mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
* pkclist.c (do_edit_ownertrust): Use the same translated string for
showing the user ID as mainproc.c:print_pkenc_list. * mainproc.c (print_pkenc_list): Allow translating the quotes around the user ID. * card-util.c, g10.c, photoid.c, trustdb.c: The last of the \"%s\" -> `%s' quoting for things that aren't user IDs. * keyserver.c (keyserver_spawn): If there is no keyserver host, print the whole URI since it is self-contained.
This commit is contained in:
parent
e3fd0f0c60
commit
bf079613b7
@ -1,3 +1,17 @@
|
||||
2004-10-11 David Shaw <dshaw@jabberwocky.com>
|
||||
|
||||
* pkclist.c (do_edit_ownertrust): Use the same translated string
|
||||
for showing the user ID as mainproc.c:print_pkenc_list.
|
||||
|
||||
* mainproc.c (print_pkenc_list): Allow translating the quotes
|
||||
around the user ID.
|
||||
|
||||
* card-util.c, g10.c, photoid.c, trustdb.c: The last of the \"%s\"
|
||||
-> `%s' quoting for things that aren't user IDs.
|
||||
|
||||
* keyserver.c (keyserver_spawn): If there is no keyserver host,
|
||||
print the whole URI since it is self-contained.
|
||||
|
||||
2004-10-11 Werner Koch <wk@g10code.com>
|
||||
|
||||
* keyserver.c (keyserver_spawn): Print an empty string in log_info
|
||||
|
@ -912,7 +912,7 @@ generate_card_keys (const char *serialno)
|
||||
{
|
||||
tty_printf ("\n");
|
||||
tty_printf (_("Please note that the factory settings of the PINs are\n"
|
||||
" PIN = \"%s\" Admin PIN = \"%s\"\n"
|
||||
" PIN = `%s' Admin PIN = `%s'\n"
|
||||
"You should change them using the command --change-pin\n"),
|
||||
"123456", "12345678");
|
||||
tty_printf ("\n");
|
||||
|
@ -971,7 +971,7 @@ add_group(char *string)
|
||||
name=strsep(&string,"=");
|
||||
if(string==NULL)
|
||||
{
|
||||
log_error(_("no = sign found in group definition \"%s\"\n"),name);
|
||||
log_error(_("no = sign found in group definition `%s'\n"),name);
|
||||
return;
|
||||
}
|
||||
|
||||
@ -2002,7 +2002,7 @@ main( int argc, char **argv )
|
||||
else if(ascii_strcasecmp(pargs.r.ret_str,"auto")==0)
|
||||
opt.trust_model=TM_AUTO;
|
||||
else
|
||||
log_error("unknown trust model \"%s\"\n",pargs.r.ret_str);
|
||||
log_error("unknown trust model `%s'\n",pargs.r.ret_str);
|
||||
break;
|
||||
case oForceOwnertrust:
|
||||
log_info(_("NOTE: %s is not for normal use!\n"),
|
||||
@ -2010,7 +2010,7 @@ main( int argc, char **argv )
|
||||
opt.force_ownertrust=string_to_trust_value(pargs.r.ret_str);
|
||||
if(opt.force_ownertrust==-1)
|
||||
{
|
||||
log_error("invalid ownertrust \"%s\"\n",pargs.r.ret_str);
|
||||
log_error("invalid ownertrust `%s'\n",pargs.r.ret_str);
|
||||
opt.force_ownertrust=0;
|
||||
}
|
||||
break;
|
||||
@ -2452,7 +2452,7 @@ main( int argc, char **argv )
|
||||
else if(ascii_strcasecmp(pargs.r.ret_str,"0xlong")==0)
|
||||
opt.keyid_format=KF_0xLONG;
|
||||
else
|
||||
log_error("unknown keyid-format \"%s\"\n",pargs.r.ret_str);
|
||||
log_error("unknown keyid-format `%s'\n",pargs.r.ret_str);
|
||||
break;
|
||||
|
||||
default : pargs.err = configfp? 1:2; break;
|
||||
|
@ -892,9 +892,13 @@ keyserver_spawn(int action,STRLIST list,KEYDB_SEARCH_DESC *desc,
|
||||
else
|
||||
BUG();
|
||||
|
||||
log_info(_("requesting key %s from %s server %s\n"),
|
||||
keystr_from_desc(&desc[i]),
|
||||
keyserver->scheme,keyserver->host?keyserver->host:"");
|
||||
if(keyserver->host)
|
||||
log_info(_("requesting key %s from %s server %s\n"),
|
||||
keystr_from_desc(&desc[i]),
|
||||
keyserver->scheme,keyserver->host);
|
||||
else
|
||||
log_info(_("requesting key %s from %s\n"),
|
||||
keystr_from_desc(&desc[i]),keyserver->uri);
|
||||
}
|
||||
|
||||
fprintf(spawn->tochild,"\n");
|
||||
@ -1037,9 +1041,14 @@ keyserver_spawn(int action,STRLIST list,KEYDB_SEARCH_DESC *desc,
|
||||
|
||||
iobuf_close(buffer);
|
||||
|
||||
log_info(_("sending key %s to %s server %s\n"),
|
||||
keystr(block->pkt->pkt.public_key->keyid),
|
||||
keyserver->scheme,keyserver->host?keyserver->host:"");
|
||||
if(keyserver->host)
|
||||
log_info(_("sending key %s to %s server %s\n"),
|
||||
keystr(block->pkt->pkt.public_key->keyid),
|
||||
keyserver->scheme,keyserver->host);
|
||||
else
|
||||
log_info(_("sending key %s to %s\n"),
|
||||
keystr(block->pkt->pkt.public_key->keyid),
|
||||
keyserver->uri);
|
||||
|
||||
release_kbnode(block);
|
||||
}
|
||||
@ -1079,8 +1088,12 @@ keyserver_spawn(int action,STRLIST list,KEYDB_SEARCH_DESC *desc,
|
||||
|
||||
fprintf(spawn->tochild,"\n");
|
||||
|
||||
log_info(_("searching for \"%s\" from %s server %s\n"),
|
||||
searchstr,keyserver->scheme,keyserver->host?keyserver->host:"");
|
||||
if(keyserver->host)
|
||||
log_info(_("searching for \"%s\" from %s server %s\n"),
|
||||
searchstr,keyserver->scheme,keyserver->host);
|
||||
else
|
||||
log_info(_("searching for \"%s\" from %s\n"),
|
||||
searchstr,keyserver->uri);
|
||||
|
||||
break;
|
||||
}
|
||||
|
@ -457,16 +457,13 @@ print_pkenc_list( struct kidlist_item *list, int failed )
|
||||
pk->pubkey_algo = list->pubkey_algo;
|
||||
if( !get_pubkey( pk, list->kid ) )
|
||||
{
|
||||
size_t n;
|
||||
char *p;
|
||||
log_info( _("encrypted with %u-bit %s key, ID %s, created %s\n"),
|
||||
nbits_from_pk( pk ), algstr, keystr_from_pk(pk),
|
||||
strtimestamp(pk->timestamp) );
|
||||
fputs(" \"", log_stream() );
|
||||
p = get_user_id( list->kid, &n );
|
||||
print_utf8_string2 ( log_stream(), p, n, '"' );
|
||||
p=get_user_id_native(list->kid);
|
||||
fprintf(log_stream(),_(" \"%s\"\n"),p);
|
||||
m_free(p);
|
||||
fputs("\"\n", log_stream() );
|
||||
}
|
||||
else
|
||||
log_info(_("encrypted with %s key, ID %s\n"),
|
||||
@ -579,7 +576,7 @@ proc_encrypted( CTX c, PACKET *pkt )
|
||||
sprintf ( buf, "%d:", c->dek->algo );
|
||||
for(i=0; i < c->dek->keylen; i++ )
|
||||
sprintf(buf+strlen(buf), "%02X", c->dek->key[i] );
|
||||
log_info( "session key: \"%s\"\n", buf );
|
||||
log_info( "session key: `%s'\n", buf );
|
||||
write_status_text ( STATUS_SESSION_KEY, buf );
|
||||
}
|
||||
}
|
||||
|
@ -85,7 +85,7 @@ PKT_user_id *generate_photo_id(PKT_public_key *pk)
|
||||
file=iobuf_open(filename);
|
||||
if(!file)
|
||||
{
|
||||
log_error(_("Unable to open photo \"%s\": %s\n"),
|
||||
log_error(_("Unable to open JPEG file `%s': %s\n"),
|
||||
filename,strerror(errno));
|
||||
continue;
|
||||
}
|
||||
@ -110,7 +110,7 @@ PKT_user_id *generate_photo_id(PKT_public_key *pk)
|
||||
if(photo[0]!=0xFF || photo[1]!=0xD8 ||
|
||||
photo[6]!='J' || photo[7]!='F' || photo[8]!='I' || photo[9]!='F')
|
||||
{
|
||||
log_error(_("\"%s\" is not a JPEG file\n"),filename);
|
||||
log_error(_("`%s' is not a JPEG file\n"),filename);
|
||||
m_free(photo);
|
||||
photo=NULL;
|
||||
continue;
|
||||
|
@ -204,7 +204,7 @@ do_edit_ownertrust (PKT_public_key *pk, int mode,
|
||||
pubkey_letter( pk->pubkey_algo ),
|
||||
keystr(keyid), datestr_from_pk( pk ) );
|
||||
p=get_user_id_native(keyid);
|
||||
tty_printf(_(" \"%s\"\n"),p);
|
||||
tty_printf(_(" \"%s\"\n"),p);
|
||||
m_free(p);
|
||||
|
||||
keyblock = get_pubkeyblock (keyid);
|
||||
@ -231,7 +231,7 @@ do_edit_ownertrust (PKT_public_key *pk, int mode,
|
||||
p=utf8_to_native(un->pkt->pkt.user_id->name,
|
||||
un->pkt->pkt.user_id->len,0);
|
||||
|
||||
tty_printf(_(" aka \"%s\"\n"),p);
|
||||
tty_printf(_(" aka \"%s\"\n"),p);
|
||||
}
|
||||
|
||||
print_fingerprint (pk, NULL, 2);
|
||||
|
@ -556,7 +556,7 @@ check_trustdb ()
|
||||
validate_keys (0);
|
||||
}
|
||||
else
|
||||
log_info (_("no need for a trustdb check with \"%s\" trust model\n"),
|
||||
log_info (_("no need for a trustdb check with `%s' trust model\n"),
|
||||
trust_model_string());
|
||||
}
|
||||
|
||||
@ -571,7 +571,7 @@ update_trustdb()
|
||||
if(opt.trust_model==TM_PGP || opt.trust_model==TM_CLASSIC)
|
||||
validate_keys (1);
|
||||
else
|
||||
log_info (_("no need for a trustdb update with \"%s\" trust model\n"),
|
||||
log_info (_("no need for a trustdb update with `%s' trust model\n"),
|
||||
trust_model_string());
|
||||
}
|
||||
|
||||
@ -1527,7 +1527,7 @@ check_regexp(const char *expr,const char *string)
|
||||
regfree(&pat);
|
||||
|
||||
if(DBG_TRUST)
|
||||
log_debug("regexp \"%s\" on \"%s\": %s\n",expr,string,ret==0?"YES":"NO");
|
||||
log_debug("regexp `%s' on `%s': %s\n",expr,string,ret==0?"YES":"NO");
|
||||
|
||||
return (ret==0);
|
||||
#endif
|
||||
@ -1987,7 +1987,7 @@ validate_keys (int interactive)
|
||||
{
|
||||
if(DBG_TRUST)
|
||||
log_debug("key %08lX%08lX:"
|
||||
" overriding ownertrust \"%s\" with \"%s\"\n",
|
||||
" overriding ownertrust `%s' with `%s'\n",
|
||||
(ulong)k->kid[0],(ulong)k->kid[1],
|
||||
trust_value_to_string(k->ownertrust),
|
||||
trust_value_to_string(min));
|
||||
|
Loading…
x
Reference in New Issue
Block a user