ELF@X@8 @@@@888RR0`   TTTDDPtd(N(N(NQtdRtd  /lib/ld-linux-aarch64.so.1GNUZyH9YJX+GNU &NQ "tGlBjy '!4F{^`, s_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTableuuid_parseuuid_unparseext2fs_sha512optindfgetsstdinperrorstrncpy__strcpy_chk__stack_chk_fail__printf_chkfreeexitstatsigactionstrrchrputcharendmntentstrlen__memcpy_chk__isoc23_strtolstdoutoptargrealloc__sprintf_chk__fprintf_chkopenmalloc__libc_start_maingetmntentsetmntentstderrmemchrgetopt__cxa_finalizestrerrormemcmpmemset__isoc23_strtoulioctlclosefputctcgetattrfputsaccesstcsetattrmemcpyfwritestrcmp__errno_locationsyscallabort__stack_chk_guardlibuuid.so.1libext2fs.so.2libc.so.6ld-linux-aarch64.so.1GLIBC_2.17UUID_1.0GLIBC_2.33GLIBC_2.34GLIBC_2.38_ u9 ' Uu (D H *(H0H@JHPJXJh8KpxHKxKK(L(L@8@HPX`h p x   !("0#8$@%H&P'X)`*h+p,x-./0123456789:;< %(( {{_{ GB8    Gb8 G8 G8 BG{ C@OqmTO#S  sG<[ *c R R<<`?@R`?`R`?R`?*`?R`?`R`?R`?ҠR`?R`?R`?@R`?ҀR`?ҠR`?`R`?R`?ҠR`?@R`?R`? R`?@G+``B@?ր5c@"Q`?!0GR ?BGO@C@S [ c TB+cpG@R!`?GO@@BҡT+ RG?           @#G5<G@4_      @!@?T!n<aTk@T}r@zA}s{ ?z@G_{zA_{D@BҁTC'SA[BcCkDsE{ƨ_pG R!@@R?!0G R ?G?   G{CS[*!Q@'?xrTBQxrTkjTBKs$pGD$Gcu Gk G 9gGs G`@R ?*1T RRSy~9 4RB!|5CfAaŒ*9?**?\5c@@b#!`@R?s"TcHkIsJG'@@Ba T{ESF[G_ @?@@ ?d@c#@@R!?Œ?7@@4R!l{?T`7@@aT`@==>nnf{?TcLG!Gc@ Ҁ?!0G R ?RLGcARk *s B@G?!0G R ?Gck s ? !8G ?!0G R ?`@cG{ CS *[ е"c s`@GҀR zGq@T*?1!T{cGk `@?k T!$G` ?@TpGR!@@R?!0G R ?PGBRcG@`? Gj|8?!k|8? Aӵ˜  Uk!8CT@*cv@chG"v`? @*!0GR ?sNGG!c@?c@"!?a@@B(G@?!0G R ?cG{CS*[RcksR{G`@*?1 TqTTLqTq!TPG@*?1!T`@4cG*@&W5 5Eq@TqAT @2 PGBRcG@`?*05PGR5R@ @2 qTsNG"c@!G?a@ @B(G@?!0G R ?sNG*G`@B@AR?zuARnklTpG!@R'@?BTGR@?4GwBGcGRB@`?RR?!G@R ?&BGAR@?%a9!@@4G## G.GWG9GG#O )cfA<`?@Tg`?@@8AR Ѡ?֟Tr8S Гb6R ? 4sbq!T@BR`??@ @9 4!@R'@`?8B|G! @?G G9G zb? @ ? 5@R`?֠5@!R!G @ @ ?`@5cLG"c@!G?!0G R ?@3=#@G}|@@+=cx?<>wRÊ<?Cb6*L@4@@#AR@c`?*R@R<1T`#@ 6`@Z!@kTcFOK)@k TW@ 4{`@**/!0GR ?@?@q T$RRz@~AC<C<1T@*@#@ ?1 T`#@7'@@R!"`?**R`s5I*RR*6!G@ ?'@@R!` `?!0G$R* ?'@@R!`?֝ҭ"cLG^~!G ?!0G R ?!G ?'@@R!``?@`@XqAT!@R @qT!G ?@'@!!@R?6!G! ?0  f {{_Excess arguments KEYCTL_JOIN_SESSION_KEYRINGKEYCTL_SESSION_TO_PARENTSwitched invoking process to new session keyring %ld Missing required argument(s). USAGE: Error getting policy for %s: %s %s: %02xhelpUnknown command: %s Available commands: %-20s %s To get more information on a command, type 'e4crypt help cmd'Invalid salt: %s EXT4_IOC_GET_ENCRYPTION_PWSALT%s has pw salt %s 0123456789abcdefCouldn't allocate salt Couldn't allocate salt list Salt size is %zd; max is %d. Invalid padding %d Couldn't find salt!?! Error [%s] setting policy. The key descriptor [%s] may not match the existing encryption context for directory [%s]. Key with descriptor [%s] applied to %s. p:Invalid key descriptor [%s]. Valid characters are 0-9 and a-f, lower case. Length must be %d. May only provide -S once Unrecognized option: %c k:S:p:vqr/etc/mtabext4No salt values available Enter passphrase (echo disabled): Aborting.Invalid keyring [%s]. ext4:%s%slogonKey with descriptor [%s] already exists keyctl_search failed: %s Keyring [%s] is not available. Error getting session keyring ID: %s Error adding key to keyring; quota exceededError adding key with key descriptor [%s]: %s Added key with descriptor [%s] add_keyadds a key to the user's keyringe4crypt add_key -S salt [ -k keyring ] [-v] [-q] [ -p pad ] [ path ... ] Prompts the user for a passphrase and inserts it into the specified keyring. If no keyring is specified, e4crypt will use the session keyring if it exists or the user session keyring if it does not. If one or more directory paths are specified, e4crypt will try to set the policy of those directories to use the key just entered by the user. get_policyget the encryption for directoriese4crypt get_policy path ... Gets the policy for the directories specified on the command line. new_sessiongive the invoking process a new session keyringe4crypt new_session Give the invoking process (typically a shell) a new session keyring, discarding its old session keyring. set_policysets a policy for directoriese4crypt set_policy [ -p pad ] policy path ... Sets the policy for the directories specified on the command line. All directories must be empty to set the policy; if the directory already has a policy established, e4crypt will validate that it the policy matches what was specified. A policy is an encryption key identifier consisting of 16 hexadecimal characters. @us@u@s@g@p@t;<8h(D\,`|x@xzRx 4A,h0@< THA BNx`,ACHCFUAAIADCAA A`E_ A 0A B04AC E AAAA$hdA@BBB(AC BBNBoAK A [AGWBPAEAQAA\CA($A0BDT B DxAD\|A` G _ `FA 0AC B BUDFmAAKA  |C BCI CAA800AC B CCILXJ0l<AC B CCCB<ACIHClGAA (D H*HHJJJ8KHKxKK(L(L9FU_  Cop  Hx( P oo oo o@GCC: (GNU) 14.1.1 20240507GCC: (crosstool-NG 1.26.0.72_810021d) 14.1.1 20240507.shstrtab.interp.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.data.rel.ro.dynamic.got.data.bss.comment 88TT$&xx 4o> FppNo  z[o j( ( PtBxxH~yP@@.@CC(C(C (N(NNN 00Qa