123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679 |
- This file contains strings from the OpenConnect VPN client, found at
- http://www.infradead.org/openconnect/ and browseable in gitweb at
- http://git.infradead.org/users/dwmw2/openconnect.git
- We do this because NetworkManager-openconnect authentication dialog
- uses a lot of strings from libopenconnect, which also need to be
- translated too if the user is to have a fully localised experience.
- For translators looking to see source comments in their original context
- in order to translate them properly, the URLs by each one will give a
- link to the original source code.
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l128
- _("Ignoring unknown form submit item '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l141
- _("Ignoring unknown form input type '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l151
- _("Discarding duplicate option '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l224
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l406
- _("Cannot handle form method='%s', action='%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l285
- _("Failed to parse HTML document\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l351
- _("TNCC support not implemented yet on Windows\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l373
- _("No DSPREAUTH cookie; not attempting TNCC\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l384
- _("Failed to allocate memory for communication with TNCC\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l419
- _("Failed to exec TNCC script %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l428
- _("Failed to send start command to TNCC\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l435
- _("Sent start; waiting for response from TNCC\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l440
- _("Failed to read response from TNCC\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l451
- _("Received invalid response from TNCC\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l453
- _(""
- "TNCC response: -->\n"
- "%s\n"
- "<--\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l461
- _("Received unsuccessful %s response from TNCC\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l474
- _("Got new DSPREAUTH cookie from TNCC: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l513
- _("Failed to find or parse web form in login page\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l521
- _("Encountered form with no ID\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l546
- _("Unknown form ID '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l549
- _("Dumping unknown HTML form:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth-juniper.c#l563
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l659
- _("Failed to generate OTP tokencode; disabling token\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l94
- _("Form choice has no name\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l179
- _("name %s not input\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l186
- _("No input type in form\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l198
- _("No input name in form\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l228
- _("Unknown input type %s in form\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l532
- _("Empty response from server\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l543
- _("Failed to parse server response\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l545
- _("Response was:%s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l567
- _("Received <client-cert-request> when not expected.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l595
- _("XML response has no \"auth\" node\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l628
- _("Asked for password but '--no-passwd' set\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l908
- _("Not downloading XML profile because SHA1 already matches\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l914
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l274
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l877
- _("Failed to open HTTPS connection to %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l931
- _("Failed to send GET request for new config\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l955
- _("Downloaded config file did not match intended SHA1\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l960
- _("Downloaded new XML profile\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l971
- _(""
- "Error: Running the 'Cisco Secure Desktop' trojan on Windows is not yet "
- "implemented.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l979
- _(""
- "Error: Server asked us to run CSD hostscan.\n"
- "You need to provide a suitable --csd-wrapper argument.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l986
- _(""
- "Error: Server asked us to download and run a 'Cisco Secure Desktop' trojan.\n"
- "This facility is disabled by default for security reasons, so you may wish "
- "to enable it.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l993
- _("Trying to run Linux CSD trojan script.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1020
- _("Temporary directory '%s' is not writable: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1028
- _("Failed to open temporary CSD script file: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1037
- _("Failed to write temporary CSD script file: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1055
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1487
- _("Failed to set uid %ld\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1060
- _("Invalid user uid=%ld\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1066
- _("Failed to change to CSD home directory '%s': %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1072
- _(""
- "Warning: you are running insecure CSD code with root privileges\n"
- "\t Use command line option \"--csd-user\"\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1117
- _("Failed to exec CSD script %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1148
- _("Unknown response from server\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1278
- _("Server requested SSL client certificate after one was provided\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1282
- _("Server requested SSL client certificate; none was configured\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1298
- _("XML POST enabled\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/auth.c#l1341
- _("Refreshing %s after 1 second...\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/compat.c#l207
- _("(error 0x%x)");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/compat.c#l210
- _("(Error while describing error!)");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/compat.c#l233
- _("ERROR: Cannot initialize sockets\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l100
- _("TCP_INFO rcv mss %d, snd mss %d, adv mss %d, pmtu %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l119
- _("TCP_MAXSEG %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l238
- _(""
- "CRITICAL ERROR: DTLS master secret is uninitialised. Please report this.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l251
- _("Error creating HTTPS CONNECT request\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l267
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l361
- _("Error fetching HTTPS response\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l294
- _("VPN service unavailable; reason: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l299
- _("Got inappropriate HTTP CONNECT response: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l306
- _("Got CONNECT response: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l334
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l342
- _("No memory for options\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l351
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l421
- _("<elided>");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l368
- _("X-DTLS-Session-ID not 64 characters; is: \"%s\"\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l391
- _("Unknown DTLS-Content-Encoding %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l427
- _("Unknown CSTP-Content-Encoding %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l500
- _("No MTU received. Aborting\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l507
- _("No IP address received. Aborting\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l513
- _("IPv6 configuration received but MTU %d is too small.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l519
- _("Reconnect gave different Legacy IP address (%s != %s)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l527
- _("Reconnect gave different Legacy IP netmask (%s != %s)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l535
- _("Reconnect gave different IPv6 address (%s != %s)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l543
- _("Reconnect gave different IPv6 netmask (%s != %s)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l563
- _("CSTP connected. DPD %d, Keepalive %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l565
- _("CSTP Ciphersuite: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l627
- _("Compression setup failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l644
- _("Allocation of deflate buffer failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l702
- _("inflate failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l725
- _("LZS decompression failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l738
- _("LZ4 decompression failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l745
- _("Unknown compression type %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l750
- _("Received %s compressed data packet of %d bytes (was %d)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l770
- _("deflate failed %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l840
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l770
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l255
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/mainloop.c#l56
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l925
- _("Allocation failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l851
- _("Short packet received (%d bytes)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l864
- _("Unexpected packet length. SSL_read returned %d but packet is\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l878
- _("Got CSTP DPD request\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l884
- _("Got CSTP DPD response\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l889
- _("Got CSTP Keepalive\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l894
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1014
- _("Received uncompressed data packet of %d bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l911
- _("Received server disconnect: %02x '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l914
- _("Received server disconnect\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l922
- _("Compressed packet received in !deflate mode\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l931
- _("received server terminate packet\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l938
- _("Unknown packet %02x %02x %02x %02x %02x %02x %02x %02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l981
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1131
- _("SSL wrote too few bytes! Asked for %d, sent %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l1009
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1169
- _("CSTP rekey due\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l1016
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1176
- _("Rehandshake failed; attempting new-tunnel\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l1027
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1187
- _("CSTP Dead Peer Detection detected dead peer!\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l1031
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1101
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1191
- _("Reconnect failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l1047
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1207
- _("Send CSTP DPD\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l1059
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1218
- _("Send CSTP Keepalive\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l1084
- _("Sending compressed data packet of %d bytes (was %d)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l1095
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1243
- _("Sending uncompressed data packet of %d bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/cstp.c#l1134
- _("Send BYE packet: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/digest.c#l254
- _("Attempting Digest authentication to proxy\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/digest.c#l257
- _("Attempting Digest authentication to server '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l180
- _("Failed to create SSL_SESSION ASN.1 for OpenSSL: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l191
- _("OpenSSL failed to parse SSL_SESSION ASN.1\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l205
- _("Initialise DTLSv1 session failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l256
- _("Initialise DTLSv1 CTX failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l268
- _("Set DTLS cipher list failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l281
- _("Not precisely one DTLS cipher\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l303
- _(""
- "SSL_set_session() failed with old protocol version 0x%x\n"
- "Are you using a version of OpenSSL older than 0.9.8m?\n"
- "See http://rt.openssl.org/Ticket/Display.html?id=1751\n"
- "Use the --no-dtls command line option to avoid this message\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l338
- _("Established DTLS connection (using OpenSSL). Ciphersuite %s.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l364
- _("Your OpenSSL is older than the one you built against, so DTLS may fail!");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l413
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l417
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l569
- _("DTLS handshake timed out\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l414
- _(""
- "This is probably because your OpenSSL is broken\n"
- "See http://rt.openssl.org/Ticket/Display.html?id=2984\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l421
- _("DTLS handshake failed: %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l476
- _("Unknown DTLS parameters for requested CipherSuite '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l489
- _("Failed to set DTLS priority: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l510
- _("Failed to set DTLS session parameters: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l533
- _("Failed to set DTLS MTU: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l554
- _("Established DTLS connection (using GnuTLS). Ciphersuite %s.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l572
- _("DTLS handshake failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l576
- _("(Is a firewall preventing you from sending UDP packets?)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l597
- _("DTLS connection attempted with an existing fd\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l603
- _("No DTLS address\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l610
- _("Server offered no DTLS cipher option\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l617
- _("No DTLS when connected via proxy\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l688
- _("DTLS option %s : %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l729
- _("DTLS initialised. DPD %d, Keepalive %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l755
- _("Attempt new DTLS connection\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l781
- _("Received DTLS packet 0x%02x of %d bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l795
- _("Got DTLS DPD request\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l801
- _("Failed to send DPD response. Expect disconnect\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l805
- _("Got DTLS DPD response\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l809
- _("Got DTLS Keepalive\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l815
- _("Compressed DTLS packet received when compression not enabled\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l823
- _("Unknown DTLS packet type %02x, len %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l845
- _("DTLS rekey due\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l852
- _("DTLS Rehandshake failed; reconnecting.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l861
- _("DTLS Dead Peer Detection detected dead peer!\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l867
- _("Send DTLS DPD\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l872
- _("Failed to send DPD request. Expect disconnect\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l885
- _("Send DTLS Keepalive\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l890
- _("Failed to send keepalive request. Expect disconnect\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l931
- _("DTLS got write error %d. Falling back to SSL\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l945
- _("DTLS got write error: %s. Falling back to SSL\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/dtls.c#l960
- _("Sent DTLS packet of %d bytes; DTLS send returned %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l57
- _("Accepting expected ESP packet with seq %u\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l63
- _("Discarding ancient ESP packet with seq %u (expected %u)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l72
- _("Accepting out-of-order ESP packet with seq %u (expected %u)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l78
- _("Discarding replayed ESP packet with seq %u\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l107
- _("Accepting later-than-expected ESP packet with seq %u (expected %u)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l152
- _("Parameters for %s ESP: SPI 0x%08x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l155
- _("ESP encryption type %s key 0x%s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l158
- _("ESP authentication type %s key 0x%s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l217
- _("incoming");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l218
- _("outgoing");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l220
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l237
- _("Send ESP probes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l264
- _("Received ESP packet of %d bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l280
- _("Consider SPI 0x%x, seq %u against outgoing ESP setup\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l286
- _("Received ESP packet with invalid SPI 0x%08x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l294
- _("Received ESP packet with unrecognised payload type %02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l301
- _("Invalid padding length %02x in ESP\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l313
- _("Invalid padding bytes in ESP\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l321
- _("ESP session established with server\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l332
- _("Failed to allocate memory to decrypt ESP packet\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l338
- _("LZO decompression of ESP packet failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l344
- _("LZO decompressed %d bytes into %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l358
- _("Rekey not implemented for ESP\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l362
- _("ESP detected dead peer\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l369
- _("Send ESP probes for DPD\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l375
- _("Keepalive not implemented for ESP\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l398
- _("Failed to send ESP packet: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/esp.c#l404
- _("Sent ESP packet of %d bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls-esp.c#l56
- _("Failed to initialise ESP cipher: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls-esp.c#l66
- _("Failed to initialize ESP HMAC: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls-esp.c#l116
- _("Failed to generate random keys for ESP: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls-esp.c#l146
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls-esp.c#l212
- _("Failed to calculate HMAC for ESP packet: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls-esp.c#l153
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-esp.c#l148
- _("Received ESP packet with invalid HMAC\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls-esp.c#l169
- _("Decrypting ESP packet failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls-esp.c#l189
- _("Failed to generate ESP packet IV: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls-esp.c#l204
- _("Failed to encrypt ESP packet: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l107
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l124
- _("SSL write cancelled\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l111
- _("Failed to write to SSL socket: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l140
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l202
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l156
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l209
- _("SSL read cancelled\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l148
- _("SSL socket closed uncleanly\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l152
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l207
- _("Failed to read from SSL socket: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l227
- _("SSL read error: %s; reconnecting.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l263
- _("SSL send failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l276
- _("Could not extract expiration time of certificate\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l281
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1352
- _("Client certificate has expired at");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l283
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1357
- _("Client certificate expires soon at");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l332
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l733
- _("Failed to load item '%s' from keystore: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l345
- _("Failed to open key/certificate file %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l352
- _("Failed to stat key/certificate file %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l361
- _("Failed to allocate certificate buffer\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l369
- _("Failed to read certificate into memory: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l400
- _("Failed to setup PKCS#12 data structure: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l423
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l502
- _("Failed to decrypt PKCS#12 certificate file\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l427
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l505
- _("Enter PKCS#12 pass phrase:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l450
- _("Failed to process PKCS#12 file: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l462
- _("Failed to load PKCS#12 certificate: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l622
- _("Importing X509 certificate failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l632
- _("Setting PKCS#11 certificate failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l672
- _("Could not initialise MD5 hash: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l682
- _("MD5 hash error: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l740
- _("Missing DEK-Info: header from OpenSSL encrypted key\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l747
- _("Cannot determine PEM encryption type\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l760
- _("Unsupported PEM encryption type: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l785
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l798
- _("Invalid salt in encrypted PEM file\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l822
- _("Error base64-decoding encrypted PEM file: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l830
- _("Encrypted PEM file too short\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l858
- _("Failed to initialise cipher for decrypting PEM file: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l869
- _("Failed to decrypt PEM key: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l921
- _("Decrypting PEM key failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l926
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1452
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l428
- _("Enter PEM pass phrase:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l985
- _("This binary built without system key support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l992
- _("This binary built without PKCS#11 support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1050
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l383
- _("Using PKCS#11 certificate %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1051
- _("Using system certificate %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1069
- _("Error loading certificate from PKCS#11: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1070
- _("Error loading system certificate: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1081
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l787
- _("Using certificate file %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1109
- _("PKCS#11 file contained no certificate\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1135
- _("No certificate found in file");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1140
- _("Loading certificate failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1155
- _("Using system key %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1160
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1324
- _("Error initialising private key structure: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1171
- _("Error importing system key %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1182
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1272
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1300
- _("Trying PKCS#11 key URL %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1187
- _("Error initialising PKCS#11 key structure: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1312
- _("Error importing PKCS#11 URL %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1319
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l549
- _("Using PKCS#11 key %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1334
- _("Error importing PKCS#11 key into private key structure: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1362
- _("Using private key file %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1373
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l613
- _("This version of OpenConnect was built without TPM support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1394
- _("Failed to interpret PEM file\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1413
- _("Failed to load PKCS#1 private key: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1426
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1440
- _("Failed to load private key as PKCS#8: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1448
- _("Failed to decrypt PKCS#8 certificate file\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1462
- _("Failed to determine type of private key %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1474
- _("Failed to get key ID: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1519
- _("Error signing test data with private key: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1534
- _("Error validating signature against certificate: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1558
- _("No SSL certificate found to match private key\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1570
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l528
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l671
- _("Using client certificate '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1577
- _("Setting certificate revocation list failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1598
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1608
- _("Failed to allocate memory for certificate\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1644
- _(""
- "WARNING: GnuTLS returned incorrect issuer certs; authentication may fail!\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1672
- _("Got next CA '%s' from PKCS11\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1698
- _("Failed to allocate memory for supporting certificates\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1721
- _("Adding supporting CA '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1749
- _("Setting certificate failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1937
- _("Server presented no certificate\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1943
- _("Error initialising X509 cert structure\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1949
- _("Error importing server's cert\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1958
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1677
- _("Could not calculate hash of server's certificate\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1963
- _("Error checking server cert status\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1968
- _("certificate revoked");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1970
- _("signer not found");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1972
- _("signer not a CA certificate");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1974
- _("insecure algorithm");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1976
- _("certificate not yet activated");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1978
- _("certificate expired");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l1983
- _("signature verification failed");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2031
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1259
- _("certificate does not match hostname");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2036
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1263
- _("Server certificate verify failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2140
- _("Failed to allocate memory for cafile certs\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2161
- _("Failed to read certs from cafile: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2177
- _("Failed to open CA file '%s': %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2190
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1415
- _("Loading certificate failed. Aborting.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2226
- _("Failed to set TLS priority string: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2238
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1538
- _("SSL negotiation with %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2285
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1564
- _("SSL connection cancelled\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2292
- _("SSL connection failure: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2301
- _("GnuTLS non-fatal return during handshake: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2307
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1589
- _("Connected to HTTPS on %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2310
- _("Renegotiated SSL on %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2493
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l182
- _("PIN required for %s");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2497
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l185
- _("Wrong PIN");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2500
- _("This is the final try before locking!");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2502
- _("Only a few tries left before locking!");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2507
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l189
- _("Enter PIN:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2638
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1717
- _("Unsupported OATH HMAC algorithm\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls.c#l2647
- _("Failed to calculate OATH HMAC: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l84
- _("Failed to SHA1 input data for signing: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l106
- _("TPM sign function called for %d bytes.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l113
- _("Failed to create TPM hash object: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l120
- _("Failed to set value in TPM hash object: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l130
- _("TPM hash signature failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l152
- _("Error decoding TSS key blob: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l159
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l170
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l183
- _("Error in TSS key blob\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l190
- _("Failed to create TPM context: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l197
- _("Failed to connect TPM context: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l205
- _("Failed to load TPM SRK key: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l212
- _("Failed to load TPM SRK policy object: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l233
- _("Failed to set TPM PIN: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l249
- _("Failed to load TPM key blob: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l256
- _("Enter TPM SRK PIN:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l281
- _("Failed to create key policy object: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l289
- _("Failed to assign policy to key: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l295
- _("Enter TPM key PIN:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gnutls_tpm.c#l306
- _("Failed to set key PIN: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l75
- _("Error importing GSSAPI name for authentication:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l128
- _("Error generating GSSAPI response:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l145
- _("Attempting GSSAPI authentication to proxy\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l148
- _("Attempting GSSAPI authentication to server '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l200
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l256
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l191
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l249
- _("GSSAPI authentication completed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l211
- _("GSSAPI token too large (%zd bytes)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l224
- _("Sending GSSAPI token of %zu bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l229
- _("Failed to send GSSAPI authentication token to proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l237
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l264
- _("Failed to receive GSSAPI authentication token from proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l243
- _("SOCKS server reported GSSAPI context failure\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l247
- _("Unknown GSSAPI status response (0x%02x) from SOCKS server\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l268
- _("Got GSSAPI token of %zu bytes: %02x %02x %02x %02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l294
- _("Sending GSSAPI protection negotiation of %zu bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l299
- _("Failed to send GSSAPI protection response to proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l307
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l317
- _("Failed to receive GSSAPI protection response from proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l322
- _("Got GSSAPI protection response of %zu bytes: %02x %02x %02x %02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l332
- _("Invalid GSSAPI protection response from proxy (%zu bytes)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l341
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l408
- _("SOCKS proxy demands message integrity, which is not supported\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l345
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l412
- _("SOCKS proxy demands message confidentiality, which is not supported\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/gssapi.c#l349
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l416
- _("SOCKS proxy demands protection unknown type 0x%02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http-auth.c#l184
- _("Attempting HTTP Basic authentication to proxy\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http-auth.c#l186
- _("Attempting HTTP Basic authentication to server '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http-auth.c#l200
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1200
- _("This version of OpenConnect was built without GSSAPI support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http-auth.c#l240
- _("Proxy requested Basic authentication which is disabled by default\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http-auth.c#l243
- _(""
- "Server '%s' requested Basic authentication which is disabled by default\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http-auth.c#l256
- _("No more authentication methods to try\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l296
- _("No memory for allocating cookies\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l371
- _("Failed to parse HTTP response '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l377
- _("Got HTTP response: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l385
- _("Error processing HTTP response\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l392
- _("Ignoring unknown HTTP response line '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l412
- _("Invalid cookie offered: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l431
- _("SSL certificate authentication failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l462
- _("Response body has negative size (%d)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l473
- _("Unknown Transfer-Encoding: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l492
- _("HTTP body %s (%d)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l506
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l533
- _("Error reading HTTP response body\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l519
- _("Error fetching chunk header\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l543
- _("Error fetching HTTP response body\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l546
- _("Error in chunked decoding. Expected '', got: '%s'");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l558
- _("Cannot receive HTTP 1.0 body without closing connection\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l685
- _("Failed to parse redirected URL '%s': %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l709
- _("Cannot follow redirection to non-https URL '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l737
- _("Allocating new path for relative redirect failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l929
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l585
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l621
- _("Unexpected %d result from server\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1056
- _("request granted");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1057
- _("general failure");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1058
- _("connection not allowed by ruleset");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1059
- _("network unreachable");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1060
- _("host unreachable");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1061
- _("connection refused by destination host");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1062
- _("TTL expired");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1063
- _("command not supported / protocol error");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1064
- _("address type not supported");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1074
- _("SOCKS server requested username/password but we have none\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1082
- _("Username and password for SOCKS authentication must be < 255 bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1097
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1153
- _("Error writing auth request to SOCKS proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1105
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1160
- _("Error reading auth response from SOCKS proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1112
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1166
- _("Unexpected auth response from SOCKS proxy: %02x %02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1118
- _("Authenticated to SOCKS server using password\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1122
- _("Password authentication to SOCKS server failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1178
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1185
- _("SOCKS server requested GSSAPI authentication\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1191
- _("SOCKS server requested password authentication\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1198
- _("SOCKS server requires authentication\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1205
- _("SOCKS server requested unknown authentication type %02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1211
- _("Requesting SOCKS proxy connection to %s:%d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1226
- _("Error writing connect request to SOCKS proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1234
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1276
- _("Error reading connect response from SOCKS proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1240
- _("Unexpected connect response from SOCKS proxy: %02x %02x...\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1248
- _("SOCKS proxy error %02x: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1252
- _("SOCKS proxy error %02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1269
- _("Unexpected address type %02x in SOCKS connect response\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1292
- _("Requesting HTTP proxy connection to %s:%d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1324
- _("Sending proxy request failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1347
- _("Proxy CONNECT request failed: %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1366
- _("Unknown proxy type '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/http.c#l1415
- _("Only http or socks(5) proxies supported\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/library.c#l139
- _("Unknown VPN protocol '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/library.c#l160
- _("Built against SSL library with no Cisco DTLS support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/library.c#l540
- _("Failed to parse server URL '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/library.c#l546
- _("Only https:// permitted for server URL\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/library.c#l935
- _("No form handler; cannot authenticate.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l327
- _("CommandLineToArgvW() failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l340
- _("Fatal error in command line handling\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l376
- _("ReadConsole() failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l389
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l402
- _("Error converting console input: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l396
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l632
- _("Allocation failure for string from stdin\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l563
- _(""
- "For assistance with OpenConnect, please see the web page at\n"
- " http://www.infradead.org/openconnect/mail.html\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l572
- _("Using OpenSSL. Features present:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l574
- _("Using GnuTLS. Features present:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l583
- _("OpenSSL ENGINE not present");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l615
- _("using OpenSSL");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l619
- _(""
- "\n"
- "WARNING: No DTLS support in this binary. Performance will be impaired.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l651
- _("fgets (stdin)");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l690
- _("Cannot process this executable path \"%s\"");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l696
- _("Allocation for vpnc-script path failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l716
- _("Override hostname '%s' to '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l729
- _("Usage: openconnect [options] <server>\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l730
- _(""
- "Open client for Cisco AnyConnect VPN, version %s\n"
- "\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l732
- _("Read options from config file");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l734
- _("Continue in background after startup");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l735
- _("Write the daemon's PID to this file");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l737
- _("Use SSL client certificate CERT");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l738
- _("Warn when certificate lifetime < DAYS");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l739
- _("Use SSL private key file KEY");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l740
- _("Use WebVPN cookie COOKIE");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l741
- _("Read cookie from standard input");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l742
- _("Enable compression (default)");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l743
- _("Disable compression");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l744
- _("Set minimum Dead Peer Detection interval");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l745
- _("Set login usergroup");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l746
- _("Display help text");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l747
- _("Use IFNAME for tunnel interface");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l749
- _("Use syslog for progress messages");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l751
- _("Prepend timestamp to progress messages");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l753
- _("Drop privileges after connecting");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l754
- _("Drop privileges during CSD execution");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l755
- _("Run SCRIPT instead of CSD binary");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l757
- _("Request MTU from server");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l758
- _("Indicate path MTU to/from server");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l759
- _("Set key passphrase or TPM SRK PIN");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l760
- _("Key passphrase is fsid of file system");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l761
- _("Set proxy server");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l762
- _("Set proxy authentication methods");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l763
- _("Disable proxy");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l764
- _("Use libproxy to automatically configure proxy");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l766
- _("(NOTE: libproxy disabled in this build)");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l768
- _("Require perfect forward secrecy");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l769
- _("Less output");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l770
- _("Set packet queue limit to LEN pkts");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l771
- _("Shell command line for using a vpnc-compatible config script");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l772
- _("default");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l774
- _("Pass traffic to 'script' program, not tun");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l776
- _("Set login username");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l777
- _("Report version number");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l778
- _("More output");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l779
- _("Dump HTTP authentication traffic (implies --verbose");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l780
- _("XML config file");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l781
- _("Choose authentication login selection");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l782
- _("Authenticate only and print login info");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l783
- _("Fetch webvpn cookie only; don't connect");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l784
- _("Print webvpn cookie before connecting");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l785
- _("Cert file for server verification");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l786
- _("Do not ask for IPv6 connectivity");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l787
- _("OpenSSL ciphers to support for DTLS");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l788
- _("Disable DTLS");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l789
- _("Disable HTTP connection re-use");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l790
- _("Disable password/SecurID authentication");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l791
- _("Do not require server SSL cert to be valid");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l792
- _("Disable default system certificate authorities");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l793
- _("Do not attempt XML POST authentication");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l794
- _("Do not expect user input; exit if it is required");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l795
- _("Read password from standard input");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l796
- _("Software token type: rsa, totp or hotp");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l797
- _("Software token secret");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l799
- _("(NOTE: libstoken (RSA SecurID) disabled in this build)");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l802
- _("(NOTE: Yubikey OATH disabled in this build)");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l804
- _("Connection retry timeout in seconds");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l805
- _("Server's certificate SHA1 fingerprint");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l806
- _("HTTP header User-Agent: field");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l807
- _("Use IP when connecting to HOST");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l808
- _("OS type (linux,linux-64,win,...) to report");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l809
- _("Set local port for DTLS datagrams");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l830
- _("Failed to allocate string\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l891
- _("Failed to get line from config file: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l931
- _("Unrecognised option at line %d: '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l941
- _("Option '%s' does not take an argument at line %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l945
- _("Option '%s' requires an argument at line %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1003
- _(""
- "WARNING: This version of openconnect was built without iconv\n"
- " support but you appear to be using the legacy character\n"
- " set \"%s\". Expect strangeness.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1010
- _(""
- "WARNING: This version of openconnect is %s but\n"
- " the libopenconnect library is %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1020
- _("Failed to allocate vpninfo structure\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1056
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1070
- _("Invalid user \"%s\"\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1090
- _("Cannot use 'config' option inside config file\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1098
- _("Cannot open config file '%s': %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1114
- _("Invalid compression mode '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1135
- _("Missing colon in resolve option\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1140
- _("Failed to allocate memory\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1219
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1228
- _("MTU %d too small\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1258
- _(""
- "Disabling all HTTP connection re-use due to --no-http-keepalive option.\n"
- "If this helps, please report to <openconnect-devel@lists.infradead.org>.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1278
- _("Queue length zero not permitted; using 1\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1292
- _("OpenConnect version %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1322
- _("Invalid software token mode \"%s\"\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1332
- _("Invalid OS identity \"%s\"\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1362
- _("Too many arguments on command line\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1365
- _("No server specified\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1381
- _("This version of openconnect was built without libproxy support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1408
- _("Error opening cmd pipe\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1441
- _("Failed to obtain WebVPN cookie\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1462
- _("Creating SSL connection failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1472
- _("Set up tun script failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1479
- _("Set up tun device failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1497
- _("Set up DTLS failed; using SSL instead\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1517
- _("Connected %s as %s%s%s, using %s%s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1526
- _("No --script argument provided; DNS and routing are not configured\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1528
- _("See http://www.infradead.org/openconnect/vpnc-script.html\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1541
- _("Failed to open '%s' for write: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1553
- _("Continuing in background; pid %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1570
- _("User requested reconnect\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1578
- _("Cookie was rejected on reconnection; exiting.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1582
- _("Session terminated by server; exiting.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1586
- _("User cancelled (SIGINT); exiting.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1590
- _("User detached from session (SIGHUP); exiting.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1594
- _("Unknown error; exiting.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1613
- _("Failed to open %s for write: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1621
- _("Failed to write config to %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1680
- _("Server SSL certificate didn't match: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1702
- _(""
- "\n"
- "Certificate from VPN server \"%s\" failed verification.\n"
- "Reason: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1708
- _("Enter '%s' to accept, '%s' to abort; anything else to view: ");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1709
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1727
- _("no");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1709
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1715
- _("yes");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1736
- _("Server key hash: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1770
- _("Auth choice \"%s\" matches multiple options\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1773
- _("Auth choice \"%s\" not available\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1790
- _("User input required in non-interactive mode\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1966
- _("Failed to open token file for write: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l1974
- _("Failed to write token: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l2020
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l2041
- _("Soft token string is invalid\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l2023
- _("Can't open ~/.stokenrc file\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l2026
- _("OpenConnect was not built with libstoken support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l2029
- _("General failure in libstoken\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l2044
- _("OpenConnect was not built with liboath support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l2047
- _("General failure in liboath\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l2058
- _("Yubikey token not found\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l2061
- _("OpenConnect was not built with Yubikey support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/main.c#l2064
- _("General Yubikey failure: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/mainloop.c#l170
- _("Caller paused the connection\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/mainloop.c#l178
- _("No work to do; sleeping for %d ms...\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/mainloop.c#l199
- _("WaitForMultipleObjects failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ntlm.c#l87
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l114
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l197
- _("InitializeSecurityContext() failed: %lx\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ntlm.c#l113
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l48
- _("AcquireCredentialsHandle() failed: %lx\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ntlm.c#l246
- _("Error communicating with ntlm_auth helper\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ntlm.c#l265
- _("Attempting HTTP NTLM authentication to proxy (single-sign-on)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ntlm.c#l268
- _("Attempting HTTP NTLM authentication to server '%s' (single-sign-on)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ntlm.c#l979
- _("Attempting HTTP NTLMv%d authentication to proxy\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ntlm.c#l983
- _("Attempting HTTP NTLMv%d authentication to server '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l97
- _("Invalid base32 token string\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l105
- _("Failed to allocate memory to decode OATH secret\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l208
- _("This version of OpenConnect was built without PSKC support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l353
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l378
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l272
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l488
- _("OK to generate INITIAL tokencode\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l357
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l381
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l277
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l492
- _("OK to generate NEXT tokencode\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l362
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l385
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l282
- _("Server is rejecting the soft token; switching to manual entry\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l419
- _("Generating OATH TOTP token code\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oath.c#l568
- _("Generating OATH HOTP token code\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l56
- _("Invalid cookie '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l176
- _("Unexpected length %d for TLV %d/%d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l182
- _("Received MTU %d from server\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l191
- _("Received DNS server %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l202
- _("Received DNS search domain %.*s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l212
- _("Received internal IP address %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l221
- _("Received netmask %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l230
- _("Received internal gateway address %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l243
- _("Received split include route %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l265
- _("Received split exclude route %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l285
- _("Received WINS server %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l306
- _("ESP encryption: 0x%02x (%s)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l323
- _("ESP HMAC: 0x%02x (%s)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l333
- _("ESP compression: %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l341
- _("ESP port: %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l348
- _("ESP key lifetime: %u bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l356
- _("ESP key lifetime: %u seconds\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l364
- _("ESP to SSL fallback: %u seconds\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l372
- _("ESP replay protection: %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l380
- _("ESP SPI (outbound): %x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l388
- _("%d bytes of ESP secrets\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l400
- _("Unknown TLV group %d attr %d len %d:%s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l477
- _("Failed to parse KMP header\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l493
- _("Failed to parse KMP message\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l499
- _("Got KMP message %d of size %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l515
- _("Received non-ESP TLVs (group %d) in ESP negotiation KMP\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l563
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l607
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l639
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l765
- _("Error creating oNCP negotiation request\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l648
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l799
- _("Short write in oNCP negotiation\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l660
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l684
- _("Read %d bytes of SSL record\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l664
- _("Unexpected response of size %d after hostname packet\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l671
- _("Server response to hostname packet is error 0x%02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l688
- _("Invalid packet waiting for KMP 301\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l701
- _("Expected KMP message 301 from server but got %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l710
- _("KMP message 301 from server too large (%d bytes)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l716
- _("Got KMP message 301 of length %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l723
- _("Failed to read continuation record length\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l729
- _("Record of additional %d bytes too large; would make %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l738
- _("Failed to read continuation record of length %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l744
- _("Read additional %d bytes of KMP 301 message\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l784
- _("Error negotiating ESP keys\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l844
- _("new incoming");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l845
- _("new outgoing");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l850
- _("Ignoring ESP keys since ESP support not available in this build\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l870
- _("Read only 1 byte of oNCP length field\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l879
- _("Server terminated connection (session expired)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l883
- _("Server terminated connection (reason: %d)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l889
- _("Server sent zero-length oNCP record\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l980
- _("Incoming KMP message %d of size %d (got %d)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l983
- _("Continuing to process KMP message %d now size %d (got %d)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1002
- _("Unrecognised data packet\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1064
- _("Unknown KMP message %d of size %d:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1069
- _(".... + %d more bytes unreceived\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1084
- _("Packet outgoing:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/oncp.c#l1148
- _("Sent ESP enable control packet\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openconnect-internal.h#l1011
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openconnect-internal.h#l1019
- _("ERROR: %s() called with invalid UTF-8 for '%s' argument\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-esp.c#l51
- _("Failed to initialise ESP cipher:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-esp.c#l61
- _("Failed to initialize ESP HMAC\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-esp.c#l112
- _("Failed to generate random keys for ESP:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-esp.c#l163
- _("Failed to set up decryption context for ESP packet:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-esp.c#l171
- _("Failed to decrypt ESP packet:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-esp.c#l192
- _("Failed to generate random IV for ESP packet:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-esp.c#l206
- _("Failed to set up encryption context for ESP packet:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-esp.c#l215
- _("Failed to encrypt ESP packet:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l42
- _("Failed to establish libp11 PKCS#11 context:\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l48
- _("Failed to load PKCS#11 provider module (p11-kit-proxy.so):\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l252
- _("PIN locked\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l255
- _("PIN expired\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l258
- _("Another user already logged in\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l262
- _("Unknown error logging in to PKCS#11 token\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l269
- _("Logged in to PKCS#11 slot '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l283
- _("Failed to enumerate certs in PKCS#11 slot '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l289
- _("Found %d certs in slot '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l321
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l473
- _("Failed to parse PKCS#11 URI '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l328
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l483
- _("Failed to enumerate PKCS#11 slots\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l362
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l525
- _("Logging in to PKCS#11 slot '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l377
- _("Certificate X.509 content not fetched by libp11\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l388
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l675
- _("Failed to install certificate in OpenSSL context\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l434
- _("Failed to enumerate keys in PKCS#11 slot '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l440
- _("Found %d keys in slot '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l554
- _("Failed to instantiated private key from PKCS#11\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l561
- _("Add key from PKCS#11 failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l593
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl-pkcs11.c#l599
- _("This version of OpenConnect was built without PKCS#11 support\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l117
- _("Failed to write to SSL socket\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l149
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l201
- _("Failed to read from SSL socket\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l230
- _("SSL read error %d (server probably closed connection); reconnecting.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l255
- _("SSL_write failed: %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l328
- _("Unhandled SSL UI request type %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l435
- _("PEM password too long (%d >= %d)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l466
- _("Extra cert from %s: '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l516
- _("Parse PKCS#12 failed (see above errors)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l531
- _("PKCS#12 contained no certificate!");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l540
- _("PKCS#12 contained no private key!");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l545
- _("PKCS#12");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l563
- _("Can't load TPM engine.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l569
- _("Failed to init TPM engine\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l579
- _("Failed to set TPM SRK password\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l593
- _("Failed to load TPM private key\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l599
- _("Add key from TPM failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l649
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l795
- _("Failed to open certificate file %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l659
- _("Loading certificate failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l697
- _("Failed to process all supporting certs. Trying anyway...\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l710
- _("PEM file");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l739
- _("Failed to create BIO for keystore item '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l764
- _("Loading private key failed (wrong passphrase?)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l770
- _("Loading private key failed (see above errors)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l818
- _("Failed to load X509 certificate from keystore\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l824
- _("Failed to use X509 certificate from keystore\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l857
- _("Failed to use private key from keystore\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l872
- _("Failed to open private key file %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l892
- _("Loading private key failed\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l913
- _("Failed to identify private key type in '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1090
- _("Matched DNS altname '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1097
- _("No match for altname '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1111
- _("Certificate has GEN_IPADD altname with bogus length %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1122
- _("Matched %s address '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1129
- _("No match for %s address '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1171
- _("URI '%s' has non-empty path; ignoring\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1176
- _("Matched URI '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1187
- _("No match for URI '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1202
- _("No altname in peer cert matched '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1210
- _("No subject name in peer cert!\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1230
- _("Failed to parse subject name in peer cert\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1237
- _("Peer cert subject mismatch ('%s' != '%s')\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1242
- _("Matched peer certificate subject name '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1318
- _("Extra cert from cafile: '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1349
- _("Error in client cert notAfter field\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1362
- _("<error>");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1461
- _("Failed to read certs from CA file '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1494
- _("Failed to open CA file '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1554
- _("SSL connection failure\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/openssl.c#l1723
- _("Failed to calculate OATH HMAC\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/script.c#l96
- _("Discard bad split include: \"%s\"\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/script.c#l100
- _("Discard bad split exclude: \"%s\"\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/script.c#l503
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/script.c#l551
- _("Failed to spawn script '%s' for %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/script.c#l558
- _("Script '%s' exited abnormally (%x)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/script.c#l566
- _("Script '%s' returned error %d\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l99
- _("Socket connect cancelled\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l208
- _("Failed to reconnect to proxy %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l212
- _("Failed to reconnect to host %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l282
- _("Proxy from libproxy: %s://%s:%d/\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l310
- _("getaddrinfo failed for host '%s': %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l319
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l437
- _("Reconnecting to DynDNS server using previously cached IP address\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l334
- _("Attempting to connect to proxy %s%s%s:%s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l335
- _("Attempting to connect to server %s%s%s:%s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l351
- _("Connected to %s%s%s:%s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l362
- _("Failed to allocate sockaddr storage\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l404
- _("Failed to connect to %s%s%s:%s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l422
- _("Forgetting non-functional previous peer address\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l432
- _("Failed to connect to host %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l451
- _("Reconnecting to proxy %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l522
- _("statvfs: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l550
- _("Could not obtain file system ID for passphrase\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l561
- _("Failed to open private key file '%s': %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l589
- _("statfs: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l675
- _("No error");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l676
- _("Keystore locked");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l677
- _("Keystore uninitialized");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l678
- _("System error");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l679
- _("Protocol error");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l680
- _("Permission denied");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l681
- _("Key not found");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l682
- _("Value corrupted");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l683
- _("Undefined action");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l687
- _("Wrong password");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l688
- _("Unknown error");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l877
- _("openconnect_fopen_utf8() used with unsupported mode '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l906
- _("Unknown protocol family %d. Cannot create UDP server address\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l920
- _("Open UDP socket");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l951
- _("Unknown protocol family %d. Cannot use UDP transport\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l959
- _("Bind UDP socket");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l966
- _("Connect UDP socket\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l999
- _("Cookie is no longer valid, ending session\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/ssl.c#l1003
- _("sleep %ds, remaining timeout %ds\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l203
- _("SSPI token too large (%ld bytes)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l216
- _("Sending SSPI token of %lu bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l221
- _("Failed to send SSPI authentication token to proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l229
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l257
- _("Failed to receive SSPI authentication token from proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l235
- _("SOCKS server reported SSPI context failure\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l239
- _("Unknown SSPI status response (0x%02x) from SOCKS server\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l261
- _("Got SSPI token of %lu bytes: %02x %02x %02x %02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l277
- _("QueryContextAttributes() failed: %lx\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l313
- _("EncryptMessage() failed: %lx\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l325
- _("EncryptMessage() result too large (%lu + %lu + %lu)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l350
- _("Sending SSPI protection negotiation of %u bytes\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l355
- _("Failed to send SSPI protection response to proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l363
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l373
- _("Failed to receive SSPI protection response from proxy: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l378
- _("Got SSPI protection response of %d bytes: %02x %02x %02x %02x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l394
- _("DecryptMessage failed: %lx\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/sspi.c#l399
- _("Invalid SSPI protection response from proxy (%lu bytes)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l77
- _("Enter credentials to unlock software token.");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l82
- _("Device ID:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l89
- _("Password:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l118
- _("User bypassed soft token.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l124
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l209
- _("All fields are required; try again.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l134
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l301
- _("General failure in libstoken.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l138
- _("Incorrect device ID or password; try again.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l142
- _("Soft token init was successful.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l185
- _("Enter software token PIN.");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l189
- _("PIN:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l216
- _("Invalid PIN format; try again.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/stoken.c#l296
- _("Generating RSA token code\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l75
- _("Error accessing registry key for network adapters\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l138
- _("Ignoring non-matching TAP interface \"%s\"\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l153
- _("No Windows-TAP adapters found. Is the driver installed?\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l171
- _("Failed to open %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l176
- _("Opened tun device %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l184
- _("Failed to obtain TAP driver version: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l190
- _("Error: TAP-Windows driver v9.9 or greater is required (found %ld.%ld)\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l207
- _("Failed to set TAP IP addresses: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l219
- _("Failed to set TAP media status: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l249
- _("TAP device aborted connectivity. Disconnecting.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l254
- _("Failed to read from TAP device: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l268
- _("Failed to complete read from TAP device: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l291
- _("Wrote %ld bytes to tun\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l301
- _("Waiting for tun write...\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l304
- _("Wrote %ld bytes to tun after waiting\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l311
- _("Failed to write to TAP device: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun-win32.c#l338
- _("Spawning tunnel scripts is not yet supported on Windows\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l88
- _("Could not open /dev/tun for plumbing");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l92
- _("Can't push IP");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l102
- _("Can't set ifname");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l109
- _("Can't open %s: %s");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l118
- _("Can't plumb %s for IPv%d: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l139
- _("open /dev/tun");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l145
- _("Failed to create new tun");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l151
- _("Failed to put tun file descriptor into message-discard mode");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l196
- _("open net");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l205
- _("SIOCSIFMTU");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l233
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l419
- _("Failed to open tun device: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l244
- _("Failed to bind local tun device (TUNSETIFF): %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l248
- _(""
- "To configure local networking, openconnect must be running as root\n"
- "See http://www.infradead.org/openconnect/nonroot.html for more information\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l313
- _("Invalid interface name '%s'; must match 'utun%%d' or 'tun%%d'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l322
- _("Failed to open SYSPROTO_CONTROL socket: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l331
- _("Failed to query utun control id: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l349
- _("Failed to allocate utun device name\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l360
- _("Failed to connect utun unit: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l379
- _("Invalid interface name '%s'; must match 'tun%%d'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l389
- _("Cannot open '%s': %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l428
- _("TUNSIFHEAD");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l470
- _("socketpair failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l475
- _("fork failed: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l479
- _("setpgid");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l484
- _("execl");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l489
- _("(script)");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l532
- _("Unknown packet (len %d) received: %02x %02x %02x %02x...\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/tun.c#l549
- _("Failed to write incoming packet: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l45
- _("Failed to open %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l52
- _("Failed to fstat() %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l62
- _("Failed to allocate %d bytes for %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l70
- _("Failed to read %s: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l124
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l149
- _("Treating host \"%s\" as a raw hostname\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l131
- _("Failed to SHA1 existing file\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l139
- _("XML config file SHA1: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l147
- _("Failed to parse XML config file %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l184
- _("Host \"%s\" has address \"%s\"\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l194
- _("Host \"%s\" has UserGroup \"%s\"\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/xml.c#l208
- _("Host \"%s\" not listed in config; treating as raw hostname\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l80
- _("Failed to send \"%s\" to ykneo-oath applet: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l87
- _("Invalid short response to \"%s\" from ykneo-oath applet\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l104
- _("Failure response to \"%s\": %04x\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l158
- _("select applet command");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l169
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l410
- _("Unrecognised response from ykneo-oath applet\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l185
- _("Found ykneo-oath applet v%d.%d.%d.\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l206
- _("PIN required for Yubikey OATH applet");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l211
- _("Yubikey PIN:");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l239
- _("Failed to calculate Yubikey unlock response\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l256
- _("unlock command");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l289
- _("Trying truncated-char PBKBF2 variant of Yubikey PIN\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l328
- _("Failed to establish PC/SC context: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l333
- _("Established PC/SC context\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l339
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l351
- _("Failed to query reader list: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l378
- _("Failed to connect to PC/SC reader '%s': %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l383
- _("Connected PC/SC reader '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l388
- _("Failed to obtain exclusive access to reader '%s': %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l398
- _("list keys command");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l431
- _("Found %s/%s key '%s' on '%s'\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l448
- _(""
- "Token '%s' not found on Yubikey '%s'. Searching for another Yubikey...\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l497
- _("Server is rejecting the Yubikey token; switching to manual entry\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l551
- _("Generating Yubikey token code\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l556
- _("Failed to obtain exclusive access to Yubikey: %s\n");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l600
- _("calculate command");
- // http://git.infradead.org/users/dwmw2/openconnect.git/blob/db3501d5c7:/yubikey.c#l608
- _("Unrecognised response from Yubikey when generating tokencode\n");
|