This file contains strings from the OpenConnect VPN client, found at
http://www.infradead.org/openconnect/ and browseable in gitweb at
http://git.infradead.org/users/dwmw2/openconnect.git

We do this because NetworkManager-openconnect authentication dialog
uses a lot of strings from libopenconnect, which also need to be
translated too if the user is to have a fully localised experience.

For translators looking to see source comments in their original context
in order to translate them properly, the URLs by each one will give a
link to the original source code.

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l128
_("Ignoring unknown form submit item '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l141
_("Ignoring unknown form input type '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l151
_("Discarding duplicate option '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l224
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l408
_("Cannot handle form method='%s', action='%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l308
_("TNCC support not implemented yet on Windows\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l330
_("No DSPREAUTH cookie; not attempting TNCC\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l341
_("Failed to allocate memory for communication with TNCC\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l376
_("Failed to exec TNCC script %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l385
_("Failed to send start command to TNCC\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l392
_("Sent start; waiting for response from TNCC\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l397
_("Failed to read response from TNCC\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l408
_("Received invalid response from TNCC\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l410
_(""
"TNCC response: -->\n"
"%s\n"
"<--\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l418
_("Received unsuccessful %s response from TNCC\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l431
_("Got new DSPREAUTH cookie from TNCC: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l495
_("Failed to parse HTML document\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l512
_("Failed to find or parse web form in login page\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l520
_("Encountered form with no ID\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l545
_("Unknown form ID '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l548
_("Dumping unknown HTML form:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth-juniper.c#l562
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l661
_("Failed to generate OTP tokencode; disabling token\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l96
_("Form choice has no name\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l181
_("name %s not input\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l188
_("No input type in form\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l200
_("No input name in form\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l230
_("Unknown input type %s in form\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l534
_("Empty response from server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l545
_("Failed to parse server response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l547
_("Response was:%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l569
_("Received <client-cert-request> when not expected.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l597
_("XML response has no \"auth\" node\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l630
_("Asked for password but '--no-passwd' set\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l910
_("Not downloading XML profile because SHA1 already matches\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l916
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l268
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l877
_("Failed to open HTTPS connection to %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l933
_("Failed to send GET request for new config\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l957
_("Downloaded config file did not match intended SHA1\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l962
_("Downloaded new XML profile\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l973
_(""
"Error: Running the 'Cisco Secure Desktop' trojan on this platform is not yet "
"implemented.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l982
_(""
"Error: Server asked us to run CSD hostscan.\n"
"You need to provide a suitable --csd-wrapper argument.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l989
_(""
"Error: Server asked us to download and run a 'Cisco Secure Desktop' trojan.\n"
"This facility is disabled by default for security reasons, so you may wish "
"to enable it.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l996
_("Trying to run Linux CSD trojan script.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1023
_("Temporary directory '%s' is not writable: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1031
_("Failed to open temporary CSD script file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1040
_("Failed to write temporary CSD script file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1075
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/mainloop.c#l140
_("Failed to set gid %ld: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1082
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/mainloop.c#l147
_("Failed to set groups to %ld: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1089
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/mainloop.c#l154
_("Failed to set uid %ld: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1096
_("Invalid user uid=%ld: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1103
_("Failed to change to CSD home directory '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1109
_(""
"Warning: you are running insecure CSD code with root privileges\n"
"\t Use command line option \"--csd-user\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1154
_("Failed to exec CSD script %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1186
_("Unknown response from server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1316
_("Server requested SSL client certificate after one was provided\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1320
_("Server requested SSL client certificate; none was configured\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1336
_("XML POST enabled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/auth.c#l1379
_("Refreshing %s after 1 second...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/compat.c#l207
_("(error 0x%x)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/compat.c#l210
_("(Error while describing error!)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/compat.c#l233
_("ERROR: Cannot initialize sockets\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l100
_("TCP_INFO rcv mss %d, snd mss %d, adv mss %d, pmtu %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l119
_("TCP_MAXSEG %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l227
_(""
"CRITICAL ERROR: DTLS master secret is uninitialised. Please report this.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l245
_("Error creating HTTPS CONNECT request\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l261
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l361
_("Error fetching HTTPS response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l288
_("VPN service unavailable; reason: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l293
_("Got inappropriate HTTP CONNECT response: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l300
_("Got CONNECT response: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l328
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l336
_("No memory for options\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l345
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l421
_("<elided>");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l362
_("X-DTLS-Session-ID not 64 characters; is: \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l385
_("Unknown DTLS-Content-Encoding %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l421
_("Unknown CSTP-Content-Encoding %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l494
_("No MTU received. Aborting\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l502
_("No IP address received. Aborting\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l508
_("IPv6 configuration received but MTU %d is too small.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l514
_("Reconnect gave different Legacy IP address (%s != %s)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l522
_("Reconnect gave different Legacy IP netmask (%s != %s)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l530
_("Reconnect gave different IPv6 address (%s != %s)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l538
_("Reconnect gave different IPv6 netmask (%s != %s)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l558
_("CSTP connected. DPD %d, Keepalive %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l560
_("CSTP Ciphersuite: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l622
_("Compression setup failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l639
_("Allocation of deflate buffer failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l697
_("inflate failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l720
_("LZS decompression failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l733
_("LZ4 decompression failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l740
_("Unknown compression type %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l745
_("Received %s compressed data packet of %d bytes (was %d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l765
_("deflate failed %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l835
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l872
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1308
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l255
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/mainloop.c#l67
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l930
_("Allocation failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l846
_("Short packet received (%d bytes)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l859
_("Unexpected packet length. SSL_read returned %d but packet is\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l873
_("Got CSTP DPD request\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l879
_("Got CSTP DPD response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l884
_("Got CSTP Keepalive\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l889
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1019
_("Received uncompressed data packet of %d bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l906
_("Received server disconnect: %02x '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l909
_("Received server disconnect\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l917
_("Compressed packet received in !deflate mode\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l926
_("received server terminate packet\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l933
_("Unknown packet %02x %02x %02x %02x %02x %02x %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l976
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1136
_("SSL wrote too few bytes! Asked for %d, sent %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l1004
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1174
_("CSTP rekey due\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l1011
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1181
_("Rehandshake failed; attempting new-tunnel\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l1022
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1192
_("CSTP Dead Peer Detection detected dead peer!\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l1026
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1106
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1196
_("Reconnect failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l1042
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1212
_("Send CSTP DPD\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l1054
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1223
_("Send CSTP Keepalive\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l1079
_("Sending compressed data packet of %d bytes (was %d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l1090
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1248
_("Sending uncompressed data packet of %d bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/cstp.c#l1129
_("Send BYE packet: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/digest.c#l254
_("Attempting Digest authentication to proxy\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/digest.c#l257
_("Attempting Digest authentication to server '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l180
_("Failed to create SSL_SESSION ASN.1 for OpenSSL: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l191
_("OpenSSL failed to parse SSL_SESSION ASN.1\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l205
_("Initialise DTLSv1 session failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l256
_("Initialise DTLSv1 CTX failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l268
_("Set DTLS cipher list failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l281
_("Not precisely one DTLS cipher\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l303
_(""
"SSL_set_session() failed with old protocol version 0x%x\n"
"Are you using a version of OpenSSL older than 0.9.8m?\n"
"See http://rt.openssl.org/Ticket/Display.html?id=1751\n"
"Use the --no-dtls command line option to avoid this message\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l339
_("Established DTLS connection (using OpenSSL). Ciphersuite %s.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l345
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l656
_("DTLS connection compression using %s.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l376
_("Your OpenSSL is older than the one you built against, so DTLS may fail!");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l425
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l429
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l671
_("DTLS handshake timed out\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l426
_(""
"This is probably because your OpenSSL is broken\n"
"See http://rt.openssl.org/Ticket/Display.html?id=2984\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l433
_("DTLS handshake failed: %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l571
_("Unknown DTLS parameters for requested CipherSuite '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l584
_("Failed to set DTLS priority: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l605
_("Failed to set DTLS session parameters: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l628
_("Failed to set DTLS MTU: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l650
_("Established DTLS connection (using GnuTLS). Ciphersuite %s.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l674
_("DTLS handshake failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l678
_("(Is a firewall preventing you from sending UDP packets?)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l699
_("DTLS connection attempted with an existing fd\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l705
_("No DTLS address\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l712
_("Server offered no DTLS cipher option\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l719
_("No DTLS when connected via proxy\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l790
_("DTLS option %s : %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l831
_("DTLS initialised. DPD %d, Keepalive %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l857
_("Attempt new DTLS connection\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l883
_("Received DTLS packet 0x%02x of %d bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l897
_("Got DTLS DPD request\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l903
_("Failed to send DPD response. Expect disconnect\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l907
_("Got DTLS DPD response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l911
_("Got DTLS Keepalive\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l917
_("Compressed DTLS packet received when compression not enabled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l925
_("Unknown DTLS packet type %02x, len %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l947
_("DTLS rekey due\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l954
_("DTLS Rehandshake failed; reconnecting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l963
_("DTLS Dead Peer Detection detected dead peer!\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l969
_("Send DTLS DPD\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l974
_("Failed to send DPD request. Expect disconnect\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l987
_("Send DTLS Keepalive\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l992
_("Failed to send keepalive request. Expect disconnect\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1033
_("DTLS got write error %d. Falling back to SSL\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1047
_("DTLS got write error: %s. Falling back to SSL\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1062
_("Sent DTLS packet of %d bytes; DTLS send returned %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1085
_("SSL operation cancelled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1127
_("Initiating IPv4 MTU detection (min=%d, max=%d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1132
_("Too long time in MTU detect loop; bailing out.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1155
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1234
_("Failed to send DPD request (%d): %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1175
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1260
_("Received unexpected packet (%.2x) in MTU detection; skipping.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1181
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1276
_("Failed to recv DPD request (%d): %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1214
_("Initiating IPv6 MTU detection\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1329
_("Detected MTU of %d bytes (was %d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/dtls.c#l1332
_("No change in MTU after detection (was %d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l57
_("Accepting expected ESP packet with seq %u\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l63
_("Discarding ancient ESP packet with seq %u (expected %u)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l72
_("Accepting out-of-order ESP packet with seq %u (expected %u)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l78
_("Discarding replayed ESP packet with seq %u\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l107
_("Accepting later-than-expected ESP packet with seq %u (expected %u)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l152
_("Parameters for %s ESP: SPI 0x%08x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l155
_("ESP encryption type %s key 0x%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l158
_("ESP authentication type %s key 0x%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l217
_("incoming");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l218
_("outgoing");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l220
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l237
_("Send ESP probes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l264
_("Received ESP packet of %d bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l280
_("Consider SPI 0x%x, seq %u against outgoing ESP setup\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l286
_("Received ESP packet with invalid SPI 0x%08x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l294
_("Received ESP packet with unrecognised payload type %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l301
_("Invalid padding length %02x in ESP\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l313
_("Invalid padding bytes in ESP\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l321
_("ESP session established with server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l332
_("Failed to allocate memory to decrypt ESP packet\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l338
_("LZO decompression of ESP packet failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l344
_("LZO decompressed %d bytes into %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l358
_("Rekey not implemented for ESP\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l362
_("ESP detected dead peer\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l369
_("Send ESP probes for DPD\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l375
_("Keepalive not implemented for ESP\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l398
_("Failed to send ESP packet: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/esp.c#l404
_("Sent ESP packet of %d bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls-esp.c#l56
_("Failed to initialise ESP cipher: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls-esp.c#l66
_("Failed to initialize ESP HMAC: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls-esp.c#l116
_("Failed to generate random keys for ESP: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls-esp.c#l146
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls-esp.c#l212
_("Failed to calculate HMAC for ESP packet: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls-esp.c#l153
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-esp.c#l148
_("Received ESP packet with invalid HMAC\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls-esp.c#l169
_("Decrypting ESP packet failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls-esp.c#l189
_("Failed to generate ESP packet IV: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls-esp.c#l204
_("Failed to encrypt ESP packet: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l126
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l128
_("SSL write cancelled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l130
_("Failed to write to SSL socket: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l159
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l223
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l160
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l213
_("SSL read cancelled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l166
_("SSL socket closed uncleanly\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l173
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l232
_("Failed to read from SSL socket: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l252
_("SSL read error: %s; reconnecting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l288
_("SSL send failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l301
_("Could not extract expiration time of certificate\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l306
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1403
_("Client certificate has expired at");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l308
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1408
_("Client certificate expires soon at");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l357
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l739
_("Failed to load item '%s' from keystore: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l370
_("Failed to open key/certificate file %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l377
_("Failed to stat key/certificate file %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l386
_("Failed to allocate certificate buffer\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l394
_("Failed to read certificate into memory: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l425
_("Failed to setup PKCS#12 data structure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l448
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l508
_("Failed to decrypt PKCS#12 certificate file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l452
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l511
_("Enter PKCS#12 pass phrase:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l475
_("Failed to process PKCS#12 file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l487
_("Failed to load PKCS#12 certificate: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l647
_("Importing X509 certificate failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l657
_("Setting PKCS#11 certificate failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l697
_("Could not initialise MD5 hash: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l707
_("MD5 hash error: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l765
_("Missing DEK-Info: header from OpenSSL encrypted key\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l772
_("Cannot determine PEM encryption type\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l785
_("Unsupported PEM encryption type: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l810
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l823
_("Invalid salt in encrypted PEM file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l847
_("Error base64-decoding encrypted PEM file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l855
_("Encrypted PEM file too short\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l883
_("Failed to initialise cipher for decrypting PEM file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l894
_("Failed to decrypt PEM key: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l946
_("Decrypting PEM key failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l951
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1477
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l434
_("Enter PEM pass phrase:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1010
_("This binary built without system key support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1017
_("This binary built without PKCS#11 support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1075
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l383
_("Using PKCS#11 certificate %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1076
_("Using system certificate %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1094
_("Error loading certificate from PKCS#11: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1095
_("Error loading system certificate: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1106
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l793
_("Using certificate file %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1134
_("PKCS#11 file contained no certificate\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1160
_("No certificate found in file");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1165
_("Loading certificate failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1180
_("Using system key %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1185
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1349
_("Error initialising private key structure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1196
_("Error importing system key %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1207
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1297
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1325
_("Trying PKCS#11 key URL %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1212
_("Error initialising PKCS#11 key structure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1337
_("Error importing PKCS#11 URL %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1344
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l549
_("Using PKCS#11 key %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1359
_("Error importing PKCS#11 key into private key structure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1387
_("Using private key file %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1398
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l619
_("This version of OpenConnect was built without TPM support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1419
_("Failed to interpret PEM file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1438
_("Failed to load PKCS#1 private key: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1451
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1465
_("Failed to load private key as PKCS#8: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1473
_("Failed to decrypt PKCS#8 certificate file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1487
_("Failed to determine type of private key %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1499
_("Failed to get key ID: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1544
_("Error signing test data with private key: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1559
_("Error validating signature against certificate: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1583
_("No SSL certificate found to match private key\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1595
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l534
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l677
_("Using client certificate '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1602
_("Setting certificate revocation list failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1623
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1633
_("Failed to allocate memory for certificate\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1669
_(""
"WARNING: GnuTLS returned incorrect issuer certs; authentication may fail!\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1697
_("Got next CA '%s' from PKCS11\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1723
_("Failed to allocate memory for supporting certificates\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1746
_("Adding supporting CA '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1774
_("Setting certificate failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1962
_("Server presented no certificate\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1970
_("Error comparing server's cert on rehandshake: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1975
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1338
_("Server presented different cert on rehandshake\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1980
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1341
_("Server presented identical cert on rehandshake\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1986
_("Error initialising X509 cert structure\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l1992
_("Error importing server's cert\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2001
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1681
_("Could not calculate hash of server's certificate\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2006
_("Error checking server cert status\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2011
_("certificate revoked");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2013
_("signer not found");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2015
_("signer not a CA certificate");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2017
_("insecure algorithm");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2019
_("certificate not yet activated");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2021
_("certificate expired");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2026
_("signature verification failed");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2075
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1276
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1369
_("certificate does not match hostname");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2080
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1275
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1375
_("Server certificate verify failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2149
_("Failed to allocate memory for cafile certs\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2170
_("Failed to read certs from cafile: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2186
_("Failed to open CA file '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2199
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1466
_("Loading certificate failed. Aborting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2270
_("Failed to set TLS priority string (\"%s\"): %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2282
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1583
_("SSL negotiation with %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2329
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1609
_("SSL connection cancelled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2336
_("SSL connection failure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2345
_("GnuTLS non-fatal return during handshake: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2351
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1626
_("Connected to HTTPS on %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2354
_("Renegotiated SSL on %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2537
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l182
_("PIN required for %s");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2541
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l185
_("Wrong PIN");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2544
_("This is the final try before locking!");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2546
_("Only a few tries left before locking!");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2551
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l189
_("Enter PIN:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2682
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1754
_("Unsupported OATH HMAC algorithm\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls.c#l2691
_("Failed to calculate OATH HMAC: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l84
_("Failed to SHA1 input data for signing: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l106
_("TPM sign function called for %d bytes.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l113
_("Failed to create TPM hash object: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l120
_("Failed to set value in TPM hash object: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l130
_("TPM hash signature failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l152
_("Error decoding TSS key blob: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l159
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l170
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l183
_("Error in TSS key blob\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l190
_("Failed to create TPM context: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l197
_("Failed to connect TPM context: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l205
_("Failed to load TPM SRK key: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l212
_("Failed to load TPM SRK policy object: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l233
_("Failed to set TPM PIN: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l249
_("Failed to load TPM key blob: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l256
_("Enter TPM SRK PIN:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l281
_("Failed to create key policy object: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l289
_("Failed to assign policy to key: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l295
_("Enter TPM key PIN:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gnutls_tpm.c#l306
_("Failed to set key PIN: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l75
_("Error importing GSSAPI name for authentication:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l128
_("Error generating GSSAPI response:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l145
_("Attempting GSSAPI authentication to proxy\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l148
_("Attempting GSSAPI authentication to server '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l200
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l256
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l191
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l249
_("GSSAPI authentication completed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l211
_("GSSAPI token too large (%zd bytes)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l224
_("Sending GSSAPI token of %zu bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l229
_("Failed to send GSSAPI authentication token to proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l237
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l264
_("Failed to receive GSSAPI authentication token from proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l243
_("SOCKS server reported GSSAPI context failure\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l247
_("Unknown GSSAPI status response (0x%02x) from SOCKS server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l268
_("Got GSSAPI token of %zu bytes: %02x %02x %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l294
_("Sending GSSAPI protection negotiation of %zu bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l299
_("Failed to send GSSAPI protection response to proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l307
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l317
_("Failed to receive GSSAPI protection response from proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l322
_("Got GSSAPI protection response of %zu bytes: %02x %02x %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l332
_("Invalid GSSAPI protection response from proxy (%zu bytes)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l341
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l408
_("SOCKS proxy demands message integrity, which is not supported\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l345
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l412
_("SOCKS proxy demands message confidentiality, which is not supported\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/gssapi.c#l349
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l416
_("SOCKS proxy demands protection unknown type 0x%02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http-auth.c#l184
_("Attempting HTTP Basic authentication to proxy\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http-auth.c#l186
_("Attempting HTTP Basic authentication to server '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http-auth.c#l200
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1200
_("This version of OpenConnect was built without GSSAPI support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http-auth.c#l240
_("Proxy requested Basic authentication which is disabled by default\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http-auth.c#l243
_(""
"Server '%s' requested Basic authentication which is disabled by default\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http-auth.c#l256
_("No more authentication methods to try\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l296
_("No memory for allocating cookies\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l371
_("Failed to parse HTTP response '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l377
_("Got HTTP response: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l385
_("Error processing HTTP response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l392
_("Ignoring unknown HTTP response line '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l412
_("Invalid cookie offered: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l431
_("SSL certificate authentication failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l462
_("Response body has negative size (%d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l473
_("Unknown Transfer-Encoding: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l492
_("HTTP body %s (%d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l506
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l533
_("Error reading HTTP response body\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l519
_("Error fetching chunk header\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l543
_("Error fetching HTTP response body\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l546
_("Error in chunked decoding. Expected '', got: '%s'");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l558
_("Cannot receive HTTP 1.0 body without closing connection\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l685
_("Failed to parse redirected URL '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l709
_("Cannot follow redirection to non-https URL '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l737
_("Allocating new path for relative redirect failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l929
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l590
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l626
_("Unexpected %d result from server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1056
_("request granted");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1057
_("general failure");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1058
_("connection not allowed by ruleset");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1059
_("network unreachable");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1060
_("host unreachable");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1061
_("connection refused by destination host");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1062
_("TTL expired");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1063
_("command not supported / protocol error");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1064
_("address type not supported");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1074
_("SOCKS server requested username/password but we have none\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1082
_("Username and password for SOCKS authentication must be < 255 bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1097
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1153
_("Error writing auth request to SOCKS proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1105
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1160
_("Error reading auth response from SOCKS proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1112
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1166
_("Unexpected auth response from SOCKS proxy: %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1118
_("Authenticated to SOCKS server using password\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1122
_("Password authentication to SOCKS server failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1178
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1185
_("SOCKS server requested GSSAPI authentication\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1191
_("SOCKS server requested password authentication\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1198
_("SOCKS server requires authentication\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1205
_("SOCKS server requested unknown authentication type %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1211
_("Requesting SOCKS proxy connection to %s:%d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1226
_("Error writing connect request to SOCKS proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1234
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1276
_("Error reading connect response from SOCKS proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1240
_("Unexpected connect response from SOCKS proxy: %02x %02x...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1248
_("SOCKS proxy error %02x: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1252
_("SOCKS proxy error %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1269
_("Unexpected address type %02x in SOCKS connect response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1292
_("Requesting HTTP proxy connection to %s:%d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1324
_("Sending proxy request failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1347
_("Proxy CONNECT request failed: %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1366
_("Unknown proxy type '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/http.c#l1415
_("Only http or socks(5) proxies supported\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/library.c#l139
_("Unknown VPN protocol '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/library.c#l160
_("Built against SSL library with no Cisco DTLS support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/library.c#l561
_("Failed to parse server URL '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/library.c#l567
_("Only https:// permitted for server URL\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/library.c#l984
_("No form handler; cannot authenticate.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l330
_("CommandLineToArgvW() failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l343
_("Fatal error in command line handling\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l379
_("ReadConsole() failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l393
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l406
_("Error converting console input: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l400
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l636
_("Allocation failure for string from stdin\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l567
_(""
"For assistance with OpenConnect, please see the web page at\n"
"  http://www.infradead.org/openconnect/mail.html\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l576
_("Using OpenSSL. Features present:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l578
_("Using GnuTLS. Features present:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l587
_("OpenSSL ENGINE not present");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l619
_("using OpenSSL");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l623
_(""
"\n"
"WARNING: No DTLS support in this binary. Performance will be impaired.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l660
_("fgets (stdin)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l700
_("Cannot process this executable path \"%s\"");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l706
_("Allocation for vpnc-script path failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l726
_("Override hostname '%s' to '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l739
_("Usage:  openconnect [options] <server>\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l740
_(""
"Open client for Cisco AnyConnect VPN, version %s\n"
"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l742
_("Read options from config file");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l744
_("Continue in background after startup");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l745
_("Write the daemon's PID to this file");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l747
_("Use SSL client certificate CERT");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l748
_("Warn when certificate lifetime < DAYS");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l749
_("Use SSL private key file KEY");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l750
_("Use WebVPN cookie COOKIE");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l751
_("Read cookie from standard input");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l752
_("Enable compression (default)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l753
_("Disable compression");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l754
_("Set minimum Dead Peer Detection interval");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l755
_("Set login usergroup");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l756
_("Display help text");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l757
_("Use IFNAME for tunnel interface");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l759
_("Use syslog for progress messages");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l761
_("Prepend timestamp to progress messages");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l763
_("Drop privileges after connecting");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l764
_("Drop privileges during CSD execution");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l765
_("Run SCRIPT instead of CSD binary");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l767
_("Request MTU from server");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l768
_("Indicate path MTU to/from server");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l769
_("Set key passphrase or TPM SRK PIN");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l770
_("Key passphrase is fsid of file system");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l771
_("Set proxy server");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l772
_("Set proxy authentication methods");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l773
_("Disable proxy");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l774
_("Use libproxy to automatically configure proxy");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l776
_("(NOTE: libproxy disabled in this build)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l778
_("Require perfect forward secrecy");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l779
_("Less output");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l780
_("Set packet queue limit to LEN pkts");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l781
_("Shell command line for using a vpnc-compatible config script");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l782
_("default");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l784
_("Pass traffic to 'script' program, not tun");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l786
_("Set login username");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l787
_("Report version number");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l788
_("More output");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l789
_("Dump HTTP authentication traffic (implies --verbose");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l790
_("XML config file");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l791
_("Choose authentication login selection");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l792
_("Authenticate only and print login info");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l793
_("Fetch webvpn cookie only; don't connect");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l794
_("Print webvpn cookie before connecting");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l795
_("Cert file for server verification");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l796
_("Do not ask for IPv6 connectivity");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l797
_("OpenSSL ciphers to support for DTLS");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l798
_("Disable DTLS");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l799
_("Disable HTTP connection re-use");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l800
_("Disable password/SecurID authentication");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l801
_("Do not require server SSL cert to be valid");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l802
_("Disable default system certificate authorities");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l803
_("Do not attempt XML POST authentication");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l804
_("Do not expect user input; exit if it is required");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l805
_("Read password from standard input");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l806
_("Software token type: rsa, totp or hotp");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l807
_("Software token secret");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l809
_("(NOTE: libstoken (RSA SecurID) disabled in this build)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l812
_("(NOTE: Yubikey OATH disabled in this build)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l814
_("Connection retry timeout in seconds");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l815
_("Server's certificate SHA1 fingerprint");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l816
_("HTTP header User-Agent: field");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l817
_("Local hostname to advertise to server");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l818
_("Use IP when connecting to HOST");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l819
_("OS type (linux,linux-64,win,...) to report");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l820
_("Set local port for DTLS datagrams");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l841
_("Failed to allocate string\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l902
_("Failed to get line from config file: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l942
_("Unrecognised option at line %d: '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l952
_("Option '%s' does not take an argument at line %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l956
_("Option '%s' requires an argument at line %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l981
_("Invalid user \"%s\": %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l991
_("Invalid user ID \"%d\": %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1043
_(""
"WARNING: This version of openconnect was built without iconv\n"
"         support but you appear to be using the legacy character\n"
"         set \"%s\". Expect strangeness.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1050
_(""
"WARNING: This version of openconnect is %s but\n"
"         the libopenconnect library is %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1060
_("Failed to allocate vpninfo structure\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1111
_("Cannot use 'config' option inside config file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1119
_("Cannot open config file '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1135
_("Invalid compression mode '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1156
_("Missing colon in resolve option\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1161
_("Failed to allocate memory\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1241
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1250
_("MTU %d too small\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1280
_(""
"Disabling all HTTP connection re-use due to --no-http-keepalive option.\n"
"If this helps, please report to <openconnect-devel@lists.infradead.org>.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1300
_("Queue length zero not permitted; using 1\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1314
_("OpenConnect version %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1347
_("Invalid software token mode \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1357
_("Invalid OS identity \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1387
_("Too many arguments on command line\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1390
_("No server specified\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1406
_("This version of openconnect was built without libproxy support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1435
_("Error opening cmd pipe\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1468
_("Failed to obtain WebVPN cookie\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1489
_("Creating SSL connection failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1501
_("Set up DTLS failed; using SSL instead\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1521
_("Connected as %s%s%s, using %s%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1530
_("No --script argument provided; DNS and routing are not configured\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1532
_("See http://www.infradead.org/openconnect/vpnc-script.html\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1545
_("Failed to open '%s' for write: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1557
_("Continuing in background; pid %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1574
_("User requested reconnect\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1582
_("Cookie was rejected on reconnection; exiting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1586
_("Session terminated by server; exiting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1590
_("User cancelled (SIGINT); exiting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1594
_("User detached from session (SIGHUP); exiting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1598
_("Unknown error; exiting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1617
_("Failed to open %s for write: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1625
_("Failed to write config to %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1684
_("Server SSL certificate didn't match: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1706
_(""
"\n"
"Certificate from VPN server \"%s\" failed verification.\n"
"Reason: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1712
_("Enter '%s' to accept, '%s' to abort; anything else to view: ");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1713
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1731
_("no");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1713
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1719
_("yes");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1740
_("Server key hash: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1774
_("Auth choice \"%s\" matches multiple options\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1777
_("Auth choice \"%s\" not available\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1798
_("User input required in non-interactive mode\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1975
_("Failed to open token file for write: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l1983
_("Failed to write token: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l2029
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l2050
_("Soft token string is invalid\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l2032
_("Can't open ~/.stokenrc file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l2035
_("OpenConnect was not built with libstoken support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l2038
_("General failure in libstoken\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l2053
_("OpenConnect was not built with liboath support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l2056
_("General failure in liboath\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l2067
_("Yubikey token not found\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l2070
_("OpenConnect was not built with Yubikey support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/main.c#l2073
_("General Yubikey failure: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/mainloop.c#l123
_("Set up tun script failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/mainloop.c#l130
_("Set up tun device failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/mainloop.c#l261
_("Caller paused the connection\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/mainloop.c#l269
_("No work to do; sleeping for %d ms...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/mainloop.c#l290
_("WaitForMultipleObjects failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ntlm.c#l87
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l114
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l197
_("InitializeSecurityContext() failed: %lx\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ntlm.c#l113
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l48
_("AcquireCredentialsHandle() failed: %lx\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ntlm.c#l246
_("Error communicating with ntlm_auth helper\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ntlm.c#l265
_("Attempting HTTP NTLM authentication to proxy (single-sign-on)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ntlm.c#l268
_("Attempting HTTP NTLM authentication to server '%s' (single-sign-on)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ntlm.c#l978
_("Attempting HTTP NTLMv%d authentication to proxy\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ntlm.c#l982
_("Attempting HTTP NTLMv%d authentication to server '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l97
_("Invalid base32 token string\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l105
_("Failed to allocate memory to decode OATH secret\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l208
_("This version of OpenConnect was built without PSKC support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l353
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l378
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l272
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l488
_("OK to generate INITIAL tokencode\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l357
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l381
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l277
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l492
_("OK to generate NEXT tokencode\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l362
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l385
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l282
_("Server is rejecting the soft token; switching to manual entry\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l419
_("Generating OATH TOTP token code\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oath.c#l568
_("Generating OATH HOTP token code\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l56
_("Invalid cookie '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l176
_("Unexpected length %d for TLV %d/%d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l182
_("Received MTU %d from server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l191
_("Received DNS server %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l202
_("Received DNS search domain %.*s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l217
_("Received internal IP address %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l226
_("Received netmask %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l235
_("Received internal gateway address %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l248
_("Received split include route %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l270
_("Received split exclude route %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l290
_("Received WINS server %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l311
_("ESP encryption: 0x%02x (%s)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l328
_("ESP HMAC: 0x%02x (%s)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l338
_("ESP compression: %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l346
_("ESP port: %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l353
_("ESP key lifetime: %u bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l361
_("ESP key lifetime: %u seconds\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l369
_("ESP to SSL fallback: %u seconds\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l377
_("ESP replay protection: %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l385
_("ESP SPI (outbound): %x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l393
_("%d bytes of ESP secrets\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l405
_("Unknown TLV group %d attr %d len %d:%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l482
_("Failed to parse KMP header\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l498
_("Failed to parse KMP message\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l504
_("Got KMP message %d of size %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l520
_("Received non-ESP TLVs (group %d) in ESP negotiation KMP\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l568
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l612
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l644
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l770
_("Error creating oNCP negotiation request\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l653
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l804
_("Short write in oNCP negotiation\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l665
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l689
_("Read %d bytes of SSL record\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l669
_("Unexpected response of size %d after hostname packet\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l676
_("Server response to hostname packet is error 0x%02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l693
_("Invalid packet waiting for KMP 301\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l706
_("Expected KMP message 301 from server but got %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l715
_("KMP message 301 from server too large (%d bytes)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l721
_("Got KMP message 301 of length %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l728
_("Failed to read continuation record length\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l734
_("Record of additional %d bytes too large; would make %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l743
_("Failed to read continuation record of length %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l749
_("Read additional %d bytes of KMP 301 message\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l789
_("Error negotiating ESP keys\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l849
_("new incoming");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l850
_("new outgoing");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l855
_("Ignoring ESP keys since ESP support not available in this build\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l875
_("Read only 1 byte of oNCP length field\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l884
_("Server terminated connection (session expired)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l888
_("Server terminated connection (reason: %d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l894
_("Server sent zero-length oNCP record\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l985
_("Incoming KMP message %d of size %d (got %d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l988
_("Continuing to process KMP message %d now size %d (got %d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1007
_("Unrecognised data packet\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1069
_("Unknown KMP message %d of size %d:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1074
_(".... + %d more bytes unreceived\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1089
_("Packet outgoing:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/oncp.c#l1153
_("Sent ESP enable control packet\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openconnect-internal.h#l1030
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openconnect-internal.h#l1038
_("ERROR: %s() called with invalid UTF-8 for '%s' argument\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-esp.c#l51
_("Failed to initialise ESP cipher:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-esp.c#l61
_("Failed to initialize ESP HMAC\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-esp.c#l112
_("Failed to generate random keys for ESP:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-esp.c#l163
_("Failed to set up decryption context for ESP packet:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-esp.c#l171
_("Failed to decrypt ESP packet:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-esp.c#l192
_("Failed to generate random IV for ESP packet:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-esp.c#l206
_("Failed to set up encryption context for ESP packet:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-esp.c#l215
_("Failed to encrypt ESP packet:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l42
_("Failed to establish libp11 PKCS#11 context:\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l48
_("Failed to load PKCS#11 provider module (p11-kit-proxy.so):\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l252
_("PIN locked\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l255
_("PIN expired\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l258
_("Another user already logged in\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l262
_("Unknown error logging in to PKCS#11 token\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l269
_("Logged in to PKCS#11 slot '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l283
_("Failed to enumerate certs in PKCS#11 slot '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l289
_("Found %d certs in slot '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l321
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l473
_("Failed to parse PKCS#11 URI '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l328
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l483
_("Failed to enumerate PKCS#11 slots\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l362
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l525
_("Logging in to PKCS#11 slot '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l377
_("Certificate X.509 content not fetched by libp11\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l388
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l681
_("Failed to install certificate in OpenSSL context\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l434
_("Failed to enumerate keys in PKCS#11 slot '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l440
_("Found %d keys in slot '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l554
_("Failed to instantiated private key from PKCS#11\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l561
_("Add key from PKCS#11 failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l593
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl-pkcs11.c#l599
_("This version of OpenConnect was built without PKCS#11 support\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l121
_("Failed to write to SSL socket\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l153
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l205
_("Failed to read from SSL socket\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l234
_("SSL read error %d (server probably closed connection); reconnecting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l259
_("SSL_write failed: %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l333
_("Unhandled SSL UI request type %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l441
_("PEM password too long (%d >= %d)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l472
_("Extra cert from %s: '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l522
_("Parse PKCS#12 failed (see above errors)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l537
_("PKCS#12 contained no certificate!");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l546
_("PKCS#12 contained no private key!");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l551
_("PKCS#12");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l569
_("Can't load TPM engine.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l575
_("Failed to init TPM engine\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l585
_("Failed to set TPM SRK password\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l599
_("Failed to load TPM private key\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l605
_("Add key from TPM failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l655
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l801
_("Failed to open certificate file %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l665
_("Loading certificate failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l703
_("Failed to process all supporting certs. Trying anyway...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l716
_("PEM file");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l745
_("Failed to create BIO for keystore item '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l770
_("Loading private key failed (wrong passphrase?)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l776
_("Loading private key failed (see above errors)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l824
_("Failed to load X509 certificate from keystore\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l830
_("Failed to use X509 certificate from keystore\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l863
_("Failed to use private key from keystore\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l878
_("Failed to open private key file %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l898
_("Loading private key failed\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l919
_("Failed to identify private key type in '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1081
_("Matched DNS altname '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1088
_("No match for altname '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1102
_("Certificate has GEN_IPADD altname with bogus length %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1113
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1258
_("Matched %s address '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1120
_("No match for %s address '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1162
_("URI '%s' has non-empty path; ignoring\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1167
_("Matched URI '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1178
_("No match for URI '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1193
_("No altname in peer cert matched '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1201
_("No subject name in peer cert!\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1221
_("Failed to parse subject name in peer cert\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1228
_("Peer cert subject mismatch ('%s' != '%s')\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1233
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1266
_("Matched peer certificate subject name '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1322
_("Extra cert from cafile: '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1400
_("Error in client cert notAfter field\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1413
_("<error>");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1506
_("Failed to read certs from CA file '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1539
_("Failed to open CA file '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1599
_("SSL connection failure\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/openssl.c#l1760
_("Failed to calculate OATH HMAC\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/script.c#l96
_("Discard bad split include: \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/script.c#l100
_("Discard bad split exclude: \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/script.c#l500
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/script.c#l548
_("Failed to spawn script '%s' for %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/script.c#l555
_("Script '%s' exited abnormally (%x)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/script.c#l563
_("Script '%s' returned error %d\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l99
_("Socket connect cancelled\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l208
_("Failed to reconnect to proxy %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l212
_("Failed to reconnect to host %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l282
_("Proxy from libproxy: %s://%s:%d/\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l310
_("getaddrinfo failed for host '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l319
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l444
_("Reconnecting to DynDNS server using previously cached IP address\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l334
_("Attempting to connect to proxy %s%s%s:%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l335
_("Attempting to connect to server %s%s%s:%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l355
_("Connected to %s%s%s:%s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l367
_("Failed to allocate sockaddr storage\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l409
_("Failed to connect to %s%s%s:%s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l427
_("Forgetting non-functional previous peer address\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l439
_("Failed to connect to host %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l458
_("Reconnecting to proxy %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l529
_("statvfs: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l557
_("Could not obtain file system ID for passphrase\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l568
_("Failed to open private key file '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l596
_("statfs: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l687
_("No error");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l688
_("Keystore locked");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l689
_("Keystore uninitialized");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l690
_("System error");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l691
_("Protocol error");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l692
_("Permission denied");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l693
_("Key not found");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l694
_("Value corrupted");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l695
_("Undefined action");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l699
_("Wrong password");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l700
_("Unknown error");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l889
_("openconnect_fopen_utf8() used with unsupported mode '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l918
_("Unknown protocol family %d. Cannot create UDP server address\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l932
_("Open UDP socket");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l963
_("Unknown protocol family %d. Cannot use UDP transport\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l971
_("Bind UDP socket");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l978
_("Connect UDP socket\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l1011
_("Cookie is no longer valid, ending session\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/ssl.c#l1015
_("sleep %ds, remaining timeout %ds\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l203
_("SSPI token too large (%ld bytes)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l216
_("Sending SSPI token of %lu bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l221
_("Failed to send SSPI authentication token to proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l229
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l257
_("Failed to receive SSPI authentication token from proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l235
_("SOCKS server reported SSPI context failure\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l239
_("Unknown SSPI status response (0x%02x) from SOCKS server\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l261
_("Got SSPI token of %lu bytes: %02x %02x %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l277
_("QueryContextAttributes() failed: %lx\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l313
_("EncryptMessage() failed: %lx\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l325
_("EncryptMessage() result too large (%lu + %lu + %lu)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l350
_("Sending SSPI protection negotiation of %u bytes\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l355
_("Failed to send SSPI protection response to proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l363
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l373
_("Failed to receive SSPI protection response from proxy: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l378
_("Got SSPI protection response of %d bytes: %02x %02x %02x %02x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l394
_("DecryptMessage failed: %lx\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/sspi.c#l399
_("Invalid SSPI protection response from proxy (%lu bytes)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l77
_("Enter credentials to unlock software token.");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l82
_("Device ID:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l89
_("Password:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l118
_("User bypassed soft token.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l124
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l209
_("All fields are required; try again.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l134
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l301
_("General failure in libstoken.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l138
_("Incorrect device ID or password; try again.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l142
_("Soft token init was successful.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l185
_("Enter software token PIN.");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l189
_("PIN:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l216
_("Invalid PIN format; try again.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/stoken.c#l296
_("Generating RSA token code\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l75
_("Error accessing registry key for network adapters\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l138
_("Ignoring non-matching TAP interface \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l153
_("No Windows-TAP adapters found. Is the driver installed?\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l171
_("Failed to open %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l176
_("Opened tun device %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l184
_("Failed to obtain TAP driver version: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l190
_("Error: TAP-Windows driver v9.9 or greater is required (found %ld.%ld)\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l207
_("Failed to set TAP IP addresses: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l219
_("Failed to set TAP media status: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l249
_("TAP device aborted connectivity. Disconnecting.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l254
_("Failed to read from TAP device: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l268
_("Failed to complete read from TAP device: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l291
_("Wrote %ld bytes to tun\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l301
_("Waiting for tun write...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l304
_("Wrote %ld bytes to tun after waiting\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l311
_("Failed to write to TAP device: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun-win32.c#l338
_("Spawning tunnel scripts is not yet supported on Windows\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l88
_("Could not open /dev/tun for plumbing");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l92
_("Can't push IP");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l102
_("Can't set ifname");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l109
_("Can't open %s: %s");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l118
_("Can't plumb %s for IPv%d: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l139
_("open /dev/tun");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l145
_("Failed to create new tun");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l151
_("Failed to put tun file descriptor into message-discard mode");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l183
_("tun device is unsupported on this platform\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l205
_("open net");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l214
_("SIOCSIFMTU");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l242
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l428
_("Failed to open tun device: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l253
_("Failed to bind local tun device (TUNSETIFF): %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l257
_(""
"To configure local networking, openconnect must be running as root\n"
"See http://www.infradead.org/openconnect/nonroot.html for more information\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l322
_("Invalid interface name '%s'; must match 'utun%%d' or 'tun%%d'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l331
_("Failed to open SYSPROTO_CONTROL socket: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l340
_("Failed to query utun control id: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l358
_("Failed to allocate utun device name\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l369
_("Failed to connect utun unit: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l388
_("Invalid interface name '%s'; must match 'tun%%d'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l398
_("Cannot open '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l437
_("TUNSIFHEAD");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l479
_("socketpair failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l484
_("fork failed: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l488
_("setpgid");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l493
_("execl");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l498
_("(script)");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l541
_("Unknown packet (len %d) received: %02x %02x %02x %02x...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/tun.c#l558
_("Failed to write incoming packet: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l45
_("Failed to open %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l52
_("Failed to fstat() %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l62
_("Failed to allocate %d bytes for %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l70
_("Failed to read %s: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l124
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l149
_("Treating host \"%s\" as a raw hostname\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l131
_("Failed to SHA1 existing file\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l139
_("XML config file SHA1: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l147
_("Failed to parse XML config file %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l184
_("Host \"%s\" has address \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l194
_("Host \"%s\" has UserGroup \"%s\"\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/xml.c#l208
_("Host \"%s\" not listed in config; treating as raw hostname\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l80
_("Failed to send \"%s\" to ykneo-oath applet: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l87
_("Invalid short response to \"%s\" from ykneo-oath applet\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l104
_("Failure response to \"%s\": %04x\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l158
_("select applet command");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l169
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l410
_("Unrecognised response from ykneo-oath applet\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l185
_("Found ykneo-oath applet v%d.%d.%d.\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l206
_("PIN required for Yubikey OATH applet");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l211
_("Yubikey PIN:");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l239
_("Failed to calculate Yubikey unlock response\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l256
_("unlock command");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l289
_("Trying truncated-char PBKBF2 variant of Yubikey PIN\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l328
_("Failed to establish PC/SC context: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l333
_("Established PC/SC context\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l339
// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l351
_("Failed to query reader list: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l378
_("Failed to connect to PC/SC reader '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l383
_("Connected PC/SC reader '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l388
_("Failed to obtain exclusive access to reader '%s': %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l398
_("list keys command");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l431
_("Found %s/%s key '%s' on '%s'\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l448
_(""
"Token '%s' not found on Yubikey '%s'. Searching for another Yubikey...\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l497
_("Server is rejecting the Yubikey token; switching to manual entry\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l551
_("Generating Yubikey token code\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l556
_("Failed to obtain exclusive access to Yubikey: %s\n");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l600
_("calculate command");

// http://git.infradead.org/users/dwmw2/openconnect.git/blob/8f43252839:/yubikey.c#l608
_("Unrecognised response from Yubikey when generating tokencode\n");
