2022-06-06 20:06:14 +02:00
# SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
#
# SPDX-License-Identifier: Apache-2.0
sop.name = sop
2022-07-23 01:11:40 +02:00
sop.usage.header = Stateless OpenPGP Protocol
2022-06-06 20:06:14 +02:00
usage.footerHeading = Powered by picocli%n
sop.locale = Locale for description texts
# Generic
usage.synopsisHeading = Usage:\u0020
usage.commandListHeading = %nCommands:%n
# Exit Codes
usage.exitCodeListHeading = %nExit Codes:%n
2022-07-23 01:11:40 +02:00
usage.exitCodeList.0 = \u00200:Successful program execution
2022-06-06 20:06:14 +02:00
usage.exitCodeList.1 = \u00201:Generic program error
usage.exitCodeList.2 = \u00203:Verification requested but no verifiable signature found
usage.exitCodeList.3 = 13:Unsupported asymmetric algorithm
usage.exitCodeList.4 = 17:Certificate is not encryption capable
usage.exitCodeList.5 = 19:Usage error: Missing argument
usage.exitCodeList.6 = 23:Incomplete verification instructions
usage.exitCodeList.7 = 29:Unable to decrypt
usage.exitCodeList.8 = 31:Password is not human-readable
usage.exitCodeList.9 = 37:Unsupported Option
usage.exitCodeList.10 = 41:Invalid data or data of wrong type encountered
usage.exitCodeList.11 = 53:Non-text input received where text was expected
usage.exitCodeList.12 = 59:Output file already exists
usage.exitCodeList.13 = 61:Input file does not exist
usage.exitCodeList.14 = 67:Cannot unlock password protected secret key
usage.exitCodeList.15 = 69:Unsupported subcommand
usage.exitCodeList.16 = 71:Unsupported special prefix (e.g. \"@env/@fd\") of indirect parameter
usage.exitCodeList.17 = 73:Ambiguous input (a filename matching the designator already exists)
usage.exitCodeList.18 = 79:Key is not signing capable
# Subcommands
sop.armor.usage.header = Add ASCII Armor to standard input
sop.armor.usage.option.label = Label to be used in the header and tail of the armoring
sop.dearmor.usage.header = Remove ASCII Armor from standard input
sop.decrypt.usage.header = Decrypt a message from standard input
sop.decrypt.usage.option.session_key_out = Can be used to learn the session key on successful decryption
sop.decrypt.usage.option.with_session_key.0 = Symmetric message key (session key).
sop.decrypt.usage.option.with_session_key.1 = Enables decryption of the "CIPHERTEXT" using the session key directly against the "SEIPD" packet.
2022-06-19 18:18:31 +02:00
sop.decrypt.usage.option.with_session_key.2 = Is an INDIRECT data type (e.g. file, environment variable, file descriptor...)
2022-06-06 20:06:14 +02:00
sop.decrypt.usage.option.with_password.0 = Symmetric passphrase to decrypt the message with.
sop.decrypt.usage.option.with_password.1 = Enables decryption based on any "SKESK" packets in the "CIPHERTEXT".
2022-06-19 18:18:31 +02:00
sop.decrypt.usage.option.with_password_2 = Is an INDIRECT data type (e.g. file, environment variable, file descriptor...)
2022-06-06 20:06:14 +02:00
sop.decrypt.usage.option.verify_out = Emits signature verification status to the designated output
sop.decrypt.usage.option.certs = Certificates for signature verification
2022-06-19 18:18:31 +02:00
sop.decrypt.usage.option.not_before.0 = ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z)
2022-06-06 20:06:14 +02:00
sop.decrypt.usage.option.not_before.1 = Reject signatures with a creation date not in range.
sop.decrypt.usage.option.not_before.2 = Defaults to beginning of time ('-').
2022-06-19 18:18:31 +02:00
sop.decrypt.usage.option.not_after.0 = ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z)
2022-06-06 20:06:14 +02:00
sop.decrypt.usage.option.not_after.1 = Reject signatures with a creation date not in range.
sop.decrypt.usage.option.not_after.2 = Defaults to current system time ('now').
sop.decrypt.usage.option.not_after.3 = Accepts special value '-' for end of time.
sop.decrypt.usage.option.with_key_password.0 = Passphrase to unlock the secret key(s).
2022-06-19 18:18:31 +02:00
sop.decrypt.usage.option.with_key_password.1 = Is an INDIRECT data type (e.g. file, environment variable, file descriptor...).
2022-06-06 20:06:14 +02:00
sop.decrypt.usage.param.keys = Secret keys to attempt decryption with
sop.encrypt.usage.header = Encrypt a message from standard input
sop.encrypt.usage.option.armor = ASCII armor the output
sop.encrypt.usage.option.type = Type of the input data. Defaults to 'binary'
sop.encrypt.usage.option.with_password.0 = Encrypt the message with a password.
2022-06-19 18:18:31 +02:00
sop.encrypt.usage.option.with_password.1 = Is an INDIRECT data type (e.g. file, environment variable, file descriptor...)
2022-06-06 20:06:14 +02:00
sop.encrypt.usage.option.sign_with = Sign the output with a private key
sop.encrypt.usage.option.with_key_password.0 = Passphrase to unlock the secret key(s).
2022-06-19 18:18:31 +02:00
sop.encrypt.usage.option.with_key_password.1 = Is an INDIRECT data type (e.g. file, environment variable, file descriptor...).
2022-06-06 20:06:14 +02:00
sop.encrypt.usage.param.certs = Certificates the message gets encrypted to
sop.extract-cert.usage.header = Extract a public key certificate from a secret key from standard input
sop.extract-cert.usage.option.armor = ASCII armor the output
sop.generate-key.usage.header = Generate a secret key
sop.generate-key.usage.option.armor = ASCII armor the output
2022-06-19 18:18:31 +02:00
sop.generate-key.usage.option.user_id = User-ID, e.g. "Alice <alice@example.com>"
2022-06-06 20:06:14 +02:00
sop.generate-key.usage.option.with_key_password.0 = Password to protect the private key with
2022-06-19 18:18:31 +02:00
sop.generate-key.usage.option.with_key_password.1 = Is an INDIRECT data type (e.g. file, environment variable, file descriptor...).
2022-06-06 20:06:14 +02:00
sop.inline-detach.usage.header = Split signatures from a clearsigned message
sop.inline-detach.usage.option.armor = ASCII armor the output
sop.inline-detach.usage.option.signatures_out = Destination to which a detached signatures block will be written
sop.inline-sign.usage.header = Create an inline-signed message from data on standard input
sop.inline-sign.usage.option.armor = ASCII armor the output
sop.inline-sign.usage.option.as.0 = Specify the signature format of the signed message
sop.inline-sign.usage.option.as.1 = 'text' and 'binary' will produce inline-signed messages.
sop.inline-sign.usage.option.as.2 = 'cleartextsigned' will make use of the cleartext signature framework.
sop.inline-sign.usage.option.as.3 = Defaults to 'binary'.
sop.inline-sign.usage.option.as.4 = If '--as=text' and the input data is not valid UTF-8, inline-sign fails with return code 53.
sop.inline-sign.usage.option.with_key_password.0 = Passphrase to unlock the secret key(s).
2022-06-19 18:18:31 +02:00
sop.inline-sign.usage.option.with_key_password.1 = Is an INDIRECT data type (e.g. file, environment variable, file descriptor...).
2022-06-06 20:06:14 +02:00
sop.inline-sign.usage.option.micalg = Emits the digest algorithm used to the specified file in a way that can be used to populate the micalg parameter for the PGP/MIME Content-Type (RFC3156)
sop.inline-sign.usage.parameter.keys = Secret keys used for signing
sop.inline-verify.usage.header = Verify inline-signed data from standard input
2022-06-19 18:18:31 +02:00
sop.inline-verify.usage.option.not_before.0 = ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z)
2022-06-06 20:06:14 +02:00
sop.inline-verify.usage.option.not_before.1 = Reject signatures with a creation date not in range.
sop.inline-verify.usage.option.not_before.2 = Defaults to beginning of time ("-").
2022-06-19 18:18:31 +02:00
sop.inline-verify.usage.option.not_after.0 = ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z)
2022-06-06 20:06:14 +02:00
sop.inline-verify.usage.option.not_after.1 = Reject signatures with a creation date not in range.
sop.inline-verify.usage.option.not_after.2 = Defaults to current system time ("now").
sop.inline-verify.usage.option.not_after.3 = Accepts special value "-" for end of time.
sop.inline-verify.usage.option.verifications_out = File to write details over successful verifications to
sop.inline-verify.usage.parameter.certs = Public key certificates for signature verification
sop.sign.usage.header = Create a detached signature on the data from standard input
sop.sign.usage.option.armor = ASCII armor the output
sop.sign.usage.option.as.0 = Specify the output format of the signed message
sop.sign.usage.option.as.1 = Defaults to 'binary'.
sop.sign.usage-option.as.2 = If '--as=text' and the input data is not valid UTF-8, sign fails with return code 53.
sop.sign.usage.option.with_key_password.0 = Passphrase to unlock the secret key(s).
2022-06-19 18:18:31 +02:00
sop.sign.usage.option.with_key_password.1 = Is an INDIRECT data type (e.g. file, environment variable, file descriptor...).
2022-06-06 20:06:14 +02:00
sop.sign.usage.option.micalg_out = Emits the digest algorithm used to the specified file in a way that can be used to populate the micalg parameter for the PGP/MIME Content-Type (RFC3156)
sop.sign.usage.parameter.keys = Secret keys used for signing
sop.verify.usage.header = Verify a detached signature over the data from standard input
2022-06-19 18:18:31 +02:00
sop.verify.usage.option.not_before.0 = ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z)
2022-06-06 20:06:14 +02:00
sop.verify.usage.option.not_before.1 = Reject signatures with a creation date not in range.
sop.verify.usage.option.not_before.2 = Defaults to beginning of time ("-").
2022-06-19 18:18:31 +02:00
sop.verify.usage.option.not_after.1 = ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z)
2022-06-06 20:06:14 +02:00
sop.verify.usage.option.not_after.2 = Reject signatures with a creation date not in range.
sop.verify.usage.option.not_after.3 = Defaults to current system time ("now").\
sop.verify.usage.option.not_after.4 = Accepts special value "-" for end of time.
sop.verify.usage.parameter.signature = Detached signature
sop.verify.usage.parameter.certs = Public key certificates for signature verification
sop.version.usage.header = Display version information about the tool
sop.version.usage.option.extended = Print an extended version string
sop.version.usage.option.backend = Print information about the cryptographic backend
sop.help.usage.header = Display usage information for the specified subcommand
## Malformed Input
sop.error.input.malformed_session_key = Session keys are expected in the format 'ALGONUM:HEXKEY'.
2022-06-09 00:46:25 +02:00
sop.error.input.not_a_private_key = Input '%s' does not contain an OpenPGP private key.
sop.error.input.not_a_certificate = Input '%s' does not contain an OpenPGP certificate.
sop.error.input.not_a_signature = Input '%s' does not contain an OpenPGP signature.
2022-06-06 20:06:14 +02:00
sop.error.input.malformed_not_after = Invalid date string supplied as value of '--not-after'.
sop.error.input.malformed_not_before = Invalid date string supplied as value of '--not-before'.
sop.error.input.stdin_not_a_message = Standard Input appears not to contain a valid OpenPGP message.
sop.error.input.stdin_not_a_private_key = Standard Input appears not to contain a valid OpenPGP secret key.
sop.error.input.stdin_not_openpgp_data = Standard Input appears not to contain valid OpenPGP data
## Indirect Data Types
2022-06-09 00:46:25 +02:00
sop.error.indirect_data_type.ambiguous_filename = File name '%s' is ambiguous. File with the same name exists on the filesystem.
sop.error.indirect_data_type.environment_variable_not_set = Environment variable '%s' not set.
sop.error.indirect_data_type.environment_variable_empty = Environment variable '%s' is empty.
sop.error.indirect_data_type.input_file_does_not_exist = Input file '%s' does not exist.
sop.error.indirect_data_type.input_not_a_file = Input file '%s' is not a file.
sop.error.indirect_data_type.output_file_already_exists = Output file '%s' already exists.
sop.error.indirect_data_type.output_file_cannot_be_created = Output file '%s' cannot be created.
2022-06-06 20:06:14 +02:00
sop.error.indirect_data_type.illegal_use_of_env_designator = Special designator '@ENV:' cannot be used for output.
sop.error.indirect_data_type.designator_env_not_supported = Special designator '@ENV' is not supported.
sop.error.indirect_data_type.designator_fd_not_supported = Special designator '@FD' is not supported.
## Runtime Errors
sop.error.runtime.no_backend_set = No SOP backend set.
2022-06-09 00:46:25 +02:00
sop.error.runtime.cannot_unlock_key = Cannot unlock password-protected secret key from input '%s'.
sop.error.runtime.key_uses_unsupported_asymmetric_algorithm = Secret key from input '%s' uses an unsupported asymmetric algorithm.
sop.error.runtime.cert_uses_unsupported_asymmetric_algorithm = Certificate from input '%s' uses an unsupported asymmetric algorithm.
sop.error.runtime.key_cannot_sign = Secret key from input '%s' cannot sign.
sop.error.runtime.cert_cannot_encrypt = Certificate from input '%s' cannot encrypt.
2022-06-06 20:06:14 +02:00
sop.error.runtime.no_session_key_extracted = Session key not extracted. Feature potentially not supported.
sop.error.runtime.no_verifiable_signature_found = No verifiable signature found.
## Usage errors
sop.error.usage.password_or_cert_required = At least one password file or cert file required for encryption.
2022-06-09 00:46:25 +02:00
sop.error.usage.argument_required = Argument '%s' is required.
sop.error.usage.parameter_required = Parameter '%s' is required.
sop.error.usage.option_requires_other_option = Option '%s' is requested, but no option %s was provided.
2022-06-06 20:06:14 +02:00
# Feature Support
2022-06-09 00:46:25 +02:00
sop.error.feature_support.subcommand_not_supported = Subcommand '%s' is not supported.
sop.error.feature_support.option_not_supported = Option '%s' not supported.