libopenssl-3-fips-provider-3.1.4-150600.5.39.1<>,hhՐp9|6R(V?>m&ń+]ޥC<{u\WlLG A[kV,N]XK }Fn j?k;]KYb'njBX,ʇXCʩ \=>A?Ad# 1 Gx|    " $ ( i lpuz~(8k9dk: kF>G>H>I>X>Y>\? ]?^?b?1c?d@^e@cf@fl@hu@|v@wAxAyAzA8AHALARAClibopenssl-3-fips-provider3.1.4150600.5.39.1OpenSSL FIPS providerThis package contains the OpenSSL FIPS provider.hՐh03-ch2c"SUSE Linux Enterprise 15SUSE LLC Apache-2.0https://www.suse.com/Unspecifiedhttps://www.openssl.org/linuxx86_64"hՏbe679b601cfdde97329642f75caa5bd5f805184e13ed517a88b9a2f07f418bc3rootrootopenssl-3-3.1.4-150600.5.39.1.src.rpmlibopenssl-3-fips-providerlibopenssl-3-fips-provider(x86-64)@@@@@@@@     libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.34)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libjitterentropy.so.3()(64bit)libjitterentropy3libopenssl3rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.4.03.1.43.0.4-14.6.0-14.0-15.2-14.14.3h.h @hchK@hg=gu@g@f@f(@fIfIf@f@ff@fr@fffb@fafWfU@fK;@f8@e؈eee@eXeoee{@e{@e@eqeRe7e1@e1@e-%e'e @ddd!d~ddu@dtdkY@dbd*d"d!@dd@dadxc=@ck@ccccj@ccca @ca @ca @c!@b?bK@bK@b@b5b4t@b0b@a aa@a@a7T@a@`@`P@` @`B`}p`v@`/@`&m__H@_@_@_@_9_-B@_@_^@^@^@^^@^@lucas.mulling@suse.compmonreal@suse.commls@suse.deangel.yankov@suse.compmonreal@suse.comlucas.mulling@suse.comlucas.mulling@suse.compmonreal@suse.comangel.yankov@suse.comabergmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.combwiedemann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comotto.hollmann@suse.compsimons@suse.commwilck@suse.comgiuliano.belinassi@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comotto.hollmann@suse.comguillaume.gardet@opensuse.orgotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.comjengelh@inai.deotto.hollmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.commpluskal@suse.comotto.hollmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.compmonreal@suse.comotto.hollmann@suse.comotto.hollmann@suse.comotto.hollmann@suse.combrunopitrus@hotmail.compmonreal@suse.compmonreal@suse.compmonreal@suse.comjsikes@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comdanilo.spinella@suse.comsimonf.lees@suse.comsimonf.lees@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comjsikes@suse.comjsikes@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comcallumjfarmer13@gmail.comvcizek@suse.compmonrealgonzalez@suse.comvcizek@suse.comvcizek@suse.comjengelh@inai.devcizek@suse.comvcizek@suse.comvcizek@suse.com- Security fix: [bsc#1250232 CVE-2025-9230] * Fix out-of-bounds read & write in RFC 3211 KEK unwrap * Add patch openssl3-CVE-2025-9230.patch- Increase limit for CRL download [bsc#1247148, bsc#1247144] * Add openssl-3-large-CRLs.patch- Backport mdless cms signing support [jsc#PED-12895] * Add openssl-3-support-mdless-cms.patch- Security fix: [bsc#1240366, CVE-2025-27587] * Minerva side channel vulnerability in P-384 on PPC arch * Add openssl-3-p384-minerva-ppc.patch * Add openssl-3-p384-minerva-ppc-p9.patch- Security fix: [bsc#1240607] * Check ssl/ssl3_read_internal null pointer [from commit 38b051a] * Add openssl-check-ssl_read_internal-nullptr.patch- FIPS: Fix EMS in crypto-policies FIPS:NO-ENFORCE-EMS * [bsc#1230959, bsc#1232326, bsc#1231748] * Add patch openssl-FIPS-fix-EMS-support.patch- Security fix: [bsc#1236136, CVE-2024-13176] * Fix timing side-channel in ECDSA signature computation * Add openssl-CVE-2024-13176.patch- Security fix: [bsc#1220262, CVE-2023-50782] * Implicit rejection in PKCS#1 v1.5 * Add openssl-CVE-2023-50782.patch- Security fix: [bsc#1230698, CVE-2024-41996] * Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used. * Added openssl-3-CVE-2024-41996.patch- Security fix: [bsc#1229465, CVE-2024-6119] * possible denial of service in X.509 name checks * openssl-CVE-2024-6119.patch- Build with no-afalgeng [bsc#1226463]- Security fix: [bsc#1227138, CVE-2024-5535] * SSL_select_next_proto buffer overread * Add openssl-CVE-2024-5535.patch- Build with enabled sm2 and sm4 support [bsc#1222899]- Add reproducible.patch to fix bsc#1223336 aes-gcm-avx512.pl: fix non-reproducibility issue- FIPS: Deny SHA-1 signature verification in FIPS provider [bsc#1221365] * SHA-1 is not allowed anymore in FIPS 186-5 for signature verification operations. After 12/31/2030, NIST will disallow SHA-1 for all of its usages. * Add openssl-3-FIPS-Deny-SHA-1-sigver-in-FIPS-provider.patch- FIPS: RSA keygen PCT requirements. * Skip the rsa_keygen_pairwise_test() PCT in rsa_keygen() as the self-test requirements are covered by do_rsa_pct() for both RSA-OAEP and RSA signatures [bsc#1221760] * Enforce error state if rsa_keygen PCT is run and fails [bsc#1221753] * Add openssl-3-FIPS-PCT_rsa_keygen.patch- FIPS: Check that the fips provider is available before setting it as the default provider in FIPS mode. [bsc#1220523] * Rebase openssl-Force-FIPS.patch- FIPS: Port openssl to use jitterentropy [bsc#1220523] * Set the module in error state if the jitter RNG fails either on initialization or entropy gathering because health tests failed. * Add jitterentropy as a seeding source output also in crypto/info.c * Move the jitter entropy collector and the associated lock out of the header file to avoid redefinitions. * Add the fips_local.cnf symlink to the spec file. This simlink points to the openssl_fips.config file that is provided by the crypto-policies package. * Rebase openssl-3-jitterentropy-3.4.0.patch * Rebase openssl-FIPS-enforce-EMS-support.patch- FIPS: Block non-Approved Elliptic Curves [bsc#1221786] * Add patches - openssl-Add-changes-to-ectest-and-eccurve.patch - openssl-Remove-EC-curves.patch - openssl-Disable-explicit-ec.patch - openssl-skipped-tests-EC-curves.patch - openssl-FIPS-services-minimize.patch - FIPS: Service Level Indicator [bsc#1221365] * Add patches: - openssl-FIPS-Expose-a-FIPS-indicator.patch - openssl-FIPS-Remove-X9.31-padding-from-FIPS-prov.patch - openssl-FIPS-Use-digest_sign-digest_verify-in-self-test.patch - openssl-FIPS-RSA-disable-shake.patch - openssl-FIPS-signature-Add-indicator-for-PSS-salt-length.patch - openssl-FIPS-Add-explicit-indicator-for-key-length.patch - openssl-FIPS-limit-rsa-encrypt.patch - openssl-FIPS-enforce-EMS-support.patch - openssl-3-FIPS-GCM-Implement-explicit-indicator-for-IV-gen.patch - openssl-FIPS-services-minimize.patch - openssl-Add-FIPS-indicator-parameter-to-HKDF.patch - openssl-rand-Forbid-truncated-hashes-SHA-3-in-FIPS-prov.patch - openssl-FIPS-enforce-security-checks-during-initialization.patch - TODO: incomplete - FIPS: Output the FIPS-validation name and module version which uniquely identify the FIPS validated module. [bsc#1221751] * Add openssl-FIPS-release_num_in_version_string.patch - FIPS: Add required selftests: [bsc#1221760] * Add patches - openssl-FIPS-Use-digest_sign-digest_verify-in-self-test.patch - openssl-FIPS-Use-FFDHE2048-in-self-test.patch - openssl-FIPS-early-KATS.patch - openssl-FIPS-Use-OAEP-in-KATs-support-fixed-OAEP-seed.patch - openssl-FIPS-140-3-keychecks.patch - FIPS: DH: Disable FIPS 186-4 Domain Parameters [bsc#1221821] Add openssl-DH-Disable-FIPS-186-4-type-parameters-in-FIPS-mode.patch - FIPS: Recommendation for Password-Based Key Derivation [bsc#1221827] * Add additional check required by FIPS 140-3. Minimum value for PBKDF2 password is 20 characters. * Add patches: - openssl-pbkdf2-Set-minimum-password-length-of-8-bytes.patch - openssl-pbkdf2-Set-indicator-if-pkcs5-param-disabled-checks.patch - FIPS: Zeroization is required [bsc#1221752] * Add openssl-FIPS-140-3-zeroization.patch - FIPS: Reseed DRBG [bsc#1220690, bsc#1220693, bsc#1220696] * Enable prediction resistance for primary DRBG * Add oversampling of the noise source to comply with requirements of NIST SP 800-90C * Change CRNG buf size to align with output size of the Jitter RNG * Add openssl-FIPS-140-3-DRBG.patch - FIPS: NIST SP 800-56Brev2 [bsc#1221824] * Add patches: - openssl-FIPS-limit-rsa-encrypt.patch - openssl-FIPS-RSA-encapsulate.patch - openssl-FIPS-Add-SP800-56Br2-6.4.1.2.1-3.c-check.patch - FIPS: Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4 [bsc#1221787] * Add patches: - openssl-FIPS-services-minimize.patch - openssl-Revert-Improve-FIPS-RSA-keygen-performance.patch - openssl-Allow-disabling-of-SHA1-signatures.patch - openssl-Allow-SHA1-in-seclevel-2-if-rh-allow-sha1-signatures.patch - FIPS: Port openssl to use jitterentropy [bsc#1220523] * Add openssl-3-jitterentropy-3.4.0.patch * Add build dependency on jitterentropy-devel >= 3.4.0 and libjitterentropy3 >= 3.4.0 - FIPS: NIST SP 800-56Arev3 [bsc#1221822] * Add openssl-FIPS-140-3-keychecks.patch - FIPS: Error state has to be enforced [bsc#1221753] * Add patches: - openssl-FIPS-140-3-keychecks.patch - openssl-FIPS-Enforce-error-state.patch- Apply "openssl-CVE-2024-4741.patch" to fix a use-after-free security vulnerability. Calling the function SSL_free_buffers() potentially caused memory to be accessed that was previously freed in some situations and a malicious attacker could attempt to engineer a stituation where this occurs to facilitate a denial-of-service attack. [CVE-2024-4741, bsc#1225551]- Fix HDKF key derivation (bsc#1225291, gh#openssl/openssl#23448, gh#openssl/openssl#23456) * Add openssl-Fix-EVP_PKEY_CTX_add1_hkdf_info-behavior.patch * Add openssl-Handle-empty-param-in-EVP_PKEY_CTX_add1_hkdf_info.patch- Enable livepatching support (bsc#1223428)- Security fix: [bsc#1224388, CVE-2024-4603] * Check DSA parameters for excessive sizes before validating * Add openssl-CVE-2024-4603.patch- Security fix: [bsc#1222548, CVE-2024-2511] * Fix unconstrained session cache growth in TLSv1.3 * Add openssl-CVE-2024-2511.patch- Build the 32bit flavor of libopenssl-3-fips-provider [bsc#1220232] * Update baselibs.conf- Add migration script to move old files (bsc#1219562) /etc/ssl/engines.d/* -> /etc/ssl/engines1.1.d.rpmsave /etc/ssl/engdef.d/* -> /etc/ssl/engdef1.1.d.rpmsave They will be later restored by openssl-1_1 package to engines1.1.d and engdef1.1.d- Security fix: [bsc#1219243, CVE-2024-0727] * Add NULL checks where ContentInfo data can be NULL * Add openssl-CVE-2024-0727.patch- Encapsulate the fips provider into a new package called libopenssl-3-fips-provider.- Added openssl-3-use-include-directive.patch so that the default /etc/ssl/openssl.cnf file will include any configuration files that other packages might place into /etc/ssl/engines3.d/ and /etc/ssl/engdef3.d/. Also create symbolic links /etc/ssl/engines.d/ and /etc/ssl/engdef.d/ to above versioned directories. - Updated spec file to create the two new necessary directores for the above patch and two symbolic links to above directories. [bsc#1194187, bsc#1207472, bsc#1218933]- Security fix: [bsc#1218810, CVE-2023-6237] * Limit the execution time of RSA public key check * Add openssl-CVE-2023-6237.patch- Rename openssl-Override-default-paths-for-the-CA-directory-tree.patch to openssl-crypto-policies-support.patch- Embed the FIPS hmac. Add openssl-FIPS-embed-hmac.patch- Load the FIPS provider and set FIPS properties implicitly. * Add openssl-Force-FIPS.patch [bsc#1217934] - Disable the fipsinstall command-line utility. * Add openssl-disable-fipsinstall.patch - Add instructions to load legacy provider in openssl.cnf. * openssl-load-legacy-provider.patch - Disable the default provider for the test suite. * openssl-Disable-default-provider-for-test-suite.patch- Security fix: [bsc#1218690, CVE-2023-6129] * POLY1305: Fix vector register clobbering on PowerPC * Add openssl-CVE-2023-6129.patch- Add patch to fix BTI enablement on aarch64: * openssl-Enable-BTI-feature-for-md5-on-aarch64.patch- Security fix: [bsc#1216922, CVE-2023-5678] * Fix excessive time spent in DH check / generation with large Q parameter value. * Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex () or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. * Add openssl-CVE-2023-5678.patch- Update to 3.1.4: * Fix incorrect key and IV resizing issues when calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() with OSSL_PARAM parameters that alter the key or IV length [bsc#1216163, CVE-2023-5363]. * Remove patch fixed upstream openssl-CVE-2023-5363.patch- Performance enhancements for cryptography from OpenSSL 3.2 [jsc#PED-5086, jsc#PED-3514] * Add patches: - openssl-ec-Use-static-linkage-on-nistp521-felem_-square-mul-.patch - openssl-ec-56-bit-Limb-Solinas-Strategy-for-secp384r1.patch - openssl-ec-powerpc64le-Add-asm-implementation-of-felem_-squa.patch - openssl-ecc-Remove-extraneous-parentheses-in-secp384r1.patch - openssl-powerpc-ecc-Fix-stack-allocation-secp384r1-asm.patch - openssl-Improve-performance-for-6x-unrolling-with-vpermxor-i.patch- FIPS: Add the FIPS_mode() compatibility macro and flag support. * Add patches: - openssl-Add-FIPS_mode-compatibility-macro.patch - openssl-Add-Kernel-FIPS-mode-flag-support.patch- Security fix: [bsc#1216163, CVE-2023-5363] * Incorrect cipher key and IV length processing * Add openssl-CVE-2023-5363.patch- As of openssl 3.1.3, the devel package installs at least 5200 manpage files and is the owner of the most files in the man3 directory (in second place after lapack-man); move these manpages off to the -doc subpackage to reduce the walltime to install just openssl-3-devel (because there is also an invocation of mandb that runs at some point).- Update to 3.1.3: * Fix POLY1305 MAC implementation corrupting XMM registers on Windows (CVE-2023-4807)- Update to 3.1.2: * Fix excessive time spent checking DH q parameter value (bsc#1213853, CVE-2023-3817). The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. If DH_check() is called with such q parameter value, DH_CHECK_INVALID_Q_VALUE return flag is set and the computationally intensive checks are skipped. * Fix DH_check() excessive time with over sized modulus (bsc#1213487, CVE-2023-3446). The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ("p" parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. A new limit has been added to DH_check of 32,768 bits. Supplying a key/parameters with a modulus over this size will simply cause DH_check() to fail. * Do not ignore empty associated data entries with AES-SIV (bsc#1213383, CVE-2023-2975). The AES-SIV algorithm allows for authentication of multiple associated data entries along with the encryption. To authenticate empty data the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL just returns success for such call instead of performing the associated data authentication operation. The empty data thus will not be authenticated. The fix changes the authentication tag value and the ciphertext for applications that use empty associated data entries with AES-SIV. To decrypt data encrypted with previous versions of OpenSSL the application has to skip calls to EVP_DecryptUpdate() for empty associated data entries. * When building with the enable-fips option and using the resulting FIPS provider, TLS 1.2 will, by default, mandate the use of an extended master secret (FIPS 140-3 IG G.Q) and the Hash and HMAC DRBGs will not operate with truncated digests (FIPS 140-3 IG G.R). * Update openssl.keyring with the OTC members that sign releases * Remove openssl-z16-s390x.patch fixed upstream in https://github.com/openssl/openssl/pull/21284 * Remove security patches fixed upstream: - openssl-CVE-2023-2975.patch - openssl-CVE-2023-3446.patch - openssl-CVE-2023-3446-test.patch - openssl-3-CVE-2023-3817.patch- Security fix: [bsc#1213853, CVE-2023-3817] * Excessive time spent checking DH q parameter value: The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. If DH_check() is called with such q parameter value, DH_CHECK_INVALID_Q_VALUE return flag is set and the computationally intensive checks are skipped. * Add openssl-3-CVE-2023-3817.patch- Security fix: [bsc#1213487, CVE-2023-3446] * Fix DH_check() excessive time with over sized modulus. * The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ("p" parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. A new limit has been added to DH_check of 32,768 bits. Supplying a key/parameters with a modulus over this size will simply cause DH_check() to fail. * Add openssl-CVE-2023-3446.patch openssl-CVE-2023-3446-test.patch- Security fix: [bsc#1213383, CVE-2023-2975] * AES-SIV implementation ignores empty associated data entries * Add openssl-CVE-2023-2975.patch- Improve cross-package provides/conflicts [boo#1210313] * Add Provides/Conflicts: ssl-devel * Remove explicit conflicts with other devel-libraries * Remove Provides: openssl(cli) - it's managed by meta package- Update to 3.1.1: * Restrict the size of OBJECT IDENTIFIERs that OBJ_obj2txt will translate (CVE-2023-2650, bsc#1211430) * Multiple algorithm implementation fixes for ARM BE platforms. * Added a -pedantic option to fipsinstall that adjusts the various settings to ensure strict FIPS compliance rather than backwards compatibility. * Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms which happens if the buffer size is 4 mod 5 in 16 byte AES blocks. This can trigger a crash of an application using AES-XTS decryption if the memory just after the buffer being decrypted is not mapped. Thanks to Anton Romanov (Amazon) for discovering the issue. (CVE-2023-1255, bsc#1210714) * Add FIPS provider configuration option to disallow the use of truncated digests with Hash and HMAC DRBGs (q.v. FIPS 140-3 IG D.R.). The option '-no_drbg_truncated_digests' can optionally be supplied to 'openssl fipsinstall'. * Corrected documentation of X509_VERIFY_PARAM_add0_policy() to mention that it does not enable policy checking. Thanks to David Benjamin for discovering this issue. (CVE-2023-0466, bsc#1209873) * Fixed an issue where invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. (CVE-2023-0465, bsc#1209878) * Limited the number of nodes created in a policy tree to mitigate against CVE-2023-0464. The default limit is set to 1000 nodes, which should be sufficient for most installations. If required, the limit can be adjusted by setting the OPENSSL_POLICY_TREE_NODES_MAX build time define to a desired maximum number of nodes or zero to allow unlimited growth. (CVE-2023-0464, bsc#1209624) * Update openssl.keyring with key A21F AB74 B008 8AA3 6115 2586 B8EF 1A6B A9DA 2D5C (Tomas Mraz) * Rebased patches: - openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch - openssl-Add_support_for_Windows_CA_certificate_store.patch * Removed patches: - openssl-CVE-2023-0464.patch - openssl-Fix-OBJ_nid2obj-regression.patch - openssl-CVE-2023-0465.patch - openssl-CVE-2023-0466.patch - openssl-CVE-2023-1255.patch - openssl-CVE-2023-2650.patch- FIPS: Merge libopenssl3-hmac package into the library [bsc#1185116]- Security Fix: [CVE-2023-1255, bsc#1210714] * Input buffer over-read in AES-XTS implementation on 64 bit ARM * Add openssl-CVE-2023-1255.patch - Security Fix: [CVE-2023-2650, bsc#1211430] * Possible DoS translating ASN.1 object identifiers * Add openssl-CVE-2023-2650.patch- Add support for Windows CA certificate store [bsc#1209430] https://github.com/openssl/openssl/pull/18070 * Add openssl-Add_support_for_Windows_CA_certificate_store.patch- Security Fix: [CVE-2023-0465, bsc#1209878] * Invalid certificate policies in leaf certificates are silently ignored * Add openssl-CVE-2023-0465.patch - Security Fix: [CVE-2023-0466, bsc#1209873] * Certificate policy check not enabled * Add openssl-CVE-2023-0466.patch- Fix regression in the OBJ_nid2obj() function: [bsc#1209430] * Upstream https://github.com/openssl/openssl/issues/20555 * Add openssl-Fix-OBJ_nid2obj-regression.patch- Fix compiler error "initializer element is not constant" on s390 * Add openssl-z16-s390x.patch- Security Fix: [CVE-2023-0464, bsc#1209624] * Excessive Resource Usage Verifying X.509 Policy Constraints * Add openssl-CVE-2023-0464.patch- Pass over with spec-cleaner- Update to 3.1.0: * Add FIPS provider configuration option to enforce the Extended Master Secret (EMS) check during the TLS1_PRF KDF. The option '-ems-check' can optionally be supplied to 'openssl fipsinstall'. * The FIPS provider includes a few non-approved algorithms for backward compatibility purposes and the "fips=yes" property query must be used for all algorithm fetches to ensure FIPS compliance. The algorithms that are included but not approved are Triple DES ECB, Triple DES CBC and EdDSA. * Added support for KMAC in KBKDF. * RNDR and RNDRRS support in provider functions to provide random number generation for Arm CPUs (aarch64). * s_client and s_server apps now explicitly say when the TLS version does not include the renegotiation mechanism. This avoids confusion between that scenario versus when the TLS version includes secure renegotiation but the peer lacks support for it. * AES-GCM enabled with AVX512 vAES and vPCLMULQDQ. * The various OBJ_* functions have been made thread safe. * Parallel dual-prime 1536/2048-bit modular exponentiation for AVX512_IFMA capable processors. * The functions OPENSSL_LH_stats, OPENSSL_LH_node_stats, OPENSSL_LH_node_usage_stats, OPENSSL_LH_stats_bio, OPENSSL_LH_node_stats_bio and OPENSSL_LH_node_usage_stats_bio are now marked deprecated from OpenSSL 3.1 onwards and can be disabled by defining OPENSSL_NO_DEPRECATED_3_1. The macro DEFINE_LHASH_OF is now deprecated in favour of the macro DEFINE_LHASH_OF_EX, which omits the corresponding type-specific function definitions for these functions regardless of whether OPENSSL_NO_DEPRECATED_3_1 is defined. Users of DEFINE_LHASH_OF may start receiving deprecation warnings for these functions regardless of whether they are using them. It is recommended that users transition to the new macro, DEFINE_LHASH_OF_EX. * When generating safe-prime DH parameters set the recommended private key length equivalent to minimum key lengths as in RFC 7919. * Change the default salt length for PKCS#1 RSASSA-PSS signatures to the maximum size that is smaller or equal to the digest length to comply with FIPS 186-4 section 5. This is implemented by a new option OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO_DIGEST_MAX ("auto-digestmax") for the rsa_pss_saltlen parameter, which is now the default. Signature verification is not affected by this change and continues to work as before. * Update openssl.keyring with key 8657 ABB2 60F0 56B1 E519 0839 D9C4 D26D 0E60 4491 (Matt Caswell)- Build AVX2 enabled hwcaps library for x86_64-v3- Update to version 3.0.8 in SLE15-SP5 [jsc#PED-544] * Fixed NULL dereference during PKCS7 data verification. A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. ([bsc#1207541, CVE-2023-0401]) PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data. * Fixed X.400 address type confusion in X.509 GeneralName. There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. ([bsc#1207533, CVE-2023-0286]) * Fixed NULL dereference validating DSA public key. An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack. The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3. ([bsc#1207540, CVE-2023-0217]) * Fixed Invalid pointer dereference in d2i_PKCS7 functions. An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data. ([bsc#1207539, CVE-2023-0216]) * Fixed Use-after-free following BIO_new_NDEF. The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. ([bsc#1207536, CVE-2023-0215]) * Fixed Double free after calling PEM_read_bio_ex. The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. ([bsc#1207538, CVE-2022-4450]) * Fixed Timing Oracle in RSA Decryption. A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. ([bsc#1207534, CVE-2022-4304]) * Fixed X.509 Name Constraints Read Buffer Overflow. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. The read buffer overrun might result in a crash which could lead to a denial of service attack. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. ([bsc#1207535, CVE-2022-4203]) * Fixed X.509 Policy Constraints Double Locking security issue. If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. ([CVE-2022-3996]) * Our provider implementations of `OSSL_FUNC_KEYMGMT_EXPORT` and `OSSL_FUNC_KEYMGMT_GET_PARAMS` for EC and SM2 keys now honor `OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT` as set (and default to `POINT_CONVERSION_UNCOMPRESSED`) when exporting `OSSL_PKEY_PARAM_PUB_KEY`, instead of unconditionally using `POINT_CONVERSION_COMPRESSED` as in previous 3.x releases. For symmetry, our implementation of `EVP_PKEY_ASN1_METHOD->export_to` for legacy EC and SM2 keys is also changed similarly to honor the equivalent conversion format flag as specified in the underlying `EC_KEY` object being exported to a provider, when this function is called through `EVP_PKEY_export()`. * Removed openssl-3-Fix-double-locking-problem.patch, contained in upstream. * Rebased openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch * Update openssl.keyring with key 7953 AC1F BC3D C8B3 B292 393E D5E9 E43F 7DF9 EE8C (Richard Levitte)- Relax the crypto-policies requirements for the regression tests- Set OpenSSL 3.0.7 as the default openssl [bsc#1205042] * Rename openssl-1.1.0-no-html.patch to openssl-no-html-docs.patch * Rebase openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch * Package a copy of the original default config file called openssl.cnf and name it as openssl-orig.cnf and warn the user if the files differ. * Add openssl-3-devel as conflicting with libopenssl-1_1-devel * Remove patches: - fix-config-in-tests.patch - openssl-use-versioned-config.patch- Create the openssl ca-certificates directory in case the ca-certificates package is not installed. This directory is required by the nodejs regression tests. [bsc#1207484]- Update openssl.keyring: pub rsa4096 2021-07-16 [SC] [expires: 2031-07-14] A21FAB74B0088AA361152586B8EF1A6BA9DA2D5C uid Tomáš Mráz uid Tomáš Mráz uid Tomáš Mráz - Update to version 3.0.7 in SLE15-SP5 [jsc#PED-544] - Remove patches (already present in 3.0.7): * openssl-3-CVE-2022-1343.patch * openssl-CVE-2022-0778.patch * openssl-CVE-2022-0778-tests.patch * openssl-CVE-2022-1292.patch * openssl-3-Fix-EC-ASM-flag-passing.patch * openssl-update_expired_certificates.patch * openssl-3-CVE-2022-3358.patch * openssl-3-Fix-SHA-SHAKE-and-KECCAK-ASM-flag-passing.patch * openssl-3-CVE-2022-3602_2.patch * openssl-3-CVE-2022-3602_1.patch * openssl-CVE-2022-2097.patch * openssl-3-CVE-2022-1434.patch * openssl-3-CVE-2022-1473.patch * openssl-3-Fix-file-operations-in-c_rehash.patch - Enable tests: test_req test_verify_store test_ca test_ssl_old- Fix X.509 Policy Constraints Double Locking [bsc#1206374, CVE-2022-3996] * Add patch: openssl-3-Fix-double-locking-problem.patch- Compute the hmac files for FIPS 140-3 integrity checking of the openssl shared libraries using the brp-50-generate-fips-hmac script. Also computed for the 32bit package.- Temporary disable tests test_ssl_new and test_sslapi because they are failing in openSUSE_Tumbleweed- Update to 3.0.7: [bsc#1204714, CVE-2022-3602,CVE-2022-3786] * Fixed two buffer overflows in punycode decoding functions. A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. An attacker can craft a malicious email address to overflow an arbitrary number of bytes containing the `.` character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). ([CVE-2022-3786]) An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution depending on stack layout for any given platform/compiler. ([CVE-2022-3602]) * Removed all references to invalid OSSL_PKEY_PARAM_RSA names for CRT parameters in OpenSSL code. Applications should not use the names OSSL_PKEY_PARAM_RSA_FACTOR, OSSL_PKEY_PARAM_RSA_EXPONENT and OSSL_PKEY_PARAM_RSA_COEFFICIENT. Use the numbered names such as OSSL_PKEY_PARAM_RSA_FACTOR1 instead. Using these invalid names may cause algorithms to use slower methods that ignore the CRT parameters. * Fixed a regression introduced in 3.0.6 version raising errors on some stack operations. * Fixed a regression introduced in 3.0.6 version not refreshing the certificate data to be signed before signing the certificate. * Added RIPEMD160 to the default provider. * Ensured that the key share group sent or accepted for the key exchange is allowed for the protocol version.- Update to 3.0.6: [bsc#1204226, CVE-2022-3358] * OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in order to implement custom ciphers. * OpenSSL versions 3.0.0 to 3.0.5 incorrectly handle legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialisation functions). Instead of using the custom cipher directly it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used in this way the OpenSSL encryption/decryption initialisation function will match the NULL cipher as being equivalent and will fetch this from the available providers. This will succeed if the default provider has been loaded (or if a third party provider has been loaded that offers this cipher). Using the NULL cipher means that the plaintext is emitted as the ciphertext. * Applications are only affected by this issue if they call EVP_CIPHER_meth_new() using NID_undef and subsequently use it in a call to an encryption/decryption initialisation function. Applications that only use SSL/TLS are not impacted by this issue. ([CVE-2022-3358]) * Fix LLVM vs Apple LLVM version numbering confusion that caused build failures on MacOS 10.11 * Fixed the linux-mips64 Configure target which was missing the SIXTY_FOUR_BIT bn_ops flag. This was causing heap corruption on that platform. * Fix handling of a ticket key callback that returns 0 in TLSv1.3 to not send a ticket * Correctly handle a retransmitted ClientHello in DTLS * Fixed detection of ktls support in cross-compile environment on Linux * Fixed some regressions and test failures when running the 3.0.0 FIPS provider against 3.0.x * Fixed SSL_pending() and SSL_has_pending() with DTLS which were failing to report correct results in some cases * Fix UWP builds by defining VirtualLock * For known safe primes use the minimum key length according to RFC 7919. Longer private key sizes unnecessarily raise the cycles needed to compute the shared secret without any increase of the real security. This fixes a regression from 1.1.1 where these shorter keys were generated for the known safe primes. * Added the loongarch64 target * Fixed EC ASM flag passing. Flags for ASM implementations of EC curves were only passed to the FIPS provider and not to the default or legacy provider. * Fixed reported performance degradation on aarch64. Restored the implementation prior to commit 2621751 ("aes/asm/aesv8-armx.pl: avoid 32-bit lane assignment in CTR mode") for 64bit targets only, since it is reportedly 2-17% slower and the silicon errata only affects 32bit targets. The new algorithm is still used for 32 bit targets. * Added a missing header for memcmp that caused compilation failure on some platforms- Do not make libopenssl3-32bit obsolete libopenssl1_1-32bit. They are independent libraries and can be installed simultaneously.- Update to 3.0.5: * The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue. [bsc#1201148, CVE-2022-2274] * AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation would not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. [bsc#1201099, CVE-2022-2097] - Rebase patches: * openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch- Update to 3.0.4: [bsc#1199166, bsc#1200550, CVE-2022-1292, CVE-2022-2068] * In addition to the c_rehash shell command injection identified in CVE-2022-1292, further bugs where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection have been fixed. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. * Case insensitive string comparison no longer uses locales. It has instead been directly implemented.- Update to 3.0.3: * Case insensitive string comparison is reimplemented via new locale-agnostic comparison functions OPENSSL_str[n]casecmp always using the POSIX locale for comparison. The previous implementation had problems when the Turkish locale was used. * Fixed a bug in the c_rehash script which was not properly sanitising shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. [bsc#1199166, CVE-2022-1292] * Fixed a bug in the function 'OCSP_basic_verify' that verifies the signer certificate on an OCSP response. The bug caused the function in the case where the (non-default) flag OCSP_NOCHECKS is used to return a postivie response (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of 'OCSP_basic_verify' will not use the OCSP_NOCHECKS flag. In this case the 'OCSP_basic_verify' function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. [bsc#1199167, CVE-2022-1343] * Fixed a bug where the RC4-MD5 ciphersuite incorrectly used the AAD data as the MAC key. This made the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being sent from one endpoint to an OpenSSL 3.0 recipient such that the modified data would still pass the MAC integrity check. Note that data sent from an OpenSSL 3.0 endpoint to a non-OpenSSL 3.0 endpoint will always be rejected by the recipient and the connection will fail at that point. Many application protocols require data to be sent from the client to the server first. Therefore, in such a case, only an OpenSSL 3.0 server would be impacted when talking to a non-OpenSSL 3.0 client. [bsc#1199168, CVE-2022-1434] * Fix a bug in the OPENSSL_LH_flush() function that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service. Also traversing the empty hash table entries will take increasingly more time. Typically such long lived processes might be TLS clients or TLS servers configured to accept client certificate authentication. [bsc#1199169, CVE-2022-1473] * The functions 'OPENSSL_LH_stats' and 'OPENSSL_LH_stats_bio' now only report the 'num_items', 'num_nodes' and 'num_alloc_nodes' statistics. All other statistics are no longer supported. For compatibility, these statistics are still listed in the output but are now always reported as zero.- Added openssl-update_expired_certificates.patch * Openssl failed tests because of expired certificates. * bsc#1185637- Enable zlib compression support [bsc#1195149]- Add crypto-policies support. * Fix some tests that couldn't find the openssl3.cnf location * Rebase patch: openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch- Update to 3.0.2: [bsc#1196877, CVE-2022-0778] * Security fix [CVE-2022-0778]: Infinite loop for non-prime moduli in BN_mod_sqrt() reachable when parsing certificates. * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489) to the list of ciphersuites providing Perfect Forward Secrecy as required by SECLEVEL >= 3. * Made the AES constant time code for no-asm configurations optional due to the resulting 95% performance degradation. The AES constant time code can be enabled, for no assembly builds, with: ./config no-asm -DOPENSSL_AES_CONST_TIME * Fixed PEM_write_bio_PKCS8PrivateKey() to make it possible to use empty passphrase strings. * The negative return value handling of the certificate verification callback was reverted. The replacement is to set the verification retry state with the SSL_set_retry_verify() function. * Rebase openssl-use-versioned-config.patch- Keep CA_default and tsa_config1 default paths in openssl3.cnf - Rebase patches: * openssl-Override-default-paths-for-the-CA-directory-tree.patch * openssl-use-versioned-config.patch- Fix conflict with openssl and libressl- Remove /etc/pki/CA from the [jsc#SLE-17856, jsc#SLE-19044] openssl-Override-default-paths-for-the-CA-directory-tree.patch - Remove unused patches- Ship openssl-3 as binary names [jsc#SLE-17856, jsc#SLE-19044] - Use openssl3.cnf * openssl-use-versioned-config.patch * fix-config-in-tests.patch - Support crypto policies * openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch * openssl-Override-default-paths-for-the-CA-directory-tree.patch - Remove obsolets, not ready to force an upgrade yet- Update to 3.0.1: [bsc#1193740, CVE-2021-4044] * RNDR and RNDRRS support in provider functions to provide random number generation for Arm CPUs (aarch64). * s_client and s_server apps now explicitly say when the TLS version does not include the renegotiation mechanism. This avoids confusion between that scenario versus when the TLS version includes secure renegotiation but the peer lacks support for it. * The default SSL/TLS security level has been changed from 1 to 2. RSA, DSA and DH keys of 1024 bits and above and less than 2048 bits and ECC keys of 160 bits and above and less than 224 bits were previously accepted by default but are now no longer allowed. By default TLS compression was already disabled in previous OpenSSL versions. At security level 2 it cannot be enabled. * The SSL_CTX_set_cipher_list family functions now accept ciphers using their IANA standard names. * The PVK key derivation function has been moved from b2i_PVK_bio_ex() into the legacy crypto provider as an EVP_KDF. Applications requiring this KDF will need to load the legacy crypto provider. * The various OBJ_* functions have been made thread safe. * CCM8 cipher suites in TLS have been downgraded to security level zero because they use a short authentication tag which lowers their strength. * Subject or issuer names in X.509 objects are now displayed as UTF-8 strings by default. * Parallel dual-prime 1536/2048-bit modular exponentiation for AVX512_IFMA capable processors.- Update to 3.0.0 * The full list of changes since version 1.1.1 can be found in: https://github.com/openssl/openssl/blob/master/CHANGES.md#openssl-30 * OpenSSL 3.0 wiki: https://wiki.openssl.org/index.php/OpenSSL_3.0 * The Migration guide: https://github.com/openssl/openssl/blob/master/doc/man7/migration_guide.pod- Update to 3.0.0 Beta 2 * The ERR_GET_FUNC() function was removed. With the loss of meaningful function codes, this function can only cause problems for calling applications. * While a callback function set via 'SSL_CTX_set_cert_verify_callback()' is not allowed to return a value > 1, this is no more taken as failure. * Deprecated the obsolete X9.31 RSA key generation related functions BN_X931_generate_Xpq(), BN_X931_derive_prime_ex(), and BN_X931_generate_prime_ex(). - Remove openssl-ppc64-fix-build.patch fixed upstream- Update to 3.0.0 Beta 1 * Add a configurable flag to output date formats as ISO 8601. Does not change the default date format. * Version of MSVC earlier than 1300 could get link warnings, which could be suppressed if the undocumented -DI_CAN_LIVE_WITH_LNK4049 was set. Support for this flag has been removed. * Rework and make DEBUG macros consistent. Remove unused - DCONF_DEBUG, -DBN_CTX_DEBUG, and REF_PRINT. Add a new tracing category and use it for printing reference counts. Rename - DDEBUG_UNUSED to -DUNUSED_RESULT_DEBUG. Fix BN_DEBUG_RAND so it compiles and, when set, force DEBUG_RAND to be set also. Rename engine_debug_ref to be ENGINE_REF_PRINT also for consistency. * The public definitions of conf_method_st and conf_st have been deprecated. They will be made opaque in a future release. * Many functions in the EVP_ namespace that are getters of values from implementations or contexts were renamed to include get or get0 in their names. Old names are provided as macro aliases for compatibility and are not deprecated. * PKCS#5 PBKDF1 key derivation has been moved from PKCS5_PBE_keyivgen() into the legacy crypto provider as an EVP_KDF. Applications requiring this KDF will need to load the legacy crypto provider. This includes these PBE algorithms which use this KDF: - NID_pbeWithMD2AndDES_CBC - NID_pbeWithMD5AndDES_CBC - NID_pbeWithSHA1AndRC2_CBC - NID_pbeWithMD2AndRC2_CBC - NID_pbeWithMD5AndRC2_CBC - NID_pbeWithSHA1AndDES_CBC * Deprecated obsolete BIO_set_callback(), BIO_get_callback(), and BIO_debug_callback() functions. - Fix build on ppc and ppc64 * Add openssl-ppc64-fix-build.patch * See https://github.com/openssl/openssl/issues/15923- Update to 3.0.0 Alpha 17 * Added migration guide to man7 * Implemented support for fully "pluggable" TLSv1.3 groups * Added convenience functions for generating asymmetric key pairs. * Added a proper HTTP client supporting GET with optional redirection, POST, arbitrary request and response content types, TLS, persistent connections, connections via HTTP(s) proxies, connections and exchange via user-defined BIOs (allowing implicit connections), and timeout checks.- Update to 3.0.0. Alpha 16 * Mark pop/clear error stack in der2key_decode_p8- Update to 3.0.0 Alpha 15 * The default manual page suffix ($MANSUFFIX) has been changed to "ossl" * Added support for Kernel TLS (KTLS). In order to use KTLS, support for it must be compiled in using the "enable-ktls" compile time option. It must also be enabled at run time using the SSL_OP_ENABLE_KTLS option. * The error return values from some control calls (ctrl) have changed. One significant change is that controls which used to return -2 for invalid inputs, now return -1 indicating a generic error condition instead. * Removed EVP_PKEY_set_alias_type(). * All of these low level RSA functions have been deprecated without replacement: RSA_blinding_off, RSA_blinding_on, RSA_clear_flags, RSA_get_version, RSAPrivateKey_dup, RSAPublicKey_dup, RSA_set_flags, RSA_setup_blinding and RSA_test_flags. * All of these RSA flags have been deprecated without replacement: RSA_FLAG_BLINDING, RSA_FLAG_CACHE_PRIVATE, RSA_FLAG_CACHE_PUBLIC, RSA_FLAG_EXT_PKEY, RSA_FLAG_NO_BLINDING, RSA_FLAG_THREAD_SAFE and RSA_METHOD_FLAG_NO_CHECK. * These low level DH functions have been deprecated without replacement: DH_clear_flags, DH_get_1024_160, DH_get_2048_224, DH_get_2048_256, DH_set_flags and DH_test_flags. The DH_FLAG_CACHE_MONT_P flag has been deprecated without replacement. The DH_FLAG_TYPE_DH and DH_FLAG_TYPE_DHX have been deprecated. Use EVP_PKEY_is_a() to determine the type of a key. There is no replacement for setting these flags. * These low level DSA functions have been deprecated without replacement: DSA_clear_flags, DSA_dup_DH, DSAparams_dup, DSA_set_flags and DSA_test_flags. * The DSA_FLAG_CACHE_MONT_P flag has been deprecated without replacement. * Reworked the treatment of EC EVP_PKEYs with the SM2 curve to automatically become EVP_PKEY_SM2 rather than EVP_PKEY_EC. This is a breaking change from previous OpenSSL versions. Unlike in previous OpenSSL versions, this means that applications must not call 'EVP_PKEY_set_alias_type(pkey, EVP_PKEY_SM2)' to get SM2 computations. The 'EVP_PKEY_set_alias_type' function has now been removed. * Parameter and key generation is also reworked to make it possible to generate EVP_PKEY_SM2 parameters and keys. Applications must now generate SM2 keys directly and must not create an EVP_PKEY_EC key first.- Update to 3.0.0 Alpha 14 * A public key check is now performed during EVP_PKEY_derive_set_peer(). Previously DH was internally doing this during EVP_PKEY_derive(). * The EVP_PKEY_CTRL_PKCS7_ENCRYPT, EVP_PKEY_CTRL_PKCS7_DECRYPT, EVP_PKEY_CTRL_PKCS7_SIGN, EVP_PKEY_CTRL_CMS_ENCRYPT, EVP_PKEY_CTRL_CMS_DECRYPT, and EVP_PKEY_CTRL_CMS_SIGN control operations are deprecated. They are not invoked by the OpenSSL library anymore and are replaced by direct checks of the key operation against the key type when the operation is initialized. * The EVP_PKEY_public_check() and EVP_PKEY_param_check() functions now work for more key types including RSA, DSA, ED25519, X25519, ED448 and X448. Previously (in 1.1.1) they would return -2. For key types that do not have parameters then EVP_PKEY_param_check() will always return 1. * The output from numerous "printing" functions such as X509_signature_print(), X509_print_ex(), X509_CRL_print_ex(), and other similar functions has been amended such that there may be cosmetic differences between the output observed in 1.1.1 and 3.0. This also applies to the "-text" output from the x509 and crl applications. * Improved adherence to Enhanced Security Services (ESS, RFC 2634 and RFC 5035) for the TSP and CMS Advanced Electronic Signatures (CAdES) implementations. As required by RFC 5035 check both ESSCertID and ESSCertIDv2 if both present. Correct the semantics of checking the validation chain in case ESSCertID{,v2} contains more than one certificate identifier: This means that all certificates referenced there MUST be part of the validation chain. * Parallel dual-prime 1024-bit modular exponentiation for AVX512_IFMA capable processors. * Added the AuthEnvelopedData content type structure (RFC 5083) with AES-GCM parameter (RFC 5084) for the Cryptographic Message Syntax (CMS). Its purpose is to support encryption and decryption of a digital envelope that is both authenticated and encrypted using AES GCM mode.- Update to 3.0.0 Alpha 13 * A public key check is now performed during EVP_PKEY_derive_set_peer(). Previously DH was internally doing this during EVP_PKEY_derive(). To disable this check use EVP_PKEY_derive_set_peer_ex(dh, peer, 0). This may mean that an error can occur in EVP_PKEY_derive_set_peer() rather than during EVP_PKEY_derive(). * The EVP_PKEY_CTRL_PKCS7_ENCRYPT, EVP_PKEY_CTRL_PKCS7_DECRYPT, EVP_PKEY_CTRL_PKCS7_SIGN, EVP_PKEY_CTRL_CMS_ENCRYPT, EVP_PKEY_CTRL_CMS_DECRYPT, and EVP_PKEY_CTRL_CMS_SIGN control operations are deprecated. They are not invoked by the OpenSSL library anymore and are replaced by direct checks of the key operation against the key type when the operation is initialized. * The EVP_PKEY_public_check() and EVP_PKEY_param_check() functions now work for more key types including RSA, DSA, ED25519, X25519, ED448 and X448. Previously (in 1.1.1) they would return -2. For key types that do not have parameters then EVP_PKEY_param_check() will always return 1. * The output from numerous "printing" functions such as X509_signature_print(), X509_print_ex(), X509_CRL_print_ex(), and other similar functions has been amended such that there may be cosmetic differences between the output observed in 1.1.1 and 3.0. This also applies to the "-text" output from the x509 and crl applications. * Improved adherence to Enhanced Security Services (ESS, RFC 2634 and RFC 5035) for the TSP and CMS Advanced Electronic Signatures (CAdES) implementations. As required by RFC 5035 check both ESSCertID and ESSCertIDv2 if both present. Correct the semantics of checking the validation chain in case ESSCertID{,v2} contains more than one certificate identifier: This means that all certificates referenced there MUST be part of the validation chain. * Parallel dual-prime 1024-bit modular exponentiation for AVX512_IFMA capable processors. * Added the AuthEnvelopedData content type structure (RFC 5083) with AES-GCM parameter (RFC 5084) for the Cryptographic Message Syntax (CMS). Its purpose is to support encryption and decryption of a digital envelope that is both authenticated and encrypted using AES GCM mode.- Update to 3.0.0 Alpha 12 * The SRP APIs have been deprecated. The old APIs do not work via providers, and there is no EVP interface to them. Unfortunately there is no replacement for these APIs at this time. * Add a compile time option to prevent the caching of provider fetched algorithms. This is enabled by including the no-cached-fetch option at configuration time. * Combining the Configure options no-ec and no-dh no longer disables TLSv1.3. Typically if OpenSSL has no EC or DH algorithms then it cannot support connections with TLSv1.3. However OpenSSL now supports "pluggable" groups through providers. * The undocumented function X509_certificate_type() has been deprecated; applications can use X509_get0_pubkey() and X509_get0_signature() to get the same information. * Deprecated the obsolete BN_pseudo_rand() and BN_pseudo_rand_range() functions. They are identical to BN_rand() and BN_rand_range() respectively. * The default key generation method for the regular 2-prime RSA keys was changed to the FIPS 186-4 B.3.6 method (Generation of Probable Primes with Conditions Based on Auxiliary Probable Primes). This method is slower than the original method. * Deprecated the BN_is_prime_ex() and BN_is_prime_fasttest_ex() functions. They are replaced with the BN_check_prime() function that avoids possible misuse and always uses at least 64 rounds of the Miller-Rabin primality test. * Deprecated EVP_MD_CTX_set_update_fn() and EVP_MD_CTX_update_fn() as they are not useful with non-deprecated functions.- Update to 3.0.0 Alpha 11 * Deprecated the obsolete X9.31 RSA key generation related functions BN_X931_generate_Xpq(), BN_X931_derive_prime_ex(), and BN_X931_generate_prime_ex(). * Deprecated the type OCSP_REQ_CTX and the functions OCSP_REQ_CTX_*(). These were used to collect all necessary data to form a HTTP request, and to perform the HTTP transfer with that request. With OpenSSL 3.0, the type is OSSL_HTTP_REQ_CTX, and the deprecated functions are replaced with OSSL_HTTP_REQ_CTX_*(). * Validation of SM2 keys has been separated from the validation of regular EC keys, allowing to improve the SM2 validation process to reject loaded private keys that are not conforming to the SM2 ISO standard. In particular, a private scalar 'k' outside the range '1 <= k < n-1' is now correctly rejected. * Behavior of the 'pkey' app is changed, when using the '-check' or '-pubcheck' switches: a validation failure triggers an early exit, returning a failure exit status to the parent process. * Changed behavior of SSL_CTX_set_ciphersuites() and SSL_set_ciphersuites() to ignore unknown ciphers. * All of the low level EC_KEY functions have been deprecated. * Functions that read and write EC_KEY objects and that assign or obtain EC_KEY objects from an EVP_PKEY are also deprecated. * Added the '-copy_extensions' option to the 'x509' command for use with '-req' and '-x509toreq'. When given with the 'copy' or 'copyall' argument, all extensions in the request are copied to the certificate or vice versa. * Added the '-copy_extensions' option to the 'req' command for use with '-x509'. When given with the 'copy' or 'copyall' argument, all extensions in the certification request are copied to the certificate. * The 'x509', 'req', and 'ca' commands now make sure that X.509v3 certificates they generate are by default RFC 5280 compliant in the following sense: There is a subjectKeyIdentifier extension with a hash value of the public key and for not self-signed certs there is an authorityKeyIdentifier extension with a keyIdentifier field or issuer information identifying the signing key. This is done unless some configuration overrides the new default behavior, such as 'subjectKeyIdentifier = none' and 'authorityKeyIdentifier = none'.- Update to 3.0.0 Alpha 10 (CVE-2020-1971) * See full changelog: www.openssl.org/news/changelog.html * Fixed NULL pointer deref in the GENERAL_NAME_cmp function This function could crash if both GENERAL_NAMEs contain an EDIPARTYNAME. If an attacker can control both items being compared then this could lead to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) * The -cipher-commands and -digest-commands options of the command line utility list has been deprecated. Instead use the -cipher-algorithms and -digest-algorithms options. * Additionally functions that read and write DH objects such as d2i_DHparams, i2d_DHparams, PEM_read_DHparam, PEM_write_DHparams and other similar functions have also been deprecated. Applications should instead use the OSSL_DECODER and OSSL_ENCODER APIs to read and write DH files.- Update to 3.0.0 Alpha 9 * See also https://www.openssl.org/news/changelog.html * Deprecated all the libcrypto and libssl error string loading functions. Calling these functions is not necessary since OpenSSL 1.1.0, as OpenSSL now loads error strings automatically. * The functions SSL_CTX_set_tmp_dh_callback and SSL_set_tmp_dh_callback, as well as the macros SSL_CTX_set_tmp_dh() and SSL_set_tmp_dh() have been deprecated. These are used to set the Diffie-Hellman (DH) parameters that are to be used by servers requiring ephemeral DH keys. Instead applications should consider using the built-in DH parameters that are available by calling SSL_CTX_set_dh_auto() or SSL_set_dh_auto(). * The -crypt option to the passwd command line tool has been removed. * The -C option to the x509, dhparam, dsaparam, and ecparam commands has been removed. * Added several checks to X509_verify_cert() according to requirements in RFC 5280 in case 'X509_V_FLAG_X509_STRICT' is set (which may be done by using the CLI option '-x509_strict'): - The basicConstraints of CA certificates must be marked critical. - CA certificates must explicitly include the keyUsage extension. - If a pathlenConstraint is given the key usage keyCertSign must be allowed. - The issuer name of any certificate must not be empty. - The subject name of CA certs, certs with keyUsage crlSign, and certs without subjectAlternativeName must not be empty. - If a subjectAlternativeName extension is given it must not be empty. - The signatureAlgorithm field and the cert signature must be consistent. - Any given authorityKeyIdentifier and any given subjectKeyIdentifier must not be marked critical. - The authorityKeyIdentifier must be given for X.509v3 certs unless they are self-signed. - The subjectKeyIdentifier must be given for all X.509v3 CA certs. * Certificate verification using X509_verify_cert() meanwhile rejects EC keys with explicit curve parameters (specifiedCurve) as required by RFC 5480.- Update to 3.0.0 Alpha 8 * Add support for AES Key Wrap inverse ciphers to the EVP layer. The algorithms are: "AES-128-WRAP-INV", "AES-192-WRAP-INV", "AES-256-WRAP-INV", "AES-128-WRAP-PAD-INV", "AES-192-WRAP-PAD-INV" and "AES-256-WRAP-PAD-INV". The inverse ciphers use AES decryption for wrapping, and AES encryption for unwrapping. * Deprecated EVP_PKEY_set1_tls_encodedpoint() and EVP_PKEY_get1_tls_encodedpoint(). These functions were previously used by libssl to set or get an encoded public key in/from an EVP_PKEY object. With OpenSSL 3.0 these are replaced by the more generic functions EVP_PKEY_set1_encoded_public_key() and EVP_PKEY_get1_encoded_public_key(). The old versions have been converted to deprecated macros that just call the new functions. * The security callback, which can be customised by application code, supports the security operation SSL_SECOP_TMP_DH. This is defined to take an EVP_PKEY in the "other" parameter. In most places this is what is passed. All these places occur server side. However there was one client side call of this security operation and it passed a DH object instead. This is incorrect according to the definition of SSL_SECOP_TMP_DH, and is inconsistent with all of the other locations. Therefore this client side call has been changed to pass an EVP_PKEY instead. * Added new option for 'openssl list', '-providers', which will display the list of loaded providers, their names, version and status. It optionally displays their gettable parameters. * Deprecated pthread fork support methods. These were unused so no replacement is required. OPENSSL_fork_prepare(), OPENSSL_fork_parent() and OPENSSL_fork_child(). - Remove openssl-AES_XTS.patch fixed upstream- Fix build on ppc* architectures * Fix tests failing: 30-test_acvp.t and 30-test_evp.t * https://github.com/openssl/openssl/pull/13133 - Add openssl-AES_XTS.patch for ppc64, ppc64le and aarch64- Re-enable test 81-test_cmp_cli.t fixed upstream- Update to 3.0.0 Alpha 7 * Add PKCS7_get_octet_string() and PKCS7_type_is_other() to the public interface. Their functionality remains unchanged. * Deprecated EVP_PKEY_set_alias_type(). This function was previously needed as a workaround to recognise SM2 keys. With OpenSSL 3.0, this key type is internally recognised so the workaround is no longer needed. * Deprecated EVP_PKEY_CTX_set_rsa_keygen_pubexp() & introduced EVP_PKEY_CTX_set1_rsa_keygen_pubexp(), which is now preferred. * Changed all "STACK" functions to be macros instead of inline functions. Macro parameters are still checked for type safety at compile time via helper inline functions. * Remove the RAND_DRBG API: The RAND_DRBG API did not fit well into the new provider concept as implemented by EVP_RAND and EVP_RAND_CTX. The main reason is that the RAND_DRBG API is a mixture of 'front end' and 'back end' API calls and some of its API calls are rather low-level. This holds in particular for the callback mechanism (RAND_DRBG_set_callbacks()). Adding a compatibility layer to continue supporting the RAND_DRBG API as a legacy API for a regular deprecation period turned out to come at the price of complicating the new provider API unnecessarily. Since the RAND_DRBG API exists only since version 1.1.1, it was decided by the OMC to drop it entirely. * Added the options '-crl_lastupdate' and '-crl_nextupdate' to 'openssl ca', allowing the 'lastUpdate' and 'nextUpdate' fields in the generated CRL to be set explicitly. * 'PKCS12_parse' now maintains the order of the parsed certificates when outputting them via '*ca' (rather than reversing it). - Update openssl-DEFAULT_SUSE_cipher.patch- Removed 0001-Fix-typo-for-SSL_get_peer_certificate.patch: contained in upstream. - Update to 3.0.0 Alpha 6 * Added util/check-format.pl for checking adherence to the coding guidelines. * Allow SSL_set1_host() and SSL_add1_host() to take IP literal addresses as well as actual hostnames. * The 'MinProtocol' and 'MaxProtocol' configuration commands now silently ignore TLS protocol version bounds when configuring DTLS-based contexts, and conversely, silently ignore DTLS protocol version bounds when configuring TLS-based contexts. The commands can be repeated to set bounds of both types. The same applies with the corresponding "min_protocol" and "max_protocol" command-line switches, in case some application uses both TLS and DTLS. SSL_CTX instances that are created for a fixed protocol version (e.g. TLSv1_server_method()) also silently ignore version bounds. Previously attempts to apply bounds to these protocol versions would result in an error. Now only the "version-flexible" SSL_CTX instances are subject to limits in configuration files in command-line options.- Fix linking when the deprecated SSL_get_per_certificate() is in use * https://github.com/openssl/openssl/pull/12468 * add 0001-Fix-typo-for-SSL_get_peer_certificate.patch- Update to 3.0.0 Alpha 5 * Deprecated the 'ENGINE' API. Engines should be replaced with providers going forward. * Reworked the recorded ERR codes to make better space for system errors. To distinguish them, the macro 'ERR_SYSTEM_ERROR()' indicates if the given code is a system error (true) or an OpenSSL error (false). * Reworked the test perl framework to better allow parallel testing. * Added ciphertext stealing algorithms AES-128-CBC-CTS, AES-192-CBC-CTS and AES-256-CBC-CTS to the providers. CS1, CS2 and CS3 variants are supported. * 'Configure' has been changed to figure out the configuration target if none is given on the command line. Consequently, the 'config' script is now only a mere wrapper. All documentation is changed to only mention 'Configure'. * Added a library context that applications as well as other libraries can use to form a separate context within which libcrypto operations are performed. - There are two ways this can be used: 1) Directly, by passing a library context to functions that take such an argument, such as 'EVP_CIPHER_fetch' and similar algorithm fetching functions. 2) Indirectly, by creating a new library context and then assigning it as the new default, with 'OPENSSL_CTX_set0_default'. - All public OpenSSL functions that take an 'OPENSSL_CTX' pointer, apart from the functions directly related to 'OPENSSL_CTX', accept NULL to indicate that the default library context should be used. - Library code that changes the default library context using 'OPENSSL_CTX_set0_default' should take care to restore it with a second call before returning to the caller. * The security strength of SHA1 and MD5 based signatures in TLS has been reduced. This results in SSL 3, TLS 1.0, TLS 1.1 and DTLS 1.0 no longer working at the default security level of 1 and instead requires security level 0. The security level can be changed either using the cipher string with @SECLEVEL, or calling SSL_CTX_set_security_level(). * The SSL option SSL_OP_CLEANSE_PLAINTEXT is introduced. If that option is set, openssl cleanses (zeroize) plaintext bytes from internal buffers after delivering them to the application. Note, the application is still responsible for cleansing other copies (e.g.: data received by SSL_read(3)). - Update openssl-ppc64-config.patch- Update to 3.0.0 Alpha 4 * general improvements to the built-in providers, the providers API and the internal plumbing and the provider-aware mechanisms for libssl * general improvements and fixes in the CLI apps * support for Automated Cryptographic Validation Protocol (ACVP) tests * fully pluggable TLS key exchange capability from providers * finalization of the Certificate Management Protocol (CMP) contribution, adding an impressive amount of tests for the new features * default to the newer SP800-56B compliant algorithm for RSA keygen * provider-rand: PRNG functionality backed by providers * refactored naming scheme for dispatched functions (#12222) * fixes for various issues * extended and improved test coverage * additions and improvements to the documentations - Fix license: Apache-2.0 - temporarily disable broken 81-test_cmp_cli.t test * https://github.com/openssl/openssl/issues/12324- Update to 3.0.0 Alpha 3 * general improvements to the built-in providers, the providers API and the internal plumbing and the provider-aware mechanisms for libssl; * general improvements and fixes in the CLI apps; * cleanup of the EC API: EC_METHOD became an internal-only concept, and functions using or returning EC_METHOD arguments have been deprecated; EC_POINT_make_affine() and EC_POINTs_make_affine() have been deprecated in favor of automatic internal handling of conversions when needed; EC_GROUP_precompute_mult(), EC_GROUP_have_precompute_mult(), and EC_KEY_precompute_mult() have been deprecated, as such precomputation data is now rarely used; EC_POINTs_mul() has been deprecated, as for cryptographic applications EC_POINT_mul() is enough. * the CMS API got support for CAdES-BES signature verification; * introduction of a new SSL_OP_IGNORE_UNEXPECTED_EOF option; * improvements to the RSA OAEP support; * FFDH support in the speed app; * CI: added external testing through the GOST engine; * fixes for various issues; * extended and improved test coverage; * additions and improvements to the documentations.- Use find -exec +. Replace 'pwd' by simply $PWD. - Drop Obsoletes on libopenssl1*. libopenssl3 has a new SONAME and does not conflict with anything previously.- Obsolete openssl 1.1 - Update baselibs.conf - Set man page permissions to 644- Update to 3.0.0 Alpha 2 * general improvements to the built-in providers, the providers API and the internal plumbing; * the removal of legacy API functions related to FIPS mode, replaced by new provider-based mechanisms; * the addition of a new cmp app for RFC 4210; * extended and improved test coverage; * improvements to the documentations; * fixes for various issues. - drop obsolete version.patch- Initial packaging 3.0.0 Alpha 1 * Major Release OpenSSL 3.0 is a major release and consequently any application that currently uses an older version of OpenSSL will at the very least need to be recompiled in order to work with the new version. It is the intention that the large majority of applications will work unchanged with OpenSSL 3.0 if those applications previously worked with OpenSSL 1.1.1. However this is not guaranteed and some changes may be required in some cases. * Providers and FIPS support Providers collect together and make available algorithm implementations. With OpenSSL 3.0 it is possible to specify, either programmatically or via a config file, which providers you want to use for any given application * Low Level APIs Use of the low level APIs have been deprecated. * Legacy Algorithms Some cryptographic algorithms that were available via the EVP APIs are now considered legacy and their use is strongly discouraged. These legacy EVP algorithms are still available in OpenSSL 3.0 but not by default. If you want to use them then you must load the legacy provider. * Engines and "METHOD" APIs The ENGINE API and any function that creates or modifies custom "METHODS" are being deprecated in OpenSSL 3.0 Authors and maintainers of external engines are strongly encouraged to refactor their code transforming engines into providers using the new Provider API and avoiding deprecated methods. * Versioning Scheme The OpenSSL versioning scheme has changed with the 3.0 release. The new versioning scheme has this format: MAJOR.MINOR.PATCH The patch level is indicated by the third number instead of a letter at the end of the release version number. A change in the second (MINOR) number indicates that new features may have been added. OpenSSL versions with the same major number are API and ABI compatible. If the major number changes then API and ABI compatibility is not guaranteed. * Other major new features Implementation of the Certificate Management Protocol (CMP, RFC 4210) also covering CRMF (RFC 4211) and HTTP transfer (RFC 6712). A proper HTTP(S) client in libcrypto supporting GET and POST, redirection, plain and ASN.1-encoded contents, proxies, and timeouts EVP_KDF APIs have been introduced for working with Key Derivation Functions EVP_MAC APIs have been introduced for working with MACs Support for Linux Kernel TLSh03-ch2c 17588267223.1.4-150600.5.39.13.1.4-150600.5.39.1fips.so/usr/lib64/ossl-modules/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:40863/SUSE_SLE-15-SP6_Update/752c08bcd1088ef99ed24fcb60d556f2-openssl-3.SUSE_SLE-15-SP6_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=4787594c8aacd689681cc292974728f04796f0b6, strippedRRRRRRRR7׋$(%utf-8d04dc348cd7d48347f436a9dd9c67938a636cceae9fd237ab9e42302f63f101d? 7zXZ !t/D2]"k%4"c42L#aA@s$z64aٯ܍#&X*WN۝$l~3 @(tb EM0RI)ӵ@OP Vnr+*(D 53Yd䖜Bw)tJih]pֳWpUtIKuV2kfxEXgi{PHij񊔠S0vjT J ZWogtGJđxT.&qtV~ ՔWy?&<6HPYSXdƾ0c|Exq-E|L:a{Uo"lפw"|]H72قncʴmZT(T^.vY4ŏZ$*GYB4 VڍJU$#d9N\-c]*\8G0s*wsE2/h2\˅{?UTG#>%u`,>Oa2]{\j '6GFԡF҄7m>4)%YkyPGj)(:m#YyG'H'uH:+/s}}g%lGmV0+XsʓbOQ}NC7&A#7Dp\ǔz慟zrk0x%eczA,aqT+x?oM{bRvhe,D9/Nk*DЊvBm&}B5kqeJ,6@*t4 H*CA{ ޷vl>Ʌ[V~Ob w=mrktJq7 8TEw}ixsYcƠ{Gnq>$ɣ:2.V[D` W*༉׈|;(ttܲE呣֮ jm: w@ n's?#O O6fSӠ-&2ygðgi/o]/G˰8Ձᮔ f5pP#΢JgN ףd,,zl [IjrT= OG 3CRoWꁷ):/  >l9;h$B4w$Z&b@L%YyS8C&->۶9 Ѕ{SwWk+6 ռ2Z Q@KTPǏxGUq=:@"A)kkنsIOʳ paL+gH|!$Í˞/8C=߽h5aХ6Ϩ8㽦22fgZ 蟏O$_qI7:}k|}(*f JJH$1v'т0U#]#7ij\4iKӥ1(CXă*rWϪzP ;AIyxZecgad/te۾N6&FJB_>sS޾q4i RmāwI)NTQGf bj+"ץD)>&*+/OIT|\5} <¿z0? Ņ.¡I:NMٯHgQU*&ϩJY$N.nE9+3LEoA`@4VYx(?EmJCAD՗M[fΙ,@Ѻ#F0`El$F0TȆ YT-Y4WM(:Xa$yi9SretfI`qso}90*Z৞bƾ[bOYL*GHO(K$sy{3 {&2P sYP=q<>$V-/&,T[@T8"hcP71El u&! u5@Uҕ$PŤ{UJHGA{<,y(BdF2R?^15d:ol`m! 4d3^ϿGYgTqn}9Bo3Ri? )E힗 %m8 CM2d1=ju~$aj;Lϸ=\hDKRGKv xVcEW~&&9BbMl-+ZODv;ijRWdv +E|p2Z0TB1kz );{ތujLgK70nc5ꃀ8 ^(>JEqFO+.?[^/ikݺ̞G2ROg~{=fQꔨQpsxȿ7jd=K9@ȿIml#Jxv0X |n5|N݂ ج%P^LI 9rXtTUHm$k?_&ݺC-8e|白N,٣"kFO(=1ʬ!s}itsU`#趓ŧqkx 4e2D֟a{ybqyD0h|55FQPp+)%B%iCl߾k%,@մBK.6}(sO^^݁ Lw߸>\;u,s;tꮳ=Y9-MO@H!a+U8\8jKAɱ;}%=mڞUɚ#07]T& BԱ$W@Rehh˭5,A0;&7N?OcG JPNpO'@v}ONdbW3O|Xhcіb(5~oҡD]H$yv=y!uЍ HlH+>!VQLSf B(cpocꉤוY o-ؾ8[[{4NgO֨PfRFɫ!O+bLp>cRE^R( HA/F]5H` Se뢰E=l:+/*-eWKɊVn̢2t ǡy"d b:|eKPUhx0}О}w2l pRtEdWcYk1 ذaUJ'*~)@#&*L?.9Kdd9u=;?aD/?9T kќSgGku9N>>85E}[,)qŝñ}GlQY6=p>IWa +qvxVDdfЋhn%e;ǀ@ h@tinN{f JWߢr٭ ;a*:%C* Ţr^vpC+[M3 *-\=gd"Ac/JDn&JKB6%`'1IHB iuPpkҌ'uQؘ~H3=Kpy)ygrs1g7xM9A.1s bw5\__cQ}>}> %{ Au/GgLT;;̋82G=N-j7yʙ%p>W\O*iqxoZt̏!F+ѻVy#b(ȸHfZ4JklWXMaYٽlqMh( 1_=V S->_`C h[ͫ_]BOXV v_8K񨍬I{C}" CM`l}vRJq0ct+l1W#$*QQQ9XYO,"e%jAyf,^mO5m[.uMs,,:1R-R# Šҫa?H7(NɽjY#S?J+PE\N<`\,E9@yzhݏ:^tjH |fCSt8A`ecm}c1|Fe94x gS+H)-yh#IEF# pY؏M@|e/VaՐ,Kve>G/P &IAfaxbͽQ/M~ց$B.H껌vUۤu<|UwK_^`w@g5"!GM+c;jUj 0/1__؊.EH9ke)s0k'L# 3ѵkda>7<ňt<vz2_9gsΊMu*}GU֢=H6,ﬦI.nӗ#:[>T52/A>XE5r<.'+*8#w7KHԑCb22~`R6#s`\š8Ǩ/V#$Ýw2]ŋRLa,oĠ\%z?J|`5H T6rv_TpXDK&Vl CVtj@D$"cQ[4PFKZʟڶ3ʪ|r|K<j2CN!Rw,)A 7?AWo.'}c Uu/Ÿ[}M?=&# ѻڎ{!,A5?ȍD=㯓p +:5&s)fygെ0h7b;OO2g\Gg.եWtHUtIЧ߰T[ EzjpiU)ޝ3xvV{8s8!"MB٣Bѹ&d#0@aq^b/xn.Wr K66>ukV}$u))] 3;} E烼i9t*76wp}JlX#'q{vJmpVk77*V" r\0!š3}@r IS2%VȳYNOQCQD`!΅Zb~3tP߲Hܹ 2{ikI+ӎɈ6dN=tcr{T^߸azuC(oO.}+Prʜq@PlS6[MY% ?⒰Ol74Pt"}Ԡv&` jpBD8,,^љf{t,fIFIbC[5\p<:R* 2lsf" !tk JrrXq!wJ\r3̑bj+X̖PLJVVIj%9X1-ߥµ`rMtI/ЋdX| Lx (aCJX~Gu"32ʆ[ƞe~2y1NP2e[ c$pM ᫨DAh 9TVU)s}J:.JѝN19J-8hDL5DH+Y"846`6ٴ|e&<~m6A?҆Un;ՉPT+G+aٷ\|NFHFbF5'[JޮƪD@mr>;u8-~9(G'sn '34^I|0y,ʎLaKQke{8`fs֯RK2QC`DW}_;r8`QY#{ kdb{S: 5K`/mHk*ގkBZ)]t;)p$pmҼÌUL S&ѳ,oʹ @9 ^tmll*v0۔S|t%=n8OB+q߽*"ϋ.<&E@*/:ܤ'ԏ gx¥ý }ISHRLiG R܉1@@C)Fi℠7F_> cǜ1"r|幘5o`ENоaC œÐ$~B*|'/N⼊N kͼíb<+J?3 yGy!w}1@%s0em5_&~SOtQ <$7}z׽>Dwl=Xeh[`޹໬уolˑCE% 3NR{MwNQ*" R.m =U羬mMAp J]M yǡ&BuVKk|CS!*MgK6NqsWtq2N-ps/c(\h{C|ɾ_>4- F.![TϚKCPC  S !$lzKlD¡2u&5U7x$&DBxԭV ,.wtsCO8b ZM$íjdL]=@w06@%c}ԒǑ̃u&F!U\ɇ%fAEV@( o&2_kb=l={ ;M1'Ķqv,Z*yeHEkQD=;F l'(63so4|O4߆W5 1"} BI[d,pCPoGxVPh0͈ ņScE0+h4O 6 QX/f.@#b@Z"Oe\j:JqW|3C1eOEԮtws SXqhlt)ۛ Q&i^*֟P HMET*\RrE[ Qu*8` " bURᤒX)_&֡GZRu)IZD2ň5f ߛ/g+JՏ‹J_<'刵}V1ך7%{]ay߾S`#~+~]=~6vWc ;y5HNG3jˋʸu>8yyW!e֭6*hv?:p3W \ysљibv&p,; xQ=bFAWc@Ʌ8lSD1#vA fmc5\(4a)ՃKtU_#pҁ2;"ޓZo/+ Ti^1JU>Vw,>|_P$ ܏RFdx/e| ݈Yzw=AB BI}ÅvB.wr0~~!coQ#M617)1E]bb&KYPAXT$ުa%`)7_K.1plT\2oM\R}m_ƎA?ɿ%VR7ki0JۢċF&?UO^rACÅ.ͨ|ΌFL)?^q|F&q$/cP( ROj{\0'K!+Q4I7 LQ;Iy٠YCN|ǀ㚑?S'IoZ_V[@?e-%RxIo&jC!$.DVt<,H4hت#@q0>mp)xu{ O&y/\Ä~L>ZZ~o,I5#v/,m#gusQf7#oHczjDVWOڵsao^vˇK9O@J@ssқU{c ӔI T[ߖ=3t"`Zji|mu+* ^I28ͽZirJ)' 룺^kq i|Tx6O9]& J`U9jhP*LĽG: ff;Ag;:͞ v)|PK %c`G"s)".0Ø${c UVYg$؛ʭ+iAr{UؙHBze=Ne>f d vR H:J}Hӑ:ąʞBȆ'ÓѤ JnU'uSYk&,aVե-}~Y)+QV?aǰ!2,,9V lxxqbj@#li~rc )}8(DgD^}ʆv6٩1Zb2h9nC'kHCo`=*?v%&gAϯ\ /(<qLB;>jD.2ToS VֳlC)XJ=f5$D \ t"1eV<6lA*v¡!2͐kHvT~2oRӠ߿T,kbGl V C0P=k=TAJ_< (Y(C'kx4t g]ABpPm*7<ȑ 6R ~a⿐\ح\RSUv3¨隧L*X ²au\ަ?I^ #fQ2ٕs N |D,w糁Fd11vX|}AЂ7NJGbQ!X6L7\oT DUR~ 9(y_jxuZJz6ia gК5-6uCP 2HU8W@`&uתU GӬyCV`!{D)! e䈁)>-Ouҽ;}8%F#(YPl+j۩3qvK#zeESLNYk}=gNu 31}KDUsQ2_SvLO88Ej#˟pF0aB)D0Mc؎L\ W~8f-]Ƹ3z yUAtꯍ>rh4$X(RMP^TFsdO'WNrZ} #|E].6{r*Z@kD|2~h48+CxI`tb-Q Y*^˺okSd: ńi!0t> -<=y{hEWRqF-f::tDKkѧk.k*۶w6 4f"%  ߷,O/#+ظs`?2(8Q%!5w%yo + o-sՃs5E静ai{JB/_LOJiDs}jE6jߑQnwiQ=rF Tg]ҪU l>Vm.ڕPoYՈN B0Cr0gVD>5 1y&njA0paSvV)YSg9VI 6c>("DܾN+x2p`A(VhRyZP'Pf-gdБ== N!^Y{zt@?*t)ZeHuXɗ}  ̬Ԏs<{ȥ{AHDRP %0P%# s޳Yc{it7bM:DPQV7D< H{kAyD'WzcWz$WX^NEϕSͯ)!R<7ZCv CnHVu눶l | 0΃/jтj@DqGOO`{<#6qi&z.8EwHGvW;X>s9onn.L%-e}Ni 薚1lB*;(Cj#C %=\]' 1@7+zd:*ǩ2'tKШ~~Zs꿜]I dB(FtW 2b8v,6 wTPOCxuĆIĒZץsD¦'DcË BVug뛾rpTax,֌΋$ U܀-LDL+S|gFgxM'!TtX8yv{wg zo?!_'oZ#-`YBl'u))3' w Bf()kz1? H g)ra[!<[1Q-c}qۧII˾2FQ 켼4- z V8%یN0'IN-&9 |MEh{`Ik9';{wZji)q3ٸ1NZG&'ɉ0:"]b/CYwҬ7HzQ׭W|.Njҵ^τϖ+<|D@wsU~!?apdX`uz=4U̴Tlf(OA/C(#Lg# [UwHVs)%ij7S4T.վ6*X:?> SJWHzRgأ\Fy~oDOV G~nSè2(*M07ICGNZtS#M!:DfBܨJh= +PeҳKM{c]C i#Zs̠mX.&0a[bo톧~\;p_ոJKpkOvtH͕W?Ҥ]˜q ?Tu 1{0Zk߶SD}ã֯eՌ:j&`GdeV}Ux`qMX"WD=yd:b Y /<ڸn0Ԥ!õ5V6ԛ. 9(ay*6QqaDD"dC3=#rѮR lUSy"eP B3KbBɕ?ِ3<߶fFbIĬ*/ GOŻp 4E˷6b@ R}1`bGj1*wO[W;&*RŐPNNDqvZvu^rZOQl>B^6]ɍbRS;/.`6;fcH-HІ*!zYD]>m>Eq} 1\^˥@ܝH{УS/0p{W ٰվ,? tFv3g7l읃 KUӞ ؜l О0]X v٥\w>mwͺx[7!Soۆm r(_){D!3/GWvos{zPjޥ #2=!\ kq!5,}`_L7,2U. Uv*q ^^pZOF{j*2|͵HeT0/Ou"Xهl?Dk1=U8Bi s;01l]_IyB /Cyu{?c'Ou*q7rU~]Aٟɗ h!2$! lv'SbPE"UHO it"/ʫ.th-"cFqF >2bs2ų?ɭn\:VGr$^Z3-J /= PrS%p$]Ql x78W3*!cu;Ckkx@{ >- oybɎTih nʔNb]ILώn&4*(@OYZ 1UcS !É۳᧡ >ё;7(+s#k[jÏI_=Ϧ{L?o =fU?.%6amc ='z6Y̫RYS,x!tN59G#(Jon#)jc*a~%xdo^yL֯{SnQ5 tm󹄮tG :х rV[mtODD@qKE%mD|$^n|~Bdz7.G;qd>\X@RxNVy?SѢl sƄ%6=}t Uݸ,bbsEQ;$ՔN;HGj94i,:y-ܧuG ӫ5ЬI,uwz-fYTc@ΣRfU>0֔6ʰ;*-EFf6QtȅNR;qVi5P1RDvwOo#8$=|>/ĈHQ H.Wln SR@> 9WF+BQ 걌A{2IpHϊWP3b(,&, `jBvV?Ԙ- afɋv^} l*P.a%ǛT~<%PliC| jj`Jұ]^ޒ$ ʋ"?&6:;,C^k)ԪA0SIށ6Oo]G^b >Cm5`h>^e|m?rbWi eoঽ Cr x2r4i趮NklC8 2nRHz-ZtF^= [=FbI_zץg-Rpr[ؙR A ˝+G4E4&F e$'H{1Pb`2ৡK@܁y{+T<()/#mlE]2NsWcykbEEm,=sM.Wݩ% 2qyQxT̩LNlRX^+?Jw ٟKe?/v;wec 7.gYMeBZVYc> yz ^Y9f.zcFlFkBN( i,2܄ \o\ҖNɨ?1*@dLɢTtnplQF>D7OcmMp+ Vsmo}p3+ [$%j4jvҫ9;*5q'.㲉[D4KoFF|R8ScyP3їs/g:{cj[lnQ?prsIa:GXCwLE^[rDz1彡۹#,M  BSDA{N#LhHR#=*rˑteGlNӴvIn%IFtዾIJ+>>%2JI1xҤ F:hrD3X b2H~9^^v[ʴ-f—sӵU!>,.}i'"M( YIԃzKB0!4/񢤭%Ǯmޓ-2 (5Ŋ03+LC+sw뢳9/BHc(22Lΐٌ'F&Ȼ7]6FB-|X՚'Ncյ5}@o\nJ"']zB HLUS-"efw-4 u},B#[g3E&%M+%Hb40/j ()by|=Pt(} D\Ҋ\tJ߆w2A W&4@Ǎĸb婨woVS)r}EE&w4v^SE%D$rR(&7^OMV쨗.~g'Ļ1 2<]GhbqD@^ǠW9g>hZET@SC/A]!bz^cۦI TVǫώYʖXhҫ-dd ^y>qՋĐnM ?D6a%vWCj5" Tqq|*εPW~xQܚkz{r֝EV!(`&~΁W˵/PEP@TT8|B aS~,I{YPC_) 5/ӎD4/od{cbWi0nnH̜:gE$CRRLGWq!xHs*Zn;?-zlp @O='Dw,{$V%znF/CE[jr֥Xumf*_RWNfn!RfZ&(K/I;Taxu>fc,p*[ŃpNg; @&8 ,v{?ӒA RKaDBcMD7* (|:}ӳUˑa5gb?|q5aI4/`x)g;(Lxkǜ=ۂYq"x!ꤳ:'u~,ͩjk-{Js1=% mSf{,?4 .3*E頯% ukK='!2n2&M#H @,tMtj3;huQgh<|DFl ƫɥD\ ' o!ωMnZR^ O;:rP~ GX#N9fЌM pqϪL<} cqĘbU-ҫC ^,wM py.0`],tATQ1:d:?JaNT/rA0"aGSaAG*x@`em q\w%:sJ|V:C# Gem tag a }I]#lߌU3]^AoNO@En:߲b97Mrw,#PWıeDN9+#Y8!vWDr=Sk#?x .|lſڄxEɘ@B;YT᢬xX6_G=$(f8SN]ģXD\u=*\6-&^& W‚rܼe>0o, qQ fПW񠥣e:EJ3o݉I˓DÑ-r@pZ֚/S0C;T=W =osb{yυGqb Dʣcr1rBV7턑zvNOZ[/X))}"cވ?x\Kh l?SFR]=H h{]bvyพ>FwM1+!׬:Baih/QS`wH?(q!W &*ʵ)~`H^0w{L!dE--T mn~{SdKp9{`zT3,ƒ@]5_Zz|"ˤjt{]޺H*IEvGs'qgHoh'J]6&wl`|yIkI,̮g$ {psҜ[Z (5%/r[Izg H.?ڰ(6§ĉ3-<\񀍾W}1–7QV->zA aOhQc*"a _hPC NS-xBnpQ}BNFÁWNOkͦdȼ;p#^+ oQL0W8{&.s|YTnRAͱ4%ٸ{%nB#Wt  mQ/""l2ī Fs@ڃޠV XOЂ@6sܜu;.5v@:T^+0Rq+ysMHi7zi!]h!&%16"yÿhq [0]ɕ <˞[8%4Xg(cω[Aۏ+n!CZ#N,hCO8#_Vi m׵˸t#g1;H=,l Y }~aqPk TGUK`agJ]}c}mmjpVLwlR5\#Kӏ:c lxdOxpD6!S0`D`whEk!XBms>:}!Z쾈qڼOf>Q'~ĬnHo~,&gҦz}\xC.'M-L3)*4joEI7X<tKtG(E}yz:ķ^X2nY[9LzEt/ -?`.:>ቷW`7O LĚ{RctڻRz{G┰boC)'l`>pAZjI 0wG]槰̒@Ϧ48(eff@E$s17pA\?bQ♓swl!oP|/W t:U[. c(=fNZѳ_=o{</P*.>9¹sU8hR)J04ay[`qQkvAe[Pˀ^ Vζ-uc'ȳ[Z9OO QoIéɷ3ESfN= m*ݷ2:URh{| qQ=vU-T=GrVVkֿHݓc:'еژhy-v c >s 0hۥX/`vEG]@jz! RlBwH zY1\:8%Ps~&[PĄf&PsɶZn 92`7z;?z%]] *,ngv ?a,S읶L${ؒ,?3qSDcRSFcY $p x@`n6r5+UΨ/U\iɸI"5*yO0r2C"@ UH_ 5K5IZηUWn10Y>Ce-Dzop7ԓ( 49{E%ot'Y(R/8w4q$/ek9)khvId)Sa&(SAK*cz?_6UTw(HgE=ÏZ-y]d/s[ /Ko}Մ~+:2wl↏NyFT6ՀPmCœ؇䌡[;M)IZ`ŠSI2O!!P+ό/ T1gF+Вb(pEb">hwj42JG28ծ B8 JGV^h֕,t̨a*9.M.{u r{;)3Ml-$ïu p`֡U\ʭ rP$ߣs\ k'cKUu˹ J~kf|}5<%bmgd# FZ9̩UؘChV gB'7|&M TIjhLwSn(YhnY: / _TLiW~RAsg;lAWtpW#ak޸%[yNy:>^zCL}pLg/_%ae7 9V|4W KizCw#2ÆPqQP!"z _JORy7faR?xZ[=v7"olp _{Ns+/R>#Qgo h+‚rwSD}E.w>۲+>( 8ܳ]¿k01^1rkv.X!$P"oƏ+[FS5 yez-P~u /מu=֬A׊d_ D!fUΜT5= j.kghzpʳ„4O撌a>J@XZ| B1TENg>*jMwٚA;;MfP~/D豩7Y0[vݑH 92›B!(;;{.&)&nRZ?iqH֖?nvN.oR58v(wOm78;_=lSz_p{%FF9?,cۙѺ'Uɓ*v*Gr\jpFT|ۜ0M񛘐H_|3|)休fT7i|欝0\Ww$Iʞ$5O*QD3Dʚ-ymA'ld6'=si/wA0|g,н˵5^@l%^rd=R7Ρ8p[ gzr<jK'#Fa (}alMQ~Oͫ<:[-Ttz&:DK L [߿J\wmCHl.Q&S( +4 ű5I!A)}4+si%5 +Wt{f(TWt¯b0{RH4CBDځ#r։QB=ßa5&~_ݶ$(5'ÚZS(-aX9W)}/Ԗ_({g솚Q{gMx$NNRhhHMN868;,# Gz2uwװZA_Yem1;Јh{%@?'QV :ޞ@8ßN Ű Ͽ_lj{Za6t>{l ޻]j_9V4hOޏ)J[wY^~qQ$Nr)2=!Jd2+?[$=Tz"칺]Q9Z39-̷E062y2[_ҁ~>xꍃv#pfwR), tgɪVu 3"19!lq Ge&\Ϸ怉?=-^'|̮)I&"љ ә^9ֶ߻9)B) i{Geh?xKtxͼ@.bK ŻT: h5KqlvӚ̐I͓sI95L`&*NH]7a!|QK15 aČoxB0䗺'@7LWX@4[f؞i6 g (ğE%Pji?zlAn4MW~]^vbS%਻m?ͮ ԭE5z-=FB<r+&:v!6_yrn9rT"̨ DӎzP`ѤCS _dʴ?pYZ2CY̟fQ<9`X< )NnҐ Ł8iӦ.R]ZmykiR8\[qGt ˸\y__%v }iwV!RދQ1TзUH< g=dJ}Ff5-k04\u5o^^Š'++$xpxC%@!#4Oɇ@fg8Ό%tzmee-a"ސjV $̯bh褨j܊i7 O21\^pNWg1QSYsagwm繱k>.WïQmQCm.;%l nO|b>K/Mxq Seǣ;u{J|4,M .mj[&Y0m[%ՙpH,HN%7[{Ȍmt9Wu$H:lw ()VJT!;lEqXl:~6@Q^U JIO7]ܸϢ2X"8iRɛD͢_Z [cG?@Hj>t)Œ@( _DGGߘОMٿANsʺ0YWBƏYW޽?;\kR:C.3czf; B!:"Ԗ(G-7'fơO0 9g̭3IH҉_ t%Q;O$ ^'5Iqom-#Kf &qVVYSWbuDXZb% lC!m'~$-_$pd-0*PmDmN1N #;9q"u Iab'NRǨ.I㳪ڤmbMReSZbލprQN{?D[3 Rv'Γ=`j>8g t"@S .lL0JqrTL^LG +$۫D4 iNjަyG;Ѓs Gh1q[dMG]ܡGbR4TmlIeE5[?BS# 443A.LC]{&{ߗmJ*z'>ٞOՓV N󻙀j,}(rTT+[3-#<`v$|znZn8S?+Fe$DR܅P fxp<"G5_ ߡ{H}RʧgsH,e/50%-pw ɅH5Dȉ(ኹ”얱`DC@ge6wAeV@@UƧvI$,?ytjP(;WSMϡLʼnk51Xsr޼r ZR$(Uyu:c>ʛ]qG70U}L6H᜸=~ׁyuqnlĽcP~zL50>̠XzS~Sr)_V(DN#|IuBzo~2{&'J;v!?UXq $n܇8a$Rk^c%ʔ=1gORWQVvk +7n+Lq4A>Dje %#qS_+@WB~悺GV C3^u{V«2EbCg&xe59TnbdL.3{jcQgr)a+oe$c@:A  8\L]ԙZ0L'F*uYdo81U@=JJx(*~ 5Eٕ]tRuf}zN~hyj" @E9=zWYr[' N&j(娀9Şpդ +ClI 8kklDyK8&Haja2ìۚY%N OX*ni5RTcjHeQNGIH/&laxڐǷ]U!@do8KkDBͼx6̮g<ݴ>;vW2L7)иExDQ& Z]sQw&6D6>04o^fFsEvs۷eya']W_MwGY"hqfħ<%e^}a۫P_޹JAx%tMJEX}2-ۘ-|R}EsI11뒞%B.~l|7sIv q%+ GS @Yq QYM8_eLsجI,ky.D(NXEDWXFV@7$*[D'[nD9: nꓘ)/(,uڠҶ|Еn%# XR m#{+οw@2X=ScGQc#Fhp?{4$8Rs:g098~IP>8& e,:聮=xC2r& 0?`2)Ub:1b[qoDC| 8"*-@o\ 4%t [5\c2 I`Ut)op,fb-Xg^7::x*%vz6Ø ԕ2!ʖH#qɀ$^Oz>Cq_4VH\U[n%"q{QT`׃ux7u`]UL|4̹oHسy9RK9JnE& @bYjɿ/NlI4º{|#}$a0iγ'0d・NsJ^[2Hit1_: o͓K`wg o)ҮCmiCZ⽠w.3dT?{g])pV&i"ϑ?ŋe_ ڳ,L}. fmq@^T\wʳogyE&s!W2 (AXY,0y莱ul9ɲ"A*K!ޔYB gG>(NN:ҨӏjK BBA-,7CV*y hGynop6mG;(ş6#O"(6xO9XlXRK7ۈBHk| >'wtw2['n?.US(6H^zVb_ 1.n.s,KN/X;?')<:F'ـ 3y5G$J&-$6XAnʲ GX,:Ayu kԢC꿫crcjD=& Iz$*C Ӈrkx>PA}7eĒg I 0:Q%ZJ&o nLis.-!7b21`U:us,p|`V@lDTQ>m~^M ϗ(TNjʔ=aG3'#ZZ>^wc&bh9[[>tCEs~&`3*s˯ҹ)ҍgP7с4bMK sf]+Hn˷oD˙qqb )- 2.7S_ȯȰfu0kaےEGY,`|<9!6X>h٨WY*kMtjj8O7Vbh]b:rpڏٟ "GxwVN>ФaEk1Ī͊u+=}jOD+J7Ǿfx:h1$JD(J4AP_7yF3!"|@OcbFI? +(etx¡=odcXVr>ZPJi !2Y}7h^g[ Pd55)Wd+/$LP#>3 9|1 r}q9z# 7 ŻBLj2c  е29@HO ovۨ9Gl=Hp *BڕqIQiITqhuUIxLB-to-A"ys7c3X C<#Mڹ,խDWoY }nok iJ뵗Omm)ɢ$8fC%|憩KHHlϕu~i Xqd(#T^YPx8PzyPOkAxI ǀg]k@: c7b_@Z `q4].lXqz!D?I0Q6°ͅӣȦjW^bQ1=U3 m &QTEd}WB%Ox,dT`. ϯI^/v|*{kG;}~z2&|iŽ< t)i\ȈEu$݂Bh,BWku_Q>Jz}1g#Z*Ce9J4v̛B%ȺT Ȟk_1~oĜcրU}hA2@@7LƺFbv,L쌌'k5_ `iɇ^[Y `%.;ۡi ^Ws*dO^ NJm@**北-Om ~FSmy }l$TajoۼmE)v؟r9,s\بbgچױ?hA<6zsXӒfRhV |ɽsN3VY6yY1;氹/`h~/# d3w6yG=)d.;+B;W싷yD!MB̔Tcjwll"ÒE7$Gِ@YV #6gHoelhxƅ?!V$#n֖IfOvGFC‡jb Bx""k-|XLCb>>\۸A Q $bR3=l Ƈ8݁"õV2i0Rد~]*-l%t-RG%;dY-UϞ(+M-:łO^Q:!lO=4yEeݛ™ŁF`I%Cyڨ:hT51N]I' U 9@t@~( ?^)U18^4oXKD1gh&S)\XyYdKeE2j⑽ /Ls` sHLՂ0>&C.76AaNR@7@fy!Ϩq!硅:N@qJC,`ϚXŀ|Uuh mBx1˝ `aNCCZ`Tvo}p/=\Vw pc{ʽT#`nbSlh#4޲a؞8F(sU +K6. lWSB2OhQ6u5B#S}mVڒqqHyz<@B2L㏮y&9!`d" [a_W^ _KTF^gԐ.NzüB|ts}҃oʼ%~H>DI\ujOssUݗht12gz8dZr5׹%1;q`=O}%Lc6 dnOy ~4ī?v,JO5ϻMn"g<'uȖ ]L^GzS/&sJIx{b+ybQ 3$! Badt,2o\OJ*Y'&ct8P VD>hNb[ @h0O+Qb{K4!\([UP#N;!* sC &.sLPL |Vv͙Z/:8CYشI?H50n$:y@Ozl+)-9#BFh*a#u† @6 Xt6;m^{T >}g)X"g'b$:ǢvFm0Z&լ^lxD;ȡx(=ި?;y5 Ca?qKX@*bzw`{J_ *}#~dX$5bvFm)Z;5u*_B*X.EU ZN y bQ|L9.oIQ '+z%R+U͔ p2-0UR|V# +da|c-ͫ"%sԿȥK4eTZz#kbvFEyG]G)4r[Vi|vYRk4LIx $Pzdm)눲2=RI-=;LO/ɧgz =Ad}Q!ɴ'0^3`蝯 #]r{pP%346;H[Un6m['Zi Ф-_3v1ݔ_8!|sžۂt4tS3Ց/OCuNݦ){&Zʅ-.~'@!b{4pn SX[ކ{Hz#0`K"Lg@ZXR*zNWVixfY@= _,˃dɖ15g V)J][=8(ܸԢFO=#8y@3w7Ag\9k5,MxB&v`]^6L;>w>zjp DC@I*q^&YɧO CS"RXPVn YΩNLDf4oV; |K" ytCza /puʬTlCǯoA2MÖqghPOA7zO}b)r $(D龐PkeZ%'2ۀ"{#!(4jc@HA# Vp|U#͛?)4u+»j11/L;"[!G "C9ifN|K6v)iY3 :uJ,9u8Ƈ-FƼK. g;2 RL~V~:o9I! rQEϚDӆ\ؚ:@sL)A4;=X8d^*L7ghtnGD|Fb +w# @ :;_&HMrDes=dh@-a]FbF+g_) CO9ꎍy0[@ÉNLR&j;Wm~8)z.Vj`oVTp֧8z01=+!҃AzL+dВeLo5TY)-=G=ɏZ|HB|}K]$h:o,Pk<qՂw8׵.)䀀H"~f3fVutjMahGS Y:._^Eh) L\3 >ҹųYoόa @ܒ|*;e}#WJA[ {>ݽG[zfп^?r%qSN^17{} $>Ȝ‘:;0XrHjFiR6.ґu&N+!-VZ'6Q+ 1!2֭߶I-Te^]VtlRxӇ'{*_-T`ض#mi"z>LUǞt"`3ۏ/Hdx+}SXfX؃d]Jg- /c֠2%8G`j⣶v^]BV,s)jLx0ER&*7tTA6E"ѓq?H* LkrǑ.CV7H_ ]j1J \o!`8,%W;+$>|m6O]o㿂Z" lqRܲZ規ՐFsHN臣1\䄉ZnGq, .I G$th2G=Ry3T@UbA;RoL@U),-.Jc u*Xl2A9HܳW*JeT[!pd|h"|[00 \s'Ԛ1HTgV Ǥ4HbēHGgF2]0x{}TɅ pC:#v+Ä6\/S%3>kZP3Ϣ!7iyֲJV=PP`'u; ǃa=x!>LN7ueRb=0wA.ĤصCxP^.> cokyvF "_cs=Z_Gsi+k/, (I }p.4{MIEhEB|kW4|p{ea:SUJʾ-T5+O;i)a{챙"REdkSG\ 1-NPI:I$Yem>O{BZ0S=]Zp5*¶o#1I2%e+ExScN@e 潈U>a|FĤ/%+`sʥe]9Q^|3kMx $j΃VA[]ɍʟ6l|pfADu0J7GdK)**6}twB<5M[>JGB0hS3o!Mǯ ` Dq,@_ NlޟX DTS@ۂs?$wJwbȃcbWW,Óe8kãehј`1(W60rj4ctUGÈvGcaj#yn.X}s=*<6[ d: ǨΥGߚ->)ʊ\\yQ'r챞[8q#Fcnj݁kj$JSf@cCpI?ɢ]sH7#}/5DyĢqX;߱whQK-Ί06klWFӶGN@2UcǞ_e;}7DYQ =*gw E҇, +s|sv_;n.{%ɾ)g\O\>s> P1\eبIdX~xЉ0aaaS̽ j1O\[h}iSW)/ZngFНY'ho#z~+FvX1}*h-Y-. Y$GMrF=&dDYTkZO9Kz. ̶[(cN3#7>})uVMZc\}}ڐeiLI<&Pz#lv(5?m%vl- ñ;̝DVaÆxb`~ZA틭.L2\h%<#ݏhԒ1&N+RZ* L\,3y<5S xoOezVE*)w/iY?PJ79䴂]WH(rfH'JyK9^;I~;~g~m#ʲb +kdS.~'p6S>0MөԼVw%v?eP_Q!d O&3gvH`Xw~fρ4w|[ ׼ݫ{&Gj]GcLȄ]pm$jL*l?fQ o.:zXGz5k eCo<8MLޔj *N(A}?Mb$ͩNGXF,L{EwbZRy FB} GVj{;n%~D4ń0/|Q /,Q.@$ ҨCXQtJͲ[dE۔cA]ƫWBIXe`S_zcC?zV.GR|4@N>Cp%lsm*U|/R g{ M%"RKZDm%wۇXϭ_> xLӏYbZBJL3y{-䠻Ő. a0Gf[oԬF&w9 4׊Kت'WO×B1F؉]qir+r)KЁE4ydx7ϖADZdNqTW4-`!w0AAн3*8>tlj~-H96~ۅe4?Dy3=Al^' hBqHmG=sl}fYʞui~Ll+:+x:!iؕRT]]FLyŷ进<5;WI\3-2ZOޣ3UavH'$\ V+0^]NUq&) O Ay$*X P-qӲb;ner.ݶukh1 dBQ 桻lKD8.W'.6drP W&iP27[y:)]%&ɐ U3G@! kYuo50xV n*; \29@จ~#ğPP▛^#>`K6܍bЗNM bB1吲1 X&X33M1IrECqYi. gIat%q_t:R!mgj1@T%,Ys-JǸ_AKa16֘j]T9h<^߭$+?) 쉘b]Q|=تJ~5bJ17P )O BC>q6gzar@#cT:FޥyT[Қ6(:FQb825[;A}LF4󢹩Sgf:~n[F&"eW;^Wޤ^ &,G"Ky_PҴ Ի̸j M3uJw= U; Z?46-r,<%_,3`SeWy@8l6 8>:0Ds^:lO9/si?DjYIF:,J 5BC/cnDeS/!{ӵ~a6".#8]| d,9Iq %*&$ []%͏0;,B3_>8LfOT bnw a>Fһ/NBQtxNNjE5٫FIv8{&̦\*ջQGۨgAH&b  ;BKgF&SmN7 'B=+,pՏeNB"us8._[9ian'S>zXGl?C1']RhUwSW4ɫ23hG֎Bt4%rpʔq8f:g t?僂i#;36NMI]Qhv,pMK< }VMũE$צ:0EdcZ>j\ϹNYd7~Kxwq{|f;Ą$/7\fy$edl.83LJEpM8,yk0{.|Ja!)u?f T)ǐ#¿;i^Sf/fo+KGD`X{Wk G B3c}.n5u72b:rF-ZJ%XBPGM +=bjd [yP섏GvBc=,y\a(puX(FnofcJp!^M%Y V&Blv쫜ԁĈ x-ybuJ<|ca(#ȷ¸dtIY@5ܦI=HZ>u";vm/@_ЫjXIѥ\vJ度aKhF< JPb|N+}7DL#-5SU&?kT&e"pow㫙u_w#~̨ Q~)uMmC7trg"s{QA]-aSPʝ0+)x,njAzuM/?=[W]٭e4J'L >lRtA$R8?G4`z&!PɬJm cK u9*}As/HI((a7H*&,BQ0ʸ!=Ч;mG]&~ #礁vڝdwt!$(C)TQ%ogF+N4ad:8)i f'tf j]jϴdnVEְZH5tG,mD[ f{:vSxJUJB9vfVpWf"Dȡb¶c[ v}%w(N@+jtVD7(梑q?d% py >Y-8 A\^Y8qbWIR)˱RcwhL%byZ2ė2GQ%zAlWc, ҁ벪kaQ`] 2SA [Ejϔ g0ޔq*m΋nƊL^1xC 3z- fdd+s`f?;HRhLvY|A9@9$|l2]38>`SI֖iiĀ1` [uڂߡ6_4̆S|oP&.*S"px~yJ '&g{/3fA?h~ޛ٬Rqk}&) _{֦=GMjN  2`>ަ5 #05>c$ ff \aM5G:RJTʳ)`#-<#n(nQ֤q!*q1ã2.`8_p$29ZO-R*gAueaiHQӇlF:vY_bn41X#bP|1ďJyy:L:De1R$SӐCKܹ81͒J`gUFidƔ~VGMR#|B0JEiz*C/uqRXHo/;۟c0| >+ 8N054p<?Sh]{/>dM\K=$ԙ2:VH9Ə/9ޮ J_#lZG%\|ZٌtR CA]c -~觤3*&wfJNihNR2m֊5}جJ3iVS7.? 㔠q}O)eOeMUVM\wt?>`c$q]q[O3;%^Mt,ߌ4i [T*:zb >e /{!t|O_Ib|Qź6be1)횠ޓϨDwEӜWpU2(6|RBPY\b `MWn[{d\45wֺRc9~_ŜdVb~[hŸ61- Wޠ'|ohKM?6YvϨAաY[61K-[VEU")gGCI!VS&~ש.CPnHCFp YD4\MU>Vo t1q5`6mΟ0t">\lgW*P/"= fɐca0/kzoD =aAxYӡAC;yGoH`yn0fk7la9f^K&050lϰ:mNnj,DH#5SdL(j@8 T.BCo`HI]"ʕam,]aMDG(ybˆ|\/˕:>v7Q]Rvl-~b9k.yuѦJ!/\hz ,-8ۄ!:@6E!6'o~!#BWBآ N(v%fd~WQ1S h +vvdߥE)6ug_3,ÃҟR A;ʪz|)SLB ԽIM,нs)=(Do _<'DHlLO$)~@cd!#EhYIeR` m$s^6Oֈ8w l+-*Z>Inc3H'uSY,I*oc&pRH|]ީUWᕴ~9#X }%[/&k_hɝ&Nv~`%AWQ|^+ &gKߠȑ̷%c'U~b/z]r_zcϭw8iEr$A:涐JHJʰԵ[ejk`N./,@?u-i{,\*( 6EaE 97ü6&bx TO̟w6\lBv Vl7Z%9nV{1rCpg=NmM,x CMqc?C*ŀ'4ptR 7BeT߯iָzzk9#[pYT}%Ӑφ_޷O^􈎓@='w~-2?gn?/xb)`l_d Q2~|'|OaiJu]j /ݯCOn =&'rJirYnpwVtFZ׍ 2[/v FCy 4$8%j`m,(8B~4XX7/@TYňr!f0cxw?Pe'9+v9kRg6e[<$|<H((ÙP(ԅ9e_vH6)2¸Xҵe?˨u#kpai]BpE^#͐L}㺰W94cgUk΅J>yN!y2,ߐ üY:D vx0ń=o{@ҫΟBAUZ?{6aC=0]عm a> ;zL{E+] Yg*z5΁4Wr/ki\ x%? )ۀk؛ ":0"h'%rml$Y ﺢn#-x0m= hޚ3>u]}&I_y?s̺L.cFdHA'̲_Q*8lfP.P&v WFb׃Fdʨ _bs_!JÝb4BR+uHt-#,'!2kmԞZsimw$N9Ɂ8G%ܩ};coc̓K;w3):"NcdA45V $pcĮ w~/ҡ&$ɡ6W9_IʠͰƲ3s2?\ͽw듣{/H@=2vcoЭskPtO])w0p$)txq0G )]Hҍ1A@mvM'c1!q|iWjfr֋"A2no;&kfeAyLҚ'P/nO9ǓМ40T֫6ةJW6]|ή{=Qz?!rc=ÎO*GQ+ މr!5kw8AL"RK,|ӤNf]sW>,#NM+aۀI~#BôS$8H.WP<ArPu:ٺ kr8a+`4mB_hx:MA6O`3_LFmp&qUѲ{+(E{F]w8PFFU~f jV&)uMaVyDm!rNz.Y!$ج//l>'d8Un.g4.ufvD< ifH3*ZJC~"K5ŧZ 74a`J1X ]Cu$ y5 O3!H_}CaVr&`utkkYrI+>U w|0#.EPO?jw;S//յ\JʗƁGѧ 4FjbߛuV>Jʎ; Ci*A% AjsS#Ʃ`. Nw= &Aw!wF.I2vf)ailpC&Ziu6bgH̚8E24*m1e9) l"Ԯ\I;Q[=)_v8džKҠ YR% 3+k=%:ӯ$ZaUtfAfOʑ4uSfjVS_6?5۳HYĐK=QڪlqHF'ΧߵH9N|Ps1F/s2FI3F2@1voմr)$Ʀsdsw(%E86ݥ}7c5>v g9"v5, ʤxO+tc(/8)w#65Gc /S-e]c~p۩&ȲQv`LY7aMMЪKП\(i0ټo i COj$sŖAJdpzyN¼'BpJ)Q,[lsr<"fgϲ=\u0,zCC# Os~dWm^"/i/coH@:5\)Ap{#YG G&6xJ#M {YDyX+v9p)+ @*d}d<>ޮcmЋΣ7ɳ|ٿOҝD;_\gHvٮK nPC@&7f';5h>ySIT!Hka`YmeB )݉(M3Y ѭVȭv-eW1]/ҵ ڞk{DNſf2XOiOAtY3^ H VzB>JCzCGh|sffAΞ嶿Py6G N-MͿ؈v 4;p{A FylܖYk CC~H0-GR}Nnǒ:֌2Cnlȹ_x 5Q Bn =?!i.k_!3j*/:ozk,OhG.%)l5g11B[4]t6ӃX dw%(ڐ|#b]GE^*d})[c礧iyfl4֐c #О*P^&Ca\tJhB]d/ʉ;z"*v{!y6h*(K[pHR\hK(`ˌ̂#_ QRKbygw@3iL-f]7bFō Z x~q#Ѹ{V04G%:WoB'υ ~]NqY~}ː|A@bHqA(CQ` Kdg"Έےs}2{^~ }e,Ou+K{_9ztj CI\NKsI>,+ëޑ2X9IwѱQLX;+]Ŧa.922sQwGf\BQS_kL4ke_dЎr\fߓRvhun8o++ZD&2ݝ2 j 㧋 _n@z7H ),F WhI>ˉy{<>/r G x+du;QN#(egCteJ2}h JZc\w/Xf@76΄Jy ECT4Ep߭m<̜_.1.*o4S|'iJlx[B CB8∱΀8wtg;!1]]OBٷ=&m!79@n7VigÌ{E bBT3u{y2V[ ' 2~0hi$yj$`N71DtUxUck-jNt( )>:M&Rin"TM2+CSZQ\j*c %G_GBل%lMw-"m3&;\eE PpIj.[&%'4R$0p!m/+J^rV"AB#Rr]hHkS 5I*)tӓ,宸a <|"%$?Q^KoInbp`9{Ƚ[^ c㣍iFd+yt<ݨ%ƯFS RP@ 1͜ ҁttG "j[ьCIgZo"֩&]=ȍ9)]==Ȏ_gRp0Sօc2gC'W4d$Euy[LÍ-Aw\ (Fx9߈# m_ǽɜsI}F>6rnk^j˓?ds1~^EL?Gq<}pwU%!N}PCȱxSy,Ίsnlj7QϾwH5M ^5* JV>s6g\ĵ;(Wnd[K*vr}-&˷R&B(xttCTet P _R. HB+bNWy㢙k\0}?߇v8NOɯҌ|Z[GNCzS%9bDŽj2>Z:w%qD ^5;SKHdNM:5±7U ؉(:>wǸ/qZbF[8yg:yT 6bb' ٮ7Ѣmt} /jAp hGY»I$˚0tslNT+IF=#uWq!}6q1"Y;NcSnj.!b%i?f_nWf ^[q|MCX#B!cP%pjޱq֏ j>Bu̳d}- Ozu(T$xgɗ4ɲX;%~W'Sm`p+3' !!pnY2SIA0+VG"Zvdn+ 62;AeIp{o2{WtcM,| ڃWFLZ:b4N`}P  #8-x=B2jD}ܭ]ꢵ.vE%oZCCT`j:}f/f_h=6{j;9b[ r߆uwr'&9_dQά-tU #a^>>"Z@* fo&lKħySG+wisߒuWןi;zp1=NS&Af?я$Me!SӢ}Z?o\֎y z7ْAODtGAZaMZfn50#! yi ‰Q53vk" Z,.E neG.?4ƋςnȆ}EY+ŭGϮՆt*A9RdհS~ù,CnT0Ɋg5'U1>L psvjJ$}P3 {tV*ُ%"=wK"vr嗛"j|_Q yutPPfod+]Bh`[(FoAάm"M|ƨ1Jqy> È<R/gF:KAT(ѻ㲕jI1σu>]ֳ Chey"m俆քİT?p5mGq@J Rl`g1i_hHCPbTdb)@@W VKSd4_I2At1[dQ88*eO1vGg@> 44-%p qY !QXxg/.4dY[&J3|T|e@sKspX" G T4 /zQ9a3кJHۿr&kfZ,:Bpyr!| Ù5Q½_(qY'L G.ĸb3VvDh{Ym~w7%xT˞2Y˯y;OB?,%+!q'[c[e,QHm`O?ibi4]ÀX'/Ƥӗ4duwhk*e[}2ֹAy 9[Tޏ%vpE# y''Xu%lKm\M/v| aPHmA _e׌r6f:zkO $#Ʌ{r뒳z󈱻ufY1~0AK/XicpO+5ހ\Q{6mUY<DsT/~mV i]>{~fd15c)]$+ srPHԧIpČV8 86^eKUJt݂p2I+}BU!އl@1x9jUH^_' ٌ]D-s̘FMBcji}9n2ɥI}hTts\,;qyL7$8`&v(}-5;64$I [(魛OD i1H;N[x s/L-ƈR0ڀU蓝+ezW#Sxvs/k_0X3Oő$;F~ ę;2rLl!@J#` ly62BA<ҙNsc2E(\:ږ@d6izىi9xnZ|d⑦,EW:ە& #,*4H3舐Beʤ!/cv`q:,R%fR9iWTE4s{{3;CZ"ΦÅsJdM7J@lgd5x"v8:=qk<"ϝoEswfp񎻃,oi2@y WmZnr- O:5duƿ1RG9* ,Y'H$ àqh' |:;MYJ_X01As3G|dCK^y0;O vU"Z72; h(I⏁Ӟb7b`<Ψz_U VIgm g^%hiv>z(4r![Q̞l;GEqFFu& NVkQ5(-{/ϏX/j# YE"vQ1cJ'}4*j%@(]K>|`-n(!_ ovQqg1p :Sv8H% *?`})K+CxGJ%|d} Ki1ފ /FYL\ 39UѵͽaF>S'&_ۛ/ <˶V&`FӍ[Q_w ;SeOcI S&]4' rvzp qHT0%`]wIO:B~bj_[mAT4#xOQ[{DERNe-X Wކ@}<>/Ӌ:fo!Y0/z̬W1[u/3+E>bsc'QQ:cU>&<29<7B:U2GC` D/Mgo\~ <+CV`EP$ȲHbt6L4 x<&j9[jJZBT+N^s)A䤯YAp!sC! a`H<ֶ}4ZK=J%F&n##cn6EgUus;NN|Ka6>`VDфN2v'aԤvȓ~hV *@zr'z^u_2Tt7 w3PYh@\AuMeϬ$ubu? 8?uzlw(_<|)cAtKǹ?%]otZ4Ke)Bb&i.)/TY',78}f2@dJ}թf 8~\yU8ڈxմy"͆~:JH~;zrg6>zĤX"Ʈ8I"Qj$UE8#ap?yuhġL#ڑ~,-[gM2[=4 C^#ekѺ/NxePJc#pm=uViFp[ٖ;IvnD@!-TU 7ZJBv/'?>@)7{9'!Ԓ XEIl'i*"!yǃyQJAJ5@0[Z ( ]m!oT[IHH@uYl*^ʛ2m~I;=Ib8e`jΒ$t #hZf+%`51b{}wq?Bݔ[%EaK "Y=Dސ1wu=)Wٱ <\y%,@}z^B $ Ɇ35$w`aX=*'IYW+0oYQ-B;grY测:Qʟ+`kۖa=m.I50]HC=j-ά= 2Ґ_Kڭ-;:I )|;PMVG4b}nW1> Ğ!R V8HDiՋqi(6 .Ɗ2PG@0ab&$>VY>؃<8O$G9 ȸ ?${j!'yWew$9[@Ҳ b<-tjAz瘞$O85*#23B Wn {wब ʋzx>W@a,wXnټsx[+/5dr8E6l:A ZfVt~%Z%p$>BWioo (r4 jjgwN e e%G @,vėt}3"Nl%Ejbo©㽦~ Dh7DՎ-h=c Z6yN=0Tc%G%pe>}TK7LQ`{#oA;$)ßB0*t9%ӊ*W@Κ5)Xr}bak fkfĈ^tf|3)Sn oNz[roѽ٭-U@S<EXEvU,TV9+}EPV~G,݇>o"vzح rx͵bX*'6٘䨣AE2^[Ko[eNq]+|QVNV22,kE0ja?<^>̡5{m /#$q. C nC([AIF+89}QF]`fjMOaI TE4.GKdb]ƜDoYչc>h꫉pi8W \׸ﴙR*R"V%Br4i.NTań&gM<TlX(^eN.fũ3L/WR{BH|!ʅx s"34mï"}쮍U vS}ݖgaK?ǣݵFW[@'aG*UKXMNL S'upW?.Qs1eiv^5S;8ac!wHԗ+3]MK}2.v_*lwTCiD˳ig!퉒-%vR;EGƫ^ڑJ0c`.(,h٫G\ƊQs-} .< C P(vS4w"F +JO Q^ ws;B1 be )*A,8%C*׺#v*Y;"uLr9:$PnEhۦRv<'hB-d"lཅok2YP}dlc[ut4v6hRT7;鋇ߣҕ՗imPEվXtf^| B &؎U7'Ǖ) ZSO*{.(8A5T _.{IIz2hCVi4WF8zP?jŻY "p_Z> L$\ψ k!%=;. VeUl?uGctљђ\BWxc*( ?":OQ&Gn_v'Ǫpb(MN)<6EUWPAksf$z32E0G#"2egh'~8kό)oU#+yDrk;Q\LjQQZRj!*719YD˳3Po[XGNNɾ1 \m3n] 9nrBvT<v(*lGdUBV.=|!* y~#4̫)v&O3?'I>qrm0S8˞IΔpz:$K~2R(D, Ԅ @>rog Ҽ_{eGtx&m's._5x`G\BBb 悝!cjl)ABġ;ǃAAO&LNli;o>C+{2mxQPJuC(ض_Q mӫTC{ /G2-l~ܯZߦ{`b(4~9Y&!zN ԀWbOy%a&X ~^<>'c#};K+wD1}ğ,~'Y4?f?hk_/cX7Ut3rߙI*sp>?{-6͟'a֏q0&X'}7@#f>UfR)4f-OAIK̇ZXּ̻i <}GA)5_3 Em_@魜CmSpVh,[Rș Ht?l& _"Ċȹ|>=ېb}^r]4qr'|yyfywj3T}sexKf zQ*umOiJDxݳ<Z"Uf5Lwh/JINf03*31Y ҖQ D#! $Υ4k[ғ6l UOH![k@;jrmD!L+R*FO9OW-nI9]8cVڔG:sF2ֻ;c"fZC}1 2a#Cvq8 ";=aۮZ Tv {d!3K1,L.UW/[afdX~Ɂ^I*";:78P64:G!%Zv}ύw"7g)K30I o"EsaO0F:z d|CI2򕎈3?Ya!/BY0DB@8ԂBAq&B.Ha i!"'(ejw) 0K~ G!v`I &UH$OYO?)T$ݮ0!<"$)?cvpؑ޹_6b :I5F6CѦћy)./FgH=0L]C w`DMMTVgIli.9*KZmSf?<,5] +[--ݭ.-V 4YB $ ? HjKLֆn!\,eȹf6q >#c0`EVѮc?4\fV=! prC7g{К%#$#IBri5110qyƙ5@F%,8JBx&aȁ(0BDh1J>dC|?/A?}kI J*| KDu+!viY N&&D/Z4Clme}y%sM^#4O4ԥRiJBtr *vvjTf>0S٤CÃJHx1VB%G2TCDI\\.OuOK4GJ$ vGcIQI:!b0П9nS}sܟ0sɠbb<4A4\deA9HB>.&X@&n /dƑ"2;ha jk=׳&>N񜙪8c@f6 amYWYjP>A&)Vs3|#9}?a1\& qL~o(jG&Uj:i?S]KPgqk[JA'^W ,_Nq! zf)[P&{`=*v~~ǣJ8 < l#rYɥR!=\\d2(#dNӠ8GЪš] L]2P^OO9ꔬA6$PlH֣W wpMځucΞ>p#| /A%1/Oo<H<<*@MlAcqNzWbm~%R\9@HQG""?䃿 Pvu껫LA'AGS\G!7͛L@fbx@D(^L4[N;jK<$SwШ'ˀLvp& ~r~Ir?̍.W ,fBprOG-T6Ďyf"X֨*0P~uegiB9; EyP?HGGxI ߝ qxp_KˀՍO]Z@D p_gDžf&1@FWMY@'P($f<;+ā{%@HJ%!JGGlII MvW[6D:|n{aYomٝ&xWZF%X'>ZQ2->r+&LZRoagj©MtyU'|l~NJ{le'wֲsM0kv4C1 DoU@[f/0Z;BC[e?vX`+YwwBu/P}9]̀ttid`B囘uٽ^Af~OxnJ?MG 0FiWYƏAgji_7 K69 ps! Wk6m:^t>Gs<: C;;Ϝ(t v8zܻm僎tnc.*1(A߭6J)C4 1 0[z7̲dլ )HItNc裃\\q"!GrUxLqj@E2]zuN[jMkā-1_1vEXuRVP,ٛ@ ORP};R-_^mWo10?V)3q}w=">,!!S@m0@jrXt4rr~ J?nDFgu~_ϒ48LuhtnᖦhԗW%w/[b^S/zX_AxxΦ"aYKRDE=?ˏ R,!ii?>>ݽ9lC| S^hmp.Wˣq֙6+{*¯-$/? FDs^N &g#_z*go5퐤#"TĠ' ,@$Kn!g< ͂D$VV`azM3e rkK9ȯ8jD힨Z5-kBd &S٦^܄ O"OHNb~x' 7\u5%/OC~~+aCmS{y֮UY8鄸N !)e ?x9+6$Sk prOvW#e% Q0}lc95*maMTڝ i @%!B SҔlDQjw̎]=nZnѠ[Ѯ8(Hq{!s+vI lLV:͸^ükQ$_; 5j8K,0:}yS734zhcP ,/bq7Gw2Um$J.JI0Jq+l z6~Z|^@Pt#@-|=*lPG?wh[CYpRMXHa0U=.uHF]f6`߽:z]/IwCq~mǵ:j_d沄BNJV؈?>#@t_yN5dt3,Vj*"'%\G S (M
/,2qvEg Slr8uq2A#__?ԑ387%_O*DD޳ E#&kGx">M_t s]Ͼ{S:{ds1h2-G Kn?o ͽ_Еs6&n^aFsb*; 7@A1ɰ $NR]dMFUHYZ3e րGŅl!U R%G>Ў\ JW|+W-P}%eRG0&$@Cy}:];b[bO}AHzAHI.ņ3/3w^,zUv9uŭBCWWA  I?dRq}? i`   gqP\,"޻s~] %'ɛJ.;~NDZp`d$pKDCa^nQOϞOuoo}ގQ^蒪G \J*cƒwgm2黯!-!jlciǿ 6q+ 8 طIJZA)t%_f ` ON7]LEr4Ϻ8<*m=<ϐ[ˑj W[6$Z<\1;8P ](  ,ߝ^A;r{ f^|x0Y%6˻ZwWh;}C>p<"):a< T{T7'іDaq#j$f>F\JJ-?q2PJBkS9vGʷC" m=Kcx~ߖ.wԅM> ~o܎ux|ӿ/gB[/;|_+ PsU0k#`Ƃ= KŇrI5:i!G Rwbm$A))g'*o0~eeHR?9` ŹJe'*.GQ%wDɕ #x^̍EVVGH>tjOdz}~}yTH;Wp4Ο 9pg-⡸"`psT+g{D̽s$'O&#pl>ZD,}kjH I- 9L[[[RvJӍ>UFV256tþɧ  l&RT.3cjcuEIzBBд/V ˹z2W.qzX B;B U55an_<2nyDkأei(L=/xg}T\#dF"( Y?y^0Z888SְTs1 K#I :H@ Da70ޮ? »5/ %{7/FJji v,xeۑp6W6ͫw#nnr lْԙ@L(`qEj(; ާC0h=<= \H\o`k2ؖ)|aQ_ppcF8PZ@^/yʙkAPUmVk~ ٶ7GCO&FL.V\5R))oM9V&p=0|M|jк^ =ozi$9Nj844 Fd $޳Wi^9Vnlė뗶 6skA>!;%@|̳$^e2$)5("4:BkTp$@T,ƒR?wҁl~u0 px`WHbi Cla*~͐يeӓd?{ˑHFAKѡB#.X@)fPrϑA=$KF?ؘ?َ_s՞Up p"#$P@,-tL x^d):?L;;r6T$/p x)9I SxwZ1؄K.qTu/e`EP}/l^1{UfD+L",I5A0@/Y%~b@D&gQ2=Z>!\*_n<̯ a䜔G'ɟ*עш2]VHEgo {oA$de }u߇LٜJ3?CuJ^Ubv \>+$aBw$2"t^ĚÖ>G`6N@Vf3Og/O1OsAy8g>k燘rf C^fp\P@PTW@s{r6[/Ir$*\ lK0Tkvxʱ{YXJG썳$M z)j\(i,d]to;?|N)"Α` U5[t`8' `>E_kO'aQ rSzFQ [QSTtVW#X@;(9;I8 gۍvp_ o>&Jd@~=X%]0R8I>o9PYp#CpB}+@/.R#p{ho3={aov(8r”PL8~Whr.0J?r\))[6jD^|e |s"&p2.+Ei)]\JmN 0ZsG`R$v9?w9!I G8g-(O ShX4D44*SRILЄBz8`M E!ԿTѕ.Om~|CG/򯠑gUozr^GEkx_e@|ăa({zNkÁej^Z1w{ @%rLDK$y-'$U9rE\yD$)E-F=Zu:7'!}+uGkyKWAД/衐6zdq'4|+' B9f2CR::x|Gr0%Hq fl8ʲ~nnm8tZ}cMDNFEaLNHi?v ?*yC/@$36DWk3B% ,W 5j-UXX~gD+rb>9Qc=;^hQ9Q?0 $"@OxJLj\` _q.>ֺv` :nQ;VcWN,$2 @$1nz]M+.9^ry16]eb[9]=E s=ר\[hl (0R'gK $r`[]B$N1JxEb2 @vj܌rx#j@_K0myC?RK*>Bc7{OCt/ys?Gych]N{J{6d]Jq+zuj]a"wZ)&6Z%0ilW_,e];<\9%Qu:ce̾(Y!)GN*RYDSe?C*ƽW1 1QN;G9!"}~~+#-FGqQQ$+h*Xk˜_ߠ4#NΡuCOnfr'އ˺Vr?j_H̓T:q&.bBZ$[:NӒ;JcPώo͎?w;"Re]_2y*~iX^,["g> mm3%fFl,*a@"Hy t*C"g/AHV5Ҟ@ D%HeQPJ;MGM֯Ga?8Yڎ{)I4q$b!DTRBZݐ- #Bgr!CEFߔҶCm6v4,z/iy:WԸ/Ђ5> "k{el|6uHl#q 'rTrFĨ%)HK?V!C,n p~.'#Hf8,~a+5 $Ѥsq.__XG:GI2gzƺV.^elڔCA :0bp^0-,S 6PD%kbnG@ȿVs`[>Ai᜿)P46!k{54dɣ3%˟J+f4j@a~F/i,K&NN7*J 2xVĕ**N^&WVWP?8!IUx ?l??,Ɔ*~iP̀e< cKh_I]5U}jrR|L=MvTJO9Qwc?:59vH(zGjb,R-PqHk8+Hwu}:zT]>c=Q5V( {̨4t0N xRjXH|93kݱgbV1[,w曬9ڡS_z5ҔE)j {3B'#[`= tz7 ?1 qok^SfS /(.ikS]}(*3v{x_ǩ]уQejvL ?{D]#"2Y|!+{K2-dnhrӀ޳iO1l0*Qe H2,P^nY>'q7 M8'BgرJvsfst; DHH#쎼{< O헞 Aj` ٘M[__j9^u;fp1a zU҄DDvf8s_vj Q r˫)uu 6]W7'%CɑAo^1Њ.1Pqo }AzSK3MB u @PZKt'0.!{/&\ĐH01|"b>a@ 94L p *|Ώ朐!Ot,Нy}KEz{ J/~:( B0u[H_?ȅ|Ж-ƵD3O}CL,\eaE4]QUE к@`7>vBC2)ɐIà~Ig@>=ׇ9!營Bd8 |>t99>jc r>ɟanq1&3B䖁yXb'P,8a|JAlwN~a|sy;QGHNM6:-88'CD4A `fv` B5@EZeyΜ` Fa(J,QEJQ.0cq!p  $NLD qA_^ $vu6ot D~I[k'xl.O(wAH ((R!d 9Sm.8aĘ@܈齇wbExHM@<~B9 8)x _۝DF, ˆ&㝁:.oIz)D'n|vIz|?rwj\? ް2]׀ara#r?}&H#_v}[ dr2[VIROn"H]W63&8rэcT4GS];67va+#_0Fk 迸۞[iz#X}GޗFe \QBKx!MT\`~5G2E}NegށT !}C”\:6ꄜ$:2Y%FͦSIϥfdcL` y@ JroZ&BgEmDK`.xBAf@h%u`3ʁ<w5~Zk,GN5j+d3 `Ec.W2,7}~$lpv<"?xgxn4 1|ftXRi6:wd,qjׂ'#CA$M 6m\NPi.j[g> }.NKtQ>`wk#L%6`?̀舶E4R"B5jMT `9?m]_->?KףO=pJ`U޾۲`U_n"}F杋m t MG wSkl/&vt/w}RL16bA\ʹx+EbJ3"l|/ɱ ;A~i KF۟skl*.F:\д7ܢH~JCxMOCQM>f-/z(W'*VK}blUz߃JOKu[)rrqc>\ZYxTTӔ閙G>LW*P+!j+JOzm{c65NuM1oJ V`3&P< ~}0(Ӹu['/LYYƈw%)s!Б@O)LISyA!^69߷?;/ZMfDj(~u=MG ~@v&߭4Y$LBJ"E!Dg8 /_] g>3$7\,BΙ*{.P>RԵojj,XRZ[;N(~9h&c.`89gV&7㉀MnPC$4:]"fMCٕ9*TIGvCU:p0ո+=@ZkG@`~۶PGN+X9N|1Ŝ´KNB' f2,1L$ dZz'#)WYt{lm- m1c9s'oeXӨ~ƱOXp+r '7%c #,hLo0K& |#HSwοeʻE Plxqn^ѭME_ƪ"Q7X^6hfnoA O߾ S-A>OrVb ?e zᅬCc$AfsQB@X&!R-1K+%Q&D&1I,x*@%!c(۰/"xKD!)[|~<yU ,+Ml-əHw5$5*]S Mro<~8ſͷO~3C?{SJ@S]g>a&)мvvN8i$8yv?^M&l&'CD?̹_W4ԉh<}3uCh/*eAaQz(%ZRGUcs&9T>ǯ@k~ GOym=:_ nLs>fto&pzDp<9J8EJTL@DȩHBŇcga;v-Q,03f; !8-#]4u%q<}/&D#q/R;YEG NZ_C59pĎLC"uL# >SH=GYu&ݠaz6ՓVNF tOA2d 8 -K7&ړ?'wi*C|b d}il'LU,0 D$ )n8@w2?v MzQYG: A Zٶj us4,ҁp@?zY! >7­V)477fa HC#syc11nk?k"QL߼K@I昄 SN>&F3ԒǝFJp|YZaF D:Kf\X.FS6.@Q7l=z1v2@Rʤy7 ɂW*МkrOGF&]4T Au@AO, Ň|D wp@v<ĝ.eq^ga\rÏaӾ[seE<GBGoLQ|zJ)|}|pԈ۪)G]+ G7+6d7a8×B!(n]=Z=ʏ*SyU$ T;|~ KIJAΈ8u޺soУlwۂb+F^ T r{Yl*LWCX6=T'm$_:2i;{{3^D^Vok jc3KːY~?9ı}2a :i,EӁTufL8q_C-,:you"{$eVyJb?mmyW)겄 w}<:sNd7]V[R-Ȯ[is ز`9Qq+ YXSp++p){z,V>6r= ][QG> FC+= k+LV^} +60 50g|Ӿm}{I` NN}h ^1BOb}n-dC'Ƕ=~)J@ԡgݛ>oX3u><,&qx5e{PA ϑ=[TĊˋ\NfY(!iP\#"&2[4>4T0IIb6$]1ZI؄gNMy}fA6pcA;"H#d &t]@PBBp[dA$H$c2}Qt!0w􎲈'}U0Ӆ!0UZ)J׷0JV&c1hhP&۞`?3wzu&dp$ѺAjB"pwثD-[*T>(v`oQF3lN3<,.3aq 8˷25-D4@H, F#9r2@'S?Yƈ X]e&(A(U Jdߌɻ8^}cђxu>yIao/r=N3i羏4W$es^*x0 ِ;xPHNzoN@[tC` ^a+3i8o7MT 9׌:>\eƖ&phNi `T,jkTwq-Ģ?VO=od;j r dJ`^4hmɷ 7=fLg&dOQEJR=w@ЯV Vi* 7S7SWx\gN6>$O]w:o'J_;mO6xvH9uY$e"?yb`ߟa+]X~]g1A]#)CtSZkj_/a`d87'+8V-uOy ̄:{#"Ry}~L ގ:?H$T6Рtin4wo#JEq8yI$:Чw\ߦ콪RsJ3. ,4^ uשS`' i"͍ |$z1)_ж1ѹL$/(f (~ⅴ0"N:PDI0$! J$4HZ|{COǓ]J=ׯ~k?jW(63L6LA^OY]+2jْ.e0~b.Kz^s8ZYW1T[{{ wB߫a'?Bc!a&49Vmj$$G>w>َtm}Y()(2ˡTĺ@Hq+ ~bbc >b@bvwoQGl~ɿV*wx|_ޓp~7{:Xco(:xk/XC[QRo {T0,ah5t "lU-۱VYZ\JpA (f4MTADu4:\6C}^Ѕ[s|^Az hv`|xD@?` nG0`?k|;4+P,8N9[p7:w&T |f B해r jx: `YO9 HiӕΎ sws}cr Pv'׵UeTeL1J聰d i<ˎdt6}+ Cjiq0CfrqP)"WhGÈjehiC;{ _ 22u/J֮H]j=VosD;xOq]:5?U-b1\6cm+{ -X2,l]")%`¥''(N"I1Aytx+wӭLdM뷚RvѼQAf!m:K S̡pɚs(1pJ0V&MHZ*]vHZާ,y،`a-&z̟<9ðNձnܒ2gY!msrj͖pB5 3%BޟPRp\E9@ ªҐ?x攦BG8;iY>ܶ'ZN욅tP,9C]uȿ_iBguPJ#ݵU08u/䝆o RzJuH~4ܼ)5|c/|/=n':'Д~=C)#Qs>'֘0bf4R~-Yѽ)-gZY>erbO9\vz*.yQ6j!<&Dc,"v;AgN: l`E'iZ)ޛ.Mʧ2s/~aݰouYݮ*+ tNs&~P2A2{ć}J}#kh:רC)u:=>6ʱʢ%0!J _t61Ý!%4=4YO0vؽʃSgL C>9˭;Fa4~P7۪33mՍf@5"Ā`%6w-9g1@&_?]-{2tZA ZѸJ{MA=&HjBey*Dݡr(a6Zbn_5-h1)W. ;}PCo7ޥ.tZɲL3x1;[$IKZq[Q>$xH6r~(ڡLfTˈO#<4SZ/۟op_ _2ۣh\ִ$y܄?FyjXm\3֠Il2q#w,\G~S?`'`󫫃j zDp) +dͮm7t낳q)kk82u(*0M[CBԦw|ZWVPi՝ 4=T@" e&\%)UCv؅t~U4aUGҥ95IoF LV\[\u4@dh^nJ R ʉcVY714&Sz3bƅhk:j$jseeǮw0y3nRO_KΆC|Yj-G3T, fRG)7-I5C8zZcӃaJgiٍ m^a y[9Ix_%1)p] nֻ)$27^,nҁ e2g4pe!!dT9A5S_5) X0Ȣ意KZ Ɛ8CwsFdA'Y{?*ݥidtuq)sCrbzm6A !ZW!lI3\5J+x/ $B*x&:m; qX"0 , `P:&܈!5} WqP` IF\V7﷧mO*_:n UʰF04ҘHUlLR։q.Qyc[jg4 zV8I6е.Vca’$}>J-_# dF- y}Ǔ}M=1|#:YQܑ"hDu]PpIwpAGqEa<<ESʵBP|8ڠ=y,tޚgEou> ŗ=C Z[LrzNlI @(*<߰NC9t5К9H(Eɱ=qKl% 3Q;"koiyv_e.'N 11hA[iƐȻv>wivf>q,d +=`PuIINe!3A#N6?(*^|`NB&ƉA`\09+lU? զdɩ5 H*/hN7pSZxcR-C<_i 8;_s[fBjFюf i0x^Ѝ /_R1%= y:r ԕ TŸ!L.a2)I:מk7e2ѩ.GC{?ON}QWAvuT•>=R딣+[Z.1i4?υѓrUhK!ԑy9(soiJ V0喫z9Roh@Z ~:qCGSh-~l[UyZ]uEvdq-"=gh?3f+|/ߥvo!]8 Sا]M2z.'n|^,ƟEVh@o|Cp3bOB1!H٪<:=%UQjerGDnPozӏJ bswE_|OӨsmR.BNh&/~[weՒHቲ,ͥ6'M޶Ɯ@1ZP+i6X{,p?U&‹g]p_-%a1xz3gSaө\BjHOiixv~̣ [E~'UTj"ŃUTpyp+u= ;_ܿQ7EE퟼#غO~~5t[*:Өk,vKq'k22.[ Fk -}n gPNIR$֖"EPh*@`Қʉ2) @-k y'i%;nᔕ-~q=4FYݤH(egU=&xkkĊt!:yz:{^Ol0.&{*G $"vJ 0 gE;;B+Y\{Z eYLtS;Ie%_)'섖ǁc%926YoWx7qQLFmmrJ#4D#_ Q*9pEez/³GR%TP%==j75ik*[Pq htrcద>_eѝfhOJeD#% lFd@#>`Ksp192)2f0H)WGmڛO;%l*!RD!ͳg.CueeE)3U77\D;;#M:׾rux=9nRj%tCtڧntaZL1IAP6^x./b%=OwYm^<颓|B}7ּ'ZfrO J%2tהa0۱UB貪gsLWQ^ҺG9:Ԋ_'rMSl̦jf5N:T{cVBĝ#ncia]䗼ϖ$͝=(J˻,;MDb83A݇b-szS Hɱ-{{qlrnٹZ ѯn@S:sS \9EZq}/U7ի=mEEr()iU4gzFX.`YJZlsgaϙ<"[wWʬ.C恵B8mEs O1\ÓDz{IT}"Re䞊=MmȄ2jCec7 bS}m ᷠ&S%;va՛~mFR`䤭<0q}=,n `J￱bՓ-Y~5;twGV dR:OZ~DC7A"H$m0a.tzѤ\:7 4t͛S >ռ[άi7] %4;q\O* , I18uMX'96J;{E%~}nB(ᐕ?K J 7:P1,77FńbwaS'@| iЏZMIѻi1zm6>~MKQ-}jO4z ~L+v Xz ZR+[, )ΝRC$ y "%?p0|.yE/דfYigw@"Ђvw@鴕Ρ8;/}]/o#\,✆nrga ,&jy,b8>jxz'W'(jy(O2wBa?D{Xx6~FwN^ፐG?sL+a׫.NRj *᜾ ?ydXiMb*eR-Da D ޞZx©D@7S]OL 6F9u t\1v;Ld0.,pE^צ.+2Q"U}+1x~ ѝh,ə21b%R;(Y Z*ټUE-=;C7ꚳƍ,b4|c).iTH5(B!D ">Twm=^=7ݳ\-U^~' S 5+-oe+ש`Q6#*8?%P͞葦1N8 ߖk`7u}nͬHo O,GR.luιRd8NAfYo0ibڧT*l(#B-|wje5\2fgbji-y4f9gF' 5}Ɩ{opλ5o-07-h7 ;EKӢinVֽy$h 9!g)Qs^ݝFx 26yͰ-DyxMW?C2Ҽˏ$x9i"=|p|z D }yz>r:ا3ħw4żK[e6X:U%T(AtYL8%´!Lz6'bb[x^cd!!5 cxDÏfz8P~φ9d/Il?h&4_I殮[?ez9{h&"쨷o.$(qtzdz:-t'kO όmʟź9'W9w$Qt`S{b6 +۷~ -.9?r pNjCqc\Q]) N_N6a"Id}(-a ϕ!WR}#8g@oKoQ/ꅎVKb6JXv!3|i.Uggy_8zlnP 'M|sWRQib#NRIwrODiL1PEK޶yLdY~}׮{;Xݛ*EzoF#K ]!fUz#Oţ{_cMttS~~ibWl6}|&!!+vADU&w'nն4;'rʷbl޶=kSBFOj8~u']h< 9h+״ص@`XS9Ύ Lj IH/048c 18.L!^G 6H˩8Ծ%Ewv 1P>˩"ݪO"R6$U ƽ[F9=?_᱑κ7x^wc,Jo < N1m>ONŭC@r\:5[e$R o\_'"{GE-Rd NLȵ$E&qQq-@Sxrϯ3r|A"@ta eNxQDavz^sh|0лhNP՞:5Yaݣ=+MC9暥`hǧ\qIs5B;Sa 1&Lƙ H[Od>2Z ]&ᥤ nT3; zúɔ +:'&TdʫxYO??uqٽ?q!jA@y':- lIiw7|9kx >EyA֒tpߤ@{^5Zw؞x5za[K )fY,yUCxtkC#ЇcM Me 8W@s0ŻjjkK9(Եc FaӢABO}N. !$AzP"Ã"O@oF` ?"H!0|7_;%@ b CeyTꝯaoy[I_~z|@/$ 3ωwLvU?}vxfxw=!/ȇrvl}Š pɆ+lmy|ޯ_ k ̟Z<=зK'J%"Çq M9Cqh奠䁊 hDTwN{n$y!0H$d#L 5jS[g5U Ã)ǜ,O̞_܉{u V.C& ,TE y1jz vGo' i]T~@=A<U0XئNlg}mF*jw=~\7Ⱥsc";*l񇎗BDJ2TUt㛎 9<$TQ0B $@E$7&q>u~(=x qGѺq@*O(NZp h۠y`8HZE [B6WrGӣR2$74}'M<1`__${W'[{ ^BW!7`j&<9ujĞW}[ugf[hMńp!)Iq (AZxA_u| 'w LD}ז;}Vq1M%~&DQTpkGэδ>NV Blzxߧ7x}'AqA{rt\_P DDb &hDo b !F7LiũicK4ys.; _*'i9@$$81;?5 _f"X=+zCVMV@q(149V9BEJ"i}dyDB ?='~$ɏ7C~wsNKof%-hL44tNe^Bn?9gXo֖E%;:5q `738-rc#6uNVڵ;=BWP+Z 5r(ذ@5#qZի>gJ PF"`mFc,x<\ x]O}tJz_^ZX2 שt#p`= 8vf=W(+8߫ Z|4prLCZ>H7)xZRH4PfA7Fbt6Sh |f_?ri^ȅđn!!6Yh"51f~ >|v x v$o$+'c--4 F rY Lirnυ׾IU]9H 2AqZg{b6~]̳۠r)VS'7:c-Ws Q݌4ߺc5qC4/@/vlBPIګajк4VsᣦZ \4r>Z:EF^]/}Zt8 l|,^yR̭k&&`hK> 8/OoҞO~~[IVJFumMdVnTF18#?]ZaFq} ]pmwOhELCm$D omFB;" _ɰ:E-#me6iـъ_WaWp4(,8!kB?㖯)Y~Yef fqp2ږ23c|cUUE"G&a{Nצ\"9Ko1fml6JRppo=qfň 9쬲8W3W}n6~yg2J-(FVz˚,7~vZq,U{RۻӖ"!OyuiR1ӝ3*!f'F;s͵N] pͿ,qŖT2uctXܫ.IҐRٜ&oW^C[ˑ̹յ\ł}ꖭc95jRhqKhwrA]x !ˌ2dZ|fu/MG@尺^^Ju¯7$\2JœiJUL$7Yk^F󙿟uVCը+}Wo^7g$sќa㵹 Oq^ÙL}e '046'nCwgk j;2ҙu, n!-B 2Po#8$r^jۮFFpjV䶷X $^)R\$se[p6G;=Hm.(wP $>Z-@\72 |̆6[r.GyfŝIg! d3CDA$&<WWȦ(bXc PtAfD!(:@ҏȥa'\LmwyN]sӺxvYIiĔ&˕;EX?&WYY@}Jhh]/(k!p`*(%wZߐId참 =_Kq6s⌎262׫m.E;/aUJ2/qOUO,gMCLPxc?[Wkg Ģ|0lx'_fk=TXZvN'\pe06Tҋ\,jX3G>Js JBJB5) X,LG%ky0>Kai|,Ņ,#KK\;ى +i!@&m4ZyD8'gB>m89HO.5O)?O/!ZYG2uidj1]tMС7K<D5%twJ52,2R &ojqE簆+5"ǘ] .ds Ձ:$:3#[y0 o>/ָa @ޒ$f^j(^_?ѵ/&O~<> y5kN'Mvʳ̩xQo&`qO "]fiMA_j)mӣq?ke^ vQ@́@?G_k_4{nR f@׀m4>]/<807tTuP #@<0 `ƨ0gt7xn1DmVO~ۡ~Wrrkp(8sq7C(]u ăLH3,Iff@i$3 8fܡeu-7tҹ:^\i3ǭYR@%;&ƚ:JԞP?6c?[ C DF7L40)ە~]6D9Aݧ8<< 2!JR ƉncE3C}9}yY/5-ECc@SfXY4qW0BeK\W\{/+JHhd#7}_ o38" hN][\{xe9E[_]^uIALA?jocTPDQTvڒj"!$Dl )~u݀y~zkG1p{3[fC!B  [H-:@AK&o4Pfg9OI>^_=yqUƌ|HsIʫs*'Wa| dA?f&ՀX CX3:p* v`:vUȝrdQ}0LH@HH*z+@lo-SehX'c?&B奢tkI/OߔQ `Knϩ|Wc˨Ըve )jϭ1~Y ?r!ISElHἻrV5k&5?t`FE Dٳ9RW3P"pF&ٔ^}g_,UX@%-ǃ2}f}"s}rr^ nC:':OoycQѶu_EʲTkt^!j@7hfh**@0l/9xPGaI>X+Q? 9MĂIxJ%u1*=UlߪmʠDT5m!I _HyA$*bf"+̀,ro.7x]]ZmSg1~qy@L@D@ d$ @$d Cp]έ:ߨ շTWѰ߯w %H@ B o #clN8$J֐L3Ֆe֠0iDD0[c*!3#ϳgJ-!,eJx-k曥rR" y]~FyA;-c c4L7q.Rԁ×%@x"VY+(X\`2 A·{<=|: lqyiFeG`fpV̫t#/ kߑyuU"fq֑}p( b4H룚#<`O1}Ci .&2ҷY ZޟHsKD.@" JHd/e,<2;Ϛ?b{|xs+ q2MAt#oe۔ͩIWȶY H/hh);uS5>`9lGq@֑ "NsÁ~jъ`TpHAHCwN7% Yk}b͜Df H;ݲm|K ]T?>S{﯆ֶcQ-Bخײ` tuy) ?7ň# FK89*DnK&5GRuWUF3ˍ=?xEq)'cb;S"~B;6;[4E9rf54֓π`iЩѽ i*'6b A+a|a:FĴ~x]ګ@m;JZ!N)ZSMک6<3ҝY3۵ hk@:_Fr*t^UrB-Jr\@΂&AX& %PUdS-?M~M4~Y'35f_ U SyXr47!t9Fm %U6P45B_DA(|)|95$#BJ7@7y)ݾW W EM>#bpEkƎ%E`NMЗނ zBDv2L~q=OБb%a,SZuBozpo)OL;9 a .*SN8RSO>};%iǠқ1&'4G_Q[?Y~~ٟxf][<~aJQ,ڻi5MbhC5e7w_eeSE1_m$%G^knDH/`x%]`= Sg؃ 9tTX8r^[""$u>;G1#$>hh 4-4w$2@r2;?o9b^g_$0(D !|fz?W¶pGv`?GлC9 l9ҤoPr3*@eP`a&(1bñuuRu6nn ϋJ?sXf@E$#r|s Zdй#Hz?Ya=/r| 8BQEa- !pG؆Ss~-KK8/&96{2mt| : 6pe=:V̨z:Rec{/j$rJr_"֥0ʓf%(,Tiu.Ivn_=!!%{BPf;CE&K/4Z'Δ8HNx \OfE\¡ I Xml.0{~*~v˵bi,=6ɩXz im7vih7?im{'tt TL߀0fQͺ\< D1wi v-=J"KeMN ҆Ỳa0 пc@GKu=\FI H079vB<( O<"2<εBj!UzzYBR+X|Dp]okjZZZF4R2]Ѵz|od2+ 5M6^t|n)RqqkW*6F78{R^TqUD (|'yY=Bo!Li]JvZyLzIi,y ΐ7iz{n߷T;yxw4q]^NvWl]ʷrk cQXcK&PnKvқvn?M?iVsn;Rq|q.[?A&+*2 $x,m+3vX5e $K%|Ya$ I0X1 i)H injxYp,xi7kPxk`q38a*r.@~9]2Lx$dz#Z8 q/<1_]FvP:8^uvs_G?Xn$l D kjE$mV|b̉e5hq2{-JyT';~jeWe7e EԦv9r -q^>YjLl/i Q(Ú?/Q[>=i5H&0 Mxq4>tLwpn71izy+K9`k2V_l~@32gSbBlx{WsBp=TJJC1,_|=g#C|^A ޵a_z@@#ʗn| ~{73?S|?(^pQ1GoVX" o|4HQBso*Dv1+YOeBjRiT>׆ߑ?~͹@YS! Cgi,8?uh$ՔAgsH t9WV :GKA|ނYzwTEx\N{#Mջalaٝ]+w)w6OEm0'c0?fr f]~-"\w)##= 4w?YУ|$ˏN﫣\eEй#7:U<qd`4U~p+6Q4LGQ9.b9\yU;٘z߁Ei}ϕ7Иpj9]Vp/8[},"@*8Kowm|ci_ t-v?Հ?/atb³qXWR/bqȾ9Ms[ %OU6H f@쌑bzŬJ蕶 '8a>s>,-hWm\V a )_10:ѸmZy.s>?8B>2%!Saɲ[Pe-lzsU3و Kо p}DP@:?|ĪIݼޜ!g'1ZLW61wWvwwwȭ%$j(i}HJGyeyTŽVM_WozK̄癭4s>eÍ8`0`0yx.ejoW^^xϘ>)A|>| ˗%rNb= hv4~Lr>~TF$_Y ȿoom0jj n=ͪ:;i2cƶ6z]Q)B!FQf\@8q{]:t:t: jܫZn͋~^0 ` ddr{,8j``0   vʺ{}Qo[* P+~~pvu˗$O^)@Az={=7|K$UI%fP΅D!B(A q¬'/|6bE|k`Nd(PB(A B~~eZ?p + X!0p8a G9r.u!bA|v݃`;w}{39}qxxs9c_"EAs!|O9/ WDkw1{R]VS8V'7Ogfwt3$W$D:HA c $T-r ^1DBLFK_q綥5Ja-̞<AlE$n Hk=fτԸ`RUSS_/uӉ$ >Jl7v8bww89\~y\#o_b"D-rRcYH'n|aB\_[Emf/fY~G6urݐ8ŸѽÎRjzV#>秬L_FD`! kuދ[YM xU"mOh $`vi64QTT. *$N{BV]h?>Cuн%£ U.*OO !o?ORZto_ʦ>A@Ӹy~8,ߚrq:hfm|$;:̫8d(!a'!̴6Z*+-^~!w/=.iTqيK[[W}ip+˭mnfeFN a\ ޣ,aiB+q-.7Yz|-N8**)ё}v#*J:_=_-+tqCyvJjkG#7 77,fe컜̬G!5XOZ?h=}}~.0' l֝+iܜ33ҭffeX)TYNj73S)s:,$d<=D<"z+ ;do&-%FJW%(YK-"΍#btoPQǎ:EDC7C`ݐIOeNsJcr(M>M>#~ϓ1w]],NN('gggm33Td$0E_,fo ʍ掍Ҏܻj9)ccv5nTH%-Q/rKkzwoDcv L1>`~SP b.ZiAvL5%bX4ce*\eƷC{h}:s >)#XUk}?wT9/^*QG"5RCQ~vx9|wmC}x*+8"3m:T7 cZ ?W#^?Zԟ_U_ `>|]\֡ .[K0[jwKw\|: BG1\X,):$j\ !qĞL@.p3 !e=p@KJ~>+MϘ]nE|fGohހ8#sDitIh?Qغ1ƫ-F& Hf29l%Y3E6 w H m3 rk+I}ڣe_c&&VQ![m 0TRR(Px@$)JRqVe*FdBH/` Yˏ.zvF2 /2.-:e@h/@֮/٧@-2UH!fZXL(0xI37_Oӯ* T_`j7qEVޞr(YThG`d_4z'r*@? 6[M~_ny8y\YLt+;adV˥i%Z'D5=u{ju3[k3v7@"#PlhpoCp}*l'#YpHo1k CXa'<] aN%aW1>?{DL,vmDcf0a4P@ X8@ &Q5 44,{m!J?_Ww.s/~?/6[qR^C%11xn7|Ah'z|h"FK78&ۻ#lmHtU) { 0:ZtlT\chte h=.{] tMx30ܮ]O A$MG:w7!D$"p=P3 ˂e?{xգ'3X\;&[-rY7+Y@tw% fsdi0Ua|_U~~[1 tMiDJ",s#} 2^'UX=7U:ˮκ8lj^Vk)t bY_?%X04vYk>%j(H05zW,k8@ 2PutC3ȧTK[\"csal?^wGD}wol#՝2ob˺+3S$L ߔ18گ5CZ:]>VwLo-J#h{K._K2a׸H$r\)?/B]}%.# jNI' I9HĭJCݎJr1ҙ2 zr3"RD9F \A]>%/݄,9&ܸɺq3tx&;);b!rza "#^TO!|yl,9mN9R{~"8tԍyoB'qqUި9&IנIe5zKau9c:&B#ߚZPzC7vxq̙΂0J8sU6Gvf `J ?m&ZK$輷:>KUB2 &98g8m XFUkuSE2䕔:2)G8J4,**T%'NC$uY'EƖIneK0R%)=q#o겒cPwЦ"è=Շm (Yԥ<@EgPnt@V#'nU]m M=dX2VrdX2iB_%V+㱤L xt Rᰭ<+*X.(͟/&׌e؂E2k]NkvrbVKէoq\"߳mYp:,ɻ|'BJIF.gkԹ({BT YE)12v\o#Rg`3 57[h:CqtEڥ1қBStKPU2alyFQxChN ]2Z H@Ӭ$ܒnm|T3ڕD4%4𘢹PN1g^ÔWZWM(^DejV2b8*Hr! 1=jE1XЄ(~TvEI 2pa (,$el-MIPx,Ăs@(JPwT)SХ&v+wEZuX *I ̠ib|(X* eх~v@yM^Gk ƺ\ Ct-Ji(P.8,3{oȧ=P6/xsqFY_-k.m]%vkYc@1!,`k%QS&Qds70T@HbƖNtqLy!L0x!hsVkƏ7 C{8Udc9r}S JT39C#-,4yc@- Ӳ+4QQw+\ Cd%`y?;V#h> U:cPF*us]s7F]zk\$!'X⅍Plw&;/-~4 }1ޔaYyN+IICGDX UW-"D0{RK8%_(A\C$)ñ: ^7wb>u`BŃ7y/@dcCOjv}$ Fcÿ/;kH{jKުff!pkJ[) cmM Lʂҧ쮊U!TLAS=%$ʑqUׯܽD~䆱Uo ш\ጐe:ΉI6pPP, .-&CU9 'OHI@6p,}niBJX,@WFYs@o|جyy?v$0\n.#߂>=>6q^v]mmXq"ӾB0|]v՛w' +&*O+5tѫ(٫Ow_5ۂySTO'7ɿך+k6\5w9d74{7x};0T o,ֽ%j@>Ev;˂q}r IҾwk%ro9K )|sk^4S.p$k~xLiDv(5{C,. TS *7@Wੇ-]懃RI!`HHA-yBL ( RK j(%lH(M3<V9*YLJM,b3'Zzۍofܹi ]X> ؏ǻQQ rJd"c0~?Z[x*M¥YQͱj?7QԻ'3ʜI~~unLo{c:_ g>s =3B?^~ v5| +,Y9(S7,&^՚-5V>j1vG5.cl کٝwZ0IBŵ%W8UJ-tU;Qѵ"Fٶ:x4[ 2¡/sKKKv6u }:}rw=fp)d_oeTE/lfA&4Bl2ṷ}8O -{'PQ-vC7mSy[ޣ+WxV ^wn!ۍ#{>?֐xR]`LI}* ,ȽKvX5?|3ct/ g%BtEN ZΧ9\q 0A^O;0)ߖ Xp@HZLVA7(NcL`?J+Abj`,DEhr!*K2#j<>E2T5uú \u<؆qh8b&oO8UΕ^CK{o23OkNv;7ȁA{c LY$QS'}+OZ{L2嵩x TxB@@`Hd8HRZy›_y),#>xʵ&!>gh|u]oqJshj~á!?6'~^g食673t=foW0й:g\\z9YmmۋwQC-g2q;N>OQyOҧ@jckS>[W'rFkceڷSVU]x\lhjvˮ~֏[PPnH݇C;v6R:mfm*~y=#R]}:D[m kc?/p/0ɉ֭)_׬7?ڛ|}rrJK>u oyg Q@[8ÙGI2 ~wwuH@tpϧ7Q~χ C i)GaHeJH^TNP9| "13z&(4Cy_ظ7+sqi@ǽɱ<ON eL![?k|׷7ߧԃ~ ِ D5LDhvy~/?u!YURX[Io(ꋮvJt,:W:NɎFwE4J喦;qO 2m8N?S)fe HB.A"z@+ p ?~vz((T~gG\ܰQIƕN8myq!Wgv_l5<ؽQvu=  6+PBIHXsr,HB$] RI[?hAx#M̊j;yy ™un">M6wњ3ٺ~D?\`KVr+P|Hs0bκ X# E)*h{y@$,ib^(f'ro~&`C'7i7#i\X gm7;6jCVX4/M"bPεǃ݅4=]?_)d&:q1G (<~yW=H8 N_ywro##InGF  K=_YBra` ̔%8Y<G 'Hlb.r ga,c*im{풖OSCj2a2@/h rJyN&HnYͬVԤ;t]+ާ_?_n?O#?kad%wkp˻S6 *_4L?V?(~ y͟pq{J*{iYy?}NB9bEç]ufeOY}߇d͎ yMnT̶WRܡBrĪ?Q2k_bv "ׇƤKԝ&456eHL=]HS3{@ܰI=>\%t砻VA g̉"b0;%D|(-+lX<6i*"y_ti=3=nׂNX78jZW4_R%Pvˀ:Rp@.ߚusy47_6-m^F9?a4t2FO)I;:}lT=32 (1:IQ9y;44(2) v]]y7- ÿ|s& ifbzs^y:fΙZ姰.C`KGLjP]m V%`s_S` v38x$=-KQ}?2ѽs9tGcosC|7.(+aKfXu" 染!3wF ;T^.UT7s'(e NE'D Id7>T0~ʝ׾za^n(죯%#q~Eqp65O(9o sҚc5]0b'?.w?Mttjρ=[eXe-]<wF<}/X& O~PB'J>QO4D> Syct۫;gq3O69]@snp$0Z+`sws,= \rꕏ V~eev_g0tZ$vS؛YW2",/Z7L4_<1S=<,JbwHhÃ#|^A*9@EFowow]E<+oNE{5`W[V}Ez)YB&33ыP۳NSnxX ](W FB>?$[/bT|ߩYp6Sw?cZ"8{mZO཭&H;8v;J'%rnuEeÎoK/AVC%`' p؟MU-p"[~OOzM%Cn;fgR BѝiJ *Av(+͗A&Y&)Wޥ-9B56^pk ckK![9<Ѽ|9 {$`ioA82!AxX $U"T/wXܪ5um(w52Y |Ps;"JYߥYd1ʘ1ۉ鈤ƨPI*"W`rޞ3Rh{T ^T2TPwiJ,:]@DOZ"ܜV6}R4 a7Wo!@|"9YwϤuTY"8,08P) .h_GI_VBa#bY| ,A%trAn#v;*Y?l[;yCLutNNQ0.W &$ ;FQi?eQHBwQ>@f SE|uaӟ^.pyHT<-s;Imt=b| zΝ?&Hq 7zIt@.ة؛˗cn\A@u(B(&EQHCi0sކ8ρ!;G*ϢX0dY9[B7|Ӈk;76maBvNv$?}u\^vHrKCG|}g&N@n~z]o7jhٵMk>L [>]ñ_:V ԰ػB;6A{y>7X&I"`9}=KͮyEAaz{-"H ؐR$AKC-vyڹO?"hFFL! Px7[c5V2 З*"gY (~ɰ <ԂW:qĒ b&!Ϛ[FӾ \,}:'Ժ~Hl@[]ӽ~Xyv^V?pAH|Ήnn[/uɹ\WDY~'hNvW@9󮇥 ,i!2MPOn0<돩p\Y= DÊA;2HR ZV"hLtMfDX'+m5qM=͝iTm%1VIWne R2^< '5 ](E=v_+.2JVem6B/D^n~7Y3{4.Ɍ8Lp简8E8yLS:T & c8@Έ 04jŐ{t`v=@!內w I:†Ț%r|}/N >#bE'2=u|Z 4.OLB\(`ae/a:v{7}%&xۗIr>GEǗwͫ5HN^^bi1lmb.SU*ZY%ٺ栎km5X[z[/QLu.փxӵD"QQńdQ%]c(2$ pZ_QG5 q0eal a餑9sZ%0{ )L% CBW M!Ra:.==(TW528e\?"q@E&ZJ.ɥc;QMGfroWL{ktpifgnw'*#Ă  ט 'p30djϚGql̕=&e9WttsN5IvxЮH2"ƬQFK1&ր(4DjdJ:bMMQk/zNnYb,?g19K:vJ!U95G%~YՠpytNpqZ7]""$ [[ H|e4Z7Ҟ* ypL@dBP1  iu'|gREvSGj w Q( 0sA'EApf ?/?&18@tqH[-{dc O0JCܳ<>I\kE#t8<56ADʐ0*ĖE׳6v%uh}`}9S(k7?(ҟǝ JgDM{s<<7N{`6 %f78@=RH% <7fwH"J,̮Sל颏xp_Ñ{,1 $ lTJvfJᮘ@/3'-9nQkf%Br4u$~v}[4q' cH۹4:8@Mʵ]r- ;m!V-³ .Q];3ŸQE[k}60g;^C ը6rԷv zAI䮓M6+_<*$y66$Ea$ M/`$HX36Z{PM^f]GE)BuXf&jxmE=Y_ۦz?{nr"#ףZ)0>vrA6;]ۈk%]-}RPit;e)Y>_UFn^RL:Jʧ<^9kdo܁ 2? (" ?s)پyωuy^.&HJ-H6Ս_CUouk]DpB%$I^:P$ȏ .q ːN0};qj?j8u)(0`@oë؆VgOFͶh<"yh("Te٘H jb:cK8Oi~#G ťb4k01g@,=%,lM[7^l>.e2I^/Z-jdab0KG Wo{ ٛ{Cqmc`-K2^5;~ީy·@7n _EFa@(T巰Vc fY+Tb)НvoOrYr΀@'#|uYvӚ%M5VHJ/"E& v]VŅV42Xu<5V6 pб=:1*Vhq"  e^#Yj-55XQ`^o7tz$#ϫK55,,U Dbe[\UX@NB@'çۗ:ߡsC27hZḨd?Ѵմzt߄y$Cсc}*!䢽]MIW0EQqcT-$LHDYut92ģχ6= ˂u ˎ(ad@1@ D2 Z UD]@J Jykɡ,WF!^KU;* qXl|F>OlCӫ(lS>x\wr!Y_ftQhB6" L !R|"guS ѣ>涬]%N8 g>(BHB 9C*O$M5cs~-_ĭ~y e'oe=WCF-m{ϿуK(i;~ts_d}_+a_}K&׵|5 uM/}F"hSj̫wSyv(^;~H S dѭ,6Io>m&$<VG ȳ R b당c?ǃ5NR99=g% tWD̙& OhvJ*LŠ.2b1!S=t(iW!LhPTi>1Kܠbi5W2F{W~ځ:}4JuZֵ(&eP&(a^R=MN:V`6/q5QxUa[lfҢm#6Xօ A9W`\.]xIùLأ6Z$wQqx0⑞؅瑕ZڂCfBb C]A?/ (9+B{?_  TbP1K5|6XҤ;``Y]{p>pτb|z;N%-'~ݯ8p9jRUkx>M啎æ|)OkuR'j<<PuSuEP1'Ԓ&5J=gJ{Nbj݉En?뺥fPf/m0кFoڲV)SLi^ RޘUv|R8m3.Nz_޴g|S]Ay=DUe)$h\6 Sy.^+vg#Gٵ`'~M+=M'# ̔>,~3I7iؿ\2 {Ew>̓[R!*!J25S(/I?ү h_ԏcxŏ}""Iݦ@Ԟ=D;8tȄZZXl8Nۄo܏q 1mj_ XySXd.fچqK)) }%^*7H;ZrL/pГBV[h>zT*y«2L 7D+EK j=P;FBwr򀈉@Dz3S:mRh3Ny5B8t5LKqA)&'^$SP"5bU܁H?,z {v&l2NǪ;$rqsf v^O3mq yPBD340!i\Sȸ#1okl3/h'^Qooò= 1g`~4r4mppx̱ E NĴ+5uY 8S 0Ni3F:0!w"4K QLBk@$f! B1BLܰw`fD$]$ LioqF-/۰3;ɱT(0ߴ.Gx6e{|q'M /y#vyc $ 9% "4CC)0~Ἦ\݉7gpإnݔ04ZjG~]2dUVU \=#LL0$Я0 1b#M㶗7Μ;c"y'wl?j«"л/|&,:} +Eɣ Ha]._.dÝ9d_ڭP*cg F7y)]Y6Ҳhd9Yb%k4' ,_ƈ=D Ec:4;&#a:F ~opNnq2:5JDHD@@8~I>K Q,EJ^\٠V]F-oo=O;aBo\9JENl#f\v5crfLcJB,{ȰHɏ]y4/s tx ! 0 #8"wwp1fF~!\ZZqqd7̷ѝ\Ղ#JŎULa|v $ a"ُGS^Q'wDI09ȁ}znkXl( 4YCCd?k ec,;j>0m #zM"wd|R`W̾17q%N1Y2θIdsI hk>dk|\c3pg'=dp`ɲ]P4NL+qjhـ~yz2?4>1-J{@'iS24fҁUu#`Yfw3(Gr%4wHrJ~xҙOd00rD7^Rѻ[Gj`yW钜 ^ckk2qn(2(jC/+օ?O 徨RrA ~Jh*6L ĊHQf#ox$";x$_f <&`J;lq$" 8 Ȭ/B xA@t-^hbjmBM&X>1;O`BH@A"+XL['m?lkksgһB0Q ޒFQ;N+P1H/_'R&_4I^DZS zǴg*\iTCjFӺy8ig`6rpIL,kD&fD5eA4m>%yZ\r39rsL }0"8yn^njo4K>ȲR7C9pxtP̔ Z o HR:\p +%,%-g!eHGfjߋn [c<$e$lnUTBFcIiض][U *$MYf׉#Ĭ=3yAt <&&ֻ+k/ߪPtC5-KlOo~i\8L' >yUS yD[r ΀,Lz[:`Eaw 7 @@[EF"\МwAtmD@"mԐ6YV2waij1iDxGyTjLvf,\&!~qʌw2B0Qٶ ̢z %zfCC/~*d;Y-9ch] zuo&?bhORv!z$h8H9G`^WWB)d $@vH$ _O5QyWr5j(Q7{f17pH V" `J) " *HX()`%H"$F!]0Owkءi, bxλy O )KSƽ>&Bާ?T ]fڦAen{ D|\s1d{ӏ q`@T7dAR 6qһcƴ174J 'TԎ/+ r4Ґ1~ë/-6f ـ 3yg$ 9UaV{zV._e^x}娕bvAXBuCO?P%&N@Rg2mA_6NSm؛q ;h) A`s(%^*:tDZXF KlWj*!>F++czpM׆JWHc"R]4ο>[xS۲ql(J-Μ)՜|&% C"o5Z*!0PٹԏK2=Clv5vuLK5hYKy1qgӜ_kW$hKO냣\pP*e%q1eSFGءsB\%l>-'.&gsƕ#Jn=*5bۓH5Ng'p~M%lj \zoֆͿǡ߷qsbEzk){RJ]KOEZpȻkPBLF,-yɬySL兯o٩B'*rVE۫EQaEPYWcƂG⬟HbJmIj~D++ &ģYJ88 |? ۿׁR)-8Gy8V= gwRfW 'ҏrwLCbHː ˼o}]"Ẑ+BuG$Wmnh/k :8IXrᧈ 1n>)ޟT5uV5jd7'Ѐ;ҭH:cs;nBPdG'p׫޵7[iA'o,`܄dTZ4~5P5  C] VA5xm̞[F}jv35]p#)B8ף-+*D!)'@G0}RkAe,AŌ6ZQ5$!C`k[R?76lHQNj' bqrP^n>ZDLoe4%|'-Co&P/$جٮ9o3g\8m%<\//㹨BҩKzF93 WufU v7-SZ_-VGGhf*4E#1N|Ό YIԔѴRbM$P8}>;ssat\- 4𡦅2|bk}RIOWUjdxê")-@l^-%=X/v&UhV2(=$Z57[+}Ș;P{=^**oYґ[S OG/xZO!G2k^'.xrHa͏V$mefiT֓ȒϧP0lخh@pIi:r([)^v 9鉻!S*|*C٪2{ˌj:")+[W}!ElZ ol~X>T ,\'+Dl<<'M=G@ {;GUghi)0}qmz7NPVіpXvNaDFBJ0ɠ/& 05.ZKH}ZoفٮdupU s?nżPԖ&VŻa #mG9yeD(%<$k]{8^y8;w&r+3Ct6XO*_ƳG'_}@~,0z5g&yfYa] ɵDZ\/\#/g~Jd(`&C\?K,A S^\9ma;K"6F.j@:TY 4r$KtÄgD\<N<vH{"zOXo&u2蝷 ŕTs4KGK]U̱4~ZZie1Ŧ.cPMOU?gE@S$o~*Q|_ZӽNkxu9\pLSW,^I_VU 􊇯dLbF ncʿJHh"v EM6ˁJ֝Q*b-RP7ө3 a f,w#-SbRHU ?oܿ 'N#&xg>~ӗTnazDz^LM6O4ŐgMsD|LQ9Ilh}v6r7-=(qwBrd>"V_t]'Di}SlLEEӚr6X^g{pNv/pd uA6.8sԨ Gx}]- ?kWSi9fW+DzxʞYR0`v@5H=cm VD⣆3lK% DlS+b.jiTuWdk~!x0悗C-(|WhC*%19sq,ҳfTw/n3b dRꆌwa( 䓍ulrMG>Pɩ`-K.$kE8 $Ҕy LY(UTVyzS" mԾ:>G^~N/;Tuuke.G"kgѨ&u~pyVK(- K2u$/M}ow/kW Ap3 v Xi%"}=P@ڛTj:\H|rӱ͏!FÓy#!tAȖVcY+~':WB*(xeZRC]w/jzn|'@X QuO.iYۭ #փY@Ҳ""#wϯ6:8({LlwYڰ*ЃzGiӬb]))pY 3D=~_yvC ^΁mOkSeOGV[GqJWލ ЩH~$3(ZyvF@3 Wʼnc`H}o< L&/*^rEN z ?QZ12X&\f:5PQҖ %Dͻ96`P/Pv@Oe"(2+W|qĖ݌`oZ(Z:xHH/!؃IbWW0H bSipn@h $NOf~}ʻ v(< Mm*e\/,PMT윈xϒ6k'!lO j\s~} =?c)LQ;A ђMĮ} Fpxק jk%mx$nhѦr:OMi, m9je8J,nڔX֪㱄P ţ8:tiy7Jq3ZP͒JJFMQqvYN4Vkf'^\SI7g\ʙOFK\j3Q I2pZ$ }g\/eiWesx  $I&*gx$fz׍Ğn K#f#a+'($>gRx!=qxZG4ZY'jP2&x:/Kx√Ei{*}$z+kQ8x m Ha+L 0$J"Nls[ RY0<{h퀍Z#RF#զd488:+CbUӦ~X^7H\kv}%5x?䳨ܔ:n&;oDjgS(yn@PeP=&gaڏ艣c4 I ɿ1ܚ")LLuDwpH$Adyq`pM`^qL)N*Y^H f3OSLfBc4lo PT `KE4.3ȑA'N'9BS ovMQa(4sKHyk([|/) !i$J 8Uu˧yx@Ɏ^}` xqMߴ`DM9 /9Yjº(8Tq!{=*?!['dE @/ur:Gtfr_+bA| }bo_Kɿ%b YⰼYPCCI-DbGu%r@r &A&zsfZ@y̟IGdž ew۪+l [ZD$`>?Os0Z'IUH۳^!yv6 C+'s{RM [!}m{ϪͿeI]@/ojY'` z-ji)`3&ED/ݟY`5l8_X&DKm@6v5 *R>ʱn<'3;"L3\Ƥ*҂!#o)?5AT '4|=*:z9˩)sCsa.k(cQ kfC[-߲QN:!^CMxmC.YӸ6G۵v }z̡wQ;OBQk̬F6~ Lg3+J ^(˜ 3 Y#Fς3^ۺX͢{ńx\IPeO/i;i% ہJ45;T Rd^w<%=@nzE mBC^6>+=󤸆a-s{ еKrBAi0UkG7!9+_zֿltGӿx^U)/.S#C2s$5]XoT`wn.2u{pPxw..+JU 3%2aZMBTB]-O1@z0hvAΥo`a٦0`aZvŢ,;~P2PoT)-;Ҷ4`N"a5ǘ&=4Twtq S?9KG[^@msIk7D;kf'ꗹF A;bQ -װq G}sƽiB-&GL̴ճ=\3:%x,:Ϥ6bGMւQۨf{6;ZJbI\E}/>X = !8׻b~]_UlPH(ԁAhr9 RΨ qmrw2BNLl&:ұW4ыJYUrq #cZ#JOe7 ƢebSJaIJ"x2 &\䬪flNC?nw[e\@$VUP0lcy~HI4\]R:5`wy=(k~FW֏z#VPJU݅Ű0Z4O}q:y9 6+TcA:m>xD_ѩ ./suA~ވo2@vT56tlc庐Y>SO,Nwcݚ3~ca(4IWCNMޮwq] *OȬ/Xu<0A u1ޭvUt?(ߤ ;uZ =XG# dD٠>WNq  >NC!PAY:!NKʒ{a;/ժHLkDp#sG:UC5xnXV Cd Q[Y"9Jwo!a*ChO&6}J\HD1Ф,3a5MuN3jjq m w/At"],G' l8^+Mʵdj fmќ?P+3J!*Q_4] v[EJ=&# I͞2LxAo"|[QǤS"jJ}v=rۥ񟇍KmqJw( Mm)Yg׬pzڢaaiqkABse8"I| &!Λog#E+󷝈\ 8#,7BTq=%}UʽaVRRDs8 gzV]FC-Ϝ Bً5_1mC(aɾzE8wӨ~`B@d!C}2aə7z:Cw/PflAg*%GCFX]z7h T+فK$?{f2H2֨ .P(ka-=,#Ue N|I+0h:-ճrťW巌5AXnhvPK!j04ux{/uQی=atv:WqQYCiY }_ʠTB8? uhzgYE?|uρ`jK_ot$7.Axjo.~g\s Δoϻ=x^w"]͇yMb¼&D6H=R%V8 ~ReuD;i!-n_\9D1SQ>gܧ~N+٬:\\UNhw%ð|6})x+4" T + Q37b=Vf.B~{ZE긐xNqЉq8Du3`,p=C*lA%*Fat>!R0`MV{QpzLcoɽ1\ ^nF;9ͻe{}p_fuN<ȭj ?>6)W4g jO wu1^=EZ&<1|ԘTsa B@51[*B[$kWh9{+t^^ 4y覭:PAu曯W3|?A#Z;KmuI JAkDǀ60F䁰<5($9. $x bPh̅GH=}vo3ݫלN=sSehFh.ЋnqxX+t@k*Pͅ"|푻]Qr8w b9<Ta:aV`{.-tjte u )E y.oakQ݉ڦ̘#,(m^ rlt \]vN'Tlq)[]~iDF34$UgVV%Q"PR ]n+rSʣPJnR۵TG 4΄:eWH y5A|ƞ{aGSEۭ0>{=4Rߤc3p>9g8%e(Li=ٞU 6cc³mjzViTдG'NwЮͥ1E]h_NP$cYV\ NWmPl+,4 6ysaxi2$ =&C6pT|woVz{hLr(];(ZZLʟ<}]f̏p{]5j{"ZI4)ryJ}D`=s!q3w^k:R3e,,U4G.q4}5(p{12?b "UebZΖH(*S Ɵw jgmܝ] 4A3)kXa%MeT1&j\x;Ae&GDlcIJZzbmsuHG%|NYAÍW5/Z]ԃ8ѫnfeROIqc{bd=̯MIőh=BKv)zϰ{]/0IQGJq&JFY+TzQ~}͡EMnF_q#_6}tu .cWg̯M W{D:Wi~fɼ*^ Bq&EMhE]S< %R?M-R M8{>-]M~q$C`~tive[w4"/p1X@x21y:f|\'- h"D~Q x|Yo^߽`[^ fhOFdQ/}IP{7ʧzY;mpu6)6\\2QQ5:~6▊r=q?3a) ]V:PN]del+=5p?:ˎ*{8M5P$$ECID m4Q%0G՟uaNAS&B*BRڒE-5!ԶG%drAMmQO| "9&5+b_PAO!d .DbMo]=ajn]N`cW7=]H$$@\/'Th"Snv01}LG`βvtz@ ȃ&f8#f|KیuBl[|uu[MSb U+mZ\.6ҜyC?SZ<]G:˾ !QInQD@?F1]ٹ܍4wiڜ5<.l~2˯jwc_<*Cfڴɠ07I'1r)z"T hW~~dyd$IKCH򯜝*$90ZrRc~:@ˡE_>y/oN޼5~w5?A4/]e)<,g=d"ğ*r)Z-~ 87Fo|3Юg=@2w2bOZ7 oc@s(1W}dْPK#̀%۠;WtY<M.1y7h ős4m (&Ѭ@R8^oXvy6x顢ݼ;H:?$Ү1v ![d!<QrN|8:~&z!LJHZ9M7l 5Z\lfHM*av±jէdgϾt1e^[ c%VqO ACaDGTKM{`Qի.dkӉ5|~/|.=&<4ǣ|H#(W0\w=} ت@[:܋0,==e5D[0 gW?LiCumsY4QaC$u_9?{ E&E`_l^W˹t/Fd]@u_:d[hP!Ŝ6lwO/@-,!9UPeJY5k= HPy돁ߑ7݊LLș"lK|V>4fEbX}3ǺT߿$p/z-H^6>SG'62Fʭ: Y-GSt#jˆ2Q1G9J,jg< -`\-! SCk9.|cMTY.&/UFeɵjLDU;er:qwb&CM b2Q5q@@4 /Pzt8Ƽ;9^BЭ^V7skv E :ކ5Bw%Y()6,TJ~'R` 5} K]y6?:Oef`]"Ǘdޣ_l;?ewb'kҍSB`֘^kMY[8OO?1oyS+ZS?rfEjYNpu"x|XNaS=ubso87g$ ;Qk{]|Z+5_mz[omȐ85ØWjQixu!Disx >,H;'2x}Ʉ I,C-ІV@ETVdEұ+/8WV35hD *R1 7nEZI^etYx8}ڍz L!T6rDD5%8><Ns*D }CZ0hU C,Ga<;/wWE2LAnF(2+Ϸ~1I܁yόڀBW=OonnE0V5Pxok&)$ -\'m}X(O s너&P>@]^co^C(<;0\mi " erm8^t8c@\cw PЛW}Dni<DIn cFʾ>hugz- QlSk '|ū WLdڏ@zl.Hu7hif %5h|tbHn$a}Ufs>8Z7UT SOkjc:_n`iHH6n7yfE_׻!,8No#OJ/*8:0eOJ${72ۗന0<4k>`{Bav^Jp˽}H`tu=zKăad[a.'@!L/MV9k ]4ewZ}YШ湗p5/AQc"B,16pSK<#*Cw͢QP4dyfmɆ!e !V/x0\"W3_C +NǻH\@+A9nѼ&!:M-G\xc̆PQ~au`OI|4Ұg,dBdy%tinr0>eI%ٖjD)C+*$/Žl Fg-@uBzXxclosKp4Oתo-GZ} ěǘ.NR5Zɔ_y՗ ]t=#2|oGBɞUzRp-&]2Ȋ "+aASrX ^[g0OE _Q(!LVmL?Jdڊװ'U9&F5p^^6rV޴=%HG%o1xsk6ÜJ߻$[P^[-n0GiA: 6ww`4+!H8! >A5Mk< Xр,D3ĕ"l-&tmFدPZe~G&Z6 }EYQmZ!mg71QKXnD"/&Pf؍δg49JHfXʳ%9 )d!hYtSGW9 Z LDqnuh2\ڝc9f+o`RxoH3WL jfZ )N]o;@T|9aS)"*]6՜ \|g: D( e0=۾+{{ ,a>z?]A"ѵ8XQXXK6F] #`ӟei A}]HLgd_etCBZ54F}T;|:X̬Aݒai iOя[>Ě@2ζplū<8+G_9A1L~R9յ0"In` (",Q:q(<.-w8EZc/jf"J,tzvu hA2,F*m{7m9T>0aݠb3?cnJ^OqN5f\ʮz|F>!+{kD,{>y(j<)C/Rb]*X.y ܗ8Ơ6Ռ-Y9B8pniJ >GC8e:@hI8ác.2̴v jsj(9co6Eз~RCbbUق 3Rډ D_ xIՈԓ-b./U%'lYs|HqN;Gjgi0 q'jֻFl'n!Cp`Ȍug`.|=k)Xw.r2lz hr%k3,Λk GIǻ)fPmy_T Pi)7t`XlP-\nk_aDJ .WTO5t)̒>녲 U$;'~?R^$3)EL~ƐI|]%C!Sc hߩ"z Kp0־m{TYw'%صOeUm|bj8fnr{"H~0ț}dxhxW2iUē 7ɘJ2+paJZ/tϳ`M ZeR+("?CS6P8zEkckp5 ~S>?6Y,r<|Jh-BO e{xyRMpK *=lbIR};7~.RNuʋh lK$pO- zǼˤ7zߴ?VJ1.0/_g~.l}#{lm19]Y$~|HF{N 첪ZOqHICh,쑓WUl''8Oa1鼻a&ЉbHʲ YA 50J8_\~SΫ;l8xC5S֖rZM)lG鄈eRu |4&4bW@ܻ2!~sOL-(stdF {cq#z5Bfoz1P` yÇW5P6o?6U8޺֏Oh rپ(w=`,_QMn4 `j]o kEt9re1k<qhN|*0L##/vFVod6F {Ȃy86wi~\cf`p,7mv5}H/z _ CUZ,XP"vO*-bI dg|kl컾x2лߛg* /8mV\1p0Y#e,= i~ة-_'FrC16a~ 0dlZ$h߄ Ifc\b(cM.pe˺_Wja|/uƽGܲ'LT]axQCU& Inn~ٿ6D]lu 8zc:kj-Vd%YB7qD <ʗ"4i2*$V2vqF}%z/ ԦCT-C?K$EeӝpvC|:HX`Y=EoJMk0V];Rq hBZRkvF uXfgdUhn$IMYp(KL[_;*Q D4k>P칔-67ڣl N/}==:j_}qc;TmzȽ?jk^ӍXz/jGgjaw(luz_ذh 0w8ُpWd[uIѴ|iwQ;'b=]2ݫa*&3 գ=.qŎde3 q7{ i:TdlAw&聁o =$7i/+A±qQ5yD>9[. j:F{:Mey/^eG"L,ûFJւxqTxu=NPڭH#|D{18F #iSnuvqy}Hr}SL&IUzE ш9!M,%6>xxYUt8&J ^& 1͈G:)-$[Hpΐs~q=L \'֤̏{qﵾ,Q~63Lҡ8@?SU '*9>Ӿ uq#f|V1h9"olPER&2S)yd,k)ǘ҄6 >fCڧdo;nT/6‰ig-_p`xy4l+NioJ~%6DZ0-T8 T'SK\}M v=d:OM1\[݅j'_hw%{xF:/ze)ɚH)+߉nN||}(A\?.u$Y {HFv>A4%JbL'.'3 8][V]#Qƺ]J?RK>Ǣd>/eeC4E,hí8Des^H1ӍQ9EzSXKZ1]3oJwZufH8Klc9E_N87(hv,9~5.كU`P2:z"%gƃ޷X`Hx >$J,[w#1+۫fQn@eن|M\j *##A+QivOpǔ%pL,xJ.lV]C{{ߣ2tȩ,Gݲy}WxAAfx{{.W3jU?5:y"-"| }|ҝR?֍ZݍtSh`m$ f<{xCq/ϋh趡V]j^.ܟ΁E xaݙyf2OFf<7R\3ɟC-uO?ycJHP ȇW|)q8!%@-GB_͂= VP ^ڞu\1B+%>dsA2IzMqU:PL .U}OcFڭ?N2WV_b=j_QbS}H@ ٘.t:O ^`RZm$KEuԨyisX߷nR@1MV\d˃e84" y.V%%7.Q'KVr 5>G~O5ZK4qN PB@+$LeE_9IDRUq:#_X5o]:dN4"f`&pq yz皅QQQK~mHUb˄2ZKڳ7Z_C1ϻ7V6i*lnG9$ڎ~WGMqsst)g %ȣ3O'-xx%`.3;8.OuJWy\ 5e&qـrwz[+g' g{a?^X-,C˃ݖ6yYy|in2<YQcipRR- Mlf&[\{Q !l'/AJh9gs?R, gr:tZHb{?Octt* M|4^H@ lVL=KղyӼܰߐp"wڸ\7I>m܁,T=H6EXZ }Bz]yIXNQ_<Z gG ^($voF'>(5 {|fŌ!4(y\l°76)w %]ь-s95DF!KhJm+9=Du1,xJ7oJ襭Ʈ*rb!i{yJ'fcGB:v8ʑ'2n8[[2|&h`2-asFgzT0FPZ@qůq5)٘b\(l)Q6eMcxh;yhOz 6프ݷȘ?m|& .2QjPuvĘ Fݚ3_"b24#ݬg1NnraBTl1[?|+=n|yԮ16@`C$ډZ`ؑ,\^ǯA~ 6**9uSQPyc2|e1?qL%Wc\X\ܳ]9[I;k.UMz}eh:wXyPY&"EF烠Rl nZ.x{G_jw C{~䈍=qCwn/u cz>Na!)q쾦)Mu00G-jrY&mK nNRX<>:d;sA0?( Z|>>3i>lFD8u4G'WǰU-zu⪐(7)+6q#kcqa諸8:53 bɵKk"L|?KИn1c^w=>^e#044G`N e<|&b0r%'i0SQ&Ær|~賡ץz~ w<_K[~ol.! 0@hBܵ2Xu#v +3"9dqNã݇JZ*7wUoso!f+kxerFm hR -8MhȧWZH/I&eM%?wZYp 3^!KvG4ߟMN+HPt뮣=c\~.idLߊGB-@`~yP.oE8_F`o-\ $)S Q&v] S{:PK[AYcklpn,*WȬ PK2E[94^!={#PD>BF_@ʦ)\8ywꋟ_׵`6\K\D){,ϱ.sD_% Ռpm%ݖv 9^V@9!U`BsoTg ? (C$#?|Tz@ޱ7 nY\>pO.,a<˻" jo aØBqu\D.%1œ`` C{>j*eȩ%NDFq9s|e!u,@ݧMߋ=埲#FޘYas֞TKiCH*;@Kv&hWdt) Â0.9ZѪ<˛B$:D ^b8̍]6e7;lՂª;ы)8ӧ~e-VL|D ]]%;~FMKw%?7Bkhgw>b@+ΧQS9?2K8?X tNPrnggTQQb鎅:Ay!7x'&@b8SfFMqNLJ,B/7\lЙb@Vjb\| rxh#? Q`n^_`ܟVEO$Gx T孺U1X ѡ>u;?=I1v"Ԡeix$HQw l>22c 1G+h oNœIiV}>#w&HW6x~t:mKa ]=w,9y$pHu|T|$0w☘`= h[،9w-eƂ rg+ǀMZz_, WPδUKqeϼnxJ:i^ž>"{wJ{W o,a_$qMHσ,vmvڪZNEKhH񐈖k#*OZA6tUmDbϞed:LS9D}cFjé(%ibݽWqG+w*6uO+Ke+Ե|pRY H s1嘊kC2ﰊ+έΑr7'vmh[i{_OAx#Էlyo9am/{w#:N:|P"ϲP`'|BϪ`Ln0榮T>ImD1#" pܿ2I# ˌFE9&ًbЩC l$/4 :=ɼρ TT7/Enle.Ź19$S?$pYm !XhQi2# nDOkk؄vAw ! "s]]=ŨJo8L X`߶y8lF\ye@aDy΁Iل;$|J@4Y\^3?Tf qPbpK FܑTLG{-* ljN24mtn7`%kmxQcbN &FZ/iw)kBHŦD?5$UJ6Tke6Z`O gi%4~tj'pKCCE7tp{1!Қ j-^BW#okoԬvSd+[$m~1@V(*HJ:?FEZrmO R8 -eFǻwFAy]TiIIS.N|'xr`jRjȒmA+{y%hqm I[ ]7ilfad%u!3gf،e "7}, 24ζ~ $!Ё/e4˥X PgP.z#x[k Ǵ0f ώ<ҽQZdoI}tgfۍIjvs.=j v9=/B 6PYt0w,KVDcjxh㯀_<]']4pRhfqK3qٵ9(ɩeZ!{U/߀@g#F"J.ߧHöE6sR~:!bQWj ~ؚ)"/vFӾW:J-F%KL@}95,a_ ׍*0emۂyn^ZoHr&"‡FZIhkXh;:VV"Y xdߣEګ|[j\ءF*+Y,^c~Wm#1o 2" {/ڋ1x컴VOȔ2rOlNdeGs 3 ELڮRJ% }kҗaqyFPH:/nr!xH8q7A F2ޢhpqߤS4"DA@ q;Y99V<ѵtⳭw}stmMˇhWc)r5q\f̞֮+]_06DFNKEXvk@m[½wu_+YM-3vՕ:ڒZ15ȜZ} Xgp } \~ͦh_p&'=Tt4,0̒1E“nkQ5+} {2|O7?|ZHg6KX/ni *~Ruh2ؙYh>poA?]HǺk8dxHdbƲ,@qAxbrѝw+q/wbx[fJ4CS}:d@2 /Oq#Ե0ۆCtJR>^S|nN֤&qtW^,ᬀ7 HDJG E[h%H$ Ω7 ? \_4-5DjBN בUDHpo*e VnQʘ0#je:q\.iP}י`7Cw-TLƀԵrwSbnӈ[(@?}#j ?U4-Pؼ=om^_s%&ԛi!Wګ 먂H&4(n$1K|.M[_Iߨr<2<#4;禭| MqJ79 o6ϕ~bRJSԪm(jA ۋ=;RV߿<)7*OX8mKnQ„0](*h#n@zqtc- X/2ƞ%J$pVHTz Aל %lB~mM4P,G%O,3D-U!Q,=bScIW-o^4y)$Ey(}D#MonlL~8fj+ZPA1} k4)z^h$MX}1)2 6sz p]7_{!m55ῢClMSE@aDeVQ7?f@C.P^1+@@DrXIJHۧIT`P ]Qg_˻O!,gm)(} UihՍ4BNj~eIL*0J-j;Tke{ƌL5jLYy7.)֒Y^ ^0F|# G_{޹fG[btb)zԛޑkQ3ޓP9ObUAaUB6d"8 vDl}ƗAqTpQ4=e!Tކ8y;:d-<bn~JMn$v4zJi{9lOpyA1BָjXIU7w%܁z$~}(, )!hrq{#(볅|CRy2##M?o"!_Y^;']1:!p0pc1%T/ U8D pE<>y f-μrfco1S}SprR3G )ԕv.*+?{ @KvЂ"ȧCߤ$>+Y[vX6D1˺Z6}mz[ö:zyGEٌM*"hmhZsf|EtZ/|-7<|$K!8BDz r&rM! ¿?[$u|p7#i"n"atha׌p`8Ck0K!o8lj'4}8U=K5En4c 'RZ}v,WZ-b_KAATͮ_d 4C.Fú¾7qn;۪OZOzy[K׮+9G4$H88R *ʱ -EkeD[N %('6ܒ2 "N |LĎ9SDjW e^Q1"Q7hmՏ+z4es\A9L8#xRE$B|l .H@mOO} JN #6O^RӎtަTǯ3\m(>y[,&46:Fi팁i{?4s1B$SfC0aO7ׂJƺb̒^Zsu' !svm@+K:~UOR0pٍJZ߷DR\$)?-cMĩwJsEMeĠ"-]Bqx:y&]rnˊXI[^ R/X^k6+prājB&xQ٥,)lE] Sb\? pRDeؗ#'hdh%w:iHuUhM)(諦M:(jFwTK7:cd'd7vPTYph_l:  #IS_π!O+6# _oM8)D%PUk3ҴXTLmGāXL!V]:M[WK,U~NlC$=_# @k 82x},v!3Tj&u'B?~( b$4R+ #V(&>^ӄ/(ꎻO *58r=("4Jy X*zWп.EH/#5=}c?ˏqLHԡ+z*\UUqStk.f\&T})87v֋g<ύ/''BAS9UnT!RuMei1/wfŧH < j3e1jwTj%㿴;! % 9prv'(k4a.)6#ҽ=??# Õb[.Ҡk<5|AFh*82芵Y0YHw \Tv)_ GnG}dk C\eZ/ GY;Wa52=9ebpZhitz{V~ n~X0@I"@e^%WXv*ϸh+bL'/~8=P% vnRR)'\!:>]=zCoƁkJ%A鶇6A"jaŮHJwcFnē|x GKky!fZ֦Mg*MᙯKdq|yc 6t$ Օa-CӬ0J7#7Pw a_ ET)3 V΀ aH7Wg<7uQAӼ{~OO@'OT\qG[T*^O?a®e5pp*>mw.ZL6ɍL& L^" |nԈ21{ fTxIXY[S8V ;.*z?f^~ƽE"Ysm}ӲV yUqĴP\̥5v)h Kzag̰+3] kQ1<37v2Ba# .3-%#*uYZ$K$Yj'[s`xHlXs9GsB_D]9.rmuK J֘9qă w޶T3UK-ՋyqEBeR&u%^f--eB‹0TXjĀv4MvXG;]8O\:D yOd>ATR3B \ +X|2A5*%Gi&U1Pc6H#O}?-#@Mlg\nXuUK|4wu!iG+Srz11|5RS洵ǽ->FN? W/C үqܘxDڃiGl:(߆;QUʺEEed63{"*rFJw|ѓ=}B.\t@yf4If)DԆI6Ruʀ:/Mb|́myIƕGh*׮;|.F.1̢ 8.|sȋtH< *Xdj@rFꬤ)XT>FUm?]-y,S^54À`&h'ĊO--y m:@n0YP}1~+D#W!zD#*be&:@fVPu;zʖHK0<}R{@QуQ&ړȂTQNX +8'T +gTaFP@K!lF$I}1vVM4wb,f$X+.M@h"_{4Sٽ-|fH'#e>Xqm2hYI=<27pLDT=c"'3OXnJIEQNbwLI>!"NZ-&7UgKcb KSk e }KuV=%?.f j|}1N8cVW֋V><cwQ&nY9D5+*ĤVR]UgTbL΋Afe2Sq!}IA瑋qtz1N5øk;lVM ,rLς:b}"˪vi"5Epky q% gEZM L.&!pa{ܽfkvHv)JrXO-a{MՍN8JyӁ\M*l•X}yf6֑h%F'؂',ܖ(%ۧYK:Uٕ8A} {<ޯd}TJ "V*G{D;/ſ.;`c:뙣KQ3Rؔ'(EZ#2pf |@OoN7UcPiH8ΔP 8)T-}k}oQfܬ8N 2Of߳zA,QZG* Ӵ+_ ǦF$򓾫.|sTҌQ,v}~W83N-0% ʒ'a BX^jn?ph[Z@3 `4S_ĒxE =+~ ]IƲEvDUN5c9XׅaK ,4Qru1[EhKO }A5#K8=&k;6 WS XT2o#Fg8% zn>;\g^B}:Ŋ -`g3Ob즳Ydmp}ehp;OAZ~>lֆ u",# %e}1, 3kܢj˶OK" b;'"+JyBfDԥ:;Ez십a貴)<44rp)0.=[*Cݪ.t>$w?+tn+fLBҐöƸ[.hs =xnN'ΑPԊ~`AbYuL3z<6n*09 %pML}|~Ù j-$ީThL Xcj=JN bx|0ս5}MPwX}^K~u}'c3mv+Z9P)#tꉡe$U!Tmگ{1wgQ]:k9M '\l7+@{M9jyS[tPes9ũԸr:Sqo/;puônW";* q(C] *B[BBb`'h scI<.j"0p@5%h\cЫ$wlN. 6M]7EۭF*OYrP4]\[!N I ziv;e :œD-`xd\?% Q^ifMDK4w WN(u>H.BrDzͩp'lQ 6}!+Ջ{“vk_ɦ!H oD.T<(2vS%6~6+ ANJ! d i?T:HpmVxe:g{%⣳բ[Lؽ!F`|6˯Hkٌoz,J^@pה~P` =-OPYgiF:#,~ɴZ&6ރv3䰊/LtNviZYHI*4Y,Ĵe2iC8Um#oCnsjSH `͚QY7ѪNQрh0( *JZpjmb_PI?%ɿCNsf`<j_e/KK'9C_>6˪սmf]o`Rsb&*5^c<>|a10ln ST˾ϫ`9#~D`p4$ih]il1D^-!TY.Ul; i/ř?hKJKjLap!c$$~8+iOnluֆ&h#404 1Gf8aNT=J9OcPbj=7[Lj#Qr1oOZx70T供'.(?⃓lMf) W:]5k;8Џlo}c1|7V2EI0BՃzf/֏D<.1=ҙ`lɂ:kGLܾ=Rq!AP5k/u=k#|vD~ R xVZ?vXw2HvD9!#^KFթ9W>I Tba^w^W++OUxa´gNC- W`bM[#sѭ!-(i5[-|EOC r٨[M:gu%@O(Oc@a"~tghgWvegfw+`-4.S߼(|TM ={)3 0_nJ!@;a*fG]'T!u2*h䞭çNPNCvЍY,=,3&?n[T-(" u;s<+ll8]'e2:Ŏ>;<~@Ջ;!+! d{{[R4tx憟*TrH,P]1Oe+;]ڄšק]=/>Æ2s5bEy%Yرpen+@8+8888,e- !2TՑJͪXȤ)0eN;t]N姿j,jqIv=v|ɸ7i!v=W!!V64v)B;P*0웚r?#"7_:-3Ë'<Ʋ A:CLQ!4X_D;/qkNDԗN>4XS LWGɔ=(TP}n`Ɓ'D{@MͷȂӧa4Rj=h_hjZ]hKT)#6k!;zJ3l: zX8f> [FLP4fލZaweDdeٻhtܟ۞ڛdxC$i<0% xvQ*PQ, 8~ !G?!!?BN)CS \궷Z.Gˆ*SHFed&;YsZJ 7X2 4_I.0#0:lnS(ՠP@p>d @84v-7)fC-K9Glh(2^"C@ uh|/U)ax9;-b#m֎rmj7#ΡN{Q~!{h$枔 e/|q&xඊ{w%3*b\-|QΔXS'ߝgZ ٪@ʬ\㽰,XN*"0cdK foƽ3n%MĎ"top(z&D/_WAKz}v2K<8`^@E򋋞$zM ",9/l;ϔv>댄&̅ȩ͞cR MI*HO>9uiF&9'{XYP6v797\yXaM# ꛋ"goB 0Iyq㔧I&}(>('YeeZO Y2[bۊ0n<?yg?T0Qrx|1v<`6lYN)t5D'j~8"p(;C͐ YqÀvMy֡W'\WL02@XUEwh9% Nb=-d.ÜTx@ؚ,O6\leqvKH&m98q&Ldm3p c^:w0#=?VvS Qb^K؀R/0x1,c.DLمRwCVj+huzaTh<YM8r \rXWCceWRu%ȈL Q+ɀ evF9ȔL/$p6;˵4J"_k\-${0~TIƒIHl C_ϠG E;AM1g,cbcۋTcݻ1꺞"ڗ~Sۂ=FcaؖO륾D^)_F1ڊ)C[m![KAC.>W̺UJ擄x5 @a/(yDv/W8~e.SE ,:O T,hƯ.[/EKcC˩t_ʚϽTi>o0;jP 7.WF?Ŏӊ4G-.y&#H1 -ImS()U`@4r *.g/V>u-L eQGj@8XY7GIaZ->OXn^~cQ*J{ U١VjS]/WV@8ykgJ?`aZ {v.&gE(?۔^ ~o?pBӰ 7gKKTl5X:Y0ee3uLp=++ʎFۼM 5m=HkStk<Н_XhSMLHl)eβF~Kvn"8ߡser  ?t+̥%̥p}sOw4US#ncDJaiQu !80ɦLPP͕gl(UvH巷k za Ce2iBJfԹ>!.7k$U驪2Gx6onO^ԁ1x{%OY"ZxDuu,UfJ-viܦ8 M..@y/vƖ X!dlP2 xcDCpuvTE}LLYKP=ut}8 od; Yj'+vEc,DpeskwN=/,ťB_o:~nd|1؆buLV+ƣ[\fa#rGΦ!Nx?5/6az@f*>(djHza,d1@j772 V`7sI0S v}ZC|i2Gm%oxi1J3ͭŸ$sd zU,~k[W`Q rIKXrP緐d|ʈּ߀n}E0M "6J%{8hR0ddVY[m\p~>vkG;b`LbDynf<͸Di=qE[o~K|͖iCЀ۞SMV)^Wik%ulnhׅo2a m)ռ. @ ˯&ě25(G5M|2^}\8}7ei #x P&Be-{TP\T$<}bsM{*"]5AJ_9BY`a,ýIMV-z IK <3:HC`XLj3ex0&P6L3\ hH)t1N;ޖ$k>9 X6tg6SXE {O`+hk0/md;6^r<7 אeR<RA9f=.?Ca _ f3˄*9qr@dr`Fh,Q$J6iJ}}OHe*ITe"`lGJ0fWaOV4٘ p/r>UWD _rCOiNc[)4u,qrm"?я}Jy)FE'JԳp,g`y)* B5TIITQ j2u<9$MȰϵЈj;mϚ R{qյaU)I0dhZjj[1'[LdmXlqEte‚qnV:[@tHHcI.Pxd,.KWS^-dgeߌHm0 Tv])z(B,,bE4$zP dCLM?i{?Ǵvw-b Vsȡ9+4Z8lBiA򦨜7:s %j[<5[sh4 z/oPO&L+@#ZAOOtjfTwڑٸ_XN 3Z|jE9G'TX7brۼ(_џ͕I IA)d}5;oVث"g7 _rR캹] 8S]K-u*'3Ȅ!4؊7JG%}P8O0N;̪Zd5ge}|܋ckNvLGi[rqYR-Sc{2$ΓC 4RN;m Hl]$a\=Ki|IY|Lƙ|xO)^dJB*e$ޖ meh˸-t75$ӋUZpwű{%MS.*/.) OꨣyƧ7>dI - $EM;'tQdjgTP-Ŭ4X^S.[uspd%]iٓvD;Tf]g ! Z](s9FW!t-\(ˣׇ lOLn=_PAR_fQNzDBu2ӗϲˡJϰrLh2T_˲@U֟A©]wXdHm h5䭖ʭ9ZZBUK2hB4I :23+63nHPit^Sa}zHvĽy!ص]ָ[} e%V?>ni?x\^x,j5 MǞhUx]RfOCգ2>5h>4bWL{hRҟc~Vgc dVN@w|TɾYՇ9#pX"LCG%s<mѬd];wז.# `G`KVn*R<{-{43d4b:vrw%'\+,D&b!+mNQj:7Tn0`J]8g~DడNDY/rh>QqETG`P60+"\O z}(b JL- .z$0Gb 9JF*JJ K2{~qhȶI0ڠ ,Ї걗4Av(56>܃XS@%l¶u;#=JP1engQS1FyJMW _VWD"Z}R줓ٖ |f)OogBKIRM ĢP?氯.zoE. )IucT=JiFJ_|ԫCgכI7-,D/6g=a-\6TsIqJs\ ~)u%ItUnȲ`ql. #77qu05n#Ld'>GS٣xMn5=r%,7￝ HKԲeڬdмO&bp+<ǰm3͡"a6$DܛK'Uja47Yv¬wNUIPb>kSkbW[n}RQc8݆o;m,lY" I[ΥzYzϬm +40CD(lCKh3bֈ4oS5QiR/a@={+>J1 ,xnqC̑Kx^nrC"@ @Xʄcwl%ٮC V1lً"|], G85e)0!гd˹W[$*f;0 zHLKޜi;'9uCc6Xn']&ioRos PO z>Z@|v*K2X0۹OML]c(Nz!8:|=C!>iƿoy^Ϩ8aKzxvM.[53H}="A B$e:x7"zjio:xf3,14WUV==T38H#uPtFAfڎixWGQMR(zV5Iq%պ{ >ma[{-DGk*&Z3y3}`yE:ؔ> 2/JЂ;|=P2# J5W?D"W29teA"L`䉣#Ŗ&XG_=k1}^`&o}䶹h5:ϨT*M) `i Z$4jIEfIHؔ婳Z )uj"=±ijERkh1Cc<)} ~4J $)0{Er>#~fHE=-`yl;RG1B@u0MO]iI7.z*DPK1 c@'^#7B)3,*՛YyG@>3e?au|ϧs:#s0Z_NA N.}W"im FJ@Z^\?)LB $0ʓ ڴ9o_l ;C+/>ɥ8czT;F.ơ_7k4ܴeR5xYk(a4,mYL>֙ڴˊ[n]r\EIttH'L4؜L[sC};\`y=u#u|,syV"Z\t59 ߀zIԳa>962\04ذ{sU@`kJA* r797y%Vc8;ty"9) "CD| ^' 4!B;ޔGhh7 l*kueLrF|˽j9E#Y3/&kXQy"=dR<$TUwwFWK>cԗP:/FU;nSMsSOː'ɷV_b 0@{Fu/z5Y8l>IYH>/x^F{~խ6Lg%,ԊznP:i )VmRCP+v"Q j~X }?y_J /=V$ڝ9A)F=P. j43k?Z[QdM}htaa-(/~@)23( y7iuO aw ^MED L$Itm*?S^5!KHIA<喐K·zSZX  n?٥?+BOv=CV / #&y4":5FKNtn̠r&IgF05A-Z*3T(ҼeaK+@ BY6*VަP)ğGWVVƺ@s upr""\>9S!V ϺW E3 .5%*0 \:8B/&H4Ba ax\0O V>0_j><b SFM_ꛙ8 4B""5!ɐeiE KcYdZk!g!9y2x&p` cQқ >!&|qx, K8@FH#lv(+hHZN=[A Vt! N=4;<yydk/.E/1 /ݣ}Q> |b#ѿpV⃫r?³VVB_ukw%|-EJI2pY|8ʋ( C:ܷxQLK"]^])Q2V _`C^T_wK8!xnae+c?uW,#Ԃ0&/sf=(,)CcۉREJjߊz>JwzM_[ x08v$W gs΅ptn@ VD<=iXmA5|dV?!mfQ[ypFӦ=1_0|vЫHσV.7e]z{͹zwPwsZa~3l)modڻ_"@^N gק>iXڊmG76Q>LDY*/p@9a?^i B#d5ಸ {o\8HAŅ>&xubI`I.GWGU$\{/=I{z_,7YYhe@zdjhCN\ت :߲ɭ8 sTmp#T Y[v4=:lXLq֪-Ó-XulZw\{N%?7O1)DaO[ U0^N@=t/p5ʬF[yuzE=ݘPijV2F:xʊ@i^d D/fL S|oO7M]-~k!^W_,7fDB"V݄C6RIٟX'{pgC^ h!%.<[la}D@^T&q`DZ[U46DF6$$lSs&o_3Jl iQSQkXv,Nڥ 幣󬬳~^(J/&hռsad:1D"HX%Y=Y~_prim/UMY(FHD K!G-egʳ.p6T W`q%V  aH wrBI]8Eݦg\-{SS 9e~VI ud0rNvp =*"][~Q˥tY7h1;BgσLXKHZ%1Z~(hnM [B9yc9U}[1`Ȼă햀>rk t/q'w7ⓔkm+GBL(O+q}Q[5b2A0ik0UI VrztJ{u(~#F3 j{+Mlq +9lعF[M`G`٭$wg /5:ɠFˉ Z5vAt&.&[JkK8@6 ƨ)pKE!dESq}Ψ&eCȌc>n.syIx{O{]xX"=/<’sq>bk]Ғi?߭]@ w(кkmrIIۗb+|-)}[3SNDiu1"3 A0R|AFi]ep?^uRD*/[LcEFlN+#ûLZԣ+&GQtЌ-Ä-Z Str=ܮ+_LV7ΙewK~Rgɦ{ Oy'Yև9 2g] 5]QoL;XOw&Y,D  Ahܯ.Hy3j?_u08<ƣ ^GB$~"^ pp_ffN>M9`;x_JjD_6/Ɖ1`!w6Lع{|ܘq,H Շ1AiU kӵտwtuKF^GP. Ԑ[}]Z9|Xᕡ|,TTj-p KehJ A-&;9}?%&CeUW_+cZ[2_X?zѠw0mf;Jט?zCي2HĶ+3{;,ޘ;1 **11 Շr{#?SH r/85yvi\+$7A= su[;2p;%@;˴{-wg}M$ܻ' ƗHp<J$5¸wn,2zN&U蛽$= C&/Y(\ 7 oPq(Η{@ fIh:R*q16@2ٓ͵xh0EWћz@/\|-RyW,FVۨ0Х*,L))\aK̶S.E99/I~/Nf=ZGgS(r;yP'gK87shVWμndL )EhGw"¼3CC 6zdk*b"-I7)~tT+a& L}X$q}I0r=^]O&oǏ4cA(s.f,Ԣ3k GG1o2wD9N68H/@%!"%aw Z^ΔƏT,!ۗJR{~eqWf!I["@=[u]0xVW ,qѮ5c"(~VΜDoλqCʗM]Wp:޺^r9I[lˏHTTXk =߿Rުi^tW0F._Y] {c!̓nFT{Ӡ%_#EAV!;'LK__O) Do]E-(| =4gҶ-+1Ky'?P@#([KmSbSnlXR^6鎋Ũ6~sn m/#?ˀZ=^:oM:Cxrq8zRbq+#; ^q$o_|@L+ST}(7c؊/L8973FE`FgUp- )G,Jꖟ&C85q~ ~_cGqDqFn!U'Ԗ[l'A{F:<׮O~;2C.7[gfBhmtz:'l.Q7Bo:_r؅h]yPٴӊ(Nekm;ҹh]4+i8N~JEَoڜ ?NMOEtYhZ=(qGMg\f_? ro` ӒCJ %0k?Ф|QnE*]ĢWpi fZ}wێAݐd&[xvbNn_xhYbEFUXpVJ  F:%2P |F]F=bza2 WeLS1h<-g]AqU>ʁ*-x Mi㯣4//CҌA=|Gz/Ny3da5cʿ2btΩX?JŮkeSv9lʞkDbX*fkoI]D@t_2klh!o&C~":B\zf4GHTC3ڽcdC0 '&?*T]3꧙_ 3g>,yѹƽ=/! ~gH6i&i.ǰ'\lxGeS ͻ4E_+[Inq73/DuQDcey6ϗ4i!uLx?W`h(u wX3r w;_4Ygj35A |\ r;B/+ L#=sP bg-NH+!ԮiTR h]@^fi iG]O,ڰvuIy 9ElE},贅V.ԫe%ߖ]6z{ |7m -м$\gȯV;k\#:_;Xf] "\t QF{'|]syr5?UD |IPWDBE-Dq28p') v;0I8MW%K|MjG2"^}(uhǮ49(wS[ KsO%QGf16߫Q3x 8sq{~nDYv_vg R;7U,%3u09d]a*P37rTb%t?M'z cb33D́poSZ,X$#8 d$2ܤu eb%m;[ V *ê'cvp+ >h[5{i&Ou(Ar  _^]Na2WZQ] _6rV~bM 'RP౓G LnݷDU2p~ZN=9o'SpVeF0ziIH`b.&ZS&f]ghG} [ -ӷzy(-Y38Uu` ?Y.VGa5̖~3ȒnJ"^gb7\oEM@QT 6@ ?4O#,\ͬ^xV@V[yYf!l 3H{>ZSDRvp Wl=l1jsئQ@#} o>s"]诜k?+zn~2HTgߗ-7?| ZWJ~&TMBȺDs Olȳ2;Pb>F{ؤjveUX>;3ršp&pp遛 蝠 ȽZ ʱdAN:O~:_&"~aaf$,ύӧ΋u;Д&u)R_Jn;40W;>|wo Y1$Ζ>s*=ٳ>Jmx5f`Ɨ'ZtZP?i1SdK>r3,t02qf 9YbGZn'GMTU/~+* i4>!isCy0/ѿDQL{홹 WosSH4|a1Oynv»0i)[Sެ> `&2 RV5,m]jXվBx=:VY CКǃß!hA8f6'JϋڲAm+ x}sy0O$\qGext4KV|G5|:]&.Ѫݧ 9ovt2b1C^e H]~[| U>RX۬fu\ 5ip8i(%v 2 w)t|SD'co2Cbp?!͏-- VƏ=Dڶی6(~=,mMJhͷx4㖎|ih@plڙ',$-wW r/eXp4nBI^p䍿 XeNj`wQNӰQ9Trd9!9Wp}"L5VyJQIM}&!s^h胘:6OP2F7!2K0~L'jwx[Mһe 2[ԚG_mz3Гf[124|'C+ٿN[_a&wCZ- L9'Xޮ}MA-..VV`c=feUhH[ IJBFq;&k^xɂə=Oi 7 'x#5N@ Z1M~| !shItw `\QE@R_m8EKؑ,!_7d`gaCpΒPԙ@ކ`t[^AzSmP08'QWX q<ýƊ 򮛤Q JCȔRQ[w}$S8 e?SRA{fp@>r}2*/y9^=53>ԣp/kw\WQBT.4+kӘGڡh> zG~a[B7}(W[@-F+F?yoQ۵6UQGu#o^,Wԗmɤq K!YwrG'{Yl P,@96p6qdыKkk-7* (`r~qoWUΡ`KC]qoƜ tv-ˑe"d8ZH|(AVoJ|!"`ZSHe_8 09C9 vj=A7"[Xnr+'hEMA Hz}QWUN!jEt;Qӕctjn/iAXNu6ύKj '6r?wm\,rf֑괣>͕@O O&*1J BQwORUs@=[nr&)Zw<"yWlN<4b[^D7Fb v j5tYJ:!ƺ9Xg!mBAZWMPؑBžIy/Kf460МDsǹps8nY3iLԿw*4'*YWo.M<^)Y,$&lTFӢ2>Sx{h2Dƍ}u3h+(/k@u]Ly)M蹀CZqS!eKoyf6cO h}sڱl~ 53~-S2?n~ϟjTά'`S8a/*jtya[v*t#`rz+Yճ2!plx Js2KpW3V3^ lO5JdvGr"+FK?d3A$(K0~Kjd?\|mS=)$:Γ ǝT_s/ui^h`W:||רTڐ< AX)kBovL"M5PZ^MT >Ue{<{0oCa1oel}*hiZu(ѸxPu9R/[l×CŌek!/#Pۓq6V>[~ Ðu6_iU?R"+x2?CGl,ofN%4֔`ȱ42!.>%d .5^jkL^N GA,2y8|r  !=Ȯ6Z"-s4 FH?rMߐ}VdحmGu<ϗN' ]+$ lj\ݣlXȆxKMkfNQ%ke|sff-J_(X+pyAojrmn\}ArU8aKaQ/(a#|+?){JEF݊-*Hy+-kN])׹a|ue֐˖Lʼ ?Us۩vw2 -6P!%LBCS)ZX*h@cGck*9O 4]LܸzQY+^r x<ժ#*DɈ6/)Ng- K6$s/C>,2}`PX_=/_Cc*l*5w#f+6#<: c { ҅M˻zO6]2bؒg,c㈺"#L_UKEzqU-fO-0WBqtC0N2>0uV\mn_c١qAM7H@Fȉ/{F`WHM#$A)0SSj8ښ:pƾU?jGh @)R0If r5&_0¥R^Wu@9vLcj螺$^u ncQANFߠƆȦe\ gB̠W?p+`ɗ[ETۄ!!l?i <zB9ݿW +^wqAD'tY(ݘBBVveT0 h cíu\JZC؉Bp>w!i@sD71j7$bX:aS&6JvH#f-̄[l4"48_&9?Rߺ\2dˣKT%Em:_iY(9t!2% zqLqd__ϭ۲vmembj(\ZJ ٠5c@gHi!Rāa? X8e?ĕ.vmKub:;=4LqX3AaI+6vG6Zlg6s#8t!lEAsL'*=EHo'} i){*)2lmj?l9)+-z|@#{wZs,k:jપ6#3ny֘Jn/V|֣ga*KAϚp2eH1O)t;#J(FO?PFՓ_@Zrpt\amL|T]0jh&ivɺw9_"$゙)y1f~p&BzS8gezX.{>(>WR.;xv?m5a >i"JFPdZ`vM5QSZ( (#BƉPUchhUlpP;t僥/* 1D{"\D[ !X] T<$@1!ILJ"iy-$׫'dO0( #P7ӹfE o^Q]YW{ 1zRO?NR\f[e>5 )R)+$#dui1_{#V^zd?<=vqg*ːm5%ѧf} %] 8O=M>a75FKMI:ilF|#@DC)J pP4;Fխ:~h"kn_àxժEED/D X2U{~Q0Ҧ&\/yd XZHŸc݋5vuOAȹ3U7X7(,EeB|f ĵq 'fixxۻVkOXN999eb8#;ʷ^lR[fZCګ+'G!B=-ݠ×jHmٳ25gt;}phrczqe1 V ԅvYeB1'GFjt _Ǯ ty~k6/UlC&4[f[l q&K酌jc%HQ㙙,OP&0qj w3p|pvY֢7o/&a4s[AՈHo^^=Тm' 18 '3eŲ3m~FyEs(Vn;?aθKJv8 UXF zrm$U+Vh{+XvDRrc| fziOʆ* wç}eֽw+A; ~SeHKIjbOHjX)sӂE9Y&/a4Aug5=Ur*ڹpkصXLD4ˑqfxyNo%UwDi|)"3d!.^7e4mTp&;BUL,;cawfӧ!9^,ը%YPx/P503_rARV."qr ]5s<05+g$tGjic ~J~g%V 629`#- A/W Q`zidaQ-~]+Y~K퐤$z \uJ Z>"$7WeQ.! Os9hSY1xaMC[-j)!#geB%=E&ƜGtihk&`u \] OP®6/L\{焅92.\o 0Tu3cT5RC>YeD/..7=[i$!]:6`Z[wNY/&V/ȳ&HVoO1ggba\Y񵆘`Oׁyq aЄթL<]'"hi9ư5DG>s{7EDP45ŹWkl`y\j6K_6ջo%bQcx$ÿ dGe@:DrFC/49Ҍ&0 w%qԷ f:wfڝ$&7 }VYD:Pc/8B "IcYX".vSBeIVӂA+9=A^^_z3a@4V|*C.98$:d琞A{c_nܽaӈ\L$/0οB;`Wړ6{ R(L1 G)q]`YhƔn?Ӈsmݖ0rE]Us™:ov%:ͣ$to[/CAl*[팽`0C^.zIKzc/d,"|ʀVS7#/pf FM qcfQyj**c:C$D4c7yӃ o5'g(Q`?Nnc_^dtSҸx=""k Eh Pt Nuc_C]?p2!MzN|\B*Fy$cW;Mvۓ= 6CJ!~C)lN2לp*Iюd C#œ] (s3~dRӭGnO6Pw+JOZ x`S.qkdyuJEM֍Z:Lui #0O7\oL ]Xp%kRыK`;߷B{bdySN,XͦX9QFkJk60s _;+ %$q9ɜψT$pfE _5JåWyhb,8~t<>)ytlOs]t| 5%Q _`P9h ,@ѷ%@)ptH=7޺?[‚#ّpI Ue2R"{hvTN+5%P 5~=sp3ia4񏧺.(Q9Bʷ'VG cvIm+ LI!JΓQpYZn-MZm*u؟!D>)EDNrNlsCV#b"{G.N䚙"%&Ե)}흅N9rl$sf[ڈb/ܪHҝKsqjj -)]}cSn~r *+l8l֭ͦBÎȑոs&z-rt]k\}*B$CpdJp[ :˒:Ui6>ǹ #U|4.e"6(Vj ^5dPr(f!TߎK>Aݞgz 1f&Ӌ{u$LL JbÇnuXrYuKKMl[#cI[etJk//u?:cВ>{;df*WS+$=:HęYb۹rP'Ýy7 0qq\Hv*c a7vCeH\Nq$o I 2 6lg~O{Rm-뫄xi鲰nBCTn67opDYˣ]c<]Ý2l҃v_m rkzFS}%)aej7Ҫܴ+G0K9#8M!z Š9{*xb0 N/M?L,̺ ؘ>D,V(p>ծ<8oF$0<m%ciTp}h_;u5Pm9oSD70lh>qp0h7 v!KY` LcV'*902C٦dzk8k>T'E \JH}g.I#r5`% g$ Q=د+\v}%$Φƅods߹j@,KkRSNIz11G&?6FU"uVxZ:Y>e[.KRpwh=bFdA`"_[+ (M("v%F=!IWʖ1p'%"ߎNdz?Z ;&*T+}w`L4d%x=d6̉4w[҂JUtI--SI=L c&]bǽ9MێgtEAΌXbDJsZqiănp2Q;{:[/&)ׯ GԵO毉)Np#Xrr(fIꃷsVzu@F26c(+A y깿ʼntZ\"Ԡl?xS(=2C2Zq?YKe xA. ѓáQ[+5G8t23b}ʱ]p3' [圫??{L,k AcNkbbέ% z |y_=#x{?k.>yr?6ګXd[c{G aOÕP)uv_8'A`ʩ3`N|0p/sq%a=W:[?uk- 2G1L a@Xn?ye+Ԑ^Me퍅MJfd OX]K"-B I ï j Q8 n B~Tr7C9-ӹG w1P +cWSB9W$"ęBMKh\"u08F&Lzp~UNAbrC 9?NlO#Xվ4AH (.%"Cn DVD c5_$L$ P "^[s䏍hxT]8򶡜VR`$L\ޟ{6RM'WZ+gթ[ >jF 6& bnMTX/}| aAbb{9;#dFN*7F41l<^>f ٶ9xäuӣiDb &p. q0*NV7hq +j yɿ Y]Pu0MOecR)eg_7E_}H8VxaHw.۟HP:5:+$J'V:4`ͧv2cfW5پ.m: [jI%nLSdtѷZT_[PBɨδX׮(;J#`CV<$v(2T=Zœ&zE-sg@<4%lGс=LYKnבc_}5+Vl$]9ErCpQ#Ո 4`){vQC+;5v7=)(E,S^X/v-(/9 iq4kItT~u~VhӀցS(\+%X [9ܳ#Fd(n|@5ͻ"@ylk"҇3J+J3(:y7hQso,I5Cֱ$L )5Ljf;L Zb֙hMQ!ÁS Tl))qIksة!l殈@ .f 'a~SHNd$Q:gI#M7ʯ5K_8;$#>ᦺ >c#[V9G}(ړGHsUIE.;G51*ylci@צ'5;NX=W)<[i`n.1|A@R/M2;s BZ+ ]&Zog\>ƊNӤcϣb;x Pe9X[AgO.]&&$'_@--`bSg<%s-눎`rM|č=P xvc 9P, ^ԝg L0Pj5|rI^; +q 05ё;Fg V:?pyC3c x *cBej eQZe.2,:'PzPX7)ED4Mل^T h]ba+>?-IB (q꾚-Í_5|1 G~IjN߁tΦFN}B6_Œfs&CnDZ:XYnP`6-\gOآŋOwaQcLarf%P]lf_.[Trĩ7ɔ+ hOG*_DZtquY8y/#όcԛ~ƃ-(\M.e$JjݽS4@L'kh7ۦL mqL϶IJԴl43o""6 6k6 0(T+Yi-ibDgW5Aג F:yS q88y`Tn <|lv@L{EU\C֝c{14!=Dgɛw"`BZQZZFqlCA>!p ]eBHZ(p0JJteRK ݆=o3;f 8Ϭv+|0vPfUN|&A3 nl25hMl\wWo^᩟KgX17!G %52FȩD)Lc`코9y H Gy@!&ʟfו^ׅADx[ǏܦdZre,:S߼RӦST??Q  ~e~p!3f'!Pp~w;Pmh ;Py=>̜Hao=Uǫ+%"ÛӶmTѶNư@ 2 aN?ڳTL^(SˡTbOj3mǟVUrEHQ~^@)P!g)C9= -bk y3 FJXSJ`Mr 6^%sl14RXE71~CTҌ!UUXۣV[/4#ɜϾCcGI'j\Ku(xENL+Ek2:"Ŋ3w1<Ð?hkbj eeC>,p~ePn'>Yv}` MM?nzmZ+7rdNt,)aSlwbB*,U(i7Zf 'QVT;@?Sݦygw 2.}0jùE'g em=UxWqMȻm "^qOKe[iUMpqUn}u UUduֻw&8QFjuRO2_2 齜baڌ1Gb>,, ڒcot+~*IyeaҨ bkPD%}ιtѣ|ShRn-W?T)ݤJY;T zPtd9ߖ)oד_2l'ю{ r$[9! ELߗKm..- (j^aX;u 1/ L znR;wbŠ-OXl緜~[ýbUѧ@ 5U/aϲ\tMQVvꔁ}q wF=FdmYT^J34FEɅL :)MR9lDwd,H q|4R jϦL 6T GËsc Sx]sbȲ Q V3w.A_fC=P*SXdj_-5@ Y4%3z,'hCgb0߈iKi(:Ch@ e{4(ލڻaJ0WbKjN~D<"H/WA3.*7+ /x_@VE9E/ [r}fv?ݵEqܕ_燝JQ 'X;h+XS:92`ZtBC~wlI.ܘ/}j2*QByv;bAlVARŽj0>w#U fWNX?Z\9803J^Ĥeی4Mw12q=OnWQٟ9wC1ܦoU!̭:vNVfv}bj=8aP=v׺0Mg=C1a .wO0Ucz,AdYn g:Gt)OaiYzJo{F{Lk{`Bj#EЛWVL&] l Ӕ?3Z~5;E۬u}kd:k!5| bz4g:fw3\ k~hyTތi"}k"@bH.aZed@1K1p4QptLZ`@k`ž}VS}EfM}PRLk9w:+V4 [J3ȏBτD7f(đoFPt&8} #dm~=|xj8ԗ#$T_)| %H."7Rf' ? @@`~61% O ދ!( Qs̃3|!p1s*T P닓FG#ͰCNv4w>-:Sڇ֌sC3oY؊$H86SDݘd|.Zް86,c9j4??D pdpa< XdҢ'wt\D2y/CIwP~ǖv?Wnj֭J2P2HeMaď+ _5wEΟeڎY|;\cu=P³$V\7I8'a{եӝPx&1)ʨ}2S~IEf+KuQ yoOQƕTvuV:~2`DѿBIű@^ALX IZ]܂qTYNޫq'oZؽ81D93{a: 扆4RGd 9y p̃;-OH< MY4MeK*k t<-~kod[o w3tHBͺb=8!?4d;12RP0kF^dj" AO'Y5D%R;#dw$Q b/ U-򁇠w3Vƅ@6"!&..4ݟbծZ"eo+Gt!a<`I:COn θ`I]pxY<+08JpG՛xh C:#Q3Rb <. !OOc0LNQ+k*X6iеof k{&QnTu3MSQ=*85Rh&>5 MWE$?Im㴵q ꬸ? ø4ZM'D'}jWή[8?CvK! <|!A+49&jTU i\&_p/U?m\>uƥ!fbڥrHLHz Cr3n`JBw',B~\_*Fz+F67"^, E\װz;vU^^+5jzUӥ:*]̉iAAbOQܲmFrJR6bf8 DO.vr'A5P>}ujKΰܿ&b$UCrRWR ICq -8}ztR$pRSYX@}΅Zݔ&暚cbF?AV 8"y_ &.h`1=Q]K妁9&}fՓ8lɠNO0CMm9iZ RY8ҵ4s; %.vs `LVmΖ>3Zzlcx*vA)[Ai&-~ݥ4@HF{aDŽfHa6lHB<<͋O1ƴU4mR C̷HNEcB^=߄槾Z {%3|t[]lX;#>v6'nC3Db3ee.TG&͇@$A(|=c dVh=d g%Kש3XRy wyv9V=,^yIń%hݗnu9핔 V[ѕ1co#v.GӬ}[tP3І=ݽd W*'zw @!Pflc@ _|(|7If6'9+瓐f̌N5\uTpp+晔jҷX4wj@AD\< V#xDqG2Z蠪V(*ܷ/#5({Սءx?jd\ک)y tj>\?/\ iOS0$kN?$ٍe!)e6~$^Α% ;jͬ\cTJ??eYe Z݆x{r5jeXcIuSrWW[qύD{\yE3 &qQ;RbǘLl=u ӫEۤ++GHP T).h \F7]B)l?=8JgEd#:]S" F.3yÓ^:3uf !+bqwodOtw1܇GU*y~JPzd$[ |&䑜*6$K]:LZLL>4.ˣGMe' C=.bL@-&wi^lwkn?ĺ;>&. ^20)BU6{@gdM W,<\cK8`8l@:6sצ_<%h$..ILp˟ٸ܇2dP2y 5/(..9[Pifɪyo m3zJ]Om-meMw5})kV"8|8'TY!0٬& ~ʨp1#ޮs,F EŅUaϵZg6ZtxtV n>QOݫUֆ<}ORg:jh}]y es{+}jA¼ai^ƅE8wWHe~>M>g )+n9dC\]=㝑1ױ;*@eF,U=)]ӽRD%VȖs-gM!"42awS\]jU l_Ʃ%fl1gGj>u\DMat/A/V_<.]r2g8矐D(C _S^Eg;r" `fcgs8HC"WCWPqKt1ْڎɤ-vF绯 `:Bզ>^ 9hY9Axl:ɏՅ ; ORWYF~6-mƿwh'3Xm "Xǎȝ &(&qm'ݰ.QT]7ĕWtVqø\䅕s %_7㜸KjuBdُ+?`{Vo,} V{0< Y>&Jln8*i.9:t3 MGy.E5Wtϴ0#Ϣ~cUG[98ԛnENcG䫈ěL!sضC#2~B;BVy;6`\2:.}K(COü)QasHDIٲzY㼄⚩A9014VxhRh}E=Ѐ!g+=VA"PB_EcgmJH|Hd(-8Ύ'pQqeT7Q2'|ҨWhĮ5؟l%/č}##Ҵ&+W2A`]!f{$t6i^&U?Dυ+/ԿRi2K<6G\HuL$j"1LeX^,'1/i/D7KISҜ-.҃D#'99ıFƺ^E]FBdnt e>xOj(_竗IPBAEqT';Br<  ]PL>/l750?ś# |?-dŮo)ے 2^Apqg˚(L7.$c+cp4 IQQiv-Rz75OG'+SZ#K ȴ5.LOg0^7iW߻V* 8܄/ynV&lՇ>dY jh0c)td)\2Kb0/ Qԋfh u LԎ32?>:Z~ ZgD1>Nu;D ̧{Ah;hE9<ӞM2@`,>(ԅW#@SqXfO?lgtX$b$1EYL J}9^o[nZsǫ}+Ss[`!7KP OT{<$U=Ip t/xnh uܞu1˰ͫ٢j O?Fעꬍ-:^$}}db6PŮv!ě+uʋ0ٰ*6-}-ƳXb`B6О=jY՘ pڭ@}_dM IvdU]TI A7Gx,izƳL1f {& mnF'ٯ oc]HkM>j`MwCf`*Y W>0GCy塤G0|E~ky'OY8fS.%n 4pr2LrQs@ ,j]n?"T8vvzkWw+C4rRuUqZc`ZK :&j~ژjJ@6s&ϭlmOƕ ٫'r +)"ELson=V`4_hiAmrxMEҮ쁍7eDiȟͼsDtXp2WXr*nTp^[T%,=PϾ\A"l8Evh05.;蠃Ρ;$H)VǑ0XE'3mw2u nǁЦ]'E؅a>YFL2,5d#`iw\@H_cg5Ֆ8JVz@(*bܢNo3O$W6o| I [0c&$XyZ͚6HYDD!+ϾkqjUcgX୐&:?g1wpB0}Ң|/N De+Ĺxp )9fT߰F{5%+PKOa$A{ĦKފN8f3K͊)oŤREq_]&^y.iY-NAnLhZ+=!!]J,"S@6d9z|JKRZU6̐F%Jr$^ZOZ?8GER "❉BeΘx['Vi^t웕99g/uB[}ը,pvdGjoXA'P-8PUQyD*mnD56Ύdp}hPT7m~|a먣q;4kśx̐A"qs66P_@] :~W ):7X&b&㋲6s)S9;We1u1߷GjoϺX.rꑲO]4va l5.H['R[p.}зK$: 2F`-|"\5(SShVC miT[SnbP#BM z"AMlbû b<;AQި^#FO~x^L gngzvy7REo< K4>j }69;y9]Pp4kgE (m,L .D<VV28hB@IJ{ %vk&K( ghap*ZZމTcʺ2^,Jn\Ystb0z~;ys ,'fԣ`'!^ҌL 뢫=՞ wXK>~w.ѭ&oKV82 yC6ˌTi9 qfkt{pU%pZG?j|4Wr4!/\-VG.%8~, !uVpmG !?e7 0ҝOs Oڈ"#L=_ #)Nۘ}?Gt~Z8q0*%͢ q$tE5 ̹oߏY-S]U3һRHYB :d- {d*g9 #{?7~"R+^Ujcͧxu beBPW}wVKE#+b \^&-òekm\+r%{O引ZR_@znR y!}_hJdi`R^BwRzCS2r>Dye)b|O OY_UO&)k9馃IDLOsű&^LiQj*%,8>o^ >WzKTsL]R _p$&wŷۿ&噟JK>ڝ1xY%W]ᕥ+ d~/?ZʽsH{j.k*RTŚ>ܷvxm634&|lCHe