ELF>P"@Ha@8 @@@@ @@@llP[PkPk P\PlPl888PPDDStd888PPPtd4K4K4K||QtdRtdP[PkPk/lib64/ld-linux-x86-64.so.2@GNU GNU`6V~ vgq{eoGNUU L*oS YT1g 8`?ug#, F"_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTable__cxa_finalize__libc_start_mainsyscall__stack_chk_failstataccessperrorstderr__fprintf_chkexitfreestrlenstrncpymallocmemcmpopen__errno_locationioctlclosereallocfwrite__printf_chkmemchrstrerrorfputsgetoptoptindoptargstrtol__strcpy_chkstdoutfputcstrcmpmemcpyext2fs_sha512tcgetattrstdinfgetstcsetattrputcharstrrchr__sprintf_chkstrtoulsetmntentgetmntentendmntentsigactionuuid_parseuuid_unparselibuuid.so.1libext2fs.so.2libc.so.6UUID_1.0GLIBC_2.3.4GLIBC_2.14GLIBC_2.33GLIBC_2.4GLIBC_2.34GLIBC_2.2.5 ' !ti *6Aii LVui aPk@#Xk"`kAhk1kBk5kpEkEk%Bk`/k@GkhGk0Bk,kGkHls:H_HHI=DH|$PHMcoHL.IIHHt$PIAtMD= JL-*NEtLDLH,H)HL HpH9t&L9shuH;LLbH HpH9uD;=MDAHD=IH)HIMeMuh}/tf)}:HH1pHAău8JG8tHtHH1H1H-"CHӾH=HMBH{HuAB11UHHxJ11?HxHH5 1+B1sBH=NB[BH=p6BCBff.AWAVAUL-xATIUHSHdH%(H$1D$ ptkLHAuH@HcHL$ 9LlL@HtKL1H5u?AA@H@ 1H8@D$uE1L%?@Ct=Ll@HtLLL)IL)HL)ItuCt=L1@IHuIHAH=H @H H=@I|$H3?@T$ HLl$H|$Hl?HcHtI@t$LHED$1M@DAWAVAUATUSH(dH%(HD$1GH^LtLl$ L%h9>H8@HSH5H1?L9H;11?ŃL1f @>A>EuH1L|$H5Hl$?AIL1?L9uH>H H0Z>L9_1!?H;? ?H-6?HӾH=HM>HM H='>H{Hu=>ff.USH~THnHF:H=C uH=H{(H(HuHH51=H=H=H9H-H>HwC uHKH1=HS(H(HuH=B<1=H-< Hu=HM H==H{Hu<1=ff.fAWL='>AVAUIATILUSH dH%(H$ 16<IT$hH$H1fH)D$@H$H)$)D$P)D$`)D$p)$)D$)D$ )D$0)$HL$I4$k@LD-<H$LIrH1zeH$H5=r LH1'H\$@DLE1HIL$;HLfofHH)@L9uAAtIfoL$@HHLfoT$Pfo\$`fod$p)$)$)$)$};fo,$fot$fo|$ Amfol$0AuA} Am0H$ dH+%(H []A\A]A^A_fH݋fHz݋]9H5f l::fAWAVL5 AUE1ATIUSHHxH4$dH%(H$h1D$8D$ H4$L::A#wHcH>DHQ:?H H=X :I|$H399Dv:m:s@^:DH 9 1H89D$8?H8L(0|$ H81H8DD$  H;H4 1[9.=9H"8H4$|$ u&H8L$$HcI<ܾH9H5 18H$1HD$0H8HT$PHT$H7L5d9LH711HT$HI8 7H Lo7H"=8H =1l$5H5 H8LH50 15H5EH=@4L5=HHtHH4IHt7I|$LT4uI|$4uI|$Hz3=k5H4H=H44H|$Ht$0HT$011$94H=-9H4H=HO4<4H8!A>zts84LH5 H134H5GH13A>LH5H=23H=v2tHH%s is not a directory Invalid salt: %s %s has pw salt %s 0123456789abcdefCouldn't allocate salt Couldn't allocate salt list Invalid padding %d Couldn't find salt!?! Excess arguments KEYCTL_JOIN_SESSION_KEYRINGKEYCTL_SESSION_TO_PARENTp:USAGE: %s: %02xhelpUnknown command: %s Available commands: %-20s %s Salt size is %zd; max is %d. May only provide -S once Unrecognized option: %c k:S:p:vqr/etc/mtabext4No salt values available Aborting.Invalid keyring [%s]. ext4:%s%slogonkeyctl_search failed: %s add_keyget_policynew_sessionset_policysets a policy for directoriesEXT4_IOC_GET_ENCRYPTION_PWSALTError [%s] setting policy. The key descriptor [%s] may not match the existing encryption context for directory [%s]. Key with descriptor [%s] applied to %s. Switched invoking process to new session keyring %ld Missing required argument(s). Invalid key descriptor [%s]. Valid characters are 0-9 and a-f, lower case. Length must be %d. Error getting policy for %s: %s To get more information on a command, type 'e4crypt help cmd'Enter passphrase (echo disabled): Key with descriptor [%s] already exists Keyring [%s] is not available. Error getting session keyring ID: %s Error adding key to keyring; quota exceededError adding key with key descriptor [%s]: %s Added key with descriptor [%s] adds a key to the user's keyringe4crypt add_key -S salt [ -k keyring ] [-v] [-q] [ -p pad ] [ path ... ] Prompts the user for a passphrase and inserts it into the specified keyring. If no keyring is specified, e4crypt will use the session keyring if it exists or the user session keyring if it does not. If one or more directory paths are specified, e4crypt will try to set the policy of those directories to use the key just entered by the user. get the encryption for directoriese4crypt get_policy path ... Gets the policy for the directories specified on the command line. give the invoking process a new session keyringe4crypt new_session Give the invoking process (typically a shell) a new session keyring, discarding its old session keyring. e4crypt set_policy [ -p pad ] policy path ... Sets the policy for the directories specified on the command line. All directories must be empty to set the policy; if the directory already has a policy established, e4crypt will validate that it the policy matches what was specified. A policy is an encryption key identifier consisting of 16 hexadecimal characters. @us@u@s@g@p@t;x,L8l<,,`zRx &D4hG A 8PBBA A(G (A ABBC 8DsEADL |BBB B(A0D8I 8A0A(B BBBG L<BBB B(D0D8D 8A0A(B BBBD `EAD 0<FBB I(D0D8I0FBB B(A0A8D`d#EAD LtBIB E(G0A8G 8A0A(B BBBA 0XFBI E(D0C8N,$FBE D(A0G@#"A1B5pEE%B`/@GhG0B,GH