ELF>"@Z@8 @@@@hh>> KK K D` KK K  DDStd PtdD;D;D;QtdRtdKK K @@/lib64/ld-linux-x86-64.so.2GNUGNUGNUc6ed)JJ2@ 24|CEqXf{- o)!. < ">0ihtcA P .P 5P libselinux.so.1_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTablelibaprutil-1.so.0apr_file_read_fullapr_cpystrnapr_pool_create_exapr_file_closeapr_pstrdupapr_psprintfapr_file_openapr_pstrcatapr_generate_random_bytesapr_sha1_base64apr_password_validateapr_bcrypt_encodeapr_md5_encodelibexpat.so.1libdb-5.3.solibapr-1.so.0apr_file_putsapr_file_printfapr_file_mktempapr_app_initializeapr_file_copyapr_getopt_initapr_pool_abort_setapr_password_getapr_statapr_file_getsapr_temp_dir_getapr_getoptapr_file_open_stdinapr_terminateapr_file_open_stderrlibpthread.so.0write__errno_locationlibdl.so.2libcrypt.so.1cryptlibc.so.6__stack_chk_failabortstrtolstrlenmemsetstrcspn__ctype_b_locstrchr__strcpy_chk__cxa_finalizestrcmp__libc_start_main__cxa_atexit_edata__bss_start_endGLIBC_2.2.5XCRYPT_2.0GLIBC_2.4GLIBC_2.3.4GLIBC_2.3/opt/cpanel/ea-apr16/lib64S ui F `]Rii ]ti gii sui FK #K P#K K O O O O O pN xN N N N N N N  N  N  N  N  N N N N N N O O O O  O (O 0O 8O @O HO  PO !XO "`O #hO $pO %xO &O 'O (O )O *O +O ,O -O .O /O 0O 1HH= HtH5J< %K< hhhhhhhhqhah Qh Ah 1h !h hhhhhhhhhhqhahQhAh1h!hhhh h!h"h#h$h%h&h'qh(ah)Qh*Ah+1h,!%u9 D%m9 D%e9 D%]9 D%U9 D%M9 D%E9 D%=9 D%59 D%-9 D%%9 D%9 D%9 D% 9 D%9 D%8 D%8 D%8 D%8 D%8 D%8 D%8 D%8 D%8 D%8 D%8 D%8 D%8 D%8 D%8 D%8 D%}8 D%u8 D%m8 D%e8 D%]8 D%U8 D%M8 D%E8 D%=8 D%58 D%-8 D%%8 D%8 D%8 D{f.AW1AVAUATUSHXfo|$fHT$ H5 H=#$ H5 _HH= $ H5 1CfSHdH%(HD$1FfC(1HL$dH3 %( H[fDC(1DC(1DC(1D HH$:HC,1fDC01rfC(1bfC01RfC(1BfC(H=" H5 11H=" @1H5! H HCnf.@AWIAVIAUAATL% UH- SL)HHt1LLDAHH9uH[]A\A]A^A_ff.f.H 1~HHUsage: htpasswd [-cimB25dpsDv] [-C cost] [-r rounds] passwordfile username htpasswd -b[cmB25dpsDv] [-C cost] [-r rounds] passwordfile username password htpasswd -n[imB25dps] [-C cost] [-r rounds] username htpasswd -nb[mB25dps] [-C cost] [-r rounds] username password -c Create a new file. -n Don't update file; display results on stdout. -b Use the password from the command line rather than prompting for it. -i Read password from stdin without verification (for script usage). -m Force MD5 hashing of the password (default). -2 Force SHA-256 hashing of the password (secure). -5 Force SHA-512 hashing of the password (secure). -B Force bcrypt hashing of the password (very secure). -C Set the computing time used for the bcrypt algorithm (higher is more secure but slower, default: %d, valid: 4 to 17). -r Set the number of rounds used for the SHA-256, SHA-512 algorithms (higher is more secure but slower, default: 5000). -d Force CRYPT hashing of the password (8 chars max, insecure). -s Force SHA-1 hashing of the password (insecure). -p Do not hash the password (plaintext, insecure). -D Delete the specified user. -v Verify password for the specified user. On other systems than Windows and NetWare the '-p' flag will probably not work. The SHA-1 algorithm does not use a salt and is less secure than the MD5 algorithm. %s: only one of -c -n -v -D may be specified %s: username contains illegal character '%c' %s: cannot open file %s for read/write access %s: cannot open file %s for read access %s: cannot modify file %s; use '-c' to create it %s: could not determine temp dir %s: unable to create temporary file %s %s: The file %s does not appear to be a valid htpasswd file. Could not verify password: %pmPassword for user %s correct. %s: %s cnmspdBbDi25C:r:v%s: filename too long %s: username too long (> %d) %s: password too long (> %d) %s: cannot create file %s :resultant record too long%s/%s%s: unable to read file %s Deleting Empty hash for user %s password verification failedUpdating User %s not found Adding password for user %s %s: unable to update file %s htpasswd.tmp.XXXUnable to generate random bytes: %pmWarning: Ignoring -C/-r argument for this algorithm. could not encode password: %pmWarning: Password truncated to 8 characters by CRYPT algorithm. Unable to encode with bcrypt: %pmmkhash(): BUG: invalid algorithm %dWarning: storing passwords as plain text might just not work on this platform. argument to -C/-r must be a positive integerparse_common_options(): BUG: invalid option %cError: out of memory Error writing temp file: %pmUnable to read from stdin.Enter password: New password: Re-type new password: password verification errorpassword too long (>%lu)crypt() failed: %pm$%c$rounds=%d$%s$%c$%s ``$4DTd./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz;| Pl\ <L4Xl<TzRx /D$4FJ w?:*3$"\tP*AARd\D R A  P4 FDB B(A0A8GM 8A0A(B BBBA 8PBED D(Gp (A ABBH PbFGH zRx  $T {EG | AA 0lFAA J  AABE @HFBB A(A0G` 0A(A BBBI @rED _ AG DdpeFEE E(H0H8G@n8A0A(B BBB#P#K V=KXSz}  D.K K o0X`  XN 8   oo` oo oK 0@P`p 0@P`p 0@P`pGA$3a1" GA$3p1113%.GA*GA$annobin gcc 8.5.0 20210514GA$plugin name: gcc-annobinGA$running gcc 8.5.0 20210514GA*GA! GA*FORTIFYGA+GLIBCXX_ASSERTIONSGA*cf_protectionGA+omit_frame_pointerGA+stack_clashGA!stack_realignGA*9$ GA*GOW*GA$3a1"Q. GA$3p1113@$B.GA*GA$annobin gcc 8.5.0 20210514GA$plugin name: gcc-annobinGA$running gcc 8.5.0 20210514GA*GA! GA*FORTIFYGA+GLIBCXX_ASSERTIONSGA*cf_protectionGA+omit_frame_pointerGA+stack_clashGA!stack_realignGA*@$- GA*GOW*GA*-%. GA*GOW*GA*0.B. GA*GOW* GA*FORTIFY#9$GA+GLIBCXX_ASSERTIONS GA*FORTIFY@$%.GA+GLIBCXX_ASSERTIONShtpasswd-2.4.63-1.el8.cloudlinux.x86_64.debugV7zXZִF!t/']?Eh=ڊ2N瑮 ު^f!"ޭ_0buVFsisxBN@&(ID;AE2o.~ͷżj#kl-’گl5X3 B(+igFI, $ y-PDQm03ɳUzUomQ- Jτ(}D3oF'նN@ܧTmøhxhKMvsf: