b,<6hH-iH#H)H%H II1I0I J;JK$K@KZKwKKKDK.LIBL8LLLLM3M"LMoM#MMMM$N&*N,QN~NNNNNO O2OHO]OwOOO OO%OO P!P5P RP+`P#P-P%PZQH_Q QQQ(Q.R3LR"R)RRRR SS:S LSmSSSSS)STT-TFT\T|TTTTTT"U%+U&QU!xU%U"U#U'V /VPVmVVVVVV(V$$WIW^W#rW#W4WWXX9XNXbXxX'XXXXYY'Y">YaYY-Y(Y0YHZ aZ k[ x[[+\A\/(]0X]\]1]^C-^)q^-^0^.^)_>_X_s_3_4_-_#`.`. a ;a Ea:Oa!a*a1a b#"b&Fb"mb&bbbb<b08c'icc0c'c6 d@Ad=ddddde#e 6e/WeeXfHrf,ffg g8!g#Zg~g"ggEPhh9,i;fiiii;i$6j[jojjkkkl-lClVlflxl%llSlm m3m<m":n%]n,n%n2n o(*o So to*ooooo p,pJpdp pp"q*[$Є7rGm1(=ZI4#6=Z1%HY)tH2A%\' ˉ!̊h*W&1#ې2>2q #0DMu)Ò"&37fk%ғD5=s_   1=%V|X5+: N(\#1 !,He6֙ޙ  +9Ofh~Ś+!+'M(u%2ě'2CXu"Ĝ#/<B(A&Ho-%ٞ(+(Tj1ן "3J\k ؠ?-%m  ˡ3$ =E% ¢1'Mu&&ף -"J%m$ɤۤ  +<[s !ɥD+0/\Ѧ%% $/T es.'3Jgw'֨, //3cԩ'#/1S%.,ڪ&".0Q982"(!Km>3ʬ%$$;`;~'#$>(c;+Ȯ$39m$,ʯ<4GLHBݰ" CYi0;ٱ2HJO eo!Ų߲ !;.Jy(),޳  ,:YwzŴմ%7%]  ̵ ڵ#'&.)U<۶ ,,Yn;u>G,8ejڸ"-,K+x*Ϲ!$62K3~5ǺI`w##ܻ+,!;]%zм׼ &#J#c%%ս==9w %   $B[ n{&"ҿ $V> 5$4,%a *$&I .U*:@+{EH/6*f&,(CI-^/,") 6U pI 9K[z3K[k )1GZ6r(# 7KS5f1BUknDrED?BACF% l ' ""1#T$x/'7$Mr#!#40X71-)!K+..ZSZ?[@y/CD.s') ))G-q% "&&F!m #%"4D`} )%A"S!v4-))9gcF)<Y+m25+6.*e#&+<,T ) &'B,j,0;2l3.1-4'b2.  $$I&g1:/L"b)<"?Ym, "  3K%g/-1AMR L;:8is7 ?6)v-,-)=#X,|?A6+b42RE+7 4A'v+0/.+ZtC4,K4k,D=0P'$ )<Af&K84K h;u.+ PHN(!w %F&'Nb{""7"Nq 5 [y.,A[R00!6R2971.0` 7&+0\2z! /% ,"dO$D.e%@5p18=11K)}44  (" K j :z  0 8 -9 &g  G %  ' = /[   # 9  7!-/O=NG4_79#**E"p6-/2b*Y/%!6'O?wHDNW_G121Dd+95ZE(;o>uO1.6(e& ( .%'(&?P&1&4&9&1'!'B(ZH(3(,(-)E2)x) )~*@,,,l,k-- -- --+-"-b.>~..$..5/1E/w/~//#/8// 0(0(:0&c030*0000 11,1@1 T1)b1 11"11 1"1+"29N2>222:29537o3B3134;4 X41y4!474 5#&51J5+|555X5:6!W6y6%666E667V7p77D7&728548j858$8A8979+=9i99$999$9:::&:-:5:$N:$s:::A:5;>;E;\;r;$;@;(;K<2e<'<.<,<=&7=0^=:=%=+=0>0M>~>>+>>2>'?0F0rF7F)FDGCJG1G0G3G?%HCeH7H-H(I)8IObIMI=J*>J3iJ&J@J:K@K5ZK+K0K1KHL0hL'L/L:L%,M$RM+wM>MOM2N[QN[NZ O-dOOO*O1OP)PJzPNPQQ'QCQ>bQ,Q&Q QR'6R^RsR*yRR7R*R2S0KS-|SS*SS S.T7T*;T*fTT$T"T%TU%/U,UU,UUU UUV,V3?VsV{V(V.VV@V;WUW.rW5W!WW;XDt,Vt0tt8t6 u7Cu,{u@u2uIv4fvv'v7v#w7?w"www4w )0dP*8@YC"DW!$|X f1K*82M[b;/[g*p.5?ZrR-wT&( R,dhmVN5g!  K9}#iu JYS|g:\+Xst3kj-X DfY$< 3yH]-nK#sOXCW`kIUGmuQ&}fpM7q 8E  #AcjW3'c&Jbn|?N]qx5V"=% UJ,_ N$djle<hcbPU!Hv@v@+A+DuG}E,aW"3Q; \1 \z^9:TG#Ca'$ MiIa7zq/>2:w^k~2z'A@LHDFLM:.[~F.oZ S R)>pQ6 (% I_ZB l<9hVU1IGn0=t4_~;Y{bQC'yBFA5=2S`BEo?OP{Hwr{6,4=o(*%+ tsK\7ae)"8TO^>F_i1`?xeV L<!4(Z[6/0 .y;/-rET>&^L740]9P]NxOl)vB`6RJSm% Enter the user ID. End with an empty line: I have checked this key casually. I have checked this key very carefully. I have not checked this key at all. Not enough random bytes available. Please do some other work to give the OS a chance to collect more entropy! (Need %d more bytes) Supported algorithms: The signature will be marked as non-exportable. The signature will be marked as non-revocable. You need a User-ID to identify your key; the software constructs the user id from Real Name, Comment and Email Address in this form: "Heinrich Heine (Der Dichter) " You need a passphrase to unlock the secret key for user: " aka " imported: %lu Fingerprint: unchanged: %lu new subkeys: %lu new user IDs: %lu w/o user IDs: %lu It is not certain that the signature belongs to the owner. The signature is probably a FORGERY. There is no indication that the signature belongs to the owner. This could mean that the signature is forgery. new signatures: %lu secret keys read: %lu skipped new keys: %lu Key fingerprint = (%d) DSA (sign only) (%d) DSA and ElGamal (default) (%d) ElGamal (encrypt only) (%d) ElGamal (sign and encrypt) (%d) RSA (encrypt only) (%d) RSA (sign only) (0) I will not answer.%s (1) I have not checked at all.%s (2) I have done casual checking.%s (3) I have done very careful checking.%s new key revocations: %lu revoked by %08lX at %s signed by %08lX at %s%s signed by %08lX at %s%s%s Unable to sign. secret keys imported: %lu %d = Don't know %d = I do NOT trust %d = I trust fully %d = I trust marginally %d = I trust ultimately (main key ID %08lX) (non-exportable) (sensitive) [expires: %s] i = please show me more information m = back to the main menu q = quit s = skip this key secret keys unchanged: %lu trust: %c/%c" locally signed with your key %08lX at %s " signed with your key %08lX at %s "%s" was already locally signed by key %08lX "%s" was already signed by key %08lX %08lX: It is not sure that this key really belongs to the owner but it is accepted anyway %08lX: There is no indication that this key really belongs to the owner %08lX: We do NOT trust this key %08lX: key has expired %d bad signatures %d signatures not checked due to errors %d signatures not checked due to missing keys %d user IDs without valid self-signatures detected %lu keys checked (%lu signatures) %lu keys so far checked (%lu signatures) %lu keys so far processed %s ... %s does not expire at all %s encrypted data %s encryption will be used %s expires at %s %s is not a valid character set %s is the new one %s is the unchanged one %s makes no sense with %s! %s not allowed with %s! %s signature from: %s %s%c %4u%c/%08lX created: %s expires: %s%s. %s/%s encrypted for: %s %s: WARNING: empty file %s: can't access: %s %s: can't create directory: %s %s: can't create lock %s: can't create: %s %s: can't make lock %s: can't open: %s %s: directory created %s: directory does not exist! %s: error reading free record: %s %s: error reading version record: %s %s: error updating version record: %s %s: error writing dir record: %s %s: error writing version record: %s %s: failed to append a record: %s %s: failed to create hashtable: %s %s: failed to create version record: %s%s: failed to zero a record: %s %s: invalid file version %d %s: invalid trustdb %s: invalid trustdb created %s: keyring created %s: new options file created %s: not a trustdb file %s: skipped: %s %s: skipped: public key already present %s: skipped: public key is disabled %s: trustdb created %s: unknown suffix %s: version record with recnum %lu %u-bit %s key, ID %08lX, created %s(you may have used the wrong program for this task) --clearsign [filename]--decrypt [filename]--edit-key user-id [commands]--encrypt [filename]--lsign-key user-id--nrlsign-key user-id--nrsign-key user-id--output doesn't work for this command --sign --encrypt [filename]--sign --symmetric [filename]--sign [filename]--sign-key user-id--store [filename]--symmetric [filename]-k[v][v][v][c] [user-id] [keyring]... this is a bug (%s:%d:%s) 1 bad signature 1 signature not checked due to a missing key 1 signature not checked due to an error 1 user ID without valid self-signature detected @ (See the man page for a complete listing of all commands and options) @ Examples: -se -r Bob [file] sign and encrypt for user Bob --clearsign [file] make a clear text signature --detach-sign [file] make a detached signature --list-keys [names] show keys --fingerprint [names] show fingerprints @ Options: @Commands: About to generate a new %s keypair. minimum keysize is 768 bits default keysize is 1024 bits highest suggested keysize is 2048 bits Although these keys are defined in RFC2440 they are not suggested because they are not supported by all programs and signatures created with them are quite large and very slow to verify.Answer "yes" (or just "y") if it is okay to generate the sub key.Answer "yes" if it is okay to delete the subkeyAnswer "yes" if it is okay to overwrite the fileAnswer "yes" if you really want to delete this user ID. All certificates are then also lost!Answer "yes" is you want to sign ALL the user IDsAnswer "yes" or "no"Are you really sure that you want to sign this key with your key: "Are you sure that you want this keysize? Are you sure you still want to add it? (y/N) Are you sure you still want to revoke it? (y/N) Are you sure you still want to sign it? (y/N) BAD signature from "CRC error; %06lx - %06lx Can't check signature: %s Can't edit this key: %s Certificates leading to an ultimately trusted key: Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? Change (N)ame, (C)omment, (E)mail or (Q)uit? Change the preferences of all user IDs (or just of the selected ones) to the current list of preferences. The timestamp of all affected self-signatures will be advanced by one second. Changing expiration time for a secondary key. Changing expiration time for the primary key. Command> Comment: Create a revocation certificate for this signature? (y/N) DSA keypair will have 1024 bits. DSA only allows keysizes from 512 to 1024 DSA requires the use of a 160 bit hash algorithm De-Armor a file or stdinDelete this good signature? (y/N/q)Delete this invalid signature? (y/N/q)Delete this key from the keyring? Delete this unknown signature? (y/N/q)Deleted %d signature. Deleted %d signatures. Detached signature. Displaying %s photo ID of size %ld for key 0x%08lX (uid %d) Do you really want to delete the selected keys? Do you really want to delete this key? Do you really want to do this? Do you really want to revoke the selected keys? Do you really want to revoke this key? Do you really want to set this key to ultimate trust? Do you want to promote it to a full exportable signature? (y/N) Do you want your signature to expire at the same time? (Y/n) Don't show Photo IDsEmail address: En-Armor a file or stdinEnter new filenameEnter passphrase Enter passphrase: Enter the name of the key holderEnter the new passphrase for this secret key. Enter the required value as shown in the prompt. It is possible to enter a ISO date (YYYY-MM-DD) but you won't get a good error response - instead the system tries to interpret the given value as an interval.Enter the size of the keyEnter the user ID of the addressee to whom you want to send the message.Experimental algorithms should not be used! Expired signature from "File `%s' exists. Fingerprint:Give the name of the file to which the signature appliesGo ahead and type your message ... Good signature from "Hint: Select the user IDs to sign How carefully have you verified the key you are about to sign actually belongs to the person named above? If you don't know what to answer, enter "0". IDEA cipher unavailable, optimistically attempting to use %s instead If you like, you can enter a text describing why you issue this revocation certificate. Please keep this text concise. An empty line ends the text. If you want to use this revoked key anyway, answer "yes".If you want to use this untrusted key anyway, answer "yes".Invalid character in comment Invalid character in name Invalid command (try "help") Invalid key %08lX made valid by --allow-non-selfsigned-uid Invalid passphrase; please try againInvalid selection. Is this correct (y/n)? It is NOT certain that the key belongs to its owner. If you *really* know what you are doing, you may answer the next question with yes It's up to you to assign a value here; this value will never be exported to any 3rd party. We need it to implement the web-of-trust; it has nothing to do with the (implicitly created) web-of-certificates.Key generation canceled. Key generation failed: %s Key has been compromisedKey is no longer usedKey is protected. Key is revoked.Key is supersededKey is valid for? (0) Key not changed so no update needed. KeyringKeysizes larger than 2048 are not suggested because computations take REALLY long! N to change the name. C to change the comment. E to change the email address. O to continue with key generation. Q to to quit the key generation.NOTE: %s is not for normal use! NOTE: cipher algorithm %d not found in preferences NOTE: creating subkeys for v3 keys is not OpenPGP compliant NOTE: no default option file `%s' NOTE: secret key %08lX expired at %s NOTE: sender requested "for-your-eyes-only" NOTE: signature key %08lX expired %s NOTE: simple S2K mode (0) is strongly discouraged Name may not start with a digit Name must be at least 5 characters long Need the secret key to do this. NnCcEeOoQqNo corresponding signature in secret ring No help availableNo help available for `%s'No reason specifiedNo secondary key with index %d No such user ID. No trust value assigned to: %4u%c/%08lX %s "No user ID with index %d Not a valid email address Notation: Note that this key cannot be used for encryption. You may want to use the command "--edit-key" to generate a secondary key for this purpose. Note: This key has been disabled. Note: This key has expired! Nothing deleted. Nothing to sign with key %08lX Okay, but keep in mind that your monitor and keyboard radiation is also very vulnerable to attacks! Overwrite (y/N)? Please correct the error first Please decide how far you trust this user to correctly verify other users' keys (by looking at passports, checking fingerprints from different sources...)? Please don't put the email address into the real name or the comment Please enter a new filename. If you just hit RETURN the default file (which is shown in brackets) will be used.Please enter an optional commentPlease enter name of data file: Please enter the passhrase; this is a secret sentence Please fix this possible security flaw Please note that the shown key validity is not necessary correct unless you restart the program. Please remove selections from the secret keys. Please repeat the last passphrase, so you are sure what you typed in.Please report bugs to . Please select at most one secondary key. Please select exactly one user ID. Please select what kind of key you want: Please specify how long the key should be valid. 0 = key does not expire = key expires in n days w = key expires in n weeks m = key expires in n months y = key expires in n years Please specify how long the signature should be valid. 0 = signature does not expire = signature expires in n days w = signature expires in n weeks m = signature expires in n months y = signature expires in n years Please use the command "toggle" first. Policy: Public key is disabled. Quit without saving? Real name: Really create the revocation certificates? (y/N) Really create? Really delete this self-signature? (y/N)Really remove all selected user IDs? Really remove this user ID? Really sign all user IDs? Really sign? Really update the preferences for the selected user IDs? Really update the preferences? Reason for revocation: Repeat passphrase Repeat passphrase: Requested keysize is %u bits Revocation comment: Save changes? Secret key is available. Secret parts of primary key are not available. Select the algorithm to use. DSA (aka DSS) is the digital signature algorithm which can only be used for signatures. This is the suggested algorithm because verification of DSA signatures are much faster than those of ElGamal. ElGamal is an algorithm which can be used for signatures and encryption. OpenPGP distinguishs between two flavors of this algorithms: an encrypt only and a sign+encrypt; actually it is the same, but some parameters must be selected in a special way to create a safe key for signatures: this program does this but other OpenPGP implementations are not required to understand the signature+encryption flavor. The first (primary) key must always be a key which is capable of signing; this is the reason why the encryption only ElGamal key is not available in this menu.Set command line to view Photo IDsShow Photo IDsSignature is valid for? (0) Signature made %.*s using %s key ID %08lX Signature notation: Signature policy: Syntax: gpg [options] [files] sign, check, encrypt or decrypt default operation depends on the input data The random number generator is only a kludge to let it run - it is in no way a strong RNG! DON'T USE ANY DATA GENERATED BY THIS PROGRAM!! The signature is not valid. It does make sense to remove it from your keyring.The use of this algorithm is deprecated - create anyway? This command is not allowed while in %s mode. This is a secret key! - really delete? This is a signature which binds the user ID to the key. It is usually not a good idea to remove such a signature. Actually GnuPG might not be able to use this key anymore. So do this only if this self-signature is for some reason not valid and a second one is available.This is a valid signature on the key; you normally don't want to delete this signature because it may be important to establish a trust connection to the key or another key certified by this key.This key belongs to us This key has been disabledThis key has expired!This key is due to expire on %s. This key is not protected. This key may be revoked by %s key %s%s This key probably belongs to the owner This signature can't be checked because you don't have the corresponding key. You should postpone its deletion until you know which key was used because this signing key might establish a trust connection through another already certified key.This signature expired on %s. This would make the key unusable in PGP 2.x. To build the Web-of-Trust, GnuPG needs to know which keys are ultimately trusted - those are usually the keys for which you have access to the secret key. Answer "yes" to set this key to ultimately trusted Total number processed: %lu Usage: gpg [options] [files] (-h for help)Use this key anyway? User ID "%s" is revoked.User ID is no longer validWARNING: %s is a deprecated option. WARNING: %s overrides %s WARNING: 2 files with confidential information exists. WARNING: This is a PGP2-style key. Adding a photo ID may cause some versions of PGP to reject this key. WARNING: This key already has a photo ID. Adding another photo ID may confuse some versions of PGP. WARNING: This key has been revoked by its owner! WARNING: This key is not certified with a trusted signature! WARNING: This key is not certified with sufficiently trusted signatures! WARNING: This subkey has been revoked by its owner! WARNING: Using untrusted key! WARNING: We do NOT trust this key! WARNING: Weak key detected - please change passphrase again. WARNING: `%s' is an empty file WARNING: encrypted message has been manipulated! WARNING: invalid notation data found WARNING: message was encrypted with a weak key in the symmetric cipher. WARNING: nothing exported WARNING: program may create a core file! WARNING: unable to %%-expand policy url (too large). Using unexpanded. WARNING: using insecure random number generator!! Warning: key %08lX may be revoked: fetching revocation key %08lX Warning: unsafe ownership on %s "%s" Warning: unsafe permissions on %s "%s" Warning: using insecure memory! We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. What keysize do you want? (1024) When you sign a user ID on a key, you should first verify that the key belongs to the person named in the user ID. It is useful for others to know how carefully you verified this. "0" means you make no particular claim as to how carefully you verified the key. "1" means you believe the key is owned by the person who claims to own it but you could not, or did not verify the key at all. This is useful for a "persona" verification, where you sign the key of a pseudonymous user. "2" means you did casual verification of the key. For example, this could mean that you verified the key fingerprint and checked the user ID on the key against a photo ID. "3" means you did extensive verification of the key. For example, this could mean that you verified the key fingerprint with the owner of the key in person, and that you checked, by means of a hard to forge document with a photo ID (such as a passport) that the name of the key owner matches the name in the user ID on the key, and finally that you verified (by exchange of email) that the email address on the key belongs to the key owner. Note that the examples given above for levels 2 and 3 are *only* examples. In the end, it is up to you to decide just what "casual" and "extensive" mean to you when you sign other keys. If you don't know what the right answer is, answer "0".You are about to revoke these signatures: You are using the `%s' character set. You can't change the expiration date of a v3 key You can't delete the last user ID! You did not specify a user ID. (you may use "-r") You don't want a passphrase - this is probably a *bad* idea! You don't want a passphrase - this is probably a *bad* idea! I will do it anyway. You can change your passphrase at any time, using this program with the option "--edit-key". You have signed these user IDs: You may not add a photo ID to a PGP2-style key. You may not make an OpenPGP signature on a PGP 2.x key while in --pgp2 mode. You may only have one photo ID on a key. You must select at least one key. You must select at least one user ID. You need a Passphrase to protect your secret key. You need a passphrase to unlock the secret key for user: "%.*s" %u-bit %s key, ID %08lX, created %s%s You selected this USER-ID: "%s" You should specify a reason for the certification. Depending on the context you have the ability to choose from this list: "Key has been compromised" Use this if you have a reason to believe that unauthorized persons got access to your secret key. "Key is superseded" Use this if you have replaced this key with a newer one. "Key is no longer used" Use this if you have retired this key. "User ID is no longer valid" Use this to state that the user ID should not longer be used; this is normally used to mark an email address invalid. Your current signature on "%s" is a local signature. Your decision? Your selection? Your system can't display dates beyond 2038. However, it will be correctly handled up to 2106. [User id not found][filename][revocation][self-signature][uncertain]`%s' already compressed `%s' is not a regular file - ignored `%s' is not a valid long keyID a notation name must have only letters, digits, dots or underscores and end with an '=' a notation value must not use any control characters add a photo IDadd a secondary keyadd a user IDadd this keyring to the list of keyringsadd this secret keyring to the listaddkeyaddphotoadduidalways use a MDC for encryptionanonymous recipient; trying secret key %08lX ... armor header: armor: %s assume no on most questionsassume yes on most questionsassuming %s encrypted data assuming bad signature due to an unknown critical bit assuming signed data in `%s' bad MPIbad URIbad certificatebad keybad passphrasebad public keybad secret keybad signaturebatch mode: never askbe somewhat more quietccan't close `%s': %s can't connect to `%s': %s can't create %s: %s can't create `%s': %s can't disable core dumps: %s can't do that in batchmode can't do that in batchmode without "--yes" can't get key from keyserver: %s can't get server read FD for the agent can't get server write FD for the agent can't handle public key algorithm %d can't handle text lines longer than %d characters can't handle these multiple signatures can't open %s: %s can't open `%s' can't open `%s': %s can't open signed data `%s' can't open the keyringcan't query password in batchmode can't read `%s': %s can't search keyserver: %s can't set client pid for the agent can't stat `%s': %s can't write `%s': %s cancelled by user cannot avoid weak key for symmetric cipher; tried %d times! change the expire datechange the ownertrustchange the passphrasechanging permission of `%s' failed: %s checkcheck key signatureschecking at depth %d signed=%d ot(-/q/n/m/f/u)=%d/%d/%d/%d/%d/%d checking created signature failed: %s checking keyring `%s' checking the trustdb checksum errorcipher algorithm %d%s is unknown or disabled communication problem with gpg-agent completes-needed must be greater than 0 compress algorithm must be in range %d..%d conflicting commands could not parse keyserver URI create ascii armored outputdata not saved; use option "--output" to save it dearmoring failed: %s debugdecrypt data (default)decryption failed: %s decryption okay delete a secondary keydelete signaturesdelete user IDdeleting keyblock failed: %s delkeydelphotodelsigdeluiddisabledisable a keydo not force v3 signaturesdo not force v4 key signaturesdo not make any changesdon't use the terminal at alldots in a notation name must be surrounded by other characters emulate the mode described in RFC1991enableenable a keyenarmoring failed: %s encrypt dataencrypted with %s key, ID %08lX encrypted with %u-bit %s key, ID %08lX, created %s encrypted with unknown algorithm %d encrypting a message in --pgp2 mode requires the IDEA cipher encryption only with symmetric ciphererror creating `%s': %s error creating keyring `%s': %s error creating passphrase: %s error in trailer line error reading `%s': %s error reading keyblock: %s error reading secret keyblock `%s': %s error sending to `%s': %s error writing keyring `%s': %s error writing public keyring `%s': %s error writing secret keyring `%s': %s expireexport keysexport keys to a key serverexport the ownertrust valuesfailed sending to `%s': status=%u failed to initialize the TrustDB: %s failed to rebuild keyring cache: %s file close errorfile create errorfile delete errorfile existsfile open errorfile read errorfile rename errorfile write errorfix a corrupted trust databaseflag user ID as primaryforce v3 signaturesforce v4 key signaturesfprgeneral errorgenerate a new key pairgenerate a revocation certificategenerating the deprecated 16-bit checksum for secret key protection gpg-agent is not available in this session gpg-agent protocol version %d is not supported helpiImMqQsSimport keys from a key serverimport ownertrust valuesimport/merge keysinput line %u too long or missing LF input line longer than %d characters invalid S2K mode; must be 0, 1 or 3 invalid argumentinvalid armorinvalid armor header: invalid armor: line longer than %d characters invalid character in preference string invalid clearsig header invalid dash escaped line: invalid default-check-level; must be 0, 1, 2, or 3 invalid hash algorithm `%s' invalid keyringinvalid packetinvalid passphraseinvalid preferences invalid radix64 character %02x skipped invalid response from agent invalid root packet detected in proc_tree() invalid value keykey %08lX occurs more than once in the trustdb key %08lX: %d new signatures key %08lX: %d new subkeys key %08lX: %d new user IDs key %08lX: 1 new signature key %08lX: 1 new subkey key %08lX: 1 new user ID key %08lX: PGP 2.x style key - skipped key %08lX: accepted as trusted key key %08lX: accepted non self-signed user ID '%s' key %08lX: already in secret keyring key %08lX: can't locate original keyblock: %s key %08lX: can't read original keyblock: %s key %08lX: direct key signature added key %08lX: doesn't match our copy key %08lX: duplicated user ID detected - merged key %08lX: invalid revocation certificate: %s - rejected key %08lX: invalid revocation certificate: %s - skipped key %08lX: invalid self-signature on user id "%s" key %08lX: invalid subkey binding key %08lX: key has been revoked! key %08lX: new key - skipped key %08lX: no public key - can't apply revocation certificate key %08lX: no public key for trusted key - skipped key %08lX: no subkey for key binding key %08lX: no user ID key %08lX: no user ID for signature key %08lX: no valid user IDs key %08lX: non exportable signature (class %02x) - skipped key %08lX: not a rfc2440 key - skipped key %08lX: not changed key %08lX: not protected - skipped key %08lX: public key imported key %08lX: public key not found: %s key %08lX: revocation certificate added key %08lX: revocation certificate at wrong place - skipped key %08lX: revocation certificate imported key %08lX: secret key imported key %08lX: secret key not found: %s key %08lX: secret key without public key - skipped key %08lX: skipped subkey key %08lX: skipped user ID 'key %08lX: subkey has been revoked! key %08lX: unsupported public key algorithm key %08lX: unsupported public key algorithm on user id "%s" key `%s' not found: %s key has been created %lu second in future (time warp or clock problem) key has been created %lu seconds in future (time warp or clock problem) key is not flagged as insecure - can't use it with the faked RNG! key marked as ultimately trusted. keyring `%s' created keyserver errorkeysize invalid; using %u bits keysize rounded up to %u bits keysize too large; %d is largest value allowed. keysize too small; 1024 is smallest value allowed for RSA. keysize too small; 768 is smallest value allowed. llistlist key and user IDslist keyslist keys and fingerprintslist keys and signatureslist only the sequence of packetslist preferences (expert)list preferences (verbose)list secret keyslist signatureslsignmake a detached signaturemalformed CRC malformed GPG_AGENT_INFO environment variable malformed user idmarginals-needed must be greater than 1 max-cert-depth must be in range 1 to 255 moving a key signature to the correct place nNnested clear text signatures network errornever use a MDC for encryptionnext trustdb check due at %s nono default secret keyring: %s no need for a trustdb check no secret key no signed data no such user idno valid OpenPGP data found. no valid addressees no writable keyring found: %s no writable public keyring found: %s no writable secret keyring found: %s not a detached signature not encryptednot human readablenot processednot supportednote: random_seed file is empty note: random_seed file not updated nrlsignnrsignokay, we are the anonymous recipient. old encoding of the DEK is not supported old style (PGP 2.x) signature operation is not possible without initialized secure memory option file `%s': %s original file name='%.*s' ownertrust information cleared passphrase not correctly repeated; try againpassphrase too long passwdplease enter an optional but highly suggested email addressplease see http://www.gnupg.org/faq.html for more information please see http://www.gnupg.org/why-not-idea.html for more information please use "--keyserver-options %s" instead prefpreference %c%lu duplicated preference %c%lu is not valid premature eof (in CRC) premature eof (in Trailer) premature eof (no CRC) primaryproblem handling encrypted packet problem with the agent - disabling agent use problem with the agent: agent returns 0x%lx protection algorithm %d%s is not supported public and secret key created and signed. public key %08lX not found: %s public key decryption failed: %s public key encrypted data: good DEK public key is %08lX public key is %lu second newer than the signature public key is %lu seconds newer than the signature public key not foundpublic key of ultimately trusted key %08lX not found qqQquitquit this menuquoted printable character in armor - probably a buggy MTA has been used read options from filereading from `%s' reading options from `%s' reading stdin ... remove keys from the public keyringremove keys from the secret keyringrequesting key %08lX from HKP keyserver %s resource limitrev! subkey has been revoked: %s rev- faked revocation found rev? problem checking revocation: %s revkeyrevoke a secondary keyrevoke signaturesrevsigrounded up to %u bits ssavesave and quitsearch for keys on a key serversearching for "%s" from HKP server %s secret key not availablesecret key parts are not available select secondary key Nselect user ID Nselected cipher algorithm is invalid selected digest algorithm is invalid set all packet, cipher and digest options to OpenPGP behaviorset all packet, cipher and digest options to PGP 2.x behaviorset preference listsetprefshow fingerprintshow photo IDshow this helpshow which keyring a listed key is onshowphotoshowprefsignsign a keysign a key locallysign a key locally and non-revocablysign a key non-revocablysign or edit a keysign the keysign the key locallysign the key locally and non-revocablysign the key non-revocablysignature verification suppressed signing failed: %s signing:skipped `%s': %s skipped `%s': duplicated skipped `%s': this is a PGP generated ElGamal key which is not secure for signatures! skipped: public key already set skipped: public key already set as default recipient skipped: secret key already present skipping block of type %d standalone revocation - use "gpg --import" to apply standalone signature of class 0x%02x store onlysubpacket of type %d has critical bit set success sending to `%s' (status=%u) tthe IDEA cipher plugin is not present the first character of a notation name must be a letter or an underscore the given certification policy URL is invalid the given signature policy URL is invalid the signature could not be verified. Please remember that the signature file (.sig or .asc) should be the first file given on the command line. the trustdb is corrupted; please run "gpg --fix-trustdb". there is a secret key for public key "%s"! this cipher algorithm is deprecated; please use a more standard one! this is a PGP generated ElGamal key which is NOT secure for signatures! this may be caused by a missing self-signature this message may not be usable by PGP 2.x throw keyid field of encrypted packetstimestamp conflicttoggletoggle between secret and public key listingtoo many `%c' preferences too many entries in pk cache - disabled trusttrust database errortrust record %lu is not of requested type %d trust record %lu, req type %d: read failed: %s trust record %lu, type %d: write failed: %s trustdb rec %lu: lseek failed: %s trustdb rec %lu: write failed (n=%d): %s trustdb transaction too large trustdb: lseek failed: %s trustdb: read failed (n=%d): %s trustdb: sync failed: %s uidunable to set exec-path to %s unable to use the IDEA cipher for all of the keys you are encrypting to. unattended trust database updateunexpected armor:unexpected dataunimplemented cipher algorithmunimplemented pubkey algorithmunknown cipher algorithmunknown compress algorithmunknown default recipient `%s' unknown digest algorithmunknown packet typeunknown pubkey algorithmunknown signature classunknown versionunsupported URIunusable pubkey algorithmunusable public keyunusable secret keyupdate all keys from a keyserverupdate failed: %s update secret failed: %s update the trust databaseupdated preferencesupdprefusage: gpg [options] use as output fileuse canonical text modeuse option "--delete-secret-keys" to delete it first. use the default key as default recipientuse the gpg-agentuse this user-id to sign or decryptuser ID: "using secondary key %08lX instead of primary key %08lX verboseverify a signaturewarning: invalid size of random_seed file - not used weak keyweak key created - retrying writing key binding signature writing public key to `%s' writing secret key to `%s' writing self signature writing to `%s' writing to stdout wrong secret key usedyYyesyou can only clearsign with PGP 2.x style keys while in --pgp2 mode you can only encrypt to RSA keys of 2048 bits or less in --pgp2 mode you can only make detached or clear signatures while in --pgp2 mode you can only sign with PGP 2.x style keys while in --pgp2 mode you can't sign and encrypt at the same time while in --pgp2 mode you found a bug ... (%s:%d) you have to start GnuPG again, so it can read the new options file you must use files (and not a pipe) when working with --pgp2 enabled. |FD|write status info to this FD|FILE|load extension module FILE|HOST|use this keyserver to lookup keys|KEYID|ultimately trust this key|NAME=VALUE|use this notation data|NAME|encrypt for NAME|NAME|set terminal charset to NAME|NAME|use NAME as default recipient|NAME|use NAME as default secret key|NAME|use cipher algorithm NAME|NAME|use cipher algorithm NAME for passphrases|NAME|use message digest algorithm NAME|NAME|use message digest algorithm NAME for passphrases|N|set compress level N (0 disables)|N|use compress algorithm N|N|use passphrase mode N|[file]|make a clear text signature|[file]|make a signature|[file]|write status info to file|[files]|decrypt files|[files]|encrypt files|algo [files]|print message digestsProject-Id-Version: gnupg 1.0.6 POT-Creation-Date: 2002-04-29 17:09+0200 PO-Revision-Date: 2002-04-29 13:24+0200 Last-Translator: Dokianakis Theofanis Language-Team: Greek MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-7 Content-Transfer-Encoding: 8bit user ID. : . . . bytes. ! ( %d bytes) : -. -. User-ID . user-id , Email : "Nikolaoy Nikos (toy Ioanni) " : " " : %lu : : %lu : %lu user ID: %lu user ID: %lu . . . . : %lu : %lu : %lu = (%d) DSA ( ) (%d) DSA ElGamal () (%d) ElGamal ( ) (%d) ElGamal ( ) (%d) RSA ( ) (%d) RSA ( ) (0) .%s (1) .%s (2) .%s (3) .%s : %lu %08lX %s %08lX %s%s %08lX %s%s%s . : %lu %d = %d = %d = %d = %d = ( , ID %08lX) (-) () [: %s] i = m = q = s = : %lu : %c/%c" %08lX %s " %08lX %s "%s" %08lX "%s" %08lX %08lX: %08lX: . %08lX: %08lX: %d %d %d %d user ID - %lu (%lu ) %lu (%lu ) %lu %s ... %s %s %s %s %s %s %s %s %s %s! %s %s! %s : %s %s%c %4u%c/%08lX : %s : %s%s. %s/%s : %s %s: : %s: : %s %s: : %s %s: (lock) %s: : %s %s: (lock) %s: : %s %s: %s: ! %s: free : %s %s: : %s %s: : %s %s: dir : %s %s: : %s %s: : %s %s: hashtable: %s %s: : %s%s: : %s %s: %d %s: trustdb %s: trustdb %s: %s: %s: trustdb %s: : %s %s: : %s: : . %s: trustdb %s: %s: recnum %lu %u-bit %s , ID %08lX, %s( ) --clearsign [ ]--decrypt [ ]--edit-key user-id []--encrypt [ ]--lsign-key user-id--nrlsign-key user-id--nrsign-key user-id--output --sign --encrypt [ ]--sign --symmetric [ ]--sign [ ]--sign-key user-id--store [ ]--symmetric [ ]-k[v][v][v][c] [user-id] []... bug (%s:%d:%s) 1 1 1 1 user ID - @ ( man ) @ : -se -r Bob [] Bob --clearsign [] --detach-sign [] --list-keys [] --fingerprint [] (fingerprints) @ : @: %s keypair. 768 bits 1024 bits 2048 bits RFC2440 . "yes" ( "y") . "yes" "yes" "yes" user ID. ! "yes" user ID "yes"() "no"() : " ; ; (y/N) ; ; (y/N) " CRC: %06lx - %06lx : %s :%s : (N), (C), (E)mail (O)/(Q); (N), (C), (E)mail (Q); user ID ( ) . - 1 . . . > : ; (y/N) DSA 1024 bits. DSA 512 1024 DSA 160 bit hash - stdin ; (y/N/q) ; (y/N/q) ; ; (y/N/q) %d . %d . . %s photo ID %ld 0x%08lX (uid %d) ; ; ; ; ; ; ; (y/N) ; (Y/n) Photo ID Email: - stdin : . . ISO (YYYY-MM-DD) - . user ID . ! " `%s' . Fingerprint: ... ": user ID ; "0". IDEA , %s , . . . , "yes". , "yes". ( "help") %08lX --allow-non-selfsigned-uid , . (y/n); . ** , . . -, ( ) -. . : %s . . ; (0) . 2048 ! N . C . E email. O . Q .: %s ! : %d : v3 OpenPGP : `%s' : %08lX %s : "----" : %08lX %s : S2K (0) 5 . NnCcEeOoQq `%s' %d user ID. : %4u%c/%08lX %s " user ID %d Email : . "--edit-key" . : . : ! . %08lX , ' ! (y/N); , , ( passports fingerprints ...); email . RETURN ' ( ) . : ߷ "" . . , . . user ID. : . 0 = = n w = n m = n y = n . 0 = = n w = n m = n y = n "toggle" . : . ; : ; (y/N) ; -; (y/N) user ID; user ID; user ID; ; user ID; ; : : %u bits : ; . . . DSA ( DSS) . DSA ElGamal. ElGamal - . OpenPGP "" : - --, , . , OpenPGP (). () . - ElGamal . Photo ID Photo ID ; (0) %.*s %s ID %08lX : : : gpg [] [] , , !! . . - ; %s. ! - ; user ID . . GnuPG . - . . . ! %s. . %s %s%s . , . %s. PGP 2.x. -, GnuPG - . "yes" () : %lu : gpg [] [] (-h ) ; user ID "%s" . User ID : `%s' : %s %s : 2 . : PGP2. photo ID PGP . : photo ID. photo ID PGP. : ! : ! : ! : ! : ! : ! : - : `%s' : ! : : . : : core! : %%- url ( ). . : !! : %08lX : %08lX : %s "%s" : %s "%s" : bytes. (, , ) . . ; (1024) user ID , user ID. , . "0" . "1" , . "" . "2" . user ID photo ID. "3" . , "" photo ID .. , , . "" 2 3 ** . "" "" . , "0". : `%s' . v3 user ID! user ID. ( "-r") - ** ! - ** ! . , "--edit-key". user ID: photo ID PGP2. OpenPGP PGP 2.x --pgp2. photo ID . . user ID. . : "%.*s" %u-bit %s , ID %08lX, %s%s USER-ID: "%s" . , : " " . " " . " " . " user ID " user ID . email. "%s" . ; ; 2038. , 2106. [User id ][ ][][-][]`%s' `%s' - `%s' keyID , underscores '=' control photo ID user ID addkeyaddphotoadduid MDC %08lX ... : : %s %s bit `%s' MPI URI batch: c `%s': %s `%s': %s %s: %s `%s': %s core dump: %s (batchmode) "--yes" : %s FD agent FD agent %d %d %s: %s `%s' `%s': %s `%s' `%s': %s : %s pid agent `%s': %s `%s': %s , %d ! `%s' : %s check %d =%d ot(-/q/n/m/f/u)=%d/%d/%d/%d/%d/%d : %s `%s' trustdb checksum %d%s gpg-agent completes-needed 0 %d..%d URI ascii . "--output" : %s debug () : %s OK user ID block : %s delkeydelphotodelsigdeluiddisable v3 v4 RFC1991enable : %s %s key, ID %08lX %u-bit %s , ID %08lX, %s %d --pgp2 . IDEA `%s': %s `%s': %s : %s trailer `%s': %s : %s `%s': %s `%s': %s `%s': %s `%s': %s `%s': %s expire `%s': =%u TrustDB: %s cache : %s user ID v3 v4 fpr 16-bit checksum gpg-agent %d gpg-agent helpiImMqQsS / %u LF %d S2K; 0, 1 3 : : %d "" clearsig dash escaped : default-check-level 0, 1, 2, 3 hash `%s' radix64 %02x agent (root) proc_tree() key %08lX trustdb %08lX: %d %08lX: %d %08lX: %d user ID %08lX: 1 %08lX: 1 %08lX: 1 user ID %08lX: PGP 2.x - %08lX: %08lX: - user ID '%s' %08lX: %08lX: : %s %08lX: : %s %08lX: %08lX: %08lX: user ID - %08lX: : %s - %08lX: : %s - %08lX: - user id "%s" %08lX: %08lX: ! %08lX: - %08lX: - %08lX: - %08lX: %08lX: user ID %08lX: user ID %08lX: user ID %08lX: ( %02x) - %08lX: rfc2440 - %08lX: %08lX: - %08lX: %08lX: : %s %08lX: %08lX: - %08lX: %08lX: %08lX: : %s %08lX: - %08lX: %08lX: user ID ' %08lX: ! %08lX: %08lX: user id "%s" '%s' : %s %lu ( ) %lu ( ) - RNG! . `%s' , %u bits %u bits , %d . , 1024 RSA. , 768 . llist user ID (fingerprints) () () lsign CRC GPG_AGENT_INFO (user id)marginals-needed 1 max-cert-depth 1 255 nN MDC trustdb %s : %s trustdb (user id) OpenPGP . : %s : %s : %s : random_seed : random_seed nrlsignnrsign, . DEK (PGP 2.x) `%s': %s ='%.*s' - . passwd email () http://www.gnupg.org/faq.html http://www.gnupg.org/why-not-idea.html "--keyserver-options %s" pref %c%lu %c%lu ( CRC) ( railer) ( CRC) agent - agent agent: agent 0x%lx %d%s . %08lX : %s : %s : DEK %08lX %lu %lu %08lX qqQ , , - MTA `%s' `%s' stdin ... %08lX HKP %s ... rev! : %s rev- rev? : %s revkey revsig %u bits ssave "%s" HKP %s N user ID N , OPENPGP ,, PGP 2.x setpref fingerprint photo ID showphotoshowprefsign - - - - : %s : `%s': %s `%s': `%s': PGP ElGamal ! : : : %d - "gpg --import" 0x%02x %d bit `%s' (=%u) t IDEA underscore URL URL . (.sig or .asc) . trustdb - "gpg --fix-trustdb". "%s"! . ! , PGP, ElGamal ! ' PGP 2.x keyid (timestamp)toggle `%c' pk cache - trust trust %lu %d trust %lu, req %d: read : %s trust %lu, %d: write : %s trustdb rec %lu: lseek: %s trustdb rec %lu: write (n=%d): %s trustdb trustdb: lseek: %s trustdb: read (n=%d): %s trustdb: sync : %s uid exec-path %s IDEA . : `%s' URI : %s : %s updpref: gpg [] "--delete-secret-key" . gpg-agent (user id) user ID: " %08lX %08lX : random_seed - - "" `%s' `%s' - `%s' stdout yY PGP 2.x --pgp2 RSA 2048 bit --pgp2 --pgp2 PGP 2.x --pgp2 --pgp2 bug ... (%s:%d) GnuPG, ( pipes) --pgp2. |FD| FD|| || |KEYID| |=| || || || || || || || |ONOMA| |N| N (0 )|N| N|N| N|[]| |[]| |[]| |[]| |[]| | []|