ELF>5@@8 @ @@@ @@@PP[kk$@[kk``88800hhhDDStd88800PtdLLLttQtdRtd[kk  /lib64/ld-linux-x86-64.so.2 GNUGNUQΗN-%K|GNUd ok6g~ }], QF"D6&/#Jt_ Ug_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTable__cxa_finalize__libc_start_main__cxa_atexitapr_file_printfapr_file_openapr_file_close__stack_chk_failapr_terminatewrite__errno_locationabortapr_generate_random_bytesapr_psprintfapr_file_putsapr_password_getapr_pstrdupstrcmpapr_file_open_stdinapr_file_read_fullstrlenmemsetapr_app_initializeapr_pool_create_exapr_pool_abort_setapr_file_open_stderrapr_getopt_initapr_getoptstrchrapr_file_copystrtolapr_statapr_sha1_base64apr_pstrcatapr_temp_dir_getapr_file_mktempapr_file_gets__strcpy_chk__ctype_b_locstrcspnapr_password_validatecryptapr_cpystrnapr_bcrypt_encodeapr_md5_encodelibselinux.so.1libaprutil-1.so.0libexpat.so.1libdb-5.3.solibapr-1.so.0libcrypt.so.2libc.so.6XCRYPT_2.0GLIBC_2.34GLIBC_2.4GLIBC_2.3.4GLIBC_2.3GLIBC_2.2.5/opt/cpanel/ea-apr16/lib64 `] ii )ti 3ii ?ui Ik6k6kkooooo.pnxnnnnnnn n n n n nnnnnnoooo o(o0o8o@oHoPo Xo!`o"ho#po$xo%o&o'o(o)o*o+o,o-o/o0o1HHOHtH5:N%;Nhhhhhhhhqhah Qh Ah 1h !h hhhhhhhhhhqhahQhAh1h!hhhh h!h"h#h$h%h&h'qh(ah)Qh*Ah+1h,!%eKD%]KD%UKD%MKD%EKD%=KD%5KD%-KD%%KD%KD%KD% KD%KD%JD%JD%JD%JD%JD%JD%JD%JD%JD%JD%JD%JD%JD%JD%JD%JD%}JD%uJD%mJD%eJD%]JD%UJD%MJD%EJD%=JD%5JD%-JD%%JD%JD%JD% JD%JD{f.AW1AVAUATUSHhfo&|$x$1ɃA=~ C ؃D$tHD$`DxD$D)D9 HD$Mc݃J4HHt$,HD$HD$N<N4LH=V LL:HI}HK $ r|$H=xG|$[ H5H"1H=JGH$H=>GLH5$"1HL$PHt$H$Y H=FH$XdH+%( Hh1[]A\A]A^A_H=Ht$ LAMcHD$DŽ$[Ht$ H$:H$cDŽ$SDŽ$CDŽ$3DŽ$#DŽ$DŽ$H=E1H5kDŽ$;DŽ$DŽ$HD$N|8LH= LLH$HL$PHt$L$L$|$H|$PHt$,  D$ L$P$HDŽ$L$#H$w$L$H HcH>H Ht$H|$P HD$0HL$H5HLH5F11LcH$LLI1LHLa@H=>H51nfDH=y>H5=1H$H=T>:H|$pAGH$HAHD$x#H|$X|$|$H==LH5191BHD$H H==H5YHL$xH1 L1Ht$  UD$ H|$pAtHDŽ$HDŽ$HD$0H=2=H5DD$HL$xH1o|$vH==1H5N)H|$pH$H5-1^AHD$xcH AHD$xqH$H5$H5L1H@HD$0HL$H5HH=Y<1H=A<H55dE9]wPXH5 1HH=9pvfDHIdH%(HD$1HH$4A1EuH<$qHT$dH+%(uHfwATAUH-cSfDLH9~Hc)HLct)8ff.AUIATIUHSHHHdH%(HD$81HvH|$HtHD$ umAH4+111L7wT<H ЉH?ASH9uHD$8dH+%(u0HHD[]A\A]HT$ H5 L1AI$WUHHdH%(HD$1HtHHD$uHD$dH+%(uH]H=6HT$H51;H9fAUATSHH dH%(H$G0HD$Ll$Ld$LLH=VH;LLLD$HC H=HD$Lk LL@Aą5H$dH+%(IH D[A\A]fDLl$HT$LH= AąH;1AH558HCfH3H|$SAąLl$H|$HL=~uH$H=tDHt!| uDHt| uDH|$H;L[HC fH;LEHC @H A HCfHELAHC1LHH01^HHUsage: htpasswd [-cimB25dpsDv] [-C cost] [-r rounds] passwordfile username htpasswd -b[cmB25dpsDv] [-C cost] [-r rounds] passwordfile username password htpasswd -n[imB25dps] [-C cost] [-r rounds] username htpasswd -nb[mB25dps] [-C cost] [-r rounds] username password -c Create a new file. -n Don't update file; display results on stdout. -b Use the password from the command line rather than prompting for it. -i Read password from stdin without verification (for script usage). -m Force MD5 hashing of the password (default). -2 Force SHA-256 hashing of the password (secure). -5 Force SHA-512 hashing of the password (secure). -B Force bcrypt hashing of the password (very secure). -C Set the computing time used for the bcrypt algorithm (higher is more secure but slower, default: %d, valid: 4 to 17). -r Set the number of rounds used for the SHA-256, SHA-512 algorithms (higher is more secure but slower, default: 5000). -d Force CRYPT hashing of the password (8 chars max, insecure). -s Force SHA-1 hashing of the password (insecure). -p Do not hash the password (plaintext, insecure). -D Delete the specified user. -v Verify password for the specified user. On other systems than Windows and NetWare the '-p' flag will probably not work. The SHA-1 algorithm does not use a salt and is less secure than the MD5 algorithm. Unable to generate random bytes: %pmWarning: storing passwords as plain text might just not work on this platform. argument to -C/-r must be a positive integerparse_common_options(): BUG: invalid option %c%s: only one of -c -n -v -D may be specified %s: username contains illegal character '%c' %s: cannot open file %s for read/write access %s: cannot open file %s for read access %s: cannot modify file %s; use '-c' to create it Warning: Ignoring -C/-r argument for this algorithm. could not encode password: %pmWarning: Password truncated to 8 characters by CRYPT algorithm. Unable to encode with bcrypt: %pmmkhash(): BUG: invalid algorithm %d%s: could not determine temp dir %s: unable to create temporary file %s %s: The file %s does not appear to be a valid htpasswd file. Could not verify password: %pmPassword for user %s correct. Error: out of memory Error writing temp file: %pmUnable to read from stdin.Enter password: New password: Re-type new password: password verification errorpassword too long (>%lu)%s: %s cnmspdBbDi25C:r:v%s: filename too long %s: username too long (> %d) %s: password too long (> %d) %s: cannot create file %s crypt() failed: %pm$%c$rounds=%d$%s$%c$%sresultant record too long%s/%s%s: unable to read file %s Deleting Empty hash for user %s password verification failedUpdating User %s not found Adding password for user %s %s: unable to update file %s :u@ @.m//./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyzhtpasswd.tmp.XXX;t @ T0 4ppXzRx x&D$4FJ w?:*3$"\Ht*AAR$^D T A h dbFGH  8BED D(Gp (D ABBA 8