[network-manager-openconnect] Add OpenConnect strings for translation
- From: David Woodhouse <dwmw2 src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [network-manager-openconnect] Add OpenConnect strings for translation
- Date: Wed, 20 Jun 2012 13:15:26 +0000 (UTC)
commit bbd84b679c6ce8d71d3ead9d9abdfa1ef8ed577b
Author: David Woodhouse <David Woodhouse intel com>
Date: Wed Jun 20 14:13:34 2012 +0100
Add OpenConnect strings for translation
openconnect-strings.txt | 1480 +++++++++++++++++++++++++++++++++++++++++++++++
po/POTFILES.in | 1 +
2 files changed, 1481 insertions(+), 0 deletions(-)
---
diff --git a/openconnect-strings.txt b/openconnect-strings.txt
new file mode 100644
index 0000000..5ed7989
--- /dev/null
+++ b/openconnect-strings.txt
@@ -0,0 +1,1480 @@
+This file contains strings from the OpenConnect VPN client, found at
+http://www.infradead.org/openconnect/ and browseable in gitweb at
+http://git.infradead.org/users/dwmw2/openconnect.git
+
+We do this because NetworkManager-openconnect authentication dialog
+uses a lot of strings from libopenconnect, which also need to be
+translated too if the user is to have a fully localised experience.
+
+For translators looking to see source comments in their original context
+in order to translate them properly, the URLs by each one will give a
+link to the original source code.
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l53
+_("Open XML config file");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l54
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l89
+_("Treating host \"%s\" as a raw hostname\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l60
+_("fstat XML config file");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l66
+_("mmap XML config file");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l72
+_("Failed to SHA1 existing file\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l80
+_("XML config file SHA1: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l87
+_("Failed to parse XML config file %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l124
+_("Host \"%s\" has address \"%s\"\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l133
+_("Host \"%s\" has UserGroup \"%s\"\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/xml.c#l147
+_("Host \"%s\" not listed in config; treating as raw hostname\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l177
+_(""
+"For assistance with OpenConnect, please see the web page at\n"
+" http://www.infradead.org/openconnect/mail.html\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l186
+_("Using OpenSSL. Features present:");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l188
+_("Using GnuTLS. Features present:");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l197
+_("OpenSSL ENGINE not present");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l209
+_("using OpenSSL");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l213
+_(""
+"\n"
+"WARNING: No DTLS support in this binary. Performance will be impaired.\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l219
+_("Usage: openconnect [options] <server>\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l220
+_(""
+"Open client for Cisco AnyConnect VPN, version %s\n"
+"\n" );
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l222
+_("Read options from config file");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l223
+_("Continue in background after startup");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l224
+_("Write the daemons pid to this file");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l225
+_("Use SSL client certificate CERT");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l226
+_("Warn when certificate lifetime < DAYS");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l227
+_("Use SSL private key file KEY");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l228
+_("Private key type (PKCS#12 / TPM / PEM)");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l229
+_("Use WebVPN cookie COOKIE");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l230
+_("Read cookie from standard input");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l231
+_("Enable compression (default)");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l232
+_("Disable compression");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l233
+_("Set minimum Dead Peer Detection interval");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l234
+_("Set login usergroup");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l235
+_("Display help text");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l236
+_("Use IFNAME for tunnel interface");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l237
+_("Use syslog for progress messages");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l238
+_("Drop privileges after connecting");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l239
+_("Drop privileges during CSD execution");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l240
+_("Run SCRIPT instead of CSD binary");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l241
+_("Request MTU from server");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l242
+_("Indicate path MTU to/from server");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l243
+_("Set key passphrase or TPM SRK PIN");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l244
+_("Key passphrase is fsid of file system");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l245
+_("Set proxy server");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l246
+_("Disable proxy");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l247
+_("Use libproxy to automatically configure proxy");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l249
+_("(NOTE: libproxy disabled in this build)");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l251
+_("Less output");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l252
+_("Set packet queue limit to LEN pkts");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l253
+_("Shell command line for using a vpnc-compatible config script");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l254
+_("default");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l255
+_("Pass traffic to 'script' program, not tun");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l256
+_("Set login username");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l257
+_("Report version number");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l258
+_("More output");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l259
+_("XML config file");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l260
+_("Choose authentication login selection");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l261
+_("Authenticate only and print login info");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l262
+_("Fetch webvpn cookie only; don't connect");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l263
+_("Print webvpn cookie before connecting");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l264
+_("Cert file for server verification");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l265
+_("Do not ask for IPv6 connectivity");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l266
+_("OpenSSL ciphers to support for DTLS");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l267
+_("Disable DTLS");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l268
+_("Disable HTTP connection re-use");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l269
+_("Disable password/SecurID authentication");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l270
+_("Do not require server SSL cert to be valid");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l271
+_("Do not expect user input; exit if it is required");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l272
+_("Read password from standard input");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l273
+_("Connection retry timeout in seconds");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l274
+_("Server's certificate SHA1 fingerprint");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l275
+_("HTTP header User-Agent: field");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l286
+_("Allocation failure for string from stdin\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l290
+_("fgets (stdin)");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l353
+_("Failed to get line from config file: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l393
+_("Unrecognised option at line %d: '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l403
+_("Option '%s' does not take an argument at line %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l407
+_("Option '%s' requires an argument at line %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l439
+_(""
+"WARNING: This version of openconnect is %s but\n"
+" the libopenconnect library is %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l448
+_("Failed to allocate vpninfo structure\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l484
+_("Cannot use 'config' option inside config file\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l489
+_("Cannot open config file '%s': %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l578
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l585
+_("MTU %d too small\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l605
+_(""
+"Disabling all HTTP connection re-use due to --no-http-keepalive option.\n"
+"If this helps, please report to <openconnect-devel lists infradead org>.\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l627
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l641
+_("Invalid user \"%s\"\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l659
+_("Queue length zero not permitted; using 1\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l670
+_("OpenConnect version %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l693
+_("Too many arguments on command line\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l696
+_("No server specified\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l709
+_("This version of openconnect was built without libproxy support\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l759
+_("Failed to obtain WebVPN cookie\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l783
+_("Creating SSL connection failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l788
+_("Set up tun device failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l794
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l459
+_("Failed to set uid %ld\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l801
+_("Set up DTLS failed; using SSL instead\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l804
+_("Connected %s as %s%s%s, using %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l814
+_("No --script argument provided; DNS and routing are not configured\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l816
+_("See http://www.infradead.org/openconnect/vpnc-script.html\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l828
+_("Failed to open '%s' for write: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l839
+_("Continuing in background; pid %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l861
+_("Failed to open %s for write: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l869
+_("Failed to write config to %s: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l962
+_(""
+"\n"
+"Certificate from VPN server \"%s\" failed verification.\n"
+"Reason: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l968
+_("Enter '%s' to accept, '%s' to abort; anything else to view: ");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l969
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l976
+_("yes");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l969
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l987
+_("no");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l993
+_("SHA1 fingerprint: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l1043
+_("Auth choice \"%s\" not available\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l1056
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l1104
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l1131
+_("User input required in non-interactive mode\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/main.c#l1087
+_("Auth choice \"%s\" not valid\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l131
+_("Initialise DTLSv1 CTX failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l143
+_("Set DTLS cipher list failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l156
+_("Initialise DTLSv1 session failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l177
+_("Not precisely one DTLS cipher\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l195
+_(""
+"SSL_set_session() failed with old protocol version 0x%x\n"
+"Are you using a version of OpenSSL older than 0.9.8m?\n"
+"See http://rt.openssl.org/Ticket/Display.html?id=1751\n"
+"Use the --no-dtls command line option to avoid this message\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l221
+_("Established DTLS connection (using OpenSSL)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l259
+_("Your OpenSSL is older than the one you built against, so DTLS may fail!");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l303
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l433
+_("DTLS handshake timed out\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l306
+_("DTLS handshake failed: %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l360
+_("Unknown DTLS parameters for requested CipherSuite '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l373
+_("Failed to set DTLS priority: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l392
+_("Failed to set DTLS session parameters: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l408
+_("Established DTLS connection (using GnuTLS)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l436
+_("DTLS handshake failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l470
+_("No DTLS address\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l477
+_("Server offered no DTLS cipher option\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l484
+_("No DTLS when connected via proxy\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l491
+_("Open UDP socket for DTLS:");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l496
+_("UDP (DTLS) connect:\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l558
+_("DTLS option %s : %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l597
+_("Unknown protocol family %d. Cannot do DTLS\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l607
+_("DTLS connected. DPD %d, Keepalive %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l638
+_("Received DTLS packet 0x%02x of %d bytes\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l652
+_("Got DTLS DPD request\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l658
+_("Failed to send DPD response. Expect disconnect\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l662
+_("Got DTLS DPD response\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l666
+_("Got DTLS Keepalive\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l671
+_("Unknown DTLS packet type %02x, len %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l690
+_("DTLS rekey due\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l695
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l842
+_("Reconnect failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l701
+_("DTLS rekey failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l709
+_("DTLS Dead Peer Detection detected dead peer!\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l715
+_("Send DTLS DPD\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l720
+_("Failed to send DPD request. Expect disconnect\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l733
+_("Send DTLS Keepalive\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l738
+_("Failed to send keepalive request. Expect disconnect\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l767
+_("DTLS got write error %d. Falling back to SSL\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l781
+_("DTLS got write error: %s. Falling back to SSL\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l792
+_("Sent DTLS packet of %d bytes; DTLS send returned %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/dtls.c#l804
+_("Built against SSL library with no Cisco DTLS support\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l120
+_("TCP_INFO rcv mss %d, snd mss %d, adv mss %d, pmtu %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l138
+_("TCP_MAXSEG %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l196
+_("Failed to initialise DTLS secret\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l229
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l119
+_("Error fetching HTTPS response\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l236
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l359
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l646
+_("Failed to open HTTPS connection to %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l256
+_("VPN service unavailable; reason: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l261
+_("Got inappropriate HTTP CONNECT response: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l268
+_("Got CONNECT response: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l295
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l303
+_("No memory for options\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l320
+_("X-DTLS-Session-ID not 64 characters; is: \"%s\"\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l350
+_("Unknown CSTP-Content-Encoding %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l418
+_("No IP address received. Aborting\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l424
+_("Reconnect gave different Legacy IP address (%s != %s)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l432
+_("Reconnect gave different Legacy IP netmask (%s != %s)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l440
+_("Reconnect gave different IPv6 address (%s != %s)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l448
+_("Reconnect gave different IPv6 netmask (%s != %s)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l468
+_("CSTP connected. DPD %d, Keepalive %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l501
+_("Compression setup failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l509
+_("Allocation of deflate buffer failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l549
+_("sleep %ds, remaining timeout %ds\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l582
+_("inflate failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l600
+_("Received compressed data packet of %ld bytes\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l619
+_("SSL read error %d (server probably closed connection); reconnecting.\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l644
+_("SSL_write failed: %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l660
+_("SSL read error: %s; reconnecting.\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l683
+_("SSL send failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l711
+_("Unexpected packet length. SSL_read returned %d but packet is\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l723
+_("Got CSTP DPD request\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l729
+_("Got CSTP DPD response\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l734
+_("Got CSTP Keepalive\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l739
+_("Received uncompressed data packet of %d bytes\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l754
+_("Received server disconnect: %02x '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l762
+_("Compressed packet received in !deflate mode\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l770
+_("received server terminate packet\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l777
+_("Unknown packet %02x %02x %02x %02x %02x %02x %02x %02x\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l806
+_("SSL wrote too few bytes! Asked for %d, sent %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l832
+_("CSTP rekey due\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l839
+_("CSTP Dead Peer Detection detected dead peer!\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l851
+_("Send CSTP DPD\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l862
+_("Send CSTP Keepalive\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l889
+_("deflate failed %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l909
+_("Sending compressed data packet of %d bytes\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l921
+_("Sending uncompressed data packet of %d bytes\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/cstp.c#l961
+_("Send BYE packet: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/mainloop.c#l86
+_("Attempt new DTLS connection\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/mainloop.c#l119
+_("No work to do; sleeping for %d ms...\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l88
+_("open net");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l97
+_("SIOCSIFMTU");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l137
+_("Discard bad split include: \"%s\"\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l141
+_("Discard bad split exclude: \"%s\"\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l383
+_("Failed to spawn script '%s' for %s: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l398
+_("Could not /dev/tun for plumbing");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l402
+_("Can't push IP");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l412
+_("Can't set ifname");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l419
+_("Can't open %s: %s");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l427
+_("Can't plumb %s for IPv%d: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l492
+_("Failed to open tun device: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l503
+_("TUNSETIFF failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l515
+_("open /dev/tun");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l521
+_("Failed to create new tun");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l527
+_("Failed to put tun file descriptor into message-discard mode");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l562
+_("Invalid interface name '%s'; must match 'tun%%d'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l572
+_("Cannot open '%s': %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l601
+_("open tun");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l609
+_("TUNSIFHEAD");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l629
+_("socketpair");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l635
+_("fork");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l641
+_("execl");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l646
+_("(script)");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l740
+_("Unknown packet (len %d) received: %02x %02x %02x %02x...\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/tun.c#l760
+_("Failed to write incoming packet: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l110
+_("Failed to write to SSL socket");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l122
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l105
+_("SSL write cancelled\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l147
+_("Failed to read from SSL socket");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l159
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l217
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l142
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l200
+_("SSL read cancelled\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l204
+_("Failed to read from SSL socket\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l394
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l841
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1181
+_("Enter PEM pass phrase:");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l401
+_("PEM password too long (%d >= %d)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l429
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l356
+_("Enter PKCS#12 pass phrase:");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l442
+_("Parse PKCS#12 failed (wrong passphrase?)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l449
+_("Parse PKCS#12 failed (see above errors)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l461
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l598
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1298
+_("Using client certificate '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l464
+_("PKCS#12 contained no certificate!");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l473
+_("PKCS#12 contained no private key!");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l494
+_("Extra cert from PKCS#12: '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l520
+_("Can't load TPM engine.\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l526
+_("Failed to init TPM engine\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l536
+_("Failed to set TPM SRK password\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l550
+_("Failed to load TPM private key\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l556
+_("Add key from TPM failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l570
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1113
+_("This version of OpenConnect was built without TPM support\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l587
+_("Failed to reload X509 cert for expiry check\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l621
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l264
+_("Failed to load item '%s' from keystore: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l627
+_("Failed to create BIO for keystore item '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l652
+_("Loading private key failed (wrong passphrase?)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l658
+_("Loading private key failed (see above errors)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l667
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l895
+_("This binary built without PKCS#11 support\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l672
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l969
+_("Using certificate file %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l683
+_("Failed to open certificate file %s: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l694
+_("Read PKCS#12 failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l712
+_("Failed to load X509 certificate from keystore\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l718
+_("Failed to use X509 certificate from keystore\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l730
+_("Loading certificate failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l757
+_("Failed to use private key from keystore\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l773
+_("Failed to open private key file %s: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l793
+_("Failed to identify private key type in '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l854
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1573
+_("Server SSL certificate didn't match: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l974
+_("Matched DNS altname '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l981
+_("No match for altname '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l995
+_("Certificate has GEN_IPADD altname with bogus length %d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1006
+_("Matched %s address '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1013
+_("No match for %s address '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1055
+_("URI '%s' has non-empty path; ignoring\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1060
+_("Matched URI '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1071
+_("No match for URI '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1086
+_("No altname in peer cert matched '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1094
+_("No subject name in peer cert!\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1114
+_("Failed to parse subject name in peer cert\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1121
+_("Peer cert subject mismatch ('%s' != '%s')\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1126
+_("Matched peer certificate subject name '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1152
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1617
+_("certificate does not match hostname");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1156
+_("Server certificate verify failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1206
+_("Extra cert from cafile: '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1237
+_("Error in client cert notAfter field\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1240
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l223
+_("Client certificate has expired at");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1245
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l225
+_("Client certificate expires soon at");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1251
+_("<error>");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1300
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1722
+_("Loading certificate failed. Aborting.\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1337
+_("Failed to read certs from CA file '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1359
+_("Failed to open CA file '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1375
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1746
+_("SSL negotiation with %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1391
+_("SSL connection failure\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1406
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1770
+_("SSL connection cancelled\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/openssl.c#l1426
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1793
+_("Connected to HTTPS on %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l82
+_("Failed to write to SSL socket: %s");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l122
+_("Failed to read from SSL socket: %s");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l176
+_("Failed to read from SSL socket: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l218
+_("Could not extract expiration time of certificate\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l277
+_("Failed to open key/certificate file %s: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l284
+_("Failed to stat key/certificate file %s: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l293
+_("Failed to allocate certificate buffer\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l301
+_("Failed to read certificate into memory: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l332
+_("Failed to setup PKCS#12 data structure: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l343
+_("Failed to import PKCS#12 file: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l352
+_("Failed to decrypt PKCS#12 certificate file\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l380
+_("Failed to process PKCS#12 file: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l392
+_("Failed to load PKCS#12 certificate: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l562
+_("Importing X509 certificate failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l572
+_("Setting PKCS#11 certificate failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l596
+_("Could not initialise MD5 hash: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l606
+_("MD5 hash error: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l663
+_("Missing DEK-Info: header from OpenSSL encrypted key\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l683
+_("Unsupported PEM encryption type: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l701
+_("Invalid salt in encrypted PEM file\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l714
+_("Invalid encrypted PEM file\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l738
+_("Error base64-decoding encrypted PEM file: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l746
+_("Encrypted PEM file too short\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l774
+_("Failed to initialise cipher for decrypting PEM file: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l785
+_("Failed to decrypt PEM key: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l837
+_("Decrypting PEM key failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l945
+_("Using PKCS#11 certificate %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l958
+_("Error loading certificate from PKCS#11: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l992
+_("PKCS#11 file contained no certificate\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1018
+_("No certificate found in file");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1023
+_("Loading certificate failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1038
+_("Using PKCS#11 key %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1043
+_("Error initialising PKCS#11 key structure: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1052
+_("Error importing PKCS#11 URL %s: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1062
+_("Error initialising private key structure: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1072
+_("Error importing PKCS#11 key into private key structure: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1100
+_("Using private key file %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1134
+_("Failed to interpret PEM file\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1153
+_("Failed to load PKCS#1 private key: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1169
+_("Failed to load private key as PKCS#8: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1177
+_("Failed to decrypt PKCS#8 certificate file\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1191
+_("Failed to determine type of private key %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1203
+_("Failed to get key ID: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1248
+_("Error signing test data with private key: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1263
+_("Error validating signature against certificate: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1287
+_("No SSL certificate found to match private key\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1305
+_("Setting certificate recovation list failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1358
+_(""
+"WARNING: GnuTLS returned incorrect issuer certs; authentication may fail!\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1377
+_("Failed to allocate memory for supporting certificates\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1396
+_("Adding supporting CA '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1424
+_("Setting certificate failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1553
+_("Server presented no certificate\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1565
+_("Could not calculate SHA1 of server's certificate\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1581
+_("Error checking server cert status\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1586
+_("certificate revoked");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1588
+_("signer not found");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1590
+_("signer not a CA certificate");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1592
+_("insecure algorithm");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1594
+_("certificate not yet activated");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1596
+_("certificate expired");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1601
+_("signature verification failed");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1605
+_("Error initialising X509 cert structure\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1611
+_("Error importing server's cert\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1678
+_("Failed to allocate memory for cafile certs\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1697
+_("Failed to read certs from cafile: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1711
+_("Failed to open CA file '%s': %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1737
+_("Failed to set TLS priority string: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1777
+_("SSL connection failure: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1786
+_("GnuTLS non-fatal return during handshake: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1969
+_("PIN required for %s");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1979
+_("Wrong PIN");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1982
+_("This is the final try before locking!");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1984
+_("Only a few tries left before locking!");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls.c#l1989
+_("Enter PIN:");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l89
+_("Failed to SHA1 input data for signing: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l111
+_("TPM sign function called for %d bytes.\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l118
+_("Failed to create TPM hash object: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l125
+_("Failed to set value in TPM hash object: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l135
+_("TPM hash signature failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l157
+_("Error decoding TSS key blob: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l164
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l175
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l188
+_("Error in TSS key blob\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l195
+_("Failed to create TPM context: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l202
+_("Failed to connect TPM context: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l210
+_("Failed to load TPM SRK key: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l217
+_("Failed to load TPM SRK policy object: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l238
+_("Failed to set TPM PIN: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l254
+_("Failed to load TPM key blob: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l261
+_("Enter TPM SRK PIN:");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l286
+_("Failed to create key policy object: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l294
+_("Failed to assign policy to key: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l300
+_("Enter TPM key PIN:");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/gnutls_tpm.c#l311
+_("Failed to set key PIN: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l82
+_("Socket connect cancelled\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l115
+_("Failed to reconnect to proxy %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l119
+_("Failed to reconnect to host %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l181
+_("Proxy from libproxy: %s://%s:%d/\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l212
+_("getaddrinfo failed for host '%s': %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l223
+_("Attempting to connect to %s%s%s:%s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l239
+_("Failed to allocate sockaddr storage\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l254
+_("Failed to connect to host %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l329
+_("statvfs: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l346
+_("statfs: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l417
+_("No error");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l418
+_("Keystore ocked");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l419
+_("Keystore uninitialized");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l420
+_("System error");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l421
+_("Protocol error");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l422
+_("Permission denied");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l423
+_("Key not found");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l424
+_("Value corrupted");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l425
+_("Undefined action");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l429
+_("Wrong password");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/ssl.c#l430
+_("Unknown error");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l64
+_("No memory for allocating cookies\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l128
+_("Failed to parse HTTP response '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l133
+_("Got HTTP response: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l141
+_("Error processing HTTP response\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l147
+_("Ignoring unknown HTTP response line '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l167
+_("Invalid cookie offered: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l176
+_("<elided>");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l186
+_("SSL certificate authentication failed\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l217
+_("Response body has negative size (%d)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l227
+_("Unknown Transfer-Encoding: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l241
+_("HTTP body %s (%d)\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l255
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l283
+_("Error reading HTTP response body\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l268
+_("Error fetching chunk header\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l294
+_("Error fetching HTTP response body\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l297
+_("Error in chunked decoding. Expected '', got: '%s'");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l310
+_("Cannot receive HTTP 1.0 body without closing connection\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l380
+_("Failed to send GET request for new config\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l402
+_("Downloaded config file did not match intended SHA1\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l419
+_(""
+"Error: Server asked us to download and run a 'Cisco Secure Desktop' trojan.\n"
+"This facility is disabled by default for security reasons, so you may wish "
+"to enable it.");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l426
+_("Trying to run Linux CSD trojan script.");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l434
+_("Failed to open temporary CSD script file: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l442
+_("Failed to write temporary CSD script file: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l464
+_("Invalid user uid=%ld\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l470
+_("Failed to change to CSD home directory '%s': %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l476
+_(""
+"Warning: you are running insecure CSD code with root privileges\n"
+"\t Use command line option \"--csd-user\"\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l521
+_("Failed to exec CSD script %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l715
+_("Failed to parse redirected URL '%s': %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l750
+_("Cannot follow redirection to non-https URL '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l779
+_("Allocating new path for relative redirect failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l792
+_("Unexpected %d result from server\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l812
+_("Refreshing %s after 1 second...\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l818
+_("Unknown response from server\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l986
+_("request granted");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l987
+_("general failure");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l988
+_("connection not allowed by ruleset");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l989
+_("network unreachable");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l990
+_("host unreachable");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l991
+_("connection refused by destination host");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l992
+_("TTL expired");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l993
+_("command not supported / protocol error");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l994
+_("address type not supported");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1008
+_("Error writing auth request to SOCKS proxy: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1015
+_("Error reading auth response from SOCKS proxy: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1021
+_("Unexpected auth response from SOCKS proxy: %02x %02x\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1029
+_("SOCKS proxy error %02x: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1033
+_("SOCKS proxy error %02x\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1039
+_("Requesting SOCKS proxy connection to %s:%d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1054
+_("Error writing connect request to SOCKS proxy: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1062
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1095
+_("Error reading connect response from SOCKS proxy: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1068
+_("Unexpected connect response from SOCKS proxy: %02x %02x...\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1088
+_("Unexpected address type %02x in SOCKS connect response\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1116
+_("Requesting HTTP proxy connection to %s:%d\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1122
+_("Sending proxy request failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1129
+_("Error fetching proxy response\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1136
+_("Failed to parse proxy response '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1142
+_("Proxy CONNECT request failed: %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1149
+_("Failed to read proxy response\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1153
+_("Unexpected continuation line after CONNECT response: '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1169
+_("Unknown proxy type '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/http.c#l1197
+_("Only http or socks(5) proxies supported\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l121
+_("Form choice has no name\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l185
+_("name %s not input\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l192
+_("No input type in form\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l204
+_("No input name in form\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l227
+_("Unknown input type %s in form\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l247
+_("Fixed options give %s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l332
+_("Failed to parse server response\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l334
+_("Response was:%s\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l342
+_("XML response has no \"auth\" root node\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l355
+_("Asked for password but '--no-passwd' set\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l380
+_("Cannot handle form method='%s', action='%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/auth.c#l436
+_("No form handler; cannot authenticate.");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/library.c#l202
+_("Failed to parse server URL '%s'\n");
+
+// http://git.infradead.org/users/dwmw2/openconnect.git/blob/b0f2edbae5:/library.c#l208
+_("Only https:// permitted for server URL\n");
diff --git a/po/POTFILES.in b/po/POTFILES.in
index c253cdf..859051f 100644
--- a/po/POTFILES.in
+++ b/po/POTFILES.in
@@ -5,3 +5,4 @@ properties/auth-helpers.c
properties/nm-openconnect.c
[type: gettext/glade]properties/nm-openconnect-dialog.ui
src/nm-openconnect-service.c
+openconnect-strings.txt
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]