ does not match DNS entry Note: The blanks are not part of the passphrase.Note: The key has been created with one or more ADSK! Note: The public primary key and all its subkeys will be deleted. Note: There is no guarantee that the card supports the requested size. If the key generation does not succeed, please check the documentation of your card to see what sizes are allowed. Note: This command destroys all keys stored on the card! Note: This key has been disabled. Note: This key has expired! Note: This passphrase has never been changed.%0APlease change it now.Note: Use “%s %s” for a full featured key generation dialog. Note: Use ‘%s’ to make use of this info Note: Use the command “%s” to restart them. Note: Use the command “%s%s” to get details. Note: Verified signer's address is ‘%s’ Note: backup of card key saved to ‘%s’ Note: creating subkeys for v3 keys is not OpenPGP compliant Note: ignoring option “--%s” due to global config Note: key %s has no %s feature Note: key %s has no preference for %s Note: key has been revokedNote: keys are already stored on the card! Note: no default option file ‘%s’ Note: non-critical certificate policy not allowedNote: secret key %s expired at %s Note: sender requested “for-your-eyes-only” Note: signature key %s expired %s Note: signature key %s has been revoked Note: signatures using the %s algorithm are rejected Note: simple S2K mode (0) is strongly discouraged Note: the local copy of the secret key will only be deleted with “save”. Note: third-party key signatures using the %s algorithm are rejected Note: trustdb not writable Note: ultimately trusted key %s expired Note: ultimately trusted key %s not found Note: won't be able to encrypt to '%s': %s Nothing deleted. Nothing to sign with key %s Nothing to sign. Now creating certificate request. Now creating self-signed certificate. Number of recipientsOCSP request not possible due to Tor mode OCSP request not possible due to disabled HTTP OCSP responder at ‘%s’ status: %s OCSP responder returned a non-current status OCSP responder returned a status in the future OCSP responder returned an too old status OpenPGPOpenPGP card no. %s detected OpenPGP card not available: %s Options controlling key import and exportOptions controlling key listingsOptions controlling the PIN-EntryOptions controlling the configurationOptions controlling the diagnostic outputOptions controlling the inputOptions controlling the outputOptions controlling the securityOptions enforcing a passphrase policyOptions for unattended useOptions to specify keysOptions used for startupOther optionsOverwrite? (y/N) Owner trust may not be set while using a user provided trust database PIN callback returned error: %s PIN for CHV%d is too short; minimum length is %d PIN not correctly repeated; try againPIN too longPIN too shortPIN:PUKPUK not correctly repeated; try againParsing data succeededPassphrase EntryPassphrase Not AllowedPassphrase too longPassphrase:Please correct the error first Please decide how far you trust this user to correctly verify other users' keys (by looking at passports, checking fingerprints from different sources, etc.) Please don't put the email address into the real name or the comment Please enter a domain to restrict this signature, or enter for none. Please enter a passphrase to protect the received secret key%%0A %s%%0A %s%%0Awithin gpg-agent's key storagePlease enter name of data file: Please enter the PIN%s%s%s to unlock the cardPlease enter the depth of this trust signature. A depth greater than 1 allows the key you are signing to make trust signatures on your behalf. Please enter the new passphrasePlease enter the passphrase for decryption.Please enter the passphrase for the ssh key%%0A %F%%0A (%c)Please enter the passphrase or the PIN needed to complete this operation.Please enter the passphrase to export the OpenPGP secret key:Please enter the passphrase to export the OpenPGP secret subkey:Please enter the passphrase to import the OpenPGP secret key:Please enter the passphrase to protect the imported object within the %s system.Please enter the passphrase to protect the imported object within the GnuPG system.Please enter the passphrase to protect the new PKCS#12 object.Please enter the passphrase to unlock the OpenPGP secret key:Please enter the passphrase to unlock the secret key for the X.509 certificate: “%s” S/N %s, ID 0x%08lX, created %s, expires %s. Please enter the passphrase to unprotect the PKCS#12 object.Please enter the passphrase to%0Aprotect your new keyPlease enter your PIN, so that the secret key can be unlocked for this sessionPlease enter your passphrase, so that the secret key can be unlocked for this sessionPlease indicate whether this email address should be associated with key %s or whether you think someone is impersonating “%s”.Please insert the card with serial numberPlease note that the factory settings of the PINs are PIN = ‘%s’ Admin PIN = ‘%s’ You should change them using the command --change-pin Please note that the shown key validity is not necessarily correct unless you restart the program. Please re-enter this passphrasePlease remove the current card and insert the one with serial numberPlease report bugs to <@EMAIL@>. Please select exactly one user ID. Please select the reason for the revocation: Please select the type of key to generate: Please select what kind of key you want: Please select where to store the key: Please select which elliptic curve you want: Please specify how long the key should be valid. 0 = key does not expire = key expires in n days w = key expires in n weeks m = key expires in n months y = key expires in n years Please specify how long the signature should be valid. 0 = signature does not expire = signature expires in n days w = signature expires in n weeks m = signature expires in n months y = signature expires in n years Please verify that the certificate identified as:%%0A “%s”%%0Ahas the fingerprint:%%0A %sPossible actions for a %s key: Possible actions for a %s key: Preferred keyserver: Primary key fingerprint:Private DO data: Private KeysProceed? (y/N) Pubkey: Public key is disabled. Push ACK button on card/token.Quality:Quit without saving? (y/N) RSA modulus missing or not of size %d bits RSA prime %s missing or not of size %d bits RSA public exponent missing or larger than %d bits Ready. Ready. You should now send this request to your CA. Real name: Really create the revocation certificates? (y/N) Really create? (y/N) Really delete this self-signature? (y/N)Really do a factory reset? (enter “yes”) Really move the primary key? (y/N) Really remove all selected user IDs? (y/N) Really remove this user ID? (y/N) Really revoke all selected user IDs? (y/N) Really revoke this user ID? (y/N) Really sign all text user IDs? (y/N) Really sign all user IDs? (y/N) Really sign? (y/N) Really update the preferences for the selected user IDs? (y/N) Really update the preferences? (y/N) Reason for revocation: %s Recipient %dRemaining attempts: %dRepeat this PINRepeat this PUKRepeat this Reset CodeRepeat:Replace existing key? (y/N) Replace existing keys? (y/N) Requested keysize is %u bits Reset CodeReset Code is too short; minimum length is %d Reset Code not correctly repeated; try againReset Code not or not anymore available Revocation certificate created. Revocation certificate created. Please move it to a medium which you can hide away; if Mallory gets access to this certificate he can use it to make your key unusable. It is smart to print this certificate and store it away, just in case your media become unreadable. But have some caution: The print system of your machine might store the data and make it available to others! Root certificate trustworthyS/MIMES/N %s is not valid; reason=%02X date=%.15s S/N %s is valid, it is not listed in the CRL SETERROR %s (try %d of %d)SIGHUP received - re-reading configuration and flushing caches SIGINT received - immediate shutdown SIGTERM received - shutting down ... SIGTERM received - still %d active connections SIGUSR2 received - no action defined Salutation (M = Mr., F = Ms., or space): Save changes? (y/N) Secret key is available. Secret key is not available. Secret parts of primary key are not available. Secret parts of primary key are stored on-card. Secret subkeys are available. Serial number of the card: %s Session key createdSet preference list to: SignSign it? (y/N) Signature %dSignature availableSignature does not expire at all Signature expired %s Signature expires %s Signature expires at %s Signature is valid for? (%s) Signature key Signature made Signature made %s Signature made %s using %s key ID %s Signature notation: Signature policy: Signer %dSkipping user ID “%s”, which is not a text ID. SmartcardsSorry, no terminal at all requested - can't get input Sorry, we are in batchmode - can't get input SsEeAaQqStatistics for keys with the email address “%s”: Subkey %s is already revoked. Such a user ID already exists on this key! SuggestSyntax: @DIRMNGR@ [options] [command [args]] Keyserver, CRL, and OCSP access for @GNUPG@ Syntax: @GPG@ [options] [files] Sign, check, encrypt or decrypt Default operation depends on the input data Syntax: @GPG@-connect-agent [options] Connect to a running agent and send commands Syntax: @GPGCONF@ [options] Manage configuration options for tools of the @GNUPG@ system Syntax: @GPGSM@ [options] [files] Sign, check, encrypt or decrypt using the S/MIME protocol Default operation depends on the input data Syntax: @GPG_AGENT@ [options] [command [args]] Secret key management for @GNUPG@ Syntax: dirmngr-client [options] [certfile|pattern] Test an X.509 certificate against a CRL or do an OCSP check The process returns 0 if the certificate is valid, 1 if it is not valid and other error codes for general failures Syntax: gpg-check-pattern [options] patternfile Check a passphrase given on stdin against the patternfile Syntax: gpg-preset-passphrase [options] KEYGRIP Password cache maintenance Syntax: gpg-protect-tool [options] [args] Secret key maintenance tool Syntax: gpgv [options] [files] Check signatures against known trusted keys Syntax: kbxutil [options] [files] List, export, import Keybox data Syntax: scdaemon [options] [command [args]] Smartcard daemon for @GNUPG@ TOFU DB errorTOFU db corruption detected. TOFU detected a binding conflictTake this one anywayThe card will now be re-configured to generate a key of %u bits The card will now be re-configured to generate a key of type: %s The characters ‘%s’ and ‘%s’ may not appear in name The email address “%s” is associated with %d key!The email address “%s” is associated with %d keys!The email address “%s” is associated with %d key: The email address “%s” is associated with %d keys: The following key was revoked on %s by %s key %s The minimum trust level for this key is: %s The self-signature on “%s” is a PGP 2.x-style signature. The signature will be marked as non-exportable. The signature will be marked as non-revocable. There are no preferences on a PGP 2.x-style user ID. These parameters are used: This JPEG is really large (%d bytes) ! This command is not allowed while in %s mode. This command is not supported by this card This command is only available for version 2 cards This is a qualified signature This is a revocation certificate for the OpenPGP key:This is a secret key! - really delete? (y/N) This is the first time the email address “%s” is being used with key %s.This key (or subkey) is not protected with a passphrase. Please enter a new passphrase to export it.This key belongs to us This key has been disabledThis key has expired!This key is bad! It has been marked as untrusted! If you *really* know what you are doing, you may answer the next question with yes. This key is due to expire on %s. This key may be revoked by %s key %sThis key probably belongs to the named user This key's user IDs: This may take a while ... This passphrase has not been changed%%0Asince %.4s-%.2s-%.2s. Please change it now.This signature expired on %s. This will be a self-signature. To avoid an accidental use of this file, a colon has been inserted before the 5 dashes below. Remove this colon with a text editor before importing and publishing this revocation certificate.To be revoked by: To complete this certificate request please enter the passphrase for the key you just created once more. To migrate '%s', with each smartcard, run: %s Tor is not properly configuredTor is not runningTotal number processed: %lu URL ‘%s’ redirected to ‘%s’ (%u) URL to retrieve public key: UncompressedUnknown critical signature notation: Unknown operationUnknown signature type ‘%s’ Usage: @DIRMNGR@ [options] (-h for help)Usage: @GPG@ [options] [files] (-h for help)Usage: @GPG@-connect-agent [options] (-h for help)Usage: @GPGCONF@ [options] (-h for help)Usage: @GPGSM@ [options] [files] (-h for help)Usage: @GPG_AGENT@ [options] (-h for help)Usage: @SCDAEMON@ [options] (-h for help)Usage: dirmngr-client [options] [certfile|pattern] (-h for help) Usage: gpg-check-pattern [options] patternfile (-h for help) Usage: gpg-preset-passphrase [options] KEYGRIP (-h for help) Usage: gpg-protect-tool [options] (-h for help) Usage: gpgv [options] [files] (-h for help)Usage: kbxutil [options] [files] (-h for help)Use it to revoke this key in case of a compromise or loss of the secret key. However, if the secret key is still accessible, it is better to generate a new revocation certificate and give a reason for the revocation. For details see the description of of the gpg command “--generate-revocation” in the GnuPG manual.Use the option ‘%s’ to decrypt anyway. Use the reader's pinpad for input.Use this key anyway? (y/N) User ID “%s” compacted: %s User ID “%s” is expired.User ID “%s” is not self-signed.User ID “%s” is revoked.User ID “%s” is signable. User ID “%s”: %d signature removed User ID “%s”: %d signatures removed User ID “%s”: already clean User ID “%s”: already minimized User ID is no longer validVerified %d message in the future.Verified %d messages in the future.Verified %d message.Verified %d messages.WARNING: “%s” is a deprecated command - do not use it WARNING: “%s” is a deprecated option WARNING: “%s%s” is an obsolete option - it has no effect WARNING: “%s%s” is an obsolete option - it has no effect except on %s WARNING: %s WARNING: %s overrides %s WARNING: ‘%s’ is an empty file WARNING: Elgamal sign+encrypt keys are deprecated WARNING: Encrypting to %s, which has no non-revoked user ids WARNING: This is a PGP 2.x-style key. Adding a designated revoker may cause some versions of PGP to reject this key. WARNING: This is a PGP2-style key. Adding a photo ID may cause some versions of PGP to reject this key. WARNING: This key has been revoked by its designated revoker! WARNING: This key has been revoked by its owner! WARNING: This key is not certified with a trusted signature! WARNING: This key is not certified with sufficiently trusted signatures! WARNING: This key is not suitable for signing in %s mode WARNING: This subkey has been revoked by its owner! WARNING: Using untrusted key! WARNING: We do NOT trust this key! WARNING: Your encryption subkey expires soon. WARNING: a user ID signature is dated %d seconds in the future WARNING: appointing a key as a designated revoker cannot be undone! WARNING: cipher algorithm %s not found in recipient preferences WARNING: creation time of signature not known - assuming current timeWARNING: digest algorithm %s is deprecated WARNING: encrypted message has been manipulated! WARNING: forcing compression algorithm %s (%d) violates recipient preferences WARNING: forcing digest algorithm %s (%d) violates recipient preferences WARNING: forcing symmetric cipher %s (%d) violates recipient preferences WARNING: invalid cache file hash in ‘%s’ line %u WARNING: invalid cache record length for S/N WARNING: invalid notation data found WARNING: key %s contains preferences for unavailable algorithms on these user IDs: WARNING: key %s is not suitable for encryption in %s mode WARNING: key %s may be revoked: fetching revocation key %s WARNING: key %s may be revoked: revocation key %s not present. WARNING: message was encrypted with a weak key in the symmetric cipher. WARNING: message was not integrity protected WARNING: multiple plaintexts seen WARNING: multiple signatures detected. Only the first will be checked. WARNING: new CRL still too old; it expired on %s - loading anyway WARNING: no command supplied. Trying to guess what you mean ... WARNING: no user ID has been marked as primary. This command may cause a different user ID to become the assumed primary. WARNING: not a detached signature; file ‘%s’ was NOT verified! WARNING: nothing exported WARNING: potentially insecure symmetrically encrypted session key WARNING: program may create a core file! WARNING: recipients (-r) given without using public key encryption WARNING: running with faked system time: WARNING: signature digest conflict in message WARNING: signing subkey %s has an invalid cross-certification WARNING: signing subkey %s is not cross-certified WARNING: some OpenPGP programs can't handle a DSA key with this digest size WARNING: the signature will not be marked as non-exportable. WARNING: the signature will not be marked as non-revocable. WARNING: this key might be revoked (revocation key not present) WARNING: unable to %%-expand notation (too large). Using unexpanded. WARNING: unable to %%-expand policy URL (too large). Using unexpanded. WARNING: unable to %%-expand preferred keyserver URL (too large). Using unexpanded. WARNING: unable to fetch URI %s: %s WARNING: unable to refresh key %s via %s: %s WARNING: unable to remove temp directory '%s': %s WARNING: unable to remove tempfile (%s) '%s': %s WARNING: unsafe enclosing directory ownership on configuration file ‘%s’ WARNING: unsafe enclosing directory ownership on extension ‘%s’ WARNING: unsafe enclosing directory ownership on homedir ‘%s’ WARNING: unsafe enclosing directory permissions on configuration file ‘%s’ WARNING: unsafe enclosing directory permissions on extension ‘%s’ WARNING: unsafe enclosing directory permissions on homedir ‘%s’ WARNING: unsafe ownership on configuration file ‘%s’ WARNING: unsafe ownership on extension ‘%s’ WARNING: unsafe ownership on homedir ‘%s’ WARNING: unsafe permissions on configuration file ‘%s’ WARNING: unsafe permissions on extension ‘%s’ WARNING: unsafe permissions on homedir ‘%s’ WARNING: using experimental cipher algorithm %s WARNING: using experimental digest algorithm %s WARNING: using experimental public key algorithm %s WKD uses a cached resultWarning: %lu key skipped due to its large size Warning: %lu keys skipped due to their large sizes Warning: This key is also listed for use with SSH! Deleting the key might remove your ability to access remote machines.Warning: You have entered an insecure passphrase.Warning: errors found and only checked self-signatures, run ‘%s’ to check all signatures. Warning: if you think you've seen more signatures by this key and user id, then this key might be a forgery! Carefully examine the email address for small variations. If the key is suspect, then use %s to mark it as being bad. Warning: if you think you've seen more signatures by this key and these user ids, then this key might be a forgery! Carefully examine the email addresses for small variations. If the key is suspect, then use %s to mark it as being bad. Warning: not using ‘%s’ as default key: %s Warning: unsafe ownership on %s “%s” Warning: unsafe permissions on %s “%s” Warning: we have yet to see a message signed using this key and user id! Warning: we've only seen one message signed using this key and user id! Warning: you have only encrypted one message to this key! Warning: you have yet to encrypt a message to this key! We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. What keysize do you want for the subkey? (%u) What keysize do you want? (%u) WrongYesYes, protection is not neededYou are about to create a signature using your certificate: “%s” Note, that this certificate will NOT create a qualified signature!You are about to create a signature using your certificate: “%s” This will create a qualified signature by law equated to a handwritten signature. %s%sAre you really sure that you want to do this?You are about to revoke these signatures: You are using the ‘%s’ character set. You can't change the expiration date of a v3 key You can't delete the last user ID! You did not specify a user ID. (you may use “-r”) You have not entered a passphrase - this is in general a bad idea!%0APlease confirm that you do not want to have any protection on your key.You have not entered a passphrase!%0AAn empty passphrase is not allowed.You have signed these user IDs on key %s: You may not add a designated revoker to a PGP 2.x-style key. You may not add a photo ID to a PGP2-style key. You may try to re-create the trustdb using the commands: You may want to change its expiration date too. You must select at least one key. You must select at least one user ID. You must select exactly one key. You selected this USER-ID: “%s” Your current signature on “%s” has expired. Your current signature on “%s” is a local signature. Your decision? Your selection? Your selection? (enter ‘?’ for more information): Your system can't display dates beyond 2038. However, it will be correctly handled up to 2106. [ full ][ never ][ undef ][ expired][ not human readable (%zu bytes: %s%s) ][ revoked][ unknown][Error - No name][Error - invalid DN][Error - invalid encoding][Error - out of core][User ID not found][date not given][marginal][none][not set][revocation][self-signature][ultimate][uncertain]a %u bit hash is not valid for a %u bit %s key a %zu bit hash is not valid for a %u bit %s key a dirmngr daemon is up and running a gpg-agent is already running - not starting a new one a notation name may not contain an ‘=’ character a notation name must have only printable characters or spaces a notation name must have only printable characters or spaces, and end with an ‘=’ a notation name must not contain more than one ‘@’ character a notation value must not use any control characters a user notation name must contain the ‘@’ character absolute file name expected accepting root CA not marked as a CAaccess to admin commands is not configured activate changes at runtime, if possibleadd a certificate to the cacheadd a key to a smartcardadd a photo IDadd a revocation keyadd a subkeyadd a user IDadd an additional decryption subkeyadd new servers discovered in CRL distribution points to serverlistadding ‘%s:%d’ to the ldap server list algorithm:algorithm: %sall values passed to ‘%s’ ignored allocating list item failed: %s allow online software version checkallow passphrase to be prompted through Emacsallow presetting passphraseallow sending OCSP requestsambiguous option ‘%s’ anonymous recipient; trying secret key %s ... apply global default valuesargument not expectedarmor header: armor: %s assuan_inquire failed: %s assuan_inquire(%s) failed: %s assume input is in PEM formatassume input is in base-64 formatassume input is in binary formatassume no on most questionsassume the GnuPG key backup formatassume yes on most questionsassuming %s encrypted data assuming bad signature from key %s due to an unknown critical bit assuming signed data in ‘%s’ attr hash algorithm: %sautomatically retrieve keys when verifying signaturesautomatically retrieved ‘%s’ via %s available CRL for issuer ID %s can't be used bad URL encoding detected bad data hash algorithm: %sbad data signature from key %s: %s (0x%02x, 0x%x) bad fingerprint in '%s', line %d bad key signature from key %s: %s (0x%02x, 0x%x) basic certificate checks failed - not imported batch mode: never askbe somewhat more quietbinarybuild_packet failed: %s cCcached CRL for issuer id %s tampered; we need to update cached CRL for issuer id %s too old; update required caching keyring ‘%s’ caller did not return the issuing certificate caller did not return the target certificate calling unlock_db_file on a closed file calling unlock_db_file on an unlocked file can't access %s - invalid OpenPGP card? can't access '%s': %s can't acquire read lock on the certificate cache: %s can't acquire write lock on the certificate cache: %s can't allocate control structure: %s can't check signature with unsupported message-digest algorithm %d: %s. can't check signature with unsupported public-key algorithm (%d): %s. can't connect to '%s': %s can't connect to the dirmngr: %s can't create '%s': %s can't create backup file '%s': %s can't create directory '%s': %s can't create lock for ‘%s’ can't create socket: %s can't disable core dumps: %s can't do this in batch mode can't do this in batch mode without “--yes” can't encrypt to ‘%s’ can't get authorityInfoAccess: %s can't handle public key algorithm %d can't handle text lines longer than %d characters can't handle this ambiguous signature data can't hash '%s': %s can't initialize certificate cache lock: %s can't lock ‘%s’ can't open ‘%s’ can't open '%s': %s can't open fd %d: %s can't open signed data ‘%s’ can't open signed data fd=%d: %s can't parse certificate '%s': %s can't release lock on the certificate cache: %s can't set permissions of '%s': %s can't sign using '%s': %s can't use ‘%s’ as home directory can't use a SKESK packet due to the S2K mode cancelled cancelled by user cancel|cancelcannot appoint a PGP 2.x style key as a designated revoker cannot avoid weak key for symmetric cipher; tried %d times! cannot revoke the last valid user ID. card does not support digest algorithm %s card is permanently locked! card-no: certificate ‘%s’ already cached certificate ‘%s’ deleted certificate ‘%s’ loaded certificate ‘%s’ not found: %s certificate already cached certificate cached certificate chain is good certificate chain longer than allowed by CA (%d)certificate chain too long certificate check failed: %s certificate has a BAD signaturecertificate has been revokedcertificate has been revoked certificate has been revoked at: %s due to: %s certificate has expiredcertificate is good certificate is not usable for encryption certificate is not usable for signing certificate is valid certificate not created during lifetime of issuercertificate not yet validcertificate policy not allowedcertificate search not possible due to disabled %s certificate should not have been used for CRL signing certificate should not have been used for OCSP response signing certificate should not have been used for certification certificate should not have been used for encryption certificate should not have been used for signing certificate status is: %s (this=%s next=%s) certificate too large to make any sense certificate with invalid validitycertificate with invalid validity: %schainchange URL to retrieve keychange a CA fingerprintchange a card's PINchange a passphrasechange card holder's namechange card holder's salutationchange data on a cardchange the expiration date for the key or selected subkeyschange the key attributechange the language preferenceschange the login namechange the ownertrustchange the passphrasecheck all programscheck global configuration filecheck signaturescheck validity using OCSPcheck whether a dirmngr is runningchecking CRL forchecking created signature failed: %s checking for a fresh copy of an expired key via %s checking for qualified certificate failed: %s checking the CRL failed: %schecking the trust list failed: %s checking the trustdb checking trustworthiness of root certificate failed: %s cipher algorithm %d%s is unknown or disabled cipher algorithm ‘%s’ may not be used in %s mode colon missingcolons are not allowed in the socket name command “%.50s” is ambiguous compact unusable user IDs and remove all signatures from keycompact unusable user IDs and remove unusable signatures from keycompletes-needed must be greater than 0 compression algorithm ‘%s’ may not be used in %s mode conflicting commands connect to the dirmngrconnection to %s established connection to agent is in restricted mode conversion from ‘%s’ to ‘%s’ failed: %s conversion from ‘%s’ to ‘%s’ not available converting S-expression failed: %s could not parse keyserver URL create ascii armored outputcreate base-64 encoded outputcreated: %screating S-expression failed: %s creating anyway creating cache file ‘%s’ creating directory ‘%s’ creation timestamp missing critical certificate extension %s is not supportedcritical marked policy without configured policiescrl_cache_insert via DP failed: %s crl_cache_insert via issuer failed: %s crl_fetch via DP failed: %s crl_parse_insert failed: %s csh-style command outputdata hash algorithm: %sdata not saved; use option “--output” to save it dearmoring failed: %s decode received data linesdecrypt data (default)decryption failed: %s decryption forced to fail! decryption okay delete selected subkeysdelete selected user IDsdelete signatures from the selected user IDsdeleting certificate “%s” failed: %s deleting copy of secret key failed: %s deleting keyblock failed: %s deleting secret %s failed: %s deny the use of admin card commandsdepth: %d valid: %3d signed: %3d trust: %d-, %dq, %dn, %dm, %df, %du destroy all keys and datadetected card with S/N: %s detected errors in cache dir file digest algorithm ‘%s’ may not be used in %s mode directory ‘%s’ created dirmngr cache-only key lookup failed: %s disable all access to the dirmngrdisable keydisableddisallow caller to override the pinentrydisallow clients to mark keys as “trusted”disallow the use of an external password cachedisplay photo IDs during key listingsdisplay photo IDs during signature verificationdo not allow bypassing the passphrase policydo not allow the reuse of old passphrasesdo not check CRLs for root certificatesdo not check certificate policiesdo not clear the ownertrust values during importdo not detach from the consoledo not make any changesdo not update the trustdb after importdo not use a reader's pinpaddo not use extended connect modedo not use fallback hosts with --ldap-proxydo not use the PIN cache when signingdo not use the SCdaemondo not use the internal CCID driverdoes not match - try againdon't use the terminal at alldropping %u certificates from the cache duplicate entry detected in ‘%s’ line %u duplicated certificate ‘%s’ deleted elevate the trust of signatures with valid PKA dataenable full debuggingenable keyenable putty supportenable ssh supportenarmoring failed: %s encrypt dataencrypted to %s key %s encrypted with %lu passphrases encrypted with %s key, ID %s encrypted with %u-bit %s key, ID %s, created %s encrypted with 1 passphrase encrypted with unknown algorithm %d encryption only with symmetric ciphererror accessing '%s': http status %u error allocating enough memory: %s error allocating memory: %s error beginning transaction on TOFU database: %s error binding socket to '%s': %s error building OCSP request: %s error caching certificate: %s error changing TOFU policy: %s error changing key attribute for key %d: %s error checking validity of CRL issuer certificate: %s error closing ‘%s’ error closing '%s': %s error closing cache file: %s error closing new cache dir file '%s': %s error closing temporary cache file '%s': %s error committing transaction on TOFU database: %s error connecting to '%s': %s error creating '%s': %s error creating a pipe: %s error creating a stream for a pipe: %s error creating directory '%s': %s error creating keybox '%s': %s error creating keyring '%s': %s error creating new cache dir file '%s': %s error creating passphrase: %s error creating temporary cache file '%s': %s error creating temporary file: %s error determining TOFU database's version: %s error fetching certificate by S/N: %s error fetching certificate by subject: %s error finding trust record in '%s': %s error finding writable keyDB: %s error finishing temporary cache file '%s': %s error for setup KDF: %s error forking process: %s error gathering other user IDs: %s error gathering signature stats: %s error getting CRL item: %s error getting OCSP status for target certificate: %s error getting authorityKeyIdentifier: %s error getting card info: %s error getting current key info: %s error getting data from cache file: %s error getting exit code of process %d: %s error getting key usage information: %s error getting list of cards: %s error getting new PIN: %s error getting nonce for the socket error getting responder ID: %s error getting serial number of card: %s error getting stored flags: %s error getting update times of CRL: %s error getting version from '%s': %s error hashing '%s': %s error importing certificate: %s error in '%s': %s error in trailer line error initializing TOFU database: %s error initializing cache file ‘%s’ for reading: %s error initializing reader object: %s error inserting item into temporary cache file: %s error loading certificate '%s': %s error locking keybox: %s error opening '%s': %s error opening TOFU database '%s': %s error opening TOFU database: %s error opening cache file '%s': %s error opening key DB: %s error parsing ‘%s’ error parsing OCSP response for '%s': %s error parsing key specification '%s': %s error parsing value for option '%s': %s error printing log line: %s error reading '%s', line %d: %s error reading '%s': %s error reading CRL extensions: %s error reading HTTP response for '%s': %s error reading TOFU database: %s error reading application data error reading cache entry from db: %s error reading certificate from '%s': %s error reading certificate from stdin: %s error reading directory '%s': %s error reading fingerprint DO error reading from responder: %s error reading input: %s error reading keyblock: %s error reading list of trusted root certificates error reading log from ldap wrapper %d: %s error reading nonce on fd %d: %s error reading the card: %s error renaming ‘%s’ to '%s': %s error retrieving ‘%s’ via %s: %s error retrieving '%s': %s error retrieving CHV status from card error rolling back transaction on TOFU database: %s error running '%s': exit status %d error running '%s': probably not installed error running '%s': terminated error searching the keyring: %s error sending data: %s error sending standard options: %s error setting OCSP target: %s error setting up MD5 hash context: %s error storing certificate error storing certificate: %s error storing flags: %s error updating TOFU database: %s error while asking for the passphrase: %s error writing '%s': %s error writing base64 encoding: %s error writing keyring '%s': %s error writing new cache dir file '%s': %s error writing public keyring '%s': %s error writing to '%s': %s error writing to pipe: %s existing key will be replaced expect an URL for --lookupexpect certificates in PEM formatexpiredexpired: %sexpires: %sexport as ssh key failed: %s export attribute user IDs (generally photo IDs)export certificatesexport keysexport keys to a keyserverexport only revocation certificatesexport revocation keys marked as “sensitive”export signatures that are marked as local-onlyexporting secret keys not allowed external program calls are disabled due to unsafe options file permissions extra field detected in crl record of ‘%s’ line %u failed to acquire the pinentry lock: %s failed to allocate OCSP context: %s failed to allocate assuan context: %s failed to allocate keyDB handle failed to create a new cache object: %s failed to create stream from socket: %s failed to create temporary cache dir file '%s': %s failed to create temporary file '%s': %s failed to establish a hashing context for OCSP: %s failed to get the fingerprint failed to initialize the TrustDB: %s failed to initialize the server: %s failed to open '%s': %s failed to open cache dir file '%s': %s failed to proxy %s inquiry to client failed to re-open cache dir file '%s': %s failed to rebuild keyring cache: %s failed to store the creation date: %s failed to store the fingerprint: %s failed to store the key: %s failed to the register commands with Assuan: %s failed to use default PIN as %s: %s - disabling further default use fetch missing issuer certificatesfetch the key specified in the card URLfetch_cert_by_url failed: %s fetch_next_cert failed: %s fetching CRL from ‘%s’ failed: %s file '%s', line %d: %s fingerprint on card does not match requested one fingerprint=%s first record of ‘%s’ is not the version flag the selected user ID as primaryflush the cacheforce loading of outdated CRLsforce the use of the default OCSP responderforce-crl-refresh active and %d minutes passed for issuer id %s; update required force-crl-refresh active for issuer id %s; update required forcedfound another possible matching CA certificate - trying againfstat of ‘%s’ failed in %s: %s fstat(%d) failed in %s: %s fullfull featured key pair generationgGaAuUrRbBgcry_md_open failed: %s gcry_md_open for algorithm %d failed: %s generate a new key pairgenerate a revocation certificategenerate new keysgenerating key failed generating new key get the configuration directories for @GPGCONF@goodgot an invalid S-expression from libksba got status: ‘%s’ gpg/card> handler 0x%lx for fd %d started handler 0x%lx for fd %d terminated handler for fd %d started handler for fd %d terminated hash algorithm %d (%s) for signer %d not supported; using %s hash algorithm used for signer %d: %s (%s) hashing the OCSP response for ‘%s’ failed: %s honor the PKA record set on a key when retrieving keyshonor the preferred keyserver URL set on the keyiImMqQsSiconv_open failed: %s ignore HTTP CRL distribution pointsignore LDAP CRL distribution pointsignore certificate contained OCSP service URLsignore key-signatures which are not self-signaturesignore requests to change the TTYignore requests to change the X displayignoring database dir ‘%s’ ignoring garbage lineimport certificatesimport keys from a keyserverimport missing key from a signatureimport signatures that are marked as local-onlyimport/merge keysimporting common certificates ‘%s’ importing secret keys not allowed include revoked keys in search resultsinclude subkeys when searching by key IDinclude the public key in signaturesinhibit the use of HTTPinhibit the use of LDAPinput line %u too long or missing LF input line longer than %d characters interactive marking as trusted disabled for this session interactive marking as trusted not enabled in gpg-agent intermediate certificate has expiredintermediate certificate is good intermediate certificate not created during lifetime of issuerintermediate certificate not yet validinvalidinvalid S2K mode; must be 0, 1 or 3 invalid SHA1 fingerprint string ‘%s’ invalid alias definitioninvalid argumentinvalid argument for option “%.50s” invalid armor header: invalid armor: line longer than %d characters invalid auto-key-locate list invalid canonical S-expression found invalid char 0x%02x in host name - not added invalid clearsig header invalid commandinvalid command “%.50s” invalid command (there is no implicit command) invalid country code in '%s', line %d invalid dash escaped line: invalid debug-level ‘%s’ given invalid default preferences invalid default-cert-level; must be 0, 1, 2, or 3 invalid export options invalid filter option: %s invalid fingerprintinvalid formatted checksum for ‘%s’ invalid formatted fingerprint in '%s', line %d invalid hash algorithm ‘%s’ invalid import options invalid issuer hash in ‘%s’ line %u invalid item ‘%s’ in preference string invalid keyflag in '%s', line %d invalid keyserver options invalid keyserver protocol (us %d!=handler %d) invalid line detected in ‘%s’ line %u invalid list options invalid meta commandinvalid min-cert-level; must be 1, 2, or 3 invalid optioninvalid option “%.50s” invalid personal cipher preferences invalid personal compress preferences invalid personal digest preferences invalid pinentry mode ‘%s’ invalid radix64 character %02X skipped invalid radix64 character %02x skipped invalid request origin ‘%s’ invalid signature: message digest attribute does not match computed one invalid structure of OpenPGP card (DO 0x93) invalid timestamp in ‘%s’ line %u invalid value invalid value for option ‘%s’ invalid verify options invoke gpg-protect-toolissuer certificate is not marked as a CAissuer certificate not foundissuer certificate not found: %s it is strongly suggested that you update your preferences and keykey “%s” is already on this keyblock key “%s” not found key “%s” not found on keyserver key “%s” not found: %s key %s has no user IDs key %s is not suitable for decryption in %s mode key %s marked as ultimately trusted key %s may not be used for signing in %s mode key %s occurs more than once in the trustdb key %s was created %lu day in the future (time warp or clock problem) key %s was created %lu days in the future (time warp or clock problem) key %s was created %lu second in the future (time warp or clock problem) key %s was created %lu seconds in the future (time warp or clock problem) key %s: key %s: “%s” %d new signatures key %s: “%s” %d new subkeys key %s: “%s” %d new user IDs key %s: “%s” %d signature cleaned key %s: “%s” %d signatures cleaned key %s: “%s” %d user ID cleaned key %s: “%s” %d user IDs cleaned key %s: “%s” 1 new signature key %s: “%s” 1 new subkey key %s: “%s” 1 new user ID key %s: “%s” not changed key %s: “%s” revocation certificate added key %s: “%s” revocation certificate imported key %s: %s key %s: PGP 2.x style key - skipped key %s: PKS subkey corruption repaired key %s: accepted as trusted key key %s: accepted non self-signed user ID “%s” key %s: can't locate original keyblock: %s key %s: can't read original keyblock: %s key %s: card reference is overridden by key material key %s: direct key signature added key %s: doesn't match our copy key %s: duplicated user ID detected - merged key %s: error changing passphrase: %s key %s: error sending to agent: %s key %s: invalid direct key signature key %s: invalid revocation certificate: %s - rejected key %s: invalid revocation certificate: %s - skipped key %s: invalid self-signature on user ID “%s” key %s: invalid subkey binding key %s: invalid subkey revocation key %s: key material on-card - skipped key %s: new key - skipped key %s: no public key - can't apply revocation certificate key %s: no public key for trusted key - skipped key %s: no subkey for key binding key %s: no subkey for key revocation key %s: no subkey for subkey binding signature key %s: no subkey for subkey revocation signature key %s: no user ID key %s: no user ID for signature key %s: no valid user IDs key %s: non exportable signature (class 0x%02X) - skipped key %s: public key “%s” imported key %s: public key not found: %s key %s: removed multiple subkey binding key %s: removed multiple subkey revocation key %s: revocation certificate at wrong place - skipped key %s: secret key already exists key %s: secret key imported key %s: secret key with invalid cipher %d - skipped key %s: skipped subkey key %s: skipped user ID “%s” key %s: subkey signature in wrong place - skipped key %s: unexpected signature class (0x%02X) - skipped key %s: unsupported public key algorithm key %s: unsupported public key algorithm on user ID “%s” key already exists key export failed: %s key generation completed (%d second) key generation completed (%d seconds) key has been created %lu second in future (time warp or clock problem) key has been created %lu seconds in future (time warp or clock problem) key is not flagged as insecure - can't use it with the faked RNG! key not found on keyserver key operation not possible: %s keyblock resource '%s': %s keybox ‘%s’ created keyring ‘%s’ created keyserver option “%s” may not be used in %s mode keyserver receive failed: %s keyserver refresh failed: %s keyserver search failed: %s keyserver send failed: %s keysize invalid; using %u bits keysize rounded up to %u bits keyword too longkill a given componentksba_crl_new failed: %s ksba_crl_parse failed: %s ksba_crl_set_reader failed: %s launch a given componentldap wrapper %d readyldap wrapper %d ready: exitcode=%d ldap wrapper %d ready: timeout ldap wrapper %d stalled - killing ldap_search hit the size limit of the server let PIN-Entry grab keyboard and mouseline %d: error getting key by keygrip '%s': %s line %d: error getting signing key by keygrip '%s': %s line %d: error reading key ‘%s’ from card: %s line %d: invalid algorithm line %d: invalid authority-key-id line %d: invalid date given line %d: invalid extension syntax line %d: invalid hash algorithm given line %d: invalid issuer name ‘%s’ at pos %d line %d: invalid issuer name label ‘%.*s’ line %d: invalid key length %u (valid are %d to %d) line %d: invalid serial number line %d: invalid subject name ‘%s’ at pos %d line %d: invalid subject name label ‘%.*s’ line %d: invalid subject-key-id line %d: key generation failed: %s <%s> line %d: no subject name given line %d: not a valid email address line shortened due to embedded Nul character line too longline too long - skipped list all available datalist all componentslist and check key signatureslist certificate chainlist external keyslist global configuration filelist key and user IDslist keyslist keys and fingerprintslist keys and signatureslist preferences (expert)list preferences (verbose)list secret keyslist the contents of the CRL cachelistening on socket ‘%s’ load a CRL into the dirmngrloading CRL ‘%s’ failed: %s locating CRL issuer certificate by authorityKeyIdentifier lock ‘%s’ not made: %s looking up ‘%s’ looking up issuer at external location looking up issuer from the Dirmngr cache lookup a certificatelookup failed: %s lookup only locally stored certificatesmake a clear text signaturemake a detached signaturemake a signaturemake timestamp conflicts only a warningmake_keysig_packet failed: %s malformed CRC malloc failed: %s marginalmarginals-needed must be greater than 1 max-cert-depth must be in the range from 1 to 255 max_replies %d exceeded menu to change or unblock the PINmissing argumentmissing argument for option “%.50s” move a backup key to a smartcardmove a key to a smartcardnNnested clear text signatures nevernever never consult a CRLnever use the PIN-entrynew CRL still too old; it expired on %s new cache dir file ‘%s’ created next trustdb check due at %s nextUpdate not given; assuming a validity period of one day nono = sign found in group definition ‘%s’ no CRL available for issuer id %s no CRL found for certificateno CRL issuer found in CRL: %s no authentication key for ssh on card: %s no default OCSP responder defined no default OCSP signer defined no dirmngr running in this session no gpg-agent running in this session no issuer DN in ‘%s’ line %u no issuer found in certificateno issuer found in certificate no key usage specified - assuming all usages no keyserver known no need for a trustdb check no need for a trustdb check with ‘%s’ trust model no need for a trustdb update with ‘%s’ trust model no remote program execution supported no revocation keys found for “%s” no running Dirmngr - starting ‘%s’ no running gpg-agent - starting ‘%s’ no secret key no signature found no signed data no suitable card key found: %s no suitable certificate found to verify the OCSP response no ultimately trusted keys found no valid OpenPGP data found. no valid addressees no valid recipients given no writable keyring found: %s no writable public keyring found: %s nonenot a detached signature not an OpenPGP cardnot checking CRL fornot forcednot removing file ‘%s’ not signed by a default OCSP signer's certificatenpth_pselect failed: %s - waiting 1s number of issuers matching: %d number of matching certificates: %d oOokay, we are the anonymous recipient. okay|okayold encoding of the DEK is not supported old style (PGP 2.x) signature old version of cache directory - cleaning up old version of cache directory - giving up only accept updates to existing keysoops: ksba_cert_hash failed: %s opening cache file ‘%s’ operation forced to fail due to unfulfilled compliance rules option “%.50s” does not expect an argument option “%.50s” is ambiguous option “%s” ignored due to “%s” option “%s” requires a program and optional arguments option ‘%s’ given, but no valid default keys given option ‘%s’ given, but option ‘%s’ not given option ‘%s’ may not be used in %s mode option file '%s': %s original file name='%.*s' out of coreout of core out of core in secure memory while allocating %lu bytesout of core while allocating %lu bytesoverride proxy options set for dirmngroverride timeout options set for dirmngrownertrust information cleared ownertrust value missingpass a command to the dirmngrpassphrase generated with unknown digest algorithm %d permanently loaded certificates: %u permission errorpinentry.genpin.tooltippinentry.qualitybar.tooltipplease check the reason and manually delete that file please do a --check-trustdb please make sure that the “dirmngr” is properly installed please see %s for more information please use “%s%s” instead please use the option ‘--daemon’ to run the program in the background please wait while key is being generated ... policy: %spreference ‘%s’ duplicated premature eof (in CRC) premature eof (in trailer) premature eof (no CRC) print data out hex encodedprint message digestsprint the card statusproblem handling encrypted packet problem looking for existing certificate: %s problem re-searching certificate: %s problem reading cache key: %s problem reading cache record for S/N %s: %s problem reading cache record: %s problem removing stale temporary cache file '%s': %s problem renaming ‘%s’ to '%s': %s problem setting the gpg-agent options problem with the agent: %s processing CRL from ‘%s’ failed: %s prompt before overwritingprotection algorithm %d (%s) is not supported protection hash algorithm %d (%s) is not supported public and secret key created and signed. public key %s is %lu day newer than the signature public key %s is %lu days newer than the signature public key %s is %lu second newer than the signature public key %s is %lu seconds newer than the signature public key %s not found: %s public key algorithm %d (%s) is not supported public key decryption failed: %s public key encrypted data: good DEK public key is %s qQquery the software version databasequickly add a new user-idquickly generate a new key pairquickly revoke a key signaturequickly revoke a user-idquickly set a new expiration datequickly sign a keyquickly sign a key locallyquietquitquit this menuquoted printable character in armor - probably a buggy MTA has been used re-distribute this key to avoid potential algorithm mismatch problems read errorread error in '%s': %s reader to file mapping table full - waiting reading from ‘%s’ reading options from ‘%s’ reading public key failed: %s reading stdin ... reason for revocation: receiving line failed: %s redirection changed to ‘%s’ refreshing %d key from %s refreshing %d keys from %s register a smartcardrejected by import screenerreload all or a given componentremove as much as possible from key after importremove as much as possible from key during exportremove keys from the public keyringremove keys from the secret keyringremove unusable parts from key after importremove unusable parts from key during exportremoved stale temporary cache file ‘%s’ removing cache file ‘%s’ removing stale lockfile (created by %d) renaming ‘%s’ to ‘%s’ failed: %s repair damage from the pks keyserver during importrepair keys on importrequesting key %s from %s requesting key from ‘%s’ required certificate attributes missing: %s%s%sresource problem: out of core response does not contain the EC public key response does not contain the RSA modulus response does not contain the RSA public exponent response does not contain the public key data response from server too large; limit is %d bytes revocation certificate stored as ‘%s.rev’ revocation comment: revoke key or selected subkeysrevoke selected user IDsrevoke signatures on the selected user IDsrevokedrevoked by your key %s on %s revoked: %srevoking the key signature failed: %s revoking the user ID failed: %s root certificate has expiredroot certificate has now been marked as trusted root certificate is good root certificate is not marked trustedroot certificate missingroot certificate not yet validrounded to %u bits rounded up to %u bits route all network traffic via Torrun /subst on startuprun import filters and export key immediatelyrun in daemon mode (background)run in multi server mode (foreground)run in server moderun in server mode (foreground)run in supervised moderun the Assuan server given on the command linesave and quitsearch for keys on a keyserversecret key “%s” not found secret key “%s” not found: %s secret key %s: %s secret key parts are not available seems to be not encryptedselect subkey Nselect user ID Nselected certification digest algorithm is invalid selected cipher algorithm is invalid selected compression algorithm is invalid selected digest algorithm is invalid self-signed certificate has a BAD signatureselfsigned certificate has a BAD signaturesending key %s to %s sending line failed: %s serialno missing in cert IDserver ‘%s’ is older than us (%s < %s)server uses an invalid certificateset a notation for the selected user IDsset debugging flagsset preference list for the selected user IDsset the preferred keyserver URL for the selected user IDssetting the primary user ID failed: %s setup KDF for PIN authenticationsh-style command outputshellshow IETF standard notations during signature listingsshow IETF standard notations during signature verificationshow admin commandsshow all notations during signature listingsshow all notations during signature verificationshow expiration dates during signature listingsshow key during importshow key fingerprintshow key usage information during key listingsshow only the primary user ID in signature verificationshow policy URLs during signature listingsshow policy URLs during signature verificationshow preferencesshow preferred keyserver URLs during signature listingsshow preferred keyserver URLs during signature verificationshow revoked and expired subkeys in key listingsshow revoked and expired user IDs in key listingsshow revoked and expired user IDs in signature verificationshow selected photo IDsshow the keygripshow the keyring name in key listingsshow this helpshow user ID validity during key listingsshow user ID validity during signature verificationshow user-supplied notations during signature listingsshow user-supplied notations during signature verificationshutdown forced shutdown the dirmngrsign a keysign a key locallysign or edit a keysign selected user IDs [* see below for related commands]sign selected user IDs locallysign selected user IDs with a non-revocable signaturesign selected user IDs with a trust signaturesignal %d received - no action defined signature not created during lifetime of certificatesignature verification suppressed signatures created so far: %lu signed by your key %s on %s%s%s signing failed: %s signing subkey %s is already cross-certified signing:skipped “%s”: %s skipped “%s”: duplicated skipped: public key already set skipped: public key already set as default recipient skipped: secret key already present skipping block of type %d skipping v3 self-signature on user ID “%s” socket name ‘%s’ is too long special mode for use by Squidssh handler 0x%lx for fd %d started ssh handler 0x%lx for fd %d terminated ssh keys greater than %d bits are not supported standalone revocation - use “gpg --import” to apply standalone signature of class 0x%02x start_cert_fetch failed: %s stat() failed for '%s': %s statement “%s” ignored in '%s', line %d subkeysubkey “%s” not found subkey %s does not sign and so does not need to be cross-certified subpacket of type %d has critical bit set switching to chain modelsymmetric encryption of ‘%s’ failed: %s system error while calling external program: %s system trustlist ‘%s’ not available textmodethe NullPIN has not yet been changed the available CRL is too oldthe given certification policy URL is invalid the given preferred keyserver URL is invalid the given signature policy URL is invalid the signature could not be verified. Please remember that the signature file (.sig or .asc) should be the first file given on the command line. the status of the certificate is unknownthere is a secret key for public key “%s”! this is a PGP generated Elgamal key which is not secure for signatures!this keythis key has already been designated as a revoker this may be caused by a missing self-signature this message may not be usable by %s this platform requires temporary files when calling external programs toggle the signature force PIN flagtoo many cipher preferences too many compression preferences too many digest preferences too many errors; giving up too many open cache files; can't open anymore too many redirections total number processed: %lu tried to revoke a non-user ID: %s trust record %lu is not of requested type %d trust record %lu, req type %d: read failed: %s trust record %lu, type %d: write failed: %s trust: %strustdb rec %lu: lseek failed: %s trustdb rec %lu: write failed (n=%d): %s trustdb transaction too large trustdb: lseek failed: %s trustdb: read failed (n=%d): %s trustdb: sync failed: %s trusted certificate ‘%s’ loaded trustlevel adjusted to FULL due to valid PKA info trustlevel adjusted to NEVER due to bad PKA info trying to steal socket from running %s ultimateunable to display photo ID! unable to execute external program unable to execute program '%s': %s unable to execute shell '%s': %s unable to open JPEG file '%s': %s unable to read external program response: %s unable to set exec-path to %s unable to update trustdb version record: write failed: %s unable to use unknown trust model (%d) - assuming %s trust model unacceptable HTTP redirect from serverunacceptable HTTP redirect from server was cleaned upunblock the PIN using a Reset Codeuncompressed|noneundefinedunexpected armor: unexpected meta commandunknownunknown TOFU policy ‘%s’ unknown armor header: unknown command ‘%s’ unknown configuration item ‘%s’ unknown critical CRL extension %s unknown debug flag ‘%s’ ignored unknown default recipient “%s” unknown hash algorithm ‘%s’ unknown meta commandunknown option ‘%s’ unknown validation model ‘%s’ unknown weak digest ‘%s’ unnatural exit of external program unsupported TOFU database version: %s unsupported algorithm: %sunsupported curve unsupported inquiry ‘%s’ unsupported record type in ‘%s’ line %u skipped update all keys from a keyserverupdate failed: %s update the trust databaseupdate times of this CRL: this=%s next=%s updating the DIR file failed - cache entry will get lost with the next program start usage: %susage: %s [options] usage: %s [options] %s use OCSP instead of CRLsuse as output fileuse canonical text modeuse option “--delete-secret-keys” to delete it first. use strict OpenPGP behavioruse system's HTTP proxy settinguse the GnuPG key backup formatuse variable length input for pinpaduser ID “%s” is already revoked user ID: “%s” using “%s” as default secret key for signing using %s trust model using OCSP responder ‘%s’ using cipher %s.%s using default OCSP responder ‘%s’ using default PIN as %s using subkey %s instead of primary key %s valid debug levels are: %s valid values for option '%s': validate a certificatevalidate signatures with PKA datavalidation model requested by certificate: %svalidation model used: %svalidation of certificate failed: %s validity: %sverboseverification of Admin PIN is currently prohibited through this command verify CHV%d failed: %s verify a signatureverify the PIN and list all datawaiting for file ‘%s’ to become accessible ... waiting for ldap wrapper %d failed: %s waiting for lock %s... waiting for lock (held by %d%s) %s... waiting for process %d to terminate failed: %s waiting for processes to terminate failed: %s waiting for the %s to come up ... (%ds) weak key created - retrying weird size for an encrypted session key (%d) will not run with insecure memory due to %s writing direct signature writing key binding signature writing new key writing public key to ‘%s’ writing self signature writing to ‘%s’ writing to stdout yYyesyou can update your preferences with: gpg --edit-key %s updpref save you cannot appoint a key as its own designated revoker you cannot use --symmetric --encrypt in %s mode you cannot use --symmetric --encrypt with --s2k-mode 0 you cannot use --symmetric --sign --encrypt in %s mode you cannot use --symmetric --sign --encrypt with --s2k-mode 0 |ADDR|connect to Assuan server at ADDR|ALGO|reject signatures made with ALGO|ALGO|use ALGO to show ssh fingerprints|AN|New Admin PIN|A|Please enter the Admin PIN|COMPONENT|change options|COMPONENT|check options|COMPONENT|list options|FD|write status info to this FD|FILE|add keyring to the list of keyrings|FILE|check new passphrases against pattern in FILE|FILE|load CRL from FILE into cache|FILE|read LDAP server list from FILE|FILE|read options from FILE|FILE|run commands from FILE on startup|FILE|take policy information from FILE|FILE|take the keys from the keyring FILE|FILE|update configuration files using FILE|FILE|use the CA certificates in FILE for HKP over TLS|FILE|write a log to FILE|FILE|write an audit log to FILE|FILE|write output to FILE|FILE|write server mode logs to FILE|FPR|OCSP response signed by FPR|HOST|use HOST for LDAP queries|LEVEL|set the debugging level to LEVEL|MECHANISMS|use MECHANISMS to locate keys by mail address|NAME|accept some commands via NAME|NAME|connect to Assuan socket NAME|NAME|encrypt to user ID NAME as well|NAME|use NAME as PC/SC driver|NAME|use NAME as ct-API driver|NAME|use NAME as default secret key|NAME|use cipher algorithm NAME|NAME|use encoding NAME for PKCS#12 passphrases|NAME|use message digest algorithm NAME|NP|Please enter a new PIN Unblocking Code (PUK) for the key to create qualified signatures.|NP|Please enter a new PIN Unblocking Code (PUK) for the standard keys.|N|Initial New PIN|N|New PIN|N|Please enter a new PIN for the key to create qualified signatures.|N|Please enter a new PIN for the standard keys.|N|connect to reader at port N|N|disconnect the card after N seconds of inactivity|N|do not return more than N items in one query|N|expire SSH keys after N seconds|N|expire cached PINs after N seconds|N|expire the passphrase after N days|N|number of certificates to include|N|require at least N non-alpha characters for a new passphrase|N|set LDAP timeout to N seconds|N|set compress level to N (0 disables)|N|set maximum PIN cache lifetime to N seconds|N|set maximum SSH key lifetime to N seconds|N|set minimal required length for new passphrases to N|N|set the Pinentry timeout to N seconds|PGM|use PGM as the PIN-Entry program|PGM|use PGM as the SCdaemon program|P|Please enter the PIN Unblocking Code (PUK) for the key to create qualified signatures.|P|Please enter the PIN Unblocking Code (PUK) for the standard keys.|RN|New Reset Code|R|Please enter the Reset Code for the card|SPEC|set up email aliases|SPEC|use this keyserver to lookup keys|URL|fetch a CRL from URL|URL|redirect all HTTP requests to URL|URL|use OCSP responder at URL|URL|use keyserver at URL|USER-ID|encrypt for USER-ID|USER-ID|use USER-ID as default secret key|USER-ID|use USER-ID to sign or decrypt|VALUE|set the TOFU policy for a key|audit-log-result|Bad|audit-log-result|Error|audit-log-result|Good|audit-log-result|No certificate|audit-log-result|Not enabled|audit-log-result|Not supported|audit-log-result|Not used|audit-log-result|Okay|audit-log-result|Skipped|audit-log-result|Some|pinentry-label|PIN:|pinentry-label|_Cancel|pinentry-label|_No|pinentry-label|_OK|pinentry-label|_Save in password manager|pinentry-label|_Yes|pinentry-tt|Hide passphrase|pinentry-tt|Make passphrase visible||Please enter the Admin PIN and New Admin PIN||Please enter the PIN||Please enter the PIN and New PIN||Please enter the PIN for the key to create qualified signatures.||Please enter the PIN for the standard keys.||Please enter your PIN at the reader's pinpad||Please unlock the card