!This program cannot be run in DOS mode.$
`.rdata
@.data
.pdata
@.00cfg
@.gxfg
@_RDATA
@.rsrc
@.reloc
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
H;L$`r
l$HtQ1
[]_^A\A]A^A_
AWAVVWUSH
H[]_^A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVVWUSH
H[]_^A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
AVVWSH
([_^A^
AVVWSH
([_^A^
AWAVAUATVWUSH
([]_^A\A]A^A_H
AWAVVWSH
[_^A^A_
AWAVAUATVWSH
P[_^A\A]A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVAUATVWUSH
X[]_^A\A]A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
AVVWSH
AWAVVWSH
[_^A^A_
[_^A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
X[_^A^
X[_^A^
AVVWSH
8[_^A^
AVVWSH
AVVWSH
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
h[]_^A\A]A^A_
h[]_^A\A]A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
x[]_^A\A]A^A_
AVVWSH
AWAVVWSH
P[_^A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
x[]_^A\A]A^A_
AWAVATVWSH
8[_^A\A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
x[]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AWAVAUATVWUSH
d$8tMH
X[]_^A\A]A^A_
AWAVVWUSH
8[]_^A^A_
8[]_^A^A_
AWAVATVWSH
8[_^A\A^A_
AVVWSH
h[_^A^
([]_^H
9Q,u*H
AWAVAUATVWUS
<7:upH
BwVHcD
[]_^A\A]A^A_
AVVWSH
8[_^A^
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AVVWUSH
[]_^A^
AVVWUSH
HcF(H9
`[]_^A^
AVVWSH
8[_^A^
AVVWSH
X[_^A^
AVVWSH
X[_^A^
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
IcD$hH
L$h;J(|'H
IcD$hH
IcD$hH
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVATVWUSH
@[]_^A\A^A_
AVVWSH
([_^A^
AVVWSH
([_^A^
AVVWSH
([_^A^
AWAVAUATVWUSH
([]_^A\A]A^A_
AVVWSH
8[_^A^
AVVWSH
8[_^A^
AWAVVWSH
@[_^A^A_
AVVWUSH
[]_^A^
[]_^A^
AVVWUSH
[]_^A^
[]_^A^
AWAVVWUSH
([]_^A^A_
([]_^A^A_
AVVWUSH
[]_^A^
[]_^A^
AWAVVWUSH
([]_^A^A_
([]_^A^A_
AVVWSH
8[_^A^
AVVWUSH
[]_^A^
[]_^A^
AVVWUSH
[]_^A^
[]_^A^
AVVWSH
8[_^A^
AVVWSH
8[_^A^
AVVWSH
([_^A^
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AVVWSH
([_^A^
AVVWSH
8[_^A^
AVVWSH
8[_^A^
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVVWSH
@[_^A^A_
AVVWUSH
[]_^A^
AVVWSH
([_^A^
AVVWSH
([_^A^
AWAVVWUSH
X[]_^A^A_
AWAVATVWSH
([_^A\A^A_
AWAVVWSH
[_^A^A_H
[_^A^A_
AWAVATVWSH
([_^A\A^A_
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
X[]_^A\A]A^A_
AWAVAUATVWUSH
X[]_^A\A]A^A_
AWAVAUATVWUSH
h[]_^A\A]A^A_
AWAVVWSH
P[_^A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AVVWSH
X[_^A^
X[_^A^
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AVVWUSH
0[]_^A^
AVVWSH
AWAVVWSH
[_^A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AVVWSH
([_^A^
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
LcD$LH
X[]_^A\A]A^A_
AWAVAUATVWUSH
h[]_^A\A]A^A_
h[]_^A\A]A^A_
AWAVATVWUSH
[]_^A\A^A_
AWAVAUATVWSH
0[_^A\A]A^A_
0[_^A\A]A^A_H
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVVWUSH
([]_^A^A_
AWAVVWS
[_^A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
[]_^A\A]A^A_
\$Pt H
AWAVATVWUSH
[]_^A\A^A_
AVVWUSH
0[]_^A^
G H9?u
G H9?u
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVVWSH
<;,u$H
[_^A^A_
AVVWUSH
[]_^A^
AWAVAUATVWUSH
HcD$lL
[]_^A\A]A^A_
AWAVAUATVWSH
0[_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVATVWSH
([_^A\A^A_H
AWAVVWUSH
([]_^A^A_
([]_^A^A_
AWAVAUATVWUSH
|$(uH
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWSH
P[_^A\A]A^A_
P[_^A\A]A^A_H
P[_^A\A]A^A_
AWAVVWUSH
[]_^A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVVWSH
t/<-t H
@[_^A^A_
AWAVATVWSH
D$(H)C
8[_^A\A^A_
AWAVAUATVWSH
\gssapi6H
i64.dll
P[_^A\A]A^A_
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
H[_^A^
AVVWUSH
p[]_^A^
AVVWUSH
[]_^A^
[]_^A^
AWAVATVWUSH
H8H+H0H
[]_^A\A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AVVWSH
([_^A^
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
E)L$xE)
\$|t%I
G8I;G0u~I
G8I;G0u:I
[]_^A\A]A^A_
AVVWUSH
;n|u^%
[]_^A^
AVVWSH
([_^A^
AWAVAUATVWUSH
H[]_^A\A]A^A_
D$8)Fp
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVVWUSH
([]_^A^A_
AVVWSH
([_^A^
AVVWUSH
[]_^A^
AWAVVWSH
[_^A^A_
AVVWSH
Hc~|L9
([_^A^
([_^A^
AWAVAUATVWUSH
x[]_^A\A]A^A_
AVVWSH
([_^A^H
([_^A^
AWAVVWUSH
H8H+H0H
[]_^A^A_
AWAVAUATVWUSH
LcD$pH
[]_^A\A]A^A_
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AVVWSH
([_^A^
AWAVVWUSH
([]_^A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWUSH
[]_^A^
AWAVVWUSH
8[]_^A^A_
AWAVAUATVWUSH
GhIcL$LH
8[]_^A\A]A^A_
AWAVATVWUSH
HcD$lI
H8H+H0H
[]_^A\A^A_
AWAVATVWUSH
[]_^A\A^A_
[]_^A\A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWUSH
LcD$`H
[]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
l$HtCf.
l$HtXH
d$Pt!H
G8L+G0H
[]_^A\A]A^A_
u9HcD$4H
AWAVATVWSH
8[_^A\A^A_
AVVWSH
x[_^A^
AVVWSH
8[_^A^
AVVWSH
H[_^A^
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
H[_^A^
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVVWSH
[_^A^A_
x(sr#H
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVVWUSH
([]_^A^A_
AWAVAUATVWUSH
uS9t$DuM
D$H9D$LuC
D$P9D$Tu9
D$X9D$\u/
D$`9D$du%
D$<9D$@u
D$49D$8u
D$,9D$0u
h[]_^A\A]A^A_H
AVVWSH
AWAVAUATVWUSH
[]_^A\A]A^A_
H;\$8t
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
X[]_^A\A]A^A_
AWAVAUATVWSH
`[_^A\A]A^A_
AWAVVWUSH
remote hH
D$(ost
[]_^A^A_
AWAVVWUSH
([]_^A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVATVWSH
H[_^A\A^A_
AVVWSH
8[_^A^
AVVWUSH
[]_^A^
AVVWSH
([_^A^
AWAVATVWSH
[_^A\A^A_
AVVWUSH
[]_^A^
AWAVVWSH
[_^A^A_
AWAVAUATVWUSH
h[]_^A\A]A^A_
AWAVVWUSH
H[]_^A^A_
AWAVVWSH
@[_^A^A_
AVVWSH
H[_^A^
AVVWUSH
`[]_^A^
AWAVATVWUSH
0[]_^A\A^A_
AWAVVWSH
[_^A^A_
AVVWUSH
[]_^A^
u{H9|$@utH9\$Hum
AWAVATVWUSH
P[]_^A\A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AWAVAUATVWUSH
X[]_^A\A]A^A_
AWAVAUATVWUSH
X[]_^A\A]A^A_
AWAVVWUSH
([]_^A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVVWUSH
H[]_^A^A_
AVVWSH
8[_^A^
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
([_^A^
AWAVVWSH
[_^A^A_
AWAVATVWSH
([_^A\A^A_
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AVVWSH
([_^A^
AVVWSH
([_^A^
AWAVAUATVWUSH
8[]_^A\A]A^A_
H;0sHI
AWAVATVWSH
8[_^A\A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AWAVVWSH
[_^A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVATVWSH
8[_^A\A^A_
AVVWSL
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWUSH
\$Xtf1
t$Ht\1
[]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AWAVATVWSH
([_^A\A^A_
AWAVVWSH
[_^A^A_
AWAVAUATVWSI
[_^A\A]A^A_
AWAVAUATVWUSH
\$Hs?H
T$0s&H
\$@sRH
D$@s!H
l$Ps\H
[]_^A\A]A^A_
AWAVATVWSH
([_^A\A^A_
AWAVVWSH
[_^A^A_
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWSH
`[_^A\A]A^A_
AWAVAUATVWSH
p[_^A\A]A^A_
AWAVATVWSH
([_^A\A^A_
AWAVATVWSH
([_^A\A^A_
AWAVVWSH
0[_^A^A_
AVVWSH
H[_^A^
AWAVVWSH
[_^A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
H;r$H
l$PtzL
t$0tD1
h[]_^A\A]A^A_
AWAVAUATVWUSH
L$8t M
|$Pt}M
D$0t_I
t$ tjJ
[]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AWAVAUATVWUSH
tOI96vI
([]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AVVWSH
([_^A^
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
l$Ht,I9
|$ tQ1
[]_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVVWSH
[_^A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWUSH
h[]_^A\A]A^A_
AVVWSH
X[_^A^
AVVWSH
([_^A^
AVVWSH
([_^A^
AVVWSH
([_^A^
AVVWSH
([_^A^
AVVWSH
([_^A^
AVVWSH
AWAVAUATVWUSH
@8IcOpH
@8IcOtH
[]_^A\A]A^A_
AWAVVWSH
0[_^A^A_
AWAVVWSH
[_^A^A_
AVVWSH
<8"u`I
([_^A^
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVATVWSH
[_^A\A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
H9t$(@
AVVWUSL
[]_^A^
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVATVWSH
x[_^A\A^A_
AWAVAUATVWSH
p[_^A\A]A^A_
AWAVAUATVWSH
`[_^A\A]A^A_
AVVWUSH
[]_^A^
AVVWUSH
`[]_^A^
AVVWSH
([_^A^
AWAVAUATVWUSH
([]_^A\A]A^A_
AVVWSH
([_^A^H
([_^A^H
([_^A^
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
0.0.0.0
LcD$hH
HcT$hH
AVVWSH
([_^A^
AWAVAUATVWUSH
l$Pt-1
[]_^A\A]A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVATVWUSH
`[]_^A\A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVAUATVWSH
t)</uBH
P[_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AVVWSH
([_^A^
AVVWSH
([_^A^
AWAVATVWUSH
[]_^A\A^A_
AWAVATVWUSH
[]_^A\A^A_
AWAVVWSH
[_^A^A_
AVVWUSH
[]_^A^
AWAVAUATVWUSH
8[]_^A\A]A^A_
AVVWSH
H[_^A^
H[_^A^
([]_^H
AWAVVWUSH
8[]_^A^A_
AWAVVWUSH
8[]_^A^A_
AVVWSH
([_^A^H
([_^A^
([_^A^H
([_^A^
([_^A^
([_^A^
([_^A^
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
H;\$0s|
8[]_^A\A]A^A_
AWAVATVWSH
8[_^A\A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
h[]_^A\A]A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AVVWSH
([_^A^
AWAVVWUSH
h[]_^A^A_
AVVWUSH
[]_^A^
AWAVAUATVWUSH
([]_^A\A]A^A_
AVVWSH
([_^A^
AWAVATVWUSH
[]_^A\A^A_
AVVWSH
([_^A^
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
([_^A^
AVVWUSH
[]_^A^
AVVWUSH
[]_^A^
AVVWUSH
[]_^A^
[]_^A^
AWAVAUATVWUSH
D$@Ic@
H[]_^A\A]A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AWAVVWSH
@[_^A^A_
AWAVAUATVWSH
P[_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
h[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWSH
@[_^A\A]A^A_
AWAVATVWUSH
[]_^A\A^A_
AVVWSH
8[_^A^
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
([_^A^
AWAVVWSH
@[_^A^A_
AWAVATVWSH
8[_^A\A^A_
AVVWSH
h[_^A^
AWAVAUATVWUSH
er-Key-FH
PuTTY-UsfH
[]_^A\A]A^A_
ivation
EncryptiH3
Comment
Public-LH3
c-Lines
Key-DeriH3
Argon2-MH3
-Memory
Argon2-PH3
-Passes
Argon2-SH3
Private-H
c-Lines
D$Wt/L3
te-Hash
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
er-Key-FH
PuTTY-UsI
[]_^A\A]A^A_
EncryptiH3
ryption
Comment
Public-LH3
c-Lines
AVVWSH
AWAVVWSH
0[_^A^A_
AWAVVWSH
er-Key-FH
PuTTY-UsfH
EncryptiH3D$ H
ryption
H3L$#H
P[_^A^A_
Comment
H9D$ u3H
AVVWSH
8[_^A^
AWAVAUATVWUSH
h[]_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AVVWSH
8[_^A^
AWAVVWSH
@[_^A^A_
AWAVAUATVWSI
[_^A\A]A^A_
AWAVATVWUSH
[]_^A\A^A_
AWAVATVWUSH
[]_^A\A^A_
AWAVAUATVWUSPH
[]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
X[]_^A\A]A^A_
AWAVAUATVWUSPH
[]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AVVWSH
([_^A^
AWAVVWSH
0[_^A^A_
AWAVAUATVWUSH
t$ ~yL
3\$(D3t$,
8[]_^A\A]A^A_
AWAVATVWSH
8[_^A\A^A_
AWAVAUATVWUSH
t$ ~~L
3l$(3\$,
8[]_^A\A]A^A_
AWAVATVWUSH
0[]_^A\A^A_
([]_^H
AVVWSH
H[_^A^
AWAVVWUSH
H[]_^A^A_
AVVWSH
([_^A^
AVVWSH
8[_^A^
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVAUATVWUSH
nt$(fA
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
D$xH;G
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
([_^A^
AWAVAUATVWUSH
8[]_^A\A]A^A_
AVVWSH
AVVWSH
H[_^A^
AWAVAUATVWSH
`[_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AVVWSH
([_^A^
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AVVWSH
AVVWSH
AWAVATVWSH
8[_^A\A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVVWSH
@[_^A^A_
AWAVVWUSH
H[]_^A^A_
AVVWSH
([_^A^
AVVWSH
([_^A^
AVVWSH
([_^A^
AWAVAUATVWUSH
H;T$8@
T$89T$@H
[]_^A\A]A^A_
AWAVAUATVWUSH
~D$HfD
nD$PfD
WfA14VH
TfA1|U
,LfA1\M
D$Xt9f.
[]_^A\A]A^A_
AWAVAUATVWUSH
UUUUUU
[]_^A\A]A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
AWAVAUATVWUSH
uhL;D$ w
L;D$ t
8[]_^A\A]A^A_
AWAVAUATVWUSH
fA!D~
([]_^A\A]A^A_
AWAVAUATVWUSH
t$@t=A
[]_^A\A]A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AWAVAUATVWUSH
UUUUUU
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
t$(t!f.
[]_^A\A]A^A_
AWAVAUATVWUSH
T$0s"1
[]_^A\A]A^A_
AWAVAUATVWUSH
\$(t"f.
[]_^A\A]A^A_
AWAVATVWUSH
[]_^A\A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
AWAVATVWUSH
[]_^A\A^A_
AVVWSH
x[_^A^
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
H[_^A^
AWAVVWSH
`[_^A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
|$0tpL
l$(sb1
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
D$8H9F
|$(tOH
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AWAVAUATVWUSH
t$0s\1
x[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
([_^A^
AWAVVWSH
H;x0v<
H;x0s%H
@[_^A^A_
AWAVVWSH
[_^A^A_
AVVWSH
([_^A^
AWAVVWSH
[_^A^A_
AVVWSH
([_^A^
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
AWAVATVWSH
X[_^A\A^A_
AWAVVWSH
p[_^A^A_
AWAVAUATVWUSH
x[]_^A\A]A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVAUATVWUSH
([]_^A\A]A^A_
([]_^H
AWAVVWUSH
([]_^A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AWAVATVWUSH
[]_^A\A^A_
AVVWSH
AVVWSH
H[_^A^
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
HcT$HA
AWAVVWSH
[_^A^A_
[_^A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
LcL$,L
AWAVVWSH
P[_^A^A_
AVVWSH
8[_^A^
AVVWSH
8[_^A^
AVVWSH
h[_^A^
AVVWSH
([_^A^
AVVWUSH
[]_^A^H
AWAVAUATVWUS
D$@H;t$Xs
\$pt-H
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVATVWSI
[_^A\A^A_
AVVWSH
8[_^A^
AWAVATVWSH
([_^A\A^A_
AVVWSH
([_^A^
AWAVATVWUSH
0[]_^A\A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWUSH
X[]_^A\A]A^A_
AWAVAUATVWUSH
X[]_^A\A]A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
D$(L9`
X[]_^A\A]A^A_
AWAVAUATVWUSH
8[]_^A\A]A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AVVWSH
([_^A^
AVVWSH
([_^A^
AWAVAUATVWUSH
H[]_^A\A]A^A_
AWAVAUATVWUSH
y H9z t
x[]_^A\A]A^A_
AWAVAUATVWUSH
H[]_^A\A]A^A_
AWAVATVWUSH
i H9j t
[]_^A\A^A_
AWAVVWSH
[_^A^A_
AWAVAUATVWSH
[_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
t$HL1|$pL1
L1T$hL1T$xL1
L1d$XL1d$`L1d$PL1
L$(L3d$0H
H#E L1
H#E(L1
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVAUATVWUSH
H9\$hH
D#d$tE1
D!L$`D#L$pA
L$ D#l$(A
L$8D#\$\!
D!t$0D#
D#T$xE1
[]_^A\A]A^A_
AVVWSH
([_^A^
AWAVATVWSH
([_^A\A^A_
AWAVAUATVWUSH
D#T$81
#t$$E!
D#\$ H
T$(#|$LH
3T$@3t$
3t$ D1
D3t$0L
D3L$8D3d$
D!L$8D#L$LD
D#D$0!L$(#L$$D!
#l$ D1
D$XfD3
p[]_^A\A]A^A_
AWAVAUATVWUSH
H3L$xH
H3L$xH
H#D$pH
H!\$XH
H#\$pL1
H!D$@H#D$(H
L!|$HL#
H#L$hH!
H#t$PI
L!t$0L#
L3l$(L
D$8L3D$0L1
H3l$`L1
UUUUUUUUL!
|$HL3z
|$HH3r(H
L3j0L3R8I
wwwwwwwwI!
33333333H!
M3t$ J
\$(M3\$
D$0I3D$
D$0L1|$XM1
L1l$@L1
L3l$hL
L3l$HJ
33333333H!
H3|$0H
L1d$PJ
L$XL3t$(J
wwwwwwwwL!
t$8H3t$HL
33333333I!
33333333I!
t$`L3t$hL3t$xN
L1D$@I
L3|$(L
wwwwwwwwI!
L3|$XI1
33333333I!
D$PH3D$0H1
H3D$pN
33333333H!
H3l$0H
L#T$pL
H!D$xI
H#D$pI1
L!t$(M!
H#t$XL
L!D$PL#D$hH
L$HL#\$@L!
L#d$8M1
t$HL3t$PL1
H3\$0L1
UUUUUUUUL!
UUUUUUUUM!
T$(H3P
T$(H3X
T$0H3P
[]_^A\A]A^A_
AWAVAUATVWUSH
D$@L3(L3@
L3` L3P(H3P0L3H8
H!t$ H#
H#l$0L!
L#l$8I!
H#\$xL
H#T$XL
L#t$HI1
UUUUUUUUH!
wwwwwwwwH!
L$(H3L$
33333333H!
l$(L1D$
33333333L!
33333333I!
33333333H!
33333333I!
L3` L3P(H3P0L3H8
H#L$8H!
H#D$8M1
L#|$HM
L#l$ H
L#\$`I
L#L$0H
H#\$XM1
UUUUUUUUM!
L3` L3h(L3x0L3H81
[]_^A\A]A^A_
AWAVAUATVWUSH
h[]_^A\A]A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
([_^A^
AWAVVWSH
`[_^A^A_
AVVWSH
([_^A^
AWAVAUATVWUSH
[]_^A\A]A^A_
AWAVVWSH
[_^A^A_
AWAVAUATVWUSH
[]_^A\A]A^A_
AVVWSH
AWAVVWSH
0[_^A^A_
AWAVAUATVWUSH
`H3D$0H1
`H3|$8L1
L1D$HL
L$XL1!L1
L3D$@L1A
H1A I1
L1q(H1
H1q0I1
[]_^A\A]A^A_
AWAVVWSH
@[_^A^A_
AWAVVWSH
oL0fH
oL@fH
@[_^A^A_
AWAVATVWSH
([_^A\A^A_
H3E H3E
u/HcH<H
WATAUAVAWH
A_A^A]A\_
ffffff
fffffff
fffffff
ffffff
vKfffff
A:8ucI
t&A88t
@USVWATAVAWH
A_A^A\_^[]
@USVWATAVAWH
A_A^A\_^[]
WAVAWH
~,*u<I
A_A^_
kL@8o(u
D$@H;F
<htl<jt\<lt4<tt$<wt
|$ UATAUAVAWH
<Ct-<D
<St[A:
u<g~l<it[<ntP<ot,<pt
<utK@:
{,D+{HD+
A_A^A]A\]
x UAVAWH
WAVAWH
~,*uEI
A_A^_
D$@H;F
t$ WATAUAVAWH
D+{HD+
L$0Lc@
A_A^A]A\_
D$18F(u
UWATAVAWH
A_A^A\_]
kL@8o(u
D$@H;F
<htl<jt\<lt4<tt$<wt
|$ UATAUAVAWH
<Ct-<D
<St[@:
u<g~l<it[<ntP<ot,<pt
<utK@:
A_A^A]A\]
WAVAWH
A_A^_
D$@H;F
t$ WATAUAVAWH
|T4fD;
A_A^A]A\_
D$18F(u
UVWATAUAVAWH
rsf;\$d
r_f;\$l
rKf;\$t
r7f;\$|
f;\$4r
f;\$<r
f;\$Dr
f;\$Lr
rvf;\$d
rbf;\$l
rNf;\$t
r:f;\$|
A_A^A]A\_^]
x AUAVAWH
0A_A^A]
t$ UWAVH
SUVWATAVAWH
A_A^A\_^][
UVWATAUAVAWH
0A_A^A]A\_^]
t$ WATAUAVAWH
t$HA_A^A]A\_
UVWATAUAVAWH
L$<;L$P
L$4+L$8
l$0D+ D9
L$4+L$H
A_A^A]A\_^]
@HcC(H
L$0H;K
tj<jtV
<CtK<Dv
<[tQ<a
<it|<nto<otb<ptU<st
@8)u&I
@8|$Pu
8\$PtD
t?8_:t
8\$PtF
tA8_:t
x ATAVAWH
A_A^A\
VWATAVAWH
0A_A^A\_^
tQD8c:u0M
WATAUAVAWH
@8i(u:
0A_A^A]A\_
UVWATAUAVAWH
@A_A^A]A\_^]
u3HcH<H
@USVWATAUAVAWH
A_A^A]A\_^[]
9Cu,fD9y
fB9<{u
fD9,pu
t$`fD9+t$I
L$ SUVWH
WAVAWH
fE98t'
0A_A^_
\$ UVWATAUAVAWH
f9t$bu
A_A^A]A\_^]
H9L$Ht?H
WATAUAVAWH
0A_A^A]A\_
\$ UVWATAUAVAWH
fD9,Au
A_A^A]A\_^]
|$ AVH
UVWATAUAVAWH
fE9,Fu
A_A^A]A\_^]
UVWAVAWH
0A_A^_^]
x ATAVAWH
A_A^A\
t$ WAVAWH
A_A^_
WAVAWH
A_A^_
WAVAWH
fA9,@u
fA9,vu
0A_A^_
D$@H=@W
p0R^G'
H SVWH
L$ SUVWH
\$ UVWH
@SUVWATAUAVAWH
H#L$0H
fD94Pu
fE94Gu
fE94wu
fD94Cu
fD94Ku
fD94Cu
A_A^A]A\_^][
WATAUAVAWH
0A_A^A]A\_
WATAUAVAWH
0A_A^A]A\_
UVWATAUAVAWH
rsf;\$d
r_f;\$l
rKf;\$t
r7f;\$|
f;\$4r
f;\$<r
f;\$Dr
f;\$Lr
rvf;\$d
rbf;\$l
rNf;\$t
r:f;\$|
A_A^A]A\_^]
L$ VWAVH
VWATAVAWH
0A_A^A\_^
@USVWH
X @8u/t
L$ UVWATAUAVAWH
0A_A^A]A\_^]
T$ D)s
t$ WATAUAVAWH
0A_A^A]A\_
D$(H!L$ E3
;D$hsC
WATAUAVAWH
0A_A^A]A\_
WATAUAVAWH
A9tgA
A_A^A]A\_
@USVWH
X @8u/t
ATAUAVH
L$ fff
L$ |+L;
A^A]A\
t$ UWAUAVAWH
A_A^A]_]
x UATAUAVAWH
A_A^A]A\]
u$D8r(t
D81uUL9r
uED8r(t
vAD8s(t
f9)u4H9j
u%@8j(t
UVWATAUAVAWH
@A_A^A]A\_^]
H!T$ E3
L$ VWAVH
~18^0t
LcA<E3
p0R^G'
H!L$ D
WATAUAVAWH
A_A^A]A\_
fD9t$b
l$ VWATAVAWH
L$&8\$&t,8Y
A_A^A\_^
p*W4H
p*W4H
D$0@8{
\$ VWATAUAVH
D!l$xA
@A^A]A\_^
{ AUAVAWH
0A_A^A]
t$xt*3
x ATAVAWH
A_A^A\
WATAUAVAWH
gfffffffH
A_A^A]A\_
WAVAWH
A_A^_
L$ VWAVH
fD94H}aD
UVWAVAWH
A8^8}SD
u,9\$0~LL
PA_A^_^]
VWATAVAWH
A_A^A\_^
WATAUAVAWH
A_A^A]A\_
H;xXu5
s WATAUAVAWH
D$h9t$P
A_A^A]A\_
UATAUAVAWH
A_A^A]A\]
WATAUAVAWH
A_A^A]A\_
UATAUAVAWH
A_A^A]A\]
@UATAUAVAWH
e0A_A^A]A\]
x ATAVAWH
fG9$Ou
0A_A^A\
x ATAVAWH
A_A^A\
fB9<@u
fB9,Nu
fB9,Nu
fB9,Nu
fA9,Au
f9)u:H
fB9<Bu
fB94Ou
fB9<Hu
@USVWATAVAWH
tyfD9 tsH
tQfD9 tK
fD9$Hu
@A_A^A\_^[]
WAVAWH
A_A^_
fB9<Hu
fB9<@u
fD94Au
fD94iu
fB9<Bu
tSf91tNH
tU;\$0tH
UVWATAUAVAWH
PA_A^A]A\_^]
u$D8r(t
fD91uTL9r
uED8r(t
v@D8s(t
WATAUAVAWH
0A_A^A]A\_
H97u+A
@USVWATAUAVH
D8t$ht
D8t$ht
A^A]A\_^[]
UVWATAUAVAWH
tUH95i6
xWI96tRI
0A_A^A]A\_^]
WATAUAVAWH
fB94ht
xXI96tSI
fC94wu
0A_A^A]A\_
ATAVAWH
0A_A^A\
WAVAWH
D8|$`t
A_A^_
@USVWATAUAVAWH
H!D$ I
hA_A^A]A\_^[]
AUAVAWH
@A_A^A]
UVWATAUAVAWH
fB9<A}1L
A_A^A]A\_^]
VWATAVAW
A_A^A\_^
D$0H9D$8
AUAVAWH
A_A^A]
SUWATAUAVAWH
`A_A^A]A\_][
UVWATAUAVAWH
0A_A^A]A\_^]
@SUVWATAUAVH
s5fE9!
fE9!fA
D$pfA;
NfD9d$pu
fD9d$pt+fD
0A^A]A\_^][
@SUVWATAVAWH
@A_A^A\_^][
E80t"A
fD94Q}
WATAVH
0A^A\_
@USVWATAUAVAWH
xA_A^A]A\_^[]
WATAVH
0A^A\_
UWATAVAWH
A_A^A\_]
x AVAW
|$0A_A^
|$ UATAUAVAWH
I9tD
9^ t"H
A_A^A]A\]
@UVWATAUAVAWH
e0A_A^A]A\_^]
@UATAUAVAWH
H!T$0D
u,!T$(H!T$
A_A^A]A\]
WATAUAVAWH
A_A^A]A\_
WAVAWH
A_A^_
x ATAVAWH
0A_A^A\
@USVWATAVAWH
A_A^A\_^[]
SVWATAUAVAWH
0A_A^A]A\_^[
@SVWATAUAVAWH
L!|$(L!
D$0HcH
pA_A^A]A\_^[
B(I9A(
t$ WATAUAVAWH
A_A^A]A\_
AUAVAWH
u4I9}(
;I9}(tiH
0A_A^A]
@USVWATAUAVAWH
A_A^A]A\_^[]
UVWATAUAVAWH
`A_A^A]A\_^]
UVWATAUAVAWH
A_A^A]A\_^]
@SUVWATAVAWH
A_A^A\_^][
@UATAUAVAWH
e0A_A^A]A\]
WAVAWH
@A_A^_
x ATAVAWH
@A_A^A\
x UAVAWH
AUAVAWH
@A_A^A]
UATAUAVAWH
A_A^A]A\]
u~9t$Xt
s WAVAWH
0A_A^_
@USVWATAUAVAWH
eHA_A^A]A\_^[]
\$ UVWH
@USVWATAVAWH
fD9$Ou
0A_A^A\_^[]
fD9$wu
}HfD9#A
ffffff
fffffff
T$`fA;
x ATAVAWH
@8~8t
@8~0tM
A_A^A\
ATAVAWH
A_A^A\
USVWAVH
A^_^[]
Plink: command-line connection utility
Usage: plink [options] [user@]host [command]
("host" can also be a PuTTY saved session name)
Options:
-V print version information and exit
-pgpfp print PGP key fingerprints and exit
-v show verbose messages
-load sessname Load settings from saved session
-ssh -telnet -rlogin -raw -serial
force use of a particular protocol
-ssh-connection
force use of the bare ssh-connection protocol
-P port connect to specified port
-l user connect with specified username
-batch disable all interactive prompts
-proxycmd command
use 'command' as local proxy
-sercfg configuration-string (e.g. 19200,8,n,1,X)
Specify the serial configuration (serial only)
The following options only apply to SSH connections:
-pwfile file login with password read from specified file
-D [listen-IP:]listen-port
Dynamic SOCKS-based port forwarding
-L [listen-IP:]listen-port:host:port
Forward local port to remote address
-R [listen-IP:]listen-port:host:port
Forward remote port to local address
-X -x enable / disable X11 forwarding
-A -a enable / disable agent forwarding
-t -T enable / disable pty allocation
-1 -2 force use of particular SSH protocol version
-4 -6 force use of IPv4 or IPv6
-C enable compression
-i key private key file for user authentication
-noagent disable use of Pageant
-agent enable use of Pageant
-no-trivial-auth
disconnect if SSH authentication succeeds trivially
-noshare disable use of connection sharing
-share enable use of connection sharing
-hostkey keyid
manually specify a host key (may be repeated)
-sanitise-stderr, -sanitise-stdout, -no-sanitise-stderr, -no-sanitise-stdout
do/don't strip control chars from standard output/error
-no-antispoof omit anti-spoofing prompt after authentication
-m file read remote command(s) from file
-s remote command is an SSH subsystem (SSH-2 only)
-N don't start a shell/command (SSH-2 only)
-nc host:port
open tunnel in place of session (SSH-2 only)
-sshlog file
-sshrawlog file
log protocol details to a file
-logoverwrite
-logappend
control what happens when a log file already exists
-shareexists
test whether a connection-sharing upstream exists
Connection abandoned.
The session log file "%.*s" already exists.
You can overwrite it with a new session log,
append your session log to the end of it,
or disable session logging for this session.
Enter "y" to wipe the file, "n" to append to it,
or just press Return to disable logging.
Wipe the log file? (y/n, Return cancels logging)
The session log file "%.*s" already exists.
Logging will not be enabled.
You are loading an SSH-2 private key which has an
old version of the file format. This means your key
file is not fully tamperproof. Future versions of
PuTTY may stop supporting this private key format,
so we recommend you convert your key to the new
format.
Once the key is loaded into PuTTYgen, you can perform
this conversion simply by saving it again.
Release 0.80
-Release-0.80
PuTTY downstream no longer available
SSHCONNECTION@putty.projects.tartarus.org-2.0-
c96fb0f10a4266513f8ebd3781550dac387d1dd1
0123456789ABCDEF0123456789
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
User-Key-File-3
PuTTY-User-Key-FUser-Key-File-2
User-Key-File-1
on2-Parallelism
Argon2-Paralleli
#+3;$,4<
.+1$;7
%)08"4
9 -6'2
,5!(/:
iciNWq
Ze2Zh@
A4x{%`
BFUa.X
w``u N
expand 32-byte k90
UUUUUU
UUUUUU
%$%4%,%
CueaaaaceeeiiiAAE**ooouuyOUc$YPsaiounNao?++**!<>###||||++||++++++--|-+||++--|-+----++++++++##||#aBTPEsyt******EN=+><++-=... n2*
!cL.Y|S"Ca<--R~o+23'u|.,1o>///?AAAAAAACEEEEIIIIDNOOOOOxOUUUUYPBaaaaaaaceeeeiiiionooooo/ouuuuypy
*#****o~**+++++-----++++|****L.
..% !!< ?!H !?I Rs
!SM !TM"!IIa!IVc!VIe!IXh!XIj!iiq!ivs!viu!ixx!xiz!10i$11j$12k$13l$14m$15n$16o$17p$18q$19r$20s$1.
$dar3AUs3oVu3pcv3pA
%$%,%4%<%
"H"d"e"
P%Q%R%Q
W%X%Y%Z%[%
]%^%_%`%a%
f%g%h%i%j%
%$%a%b%V%U%c%Q%W%]%\%[%
%<%^%_%Z%T%i%f%`%P%l%g%h%d%e%Y%X%R%S%k%j%
e"d" #!#
D7q/;M
[aOni*{
~ $s%r
@b;zO]
v2!L.2
IND)ind)"
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
!"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
UTF-16LEUNICODE
UUUUUU
UUUUUU
=imb;D
/>58d%
VM>cQ6
>jtm}S
)>6{1n
+f)>0'
;H9>&X
*StO9>T
n03>Pu
K~Je#>!
bp(=>?g
BC?>6t9^
K&>.yC
.xJ>Hf
y\PD>!
|b=})>
c [1>H'
uzKs@>
3>N;kU
kE>fvw
V6E>`"(5
?UUUUUU
?7zQ6$
Unable to parse auth header from HTTP proxy
permit-pty
Server refused to allocate pty
Allocated pty
Configuring %s parity
SerialParity
FontQuality
Validity
AddDllDirectory
Out of memory
CryptProtectMemory
Unable to load any WinSock library
primary
MouseAutocopy
Received invalid elliptic curve point in ECDH reply
Received invalid elliptic curve point in GSSAPI ECDH reply
Key file contains public key only
AltOnly
Forwarded port opened successfully
Network error: Address family not supported by protocol family
AddressFamily
-hostkey
GssapiRekey
publickey
cert_ca_key
putty-private-key-file-mac-key
cross-certifying new host key
Noninteractive SSH proxy cannot confirm host key
Noninteractive SSH proxy cannot confirm weak cached host key
Server refused our key
user authentication key
Encrypted session key
ssh.com SSH-2 private key
not a PuTTY SSH-2 private key
not a public key or a PuTTY SSH-2 private key
SSH-1 private key
unable to identify algorithm of base key
Full text of host's public key
Offered public key
SSH-1 public key
Fingerprint of signing CA key
HostKey
TelnetKey
ScrollOnKey
ComposeKey
PublicKey
cleanup after downstream went away
X11Display
TCPNoDelay
public_affine_y
public_y
display name '%s' has no ':number' suffix
gssapi-keyex
Local\putty-connshare-mutex
Server's host key did not match any used in previous GSS kex
private_x
public_affine_x
PageantRequest%08x
%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x
%s%02x
unknown reason code %#x
PuTTY key format too new
Writing new
Courier New
UTF8linedraw
Trying Pageant key #%zu
Configuring baud rate %lu
process id %lu
proxy^%u
%u.%u.%u.%u
on behalf of downstream #%u
Auth helper plugin announced unsupported version number %u
Received %s for %s channel %u
CHANNEL_OPEN_CONFIRMATION packet cited unknown channel %u
CHANNEL_OPEN_FAILURE packet cited unknown channel %u
Agent forwarding request for unrecognised channel %u
X11 forwarding request for unrecognised channel %u
unknown value %u
unknown type %u
gss_init_sec_context
gss_delete_sec_context
DeleteSecurityContext
CryptReleaseContext
BlinkText
output
Abort Output
timeout
-no-sanitize-stdout
-no-sanitise-stdout
XDM-AUTHORIZATION-1 time stamp was too far out
Network error: Connection timed out
connection lost
proxyhost
localhost
ProxyLocalhost
-loghost
Network error: No route to host
ProxyHost
LogHost
Host does not exist
Host key not in manually configured list
ProxyExcludeList
Rejected X11 connect request
Starting serial break at user request
Continuing despite 'Terrapin' vulnerability, at user request
Received %s for channel %d with no outstanding channel request
Received %s with no outstanding global request
Pageant failed to respond to signing request
Pageant refused signing request
Received %s with no outstanding request