Solaris binary files quick reference

From EggeWiki

file - determine what kind of executable you have

$ file /usr/bin/ssh
/usr/bin/ssh:   ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped

ldd - display the dynamic linking information

$ ldd /usr/bin/ssh
        libsocket.so.1 =>        /lib/libsocket.so.1
        libnsl.so.1 =>   /lib/libnsl.so.1
        libz.so.1 =>     /usr/lib/libz.so.1
        libcrypto.so.0.9.7 =>    /usr/sfw/lib/libcrypto.so.0.9.7
        libgss.so.1 =>   /usr/lib/libgss.so.1
        libc.so.1 =>     /lib/libc.so.1
        libmp.so.2 =>    /lib/libmp.so.2
        libmd.so.1 =>    /lib/libmd.so.1
        libscf.so.1 =>   /lib/libscf.so.1
        libcmd.so.1 =>   /lib/libcmd.so.1
        libdoor.so.1 =>  /lib/libdoor.so.1
        libuutil.so.1 =>         /lib/libuutil.so.1
        libgen.so.1 =>   /lib/libgen.so.1
        libcrypto_extra.so.0.9.7 =>      /usr/sfw/lib/libcrypto_extra.so.0.9.7
        libm.so.2 =>     /lib/libm.so.2

dump display the RPATH and RUNPATH information

$ dump -Lv  /usr/bin/ssh

/usr/bin/ssh:

  **** DYNAMIC SECTION INFORMATION ****
.dynamic:
[INDEX] Tag         Value
[1]     NEEDED          libsocket.so.1
[2]     NEEDED          libnsl.so.1
[3]     NEEDED          libz.so.1
[4]     NEEDED          libcrypto.so.0.9.7
[5]     NEEDED          libgss.so.1
[6]     NEEDED          libc.so.1
[7]     INIT            0x80794c8
[8]     FINI            0x80794dc
[9]     RUNPATH         /usr/sfw/lib
[10]    RPATH           /usr/sfw/lib
[11]    HASH            0x8050108
[12]    STRTAB          0x8054570
[13]    STRSZ           0x2a38
[14]    SYMTAB          0x80517e0
[15]    SYMENT          0x10
[16]    CHECKSUM        0xe45
[17]    VERNEED         0x8056fa8
[18]    VERNEEDNUM      0x5
[19]    PLTSZ           0x730
[20]    PLTREL          0x11
[21]    JMPREL          0x8057088
[22]    REL             0x8057068
[23]    RELSZ           0x750
[24]    RELENT          0x8
[25]    DEBUG           0
[26]    FEATURE_1       PARINIT
[27]    FLAGS           0
[28]    FLAGS_1         0
[29]    PLTGOT          0x8097000

objdump is similar to dump, and can give detailed version numbers

objdump -x /usr/bin/ssh

/usr/bin/ssh:     file format elf32-i386
/usr/bin/ssh
architecture: i386, flags 0x00000112:
EXEC_P, HAS_SYMS, D_PAGED
start address 0x08058628

Program Header:
    PHDR off    0x00000034 vaddr 0x08050034 paddr 0x00000000 align 2**0
         filesz 0x000000c0 memsz 0x000000c0 flags r-x
  INTERP off    0x000000f4 vaddr 0x00000000 paddr 0x00000000 align 2**0
         filesz 0x00000011 memsz 0x00000000 flags r--
    LOAD off    0x00000000 vaddr 0x08050000 paddr 0x00000000 align 2**16
         filesz 0x00036f2d memsz 0x00036f2d flags r-x
    LOAD off    0x00037000 vaddr 0x08097000 paddr 0x00000000 align 2**16
         filesz 0x000020c1 memsz 0x000045c4 flags rw-
 DYNAMIC off    0x000373a4 vaddr 0x080973a4 paddr 0x00000000 align 2**0
         filesz 0x000000f0 memsz 0x00000000 flags rwx
0x6ffffffb off    0x00000000 vaddr 0x00000000 paddr 0x00000000 align 2**0
         filesz 0x00000000 memsz 0x00000000 flags rw-

Dynamic Section:
  NEEDED      libsocket.so.1
  NEEDED      libnsl.so.1
  NEEDED      libz.so.1
  NEEDED      libcrypto.so.0.9.7
  NEEDED      libgss.so.1
  NEEDED      libc.so.1
  INIT        0x807949c
  FINI        0x80794b0
  RUNPATH     /usr/sfw/lib
  RPATH       /usr/sfw/lib
  HASH        0x8050108
  STRTAB      0x8054570
  STRSZ       0x2a38
  SYMTAB      0x80517e0
  SYMENT      0x10
  CHECKSUM    0xbcae
  VERNEED     0x8056fa8
  VERNEEDNUM  0x5
  PLTRELSZ    0x730
  PLTREL      0x11
  JMPREL      0x8057088
  REL         0x8057068
  RELSZ       0x750
  RELENT      0x8
  DEBUG       0x0
  FEATURE     0x1
  FLAGS       0x0
  FLAGS_1     0x0
  PLTGOT      0x8097000

Version References:
  required from libsocket.so.1:
    0x0a3d2794 0x00 00 SUNW_1.4
  required from libnsl.so.1:
    0x0a3d2797 0x00 00 SUNW_1.7
  required from libz.so.1:
    0x0a3d2791 0x00 00 SUNW_1.1
  required from libgss.so.1:
    0x0a3d2792 0x00 00 SUNW_1.2
    0x0b4ecc71 0x00 00 SUNWprivate_1.1
  required from libc.so.1:
    0x03d279e9 0x00 00 SUNW_1.19
    0x0b4ecc71 0x00 00 SUNWprivate_1.1

Sections:
Idx Name          Size      VMA       LMA       File off  Algn
  0 .interp       00000011  080500f4  080500f4  000000f4  2**0
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  1 .hash         000016d8  08050108  08050108  00000108  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  2 .dynsym       00002d90  080517e0  080517e0  000017e0  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  3 .dynstr       00002a38  08054570  08054570  00004570  2**0
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  4 .SUNW_version 000000c0  08056fa8  08056fa8  00006fa8  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  5 .rel.data     00000008  08057068  08057068  00007068  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  6 .rel.bss      00000018  08057070  08057070  00007070  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  7 .rel.plt      00000730  08057088  08057088  00007088  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  8 .plt          00000e70  080577b8  080577b8  000077b8  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, CODE
  9 .text         00020e74  08058628  08058628  00008628  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, CODE
 10 .init         00000014  0807949c  0807949c  0002949c  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, CODE
 11 .fini         00000014  080794b0  080794b0  000294b0  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, CODE
 12 .rodata       000002ea  080794c8  080794c8  000294c8  2**3
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
 13 .rodata1      0000d779  080797b4  080797b4  000297b4  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
 14 .got          000003a4  08097000  08097000  00037000  2**12
                  CONTENTS, ALLOC, LOAD, DATA
 15 .dynamic      000000f0  080973a4  080973a4  000373a4  2**2
                  CONTENTS, ALLOC, LOAD, DATA
 16 .data         00000bc4  08097498  08097498  00037498  2**3
                  CONTENTS, ALLOC, LOAD, DATA
 17 .data1        00001065  0809805c  0809805c  0003805c  2**2
                  CONTENTS, ALLOC, LOAD, DATA
 18 .bss          000024fc  080990c8  080990c8  000390c8  2**3
                  ALLOC
 19 .comment      0000002b  00000000  00000000  000390c1  2**0
                  CONTENTS, READONLY
 20 .SUNW_signature 0000010e  00000000  00000000  00039190  2**0
                  CONTENTS, READONLY
SYMBOL TABLE:
no symbols

elfdump can display the functions which the dynamic linker will link.

Any of these functions can be intercepted with a proxy sub or interposer.

$ elfdump -G /usr/bin/ssh

Global Offset Table Section:  .got
     index    addr        value     pending relocation
       [0]  0x08097000  0x080973a4
       [1]  0x08097004  0x00000000
       [2]  0x08097008  0x00000000
       [3]  0x0809700c  0x080577ce  R_386_JMP_SLOT            atexit
       [4]  0x08097010  0x080577de  R_386_JMP_SLOT            __fpstart
       [5]  0x08097014  0x080577ee  R_386_JMP_SLOT            exit
       [6]  0x08097018  0x080577fe  R_386_JMP_SLOT            gettext
       [7]  0x0809701c  0x0805780e  R_386_JMP_SLOT            fprintf
       [8]  0x08097020  0x0805781e  R_386_JMP_SLOT            getuid
       [9]  0x08097024  0x0805782e  R_386_JMP_SLOT            geteuid
      [10]  0x08097028  0x0805783e  R_386_JMP_SLOT            ___errno
      [11]  0x0809702c  0x0805784e  R_386_JMP_SLOT            seteuid
      [12]  0x08097030  0x0805785e  R_386_JMP_SLOT            setrlimit64
      [13]  0x08097034  0x0805786e  R_386_JMP_SLOT            getpwuid
      [14]  0x08097038  0x0805787e  R_386_JMP_SLOT            umask
      [15]  0x0809703c  0x0805788e  R_386_JMP_SLOT            sscanf
      [16]  0x08097040  0x0805789e  R_386_JMP_SLOT            strlen
      [17]  0x08097044  0x080578ae  R_386_JMP_SLOT            strcmp
      [18]  0x08097048  0x080578be  R_386_JMP_SLOT            SSLeay
      [19]  0x0809704c  0x080578ce  R_386_JMP_SLOT            stat64
      [20]  0x08097050  0x080578de  R_386_JMP_SLOT            strchr
      [21]  0x08097054  0x080578ee  R_386_JMP_SLOT            OPENSSL_add_all_algorithms_noconf
      [22]  0x08097058  0x080578fe  R_386_JMP_SLOT            ERR_load_crypto_strings
      [23]  0x0809705c  0x0805790e  R_386_JMP_SLOT            fileno
      [24]  0x08097060  0x0805791e  R_386_JMP_SLOT            isatty
      [25]  0x08097064  0x0805792e  R_386_JMP_SLOT            snprintf
      [26]  0x08097068  0x0805793e  R_386_JMP_SLOT            setuid
      [27]  0x0809706c  0x0805794e  R_386_JMP_SLOT            mkdir
      [28]  0x08097070  0x0805795e  R_386_JMP_SLOT            signal
      [29]  0x08097074  0x0805796e  R_386_JMP_SLOT            kill
      [30]  0x08097078  0x0805797e  R_386_JMP_SLOT            strerror
      [31]  0x0809707c  0x0805798e  R_386_JMP_SLOT            getenv
      [32]  0x08097080  0x0805799e  R_386_JMP_SLOT            strncmp
      [33]  0x08097084  0x080579ae  R_386_JMP_SLOT            popen
      [34]  0x08097088  0x080579be  R_386_JMP_SLOT            fgets
      [35]  0x0809708c  0x080579ce  R_386_JMP_SLOT            pclose
      [36]  0x08097090  0x080579de  R_386_JMP_SLOT            strlcpy
      [37]  0x08097094  0x080579ee  R_386_JMP_SLOT            ioctl
      [38]  0x08097098  0x080579fe  R_386_JMP_SLOT            memset
      [39]  0x0809709c  0x08057a0e  R_386_JMP_SLOT            dup
      [40]  0x080970a0  0x08057a1e  R_386_JMP_SLOT            open64
      [41]  0x080970a4  0x08057a2e  R_386_JMP_SLOT            execv
      [42]  0x080970a8  0x08057a3e  R_386_JMP_SLOT            perror
      [43]  0x080970ac  0x08057a4e  R_386_JMP_SLOT            pipe
      [44]  0x080970b0  0x08057a5e  R_386_JMP_SLOT            fork
      [45]  0x080970b4  0x08057a6e  R_386_JMP_SLOT            close
      [46]  0x080970b8  0x08057a7e  R_386_JMP_SLOT            dup2
      [47]  0x080970bc  0x08057a8e  R_386_JMP_SLOT            socket
      [48]  0x080970c0  0x08057a9e  R_386_JMP_SLOT            getaddrinfo
      [49]  0x080970c4  0x08057aae  R_386_JMP_SLOT            bind
      [50]  0x080970c8  0x08057abe  R_386_JMP_SLOT            freeaddrinfo
      [51]  0x080970cc  0x08057ace  R_386_JMP_SLOT            rresvport_af
      [52]  0x080970d0  0x08057ade  R_386_JMP_SLOT            gai_strerror
      [53]  0x080970d4  0x08057aee  R_386_JMP_SLOT            getservbyname
      [54]  0x080970d8  0x08057afe  R_386_JMP_SLOT            ntohs
      [55]  0x080970dc  0x08057b0e  R_386_JMP_SLOT            getnameinfo
      [56]  0x080970e0  0x08057b1e  R_386_JMP_SLOT            connect
      [57]  0x080970e4  0x08057b2e  R_386_JMP_SLOT            memcpy
      [58]  0x080970e8  0x08057b3e  R_386_JMP_SLOT            sleep
      [59]  0x080970ec  0x08057b4e  R_386_JMP_SLOT            setsockopt
      [60]  0x080970f0  0x08057b5e  R_386_JMP_SLOT            read
      [61]  0x080970f4  0x08057b6e  R_386_JMP_SLOT            write
      [62]  0x080970f8  0x08057b7e  R_386_JMP_SLOT            nl_langinfo
      [63]  0x080970fc  0x08057b8e  R_386_JMP_SLOT            strcasecmp
      [64]  0x08097100  0x08057b9e  R_386_JMP_SLOT            ntohl
      [65]  0x08097104  0x08057bae  R_386_JMP_SLOT            tolower
      [66]  0x08097108  0x08057bbe  R_386_JMP_SLOT            BN_new
      [67]  0x0809710c  0x08057bce  R_386_JMP_SLOT            BN_clear_free
      [68]  0x08097110  0x08057bde  R_386_JMP_SLOT            BN_num_bits
      [69]  0x08097114  0x08057bee  R_386_JMP_SLOT            BN_bn2bin
      [70]  0x08097118  0x08057bfe  R_386_JMP_SLOT            MD5_Init
      [71]  0x0809711c  0x08057c0e  R_386_JMP_SLOT            MD5_Update
      [72]  0x08097120  0x08057c1e  R_386_JMP_SLOT            MD5_Final
      [73]  0x08097124  0x08057c2e  R_386_JMP_SLOT            BN_set_word
      [74]  0x08097128  0x08057c3e  R_386_JMP_SLOT            BN_lshift
      [75]  0x0809712c  0x08057c4e  R_386_JMP_SLOT            BN_add_word
      [76]  0x08097130  0x08057c5e  R_386_JMP_SLOT            BN_cmp
      [77]  0x08097134  0x08057c6e  R_386_JMP_SLOT            setlocale
      [78]  0x08097138  0x08057c7e  R_386_JMP_SLOT            gss_release_buffer
      [79]  0x0809713c  0x08057c8e  R_386_JMP_SLOT            fflush
      [80]  0x08097140  0x08057c9e  R_386_JMP_SLOT            waitpid
      [81]  0x08097144  0x08057cae  R_386_JMP_SLOT            execl
      [82]  0x08097148  0x08057cbe  R_386_JMP_SLOT            strlcat
      [83]  0x0809714c  0x08057cce  R_386_JMP_SLOT            tcsetattr
      [84]  0x08097150  0x08057cde  R_386_JMP_SLOT            tcgetattr
      [85]  0x08097154  0x08057cee  R_386_JMP_SLOT            fcntl
      [86]  0x08097158  0x08057cfe  R_386_JMP_SLOT            gettimeofday
      [87]  0x0809715c  0x08057d0e  R_386_JMP_SLOT            select
      [88]  0x08097160  0x08057d1e  R_386_JMP_SLOT            getpid
      [89]  0x08097164  0x08057d2e  R_386_JMP_SLOT            gss_indicate_mechs
      [90]  0x08097168  0x08057d3e  R_386_JMP_SLOT            gss_create_empty_oid_set
      [91]  0x0809716c  0x08057d4e  R_386_JMP_SLOT            gss_acquire_cred
      [92]  0x08097170  0x08057d5e  R_386_JMP_SLOT            gss_release_cred
      [93]  0x08097174  0x08057d6e  R_386_JMP_SLOT            gss_add_oid_set_member
      [94]  0x08097178  0x08057d7e  R_386_JMP_SLOT            gss_release_oid_set
      [95]  0x0809717c  0x08057d8e  R_386_JMP_SLOT            gss_init_sec_context
      [96]  0x08097180  0x08057d9e  R_386_JMP_SLOT            unlink
      [97]  0x08097184  0x08057dae  R_386_JMP_SLOT            EVP_des_ede3_cbc
      [98]  0x08097188  0x08057dbe  R_386_JMP_SLOT            fdopen
      [99]  0x0809718c  0x08057dce  R_386_JMP_SLOT            PEM_write_DSAPrivateKey
     [100]  0x08097190  0x08057dde  R_386_JMP_SLOT            PEM_write_RSAPrivateKey
     [101]  0x08097194  0x08057dee  R_386_JMP_SLOT            fclose
     [102]  0x08097198  0x08057dfe  R_386_JMP_SLOT            lseek64
     [103]  0x0809719c  0x08057e0e  R_386_JMP_SLOT            PEM_read_PrivateKey
     [104]  0x080971a0  0x08057e1e  R_386_JMP_SLOT            EVP_PKEY_get1_DSA
     [105]  0x080971a4  0x08057e2e  R_386_JMP_SLOT            EVP_PKEY_get1_RSA
     [106]  0x080971a8  0x08057e3e  R_386_JMP_SLOT            EVP_PKEY_free
     [107]  0x080971ac  0x08057e4e  R_386_JMP_SLOT            ERR_get_error
     [108]  0x080971b0  0x08057e5e  R_386_JMP_SLOT            fstat64
     [109]  0x080971b4  0x08057e6e  R_386_JMP_SLOT            fopen64
     [110]  0x080971b8  0x08057e7e  R_386_JMP_SLOT            BN_bin2bn
     [111]  0x080971bc  0x08057e8e  R_386_JMP_SLOT            memmove
     [112]  0x080971c0  0x08057e9e  R_386_JMP_SLOT            getpeername
     [113]  0x080971c4  0x08057eae  R_386_JMP_SLOT            getsockname
     [114]  0x080971c8  0x08057ebe  R_386_JMP_SLOT            atoi
     [115]  0x080971cc  0x08057ece  R_386_JMP_SLOT            inet_ntop
     [116]  0x080971d0  0x08057ede  R_386_JMP_SLOT            shutdown
     [117]  0x080971d4  0x08057eee  R_386_JMP_SLOT            memcmp
     [118]  0x080971d8  0x08057efe  R_386_JMP_SLOT            inet_ntoa
     [119]  0x080971dc  0x08057f0e  R_386_JMP_SLOT            accept
     [120]  0x080971e0  0x08057f1e  R_386_JMP_SLOT            getsockopt
     [121]  0x080971e4  0x08057f2e  R_386_JMP_SLOT            listen
     [122]  0x080971e8  0x08057f3e  R_386_JMP_SLOT            strrchr
     [123]  0x080971ec  0x08057f4e  R_386_JMP_SLOT            EVP_CIPHER_CTX_init
     [124]  0x080971f0  0x08057f5e  R_386_JMP_SLOT            EVP_CipherInit
     [125]  0x080971f4  0x08057f6e  R_386_JMP_SLOT            EVP_CIPHER_CTX_set_key_length
     [126]  0x080971f8  0x08057f7e  R_386_JMP_SLOT            EVP_CIPHER_CTX_cleanup
     [127]  0x080971fc  0x08057f8e  R_386_JMP_SLOT            EVP_des_cbc
     [128]  0x08097200  0x08057f9e  R_386_JMP_SLOT            EVP_bf_cbc
     [129]  0x08097204  0x08057fae  R_386_JMP_SLOT            EVP_rc4
     [130]  0x08097208  0x08057fbe  R_386_JMP_SLOT            AES_encrypt
     [131]  0x0809720c  0x08057fce  R_386_JMP_SLOT            AES_set_encrypt_key
     [132]  0x08097210  0x08057fde  R_386_JMP_SLOT            strncpy
     [133]  0x08097214  0x08057fee  R_386_JMP_SLOT            strncasecmp
     [134]  0x08097218  0x08057ffe  R_386_JMP_SLOT            textdomain
     [135]  0x0809721c  0x0805800e  R_386_JMP_SLOT            qsort
     [136]  0x08097220  0x0805801e  R_386_JMP_SLOT            iconv_open
     [137]  0x08097224  0x0805802e  R_386_JMP_SLOT            iconv
     [138]  0x08097228  0x0805803e  R_386_JMP_SLOT            HMAC_Init
     [139]  0x0809722c  0x0805804e  R_386_JMP_SLOT            HMAC_Update
     [140]  0x08097230  0x0805805e  R_386_JMP_SLOT            HMAC_Final
     [141]  0x08097234  0x0805806e  R_386_JMP_SLOT            HMAC_CTX_cleanup
     [142]  0x08097238  0x0805807e  R_386_JMP_SLOT            DSA_new
     [143]  0x0809723c  0x0805808e  R_386_JMP_SLOT            RSA_new
     [144]  0x08097240  0x0805809e  R_386_JMP_SLOT            DSA_free
     [145]  0x08097244  0x080580ae  R_386_JMP_SLOT            RSA_free
     [146]  0x08097248  0x080580be  R_386_JMP_SLOT            EVP_md5
     [147]  0x0809724c  0x080580ce  R_386_JMP_SLOT            EVP_sha1
     [148]  0x08097250  0x080580de  R_386_JMP_SLOT            EVP_DigestInit
     [149]  0x08097254  0x080580ee  R_386_JMP_SLOT            EVP_DigestUpdate
     [150]  0x08097258  0x080580fe  R_386_JMP_SLOT            EVP_DigestFinal
     [151]  0x0809725c  0x0805810e  R_386_JMP_SLOT            BN_dec2bn
     [152]  0x08097260  0x0805811e  R_386_JMP_SLOT            BN_bn2dec
     [153]  0x08097264  0x0805812e  R_386_JMP_SLOT            CRYPTO_free
     [154]  0x08097268  0x0805813e  R_386_JMP_SLOT            RSA_generate_key
     [155]  0x0809726c  0x0805814e  R_386_JMP_SLOT            DSA_generate_parameters
     [156]  0x08097270  0x0805815e  R_386_JMP_SLOT            DSA_generate_key
     [157]  0x08097274  0x0805816e  R_386_JMP_SLOT            BN_copy
     [158]  0x08097278  0x0805817e  R_386_JMP_SLOT            BN_dup
     [159]  0x0809727c  0x0805818e  R_386_JMP_SLOT            DH_size
     [160]  0x08097280  0x0805819e  R_386_JMP_SLOT            DH_compute_key
     [161]  0x08097284  0x080581ae  R_386_JMP_SLOT            DH_free
     [162]  0x08097288  0x080581be  R_386_JMP_SLOT            gss_verify_mic
     [163]  0x0809728c  0x080581ce  R_386_JMP_SLOT            vsnprintf
     [164]  0x08097290  0x080581de  R_386_JMP_SLOT            openlog
     [165]  0x08097294  0x080581ee  R_386_JMP_SLOT            syslog
     [166]  0x08097298  0x080581fe  R_386_JMP_SLOT            closelog
     [167]  0x0809729c  0x0805820e  R_386_JMP_SLOT            strpbrk
     [168]  0x080972a0  0x0805821e  R_386_JMP_SLOT            strspn
     [169]  0x080972a4  0x0805822e  R_386_JMP_SLOT            strtol
     [170]  0x080972a8  0x0805823e  R_386_JMP_SLOT            sigaction
     [171]  0x080972ac  0x0805824e  R_386_JMP_SLOT            sigemptyset
     [172]  0x080972b0  0x0805825e  R_386_JMP_SLOT            RAND_status
     [173]  0x080972b4  0x0805826e  R_386_JMP_SLOT            strcspn
     [174]  0x080972b8  0x0805827e  R_386_JMP_SLOT            execlp
     [175]  0x080972bc  0x0805828e  R_386_JMP_SLOT            RSA_public_encrypt
     [176]  0x080972c0  0x0805829e  R_386_JMP_SLOT            RSA_private_decrypt
     [177]  0x080972c4  0x080582ae  R_386_JMP_SLOT            BN_CTX_new
     [178]  0x080972c8  0x080582be  R_386_JMP_SLOT            BN_value_one
     [179]  0x080972cc  0x080582ce  R_386_JMP_SLOT            BN_sub
     [180]  0x080972d0  0x080582de  R_386_JMP_SLOT            BN_div
     [181]  0x080972d4  0x080582ee  R_386_JMP_SLOT            BN_CTX_free
     [182]  0x080972d8  0x080582fe  R_386_JMP_SLOT            DSA_do_sign
     [183]  0x080972dc  0x0805830e  R_386_JMP_SLOT            DSA_SIG_free
     [184]  0x080972e0  0x0805831e  R_386_JMP_SLOT            DSA_SIG_new
     [185]  0x080972e4  0x0805832e  R_386_JMP_SLOT            DSA_do_verify
     [186]  0x080972e8  0x0805833e  R_386_JMP_SLOT            gss_test_oid_set_member
     [187]  0x080972ec  0x0805834e  R_386_JMP_SLOT            __gss_oid_to_mech
     [188]  0x080972f0  0x0805835e  R_386_JMP_SLOT            gss_oid_to_str
     [189]  0x080972f4  0x0805836e  R_386_JMP_SLOT            gss_display_status
     [190]  0x080972f8  0x0805837e  R_386_JMP_SLOT            gss_release_oid
     [191]  0x080972fc  0x0805838e  R_386_JMP_SLOT            gss_delete_sec_context
     [192]  0x08097300  0x0805839e  R_386_JMP_SLOT            gss_release_name
     [193]  0x08097304  0x080583ae  R_386_JMP_SLOT            gss_import_name
     [194]  0x08097308  0x080583be  R_386_JMP_SLOT            gss_get_mic
     [195]  0x0809730c  0x080583ce  R_386_JMP_SLOT            OBJ_nid2sn
     [196]  0x08097310  0x080583de  R_386_JMP_SLOT            EVP_get_digestbyname
     [197]  0x08097314  0x080583ee  R_386_JMP_SLOT            RSA_size
     [198]  0x08097318  0x080583fe  R_386_JMP_SLOT            RSA_sign
     [199]  0x0809731c  0x0805840e  R_386_JMP_SLOT            ERR_error_string
     [200]  0x08097320  0x0805841e  R_386_JMP_SLOT            RSA_public_decrypt
     [201]  0x08097324  0x0805842e  R_386_JMP_SLOT            getpwnam
     [202]  0x08097328  0x0805843e  R_386_JMP_SLOT            cfgetospeed
     [203]  0x0809732c  0x0805844e  R_386_JMP_SLOT            cfgetispeed
     [204]  0x08097330  0x0805845e  R_386_JMP_SLOT            cfsetospeed
     [205]  0x08097334  0x0805846e  R_386_JMP_SLOT            cfsetispeed
     [206]  0x08097338  0x0805847e  R_386_JMP_SLOT            malloc
     [207]  0x0809733c  0x0805848e  R_386_JMP_SLOT            realloc
     [208]  0x08097340  0x0805849e  R_386_JMP_SLOT            free
     [209]  0x08097344  0x080584ae  R_386_JMP_SLOT            strcat
     [210]  0x08097348  0x080584be  R_386_JMP_SLOT            deflateEnd
     [211]  0x0809734c  0x080584ce  R_386_JMP_SLOT            deflateInit_
     [212]  0x08097350  0x080584de  R_386_JMP_SLOT            inflateEnd
     [213]  0x08097354  0x080584ee  R_386_JMP_SLOT            inflateInit_
     [214]  0x08097358  0x080584fe  R_386_JMP_SLOT            deflate
     [215]  0x0809735c  0x0805850e  R_386_JMP_SLOT            inflate
     [216]  0x08097360  0x0805851e  R_386_JMP_SLOT            BN_hex2bn
     [217]  0x08097364  0x0805852e  R_386_JMP_SLOT            rewind
     [218]  0x08097368  0x0805853e  R_386_JMP_SLOT            BN_is_bit_set
     [219]  0x0809736c  0x0805854e  R_386_JMP_SLOT            BN_rand
     [220]  0x08097370  0x0805855e  R_386_JMP_SLOT            DH_generate_key
     [221]  0x08097374  0x0805856e  R_386_JMP_SLOT            DH_new
     [222]  0x08097378  0x0805857e  R_386_JMP_SLOT            RC4
     [223]  0x0809737c  0x0805858e  R_386_JMP_SLOT            RAND_bytes
     [224]  0x08097380  0x0805859e  R_386_JMP_SLOT            RC4_set_key
     [225]  0x08097384  0x080585ae  R_386_JMP_SLOT            abort
     [226]  0x08097388  0x080585be  R_386_JMP_SLOT            _exit
     [227]  0x0809738c  0x080585ce  R_386_JMP_SLOT            setsid
     [228]  0x08097390  0x080585de  R_386_JMP_SLOT            chdir
     [229]  0x08097394  0x080585ee  R_386_JMP_SLOT            toupper
     [230]  0x08097398  0x080585fe  R_386_JMP_SLOT            _get_exit_frame_monitor
     [231]  0x0809739c  0x0805860e  R_386_JMP_SLOT            EVP_enc_null
     [232]  0x080973a0  0x0805861e  R_386_JMP_SLOT            EVP_aes_128_cbc

strings display everything else which might be interesting

$ strings  /usr/bin/ssh | uniq
ÿÿÿÿ
Ossh_gssapi_init_ctx
ssh_gssapi_client_kex_hook
SSH PRIVATE KEY FILE FORMAT 1.1
cipher_set_keyiv
cipher_get_keyiv
bcdfghklmnprstvzxaeiouy
ssh_gssapi_import_name
ssh_gssapi_modify_kex
=ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
DISPLAY
LC_TIME
DISPLAY
/usr/bin/rsh
Using rsh.  WARNING: Connection will not be encrypted.
identity file %s type %d
daemon() failed: %.200s
ssh_session2_open: channel_new: %d
client-session
dup() in/out/err failed
/dev/null
Sending command: %.*s
Sending subsystem: %.*s
Requesting authentication agent forwarding.
Requesting X11 forwarding with authentication spoofing.
TERM
ssh_session2_setup: id %d
LC_ALL
Sent request for environment variable %s=%s
LC_ALL
LC_MESSAGES
Sent request for environment variable %s=%s
LC_MESSAGES
LC_MONETARY
Sent request for environment variable %s=%s
LC_MONETARY
LC_NUMERIC
Sent request for environment variable %s=%s
LC_NUMERIC
Sent request for environment variable %s=%s
LC_COLLATE
Sent request for environment variable %s=%s
LC_COLLATE
LC_CTYPE
Sent request for environment variable %s=%s
LC_CTYPE
LANG
Sent request for environment variable %s=%s
LANG
Warning: remote port forwarding failed for listen port %d
remote forward %s for: listen %d, connect %s:%d
client_global_request_reply: too many replies %d > %d
Request for subsystem '%.*s' failed on channel %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Requesting shell.
Sending command: %.*s
daemon() failed: %.200s
Warning: Remote host denied authentication agent forwarding.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Requesting authentication agent forwarding.
Protocol error waiting for X11 forwarding
Warning: Remote host denied X11 forwarding.
Requesting X11 forwarding with authentication spoofing.
Protocol error waiting for pty request response.
Warning: Remote host failed or refused to allocate a pseudo tty.
TERM
Requesting pty.
Protocol error waiting for compression response.
Warning: Remote host refused compression.
Compression level must be from 1 (fast) to 9 (slow, best).
Requesting compression at level %d.
Connections to remote port %d forwarded to local address %.200s:%d
Could not request local forwarding.
Connections to local port %d forwarded to remote address %.200s:%d
%02x
MIT-MAGIC-COOKIE-1
Warning: No xauth data; using fake authentication data for X11 forwarding.
%*s %511s %511s
x11_get_proto: %s
%s list %.200s 2>/dev/null
%s list unix:%s 2>/dev/null
localhost:
x11_get_proto: DISPLAY not set
No xauth program.
clear hostkey %d
Could not create directory '%.200s'.
%.100s%s%.100s
/etc/ssh/ssh_host_rsa_key
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_rsa_key
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_key
rsh_connect returned
Rhosts Authentication disabled, originating port will not be trusted.
/etc/ssh/ssh_config
%.100s/%.100s
Can't open user config file %.100s: %.100s
Pseudo-terminal will not be allocated because stdin is not a terminal.
Cannot fork into background without a command to execute.
You must specify a subsystem to invoke.
1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX
command-line
socks4
Bad dynamic port '%s'
Bad forwarding port(s) '%s'
Bad forwarding specification '%s'
%5[0-9]/%255[^/]/%5[0-9]
%5[0-9]:%255[^:]:%5[0-9]
Bad port '%s'
Unknown mac type '%s'
Unknown cipher type '%s'
Bad escape character '%s'.
none
%s, SSH protocols %d.%d/%d.%d, OpenSSL 0x%8.8lx
Too high debugging level.
no support for smartcards.
Too many identity files specified (max %d)
Warning: Identity file %s does not exist.
Warning: Option -P has been deprecated
1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX
You don't exist, go away!
setrlimit failed: %.100s
Usage: %s [options] host [command]
Options:
  -l user     Log in using this user name.
  -n          Redirect input from /dev/null.
  -F config   Config file (default: ~/%s).
  -A          Enable authentication agent forwarding.
  -a          Disable authentication agent forwarding (default).
  -X          Enable X11 connection forwarding.
  -x          Disable X11 connection forwarding (default).
  -i file     Identity for public key authentication (default: ~/.ssh/identity)
  -t          Tty; allocate a tty even if command is given.
  -T          Do not allocate a tty.
  -v          Verbose; display verbose debugging messages.
              Multiple -v increases verbosity.
  -V          Display version number only.
  -q          Quiet; don't display any warning messages.
  -f          Fork into background after authentication.
  -e char     Set escape character; ``none'' = disable (default: ~).
  -c cipher   Select encryption algorithm
  -m macs     Specify MAC algorithms for protocol version 2.
  -p port     Connect to this port.  Server must be on the same port.
  -L listen-port:host:port   Forward local port to remote address
  -R listen-port:host:port   Forward remote port to local address
              These cause %s to listen for connections on a port, and
              forward them to the other side by connecting to host:port.
  -D port     Enable dynamic application-level port forwarding.
  -C          Enable compression.
  -N          Do not execute a shell or command.
  -g          Allow remote hosts to connect to forwarded ports.
  -1          Force protocol version 1.
  -2          Force protocol version 2.
  -4          Use IPv4 only.
  -6          Use IPv6 only.
  -o 'option' Process the option as if it was read from a configuration file.
  -s          Invoke command (mandatory) as SSH2 subsystem.
  -b addr     Local IP address.
@(#)$OpenBSD: ssh.c,v 1.186 2002/09/19 01:58:18 djm Exp $
no key of type %d for host %s
WARNING: %s key found for host %s
in %s:%d
%s key fingerprint %s.
Are you sure you want to continue connecting (%s/%s)
Exiting, you have requested strict checking.
Matching host key in %s:%d
Warning: the %s host key for '%.200s' differs from the key for the IP address '%.128s'
Offending key for IP in %s:%d
internal error
Port forwarding is disabled to avoid man-in-the-middle attacks.
X11 forwarding is disabled to avoid man-in-the-middle attacks.
Agent forwarding is disabled to avoid man-in-the-middle attacks.
Password authentication is disabled to avoid man-in-the-middle attacks.
%s host key for %.200s has changed and you have requested strict checking.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the %s host key has just been changed.
The fingerprint for the %s key sent by the remote host is
Please contact your system administrator.
Add correct host key in %.100s to get rid of this message.
Offending key in %s:%d
Offending key for IP in %s:%d
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@       WARNING: POSSIBLE DNS SPOOFING DETECTED!          @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
The %s host key for %s has changed,
and the key for the according IP address %s
%s. This could either mean that
DNS SPOOFING is happening or the IP address for the host
and its host key have changed at the same time.
Warning: The host key for host %s has changed; please update your known hosts file(s) (%s:%d)
Warning: Permanently added '%.200s' (%s) to the list of known hosts.
Failed to add the host to the list of known hosts (%.500s).
%s,%s
but keys of different type are already known for this host.
The authenticity of host '%.200s (%s)' can't be established%s
%s key fingerprint is %s.
Are you sure you want to continue connecting (%s/%s)? 
No %s host key is known for %.200s and you have requested strict checking.
Warning: Permanently added the %s host key for IP address '%.128s' to the list of known hosts.
Failed to add the %s host key for IP address '%.128s' to the list of known hosts (%.30s).
%s host key for IP address '%.128s' not in list of known hosts.
Found key in %s:%d
Host '%.200s' is known and matches the %s host key.
Host '%.200s' is known and matches the advertised %s hostkey.
using hostkeyalias: %s
<no hostip for proxy command>
check_host_key: getnameinfo failed
Forcing accepting of host key for loopback/localhost.
Please type '%s' or '%s': 
Local version string %.100s
write: %.100s
SSH-%d.%d-%.100s
Protocol major versions differ: %d vs. %d
Agent forwarding disabled for protocol 1.3
Remote machine has too old SSH software version.
Remote protocol version %d.%d, remote software version %.100s
Bad remote protocol version identification: '%.100s'
SSH-%d.%d-%[^
ssh_exchange_identification: %s
SSH-
ssh_exchange_identification: Connection closed by remote host
ssh_exchange_identification: read: %.100s
setsockopt SO_KEEPALIVE: %.100s
Connection established.
ssh: connect to host %s port %s: %s
connect to address %s port %s: %s
Connecting to %.200s [%.100s] port %s.
ssh_connect: getnameinfo failed
Trying again...
%s: %.100s: %s
ssh_connect: needpriv %d
bind: %s: %s
getaddrinfo: %s: %s
socket: %.100s
Allocated local port %d.
rresvport: af=%d %.100s
fork failed: %.100s
dup2 stdout
dup2 stdin
Executing proxy command: %.500s
Could not create pipes to communicate with the proxy: %.100s
exec 
exec
@(#)$OpenBSD: sshconnect.c,v 1.135 2002/09/19 01:58:18 djm Exp $
Permission denied.
%.30s@%.128s's password: 
Protocol error: got %d in response to rhosts auth
Trying rhosts authentication.
Protocol error: got %d in response to SSH_CMSG_USER
ssh_userauth1: server supports no auth methods
Received encrypted confirmation.
Sent encrypted session key.
Encryption type: %.100s
Selected cipher type %.100s not supported by server.
No valid SSH1 cipher, using %.100s instead.
respond_to_rsa_challenge: server_key %d < host_key %d + SSH_KEY_BITS_RESERVED %d
respond_to_rsa_challenge: host_key %d < server_key %d + SSH_KEY_BITS_RESERVED %d
respond_to_rsa_challenge: BN_new failed
Host key verification failed.
Received server public key (%d bits) and host key (%d bits).
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Warning: This may be due to an old implementation of ssh.
Warning: Server lies about size of server host key: actual size is %d bits vs. announced %d.
Warning: This may be due to an old implementation of ssh.
Warning: Server lies about size of server public key: actual size is %d bits vs. announced %d.
Waiting for server public key.
Protocol error: got %d in response to passwd auth
Permission denied, please try again.
WARNING: Encryption is disabled! Password will be transmitted in clear text.
Doing password authentication.
Protocol error: got %d in response to SSH_CMSG_AUTH_TIS_RESPONSE
WARNING: Encryption is disabled! Response will be transmitted in clear text.
Permission denied, please try again.
Response: 
%s%s
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
No challenge.
Protocol error: got %d in response to SSH_CMSG_AUTH_TIS
Doing challenge response authentication.
Rhosts or /etc/hosts.equiv with RSA host authentication refused.
Protocol error waiting RSA auth response: %d
Rhosts or /etc/hosts.equiv with RSA host authentication accepted by server.
Received RSA challenge for host key from server.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
try_rhosts_rsa_authentication: BN_new failed
Protocol error during RSA authentication: %d
Server refused our rhosts authentication or host key.
Trying rhosts or /etc/hosts.equiv with RSA host authentication.
RSA authentication refused.
Protocol error waiting RSA auth response: %d
RSA authentication accepted by server.
Bad passphrase.
bad passphrase given, try again...
no passphrase given, try next key
Enter passphrase for RSA key '%.100s': 
Received RSA challenge from server.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
try_rsa_authentication: BN_new failed
Protocol error during RSA authentication: %d
Server refused our key.
Trying RSA authentication with key '%.100s'
Sending response to host key RSA challenge.
respond_to_rsa_challenge: bad challenge length %d
respond_to_rsa_challenge: rsa_private_decrypt failed
RSA authentication using agent refused.
Protocol error waiting RSA auth response: %d
RSA authentication accepted by server.
Sending response to RSA challenge.
Authentication agent failed to decrypt challenge.
Received RSA challenge from server.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Protocol error during RSA authentication: %d
Server refused our key.
Trying RSA authentication via agent with '%.100s'
try_agent_authentication: BN_new failed
@(#)$OpenBSD: sshconnect1.c,v 1.52 2002/08/08 13:50:23 aaron Exp $
Next authentication method: %s
authmethod_is_enabled %s
remaining preferred: %s
authmethod_lookup %s
No more authentication methods to try.
preferred %s
start over, passed a different list %s
Unrecognized authentication method name: %s
key_sign failed
userauth_hostbased: chost %s, pkalg %s
userauth_hostbased: cannot get local ipaddr/name
No more client hostkeys for hostbased authentication
ssh_keysign: bad version
ssh_keysign: no reply
ssh_keysign: exec(%s): %s
/usr/lib/ssh/ssh-keysign
ssh_keysign: dup2: %s
ssh_keysign: fork: %s
ssh_keysign: pipe: %s
ssh_keysign: fflush: %s
ssh_keysign: no installed: %s
/usr/lib/ssh/ssh-keysign
ssh_keysign called
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
input_userauth_info_req: num_prompts %d
input_userauth_info_req: no authentication context
input_userauth_info_req
userauth_kbdint
userauth_kbdint: disable: no info_req_seen
Trying public key: %s
Trying private key: %s
userauth_pubkey_agent: no message sent
Offering agent key: %s
userauth_pubkey_agent: no more keys
userauth_pubkey_agent: no keys at all
bad passphrase given, try again...
no passphrase given, try next key
Enter passphrase for key '%.100s': 
no such identity: %s
send_pubkey_test: cannot handle key
send_pubkey_test
userauth_pubkey: internal error
sign_and_send_pubkey: cannot handle key
sign_and_send_pubkey
clear_auth_state: key_free %p
Mismatch; try again, EOF to quit.
Retype %.30s@%.128s's new password: 
Enter %.30s@%.128s's new password: 
Enter %.30s@%.128s's old password: 
input_userauth_passwd_changereq: no authentication context
input_userauth_passwd_changereq
%.30s@%.128s's password: 
Permission denied, please try again.
gssapi
Authentication with deprecated "external-keyx" method not supported
external-keyx
GSS_GetMIC() failed! - Abandoning GSSAPI userauth
Authenticating with GSS-API context from key exchange (w/ MIC)
gssapi-keyex
input_gssapi_response: no authentication context
Server GSSAPI Error:
%s (%d, %d)
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Server sent a GSS-API error token during GSS userauth -- %s
input_gssapi_response: no authentication context
GSS_GetMIC() failed! - Abandoning GSSAPI userauth
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
input_gssapi_response: no authentication context
Trying to start again
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Server returned different OID (%s) than expected (%s)
Badly encoded mechanism OID received
Server returned different OID (%s) than expected (%s)
input_gssapi_response: no authentication context
key != last_key
input_userauth_pk_ok: fp %s
input_userauth_pk_ok: type mismatch for decoded key (received %d, expected %d)
no key from blob. pkalg %s
unknown pkalg %s
no last key or no sign cb
Server accepts key: pkalg %s blen %u lastkey %p hint %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
input_userauth_pk_ok: SSH_BUG_PKOK
input_userauth_pk_ok: no authentication context
Authentications that can continue: %s
Authenticated with partial success.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
input_userauth_failure: no authentication context
input_userauth_success: no authentication context
input_userauth_banner
input_userauth_error: bad message during authentication: type %d
we did not send a packet, disable method
we sent a %s packet, wait for reply
Permission denied (%s).
Authentication succeeded (%s)
ssh_userauth2: internal error: cannot send userauth none request
none
ssh-connection
got SSH2_MSG_SERVICE_ACCEPT
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
buggy server: service_accept w/o service
service_accept: %s
Server denied authentication request: %d
send SSH2_MSG_SERVICE_REQUEST
ssh-userauth
done: ssh_kex2.
No valid ciphers for protocol version 2 given, using defaults.
GSS-API authenticated host key addition to known_hosts file failed
Host key verification failed.
@(#)$OpenBSD: sshconnect2.c,v 1.107 2002/07/01 19:48:46 markus Exp $
tcsetattr
tcgetattr
tcsetattr
@(#)$OpenBSD: sshtty.c,v 1.3 2002/03/04 17:27:39 stevesk Exp $
ssh> 
client_input_global_request: rtype %s want_reply %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
exit-status
client_input_channel_req: channel %d: unknown channel
client_input_channel_req: channel %d: wrong channel: %d
client_input_channel_req: no channel %d
client_input_channel_req: channel %d rtype %s reply %d
open failed
failure %s
confirm %s
auth-agent@openssh.com
forwarded-tcpip
client_input_channel_open: ctype %s rchan %d win %d max %d
authentication agent connection
Warning: this is probably a break in attempt by a malicious server.
Warning: ssh server tried agent forwarding.
client_request_x11: request from %s %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
buggy server: x11 request w/o originator_port
Warning: this is probably a break in attempt by a malicious server.
Warning: ssh server tried X11 forwarding.
client_request_forwarded_tcpip: listen %s port %d, originator %s port %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Exit status %d
Bytes per second: stdin %.1f, stdout %.1f, stderr %.1f
Transferred: stdin %lu, stdout %lu, stderr %lu bytes in %.1f seconds
Write failed flushing stderr buffer.
Write failed flushing stdout buffer.
Connection to %.64s closed.
Killed by signal %d.
user requests rekeying
rekeying in progress
Entering interactive session.
client_channel_closed: id %d != session_ident %d
write stdout: %.50s
read: %.100s
Supported escape sequences:
%c.  - terminate connection
%cB  - send break
%cC  - open a command line
%cR  - Request rekey (SSH protocol 2 only)
%c^Z - suspend ssh
%c#  - list forwarded connections
%c&  - background ssh (when waiting for connections to terminate)
%c?  - this message
%c%c  - send the escape character by typing it twice
(Note that escapes are only recognized immediately after newline.)
fork: %.100s
%c& [backgrounded]
Server does not support re-keying
%cB [sent break]
%c^Z [suspend ssh]
Forwarding port.
Port forwarding failed.
Bad forwarding port(s).
Bad forwarding specification.
%5[0-9]/%255[^/]/%5[0-9]
%5[0-9]:%255[^:]:%5[0-9]
Not supported for SSH protocol version 1.
Invalid command.
Read from remote host %.300s: %.100s
Connection to %.300s closed by remote host.
select: %s
client_check_window_change: changed
Sending eof.
@(#)$OpenBSD: clientloop.c,v 1.104 2002/08/22 19:38:42 stevesk Exp $
calling GSS_Init_sec_context()
Delegating GSS-API credentials
%s(%p, %s, %d, %p, %p)
Failed to allocate resources (%s) for GSS-API
Skipping GSS-API mechanism %s (%s)
Failed to acquire GSS-API credentials for any mechanisms (%s)
Failed to allocate resources (%s) for GSS-API
No GSS-API mechanisms are installed
INTERNAL ERROR (%s)
@(#)$OpenBSD: atomicio.c,v 1.10 2001/05/08 22:48:07 markus Exp $
Bad response from authentication agent: %d
SSH_AGENT_FAILURE
Bad authentication response: %d
Agent admitted failure to sign using the key.
Bad authentication response: %d
Agent admitted failure to authenticate using the key.
Compatibility with ssh protocol version 1.0 no longer supported.
Warning: identity keysize mismatch: actual %d, announced %u
Too many identities in authentication reply: %d
Bad authentication reply message type: %d
SSH_AUTH_SOCK
Error reading response from authentication socket.
Authentication response too long: %d
Error reading response length from authentication socket.
Error writing to authentication socket.
SSH_AUTH_SOCK
@(#)$OpenBSD: authfd.c,v 1.57 2002/09/11 18:27:26 stevesk Exp $
.pub
bad permissions: ignore key: %s
This private key will be ignored.
It is recommended that your private key files are NOT accessible by others.
Permissions 0%3.3o for '%s' are too open.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@         WARNING: UNPROTECTED PRIVATE KEY FILE!          @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
read PEM private key done: type %s
PEM_read_PrivateKey: mismatch or unknown EVP_PKEY save_type %d
PEM_read_PrivateKey failed
fdopen failed: %s
Bad passphrase supplied for key file %.200s.
Unsupported cipher %d used in key file %.200s.
Not a RSA1 key file %.200s.
Read from key file %.200s failed: %.100s
Not a RSA1 key file %.200s.
Read from key file %.200s failed: %.100s
key_save_private: cannot save key type %d
fdopen %s failed: %s.
open %s failed: %s.
passphrase too short: have %d bytes, need > 4
write to key file %s failed: %s
open %s failed: %s.
save_private_key_rsa: bad cipher
@(#)$OpenBSD: authfile.c,v 1.50 2002/06/24 14:55:38 markus Exp $
buffer_put_utf8_string: input not a valid UTF-8 encoding; %s
buffer_put_cstring: s == NULL
buffer_put_ascii_cstring: non-ASCII string; %s
buffer_put_cstring: s == NULL
invalid UTF-8 sequence; %
buffer_get_string: bad string length %d
buffer_get_bignum2: cannot handle BN of size %d
negativ!
buffer_put_bignum: BN_bn2bin() failed: oi %d != bin_size %d
buffer_get_bignum: input buffer too small
buffer_get_bignum: cannot handle BN of size %d
buffer_put_bignum: BN_bn2bin() failed: oi %d != bin_size %d
@(#)$OpenBSD: bufaux.c,v 1.27 2002/06/26 08:53:12 markus Exp $
%02x
buffer_consume_end: trying to get more bytes than in buffer
buffer_consume: trying to get more bytes than in buffer
buffer_get: trying to get more bytes %d than in buffer %d
buffer_append_space: alloc %u not supported
buffer_append_space: len %u not supported
@(#)$OpenBSD: buffer.c,v 1.16 2002/06/26 08:54:18 markus Exp $
UNKNOWN
get_sock_port: getnameinfo NI_NUMERICSERV failed
getpeername failed: %.100s
getsockname failed: %.100s
get_socket_ipaddr: getnameinfo %d failed
get_socket_ipaddr: getsockname failed: %.100s
get_socket_ipaddr: getpeername failed: %.100s
Address %.100s maps to %.600s, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
reverse mapping checking getaddrinfo for %.700s failed - POSSIBLE BREAKIN ATTEMPT!
Trying to reverse map address %.100s.
get_remote_hostname: getnameinfo NI_NUMERICHOST failed: %d
getpeername failed: %.100s
@(#)$OpenBSD: canohost.c,v 1.34 2002/09/23 20:46:27 stevesk Exp $
DISPLAY
0.0.0.0
Forwarding authentication connection.
authentication agent connection
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
%02x
x11_request_forwarding: bad authentication data: %.100s
Warning: this is probably a break in attempt by a malicious server.
deny_input_open: type %d
Warning: ssh server tried X11 forwarding.
Warning: ssh server tried agent forwarding.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
unknown (remote did not supply name)
Received X11 open request.
connect %.100s port %d: %.100s
socket: %.100s
%.100s: unknown host. (%s)
Could not parse display number from DISPLAY: %.100s
Could not find ':' in DISPLAY: %.100s
Could not parse display number from DISPLAY: %.100s
unix:
DISPLAY not set.
connect %.100s: %.100s
/tmp/.X11-unix/X%u
socket: %.100s
X11 inet listener
listen: %.100s
Failed to allocate internet-domain X11 display socket.
bind port %d: %.100s; skipping this port
setsockopt IPV6_V6ONLY: %.100s
x11_create_display_inet: Socket family %d not supported
socket: %.100s
getaddrinfo: %.100s
Received request to connect to host %.100s port %d, but the request was denied.
WARNING: Server requests forwarding for unknown listen_port %d
connect_to %.100s port %d: failed.
connect_to %.100s port %s: %.100s
connect_to: F_SETFL: %s
socket: %.100s
connect_to: getnameinfo failed
connect_to %.100s: unknown host (%s)
allow port forwarding to host %s port %d
channel_request_remote_forwarding: too many forwards
Requested forwarding of port %d but user is not root.
Protocol error for port forward request:received packet type %d.
Warning: Server denied remote port forwarding.
tcpip-forward
channel_request_remote_forwarding: too many forwards
channel_setup_fwd_listener: cannot listen to port: %d
port listener
listen: %.100s
bind: %.100s
Local forwarding listening on %s port %s.
setsockopt SO_REUSEADDR: %s
socket: %.100s
channel_setup_fwd_listener: getnameinfo failed
getaddrinfo: fatal error
Forward host name too long.
No forward host name.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
unknown (remote did not supply name)
channel %d: rcvd adjust %u
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Received window adjust for non-open channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: open failed: %s%s%s
Received open failure for non-opening channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: open confirm rwindow %u rmax %u
callback done
callback start
Received open confirmation for non-opening channel %d.
Received close confirmation for non-closed channel %d (type %d).
Received close confirmation for out-of-range channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Received oclose for nonexistent channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
Received close for nonexistent channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: FORCE input drain
Received ieof for nonexistent channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: rcvd ext data %d
channel %d: rcvd too much extended_data %d, win %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: bad ext data
Received extended_data after EOF on channel %d.
channel %d: accepting ext data after eof
channel %d: ext data for non open
Received extended_data for bad channel %d.
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
channel %d: rcvd too much data %d, win %d
channel %d: rcvd big packet %d, maxpack %d
Received data for nonexistent channel %d.
channel %d: sent ext data %d
channel %d: rwin %u elen %u euse %d
channel %d: ibuf_empty delayed efd %d/(%d)
cannot happen: istate == INPUT_WAIT_DRAIN for proto 1.3
channel %d: will not send data after close
channel %d: garbage collecting
channel %d: gc: user detached
channel %d: gc: notify user
channel %d: window %d sent adjust %d
channel %d: closing read-efd %d
channel %d: read %d from efd %d
channel %d: closing write-efd %d
channel %d: written %d to efd %d
channel %d: input draining.
channel %d: not open
channel %d: filter stops
channel %d: input draining.
channel %d: not open
channel %d: read<=0 rfd %d len %d
channel %d: not connected: %s
channel %d: connected
getsockopt SO_ERROR failed
auth-agent@openssh.com
accepted auth socket
accept from auth socket: %.100s
accept: %.100s
Connection to port %d forwarding to %.100s port %d requested.
%s: listening port %d for %.100s port %d, connect from %.200s port %d
direct-tcpip
ssh2 x11 bug compat mode
X11 connection from %.200s port %d
accept: %.100s
single_connection: closing X11 listener.
X11 connection requested.
channel %d: pre_dynamic: need more
channel %d: pre_dynamic: have %d
channel %d: cannot handle: socks4 cn %d
channel %d: dynamic request: socks4 host %s port %u command %u
channel %d: decode socks4: len %d > have %d
channel %d: decode socks4: user %s/%d
channel %d: decode socks4: too long
channel %d: decode socks4
X11 closed %d i%d/o%d
X11 rejected %d i%d/o%d
X11 connection rejected because of wrong authentication.
X11 fake_data_len %d != saved_data_len %d
X11 auth data does not match fake data.
X11 connection uses different authentication protocol.
Initial X11 packet contains bad byte order byte: 0x%x
channel %d: closing after input drain.
channel %d: obuf_empty delayed efd %d/(%d)
channel %d: waiting for connection
channel_set_wait_for_exit %d, %d (type: %d)
channel_set_wait_for_exit for non-open channel %d.
channel_activate for non-larval channel %d.
channel_register_filter: %d: bad id
channel_cancel_cleanup: %d: bad id
channel_register_cleanup: %d: bad id
channel_register_comfirm: %d: bad id
channel request %d: %s
channel_request_start: %d: unknown channel id
send channel open %d
channel_send_open: %d: bad id
channel_open_message: bad channel type %d
  #%d %.300s (t%d r%d i%d/%d o%d/%d fd %d/%d)
The following connections are open:
channel_find_open: bad channel type %d
cannot happen: OUT_DRAIN
channel_still_open: bad channel type %d
cannot happen: OUT_DRAIN
cannot happen: SSH_CHANNEL_LARVAL
channel %d: big output buffer %d > %d
channel_free: status: %s
channel_free: channel %d: %s, nchannels %d
channel_close_fds: channel %d: r %d w %d e %d
channel %d: new [%s]
channel: expanding %d
channel_new: internal error: channels_alloc %d too big.
channel %d: wfd %d is not a tty?
channel %d: rfd %d isatty
channel_lookup: %d: bad id: channel free
channel_lookup: %d: bad id
@(#)$OpenBSD: channels.c,v 1.183 2002/09/17 07:47:02 itojun Exp $
%s: bad cipher %d
%s: Installed 3DES IV
%s: no 3des context
%s: bad cipher %d
%s: Copying 3DES IV
%s: no 3des context
%s: bad 3des iv length: %d
%s: wrong iv length %d != %d
ssh1_3des_cbc: no context
cipher_cleanup: EVP_CIPHER_CTX_cleanup failed
evp_crypt: EVP_Cipher failed
cipher_encrypt: bad plaintext length %d
cipher_init: EVP_CipherInit: set key failed for %s
cipher_init: set keylen failed (%d -> %d)
cipher_init: set keylen (%d -> %d)
cipher_init: EVP_CipherInit failed for %s
cipher_init: iv length %d is insufficient for %s.
cipher_init: key length %d is insufficient for %s.
Warning: use of DES is strongly discouraged due to cryptographic weaknesses
ciphers ok: [%s]
cipher ok: %s [%s]
bad cipher %s [%s]
@(#)$OpenBSD: cipher.c,v 1.61 2002/07/12 15:50:17 markus Exp $
ssh_aes_ctr_iv: no context
@(#)$OpenBSD: cipher-ctr.c,v 1.4 2004/02/06 23:41:13 dtucker Exp $
No available ciphers found.
Compat cipher proposal: %s
Original cipher proposal: %s
ignoring bad proto spec: '%s'.
no match: %s
match: %s pat %s
Enabling compatibility mode for protocol 1.3
Enabling compatibility mode for protocol 2.0
@(#)$OpenBSD: compat.c,v 1.65 2002/09/27 10:42:09 mickey Exp $
protocol error: rcvd type %d
dispatch_protocol_ignore: type %d seq %u
protocol error
dispatch_protocol_error: type %d seq %u
@(#)$OpenBSD: dispatch.c,v 1.15 2002/01/11 13:39:36 markus Exp $
@(#)$OpenBSD: fatal.c,v 1.1 2002/02/22 12:20:34 markus Exp $
UTF-8
UTF8
UTF-8
US-ASCII
ASCII
UTF-8
UTF8
UTF-8
US-ASCII
ASCII
common
POSIX
common
POSIX
common
POSIX
common
POSIX
UTF-8
i-default
SSH_LANGS
iso_8859
/usr/bin/locale -a
SUNW_OST_OSCMD
POSIX
i-default
%.*s-%.*s
POSIX
macs ok: [%s]
mac ok: %s [%s]
bad mac %s [%s]
mac_compute: mac too long
mac_compute: no key
mac_init: unknown %s
mac_init: found %s
@(#)$OpenBSD: mac.c,v 1.5 2002/05/16 22:02:50 markus Exp $
ssh_msg_recv: read: %ld != msg_len
ssh_msg_recv: read: bad msg_len %u
ssh_msg_recv: read: header %ld
ssh_msg_recv entering
ssh_msg_send: write
ssh_msg_send: type %u
@(#)$OpenBSD: msg.c,v 1.4 2002/07/01 16:15:25 deraadt Exp $
add_host_to_hostfile: saving key in %s failed
no key to look up
check_host_in_hostfile: match line %d
check_host_in_hostfile: filename %s
Warning: replace %d with %d in %s, line %d.
Warning: %s, line %d: keysize mismatch for host %s: actual %d vs. announced %d.
@(#)$OpenBSD: hostfile.c,v 1.30 2002/07/24 16:11:18 markus Exp $
ssh-dss
ssh-rsa
key_free: bad key type %d
key_demote: BN_dup failed
key_demote: DSA_new failed
key_demote: BN_dup failed
key_demote: RSA_new failed
key_verify: illegal key type %d
key_sign: illegal key type %d
key_to_blob: unsupported key type %d
key_to_blob: key == NULL
key_from_blob: remaining bytes in key blob %d
key_from_blob: cannot handle type %s
key names ok: [%s]
key_type_from_name: unknown key type '%s'
null
rsa1
key_from_private: unknown type %d
key_generate: unknown type %d
dsa_generate_private_key: NULL.
dsa_generate_private_key: DSA_generate_key failed.
dsa_generate_private_key: DSA_generate_parameters failed
rsa_generate_private_key: key generation failed.
%s %s
key_write: failed for RSA key
key_read: bad key type: %d
key_read: type mismatch: encoding error
key_read: key_from_blob %s failed
key_read: uudecode %s failed
key_read: type mismatch
key_read: short string
key_read: no key found
key_read: no space
write_bignum: BN_bn2dec() failed
key_fingerprint_ex: bad digest representation %d
key_fingerprint: null from key_fingerprint_raw()
%02x:
key_fingerprint_raw: blob is null
key_fingerprint_raw: bad key type %d
key_fingerprint_raw: bad digest type %d
key_equal: bad key type %d
key_free: bad key type %d
key_new_private: BN_new failed
key_new: bad key type %d
key_new: BN_new failed
key_new: DSA_new failed
key_new: BN_new failed
key_new: RSA_new failed
@(#)$OpenBSD: key.c,v 1.49 2002/09/09 14:54:14 markus Exp $
kex_derive_keys
Negotiated lang: %s
Negotiated messages locale: %s
Negotiated main locale: %s
We proposed langtags, stoc: %s
We proposed langtags, ctos: %s
Peer sent proposed langtags, stoc: %s
Peer sent proposed langtags, ctos: %s
skipping next packet (type %u)
kex: %s %s %s %s
proposals match
proposal mismatch: my %s peer %s
bad hostkey alg '%s'
no hostkey alg
bad kex alg %s
gss-group1-sha1-
diffie-hellman-group-exchange-sha1
diffie-hellman-group1-sha1
no kex alg
unsupported comp %s
none
zlib
no matching comp found: client %s server %s
unsupported mac %s
no matching mac found: client %s server %s
matching cipher is not supported: %s
no matching cipher found: client %s server %s
Unsupported key exchange %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
kex_input_kexinit: no kex, cannot rekey
SSH2_MSG_KEXINIT received
SSH2_MSG_KEXINIT sent
kex_send_kexinit: kex proposal too short
KEX_INIT_SENT
kex_send_kexinit: no kex, cannot rekey
SSH2_MSG_NEWKEYS received
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
expecting SSH2_MSG_NEWKEYS
SSH2_MSG_NEWKEYS sent
kex_reset_dispatch -- skipping dispatch_set(KEXINIT) in unpriv proc
kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? %d && !%d
Hm, kex protocol error: type %d seq %u
kex_parse_kexinit: reserved %d 
kex_parse_kexinit: first_kex_follows %d 
kex_parse_kexinit: %s
@(#)$OpenBSD: kex.c,v 1.51 2002/06/24 14:55:38 markus Exp $
key_verify failed for server_host_key
kexdh_client: BN_new failed
bad server public DH value
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
dh_server_pub == NULL
server_host_key verification failed
cannot verify server_host_key
type mismatch for decoded server_host_key_blob
cannot decode server_host_key_blob
expecting SSH2_MSG_KEXDH_REPLY
sending SSH2_MSG_KEXDH_INIT
@(#)$OpenBSD: kexdh.c,v 1.18 2002/03/18 17:50:31 provos Exp $
key_verify failed for server_host_key
kexgex_client: BN_new failed
bad server public DH value
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
dh_server_pub == NULL
server_host_key verification failed
cannot verify server_host_key
type mismatch for decoded server_host_key_blob
cannot decode server_host_key_blob
expecting SSH2_MSG_KEX_DH_GEX_REPLY
SSH2_MSG_KEX_DH_GEX_INIT sent
DH_GEX group out of range: %d !< %d !< %d
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
BN_new
expecting SSH2_MSG_KEX_DH_GEX_GROUP
SSH2_MSG_KEX_DH_GEX_REQUEST sent
SSH2_MSG_KEX_DH_GEX_REQUEST_OLD sent
@(#)$OpenBSD: kexgex.c,v 1.22 2002/03/24 17:27:03 stevesk Exp $
Use the GssKeyEx option to disable GSS-API key exchange and try again.
The GSS-API protected key exchange has failed without indication
from the server, possibly due to misconfiguration of the server.
Hash's MIC didn't verify
bad server public DH value
Internal error in GSS-API protected SSHv2 key exchange
Expected SSH2_MSG_KEXGSS_COMPLETE never arrived
Not complete, and no token output
Protocol error: didn't expect packet type %d
The server had a GSS-API error during GSS-API protected SSHv2 key exchange
Use the GssKeyEx option to disable GSS-API key exchange and try again.
Server had a GSS-API error; the connection will close (%d/%d):
Protocol error: did not receive expected GSS-API context token
Protocol error: received GSS-API context token though the context was already established
Received GSSAPI_COMPLETE
Protocol error: received GSS-API context token though the context was already established
Received GSSAPI_CONTINUE
Received KEXGSS_HOSTKEY
Integrity check failed
Mutual authentication failed
A GSS-API error occurred during GSS-API protected SSHv2 key exchange
performing GSS-API protected SSHv2 key exchange
Calling gss_init_sec_context
dh_server_pub == NULL
Couldn't match the negotiated GSS key exchange
VERBOSE
%.500s
%s%s: %s
Unrecognized internal syslog facility code %d
Unrecognized internal syslog level code %d
Calling cleanup 0x%lx(0x%lx)
fatal_remove_cleanup: no such cleanup function: 0x%lx 0x%lx
DEBUG3
DEBUG2
DEBUG1
DEBUG
INFO
NOTICE
ERROR
FATAL
QUIET
LOCAL7
LOCAL6
LOCAL5
LOCAL4
LOCAL3
LOCAL2
LOCAL1
LOCAL0
AUTH
USER
DAEMON
@(#)$OpenBSD: log.c,v 1.24 2002/07/19 15:43:33 markus Exp $
@(#)$OpenBSD: match.c,v 1.19 2002/03/01 13:12:10 markus Exp $
setsockopt TCP_NODELAY: %.100s
fd %d setting TCP_NODELAY
fd %d is TCP_NODELAY
getsockopt TCP_NODELAY: %.100s
fcntl(%d, F_SETFL, O_NONBLOCK): %s
fd %d clearing O_NONBLOCK
fd %d is not O_NONBLOCK
fcntl(%d, F_GETFL, 0): %s
fcntl(%d, F_SETFL, O_NONBLOCK): %s
fd %d setting O_NONBLOCK
fd %d is O_NONBLOCK
fcntl(%d, F_GETFL, 0): %s
@(#)$OpenBSD: misc.c,v 1.19 2002/03/04 17:27:39 stevesk Exp $
@(#)$OpenBSD: mpaux.c,v 1.16 2001/02/08 19:30:52 itojun Exp $
channel %d: chan_shutdown_read: close() failed for fd%d: %.100s
channel %d: chan_shutdown_read: shutdown() failed for fd%d [i%d o%d]: %.100s
channel %d: close_read
channel %d: chan_shutdown_write: close() failed for fd%d: %.100s
channel %d: chan_shutdown_write: shutdown() failed for fd%d: %.100s
channel %d: close_write
channel %d: is dead
channel %d: almost dead
channel %d: active efd: %d len %d
channel %d: is dead
channel %d: zombie
channel %d: already sent close
channel %d: cannot send close for istate/ostate %d/%d
channel %d: send close
channel %d: cannot send eof for istate %d
channel %d: send eof
channel %d: chan_write_failed for ostate %d
channel %d: write failed
channel %d: rcvd eof
channel %d: protocol error: close rcvd twice
channel %d: rcvd close
channel %d: cannot send oclose for ostate %d
channel %d: send oclose
channel %d: cannot send ieof for istate %d
channel %d: send ieof
channel %d: internal error: obuf_empty for ostate %d
channel %d: chan_obuf_empty for non empty buffer
channel %d: obuf empty
channel %d: chan_write_failed for ostate %d
channel %d: write failed
channel %d: protocol error: rcvd_ieof for ostate %d
channel %d: rcvd ieof
channel %d: chan_ibuf_empty for istate %d
channel %d: chan_ibuf_empty for non empty buffer
channel %d: ibuf empty
channel %d: chan_read_failed for istate %d
channel %d: read failed
channel %d: protocol error: rcvd_oclose for istate %d
channel %d: rcvd oclose
channel %d: output %s -> %s
chan_set_ostate: bad state %d -> %d
channel %d: input %s -> %s
chan_set_istate: bad state %d -> %d
@(#)$OpenBSD: nchan.c,v 1.47 2002/06/19 00:27:55 deraadt Exp $
Monitor failed to start: %s
packet_set_maxsize: setting to %d
packet_set_maxsize: bad size %d
packet_set_maxsize: called twice: old %d new %d
Write failed: %.100s
Disconnecting: %.100s
packet_disconnect called recursively.
packet_send_debug: %s
Received disconnect from %s: %.400s
Remote: %.900s
Received SSH2_MSG_UNIMPLEMENTED for %u
Received disconnect from %s: %u: %.400s
Remote: %.900s
Corrupted padlen %d on input.
incoming seqnr wraps around
Corrupted MAC on input.
padding error: need %d block %d mod %d
Bad packet length %d.
Corrupted check bytes on input.
packet_read_poll1: len %d != buffer_len %d.
deattack denial of service detected
crc32 compensation attack: network attack detected
Bad packet length %d.
Protocol error: expected packet type %d, got %d
Read from socket failed: %.100s
Connection closed by %.200s
Packet integrity error.
Packet integrity error (%d bytes remaining) at %s:%d
outgoing seqnr wraps around
packet_send2: adding %d (len %d padlen %d extra_pad %d)
newkeys: no keys for mode %d
newkeys: rekeying
newkeys: mode %d
packet_set_encryption_key: keylen too big: %d
packet_set_encryption_key: keylen too small: %d
packet_set_encryption_key: unknown cipher number %d
Compression already enabled.
INTERNAL ERROR: The monitor cannot compress.
fcntl O_NONBLOCK: %.100s
packet_set_seqnr: bad mode %d
packet_set_connection: cannot load cipher 'none'
none
@(#)$OpenBSD: packet.c,v 1.97 2002/07/04 08:12:15 deraadt Exp $
OpenSSL version mismatch. Built against %lx, you have %lx
PRNG is not seeded
@(#)$Id: entropy.c,v 1.44 2002/06/09 19:41:48 mouring Exp $
DISPLAY
SSH_ASKPASS
/dev/tty
ssh_askpass: exec(%s): %s
ssh_askpass: dup2: %s
ssh_askpass: fork: %s
ssh_askpass: pipe: %s
internal error: askpass undefined
ssh_askpass: fflush: %s
@(#)$OpenBSD: readpass.c,v 1.27 2002/03/26 15:58:46 markus Exp $
rsa_generate_additional_parameters: BN_CTX_new failed
rsa_generate_additional_parameters: BN_new failed
rsa_private_decrypt() failed
rsa_public_encrypt() failed
rsa_public_encrypt() exponent too small or not odd
@(#)$OpenBSD: rsa.c,v 1.24 2001/12/27 18:22:16 markus Exp $
ssh-dss
ssh_dss_verify: signature %s
ssh_dss_verify: BN_new failed
ssh_dss_verify: DSA_SIG_new failed
bad sigbloblen %u != SIGBLOB_LEN
ssh_dss_verify: remaining bytes in signature %d
ssh_dss_verify: cannot handle type %s
ssh_dss_verify: no DSA key
bad sig size %u %u
ssh_dss_sign: sign failed
ssh_dss_sign: no DSA key
@(#)$OpenBSD: ssh-dss.c,v 1.17 2002/07/04 10:41:47 markus Exp $
%s,null
while verifying MIC
while getting MIC
calling GSS_Import_name()
%s: snprintf() returned %d, expected %d
%s@%s
host
GSS-API error: %s
GSS-API error while %s: %s
<gss_oid_to_str() failed>
null
gss-group1-sha1-
INTERNAL ERROR (%s)
%s,%s
GSS-API Mechanism encoded as %s
gss-group1-sha1-
ssh-rsa
hash mismatch
oid mismatch
bad decrypted len: %d != %d + %d
RSA_public_decrypt failed: %s
bad siglen
bad hashlen
ssh_rsa_verify: signature %scorrect
ssh_rsa_verify: EVP_get_digestbynid %d failed
ssh_rsa_verify: add padding: modlen %u > len %u
ssh_rsa_verify: len %u > modlen %u
ssh_rsa_verify: remaining bytes in signature %d
ssh_rsa_verify: cannot handle type %s
ssh_rsa_verify: RSA modulus too small: %d < minimum %d bits
ssh_rsa_verify: no RSA key
ssh_rsa_sign: slen %u slen2 %u
slen %u > len %u
ssh_rsa_sign: RSA_sign failed: %s
ssh_rsa_sign: EVP_get_digestbynid %d failed
ssh_rsa_sign: no RSA key
@(#)$OpenBSD: ssh-rsa.c,v 1.26 2002/08/27 17:13:56 stevesk Exp $
%s%s%s
Home directory too long (%d > %d
Unknown user %100s.
User name after tilde too long.
@(#)$OpenBSD: tildexpand.c,v 1.13 2002/06/23 03:25:50 deraadt Exp $
Setting tty modes failed: %.100s
parse_tty_modes: n_bytes_ptr != n_bytes: %d %d
parse_tty_modes: unknown opcode %d
Ignoring unsupported tty mode opcode %d (0x%x)
tty_parse_modes: %d %d
cfsetospeed failed for %d
tty_parse_modes: ospeed %d
cfsetispeed failed for %d
tty_parse_modes: ispeed %d
tcgetattr: %.100s
tty_parse_modes: SSH2 n_bytes %d
tty_make_modes: %d %d
tty_make_modes: ispeed %d
tty_make_modes: ospeed %d
tcgetattr: %.100s
@(#)$OpenBSD: ttymodes.c,v 1.18 2002/06/19 00:27:55 deraadt Exp $
@(#)$OpenBSD: uuencode.c,v 1.16 2002/09/09 14:54:15 markus Exp $
xfree: NULL pointer given as argument
xrealloc: out of memory (new_size %lu bytes)
xrealloc: zero size
xmalloc: out of memory (allocating %lu bytes)
xmalloc: zero size
@(#)$OpenBSD: xmalloc.c,v 1.16 2001/07/23 18:21:46 stevesk Exp $
ciphers
~/%.100s
.ssh/id_dsa
~/%.100s
.ssh/id_rsa
~/%.100s
.ssh/identity
%s: terminating, %d bad configuration options
Reading configuration data %.200s
%.200s line %d: garbage at end of line; "%.200s".
process_config_line: Unimplemented opcode %d
%s line %d: Deprecated option "%s"
%.200s line %d: Bad escape character.
none
%.200s line %d: Missing argument.
Applying options for %.100s
socks4
%.200s line %d: Badly formatted port number.
%.200s line %d: Missing port argument.
%.200s line %d: Bad forwarding port.
%.200s line %d: Bad forwarding specification.
%255[^/]/%5[0-9]
%255[^:]:%5[0-9]
%.200s line %d: Missing second argument.
%.200s line %d: Bad listen port.
%.200s line %d: Missing port argument.
%.200s line %d: unsupported log level '%s'
%.200s line %d: Bad protocol spec '%s'.
%.200s line %d: Missing argument.
%.200s line %d: Bad protocol 2 host key algorithms '%s'.
%.200s line %d: Missing argument.
%.200s line %d: Bad SSH2 Mac spec '%s'.
%.200s line %d: Missing argument.
%.200s line %d: Bad SSH2 cipher spec '%s'.
%.200s line %d: Missing argument.
%.200s line %d: Bad cipher '%s'.
%.200s line %d: Missing argument.
%.200s line %d: Bad number.
%.200s line %d: Missing argument.
%.200s line %d: Too many identity files specified (max %d).
%.200s line %d: Missing argument.
%.200s line %d: Bad yes/no/ask argument.
false
true
%.200s line %d: Missing yes/no/ask argument.
%.200s line %d: Bad yes/no argument.
false
true
%.200s line %d: Missing yes/no argument.
%s: line %d: Bad configuration option: %s
Too many remote forwards (max %d).
Too many local forwards (max %d).
Privileged ports can only be forwarded by root.
nohostauthenticationforlocalhost
clearallforwardings
smartcarddevice
bindaddress
hostkeyalgorithms
preferredauthentications
dynamicforward
loglevel
numberofpasswordprompts
keepalive
compressionlevel
compression
stricthostkeychecking
checkhostip
batchmode
connectionattempts
userknownhostsfile2
globalknownhostsfile2
userknownhostsfile
globalknownhostsfile
escapechar
host
user
localforward
remoteforward
protocol
macs
cipher
port
proxycommand
hostkeyalias
hostname
identityfile2
identityfile
usersh
fallbacktorsh
gssdelegatecreds
gssauthentication
gsskeyex
gssapidelegatecredentials
gssapiauthentication
gssapikeyexchange
tisauthentication
skeyauthentication
challengeresponseauthentication
hostbasedauthentication
rhostsrsaauthentication
dsaauthentication
pubkeyauthentication
rsaauthentication
kbdinteractivedevices
kbdinteractiveauthentication
passwordauthentication
rhostsauthentication
useprivilegedport
gatewayports
xauthlocation
forwardx11
forwardagent
@(#)$OpenBSD: readconf.c,v 1.100 2002/06/19 00:27:55 deraadt Exp $
buffer_uncompress: inflate returned %d
buffer_compress: deflate returned %d
compress incoming: raw data %lu, compressed %lu, factor %.2f
compress outgoing: raw data %lu, compressed %lu, factor %.2f
1.1.4
Bad compression level %d.
Enabling compression at level %d.
@(#)$OpenBSD: compress.c,v 1.19 2002/03/18 17:31:54 provos Exp $
@(#)$OpenBSD: crc32.c,v 1.8 2000/12/19 23:17:56 markus Exp $
Installing crc compensation attack detector.
detect_attack: bad length %d
@(#)$OpenBSD: deattack.c,v 1.18 2002/03/04 17:27:39 stevesk Exp $
dh_new_group: DH_new
BN_hex2bn g
BN_hex2bn p
dh_new_group_asc: DH_new
dh_gen_key: too many bad keys: giving up
dh_gen_key: priv key bits set: %d/%d
DH_generate_key
dh_gen_key: BN_rand failed
dh_gen_key: BN_new failed
dh_gen_key: group too small: %d (2*need %d)
dh_gen_key: dh->p == NULL
invalid public DH value (%d/%d)
bits set: %d/%d
invalid public DH value: negativ
WARNING: line %d disappeared in %s, giving up
WARNING: no suitable primes in %s
WARNING: %s does not exist, using old modulus
/etc/ssh/primes
/etc/ssh/moduli
Bad prime description in line %d
parse_prime: BN_new failed
@(#)$OpenBSD: dh.c,v 1.22 2002/06/27 08:49:44 markus Exp $
@(#)$OpenBSD: kexdh.c,v 1.18 2002/03/18 17:50:31 provos Exp $
@(#)$OpenBSD: kexgex.c,v 1.22 2002/03/24 17:27:03 stevesk Exp $
Couldn't obtain random bytes (error %ld)
@(#)$Id: bsd-arc4random.c,v 1.5 2002/05/08 22:57:18 tim Exp $
@(#)$Id: bsd-misc.c,v 1.10 2002/07/08 21:09:41 mouring Exp $
/dev/null
%s: option requires an argument -- %c
%s: illegal option -- %c
/dev/tty
ÿßûÛïÏëË÷×óÓçÇãÃþÞúÚîÎêÊöÖòÒæÆâÂ
ÿÿÿÿ
ýÿÿÿ
þÿÿÿ
ÿÿÿÿ
ÿÿÿÿ¸7
ÿÿÿÿÄ
ÿÿÿÿÿÿÿÿ
ôjp5¥cé£
¤¸Üy
½|±~
ò °jHq¹óÞA¾
ëäÝmQµÔôÇ
À¨kdzùbýìÉe
È n;^
iLäA`Õrqg¢Ñä
¥ú¨µ5l
²BÖÉ»Û@ù¼¬ãlØ2u\ßEÏ
ÖÜY=Ñ«¬0Ù&:
aпµô´!#ijV
LhX«
aÁ=-f¶
3Ô¸è¢É
\cæôQkkbal
õÆÙ°ePé·
ÝbI-Ú
eLÔûXa²MÎQµ:t
¼£â0»ÔA¥ßJ×
Ø=mÄѤûôÖÓjéiCüÙn4F
и`Ús-
É%µhW³
ÉÙ)"
а´¨×Ç
´.;\½·
lºÀ 
¸í¶³¿
Ò±t9GÕê¯wÒ
¨Zjz
i]Wb÷Ëge
Ôþà+Ó
ÌJÝgoß¹ùùï¾
°`è£ÖÖ~
Ñ¡ÄÂØ8RòßOñg»ÑgW¼¦Ý
µ?K6²HÚ+
AÃï`ßUßg¨ï
n1y¾iF
f¼ Òo%6âhR
U¾;ºÅ(
j³\§ÿ×Â1Ïе
®Þ[°Âd
&òcì
z¸â®+±{8
¾Õå·ïÜ|!ßÛ
BâÔñø³Ýhn
[&¹öáw°owG·
i®bøÓÿkaEÏl
9a&g§÷
`ÐMGiIÛwn>JjÑ®ÜZÖÙf
ß@ð;Ø7S®¼©Å
ϲGéÿµ0
ºÊ0
³S¦£´$
×Í)WÞT¿gÙ#.zf³¸JaÄ
+o*7¾
session
pty-req
LC_TIME
failure
success
/usr/bin/rsh
shell
exec
subsystem
auth-agent-req@openssh.com
LC_ALL
LC_MESSAGES
LC_MONETARY
LC_NUMERIC
LC_COLLATE
LC_CTYPE
LANG
ssh.c
.ssh
.ssh/config
blowfish-cbc
3des-cbc
Sun_SSH_1.1
.ssh/config
/bin/sh
has a different value
is unchanged
is unknown
Sun_SSH_1.1
sshconnect1.c
NULL
ssh-userauth
/usr/lib/ssh/ssh-keysign
sshconnect2.c
ssh-userauth
sshconnect2.c
none
password
keyboard-interactive
publickey
hostbased
gssapi-with-mic
gssapi-keyex
none,zlib
zlib,none
none,zlib
hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96
aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc
ssh-rsa,ssh-dss
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
clientloop.c
authentication agent connection
clientloop.c
forwarded-tcpip
clientloop.c
break
window-change
<unknown>
dsa w/o comment
rsa w/o comment
<no key>
x11-req
../common/channels.c
connected x11 socket
../common/channels.c
x11 listener
port listener
connected socket
../common/channels.c
unknown reason
resource shortage
unknown channel type
connect failed
administratively prohibited
../common/channels.c
accepted auth socket
direct-tcpip
dynamic-tcpip
forwarded-tcpip
accepted x11 socket
direct-tcpip
arcfour
<unknown>
aes128-ctr
aes128-cbc
blowfish-cbc
3des-cbc
blowfish
3des
none
Probe-*
*SSH_Version_Mapper*
*OSU_0*,OSU_1.0*,OSU_1.1*,OSU_1.2*,OSU_1.3*,OSU_1.4*,OSU_1.5alpha1*,OSU_1.5alpha2*,OSU_1.5alpha3*
*SSH Compatible Server*
1.2.1*,1.2.2*,1.2.3*
1.3.2*
1.2.18*,1.2.19*,1.2.20*,1.2.21*,1.2.22*
1.7 SecureFX*
3.0 SecureCRT*
3.0.*
2.3.*
2.2.0*,2.3.0*
2.0.*
2.0.11*,2.0.12*
2.0.13*,2.0.14*,2.0.15*,2.0.16*,2.0.17*,2.0.18*,2.0.19*
2.1 *
2.1.0*
*MindTerm*
Sun_SSH_1.0*
Sun_SSH_1.0.*
OpenSSH*
OpenSSH_3.6*,OpenSSH_3.7*,OpenSSH_3.8*
OpenSSH_3.2*,OpenSSH_3.3*,OpenSSH_3.4*,OpenSSH_3.5*
OpenSSH_2.*,OpenSSH_3.0*,OpenSSH_3.1*
OpenSSH_2.9p*
OpenSSH_2.5.3*
OpenSSH_2.5.0*,OpenSSH_2.5.1*,OpenSSH_2.5.2*
OpenSSH_2.5.0p1*,OpenSSH_2.5.1p1*
OpenSSH_2.3.*
OpenSSH_2.3.0*
OpenSSH-2.0*,OpenSSH-2.1*,OpenSSH_2.1*,OpenSSH_2.2*
Conversion to UTF-8 failed due topreposterous space requirements
Cannot convert UTF-8 strings to the local codeset
Cannot convert ASCII strings to the local codeset
i-default
hmac-md5-96
hmac-md5
hmac-sha1-96
hmac-sha1
ssh-dss
ssh-rsa
unknown
ssh-unknown
RSA1
server->client
client->server
../common/kex.c
../common/kexdhc.c
../common/kexgexc.c
internal error
debug3
debug2
debug1
error
fatal
closed
wait_oclose
drain
open
closed
wait_ieof
drain
open
../common/packet.c
/usr/lib/ssh/ssh-askpass
correct
error
incorrect
host
~/.ssh/known_hosts2
/etc/ssh/ssh_known_hosts2
~/.ssh/known_hosts
/etc/ssh/ssh_known_hosts
.ssh/id_dsa
.ssh/id_rsa
.ssh/identity
/usr/openwin/bin/xauth
<NONE>
FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF
/etc/ssh/primes
/etc/ssh/moduli
unknown