openssl-1_1-1.1.1w-150600.5.15.1<>,Khp9|_WC|;ؐ{!7a@r7rhz̷fgޥ Uޚ'"n 4FMQHp 5S>*E8?(d # O\`lp vv v v  v v vv "v"p"v$t$%'((H8(P9+:;6=wBwFx Gx vHyvI{vX|HY|XZ|[|\|v]~|v^k b cd8e=f@lBuTvv, wvxvyz$4$Copenssl-1_11.1.1w150600.5.15.1Secure Sockets and Transport Layer SecurityOpenSSL is a software library to be used in applications that need to secure communications over computer networks against eavesdropping or need to ascertain the identity of the party at the other end. OpenSSL contains an implementation of the SSL and TLS protocols.hh04-ch1bE^SUSE Linux Enterprise 15SUSE LLC OpenSSLhttps://www.suse.com/Productivity/Networking/Securityhttps://www.openssl.org/linuxx86_64# Migrate old engines.d to engines1.1.d.rpmsave if [ ! -L /etc/ssl/engines.d ] && [ -d /etc/ssl/engines.d ]; then mkdir /etc/ssl/engines1.1.d.rpmsave ||: mv -v /etc/ssl/engines.d/* /etc/ssl/engines1.1.d.rpmsave ||: rmdir /etc/ssl/engines.d ||: fi # Migrate old engdef.d to engdef1.1.d.rpmsave if [ ! -L /etc/ssl/engdef.d ] && [ -d /etc/ssl/engdef.d ]; then mkdir /etc/ssl/engdef1.1.d.rpmsave ||: mv -v /etc/ssl/engdef.d/* /etc/ssl/engdef1.1.d.rpmsave ||: rmdir /etc/ssl/engdef.d ||: fi,V?)0 H b, V +%d'b e   q [  \8             Z  k 2 h 9 's.*]cK 1  L!t'I -, AAA큤AA큤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.pl.1ssl.gzrehash.1ssl.gzasn1parse.1ssl.gzrehash.1ssl.gzca.1ssl.gzciphers.1ssl.gzcms.1ssl.gzcrl.1ssl.gzcrl2pkcs7.1ssl.gzdgst.1ssl.gzdhparam.1ssl.gzdsa.1ssl.gzdsaparam.1ssl.gzec.1ssl.gzecparam.1ssl.gzenc.1ssl.gzengine.1ssl.gzerrstr.1ssl.gzgendsa.1ssl.gzgenpkey.1ssl.gzgenrsa.1ssl.gzlist.1ssl.gznseq.1ssl.gzocsp.1ssl.gzpasswd.1ssl.gzpkcs12.1ssl.gzpkcs7.1ssl.gzpkcs8.1ssl.gzpkey.1ssl.gzpkeyparam.1ssl.gzpkeyutl.1ssl.gzprime.1ssl.gzrand.1ssl.gzrehash.1ssl.gzreq.1ssl.gzrsa.1ssl.gzrsautl.1ssl.gzs_client.1ssl.gzs_server.1ssl.gzs_time.1ssl.gzsess_id.1ssl.gzsmime.1ssl.gzspeed.1ssl.gzspkac.1ssl.gzsrp.1ssl.gzstoreutl.1ssl.gzts.1ssl.gztsget.1ssl.gzverify.1ssl.gzversion.1ssl.gzx509.1ssl.gztsget-1_1.plrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootopenssl-1_1-1.1.1w-150600.5.15.1.src.rpmconfig(openssl-1_1)openssl-1_1openssl-1_1(x86-64)ssl @@@@@@@@@@@@@@@ @@@    /bin/sh/bin/sh/usr/bin/envconfig(openssl-1_1)crypto-policieslibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.34)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1l)(64bit)libjitterentropy3libopenssl1_1libssl.so.1.1()(64bit)libssl.so.1.1(OPENSSL_1_1_0)(64bit)libssl.so.1.1(OPENSSL_1_1_1)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.1.1w-150600.5.15.13.4.01.1.1w-150600.5.15.13.0.4-14.6.0-14.0-15.2-14.14.3h}@g0@gig@g dfff)@f@f?@f?@f?@f?@f?@fIfIf~f~f~f~f|fuk@ftfqvfaf8@e@epeeeXepb@e_>eRe1@eSeRd.@ddgd!ddw6dw6dtdkY@d*dd'@cc=@cccccc{h@ctctcb[c[@c=qc$e@c*c@c@cc b?b?bbbUblb@b@bbobaG@b4t@b0b0b)@b!@b b bOa@aaar@ar@aa@a@a*@a)@aapa=a+va@`m`Y@`?z@`>(_j_~@_Wr@_G@^^t@^_@^V]^O@^E:@^C^0"@^)^(9@^&^&]]]]n]x]v>]g@\@\\ac\G\G\A\@[0[ @[u[u[r@[b@[Xf@[Xf@[2*Z4@Z4@ZZ2@ZH@ZZv@Ze@ZTZOZOYYKY@YV@Y@Ym@Ym@YOY, @YYY i@Y @Y @Y @Y @YtYYX@XXXXXh@Xh@Xh@Xh@Xh@Xh@XXXXX@X6@WSWSW_@W@WW(WWV޾VՄ@VVa@Ub@U'U@U>UzUyx@Ua@U @T TTk4Ti@T\@TFJpmonreal@suse.comangel.yankov@suse.comangel.yankov@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.commjambor@suse.compsimons@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comotto.hollmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.compmonreal@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.compmonreal@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comjsikes@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comdcermak@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.comjsikes@suse.compmonreal@suse.compmonreal@suse.comvcizek@suse.compmonreal@suse.comvcizek@suse.compmonreal@suse.compmonrealgonzalez@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comjsikes@suse.compmonrealgonzalez@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.compmonrealgonzalez@suse.comvcizek@suse.compmonrealgonzalez@suse.comjsikes@suse.comvcizek@suse.comjsikes@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comsflees@suse.devcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comdimstar@opensuse.orgvcizek@suse.comtchvatal@suse.comschwab@suse.devcizek@suse.comdimstar@opensuse.orgdimstar@opensuse.orgvcizek@suse.comvcizek@suse.commeissner@suse.comjengelh@inai.detchvatal@suse.comvcizek@suse.comjimmy@boombatower.comtchvatal@suse.comvcizek@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comvcizek@suse.comvcizek@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comvcizek@suse.comtchvatal@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comvcizek@suse.commeissner@suse.comvcizek@suse.comvcizek@suse.commichael@stroeder.comvcizek@suse.comvcizek@suse.comvcizek@suse.comdvaleev@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comdvaleev@suse.comnormand@linux.vnet.ibm.comcrrodriguez@opensuse.orgvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.commeissner@suse.commeissner@suse.combrian@aljex.commeissner@suse.combrian@aljex.comcrrodriguez@opensuse.org- FIPS: Use the NID_X9_62_prime256v1 curve in ECDSA KAT test instead of NID_secp256k1. [bsc#1246697] * Add openssl-fips-ECDSA-KAT.patch- Fix bsc#1236771 - Non approved PBKDF parameters wrongly resulting as approved * Add openssl-FIPS-PBKDF-params.patch- Security fix: [bsc#1236136, CVE-2024-13176] * timing side-channel in the ECDSA signature computation * Add openssl-CVE-2024-13176.patch- Security fix: [bsc#1220262, CVE-2023-50782] * Implicit rejection in PKCS#1 v1.5 * Add openssl-CVE-2023-50782.patch- FIPS: AES GCM external IV implementation [bsc#1228618] * Mark the standalone AES-GCM encryption with external IV as non-approved in the SLI. * Add openssl-1_1-ossl-sli-021-AES-GCM-external-IV.patch- FIPS: Mark PBKDF2 and HKDF HMAC input keys with size >= 112 bits as approved in the SLI. [bsc#1228623] * openssl-1_1-ossl-sli-020-PBKDF2-HMAC-size-SLI.patch- FIPS: Enforce KDF in FIPS style [bsc#1224270] * Add openssl-1_1-ossl-sli-019-Enforce-KDF.patch- FIPS: Mark HKDF and TLSv1.3 KDF as approved in the SLI [bsc#1228619] * Add openssl-1_1-ossl-sli-018-TLS13-HKDF.patch- FIPS: The X9.31 scheme is not approved for RSA signature operations in FIPS 186-5. [bsc#1224269] * Add openssl-1_1-ossl-sli-017-X9.31-sign.patch- FIPS: Differentiate the PSS length requirements [bsc#1224275] * Add openssl-1_1-ossl-sli-016-PSS-length.patch- FIPS: Mark sigGen and sigVer primitives as non-approved [bsc#1224272] * Add openssl-1_1-ossl-sli-015-sigver-hashing.patch- FIPS: Disable PKCSv1.5 and shake in FIPS mode [bsc#1224271] * FIPS 186-5 Section 5.4 disallows RSA PKCSv1.5 signature operations with XOF. * Add openssl-1_1-ossl-sli-014-PKCSv1.5-and-shake.patch- FIPS: Mark SHA1 as non-approved in the SLI [bsc#1224266] * Add openssl-1_1-ossl-sli-013-Mark-SHA1-unapproved.patch- FIPS: DH FIPS selftest and safe prime group [bsc#1224264] * Add openssl-1_1-ossl-sli-012-DH-selftest-and-safe-prime-group.patch- Build with no-afalgeng [bsc#1226463]- Security fix: [bsc#1227138, CVE-2024-5535] * SSL_select_next_proto buffer overread * Add openssl-CVE-2024-5535.patch- FIPS: Remove not needed FIPS DRBG files [bsc#1224268]- FIPS: Add Pair-wise Consistency Test when generating DH key [bsc#1224265] * Add PCT in function crypto/dh/dh_key.c:generate_key() to meet assurance 5.6.2.1.4 of SP 800-56Arev3. * Add openssl-fips-DH-Pair-wise-Consistency.patch- FIPS: Disallow non-approved KDF types [bsc#1224267] * Add openssl-1_1-ossl-sli-011-SSHKDF.patch- FIPS: Disallow RSA sigVer with 1024 and ECDSA sigVer/keyVer P-192 [bsc#1224273] * Add openssl-1_1-ossl-sli-009-RSA-sigver.patch * Add openssl-1_1-ossl-sli-010-ECDSA-sigver-keyver.patch- FIPS: DRBG component chaining [bsc#1224258] * Add prediction resistance and oversampling of the noise source. * Allow setting the FIPS error state if jitterentropy fails the health-tests. * Add patches: - openssl-1_1-FIPS-140-3-DRBG-prediction-resistance.patch - openssl-1_1-FIPS-140-3-DRBG-oversampling.patch - openssl-1_1-jitterentropy-error-state.patch- FIPS: Align CRNGT_BUFSIZ with Jitter RNG output size [bsc#1224260] * Add openssl-1_1-FIPS-CRNGT_BUFSIZ.patch- FIPS: Fix build warnings. * Rebase patches: - openssl-1.1.1-fips.patch - openssl-fips_selftest_upstream_drbg.patch- Fixed C99 violations in patches bsc1185319-FIPS-KAT-for-ECDSA.patch (need to for explicity typecast) and openssl-1_1-fips-list-only-approved-digest-and-pubkey-algorithms.patch (missing include) to allow the package to build with GCC 14. [boo#1225907]- Apply "openssl-CVE-2024-4741.patch" to fix a use-after-free security vulnerability. Calling the function SSL_free_buffers() potentially caused memory to be accessed that was previously freed in some situations and a malicious attacker could attempt to engineer a stituation where this occurs to facilitate a denial-of-service attack. [CVE-2024-4741, bsc#1225551]- Security fix: [bsc#1222548, CVE-2024-2511] * Fix unconstrained session cache growth in TLSv1.3 * Add openssl-CVE-2024-2511.patch- openssl-riscv64-config.patch: backport of riscv64 config support- Enable running the regression tests in FIPS mode.- Security fix: [bsc#1219243, CVE-2024-0727] * Add NULL checks where ContentInfo data can be NULL * Add openssl-CVE-2024-0727.patch- Remove "Provides: openssl(cli)" because the executable has been renamed to openssl-1_1.- Because OpenSSL 1.1.1 is no longer default, let's rename engine directories to contain version of OpenSSL and let unversioned for the default OpenSSL. [bsc#1194187, bsc#1207472, bsc#1218933] * /etc/ssl/engines.d -> /etc/ssl/engines1.1.d * /etc/ssl/engdef.d -> /etc/ssl/engdef1.1.d * Update patches: - openssl-1_1-ossl-sli-002-ran-make-update.patch - openssl-1_1-use-include-directive.patch- Set OpenSSL 3.0 as the default openssl [jsc#PED-6570] * For compatibility with OpenSSL 3.0, the OpenSSL master configuration file openssl.cnf has been renamed to openssl-1_1.cnf. The executables openssl, c_rehash, CA.pl and tsget.pl have been also renamed to openssl-1_1, c_rehash-1_1, CA-1_1.pl and tsget-1_1.pl, respectively. * Add openssl-1_1-devel as conflicting with libopenssl-3-devel * Add openssl-1_1-openssl-config.patch- Skip SHA1 test in 20-test_dgst.t when in FIPS mode * Add openssl-Skip_SHA1-test-in-FIPS-mode.patch- Security fix: [bsc#1216922, CVE-2023-5678] * Fix excessive time spent in DH check / generation with large Q parameter value. * Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex () or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. * Add openssl-CVE-2023-5678.patch- Performance enhancements for cryptography from OpenSSL 3.x [jsc#PED-5086, jsc#PED-3514] * Add patches: - openssl-ec-Use-static-linkage-on-nistp521-felem_-square-mul-.patch - openssl-ec-56-bit-Limb-Solinas-Strategy-for-secp384r1.patch - openssl-ec-powerpc64le-Add-asm-implementation-of-felem_-squa.patch - openssl-ecc-Remove-extraneous-parentheses-in-secp384r1.patch - openssl-powerpc-ecc-Fix-stack-allocation-secp384r1-asm.patch - openssl-Improve-performance-for-6x-unrolling-with-vpermxor-i.patch- Displays "fips" in the version string (bsc#1215215) * Add openssl-1_1-fips-bsc1215215_fips_in_version_string.patch- Update to 1.1.1w: (jsc#PED-6559) * Fix POLY1305 MAC implementation corrupting XMM registers on Windows. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. (CVE-2023-4807) - Removed patches, already upstream * openssl-1_1-Fix-file-operations-in-c_rehash.patch * openssl-CVE-2022-0778-tests.patch * openssl-CVE-2022-0778.patch * openssl-CVE-2022-1292.patch * openssl-CVE-2022-2097.patch * openssl-CVE-2022-4304.patch * openssl-CVE-2022-4450-1of2.patch * openssl-CVE-2022-4450-2of2.patch * openssl-CVE-2023-0215-1of4.patch * openssl-CVE-2023-0215-2of4.patch * openssl-CVE-2023-0215-3of4.patch * openssl-CVE-2023-0215-4of4.patch * openssl-CVE-2023-0286.patch * openssl-CVE-2023-2650.patch * openssl-1_1-CVE-2023-3817.patch * openssl-Update-further-expiring-certificates.patch - Renamed openssl-1_1-FIPS-default-RFC7919.patch to openssl-1_1-paramgen-default_to_rfc7919.patch- Add missing FIPS patches from SLE: * Add patches: - bsc1185319-FIPS-KAT-for-ECDSA.patch - bsc1198207-FIPS-add-hash_hmac-drbg-kat.patch - openssl-1.1.1-fips-fix-memory-leaks.patch - openssl-1_1-FIPS-PBKDF2-KAT-requirements.patch - openssl-1_1-FIPS_drbg-rewire.patch - openssl-1_1-Zeroization.patch - openssl-1_1-fips-drbg-selftest.patch - openssl-1_1-fips-list-only-approved-digest-and-pubkey-algorithms.patch - openssl-1_1-jitterentropy-3.4.0.patch - openssl-1_1-ossl-sli-000-fix-build-error.patch - openssl-1_1-ossl-sli-001-fix-faults-preventing-make-update.patch - openssl-1_1-ossl-sli-002-ran-make-update.patch - openssl-1_1-ossl-sli-003-add-sli.patch - openssl-1_1-ossl-sli-004-allow-aes-xts-256.patch - openssl-1_1-ossl-sli-005-EC_group_order_bits.patch - openssl-1_1-ossl-sli-006-rsa_pkcs1_padding.patch - openssl-1_1-ossl-sli-007-pbkdf2-keylen.patch - openssl-1_1-ossl-sli-008-pbkdf2-salt_pass_iteration.patch - openssl-1_1-serialize-jitterentropy-calls.patch - openssl-1_1-shortcut-test_afalg_aes_cbc.patch - openssl-DH.patch - openssl-FIPS-KAT-before-integrity-tests.patch - openssl-fips-DH_selftest_shared_secret_KAT.patch - openssl-fips-kdf-hkdf-selftest.patch - openssl-kdf-selftest.patch - openssl-kdf-ssh-selftest.patch - openssl-kdf-tls-selftest.patch - openssl-s_client-check-ocsp-status.patch * Modify patches: - openssl-1.1.1-fips.patch - openssl-1_1-FIPS-fix-error-reason-codes.patch * Remove patches: - openssl-add_rfc3526_rfc7919.patch - openssl-fips-dont_run_FIPS_module_installed.patch - openssl-fips_fix_selftests_return_value.patch * Add build and runtime dependency on jitterentropy - Pass over with spec-cleaner- Security fix: (bsc#1213853, CVE-2023-3817) * Fix excessive time spent checking DH q parameter value (bsc#1213853, CVE-2023-3817). The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. If DH_check() is called with such q parameter value, DH_CHECK_INVALID_Q_VALUE return flag is set and the computationally intensive checks are skipped. * Add openssl-1_1-CVE-2023-3817.patch - Update to 1.1.1v: * Fix DH_check() excessive time with over sized modulus (bsc#1213487, CVE-2023-3446). The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ("p" parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. A new limit has been added to DH_check of 32,768 bits. Supplying a key/parameters with a modulus over this size will simply cause DH_check() to fail. * Update openssl.keyring with the OTC members that sign releases * Rebase openssl-1_1-openssl-config.patch * Remove security patches fixed upstream: - openssl-CVE-2023-3446.patch - openssl-CVE-2023-3446-test.patch- Dont pass zero length input to EVP_Cipher because assembler optimized AES cannot handle zero size. [bsc#1213517] * Add openssl-dont-pass-zero-length-input-to-EVP_Cipher.patch- Security fix: [bsc#1213487, CVE-2023-3446] * Fix DH_check() excessive time with over sized modulus. * The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ("p" parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. A new limit has been added to DH_check of 32,768 bits. Supplying a key/parameters with a modulus over this size will simply cause DH_check() to fail. * Add openssl-CVE-2023-3446.patch openssl-CVE-2023-3446-test.patch- Security Fix: [bsc#1207534, CVE-2022-4304] * Reworked the Fix for the Timing Oracle in RSA Decryption The previous fix for this timing side channel turned out to cause a severe 2-3x performance regression in the typical use case compared to 1.1.1s. * Add openssl-CVE-2022-4304.patch * Removed patches: - openssl-CVE-2022-4304-1of2.patch - openssl-CVE-2022-4304-2of2.patch * Refreshed patches: - openssl-CVE-2023-0464.patch - openssl-CVE-2023-0465.patch- Update to 1.1.1u: * Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic OBJECT IDENTIFIER sub-identifiers to canonical numeric text form. OBJ_obj2txt() would translate any size OBJECT IDENTIFIER to canonical numeric text form. For gigantic sub-identifiers, this would take a very long time, the time complexity being O(n^2) where n is the size of that sub-identifier. (CVE-2023-2650, bsc#1211430) To mitigitate this, `OBJ_obj2txt()` will only translate an OBJECT IDENTIFIER to canonical numeric text form if the size of that OBJECT IDENTIFIER is 586 bytes or less, and fail otherwise. The basis for this restriction is RFC 2578 (STD 58), section 3.5. OBJECT IDENTIFIER values, which stipulates that OBJECT IDENTIFIERS may have at most 128 sub-identifiers, and that the maximum value that each sub- identifier may have is 2^32-1 (4294967295 decimal). For each byte of every sub-identifier, only the 7 lower bits are part of the value, so the maximum amount of bytes that an OBJECT IDENTIFIER with these restrictions may occupy is 32 * 128 / 7, which is approximately 586 bytes. Ref: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5 * Reworked the Fix for the Timing Oracle in RSA Decryption (CVE-2022-4304, bsc#1207534). The previous fix for this timing side channel turned out to cause a severe 2-3x performance regression in the typical use case compared to 1.1.1s. The new fix uses existing constant time code paths, and restores the previous performance level while fully eliminating all existing timing side channels. The fix was developed by Bernd Edlinger with testing support by Hubert Kario. * Corrected documentation of X509_VERIFY_PARAM_add0_policy() to mention that it does not enable policy checking. Thanks to David Benjamin for discovering this issue. (CVE-2023-0466, bsc#1209873) * Corrected documentation of X509_VERIFY_PARAM_add0_policy() to mention that it does not enable policy checking. Thanks to David Benjamin for discovering this issue. (CVE-2023-0466, bsc#1209873) * Fixed an issue where invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. (CVE-2023-0465, bsc#1209878) * Limited the number of nodes created in a policy tree to mitigate against CVE-2023-0464. The default limit is set to 1000 nodes, which should be sufficient for most installations. If required, the limit can be adjusted by setting the OPENSSL_POLICY_TREE_NODES_MAX build time define to a desired maximum number of nodes or zero to allow unlimited growth. (CVE-2023-0464, bsc#1209624) * Rebased patch openssl-1_1-openssl-config.patch * Removed patches: - openssl-CVE-2023-0464.patch - openssl-CVE-2023-0465.patch - openssl-CVE-2023-0466.patch * Update openssl.keyring with key A21F AB74 B008 8AA3 6115 2586 B8EF 1A6B A9DA 2D5C (Tomas Mraz)- Update further expiring certificates that affect tests [bsc#1201627] * Add openssl-Update-further-expiring-certificates.patch- FIPS: Merge libopenssl1_1-hmac package into the library [bsc#1185116]- Security Fix: [CVE-2023-2650, bsc#1211430] * Possible DoS translating ASN.1 object identifiers * Add openssl-CVE-2023-2650.patch- Security Fix: [CVE-2023-0465, bsc#1209878] * Invalid certificate policies in leaf certificates are silently ignored * Add openssl-CVE-2023-0465.patch - Security Fix: [CVE-2023-0466, bsc#1209873] * Certificate policy check not enabled * Add openssl-CVE-2023-0466.patch- Security Fix: [CVE-2023-0464, bsc#1209624] * Excessive Resource Usage Verifying X.509 Policy Constraints * Add openssl-CVE-2023-0464.patch- FIPS: Service-level indicator [bsc#1208998] * Add additional check required by FIPS 140-3. Minimum values for PBKDF2 are: 112 bits for key, 128 bits for salt, 1000 for iteration count and 20 characters for password. * Add openssl-1_1-ossl-sli-008-pbkdf2-salt_pass_iteration.patch- FIPS: Serialize jitterentropy calls [bsc#1207994] * Add openssl-1_1-serialize-jitterentropy-calls.patch- Update to 1.1.1t: * Fixed X.400 address type confusion in X.509 GeneralName. There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but subsequently interpreted by GENERAL_NAME_cmp as an ASN1_TYPE. This vulnerability may allow an attacker who can provide a certificate chain and CRL (neither of which need have a valid signature) to pass arbitrary pointers to a memcmp call, creating a possible read primitive, subject to some constraints. Refer to the advisory for more information. Thanks to David Benjamin for discovering this issue. [bsc#1207533, CVE-2023-0286] This issue has been fixed by changing the public header file definition of GENERAL_NAME so that x400Address reflects the implementation. It was not possible for any existing application to successfully use the existing definition; however, if any application references the x400Address field (e.g. in dead code), note that the type of this field has changed. There is no ABI change. * Fixed Use-after-free following BIO_new_NDEF. The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. [bsc#1207536, CVE-2023-0215] * Fixed Double free after calling PEM_read_bio_ex. The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. [bsc#1207538, CVE-2022-4450] [Kurt Roeckx, Matt Caswell] * Fixed Timing Oracle in RSA Decryption. A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. [bsc#1207534, CVE-2022-4304] * Rebased openssl-1_1-openssl-config.patch * Update openssl.keyring with key 7953 AC1F BC3D C8B3 B292 393E D5E9 E43F 7DF9 EE8C (Richard Levitte)- Security Fix: [bsc#1207533, CVE-2023-0286] * Fix X.400 address type confusion in X.509 GENERAL_NAME_cmp for x400Address * Add openssl-CVE-2023-0286.patch- Security Fix: [bsc#1207536, CVE-2023-0215] * Use-after-free following BIO_new_NDEF() * Add patches: - openssl-CVE-2023-0215-1of4.patch - openssl-CVE-2023-0215-2of4.patch - openssl-CVE-2023-0215-3of4.patch - openssl-CVE-2023-0215-4of4.patch- Security Fix: [bsc#1207538, CVE-2022-4450] * Double free after calling PEM_read_bio_ex() * Add patches: - openssl-CVE-2022-4450-1of2.patch - openssl-CVE-2022-4450-2of2.patch- Security Fix: [bsc#1207534, CVE-2022-4304] * Timing Oracle in RSA Decryption * Add patches: - openssl-CVE-2022-4304-1of2.patch - openssl-CVE-2022-4304-2of2.patch- POWER10 performance enhancements for cryptography [jsc#PED-512] * openssl-1_1-AES-GCM-performance-optimzation-with-stitched-method.patch * openssl-1_1-Fixed-counter-overflow.patch * openssl-1_1-chacha20-performance-optimizations-for-ppc64le-with-.patch * openssl-1_1-Fixed-conditional-statement-testing-64-and-256-bytes.patch * openssl-1_1-Fix-AES-GCM-on-Power-8-CPUs.patch- FIPS: Service-level indicator [bsc#1190651] * Mark PBKDF2 with key shorter than 112 bits as non-approved * Add openssl-1_1-ossl-sli-007-pbkdf2-keylen.patch- FIPS: Service-level indicator [bsc#1190651] * Consider RSA siggen/sigver with PKCS1 padding also approved * Add openssl-1_1-ossl-sli-006-rsa_pkcs1_padding.patch- FIPS: Service-level indicator [bsc#1190651] * Return the correct indicator for a given EC group order bits * Add openssl-1_1-ossl-sli-005-EC_group_order_bits.patch- Updated openssl.keyring with key A21FAB74B0088AA361152586B8EF1A6BA9DA2D5C - Update to 1.1.1s: * Fixed a regression introduced in 1.1.1r version not refreshing the certificate data to be signed before signing the certificate. - Update to 1.1.1r: * Fixed the linux-mips64 Configure target which was missing the SIXTY_FOUR_BIT bn_ops flag. This was causing heap corruption on that platform. * Fixed a strict aliasing problem in bn_nist. Clang-14 optimisation was causing incorrect results in some cases as a result. * Fixed SSL_pending() and SSL_has_pending() with DTLS which were failing to report correct results in some cases * Fixed a regression introduced in 1.1.1o for re-signing certificates with different key sizes * Added the loongarch64 target * Fixed a DRBG seed propagation thread safety issue * Fixed a memory leak in tls13_generate_secret * Fixed reported performance degradation on aarch64. Restored the implementation prior to commit 2621751 ("aes/asm/aesv8-armx.pl: avoid 32-bit lane assignment in CTR mode") for 64bit targets only, since it is reportedly 2-17% slower and the silicon errata only affects 32bit targets. The new algorithm is still used for 32 bit targets. * Added a missing header for memcmp that caused compilation failure on some platforms- FIPS: Add a missing dependency on jitterentropy-devel for libopenssl-1_1-devel [bsc#1202148]- FIPS: OpenSSL service-level indicator - Allow AES XTS 256 [bsc#1190651] * Add patches: openssl-1_1-ossl-sli-004-allow-aes-xts-256.patch- FIPS: Default to RFC-7919 groups for genparam and dhparam * Add openssl-1_1-FIPS-default-RFC7919.patch [bsc#1180995]- FIPS: list only FIPS approved digest and public key algorithms [bsc#1121365, bsc#1190888, bsc#1193859, bsc#1198471, bsc#1198472] * Add openssl-1_1-fips-list-only-approved-digest-and-pubkey-algorithms.patch * Disabled test 15-test_ec.t in FIPS mode- FIPS: Add KAT for the RAND_DRBG implementation [bsc#1203069] * Add openssl-1_1-fips-drbg-selftest.patch- FIPS: openssl: RAND api should call into FIPS DRBG [bsc#1201293] * The FIPS_drbg implementation is not FIPS validated anymore. To provide backwards compatibility for applications that need FIPS compliant RNG number generation and use FIPS_drbg_generate, this function was re-wired to call the FIPS validated DRBG instance instead through the RAND_bytes() call. * Add openssl-1_1-FIPS_drbg-rewire.patch- Fix memory leaks introduced by openssl-1.1.1-fips.patch [bsc#1203046] * Add patch openssl-1.1.1-fips-fix-memory-leaks.patch- FIPS: OpenSSL: Port openssl to use jitterentropy [bsc#1202148, jsc#SLE-24941] * Add openssl-1_1-jitterentropy-3.4.0.patch * Add build dependency on jitterentropy-devel >= 3.4.0 and libjitterentropy3 >= 3.4.0- FIPS: OpenSSL Provide a service-level indicator [bsc#1190651] * Add patches: - openssl-1_1-ossl-sli-000-fix-build-error.patch - openssl-1_1-ossl-sli-001-fix-faults-preventing-make-update.patch - openssl-1_1-ossl-sli-002-ran-make-update.patch - openssl-1_1-ossl-sli-003-add-sli.patch- FIPS: Add zeroization of temporary variables to the hmac integrity function FIPSCHECK_verify(). [bsc#1190653] * Add openssl-1_1-Zeroization.patch- update to 1.1.1q: * [CVE-2022-2097, bsc#1201099] * Addresses situations where AES OCB fails to encrypt some bytes- Encrypt the sixteen bytes that were unencrypted in some circumstances on 32-bit x86 platforms. * [bsc#1201099, CVE-2022-2097] * added openssl-CVE-2022-2097.patch- Update to 1.1.1p: * bsc#1185637 - updated certificates required for testing that failed when date is later than 1 June 2022 - removed openssl-update_expired_certificates.patch * [bsc#1200550, CVE-2022-2068] - more shell code injection issues in c_rehash- Added openssl-1_1-Fix-file-operations-in-c_rehash.patch * bsc#1200550 * CVE-2022-2068 * Fixed more shell code injection issues in c_rehash- Update to 1.1.1o: [CVE-2022-1292, bsc#1199166] * Fixed a bug in the c_rehash script which was not properly sanitising shell metacharacters to prevent command injection. * Rebased openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch * Rebased openssl-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch - Added openssl-update_expired_certificates.patch * Openssl failed tests because of expired certificates. * bsc#1185637 * Sourced from https://github.com/openssl/openssl/pull/18446/commits- Added openssl-update_expired_certificates.patch * Openssl failed tests because of expired certificates. * bsc#1185637 * Sourced from https://github.com/openssl/openssl/pull/18446/commits- Security fix: [bsc#1199166, CVE-2022-1292] * Added: openssl-CVE-2022-1292.patch * properly sanitise shell metacharacters in c_rehash script.- FIPS: Added signature verification test to bsc1185319-FIPS-KAT-for-ECDSA.patch- FIPS: add bsc1185319-FIPS-KAT-for-ECDSA.patch * Known answer test for ECDSA * bsc#1185319 - FIPS: add bsc1198207-FIPS-add-hash_hmac-drbg-kat.patch * Enable tests for Deterministic Random Bit Generator * bsc#1198207 - Bypass a regression test that fails in FIPS mode. * [openssl-1_1-shortcut-test_afalg_aes_cbc.patch]- FIPS: Additional PBKDF2 requirements for KAT [bsc#1197280] * The IG 10.3.A and SP800-132 require some minimum parameters for the salt length, password length and iteration count. These parameters should be also used in the KAT. * Add openssl-1_1-FIPS-PBKDF2-KAT-requirements.patch- Security Fix: [bsc#1196877, CVE-2022-0778] * Infinite loop in BN_mod_sqrt() reachable when parsing certificates * Add openssl-CVE-2022-0778.patch openssl-CVE-2022-0778-tests.patch- Added openssl-1_1-use-include-directive.patch so that the default /etc/ssl/openssl.cnf file will include any configuration files that other packages might place into /etc/ssl/engines.d/ and /etc/ssl/engdef.d/ This is a fix for bsc#1004463 where scripting was being used to modify the openssl.cnf file. The scripting would fail if either the default openssl.cnf file, or the sample openssl-ibmca configuration file would be changed by upstream. - Updated spec file to create the two new necessary directores for the above patch. [bsc#1194187, bsc#1004463]- FIPS: add openssl-1_1-fips-bsc1190652_release_num_in_version_string.patch * bsc#1190652 - Provide a service to output module name/identifier and version- Security fix: [bsc#1192820, CVE-2002-20001] * Fix DHEATER: The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE calculation. * Stop recommending the DHE in SSL_DEFAULT_SUSE_CIPHER_LIST * Rebase openssl-DEFAULT_SUSE_cipher.patch- FIPS: Reintroduce the FFC and ECC checks in openssl-DH.patch that were removed in the update to 1.1.1l [bsc#1185313]- FIPS: Fix sn_objs and ln_objs in crypto/objects/obj_mac.num * Rebase openssl-DH.patch [bsc#1194327] - Merge openssl-keep_EVP_KDF_functions_version.patch into openssl-1.1.1-evp-kdf.patch - Add function codes for pbkdf2, hkdf, tls and ssh selftests. Rebase patches: * openssl-fips-kdf-hkdf-selftest.patch * openssl-kdf-selftest.patch * openssl-kdf-ssh-selftest.patch * openssl-kdf-tls-selftest.patch- Pull libopenssl-1_1 when updating openssl-1_1 with the same version. [bsc#1195792]- FIPS: Fix function and reason error codes [bsc#1182959] * Add openssl-1_1-FIPS-fix-error-reason-codes.patch- Enable zlib compression support [bsc#1195149]- Remove the openssl-has-RSA_get0_pss_params provides as it is now fixed in the nodejs16 side [bsc#1192489]- FIPS: Move the HMAC-SHA2-256 used for integrity test [bsc#1185320] * Add openssl-FIPS-KAT-before-integrity-tests.patch- FIPS: Add missing KAT for HKDF/TLS 1.3/IPSEC IKEv2 [bsc#1192442] * Add openssl-fips-kdf-hkdf-selftest.patch- Add a provides for openssl-has-RSA_get0_pss_params as required by nodejs16. [bsc#1192489]- Backport cryptographic improvements from OpenSSL 3 [jsc#SLE-19742] * Optimize RSA on armv8: openssl-1_1-Optimize-RSA-armv8.patch * Optimize AES-XTS mode for aarch64: openssl-1_1-Optimize-AES-XTS-aarch64.patch * Optimize AES-GCM for uarchs with unroll and new instructions: openssl-1_1-Optimize-AES-GCM-uarchs.patch- Update to 1.1.1m: * Avoid loading of a dynamic engine twice. * Prioritise DANE TLSA issuer certs over peer certs - Rebased patches: * openssl-1.1.1-evp-kdf.patch * openssl-1.1.1-system-cipherlist.patch- Add support for livepatches (jsc#SLE-20049). - Generate ipa-clones tarball artifact when livepatching is enabled.- POWER10 performance enhancements for cryptography [jsc#SLE-18136] * openssl-1_1-Optimize-ppc64.patch- Drop openssl-no-date.patch Upstream added support for reproducible builds via SOURCE_DATE_EPOCH in https://github.com/openssl/openssl/commit/8a8d9e190533ee41e8b231b18c7837f98f1ae231 thereby making this patch obsolete as builds *should* still be reproducible.- Import centralized crypto policy profile from Factory [jsc#SLE-15832] * openssl-1.1.1-system-cipherlist.patch * openssl-1_1-disable-test_srp-sslapi.patch * openssl-1_1-seclevel.patch * openssl-1_1-use-seclevel2-in-tests.patch- Update to openssl-1.1.1l ('L' as in 'Lima') for SUSE-SLE-15-SP4 * jsc#SLE-19640, jsc#PM-2816 - Changes in 1.1.1l: * [bsc#1189520, CVE-2021-3711] Fixed an SM2 Decryption Buffer Overflow. * [bsc#1189521, CVE-2021-3712] Fixed various read buffer overruns processing ASN.1 strings - Changes in 1.1.1k * Fixed a problem with verifying a certificate chain when using the X509_V_FLAG_X509_STRICT flag. This flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. ([CVE-2021-3450]) [bsc#1183851] * Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. ([CVE-2021-3449]) [bsc#1183852] - Changes in 1.1.1j * Fixed the X509_issuer_and_serial_hash() function. It attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it was failing to correctly handle any errors that may occur while parsing the issuer field [bsc#1182331, CVE-2021-23841] * Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING padding mode to correctly check for rollback attacks. * Fixed the EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate functions. Previously they could overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call would be 1 (indicating success), but the output length value would be negative. This could cause applications to behave incorrectly or crash. [bsc#1182333, CVE-2021-23840] * Fixed SRP_Calc_client_key so that it runs in constant time. The previous implementation called BN_mod_exp without setting BN_FLG_CONSTTIME. This could be exploited in a side channel attack to recover the password. Since the attack is local host only this is outside of the current OpenSSL threat model and therefore no CVE is assigned. - Changes in 1.1.1i * Fixed NULL pointer deref in GENERAL_NAME_cmp * bsc#1179491, CVE-2020-1971 - Changes in 1.1.1h * Disallow explicit curve parameters in verifications chains when X509_V_FLAG_X509_STRICT is used * Enable 'MinProtocol' and 'MaxProtocol' to configure both TLS and DTLS contexts - Changes in 1.1.1g * Fixed segmentation fault in SSL_check_chain (CVE-2020-1967, bsc#1169407) Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. * Added AES consttime code for no-asm configurations an optional constant time support for AES was added when building openssl for no-asm. - Changes in 1.1.1f * Revert the unexpected EOF reporting via SSL_ERROR_SSL - Changes in 1.1.1e * Properly detect EOF while reading in libssl. Previously if we hit an EOF while reading in libssl then we would report an error back to the application (SSL_ERROR_SYSCALL) but errno would be 0. We now add an error to the stack (which means we instead return SSL_ERROR_SSL) and therefore give a hint as to what went wrong. * Check that ed25519 and ed448 are allowed by the security level. Previously signature algorithms not using an MD were not being checked that they were allowed by the security level. * Fixed SSL_get_servername() behaviour. The behaviour of SSL_get_servername() was not quite right. The behaviour was not consistent between resumption and normal handshakes, and also not quite consistent with historical behaviour. The behaviour in various scenarios has been clarified and it has been updated to make it match historical behaviour as closely as possible. * Corrected the documentation of the return values from the EVP_DigestSign* set of functions. The documentation mentioned negative values for some errors, but this was never the case, so the mention of negative values was removed. * Added a new method to gather entropy on VMS, based on SYS$GET_ENTROPY. The presence of this system service is determined at run-time. * Added newline escaping functionality to a filename when using openssl dgst. This output format is to replicate the output format found in the '*sum' checksum programs. This aims to preserve backward compatibility. * Print all values for a PKCS#12 attribute with 'openssl pkcs12', not just the first value. - Dropped the following patches: * openssl-1_1-CVE-2019-1551.patch * openssl-fips-dont_run_FIPS_module_installed.patch * openssl-fips_fix_selftests_return_value.patch * openssl-CVE-2020-1967.patch * openssl-CVE-2020-1967-test1.patch * openssl-CVE-2020-1967-test2.patch * openssl-CVE-2020-1967-test3.patch * openssl-CVE-2020-1971.patch * openssl-CVE-2021-23840.patch * openssl-CVE-2021-23841.patch * openssl-1_1-CVE-2021-3449-NULL_pointer_deref_in_signature_algorithms.patch * openssl-1.1.1-fips_list_ciphers.patch * CVE-2021-3711-1-Correctly-calculate-the-length-of-SM2-plaintext-give.patch * CVE-2021-3711-2-Extend-tests-for-SM2-decryption.patch * CVE-2021-3711-3-Check-the-plaintext-buffer-is-large-enough-when-decr.patch * CVE-2021-3712-Fix-read-buffer-overrun-in-X509_aux_print.patch * CVE-2021-3712-other-ASN1_STRING-issues.patch - Rebased the following patches: * 0002-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch * 0003-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch * openssl-1.1.0-issuer-hash.patch * openssl-1.1.0-no-html.patch * openssl-1.1.1-evp-kdf.patch * openssl-1.1.1-fips-crng-test.patch * openssl-1.1.1-fips-post-rand.patch * openssl-1.1.1-fips.patch * openssl-1.1.1-ssh-kdf.patch * openssl-DH.patch * openssl-Enable-curve-spefific-ECDSA-implementations-via-EC_M.patch * openssl-assembly-pack-accelerate-scalar-multiplication.patch * openssl-fips_selftest_upstream_drbg.patch * openssl-kdf-selftest.patch * openssl-kdf-ssh-selftest.patch * openssl-kdf-tls-selftest.patch * openssl-s390x-assembly-pack-accelerate-ECDSA.patch * openssl-s390x-assembly-pack-accelerate-X25519-X448-Ed25519-and-Ed448.patch * openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch * openssl-s390x-fix-x448-and-x448-test-vector-ctime-for-x25519-and-x448.patch- Other OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. * CVE-2021-3712 continued * bsc#1189521 * Add CVE-2021-3712-other-ASN1_STRING-issues.patch * Sourced from openssl-CVE-2021-3712.tar.bz2 posted on bsc-1189521 2021-08-24 00:47 PDT by Marcus Meissner- A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. * CVE-2021-3711 * bsc#1189520 * Add: CVE-2021-3711-1-Correctly-calculate-the-length-of-SM2-plaintext-give.patch CVE-2021-3711-2-Extend-tests-for-SM2-decryption.patch CVE-2021-3711-3-Check-the-plaintext-buffer-is-large-enough-when-decr.patch - The function X509_aux_print() has a bug which may cause a read buffer overrun when printing certificate details. A malicious actor could construct a certificate to deliberately hit this bug, which may result in a crash of the application (causing a Denial of Service attack). * CVE-2021-3712 * bsc#1189521 * Add CVE-2021-3712-Fix-read-buffer-overrun-in-X509_aux_print.patch- Don't list disapproved cipher algorithms while in FIPS mode * openssl-1.1.1-fips_list_ciphers.patch * bsc#1161276- Fix NULL pointer deref in signature_algorithms * CVE-2021-3449 * bsc#1183852 * Add openssl-1_1-CVE-2021-3449-NULL_pointer_deref_in_signature_algorithms.patch- Security fixes: * Integer overflow in CipherUpdate: Incorrect SSLv2 rollback protection [bsc#1182333, CVE-2021-23840] * Null pointer deref in X509_issuer_and_serial_hash() [bsc#1182331, CVE-2021-23841] - Add openssl-CVE-2021-23840.patch openssl-CVE-2021-23841.patch- Fix unresolved error codes [bsc#1182959] - Update openssl-1.1.1-fips.patch- Fix EDIPARTYNAME NULL pointer dereference (CVE-2020-1971, bsc#1179491) * add openssl-CVE-2020-1971.patch- Restore private key check in EC_KEY_check_key [bsc#1177479] * Update openssl-DH.patch- Add shared secret KAT to FIPS DH selftest [bsc#1175844] * add openssl-fips-DH_selftest_shared_secret_KAT.patch- Include ECDH/DH Requirements from SP800-56Arev3 [bsc#1175844, bsc#1173470] - Add patches: * openssl-DH.patch * openssl-kdf-selftest.patch * openssl-kdf-tls-selftest.patch * openssl-kdf-ssh-selftest.patch- Security fix: [bsc#1169407, CVE-2020-1967] * Segmentation fault in SSL_check_chain: Server applications that call the SSL_check_chain() function during or after a TLS handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the signature_algorithms_cert TLS extension. - Add patches: * openssl-CVE-2020-1967.patch * openssl-CVE-2020-1967-test1.patch * openssl-CVE-2020-1967-test2.patch * openssl-CVE-2020-1967-test3.patch- openssl dgst: default to SHA256 only when called without a digest, not when it couldn't be found (bsc#1166189) * add openssl-unknown_dgst.patch- Limit the DRBG selftests to not deplete entropy (bsc#1165274) * update openssl-fips_selftest_upstream_drbg.patch- Run FIPS DRBG selftests against the crypto/rand DRBG implementation (bsc#1164557) * add openssl-fips_selftest_upstream_drbg.patch- Use the newly build libcrypto shared library when computing the hmac checksums in order to avoid a bootstrapping issue by BuildRequiring libopenssl1_1 (bsc#1164102)- Fix wrong return values of FIPS DSA and ECDH selftests (bsc#1163569) * add openssl-fips_fix_selftests_return_value.patch- Added SHA3 FIPS self-tests bsc#1155345 * openssl-fips-add-SHA3-selftest.patch- Support for CPACF enhancements - part 2 (crypto) [jsc#SLE-7403] - Add patches: * openssl-s390x-assembly-pack-accelerate-X25519-X448-Ed25519-and-Ed448.patch * openssl-s390x-fix-x448-and-x448-test-vector-ctime-for-x25519-and-x448.patch- Temporarily ignore broken OPENSSL_INIT_NO_ATEXIT due to our layered FIPS initialization (bsc#1161789) * openssl-fips-ignore_broken_atexit_test.patch- Import FIPS patches from SLE-15 * openssl-fips-dont_run_FIPS_module_installed.patch * openssl-fips_mode.patch * openssl-ship_fips_standalone_hmac.patch * openssl-fips-clearerror.patch * openssl-fips-selftests_in_nonfips_mode.patch- Don't run FIPS power-up self-tests when the checksum files aren't installed (bsc#1042392) * add openssl-fips-run_selftests_only_when_module_is_complete.patch- Import FIPS patches from Fedora (bsc#1157702, jsc#SLE-9553) * openssl-1.1.1-fips-crng-test.patch * openssl-1.1.1-fips-post-rand.patch * openssl-1.1.1-fips.patch * openssl-1.1.0-issuer-hash.patch * openssl-1.1.1-evp-kdf.patch * openssl-1.1.1-ssh-kdf.patch replaces openssl-jsc-SLE-8789-backport_KDF.patch - keep EVP_KDF functions at version 1.1.1d for backward compatibility * add openssl-keep_EVP_KDF_functions_version.patch- Support for CPACF enhancements - part 1 (crypto) [bsc#1152695, jsc#SLE-7861] - Add patches: * openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch * openssl-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch * openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch * openssl-s390x-assembly-pack-update-OPENSSL_s390xcap-3.patch * openssl-s390xcpuid.pl-fix-comment.patch * openssl-assembly-pack-accelerate-scalar-multiplication.patch * openssl-Enable-curve-spefific-ECDSA-implementations-via-EC_M.patch * openssl-s390x-assembly-pack-accelerate-ECDSA.patch * openssl-OPENSSL_s390xcap.pod-list-msa9-facility-bit-155.patch * openssl-s390x-assembly-pack-cleanse-only-sensitive-fields.patch * openssl-s390x-assembly-pack-fix-OPENSSL_s390xcap-z15-cpu-mas.patch * openssl-s390x-assembly-pack-fix-msa3-stfle-bit-detection.patch * openssl-Fix-9bf682f-which-broke-nistp224_method.patch- Obsolete libopenssl-1_0_0-devel and libopenssl-1_0_0-hmac in order to avoid conflict upon upgrade from SLE-12 (bsc#1158499)- Security fix: [bsc#1158809, CVE-2019-1551] * Overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli - Add openssl-1_1-CVE-2019-1551.patch- Fixed EVP_PBE_scrypt() to allow NULL salt values. * Revealed by nodejs12 during bsc#1149572. * Modified openssl-jsc-SLE-8789-backport_KDF.patch- Update to 1.1.1d (bsc#1133925, jsc#SLE-6430) * Fixed a fork protection issue. OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. (bsc#1150247, CVE-2019-1549) * Compute ECC cofactors if not provided during EC_GROUP construction. Before this change, EC_GROUP_set_generator would accept order and/or cofactor as NULL. After this change, only the cofactor parameter can be NULL. (bsc#1150003, CVE-2019-1547) * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey. (bsc#1150250, CVE-2019-1563) * For built-in EC curves, ensure an EC_GROUP built from the curve name is used even when parsing explicit parameters, when loading a serialized key or calling EC_GROUP_new_from_ecpkparameters()/EC_GROUP_new_from_ecparameters(). * Early start up entropy quality from the DEVRANDOM seed source has been improved for older Linux systems. * Changed DH_check to accept parameters with order q and 2q subgroups. With order 2q subgroups the bit 0 of the private key is not secret but DH_generate_key works around that by clearing bit 0 of the private key for those. This avoids leaking bit 0 of the private key. * Significantly reduce secure memory usage by the randomness pools. * Revert the DEVRANDOM_WAIT feature for Linux systems - drop 0001-build_SYS_str_reasons-Fix-a-crash-caused-by-overlong.patch (upstream) - refresh patches * openssl-1.1.0-no-html.patch * openssl-jsc-SLE-8789-backport_KDF.patch- To avoid seperate certification of openssh server / client move the SSH KDF (Key Derivation Function) into openssl. * jsc#SLE-8789 * Sourced from commit 8d76481b189b7195ef932e0fb8f0e23ab0120771#diff-a9562bc75317360a2e6b8b0748956e34 in openssl master (introduce the SSH KDF) and commit 5a285addbf39f91d567f95f04b2b41764127950d in openssl master (backport EVP/KDF API framework) * added openssl-jsc-SLE-8789-backport_KDF.patch- Upgrade to 1.1.1c (jsc#SLE-9135, bsc#1148799) * Support for TLSv1.3 added * Allow GNU style "make variables" to be used with Configure. * Add a STORE module (OSSL_STORE) * Claim the namespaces OSSL and OPENSSL, represented as symbol prefixes * Add multi-prime RSA (RFC 8017) support * Add SM3 implemented according to GB/T 32905-2016 * Add SM4 implemented according to GB/T 32907-2016. * Add 'Maximum Fragment Length' TLS extension negotiation and support * Add ARIA support * Add SHA3 * Rewrite of devcrypto engine * Add support for SipHash * Grand redesign of the OpenSSL random generator - drop FIPS support * don't build with FIPS mode (not supported in 1.1.1) - drop FIPS patches * openssl-fips-clearerror.patch * openssl-fips_disallow_ENGINE_loading.patch * openssl-fips-dont-fall-back-to-default-digest.patch * openssl-fips-dont_run_FIPS_module_installed.patch * openssl-fips-fix-odd-rsakeybits.patch * openssl-fips-rsagen-d-bits.patch * openssl-fips-selftests_in_nonfips_mode.patch * openssl-rsakeygen-minimum-distance.patch * openssl-1.1.0-fips.patch - add TLS 1.3 ciphers to DEFAULT_SUSE - merge openssl-1.0.1e-add-suse-default-cipher.patch and openssl-1.0.1e-add-test-suse-default-cipher-suite.patch to openssl-DEFAULT_SUSE_cipher.patch - Use upstream patch for the locale crash (bsc#1135550) * https://github.com/openssl/openssl/pull/8966 * add 0001-build_SYS_str_reasons-Fix-a-crash-caused-by-overlong.patch - drop patches (upstream): * openssl-Bleichenbachers_CAT.patch * openssl-CVE-2018-0734.patch * openssl-CVE-2018-0735.patch * openssl-CVE-2019-1543.patch * openssl-disable_rsa_keygen_tests_with_small_modulus.patch * openssl-dsa_paramgen2_check.patch * openssl-One_and_Done.patch * openssl-speed_skip_binary_curves_NO_EC2M.patch * openssl-static-deps.patch * openssl-urandom-reseeding.patch * 0001-Add-a-constant-time-flag-to-one-of-the-bignums-to-av.patch * 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch * 0001-DSA-mod-inverse-fix.patch * 0001-Resume-reading-from-randfile-when-interrupted-by-a-s.patch * 0001-apps-speed-fix-segfault-while-looking-up-algorithm-n.patch - drop s390x patches (rebased): * 0002-s390x-assembly-pack-add-KMA-code-path-for-aes-ctr.patch * 0003-crypto-aes-asm-aes-s390x.pl-replace-decrypt-flag-by-.patch * 0004-s390x-assembly-pack-add-KMA-code-path-for-aes-gcm.patch * 0005-s390x-assembly-pack-add-KMAC-code-path-for-aes-ccm.patch * 0006-s390x-assembly-pack-add-KM-code-path-for-aes-ecb.patch * 0007-s390x-assembly-pack-add-KMO-code-path-for-aes-ofb.patch * 0008-s390x-assembly-pack-add-KMF-code-path-for-aes-cfb-cf.patch * 0009-Fix-undefined-behavior-in-s390x-aes-gcm-ccm.patch * 0001-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch * 0001-s390x-assembly-pack-extend-s390x-capability-vector.patch - add s390x patches: * 0001-s390x-assembly-pack-perlasm-support.patch * 0002-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch * 0003-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch * 0004-s390x-assembly-pack-fix-formal-interface-bug-in-chac.patch * 0005-s390x-assembly-pack-import-chacha-from-cryptogams-re.patch * 0006-s390x-assembly-pack-import-poly-from-cryptogams-repo.patch- Fix segfault in openssl speed when an unknown algorithm is passed (bsc#1125494) * add 0001-apps-speed-fix-segfault-while-looking-up-algorithm-n.patch - Correctly skip binary curves in openssl speed to avoid spitting errors (bsc#1116833) * add openssl-speed_skip_binary_curves_NO_EC2M.patch- OpenSSL Security Advisory [6 March 2019] * Prevent long nonces in ChaCha20-Poly1305 (bsc#1128189, CVE-2019-1543) * add openssl-CVE-2019-1543.patch- Add s390x poly1305 vectorized implementation (fate#326351) * https://github.com/openssl/openssl/pull/7991 - add 0001-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch- Add vectorized chacha20 implementation for s390x (fate#326561) * https://github.com/openssl/openssl/pull/6919 - add patches: 0001-s390x-assembly-pack-perlasm-support.patch 0002-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch- Replace fate#321518 s390x patches from closed pull request https://github.com/openssl/openssl/pull/2859 with patches from openssl git master (bsc#1122984) - add patches: 0001-s390x-assembly-pack-extend-s390x-capability-vector.patch 0002-s390x-assembly-pack-add-KMA-code-path-for-aes-ctr.patch 0003-crypto-aes-asm-aes-s390x.pl-replace-decrypt-flag-by-.patch 0004-s390x-assembly-pack-add-KMA-code-path-for-aes-gcm.patch 0005-s390x-assembly-pack-add-KMAC-code-path-for-aes-ccm.patch 0006-s390x-assembly-pack-add-KM-code-path-for-aes-ecb.patch 0007-s390x-assembly-pack-add-KMO-code-path-for-aes-ofb.patch 0008-s390x-assembly-pack-add-KMF-code-path-for-aes-cfb-cf.patch 0009-Fix-undefined-behavior-in-s390x-aes-gcm-ccm.patch - drop patches: 0002-crypto-modes-asm-ghash-s390x.pl-fix-gcm_gmult_4bit-K.patch 0004-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch 0005-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch 0006-s390x-assembly-pack-extended-s390x-capability-vector.patch 0007-crypto-evp-e_aes.c-add-foundations-for-extended-s390.patch 0008-s390x-assembly-pack-extended-s390x-capability-vector.patch 0009-crypto-aes-asm-aes-s390x.pl-add-KMA-code-path.patch 0010-doc-man3-OPENSSL_s390xcap.pod-update-KMA.patch 0011-crypto-aes-asm-aes-s390x.pl-add-CFI-annotations-KMA-.patch 0012-s390x-assembly-pack-add-KMA-code-path-for-aes-gcm.patch 0013-crypto-aes-asm-aes-s390x.pl-add-CFI-annotations-KMA-.patch- Fix FIPS RSA generator (bsc#1118913) * import fixed openssl-1.1.0-fips.patch from Fedora * drop openssl-CVE-2018-0737-fips.patch which got merged into openssl-1.1.0-fips.patch * refresh openssl-fips-rsagen-d-bits.patch- The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations (bsc#1117951) * https://github.com/openssl/openssl/issues/7739 * add patch openssl-Bleichenbachers_CAT.patch- OpenSSL Security Advisory [30 October 2018] * Timing vulnerability in ECDSA signature generation (bsc#1113651, CVE-2018-0735) * Timing vulnerability in DSA signature generation (bsc#1113652, CVE-2018-0734) * And more timing fixes - Add patches: * openssl-CVE-2018-0734.patch * openssl-CVE-2018-0735.patch * 0001-DSA-mod-inverse-fix.patch * 0001-Add-a-constant-time-flag-to-one-of-the-bignums-to-av.patch- Obsolete libopenssl-1_0_0-devel by libopenssl-1_1-devel to avoid conflicts when updating from older distributions (bsc#1106180)- Fix infinite loop in DSA generation with incorrect parameters (bsc#1112209) * add openssl-dsa_paramgen2_check.patch- Fix One&Done side-channel attack on RSA (bsc#1104789) * add openssl-One_and_Done.patch- Update to 1.1.0i - Align with SLE-12-SP4 OpenSSL Security Advisory [12 June 2018] * Reject excessively large primes in DH key generation (bsc#1097158, CVE-2018-0732) * Make EVP_PKEY_asn1_new() a bit stricter about its input * Revert blinding in ECDSA sign and instead make problematic addition length-invariant. Switch even to fixed-length Montgomery multiplication. * Change generating and checking of primes so that the error rate of not being prime depends on the intended use based on the size of the input. * Increase the number of Miller-Rabin rounds for DSA key generating to 64. * Add blinding to ECDSA and DSA signatures to protect against side channel attacks * When unlocking a pass phrase protected PEM file or PKCS#8 container, we now allow empty (zero character) pass phrases. * Certificate time validation (X509_cmp_time) enforces stricter compliance with RFC 5280. Fractional seconds and timezone offsets are no longer allowed. * Fixed a text canonicalisation bug in CMS - drop patches (upstream): * 0001-Limit-scope-of-CN-name-constraints.patch * 0001-Revert-util-dofile.pl-only-quote-stuff-that-actually.patch * 0001-Tolerate-a-Certificate-using-a-non-supported-group-o.patch * 0002-Skip-CN-DNS-name-constraint-checks-when-not-needed.patch * openssl-add-blinding-to-dsa.patch * openssl-add-blinding-to-ecdsa.patch * openssl-CVE-2018-0732.patch - refresh patches: * openssl-1.1.0-fips.patch * openssl-disable_rsa_keygen_tests_with_small_modulus.patch - rename openssl-CVE-2018-0737.patch to openssl-CVE-2018-0737-fips.patch as it now only includes changes to the fips code- Add openssl(cli) Provide so the packages that require the openssl binary can require this instead of the new openssl meta package (bsc#1101470) - Don't Require openssl-1_1 from the devel package, just Recommend it- Suggest libopenssl1_1-hmac from libopenssl1_1 package to avoid dependency issues during updates (bsc#1090765)- Relax CN name restrictions (bsc#1084011) * added patches: 0001-Limit-scope-of-CN-name-constraints.patch 0002-Skip-CN-DNS-name-constraint-checks-when-not-needed.patch- Reject excessively large primes in DH key generation (bsc#1097158, CVE-2018-0732) * openssl-CVE-2018-0732.patch - blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592) * openssl-add-blinding-to-ecdsa.patch * openssl-add-blinding-to-dsa.patch- OpenSSL Security Advisory [16 Apr 2018] * Cache timing vulnerability in RSA Key Generation (CVE-2018-0737, bsc#1089039) * add openssl-CVE-2018-0737.patch- Fix escaping in c_rehash (boo#1091961, bsc#1091963) * add 0001-Revert-util-dofile.pl-only-quote-stuff-that-actually.patch- Tolerate a Certificate using a non-supported group on server side (boo#1084651) * https://github.com/openssl/openssl/pull/5607 * add 0001-Tolerate-a-Certificate-using-a-non-supported-group-o.patch- Update to 1.1.0h OpenSSL Security Advisory [27 Mar 2018] * Constructed ASN.1 types with a recursive definition could exceed the stack (CVE-2018-0739) (bsc#1087102) * rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738) (bsc#1071906) - refresh patches: * 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch * openssl-1.1.0-fips.patch * openssl-pkgconfig.patch * openssl-rsakeygen-minimum-distance.patch * openssl-static-deps.patch- Move the libopenssl1_1_0-32bit obsoletes in baselibs.conf to the new libopenssl1_1-32bit: it does not belong to the devel package.- Renamed from openssl-1_1_0 (bsc#1081335) * All the minor versions of the 1.1.x openssl branch have the same sonum and keep ABI compatibility * obsolete the 1_1_0 packages - update baselibs.conf with the new version names- Remove bit obsolete syntax - Use %license macro- Don't disable afalgeng on aarch64- Add support for s390x CPACF enhancements (fate#321518) patches taken from https://github.com/openssl/openssl/pull/2859: * 0002-crypto-modes-asm-ghash-s390x.pl-fix-gcm_gmult_4bit-K.patch * 0004-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch * 0005-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch * 0006-s390x-assembly-pack-extended-s390x-capability-vector.patch * 0007-crypto-evp-e_aes.c-add-foundations-for-extended-s390.patch * 0008-s390x-assembly-pack-extended-s390x-capability-vector.patch * 0009-crypto-aes-asm-aes-s390x.pl-add-KMA-code-path.patch * 0010-doc-man3-OPENSSL_s390xcap.pod-update-KMA.patch * 0011-crypto-aes-asm-aes-s390x.pl-add-CFI-annotations-KMA-.patch * 0012-s390x-assembly-pack-add-KMA-code-path-for-aes-gcm.patch * 0013-crypto-aes-asm-aes-s390x.pl-add-CFI-annotations-KMA-.patch- Do not filter pkgconfig() provides/requires.- Obsolete openssl-1_0_0 by openssl-1_1_0: this is required for a clean upgrade path as an aid to zypp (boo#1070003).- Update to 1.1.0g OpenSSL Security Advisory [02 Nov 2017] * bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736) (bsc#1066242) * Malformed X.509 IPAddressFamily could cause OOB read (CVE-2017-3735) (bsc#1056058) - drop 0001-Fix-a-TLSProxy-race-condition.patch (upstream) - refresh 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch- update DEFAULT_SUSE cipher list (bsc#1055825) * add CHACHA20-POLY1305 * add ECDSA ciphers * remove 3DES - modified openssl-1.0.1e-add-suse-default-cipher.patch- do not require openssl1_1_0-targettype in devel-targettype, as it is not built (it has no libraries)- The description is supposed to describe the package, not the development process or history. (Synchronize with the already-updates descriptions in openssl-1_0_0.) - Update historic copypasted boilerplate summaries ("include files mandatory for development")- Disable the verbosity of the tests as we expose yet another race condition in that- Fix a race condition in tests to make the package build reliably * https://github.com/openssl/openssl/issues/3562 * 0001-Fix-a-TLSProxy-race-condition.patch- Add Provides and Conflicts for -devel package in baselibs.conf.- Add patch openssl-no-date.patch to disable date inclusion in most of the binaries - Use autopatch to make things smaller - Enable verbose output on the tests - Paralelize depmod- update to 1.1.0f * bugfix only release - disable RSA keygen tests, because they use too small modulus, which is rejected by our CC/FIPS hardening patches * added openssl-disable_rsa_keygen_tests_with_small_modulus.patch - refreshed openssl-rsakeygen-minimum-distance.patch and 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch- Add conflict for any libopenssl-devel that is not in our version- Avoid the requires conflict between 1.1 and 1.0 openssl- Add conflict on docu packages- drop unnecessary README.SUSE- add openssl-1.1-fix-ppc64.patch from Marcus Meissner to fix build on ppc64- Fix build on aarch64- Remove libpadlock conditional, no longer present- Update baselibs.conf to contain all the renamed packages- re-enable tests on SLE-12 and below despite current failure, so they are automatically run once the issue is resolved- Filter out the pkgconfig provides to force usage of the main openssl package provides- disable tests on SLE-12 and its derivates * they fail because of glibc bug bsc#1035445 - remove README-FIPS.txt (outdated)- drop openssl-fipslocking.patch The locking in 1.1.0 has been rewritten and converted to the new threading API. The fips deadlock (at least bsc#991193) can't be reproduced anymore. - don't ship useless INSTALL* files- simplify openssl-fips-dont-fall-back-to-default-digest.patch The -non-fips-allow option was dropped in OpenSSL 1.1.0 - drop openssl-no-egd.patch as OpenSSL 1.1.0 disables EGD at compile time by default - renumber the patches so the numbers are consequent- Update showciphers.c to work with new openssl- Add patch openssl-static-deps.patch to allow dependencies on statically build libraries - Refresh openssl-1-1.0-fips.patch to take in use the above approach - Silence the install manpage rename phase- Start update to 1.1.0e basing of the 1.0.0 split release - Drop patch merge_from_0.9.8k.patch the ppc64 should work out of the box - Drop patch openssl-engines-path.patch converted to configure option - Drop patch openssl-1.0.2a-padlock64.patch code behind was redone does not apply at all - Drop patch openssl-fix-pod-syntax.diff mostly merged upstream or not applicable - Drop patch compression_methods_switch.patch as we do not need to keep the compat on this release anymore - Drop patch openssl-1.0.2a-ipv6-apps.patch which was upstreamed - Drop upstreamed patch openssl-1.0.2a-default-paths.patch - Drop obsolete patch openssl-1.0.0-c_rehash-compat.diff - Drop obsolete patch openssl-missing_FIPS_ec_group_new_by_curve_name.patch - Drop obsolete patch openssl-print_notice-NULL_crash.patch - Drop obsolete patch openssl-randfile_fread_interrupt.patch - Refresh patch openssl-truststore.patch - Refresh baselibs.conf to correctly reflect soname - Add patch openssl-1.1.0-fips.patch obsoleting bunch of older: * openssl-1.0.2i-fips.patch * openssl-1.0.2a-fips-ec.patch * openssl-1.0.2a-fips-ctor.patch * openssl-1.0.2i-new-fips-reqs.patch * openssl-fips_disallow_x931_rand_method.patch - Add new patch for upstream: * 0001-Resume-reading-from-randfile-when-interrupted-by-a-s.patch - Refresh patch openssl-pkgconfig.patch - Drop patch openssl-gcc-attributes.patch as the code was redone - Rebase patch 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch - Rebase patch openssl-no-egd.patch - Rebase patch openssl-1.0.1e-add-suse-default-cipher.patch and openssl-1.0.1e-add-test-suse-default-cipher-suite.patch - Rebase patch openssl-fips_disallow_ENGINE_loading.patch - Rebase patch openssl-urandom-reseeding.patch - Rebase patch openssl-fips-rsagen-d-bits.patch - Rebase patch openssl-fips-selftests_in_nonfips_mode.patch - Remove switch for ssl2 - no longer present - Remve the buildinf.h parsing, should no longer be needed - Drop the rehash in build, no longer needed - Drop openssl-fips-hidden.patch as it is not really needed - Do not sed in secure_getenv upstream does it in code on their own - Do not install html converted manpages * openssl-1.1.0-no-html.patch- Drop the symbol hiding patches to ease maintenance updates: * 0005-libssl-Hide-library-private-symbols.patch * 0001-libcrypto-Hide-library-private-symbols.patch- Add new patch for engines folders to allow co-installation * openssl-engines-path.patch- Drop openssl-ocloexec.patch as it causes additional maintenance burden we would like to avoid- Drop bug610223.patch as we moved to libdir- Move check to %check phase - Split showciphers to separate file- Move openssl to /usr/lib64 from /lib64- Remove some of the DSO setting code that is not needed - Fix the showciphers binary- Rename to openssl-1_0_0 to allow instalation of multiple versions- Remove O3 from optflags, no need to not rely on distro wide settings - Remove conditions for sle10 and sle11, we care only about sle12+ - USE SUSE instead of SuSE in readme - Pass over with spec-cleaner- fix X509_CERT_FILE path (bsc#1022271) and rename updated openssl-1.0.1e-truststore.diff to openssl-truststore.patch- Updated to openssl 1.0.2k - bsc#1009528 / CVE-2016-7055: openssl: Montgomery multiplication may produce incorrect results - bsc#1019334 / CVE-2016-7056: openssl: ECSDA P-256 timing attack key recovery - bsc#1022085 / CVE-2017-3731: openssl: Truncated packet could crash via OOB read - bsc#1022086 / CVE-2017-3732: openssl: BN_mod_exp may produce incorrect results on x86_64- resume reading from /dev/urandom when interrupted by a signal (bsc#995075) * add openssl-randfile_fread_interrupt.patch- add FIPS changes from SP2: - fix problems with locking in FIPS mode (bsc#992120) * duplicates: bsc#991877, bsc#991193, bsc#990392, bsc#990428 and bsc#990207 * bring back openssl-fipslocking.patch - drop openssl-fips_RSA_compute_d_with_lcm.patch (upstream) (bsc#984323) - don't check for /etc/system-fips (bsc#982268) * add openssl-fips-dont_run_FIPS_module_installed.patch - refresh openssl-fips-rsagen-d-bits.patch- update to openssl-1.0.2j * Missing CRL sanity check (CVE-2016-7052 bsc#1001148)- OpenSSL Security Advisory [22 Sep 2016] (bsc#999665) Severity: High * OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666) Severity: Low * Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575) * Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249) * DTLS buffered message DoS (CVE-2016-2179) (bsc#994844) * OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419) * DTLS replay protection DoS (CVE-2016-2181) (bsc#994749) * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819) * Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359) * Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324) * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377) * Certificate message OOB reads (CVE-2016-6306) (bsc#999668) - update to openssl-1.0.2i * remove patches: openssl-1.0.2a-new-fips-reqs.patch openssl-1.0.2e-fips.patch * add patches: openssl-1.0.2i-fips.patch openssl-1.0.2i-new-fips-reqs.patch- fix crash in print_notice (bsc#998190) * add openssl-print_notice-NULL_crash.patch- OpenSSL Security Advisory [3rd May 2016] - update to 1.0.2h (boo#977584, boo#977663) * Prevent padding oracle in AES-NI CBC MAC check A MITM attacker can use a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the server support AES-NI. (CVE-2016-2107, boo#977616) * Fix EVP_EncodeUpdate overflow An overflow can occur in the EVP_EncodeUpdate() function which is used for Base64 encoding of binary data. If an attacker is able to supply very large amounts of input data then a length check can overflow resulting in a heap corruption. (CVE-2016-2105, boo#977614) * Fix EVP_EncryptUpdate overflow An overflow can occur in the EVP_EncryptUpdate() function. If an attacker is able to supply very large amounts of input data after a previous call to EVP_EncryptUpdate() with a partial block then a length check can overflow resulting in a heap corruption. (CVE-2016-2106, boo#977615) * Prevent ASN.1 BIO excessive memory allocation When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio() a short invalid encoding can casuse allocation of large amounts of memory potentially consuming excessive resources or exhausting memory. (CVE-2016-2109, boo#976942) * EBCDIC overread ASN1 Strings that are over 1024 bytes can cause an overread in applications using the X509_NAME_oneline() function on EBCDIC systems. This could result in arbitrary stack data being returned in the buffer. (CVE-2016-2176, boo#978224) * Modify behavior of ALPN to invoke callback after SNI/servername callback, such that updates to the SSL_CTX affect ALPN. * Remove LOW from the DEFAULT cipher list. This removes singles DES from the default. * Only remove the SSLv2 methods with the no-ssl2-method option. When the methods are enabled and ssl2 is disabled the methods return NULL.- Remove a hack for bsc#936563 - Drop bsc936563_hack.patch- import fips patches from SLE-12 * openssl-fips-clearerror.patch * openssl-fips-dont-fall-back-to-default-digest.patch * openssl-fips-fix-odd-rsakeybits.patch * openssl-fips-rsagen-d-bits.patch * openssl-fips-selftests_in_nonfips_mode.patch * openssl-fips_RSA_compute_d_with_lcm.patch * openssl-fips_disallow_ENGINE_loading.patch * openssl-fips_disallow_x931_rand_method.patch * openssl-rsakeygen-minimum-distance.patch * openssl-urandom-reseeding.patch- add support for "ciphers" providing no encryption (bsc#937085) * don't build with -DSSL_FORBID_ENULL- update to 1.0.2g (bsc#968044) * Disable weak ciphers in SSLv3 and up in default builds of OpenSSL. Builds that are not configured with "enable-weak-ssl-ciphers" will not provide any "EXPORT" or "LOW" strength ciphers. * Disable SSLv2 default build, default negotiation and weak ciphers. SSLv2 is by default disabled at build-time. Builds that are not configured with "enable-ssl2" will not support SSLv2. Even if "enable-ssl2" is used, users who want to negotiate SSLv2 via the version-flexible SSLv23_method() will need to explicitly call either of: SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv2); or SSL_clear_options(ssl, SSL_OP_NO_SSLv2); (CVE-2016-0800) * Fix a double-free in DSA code (CVE-2016-0705) * Disable SRP fake user seed to address a server memory leak. Add a new method SRP_VBASE_get1_by_user that handles the seed properly. (CVE-2016-0798) * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797) * ) Side channel attack on modular exponentiation http://cachebleed.info. (CVE-2016-0702) * ) Change the req app to generate a 2048-bit RSA/DSA key by default, if no keysize is specified with default_bits. This fixes an omission in an earlier change that changed all RSA/DSA key generation apps to use 2048 bits by default.- update to 1.0.2f (boo#963410) * ) DH small subgroups (boo#963413) Historically OpenSSL only ever generated DH parameters based on "safe" primes. More recently (in version 1.0.2) support was provided for generating X9.42 style parameter files such as those required for RFC 5114 support. The primes used in such files may not be "safe". Where an application is using DH configured with parameters based on primes that are not "safe" then an attacker could use this fact to find a peer's private DH exponent. This attack requires that the attacker complete multiple handshakes in which the peer uses the same private DH exponent. For example this could be used to discover a TLS server's private DH exponent if it's reusing the private DH exponent or it's using a static DH ciphersuite. (CVE-2016-0701) * ) SSLv2 doesn't block disabled ciphers (boo#963415) A malicious client can negotiate SSLv2 ciphers that have been disabled on the server and complete SSLv2 handshakes even if all SSLv2 ciphers have been disabled, provided that the SSLv2 protocol was not also disabled via SSL_OP_NO_SSLv2. (CVE-2015-3197) * ) Reject DH handshakes with parameters shorter than 1024 bits.- update to 1.0.2e * fixes five security vulnerabilities * Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794) (bsc#957984) * BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193) (bsc#957814) * Certificate verify crash with missing PSS parameter (CVE-2015-3194) (bsc#957815) * X509_ATTRIBUTE memory leak (CVE-2015-3195) (bsc#957812) * Race condition handling PSK identify hint (CVE-2015-3196) (bsc#957813) - pulled a refreshed fips patch from Fedora * openssl-1.0.2a-fips.patch was replaced by openssl-1.0.2e-fips.patch - refresh openssl-ocloexec.patch- update to 1.0.2d * fixes CVE-2015-1793 (bsc#936746) Alternate chains certificate forgery During certificate verfification, OpenSSL will attempt to find an alternative certificate chain if the first attempt to build such a chain fails. An error in the implementation of this logic can mean that an attacker could cause certain checks on untrusted certificates to be bypassed, such as the CA flag, enabling them to use a valid leaf certificate to act as a CA and "issue" an invalid certificate. - drop openssl-fix_invalid_manpage_name.patch (upstream)- Workaround debugit crash on ppc64le with gcc5 bsc936563_hack.patch (bsc#936563)- update merge_from_0.9.8k.patch replacing __LP64__ by __LP64 this is a change versus previous request 309611 required to avoid build error for ppc64- Build with no-ssl3, for details on why this is needed read rfc7568. Contrary to the "no-ssl2" option, this does not require us to patch dependant packages as the relevant functions are still available (SSLv3_(client|server)_method) but will fail to negotiate. if removing SSL3 methods is desired at a later time, option "no-ssl3-method" needs to be used.- update to 1.0.2c * Fix HMAC ABI incompatibility - refreshed openssl-1.0.2a-fips.patch- update to 1.0.2b * Malformed ECParameters causes infinite loop (CVE-2015-1788) * Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789) * PKCS7 crash with missing EnvelopedContent (CVE-2015-1790) * CMS verify infinite loop with unknown hash function (CVE-2015-1792) * Race condition handling NewSessionTicket (CVE-2015-1791) - refreshed patches: * 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch * 0001-libcrypto-Hide-library-private-symbols.patch * openssl-1.0.2a-default-paths.patch * openssl-1.0.2a-fips.patch * compression_methods_switch.patch * openssl-1.0.1e-add-test-suse-default-cipher-suite.patch- update to 1.0.2a * Major changes since 1.0.1: - Suite B support for TLS 1.2 and DTLS 1.2 - Support for DTLS 1.2 - TLS automatic EC curve selection. - API to set TLS supported signature algorithms and curves - SSL_CONF configuration API. - TLS Brainpool support. - ALPN support. - CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH. - packaging changes: * merged patches modifying CIPHER_LIST into one, dropping: - openssl-1.0.1e-add-suse-default-cipher-header.patch - openssl-libssl-noweakciphers.patch * fix a manpage with invalid name - added openssl-fix_invalid_manpage_name.patch * remove a missing fips function - openssl-missing_FIPS_ec_group_new_by_curve_name.patch * reimported patches from Fedora dropped patches: - openssl-1.0.1c-default-paths.patch - openssl-1.0.1c-ipv6-apps.patch - openssl-1.0.1e-fips-ctor.patch - openssl-1.0.1e-fips-ec.patch - openssl-1.0.1e-fips.patch - openssl-1.0.1e-new-fips-reqs.patch - VIA_padlock_support_on_64systems.patch added patches: - openssl-1.0.2a-default-paths.patch - openssl-1.0.2a-fips-ctor.patch - openssl-1.0.2a-fips-ec.patch - openssl-1.0.2a-fips.patch - openssl-1.0.2a-ipv6-apps.patch - openssl-1.0.2a-new-fips-reqs.patch - openssl-1.0.2a-padlock64.patch * dropped security fixes (upstream) - openssl-CVE-2015-0209.patch - openssl-CVE-2015-0286.patch - openssl-CVE-2015-0287.patch - openssl-CVE-2015-0288.patch - openssl-CVE-2015-0289.patch - openssl-CVE-2015-0293.patch * upstream reformatted the sources, so all the patches have to be refreshed- security update: * CVE-2015-0209 (bnc#919648) - Fix a failure to NULL a pointer freed on error * CVE-2015-0286 (bnc#922496) - Segmentation fault in ASN1_TYPE_cmp * CVE-2015-0287 (bnc#922499) - ASN.1 structure reuse memory corruption * CVE-2015-0288 x509: (bnc#920236) - added missing public key is not NULL check * CVE-2015-0289 (bnc#922500) - PKCS7 NULL pointer dereferences * CVE-2015-0293 (bnc#922488) - Fix reachable assert in SSLv2 servers * added patches: openssl-CVE-2015-0209.patch openssl-CVE-2015-0286.patch openssl-CVE-2015-0287.patch openssl-CVE-2015-0288.patch openssl-CVE-2015-0289.patch openssl-CVE-2015-0293.patch- The DATE stamp moved from crypto/Makefile to crypto/buildinf.h, replace it there (bsc#915947)- openssl 1.0.1k release bsc#912294 CVE-2014-3571: Fix DTLS segmentation fault in dtls1_get_record. bsc#912292 CVE-2015-0206: Fix DTLS memory leak in dtls1_buffer_record. bsc#911399 CVE-2014-3569: Fix issue where no-ssl3 configuration sets method to NULL. bsc#912015 CVE-2014-3572: Abort handshake if server key exchange message is omitted for ephemeral ECDH ciphersuites. bsc#912014 CVE-2015-0204: Remove non-export ephemeral RSA code on client and server. bsc#912293 CVE-2015-0205: Fixed issue where DH client certificates are accepted without verification. bsc#912018 CVE-2014-8275: Fix various certificate fingerprint issues. bsc#912296 CVE-2014-3570: Correct Bignum squaring. and other bugfixes. - openssl.keyring: use Matt Caswells current key. pub 2048R/0E604491 2013-04-30 uid Matt Caswell uid Matt Caswell sub 2048R/E3C21B70 2013-04-30 - openssl-1.0.1e-fips.patch: rediffed - openssl-1.0.1i-noec2m-fix.patch: removed (upstream) - openssl-ocloexec.patch: rediffed- suse_version 10.1 & 10.2 x86_64 can not enable-ec_nistp_64_gcc_128- openssl-1.0.1i-noec2m-fix.patch: only report the Elliptic Curves we actually support (not the binary ones) (bnc#905037)- openSUSE < 11.2 doesn't have accept4()- openSSL 1.0.1j * Fix SRTP Memory Leak (CVE-2014-3513) * Session Ticket Memory Leak (CVE-2014-3567) * Add SSL 3.0 Fallback protection (TLS_FALLBACK_SCSV) * Build option no-ssl3 is incomplete (CVE-2014-3568)/bin/shopenssl-1_0_0openssl-1_1_0h04-ch1b 1753716374  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuv1.1.1w-150600.5.15.11.1.1w-150600.5.15.11.1.1w-150600.5.15.1sslengdef1.1.dengines1.1.dopenssl-1_1.cnfprivatec_rehash-1_1fips_standalone_hmacopenssl-1_1openssl-1_1CHANGESNEWSREADMECA-1_1.pl.1ssl.gzCA.pl.1ssl.gzasn1parse.1ssl.gzc_rehash-1_1.1ssl.gzca.1ssl.gzciphers.1ssl.gzcms.1ssl.gzcrl.1ssl.gzcrl2pkcs7.1ssl.gzdgst.1ssl.gzdhparam.1ssl.gzdsa.1ssl.gzdsaparam.1ssl.gzec.1ssl.gzecparam.1ssl.gzenc.1ssl.gzengine.1ssl.gzerrstr.1ssl.gzgendsa.1ssl.gzgenpkey.1ssl.gzgenrsa.1ssl.gzlist.1ssl.gznseq.1ssl.gzocsp.1ssl.gzopenssl-asn1parse.1ssl.gzopenssl-c_rehash.1ssl.gzopenssl-ca.1ssl.gzopenssl-ciphers.1ssl.gzopenssl-cms.1ssl.gzopenssl-crl.1ssl.gzopenssl-crl2pkcs7.1ssl.gzopenssl-dgst.1ssl.gzopenssl-dhparam.1ssl.gzopenssl-dsa.1ssl.gzopenssl-dsaparam.1ssl.gzopenssl-ec.1ssl.gzopenssl-ecparam.1ssl.gzopenssl-enc.1ssl.gzopenssl-engine.1ssl.gzopenssl-errstr.1ssl.gzopenssl-gendsa.1ssl.gzopenssl-genpkey.1ssl.gzopenssl-genrsa.1ssl.gzopenssl-list.1ssl.gzopenssl-nseq.1ssl.gzopenssl-ocsp.1ssl.gzopenssl-passwd.1ssl.gzopenssl-pkcs12.1ssl.gzopenssl-pkcs7.1ssl.gzopenssl-pkcs8.1ssl.gzopenssl-pkey.1ssl.gzopenssl-pkeyparam.1ssl.gzopenssl-pkeyutl.1ssl.gzopenssl-prime.1ssl.gzopenssl-rand.1ssl.gzopenssl-rehash.1ssl.gzopenssl-req.1ssl.gzopenssl-rsa.1ssl.gzopenssl-rsautl.1ssl.gzopenssl-s_client.1ssl.gzopenssl-s_server.1ssl.gzopenssl-s_time.1ssl.gzopenssl-sess_id.1ssl.gzopenssl-smime.1ssl.gzopenssl-speed.1ssl.gzopenssl-spkac.1ssl.gzopenssl-srp.1ssl.gzopenssl-storeutl.1ssl.gzopenssl-ts.1ssl.gzopenssl-tsget.1ssl.gzopenssl-verify.1ssl.gzopenssl-version.1ssl.gzopenssl-x509.1ssl.gzopenssl.1ssl.gzpasswd.1ssl.gzpkcs12.1ssl.gzpkcs7.1ssl.gzpkcs8.1ssl.gzpkey.1ssl.gzpkeyparam.1ssl.gzpkeyutl.1ssl.gzprime.1ssl.gzrand.1ssl.gzrehash.1ssl.gzreq.1ssl.gzrsa.1ssl.gzrsautl.1ssl.gzs_client.1ssl.gzs_server.1ssl.gzs_time.1ssl.gzsess_id.1ssl.gzsmime.1ssl.gzspeed.1ssl.gzspkac.1ssl.gzsrp.1ssl.gzstoreutl.1ssl.gzts.1ssl.gztsget.1ssl.gzverify.1ssl.gzversion.1ssl.gzx509.1ssl.gzsslmiscCA-1_1.pltsget-1_1tsget-1_1.pl/etc//etc/ssl//usr/bin//usr/share/doc/packages//usr/share/doc/packages/openssl-1_1//usr/share/man/man1//usr/share//usr/share/ssl//usr/share/ssl/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:39893/SUSE_SLE-15-SP6_Update/420b1087b3c2dd938e1e076b65280f30-openssl-1_1.SUSE_SLE-15-SP6_Updatedrpmxz5x86_64-suse-linux     directoryBSD makefile script text with ".include", ASCII textPerl script text executableELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 4.3.0, BuildID[sha1]=b27920926d2b838dd610ce766d9f49fb763efac9, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 4.3.0, BuildID[sha1]=29a8c3ed75f13cea94cdad57813eed0154326812, strippedUTF-8 Unicode textASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)RR RRR RRRRRR RR R R R RRRRRRRRRRRySvbbq. A# Restore engines1.1.d.rpmsave to engines1.1.d if [ -d /etc/ssl/engines1.1.d.rpmsave ]; then mv -v /etc/ssl/engines1.1.d.rpmsave/* /etc/ssl/engines1.1.d ||: rmdir /etc/ssl/engines1.1.d.rpmsave ||: fi # Restore engdef1.1.d.rpmsave to engdef1.1.d if [ -d /etc/ssl/engdef1.1.d.rpmsave ]; then mv -v /etc/ssl/engdef1.1.d.rpmsave/* /etc/ssl/engdef1.1.d ||: rmdir /etc/ssl/engdef1.1.d.rpmsave ||: fi/bin/shutf-812b547c48c3de4b819905356bf919634e66958cb859dec38f64b0c6bb442d4d1?7zXZ !t/]"k%IN66X&av]X ] 4Œup:R"nZTUo.b7e(ܒ]npc̖y]tri`~oJC) ~*mn` ki`6i.g0𣝗W^bYFw? m??3BkB?F/;XԘ%mZRnr+xӫ6+ǎ_Tf:3]#Po.VG\mwAčdz_FXezKٺdK8bo}\{}~JKc wQ~`2v55a@k3ѥ3}'AyP#W"rx] RtϽXa7%N^g pwxhMކV;-Fk/9!`306j>d.@= !]F,X,)m?&,ZA߬e+0{Gqu#<@qI޿OԢ}!۹V{=+d.lvUVOvI] 4TƤLE^D]AN6=Z%"N QPgL.5D 8+.ZLsp 6缡ۢm *0l pfcbED2 je%%]hΊ:l"Ki#ȿ鷪1ʝ7)߬?%NxV_CZwr4n]Ù?$;DdI2G\S$zR$U/Z\|i wtxG:( B|e.ܿZ_PX MK'u\JoK>[J[]*<彙9w]  )tK}}7Y WoBcu|̳YygHGB`zfi)L AvF;ɷ<kR햽|k8Cx,t?Z`vD ^׽@(mu`>nn9p&p:Iz2l9JޜcgߥCC C'%!jv\KՒ<XTCHC[:$+;5FR9we`~ҟ:, ?[9Ow4Fi:61*8Z7R#uZBDܺbdrup"OtCg%>l\0b>x&uU==yNYE뎑,J5_oȳZ5%lM qiϛHJ?^72H4sRע }mrRSTAW10J68bQ)J)9^~X:@ßv=0qPh(:㰜MdQ;s(uzEM~B@.W+Gc,X?hVԂ^eZRaY+^ y}وGy~Nu({\&=7ry'"C2A$PuJ v)NA!)ͷ f̈%rwW"Q,tl!Ծ+Cow@4]ȞY7z >sX[ÿ`XYwVI'ʪT*Wa&2D/݃c%7oI7q)Kƅ  Ft!¸1[Жwcg,f4sGrY5{Dưr!?ܣfLNyhX:W\|2ɸ֍!q& tQκXInW'-! qN.{}fW$sUBb'ą_]j!ٚJSM31еö߭{("Tl K a% ig ӛCHoÅH!It[!Vaa0GEϕRW&i茋= sn7Y?nK@O7Ek{S<)Ɩ@MBWf6Oqs8aDOH\O[?0H9֐(8A%vt oBW:|+58DV?K,<;^Q69HHoK0cSrpDA}>=LCĮ7>mNb#U-&噖2ؕf+|*ySeb0 ,tkWg#FnQEZ1 ̍_~ơ2ɀZ~̋}ߨn/ޖӷbN{6e詛d BO?xĄD7ax#6)Rzkd@ʘ=m,]-*!]]'*Wq;={F9?ԘD`3􏝂ނaɃ;0xy."V%3BuW<34W^|S!]]?B~|&&cܱ U n[FzyͅdEqו~T9I}'܄5 EGƒ- 0eUMJk7K,Fwp+AY=I^ݜ/':l ǣ’_K#Q&k2cfoޝ0GH|vg}nQ OXJ4Wdxf5Xer_W_D9mmr7Eem5o9<@4޿To{ɍpا]edkn!"GEo)AoHVΫ4ph; ryfF(]op{:Z03q- 99Tߚ*IXHf3XWuU];Ke XmXΏtcVzC+c]I;zڳڽj؏>#vc]:ff n!m e$5ކLc* m?Kibֿ/ο9mBC%￞kKqeoSQk&d yN&L eI~[3ۋE8LԌ}Q@IRTIL"c];?0gl] mv(bV{MYwlyN[sˬI!ul,Iۧ,*b6'[3^.+)7;Н*y"#'H3:Tt쉁Yċ3N$Q 9?eLs&W&.MJMSvS-A<Ab5>Jjބ0M\C757<:j5mO?/8zw^z< t{,)=0Bx_8cԋ(rl>ZBjCEeC* Fޗz*ЅNx?Sg;-N6}6+[.xL9\ur!a)楢E%$ƩomW#_M>>cmTu/çTTs?]jSy&wzp{-|v7W`ej1Y7(`њ.I╃ieo@#/sV?E \?g3YbJHK -IkkKzQ)嶺EV?ߠ⹵H1jȺyTɣk)7EErRD˅>}$0,v xJ0EAJg<?Ǚ6DHJ딾vG o -ΟŜQV%N:vOȉsmF,v݁9@ڴG6/ObGHR2h`g;@ӘF`d !.Ubo}i*Q7eGr2sydʱ2?Ȅί.^p=d/yg+V9vsZ>|S\-|7܌XmV,ݺ`od b7o*U[mzWOػ˺jƧLT9mow,!Մ]=SX?QQTO׷6QqG>&Ⲯ}o6W{j`GMkVy (+uKJb>`D2*F''Z2]t}w8uzx!4YO`6@Jo&o!OP:^Jy#*w7~H=\`vw*2$9t|o"Q7%#5Zl*C-ry5]!JjqK&oIܦd縹A髴es]wZ!w\cO͗VLJI\r&Ko[,(mq9 Whb˻&bOnʫ9Px]NPZ' ?HR'I]׼DqUWύDJp}WCĊs"qz^u ?F6)J2dz }Ka'n*%6ϲt}hƟ'|i(j߾`.Hf.N\!k ՖYgJ.!{6}aH,4eL~tey; X'FhgQav>33v)o›3 ~l&B1X:m|+j6P]X 'uZrJ圦鰼j7dUf8.2VDg{c֭KMGI;ױƝNB8qA 49⼞V2ژsdȑzxGqV7.nT[ͭNwteN h{}")2/Yg0~:A ȡ e{w1xͳ./XcΧq~O!^Pt@h'͜Hd#9c1GT"[ˆ_eq4/1B֡,w$AiN7 FJC(;㉃fdZ!2Q~CUY}2$'_Q^[aT_}5B`)jh+XpS#҉P -἟%qLȨ^j 27mi{xt]1e~ZA ?ҒLmp^IG*@,\.e*Rw _XK(_Y&S=蠞0M$(@%1)G3 rO=\fF_ )=I PfDAm^oJeNBvosb!%4}JV"wD`/ٝ{+R qݣ7K>Gz~Ns9ҨZ05F2 (* Vs`l̺t,:~,r(;!4 $*=v8ϖ;v{eK\7P\TYaֱҀv BFL1ɇ9H6= +/ztLnd7K#8hkJt+ j 0K&kЁ) _*y\Wb4 j ;u:/u(3aXW=۵8ȨB 2^RkyVd\8gXw9>f&-di\@hV{'ku2#@]GS@D`묑Mt?)0z:X[@W>a=>#wۉL/Sg3` cAi!b6FaoKa⋅**u‡>H)i,WV[w8rMM3.+\m[A:X@!/ ]39Tj2!khtw[Q-x8/Jq߁^^wu`b# x "ET.g vo!dnKB-רJ=˘C8ս2uX>hLqld8O1ȨkmjM<@~P&X%vtG }YӤy@oD';!G94?܁.|N%)ȿiBGDz.vA4U5woqN`U$I=* 31]g<3xA}Rߢ u`~yN1$\@)5E <D =\vDjs(zK,N>Ū0m ϬFvb |&6 vq)^̴l#*C5|>G\3IYuʕ[M,Xr5u x[%[ {JfʺVj?.X]O3?o_%2ˡ -I5[jIA(]fcKsUc GnnI"ƏD`. F ?N)!(% |Ta<k9h NǷ?L>C.پe*A[ _Q=(EலPK"lVBmcQCx@)!wVxlf$wߋGN2]QԾ>Xߊ& n 3X-#|c5I 77ý-=!M&X`煟R!9>[iyvPzn'kAP1 ∃| E fNqI׌AM.8Teacl~,:Jp<Ko zmf@i`.'_^r"Tj9G1CcT_@)śT&'u§l>y4#QIc&DC*w)d|tf\kV= ku~LZIS/b@z7]zO^=*$6..6<p2 ] . Vլ //L2XRX,0`$_]!ʵ2vCd.TVÏ_ۂN҅C([F TPϗ"Z d v'5҇ Wǰ) *3/\nfohW[߳cQe =Ӛ7d>H{N۲t?f^^xpAZB='[|A(;(ڴ; 6d(}1ɵP\SGzHMm/&bf8wSrb$xR5amF#0H*,fG yp,%.ؿSIL Vjj9_4`o=]3k3= iȏ( I5ƺo&Gl8&|\,ݟqL7[rp.(={9 .wYBߥV6 $vܠ# O1h13yW'`ܼ=َWuըHQ`5S Y$ZE@{ !>NЎ)@Xf͌^b (B^iǐTOQ8f4aLݱ 8J8AT4Ld8;n;j˃` 9rq5]C)f^QZ2M[ll@b! Ρ@aRCJ_5S~Jt.*K<}kjϙ>B0ZX09ܙ7>$1RbŔ/4$]4)FyJ~{-4; 1&D6U&Jt GR]$`]~+i^=~+ܵ+.ʨJ0Ǵ*vFV-78ń@WhYD~]t/P }w/(,̐[>3_D ]:H:̓ӧF=>'JCpSi0SOj\aLApo3&0y2:,ˌԿ@1W<|1t6 2,0How)o4ޫ^+_t [Av,Kq;mִ2[\Si/9ғB)۾\fh_UU{{Eǀ`TCj+FWlI{׏͜aW'E*RĪmC>GcVD3[U#)Ԯ37@"8Lc*); `_3gcUΛp򆧊h^9OARSF~ ɫ@ Bqg$es'Ɲ($ ؖCqu%UK[UD_gpM^E]H lU+gW"K)!r*Þ^숫yw4Z_,&5R*+-W!4Jw뀦8N<<@(ݏ&e.X$"dMR2l2FIЙ{N]~;{'?2z9 oun~[.{W׊VfR\kJ:.gqAfEљWr}~2(W.H$9aP36D<s=Y}>qd5 -.צ~60 +NB&\xT8Cm65sdȌ]k&+3e$+ŹlN~CC%N: 4tuX;/o8Q7őGJ$ 0Ք&SxtIW6(vMI :Ypŵ7DV !0y/ Y vﱁWI?'>}tyqa&{ NQw) j{`G42WC9YNJlfnvSى4 S8~ B1fȑRI)t^ XbO&dǂ(=ihE=PT8 &=xir*%_}=hRH@iѷ8`X*bG~_{]Lo.^ЛMCsY{#;dy#ns@Fpнhd\#fY]=q!HtبШ@E#&@;= ÐxC5Y /U(jXJ~tPh$ܥu#W5OĄ2EF[s7 TbW| ꅯ[!4 kKY *K?ʐbȋ@hhC5uix|AM4%9CXk1:8D֢/&ar$z@TMC2w>7~Obc d5Q́6 ;X0[x+u[h[|+^| (},^lpD OWl?W-@קSG[Uʜ$:`to q+W7\^APvKPqY,!J{G6+Z?) Fx0G'!x}Vvs@@hPaֵ{r*p@_Vx2dz~.u³ \;ҵ]WSJF S9CCr|l4 pX&U+H9dV#lӒ쯴˶ri_ I(6텶rH+'s| z+kY 3.KlRV]eкe19Qz$qܻ0Av.E(h &u8Ȱ\b`N J&NX?:t39ϰD d pV٭kzGkd1RMWaQk_;T4MM9ٺCB?F Qp9]Q@9WAJK[×d{Ra\vSL\'԰ ~5ɻn{L[x Zw h6JN5ݤX~kKo~~âCfT` +ɺ;0Ѽ7e ;ˆ5=(Օ cOOسϳDi$;Umk;?0`:ZudN Ȼjj  LǧiD?B:o6{>4KK#=]t+a||m>>G8sC߿;X{-C+!Zi֔*W9l1~9"1"0DpwP$k ?ٞ0t@_a'&DFhz+k}jw)+NV:]d'#!ar9!-C6Qo&Fh`ō/GF!3:R8c'<&/Ud?q ajS>~31R[0bAj6vK!T yDZ HOYy/ojb  qD(t|R\⼤N~9=6Cac@੅D3h.H|kY(S5%zX]8 4z4G*h -UhWYk--^5C^ŕqsz#H7Gᨹ!뉶-Di:%]K/#Fb=6?^qkb32X֨9#+r_iR:kv *L$g(6ֶZԫyҐa>D(!m&cPK^xkJf˻ d/$2ٺKPM?%qKoMwzo%mFd)}M>ԿS^ }M*iT,TtET*c-f]BґL>{xp`HB.@ߌih[DA8p=`Q' \5}7_+(/ }0?4h!6Y*֪W>5P\xDOeck~z5=5p_UϟϙXd5hH_a;k^# |^Ж6rXvF,H<0Q 1HK~;ylDin#-|=$T0mQg:&LR@l"&Ŏ) E>4.r\#G#7TKҪx}βA .O_pwPRXUj$͇ =oVčÛBI¾ۀ-(N*{Rf<ކw^W>oo%i}e H[ r% /s߭|v̙(y`=yԗE18TX1Rh{0=U:kwjKG^=4gΊ{{5Hk2|֊Y],Q$Nh،<*Ze%d^r]+Ė/<բfy:BB1=pU!=!@nqA~b7Fdg99xB18D5tj߆ t] .wu.S5{~VA9kO$ɐqPkjѓY/ghtCS&KKIϓ]7*h Cp`y%A$UiI5~$c6ߊ0.{P5c% p%t G2l U$6j u!P ̫4T*(89DH&$wh]&XAHdJAlVyTh kXmK~c1,Y˾M@GEM/ <*gJ{HƯ.L3k} ۖ0ap]0Ln|SzfZ!YZ a%|>I;؊7|5ۢPQ 25:$@mf`q{U5ғ 2ʡg(m0!!Vb/v])x1{XW74h 2@M*Y3oxm)7䠥6U֕wtmD " ;A*܏ŗ۠~RﱳkB1:%c̲͖R;W,9ߎ9~{Lj+,z3{9:Z +|+̣?Rk˲_(?֎Y/Y#e\o'vXY,q.?耉R1q&ca1\dR>+ˆC@xD]M6 x Snx HKκCA5! CZ_is<ȼGd nrTvAtO*V^5QXX> 8w1(U>h?NG_*#,f"eGƁvRN~ayM }oL}UՀtaD (L[FHFFW; qM( t scM%>^=H RD>{JT7w t1lmToCd-V!wa2 ow cì| Q/rXbx0Mpë&dI]if Z5FqY\?nk^%eqGW/Vk #r؄{NfwXk79xFP ȇzЧAE@ߨ1NWÔl&6oIÀ8dQItסcȚWvKn)# fS8-<#4< @byI4'$-k[oǂDw-.TT#QI8xRo~DsaqZZ2yPa@͵9b5i-D)L:1`bzHJ]s_mNW4;gsbHE}؏4yhvW~a Bvn+ǩw~a~L~#gVjJ*Hb'5?B"OubBCF EdQ1F7>~@kS-M|aTN`GaTLV-u6`VR!Rd\|uce;P3 G20wvU$y=l?6>h@ r0$qW-?V|P`Ãhl_%R6abcu1" q:ɼaF2&nbKttV\3[˞5)Ңa{hYx^~\h?F\+lV#xX@봿MwFo/r,Wժ`L1>*Wa!o+jR-~_<^`UD8[ T),?ױAR|A!m&1pH,vb^n/\0ᶻC OzĂIڹOwGO7;?fBITLR}7g> rrD t._ ȏ)2{ݞ%M_h 4C_W~xpZAe>}lxm="Qxj[YBѝ1tC \(L+^BBKj?:4Ԝ5켰 ;6/VH8hs0bk!҉< 7j9q՝ Zg.n|,Ձ($޴z7fK&_^0Zٗ:C{fqF#9Ҵ,E B6ހ{C LJ=7VF48 a$Lژў~{)sIfEOݖkCʕn6IE d6<=\xOOs樗AgDPj.`Eܿ{FNXm87o}aٔ1ʧS9⧮/,/(e_Hw洜7_U! @L3yvlrg=JGrڕ)<)5Wt]"=^gh *Rr^8QwkK0VйBod&] sY7OX`ZqwGraHyzw8L!qYynEqb]KGo.j}M_#%ZFE+D7x7)x5}$@`N0¿.SInF0qҧAb*ȃ )xL:թmQwЂ{^ 7gm!EZ+\w;2'3uEK&Ȅ;`$.x:kf7}e B'N Ʌ?\y;y[2WSN9n+YG|Z9ޑ/-8o0S9[Gj+fŐR7ԌZAp릴U>?-&҅oy04!}c⪑h5.,4%\ ;M%։չu"S[T/"άdRqUhxsp^̓A7fi( Ǖ6{MՃЗ`iI9)lN_ ҟP7+70]Ux,dIp vNשsvnEIZ +2EcհNy>aƀtRWӧ]B_d#LP;8)| .2"EU}[6sOIGڵPB˿&C ]_dRzLP@)5N ff^cTurد1Іz6%CrJS@wܖlzTaEuLfTB~Zr_1K͗ o2 TP#,P{SNV^U!G`!Ő@K yvS:މzASi!+B`gDЕ?)l݀HDK8?f2Y.360TY-WgU'^A_t"> @'LsRYA/K:e% e6vm|#e[<}1FC5Bnb|ˮTXEr7qO)p/?>8|:1Y qfO5</g\Zp4E= DQcpp.BIJp'g@حHrNWDdOWuWu:Nz?0t|ԬO6p Bș7&S_Yl k2S:y{/aX FUHj\h*-IA6Hc/Д'JOJ`D)lQIWbD-喤 L5ӌ*/Uz< ~(wD<}I`~I.)M yrky,O"w4Y uw 4 %S'1q?eA6`,{p KKR⛦ǹbо~Ou>;9'#Ԟ[4H`SƷ#H>7r0m{cw *ڹnY cCMm0'phTy%\㐊.)V$4y2x /tB24]$&JC \9"z -{rjbBv2hN<%UK:DD[YRsI9v$r362 U K'" 󒿸`flIi":RXݳS9ȕΛ}'L/1wEfhNp63< 6>n>e<&bVx]xUR3̬Ž+D)M;5M' B}lõPřM԰8Jc0 Rlv/{ck|&LUfAe)6ZۑToZ r0+l(TuQ0kNt|ڮt s}KC)\t y}3e=b{Òuf~@R pMVoy H -+ap8eΏqɋp\U@ wXɊD&aLa38:\&u:hq$3ifQuC^s_cX)DE1wtg`VŚ2+`1Ȫp 12/&KAh$-JŌ$ 9\w8Ej{kEaXbJFqNtwo|׬^q>1ʣmsՆe9/1#\we˯C4xtN毘H2fXs^Er#hPIY;~K67]%gO %+ s`;lU-9!iጧR`XN>N5Qp?3Ҙ߳Z*=ݢJ<:_c u5A)l/?sdb\\8|sQ/!4{!s7L, bL"ɣZ%xX)WC 6')}>ks0J+9>w3&lgʹ!da_E{ _'p('N*r~-ae.7'*ʄfEܼ)Q nC+~yiڇ ~m $QJ`yܙMgBĀ ҌL{N#{i_TwWh7FR33XDq0aCJqÌQ% c=]! f$.M"Q'*C@O9'Y WUj.:1dˀ[s4`W&9% ȈfY\U0 5]\*%[q4gܲ<`BQ`TՉ}$$ry]_%dq{(FCZrkODQ;4?/QKO6N@&N+C:>) {+/Rځda$-ev>nU a៾0N%&@t T |q皁)شQĈd*iRY܊O6399ꉽ1lp;+D0C܋ˤߙ8X)w֍^| zfg7ΕkZ㢋Uwq&Os hxל# 6%2o0l^ꚣRgEGٽSE`[n Mq0L~K.{ؙͦA^%i3UtzRK$Iթ+{S!m%FqKPQSXп*ؕf{5z;_/ti+>_~; 9RHFIBo &>n )eR'H+n$QDզ"Y9,gvaOgi9/ p e-\d >BᘭcjT̠xzk ;x?\iF &aozx+z`kDR%]۲5.IEnʂ`l3gadsf2ۻ #pc#ׄӊcY|b'1ʹn! dj-{:wokΧy`5+6T"\(L)wtjb*ENvn뷪؂467x*QzCr1jW>SXMnY߭99\zAvʽ}SM,5=^yu % {)/;|SBފ2̺Хή>xxԗqmp5(|漪'‘XDcB; S ]^ZO-ћ⬟y{K „M+d{tFMdfg닒-\DRDj޹pGnqk6,δ+3ݸa*PvXXI$+7yaVNђ 5")^7ٚn18M#}Wc")F*bQuͼ$%{._&pU!,?\7l(m2D[ܑ)g"dd&DAl/|N ˎb!&]I<'pe1XPyGWcKHӾX`pڎ!3կ! 81ti'8oQ{uT\6[4cHiKbO>Dۤ玻2 MN6_8 ޫz o4kVUwM-eжҝzꛮ7er w4 GQLDҀ=²c)9=ǎTF < tFCETa[\ہS`ͼzb}Aeq||eL/"JTd}@,PϮ°L Ї: H>(#Z_yDfxP:RU [Wt&>-JlhJߦY mqKfϲ $3ș^ L#וq)ۧ!3qs0 ʂ#Qi45;iKmdkb\"eܗV _69(a |xuV$ic_|IV]mF -G/, .g0ȩP{k.}e̬$o6b *dìAnC⫑[Vȭ@7˞H=V6*F>Qqs1S%&(M2#2nwM&-axL/9a#=3`/Ru@_ur͜Vʷg ߠ{ k,å#lgc27H\?s( (y<|>l'x=;%S yz#%$MR1LNI38U4]}C#X^=FWQe@@~+KsHץHjj)ZBCz6= r%s^UPv Q"$fAPbo_BF Z KKr̙Tv@U*tG+쇿/uDvg@*5UHGR\9SwжUޅ^E|ص^Yov^kf(\k>+ź$XeV98O*Xɐ(J{ĦbJAH\:\+4,jo^'\'6 ]^|4(nDd]T|}=lHiBUќdKQliB_mi 7 x?YYQ_ko],.<+-VadCTŝ#G)qq7_B c pD'Jab<n۵˜Ð ?,GU\Gxe; r' W36B@#br3h<3옼nϲb$iRŘlHn;l9h6x6g@Fw`2C4=,&ZNV&|ۚnKsیsq87[e{B bP`Qg3n)S0s@$l^M㌜^fןZJ;jS8~::L_n3U LDK̰>r( RVҮy R۬␀SUmVw/~'vhdŦw}M $m:R{U 0D+疽6Cm\CV%=Hv:_4>7Y[SgBHݮRCɇgs] cB =J}w3X>)nBr?R0.ԝHDhY*cvJ &\]WIR{1v [ƂeUzc,PaP;!OJa8U5-Rp/}c{)s4M|ei86$i¡\SY9ft@׮\'{G~jCA6oj3f)q}\); y'V@KBeQY{*d4'gbsF8B!=}mZ-f Eu@ $(n IN}$t;$NlTiPu}x?L?#d kѥ&ge{uO~V7@z蜱'ZxP7H ]a&0"iIqW;M iR(|EjKsmFLmƆ!1a* m,۳5J{ג$ef3=DxM7lׂ V,>Әg[qz#(vƌdq擜-Q@bG0!i~YaeoO@ \E_~>KNy^Pia~(G*,,̢zM/W `9fhk"֑}05!h?2"‘_N:(Yd;Ps[9C}WT[n/ҧ:/}\Ơ L&o08|gPIy6-? Q$&ۺN_!7X!I< E5Mbw%-qSbP+@Rx >*DpW!imnX;wwȊ7Q:]KFE D-/~⌐KE"A>^({C^SC ]q}=.$ЭP@K\og+VyxV)5fQsKlͦΊm Ú Jcli[+qqhPTvzQ^> pC:e RO:&6񰦃Hbd c7wJږ7)!Z`tc5H89'֣{0!M}wʰjF?l0׈9?$raXNnYFeE5Э.ϙc;f' n7hR&&ϲn-'Q>rgwz~AF̸lIp$T>nd}]]ѩ8HgupN{oFG>10F:{4"p ;u0i|` |]G[9K// ]m^v#7[oꚱ#JDV+U1bXA挋`dLE_=801s f-!Nƿ+TTPvj30ɽ+xvě(8(R4 BeiB!ZrUeLy% a7~kg50G)H#W㫥y24Q ^mh8{ǔ ΏM-*Ykv-|Ut5Pn&#u?I1Z%Pk+cUq-킼w ޭ-^BV[,}[38u$[mwzǑlYi< 5^mFF;):õvY#ވF-Ihț,{w"!#&vZ/)ѭB/j.kr*mgBi6_[c4UlfX IՔ'5)~ _ i!EGԼP8Wsf:l R͡Kt(~pFYCEuNRdv7,'u֒`1BnI]fjo0 ЖdN M0KF_>ygA  ugXz0! &H:qg+UCM+ǃ @x,T_!wcjQB綱bVzs{ >[Oe4y9F;ȫ>Dvro{WPՈ# rsұEώf ' :Wi[ս"!&[:^agltLIYp1C};Mr+hk^Z!-96E9+-@]$HII7rZ<K&BjBy(^*u 4wbVo'Ɫ;4#Xu iK9Nf 8'z>}pRJ?˞; Q” KIq.P=¨;%F17 Ah+ Bv3^GL.1.ߴ|+/p~!GkKmZFT Pg=uAK+UP;BR}g6Rd3`aXl6F%m;&irknl M[mNj ri UE0ΫdQyy{eS.dlDUtED A |n`Ͷ<}_ 了jbԽ; '"MjJ(1'QZ+'GbNĨ s%o`Dm˯Rc<66Te.wpGq#4_װs*uOՋ26"@-v3'!CHDgσ0/#-dJ-%#=VDI ,,@{SA'C rY'/2 #c_NPzClH*!1Iٕpǀ_*O_RD A&T9>WDuf*xeoeQTry3 `WIM%Ud61 AkK/\JI?#m6(7`UݶK}.BNʌtWNZ:tG1\?kmWE\"ow.ÄⅮ<BKDޅ#͎H-+Jij!ԑD\W2*6`Vf'Z#x AB3j[yf<jѯNVm6SF=;r!Qz?$RK(. EJpN #|k j l\E)' uHx띹DJl 0QĪ%ԭi JN@t:k)k$@6ɢl&E EdJ\-#LѪxY^U0x9K}`oR4zvn YjKSO\Z#W : I#D1 jGE㴌u- U'Bjq.N$,HyWiHVÁ`=nTg2 I3'C󆰡9ZM ,^E7̦ԿWYh-lM~aۦ?G2gۯqT}Be+1hCT A4@(px:kEH(UJlN ŠMWB9"rRgT1qlC=ύBʼnSd+CkvB.v][%PA33'Tګn 3i"9nj&EEݞ3 Τ9p8<+M¦H9?^ime8iԪoaŤ]^n~h\Tet.ErEOF i]|H黚f=By Ek(吵o5v+-# $Bx]hFpam0 #wb$"p(|K6t2OvmAjvbeEG)`& wAzEbyHl}͈[3_5Ho(u.(4ϟ(RFTx `*&mnL0w8jDQP8D鼇[׹ wV^8ԉ{{vf|7e:ܜ& a| a)< ܭM_qZ}'#xu*l\_O葟xw/4KzCsl\<ه #% k>갚XXɸøI垲G?yz_sipmH M}l g+ԻLSM \G}(cD^RιE&YlS{)6ClƳ-6??Od25e2Jnm:fV[5xP󀯆p1@.DtJQU,/\E +!9LMd+Ud)sG,jU<ɀUk?$"]>` n8V =g[<}5d_GMm>:1]KlgQ_'Ѻ*JQ?ey .GZQdz v02v~ Upsl=Ç8KJZ,emAMl Փ]$txKۛ}ӎ3ٜyd4ΰ'D<WڌiT\S1-`h+m8WdOdL5 ?W5)cc!^bfFh;eyl PZ0`FFjO]kkX#PʩRx'lRaxDdGaA]p&t@zYo3epE,Z"!1I )z?==~^?F( t/BTKm>%51`)=|=.rŒ$a <@&G^iJP I$'':]QvS%*_l #6]J:8@h t1FiBpXMDVyQaZ/>r/5iY P/s yG!s ^ZCw5/4z 6Q.5KA0N|lg!q .yh;%"GYuF/a0p|IabSs2~ hwoFjz ؄1@1iy,_ *}?џJ>wc'rw.jAtK۹=ã #MF:mJDž$g-]J/<.Kž¼9o'hv +Mܮ5pZ"JhjS( 압L w ,d[~3,WJ*'0ug-Q$s3NԌ /5YQ{i~hU?'3r!Bw=W穐 D$xUM빂d ^#gޅ+u@6Ҙ[J*}_/jάHpIJHvp RxFrIĢ Xmg A',={j-~3H};>2YkpLn*!bQ6Hwd\rd{P$ʨa+?UF&4^V@_ДH v,3=׻-!hޠzCՙp朮i11Ye[CC&$9P\uk>{g urs lnJn kr!,v̑ dj;MUs Nc&8Q

p5* Xv2Yܠg8 AـZ~,m_߲QR;?D'#3!Rk 黕s/H8ToF P":FI:u4Om-%dhѐq2gc95:.-@{>R&rkqVJJUlg 62JTw\%/ u4m"Z]=wA&opXWTGD@jt٥(NSh>+o+NB4?턐4'co)f!O ;sɜXO}L'ouk_$!3Tcք}AqV m;}W3(6FcWȻZ8rֶ' H歷Xb3o7ߕ h~8PBn[YYj-(afeXIQJ% jrtAP98MwH`C,6!5/X"KV/)6[ '׉}V,(4Ds b 4S+W7sU$BOJpN*+s&+IZ)!=2k&I]\W#)aϥqiAm$U}aV'>x\8IkL&ۥ:SI%|3|G+~<- Fz4 rޟ́$&#M.~ĉIyfn1*R U{ }"<`u':n=z%r)Ѳ&9U.HU``v~Kcu )i^sHUsLX]ȑ)V~[EWgV2$ 1>=.fz?}Ώ$^G $]#)_`58YND14jU 4?D6^G {/,窮ZVG^Mo~s{F}pB  o2R29oj:u|#x24=ۊLp;&*R?RƼt2W>P$Oenť(eꂙi^\ϛ2+dG[ '$A/*9 ڍDw^y J$cqݗa@1);qÄ1D綵, RZ׊ [qc405AԺ6Ƃ[P찱{ȩ9 |4xH0696 w UM/rK/H`D^,H4rQڀRLQwtZ(eXRIzmEV< ۰ w*Jڧ^Y)Q v)Y'\BHuTNad=S)ekצqmY _{xe@լx߫y j bDj‡`l|V.)GcIˎf yg@K-cն^HDSl;?"PXģ>ܧ>9by^.V=Sir }7B#E!vd1t# T’eɇ3rb8VA:ߢ/7>Y\_o(ϋ$tm_of@@JMƆ.Z, ބt;MgI$bQ5l̉jiW- [oLΐ^pfim\Oy^`mD^HT0'7x:3>5zd IMgeֺ2y$1}\?-6#I y~RF]4TO7S1X%I'XA*5TT˸X}sw"XBad\t3Ӽ"վTE.mnIT~]Oq8q;钎LU"P8|ׄQ^Y,L0p F lݖ!u)SqK*ey}E( PD/NQ{ Y-`J9bW"*&}gW*uv[*KXkyR?">PD "NVm^T룥X?Lp} tذ+e\b1 QoM4K&(39(Iӕ\'1yS[~sVQ(J@W~gRSTJ-: 0T `Qܲ쭟.PAuG?UFJ LQ]"c֬Z=ppѾf:yܩtpg ?"<{1/nk}e~#EMMD8NMA9(i,C3 H9V4'qu;u^mH_5MJÎ@:"W #B5Nmۺ%(CM#4@fUp\}GzD^S0ɢ z;A2#o@WX~?#\5X4X(*Qe.失-?!,Z, 8:)%Ϛ/AP2X* ONcdh.pQ+H?ꛟ!벵~lɪ1CvlG1 {TIG{Hm^C^Ap XavgH|Zk̨{c_:C5Yh!:}=9(x\~ɬ?83i)dP.I }GPuvoÆj U|qw8-F8V/=Ҡp,OmFP6-Ez NR=Uf4![$Jj;"U쇩I1$~y :g=*"Kݠ,u,pyj셵.':ԐL+X%"e^-5 L(2fx)R?29,h3BS| A;4bӳEVSm rS" lylAI#JOWb ?Ow,0a)+()f/OioL[~5ID) DiHh#37!xa(@g eo/'h*G RVQ-Z0iCz`"$BtxߍF+R,} Vk%n* 3k`@ Doc6G`-"zt8zLH]́PⳄ,.Ds(/X׶b?%I IkZjK@CBiQ|PHxJ tJz0A|a*Diig3TG0/P@$ʂ#3 ~T΍-&a+8"R0t6>po`x1OgJ/W9/|aݦ Lj[GBS 3S;L:ʊv7(W17S,\v>}}fT\ ԓW?;Se"c?;筣|^(٠["Iœa%ҒIx+d%(S N *|uʭNk Tu2J~crwˋts6܀XH]jgc\m[4 Ϩ6&O+8@α/-?҅+alCb7,H12|m66IrИ_(ْu:<|?='" Ia#:Ǻo%X)ANYK_FpH,=VV =8KYz)j9"ĔxPARx4́luU p&_uGejhJOYbr/r5+16 R3?mSvN7=$šG^Bhi;une[̋ x炘qmxaNbp`ؼ^˪G%Q| QfB(*Ɗzrx4m)̓i5 TN{f5*-L SM\jv}HAq ~ 1oc]Xfx "yC@{{,J_:`F]7f?aSj*b!i6_#h3Sc5O MOjC+t9ݒ8݋I㷀[3Fl=j›IB޹0D?jAb] pQUސ#-|VŚ1 4HMS_QuT)6*PC,T"+@?E+tNa>"ZxQ l1H1$BF4SDbr- ÷>7\h,*٘+` ًUѲ@VB#/;c)l+fh+O 70NWJ=T@o2í] ᱱGg.,;} 4utonu/x:}žL%FhsaLy X&4Zv*9*yz|vUW9pz,6sw\Hꘄ5dW_D'%jB%4oIP/Aj֓ Èv,OpShdO U=!=М3}9ک3ܛp>%HRBC;H; ffֶͦ cj*W9yIW3px{M a>v!Ȟb)R J2- [ujō0# JFs,-x(p{^#ÔԦsBzUr(yPbbOu,UqgH@ bKwYzqm~f[9h&u!! +Jm:l"&mÒ!-U=EW/FkqO N$N?{ P zeNW2 MIn{6 7$>lNru6VUnC~6j]Bj=xrS oLȥˈ5!kl?"pYi*izf\COSMAK0J ]G qq5$| +v'Vߧ~,Ll=0iSFڊ#2>󖊗/עb*CKgNVhd} Oc0_dC8w 1p4҉oFR+UEȂ?at{dE*q/@/$cp<*j kDk+ew@]F)g>0;Y. ~k3&rf{7t 2^ÔɯhED-kドtۖZӟf}):5]#ym!,5 r-|K{6.ھukպ_3\նA]Svj)3NBkvoy5[ &]D xa`z%H3 9u0!FG剀NdOKb0)m,z] w OtJD`>w[i2q  ؘ)񘞚^W4 f[LrJ.[7 i(]8iAH$vO^qGȸ&ZNt1YfxFV6V fhhY֑(jj/ "-i1!!Ǧ sxjB:AWC՟XTWj=<@v [ =r[@GnWa.L碍_b)%}D~7[4Sާ?XzK=ɪ*xM_ϱ/DD+rUgJ"k^+\nsݦb[^RrDV2jk~Յu@cBP纂sˇi͙A~ :](>QD@GkqrsKhBhutҺ؅kk\a1^S&ldxy<0|q6&$}6aC>Gڙe*)uJ]՞#UJ6u@&u؛3v?eٜwܹ\cץ0qJi(FUa?j0n0itԂ S@;YF@&AS~dCRO>535Gaz 2ܺ v:, f-%4`y5r1c5v A' &uV8eh,L{#wgj5ŌY嬚{| "DEn:"OF>5JxeO bӾk4TY΋MouM J6S9Z>ŗ~Xڲٔ,=\)W.$P+9g\FS&p 1Z..~B ]$$XΦl{l\#S! c)r%\”=Mj)ԛT fpEǷZŻ ߲`7$"+?Y~06]MIi>|kdl>E=^䑎?i pw%3sYj\K2$ƒhp)sa,# X7aF3xm0|` ˏm•9Z aq@Y(2,@D]qSETiq`4 ]\feoWZܶܝqjp_<ǯ}KxDBƢ5vQ}=D0e"E z&v2^ȹ͗AMЧYV6ϰ.7;<,?kE!Qv5b6q9Oiv_S x9"ܴw CE{q(wXr,ٰ&+&PZ}HO]NֹE)Z`t| DҴs`/(v3@"Y.$< ÿo'!qlb.Jjm]]FvGJt$i!1_?_mŔV]Ǐ=veBʮaRz(W'8mSJ@9ku]OH/9sP|R ОA$4!N?;åH KFce6+7]#ܗ yvQ>^&?T}FmB~uL\foX(iQ;r w#8C i?E%K,Gr }qt*Ktzk #w[ 7TRʹ?"!;<6% do?;S-wa=@l{d@a퓒_,L~;"UơmW~c~~)'~ɸOV{I% G Dc_, F Q ?6'M927 qW9}Eꔾy"ʦ|BQ Ȗm\ADw߇\J1i4<6s؝d 1+?U𨺕aAĬR"!߹#QHvZ8II>EϬ#Ac&8$CD4Bɞ­FHYp9X'noy#Y՛pBp5&s\dVt#dũ=#~>b`̰4s^JqF .YJ'Yߥo'ػ,UtÄ WO~y?㈓T.eN(ZpMg8goz:o[ Tk`RM[iP*+]@i˳+.e]!p "^.MNfP(E 4G pV`>Qiq"^A/by}`%*OHh8yƿ\/SVc4;\< b4d57FlXU!-M.cvNͭ'cG69hkQmx ΀t ѰbZ܂ 5 ق!FCQъnPuL(CNg(M"FizՊט^ "]8.D߲ҜgtO$|ucP l.|("~w 4(t=iÚV5a`GO ?){{eAM p~=}yvxx9MBz3<]O?rzsP~嬎i'n3M]Wѿ\!6}C.;ݤ -̓3L:Iiǁ`9HOI!bS5W?Z=@0Ckq>slj9iow9Rה cyPG6O%U0H02CJyzY|mӐɴ-²[]rZ=!OVTԽMn &;wu lOY? 8 ~IS'c' ̠v7_ߴS+pmg~܋3lNV<.i{u$MZnLyuN}laGw ~o: 3OȐn-{qWtgN56-\ R;Ģ>$Qzwm0sY:`52hzĥRtYw'Xͫc)AW^iZdxlY-ﲩuT*iQ맅4:Ӈlwt Q1Lm,g{j_;YN%P/vANaW K=L{≯fUʺrH֦^6?L%sfu`κ(Yj.t܉1}ǬXk@Mٽb*I]9#[w[VBd]w<]i5@3Q=Hi_UP=m.Egk?zŹϔ:vɎCi^WGV;lZ`-3fտ3&ѿqh5~G= 5G"mRn6{kP"{I*Y*a;C&@d}_F˰"OoS*I-oҹn4u.!TTE?7b2V[I|N?iXfmLS} 2,n:gp30e&AǢ3ifSdxID/_~x'B["ykJ. Xȵ"AQG6;>kGO( hTNA;. a(Xu Tӷ,o4;_1A7ϽwV<|H6٘HE\ -_Gnca%fF:VȫPeBYQȪI@_nkCLD$}Z"DׄBϋ)P3@wWeOD &Ԭ`fpdD*_#!}Mm5jK]C7 w ]@p <9:勵^Cʋkޟ6rXj7@Iypxe„Z;~T`ȏbb@~4seφ+`LӰRxB 4~ll$?!fi_EZԋ :_Ye?gDF,\/:W u>y(mUDE;вZxFm~x~fM;hRJ~psW3$z}d \şl.C4PkBay+IFްPd{sŪiww0ʁ `P2>IKUNѷ"'{q, J;R7z٥{߄[rQ~Uh?UUBH sT@/:>>c|A˥eLȮԅ[v^Pq2EyXl5#cKhpXVj!)l$$p%s&H`}G "aʌ&&0:h|w {d8o;ཟ}[>Rirp=px*h( -/ɝuKY-rХC}b_Yw4{-D(98mӜrZ^„&W eTɜBcاp7d&u$ZN'+<0[|\єr-gf]wrT%~~n@J,Hϒkaw-E>^BrE oV[- ,|FG:[Z'&&:VEj\$,O0<_:Z_^jn H(7j6"#R]pF |kw7/ !nL4DyJ[ #ӈv+;ϕkz5,2},b]wQrcj+cspc7-X"\f1D<lj ܴB@ il3Z^2KEó[Wit-}SvORej6fhWۅk&Ȋ=O`;Vʄ[Ђ51^T,tm3Xsr^Yڬ17̷p`~يh$:{OFFʌ.\B=v_ wAzCa(IVq`>~ҳ0҆hOlo#`|A}#jF#BǮSeLohk%~fk36+R(v҈54[^(WC~ XH쭐 Հtg,& FmhɜߩxVXG!~rAO_2?$LLKURہZOvKXcIԓ;rqV1}E(npu;T~Pv@#r+:4ڪi-2VaX$,FA2dz0, '{G߲l5ZHta:3-!߅$W ^ _h8QK #fP]Mg9Br|JGeSe Q]d ӌ28vc~&(82U ӸЈ'nhבؖ$s'X<9%/i.W@snkrɤC R}b빒0~W =ghcD/Ki3"yNwfd"gI7qO, G_ MJ{@ajx=70TYweaXBu3m{D$fx\h P9S*Z%maI= Yӯ8/ 4Blh|oDcKGsJI yZ(f[5K<8eSm7wfsݝ =I[۹\aΩIroBNy"}&73rO.Epp.5 )rЗ#6[֧D Ǐ_ ol!OdTf(/5m̰0~X)"Z=|ԯr  XZrBCTkh65Yȼ 4g&q>2 Հ1"L|ȑWk-U†0iх7bC/(-LWe7K:k ?,L 7ֆ: v.$r\y/N;ْ9lQ݂|vZ6w~R{N0$6d֚ZRQݴڦHNjdAiX/SjG=||atv'dT42cwMb 7h)1mU"IIY0$4 j!"г3cF AuG92:hic|4aƻ}0Uش2{ ^<:tpEGWL׋x}1#LjEZrcUR@CBzݻQ~.g5޶xB$mb#(xB̌jdY܂ @r5<ڵW9Udph 4kL<>}fP>TDw >,@? OamߨՒ9gB:5uvx$RHM8$PgZI2P;ƌh qRbQb[z].hD9 Mtr& lUy*q @p)S2%xWp@`@ΪoܐN|WZފՎ Hڜ/FCM]i|{zi#Mh(9ý-\PUfo$N/{_P6_ۣQY[]|"=};I\G@`)ha 10&i Udt~v/3Zb#O*i/sV?q͒A%EἡtAv#*12]Q'DWj!ץ~'^vF9D$#U4"PМ1Y&n1ufm>pv¸U6 eH4{C:}IFPJИ|yd;3]$Or٩ڡ Y(Etji8#4^ _cl7So_ ^h\km1Nw4ۡX$1"t$5)CׂJG[:LJ 4nU(f%|;ŸĀ0A!>Jvr!/&sV wozz:H~EaN?溇ixΉB'[J{оו:F&7hZ5$@q%Waڢ c,?uCL•'Qp=@ql[,Ѿ4eѪT;\ԫ؍XIA} w Zw|_S2|m59P;2a;ͺe}[lFܭ9Pr3E_W=٥JA҅ ,|0&&s&x$ejIY4W䏖ݠhH4p Hۈ52_7-eQR #ϟ ; 3;XuFSi[KM|PiJ>O5gLKo/'q֊ +\ʣ1{m$g5Ͼ.g %_9xe>>0n5UIWN]ՙ6&(}PCzOܺ- %לHbr%G)aq_yZj-G4kB`'vz:mz9uD 2ђէY!Bci_മ]ݔ&5' Rp{ҿTH͑KYJBeǯĿƄ.>]ܱ]^p62 Ɉg;1rK:G):5aݶarQR/?byaǧ|wq7L ֢vt w7JUslȴ7 I 嚔vAc/Fwj矺 Ip^ࢩbfnu$ѿHGԭDp͖J&a'gw^&"X|i/&M;+G[P$StEȵḞ~u-*V#CoY=? ڐ+qjZ9Y1p) Yee}Y5-޽sk@>wr`YEteLIdwu%,y3Ο LѠ|`S hT0lRks Oc#I<~iм$%OEG&qE./Sq5YF%p UC WsU~' {rp^@ĭ b$'޿0 B \{C g@RexN>2xi:J+GX=g/MbgF *u&lĵ|ߚnMTG;gj7_̛_kiV=tܤ; \k5?,or}\ :cxQlO)7n bش zj8F>Nb߆R}n,gtq >]ɞ|IQ naV'+RjoelX:{R ߐ:=4Aǣ#nB1P-3Nr %W뀪VnhR_N+6b*VW7 DU[7d Ƀ6Cm6E'F$-Rx%Hi+{Ĝ5fb44&g*!.䓵.i&~Z8c[|al aWV 6z]=+*?.яLV8Giz6ߛ/yL^ijCJAhol慚֟/ okY{n3g>#B0ˌK3}V3}@S/#UGQ/:6̓5piVƁo%phYB{G-pE`|Ӟv47#xBmnfLRHvXۘ1x݉$+9{iRFxR%5k{';788k7(kMZNJkI~#Oa@ui fmtռ>,l2j]hyFN=VH-ݬ44=z:a*il n+o;e6tiTu~N3G0Q&ƜMOggK'G Cav]2$ ; 9{$+/ {XoQ|-}K5T.]c<0\4[~G5J#] QT)|20$LvnP:{qqKlA}\E97diN$2Y a<üm_k{&S/Jo8 6Gq5-2Kd1%|x_DONrۤ%;P4khtz0/EݰW"rEO>̵Qms$*Qa{k=*+Dk܀Hy"Q2mf0x0fK= [CwݡXy'4?[9feauX%cF/Oip#lH#_gZ92ClD6ˮrd4ZmT_(HFoBe#'mGd4vȠle?D:NQx#H {]Z=)!`(G*+OP=Y :L6x[cJZ5 &9sM&xs#(Χ+4#ޓ^|KfRpz&vA?P(RY*pL|e,ҾaFCyr^\Jf8pP; .eA2tb6लLN,zTy^薂D'i|E&(W+rq-cr029_jmmS@'I2* "'_keL9]@@;+弜PU$_U5 U`8Cp9ѳv7Jk/~ 6HGE.aųTT-Ly?RFD"i>MO~|LM'w%$AtqBVZ.oSQfbYFcٺny谭Lo}c+uL13՗U!Fm<=(EJaq$?RM+aBd 4LIs|N`[|pdn>I3gA@ڮvIXmݍ,' L>`[ S@ְ"rJjU0μ7X866fBIL,drTF!M~t\7zg+z|Y0 cW נ9P9j>Q =xn AG}QyCfcn+,N֘-Q5w˿*y ԼIOn=Ph*0 %l;̈Q2v|%ppyI 1*~pJ?y@:H9(?8೹eB*cF|.5F]벛w: [9dіH WvG+p 1Y#bNaS(ЬZ#^{H1LHnARb'P!/洗25mxcy懡;tEsohƟ]sڂN!t(^l; h,ye3Y@ݻv6$ >^)7V(4t9U'jTƃơ{; D S0_(nbOG̒zԮ]5& D-EkJ#uKwr<; ;SQցD~}DgTvXm+Uzs' qCK8̨/qz|xnS2GZK/ÇP4ؚiMń-$ԵkM(" ⟯d(ChnaB `@G `6oK V(U+z=A?p,CD&5 Žl{057R#p:AaC \VoRL^ɀ{evܯ2+8Z,0{ڊZ0T-^ɓ f+p9NݓKAjbD-j\*#CxKա"r<'+?r[UŜHue/'+64D"gc-7(V yE^ skĐw7sHMW(qѪ%G7 )/ \]SMuJ?>$^O{Ũ[=;*sezdxoWz-Q&3B.A~GĀ|8ƚC2v@ytñdy]4584w7i~ħ48#_zUM B+$P-i:\Z@d@ =b1d^T(D ղ 3?JӔy?ցWnYE q_&eTԿ1 ~*nDm.?R+MDڑEx23x#]>2岊2EROM=>v<$} ;ǏLRU\w2Agтx`.w;LrA\o"+Xl -X ao沼ˮx Zzŧ!@^g)& ¥@3&4=-o<|Ɠ->ZP~&̌7]3:#ɽ|d%E9 r*Rq&`qR2 b.!R5xaOb$li*Dg{ޮwQR8;<|f6 R:J>%߳x!nBb.ܞt_Ge*{k–%0Lf&VR٪s;ݾ|ҡsFv+|<S?~gltê8Ov 7qR\NJREHRPC43A  ,oS!#rRXYӃ$w x/5.MAؒ$ϊ~tH%0Y;3js@&@o~,}Hj>Kl&Bb².hso֡*CL YdMJjeixk&vUt54P&8!,Hn-*/Enr%nTq5ѝi1v0ĵh؋æ(e+Z"\_O9x1>L*pqMb*)yX6iMҊvhG8aZƣ-,Gv;\Ip6/%0ػf4 >gϐ[⊀8+9Ypq08*m`SAJ?׋7u`#9 (d uQ),"EF4pVS@tr (<& Dcnnx 8׾>ꋻ G 3dAnxg>7n;)S{ f2FQ조_C>KkudV7cpw7enhoZЮh.s%&!R㜲?c>`nx~NvlƂ~0z`b~^hꌦvo}, /vQ؃Y3I,qhu}I6|"m-B5O.%j ǣp\/FC (U}yRh^B0ir \KLicoR*nPa/tGWæBV wvu bT RU]9ݩ x4mAj3#fOKsX7_1bz^ 7\dm-Km\`;cV31&R *ȲiCύq:MsE"ݟj#fI԰lSGٜu@ȾU5M?UXmPs-BUЕypF>k ]5H\yXtStVk*rك@xJKM߄2Mx|~U:2"J<60J |X^e~&٧=rJ^ qȒg`XMjtzrq֮|pc+-SOR53(4Y/ ^iZYIaÓ*fxSхof?\ 3T:EU}N\iM׃@ʓq#hC9+Xcm\xԯzF<U!pL.|DwMQ :G:tǀ ~ /5OTƀKHMǓ[_iA;iĞDo.`( eD"=V0^piHiobK}C`jژ!DZTBd N`-bHo dKU;CoHwuMm,Z#?Du6&4J_ti #Ctш6Fx=aѿuy=y$zxùVN̯.`oɡШOX9\ssKecc^51 /H=z?A.!LÜ=@ʢOd U꭪?de1vRٳYaQxݓ=1tx GbOu'\$mGB(2ЄM8 |hHle!Bc2,#遼` V.uK̂m HYFTӓY C:Sܮ;[^D6ʹfoЊڭ52qS\-oy$#"= dlok "H$[{w{!H0b[zmjhfR=&xPmڙc+_XqK [2C_㍡g0պb0o5AO.tQj9n_æ ,39_k}tT4Qg{Q4*-7p3nߍ[p]Q*EPj؂:>ޫlܰSg`t:%&m)<)>U=o %/5 پd˻ 2. (2X H"d4NK"zj0 X.|#H⫼ ϻ4 Ԩ˕ 4Z9ѢH+S5'&#~?=(9s30QPΧt0W9Jc3!&n>qQdL6nhQC$jEmhC@V!7K | z5!TW-пXga[c¿z@_.RwK'TL7>6uŬ{&*`fnVRnx0(XF{hy;ƒɤѺ4^b*H²$In~-|u(Ko6R%O[N_̘P_8Emn" !km2uBR$k&maSq>XRQaC`~|EXN-/Jo& Hzdơu}aoSDtVU`_[p->"j4R6^3#ٶgQyzOt늭 ְE~]&V=_Z"ޜI?G 0Z/ ` Rd9[hK?cCM(*"jP13DЛ)m_9l—t<+N"i+R픍3vY|`J:ű{w֖')Րv"jbU 4hP5\kEzbO=C},\b0 #4f4e[s >a/bLGYLG4<]jvS%I?y(D%;JaWv:s*k?BhL!x]@[@^CĤ=L >8*-&RP)ts$"[vW`lGp` ~%t EC#Ez ]n!iIQ7}ӝ+qslJm8^׎/E q4YXe/IĦђ>z:6ۗWyɛN"AFle=ĐcJޘ⦋ļ5 TdQnl:I{y9 KA3|cF(T4 F۲"ܱf2.:6§;XL/%-;mp0xT8jiB>uj?`PnU)ꆜUx/^ڵ<8o!qy)N"LGQ/޷jt QVMQmjzE BjSX]VA͡i^W*,BRdS(6=V>0*AU+<< LOZAwX(K0HF- t;H 3svϋ}EW+T<w)BtN*0*}+da5]*f=Ѥ~kipsYiȃ_  }VZeCIO6 1BԗaY5BoX(p,L3|\h?uhY9gѨGܘ^ 2fnn3-'^w?RΗ0ovx y% U;uŎ6\rAI*ΰG( $ "L S |58{LTf&Ζker ~Sk;̟g9=QN4H!>z)O)L86D2՝϶@4i(gC˥#մDT@*@$nvqT>A~%Jˊʠa尧LW9쁥ih51rlg5!/c]<oz={l$l%bj+eQcyTFǂ4c޾w9l,&Ptk3IT3DS T/utdҬ(8\MORi/<.-zrYHNZI3Y jz7NzSD4 S mxo^2&X@gh-8̓|/_ &)!^±~|G\2d\N:4A(QAӃx,cRlk,uS 1eߵ[Mu.ևq~K翍Ձ7cwf+. ͿŐo|mF@-ݨ74 S?iҳ?;%)u`߮-V+=U9l#IcVɗ!/!k#gkcs,#̄ӻ9>okurEhzKlJFO?!}K^1m&N$Y h/G<x# &RcXRPZ)]u^o;BVX_[Ú~ x-yl4ָbwkO]ogT}Ą!3C7)su?d Brzqt޹"V8 Fcȹ,\%ElOZ;6-xS+$r`p`2:`5ĈFW5@^O\C9e=ScǥԿʕŹr ˆK3d&YkW`'A Az$q7~L#-oI6V:(YEן\^6H͂]GSQhEbSφc&j{1a:EwaϨk",Z-]$ Z}TCiGַCA+ ;9S9Qt%xl#\v"Q2baQX2,(G9w@-0!_fwTl376P2z9Au*PsMcW֊"?xvl;R6Ěoy/y΄d lѭu I:V(܆*.EZIs)0Q_ytK,Jua,Ѧy>y B >CT [wn؊i"8t^9t~-6 &|; ee5t|Y}iP9|ay|JdF%v˦N!Mh2"x8fzyp[ Ⱦ]yLBp%qI{{5wV&ThQ*9$mmW5K;O1܉Ļ@eLQ&"pjҾX*}Y/#U 9ew!փ*߁R!kD(l,В&ٝtDŤ]mo@tE 2G4դl9\/0@BJX-Xu:Ѕ|ǢV8bw$$Q @Lњg 1&6l! 8lҌwJC7gk% ́fP໮W(6 4zE֥DaQ߬b:};QXOč]O)l_~,DLz?ޔvPPt[]EW '`_Y(0p=]~/0_Ht քՎ.ש>@H2}3a9)]+,#"7jޮ ;K~Ǔٲ[=MyzVh'H`ѧQmG;x"A$W7΂ f+xT+4݇)ܐȶ,Ή^}ve<2LlG$#陦V43͆kZT*(줪zuTn6kw&6Q:e5/v\Hnf#t혗R|_h={4{Գ <m+3FTŸ^͆"X2_Tõ$XBR{RZKjOP6@*{`-hKhJ]of.}ϢxKl5Fgm{8RB8(YAڷOiX6! Ug[;$ 7૯,m~w9g躉{[/V,LA7t$cʛ,3#yG h`o+|UWSb"M,@%8x܀84d:J&*f؞;CKg^,~̌U esv%ŐG{0t}#7yixI-^dML̉l]D[NgiL j`~)"S@Phh Խ&QMãr̒r ?7!$~%;W\pR=QNue؀展.B7tSN&hQ95&Mzyk]"; OG@1q}'_P9I^h5gb2+ֹ@׬gF&.V=^* .;p%v%PGeM)9 퉴/ƴE-ЩFyEsw-Y5zZw9vRi(4xH$J-|:=/aN]ѯЖE+4ug@Dc=).B[ƨְFw["JTB"4LPf|'W.'w6{+`uLn' Yߟ8-iMŗYKȄrSE{hƬ=1H?~&+6J_YB&?{̊P jhp06>NbŕROG@XyFC^$lĉ1jdC\%jE _ B걿$n }cft! c3E2Rt鱜"=O|{8=kn2)SiCG"!`Y|k?8yn(z @V.}K>IPC[lr{u>ҍJF]0i$ĂqgÐ*ϩ].{9W_ˏ#\5-,"2vbA gLM oovͷhmN4c$io *i)7 5ʼ0pWe>EʞJm.1ibH){ ]Z,YNwK9h=ef;Iy(LG=mހNCPDe%IyOSפi4@:#Tp&YSbvQAxp]~P9zNِܗӜi5VFJf +*1֠AbrY?(qrj%1[[Hu:?kfu_9ݳMA[RJn o 5TZv:/:` jڑ#psJىgys/ϟ2#69-K M-Acmka_z jDls[[yKwB3/F^(Ѝ{Mft wl3Sc (Y s~#_u32{;莋@`7ە!|9H~#&9.ʱSnM4|a%M#B_*">FQwxTԛcTQSJ\%;nFkjߞQ`Q"H=M ZV\ ;!&44[D0NT9 '(b8AǛdջ}dJfŇyL@p͐'23Yǻ:(*[]xR*'A퇼+W+ r)M~~J;eB~ NqsnH""j1f dtWZJ_qoan#?2b?Y]w[I`ۧVn(RoE9v;C=ry1,v׻C^l |BVmСu܌ueBoɵjGfVr$eRA& Z9i<CCPrZ '' #}R+;޽V¯'L'\o\d4qʋ d2g5 `@p&U}Tܝ1(tJn%T1yoӌ/в7nөȢA'OƄ]k K1GlԿ-ΪI|N_Bxvrc >fnS-!LTW\,tbO9H>a qo3RG!؝٫1 ] {x~~JFu %rmJ yF;x󵵌= u<¯JbLM=vҺGdU<&V ~9~E8S)q?ҙ_#"/†ЪoPp +|z} ;|Dm8 \D&sX)mc^aP[V#igF(ynCߜn~5W?xM3 /ʨň@h:ѥrY谫|]/ &7ĬgNk* `yy-{ym?moc7EXH`"%.eY3`pg?TvF` v[;ϻs70bT ̧,)x,q`^9" @_5vpz؛ݍUEC*zUl~Rb̟UT=O@bIh9==LqC4QQ,?Yweׅa7t9rv|LXD[J=1w'Q s{rCAUm\kf+;v>ȱ/7&OwZVŒWmE9"7w3~I(b {({WxŠaٶŇclm ="eZxPp̓c 9b[1-~uPs+%gh?}l~5MppIpU227&Hu͕\J` Av mnO&K1ݲ-MaAY"]hQ ߈_r3jm+SX&zTi _1uJ FG=1puuXotMJ6Ý ׾Ǔ7v_4aڦ;o瘞<@.IrFZj6'_`%ƈPOrn22W?͒lGxW&,~,W!xLiO֟;.BT+0ן*J;!It+,h$T<|c'0*kxv*B)imar/YbuRz$ڳЃ^ghC{+#,2Ȭ뼌n[w=a94?dq$ϐ2PiCMbJqW1O5zMwP+փH)k4kaU#} Gz7CӃIV:텺8 =l3C!9=xBpو-ḇyMp:1RV#ϷI nvQvCPy2JPEV '}QM hoIcnZ Kv·TD`il.:ڭ_vyfx~8hb0w9é-KmE~I) Z %b#DbG[8Lt;=s6]N!N>2hRa\T^rkLPnejݯ9+l!N_]"Ü$r4iMA%yfֈchJ!nWijК"bbջəj>FALb)1iN9k&*An#|VPܸ2=϶1wxR] A ;cq,"PCԎ܄PĉCGo:%pҡHFfF`bԻJ>Nck '?V]p67:zsi&t(f(wt<)W6N :%:Sx2j쮈x_1vT/Nap7+zaFj<-Xt|+sUkX#ELN:B͚~4DB2ҋx'3r[AqQFl}Θ"9c3e9ץxpviQ(h_j_Ejy*tOU.v_JD4ܫ0&;ޝAMR_\XH4,.[iE帚q妞WJE0lPy BOQ~ae|@YP`aΈ3.pCX8ˈDC8"ŷ0- 48KXxdL䔟#zK z{}`A BШ0zؠ2s?52<[@RAhGvS7zR)GNRS u1~ sԭDP/M S#pzXp>댹+Ig0}iVp/ >6*|4:ٜ[EKVXWQG;Ƹ !N ݅J^k*֣R94k's:mItKkĆȇp5FVi%^Ynf=_:*eU~[)*j((g=5ۍT@eЈ 0!2*dFy4bWV%"/aE렿8_v@tD"@%Ow-^q9kmz4V3NzM+PSZ܈Vh; 5۱`S2kQB(s؛8A d[ԧ H405R;d!&'}%ͭh~%s?v<~" 1t l H_v9a{,o*;UҘRM,9N遆ƒ; 1?Uj|CXF?!!%Q QQ0(|z؞6U+;1PƲQ-:Y۰+*0wR_nڋ{n2j[(uצ0Ϥ 7x @GQHQ-cm5N?r@դfPI-..j9|Ѳj f+g\"Tq#+|1uOx Ro{+tmLόvf|MSv]K|^4^[mJS 33ӤV*bz fqowŸI(-`]'YAXJFQ C<"y ,8 X9~҄ WӰ.WOO2a7`о ?B]0f-C` QBh@v'٘eąz(w}%!֩IgϩvWǾ>[`yfԭ"u<&} K_ۡ"s7_'3W'Ӛq2iwV$a^LaOcVR4J/bP!*0 |}gré=:<պ9"x"&[1yMhRw90aN5=5#P#)vB._j$$hӿ&Zs6ab hŒ:>#7CN-|g3?Sbm}Fv)b&0WUB[}=* PosFU7R'ZT/EsǸNu%̙MB `|g3M멓Q)9Fz$5^i\F/rEwڬ S$@9ÔY06\&j=Ѡs/!#"=1Tb1҃#N螓%X<ʎܵ BӸ୛~aw"~;(M9ɰ/bbb4酐K}AׁIs[^s;'?D'ƒ` ~Zl^!p9}ETn,r7n\U6saUuG: _zco'|g7:N'7p8gwQ5I#ҵ)v'2:]807sLzo2o)@J ^$5ۃ^!PУUZ9UWN| ЗC?L:@S䁠Wm˥CmN¨.JQ5O !\4JtT_ښK Ar#cXm^i@P ޸E$uؿÉbDD! CƞJZ<}!5Ȼr u$Ѫm(| h+E^F5iƯ=S2$?HJ90΂]  #bȊsrz`3}>*cR AA}.z$A4ر^b}V.PbiimAқQ\ Jl)`*I[5 Ci{2*Z^2`|K'u6G0X{TL~=QsXs:Clw)Sv<*bZ y"x:mI ^$g1_q\o(x3#W`PI_ <%O- ȋ"-Pkڛ0,^=>\S}:Gr*cHpEsR$ﵱT/6dmpLBpc;s \k/*Ȋ?#޾&;_sT8si*J{iPZ>Qk>dS$ZQYަ }3J~@kEc4rR'&.sq3ݮO9 k9TԜʟI>T79Oz{q&+MVXOM&>;HAo5FcN/GQd"zs- MصcKxed(kFft=Z3BCMoMlZx ڐ%9[f jK@G1Zld2eaՔ (A&u$1-:%&)d KyuT FM-D$JJrٔ^rP緌(ĉCj֑'6YebAK2찋97Ҏ kEqw{i]6{zS|gVTEZu`לOgrS}"%H9P+0hԉGz _lp9ҹ $SŬ0 K|:Vl~lw !$c7-u-bl*tx S2BZtbf'3pZt@TQ&IN >837D&&V4we*1x?yBnZ]/2op]ĒIM8SW!ZUtZQ>^|fa$Q? a+ȱ1`qܥv|edX sy^<n󟞝"AT2Z6ŷ3W+QyVL*FZDؑۯ|;kz&#%)Z_Jdž N`t-e2)1>.W-Gvx!)<[BifER#;aR%}1 W Twt;Be! ;vhx_!ЪoRB+UHsΤv~/J*&TE@W!&#1VI鷊j*lQK=NFiAAlyv}hlɜHD9mxo~Ȗ)7jI `VKMo);,btW\)quTVyXRAݸIBo XL% Yʒ)zBa g_@1hwÖ+ƀ?QD~鈔_?E7`#OL1m\r-x`}. ȵc&5ن^ MaըǭB7,a#Iam)͎dowD19V oGo {l͎KaHRJa-f%%K[#kzB݂?hiY_|&ȧS8WG62;Q.P.M pFrMGl7FM5fDЬrJ0`.!Iɧ#I]t91"[M 7`tN,~]֚Q-HQ:1)֑VJ'}pN2T/JFsרjpgkjuJ5d /+f6ׂQN@dQ ;: ǀ[%Rk%5zf ~@6 KMJ`f#EInH ɚ638i^I( iZ;ҡaaXgwԎ\u=vvKt-<;\P$hp筪3ꣵJE/SkyMt#Z3%Nӫ JjwWrްa3Ѕ>[2f=M6)Kd>k+* c6'ӋHnq>~RQRN&FM +T\`Ue4)E*c=JEQI yl9 p1" Iʛ87v.hA9F HpL=#rz)Ȫxt͊&[B-- ։a?צ~eˌ_sMDK=S5¡Т?9֒?"Do8LL]sRX<(g cu%Az7тu `^2U=EcPbt,%>sŽ/-ۥ#Rte\R̤تvگ&Ȩe>"۝iXt6/R=@ꑷ1{nm9-4fYȲFX%dLk9IKf@bCd@5U.-z4B-jpto4} >N'~B d SpAOQ=poL{]a3vi r'2&WTJ%3qFZ'~?fmϪyIBxS *m [PJvՂ3RZdrh0?# 45TiTҜIBShJ[X{4B"?f&*uz05E[,aɽnK]OMXbx i^oԊFS& 6)BLV,nJ:Z=Y]*jP5{ |z}Q+NŎMq:s=I̞5ʃZ4Zӷ-fw<൅-.ݳ}Sp (n*'kJ1>rVjJS8s%=@) wc-(0NdV[>e1;$FR9܊Շ' ЄϘ;Vm.Γo;9Ș֪%Mrv&p%->ue-c]mLbD%67HHEjnFc8˱Q 3_&ʉĩ;mqhʬ,ǀMkqvLG +mJbq硡#]R*rD$dD+D-D2jZ`v힢sDPn4rh} j{-|Lq-upKQ bD㮩v@8%, ֪8T'k`4#Pgv|\fa^}»3Q~eV?:mJt_`,D'U]k$͡$+v  zO1I427xVɮ\_q^@r-aY9BS6$M)Ƕ @X-EX7[$p Y A:.(xI5N 7cI&``wn˓ `G'm8 VF/G!RX UBV'= ,Ϟ@J "B=5r<6P^8=B]ro g5~ܨD(cTq\0tBŅ4*q t: e͠$$|{׋UqP=D4,[|P{͝$8̲ &g!8xu($}W]- GR/3 K-P5Eʾ%,>2!Jr4_o#4~ ~Ċ÷.̑ZD2 U>|8S3GrxOXWƭg:=zd!=ViV%a4ItԔO$j,pqVt?"Am0%]lD%̗8΢5feV}4]X`mGcRB,^ 5b磿@N#;=*&XsZg'}U7OCUGk.D&ad-=')]bڔxL#O~mK]*bF$W؎53L8KMgA*ig{եEʰ-5[(ZWNM{E=QKm-`qG |Gq -vNɨu.Ziw*PI]njnI_a ozA\ӀMU[QùvÒ dXhd8xBO Dxg]p2Aq k/#N ߚ0%^j-UI'wqw0]i ?0 =*]eKMɥw4)yXo!,3 [6>AfӢ'Q2!*"+C=- YեY!nkPbR狛 N}bȬHE$Vg<%9_% >8(p>չ/C&+ k;D3=9R\# :^#n+!J_c f"JeIu!sN Ց&ۤ/hzHQ":ewXĈ:}N $H'<4v%Y^Q Ų%, g!wbxChOgȏ-ǼKͫl^jz s] -EmGt0+-IcD +> s.+`G]@6\x^A m}}"mV/ #PŒ8FsEuL:N=a33DINJ}\ +(kV VC-g~' un¹:A<#f$RZ1x[x~J|s#@xWN>S]YFp 4)s7{OSw>sǶ[ATe >FKK @DŽַXyHS]'9}506y/q~1mInCvE .m2)&5X9PWZh˿}E^><57)|fŦrN_Q7XtF';drU~7 TbĻU[\NwGTGiK…HT0ɷ" Cn Twѕ-?`HU[!2Y x.,Ms &h1P3@VUg iyڏnĘ[,5l\[[Y,C}&5k Fe5%/ 11SUeZPl썡sjl6#ػb1D%/BKmNPUݵ']iM {v}=8L9-S[IJaq 뛕W+ 53}gwŭ(4ڼ$%ɞ]įACP~&Qy!jz<)-'9W 9EaG: \5$f1?_=w/?,-{:*z#"|`SyV?47W!d8(]wR ow\Nw;lSժev9{r< mznI8zD3}TAN|FNSzYB>##?@oU={k9LU9͐o%W}yD9fU-љ9dce]@A|++'_Â\ee͛vi\3Ȓ_v-Tq= ?XJg' zeL:xL-*q4>2?ƧH©.TkT$|ϳ÷1[c?HiDyP 2fIUgt~Qb]v.=6ǝxgoX!͌7L`-~zO mp[9y_ڱ_fIHg(;~9bGKp<|/kL`h ݳ{~'*e­Ѳ29Nȵ$Мw^n^ [q@80r?tjwZ >bvVN'8`Ym,Ë`ʻ KV"uSie?x 4y5"{X'Nt Xk˞<^ŗcq)dLj>|oi:ór196&j\(Vc- F*0.p[4lTY$mi볮]P/$Qw881V` s9y2 y$Dyf=Z6ʊʐvx*j}zhyWꇼGtś"aE^E0qY͠\U|&9`?uy3bܥ} %{ĜYNE[X_Sh$x$=tqv"M$א=G9_S`{#Z$^Xf kE?XNŅ0Q'Q-RAnDc;x*qf®|CbWzJ +g]}dPd)ڽ8SXm-D֐8s[d4Ţu:CNl 96ĽX>$S]>Lpʾ$[5 ΂Rkݗ( "TrF ?FbI/NRiwX'}]+C T[V'XZ@My;K+X3H9oQ`1Ȉ*]ȃ㽽z;:T4`t1 B.Z5+T(o/qY$d}͞iႦcU:} x~*&p"(pgj5J/!LL <;C8|nỿh8*p=Ci]NR9-9o0Nx5fKu/zWU$giG+vP˻$sWge^XHTc(&y]0t!cr:1lr[bSyVI:b6d\޺?:jk dCi4ٖ^uK [Q*!u)8b+!!T Ȳ ib*xs l^@P6k 7wlw_B5p}lpdZk(OEC\E>eEyiɅ'&Wm=!e17J ib(]X`WD@Uk m)` UOƙev_;m qFyYpIlT6Yv^\{xz:^ [qA^PQ 0>HMFlz! 8KQEDUkfI_RØ pØnEPd m2Ht: ~Y|vx0T { 8`U`Si9NXȼ/G ?*Qc7&'NZTKFGw@uyxՌf?f~?% &dhehJa3zӯ@Uآ7R[H![Bj5E qRrMJ1ݤ|7T^,.?Z"dw`y;ν?+}%Ṻ6(mݓ`*tZ:"Ex:L (xyk_0 Tn'q|6?O-'?sT'lP sϰ7V{ά#ԁVjP\Ps#-P{ RJ.Yo\#kTWMoqjMr@Yӯ^gqx- iŋP)<\D+o4>OCH!HTbsQKa;0`ڜt!h#c NeCZ2<)qݒ>H60@eB}\  ,V;G̍okmƱfp'hNMÇɦI@Dd@⇰v~KuWmJ_K_F=<liWuվ1)ۋFh4lDl,I'ye?)^i$Sm0b<_ZC>лeOܳ󂎣Hld >JUNʯ!J5װC]i[rdqaB%sQV! ]::ar~fA;V\,*呞:PlCwV2;'R8|?2,w94.eՏɍ}a 0J^W9( uЙP[}RW]v< ?8׼8$86 m l׸PG,7c#8hοgz</03>;\NޒO=7&EAR/NzRz*(q?\ V-O7&qݪSA7Nv۴B`BgPt-t"$h#~A%װ&؉%7:Itfg掉K؛O7cOf\,{2`~5o%q;b4hVlNKϼ%A]4E-dt,+Z?VI3Ev? h8u k\wXxK~8l`eXnBw`G$@Vbc?%Ϗ6W}P Qtz)qA( x"M*`yؖ*'_6rjE9_xf&PXo&vȿ2F4#}MZNo($1MfSFh{t+*@:EQXX?g,6W!3^Ue_yޑDj:a\@ 'ނ5d㝜Ė/CPb2E:xG[;TfYG6+1D)k;75(0 rU ePWIt_'bZ! o%+xlb6Al0 eg{R'xQl,$p͔XKK_!6SXFN7=RrYW5EٱSn5?[w6(\ٽ_c!1p\N AoSM!?rJÕ ғ|j;;Satz⟬7~~yEzvyIx g@86|zcTS,+[ZZb7]KCg~bQ#4dV@nksyJf8r m:}es=xTݹt 3\˟:Ҳs-6\ e qw@HPc(%:n0xkT.C YPOu<ӬBiޓY fWt>]:r%=sa6,"TyOX!)};gjōE]Bp ?/ We>1~6l]E-5*#C~-:kY0ƻ}MOOE>2  CbM 76DžzDUc60ASE*>ePӆ J$6̤(#irJs0}S۱ <{1\98 F+r(ע`s񘨲uja]9o U'=Ǘ\a{=ޣur oJ1/P$a`8*ݰ IQ;bS/aq:~BJ^@*ɨኢTRRrN^Z'J{4?׀O%,D_U@fT_{Mӗ;^)cG[׻.姠CDkIsdV[K-Y8De՞;C+aJO2ĉtI-ݧl1XUKK*eOk}pd,]|v XQC- Gk1E`ʊ m=gΉϋB.!7)Rm*l^iu}P+%}\)T_(;q":8tLd \`v=VapTQiAKHaq'+82Dn{!8)*ۂci?HOHvR?ޤ`<\{۬ ^SE2Ղ<_ʷ, O>egcuӒxYhz<&+4KCflyZ ZӇЍؕk*0[ e[;*=#%΢H@<sshp#ib4 ?[],BF ;rCQ~e~XBݪ&Es4ۊƧC/vS|Q.jaf:L (nH*JhXP=`>J`w}<_Pn' i'3htW#dvMqmo5IIYYU1 **$x\Gl:ѭg.)Sw/mBTYJݺż% eⲴ}MGZ'һ AR>QUq|]Yr-jƆ%au3~OHܛg+Eqb "gp7٤!RSOL ]?b 0;e*p[ 3+XIB/v{BkAx.dzu1*>h.XLmBY)#s e;Pb%P%ϩ9ː@Uė$,jǼh-~51RbH0ipaop{,T UuVcJa"$k@B?MX#@|\͕ݡ|qxqj$Czn,a{ˏ)T\Q;3r =l+Yu⪘dO+o0P/i?NH#)\,~{,!]E")u $ 48 Z(8R3`M,W'#32f-)K7JU(5HŘwD[Uޯx2\&d}W]sf>IK O_aqKxī.rMx0֗6K`|=IhkK`s=cg. SP<5hJ,e=O_z8ts0%>U%LsS+EcC]zr8NO\Toq΂bPYy3t f0Í ݯ x7YEܰYç_S(!& S ʹ{>һyB"{WJxAx<>}u&OV D ~sT y +Yc:nۉzy]tS*7=ygR} /ۺ;C?DFvͤ!X?76#7ԀO ޻-}+數z0\2M'(eM۷tC8<9u_I>>m,+FxGcƚBep:Ӧ&aBc$N@ؔmzj,":30- D 6Т _Tܳ7׻CW-a a\qJ_wfv\bYڃ- mAd%q&ښO❬wajl])y XT 8+BnWr'UZQ+ϧLBâ`2hn}g^.,s0ߔ|!; tTUiaPyý$BK'9;睩\kbdhQW14gMƁա֠8]lVCnieːM)zE)JW8LJl7Ɯ4n&H4ƂKK!- 8M*blI|K,Ov*h@ϧXkEKe1ZK}[745 ~MuvugN AVi-㉙˓L ဪU5Tq=dY^w2}֣R`̝,}Z\33V!!e~Wԩ.~A*baf{Vgr;3tvtr48 '[o2 ۼC,(Zpx2UFYB'6N ۩sHAGT7AEQ{ 2D:$p!˹/[̢q[c(1Lg̾X9'c7!SJZ $VWf>AQEG5{Syj+Z =v; |ݤRg-͟؃B [+$d6!-ek:mcd9HůkE\yX0h %nN"QЍj`%FX2oJ_;[fp$j*Znr/{ ܝNь~a˞D53պZU>!:WUsWG(knܥE 駒oiX@;>nnmkgU|* F'Fmd{Siߔ/6e>,7%1ɡIV_al!fz 1/Fj;wWe\ш:ST\C!CJͶ(FKAH erxs[fk)\S{w%>P"k}tMW7gE'j:R젝1\$<IA526 ΎDw 7qf3 *\~m9 OF";ص/ԜǹBw4sYZ9\M]Sz4Z1ͱ^)g՘k^#YP-o*Urf$=mG?xAքv=W1@*i(dtlx3dYPↁtMsNH;CH G-Scl]_r̍ }lc^Z܇'kg_k*G$8TvM[kFwq5ReE^7e!9Ere@RУcngy$q"!xE` D* 㘨0BN˹j+~Eau/XBeۈ}wu'yTHou͑->*w~ãHQ\+[-+ZT_'>x*K֏}|ts&Q@}L{™Ϋ~;}GC gM c?6xa;{4S ݬԓ\Mjtŕ[MzA1,ԸXO,z6L:2^pF(06Ƚ"󣲚>O-p'hr1 ʋ%2Z?m&5F>Vz(¤6P] TU,@b2kg?DaOBJ)Y5(/ "<y"',ΑɎNl>8-|a=Q#Y665`6)~8֫+["F%x$.wa$cEIrĿ3ZLJju/v-o\ڼWSejdtҮ}gXKD?iI.ui"{5U)T/%icø.^Z3 >> Au]' 1wXp8@ NHuuʻ)`+_oAqZE"?w% u[[ɑ/ɟ+)byu.R ch,ܗ,mm<1uX=bQ{SX1e]s6#A zNU'__D|ԽhtZ^/yɇELGib}("\OyT0C7}VUrH";X@bH/K02BvT6`C|/mI'3 c> xU'H^X_bF'K"G|r274pi6ؽ=oUc`m~*~™CVW ;KZ7z%%Sn:s{&a;~Lܹ%^AxWΦlJi׺_8Е~Dx}zxj"Y; 2TK{bcVFP񼑬AcO:8eY\ 0|R hȣs'r*9gUxg'[%L 3  Nǫ4wqFrb SKnlc>lJo D{>1qr ۀ9\ e.X[쪷o 3&;;-\޵t#z8EU3Kcc;PwQ'k:S 5Gj=V'+)cg̶ݑ@F:./[:'IWڻ(jԾ5,kh 6W?ד2_ѕ]vtThD 8SeQY6QͭS|HJy(?zsԐ6ސ$fM` 3;A&g]9ͳ3i ovpbta޺ky/0aHI#փ=iҶ8xn/ZcL@Z" G&_&}!0imDžQd}ISk^'_6$UI%_(Z3F,UUXSN56СyERcaxw3^AǓ< #)mjc f#Ws:}sL+"#ڄe`M7IG)Ke [|9P 1X=UoNF h }vUS$^։rS/amʬ /rI>%K*;|)1;c.#5}RvK1F *[ D0ӝ!{زn~ElJ,#)0 i8A%lr]ĪA@< O*G հ`+0^AZQ(hJXq__)AN4[ C OT'G+CBo3H2[vzG◧侯/?d"udo?5D=NffHL>s}) yJ'\C.!Kedn Q5#nvg"Mش}B0c6b2g-8'LOl@zZ]6LFu&ҨeJ `I\CS|̖^daFmiQL,vRa+F:uVSEp7rĊ8n2| KC/qVTuE3}hi"C jAg7_IѽG@53w7~5 Z.zy{;Gso97Kxo! J颣\u\:] UWl Z"% z&C.W5c1cycqO{`0ei>l~g$7'IcEIPFԛiKN".Id24)7BK`o40g) e* (hn[":9#|"tm|):|#B4C\l0{&֫Ίb~a诹XoOx"i+~DW9iEt)_ZcY-k&9[i}iI% &M `*c%x." y߫Y"H_uOܑ.]PJN:U0q%/ԯSK*-]$4=z2"VN; p0 l+Li/ Dv.և|dk_P!VlT ˳fZŸ ,W63RHAHDmų rয়Hy#zR]\.EA Y` ߎ=[_scnhB,pw1Kb,h7Z**UtG@䫺U+E-jƺ䑂@ҳdb3\>[ =4yԓ$RXN{ʖ3Z߸o?^Sk QhܙrS(20*MkKt6m-2aCAWK40]g++&FMrWdˎ'Ca e@l4Q^zuxB;:| %[̖U1Ֆ¦}1i(LnɊ#if= Cnl?922;:gihBf]zO~&h>9涱[v!i^QtW2^gkG8arITa9uߣɘ)7h=i$WEJ@ѩU9sѦoMTGbYae^ ڴI" C׼ -[F&K U:$W)شr HFPļQC\Ӝzz'AIG*R014[_uA ~ʯB2hWÞ/dЋOusEr[N5R Dqč98}z$R30CoN fT ɇqXٸRrMmU:4*9ZdYg,7]v-RlƍtEK\Ҧ"KV3*ِ AW{._TâXι[~k`h$E8ӵy,8 0)az}GZ~$ϫײi/9=;I~C=XdspEe?D`b\8e ]V*9,̓%vn].weE%rlU:wnY(nv0 mol~_RuO IXd8;),h*`Xz=1\SBԆ{QR޲2q\*:Tya%V7@cwUcs_+fHcheW^~ɩ/F"wƇb=+̣IXVF6#x3+!$W|j[ qq!~VO1K?O^VdSHPүPZAD)$BDځNz+3xwzyWR@&RN,a;f8DOf=zk ŞUdg{+,ym d78&zKzzew/!BIՠ3> I#0;yGY(l VTWxY;0Ѯğ-;G^1O[)Bq[(h _*yӭHTd _%E1E<.?]VxR)'n'+OEke^UvL`̴ޭ>ij#U 8yw!:QzӖ0J] u uvoA NDɃU!ʰ\O*_e՚b 1rKHvyF PQVf0^(ܩhp?`].{{Uz 3@֬$%s~dqy|#"*O"VfRMHTEOْҽy>QĒM9؈lS5MO~GeYl7 PKX#ɍ)_}`@Ps^;(T$BWR,(1mi{ՋjXYXUbL #]9x 2DZS 9GŮdJ`Sty Mn7΄ޕտъ'87Qw[i%^Ņ2ЙdB3ΛvMڴ#1knVV` 7t IN+z{q~4*kl( /3Z哸Ei˚,i @|svR B(#Oxⴘ޻r ~o#hDbZGh׷,Z*S~ih ~S70حj/k_fQ2R 26}_9rF ދ0yU1Ք'#0-נbK)-Sam?fk{{>'a{He]&sc6ǃc&t%A,hBU>'͟2?Ax;NR`OUB1,x.޼iǎWYc1_](_ [.۞kpEP.H:{T8ITjقhɔg{44Yl"ԜyHàefBB[y o9A5q%|۰Gs".`VC]"L&Jiho j"YO=oPcGI `J:)+F/:]`pᯙ rǶ2yyr ˪tHA7}i-'0 )c":3gDF2wQiISUF}7TPY7O-vONŽE]"5@i)]Y(pS*H1e3i9ZNcw l蓍H= BoB}hx4[\hKFUT~*z)*"nwc;zCۄCwp_v7$r`C }>=[zOr!"wc&y~ބ~+l2Ruܭ{lAY[7AڥזjnSb)?2Mg.+Etp@ CR bFq Ky˳M-~ 9u$S-:!m?9ykP;` ^KBfm\9yw@a{8ŝ O)Wa>ԯ_ ?gci16X^p UZҐZ_ǥjBCғe,յ1d[n}7#U)܇̯I!~,ިmvDJߙ^د' zu?pВ^xck~pj!j#{a~ ITݚk\ͲKl[ z#ѝ=eFhlv N/vvyndaWwVih*xGs&7^I9, @Wbt1[sfTHs*.6$9B o /A:r36@N2\s?Z7 Tl>ew( G ^)%[H]$h'ڏ- oDDOܰX0FȖ ^cBfL;0 ElY-ۖ]㭏̜F,+>6REǷZ '܉t—it띶A֔"xdoܶ23)_=>,(1x?997p7c`7㦼Tiin7Y =`ґ#_2gx{cTRdThC|%.a%]/ɣn7W7(F@ D6&e$N6|472Nz(aۑ5~ yuJ?#lhʦ4ZT"kunl8Sr6Xw`\׋*6O>Mq̅Gݫl8,$NNiuvp:nFC,_x-Qx7dКt$_ҝ<4bq[bL ra͑+'m:\hQ 8߉|w~+IS3NBxvԓ!Ԩ\:;K* VR`Jf5[rDeyfWľHt[e3EMIHMD._k턹rTo{^~=6bg7sE_hF!G +TF?p`r15]OKj>xJf@]apkv P*҄F*AU/u8yRM{z TN_ QBi 0  %Š1I'BiQΪ4v/ZJ>_1xY[=$]7rłEIP ݚ/XYvyʡy>zfqy.p! = l摗f@%iE6lD &alyyC"d<[t/$K+Bi  _:s?GW2"hɖ3@k[e|P OVD&x7nFKJo54d\Q݈U_n0 Φ^Iop8S- _ v/c(%Q"\r&y>$C 1B;̛]s?t4O#H|(_cYrhaO@6!@){bR 8+̞ {(Wl1Yת3LK@a'&Ī|.M4o dPd6:N$?e1THjk}M@:OWmAgaYV2nUJ3U8uӥtH3Jެ >gzOn \m)DrN{JލxČu lr[_ѩĢ҈CSKT^̆\d%9*q@>ҦAM.Y0#;i[U"9ws^ ̝JQI l$wu,Fs+m3%k,5DQf^>T6#1cM{)CHm*BsΖz+{"t>7SG}! .1$ҲVV: 3Wo)7~S""[A 6|:kה6D#2XvjUw!\u]#(z Z#N8ȉ( ,Uy& b˷#A!a;Dc/(֫/]Xޢd:\4&S h4򥗔[`rfq%Ƞuzʛ.qFD ri3-)V"oesi[ +*`[>Ov[{hk='ށ+xe ޚU71gò2x𸑁ڃcg uI5e! ~iZ˵9'$"pF.Ӳ'a$]seƩFX!"1k4!:poW8\=pz=gS%^HH%p ji惲HY/W*nlF3n 7E|6ȎK# :"P$TW8Z) ?j׈j)8|: +4ˇvipwOpVYuܘ:{N UHe`-8s"^Ğ')‚-څ`O8('y | ∗sf'1a)}{& ZϳwH~V}\q4F`<ݛŲ@h F+3iSh 'mדb6!4 9ZlY έ737TJ[`1gjaL& :.Kp5w|@*CZv3ZHdEjO iz61_˦^VqRل\5Ro{(Ij|&R'>`̳%υZ6 C+;N_"۫:bO1Y'UXB4%f|x "TD}qfۤ =6G.[oi;:@GdM|>Y!Rk@oL鵎z[5n[AqWtQ;]8*_֛M+gI597o2]WgbfL < EpwbU爩E|Իx1'.lؖYT~aZ/=>fD$^[l6k*X?nE4+!>;v8ny2GZIzH>fkmɡ4cUiTdO+?˷cfTENПxL)2i B3"1C]qlagS;y a% ryNkcWFz` ?ke @b-҇\t_U dAkRggt13œn(~Kc  үԾi@sw .?VwbG1wTa,`v<匴,_bm?{ȺǽGmޏd>On'pd9uwDvHG/ۡukR<, _^v %S^AQW=#KVWףeS&w,[ e7{[ `o>w,Y3inq쌯O_[%{SAH,p@eXC#ѫLJuoyXl{`N© }_*dx9MB P?rѬ{hnkok sa=ۏ}X2${YuČ!6}B :iZ"{{yb" "wZmR,S}uϴ x>d@*i. .h9"FE{0۱c.h%}*Mw@ {f:ˌR!EcQ:f3ug0Ô5kyNZxڄP'W0f 0%v#>W70SI1Tl,-^5/-onx[ź;kM+4QbslHhG+GaAAs or'6fr #yLZ3rkĈeM20EC(ceɱZ2wM;t.K־X,[ oHu! g;A=13}W.i ukcwsP0yB mώQg3]C]NU7kk8ܥpL{Ow?:p2{VLqlMh}(?F˩ =3)k\E jz ~fRwK#nvf͌Y%d GlJeuO(rG's]M!ܱBl.0A"2atc<ڮ;Q! Z4$(`+U'굇s:c)u4uGZSFg>wJy>%GR!QqZ0K|0!gV$G*. -%0 $BaRdSR=ڻfXW`b'̈!C٨O9} ,RF^Ɠs5Gqe7ʣho ~q 4p w/HjETع5wn>!t! ҸȚy7DZFv"/N:QƟނ;xge2Pd+8LSqHVW#Ckb.…}ӌcv X1;_D1oXg] -^F/[{›^>6QӁ?)ЄY;ȭ5+Ĕjw%*D(g:7(B6(eZq2n| /q U ܨnG%{2\g`fWU? LˉabͫA묥Jf:1 ǧ6䷛A_൚C5i)oo-1X)}0@ҕ\kTQƑUrmI.Zl;C_\XiV?藺:s)l&q#30~°*]yZ|@!L{u z.&?^OP1?1aYF|M.NTI"Ked|Z;-1;aIsC ?ug4)㳧([KՃF =>8V1 8_4?O}M l\4&ֆg*TYz-ɦVf=\}חMUؐ4 (AAr,*ZdΦ}gq? {W{kE\V&}mUGTRoIƆyՏaHuN{`R._04sXHW9gUZjs9aSDJlK`8W飬Gp|Sc֙tjp Z4&v͵2[$оgpnʄ'J@obv'%[67DA8Uwݑy zMs䅭n3]i/jYR/n2<*3{"8frm3ܺfv /96P,ʐЍVMZ8א'p|{ ʦlM<`Kbjx5Vz+ 7R2N& :W}Wr®5N'~̋>'~U^I{6`9L- ˀǛEƎ(,*A[۴~+xkþz1ZƉvknBy@h?oBIlљ4tF](oe ȁ+%5puEq٦j]hM_47G49 opTug|To$ ?[{s7gÚ[]?FᗐYl[k _G4\Ur nڕݷD6h@A8k5/P wXߠTm݋`h?i _!/ZayX d0@A/^`"\?.NAN|hW)ss'mf&-8\}rC^VF=B$ؘ/j(FբRƨnq"1w ||W50yJx.`_9=c$\W[}0Om箇F΀rvT7_B"*Sn8x)f|5 kڵ8sB( f7V(!XgZ7+a_Mk՗Ɨv]܋~N*ܟtE"a)lp"|,{H1j֋p *M=.gZi+{M1[5q Ӑuf|kTw!ھ9rP_#"7)xnґbM)9ȸB_ye⿒IԋXףP̰`HA~/>5+5[3",g3h6kdN8"dfʀ'!ey;f81->[|zj\S{yuК4ݔTdz b߼}KbyfJB:).v.n>b&aF_,h&2JeF4Rq-Ńfϛ!e =%{lA>.8{hƏт̞4`T>)xӣEվi. Q4Tp14F hZfh.*3j}ӣ**wտ#_!kNtG1( kU_Mx7ڍqy H z-g7^=ɖTjl,\@14wKNՃ%lp"1G" 5b(jǮvX 92Hk׬/0?4cFq_oOv/6*o6y{5+~?$D%R'Ԍ(ؾn~шv"=.$x="z'n8Ubo$jOad[9KNȏ}mˑ =/yPiCT9Fb)G7E 7=} +9G4Kf6lu7ǫˋ hi)fAgoQAQd]бKcYaS> .Y ޢ6bF {hǢ~w7J*;8c3KY9Hb?a:i-'y3Gj)xYs!q&CL [Z9_;0fT'zwY(XdŪc `;BguDf] D?VFiFl\cr].7]ZwyZOm5[$ant"hշ4ibW5)B#Ȋϸ D$Q npTnېHQ[^|&V6G4ojZs:(v!\* )~Rp jOlf(#CxV ;n?nSWl7=/8@,]acRw=#vf/*Y7 3k/(+2;iv_ p {/gk('w*^‘e'C86,e+9qb(7Lj@й`-f0#"QZ(:"W9r+tZ#4@Ѥm%ArC%t62xZ`P<˨% w!am=@W{ێS^yUON8vL-, O,\*Ò1-;x ?ocd"9-G-Wnq˖[l:,x: NɄDlRBVAoq;DZ|^ׇ8 ҹw'њ=J@Zw!jX(vXr?M[K G)Ĵc_doyH[ﰚ[,Z˻É d fT_tOChW `I"Mm6EKmJU YЏݟfNU&:u1lר &SN8MfQcr$lU)CC7A@ 4WkS:eMi<=֊1M P7Z/ˀ~LB^mZ+6Bmwc)vf2iSgD- kӓ;JʿA<$NhQ.b1YdKE7sd 'Jъ4<'}BH3G6Q Fl^w7bO7.u}= s|}VB94a#*kVw1 zҌ)bl5pJŽD- ;]4W1e*83pU%iu3_d 1տXm%orc Ax+4,?Fԋ=Iae*訏:Qg<6JHeOkxqF 49cJ.:^/f1aDiX6u~xwRun<}5wpAOGV3!Q2Au6U5v;lFf=N9\fi~٬XtNrx|Ƃ0uC{w%jffcvYU֧T&V'tDRpNQFKAx^B#\B0iYAGh֯(P22V#wS:.odžEU0[>0mX--[hp(>Z9%Td@<5E9˜/?,@;vu-q,U% rIRSD8 ?Y2H3QiLnMƗsݣ=Pʨ‘^ѱF Q/f-fF( EeCu, Q:6VU2#wnvۈbuR#baJ=l ]uQ7b_]MRRoE[Za]U IuynfYckGEZjG\9,{o?HCQ!ǔM0šO${NyvN{m?=>tcjRo߈Vbs%F&j қ9a'ŧoV}#~ /ɦe s2G?1Nę s)O7#_5AUc 9$R)CR\|YtܸN/J/V3 wOEǛh,[*R@&x 2΁+"x:f΄6VǹBt$kXxR|MuطD bZ:4ݒ{Ra I>֘ Scf+qnzoM8.sZϘ,0a-Zmoz/cdfh>@ \WQ7Å ) ?p7\',=W'Ӌ>Rs $6jD!PBYn\lwC ѭޥy0m]ёC8xn.O*iD{.z>4qD'5 ʡ]S 㐬AI)#%<=Z$j1e!|9`- j6WBl+@qu\5}BƦ6P0(/t5. ]g>WJle=O5X9v[=74epj8 =:r%DVP6Ei9め#Qʟc4WbޒĬ_ڞȞUޞQY;h>t\Q loħ /5L%Bʵ5oeԝ;+7Qoc<7M9AdgF1d@{bgJvl2Qt h[T;aH>n,!?uG:UO(e= 8AA1zP`͛>*bTӇūTJaN|d7_6q]F:a[JaעX[a$ 1ROQAD rͮ>2s:q9?K3!S]z[hP N̴Vg",Q[XVE UX\eXfFW2B>@DN 2H ܒ'ňQfЀp( }uak4 "*GL6)Uo3k5c"T-׌̍O|9}0@ Y0!Wq`H’nȧvFY|v#ahN57@d+xDzUCJChu%րtgiB+0g{P0*-X [EKC25[Df Η/E1@p'1d,^EnJ P]9f̦+j 1[zW>ZC (ÊN*ߎTݣ+ [1IS+ZHRP%]{@\yo<,")*U_ΓE_4z_{$~\g7̮RbsIQ IivV^Gu)d~- %㻪`V6e(JSI%qqY s[h֓KXtI'.(p xG~\KrsgZ:ùܖf]' _MO <@Uk"͵b+'MV2شfM ?#(NFճy)vF?{RiT+ |vkؐ. MC%@חJ?wM8 PLD1W6SosriLFNaӯpA|EP]4%h+?IdH,ɿwʇD:}U>LŸZF+^fL_vHFHo؃ᘮFMXΣK84Tl%)©/ 3MvHI34%L G0 wg YӪb˅]a9R x=\LAB9-y|^b3즁h`$iq/Ȧ Z ;Ih"w>j%GUVµ9|R϶LfuO/ yG"{8OUm"VN hx<stC^dXmr,-8G> ]5ah9g@KVڄ>j SKE9'DaGsq OFlIV^M'0}'Bg +cgqEVZ]toE3㎦Loњ 2ͯ)f֕ 0!&T7Q?jY7P8>\/kf1+ ;T ~Y_0w,4-d'%P݋W/vP^10?4?!1-{41iWi9 Ԡ~O|GnɲIF±p RH")c|q~#X0%_ ݺ|)4XOEaХW)=@H5^հO og;@trMeŨ ]C o9Y 7[FLY[_bi!=%mƐtU 0hwI%l!qmt/Kuh Zk˚˰U{KꮥvJ*H4̛Y"e#:jBW@]+d5octܫ/'~n;vE{V8Iׯ,2#D4 ӓu ƝҰC_VнS̋ӠU[VP쬥tBX7قB10Bg46&g M74/m39qjQ=%h]Ċ)l!O|Zm-J i´t1tP XW|q WLfx;ԫǐ{ޒg@cg*ʾ@>/+;>\qvl6ր{q+ac3bETqJZ=dhp J@bċN`CL ]d(ngL (9GQ޲"\2:gR 8ͮ8Ptb* %ek:!aj|jj-(-p6<'MQ]_zOΤ1:|x"_.!ۇ\q#ptk\+I _C^XqhwOE9zpc(ߏn#Q)^38?%Di0]""cm9Wa<抅j Ud[t qG+!{=ʪ70}KAK̈ۏ}wk\`I+i4nNwbmozo'y6ɻku. Pj1tsfvQ8'[YPyM  XluD+E xf7'IE?$wU^pª[ z`cHrqXg*rk1=<jAN\ Wq Vk%JCWO Ўf iF,A@+LW\}%UǕ oEub84ll#kv^E@OCV~\VEd!I8¾ QXr/A bA~tA̗ҀU}o4SOڢM[XUWgpX[΅_9PQxb`/]XA a5u  DۿO)^O%4=dQ@.OYl(v)a<`0]HhfxmeVQY S">1zoDHEUܡv'ƽ ͹i8@~%{)'q+L/i%I_:YgB9f2^՗ U%kI->qϡi,y ʙœ ,5¾.^#Г5Fؼ,~oRiQ7kuׁ3 LjA֎Tmn-"gx\V|x[ɯ0zV~aDZpHbמdgW:C;Q 3f@+*9F%6&$^,]HX 7!< 0x׭F:=wp"wBWLky+yn2*fH8i\;( ݋R񉧀OE{`e(%jGUP+55Y,u2W<|^iBnsXŷetpJr C26d"ī`]5;h ))WIc';y º*,DYq )P=!MY%-Y&.gw!VGS1P():_z_PB;d X$dn]dDOݔ-k}T%X@VziÞϩ솁k )#ie'jV5 2tة,4=@y0%"i=v!瞡Men)Y8i,8I*Km[hi}ejsA/Մ0q ҀQ t^4r#Y{*TmFQkV|I$ #_NtAǒٰT"c:Lޭ r{'??2 >$74?vEx}Hx(#N| vXa[c&[-R0洑ş"8*`lM7-/Yj5^ހJ A^oXT:|pC#P>D?Kxg K9 7.Y{>),V?̫pՕ$ ,agjzwH.Po7pYXI~RM?CBZlKE(ۊMo4C ʬ74rW!ȪU=Q^\Uh(YM km"ƾJjm*ՇZ[$H5SƜL]ST#xNq-  <@y r׈cn9SCǹ!'}0-m;XHz*{kUrj{AV JhW}lӐbnF V&̘"ڪ\*Qg{NRm( TׇJ3c,s 2.@ NIfe#+:p A"0h䋲E݂\Hhy#*s~Y~譹V,]| VZqp G;FOC-P)d"/7 G B%n/pH׃?x64[wԽVDoMl0yl?uaqǩ߹wu;Ѝt!1̹yJZZ1ydj#TFhP8VP[n4H]Рw+[GYiI0].!Ͱsk+2I9)H+x4?~|a[l}^=sVo]m qYK ¤'nٷ~:8݌rHwY9|Ҿ5[B:)&SZURIomO(2ƚ 쿍?s'v8u,U !IBt^Hsآv&qncvGφ*FS_ۊ.C/DX2+8kTUynZA^CH!WSn2׈#kVS`*̗v0ϟ .t8 >/MSl/Ymn_8kQym%`S(X<|Y@)H)72] ,L4/riMGQ M_j^~(l(1<( *y׸f(3Rj=&!L⊇AآCE{Х!K8揫 k(BW-`r@և C,y ]ncF`xM¥ $ \(}Y>)Vn 3˴fE2 N=M KE,!8Kw86U \m՚( ʟ𴨒j祯+5I4:c,GSsv Z11*bw}عMJE'HE#r EXgܦB:UB7K00K- wjE)Qo6?+D6w`|gjbwf*>_ݰw&h152ᚰ= I3e{bO5MeY"?@wN9 iYҤc"A<5S%2TT4O갗;nuDO3A})?kZZmHsje|zXU& {/)j8OZRR\N̆DFZ'#涛7{{Iw҇)ɗ*IhPh.|e6d ned7VP+%Dokġ=nE M-2yeGбv 1_XIXV (rnz8"e\M9̡*'DL#M~$ бex3-EYupWa/yc OM/Fh0G0RKm'ag&%{Qe7FHRCj ˬ.0;2?>LCZLQsܢF?}(B6AD;8$뙥 Y d :(% iEyJٸ@溏EtH]5d FqU{(JAFLu*}Fcd6t+` sցq 58eKGЦaWd_cS{\>T6ol+3$2XUVQ KJnTǠpN/6"ϸgAN B/ß˭*l(07'xT<\+U.`td%g64V2_-LH4 Xy?ې wi=ҷxv{X"ƻL˱x'qc` xx["1@w{|g*u[)i~=CPb?Mu)}t"ոH^8 G~G5.P5 VAX^'~vrvѫ^]ӆcw _7r ^~ce iH:C~-rQ6'qR]1 "쁗*LLez l]+:a=R ]J7a TlPn!CՑ nHUl{ғj 5l(`A4| ,x7ӿfDB>7D!EY<9Vbà H[ʨXȯ${ Af:!}W-V aMlּ8Ljc,W'^B CͰx]hTKj\l_ S&Xr Z϶n)g\<<ɆC͑763юX><篳 Bx0@Ooai3&lO36/w^2$/A#ehꞧj$;:- Ct}1乁"BlF/wuWǩ9#̯ w?I2BOV)V %'갖 4no9o;xv: O )5d/Bq:K,fQ]BH?gfA+ HIm n5׶<=RLB!CSq:$a|X]_vڕ(B@AϜ )*H_{6+:`1J 2XS޵VUFȜ85l^np3e#usѨ$;:뜻3 6gbxzhJRx5eJrWSbwUrYIF+H03\RX`4DҀ hJ_uO`]ԫ+ 'R9J[*>U)~zԫDg0 m _Gtoxnlhdj֟fw5 Ȋ)4ϭ ]vG=3}hjệë_:=ֺʯ":R|t@ۀ"|Fǘ֡ +O1ū^dّI yF{mܙ[5@=wuc\*]=Õ_y]T՗oT7jmzBH!i4ЫR:u1f0~a)C8cF'TQ%RWvz=ݸJg|^⣄y <0`KVl0cх7( 6S4%]g>fC|ʿ龜v{jVobnѾ>˃?,יTDQE0 ̪EFS5ZKMrA:jQs/@r3֐:~~ #Aܕ837ݥ8AnyW6(!;>|*KvO6 [sbZ'FDw}bk3 6Ɗv*>9m(jz#WwI+!p-6?*Pr뫰ئYĢZ¨NYfR^."brzk)'F7j!uŇ\E]j $БxP06[d|Yj΀nT m-tTdaKOBaYhrazuĴ.rR8zvdALIx|މ֍eJZ[|NlLkb/bɕ[[ #| Qp-WAEcK.B"%J87ox\Fٱpk=Z ߺ5m\.QBkQD p& a{DT},]>@;QgQz#E%/U ŹH3*sB L;EyH R3U|:T< etsfDm|-&*:*c]0 ϖuXɖ`\)+`2Ejw#qySu%h,@[Q Ua|;0Ŵ؎q?o.~QFN?ռu6~R.W.ișiB@ianǸ.GzK}\AjANH.򴰀qHtq;6"Eۮį]s*8 7k-P=YC:~N4IR$;sRy .d,іXƦl^9/ 02!_V׹m.`& &JTf5ĻΣ5cc $ JHaÞvEc1p`;m Mwf$v(Qz+BTMUC K–\t ZZA]87']#a7qn Fլ\LIAIcUD/ VMyˀo⥁nW1Kp} fusDyڑ6-Gd]x"@daoI~M].ٜO;L-쫓 z3yҫ-[#;fUR4kv|)5¹ +veEo=zt[`;Ļ`NAlסR,+tia J74ph,;v*/Au9̪NƋ[ej#jVp_+ iMU&slT>\)\b_2Bw_:XIXlv;-_5Z_ǪZřsg95ڰ*nC"?}8Oya =zuOk[ϛLp!_'vmyQTʁ/%^*Yq7\Do[h$0_ ;vŽu T$CZMcP ȗ3y+e#wJKRJj3!oR(D<%р Ր>J9X x ;tPFﴻv1pghV)+~ m/lNhzubgr wڒXpS4ϯ}6.mďrL`1rN]>2: ZmO┭j<+i"qeRdv>:tt7|4#0h~LpgA 4<奣,XJ2ʰ(ȋn+ 99R-hl?[YY2op ?]MqM蛐 $52!)o4x:U b.9=s>3BߵV_$#hfXQiJsIƆh, +|V ֢P ϧ'9zbߝ!,s{үPJz K3Z",Uh9 F|-׼n.6+Ȱb,]KԎ%b^$T<K`+Lʬui;ћL# 7Wr xUm|Pmzw5 H Y!tdheA뇐xjrlqd sU_$# dA=>)>7ND.V}s 3~L p&9l'}=?nLfmT2lĖK  |"M͒DES'J$GP4堈oDI qBjp$M}}e}5>wE:D4 B5[3;9&$id/@@A(OFbAM/o!mB2ӆP-@lQ*Fh7>OW nytRJUmD: 2ҩހEAWa%"2jU=;8mp5SbfRn kPj:Aw &V[>OyO,O,.| OV:*rm0DPG }wq3 Pgƣ#f] !5J\5gww%0%5=GzJiշI$4pbRg4(:(Dq|?IBt ݕ<_^NY{E7E7?=|%J^$1$Ygß}'ilFF:w@1Z.&ͣBͩ`iSexzD ~LWզ:h7ZLYL ,0]'1=@|~&!ZEQ&Ҫ seOECs"LH9, OF@cA‡{"Vm~Wʢ׎wlRƕX;C3TG/a}pyG9}ƨF5@k,>w_^! gvuN*4L~XP ݲ4pͨ@_7;d & uQ2qeiQ_CPrLD2CZ2dV285H90ZU-A4ќBҬ!g' /BFtgIsKZfV5 az4GQf=,A}=i29[R9fs§=WʧakAmّl%gíMؚSEɒLmUQRѓϠ5$5с2؞DըEwaG1߿ j{}bW:(d? r m?کՠGcSf&Pn"/d :jyaCc?b=SKn{P?݈w^l vN TE4R)cu,q ]-2KIs<[x&䚔'N`I}av?~꫓cd5S-W &j,H+0!&ʞ( '|8lOKC`-Xenbf;t9 QpÏC8u#cF o۾:n ]C5jgDP^ڢ zѐ`N~,vm^t>S︑pQ lO p\457Mt/0cyn<Ă*Iwl柫eH%ĔLtߌ ty`6dB:B[l_Vf-J-5r8rӝ(eN+5vRXKZ=2=Y/P vPt"84&Kyٔb|56X' h CMts)1V2^^ޑxO,DnV$b*Kfa]v H Q3?歹WSMQBPk: öco7q5_E@m\X>7Ur@- uLΫg;RW\fk~MǠS$_AK&#h#>2+Zݴi옆B퀜mP%.iYXƊ\(G;h֯s_p%=xLLY] ͑r[&GA$Lmc_q2}A"p#R.ذxGka\[hx`,C>jC!b Є%~]`ȏͭ޿ؒSU֞Do ؐILO^Cҋxf>WV;x.@NMf.uƶAuRlqGסم yjv9 $ @0aZc;ǎe@z;Jat&e\HT Tf6KnL  Q BN|҇lXɎ3I@w-KS.а 8؝:6r*G/?N,kq6o:帖x]`V~4Kly68JӘi7^zbdQT{Zi@=-vX_:iR{#.>u,uqZ2}ݥ62kuu;Lcj1}djb䶟v$9g9uUZ? -d]CȮ~fnՙߜ~;Tĉʦ+m$ ,VDAK>Yn1& ->/Vud«yEɦn2; e:q '2|Oo "'\Qn–o΍KL`ZU !Hf$ d(MF\=޽c, U~E<;3A}X1lYk/΍@Ą_m3TX8/ YLRj/x"kLO"VS;ij4mdocGxt.Xw il8V4%z%Z̬|R{3ˬLOSfA(/_0Rk d!rGHlZjuu߯qZrU2 ,9hQ]3|CJ)n` Ppq]RRhI%ts당]a *bstQ@ $TLR?LC12¾&ZQ`<Şb$:|VE <9_Q#xij"s5YKݒ&BF!Wἤ/z^`mG/b$HmҐ~\8p|ד# Uqd [ɒk. %Yqzh_sqTޮ]VDɚ@e%;L*Qϩ"R(R_偩 F:wcEm1/G0X\,dfYTC[/@J⾞ʄ $`6G(HiL$; Q?Dž;}sr+yӠ_.s\z 蠳1(u]r޶B X{[T2V\g\ʮ x&36.+4ԗ.6f@mo>F!eG Ǚdn!N鶒c2Dt=;Sy+&E K8O[Zv/3"VQ:B1/FnOe/FU v\ S7tGЃ\,ϰ}}r8K!Vko<Rinp 1G Լrn?6܃%Vq?5ȂGr#!Ou&I梟$gd{ UZF@]Է*ByWͫz?hvJ3t45aJ,>q6p5i?o(#l\t nNKll/kj|jy #,# 8pQ,4UXE:JM]/X2}zˮd>tZ nOvSiYuEӍ *>/{l Οa \Q,Y䕯ەnS LO[TM<\l$)y GY!Rc(KyԳdy"vfБxלp?^cc18Va zo,^"Ȭd"|!O#aդ TD+O :ฝee^m'=v XlLQs#{y Vйs(Z/;z.Bӛ%I;6z3XPo/[qi!qЗ/piӻ/Rx?V}PHdF1w {%P퇔cֿt2ER#{XE lit6ЄTkUXcjS T:V Rjj衢񒷎G?zݱf E:3E|@ŵ_>CX  <9ՠVkCCT`|g?rXzJ#yWKҗɉ/|jzjF^w*@B qM<9,xç) ߧn@jsm)rbq,/bQFBaBǓYoC 3E-JaJ?;9(ѠTFsrw̾~.XlaODMjZpCb`HPu6:xMX `8.Mmo_׉H[+Ha-Y ڈ5$7vׇA7%gwN֏"xp ߷&`[mIPʰvA@5BwTLI~Nj *N<[x ed?֓/.&(kub%Q d.ni~ |Ju?læy4D13K@ dP6+󯘕cpPDپy7搧pS?VSMh13Gy@%T/r=?Ml }p䑨uW=# :A*#elJ92Ǐtq&?$_<_&p !p]@]Rng«.ĭE<Ҷ%N Qw9=ƆEi4P̒Ũ |nx9Z hxQٜ&LOkiv!md8N߄Xc\MeK77A3ÏBk"s<̃X"yu:MWpA:}^gjWBB_I ~!6CCq)C;%XaX'2<01Uzp;w"ۮiZ |-ν`#R8`/ 4yH})؛1"D8m߫i KR!JW.#sB qQF|ݕwI k(ԺHiI_H@M0%:EKM)r2Gd,aD՝Z h> MDj+o&m4_X杧P^lgHZ8A'9MnMmO줕^dT*43( w3}Taeɴ8$n;Hu 8rsؓ`XF1[A-L7f.0+L g: Hɕ(NZ,v;z+qXe`99._$`$r]( B(E}f?j}44rڤ؆SY;gl0^G+ZH $s)k^!\L{ՙ~CuowܷX+&(a %ip( GxNĢ#ݾ\m| HhMeD-TXК[6kCֱEb{R< 'pmRA@)yb7 pyd ȅF-p!/ZE0p-agh2\3:*-uʲ'L_]@K׽+d&wߺBwO/%* n MPCUVHMy=,t6yh|b\;~TJO#$0r3O5^?"{.SU!/!>)é I5t>KgI-4q;#-ҏ%0E"y,N0|٢so#y OƯyVs*hLJwUZ? Hy:ܾr6k8lhڇ6 \!m`uQkn{{B 9 {Hy픑V+:&#+DMJ="`ا)T;C݀ؕƵwk)x/bXY\݃zaLA#"SDad\f,?AAfgE.Xv Isº#9Z%k,`\Kuq%sG>#!V޻iͯ3j;ZYUMq:R >(~Uy3*L;783DMz›@#+Pg~jiڇٹF'/2gPe˿jzWX\s'`I'Hz~LmLYN{yrBvp_Ҩ|wj϶Š,l=_N۬pRgYPX ~dJ 5E@RH >nvwɳ'2֦ .,T*6&nyc"mrgȨZ5)+>9W÷ (m%aqhe".;6o: …75w yYΖ9m\pc;Y˂͓cL*_sODSk KA&ڀ 'nѹ9cH2='4̑7ӵEԂwx9E%ϥv.~cρh{QaFܶ.gU7^tq# nüشwqP3m-_a'eon3k *@=X/#jg&?*㋋Tsl3^o"P8KSǭIT_ӏ$Č+BOØgWpy~:K}! G`e9|J KϾEh^S f^ S4UM# 6=$lmdk~R]wƌq,"20{^AzWK e Cq꣡?G[{hb A$[$0>?ÌG^n /B[gqO_00VJc޷Hhtȓjڻ0T MV=* SL7ߪ~0<^%WL0@"5lqOUy֠"<6*r4oƥ x8Hv!T!e ",  %[lӭ* >Wf;aRS4Uo gr6ADdj rNemNbjuO=٥xKSy kF{GrI 1`4m4Jؘ37*$sБ$EKOd5T6FJ#YE hX-Aj6QX3e?=H#*m|\.^GPKG9UyZ6WwޘuҷýܜԷ7Gsp聱޿t˞9“1=8KޠqC0y#$DWO||l y-[9cSก<[WljGX-J ҈SOźRΡnސh$IaEBVFv+{w+9 e IdV[\z /_4c%-ЌƐUA5ns?GRk7T$b6܆$4P kOBZmBTe^׀V0xMu2n )58%PB(K~'P\;iX6ךfX-q3jq#t0p[6rnM\\)ׄ$QSAq{h4Qڅ}Rn#L{s'B ^&V90ţb@5ׅ?i vv[ [3':KT,؎L0P &ԝVzNayImzUpn^~ 02Bj}i(A޴BZaʀ O$Cqs]>;.FTޓi4\pY(fˮ{#KX.Փۉ9ݝy^wg\]S8[|Rfp!xA!~KhV77>"7Dtow =yf<.cp^ܿ7ɡ]wP47WGjij_H<їZ5l9UrctniT/k̜*!?LqzzG&嬺) '+!O"nK=o*:-d #wT4'5z3\E Tb9A7*<ر1>v;OD')GWxŠoNzJgB/MLpXQZQHARy!:0Yjj9&\!n]2U#Rϻ ` ئqFQQֻ(3Wؠ&0 TF|P<(޴,SV\10# Ե?,_g! $ 3TZ 3oJBTo ]n? UmeǧA=d#wVGEť{ndYJeDrDbvnyNrw@vd;D+-1y {w,֮*"Y_Gt 0"Niɋg꩒n\˞Ũ:HØ1Tfp-#pg?$[J-D1-ocmȑ4ѩI8Zd'İ?}l:r'qz&z^Kx_IK'MP$.Ql:b >۶NzQS˳ {.Ճ.;62$+&'ڣ 'uT6mx|nd;L0#":JiZiH2ȀwSEɮ=M5Y/mZ ,WIA>͍L(Ar2s]>~ kmЦ}eIڜH\P/udzÁD̥iUB9JQ,T[ЁY,7D\p`:H vX8e= ܓfBJ-/GE١ BN_!Fm2DpWyt94T!1-s(^#}OOK^mB+ a+O+okhz¸yLjW M-L 9fyrPkUЌl~`d. m.>=}DH&F*PX5m*v۶ ǣWܠd>_y0^SP<`4[U՟ K6W)9c9/կ/o2OsXv`s{&x\iHYX 7xRrg爧&XHI]E K{5뺀p ˤv\dwm!2YHIgh %OHWzf`_㪠.U+o?ڂjm&ݸJ|Ċ<Oݛ!)D,G3^^vc7)bqkT8 P|;Nu*x߰-R vӻ?-Ol-a,2tB18WǠh% 3~:],H+O*'`|F~ 9@肨A =&_W Թڼkȥ hG6ٶtd ׈ܖYw )|υou)X MXj%7.tvj[PiS)cV] !\8po[whX1jv MʸU0W͙gc ꗧ˙56:d;DZL>c.קR]c6Hm UkHbPJ^^T pj:C{?j |rLH+ :DYGdg;i&ioxGL>i{3rk27!H0*C#ZS#霒G\-2U.}>9@B3$Gc\Eh*g Gp-թ9<2tRo M-'ebȞơfR+O@y"أ9ZC%Ja}E}~e :}LQmtnx?OR/w<^h@9,bBQ+~)-; SA9[v@׶~qu|%$|uc%~ ԏI=;T*6Wg aDhr)&X}|n#p4_wXTxrRC[oNQd])}&XoLrfmlE&`-)t-?},CX5ӱQ'¼;;.̛fDhn׉KWk]zޥrFА1@S/Av0?7v;AӶgsY&z߁CFw<PC󝞋՞G"Ӡ֦oUHxMՇDb6:|Ksǧ _)tp[sRgs;`'*%K"4ye6g*Q;pvy^if8IQxZsqz~"$d#Xi8iJ X}X Q`mk]]Ko揝neyL2EiԦ a\7P+=Xǒ 1UdGk 4w'dKe+O5LsIadȴw&(T 2/ |*^H]Y?>'!g>+Df`+\v[cUQ,bfvl /@˟=LQ$U9JI *7 coH{O'Є q412&"¥;' $B3"d_  F816d^[DH?wLp{fi Kj}:~PoA3 +=zZ3$T4تxuSYG\֩gt7+s)Ŋ+IԤ^AZ,=q=(d=[c^!9nΫL=YFCi oJVqnB57٤# U6# s .d+H?S {SQp;\?*Py}Hg &XO^eO\ #XOR63-Yb7m$l&ƥВʢ%HE j8M9U<3uJi! _`q.yre}"pks2ko|wvC]U~FhI U[+ض`=qGӈ"\FŰT!V着IQQ(8v :-%<3%&n4|5&ȝAq69&,qK1V! rg_PI]bئ`uۅո]q3[ǜHe]CD,.u9 "\">V'\**CeV1[ vL4}eByGAֶ- pީrC}~Xo"0SGTpyte8gʶ|%!ąĸX㹾3ijR| t߹`>(-Dfͩ_ V4z҇CZe /Į9饅. _k-ò/ <^f2T k =ekD2Z j UҀRxJ:jsSJvnhfFo5+;o,V,a+}[{QjԸa>i"5kg*yA.xn#j}6kpp~aINiڳY߂iB^ b`u/" 62{*B>`GʘFr^ N*O(i;m)=8_X|֘G _ ¤+%Tԗ֓F̿i\+ M*G~od>_ ꣢pI^[%LD܁ [w?&F kZǃ03, 2iS z|&zLNd利/ksuq)ʆ oKk "-dߢ1yG0T+ӨސPn:C&]2[[V Moq@N*5UpЋ+I 7@Ďe>/ΎNvzl3C(0Gjc/㕪f$lW5~*.:_%tm|[ӫWy&iOR3V!؋_@5_yjϋF(q{ĒZ fw|tS-=V]7+yv)UfPA8Ig]U0=_X3+3~>;txU4CYBpF[_}8` > >UZSU4Τ0C°~O[E˰XBc[" c朦^^ݶbWc p"7 p/Yb\Ұ>)OC7ղqwpHsf8$7ɩc2[hr\9d3,O+"5p+Q,4WL#sݺ]|-[AO!jAJ ~ `骏ش@{ðz*϶̫z? 3tqUfwL߰FXW28J$u@ T](.Ʃt,n,Rzp:c•),/og\`%Jg8>.\v+n(z} ޫ/׿=cr:{YKN j5#A3mcGss[[H):>m4Kٖ.VTJ|nT?-FLQH Tfm._ rq{PUU_oxpWlYq1x6 UJ'Ï^%V \E* 2) L Ћ7\ .;Vt WM3X3^&pVWj}J L/ ދwkЙ~Ο#44c|Qz<\% q\Ą*rN"3ʀҺ>O =L_>+8x#3}&,=1L`y| pOD4L3gY%OM9"sl^{*3;rD!,fre[#\.x^`V' x, dzC'y^CJ$YkPpn bO'a3 Bt:Mi\cEMPЀ ;y^ӓB/9O)GMk:Rb!$`*ehqt;KfЌ=Q& ][^d;=kL*(aiK`bғ>|vmdV6]{4>dZȂ mZW@Kִ;6"_4^;08 e7b\ Nƚc}qݙMi%{l52 49bxAG(jE$Y4'#/zXsXq0(6Sx))Wa& u4!GX9TÊr@ūcM%#lvxǺ'g55ήp[٘7m{k9RMCŇΚ<"={,"s#,=0~trQ0ߎ#P!BAi#8?gvZS8vzR0;P]e6Ү9?ؗIݰt yN?].\-/Ot2OnKto¡\I\7頑ّmhndueޞ.蕨\B@痨wW3Ak\\Ļ\1 /lSgY7< ~q~Z#qGaW.)C}_91x$#$TlLxX] X<2Z}e;\#'Skc 5Rks4 J! 4|w b{q̩@'0Ykݭދ`5z.^d H{rȫY|aU5Gι U B%.x&=g&NaI~R[FX(`E[BEbyw!05&}̟):iwK4+W"u|5#! d4I{#GC+t?mPiFp eʿb_ك`!+3Lc)zډv$}SQb*:!oY2۫)4ۺy{|AVfCvrqKmnkI @i\;RW_hTeLnʪ N aVFsj*Z~kfArI,!1T1VH˪)3C Bm [ =a-$|Ɋ)9ŁX!rHƈ5cu'e=F2B.1Ō&%;xS!*+;bbQ.x}3`FFkI?f>87yp"1a{hB˦ -+"Fݝ%/(+X测1MKWwF=ڦ-F*nBf]^@jew+;ZSq{6gg؍POBuQ*kPw?A6(l@Oj)Ia8%&u@8xY쬉INhdŸsQ"d ¡@GIGp2AYKէ}j(g3|]sÚߢ8,N^,L-Eq}ɑ^,d%"dJώ뮝{l#[gz~ǫTUao3!TuƓ2Ѻ2rhl{O9F=?ZMQd!P3Y2".&lbt +ӕK$-KK1`XJN|eC-"60=)Uz^l.|`ybZPADQ7"4<:mfղCPBGPU -MK˙#>JX'tYhaF1Q=8 IX bwgp.f^b[Œy*8O!U[dbU\+Oeos;J2"Wlaҫ吹aDj ψ*KP#g[k|:sӽ^\Y/6==TJTqןC2+SUr*dIPgf FlgaN+ů5e,SN>DFBHԭ[(< h @+ (+`T[;EYMS)"hƵO) [cTƞ~nZi2*Ֆ~6QqƕFz,B:SYfldJЈrNT3/ס_c4@ɔ3N—iqq`䐵~/\pZJhsܼ!&ܪŢܾK _˳h Hr{ZԷ$&=|X|0lkQ V_v}bE6Yi ~z*}yߧȞq"pu".;zY wCﲺ&XJ\%f4 3{WkQ䗠ߩ2_.jǂ+ -`㍇P(*-HY(P'e=ɺ3C{byxl9c@u0J^UwrxxAQ9\б[uo%%sVy:jQڀo3%(gO Tr0`d{*f_WHȝŏ*trؕ` !UQREjt^blCz H.H[fԩt!}/3 'QB5'hQ!!|UT2K5Eэ<#ok DK[lT#v)ddNAiޙuto ?&qSJ)Q?bo{_oR/}UxN'K^nA5H9JV nY&[;ňJb9e9-jy1x00:#ė{i[qpG^b8KV ;B2pbLZ":|K<5X~%LZn AHuYQ{(+zek%mhZq~?z':Rs[e MA㭂~?MS7%ٺz,t3}2r )c{3P(.{1o)7oA-b{:XAv hVu>O/*Iv,ep/ŧx$M]"jQ CSʂG(@>Ȯ^̸ mW4{AS36 ?Hp椎nj){{,/TˀA A6 OT9s_l-XgLĵ;oߵ?fBZhVchx, OR|*0 5PNtz\qgm.N ~aM,cHf8Q'|{_QD !7.)Z;T~/؜mM8S^Pp6lH5o),7h|N0VSOz$-ܸ`ys~ފ)" TAGI1GJ~ZP 8%3,K)Z,&,ycF'-iDf)Z Dq88*;@D}EGi˴u:(B qN'AC@YM9L(~CILT7DҬۑbTֱ=cgjY҃ARHr{dsm?MUsFG_7ͣoގvXXzg('ޣ dЏ\x2M:4^G<,5;;BRN${zN. VNΕW۔`9GzF™jB^eN/΂An͇*f,ݑ%9A>Ba'4C$c(K+љ'*qGO3:EF`,=l;yb[e97{홲ܟWE vn. /$7M2b j\r^ nrha /ys7]kJc.g3^9Z9g*dBpͤj+E] 4&Ðz aX"ςcyLiA^TS‚0lT}K͟o'Ͳ$+oB9_(VbauQPbet !iR5!}+csuNzʻjbɍ&kBQ@NR1mjw5ٳVh i؀T7 IZ6q^o0ڬgzww_J[##$B>\Rl9?5攁`*RXJѰ 605_eW DO+vP35s.PLK~$"L.vt!PKVn5+kimzZd"z"; d\" k{(Ţg']*[HOnEXS`r vPp_t 酲fʜfB 6M:^L:ɫeRE*K|D]#:}&p YGbևlQ s׭r4͇^7>XfLڰ.q{5:?=|]2C}0Tbu TeL)ps|:@0Ĭ_O' V^(ɢ?3`R>("\y)]C 'fGZZ*|hJ0l_`'f0Soľ'78M&; c3Jx]ڀjڼ>~6d )/ӧݐbdk4a% VmyY<31`= ,ӽ4ثyc Ns, ·mP;fcjo U33PE$]\$^v~;DG;/e3Yj@,4PHz^cgpc(N!6m#V}!@FC߀5 U9ּ![hܪ{蕀磄r]T,؜;tEr2HҶYo(Y~KDR`T|lc#$HZ:Ʊ>"-BpS!h;MM"Pۂ0\SZywIћ'x A9$˲ki7lcc2eL6@.էC kXJZ QWc,YNJV*+g|.'~vjOcN:3^LG+ AL[V͞Yt,eqM㲏,l{K+2~`o]*R`q{J=ύ[edb`; pEE+c~{œf iNUյe ,ɅMк mMa %iAZO˶MKJNbdۻU?kM?a ;r95~*3-,pW"ǁIoy^д~kg,i7ZmDΏ0 ͪ7]p Ð0Eh:KX׭n,F8]:%3⿡3J{1~: oq|Y VN /5S>A/E:ƟHw`= V"dgtQEtϝ6ݳ ){B<'"^:#(vN`e^xX\L+o{ryCQs g*:A騵f#\ "drڕ+x5;2-țt-62dcBWGşͫ2a▥ "Jdn!!@*\n/ʈiplH'5gMvjP-~xjJiA^,pNNT1r{,6oku:5%<]j/vSLYL2Z~),c_u45EM /J.U>r/ C5-iJcۅVNfN3xPx/fzSk&#X]s>+I"ze$?vFJ ;+"s4 V7>)0}Ԍ`? h.ݫ'Dj!NcB,iO9.HD\x[Hzb*I-v|_:uяEqN[o9c/7?;[`a#VY Vx ݄~}z8_6"8Μ:|0HuMo.~_`V"at{T iGy6ަPA.xj[G S!%=3䒑nRcJ ǒVqraA/mPc7"pe|A|EE6jN=YHIOZl`>x.aTΝ,LlzE 9Vcvɿ!CrrLz.aWY;&dWviEH?7|Y?=Ot9X1[Y`OF6lD1]6:AE ts& S,Yow9ŤK/MSQ_+!t`򧖡=UJGRv oyV;FM`fX t<\Ϙb!BL1晋j7ȫ3EW|BS~* 6#vxpfj)MlG?\aOxKJ<+:-Jg{>7Z /&=;PS(TB1l [JNC.o 5v HJqu x?f<=UOv#) kR>x.7K!c#BEʁ~ -[1({ %'9m,,b>ѯ#X}|׽$@5F$.j`xE;MNSeA}ձg&޿H a܃g0?5'yj m?W=)ԀMAs2v= Tퟹ 6Iؿ) PSe0 #etߜxL9I8+p+!\8sܺsK]cЕa76Aql33!ڝ.v,GH]o{P([%!CC͚:K?iBCR͸p%o%78z|F mB0ni_*q8)/ J.W*^|AYp=H]›eL"4"Mhs-?Y7+f]4J|,X>)7P m%t+̠{.cF- _'`]|gO7[eod/.BGwo 1LгTQ!vsx+Si2LjiY۷i;fsG'D/T㼂qRSX6:Ri i߷Y.>v9&|wϤ/MlstED@0'W.RD7AkMG&\n-pKmE NCݰ7\\[&m74rgtV Dm% }zO0}3aVRg2'FXzL/hmD4_S·t]"KG5`rs)9w(uNyZiׅra(AHYȨIzn ndJ7))w3یE0b&TF>1`*%ش#*[  h/2l:TO0$\7 l1-;"ʟR"PJ47ȒB`N0(=7آUM2cko.He|"-A oiNOP+'#>DsXȩَ7nn55],DHa _0\ Y&AcAy.IԮR/~R^;aizxZo%>Z1p%uykm-&>H e<,ٷI.|SAu={X1:bзMN5@!)99lOl+Ǐ|IKWp}LOTm="ExAuk͙xѤPʨOrm 3&6ys௼j*yl? U)p4|X@"x -)njsLEg,K7uݮD(Xd1!K.>ZeGo9^_B4 6Cu%eJ+(E~u&^*v=TFےĞޖYT0X; k=T 4>$S]+xj qԋX_*rK:dFrqBBG zWs[k 9?@8:`?z7MJ1jh+TT ۖ k86/⤻Qi_n22lL"O0@Hht.8aeR6i&h@ pPY[::ЦT#59Xr2T)jrpyUR[!N뉎=` +9Uf"JM$0o9r()gV(7JZƙ@#̧J{;V l[6=d`B54(?5&X?ct8˪ǯ])K4+%BK ip~+A1VC+0m2Iw yDrjalN; ~H4EP[ǼnчfYm NY# -G07`{)B,2t#TۨbSg?GCUo6-w6 7ۥ3kC+,Uۓ#;80RϹ!_Jsv#ǚ|gR]ʵTłp8sXn4T+j(w 9H/O_ٻ6B5O} Сbf]"[QM;&( NA P[NӹoeLJiDSP䩢hƥ ֜ ~- FV(Cކzcr0(?kitfH{Jza B:zN4;3K8u hII>,360ˮ3%Y}&\oYAG*&ҔOp::6<; )bXM59:XU܅RzE4~?n3e 2Hw5Fc49Wf[?|(n`Y )pI -4E7\f^BxIX+|(> qP_JR ݌Zym ')Y3OA L[PM|_[ inbk חdp=4K)ZU%1<{0QInڱsUtWo ]/wStXcma p]KytL]LEk&Z6P~;VMwϼv9k8X }P ?%6-;a yࣂ1:8SQUeՄU/57Cls[AF=V&-lmnKkޠa5'WMiÏ<¹{v‘1MyyZ-! X%YlۏJ]Rg"*g QFP~ҥP[17ȮKЃ:Ue:ɼ\E8b`~abݶ} 6ǼhNL,h[a9q5,"0РO>!MihUdRORRYYC-HzJ"wKC(!h@:ޏab*CxdMzsBkZH~ <8ro3OgD30@Vːp2$#EZg Qbaa&O} ǐ%k$LjwJծwOX;E_aGџұЖEq"*x&gU)?z'mGHJ4b Qv?אȮDESbWo,䘑8ksQ$$i/*Kzq6(iWhԮ]^XpЉ05iwvZj:lĤT&9[h֟t( 9FjJ[/3q uq;3zjళee.bB:($:ɍ`M;*C]Ҵ"Xs~@]Md2آCXҰ92"V;`{Pp/8Bܤ_ |+y9@ccy݆/]_(ȗw,q ,l8Gϼ>;joR]e  !}]m,~lrҔo'>wss˘*׽Yӷz>fn Z.Dx@ser;.zD =z1G &-3D raoz3wD7^HfT'Н`. /ùɹ2.j\$yM-9 M)|pN6%ٮC ɥܾ8bYobX.T3M|+bXh$¦GavQȃzoK ufctD}ӢM3$Pq]q-Գq"Q`Mlw) tAW-1ލL6ob1ky-*YExi5rgVRN& /fio! a%Vp!x#94V|!w+,5z#YE>*tH7EmL̝ ܦaJG)o$kuI~WEFؘ(G?X/s{'N;*$W6|A%I(w0?L7Ht?CCK >ƚvyțlw@-FTOZԵ~#_ 0wxYEuе=qBz$? ]xZ97[K/Z "ҶRgN >Lc.­Qz`0xGx>v8&O~ Ҽ!z5CL&e牶2}Ӿ̭_2^ |9Gz M4)# KecGhS 0HGOJgYꔖ`Frޭ&]@ ̜h4ߤh)罰tKTX"*poaAY2Z`VzoE/_Z.?xDD e#+5!Xf7˖=̇T%xk +JfP8{Y #-<`A~\KgBA&τp6z2hQ}%}1[XDkH]#:i6D V"o}N %RK46sS ;qQ%YLUt-@o[}B?yD(]|P>N˭Ee]tˌg5:6JMge#9>fHQ=%ycv˾£2 had֔cp60o[ɅU8ςa N@(K2H/܇ Cvܺ.ZC U),"}$A:Ԕސ]uNrZw4CQy?):;]G]}I_LLwk eB]x( x`laaFg2 &{ f8pxK !] ߂(gzϽ8*-Ƥ4]_e;}Ix*dX9jwWv吩twOC5J;w1'f9dYtގFS%m»Zwގ"QNG{va̤r$-oPeĕ_8ts5gKf()#_o#lڹbE$J#՗M{Vu6aBY^:E~rh۠vfi}v>vC8pFu=EC.@lL^3p[uB3n0OY~j0<^6vm<'vY< TUU9JN98 G1St&du(mcuiDZ\ʼn\Cu5Wf|@0UpT:D93;й Um3"=I2[i9X; F [}yj sK<8H޶`M DǢ2 MvV֯06YxۤAr|# {5EڏZ/@XuPl_si%קOs1%E}qvB0(?7 t`,'IwDo]Yy0iI*KwH zMUɲXh KRxOfڇ=<֏%W%[T~Kah& r&-zNkkPZaVTH惝kj]6U쌅&IN-OF2Wt"Rʹ5 2{~S`$.qx6%/՘>m3m/C'FƳo??QW3fJ*ۨrcO~+w}AP!USGl<.=7sx[X]FFv uZ1(:@`EFv29b}ˍ '6 cFȁ# c `dF;bF>O05fSFJmWP$̡ .ƻbM@CF7pFf˚6#:ӁŘj7^||-|X%PhAsµSKu~zaTUVo96>)喫̖K}$P v Y)Sz`6qnɸFPlsyc8d>zv "M6 q f.&ݣuc5oAS&͗ibr)nN}g|K˰Ҝ)*6.{-tܬ(6\?ry_8yx߿-\nTזֺ(ٲ'N Rm1Y8KL즧 J }ZIvkq;)m̴e@KIXJbR׬ DM:_!i=#:6ݫkb[Pþ =NC|-D(D {d y/&؁LP=Ϸ`@L]sF N DVqaW"g;&D ȠqU"Mjdho1so P۪H5/TgњAѻZ-k,=7 i|8 4AoNz}xNbb.oDjt}9Cg?xPvSoEJ)DtjH!V0rA&]Yԭaw?so> !'Qz|_Zoy=#}]eCip qnvB0Dh7̽4]5c耒e_|@UDhۋYc=Xg`TQ8I{I -f#a-qet /y`q`4%hR$8V:B`9*"}ðؼv-J+`F?;><<,=!J7&?o?G}\ 9 *8S^:P>j"X)5MN}dDǖ_Mj-y, A}ؙ:pÏW,`iKh߸2[7މO!嫁^lo]ceW (OdY7W2zVS Nۍ=jY2*;jc^Ju[t;Nt}+<]³ďTJU:JsŌbPg^4&8l"#u{J˰axPFoSA/Z{+Uqzz1ә ?\[&dHB\FQCrx-X[mߝy\"Bb/n~qUe*ݍ)Q䓯B7sŒ*w#5ƭVktR`\o=YPZ;?'g5@cwjU0O>6I+n"Mu# G~ {_93GN,h["Dʾ&^~]5T@u^Sb]CO ]Vi>J f8 Clɪ:EէQaުojcӔxǖZo9԰O(p(NqVׇ9\gʀL (4mo䃮e?y8% ~)ky3(9+狑;T򆮫Xzg-Ww f%c(xdJV"j( xi@ GR<}^icYj-DׯJ7v)%pOSA RVݔ6 xQd5ςWxm<"PM]kOv%"qR9;jHE yd z`6#ŝ/UqDW4s06g +(ȯʔY?^)R\||07'-SVy} )!YVنj,`]z0v~${dV~=#N* 7_9}8>sIXA\)-uޓϙOyD*i[7nFd7C~j(8;B3yy%_$+̬$$F-&`󸞐hIjS,㝛>"2t{W?4XCÐިzSR2LA2wp=one0D׷äNwg9D, X\]C7Y,30%:ݥU:-]MY:-tߴma1WBEg:=2DTͶDW_8XåӼTen3/Bj!&P.OZMy4`o+G\V{ U*\(؎t<ıP g{dEefi_w#r륆ô:&s$Tg}SީU"f</g:$Q.K<2Cdh/ S 갟fȲ-L\]`xAN>֛b6J{{*!3fLd2xoY:O ^Q*wfNRç XyWbTM߭XCYtيb`Fg&L*sI2v<愾ūm1We_e+P/!Ay4xn7w C(W;3~nI\n*Q8fw 2 ]Z:i"'}*$)ڎ@&By\dWxv8jp f7Qu> Oadpg΃>:C?Vɏğ;FjYxs)Llƕ͋uj?#U+X)Jx% (ѹbR_7 E]oGdC#‹Gri&vD؊@6C`Lv3Đ,fMV ed;Na4^'Jc5r E$]nDLå'W Oz)xi"!DCϓLMxnµnޠ&_:⊳m)N}`cH_E'oJ%6U<0~eq@l&8$:PvKӯʙ i.EPYe6"|ϗ B+MmtJ`{؜P`wZT6sޚ.{!V֋y븸f2v;±y(.gܬ C~$9X{"`)'p?Wy;b-7gK#~ N@k7QȂrvDmP%0 VHSy ZZ&~ȉ*h2uhL_HlfӄbAoPX}SEՊ0U<4B1/1]q F(Nj7?K믇^p(ٵy" Qܳl_/ifΑR{n3ձ}-[^P~LS+{I>[fyzZR^K\dEnX 0K sZ"HqTT?cROό (]~HcGfهNg@lqָ/T0KL_\z!*3ىN\z9p<.n%qngxW[z*N t]j.}̣V ̽;DR*szx'̕h^ҺN'ax)$+u\+NR˰6GQNB]NͳxEvNFǂӻ|DiZ zv֫a ?Ԝg&^Ųs[/,3fuIWWw{I/tao_(f_@bjƣD68X CRD<[5ʁ-VWj@y]3B>R{/wiC&٥A=G@ ,XHoQwp@:.=YߖQak6}*1hC4mHsR=hQ/s쮖t9B{$%S2|8:Q%Oh50Z=Ww-x ՘.|*Эhld\Y$?[ ]@L IW" 3ؚOL..ҌJ+7qyDz}6""W ߩ(u(Uf o9|FsIB%ˤU _.#6ҊHlI{>a&:p&a(G`sLAHd llCŮ3s@|F7ilxOTV5N%5# |Χ~~j e8C O/+E{/;soU 3BLsm ]%Fcsf>ȿx"g*=^zFp ZFS۱mh+!X']3*>&N@A rpqo/pIP㉂v [|&{SzDbX(k ?kVGмӅ+-"BH=\{N̽ , ŠK ~%-zJ}S6OISصnJ{Z&ӫC"<%cxyAHG,v~*K2*5mi A@ _oT&x:n+1U3^jDe]Xĺ%e[1Kx_@%ik"?( j 6|DȇD&9?jn9KM6M/we~R~udG8Rwē-i׵68*`jXZ%An=,Ege >ohjK.H߱PAW9>~QL 2ج 3X/;ʹar(!% pHD-)LG00pzU ;e<3{2HeP0X [U,eݯ >)kR^&jəP^&K;t{)_O?̶ggM{U㳥NQ,=x X_\U,h9.>O tVki D;]Tx-Kua=! <=#/N+j.0븖kxae&>Y:Auy'BwS@t[ w&ɐ"):{v>UUF@"ԇ\K4n?ĄJ8;>ObЌI{ScwGJo=]Msy'}h!PF5=7 d.(^+z{ ?MGCdajgF? Fc6J]-&]hfdEd\f.jbsX#ꪾ\2|dw!6[)-n+K?c|4qpc"-i"``Z\ jۚ$)ȶTPT!4u9JxxtH͔0'[ǡ}cM9c߹'Ȥ]SqM *5[>p8+XN /ǑIJ/iҽ Փ %ˏ[I[c^%="KB ]:&^`Id-M^IMB6.-nz(eIr]LP.}|i/Kk5U.*?ƵVR+ҟۗV^"#w!U$ +Hl_¾f}Ly/-.i=R8w5ĈޣSVNN2/ ^.ҩGm'pB6)Ni* {C*CHoI5rV@!)ݹ1 }U*EH8\xm|i) 4,X=-L~a/_׾7h=%p{-=_pK4bLlrhc%Cjܘad52(VU0` bu ,HCs!9GoG`jT31E.[UiK8kiFYS?e$fTp/@UVt. hu6ۮi7 ;,ZB r{b%(rw/['b|tN;zmL$z!&a ѥoͶ1!gq˜/h3 K&T0-gOXOBk&Ȏj sfeuX.wOF$tu (~Fq2# Ąn kxk?fޱ_Ң<6ᨯ P|,?x&LҶ~;QC3|?ؠ*1[ִX55?j*=iC[}#ZJk0فJ]pṗǢdV1g}6WJ6 {s21OV3bZ*?M93OkOU,~dmUt7ƭIMok b0eR g0~ɥbp)@1j^_|4SEӣ{:6pMƔolGTA3f${*(5з^k~wu6?oqNl V'Ő#v.לL^w9! řWg#zA3Q/FcSAZo?°F%BPK3t\;B-c7׆ U1a^:'[$L%wTx~Yɬx5\o6bP^+hw%ImWU!!W+VHGF^U<}Jq)Q8%5\p[VfxM^FJ>SH5Ӌ5aRf<&-R.DguϣfVL|8Cl\=UH yz2ಊ&{{Ǔԝ6*]kښ2_ُG{Ǧhg1[¨p2P [1ّ@q pٸ_nS'y!mG9 _@I/ x%H-W xr)k%<6 x)0Fe: _>7=Om}(+&q GTҏ>Yڵ!=sYl9?6,WT!h 7Ņ{F 2k2&a Fs`~]$3ݖ>#G"{+,yfV\3: xw z@Ǔ zciQhot4(R}C]](L,XIz}5'jI{hK֩Փ/ /\##Zt*8ϤIH?+=X6jȝx6Z`տ/gCI!̄Vr*#дPx fDh\YnlS?; iB3(M*UqԸS%m> R Әy 'M W0M$::f-XɻlR|wг|n1EU5n(}^^|S |`_j ø!>M)q*bIJw|[sԻ10LKUwm4x0W9Z8j&e-6VW޴Q[yYoBE[ sy#Dvuv-"da,(ItaKH׳% 3Oח}09{i ;dD'&тg@+4n`$Wn8(X#;$,5sVfpJ"ƴVcdKRjlg V( dX~zABh6H;|21V$:3fp$W2Hudh\7y@7vAMr:]Ph\ٶ9P6+.CIY LԷ?j2(O5G,VDvԗ`pkMDCdDAv~)Gi9s{)!XL.'U_)'_s{)i %Ogd`S8X)ٲ/q{S{msݲ%X:린VBYϦ.+ooG_sw:;i0ʴ"i:#NC/qSK@~*吹W@-#WD0GTHͯeѫKZS:de@#!W l,S=έ݇GN(5tw&(]VZk4 J&DUz ֪d~Y)I-O5IɎ-nI)\ꣿ%MA#ptnfRNaW9ٲuQ*;J`~q<L3  g^C؝qyt.z˅ʆ8nٗ|1ejZr}zc,i|y0rpE By V1٥C0Eg iaPRN mZŏNC #cSHy6'[UHH~6_/Htwk&7~t l |\qS@PP` K;ːqhc#4T-fWn]a@$ 3V]8BZ )jמu\eF?[oZuµ]J\p䢁1"UjNS!Қ&FwcB}6i{/L5 jgN:1xf1҃x&#Qߏ1\m+xЅ٘ϯB z"thgkw$eke9Pbͭ0ݭ縚мr@B߫G]ޏ֡LUm~J|pߥ'ztijȤd"0 p(RZ<8롏|-[]|DžN:^]]ܸ ᵿ=GJ .6 x찗(+2wq$Z֋iR6/<|}5W*#2,!28q-9=Y ^nn$+\UO.j;o(tXҧցqG@R#!-R@`l?OnTj\]aئMlj@_7;nk0d UhZk7 dXbu/k,YkfZ=)Dz7b 51ӡ@wF\|jf˹4^e-Sqhη @.1`7_.Wf>bgMWg\Xu6޺VAڒ,PE ;±hƗyE^ĵc#5Q[hm%_Bn*4ϫb-9}00UAe涫+^Yɔ=>m[CeN\UWwoFYah=i \j>!qk 05*M7,*ULl5v"o*E$RBfEoRޖ|bUAlQ5g4đD)&˪n4vVq?v K/uV9 ۵:ͷo(σ }|8Y43 h B4nzf&OBeR B%I g"54a@bl}YjC`d3jVd/L' 67E)uz;^qZW==0*L7= F9*[duJC4+@F \} fv%Aunxf~-|&rki#iO 8P,2Mkm"m=z)&x;gcO-*N:ˠIe `x ,8DL=[h^02X.{ˢ>Q }o5,k$|/O je{6B+-~ҹnڠS[5HiB.9ܢvgfLF_eerj]s17D6AGrفsC$)+U=fT(9^olZ|k& DH 3zt%1u^8ISyQjzYB(ccSWiy^NVVh2]7@rXfP\pxsW_P`EA9R:I2dpp@' TqnseԻD %(8;hc{qW*5FL : +8KN;C 3ٲ+``(̹q i]⬷̟&L_q7uw]>QN1%'J47l%:L1YI>K,f4zc(pӇʏ_U_˼EvY yx}f%UaUW\7ztKo*1=zpK(#}-/ P@vuUe}';^dϊB:EW~KwK03%Ѧ}{f jWuA3;uی#K,kIpGk,"K59%ؤNZ]"!+D7$ ؾ  oW!P=:jX-@)miIČDQ)=kܡKoPp1^&"߯>-tXM٘?dV?/(4 ~|Mr_~i,8Ny# x`/`ZƛZ=%|%X%R/15vS \:<=:u]1\m?%{umOM& TQ1"BWLiGF0q6hUN&Kg8 qR|s 0ߤtmCa6NHWR 4U'1Ns~'JiL0@f G1ݡ"\6#UA^T/,#G35Sv`FCL@cyH.Ǡ&`J;-Oo7'9E^K+G?e<)fkgo>{:c2)Av:_NTk}MjQ,dViZ'j &]|]X֢AЇoC||ٶoH\穜G`b'{7d$PC y_:Mt+9[T{0Te)gs3tysٯ'M{h %aLA9 0g޾,al +aŁ1%KPs%kMk޷3&J- x-әO"Eqf J՞SBb `ŗxRG|lD>n!!+vk+N希xVH T!wU3sΩ1LdFYْQ@.`SV'TVLa*vŴ]Rnt=Q[Uj=mk`XorBmDxBIɇvUH$у7# ;Fl2Er*T$ώ"u.NP;2^8<9_"*?N, ./k/Ē7WV!eHwTFxއV?qgsQ@[?]C.;YtUs9[ci1&;;GADf sQjt>8tP*tz fGlV' dN%.nQUܵ>wĺKf@r`>)ErixiveAb5ir1Nd{ŬC;mVn8U:Y}hir?+ =iT5? 51hP%:"o*޽NA2TC2Զ֧4anlʵ˅oY~2"2k띆w=œz-eP  spWfL?|(#~~yWߣ{򋘗vcO1>xG E>DEJFG[*8 Yp7m!7@0,p?AM *067ȋĽXC*Q/t"Q`3U ƣ9{%Qz~5屰' "SmL5tV@ ~Mi{oV ;·w4ԑZEL522?Eۚդr)~b)0;Gq:NZ؊1)#A+ko4ۣgp CݶJ箼`U:9W;1\P:7qt 4z߈yJje!nTRu5{G<}nd 3`Ȳ^ѓ 9̹,J$<[X-f-%z֖ɅaT=UCt>MZg+ӲkJjn̮\j{[Zf&ܠ:%s,l\ =k2#RG(DYĕ_yYѤ( n<>^h9G';/"ߩzebۡ%:W\c6+`<ҽԱM˨1% ͅ#X \&Ë)IrͼDq6\5\MKkґ(R9M7#T.{TDbI.J v#sAgB \RS2v>Ir-n+s2p#Y_R}԰c XϪdsV|@MNüǁ](k+kNPLb7Uv|?F y;ozeO^Qg'NpbX}%itLC|Lw"&5R"Kl *Ia IDR+~g f`lzo~>bj~WӛjZg[:`gL"[yiG, rɜX"XwWr0LCp[U! eٌ7ʗj$\~v+WQ˄~i+5/py}Sr19vJFVI,gWHug.ͽ ʳ /d'Q9;~]bVRgy6wZb{3F\yJ1B}m!(h[#|s.Mz׭360jAF01vyN@5Mt#~S2 _9]$ԙ{YܩW? }:zU$y9GAK+{ 07jZX=PyBKuB#VBHORa&7_{㩨5ğWM~Kɩ7 Kg߃P\qǔ@ʴ :XҌౚcQ@ԈL?=aaU戍,۹5g( ى p֥_3C*q$d VSl̀~v奢Z=j(`X] `J4RFRY,[(XoX/S#1w#B <UBg.XD!UR!ba>4ѣJ!pД@ӳ`dUp']!USYD,$|ff&*U# WƼ[t 2QڵKi·]3 앮u 탧O!~B΍5yU -Y5a}#k*$aSZ!Еm~vP>B[$5g<# n I@*vٜï,QojﭫқL^<- plVuƞUPMukg]WeCbt^2$:Cx[-T5xE_A Hq5 3n@}&wa.zٴt*gY8 S9CGi)*2)4 4oy$k`ç9] zcG[Nax)Z+}FwS;[jO,HN]C >ֵj ߭[Q˾ҧ,HYR'f@'I ҥKcfr xZ۾d 7XLR4Jdd]_Ť8C6CR <q{m!r 0&1fZICg9/;{6waO*#bs: w|rӸǽ]4 abVC &Ѳr39 [m 33pC5P ^1P}d+\e:6\|Rm9K"ױ-1y.7ɍ;qkC̚;B`b߻"bNtږ w >&LPp1*@CEGR# ܶch|ܕRаWZ7 sr)sa% 20;v+v^_m?7VAT|5'BXY1b7>JuG ?/Dc/Ҍ}PS}{G-¡j9ӎH2f2F^8u@bk'EYJ~/(I qwL]1.%\Q"oj.MnQC)Հ|vvgCca߬lt,g3xjay>4Ѧ"X(gƈ6N;*6:1!{eyA}r~caŲEuŴocZW{:'*)85BF*kmbK?K(:ڟ,TςڜK烂T5}O?X Y-YÔӸtLo 8V_D&x~LT5IT~I(qC׳@|sV]:8WGN&AD}ԎnJSL0`X$:'$3,}z=2ٖ~ kyj'at yټ/'Cs [Q]H*(ݘM ?Ra`ւI, yML[fe;}[W"wCXg` R㋡*A~#U)g_*Vy_?m#I " Վ05PbGwGF#Sd:)Әߏõ_/W'bظ3WA>cTI$Q vUArrLIr=HʙL/dT;hPp J8;E׭P}va14k,xmN˽m WYo߄98{Hyu]t/VlF-wriV+ڲ}rdPklMԋ{j6s!u=x% o :A܄r1/"/, E|ߏeMv6st| '.6e-#xJM'@eT%pk &;%ʐwڎQ *!wt?~ü˷Vwv|H YNW>Dn+);bOR#c&$O0!Q52Va)~Gu2 5ب-&"~/ ܗЋq ;7F+ۋ MY3ULO  oa"GoF=Q+4_p ~Y, &TՑoDG%Z?8vVeB fh58~FY'%m18 1B:9R&ԥ徐Os)9%d@f78ر˭`%je|bINp<|B^d3Mm=Iz˷/u?K5PrMYbʠPim%D^9^Wpgb` $_[v+wO Fh Ԥ/RK&)[z=P=:4:rn< F cڟI >p_B޿&9z6}Kzh_UcEH Ogt$p v1h%O8&SܤW%FhFaiv<# ,E[2n$$Ir/Ր*-r. S!*Ѿ_a'~z^}7Wv 5aV:#Z2 K0_UsyC*g(I Q2E̼Ic[ΥVO⯲WS @/ʗ2EP[.C80pI\{ tʄq\Z8dCpv ݀NM$?SfTqc Y0_z"\B=S wv3 r7-Κv3ۮ8|uKU5qs]xblo)T{$:=&HqK6 dQ!ﲊ@xT$ /~wBscejrP~Bm; {On[b2Fod3| X:RiB@) Wp|—"@7[֥|L0 >? 8O@Yь>V\guA,ϙZG}8(4G>(@$FR& 5dcE d6Ш m2/v/ACH2M[|Ѻ7%l*u%-g-tŚw˜2,~jʵ1FиVޓKJǕS|6rE7J,sC% i+?.fVo&|X0xP6s]w}9`JpӎNXO`hIM-Lj\D¨= vYFԐP5CyDi8p;%eTŔWl >yG}iLEݺ%NG<:C2w 5 $mBLCTh[e Wø ѷډ^;I5hx -LcQHzPVՋhRְV1Nߵ_2@25x(>ht%'4D\QmxQ;T&Lټ0W\vBX]c8T+"S8Zb1 }V(tW6W|\ӺG'M Iè/ڲ9ZuGdģc Yck}䜗J E *ӆ#Ymʹ#|Cx ~AX;tDy :h_4nOِ**Mn@<16O̠y'cI)'o_oLÿb':QY!g@Y!|B[B3ȖS4! {=Y.Jip9swROqZ S4L~5R YT&@HrU*0j^ nm*XjwQk8D@Tkkk" =ƗPB66ȌmBT}_,@QdOH7Wi]R 7 |܎Q J~_ v@[Y{K0Ue@>gN86_ TD4Gx#|\P!#l()݌ۧ3x *B'Z#h= pa%ը:1Թb I//ソ{I$e 9)63;s}S׏y)0M(%> ^AQ o^$M*K9(ݜH }fIfk7u2 d7dT+O)ãjIh,tӴ[uC*Fte ֥MmÇ*kŌ,{#"6rDUقAgr82'K<"@w弢xsA_5Y"Z Sz0ENB[OCݗt&A{ fpz)J2S.2x6_Vwala_q^KpWu[pkw :`I-D_Aq7鸈EN%xwse oO׮({o3۹g^eOV>̡?%%45v&v w%J#4t@~ݷFs$aw I@煶ę v xyPFdnJ0ط䐥 Vq:TyX[8=)fT@ݕ[0㜢Xj-鲵Ghy^q6m@RL%車^Y=3aLoU9MZ6P 8 75T\dwNCJ-ЙMdZ OVk[hgx7%[ק[BjZr~Q~70vzCb7PwTe< b`<5 PwMvJSijz>VX+JZu !ɏr*)/ Y)$db 'IƳf8#r(Z *AU4LaN82&KdjKӠ=dƓ%QФT"J q=c+7ZC4 hZ{,291R5V<~ĵ'^7fU}ܶ EM X3G%pdb0.S)dJ/@wrqU\vr0I)]>.n$)6ڸv杷$=u$EZy;eq_fJ6%~DTcm"iZ suf8"#pZhAj6Z ,.!XV7:ȜIcBW 6/Nn}g7O]i"M'3Qz Z0Kȍjpu4!h d"`qxî4JĥM6Qy.AKEFZVvh6 3xڝ7|DfE` o~9h)wbv1h9C@|[ͣA+bl>$7 &)٤dx0j=V g<ۏB{%vM׋#"8wh`]974X,ÏBԐ` -2!ghBX|m?U1Ϭ+};d KcգtHm_"+7"Wob6c *9ng )HG1ĥI8W[&|QOXB2Dj3n=7T[!"o-UY+v& $T5R47[mi4~~8#y[lTǠia1x]V0;,ڭA1"j2k'ˆɆ_aJ'߅ݤ44P!|!d[bܮgK3/apk$9b?i_T-\2~Ht{>1%J/p@jts;D>I嘿";W.E,A%Πۑ 8+tIL"/#ب|sã*~50Q]}&VBBZIQdlov1`Z sayL[9Aٚ`O!sp&M!W>Soa֬Wak:%Me@0.h4$ƫQ%1CN|`G$hj8- kٴFwV0N(uu\ƚI+ Iڧ)`,CC("bُ0}%HxTEA( B⑖h?lgᘟ`g*)98SOI7Wfu FhF=~dz` SN4*i!BDlo4@'k_)ע5P/V$ y0~^IJ8Ile5'w (-eq?1PTQ6{m L_qFQAyt37!}VffW|#7$j/FkIЕ5UlZ oGA4)icM)u 'eIe'[zp4 IcT{$tT >llY\pf$w4yZr D[Ny!$V&i} d*9aXo wǭF>gYI61 jxˍF>_pBr܀Sl94,oa* ?!ezKb^M7G徔EB`a8kz/. 2t Eon.O(j KwW;aZL9~ڪˎѴb"Jщ#vgCVrm3|={륢cg9b6zjR ,NK*_sZFdz•56C2qpNNM*pTTω[Ƥ{ nu [rS@80naM-5 QW+_~+H\Ƅ{D9͘:3ƴbr.VW呬о.P;"v9"IcS+(JgО%5<\-L췱S)Y} 1F`E0HgK,g_?0BiK?’| vF."?Gi* ^qYW]/x ud1ۿ#_(HqR&H/[&t>͠yYM?c6 Ldu,>-/"^:B%Yed*@59~L<`wf)kRS5~֣s8<䘥nFȔ(q'w"ק>O#Xx[ނe_ֳ MG7`G$52fdk(|n9 0Em@Skfh먽@y@>haatzt7MkN%/Wӹ@Y5ɷ۰R| DpDD1ϖ˽@M1w%9 ?uՉmZ,K1ϭu<@M^-PHgg`Y[G ޯbh铅!kL =`]e૕ʷ`hW?bd:I[jP !mk Χo`2tOvg$x"y{&.2ȹ* S'IȀnhwդ.Nհ}$2GXO!5!2[$@:oLSEDQ jcis] 3H(Rd+ kq'ԟ8r`#/n4ߎ4Mgcz&XR#ьvkcE4~CkСyu#8v}4= mhLZ45D(C$wd"NjڂC$=P8vs!y$e;)?t]YCv#`@c߮m  $G A'5-d|X fe#\Rz!.^0iBйؚug@N.E(3{*k~~c7YӖ{LW0y9#mI;zO:;uh?i 0T5 ,/uʖ\n%)EK"zPX1> ~݋'"ȑp͋1>;KT}Qt]m]_hQzW; (c[]4yW ٍ4⺶ӳ'Lp80?w؋p3h'=ưzۄ*gXu/`ƝQn+=՗OUmznz6mEcDJR,-27XA1:?%4aX#qz6NI2{]`҂7J.G-8PϨ!^kR= )6I݆"`5|{ޕh#`!z$vR'['%|#<ֵw\oQ\~'uLN*hf`JmmT$7ǰ6HVOSq^&5dTNófJ,hu8K6rȐuJw7T#1Rwd *nFwBQb"_60ذSg%ЎW]هLExf&(hCD/uP?3NY~B(1̋ <5Ո:bBN.B zA 5ƽ% GY.X,}dJ^A!Alqׇމx~TAAE6yvBͤ)1!^w ю}YY[`͑`wm }s^4No:g<^zw)J}]jm UwWSz P6 - $TGs~\tF L(VAO/Zp(`aT^bK4'5p~ S_ yr-2̕L* %mO.ҵ%r6.?9ai8D&2";_#(ν\O}x Sy%!1H=  =RxJ,@K5(uI9p+B[mC?Z?m(̏ O"3{KiZj:ɝ V\ُ"M5+:5P|'oG9n|Rʾ`~%x,IEndHhQ U(lr"կ!gzxp.|(EۙWLC,]0Sea.P̗0=rwk{-~8jr, 2d/9E3މ Og9rv ~&^/f".g @.E% k!~XazV)ͭR"`ŎnU{D9g=C}E|D1Cu8L&܊_SufN,C"*% &3kG^*za.__EFOdխChܞ2晜dUiJYvaPYl$c;z!(z;kϿ-GQbu2s2  2^yRXƒ6o)bPg7 6RS$fH^D+;>;v>1zUUF8,l#ab;Dk&w -qkʌa/ #=fPOȐاzhp7k`fcU_e7HG Ohb0 k%/=52 &;[ ]V\F(^ H:ƁF/}tjSN]wVRh,w#Ggntؖwjbw6o ~V)k373$Ad,VI#saqB:i֪X\F؉65w+f UA\)L>sP&XJdfަlSbFFHSUַkq;6=CC3Ƞ>f~Fs$"O솇ĩVx+R^mJm88Y.1,Zm(F<toJj :N a޽uTM9Sf)/w5$I'~~6W+َU5Ys1&LF?l>6b$(Ӗgu_ᰲPF]ˠ?9wg"tnm> ݾ7t@w_?W|r)jܲjsaѶ]1Dio. w썼N坲r n{>eīE|[*EXO=çfi4Շ$Xj[Jǘ30XX8-V6F4m3ZBm~}Z |)6~Ƀۣ5- D;r@ @fF@\O\ݤS>x#g-"?CN$yξPAdf !IP/~zג@-gg. .F< ;T.}鉢qkh,nTdXiWvIT!-DB!GP߫=nP`F1M5H@Ů%j#;[`fdݔ$R膴xBN7Z$X5=׳IALD_Y1IFo/Qԫ'kDI˯vbck84MRM\Zic!gl <>$d`^"(x:sjM޼zV IrA_s۔X4dlhjBj٥c+W|6z⚮ahVe}i20 N{UQƜcʺQK&&E+ϥכjñp̱77Zсryju(=hQ(zϧ wG(LMfH*}SxU|Be9s~O;UI<ϳU|uR*=~vbex 0Vxh)u=)DNP]lI=5GI*4[7`mDZ*fuP">Tch)T,3sX\v;U}*l&2ekgsj 9X14@ sC+JMl0T,Bis ]A;`gr&}0B%]v[2Jᣵԇ"<ϫ9xd! Y6a`i$}; Љ L*LrjΡ} BZ*!4vΘ(OŤ%KRGȑbHg G|p[󿩘'ȢR1$u?W}f2# "lK 0;Kgg%|T;DP{'m8&g"lB˳`Sg/w_q#iƗ8OPBG=eO 8iH'agy=]/콴-(fs-L.d^PѸrPs* o@Iz: ? ]4H0ÍgaN9 +ujsof^`wl!x|E Rf%X#uQaZy???t.wQij<8bssA CLHިAtv.@y6满SYǜIRGVEOR͓C%r6'վ9 p&BÅ֋S7 K sVf=DṉV::l *;f?v {u g6t)*Avt,qVElZ}!?\@Z |[7셲rlsл`e~V \-KC%R&UnZVl⊄ݭsHwboXN~ ru1*sFz%"gq)fi!>:s2wR|Gچ]*4.5 utQH-ӚT77 w {2+1a&/Vq qK] H+7;#9A1@Ԏe@% 8ۭ RV ߴ/#vg({2cRihG߹~N9+Ah/]+:ʽ z0fL>p=-iAE 3U7+q\k絙}kD'qW,ѭEiB[i"7 81Xgߤ1 U=i΋  }1 (pDr{W}{ \B$ OC_mf(ƫtDc:3a2Y(,>C(Ɗ%%s,ZWx+{΂G'|q7v?CRr lb@q~+z%LH<gX׽E7!〲 kwھ:wqczi ڬD?~m]H %=$!_J,Җ'Y"9>2`P;@Xc"yʑ/%RUI/ F܌hx%B4$V+&|jE3 -zg5%sb".e5WyhCfpƀT՞#{h4׼Q!֧7'L*s?dސ*asy 4 .lZ8,0V"SuhmPU'G:y9(åc+#+N48 6:9Qddv >YvGr\#Q:?Watu7'Bqx}El}Ŕdp :#+)'#ZlKs 'N)lPcڂGJ=A8H wsgK}ڈZek_#b) Տ[q]9376eZ49ڥI:a;No=78c9IĔ\A{ FnKA*9S+E+|PA5| ]W`1Vl%nC,&ʽ^Y]J|Y:%kdt@k"8ӛ#T俴ݙI@`VlT,MI@#O)Ͷl}L5ox#OusF`_{vYpM;T7UT=/j'"lɅ]p( X P^M'N5f2dߪրb1)e+? ubj;ep[40r[ayīVw̻b&f3V*!f*)BS[ld6 . )ł5c Ӎ4Ze F#._jri^e`P|к嵧[/MzU2pf!4(n5ᖓÇŐIj5 % ӣV|YcJp?vHUffx4߲@4 f&+3[`'6pr@7TuBg#$"d#(HnM3#G-`jM&=ɨo/*.*='|5eaN`Oyf@%z,BhB[8%9j9:rC׾DJv'Wc`fllяWq]6ebY~_4հg}C4T_2Zׅ̈9bf /R88<mjt9ǩ;nEAH+kO@곾krf֥AW vn.BJh_̦SsGP0 =y-B D=Jد4L R.O(I+$pËBOv/rc=T!kLfoCS+_FUB+ı %,2 Ū P -d6M *"7Kj*3xFC$HoPw0|Lj $>7k@~cپq#Qsm# ٙ>| c *r;Rg[\%6f)ԏBtDF+k<,Wi_R.tiur_VEmƯ *sT̈ p:HIo"-N?Wit Dygn%ALlQMDU4m(/g]'Ms aIJ>"Z|1#&"P|idBE ApPH./dʾ/8շ`(qS݈62"<pP1e=uĪK ]"7 @4Xә)r! ]Os T#^>TCb-*S'7ee@R)0feS}nqeZ!bwڗIҟP&h޼ڙQYPbnNdj`"?BޥsJ̝L2K}6;qgsd-hrt 8AZ11XkfF/"sm$MW@atSkp(:l2+wj;VN)52+ur6J=(|(}xXNX:sXEx͆i~٭}J0ǥ BU?SMbc.ƚUn-˿x+G,?M"|.?3j;{E߁ m_ ɓ=+4I@=!*s #, #Su >f`|IkO:@ $RE:3co^mќ)ɡ Cd_[_n>ZgȀ Co/qpr(+Jۮx}ЃX9dn_L^FV0PĂs@S&ůhO\}>8:N +_,hPmT:_Ct!LsG 0`X;Ht Y t ĄCf ¢^ouC;WڳxhI?yayܮGL3sq:n|CRo|ŋq  ٕP#O]Rqt+E.RH+ 6YYzMexCNp03V2md*`;Vm\!a n%d+_mCʓ+u#VO\<9QA%cH›j/8z pe3:MZ(Q:[X43vLz 0 ,݌2vٳ*R,w=x! r',Zqg9Tl4) M}~F+8fwȰ҃8ȸh?^FGl NI3ş'/z^9z?HF NbrZJpAϘNQuf ]ۘfBRVa:=ABKsƩ}p9JQ~xnwCDI޺h=+$lG{ѯO3e[.)ƓL6 )s5g93J>wUzRx? =' >\mԶ p/e[`j+U̥p$\BBw6z d>4ihsbTep%~ML_& )eZ#^=\/XG:y}XK*4Rnce,?7D<8wo 11 ְ3^ytu#ށa6hQLhƯp,ETRl`*L|m7:1NtoFڗs11qT@v+Y#$6n:`Crh jLZY %NƜ}Co;-:i: u eRb2F/eΎ R<.䘒ﲟb̙ ;Ѩ >rض5}ˉ` n{ \N3Sp6 ANq1a.Vi>M4YB*Ċ͗I@侘b##uBFdyُDb@Ȃx=dm=wSQ~χĎ<-È +n&ҙ|E>KikCTڰ3J  QTi8pxQ--NCgke^P`?[Ӝ^Z5&4\-Wi2X2H+He+9E 5420FMS (6jO?^$9_`i4t׌!`""w$ Dؓ0|DGHt$^Ҕlmc/?5`oycBsgh%^4H;NceXz}ިva=4ݟ/?v9ݾ h[dm\r]`^eV6JW0= ? 4XN\pic&mu;@r4Kci.)!S 9?F{4nS.992௩Y-[P]c%û4렣;<>JLPܒcV>XuRڽ6p ݞkAKjk ?v'JЖ+\l;?C.u[ƨQ]}H -9xJKȏ,*0+$d,F]W@X z1ܙ5jݞc7⏗Ls:Y} ,mH4͂9CJ/5Td!U헟 Yg=6 y{oD2%=/ x-=ҏ*ATnXQflZted7emQwҧ[oY-vY"NYt{8*jh w[L^ș=:, X ʜlW˪+^Z}(=Έ( Z|j{~rr~7`%"^{ԱXIAg&3G0^x`w v;iQx2LyEB)ck.3P@G۾x=eB[,Oܼ5>9` WTX+2py˜jÜ!oyLkp\~BPu2S` A '`>-Eeլp%G,5MFnjsh  Ya^nXKjs! +Dۼ2D=kXcI `@iCkPoL;{Lg)MJXST+_nӻo2q 9uʧ&D/~[[VTOn謺 ̮>[!aH03jy+hVIIXLG_CX' R 70DM/8Ο+ꄃ ٰ" ,,케N)ci\Z^bDT g}%DWE4˚0K9\yO & 0:EQv}װ!ϻ ԫ>͒ZegKSӵ603<>m~ M:؎߬Es3^4CF* Xk{$5bW )Z]jȇH.S>Hzv'KR3 9G8HnM,%Q3wgSta(juinH-r߸@ŚAq.7 f #z-G0@:REǨeERwd%oA{!F4.ݥ o5r]Fh'E̝1-1"#5,{qbSܫ[L2PFb3vhfV%U U/٪ʰ*{.:$qgAMփ gEc_iIc4YhFfpܛHf WhvCG,-匁s.P8Wl86.k}nv$yƮw!K3pyP(0SGm q6(֖к{& +u,,-dnf*F@|WK+{ ?ywg[98 U*%׾1ed@gB |fs&6-?u1 ٫#J-[a 3o2oX!?UY:Ċo`a⽿8f[PU>뛀X\`nX\LH!QBogBϨG.x& cg3P8tlGF]R5i >ƒ6e92 x8ٸDx9%wjVbJQP*| NƦ0>Q}8c-E9X<"h%Us-3;"E3Q(R,+ݺe`p09?`w֍{rll+|ƊDA~ fxrC\H!B˨#BNZ?LUt}ʮ Zzg ތk {s}V +kx-(JGIaA G!!сCܰ곻 q"ƽ'~1)=P~.֔rhI;Lxm|4ŽKA\S<=0ie*gYZݡ&ClANQ8;d6bх%56g V=}d TfFd+̫:n5? SkTWx$QdL* /.vQdS!+j+ 3gR)l}_f<6Wx4 ۊ3:`\ݙ[NL@ q%UNNע'I~P\P:[F mkWlab,l9A0aC1#\9M j" hD#DEh: {B\tI'lbl}y)lhz oýq̉ޭˁMH-x0qWEcUxChcd % )|Σurp7L$l{]+( J;W>Yk._};c3|ԐS>Sv)i-m @nʃ7[ܷQfDGCz#|sPl|Dn(WtUړ Sڰ-0D`Ee7p:g:Nl9_O3w ?IN8`ug?uI>6ߡvv((h7H}Y!v@@@:+ҚY'蝼@jjWׂ8We޴vs`HJ_ 3\rɀR,hB4]A.]e`ڑu,v43'7zJt]jjES g[.e" ݍW9/rRTɲ~,%S ӅZVnz; f}]5~,kO:W':h4ښͯf8O.*pbv^Vk~H˘hZ&d.S&JAvFgT/zb'ktg!c2u2v>ﺲ@3.}鹵zkVVD,&wTxR#E1+J^+׻wһÇE%'my863 w$fY$[8i]$7vYpN<4l տz›$M2owHK Y$ف^ռ~^TvI g? 4wF׾x-R 7RicY<Ŕ)6('0a[YB UQv=KK*oV~C?ܘx5NyNK=hOr%xIcFș7~1цUPJʇ86|:d7XA`2$ {[³YnK>Tytu6T'ҁzKSȟīRŹ0#P C =TE0P!q{^Fj\9t\1nSK9uW͢Y`.-@1_><N4IH@n`mYuG=\C[?Ž{B9-"k?\QnOq~Be#"mK8˚M &!q*Jl`cZrPU"pt hک?=";(MuuGőVZ8a5炍ZgSyZom^_ ȸfM{' {B=,'2x` Ǽ՗ǭ;{gY=2Tp?_^;qLsΰY:)?=”@{Yu32[lE3Əp>F[Tq~))fib x&9e(B.׆L_&sR`@Ӧin_A>Wk-7U-'G[_{PʀPtL8z`L_4;< CAT2Y՞#!wKd3Ӛxx얍/h kK8^M&xGWz RVՇCr˳@FnSgvj/ǟœ/$}{b3B%|[^6jFd0> Fk`?Us|8rB}r<qas9;c5 wy0e6Z$rkݵb1( ]nX C?d-*q.eD`! gy܅mK/;uwhuhUwJұ%$vT/I&VFαuмR4z&6H^Q[:JؘZTD~)0":^<R~ŷPF׭k\ [EB.( ΆW:>14nŸ< 5Mt< l?84VxZ T 24wK-֩U`[#Vsm=.DX4F0$ _'I,gDk<$f#k$%(>kݺ$#I~I\'^_?rKFC0>p E٪brpِEJRep?$' d&$3ɼR)ͪ  Ҵչ8λ6^@KީzMU{K}O%Py+y܀gJM+0 @(w~# 6D{%jf>Fp>) b)l:& xY.cݱT@ +B/V= Mxm˲ۈ@{9`wJKTV[ zlb-5ִMT4@??ҳ mSo*BXϧoHՄsD `KzUV-!RIڊ 4n v?Q-8*o2z0c8Pet§)/PY>P rq/.3(GinaAh\0fɮ/]5.Q->kowG F*ųflJkiof9θ d{cpM =3tnu>b(#Ndqla!KP4ДSKinQB%hω)&Kir TCk*\Lr2ot>nܣX"A9PhCC4UhֽǞԢ,Fl+TJJLT_8r@Vn8vx~zμ/" RShcPն+­| 9|ƎqO{@3Пppz+b"x?hz~ ӟx@\Jl՚a}_WnzI#$]62ћ66 Ss uβn8ڃː15f Š{%]⸣d%I%x^od s\'7Pсy2~9Vf vZa F]X3afDUJOR)\i&CcUN@"ͿPg,]EjU*W^Tg"3}^{㋰~B)06|\C}2QUJpݩ`@Ʋ+h;'ͣFeL4yoWپP"S1\Y8&3ph\<|] [OkM2k'S=N\ap+^&B@<kJMY^ğeM/ pj H6PhM\A'|lld/"񑝝*ӊ m݇,g%@~ēƴ8CDC^ʫsyi b=Y| kt"'$@pn5Đ@uJmFܝ+0x I)cry:5/htGW2}QtKwGq#ğB#P9yly_2Bx,;,cz>(KG?HmP"V E VFK=MNoU$<%SU[-I6LJD&>& `F'¬T+T 2sa<¹YΐccZ)yԎ{ ,OVpW}@fnAޭpx#ǐ'Xqλa+@N:LO:cYiLlL%玭MY%SLux=3QXt[RMDJ{!p&4Ul^OZd +`Hp?%2q-ɆLLw^ 9-R+6Go\r i=B"PV\I4?c.DFò$k>y+w5Q[Ra obuW 3Y)5D'.2=@i9K ~F!դ9#B#g@ IZD/v<i>`I/Q^c֋K-%39[!_pˮoyMctu3@kg&F?}"{Rw",!LߗH 3._@VP~qV"^WzV^L"[ `&gp7F6P7ߙt..UB#닠KSUkʱ2\$ /͢gnL 9R2[Ou^\0DIW2;nklZ<[tqT#'FsMɴ!YK(MyLͼ VɌW(w4=] 2>]g%ut&Gv/D h;Ely M "2ŰpYvPب_gXM<^r2XL:_zL' %sp(lelAh )S@kTNR̸,3[tꃰi5eݰY;8S&Ew>o&1|,0 s]QʻX8&៊+fd 'eL+/>z~@TjC:dEWt"Z8{8q6|BQNRsi4*XfR HZmc RX˨Đm|?G\2侹в<2. CpfI03Qf!u55a9RDBq]ү Q}9NuK 8B# S`AW^@}h5afOiϢ^w2s)Uˎٱڝe95?)|坫.%p.XvФNV}@ǒ7إľ:}|b_bȂ0TD֨ 0Mc>^4thWeA:r>'c5Mލt OC_ ^h>OP2D4ԋaTTI2^!PLV6:\x"ƳhCᐍʺe'B3JzR YBuR=2 =mKk۬NͭaxL@BJUH]lMPW5 "YTԼfEX*^:ծ4Z%Rbqup OnB D+]D-<T@oDC]?癿v-s,$aB,Iz?abJ0ZCm1vaԯgد+ I8YK;:kS^-ICh$0cs^Gh+n5u`^揢~7Sv 6[:7nt~g%|xMIרGZkY%h2 J[|!U1Lu4"!<l)$t+| *{Nak.G/u>yANᘾQŶL#%7cl^]IФ`͉,8`STbdNƯQ`̅EB{(2:^U=A0k'?VVOl}eIq=B^ɲ#hUr׎"y W5%v>gZJBҏ= 7#x64,cՅ7ywLNlX9scUlITV_Y.:vxtv-G(ETe/!{o^ڭ+."KW.Rb=-1v=G@}_jNs{&jmXύ;.gw|Oƒ:SsCfqTb րdSwh*JIKlA:g3 a[ hJTcyK."J˱FDHm$}G?C  ]%߾(C^ tmXospnGy9˅Tp+%%űN(ޖY_G]C-$~,DԌl\{aHsЕSJ9G_NT]Jrqc$OtS@42۹"{=ГI-G0f{ YZ