diff options
author | David Prévot <taffit@debian.org> | 2012-08-22 18:54:38 +0200 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2012-08-24 09:44:33 +0200 |
commit | ba591e2f14c0d85ba15346ffd04b9e7d72ec89dc (patch) | |
tree | d12711bb0e477d15f24ac8eea45245a47aefda48 /sm | |
parent | Actually show translators comments in PO files (diff) | |
download | gnupg2-ba591e2f14c0d85ba15346ffd04b9e7d72ec89dc.tar.xz gnupg2-ba591e2f14c0d85ba15346ffd04b9e7d72ec89dc.zip |
Fix typos spotted during translations
* agent/genkey.c: s/to to/to/
* sm/*.c: s/failed to allocated/failed to allocate/
* sm/certlist.c, ./dirmngr/validate.c: s/should have not/should not have/
* g10/seskey.c: missing closing parenthesis
* dirmngr/crlcache.c: s/may has/may have/
Consistency fix:
* g10/gpg.c, kbx/kbxutil.c, sm/gpgsm.c: uppercase after Syntax
* dirmngr/dirmngr_ldap: no period in Syntax
* dirmngr/dirmngr-client.c: infinitive for option description:
s/certificates are expected/expect certificates/
Diffstat (limited to 'sm')
-rw-r--r-- | sm/certchain.c | 6 | ||||
-rw-r--r-- | sm/certlist.c | 8 | ||||
-rw-r--r-- | sm/decrypt.c | 2 | ||||
-rw-r--r-- | sm/encrypt.c | 2 | ||||
-rw-r--r-- | sm/gpgsm.c | 4 | ||||
-rw-r--r-- | sm/sign.c | 2 | ||||
-rw-r--r-- | sm/verify.c | 2 |
7 files changed, 13 insertions, 13 deletions
diff --git a/sm/certchain.c b/sm/certchain.c index 18744b13a..b51291dfe 100644 --- a/sm/certchain.c +++ b/sm/certchain.c @@ -756,7 +756,7 @@ gpgsm_walk_cert_chain (ctrl_t ctrl, ksba_cert_t start, ksba_cert_t *r_next) *r_next = NULL; if (!kh) { - log_error (_("failed to allocated keyDB handle\n")); + log_error (_("failed to allocate keyDB handle\n")); rc = gpg_error (GPG_ERR_GENERAL); goto leave; } @@ -1250,7 +1250,7 @@ do_validate_chain (ctrl_t ctrl, ksba_cert_t cert, ksba_isotime_t checktime_arg, kh = keydb_new (0); if (!kh) { - log_error (_("failed to allocated keyDB handle\n")); + log_error (_("failed to allocate keyDB handle\n")); rc = gpg_error (GPG_ERR_GENERAL); goto leave; } @@ -1890,7 +1890,7 @@ gpgsm_basic_cert_check (ctrl_t ctrl, ksba_cert_t cert) kh = keydb_new (0); if (!kh) { - log_error (_("failed to allocated keyDB handle\n")); + log_error (_("failed to allocate keyDB handle\n")); rc = gpg_error (GPG_ERR_GENERAL); goto leave; } diff --git a/sm/certlist.c b/sm/certlist.c index 241364a3a..9adcabf23 100644 --- a/sm/certlist.c +++ b/sm/certlist.c @@ -139,7 +139,7 @@ cert_usage_p (ksba_cert_t cert, int mode) { if ((use & (KSBA_KEYUSAGE_KEY_CERT_SIGN))) return 0; - log_info (_("certificate should have not " + log_info (_("certificate should not have " "been used for certification\n")); return gpg_error (GPG_ERR_WRONG_KEY_USAGE); } @@ -151,7 +151,7 @@ cert_usage_p (ksba_cert_t cert, int mode) || (use & (KSBA_KEYUSAGE_KEY_CERT_SIGN |KSBA_KEYUSAGE_CRL_SIGN)))) return 0; - log_info (_("certificate should have not " + log_info (_("certificate should not have " "been used for OCSP response signing\n")); return gpg_error (GPG_ERR_WRONG_KEY_USAGE); } @@ -162,8 +162,8 @@ cert_usage_p (ksba_cert_t cert, int mode) ) return 0; - log_info (mode==3? _("certificate should have not been used for encryption\n"): - mode==2? _("certificate should have not been used for signing\n"): + log_info (mode==3? _("certificate should not have been used for encryption\n"): + mode==2? _("certificate should not have been used for signing\n"): mode==1? _("certificate is not usable for encryption\n"): _("certificate is not usable for signing\n")); return gpg_error (GPG_ERR_WRONG_KEY_USAGE); diff --git a/sm/decrypt.c b/sm/decrypt.c index 616115070..a56027288 100644 --- a/sm/decrypt.c +++ b/sm/decrypt.c @@ -259,7 +259,7 @@ gpgsm_decrypt (ctrl_t ctrl, int in_fd, estream_t out_fp) kh = keydb_new (0); if (!kh) { - log_error (_("failed to allocated keyDB handle\n")); + log_error (_("failed to allocate keyDB handle\n")); rc = gpg_error (GPG_ERR_GENERAL); goto leave; } diff --git a/sm/encrypt.c b/sm/encrypt.c index e881333c0..54a8bd1e9 100644 --- a/sm/encrypt.c +++ b/sm/encrypt.c @@ -336,7 +336,7 @@ gpgsm_encrypt (ctrl_t ctrl, certlist_t recplist, int data_fd, estream_t out_fp) kh = keydb_new (0); if (!kh) { - log_error (_("failed to allocated keyDB handle\n")); + log_error (_("failed to allocate keyDB handle\n")); rc = gpg_error (GPG_ERR_GENERAL); goto leave; } diff --git a/sm/gpgsm.c b/sm/gpgsm.c index 7263fd090..b00168251 100644 --- a/sm/gpgsm.c +++ b/sm/gpgsm.c @@ -535,8 +535,8 @@ my_strusage( int level ) break; case 41: p = _("Syntax: gpgsm [options] [files]\n" - "sign, check, encrypt or decrypt using the S/MIME protocol\n" - "default operation depends on the input data\n"); + "Sign, check, encrypt or decrypt using the S/MIME protocol\n" + "Default operation depends on the input data\n"); break; case 20: @@ -334,7 +334,7 @@ gpgsm_sign (ctrl_t ctrl, certlist_t signerlist, kh = keydb_new (0); if (!kh) { - log_error (_("failed to allocated keyDB handle\n")); + log_error (_("failed to allocate keyDB handle\n")); rc = gpg_error (GPG_ERR_GENERAL); goto leave; } diff --git a/sm/verify.c b/sm/verify.c index 8cf7ff9ec..2e911376e 100644 --- a/sm/verify.c +++ b/sm/verify.c @@ -111,7 +111,7 @@ gpgsm_verify (ctrl_t ctrl, int in_fd, int data_fd, estream_t out_fp) kh = keydb_new (0); if (!kh) { - log_error (_("failed to allocated keyDB handle\n")); + log_error (_("failed to allocate keyDB handle\n")); rc = gpg_error (GPG_ERR_GENERAL); goto leave; } |