+#. Still not random enough, presumably because neither /dev/random
+#. nor EGD were available. Try to seed OpenSSL's PRNG with libc
+#. PRNG. This is cryptographically weak and defeats the purpose
+#. of using OpenSSL, which is why it is highly discouraged.
+#: src/openssl.c:121
+msgid "WARNING: using a weak random seed.\n"
+msgstr ""
+
+#: src/openssl.c:181
+#, fuzzy
+msgid "Could not seed PRNG; consider using --random-file.\n"
+msgstr "Could not seed OpenSSL PRNG; disabling SSL.\n"
+
+#. If the user has specified --no-check-cert, we still want to warn
+#. him about problems with the server's certificate.
+#: src/openssl.c:419
+msgid "ERROR"
+msgstr ""
+
+#: src/openssl.c:419
+msgid "WARNING"
+msgstr ""
+
+#: src/openssl.c:427
+#, c-format
+msgid "%s: No certificate presented by %s.\n"
+msgstr ""
+
+#: src/openssl.c:458
+#, c-format
+msgid "%s: Certificate verification error for %s: %s\n"
+msgstr ""
+
+#: src/openssl.c:485
+#, c-format
+msgid ""
+"%s: certificate common name `%s' doesn't match requested host name `%s'.\n"
+msgstr ""
+
+#: src/openssl.c:498
+#, c-format
+msgid "To connect to %s insecurely, use `--no-check-certificate'.\n"
+msgstr ""
+