This file contains strings from the OpenConnect VPN client, found at
http://www.infradead.org/openconnect/ and browseable in gitweb at
http://git.infradead.org/users/dwmw2/openconnect.git

We do this because NetworkManager-openconnect authentication dialog
uses a lot of strings from libopenconnect, which also need to be
translated too if the user is to have a fully localised experience.

For translators looking to see source comments in their original context
in order to translate them properly, the URLs by each one will give a
link to the original source code.

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l148
_("Form choice has no name\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l233
_("name %s not input\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l240
_("No input type in form\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l252
_("No input name in form\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l284
_("Unknown input type %s in form\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l494
_("Cannot handle form method='%s', action='%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l620
_("Empty response from server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l631
_("Failed to parse server response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l633
_("Response was:%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l655
_("Received <client-cert-request> when not expected.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l683
_("XML response has no \"auth\" node\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l717
_("No form handler; cannot authenticate.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l791
_("Asked for password but '--no-passwd' set\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/auth.c#l822
_("Failed to generate OTP tokencode; disabling token\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/compat.c#l206
_("(error 0x%x)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/compat.c#l209
_("(Error while describing error!)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/compat.c#l232
_("ERROR: Cannot initialize sockets\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l91
_("TCP_INFO rcv mss %d, snd mss %d, adv mss %d, pmtu %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l110
_("TCP_MAXSEG %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l207
_(""
"CRITICAL ERROR: DTLS master secret is uninitialised. Please report this.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l216
_("Error creating HTTPS CONNECT request\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l228
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l353
_("Error fetching HTTPS response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l235
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l633
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1134
_("Failed to open HTTPS connection to %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l255
_("VPN service unavailable; reason: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l260
_("Got inappropriate HTTP CONNECT response: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l267
_("Got CONNECT response: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l295
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l303
_("No memory for options\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l312
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l413
_("<elided>");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l329
_("X-DTLS-Session-ID not 64 characters; is: \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l373
_("Unknown CSTP-Content-Encoding %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l446
_("No MTU received. Aborting\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l453
_("No IP address received. Aborting\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l459
_("IPv6 configuration received but MTU %d is too small.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l465
_("Reconnect gave different Legacy IP address (%s != %s)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l473
_("Reconnect gave different Legacy IP netmask (%s != %s)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l481
_("Reconnect gave different IPv6 address (%s != %s)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l489
_("Reconnect gave different IPv6 netmask (%s != %s)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l509
_("CSTP connected. DPD %d, Keepalive %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l511
_("CSTP Ciphersuite: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l556
_("Compression setup failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l564
_("Allocation of deflate buffer failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l608
_("Cookie is no longer valid, ending session\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l612
_("sleep %ds, remaining timeout %ds\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l647
_("inflate failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l664
_("Received compressed data packet of %ld bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l683
_("SSL read error %d (server probably closed connection); reconnecting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l708
_("SSL_write failed: %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l724
_("SSL read error: %s; reconnecting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l747
_("SSL send failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l778
_("Unexpected packet length. SSL_read returned %d but packet is\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l790
_("Got CSTP DPD request\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l796
_("Got CSTP DPD response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l801
_("Got CSTP Keepalive\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l806
_("Received uncompressed data packet of %d bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l821
_("Received server disconnect: %02x '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l829
_("Compressed packet received in !deflate mode\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l837
_("received server terminate packet\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l844
_("Unknown packet %02x %02x %02x %02x %02x %02x %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l887
_("SSL wrote too few bytes! Asked for %d, sent %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l914
_("CSTP rekey due\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l921
_("Rehandshake failed; attempting new-tunnel\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l932
_("CSTP Dead Peer Detection detected dead peer!\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l936
_("Reconnect failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l952
_("Send CSTP DPD\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l963
_("Send CSTP Keepalive\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l990
_("deflate failed %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l1010
_("Sending compressed data packet of %d bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l1022
_("Sending uncompressed data packet of %d bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/cstp.c#l1062
_("Send BYE packet: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/digest.c#l242
_("Attempting Digest authentication to proxy\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l125
_("Initialise DTLSv1 CTX failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l137
_("Set DTLS cipher list failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l150
_("Initialise DTLSv1 session failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l171
_("Not precisely one DTLS cipher\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l189
_(""
"SSL_set_session() failed with old protocol version 0x%x\n"
"Are you using a version of OpenSSL older than 0.9.8m?\n"
"See http://rt.openssl.org/Ticket/Display.html?id=1751\n"
"Use the --no-dtls command line option to avoid this message\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l217
_("Established DTLS connection (using OpenSSL). Ciphersuite %s.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l243
_("Your OpenSSL is older than the one you built against, so DTLS may fail!");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l292
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l296
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l449
_("DTLS handshake timed out\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l293
_(""
"This is probably because your OpenSSL is broken\n"
"See http://rt.openssl.org/Ticket/Display.html?id=2984\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l300
_("DTLS handshake failed: %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l356
_("Unknown DTLS parameters for requested CipherSuite '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l369
_("Failed to set DTLS priority: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l390
_("Failed to set DTLS session parameters: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l413
_("Failed to set DTLS MTU: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l434
_("Established DTLS connection (using GnuTLS). Ciphersuite %s.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l452
_("DTLS handshake failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l456
_("(Is a firewall preventing you from sending UDP packets?)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l477
_("DTLS connection attempted with an existing fd\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l483
_("No DTLS address\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l490
_("Server offered no DTLS cipher option\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l497
_("No DTLS when connected via proxy\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l504
_("Open UDP socket for DTLS:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l535
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l664
_("Unknown protocol family %d. Cannot do DTLS\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l543
_("Bind UDP socket for DTLS");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l550
_("UDP (DTLS) connect:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l616
_("DTLS option %s : %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l674
_("DTLS initialised. DPD %d, Keepalive %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l703
_("Attempt new DTLS connection\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l730
_("Received DTLS packet 0x%02x of %d bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l744
_("Got DTLS DPD request\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l750
_("Failed to send DPD response. Expect disconnect\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l754
_("Got DTLS DPD response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l758
_("Got DTLS Keepalive\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l763
_("Unknown DTLS packet type %02x, len %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l784
_("DTLS rekey due\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l791
_("DTLS Rehandshake failed; reconnecting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l800
_("DTLS Dead Peer Detection detected dead peer!\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l806
_("Send DTLS DPD\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l811
_("Failed to send DPD request. Expect disconnect\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l824
_("Send DTLS Keepalive\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l829
_("Failed to send keepalive request. Expect disconnect\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l864
_("DTLS got write error %d. Falling back to SSL\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l879
_("DTLS got write error: %s. Falling back to SSL\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l896
_("Sent DTLS packet of %d bytes; DTLS send returned %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/dtls.c#l908
_("Built against SSL library with no Cisco DTLS support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l107
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l123
_("SSL write cancelled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l111
_("Failed to write to SSL socket: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l140
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l202
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l155
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l208
_("SSL read cancelled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l148
_("SSL socket closed uncleanly\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l152
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l207
_("Failed to read from SSL socket: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l225
_("Could not extract expiration time of certificate\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l230
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1298
_("Client certificate has expired at");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l232
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1303
_("Client certificate expires soon at");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l281
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l691
_("Failed to load item '%s' from keystore: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l294
_("Failed to open key/certificate file %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l301
_("Failed to stat key/certificate file %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l310
_("Failed to allocate certificate buffer\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l318
_("Failed to read certificate into memory: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l349
_("Failed to setup PKCS#12 data structure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l372
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l460
_("Failed to decrypt PKCS#12 certificate file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l376
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l463
_("Enter PKCS#12 pass phrase:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l399
_("Failed to process PKCS#12 file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l411
_("Failed to load PKCS#12 certificate: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l571
_("Importing X509 certificate failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l581
_("Setting PKCS#11 certificate failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l621
_("Could not initialise MD5 hash: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l631
_("MD5 hash error: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l689
_("Missing DEK-Info: header from OpenSSL encrypted key\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l696
_("Cannot determine PEM encryption type\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l709
_("Unsupported PEM encryption type: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l734
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l747
_("Invalid salt in encrypted PEM file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l771
_("Error base64-decoding encrypted PEM file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l779
_("Encrypted PEM file too short\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l807
_("Failed to initialise cipher for decrypting PEM file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l818
_("Failed to decrypt PEM key: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l870
_("Decrypting PEM key failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l875
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1401
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l386
_("Enter PEM pass phrase:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l934
_("This binary built without system key support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l941
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l740
_("This binary built without PKCS#11 support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l999
_("Using PKCS#11 certificate %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1000
_("Using system certificate %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1018
_("Error loading certificate from PKCS#11: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1019
_("Error loading system certificate: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1030
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l745
_("Using certificate file %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1058
_("PKCS#11 file contained no certificate\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1084
_("No certificate found in file");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1089
_("Loading certificate failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1104
_("Using system key %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1109
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1273
_("Error initialising private key structure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1120
_("Error importing system key %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1131
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1221
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1249
_("Trying PKCS#11 key URL %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1136
_("Error initialising PKCS#11 key structure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1261
_("Error importing PKCS#11 URL %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1268
_("Using PKCS#11 key %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1283
_("Error importing PKCS#11 key into private key structure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1311
_("Using private key file %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1322
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l571
_("This version of OpenConnect was built without TPM support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1343
_("Failed to interpret PEM file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1362
_("Failed to load PKCS#1 private key: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1375
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1389
_("Failed to load private key as PKCS#8: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1397
_("Failed to decrypt PKCS#8 certificate file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1411
_("Failed to determine type of private key %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1423
_("Failed to get key ID: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1468
_("Error signing test data with private key: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1483
_("Error validating signature against certificate: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1507
_("No SSL certificate found to match private key\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1519
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l486
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l629
_("Using client certificate '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1526
_("Setting certificate recovation list failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1547
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1557
_("Failed to allocate memory for certificate\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1593
_(""
"WARNING: GnuTLS returned incorrect issuer certs; authentication may fail!\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1621
_("Got next CA '%s' from PKCS11\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1647
_("Failed to allocate memory for supporting certificates\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1670
_("Adding supporting CA '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1698
_("Setting certificate failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1886
_("Server presented no certificate\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1892
_("Error initialising X509 cert structure\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1898
_("Error importing server's cert\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1907
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1569
_("Could not calculate hash of server's certificate\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1912
_("Error checking server cert status\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1917
_("certificate revoked");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1919
_("signer not found");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1921
_("signer not a CA certificate");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1923
_("insecure algorithm");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1925
_("certificate not yet activated");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1927
_("certificate expired");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1932
_("signature verification failed");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1980
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1213
_("certificate does not match hostname");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l1985
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1217
_("Server certificate verify failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2073
_("Failed to allocate memory for cafile certs\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2094
_("Failed to read certs from cafile: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2110
_("Failed to open CA file '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2123
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1361
_("Loading certificate failed. Aborting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2155
_("Failed to set TLS priority string: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2167
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1466
_("SSL negotiation with %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2214
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1492
_("SSL connection cancelled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2221
_("SSL connection failure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2230
_("GnuTLS non-fatal return during handshake: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2236
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1517
_("Connected to HTTPS on %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2239
_("Renegotiated SSL on %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2433
_("PIN required for %s");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2437
_("Wrong PIN");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2440
_("This is the final try before locking!");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2442
_("Only a few tries left before locking!");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls.c#l2447
_("Enter PIN:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l84
_("Failed to SHA1 input data for signing: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l106
_("TPM sign function called for %d bytes.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l113
_("Failed to create TPM hash object: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l120
_("Failed to set value in TPM hash object: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l130
_("TPM hash signature failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l152
_("Error decoding TSS key blob: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l159
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l170
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l183
_("Error in TSS key blob\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l190
_("Failed to create TPM context: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l197
_("Failed to connect TPM context: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l205
_("Failed to load TPM SRK key: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l212
_("Failed to load TPM SRK policy object: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l233
_("Failed to set TPM PIN: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l249
_("Failed to load TPM key blob: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l256
_("Enter TPM SRK PIN:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l281
_("Failed to create key policy object: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l289
_("Failed to assign policy to key: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l295
_("Enter TPM key PIN:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gnutls_tpm.c#l306
_("Failed to set key PIN: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l73
_("Error importing GSSAPI name for authentication:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l121
_("Error generating GSSAPI response:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l137
_("Attempting GSSAPI authentication to proxy\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l183
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l240
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l186
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l245
_("GSSAPI authentication completed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l194
_("GSSAPI token too large (%zd bytes)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l208
_("Sending GSSAPI token of %zu bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l213
_("Failed to send GSSAPI authentication token to proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l221
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l248
_("Failed to receive GSSAPI authentication token from proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l227
_("SOCKS server reported GSSAPI context failure\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l231
_("Unknown GSSAPI status response (0x%02x) from SOCKS server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l252
_("Got GSSAPI token of %zu bytes: %02x %02x %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l279
_("Sending GSSAPI protection negotiation of %zu bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l284
_("Failed to send GSSAPI protection response to proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l292
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l302
_("Failed to receive GSSAPI protection response from proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l307
_("Got GSSAPI protection response of %zu bytes: %02x %02x %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l317
_("Invalid GSSAPI protection response from proxy (%zu bytes)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l326
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l405
_("SOCKS proxy demands message integrity, which is not supported\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l330
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l409
_("SOCKS proxy demands message confidentiality, which is not supported\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/gssapi.c#l334
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l413
_("SOCKS proxy demands protection unknown type 0x%02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l297
_("No memory for allocating cookies\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l363
_("Failed to parse HTTP response '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l369
_("Got HTTP response: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l377
_("Error processing HTTP response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l384
_("Ignoring unknown HTTP response line '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l404
_("Invalid cookie offered: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l423
_("SSL certificate authentication failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l454
_("Response body has negative size (%d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l465
_("Unknown Transfer-Encoding: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l484
_("HTTP body %s (%d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l498
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l525
_("Error reading HTTP response body\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l511
_("Error fetching chunk header\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l535
_("Error fetching HTTP response body\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l538
_("Error in chunked decoding. Expected '', got: '%s'");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l550
_("Cannot receive HTTP 1.0 body without closing connection\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l627
_("Not downloading XML profile because SHA1 already matches\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l650
_("Failed to send GET request for new config\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l674
_("Downloaded config file did not match intended SHA1\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l679
_("Downloaded new XML profile\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l690
_(""
"Error: Running the 'Cisco Secure Desktop' trojan on Windows is not yet "
"implemented.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l698
_(""
"Error: Server asked us to run CSD hostscan.\n"
"You need to provide a suitable --csd-wrapper argument.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l705
_(""
"Error: Server asked us to download and run a 'Cisco Secure Desktop' trojan.\n"
"This facility is disabled by default for security reasons, so you may wish "
"to enable it.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l712
_("Trying to run Linux CSD trojan script.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l739
_("Temporary directory '%s' is not writable: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l747
_("Failed to open temporary CSD script file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l756
_("Failed to write temporary CSD script file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l774
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1397
_("Failed to set uid %ld\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l779
_("Invalid user uid=%ld\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l785
_("Failed to change to CSD home directory '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l791
_(""
"Warning: you are running insecure CSD code with root privileges\n"
"\t Use command line option \"--csd-user\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l836
_("Failed to exec CSD script %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l960
_("Failed to parse redirected URL '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l984
_("Cannot follow redirection to non-https URL '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1012
_("Allocating new path for relative redirect failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1175
_("Unexpected %d result from server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1202
_("Unknown response from server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1326
_("Server requested SSL client certificate after one was provided\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1330
_("Server requested SSL client certificate; none was configured\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1346
_("XML POST enabled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1389
_("Refreshing %s after 1 second...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1609
_("request granted");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1610
_("general failure");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1611
_("connection not allowed by ruleset");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1612
_("network unreachable");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1613
_("host unreachable");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1614
_("connection refused by destination host");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1615
_("TTL expired");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1616
_("command not supported / protocol error");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1617
_("address type not supported");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1627
_("SOCKS server requested username/password but we have none\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1635
_("Username and password for SOCKS authentication must be < 255 bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1650
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1706
_("Error writing auth request to SOCKS proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1658
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1713
_("Error reading auth response from SOCKS proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1665
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1719
_("Unexpected auth response from SOCKS proxy: %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1671
_("Authenticated to SOCKS server using password\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1675
_("Password authentication to SOCKS server failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1731
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1738
_("SOCKS server requested GSSAPI authentication\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1744
_("SOCKS server requested password authentication\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1751
_("SOCKS server requires authentication\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1753
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1993
_("This version of OpenConnect was built without GSSAPI support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1758
_("SOCKS server requested unknown authentication type %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1764
_("Requesting SOCKS proxy connection to %s:%d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1779
_("Error writing connect request to SOCKS proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1787
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1829
_("Error reading connect response from SOCKS proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1793
_("Unexpected connect response from SOCKS proxy: %02x %02x...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1801
_("SOCKS proxy error %02x: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1805
_("SOCKS proxy error %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1822
_("Unexpected address type %02x in SOCKS connect response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1961
_("Proxy requested Basic authentication which is disabled by default\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l1983
_("Attempting HTTP Basic authentication to proxy\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l2030
_("No more authentication methods to try\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l2115
_("Requesting HTTP proxy connection to %s:%d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l2150
_("Sending proxy request failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l2173
_("Proxy CONNECT request failed: %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l2200
_("Unknown proxy type '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/http.c#l2279
_("Only http or socks(5) proxies supported\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/library.c#l446
_("Failed to parse server URL '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/library.c#l452
_("Only https:// permitted for server URL\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l308
_("CommandLineToArgvW() failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l321
_("Fatal error in command line handling\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l357
_("ReadConsole() failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l370
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l383
_("Error converting console input: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l377
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l613
_("Allocation failure for string from stdin\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l544
_(""
"For assistance with OpenConnect, please see the web page at\n"
"  http://www.infradead.org/openconnect/mail.html\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l553
_("Using OpenSSL. Features present:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l555
_("Using GnuTLS. Features present:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l564
_("OpenSSL ENGINE not present");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l596
_("using OpenSSL");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l600
_(""
"\n"
"WARNING: No DTLS support in this binary. Performance will be impaired.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l632
_("fgets (stdin)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l671
_("Cannot process this executable path \"%s\"");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l677
_("Allocation for vpnc-script path failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l688
_("Usage:  openconnect [options] <server>\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l689
_(""
"Open client for Cisco AnyConnect VPN, version %s\n"
"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l691
_("Read options from config file");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l693
_("Continue in background after startup");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l694
_("Write the daemon's PID to this file");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l696
_("Use SSL client certificate CERT");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l697
_("Warn when certificate lifetime < DAYS");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l698
_("Use SSL private key file KEY");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l699
_("Use WebVPN cookie COOKIE");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l700
_("Read cookie from standard input");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l701
_("Enable compression (default)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l702
_("Disable compression");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l703
_("Set minimum Dead Peer Detection interval");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l704
_("Set login usergroup");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l705
_("Display help text");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l706
_("Use IFNAME for tunnel interface");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l708
_("Use syslog for progress messages");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l710
_("Prepend timestamp to progress messages");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l712
_("Drop privileges after connecting");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l713
_("Drop privileges during CSD execution");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l714
_("Run SCRIPT instead of CSD binary");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l716
_("Request MTU from server");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l717
_("Indicate path MTU to/from server");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l718
_("Set key passphrase or TPM SRK PIN");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l719
_("Key passphrase is fsid of file system");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l720
_("Set proxy server");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l721
_("Set proxy authentication methods");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l722
_("Disable proxy");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l723
_("Use libproxy to automatically configure proxy");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l725
_("(NOTE: libproxy disabled in this build)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l727
_("Require perfect forward secrecy");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l728
_("Less output");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l729
_("Set packet queue limit to LEN pkts");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l730
_("Shell command line for using a vpnc-compatible config script");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l731
_("default");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l733
_("Pass traffic to 'script' program, not tun");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l735
_("Set login username");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l736
_("Report version number");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l737
_("More output");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l738
_("Dump HTTP authentication traffic (implies --verbose");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l739
_("XML config file");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l740
_("Choose authentication login selection");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l741
_("Authenticate only and print login info");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l742
_("Fetch webvpn cookie only; don't connect");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l743
_("Print webvpn cookie before connecting");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l744
_("Cert file for server verification");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l745
_("Do not ask for IPv6 connectivity");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l746
_("OpenSSL ciphers to support for DTLS");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l747
_("Disable DTLS");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l748
_("Disable HTTP connection re-use");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l749
_("Disable password/SecurID authentication");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l750
_("Do not require server SSL cert to be valid");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l751
_("Disable default system certificate authorities");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l752
_("Do not attempt XML POST authentication");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l753
_("Do not expect user input; exit if it is required");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l754
_("Read password from standard input");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l755
_("Software token type: rsa, totp or hotp");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l756
_("Software token secret");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l758
_("(NOTE: libstoken (RSA SecurID) disabled in this build)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l761
_("(NOTE: liboath (TOTP,HOTP) disabled in this build)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l764
_("(NOTE: Yubikey OATH disabled in this build)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l766
_("Connection retry timeout in seconds");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l767
_("Server's certificate SHA1 fingerprint");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l768
_("HTTP header User-Agent: field");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l769
_("OS type (linux,linux-64,win,...) to report");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l770
_("Set local port for DTLS datagrams");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l791
_("Failed to allocate string\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l852
_("Failed to get line from config file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l892
_("Unrecognised option at line %d: '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l902
_("Option '%s' does not take an argument at line %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l906
_("Option '%s' requires an argument at line %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l962
_(""
"WARNING: This version of openconnect was built without iconv\n"
"         support but you appear to be using the legacy character\n"
"         set \"%s\". Expect strangeness.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l969
_(""
"WARNING: This version of openconnect is %s but\n"
"         the libopenconnect library is %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l979
_("Failed to allocate vpninfo structure\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1015
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1029
_("Invalid user \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1044
_("Cannot use 'config' option inside config file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1052
_("Cannot open config file '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1141
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1150
_("MTU %d too small\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1177
_(""
"Disabling all HTTP connection re-use due to --no-http-keepalive option.\n"
"If this helps, please report to <openconnect-devel@lists.infradead.org>.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1197
_("Queue length zero not permitted; using 1\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1211
_("OpenConnect version %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1241
_("Invalid software token mode \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1251
_("Invalid OS identity \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1272
_("Too many arguments on command line\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1275
_("No server specified\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1291
_("This version of openconnect was built without libproxy support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1318
_("Error opening cmd pipe\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1351
_("Failed to obtain WebVPN cookie\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1372
_("Creating SSL connection failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1382
_("Set up tun script failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1389
_("Set up tun device failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1406
_("Set up DTLS failed; using SSL instead\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1410
_("Connected %s as %s%s%s, using %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1420
_("No --script argument provided; DNS and routing are not configured\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1422
_("See http://www.infradead.org/openconnect/vpnc-script.html\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1435
_("Failed to open '%s' for write: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1447
_("Continuing in background; pid %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1462
_("User requested reconnect\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1470
_("Cookie was rejected on reconnection; exiting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1474
_("Session terminated by server; exiting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1478
_("User cancelled (SIGINT); exiting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1482
_("User detached from session (SIGHUP); exiting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1486
_("Unknown error; exiting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1505
_("Failed to open %s for write: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1513
_("Failed to write config to %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1572
_("Server SSL certificate didn't match: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1594
_(""
"\n"
"Certificate from VPN server \"%s\" failed verification.\n"
"Reason: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1600
_("Enter '%s' to accept, '%s' to abort; anything else to view: ");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1601
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1619
_("no");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1601
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1607
_("yes");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1628
_("Server key hash: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1662
_("Auth choice \"%s\" matches multiple options\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1665
_("Auth choice \"%s\" not available\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1682
_("User input required in non-interactive mode\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1853
_("Failed to open token file for write: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1861
_("Failed to write token: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1906
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1927
_("Soft token string is invalid\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1909
_("Can't open ~/.stokenrc file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1912
_("OpenConnect was not built with libstoken support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1915
_("General failure in libstoken\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1930
_("OpenConnect was not built with liboath support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1933
_("General failure in liboath\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1944
_("Yubikey token not found\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1947
_("OpenConnect was not built with Yubikey support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/main.c#l1950
_("General Yubikey failure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/mainloop.c#l182
_("Caller paused the connection\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/mainloop.c#l190
_("No work to do; sleeping for %d ms...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/mainloop.c#l211
_("WaitForMultipleObjects failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ntlm.c#l86
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l113
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l192
_("InitializeSecurityContext() failed: %lx\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ntlm.c#l110
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l48
_("AcquireCredentialsHandle() failed: %lx\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ntlm.c#l235
_("Error communicating with ntlm_auth helper\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ntlm.c#l251
_("Attempting HTTP NTLM authentication to proxy (single-sign-on)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ntlm.c#l1011
_("Attempting HTTP NTLMv%d authentication to proxy\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l114
_("This version of OpenConnect was built without PSKC support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l240
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l268
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l275
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l446
_("OK to generate INITIAL tokencode\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l244
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l271
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l280
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l450
_("OK to generate NEXT tokencode\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l249
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l275
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l285
_("Server is rejecting the soft token; switching to manual entry\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l291
_("Generating OATH TOTP token code\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l301
_("Unable to generate OATH TOTP token code: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l405
_("Generating OATH HOTP token code\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/oath.c#l422
_("Unable to generate OATH HOTP token code: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openconnect-internal.h#l768
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openconnect-internal.h#l776
_("ERROR: %s() called with invalid UTF-8 for '%s' argument\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l116
_("Failed to write to SSL socket\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l148
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l200
_("Failed to read from SSL socket\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l286
_("Unhandled SSL UI request type %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l393
_("PEM password too long (%d >= %d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l424
_("Extra cert from %s: '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l474
_("Parse PKCS#12 failed (see above errors)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l489
_("PKCS#12 contained no certificate!");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l498
_("PKCS#12 contained no private key!");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l503
_("PKCS#12");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l521
_("Can't load TPM engine.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l527
_("Failed to init TPM engine\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l537
_("Failed to set TPM SRK password\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l551
_("Failed to load TPM private key\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l557
_("Add key from TPM failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l607
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l753
_("Failed to open certificate file %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l617
_("Loading certificate failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l633
_("Failed to install certificate in OpenSSL context\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l655
_("Failed to process all supporting certs. Trying anyway...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l668
_("PEM file");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l697
_("Failed to create BIO for keystore item '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l722
_("Loading private key failed (wrong passphrase?)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l728
_("Loading private key failed (see above errors)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l776
_("Failed to load X509 certificate from keystore\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l782
_("Failed to use X509 certificate from keystore\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l813
_("Failed to use private key from keystore\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l826
_("Failed to open private key file %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l846
_("Loading private key failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l867
_("Failed to identify private key type in '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1044
_("Matched DNS altname '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1051
_("No match for altname '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1065
_("Certificate has GEN_IPADD altname with bogus length %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1076
_("Matched %s address '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1083
_("No match for %s address '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1125
_("URI '%s' has non-empty path; ignoring\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1130
_("Matched URI '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1141
_("No match for URI '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1156
_("No altname in peer cert matched '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1164
_("No subject name in peer cert!\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1184
_("Failed to parse subject name in peer cert\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1191
_("Peer cert subject mismatch ('%s' != '%s')\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1196
_("Matched peer certificate subject name '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1264
_("Extra cert from cafile: '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1295
_("Error in client cert notAfter field\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1308
_("<error>");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1407
_("Failed to read certs from CA file '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1440
_("Failed to open CA file '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/openssl.c#l1482
_("SSL connection failure\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/script.c#l96
_("Discard bad split include: \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/script.c#l100
_("Discard bad split exclude: \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/script.c#l465
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/script.c#l513
_("Failed to spawn script '%s' for %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/script.c#l520
_("Script '%s' exited abnormally (%x)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/script.c#l528
_("Script '%s' returned error %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l83
_("Socket connect cancelled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l154
_("Failed to reconnect to proxy %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l158
_("Failed to reconnect to host %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l224
_("Proxy from libproxy: %s://%s:%d/\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l249
_("getaddrinfo failed for host '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l258
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l342
_("Reconnecting to DynDNS server using previously cached IP address\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l273
_("Attempting to connect to proxy %s%s%s:%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l274
_("Attempting to connect to server %s%s%s:%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l293
_("Failed to allocate sockaddr storage\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l327
_("Forgetting non-functional previous peer address\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l337
_("Failed to connect to host %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l356
_("Reconnecting to proxy %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l427
_("statvfs: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l455
_("Could not obtain file system ID for passphrase\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l466
_("Failed to open private key file '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l494
_("statfs: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l580
_("No error");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l581
_("Keystore locked");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l582
_("Keystore uninitialized");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l583
_("System error");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l584
_("Protocol error");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l585
_("Permission denied");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l586
_("Key not found");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l587
_("Value corrupted");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l588
_("Undefined action");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l592
_("Wrong password");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l593
_("Unknown error");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/ssl.c#l783
_("openconnect_fopen_utf8() used with unsupported mode '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l198
_("SSPI token too large (%ld bytes)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l212
_("Sending SSPI token of %lu bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l217
_("Failed to send SSPI authentication token to proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l225
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l253
_("Failed to receive SSPI authentication token from proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l231
_("SOCKS server reported SSPI context failure\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l235
_("Unknown SSPI status response (0x%02x) from SOCKS server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l257
_("Got SSPI token of %lu bytes: %02x %02x %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l273
_("QueryContextAttributes() failed: %lx\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l309
_("EncryptMessage() failed: %lx\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l321
_("EncryptMessage() result too large (%lu + %lu + %lu)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l347
_("Sending SSPI protection negotiation of %u bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l352
_("Failed to send SSPI protection response to proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l360
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l370
_("Failed to receive SSPI protection response from proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l375
_("Got SSPI protection response of %d bytes: %02x %02x %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l391
_("DecryptMessage failed: %lx\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/sspi.c#l396
_("Invalid SSPI protection response from proxy (%lu bytes)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l77
_("Enter credentials to unlock software token.");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l82
_("Device ID:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l89
_("Password:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l118
_("User bypassed soft token.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l124
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l209
_("All fields are required; try again.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l134
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l304
_("General failure in libstoken.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l138
_("Incorrect device ID or password; try again.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l142
_("Soft token init was successful.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l185
_("Enter software token PIN.");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l189
_("PIN:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l216
_("Invalid PIN format; try again.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/stoken.c#l299
_("Generating RSA token code\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l75
_("Error accessing registry key for network adapters\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l138
_("Ignoring non-matching TAP interface \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l153
_("No Windows-TAP adapters found. Is the driver installed?\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l171
_("Failed to open %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l176
_("Opened tun device %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l184
_("Failed to obtain TAP driver version: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l190
_("Error: TAP-Windows driver v9.9 or greater is required (found %ld.%ld)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l207
_("Failed to set TAP IP addresses: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l219
_("Failed to set TAP media status: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l249
_("TAP device aborted connectivity. Disconnecting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l254
_("Failed to read from TAP device: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l268
_("Failed to complete read from TAP device: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l291
_("Wrote %ld bytes to tun\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l301
_("Waiting for tun write...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l304
_("Wrote %ld bytes to tun after waiting\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l311
_("Failed to write to TAP device: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun-win32.c#l338
_("Spawning tunnel scripts is not yet supported on Windows\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l88
_("Could not open /dev/tun for plumbing");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l92
_("Can't push IP");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l102
_("Can't set ifname");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l109
_("Can't open %s: %s");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l118
_("Can't plumb %s for IPv%d: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l139
_("open /dev/tun");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l145
_("Failed to create new tun");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l151
_("Failed to put tun file descriptor into message-discard mode");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l196
_("open net");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l205
_("SIOCSIFMTU");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l233
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l413
_("Failed to open tun device: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l243
_("TUNSETIFF failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l307
_("Invalid interface name '%s'; must match 'utun%%d' or 'tun%%d'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l316
_("Failed to open SYSPROTO_CONTROL socket: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l325
_("Failed to query utun control id: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l343
_("Failed to allocate utun device name\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l354
_("Failed to connect utun unit: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l373
_("Invalid interface name '%s'; must match 'tun%%d'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l383
_("Cannot open '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l422
_("TUNSIFHEAD");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l464
_("socketpair failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l469
_("fork failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l473
_("setpgid");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l478
_("execl");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l483
_("(script)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l526
_("Unknown packet (len %d) received: %02x %02x %02x %02x...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/tun.c#l543
_("Failed to write incoming packet: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l45
_("Failed to open %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l52
_("Failed to fstat() %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l62
_("Failed to allocate %d bytes for %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l70
_("Failed to read %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l124
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l148
_("Treating host \"%s\" as a raw hostname\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l131
_("Failed to SHA1 existing file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l138
_("XML config file SHA1: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l146
_("Failed to parse XML config file %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l183
_("Host \"%s\" has address \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l193
_("Host \"%s\" has UserGroup \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/xml.c#l207
_("Host \"%s\" not listed in config; treating as raw hostname\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l80
_("Failed to send \"%s\" to ykneo-oath applet: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l87
_("Invalid short response to \"%s\" from ykneo-oath applet\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l106
_("Failure response to \"%s\": %04x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l158
_("select applet command");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l169
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l368
_("Unrecognised response from ykneo-oath applet\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l185
_("Found ykneo-oath applet v%d.%d.%d.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l206
_("PIN required for Yubikey OATH applet");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l211
_("Yubikey PIN:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l233
_("Failed to calculate Yubikey unlock response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l249
_("unlock command");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l286
_("Failed to establish PC/SC context: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l291
_("Established PC/SC context\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l297
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l309
_("Failed to query reader list: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l336
_("Failed to connect to PC/SC reader '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l341
_("Connected PC/SC reader '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l346
_("Failed to obtain exclusive access to reader '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l356
_("list keys command");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l389
_("Found %s/%s key '%s' on '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l406
_(""
"Token '%s' not found on Yubikey '%s'. Searching for another Yubikey...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l455
_("Server is rejecting the Yubikey token; switching to manual entry\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l510
_("Generating Yubikey token code\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l515
_("Failed to obtain exclusive access to Yubikey: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l561
_("calculate command");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/216939c93f:/yubikey.c#l569
_("Unrecognised response from Yubikey when generating tokencode\n");
