libfido2-1-1.13.0-150400.5.6.1<>,ipdI_p9|$m{O-j :K35|[?z z_Nͩh ,:蔴v{j6))y(C  OOH"TT7R[9&rss}C4$?4d  ! A *7 Mm     @X(8!9@!: !>/@/B/F/G/H/I/X0Y0Z0D[0H\0P]0h^0b11c1d2]e2bf2el2gu2|v2w38x3Py3hz33334Clibfido2-11.13.0150400.5.6.1FIDO U2F and FIDO 2.0 protocolsThis library supports the FIDO U2F and FIDO 2.0 protocols for communicating with a USB authenticator via the Client-to-Authenticator Protocol (CTAP 1 and 2).dI_goat24rSUSE Linux Enterprise 15SUSE LLC BSD-2-Clausehttps://www.suse.com/Development/Libraries/C and C++https://developers.yubico.com/linuxx86_64WQA큤A큤dI]dI]dI_c-dI_c-536178c106e403328d5256b88ea33419aac9f4ca3c4e02c998d44d55da520cab63e265c0fcb92d60b812319bc503338068722c8837746e76097b050d1d3da0c281f1393cb2500690e04cde6b62adbf3aaff8f64b707c462b777ce309565aadcalibfido2.so.1.13.0rootrootrootrootrootrootrootrootrootrootrootrootlibfido2-1.13.0-150400.5.6.1.src.rpmlibfido2libfido2-1libfido2-1(x86-64)libfido2.so.1()(64bit)@@@@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfigld-linux-x86-64.so.2()(64bit)ld-linux-x86-64.so.2(GLIBC_2.3)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.8)(64bit)libcbor.so.0()(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libhidapi-hidraw.so.0()(64bit)libudev.so.1()(64bit)libudev.so.1(LIBUDEV_183)(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3d8cc=qbA@aaaI@a@`z`@_@_X_N7_@^^@^˳@^[]]y@\"\ \\N\|\5@[ @[ @[[[+@[ Z@meissner@suse.commartin.sirringhaus@suse.comsimmphonie@opensuse.orgsimmphonie@opensuse.orgguillaume.gardet@opensuse.orgsimmphonie@opensuse.orgpaolo.perego@suse.compaolo.perego@suse.comrpm@fthiessen.dempluskal@suse.comhpj@suse.comidonmez@suse.comidonmez@suse.comstefan.bruens@rwth-aachen.deidonmez@suse.comidonmez@suse.comidonmez@suse.commrueckert@suse.dekbabioch@suse.desimmphonie@opensuse.orgkbabioch@suse.dejengelh@inai.dekbabioch@suse.dekbabioch@suse.dekbabioch@suse.dekbabioch@suse.dekbabioch@suse.comkbabioch@suse.comt.gruner@katodev.dejengelh@inai.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.de- Use openssl 1.1 still on SLES 15 SP4 to avoid pulling unnecessary openssl-3 dependency. jsc#PED-4521- Version 1.13.0 (2023-02-20) * Support for linking against OpenSSL on Windows; gh#668. * New API calls: + fido_assert_empty_allow_list; + fido_cred_empty_exclude_list. * fido2-token: fix issue when listing large blobs. * Improved support for different fuzzing engines.- Version 1.12.0 (2022-09-22) * Support for COSE_ES384. * Support for hidraw(4) on FreeBSD; gh#597. * Improved support for FIDO 2.1 authenticators. * New API calls: + es384_pk_free; + es384_pk_from_EC_KEY; + es384_pk_from_EVP_PKEY; + es384_pk_from_ptr; + es384_pk_new; + es384_pk_to_EVP_PKEY; + fido_cbor_info_certs_len; + fido_cbor_info_certs_name_ptr; + fido_cbor_info_certs_value_ptr; + fido_cbor_info_maxrpid_minpinlen; + fido_cbor_info_minpinlen; + fido_cbor_info_new_pin_required; + fido_cbor_info_rk_remaining; + fido_cbor_info_uv_attempts; + fido_cbor_info_uv_modality. * Documentation and reliability fixes. - Version 1.11.0 (2022-05-03) * Experimental PCSC support; enable with -DUSE_PCSC. * Improved OpenSSL 3.0 compatibility. * Use RFC1951 raw deflate to compress CTAP 2.1 largeBlobs. * winhello: advertise "uv" instead of "clientPin". * winhello: support hmac-secret in fido_dev_get_assert(). * New API calls: + fido_cbor_info_maxlargeblob. * Documentation and reliability fixes. * Separate build and regress targets.- Version 1.10.0 (2022-01-17) * hid_osx: handle devices with paths > 511 bytes; gh#462. * bio: fix CTAP2 canonical CBOR encoding in fido_bio_dev_enroll_*(); gh#480. * winhello: fallback to GetTopWindow() if GetForegroundWindow() fails. * winhello: fallback to hid_win.c if webauthn.dll isn’t available. * New API calls: - fido_dev_info_set; - fido_dev_io_handle; - fido_dev_new_with_info; - fido_dev_open_with_info. * Cygwin and NetBSD build fixes. * Documentation and reliability fixes. * Support for TPM 2.0 attestation of COSE_ES256 credentials.- Use BuildRequires: openssl-devel instead of forcing 1.1 since 3.x is now supported.- Version 1.9.0 (2021-10-27) * Enabled NFC support on Linux. * Added OpenSSL 3.0 compatibility. * Removed OpenSSL 1.0 compatibility. * Support for FIDO 2.1 "minPinLength" extension. * Support for COSE_EDDSA, COSE_ES256, and COSE_RS1 attestation. * Support for TPM 2.0 attestation. * Support for device timeouts; see fido_dev_set_timeout(). * New API calls: - es256_pk_from_EVP_PKEY; - fido_cred_attstmt_len; - fido_cred_attstmt_ptr; - fido_cred_pin_minlen; - fido_cred_set_attstmt; - fido_cred_set_pin_minlen; - fido_dev_set_pin_minlen_rpid; - fido_dev_set_timeout; - rs256_pk_from_EVP_PKEY. * Reliability and portability fixes. * Better handling of HID devices without identification strings; gh#381. * Fixed detection of Windows’s native webauthn API; gh#382.- Removed fix-cmake-linking.patch because no longer needed- Update to version 1.8.0: * Dropped 'Requires.private' entry from pkg-config file. * Better support for FIDO 2.1 authenticators. * Support for Windows's native webauthn API. * Support for attestation format 'none'. * New API calls: - fido_assert_set_clientdata; - fido_cbor_info_algorithm_cose; - fido_cbor_info_algorithm_count; - fido_cbor_info_algorithm_type; - fido_cbor_info_transports_len; - fido_cbor_info_transports_ptr; - fido_cred_set_clientdata; - fido_cred_set_id; - fido_credman_set_dev_rk; - fido_dev_is_winhello. * fido2-token: new -Sc option to update a resident credential. * Documentation and reliability fixes. * HID access serialisation on Linux. - disable fix-cmake-linking.patch, not needed currently- Update to version 1.7.0: * hid_win: detect devices with vendor or product IDs > 0x7fff * Support for FIDO 2.1 authenticator configuration. * Support for FIDO 2.1 UV token permissions. * Support for FIDO 2.1 "credBlobs" and "largeBlobs" extensions. * New API calls * New fido_init flag to disable fido_dev_open’s U2F fallback * Experimental NFC support on Linux. - Enabled hidapi again, issues related to hidapi are fixed upstream * Added fix-cmake-linking.patch to fix linking- Update to version 1.6.0: * Fix OpenSSL 1.0 and Cygwin builds. * hid_linux: fix build on 32-bit systems. * hid_osx: allow reads from spawned threads. * Documentation and reliability fixes. * New API calls: + fido_cred_authdata_raw_len; + fido_cred_authdata_raw_ptr; + fido_cred_sigcount; + fido_dev_get_uv_retry_count; + fido_dev_supports_credman. * Hardened Windows build. * Native FreeBSD and NetBSD support. * Use CTAP2 canonical CBOR when combining hmac-secret and credProtect. - Drop 7a17a4e9127fb6df6278f19396760e7d60a5862c.patch - Do not build examples as their build fails- Add Conflicts: to supersede version 1.0.0. This is needed for a clean upgrade path on SLE.- Add 7a17a4e9127fb6df6278f19396760e7d60a5862c.patch from upstream to fix 32bit compilation issues.- Update to version 1.5.0 * hid_linux: return FIDO_OK if no devices are found. * hid_osx: + repair communication with U2F tokens, gh#166; + reliability fixes. * fido2-{assert,cred}: new options to explicitly toggle UP, UV. * Support for configurable report lengths. * New API calls: + fido_cbor_info_maxcredcntlst + fido_cbor_info_maxcredidlen + fido_cred_aaguid_len + fido_cred_aaguid_ptr + fido_dev_get_touch_begin + fido_dev_get_touch_status * Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. * Allow CTAP messages up to 2048 bytes; gh#171. * Ensure we only list USB devices by default.- Cleanup udev rules, trying to use the Debian specific plugdev group fills up the journal. - Make the udev rules package noarch, correct Summary- Create a udev subpackage and ship the udev rule- Don't build with hidapi support to fix issues with Yubikey 5Ci https://github.com/Yubico/libfido2/issues/190- Update to version 1.4.0 * hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. * Fall back to U2F if the key claims to, but does not support FIDO2. * FIDO2 credential protection (credprot) support. * New API calls: + fido_cbor_info_fwversion; + fido_cred_prot; + fido_cred_set_prot; + fido_dev_set_transport_functions; + fido_set_log_handler. * Fixed EdDSA and RSA self-attestation.- Version 1.3.1 - fix zero-ing of le1 and le2 when talking to a U2F device. - dropping sk-libfido2 middleware, please find it in the openssh tree.- Version 1.3.0 (2019-11-28) * assert/hmac: encode public key as per spec, gh#60. * fido2-cred: fix creation of resident keys. * fido2-{assert,cred}: support for hmac-secret extension. * hid_osx: detect device removal, gh#56. * hid_osx: fix device detection in MacOS Catalina. * New API calls: - fido_assert_set_authdata_raw; - fido_assert_sigcount; - fido_cred_set_authdata_raw; - fido_dev_cancel. * Middleware library for use by OpenSSH. * Support for biometric enrollment. * Support for OpenBSD. * Support for self-attestation.- Version 1.2.0 (released 2019-07-26) * Credential management support. * New API reflecting FIDO’s 3-state booleans (true, false, absent): - fido_assert_set_up; - fido_assert_set_uv; - fido_cred_set_rk; - fido_cred_set_uv. * Command-line tools for Windows. * Documentation and reliability fixes. * fido_{assert,cred}_set_options() are now marked as deprecated.- Version 1.1.0 (released 2019-05-08) * EdDSA (Ed25519) support. * fido_dev_make_cred: fix order of CBOR map keys. * fido_dev_get_assert: plug memory leak when operating on U2F devices.- Use automatic dependency discovery for libfido2-utils -> libfido2-1_0-0.- Added Conflicts to libfido2-0_4_0 to make sure upgrade goes smoothly as outline in sr#690566- Split utilities into sub-package libfido2-utils and package man pages correctly (bsc#1131163)- Version 1.0.0 (released 2019-03-21) * Native HID support on Linux, MacOS, and Windows. * fido2-{assert,cred}: new -u option to force U2F on dual authenticators. * fido2-assert: support for multiple resident keys with the same RP. * Strict checks for CTAP2 compliance on received CBOR payloads. * Better fuzzing harnesses. * Documentation and reliability fixes.- Version 0.4.0 (released 2019-01-07) * fido2-assert: print the user id for resident credentials. * Fix encoding of COSE algorithms when making a credential. * Rework purpose of fido_cred_set_type; no ABI change. * Minor documentation and code fixes. - Dropped patch that is included upstream now: fix-release-build.patch- Added patch: * fix-release-build.patch: Disables regression tests as proposed by upstream- Applied spec-cleaner- Build package without regression tests - Version 0.3.0 (released 2018-09-11) - Various reliability fixes. - Merged fuzzing instrumentation. - Added regress tests. - Added support for FIDO 2’s hmac-secret extension. - New API calls: * fido_assert_hmac_secret_len; * fido_assert_hmac_secret_ptr; * fido_assert_set_extensions; * fido_assert_set_hmac_salt; * fido_cred_set_extensions; * fido_dev_force_fido2. - Support for native builds with Microsoft Visual Studio 17.- Fix RPM group. Wrap description.- Version 0.2.0 (released 2018-06-20) - Added command-line tools. - Added a couple of missing get functions. - Version 0.1.1 (released 2018-06-05) - Added documentation. - Added OpenSSL 1.0 support. - Minor fixes.- update to version 0.1.0- Initial release version 0_git/sbin/ldconfig/sbin/ldconfiglibfido2goat24 16896679351.13.01.13.0-150400.5.6.11.13.0-150400.5.6.11.13.0libfido2.so.1libfido2.so.1.13.0libfido2-1README.adoclibfido2-1LICENSE/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libfido2-1//usr/share/licenses//usr/share/licenses/libfido2-1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:29838/SUSE_SLE-15-SP4_Update/42ca331cf489504e653ba09288e18023-libfido2.SUSE_SLE-15-SP4_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=82a556fb65fc5531fd7d332530558c7ed1dad833, strippeddirectoryASCII textPRRRRR R R RRRRR R RRRRR֩g?Vڅ0ҕutf-8e631d38b766bcd9e7df31d564e41bf07d0662f8fb28a2ae6794266c69fc03798?7zXZ !t/D0]"k%]du QaRr;╋[$h;!I͎TOUJGC6qs!L*]ɘ1B+"mcU^MX6,=' r^(e084s7u>۴Cm9^Lp):Y.6䞞.oHȀD!C*/<͇-)˪d`}!6z58Q?!"@M =ݖY94ͬml^XO»QIvod]`me"ܰF1j([k"I0OS*R^S`wc/3xGl8L M#Zf`[2Bh:}|@{ucg`[w@ԊzM~FnXr`KJ]Y笨)ARis0?l^QE ]Zw_ض>>vnb\(*]9&d/4A{ʶRIR`pۓ;cn}Z %[K^u\fO+]b+.&кU`(m}7mKsD X!-Rh!܄e>Lo4* QO)&H v$pau&e53k;gżT,THh%PSzbMb:ezG(˔C8Vd%'o7et O)TM0oڛsѱ({굤p3[KG D: b |A%ʸ[Jr @# 1uabd yV*$-2ciZ_Vc(ujh ~&je*˘k1 Y"HcP{oQOY3ZnI7Yy)tb.H Ǣp\d_t});ۂfϤT('9C9Q(ibt1;1?A P8m[T}udQHKXn@aB{.j‡g7}"@hpdG-K[ $9 00,fXm;_G&*61bP-On 0//KVBy,uk=_$ @b\Oz*ݙ~uԥ0&%eS7凂$}K^4m2|Ȯ:N0Y~exaA&,fTd6>Obz#Ng[^lK{q14 Dz}x< 8p֝`bj4M߷IITV(אַjZ{`ĭ*1 ሁ:]c\VA1 ޏqНHw>22# [f/q2{n* O(SU\tKP_)m$'42[ƸVvJ}#lBJV^~>SLD*;j̝(|㜬d8'?;Ri5ƅgύq^ސ3#{+4mjC5=ނkL{s*^^2#/m5{9:Nh-M/:uiQB fg >QvtOPz^f8:'IO}HĜX|#Jc<2<4e!AK>5m00158'w ꌻV\5:Q&\ JҖRW@@>, _CܔNMҜƎ@/YG3eg=,\YtbeguهV֩uX` RyHLy5aZ yPle8'7ƖIަzfZ1)p|EZCřC ,#]p vM8_٨5rv} $= U>H cP@.5*ҴwKpf Y*/2ظg Sb|!%X+3JQgMCp o8Z \K|؃f=f%8NT XDoq.\*!|Q&j)}ex zžnatՠͭkڲ0Qԑ,ZLU?3@q&G ;$,iǛgtI)*w0׌# o xm#Cj R4"($/ o~9KW6F9 φ8E&'gDC@pZd aX>8rG&ba-81Id؎ph{h?T/YJ{Mدvs9yD7ŏ^&0RB2nMQ}TBJ4f#CZ%9zn'.rACG@-`ޘFePG%bl">PH1a՚a 3;.@rf|%@DFeft,D$S_^u=~p%L=+}L$>ܔ"s-1 x</G#K XءQE.7qx\kq։=h:ʛ eǼ ~E#y6aPS@K7 v864%rLE^rBbQIT!yE}JGľ<8X>.]?>e$_wi"\Ց J H&4@At]0B!K~JXZQB]xw9S . Ccـmqh n\TQvciǹf7V׵{s"D1FmP' xf׃sq킶Nod6{ЏȂbhRS s'b sj?|Z(P\>r7Fc 8FuFc8Lj \JBY]Q{9QRƄkgpeayQF*j:g1`\D@;Mѳ\O7U/_غ`u9"s4c6VJIhr[C0UPSct3Cz*1~ :W/JhN;uVZQhÁ<(D7:+}kإ$Ich۴׭*w\;ċHs* ʪ2+G޵Yѯ^->'q ZwԙwH&{!kT.#ყ+}$2^%aJtc@k aL=ٜbK 39Y,`gZ>];3\&qnȓ&ޗ/!}^Ȉkf &8ٗr X sDTY]FLL>ƂW#oOF4׫&Y?8M {ߦBQ y7P5ٛ;Ɋ4- }$U-v9'S:,Xf(mW <ϽKqJ#:!ęNN0@6X9iy@8[ڟo$ǝ\LRQi7PeU|Cf(E>64.ORw4Џ?@JB/).R`X@eԞgS@*L]+G@?& $$ 5iolbw%E6{4cjGG'>;zTT''l=Im_Me9_HFbtF+;)/*{#v0=/ mk;#d<Pq6gw@0>UN p~[.5/޺ڐWwO4jъd8pgvc ƭ3vm!w΃bY3e7iYMt6YF;qfbV=/7Po=r.$^  c ekT{,)@shsyD71ۦ)R>(ďʽU "e@*K{4ڧw?"v\ƲЏdڎKqS@mg)oٻfn <;78LcLޘܚBRd( GdGBt1>N]$-ewC|2MSXdp>Urayr^rg8݄kucp|̪DE)o WA&{SK渶 ;4wҦV[ִczfLG>we1/TKZߪԤf!m$c$k G^%E=EXXi8+:eFg>F+D9F>>/}´|]tRr8H\?][YG9:ul??-QFQYp>r/YP_҉*DvZ"Ak{8m"J3i_e&"𭇐U0@Ah/ [5lwU6NSDskA 05kTCq-Ӳ5!W$U Jzbڣzt;pE^R}!ź3$JNJlh1}LrQr QpWv\[l!gUGI/,Hx1B Ata%=Dt:;@{¶3&),wHQFj OOekEץ/XJýQwQ'6G{Fe>S]#}A-FHD\#:4װC]ĥ*UdͪFb>Up3UpN2DFk%1z2U/ׅly  U-l3-@H61ZG@+AF2~7H8&7Hj\(23CEIFþ/4 ODKB :;Oez@=J݇Ig!dϨkdNQ4q4k&UvA%B\!RZU\f^'50 +co jQJ(EԤRTQvԪBnlz((ᶦ ikuYKOժr$ӰC= bH7=a΃]X{[l]g ʎ'w6DzړDzH `rx+dDƶ!˯`ynocafM(.k9fExrcIˆ6<Dא>c1##D=3~yQY.p"Q򚢳`QLAT% TQc!_RCʘH2ǧ_x)\]q$Xഊ@`/ 4BiK+.c_Y2sx؂WHa=j2|rؓQ{ǔ|SWqr?WK *71'` .{ݷEwr==Zpȟa,zԘKG6o_-E"+Z]ƸR+AI&E3iͤ_c~ ۆVy ר7lH~/ K (4(:Q8q0狤YmlaNvW)Afb8=Pg{ͲnF;)2 .[@H sm/^~"0W v,v66#22xjt>VMXu8s}dӥF4EL!ǿ#"S`)7R*K17+ xZ%$7=|,9K)d Rޘgͥ+ګFDQR+Ч $ཅGޙc4"YK4}pdF, 3mFD5 Ѱ95qO"o 1}EwCYHL  &7a"r9TS[0q#XrsO٢bf,K6'Aԏ{K[%XAaJ֕\q-?/`Wڱa>J<@&ygozcS|Q[SNЛY*Ġ@rw;fr`%Aw^ 5ѡb#c NLic)uM_;(.]z!<Σo 1`ai?rufuRLs]_7zWm~Eut:|Xp>4V{;M9'X*@q_WMa2K,TA; sSB (zL^"3" PVX~4M\B喒1Y]x%l*[aeYBRc: uc _ {VNO_=~L @_+'{ Ѡ ވ;Wx$QB> }L^Kr5Q^[M((URޠ>r1 aӣusGT`>=-2?4$ua}%dCsojm~W8GX/dۻ87EKc>ջn Wc)Xv# dN4A-k(fh|46a\g m;M 0hV›([G"N?qo;^;lWͻouO C'!bVI8|_X3(FHRA?I_<2`uFc-߳FbBgcknb=:alF:~Z~rh>\m{J?h6nzdgڡ #+ T ג[閵E xzj7Gt$+s/iC8zOˀY3$I:6LsmDI"%ı{s0j~VomB3a\%w{9$FmRf}Gr_9')Tl?\Li"oZWg̬=k:'wtBZj}‘JJL1!_rsKo]?{:#Ś1r|CY" Ū;t{ٳV ܽ? 's8UIA0Àڲwɕ栶7{N9wKcsj D1P'8Gߐ~W{ fDh++%C= G(ֲE5s(2QGkuhk?U;q : $ޠ0zB>9^]奛Kɻ-:r5r=W9*AYʱ!LH8_ |ڐ\LW4ohVqbό̀N칞't m5~孈sO죺;bac|U0nL LVQEC}°Ƴ8FԿWxv|H#7g<1J r[Gnλ@nPO!q?&*1Klʥ>$gguǾȀw{MݡV[2Zd[wS+ͶG `;R~S$!NL߃G`eJs aR獈:?ǔ]~ч`$F]4aIx{%czgliDpл&~HWUA_pr@M Ϫ[~#9loW8N*x 1v·}' ,O'U #3nJ`b]H)`KTRL([c:a0~/-ַ?ʇX!.hB!vVAJ%51UpӶk"wRx~ǘ!ٓK5&bR3LWIfvG (C"/Y|^8E% Y\ҫ1&j&[$F6sT 0&LGԟgc'NʔMpD/{XjE}ӡx'é*!pNo`ac/;fq˶#K@G}uKg _muFF@}l|:YG{4] GcD4/zCǔԘ~tW[ 8,>/71&'| >p[aa} |GraX:u~nݳ-=/#A#\,qC"~҆*MK=f8Big&(K=Sn !f В4N{:ce:걁"sh~,n} H| J0}3Ef"kMqaM!H'rO4A&%]+4sC»C)l6XF,A/P# %N`A!%s<@z>0() <;=mڅhˎ 䁕mMnJbuVf_G"<+\zJ  xo `.P8qKUkYX]z|tq,FDUÂ!!kpTr2RiXǃ`dZ  xO@V݄MZmc^>Բ۞tɿ1=1+=|r&ag5T 7夐"?DV Ǽ^_ye2T s~G4*ű^(깦r«|f.2%'r"Smd&˓m$BKP6LƔ7M'kk\a ,q*6f`ӯLVRvٌEJ-.ңA,T/jm~{1^Usv3̫6Sw^&4ګ2/fz :01Eji3 Byv ʪŻWp PB9@5\Aɹnou&s|aTyť҄jTn9S2J$#$X{7#NhpGP߬G "P ƎKT{0Ys]Yf o (9 tͯyMq5!Q뀽6*^ :kgrvO&`z^:tgqD,y~Ca:c=]ֱw ]qEQ=LǸhviU+ؾ'-]ܴrl< Ge %i?Q<;:%0|#׬}Sy* ! 9LVta YZ