ELF|414 (444  TTT))0.0>0>D.D>D>hhhDDPtdp'p'p'ddQtdRtd0.0>0>/lib/ld-linux.so.2GNUGNU%>zF@j S*B @)*-1BE|ORtKqXj|'4OBMN>m_"R Z; 5{ _a%p@@@x w@HP* *4  $X __gmon_start___Jv_RegisterClasses_fini_initlibaprutil-1.so.0apr_cpystrnapr_pool_create_exapr_generate_random_bytesapr_file_openapr_psprintfapr_snprintfapr_pstrdupapr_file_closeapr_sha1_base64apr_md5_encodelibapr-1.so.0apr_terminateapr_file_copyapr_password_getapr_strerrorapr_file_printfapr_statapr_temp_dir_getapr_file_mktempapr_file_getsapr_file_open_stderrapr_file_putsapr_app_initializelibcrypt.so.1cryptlibpthread.so.0libc.so.6_IO_stdin_usedsrand__strdupmemset__ctype_b_locstrchr__strcpy_chk__cxa_finalize__strcat_chkstrcmp__libc_start_mainfree__cxa_atexit__stack_chk_fail_edata__bss_start_enderrfileGLIBC_2.0GLIBC_2.3GLIBC_2.1.3GLIBC_2.4GLIBC_2.3.4 ii ii si ii ii ti ???@? ??#H?L?P?T?X?\?`?d?h? l? p? t? x? |??????????????????? ?!?"?$?%?&?'?(?)S[4t[ hhhhh h($h0(h8p,h@`0hHP4hP@8hX0<h` @hhDhpHhxLhPhThXh\h`hdhhhplh`phPth@xh0|h hhhhhhhh h(h0h8pVSp52@D$$ D$$8D$$~HD$$jpD$$VeD$$BD$$.D$$D$$4D$$dD$$D$$D$$D$$XD$$$BUWVS0`E U$DŽ$D$Le$\1D$LDŽ$?htpaDŽ$CsswdDŽ$G.tmpDŽ$K.XXXDŽ$OXXXD$D$$$D$ D$D$$$D$ $T$L}T$<$T$, 1|$8D$4D$@L$0fL$@D$<:-L$0tV-D$8$D$<$D$}D$D$<$T$ %d) %s: password too long (> %d) %s: cannot create file %s New password: password too long (>%u)Re-type new password: password verification errorresultant record too long:%s: %s %s/%s%s: unable to read file %s Updating Deleting Adding User %s not found password for user %s %s: unable to update file %s htpasswd [-cmdpsD] passwordfile username htpasswd -b[cmdpsD] passwordfile username password htpasswd -nb[mdps] username password -n Don't update file; display results on stdout. -m Force MD5 encryption of the password (default). -d Force CRYPT encryption of the password. -p Do not encrypt the password (plaintext). -s Force SHA encryption of the password. -b Use the password from the command line rather than prompting for it. -D Delete the specified user. On other systems than Windows, NetWare and TPF the '-p' flag will probably not work. The SHA algorithm does not use a salt and is less secure than the MD5 algorithm. Unable to generate random bytes: %pm %s: -c and -n options conflict %s: -c and -D options conflict %s: -n and -D options conflict %s: username contains illegal character '%c' Warning: storing passwords as plain text might just not work on this platform. %s: cannot open file %s for read/write access %s: cannot modify file %s; use '-c' to create it Warning: Password truncated to 8 characters by CRYPT algorithm. %s: could not determine temp dir %s: unable to create temporary file %s %s: The file %s does not appear to be a valid htpasswd file. ./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyzB0;` |Pp0@PzR|  |F J tx?;*2$"@NAA N `HYAC@QC pAN0w AA $FGT]t A xANHA,*AB F AAA A 8 HaAA AAN0JAA AA\| px<ANg AA A0 4 X o     & 6 F V f v   & 6 F V f v @P@@htpasswd^4.shstrtab.interp.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rel.dyn.rel.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.ctors.dtors.jcr.dynamic.got.data.bss.gnu_debuglink TThh !$4oD>  FNod[o<<j 8s @ |4 4 .wp p  XX X t t p'p'd''0>0.8>8.@>@.D>D.