|
213.
|
|
|
Duplicated key
|
|
|
|
Doppelter Schlüssel
|
|
Translated by
Werner Koch
|
|
|
|
Located in
src/err-codes.h:217
|
|
214.
|
|
|
Ambiguous result
|
|
|
|
Uneindeutiges Ergebiss
|
|
Translated by
Werner Koch
|
|
|
|
Located in
src/err-codes.h:218
|
|
215.
|
|
|
No crypto context
|
|
|
|
Fehlender Crypto Context
|
|
Translated by
Werner Koch
|
|
|
|
Located in
src/err-codes.h:219
|
|
216.
|
|
|
Wrong crypto context
|
|
|
|
Falscher Crypto Context
|
|
Translated by
Werner Koch
|
|
|
|
Located in
src/err-codes.h:220
|
|
217.
|
|
|
Bad crypto context
|
|
|
|
Fehlerhafter Crypto Context
|
|
Translated by
Werner Koch
|
|
|
|
Located in
src/err-codes.h:221
|
|
218.
|
|
|
Conflict in the crypto context
|
|
|
|
Widersprüchliche Benutzung des Crypto Context
|
|
Translated by
Werner Koch
|
|
|
|
Located in
src/err-codes.h:222
|
|
219.
|
|
|
Broken public key
|
|
|
|
Defekter öffentlicher Schlüssel
|
|
Translated by
Werner Koch
|
|
|
|
Located in
src/err-codes.h:223
|
|
220.
|
|
|
Broken secret key
|
|
|
|
Defekter geheimer Schlüssel
|
|
Translated by
Werner Koch
|
|
|
|
Located in
src/err-codes.h:224
|
|
221.
|
|
|
Invalid MAC algorithm
|
|
|
|
Ungültige MAC-Methode
|
|
Translated by
Werner Koch
|
|
|
|
Located in
src/err-codes.h:225
|
|
222.
|
|
|
Operation fully cancelled
|
|
|
|
Verarbeitung wurde vollständig abgebrochen
|
|
Translated by
Werner Koch
|
|
|
|
Located in
src/err-codes.h:226
|