Hash a *word* with the given *salt* and return the hashed password.
*word* will usually be a user's password. *salt* (either a random 2 or 16 character string, possibly prefixed with $digit$ to indicate the method) will be used to perturb the encryption algorithm and produce distinct results for a given *word*.� ��������� � GA$3a1P� GA$3p1113 � GA*GA$annobin gcc 8.5.0 20210514GA$plugin name: annobinGA$running gcc 8.5.0 20210514GA*GA*GA! GA*FORTIFYGA+GLIBCXX_ASSERTIONSGA*GOW*�GA*cf_protectionGA+omit_frame_pointerGA+stack_clashGA!stack_realign GA*FORTIFY w GA+GLIBCXX_ASSERTIONS_crypt.cpython-34m.so-3.4.10-11.el8.x86_64.debug�4��7zXZ�ִF!t/��7]?�E�h=��ڊ�2N�%c�������\eg�AvTI1�W��{��68l��({kR`��d�7���D�P��Q��r��ElC�Yס|�3�Z /� �$ �u�m�Q�l+�yAq��N2����L���5M_�������Ꞿ.�o���9C1 ��q�õ;+m�Q��,���VR�Լ�Eu|v�y��xClFX��s���H&��Nz�w :{˼���c�n؍N�\��E�}��q��d�9�X���Id���$;�uQ�g��5�T/�t��xU)�_N�V��e6;�93FM�%)�!x@<q�i\�77R��#g����p�9�'���2�A�+P�A��h�c��x�#�Z ��\@��� .X�����c0:1�f��c�Q��s���E:�IA*��vc��Ƞzl�6OSLŽXy&���r]�W�XW�[S��0{��e;���Y>X��yo|X�$ڐW͡����AL_�z#���t_vZՠ��o��ѣ1�,*�O{e�c�+&$��,�N�J�L�rNʦ���`��G��7}>����v�\bpa+�����N�c��!I�v��k��j�������+�yW�xDc�!�E`�{Zb���� ���m["DJ��t{g֒��Os��Y� �A�[M��>�bZ,;ݵӷ3�>�_xk$T0����D]�ߢ��[nIG�6Y(]`\Q���?1dG��C�+ʻ�v�p��0��(���K$d�Y^�gFHw�g��&D�/�O�&�o����[�e𠐕&�� PHyV��3U�'�A��i%���g�YZ.shstrtab.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.note.gnu.property.init_array.fini_array.data.rel.ro.dynamic.got.data.bss.gnu.build.attributes.gnu_debuglink.gnu_debugdata88$���o``4(��P0��L8���o44E���oPPPT�� ^B���hPPcpppn��`w@@U}� � �2� � �� � ,�� � ��x x �` ` �h h �p p �x x �� �h� � �(` D d8�T�(