diff options
Diffstat (limited to 'agent')
-rw-r--r-- | agent/cache.c | 14 | ||||
-rw-r--r-- | agent/call-pinentry.c | 4 | ||||
-rw-r--r-- | agent/call-scd.c | 10 | ||||
-rw-r--r-- | agent/command-ssh.c | 12 | ||||
-rw-r--r-- | agent/divert-scd.c | 4 | ||||
-rw-r--r-- | agent/findkey.c | 16 | ||||
-rw-r--r-- | agent/gpg-agent.c | 38 | ||||
-rw-r--r-- | agent/learncard.c | 2 | ||||
-rw-r--r-- | agent/protect-tool.c | 10 | ||||
-rw-r--r-- | agent/t-protect.c | 4 | ||||
-rw-r--r-- | agent/trustlist.c | 28 |
11 files changed, 71 insertions, 71 deletions
diff --git a/agent/cache.c b/agent/cache.c index 9b90d93f4..d4deaeb8c 100644 --- a/agent/cache.c +++ b/agent/cache.c @@ -218,7 +218,7 @@ housekeeping (void) if (r->pw && r->ttl >= 0 && r->accessed + r->ttl < current) { if (DBG_CACHE) - log_debug (" expired `%s' (%ds after last access)\n", + log_debug (" expired '%s' (%ds after last access)\n", r->key, r->ttl); release_data (r->pw); r->pw = NULL; @@ -240,7 +240,7 @@ housekeeping (void) if (r->pw && r->created + maxttl < current) { if (DBG_CACHE) - log_debug (" expired `%s' (%lus after creation)\n", + log_debug (" expired '%s' (%lus after creation)\n", r->key, opt.max_cache_ttl); release_data (r->pw); r->pw = NULL; @@ -256,7 +256,7 @@ housekeeping (void) { ITEM r2 = r->next; if (DBG_CACHE) - log_debug (" removed `%s' (mode %d) (slot not used for 30m)\n", + log_debug (" removed '%s' (mode %d) (slot not used for 30m)\n", r->key, r->cache_mode); xfree (r); if (!rprev) @@ -287,7 +287,7 @@ agent_flush_cache (void) if (r->pw) { if (DBG_CACHE) - log_debug (" flushing `%s'\n", r->key); + log_debug (" flushing '%s'\n", r->key); release_data (r->pw); r->pw = NULL; r->accessed = 0; @@ -311,7 +311,7 @@ agent_put_cache (const char *key, cache_mode_t cache_mode, ITEM r; if (DBG_CACHE) - log_debug ("agent_put_cache `%s' (mode %d) requested ttl=%d\n", + log_debug ("agent_put_cache '%s' (mode %d) requested ttl=%d\n", key, cache_mode, ttl); housekeeping (); @@ -393,7 +393,7 @@ agent_get_cache (const char *key, cache_mode_t cache_mode) return NULL; if (DBG_CACHE) - log_debug ("agent_get_cache `%s' (mode %d) ...\n", key, cache_mode); + log_debug ("agent_get_cache '%s' (mode %d) ...\n", key, cache_mode); housekeeping (); for (r=thecache; r; r = r->next) @@ -431,7 +431,7 @@ agent_get_cache (const char *key, cache_mode_t cache_mode) { xfree (value); value = NULL; - log_error ("retrieving cache entry `%s' failed: %s\n", + log_error ("retrieving cache entry '%s' failed: %s\n", key, gpg_strerror (err)); } return value; diff --git a/agent/call-pinentry.c b/agent/call-pinentry.c index 34ab3840e..381d0f0a6 100644 --- a/agent/call-pinentry.c +++ b/agent/call-pinentry.c @@ -315,7 +315,7 @@ start_pinentry (ctrl_t ctrl) ASSUAN_PIPE_CONNECT_DETACHED); if (rc) { - log_error ("can't connect to the PIN entry module `%s': %s\n", + log_error ("can't connect to the PIN entry module '%s': %s\n", opt.pinentry_program, gpg_strerror (rc)); assuan_release (ctx); return unlock_pinentry (gpg_error (GPG_ERR_NO_PIN_ENTRY)); @@ -622,7 +622,7 @@ inq_quality (void *opaque, const char *line) } else { - log_error ("unsupported inquiry `%s' from pinentry\n", line); + log_error ("unsupported inquiry '%s' from pinentry\n", line); rc = gpg_error (GPG_ERR_ASS_UNKNOWN_INQUIRE); } diff --git a/agent/call-scd.c b/agent/call-scd.c index f9ededb72..8fc00542e 100644 --- a/agent/call-scd.c +++ b/agent/call-scd.c @@ -148,7 +148,7 @@ agent_scd_dump_state (void) (long)assuan_get_pid (primary_scd_ctx), primary_scd_ctx_reusable); if (socket_name) - log_info ("agent_scd_dump_state: socket=`%s'\n", socket_name); + log_info ("agent_scd_dump_state: socket='%s'\n", socket_name); } @@ -268,7 +268,7 @@ start_scd (ctrl_t ctrl) rc = assuan_socket_connect (ctx, socket_name, 0, 0); if (rc) { - log_error ("can't connect to socket `%s': %s\n", + log_error ("can't connect to socket '%s': %s\n", socket_name, gpg_strerror (rc)); err = gpg_error (GPG_ERR_NO_SCDAEMON); goto leave; @@ -366,7 +366,7 @@ start_scd (ctrl_t ctrl) memcpy (socket_name, databuf, datalen); socket_name[datalen] = 0; if (DBG_ASSUAN) - log_debug ("additional connections at `%s'\n", socket_name); + log_debug ("additional connections at '%s'\n", socket_name); } } xfree (databuf); @@ -763,12 +763,12 @@ inq_needpin (void *opaque, const char *line) xfree (value); } else - log_error ("error forwarding inquiry `%s': %s\n", + log_error ("error forwarding inquiry '%s': %s\n", line, gpg_strerror (rc)); } else { - log_error ("unsupported inquiry `%s'\n", line); + log_error ("unsupported inquiry '%s'\n", line); rc = gpg_error (GPG_ERR_ASS_UNKNOWN_INQUIRE); } diff --git a/agent/command-ssh.c b/agent/command-ssh.c index 54e56eac0..ddf8e2cf6 100644 --- a/agent/command-ssh.c +++ b/agent/command-ssh.c @@ -684,7 +684,7 @@ open_control_file (FILE **r_fp, int append) if (!stream) { err = gpg_error_from_syserror (); - log_error (_("can't create `%s': %s\n"), fname, gpg_strerror (err)); + log_error (_("can't create '%s': %s\n"), fname, gpg_strerror (err)); xfree (fname); return err; } @@ -696,7 +696,7 @@ open_control_file (FILE **r_fp, int append) if (!fp) { err = gpg_error (gpg_err_code_from_errno (errno)); - log_error (_("can't open `%s': %s\n"), fname, gpg_strerror (err)); + log_error (_("can't open '%s': %s\n"), fname, gpg_strerror (err)); xfree (fname); return err; } @@ -769,7 +769,7 @@ search_control_file (FILE *fp, const char *hexgrip, goto next_line; if (i != 40 || !(spacep (p) || *p == '\n')) { - log_error ("invalid formatted line in `%s', line %d\n", fname, lnr); + log_error ("invalid formatted line in '%s', line %d\n", fname, lnr); return gpg_error (GPG_ERR_BAD_DATA); } @@ -777,7 +777,7 @@ search_control_file (FILE *fp, const char *hexgrip, p = pend; if (!(spacep (p) || *p == '\n') || ttl < -1) { - log_error ("invalid TTL value in `%s', line %d; assuming 0\n", + log_error ("invalid TTL value in '%s', line %d; assuming 0\n", fname, lnr); ttl = 0; } @@ -795,7 +795,7 @@ search_control_file (FILE *fp, const char *hexgrip, if (p[n] == '=') { log_error ("assigning a value to a flag is not yet supported; " - "in `%s', line %d; flag ignored\n", fname, lnr); + "in '%s', line %d; flag ignored\n", fname, lnr); p++; } else if (n == 7 && !memcmp (p, "confirm", 7)) @@ -804,7 +804,7 @@ search_control_file (FILE *fp, const char *hexgrip, *r_confirm = 1; } else - log_error ("invalid flag `%.*s' in `%s', line %d; ignored\n", + log_error ("invalid flag '%.*s' in '%s', line %d; ignored\n", n, p, fname, lnr); p += n; } diff --git a/agent/divert-scd.c b/agent/divert-scd.c index 22cdf8ed9..656d5cdf1 100644 --- a/agent/divert-scd.c +++ b/agent/divert-scd.c @@ -312,9 +312,9 @@ getpin_cb (void *opaque, const char *info, char *buf, size_t maxbuf) char *desc; if ( asprintf (&desc, _("Please enter the PIN%s%s%s to unlock the card"), - info? " (`":"", + info? " (":"", info? info:"", - info? "')":"") < 0) + info? ")":"") < 0) desc = NULL; rc = agent_askpin (ctrl, desc?desc:info, prompt, NULL, pi); xfree (desc); diff --git a/agent/findkey.c b/agent/findkey.c index a03d0c423..0b57390eb 100644 --- a/agent/findkey.c +++ b/agent/findkey.c @@ -68,7 +68,7 @@ agent_write_private_key (const unsigned char *grip, if (!force && !access (fname, F_OK)) { - log_error ("secret key file `%s' already exists\n", fname); + log_error ("secret key file '%s' already exists\n", fname); xfree (fname); return gpg_error (GPG_ERR_EEXIST); } @@ -77,7 +77,7 @@ agent_write_private_key (const unsigned char *grip, if (!fp) { gpg_error_t tmperr = gpg_error_from_syserror (); - log_error ("can't create `%s': %s\n", fname, gpg_strerror (tmperr)); + log_error ("can't create '%s': %s\n", fname, gpg_strerror (tmperr)); xfree (fname); return tmperr; } @@ -85,7 +85,7 @@ agent_write_private_key (const unsigned char *grip, if (es_fwrite (buffer, length, 1, fp) != 1) { gpg_error_t tmperr = gpg_error_from_syserror (); - log_error ("error writing `%s': %s\n", fname, gpg_strerror (tmperr)); + log_error ("error writing '%s': %s\n", fname, gpg_strerror (tmperr)); es_fclose (fp); gnupg_remove (fname); xfree (fname); @@ -94,7 +94,7 @@ agent_write_private_key (const unsigned char *grip, if (es_fclose (fp)) { gpg_error_t tmperr = gpg_error_from_syserror (); - log_error ("error closing `%s': %s\n", fname, gpg_strerror (tmperr)); + log_error ("error closing '%s': %s\n", fname, gpg_strerror (tmperr)); gnupg_remove (fname); xfree (fname); return tmperr; @@ -478,7 +478,7 @@ read_key_file (const unsigned char *grip, gcry_sexp_t *result) { rc = gpg_error_from_syserror (); if (gpg_err_code (rc) != GPG_ERR_ENOENT) - log_error ("can't open `%s': %s\n", fname, strerror (errno)); + log_error ("can't open '%s': %s\n", fname, strerror (errno)); xfree (fname); return rc; } @@ -486,7 +486,7 @@ read_key_file (const unsigned char *grip, gcry_sexp_t *result) if (fstat (es_fileno (fp), &st)) { rc = gpg_error_from_syserror (); - log_error ("can't stat `%s': %s\n", fname, strerror (errno)); + log_error ("can't stat '%s': %s\n", fname, strerror (errno)); xfree (fname); es_fclose (fp); return rc; @@ -497,7 +497,7 @@ read_key_file (const unsigned char *grip, gcry_sexp_t *result) if (!buf) { rc = gpg_error_from_syserror (); - log_error ("error allocating %zu bytes for `%s': %s\n", + log_error ("error allocating %zu bytes for '%s': %s\n", buflen, fname, strerror (errno)); xfree (fname); es_fclose (fp); @@ -509,7 +509,7 @@ read_key_file (const unsigned char *grip, gcry_sexp_t *result) if (es_fread (buf, buflen, 1, fp) != 1) { rc = gpg_error_from_syserror (); - log_error ("error reading %zu bytes from `%s': %s\n", + log_error ("error reading %zu bytes from '%s': %s\n", buflen, fname, strerror (errno)); xfree (fname); es_fclose (fp); diff --git a/agent/gpg-agent.c b/agent/gpg-agent.c index b6bf71edc..b117849c5 100644 --- a/agent/gpg-agent.c +++ b/agent/gpg-agent.c @@ -394,7 +394,7 @@ set_debug (void) } else { - log_error (_("invalid debug-level `%s' given\n"), debug_level); + log_error (_("invalid debug-level '%s' given\n"), debug_level); opt.debug = 0; /* Reset debugging, so that prior debug statements won't have an undesired effect. */ } @@ -727,7 +727,7 @@ main (int argc, char **argv ) if (default_config) { if( parse_debug ) - log_info (_("NOTE: no default option file `%s'\n"), + log_info (_("NOTE: no default option file '%s'\n"), configname ); /* Save the default conf file name so that reread_configuration is able to test whether the @@ -738,7 +738,7 @@ main (int argc, char **argv ) } else { - log_error (_("option file `%s': %s\n"), + log_error (_("option file '%s': %s\n"), configname, strerror(errno) ); exit(2); } @@ -746,7 +746,7 @@ main (int argc, char **argv ) configname = NULL; } if (parse_debug && configname ) - log_info (_("reading options from `%s'\n"), configname ); + log_info (_("reading options from '%s'\n"), configname ); default_config = 0; } @@ -858,7 +858,7 @@ main (int argc, char **argv ) for (i=0; i < argc; i++) if (argv[i][0] == '-' && argv[i][1] == '-') - log_info (_("NOTE: `%s' is not considered an option\n"), argv[i]); + log_info (_("NOTE: '%s' is not considered an option\n"), argv[i]); } #ifdef ENABLE_NLS @@ -1117,7 +1117,7 @@ main (int argc, char **argv ) fp = es_fopen (env_file_name, "w,mode=-rw"); if (!fp) - log_error (_("error creating `%s': %s\n"), + log_error (_("error creating '%s': %s\n"), env_file_name, strerror (errno)); else { @@ -1213,7 +1213,7 @@ main (int argc, char **argv ) if ( ! close (i) && open ("/dev/null", i? O_WRONLY : O_RDONLY) == -1) { - log_error ("failed to open `%s': %s\n", + log_error ("failed to open '%s': %s\n", "/dev/null", strerror (errno)); cleanup (); exit (1); @@ -1352,7 +1352,7 @@ reread_configuration (void) fp = fopen (config_filename, "r"); if (!fp) { - log_info (_("option file `%s': %s\n"), + log_info (_("option file '%s': %s\n"), config_filename, strerror(errno) ); return; } @@ -1472,7 +1472,7 @@ create_socket_name (char *standard_name, char *template) *p = 0; if (!mkdtemp (name)) { - log_error (_("can't create directory `%s': %s\n"), + log_error (_("can't create directory '%s': %s\n"), name, strerror (errno)); agent_exit (2); } @@ -1481,7 +1481,7 @@ create_socket_name (char *standard_name, char *template) if (strchr (name, PATHSEP_C)) { - log_error (("`%s' are not allowed in the socket name\n"), PATHSEP_S); + log_error (("'%s' are not allowed in the socket name\n"), PATHSEP_S); agent_exit (2); } if (strlen (name) + 1 >= DIMof (struct sockaddr_un, sun_path) ) @@ -1518,7 +1518,7 @@ create_server_socket (char *name, int is_ssh, assuan_sock_nonce_t *nonce) serv_addr->sun_family = AF_UNIX; if (strlen (name) + 1 >= sizeof (serv_addr->sun_path)) { - log_error (_("socket name `%s' is too long\n"), name); + log_error (_("socket name '%s' is too long\n"), name); agent_exit (2); } strcpy (serv_addr->sun_path, name); @@ -1562,7 +1562,7 @@ create_server_socket (char *name, int is_ssh, assuan_sock_nonce_t *nonce) { /* We use gpg_strerror here because it allows us to get strings for some W32 socket error codes. */ - log_error (_("error binding socket to `%s': %s\n"), + log_error (_("error binding socket to '%s': %s\n"), serv_addr->sun_path, gpg_strerror (gpg_error_from_errno (errno))); @@ -1580,7 +1580,7 @@ create_server_socket (char *name, int is_ssh, assuan_sock_nonce_t *nonce) } if (opt.verbose) - log_info (_("listening on socket `%s'\n"), serv_addr->sun_path); + log_info (_("listening on socket '%s'\n"), serv_addr->sun_path); return fd; } @@ -1599,10 +1599,10 @@ create_private_keys_directory (const char *home) if (stat (fname, &statbuf) && errno == ENOENT) { if (gnupg_mkdir (fname, "-rwx")) - log_error (_("can't create directory `%s': %s\n"), + log_error (_("can't create directory '%s': %s\n"), fname, strerror (errno) ); else if (!opt.quiet) - log_info (_("directory `%s' created\n"), fname); + log_info (_("directory '%s' created\n"), fname); } xfree (fname); } @@ -1638,22 +1638,22 @@ create_directories (void) ) { if (gnupg_mkdir (home, "-rwx")) - log_error (_("can't create directory `%s': %s\n"), + log_error (_("can't create directory '%s': %s\n"), home, strerror (errno) ); else { if (!opt.quiet) - log_info (_("directory `%s' created\n"), home); + log_info (_("directory '%s' created\n"), home); create_private_keys_directory (home); } } } else - log_error (_("stat() failed for `%s': %s\n"), home, strerror (errno)); + log_error (_("stat() failed for '%s': %s\n"), home, strerror (errno)); } else if ( !S_ISDIR(statbuf.st_mode)) { - log_error (_("can't use `%s' as home directory\n"), home); + log_error (_("can't use '%s' as home directory\n"), home); } else /* exists and is a directory. */ { diff --git a/agent/learncard.c b/agent/learncard.c index 05476f617..c60b3f48d 100644 --- a/agent/learncard.c +++ b/agent/learncard.c @@ -275,7 +275,7 @@ send_cert_back (ctrl_t ctrl, const char *id, void *assuan_context) break; } if (opt.verbose || !*action) - log_info ("error reading certificate `%s': %s%s\n", + log_info ("error reading certificate '%s': %s%s\n", id? id:"?", gpg_strerror (rc), action); return *action? 0 : rc; diff --git a/agent/protect-tool.c b/agent/protect-tool.c index 57842a083..d59f5f0fa 100644 --- a/agent/protect-tool.c +++ b/agent/protect-tool.c @@ -191,7 +191,7 @@ make_canonical (const char *fname, const char *buf, size_t buflen) rc = gcry_sexp_sscan (&sexp, &erroff, buf, buflen); if (rc) { - log_error ("invalid S-Expression in `%s' (off=%u): %s\n", + log_error ("invalid S-Expression in '%s' (off=%u): %s\n", fname, (unsigned int)erroff, gpg_strerror (rc)); return NULL; } @@ -258,7 +258,7 @@ read_file (const char *fname, size_t *r_length) nread = fread (buf+buflen, 1, NCHUNK, fp); if (nread < NCHUNK && ferror (fp)) { - log_error ("error reading `[stdin]': %s\n", strerror (errno)); + log_error ("error reading '[stdin]': %s\n", strerror (errno)); xfree (buf); return NULL; } @@ -275,13 +275,13 @@ read_file (const char *fname, size_t *r_length) fp = fopen (fname, "rb"); if (!fp) { - log_error ("can't open `%s': %s\n", fname, strerror (errno)); + log_error ("can't open '%s': %s\n", fname, strerror (errno)); return NULL; } if (fstat (fileno(fp), &st)) { - log_error ("can't stat `%s': %s\n", fname, strerror (errno)); + log_error ("can't stat '%s': %s\n", fname, strerror (errno)); fclose (fp); return NULL; } @@ -290,7 +290,7 @@ read_file (const char *fname, size_t *r_length) buf = xmalloc (buflen+1); if (fread (buf, buflen, 1, fp) != 1) { - log_error ("error reading `%s': %s\n", fname, strerror (errno)); + log_error ("error reading '%s': %s\n", fname, strerror (errno)); fclose (fp); xfree (buf); return NULL; diff --git a/agent/t-protect.c b/agent/t-protect.c index 4b6e0b48c..67a60a897 100644 --- a/agent/t-protect.c +++ b/agent/t-protect.c @@ -107,7 +107,7 @@ test_agent_protect (void) "\xA4\x44\x3B\xA5\x3A\x52\xFC\xA8\x17\x3D\xE6\xE8\x5B\x42\xF9\x78\x3D\x4A\x78\x17" "\xD0\x68\x0B\x29\x29\x00" }; - /* This RSA key is the `e' value. */ + /* This RSA key is the 'e' value. */ struct key_spec key_rsa_bogus_1 = { "\x28\x31\x31\x3A\x70\x72\x69\x76\x61\x74\x65\x2D\x6B\x65\x79\x28\x33\x3A\x72\x73" @@ -177,7 +177,7 @@ test_agent_protect (void) &specs[i].result, &specs[i].resultlen, 0); if (gpg_err_code (ret) != specs[i].ret_expected) { - printf ("agent_protect() returned `%i/%s'; expected `%i/%s'\n", + printf ("agent_protect() returned '%i/%s'; expected '%i/%s'\n", ret, gpg_strerror (ret), specs[i].ret_expected, gpg_strerror (specs[i].ret_expected)); abort (); diff --git a/agent/trustlist.c b/agent/trustlist.c index f92ad3053..7829f01c8 100644 --- a/agent/trustlist.c +++ b/agent/trustlist.c @@ -151,7 +151,7 @@ read_one_trustfile (const char *fname, int allow_include, if (!fp) { err = gpg_error_from_syserror (); - log_error (_("error opening `%s': %s\n"), fname, gpg_strerror (err)); + log_error (_("error opening '%s': %s\n"), fname, gpg_strerror (err)); goto leave; } @@ -167,7 +167,7 @@ read_one_trustfile (const char *fname, int allow_include, ; err = gpg_error (*line? GPG_ERR_LINE_TOO_LONG : GPG_ERR_INCOMPLETE_LINE); - log_error (_("file `%s', line %d: %s\n"), + log_error (_("file '%s', line %d: %s\n"), fname, lnr, gpg_strerror (err)); continue; } @@ -189,7 +189,7 @@ read_one_trustfile (const char *fname, int allow_include, if (!allow_include) { - log_error (_("statement \"%s\" ignored in `%s', line %d\n"), + log_error (_("statement \"%s\" ignored in '%s', line %d\n"), "include-default", fname, lnr); continue; } @@ -197,13 +197,13 @@ read_one_trustfile (const char *fname, int allow_include, etcname = make_filename (gnupg_sysconfdir (), "trustlist.txt", NULL); if ( !strcmp (etcname, fname) ) /* Same file. */ - log_info (_("statement \"%s\" ignored in `%s', line %d\n"), + log_info (_("statement \"%s\" ignored in '%s', line %d\n"), "include-default", fname, lnr); else if ( access (etcname, F_OK) && errno == ENOENT ) { /* A non existent system trustlist is not an error. Just print a note. */ - log_info (_("system trustlist `%s' not available\n"), etcname); + log_info (_("system trustlist '%s' not available\n"), etcname); } else { @@ -247,7 +247,7 @@ read_one_trustfile (const char *fname, int allow_include, n = hexcolon2bin (p, ti->fpr, 20); if (n < 0) { - log_error (_("bad fingerprint in `%s', line %d\n"), fname, lnr); + log_error (_("bad fingerprint in '%s', line %d\n"), fname, lnr); err = gpg_error (GPG_ERR_BAD_DATA); continue; } @@ -272,14 +272,14 @@ read_one_trustfile (const char *fname, int allow_include, } else { - log_error (_("invalid keyflag in `%s', line %d\n"), fname, lnr); + log_error (_("invalid keyflag in '%s', line %d\n"), fname, lnr); err = gpg_error (GPG_ERR_BAD_DATA); continue; } p++; if ( *p && !spacep (p) ) { - log_error (_("invalid keyflag in `%s', line %d\n"), fname, lnr); + log_error (_("invalid keyflag in '%s', line %d\n"), fname, lnr); err = gpg_error (GPG_ERR_BAD_DATA); continue; } @@ -295,7 +295,7 @@ read_one_trustfile (const char *fname, int allow_include, if (p[n] == '=') { log_error ("assigning a value to a flag is not yet supported; " - "in `%s', line %d\n", fname, lnr); + "in '%s', line %d\n", fname, lnr); err = gpg_error (GPG_ERR_BAD_DATA); p++; } @@ -304,7 +304,7 @@ read_one_trustfile (const char *fname, int allow_include, else if (n == 2 && !memcmp (p, "cm", 2)) ti->flags.cm = 1; else - log_error ("flag `%.*s' in `%s', line %d ignored\n", + log_error ("flag '%.*s' in '%s', line %d ignored\n", n, p, fname, lnr); p += n; } @@ -313,7 +313,7 @@ read_one_trustfile (const char *fname, int allow_include, if ( !err && !es_feof (fp) ) { err = gpg_error_from_syserror (); - log_error (_("error reading `%s', line %d: %s\n"), + log_error (_("error reading '%s', line %d: %s\n"), fname, lnr, gpg_strerror (err)); } @@ -352,7 +352,7 @@ read_trustfiles (void) else { err = gpg_error_from_syserror (); - log_error (_("error opening `%s': %s\n"), fname, gpg_strerror (err)); + log_error (_("error opening '%s': %s\n"), fname, gpg_strerror (err)); } xfree (fname); fname = make_filename (gnupg_sysconfdir (), "trustlist.txt", NULL); @@ -740,7 +740,7 @@ agent_marktrusted (ctrl_t ctrl, const char *name, const char *fpr, int flag) if (!fp) { err = gpg_error_from_syserror (); - log_error ("can't create `%s': %s\n", fname, gpg_strerror (err)); + log_error ("can't create '%s': %s\n", fname, gpg_strerror (err)); xfree (fname); unlock_trusttable (); xfree (fprformatted); @@ -754,7 +754,7 @@ agent_marktrusted (ctrl_t ctrl, const char *name, const char *fpr, int flag) if (!fp) { err = gpg_error_from_syserror (); - log_error ("can't open `%s': %s\n", fname, gpg_strerror (err)); + log_error ("can't open '%s': %s\n", fname, gpg_strerror (err)); xfree (fname); unlock_trusttable (); xfree (fprformatted); |