亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? dbmmanage.pl

?? Apache_2.0.59-Openssl_0.9 配置tomcat. Apache_2.0.59-Openssl_0.9 配置tomcat.
?? PL
字號(hào):
#
# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements.  See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License.  You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

#for more functionality see the HTTPD::UserAdmin module:
# http://www.perl.com/CPAN/modules/by-module/HTTPD/HTTPD-Tools-x.xx.tar.gz
#
# usage: dbmmanage <DBMfile> <command> <user> <password> <groups> <comment>

package dbmmanage;
#                               -ldb    -lndbm    -lgdbm    -lsdbm
BEGIN { @AnyDBM_File::ISA = qw(SDBM_File) }
use strict;
use Fcntl;
use AnyDBM_File ();

sub usage {
    my $cmds = join "|", sort keys %dbmc::;
    die <<SYNTAX;
Usage: dbmmanage [enc] dbname command [username [pw [group[,group] [comment]]]]

    where enc is  -d for crypt encryption (default except on Win32, Netware)
                  -m for MD5 encryption (default on Win32, Netware)
                  -s for SHA1 encryption
                  -p for plaintext

    command is one of: $cmds

    pw of . for update command retains the old password
    pw of - (or blank) for update command prompts for the password

    groups or comment of . (or blank) for update command retains old values
    groups or comment of - for update command clears the existing value
    groups or comment of - for add and adduser commands is the empty value
SYNTAX
}

sub need_sha1_crypt {
    if (!eval ('require "Digest/SHA1.pm";')) {
        print STDERR <<SHAERR;
dbmmanage SHA1 passwords require the interface or the module Digest::SHA1
available from CPAN:
 
    http://www.cpan.org/modules/by-module/Digest/Digest-MD5-2.12.tar.gz
 
Please install Digest::SHA1 and try again, or use a different crypt option:

SHAERR
        usage();
    }
}

sub need_md5_crypt {
    if (!eval ('require "Crypt/PasswdMD5.pm";')) {
        print STDERR <<MD5ERR;
dbmmanage MD5 passwords require the module Crypt::PasswdMD5 available from CPAN
 
    http://www.cpan.org/modules/by-module/Crypt/Crypt-PasswdMD5-1.1.tar.gz
 
Please install Crypt::PasswdMD5 and try again, or use a different crypt option:

MD5ERR
        usage();
    }
}

# if your osname is in $newstyle_salt, then use new style salt (starts with '_' and contains
# four bytes of iteration count and four bytes of salt).  Otherwise, just use
# the traditional two-byte salt.
# see the man page on your system to decide if you have a newer crypt() lib.
# I believe that 4.4BSD derived systems do (at least BSD/OS 2.0 does).
# The new style crypt() allows up to 20 characters of the password to be
# significant rather than only 8.
#
my $newstyle_salt_platforms = join '|', qw{bsdos}; #others?
my $newstyle_salt = $^O =~ /(?:$newstyle_salt_platforms)/;

# Some platforms just can't crypt() for Apache
#
my $crypt_not_supported_platforms = join '|', qw{MSWin32 NetWare}; #others?
my $crypt_not_supported = $^O =~ /(?:$crypt_not_supported_platforms)/;

my $crypt_method = "crypt";

if ($crypt_not_supported) {
    $crypt_method = "md5";
}

# Some platforms won't jump through our favorite hoops
#
my $not_unix_platforms = join '|', qw{MSWin32 NetWare}; #others?
my $not_unix = $^O =~ /(?:$not_unix_platforms)/;

if ($crypt_not_supported) {
    $crypt_method = "md5";
}

if (@ARGV[0] eq "-d") {
    shift @ARGV;
    if ($crypt_not_supported) {
        print STDERR 
              "Warning: Apache/$^O does not support crypt()ed passwords!\n\n";
    }
    $crypt_method = "crypt";
}

if (@ARGV[0] eq "-m") {
    shift @ARGV;
    $crypt_method = "md5";
}

if (@ARGV[0] eq "-p") {
    shift @ARGV;
    if (!$crypt_not_supported) {
        print STDERR 
              "Warning: Apache/$^O does not support plaintext passwords!\n\n";
    }
    $crypt_method = "plain";
}

if (@ARGV[0] eq "-s") {
    shift @ARGV;
    need_sha1_crypt();
    $crypt_method = "sha1";
}

if ($crypt_method eq "md5") {
    need_md5_crypt();
}

my($file,$command,$key,$crypted_pwd,$groups,$comment) = @ARGV;

usage() unless $file and $command and defined &{$dbmc::{$command}};

# remove extension if any
my $chop = join '|', qw{db.? pag dir};
$file =~ s/\.($chop)$//;

my $is_update = $command eq "update";
my %DB = ();
my @range = ();
my($mode, $flags) = $command =~ 
    /^(?:view|check)$/ ? (0644, O_RDONLY) : (0644, O_RDWR|O_CREAT);

tie (%DB, "AnyDBM_File", $file, $flags, $mode) || die "Can't tie $file: $!";
dbmc->$command();
untie %DB;


my $x;
sub genseed {
    my $psf;
    if ($not_unix) {
	srand (time ^ $$ or time ^ ($$ + ($$ << 15)));
    }
    else {
        for (qw(-xlwwa -le)) { 
	    `ps $_ 2>/dev/null`;
            $psf = $_, last unless $?;
        }
        srand (time ^ $$ ^ unpack("%L*", `ps $psf | gzip -f`));
    }
    @range = (qw(. /), '0'..'9','a'..'z','A'..'Z');
    $x = int scalar @range;
}

sub randchar { 
    join '', map $range[rand $x], 1..shift||1;
}

sub saltpw_crypt {
    genseed() unless @range; 
    return $newstyle_salt ? 
	join '', "_", randchar, "a..", randchar(4) :
        randchar(2);
}

sub cryptpw_crypt {
    my ($pw, $salt) = @_;
    $salt = saltpw_crypt unless $salt;
    crypt $pw, $salt;
}

sub saltpw_md5 {
    genseed() unless @range; 
    randchar(8);
}

sub cryptpw_md5 {
    my($pw, $salt) = @_;
    $salt = saltpw_md5 unless $salt;
    Crypt::PasswdMD5::apache_md5_crypt($pw, $salt);
}

sub cryptpw_sha1 {
    my($pw, $salt) = @_;
    '{SHA}' . Digest::SHA1::sha1_base64($pw) . "=";
}

sub cryptpw {
    if ($crypt_method eq "md5") {
        return cryptpw_md5(@_);
    } elsif ($crypt_method eq "sha1") {
        return cryptpw_sha1(@_);
    } elsif ($crypt_method eq "crypt") {
        return cryptpw_crypt(@_);
    }
    @_[0]; # otherwise return plaintext
}

sub getpass {
    my $prompt = shift || "Enter password:";

    unless($not_unix) { 
	open STDIN, "/dev/tty" or warn "couldn't open /dev/tty $!\n";
	system "stty -echo;";
    }

    my($c,$pwd);
    print STDERR $prompt;
    while (($c = getc(STDIN)) ne '' and $c ne "\n" and $c ne "\r") {
	$pwd .= $c;
    }

    system "stty echo" unless $not_unix;
    print STDERR "\n";
    die "Can't use empty password!\n" unless length $pwd;
    return $pwd;
}

sub dbmc::update {
    die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key};
    $crypted_pwd = (split /:/, $DB{$key}, 3)[0] if $crypted_pwd eq '.';
    $groups = (split /:/, $DB{$key}, 3)[1] if !$groups || $groups eq '.';
    $comment = (split /:/, $DB{$key}, 3)[2] if !$comment || $comment eq '.';
    if (!$crypted_pwd || $crypted_pwd eq '-') {
        dbmc->adduser;
    }
    else {
        dbmc->add;
    }
}

sub dbmc::add {
    die "Can't use empty password!\n" unless $crypted_pwd;
    unless($is_update) {
	die "Sorry, user `$key' already exists!\n" if $DB{$key};
    }
    $groups = '' if $groups eq '-';
    $comment = '' if $comment eq '-';
    $groups .= ":" . $comment if $comment;
    $crypted_pwd .= ":" . $groups if $groups;
    $DB{$key} = $crypted_pwd;
    my $action = $is_update ? "updated" : "added";
    print "User $key $action with password encrypted to $DB{$key} using $crypt_method\n";
}

sub dbmc::adduser {
    my $value = getpass "New password:";
    die "They don't match, sorry.\n" unless getpass("Re-type new password:") eq $value;
    $crypted_pwd = cryptpw $value;
    dbmc->add;
}

sub dbmc::delete {
    die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key};
    delete $DB{$key}, print "`$key' deleted\n";
}

sub dbmc::view {
    print $key ? "$key:$DB{$key}\n" : map { "$_:$DB{$_}\n" if $DB{$_} } keys %DB;
}

sub dbmc::check {
    die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key};
    my $chkpass = (split /:/, $DB{$key}, 3)[0];
    my $testpass = getpass();
    if (substr($chkpass, 0, 6) eq '$apr1$') {
        need_md5_crypt;
        $crypt_method = "md5";
    } elsif (substr($chkpass, 0, 5) eq '{SHA}') {
        need_sha1_crypt;
        $crypt_method = "sha1";
    } elsif (length($chkpass) == 13 && $chkpass ne $testpass) {
        $crypt_method = "crypt";
    } else {
        $crypt_method = "plain";
    }
    print $crypt_method . (cryptpw($testpass, $chkpass) eq $chkpass 
                           ? " password ok\n" : " password mismatch\n");
}

sub dbmc::import {
    while(defined($_ = <STDIN>) and chomp) {
	($key,$crypted_pwd,$groups,$comment) = split /:/, $_, 4;
	dbmc->add;
    }
}

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
麻豆国产精品视频| 日韩国产在线观看一区| 成人av在线观| 国产精品色在线观看| 99久精品国产| 亚洲午夜视频在线| 91精品一区二区三区久久久久久| 午夜久久久久久久久 | 国产一区二区三区黄视频 | 国产激情91久久精品导航| 久久久亚洲欧洲日产国码αv| 风间由美性色一区二区三区| 最近日韩中文字幕| 欧美日韩国产中文| 国产乱码精品一品二品| 中文字幕一区二| 欧美人妇做爰xxxⅹ性高电影 | 不卡av在线免费观看| 亚洲男同性视频| 在线观看91精品国产麻豆| 激情综合色综合久久| 国产欧美精品一区二区三区四区| 97久久超碰精品国产| 日产精品久久久久久久性色| 久久蜜桃一区二区| 在线精品视频一区二区三四| 蜜臀av性久久久久蜜臀aⅴ四虎| 国产午夜精品久久久久久免费视| 欧美亚洲尤物久久| 国产一区视频导航| 亚洲激情中文1区| 2020国产精品自拍| 在线免费观看日韩欧美| 国产一区二区影院| 亚洲国产精品自拍| 国产偷国产偷精品高清尤物| 欧美天堂一区二区三区| 国产精品一区二区在线播放| 亚洲国产成人高清精品| 久久精品亚洲精品国产欧美 | 成人三级伦理片| 日韩av中文在线观看| 亚洲欧美日韩久久精品| 精品国产免费久久| 欧美视频在线观看一区| www.欧美色图| 久久国产乱子精品免费女| 亚洲黄色尤物视频| 中文字幕欧美激情| 日韩午夜在线观看| 色女孩综合影院| 国产精品一区不卡| 久久成人羞羞网站| 亚洲不卡在线观看| 亚洲乱码国产乱码精品精98午夜| 国产亚洲综合色| 精品少妇一区二区三区| 欧美日韩精品欧美日韩精品| 99国产精品久| 国产精品99久| 国产曰批免费观看久久久| 日本欧美一区二区三区乱码| 亚洲精品中文字幕乱码三区| 国产精品视频线看| 国产欧美一区二区精品性色 | 欧美片网站yy| 欧美综合一区二区三区| 色综合久久六月婷婷中文字幕| 国产成人av自拍| 国产一区二区女| 国产一区二区三区在线观看免费视频| 免费观看日韩av| 热久久免费视频| 日韩国产一二三区| 热久久国产精品| 久久99久久精品| 久久国产成人午夜av影院| 欧美aaaaaa午夜精品| 青娱乐精品视频| 日韩成人免费看| 日本不卡一区二区| 美女在线视频一区| 韩国一区二区视频| 国产精品456| 成人av先锋影音| eeuss鲁一区二区三区| 成人av中文字幕| 97se狠狠狠综合亚洲狠狠| 91浏览器在线视频| 在线观看视频一区二区 | 国产999精品久久久久久绿帽| 国产激情一区二区三区四区 | 91成人网在线| 欧美日韩精品一二三区| 日韩欧美精品三级| 久久久亚洲欧洲日产国码αv| 国产欧美中文在线| 亚洲精选视频在线| 日韩精品欧美精品| 久草精品在线观看| 成人晚上爱看视频| 色菇凉天天综合网| 欧美一区二区三区在线电影 | 成人久久18免费网站麻豆| 99国产精品久久久久久久久久久 | 亚洲成av人片| 国产一区视频网站| av成人免费在线观看| 在线观看精品一区| 日韩午夜激情免费电影| 欧美韩日一区二区三区| 亚洲伦理在线精品| 精品在线观看视频| www.成人网.com| 91精品国产综合久久精品图片| 久久色中文字幕| 亚洲女厕所小便bbb| 麻豆精品国产91久久久久久| 成人午夜在线视频| 欧美日韩国产成人在线免费| 久久精品人人爽人人爽| 亚洲一区二区四区蜜桃| 国模一区二区三区白浆| 欧美性受极品xxxx喷水| 久久久久青草大香线综合精品| 亚洲精品视频免费观看| 狠狠色丁香九九婷婷综合五月| 91免费视频观看| 欧美xxxx老人做受| 亚洲一区二区三区在线播放| 国产成人精品免费看| 欧美日本一区二区在线观看| 国产精品理论在线观看| 看电视剧不卡顿的网站| 在线视频中文字幕一区二区| 国产片一区二区三区| 日本不卡视频在线| 在线亚洲人成电影网站色www| 久久久久久免费| 男女男精品视频网| 欧美亚洲综合网| 国产精品久久久久7777按摩| 紧缚捆绑精品一区二区| 欧美视频一区二区在线观看| 日韩一区欧美一区| 高清在线成人网| 欧美va亚洲va| 日韩国产成人精品| 日本精品一区二区三区高清| 国产精品萝li| 国产麻豆精品在线| 精品国产人成亚洲区| 蜜桃视频一区二区三区在线观看| 色噜噜狠狠色综合中国| 中文字幕一区二区在线观看| 国产a级毛片一区| 久久久久久久网| 乱一区二区av| 精品日韩一区二区三区| 日本亚洲免费观看| 欧美高清hd18日本| 午夜精品福利一区二区三区av| 91在线免费看| 日韩伦理电影网| 99国产欧美另类久久久精品 | 亚洲综合一二三区| 91麻豆国产福利精品| 国产精品成人在线观看| 成人免费精品视频| 亚洲国产成人一区二区三区| 成人理论电影网| 中文字幕在线观看不卡视频| 成人国产在线观看| 综合久久久久久久| 欧美性一二三区| 日本最新不卡在线| 欧美成人伊人久久综合网| 看电影不卡的网站| 国产亚洲欧美日韩日本| 成人18视频在线播放| 中文字幕在线观看一区二区| 一本色道综合亚洲| 午夜电影网亚洲视频| 日韩亚洲电影在线| 精品写真视频在线观看| 久久久久青草大香线综合精品| 国产凹凸在线观看一区二区| 亚洲同性gay激情无套| 欧美日韩中文字幕一区二区| 日韩va亚洲va欧美va久久| 久久综合九色综合欧美98| av一区二区三区四区| 国产精品第13页| 欧美精品在线观看一区二区| 麻豆久久久久久| 国产精品国产自产拍高清av王其| 色综合一个色综合| 日韩av不卡在线观看| 国产拍欧美日韩视频二区| 在线中文字幕不卡|