ELF>.@a@8@@@@pp YY@@@\\\`\\\  PPP ppp$$OOO StdPPP Ptd$M$M$MttQtdRtd\\\GNUGNU\| 3h.́?/lib64/ld-linux-x86-64.so.2779(em9: &0<Ht ^cO Z i@x1{#~N l ] `"V@`apr_file_read_full_ITM_deregisterTMCloneTableapr_cpystrnapr_pool_create_exapr_palloc__gmon_start__apr_file_closeapr_pstrdupapr_psprintfapr_pstrcatapr_pstrndup_ITM_registerTMCloneTableapr_generate_random_bytesapr_sha1_base64apr_dbm_nextkeyapr_dbm_existsapr_password_validateapr_dbm_fetchapr_dbm_deleteapr_dbm_closeapr_dbm_open_exapr_dbm_storeapr_bcrypt_encodeapr_dbm_firstkeyapr_md5_encodeapr_file_putsapr_signalapr_file_printfapr_app_initializeapr_strerrorapr_getopt_initapr_pool_abort_setapr_password_getapr_getoptapr_file_open_stdinapr_terminateapr_file_open_stderrcrypt__stack_chk_failstrlen__isoc23_strtolstdout__fprintf_chk__libc_start_mainmemchr__cxa_finalizestrchrmemsetfputcfwritestrcmp__errno_locationabort__cxa_atexitlibaprutil-1.so.0libapr-1.so.0libcrypt.so.1libc.so.6XCRYPT_2.0GLIBC_2.3.4GLIBC_2.38GLIBC_2.4GLIBC_2.2.5GLIBC_2.34. `]F<ti Q]ii hui r~\/\P/``____0_8 `7@`9H^P^X^`^h^p^x^ ^ ^ ^ ^ ^^^^^^^^^^^^____ _(_ 0_!8_"@_#H_$P_%X_&`_'h_(p_)x_*_+_,_-_._/_1_2_3_4_5_6HH?HtH5>%>@%>h% >h%>h%=h%=h%=h%=h%=hp%=h`%=h P%=h @%=h 0%=h %=h %=h%=h%=h%=h%=h%z=h%r=h%j=h%b=h%Z=hp%R=h`%J=hP%B=h@%:=h0%2=h %*=h%"=h%=h%=h % =h!%=h"%<h#%<h$%<h%%<h&%<h'p%<h(`%<h)P%<h*@%<h+0%<h, %<h-%<h.%<h/%<h0%<h1%<ff.AW1AVAUATUSHx|$H|$Ht$Ht$dH%(H$h1H= b111H|$(Ht$(H= Ht$(H=M<H5 H|$(h0HxHHHHH@`HH)hHHB0H|$0HBXHt$(H;HL$HrT$ $ALl$8Ld$'D$ H-H:&D$D$D$fH|$0LLH-Mt$'F<$wHcH>@H1;HT$8Hxt$H;HH=:HH1<$?H:$@d^fDD$ AGD$A$(H:D$AD$@d$fHY:@`DL=A:Ht$8IIGXf.D$$@L-:A}8u E1ADL$HT$0Hcj=~D$)D9DD$E&|$A}8t$]L$ +$hHl$`IE I}Im Å)I}H|$H49IE(<$u4|$ LC(HKHH=9H1H8H;HtcHH$hdH+%(Hx1[]A\A]A^A_I}Hl$@HIM@H=8ÅHD!1H=a81H HH|$@Ld$P@H|$@I}Ht$@LHT$HH=8LD$@L$H1HL|$XLt$P:LLHt'HK >H=7HQI)1:H57 I}H}EH n7H= #HD$HcH|$(H4IEPL-B7I}L--7ÅH= 7IM1HNHT$HcH|$(H4xIEHL-6I]HHHhH@;:HHGHD$I}]H4H={6IE@`LOHW@HwXd AGAL-=6EuIM@H\$`1H= 6HHDHپ1H=5H4r(I}HIlI}LHItI}HL$PLL^XI}HT$XHt$P:HHcI}H0H)HHHI}(HE5H=.5HKH 1H|$H5RI}HII}LHII}LLsH41҃|$HSH{dHD$]HcH|$(H4IE(L-~4LKPHH1H[4f{d"L$H74H= 4HKHH=1_H4H=3HKH1Hz0H1]|$H3{dH{HHIDH|$0 L+vD$ ŅLl$1E11LH5BLL$ ff.ff.wB|0I H?<>@zL9u΃{(D$ 6u5K,H;H5 L1HLHHHCH{HPRLHfH=+H51Lc Mff.HXŅu~Lc fLl$L.D$ s,u C,LKLCLLD$ ŅqLH1L4HD$XdH+%(H`[]A\A]A^ÐH+H|$0HT$ H5D$ HrLl$1E11LH5]H|$ff.ff.ff.ff.ff.wFD 0IAD AHA?FDBH9uHKHSLLD$!D$ ŅH;HT$ 1 H5eLHCH@L1HSLHLHHSH{LLXHrH|$0L+>D$ ŅLl$1E11LH5 H|$ff.ff.ff.@wFD 0IAD AHA?FDBH9uLLD$HHsH{HVH1LHL)HCH;HT$ H515LHCHH5 M1H;H;HT$ H5 D$ 1LHCHfDHT$ H5Lk@H;HT$ H5yH='H5!t H='H5w1X^ff.SHdH%(HD$F@ HH$:HC,f.1HT$dH+%(H[@C(C0C(C(H=&H51dfC(C0t@C(d@C(T@C(DH=U&@1H5&fDHyHC fDH%12HHhtdbm Interrupted ! updatedcreatedmodifieddefaultError: %s cnmspdBbtivxlC:T:Error opening database %s Invalid username length Empty database -- %s Username %-32s Comment Failed getting data from %s %-32.*s %.*sFailed getting NextKey Total #records : %d Database %s %s. %s:%s:%s Error: out of memory Error writing temp file: %pmUnable to read from stdin.Enter password: New password: Re-type new password: password verification errorpassword too long (>%lu)crypt() failed: %pm$%c$rounds=%d$%s$%c$%shtdbm -- program for manipulating DBM password databases. Usage: htdbm [-cimBdpstvx] [-C cost] [-TDBTYPE] database username -b[cmBdptsv] [-C cost] [-TDBTYPE] database username password -n[imBdpst] [-C cost] username -nb[mBdpst] [-C cost] username password -v[imBdps] [-C cost] [-TDBTYPE] database username -vb[mBdps] [-C cost] [-TDBTYPE] database username password -x [-TDBTYPE] database username -l [-TDBTYPE] database Options: -c Create a new database. -n Don't update database; display results on stdout. -b Use the password from the command line rather than prompting for it. -i Read password from stdin without verification (for script usage). -m Force MD5 hashing of the password (default). -B Force BCRYPT hashing of the password (very secure). -C Set the computing time used for the bcrypt algorithm (higher is more secure but slower, default: %d, valid: 4 to 31). -d Force CRYPT hashing of the password (8 chars max, insecure). -s Force SHA hashing of the password (insecure). -p Do not hash the password (plaintext, insecure). -T DBM Type (SDBM|GDBM|DB|default). -l Display usernames from database on stdout. -v Verify the username/password. -x Remove the username record from database. -t The last param is username comment. The SHA algorithm does not use a salt and is less secure than the MD5 algorithm. Username contains invalid characters The user '%s' could not be found in database Password mismatch for user '%s' Password validated for user '%s' Cannot find user '%s' in database Dumping records from database -- %s Warning: Ignoring -C/-r argument for this algorithm. Unable to generate random bytes: %pmcould not encode password: %pmWarning: Password truncated to 8 characters by CRYPT algorithm. Unable to encode with bcrypt: %pmmkhash(): BUG: invalid algorithm %dWarning: storing passwords as plain text might just not work on this platform. argument to -C/-r must be a positive integerparse_common_options(): BUG: invalid option %ch0$@@4@@@@@@@@@@@@T@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@T./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz;p ,\l(||LX|zRx "zRx $80FJ w?;*3$"D@\x ptGEP< FDB B(A0A8G 8C0A(B BBBA XaFGH   yED } AA 0<FAA G  AABA DpFBB A(A0D$ 0C(A BBBB LjED  AE GNU/P/ .< P:\\oP   0^  ooP oo o\6 F V f v !!&!6!F!V!f!v!!!!!!!!!""&"6"F"V"f"v"""""""""##&#6#F#`/usr/lib/debug/.dwz/x86_64-linux-gnu/apache2-utils.debug\ 0v{1t.B!ͦd5db5c117cbcace90dfde1d11433682ecc813f.debug 9.shstrtab.note.gnu.property.note.gnu.build-id.interp.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.text.fini.rodata.eh_frame_hdr.eh_frame.note.ABI-tag.init_array.fini_array.dynamic.data.bss.gnu_debugaltlink.gnu_debuglink PP pp$19o0C pKP P So t`oP P o yB ~ 0P#P###@P:P: @@! $M$MtMM OO \\\\\\ 0^0^`` ``@ `M ``4`