aboutsummaryrefslogtreecommitdiffstats
path: root/dirmngr
diff options
context:
space:
mode:
Diffstat (limited to 'dirmngr')
-rw-r--r--dirmngr/crlcache.c2
-rw-r--r--dirmngr/dirmngr-client.c2
-rw-r--r--dirmngr/dirmngr_ldap.c4
-rw-r--r--dirmngr/validate.c10
4 files changed, 9 insertions, 9 deletions
diff --git a/dirmngr/crlcache.c b/dirmngr/crlcache.c
index a4d8e80b6..8505f9c40 100644
--- a/dirmngr/crlcache.c
+++ b/dirmngr/crlcache.c
@@ -2301,7 +2301,7 @@ list_one_crl_entry (crl_cache_t cache, crl_cache_entry_t e, estream_t fp)
return gpg_error (GPG_ERR_GENERAL);
if (!e->dbfile_checked)
- es_fprintf (fp, _(" ERROR: This cached CRL may has been tampered with!\n"));
+ es_fprintf (fp, _(" ERROR: This cached CRL may have been tampered with!\n"));
es_putc ('\n', fp);
diff --git a/dirmngr/dirmngr-client.c b/dirmngr/dirmngr-client.c
index 65d5a84a4..21f77439b 100644
--- a/dirmngr/dirmngr-client.c
+++ b/dirmngr/dirmngr-client.c
@@ -76,7 +76,7 @@ static ARGPARSE_OPTS opts[] = {
{ oUrl, "url", 0, N_("expect an URL for --lookup")},
{ oLoadCRL, "load-crl", 0, N_("load a CRL into the dirmngr")},
{ oSquidMode,"squid-mode",0, N_("special mode for use by Squid")},
- { oPEM, "pem", 0, N_("certificates are expected in PEM format")},
+ { oPEM, "pem", 0, N_("expect certificates in PEM format")},
{ oForceDefaultResponder, "force-default-responder", 0,
N_("force the use of the default OCSP responder")},
{ 0, NULL, 0, NULL }
diff --git a/dirmngr/dirmngr_ldap.c b/dirmngr/dirmngr_ldap.c
index e17d262fd..1b513ead2 100644
--- a/dirmngr/dirmngr_ldap.c
+++ b/dirmngr/dirmngr_ldap.c
@@ -203,8 +203,8 @@ my_strusage (int level)
break;
case 41: p =
_("Syntax: dirmngr_ldap [options] [URL]\n"
- "Internal LDAP helper for Dirmngr.\n"
- "Interface and options may change without notice.\n");
+ "Internal LDAP helper for Dirmngr\n"
+ "Interface and options may change without notice\n");
break;
default: p = NULL;
diff --git a/dirmngr/validate.c b/dirmngr/validate.c
index 3ef676afb..024708b4c 100644
--- a/dirmngr/validate.c
+++ b/dirmngr/validate.c
@@ -1096,7 +1096,7 @@ cert_usage_p (ksba_cert_t cert, int mode)
{
if ((use & (KSBA_KEYUSAGE_KEY_CERT_SIGN)))
return 0;
- log_info (_("certificate should have not "
+ log_info (_("certificate should not have "
"been used for certification\n"));
return gpg_error (GPG_ERR_WRONG_KEY_USAGE);
}
@@ -1108,7 +1108,7 @@ cert_usage_p (ksba_cert_t cert, int mode)
|| (use & (KSBA_KEYUSAGE_KEY_CERT_SIGN
|KSBA_KEYUSAGE_CRL_SIGN))))
return 0;
- log_info (_("certificate should have not "
+ log_info (_("certificate should not have "
"been used for OCSP response signing\n"));
return gpg_error (GPG_ERR_WRONG_KEY_USAGE);
}
@@ -1117,7 +1117,7 @@ cert_usage_p (ksba_cert_t cert, int mode)
{
if ((use & (KSBA_KEYUSAGE_CRL_SIGN)))
return 0;
- log_info (_("certificate should have not "
+ log_info (_("certificate should not have "
"been used for CRL signing\n"));
return gpg_error (GPG_ERR_WRONG_KEY_USAGE);
}
@@ -1128,9 +1128,9 @@ cert_usage_p (ksba_cert_t cert, int mode)
)
return 0;
- log_info (mode==3? _("certificate should have not been used "
+ log_info (mode==3? _("certificate should not have been used "
"for encryption\n"):
- mode==2? _("certificate should have not been used for signing\n"):
+ mode==2? _("certificate should not have been used for signing\n"):
mode==1? _("certificate is not usable for encryption\n"):
_("certificate is not usable for signing\n"));
return gpg_error (GPG_ERR_WRONG_KEY_USAGE);