libgcrypt20-32bit-1.6.1-48.1<>,z0\/=„Ǎ ZƗ@AnIy  f"sk3}+'4#iltW}z?o*.uL,W|E@`JBRT/xF/6Knc% L(6AYN,9Ŷ21m~,Ρd$Ӵtk6uD-}ďvysmE]\wWDCemi8 =[`Xr%MF%^0=[ ? O5bxm;Y(X\ //um>=J?Jd  6 (PV]lt x |   h*(O8XI9|I: I>GBGGGHGIGXGYGZG[G\G]H^H$bH.cHdIweI|fIlIuIvIwJ4xJ<yJDClibgcrypt20-32bit1.6.148.1The GNU Crypto LibraryLibgcrypt is a general purpose crypto library based on the code used in GnuPG (alpha version).\cloud119 openSUSE Leap 42.3openSUSEGPL-2.0-or-later AND LGPL-2.1-or-laterhttp://bugs.opensuse.orgDevelopment/Libraries/C and C++http://directory.fsf.org/wiki/Libgcryptlinuxx86_64/sbin/ldconfig \\38c17f06f186cee8df88628b1aba3e55libgcrypt.so.20.0.1rootrootrootrootlibgcrypt-1.6.1-48.1.src.rpmlibgcrypt-32bitlibgcrypt.so.20libgcrypt.so.20(GCRYPT_1.6)libgcrypt20-32bitlibgcrypt20-32bit(x86-32)@@@@@@@@@@@@@@   /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.15)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libdl.so.2libdl.so.2(GLIBC_2.0)libdl.so.2(GLIBC_2.1)libgpg-error.so.0libgpg-error.so.0(GPG_ERROR_1.0)rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2[@[*AZ@Z@ZYx@Yg`Y[@YV=@Y:Y1S@W:W;WW@V@VV@U@U@Ug@U_@U_@U_@U]U>$UT@T~TTfT|T@T->@T*@T)IT%U@T%U@T%U@T$T!`TT&@T&@T_S0SS,Sr @ShShR>R@RƦ@RƦ@RRQdQ@Q@QQo@QLGQGQ O/@O7NN@N@NR@LfL0wK,@I@@Pedro Monreal Gonzalez psimons@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.compmonrealgonzalez@suse.comvcizek@suse.compmonrealgonzalez@suse.compjanouch@suse.depjanouch@suse.depjanouch@suse.dehpj@suse.comhpj@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comabergmann@suse.comabergmann@suse.comabergmann@suse.comvcizek@suse.comvcizek@suse.comjmatejek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comlnussel@suse.devcizek@suse.comlnussel@suse.devcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.commeissner@suse.commeissner@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comidonmez@suse.comandreas.stieger@gmx.dedmueller@suse.commvyskocil@suse.commvyskocil@suse.commvyskocil@suse.comandreas.stieger@gmx.demvyskocil@suse.comcoolo@suse.comcrrodriguez@opensuse.organdreas.stieger@gmx.demvyskocil@suse.comandreas.stieger@gmx.decoolo@suse.comchris@computersalat.decrrodriguez@opensuse.orgopensuse@dstoecker.dejengelh@medozas.decoolo@suse.comcrrodriguez@opensuse.orgmvyskocil@suse.czjengelh@medozas.dejengelh@medozas.decrrodriguez@suse.de- Fail selftests when checksum file is missing in FIPS mode only (bsc#1117355) * add libgcrypt-binary_integrity_in_non-FIPS.patch- Apply "CVE-2018-0495.patch" from upstream to enable blinding for ECDSA signing. This change mitigates a novel side-channel attack. [CVE-2018-0495, bsc#1097410]- Suggest libgcrypt20-hmac for package libgcrypt20 to ensure they are installed in the right order. [bsc#1090766]- Extended the fipsdrv dsa-sign and dsa-verify commands with the - -algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455). * Added libgcrypt-fipsdrv-enable-algo-for-dsa-sign.patch * Added libgcrypt-fipsdrv-enable-algo-for-dsa-verify.patch- Fix a regression in the fix for bsc#1043333 which caused libgcrypt to leak file descriptors (bsc#1059723) * add libgcrypt-fips_avoid_clash_with_gkd.patch * drop libgcrypt-fips_no_static_fd_random.patch- libgcrypt stored an open file descriptor to the random device in a static variable between invocations. gnome-keyring-daemon on initialization reopens descriptors 0-2 with /dev/null which caused an infinite loop when libgcrypt attempted to read from the random device (bsc#1043333) add libgcrypt-fips_no_static_fd_random.patch- Avoid seeding the DRBG during FIPS power-up selftests (bsc#1046659) * don't call gcry_drbg_instantiate() in healthcheck sanity test to save entropy * turn off blinding for RSA decryption in selftests_rsa to avoid allocation of a random integer * add libgcrypt-fips_dont_seed_drbg_in_selftests.patch - fix a bug in gcry_drbg_healthcheck_sanity() which caused skipping some of the tests * libgcrypt-fips_drbg_healthcheck_sanity_bug.patch (bsc#1046659#c4)- dlsym returns PLT address on s390x, dlopen libgcrypt20.so before calling dlsym (bsc#1047008) * add libgcrypt-fips-use_dlopen_to_get_hmac_path.patch- Security fix [CVE-2017-7526, bsc#1046607] * libgcrypt-CVE-2017-7526-1.6.1-2.patch - Hardening against local side-channel attack * libgcrypt-CVE-2017-7526-1.6.1-1.patch - Factored code for function (secret) and added new functions (secret_core_std, secret_core_crt) in cipher/rsa.c- Don't require secure memory for the fips selftests (bsc#931932) * prevents "Oops, secure memory pool already initialized" warning - modified libgcrypt-fips_run_selftest_at_constructor.patch- Added libgcrypt-secure-EdDSA-session-key.patch [bsc#1042326] * Store the session key in secure memory to ensure that constant time point operations are used in the MPI library.- Add libgcrypt-CVE-2016-6313-1.patch and libgcrypt-CVE-2016-6313-2.patch (bsc#994157 CVE-2016-6313)- make the -hmac package depend on the same version of the library, fixing bsc#979629 FIPS: system fails to reboot after installing fips pattern- Add libgcrypt-CVE-2015-7511.patch (bsc#965902), fixing side-channel attack on ECDH with Weierstrass curves- Update libgcrypt-bsc932232-avoid-drbg-crash-with-fips.patch (bsc#970882). Fixes crashes with GPG key generation.- Add libgcrypt-bsc932232-avoid-drbg-crash-with-fips.patch (bsc#932232).- fix for CVE-2015-0837 (bsc#920057) * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical] * added patches: libgcrypt-CVE-2015-0837-1.patch libgcrypt-CVE-2015-0837-2.patch libgcrypt-CVE-2015-0837-3.patch- don't drop privileges when locking secure memory (bsc#938343) * added libgcrypt-secmem_dont_drop_privilege.patch- the RSA decryption needs p < q for CRT to work (bnc#929919) * added libgcrypt-fips_rsa_p_less_than_q.patch - minor changes to the testsuite * modified libgcrypt-fips_testsuite.patch- remove obsolete drbg_test.patch added Aug 22 2014, now covered by libgcrypt-fips_add_drbg_cavs_test.patch * removed drbg_test.patch- update local cavs_driver.pl copy to the latest version- enable DRBG reseeding * added libgcrypt-1.6.1-drbg-reseeding.patch * added drbg_test-reseeding.patch- add possibility to specify salt length for RSASSA-PSS verification * added libgcrypt-fips_pss.patch- perform selftests if the module is complete (checksum files are installed) (bnc#928740) * changed libgcrypt-fips_run_selftest_at_constructor.patch- updated %post and %postun scripts with correct .info filenames- fix CVE-2014-3591 (bnc#920057) * use ciphertext blinding for Elgamal decryption * added libgcrypt-CVE-2014-3591.patch- handle priming error in DRBG continuous test (bnc#905483) * added libgcrypt-fips_handle_priming_error_in_drbg.patch from Jan Matejek- fix a bug in FIPS 186-4 dsa generation * changed libgcrypt-fips-dsa.patch - testsuite adjustments to make it work in fips mode (bnc#899524) * added libgcrypt-fips_testsuite.patch * dropped FIXME-temporary-hack-to-make-some-tests-work.patch- use the RSA keygen generator from Fedora that supports KAT tests * added libgcrypt-fips_rsa_keygen.patch - add gcrypt_rsagtest binary for CAVS testing of rsa keygen KAT * added libgcrypt-fips_KAT_keygen_test.patch- merge in RSA keygen RPP and KAT tests from Fedora * fixes bnc#900275 and bnc#900276 * added libgcrypt-fips_cavs_rsa_keygen.patch- all the drbg patches were merged into v10-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch - update drbg_test (libgcrypt-fips_add_drbg_cavs_test.patch) - add libgcrypt-fips_fipsdrv.patch- address a potential integer issue * changed libgcrypt-fips_PKBKDF_missing_step1.patch- enable HW support in fips mode (bnc#896435) * added libgcrypt-fips_enable_hardware_support.patch- fixes from Jan Matejek: * make DSA selftest use 2048 bit keys (bnc#898003) * added ECDSA selftests and add support for it to the CAVS testing framework (bnc#896202) * fix a bug in fipsdrv * changed patches: - libgcrypt-1.6.1-fips-cavs.patch - libgcrypt-fips_ecdsa.patch - libgcrypt-fips-dsa.patch- hide most of the fips patches behind a conditional, so they are not applied- fix condition for minimal e_value (bnc#896201, RSA-FIPS-186-4-adjustments.patch) - more testsuite fixes (fix-test-suite-for-RSA-in-fips-mode.patch, FIXME-temporary-hack-to-make-some-tests-work.patch)- don't apply libgcrypt-fips_run_selftest_at_constructor.patch * the system currently doesn't boot with it in FIPS mode (bnc#898253)- update libgcrypt-1.6.1-use-fipscheck.patch to not require hardcoding library soname - FIPS 186-4 RSA adjustments (bnc#896201) Added patches: * calculate-fips-checksum-after-build.patch * disable-algorithms-that-are-not-allowed-in-fips.patch * RSA-FIPS-186-4-adjustments.patch * skip-GCM-for-FIPS.patch * fix-test-suite-for-RSA-in-fips-mode.patch * FIXME-temporary-hack-to-make-some-tests-work.patch- add missing PKSC5v2.1 step 1 to PBKDF algorithm (bnc#898005)- disabled curve P-192 in FIPS mode (bnc#896202) * added libgcrypt-fips_ecdsa.patch - don't use SHA-1 for ECDSA in FIPS mode - also run the fips self tests only in FIPS mode- run the fips self tests at the constructor code * added libgcrypt-fips_run_selftest_at_constructor.patch- rewrite the DSA-2 code to be FIPS 186-4 compliant (bnc#894216) * added libgcrypt-fips-dsa.patch * install fips186_dsa - use 2048 bit keys in selftests_dsa- fix an issue in DRBG patchset * size_t type is 32-bit on 32-bit systems - added v9-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch - added v9-0007-User-interface-to-DRBG.patch - removed v7-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch - removed v7-0007-User-interface-to-DRBG.patch - update drbg_test.c to the latest release- fix a potential NULL pointer deference in DRBG patchset * fixes from https://bugs.g10code.com/gnupg/issue1701 * added v7-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch * added v7-0007-User-interface-to-DRBG.patch * removed 0001-SP800-90A-Deterministic-Random-Bit-Generator.patch.bz2 * removed 0007-User-interface-to-DRBG.patch - add a subpackage for CAVS testing * add cavs_driver.pl and cavs-test.sh from the kernel cavs package * added drbg_test.patch- split off the -hmac package that contains the checksums- libgcrypt-fix-rng.patch: make drbg work again in FIPS mode. - libgcrypt-1.6.1-use-fipscheck.patch: library to test is libgcrypt.so.20 and not libgcrypt.so.11 - libgcrypt-init-at-elf-load-fips.patch: initialize at ELF DSO load time.- add new 0007-User-interface-to-DRBG.patch from upstream * fixes bnc#877233- add support for SP800-90A DRBG (fate#316929, bnc#856312) * patches by Stephan Mueller (http://www.chronox.de/drbg.html): 0001-SP800-90A-Deterministic-Random-Bit-Generator.patch.bz2 0002-Compile-DRBG.patch 0003-Function-definitions-of-interfaces-for-random.c.patch 0004-Invoke-DRBG-from-common-libgcrypt-RNG-code.patch 0005-Function-definitions-for-gcry_control-callbacks.patch 0006-DRBG-specific-gcry_control-requests.patch 0007-User-interface-to-DRBG.patch- FIPS changes (from Fedora): - replaced libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff by libgcrypt-1.6.1-fips-cfgrandom.patch - libgcrypt-fixed-sizet.patch: fixed an int type for -flto - libgcrypt-1.6.1-use-fipscheck.patch: use the fipscheck binary - libgcrypt-1.6.1-fips-cavs.patch: add CAVS tests- Drop arm-missing-files.diff, fixed upstream- libgcrypt 1.6.1, a bugfix release with the folloging fixes: * Added emulation for broken Whirlpool code prior to 1.6.0. * Improved performance of KDF functions. * Improved ECDSA compliance. * Fixed message digest lookup by OID (regression in 1.6.0). * Fixed memory leaks in ECC code. * Fixed some asm build problems and feature detection bugs. * Interface changes relative to the 1.6.0 release: GCRY_MD_FLAG_BUGEMU1 NEW (minor API change).- add arm-missing-files.diff: Add missing files to fix build- fix bnc#856915: can't open /dev/urandom * correct libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff - require libgpg-error 1.11 or higher- fix dependency for 32bit devel package - name hmac files according soname - fix hmac subpackage dependency- update to 1.6. * Removed the long deprecated gcry_ac interface. Thus Libgcrypt is not anymore ABI compatible to previous versions if they used the ac interface. Check NEWS in libgcrypt-devel for removed interfaces. * Removed the module register subsystem. * The deprecated message digest debug macros have been removed. Use gcry_md_debug instead. * Removed deprecated control codes. * Improved performance of most cipher algorithms as well as for the SHA family of hash functions. * Added support for the IDEA cipher algorithm. * Added support for the Salsa20 and reduced Salsa20/12 stream ciphers. * Added limited support for the GOST 28147-89 cipher algorithm. * Added support for the GOST R 34.11-94 and R 34.11-2012 (Stribog) hash algorithms. * Added a random number generator to directly use the system's RNG. Also added an interface to prefer the use of a specified RNG. * Added support for the SCRYPT algorithm. * Mitigated the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See [CVE-2013-4242]. * Added support for Deterministic DSA as per RFC-6969. * Added support for curve Ed25519. * Added a scatter gather hash convenience function. * Added several MPI amd SEXP helper functions. * Added support for negative numbers to gcry_mpi_print, gcry_mpi_aprint and gcry_mpi_scan. * The algorithm ids GCRY_PK_ECDSA and GCRY_PK_ECDH are now deprecated. Use GCRY_PK_ECC if you need an algorithm id. * Changed gcry_pk_genkey for "ecc" to only include the curve name and not the parameters. The flag "param" may be used to revert this. * Added a feature to globally disable selected hardware features. * Added debug helper functions. - rebased patches * libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff * libgcrypt-ppc64.patch - add libgcrypt-1.6.0-use-intenal-functions.patch to fix fips.c build - Move all documentation to -devel package- update to 1.5.3 [bnc#831359] CVE-2013-4242 * Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See .- port SLE enhancenments to Factory (bnc#831028) * add libgcrypt-unresolved-dladdr.patch (bnc#701267) * add libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff (bnc#724841) * add libgcrypt-1.5.0-LIBGCRYPT_FORCE_FIPS_MODE-env.diff - install .hmac256.hmac (bnc#704068) - enable varuous new options in configure (m-guard, hmac binary check and random device linux) - build with all ciphers, pubkeys and digest by default as whitelist simply allowed them all- avoid gpg-offline in bootstrap packages- Library must be built with large file support in 32 bit archs.- update to 1.5.2 * The upstream sources now contain the IDEA algorithm, dropping: idea.c.gz libgcrypt-1.5.0-idea.patch libgcrypt-1.5.0-idea_codecleanup.patch * Made the Padlock code work again (regression since 1.5.0). * Fixed alignment problems for Serpent. * Fixed two bugs in ECC computations.- add GPL3.0+ to License tag because of dumpsexp (bnc#810759)- update to 1.5.1 * Allow empty passphrase with PBKDF2. * Do not abort on an invalid algorithm number in gcry_cipher_get_algo_keylen and gcry_cipher_get_algo_blklen. * Fixed some Valgrind warnings. * Fixed a problem with select and high fd numbers. * Improved the build system * Various minor bug fixes. * Interface changes relative to the 1.5.0 release: GCRYCTL_SET_ENFORCED_FIPS_FLAG NEW. GCRYPT_VERSION_NUMBER NEW. - add verification of source code signatures - now requires automake 1.11 to build- update license to new format- fix deps * libgpg-error-devel >= 1.8 - add libsoname macro- Libraries back into %{_libdir}, /usr merge project- add the missing IDEA algorithm after the patent is no longer relevant- Remove redundant/unwanted tags/section (cf. specfile guidelines)- add libtool as explicit buildrequire to avoid implicit dependency from prjconf- Update to version 1.5.0, most important changes * Uses the Intel AES-NI instructions if available * Support ECDH.- update to 1.4.6 * Fixed minor memory leak in DSA key generation. * No more switching to FIPS mode if /proc/version is not readable. * Fixed a sigill during Padlock detection on old CPUs. * Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3; SHA-256 went up by 25%. * New variants of the TIGER algorithm. * New cipher algorithm mode for AES-WRAP. * Interface changes relative to the 1.4.2 release: GCRY_MD_TIGER1 NEW GCRY_MD_TIGER2 NEW GCRY_CIPHER_MODE_AESWRAP NEW- add missing definition of udiv_qrnnd for sparcv9:32 - use %_smp_mflags- add baselibs.conf as a source - disable the use of hand-coded assembler functions on sparc - this is giving me an infinite loop with ./tests/prime (specifically ./sparc32v8/mpih-mul1.S:_gcry_mpih_mul_1. Fedora disables this too.- update to version 1.4.4 * Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants. This functionality has been in Libgcrypt since 1.3.0. * MD5 may now be used in non-enforced fips mode. * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes. * In fips mode, RSA keys are now generated using the X9.31 algorithm and DSA keys using the FIPS 186-2 algorithm. * The transient-key flag is now also supported for DSA key generation. DSA domain parameters may be given as well./bin/shlibgcrypt-32bit1.6.11.6.1-48.11.6.1-48.1 1.6.1libgcrypt.so.20libgcrypt.so.20.0.1/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9381/openSUSE_Leap_42.3_Update/56a3541f08ebd5cee17c177f20656398-libgcrypt.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=37f845b9adb2debcf494b903e9037ce4599caaa7, strippedPPR R RRRRRR RRRR R R?0]"k%dJt[\)E/Q)>(䲭e0=~~i.ߠcϗF=JLc 't'9:j@ V:i0'Pɻ8/p]^, 7~<=lpK>>)dCBgsdJi _&3ry%ۦ\٬(و ʱ,7YW׵6ɘ6e rE!A=QG8)̄/;!ޫVeLmdgVU ԴtƚIo@eB>كN+G䬦4*4%%\Bו2m"va:Xֻ5dg¤CC ֬#~Gp'_8dIl+TJ⧁OgWp&a&P|z P8!VGjT76GB//y4v?L "HO5- :t; *D!۝?=^%USY*>iAng)qf*97@JAR.41^UYEOP4n&h@8m[)r3ZWnJ Uk P~+pH<_ !?@u`Tp^T=:Gddvmi [[d1W_OMR"v}f .<nQ(a 3VXLwx[8;\+*'<\|%'ѿҷH3`>gفrА @~WIgҧma 3 >һ>սwI3W#ho) GQzW/8\>p&ۊXG ')6$R* <"`&KI4wz iuAYEzs<܉B?ɬ!aܸ6bQzN?B2fewqGS\\Xe:cb;KB5[ ΰ_b}G(WrH~\ +~ QߌVnev9 BhwD| Z6O`UQuDIxM5;V&3a[(-Z1{]S'rk/dh縸wn!x1{SHFyYBgP|:"hr6.r=2_)O0!Mg+fkĽ'8|YG+hȂ]ÎӍCiۗ#i2P q1rBHy 0d?KM`[\C?k !ha~CW?%"wJxZ3߇u];!ˤJ8Gڝ)%ư ʡGLyyޡՓ́g_һ/&&.z"3 bLHVQh1sxX< cL-vwS2@4G]6$'#o rVÖj%cMKld$  P!o3&!0w=&AE]mu^t:sIj<1o0ZcvqLFju<)lZ庪Ygf`w)Yv,&,QƲA+G_l,'8p$z1PB512㑬+̲|kW[T2%7ӇkķqYz!>j6ee>1#s 4贼 ܱ\}5Pmj>f^5̘yKtU?i FlKLwXoذ)&5>۹}s~>LHɖ+ z?wtx#6ݍ3$@\w$%`f$*\pY[K8s2e+}<'e'<%f@g|kG d ֪|/ZO+c"H[H=Pyn );v?YnjWEq~"D2 /ogWجrl3OQK8JGH%Ҝ`'HG҉ѸXy3O'y(Js)FHoZlO6lq4Sxhb?W <鲔ر,| #E yL2)N˺Pj5Q[ u~iy9t|jr1q=plD͛3ɕfϲ~.jV˸Q}-k)LeuiAaWcpYGS:&")̯}qlV8R=B!gS8ǘ4F&5:(侶k&7+/Mt g;:R/Ƌ.3dsXXm:ӵd#F N#(!:| ۊaI|LۭBJ`8Qonv):d3N- DX&/aJbR#? ÆE3噋`;b"ɲ3u~c{H2ΐЙYTwi ,JJvH5Fn sL/AG{@o؊{d2Rě$`4]Z>R 9+`AW{ަE4Pj>$,UX-DD ' V@I>g(,3n?;aJ[&QjgP) XM;X'tj+s>iaH s67/T)Hi%45wsVcY |9SEWoRVkty?8۠ ғM*tyLhcKE;ncÑ==ǝg|nRM 8_ a:m& m1JGO?DݴP -atBEzpo-"r륅0JȕEvcC-T n~?Sn.hV wsA?y%`S-{UʿխKpk{a($۵9pt |I#p s4Cp($?{‚ٞ5¡VfjTOElGwaE0>DǓp=Ԫ9)Wq;u{:'11cüofN>:[U qџh\5s+n{ՌOۣEIY(s<#Op۫]Du0oROܳ PG''$nZ?}3*p0Tdq/'2Biz9l7b S~VSA~rOJ-"b1AUܮu9!,b6\$:@Lzt=W}V̵ɣ Ǣu0`˧,Z 6>g8{o_?sZh{CRr=,1zKm HW&ط 0s =-7PTkCOܸOs̜1Mkܤ\9B0yE|)E;e]ČYNDrVu$8z+}㩥m Ʋ݀R߈\Râ͌ ~\P侟IΧ*J4ٺKb"1ـ?>Wf˗զPʘYQ܌`av~ G _ExWXWr0?%9ߨI*ߥ-2τ+<']OD3,%re$NDeř'5}ϋg5fx(j#Fb'b8ڡn0a5fFر|)E:rEq}&y9J`CP6[~ >;JQ}%$q&{3" уGy*妁%Wa <3 RMm2 k!_ƪH .2w݊z2Xz5H RlT4̆ryxf'(e:SYpKe;W&IֹB& H%A\aDAtqA7(TGz-(Qr5$dUc`=L>6tL5>!l ףyXsd"?j쌀;`qZQers'ٖ 3$ F=OԬ6˧|]G|;EEu7 V)ϛe{JFn(iB h̝1m] xU%{hhtdRtCêuU]%%""dЖ}>FȊ{U(a.dWL`ϯAEU]+plorW8Y!FryR/Vnkqɡch钽3T%S1PŤP%(M>\BL7[EI; adQ-3RRh'O7D%R:Ҙ,-'k1{j*-]M6C},1L杇:תok`ohJ}Fh:8׈(ǽJ|=KJS^u]]̟"9<EI +u0ÒUS 3V` ";ޡsrm

:9TlcRwVKK6 `4@|w r\\}P_Xj<8p!3P -xbnuQg<[؄nuk{"|I5%$GdGgԛZ ϙ |!'"X[9F%"& \(9(Nqel)$SS9,2q2nMDZJu-#@XGKs;NկXІh wH]HuZ_ ]7i} i3=1Gߕhd U.RDnŋ$!RX2:F2 XW)Zs񗈈7yp@zEΓr _4Iጌ=)+ŇdqF\#v)v@͛(2N h:t|*& }XV0^Уk /6F[fNhw?3 |WKoR_2q & gEu6EHN8g;N(K$'HVձOAȡ[PMb$eBW0i#Sk+Z- zA)W|ؾ˰_& *![0 *X|++4U4mAY,dzt~woeJtcҦ][U5s`Jf7gbZB@lv24Xߩ)KkvŹ1~gxQ|1seԧV̆W[M+Bo I$ cÛrʤޠ$KX?x`om*C>pggR, ͩm&+U].j"VcC435ѮHmL{%tg 6.`j4Č$Ce\GD%my%c暱_?PY a<|pP6B-z +n0UA2c008j!Ux-g65"(x>qja"tgX4DR%9}IM5@UHb'Ћq<;ARQJD:;c}-~s<:Ўf nXILc6ͪ4jU^)WQ{;dM 2U0lLV^sY,]&)pяqC ۀ̨|.hB`Ny)tL)#'!?aGd`$ (ߛLx]!XcA@L%n3Gm鳜z`RcDrlJ7C zvJM/cQ{ѭR3ndi4Qea+ `=_`DBҲqH:h.TX(?Y)&hO_籴t6 nIeޔ7MqD?KC^u<{՟Ʈ%JBzj^SSS̱Gh92A0l(kh1͇PsUoz5\QS=f Z,R&N&mҿ.1V}yJc5f)ʏa)ޞ ԔRRp;L f'C򃡛iJ|0֨,*hjiLNǿ9x#|Fs2Kb/<j9y T<wMz<%ߴ'1E8WZXį*>]@R"xP=/Cq\@AP#ŏ_wH2w&' d`Jkg1ٹp3'oI#̇G$/0 Kͺja%E;CG`e,_{g SZi3 d;;`{\̽5n,gu+'>Fv~63$[t&a峠tofҕf(sP$.-<1s1D)A6ؓ>vBx~d>_q~ Uz:AMV޲zTҢ(,'bdqx$ B.%w"滋9}8 L0o20-:,uQXS z~JrK lM@X`]?E ^4S}ƌ9> 4L+Rv섭>Rߍ)kMȚ1$d97냉cҚ' Gy0G%һZkbxjl nǟCŋwж@:,+Z"w lc#XcO\πrnEcquA$ 9:ȣ/ qgN?e;R&WɈjoWOUzz&V4qfyv }sz_>[47e\BL"#n{B]9GfPfUĀs>yOwiRbʇ005=& }  cUggԼ~hX4WPiTI%|hEf➅ FD!gPNf7p[ZEE1~T-<0%b@Sm"'f#}jyY1FRl Trp .-zxw$522 06|G,N"dDNc&&,懨l}B 9BQ?ᡋɋ|N&7H(38$P2n!]zhcI@L3#%,?_^= Kz #[q?An+dAheQgT%G3PCSMG@Ie(Up_@?\@x. y@zq8pgp e5kAG 4.4SVN k$)W"rcӤ>`߱ 3zKCk'ZƗ*&]׊PZAPIwer@kIsXyާ^O5\!pmŝeo#<,U_I"˄cY:44d0Ru,q:+$IU)4Xc(;{M]b$V~ah(XA# 絰smϡ٥O:`k *|xo?Kdp ؎@qء2'WSTұ 'ѷQ(҃2ri] ^U~o6,dDt(+/*NWQJ{Qx&#Tթ_ +~ȄA,QulC$H#C>%@3> |1塱qt7pۊ_ZEBnʣ#2qҝk*CP0c-CY3Pb{ _ P:"vT"(FIv2bwuC7E[ZDvc #Ams'# ׼UHO6{4(ōBpB>ԼFZOi"QdnIEMwR{ܞѝC*ъ2LsҘqm˕ }Ϳ =Yf;p" oWF ڈ)~1dax.;+hA nJ[p2?c} D+Mm`AVu߹ۿ,tK=8t$q6%ϟ\.L] xKNʇ-|I8 2>Dk72in|z_OBn{-.>apok׳'w )LK55?)v?&82y̅)AL9ڵm~{v}H|p mljHK/Gm~}۴EUG>Z={)w-&H}hKB(ʽҍwOL64cLG|pX9qk:m5屘,ˆXKLЦW ,nS X>Vs(#/qMGR#LڭJ@M%HWR^0XmRj+1%Y2PTihŬ->#( w$ ^{`O"F~yٯsFYd