# SPDX-FileCopyrightText: 2022 Paul Schaub # # SPDX-License-Identifier: Apache-2.0 sop.name=sop usage.header=Stateless OpenPGP Protocol usage.footerHeading=Powered by picocli%n sop.locale=Locale for description texts # Generic usage.synopsisHeading=Usage:\u0020 usage.commandListHeading = %nCommands:%n # Exit Codes usage.exitCodeListHeading=%nExit Codes:%n usage.exitCodeList.0=\u00200:Successful program execution. usage.exitCodeList.1=\u00201:Generic program error usage.exitCodeList.2=\u00203:Verification requested but no verifiable signature found usage.exitCodeList.3=13:Unsupported asymmetric algorithm usage.exitCodeList.4=17:Certificate is not encryption capable usage.exitCodeList.5=19:Usage error: Missing argument usage.exitCodeList.6=23:Incomplete verification instructions usage.exitCodeList.7=29:Unable to decrypt usage.exitCodeList.8=31:Password is not human-readable usage.exitCodeList.9=37:Unsupported Option usage.exitCodeList.10=41:Invalid data or data of wrong type encountered usage.exitCodeList.11=53:Non-text input received where text was expected usage.exitCodeList.12=59:Output file already exists usage.exitCodeList.13=61:Input file does not exist usage.exitCodeList.14=67:Cannot unlock password protected secret key usage.exitCodeList.15=69:Unsupported subcommand usage.exitCodeList.16=71:Unsupported special prefix (e.g. \"@env/@fd\") of indirect parameter usage.exitCodeList.17=73:Ambiguous input (a filename matching the designator already exists) usage.exitCodeList.18=79:Key is not signing capable # Subcommands sop.armor.usage.header=Add ASCII Armor to standard input sop.armor.usage.option.label=Label to be used in the header and tail of the armoring sop.dearmor.usage.header=Remove ASCII Armor from standard input sop.decrypt.usage.header=Decrypt a message from standard input sop.decrypt.usage.option.session_key_out=Can be used to learn the session key on successful decryption sop.decrypt.usage.option.with_session_key.0=Symmetric message key (session key). sop.decrypt.usage.option.with_session_key.1=Enables decryption of the "CIPHERTEXT" using the session key directly against the "SEIPD" packet. sop.decrypt.usage.option.with_session_key.2=Is an INDIRECT data type (e.g. file, environment variable, file descriptor...) sop.decrypt.usage.option.with_password.0=Symmetric passphrase to decrypt the message with. sop.decrypt.usage.option.with_password.1=Enables decryption based on any "SKESK" packets in the "CIPHERTEXT". sop.decrypt.usage.option.with_password_2=Is an INDIRECT data type (e.g. file, environment variable, file descriptor...) sop.decrypt.usage.option.verify_out=Emits signature verification status to the designated output sop.decrypt.usage.option.certs=Certificates for signature verification sop.decrypt.usage.option.not_before.0=ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z) sop.decrypt.usage.option.not_before.1=Reject signatures with a creation date not in range. sop.decrypt.usage.option.not_before.2=Defaults to beginning of time ('-'). sop.decrypt.usage.option.not_after.0=ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z) sop.decrypt.usage.option.not_after.1=Reject signatures with a creation date not in range. sop.decrypt.usage.option.not_after.2=Defaults to current system time ('now'). sop.decrypt.usage.option.not_after.3=Accepts special value '-' for end of time. sop.decrypt.usage.option.with_key_password.0=Passphrase to unlock the secret key(s). sop.decrypt.usage.option.with_key_password.1=Is an INDIRECT data type (e.g. file, environment variable, file descriptor...). sop.decrypt.usage.param.keys=Secret keys to attempt decryption with sop.encrypt.usage.header=Encrypt a message from standard input sop.encrypt.usage.option.armor=ASCII armor the output sop.encrypt.usage.option.type=Type of the input data. Defaults to 'binary' sop.encrypt.usage.option.with_password.0=Encrypt the message with a password. sop.encrypt.usage.option.with_password.1=Is an INDIRECT data type (e.g. file, environment variable, file descriptor...) sop.encrypt.usage.option.sign_with=Sign the output with a private key sop.encrypt.usage.option.with_key_password.0=Passphrase to unlock the secret key(s). sop.encrypt.usage.option.with_key_password.1=Is an INDIRECT data type (e.g. file, environment variable, file descriptor...). sop.encrypt.usage.param.certs=Certificates the message gets encrypted to sop.extract-cert.usage.header=Extract a public key certificate from a secret key from standard input sop.extract-cert.usage.option.armor=ASCII armor the output sop.generate-key.usage.header=Generate a secret key sop.generate-key.usage.option.armor=ASCII armor the output sop.generate-key.usage.option.user_id=User-ID, e.g. "Alice " sop.generate-key.usage.option.with_key_password.0=Password to protect the private key with sop.generate-key.usage.option.with_key_password.1=Is an INDIRECT data type (e.g. file, environment variable, file descriptor...). sop.inline-detach.usage.header=Split signatures from a clearsigned message sop.inline-detach.usage.option.armor=ASCII armor the output sop.inline-detach.usage.option.signatures_out=Destination to which a detached signatures block will be written sop.inline-sign.usage.header=Create an inline-signed message from data on standard input sop.inline-sign.usage.option.armor=ASCII armor the output sop.inline-sign.usage.option.as.0=Specify the signature format of the signed message sop.inline-sign.usage.option.as.1='text' and 'binary' will produce inline-signed messages. sop.inline-sign.usage.option.as.2='cleartextsigned' will make use of the cleartext signature framework. sop.inline-sign.usage.option.as.3=Defaults to 'binary'. sop.inline-sign.usage.option.as.4=If '--as=text' and the input data is not valid UTF-8, inline-sign fails with return code 53. sop.inline-sign.usage.option.with_key_password.0=Passphrase to unlock the secret key(s). sop.inline-sign.usage.option.with_key_password.1=Is an INDIRECT data type (e.g. file, environment variable, file descriptor...). sop.inline-sign.usage.option.micalg=Emits the digest algorithm used to the specified file in a way that can be used to populate the micalg parameter for the PGP/MIME Content-Type (RFC3156) sop.inline-sign.usage.parameter.keys=Secret keys used for signing sop.inline-verify.usage.header=Verify inline-signed data from standard input sop.inline-verify.usage.option.not_before.0=ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z) sop.inline-verify.usage.option.not_before.1=Reject signatures with a creation date not in range. sop.inline-verify.usage.option.not_before.2=Defaults to beginning of time ("-"). sop.inline-verify.usage.option.not_after.0=ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z) sop.inline-verify.usage.option.not_after.1=Reject signatures with a creation date not in range. sop.inline-verify.usage.option.not_after.2=Defaults to current system time ("now"). sop.inline-verify.usage.option.not_after.3=Accepts special value "-" for end of time. sop.inline-verify.usage.option.verifications_out=File to write details over successful verifications to sop.inline-verify.usage.parameter.certs=Public key certificates for signature verification sop.sign.usage.header=Create a detached signature on the data from standard input sop.sign.usage.option.armor=ASCII armor the output sop.sign.usage.option.as.0=Specify the output format of the signed message sop.sign.usage.option.as.1=Defaults to 'binary'. sop.sign.usage-option.as.2=If '--as=text' and the input data is not valid UTF-8, sign fails with return code 53. sop.sign.usage.option.with_key_password.0=Passphrase to unlock the secret key(s). sop.sign.usage.option.with_key_password.1=Is an INDIRECT data type (e.g. file, environment variable, file descriptor...). sop.sign.usage.option.micalg_out=Emits the digest algorithm used to the specified file in a way that can be used to populate the micalg parameter for the PGP/MIME Content-Type (RFC3156) sop.sign.usage.parameter.keys=Secret keys used for signing sop.verify.usage.header=Verify a detached signature over the data from standard input sop.verify.usage.option.not_before.0=ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z) sop.verify.usage.option.not_before.1=Reject signatures with a creation date not in range. sop.verify.usage.option.not_before.2=Defaults to beginning of time ("-"). sop.verify.usage.option.not_after.1=ISO-8601 formatted UTC date (e.g. '2020-11-23T16:35Z) sop.verify.usage.option.not_after.2=Reject signatures with a creation date not in range. sop.verify.usage.option.not_after.3=Defaults to current system time ("now").\ sop.verify.usage.option.not_after.4 = Accepts special value "-" for end of time. sop.verify.usage.parameter.signature=Detached signature sop.verify.usage.parameter.certs=Public key certificates for signature verification sop.version.usage.header=Display version information about the tool sop.version.usage.option.extended=Print an extended version string sop.version.usage.option.backend=Print information about the cryptographic backend sop.help.usage.header=Display usage information for the specified subcommand ## Malformed Input sop.error.input.malformed_session_key=Session keys are expected in the format 'ALGONUM:HEXKEY'. sop.error.input.not_a_private_key=Input '%s' does not contain an OpenPGP private key. sop.error.input.not_a_certificate=Input '%s' does not contain an OpenPGP certificate. sop.error.input.not_a_signature=Input '%s' does not contain an OpenPGP signature. sop.error.input.malformed_not_after=Invalid date string supplied as value of '--not-after'. sop.error.input.malformed_not_before=Invalid date string supplied as value of '--not-before'. sop.error.input.stdin_not_a_message=Standard Input appears not to contain a valid OpenPGP message. sop.error.input.stdin_not_a_private_key=Standard Input appears not to contain a valid OpenPGP secret key. sop.error.input.stdin_not_openpgp_data=Standard Input appears not to contain valid OpenPGP data ## Indirect Data Types sop.error.indirect_data_type.ambiguous_filename=File name '%s' is ambiguous. File with the same name exists on the filesystem. sop.error.indirect_data_type.environment_variable_not_set=Environment variable '%s' not set. sop.error.indirect_data_type.environment_variable_empty=Environment variable '%s' is empty. sop.error.indirect_data_type.input_file_does_not_exist=Input file '%s' does not exist. sop.error.indirect_data_type.input_not_a_file=Input file '%s' is not a file. sop.error.indirect_data_type.output_file_already_exists=Output file '%s' already exists. sop.error.indirect_data_type.output_file_cannot_be_created=Output file '%s' cannot be created. sop.error.indirect_data_type.illegal_use_of_env_designator=Special designator '@ENV:' cannot be used for output. sop.error.indirect_data_type.designator_env_not_supported=Special designator '@ENV' is not supported. sop.error.indirect_data_type.designator_fd_not_supported=Special designator '@FD' is not supported. ## Runtime Errors sop.error.runtime.no_backend_set=No SOP backend set. sop.error.runtime.cannot_unlock_key=Cannot unlock password-protected secret key from input '%s'. sop.error.runtime.key_uses_unsupported_asymmetric_algorithm=Secret key from input '%s' uses an unsupported asymmetric algorithm. sop.error.runtime.cert_uses_unsupported_asymmetric_algorithm=Certificate from input '%s' uses an unsupported asymmetric algorithm. sop.error.runtime.key_cannot_sign=Secret key from input '%s' cannot sign. sop.error.runtime.cert_cannot_encrypt=Certificate from input '%s' cannot encrypt. sop.error.runtime.no_session_key_extracted=Session key not extracted. Feature potentially not supported. sop.error.runtime.no_verifiable_signature_found=No verifiable signature found. ## Usage errors sop.error.usage.password_or_cert_required=At least one password file or cert file required for encryption. sop.error.usage.argument_required=Argument '%s' is required. sop.error.usage.parameter_required=Parameter '%s' is required. sop.error.usage.option_requires_other_option=Option '%s' is requested, but no option %s was provided. # Feature Support sop.error.feature_support.subcommand_not_supported=Subcommand '%s' is not supported. sop.error.feature_support.option_not_supported=Option '%s' not supported.