libgcrypt20-32bit-1.8.2-lp151.9.25.1<>,^7N/=„:=:dhRyʴ0 -ۤl \LX.=jL7Fk$a[Lme!l<#o򗇸XL|yl&wdY?MnX&tþ ])iL6 # ƷTثJ8PM3`ٌI*G3@1Zy!,YvGE^VU] 6i(u'z~2-}#(r7|LH7e༲pDc1G5>AX?Xpd ' >  5;BT` f l x   />dp$(8595: N5>TBTGTHTIUXU YU ZUP[UT\U\]Uh^UbUcVjdVeWfWlWuWvW(wWxWyWX X$X*XlClibgcrypt20-32bit1.8.2lp151.9.25.1The GNU Crypto LibraryLibgcrypt is a general purpose crypto library based on the code used in GnuPG (alpha version).^7Ngoat17openSUSE Leap 15.1openSUSEGPL-2.0+ AND LGPL-2.1+http://bugs.opensuse.orgSystem/Librarieshttp://directory.fsf.org/wiki/Libgcryptlinuxx86_64/sbin/ldconfigA^7N^7N^7N9fb7cf22023f325b2c9bb3ef0b047e67fdf989032ad863f75546a5d0d2a1f1a3318678e2a8faeb6ed63633f4cdc147685d42e9149b5bf739526baf6138587a13libgcrypt.so.20.2.2rootrootrootrootrootrootlibgcrypt-1.8.2-lp151.9.25.1.src.rpmlibgcrypt-32bitlibgcrypt.so.20libgcrypt.so.20(GCRYPT_1.6)libgcrypt20-32bitlibgcrypt20-32bit(x86-32)@@@@@@@@@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.15)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libdl.so.2libdl.so.2(GLIBC_2.0)libdl.so.2(GLIBC_2.1)libgpg-error.so.0libgpg-error.so.0(GPG_ERROR_1.0)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1^@^@^H^@^@^|@^|@^j$@^U @^%@^!^!]@]e@]]ʞ]m@]A]0_@]G@\@\@\@\[@[*AZ@Z@ZZ1@YYu@YqYTY3@Y1S@XXRXOWF@WQW9@W9@VVUUJ@T@TTԬTԬTԬTZ@Pedro Monreal Gonzalez Pedro Monreal Gonzalez Vítězslav Čížek Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Vítězslav Čížek Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Jason Sikes Jason Sikes Jason Sikes Vítězslav Čížek Vítězslav Čížek Vítězslav Čížek Pedro Monreal Gonzalez Pedro Monreal Gonzalez psimons@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comfvogt@suse.comastieger@suse.comastieger@suse.comjengelh@inai.deastieger@suse.comastieger@suse.comastieger@suse.compmonrealgonzalez@suse.comrmaliska@suse.comastieger@suse.comastieger@suse.commpluskal,vcizek,astieger}@suse.comastieger@suse.compjanouch@suse.depjanouch@suse.deastieger@suse.comastieger@suse.comvcizek@suse.comdvaleev@suse.comastieger@suse.comastieger@suse.comcoolo@suse.comdimstar@opensuse.orgcoolo@suse.comandreas.stieger@gmx.de- FIPS: RSA/DSA/ECC test_keys() print out debug messages [bsc#1171872] * Print the debug messages in test_keys() only in debug mode. - Update patches: libgcrypt-PCT-RSA.patch libgcrypt-PCT-DSA.patch libgcrypt-PCT-ECC.patch- FIPS: libgcrypt: Double free in test_keys() on failed signature verification [bsc#1169944] * Use safer gcry_mpi_release() instead of mpi_free() - Update patches: * libgcrypt-PCT-DSA.patch * libgcrypt-PCT-RSA.patch * libgcrypt-PCT-ECC.patch- Ship the FIPS checksum file in the shared library package and create a separate trigger file for the FIPS selftests (bsc#1169569) * add libgcrypt-fips_selftest_trigger_file.patch * refresh libgcrypt-global_init-constructor.patch - Remove libgcrypt-binary_integrity_in_non-FIPS.patch obsoleted by libgcrypt-global_init-constructor.patch- FIPS: Verify that the generated signature and the original input differ in test_keys function for RSA, DSA and ECC: [bsc#1165539] - Add zero-padding when qx and qy have different lengths when assembling the Q point from affine coordinates. - Refreshed patches: * libgcrypt-PCT-DSA.patch * libgcrypt-PCT-RSA.patch * libgcrypt-PCT-ECC.patch- FIPS: Switch the PCT to use the new signature operation [bsc#1165539] * Patches for DSA, RSA and ECDSA test_keys functions: - libgcrypt-PCT-DSA.patch - libgcrypt-PCT-RSA.patch - libgcrypt-PCT-ECC.patch - Update patch: libgcrypt-FIPS-RSA-DSA-ECDSA-hashing-operation.patch- FIPS: Fix drbg to be threadsafe [bsc#1167674] * Detect fork and re-open devices in_gcry_rndlinux_gather_random * libgcrypt-check-re-open-dev_random-after-fork.patch- FIPS: Run self-tests from constructor during power-on [bsc#1166748] * Set up global_init as the constructor function: - libgcrypt-global_init-constructor.patch * Relax the entropy requirements on selftest. This is especially important for virtual machines to boot properly before the RNG is available: - libgcrypt-random_selftests-testentropy.patch - libgcrypt-rsa-no-blinding.patch - libgcrypt-ecc-ecdsa-no-blinding.patch * Fix benchmark regression test in FIPS mode: - libgcrypt-FIPS-GMAC_AES-benckmark.patch- Remove check not needed in _gcry_global_constructor [bsc#1164950] * Update libgcrypt-Restore-self-tests-from-constructor.patch- FIPS: Run the self-tests from the constructor [bsc#1164950] * Add libgcrypt-invoke-global_init-from-constructor.patch- ECDSA: Check range of coordinates (bsc#1161216) * add libgcrypt-ECDSA_check_coordinates_range.patch- FIPS: libgcrypt DSA PQG parameter generation: Missing value [bsc#1161219] - FIPS: libgcrypt DSA PQG verification incorrect results [bsc#1161215] - FIPS: libgcrypt RSA siggen/keygen: 4k not supported [bsc#1161220] * Add patch from Fedora libgcrypt-1.8.4-fips-keygen.patch- FIPS: keywrap gives incorrect results [bsc#1161218] * Add libgcrypt-AES-KW-fix-in-place-encryption.patch- FIPS: RSA/DSA/ECDSA are missing hashing operation [bsc#1155337] * Add libgcrypt-FIPS-RSA-DSA-ECDSA-hashing-operation.patch- Fix tests in FIPS mode: * Fix tests: basic benchmark bench-slope pubkey t-cv25519 t-secmem * Add patch libgcrypt-fix-tests-fipsmode.patch- Fix test dsa-rfc6979 in FIPS mode: * Disable tests in elliptic curves with 192 bits which are not recommended in FIPS mode * Add patch libgcrypt-dsa-rfc6979-test-fix.patch- CMAC AES and TDES FIPS self-tests: * CMAC AES self test missing [bsc#1155339] * CMAC TDES self test missing [bsc#1155338] - Add libgcrypt-CMAC-AES-TDES-selftest.patch- Security fix: [bsc#1148987,CVE-2019-13627] * Mitigation against an ECDSA timing attack * Added libgcrypt-CVE-2019-13627.patch- Fixed an issue created by incomplete implementation of previous change - [bsc#1097073] * Removed section of libgcrypt-binary_integrity_in_non-FIPS.patch that caused some tests to be executed more than once.- Fixed a race condition in initialization. * Added libgcrypt-1.8.4-allow_FSM_same_state.patch - Security fix: [bsc#1138939, CVE-2019-12904] * The C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) * Added patches: - libgcrypt-CVE-2019-12904-GCM-Prefetch.patch - libgcrypt-CVE-2019-12904-GCM.patch - libgcrypt-CVE-2019-12904-AES.patch - Fixed env-script-interpreter in cavs_driver.pl- Fixed redundant fips tests in some situations causing sudo to stop working when pam-kwallet is installed. bsc#1133808 * Added libgcrypt-1.8.4-fips_ctor_skip_integrity_check.patch * Removed libgcrypt-fips_ignore_FIPS_MODULE_PATH.patch because it was obsoleted by libgcrypt-1.8.4-fips_ctor_skip_integrity_check.patch- libgcrypt-1.8.3-fips-ctor.patch changed the way the fips selftests are invoked as well as the state transition, adjust the code so a missing checksum file is not an issue in non-FIPS mode (bsc#1097073) * update libgcrypt-binary_integrity_in_non-FIPS.patch- Enforce the minimal RSA keygen size in fips mode (bsc#1125740) * add libgcrypt-fips_rsa_no_enforced_mode.patch- Don't run full self-tests from constructor (bsc#1097073) * Don't call global_init() from the constructor, _gcry_global_constructor() from libgcrypt-1.8.3-fips-ctor.patch takes care of the binary integrity check instead. * Only the binary checksum will be verified, the remaining self-tests will be run upon the library initialization - Add libgcrypt-fips_ignore_FIPS_MODULE_PATH.patch - Drop libgcrypt-init-at-elf-load-fips.patch and libgcrypt-fips_run_selftest_at_constructor.patch- Skip all the self-tests except for binary integrity when called from the constructor (bsc#1097073) * Added libgcrypt-1.8.3-fips-ctor.patch- Fail selftests when checksum file is missing in FIPS mode only (bsc#1117355) * add libgcrypt-binary_integrity_in_non-FIPS.patch- Apply "CVE-2018-0495.patch" from upstream to enable blinding for ECDSA signing. This change mitigates a novel side-channel attack. [CVE-2018-0495, bsc#1097410]- Suggest libgcrypt20-hmac for package libgcrypt20 to ensure they are installed in the right order. [bsc#1090766]- Extended the fipsdrv dsa-sign and dsa-verify commands with the - -algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455). * Added libgcrypt-fipsdrv-enable-algo-for-dsa-sign.patch * Added libgcrypt-fipsdrv-enable-algo-for-dsa-verify.patch- Use %license (boo#1082318)- libgcrypt 1.8.2: * Fix fatal out of secure memory status in the s-expression parser on heavy loaded systems. * Add auto expand secmem feature or use by GnuPG 2.2.4- libgcrypt 1.8.1: * Mitigate a local side-channel attack on Curve25519 dubbed "May the Fourth be With You" CVE-2017-0379 bsc#1055837 * Add more extra bytes to the pool after reading a seed file * Add the OID SHA384WithECDSA from RFC-7427 to SHA-384 * Fix build problems with the Jitter RNG * Fix assembler code build problems on Rasbian (ARMv8/AArch32-CE)- RPM group fixes.- libgcrypt 1.8.0: * New cipher mode XTS * New hash function Blake-2 * New function gcry_mpi_point_copy. * New function gcry_get_config. * GCRYCTL_REINIT_SYSCALL_CLAMP allows to init nPth after Libgcrypt. * New gobal configuration file /etc/gcrypt/random.conf. * GCRYCTL_PRINT_CONFIG does now also print build information for libgpg-error and the used compiler version. * GCRY_CIPHER_MODE_CFB8 is now supported. * A jitter based entropy collector is now used in addition to the other entropy collectors. * Optimized gcry_md_hash_buffers for SHA-256 and SHA-512. random pool lock). * Interface changes relative to the 1.7.0 release: gcry_get_config NEW function. gcry_mpi_point_copy NEW function. GCRYCTL_REINIT_SYSCALL_CLAMP NEW macro. GCRY_MD_BLAKE2B_512 NEW constant. GCRY_MD_BLAKE2B_384 NEW constant. GCRY_MD_BLAKE2B_256 NEW constant. GCRY_MD_BLAKE2B_160 NEW constant. GCRY_MD_BLAKE2S_256 NEW constant. GCRY_MD_BLAKE2S_224 NEW constant. GCRY_MD_BLAKE2S_160 NEW constant. GCRY_MD_BLAKE2S_128 NEW constant. GCRY_CIPHER_MODE_XTS NEW constant. gcry_md_info DEPRECATED. - Refresh patch libgcrypt-1.6.3-aliasing.patch- libgcrypt 1.7.8: * CVE-2017-7526: Mitigate a flush+reload side-channel attack on RSA secret keys (bsc#1046607)- libgcrypt 1.7.7: * Fix possible timing attack on EdDSA session key (previously patched, drop libgcrypt-secure-EdDSA-session-key.patch) * Fix long standing bug in secure memory implementation which could lead to a segv on free- Added libgcrypt-secure-EdDSA-session-key.patch [bsc#1042326] * Store the session key in secure memory to ensure that constant time point operations are used in the MPI library.- libgcrypt 1.7.6: * Fix counter operand from read-only to read/write * Fix too large jump alignment in mpih-rshift- libgcrypt 1.7.5: * Fix regression in mlock detection introduced with 1.7.4- libgcrypt 1.7.4: * ARMv8/AArch32 performance improvements for AES, GCM, SHA-256, and SHA-1. * Add ARMv8/AArch32 assembly implementation for Twofish and Camellia. * Add bulk processing implementation for ARMv8/AArch32. * Add Stribog OIDs. * Improve the DRBG performance and sync the code with the Linux version. * When secure memory is requested by the MPI functions or by gcry_xmalloc_secure, they do not anymore lead to a fatal error if the secure memory pool is used up. Instead new pools are allocated as needed. These new pools are not protected against being swapped out (mlock can't be used). Mitigation for minor confidentiality issues is encryption swap space. * Fix GOST 28147 CryptoPro-B S-box. * Fix error code handling of mlock calls.- libgcrypt 1.7.3: * security issue already fixes with 1.6.6 * Fix building of some asm modules with older compilers and CPUs. * ARMv8/AArch32 improvements for AES, GCM, SHA-256, and SHA-1. - includes changes from libgcrypt 1.7.2: * Bug fixes: - Fix setting of the ECC cofactor if parameters are specified. - Fix memory leak in the ECC code. - Remove debug message about unsupported getrandom syscall. - Fix build problems related to AVX use. - Fix bus errors on ARM for Poly1305, ChaCha20, AES, and SHA-512. * Internal changes: - Improved fatal error message for wrong use of gcry_md_read. - Disallow symmetric encryption/decryption if key is not set. - includes changes from 1.7.1: * Bug fixes: - Fix ecc_verify for cofactor support. - Fix portability bug when using gcc with Solaris 9 SPARC. - Build fix for OpenBSD/amd64 - Add OIDs to the Serpent ciphers. * Internal changes: - Use getrandom system call on Linux if available. - Blinding is now also used for RSA signature creation. - Changed names of debug envvars - includes changes from 1.7.0: * New algorithms and modes: - SHA3-224, SHA3-256, SHA3-384, SHA3-512, and MD2 hash algorithms. - SHAKE128 and SHAKE256 extendable-output hash algorithms. - ChaCha20 stream cipher. - Poly1305 message authentication algorithm - ChaCha20-Poly1305 Authenticated Encryption with Associated Data mode. - OCB mode. - HMAC-MD2 for use by legacy applications. * New curves for ECC: - Curve25519. - sec256k1. - GOST R 34.10-2001 and GOST R 34.10-2012. * Performance: - Improved performance of KDF functions. - Assembler optimized implementations of Blowfish and Serpent on ARM. - Assembler optimized implementation of 3DES on x86. - Improved AES using the SSSE3 based vector permutation method by Mike Hamburg. - AVX/BMI is used for SHA-1 and SHA-256 on x86. This is for SHA-1 about 20% faster than SSSE3 and more than 100% faster than the generic C implementation. - 40% speedup for SHA-512 and 72% for SHA-1 on ARM Cortex-A8. - 60-90% speedup for Whirlpool on x86. - 300% speedup for RIPE MD-160. - Up to 11 times speedup for CRC functions on x86. * Other features: - Improved ECDSA and FIPS 186-4 compliance. - Support for Montgomery curves. - gcry_cipher_set_sbox to tweak S-boxes of the gost28147 cipher algorithm. - gcry_mpi_ec_sub to subtract two points on a curve. - gcry_mpi_ec_decode_point to decode an MPI into a point object. - Emulation for broken Whirlpool code prior to 1.6.0. [from 1.6.1] - Flag "pkcs1-raw" to enable PCKS#1 padding with a user supplied hash part. - Parameter "saltlen" to set a non-default salt length for RSA PSS. - A SP800-90A conforming DRNG replaces the former X9.31 alternative random number generator. - Map deprecated RSA algo number to the RSA algo number for better backward compatibility. [from 1.6.2] - Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. [from 1.6.3] - Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. [from 1.6.3] - Flag "no-keytest" for ECC key generation. Due to a bug in the parser that flag will also be accepted but ignored by older version of Libgcrypt. [from 1.6.4] - Speed up the random number generator by requiring less extra seeding. [from 1.6.4] - Always verify a created RSA signature to avoid private key leaks due to hardware failures. [from 1.6.4] - Mitigate side-channel attack on ECDH with Weierstrass curves [CVE-2015-7511]. See http://www.cs.tau.ac.IL/~tromer/ecdh/ for details. [from 1.6.5] * Internal changes: - Moved locking out to libgpg-error. - Support of the SYSROOT envvar in the build system. - Refactor some code. - The availability of a 64 bit integer type is now mandatory. * Bug fixes: - Fixed message digest lookup by OID (regression in 1.6.0). - Fixed a build problem on NetBSD - Fixed some asm build problems and feature detection bugs. * Interface changes relative to the 1.6.0 release: gcry_cipher_final NEW macro. GCRY_CIPHER_MODE_CFB8 NEW constant. GCRY_CIPHER_MODE_OCB NEW. GCRY_CIPHER_MODE_POLY1305 NEW. gcry_cipher_set_sbox NEW macro. gcry_mac_get_algo NEW. GCRY_MAC_HMAC_MD2 NEW. GCRY_MAC_HMAC_SHA3_224 NEW. GCRY_MAC_HMAC_SHA3_256 NEW. GCRY_MAC_HMAC_SHA3_384 NEW. GCRY_MAC_HMAC_SHA3_512 NEW. GCRY_MAC_POLY1305 NEW. GCRY_MAC_POLY1305_AES NEW. GCRY_MAC_POLY1305_CAMELLIA NEW. GCRY_MAC_POLY1305_SEED NEW. GCRY_MAC_POLY1305_SERPENT NEW. GCRY_MAC_POLY1305_TWOFISH NEW. gcry_md_extract NEW. GCRY_MD_FLAG_BUGEMU1 NEW [from 1.6.1]. GCRY_MD_GOSTR3411_CP NEW. GCRY_MD_SHA3_224 NEW. GCRY_MD_SHA3_256 NEW. GCRY_MD_SHA3_384 NEW. GCRY_MD_SHA3_512 NEW. GCRY_MD_SHAKE128 NEW. GCRY_MD_SHAKE256 NEW. gcry_mpi_ec_decode_point NEW. gcry_mpi_ec_sub NEW. GCRY_PK_EDDSA NEW constant. GCRYCTL_GET_TAGLEN NEW. GCRYCTL_SET_SBOX NEW. GCRYCTL_SET_TAGLEN NEW. - Apply libgcrypt-1.6.3-aliasing.patch only on big-endian architectures - update drbg_test.patch and install cavs testing directory again - As DRBG is upstream, drop pateches: v9-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch 0002-Compile-DRBG.patch 0003-Function-definitions-of-interfaces-for-random.c.patch 0004-Invoke-DRBG-from-common-libgcrypt-RNG-code.patch 0005-Function-definitions-for-gcry_control-callbacks.patch 0006-DRBG-specific-gcry_control-requests.patch v9-0007-User-interface-to-DRBG.patch libgcrypt-fix-rng.patch - drop obsolete: libgcrypt-fips-dsa.patch libgcrypt-fips_ecdsa.patch- libgcrypt 1.6.6: * fix CVE-2016-6313: Issue in the mixing functions of the random number generators allowed an attacker who obtained a number of bytes from the standard RNG to predict some of the next ouput. (bsc#994157)- remove conditionals for unsupported distributions (before 13.2), it would not build anyway because of new dependencies- make the -hmac package depend on the same version of the library, fixing bsc#979629 FIPS: system fails to reboot after installing fips pattern- update to 1.6.5: * CVE-2015-7511: Mitigate side-channel attack on ECDH with Weierstrass curves (boo#965902)- follow-up to libgcrypt 1.6.4 update: sosuffix is 20.0.4- update to 1.6.4 - fixes libgcrypt equivalent of CVE-2015-5738 (bsc#944456) * Speed up the random number generator by requiring less extra seeding. * New flag "no-keytest" for ECC key generation. Due to a bug in the parser that flag will also be accepted but ignored by older version of Libgcrypt. * Always verify a created RSA signature to avoid private key leaks due to hardware failures. * Other minor bug fixes.- Fix gpg2 tests on BigEndian architectures: s390x ppc64 libgcrypt-1.6.3-aliasing.patch- fix sosuffix for 1.6.3 (20.0.3)- libgcrypt 1.6.3 [bnc#920057]: * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. - update upstream signing keyring- making the build reproducible - see http://lists.gnupg.org/pipermail/gnupg-commits/2014-September/010683.html for a very similiar problem- Move %install_info_delete calls from postun to preun: the files must still be present to be parsed. - Fix the names passed to install_info for gcrypt.info-[12].gz instead of gcrypt-[12].info.gz.- fix filename for info pages in %post scripts- libgcrypt 1.6.2: * Map deprecated RSA algo number to the RSA algo number for better backward compatibility. * Support a 0x40 compression prefix for EdDSA. * Improve ARM hardware feature detection and building. * Fix building for the x32 ABI platform. * Fix some possible NULL deref bugs. - remove libgcrypt-1.6.0-use-intenal-functions.patch, upstream via xtrymalloc macro - remove libgcrypt-fixed-sizet.patch, upstream - adjust libgcrypt-1.6.1-use-fipscheck.patch for xtrymalloc change/bin/shlibgcrypt-32bit1.8.21.8.2-lp151.9.25.11.8.2-lp151.9.25.1 1.8.2.libgcrypt.so.20.hmaclibgcrypt.so.20libgcrypt.so.20.2.2/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:12664/openSUSE_Leap_15.1_Update/b80965fdf86c8c7eb45385801e82a1d2-libgcrypt.openSUSE_Leap_15.1_Updatedrpmxz5x86_64-suse-linuxASCII textELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=35503fb63d3ed8d3c31e92decd39a911ea3f66dc, strippedPPR R RRRRRR RRRR R Rutf-8cee53214e7ba552ef5bb4f8b7fc65d9ed8376c0b0f456cc5fdcdb18fe73d825e?7zXZ !t/V9]"k%fk)_þYs+HC.% ]_Cyٺ/sc WV#I/A1dK+^*]p rjaXi73QAljmhwL{}aTC.l S#a rB4j>@t#tvWn*ZDx92/ͦÄ׫T_a2O\i@3_3k:m0Z Ѻ_h'a!߲ϨtuTriw3O< Xv䅲(Zvukƾd L K,:1 =VM@,%:HPjG*U[s_%rG \:ПNjuҌ<0x-q"-hUf9(O1>n~# SmD8ېU]rl:-UpʢzEWX#-)EAw?Yc}%q:Uo#R{\)mݵjoO;d ݟ s7ym[=7*ְ0w\ڮڷ#q@WБ0{윙`ԑyfX=#p[ Tg ^%T#DFpa.vͬk":=T-gGp=̞J&/'ZzR4#veTim 80l~XF1$cN5?2^x*d͙Eп&*jʚ}˵ȍwHu=TE ? ji$ē eC-eTiFr>4 Ӿko5]X.緡Y"{0ٟ ۆ- KtOR%e7I>՗%O6;)? &a4A)M^I<$̛>M%6:}QmXBuGywR)DYkYW\,fiȇ>8~tȰPu2 x\Wy]BU@{9ލmkɔ\T!)GO*>&JR~jW퐹& 'ڧMT|dzhH]v g=1@_B)<8^,׸r OfX\m]"Pы&Wľ:,?*Bjwd^g c@< >zbup ~D1{? ٠/!UZ^TBnNXGvXȜRV]46gn): o[V.T`D&H%@k_ri$b6_--$lP6GXdK~ȩ[Q/^' H}7@ߵ<%n̟Q)#_†m-H]qzH PRvZ 1\T)( w~vԩm7,9-l4-x T xLHx~L¨J} Rb Zƚ%Tҏ|`xJ׵{&4`X(v @wal$H2 Epf<%Xb\")ͬFJіCR s< t*E㪍5@)M޶4ѽ#3 }:Gw,`q3[HNXK$ӱx J YŜ,EJ'N ~taYAx3AYK08I1uwx1fH>%L*uVquVz (]vs8^,NixU^P;~´ miO +mQ}bQx;"Oבw^6T+Ό}b`&&Ӑ,@=Dt)(@VUQˎak+ɄWmCg PF ӝߦt!mFm^<C^=%TrӪхCL& mD4B Ⓤ\ab2̄:,(ӂw*Z FQv\75Cͥ.ln? ]#Jd4U.r_(V.M sۙ`%vv:ڸX-zm=|b^ǔ8#-;f b^ l`발SXxfxļH B='3 rw-c?$^k* r ʋTP>Qu{&a; $.p4wdߕK=-r|:H)=ӠGU! wJ ͎Jv6)N]/&m@CxA$htjj wb; U\L]Hc,EY1^5'PrOSJ8w-yKXO>O_G R;ݶ`֘.?L5:6b/mS'A)7Ewa#12X=vik2Jw`Wo<v1c.nnAnN\$tXM wD,K pP43DN & nP-:.r*nonT4V.1:8{ǀ>;v,ĥ.%\ӔE"yC۽p9zҝucT%G WL8BWut^v۴w)?]5R.R2A h=Ua5-qP xXҾ̺@9瑴&ZRu ۅ. +&A>0o+Ӝ[ŞnE wR6D?`dzv+TSG'KVl`-,!e; 4 ! i9LBO $d'Y=ΐg`6 (A!;§PL|v6krL R@ySޑDǿzɚHϻNU.GId,\AA:~3,Nhwaɐ -&S4!>8 )p%ӭem##\$+C{fP#].ucy:*.!5| . cYx|VC@ ;=GjUxmokB36Mi n M4tȧwԲ.=sW7] |IOHFcHvHMBsd@}DGJxi%K?Oyp[qVWYB.`m)[\`VS;d0%йb h3J#i8İ6f?:DVys?HF^{8Aח%uQK.ܶxeAw! S~ƖBL11U{B;Mue=^ĸ IY,uN ]f@oW `jWmTIuQ `7HPTUH\ \ȳE.*!JUnL"*,j ~vX|PĒ.~f@@E[g:iV2EBqb왭?;Nr][+߇E6Xinn8p%yۋUCA՞a?"#UT)@dR>caȎ=yQXz7mGh ĸ7$!'(g>R 2Wm˺Z=~/BH*rIG*92i4\1.iCJyW: OaAn98T ;ϛiNwl-C*[0Fk\_ʍ38R/Ҷ11), n]2voo{ʯp DW}%&MZ횠Gț2/cCfŠ5ɥ;3u"Tzf3g|LL]h,ɾ$PxvX% ǺƞR.Pp®GTЎ 4pW&*\ fuc4:*z x_M]\A+G!l!󐠇ѯ?~q ` 9pxklky%K)YԎn+hR2FMPeaWf]c+ dBVd$ZR$UG{ I"CԸf#/Ltһ$4K$j"㪁^̦(< xf 0;X'0EMt4.5=M˪D2 e G#m"lIӣạPCruOc(N񸌫XOj'qڴ GAEۄ-͈w V䮬/sțL]Їg"RKw.dJHA&J-^!呦Q1]W$h ''b9;Ŷ`0L㩻TVR֑JEѰ]&;xQ:RGO̵Kq5Y 7d3E23|̮Fpp\!>8!b0u#4yoHZC&(\H:B!o/wBa3ڙ#pJ<{ڻOf)!&яgW^RXQ+!14ޅFtb3\cYo#ⅣK.I7O5!(U6bӜ%Bh< *;ϗ9b HK8 Km0pݑ6%z#}d\]*&^>wfˤzGL.dDWEBkT?AA]pՏr+Iwrؘ2حϮjF7O>t'*}}E"j?Qr`b*ןKԜxL#5 ժc'@uߕ 6J`GEZ3܏Q_pܨ1$[EVxd4xb]GE-A'MH αU򙞪28_nX`Ch>q͒rtTn/\]ǃuyK=+?kT04a$I{I dP[fY[S۾Ǯqagd^z-,`$5(tE yP"!4\Rt;ޟ}0(9"{ٖ͠t~Z7XBCu|"i-F,論@}1ߎBGAus3z>_3SwOmQ [lÕns /Mnǰ'm?}1#3 h i˹}s~#Iig2z1֊^w;PݹJ]>שD8$q3h!hNĺo*Uzve(бʵ@r(Df[O ;[H+@|8T (p`lR.q\i ,"/Smx$yRs90Qb'9M۟JoQTjmA^6{E_T5QrP[ On՟Wt(LpD^A> tPO'ߩA9Eɹ%?šR;LS^rD|m_P]!u& Z 3F.KP2>\n+>=hj}6aͧ"¤@Q6-yU9¼ Jt`pgl, ;  OiJs?uu^rD5W$z,;h) 榬~d4ey̚s_NT43j ?I7V b s8!=/QC3)gëH ^"»AdL#PgxuW㸜y0kDҋ2Zӡ{!"`Q?j(* CUiv>.W9w_G tL"zyt.21 #={]Ѯ`^;&2"j2 >;{D7=t3+JDd8HchrdFS!nbR|AH, M[&`0A(qӎI_(\,5*o/ԳcHqTZz 9Ѣ29Ȩz!+^tlr#5)'CMSK,l$rHTDb𖎆\]ۃ lgR ӡL{#oW]du|6t1;f(XMͻ9;r`bB瑬]Ȟun"9 sUŽUCt8Sj>Q[y"01tj;'0(uvooДx^7> JD?yf-mKu:hWY] p{bO9Kkk3 >`kj5aQ&^]X7VB6$T/LK8]_Pi>JNy곥0 )T%Ј5~LBEʵ 8h\Pma:d\+L{ătc# \:GL:R:ӵre S)0 |9P"W29 8C 4D@6B>|UAV,+KB]P?xTզ̿`~ Ȩȃ%'VbiPeh%(ʮsp/9^'PCt -dLMu*4.KP7}iMv* =YEIU+Kgg ?[NCcn":[f-pMLSlqXQ+(\J[ !4sy+LU9 ;b"֥BWN>\[ii t s]ZzYrMpV'cNw Jȴܔ 4c+Bʅ-/λv#rv|nB(6D uXqX@4C 5_%$ s8`6&ah0%r.<)(i:虗R#/e6Rƥ:bʆgwYB3ٵFNИQpCd2µvTh.~ pһ$q2 U4OBX!u$v2o~W-21 w4dF#cQu~/R'SQ-b _7)' ZVj,}:iUxYNQiyXy{JufT\|͈2;HS,,^GBCi\xv]-.l1GϰdIQc>k.';6 ]YZPXH~6`? w5%sh"ֽ-bi.yhs(d=g_4x} jlBWBYs= c$zڛٰ<ڐ=S/ۿ N=4<Ѕb%يnQO|]*F5FUΌcP⠜{qt7qˍKީ;8>A[|XcPga.[[0N[ŏ^gY)p:g4~pg2_|Fs&V (\L>1tNBƪt,K?=]UBB4H  ^df}L2CCnѱ+,AA-N\\0ᮌC!O*g@ ;x)|d* ɀpT}W2w4V0WzҵT`dN Qઘ;:3X/ cر /p%W/ [ARdl]DzB̒-D1ƺ˚(WA &sf©ѣ)EDw䔬/ {L`yǾ[fX`4ʷ{4Ia5 IZ R\]8xs6m<0kM1^Ox2&,`>x֏`]+Ϩ۾@@q#mX%ȎS?0AڰimW+|]=H.T̞j3NvU',Crb3u>X|SlE}G_"d "2͇ 5AD^$FK"/7lW?iU_œJf+J,?7Mlf^ n'-?gX`H#cwK0!ˑk 2j91{1 L٥YLhtŠY?b}Z=a:er!ړ,GѦ3 F_AW=!oGnS`O±ʦpA?F^mi<Zܛ=בaŌP;ls\-({/|vyF-nsZx$xX|q*U %A*v׌h1Je.Hʲę^s犐QvJ77r8Vlΐ+Ȉ!z )MN1D6oϴoW^ٍ?F}Mr[wF Keޔi\j9cdM@N;[)W ܎v'ѹAM[4)'{mزWeP.quFZ, գwe%z !oiȗpPs͢^^ɋ\/=Y?R%C#9W^-x^?~wr<Z}nP"KʹzYB lj FA ɤ2W品}Rk۬'eC6Sp *e7\PJ t1]Mi;uH9 缭ݵ/v}U97Gg "S9W4Xb@̘Rr.݈8걱s:[sM՝!`_Z!g[W? J{>;-S0Ww z<IM]pآ՗>,$ ILo;, , :G1:Oʃq1)W5nA6 +O$FI(ZNZF< sד"a\'*BBfйPġ”ugp#f,fvC -4C9g;<+_ʂܾn?!uQM@݉͐ǭď]@}wrPPxYrw@$46A'$,LS.id"?vdi.]wC o˾?L H'.ҁS׸xڮz?|yH\˺g,EK>x˦.ѝ 1zӜï ^hp-ڦ鈟}:ړ۲K^ \O)/Ala1Ey]jjHȃ0 ]i]vP/#@sG#ݮXk Ò#_(AJ2 uöHYX;+8EJ=!AgT6- [k,<QOʈ!%rjo],EY`{Vf>[l}j]8t_;|{jֲ9 =:r#R/Fkj!SX?zFqYKδ0%׋ϋ20R?w*/ -`}fX::pR(_Dø [d6+(51=}09V@X;xVqm/^P)TqFQ/Y I-)t ʰp^6'zƎՇA:e}h1( <D&n5 õ1iCz0'`[h-Hq"f+J[zر_63AȖ}c8T^S> YxP<)~0˚p9^c?$*p>nmzB€GN!QQ$OL&`cבx8(>pj{u-&7֬Ȕ}]c젻Vt* 2e%k%,8g_KYI:$NKw7?Ev{l%>!8+կp6zzc0nrk‡4Y+~2G{GkVǼ=v6 &Zץ3~<ṱ YZ