libnettle8-3.9.1-150600.3.2.1<>,g '>p9|׎r"\y"ѯ\ TGuްowݹc91cv77ڕ gf qaOf](s͐ݓxLqRrjDsLС3}^mPN)jэZ…Gi;l H@̺b \U҃Jw БSl]mr}k5w3(&h&S_y:C xUkqwXo#L>Bc@Dc̖>@Rh?RXd   6 ,0Ij|    0 w 4   (088!9!: ;!>N@N)FN8GNLHNhINXNYN\N]N^OMbOcP7dPePfPlPuPvPwQxQyQ zQRR RRTClibnettle83.9.1150600.3.2.1Cryptographic LibraryNettle is a cryptographic library that is designed to fit easily in more or less any context: In crypto toolkits for object-oriented languages (C++, Python, Pike, ...), in applications like LSH or GNUPG, or even in kernel space.g '>s390zp32SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.lysator.liu.se/~nisse/nettle/linuxs390xAFNA큤g '"g '"g '"g '>dx#dx#dx#00612011e83d881a54b42244a127a148c4ddff4a0ea6b7f40455beea4c59f82caff25d97c3631102665b04c967e9fbd22dd6704840adc866ff2171325041391ba853c2ffec17057872340eee242ae4d96cbf2b520ae27d903e1b2fef1a5f9d1c8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643e6037104443f9a7829b2aa7c5370d0789a7bda3ca65a0b904cdc0c2e285d9195libnettle.so.8.8rootrootrootrootrootrootrootrootrootrootrootrootrootrootlibnettle-3.9.1-150600.3.2.1.src.rpmlibnettle.so.8()(64bit)libnettle.so.8(NETTLE_8)(64bit)libnettle.so.8(NETTLE_INTERNAL_8_8)(64bit)libnettle8libnettle8(s390-64)@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.16)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3d@ddq@dbdxbz@bbaZ@`@`W5@`.V_@^]?]B@\,\ @\l@ZZr@Y@@YXYX=VIVUU<@U8U) U@TE@pmonreal@suse.compmonreal@suse.comandreas.stieger@gmx.deandreas.stieger@gmx.dempluskal@suse.comdmueller@suse.comdmueller@suse.comgmbr3@opensuse.orgpmonreal@suse.cominfo@paolostivanin.comandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.devcizek@suse.comandreas.stieger@gmx.devcizek@suse.comjengelh@inai.depmonrealgonzalez@suse.comfvogt@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdimstar@opensuse.orgastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comvpereira@suse.comastieger@suse.comtchvatal@suse.commpluskal@suse.com- Add the architecture specific READMEs as provided by upstream.- Include the nettle library manual in HTML and PDF formats in the devel package.- update to 3.9.1: [bsc#1212112, CVE-2023-36660] * Fix bug in the new OCB code may be exploitable for denial of service or worse due to memory corruption- update to 3.9 * rewrite of the C and plain x86_64 assembly implementations of GHASH to use precomputed tables in a different way, with tables always accessed in the same sequential manner. This should make Nettle's GHASH implementation side-channel silent on all platforms, but considerably slower on platforms without carry- less mul instructions. E.g., benchmarks of the C implementation on x86_64 showed a slowdown of 3 times. * Fix bug in ecdsa and gostdsa signature verify operation, for the unlikely corner case that point addition really is point duplication. * Fix for chacha on Power7, nettle's assembly used an instruction only available on later processors * Add support for the SM4 block cipher * Add support for the Balloon password hash * Add support for SIV-GCM authenticated encryption mode * Add support for OCB authenticated encryption mode. * New exported functions md5_compress, sha1_compress, sha256_compress, sha512_compress * multiple performance optimizations * Delete all arcfour assembly code. Affects 32-bit x86, 32-bit and 64-bit sparc- Build AVX2 enabled hwcaps library for x86_64-v3- update to 3.8.1: * Avoid non-posix m4 argument references in the chacha implementation for arm64, powerpc64 and s390x. Reported by Christian Weisgerber, fix contributed by Mamone Tarsha. * Use explicit .machine pseudo-ops where needed in s390x assembly files. Bug report by Andreas K. Huettel, fix contributed by Mamone Tarsha.- update to 3.8: This release includes a couple of new features, and many performance improvements. It adds assembly code for two more architectures: ARM64 and S390x. The new version is intended to be fully source and binary compatible with Nettle-3.6. The shared library names are libnettle.so.8.5 and libhogweed.so.6.5, with sonames libnettle.so.8 and libhogweed.so.6. New features: * AES keywrap (RFC 3394), contributed by Nicolas Mora. * SM3 hash function, contributed by Tianjia Zhang. * New functions cbc_aes128_encrypt, cbc_aes192_encrypt, cbc_aes256_encrypt. On processors where AES is fast enough, e.g., x86_64 with aesni instructions, the overhead of using Nettle's general cbc_encrypt can be significant. The new functions can be implemented in assembly, to do multiple blocks with reduced per-block overhead. Note that there's no corresponding new decrypt functions, since the general cbc_decrypt doesn't suffer from the same performance problem. Bug fixes: * Fix fat builds for x86_64 windows, these appear to never have worked. Optimizations: * New ARM64 implementation of AES, GCM, Chacha, SHA1 and SHA256, for processors supporting crypto extensions. Great speedups, and fat builds are supported. Contributed by Mamone Tarsha. * New s390x implementation of AES, GCM, Chacha, memxor, SHA1, SHA256, SHA512 and SHA3. Great speedups, and fat builds are supported. Contributed by Mamone Tarsha. * New PPC64 assembly for ecc modulo/redc operations, contributed by Amitay Isaacs, Martin Schwenke and Alastair D´Silva. * The x86_64 AES implementation using aesni instructions has been reorganized with one separate function per key size, each interleaving the processing of two blocks at a time (when the caller processes multiple blocks with each call). This gives a modest performance improvement on some processors. * Rewritten and faster x86_64 poly1305 assembly. - drop libnettle-s390x-CPACF-SHA-AES-support.patch (included in 3.8)- Make shared libraries executable- Provide s390x CPACF/SHA/AES Support for Crypto Libraries * Add libnettle-s390x-CPACF-SHA-AES-support.patch [jsc#SLE-20733]- GNU Nettle 3.7.3: [CVE-2021-3580, bsc#1187060] * Fix crash for zero input to rsa_sec_decrypt and rsa_decrypt_tr. Potential denial of service vector. * Ensure that all of rsa_decrypt_tr and rsa_sec_decrypt return failure for out of range inputs, instead of either crashing, or silently reducing input modulo n. Potential denial of service vector. * Ensure that rsa_decrypt returns failure for out of range inputs, instead of silently reducing input modulo n. * Ensure that rsa_sec_decrypt returns failure if the message size is too large for the given key. Unlike the other bugs, this would typically be triggered by invalid local configuration, rather than by processing untrusted remote data.- GNU Nettle 3.7.2: * fix a bug in ECDSA signature verification that could lead to a denial of service attack (via an assertion failure) or possibly incorrect results (CVE-2021-20305, boo#1184401) * fix a few related problems where scalars are required to be canonically reduced modulo the ECC group order, but in fact may be slightly larger- GNU Nettle 3.7.1: * Fix bug in chacha counter update logic (ppc64 and ppc64el) * Restore support for big-endian ARM platforms * Fix corner case bug in ECDSA verify, it would produce incorrect result in the unlikely case of an all-zero message hash * Support for pbkdf2_hmac_sha384 and pbkdf2_hmac_sha512 * Remove poorly performing ARM Neon code for doing single-block Salsa20 and Chacha- GNU Nettle 3.7: * add bcrypt password hashing * add optimizations: PowerPC64 assembly - remove deprecated texinfo packaing macros- GNU Nettle 3.6: * removal of internal and undocumented poly1305 functions * Support for Curve448 and ED448 signatures * Support for SHAKE256, SIV-CMAC, CMAC64, "CryptoPro" variant of the GOST hash (as gosthash94cp), GOST DSA signatures, including GOST curves gc256b and gc512a * Support for Intel CET in x86 and x86_64 assembly files, if enabled via CFLAGS (gcc --fcf-protection=full) * A few new functions to improve support for the Chacha variant with 96-bit nonce and 32-bit block counter (the existing functions use nonce and counter of 64-bit each), and functions to set the counter. * New interface, struct nettle_mac, for MAC (message authentication code) algorithms. This abstraction is only for MACs that don't require a per-message nonce. For HMAC, the key size is fixed, and equal the digest size of the underlying hash function * multiple bug fixes - drop nettle-respect-cflags.patch - silence packaging warning raised by HMAC files (bsc#1152692, jsc#SLE-9518)- Install checksums for binary integrity verification which are required when running in FIPS mode (bsc#1152692, jsc#SLE-9518)- update to 3.5.1: * correct upstream source packaging problems - new in 3.5: * gcm_crypt will now call the underlying block cipher to process more than one block at a time * Support for CFB8 (Cipher Feedback Mode, processing a single octet per block cipher operation) * Support for CMAC (RFC 4493) * Support for XTS mode * various improvements- Update to 3.4.1 release * Fix CVE-2018-16869 (bsc#1118086) All functions using RSA private keys are now side-channel silent, meaning that they try hard to avoid any branches or memory accesses depending on secret data. This applies both to the bignum calculations, which now use GMP's mpn_sec_* family of functions, and the processing of PKCS#1 padding needed for RSA decryption. * Changes in behavior: The functions rsa_decrypt and rsa_decrypt_tr may now clobber all of the provided message buffer, independent of the actual message length. They are side-channel silent, in that branches and memory accesses don't depend on the validity or length of the message. Side-channel leakage from the caller's use of length and return value may still provide an oracle useable for a Bleichenbacher-style chosen ciphertext attack. Which is why the new function rsa_sec_decrypt is recommended. * New features: A new function rsa_sec_decrypt. * Bug fixes: - Fix bug in pkcs1-conv, missing break statements in the parsing of PEM input files. - Fix link error on the pss-mgf1-test test, affecting builds without public key support.- Adjust SRPM group.- libnettle 3.4.1rc1: [bsc#1118086, CVE-2018-16869] * pkcs1-decrypt.c (pkcs1_decrypt): Rewrite as a wrapper around _pkcs1_sec_decrypt_variable. Improves side-channel silence of the only caller, rsa_decrypt. * rsa-sec-compute-root.c (sec_mul, sec_mod_mul, sec_powm): New local helper functions, with their own itch functions. (_rsa_sec_compute_root_itch, _rsa_sec_compute_root): Rewrote to use helpers, for clarity. * rsa-decrypt-tr.c (rsa_decrypt_tr): Use NETTLE_OCTET_SIZE_TO_LIMB_SIZE. * rsa-sec-compute-root.c (_rsa_sec_compute_root): Avoid calls to mpz_sizeinbase, since that potentially leaks most significant bits of private key parameters a and b. * rsa-sign.c (rsa_compute_root) [!NETTLE_USE_MINI_GMP]: Use _rsa_sec_compute_root. * testsuite/rsa-sec-compute-root-test.c: Add more tests for new side-channel silent functions. * rsa-sign.c (rsa_private_key_prepare): Check that qn + cn >= pn, since that is required for one of the GMP calls in _rsa_sec_compute_root. * rsa-decrypt-tr.c: Switch to use side-channel silent functions. * pkcs1-sec-decrypt.c (_pkcs1_sec_decrypt_variable): New private function. Variable size version for backwards compatibility. * testsuite/rsa-sec-decrypt-test.c: Adds more tests. * rsa-sec-decrypt.c (rsa_sec_decrypt): New function. Fixed length side-channel silent version of rsa-decrypt. * testsuite/rsa-encrypt-test.c: add tests for the new fucntion. * testsuite/pkcs1-sec-decrypt-test.c: Adds tests for _pkcs1_sec_decrypt. * gmp-glue.c (mpn_get_base256): New function. * pkcs1-sec-decrypt.c (_pkcs1_sec_decrypt): New private function. Fixed length side-channel silent version of pkcs1-decrypt. * cnd-memcpy.c (cnd_memcpy): New function. * testsuite/cnd-memcpy-test.c: New test case. * rsa-sign-tr.c (rsa_sec_compute_root_tr): New function that uses _rsa_sec_compute_root, as well as side-channel silent RSA blinding. (rsa_compute_root_tr) Rewritten as a wrapper around rsa_sec_compute_root_tr. (rsa_sec_blind, rsa_sec_unblind, sec_equal, rsa_sec_check_root) (cnd_mpn_zero): New helper functions. (rsa_sec_compute_root_tr) [NETTLE_USE_MINI_GMP]: Defined as a not side-channel silent wrapper around rsa_compute_root_tr, and the latter function left unchanged. * rsa-sec-compute-root.c (_rsa_sec_compute_root_itch) (_rsa_sec_compute_root): New file, new private functions. Side-channel silent version of rsa_compute_root. * rsa-internal.h: New header file with declarations. * gmp-glue.h (NETTLE_OCTET_SIZE_TO_LIMB_SIZE): New macro. * tools/pkcs1-conv.c (convert_file): Add missing break statements. * nettle-internal.c (des_set_key_wrapper, des3_set_key_wrapper) (blowfish128_set_key_wrapper): Wrapper functions, to avoid cast between incompatible function types (which gcc-8 warns about). Wrappers are expected to compile to a single jmp instruction. * des-compat.c (des_compat_des3_decrypt): Change length argument type to size_t.- Use %license (boo#1082318)- libnettle 3.4: * Fixed an improper use of GMP mpn_mul, breaking curve2559 and eddsa on certain platforms * Fixed memory leak when handling invalid signatures in ecdsa_verify. Fix contributed by Nikos Mavrogiannopoulos. * Reorganized the way certain data items are made available: Nettle header files now define the symbols nettle_hashes, nettle_ciphers, and nettle_aeads, as preprocessor macros invoking a corresponding accessor function. For backwards ABI compatibility, the symbols are still present in the compiled libraries, and with the same sizes as in nettle-3.3. * Support for RSA-PSS signatures * Support for the HKDF key derivation function, defined by RFC 5869 * Support for the Cipher Feedback Mode (CFB) * New accessor functions: nettle_get_hashes, nettle_get_ciphers, nettle_get_aeads, nettle_get_secp_192r1, nettle_get_secp_224r1, nettle_get_secp_256r1, nettle_get_secp_384r1, nettle_get_secp_521r1. Direct access to data items is deprecated going forward. * The base16 and base64 functions now use the type char * for ascii data, rather than uint8_t *. This eliminates the last pointer-signedness warnings when building Nettle * The contents of the header file nettle/version.h is now architecture independent, except in --enable-mini-gmp * Prevent data sizes from leaking into the ABI - Fixes previously carried as patches: * Fix compilation error with --enable-fat om ARM Drop nettle-3.3-fix-fat-arm.patch- Add patch to fix build of fat-arm: * nettle-3.3-fix-fat-arm.patch- Build nettle with AES-NI support (bsc#1056980)- Explicitly BuildRequire m4- libnettle 3.3: * Invalid private RSA keys, with an even modulo, are now rejected by rsa_private_key_prepare. (Earlier versions allowed such keys, even if results of using them were bogus). Nettle applications are required to call rsa_private_key_prepare and check the return value, before using any other RSA private key functions; failing to do so may result in crashes for invalid private keys. * Ignore bit 255 of the x coordinate of the input point to curve25519_mul, as required by RFC 7748. To differentiate at compile time, curve25519.h defines the constant NETTLE_CURVE25519_RFC7748. * RSA and DSA now use side-channel silent modular exponentiation, to defend against attacks on the private key from evil processes sharing the same processor cache. This attack scenario is of particular relevance when running an HTTPS server on a virtual machine, where you don't know who you share the cache hardware with. bsc#991464 CVE-2016-6489 * Fix sexp-conv crashes on invalid input * Fix out-of-bounds read in des_weak_p * Fix a couple of formally undefined shift operations * Fix compilation with c89 * New function memeql_sec, for side-channel silent comparison of two memory areas. * Building the public key support of nettle now requires GMP version 5.0 or later (unless --enable-mini-gmp is used).- Fix postun->preun on info packages regenerating- Version update to 3.2 release bnc#964849 CVE-2015-8805 bnc#964847 CVE-2015-8804 bnc#964845 CVE-2015-8803: * New functions for RSA private key operations, identified by the "_tr" suffix, with better resistance to side channel attacks and to hardware or software failures which could break the CRT optimization * SHA3 implementation is updated according to the FIPS 202 standard * New ARM Neon implementation of the chacha stream cipher * Should be compatible binary with 3.1 series - Add patch to fix build with cflags: * nettle-respect-cflags.patch- Remove off-by-one-test-suite.patch as it was fixed by upstream differently- nettle 3.1.1 Non-critical bugfix release, binary compatible to 3.1 * By accident, nettle-3.1 disabled the assembly code for the secp_224r1 and secp_521r1 elliptic curves on all x86_64 configurations, making signature operations on those curves 10%-30% slower. This code is now re-enabled. * The x86_64 assembly implementation of gcm hashing has been fixed to work with the Sun/Oracle assembler.added patch: off-by-one-test-suite.patch - Address Sanitizer, found a off-by-one error in the test suite (bnc#928328)- nettle 3.1 (libnettle6, libhogweed4) - bug fixes in 3.1: * Fixed a missing include of , which made the camellia implementation fail on all 64-bit non-x86 platforms. * Eliminate out-of-bounds reads in the C implementation of memxor (related to valgrind's --partial-loads-ok flag). [bso#926745) - interface changes in 3.1: * Declarations of many internal functions are moved from ecc.h to ecc-internal.h. - interface changes in 3.0: * contains developer relevant incompatible interface changes - Removed features: * nettle_next_prime, use GMP's mpz_nextprime * Deleted the RSAREF compatibility - New features in 3.1: * Support for curve25519 and for EdDSA25519 signatures. * Support for "fat builds" on x86_64 and arm (not enabled) * Support for building the hogweed library (public key support) using "mini-gmp" (not enabled) * The shared libraries are now built with versioned symbols. * Support for "URL-safe" base64 encoding and decoding - New features in 3.0: * new DSA, AES, Camellia interfaces * Support for Poly1305-AES MAC. * Support for the ChaCha stream cipher and EXPERIMENTAL support for the ChaCha-Poly1305 AEAD mode. * Support for EAX mode. * Support for CCM mode. * Additional variants of SHA512 with output size of 224 and 256 bits * New interface, struct nettle_aead, for mechanisms providing authenticated encryption with associated data (AEAD). * DSA: Support a wider range for the size of q and a wider range for the digest size. * New command line tool nettle-pbkdf2. - Optimizations in 3.1: * New x86_64 implementation of AES, using the "aesni" instructions - Optimizations in 3.0: * New x86_64 assembly for GCM and MD5. Modest speedups on the order of 10%-20%.- Add url to the spec- Revert back to 2.7/sbin/ldconfig/sbin/ldconfigs390zp32 17286531183.9.1-150600.3.2.13.9.1-150600.3.2.1.libnettle.so.8.hmaclibnettle.so.8libnettle.so.8.8libnettle8COPYING.LESSERv3COPYINGv2COPYINGv3/usr/lib64//usr/share/licenses//usr/share/licenses/libnettle8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:35975/SUSE_SLE-15-SP6_Update/ecf44949a59febf283931371ee5544fa-libnettle.SUSE_SLE-15-SP6_Updatedrpmxz5s390x-suse-linuxASCII textELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=e64230ba468875a0d7bef640da042ef4d20b2be1, strippeddirectory PPPRRRRRR29bS[CpGutf-8e4cb405a44af3ebc9b732dd669a7682ecf9bc815e3975dd72140ca9d0741b311?7zXZ !t/a]"k%daMʶxGvҽ%Qjz(<=/)ڀ.3e.YfЎMʴ ҐFSvLJ1B_x91Xt\e]"wkc Q~O]k*o@.xnljm7Bk@2}Ylg[J r3:Z:%>;1tHE5*- Ho K;lsx7Eb!}Y˵ P.e0{8\w*,W?10@ߩͮY׃pSg'is )Jؔ943M1\ZC*G=U-Ύ^YSYZ h\)B19 7, hIelxqpZA?APHMYpMiQ݋O,Ee*73E6YZEq31#Y-4갥/}M㗤#"u6jgFdqN-&Wc[in\q 7s/Tɮ߭a}ɀfPoNB9U$l9.w=^>ZBMf }⨆an'~UrM=mҹH~wאָ"[^+oWJ属(Hk~9nB %[$Ɍx^Up݊d4͵Vh&=IE۶_)"{c|܇ +mc&NHpTHW=Qesp6LΙ_"\>VnH;n|/.2ޣQL\dù D;,)ĥRI!EҎ6NŗAd}Ou,٪{w"{OU _1rʐeNW48"7{~b<[bȢ('IVF/\B6_{Gv4 'j')8j$P+\ʎLf*Ŷ5]wOFIaݚCV`o= bbQe1% o ˜$5su3v]^mrg%omV'S-XvT\1ZÞH>tZWoGquJz|?s?o8MN iD+R>Ph.1:TE2g΢C-sq 9S41 =J>;=2,]J `[WKδh28bfԱ1Ɠ6liyE&D"Ô_G#( Sp:j :9 "ZOY;C?m \)ҁyD!qp\!CcUUtѵ$ad/G](l!|20?zGKdSalYo-N Vnumc ˅yI6< \:Ÿ)-<xGEy.uݐ&PD1#PWꁯ3*=s寰֏Ģeu1 GU:@=CL@jQ0-\A@Ʌs2WbqAGOeG"*} ]ݦz¡矄8XV6:T|=9TX]K2tcb@6󄡰9-p&Y Sb=sN5Q#7AҎU\% GO wp C$#2XAGR: H%2R+WK v/MhB }*;,µ࿮«AN! a:Y35v"x;iGwb)ڼ=-NfY}3~;FM}JѲD&K zDkFyO_ڬgzn)OCeUeQtG,-@ ,4(gutp,_$EFҖQKJ$wG@8׵i0Az=ZnֿwCaLG 4 K?rǢW3ǪFN[$AVe_|CUf&^5$F/rQ*yCn я 0we^,&&}9IzÛm>r*cmz6so9Rg`3ob9B`̨/DZOu˦IvL|L#Nj^%5 *H:^Fy%]fY,ES)j3Ղ$s.^pZVi2r9-#Swǝї,^vN !=Kcc%$!t %̐~cxNԫSAi/Y.(]c~T%>7i x 7ߕ~Bk@*#OCYUoLq{zS8bvM4~@hk^tȔO{Gn>\1!I#ApmSrV\Ɔ3KI6bĤ}c-#]AS"854Ɔ }Ҋ7!ެ G0;m ۢr&FD+ӫ_:wJDՖBn #T ˒\2 e Py|;0^tVaǾTy&+a '9 1/6}]ǹ[RYT6ξ rlvQR, n:׆|Pl=ڿE,e~޽R-ډ.GSa h5_[LITߟSV^{y$/:q`/Ix#imsk[hFчjl: :?Su] =yʂĭZ&?j"յ@_)B?:G^)ýz[ƙ-_z2./6A&"iS^$Gah r1v Žw p1u_W3MjW>q?ݴt/5(.(W3 ׉ڶ;] ;H0$|H` ^M^IvE*ڽ+vhiS o/x"g!)Œ&.љUǧvl#. '2Z`>T90ǷCӉAjY-2fI> ՐN%?Nd(pL.JXw~?*Ul0p-HǫiD<=# ^0"pwZMbGw3Ag| |d-R \e͍TV((¸jWe]6'>GuJ)@2 ?I7f#WltD^Қe*>y`qAÍ?.ٲ(⢹; -t=pHbVZ[͈SeXg)*(օľUbCwz$QhƄCkN1 NOja$o /@`%:buB&Qx%\ˍIp̵E3|&snr^fCKx:Ib獃fe / -3k%,=m6-FOAL*oBFWp{\i9s2_F7H-:6 NQ bL5l Ѷ:X!U3m2opyer)Gƴi :[]aVi-=gni&ϊĹ0j`neV|:8m^4W˥jIp̆M-k;f\☒\4wsRm5dD@4-ryq1vx$& '@"C*f{iFQfP]2?. rx@dN)a;X戓 q,*D+`k%*{0$>Hp^}쌮s,۬aOuᨸ:Έ CTjWkEmumz_ѼNv9l!OwW1`ie5"b2~K >FAmiCjKc0z t)8x/ZBE U:?hQ;9(@G'Iϰ5lw_Pjr 򏙲' 4,N"SZX3ɴT+L1F\Ұ> l< qnxY 2v%~*2kbIq¤CpT#rKR0 ^Ef:W^uY3]}sLP6#4ܗlykӾfn|wciy/r޶5XcSɲ%Tf1Zz TY)vHiۚMJŴyK^K3Βt|KxԙE<[5y{V(?ԇj+&dhPBHĴiO/LP<9ܽĐy_tŸ:BI{zSY*SȜ"mt;qY/k5||)87\ &# rΪ gX I(O&C@6R_ƴ;qsg&g E( :daJNd|ְB؅vN1{8(Utg`kY'X H;;W*EqN,^7ȏMv'E;O5rxB`>PP;9a^?qB@vHY EÚm9hqع75sn]*& 1aȭl$ g,3,UF;VXu4Nzu9խObB$&7Uj U' .&"oKnf3=8CQn.IʰДlS dV S~򨍄Ϥ}rw4.= 0h֤H9*vyDGtNJƴ clO#'WMz_XD@KG>:N5{5M0(}Tf}C9@u0:Q&zNmLfVhSl>Kz}YBjW>RhnF,uc0z.@qZYO`G-PG]"Q4`g hOݚS~A԰"~Ջ#%"VI~EdNHOg<0ɍ9/qEM2{eC5O mE:rԾ˺LdcxK fޯUiUD9tpdIƽ~kly^6~.Hb/z|8@gtj8v3kYlxykeǨOت/ 2[+FJM˲ſ8ԃhoaɓ9<K=:F]nsԴҶ^7%Tzx^z/4*%"w[uWg=.D`1rkX{_Wxy? S#"`oC֔E `e^=,Q8_]RZj^ߛ9WM`.6yWh1W~ϽoQzɲen揥=n?5zz5lAg+2t$3 <8ZĐ˩Է[5_PYVgޫ }ITQ2XblQ }Փ gƝoue];#"1P< Afh+BEOx9j6{ gĂnS XR  :vh& 90IY|ٍj.,30j~w*3H?W&rxnNnwog̋vcbbn /Uh*-دvy&N֭KܢֵP!Jⰰ}jVo2.;8G[P/@k>a Ru`û0y,ЭF^̞lmȟFc`ɂ`@21 ZH׆QRn'P;)d# 0dpP8~: UG|QC>[lu)%jphӟ_3t@:)uz,i<8&iʶH_ s$uY^b&1&M2֫xeSfI*\U\[^RYҼ2p8ŗSgUMjHM,z3\86H Z~k m-g:=!mؘlO kRF\],?Z\G+椹6Kmvt1潼7qԥ+ ZDmr졮QN7-0 ES O_"#)OŻw4@#xIGQPǹoDIsuv}a |K );}6O9 ,.HdD<ꟊc-GA+\G^wceL~w޳^Wy͌s;Ԁ _n CGurŴ>xCn-&7Lh4{zR#MpOkxq{v=ભ Ziem@:oDFqN!t NP*YaP!DKyP{h=c2Fsjv*'4&Ztaysx{%; =yGmo81>d{/W۔`G 0;s3 (W [lZpxFCH>itS퟊Q!Xs.zEf >E\!dm+ ; lV2Hɪz{EZ``sFK 8pVCh9-Lrȿm> dم!;S'zkcp)Jᓡep)F)TjH-^R9t$d J eĺX2c$D3hcx<ݠk|&./>)dtSI'Xi bsAKRH=VG-=yceY/!kvʫ ,ne 4M^`q#Yr^MsN!-w>X!Y!PȔ8w KYN} 7;k EnE4 %S B[Z(/j9S\fY%d@OL{V[O#z1ڢX0.v7A2);jh^Z(mHٱ7dV_Y@zdŸ ׼;{x\ b$ygђ𢏶n wى._Ǻv.ɅY^yaׯU-9thi+pbQ,xe*Y_h~R2HyjآZU8dʄlX'Ӷ D.|13< L+M,,s1Yaz1dBJ^sr!>{|%rTI2b}IJ͉4h8m/Җh:[Z} OӲ23*o~s^s{6I~H<|ͅ-Jq) U#|>30*YaKiWOqD74b䕺k  Hi b j+'ۆE t6âtTDQ0!U5['hlZT _'-؅æQ1? qQmQgzД T W&c6,L 4pGCL3|bˢAr0Fj2CWh:',h. ۹A:h{b;ra#ڈy)VGIcdkBZ$s>{8 NouE5KeeB-ߧ9nzi4_pPVCO\f <)Ƌ}@@j+[Ml+Nj֐4|,# viCbZCf~vO܉fQ\08W\ Ww=k^tM@hSҌ;YӊT}F-|ɹf&gBIvbq}@Jqsa|JΞti~Q,dDwc&. Dzz CGdիb'` N&7W']w]~ 'n@$V%0Zvrzn1֋̊Im:E,~"9F)ɨ1ô0/^'iViR`.tu%*X: |PWJ+D8@py`Ⱦg|/`~.2Km2n&vU\kR B@}7LgƭK19!aEĒw-c&X栥*/n1S?MaQ /hb934ݘ"uCe!ԹGh c*m:@j7(!f+ۮ2!a)XN>DԐ2[GcjFoIQ9R:nrT.n,N”qF!_O= .6'i?.QMSZV 䭯ƆC>^VKH6mG6{5Q<>\u-C6ezp^0 Mx`3Y;\I5e/][zes3/G SHV઀JZA]zn2-)ZeR@S5쇹[4{N㑅s7"Nshi t0ᾭ_Ql^Xf-ZsOnd*P+L>s }1 NTmlQAF.K\kdN} 1uNy bKֲHU L6m .F&v23gAS꒣9?r]:`䨗Aok˨/KZm.aT $) o9oWjM-{M|S[b=* ]}BG>ѓ8/t Ou@h'~OY aUGF!I?`KWY KjFd3s|T`HքUO _@ZOf?=.V n;RQv#X^}1' D-E"b:*5.eM-JRޝ66?gCm[b~xBU0)Q+s=j`3Y#4fN{op!cU6$"uGf4;Ο }ܵeX)†^T%;Ce,3!KN$9Z5+?SnO$E6Z$!]𤞢\v?inMGtWf!nU&㯫qx-6#2 .ɚ*\uk/Dmgޔ"G)l)f 7TO2u1K,׋}#ھĺpƍKh.9yr-=b po@%M9r F wsrqbC8m,]ܯInO !(]x=5|F~HlU}h?Bffle[)^2x `8͌s<3%ad|ck6h4?40}Gi?t4R:sa|XW;M7H{<2ؙ'bW-2{UX M51?m `14P_ 4PguSTv)ZVQiB2dsfvUxKlퟶZ xgT$_q5 Lc  XnVثd K07ѻ3jTj|% am*70K%a|7 XjWpv=ǘQyc!. NAQ#uftԍH A|?TZCʦu$й@YiNuݲ(wگ+sblЩ25d%;KEP>m,*ʃ`C>`cl$uxَ7+o>e2Y~|dlzRfwƁhU%cS~x-vطkE3j+|٫#-@t:ɒgKHDڠzKQY˅#OJ CwUTS Sg~/0ԙcDR`덮Я" 7xM(S5g_T,@2 \^w݄7*\ik!j(p&wD' cMTbcJXagYL.Ly/s~<78FJSL;!~ֈK ugYx]AgO=ìQvx:ll+|WPP7:0 v[UE NX.5ERfA>cݴNŝgQzI}xtiKc CAVXZ ە_#iz<뤌J]g.sb=5-)FAyYJْ"cfi'1 +}o>:%"#?ӱʓʦ5,̛3 ~-a.󍷷Z\{Ʉ A"^eaCOVQ!5rc,֦1`F[; wop%\]zLq̾q^odsH (ȱˆbaQIȇ[lи^T Ie(!wYize-Az LJ=g٬~9"ֶmn: #a;qd) %L+j:2.gq"a䛱KWd^ci.|g _;$gO0\%:`U\0 2s$~@asEC\:*,jQVI\Y˺w.Lz2k3.CCtd|^o%O77\E\GFmgҙVInZ <_Xw؆3 KpBcdqCCeȯ}PӴIsN.BY}[8v3U'dr# 1SGYNïddL$c R3*xz0٭{p4Ư6$tz^#~d˚\@O~ϤQw:iS"w"^g엦ā 6oJq4s Qy,(nP&v9p9JN[lR9u;ZL-[{(g39E[6ʤ`l/}(zQ( -_@J 3{Vq[h5xVDyrk@Dd_]^pV&$Y10A< (LH8;K/ @e9Vke2!ߨ2X~ߪN)dLH}/*JgS37tYJ&bTq?MdV! KwXo r򝚗4Z%9H/ pU~$≤AV>07wޔ'&}Fs(\9t;xA$)L=nKPIyXd;_s"&v4-lMd8[ E_b1l뭟/ Y #+LdyGޓ㲶VJGzԒ.󜤑y-[M鮇ըώP;Ҷ EϦ/gLLBsa>B9{Tkە4f)>iD?&(ˆ1!ACC嬯-6`T=+7:!`ܵdCJ|2'6_& ceuW8JK{U^ 9anT*a=i/SZci6b/V % g!XD 6Ts]@D}CkWIk  h4dO2b>p"ͺ&!62KV Pƙ 7,72Ea8sҲMcOPH6~u^nRpUw~5XW6ZbL/r2xĦ3XjGÁ%L.psEx^ + ?Rzm PtXoL};z͂󞕱 6|ԫ"`ȆnF̋x׋I n"LCI6`C\RΐӲ$)]<ŧks?6I{#k pGFQ1,L 6V"mQpyU}lrz4Ƥu<(VÈXyu>?z''.k; 4]jotWo$L \aT"rYETq! o섞L*4PRl2:"u&̰("!$+U#ft.\0QlĴO /!_#l5, KBn]RX2D%,!ptg z=!KF;-L95@PnT9X 05zGލ(p!4t 4PwYq8@B*5XxMs^QyT.\/Ro6nʐ.o ̩)op5x5¬kFc3L囓!۪ 8K+}mR @a^r,K=>D@Fbi$%\zorr4'[w K8 ~aBfdm爥IE8m:m+6))0EfW/=b=gs0G_QDXAe ÕoU(}̓=8.oitHmwωdAT$DW7w#sE ڞ :ՌP: o3^zY;9Mi$Z)];QHEʇq]#%mKʫ!t> 9^=Qqb 8KMMP VʼX57yln㦧¹*6ƥ/,,4{;$4t|S7c,e •؀"f>v ozD6)T(M?AmIB?.hN$W )H(RTߩ@rjStjv nVjLFμ_K[c.&LD7a;H"U:"b2W>ڢnuB *OCPW]23Z*.3?ЃIDH:v/U K;}Z73;Z i"Q w!N袦mtK=hJ{@gb(:bAzh. v4 ugZvNoIXW3`|L}d jȬ~иBfN8sd,p x Gn"};<^&޽MI 9p_f8GѥQˡZ{=u.MAtsA|>q3 ';:P$'Ix!ܵ܋iGM.Q_>gd ۹ਏaxMcp>@е8a@RK&1ͶLs ?3uKBpTJ L>xe>]TO!a9Ϲ\|&F%xWB+=J'DGM)Bs/yYk5Ms2 ݘZR2&0* d&ԦL+#B` !Ki/:B04H?~b0:ʫR1:Zq=8j=)q5VM,\SM `Nr2ݨ`Wt=_L 4ؤk[ Uajo602GV,88$6p--Kͯ :BUB]suǁ*߶1n'tCIJgNJ(MSTŋ:XOp}u=]&I%Mp&q/<" ]T|| &51: '"=t#=M378yӠp]#3`}r%'Eǎ4ÿWX܃I-Xawڨ1I0w[*L'Z1]?npe 02M#.000NIFQs޹gBi,HW8Zz|-#wd`(h¼8qٶ7ye0$4st;^EcW# w#tKPsJ>Z.z^1Uw\&2k!sͬ?fqsh f L;@bbU{Fi=AtD`'O 4G?~&hY7ݱÛK'. .:+u '!민;,bmU9R!!-{\k4~_$5dIrXh^A Vd MGLK&wBBA1]KN^=ʡISŀF #7#kƎ!|"ʉ8xqjr.|TAG+slB{X-9ȄW((;\.pc9Ytk(kg.BQZf.#٪ߐx&YQ`2X-z*9CbLj JEtȕG@dz'#B8`!Ruw':E#ϽsFSt.f `lǏ֤rtN!,N,vN<X7M 39Um4b% j!TXPykT³m5|]?^@LqsD,KT~ H܍(L!@)f{}OMq6aLB2>SwNzI^31RA3|zƒZFx\CF#G[6BSI3%-Ggd !PRB9ƱI# cpTbEd55MR:_L%/$[ S]^\c4Sg7Ub}lT,e`%ۭ6lwI2pq}N9~nXd]tBLs1~_Ʉ+D:By1&f2 ^KQC`9,Vl(i?'sthG?_мnQa [Y-֊Anu `.(:{{:{[217?yv<|Z΄,siB }ݔ ޝk`= -R6hF[Cih1koUn(,]M*'Wy2%M_6Fõas H{J"9Y!08]Qa>홛~7]%TxF#k(^_:g ek'vŹS(#⁊AW@t>Midp$>Gl S?3Ϋ¼b]թM=xt*4W>'5'=o'ǜ !$O{{ToĦ7|ewO-KV[W2pι0(y&*݀0m{yb#(OМ}pWKPn[Kg8@a .f0:ι6:3c>9T5|= R[WI"ŕS/h̐$w3hnLۀ%ipY۳}.6BhOgj8YtĮ`cy5('UE #ĕ[12tҰH nGpaTZNM%$ۑ@z/j}@8k z=axH u"Ms3; s؆01jb8rcͣAC W FqǴS%]אU_b_:!(%S\ a|ձ+Q"&XSeHh_FKüUMQNY yAc0Cm?qC˛` 6RX1,~$0ݣQOQQS7eK"Dϴb T=UBXАgԩi.=N؈2a/U`(*CB=@aZċGmѼ}<[b!&q_\:g-t1U)`Bxm_ƺ0K$PR*}l%fEU݂4DP^jp4EvmUb7K;1-?J1M]&h=xp%~tkUZt9>}A?O^*T8xeRR)!s w{Mu6$ {9|qݛ;a*L3 ej8'[%Qoiqt .P)3T 4u^|ocz]rOfT%`*.fL\bQ],=X A4qNXL#]Lx%ȏ#]^C$jy8>9(5{ 9f B曦BnXיnŵ܇w6]&c )k3:kKL=nLκn=Mڂ D*/g<g"*& Nnr`BT'%wHSU#SK_ް"v==~Cgk^6nMSxc3>$NAִ\Nq]|LHV]ᘫ7Uj$|K`@ qݕ0 Y [Z=SX)9aǝxtHC1F|+W^=Ke\D$W~UT΋J KZP'Jn|6e5 a<-hFg5m|~~shj8hFVL*c㧧Rq*ލ9D%3;T -(IO מ Қ薛x#d=?33b:L {<Kvv1/(P_k"0 m ,=U"4wtlK3gpL>Yϧo 6tR/LSsl*z{v2eQO]/@,=T޹`B3kA7/B pVQ8y*r3Fw ySFFlEa'PHqA.n'!]" 'KʃW$\f<_t9ͬv r Mli hGP\&X}JCy5L BY `:=!JPbkY>DL9Y^[ߚCß<,_*J77T[/uVf\Yd&BVQWrS[^g,UFu]9zŨg4w_o|sɍqE5Ø nἙٷ!(uh}qy 3[8 THpթB]c0c. &}ao^p-"M zI{MA}.urkKƂ} 2hC|PWXQRp%- dv3xS@Qf'"5?BkT y }(X0,:DmhF.XzFVA \rA;oBX#FNUWKI fo ]œR>2oI8 b+ f=_#kJ4cBޣH=)YE"XuRԘ8yx JXb B9TMK~m ^>VU褞`;4})tZ "] F*ovCT\UK\TkPO^sZjIĉf!v;ӌ8}Kհ!ӺEȱ'Lɍ"ixXeFS}YPSaT|b4X74TԣƳ 鼩% _4'%~h֓PiPAU,YegG^Ez4`$,gU kwC橒&G dy$"vx"| 2ig-搪bw_9[MQ $KWBc^t_0z.OA18yD7=YPɁGhp$a_&=,"IKZ;,oHYOns{S-ҬhN%? J (0`H?닌;/4qu9[a랧1VØ!genIt:ɖ{A1Sn/3arpk;By̻-^#gFg;4ެˊ?u^uC[VL>cu//~&NI_vȄ^J)2 xajE1gw:NtƥWbWw)LnlzmE@684xv(0B[}`%v6ga,tA&6xҘ|}? M/4 o5S4*yl߽UK|$-f -$_@_pmx=PH%6klO) 4̴dxX2pEu{O/1ԸNP`sʭƅ+: w- }_ $oeSቼ*w~$zV 7d: ؓ}Saz?O9\tTȜz{arE,ƙiV&:zS 60trbZ<گYb\ A۰Et%, ǜpIWc 9ɾ;۶/~l@c@My< MYk#j$bxLnyoxVYXG4fIDpY"Dx0-C.L\]NIZ=3o/Sjg^I~}kJ#aW\zZ~JIn?tJ?a7`󑢲@q3td5 `qۨR!4!KCEc<%aLhC y6Wqp3E<@jfP4'8l:L]}X.Fa-wuI"yuB|=9Vͦ 6fkZP%Y41j_fJ72f&& JZZVY\c. Kj! }0 ŏV(bGGh^HetH4>ӆ[+$UL,KX8c97)7 5Oo2{ *zKVCm70Arn"t̨`ixfF8u}jK ?q _%ymd,kb2c4eo}x(< w47yXP W߻AT/ GOu UF =De<9WcS[Dy:Dи)Y™(olP} !]H8X֟Gs.3rtv"zYBu}@ƒ~XR䂟<@8*< =mhtuSn2tgԂSAT=jZ4]y!WPwV"U6aZ\~|ƻH-"ȡ6/*U7y(磢slSQh7nk y?Idv4;?q )O5L5Sc@f_~srmABmӏw=¡YZPc :P>ڳn됕 RuxL.XGʬ0ȩ`#yN~gAwZ&ٵw;-1/K {h/|ؓN8#.`/1icP[0**{֪ ۺ⯡Z+-DTqKHFWzg۟d¶z 3d옼-&0c8]cĶ ζ+3@'GeF}W5-=zڽ/<=&,z8HwGPXʜLHs/|OżGS}AZgYxq&EvHjF2k XyZTxϯ(ʩst6Po<2sgJ }}vp/`tbQ2-맋РB$`h=e>>~ybs8ʆ6ql+dJ5 LntƄy7/r\#e  L~AywKo2 XkJ4d¤\"+?@F &\)ds}Iu5l2}(F`~V\Q.?E[>dG:pÈ}O8OԒ]A2\7;U9#K sf#I7,fܣƯ!iZ AMYW _J +vrLSpI㽜dˢ+b;?*?u{xQ @0u!ʖ]8VoAOHTӵɵrr&)8Vܫu>Z^ߣWr|AþVrɦA*;[II@"f*whg?'mZI] TP '^b,ۧ`0W&*GcWJ:Y?B0h `_Nʣ.fhdU$F3jǙ/6ǞD8Cl]"@3  ij|<-*Y!EcǬ5K ,p!j,$c"C{=PXkt &BˀvkwceX{Ӈe:)?}c},]b"t?kDeStCF-'J0.(:WvQ-6 +uGG: ï TW}-9!kbA&?@VhOslIݰ[)s ](ꖫrnMѳD3y6#; 'q5XsGF(&MbdOAԈ=]ۺX ݬ5$F-tz+3WpĵEՎ}F1 7MnLerϢ<5~~FIb%b2L{0@06G򾅛Z|rWChMAG*|X:ͰY@፩eQ8$b[]{ #`0# ?YٴlL Y*Sw0@DǍZ4Ua)V* '5f)Iud1׿M_gHH`|-GvLʑ/ KJS|TJY!:0(|.-9@Vz>-a>V_D%RP-ôz+ Wh:`>6qn7_JKkSw2d^71 *4yI?!G{.Hi<^;E^$‘b^ɡk`%3m mpYpT,+.,!Z)}2W1)zK#guv_@2ŕ\wH 1?\Xg~o)uohxHS=$Ge Jm /J@[TvpElnU O '`H )ljͽ`j`qLgY A ѝ梺[h {w1ou 4k&.s^"u 9<#s&L.TSc'E v]]G񀯣4?a{:6K-UYK05+QomDO5Broؿa?3Z`%X@,>0+(-bi6+^ϣ3kbmw*uKTH=r ɂ3qX2D u(4lXgBYHd4H&d3@_Q GoNYr 3DJ#RC_XR|Ypd$dOJwշؐ>O#T܈ 4]'  [<*y \%yfdWq/?ȩ{TebbՍӁ)t,,7|Wrb/^bh:c>XPY5Dˣ^C hc8c9vDZ.gC*0A̭O"0+2hN\mV7Wސ <_L JPP T-,9XH JY@3'xoв^5FW9#:$G3J]9N*0t{~9}(uM$fAA1vTX>!ĚZձ#[7cI O >Z&WCwUc%rRc-=ܼ:1( ԰b1ƌ5"ߊA*>J򌹡_ϫ$jh $mNSKe7u-ʋRNH"mhd?#Cۊ=lN47LU|t!@AoR[,q [+l@j"L\g !gt@6XsW} 0BuO*5 Pn-{ڢ@{ps-My-R||!w,O,|&ԽASBE]Њa.u\ܺޤhx=t{xjN1t*pIcll˶H !S)%W&oWnë3A54Jbù}IYz__tT~Z҆} ,GƓ}cMڝ';]iWSF+aӠwh"g|93gT%dDOv6up e lTݾC ۞-O~>U ~Bn rΚ"vȾHeڅ#@QS{dr@](GkqN5rzd^Ѷ64^ѬWjl) oCrdmf'6f+mCk5\ޯJ`0M|6t)ΠڪU}Aci#eMV=zB5\͑J*E-hS+OȔy-f<׏#K9dzˎCc#yoKM: 2=_& ye@BҶ\it4Tjp`֭<F|I@`'-XJDܶ-AaROl.zLL0*D<^ `I5>& XÎofL:R}'8 ׁð(/FAQg;n7\3rppY5+Tїp5 Y! 6^1#Ҳ&~zHf72뇣B-`yici1ST1$ۣ#CZ"SR@KKGw!N I70]λ12rVW9.AR!mRDCA}?o-F7r3)V+X+c "w#}9ܫf*ZMݺw"_FʜzG,3Ķ0J])}s /pNBEk(&hs ˶2li2iO!wpTodtAeieYBژK /hZۋ#*n8K"H,v#/mΒ"q4Z?WB5< nҚVh#iT ` 0c](y4Lp#Ô2m?IR%V_SZ@A-AzE/[/X/~)72L@KeKNSwGgE˅cqDiT ^]6djlUc0GW]m&1%xѲE[\KStlP UUE{UbZ_ާ!x` HW{NݕщXG^`LRe|ʫP UE1b) IŘc5SoY-:k *͇7Zr5x%0<6Rֺ${&8̬^uld67dHQ\prljC]@qRl9ooݐqn BS7]o..iGJ>õ`jm/ J(o !>}Uk!]u_wsڐH}}՝-5 rx_)%}ٳi1 YR:sT7;ZDp^g{+ R(ٰj b@Ym cn{…ЂLUQh|ofݸ÷1Ζ@n0w_zŌ:Ɋn GqE'2<ꎒ@ cGk0 i>,=|3_kqaIp W7Ϸd&ؖ'mߢѺ>3o5T@tW5 SDZQJ$r?@ܻ8yUOp(bS> QAL8KGFQPMQ 3|UX 3i-#1R-y@`| )lyeH!g4>7<$<`o"eKap/wۮ.3FEL}]1o MԀ82%1RPP]t$LTLjɣ*dGU ʲi.@\s[!*\֒+;mgd&n|M>q,S%Mڨ^5TLm E~eqڱճ`r |c愮JC`>x - CqZ*}h+^:Jknͷv&>[mA_GѢ sU֕G0XL[NGqX+gx(/ͺҸq4 U%Alk-vQA9?(v>h!{"9\@(t#%E/5HHԸF)zw殗KGW Xz!ҕCbwZ*eMX匣D\I~R"cÆ˲-lD^0Zջ 18ث *K9ov8ƑAwtC+,f˖qd^D(CX #я1s3!FL@}4!e}E4 j(0PxG؏oo"~.j|>}qp25ǧ54Q%cW(Э|_ |⨅#{vWĸpBzm٬A R$n`7z>j˓\l؃JC "@갩RhJdԷ%XcQ47$07Kg+j.>t]вb#̡QW<3QtSS?j>łC"X2HY0nx84_/Yt:ClYHz؎^08Eò~{'!S7 t0s*8H!ƟoP6k 0؞٦ТXso:mo5Ҹ̻G1$ZRGRHW[ AoGx3)HZ<x5J |M]y @)6)ه)^:2N,"_VS?S"F^G^FNZgO}L7NPw|.=0UaqI(6nƛ˯9xֻ"8&z9IVG<}) Ӽ2,Mr'2w*MH&華~M(O.<ճCd4e >ׁZ3T~'mQl+T|`0 Jj1VAָPA /sjd'3NgZ櫥?{rWv&8BqF,Ϗ5aχd+H+nK>VUqrHq@TER}W\ΦM71!A).-[)%wIHMɥK ^Tڝz\p7*eʰ`6^BLhXsCxң(KV_ψQLga?xy4``N8G`;aPcG?f6C~ q.B;z+ څlF8ᮏ2π.[1?؎|wXF v[f;֓czvKrG/{KE 87eU[ rLR`iU?{{$ }B zНۼx'qPKww=![ntpJ}f$nl=7RU]yxBhJdReDP$Z# I1odݲL0# tJ\ G@;DDju%E1Jo"Pۅ(r.*11y6v3԰lᓫiX0fDX#HuJg1@s,FLV+q51w+*<,jmg߷&ּ"Ϯ8N-5kpk_[?fpe f\:!JuI z;ץq*v#uڟ~p;ptAuU(@,5DJ @EwJ1${j3ɏzug䇣jRP~q\ '3y2IlF58Mt],\@/m}h.T,͊_?DOkMڞ||SWDKwpzQ2(da1SE"0%s͵2,"snkߤ oG1 T$X/+D4Z n~yHA#D7cQT˧aUl* 3'&`b8LB~ϒX'ɦ׆6$}h6WNŦ0œyaTA13xqV?ٓ@X9HA<'RQVʑ_<|_EGiVt~U-n$4$ZU#x*ck/إb*Teq(bo:EnŒ@i-nl>1qW!DGŐeyISm`+?s潋,bvċ$p׉ #FzγGD m :|'Sƹ5C&sjpI*eZrt9>[PbYPg;r^{0X*v"IIԯ1CĴH [*/ˍ$ #˱FexcT6Iry6` ]CdahC%RUmr?7l7XXhp;[<55np-j>*;aT؛  pLv %sAd~ۡp\o<{؟ Zś,4T]͙;/%(ؽoe 0c({Qm~IOI&tŽp l5P0+CCēu!<59?fpZ@j?-?>+@ABhg~+"t QaJuꦫX#NH3:rhוu X0V1=FſnҷӃVYn?5ih;H%j?鿞PN|ذY ((:&$:Q<`;LAd-#-haNӽ%=MɄ0*) >@rG"x1ɈdvtB8Ƌ sy[|:󙁁3dt'^иyrm 6|DPW{e>bXO*й*Ge# Kb 2Ccvs5gY#dʓF>S3sF0tb5Ȣ-2j[xWpVl__kt&shUQHC}kRoҔZ/vL3Ѳv ;Zy<ů)׍E#~~#it&ػ߅sd*e 4=NVvBT~TI̓ߘ1 ʰ`uw0xkϯ/o8R ǚ.aziO;D]}%ǺCᕢG_}h1|)J(=;T}o9iȍpܒ_ +km/eӇ'TWR.%9ǐ@]Tfat3Ju%g6:+L! 0vDIo|wM@@Á5<fon{'],`c ;5u{ x{ݖ;/y ܒJr.Xh0 VhJlƋ+ uV]+z)%pgbBT+hM$I.+:%i2>iPkT]|miS;ы>ii& t&4N̝?ў߱ԍ!Vl)1DXk>yDJ?!kh*'nNEpTrx6ɲ0%ųЂZ">x."./~ ].VC!\\wa>Mط8uDV)+!N3@~ n\5V4B2-4Z_TPo$t)a<ǶEfꂔ][h2w7"V7kT ]1 ʼn]?n)EYmހet-t(m$g]z熊5czB{̟EvZ^8wz6l':G NȋUu9BL FeD,׎ֿo e_p }J(w]qriYn­FcI7.%ApE%Ǎ b:$=ǣ!81DUkкvE4N] 7< [-ܛr&d6 D3fӌ=Yt <WH%Y|&IIYv,WEA'' ͽũ./#/ SƭV<躔^Z<K[ z- @m"]|T0MU}MihoP Um\4 \&\X }O#N^}A=ERRĄTbWi9z!J={s_|=.>E3iqK)7RRӞr0HХBGJËz8WhrhuRdqƑOnSK4l1T~ʇ=1?B|u>x+P *7Oޥj"M;=,iOI[j|\张P ]5FeR>gtmفOa)9ȮeVB#FYG|O{^X߰B<-q@ _Ƕ YZ