Sample details: f66967edb44cc5009185ae25c31caaf7 --

Hashes
MD5: f66967edb44cc5009185ae25c31caaf7
SHA1: 7f70dab9af3339461b891b4b0fef18df08bf96f1
SHA256: 77fa5effdbd33e3b184d73f0ba3920974ea6be5e41f4441383e400ba6cf03d16
SSDEEP: 12288:RLr0H+EzjBiNfjSm8AVOyc3IYRKW9/DwNcjaM0tT9NFykTEZtKK6rdkpoUcK6sgj:EQ3kyUP6HeUkOflfHz
Details
File Type: PE32
Yara Hits
YRP/VC8_Microsoft_Corporation | YRP/Microsoft_Visual_Cpp_8 | YRP/IsPE32 | YRP/IsConsole | YRP/HasRichSignature | YRP/without_images | YRP/without_attachments | YRP/with_urls | YRP/domain | YRP/url | YRP/contentis_base64 | YRP/Misc_Suspicious_Strings | YRP/DebuggerException__SetConsoleCtrl | YRP/anti_dbg | YRP/network_tcp_socket | YRP/network_dns | YRP/network_ssl | YRP/win_files_operation | YRP/Str_Win32_Winsock2_Library |
Parent Files
5efd175049c900c99c7cb1cc0221ed3e
Source
Strings
		!This program cannot be run in DOS mode.
`.rdata
@.data
L$ QWUV
W\PQRh
D$(u(VhD
L$ WPR
L$,RPW
D$$QRP
D$@jdP
L$8QRP
D$@jdP
L$HQRP
D$@jdP
T$LRPQ
L$@jdQ
D$LPQR
L$@jdQ
T$8RPQ
T$@jdR
D$HPQR
D$@jdP
T$LRPQ
T$@jdR
L$LQRP
D$@QRP
SUVWhp
D$(RPVSQ
D$(RPWSQ
<0|	<9
j;j;h|
t`9t$\
T$PRWP
!9t$\t
 PVjjU
VVVQSU
D$ VjjP
L$<QSU
 PVjjW
|$(jlW
T$8QRUW
T$$SQUR
T$$RWP
L$(QhL
L$0WQV
D$TQVRP
L$HRPQ
 PWjjV
j;j;h|
T$\RVPS
 PVjjW
L$(SQh
 PVjjU
D$4SVPQ
 ;\$TuFh
\$XPSW
L$HQSW
9l$(t[9/u
D$H^][3
L$DVSR
T$DQUPR
T$DPUQR
j;j;h|
 PSjjV
L$0QSRW
D$$SUVW3
T$DVRS
T$ WQR
T$DRVV
T$XQVRP
D$<RPV
$<yt"<Yt
|$,SSW
D$8RPUW
t\SSVh
l$XWPQj
T$hVUP
9l$puE
D$tPUQR
WQURVP
9l$4u)
9l$@tF
L$<Qh@
uF9|$<u@
T$pVUQRP
L$xVURQP
T$xVUQRP
,<yt%<Yt!
|$t9|$hu
D$,URP
 PUjjW
t$DjjV
9\$Tu 
9\$`uej
9\$(u!
9\$\u6
9\$LuT
 PSjjV
9\$Ht#
 PVjjU
D$8WVP
D$0PQR
D$,u5h\
T$HWUR
|$ QRWUV
|$ PQWUV
|$ RPWUV
|$ QRWUV
D$H_^][
D$HPQR
 PWjjU
L$$Qh<
D$ ][_^
t$$jjV
D$4PWWU
 PWjjV
9l$TtSUSV
u59l$,t
9l$0u	SV
un9l$,t	WV
D$`RUUUPSV
 PUjjS
D$8[_^]
T$$WPQRU
D$0WPU
T$4WRU
L$0QSV
 PVjjU
D$,QRSP
L$xRPQ
9t$Dt	
9t$\SUt
j;j;h|
 PSjjV
D$HPVQW
D$HPVQR
D$HPhP@B
_][t	P
 PVjjQ
@j;j;h|
j;j;h|
_][t	P
L$<QVj
L$(RPQSU
HPht&E
$RhX'E
th<:uK
T$ QSR
VQWSPR
VQWSRP
D$@u";
9|$Xt$
L$$RQP
^][t	P
j;j;h|
L$ QWh
D$ Phx9E
T$ Rhx'E
L$ Qhl'E
t$$h(:E
D$0u";
D$dhplB
T$|QRV
|$LPQW
t5VSj7W
D$HQRP
D$dPSj!
L$tQSj#V
)|$Xh,;E
D$HQRP
t$0)t$
L$Lu"9
T$8PQR
T$8PQR
T$8PQR
t$,j$V
QRj$Vjr
QWj$Rjr
PQj$Vjr
PWj$Qjr
T$<RPj
T$<RWj
D$@RPj
D$0RWj
D$HRSP
D$HRPS
D$HRSP
D$dDDE
D$84DE
T$@RWSQPh
RSh`CE
$RWhTBE
PQh$BE
tpPhXRE
tWPhXRE
tmPhXRE
<nt}<Sts<sto<1SVWt_
<'t(<"t$
UWhtWE
9\$ t1
RPhXXE
T$ hhYE
D$ RhDYE
t$ h(YE
L$0VQh
D$0PhDYE
u h4ZE
RPh0[E
L$@QPR
L$,Sh(]E
u<9|$,t6Wj
T$8WRh
L$8SQWU
u&9|$$t	
u99|$(t3Vj
T$ RVh
L$DQht^E
QVht^E
|$DWVh
D$DPht^E
PVht^E
WWPUSh
WWQUSh
PVhp`E
PWhH`E
PVh4`E
|$,tX-
T$$WQRPh
L$0WQV
																							
D$,PVS
 PWjjV
T$,RVW
_^][t	P
SUPQVW
L$|VW3
T$ QSWUVR
9T$,u	
T$0h\mE
L$tPQV
T$@RVP
L$0WRSPQ
_^[t	P
D$$RPV
D$4h8xE
D$<WPQ
L$HSQV
u%h {E
_^]t	P
9l$4uf
u*9l$|uV9l$<uP
9l$(t>
ul9l$ u	
D$T9l$Ht9
T$pPQVR
D$0VPQR
D$LQWRPS
T$0WPQRS
T$4QRS
T$dRhx}E
L$xQh\}E
9l$(_^t
SUWPPh
D$,Sh$
l$,PSh
\$ PVh
D$@PWQ
D$ VW3
\$(PQR
D$(SUVW3
USQQQVW
D$8USRPj
T$LPQRW
t$(9t$|tn
9t$ht3
\$ltK9t$L
L$pRPQ
T$PQRP
D$pRPUS
L$pVQVS
PRVSQh(
L$,QVP
< t8<	t4
QQSVW3
8VVVVV
tGHt.Ht&
^SSSSS
8VVVVV
<\tM</tI
YYuTVWh
^WWWWW
PPPPPPPP
<\t/<:t+</t'
YYu-9D$
0A@@Ju
j8j ^V
F9=p3F
t!hl3F
<at9<rt,<wt
URPQQh$
0WWWWW
HHt@HHt
2If90t
jF<-uH
t^9(uZ
tD9(u@
^SSSSS
^SSSSS
8VVVVV
@@BBf;
@@BBf;
0WWWWW
@@BBf;
@@BBf;
8VVVVV
AAGGf;
0WWWWW
BBFFf;
sZj1X+E
0SSSSS
0SSSSS
^SSSSS
u[SSSP
YYtGhH
YYt3h@
YYt"h8
0WhT2F
>:u8FV
.VVVVVSRSSj
VVVVVj
_VVVVV
^WWWWW
>=Yt/j
t#SSUP
t$$VSS
_^][YY
YYt SVW
;t$,v-
UQPXY]Y[
^SSSSS
j"^SSSSS
v	N+D$
0SSSSS
PPPPPPPP
PPPPPPPP
^SSSSS
^SSSSS
t+WWVPV
YYt\VV
0SSSSS
v	N+D$
_VVVVV
^SSSSS
^SSSSS
j"^SSSSS
^SSSSS
^SSSSS
<+t(<-t$:
+t HHt
u&f!;f;
0SSSSS
certificate file
no certificates in file, %s
error reading the file, %s
error opening the file, %s
memory allocation failure
error %d at %d depth lookup:%s
	%-10s	%s
recognized usages:
 cert1 cert2 ...
 [-engine e]
usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]
Error loading untrusted file %s
Error loading directory %s
Error loading file %s
-verbose
-engine
-trusted
-untrusted
-CAfile
-CApath
Can't find 'asn1' in '%s'
default
Error loading config file '%s'
Error on line %ld of config file '%s'
Error writing output
Can't parse %s type
OBJECT
Error parsing structure
Error: offset too large
'%s' is an invalid number
 -genconf file file to generate ASN1 structure from
 -genstr str   string to generate ASN1 structure from
               ASN1 blob wrappings
               a series of these can be used to 'dig' into multiple
 -strparse offset
 -oid file     file of extra oid definitions
 -dlimit arg   dump the first arg bytes of unknown data in hex form
 -dump         dump unknown data in hex form
 -i            indent entries
 -length arg   length of section in file
 -offset arg   offset into file
 -noout arg    don't produce any output
 -out arg      output file (output format is always DER
 -in arg       input file
 -inform arg   input format - one of DER PEM
where options are
%s [options] <infile
unknown option %s
problems opening %s
-genconf
-genstr
-strparse
-dlimit
-length
-offset
-noout
-inform
Memory allocation failure
error, no objects specified in config file
string is too long, it needs to be less than  %d bytes long
string is too short, it needs to be at least %d bytes long
weird input :-(
%s [%s]:
Error adding attribute
No template, please set one up.
Name '%s' too long
to be sent with your certificate request
Please enter the following 'extra' attributes
%s_max
%s_min
%s_value
%s_default
_value
_default
If you enter '.', the field will be left blank.
For some fields there will be a default value,
There are quite a few fields but you can leave some blank
What you are about to enter is what is called a Distinguished Name or a DN.
into your certificate request.
You are about to be asked to enter information that will be incorporated
attributes
unable to get '%s' section
unable to find '%s' in config
distinguished_name
prompt
unable to write X509 certificate
bad output format specified for outfile
unable to write X509 request
Wrong Algorithm type
Modulus=
Modulus=unavailable
subject=
Error getting public key
verify OK
verify failure
new subject=
ERROR: cannot modify subject
old subject=
Modifying Request's Subject
Cannot modifiy certificate subject
problems making Certificate Request
you need to specify a private key
bad input format specified for X509 request
unable to load X509 request
writing new private key to '%s'
encrypt_key
encrypt_rsa_key
writing new private key to stdout
default_keyfile
Generating a %ld bit %s private key
it needs to be at least %d bits, not %ld
private key length is too short,
Error Loading request extension section %s
default_bits
RANDFILE
Private Key
req_extensions
Invalid global string mask setting %s
Error Loading extension section %s
string_mask
output_password
input_password
x509_extensions
default_md
oid_file
Unable to load config info from %s
error on line %ld of %s
Using configuration from %s
 -reqopt arg    - various request text options
 -nameopt arg    - various certificate name options
 -utf8          input characters are UTF8 (default ASCII)
 -reqexts ..    specify request extension section (override value in config file)
 -extensions .. specify certificate extension section (override value in config file)
                have been reported as requiring
 -asn1-kludge   Output the 'request' in a format that is wrong but some CA's
 -newhdr        output "NEW" in the header lines
 -set_serial    serial number to use for a certificate generated by -x509.
 -days          number of days a certificate generated by -x509 is valid for.
 -x509          output a x509 structure instead of a cert. req.
 -batch         do not ask anything during request generation
 -new           new request.
 -multivalue-rdn enable support for multivalued RDNs
 -subj arg      set or modify request subject
 -config file   request template file.
 -[digest]      Digest to sign with (md5, sha1, md2, mdc2, md4)
 -newkey ec:file generate a new EC key, parameters taken from CA in 'file'
 -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'
 -newkey rsa:bits generate a new RSA key of 'bits' in size
                the random number generator
                load the file (or the files in the directory) into
 -rand file%cfile%c...
 -keyout arg    file to send the key to
 -keyform arg   key file format
 -key file      use the private key contained in file
 -passin        private key password source
 -subject       output the request's subject
 -engine e      use engine e, possibly a hardware device
 -nodes         don't encrypt the output key
 -modulus       RSA modulus
 -verify        verify signature on REQ
 -noout         do not output REQ
 -pubkey        output public key
 -text          text form of request
 -out arg       output file
 -in arg        input file
 -outform arg   output format - DER or PEM
 -inform arg    input format - DER or PEM
where options  are
%s [options] <infile >outfile
unable to load EC parameters from file
Certificate does not contain DSA parameters
unable to load DSA parameters from file
Error getting passwords
-reqexts
-extensions
-set_serial
-multivalue-rdn
-no-asn1-kludge
-asn1-kludge
-subject
-reqopt
-nameopt
-nodes
-verify
-modulus
-newhdr
-batch
Certificate does not contain EC parameters
-newkey
-passout
-passin
-keyout
-keyform
-config
-pubkey
-outform
Error Signing Data
Error Verifying Data
Verification Failure
Verified OK
Read Error in %s
%s%s(%s)= 
(stdin)
Error setting digest %s
Error reading signature file %s
Error opening signature file %s
key file
Error opening output file %s
(stdout)
Error getting password
ripemd160
sha512
sha384
sha256
sha224
-%-14s to use the %s message digest algorithm
-%-14s to use the %s message digest algorithm (default)
-engine e       use engine e, possibly a hardware device.
-hmac key       create hashed MAC with key
-signature file signature to verify
-keyform arg    key file format (PEM or ENGINE)
-prverify file  verify a signature using private key in file
-verify file    verify a signature using public key in file
-sign   file    sign digest using private key in file
-binary         output in binary form
-hex            output as hex dump
-d              to output debug info
-c              to output the digest with separating colons
options are
unknown option '%s'
Invalid PSS salt length %d
No signature to verify: use the -signature option
etaonrishdlcupfm
-fips-fingerprint
-non-fips-allow
-binary
-signature
-pss_saltlen
-prverify
out of memory
.\apps\dgst.c
bad input format specified
unable to write DH parameters
	return(dh);
		return(NULL);
	if ((dh->p == NULL) || (dh->g == NULL))
	dh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);
	dh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);
	if ((dh=DH_new()) == NULL) return(NULL);
	DH *dh;
DH *get_dh%d()
static unsigned char dh%d_g[]={
0x%02X,
static unsigned char dh%d_p[]={
OPENSSL_malloc
.\apps\dh.c
DH parameters appear to be ok.
the g value is not a generator
unable to check the generator value
p value is not a safe prime
p value is not prime
unable to load DH parameters
 -engine e     use engine e, possibly a hardware device.
 -noout        no output
 -C            Output C code
 -text         print a text form of the DH parameters
 -check        check the DH parameters
 -out arg      output file
 -outform arg  output format - one of DER PEM
-check
	dh->length = %ld;
		{ DH_free(dh); return(NULL); }
	static unsigned char dh%d_g[]={
	static unsigned char dh%d_p[]={
#ifndef HEADER_DH_H
#include <openssl/dh.h>
#endif
.\apps\dhparam.c
unable to load DSA parameters
This is going to take a long time
Generating DH parameters, %d bit long safe prime, generator %d
Generating DSA parameters, %d bit long prime
%ld semi-random bytes loaded
warning, not much extra random data, consider using the -rand option
generator may not be chosen for DSA parameters
               the random number generator
               - load the file (or the files in the directory) into
 numbits       number of bits in to generate (default 512)
 -5            generate parameters using  5 as the generator value
 -2            generate parameters using  2 as the generator value
 -dsaparam     read or generate DSA parameters, convert to DH
%s [options] [numbits]
-dsaparam
Salted__
-%-25s
non-hex digit
hex string is too long
OPENSSL_malloc failure %ld
bytes written:%8ld
bytes read   :%8ld
bad decrypt
Error setting cipher %s
invalid hex key value
iv undefined
error reading input file
invalid hex iv value
bad magic number
error writing output file
invalid hex salt value
bad password read
enter %s %s password:
decryption
encryption
.\apps\enc.c
invalid 'bufsize' specified.
bufsize=%d
Cipher Types
%-14s use engine e, possibly a hardware device.
-engine e
%-14s buffer size
-bufsize <n>
%-14s print the iv/key (then exit if -P)
%-14s key/iv in hex is the next argument
-K/-iv
%-14s   from a passphrase.  One of md2, md5, sha or sha1
%-14s the next argument is the md to use to create a key
%-14s passphrase is the first line of the file argument
%-14s passphrase is the next argument
%-14s base64 encode/decode, depending on encryption flag
-a/-base64
%-14s decrypt
%-14s encrypt
%-14s pass phrase source
-pass <arg>
%-14s output file
-out <file>
%-14s input file
-in <file>
zero length password
unable to read key from '%s'
%s is an unsupported message digest type
-kfile
-bufsize
-base64
-debug
-nosalt
-nopad
%s is an unknown cipher
base64
./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyzs
Warning: truncating password to %u characters
.\apps\passwd.c
Password: 
-reverse           switch table columns
-table             format output as table
-quiet             no warnings
-noverify          never verify when reading password from terminal
-stdin             read passwords from stdin
-in file           read passwords from file
-salt string       use provided salt
-apr1              MD5-based password algorithm, Apache variant
-1                 MD5-based password algorithm
-crypt             standard Unix password algorithm (default)
Usage: passwd [options] [passwords]
-reverse
-table
-quiet
-noverify
-stdin
-crypt
             the random number generator
           - load the file (or the files in the directory) into
 -engine e - use engine e, possibly a hardware device.
 -5        - use 5 as the generator value
 -2        - use 2 as the generator value
 -out file - output the key to 'file
usage: gendh [args] [numbits]
usage: errstr [-stats] <errno> ...
%s: bad error code
-stats
CAkeyTime
keyTime
holdInstruction
removeFromCRL
certificateHold
cessationOfOperation
superseded
affiliationChanged
CACompromise
keyCompromise
unspecified
 -updatedb       - Updates db for expired certificates
 -status serial  - Shows certificate status given the serial number
 -engine e       - use engine e, possibly a hardware device.
 -crlexts ..     - CRL extension section (override value in config file)
 -extfile file   - Configuration file with X509v3 extentions to add
 -extensions ..  - Extension section (override value in config file)
 -multivalue-rdn - enable support for multivalued RDNs
 -utf8           - input characters are UTF8 (default ASCII)
 -subj arg       - Use arg instead of request's subject
 -revoke file    - Revoke a certificate (given in file)
 -msie_hack      - msie modifications to handle all those universal strings
 -batch          - Don't ask questions
 -noemailDN      - Don't add the EMAIL field into certificate' subject
 -preserveDN     - Don't re-order the DN
 -ss_cert file   - File contains a self signed cert to sign
 -spkac file     - File contains DN and signed public key and challenge
 -infiles ....   - The last argument, requests to process
 -outdir dir     - Where to put output certificates
 -out file       - Where to put the output file(s)
 -in file        - The input PEM encoded certificate request(s)
 -selfsign       - sign a certificate with the key associated with it
 -cert file      - The CA certificate
 -key arg        - key to decode the private key if it is encrypted
 -keyform arg    - private key file format (PEM or ENGINE)
 -keyfile arg    - private key file
 -policy arg     - The CA 'policy' to support
 -md arg         - md to use, one of md2, md5, sha or sha1
 -days arg       - number of days to certify the certificate for
 -enddate YYMMDDHHMMSSZ    - certificate validity notAfter (overrides -days)
 -startdate YYMMDDHHMMSSZ  - certificate validity notBefore
 -crlhours hours - Hours is when the next CRL is due
 -crldays days   - Days is when the next CRL is due
 -gencrl         - Generate a new CRL
 -name arg       - The particular CA definition to use
 -config file    - A config file
 -verbose        - Talk alot while doing things
usage: ca args
variable lookup failed for %s::%s
%s=Unknown (%c).
%s=Suspended (%c)
%s=Expired (%c)
%s=Revoked (%c)
%s=Valid (%c)
Serial %s not present in db.
Malloc failure
.\apps\ca.c
%s=Expired
Invalid time format %s. Need YYYYMMDDHHMMSSZ
Invalid object identifier %s
Unknown CRL reason %s
\0x%02X
ASN.1 %2d:'
UNIVERSALSTRING:'
IA5STRING:'
T61STRING:'
PRINTABLE:'
invalid compromised time %s
missing compromised time
invalid object identifier %s
missing hold instruction
invalid reason code %s
invalid revocation date %s
TXT_DB error number %ld
failed to update database
unknown
CERTIFICATE WILL NOT BE CERTIFIED
Sign the certificate? [y/n]:
 (%ld days)
Certificate is to be certified until 
Certificate Details:
ERROR: adding extensions from request
Successfully added extensions from config
Successfully added extensions from file.
ERROR: adding extensions in section %s
Extra configuration file found
Everything appears to be ok, creating and signing the certificate
Subject Name  :%s
File name     :%s
Serial Number :%s
Expires on    :%s
Was revoked on:%s
Type	  :%s
invalid type, Data base error
Revoked
Expired
The matching entry has the following details
      check the database/serial_file for corruption
ERROR:Serial number %s has already been issued,
ERROR:There is already a certificate for %s
The subject name appears to be ok, checking data base for clashes
%s:invalid type in 'policy' configuration
The %s field needed to be the same in the
CA certificate (%s) and the request (%s)
The %s field does not exist in the CA certificate,
the 'policy' is misconfigured
The mandatory %s field was missing
The %s field needed to be supplied and was missing
%s:unknown object type in 'policy' configuration
supplied
optional
emailAddress type needs to be of type IA5STRING
The string contains characters that are illegal for the ASN.1 type
The Subject's Distinguished Name is as follows
malloc error
invalid characters in string %s
Signature ok
signature verification failed on SPKAC public key
error unpacking SPKAC public key
Check that the SPKAC request matches the signature
Netscape SPKAC structure not found in %s
unable to load Netscape SPKAC structure
no name/value pairs found in %s
Error in revocation arguments
Revoking Certificate %s.
ERROR:Already revoked, serial number %s
ERROR:name does not match %s
Adding Entry with serial number %s to DB for %s
Signature did not match the certificate request
Signature verification problems....
error unpacking public key
Certificate request and CA private key do not match
Check that the request matches the signature
Error reading certificate request in %s
Signature did not match the certificate
no input files
signing CRL
making CRL
cannot lookup how long until the next CRL is issued
default_crl_hours
default_crl_days
Error Loading CRL extension section %s
certificate file name too long
error while loading CRL number
crlnumber
crl_extensions
Data Base Updated
writing %s
writing new certificates
Write out database with %d new entries
CERTIFICATION CANCELED
%d out of %d certificate requests certified, commit? [y/n]
unable to find 'section' for %s
next serial number is %s
next serial number is 00
error while loading serial number
end date is invalid, it should be YYMMDDHHMMSSZ
cannot lookup how many days to certify for
default_days
default_enddate
start date is invalid, it should be YYMMDDHHMMSSZ
default_startdate
serial
policy is %s
policy
message digest is %s
email_in_dn
extensions
Successfully loaded extensions file %s
ERROR: on line %ld of config file '%s'
ERROR: loading the config file '%s'
Done. %d entries marked as expired
No entries found to mark expired
entry %d: bad serial number length (%d)
entry %d: bad serial number characters, char pos %ld, char is '%c'
entry %d: invalid expiry date
 in entry %d
entry %d: not revoked yet, but has a revocation date
Updating %s ...
generating index
%d entries loaded from the database
%s need to be a directory
unable to stat(%s)
I am unable to access the %s directory
there needs to be defined a directory for new certificate to be placed in
new_certs_dir
Invalid extension copy option: "%s"
copy_extensions
Invalid certificate options: "%s"
cert_opt
Invalid name options: "%s"
name_opt
msie_hack
preserve
CA certificate and CA private key do not match
CA certificate
certificate
CA private key
private_key
Error verifying serial %s!
database
unique_subject
default_ca
error on line %ld of config file '%s'
error loading the config file '%s'
openssl.cnf
SSLEAY_CONF
OPENSSL_CONF
-crl_CA_compromise
-crl_compromise
-crl_hold
-crl_reason
-crlexts
-updatedb
-status
-extfile
-revoke
-spkac
-ss_cert
-infiles
-crlhours
-crldays
-msie_hack
-gencrl
-noemailDN
-preserveDN
-notext
-outdir
-selfsign
-keyfile
-policy
-enddate
-startdate
-create_serial
bad input format specified for pkcs7 object
unable to write pkcs7 object
unable to load PKCS7 object
 -noout        don't output encoded data
 -text         print full details of certificates
 -print_certs  print any certs or crl in the input
 -outform arg  output format - DER or PEM
 -inform arg   input format - DER or PEM
-print_certs
unable to load the file, %s
error loading certificates
bad input format specified for input crl
unable to load CRL
 -nocrl         no crl to load, just certs from '-certfile'
                (can be used more than once)
 -certfile arg  certificates file of chain to a trusted CA
-certfile
-nocrl
 -CApath  dir    - verify CRL using certificates in "dir"
 -CAfile  name   - verify CRL using certificates in file "name"
 -noout          - no CRL output
 -crlnumber      - print CRL number
 -nextupdate     - nextUpdate field
 -lastupdate     - lastUpdate field
 -issuer         - print issuer DN
 -fingerprint    - print the crl fingerprint
 -hash           - print hash value
 -out arg        - output file - default stdout
 -in arg         - input file - default stdin
 -text           - print out a text format version
 -outform arg    - output format - default PEM
 -inform arg     - input format - default PEM (DER or PEM)
usage: crl args
unable to write CRL
%02X%c
%s Fingerprint=
nextUpdate=
lastUpdate=
<NONE>
crlNumber=
issuer=
Error getting CRL issuer public key
Error getting CRL issuer certificate
Error initialising X509 store
-crlnumber
-fingerprint
-nextupdate
-lastupdate
-issuer
unable to write key
.\apps\rsa.c
writing RSA key
RSA key error: %s
RSA key ok
Public Key
Only private keys can be checked
 -engine e       use engine e, possibly a hardware device.
 -pubout         output a public key
 -pubin          expect a public key in input file
 -check          verify key consistency
 -modulus        print the RSA key modulus
 -noout          don't print key out
 -text           print the key in text
                 encrypt PEM output with cbc aes
 -aes128, -aes192, -aes256
 -idea           encrypt PEM output with cbc idea
 -des3           encrypt PEM output with ede cbc des using 168 bit key
 -des            encrypt PEM output with cbc des
 -passout arg    output file pass phrase source
 -out arg        output file
 -passin arg     input file pass phrase source
 -sgckey         Use IIS SGC key format
 -in arg         input file
 -outform arg    output format - one of DER NET PEM
 -inform arg     input format - one of DER NET PEM
-pubout
-pubin
-sgckey
-passin arg    pass phrase source
-hexdump        hex dump output
-decrypt        decrypt with private key
-encrypt        encrypt with public key
-verify         verify with public key
-sign           sign with private key
-oaep           use PKCS#1 OAEP
-pkcs           use PKCS#1 v1.5 padding (default)
-raw            use no padding
-ssl            use SSL v2 padding
-certin         input is a certificate carrying an RSA public key
-pubin          input is an RSA public
-keyform arg    private key format - default PEM
-inkey file     input key
-out file       output file
-in file        input file
Usage: rsautl [options]
RSA operation error
Error reading input Data
.\apps\rsautl.c
Error Reading Output File
Error Reading Input File
Error getting RSA key
Certificate
A private key is needed for this operation
-decrypt
-encrypt
-hexdump
-asn1parse
-certin
-inkey
unable to write private key
writing DSA key
Public Key=
unable to load Key
read DSA key
 -modulus        print the DSA public value
 -outform arg    output format - DER or PEM
 -inform arg     input format - DER or PEM
unable to write DSA parameters
	return(dsa);
		{ DSA_free(dsa); return(NULL); }
	if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))
	dsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);
	dsa->q=BN_bin2bn(dsa%d_q,sizeof(dsa%d_q),NULL);
	dsa->p=BN_bin2bn(dsa%d_p,sizeof(dsa%d_p),NULL);
	if ((dsa=DSA_new()) == NULL) return(NULL);
	DSA *dsa;
DSA *get_dsa%d()
static unsigned char dsa%d_g[]={
static unsigned char dsa%d_q[]={
static unsigned char dsa%d_p[]={
.\apps\dsaparam.c
Error, DSA key generation failed
This could take some time
Error allocating DSA object
 number        number of bits to use for generating private key
 -rand         files to use for random number input
 -genkey       generate a DSA key
 -text         print as text
%s [options] [bits] <infile >outfile
-genkey
bad input format specified for key
writing EC key
read EC key
                                  explicit
                 possible values: named_curve (default)
                 in the asn1 der encoding
 -param_enc arg  specifies the way the ec parameters are encoded
                                   hybrid
                                  uncompressed (default)
                 possible values: compressed
 -conv_form arg  specifies the point conversion form 
 -param_out      print the elliptic curve parameters
 -text           print the key
 -des            encrypt PEM output, instead of 'des' every other 
                 cipher supported by OpenSSL can be used
-param_out
explicit
named_curve
-param_enc
hybrid
uncompressed
compressed
-conv_form
0x%02X
static unsigned char %s_%d[] = {
unable to write elliptic curve parameters
	return(group);
		group = NULL;
		EC_GROUP_free(group);
	if (!ok)
	if (point)
		EC_POINT_free(point);
	if (tmp_3)
		BN_free(tmp_3);
	if (tmp_2)
		BN_free(tmp_2);
	if (tmp_1)
		BN_free(tmp_1);
	ok=1;
	if (!EC_GROUP_set_generator(group, point, tmp_2, tmp_3))
		goto err;
	if ((tmp_3 = BN_bin2bn(ec_cofactor_%d, sizeof(ec_cofactor_%d), tmp_3)) == NULL)
		goto err;
	if ((tmp_2 = BN_bin2bn(ec_order_%d, sizeof(ec_order_%d), tmp_2)) == NULL)
		goto err;
	if (point == NULL)
		goto err;
	point = EC_POINT_bn2point(group, tmp_1, NULL, NULL);
	if ((tmp_1 = BN_bin2bn(ec_gen_%d, sizeof(ec_gen_%d), tmp_1)) == NULL)
		goto err;
	/* build generator */
	if ((group = EC_GROUP_new_curve_GFp(tmp_1, tmp_2, tmp_3, NULL)) == NULL)
		goto err;
	if ((tmp_3 = BN_bin2bn(ec_b_%d, sizeof(ec_b_%d), NULL)) == NULL)
		goto err;
	if ((tmp_2 = BN_bin2bn(ec_a_%d, sizeof(ec_a_%d), NULL)) == NULL)
		goto err;
	if ((tmp_1 = BN_bin2bn(ec_p_%d, sizeof(ec_p_%d), NULL)) == NULL)
		goto err;
	BIGNUM   *tmp_1 = NULL, *tmp_2 = NULL, *tmp_3 = NULL;
	EC_POINT *point = NULL;
	EC_GROUP *group = NULL;
	int ok=0;
EC_GROUP *get_ec_group_%d(void)
ec_cofactor
ec_order
ec_gen
failed
checking elliptic curve parameters: 
unable to load elliptic curve parameters
unknown curve name (%s)
using curve name prime256v1 instead of secp256r1
secp256r1
unable to create curve (%s)
using curve name prime192v1 instead of secp192r1
secp192r1
  %-10s: 
CURVE DESCRIPTION NOT AVAILABLE
 -engine e         use engine e, possibly a hardware device
 -rand file        files to use for random number input
 -genkey           generate ec key
 -no_seed          if 'explicit' parameters are choosen do not use the seed
                                    explicit
                   possible values: named_curve (default)
                   in the asn1 der encoding
 -param_enc arg    specifies the way the ec parameters are encoded
                                    hybrid
                                    uncompressed (default)
                   possible values: compressed
 -conv_form arg    specifies the point conversion form 
 -list_curves      prints a list of all currently available curve 'short names'
 -name arg         use the ec parameters with 'short name' name
 -C                print a 'C' function creating the parameters
 -check            validate the ec parameters
 -text             print the ec parameters in text form
 -noout            do not print the ec parameter
 -out arg          output file - default stdout
 -in  arg          input file  - default stdin
 -outform arg      output format - default PEM
 -inform arg       input format - default PEM (DER or PEM)
.\apps\ecparam.c
-no_seed
-list_curves
 -certopt arg    - various certificate text options
 -clrext         - delete extensions before signing and input certificate
 -extensions     - section from config file with X509V3 extensions to add
 -extfile        - configuration file with X509V3 extensions to add
 -md2/-md5/-sha1/-mdc2 - digest to use
 -C              - print out C code forms
 -text           - print the certificate in text form
 -set_serial     - serial number to use
 -CAserial arg   - serial file
 -CAcreateserial - create serial number file if it does not exist
                   missing, it is assumed to be in the CA file.
 -CAkey arg      - set the CA key, must be PEM format
 -CA arg         - set the CA certificate, must be PEM format.
 -req            - input is a certificate request, sign and output.
 -x509toreq      - output a certification request object
 -signkey arg    - self sign cert with arg
                   exit 1 if so, 0 if not
 -checkend arg   - check whether the cert expires in the next arg seconds
 -days arg       - How long till expiry of a signed certificate - def 30 days
 -setalias arg   - set certificate alias
 -addreject arg  - reject certificate for a given purpose
 -addtrust arg   - trust certificate for a given purpose
 -clrreject      - clear all rejected purposes
 -clrtrust       - clear all trusted purposes
 -trustout       - output a "trusted" certificate
 -ocsp_uri       - print OCSP Responder URL(s)
 -ocspid         - print OCSP hash values for the subject name and public key
 -noout          - no certificate output
 -alias          - output certificate alias
 -fingerprint    - print the certificate fingerprint
 -pubkey         - output the public key
 -modulus        - print the RSA key modulus
 -dates          - both Before and After dates
 -purpose        - print out certificate purposes
 -enddate        - notAfter field
 -startdate      - notBefore field
 -email          - print email address(es)
 -subject        - print subject DN
 -hash           - synonym for -subject_hash
 -issuer_hash    - print issuer hash value
 -subject_hash   - print subject hash value
 -serial         - print serial number value
 -passin arg     - private key password source
 -CAkeyform arg  - CA key format - default PEM
 -CAform arg     - CA format - default PEM
 -keyform arg    - private key format - default PEM
 -outform arg    - output format - default PEM (one of DER, NET or PEM)
 -inform arg     - input format - default PEM (one of DER, NET or PEM)
usage: x509 args
add_word failure
out of mem
.\apps\x509.c
error with certificate - error %d at depth %d
error with certificate to be certified - should be self signed
Yes (WARNING code=%d)
%s%s : 
unable to write certificate
Certificate will not expire
no request key file specified
Certificate will expire
Generating certificate request
request key
Getting request Private Key
CA Private Key
Getting CA Private Key
Private key
Getting Private key
notAfter=
notBefore=
unsigned char XXX_certificate[%d]={
unsigned char XXX_public_key[%d]={
unsigned char XXX_subject_name[%d]={
/* issuer :%s */
/* subject:%s */
Certificate purposes:
<No Alias>
serial=
subject= 
issuer= 
2.99999.3
SET.ex3
SET x509v3 extension 3
CA Certificate
It does not contain a public key
The certificate request appears to corrupted
Signature verification error
We need a private key to sign with
need to specify a CAkey if using the CA command
Invalid reject object value %s
Invalid trust object value %s
-ocspid
use -clrext instead of -crlext
-crlext
-clrext
-CAcreateserial
-alias
-clrreject
-clrtrust
-trustout
-checkend
-purpose
-dates
-issuer_hash
-subject_hash
-x509toreq
-next_serial
-serial
-ocsp_uri
-email
-certopt
-setalias
-addreject
-addtrust
-CAserial
-CAkey
-signkey
bad number of days
-CAkeyform
-CAform
e is %ld (0x%lX)
Generating RSA private key, %d bit long modulus
                 the random number generator
                 load the file (or the files in the directory) into
 -3              use 3 for the E value
 -f4             use F4 (0x10001) for the E value
 -out file       output the key to 'file
 -idea           encrypt the generated key with IDEA in cbc mode
 -des3           encrypt the generated key with DES in ede cbc mode (168 bit key)
 -des            encrypt the generated key with DES in cbc mode
usage: genrsa [args] [numbits]
-aes256
-aes192
-aes128
unable to create BIO for output
           - a DSA parameter file as generated by the dsaparam command
 dsaparam-file
 -idea     - encrypt the generated key with IDEA in cbc mode
 -des3     - encrypt the generated key with DES in ede cbc mode (168 bit key)
 -des      - encrypt the generated key with DES in cbc mode
 -out file - output the key to 'file'
usage: gendsa [args] dsaparam-file
Generating DSA key, %d bits
unable to load DSA parameter file
HTTP/1.0 200 ok
Content-type: text/plain
                          
Lets print some clear text
server2.pem
server.pem
 -no_ticket    - disable use of RFC4507bis session tickets
 -tlsextdebug  - hex dump of all TLS extensions received
 -key2 arg     - Private Key file to use for servername, in cert file if
 -cert2 arg    - certificate file to use for servername
 -servername_fatal - on mismatch send fatal alert (default warning alert)
 -servername host - servername for HostName TLS extension
 -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg'
 -engine id    - Initialise and use the specified engine
                 with the assumption it contains a complete HTTP response.
 -HTTP         - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>
 -WWW          - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>
 -www          - Respond to a 'GET /' with a status page
 -bugs         - Turn on SSL bug compatibility
 -no_ecdhe     - Disable ephemeral ECDH
 -no_dhe       - Disable ephemeral DH
 -no_tls1      - Just disable TLSv1
 -no_ssl3      - Just disable SSLv3
 -no_ssl2      - Just disable SSLv2
 -chain        - Read a certificate chain
 -mtu          - Set MTU
 -timeout      - Enable timeouts
 -dtls1        - Just talk DTLSv1
 -tls1         - Just talk TLSv1
 -ssl3         - Just talk SSLv3
 -ssl2         - Just talk SSLv2
 -no_tmp_rsa   - Do not generate a tmp RSA key
 -quiet        - No server output
 -serverpref   - Use server's cipher preferences
 -cipher arg   - play with 'openssl ciphers' to see what goes here
 -nocert       - Don't use any certificates (Anon-DH)
 -CAfile arg   - PEM format file of CA's
 -CApath arg   - PEM format directory of CA's
 -state        - Print the SSL states
 -msg          - Show protocol messages
 -debug        - Print more output
 -crlf         - convert LF from terminal into CRLF
 -nbio_test    - test with the non-blocking test bio
 -nbio         - Run with non-blocking IO
 -named_curve arg  - Elliptic curve name to use for ephemeral ECDH keys.
                 Use "openssl ecparam -list_curves" for all names
                 (default is sect163r2).
                 or a default set of parameters is used
 -dhparam arg  - DH parameter file to use, in cert file if not specified
 -dpass arg    - second private key file pass phrase source
 -dkeyform arg - second key format (PEM, DER or ENGINE) PEM default
 -dkey arg     - second private key file to use (usually for DSA)
 -dcertform x  - second certificate format (PEM or DER) PEM default
 -dcert arg    - second certificate file to use (usually for DSA)
 -pass arg     - private key file pass phrase source
 -keyform arg  - key format (PEM, DER or ENGINE) PEM default
                 not specified (default is %s)
 -key arg      - Private Key file to use, in cert file if
 -certform arg - certificate format (PEM or DER) PEM default
 -crl_check_all - check the peer certificate has not been revoked by its CA
                 or any other CRL in the CA chain. CRL(s) are appened to the
                 the certificate file.
 -crl_check    - check the peer certificate has not been revoked by its CA.
                 The CRL(s) are appended to the certificate file
                 (default is %s)
 -cert arg     - certificate file to use
 -Verify arg   - turn on peer certificate verification, must have a cert.
 -verify arg   - turn on peer certificate verification
 -context arg  - set session ID context
 -accept arg   - port to accept on (default is %d)
usage: s_server [args ...]
Swiching server context.
Hostname in TLS extension: "%s"
cert_status: ocsp response sent:
cert_status: error querying responder
cert_status: Can't retrieve issuer certificate.
cert_status: no AIA and no default responder URL
cert_status: AIA URL: %s
cert_status: can't parse AIA URL
cert_status: callback called
%4ld cache full overflows (%ld allowed)
%4ld callback cache hits
%4ld session cache timeouts
%4ld session cache misses
%4ld session cache hits
%4ld server accepts that finished
%4ld server renegotiates (SSL_accept())
%4ld server accepts (SSL_accept())
%4ld client connects that finished
%4ld client renegotiates (SSL_connect())
%4ld client connects (SSL_connect())
%4ld items in the session cache
shutdown accept socket
Peer has incorrect TLSv1 block padding
Reused session-id
CIPHER is %s
(NONE)
Shared ciphers:%s
issuer=%s
subject=%s
Client certificate
SSL SESSION PARAMETERS
verify error:%s
ACCEPT
rwrite W BLOCK
FILE:%s
Error opening '%s'
'%s' is a directory
Error accessing '%s'
'%s' is an invalid path
'%s' contains '..' reference
'%s' is an invalid file name
no client certificate available
</BODY></HTML>
%s, Cipher is %s
Reused, 
Ciphers common between both SSL end points:
%-11s:%-25s
Ciphers supported in s_server binary
<HTML><BODY BGCOLOR="#ffffff">
HTTP/1.0 200 ok
Content-type: text/html
GET /stats 
read R BLOCK
turning on non blocking io
.\apps\s_server.c
Generating temp (%d bit) RSA key...
Allocation error in generating RSA key
CONNECTION CLOSED
shutting down SSL
Read BLOCK
Write BLOCK
SSL_do_handshake -> %d
unable to create curve (sect163r2)
Using default temp ECDH parameters
error setting cipher list
Setting temp ECDH parameters
Using default temp DH parameters
Setting temp DH parameters
Setting secondary ctx parameters
id_prefix '%s' set.
error setting 'id_prefix'
warning: id_prefix is too long if you use SSLv2
warning: id_prefix is too long, only one new session will be possible
second certificate private key file
second server certificate file
second server certificate private key file
server certificate file
server certificate private key file
-cert2
-servername_fatal
-servername
-id_prefix
-chain
-timeout
-dtls1
-no_ticket
-no_tls1
-no_ssl3
-no_ssl2
-no_ecdhe
-no_dhe
-no_tmp_rsa
-state
Error parsing URL
-status_url
-status_timeout
-status_verbose
-tlsextdebug
-nbio_test
-cipher
-serverpref
-crl_check_all
-crl_check
-nocert
-dpass
-dkeyform
-dcert
-dcertform
-named_curve
-dhparam
-certform
-context
verify depth is %d, must return a certificate
-Verify
verify depth is %d
-accept
                
 -no_ticket        - disable use of RFC4507bis session tickets
 -status           - request certificate status from server
 -tlsextdebug      - hex dump of all TLS extensions received
 -servername host  - Set TLS extension servername in ClientHello
 -sess_in arg  - file to read SSL session from
 -sess_out arg - file to write SSL session to
                 are supported.
                 only "smtp", "pop3", "imap", "ftp" and "xmpp"
                 'prot' defines which one to assume.  Currently,
                 for those protocols that support it, where
 -starttls prot - use the STARTTLS command before starting TLS
                 command to see what is available
 -cipher       - preferred cipher to use, use the 'openssl ciphers'
 -serverpref   - Use server's cipher preferences (only SSLv2)
 -bugs         - Switch on all SSL implementation bug workarounds
 -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol
 -mtu          - set the MTU
 -dtls1        - just use DTLSv1
 -tls1         - just use TLSv1
 -ssl3         - just use SSLv3
 -ssl2         - just use SSLv2
 -no_ign_eof   - don't ignore input eof
 -ign_eof      - ignore input eof (default when -quiet)
 -quiet        - no s_client output
 -state        - print the 'ssl' states
 -nbio_test    - more ssl protocol testing
 -debug        - extra output
 -showcerts    - show all certificates in the chain
 -pause        - sleep(1) after each read(2) and write(2) system call
 -reconnect    - Drop and re-make the connection with the same Session-ID
 -keyform arg  - key format (PEM or DER) PEM default
                 not specified but cert file is.
 -key arg      - Private key file to use, in cert file if
 -cert arg     - certificate file to use, PEM format assumed
 -verify depth - turn on peer certificate verification
 -connect host:port - who to connect to (default is %s:%s)
localhost
 -port port     - use -connect instead
 -host host     - use -connect instead
usage: s_client args
Can't use SSL_get_servername
Expansion: %s
Compression: %s
Server public key is %d bit
SSL handshake has read %ld bytes and written %ld bytes
Ciphers common between both SSL endpoints:
No client certificate CA names sent
Acceptable client certificate CA names
no peer certificate available
Server certificate
   i:%s
%2d s:%s
Certificate chain
======================================
======================================
response parse error
no response sent
OCSP response: 
closed
read:errno=%d
write:errno=%d
shutdown
bad select %d
getsockname:errno=%d
read X BLOCK
read W BLOCK
RENEGOTIATING
write X BLOCK
write R BLOCK
write W BLOCK
connect:errno=%d
drop connection and then reconnect
Error writing session file %s
<proceed
<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'/>
/stream:features>
<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'
<stream:stream xmlns:stream='http://etherx.jabber.org/streams' xmlns='jabber:client' to='%s' version='1.0'>
AUTH TLS
. STARTTLS
didn't found STARTTLS in server response, try anyway...
. CAPABILITY
STARTTLS
didn't found starttls in server response, try anyway...
STARTTLS
EHLO openssl.client.net
CONNECTED(%08X)
Unable to set TLS servername extension.
Can't open session file %s
Error setting client auth engine
client certificate file
client certificate private key file
Error getting client auth engine
-ssl_client_engine
-starttls
-reconnect
-showcerts
-pause
-no_ign_eof
-ign_eof
-prexit
-sess_in
-sess_out
-connect
.\apps\s_client.c
nistb571
nistb409
nistb283
nistb233
nistb163
nistk571
nistk409
nistk283
nistk233
nistk163
nistp521
nistp384
nistp256
nistp224
nistp192
secp160r1
aes-256 ige
aes-192 ige
aes-128 ige
camellia-256 cbc
camellia-192 cbc
camellia-128 cbc
aes-256 cbc
aes-192 cbc
aes-128 cbc
cast cbc
blowfish cbc
rc5-32/12 cbc
rc2 cbc
seed cbc
idea cbc
des ede3
des cbc
rmd160
hmac(md5)
string to make the random number generator think it has entropy
Doing %s %ld times on %d size blocks: 
+DN:%s:%ld:%d
Doing %ld %d bit %s %s's: 
+DNP:%ld:%d:%s:%s
%d %s's in %.2fs
+R:%d:%s:%f
%4u bit ecdh (%s) %8.4fs %8.1f
+F5:%u:%u:%f:%f
%30sop      op/s
%4u bit ecdsa (%s) %8.4fs %8.4fs %8.1f %8.1f
+F4:%u:%u:%f:%f
%30ssign    verify    sign/s verify/s
dsa %4u bits %8.6fs %8.6fs %8.1f %8.1f
+F3:%u:%u:%f:%f
rsa %4u bits %8.6fs %8.6fs %8.1f %8.1f
+F2:%u:%u:%f:%f
%18ssign    verify    sign/s verify/s
 %11.2f 
 %11.2fk
@%-13s
+F:%d:%s
%7d bytes
type        
The 'numbers' are in 1000s of bytes per second processed.
ECDH failure.
ECDH key generation failure.
timing function used: %s%s%s%s%s%s%s
gettimeofday
getrusage
TIMEB 
available timing options: 
options:
%ld %d-bit ECDH ops in %.2fs
+R7:%ld:%d:%.2f
ECDH computations don't match.
%ld %d bit ECDSA verify in %.2fs
+R6:%ld:%d:%.2f
ECDSA verify failure
ECDSA verify failure.  No ECDSA verify will be done.
%ld %d bit ECDSA signs in %.2fs 
+R5:%ld:%d:%.2f
ECDSA sign failure
ECDSA sign failure.  No ECDSA sign will be done.
ECDSA failure.
%ld %d bit DSA verify in %.2fs
+R4:%ld:%d:%.2f
DSA verify failure
verify
DSA verify failure.  No DSA verify will be done.
%ld %d bit DSA signs in %.2fs
+R3:%ld:%d:%.2f
DSA sign failure
DSA sign failure.  No DSA sign will be done.
%ld %d bit public RSA's in %.2fs
+R2:%ld:%d:%.2f
RSA verify failure
public
RSA verify failure.  No RSA verify will be done.
%ld %d bit private RSA's in %.2fs
+R1:%ld:%d:%.2f
RSA sign failure
private
RSA sign failure.  No RSA sign will be done.
This is a key...
@internal error loading RSA key number %d
-mr             produce machine readable output.
-decrypt        time decryption instead of encryption (only EVP).
-evp e          use EVP e.
Available options:
rsa      
aes      
des      
rc2      
idea     
ecdhb163  ecdhb233  ecdhb283  ecdhb409  ecdhb571
ecdhk163  ecdhk233  ecdhk283  ecdhk409  ecdhk571
ecdhp160  ecdhp192  ecdhp224  ecdhp256  ecdhp384  ecdhp521
ecdsab163 ecdsab233 ecdsab283 ecdsab409 ecdsab571
ecdsak163 ecdsak233 ecdsak283 ecdsak409 ecdsak571
ecdsap160 ecdsap192 ecdsap224 ecdsap256 ecdsap384 ecdsap521
dsa512   dsa1024  dsa2048
rsa512   rsa1024  rsa2048  rsa4096
aes-128-ige aes-192-ige aes-256-ige 
aes-128-cbc aes-192-cbc aes-256-cbc 
des-cbc  des-ede3 
rc2-cbc  
idea-cbc 
sha512   
sha256   
sha1     
hmac     
md5      
md4      
md2      
Available values:
Error: bad option or value
no engine given
%s is an unknown cipher or digest
no EVP given
First we calculate the approximate speed ...
program when this computer is idle.
To get the most accurate results, try to run this
You have chosen to measure elapsed time instead of user CPU time.
ecdhb571
ecdhb409
ecdhb283
ecdhb233
ecdhb163
ecdhk571
ecdhk409
ecdhk283
ecdhk233
ecdhk163
ecdhp521
ecdhp384
ecdhp256
ecdhp224
ecdhp192
ecdhp160
ecdsab571
ecdsab409
ecdsab283
ecdsab233
ecdsab163
ecdsak571
ecdsak409
ecdsak283
ecdsak233
ecdsak163
ecdsap521
ecdsap384
ecdsap256
ecdsap224
ecdsap192
ecdsap160
cast-cbc
blowfish
bf-cbc
idea-cbc
rc2-cbc
rsa4096
rsa2048
rsa1024
rsa512
dsa2048
dsa1024
dsa512
openssl
aes-256-ige
aes-192-ige
aes-128-ige
aes-256-cbc
aes-192-cbc
aes-128-cbc
des-ede3
des-cbc
ripemd
-elapsed
.\apps\speed.c
localhost:4433
-www page     - Retrieve 'page' from the site
-reuse        - Just time connection reuse
-new          - Just time new connections
-bugs         - Turn on SSL bug compatibility
-ssl3         - Just use SSLv3
-ssl2         - Just use SSLv2
-nbio         - Run with non-blocking IO
-connect host:port - host:port to connect to (default is %s)
usage: s_time <args>
-www option too long
-reuse
>starting
Unable to get connection
Now timing with session id reuse.
%d connections in %ld real seconds, %ld bytes read per connection
%d connections in %.2fs; %.2f connections/user sec, bytes read %ld
GET %s HTTP/1.0
Collecting connection statistics for %d seconds
No CIPHER specified
SSL_CIPHER
multiline
oneline
RFC2253
dump_unknown
space_eq
nofname
dn_rev
sep_multiline
sep_semi_plus_space
sep_comma_plus_space
sep_comma_plus
compat
dump_der
dump_nostr
dump_all
show_type
ignore_type
use_quote
esc_msb
esc_ctrl
esc_2253
ext_dump
ext_parse
ext_error
ext_default
no_attributes
no_aux
no_sigdump
no_extensions
no_pubkey
no_issuer
no_subject
no_validity
no_signame
no_serial
no_version
no_header
ca_default
compatible
pkcs12
PKCS12
.\apps\apps.c
issuer=
OpenSSL application user interface
aborted!
User interface error
pass phrase
Invalid password argument "%s"
Can't open BIO for stdin
Can't access file descriptor %s
Error reading password from BIO
Can't open file %s
Can't read environment variable %s
problem creating object %s=%s
problem loading oid section %s
oid_section
Mac verify error (wrong password?) in PKCS12 file for %s
Passpharse callback error for %s
Error loading PKCS12 file for %s
unable to load certificate
bad input format specified for %s
Error reading header on certificate
reading certificate
Error opening %s %s
Error reading %s %s
unable to load certificates
copyall
SO_PATH
dynamic
engine "%s" set.
can't use that engine
SET_USER_INTERFACE
invalid engine "%s"
enabling auto ENGINE support
Error configuring OpenSSL
error converting serial to ASN.1 format
file name too long
error creating name index:(%ld,%ld,%ld)
error creating serial number index:(%ld,%ld,%ld)
unique_subject = %s
unable to open '%s'
%s.attr.%s
%s.attr
No value provided for Subject Attribute %s, skipped
Subject Attribute %s has no known NID, skipped
end of string encountered while processing type of subject name element #%d
escape character at end of string
Subject does not start with '/'.
-policy_print
-x509_strict
-explicit_policy
-policy_check
-issuer_checks
-ignore_critical
unrecognized purpose
Invalid Policy "%s"
 <empty>
%s Policies:
Authority
Require explicit Policy: %s
unable to load %s
bad input format specified for key file
no engine specified
no keyfile specified
error converting number from bin to BIGNUM
unable to load number from %s
Out of memory
reason
unable to rename %s to %s
error on line %ld of db attribute file '%s'
verify return:%d
issuer= %s
verify error:num=%d:%s
depth=%d %s
Private key does not match the certificate public key
unable to get private key from '%s'
unable to get certificate from '%s'
error setting private key
error setting certificate
write to %p [%p] (%d bytes => %ld (0x%lX))
read from %p [%p] (%d bytes => %ld (0x%lX))
%s:error in %s
%s:failed in %s
SSL3 alert %s:%s:%s
undefined
SSL_accept
SSL_connect
%s %s%s [length %04lx]%s%s
, Finished
, ClientKeyExchange
, CertificateVerify
, ServerHelloDone
, CertificateRequest
, ServerKeyExchange
, Certificate
, ServerHello
, ClientHello
, HelloRequest
 no_renegotiation
 user_canceled
 internal_error
 insufficient_security
 protocol_version
 export_restriction
 decrypt_error
 decode_error
 access_denied
 unknown_ca
 illegal_parameter
 certificate_unknown
 certificate_expired
 certificate_revoked
 unsupported_certificate
 bad_certificate
 handshake_failure
 decompression_failure
 record_overflow
 decryption_failed
 bad_record_mac
 unexpected_message
 close_notify
, warning
, fatal
ChangeCipherSpec
Handshake
, CLIENT-CERTIFICATE
, REQUEST-CERTIFICATE
, SERVER-FINISHED
, SERVER-VERIFY
, SERVER-HELLO
, CLIENT-FINISHED
, CLIENT-MASTER-KEY
, CLIENT-HELLO
 UNSUPPORTED-CERTIFICATE-TYPE-ERROR
 BAD-CERTIFICATE-ERROR
 NO-CERTIFICATE-ERROR
 NO-CIPHER-ERROR
, ERROR:
SSL 2.0
SSL 3.0 
TLS 1.0 
TLS %s extension "%s" (id=%d), len=%d
client
server
server ticket
EC point formats
elliptic curves
status request
truncated HMAC
trusted CA keys
client certificate URL
max fragment length
server name
unable to start WINSOCK, error code=%d
connect
keepalive
socket
getservbyname failure for %s
gethostbyname addr is not AF_INET
gethostbyname failure
.\apps\s_socket.c
bad gethostbyaddr
accept error %d
invalid IP address
%u.%u.%u.%u
no port defined
'random' data can be kept in (the file will be overwritten).
Consider setting the RANDFILE environment variable to point at a file that
with much random data.
This means that the random number generator has not been seeded
unable to load 'random state'
Loading 'screen' into random state -
unable to write 'random state'
options:  
%s (Library: %s)
OpenSSL 0.9.8k 25 Mar 2009
usage:version -[avbofpd]
 -context arg    - set the session ID context
 -cert           - output certificate 
 -text           - print ssl session id details
usage: sess_id args
unable to load SSL_SESSION
unable to write X509
unable to write SSL_SESSION
No certificate present
Context too long
 -tls1       - TLS1 mode
 -ssl3       - SSL3 mode
 -ssl2       - SSL2 mode
 -v          - verbose mode, a textual listing of the ciphers in SSLeay
usage: ciphers args
Error in cipher list
Error reading sequence file %s
Error reading certs file %s
Can't open output file %s
Can't open input file %s
-toseq    output NS Sequence file
-out file output file
-in file  input file
Usage nseq [options]
Netscape certificate sequence utility
-toseq
%s, Iteration %ld
PKCS7 Encrypted data: 
PKCS7 Data
<No Values>
<Unsupported tag %d>
%s: <Empty Attributes>
%s: <No Attributes>
Mac verify error: invalid password?
Error outputting keys and certificates
MAC verified OK
MAC Iteration %ld
Enter Import Password:
Error %s getting chain.
Enter Export Password:
Memory allocation error
certificates from certfile
No certificate matches private key
certificates
private key
Nothing to do!
Can't read Password
Enter MAC Password:
<stdout>
Error opening input file %s
<stdin>
-password
-caname
-keypbe
-LMK          Add local machine keyset attribute to private key
-CSP name     Microsoft CSP name
              the random number generator
              load the file (or the files in the directory) into
-rand file%cfile%c...
-engine e     use engine e, possibly a hardware device.
-passout p    output file pass phrase source
-passin p     input file pass phrase source
-password p   set import/export password source
-keysig       set MS key signature type
-keyex        set MS key exchange type
-keypbe alg   specify private key PBE algorithm (default 3DES)
-certpbe alg  specify certificate PBE algorithm (default RC2-40)
-descert      encrypt PKCS#12 certificates with triple DES (default RC2-40)
-twopass      separate MAC, encryption passwords
-maciter      use MAC iteration
-noiter       don't use encryption iteration
-nodes        don't encrypt private keys
              encrypt PEM output with cbc aes
-aes128, -aes192, -aes256
-idea         encrypt private keys with idea
-des3         encrypt private keys with triple DES (default)
-des          encrypt private keys with DES
-info         give info about PKCS#12 structure.
-nokeys       don't output private keys.
-cacerts      only output CA certificates.
-clcerts      only output client certificates.
-nocerts      don't output certificates.
-nomacver     don't verify MAC.
-noout        don't output anything, just verify.
-out outfile  output filename
-in  infile   input filename
-caname "nm"  use nm as CA friendly name (can be used more than once).
-name "name"  use name as friendly name
-CAfile arg   - PEM format file of CA's
-CApath arg   - PEM format directory of CA's
-certfile f   add all certs in f
-inkey file   private key if not infile
-chain        add certificate chain
-export       output PKCS12 file
Usage: pkcs12 [options]
Unknown PBE algorithm %s
-certpbe
-nomac
-nomaciter
-maciter
-noiter
-export
-descert
-nomacver
-twopass
-cacerts
-clcerts
-nocerts
-keysig
-keyex
-nokeys
Warning unsupported bag type: 
Safe Contents bag
Certificate bag
Shrouded Keybag: 
Key Attributes
Bag Attributes
Key bag
No Octet String in PrivateKey
DSA parameters included in PrivateKey
DSA public key include in PrivateKey
Unknown broken type
Warning: broken key encoding: 
Error decrypting key
Enter Password:
Error reading key
Error encrypting key
Enter Encryption Password:
Bad format specified for key
Error converting key
-v1 obj         use PKCS#5 v1.5 and cipher "alg"
-v2 alg         use PKCS#5 v2.0 and cipher "alg"
-nocrypt        use or expect unencrypted private key
-noiter         use 1 as iteration count
-nsdb           use (nonstandard) DSA Netscape DB format
-embed          use (nonstandard) embedded DSA parameters format
-nooct          use (nonstandard) no octet format
-topk8          output PKCS8 file
-passout arg    output file pass phrase source
-outform X      output format (DER or PEM)
-passin arg     input file pass phrase source
-inform X       input format (DER or PEM)
Usage pkcs8 [options]
-embed
-nooct
-nocrypt
-topk8
Unknown cipher %s
Signature Failure
Signature OK
Error loading SPKAC
Can't find SPKAC called "%s"
Error parsing config file
Error opening input file
SPKAC=%s
Error opening output file
 -engine e      use engine e, possibly a hardware device.
 -verify        verify SPKAC signature
 -noout         don't print SPKAC
 -spkac arg     alternative SPKAC name
 -challenge arg challenge string
 -passin arg    input file pass phrase source
 -key arg       create SPKAC using private key
%s [options]
-spksect
-challenge
Bad input format for PKCS#7 file
Bad output format for PKCS#7 file
Subject: %s
From: %s
To: %s
Verification failure
Error writing signers to %s
Verification successful
Error decrypting PKCS#7 structure
Can't read content file %s
Error reading S/MIME message
Error creating PKCS#7 structure
signing key file
signer certificate
recipient certificate file
cert.pem       recipient certificate(s) for encryption
               load the file (or the files in the directory) into
-passin arg    input file pass phrase source
-engine e      use engine e, possibly a hardware device.
-crl_check_all check revocation status of signer's certificate chain using CRLs
-crl_check     check revocation status of signer's certificate using CRLs
-CAfile file   trusted certificates file
-CApath dir    trusted certificates directory
-text          include or delete text MIME headers
-subject s     subject
-from ad       from address
-to addr       to address
-content file  supply or override content for detached signature
-outform arg   output format SMIME (default), PEM or DER
-out file      output file
-keyform arg   input private key format (PEM or ENGINE)
-inkey file    input private key (if not signer or recipient)
-inform arg    input format SMIME (default), PEM or DER
-in file       input file
-recip  file   recipient certificate file for decryption
-signer file   signer certificate file
-certfile file other certificates file
-binary        don't translate message to text
-noattr        don't include any signed attributes
-nodetach      use opaque signing
-nocerts       don't include signers certificate when signing
-noverify      don't verify signers certificate
-nosigs        don't verify message signature
-nointern      don't search certificates in message for signer
               encrypt PEM output with cbc aes
-rc2-128       encrypt with RC2-128
-rc2-64        encrypt with RC2-64
-rc2-40        encrypt with RC2-40 (default)
-des           encrypt with DES
-des3          encrypt with triple DES
-pk7out        output PKCS#7 structure
-verify        verify signed message
-sign          sign message
-decrypt       decrypt encrypted message
-encrypt       encrypt message
Usage smime [options] cert.pem ...
No recipient(s) certificate(s) specified
No recipient certificate or key specified
No signer certificate specified
-content
-recip
-signer
-crlfeol
-nooldmime
-nosigs
-nosmimecap
-nodetach
-noattr
-nochain
-nointern
-rc2-64
-rc2-128
-rc2-40
-pk7out
-hex                  - hex encode output
-base64               - base64 encode output
-rand file%cfile%c... - seed PRNG from files
-engine e             - use engine e, possibly a hardware device.
-out file             - write to file
Usage: rand [options] num
 argument "/lib/libdriver.so".
 Eg. '-pre "SO_PATH:/lib/libdriver.so"' calls command "SO_PATH" with
 line, or all supported ENGINEs if none are specified.
 NB: -pre and -post will be applied to all ENGINEs supplied on the command
               (only used if -t is also provided)
 -post <cmd> - runs command 'cmd' against the ENGINE after loading it
               to load it (if -t is used)
 -pre <cmd>  - runs command 'cmd' against the ENGINE before any attempts
               -tt will display error trace for unavailable engines
 -t[t]       - for each engine, check that they are really available
 -c          - for each engine, also list the capabilities
               -vvvv will also show internal input flags
               -vvv will also add the input flags for each command
               -vv will additionally display each command's description
 -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands'
usage: engine opts [engine ...]
.\apps\engine.c
  <illegal flags!>
<0x%04X>
NO_INPUT
STRING
NUMERIC
[Internal] 
<no flags>
%s%s(input flags): 
%s: %s
<no description>
[Error]: command name too long
[Success]: %s
[Failure]: %s
[Error]: internal stack error
[ unavailable ]
[ available ]
Loaded: (%s) %s
(%s) %s
Error Creating OCSP request
No issuer certificate specified
Error converting serial number %s
	Revocation Time: 
	Reason: %s
	Next Update: 
	This Update: 
WARNING: Status times invalid.
ERROR: No Status found.
.\apps\ocsp.c
Error setting up accept BIO
Error parsing OCSP request
Invalid request
Error accepting connection
HTTP/1.0 200 OK
Content-type: application/ocsp-response
Content-Length: %d
Unexpected retry condition
Select error
Timeout on request
Timeout on connect
Can't get connection fd
Error connecting BIO
Error querying OCSP responsder
Error creating SSL context.
Error creating connect BIO
Response verify OK
Nonce Verify error
Response Verify Failure
WARNING: no nonce in response
Error parsing response
validator certificate
Error reading OCSP response
Error Opening OCSP response file
Need a responder certificate, key and CA for this operation!
Error opening file %s
Error signing OCSP request
Error loading signer certificate
Responder Error: %s (%d)
signer private key
signer certificates
Need an OCSP request for this operation!
Waiting for OCSP client connections...
responder private key
responder other certificates
Error loading responder certificate
responder certificate
Error reading OCSP request
Error Opening OCSP request file
-rother
-rsigner
-ndays
Illegal accept count %s
-nrequest
Illegal update period %s
-index
issuer certificate
-respout
-reqout
Illegal validity age %s
-status_age
Illegal validity period %s
-validity_period
-verify_other
-sign_other
-VAfile
-respin
-reqin
-resp_text
-req_text
-no_intern
-trust_other
-no_explicit
-no_cert_checks
-no_chain
-no_cert_verify
-no_signature_verify
-no_certs
-resp_key_id
-resp_no_certs
-no_nonce
-nonce
-ignore_err
-nrequest n        number of requests to accept (default unlimited)
-resp_key_id       identify reponse by signing certificate key ID
-ndays n	 	 number of days before next update
-nmin n	 	 number of minutes before next update
-resp_no_certs     don't include any certificates in response
-rother file	 other certificates to include in response
-rkey file	 responder key to sign responses with
-rsigner file	 responder certificate to sign responses with
-CA file		 CA certificate
-index file	 certificate status index file
-port num		 port to run responder on
-no_cert_checks    don't do additional checks on signing certificate
-no_chain          don't chain verify response
-no_cert_verify    don't check signing certificate
-no_signature_verify don't check signature on response
-no_intern         don't search certificates contained in response for signer
-trust_other       don't verify additional certificates
-verify_other file additional certificates to search for signer
-noverify          don't verify response at all
-status_age n      maximum status age in seconds
-validity_period n maximum validity discrepancy in seconds
-VAfile file       validator certificates file
-CAfile file       trusted certificates file
-CApath dir        trusted certificates directory
-path              path to use in OCSP request
-host host:n       send OCSP request to host on port n
-url URL           OCSP responder URL
-no_nonce          don't add OCSP nonce to request
-nonce             add OCSP nonce to request
-respin file       read DER encoded OCSP reponse from "file"
-reqin file        read DER encoded OCSP request from "file"
-respout file      write DER encoded OCSP reponse to "file"
-reqout file       write DER encoded OCSP request to "file"
-text              print text form of request and response
-resp_text         print text form of response
-req_text          print text form of request
-no_certs          don't include any certificates in signed request
-sign_other file   additional certificates to include in signed request
-signkey file      private key to sign OCSP request with
-signer file       certificate to sign OCSP request with
-serial n          serial number to check
-cert file         certificate to check
-issuer file       issuer certificate
-out file          output filename
Usage ocsp [options]
OCSP utility
Illegal timeout value %s
 is %sprime
Unknown option '%s'
%-14s number of checks
-checks <n>
%-14s hex
No prime specified
-checks
cast5-ofb
cast5-cfb
cast5-ecb
cast5-cbc
bf-ofb
bf-cfb
bf-ecb
rc2-40-cbc
rc2-64-cbc
rc2-ofb
rc2-cfb
rc2-ecb
idea-ofb
idea-cfb
idea-ecb
des-ede3-ofb
des-ede-ofb
des-ofb
des-ede3-cfb
des-ede-cfb
des-cfb
des-ede3-cbc
des-ede-cbc
des-ede
des-ecb
rc4-40
aes-256-ecb
aes-192-ecb
aes-128-ecb
engine
ciphers
sess_id
crl2pkcs7
version
s_time
s_client
s_server
gendsa
genrsa
ecparam
dsaparam
rsautl
errstr
passwd
dhparam
asn1parse
type out of bounds
openssl (lock_dbg_cb): %s (mode=%d, type=%d) at %s:%d
CRYPTO_w_unlock on read lock
CRYPTO_r_unlock on write lock
not locked
already locked
invalid mode
Cipher commands (see the `enc' command for more details)
Message Digest commands (see the `dgst' command for more details)
Standard commands
openssl:Error: '%s' is an invalid command.
list-cipher-commands
list-message-digest-commands
list-standard-commands
bad exit
error in %s
OpenSSL> 
OPENSSL_DEBUG_MEMORY
Filename cannot be displayed on Win9x
Expression cannot be displayed on Win9x
CorExitProcess
mscoree.dll
.mixcrt
EncodePointer
KERNEL32.DLL
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
UTF-16LE
UNICODE
(null)
`h````
xpxxxx
runtime error 
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program: 
Illegal byte sequence
Directory not empty
Function not implemented
No locks available
Filename too long
Resource deadlock avoided
Result too large
Domain error
Broken pipe
Too many links
Read-only file system
Invalid seek
No space left on device
File too large
Inappropriate I/O control operation
Too many open files
Too many open files in system
Invalid argument
Is a directory
Not a directory
No such device
Improper link
File exists
Resource device
Unknown error
Bad address
Permission denied
Not enough space
Resource temporarily unavailable
No child processes
Bad file descriptor
Exec format error
Arg list too long
No such device or address
Input/output error
Interrupted function call
No such process
No such file or directory
Operation not permitted
No error
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
(Press Retry to debug the application - JIT must be enabled)
For information on how your program can cause an assertion
failure, see the Visual C++ documentation on asserts
Expression: 
Line: 
File: 
Program: 
Assertion failed!
InitializeCriticalSectionAndSpinCount
kernel32.dll
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
GAIsProcessorFeaturePresent
KERNEL32
CONIN$
CONOUT$
`h`hhh
xppwpp
GetUserObjectInformationA
MessageBoxA
USER32.DLL
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
1#QNAN
1#SNAN
SSLEAY32.dll
LIBEAY32.dll
WSOCK32.dll
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
GetLastError
CloseHandle
SetFilePointer
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
ReadFile
GetFileType
CreateFileA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WriteConsoleW
GetStdHandle
GetModuleFileNameW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetProcAddress
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
GetTimeZoneInformation
MoveFileA
DeleteFileA
SetConsoleCtrlHandler
HeapAlloc
HeapReAlloc
HeapFree
GetCommandLineA
GetVersionExA
GetProcessHeap
FindNextFileA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetEndOfFile
FlushFileBuffers
RtlUnwind
LoadLibraryW
GetFullPathNameA
GetCurrentDirectoryA
LCMapStringA
LCMapStringW
LoadLibraryA
InitializeCriticalSection
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CompareStringA
CompareStringW
SetEnvironmentVariableA
KERNEL32.dll
GetFileAttributesA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
openssl.exe
OPENSSL_Applink
Iz*!,I
EwnW`W
yR<d4}
(w 1q,
><Sg?O
lZL,YV
<A'2u$
e!S_()O
(P9gS,<
"-->Z1
*kX_Hx 
cP"/XXyk
^@ H{?
_!1trkd
Pfeo<N
4ah7=.J[
q"dYiN
-time arg     - max number of seconds to collect data, default %d
-verify arg   - turn on peer certificate verification, arg == depth
-cert arg     - certificate file to use, PEM format assumed
-key arg      - RSA file to use, PEM format assumed, key is in cert file
                file if not specified by this option
-CApath arg   - PEM format directory of CA's
-CAfile arg   - PEM format file of CA's
-cipher       - preferred cipher to use, play with 'openssl ciphers'
                          
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
                          
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Assertion failed: %s, file %s, line %d