Hash a *word* with the given *salt* and return the hashed password.
*word* will usually be a user's password. *salt* (either a random 2 or 16 character string, possibly prefixed with $digit$ to indicate the method) will be used to perturb the encryption algorithm and produce distinct results for a given *word*.� ��������� � GA$3a1P� GA$3p1113 � GA*GA$annobin gcc 8.5.0 20210514GA$plugin name: annobinGA$running gcc 8.5.0 20210514GA*GA*GA! GA*FORTIFYGA+GLIBCXX_ASSERTIONSGA*GOW*�GA*cf_protectionGA+omit_frame_pointerGA+stack_clashGA!stack_realign GA*FORTIFY w GA+GLIBCXX_ASSERTIONS_crypt.cpython-35m-x86_64-linux-gnu.so-3.5.9-7.el8.x86_64.debugOõ|�7zXZ�ִF!t/��7]?�E�h=��ڊ�2N�%c�������\eg�AvTI1�W��{��68l��({kR`��d�7���D�P��Q��r��ElC�Yס|�3�Z /� �$ �u�m�Q�l+�yAq��N2����L���5M_�������zA ����VQK3�?��w��\E��TI�8.�[��p�k��T�`�@_O&����%6� ![?��o"�(���p��U��Rb�t��Z���G t����r,��f,�*{5���R�!L�Ӏq-H��WJ���QP�o����O�e���{iR���!C�f,���x�1_[L�3�X�!�xf�p�\�W��&�2v�GI���>fG��E�#��NQ�+� H�w��ޒ���"��V>�Vt��N���B���g!$��I*�L�K4��qp�$F��Ȅ��[�ԏ����|�L� G�!O3px3���ŇN��x:�R31H��� ��l�L�D]� R��Lz4�B�\�+��ސ�A��������r����u�(F#=Q�ݠ��EPA:�˶�k�'ϓ�e��8��=v������̸=���/ϐ_Ă�M�ʢ���LWp^�*�'.�����m��:��v��k�+�)uUx;��PӵG\J��g���PIj�O���D뇇>[X���Q~�@�g�~$��bJCM����lj?T��<��C,\)2T�Bn<�e���.���-�O5��뱌�X��~���햩g>4��+mE���WYN�sX7E��������yP��g�YZ.shstrtab.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.note.gnu.property.init_array.fini_array.data.rel.ro.dynamic.got.data.bss.gnu.build.attributes.gnu_debuglink.gnu_debugdata88$���o``4(��P0��L8���o44E���oPPPT�� ^B���hPPcpppn��`w@@U}� � �2� � �� � ,�� � ��x x �` ` �h h �p p �x x �� �h� � �(` D dD�X(