# Linux kernel 2.6.12 Kconfig .pot file # Licensed under GNU GPL v2 # # The Linux Kernel Translation Project # http://tlktp.sourceforge.net # # Translators: # - KernelFR # http://kernelfr.traduc.org # - Felix Sportelli # - Pierre Tane # msgid "" msgstr "" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2005-06-26 00:06+0100\n" "PO-Revision-Date: 2005-06-20 13:06+0100\n" "Last-Translator: KernelFR \n" "Language-Team: KernelFR \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Project-Id-Version kernel 2.6.12\n" #: crypto/Kconfig:5 msgid "Cryptographic options" msgstr "Options de cryptographie" #: crypto/Kconfig:8 msgid "Cryptographic API" msgstr "API cryptographique" #: crypto/Kconfig:9 msgid "This option provides the core Cryptographic API.\n" msgstr "" "Cette option fournit le coeur de l'API (Interface pour la \n" "Programmation d'Application) Cryptographique.\n" #: crypto/Kconfig:13 msgid "HMAC support" msgstr "Support HMAC" #: crypto/Kconfig:15 msgid "" "HMAC: Keyed-Hashing for Message Authentication (RFC2104).\n" "This is required for IPSec.\n" msgstr "" "HMAC: Méthode d'authentification des messages définie dans la \n" "RFC2104, utilisant des hachages cryptographiques.\n" "Cela est nécessaire pour IPsec.\n" #: crypto/Kconfig:20 msgid "Null algorithms" msgstr "Algorithmes 'Null'" #: crypto/Kconfig:22 msgid "These are 'Null' algorithms, used by IPsec, which do nothing.\n" msgstr "" "Il s'agit des algorithmes dits 'Null' (qui ne font rien), \n" "utilisés par IPsec.\n" #: crypto/Kconfig:26 msgid "MD4 digest algorithm" msgstr "Algorithme de résumé MD4" #: crypto/Kconfig:28 msgid "MD4 message digest algorithm (RFC1320).\n" msgstr "Algorithme de résumé de message MD4 (RFC1320).\n" #: crypto/Kconfig:32 msgid "MD5 digest algorithm" msgstr "Algorithme de résumé MD5" #: crypto/Kconfig:34 msgid "MD5 message digest algorithm (RFC1321).\n" msgstr "Algorithme de résumé de message MD5 (RFC1321).\n" #: crypto/Kconfig:38 msgid "SHA1 digest algorithm" msgstr "Algorithme de résumé SHA1" # crypto/Kconfig:40 crypto/Kconfig:46 #: crypto/Kconfig:40 crypto/Kconfig:46 msgid "SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).\n" msgstr "Hachage sécurisé standard SHA-1 (FIPS 180-1/DFIPS 180-2).\n" #: crypto/Kconfig:44 msgid "SHA1 digest algorithm for IBM zSeries z990" msgstr "Algorithme de résumé SHA1 pour zSeries z990 de l'IBM" #: crypto/Kconfig:50 msgid "SHA256 digest algorithm" msgstr "Algorithme de résumé SHA256" #: crypto/Kconfig:52 msgid "" "SHA256 secure hash standard (DFIPS 180-2).\n" "\n" "This version of SHA implements a 256 bit hash with 128 bits of\n" "security against collision attacks.\n" msgstr "" "Hachage sécurisé standard SHA256 (DFIPS 180-2).\n" "\n" "Cette version de SHA met en oeuvre un hachage sur 256 bits, \n" "avec 128 bits de sécurisation contre les attaques par collision.\n" #: crypto/Kconfig:59 msgid "SHA384 and SHA512 digest algorithms" msgstr "Alogrithmes de résumés SHA384 et SHA512" #: crypto/Kconfig:61 msgid "" "SHA512 secure hash standard (DFIPS 180-2).\n" "\n" "This version of SHA implements a 512 bit hash with 256 bits of\n" "security against collision attacks.\n" "\n" "This code also includes SHA-384, a 384 bit hash with 192 bits\n" "of security against collision attacks.\n" msgstr "" "Hachage sécurisé standard SHA512 (DFIPS 180-2).\n" "\n" "Cette version de SHA met en oeuvre un hachage sur 512 bits, \n" "avec 256 bits de sécurisation contre les attaques par collision.\n" "\n" "Ce code inclut également SHA384, hachage sur 384 bits avec \n" "192 bits de sécurisation contre les attaques par collision.\n" #: crypto/Kconfig:71 #, fuzzy msgid "Whirlpool digest algorithms" msgstr "Algorithme de résumé MD4" #: crypto/Kconfig:73 msgid "" "Whirlpool hash algorithm 512, 384 and 256-bit hashes\n" "\n" "Whirlpool-512 is part of the NESSIE cryptographic primitives.\n" "Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard\n" "\n" "See also:\n" "\n" msgstr "" #: crypto/Kconfig:83 #, fuzzy msgid "Tiger digest algorithms" msgstr "Algorithme de résumé MD4" #: crypto/Kconfig:85 msgid "" "Tiger hash algorithm 192, 160 and 128-bit hashes\n" "\n" "Tiger is a hash function optimized for 64-bit processors while\n" "still having decent performance on 32-bit processors.\n" "Tiger was developed by Ross Anderson and Eli Biham.\n" "\n" "See also:\n" ".\n" msgstr "" #: crypto/Kconfig:96 msgid "DES and Triple DES EDE cipher algorithms" msgstr "Algorithmes de chiffrement DES et Triple DES EDE" # crypto/Kconfig:98 crypto/Kconfig:104 #: crypto/Kconfig:98 crypto/Kconfig:104 msgid "DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).\n" msgstr "" "Algorithme de chiffrement DES (FIPS 46-2), et Triple DES EDE \n" "(FIPS 46-3).\n" #: crypto/Kconfig:102 #, fuzzy msgid "DES and Triple DES cipher algorithms for IBM zSeries z990" msgstr "Algorithmes de chiffrement DES et Triple DES EDE" #: crypto/Kconfig:108 msgid "Blowfish cipher algorithm" msgstr "Algorithme de chiffrement Blowfish" #: crypto/Kconfig:110 #, fuzzy msgid "" "Blowfish cipher algorithm, by Bruce Schneier.\n" "\n" "This is a variable key length cipher which can use keys from 32\n" "bits to 448 bits in length. It's fast, simple and specifically\n" "designed for use on \"large microprocessors\".\n" "\n" "See also:\n" "\n" msgstr "" "Algorithme de chiffrement Blowfish, conçu par Bruce Schneier.\n" "\n" "Cet algorithme de chiffrement utilise une clé à longueur \n" "variable (de 32 à 448 bits). Il est rapide, simple, et \n" "spécifiquement conçu pour une utilisation sur des \n" "microprocesseurs puissants [NdT: \"large microprocessors\"].\n" "\n" "Voir également (en anglais) :\n" "http://www.schneier.com/blowfish.html\n" #: crypto/Kconfig:121 msgid "Twofish cipher algorithm" msgstr "Algorithme de chiffrement Twofish" #: crypto/Kconfig:123 #, fuzzy msgid "" "Twofish cipher algorithm.\n" "\n" "Twofish was submitted as an AES (Advanced Encryption Standard)\n" "candidate cipher by researchers at CounterPane Systems. It is a\n" "16 round block cipher supporting key sizes of 128, 192, and 256\n" "bits.\n" "\n" "See also:\n" "\n" msgstr "" "Algorithme de chiffrement Twofish.\n" "\n" "Twofish a été soumis comme candidat à l'AES (Standard de \n" "Chiffrage Avancé, ou \"Advanced Encryption Standard\") par des \n" "chercheurs de CounterPane Systems. C'est un algorithme de \n" "chiffrement en 16 rondes (c'est à dire en 16 passes), qui \n" "supporte des tailles de clés de 128, 192 et 256 bits.\n" "\n" "Voir également (en anglais) :\n" "http://www.schneier.com/twofish.html\n" #: crypto/Kconfig:135 msgid "Serpent cipher algorithm" msgstr "Algorithme de chiffrement 'Serpent'" #: crypto/Kconfig:137 #, fuzzy msgid "" "Serpent cipher algorithm, by Anderson, Biham & Knudsen.\n" "\n" "Keys are allowed to be from 0 to 256 bits in length, in steps\n" "of 8 bits. Also includes the 'Tnepres' algorithm, a reversed\n" "variant of Serpent for compatibility with old kerneli code.\n" "\n" "See also:\n" "\n" msgstr "" "Algorithme de chiffrement Serpent, conçu par Anderson, Biham et \n" "Knudsen.\n" "\n" "La taille des clés permises s'étend de 0 à 256 bits, par pas de \n" "8 bits.\n" "\n" "Voir également (en anglais) :\n" "http://www.cl.cam.ac.uk/~rja14/serpent.html\n" #: crypto/Kconfig:148 msgid "AES cipher algorithms" msgstr "Algorithmes de chiffrement AES" #: crypto/Kconfig:150 #, fuzzy msgid "" "AES cipher algorithms (FIPS-197). AES uses the Rijndael\n" "algorithm.\n" "\n" "Rijndael appears to be consistently a very good performer in\n" "both hardware and software across a wide range of computing\n" "environments regardless of its use in feedback or non-feedback\n" "modes. Its key setup time is excellent, and its key agility is\n" "good. Rijndael's very low memory requirements make it very well\n" "suited for restricted-space environments, in which it also\n" "demonstrates excellent performance. Rijndael's operations are\n" "among the easiest to defend against power and timing attacks.\n" "\n" "The AES specifies three key sizes: 128, 192 and 256 bits\n" "\n" "See for more information.\n" msgstr "" "Algorithmes de chiffrement AES (FIPS-197). AES utilise \n" "l'algorithme Rijndael.\n" "\n" "Rijndael apparaît invariablement comme étant très performant \n" "aussi bien en utilisation matérielle que logicielle, et ce au \n" "travers d'une grande variété d'environnements informatiques, \n" "qu'ils utilisent un mode de chaînage avec ou sans rétroaction. \n" "Son temps de génération des clés est excellent, et la facilité \n" "de changement des clés est bonne. Les très faibles besoins en \n" "mémoire de Rijndael le rendent très adapté aux environnements de \n" "taille restreinte. Néanmoins, Rijndael prouve également ses \n" "excellentes performances dans ce genre d'environnements. \n" "Le fonctionnement de Rijndael fait partie des plus simples pour \n" "se défendre contre les attaques par mesure de puissance dégagée \n" "(\"power attacks\") ou du temps d'opération (\"timing attacks\").\n" "\n" "AES spécifie trois tailles de clés : 128, 192 et 256 bits.\n" "\n" "Voir http://csrc.nist.gov/CryptoToolkit/aes/ pour plus \n" "d'informations.\n" #: crypto/Kconfig:168 msgid "AES cipher algorithms (i586)" msgstr "Algorithmes de chiffrement AES (i586)" #: crypto/Kconfig:170 #, fuzzy msgid "" "AES cipher algorithms (FIPS-197). AES uses the Rijndael\n" "algorithm.\n" "\n" "Rijndael appears to be consistently a very good performer in\n" "both hardware and software across a wide range of computing\n" "environments regardless of its use in feedback or non-feedback\n" "modes. Its key setup time is excellent, and its key agility is\n" "good. Rijndael's very low memory requirements make it very well\n" "suited for restricted-space environments, in which it also\n" "demonstrates excellent performance. Rijndael's operations are\n" "among the easiest to defend against power and timing attacks.\n" "\n" "The AES specifies three key sizes: 128, 192 and 256 bits\n" "\n" "See for more information.\n" msgstr "" "Algorithmes de chiffrement AES (FIPS-197). AES utilise \n" "l'algorithme Rijndael.\n" "\n" "Rijndael apparaît invariablement comme étant très performant \n" "aussi bien en utilisation matérielle que logicielle, et ce au \n" "travers d'une grande variété d'environnements informatiques, \n" "qu'ils utilisent un mode de chaînage avec ou sans rétroaction. \n" "Son temps de génération des clés est excellent, et la facilité \n" "de changement des clés est bonne. Les très faibles besoins en \n" "mémoire de Rijndael le rendent très adapté aux environnements de \n" "taille restreinte. Néanmoins, Rijndael prouve également ses \n" "excellentes performances dans ce genre d'environnements. \n" "Le fonctionnement de Rijndael fait partie des plus simples pour \n" "se défendre contre les attaques par mesure de puissance dégagée \n" "(\"power attacks\") ou du temps d'opération (\"timing attacks\").\n" "\n" "AES spécifie trois tailles de clés : 128, 192 et 256 bits.\n" "\n" "Voir http://csrc.nist.gov/CryptoToolkit/aes/ pour plus \n" "d'informations.\n" #: crypto/Kconfig:188 msgid "CAST5 (CAST-128) cipher algorithm" msgstr "Algorithme de chiffrement CAST5 (CAST-128)" #: crypto/Kconfig:190 msgid "" "The CAST5 encryption algorithm (synonymous with CAST-128) is\n" "described in RFC2144.\n" msgstr "" "L'algorithme de cryptage CAST5 (synonyme de CAST-128) est décrit \n" "dans la RFC2144.\n" #: crypto/Kconfig:195 msgid "CAST6 (CAST-256) cipher algorithm" msgstr "Algorithme de chiffrement CAST6 (CAST-256)" #: crypto/Kconfig:197 msgid "" "The CAST6 encryption algorithm (synonymous with CAST-256) is\n" "described in RFC2612.\n" msgstr "" "L'algorithme de cryptage CAST6 (synonyme de CAST-256) est décrit \n" "dans la RFC2612.\n" #: crypto/Kconfig:202 msgid "TEA and XTEA cipher algorithms" msgstr "Algorithmes de chiffrement TEA et XTEA" #: crypto/Kconfig:204 msgid "" "TEA cipher algorithm.\n" "\n" "Tiny Encryption Algorithm is a simple cipher that uses\n" "many rounds for security. It is very fast and uses\n" "little memory.\n" "\n" "Xtendend Tiny Encryption Algorithm is a modification to\n" "the TEA algorithm to address a potential key weakness\n" "in the TEA algorithm.\n" msgstr "" #: crypto/Kconfig:216 msgid "ARC4 cipher algorithm" msgstr "Algorithmes de chiffrement ARC4" #: crypto/Kconfig:218 msgid "" "ARC4 cipher algorithm.\n" "\n" "ARC4 is a stream cipher using keys ranging from 8 bits to 2048\n" "bits in length. This algorithm is required for driver-based\n" "WEP, but it should not be for other purposes because of the\n" "weakness of the algorithm.\n" msgstr "" #: crypto/Kconfig:227 msgid "Khazad cipher algorithm" msgstr "Algorithmes de chiffrement Khazad" #: crypto/Kconfig:229 msgid "" "Khazad cipher algorithm.\n" "\n" "Khazad was a finalist in the initial NESSIE competition. It is\n" "an algorithm optimized for 64-bit processors with good performance\n" "on 32-bit processors. Khazad uses an 128 bit key size.\n" "\n" "See also:\n" "\n" msgstr "" #: crypto/Kconfig:240 #, fuzzy msgid "Anubis cipher algorithm" msgstr "Algorithmes de chiffrement AES" #: crypto/Kconfig:242 #, fuzzy msgid "" "Anubis cipher algorithm.\n" "\n" "Anubis is a variable key length cipher which can use keys from\n" "128 bits to 320 bits in length. It was evaluated as a entrant\n" "in the NESSIE competition.\n" "\n" "See also:\n" "\n" "\n" "\n" msgstr "" "Algorithme de chiffrement Blowfish, conçu par Bruce Schneier.\n" "\n" "Cet algorithme de chiffrement utilise une clé à longueur \n" "variable (de 32 à 448 bits). Il est rapide, simple, et \n" "spécifiquement conçu pour une utilisation sur des \n" "microprocesseurs puissants [NdT: \"large microprocessors\"].\n" "\n" "Voir également (en anglais) :\n" "http://www.schneier.com/blowfish.html\n" #: crypto/Kconfig:255 msgid "Deflate compression algorithm" msgstr "Algorithme de compression Deflate" #: crypto/Kconfig:259 msgid "" "This is the Deflate algorithm (RFC1951), specified for use in\n" "IPSec with the IPCOMP protocol (RFC3173, RFC2394).\n" "\n" "You will most probably want this if using IPSec.\n" msgstr "" "Ceci est l'algorithme Deflate (RFC1951), spécifié pour être \n" "utilisé dans IPSec avec le protocole IPCOMP (RFC3173, RFC2394).\n" "\n" "Vous voudrez probablement cette option si vous utilisez IPSec.\n" #: crypto/Kconfig:266 #, fuzzy msgid "Michael MIC keyed digest algorithm" msgstr "Algorithme de résumé MD5" #: crypto/Kconfig:268 msgid "" "Michael MIC is used for message integrity protection in TKIP\n" "(IEEE 802.11i). This algorithm is required for TKIP, but it\n" "should not be used for other purposes because of the weakness\n" "of the algorithm.\n" msgstr "" #: crypto/Kconfig:275 #, fuzzy msgid "CRC32c CRC algorithm" msgstr "Algorithmes I2C" #: crypto/Kconfig:278 msgid "" "Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used\n" "by iSCSI for header and data digests and by others.\n" "See Castagnoli93. This implementation uses lib/libcrc32c.\n" "Module will be crc32c.\n" msgstr "" #: crypto/Kconfig:285 msgid "Testing module" msgstr "Module de test" #: crypto/Kconfig:287 msgid "Quick & dirty crypto test module.\n" msgstr "Module de test cryptographique \"vite fait, mal fait\".\n"