From 2d7e83317322eed425efc82e4a6fcdc82f3ba3e5 Mon Sep 17 00:00:00 2001 From: Miek Gieben Date: Sat, 21 Jan 2012 20:32:17 +0100 Subject: [PATCH] better wording --- examples/q/q.go | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/examples/q/q.go b/examples/q/q.go index e289eb22..1fd5cda6 100644 --- a/examples/q/q.go +++ b/examples/q/q.go @@ -168,9 +168,9 @@ func sectionCheck(set []dns.RR, server string) { fmt.Printf(";? DNSKEY %s/%d not found\n", rr.(*dns.RR_RRSIG).SignerName, rr.(*dns.RR_RRSIG).KeyTag) } if err := rr.(*dns.RR_RRSIG).Verify(key, rrset); err != nil { - fmt.Printf(";- Bogus signature, %s does not RRSet with DNSKEY %s/%d\n", shortSig(rr.(*dns.RR_RRSIG)), key.Header().Name, key.KeyTag()) + fmt.Printf(";- Bogus signature, %s does not validate with DNSKEY %s/%d\n", shortSig(rr.(*dns.RR_RRSIG)), key.Header().Name, key.KeyTag()) } else { - fmt.Printf(";+ Secure signature, %s validates RRSet with DNSKEY %s/%d\n", shortSig(rr.(*dns.RR_RRSIG)), key.Header().Name, key.KeyTag()) + fmt.Printf(";+ Secure signature, %s validates with DNSKEY %s/%d\n", shortSig(rr.(*dns.RR_RRSIG)), key.Header().Name, key.KeyTag()) } } } @@ -196,9 +196,9 @@ func nsecCheck(in *dns.Msg) { return Check: if err := in.Nsec3Verify(in.Question[0]); err == nil { - fmt.Printf(";+ Correct authenticated denial of existence (NSEC3)\n") + fmt.Printf(";+ Correct denial of existence (NSEC3)\n") } else { - fmt.Printf(";- Incorrect authenticated denial of existence (NSEC3): %s\n",err.Error()) + fmt.Printf(";- Incorrect denial of existence (NSEC3): %s\n",err.Error()) } }