mirror of
https://codeberg.org/PGPainless/sop-java.git
synced 2024-11-15 20:22:06 +01:00
157 lines
No EOL
12 KiB
Properties
157 lines
No EOL
12 KiB
Properties
# SPDX-FileCopyrightText: 2022 Paul Schaub <vanitasvitae@fsfe.org>
|
|
#
|
|
# SPDX-License-Identifier: Apache-2.0
|
|
sop.name=sop
|
|
usage.header=Stateless OpenPGP Protocol
|
|
|
|
usage.footerHeading=Powered by picocli%n
|
|
sop.locale=Locale for description texts
|
|
# Generic
|
|
usage.synopsisHeading=Usage:\u0020
|
|
usage.commandListHeading = %nCommands:%n
|
|
# Exit Codes
|
|
usage.exitCodeListHeading=%nExit Codes:%n
|
|
usage.exitCodeList.0=\u00200:Successful program execution.
|
|
usage.exitCodeList.1=\u00201:Generic program error
|
|
usage.exitCodeList.2=\u00203:Verification requested but no verifiable signature found
|
|
usage.exitCodeList.3=13:Unsupported asymmetric algorithm
|
|
usage.exitCodeList.4=17:Certificate is not encryption capable
|
|
usage.exitCodeList.5=19:Usage error: Missing argument
|
|
usage.exitCodeList.6=23:Incomplete verification instructions
|
|
usage.exitCodeList.7=29:Unable to decrypt
|
|
usage.exitCodeList.8=31:Password is not human-readable
|
|
usage.exitCodeList.9=37:Unsupported Option
|
|
usage.exitCodeList.10=41:Invalid data or data of wrong type encountered
|
|
usage.exitCodeList.11=53:Non-text input received where text was expected
|
|
usage.exitCodeList.12=59:Output file already exists
|
|
usage.exitCodeList.13=61:Input file does not exist
|
|
usage.exitCodeList.14=67:Cannot unlock password protected secret key
|
|
usage.exitCodeList.15=69:Unsupported subcommand
|
|
usage.exitCodeList.16=71:Unsupported special prefix (e.g. \"@env/@fd\") of indirect parameter
|
|
usage.exitCodeList.17=73:Ambiguous input (a filename matching the designator already exists)
|
|
usage.exitCodeList.18=79:Key is not signing capable
|
|
# Subcommands
|
|
sop.armor.usage.header=Add ASCII Armor to standard input
|
|
sop.armor.usage.option.label=Label to be used in the header and tail of the armoring
|
|
sop.dearmor.usage.header=Remove ASCII Armor from standard input
|
|
sop.decrypt.usage.header=Decrypt a message from standard input
|
|
sop.decrypt.usage.option.session_key_out=Can be used to learn the session key on successful decryption
|
|
sop.decrypt.usage.option.with_session_key.0=Symmetric message key (session key).
|
|
sop.decrypt.usage.option.with_session_key.1=Enables decryption of the "CIPHERTEXT" using the session key directly against the "SEIPD" packet.
|
|
sop.decrypt.usage.option.with_session_key.2=Is an INDIRECT data type (eg. file, environment variable, file descriptor...)
|
|
sop.decrypt.usage.option.with_password.0=Symmetric passphrase to decrypt the message with.
|
|
sop.decrypt.usage.option.with_password.1=Enables decryption based on any "SKESK" packets in the "CIPHERTEXT".
|
|
sop.decrypt.usage.option.with_password_2=Is an INDIRECT data type (eg. file, environment variable, file descriptor...)
|
|
sop.decrypt.usage.option.verify_out=Emits signature verification status to the designated output
|
|
sop.decrypt.usage.option.certs=Certificates for signature verification
|
|
sop.decrypt.usage.option.not_before.0=ISO-8601 formatted UTC date (eg. '2020-11-23T16:35Z)
|
|
sop.decrypt.usage.option.not_before.1=Reject signatures with a creation date not in range.
|
|
sop.decrypt.usage.option.not_before.2=Defaults to beginning of time ('-').
|
|
sop.decrypt.usage.option.not_after.0=ISO-8601 formatted UTC date (eg. '2020-11-23T16:35Z)
|
|
sop.decrypt.usage.option.not_after.1=Reject signatures with a creation date not in range.
|
|
sop.decrypt.usage.option.not_after.2=Defaults to current system time ('now').
|
|
sop.decrypt.usage.option.not_after.3=Accepts special value '-' for end of time.
|
|
sop.decrypt.usage.option.with_key_password.0=Passphrase to unlock the secret key(s).
|
|
sop.decrypt.usage.option.with_key_password.1=Is an INDIRECT data type (eg. file, environment variable, file descriptor...).
|
|
sop.decrypt.usage.param.keys=Secret keys to attempt decryption with
|
|
sop.encrypt.usage.header=Encrypt a message from standard input
|
|
sop.encrypt.usage.option.armor=ASCII armor the output
|
|
sop.encrypt.usage.option.type=Type of the input data. Defaults to 'binary'
|
|
sop.encrypt.usage.option.with_password.0=Encrypt the message with a password.
|
|
sop.encrypt.usage.option.with_password.1=Is an INDIRECT data type (eg. file, environment variable, file descriptor...)
|
|
sop.encrypt.usage.option.sign_with=Sign the output with a private key
|
|
sop.encrypt.usage.option.with_key_password.0=Passphrase to unlock the secret key(s).
|
|
sop.encrypt.usage.option.with_key_password.1=Is an INDIRECT data type (eg. file, environment variable, file descriptor...).
|
|
sop.encrypt.usage.param.certs=Certificates the message gets encrypted to
|
|
sop.extract-cert.usage.header=Extract a public key certificate from a secret key from standard input
|
|
sop.extract-cert.usage.option.armor=ASCII armor the output
|
|
sop.generate-key.usage.header=Generate a secret key
|
|
sop.generate-key.usage.option.armor=ASCII armor the output
|
|
sop.generate-key.usage.option.user_id=User-ID, eg. "Alice <alice@example.com>"
|
|
sop.generate-key.usage.option.with_key_password.0=Password to protect the private key with
|
|
sop.generate-key.usage.option.with_key_password.1=Is an INDIRECT data type (eg. file, environment variable, file descriptor...).
|
|
sop.inline-detach.usage.header=Split signatures from a clearsigned message
|
|
sop.inline-detach.usage.option.armor=ASCII armor the output
|
|
sop.inline-detach.usage.option.signatures_out=Destination to which a detached signatures block will be written
|
|
sop.inline-sign.usage.header=Create an inline-signed message from data on standard input
|
|
sop.inline-sign.usage.option.armor=ASCII armor the output
|
|
sop.inline-sign.usage.option.as.0=Specify the signature format of the signed message
|
|
sop.inline-sign.usage.option.as.1='text' and 'binary' will produce inline-signed messages.
|
|
sop.inline-sign.usage.option.as.2='cleartextsigned' will make use of the cleartext signature framework.
|
|
sop.inline-sign.usage.option.as.3=Defaults to 'binary'.
|
|
sop.inline-sign.usage.option.as.4=If '--as=text' and the input data is not valid UTF-8, inline-sign fails with return code 53.
|
|
sop.inline-sign.usage.option.with_key_password.0=Passphrase to unlock the secret key(s).
|
|
sop.inline-sign.usage.option.with_key_password.1=Is an INDIRECT data type (eg. file, environment variable, file descriptor...).
|
|
sop.inline-sign.usage.option.micalg=Emits the digest algorithm used to the specified file in a way that can be used to populate the micalg parameter for the PGP/MIME Content-Type (RFC3156)
|
|
sop.inline-sign.usage.parameter.keys=Secret keys used for signing
|
|
sop.inline-verify.usage.header=Verify inline-signed data from standard input
|
|
sop.inline-verify.usage.option.not_before.0=ISO-8601 formatted UTC date (eg. '2020-11-23T16:35Z)
|
|
sop.inline-verify.usage.option.not_before.1=Reject signatures with a creation date not in range.
|
|
sop.inline-verify.usage.option.not_before.2=Defaults to beginning of time ("-").
|
|
sop.inline-verify.usage.option.not_after.0=ISO-8601 formatted UTC date (eg. '2020-11-23T16:35Z)
|
|
sop.inline-verify.usage.option.not_after.1=Reject signatures with a creation date not in range.
|
|
sop.inline-verify.usage.option.not_after.2=Defaults to current system time ("now").
|
|
sop.inline-verify.usage.option.not_after.3=Accepts special value "-" for end of time.
|
|
sop.inline-verify.usage.option.verifications_out=File to write details over successful verifications to
|
|
sop.inline-verify.usage.parameter.certs=Public key certificates for signature verification
|
|
sop.sign.usage.header=Create a detached signature on the data from standard input
|
|
sop.sign.usage.option.armor=ASCII armor the output
|
|
sop.sign.usage.option.as.0=Specify the output format of the signed message
|
|
sop.sign.usage.option.as.1=Defaults to 'binary'.
|
|
sop.sign.usage-option.as.2=If '--as=text' and the input data is not valid UTF-8, sign fails with return code 53.
|
|
sop.sign.usage.option.with_key_password.0=Passphrase to unlock the secret key(s).
|
|
sop.sign.usage.option.with_key_password.1=Is an INDIRECT data type (eg. file, environment variable, file descriptor...).
|
|
sop.sign.usage.option.micalg_out=Emits the digest algorithm used to the specified file in a way that can be used to populate the micalg parameter for the PGP/MIME Content-Type (RFC3156)
|
|
sop.sign.usage.parameter.keys=Secret keys used for signing
|
|
sop.verify.usage.header=Verify a detached signature over the data from standard input
|
|
sop.verify.usage.option.not_before.0=ISO-8601 formatted UTC date (eg. '2020-11-23T16:35Z)
|
|
sop.verify.usage.option.not_before.1=Reject signatures with a creation date not in range.
|
|
sop.verify.usage.option.not_before.2=Defaults to beginning of time ("-").
|
|
sop.verify.usage.option.not_after.1=ISO-8601 formatted UTC date (eg. '2020-11-23T16:35Z)
|
|
sop.verify.usage.option.not_after.2=Reject signatures with a creation date not in range.
|
|
sop.verify.usage.option.not_after.3=Defaults to current system time ("now").\
|
|
sop.verify.usage.option.not_after.4 = Accepts special value "-" for end of time.
|
|
sop.verify.usage.parameter.signature=Detached signature
|
|
sop.verify.usage.parameter.certs=Public key certificates for signature verification
|
|
sop.version.usage.header=Display version information about the tool
|
|
sop.version.usage.option.extended=Print an extended version string
|
|
sop.version.usage.option.backend=Print information about the cryptographic backend
|
|
sop.help.usage.header=Display usage information for the specified subcommand
|
|
## Malformed Input
|
|
sop.error.input.malformed_session_key=Session keys are expected in the format 'ALGONUM:HEXKEY'.
|
|
sop.error.input.not_a_private_key=Input '{0}' does not contain an OpenPGP private key.
|
|
sop.error.input.not_a_certificate=Input '{0}' does not contain an OpenPGP certificate.
|
|
sop.error.input.not_a_signature=Input '{0}' does not contain an OpenPGP signature.
|
|
sop.error.input.malformed_not_after=Invalid date string supplied as value of '--not-after'.
|
|
sop.error.input.malformed_not_before=Invalid date string supplied as value of '--not-before'.
|
|
sop.error.input.stdin_not_a_message=Standard Input appears not to contain a valid OpenPGP message.
|
|
sop.error.input.stdin_not_a_private_key=Standard Input appears not to contain a valid OpenPGP secret key.
|
|
sop.error.input.stdin_not_openpgp_data=Standard Input appears not to contain valid OpenPGP data
|
|
## Indirect Data Types
|
|
sop.error.indirect_data_type.ambiguous_filename=File name '{0}' is ambiguous. File with the same name exists on the filesystem.
|
|
sop.error.indirect_data_type.environment_variable_not_set=Environment variable '{0}' not set.
|
|
sop.error.indirect_data_type.environment_variable_empty=Environment variable '{0}' is empty.
|
|
sop.error.indirect_data_type.input_file_does_not_exist=Input file '{0}' does not exist.
|
|
sop.error.indirect_data_type.input_not_a_file=Input file '{0}' is not a file.
|
|
sop.error.indirect_data_type.output_file_already_exists=Output file '{0}' already exists.
|
|
sop.error.indirect_data_type.output_file_cannot_be_created=Output file '{0}' cannot be created.
|
|
sop.error.indirect_data_type.illegal_use_of_env_designator=Special designator '@ENV:' cannot be used for output.
|
|
sop.error.indirect_data_type.designator_env_not_supported=Special designator '@ENV' is not supported.
|
|
sop.error.indirect_data_type.designator_fd_not_supported=Special designator '@FD' is not supported.
|
|
## Runtime Errors
|
|
sop.error.runtime.no_backend_set=No SOP backend set.
|
|
sop.error.runtime.cannot_unlock_key=Cannot unlock password-protected secret key from input '{0}'.
|
|
sop.error.runtime.key_uses_unsupported_asymmetric_algorithm=Secret key from input '{0}' uses an unsupported asymmetric algorithm.
|
|
sop.error.runtime.cert_uses_unsupported_asymmetric_algorithm=Certificate from input '{0}' uses an unsupported asymmetric algorithm.
|
|
sop.error.runtime.key_cannot_sign=Secret key from input '{0}' cannot sign.
|
|
sop.error.runtime.cert_cannot_encrypt=Certificate from input '{0}' cannot encrypt.
|
|
sop.error.runtime.no_session_key_extracted=Session key not extracted. Feature potentially not supported.
|
|
sop.error.runtime.no_verifiable_signature_found=No verifiable signature found.
|
|
## Usage errors
|
|
sop.error.usage.password_or_cert_required=At least one password file or cert file required for encryption.
|
|
sop.error.usage.argument_required=Argument '{0}' is required.
|
|
sop.error.usage.parameter_required=Parameter '{0}' is required.
|
|
sop.error.usage.option_requires_other_option=Option '{0}' is requested, but no option {1} was provided.
|
|
# Feature Support
|
|
sop.error.feature_support.subcommand_not_supported=Subcommand '{0}' is not supported.
|
|
sop.error.feature_support.option_not_supported=Option '{0}' not supported. |