diff options
| author | David Shaw <[email protected]> | 2003-04-27 20:22:09 +0000 |
|---|---|---|
| committer | David Shaw <[email protected]> | 2003-04-27 20:22:09 +0000 |
| commit | 9f6fa94486134b211a37c62bbe115587dd689b67 (patch) | |
| tree | c52a326280297baba57ca3a2c03d0a8d40103d23 /g10/keyedit.c | |
| parent | * sign.c (do_sign): Show the hash used when making a signature in verbose (diff) | |
| download | gnupg-9f6fa94486134b211a37c62bbe115587dd689b67.tar.gz gnupg-9f6fa94486134b211a37c62bbe115587dd689b67.zip | |
* g10.c (main): Add --no-textmode.
* export.c (do_export_stream), keyedit.c (show_key_with_all_names,
menu_addrevoker), mainproc.c (check_sig_and_print), photoid.c
(show_photos), sign.c (mk_notation_and_policy), trustdb.c (get_validity,
reset_trust_records, validate_keys): Make some strings translatable.
* mainproc.c (check_sig_and_print): Show digest algorithm and sig class
when verifying a sig with --verbose on, and add version, pk and hash
algorithms and sig class to VALIDSIG.
* parse-packet.c (enum_sig_subpkt): Make a warning message a --verbose
warning message since we don't need to warn every time we see an unknown
critical (we only need to invalidate the signature).
* trustdb.c (init_trustdb): Check the trustdb options even with TM_AUTO
since the auto may become TM_CLASSIC or TM_OPENPGP.
Diffstat (limited to 'g10/keyedit.c')
| -rw-r--r-- | g10/keyedit.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/g10/keyedit.c b/g10/keyedit.c index ce1d7ddf1..0324b4070 100644 --- a/g10/keyedit.c +++ b/g10/keyedit.c @@ -2073,9 +2073,9 @@ show_key_with_all_names( KBNODE keyblock, int only_marked, int with_revoker, else tty_printf("(%d) ", i); if ( uid->is_revoked ) - tty_printf ("[revoked] "); + tty_printf (_("[revoked] ")); if ( uid->is_expired ) - tty_printf ("[expired] "); + tty_printf (_("[expired] ")); tty_print_utf8_string( uid->name, uid->len ); tty_printf("\n"); if( with_prefs ) @@ -2485,9 +2485,9 @@ menu_delkey( KBNODE pub_keyblock, KBNODE sec_keyblock ) if( sec_keyblock ) commit_kbnode( &sec_keyblock ); - /* No need to set update_trust here since signing keys no longer - are used to certify other keys, so there is no change in trust - when revoking/removing them */ + /* No need to set update_trust here since signing keys are no + longer used to certify other keys, so there is no change in + trust when revoking/removing them */ } @@ -2636,14 +2636,14 @@ menu_addrevoker( KBNODE pub_keyblock, KBNODE sec_keyblock, int sensitive ) print_fingerprint(revoker_pk,NULL,2); tty_printf("\n"); - tty_printf("WARNING: appointing a key as a designated revoker " - "cannot be undone!\n"); + tty_printf(_("WARNING: appointing a key as a designated revoker " + "cannot be undone!\n")); tty_printf("\n"); if(!cpr_get_answer_is_yes("keyedit.add_revoker.okay", - "Are you sure you want to appoint this " - "key as a designated revoker? (y/N): ")) + _("Are you sure you want to appoint this " + "key as a designated revoker? (y/N): "))) continue; free_public_key(revoker_pk); |
