ELF> %@a@8 @@@@ @@@0[0[0[h 0\0\0\888 XXXDDStd888 Ptd4K4K4KQtdRtd0[0[0[/lib64/ld-linux-x86-64.so.2GNUGNUQKu]?qLWGNU2246(emfUa928F es 1JT,S^l,  `s"y0`^``l8`@`_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTableuuid_unparseuuid_parseext2fs_sha512optindfgetsstdinperrorstrncpy__strcpy_chk__stack_chk_fail__printf_chkfreeexitstatsigactionstrrchrputcharstrtolendmntentstrlenstdoutoptargrealloc__sprintf_chk__fprintf_chkopenmalloc__libc_start_maingetmntentsetmntentstderrmemchrgetopt__cxa_finalizestrerrormemcmpmemsetioctlclosefputctcgetattrfputsaccesstcsetattrstrtoulmemcpyfwritestrcmp__errno_locationsyscalllibuuid.so.1libext2fs.so.2libc.so.6UUID_1.0GLIBC_2.3.4GLIBC_2.14GLIBC_2.33GLIBC_2.4GLIBC_2.34GLIBC_2.2.5 ' (ti 1=Hii S]ui h0[&8[%@[w@H[)h[Bp[6x[pE[E[%B[P([@G[hG[0B['[G[H[%$>@%">h%>h%>h% >h%>h%=h%=h%=hp%=h`%=h P%=h @%=h 0%=h %=h %=h%=h%=h%=h%=h%=h%=h%z=h%r=h%j=hp%b=h`%Z=hP%R=h@%J=h0%B=h %:=h%2=h%*=h%"=h %=h!%=h"% =h#%=h$%<h%%<h&%<h'p%<h(`%<h)P%<h*@%<h+0%<h, %<fAVAUIATAUSHdH%(H$1HT$H1$HHL571HH DŽ$H$1H޿1H޿1H޿1H޿1H޿1H޿ 1H޿1H޿ 1H޿1H޿1H޿ z1H޿ k1H޿\1H޿MH1ҿ>H1ҿ/H1ҿ H1ҿH޿1LImH=fH{(H(Ht.HuA|$IuHS1HZ6HH51LLf.D1I^HHPTE11H=:f.@H=:H:H9tH^:Ht H=:H5:H)HH?HHHtH-:HtfD=:u+UH= :Ht H=&:du:]wAUATUSHdH%(H$19}vHc)AHHL-H,-DH;H-x*D$%=@uYHH9t%H;tH;E1HH9uEtQH$dH+%(u9HĨ[]A\A]DH H=9L1E1H;ff.HXMHt$(HT$0HHL$8LD$@dH%(HD$1HD$`$HD$HD$ HHL@HD$1HT$dH+%(uHX7S~:H 8HӾH=j H{H58112HHxF11HxHH5`11H=-^H=Hnff.AWAVAUATUSH(dH%(HD$1GH^LtLl$ L%:H88HSH5H1NL9H;11iŃL1f @ AEuH1L|$H5UHl$fDAL1IL9uH56 HL9i1GH;5H 6HӾH= % H 6H=H{H56ff.USH~NHnHJ1H=zC uHRH{(H(HuHH5O1H 5H=AH0H-H\H DC uHKH1HS(H(HuH=K1H5p5 H Z5H=H{H5>51fAWAVAUATUHSHhdH%(H$X1>s:H_HlI=<H|$PHMcLQIHyHt$PIADMD-8L=8EDLH,H)HL fHpH9t%L9shuH;LLSHpH9uD;y8DAHD-a8H)HIM'Mwh}/tf!}:HH1Aău98tH1H1AătfLt$PD1f@L9DA>Ex7Ax"H$XdH+%(Hh[]A\A]A^A_fDJD4HINLHKD4HXD$PA$ABBD4NfCD41@0Ht$PHVH=2H1H % LH46H)HH6IHFD-6HLHkHHH51}xLH}zILuALl$OL%@ufDIILBt}LHHHL)L)Bt}C\=@uMc1)D$PA$BD4LCD4H e1H=H=YH (1H=rXHH=5Ht& 51HkpoH=51H4H01HHHÐHff.fAWL=0AVAUIATUHLSH dH%(H$ 1HUhH$H1fH)$H$H)$)D$)D$ )D$0)D$@)D$P)D$`)D$p)$HL$HuDc@LDH$LIrH1s^H$H5/r LH1 HDLE1HLt$@H$BfHLfofHH)@L9uAAtGfo $DHHfoT$fo\$ fod$0)$)$)$)$fol$@fot$Pfo|$`Amfol$pAuA} Am0H$ dH+%(H []A\A]A^A_ fH݋fH݋dUH5%DAWAVAUATAUHSHXdH%(HD$H1Ft FA9IcD)AHHHHD$DH;1AAǃIHD$&fD$$ED1f.uIFf T$'DHT$$HD$(1DAIvEuTH H1H50{HD$HH9IHD$HdH+%(@HX[]A\A]A^A_fDLHt$LD$~8LD$HL$H5NH¿1DLl$0Ǿf@1LP0L5M0tMH4H)HLDIpL9t+I~huILH@M3EI3EL IpL9uH +H= D1H=+Hm 1H=<H;xff.AWAVIAUATL%5 UHSHdH%(H$1D$ptcLHuHc*HL$ 9LtLHtAL1H5:UH=q* 1D$E1L% =Ct>L-HtLLL)IL)HL)ItsC4>LIHuWH *H=? Z H )H= =I~H5)MT$ HLt$`H|$Hcw)HtI2t$LHED$1DAWAVL5 AUE1ATIUSHHxHt$dH%(H$h1D$8D$Ht$LEA#wHcHf?H ( H=*I|$H5(9 ,x@ ,h@H=a( 1D$8H@L-A(8@|$H=&(1D$H=.(HK 1/=3,'Ht$|$u$Hc'Ld$I<ܾH`9H5 1iH$1H\$PHHD$0]H^'L%'Lj11HI; AM LH=_+HY+1l$H5HBLH5e1H5{H=vL5tHHtEHIHt5I|$LuI|$uI|$gH='H #H=HT$0Ht$0H߹11$DH='H \#H=UHT'ztmLH5H1vH5H1A>LH5H=1H=:HH%s is not a directory Excess arguments KEYCTL_JOIN_SESSION_KEYRINGKEYCTL_SESSION_TO_PARENTUSAGE: %s: %02xhelpUnknown command: %s Available commands: %-20s %s Invalid salt: %s %s has pw salt %s 0123456789abcdefCouldn't allocate salt Couldn't allocate salt list Salt size is %zd; max is %d. Invalid padding %d Couldn't find salt!?! p:May only provide -S once Unrecognized option: %c k:S:p:vqr/etc/mtabext4No salt values available Aborting.Invalid keyring [%s]. ext4:%s%slogonkeyctl_search failed: %s add_keyget_policynew_sessionset_policysets a policy for directoriesSwitched invoking process to new session keyring %ld Missing required argument(s). Error getting policy for %s: %s To get more information on a command, type 'e4crypt help cmd'EXT4_IOC_GET_ENCRYPTION_PWSALTError [%s] setting policy. The key descriptor [%s] may not match the existing encryption context for directory [%s]. Key with descriptor [%s] applied to %s. Invalid key descriptor [%s]. Valid characters are 0-9 and a-f, lower case. Length must be %d. Enter passphrase (echo disabled): Key with descriptor [%s] already exists Keyring [%s] is not available. Error getting session keyring ID: %s Error adding key to keyring; quota exceededError adding key with key descriptor [%s]: %s Added key with descriptor [%s] adds a key to the user's keyringe4crypt add_key -S salt [ -k keyring ] [-v] [-q] [ -p pad ] [ path ... ] Prompts the user for a passphrase and inserts it into the specified keyring. If no keyring is specified, e4crypt will use the session keyring if it exists or the user session keyring if it does not. If one or more directory paths are specified, e4crypt will try to set the policy of those directories to use the key just entered by the user. get the encryption for directoriese4crypt get_policy path ... Gets the policy for the directories specified on the command line. give the invoking process a new session keyringe4crypt new_session Give the invoking process (typically a shell) a new session keyring, discarding its old session keyring. e4crypt set_policy [ -p pad ] policy path ... Sets the policy for the directories specified on the command line. All directories must be empty to set the policy; if the directory already has a policy established, e4crypt will validate that it the policy matches what was specified. A policy is an encryption key identifier consisting of 16 hexadecimal characters. ppppppppppppppppppppppppppppppp@us@u@s@g@p@t;\P\l,(|@T\(zRx @"zRx $FJ w?;*3$"D8\BBA A(G (A ABBF yD`o A A0BBB B(A0A8D`AAD L hBBB B(A0D8I 8A0A(B BBBG pODJ4DL@BIB E(A0G8G 8A0A(B BBBA LBBB B(D0D8D 8A0A(B BBBG 0<BBE B(H0D8I0pBBI E(D0C8N,xBBE D(A0G&%w@)B6pEE%BP(@GhG0B'GH