Sample details: 22b6dbca946526dde98bd8541afde7b3 --

Hashes
MD5: 22b6dbca946526dde98bd8541afde7b3
SHA1: e1e78d75f3a0a4918a14bd97d92be49eac0f3943
SHA256: 3b2af1244219cfcdfcea2f3e0f31c3b89879f09f0bae6dad8cf6d1547105528d
SSDEEP: 3072:kVYQ1lRhbnMl2NOKA6yOdrmVsSXqRlUexURuQqzfgTfb:kV9nwl2NOKhyOdtSarUStQIg
Details
File Type: PE32
Yara Hits
YRP/GCC_RealBasic_FreePascal_signII_ASL | YRP/IsPE32 | YRP/IsConsole | YRP/IsBeyondImageSize | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/Big_Numbers5 | YRP/CRC32_poly_Constant | YRP/CRC32_table | YRP/RijnDael_AES | YRP/BASE64_table |
Parent Files
04f50b7f721e3ae2bee5686a4cb584bd
Strings
		!This program cannot be run in DOS mode.
.idata
@(#)$OpenBSD: ssh.c,v 1.164 2002/02/14 23:28:00 markus Exp $
Usage: %s [options] host [command]
Options:
  -l user     Log in using this user name.
  -n          Redirect input from /dev/null.
.ssh/config
  -F config   Config file (default: ~/%s).
  -A          Enable authentication agent forwarding.
  -a          Disable authentication agent forwarding (default).
  -X          Enable X11 connection forwarding.
  -x          Disable X11 connection forwarding (default).
  -i file     Identity for public key authentication (default: ~/.ssh/identity)
  -t          Tty; allocate a tty even if command is given.
  -T          Do not allocate a tty.
  -v          Verbose; display verbose debugging messages.
              Multiple -v increases verbosity.
  -V          Display version number only.
  -P          Don't allocate a privileged port.
  -q          Quiet; don't display any warning messages.
  -f          Fork into background after authentication.
  -e char     Set escape character; ``none'' = disable (default: ~).
  -c cipher   Select encryption algorithm
  -m macs     Specify MAC algorithms for protocol version 2.
  -p port     Connect to this port.  Server must be on the same port.
  -L listen-port:host:port   Forward local port to remote address
  -R listen-port:host:port   Forward remote port to local address
              These cause %s to listen for connections on a port, and
              forward them to the other side by connecting to host:port.
  -D port     Enable dynamic application-level port forwarding.
  -C          Enable compression.
  -N          Do not execute a shell or command.
  -g          Allow remote hosts to connect to forwarded ports.
  -1          Force protocol version 1.
  -2          Force protocol version 2.
  -4          Use IPv4 only.
  -6          Use IPv6 only.
  -o 'option' Process the option as if it was read from a configuration file.
  -s          Invoke command (mandatory) as SSH2 subsystem.
  -b addr     Local IP address.
Using rsh.  WARNING: Connection will not be encrypted.
/usr/bin/rsh
setrlimit failed: %.100s
You don't exist, go away!
1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX
Warning: Identity file %s does not exist.
Too many identity files specified (max %d)
no support for smartcards.
Too high debugging level.
OpenSSH_3.1p1
%s, SSH protocols %d.%d/%d.%d, OpenSSL 0x%8.8lx
Bad escape character '%s'.
Unknown cipher type '%s'
3des-cbc
blowfish-cbc
Unknown mac type '%s'
Bad port '%s'
%5[0-9]:%255[^:]:%5[0-9]
%5[0-9]/%255[^/]/%5[0-9]
Bad forwarding specification '%s'
Bad forwarding port(s) '%s'
Bad dynamic port '%s'
socks4
command-line
You must specify a subsystem to invoke.
Cannot fork into background without a command to execute.
Pseudo-terminal will not be allocated because stdin is not a terminal.
Can't open user config file %.100s: %.100s
%.100s/%.100s
/etc/ssh_config
Rhosts Authentication disabled, originating port will not be trusted.
rsh_connect returned
/etc/ssh_host_key
/etc/ssh_host_dsa_key
/etc/ssh_host_rsa_key
%.100s%s%.100s
Could not create directory '%.200s'.
Secure connection to %.100s on port %hu refused; reverting to insecure method
Secure connection to %.100s refused; reverting to insecure method.
clear hostkey %d
80t-@80t(@80t#@
8*t-B8*t(B8*t#B
DISPLAY
localhost:
%.100s list unix:%s 2>/dev/null
%.100s list %.200s 2>/dev/null
x11_get_proto %s
%*s %511s %511s
MIT-MAGIC-COOKIE-1
Connections to local port %d forwarded to remote address %.200s:%d
Could not request local forwarding.
Connections to remote port %d forwarded to local address %.200s:%d
Requesting compression at level %d.
Compression level must be from 1 (fast) to 9 (slow, best).
Warning: Remote host refused compression.
Protocol error waiting for compression response.
Requesting pty.
Warning: Remote host failed or refused to allocate a pseudo tty.
Protocol error waiting for pty request response.
Requesting X11 forwarding with authentication spoofing.
Warning: Remote host denied X11 forwarding.
Protocol error waiting for X11 forwarding
Requesting authentication agent forwarding.
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Warning: Remote host denied authentication agent forwarding.
daemon() failed: %.200s
Sending command: %.*s
Requesting shell.
PShy=@
Request for subsystem '%.*s' failed on channel %d
ssh_session2_setup: id %d
pty-req
auth-agent-req@openssh.com
Sending subsystem: %.*s
subsystem
PShy=@
/dev/null
dup() in/out/err failed
client-session
session
ssh_session2_open: channel_new: %d
identity file %s type %d
@(#)$OpenBSD: sshconnect.c,v 1.119 2002/01/21 15:13:51 markus Exp $
Could not create pipes to communicate with the proxy: %.100s
Executing proxy command: %.500s
dup2 stdin
dup2 stdout
/bin/sh
fork failed: %.100s
80t-@80t(@80t#@
rresvport: af=%d %.100s
Allocated local port %d.
socket: %.100s
getaddrinfo: %s: %s
bind: %s: %s
ssh_connect: getuid %u geteuid %u anon %d
%s: %.100s: %s
Trying again...
ssh_connect: getnameinfo failed
Connecting to %.200s [%.100s] port %s.
ssh: connect to address %s port %s: %s
Connection established.
setsockopt SO_KEEPALIVE: %.100s
ssh_exchange_identification: read: %.100s
ssh_exchange_identification: Connection closed by remote host
ssh_exchange_identification: %s
SSH-%d.%d-%[^
Bad remote protocol version identification: '%.100s'
Remote protocol version %d.%d, remote software version %.100s
Remote machine has too old SSH software version.
Agent forwarding disabled for protocol 1.3
Protocol major versions differ: %d vs. %d
OpenSSH_3.1p1
SSH-%d.%d-%.100s
write: %.100s
Local version string %.100s
Please type 'yes' or 'no': 
Forcing accepting of host key for loopback/localhost.
check_host_key: getnameinfo failed
<no hostip for proxy command>
using hostkeyalias: %s
Host '%.200s' is known and matches the %s host key.
Found key in %s:%d
%s host key for IP address '%.128s' not in list of known hosts.
Failed to add the %s host key for IP address '%.128s' to the list of known hosts (%.30s).
Warning: Permanently added the %s host key for IP address '%.128s' to the list of known hosts.
No %s host key is known for %.200s and you have requested strict checking.
The authenticity of host '%.200s (%s)' can't be established.
%s key fingerprint is %s.
Are you sure you want to continue connecting (yes/no)? 
Failed to add the host to the list of known hosts (%.500s).
Warning: Permanently added '%.200s' (%s) to the list of known hosts.
is unknown
is unchanged
has a different value
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@       WARNING: POSSIBLE DNS SPOOFING DETECTED!          @
The %s host key for %s has changed,
and the key for the according IP address %s
%s. This could either mean that
DNS SPOOFING is happening or the IP address for the host
and its host key have changed at the same time.
Offending key for IP in %s:%d
@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the %s host key has just been changed.
The fingerprint for the %s key sent by the remote host is
Please contact your system administrator.
Add correct host key in %.100s to get rid of this message.
Offending key in %s:%d
%s host key for %.200s has changed and you have requested strict checking.
Password authentication is disabled to avoid man-in-the-middle attacks.
Agent forwarding is disabled to avoid man-in-the-middle attacks.
X11 forwarding is disabled to avoid man-in-the-middle attacks.
Port forwarding is disabled to avoid man-in-the-middle attacks.
Warning: the %s host key for '%.200s' differs from the key for the IP address '%.128s'
Offending key for IP in %s:%d
Matching host key in %s:%d
Exiting, you have requested strict checking.
Are you sure you want to continue connecting (yes/no)? 
8#t+C8#t&C8#t!C
@(#)$OpenBSD: sshconnect1.c,v 1.48 2002/02/11 16:15:46 markus Exp $
try_agent_authentication: BN_new failed
Trying RSA authentication via agent with '%.100s'
Server refused our key.
Protocol error during RSA authentication: %d
sshconnect1.c
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Received RSA challenge from server.
Authentication agent failed to decrypt challenge.
Sending response to RSA challenge.
RSA authentication accepted by server.
Protocol error waiting RSA auth response: %d
RSA authentication using agent refused.
respond_to_rsa_challenge: rsa_private_decrypt failed
respond_to_rsa_challenge: bad challenge length %d
Sending response to host key RSA challenge.
Trying RSA authentication with key '%.100s'
try_rsa_authentication: BN_new failed
Enter passphrase for RSA key '%.100s': 
no passphrase given, try next key
bad passphrase given, try again...
Bad passphrase.
RSA authentication refused.
80t-@80t(@80t#@
Trying rhosts or /etc/hosts.equiv with RSA host authentication.
Server refused our rhosts authentication or host key.
try_rhosts_rsa_authentication: BN_new failed
Received RSA challenge for host key from server.
Rhosts or /etc/hosts.equiv with RSA host authentication accepted by server.
Rhosts or /etc/hosts.equiv with RSA host authentication refused.
Doing challenge response authentication.
Protocol error: got %d in response to SSH_CMSG_AUTH_TIS
No challenge.
Response: 
Permission denied, please try again.
WARNING: Encryption is disabled! Reponse will be transmitted in clear text.
Protocol error: got %d in response to SSH_CMSG_AUTH_TIS_RESPONSE
80t-@80t(@80t#@
Doing password authentication.
WARNING: Encryption is disabled! Password will be transmitted in clear text.
Protocol error: got %d in response to passwd auth
80t-@80t(@80t#@
Waiting for server public key.
Warning: Server lies about size of server public key: actual size is %d bits vs. announced %d.
Warning: This may be due to an old implementation of ssh.
Warning: Server lies about size of server host key: actual size is %d bits vs. announced %d.
Received server public key (%d bits) and host key (%d bits).
Host key verification failed.
respond_to_rsa_challenge: BN_new failed
respond_to_rsa_challenge: host_key %d < server_key %d + SSH_KEY_BITS_RESERVED %d
respond_to_rsa_challenge: server_key %d < host_key %d + SSH_KEY_BITS_RESERVED %d
No valid SSH1 cipher, using %.100s instead.
Selected cipher type %.100s not supported by server.
Encryption type: %.100s
Sent encrypted session key.
Received encrypted confirmation.
ssh_userauth1: server supports no auth methods
Protocol error: got %d in response to SSH_CMSG_USER
Trying rhosts authentication.
Protocol error: got %d in response to rhosts auth
%.30s@%.128s's password: 
Permission denied.
@(#)$OpenBSD: sshconnect2.c,v 1.97 2002/02/25 16:33:27 markus Exp $
none,zlib
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
ssh-rsa,ssh-dss
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
Host key verification failed.
No valid ciphers for protocol version 2 given, using defaults.
done: ssh_kex2.
password
keyboard-interactive
publickey
hostbased
send SSH2_MSG_SERVICE_REQUEST
ssh-userauth
denied SSH2_MSG_SERVICE_ACCEPT: %d
service_accept: %s
buggy server: service_accept w/o service
sshconnect2.c
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
got SSH2_MSG_SERVICE_ACCEPT
ssh-connection
ssh_userauth2: internal error: cannot send userauth none request
ssh-userauth2 successful: method %s
Permission denied (%s).
we sent a %s packet, wait for reply
we did not send a packet, disable method
input_userauth_error: bad message during authentication: type %d
input_userauth_banner
input_userauth_success: no authentication context
input_userauth_failure: no authentication context
Authenticated with partial success.
authentications that can continue: %s
input_userauth_pk_ok: no authentication context
input_userauth_pk_ok: SSH_BUG_PKOK
input_userauth_pk_ok: pkalg %s blen %d lastkey %p hint %d
no last key or no sign cb
unknown pkalg %s
no key from blob. pkalg %s
input_userauth_pk_ok: type mismatch for decoded key (received %d, expected %d)
input_userauth_pk_ok: fp %s
key != last_key
Permission denied, please try again.
%.30s@%.128s's password: 
80t-@80t(@80t#@
clear_auth_state: key_free %p
sign_and_send_pubkey
sign_and_send_pubkey: cannot handle key
userauth_pubkey: internal error
send_pubkey_test
send_pubkey_test: cannot handle key
no such identity: %s
Enter passphrase for key '%.100s': 
no passphrase given, try next key
bad passphrase given, try again...
80t-@80t(@80t#@
userauth_pubkey_agent: no keys at all
userauth_pubkey_agent: no more keys
userauth_pubkey_agent: testing agent key %s
userauth_pubkey_agent: no message sent
try privkey: %s
try pubkey: %s
userauth_kbdint: disable: no info_req_seen
userauth_kbdint
input_userauth_info_req
input_userauth_info_req: no authentication context
input_userauth_info_req: num_prompts %d
80t-@80t(@80t#@
80t-@80t(@80t#@
80t-@80t(@80t#@
userauth_hostbased: no more client hostkeys
userauth_hostbased: cannot get local ipaddr/name
userauth_hostbased: chost %s
key_sign failed
80t-@80t(@80t#@
Unrecognized authentication method name: %s
start over, passed a different list %s
preferred %s
no more auth methods to try
authmethod_lookup %s
remaining preferred: %s
authmethod_is_enabled %s
next auth method to try is %s
80t-@80t(@80t#@
8(t-@8(t(@8(t#@
@(#)$OpenBSD: sshtty.c,v 1.3 2002/03/04 17:27:39 stevesk Exp $
tcsetattr
tcgetattr
@(#)$OpenBSD: readconf.c,v 1.95 2002/02/04 12:15:25 markus Exp $
nohostauthenticationforlocalhost
clearallforwardings
smartcarddevice
bindaddress
hostkeyalgorithms
preferredauthentications
dynamicforward
loglevel
numberofpasswordprompts
keepalive
compressionlevel
compression
stricthostkeychecking
checkhostip
batchmode
connectionattempts
userknownhostsfile2
globalknownhostsfile2
userknownhostsfile
globalknownhostsfile
escapechar
localforward
remoteforward
protocol
ciphers
cipher
proxycommand
hostkeyalias
hostname
identityfile2
identityfile
usersh
fallbacktorsh
tisauthentication
skeyauthentication
challengeresponseauthentication
hostbasedauthentication
rhostsrsaauthentication
dsaauthentication
pubkeyauthentication
rsaauthentication
kbdinteractivedevices
kbdinteractiveauthentication
passwordauthentication
rhostsauthentication
useprivilegedport
gatewayports
xauthlocation
forwardx11
forwardagent
Too many local forwards (max %d).
Too many remote forwards (max %d).
%s: line %d: Bad configuration option: %s
%.200s line %d: Missing yes/no argument.
%.200s line %d: Bad yes/no argument.
%.200s line %d: Missing yes/no/ask argument.
%.200s line %d: Bad yes/no/ask argument.
%.200s line %d: Missing argument.
%.200s line %d: Too many identity files specified (max %d).
%.200s line %d: Bad number.
<NONE>
%.200s line %d: Bad cipher '%s'.
%.200s line %d: Bad SSH2 cipher spec '%s'.
%.200s line %d: Bad SSH2 Mac spec '%s'.
%.200s line %d: Bad protocol 2 host key algorithms '%s'.
%.200s line %d: Bad protocol spec '%s'.
%.200s line %d: unsupported log level '%s'
%.200s line %d: Missing port argument.
%.200s line %d: Bad listen port.
%.200s line %d: Missing second argument.
%255[^:]:%5[0-9]
%255[^/]/%5[0-9]
%.200s line %d: Bad forwarding specification.
%.200s line %d: Bad forwarding port.
%.200s line %d: Badly formatted port number.
socks4
Applying options for %.100s
%.200s line %d: Bad escape character.
process_config_line: Unimplemented opcode %d
%.200s line %d: garbage at end of line; "%.200s".
8"t+B8"t&B8"t!B
8(t-@8(t(@8(t#@
80t-@80t(@80t#@
Reading configuration data %.200s
%s: terminating, %d bad configuration options
/usr/X11R6/bin/xauth
.ssh/identity
~/%.100s
.ssh/id_rsa
.ssh/id_dsa
/etc/ssh_known_hosts
~/.ssh/known_hosts
/etc/ssh_known_hosts2
~/.ssh/known_hosts2
@(#)$OpenBSD: clientloop.c,v 1.96 2002/02/06 14:55:15 markus Exp $
Sending eof.
client_check_window_change: changed
window-change
select: %s
Connection to %.300s closed by remote host.
Read from remote host %.300s: %.100s
%c^Z [suspend ssh]
Server does not support re-keying
%c& [backgrounded]
fork: %.100s
Supported escape sequences:
~.  - terminate connection
~R  - Request rekey (SSH protocol 2 only)
~^Z - suspend ssh
~#  - list forwarded connections
~&  - background ssh (when waiting for connections to terminate)
~?  - this message
~~  - send the escape character by typing it twice
(Note that escapes are only recognized immediately after newline.)
80t-@80t(@80t#@
read: %.100s
write stdout: %.50s
client_channel_closed: id %d != session_ident %d
Entering interactive session.
rekeying in progress
user requests rekeying
Killed by signal %d.
Connection to %.64s closed.
Write failed flushing stdout buffer.
Write failed flushing stderr buffer.
Transferred: stdin %lu, stdout %lu, stderr %lu bytes in %.1f seconds
Bytes per second: stdin %.1f, stdout %.1f, stderr %.1f
Exit status %d
clientloop.c
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
client_request_forwarded_tcpip: listen %s port %d, originator %s port %d
forwarded-tcpip
Warning: ssh server tried X11 forwarding.
Warning: this is probably a break in attempt by a malicious server.
buggy server: x11 request w/o originator_port
client_request_x11: request from %s %d
Warning: ssh server tried agent forwarding.
authentication agent connection
client_input_channel_open: ctype %s rchan %d win %d max %d
auth-agent@openssh.com
confirm %s
failure %s
open failed
client_input_channel_req: channel %d rtype %s reply %d
client_input_channel_req: no channel %d
client_input_channel_req: channel %d: wrong channel: %d
client_input_channel_req: channel %d: unknown channel
exit-status
client_input_global_request: rtype %s want_reply %d
@(#)$OpenBSD: compat.c,v 1.61 2002/03/06 00:24:39 markus Exp $
Enabling compatibility mode for protocol 2.0
Enabling compatibility mode for protocol 1.3
*SSH_Version_Mapper*
*OSU_0*,OSU_1.0*,OSU_1.1*,OSU_1.2*,OSU_1.3*,OSU_1.4*,OSU_1.5alpha1*,OSU_1.5alpha2*,OSU_1.5alpha3*
*SSH Compatible Server*
1.3.2*
1.2.18*,1.2.19*,1.2.20*,1.2.21*,1.2.22*
1.7 SecureFX*
3.0 SecureCRT*
2.2.0*,2.3.0*
2.0.11*,2.0.12*
2.0.13*,2.0.14*,2.0.15*,2.0.16*,2.0.17*,2.0.18*,2.0.19*
2.1.0*
*MindTerm*
OpenSSH*
Sun_SSH_1.0*
OpenSSH_2.5.3*
OpenSSH_2.5.0*,OpenSSH_2.5.1*,OpenSSH_2.5.2*
OpenSSH_2.5.0p1*,OpenSSH_2.5.1p1*
OpenSSH_2.3.*
OpenSSH_2.3.0*
OpenSSH-2.0*,OpenSSH-2.1*,OpenSSH_2.1*,OpenSSH_2.2*
match: %s pat %s
no match: %s
8*t-B8*t(B8*t#B
ignoring bad proto spec: '%s'.
Original cipher proposal: %s
Compat cipher proposal: %s
No available ciphers found.
80t-@80t(@80t#@
@(#)$OpenBSD: authfile.c,v 1.48 2002/02/28 15:46:33 markus Exp $
SSH PRIVATE KEY FILE FORMAT 1.1
save_private_key_rsa: bad cipher
open %s failed: %s.
write to key file %s failed: %s
passphrase too short: have %d bytes, need > 4
fdopen %s failed: %s.
8#t+C8#t&C8#t!C
key_save_private: cannot save key type %d
Read from key file %.200s failed: %.100s
Not a RSA1 key file %.200s.
Unsupported cipher %d used in key file %.200s.
Bad passphrase supplied for key file %.200s.
<no key>
fdopen failed: %s
PEM_read_PrivateKey failed
rsa w/o comment
dsa w/o comment
PEM_read_PrivateKey: mismatch or unknown EVP_PKEY save_type %d
<unknown>
read PEM private key done: type %s
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@         WARNING: UNPROTECTED PRIVATE KEY FILE!          @
Permissions 0%3.3o for '%s' are too open.
It is recommended that your private key files are NOT accessible by others.
This private key will be ignored.
bad permissions: ignore key: %s
@(#)$OpenBSD: channels.c,v 1.171 2002/03/04 19:37:58 markus Exp $
channel_lookup: %d: bad id
channel_lookup: %d: bad id: channel free
channel %d: rfd %d isatty
channel %d: wfd %d is not a tty?
channel: expanding %d
channel %d: new [%s]
channel_close_fds: channel %d: r %d w %d e %d
channel_free: channel %d: %s, nchannels %d
channel_free: status: %s
channel %d: big output buffer %d > %d
cannot happen: SSH_CHANNEL_LARVAL
cannot happen: OUT_DRAIN
channel_still_open: bad channel type %d
channel_find_open: bad channel type %d
The following connections are open:
  #%d %.300s (t%d r%d i%d/%d o%d/%d fd %d/%d)
channel_open_message: bad channel type %d
channel_send_open: %d: bad id
send channel open %d
channel_request_start: %d: unknown channel id
channel request %d: %s
WShr6A
channel_register_comfirm: %d: bad id
channel_register_cleanup: %d: bad id
channel_cancel_cleanup: %d: bad id
channel_register_filter: %d: bad id
channel_activate for non-larval channel %d.
channel %d: waiting for connection
channel %d: closing after input drain.
Initial X11 packet contains bad byte order byte: 0x%x
X11 connection uses different authentication protocol.
X11 auth data does not match fake data.
X11 fake_data_len %d != saved_data_len %d
80t-@80t(@80t#@
X11 connection rejected because of wrong authentication.
X11 rejected %d i%d/o%d
X11 closed %d i%d/o%d
channel %d: decode socks4
channel %d: decode socks4: too long
channel %d: decode socks4: user %s/%d
channel %d: decode socks4: len %d > have %d
channel %d: dynamic request: socks4 host %s port %u command %u
channel %d: cannot handle: socks4 cn %d
8"t+B8"t&B8"t!B
channel %d: pre_dynamic: have %d
channel %d: pre_dynamic: need more
direct-tcpip
X11 connection requested.
single_connection: closing X11 listener.
accept: %.100s
X11 connection from %.200s port %d
accepted x11 socket
ssh2 x11 bug compat mode
%s: listening port %d for %.100s port %d, connect from %.200s port %d
Connection to port %d forwarding to %.100s port %d requested.
forwarded-tcpip
dynamic-tcpip
accept from auth socket: %.100s
accepted auth socket
auth-agent@openssh.com
getsockopt SO_ERROR failed
channel %d: connected
channel %d: not connected: %s
channel %d: read<=0 rfd %d len %d
channel %d: not open
channel %d: input draining.
channel %d: filter stops
channel %d: written %d to efd %d
channel %d: closing write-efd %d
channel %d: read %d from efd %d
channel %d: closing read-efd %d
channel %d: window %d sent adjust %d
channel %d: gc: notify user
channel %d: gc: user detached
channel %d: garbage collecting
channel %d: will not send data after close
cannot happen: istate == INPUT_WAIT_DRAIN for proto 1.3
channel %d: rwin %d elen %d euse %d
channel %d: sent ext data %d
Received data for nonexistent channel %d.
channel %d: rcvd big packet %d, maxpack %d
channel %d: rcvd too much data %d, win %d
channels.c
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Received extended_data for bad channel %d.
channel %d: ext data for non open
channel %d: bad ext data
channel %d: rcvd too much extended_data %d, win %d
channel %d: rcvd ext data %d
Received ieof for nonexistent channel %d.
channel %d: FORCE input drain
Received close for nonexistent channel %d.
Received oclose for nonexistent channel %d.
Received close confirmation for out-of-range channel %d.
Received close confirmation for non-closed channel %d (type %d).
Received open confirmation for non-opening channel %d.
callback start
callback done
channel %d: open confirm rwindow %d rmax %d
administratively prohibited
connect failed
unknown channel type
resource shortage
unknown reason
Received open failure for non-opening channel %d.
channel %d: open failed: %s%s%s
Received window adjust for non-open channel %d.
channel %d: rcvd adjust %d
WVhtlA
unknown (remote did not supply name)
connected socket
No forward host name.
Forward host name too long.
getaddrinfo: fatal error
channel_setup_fwd_listener: getnameinfo failed
socket: %.100s
Local forwarding listening on %s port %s.
bind: %.100s
listen: %.100s
port listener
channel_setup_fwd_listener: cannot listen to port: %d
80t-@80t(@80t#@
PSh$oA
channel_request_remote_forwarding: too many forwards
0.0.0.0
tcpip-forward
Warning: Server denied remote port forwarding.
Protocol error for port forward request:received packet type %d.
allow port forwarding to host %s port %d
VShDvA
connect_to %.100s: unknown host (%s)
connect_to: getnameinfo failed
connect_to: F_SETFL: %s
connect_to %.100s port %s: %.100s
connect_to %.100s port %d: failed.
WARNING: Server requests forwarding for unknown listen_port %d
Received request to connect to host %.100s port %d, but the request was denied.
getaddrinfo: %.100s
x11_create_display_inet: Socket family %d not supported
bind port %d: %.100s
Failed to allocate internet-domain X11 display socket.
X11 inet listener
x11 listener
/tmp/.X11-unix/X%u
connect %.100s: %.100s
DISPLAY
DISPLAY not set.
Could not parse display number from DISPLAY: %.100s
Could not find ':' in DISPLAY: %.100s
%.100s: unknown host. (%s)
connect %.100s port %d: %.100s
Received X11 open request.
connected x11 socket
Warning: ssh server tried agent forwarding.
Warning: ssh server tried X11 forwarding.
deny_input_open: type %d
Warning: this is probably a break in attempt by a malicious server.
x11_request_forwarding: bad authentication data: %.100s
x11-req
8"t+B8"t&B8"t!B
authentication forwarding requested twice.
/tmp/ssh-XXXXXXXX
Agent forwarding disabled: mkdtemp() failed: %.100s
%s/agent.%d
auth socket
authentication agent connection
Forwarding authentication connection.
@(#)$OpenBSD: misc.c,v 1.19 2002/03/04 17:27:39 stevesk Exp $
fcntl(%d, F_GETFL, 0): %s
fd %d is O_NONBLOCK
fd %d setting O_NONBLOCK
fcntl(%d, F_SETFL, O_NONBLOCK): %s
fd %d is not O_NONBLOCK
fd %d clearing O_NONBLOCK
getsockopt TCP_NODELAY: %.100s
fd %d is TCP_NODELAY
fd %d setting TCP_NODELAY
setsockopt TCP_NODELAY: %.100s
t1<DtM
<Mt,<StX
<dt2<ht&
<<st@<wt,
8(t-@8(t(@8(t#@
8(t-@8(t(@8(t#@
@(#)$OpenBSD: dispatch.c,v 1.15 2002/01/11 13:39:36 markus Exp $
dispatch_protocol_error: type %d seq %u
protocol error
dispatch_protocol_ignore: type %d seq %u
protocol error: rcvd type %d
@(#)$OpenBSD: packet.c,v 1.90 2002/02/27 21:23:13 stevesk Exp $
packet_set_connection: cannot load cipher 'none'
fcntl O_NONBLOCK: %.100s
Compression already enabled.
packet_set_encryption_key: unknown cipher number %d
packet_set_encryption_key: keylen too small: %d
newkeys: mode %d
newkeys: rekeying
newkeys: no keys for mode %d
packet_send2: adding %d (len %d padlen %d extra_pad %d)
outgoing seqnr wraps around
packet.c
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Connection closed by %.200s
Read from socket failed: %.100s
Protocol error: expected packet type %d, got %d
Bad packet length %d.
crc32 compensation attack: network attack detected
packet_read_poll1: len %d != buffer_len %d.
Corrupted check bytes on input.
padding error: need %d block %d mod %d
Corrupted MAC on input.
incoming seqnr wraps around
Corrupted padlen %d on input.
Remote: %.900s
Received disconnect from %s: %d: %.400s
Received SSH2_MSG_UNIMPLEMENTED for %d
Received disconnect from %s: %.400s
packet_disconnect called recursively.
Disconnecting: %.100s
Write failed: %.100s
packet_set_maxsize: called twice: old %d new %d
packet_set_maxsize: bad size %d
packet_set_maxsize: setting to %d
@(#)$OpenBSD: ttymodes.c,v 1.16 2001/12/27 20:39:58 markus Exp $
tcgetattr: %.100s
tty_make_modes: ospeed %d
tty_make_modes: ispeed %d
tty_make_modes: %d %d
tty_parse_modes: SSH2 n_bytes %d
tty_parse_modes: ispeed %d
cfsetispeed failed for %d
tty_parse_modes: ospeed %d
cfsetospeed failed for %d
tty_parse_modes: %d %d
Ignoring unsupported tty mode opcode %d (0x%x)
parse_tty_modes: unknown opcode %d
parse_tty_modes: n_bytes_ptr != n_bytes: %d %d
Setting tty modes failed: %.100s
@(#)$OpenBSD: authfd.c,v 1.48 2002/02/24 19:14:59 markus Exp $
SSH_AUTH_SOCK
Error writing to authentication socket.
Error reading response length from authentication socket.
Authentication response too long: %d
Error reading response from authentication socket.
Bad authentication reply message type: %d
Too many identities in authentication reply: %d
Warning: identity keysize mismatch: actual %d, announced %u
Compatibility with ssh protocol version 1.0 no longer supported.
Agent admitted failure to authenticate using the key.
Bad authentication response: %d
Agent admitted failure to sign using the key.
SSH_AGENT_FAILURE
Bad response from authentication agent: %d
@(#)$OpenBSD: log.c,v 1.22 2002/02/22 12:20:34 markus Exp $
LOCAL7
LOCAL6
LOCAL5
LOCAL4
LOCAL3
LOCAL2
LOCAL1
LOCAL0
AUTHPRIV
DAEMON
DEBUG3
DEBUG2
DEBUG1
VERBOSE
fatal_remove_cleanup: no such cleanup function: 0x%lx 0x%lx
Calling cleanup 0x%lx(0x%lx)
Unrecognized internal syslog level code %d
Unrecognized internal syslog facility code %d
debug1
debug2
debug3
internal error
%s: %s
%.500s
@(#)$OpenBSD: xmalloc.c,v 1.16 2001/07/23 18:21:46 stevesk Exp $
xmalloc: zero size
xmalloc: out of memory (allocating %lu bytes)
xrealloc: zero size
xrealloc: out of memory (new_size %lu bytes)
xfree: NULL pointer given as argument
8#t+C8#t&C8#t!C
@(#)$OpenBSD: key.c,v 1.41 2002/02/28 15:46:33 markus Exp $
key_new: RSA_new failed
key_new: BN_new failed
key_new: DSA_new failed
key_new: bad key type %d
key_new_private: BN_new failed
key_free: bad key type %d
key_equal: bad key type %d
key_fingerprint_raw: bad digest type %d
key_fingerprint_raw: bad key type %d
key_fingerprint_raw: blob is null
bcdfghklmnprstvzx
key_fingerprint: null from key_fingerprint_raw()
key_fingerprint_ex: bad digest representation %d
write_bignum: BN_bn2dec() failed
key_read: no space
key_read: no key found
key_read: short string
key_read: type mismatch
key_read: uudecode %s failed
key_read: key_from_blob %s failed
key_read: type mismatch: encoding error
key_read: bad key type: %d
8#t+C8#t&C8#t!C
key_write: failed for RSA key
unknown
ssh-rsa
ssh-dss
ssh-unknown
rsa_generate_private_key: key generation failed.
dsa_generate_private_key: DSA_generate_parameters failed
dsa_generate_private_key: DSA_generate_key failed.
dsa_generate_private_key: NULL.
key_generate: unknown type %d
key_from_private: unknown type %d
key_type_from_name: unknown key type '%s'
key names ok: [%s]
key_from_blob: cannot handle type %s
key_from_blob: remaining bytes in key blob %d
key_to_blob: key == NULL
key_to_blob: unsupported key type %d
key_sign: illegal key type %d
key_verify: illegal key type %d
@(#)$OpenBSD: tildexpand.c,v 1.12 2001/08/11 22:51:27 jakob Exp $
User name after tilde too long.
Unknown user %100s.
Home directory too long (%d > %d
%s%s%s
8&t+F8&t&F8&t!F
8*t-B8*t(B8*t#B
8(t-@8(t(@8(t#@
@(#)$OpenBSD: uidswap.c,v 1.19 2001/12/19 07:18:56 deraadt Exp $
temporarily_use_uid: %d/%d (e=%d)
getgroups: %.100s
initgroups: %s: %.100s
setegid %u: %.100s
seteuid %u: %.100s
restore_uid
restore_uid: temporarily_use_uid not effective
restore_uid: temporarily_use_uid effective
setgid %u: %.100s
setuid %u: %.100s
@(#)$Id: entropy.c,v 1.40 2002/01/22 10:57:54 djm Exp $
PRNG is not seeded
OpenSSL version mismatch. Built against %lx, you have %lx
@(#)$OpenBSD: buffer.c,v 1.15 2002/01/18 18:14:17 stevesk Exp $
buffer_get: trying to get more bytes %d than in buffer %d
buffer_consume: trying to get more bytes than in buffer
buffer_consume_end: trying to get more bytes than in buffer
@(#)$OpenBSD: mac.c,v 1.4 2002/01/25 22:07:40 markus Exp $
hmac-ripemd160@openssh.com
hmac-ripemd160
hmac-md5-96
hmac-md5
hmac-sha1-96
hmac-sha1
mac_init: found %s
mac_init: unknown %s
mac_compute: no key
mac_compute: mac too long
bad mac %s [%s]
mac ok: %s [%s]
macs ok: [%s]
@(#)$OpenBSD: cipher.c,v 1.52 2002/02/18 13:05:32 markus Exp $
aes256-cbc
aes192-cbc
aes128-cbc
arcfour
cast128-cbc
blowfish-cbc
3des-cbc
blowfish
bad cipher %s [%s]
cipher ok: %s [%s]
ciphers ok: [%s]
<unknown>
Warning: use of DES is strongly discouraged due to cryptographic weaknesses
cipher_init: key length %d is insufficient for %s.
cipher_init: iv length %d is insufficient for %s.
cipher_init: EVP_CipherInit failed for %s
cipher_init: set keylen (%d -> %d)
cipher_init: set keylen failed (%d -> %d)
cipher_init: EVP_CipherInit: set key failed for %s
VShd#B
cipher_encrypt: bad plaintext length %d
evp_crypt: EVP_Cipher failed
cipher_cleanup: EVP_CIPHER_CTX_cleanup failed
80t-@80t(@80t#@
ssh1_3des_cbc: no context
ssh_rijndael_cbc: bad len %d
ssh_rijndael_cbc: no context
@(#)$OpenBSD: fatal.c,v 1.1 2002/02/22 12:20:34 markus Exp $
@(#)$OpenBSD: hostfile.c,v 1.29 2001/12/18 10:04:21 jakob Exp $
Warning: %s, line %d: keysize mismatch for host %s: actual %d vs. announced %d.
Warning: replace %d with %d in %s, line %d.
check_host_in_hostfile: filename %s
no key to look up
check_host_in_hostfile: match line %d
add_host_to_hostfile: saving key in %s failed
@(#)$OpenBSD: readpass.c,v 1.26 2002/02/13 00:39:15 markus Exp $
ssh_askpass: fflush: %s
internal error: askpass undefined
ssh_askpass: pipe: %s
ssh_askpass: fork: %s
ssh_askpass: dup2: %s
ssh_askpass: exec(%s): %s
PVh	5B
/dev/tty
DISPLAY
SSH_ASKPASS
/usr/sbin/ssh-askpass
@(#)$OpenBSD: atomicio.c,v 1.10 2001/05/08 22:48:07 markus Exp $
@(#)$OpenBSD: rsa.c,v 1.24 2001/12/27 18:22:16 markus Exp $
rsa_public_encrypt() exponent too small or not odd
rsa_public_encrypt() failed
rsa_private_decrypt() failed
rsa_generate_additional_parameters: BN_new failed
rsa_generate_additional_parameters: BN_CTX_new failed
@(#)$OpenBSD: mpaux.c,v 1.16 2001/02/08 19:30:52 itojun Exp $
@(#)$OpenBSD: match.c,v 1.19 2002/03/01 13:12:10 markus Exp $
ti<?tC<*t?
80t-@80t(@80t#@
8"t+B8"t&B8"t!B
8"t+B8"t&B8"t!B
80t-@80t(@80t#@
@(#)$OpenBSD: canohost.c,v 1.31 2002/02/27 21:23:13 stevesk Exp $
getpeername failed: %.100s
get_remote_hostname: getnameinfo NI_NUMERICHOST failed
Trying to reverse map address %.100s.
Could not reverse map address %.100s.
reverse mapping checking getaddrinfo for %.700s failed - POSSIBLE BREAKIN ATTEMPT!
Address %.100s maps to %.600s, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
 %2.2x
Connection from %.100s with IP options:%.800s
UNKNOWN
get_socket_ipaddr: getpeername failed: %.100s
get_socket_ipaddr: getsockname failed: %.100s
get_socket_ipaddr: getnameinfo %d failed
8(t-@8(t(@8(t#@
getsockname failed: %.100s
get_sock_port: getnameinfo NI_NUMERICSERV failed
@(#)$OpenBSD: bufaux.c,v 1.22 2002/01/18 18:14:17 stevesk Exp $
buffer_put_bignum: BN_bn2bin() failed: oi %d != bin_size %d
WVh$PB
buffer_get_bignum: input buffer too small
negativ!
RPh$PB
Received packet with bad string length %d
8(t-@8(t(@8(t#@
@(#)$OpenBSD: kex.c,v 1.47 2002/02/28 15:46:33 markus Exp $
kex_parse_kexinit: %s
kex_parse_kexinit: first_kex_follows %d 
kex_parse_kexinit: reserved %d 
Hm, kex protocol error: type %d seq %u
PRh$YB
SSH2_MSG_NEWKEYS sent
waiting for SSH2_MSG_NEWKEYS
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
SSH2_MSG_NEWKEYS received
kex_send_kexinit: no kex, cannot rekey
KEX_INIT_SENT
SSH2_MSG_KEXINIT sent
SSH2_MSG_KEXINIT received
kex_input_kexinit: no kex, cannot rekey
Unsupported key exchange %d
no matching cipher found: client %s server %s
matching cipher is not supported: %s
no matching mac found: client %s server %s
unsupported mac %s
no matching comp found: client %s server %s
unsupported comp %s
VWh$`B
no kex alg
diffie-hellman-group1-sha1
diffie-hellman-group-exchange-sha1
bad kex alg %s
no hostkey alg
bad hostkey alg '%s'
client->server
server->client
kex: %s %s %s %s
kex_derive_keys
@(#)$OpenBSD: nchan.c,v 1.44 2002/01/21 23:27:10 markus Exp $
closed
wait_ieof
wait_oclose
chan_set_istate: bad state %d -> %d
channel %d: input %s -> %s
SPhDhB
chan_set_ostate: bad state %d -> %d
channel %d: output %s -> %s
channel %d: rcvd oclose
channel %d: protocol error: rcvd_oclose for istate %d
channel %d: read failed
channel %d: chan_read_failed for istate %d
channel %d: ibuf empty
channel %d: chan_ibuf_empty for non empty buffer
channel %d: chan_ibuf_empty for istate %d
channel %d: rcvd ieof
channel %d: protocol error: rcvd_ieof for ostate %d
channel %d: write failed
channel %d: chan_write_failed for ostate %d
channel %d: obuf empty
channel %d: chan_obuf_empty for non empty buffer
channel %d: internal error: obuf_empty for ostate %d
channel %d: send ieof
channel %d: cannot send ieof for istate %d
channel %d: send oclose
channel %d: cannot send oclose for ostate %d
channel %d: rcvd close
channel %d: protocol error: close rcvd twice
channel %d: rcvd eof
channel %d: send eof
channel %d: cannot send eof for istate %d
channel %d: send close
channel %d: cannot send close for istate/ostate %d/%d
channel %d: already sent close
channel %d: zombie
channel %d: is dead
channel %d: active efd: %d len %d type %s
channel %d: almost dead
channel %d: close_write
channel %d: chan_shutdown_write: shutdown() failed for fd%d: %.100s
channel %d: chan_shutdown_write: close() failed for fd%d: %.100s
channel %d: close_read
channel %d: chan_shutdown_read: shutdown() failed for fd%d [i%d o%d]: %.100s
channel %d: chan_shutdown_read: close() failed for fd%d: %.100s
@(#)$OpenBSD: compress.c,v 1.17 2001/12/29 21:56:01 stevesk Exp $
Enabling compression at level %d.
Bad compression level %d.
j8h@zB
j8h@zB
compress outgoing: raw data %lu, compressed %lu, factor %.2f
compress incoming: raw data %lu, compressed %lu, factor %.2f
buffer_compress: deflate returned %d
buffer_uncompress: inflate returned %d
@(#)$OpenBSD: deattack.c,v 1.18 2002/03/04 17:27:39 stevesk Exp $
detect_attack: bad length %d
Installing crc compensation attack detector.
@(#)$OpenBSD: crc32.c,v 1.8 2000/12/19 23:17:56 markus Exp $
@(#)$OpenBSD: ssh-rsa.c,v 1.16 2002/02/24 19:14:59 markus Exp $
ssh_rsa_sign: no RSA key
ssh_rsa_sign: SSH_BUG_SIGBLOB not supported
ssh_rsa_sign: EVP_get_digestbynid %d failed
ssh_rsa_sign: RSA_sign failed: %s
slen %d > len %d
ssh_rsa_sign: slen %d slen2 %d
ssh-rsa
ssh_rsa_verify: no RSA key
ssh_rsa_verify: SSH_BUG_SIGBLOB not supported
ssh_rsa_verify: n too small: %d bits
ssh_rsa_verify: cannot handle type %s
ssh_rsa_verify: remaining bytes in signature %d
ssh_rsa_verify: EVP_get_digestbynid %d failed
ssh_rsa_verify: RSA_verify failed: %s
ssh_rsa_verify: signature %scorrect
@(#)$OpenBSD: ssh-dss.c,v 1.14 2002/02/28 15:46:33 markus Exp $
ssh_dss_sign: no DSA key
ssh_dss_sign: sign failed
bad sig size %d %d
ssh-dss
ssh_dss_verify: no DSA key
ssh_dss_verify: cannot handle type %s
ssh_dss_verify: remaining bytes in signature %d
bad sigbloblen %d != SIGBLOB_LEN
ssh_dss_verify: DSA_SIG_new failed
ssh_dss_verify: BN_new failed
incorrect
correct
ssh_dss_verify: signature %s
@(#)$OpenBSD: uuencode.c,v 1.15 2002/03/04 17:27:39 stevesk Exp $
=j&&LZ66lA??~
}{))R>
f""D~**T
V22dN::t
o%%Jr..\$
&&Lj66lZ??~A
99rKJJ
==zGdd
""Df**T~
;22dV::tN
$$Hl\\
C77nYmm
%%Jo..\r
55j_WW
&Lj&6lZ6?~A?
~=zG=d
"Df"*T~*
2dV2:tN:
x%Jo%.\r.
a5j_5W
ggV}++
Lj&&lZ66~A??
bS11*?
Xt,,4.
RRvM;;
MMfU33
PPxD<<%
Bc!! 0
~~zG==
Df""T~**;
dV22tN::
xxJo%%\r..8$
pp|B>>q
aaj_55
UUPx((
cccc||||wwww{{{{
kkkkoooo
gggg++++
YYYYGGGG
&&&&6666????
uuuu				
nnnnZZZZ
RRRR;;;;
[[[[jjjj
9999JJJJLLLLXXXX
CCCCMMMM3333
PPPP<<<<
~~~~====dddd]]]]
ssss````
""""****
2222::::
$$$$\\\\
7777mmmm
llllVVVV
eeeezzzz
xxxx%%%%....
pppp>>>>
ffffHHHH
aaaa5555WWWW
UUUU((((
BBBBhhhhAAAA
='9-6d
_jbF~T
11#?*0
,4$8_@
t\lHBW
QPeA~S
>4$8,@
p\lHtW
+HpXhE
T[$:.6
RRRR				jjjj
00006666
CCCCDDDD
TTTT{{{{
####====
ffff((((
vvvv[[[[
IIIImmmm
%%%%rrrr
]]]]eeee
llllppppHHHHPPPP
FFFFWWWW
kkkk::::
AAAAOOOOgggg
tttt""""
nnnnGGGG
VVVV>>>>KKKK
yyyy    
YYYY''''
____````QQQQ
;;;;MMMM
ccccUUUU!!!!
@(#)$OpenBSD: kexgex.c,v 1.20 2002/02/28 15:46:33 markus Exp $
SSH2_MSG_KEX_DH_GEX_REQUEST_OLD sent
SSH2_MSG_KEX_DH_GEX_REQUEST sent
expecting SSH2_MSG_KEX_DH_GEX_GROUP
BN_new
kexgex.c
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
DH_GEX group out of range: %d !< %d !< %d
SSH2_MSG_KEX_DH_GEX_INIT sent
expecting SSH2_MSG_KEX_DH_GEX_REPLY
cannot decode server_host_key_blob
type mismatch for decoded server_host_key_blob
cannot verify server_host_key
server_host_key verification failed
dh_server_pub == NULL
bad server public DH value
kexgex_client: BN_new failed
key_verify failed for server_host_key
Cannot load hostkey
Unsupported hostkey type %d
SSH2_MSG_KEX_DH_GEX_REQUEST received
SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received
protocol error during kex, no DH_GEX_REQUEST: %d
DH_GEX_REQUEST, bad parameters: %d !< %d !< %d
Protocol error: no matching DH grp found
SSH2_MSG_KEX_DH_GEX_GROUP sent
expecting SSH2_MSG_KEX_DH_GEX_INIT
dh_client_pub == NULL
bad client public DH value
kexgex_server: BN_new failed
SSH2_MSG_KEX_DH_GEX_REPLY sent
@(#)$OpenBSD: kexdh.c,v 1.17 2002/02/28 15:46:33 markus Exp $
sending SSH2_MSG_KEXDH_INIT
expecting SSH2_MSG_KEXDH_REPLY
cannot decode server_host_key_blob
type mismatch for decoded server_host_key_blob
cannot verify server_host_key
server_host_key verification failed
dh_server_pub == NULL
kexdh.c
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
bad server public DH value
kexdh_client: BN_new failed
key_verify failed for server_host_key
expecting SSH2_MSG_KEXDH_INIT
Cannot load hostkey
Unsupported hostkey type %d
dh_client_pub == NULL
bad client public DH value
kexdh_server: BN_new failed
@(#)$OpenBSD: dh.c,v 1.21 2002/03/06 00:23:27 markus Exp $
parse_prime: BN_new failed
Bad prime description in line %d
/etc/moduli
/etc/primes
WARNING: %s does not exist, using old modulus
WARNING: no suitable primes in %s
WARNING: line %d disappeared in %s, giving up
invalid public DH value: negativ
bits set: %d/%d
invalid public DH value (%d/%d)
dh_gen_key: dh->p == NULL
dh_gen_key: group too small: %d (2*need %d)
dh_gen_key: BN_new failed
dh_gen_key: BN_rand failed
DH_generate_key
dh_gen_key: priv key bits set: %d/%d
dh_gen_key: too many bad keys: giving up
dh_new_group_asc: DH_new
BN_hex2bn p
BN_hex2bn g
dh_new_group: DH_new
FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF
@(#)$Id: bsd-cygwin_util.c,v 1.7 2001/12/29 03:08:30 djm Exp $
CYGWIN
nontsec
%d.%d.%d
nontea
KERNEL32.DLL
RegisterServiceProcess
/dev/null
@(#)$Id: bsd-arc4random.c,v 1.4 2001/03/18 23:00:53 djm Exp $
Couldn't obtain random bytes (error %ld)
@(#)$Id: bsd-misc.c,v 1.5 2001/10/10 20:38:56 mouring Exp $
80t-@80t(@80t#@
@(#)$Id: fake-getnameinfo.c,v 1.2 2001/02/09 01:55:36 djm Exp $
8(t-@8(t(@8(t#@
80t-@80t(@80t#@
@(#)$Id: fake-getaddrinfo.c,v 1.2 2001/02/09 01:55:36 djm Exp $
no address associated with hostname.
memory allocation failure.
unknown error.
%u.%u.%u.%u
8#t+C8#t&C8#t!C
8#t+C8#t&C8#t!C
/dev/tty
80t-@80t(@80t#@
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
option requires an argument -- %c
option requires an argument -- %s
ambiguous option -- %.*s
option doesn't take an argument -- %.*s
unknown option -- %c
unknown option -- %s
t$S@PR
8#t+C8#t&C8#t!C
PShF-C
8*t-B8*t(B8*t#B
RShd-C
Qkkbal
BN_CTX_free
BN_CTX_new
BN_add_word
BN_bin2bn
BN_bn2bin
BN_bn2dec
BN_clear_free
BN_cmp
BN_copy
BN_dec2bn
BN_hex2bn
BN_is_bit_set
BN_lshift
BN_mod
BN_new
BN_num_bits
BN_rand
BN_set_word
BN_sub
BN_value_one
CRYPTO_free
DH_compute_key
DH_free
DH_generate_key
DH_new
DH_size
DSA_SIG_free
DSA_SIG_new
DSA_do_sign
DSA_do_verify
DSA_free
DSA_generate_key
DSA_generate_parameters
DSA_new
ERR_error_string
ERR_get_error
ERR_load_crypto_strings
EVP_CIPHER_CTX_cleanup
EVP_CIPHER_CTX_init
EVP_CIPHER_CTX_set_key_length
EVP_CipherInit
EVP_DigestFinal
EVP_DigestInit
EVP_DigestUpdate
EVP_PKEY_free
EVP_PKEY_get1_DSA
EVP_PKEY_get1_RSA
EVP_bf_cbc
EVP_cast5_cbc
EVP_des_cbc
EVP_des_ede3_cbc
EVP_enc_null
EVP_get_digestbyname
EVP_md5
EVP_rc4
EVP_ripemd160
EVP_sha1
HMAC_Final
HMAC_Init
HMAC_Update
HMAC_cleanup
MD5_Final
MD5_Init
MD5_Update
OBJ_nid2sn
OpenSSL_add_all_algorithms
PEM_read_PrivateKey
PEM_write_DSAPrivateKey
PEM_write_RSAPrivateKey
RAND_bytes
RAND_status
RC4_set_key
RSA_free
RSA_generate_key
RSA_new
RSA_private_decrypt
RSA_public_encrypt
RSA_sign
RSA_size
RSA_verify
SSLeay
__errno
__main
__progname
_ctype_
accept
calloc
closelog
connect
cygwin_internal
dll_crt0__FP11per_process
execlp
fclose
fdopen
fflush
fileno
fprintf
getegid
getenv
geteuid
getgroups
gethostbyaddr
gethostbyname
getpeername
getpid
getprotobyname
getpwnam
getpwuid
getservbyname
getsockname
getsockopt
gettimeofday
getuid
inet_aton
inet_ntoa
initgroups
isatty
listen
malloc
memcpy
memmove
memset
openlog
pclose
perror
realloc
rewind
select
setegid
seteuid
setgid
setmode
setrlimit
setsid
setsockopt
setuid
shutdown
sigaction
sigemptyset
signal
snprintf
socket
sscanf
statfs
strcasecmp
strcat
strchr
strcmp
strcpy
strcspn
strerror
strncasecmp
strncmp
strpbrk
strrchr
strsep
strspn
strstr
strtol
syslog
tcgetattr
tcsetattr
unlink
vfprintf
vsnprintf
waitpid
deflate
deflateEnd
deflateInit_
inflate
inflateEnd
inflateInit_
GetModuleHandleA
GetProcAddress
GetVersion
LoadLibraryA
cygcrypto.dll
cygwin1.dll
cygz.dll
KERNEL32.dll