ELF4( UWVSu }jjjV PPWjjjVPPWjjjVPPWjjjVPPWjjjVPPWjjjVPPWjjjVPPWjjjVPPWjjjVPPWjjjVPPWjjjVPPWjjj+V EjjjVURPPW e[^_]Í&t&UWVSDždE @DE @5 MQ$@vRRjP`$\RXRTRP E @/ }W$jjPtP<  VlRPPPVttPPPVt^PPPTQVP0WWTPW VPPPTuO&t&UWVS t e[^_]fƅu݋$QQhVuEt Pǃ$ts Ve[^_]ÐtjUVRPt붍vEWPPPjjj P OPPPRjjj Q `vPPPR&t&UWVSE } u&PPPW$UU9vPQRW MRWQtMue1[^_]Í&e[^_]Í&t&UWVSMujQtNjFtRWQPtvRRPWDžu<@tHPPPVRY@^PEPe[^_]Ð~e[^_]Ívte1[^_]Íe[^_]ÐUWVSfEQ}u EEEEEEPP jj Eǃ EǃdEǃ`ǃTǃPǃ\ǃXǃ@ǃLǃHǃDǃ<ǃ8ǃ4ǃ(ǃ$ǃ ǃ3QQjPǃLEǃHGEVDždEEDž|DžhEEDž\EEEDžlEDž`DžTEDžpDžXEEDžtDžxPfu}uMǃ`tx BrPM PPEċPt&MV2}u`MtPrPEPRRuVVuP>WXZPQ >hQPWXZPQ_XPPXZPQ_XPP EPWPXZPQXZPQXZPQXZPuQ uEVVPXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQXZPEċQj:j:PEċPPEċPXZPEċQXZPEċQ EPW}ċPXZPQ EPVPXZPQ^XPPXZPQDG 11EEEEE PEt PEt PEt PEt PEԅt PE؅t Pt Pt Pt P@t Pt Vt W8t Pǃ8Eče[^_]Ðuu7Mǃ` BrPM P- u#M`MrBVEt&}<Et W}jPPEE؉$EPEPEPP ! \ X U11EETE P RRMQUR|jQPEċP EC QQPEPhjPTPEċP E PEjRjE EP PPEċQ8 Et<ǃǃ\ǃTǃPǃǃX EP‰D ta UPU PPP$PRPRPEċQDPPjRp  jEPDj R}n l8 dDjhj*PPtPEPDPt DQuEă P DPZxYRP" EP@~PPP8Pt[ P  PPP$P@PhRQPEċPPP@jPp  jEP@j R} ls d@jjj,PPtPEP@Pt @QuEă P @PZxYRP`XGQQPRjEjjPUE$EvPPP8Pj8jj QEPDjjP@ tXi MQjjP URPEPEPDP@tQWVPEt PEPEPDPTdtRDRPQD QR`PDPU jPEċDPXZDQPXZDQP@RUR`QP EjP@P $8UREj5@PM܋@QMjj6PUDRj5PMċDQjj6R EtC PZYPDP@t EPZYP@PQQP8P<j URP PEPEP PPDP8PE&DX_t&utg uM BrPE&D11E(fMBrfPPj PMău u[MC zrW\EDRRMQuV\jWPEċP EuRRMPuQEjVWP E}܅VP}WEP\jPXPEċP Džt2PPPEPEjPERQ ƅEă PDU1EEE X&\MBr\|VVPEċRyjjj,PQQPEċRD?QQ봋Eă PDw11EEEE2PPPEċPXEċPEEPb@Rt&$t4 (4PPjP8E/PPER WQQPDPjDh@j Q_jDhj P4Eă PEEuMBrEw1 QQP8PEtBP@jj@P UBjj$PUB Rt rrLRRPuLuZMǃ, rPHQHQ Pr yPPPE0PLPPuLuǃ()PLPPuLuǃ P}PPLWLt/PPPWLu$PDžlVVLPuLuǃ$ZQQ}PLWLRRPWLPPPWLPPPWLtsPPPWLu"ǃ<DžpPLPPuLuǃ<b[PLPPuLu3ǃ<&Dž`DžTWWLPuLuMVVLPuLuMQQLPuLuMnLRRPuLuM@|Gt3%4ld items in the session cache %4ld client connects (SSL_connect()) %4ld client renegotiates (SSL_connect()) %4ld client connects that finished %4ld server accepts (SSL_accept()) %4ld server renegotiates (SSL_accept()) %4ld server accepts that finished %4ld cache full overflows (%ld allowed) cert_status: can't parse AIA URL cert_status: no AIA and no default responder URL cert_status: Can't retrieve issuer certificate. cert_status: error querying responder cert_status: ocsp response sent: Peer has incorrect TLSv1 block padding Secure Renegotiation IS%s supported HTTP/1.0 200 ok Content-type: text/html Ciphers supported in s_server binary --- Ciphers common between both SSL end points: no client certificate available HTTP/1.0 200 ok Content-type: text/plain '%s' contains '..' reference '%s' is an invalid file name Allocation error in generating RSA key Generating temp (%d bit) RSA key...Hostname in TLS extension: "%s" verify depth is %d, must return a certificate -accept arg - port to accept on (default is %d) -context arg - set session ID context -verify arg - turn on peer certificate verification -Verify arg - turn on peer certificate verification, must have a cert. -cert arg - certificate file to use (default is %s) -crl_check - check the peer certificate has not been revoked by its CA. The CRL(s) are appended to the certificate file -crl_check_all - check the peer certificate has not been revoked by its CA or any other CRL in the CA chain. CRL(s) are appened to the the certificate file. -certform arg - certificate format (PEM or DER) PEM default -key arg - Private Key file to use, in cert file if not specified (default is %s) -keyform arg - key format (PEM, DER or ENGINE) PEM default -pass arg - private key file pass phrase source -dcert arg - second certificate file to use (usually for DSA) -dcertform x - second certificate format (PEM or DER) PEM default -dkey arg - second private key file to use (usually for DSA) -dkeyform arg - second key format (PEM, DER or ENGINE) PEM default -dpass arg - second private key file pass phrase source -dhparam arg - DH parameter file to use, in cert file if not specified or a default set of parameters is used -nbio - Run with non-blocking IO -nbio_test - test with the non-blocking test bio -crlf - convert LF from terminal into CRLF -debug - Print more output -msg - Show protocol messages -state - Print the SSL states -CApath arg - PEM format directory of CA's -CAfile arg - PEM format file of CA's -nocert - Don't use any certificates (Anon-DH) -cipher arg - play with 'openssl ciphers' to see what goes here -serverpref - Use server's cipher preferences -quiet - No server output -no_tmp_rsa - Do not generate a tmp RSA key -ssl2 - Just talk SSLv2 -ssl3 - Just talk SSLv3 -tls1 - Just talk TLSv1 -dtls1 - Just talk DTLSv1 -timeout - Enable timeouts -mtu - Set link layer MTU -chain - Read a certificate chain -no_ssl2 - Just disable SSLv2 -no_ssl3 - Just disable SSLv3 -no_tls1 - Just disable TLSv1 -no_dhe - Disable ephemeral DH -bugs - Turn on SSL bug compatibility -www - Respond to a 'GET /' with a status page -WWW - Respond to a 'GET / HTTP/1.0' with file ./ -HTTP - Respond to a 'GET / HTTP/1.0' with file ./ with the assumption it contains a complete HTTP response. -engine id - Initialise and use the specified engine -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg' -servername host - servername for HostName TLS extension -servername_fatal - on mismatch send fatal alert (default warning alert) -cert2 arg - certificate file to use for servername -key2 arg - Private Key file to use for servername, in cert file if -tlsextdebug - hex dump of all TLS extensions received -no_ticket - disable use of RFC4507bis session tickets -legacy_renegotiation - enable use of legacy renegotiation (dangerous) Can't use -HTTP, -www or -WWW with DTLS server certificate private key filesecond server certificate private key filesecond server certificate filesecond certificate private key filewarning, not much extra random data, consider using the -rand option warning: id_prefix is too long, only one new session will be possible warning: id_prefix is too long if you use SSLv2 Setting secondary ctx parameters Using default temp DH parameters %4ld session cache hits %4ld session cache misses %4ld session cache timeouts %4ld callback cache hits cert_status: callback called cert_status: AIA URL: %s (NONE) NOTs_server.cout of memory shutting down SSL CONNECTION CLOSED turning on non blocking io TIMEOUT occured DONE shutdown accept socket lf_num == 0SSL_do_handshake -> %d Lets print some clear text Write BLOCK ERROR DELAY verify error:%s SSL SESSION PARAMETERSClient certificate subject=%s issuer=%s Shared ciphers:%s CIPHER is %s Reused session-id Read BLOCK ACCEPT --- Reused, --- New, read R BLOCK GET GET /stats
%-11s:%-25s                          %s, Cipher is %s
---


GET /'%s' is an invalid path
Error accessing '%s'
'%s' is a directory
rError opening '%s'
FILE:%s
.html.php.htmrwrite W BLOCK
Swiching server context.
server.pemserver2.pem-port-accept-verifyverify depth is %d
-Verify-context-cert-certform-key-keyform-pass-dhparam-dcertform-dcert-dkeyform-dpass-dkey-nocert-CApath-no_cache-crl_check-crl_check_all-serverpref-legacy_renegotiation-cipher-CAfile-nbio-nbio_test-debug-tlsextdebug-status-status_verbose-status_timeout-status_urlError parsing URL
-msg-hack-state-crlf-quiet-bugs-no_tmp_rsa-no_dhe-no_ecdhe-www-WWW-HTTP-no_ssl2-no_ssl3-no_tls1-no_ticket-ssl2-ssl3-tls1-dtls1-timeout-mtu-chain-id_prefix-engine-rand-servername-servername_fatal-cert2-key2unknown option %s
usage: s_server [args ...]
 -rand file%cfile%c...
Error getting password
server certificate file%ld semi-random bytes loaded
error setting 'id_prefix'
id_prefix '%s' set.
Setting temp DH parameters
error setting cipher list
sv_bodyuj$GCC: (OpenIndiana 10.4.0-oi-2) 10.4.0$"L'x,16;@E4JQPVTekk<qw}`LD0,H4({_G<	
!'-39?EK8U$]ciou{)# ;_ <Zd
k3$1*5;rALGBMSY_e~k5q4wd}@06;'"UlP$$
@Pj!
-u3
d@`PT]Pi\tXDxT(xHx4| 	'H	.	5	<	C4
Jl
Q
X
_
fm@tx{Dh 
L
t



X<x#D*18?DFLRX,_fFmt{.d8@@$P%,3:AHO"V,]7dFkRrhypx~	',17@!I(R/]6c=iDoKvRY`gnu|
PM)9Pdy		!	3	?	O	`	r										


1
8
@
P
V
b
l
w






0Y7@N;U_py#8BTas	

 
-
6
C
R
b
y













 <OZj%%x#-@T`
 8H[z#+6Mgnxs_server.cprint_stats.LC0.LC1.LC2.LC3.LC4.LC5.LC6.LC7.LC8.LC9.LC10.LC11cert_status_cb.LC12.LC13.LC14.LC16.LC18.LC15.LC17sv_body.LC22s_nbioctxs_tlsextdebugs_tlsextstatuss_nbio_tests_debugs_msg.LC33.LC32.LC31.LC27.LC37.LC42.LC45.LC20.LC21.LC44.LC43.LC19.LC41.LC38.LC39.LC40.LC35.LC46bio_s_outs_quiet.L122.LC28.LC24.LC25.LC34.LC36.LC23.LC47enable_timeoutssocket_mtutlscstatp.LC26.LC29accept_socket__func__.4.LC30www_body.LC66.LC54hackwww.LC53.LC55.LC56.LC57.LC49local_argc.LC48local_argv.LC58.LC59.LC52.LC51.LC62.LC63.LC65.LC60.LC61.LC50.LC67.LC68.LC72.LC78.LC64.LC79.LC69.LC71.LC70.LC75.LC76.LC77.LC74.LC73tmp_rsa_cbrsa_tmp.0.LC81.LC80session_id_prefixssl_servername_cb.LC82ctx2.LC83.LC84s_cert_file.LC85s_cert_file2s_server_verifys_dcert_files_dkey_files_key_files_key_file2engine_id.LC86.LC87.LC88.LC89.LC153.LC154.LC155.LC156.LC157.LC159.LC158.LC160.LC161.LC162.LC163.LC164.LC165.LC166.LC167.LC168.LC169.LC170.LC171.LC172.LC173.LC174.LC175.LC176.LC177.LC178.LC179.LC180.LC181.LC182.LC183.LC184.LC185.LC186.LC187.LC188.LC189.LC190.LC191.LC192.LC193.LC194.LC195.LC196.LC197.LC198.LC199.LC200.LC201.LC202.LC203.LC204.LC205.LC206.LC207.LC208.LC209.LC210.LC211.LC212.LC90.LC91.LC92.LC219.LC218.LC221.LC225.LC226.LC227s_server_session_id_context.LC93.LC94.LC95.LC96.LC215.LC216.LC217.LC214.LC223.LC213.LC224.LC222.LC97.LC228dh512_pdh512_g.LC98.LC220.LC99.LC229.LC100.LC101.LC102.LC103.LC104.LC105.LC106.LC107.LC108.LC109.LC110.LC111.LC112.LC113.LC114.LC115.LC116.LC117.LC118.LC119.LC120.LC121.LC122.LC123.LC124.LC125.LC126.LC127.LC128.LC129.LC130.LC131.LC132.LC133.LC134.LC135.LC136.LC137.LC138.LC139.LC140.LC141.LC142.LC143.LC144.LC145.LC146.LC147.LC148.LC149.LC150.LC151.LC152.L124.L123.L120__x86.get_pc_thunk.bx_GLOBAL_OFFSET_TABLE_SSL_CTX_ctrlBIO_printfSSL_get_certificateX509_get1_ocspsk_valueOCSP_parse_urlSSL_get_SSL_CTXSSL_CTX_get_cert_storeX509_STORE_CTX_initX509_get_issuer_nameX509_STORE_get_by_subjectOCSP_REQUEST_newOCSP_cert_to_idX509_freeX509_STORE_CTX_cleanupOCSP_request_add0_idSSL_ctrlOCSP_REQUEST_add_extsk_numprocess_responderi2d_OCSP_RESPONSECRYPTO_freeX509_email_freeOCSP_CERTID_freeOCSP_REQUEST_freeOCSP_RESPONSE_freeERR_print_errorsBIO_putsOCSP_RESPONSE_printCRYPTO_mallocSSL_newstrlenSSL_set_session_id_contextSSL_clearSSL_versionBIO_new_socketSSL_set_bioSSL_set_accept_states_crlfbio_erri2d_SSL_SESSION__iobSSL_pendingSSL_stateSSL_acceptSSL_get_sessionPEM_ASN1_write_bioSSL_get_peer_certificatePEM_write_bio_X509X509_get_subject_nameX509_NAME_onelineSSL_get_shared_ciphersSSL_get_current_cipherSSL_CIPHER_get_namefilenoSSL_readSSL_get_errorselectSSL_writeSSL_set_shutdownSSL_freeOPENSSL_cleanseBIO_sock_should_retryBIO_socket_ioctlSSL_get_verify_resultX509_verify_cert_error_stringBIO_new_dgramBIO_ctrlBIO_f_nbio_testBIO_newBIO_pushmsg_cbSSL_set_msg_callbacktlsext_cbSSL_callback_ctrlSSL_get_rbiobio_dump_callbackBIO_set_callbackBIO_set_callback_argSSL_CTX_callback_ctrlSSL_set_verifySSL_renegotiateSSL_do_handshakeSSL_get_wbioBIO_writeclose__assert_c99BIO_f_bufferBIO_f_sslBIO_int_ctrlBIO_getsBIO_free_allBIO_test_flagsSSL_get_ciphersSSL_CIPHER_get_versionsleepSSL_SESSION_printX509_printstatBIO_new_fileBIO_readBIO_freestrcmpBN_newBN_set_wordRSA_freeBN_freeRSA_newRSA_generate_key_exRAND_pseudo_bytesmemcpySSL_has_matching_session_idSSL_get_servernamestrcasecmpSSL_set_SSL_CTXs_server_mainSSLv23_server_methodsignalload_configverify_depthatoiextract_portSSL_CTX_freeEVP_PKEY_freeSSL_load_error_stringsSSL_library_initsetup_engineapp_passwdload_keyload_certapp_RAND_load_fileapp_RAND_load_filesSSL_CTX_newSSL_CTX_set_generate_session_idSSL_CTX_set_quiet_shutdownSSL_CTX_load_verify_locationsSSL_CTX_set_default_verify_pathsX509_STORE_set_flagsPEM_read_bio_DHparamsDH_freeset_cert_key_stuffSSL_CTX_set_cipher_listverify_callbackSSL_CTX_set_verifySSL_CTX_set_session_id_contextgenerate_cookie_callbackSSL_CTX_set_cookie_generate_cbverify_cookie_callbackSSL_CTX_set_cookie_verify_cbSSL_load_client_CA_fileSSL_CTX_set_client_CA_listdo_serverstr2fmtBIO_new_fpapps_ssl_info_callbackSSL_CTX_set_info_callbackDH_newBN_bin2bnRAND_statusSSL_CTX_set_tmp_rsa_callbackBIO_s_nullSSLv2_server_methodatolDTLSv1_server_methodSSLv3_server_method

",	3?I	P\f		my	
			
	
	'1	8DN	Uas~	
 ,!Q"Y#p$%&'()*+,+ 7-R./0,111(2>3N4b5"#$6	!7:	A7I6 	6	7"*<	I7[8l	y76	76

	29I	Z	`:h	y	;<=>?	@A			"B5	$G	%a	&o	'uC	(D	)	*	+	,	-	.E	/	0		1		22		38		4>		5]	Fw	G	H	I			J	K			
	
L!
M0
NA
	G
T
%c
Nt
	z

)
O
	

P
Q
	
,,9	@[RlSFTU	7RR8>cVn>RRR
W
	
X
U
	
-,P	:W	^m	;t	{YZ	<	[1\	
(,JZ	]C6C	=^_	>!	=(	.5C=6S	?[Ccj	;q	xY	<		@	`		a,	-b6c?dTe[fa	l,r	gh	,ijk	ilgh
	,	,	4	<mBCJ	P	W	a{			,	,6/n7o?pNqkRW
	D	DKCSaars"			:"	)6t@uG	EOCW]	u	:|	>tut	u	7	Hv

	)9?wHcUx]cx		]y	:	;*<:?B	\@dAoad			J	K	HUo	X%z<			@17	>	@ER1d{	DCC6|	C6	N:	OA7H	PP7W	Q_7f	Rt7z		T	7s	7	V}., 6QD~W	Wj Q~7
gh	',;eIfO	Z,}ijk	ilbcd	X	7,	Y;HPRQ\~j	ZqI	["K	1L	\
7|1aHYq7O	]	^	Ts$shss	_	`7	a F 	bM d 	q 	~ 	c  s |!	!!	d&!7-	K-^-e-	o---	--	--	--	-.).),.?.R.1e.1n.	{.1.	.1.	.1.	..)..	..	/	./	G/V/	g/	/	///	//0	0	>0	O0	^0	|00	0	0000	11	&1	01	:1	D1	N1	X1	h1s1	1	1;1	11	1	11	12	2	#2J2	a2v2	|22	2262	2#222	2	2	33	3;83	?3	E3V3	^3	j3u3	}33	3	33	34	44	4146=4	C4#R4x4	b4444	4	44	4a4	44	5,5>5	D5U5	b55	55	5	555	5	55	5	56
6	66"6	)6/6	E6	L6[6	a6j6	p6	6	6m6	66	6m6	666	66	7	7	77	@!7	'7-7	D7	L7	[7f7	m7	7	7	7	78	18	D8EO8g8	8	88	89	9	$9C9	\9	h9x9	9	9969	9	9	9	:	:	':	@:O:	\:b:	q:	:6:	:	::6:	:	;	;	";	0;E;;D;	];	};;	;;	;;	;;6;	3<	;<	A<F<W<	a<t<	z<<	<<	<	b<=	=	=>	>	>)>	6>E>M>	S>c>	p>>	>	>>	>>	>	>>	?-?63?	a?j?cs?	?	b?	????	?	??	?a??	@	#@)/@I@	l@	}@@	@	@@	@A	 ABA	RA	_AtA	{AA	AA	AB	(B