summaryrefslogtreecommitdiffstats
path: root/l10n-en-CA/mail/messenger/openpgp/oneRecipientStatus.ftl
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
commit2aa4a82499d4becd2284cdb482213d541b8804dd (patch)
treeb80bf8bf13c3766139fbacc530efd0dd9d54394c /l10n-en-CA/mail/messenger/openpgp/oneRecipientStatus.ftl
parentInitial commit. (diff)
downloadfirefox-upstream.tar.xz
firefox-upstream.zip
Adding upstream version 86.0.1.upstream/86.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'l10n-en-CA/mail/messenger/openpgp/oneRecipientStatus.ftl')
-rw-r--r--l10n-en-CA/mail/messenger/openpgp/oneRecipientStatus.ftl30
1 files changed, 30 insertions, 0 deletions
diff --git a/l10n-en-CA/mail/messenger/openpgp/oneRecipientStatus.ftl b/l10n-en-CA/mail/messenger/openpgp/oneRecipientStatus.ftl
new file mode 100644
index 0000000000..135b141577
--- /dev/null
+++ b/l10n-en-CA/mail/messenger/openpgp/oneRecipientStatus.ftl
@@ -0,0 +1,30 @@
+# This Source Code Form is subject to the terms of the Mozilla Public
+# License, v. 2.0. If a copy of the MPL was not distributed with this
+# file, You can obtain one at http://mozilla.org/MPL/2.0/.
+
+openpgp-one-recipient-status-title =
+ .title = OpenPGP Message Security
+openpgp-one-recipient-status-status =
+ .label = Status
+openpgp-one-recipient-status-key-id =
+ .label = Key ID
+openpgp-one-recipient-status-created-date =
+ .label = Created
+openpgp-one-recipient-status-expires-date =
+ .label = Expires
+openpgp-one-recipient-status-open-details =
+ .label = Open details and edit acceptance…
+openpgp-one-recipient-status-discover =
+ .label = Discover new or updated key
+
+openpgp-one-recipient-status-instruction1 = To send an end-to-end encrypted message to a recipient, you need to obtain their OpenPGP public key and mark it as accepted.
+openpgp-one-recipient-status-instruction2 = To obtain their public key, import them from email they have sent to you and that includes it. Alternatively, you can try to discover their public key on a directory.
+
+openpgp-key-own = Accepted (personal key)
+openpgp-key-secret-not-personal = Not usable
+openpgp-key-verified = Accepted (verified)
+openpgp-key-unverified = Accepted (unverifed)
+openpgp-key-undecided = Not accepted (undecided)
+openpgp-key-rejected = Not accepted (rejected)
+
+openpgp-intro = Available public keys for { $key }