diff options
Diffstat (limited to 'dirmngr')
-rw-r--r-- | dirmngr/crlcache.c | 2 | ||||
-rw-r--r-- | dirmngr/dirmngr-client.c | 2 | ||||
-rw-r--r-- | dirmngr/dirmngr_ldap.c | 4 | ||||
-rw-r--r-- | dirmngr/validate.c | 10 |
4 files changed, 9 insertions, 9 deletions
diff --git a/dirmngr/crlcache.c b/dirmngr/crlcache.c index a4d8e80b6..8505f9c40 100644 --- a/dirmngr/crlcache.c +++ b/dirmngr/crlcache.c @@ -2301,7 +2301,7 @@ list_one_crl_entry (crl_cache_t cache, crl_cache_entry_t e, estream_t fp) return gpg_error (GPG_ERR_GENERAL); if (!e->dbfile_checked) - es_fprintf (fp, _(" ERROR: This cached CRL may has been tampered with!\n")); + es_fprintf (fp, _(" ERROR: This cached CRL may have been tampered with!\n")); es_putc ('\n', fp); diff --git a/dirmngr/dirmngr-client.c b/dirmngr/dirmngr-client.c index 65d5a84a4..21f77439b 100644 --- a/dirmngr/dirmngr-client.c +++ b/dirmngr/dirmngr-client.c @@ -76,7 +76,7 @@ static ARGPARSE_OPTS opts[] = { { oUrl, "url", 0, N_("expect an URL for --lookup")}, { oLoadCRL, "load-crl", 0, N_("load a CRL into the dirmngr")}, { oSquidMode,"squid-mode",0, N_("special mode for use by Squid")}, - { oPEM, "pem", 0, N_("certificates are expected in PEM format")}, + { oPEM, "pem", 0, N_("expect certificates in PEM format")}, { oForceDefaultResponder, "force-default-responder", 0, N_("force the use of the default OCSP responder")}, { 0, NULL, 0, NULL } diff --git a/dirmngr/dirmngr_ldap.c b/dirmngr/dirmngr_ldap.c index e17d262fd..1b513ead2 100644 --- a/dirmngr/dirmngr_ldap.c +++ b/dirmngr/dirmngr_ldap.c @@ -203,8 +203,8 @@ my_strusage (int level) break; case 41: p = _("Syntax: dirmngr_ldap [options] [URL]\n" - "Internal LDAP helper for Dirmngr.\n" - "Interface and options may change without notice.\n"); + "Internal LDAP helper for Dirmngr\n" + "Interface and options may change without notice\n"); break; default: p = NULL; diff --git a/dirmngr/validate.c b/dirmngr/validate.c index 3ef676afb..024708b4c 100644 --- a/dirmngr/validate.c +++ b/dirmngr/validate.c @@ -1096,7 +1096,7 @@ cert_usage_p (ksba_cert_t cert, int mode) { if ((use & (KSBA_KEYUSAGE_KEY_CERT_SIGN))) return 0; - log_info (_("certificate should have not " + log_info (_("certificate should not have " "been used for certification\n")); return gpg_error (GPG_ERR_WRONG_KEY_USAGE); } @@ -1108,7 +1108,7 @@ cert_usage_p (ksba_cert_t cert, int mode) || (use & (KSBA_KEYUSAGE_KEY_CERT_SIGN |KSBA_KEYUSAGE_CRL_SIGN)))) return 0; - log_info (_("certificate should have not " + log_info (_("certificate should not have " "been used for OCSP response signing\n")); return gpg_error (GPG_ERR_WRONG_KEY_USAGE); } @@ -1117,7 +1117,7 @@ cert_usage_p (ksba_cert_t cert, int mode) { if ((use & (KSBA_KEYUSAGE_CRL_SIGN))) return 0; - log_info (_("certificate should have not " + log_info (_("certificate should not have " "been used for CRL signing\n")); return gpg_error (GPG_ERR_WRONG_KEY_USAGE); } @@ -1128,9 +1128,9 @@ cert_usage_p (ksba_cert_t cert, int mode) ) return 0; - log_info (mode==3? _("certificate should have not been used " + log_info (mode==3? _("certificate should not have been used " "for encryption\n"): - mode==2? _("certificate should have not been used for signing\n"): + mode==2? _("certificate should not have been used for signing\n"): mode==1? _("certificate is not usable for encryption\n"): _("certificate is not usable for signing\n")); return gpg_error (GPG_ERR_WRONG_KEY_USAGE); |