*
  *
  * IDENTIFICATION
- *   $PostgreSQL: pgsql/src/backend/libpq/hba.c,v 1.206 2010/04/21 03:32:53 tgl Exp $
+ *   $PostgreSQL: pgsql/src/backend/libpq/hba.c,v 1.207 2010/05/26 16:43:13 tgl Exp $
  *
  *-------------------------------------------------------------------------
  */
            ereport(LOG,
                    (errcode(ERRCODE_CONFIG_FILE_ERROR),
                     errmsg("hostssl not supported on this platform"),
-                errhint("compile with --enable-ssl to use SSL connections"),
+                errhint("Compile with --enable-ssl to use SSL connections."),
                     errcontext("line %d of configuration file \"%s\"",
                                line_num, HbaFileName)));
            return false;
                {
                    ereport(LOG,
                            (errcode(ERRCODE_CONFIG_FILE_ERROR),
-                            errmsg("IP address and mask do not match in file \"%s\" line %d",
-                                   HbaFileName, line_num)));
+                            errmsg("IP address and mask do not match"),
+                            errcontext("line %d of configuration file \"%s\"",
+                                       line_num, HbaFileName)));
                    return false;
                }
            }
        {
            ereport(LOG,
                    (errcode(ERRCODE_CONFIG_FILE_ERROR),
-                    errmsg("MD5 authentication is not supported when \"db_user_namespace\" is enabled")));
+                    errmsg("MD5 authentication is not supported when \"db_user_namespace\" is enabled"),
+                    errcontext("line %d of configuration file \"%s\"",
+                               line_num, HbaFileName)));
            return false;
        }
        parsedline->auth_method = uaMD5;
                        ereport(LOG,
                                (errcode(ERRCODE_CONFIG_FILE_ERROR),
                                 errmsg("client certificates can only be checked if a root certificate store is available"),
-                                errdetail("make sure the root certificate store is present and readable"),
+                                errhint("Make sure the root.crt file is present and readable."),
                           errcontext("line %d of configuration file \"%s\"",
                                      line_num, HbaFileName)));
                        return false;
            {
                ereport(LOG,
                        (errcode(ERRCODE_CONFIG_FILE_ERROR),
-                errmsg("unknown authentication option name: \"%s\"", token),
+                        errmsg("unrecognized authentication option name: \"%s\"",
+                               token),
                         errcontext("line %d of configuration file \"%s\"",
                                    line_num, HbaFileName)));
                return false;
            pg_regerror(r, &re, errstr, sizeof(errstr));
            ereport(LOG,
                    (errcode(ERRCODE_INVALID_REGULAR_EXPRESSION),
-                    errmsg("invalid regular expression \"%s\": %s", file_ident_user + 1, errstr)));
+                    errmsg("invalid regular expression \"%s\": %s",
+                           file_ident_user + 1, errstr)));
 
            pfree(wstr);
            *error_p = true;
                pg_regerror(r, &re, errstr, sizeof(errstr));
                ereport(LOG,
                        (errcode(ERRCODE_INVALID_REGULAR_EXPRESSION),
-                        errmsg("regular expression match for \"%s\" failed: %s", file_ident_user + 1, errstr)));
+                        errmsg("regular expression match for \"%s\" failed: %s",
+                               file_ident_user + 1, errstr)));
                *error_p = true;
            }
 
    if (!found_entry && !error)
    {
        ereport(LOG,
-       (errmsg("no match in usermap for user \"%s\" authenticated as \"%s\"",
-               pg_role, auth_user),
-        errcontext("usermap \"%s\"", usermap_name)));
+               (errmsg("no match in usermap \"%s\" for user \"%s\" authenticated as \"%s\"",
+                       usermap_name, pg_role, auth_user)));
    }
    return found_entry ? STATUS_OK : STATUS_ERROR;
 }
        /* not fatal ... we just won't do any special ident maps */
        ereport(LOG,
                (errcode_for_file_access(),
-                errmsg("could not open Ident usermap file \"%s\": %m",
+                errmsg("could not open usermap file \"%s\": %m",
                        IdentFileName)));
    }
    else