shell bypass 403

GrazzMean Shell

Uname: Linux web3.us.cloudlogin.co 5.10.226-xeon-hst #2 SMP Fri Sep 13 12:28:44 UTC 2024 x86_64
Software: Apache
PHP version: 8.1.31 [ PHP INFO ] PHP os: Linux
Server Ip: 162.210.96.117
Your Ip: 18.223.106.195
User: edustar (269686) | Group: tty (888)
Safe Mode: OFF
Disable Function:
NONE

name : gnupg1.mo
���(�<QPl-Ql�lmn�&n�n	o)oEoboo�o�o2�o7	p2Ap#tpD�p.�pIq7Vq'�q�q�q�q�qr)rFrcr�r�r�r+�r&�r#s(?shs�s�s�s(�s�st7t$Ttyt�t&�t�t,�tu2u!Iuku�u�u�u�u�u�u�uv1vCvUvfv�v�v*�v"�v]wBfw�w/�w=�w(*x.Sx3�x!�x(�xyy'$yLyjy}y�y�y�y,�y'z4zPz"iz�z�z�zB�z={I{"h{%�{&�{!�{%�{" |#C|'g| �|�|�|�|�|},}(=}$f}�}�}#�}�}$�}~;~!Z~|~�~ �~�~&�~%>,J4w��������р�'��"�>�\�n��� ��'��݁"��5�-F�(t�0��2΂H�	J�T�a�n�����ȄA܄/�0N�\�1܅�D#�-h�0��.džI��*@�+k�'����̇����*�C�X�_�y�3��Ĉ4̈-��/�'�.�@�$I�	n�
x�?��4Ɗ:��6�U�s�����,��(�8�#M�&q�(��&������,�75�6m�-��%ҍ3��9,�0f�<��GԎ@�>]�+��=ȏ���&�"8�[�q���:��Ȑ#ې��� $�/E�u����[�Hu�-��$�'�89�&r�5��.ϓ5��*4�!_�.��0��&�,�5�O�
k�v�8��#•���"�.)��X�H�":�(]�$��E��1��#�;�������Ǚ�8�$:�_�s���������a�/�K�^�z�����œBۜ�4�G�W�i�%������ٝ.���$�*�� ���*˟!��0�'I�<q���+ɠ"��,�/E�1u�"��,ʡ"��2�M� i�(�� ��
Ԣ*ߢ
��7�K�d�v�����ƣ�����5��"���(��5(�^�p�����˥Fݥ $�1E�%w������E\�E��o� X� y����8*�'c�>���ʩcZ�/��N�E=�,��"��#ӫ-��+%�)Q�&{������'�����G�g�}���������گ+��,"�3O���1����(װ#�+$�"P�+s�"�� ±�?��%7�]�x�������β�.
�(9� b�}����/0�0`�����!����!���.�D�]�{�%����ɷܷ�j�Ko�@��-���*�9��O�0A�/r�5��'غ.�3/�-c������f�~���!��ѽ$�,�(?��h�]�|�-��ʿ�ݿ������*+�+V������� ��
�#)�$M�r� ����	��6��%�2�7L�2����r7�>��1��=�IY�4����#��=�.Y���?��D��@-�+n�1��N��I�Ie�5��5��;�?W�B��<��H�-`�"��H�����?����<��B�)_�C��:��.�>7�2v�=��<��@$�Fe�H��U��$K� p�-��2��1��I$�>n�K��@��5:�*p�7��,��0�01�4b� ��2����:��6'�5^�.����h��*L�&w�1��#��2��>'��f�*�=C�0��M��9�0:�"k�&��!��3��>�cJ�%��D��,�5F�|���2��_��
0�
;�
F�
Q�
\�g�
{�
��	������
��������%�"(�K�)k�&��+��5���7�F�[�
h�v�.����
����B��5�5S�$����������������
��(�/�H�K�(a���������"�� �-�I�g�,��'��.��%�2.�+a�������������%
�3�H�5]�������
��;��<�*L�w���	����������3�:I�����������&���4�-C�
q�<�A��(��'�=�/\�������1����0�G�X�p�,����H���5�A�%J�/p�0��.���&�3?�
s�~�������0���$.�=S�%��#��-��	� "�C�'b�#�����������+�I�'e�&��������&�&2�Y�x�����/������,��/�"M�9p�K��%��$�&A�$h���#��D��'�B�S�e�w���������1�$���@$�e�����
��$���!��%�<�DP�+��/��
�6��03�d�m�/����"�&�(�%@�%f���$����
��.��<�U�q�2������
�'"�J�Z�/u���+�����$	�&.�$U�'z�,��,����>#� b�����$��,�IJO���"�# <!]���*�-G$S'x �.�"�+)?#i�-�%�658/n�"�'�	;$0`"�%�/�2
=!Qs:� �!�!(.+W8��!�4�00ay2�6�)	9+	e	y	&�	G�	H�	BH
�
�
�
�
#�
=Mg�����
/=Us	������

''
O
n
s
.�
�
�
(�
2�
!( Jk,���
��
�$�5)8b j��%�%��,A2^3��&�"$13ey�!����%
%3Ys
�
�
�
� �#�&	+)5_$~<���16J,��;�#M+y-����*"@-c�+�&�*�5)6_�!�&�$�!32H{~�I�F�#;Ni�����014#f#�+�+�,!32U�$��*�2.5dy�*���
%3S%o�&���$0#I&m��3�%�*%:`~�(�-�9 6E :| � ,� 0� /)!Y!7n!*�!.�!7";8"0t"1�";�"#%+#Q#)`#3�#6�#:�#
0$;$N$9a$�$5�$-�$"%A% a%�%-�%�%�%�% �%5&$P&u&+�&4�&%�&!'C9'*}'(�'0�'("(.+(-Z(*�(��(+D)Gp)2�)/�)%*FA*�*1�*#�*�*!+0+(M+v+-�+/�+,�+	," ,)C,m,�, �,�,2�,1-G-P-#m-#�-!�-"�--�-(.:G.I�.A�."/1/	C/M/`/p/�/�/�/�/�/ 0"0B0![0}0�0�0�0�0�0#1)151E1_1s1 �1�1�1�1	�1�12"26:2q25�2#�2 �233-3>3*W3!�3�3�3G�344 -4N4k4t4-�4,�4�45%565 R5s5�5�5�5�5�5�5D�5F-6Et6D�6E�6AE77�76�77�7=.8>l8�8$�87�8<%97b9F�9�9�99: K:l:
�:$�:�:#�:�:#;';*>;*i;w�;-=�:=�=�>��>$�?�?�?@5@R@o@�@>�@C�@>,A#kAD�A.�AIB7MB'�B�B�B�B�BC,CICfC�C�C�C+�C&�C#D(BDkD�D�D�D(�DEE:E$WE|E�E&�E�E,�EF5F!LFnF�F�F�F�F�FGG#G@GRGdGuG�G(�G6�G.Hi;HB�H�H/�H=+I(iI.�I3�I!�I(J@J[J'cJ�J�J�J�J�JK,K'KKsK�K"�K�K&�K'�KBL=bL�L"�L%�L&M!/M%QM"wM#�M'�M �MN$N9NVNkN�N(�N$�N�N�N#O*/O$ZOO�O!�O�O�O P<P&TP%{P�P,�P4�P
QR1RFRdRyR'�R�R�R�RSS 'S'HSpS"�S�S�S-�S(T00T2aTH�T	�T�U�UVV;V[VYoV;�V<WhBW=�W,�WPX-gX0�X.�XI�X*?Y+jY'�Y�Y#�Y�YZZ5Z NZoZvZ�Z3�Z�Z4�Z-[�F['\.(\W\$`\	�\
�\?�\4�\:]M]l]�]�]�],�](^8+^#d^&�^(�^&�^�^_._C_7L_6�_-�_%�_3`9C`0}`<�`G�`@3a>ta+�a=�ab%b5b=b"Obrb�b�b:�b�b#�bc(c ;c/\c�c��crdH�d-�d$e3(e8\e&�e5�e.�e5!f6Wf!�f.�f0�f&g,7gdg'~g
�g�g8�g#	h$-hRh"Yh:|h��hH\i"�i(�i$�iEj1\j��jG$k�lk l>l*Yl8�l$�l�l�lm#m�Cm��m�n�n�n�no*oEoB^o�o�o�o�o�o%p)p1pEp\p.xp��p*;q fq��q*Nr!yr0�r3�r<s=s+Xs.�s8�s/�s1t"Nt8qt"�t2�tu u(=u fu
�u*�u�u&�u�u
v#v5vRvkv�v�v�v��vATw"�w�w4�w5xAxSxpx�x�xF�x y1(y%Zy�y��yE?zE�zo�z ;{ \{�}{8
|'F|Jn|��|ca}/�}N�}ED~,�~"�~#�~-�~+,)X&�����3���ǁZ�z�������˂Ԃ�+	�,5�3b���1��ԃ(�#�+7�"c�+��"�� Մ��?
�%J�p�������ą���.�(L� u�}���)�/C�0s�����!҉���!	�+�A�W�p���%��NJ܊���j�K��@΋-��=�EʌO�0`�/��5��'��.�3N�-�������������!ΐ�$�,1�(^����|���-������ؓ���(�%H�*n�+��Ŕ'�$	�,.�$[�'��/��0ؕ(	�,2�_�	z�B��1ǖ��7�2K�~�r��>q�1��=�I �4j���#��=�. �+O�?{�D��@�+A�1m�N��I�I8�5��5��;�?*�Bj�H��H��-?�"m�H���ٞKc���HʟB�)V�C��:Ġ.��>.�2m�=��<ޡ@�F\�H��U�$B� g�-��>��=��U3�J��WԤL,�Ay�6��C�86�0o�0��4Ѧ �2'�Z�:[�6��5ͨ.�2��R�*�2F�1y�#��>ϯ>��M�*�=6�0t�M��9�0-�"^�&��!��3ʲJ��oI�1��t�8`�A��۶�>��_;�
��
��
��
��
Ƿҷ
�
�	����
$�/�$;�$`�1��.��+�5�&H�+o�M�����&�
3�"A�.d���
����Bɺ)�56�0l���������ŻԻ�
����7�!:�(\�"��!��&ʼ"�.�,C�'p�����8ӽ'�.4�%c�2��+��� �&� C�(d���%�� ʿ �5�!B�d�m�
��;��<�*�2�O�	j�t���������:�?�_�u�����&������-��
,�<:�Aw�(������/�G�c�o�=����������7�,P�}�H��#����%�/C�0s�.����&��3�
F�Q�h�u���0����$�=&�%d�#��-��$��,�.�3M�#��������#���:�X�3t�&��#����+�2>�2q���������/����8;�/t�"��9��K�%M�$s�&��$����#�D%�j�'q����������������1�$O�t�@{�+�����
	�$�<�!T�v�����D��+��/$�
T�6_�0������/���"0�&S�(z�%��%����$���
-�;�.R���������2��$�<�(P�y�3������/�� �+6�b�q�$��&��$��'��,�,J�w���>��,��#
�.�$F�,k�I��J��+-�(Y�)��.��/��,�-8�)f�&��'��%��6�9<�v�$��'�� ��:��"+�+N�)z�#����-��%�6<�5s�;����"�'(�P�;k�0��"��%��/!�2Q���!����:�� �-1�!_�(��+��8���!,�4N�0����)��2��6)�)`�E������&��G"�Hj�B�����'2�!Z�#|����������&�C�^�s���
��������	��1�J�d����'��������.�4�F�(O�2x�!�� ����,�5�8�
V�d�
j�0u�����5���� �&�.�%M�1s���,����>�?D���&��.����1��0�D�T�!d�������%��%��$�>�
R�
`�
k�
y� ��#����&��	��)�*�$I�<n�!�������6!�,X���;��#��M�&P�-w�'��������"/�-R���+��&��*��5�6N���!��&��$���"�27�j�m�r�I��F��#�6�&U�|�����������0�1G�#y�#��+��+��,�9F�2����$����*�2-�.`������*���-�9�
P�^�'~�1���&��*�G�$Z��#��&����3�%8�*^�%������(�-,�9Z�6��:��,�0G�/x���7��*��. �7O�;��0�1�;&�b�%z���)��3�6
�:D�
�����9���5	�-?�"m��� ���-���%:� `�5��$���7��@/%p!�C�*�4'0\��.�-�*�>7�G2O/�%�F�12#d�!��(�
-"/P,�	�"�)�# >_2y1���#/(-X.�-��:I=A�"��	�		+	J	i	q	�	�	,�	+�	
!.
 P
q
�
�
�
�
#�
$>R f���	���B\5x#�,��
0
A
*Z
!�
�
�
G�
 0(Qz�-�,��4'E,m'����
 #D'FlE�D�E>A�7�6�75=m>��$C,HpC�F�DV9t ��
�$�#)M#f�*�*�XY|FRD[/K ����^��j\����O6��7#�,"����V�}k#@{n���f�K�	����={<n��Ay?�DK��
 Iz�T�h�n���9�����f�yu��c�l~��!`��<�R���@�>h>���]��W�RG���IQ�av���'0��9�k���%b� "�����������s�w�o8(�� ��f'Tr��4�ee�����F��A��a"��&�N&����C�����:	���8.H�N�����9�h��d���-4��p�b7U�}������$����H�����a�=�PJ����V������aA�$m�c2��e=��~�(����-S@���yDq�UP��|�����	Z]&[,�%3�
�[������*��t�#�'I�P}~Cr��)C:��UFL'�;�]j��������+z��C%mzi���94���0U����|p�B_�R��x�p7�xn�>S�A�7����������f�+�}��
Y���c7���6^���
���2��EB��~������i���������v��dl�����
(�,9O���z�i����v�{�H?�k���5�t����R!�2���W?O��t���B��k:L�.�\��X\��/
��`�i��6�L!��	:�u���Eq�%�*o���&?;��>����h��
�1
�I��-mA�{H��T�
�P��'�o��B0�d�����<1s�Q��]�3�*X��=~M�dr<�)s�bMO�<?^�����rZ������F���eQ��Xw�8/J�b����V|Y��������/���.N�K���-I���F��D�)>`��4M_8�_������g�$n���x���`����h��38u\V��	��)�J�����_��"sl��]����
5+c���\���z��Z6Q
MX�r����#6����1D��5;o1(�t��S������������jG/��*�vuk�Hv��C��!�YM�gW��t$:�������`�qleYm�@%W��N��E��{�B3�y�-S�E�y��s����g����g.��mp0��jG����ww^�"��Q2�!4��;UxL�[�da@���5��� i^�J���������*��x���Gc���b1�0��PLE���(5�$	����������J��+�����[���
WS=Z�_O+��������T��jgp)�l���2q#��f�3}�Z;�u������K�VN����,qT�|.w�G,&o��
Enter the user ID.  End with an empty line: 
Not enough random bytes available.  Please do some other work to give
the OS a chance to collect more entropy! (Need %d more bytes)

Pick an image to use for your photo ID.  The image must be a JPEG file.
Remember that the image is stored within your public key.  If you use a
very large picture, your key will become very large as well!
Keeping the image close to 240x288 is a good size to use.

Supported algorithms:

You need a user ID to identify your key; the software constructs the user ID
from the Real Name, Comment and Email Address in this form:
    "Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>"

                aka "%s"               using %s key %s
              imported: %lu             unchanged: %lu
           new subkeys: %lu
          new user IDs: %lu
          not imported: %lu
          w/o user IDs: %lu
         "%s": preference for cipher algorithm %s
         "%s": preference for compression algorithm %s
         "%s": preference for digest algorithm %s
         (subkey on main key ID %s)         It is not certain that the signature belongs to the owner.
         The signature is probably a FORGERY.
         There is no indication that the signature belongs to the owner.
         This could mean that the signature is forged.
         algorithms on these user IDs:
        new signatures: %lu
      "%s"
      Card serial no. =      Key fingerprint =      Subkey fingerprint:      secret keys read: %lu
      skipped new keys: %lu
      user IDs cleaned: %lu
     Subkey fingerprint:    signatures cleaned: %lu
   (%c) Finished
   (%c) Toggle the authenticate capability
   (%c) Toggle the encrypt capability
   (%c) Toggle the sign capability
   (%d) DSA (set your own capabilities)
   (%d) DSA (sign only)
   (%d) DSA and Elgamal
   (%d) Elgamal (encrypt only)
   (%d) RSA (encrypt only)
   (%d) RSA (set your own capabilities)
   (%d) RSA (sign only)
   (%d) RSA and RSA (default)
   (0) I will not answer.%s
   (1) I have not checked at all.%s
   (1) Signature key
   (2) Encryption key
   (2) I have done casual checking.%s
   (3) Authentication key
   (3) I have done very careful checking.%s
   new key revocations: %lu
  %d = I do NOT trust
  %d = I don't know or won't say
  %d = I trust fully
  %d = I trust marginally
  %d = I trust ultimately
  Unable to sign.
  aka "%s"
  m = back to the main menu
  q = quit
  s = skip this key
  secret keys imported: %lu
 (main key ID %s) (non-exportable) (non-revocable) Primary key fingerprint: secret keys unchanged: %lu
"%s" not a key ID: skipping
"%s" was already locally signed by key %s
"%s" was already signed by key %s
# List of assigned trustvalues, created %s
# (Use "gpg --import-ownertrust" to restore them)
%d Admin PIN attempts remaining before card is permanently locked
%d bad signatures
%d keys processed (%d validity counts cleared)
%d marginal(s) needed, %d complete(s) needed, %s trust model
%d signatures not checked due to errors
%d signatures not checked due to missing keys
%d user IDs without valid self-signatures detected
%lu keys cached (%lu signatures)
%lu keys cached so far (%lu signatures)
%lu keys processed so far
%s ...
%s does not support handler version %d
%s does not yet work with %s
%s encrypted data
%s encrypted session key
%s encryption will be used
%s is the new one
%s is the unchanged one
%s keys may be between %u and %u bits long.
%s keysizes must be in the range %u-%u
%s makes no sense with %s!
%s not allowed with %s!
%s signature, digest algorithm %s
%s.
%s/%s encrypted for: "%s"
%s/%s signature from: "%s"
%s: There is limited assurance this key belongs to the named user
%s: There is no assurance this key belongs to the named user
%s: directory does not exist!
%s: error reading free record: %s
%s: error reading version record: %s
%s: error updating version record: %s
%s: error writing dir record: %s
%s: error writing version record: %s
%s: failed to append a record: %s
%s: failed to create hashtable: %s
%s: failed to create version record: %s%s: failed to zero a record: %s
%s: invalid file version %d
%s: invalid trustdb
%s: invalid trustdb created
%s: keyring created
%s: not a trustdb file
%s: skipped: %s
%s: skipped: public key already present
%s: skipped: public key is disabled
%s: trustdb created
%s: unknown suffix
%s: version record with recnum %lu
%s:%d: deprecated option "%s"
%s:%d: invalid auto-key-locate list
%s:%d: invalid export options
%s:%d: invalid import options
%s:%d: invalid keyserver options
%s:%d: invalid list options
%s:%d: invalid verify options
%u-bit %s key, ID %s, created %s(No description given)
(Probably you want to select %d here)
(This is a sensitive revocation key)
(sensitive)(unless you specify the key by fingerprint)
(you may have used the wrong program for this task)
* The `sign' command may be prefixed with an `l' for local signatures (lsign),
  a `t' for trust signatures (tsign), an `nr' for non-revocable signatures
  (nrsign), or any combination thereof (ltsign, tnrsign, etc.).
--clearsign [filename]--decrypt [filename]--edit-key user-id [commands]--encrypt [filename]--lsign-key user-id--output doesn't work for this command
--sign --encrypt [filename]--sign --symmetric [filename]--sign [filename]--sign-key user-id--store [filename]--symmetric --encrypt [filename]--symmetric --sign --encrypt [filename]--symmetric [filename]-k[v][v][v][c] [user-id] [keyring]... this is a bug (%s:%d:%s)
1 bad signature
1 signature not checked due to a missing key
1 signature not checked due to an error
1 user ID without valid self-signature detected
10 translator see trustdb.c:uid_trust_string_fixed@
(See the man page for a complete listing of all commands and options)
@
Examples:

 -se -r Bob [file]          sign and encrypt for user Bob
 --clearsign [file]         make a clear text signature
 --detach-sign [file]       make a detached signature
 --list-keys [names]        show keys
 --fingerprint [names]      show fingerprints
@
Options:
 @Commands:
 ASCII armored output forced.
Admin commands are allowed
Admin commands are not allowed
Admin-only command
Answer "yes" (or just "y") if it is okay to generate the sub key.Answer "yes" if it is okay to delete the subkeyAnswer "yes" if it is okay to overwrite the fileAnswer "yes" if you really want to delete this user ID.
All certificates are then also lost!Answer "yes" if you want to sign ALL the user IDsAnswer "yes" or "no"Are you sure that you want to sign this key with your
key "%s" (%s)
Are you sure you still want to add it? (y/N) Are you sure you still want to revoke it? (y/N) Are you sure you still want to sign it? (y/N) Are you sure you want to appoint this key as a designated revoker? (y/N) Are you sure you want to delete it? (y/N) Are you sure you want to replace it? (y/N) Are you sure you want to use it? (y/N) AuthenticateBAD signature from "%s"CA fingerprint: CRC error; %06lX - %06lX
Can't check signature: %s
Can't edit this key: %s
Can't open `%s': %s
CancelCardholder's given name: Cardholder's surname: Certificates leading to an ultimately trusted key:
CertifyChange (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? Change (N)ame, (C)omment, (E)mail or (Q)uit? Change the preferences of all user IDs (or just of the selected ones)
to the current list of preferences.  The timestamp of all affected
self-signatures will be advanced by one second.
Changing expiration time for a subkey.
Changing expiration time for the primary key.
Cipher: Command expects a filename argument
Comment: Compression: Create a designated revocation certificate for this key? (y/N) Create a revocation certificate for this key? (y/N) Create a revocation certificate for this signature? (y/N) Critical preferred keyserver: Critical signature notation: Critical signature policy: Current allowed actions: Current recipients:
DSA key %s requires a %u bit or larger hash
DSA key %s uses an unsafe (%u bit) hash
DSA requires the hash length to be a multiple of 8 bits
Delete this good signature? (y/N/q)Delete this invalid signature? (y/N/q)Delete this key from the keyring? (y/N) Delete this unknown signature? (y/N/q)Deleted %d signature.
Deleted %d signatures.
Detached signature.
Digest: Displaying %s photo ID of size %ld for key %s (uid %d)
Do you really want to delete the selected keys? (y/N) Do you really want to delete this key? (y/N) Do you really want to do this? (y/N) Do you really want to revoke the entire key? (y/N) Do you really want to revoke the selected subkeys? (y/N) Do you really want to revoke this subkey? (y/N) Do you really want to set this key to ultimate trust? (y/N) Do you want to issue a new signature to replace the expired one? (y/N) Do you want to promote it to a full exportable signature? (y/N) Do you want to promote it to an OpenPGP self-signature? (y/N) Do you want to sign it again anyway? (y/N) Do you want your signature to expire at the same time? (Y/n) ERROR: Email address: EncryptEnter Admin PIN: Enter JPEG filename for photo ID: Enter New Admin PIN: Enter New PIN: Enter PIN: Enter an optional description; end it with an empty line:
Enter new filenameEnter number(s), N)ext, or Q)uit > Enter passphrase
Enter passphrase: Enter the name of the key holderEnter the new passphrase for this secret key.

Enter the notation: Enter the required value as shown in the prompt.
It is possible to enter a ISO date (YYYY-MM-DD) but you won't
get a good error response - instead the system tries to interpret
the given value as an interval.Enter the size of the keyEnter the user ID of the addressee to whom you want to send the message.Enter the user ID of the designated revoker: Enter your preferred keyserver URL: Error reading backup key from `%s': %s
Error: Combined name too long (limit is %d characters).
Error: Double spaces are not allowed.
Error: Login data too long (limit is %d characters).
Error: Only plain ASCII is currently allowed.
Error: Private DO too long (limit is %d characters).
Error: The "<" character may not be used.
Error: The trustdb is corrupted.
Error: URL too long (limit is %d characters).
Error: invalid characters in preference string.
Error: invalid formatted fingerprint.
Error: invalid length of preference string.
Error: invalid response.
Expired signature from "%s"Features: File `%s' exists. Give the name of the file to which the signature appliesGo ahead and type your message ...
Good signature from "%s"Hash: Hint: Select the user IDs to sign
Hit return when ready or enter 'c' to cancel: How carefully have you verified the key you are about to sign actually belongs
to the person named above?  If you don't know what to answer, enter "0".
How much do you trust that this key actually belongs to the named user?
I have checked this key casually.
I have checked this key very carefully.
I have not checked this key at all.
IDEA cipher unavailable, optimistically attempting to use %s instead
If that does not work, please consult the manual
If you like, you can enter a text describing why you issue this
revocation certificate.  Please keep this text concise.
An empty line ends the text.
If you want to use this untrusted key anyway, answer "yes".In general it is not a good idea to use the same key for signing and
encryption.  This algorithm should only be used in certain domains.
Please consult your security expert first.Invalid character in comment
Invalid character in name
Invalid command  (try "help")
Invalid key %s made valid by --allow-non-selfsigned-uid
Invalid passphrase; please try againInvalid selection.
Is this correct? (y/N) Is this okay? (y/N) Is this photo correct (y/N/q)? It is NOT certain that the key belongs to the person named
in the user ID.  If you *really* know what you are doing,
you may answer the next question with yes.
It's up to you to assign a value here; this value will never be exported
to any 3rd party.  We need it to implement the web-of-trust; it has nothing
to do with the (implicitly created) web-of-certificates.Key %s is already revoked.
Key available at: Key does not expire at all
Key expires at %s
Key generation canceled.
Key generation failed: %s
Key has been compromisedKey has only stub or on-card key items - no passphrase to change.
Key is no longer usedKey is protected.
Key is revoked.Key is supersededKey is valid for? (0) Key not changed so no update needed.
KeyringKeyserver no-modifyLanguage preferences: Login data (account name): Make off-card backup of encryption key? (Y/n) N  to change the name.
C  to change the comment.
E  to change the email address.
O  to continue with key generation.
Q  to quit the key generation.NOTE: %s is not available in this version
NOTE: %s is not for normal use!
NOTE: There is no guarantee that the card supports the requested size.
      If the key generation does not succeed, please check the
      documentation of your card to see what sizes are allowed.
NOTE: This feature is not available in %s
NOTE: This key is not protected!
NOTE: a key's S/N does not match the card's one
NOTE: backup of card key saved to `%s'
NOTE: creating subkeys for v3 keys is not OpenPGP compliant
NOTE: key has been revokedNOTE: keys are already stored on the card!
NOTE: no default option file `%s'
NOTE: old default options file `%s' ignored
NOTE: primary key is online and stored on card
NOTE: secondary key is online and stored on card
NOTE: secret key %s expired at %s
NOTE: sender requested "for-your-eyes-only"
NOTE: signature key %s expired %s
NOTE: simple S2K mode (0) is strongly discouraged
NOTE: trustdb not writable
Name may not start with a digit
Name must be at least 5 characters long
Need the secret key to do this.
NnCcEeOoQqNo corresponding signature in secret ring
No help availableNo help available for `%s'No reason specifiedNo subkey with index %d
No such user ID.
No trust value assigned to:
No user ID with hash %s
No user ID with index %d
Not a valid email address
Not signed by you.
Notations: Note that this key cannot be used for encryption.  You may want to use
the command "--edit-key" to generate a subkey for this purpose.
Note: Signer's address `%s' does not match DNS entry
Note: This key has been disabled.
Note: This key has expired!
Note: Verified signer's address is `%s'
Note: signatures using the %s algorithm are rejected
Nothing deleted.
Nothing to sign with key %s
OpenPGP card no. %s detected
OpenPGP card not available: %s
Overwrite? (y/N) Owner trust may not be set while using a user provided trust database
PIN callback returned error: %s
PIN for CHV%d is too short; minimum length is %d
PIN not correctly repeated; try againPlease correct the error first
Please decide how far you trust this user to correctly verify other users' keys
(by looking at passports, checking fingerprints from different sources, etc.)
Please don't put the email address into the real name or the comment
Please enter a domain to restrict this signature, or enter for none.
Please enter a new filename. If you just hit RETURN the default
file (which is shown in brackets) will be used.Please enter an optional commentPlease enter name of data file: Please enter the depth of this trust signature.
A depth greater than 1 allows the key you are signing to make
trust signatures on your behalf.
Please enter the passphrase; this is a secret sentence 
Please fix this possible security flaw
Please insert the card and hit return or enter 'c' to cancel: Please note that the factory settings of the PINs are
   PIN = `%s'     Admin PIN = `%s'
You should change them using the command --change-pin
Please note that the shown key validity is not necessarily correct
unless you restart the program.
Please remove selections from the secret keys.
Please remove the current card and insert the one with serial number:
   %.*s
Please repeat the last passphrase, so you are sure what you typed in.Please report bugs to <gnupg-bugs@gnu.org>.
Please select at most one subkey.
Please select exactly one user ID.
Please select the reason for the revocation:
Please select the type of key to generate:
Please select what kind of key you want:
Please select where to store the key:
Please specify how long the key should be valid.
         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years
Please specify how long the signature should be valid.
         0 = signature does not expire
      <n>  = signature expires in n days
      <n>w = signature expires in n weeks
      <n>m = signature expires in n months
      <n>y = signature expires in n years
Please use the command "toggle" first.
Please wait, entropy is being gathered. Do some work if it would
keep you from getting bored, because it will improve the quality
of the entropy.
Possible actions for a %s key: Preferred keyserver: Primary key fingerprint:Private DO data: Proceed? (y/N) Pubkey: Public key is disabled.
Quit without saving? (y/N) RSA modulus missing or not of size %d bits
RSA prime %s missing or not of size %d bits
RSA public exponent missing or larger than %d bits
Real name: Really create the revocation certificates? (y/N) Really create? (y/N) Really delete this self-signature? (y/N)Really move the primary key? (y/N) Really remove all selected user IDs? (y/N) Really remove this user ID? (y/N) Really revoke all selected user IDs? (y/N) Really revoke this user ID? (y/N) Really sign all user IDs? (y/N) Really sign? (y/N) Really update the preferences for the selected user IDs? (y/N) Really update the preferences? (y/N) Reason for revocation: %s
Repeat passphrase
Repeat passphrase: Repeat this PIN: Replace existing key? (y/N) Replace existing keys? (y/N) Requested keysize is %u bits
Reset Code is too short; minimum length is %d
Reset Code not or not anymore available
Revocation certificate created.
Revocation certificate created.

Please move it to a medium which you can hide away; if Mallory gets
access to this certificate he can use it to make your key unusable.
It is smart to print this certificate and store it away, just in case
your media become unreadable.  But have some caution:  The print system of
your machine might store the data and make it available to others!
Save changes? (y/N) Secret key is available.
Secret parts of primary key are not available.
Secret parts of primary key are stored on-card.
Select the algorithm to use.

DSA (aka DSS) is the Digital Signature Algorithm and can only be used
for signatures.

Elgamal is an encrypt-only algorithm.

RSA may be used for signatures or encryption.

The first (primary) key must always be a key which is capable of signing.Set preference list to:
Sex ((M)ale, (F)emale or space): SignSign it? (y/N) Signature does not expire at all
Signature expired %s
Signature expires %s
Signature expires at %s
Signature is valid for? (%s) Signature made %s
Signature made %s using %s key ID %s
Signature notation: Signature policy: SsEeAaQqSubkey %s is already revoked.
Syntax: gpg [options] [files]
Sign, check, encrypt or decrypt
Default operation depends on the input data
Syntax: gpgv [options] [files]
Check signatures against known trusted keys
The card will now be re-configured to generate a key of %u bits
The minimum trust level for this key is: %s

The random number generator is only a kludge to let
it run - it is in no way a strong RNG!

DON'T USE ANY DATA GENERATED BY THIS PROGRAM!!

The self-signature on "%s"
is a PGP 2.x-style signature.
The signature is not valid.  It does make sense to remove it from
your keyring.The signature will be marked as non-exportable.
The signature will be marked as non-revocable.
There are no preferences on a PGP 2.x-style user ID.
This JPEG is really large (%d bytes) !
This command is not allowed while in %s mode.
This command is only available for version 2 cards
This is a secret key! - really delete? (y/N) This is a signature which binds the user ID to the key. It is
usually not a good idea to remove such a signature.  Actually
GnuPG might not be able to use this key anymore.  So do this
only if this self-signature is for some reason not valid and
a second one is available.This is a valid signature on the key; you normally don't want
to delete this signature because it may be important to establish a
trust connection to the key or another key certified by this key.This key belongs to us
This key has been disabledThis key has expired!This key is due to expire on %s.
This key is not protected.
This key may be revoked by %s key %sThis key probably belongs to the named user
This key was revoked on %s by %s key %s
This signature can't be checked because you don't have the
corresponding key.  You should postpone its deletion until you
know which key was used because this signing key might establish
a trust connection through another already certified key.This signature expired on %s.
This will be a self-signature.
This would make the key unusable in PGP 2.x.
To be revoked by:
To build the Web-of-Trust, GnuPG needs to know which keys are
ultimately trusted - those are usually the keys for which you have
access to the secret key.  Answer "yes" to set this key to
ultimately trusted
Total number processed: %lu
URL to retrieve public key: UncompressedUnknown signature type `%s'
Unknown weak digest '%s'
Usage: gpg [options] [files] (-h for help)Usage: gpgv [options] [files] (-h for help)Use this key anyway? (y/N) User ID "%s" compacted: %s
User ID "%s" is expired.User ID "%s" is not self-signed.User ID "%s" is revoked.User ID "%s" is signable.  User ID "%s": %d signature removed
User ID "%s": %d signatures removed
User ID "%s": already clean
User ID "%s": already minimized
User ID is no longer validWARNING: WARNING: "%s" is a deprecated command - do not use it
WARNING: "%s" is a deprecated option
WARNING: %s overrides %s
WARNING: 2 files with confidential information exists.
WARNING: Elgamal sign+encrypt keys are deprecated
WARNING: This is a PGP 2.x-style key.  Adding a designated revoker may cause
         some versions of PGP to reject this key.
WARNING: This is a PGP2-style key.  Adding a photo ID may cause some versions
         of PGP to reject this key.
WARNING: This key has been revoked by its designated revoker!
WARNING: This key has been revoked by its owner!
WARNING: This key is not certified with a trusted signature!
WARNING: This key is not certified with sufficiently trusted signatures!
WARNING: This subkey has been revoked by its owner!
WARNING: Using untrusted key!
WARNING: We do NOT trust this key!
WARNING: Weak key detected - please change passphrase again.
WARNING: Your encryption subkey expires soon.
WARNING: `%s' is an empty file
WARNING: a user ID signature is dated %d seconds in the future
WARNING: appointing a key as a designated revoker cannot be undone!
WARNING: cipher algorithm %s not found in recipient preferences
WARNING: digest algorithm %s is deprecated
WARNING: encrypted message has been manipulated!
WARNING: forcing compression algorithm %s (%d) violates recipient preferences
WARNING: forcing digest algorithm %s (%d) violates recipient preferences
WARNING: forcing symmetric cipher %s (%d) violates recipient preferences
WARNING: invalid size of random_seed file - not used
WARNING: key %s contains preferences for unavailable
WARNING: key %s may be revoked: fetching revocation key %s
WARNING: key %s may be revoked: revocation key %s not present.
WARNING: keyserver handler from a different version of GnuPG (%s)
WARNING: keyserver option `%s' is not used on this platform
WARNING: message was encrypted with a weak key in the symmetric cipher.
WARNING: message was not integrity protected
WARNING: multiple plaintexts seen
WARNING: multiple signatures detected.  Only the first will be checked.
WARNING: no user ID has been marked as primary.  This command may
              cause a different user ID to become the assumed primary.
WARNING: not a detached signature; file '%s' was NOT verified!
WARNING: nothing exported
WARNING: options in `%s' are not yet active during this run
WARNING: potentially insecure symmetrically encrypted session key
WARNING: program may create a core file!
WARNING: recipients (-r) given without using public key encryption
WARNING: secret key %s does not have a simple SK checksum
WARNING: signature digest conflict in message
WARNING: signing subkey %s has an invalid cross-certification
WARNING: signing subkey %s is not cross-certified
WARNING: the signature will not be marked as non-exportable.
WARNING: the signature will not be marked as non-revocable.
WARNING: this key might be revoked (revocation key not present)
WARNING: unable to %%-expand notation (too large).  Using unexpanded.
WARNING: unable to %%-expand policy URL (too large).  Using unexpanded.
WARNING: unable to %%-expand preferred keyserver URL (too large).  Using unexpanded.
WARNING: unable to fetch URI %s: %s
WARNING: unable to parse URI %s
WARNING: unable to refresh key %s via %s: %s
WARNING: unable to remove temp directory `%s': %s
WARNING: unable to remove tempfile (%s) `%s': %s
WARNING: unsafe enclosing directory ownership on configuration file `%s'
WARNING: unsafe enclosing directory ownership on homedir `%s'
WARNING: unsafe enclosing directory permissions on configuration file `%s'
WARNING: unsafe enclosing directory permissions on homedir `%s'
WARNING: unsafe ownership on configuration file `%s'
WARNING: unsafe ownership on homedir `%s'
WARNING: unsafe permissions on configuration file `%s'
WARNING: unsafe permissions on homedir `%s'
WARNING: using experimental cipher algorithm %s
WARNING: using experimental digest algorithm %s
WARNING: using experimental public key algorithm %s
WARNING: using insecure memory!
WARNING: using insecure random number generator!!
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
What keysize do you want for the Authentication key? (%u) What keysize do you want for the Encryption key? (%u) What keysize do you want for the Signature key? (%u) What keysize do you want for the subkey? (%u) What keysize do you want? (%u) When you sign a user ID on a key, you should first verify that the key
belongs to the person named in the user ID.  It is useful for others to
know how carefully you verified this.

"0" means you make no particular claim as to how carefully you verified the
    key.

"1" means you believe the key is owned by the person who claims to own it
    but you could not, or did not verify the key at all.  This is useful for
    a "persona" verification, where you sign the key of a pseudonymous user.

"2" means you did casual verification of the key.  For example, this could
    mean that you verified the key fingerprint and checked the user ID on the
    key against a photo ID.

"3" means you did extensive verification of the key.  For example, this could
    mean that you verified the key fingerprint with the owner of the key in
    person, and that you checked, by means of a hard to forge document with a
    photo ID (such as a passport) that the name of the key owner matches the
    name in the user ID on the key, and finally that you verified (by exchange
    of email) that the email address on the key belongs to the key owner.

Note that the examples given above for levels 2 and 3 are *only* examples.
In the end, it is up to you to decide just what "casual" and "extensive"
mean to you when you sign other keys.

If you don't know what the right answer is, answer "0".You are about to revoke these signatures:
You are using the `%s' character set.
You can't change the expiration date of a v3 key
You can't delete the last user ID!
You did not specify a user ID. (you may use "-r")
You don't want a passphrase - this is probably a *bad* idea!

You don't want a passphrase - this is probably a *bad* idea!
I will do it anyway.  You can change your passphrase at any time,
using this program with the option "--edit-key".

You have signed these user IDs on key %s:
You may not add a designated revoker to a PGP 2.x-style key.
You may not add a photo ID to a PGP2-style key.
You may not make an OpenPGP signature on a PGP 2.x key while in --pgp2 mode.
You may try to re-create the trustdb using the commands:
You may want to change its expiration date too.
You must select at least one key.
You must select at least one user ID.
You must select exactly one key.
You need a Passphrase to protect your secret key.

You need a passphrase to unlock the secret key for
user: "%s"
You need a passphrase to unlock the secret key for user:
"%.*s"
%u-bit %s key, ID %s, created %s%s
You selected this USER-ID:
    "%s"

You should specify a reason for the certification.  Depending on the
context you have the ability to choose from this list:
  "Key has been compromised"
      Use this if you have a reason to believe that unauthorized persons
      got access to your secret key.
  "Key is superseded"
      Use this if you have replaced this key with a newer one.
  "Key is no longer used"
      Use this if you have retired this key.
  "User ID is no longer valid"
      Use this to state that the user ID should not longer be used;
      this is normally used to mark an email address invalid.
Your current signature on "%s"
has expired.
Your current signature on "%s"
is a local signature.
Your decision? Your selection? Your selection? (enter `?' for more information): Your system can't display dates beyond 2038.
However, it will be correctly handled up to 2106.
[  full  ][  undef ][ expired][ revoked][ unknown][User ID not found][filename][marginal][not set][revocation][self-signature][ultimate][uncertain]`%s' already compressed
`%s' is not a JPEG file
`%s' is not a regular file - ignored
`%s' is not a valid character set
`%s' is not a valid long keyID
`%s' is not a valid signature expiration
about to export an unprotected subkey
access to admin commands is not configured
action `%s' not supported with keyserver scheme `%s'
add a key to a smartcardadd a photo IDadd a revocation keyadd a subkeyadd a user IDambiguous option `%s'
anonymous recipient; trying secret key %s ...
armor header: armor: %s
assuming %s encrypted data
assuming bad signature from key %s due to an unknown critical bit
assuming signed data in `%s'
automatically retrieve keys when verifying signaturesautomatically retrieved `%s' via %s
bad MPIbad URIbad certificatebad keybad passphrasebad public keybad secret keybad signaturebe somewhat more quietbinarybuild_packet failed: %s
cCcaching keyring `%s'
can't access %s - invalid OpenPGP card?
can't access `%s': %s
can't close `%s': %s
can't connect to `%s': %s
can't create `%s': %s
can't create backup file `%s': %s
can't create directory `%s': %s
can't create lock for `%s'
can't disable core dumps: %s
can't do this in batch mode
can't do this in batch mode without "--yes"
can't gen prime with pbits=%u qbits=%u
can't generate a prime with less than %d bits
can't handle public key algorithm %d
can't handle text lines longer than %d characters
can't handle this ambiguous signature data
can't lock `%s'
can't lock `%s': %s
can't open `%s'
can't open `%s': %s
can't open signed data `%s'
can't open the keyringcan't query passphrase in batch mode
can't read `%s': %s
can't stat `%s': %s
can't use a symmetric ESK packet due to the S2K mode
can't write `%s': %s
canceledcancelled by user
cancel|cancelcannot appoint a PGP 2.x style key as a designated revoker
cannot avoid weak key for symmetric cipher; tried %d times!
card does not support digest algorithm %s
card is permanently locked!
card reader not available
card-no: change URL to retrieve keychange a CA fingerprintchange a card's PINchange card holder's namechange card holder's sexchange data on a cardchange the expiration date for the key or selected subkeyschange the language preferenceschange the login namechange the ownertrustchange the passphrasecheck signatureschecking created signature failed: %s
checking the trustdb
checksum errorcipher algorithm %d%s is unknown or disabled
colon missingcompact unusable user IDs and remove all signatures from keycompact unusable user IDs and remove unusable signatures from keycompletes-needed must be greater than 0
conflicting commands
could not parse keyserver URL
create a public key when importing a secret keycreate ascii armored outputcreated: %screation timestamp missing
data not saved; use option "--output" to save it
dearmoring failed: %s
decrypt data (default)decryption failed: %s
decryption okay
delete selected subkeysdelete selected user IDsdelete signatures from the selected user IDsdeleting keyblock failed: %s
depth: %d  valid: %3d  signed: %3d  trust: %d-, %dq, %dn, %dm, %df, %du
directory `%s' created
disable keydisableddisplay photo IDs during key listingsdisplay photo IDs during signature verificationdo not clear the ownertrust values during importdo not delete temporary files after using themdo not make any changesdo not update the trustdb after importelevate the trust of signatures with valid PKA dataenable keyenarmoring failed: %s
encrypt dataencrypted with %lu passphrases
encrypted with %s key, ID %s
encrypted with %u-bit %s key, ID %s, created %s
encrypted with 1 passphrase
encrypted with unknown algorithm %d
encrypting a message in --pgp2 mode requires the IDEA cipher
encryption only with symmetric ciphererror allocating enough memory: %s
error changing size of key %d to %u bits: %s
error creating `%s': %s
error creating keyring `%s': %s
error creating passphrase: %s
error finding trust record in `%s': %s
error getting current key info: %s
error getting new PIN: %s
error in `%s': %s
error in trailer line
error reading `%s': %s
error reading application data
error reading fingerprint DO
error reading keyblock: %s
error reading secret keyblock "%s": %s
error retrieving CHV status from card
error writing `%s': %s
error writing key to card: %s
error writing keyring `%s': %s
error writing public keyring `%s': %s
error writing secret keyring `%s': %s
existing key will be replaced
expiredexpired: %sexpires: %sexport attribute user IDs (generally photo IDs)export keysexport keys to a key serverexport revocation keys marked as "sensitive"export signatures that are marked as local-onlyexporting secret keys not allowed
external keyserver calls are not supported in this build
external program calls are disabled due to unsafe options file permissions
failed to initialize the TrustDB: %s
failed to rebuild keyring cache: %s
failed to store the creation date: %s
failed to store the fingerprint: %s
failed to store the key: %s
failed to unprotect the subkey: %s
failed to use default PIN as %s: %s - disabling further default use
femalefetch the key specified in the card URLfile close errorfile create errorfile delete errorfile existsfile open errorfile read errorfile rename errorfile write errorfingerprint on card does not match requested one
flag the selected user ID as primaryforcedforcing symmetric cipher %s (%d) violates recipient preferences
fstat of `%s' failed in %s: %s
fstat(%d) failed in %s: %s
fullgeneral errorgenerate PGP 2.x compatible messagesgenerate a new key pairgenerate a revocation certificategenerate new keysgenerating key failed
generating new key
generating the deprecated 16-bit checksum for secret key protection
gpg-agent is not available in this session
gpg-agent protocol version %d is not supported
gpg/card> honor the PKA record set on a key when retrieving keyshonor the preferred keyserver URL set on the keyiImMqQsSimport keys from a key serverimport signatures that are marked as local-onlyimport/merge keysimporting secret keys not allowed
include revoked keys in search resultsinclude subkeys when searching by key IDinput line %u too long or missing LF
input line longer than %d characters
invalidinvalid S2K mode; must be 0, 1 or 3
invalid argumentinvalid armorinvalid armor header: invalid armor: line longer than %d characters
invalid auto-key-locate list
invalid clearsig header
invalid dash escaped line: invalid default preferences
invalid default-cert-level; must be 0, 1, 2, or 3
invalid export options
invalid fingerprintinvalid hash algorithm `%s'
invalid import options
invalid item `%s' in preference string
invalid keyringinvalid keyserver options
invalid keyserver protocol (us %d!=handler %d)
invalid list options
invalid min-cert-level; must be 1, 2, or 3
invalid packetinvalid passphraseinvalid personal cipher preferences
invalid personal compress preferences
invalid personal digest preferences
invalid radix64 character %02X skipped
invalid root packet detected in proc_tree()
invalid structure of OpenPGP card (DO 0x93)
invalid value
invalid verify options
it is strongly suggested that you update your preferences and
key "%s" not found on keyserver
key "%s" not found: %s
key %s has no user IDs
key %s marked as ultimately trusted
key %s occurs more than once in the trustdb
key %s was created %lu second in the future (time warp or clock problem)
key %s was created %lu seconds in the future (time warp or clock problem)
key %s: "%s" %d new signatures
key %s: "%s" %d new subkeys
key %s: "%s" %d new user IDs
key %s: "%s" %d signature cleaned
key %s: "%s" %d signatures cleaned
key %s: "%s" %d user ID cleaned
key %s: "%s" %d user IDs cleaned
key %s: "%s" 1 new signature
key %s: "%s" 1 new subkey
key %s: "%s" 1 new user ID
key %s: "%s" not changed
key %s: "%s" revocation certificate added
key %s: "%s" revocation certificate imported
key %s: %s
key %s: PGP 2.x style key - skipped
key %s: PKS subkey corruption repaired
key %s: accepted as trusted key
key %s: accepted non self-signed user ID "%s"
key %s: already in secret keyring
key %s: can't locate original keyblock: %s
key %s: can't read original keyblock: %s
key %s: direct key signature added
key %s: doesn't match our copy
key %s: duplicated user ID detected - merged
key %s: invalid direct key signature
key %s: invalid revocation certificate: %s - rejected
key %s: invalid revocation certificate: %s - skipped
key %s: invalid self-signature on user ID "%s"
key %s: invalid subkey binding
key %s: invalid subkey revocation
key %s: key material on-card - skipped
key %s: new key - skipped
key %s: no public key - can't apply revocation certificate
key %s: no public key for trusted key - skipped
key %s: no subkey for key binding
key %s: no subkey for key revocation
key %s: no subkey for subkey binding signature
key %s: no subkey for subkey revocation signature
key %s: no user ID
key %s: no user ID for signature
key %s: no valid user IDs
key %s: non exportable signature (class 0x%02X) - skipped
key %s: not protected - skipped
key %s: public key "%s" imported
key %s: public key not found: %s
key %s: removed multiple subkey binding
key %s: removed multiple subkey revocation
key %s: revocation certificate at wrong place - skipped
key %s: secret key imported
key %s: secret key not found: %s
key %s: secret key with invalid cipher %d - skipped
key %s: secret key without public key - skipped
key %s: skipped subkey
key %s: skipped user ID "%s"
key %s: subkey signature in wrong place - skipped
key %s: unexpected signature class (0x%02X) - skipped
key %s: unsupported public key algorithm
key %s: unsupported public key algorithm on user ID "%s"
key already exists
key export failed: %s
key generation completed (%d seconds)
key has been created %lu second in future (time warp or clock problem)
key has been created %lu seconds in future (time warp or clock problem)
key is not flagged as insecure - can't use it with the faked RNG!
key not found on keyserver
key operation not possible: %s
keyblock resource `%s': %s
keyring `%s' created
keyserver communications error: %s
keyserver did not send VERSION
keyserver errorkeyserver internal error
keyserver receive failed: %s
keyserver refresh failed: %s
keyserver search failed: %s
keyserver send failed: %s
keyserver timed out
keysize invalid; using %u bits
keysize rounded up to %u bits
line too longlist all available datalist and check key signatureslist key and user IDslist keyslist keys and fingerprintslist keys and signatureslist preferences (expert)list preferences (verbose)list secret keysmake a detached signaturemake timestamp conflicts only a warningmake_keysig_packet failed: %s
malemalformed CRC
malformed GPG_AGENT_INFO environment variable
malformed user idmarginalmarginals-needed must be greater than 1
max-cert-depth must be in the range from 1 to 255
menu to change or unblock the PINmove a backup key to a smartcardmove a key to a smartcardmoving a key signature to the correct place
nNnested clear text signatures
network errornevernever     new configuration file `%s' created
next trustdb check due at %s
nono = sign found in group definition `%s'
no cardno corresponding public key: %s
no datano default secret keyring: %s
no entropy gathering module detected
no handler for keyserver scheme `%s'
no keyserver action!
no keyserver known (use option --keyserver)
no need for a trustdb check
no need for a trustdb check with `%s' trust model
no need for a trustdb update with `%s' trust model
no photo viewer set
no remote program execution supported
no revocation keys found for "%s"
no secret key
no secret subkey for public subkey %s - ignoring
no signature found
no signed data
no such user idno ultimately trusted keys found
no valid OpenPGP data found.
no valid addressees
no writable keyring found: %s
no writable public keyring found: %s
no writable secret keyring found: %s
not a detached signature
not an OpenPGP cardnot encryptednot forcednot processednot supportednote: random_seed file is empty
note: random_seed file not updated
oOokay, we are the anonymous recipient.
okay|okayold encoding of the DEK is not supported
old style (PGP 2.x) signature
only accept updates to existing keysoperation is not possible without initialized secure memory
option file `%s': %s
original file name='%.*s'
ownertrust information cleared
ownertrust value missingpassphrase generated with unknown digest algorithm %d
passphrase not correctly repeated; try againplease do a --check-trustdb
please enter an optional but highly suggested email addressplease see %s for more information
please see http://www.gnupg.org/documentation/faqs.html for more information
please use "%s%s" instead
please wait while key is being generated ...
preference `%s' duplicated
premature eof (in CRC)
premature eof (in trailer)
premature eof (no CRC)
print the card statusproblem handling encrypted packet
problem with the agent - disabling agent use
prompt before overwritingprotection algorithm %d%s is not supported
protection digest %d is not supported
public and secret key created and signed.
public key %s is %lu second newer than the signature
public key %s is %lu seconds newer than the signature
public key %s not found: %s
public key decryption failed: %s
public key does not match secret key!
public key encrypted data: good DEK
public key is %s
public key not foundpublic key of ultimately trusted key %s not found
qQquitquit this menuquoted printable character in armor - probably a buggy MTA has been used
re-distribute this key to avoid potential algorithm mismatch problems
read error in `%s': %s
reading from `%s'
reading options from `%s'
reading public key failed: %s
reading stdin ...
reason for revocation: refreshing %d keys from %s
refreshing 1 key from %s
rejected by import filterremove as much as possible from key after importremove as much as possible from key during exportremove keys from the public keyringremove keys from the secret keyringremove the passphrase from exported subkeysremove unusable parts from key after importremove unusable parts from key during exportrenaming `%s' to `%s' failed: %s
repair damage from the pks keyserver during importrequesting key %s from %s
requesting key %s from %s server %s
resource limitresponse does not contain the RSA modulus
response does not contain the RSA public exponent
response does not contain the public key data
revocation comment: revoke key or selected subkeysrevoke selected user IDsrevoke signatures on the selected user IDsrevokedrevoked by your key %s on %s
revoked: %srounded up to %u bits
save and quitsearch for keys on a key serversearching for "%s" from %s
searching for "%s" from %s server %s
searching for names from %s
searching for names from %s server %s
secret key "%s" not found: %s
secret key %s: %s
secret key already stored on a card
secret key not availablesecret key parts are not available
secret parts of key are not available
select subkey Nselect user ID Nselected certification digest algorithm is invalid
selected cipher algorithm is invalid
selected compression algorithm is invalid
selected digest algorithm is invalid
selecting openpgp failed: %s
sending key %s to %s
sending key %s to %s server %s
set a notation for the selected user IDsset preference list for the selected user IDsset the preferred keyserver URL for the selected user IDsshow IETF standard notations during signature listingsshow IETF standard notations during signature verificationshow admin commandsshow all notations during signature listingsshow all notations during signature verificationshow expiration dates during signature listingsshow key fingerprintshow only the primary user ID in signature verificationshow policy URLs during signature listingsshow policy URLs during signature verificationshow preferred keyserver URLs during signature listingsshow preferred keyserver URLs during signature verificationshow revoked and expired subkeys in key listingsshow revoked and expired user IDs in key listingsshow revoked and expired user IDs in signature verificationshow selected photo IDsshow the keyring name in key listingsshow this helpshow user ID validity during key listingsshow user ID validity during signature verificationshow user-supplied notations during signature listingsshow user-supplied notations during signature verificationsign a keysign a key locallysign or edit a keysign selected user IDs [* see below for related commands]sign selected user IDs locallysign selected user IDs with a non-revocable signaturesign selected user IDs with a trust signaturesignature verification suppressed
signatures created so far: %lu
signed by your key %s on %s%s%s
signing failed: %s
signing subkey %s is already cross-certified
signing:skipped "%s": %s
skipped "%s": duplicated
skipped: public key already set
skipped: public key already set as default recipient
skipped: secret key already present
skipping block of type %d
skipping v3 self-signature on user ID "%s"
standalone revocation - use "gpg --import" to apply
standalone signature of class 0x%02x
storing key onto card failed: %s
subkey %s does not sign and so does not need to be cross-certified
subpacket of type %d has critical bit set
symmetric encryption of `%s' failed: %s
system error while calling external program: %s
take the keys from this keyringtextmodethe given certification policy URL is invalid
the given preferred keyserver URL is invalid
the given signature policy URL is invalid
the signature could not be verified.
Please remember that the signature file (.sig or .asc)
should be the first file given on the command line.
there is a secret key for public key "%s"!
this is a PGP generated Elgamal key which is not secure for signatures!this key has already been designated as a revoker
this may be caused by a missing self-signature
this message may not be usable by %s
this platform requires temporary files when calling external programs
timestamp conflicttoggle between the secret and public key listingstoggle the signature force PIN flagtoo many cipher preferences
too many compression preferences
too many digest preferences
too many entries in pk cache - disabled
trust database errortrust record %lu is not of requested type %d
trust record %lu, req type %d: read failed: %s
trust record %lu, type %d: write failed: %s
trust: %strustdb rec %lu: lseek failed: %s
trustdb rec %lu: write failed (n=%d): %s
trustdb transaction too large
trustdb: lseek failed: %s
trustdb: read failed (n=%d): %s
trustdb: sync failed: %s
trustlevel adjusted to FULL due to valid PKA info
trustlevel adjusted to NEVER due to bad PKA info
ultimateunable to display photo ID!
unable to execute external program
unable to execute program `%s': %s
unable to execute shell `%s': %s
unable to open JPEG file `%s': %s
unable to read external program response: %s
unable to set exec-path to %s
unable to update trustdb version record: write failed: %s
unable to use the IDEA cipher for all of the keys you are encrypting to.
unable to use unknown trust model (%d) - assuming %s trust model
unblock the PIN using a Reset Codeuncompressed|noneundefinedunexpected armor: unexpected dataunimplemented cipher algorithmunimplemented pubkey algorithmunknownunknown armor header: unknown cipher algorithmunknown compress algorithmunknown configuration item `%s'
unknown default recipient "%s"
unknown digest algorithmunknown key protection algorithm
unknown option `%s'
unknown packet typeunknown protection algorithm
unknown pubkey algorithmunknown signature classunknown versionunnatural exit of external program
unspecifiedunsupported URIunusable pubkey algorithmunusable public keyunusable secret keyupdate all keys from a keyserverupdate failed: %s
update secret failed: %s
update the trust databaseusage: %susage: gpg [options] use as output fileuse canonical text modeuse option "--delete-secret-keys" to delete it first.
use strict OpenPGP behavioruse temporary files to pass data to keyserver helpersuse this user-id to sign or decryptuser ID "%s" is already revoked
user ID: "%s"
using %s trust model
using cipher %s
using default PIN as %s
using subkey %s instead of primary key %s
validate signatures with PKA datavalidity: %sverboseverification of Admin PIN is currently prohibited through this command
verify CHV%d failed: %s
verify a signatureverify the PIN and list all datawaiting for lock on `%s'...
weak keyweak key created - retrying
weird size for an encrypted session key (%d)
will not run with insecure memory due to %s
writing direct signature
writing key binding signature
writing new key
writing public key to `%s'
writing secret key stub to `%s'
writing secret key to `%s'
writing self signature
writing to `%s'
writing to stdout
wrong secret key usedyYyesyou can only clearsign with PGP 2.x style keys while in --pgp2 mode
you can only detach-sign with PGP 2.x style keys while in --pgp2 mode
you can only encrypt to RSA keys of 2048 bits or less in --pgp2 mode
you can only make detached or clear signatures while in --pgp2 mode
you can update your preferences with: gpg --edit-key %s updpref save
you can't sign and encrypt at the same time while in --pgp2 mode
you cannot appoint a key as its own designated revoker
you cannot use --symmetric --encrypt while in %s mode
you cannot use --symmetric --encrypt with --s2k-mode 0
you cannot use --symmetric --sign --encrypt while in %s mode
you cannot use --symmetric --sign --encrypt with --s2k-mode 0
you found a bug ... (%s:%d)
you may not use %s while in %s mode
you may not use cipher algorithm `%s' while in %s mode
you may not use compression algorithm `%s' while in %s mode
you may not use digest algorithm `%s' while in %s mode
you must use files (and not a pipe) when working with --pgp2 enabled.
|AN|New Admin PIN|A|Please enter the Admin PIN|A|Please enter the Admin PIN%%0A[remaining attempts: %d]|FD|write status info to this FD|NAME|encrypt for NAME|N|New PIN|N|set compress level N (0 disables)|RN|New Reset Code|[file]|make a clear text signature|[file]|make a signature|algo [files]|print message digests||Please enter the PIN||Please enter the PIN%%0A[sigs done: %lu]||Please enter the Reset Code for the cardProject-Id-Version: gnupg 1.4.23
Report-Msgid-Bugs-To: translations@gnupg.org
POT-Creation-Date: 2018-06-11 10:48+0200
PO-Revision-Date: 2018-06-11 10:48+0200
Last-Translator: Automatically generated
Language-Team: none
Language: en@boldquot
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Plural-Forms: nplurals=2; plural=(n != 1);

Enter the user ID.  End with an empty line: 
Not enough random bytes available.  Please do some other work to give
the OS a chance to collect more entropy! (Need %d more bytes)

Pick an image to use for your photo ID.  The image must be a JPEG file.
Remember that the image is stored within your public key.  If you use a
very large picture, your key will become very large as well!
Keeping the image close to 240x288 is a good size to use.

Supported algorithms:

You need a user ID to identify your key; the software constructs the user ID
from the Real Name, Comment and Email Address in this form:
    “Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>”

                aka “%s”               using %s key %s
              imported: %lu             unchanged: %lu
           new subkeys: %lu
          new user IDs: %lu
          not imported: %lu
          w/o user IDs: %lu
         “%s”: preference for cipher algorithm %s
         “%s”: preference for compression algorithm %s
         “%s”: preference for digest algorithm %s
         (subkey on main key ID %s)         It is not certain that the signature belongs to the owner.
         The signature is probably a FORGERY.
         There is no indication that the signature belongs to the owner.
         This could mean that the signature is forged.
         algorithms on these user IDs:
        new signatures: %lu
      “%s”
      Card serial no. =      Key fingerprint =      Subkey fingerprint:      secret keys read: %lu
      skipped new keys: %lu
      user IDs cleaned: %lu
     Subkey fingerprint:    signatures cleaned: %lu
   (%c) Finished
   (%c) Toggle the authenticate capability
   (%c) Toggle the encrypt capability
   (%c) Toggle the sign capability
   (%d) DSA (set your own capabilities)
   (%d) DSA (sign only)
   (%d) DSA and Elgamal
   (%d) Elgamal (encrypt only)
   (%d) RSA (encrypt only)
   (%d) RSA (set your own capabilities)
   (%d) RSA (sign only)
   (%d) RSA and RSA (default)
   (0) I will not answer.%s
   (1) I have not checked at all.%s
   (1) Signature key
   (2) Encryption key
   (2) I have done casual checking.%s
   (3) Authentication key
   (3) I have done very careful checking.%s
   new key revocations: %lu
  %d = I do NOT trust
  %d = I don't know or won't say
  %d = I trust fully
  %d = I trust marginally
  %d = I trust ultimately
  Unable to sign.
  aka “%s”
  m = back to the main menu
  q = quit
  s = skip this key
  secret keys imported: %lu
 (main key ID %s) (non-exportable) (non-revocable) Primary key fingerprint: secret keys unchanged: %lu
“%s” not a key ID: skipping
“%s” was already locally signed by key %s
“%s” was already signed by key %s
# List of assigned trustvalues, created %s
# (Use “gpg --import-ownertrust” to restore them)
%d Admin PIN attempts remaining before card is permanently locked
%d bad signatures
%d keys processed (%d validity counts cleared)
%d marginal(s) needed, %d complete(s) needed, %s trust model
%d signatures not checked due to errors
%d signatures not checked due to missing keys
%d user IDs without valid self-signatures detected
%lu keys cached (%lu signatures)
%lu keys cached so far (%lu signatures)
%lu keys processed so far
%s ...
%s does not support handler version %d
%s does not yet work with %s
%s encrypted data
%s encrypted session key
%s encryption will be used
%s is the new one
%s is the unchanged one
%s keys may be between %u and %u bits long.
%s keysizes must be in the range %u-%u
%s makes no sense with %s!
%s not allowed with %s!
%s signature, digest algorithm %s
%s.
%s/%s encrypted for: “%s”
%s/%s signature from: “%s”
%s: There is limited assurance this key belongs to the named user
%s: There is no assurance this key belongs to the named user
%s: directory does not exist!
%s: error reading free record: %s
%s: error reading version record: %s
%s: error updating version record: %s
%s: error writing dir record: %s
%s: error writing version record: %s
%s: failed to append a record: %s
%s: failed to create hashtable: %s
%s: failed to create version record: %s%s: failed to zero a record: %s
%s: invalid file version %d
%s: invalid trustdb
%s: invalid trustdb created
%s: keyring created
%s: not a trustdb file
%s: skipped: %s
%s: skipped: public key already present
%s: skipped: public key is disabled
%s: trustdb created
%s: unknown suffix
%s: version record with recnum %lu
%s:%d: deprecated option “%s”
%s:%d: invalid auto-key-locate list
%s:%d: invalid export options
%s:%d: invalid import options
%s:%d: invalid keyserver options
%s:%d: invalid list options
%s:%d: invalid verify options
%u-bit %s key, ID %s, created %s(No description given)
(Probably you want to select %d here)
(This is a sensitive revocation key)
(sensitive)(unless you specify the key by fingerprint)
(you may have used the wrong program for this task)
* The ‘sign’ command may be prefixed with an ‘l’ for local signatures (lsign),
  a ‘t’ for trust signatures (tsign), an ‘nr’ for non-revocable signatures
  (nrsign), or any combination thereof (ltsign, tnrsign, etc.).
--clearsign [filename]--decrypt [filename]--edit-key user-id [commands]--encrypt [filename]--lsign-key user-id--output doesn't work for this command
--sign --encrypt [filename]--sign --symmetric [filename]--sign [filename]--sign-key user-id--store [filename]--symmetric --encrypt [filename]--symmetric --sign --encrypt [filename]--symmetric [filename]-k[v][v][v][c] [user-id] [keyring]... this is a bug (%s:%d:%s)
1 bad signature
1 signature not checked due to a missing key
1 signature not checked due to an error
1 user ID without valid self-signature detected
10 translator see trustdb.c:uid_trust_string_fixed@
(See the man page for a complete listing of all commands and options)
@
Examples:

 -se -r Bob [file]          sign and encrypt for user Bob
 --clearsign [file]         make a clear text signature
 --detach-sign [file]       make a detached signature
 --list-keys [names]        show keys
 --fingerprint [names]      show fingerprints
@
Options:
 @Commands:
 ASCII armored output forced.
Admin commands are allowed
Admin commands are not allowed
Admin-only command
Answer “yes” (or just “y”) if it is okay to generate the sub key.Answer “yes” if it is okay to delete the subkeyAnswer “yes” if it is okay to overwrite the fileAnswer “yes” if you really want to delete this user ID.
All certificates are then also lost!Answer “yes” if you want to sign ALL the user IDsAnswer “yes” or “no”Are you sure that you want to sign this key with your
key “%s” (%s)
Are you sure you still want to add it? (y/N) Are you sure you still want to revoke it? (y/N) Are you sure you still want to sign it? (y/N) Are you sure you want to appoint this key as a designated revoker? (y/N) Are you sure you want to delete it? (y/N) Are you sure you want to replace it? (y/N) Are you sure you want to use it? (y/N) AuthenticateBAD signature from “%s”CA fingerprint: CRC error; %06lX - %06lX
Can't check signature: %s
Can't edit this key: %s
Can't open ‘%s’: %s
CancelCardholder's given name: Cardholder's surname: Certificates leading to an ultimately trusted key:
CertifyChange (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? Change (N)ame, (C)omment, (E)mail or (Q)uit? Change the preferences of all user IDs (or just of the selected ones)
to the current list of preferences.  The timestamp of all affected
self-signatures will be advanced by one second.
Changing expiration time for a subkey.
Changing expiration time for the primary key.
Cipher: Command expects a filename argument
Comment: Compression: Create a designated revocation certificate for this key? (y/N) Create a revocation certificate for this key? (y/N) Create a revocation certificate for this signature? (y/N) Critical preferred keyserver: Critical signature notation: Critical signature policy: Current allowed actions: Current recipients:
DSA key %s requires a %u bit or larger hash
DSA key %s uses an unsafe (%u bit) hash
DSA requires the hash length to be a multiple of 8 bits
Delete this good signature? (y/N/q)Delete this invalid signature? (y/N/q)Delete this key from the keyring? (y/N) Delete this unknown signature? (y/N/q)Deleted %d signature.
Deleted %d signatures.
Detached signature.
Digest: Displaying %s photo ID of size %ld for key %s (uid %d)
Do you really want to delete the selected keys? (y/N) Do you really want to delete this key? (y/N) Do you really want to do this? (y/N) Do you really want to revoke the entire key? (y/N) Do you really want to revoke the selected subkeys? (y/N) Do you really want to revoke this subkey? (y/N) Do you really want to set this key to ultimate trust? (y/N) Do you want to issue a new signature to replace the expired one? (y/N) Do you want to promote it to a full exportable signature? (y/N) Do you want to promote it to an OpenPGP self-signature? (y/N) Do you want to sign it again anyway? (y/N) Do you want your signature to expire at the same time? (Y/n) ERROR: Email address: EncryptEnter Admin PIN: Enter JPEG filename for photo ID: Enter New Admin PIN: Enter New PIN: Enter PIN: Enter an optional description; end it with an empty line:
Enter new filenameEnter number(s), N)ext, or Q)uit > Enter passphrase
Enter passphrase: Enter the name of the key holderEnter the new passphrase for this secret key.

Enter the notation: Enter the required value as shown in the prompt.
It is possible to enter a ISO date (YYYY-MM-DD) but you won't
get a good error response - instead the system tries to interpret
the given value as an interval.Enter the size of the keyEnter the user ID of the addressee to whom you want to send the message.Enter the user ID of the designated revoker: Enter your preferred keyserver URL: Error reading backup key from ‘%s’: %s
Error: Combined name too long (limit is %d characters).
Error: Double spaces are not allowed.
Error: Login data too long (limit is %d characters).
Error: Only plain ASCII is currently allowed.
Error: Private DO too long (limit is %d characters).
Error: The “<” character may not be used.
Error: The trustdb is corrupted.
Error: URL too long (limit is %d characters).
Error: invalid characters in preference string.
Error: invalid formatted fingerprint.
Error: invalid length of preference string.
Error: invalid response.
Expired signature from “%s”Features: File ‘%s’ exists. Give the name of the file to which the signature appliesGo ahead and type your message ...
Good signature from “%s”Hash: Hint: Select the user IDs to sign
Hit return when ready or enter ‘c’ to cancel: How carefully have you verified the key you are about to sign actually belongs
to the person named above?  If you don't know what to answer, enter “0”.
How much do you trust that this key actually belongs to the named user?
I have checked this key casually.
I have checked this key very carefully.
I have not checked this key at all.
IDEA cipher unavailable, optimistically attempting to use %s instead
If that does not work, please consult the manual
If you like, you can enter a text describing why you issue this
revocation certificate.  Please keep this text concise.
An empty line ends the text.
If you want to use this untrusted key anyway, answer “yes”.In general it is not a good idea to use the same key for signing and
encryption.  This algorithm should only be used in certain domains.
Please consult your security expert first.Invalid character in comment
Invalid character in name
Invalid command  (try “help”)
Invalid key %s made valid by --allow-non-selfsigned-uid
Invalid passphrase; please try againInvalid selection.
Is this correct? (y/N) Is this okay? (y/N) Is this photo correct (y/N/q)? It is NOT certain that the key belongs to the person named
in the user ID.  If you *really* know what you are doing,
you may answer the next question with yes.
It's up to you to assign a value here; this value will never be exported
to any 3rd party.  We need it to implement the web-of-trust; it has nothing
to do with the (implicitly created) web-of-certificates.Key %s is already revoked.
Key available at: Key does not expire at all
Key expires at %s
Key generation canceled.
Key generation failed: %s
Key has been compromisedKey has only stub or on-card key items - no passphrase to change.
Key is no longer usedKey is protected.
Key is revoked.Key is supersededKey is valid for? (0) Key not changed so no update needed.
KeyringKeyserver no-modifyLanguage preferences: Login data (account name): Make off-card backup of encryption key? (Y/n) N  to change the name.
C  to change the comment.
E  to change the email address.
O  to continue with key generation.
Q  to quit the key generation.NOTE: %s is not available in this version
NOTE: %s is not for normal use!
NOTE: There is no guarantee that the card supports the requested size.
      If the key generation does not succeed, please check the
      documentation of your card to see what sizes are allowed.
NOTE: This feature is not available in %s
NOTE: This key is not protected!
NOTE: a key's S/N does not match the card's one
NOTE: backup of card key saved to ‘%s’
NOTE: creating subkeys for v3 keys is not OpenPGP compliant
NOTE: key has been revokedNOTE: keys are already stored on the card!
NOTE: no default option file ‘%s’
NOTE: old default options file ‘%s’ ignored
NOTE: primary key is online and stored on card
NOTE: secondary key is online and stored on card
NOTE: secret key %s expired at %s
NOTE: sender requested “for-your-eyes-only”
NOTE: signature key %s expired %s
NOTE: simple S2K mode (0) is strongly discouraged
NOTE: trustdb not writable
Name may not start with a digit
Name must be at least 5 characters long
Need the secret key to do this.
NnCcEeOoQqNo corresponding signature in secret ring
No help availableNo help available for ‘%s’No reason specifiedNo subkey with index %d
No such user ID.
No trust value assigned to:
No user ID with hash %s
No user ID with index %d
Not a valid email address
Not signed by you.
Notations: Note that this key cannot be used for encryption.  You may want to use
the command “--edit-key” to generate a subkey for this purpose.
Note: Signer's address ‘%s’ does not match DNS entry
Note: This key has been disabled.
Note: This key has expired!
Note: Verified signer's address is ‘%s’
Note: signatures using the %s algorithm are rejected
Nothing deleted.
Nothing to sign with key %s
OpenPGP card no. %s detected
OpenPGP card not available: %s
Overwrite? (y/N) Owner trust may not be set while using a user provided trust database
PIN callback returned error: %s
PIN for CHV%d is too short; minimum length is %d
PIN not correctly repeated; try againPlease correct the error first
Please decide how far you trust this user to correctly verify other users' keys
(by looking at passports, checking fingerprints from different sources, etc.)
Please don't put the email address into the real name or the comment
Please enter a domain to restrict this signature, or enter for none.
Please enter a new filename. If you just hit RETURN the default
file (which is shown in brackets) will be used.Please enter an optional commentPlease enter name of data file: Please enter the depth of this trust signature.
A depth greater than 1 allows the key you are signing to make
trust signatures on your behalf.
Please enter the passphrase; this is a secret sentence 
Please fix this possible security flaw
Please insert the card and hit return or enter ‘c’ to cancel: Please note that the factory settings of the PINs are
   PIN = ‘%s’     Admin PIN = ‘%s’
You should change them using the command --change-pin
Please note that the shown key validity is not necessarily correct
unless you restart the program.
Please remove selections from the secret keys.
Please remove the current card and insert the one with serial number:
   %.*s
Please repeat the last passphrase, so you are sure what you typed in.Please report bugs to <gnupg-bugs@gnu.org>.
Please select at most one subkey.
Please select exactly one user ID.
Please select the reason for the revocation:
Please select the type of key to generate:
Please select what kind of key you want:
Please select where to store the key:
Please specify how long the key should be valid.
         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years
Please specify how long the signature should be valid.
         0 = signature does not expire
      <n>  = signature expires in n days
      <n>w = signature expires in n weeks
      <n>m = signature expires in n months
      <n>y = signature expires in n years
Please use the command “toggle” first.
Please wait, entropy is being gathered. Do some work if it would
keep you from getting bored, because it will improve the quality
of the entropy.
Possible actions for a %s key: Preferred keyserver: Primary key fingerprint:Private DO data: Proceed? (y/N) Pubkey: Public key is disabled.
Quit without saving? (y/N) RSA modulus missing or not of size %d bits
RSA prime %s missing or not of size %d bits
RSA public exponent missing or larger than %d bits
Real name: Really create the revocation certificates? (y/N) Really create? (y/N) Really delete this self-signature? (y/N)Really move the primary key? (y/N) Really remove all selected user IDs? (y/N) Really remove this user ID? (y/N) Really revoke all selected user IDs? (y/N) Really revoke this user ID? (y/N) Really sign all user IDs? (y/N) Really sign? (y/N) Really update the preferences for the selected user IDs? (y/N) Really update the preferences? (y/N) Reason for revocation: %s
Repeat passphrase
Repeat passphrase: Repeat this PIN: Replace existing key? (y/N) Replace existing keys? (y/N) Requested keysize is %u bits
Reset Code is too short; minimum length is %d
Reset Code not or not anymore available
Revocation certificate created.
Revocation certificate created.

Please move it to a medium which you can hide away; if Mallory gets
access to this certificate he can use it to make your key unusable.
It is smart to print this certificate and store it away, just in case
your media become unreadable.  But have some caution:  The print system of
your machine might store the data and make it available to others!
Save changes? (y/N) Secret key is available.
Secret parts of primary key are not available.
Secret parts of primary key are stored on-card.
Select the algorithm to use.

DSA (aka DSS) is the Digital Signature Algorithm and can only be used
for signatures.

Elgamal is an encrypt-only algorithm.

RSA may be used for signatures or encryption.

The first (primary) key must always be a key which is capable of signing.Set preference list to:
Sex ((M)ale, (F)emale or space): SignSign it? (y/N) Signature does not expire at all
Signature expired %s
Signature expires %s
Signature expires at %s
Signature is valid for? (%s) Signature made %s
Signature made %s using %s key ID %s
Signature notation: Signature policy: SsEeAaQqSubkey %s is already revoked.
Syntax: gpg [options] [files]
Sign, check, encrypt or decrypt
Default operation depends on the input data
Syntax: gpgv [options] [files]
Check signatures against known trusted keys
The card will now be re-configured to generate a key of %u bits
The minimum trust level for this key is: %s

The random number generator is only a kludge to let
it run - it is in no way a strong RNG!

DON'T USE ANY DATA GENERATED BY THIS PROGRAM!!

The self-signature on “%s”
is a PGP 2.x-style signature.
The signature is not valid.  It does make sense to remove it from
your keyring.The signature will be marked as non-exportable.
The signature will be marked as non-revocable.
There are no preferences on a PGP 2.x-style user ID.
This JPEG is really large (%d bytes) !
This command is not allowed while in %s mode.
This command is only available for version 2 cards
This is a secret key! - really delete? (y/N) This is a signature which binds the user ID to the key. It is
usually not a good idea to remove such a signature.  Actually
GnuPG might not be able to use this key anymore.  So do this
only if this self-signature is for some reason not valid and
a second one is available.This is a valid signature on the key; you normally don't want
to delete this signature because it may be important to establish a
trust connection to the key or another key certified by this key.This key belongs to us
This key has been disabledThis key has expired!This key is due to expire on %s.
This key is not protected.
This key may be revoked by %s key %sThis key probably belongs to the named user
This key was revoked on %s by %s key %s
This signature can't be checked because you don't have the
corresponding key.  You should postpone its deletion until you
know which key was used because this signing key might establish
a trust connection through another already certified key.This signature expired on %s.
This will be a self-signature.
This would make the key unusable in PGP 2.x.
To be revoked by:
To build the Web-of-Trust, GnuPG needs to know which keys are
ultimately trusted - those are usually the keys for which you have
access to the secret key.  Answer “yes” to set this key to
ultimately trusted
Total number processed: %lu
URL to retrieve public key: UncompressedUnknown signature type ‘%s’
Unknown weak digest ‘%s’
Usage: gpg [options] [files] (-h for help)Usage: gpgv [options] [files] (-h for help)Use this key anyway? (y/N) User ID “%s” compacted: %s
User ID “%s” is expired.User ID “%s” is not self-signed.User ID “%s” is revoked.User ID “%s” is signable.  User ID “%s”: %d signature removed
User ID “%s”: %d signatures removed
User ID “%s”: already clean
User ID “%s”: already minimized
User ID is no longer validWARNING: WARNING: “%s” is a deprecated command - do not use it
WARNING: “%s” is a deprecated option
WARNING: %s overrides %s
WARNING: 2 files with confidential information exists.
WARNING: Elgamal sign+encrypt keys are deprecated
WARNING: This is a PGP 2.x-style key.  Adding a designated revoker may cause
         some versions of PGP to reject this key.
WARNING: This is a PGP2-style key.  Adding a photo ID may cause some versions
         of PGP to reject this key.
WARNING: This key has been revoked by its designated revoker!
WARNING: This key has been revoked by its owner!
WARNING: This key is not certified with a trusted signature!
WARNING: This key is not certified with sufficiently trusted signatures!
WARNING: This subkey has been revoked by its owner!
WARNING: Using untrusted key!
WARNING: We do NOT trust this key!
WARNING: Weak key detected - please change passphrase again.
WARNING: Your encryption subkey expires soon.
WARNING: ‘%s’ is an empty file
WARNING: a user ID signature is dated %d seconds in the future
WARNING: appointing a key as a designated revoker cannot be undone!
WARNING: cipher algorithm %s not found in recipient preferences
WARNING: digest algorithm %s is deprecated
WARNING: encrypted message has been manipulated!
WARNING: forcing compression algorithm %s (%d) violates recipient preferences
WARNING: forcing digest algorithm %s (%d) violates recipient preferences
WARNING: forcing symmetric cipher %s (%d) violates recipient preferences
WARNING: invalid size of random_seed file - not used
WARNING: key %s contains preferences for unavailable
WARNING: key %s may be revoked: fetching revocation key %s
WARNING: key %s may be revoked: revocation key %s not present.
WARNING: keyserver handler from a different version of GnuPG (%s)
WARNING: keyserver option ‘%s’ is not used on this platform
WARNING: message was encrypted with a weak key in the symmetric cipher.
WARNING: message was not integrity protected
WARNING: multiple plaintexts seen
WARNING: multiple signatures detected.  Only the first will be checked.
WARNING: no user ID has been marked as primary.  This command may
              cause a different user ID to become the assumed primary.
WARNING: not a detached signature; file ‘%s’ was NOT verified!
WARNING: nothing exported
WARNING: options in ‘%s’ are not yet active during this run
WARNING: potentially insecure symmetrically encrypted session key
WARNING: program may create a core file!
WARNING: recipients (-r) given without using public key encryption
WARNING: secret key %s does not have a simple SK checksum
WARNING: signature digest conflict in message
WARNING: signing subkey %s has an invalid cross-certification
WARNING: signing subkey %s is not cross-certified
WARNING: the signature will not be marked as non-exportable.
WARNING: the signature will not be marked as non-revocable.
WARNING: this key might be revoked (revocation key not present)
WARNING: unable to %%-expand notation (too large).  Using unexpanded.
WARNING: unable to %%-expand policy URL (too large).  Using unexpanded.
WARNING: unable to %%-expand preferred keyserver URL (too large).  Using unexpanded.
WARNING: unable to fetch URI %s: %s
WARNING: unable to parse URI %s
WARNING: unable to refresh key %s via %s: %s
WARNING: unable to remove temp directory ‘%s’: %s
WARNING: unable to remove tempfile (%s) ‘%s’: %s
WARNING: unsafe enclosing directory ownership on configuration file ‘%s’
WARNING: unsafe enclosing directory ownership on homedir ‘%s’
WARNING: unsafe enclosing directory permissions on configuration file ‘%s’
WARNING: unsafe enclosing directory permissions on homedir ‘%s’
WARNING: unsafe ownership on configuration file ‘%s’
WARNING: unsafe ownership on homedir ‘%s’
WARNING: unsafe permissions on configuration file ‘%s’
WARNING: unsafe permissions on homedir ‘%s’
WARNING: using experimental cipher algorithm %s
WARNING: using experimental digest algorithm %s
WARNING: using experimental public key algorithm %s
WARNING: using insecure memory!
WARNING: using insecure random number generator!!
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
What keysize do you want for the Authentication key? (%u) What keysize do you want for the Encryption key? (%u) What keysize do you want for the Signature key? (%u) What keysize do you want for the subkey? (%u) What keysize do you want? (%u) When you sign a user ID on a key, you should first verify that the key
belongs to the person named in the user ID.  It is useful for others to
know how carefully you verified this.

“0” means you make no particular claim as to how carefully you verified the
    key.

“1” means you believe the key is owned by the person who claims to own it
    but you could not, or did not verify the key at all.  This is useful for
    a “persona” verification, where you sign the key of a pseudonymous user.

“2” means you did casual verification of the key.  For example, this could
    mean that you verified the key fingerprint and checked the user ID on the
    key against a photo ID.

“3” means you did extensive verification of the key.  For example, this could
    mean that you verified the key fingerprint with the owner of the key in
    person, and that you checked, by means of a hard to forge document with a
    photo ID (such as a passport) that the name of the key owner matches the
    name in the user ID on the key, and finally that you verified (by exchange
    of email) that the email address on the key belongs to the key owner.

Note that the examples given above for levels 2 and 3 are *only* examples.
In the end, it is up to you to decide just what “casual” and “extensive”
mean to you when you sign other keys.

If you don't know what the right answer is, answer “0”.You are about to revoke these signatures:
You are using the ‘%s’ character set.
You can't change the expiration date of a v3 key
You can't delete the last user ID!
You did not specify a user ID. (you may use “-r”)
You don't want a passphrase - this is probably a *bad* idea!

You don't want a passphrase - this is probably a *bad* idea!
I will do it anyway.  You can change your passphrase at any time,
using this program with the option “--edit-key”.

You have signed these user IDs on key %s:
You may not add a designated revoker to a PGP 2.x-style key.
You may not add a photo ID to a PGP2-style key.
You may not make an OpenPGP signature on a PGP 2.x key while in --pgp2 mode.
You may try to re-create the trustdb using the commands:
You may want to change its expiration date too.
You must select at least one key.
You must select at least one user ID.
You must select exactly one key.
You need a Passphrase to protect your secret key.

You need a passphrase to unlock the secret key for
user: “%s”
You need a passphrase to unlock the secret key for user:
“%.*s”
%u-bit %s key, ID %s, created %s%s
You selected this USER-ID:
    “%s”

You should specify a reason for the certification.  Depending on the
context you have the ability to choose from this list:
  “Key has been compromised”
      Use this if you have a reason to believe that unauthorized persons
      got access to your secret key.
  “Key is superseded”
      Use this if you have replaced this key with a newer one.
  “Key is no longer used”
      Use this if you have retired this key.
  “User ID is no longer valid”
      Use this to state that the user ID should not longer be used;
      this is normally used to mark an email address invalid.
Your current signature on “%s”
has expired.
Your current signature on “%s”
is a local signature.
Your decision? Your selection? Your selection? (enter ‘?’ for more information): Your system can't display dates beyond 2038.
However, it will be correctly handled up to 2106.
[  full  ][  undef ][ expired][ revoked][ unknown][User ID not found][filename][marginal][not set][revocation][self-signature][ultimate][uncertain]‘%s’ already compressed
‘%s’ is not a JPEG file
‘%s’ is not a regular file - ignored
‘%s’ is not a valid character set
‘%s’ is not a valid long keyID
‘%s’ is not a valid signature expiration
about to export an unprotected subkey
access to admin commands is not configured
action ‘%s’ not supported with keyserver scheme ‘%s’
add a key to a smartcardadd a photo IDadd a revocation keyadd a subkeyadd a user IDambiguous option ‘%s’
anonymous recipient; trying secret key %s ...
armor header: armor: %s
assuming %s encrypted data
assuming bad signature from key %s due to an unknown critical bit
assuming signed data in ‘%s’
automatically retrieve keys when verifying signaturesautomatically retrieved ‘%s’ via %s
bad MPIbad URIbad certificatebad keybad passphrasebad public keybad secret keybad signaturebe somewhat more quietbinarybuild_packet failed: %s
cCcaching keyring ‘%s’
can't access %s - invalid OpenPGP card?
can't access ‘%s’: %s
can't close ‘%s’: %s
can't connect to ‘%s’: %s
can't create ‘%s’: %s
can't create backup file ‘%s’: %s
can't create directory ‘%s’: %s
can't create lock for ‘%s’
can't disable core dumps: %s
can't do this in batch mode
can't do this in batch mode without “--yes”
can't gen prime with pbits=%u qbits=%u
can't generate a prime with less than %d bits
can't handle public key algorithm %d
can't handle text lines longer than %d characters
can't handle this ambiguous signature data
can't lock ‘%s’
can't lock ‘%s’: %s
can't open ‘%s’
can't open ‘%s’: %s
can't open signed data ‘%s’
can't open the keyringcan't query passphrase in batch mode
can't read ‘%s’: %s
can't stat ‘%s’: %s
can't use a symmetric ESK packet due to the S2K mode
can't write ‘%s’: %s
canceledcancelled by user
cancel|cancelcannot appoint a PGP 2.x style key as a designated revoker
cannot avoid weak key for symmetric cipher; tried %d times!
card does not support digest algorithm %s
card is permanently locked!
card reader not available
card-no: change URL to retrieve keychange a CA fingerprintchange a card's PINchange card holder's namechange card holder's sexchange data on a cardchange the expiration date for the key or selected subkeyschange the language preferenceschange the login namechange the ownertrustchange the passphrasecheck signatureschecking created signature failed: %s
checking the trustdb
checksum errorcipher algorithm %d%s is unknown or disabled
colon missingcompact unusable user IDs and remove all signatures from keycompact unusable user IDs and remove unusable signatures from keycompletes-needed must be greater than 0
conflicting commands
could not parse keyserver URL
create a public key when importing a secret keycreate ascii armored outputcreated: %screation timestamp missing
data not saved; use option “--output” to save it
dearmoring failed: %s
decrypt data (default)decryption failed: %s
decryption okay
delete selected subkeysdelete selected user IDsdelete signatures from the selected user IDsdeleting keyblock failed: %s
depth: %d  valid: %3d  signed: %3d  trust: %d-, %dq, %dn, %dm, %df, %du
directory ‘%s’ created
disable keydisableddisplay photo IDs during key listingsdisplay photo IDs during signature verificationdo not clear the ownertrust values during importdo not delete temporary files after using themdo not make any changesdo not update the trustdb after importelevate the trust of signatures with valid PKA dataenable keyenarmoring failed: %s
encrypt dataencrypted with %lu passphrases
encrypted with %s key, ID %s
encrypted with %u-bit %s key, ID %s, created %s
encrypted with 1 passphrase
encrypted with unknown algorithm %d
encrypting a message in --pgp2 mode requires the IDEA cipher
encryption only with symmetric ciphererror allocating enough memory: %s
error changing size of key %d to %u bits: %s
error creating ‘%s’: %s
error creating keyring ‘%s’: %s
error creating passphrase: %s
error finding trust record in ‘%s’: %s
error getting current key info: %s
error getting new PIN: %s
error in ‘%s’: %s
error in trailer line
error reading ‘%s’: %s
error reading application data
error reading fingerprint DO
error reading keyblock: %s
error reading secret keyblock “%s”: %s
error retrieving CHV status from card
error writing ‘%s’: %s
error writing key to card: %s
error writing keyring ‘%s’: %s
error writing public keyring ‘%s’: %s
error writing secret keyring ‘%s’: %s
existing key will be replaced
expiredexpired: %sexpires: %sexport attribute user IDs (generally photo IDs)export keysexport keys to a key serverexport revocation keys marked as “sensitive”export signatures that are marked as local-onlyexporting secret keys not allowed
external keyserver calls are not supported in this build
external program calls are disabled due to unsafe options file permissions
failed to initialize the TrustDB: %s
failed to rebuild keyring cache: %s
failed to store the creation date: %s
failed to store the fingerprint: %s
failed to store the key: %s
failed to unprotect the subkey: %s
failed to use default PIN as %s: %s - disabling further default use
femalefetch the key specified in the card URLfile close errorfile create errorfile delete errorfile existsfile open errorfile read errorfile rename errorfile write errorfingerprint on card does not match requested one
flag the selected user ID as primaryforcedforcing symmetric cipher %s (%d) violates recipient preferences
fstat of ‘%s’ failed in %s: %s
fstat(%d) failed in %s: %s
fullgeneral errorgenerate PGP 2.x compatible messagesgenerate a new key pairgenerate a revocation certificategenerate new keysgenerating key failed
generating new key
generating the deprecated 16-bit checksum for secret key protection
gpg-agent is not available in this session
gpg-agent protocol version %d is not supported
gpg/card> honor the PKA record set on a key when retrieving keyshonor the preferred keyserver URL set on the keyiImMqQsSimport keys from a key serverimport signatures that are marked as local-onlyimport/merge keysimporting secret keys not allowed
include revoked keys in search resultsinclude subkeys when searching by key IDinput line %u too long or missing LF
input line longer than %d characters
invalidinvalid S2K mode; must be 0, 1 or 3
invalid argumentinvalid armorinvalid armor header: invalid armor: line longer than %d characters
invalid auto-key-locate list
invalid clearsig header
invalid dash escaped line: invalid default preferences
invalid default-cert-level; must be 0, 1, 2, or 3
invalid export options
invalid fingerprintinvalid hash algorithm ‘%s’
invalid import options
invalid item ‘%s’ in preference string
invalid keyringinvalid keyserver options
invalid keyserver protocol (us %d!=handler %d)
invalid list options
invalid min-cert-level; must be 1, 2, or 3
invalid packetinvalid passphraseinvalid personal cipher preferences
invalid personal compress preferences
invalid personal digest preferences
invalid radix64 character %02X skipped
invalid root packet detected in proc_tree()
invalid structure of OpenPGP card (DO 0x93)
invalid value
invalid verify options
it is strongly suggested that you update your preferences and
key “%s” not found on keyserver
key “%s” not found: %s
key %s has no user IDs
key %s marked as ultimately trusted
key %s occurs more than once in the trustdb
key %s was created %lu second in the future (time warp or clock problem)
key %s was created %lu seconds in the future (time warp or clock problem)
key %s: “%s” %d new signatures
key %s: “%s” %d new subkeys
key %s: “%s” %d new user IDs
key %s: “%s” %d signature cleaned
key %s: “%s” %d signatures cleaned
key %s: “%s” %d user ID cleaned
key %s: “%s” %d user IDs cleaned
key %s: “%s” 1 new signature
key %s: “%s” 1 new subkey
key %s: “%s” 1 new user ID
key %s: “%s” not changed
key %s: “%s” revocation certificate added
key %s: “%s” revocation certificate imported
key %s: %s
key %s: PGP 2.x style key - skipped
key %s: PKS subkey corruption repaired
key %s: accepted as trusted key
key %s: accepted non self-signed user ID “%s”
key %s: already in secret keyring
key %s: can't locate original keyblock: %s
key %s: can't read original keyblock: %s
key %s: direct key signature added
key %s: doesn't match our copy
key %s: duplicated user ID detected - merged
key %s: invalid direct key signature
key %s: invalid revocation certificate: %s - rejected
key %s: invalid revocation certificate: %s - skipped
key %s: invalid self-signature on user ID “%s”
key %s: invalid subkey binding
key %s: invalid subkey revocation
key %s: key material on-card - skipped
key %s: new key - skipped
key %s: no public key - can't apply revocation certificate
key %s: no public key for trusted key - skipped
key %s: no subkey for key binding
key %s: no subkey for key revocation
key %s: no subkey for subkey binding signature
key %s: no subkey for subkey revocation signature
key %s: no user ID
key %s: no user ID for signature
key %s: no valid user IDs
key %s: non exportable signature (class 0x%02X) - skipped
key %s: not protected - skipped
key %s: public key “%s” imported
key %s: public key not found: %s
key %s: removed multiple subkey binding
key %s: removed multiple subkey revocation
key %s: revocation certificate at wrong place - skipped
key %s: secret key imported
key %s: secret key not found: %s
key %s: secret key with invalid cipher %d - skipped
key %s: secret key without public key - skipped
key %s: skipped subkey
key %s: skipped user ID “%s”
key %s: subkey signature in wrong place - skipped
key %s: unexpected signature class (0x%02X) - skipped
key %s: unsupported public key algorithm
key %s: unsupported public key algorithm on user ID “%s”
key already exists
key export failed: %s
key generation completed (%d seconds)
key has been created %lu second in future (time warp or clock problem)
key has been created %lu seconds in future (time warp or clock problem)
key is not flagged as insecure - can't use it with the faked RNG!
key not found on keyserver
key operation not possible: %s
keyblock resource ‘%s’: %s
keyring ‘%s’ created
keyserver communications error: %s
keyserver did not send VERSION
keyserver errorkeyserver internal error
keyserver receive failed: %s
keyserver refresh failed: %s
keyserver search failed: %s
keyserver send failed: %s
keyserver timed out
keysize invalid; using %u bits
keysize rounded up to %u bits
line too longlist all available datalist and check key signatureslist key and user IDslist keyslist keys and fingerprintslist keys and signatureslist preferences (expert)list preferences (verbose)list secret keysmake a detached signaturemake timestamp conflicts only a warningmake_keysig_packet failed: %s
malemalformed CRC
malformed GPG_AGENT_INFO environment variable
malformed user idmarginalmarginals-needed must be greater than 1
max-cert-depth must be in the range from 1 to 255
menu to change or unblock the PINmove a backup key to a smartcardmove a key to a smartcardmoving a key signature to the correct place
nNnested clear text signatures
network errornevernever     new configuration file ‘%s’ created
next trustdb check due at %s
nono = sign found in group definition ‘%s’
no cardno corresponding public key: %s
no datano default secret keyring: %s
no entropy gathering module detected
no handler for keyserver scheme ‘%s’
no keyserver action!
no keyserver known (use option --keyserver)
no need for a trustdb check
no need for a trustdb check with ‘%s’ trust model
no need for a trustdb update with ‘%s’ trust model
no photo viewer set
no remote program execution supported
no revocation keys found for “%s”
no secret key
no secret subkey for public subkey %s - ignoring
no signature found
no signed data
no such user idno ultimately trusted keys found
no valid OpenPGP data found.
no valid addressees
no writable keyring found: %s
no writable public keyring found: %s
no writable secret keyring found: %s
not a detached signature
not an OpenPGP cardnot encryptednot forcednot processednot supportednote: random_seed file is empty
note: random_seed file not updated
oOokay, we are the anonymous recipient.
okay|okayold encoding of the DEK is not supported
old style (PGP 2.x) signature
only accept updates to existing keysoperation is not possible without initialized secure memory
option file ‘%s’: %s
original file name='%.*s'
ownertrust information cleared
ownertrust value missingpassphrase generated with unknown digest algorithm %d
passphrase not correctly repeated; try againplease do a --check-trustdb
please enter an optional but highly suggested email addressplease see %s for more information
please see http://www.gnupg.org/documentation/faqs.html for more information
please use “%s%s” instead
please wait while key is being generated ...
preference ‘%s’ duplicated
premature eof (in CRC)
premature eof (in trailer)
premature eof (no CRC)
print the card statusproblem handling encrypted packet
problem with the agent - disabling agent use
prompt before overwritingprotection algorithm %d%s is not supported
protection digest %d is not supported
public and secret key created and signed.
public key %s is %lu second newer than the signature
public key %s is %lu seconds newer than the signature
public key %s not found: %s
public key decryption failed: %s
public key does not match secret key!
public key encrypted data: good DEK
public key is %s
public key not foundpublic key of ultimately trusted key %s not found
qQquitquit this menuquoted printable character in armor - probably a buggy MTA has been used
re-distribute this key to avoid potential algorithm mismatch problems
read error in ‘%s’: %s
reading from ‘%s’
reading options from ‘%s’
reading public key failed: %s
reading stdin ...
reason for revocation: refreshing %d keys from %s
refreshing 1 key from %s
rejected by import filterremove as much as possible from key after importremove as much as possible from key during exportremove keys from the public keyringremove keys from the secret keyringremove the passphrase from exported subkeysremove unusable parts from key after importremove unusable parts from key during exportrenaming ‘%s’ to ‘%s’ failed: %s
repair damage from the pks keyserver during importrequesting key %s from %s
requesting key %s from %s server %s
resource limitresponse does not contain the RSA modulus
response does not contain the RSA public exponent
response does not contain the public key data
revocation comment: revoke key or selected subkeysrevoke selected user IDsrevoke signatures on the selected user IDsrevokedrevoked by your key %s on %s
revoked: %srounded up to %u bits
save and quitsearch for keys on a key serversearching for “%s” from %s
searching for “%s” from %s server %s
searching for names from %s
searching for names from %s server %s
secret key “%s” not found: %s
secret key %s: %s
secret key already stored on a card
secret key not availablesecret key parts are not available
secret parts of key are not available
select subkey Nselect user ID Nselected certification digest algorithm is invalid
selected cipher algorithm is invalid
selected compression algorithm is invalid
selected digest algorithm is invalid
selecting openpgp failed: %s
sending key %s to %s
sending key %s to %s server %s
set a notation for the selected user IDsset preference list for the selected user IDsset the preferred keyserver URL for the selected user IDsshow IETF standard notations during signature listingsshow IETF standard notations during signature verificationshow admin commandsshow all notations during signature listingsshow all notations during signature verificationshow expiration dates during signature listingsshow key fingerprintshow only the primary user ID in signature verificationshow policy URLs during signature listingsshow policy URLs during signature verificationshow preferred keyserver URLs during signature listingsshow preferred keyserver URLs during signature verificationshow revoked and expired subkeys in key listingsshow revoked and expired user IDs in key listingsshow revoked and expired user IDs in signature verificationshow selected photo IDsshow the keyring name in key listingsshow this helpshow user ID validity during key listingsshow user ID validity during signature verificationshow user-supplied notations during signature listingsshow user-supplied notations during signature verificationsign a keysign a key locallysign or edit a keysign selected user IDs [* see below for related commands]sign selected user IDs locallysign selected user IDs with a non-revocable signaturesign selected user IDs with a trust signaturesignature verification suppressed
signatures created so far: %lu
signed by your key %s on %s%s%s
signing failed: %s
signing subkey %s is already cross-certified
signing:skipped “%s”: %s
skipped “%s”: duplicated
skipped: public key already set
skipped: public key already set as default recipient
skipped: secret key already present
skipping block of type %d
skipping v3 self-signature on user ID “%s”
standalone revocation - use “gpg --import” to apply
standalone signature of class 0x%02x
storing key onto card failed: %s
subkey %s does not sign and so does not need to be cross-certified
subpacket of type %d has critical bit set
symmetric encryption of ‘%s’ failed: %s
system error while calling external program: %s
take the keys from this keyringtextmodethe given certification policy URL is invalid
the given preferred keyserver URL is invalid
the given signature policy URL is invalid
the signature could not be verified.
Please remember that the signature file (.sig or .asc)
should be the first file given on the command line.
there is a secret key for public key “%s”!
this is a PGP generated Elgamal key which is not secure for signatures!this key has already been designated as a revoker
this may be caused by a missing self-signature
this message may not be usable by %s
this platform requires temporary files when calling external programs
timestamp conflicttoggle between the secret and public key listingstoggle the signature force PIN flagtoo many cipher preferences
too many compression preferences
too many digest preferences
too many entries in pk cache - disabled
trust database errortrust record %lu is not of requested type %d
trust record %lu, req type %d: read failed: %s
trust record %lu, type %d: write failed: %s
trust: %strustdb rec %lu: lseek failed: %s
trustdb rec %lu: write failed (n=%d): %s
trustdb transaction too large
trustdb: lseek failed: %s
trustdb: read failed (n=%d): %s
trustdb: sync failed: %s
trustlevel adjusted to FULL due to valid PKA info
trustlevel adjusted to NEVER due to bad PKA info
ultimateunable to display photo ID!
unable to execute external program
unable to execute program ‘%s’: %s
unable to execute shell ‘%s’: %s
unable to open JPEG file ‘%s’: %s
unable to read external program response: %s
unable to set exec-path to %s
unable to update trustdb version record: write failed: %s
unable to use the IDEA cipher for all of the keys you are encrypting to.
unable to use unknown trust model (%d) - assuming %s trust model
unblock the PIN using a Reset Codeuncompressed|noneundefinedunexpected armor: unexpected dataunimplemented cipher algorithmunimplemented pubkey algorithmunknownunknown armor header: unknown cipher algorithmunknown compress algorithmunknown configuration item ‘%s’
unknown default recipient “%s”
unknown digest algorithmunknown key protection algorithm
unknown option ‘%s’
unknown packet typeunknown protection algorithm
unknown pubkey algorithmunknown signature classunknown versionunnatural exit of external program
unspecifiedunsupported URIunusable pubkey algorithmunusable public keyunusable secret keyupdate all keys from a keyserverupdate failed: %s
update secret failed: %s
update the trust databaseusage: %susage: gpg [options] use as output fileuse canonical text modeuse option “--delete-secret-keys” to delete it first.
use strict OpenPGP behavioruse temporary files to pass data to keyserver helpersuse this user-id to sign or decryptuser ID “%s” is already revoked
user ID: “%s”
using %s trust model
using cipher %s
using default PIN as %s
using subkey %s instead of primary key %s
validate signatures with PKA datavalidity: %sverboseverification of Admin PIN is currently prohibited through this command
verify CHV%d failed: %s
verify a signatureverify the PIN and list all datawaiting for lock on ‘%s’...
weak keyweak key created - retrying
weird size for an encrypted session key (%d)
will not run with insecure memory due to %s
writing direct signature
writing key binding signature
writing new key
writing public key to ‘%s’
writing secret key stub to ‘%s’
writing secret key to ‘%s’
writing self signature
writing to ‘%s’
writing to stdout
wrong secret key usedyYyesyou can only clearsign with PGP 2.x style keys while in --pgp2 mode
you can only detach-sign with PGP 2.x style keys while in --pgp2 mode
you can only encrypt to RSA keys of 2048 bits or less in --pgp2 mode
you can only make detached or clear signatures while in --pgp2 mode
you can update your preferences with: gpg --edit-key %s updpref save
you can't sign and encrypt at the same time while in --pgp2 mode
you cannot appoint a key as its own designated revoker
you cannot use --symmetric --encrypt while in %s mode
you cannot use --symmetric --encrypt with --s2k-mode 0
you cannot use --symmetric --sign --encrypt while in %s mode
you cannot use --symmetric --sign --encrypt with --s2k-mode 0
you found a bug ... (%s:%d)
you may not use %s while in %s mode
you may not use cipher algorithm ‘%s’ while in %s mode
you may not use compression algorithm ‘%s’ while in %s mode
you may not use digest algorithm ‘%s’ while in %s mode
you must use files (and not a pipe) when working with --pgp2 enabled.
|AN|New Admin PIN|A|Please enter the Admin PIN|A|Please enter the Admin PIN%%0A[remaining attempts: %d]|FD|write status info to this FD|NAME|encrypt for NAME|N|New PIN|N|set compress level N (0 disables)|RN|New Reset Code|[file]|make a clear text signature|[file]|make a signature|algo [files]|print message digests||Please enter the PIN||Please enter the PIN%%0A[sigs done: %lu]||Please enter the Reset Code for the card
© 2025 GrazzMean