aHZH  C H(  H<1L.text  .data   C @.bss J J.loader!B(= ,|nx|#x|+xb,;AA 4| S*N!A98}{x~xH` ,Ab$HyA| @__start,M H4N @__threads_init|!HAf| FN!Ab ,cA| CN!Ab,cAl| CN!Ab,Ac| CN!Ab,cA| CN!AH8!@}N b,AK A__threads_init@AF2_1|}&!ĒAȒa̾Б;¾t::!8`?:`|8``:@;`c;@;; @DHDAA8~8HDYA:̐wHDqAHHDA8DccHDA`q,AdX\`:~%L98T:(&|.A@$| N (@8,V;>Ucc8hHDAA`q,@,AbX|@,@7(?A7tHC݀A||yA`op(@P88}@HDA8`!AȂ!Ăà|} N w888HCـA`~cHCA`e8}@cHCAK;܀,@6t88~%(Tz| .A| N ,A`@H@,@<@8DH8T8P9hHL``},@op( A|hw,A8880HCAH]`|}yA\b88`,{A(8T8P8hcHbA|zyAcH[eA`ec8H[`c88HbA|}yATPHbAP|@@xcHbA8~XH[A88H8~88HbATHVAA8`!}!ĂâAȺN 8~8HZA88(8~88HbAAcHUA8`!}!ĂâAȺN 8~HZ1A888~88HaـAcHUIA8`!}!ĂâAȺN `w888HAA`ycCHAA`e8}@c$H@A,@,A8~tHTAK888~ 8HTEAK8~HYEA88888~H`A8`!}!ĂâAȺN 8,8`8H@%A`d8}@H?ATHT)A8~HXA88888~H`]A8`!}!ĂâAȺN 8~HXYA88888~|H`A8`!}!ĂâAȺN DccHWA`ecc8HX`K8~HWՀA888~p88H_}Aw888IH>AHRـA8`!}!ĂâAȺN ,A`@H<,@D@HHa`!}!ĂAȂa̺N w888IH>5AHR%A8`!}!ĂâAȺN ,A`@H;M,@@HHn`|}y@@H8T9D8X9?h8PHB-``},@,op( AĀD,Ah,A`8T@H8P8hHp]`|}y@@TPXHH?Y`|qyAP8~ HÙA88 888~H]uAb#!AȂ!ĂK8~ HUA88 888~H])Ab#!AȂ!ĂK8~ HU5A88 8~88H\݀A@XHH>`THPaAc!}!ĂâAȺN `8w88H;A`d8}@H;A@XHH=`8~ hHTyA88 P8~88H\!ATHOA8`!}!ĂâAȺN Hk`,@@,@؃HH:A|@@HT`D,A88,A`{HSA`dcc8hHSA|{yA,DcHSA`ec8HS`KHB`w888H:A`yccH:A`e8z@c$H:QA,@D,A88~4HNMAK(888~8HMADK,@XHH;`8~ 8HRɀA88 888~HZqA8`!}!ĂâAȺN 8~ HRmA88 888~HZA8`!}!ĂâAȺN DccHR A`ecc8HR1`K8~ HQA88 88 8~HYAc!}!ĂâAȺN w888IH8ɀAHLA8~ HQmA88 888~HYA8`!}!ĂâAȺN ,A`@H5,@@8DH8T8P9hHA``},@op( A,A؀TP8HP`THLAh;T,A8HoA,@88`,}A`8@H8h8|4T~HPA|{yA8~ HP!A;bCHPA98 p8~8cbG9 HWAbCHo9``}8~ HOрA;bCHOA9 8 bG898~cHWaAc!}!ĂâAȺN B`w888`H6A`yccH6A`e8z@c$H6IA,@<,A08~,HJEAK 888~8xHIـAKw888H6AHJA8~ XHNA;bCHNA9 8 @bG898~cHVIA8`!}!ĂâAȺN `8w88H5}A`d8}@H5EA8~ (HNA;bCHN A9 8 bG898~cHUA8`!}!ĂâAȺN 8~ HMA;bCHMA9 8 bG898~cHU5A8`!}!ĂâAȺN DccHM-A`ecc8HMQ`KLw888IH4EAHH5A8~ HLA;bCHLـA9 8 bG898~cHTyA8`!}!ĂâAȺN ,@1AK 8888~dH=ŀAK8~HBŀA;8HBA9 88898~@cHJUA8`!AȂ!ĂK嬃_DcCHB]A`ecC8HB`KH8~HB9A;8HB)A988~48c89 HIɀA`w888 H)1A`d8}@H(A8`!AȂ!ĂK8~HAA;8HAA9 88898~(cHI9A8`!AȂ!ĂK䐃_DcCHAAA`ecC8HAe`K8~HAA;8HA A9 888 98~cHHAc!}!ĂâAȺN 8~H@A;8H@A988~8c89 HH9Aw8X88IH'AH;A8`!}!ĂâAȺN 88HFQAKD88dHF9AK,88dHF!AK,A`@H$y,@@;hH8T8D8P9hH0Q`,,A@hTP||+x|p|8Hd``q8PTH?`TH:A,@鈀@HHI`!!ĂAKDDDH>A`ec8H?`K\ADcH>ɀA`ec8H>`KЀw8|88IH%AH9рA8`!}!ĂâAȺN ,R/C,SA/D,PA AA@T,A`@H",@<@HHV}`|}y@Ȁ@H8T9D8X9?h8PH)``},@lop( Ah|8,,@h8A@@88T8P9 LHHgmA|{yA@XHH&q`8~H=MA88888~HDA,@@: T,AhH8uAb#!AȂ!ĂK(8w8'8H$AH7AKB`w888H#A`yccH$ A`e8z@c$H#A,@ߘ,Aߌ8~\H7AK|8F8l88~H75AK8A`@8h8T8P9 LHHf A|{yÀ@TPXHH%e`|qy@P8~H;ـA88888~HCAb#!AȂ!ĂK8~H;A888~88HC5AT,@Tb#!AȂ!KހB`w888H"mA`yccH"A`e8z@c$H"!A,@,A8~dH6AK8Q8P88~H5AK8~H:A88p888~HBYA8`!}!ĂâAȺN DccH:QA`ecc8H:u`Kt8~XH:-A88@88 8~HAՀAc!}!ĂâAȺN 8~(H9рA888~88HAyAw888IH AH4ՀA8`!}!ĂâAȺN @HHQ`|}y@P@H8T9D8X9?h8PH$``},@op( Ath,A8P@8h8TcHHHc`|}y@X@耿THPH"1`|qyAh8~ tH8A;cCH8A9 8 `cG898~cH@5Ab#!AȂ!ĂKی8~ H8AA;cCH81A9 8 cG898~cH?рAb#!AȂ!ĂK(`HH `TH35A8~ LH7A;cCH7A9 8 8cG898~cH?QAc!}!ĂâAȺN 8~ $H7MA;cCH7=A98 8~x8ccG9 H>݀A`w888THEA`d8}@H A@XHH`TH25A8`!}!ĂâAȺN 8~ H6A;cCH6}A9 8 cG898~lcH>A8`!}!ĂâAȺN DcH6A`ec8H69`K8~ H5A;cCH5A9 8 cG8 98~`cH=Ac!}!ĂâAȺN ,A`@H%,@h@HHM`|}y@@H8T9D8X9?h8PH!``},@op( A0h,A|88`,}AH88T8P8hHfMA|{yA@TPXHH)`|qyAP8~H4A88888~XH8LH_a`|qy@4KDŽw88 8 H A`d8t@b%cfH ̀A;9V;>u8LH_ `|qy@K0(@(V;>u8`8dHb`|qy@δKw88 8H A`d8t@b%cfH MA;9V;>u8`8dHbi`|qy@\KƬ(@ V;>KƜw88 8H %A`d8t@b%cfH A;9V;>K`(@UV;>v|@D("@8:C: |V@:@T~jp`H#iA~#aH#UA:R8c||("A:1@ pK,|qA@Tc6|n:A@,A(bCb$He`6bC8T:|x.He``p|}x.`oH"ɀA8c|("At|V :@h}j8bCHe`bCHe`v8aH"mA8:18bC||(("LF B@bH"=A8c|("@(bH"!A8:P: |`#Kİ}H8`!}!ĂâAȺN w88 8HA`d8t@b%cfHA;9K8܀d8K((@V;>Kw88 8`HA`d8t@b%cfH]A;9V;>K88bK8@u8HH_a`|qy@TKä(Aw88 8@H%A`d8t@b%cfHA;9V;>K`(Aw88 8HA`d8t@b%cfHA;9V;>K(@lUV;>v|@("@:C: |V@:@P~jpH )A~#aH A:R8c||("A:1@ pK,|qATc6|n:A@,AbCb$Hb`6bC8T:|x.Hb``p|}x.`oHA8c|("A4|V :@(}j8bCHb`bCHb`v8aH-A8:18bC||(("LF B@Kw88 8`H5A`d8t@b%cfHA;9Kd8`DK`(Aw88 8HA`d8t@b%cfHA;9V;>K(@$uV;>8\H[`|qy@ȤKw88 8H}A`d8t@b%cfH=A;9V;>u8\H[=`|qy@PK(Atw88 8H!A`d8t@b%cfHA;9V;>u8`8dH[`|qy@K@(Aw88 8 HA`d8t@b%cfHA;9V;>K,?,C/D/LATAAT@8 }H#`,@=8b#H#`,@Ȉ(-AмK(@$uV;>8HY`|qy@Khw88 8@HA`d8t@b%cfHA;9V;>u8HX`|qy@K(@$uV;>8HHU`|qy@ƜKw88 8HuA`d8t@b%cfH5A;9V;>u8HHU5`|qy@HK(@(bV;>,?A;9}H]Klw88 8HA`d8t@b%cfHA;9V;>b,?A};9HK cCmain|8t,,!H88Ah,@08H`HLA|c4H8!@8}TN A8`HLA|c4H8!@8}TN 8eXHLaA|c4H8!@8}TN A set_secorder|`8tg8!,A`<8!@N 8J8b8`8}8!0KA`d8~K؝A8}88?K݀A8`d8~XT(48|0.KaA8Ԁ}88@KġA`d8~ :K%A8}88AKeA`d8~KA8z88B8,AHAA`f88@8a@HQA8zHA8@8`f8aH-A8l}88CK݀A88@KuA8!}N }KñAKQA8!}N AIPRA.$dump_private_key|`z;D!c;,@;(cKA,@80;@8a@8KiA,@;@zK%A,@p88;@8a@8K!A,@P8b8$88DcKAc8HKAx8!p}N ,Ax,A8$8b88DcK5AccK̀Ax8!p}N ADIPRA.$dump_access_key|;D8aA`};Bܔ!8@``,A48@ccce8HɀA,@8 AD8@8aD,@K浀A@,,AA,Ap8d H!A8@8 `f8aH1Aa@8c HA8@8`f8aH A;̀a@,,A;$A8}88;KA8Dc88K)Aa@D,A c`K1 y@a@ ,A(c```K y@a@HA8`(8! A}aN }888=KـA`~K$8<8H8}KA`~K8P8aD8@KA@K|8p8aD8@KA@KP8h8aD8@KрA@,AK$8b888:cK)AKɀAa@K`88`|8f8KA`{cK A`e8}@cdKA,@,@08`(8! A}aN 8`KyA8`(8! A}aN 88x88KAK A dump_keystoreLA L| N PA L| N TA L| N XA L| N \A L| N |a̒ВԒaܿ;`~a!``8H@D`HA;B|,8`@8HA|yycDAbH̀Ac8|wyc#AbHՀA|@b@LHA8c#8@HAKۅA`x`:``c88DH̀A|dy8z$AKq`,8`@t88DHA|uy8`8D8@HA8`88DHmA`uv88x8NKAb`d8w@K]AcKϙA:8`8 8@HA,AKڙA|xy@$,@0b8!a}؂ԂЂܻN c#K)AKbKӱA:8cHɀA8b|sybcAKӽ`bcbbK5`cbgbcfccHA|uybcA KΥAcDKΕAKv888KYA`bKqA`e8w@cK Ac#KIAcK=A8`8!a}؂ԂЂܻN v8 88 KـA`d8w@KAc#K݀AcKрA8`8!a}؂ԂЂܻN 8`8 8DH)A8`88DHA`uv88\8NKAAb`d8w@KAcKAA:K`8b88D8McKA`d8@KAc#KAbHaA8`8!}!܃Aa컁N `8b88LcKA`~b8cKA`f8@cbK1Ac#KmA8`8!}!܃Aa컁N 88`8b8 cKA`d8@KŀA8`8!}!Aa컁N 8K88b̃`8,cKA`~b8cKA`f8@cbKMA8`؃}8!aA胁N A push_pubkey_cookie`A L| N hA L| N lA L| N pA L| N tA L| N xA L| N |A L| N A L| N A L| N A L| N A L| N |AȒa̒В8`8ؒܿ88!pHEA;,|c,;`x@AdKɀA,`}AcHA|`{,@8bA,AH,~;8881@cxKAK!A<`$8;`;]8I%|;$|`PTc~|TA8l,@,AT,A,A:, @,Ad,A<:z8(ATc(4~.,@8~878LKA`s8~898KA$z(Z cdbbbbiZba8D@A8$9 c8c88lHA,@xX8`8!P}N A parse_arg_fp|;$``!80K!A88,AcK A8,8`@$X8!P}N `8b8\88cKA`d8H8@c8~@K=A8`X8!P}N 8`X8!P~}N Aparse_arg_mode|``aA`!K A8/;B$||yAH A,,@ AcKAKAKMA`~HAK͹A,,A;`A`8b8\88cK-Ac9ZX9P8(`d8}@ccK݀A8`X8!PA}aN ;;`@KK!AKƉA`~H5AKA,,AK<8;cc8zKޱAc8,8z@cccK,@@N @ strcatĐA L| N  H@ H0 J@(#)61 1.16 src/bos/usr/ccs/lib/libc/__threads_init.c, libcthrd, bos720 8/2/07 13:09:21 -LLDAPadminadminkernelkernelkernelkernelkernelkernelkernelkernelkernelkernelkernelkernelEFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgr%s:%d: %s EFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgr%s:%d: %s EFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgr%s:%d: %s EFS_keymgr%s:%d: %s EFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgr%s:%d: %s EFS_keymgr%s:%d: %s EFS_keymgrEFS_keymgr%s:%d: %s %s:%d: %s %s:%d: %s %s:%d: %s EFS_keymgrEFS_keymgr%s:%d: %s EFS_keymgr%s:%d: %s EFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgrEFS_keymgrefskeymgr.cEFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1efskeymgr.cEFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1efskeymgr.cefskeymgr.cefskeymgr.cefskeymgr.cEFS_keymgr1EFS_keymgr1EFS_keymgr1efskeymgr.cEFS_keymgr1efskeymgr.cEFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1efskeymgr.cEFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1EFS_keymgr1efskeymgr.cEFS_keymgr1EFS_keymgr1EFS_keymgr1efskeymgr.cefskeymgr.cuser id = %duser id = %defskeymgr.catgroup id = %dgroup id = %defsusrkeystoreefsgrpkeystoreefsadmkeystore Group id = %defsgrpkeystoreSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYSEND_ACCESS_KEYEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTOREEXPORT_KEYSTORECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODECHANGE_ADMIN_MODEREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYREMOVE_ACCESS_KEYPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEPUSH_PUBKEY_COOKIEEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYEXECUTE_CMD_WITH_KEYCREATE_GROUP_KEYSTORECREATE_GROUP_KEYSTORECREATE_GROUP_KEYSTORECREATE_GROUP_KEYSTORECREATE_GROUP_KEYSTORECREATE_GROUP_KEYSTORECREATE_GROUP_KEYSTORECREATE_GROUP_KEYSTORECHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDCHANGE_KETSTORE_PASSWDREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYREGENERATE_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYDELETE_OLD_PRIVATE_KEYEXECUTE_CMD_WITHOUT_KEYEXECUTE_CMD_WITHOUT_KEYEXECUTE_CMD_WITHOUT_KEYEXECUTE_CMD_WITHOUT_KEYEXECUTE_CMD_WITHOUT_KEYEXECUTE_CMD_WITHOUT_KEYVerbosity level set to: %d. lefs_getRandomAKey(&accesskey)Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Flag %c cannot be used with %c Unable to get the key to be sent k:gp:vmo:c:nr:s:S:R:D:e:C:L:P:Vq?dk:gp:vmo:c:nr:s:S:R:D:e:C:L:P:Vq?dNo key available to open the keystore No key available to open the keystore No key available to open the keystore No key available to open the keystore No key available to open the keystore No key available to open the keystore An error occured while settting the order An error occured while settting the order An error occured while settting the order An error occured while settting the order An error occured while settting the order An error occured while settting the order An error occured while settting the order An error occured while settting the order An error occured while settting the order An error occured while settting the order An error occured while settting the order Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s An error occured while removing process keysAn error occured while removing process keyslefs_hashpw2(passwd, strlen(passwd), &accesskey)Enter password for the new PKCS#12-protected file:lefs_createKS(EFSKEY_GROUP, trg_id, &accesskey, 0)lefs_deletePrivateKey(&ksbuf, &kslen, &accesskey, &fp)lefs_exportKSexternal(&ksbuf, &kslen, &accesskey, filepasswd)The target keystore could not be opened, a cookie has been set. The target keystore could not be opened, a cookie has been set. The target keystore could not be opened, a cookie has been set. lefs_putAccessKey(&ksbuf, &kslen, NULL, ks2_kind, ks2_id, &ak_descr)lefs_remAccessKey(&ksbuf, &kslen, NULL, trg_kind, trg_id, &ak_descr)lefs_regenPrivateKey(&ksbuf, &kslen, NULL, trg_kind, trg_id, newalgo, 0)lefs_remAccessKey(&ksbuf, &kslen, &accesskey, trg_kind, trg_id, &ak_descr)lefs_putAccessKey(&ksbuf, &kslen, &accesskey2, ks2_kind, ks2_id, &ak_descr)lefs_regenPrivateKey(&ksbuf, &kslen, &accesskey, trg_kind, trg_id, newalgo, 0)Problem initializing EFS framework. Please install latest version of clic.rte lefs_loadRecursive(trg_kind, trg_id, &accesskey, (docookies?0:EFS_LRF_NOCOOKIES), (uid_t)-1)@(#)96 1.17.1.5 src/bos/usr/sbin/efskeymgr/efskeymgr.c, cmdsefs, bos72X, x2021_27A5 6/30/21 14:57:45Problem initializing EFS framework. Please check EFS is installed and enabled (see efsenable) on you system. Error was: %s Usage: %s [ -L load_module ] [ -k ] [ -g ] [ -p ] -v | -m | -o | -c | -n | -r | -s | -S | -R | -e -D -C | [ -V ] [ -q ] [ -? ] [ -P ] Optional flags: -L: Specifies the loadable I&A module used to operate on the keystore -k: Specifies the keystore targeted by the operation. If -k is not specified, it defaults to current user's keystore. Format of is user/ or group/. -g: Do not process pending operations when opening the keystore (see -m) -p: Current user's keystore password. Will be asked otherwise. Commands using the keystore: -v: dump keystore content in human-readable format. -m: list all pending operations (new group keystore access, ...) -o: load keystore content and run . -c: discard loaded keys and run . Note for -o and -c the keys are restored when returns. Commands modifying the keystore: -n: Change the keystore password/access key. New password is prompted. -r: Change administrative mode of keystore to 'admin' or 'guard'. -s: give access to current user's keystore (or ) from ks2. Consequence: when is opened, private key is loaded too. -S: revoke access to from current keystore (or ). Consequence: when is opened, private key is not loaded. -R: Change keystore private key. is the new key algorithm. -D: Delete old key with fingerprint from the keystore. Use with care, it can lead to data loss. -e: Export the keystore to (PKCS#12 format). -C: Create 's keystore. Diverses: -V: dump current loaded keys -q: list supported algorithms for key regeneration. -d: increase verbosity. -?: print this message $4<=44=444444444444=?@4@d444@t4@@ABBCC44CX , t!kernelkernelkernelkernelkernelkernelkernelkernelkernelkernel%s:%d: %s %s:%d: %s %s:%d: %s %s:%d: %s %s:%d: %s %s:%d: %s %s:%d: %s %s:%d: %s %s:%d: %s keystore_fileops.ckeystore_fileops.ckeystore_fileops.ckeystore_fileops.ckeystore_fileops.ckeystore_fileops.ckeystore_fileops.ckeystore_fileops.ckeystore_fileops.cUnknown user id: %d Unknown group id: %d (fd = ksmsys_lockks(kind, name))(fd = ksmsys_lockks(kind, name))Debug: opening %d/%d keystore (r) Debug: opening %d/%d keystore (r) Debug: opening %d/%d keystore (r) Debug: writing new %d/%d keystore Debug: opening %d/%d keystore (rw) (*lockid = ksmsys_lockks(kind, name))(*lockid = ksmsys_lockks(kind, name))ksmsys_getraw(kind, name, ksbuf, kslen)ksmsys_getraw(kind, name, ksbuf, kslen)Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s lefs_applyCookies(ksbuf, kslen, kind, id, axxKey)lefs_applyCookies(ksbuf, kslen, kind, id, axxKey)putfile(FILE_KS, ksbuf, kslen, kind, name, 0, NULL)@(#)10 1.5 src/bos/usr/sbin/efskeymgr/keystore_fileops.c, cmdsefs, bos720 8/6/09 03:38:04Encryption framework returned an error: %s Encryption framework returned an error: %s @(#)08 1.5 src/bos/usr/sbin/efskeymgr/find_accesskey.c, cmdsefs, bos72X, x2021_38A4 8/23/21 04:59:49%s's EFS password:Your EFS password:Error: passwords mismatch. Enter the same password again:An error occured while getting the password: %sAn error occured while getting the password: %sAn error occured while getting the password: %s@(#)04 1.2.1.1 src/bos/usr/sbin/efskeymgr/ask_user_pw.c, cmdsefs, bos72X, x2021_20A3 5/13/21 06:51:58-??????admin/kerneluser/%sgroup/%suser/(%d)group/(%d)%s:%d: %s dump_cookies.cAccess (grants access to)Remove (removes access to)Regeneration (renew private key)lefs_getCookiesList(kind, id, &ckl)Encryption framework returned an error: %s Cookie: Type ...... : %s Keystore .. : %s @(#)06 1.1 src/bos/usr/sbin/efskeymgr/dump_cookies.c, cmdsefs, bos720 1/9/07 11:24:33groupsPV_DAC_RPV_DAC_XPV_DAC_RPV_DAC_XPV_DAC_RPV_DAC_Xadmgroupsinternal erroraix.security.efsPV_DAC_R | PV_DAC_XPV_DAC_R | PV_DAC_XPV_DAC_R | PV_DAC_XError getting user nameError getting user nameError getting group nameError getting group nameefs_allowksmodechangebyuser/etc/security/user (%s): %sefs_allowksmodechangebyuserError getting user attributesError getting user attributesError getting user attributesError checking process authorizationsYou don't have permission to grant this access. You don't have permission to change this keystore. You don't have permission to change this keystore. You don't have permission to change this keystore. @(#)09 1.4 src/bos/usr/sbin/efskeymgr/perms.c, cmdsefs, bos720 6/10/09 06:40:50NOYesYesError getting group nameEnter new password for %s's keystore:Encryption framework returned an error: %s Encryption framework returned an error: %s Encryption framework returned an error: %s @(#)05 1.2.1.1 src/bos/usr/sbin/efskeymgr/change_keystore_ak.c, cmdsefs, bos72X, x2021_20A3 5/13/21 06:57:16WARNING: Changing the admin access key can lead to unrecoverable errors! Please make sure the admin keystore has been opened previously. You will need to manually grant access to admin keystore to all administrators, including yourself. Are you sure you want to proceed? [ %s / %s ] -csh-ctsh/usr/bin/sh/usr/bin/tshError executing command@(#)01 1.1 src/bos/usr/sbin/efskeymgr/execute_cmd.c, cmdsefs, bos720 1/9/07 11:23:28 %2d %s @(#)02 1.1 src/bos/usr/sbin/efskeymgr/list_algorithms.c, cmdsefs, bos720 1/9/07 11:23:39%x%X%x%X???%s %s ??????user(%d)(%d)groupadminadmin%s %s kerneluid %dgid %d%s:%d: %s dump_keystore.c Private key:This key is valid. Algorithm : Fingerprint : Validity :%s %08x:%08x:%08x:%08x:%08x Access key to keystore %s/%s admin: managed by EFS administratorThis key was deprecated on %s at %s. guard: not managed by EFS administrator Keystore description version mismatch! Encryption framework returned an error: %s lefs_getKSdescription(ksbuf, kslen, axxKey, &ksd, 0)@(#)07 1.1 src/bos/usr/sbin/efskeymgr/dump_keystore.c, cmdsefs, bos720 1/9/07 11:24:46 Keystore content: Keystore owner ............ : %s Keystore mode ............. : %s Password changed last on .. : %s at %s r ssh-rsaUnable to stat %s: %s Public key read error Public key read error: %s Public key read error: %s Unable to open file %s: %s Encryption framework returned an error: %s Insufficient memory to complete the operation. Insufficient memory to complete the operation. @(#)96 1.4 src/bos/usr/sbin/efskeymgr/push_pubkey_cookie.c, cmdsefs, bos720 12/3/09 01:17:24????????????User keyGroup keyAdmin keyPublic keyPrivate keyKey is validKey is deprecatedKey information version mismatch. An error occured while listing process keysAn error occured while listing process keysList of keys loaded in the current process: There is no key loaded in the current process. Insufficient memory to complete the operation. Debug: the process key list has changed during command execution (%d) @(#)99 1.1 src/bos/usr/sbin/efskeymgr/dump_pkr.c, cmdsefs, bos720 1/9/07 11:23:01 Key #%d: Kind ..................... %s Id (uid / gid) ......... %d Type ..................... %s Algorithm ................ %s Validity ................. %s Fingerprint .............. %08x:%08x:%08x:%08x:%08x id-quserjohngroupadminuser/adminguardadminguardgroup/admin/students%8x:%8x:%8x:%8x:%8xUnknown user name or id: %s Unknown group name or id: %s da7c9d11:4551d827:809a23c1:33d91f37:ab210b9eInsufficient memory to complete the operation. Unrecognized fingerprint: %s Example of valid format: %s Unrecognized mode: %s Valid modes are '%s' and '%s' (without the quotes) Unrecognized algorithm: %s Run command with '%s' to get a list of valid algorithms. @(#)03 1.2 src/bos/usr/sbin/efskeymgr/parameters.c, cmdsefs, bos720 1/17/07 10:17:37Invalid keystore specification: %s Examples of valid formats: '%s%s', '%s%s', and '%s' (without quotes).  H< H<   J - - 3 3 58 5@ 6 : @ N@ ^@ l@ |@ putfile@ @ @ @ @ @ @ @ 1@ E@ \@ t@ @ @ @ @ @ @ @@ __start H(!   $ , + , , , ,  , , , , ,  ,$ ,( ,, ,0 ,4 ,8 ,< ,@ ,D ,H ,L ,P ,T ,X ,\ ,` ,d ,h ,l ,p ,t ,x ,| , , , , , , , , , , , , , , , , , , , , , , , , H( H, H0 H4 Hd= Hh< Hl HpA Ht Hx H|- H H H HC H/ H> H? H  H H HB H H: H H. HH H! HK H$ H HG HF HL H H[ HZ H H' H H H5 H( I2 I IY I V I I I  I6 I  I$1 I(  I,W I0X I4 I87 I<\ I@9 ID  IH  IL IP" IT IXP I\J I`M IdE Ih  Il Ip, It] Ix I|Q IR I I+ I3 IN IO IT I) I I I I% I I* I I^ IU I; II ID I IS I& I4 I I8 I I I# I I0 I@ J/usr/lib:/lib:/usr/lpp/xlC/liblibc.ashr.olibefs.ashr.o@VPDefskeymgr/5765E6200/520 ___strcmp ___memset ___memmove ___strcpy privchecksec_checkauth strcasecmp localtime setlocale auditwrite getprivid getgroupattr getuserattr IDtogroup setsecorder __mod_init__malloc_user_defined_name efs_strerror efs_listkeysefs_closekeystoreksmsys_getrawksmsys_lockks ksmsys_freelefs_createKSlefs_sendAK2memberslefs_getKSkeylefs_getRandomAKeylefs_getKSdescriptionlefs_destroyKSdescriptionlefs_changeKSaccessKeylefs_changeKSadminModelefs_putAccessKeylefs_remAccessKeylefs_regenPrivateKeylefs_deletePrivateKeylefs_exportKSexternallefs_getCookiesListlefs_destroyCookiesListlefs_applyCookieslefs_loadRecursive lefs_hashpw2 priv_raise2efsaalgo_infolefs_push_pubkey_cookie