Hash a *word* with the given *salt* and return the hashed password.
*word* will usually be a user's password. *salt* (either a random 2 or 16 character string, possibly prefixed with $digit$ to indicate the method) will be used to perturb the encryption algorithm and produce distinct results for a given *word*.� � � ��������` GA$3a10� _crypt.cpython-36m-x86_64-linux-gnu.so-3.6.8-69.el8_10.alma.1.x86_64.debug a��7zXZ�ִF!t/��7]?�E�h=��ڊ�2N�.���D���$nX$M���S��N�i�Ƣ���bLa�J,���1�4�"�Pp�Ჺ��j��Lw" ��xk�t��Γr�C�-9[�w�*�f�v9��932�f�%��mIuə/��1J�C3�&�5�E�<��Ǖ,B'�����ٌ#)Y� ]��uT����+��'e�Q�����ࣸkaL���$H �u>2-��i����YK"r��욐���o}}C�5}�NB&O���8����u�n7�LAr�$�.��$6�������)���T��W��詸�K�l����� E��k�^��q�(��ҫ�P/D ���㑭�.����fje�x̐&;��$ (�J�D �z3��ߋ�y��BM�D��{��_?�^,ß���|h�JA������t�LP.��~��KV���mQh $�x[}��=���&���� �Z�w����141~g�A�O���ݹ�A ����Se?+h�3����ǧ�<�0�h���V�H��r%�^.�ǖuj�<���ըo�\R�1�D�vKI�w�s��a}�����Õ]��3T���K��Gv�[�_�B�¹�R-(�l �zz���+s�A���i�[�n�B��:�2�jϹ�0�F��ԕ��� �H�θ����J�O�2_����hي�����i\ޔgY��wx��K+W��9�_I�E��y�~RH����> �Ϫ���|Szj����c�)�b�h��'��i��g�YZ.shstrtab.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.note.gnu.property.init_array.fini_array.data.rel.ro.dynamic.got.data.bss.gnu.build.attributes.gnu_debuglink.gnu_debugdata88$���o``4(��P0��+8���oE���o00PT�� ^B���h00cPPpn��`w U}x x �2� � �� � ,�� � ��X X �` ` �h h �p p �x x �� �h� � �`$ ,P|T�(