ELF> %@a@8 @@@@hh @@@880[0k0kh 0\0l0l  DDPtd0K0K0KQtdRtd0[0k0k/lib64/ld-linux-x86-64.so.2GNU!k5pRh_GNU2246(emfUa92lF IHu}BC `NS^&X{-, ; p"0pn`p8pg@p_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTableuuid_unparseuuid_parseext2fs_sha512__errno_locationcloseopensigaction__printf_chkexitoptindstrrchrperrorstrncpy__stack_chk_failputcharreallocstdinmemchrstrtolsetmntentfgetsstrlenmemsettcsetattrmemcmpgetopt__fprintf_chkstdoutfputcfputsgetmntentstrtoulmallocoptargstderrioctlfwrite__memcpy_chkendmntenttcgetattr__strcpy_chk__cxa_finalizesyscall__sprintf_chk__xstataccessstrcmpstrerror__libc_start_mainfreelibuuid.so.1libext2fs.so.2libpthread.so.0libc.so.6UUID_1.0GLIBC_2.2.5GLIBC_2.3.4GLIBC_2.4  ' A' ui J7ti Vii bui J0k&8k%@k BHk)hkw@pkp6xkpEkEk%BkP(k@GkhGk0Bk'kGkHk1H/1H 1H1HMuH=wDH{(H(Ht.LuA|$IuHS1HZFLH51H8FLf.1I^HHPTLzH H=JDH=JHJH9tHfJHt H=JH5JH)HH?HHHtH=JHtfD=Ju/UH=JHt H=*JhyJ]{f.AUATUSHdH%(H$19}{HcAI)HHHl2DH3LHx*D$%=@uTHH9t%H;tH;E1HH9uEtPH$dH+%(u8HĨ[]A\A]H H=I1E1HH;HXMHt$(HT$0HHL$8LD$@dH%(HD$1HD$`$HD$HD$ HHL@HD$1!Ht$dH+4%(uHX7ATSH~:H HHӾH=dH{H5H11,IHxF11HxLH5Z11H='X~H=BhAVAUATUSH dH%(HD$1GLfLtL-:fDI8@IT$H5H1UM9I<$11oŃHT$ 1f @uI$1H\$H5ZHl$L1HH9uH5F IM9k1PI<$=H FHӾH=- H FH=H{H5F fDATSH~MLfH=HRAC uLbH{(H(HuLH5b1H EH=TH@L%[lH C uHKL1HS(H(HuH=[1H5E H jEH=H{H5NE 1fAWAVAUATIUSHhdH%(H$X1>s:LoL|H=,H|$PLHc)HaIHHt$PHn@<HD-HL5HEDLL$I)IM fHpL9t%H9khuH;HLcHpL9uD9HDAHH)HIM>InhD-`HA<$/tfA|$:IL1ŃLt$P1f@LAEx!G;f.]H$XdH+%(Hh[]A\A]A^A_fDHD,HHMLHID/HS8LbA@MD.fAD/=0Ht$PL.H=BL1H0E LH4FH)H8HFIH$D-F&ILLLLH51 OA|$xEI|$HDAt$ALl$OL=@ DLCttLHHHL)L)CttIcC\5@IIu11AD.AD/1L1aŃ'H jAH=H= ^H -AH=w]hHH=EHt( E1HkpoH=EHDH@1HHHff.@Hff.fAWAVAUATUSHH=@H Ht$dH%(H$ 1HShH$I1fHD$H$HAD$ D$$D$0D$@D$PD$`D$p$$HTH3Ao@E1L$Lt$LH\$PLH$H5?LH$H5?L$EoL$LHLoT$ o\$0od$@$$$$HL 1HHL9uAAuHD$ol$Pot$`o|$p(o$px h0H$ dH+%(uNH []A\A]A^A_fDt$LLkH5$1 ff.fAWAVAUATAUHSHXdH%(HD$H1Ft FA9BIcALl$0D)Dd$ HHHDHD$H;1AăIHD$&fD$$D$ n1@uIGT$'f DHT$$IHD$(1DAEuLH LH51HH;\$THD$HdH+%(3HX[]A\A]A^A_ÐLLD$8lLD$LH5H¿1~@L1f@W@L=@tRHH)HLIpL9t+IhuIHHII3UI3MH IpL9uH E<H=' uD1H=<H 1mCH=-8H;fDAWAVIAUIATAUSH HdH%(H$1D$fptkHLDuHc9;HL$ D9 MtLHtJL1H5ifH=: 1=D$y1L=f A4.LHHtAt.LHtL)HL)HHÈ\)HuT$ LDLt$/H|$HcF:ItHt$LDCLD 1H =:H=l H :H= jI~H59z@AWAVE1AUIATAUHSHsHxdH%(H$h1D$0D$ H LDA#wHcHfD?H h9 H=Z H}H5G9 Y=x@ I=h@H=8 1=D$0H@L588@|$ H=81GD$ H=8H 1/=<c8LD0|$ u!HcJ8I|HA9H5A 1H$1L|$PHHD$( H7H=.811LH H H=7FH=;H;HT$HDd$4HH$D$ HT$ HD$H$ Ll$8IfDLc H{LL|$@LLcLL@SH$ L{HCHCHD$HEHH $1HHIH9uM:E1KHLDH4tMIIuHt$ LHHD$H8uLH5 12HkHl(tLL$L1LH E11LH tdG:?D$ HpD$ 9":Dd$4Ll$8D5E9t1|$ t$0LD1 8Iǃ~2H$LDŽ$DŽ$@twHL$(1AAHLH5v9/HT$H5$ 1111Hk1Ҿ11ŅoA?aH5B HDHT$H51jH5H="HHHtBHIHt2IHwuIUuIH9=f8H 54H=~eHT$(Ht$(L11$H= 8 H 3H="H7=A?ztoHT$H5DH1*H5H1 A?LH5H=e{H=Of.AWL=-AVIAUIATAUH--SL)HHt1LLDAHH9uH[]A\A]A^A_HH%s is not a directory Excess arguments KEYCTL_JOIN_SESSION_KEYRINGKEYCTL_SESSION_TO_PARENTUSAGE: %s: %02xadd_keyUnknown command: %s Available commands: %-20s %s Invalid salt: %s %s has pw salt %s 0123456789abcdefCouldn't allocate salt Couldn't allocate salt list Salt size is %zd; max is %d. Invalid padding %d Couldn't find salt!?! p:May only provide -S once Unrecognized option: %c k:S:p:vqr/etc/mtabext4No salt values available Aborting.Invalid keyring [%s]. ext4:%s%slogonkeyctl_search failed: %s helpget_policynew_sessionset_policysets a policy for directoriesSwitched invoking process to new session keyring %ld Missing required argument(s). Error getting policy for %s: %s To get more information on a command, type 'e4crypt help cmd'EXT4_IOC_GET_ENCRYPTION_PWSALTError [%s] setting policy. The key descriptor [%s] may not match the existing encryption context for directory [%s]. Key with descriptor [%s] applied to %s. Invalid key descriptor [%s]. Valid characters are 0-9 and a-f, lower case. Length must be %d. Enter passphrase (echo disabled): Key with descriptor [%s] already exists Keyring [%s] is not available. Error getting session keyring ID: %s Error adding key to keyring; quota exceededError adding key with key descriptor [%s]: %s Added key with descriptor [%s] adds a key to the user's keyringe4crypt add_key -S salt [ -k keyring ] [-v] [-q] [ -p pad ] [ path ... ] Prompts the user for a passphrase and inserts it into the specified keyring. If no keyring is specified, e4crypt will use the session keyring if it exists or the user session keyring if it does not. If one or more directory paths are specified, e4crypt will try to set the policy of those directories to use the key just entered by the user. get the encryption for directoriese4crypt get_policy path ... Gets the policy for the directories specified on the command line. give the invoking process a new session keyringe4crypt new_session Give the invoking process (typically a shell) a new session keyring, discarding its old session keyring. e4crypt set_policy [ -p pad ] policy path ... Sets the policy for the directories specified on the command line. All directories must be empty to set the policy; if the directory already has a policy established, e4crypt will validate that it the policy matches what was specified. A policy is an encryption key identifier consisting of 16 hexadecimal characters. pP@0@us@u@s@g@p@t;t(d` 0@Xlp @@ zRx 0+zRx $FJ w?;*3$"D8\BBA A(G (A ABBA tyD`o A BAD ,xzBBB A(A0DPBAD L$xBBB B(D0A8I 8A0A(B BBBG tQDL0DL<3BBB B(A0A8Q 8A0A(B BBBG L,zBBB B(D0D8D  8A0A(B BBBB 0@\BBE E(D0A8N0tBBE E(D0D8N0dBBE D(A0GDp]BIE E(D0H8G@j8A0A(B BBB$&% B)w@p6pEE%BP(@GhG0B'GH HH@FlNo p[oh h j tB8~ y ####== @@0 0K0KKKh0k0[8k8[@k@[ 0l0\ PnP^p` p`x `I\`4`