libhogweed4-3.4.1-4.18.1<>,uĉ`wWp9|4ƴN7 +¨D^H99XI DUʦ{ȓ0;0_d7)xgfʘ[$7>Tlv*v* ԉ ­o@eQՕL,;P H==+zߧpN]ѓ_RȈ'f K>-a %D:b* ^Jo`f%^K,Y1L݈MfߔYK *5FjB䫄9,YflV\̟Cx4>@)?)d  K 17@L R X d  &HT   (89T:>&Y@&hF&wG&H&I&X&Y&\&]&^'b'$c'd(Ie(Nf(Ql(Su(hv(tw)$x)0y)<z)X)h)l)r)Clibhogweed43.4.14.18.1Cryptographic Library for Public Key AlgorithmsNettle is a cryptographic library that is designed to fit easily in more or less any context: In crypto toolkits for object-oriented languages (C++, Python, Pike, ...), in applications like LSH or GNUPG, or even in kernel space. The libhogweed library contains public key algorithms to use with libnettle.`wWxinomavroQSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.lysator.liu.se/~nisse/nettle/linuxppc64leA`w`w`w3cc30a37e8b91723d4cf7cc2b73074d39c58e47ddb65a77e92429c5f04a5f3ff01132a52264d92198e5d99e7348dc8a3a4491e0953acde66ee25d4ebdf890057libhogweed.so.4.5rootrootrootrootrootrootlibnettle-3.4.1-4.18.1.src.rpmlibhogweed.so.4()(64bit)libhogweed.so.4(HOGWEED_4)(64bit)libhogweed4libhogweed4(ppc-64)@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libgmp.so.10()(64bit)libnettle.so.6()(64bit)libnettle.so.6(NETTLE_6)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1``}p]?\6\@ZZr@Y@@YXYX=VIVUU<@U8U) U@TE@pmonreal@suse.compmonreal@suse.comvcizek@suse.comjsikes@suse.depmonrealgonzalez@suse.comfvogt@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdimstar@opensuse.orgastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comvpereira@suse.comastieger@suse.comtchvatal@suse.commpluskal@suse.com- Security fix: [CVE-2021-3580, bsc#1187060] * Remote crash in RSA decryption via manipulated ciphertext - Add patches: * libnettle-CVE-2021-3580-rsa_sec.patch * libnettle-CVE-2021-3580-rsa_decrypt.patch- Security fix: [bsc#1184401, CVE-2021-20305] * multiply function being called with out-of-range scalars * Affects ecc-ecdsa-sign(), ecc_ecdsa_verify() and _eddsa_hash(). - Add libnettle-CVE-2021-20305.patch- Install checksums for binary integrity verification which are required when running in FIPS mode (bsc#1152692, jsc#SLE-9518)- Update to 3.4.1 - FATE#327114 (bsc#1129598) * Fix CVE-2018-16869 (bsc#1118086) libnettle-CVE-2018-16869-3.4.patch (removed) All functions using RSA private keys are now side-channel silent, meaning that they try hard to avoid any branches or memory accesses depending on secret data. This applies both to the bignum calculations, which now use GMP's mpn_sec_* family of functions, and the processing of PKCS#1 padding needed for RSA decryption. * Changes in behavior: The functions rsa_decrypt and rsa_decrypt_tr may now clobber all of the provided message buffer, independent of the actual message length. They are side-channel silent, in that branches and memory accesses don't depend on the validity or length of the message. Side-channel leakage from the caller's use of length and return value may still provide an oracle useable for a Bleichenbacher-style chosen ciphertext attack. Which is why the new function rsa_sec_decrypt is recommended. * New features: A new function rsa_sec_decrypt. * Bug fixes: - Fix bug in pkcs1-conv, missing break statements in the parsing of PEM input files. - Fix link error on the pss-mgf1-test test, affecting builds without public key support.- Security fix: [bsc#1118086, CVE-2018-16869] * Leaky data conversion exposing a manager oracle * Added libnettle-CVE-2018-16869-3.4.patch- Use %license (boo#1082318)- libnettle 3.4: * Fixed an improper use of GMP mpn_mul, breaking curve2559 and eddsa on certain platforms * Fixed memory leak when handling invalid signatures in ecdsa_verify. Fix contributed by Nikos Mavrogiannopoulos. * Reorganized the way certain data items are made available: Nettle header files now define the symbols nettle_hashes, nettle_ciphers, and nettle_aeads, as preprocessor macros invoking a corresponding accessor function. For backwards ABI compatibility, the symbols are still present in the compiled libraries, and with the same sizes as in nettle-3.3. * Support for RSA-PSS signatures * Support for the HKDF key derivation function, defined by RFC 5869 * Support for the Cipher Feedback Mode (CFB) * New accessor functions: nettle_get_hashes, nettle_get_ciphers, nettle_get_aeads, nettle_get_secp_192r1, nettle_get_secp_224r1, nettle_get_secp_256r1, nettle_get_secp_384r1, nettle_get_secp_521r1. Direct access to data items is deprecated going forward. * The base16 and base64 functions now use the type char * for ascii data, rather than uint8_t *. This eliminates the last pointer-signedness warnings when building Nettle * The contents of the header file nettle/version.h is now architecture independent, except in --enable-mini-gmp * Prevent data sizes from leaking into the ABI - Fixes previously carried as patches: * Fix compilation error with --enable-fat om ARM Drop nettle-3.3-fix-fat-arm.patch- Add patch to fix build of fat-arm: * nettle-3.3-fix-fat-arm.patch- Build nettle with AES-NI support (bsc#1056980)- Explicitly BuildRequire m4- libnettle 3.3: * Invalid private RSA keys, with an even modulo, are now rejected by rsa_private_key_prepare. (Earlier versions allowed such keys, even if results of using them were bogus). Nettle applications are required to call rsa_private_key_prepare and check the return value, before using any other RSA private key functions; failing to do so may result in crashes for invalid private keys. * Ignore bit 255 of the x coordinate of the input point to curve25519_mul, as required by RFC 7748. To differentiate at compile time, curve25519.h defines the constant NETTLE_CURVE25519_RFC7748. * RSA and DSA now use side-channel silent modular exponentiation, to defend against attacks on the private key from evil processes sharing the same processor cache. This attack scenario is of particular relevance when running an HTTPS server on a virtual machine, where you don't know who you share the cache hardware with. bsc#991464 CVE-2016-6489 * Fix sexp-conv crashes on invalid input * Fix out-of-bounds read in des_weak_p * Fix a couple of formally undefined shift operations * Fix compilation with c89 * New function memeql_sec, for side-channel silent comparison of two memory areas. * Building the public key support of nettle now requires GMP version 5.0 or later (unless --enable-mini-gmp is used).- Fix postun->preun on info packages regenerating- Version update to 3.2 release bnc#964849 CVE-2015-8805 bnc#964847 CVE-2015-8804 bnc#964845 CVE-2015-8803: * New functions for RSA private key operations, identified by the "_tr" suffix, with better resistance to side channel attacks and to hardware or software failures which could break the CRT optimization * SHA3 implementation is updated according to the FIPS 202 standard * New ARM Neon implementation of the chacha stream cipher * Should be compatible binary with 3.1 series - Add patch to fix build with cflags: * nettle-respect-cflags.patch- Remove off-by-one-test-suite.patch as it was fixed by upstream differently- nettle 3.1.1 Non-critical bugfix release, binary compatible to 3.1 * By accident, nettle-3.1 disabled the assembly code for the secp_224r1 and secp_521r1 elliptic curves on all x86_64 configurations, making signature operations on those curves 10%-30% slower. This code is now re-enabled. * The x86_64 assembly implementation of gcm hashing has been fixed to work with the Sun/Oracle assembler.added patch: off-by-one-test-suite.patch - Address Sanitizer, found a off-by-one error in the test suite (bnc#928328)- nettle 3.1 (libnettle6, libhogweed4) - bug fixes in 3.1: * Fixed a missing include of , which made the camellia implementation fail on all 64-bit non-x86 platforms. * Eliminate out-of-bounds reads in the C implementation of memxor (related to valgrind's --partial-loads-ok flag). [bso#926745) - interface changes in 3.1: * Declarations of many internal functions are moved from ecc.h to ecc-internal.h. - interface changes in 3.0: * contains developer relevant incompatible interface changes - Removed features: * nettle_next_prime, use GMP's mpz_nextprime * Deleted the RSAREF compatibility - New features in 3.1: * Support for curve25519 and for EdDSA25519 signatures. * Support for "fat builds" on x86_64 and arm (not enabled) * Support for building the hogweed library (public key support) using "mini-gmp" (not enabled) * The shared libraries are now built with versioned symbols. * Support for "URL-safe" base64 encoding and decoding - New features in 3.0: * new DSA, AES, Camellia interfaces * Support for Poly1305-AES MAC. * Support for the ChaCha stream cipher and EXPERIMENTAL support for the ChaCha-Poly1305 AEAD mode. * Support for EAX mode. * Support for CCM mode. * Additional variants of SHA512 with output size of 224 and 256 bits * New interface, struct nettle_aead, for mechanisms providing authenticated encryption with associated data (AEAD). * DSA: Support a wider range for the size of q and a wider range for the digest size. * New command line tool nettle-pbkdf2. - Optimizations in 3.1: * New x86_64 implementation of AES, using the "aesni" instructions - Optimizations in 3.0: * New x86_64 assembly for GCM and MD5. Modest speedups on the order of 10%-20%.- Add url to the spec- Revert back to 2.7/sbin/ldconfig/sbin/ldconfigxinomavro 16234228073.4.1-4.18.13.4.1-4.18.1.libhogweed.so.4.hmaclibhogweed.so.4libhogweed.so.4.5/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:19992/SUSE_SLE-15_Update/7b36791e9baf82c780350a401b6ae80d-libnettle.SUSE_SLE-15_Updatedrpmxz5ppc64le-suse-linuxASCII textELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=26cf6bc2f98bb84ae335a2df2caa2817da745d37, strippedPPRRRRR_1Z'-:utf-873e2452dc1f6c9e36a0f537e7d4e60aefe6c5243a2e24c7fc50faedc69de9eab?7zXZ !t/mG]"k%]d@^\."\=iQf,RϛkMyaP,8P f_h޴\2]OQ %- 66!} ק-NX`xnYxk,z2?(-kmm;kq+z-mJ]o¢jKbeM5mAm{}'2S*=2JQ?omݒZ sAkJFoB .:ܽ /Zt$b=^I݄e,;1Z%){lWn/,0 ?Mc%lKLy w]+1'bBe-D^]-(Uk΋.HAjǍA59Ҍ8[zCO1C}}zJ3d_x&!%ng·8ېi<68 ѸuIO6ef@L;C^%Ic::x"V;-ye,0ܢ Mns~q--B~EGmB=`;)CXF$>R( 9Tk(Nl nYx˅3?Kځx(j4Bb星Pk:8>Pн}LaZF麫rV [ <b@&{ K8"n>yPokγBxU7Ծ=}uLr_Pխ.ih]ePJ\u=rruNNVЏW&>5к:Fb_UwbHpOEFy~ eΙ&]d(b'8jhLl5~Nh 7TpUɊ#ҹ3h@դ+3MZJ"7`2>ǜ 3H $ܙ6E w=MU؀#>faV}p4)1+ErbN\6AWamNO>Rm9 ZG&v"kIsRĻ2Get4?P9i.ZU8\Nm^p "LrLOT&BJf6odzN#@6 VI а@ Kj^qMGHK @eKo9z~R!gbc9ޥ]mq2&-5 cۀ ;Pia9Fr ܃B2J^V[E>5uLŁ= ǺD].C细Iؚ>9PPÿ=_l ?6p9v\,gR0p''XY+wUs O1IlFW2?h2KCk犈c{MDMddmt*1 '4ƲYN+6A'+ OUitaI1aRCfDnFM|C[;NXO^z>-( eڥı1WMvdBF"650{,{ӻM/5(a>v{ju7 Hikw~z}?1Hg;֖1p(=2bU+vD͜\ޓA jWvϤ_Q_VʃMq|QP;$S8|E`d+ 1jmζʁhT[!@tm3;t]\h(ܕHgk h\lMq{Frz݊f=|yxj^)ln<]vLߟlM8YHep{<5[(E:|O$All7+ƈAZ_]L4g!Z"vɰ bF ޿ zTh<[!kJ5no %' BWM_ˠH|]{]c rHmu!~MB|5e'-r[0u1/jPɕB$Y~ɵ+L,|sH yGu1cMkrnF~edr^Bttc=6 Ɇ~g#H\?aN UZȖ} o^G֕ilJWp~s\NCUD0OiKKf ?Uĸ/٧=D* b$DR'ix1EKO6aMpNc*Rwzn˻ЯN^60 J9zY RPpXqV'~BmP6^CgEQa7!Q=cuaמ6)19zg/K_²sc+p^H"?ёHϫֿuhy,nclMS$L-4u;KYMyUD"Y#ܪ}S=NrrzC%A D5fV= uJ*fi.qyH'<AT$]N /_b s(KmK  /6c`E?2 _ :MCK 1yUSQm5]2+`wrꀌN%EnVgamN&{Wm/9@ G~Dhz-F#$fQi1 IRPX z 6Pù5l+eOli h]_.8us0s*gܷMFv;yϓMgn ++:!|VCqHXJRy E3tR}mC>Ӊ}1ƛ\+DO SB|ݘ|ިݫ{gX CȀJOEȰoIDdVE\+^N՜S"} 9ͽۆ-9!d77!ɃX aU&iIa*QZMhP>csi: 窸XXmRl z7$Qe=cbbw^)=Z+"2K66#XRLXM'KF|*1)fs@E>Wf r5ƾ!LJ 8C1Ȼ7W\c<ަv~"iC1^qg =ev|z!JM \}_4Q0(\\4燰KQ'#NѝxOi\RH.6rY ʛ4SVtψtQ,}u‹l Qk[1W_==^0z& a=%%dq$>,Nb~MM/:-Q}XB~! 5ҜH=S^aD]pnK㞇``6Fr( MJ#ڂw+1G 5f^rd lB657 / ׄ]uyIoJ+{XcD:O5p5eu63p-}A.N2F9E#&%6MxW_UZ`]"마/ w^z'sV|C3a*2iO pn q$'`ӴmEt?Z*E6Ԕ]r nȗ%?֥YϽB: @e (r#SgAu߅8 or$d6/ :Gƒ-}Gu9+Ui4G,mQ;ض;sML-B$CdwMH2`SnXZH!km|aRU%s+Ϙnw"42[7ʁ.}ˮ>V>^x<|g@>{$g3?O}5ZZ 0hQJ Z(igfg?iHbgfR\R*Xf+ 93yg /ҝ4bѸAF%e$м6/efrk!k),F"kEpPvz75ߢ$_gKͥKo Q|]Idעzwk wUG,PGS#Qoe8Źd7pOa}}!]4l$< q>'%P+9srjֆtT\9?C%Nd %O>w m8A9,ck?KUɝ!|$i':mӊ$BTT̠3G:_\fR' $f}ΨL:P׿Ù dB; *VLGf&;O<Աǃp)xOD[(k_S-s-M!&Ek|28u&B2V&o0tvGrC `a<Uet߻clplamоp2 0_CvMa Bx${wSи]؞wڢ! Pr75_je֖uCK m?JA s6Ht([yq˭'@vY\#MCP{^vuYp>A'o VB-Rzxĉ0cCmG͌KKhyPWX֡FWvhp:B:ٖHݶbW/CTiB[8 3=/[͗p`8a)9Ί?42JS\; 穳 b9b9v*Р'h W [ԨzJoT ;>3fuJsWzzD%z_tE]nنA^%yf]5Zz _ALx2-w'7Y%0j&BvqxS5"9kNmt9H5 =(ʭG2 &HG Y0U;/ғ=o<4r¿!DֿGZr@ʟ>ܗCCePp 'GW7e . qdp}\D^їGq}{ʈ%p!7acwo-f1^>}aY{ym 9޷̈́j\3-;G{P,fJL[3qP7؛+7R"2I;_T' (dlD Yug~LT`Nn׶4AU+升4!~b@#Ⱦoh!))%h|Mvgic#^gt_^h~06{q>uD hυ55{ ï+[GKNE_{"1H#4^D*>c%Hqp#dLw#~wNߪ?pRҶuRo*I\Ԛ%4M7'Zo?+*Q*QRθ?Nm4'qI#s-k0~nr51~n`l#gLA߀dH\[b\7c,3Mr@#7 ."3\R 89ɾO-W7+{( ]^k'3>Ng]93k/ u7 H uW["}s]MyWٳ~`R4jIv٨9HXe(Nq(aZ0%y<7/W m^PF V.{ۦ;1z;e*a/U=4H/88{lVKZ݇@Q֕fX@LRnFʴ\"~nن%Faˈ'k̪D!nW}A=ӽZj$݅L e$ jw;{i~m$J 6>fΔI\[QfŎ""V`BbzmaffNՔq4R 4u1k]~ފ,A^ɳrhÈ[R!8KRhjm+U]JMLpvjfOI+x q+bRBL9QG1X xp>' z0 S }d 1Rk?|`g/i_ZY][59T`;-\;crP\Ksi}CMqx8 \nEuzI$d~ O/5`WA(Vzh=pm(g{+ F R說"h6FMo^dbo,kGCf 8~?erό /5wcy ߸% x͕1)'ĽPo$UoP>N!s-dtX%Hq|@' UD+hy4Nݩn$rC=o,q2vlcC⡐^;b!!/I2$KQ Ȃb[Yg 0 3j-K51B%>'#zޯ8q.Bj8ܷhTK;ՂƘAh/q'cɄ~@9H%%R\j h*Jiv!Nj6O PXt Hp1ތ 3;,(}IL<-Hi:zuYe1l Q5Z%lWg͓Mh(T Wn,f# qe џ*dۦ:Q'-D)6 `ۍ= v'/@V]i+"zd#:~J yM rcՄCwӧQ4F|T1 iRa* An} ˊrA{s,vU{ [f2F a Jb+(Mq^caž"9) qGgWG0-a$ipA{W:7+!~Cl T5DѼ0i֓$/ߵqn#>&bSKU^toެc 1wdZ Q^$j{+#dAV$u@juG{]*qD)6&7HC-;.2/3i=Jg`w\Zr PW3篗5Xq0{thYTy )]So_yq)q%\:x9ը^N95 oх/>}1!-AU-PSr"h:xª.*Jk &\ dYY#1n +I?qEHAEcP(;WA=1MT yHWO,-$!̒ 04ln*ffrƺ=F rxr)7E xL%/:4U@5Yi_9LΡgN#[0xh݃^;/B AN@VdMR~gq/o[t.BO'몑:#?.6nDVBt ťJl5w̶/GS2:_Q:rjwv t%XTyIQ@E+Gv2O4HX fWxS-b6'FUy~-9 d uD FʓEZH,(Ms;'ǵ1TB@(-?SoO@@vEVORA'8JNAy䈣 xUƨJ ᚿp锍:dGtfdP={KOZl=%[DiFØϟ'`ì9ڵxԉ҆SgSU_xS`e14Lhy9cu})%ʣmZ NxM ˡ(H*xWf^qI;}(,@AB6#z r%d â?Р_.h¦e%&츆JטPvc)p9r"/rpcHĴ* gpm \{] vt- Cyn׾4$y(|9I/o F r;ue#[j'g>9z)<_j1~ FnmAUNv³ "bAf4nçR3rnD 5h/x%@.)皙rZT.h[.tY3:Wy-Aq|Jd6`Qxs^/ϫW3tF CJeN9 h8]w쟹9vC7A(BdE5}lQٖ:Tu:+J>%Gg֖.p%%8_ I$4pl#k1Zl 7E >x0<*/.dL`1%lǛ ƙ 9~De ~X.< ,9{`nI;A!M]Œ$LO'QSB!/i̟|: ъl[!d :=v8f4#؇*M+Κ# 톻7Vcy(, .|b]7(`/8κÊPukwhy0nK1xSƚKLq1fDJג`I%Py9abؕɛ:#bo\xJٳ3۷%XaHPnH^8 ]N~4^qU3C,T '==ONG86C~0=t5>!-U3d2->鰽`V(-H[HUn Y,+<#& ̟Bwgo%KZPOxE6!z=L7)()9h\:NVc]ڀ}0Bj8ftiD] /s.g͞Fl>V"'z}Α|uB xJ޶T%%\7|V/xҜV1 d E_|C%k=p||W'ŖQ[+ oq)%Q[H@}X.dh[XjSQcp-*5ѥ/4T{(cRQnZ"!OͨwK$P"Z'2,s+|T˟BJ>҃/iӻ{^;t v|퀘[-bJF2W'Guᴘs-{=ʴ x?΢x >bs'"aE/^y+Q )&ȡf2^/3+-̾5/-<1Y*V@B_dpxS8h&DT*3Y-]Y(θ(ؑ]6 T hxPOpv5 tIQ(kPeH/lR8ZCT%0c<CɎgYFCv;mw/# yddr1;b7MRd1 9`^{VS ]^dHs1ۛ~͕z"g_s f8@qWWmimMcz*?[qwB[lyL :!#VnijL?Q;6xmQv'ߔdUkQF rx0趨 UMdʀ.x dU5$7y Io `]Z[[U:d2즒A,8Z1jÁOb fYR3O˲Ċ[<_}B.E3~싌^VcHaՆ^~g> DCbBm޷A30y95%#eQn3<`abh]Z5D}i fD)cZ8rkj4zӣ%I(彊C1ĜPOhwjIˡ쩏8;,dpt7f)ф9Mi~]61eY$CS;L9IrR$rUmȐr_w,zfL7vBdWzmb%=*DFMvIyyiL+N@1Wjs4y| `6֋D4+`>FpfWdKC݉I%aCw8?CtmmmRcAs ɣ&:˝m 3u樦* O5FԀk3mXI)Dz/Z(HQDWl$g|Ryr^ bp[q y_X{Vt@3?\Yoվ0ͳK^A/`2ZyGYoRyTo>qҫDUFyxO[y)92El0K.ovH|q4L9K,nzNc3Yce,P(٢ʩ0`-7ItYO$3M vִ/ FМ?z{R8#zV1m&6nM[./&뫨[W!Et7W":QS(U a*t>׳yLZ>,ڤ+ QS#mh{]QIҦME#ׁxlKom>bHN4lKgnw*ۡ|[D7Ǜ+}"ad#Hv_%tO=9qNppQ* #3>chkEZR-ӕϚ"L!X45Y^@R!#MzOE;;$4y\I=YW#$ϋ$~+c@{Z.˷W?+,wZwQ ũGPܦ}䉺lܟp(i*_"slg4zfijS'ߏðˆ2m٬ yQ;Y39:UBZl`Ik&$X`@0A"ZEy EXHF􃏦m[T?ͻhj3LJ&‡WEW)F7P2Ĉt fnyDNTl ihh+Z;B1*oezJEaGjh^̈́7ݒBIˍh=4Sik|~jk| hl0Ń ';KK, @.)FF=eOBmTBkF/(P&1C2BY//’g,-(%Hs%D|;h'W?wD`HX01õVL {O͊⩆|Bj)xr BݬKD-MbͿd* |=,SТlF4{5͏ C 'UlzHWxGf7{_QT)IeFe.-x89}װÅH]'f=kC*>^KߗYG_T++ܖ'9L؃;k'B g-l"#,FL̈́2VlrsAkNZ`y -0)׽Զ{z95b1AwRt%'QZמN}dRijYf9sU&*M!Ba3'*_ZC`ua&yInDEND3-qEִq iƘx{8>|8ݯl gt߲'CW!PhQl _2$sYmei ņu0&ʣzg7O .J~TpJY=ĝ.LWBʓIr%ᇎ݌ms161hLѸqF/D?֯BMj4m>,תnhPiEyS_ob{MY $q?CR0@.فRag=fmƫg8tv RX@Vt = a.ZH)T yޯO!Y>J:"6Q5q{/@oQsӓmeR5eԓ 3%1v$'d~Biׁ#ttRZ o`0dWSB.E' GHRj(^qϓ`& 8b(v3 `q*8H6ONܽ$˷Xb9Cl ʒ+ v^N+m >Yԡmݕt8HmUεIop~lyAM ٓda̖yfyEql׃B)j Ғ C`*FWUo}abLY[[}B1I:W1dt|nЬx!@ON>kuΩi#1_?i\JƏ?< YZ