1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-06-15 00:29:49 +02:00

Fix typos spotted during translations

agent/genkey.c: s/to to/to/
sm/*.c: s/failed to allocated/failed to allocate/
sm/certlist.c: s/should have not/should not have/

Consistency fix:

* g10/gpg.c, kbx/kbxutil.c, sm/gpgsm.c: uppercase after Syntax
This commit is contained in:
David Prévot 2012-08-22 12:53:57 -04:00 committed by Werner Koch
parent bc95b35289
commit 1c2f80cf1b
10 changed files with 17 additions and 17 deletions

View File

@ -306,7 +306,7 @@ agent_genkey (ctrl_t ctrl, const char *keyparam, size_t keyparamlen,
/* Get the passphrase now, cause key generation may take a while. */ /* Get the passphrase now, cause key generation may take a while. */
{ {
const char *text1 = _("Please enter the passphrase to%0A" const char *text1 = _("Please enter the passphrase to%0A"
"to protect your new key"); "protect your new key");
const char *text2 = _("Please re-enter this passphrase"); const char *text2 = _("Please re-enter this passphrase");
const char *initial_errtext = NULL; const char *initial_errtext = NULL;

View File

@ -837,8 +837,8 @@ my_strusage( int level )
break; break;
case 41: p = case 41: p =
_("Syntax: gpg [options] [files]\n" _("Syntax: gpg [options] [files]\n"
"sign, check, encrypt or decrypt\n" "Sign, check, encrypt or decrypt\n"
"default operation depends on the input data\n"); "Default operation depends on the input data\n");
break; break;
case 31: p = "\nHome: "; break; case 31: p = "\nHome: "; break;

View File

@ -118,7 +118,7 @@ my_strusage( int level )
break; break;
case 41: p = case 41: p =
_("Syntax: kbxutil [options] [files]\n" _("Syntax: kbxutil [options] [files]\n"
"list, export, import Keybox data\n"); "List, export, import Keybox data\n");
break; break;

View File

@ -756,7 +756,7 @@ gpgsm_walk_cert_chain (ctrl_t ctrl, ksba_cert_t start, ksba_cert_t *r_next)
*r_next = NULL; *r_next = NULL;
if (!kh) if (!kh)
{ {
log_error (_("failed to allocated keyDB handle\n")); log_error (_("failed to allocate keyDB handle\n"));
rc = gpg_error (GPG_ERR_GENERAL); rc = gpg_error (GPG_ERR_GENERAL);
goto leave; goto leave;
} }
@ -1249,7 +1249,7 @@ do_validate_chain (ctrl_t ctrl, ksba_cert_t cert, ksba_isotime_t checktime_arg,
kh = keydb_new (0); kh = keydb_new (0);
if (!kh) if (!kh)
{ {
log_error (_("failed to allocated keyDB handle\n")); log_error (_("failed to allocate keyDB handle\n"));
rc = gpg_error (GPG_ERR_GENERAL); rc = gpg_error (GPG_ERR_GENERAL);
goto leave; goto leave;
} }
@ -1853,7 +1853,7 @@ gpgsm_basic_cert_check (ctrl_t ctrl, ksba_cert_t cert)
kh = keydb_new (0); kh = keydb_new (0);
if (!kh) if (!kh)
{ {
log_error (_("failed to allocated keyDB handle\n")); log_error (_("failed to allocate keyDB handle\n"));
rc = gpg_error (GPG_ERR_GENERAL); rc = gpg_error (GPG_ERR_GENERAL);
goto leave; goto leave;
} }

View File

@ -139,7 +139,7 @@ cert_usage_p (ksba_cert_t cert, int mode)
{ {
if ((use & (KSBA_KEYUSAGE_KEY_CERT_SIGN))) if ((use & (KSBA_KEYUSAGE_KEY_CERT_SIGN)))
return 0; return 0;
log_info (_("certificate should have not " log_info (_("certificate should not have "
"been used for certification\n")); "been used for certification\n"));
return gpg_error (GPG_ERR_WRONG_KEY_USAGE); return gpg_error (GPG_ERR_WRONG_KEY_USAGE);
} }
@ -151,7 +151,7 @@ cert_usage_p (ksba_cert_t cert, int mode)
|| (use & (KSBA_KEYUSAGE_KEY_CERT_SIGN || (use & (KSBA_KEYUSAGE_KEY_CERT_SIGN
|KSBA_KEYUSAGE_CRL_SIGN)))) |KSBA_KEYUSAGE_CRL_SIGN))))
return 0; return 0;
log_info (_("certificate should have not " log_info (_("certificate should not have "
"been used for OCSP response signing\n")); "been used for OCSP response signing\n"));
return gpg_error (GPG_ERR_WRONG_KEY_USAGE); return gpg_error (GPG_ERR_WRONG_KEY_USAGE);
} }
@ -162,8 +162,8 @@ cert_usage_p (ksba_cert_t cert, int mode)
) )
return 0; return 0;
log_info (mode==3? _("certificate should have not been used for encryption\n"): log_info (mode==3? _("certificate should not have been used for encryption\n"):
mode==2? _("certificate should have not been used for signing\n"): mode==2? _("certificate should not have been used for signing\n"):
mode==1? _("certificate is not usable for encryption\n"): mode==1? _("certificate is not usable for encryption\n"):
_("certificate is not usable for signing\n")); _("certificate is not usable for signing\n"));
return gpg_error (GPG_ERR_WRONG_KEY_USAGE); return gpg_error (GPG_ERR_WRONG_KEY_USAGE);

View File

@ -258,7 +258,7 @@ gpgsm_decrypt (ctrl_t ctrl, int in_fd, FILE *out_fp)
kh = keydb_new (0); kh = keydb_new (0);
if (!kh) if (!kh)
{ {
log_error (_("failed to allocated keyDB handle\n")); log_error (_("failed to allocate keyDB handle\n"));
rc = gpg_error (GPG_ERR_GENERAL); rc = gpg_error (GPG_ERR_GENERAL);
goto leave; goto leave;
} }

View File

@ -332,7 +332,7 @@ gpgsm_encrypt (ctrl_t ctrl, certlist_t recplist, int data_fd, FILE *out_fp)
kh = keydb_new (0); kh = keydb_new (0);
if (!kh) if (!kh)
{ {
log_error (_("failed to allocated keyDB handle\n")); log_error (_("failed to allocate keyDB handle\n"));
rc = gpg_error (GPG_ERR_GENERAL); rc = gpg_error (GPG_ERR_GENERAL);
goto leave; goto leave;
} }

View File

@ -523,8 +523,8 @@ my_strusage( int level )
break; break;
case 41: case 41:
p = _("Syntax: gpgsm [options] [files]\n" p = _("Syntax: gpgsm [options] [files]\n"
"sign, check, encrypt or decrypt using the S/MIME protocol\n" "Sign, check, encrypt or decrypt using the S/MIME protocol\n"
"default operation depends on the input data\n"); "Default operation depends on the input data\n");
break; break;
case 20: case 20:

View File

@ -332,7 +332,7 @@ gpgsm_sign (ctrl_t ctrl, certlist_t signerlist,
kh = keydb_new (0); kh = keydb_new (0);
if (!kh) if (!kh)
{ {
log_error (_("failed to allocated keyDB handle\n")); log_error (_("failed to allocate keyDB handle\n"));
rc = gpg_error (GPG_ERR_GENERAL); rc = gpg_error (GPG_ERR_GENERAL);
goto leave; goto leave;
} }

View File

@ -110,7 +110,7 @@ gpgsm_verify (ctrl_t ctrl, int in_fd, int data_fd, FILE *out_fp)
kh = keydb_new (0); kh = keydb_new (0);
if (!kh) if (!kh)
{ {
log_error (_("failed to allocated keyDB handle\n")); log_error (_("failed to allocate keyDB handle\n"));
rc = gpg_error (GPG_ERR_GENERAL); rc = gpg_error (GPG_ERR_GENERAL);
goto leave; goto leave;
} }