ELF@4 4 ( 44o((   p po/usr/lib/ld.so.1                                               [\ !#$%&'()*/123589;>@BEGHJKMNQSTVYZ[\]_abefgilopqrvxz{|}   !"#%&),./0134567:;=@ABCDEFHIJMNOQRTUVXYZ\]bdehijklmnoqstuvwxz{~     !$%')*,-./0125678;<>?@ACGIKMNOPQSUWY[\_cfgijkmnpqrstuvwxyz{|}~    #$&')+-02458;<=>?@CDFGHJNOSTUVXZ[  "+,-.0467:<=?ACDFILOPRUWX^`cdhjkmnstuwy~   $'(*+-289<>?GKLPSW[^_`acfgpry|} "#&(+349:=BDEFHJLRTVXZ]^`abdehlo  !"%(*,./13679:ABEIKLMPQRWY".<DLAUj{t  t+),K2  0$4H,.StF'0uFNxumz{{w(||l}*0DԅpT,x(5|BTU,heslcПh7T-=FXg,ly@bl`f?|j.? P`kx !?[g(@j*<<n G Oa@yPKTtx)3@l P8Y_op}H e   &  Q R fV TY Y  j  v r/8 [H  S\P (mvh ) 5 p ;    p!(3>HR\fvh] L^ E^ zh k h  p }   ) % : & #I S * L_ D+ /h t+ >r Ь | + W ,  - i H/ T / @ / ^ <0 _ 0 e 1 ` d1 ^* 1 D; 2 K 2 l^ 2 f 3 `o 5 2} <6 6 t8  ; ` h<  ?  ?  A / E 6 K A HK  dS C   ! ! ,. 1 9 8  C lP =S n d w  j ĥ  \ H  ,  @  Ա  l   E L  D  d Q' 9 i J X c r z    l        )  *  \+  ,   $/ + 1 > 3 O _ DE  m {    @    8     X    H01x$G&\DhoJi PBP ^  X` &Y >< 6 Ic` ~sԼH = dW $1l2/C dP l]d[P Yh4zDe5 l L l40h X &| 3L4 g Ԥ 3G|NY< lpo  ~(+ D 0 ztf t} 4\   r#Gi50 FdTbL~p\I$D 8 f:   W  t  u2 `d :8 1 oGz U^kd  \ AjtD ** uA_ [$u$U c}< ,8 Q$ R$7 }1'c V<X f4@Em* WT V Vd P, h i ?dr Y$fDlTyp * ~tLfI TS #  9 Oc =\N owt / `   |b  2d9B $QJm @ pB K_ 3T3 ' l*No ftQmzi 0 GP x -z !@N":O< x`#H#  TY#H c#v###* #\ # .#l6##| 0#$4` 0$& m#$D$Z0X$T Pc$v$Ly$@O$D$8_ ]$ $$$%h%x_ R$ )% -ط Q-%7%G%0 6]%D( |%D% %%D %%pk!%%$ & &!&D;&C&$0c ]0!S&T\&L: oi&$*!+{& < K&&T&/(&d  &t &&Ȇ 0' '4=#'$/'8 8'DN' e'@# {'',^''X 'd"''$' ( n(q *(D  <(/I(b {X(p k(xQ yy(D((4(\ (( 1() )R#)Ni8)+ D)ttJ)h W) o)  )D)T)< ))T ")e V)L,) P**' (*5 j9*B*<W*m**{:*4*4*# *% *\*k * " / *4+ < + + (+4 6+FM+ \+4s++(++4 "+T+$ +8 4+ĵ +P  +4+И ,,lP6,?,6*d WR,b,|,t,8 ,,4,t,, ,H Z- a -)-|DXV p?- L- &\-c-drq-Y-d-& - ?-T- >-d -s -L WD-+. . 5.KK.x^.Eyn.,F.g x W.d .ld .H .T K.2 .Q. - /t/t` /,/?)dA/\ _/hf w/dy  /D/ / /  (//p "/d/0,0) B00X0 t0d|004   [0 ^0d04_000l0P11 &1p 91+ M1xF  \1hg Mj1O r1T1  51d141P 11h A17 1D2$. 2!2D12$ ?2DD2\2b2pc v2hE D 2d2h 2 2|' 2$ .d` 02M2 >22*  33MQ3Wj3 y33U3 3pe 3 W3Z  3P/I4 4\ @ 4'4 E49C486 P4&d4$ rw4 !44 b Z4D444HU 4' !.$4p /4Da 0 55 QЎ  5;2 45F5 [5 $e5d Hx5 :5/X (d501 555 5$"5t35 66` 3'6 P B6H'T60 Kc6  t6 6Z :u 46 Z6$6 :66$7 7P 7 837x P7]7  j7h($|7j77D7̶ $X C: D7y 7\c~7( cd8Y 8ܺ28 +<8/ N845r_8r8 +88$$ 8T+8 8888T8 9p ,9" 294L9 _`9]t9949* 9T 99 c9@ 999T9: `8 6:T :~I 5:>:( R:^:tf: =u: :$ : o -: : : [T:8 O: ; n;  *; 9;tO  ;*L;4d;h 5{;&; ;T;;d;;< R<t+<$' @<7 M<8!`<, )r<<<I" <* =<| H<X<<< O=T =|1 t>=#=4=E=4/# Y=` f=z=$= ==) =~  == >">T3> I>U> pm>>Tz h> 8>z > W>@> A>ta ?>H>\O ?X ?)?@A 9? "F?t' \?< wu?h* ??Ț [D?$6 ?<* d?$??   @@$ #/@H@u d@T @2@T I@@' Zw%)X l@d@2@@@ KAW&A% 5ADSAP ^AsA4JAA  A .A Ggpgsmcrti.scrt1.ocrt1.sfsr.svalues-Xc.cvalues-xpg6.cgpgsm.cour_pk_test_algoour_cipher_test_algoour_md_test_algomy_strusageset_debugemergency_cleanupopen_readopen_es_fwriteopen_fwriterun_protect_toolopen_es_freadmisc.ckeydb.cclassify_user_idserver.cdata_line_cookie_writedata_line_cookie_closeassuan_register_option_handlerassuan_register_reset_notifyassuan_register_input_notifyassuan_register_output_notifycmd_recipientcmd_signercmd_encryptcmd_decryptcmd_verifycmd_signcmd_importcmd_exportcmd_delkeyscmd_messagecmd_listkeyscmd_dumpkeyscmd_listsecretkeyscmd_dumpsecretkeyscmd_genkeycmd_getauditlogcmd_getinfocmd_passwdcall-agent.cmembuf_data_cbdefault_inq_cbinq_ciphertext_cbinq_genkey_parmsscd_serialno_status_cbscd_keypairinfo_status_cbistrusted_status_cblearn_status_cblearn_cbkeyinfo_status_cbcall-dirmngr.cstart_dirmngr_extinq_certificateisvalid_status_cbget_cached_cert_data_cblookup_cblookup_status_cbrun_command_cbrun_command_inq_cbrun_command_status_cbfingerprint.cbase64.cbase64_reader_cbsimple_reader_cbbase64_writer_cbplain_writer_cbcertlist.ccert_usage_psame_subject_issueris_cert_in_certlistcertdump.cparse_dnformat_name_writercertcheck.ccertchain.calready_asked_marktrusteddo_listcompare_certshas_validation_model_chainunknown_criticalsallowed_cafind_upcheck_cert_policyfind_up_search_by_keyidfind_up_store_certs_cbfind_up_externalfind_up_dirmngrgpgsm_is_root_certis_cert_still_validcheck_validity_periodcheck_validity_period_cmask_marktrusteddo_validate_chainkeylist.cget_oid_desclist_cert_colonprint_name_rawprint_names_rawlist_cert_rawlist_cert_stdlist_cert_chainlist_external_cbverify.csign.chash_datahash_and_copy_dataget_default_signeradd_certificate_listencrypt.cencrypt_cbdecrypt.cdecrypt_filterimport.ccheck_and_storeimport_oneexport.cprint_short_infodelete.ccertreqgen.cget_parameterget_parameter_valuehas_invalid_email_charsproc_parameterscreate_requestcertreqgen-ui.cqualified.ci18n.cstatus.ctlv.cdo_find_tlvkeybox-init.csexputil.csysutils.chomedir.cgettime.cconvert.cpercent.cmiscellaneous.cmy_gcry_loggermy_gcry_fatalerror_handlermy_gcry_outofcore_handlerxasprintf.cmembuf.ciobuf.cfile_filterblock_filter_es_getc_underflowttyio.casshelp.cexechelp.csignal.cgot_fatal_signalgot_usr_signalestream.cmem_reallocmem_freees_deinitdo_fflushes_func_mem_reades_func_mem_writees_func_mem_seekes_func_mem_ioctles_func_mem_destroyes_func_fd_reades_func_fd_writees_func_fd_seekes_func_fd_destroyes_func_fp_reades_func_fp_writees_func_fp_seekes_func_fp_destroyes_filles_flushes_initializees_deinitializees_destroyes_read_fbfes_seekes_write_nbfes_write_fbfes_write_lbfes_writenes_skipdoreadlineprint_writerfname_set_internalestream-printf.cparse_formatpr_integerdo_formatplain_stdio_outfixed_buffer_outdynamic_buffer_outaudit.cadd_helptagwriteout_paraleave_liwriteout_liwriteout_remfind_next_log_itemget_cert_nameget_cert_subjectlist_certlist_certchainproc_type_encryptproc_type_signproc_type_decryptproc_type_verifysession-env.chelpfile.cfindkey_localeyesno.clocalename.ckeybox-util.ckeybox-blob.cput_membufcreate_blob_headercreate_blob_finishkeybox-search.cblob_cmp_snblob_cmp_fprblob_cmp_fpr_partblob_cmp_nameblob_cmp_mailblob_x509_has_griprelease_sn_arraykeybox-update.cblob_filecopykeybox-file.cstringhelp.cstrlist.cutf8conv.cdo_utf8_to_nativeargparse.cfind_long_optionshow_helpset_opt_argshow_versionlogging.cdo_logdotlock.cmischelp.cgpgrlhelp.cset_completerrl_inhibit_completionrl_cleanup_after_signalinit_streamcrtn.sksba_writer_set_filekeydb_deletees_writekeydb_set_ephemerales_fgetsunsetenves_mopengcry_cipher_setkeysigemptysetksba_cert_get_subjectgmtimeget_native_charsetascii_memistrpercent_plus_unescapegpgsm_exporttcsetattrgpgsm_get_fingerprint_hexstringgpgsm_agent_scd_keypairinfostrftimegcry_sexp_releaseksba_cert_set_user_datasend_pinentry_environmentgcry_pk_get_nbitskeybox_register_fileksba_cms_get_digest_algoksba_cms_get_enc_valgpgsm_dump_serialascii_strcmpxstrconcathexcolon2binksba_name_releaseassuan_command_parse_fdkeydb_push_found_stategpgsm_dump_stringfopen64strlist_popsession_env_getenvstore_mb_linesgcry_md_get_algo_dlenmake_filenametzsetes_tmpfileiobuf_cancelkeybox_search_resetkeydb_search_next_es_get_std_streamestream_vsnprintfgnupg_module_namekeybox_set_ephemeralrl_free_line_stategnupg_faked_time_pget_membufgcry_md_ctlprint_sanitized_utf8_stringmemicmpes_clearerr_unlockedtty_getkeydb_update_certes_fclose_snatchgcry_md_resetgcry_xreallocgpgsm_get_short_fingerprintadd_historygpgsm_get_keygrip_hexstringmkdirascii_memcasememsession_env_newadd_seconds_to_isotimees_vfprintf_unlockedsanitize_bufferassuan_close_output_fdappend_to_strlistabortmake_timestampes_fdopengpg_strerrorksba_cms_newgpgsm_finish_writersame_file_pksba_reader_set_cbes_write_sanitized_utf8_bufferpercent_unescape_inplacekeydb_get_resource_nameksba_name_get_uriksba_certreq_newiobuf_tellgcry_md_writetty_print_utf8_string2_keybox_write_header_blobksba_cert_get_subj_key_idhex2strsession_env_putenvasctimestampgcry_strdupgpg_err_code_from_syserrorkeydb_search_issuer_snksba_cms_set_reader_writeriobuf_write_tempstrtimestampgpgsm_print_serialtrim_trailing_spacesgcry_cipher_get_algo_blklenes_opaque_setksba_cms_add_digest_algogcry_cipher_opengcry_md_hash_bufferkeydb_get_flagsgnupg_unblock_all_signalstty_get_answer_is_yeshex2str_alloces_setbufes_fseekiobuf_tempgcry_sexp_sscanksba_writer_write_octet_stringprint_sanitized_bufferes_fclosejnlib_iconvgcry_md_openjnlib_iconv_closeiobuf_temp_with_contentgcry_reallocksba_certreq_add_extensiones_fputs_etextgcry_create_noncestrcpykeydb_set_cert_flagsgcry_xcallocbin2hexcoloncmp_simple_canon_sexpiobuf_open_fd_or_namextryasprintfkeybox_insert_cert_nunamegcry_cipher_closelog_get_errorcountascii_strncasecmpsetlocaleadd_to_strlist2getuidgcry_cipher_encrypti18n_switchto_utf8gpgsm_agent_readkeytrim_spaceskeybox_get_resource_namees_ferror__udiv64audit_log_certgpgsm_proxy_pinentry_notifystrlist_prevascii_touppersession_env_setenv_DYNAMICkeybox_get_flagsprint_fname_stdoutgcry_mpi_scanassuan_write_statusstrtolgpgsm_format_serialksba_cms_add_certgnupg_init_signalsksba_cert_get_authority_info_accessprint_sanitized_buffer2timegmgcry_xmalloces_fopenmem_initiobuf_get_fnamelog_debugprint_sanitized_string2assuan_fdopenassuan_get_output_fdgcry_md_closeiobuf_debug_modeiobuf_closees_fputckeydb_releaseksba_cert_init_from_memgcry_set_log_handlerget_all_open_fdshextobyteestream_snprintfget_status_stringksba_certreq_set_hash_functiongpgsm_certs_identical_pgpgsm_print_name2i18n_initgnupg_localedir_keybox_get_blob_fileoffsetgcry_xstrdupdo_fdopenkeybox_set_flagsassuan_set_errores_fprintf_unlockedgpgsm_encryptgnupg_sysconfdires_fprintfinit_membufaudit_set_typeiobuf_ioctlgpgsm_signtty_print_utf8_stringlog_get_fdes_opaque_getksba_writer_writegpgsm_format_sn_issuergcry_md_infokeydb_search_issuergpgsm_serverksba_cert_get_crl_dist_pointiobuf_skip_restappend_to_strlist2es_fileno_lib_versionksba_cert_get_cert_policiesgeteuidumaskxasprintfmake_dotlockksba_reader_releasekeybox_release_environgnupg_spawn_process_fd_endkeydb_rebuild_cachesget_max_fdsaudit_log_ipth_waitpidgpgsm_cert_log_name__1cG__CrunMdo_exit_code6F_v_log_get_prefixenable_core_dumpsstrrchrksba_cms_parseaudit_log_sgpgsm_dirmngr_run_commandkeydb_store_certassuan_set_gpg_err_sourcetty_getfes_fputs_unlockedtty_get_ttynameksba_certreq_set_writeroptfile_parsekey_purpose_mapgcry_pk_get_keygripkeybox_set_malloc_hookses_ftellsysconfassuan_send_dataatoigcry_sexp_nth_mpi_keybox_get_blob_imagememsetgpgsm_agent_genkeykeydb_get_certes_fileno_unlockedgcry_md_algo_namerenamegcry_pk_algo_name_PROCEDURE_LINKAGE_TABLE_es_setvbufgnupg_set_timeksba_certreq_set_public_keygpgsm_init_default_ctrloptgettextes_asprintfgnupg_get_help_stringtty_fprintfpercent_plus_escapegpgsm_cert_use_verify_plog_inc_errorcountgnupg_sleepiobuf_read_lineksba_cert_get_ext_key_usagesgnupg_spawn_process_detachedgpgsm_dirmngr_lookupiobuf_readarg_parseassuan_get_pointeriobuf_get_filelengthgpgsm_create_readerlocaltimekeydb_lockes_getlineksba_cms_get_sigattr_oidsgpgsm_exitstore_key_value_lfiobuf_writestrassuan_processgnupg_get_timeiobuf_flush_tempgcry_sexp_build__iobkeydb_add_resourceputcharkeybox_searchksba_cms_get_message_digestascii_isupper__xpg4log_buggetrlimit64es_free__xpg6keybox_compresslog_get_streamstrncpyksba_cert_hashsigsuspendksba_oid_to_strksba_cert_read_dergpgsm_format_namestandard_homedires_clearerrgpgsm_deletegmtime_rtty_cleanup_after_signalaudit_log_okgpgsm_dump_certiobuf_readbytegcry_mpi_get_nbitsrl_catch_signalstry_percent_escapesigactionestream_asprintfsigaddsetksba_check_versionksba_reader_clearstrncmpgnupg_datadir_keybox_read_blob_keybox_reallocsetup_pinentry_envgpg_strsource_keybox_freegcry_calloc_securetty_print_string_keybox_new_blobrl_attempted_completion_functionkeydb_classify_namees_freopengcry_check_versionkeydb_search_resetkeydb_search_kidksba_cert_get_user_data_keybox_write_blobstrlist_lastgcry_mpi_releaseksba_cms_set_message_digestes_initsetup_libgcrypt_loggingtty_batchmode__fpstartgcry_cipher_ctltty_enable_completion_keybox_get_flag_locationgcry_malloces_fname_setksba_cms_get_content_oidlog_logvksba_cert_get_key_usagegpgsm_fpr_and_name_for_statustcgetattriobuf_push_filterunlink_GLOBAL_OFFSET_TABLE_assuan_begin_confidentialctermidassuan_transactgetpwnamdump_isotimeksba_cms_get_certes_fdopen_ncksba_cms_add_signerksba_cms_buildgpgsm_find_certestream_vfprintfgnupg_wait_processgcry_cipher_decryptutf8_charcountassuan_newgpgsm_walk_cert_chainsetrlimit64log_infoassuan_set_hello_lineprint_imported_summarygpgsm_add_to_certlistgcry_md_readgpgsm_parse_validation_modelselectiobuf_writegpgsm_add_cert_to_certlistgpgsm_get_fingerprintksba_name_enumksba_writer_releaselog_set_prefixes_fopencookieestream_vasprintfgpgsm_statusmatch_multistres_ferror_unlockedkeybox_deletegcry_cipher_mode_from_oidksba_cert_get_subject_info_accessgcry_calloces_fflushksba_reader_readtty_no_terminalksba_cms_get_sig_valiobuf_createkeydb_search_subjectgpgsm_es_print_name2es_pth_killfsyncgpgsm_genkeygpgsm_qualified_consentstart_new_gpg_agentksba_cert_get_seriales_fgetclog_printhex__urem64iobuf_enable_special_filenamesput_membuf_strgpgsm_agent_learngnupg_create_inbound_piperaisegnupg_reopen_stdepoch2isotimees_vfprintfgpgsm_destroy_readerassuan_socket_connectgpgsm_cert_use_encrypt_p__fsrksba_dn_teststrget_pk_algo_from_canon_sexpdisable_core_dumps___Argvmake_filename_trygcry_set_outofcore_handleres_vasprintfes_ftrylockfilelog_set_fdaudit_releasegpgsm_basic_cert_checkis_native_utf8ksba_cert_get_validitygcry_sexp_cadr_edatagcry_pk_verifyiobuf_flushassuan_end_confidentiallog_fataliobuf_peekes_rewindestream_printfsigfillsetnative_to_utf8gpgsm_reader_eof_seenkeydb_clear_some_cert_flagsgetpwuidassuan_set_pointerksba_cert_is_caksba_cms_set_content_typememchrascii_tolowermktimeksba_cms_get_issuer_serialksba_certreq_add_subjectksba_cert_release_keybox_close_fileiobuf_set_limitkeybox_newassuan_set_assuan_log_prefixkeydb_pop_found_statestrlist_copyrelease_dotlockstpcpygcry_md_debuggpgsm_agent_istrustedstrlenget_session_markerkeydb_newtmpfile64close_all_fdsdestroy_dotlockgpgsm_format_keydesces_fpopenksba_cms_get_digest_algo_listes_ungetcgpgsm_create_cms_signaturekeydb_locate_writablegpgsm_agent_passwdkeydb_set_flagskeydb_insert_certmake_dirnamees_fopenmemtrim_trailing_wscreate_dotlockiobuf_temp_to_bufferisotime2epochgpgsm_get_fingerprint_stringjnlib_iconv_opengcry_controlksba_cms_set_sig_valksba_cert_get_issuerpercent_plus_unescape_inplacelength_sans_trailing_wsgpgsm_decryptksba_cert_get_digest_algoes_flockfiletty_cleanup_rl_after_signalksba_cert_newlog_set_get_tid_callbackes_feofksba_cms_get_content_enc_ivksba_cert_get_public_keygnupg_pause_on_sigusrgpgsm_cert_use_sign_pgpgsm_not_qualified_warninglseek64ksba_writer_set_filteraudit_loges_readmemcmpgpgsm_validate_chaingetpidgcry_cipher_get_algo_keylengpgsm_get_certidkeydb_search_fpr__ctype_maskiobuf_push_filter2set_native_charsetdirmngr_socket_nameestream_formatmake_basenamehex2bingcry_md_algo_infoascii_islowerassuan_close_input_fdgcry_pk_algo_infoascii_strcasecmpstrcspni18n_switchbackgpgsm_verifygcry_cipher_algo_infostrsepassuan_get_input_fdgcry_pk_encryptlog_errorpth_forkassuan_set_malloc_hooks_finitrim_trailing_charsadd_days_to_isotimefstat64log_set_filees_fseekotranslate_sys2libc_fd_intanswer_is_okay_cancelkeydb_searchbug_atgcry_randomizegnupg_libexecdirksba_cms_identifybin2hexiobuf_is_pipe_filenamekeydb_search_firstgpgsm_cert_use_decrypt_piobuf_sockopenksba_certreq_releasegpgsm_es_print_namemake_canon_sexplength_sans_trailing_charsdo_fpopenestream_fprintfgpgsm_release_certlistbindtextdomainkeybox_is_writablememcpymake_canon_sexp_from_rsa_pkstrtimevaluegpgsm_agent_havekeygpgsm_import_filesfind_tlv_uncheckedksba_cert_refmem2strksba_cms_get_signing_timegcry_freegpgsm_get_default_certgnupg_tmpfile_parse_sexpmake_printable_stringstrtouliobuf_fdopengpgsm_agent_keyinfogcry_cipher_setivgpgsm_agent_send_nopi18n_utf8init_membuf_securememrchrksba_reader_set_memgpgsm_list_keysatexitrl_outstream_parse_ber_header_get_exit_frame_monitorksba_reader_newksba_cert_get_auth_key_idftello64print_fname_stdingpgsm_is_in_qualified_listgpgsm_get_keygrip_keybox_callocgpgsm_p12_exportes_write_sanitizedpercent_unescapeiobuf_get_fdksba_cms_set_content_enc_algogpgsm_gencertreq_ttygcry_sexp_find_tokengcry_malloc_securerl_instreamascii_memcasecmpget_inv_recpsgnr_codeiobuf_set_partial_block_mode__assert_c99es_read_line__longdouble_usedgpgsm_status_with_err_codegpgsm_agent_pkdecrypt__environ_lockiobuf_writebyteiobuf_print_chaingpgsm_scd_pksignkeybox_pop_found_state_keybox_read_blob2gpgsm_agent_scd_serialnoaudit_newgnupg_get_isotimegpgsm_print_timeksba_certreq_build_keybox_mallocchdirksba_freegpgsm_status2gnupg_messages_locale_nameassuan_releasegpgsm_errors_seenksba_cms_releasedup2ksba_cms_hash_signed_attrslog_test_fdgpgsm_check_cms_signatureksba_cms_set_signing_timegpgsm_create_writergnupg_rl_initializeassuan_inquirestrcatgnupg_libdirfree_strlistkeybox_push_found_statees_feof_unlockednl_langinfostrpbrkremovegcry_set_fatalerror_handleriobuf_seekgcry_md_map_namegpgsm_check_cert_sigfseeko64session_env_listenvsigprocmaskmemmove_es_set_std_fdiobuf_openes_funlockfilecompare_filenamesget_rsa_pk_from_canon_sexpsession_env_releaseadd_to_strlistcheck_isotimees_write_hexstringgnupg_spawn_processanswer_is_yes_no_quittty_get_hiddenkeybox_update_certassuan_register_commandtty_disable_completionsetsidgpgsm_agent_get_confirmationksba_cms_add_recipientgpgsm_dirmngr_isvalidksba_cms_set_enc_valgpgsm_get_key_algo_infostrspniobuf_get_real_fnameksba_cert_get_sig_val_keybox_release_blobisotimestampgpgsm_agent_pksign_es_putc_overflowgcry_cipher_algo_namegcry_md_enablegpgsm_print_namedefault_homedires_ftellogpgsm_destroy_writerksba_cert_get_imagetty_private_set_rl_hooksexecvscan_isodatestr___errnorl_readline_name__fsr_init_valuegcry_sexp_canon_leniobuf_openrwassuan_pipe_connectassuan_init_pipe_servertty_kill_promptksba_set_malloc_hooksgnupg_allow_set_foregound_windowksba_cms_set_hash_functionbind_textdomain_codesetassuan_set_log_streamgcry_sexp_sprinthash_algo_from_sigvalgcry_pk_ctlkeygrip_from_canon_sexpksba_cert_get_extensioniobuf_alloces_fname_getprint_sanitized_stringes_fpopen_nc_startstrlwris_file_compressedgpgsm_cert_use_ocsp_pgpgsm_format_name2es_fopenkeyserver_list_freekeybox_get_certset_strusagetranslate_sys2libc_fd_keybox_create_x509_blobgnupg_bindirgcry_pk_map_namegpgsm_importadd_days_to_timestampgnupg_block_all_signalsgcry_sexp_nth_dataassuan_acceptmake_simple_sexp_from_hexstrksba_writer_set_cbdisable_dotlockksba_certreq_set_sig_valprint_sanitized_utf8_buffersession_env_getenv_or_defaultstrstrtty_printfksba_writer_new_keybox_update_header_blobstrchrdotlock_remove_lockfilesgpg_err_code_from_errnoanswer_is_yes_no_defaultgpgsm_cert_use_cert_ptrap_unalignedksba_cms_add_smime_capabilitylog_printfgcry_cipher_map_nameparse_keyserver_linegpgsm_agent_marktrustedaudit_print_resultinit_common_subsystemssession_env_list_stdenvnameslibc.so.1SUNW_1.23SUNW_1.22SUNW_1.21SUNW_1.1SUNW_0.8SUNW_0.7SYSVABI_1.3SUNWprivate_1.1libnsl.so.1libgcrypt.so.11libgpg-error.so.0libksba.so.8libassuan.so.0libreadline.so.5libcurses.so.1AyAyAyB'= B(= B(= !B7*BqN 6B   / 5Z{b8 ],& uBlem3mCji !"#$%&'()*+,-./1234 567 [}89:<=>@A$?BCD"FHBGHIJ*XL7nU2MNvn'QP qQ3JTUVWXY[\]^_Z`abcde?ghijklmnSqrstvx+z{<~}M1+8R]r(B&zV  8b K:h_G649T!>|mgM^J#kex)\tfd&1S;*0{loER%2l 5(`!vJbAwzO0#6?v4 Ut-4jC./@ za/w N<=uM-N/yq}+[Hu5X;P\^Lf*GTTcadx79g L{1:6B`ocjo]s*I-~F,=O<LP K0?V!Qp)F2#&!7`2CY>XfDRYs\=Ad4A^xt|J`DTRDed)HSX\h u-L Q$H(,!0 48<@DLYPThX\F`dhlLpX%8$Vv|=S&e F[G $f(,v048<$@DKHMLFPETTX\`Jd"hlptx|=7+!>0;$.P)k~ B9 2$y(,048<=@qDHLPTWX\H`@dhlp}t x}|a*"Pn3&D!0[Th^ 8+{ $(,z048<o@oDHTLPAT"X`\`bd>hmlppdtx|U71fEZR\Bmt <  \K  $((,O048<N@DL;PTX6\`dIhBlptx|W% TWCyV A }6 (,048N<+@L5P:lkeydb_releasekeydb_newGNU Privacy Guard's S/M server 2.0.27 readyPASSWD Change the passphrase of the secret key for USERID.GETINFO Multipurpose function to return a variety of information. Supported values for WHAT are: version - Return the version of the program. pid - Return the process id of the server. agent-check - Return success if the agent is running. cmd_has_option CMD OPT - Returns OK if the command CMD implements the option OPT.GETAUDITLOG [--data] [--html] If --data is used, the output is send using D-lines and not to the file descriptor given by an OUTPUT command. If --html is used the output is formated as an XHTML block. This is designed to be incorporated into a HTML document.GENKEY Read the parameters in native format from the input fd and write a certificate request to the output.LISTKEYS [] LISTSECRETKEYS [] DUMPKEYS [] DUMPSECRETKEYS [] List all certificates or only those specified by PATTERNS. Each pattern shall be a percent-plus escaped certificate specification. The "SECRET" versions of the command filter the output to include only certificates where the secret key is available or a corresponding smartcard has been registered. The "DUMP" versions of the command are only useful for debugging. The output format is a percent escaped colon delimited listing as described in the manual. These "OPTION" command keys effect the output:: "list-mode" set to 0: List only local certificates (default). 1: Ditto. 2: List only external certificates. 3: List local and external certificates. "with-validation" set to true: Validate each certificate. "with-ephemeral-key" set to true: Always include ephemeral certificates. "list-to-output" set to true: Write output to the file descriptor given by the last "OUTPUT" command.MESSAGE FD[=] Set the file descriptor to read the message for a detached signatures to N. If N is not given and the operating system supports file descriptor passing, the file descriptor currently in flight will be used. See also the "INPUT" and "OUTPUT" commands.INPUT FD[=] Set the file descriptor to read the input data to N. If N is not given and the operating system supports file descriptor passing, the file descriptor currently in flight will be used. See also the "MESSAGE" and "OUTPUT" commands.OUTPUT FD[=] Set the file descriptor to write the output data to N. If N is not given and the operating system supports file descriptor passing, the file descriptor currently in flight will be used. See also the "INPUT" and "MESSAGE" commands.DELKEYS Delete the certificates specified by PATTERNS. Each pattern shall be a percent-plus escaped certificate specification. Usually a fingerprint will be used for this.EXPORT [--data [--armor|--base64]] [--] Export the certificates selected by PATTERN. With --data the output is returned using Assuan D lines; the default is to use the sink given by the last "OUTPUT" command. The options --armor or --base64 encode the output using the PEM respective a plain base-64 format; the default is a binary format which is only suitable for a single certificate.IMPORT [--re-import] Import the certificates read form the input-fd, return status message for each imported one. The import checks the validity of the certificate but not of the entire chain. It is possible to import expired certificates. With the option --re-import the input data is expected to a be a LF separated list of fingerprints. The command will re-import these certificates, meaning that they are made permanent by removing their ephemeral flag.SIGN [--detached] Sign the data set with the INPUT command and write it to the sink set by OUTPUT. With "--detached", a detached signature is created (surprise).VERIFY This does a verify operation on the message send to the input FD. The result is written out using status lines. If an output FD was given, the signed text will be written to that. If the signature is a detached one, the server will inquire about the signed material and the client must provide it.DECRYPT This performs the decrypt operation after doing some check on the internal state. (e.g. that only needed data has been set). Because it utilizes the GPG-Agent for the session key decryption, there is no need to ask the client for a protecting passphrase - GPG-Agent does take care of this by requesting this from the user.ENCRYPT Do the actual encryption process. Takes the plaintext from the INPUT command, writes to the ciphertext to the file descriptor set with the OUTPUT command, take the recipients form all the recipients set so far. If this command fails the clients should try to delete all output currently done or otherwise mark it as invalid. GPGSM does ensure that there won't be any security problem with leftover data on the output in this case. This command should in general not fail, as all necessary checks have been done while setting the recipients. The input and output pipes are closed.SIGNER Set the signer's keys for the signature creation. USERID should be the internal representation of the key; the server may accept any other way of specification [we will support this]. If this is a valid and usable signing key the server does respond with OK, otherwise it returns an ERR with the reason why the key can't be used, the signing will then not be done for this key. If the policy is not to sign at all if not all signer keys are valid, the client has to take care of this. All SIGNER commands are cumulative until a RESET but they are *not* reset by an SIGN command becuase it can be expected that set of signers are used for more than one sign operation.RECIPIENT Set the recipient for the encryption. USERID shall be the internal representation of the key; the server may accept any other way of specification [we will support this]. If this is a valid and trusted recipient the server does respond with OK, otherwise the return is an ERR with the reason why the recipient can't be used, the encryption will then not be done for this recipient. If the policy is not to encrypt at all if not all recipients are valid, the client has to take care of this. All RECIPIENT commands are cumulative until a RESET or an successful ENCRYPT command.gpgsm_agent_pkdecryptgpgsm_scd_pksignstart_dirmngr2start_dirmngrgpgsm_get_fingerprint_hexstringgpgsm_get_fingerprint_stringgpgsm_get_fingerprint1.3.6.1.5.5.7.3.91.3.6.1.5.5.7.3.81.3.6.1.5.5.7.3.41.3.6.1.5.5.7.3.31.3.6.1.5.5.7.3.21.3.6.1.5.5.7.3.1pretty_es_print_sexppretty_print_sexpdo_encode_mdlist_cert_stdlist_cert_rawgpgsm_verifygpgsm_signdecrypt_filterpopen_protect_toolpopen_protect_toolproc_parameterscreate_request2.5.29.15read_list !(1=MYht -=ELS\fu '.7CO]kv (/=GXh|ENTERLEAVEABORTGOODSIGBADSIGERRSIGBADARMORRSA_OR_IDEATRUST_UNDEFINEDTRUST_NEVERTRUST_MARGINALTRUST_FULLYTRUST_ULTIMATENEED_PASSPHRASEVALIDSIGSIG_IDENC_TONODATABAD_PASSPHRASENO_PUBKEYNO_SECKEYNEED_PASSPHRASE_SYMDECRYPTION_INFODECRYPTION_FAILEDDECRYPTION_OKAYMISSING_PASSPHRASEGOOD_PASSPHRASEGOODMDCBADMDCERRMDCIMPORTEDIMPORT_OKIMPORT_PROBLEMIMPORT_RESIMPORT_CHECKFILE_STARTFILE_DONEFILE_ERRORBEGIN_DECRYPTIONEND_DECRYPTIONBEGIN_ENCRYPTIONEND_ENCRYPTIONBEGIN_SIGNINGDELETE_PROBLEMGET_BOOLGET_LINEGET_HIDDENGOT_ITPROGRESSSIG_CREATEDSESSION_KEYNOTATION_NAMENOTATION_DATAPOLICY_URLBEGIN_STREAMEND_STREAMKEY_CREATEDUSERID_HINTUNEXPECTEDINV_RECPINV_SGNRNO_RECPNO_SGNRALREADY_SIGNEDKEYEXPIREDKEYREVOKEDSIGEXPIREDEXPSIGEXPKEYSIGATTRIBUTEREVKEYSIGNEWSIGSIG_SUBPACKETPLAINTEXTPLAINTEXT_LENGTHKEY_NOT_CREATEDNEED_PASSPHRASE_PINCARDCTRLSC_OP_FAILURESC_OP_SUCCESSBACKUP_KEY_CREATEDPKA_TRUST_BADPKA_TRUST_GOODTRUNCATEDERRORSUCCESS))))(1:e(10:public-key(3:rsa(1:ndo_plus_or_plain_unescapeBZhPKiobuf_writebyteiobuf_set_partial_block_modeiobuf_peekunderflowpop_filterblock_filterfile_filterfd_cache_openfd_cache_closefd_cache_invalidategnupg_pause_on_sigusrgnupg_init_signalses_emptyes_flushes_func_mem_writeestream_vasprintfdo_formataudit_print_resultproc_type_verify #1;GPcq '1=O^junull eventsetup readyagent readydirmngr readygpg readygpgsm readygot datadetached signaturecert only sigdata hash algoattr hash algodata cipher algobad data hash algobad data cipher algodata hashingread errorwrite errorusage errorsave certnew sigsig namesig statusnew recprecp namerecp resultdecryption resultvalidate chainchain beginchain certchain rootcertchain endchain statusroot trustedcrl checkgot recipientssession keyencrypted toencryption donesigned bysigning done_keybox_close_filekeybox_newcreate_blob_finishdo_logvAES%s yesSERPENTGPG_TTYDISPLAY assuan memory crypto Home: libksbattytypettynamedisplayhomediroptionskeyringdry-runverbosegen-keydecryptencryptkeyserver:%lu: with-validationdisable-dirmngrdirmngr-programerror executing `%s': %s fdopen(%d) failed: %s wbes_fdopen(%d) failed: %s rbcan't open `%s': %s chainshellinvalid command (there is no implicit command) error changing passphrase: %s --passwd error learning card: %s --learn-card--export-secret-key-p12 KEY-ID--gen-key --batch [parmfile]/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/gpgsm.c--decrypt [filename]--verify [signature [detached_data]]option --output ignored for a detached signature this command has not yet been implemented --sign [datafile]--encrypt [datafile]---call-dirmngr {args}... okay waiting for debugger - my pid is %u ..... RSA-2048default_pubkey_algo:%lu:"%s: encrypt-to:%lu: default-key:%lu: p12-charset:%lu: cipher-algo:%lu:"3DES: prefer-system-dirmngr:%lu: disable-dirmngr:%lu: auto-issuer-key-retrieve:%lu: disable-policy-checks:%lu: include-certs:%lu:%d: enable-ocsp:%lu: disable-trusted-cert-crl-check:%lu: disable-crl-checks:%lu: log-file:%lu: debug-level:%lu:"none: quiet:%lu: verbose:%lu: gpgconf-gpgsm.conf:%lu:"%s can't sign using `%s': %s importing common certificates `%s' com-certs.pempubring.kbxrandom_seedselected digest algorithm is invalid selected cipher algorithm is invalid 1.2.392.200011.61.1.1.1.4CAMELLIA2561.2.392.200011.61.1.1.1.3CAMELLIA1921.2.392.200011.61.1.1.1.2CAMELLIA128CAMELLIA1.2.410.200004.1.4SEED1.3.6.1.4.1.11591.13.2.421.3.6.1.4.1.11591.13.2.22SERPENT1921.3.6.1.4.1.11591.13.2.2SERPENT1282.16.840.1.101.3.4.1.42AES2562.16.840.1.101.3.4.1.2AES1281.2.840.113549.3.7atexit failed WARNING: running with faked system time: WARNING: program may create a core file! %s %s; %s could not parse keyserver XAUTHORITYTERMreading options from `%s' option file `%s': %s NOTE: no default option file `%s' rpolicies.txtgpgsm.conf3DESerror allocating session environment block: %s 1.0.7%s is too old (need %s, have %s) 1.4.0gpgsm%s:%u: skipping this line %s:%u: password given without user %s:%u: no hostname given unknown validation model `%s' NOTE: won't be able to encrypt to `%s': %s can't encrypt to `%s': %s conflicting commands hashing memstat cache mpi x509enabled debug flags:%s%s%s%s%s%s%s%s invalid debug-level `%s' given guruexpertadvancedbasicnoneerror setting session environment: %s usage: gpgsm [options] , Hash: Pubkey: Cipher: Supported algorithms: libgcryptSyntax: gpgsm [options] [files] Sign, check, encrypt or decrypt using the S/MIME protocol Default operation depends on the input data Usage: gpgsm [options] [files] (-h for help)Please report bugs to <@EMAIL@>. SunOS2.0.27gpgsm (GnuPG) delete-keycheck-sigscheck-siglist-sigslist-siglist-keyignore-cert-extensionno-common-certs-importno-random-seed-fileignore-time-conflictdisable-pubkey-algodisable-cipher-algowith-fingerprintskip-verifywith-ephemeral-keyswith-md5-fingerprintwith-key-datawith-colonsno-batchfaked-system-timeprotect-tool-programxauthoritylc-messageslc-ctypeagent-programno-optionsno-greetingno-default-keyringno-armourno-armorno-secmem-warningenable-special-filenamesno-verbose@ Examples: -se -r Bob [file] sign and encrypt for user Bob --clearsign [file] make a clear text signature --detach-sign [file] make a detached signature --list-keys [names] show keys --fingerprint [names] show fingerprints @ (See the man page for a complete listing of all commands and options) extra-digest-algo|NAME|use message digest algorithm NAMEdigest-algo|NAME|use cipher algorithm NAMEcipher-algo|FD|write status info to this FDstatus-fdfixed-passphrasedebug-ignore-expirationdebug-no-chain-validationdebug-allow-core-dumpdebug-waitdebug-nonedebug-all|LEVEL|set the debugging level to LEVELdebug-leveldebug|FILE|read options from FILE|SPEC|use this keyserver to lookup keyskeyserver|USER-ID|use USER-ID as default secret keydefault-key|FILE|add keyring to the list of keyringsassume no on most questionsnoassume yes on most questionsbatch mode: never askbatchdo not make any changeshtml-audit-log|FILE|write an audit log to FILEaudit-loglogger-fdno-log-file|FILE|write a server mode log to FILElog-filedon't use the terminal at allno-ttybe somewhat more quietquiet|FILE|write output to FILEoutput|USER-ID|use USER-ID to sign or decryptlocal-userno-encrypt-toencrypt-tofetch missing issuer certificatesauto-issuer-key-retrieveenable-policy-checksdo not check certificate policiesdisable-policy-checks|FILE|take policy information from FILEpolicy-file|N|number of certificates to includeinclude-certsvalidation-modelcheck validity using OCSPenable-ocspdisable-ocspforce-crl-refreshenable-trusted-cert-crl-checkdisable-trusted-cert-crl-checkenable-crl-checksnever consult a CRLdisable-crl-checksuse system's dirmngr if availableprefer-system-dirmngr|USER-ID|encrypt for USER-IDrecipientassume input is in binary formatassume-binaryassume input is in base-64 formatassume-base64assume input is in PEM formatassume-armorp12-charsetcreate base-64 encoded outputbase64armourcreate ascii armored outputarmor@ Options: keydb-clear-some-cert-flagsdump-secret-keysdump-external-keysdump-chaindump-keysdump-certgpgconf-testgpgconf-listchange a passphrasepasswdinvoke gpg-protect-toolcall-protect-toolpass a command to the dirmngrcall-dirmngrrun in server modeserverregister a smartcardlearn-card@export-secret-key-p12export certificatesexportimport certificatesimportimport keys from a key serverrecv-keysexport keys to a key serversend-keysremove keys from the public keyringdelete-keysgenerate a new key pairlist keys and fingerprintsfingerprintlist certificate chainlist-chainlist secret keyslist-secret-keyslist external keyslist-external-keyslist keyslist-keysverify a signatureverifydecrypt data (default)encryption only with symmetric ciphersymmetricencrypt datamake a detached signaturedetach-signmake a clear text signatureclearsignmake a signaturesign@Commands: /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hGPG_TTYLC_MESSAGESLC_CTYPE/dev/ttyGPG_TTY has not been set - using maybe bogus default /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hkeydb_search failed: %s key `%s' not found: %s allocating memory failed: %s keydb_new failed error storing flags: %s error getting stored flags: %s problem re-searching certificate: %s error locking keybox: %s error storing certificate: %s error finding writable keyDB: %s problem looking for existing certificate: %s failed to allocate keyDB handle failed to get the fingerprint :0123456789abcdefABCDEF0123456789abcdefABCDEF01234567890abcdefABCDEFactive_handles > 0/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/keydb.cused_resources <= MAX_KEYDB_RESOURCESkeyblock resource `%s': %s resource type of `%s' not supported can't create lock for `%s' unknown type of key resource `%s' rbinvalid key resource URL `%s' gnupg-kbx:keybox `%s' created error creating keybox `%s': %s wcan't lock `%s' can't allocate lock for `%s' directory `%s' created can't create directory `%s': %s /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.h%lupidGETINFODELKEYSMESSAGEDECRYPTENCRYPTversion--armorttytypeGPG_TTYttynameDISPLAYdisplayfdopen() failedwith-validation%u\r\n[GNUPG:] can't open fd %d for status output: %s Assuan processing failed: %s Assuan accept problem: %s [not set]Home: %s Config: %s AgentInfo: %s DirmngrInfo: %s %sDIRMNGR_INFOGPG_AGENT_INFOfailed to the register commands with Assuan: %s failed to initialize the server: %s failed to allocate assuan context: %s PASSWDGETAUDITLOGGENKEYDUMPSECRETKEYSLISTSECRETKEYSDUMPKEYSLISTKEYSOUTPUTINPUTEXPORTSIGNVERIFYSIGNERRECIPIENTre-importIMPORTunknown value for WHATcmd_has_optionagent-check2.0.27--htmles_fdopen failedres_fdopen() failederror setting up a data stream--data--re-import--detachedw--binary--base64no-encrypt-towith-ephemeral-keysallow-pinentry-notifyenable-audit-logwith-key-datavalidation-modellist-to-outputlist-modeinclude-certsPINENTRY_USER_DATApinentry-user-dataXAUTHORITYxauthoritylc-messageslc-ctypeTERMputenv/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.h: NOPlen)))%u:learncard C 0 0KEYINFO %sKEYINFO GET_CONFIRMATION %sPASSWD %sLEARN --sendcertificate imported certificate already in DB invalid certificate: %s failed to parse a certificate: %s PROGRESSHAVEKEY %sMARKTRUSTED %s S %serror getting the fingerprint ISTRUSTED %scmrelaxTRUSTLISTFLAGSCD LEARN --forceKEYPAIRINFOSCD SERIALNOSERIALNOSCD %sREADKEY %sGENKEYKEYPARAM(5:valuePKDECRYPTSETKEY %sCIPHERTEXT/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/call-agent.cgcry_sexp_canon_len (*r_buf, *r_buflen, NULL, NULL)(7:sig-val(3:rsa(1:sSCD PKSIGN %s %sSCD SETDATA --hash=sha256--hash=md5--hash=rmd160--hash=sha1PKSIGN%02XSETHASH %d SETKEYDESC %sSIGKEY %sRESETignoring gpg-agent inquiry `%s' failed to proxy %s inquiry to client PINENTRY_LAUNCHEDOPTION allow-pinentry-notify/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.h%%%02Xdirmngr status: %s dirmngr: %s PRINTINFOerror writing to stdout: %s LOOKUP --single --cache-only 0x%s --cache-onlyLOOKUP%s %sboth dirmngr contexts are in use TRUNCATEDfailed to parse a certificate: %s invalid certificate used for CRL/OCSP: %s unable to find the certificate used by the dirmngr: %s communication problem with dirmngr detected okayresponse of dirmngr: %s --only-ocsp --force-default-responderISVALID%s %sOPTION force-crl-refresh=1 (using OCSP)asking dirmngr about %s%s error getting the certificate ID ONLY_VALID_IF_CERT_VALIDPROGRESScertificate not found: %s sending specific issuer certificate back is not yet implemented unsupported inquiry `%s' 1ISTRUSTEDSENDISSUERCERTSENDCERT_SKISENDCERTWARNING: trying to release a non-locked dirmngr2 ctx ! dirmngr2_ctx_lockedWARNING: trying to release a non-locked dirmngr ctx /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/call-dirmngr.c! dirmngr_ctx_lockedconnection to dirmngr established can't connect to the dirmngr: %s can't connect to the dirmngr - trying fall back dirmngr protocol version %d is not supported malformed DIRMNGR_INFO environment variable --servererror flushing pending output: %s no running dirmngr - starting `%s' can't allocate assuan context: %s DIRMNGR_INFOLDAPSERVER %s:%i:%s:%s:%sOPTION audit-events=1/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hlen%02XOoops: invalid serial number (no colon) Ooops: invalid serial number public-keykeygrip=can't calculate keygrip gcry_sexp_scan failed: %s libksba did not return a proper S-Exp get_keygrip for public key len <= MAX_DIGEST_LENksba_cert_hash failed: %s md_open failed: %s sha1-fingerprintlen >= 20/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/fingerprint.c/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hCMS OBJECT ----- invalid radix64 character %02x skipped -----END Content-Type:PGP -----BEGIN /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hcertificate is not usable for signing certificate is not usable for encryption certificate should not have been used for signing certificate should not have been used for encryption certificate should not have been used for OCSP response signing certificate should not have been used for certification error getting key usage information: %s no key usage specified - assuming all usages /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hlen2.5.4.52.5.4.4[error]?Please enter the passphrase to unlock the secret key for the X.509 certificate: "%s" S/N %s, ID 0x%08lX, created %s, expires %s. %.4s-%.2s-%.2s%%%02X error creating memory stream: %s w[Error - invalid DN][Error - No name]\t\v\r\n[Error - out of core][Error - invalid encoding]CSTLSTREETOOUCN/%s=SerialNumber2.5.4.65Pseudo2.5.4.17PostalCode2.5.4.13D2.5.4.15BC2.5.4.16ADDR0.2.262.1.10.7.20NameDistinguisherSN2.5.4.42GN2.5.4.12T1.2.840.113549.1.9.1EMail [invalid] #certificate[invalid SN/issuer]/[invalid SN]END Certificate SHA1 Fingerprint: %s hash algo: %s subject: issuer: notAfter: notBefore: serial: BEGIN Certificate `%s': ][ %s%.4s-%.2s-%.2s %.2s:%.2s:%s/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/certdump.c%02XERROR - invalid S-expressionERROR - not an S-expression[Internal Error - invalid S-expression][Internal error - not an S-expression]none/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.heccdsarsapublic key: gcry_pk_verify: %s %mgcry_sexp_scan failed: %s signature value:libksba did not return a proper S-Exp ksba_cert_hash failed: %s hash.certmd_open failed: %s (this is the MD2 algorithm) 1.2.840.113549.2.21.2.840.113549.1.1.2?unknown hash algorithm `%s' ambiguous-rsa %02Xencoded hash:n == nframe/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/certcheck.ci > 1can't encode a %d bit MD into a %d bits frame no object identifier for algo %d a %u bit hash is not valid for a %u bit %s key %s key uses an unsafe (%u bit) hash DSA requires the hash length to be a multiple of 8 bits qpublic-key/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hCN= : [19700101T000000fingerprint=%s ksba_set_user_data(%s) failed: %s deksba_cert_get_user_data(%s) failed: %s regtp_ca_chainlencertificate has a BAD signature: %s ) not found issuer certificate (#/self-signed certificate has a BAD signature: %s WARNING: bypassing basic certificate checks validation model used: %sswitching to chain modelclearing ephemeral flag failed: %s --disable-crl-checksCRLs not checked due to %s option --disable-policy-checkspolicies not checked due to %s option /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/certchain.croot certificate is good intermediate certificate is good certificate is good certcert.issuer.keyusage%dcertificate chain longer than allowed by CA (%d)found another possible matching CA certificate - trying againsigned subjectsigning issuercertificate has a BAD signaturegot issuer's certificate: issuer certificate: #/issuer certificate not foundcertificate chain too long checking the trust list failed: %s root certificate is not marked trustedset_user_data(is_qualified) failed: %s checking the list of qualified root certificates failed: %s is_qualifiedself-signing certself-signed certificate has a BAD signatureno issuer found in certificatetargetWARNING: bypassing certificate chain validation WARNING: creation time of signature not known - assuming current timeinteractive marking as trusted disabled for this session interactive marking as trusted not enabled in gpg-agent after checking the fingerprint, you may want to add it manually to the list of trusted certificates. issuerroot certificate has now been marked as trusted ? to ( issuer valid from (certificate valid from (certificate created at ( signature created at intermediate certificate not created during lifetime of issuercertificate not created during lifetime of issuersignature not created during lifetime of certificate expired at certificate with invalid validitynotAfter, notBeforerequired certificate attributes missing: %s%s%sWARNING: ignoring expiration (expired at intermediate certificate has expiredroot certificate has expiredcertificate has expired) (valid from intermediate certificate not yet validroot certificate not yet validcertificate not yet validcertificate with invalid validity: %schecking the CRL failed: %splease make sure that the "dirmngr" is properly installed the available CRL is too oldthe status of the certificate is unknownno CRL found for certificatecertificate has been revokederror getting serialno: %s error getting authorityKeyIdentifier: %s failed to find issuer's certificate: rc=%d no subject found in certificate no issuer found in certificate failed to allocate keyDB handle found via issuer and external lookup found via issuer failed to find authorityKeyIdentifier: rc=%d not found using authorityKeyIdentifier ) (#} {next %sissuer certificate found via authid and external lookup found via authid and issuer from dirmngr cache found via authid and keyid (ephem) found via authid and keyid found via authid and sn+issuer (ephem) found via authid and sn+issuer looking for parent certificate dirmngr cache-only key lookup failed: %s number of matching certificates: %d #/looking up issuer from the Dirmngr cache external key lookup failed: %s number of issuers matching: %d /looking up issuer at external location error storing issuer certificate as ephemeral keydb_get_validity() failed: rc=%d keydb_get_cert() failed: rc=%d certificate policy not allowednote: non-critical certificate policy not allowedfailed to open `%s': %s rcritical marked policy without configured policies:Ccertificate's policy list: %s issuer certificate is not marked as a CAcritical certificate extension %s is not supported2.5.29.372.5.29.322.5.29.192.5.29.172.5.29.15error parsing validityModel: %s shell1.3.6.1.4.1.8301.3.5.2chain1.3.6.1.4.1.8301.3.5.1validation model requested by certificate: %s1.3.6.1.4.1.8301.3.5 ] /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.h%s %*sdsa unused[none] [error]rsaOAEP[external keys] chain length: restriction: ext key usage: validity: subjectInfo: authInfo: crlDP: chainLength: policies: extKeyUsage: nonRepudiation authKeyId.ki: authKeyId: subjKeyId: notAfter: notBefore: Subject: aka: Issuer: S/N: nameConstraintsinstructionCodeacAuditIdentityemailProtectionlisting external keys failed: %s error storing certificate as ephemeral keydb_search failed: %s keydb_get_cert failed: %s keydb_get_flags failed: %s key `%s' not found: %s out of core keydb_new failed Certified by [qualified] card s/n: %s fingerprint: %s md5 fpr: %s none, key usage: key type: %u bit %s through [stored as ephemeral] [error getting keyflags: %s] [certificate is bad: %s] [certificate is good] /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/keylist.ccert_der extncritExtn %s: %s%s%s%s [%d octets] subjInfo: [none] subjInfo: [error] authInfo: [none] authInfo: [error] %s%s%s%s crlDP: [none] crlDP: [error] issuer: certificateHold cessationOfOperation superseded affiliationChanged caCompromise keyCompromise reason: not a CA %dunlimited[none] (critical) (suggested)[error: %s] [none] decipherOnly encipherOnly crlSign certSign keyAgreement dataEncipherment keyEncipherment digitalSignature [error: %s] keyUsage:[?] ? keyType: %u bit %s ) ( hashAlgo: %s%s%s%s keygrip: %s certid: %s md5_fpr: %s error sha1_fpr: %s ID: 0x%08lX " "%*s"Error - %*s[%s%s] %*s(%.*s) %*s[%s] none uid:%s::::::::grp:::::::::%s: fpr:::::::::%s::::%02X:%u:%d:%s:crt:crs:1.2.840.113549.1.9.1=#error getting key usage information: %s get_user_data(is_qualified) failed: %s is_qualifiedvalidityModel1.3.6.1.4.1.8301.3.5pkaAddress1.3.6.1.4.1.11591.2.1.1netscape-comment2.16.840.1.113730.1.13netscape-ssl-server-name2.16.840.1.113730.1.12netscape-userPicture2.16.840.1.113730.1.11netscape-entitylogo2.16.840.1.113730.1.10netscape-homePage-url2.16.840.1.113730.1.9netscape-ca-policy-url2.16.840.1.113730.1.8netscape-cert-renewal-url2.16.840.1.113730.1.7netscape-ca-revocation-url2.16.840.1.113730.1.4netscape-revocation-url2.16.840.1.113730.1.3netscape-base-url2.16.840.1.113730.1.2netscape-cert-type2.16.840.1.113730.1.1inhibitAnyPolicy2.5.29.54freshestCRL2.5.29.46extKeyUsage2.5.29.37policyConstraints2.5.29.36authorityKeyIdentifier2.5.29.35policyMappings2.5.29.33anyPolicy2.5.29.32.0certificatePolicies2.5.29.32cRLDistributionPoints2.5.29.312.5.29.30certificateIssuer2.5.29.29issuingDistributionPoint2.5.29.28deltaCRLIndicator2.5.29.27invalidityDate2.5.29.242.5.29.23expirationDate2.5.29.22cRLReason2.5.29.21cRLNumber2.5.29.20basicConstraints2.5.29.19issuerAltName2.5.29.18subjectAltName2.5.29.17privateKeyUsagePeriod2.5.29.16keyUsage2.5.29.15subjectKeyIdentifier2.5.29.14caRepository1.3.6.1.5.5.7.48.51.3.6.1.5.5.7.48.3caIssuers1.3.6.1.5.5.7.48.2ocsp1.3.6.1.5.5.7.48.1subjectInfoAccess1.3.6.1.5.5.7.1.11acProxying1.3.6.1.5.5.7.1.10sbgp-routerIdentifier1.3.6.1.5.5.7.1.9sbgp-autonomousSysNum1.3.6.1.5.5.7.1.8sbgp-ipAddrBlock1.3.6.1.5.5.7.1.7acAaControls1.3.6.1.5.5.7.1.6acTargeting1.3.6.1.5.5.7.1.51.3.6.1.5.5.7.1.4qcStatements1.3.6.1.5.5.7.1.3biometricInfo1.3.6.1.5.5.7.1.2authorityInfoAccess1.3.6.1.5.5.7.1.1restriction1.3.36.8.3.8telesecNamingAuthorityExt0.2.262.1.10.12.6telesecCRLFilterExt0.2.262.1.10.12.5telesecCRLFilteredExt0.2.262.1.10.12.4telesecPolicyQualifierID0.2.262.1.10.12.3telesecPolicyIdentifier0.2.262.1.10.12.2telesecCertIdExt0.2.262.1.10.12.1certExtensionLiabilityLimitationExt0.2.262.1.10.12.0rsaSignatureWithripemd1601.3.36.3.3.1.2sha-1WithRSAEncryption1.3.14.3.2.29sha11.3.14.3.2.26sha512WithRSAEncryption1.2.840.113549.1.1.13sha384WithRSAEncryption1.2.840.113549.1.1.12sha256WithRSAEncryption1.2.840.113549.1.1.11rsaPSS1.2.840.113549.1.1.10rsaOAEP-pSpecified1.2.840.113549.1.1.9rsaOAEP-MGF1.2.840.113549.1.1.81.2.840.113549.1.1.7sha1WithRSAEncryption1.2.840.113549.1.1.5md5WithRSAEncryption1.2.840.113549.1.1.4md4WithRSAEncryption1.2.840.113549.1.1.3md2WithRSAEncryption1.2.840.113549.1.1.2rsaEncryption1.2.840.113549.1.1.1dsaWithSha11.2.840.10040.4.31.2.840.10040.4.1ocspNoCheck1.3.6.1.5.5.7.48.1.5serverGatedCrypto.ms1.3.6.1.4.1.311.10.3.3serverGatedCrypto.ns2.16.840.1.113730.4.1wlanSSID1.3.6.1.5.5.7.3.14eapOverPPP1.3.6.1.5.5.7.3.13sbgpCertAAServerAuth1.3.6.1.5.5.7.3.11dvcs1.3.6.1.5.5.7.3.10ocspSigning1.3.6.1.5.5.7.3.9timeStamping1.3.6.1.5.5.7.3.8ipsecUser1.3.6.1.5.5.7.3.7ipsecTunnel1.3.6.1.5.5.7.3.6ipsecEndSystem1.3.6.1.5.5.7.3.51.3.6.1.5.5.7.3.4codeSigning1.3.6.1.5.5.7.3.3clientAuth1.3.6.1.5.5.7.3.2serverAuth1.3.6.1.5.5.7.3.1/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hbad0 shell0 chainno-cert19700101T000000verify.keyusageSignature made verify.leaveget_user_data(is_qualified) failed: %s Note, that this software is not officially approved to create or verify such signatures. This is a qualified signature is_qualified" " akaGood signature fromgoodinvalid certification chain: %s 0%s %s %s %s 0 0 %d %d 00signature okay - checking certs invalid signature: %s hashing signed attrs failed: %s vrfy.attrcomputed: message: invalid signature: message digest attribute does not match computed one using certificate ID 0x%08lX [date not given]failed to get cert: %s verify.findkey%dfailed to find the certificate: %s certificate not found signer %d - signature available (sigval hash=%d)no signature value available error getting content-type attribute: %s content-type attribute does not match actual content-type signer %d - content-type attribute: %s1.2.840.113549.1.9.3error/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/verify.c!msgdigestunsupporteddigest algo %d (%s) has not been enabled signer %d - digest algo: %d error getting signing time: %s signer %d - serial: [NONE]signer %d - issuer: `%s' certs-only message accepted data given for a non-detached signature write failed: %s detached signature w/o data - assuming certs-only enabling extra hash algorithm %d enabling hash algorithm %d (%s) (this is the MD2 algorithm) 1.2.840.113549.2.21.2.840.113549.1.1.2?unknown hash algorithm `%s' detached signature ksba_cms_parse failed: %s vrfy.datamd_open failed: %s ksba_cms_set_reader_writer failed: %s can't create writer: %s can't create reader: %s fdopen() failed: %s failed to allocate keyDB handle read error on fd %d: %s fdopen(%d) failed: %s rb%.4s-%.2s-%.2snone/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.herror creating signature: %s <%s> signature created %c %d %d 00 %s %sfailed to store the signature: %s hashing signed attrs failed: %s sign.attr/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/sign.c!detachedksba_cms_build failed: %s ksba_cms_add_smime_capability failed: %s 1.2.840.113549.3.72.16.840.1.101.3.4.1.2ksba_cms_set_signing_time failed: %s ksba_cms_set_message_digest failed: %s problem getting the hash of the data unknown hash algorithm `%s' sign.datamd_open failed: %s checking for qualified certificate failed: %s is_qualifiedksba_cms_add_digest_algo failed: %s failed to store list of certificates: %s ksba_cms_add_signer failed: %s hash algorithm used for signer %d: %s (%s) ?hash algorithm %d (%s) for signer %d not supported; using %s 2.16.840.1.101.3.4.2.32.16.840.1.101.3.4.2.22.16.840.1.101.3.4.2.12.16.840.1.101.3.4.2.41.3.36.3.2.11.3.14.3.2.26user requested hash algorithm %d no default signer found ksba_cms_set_content_type failed: %s ksba_cms_set_reader_writer failed: %s can't create writer: %s SIGNED MESSAGEfailed to allocate keyDB handle ksba_cms_add_cert failed: %s adding certificates at level %d failed to get cert: rc=%d failed to find default certificate: rc=%d failed to find default signer: %s failed to find default certificate: %s keydb_search_next failed: %s keydb_get_cert failed: %s cannot sign an empty message write failed: %s read error on fd %d: %s fdopen(%d) failed: %s rb/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hencrypted data created write failed: %s error reading input: %s ksba_cms_build failed: %s ksba_cms_set_enc_val failed: %s ksba_cms_add_recipient failed: %s encryption failed for recipient no. %d: %s ksba_cms_set_content_enc_algo failed: %s failed to create the session key: %s ksba_cms_set_content_type failed: %s ksba_cms_set_reader_writer failed: %s can't create writer: %s ENCRYPTED MESSAGEfdopen() failed: %s rbfailed to allocate keyDB handle 0no valid recipients given /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/encrypt.cencode_session_key failed: %s gcry_sexp_scan failed: %s libksba did not return a proper S-Exp no public key for recipient #)) (data (flags pkcs1) (value #failed to set the IV: %s failed to set the key: %s weak key created - retrying failed to create cipher context: %s key length of `%s' too small cipher algorithm `%s' not allowed: too weak unsupported algorithm `%s' /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hinlen >= blklenmessage decryption failed: %s <%s> write failed: %s inconsistent padding invalid padding with value %d decrypting session key failed: %s recp %d - error getting encrypted session key decrypt.keyusage0%08lX%08lXfailed to get cert: %s failed to find the certificate: %s recp %d - serial: [NONE]recp %d - issuer: `%s' recp %d - error getting info: %s error getting IV: %s decrypt.algorithm%d(this does not seem to be an encrypted message) (this is the RC2 algorithm) 1.2.840.113549.3.2?unsupported algorithm `%s' ksba_cms_parse failed: %s ksba_cms_set_reader_writer failed: %s can't create writer: %s can't create reader: %s fdopen() failed: %s rbfailed to allocate keyDB handle /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/decrypt.ckey setup failed: %s WARNING: message was encrypted with a weak key in the symmetric cipher. error creating decryptor: %s session key:pkcs1 encoded session key:error decrypting session key: %s /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.h%s --store[X.509]import.parsep12i < sizeof argv--agent-programgpg-protect-tool: possibly bad passphrase givenbad-passphrasesecretkey-existssecretkey-storedgpg-protect-tool: [PROTECT-TOOL:] %serror reading input: %s error writing to temporary file: %s error creating temporary file: %s /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/import.c----passphrase--enable-status-msg--no-fail-on-exist--p12-import--homedirerror importing certificate: %s error reading fd %d: %s clearing ephemeral flag failed: %s error getting stored flags: %s keydb_get_cert() failed: %s es_fdopen(%d) failed: %s rfailed to allocate keyDB handle can't extract certificates from input no certificate found not a certs-only message ksba_cms_parse failed: %s ksba_cms_set_reader_writer failed: %s can't create reader: %s fdopen() failed: %s rbbasic certificate checks failed - not imported error storing certificate certificate imported issuer certificate imported certificate already in DB issuer certificate already in DB certificate chain too long %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu not imported: %lu secret keys unchanged: %lu secret keys imported: %lu secret keys read: %lu unchanged: %lu imported: %lutotal number processed: %lu %d01/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.h%s i < sizeof argv--agent-program0000000000000000 bad-passphrasegpg-protect-tool: [PROTECT-TOOL:] %serror writing to temporary file: %s error creating temporary file: %s /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/export.c----p12-charset--enable-status-msg--prompt--have-cert--p12-export--homedir aka ..: Subject ..: Serial ...: aka ...: Issuer ...: error reading temporary file: %s PKCS12The passphrase is %s encoded. can't export key `%s': %s keydb_search failed: %s write failed: %s write error: %s can't create writer: %s CERTIFICATEksba_cert_get_image failed ignoring other certificates exporting more than one certificate is not possible in binary mode inserting into duplicates table failed: %s keydb_get_cert failed: %s key `%s' not found: %s allocating memory for export failed: %s keydb_new failed creating duplicates table failed: %s /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hdeleting certificate "%s" failed: %s nothing to delete certificate `%s' deleted duplicated certificate `%s' deleted problem re-searching certificate: %s error locking keybox: %s 3keydb_new failed 1certificate `%s' not found: %s /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.h%u:len%s ,%commitName-DNencryptunknown keywordcertificate request created Pwrite failed: %s error creating certificate request: %s <%s> can't create writer: %s CERTIFICATE REQUESTfailed to store the sig_val: %s signing failed: %s To complete this certificate request please enter the passphrase for the key you just created once more. about to sign CSR for key: &%s can't figure out the keygrip gcry_sexp_scan failed: %s libksba did not return a proper S-Exp ksba_certreq_build failed: %s error setting the key usage: %s 0error setting the public key: %s (3:uri)(8:dns-nameerror setting the subject's alternate name: %s >error setting the subject's name: %s cr.crimd_open failed: %s line %d: key generation failed: %s <%s> (6:genkey(3:rsa(5:nbits%d:%s)))%uline %d: error getting key by keygrip `%s': %s line %d: error reading key `%s' from card: %s line %d: not a valid email address ..line %d: invalid subject name `%s' at pos %d line %d: invalid subject name label `%.*s' line %d: no subject name given line %d: invalid key length %u (valid are %d to %d) line %d: invalid algorithm card:/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/certreqgen.cget_parameter (para, pKEYTYPE, 0)line %d: read error: %s line %d: %s out of coreduplicate keywordparameter block does not start with "Key-Type"missing argumentmissing colonskipping control `%s' (%s) %dry-run%echoline too longName-URIName-DNSName-EmailKey-UsageKey-GripKey-LengthKey-Typeline %d: invalid usage list sign/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hELGDSARSAencryptcard:%sEnter DNS namesresource problem: out of core Ready. You should now send this request to your CA. Now creating certificate request. This may take a while ... error creating temporary file: %s w+Really create request? (y/N) %.*s Parameters to be used for the certificate request: Key-Grip: Name-DN: Key-Usage: Key-Length: %uKey-Type: Name-URI: Enter URIsName-DNS: (optional; end with an empty line): Name-Email: (end with an empty line): Enter email addresses22 translator: see certreg-ui.c:gpgsm_gencertreq_tty%*s^ Invalid subject name `%s' Invalid subject name label `%.*s' No subject name given Enter the X.509 subject name: signsign, encrypt (%d) encrypt (%d) sign (%d) sign, encrypt Possible actions for a %s key: (%d) %s Available keys: Serial number of the card: %s error reading the card: %s No key with this keygrip Not a valid keygrip (expecting 40 hex digits) Enter the keygrip: rounded up to %u bits Requested keysize is %u bits %s keysizes must be in the range %u-%u What keysize do you want? (%u) Your selection? (%d) Existing key from card (%d) Existing key (%d) RSA Please select what kind of key you want: ECDSA > /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hYou are about to create a signature using your certificate: "%s" Note, that this certificate will NOT create a qualified signature!%%%02X Note, that this software is not officially approved to create or verify such signatures. ?You are about to create a signature using your certificate: "%s" This will create a qualified signature by law equated to a handwritten signature. %s%sAre you really sure that you want to do this?invalid country code in `%s', line %d /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/qualified.cp[i]invalid formatted fingerprint in `%s', line %d can't open `%s': %s rqualified.txt/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/sm/../common/util.hutf-8/usr/share/localegnupg2/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.h0121110987654321?/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.h/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.helgdsarsa%u:sig-valecdsapublic-keyhashinvalid S-exp in cmp_simple_canon_sexp /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.hgnupg_allow_set_foregound_window%s called with invalid pid %lu %s: fatal: unable to reopen standard input, output, or error %s: WARNING: standard error reopened %s: WARNING: standard output reopened %s: WARNING: standard input reopened /dev/nullcan't disable core dumps: %s /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.h/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/homedir.c/gpgconf/gpg-connect-agent/gpg2/gpgsm/gpg-check-pattern/gpg-protect-tool/dirmngr/scdaemon/usr/lib/pinentry/gpg-agent/var/run/dirmngr/socket/usr/share/locale/usr/share/gnupg/usr/lib/gnupg/usr/bin/etc/gnupgGNUPGHOME~/.gnupg/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.h %Z%.4s-%.2s-%.2s %.2s:%.2s:%s[none]/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/gettime.c%Z%04d-%02d-%02d %02d:%02d:%02d????-??-?? ??:??:??%04d-%02d-%02d????-??-??%uy%ud%uh%umgnupg_get_time() failed %04d%02d%02dT%02d%02d%02d/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.h/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/convert.c/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.h/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/percent.cn == nbytes%%%02X/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.h[stdin]|[stdout]out of core while allocating %lu bytesout of core in secure memory while allocating %lu byteslibgcrypt problem: %s /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.hestream_asprintf failed: %s /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.h/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.hr+b[fd %d][stdin]can't seek: %s a->d.start == 1file_filter(fd)pop_filter called in set_partial_block_mode - please report a->use == 1 || a->use == 2pop_filter called in iobuf_seek - please report can't lseek: %s fstat() failed: %s a->d.len < a->d.sizeiobuf_flush did not write all! iobuf_flush: no filter flush on non-output iobuf increasing temp iobuf from %lu to %lu iobuf-%d.%d: underflow: eof (no filter) iobuf-%d.%d: underflow: eof iobuf-%d.%d: pop in underflow (!len) iobuf-%d.%d: underflow: got=%lu rc=%d iobuf-%d.%d: underflow: req=%lu iobuf-%d.%d: error iobuf-%d.%d: underflow: eof (due to filter eof) iobuf-%d.%d: pop `%s' in underflow a->d.start == a->d.lenOhh jeee, trying to remove an intermediate filter Ohh jeee, trying to remove a head filter iobuf-%d.%d: popped filter can't remove the last filter from the chain IOBUFCTRL_FREE failed: %s iobuf_flush failed in pop_filter: %s pop_filter(): filter function not found biobuf-%d.%d: pop `%s' IOBUFCTRL_INIT failed: %s iobuf-%d.%d: push `%s' i/o filter too deeply nested - corrupted data? iobuf-*.*: ioctl `%s' fsync iobuf-%d.%d: ioctl `%s' no_cache=%d iobuf-*.*: ioctl `%s' invalidate iobuf-%d.%d: ioctl `%s' keep=%d iobuf-%d.%d: openrw `%s' iobuf-%d.%d: create `%s' wb[stdout]iobuf-%d.%d: fdopen `%s' iobuf-%d.%d: open `%s' fd=%d rbIOBUFCTRL_FREE failed on close: %s iobuf-%d.%d: close `%s' iobuf_flush failed on close: %s iobuf_close -> %p ?iobuf chain: %d.%d `%s' filter_eof=%d start=%d len=%d [none]free block_filter %p block_filter: pending bytes! block_filter: write error: %s block_filterinit block_filter %p nbytes < OP_MIN_PARTIAL_CHUNK!a->buflenn == OP_MIN_PARTIAL_CHUNKc <= 0x1fa->buflen <= OP_MIN_PARTIAL_CHUNKblock_filter %p: read error (size=%lu,a->size=%lu) block_filter: invalid 4 byte length block_filter: 2nd length byte missing block_filter: 1st length byte missing %s: close fd %d %s: write error: %s %s: read error: %s sizefd_cache_open (%s) not cached can't rewind fd %d: %s fd_cache_open (%s) using cached fp fd_cache_close (%s) new slot created fd_cache_close (%s) used existing slot fd_cache_close (%d) real fp did (%s) fd_cache_synchronize (%s) did (%s) fd_cache_invalidate (%s) /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/iobuf.cfname/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.hestream_vasprintf failed: %s control d found tcgetattr() failed: %s Sorry, no terminal at all requested - can't get input Sorry, we are in batchmode - can't get input %sx%02xcannot open `%s': %s r+tcsetattr() failed: %s /dev/tty/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.hGPG_TTYputenv=RESETconnection to agent established can't connect to the agent: %s can't connect to the agent - trying fall back gpg-agent protocol version %d is not supported malformed GPG_AGENT_INFO environment variable --serverwaiting %d seconds for the agent to come up failed to start agent `%s': %s --use-standard-socket--daemonrunning `%s' for testing failed: %s starting `%s' for testing failed: %s --use-standard-socket-perror flushing pending output: %s starting_agent ? 0 0no running gpg-agent - starting one S.gpg-agentGPG_AGENT_INFOerror allocating assuan context: %s gnupg_spawn_agent_sentinellc-messageslc-ctypeOPTION %s%s=%s/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.herroutwaitpid failed in gnupg_spawn_process_detached: %s/error running `%s': terminated error running `%s': exit status %d error running `%s': probably not installed waiting for process %d to terminate failed: %s can't fdopen pipe for reading: %s rerror forking process: %s error creating a pipe: %s no file descriptor for file passed to gnupg_spawn_process indup2 std%s failed: %s failed to open `%s': %s /dev/null/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.hsignals are not blocked signals are already blocked which == 1/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/signal.c!mode caught ... exiting 0123456789?: signal /builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.h[?][stdin]x%02x[stderr][stdout]fatal: error creating a dummy estream for %d: %s ar!stream->flags.writingstream->flags.writingsize <= nleft/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/estream.cmem_cookie->memory_size >= mem_cookie->offset/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/../common/util.hbugparm.used!"bug"arg->vt == valuetable[arg->arg_pos-1].vtvaluetable[arg->precision_pos-1].vt == VALTYPE_INTvaluetable[arg->width_pos-1].vt == VALTYPE_INT/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/estream-printf.cargidx < argspecs_len0123456789abcdefx(null)0X0x0123456789ABCDEF0123456789abcdef'/builds/hudson/workspace/nightly-update/build/i386/components/gnupg/gnupg-2.0.27/common/util.hRC2redbadYes

skippedno-cert!ctx->outstream No help available for `%s'.