Lines Matching refs:gettext

99 		(void) fprintf(stderr, gettext("Usage:\t"  in usage()
101 (void) fprintf(stderr, gettext(" \tikeadm help\n")); in usage()
104 gettext("\nType help for usage info\n")); in usage()
113 (void) printf(gettext("Valid commands and objects:\n")); in print_help()
116 gettext("identifier")); in print_help()
117 (void) printf("\tset priv %s\n", gettext("level")); in print_help()
119 gettext("level"), gettext("filename")); in print_help()
121 gettext("definition"), gettext("filename")); in print_help()
122 (void) printf("\tdel p1|rule|preshared %s\n", gettext("identifier")); in print_help()
126 (void) printf("\tread rule|preshared [%s]\n", gettext("filename")); in print_help()
127 (void) printf("\twrite rule|preshared %s\n", gettext("filename")); in print_help()
129 gettext("<PKCS#11 Token Object>")); in print_help()
132 (void) printf("\texit %s\n", gettext("exit the program")); in print_help()
133 (void) printf("\tquit %s\n", gettext("exit the program")); in print_help()
142 gettext("This command gets information from in.iked.\n\n")); in print_get_help()
143 (void) printf(gettext("Objects that may be retrieved include:\n")); in print_get_help()
145 (void) printf(gettext("the current debug level\n")); in print_get_help()
147 (void) printf(gettext("the current privilege level\n")); in print_get_help()
149 (void) printf(gettext("current usage statistics\n")); in print_get_help()
151 (void) printf(gettext("a phase 1 SA, identified by\n")); in print_get_help()
152 (void) printf(gettext("\t\t\t local_ip remote_ip OR\n")); in print_get_help()
153 (void) printf(gettext("\t\t\t init_cookie resp_cookie\n")); in print_get_help()
155 (void) printf(gettext("a phase 1 rule, identified by its label\n")); in print_get_help()
157 (void) printf(gettext("a preshared key, identified by\n")); in print_get_help()
158 (void) printf(gettext("\t\t\t local_ip remote_ip OR\n")); in print_get_help()
159 (void) printf(gettext("\t\t\t local_id remote_id\n")); in print_get_help()
168 (void) printf(gettext("This command sets values in in.iked.\n\n")); in print_set_help()
169 (void) printf(gettext("Objects that may be set include:\n")); in print_set_help()
171 (void) printf(gettext("change the debug level\n")); in print_set_help()
174 gettext("change the privilege level (may only be lowered)\n")); in print_set_help()
184 gettext("This command adds items to in.iked's tables.\n\n")); in print_add_help()
185 (void) printf(gettext("Objects that may be set include:\n")); in print_add_help()
187 (void) printf(gettext("a phase 1 policy rule\n")); in print_add_help()
189 (void) printf(gettext("a preshared key\n")); in print_add_help()
191 gettext("\nObjects may be entered on the command-line, as a\n")); in print_add_help()
193 gettext("series of keywords and tokens contained in curly\n")); in print_add_help()
195 gettext("braces ('{', '}'); or the name of a file containing\n")); in print_add_help()
196 (void) printf(gettext("the object definition may be provided.\n\n")); in print_add_help()
198 gettext("For security purposes, preshared keys may only be\n")); in print_add_help()
200 gettext("entered on the command-line if ikeadm is running in\n")); in print_add_help()
201 (void) printf(gettext("interactive mode.\n")); in print_add_help()
211 gettext("This command deletes an item from in.iked's tables.\n\n")); in print_del_help()
212 (void) printf(gettext("Objects that may be deleted include:\n")); in print_del_help()
214 (void) printf(gettext("a phase 1 SA, identified by\n")); in print_del_help()
215 (void) printf(gettext("\t\t\t local_ip remote_ip OR\n")); in print_del_help()
216 (void) printf(gettext("\t\t\t init_cookie resp_cookie\n")); in print_del_help()
218 (void) printf(gettext("a phase 1 rule, identified by its label\n")); in print_del_help()
220 (void) printf(gettext("a preshared key, identified by\n")); in print_del_help()
221 (void) printf(gettext("\t\t\t local_ip remote_ip OR\n")); in print_del_help()
222 (void) printf(gettext("\t\t\t local_id remote_id\n")); in print_del_help()
232 gettext("This command dumps one of in.iked's tables.\n\n")); in print_dump_help()
233 (void) printf(gettext("Tables that may be dumped include:\n")); in print_dump_help()
235 (void) printf(gettext("all phase 1 SAs\n")); in print_dump_help()
237 (void) printf(gettext("all phase 1 rules\n")); in print_dump_help()
239 (void) printf(gettext("all preshared keys\n")); in print_dump_help()
241 (void) printf(gettext("all cached certificates\n")); in print_dump_help()
243 (void) printf(gettext("all implemented Diffie-Hellman groups\n")); in print_dump_help()
245 (void) printf(gettext("all encryption algorithms for IKE\n")); in print_dump_help()
247 (void) printf(gettext("all authentication algorithms IKE\n")); in print_dump_help()
257 gettext("This command clears one of in.iked's tables.\n\n")); in print_flush_help()
258 (void) printf(gettext("Tables that may be flushed include:\n")); in print_flush_help()
260 (void) printf(gettext("all phase 1 SAs\n")); in print_flush_help()
262 (void) printf(gettext("all cached certificates\n")); in print_flush_help()
272 gettext("This command reads a new configuration file into\n")); in print_read_help()
274 gettext("in.iked, discarding the old configuration info.\n\n")); in print_read_help()
275 (void) printf(gettext("Sets of data that may be read include:\n")); in print_read_help()
277 (void) printf(gettext("all phase 1 rules\n")); in print_read_help()
279 (void) printf(gettext("all preshared keys\n\n")); in print_read_help()
281 gettext("A filename may be provided to specify a source file\n")); in print_read_help()
282 (void) printf(gettext("other than the default.\n")); in print_read_help()
292 gettext("This command writes in.iked's current configuration\n")); in print_write_help()
293 (void) printf(gettext("out to a config file.\n\n")); in print_write_help()
294 (void) printf(gettext("Sets of data that may be written include:\n")); in print_write_help()
296 (void) printf(gettext("all phase 1 rules\n")); in print_write_help()
298 (void) printf(gettext("all preshared keys\n\n")); in print_write_help()
300 gettext("A filename must be provided to specify the file to\n")); in print_write_help()
301 (void) printf(gettext("which the information should be written.\n")); in print_write_help()
310 (void) printf(gettext( in print_token_help()
312 (void) printf(gettext("Commands include:\n")); in print_token_help()
314 (void) printf(gettext("log into token\n")); in print_token_help()
316 (void) printf(gettext("log out of token\n\n")); in print_token_help()
318 gettext("The PKCS#11 Token Object name must be " in print_token_help()
329 gettext("This command provides information about commands.\n\n")); in print_help_help()
331 gettext("The 'help' command alone provides a list of valid\n")); in print_help_help()
333 gettext("commands, along with the valid objects for each.\n")); in print_help_help()
335 gettext("'help' followed by a valid command name provides\n")); in print_help_help()
336 (void) printf(gettext("further information about that command.\n")); in print_help_help()
351 (void) fprintf(stderr, gettext("ikeadm: %s\n"), msgbuf); in message()
383 gettext("Unable to communicate with in.iked\n")); in ikedoor_call()
524 message(gettext("Unrecognized command '%s'"), cmdstr); in parsecmd()
536 message(gettext("Unrecognized object '%s'"), objstr); in parsecmd()
639 message(gettext("Unknown address %s."), argv[0]); in parse_addr()
779 message(gettext("unknown identity type %s."), argv[0]); in parse_ident()
805 message(gettext("failed to parse cookie %s."), argv[0]); in parse_cky()
1157 message(gettext("preshared key identifier cannot " in parse_ps()
1188 message(gettext("preshared key identifier cannot " in parse_ps()
1256 return (gettext("No data returned")); in errstr()
1258 return (gettext("No destination provided")); in errstr()
1260 return (gettext("Id info invalid")); in errstr()
1262 return (gettext("Destination invalid")); in errstr()
1264 return (gettext("Command invalid")); in errstr()
1266 return (gettext("Supplied data invalid")); in errstr()
1268 return (gettext("Unknown command")); in errstr()
1270 return (gettext("Request invalid")); in errstr()
1272 return (gettext("Not allowed at current privilege level")); in errstr()
1274 return (gettext("User not authorized")); in errstr()
1276 return (gettext("System error")); in errstr()
1278 return (gettext("One or more duplicate entries ignored")); in errstr()
1280 return (gettext( in errstr()
1283 return (gettext( in errstr()
1286 return (gettext( in errstr()
1290 gettext("<unknown error %d>"), err); in errstr()
1302 return (gettext("Certificate management")); in dbgstr()
1304 return (gettext("Key management")); in dbgstr()
1306 return (gettext("Operational")); in dbgstr()
1308 return (gettext("Phase 1 SA creation")); in dbgstr()
1310 return (gettext("Phase 2 SA creation")); in dbgstr()
1312 return (gettext("PF_KEY interface")); in dbgstr()
1314 return (gettext("Policy management")); in dbgstr()
1316 return (gettext("Proposal construction")); in dbgstr()
1318 return (gettext("Door interface")); in dbgstr()
1320 return (gettext("Config file processing")); in dbgstr()
1322 return (gettext("MAC label processing")); in dbgstr()
1325 gettext("<unknown flag 0x%x>"), bit); in dbgstr()
1337 return (gettext("base privileges")); in privstr()
1339 return (gettext("access to preshared key information")); in privstr()
1341 return (gettext("access to keying material")); in privstr()
1344 gettext("<unknown level %d>"), priv); in privstr()
1356 return (gettext("<unspecified>")); in xchgstr()
1358 return (gettext("base")); in xchgstr()
1360 return (gettext("main mode (identity protect)")); in xchgstr()
1362 return (gettext("authentication only")); in xchgstr()
1364 return (gettext("aggressive mode")); in xchgstr()
1366 return (gettext("main and aggressive mode")); in xchgstr()
1368 return (gettext("any mode")); in xchgstr()
1371 gettext("<unknown %d>"), xchg); in xchgstr()
1383 return (gettext("INITIALIZING")); in statestr()
1385 return (gettext("SENT FIRST MSG (SA)")); in statestr()
1387 return (gettext("SENT SECOND MSG (KE)")); in statestr()
1389 return (gettext("SENT FINAL MSG")); in statestr()
1391 return (gettext("ACTIVE")); in statestr()
1393 return (gettext("DELETED")); in statestr()
1395 return (gettext("<invalid>")); in statestr()
1398 gettext("<unknown %d>"), state); in statestr()
1410 return (gettext("pre-shared key")); in authmethstr()
1412 return (gettext("DSS signatures")); in authmethstr()
1414 return (gettext("RSA signatures")); in authmethstr()
1416 return (gettext("RSA Encryption")); in authmethstr()
1418 return (gettext("Revised RSA Encryption")); in authmethstr()
1421 gettext("<unknown %d>"), meth); in authmethstr()
1433 return (gettext("<none/unavailable>")); in prfstr()
1446 gettext("<unknown %d>"), prf); in prfstr()
1458 return (gettext("<unavailable>")); in dhstr()
1460 return (gettext("768-bit MODP (group 1)")); in dhstr()
1462 return (gettext("1024-bit MODP (group 2)")); in dhstr()
1464 return (gettext("EC2N group on GP[2^155]")); in dhstr()
1466 return (gettext("EC2N group on GP[2^185]")); in dhstr()
1468 return (gettext("1536-bit MODP (group 5)")); in dhstr()
1470 return (gettext("2048-bit MODP (group 14)")); in dhstr()
1472 return (gettext("3072-bit MODP (group 15)")); in dhstr()
1474 return (gettext("4096-bit MODP (group 16)")); in dhstr()
1476 return (gettext("6144-bit MODP (group 17)")); in dhstr()
1478 return (gettext("8192-bit MODP (group 18)")); in dhstr()
1480 return (gettext("256-bit ECP (group 19)")); in dhstr()
1482 return (gettext("384-bit ECP (group 20)")); in dhstr()
1484 return (gettext("521-bit ECP (group 21)")); in dhstr()
1487 gettext("1024-bit MODP with 160-bit subprime (group 22)")); in dhstr()
1490 gettext("2048-bit MODP with 224-bit subprime (group 23)")); in dhstr()
1493 gettext("2048-bit MODP with 256-bit subprime (group 24)")); in dhstr()
1495 return (gettext("192-bit ECP (group 25)")); in dhstr()
1497 return (gettext("224-bit ECP (group 26)")); in dhstr()
1499 (void) snprintf(rtn, MAXLINESIZE, gettext("<unknown %d>"), grp); in dhstr()
1512 gettext("%s Cookies: Initiator 0x%llx Responder 0x%llx\n"), in print_hdr()
1515 (void) printf(gettext("%s The local host is the %s.\n"), prefix, in print_hdr()
1516 hdrp->p1hdr_isinit ? gettext("initiator") : gettext("responder")); in print_hdr()
1517 (void) printf(gettext("%s ISAKMP version %d.%d; %s exchange\n"), prefix, in print_hdr()
1519 (void) printf(gettext("%s Current state is %s\n"), prefix, in print_hdr()
1524 (void) printf(gettext("%s Dead Peer Detection (RFC 3706)" in print_hdr()
1532 (void) strlcpy(tbuf, gettext("<time conversion failed>"), in print_hdr()
1535 (void) printf(gettext("\n%s Dead Peer Detection handshake "), prefix); in print_hdr()
1538 (void) strlcpy(sbuf, gettext("was successful at "), TBUF_SIZE); in print_hdr()
1541 (void) strlcpy(sbuf, gettext("failed at "), TBUF_SIZE); in print_hdr()
1544 (void) strlcpy(sbuf, gettext("is in progress."), TBUF_SIZE); in print_hdr()
1558 (void) printf(gettext("%s Lifetime limits:\n"), prefix); in print_lt_limits()
1559 (void) printf(gettext("%s %u seconds%s; %u kbytes %sprotected\n"), in print_lt_limits()
1564 (void) printf(gettext("%s keying material for IPsec SAs can be " in print_lt_limits()
1577 (void) printf(gettext("%s Current usage:\n"), prefix); in print_lt_usage()
1580 (void) strlcpy(tbuf, gettext("<time conversion failed>"), in print_lt_usage()
1582 (void) printf(gettext("%s SA was created at %s\n"), prefix, tbuf); in print_lt_usage()
1583 (void) printf(gettext("%s %u kbytes %sprotected\n"), in print_lt_usage()
1587 (void) printf(gettext("%s keying material for IPsec SAs provided " in print_lt_usage()
1594 (void) printf(gettext("%s Authentication method: %s"), prefix, in print_xform()
1596 (void) printf(gettext("\n%s Encryption alg: "), prefix); in print_xform()
1599 (void) printf(gettext("(%d..%d)"), xfp->p1xf_encr_low_bits, in print_xform()
1607 (void) printf(gettext("(%d)"), xfp->p1xf_encr_high_bits); in print_xform()
1609 (void) printf(gettext("; Authentication alg: ")); in print_xform()
1613 (void) printf(gettext("PRF: %s ; "), prfstr(xfp->p1xf_prf)); in print_xform()
1614 (void) printf(gettext("Oakley Group: %s\n"), in print_xform()
1617 (void) printf(gettext("%s Phase 2 PFS is not used\n"), prefix); in print_xform()
1619 (void) printf(gettext( in print_xform()
1652 (void) printf(gettext("%s Expiration info:\n"), prefix); in print_lifetime()
1655 (void) printf(gettext("%s %u more bytes %scan be " in print_lifetime()
1663 (void) printf(gettext("%s Keying material can be provided " in print_lifetime()
1672 gettext("<time conversion failed>"), TBUF_SIZE); in print_lifetime()
1678 (void) printf(gettext( in print_lifetime()
1682 (void) printf(gettext("%s Time of expiration: %s\n"), in print_lifetime()
1685 (void) printf(gettext("%s SA Expired at %s\n"), in print_lifetime()
1701 (void) printf(gettext("%s %u Quick Mode SAs created; "), prefix, in print_p1stats()
1703 (void) printf(gettext("%u Quick Mode SAs deleted\n"), in print_p1stats()
1720 (void) printf(gettext("%s %u RX errors: "), prefix, in print_errs()
1722 (void) printf(gettext("%u decryption, %u hash, %u other\n"), in print_errs()
1724 (void) printf(gettext("%s %u TX errors\n"), prefix, errp->p1err_tx); in print_errs()
1739 (void) printf(gettext("%s invalid address range\n"), prefix); in print_addr_range()
1758 (void) printf(gettext("%s invalid address range\n"), prefix); in print_addr_range()
1785 (void) printf(gettext("%s Address"), prefix); in print_addr()
1789 gettext("Initiator") : gettext("Responder")); in print_addr()
1805 (void) printf(gettext("%s Initiator identity, "), prefix); in print_id()
1808 (void) printf(gettext("%s Responder identity, "), prefix); in print_id()
1811 (void) printf(gettext("%s Identity, "), prefix); in print_id()
1814 (void) printf(gettext("<invalid identity>\n")); in print_id()
1817 (void) printf(gettext("uid=%d, type "), idp->sadb_ident_id); in print_id()
1822 (void) printf(gettext("\n%s "), prefix); in print_id()
1834 (void) printf(gettext("%s Identity descriptors:\n"), prefix); in print_idspec()
1838 (void) printf(gettext("%s Includes:\n"), prefix); in print_idspec()
1845 (void) printf(gettext("%s Excludes:\n"), prefix); in print_idspec()
1871 (void) printf(gettext("Short key\n")); in print_keys()
1877 (void) printf(gettext("%s Pre-shared key (%d bytes): "), in print_keys()
1881 (void) printf(gettext("%s SKEYID (%d bytes): "), in print_keys()
1885 (void) printf(gettext("%s SKEYID_d (%d bytes): "), in print_keys()
1889 (void) printf(gettext("%s SKEYID_a (%d bytes): "), in print_keys()
1893 (void) printf(gettext("%s SKEYID_e (%d bytes): "), in print_keys()
1897 (void) printf(gettext("%s Encryption key (%d bytes): "), in print_keys()
1902 gettext("%s Initialization vector (%d bytes): "), in print_keys()
1906 (void) printf(gettext("%s Unidentified key info %p %d"), in print_keys()
1922 (void) printf(gettext("\nList of Diffie-Hellman groups for setting " in print_group_header()
1924 (void) printf(gettext("\nThe values match the IPsec attribute " in print_group_header()
1927 gettext("Value"), gettext("Strength"), gettext("Description")); in print_group_header()
1940 (void) printf(gettext("\nList of encryption algorithms for IKE")); in print_encralg_header()
1941 (void) printf(gettext("\nThe values match the IPsec attribute " in print_encralg_header()
1943 (void) printf("%-6s%-20s%-15s\n", gettext("Value"), in print_encralg_header()
1944 gettext("Name"), gettext("Keylen range")); in print_encralg_header()
1963 (void) printf(gettext("\nList of authentication algorithms for IKE")); in print_authalg_header()
1964 (void) printf(gettext("\nThe values match the IPsec attribute " in print_authalg_header()
1966 (void) printf("%-6s%-20s\n", gettext("Value"), gettext("Name")); in print_authalg_header()
2036 (void) printf(gettext("CERTIFICATE CACHE ID: %d\n"), c->cache_id); in print_certcache()
2037 (void) printf(gettext("\tSubject Name: <%s>\n"), in print_certcache()
2038 (*c->subject != '\0') ? c->subject : gettext("Name unavailable")); in print_certcache()
2039 (void) printf(gettext("\t Issuer Name: <%s>\n"), in print_certcache()
2040 (*c->issuer != '\0') ? c->issuer : gettext("Name unavailable")); in print_certcache()
2042 (void) printf(gettext("\t\t[trusted certificate]\n")); in print_certcache()
2045 (void) printf(gettext("\t\t[Public certificate only]\n")); in print_certcache()
2046 (void) printf(gettext( in print_certcache()
2050 (void) printf(gettext("\t\t[Public certificate only]\n")); in print_certcache()
2053 (void) printf(gettext( in print_certcache()
2057 (void) printf(gettext("\t\t[Private key available]\n")); in print_certcache()
2070 (void) printf(gettext("PSKEY: For %s exchanges\n"), in print_ps()
2075 (void) printf(gettext("PSKEY: Pre-shared key (%d bytes): "), in print_ps()
2118 (void) printf(gettext("GLOBL: Label '%s', key manager cookie %u\n"), in print_rule()
2120 (void) printf(gettext("GLOBL: local_idtype=")); in print_rule()
2122 (void) printf(gettext(", ike_mode=%s\n"), xchgstr(rp->rule_ike_mode)); in print_rule()
2123 (void) printf(gettext( in print_rule()
2126 (rp->rule_p2_pfs) ? gettext("true") : gettext("false"), in print_rule()
2129 gettext("GLOBL: p2_lifetime=%u seconds%s\n"), in print_rule()
2133 gettext("GLOBL: p2_softlife=%u seconds%s\n"), in print_rule()
2137 gettext("GLOBL: p2_idletime=%u seconds%s\n"), in print_rule()
2145 gettext("GLOBL: p2_lifetime_kb=%u kilobytes%s\n"), in print_rule()
2150 gettext("GLOBL: p2_softlife_kb=%u kilobytes%s\n"), in print_rule()
2156 (void) printf(gettext("LOCIP: IP address range(s):\n")); in print_rule()
2164 (void) printf(gettext("REMIP: IP address range(s):\n")); in print_rule()
2184 (void) printf(gettext("XFRMS: Available Transforms:\n")); in print_rule()
2196 (void) printf(gettext("initiator: %10u responder: %10u\n"), \
2208 (void) printf(gettext("Phase 1 SA counts:\n")); in print_stats()
2209 (void) printf(gettext("Current: ")); in print_stats()
2215 (void) printf(gettext("Total: ")); in print_stats()
2221 (void) printf(gettext("Attempted: ")); in print_stats()
2227 (void) printf(gettext("Failed: ")); in print_stats()
2231 gettext(" initiator fails include %u time-out(s)\n"), in print_stats()
2237 (void) printf(gettext("PKCS#11 library linked in from %s\n"), in print_stats()
2247 (current != def) ? gettext("config") : gettext("default"), in print_defaults()
2264 (void) printf(gettext("\nGlobal defaults. Some values can be" in do_print_defaults()
2266 (void) printf(gettext("\nSystem defaults are time delayed.\n\n")); in do_print_defaults()
2269 gettext("Token:"), gettext("Source:"), gettext("Value:"), in do_print_defaults()
2270 gettext("Unit:"), gettext("Description:")); in do_print_defaults()
2273 print_defaults("p1_lifetime_secs", gettext("phase 1 lifetime"), in do_print_defaults()
2274 gettext("seconds"), ddp->rule_p1_lifetime_secs, in do_print_defaults()
2277 print_defaults("-", gettext("minimum phase 1 lifetime"), in do_print_defaults()
2278 gettext("seconds"), ddp->rule_p1_minlife, in do_print_defaults()
2281 print_defaults("p1_nonce_len", gettext("phase 1 nonce length"), in do_print_defaults()
2282 gettext("bytes"), ddp->rule_p1_nonce_len, in do_print_defaults()
2285 print_defaults("p2_lifetime_secs", gettext("phase 2 lifetime"), in do_print_defaults()
2286 gettext("seconds"), ddp->rule_p2_lifetime_secs, in do_print_defaults()
2289 print_defaults("p2_softlife_secs", gettext("phase 2 soft lifetime"), in do_print_defaults()
2290 gettext("seconds"), ddp->rule_p2_softlife_secs, in do_print_defaults()
2293 print_defaults("p2_idletime_secs", gettext("phase 2 idle time"), in do_print_defaults()
2294 gettext("seconds"), ddp->rule_p2_idletime_secs, in do_print_defaults()
2297 print_defaults("p2_lifetime_kb", gettext("phase 2 lifetime"), in do_print_defaults()
2298 gettext("kilobytes"), ddp->rule_p2_lifetime_kb, in do_print_defaults()
2301 print_defaults("p2_softlife_kb", gettext("phase 2 soft lifetime"), in do_print_defaults()
2302 gettext("kilobytes"), ddp->rule_p2_softlife_kb, in do_print_defaults()
2306 print_defaults("-", gettext("system phase 2 lifetime"), in do_print_defaults()
2307 gettext("seconds"), ddp->sys_p2_lifetime_secs, in do_print_defaults()
2310 print_defaults("-", gettext("system phase 2 soft lifetime"), in do_print_defaults()
2311 gettext("seconds"), ddp->sys_p2_softlife_secs, in do_print_defaults()
2314 print_defaults("-", gettext("system phase 2 idle time"), in do_print_defaults()
2315 gettext("seconds"), ddp->sys_p2_idletime_secs, in do_print_defaults()
2318 print_defaults("-", gettext("system phase 2 lifetime"), in do_print_defaults()
2319 gettext("bytes"), ddp->sys_p2_lifetime_bytes, in do_print_defaults()
2322 print_defaults("-", gettext("system phase 2 soft lifetime"), in do_print_defaults()
2323 gettext("bytes"), ddp->sys_p2_softlife_bytes, in do_print_defaults()
2327 print_defaults("-", gettext("minimum phase 2 hard lifetime"), in do_print_defaults()
2328 gettext("seconds"), ddp->rule_p2_minlife_hard_secs, in do_print_defaults()
2331 print_defaults("-", gettext("minimum phase 2 soft lifetime"), in do_print_defaults()
2332 gettext("seconds"), ddp->rule_p2_minlife_soft_secs, in do_print_defaults()
2335 print_defaults("-", gettext("minimum phase 2 idle lifetime"), in do_print_defaults()
2336 gettext("seconds"), ddp->rule_p2_minlife_idle_secs, in do_print_defaults()
2339 print_defaults("-", gettext("minimum phase 2 hard lifetime"), in do_print_defaults()
2340 gettext("kilobytes"), ddp->rule_p2_minlife_hard_kb, in do_print_defaults()
2343 print_defaults("-", gettext("minimum phase 2 soft lifetime"), in do_print_defaults()
2344 gettext("kilobytes"), ddp->rule_p2_minlife_soft_kb, in do_print_defaults()
2347 print_defaults("-", gettext("minimum phase 2 delta"), in do_print_defaults()
2348 gettext("seconds"), ddp->rule_p2_mindiff_secs, in do_print_defaults()
2351 print_defaults("-", gettext("minimum phase 2 delta"), in do_print_defaults()
2352 gettext("kilobytes"), ddp->rule_p2_mindiff_kb, in do_print_defaults()
2355 print_defaults("-", gettext("maximum phase 2 lifetime"), in do_print_defaults()
2356 gettext("seconds"), ddp->rule_p2_maxlife_secs, in do_print_defaults()
2359 print_defaults("-", gettext("conversion factor"), in do_print_defaults()
2360 gettext("kbytes/s"), ddp->conversion_factor, in do_print_defaults()
2363 print_defaults("-", gettext("maximum phase 2 lifetime"), in do_print_defaults()
2364 gettext("kilobytes"), ddp->rule_p2_maxlife_kb, in do_print_defaults()
2368 print_defaults("p2_nonce_len", gettext("phase 2 nonce length"), in do_print_defaults()
2369 gettext("bytes"), ddp->rule_p2_nonce_len, in do_print_defaults()
2372 print_defaults("p2_pfs", gettext("phase 2 PFS"), in do_print_defaults()
2375 print_defaults("max_certs", gettext("max certificates"), in do_print_defaults()
2378 print_defaults("-", gettext("IKE port number"), in do_print_defaults()
2381 print_defaults("-", gettext("NAT-T port number"), in do_print_defaults()
2391 (void) printf(gettext("No debug categories enabled.\n")); in print_categories()
2395 (void) printf(gettext("Debug categories enabled:")); in print_categories()
2415 gettext("<unknown error>") : strerror(err->ike_err_unix)); in ikeadm_err_exit()
2418 gettext("<unknown error>") : errstr(err->ike_err)); in ikeadm_err_exit()
2434 gettext("<unknown error>") : in ikeadm_err_msg()
2436 gettext("Duplicate entry") : in ikeadm_err_msg()
2440 gettext("<unknown error>") : errstr(err->ike_err)); in ikeadm_err_msg()
2462 varname = gettext("debug"); in do_getvar()
2465 varname = gettext("privilege"); in do_getvar()
2468 bail_msg(gettext("unrecognized get command (%d)"), cmd); in do_getvar()
2479 gettext("error getting %s level"), varname); in do_getvar()
2482 (void) printf(gettext("Current %s level is 0x%x"), in do_getvar()
2489 (void) printf(gettext(", %s enabled\n"), in do_getvar()
2508 Bail(gettext("Must specify PKCS#11 token object.")); in do_setdel_pin()
2529 bail_msg(gettext("unrecognized token command (%d)"), cmd); in do_setdel_pin()
2540 gettext("PKCS#11 operation")); in do_setdel_pin()
2543 message(gettext("PKCS#11 operation successful")); in do_setdel_pin()
2564 varname = gettext("debug"); in do_setvar()
2570 bail_msg(gettext("Bad debug flag: %s"), argv[0]); in do_setvar()
2576 varname = gettext("privilege"); in do_setvar()
2582 bail_msg(gettext("Bad privilege flag: %s"), argv[0]); in do_setvar()
2585 bail_msg(gettext("unrecognized set command (%d)"), cmd); in do_setvar()
2607 gettext("error setting %s level"), varname); in do_setvar()
2611 gettext("Successfully changed %s level from 0x%x to 0x%x\n"), in do_setvar()
2617 (void) printf(gettext("New privilege level 0x%x enables %s\n"), in do_setvar()
2633 ikeadm_err_exit(&rtn->svc_err, gettext("error getting stats")); in do_getstats()
2653 gettext("error getting defaults")); in do_getdefs()
2680 name = gettext("phase 1 SA info"); in do_dump()
2683 name = gettext("policy rules"); in do_dump()
2686 name = gettext("preshared keys"); in do_dump()
2689 name = gettext("certcache"); in do_dump()
2692 name = gettext("groups"); in do_dump()
2696 name = gettext("encralgs"); in do_dump()
2700 name = gettext("authalgs"); in do_dump()
2704 bail_msg(gettext("unrecognized dump command (%d)"), cmd); in do_dump()
2720 gettext("error getting %s"), name); in do_dump()
2754 (void) printf(gettext("\nCompleted dump of %s\n"), name); in do_dump()
2792 message(gettext("Could not find requested %s."), name); in do_getdel_doorcall()
2794 ikeadm_err_msg(&rtnp->svc_err, gettext("error %s %s"), in do_getdel_doorcall()
2795 (getcmd) ? gettext("getting") : gettext("deleting"), in do_getdel_doorcall()
2816 message(gettext("Successfully deleted selected %s."), name); in do_getdel_doorcall()
2842 name = gettext("phase 1 SA"); in do_getdel()
2865 name = gettext("policy rule"); in do_getdel()
2875 name = gettext("preshared key"); in do_getdel()
2895 bail_msg(gettext("unrecognized get/del command (%d)"), cmd); in do_getdel()
2943 bail_msg(gettext("invalid %s identification\n"), name); in do_getdel()
2998 name = gettext("preshared key"); in do_new()
3001 name = gettext("policy rule"); in do_new()
3004 bail_msg(gettext("unrecognized new command (%d)"), cmd); in do_new()
3071 bail_msg(gettext("improperly formatted %s"), name); in do_new()
3145 bail_msg(gettext("missing %s description or file name"), name); in do_new()
3152 gettext("error creating new %s"), name); in do_new()
3154 message(gettext("Successfully created new %s."), name); in do_new()
3165 bail_msg(gettext("unrecognized flush command (%d)."), cmd); in do_flush()
3172 ikeadm_err_exit(&rtnp->svc_err, gettext("error doing flush")); in do_flush()
3175 message(gettext("Successfully flushed P1 SAs.")); in do_flush()
3177 message(gettext("Successfully flushed cert cache.")); in do_flush()
3192 obj = gettext("preshared key"); in do_rw()
3196 obj = gettext("policy rule"); in do_rw()
3197 op = gettext("read"); in do_rw()
3203 obj = gettext("preshared key"); in do_rw()
3207 obj = gettext("policy rule"); in do_rw()
3208 op = gettext("write"); in do_rw()
3214 bail_msg(gettext("destination location required " in do_rw()
3221 bail_msg(gettext("unrecognized read/write command (%d)."), cmd); in do_rw()
3256 message(gettext("No %s information to write."), in do_rw()
3261 ikeadm_err_exit(&rtnp->svc_err, gettext("error doing %s"), op); in do_rw()
3263 message(gettext("Completed %s of %s configuration information."), in do_rw()
3277 ikeadm_err_exit(&rtnp->svc_err, gettext("error doing flush")); in do_rbdump()
3279 message(gettext("Successfully dumped rulebase; check iked dbg")); in do_rbdump()
3461 gettext("Unable to communicate with in.iked\n")); in main()