ELF>=@@8 @@@@//000ssh-h-PPPP@@88800hhhDDStd88800PtdxxxQtdRtdPPP/lib64/ld-linux-x86-64.so.2 GNUGNUDKqR\dJGNUs! stw)fUa19p~ٲ3]dr-:Q F"gIy)|nC8DPU#'`!QK,g,Xv5FC9PieR  , ^8%2 |0(_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTable__cxa_finalize__libc_start_mainstrlen__sprintf_chkimaevm_paramsfopenfwritefclosestderr__fprintf_chkstrcpy__stack_chk_failfilenofstatmallocfread__errno_locationstrerrorstrcmpllistxattrima_calc_hashsign_hashimaevm_hexdump__assert_faillsetxattrimaevm_get_hash_algo__memcpy_chkima_verify_signaturelgetxattroptindread_pub_keykey2bincalc_keyid_v1RSA_freeEVP_DigestInitEVP_DigestUpdateEVP_DigestFinalputs__printf_chkinit_public_keysstrtouladd_keyread_pub_pkeycalc_keyid_v2EVP_PKEY_freeHMAC_CTX_newlstatEVP_get_digestbynameHMAC_Init_exioctlHMAC_Updateimaevm_do_hexdumpHMAC_CTX_freeHMAC_Finalopendirdirfdfchdirreaddirclosedirlremovexattrcallochash_algo_nameEVP_MD_get_sizememcmpSHA1_InitSHA1_UpdateSHA1_Final__fread_chkENGINE_by_idENGINE_initENGINE_set_defaultERR_print_errors_fpoptargENGINE_free__ctype_tolower_locEVP_MD_CTX_new__strcpy_chkpopenpcloseimaevm_hash_algo_from_sigimaevm_hash_algo_by_idverify_hashstrpbrkstdoutfputcstdin__getdelimfgetsstrncmpstrchrTss2_RC_Decode__asprintf_chkEsys_FreeEsys_InitializeEsys_PCR_ReadEsys_FinalizememcpyexitmemsetEVP_MD_CTX_freeSHA1OPENSSL_init_cryptogetopt_longtcgetattrtcsetattrperrorimaevm_read_keyidstrcasecmpERR_get_errorERR_error_stringgetenvENGINE_finishBIO_freelibkeyutils.so.1libimaevm.so.3libcrypto.so.3libtss2-rc.so.0libtss2-esys.so.0libc.so.6KEYUTILS_0.3OPENSSL_3.0.0GLIBC_2.8GLIBC_2.4GLIBC_2.33GLIBC_2.14GLIBC_2.34GLIBC_2.7GLIBC_2.3GLIBC_2.2.5GLIBC_2.3.4      i  +p ii ii    ii ii ui (ti 4P>X>``_cgֱqxĺ˺ (0 8@`hpx2L afm u@~` @`/ĸ ȸ@͸`Aظݸ @ `-laMO 70A8PHHPX_`JpxagzZX|aLZ (M8@H̹Pla`ZhչpxIa8)ah3{(08=@\PBXϺ $dhkswxt v(yhpx      (08@HPX` h!p"x#%&'()*+,-./012345678 9(:0;8<@=H>P?X@`AhBpCxDEFGHIJKLMNOPQRSTUVWX Y(Z0[8\@]H^P_X``ahbpcxefgijlmnopqrHHHtH52%3hhhhhhhhqhah Qh Ah 1h !h hhhhhhhhhhqhahQhAh1h!hhhh h!h"h#h$h%h&h'qh(ah)Qh*Ah+1h,!h-h.h/h0h1h2h3h4h5h6h7qh8ah9Qh:Ah;1h<!h=h>h?h@hAhBhChDhEhFhGqhHahIQhJAhK1hL!hMhNhOhPhQhRhShThUhVhWqhXahYQhZAh[1h\!h]h^h_h`hahbhchdhehfhgqhhahiQhjAhk1hl!hm%MD%ED%=D%5D%-D%%D%D%D% D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%}D%uD%mD%eD%]D%UD%MD%ED%=D%5D%-D%%D%D%D% D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%}D%uD%mD%eD%]D%UD%MD%ED%=D%5D%-D%%D%D%D% D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%}D%uD%mD%eD%]D%UD%MD%ED%=D%5D%-D%%D%D%D% D%D%D%D%D%D1I^HHPTE11H=c]f.H=yHrH9tHHt H=IH5BH)HH?HHHtH}HtfD=u+UH=2Ht H=idi]wUHAWAVAUATSHIHIAdH%(HE1&IH,HIDHHH%HH)H9tHH$H%H)HtHLIIMH pHH4=-ZH5}pLHHteIcHLAH&HEdH+%(DHe[A\A]A^A_]LHpH=A=~LHoH=PILHIHL)H9tHH$H%H)HtHLILH;UHAWAVAUATSHIIIdH%(HE1`HMJLLHDHHH%HH)H9tHH$H%H)HtHLIMMH nHHn=gH5xLRHHHH00L`LIHHٺLH9H HE}HEdH+%(LHe[A\A]A^A_]LH#nH=n8Iă=~LHmH==눃=dHAl8cILHmH=뼃= H=%MLHxH=O΃=HLAMLHwH=lHHHHHH)H9tHH$H%H)HtHLILHWAUATUSHHAIՅ~1HHLHtCA)HHEָ H[]A\A]AWAVAUATUSH8H|$dH%(H$(1=_=Ht$ H|$AąxTL=CH4HD$Hl$ AD$ AHH nH=넸= u,IAHL$HZvH=NzDt$ A)HcHE~/H/HLHtHt$HpED|$ t Eu$H|$Džx/hH$(dH+%(u]H8[]A\A]A^A_ø=2~BIAHL$HuH=d~ATUSHPHIdH%(H$H1HÃ~q@HLL$AALH=#Ã~B=wD`D$@=u =l~ H|$@D=umuH$HdH+%(HP[]A\H wH5iH=n&H g|H5iH=nHT$@DH5oHwIcHT$@AH5H>Åx T=GHH(iH=A"HH5hHHiHDWHATUSHPHdH%(HD$H1H="%$D$AIcH4HÃ~HMfA~8 xH È]L9u ø[]A\A]A^AWAVAUATUSHH $H( IHt$dH%(H$1D$eIH$LbGH Ht H\D$H=Ht =H$H=Ht $H=Ht $H=bHt $=8u)$%=u H=YH$LH$H]H=|HHwLH-$H]HL5 G='CLHDH=kLUÅx&HT$vǸuH=LHAH=W=vmH H=C6ЋL$HCH==~2H iH=E=)H$dH+%(2H([]A\A]A^A_H HUH=a문=~~H ՘H=EOw=IeAHVH=6H5DH L%VMLUH=HcH$Lv==HcH$LeHH]HLHAUL%ʘMEL=H$L e=7AHUH=Z=7ucH5CHL%ML=H$L_L%CH$LLÅx=N$=7SLH'UH={)=KAHUH=9H$HLÅxLLeH$L4$S=LHx@H=ŕ0=THMH<@H=LeALH2@H=kGH$H=F4=ДH #H=AHD$ HD$(HD$0=$D$ $D$$$fD$( =M|HcHt$ L=u=wu fHT$Ht$L‹D$=H 7H=@uJ=uH$HD$ D$D$($D$,$D$0$fD$4@tI=uH$D$ D$D$$$D$($D$,$fD$0=fuH$HD$ D$D$($D$,$D$0$fD$4wAAH c\H=H=n=JHt$ H=ޒ-=hH H=N?5]H=lHH$  Ã=L$ AAH >QLH59DLHHt,H|$PH%HHH%=Ht$@Ht$@L!9==YH H=#> 2HSAA7H ZH>H=HHHt$@H|$P*VH 0H=)P ATUSHPHIdH%(H$H1HÃ@HLL$AALH=>Ã~Y=D`=lD$@=qtD$A='u =~ H|$@DucH$HdH+%(HP[]A\H -Y$H518H='=H Y)H58H=?=IcHT$@AH5!HÅx p=:cHH7H=~>USHHHHH7HD؃=u'=؏t Hu HH/H[]HtAUATUSHXIdH%(H$H1L-HHT$@L螾HD$@P<u|$AH|$ADžH$HL7ƒ0@HL$AHDEL)H$HdH+%(HX[]A\A]ÉÃ=~LH6H=e묻=~LH:H=ύ5y=TgH H=:!E= 3LH:H=dH VHH5z5H=n:ZUSH"PHHЍH,Ht:=tH=Ht_EHÅu =pQH[]H=[HH H=5H=5߽HH5H=gAWAVAUATUSHH|$dH%(H$1HD$0HDŽ$HDŽ$H$~HH HHB4HEHD$AHD$(H$HD$0HD$H-T+HLd$0H58LIH>E)DDAA=1IcLl$@LLL$AHL$DLH=rAă6=H HH|$0H5 L5zMcH$Ll$>N$TT$>DD$?LL=HL9uH5 蓽H | H4$H|$)HH~fHD$0HD8 LaAH :SH5n2H=|7H SH5O2H=y7˺Et.AH$dH+%(uODHĘ[]A\A]A^A_Ã=qH|$1AH H=30ɻAWAVAUATUSHH|$IdH%(H$1HGPH$AAL=6H|$ L꾈耽HHtsAmHl$ELH谹HH0AuAHD$HcHsH$H,HH@H$AsH$dH+%(uDHĸ[]A\A]A^A_ȺAWAVAUATUSHAHt$dH%(H$1HD$@D$H5[:H=G޺HHHL|$LHAGA~+ITAVHiPI HPH9uH$dH+%(|H[]A\A]A^A_Å~'HFWHiPHTHPH9uAHD$pHD$Ll$L-2Ht$H|$ϸ$%=5H5)9H|$讹IHLHcHiPHl$HHOAL譸EEID9=HN,,L脶H4HHD$E~3HD$L`LI<$ÅIPA9uۻ=sLH3H=/蕺NÃ=?HL$H3H=_=~H х5H=EK=JHL$HM3H=H57H=E HH,=H$H5b-謱D$ DŽ$$!HL$H$ұHH|$lHL$谱t$lGH$HxHL${PD$l$)‰H$=}H U}H=>ϲm=|`HD$P߬HAH=H=}l*=|HD$P蜬HAH=H=|)=M|HD$PYHAH=H=|= |H ]|H=*ױu={hHD$PHAH=H=|t2HSH58ժCwHcSH[HcUHJHEHEEHT$pLLL,uAEHMHT$pLL uEHPHPH9,$L{I݃{tH{wIH,H|$tH5z{5u4=*{(HcSH胫HcUHr:LL2t=$H$L'tGHT$lHLSuH=#賮 H=#襮oD$tE$EH=x#耮LvszHt$tH=zYA|$ h=yL$pH(H=yb=yHt$tH=y =cyH$HL(H=y=1ypH$H=ry譮=yEH$HHH#H=Ay觭H$$HH$CHt$tH!=xAD$X xHx:H=x*H$DmHH谨D)Ɖ4$HHHD$@DHLpAM$XD))H$H5&ƫA$AݻA=wEF\$$H|$pHL$ѫHHD$L$p$L$HDŽ$HDŽ$H$LH)ɸHLD$LGHH$H5h&貪ƒ|$ 8|$ H$HL$H$9$s5H$萩$$H$|$ $HL$H$zHWDd$hIEHD$(HXHt$HnAD$HiPH`H$ID$L)A݃=u~uL$pH$H=v耪=uHt =uM=u~H5u Ψ=gu=uD$HL$@T$LLLp=-ucLHH=quܩCH$H5$èt Aݻ A$Cu AŻI\$T$\)AHt$tH=u<=tH$IH#H=t7=`t$Ht$@H=t=:tLH"H=~tlH5ht ^=s`T$\HH=>tyCT$LLH=!t\VAT$LLL]\=sH5s ڦL%sMt'LH$H{H"HHuH$襣Hx ܦHHtH$Hx#L#Hs=sAH$EH*5H=>s褧|$hADl$ܞkllclHkHokmHkHt HgkU@H$HH=|k臝Ht$ Ht$ƝH|$`Ht$D$l@D$lH=@kKHT$`JuwH5-H k@H<$KHD$H=jHT$ uAH|$tTH$HjxH=H=H<$ZH$H=H<$?H$H<$0HD$H$;kH?jH0kHH 7kiH jHi=kt/=iH jHH=,}j=jt/=liqH iGH=-9OjCHqiHBj0;j!Lj =j@HaHhHKH5HHhH@jHhH%jHhH jHhHi}HhHijHhHiWHhHiDHrhHsiH si)hH=HhH$hHKH^HgHYHg>hchw"PUhHfL"H=bHt$H-bL(H(H}HuLH5ڔ(t =xeH-LH=Ve~HWHHH=eH=]H.eH5 萕H=jH eH:HUÅ1H=dHtH=dNH$dH+%(uUHĸ[]A\A]A^A_É膔HAHH=d{}q跖HH%s.%sWriting to %s wFailed to open: %s Reading to %s Failed to fstat: %s (%s) evmctl.csetxattr failed: %s /etc/keys/privkey_evm.pemUnknown hash algo: %s len + offset <= sizeof(hash)hash(%s): Failed reading: %s getxattr failed: %s /etc/keys/pubkey_evm.pembinkeyidEVP_DigestInit() failedEVP_DigestUpdate() failedEVP_DigestFinal() failedusage: %s %s /etc/keys/x509_evm.derParameters missing %s: verification is OK invalid command: %s commands:sha256asymmetric@t@p@s@u@us@gadd_key failed keyid: %d Failed to read a key: %s key is too long: %d Failed to stat: %s Failed to open %s ioctl() failed generation: %u llistxattr() failed: %s HMAC_Init() failed no xattr: %s skipping xattr: %s name: %s, size: %d HMAC_Update() failed %s:%d hmac_misc (%d): HMAC_Final() failed hmac: /etc/keys/evm-key-plainFailed to open directory %s Failed to chdir %s ..%s:%d path: %s, type: %u Failed to chdir: %s sha1%s: PCRAgg %d: %s: TPM PCR-%d: %02u Invalid PCR %d. Event data event too long. PCR-%2.2x engine %s isn't available engine %s init failed wrong UUID format uuid: llistxattr() failed EVP_DigestInit() failed security.selinuxsecurity.imasecurity.capabilityEVP_DigestUpdate() failed %s:%d dev: %u:%u EVP_DigestFinal() failed %s has no signature Portable sig: invalid type unknown hash algo: %s mdlen <= sizeof(hash), hashlen / 2 <= sizeof(hash)siglen < sizeof(sig)PCR-%2.2dUnknown algorithm '%s' Could not stat '%s' Could not open '%s' tss2-rc-decodeUsing %s to read PCRs. esys initialize failed%s: %sesys PCR reading failedTPM returned incorrect PCRsunsupported tss2 algorithmrbUnable to read template name file pathname is too long %d %s ima-sigima-buf %s %sFailed to read any TPM PCRs hvnsda:op::fu::k:t:rimalloctcsetattrPEM password: 1.4evmctl %s user.imauser.evmtoo many --pcrfile options Invalid keyid value. Error reading keyid. getopt() returned: %d (%c) EVMCTL_KEY_PASSWORDpkcs11:pkcs11Invalid command: %s errno: %s (%d) security.SMACK64security.apparmorsecurity.SMACK64EXECsecurity.SMACK64TRANSMUTEsecurity.SMACK64MMAPhelpimasigimahashhashalgopasssigfileuuidrsakeytyperecursivem32m64portablesmackinodegidmodegenerationcapsverify-sigenginexattr-userignore-violationspcrsverify-bankkeyid-from-cert--versionimport[--rsa] pubkey keyringconvertSign file metadata. ima_signMake file content signature. ima_verifyima_setxattr[--sigfile file]ima_hashMake file content hash. ima_measurementima_boot_aggregateima_fix[-t fdsxm] pathima_clearsign_hashhmac[--imahash | --imasig ] filemd4md5ripemd160sha384sha512sha224ripemd128ripemd256ripemd320wp256wp384wp512tgr128tgr160tgr192sm3security.evmFailed to malloc %zu bytes: %s Failed to fread %zu bytes: %s Failed to read xattrs (llistxattr): %s : errno: %s (%d) Failed to open file: %s: errno: %s (%d) Signature file is too big: %s Usage: evmctl [-v] [OPTIONS] -a, --hashalgo sha1, sha224, sha256, sha384, sha512, streebog256, streebog512 (default: %s) -s, --imasig make IMA signature -d, --imahash make IMA hash -f, --sigfile store IMA signature in .sig file instead of xattr --xattr-user store xattrs in user namespace (for testing purposes) --rsa use RSA key type and signing scheme v1 -k, --key path to signing key (default: /etc/keys/{privkey,pubkey}_evm.pem) or a pkcs11 URI --keyid n overwrite signature keyid with a 32-bit value in hex (for signing) --keyid-from-cert file read keyid value from SKID of a x509 cert file -o, --portable generate portable EVM signatures -p, --pass password for encrypted signing key -r, --recursive recurse into directories (sign) -t, --type file types to fix 'fxm' (f: file) x - skip fixing if both ima and evm xattrs exist (use with caution) m - stay on the same filesystem (like 'find -xdev') -n print result to stdout instead of setting xattr -u, --uuid use custom FS UUID for EVM (unspecified: from FS, empty: do not use) --smack use extra SMACK xattrs for EVM --m32 force EVM hmac/signature for 32 bit target system --m64 force EVM hmac/signature for 64 bit target system --ino use custom inode for EVM --uid use custom UID for EVM --gid use custom GID for EVM --mode use custom Mode for EVM --generation use custom Generation for EVM(unspecified: from FS, empty: use 0) --ima use custom IMA signature for EVM --selinux use custom Selinux label for EVM --caps use custom Capabilities for EVM(unspecified: from FS, empty: do not use) --verify-sig verify measurement list signatures --engine e preload OpenSSL engine e (such as: gost) --ignore-violations ignore ToMToU measurement violations -v increase verbosity level -h, --help display this help and exit Environment variables: EVMCTL_KEY_PASSWORD : Private key password to use; do not use --pass option Importing public key %s from file %s into keyring %d EVP_get_digestbyname(%s) failed %s PCR-%d: succeed at entry %lu %s: PCRAgg %d does not match TPM PCR-%d Bios event log: not a regular file or link to regular file Failed to open TPM 1.2 event log. : errno: %s (%d) Reading the TPM 1.2 event log %s. Failed reading event data (short read) : errno: %s (%d) selinux[%u] value is too long to fit into xattr[%zu] ima[%u] value is too long to fit into xattr[%zu] EVM portable sig: %s required caps[%u] value is too long to fit into xattr[%zu] blkid -s UUID -o value /dev/block/%u:%uFailed to read UUID. Root access might require. PCR file: not a regular file or link to regular file /sys/class/tpm/tpm0/device/pcrs/sys/class/misc/tpm0/device/pcrsTPM returned incorrect digests%s:%d Failed to read %s PCRs: (%s) Failed to open measurement file: %s %d ERROR: event name too long! Mixed measurement list containing "ima" and other template formats not supported. Unable to read template length Unable to read template : errno: %s (%d) Unable to read file data hash : errno: %s (%d) Failed reading file name length : errno: %s (%d) Failed reading file name : errno: %s (%d) Failed to verify template data digest(line %d). Template "%s" contains unprocessed data: %d bytes Matched per TPM bank calculated digest(s). Matched SHA1 padded TPM digest(s). Failed to match per TPM bank or SHA1 padded TPM digest(s). Failed to verify template data digest. Failed reading the TPM 1.2 event log %s. Portable and immutable options are exclusive, ignoring immutable option.Portable and immutable options are exclusive, ignoring portable option.Import public key into the keyring. convert public key into the keyring. [-r] [--imahash | --imasig ] [--key key] [--pass [password] fileVerify EVM signature (for debugging). [--sigfile] [--key key] [--pass [password] fileVerify IMA signature (for debugging). Set IMA signature from sigfile [--ignore-violations] [--verify-sig [--key key1, key2, ...]] [--pcrs [hash-algorithm,]file [--pcrs hash-algorithm,file] ...] [--verify-bank hash-algorithm] fileVerify measurement list (experimental). [--pcrs hash-algorithm,file] [TPM 1.2 BIOS event log]Calculate per TPM bank boot_aggregate digests Recursively fix IMA/EVM xattrs in fix mode. Recursively remove IMA/EVM xattrs. [--key key] [--pass [password]Sign hashes from shaXsum output. Sign file metadata with HMAC using symmetric key (for testing purpose). >z>>>>>>>>>>4>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>{>>>>.>kX>>>>>>>>> 1DWr6Iread_tpm_banksfindcalc_evm_hmachmac_evmverify_evm0123456789abcdefcmd_sign_hashsign_imahash_imasign_evmget_uuidcalc_evm_hash;0^exlam'o0 r`jrZtuv4whByDz{ H{$]|`}~UтDGih &?XqɐHƗthn >L x ~ M 0 | n j4 P zRx j&D$4\FJ w?:*3$"\c,tYkAC M A ,lAC PN A 4o_BBA A(D0N(A ABBL oFBB B(A0A8G 8A0A(B BBBA 0\jqBAA G  AABA r'H^0rFAA Dp  AABA (ZtxAAG AAA @uFBB A(A0G 0A(A BBBA 0LdvBAA D0  AABA w4Do8wFBA A(D0(A ABB0wxFAA D0  AABA 89yFBA A(D0l (A ABBA (DyBAA ABDpQz|FBB A(A0G 0A(A BBBA H}vBBB B(A0A8G 8A0A(B BBBA (EAD g AAA X0?fBBB B(A0A8GEqP 8A0A(B BBBA LIBBB B(A0A8G^ 8A0A(B BBBA HPHP HP$HP<HPTXEp A HpʼnBBB B(A0A8Dp 8A0A(B BBBA LkcBBB B(A0A8D 8A0A(B BBBA D ~BBA A(H Q G h (A ABBA TޏAA A tl8Am A HPBBB B(A0A8D@ 8A0A(B BBBA LrGBB A(A0QF0F(A BBB\,J BBB B(A0A8G L2 8A0A(B BBBA 2A2q20BAA G  AABA (`EAD E AAA 8BBA A(G  (A ABBA ((ŸEAD X AAA LTeFBB B(A0A8G c 8A0A(B BBBA HעBBB B(A0A8G 8A0A(B BBBA d^BBB B(A0A8G 8A0A(B BBBA DwFlLX BBB B(A0A8G 8A0A(B BBBA  .gEj A H y)FBB B(A0A8Dp 8A0A(B BBBA L V'FBB B(A0A8G 8A0A(B BBBA >>`_cgֱqxĺ˺iz 0 PXo` @ PP $x8 ooooo00@0P0`0p00000000011 101@1P1`1p11111111122 202@2P2`2p22222222233 303@3P3`3p33333333344 404@4P4`4p44444444455 505@5P5`5p55555555566 606@6P6`6p6666666667 2L ahfsmdua~pfu1ktr36o/ĸȸ͸Aظݸ -laMO7APH_JagzZX|aLZM̹laZչIa8)ah3{=\BϺ GA$3a10>GA$3a1 > GA$3g1058>GA* GA$annobin gcc 11.2.1 20220127GA$plugin name: annobin GA$running gcc 11.2.1 20220127 GA*GA*GA! GA*FORTIFYGA+GLIBCXX_ASSERTIONS GA*GOWjGA*cf_protectionGA+omit_frame_pointerGA+stack_clash GA*FORTIFY>@GA+GLIBCXX_ASSERTIONSevmctl-1.4-4.el9.x86_64.debug[O7zXZִF!t/M]?Eh=ڊ2N \.x}%6*TY`?r1d}<6 :k+oHgxc 9(3k.Sx>)DSE D]De#}ZO]43xagMY#ྂH j _OǬewг.huxS} )riżl6Ju|<vȣٙޚ}`+])~|y: l}`Z" %r^Bq k6l&r҇/v(t)|2uWL;)"Uל#|O5m7 OyZUh6iaj_Y_pRFB~~@jB-29Ss@׆uY,gH}9)l}T׌@N!4p>V ER)KL6&=dYN?2vjMm"u&SڣʀbIIQ W[l@?7ݦb>k>㥛!$ĞB-U8mWJՁ1ؙy{!+Y. IWw$pyWF$'N3վ\L_=8.^[n,Vӂ`5 "vp!^`rT)vT"ESg7>,5-h~clLu?ҐXxƍ,+1N veZGgsQ>b=e: oW;s{Lf}y%yk{^քr&O֟6fMy ,W^|5Kq D?ż$=~(2`xI2 1?xkg2hiz,Z = 1Ɗc3[$T7vZ5t.|݌ T̈́R0.j@-Y69M!Ab~ϛW`xކ,,=r6\M>J;̀r^;JݏF0I8c 秣}>ݝ{-2tئ30KbC9ܔ֒3VDZwdmWjB$$77K_Yt0|Ηj=ϧ͐؊>SdQX1ڠzP4?Tv6 D$9䖾}k{ꐉ.:ʸl` +1gYZ.shstrtab.interp.note.gnu.property.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.data.rel.ro.dynamic.got.data.bss.gnu.build.attributes.gnu_debuglink.gnu_debugdata 880&hh$9 Go@Q p Y``@aono}xx8 B$$P 00 0 077==e v!xx` PPXX`` @PP  `)L $/>