[seahorse] Use Unicode in translatable strings
- From: Stefan Walter <stefw src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [seahorse] Use Unicode in translatable strings
- Date: Tue, 18 Oct 2016 09:26:38 +0000 (UTC)
commit 70d7513aa6c17fa73127d94a2e48a4b1428abac2
Author: Piotr Drąg <piotrdrag gmail com>
Date: Thu Oct 6 23:39:01 2016 +0200
Use Unicode in translatable strings
See https://developer.gnome.org/hig/stable/typography.html
Signed-off-by: Stef Walter <stefw gnome org>
* Didn't include use of complex characters on command line.
https://bugzilla.gnome.org/show_bug.cgi?id=772532
common/catalog.vala | 6 +++---
data/seahorse.appdata.xml.in | 2 +-
gkr/gkr-backend.vala | 2 +-
gkr/gkr-item-add.vala | 2 +-
gkr/gkr-item-properties.vala | 4 ++--
gkr/gkr-item.vala | 2 +-
gkr/gkr-keyring-add.vala | 2 +-
gkr/gkr-keyring.vala | 8 ++++----
libegg/egg-datetime.c | 2 +-
libseahorse/seahorse-key-manager-store.c | 2 +-
libseahorse/seahorse-prefs.c | 2 +-
pgp/seahorse-gpgme-add-subkey.c | 2 +-
pgp/seahorse-gpgme-add-uid.c | 2 +-
pgp/seahorse-gpgme-expires.c | 2 +-
pgp/seahorse-gpgme-generate.c | 4 ++--
pgp/seahorse-gpgme-keyring.c | 4 ++--
pgp/seahorse-gpgme-photos.c | 12 ++++++------
pgp/seahorse-gpgme-revoke.c | 4 ++--
pgp/seahorse-gpgme-sign.c | 4 ++--
pgp/seahorse-hkp-source.c | 4 ++--
pgp/seahorse-keyserver-results.c | 6 +++---
pgp/seahorse-keyserver-sync.c | 6 +++---
pgp/seahorse-keyserver-sync.xml | 2 +-
pgp/seahorse-ldap-source.c | 4 ++--
pgp/seahorse-pgp-actions.c | 4 ++--
pgp/seahorse-pgp-key-properties.c | 12 ++++++------
pgp/seahorse-pgp-public-key-properties.xml | 8 ++++----
pkcs11/pkcs11-properties.vala | 2 +-
pkcs11/pkcs11-request.vala | 4 ++--
pkcs11/seahorse-pkcs11-generate.c | 2 +-
src/seahorse-key-manager.c | 6 +++---
src/seahorse-sidebar.c | 6 +++---
ssh/seahorse-ssh-actions.c | 2 +-
ssh/seahorse-ssh-deleter.c | 4 ++--
ssh/seahorse-ssh-generate.c | 4 ++--
ssh/seahorse-ssh-key-properties.c | 8 ++++----
ssh/seahorse-ssh-upload.c | 4 ++--
37 files changed, 78 insertions(+), 78 deletions(-)
---
diff --git a/common/catalog.vala b/common/catalog.vala
index 01eba7c..044d740 100644
--- a/common/catalog.vala
+++ b/common/catalog.vala
@@ -328,7 +328,7 @@ public abstract class Catalog : Gtk.Window {
try {
Exportable.export_to_prompt_wait(this.get_selected_objects(), this);
} catch (GLib.Error err) {
- Util.show_error(window, _("Couldn't export keys"), err.message);
+ Util.show_error(window, _("Couldn’t export keys"), err.message);
}
}
@@ -339,7 +339,7 @@ public abstract class Catalog : Gtk.Window {
var objects = this.get_selected_objects ();
Exportable.export_to_text_wait (objects, out output);
} catch (GLib.Error err) {
- Util.show_error(this, _("Couldn't export data"), err.message);
+ Util.show_error(this, _("Couldn’t export data"), err.message);
return;
}
@@ -362,7 +362,7 @@ public abstract class Catalog : Gtk.Window {
private static const Gtk.ActionEntry[] UI_ENTRIES = {
/* Top menu items */
{ "file-menu", null, N_("_File") },
- { "file-export", Gtk.Stock.SAVE_AS, N_("E_xport..."), null,
+ { "file-export", Gtk.Stock.SAVE_AS, N_("E_xport…"), null,
N_("Export to a file"), on_key_export_file },
{ "edit-menu", null, N_("_Edit") },
/*Translators: This text refers to deleting an item from its type's backing store*/
diff --git a/data/seahorse.appdata.xml.in b/data/seahorse.appdata.xml.in
index 6ec90f4..68bbbbf 100644
--- a/data/seahorse.appdata.xml.in
+++ b/data/seahorse.appdata.xml.in
@@ -13,7 +13,7 @@
<_p>
With seahorse you can create and manage PGP keys, create and manage SSH keys,
publish and retrieve keys from key servers, cache your passphrase so you
- don't have to keep typing it and backup your keys and keyring.
+ don’t have to keep typing it and backup your keys and keyring.
</_p>
</description>
diff --git a/gkr/gkr-backend.vala b/gkr/gkr-backend.vala
index a3e18b8..0f719fe 100644
--- a/gkr/gkr-backend.vala
+++ b/gkr/gkr-backend.vala
@@ -250,7 +250,7 @@ public class BackendActions : Seahorse.Actions {
private static const Gtk.ActionEntry[] BACKEND_ACTIONS = {
{ "keyring-new", null, N_("New password keyring"), "",
N_("Used to store application and network passwords"), on_new_keyring },
- { "keyring-item-new", null, N_("New password..."), "",
+ { "keyring-item-new", null, N_("New password…"), "",
N_("Safely store a password or secret."), on_new_item },
};
diff --git a/gkr/gkr-item-add.vala b/gkr/gkr-item-add.vala
index 71d5ee1..d57530b 100644
--- a/gkr/gkr-item-add.vala
+++ b/gkr/gkr-item-add.vala
@@ -98,7 +98,7 @@ public class ItemAdd : Gtk.Dialog {
Secret.Item.create.end(res);
} catch (GLib.Error err) {
- Util.show_error(this, _("Couldn't add item"), err.message);
+ Util.show_error(this, _("Couldn’t add item"), err.message);
}
this.destroy();
diff --git a/gkr/gkr-item-properties.vala b/gkr/gkr-item-properties.vala
index 3604cc2..df3dabd 100644
--- a/gkr/gkr-item-properties.vala
+++ b/gkr/gkr-item-properties.vala
@@ -232,7 +232,7 @@ public class ItemProperties : Gtk.Dialog {
password_display();
} catch (GLib.Error err) {
DBusError.strip_remote_error(err);
- Util.show_error (this, _("Couldn't change password."), err.message);
+ Util.show_error (this, _("Couldn’t change password."), err.message);
}
this._password_expander.sensitive = true;
@@ -270,7 +270,7 @@ public class ItemProperties : Gtk.Dialog {
} catch (GLib.Error err) {
description.text = this.item.label;
DBusError.strip_remote_error(err);
- Util.show_error (this, _("Couldn't set description."), err.message);
+ Util.show_error (this, _("Couldn’t set description."), err.message);
}
description.sensitive = true;
diff --git a/gkr/gkr-item.vala b/gkr/gkr-item.vala
index 7eab978..7fb81a9 100644
--- a/gkr/gkr-item.vala
+++ b/gkr/gkr-item.vala
@@ -501,7 +501,7 @@ class ItemDeleter : Deleter {
var num = this._items.length();
if (num == 1) {
var label = ((Secret.Item)_items.data).label;
- return new DeleteDialog(parent, _("Are you sure you want to delete the password
'%s'?"), label);
+ return new DeleteDialog(parent, _("Are you sure you want to delete the password
“%s”?"), label);
} else {
return new DeleteDialog(parent, GLib.ngettext ("Are you sure you want to delete %d
password?",
"Are you sure you want to delete %d
passwords?", num), num);
diff --git a/gkr/gkr-keyring-add.vala b/gkr/gkr-keyring-add.vala
index d5f79d7..a6ac30f 100644
--- a/gkr/gkr-keyring-add.vala
+++ b/gkr/gkr-keyring-add.vala
@@ -52,7 +52,7 @@ public class KeyringAdd : Gtk.Dialog {
try {
Secret.Collection.create.end(res);
} catch (GLib.Error err) {
- Util.show_error(this, _("Couldn't add keyring"), err.message);
+ Util.show_error(this, _("Couldn’t add keyring"), err.message);
}
this.destroy();
diff --git a/gkr/gkr-keyring.vala b/gkr/gkr-keyring.vala
index 3545b54..c14b7b4 100644
--- a/gkr/gkr-keyring.vala
+++ b/gkr/gkr-keyring.vala
@@ -171,7 +171,7 @@ public class Keyring : Secret.Collection, Gcr.Collection, Place, Deletable, Lock
service.set_alias.end(res);
Backend.instance().refresh();
} catch (GLib.Error err) {
- Util.show_error(parent, _("Couldn't set default keyring"), err.message);
+ Util.show_error(parent, _("Couldn’t set default keyring"), err.message);
}
});
}
@@ -195,12 +195,12 @@ public class Keyring : Secret.Collection, Gcr.Collection, Place, Deletable, Lock
try {
service.prompt_at_dbus_path.end(res);
} catch (GLib.Error err) {
- Util.show_error(parent, _("Couldn't change keyring
password"), err.message);
+ Util.show_error(parent, _("Couldn’t change keyring
password"), err.message);
}
Backend.instance().refresh();
});
} catch (GLib.Error err) {
- Util.show_error(parent, _("Couldn't change keyring password"), err.message);
+ Util.show_error(parent, _("Couldn’t change keyring password"), err.message);
}
});
}
@@ -234,7 +234,7 @@ class KeyringDeleter : Deleter {
public override Gtk.Dialog create_confirm(Gtk.Window? parent) {
var dialog = new DeleteDialog(parent,
- _("Are you sure you want to delete the password keyring '%s'?"),
+ _("Are you sure you want to delete the password keyring “%s”?"),
this._keyring.label);
dialog.check_label = _("I understand that all items will be permanently deleted.");
diff --git a/libegg/egg-datetime.c b/libegg/egg-datetime.c
index 1ebdeba..2ce4a64 100644
--- a/libegg/egg-datetime.c
+++ b/libegg/egg-datetime.c
@@ -320,7 +320,7 @@ egg_datetime_class_init (EggDateTimeClass *klass)
g_object_class_install_property (o_class, ARG_DISPLAY_MODE, pspec);
pspec = g_param_spec_boolean ("lazy",
_("Lazy mode"),
- _("Lazy mode doesn't normalize entered date and time values"),
+ _("Lazy mode doesn’t normalize entered date and time values"),
FALSE,
G_PARAM_READWRITE | G_PARAM_CONSTRUCT);
g_object_class_install_property (o_class, ARG_LAZY, pspec);
diff --git a/libseahorse/seahorse-key-manager-store.c b/libseahorse/seahorse-key-manager-store.c
index 3ee552d..34a0837 100644
--- a/libseahorse/seahorse-key-manager-store.c
+++ b/libseahorse/seahorse-key-manager-store.c
@@ -440,7 +440,7 @@ drag_end (GtkWidget *widget, GdkDragContext *context, SeahorseKeyManagerStore *s
if (skstore->priv->drag_error) {
g_dbus_error_strip_remote_error (skstore->priv->drag_error);
- seahorse_util_show_error (widget, _("Couldn't export keys"),
+ seahorse_util_show_error (widget, _("Couldn’t export keys"),
skstore->priv->drag_error->message);
}
diff --git a/libseahorse/seahorse-prefs.c b/libseahorse/seahorse-prefs.c
index 887ec05..cfac081 100644
--- a/libseahorse/seahorse-prefs.c
+++ b/libseahorse/seahorse-prefs.c
@@ -399,7 +399,7 @@ setup_keyservers (SeahorseWidget *swidget)
widget = seahorse_widget_get_widget (swidget, "keyserver-publish");
g_return_if_fail (widget != NULL);
- skc = seahorse_keyserver_control_new ("server-publish-to", _("None: Don't publish keys"));
+ skc = seahorse_keyserver_control_new ("server-publish-to", _("None: Don’t publish keys"));
gtk_container_add (GTK_CONTAINER (widget), GTK_WIDGET (skc));
gtk_widget_show_all (widget);
diff --git a/pgp/seahorse-gpgme-add-subkey.c b/pgp/seahorse-gpgme-add-subkey.c
index 3103255..ac5032e 100644
--- a/pgp/seahorse-gpgme-add-subkey.c
+++ b/pgp/seahorse-gpgme-add-subkey.c
@@ -158,7 +158,7 @@ on_gpgme_add_subkey_ok_clicked (GtkButton *button,
gtk_widget_set_sensitive (widget, TRUE);
if (!GPG_IS_OK (err))
- seahorse_gpgme_handle_error (err, _("Couldn't add subkey"));
+ seahorse_gpgme_handle_error (err, _("Couldn’t add subkey"));
seahorse_widget_destroy (swidget);
}
diff --git a/pgp/seahorse-gpgme-add-uid.c b/pgp/seahorse-gpgme-add-uid.c
index af8f9e2..de3605e 100644
--- a/pgp/seahorse-gpgme-add-uid.c
+++ b/pgp/seahorse-gpgme-add-uid.c
@@ -96,7 +96,7 @@ on_gpgme_add_uid_ok_clicked (GtkButton *button,
err = seahorse_gpgme_key_op_add_uid (SEAHORSE_GPGME_KEY (object),
name, email, comment);
if (!GPG_IS_OK (err))
- seahorse_gpgme_handle_error (err, _("Couldn't add user id"));
+ seahorse_gpgme_handle_error (err, _("Couldn’t add user id"));
else
seahorse_widget_destroy (swidget);
}
diff --git a/pgp/seahorse-gpgme-expires.c b/pgp/seahorse-gpgme-expires.c
index 4d432b1..0b293c4 100644
--- a/pgp/seahorse-gpgme-expires.c
+++ b/pgp/seahorse-gpgme-expires.c
@@ -74,7 +74,7 @@ on_gpgme_expire_ok_clicked (GtkButton *button,
if (expiry != (time_t)seahorse_pgp_subkey_get_expires (SEAHORSE_PGP_SUBKEY (subkey))) {
err = seahorse_gpgme_key_op_set_expires (subkey, expiry);
if (!GPG_IS_OK (err))
- seahorse_gpgme_handle_error (err, _("Couldn't change expiry date"));
+ seahorse_gpgme_handle_error (err, _("Couldn’t change expiry date"));
}
g_object_unref (subkey);
diff --git a/pgp/seahorse-gpgme-generate.c b/pgp/seahorse-gpgme-generate.c
index d28d447..ad87d8b 100644
--- a/pgp/seahorse-gpgme-generate.c
+++ b/pgp/seahorse-gpgme-generate.c
@@ -177,7 +177,7 @@ on_generate_key_complete (GObject *source,
GError *error = NULL;
if (!seahorse_gpgme_key_op_generate_finish (SEAHORSE_GPGME_KEYRING (source), result, &error))
- seahorse_util_handle_error (&error, NULL, _("Couldn't generate PGP key"));
+ seahorse_util_handle_error (&error, NULL, _("Couldn’t generate PGP key"));
}
/**
@@ -224,7 +224,7 @@ seahorse_gpgme_generate_key (SeahorseGpgmeKeyring *keyring,
/* Has line breaks because GtkLabel is completely broken WRT wrapping */
notice = _("When creating a key we need to generate a lot of\n"
- "random data and we need you to help. It's a good\n"
+ "random data and we need you to help. It’s a good\n"
"idea to perform some other action like typing on\n"
"the keyboard, moving the mouse, using applications.\n"
"This gives the system the random data that it needs.");
diff --git a/pgp/seahorse-gpgme-keyring.c b/pgp/seahorse-gpgme-keyring.c
index 1f8e67d..a5421da 100644
--- a/pgp/seahorse-gpgme-keyring.c
+++ b/pgp/seahorse-gpgme-keyring.c
@@ -90,9 +90,9 @@ passphrase_get (gconstpointer dummy, const gchar *passphrase_hint,
if (split_uid && split_uid[0] && split_uid[1]) {
if (flags & SEAHORSE_PASS_NEW)
- label = g_strdup_printf (_("Enter new passphrase for '%s'"), split_uid[1]);
+ label = g_strdup_printf (_("Enter new passphrase for “%s”"), split_uid[1]);
else
- label = g_strdup_printf (_("Enter passphrase for '%s'"), split_uid[1]);
+ label = g_strdup_printf (_("Enter passphrase for “%s”"), split_uid[1]);
} else {
if (flags & SEAHORSE_PASS_NEW)
label = g_strdup (_("Enter new passphrase"));
diff --git a/pgp/seahorse-gpgme-photos.c b/pgp/seahorse-gpgme-photos.c
index 2f2b77a..464af07 100644
--- a/pgp/seahorse-gpgme-photos.c
+++ b/pgp/seahorse-gpgme-photos.c
@@ -69,12 +69,12 @@ suggest_resize (GtkWindow *parent)
dlg = gtk_message_dialog_new_with_markup (parent,
GTK_DIALOG_MODAL | GTK_DIALOG_DESTROY_WITH_PARENT,
GTK_MESSAGE_QUESTION, GTK_BUTTONS_NONE,
- _("<big><b>The photo is too large</b></big>\nThe recommended size for a photo on your key is
%d x %d pixels."),
+ _("<big><b>The photo is too large</b></big>\nThe recommended size for a photo on your key is
%d × %d pixels."),
DEFAULT_WIDTH, DEFAULT_HEIGHT);
gtk_dialog_add_buttons (GTK_DIALOG (dlg),
GTK_STOCK_CANCEL, GTK_RESPONSE_CANCEL,
- _("_Don't Resize"), GTK_RESPONSE_REJECT,
+ _("_Don’t Resize"), GTK_RESPONSE_REJECT,
_("_Resize"), GTK_RESPONSE_ACCEPT,
NULL);
@@ -281,7 +281,7 @@ seahorse_gpgme_photo_add (SeahorseGpgmeKey *pkey,
}
if (!prepare_photo_id (parent, filename, &tempfile, &error)) {
- seahorse_util_handle_error (&error, NULL, _("Couldn't prepare photo"));
+ seahorse_util_handle_error (&error, NULL, _("Couldn’t prepare photo"));
return FALSE;
}
@@ -291,10 +291,10 @@ seahorse_gpgme_photo_add (SeahorseGpgmeKey *pkey,
/* A special error value set by seahorse_key_op_photoid_add to
denote an invalid format file */
if (gerr == GPG_E (GPG_ERR_USER_1))
- seahorse_util_show_error (NULL, _("Couldn't add photo"),
+ seahorse_util_show_error (NULL, _("Couldn’t add photo"),
_("The file could not be loaded. It may be in an invalid
format"));
else
- seahorse_gpgme_handle_error (gerr, _("Couldn't add photo"));
+ seahorse_gpgme_handle_error (gerr, _("Couldn’t add photo"));
res = FALSE;
}
@@ -331,7 +331,7 @@ seahorse_gpgme_photo_delete (SeahorseGpgmePhoto *photo, GtkWindow *parent)
gerr = seahorse_gpgme_key_op_photo_delete (photo);
if (!GPG_IS_OK (gerr)) {
- seahorse_gpgme_handle_error (gerr, _("Couldn't delete photo"));
+ seahorse_gpgme_handle_error (gerr, _("Couldn’t delete photo"));
return FALSE;
}
diff --git a/pgp/seahorse-gpgme-revoke.c b/pgp/seahorse-gpgme-revoke.c
index 19f1211..5a286d1 100644
--- a/pgp/seahorse-gpgme-revoke.c
+++ b/pgp/seahorse-gpgme-revoke.c
@@ -70,7 +70,7 @@ on_gpgme_revoke_ok_clicked (GtkButton *button,
err = seahorse_gpgme_key_op_revoke_subkey (subkey, reason, description);
if (!GPG_IS_OK (err))
- seahorse_gpgme_handle_error (err, _("Couldn't revoke subkey"));
+ seahorse_gpgme_handle_error (err, _("Couldn’t revoke subkey"));
seahorse_widget_destroy (swidget);
}
@@ -173,5 +173,5 @@ seahorse_gpgme_add_revoker_new (SeahorseGpgmeKey *pkey, GtkWindow *parent)
err = seahorse_gpgme_key_op_add_revoker (pkey, revoker);
if (!GPG_IS_OK (err))
- seahorse_gpgme_handle_error (err, _("Couldn't add revoker"));
+ seahorse_gpgme_handle_error (err, _("Couldn’t add revoker"));
}
diff --git a/pgp/seahorse-gpgme-sign.c b/pgp/seahorse-gpgme-sign.c
index 2bd34ea..a24f3bc 100644
--- a/pgp/seahorse-gpgme-sign.c
+++ b/pgp/seahorse-gpgme-sign.c
@@ -96,12 +96,12 @@ sign_ok_clicked (SeahorseWidget *swidget, GtkWindow *parent)
if (!GPG_IS_OK (err)) {
if (gpgme_err_code (err) == GPG_ERR_EALREADY) {
w = gtk_message_dialog_new (parent, GTK_DIALOG_MODAL, GTK_MESSAGE_INFO, GTK_BUTTONS_CLOSE,
- _("This key was already signed by\n\"%s\""),
+ _("This key was already signed by\n“%s”"),
seahorse_object_get_label (SEAHORSE_OBJECT (signer)));
gtk_dialog_run (GTK_DIALOG (w));
gtk_widget_destroy (w);
} else
- seahorse_gpgme_handle_error (err, _("Couldn't sign key"));
+ seahorse_gpgme_handle_error (err, _("Couldn’t sign key"));
}
seahorse_widget_destroy (swidget);
diff --git a/pgp/seahorse-hkp-source.c b/pgp/seahorse-hkp-source.c
index a3ab63c..b0291df 100644
--- a/pgp/seahorse-hkp-source.c
+++ b/pgp/seahorse-hkp-source.c
@@ -563,10 +563,10 @@ hkp_message_propagate_error (SeahorseHKPSource *self,
return FALSE; /* not found is not an error */
} else if (text && strstr (text, "too many")) {
g_set_error (error, HKP_ERROR_DOMAIN, 0,
- _("Search was not specific enough. Server '%s' found too many keys."), server);
+ _("Search was not specific enough. Server “%s” found too many keys."), server);
} else {
g_set_error (error, HKP_ERROR_DOMAIN, message->status_code,
- _("Couldn't communicate with server '%s': %s"),
+ _("Couldn’t communicate with server “%s”: %s"),
server, message->reason_phrase);
}
diff --git a/pgp/seahorse-keyserver-results.c b/pgp/seahorse-keyserver-results.c
index 84715e0..92de1e9 100644
--- a/pgp/seahorse-keyserver-results.c
+++ b/pgp/seahorse-keyserver-results.c
@@ -165,7 +165,7 @@ on_import_complete (GObject *source,
if (!seahorse_pgp_backend_transfer_finish (SEAHORSE_PGP_BACKEND (source),
result, &error))
seahorse_util_handle_error (&error, seahorse_catalog_get_window (self),
- _("Couldn't import keys"));
+ _("Couldn’t import keys"));
g_object_unref (self);
}
@@ -240,7 +240,7 @@ static const GtkActionEntry GENERAL_ENTRIES[] = {
};
static const GtkActionEntry SERVER_ENTRIES[] = {
- { "remote-find", GTK_STOCK_FIND, N_("_Find Remote Keys..."), "",
+ { "remote-find", GTK_STOCK_FIND, N_("_Find Remote Keys…"), "",
N_("Search for keys on a key server"), G_CALLBACK (on_remote_find) }
};
@@ -279,7 +279,7 @@ seahorse_keyserver_results_constructed (GObject *obj)
if (g_utf8_strlen (self->pv->search_string, -1) == 0) {
title = g_strdup (_("Remote Keys"));
} else {
- title = g_strdup_printf (_ ("Remote Keys Containing '%s'"), self->pv->search_string);
+ title = g_strdup_printf (_ ("Remote Keys Containing “%s”"), self->pv->search_string);
}
window = seahorse_catalog_get_window (SEAHORSE_CATALOG (self));
diff --git a/pgp/seahorse-keyserver-sync.c b/pgp/seahorse-keyserver-sync.c
index 6bf0cbb..b34949a 100644
--- a/pgp/seahorse-keyserver-sync.c
+++ b/pgp/seahorse-keyserver-sync.c
@@ -53,7 +53,7 @@ on_transfer_upload_complete (GObject *object,
publish_to = g_settings_get_string (seahorse_application_settings (NULL),
"server-publish-to");
seahorse_util_handle_error (&error, NULL,
- _("Couldn't publish keys to server"), publish_to);
+ _("Couldn’t publish keys to server"), publish_to);
g_free (publish_to);
}
@@ -72,7 +72,7 @@ on_transfer_download_complete (GObject *object,
if (!seahorse_transfer_finish (result, &error)) {
g_object_get (place, "key-server", &keyserver, NULL);
seahorse_util_handle_error (&error, NULL,
- _("Couldn't retrieve keys from server: %s"), keyserver);
+ _("Couldn’t retrieve keys from server: %s"), keyserver);
g_free (keyserver);
}
@@ -236,6 +236,6 @@ seahorse_keyserver_sync (GList *keys)
g_free (keyserver);
- seahorse_progress_show (cancellable, _("Synchronizing keys..."), FALSE);
+ seahorse_progress_show (cancellable, _("Synchronizing keys…"), FALSE);
g_object_unref (cancellable);
}
diff --git a/pgp/seahorse-keyserver-sync.xml b/pgp/seahorse-keyserver-sync.xml
index a3a6c64..70aa2c9 100644
--- a/pgp/seahorse-keyserver-sync.xml
+++ b/pgp/seahorse-keyserver-sync.xml
@@ -49,7 +49,7 @@
<property name="visible">True</property>
<property name="xalign">0</property>
<property name="yalign">0</property>
- <property name="label" translatable="yes">This will publish the keys in your key
ring so they're available for others to use. You'll also get any changes others have made since you received
their keys.</property>
+ <property name="label" translatable="yes">This will publish the keys in your key
ring so they’re available for others to use. You’ll also get any changes others have made since you received
their keys.</property>
<property name="wrap">True</property>
</object>
<packing>
diff --git a/pgp/seahorse-ldap-source.c b/pgp/seahorse-ldap-source.c
index a511f1f..d2332d9 100644
--- a/pgp/seahorse-ldap-source.c
+++ b/pgp/seahorse-ldap-source.c
@@ -433,7 +433,7 @@ seahorse_ldap_source_propagate_error (SeahorseLDAPSource *self,
return FALSE;
g_object_get (self, "key-server", &server, NULL);
- g_set_error (error, LDAP_ERROR_DOMAIN, rc, _("Couldn't communicate with '%s': %s"),
+ g_set_error (error, LDAP_ERROR_DOMAIN, rc, _("Couldn't communicate with %s: %s"),
server, ldap_err2string (rc));
g_free (server);
@@ -649,7 +649,7 @@ on_address_resolved_complete (SoupAddress *address,
/* DNS failed */
if (!SOUP_STATUS_IS_SUCCESSFUL (status)) {
g_simple_async_result_set_error (res, SEAHORSE_ERROR, -1,
- _("Couldn't resolve address: %s"),
+ _("Couldn’t resolve address: %s"),
soup_address_get_name (address));
g_simple_async_result_complete_in_idle (res);
diff --git a/pgp/seahorse-pgp-actions.c b/pgp/seahorse-pgp-actions.c
index 7c134d7..ef4173c 100644
--- a/pgp/seahorse-pgp-actions.c
+++ b/pgp/seahorse-pgp-actions.c
@@ -110,12 +110,12 @@ on_remote_sync (GtkAction* action,
}
static const GtkActionEntry FIND_ACTIONS[] = {
- { "remote-find", GTK_STOCK_FIND, N_("_Find Remote Keys..."), "",
+ { "remote-find", GTK_STOCK_FIND, N_("_Find Remote Keys…"), "",
N_("Search for keys on a key server"), G_CALLBACK (on_remote_find) },
};
static const GtkActionEntry SYNC_ACTIONS[] = {
- { "remote-sync", GTK_STOCK_REFRESH, N_("_Sync and Publish Keys..."), "",
+ { "remote-sync", GTK_STOCK_REFRESH, N_("_Sync and Publish Keys…"), "",
N_("Publish and/or synchronize your keys with those online."), G_CALLBACK (on_remote_sync) }
};
diff --git a/pgp/seahorse-pgp-key-properties.c b/pgp/seahorse-pgp-key-properties.c
index 8cc1b9f..49eaa74 100644
--- a/pgp/seahorse-pgp-key-properties.c
+++ b/pgp/seahorse-pgp-key-properties.c
@@ -314,7 +314,7 @@ on_pgp_names_primary_clicked (GtkWidget *widget,
g_return_if_fail (SEAHORSE_IS_GPGME_UID (uid));
err = seahorse_gpgme_key_op_primary_uid (SEAHORSE_GPGME_UID (uid));
if (!GPG_IS_OK (err))
- seahorse_gpgme_handle_error (err, _("Couldn't change primary user ID"));
+ seahorse_gpgme_handle_error (err, _("Couldn’t change primary user ID"));
}
}
@@ -333,7 +333,7 @@ on_pgp_names_delete_clicked (GtkWidget *widget,
return;
g_return_if_fail (SEAHORSE_IS_GPGME_UID (uid));
- message = g_strdup_printf (_("Are you sure you want to permanently delete the '%s' user ID?"),
+ message = g_strdup_printf (_("Are you sure you want to permanently delete the “%s” user ID?"),
seahorse_object_get_label (SEAHORSE_OBJECT (uid)));
ret = seahorse_delete_dialog_prompt (GTK_WINDOW (seahorse_widget_get_toplevel (swidget)), message);
g_free (message);
@@ -343,7 +343,7 @@ on_pgp_names_delete_clicked (GtkWidget *widget,
gerr = seahorse_gpgme_key_op_del_uid (SEAHORSE_GPGME_UID (uid));
if (!GPG_IS_OK (gerr))
- seahorse_gpgme_handle_error (gerr, _("Couldn't delete user ID"));
+ seahorse_gpgme_handle_error (gerr, _("Couldn’t delete user ID"));
}
G_MODULE_EXPORT void
@@ -667,7 +667,7 @@ on_pgp_owner_photo_primary_button (GtkWidget *widget,
gerr = seahorse_gpgme_key_op_photo_primary (photo);
if (!GPG_IS_OK (gerr))
- seahorse_gpgme_handle_error (gerr, _("Couldn't change primary photo"));
+ seahorse_gpgme_handle_error (gerr, _("Couldn’t change primary photo"));
}
static void
@@ -1091,7 +1091,7 @@ on_pgp_details_del_subkey_button (GtkButton *button,
err = seahorse_gpgme_key_op_del_subkey (SEAHORSE_GPGME_SUBKEY (subkey));
if (!GPG_IS_OK (err))
- seahorse_gpgme_handle_error (err, _("Couldn't delete subkey"));
+ seahorse_gpgme_handle_error (err, _("Couldn’t delete subkey"));
}
G_MODULE_EXPORT void
@@ -1145,7 +1145,7 @@ on_export_complete (GObject *source,
seahorse_exporter_export_to_file_finish (SEAHORSE_EXPORTER (source), result, &error);
if (error != NULL)
- seahorse_util_handle_error (&error, parent, _("Couldn't export key"));
+ seahorse_util_handle_error (&error, parent, _("Couldn’t export key"));
g_object_unref (parent);
}
diff --git a/pgp/seahorse-pgp-public-key-properties.xml b/pgp/seahorse-pgp-public-key-properties.xml
index ea95375..a990df8 100644
--- a/pgp/seahorse-pgp-public-key-properties.xml
+++ b/pgp/seahorse-pgp-public-key-properties.xml
@@ -454,7 +454,7 @@
<property name="visible">True</property>
<property name="can_focus">False</property>
<property name="xalign">0</property>
- <property name="label" translatable="yes">Encrypt files and email to the
key's owner</property>
+ <property name="label" translatable="yes">Encrypt files and email to the
key’s owner</property>
</object>
<packing>
<property name="left_attach">1</property>
@@ -793,7 +793,7 @@
<property name="spacing">6</property>
<child>
<object class="GtkCheckButton" id="trust-marginal-check">
- <property name="label" translatable="yes">I trust signatures from
'%s' on other keys</property>
+ <property name="label" translatable="yes">I trust signatures from
“%s” on other keys</property>
<property name="visible">True</property>
<property name="can_focus">True</property>
<property name="receives_default">False</property>
@@ -825,7 +825,7 @@
<property name="visible">True</property>
<property name="can_focus">False</property>
<property name="xalign">0</property>
- <property name="label" translatable="yes">If you believe that the
person that owns this key is '%s', <i>sign</i> this key:</property>
+ <property name="label" translatable="yes">If you believe that the
person that owns this key is “%s”, <i>sign</i> this key:</property>
<property name="use_markup">True</property>
<property name="wrap">True</property>
</object>
@@ -916,7 +916,7 @@
<property name="visible">True</property>
<property name="can_focus">False</property>
<property name="xalign">0</property>
- <property name="label" translatable="yes">If you no longer trust
that '%s' owns this key, <i>revoke</i> your signature:</property>
+ <property name="label" translatable="yes">If you no longer trust
that “%s” owns this key, <i>revoke</i> your signature:</property>
<property name="use_markup">True</property>
<property name="wrap">True</property>
</object>
diff --git a/pkcs11/pkcs11-properties.vala b/pkcs11/pkcs11-properties.vala
index c91b75a..57c0b09 100644
--- a/pkcs11/pkcs11-properties.vala
+++ b/pkcs11/pkcs11-properties.vala
@@ -185,7 +185,7 @@ public class Properties : Gtk.Window {
if (deleter.delete.end(res))
this.destroy();
} catch (GLib.Error err) {
- Util.show_error(this, _("Couldn't delete"), err.message);
+ Util.show_error(this, _("Couldn’t delete"), err.message);
}
});
}
diff --git a/pkcs11/pkcs11-request.vala b/pkcs11/pkcs11-request.vala
index f5960cf..74d4ea8 100644
--- a/pkcs11/pkcs11-request.vala
+++ b/pkcs11/pkcs11-request.vala
@@ -84,7 +84,7 @@ public class Request : Gtk.Dialog {
req.complete_async.end(res);
this.save_certificate_request(req, this.transient_for);
} catch (GLib.Error err) {
- Util.show_error(this.transient_for, _("Couldn't create certificate
request"), err.message);
+ Util.show_error(this.transient_for, _("Couldn’t create certificate
request"), err.message);
}
});
@@ -146,7 +146,7 @@ public class Request : Gtk.Dialog {
string new_etag;
file.replace_contents_async.end(res, out new_etag);
} catch (GLib.Error err) {
- Util.show_error(parent, _("Couldn't save certificate request"),
err.message);
+ Util.show_error(parent, _("Couldn’t save certificate request"),
err.message);
}
});
}
diff --git a/pkcs11/seahorse-pkcs11-generate.c b/pkcs11/seahorse-pkcs11-generate.c
index 86dbcc5..2c38f3e 100644
--- a/pkcs11/seahorse-pkcs11-generate.c
+++ b/pkcs11/seahorse-pkcs11-generate.c
@@ -110,7 +110,7 @@ complete_generate (SeahorsePkcs11Generate *self,
g_assert (error != NULL);
if (*error != NULL)
- seahorse_util_handle_error (error, NULL, _("Couldn't generate private key"));
+ seahorse_util_handle_error (error, NULL, _("Couldn’t generate private key"));
else
seahorse_place_load (SEAHORSE_PLACE (self->token), self->cancellable, NULL, NULL);
diff --git a/src/seahorse-key-manager.c b/src/seahorse-key-manager.c
index c9856ce..b46151b 100644
--- a/src/seahorse-key-manager.c
+++ b/src/seahorse-key-manager.c
@@ -502,11 +502,11 @@ static const GtkActionEntry GENERAL_ACTIONS[] = {
{ "new-menu", NULL, N_("_New") },
{ "app-quit", GTK_STOCK_QUIT, NULL, "<control>Q",
N_("Close this program"), G_CALLBACK (on_app_quit) },
- { "file-new", GTK_STOCK_NEW, N_("_New..."), "<control>N",
+ { "file-new", GTK_STOCK_NEW, N_("_New…"), "<control>N",
N_("Create a new key or item"), G_CALLBACK (on_file_new) },
- { "new-object", GTK_STOCK_ADD, N_("_New..."), NULL,
+ { "new-object", GTK_STOCK_ADD, N_("_New…"), NULL,
N_("Add a new key or item"), G_CALLBACK (on_file_new) },
- { "file-import", GTK_STOCK_OPEN, N_("_Import..."), "<control>I",
+ { "file-import", GTK_STOCK_OPEN, N_("_Import…"), "<control>I",
N_("Import from a file"), G_CALLBACK (on_key_import_file) },
{ "edit-import-clipboard", GTK_STOCK_PASTE, NULL, "<control>V",
N_("Import from the clipboard"), G_CALLBACK (on_key_import_clipboard) }
diff --git a/src/seahorse-sidebar.c b/src/seahorse-sidebar.c
index d2cdd44..0f18817 100644
--- a/src/seahorse-sidebar.c
+++ b/src/seahorse-sidebar.c
@@ -794,7 +794,7 @@ on_place_locked (GObject *source,
GError *error = NULL;
if (!seahorse_lockable_lock_finish (SEAHORSE_LOCKABLE (source), result, &error))
- seahorse_util_handle_error (&error, parent, _("Couldn't lock"));
+ seahorse_util_handle_error (&error, parent, _("Couldn’t lock"));
g_object_unref (parent);
}
@@ -831,7 +831,7 @@ on_place_unlocked (GObject *source,
GError *error = NULL;
if (!seahorse_lockable_unlock_finish (SEAHORSE_LOCKABLE (source), result, &error))
- seahorse_util_handle_error (&error, parent, _("Couldn't unlock"));
+ seahorse_util_handle_error (&error, parent, _("Couldn’t unlock"));
g_object_unref (parent);
}
@@ -870,7 +870,7 @@ on_place_deleted (GObject *source,
GError *error = NULL;
if (!seahorse_deleter_delete_finish (SEAHORSE_DELETER (source), result, &error))
- seahorse_util_handle_error (&error, parent, _("Couldn't delete"));
+ seahorse_util_handle_error (&error, parent, _("Couldn’t delete"));
g_object_unref (parent);
}
diff --git a/ssh/seahorse-ssh-actions.c b/ssh/seahorse-ssh-actions.c
index 2b13b78..f78102f 100644
--- a/ssh/seahorse-ssh-actions.c
+++ b/ssh/seahorse-ssh-actions.c
@@ -94,7 +94,7 @@ on_ssh_upload (GtkAction* action,
}
static const GtkActionEntry KEYS_ACTIONS[] = {
- { "remote-ssh-upload", NULL, N_ ("Configure Key for _Secure Shell..."), "",
+ { "remote-ssh-upload", NULL, N_ ("Configure Key for _Secure Shell…"), "",
N_ ("Send public Secure Shell key to another machine, and enable logins using that key."),
G_CALLBACK (on_ssh_upload) },
};
diff --git a/ssh/seahorse-ssh-deleter.c b/ssh/seahorse-ssh-deleter.c
index b32d340..675bf57 100644
--- a/ssh/seahorse-ssh-deleter.c
+++ b/ssh/seahorse-ssh-deleter.c
@@ -77,12 +77,12 @@ seahorse_ssh_deleter_create_confirm (SeahorseDeleter *deleter,
num = g_list_length (self->keys);
if (self->have_private) {
g_return_val_if_fail (num == 1, NULL);
- prompt = g_strdup_printf (_("Are you sure you want to delete the secure shell key '%s'?"),
+ prompt = g_strdup_printf (_("Are you sure you want to delete the secure shell key “%s”?"),
seahorse_object_get_label (SEAHORSE_OBJECT (self->keys->data)));
confirm = _("I understand that this secret key will be permanently deleted.");
} else if (num == 1) {
- prompt = g_strdup_printf (_("Are you sure you want to delete the secure shell key '%s'?"),
+ prompt = g_strdup_printf (_("Are you sure you want to delete the secure shell key “%s”?"),
seahorse_object_get_label (SEAHORSE_OBJECT (self->keys->data)));
confirm = NULL;
diff --git a/ssh/seahorse-ssh-generate.c b/ssh/seahorse-ssh-generate.c
index 3ba0259..1947769 100644
--- a/ssh/seahorse-ssh-generate.c
+++ b/ssh/seahorse-ssh-generate.c
@@ -104,7 +104,7 @@ on_generate_complete (GObject *source,
result, &error);
if (error != NULL)
- seahorse_util_handle_error (&error, NULL, _("Couldn't generate Secure Shell key"));
+ seahorse_util_handle_error (&error, NULL, _("Couldn’t generate Secure Shell key"));
}
static void
@@ -120,7 +120,7 @@ on_generate_complete_and_upload (GObject *source,
result, &error);
if (error != NULL) {
- seahorse_util_handle_error (&error, NULL, _("Couldn't generate Secure Shell key"));
+ seahorse_util_handle_error (&error, NULL, _("Couldn’t generate Secure Shell key"));
} else {
keys = g_list_append (NULL, object);
diff --git a/ssh/seahorse-ssh-key-properties.c b/ssh/seahorse-ssh-key-properties.c
index 2f3f44f..88c3ef0 100644
--- a/ssh/seahorse-ssh-key-properties.c
+++ b/ssh/seahorse-ssh-key-properties.c
@@ -76,7 +76,7 @@ on_rename_complete (GObject *source,
GError *error = NULL;
if (!seahorse_ssh_op_rename_finish (SEAHORSE_SSH_SOURCE (source), result, &error)) {
- seahorse_util_handle_error (&error, closure->swidget, _("Couldn't rename key."));
+ seahorse_util_handle_error (&error, closure->swidget, _("Couldn’t rename key."));
gtk_entry_set_text (closure->entry, closure->original);
}
@@ -131,7 +131,7 @@ on_authorize_complete (GObject *source,
if (!seahorse_ssh_op_authorize_finish (SEAHORSE_SSH_SOURCE (source), result, &error)) {
seahorse_util_handle_error (&error, GTK_WIDGET (button),
- _("Couldn't change authorization for key."));
+ _("Couldn’t change authorization for key."));
}
gtk_widget_set_sensitive (GTK_WIDGET (button), TRUE);
@@ -168,7 +168,7 @@ on_passphrase_complete (GObject *source,
if (!seahorse_ssh_op_change_passphrase_finish (SEAHORSE_SSH_KEY (source),
result, &error)) {
- seahorse_util_handle_error (&error, button, _("Couldn't change passphrase for key."));
+ seahorse_util_handle_error (&error, button, _("Couldn’t change passphrase for key."));
}
gtk_widget_set_sensitive (button, TRUE);
@@ -202,7 +202,7 @@ on_export_complete (GObject *source,
GError *error = NULL;
if (!seahorse_exporter_export_to_file_finish (SEAHORSE_EXPORTER (source), result, &error))
- seahorse_util_handle_error (&error, parent, _("Couldn't export key"));
+ seahorse_util_handle_error (&error, parent, _("Couldn’t export key"));
g_object_unref (parent);
}
diff --git a/ssh/seahorse-ssh-upload.c b/ssh/seahorse-ssh-upload.c
index e16abd7..b3d26f2 100644
--- a/ssh/seahorse-ssh-upload.c
+++ b/ssh/seahorse-ssh-upload.c
@@ -45,7 +45,7 @@ on_upload_complete (GObject *source,
GError *error = NULL;
if (!seahorse_ssh_op_upload_finish (SEAHORSE_SSH_SOURCE (source), result, &error))
- seahorse_util_handle_error (&error, NULL, _("Couldn't configure Secure Shell keys on remote
computer."));
+ seahorse_util_handle_error (&error, NULL, _("Couldn’t configure Secure Shell keys on remote
computer."));
}
G_MODULE_EXPORT void
@@ -128,7 +128,7 @@ upload_keys (SeahorseWidget *swidget)
g_free (host);
g_free (user);
- seahorse_progress_show (cancellable, _("Configuring Secure Shell Keys..."), FALSE);
+ seahorse_progress_show (cancellable, _("Configuring Secure Shell Keys…"), FALSE);
g_object_unref (cancellable);
}
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]