ELF>(@q@8 @@@@ M!M!PPPkkk` lll88800hhhDDStd88800Ptd4[4[4[QtdRtdkkk/lib64/ld-linux-x86-64.so.2 GNUGNUg4qcYΛn:)7GNU77emF b+7o*ioj>g vE U}0, !X"_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTable__libc_start_main__cxa_finalizesyscall__stack_chk_failaccessstatstderr__fprintf_chkperrorexitfreestrlenstrncpymalloc__memcpy_chkmemcmpopen__errno_locationioctlclose__printf_chkreallocfwritememchrstrerrorfputsgetoptoptindoptarg__isoc23_strtol__strcpy_chkstdoutfputcstrcmpmemcpyext2fs_sha512tcgetattrstdinfgetstcsetattrputcharstrrchr__sprintf_chk__isoc23_strtoulsetmntentgetmntentendmntentsigactionuuid_unparseuuid_parselibuuid.so.1libext2fs.so.2libc.so.6UUID_1.0GLIBC_2.14GLIBC_2.33GLIBC_2.3.4GLIBC_2.4GLIBC_2.34GLIBC_2.2.5GLIBC_2.38  ' @6 ITti _ii kuui k`)k ) kQ(k6HkRPk:XkxU`kUpk%Rxk4kHWkpWk0Rk1kWkXkJfD%6JfD%.JfD%&JfD%JfD%JfD%JfD%JfD%IfD%IfD%IfD%IfD%IfD%IfD%IfD%IfD%IfDH=,LrH=Y,\rH;J`H=*4JH=*4H; "fUHAWAVIAUAATSHdH%(HE1H8H01$HHL=XD1HEH01H޿1H޿1H޿x1H޿i1H޿Z1H޿ K1H޿<1H޿ -1H޿1H޿1H޿ 1H޿ 1H޿1H޿H1ҿH1ҿH1ҿH1ҿH޿1LMfH=(H{(H(Ht-L uA}IvHS1BHB LH5(1LL 1I^HHPTE11H=Ff.H=YGHRGH9tHFHt H=)GH5"GH)HH?HHHtHFHtfD=Fu+UH=FHt H=FdF]wUHHHXH`HhLpLxt )E)M)U)])e)m)u)}dH%(HH1HEH8HPHPHHLH H@Dž40L@1Dž0QHHdH+%(uxUHAVAUATSHdH%(HE19}cHc)AHHL@L,fDH;unH;Lx_X%=@u-HL9uEtQHEdH+%(u=HĠ[A\A]A^]HDH H%H81H;E1^mff.fUH=0IHHt1HIH E1HH]ff.UH fUHAWAVAUAATISHxdH%(HE1s:H_HI=HHMcgLIHWLHLH.H/HD5DHhEDHH H)HL, DHpL9L9{huH;LLuHEdH+%(Hx[A\A]A^A_]fDA<$/tfA|$:IL1AÃu%U81L1 ÃL1f@LAExfBAfDD;5FDLhAHD5BH)HIMeM}hA)f0HLxoHBLH%"H81fDHpLH>HLH5!1AF HhH4FH)H{HhHEHHeAH=!Hf.A|$x I|$IAt$HAL-T!Hh@u IILCttLHHHL)L)CttHhB0@uMcH=H1H">HH81UHATS~;L%=HӾH=I $|H{I4$U11'HH11 HHH5 1~1UHAWAVL5VAUIATISHdH%(HE1DžD fDptkLLuH<HcH@9M4LHtML1H5^ OHy< 1H8BDtE1L-DCt>LHtHHLL)IHL)iItrC4>LEHHHu@H<H=|H H H=I}H3e@LLPHw;HXHcI4IDLEEL%1ff.UHAWAVAUATSH8dH%(HE1GH^L|HEHEL-39fDkH8HSH5H1L9H;11Aă1HUǾf @1DAEuHH51LuLeDAL1IyM9uH: HH0\L9f1L%-:HӾH=I $I $ H=H{I4$UHATS~QLfH4H=fDC uLH{(H(HuLH51H89H=H4L%HHjf.C uHKL17HS(H(HuH=;1L%8 I4$RI $ H=H{I4$1d@UHAWL=#9AVAUILATLSH HdH%(HE1-LfIL1)@HL)PHA)`IEh)p))) )0H=IuLHA^@HLIAr DH1AAAoHH58Ar DLH1A.A AL@LE1LLLLfofHH)@I9uAAtLfo@LHfoPfo`fopL))))JHfofofo (fo0px h0HEdH+%(H [A\A]A^A_]fHA܋AfHAo܋APH¿1H5LUHAWE1AVL5wAUL-ATISHHdH%(HE1ƅDžLLA#w IcDL>HQ5?H H=HHH3Hxf.^5U5q@F5DH4 1H8<H4L8&*Ht41H82ƅH;H10=4H'4Lߋu#H 4Lc(K<ID9H51H1HHhHH(H3L5@4LHH11I M L]H5=3L571dH@HxHEHpLXIF!LHHH_LxH߾@LsHpL@Mn[HEMIFE$LHھH)H 1HIHuAFM`1H[HFLH4tQHHuH LHH8LH561OHHk\tMf1LLH MLE11LH޿ Utq2RIp;1ndLXHb1DA9t1L18IŃ~?DžHHDž4@t{1AAHHhHH5t81LH5<1111޿1HN1Ҿ11ÅkA}PH5YH&LH51kH5H=#IMtFLIHt6I~H5kuI~YuI~L==60H/H=HpVHHhHh11H=3Hj/H=H H3A}ztnLH5TH1"H5H1A}LH5H=\bH=FrHH%s is not a directory Invalid salt: %s %s has pw salt %s 0123456789abcdefCouldn't allocate salt Couldn't allocate salt list Invalid padding %d Couldn't find salt!?! Excess arguments KEYCTL_JOIN_SESSION_KEYRINGKEYCTL_SESSION_TO_PARENTp:USAGE: %s: %02xhelpUnknown command: %s Available commands: %-20s %s Salt size is %zd; max is %d. May only provide -S once Unrecognized option: %c k:S:p:vqr/etc/mtabext4No salt values available Aborting.Invalid keyring [%s]. ext4:%s%slogonkeyctl_search failed: %s add_keyget_policynew_sessionset_policysets a policy for directoriesEXT4_IOC_GET_ENCRYPTION_PWSALTError [%s] setting policy. The key descriptor [%s] may not match the existing encryption context for directory [%s]. Key with descriptor [%s] applied to %s. Switched invoking process to new session keyring %ld Missing required argument(s). Invalid key descriptor [%s]. Valid characters are 0-9 and a-f, lower case. Length must be %d. Error getting policy for %s: %s To get more information on a command, type 'e4crypt help cmd'Enter passphrase (echo disabled): Key with descriptor [%s] already exists Keyring [%s] is not available. Error getting session keyring ID: %s Error adding key to keyring; quota exceededError adding key with key descriptor [%s]: %s Added key with descriptor [%s] adds a key to the user's keyringe4crypt add_key -S salt [ -k keyring ] [-v] [-q] [ -p pad ] [ path ... ] Prompts the user for a passphrase and inserts it into the specified keyring. If no keyring is specified, e4crypt will use the session keyring if it exists or the user session keyring if it does not. If one or more directory paths are specified, e4crypt will try to set the policy of those directories to use the key just entered by the user. get the encryption for directoriese4crypt get_policy path ... Gets the policy for the directories specified on the command line. give the invoking process a new session keyringe4crypt new_session Give the invoking process (typically a shell) a new session keyring, discarding its old session keyring. e4crypt set_policy [ -p pad ] policy path ... Sets the policy for the directories specified on the command line. All directories must be empty to set the policy; if the directory already has a policy established, e4crypt will validate that it the policy matches what was specified. A policy is an encryption key identifier consisting of 16 hexadecimal characters. @0@us@u@s@g@p@t; $H(<L<< `<\lh\\0`zRx x&D$4FJ w?9*3$"\t AC  A (AC N A h4AJ h EC ,AC FEK G H( ,hLMAH FEH G ( LEC Cl, $EC DIED yEC M@0 `EC C,AC BKHO A $t/EC BEIID$EC DEM`) )Q6R:xUU%R4HWpW0R1WX