tboot-20200901_1.10.2-150400.3.4.1<>,<dbp9|=nw&{7m.>FPɏe}㉩@xTH Hi^{1N?(XSӂi4D}:*0A G< EI |ej[f\:ϊl_-*y`Ȗ@T䧎%J!AQ|, 94 <}p+$k]Ģ1Լgl-ӁH9vYM9;p H&%qzj%8,#8xi㬃>D_p?_`d % ^ 5Vc y)|) )  ) ) m) )<) ))(894:>M@MFMGM()HM)INp)XNYN\N)]O)^QbR;cRdSdeSifSllSnuS)vT$w[)x\h)y] 6z]]_____\Ctboot20200901_1.10.2150400.3.4.1Program for performing a verified launch using Intel TXTTrusted Boot (tboot) is a pre-kernel/VMM module that uses Intel Trusted Execution Technology (Intel(R) TXT) to perform a measured and verified launch of an OS kernel/VMM.dbgoat04 3SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Productivity/Securityhttp://sourceforge.net/projects/tboot/linuxx86_64 loader_type=`sed -n \ "/^[^#]*LOADER_TYPE=/{s@.*=\(.*\)@\1@;s@^[\"']@@;s@[\"']\\$@@;p;q}" \ /etc/sysconfig/bootloader \ 2>/dev/null || :` for bl in grub2 grub2-efi; do if test "x${bl}" == "x$loader_type"; then mkdir -p /run/update-bootloader/ touch /run/update-bootloader/reinit break fi done# there is no clean solution for refresh during package removal at the moment. # %posttrans is not executed during package removal. loader_type=`sed -n \ "/^[^#]*LOADER_TYPE=/{s@.*=\(.*\)@\1@;s@^[\"']@@;s@[\"']\\$@@;p;q}" \ /etc/sysconfig/bootloader \ 2>/dev/null || :` for bl in grub2 grub2-efi; do if test "x${bl}" == "x$loader_type"; then mkdir -p /run/update-bootloader/ touch /run/update-bootloader/reinit break fi done if test -f /run/update-bootloader/reinit; then rm -f /run/update-bootloader/{reinit,refresh} /sbin/update-bootloader --reinit || : elif test -f /run/update-bootloader/refresh; then rm -f /run/update-bootloader/refresh /sbin/update-bootloader --refresh || : fi@OTb&h+@Ӹ̨IX)8Zz;K   E "  i~KAA큤A큤d^d^dadadadadadadadadadadadb`HU`HU`HU`HU`HUd]`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`HU`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-20200901_1.10.2-150400.3.4.1.src.rpmtboottboot(x86-64) @@@@@@@@@@     /bin/sh/bin/sh/bin/sh/bin/shlibc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libz.so.1()(64bit)perl-Bootloaderrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3dw6a\>@`!'`@_u@_q@]q[^[h@["@[-Z`@Z_@ZZ }ZC@Ym@Y3@YX@X@Wj}WN@W=W@UL@matthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.comjengelh@inai.dematthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commeissner@suse.combwiedemann@suse.comjengelh@inai.demeissner@suse.commchang@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.com- add tboot-bsc#1207833-copy-mbi.patch: correctly move MBI from a lower address above tboot (bsc#1207833). This fixes a broken boot situation in some configurations stopping with log line "TBOOT: loader context was moved from 0x
to 0x
". - bump date in version string to fix the upgrade path from SLE-12-SP5 and SLE-15-SP2 (currently at 2019070 and 20200501 respectively).- update to current upstream release 1.10.2 (jsc#SLE-19480) - README is now README.md - acminfo and parse_err now are called txt-acminfo and txt-parse_err - lcptools are deprecated (tpm 1.2, TrouSerS dependency) and are no longer packaged. - changes from 1.10.2: - Fix ACM chipset/processor list validation - Check for client/server match when selecting SINIT - Fix issues when building with GCC11 - Default to D/A mapping when TPM1.2 and CBnT platform - changes from 1.10.1: - Indicate to SINIT that CBnT is supported by TBOOT - lcptools: Fix issues from static code analysis - changes from 1.10.0: - Rename TXT related tools to have 'txt-' prefix - Clarify license issues - Fix issues reported by Coverity Scan - Ensure txt-acminfo does not print false information if msr is not loaded - Fix issue with multiboot(1) booting - infinite loop during boot - Fix issue with TPM1.2 - invalid default policy - Unmask NMI# after returning from SINIT - Update GRUB scripts to use multiboot2 only - Enable VGA logging for EFI platforms - Add warning when using SHA1 as hashing algorithm - Add Doxygen documentation - Replace VMAC with Poly1305 - Validate TPM NV index attributes - Move old lcptool to deprecated folder and exclude from build - TrouSerS is not longer required to build - lcptools-v2: meet requirements from MLE DG rev16 - lcptools-v2: Implement SM2 signing and SM2 signature verification - lcptools-v2: Set aux_hash_alg_mask to 0 when policy version != 0x300 - changes from 1.9.12: - Release localities in S3 flow for CRB interface - Config.mk, safestringlib/makefile : allow tool overrides - safestringlib: fix warnings with GCC 6.4.0 - Strip executable file before generating tboot.gz - Add support for EFI memory map parse/modification - Add SHA384 and SHA512 digest algorithms - lcptools-v2: add pconf2 policy element support - tb_polgen: Add SHA384 and SHA512 support - Disable GCC9 address-of-packed-member warning - Fix warnings after "Avoid unsafe functions" scan - Use SHA256 as default hashing algorithm - changes from 1.9.11: - tb_polgen: Add support for SHA256 - Configure IOMMU before executing GETSEC[SENTER] - SINIT ACM can have padding, handle that when checking size - changes from 1.9.10: - lcp-gen2: update with latest version (wxWidgets wildcard bugfix) - print latest tag in logs - add support for 64bit framebuffer address - changes from 1.9.9: - tools: fix some dereference-NULL issues reported by klocwork - tools: replace banned mem/str fns with corresponding ones in safestringlib - Add safestringlib code to support replacement of banned mem/str fns - lcptools: remove tools supporting platforms before 2008 - tboot: update string/memory fn name to differentiate from c lib - Fix a harmless overflow caused by wrong loop limits - dropped the following patches since they're now contained in the upstream tarball: - tboot-Add-more-mbi-validation.patch - tboot-Add-support-for-EFI-memory-map-parse-modification.patch - tboot-Configure-IOMMU-before-executing-GETSEC-SENTER.patch - tboot-Do-not-try-to-read-EFI-mem-map-when-booted-with-mult.patch - tboot-Release-localities-in-S3-flow-for-CRB-interface.patch - tboot-Unmask-NMI-after-returning-from-SINIT.patch - tboot-fix-memmap1-boot-issues.patch - tboot-support-sinit-padding.patch - refreshed the following patches to match changes happened in the upstream tarball: - tboot-grub2-fix-menu-in-xen-host-server.patch - tboot-grub2-fix-xen-submenu-name.patch- backport further patches to fix boot issues in UEFI mode on some newer machines / firmwares (bsc#1180756): - tboot-Add-more-mbi-validation.patch - tboot-Add-support-for-EFI-memory-map-parse-modification.patch - tboot-Configure-IOMMU-before-executing-GETSEC-SENTER.patch - tboot-Do-not-try-to-read-EFI-mem-map-when-booted-with-mult.patch - tboot-Release-localities-in-S3-flow-for-CRB-interface.patch - tboot-Unmask-NMI-after-returning-from-SINIT.patch it is not fully clear which of the patches are strictly necessary to fix the individual boot issues. None of the patches should introduce any negative effects, however.- add tboot-fix-memmap1-boot-issues.patch: fix boot issues in legacy mode on some machines when using grub2 multiboot(1) directive (bsc#1180756)- add tboot-grub2-refuse-secure-boot.patch: don't generate tboot menu entries in grub when the system is running with UEFI Secure Boot (bsc#1175114). This prevents hard to understand error messages when trying to boot tboot in this context.- add tboot-support-sinit-padding.patch: support padding in SINIT modules. This should fix tboot issues on platform coming with preloaded SINIT modules with padding (bsc#1176378).- add zlib-devel build dependency to fix openSUSE Leap 15.2 build error (shared codestream with SLE-15-SP2).- update to new upstream release 1.9.8 (FATE#324359): - Skip tboot launch error index read/write when ignore prev err option is true - s3-fix: fix a stack overflow caused by enlarged tb_hash_t union - S3 fix: revert the mis-changed type casting in changeset 522:8e881a07c059 - S3-fix: Adding option save_vtd=true to opt-in the vtd table restore - rebased patches to match new upstream version- Use noun phrase in summary.- package new upstream tarball for 1.9.7. It seems the tarball was replaced upstream without notice, because some version numbers have not been incremented. - tboot-grub2-fix-menu-in-xen-host-server.patch: rebased - tboot-grub2-fix-xen-submenu-name.patch: rebased- update to upstream version 1.9.7. This in mainly a bugfix release: Fix a lot of issues in tools reported by klocwork scan. Fix a lot of issues in tboot module reported by klocwork scan. Remove a redundant tboot option Fix indent in heap.c Fix 4 issues along with extpol=agile option Mitigations for tpm interposer attacks Add an option in tboot to force SINIT to use the legacy TPM2 log format. Add support for appending to a TPM2 TCG style event log. Ensure tboot log is available even when measured launch is skipped. Add centos7 instructions for Use in EFI boot mode. Fix memory leak and invalid reads and writes issues. Fix TPM 1.2 locality selection issue. Fix a null pointer dereference bug when Intel TXT is disabled. Optimize tboot docs installation. Fix security vulnerabilities rooted in tpm_if structure and g_tpm variable. The size field of the MB2 tag is the size of the tag header + the size Fix openssl-1.0.2 double frees Make policy element stm_elt use unique type name lcptools-v2 utilities fixes port to openssl-1.1.0 Reset debug PCR16 to zero. Fix a logical error in function bool evtlog_append(...). - removed tboot-CVE-2017-16837.patch: now contained in tarball - removed tboot-openssl-1-1-0.patch: now contained in tarball - removed tboot-signature-segfault.patch: now contained in tarball - removed tboot-ssl-broken.patch: now contained in tarball- tboot-signature-segfault.patch: Intermediate patch necessary for tboot-ssl-broken.patch. Upstream tried to fix OpenSSL issues here, but failed to do so. - tboot-ssl-broken.patch: Fixed memory corruption when using OpenSSL functionality like in lcp2_crtpollist (bnc#1083693). Fix has not yet been commented on by upstream (posted on tboot-devel mailing list).- Also cover cleanup of bootloader configuration after package removal. (bnc#1078262)- tboot-distributor.patch: don't add GNU/Linux to grub menu entries. SUSE's grub2 itself doesn't do it as well. (bnc#1078262) - perform update of bootloader configuration after installation via %posttrans. (bnc#1078262)- tboot-CVE-2017-16837.patch: fix a major security issue in tboot. tboot failed to validate a number of immutable function pointers, which could allow an attacker to bypass the chain of trust and execute arbitrary code (bnc#1068390, CVE-2017-16837).- tboot-openssl-1-1-0.patch: make package compatible with OpenSSL 1.1.0. There's no upstream release containing this patch yet. The patch builds against OpenSSL 1.0.x as well. This is for SLE-15 support (bnc#1067229).update to new upstream version 1.9.6: - removed following patches, because they're now included upstream: * reproducible.patch * tboot-grub2-suse.patch * tboot-gcc7.patch - Changes in this version: * GCC7 fix, adds generic FALLTHROUGH notations to avoid warnings appearing on GCC7 * Ensure Tboot never overwrites modules in the process of moving them. * Add support to x2APIC, which uses 32 bit APIC ID. * Fix S3 secrets sealing/unsealing failures * Support OpenSSL 1.1.0+ for ECDSA signature verification. * Support OpenSSL 1.1.0+ for RSA key manipulation. * Adds additional checks to prevent the kernel image from being overwritten. * Added TCG TPM event log support. * Pass through the EFI memory map that's provided by grub2. * Fix a null pointer dereference bug when Intel TXT is disabled in BIOS. * Adjust KERNEL_CMDLINE_OFFSET from 0x9000 to 0x8D00. * Bounds checking on the kernel_cmdline string.- tboot-gcc7.patch: fix some gcc7 warnings that lead to errors. (bsc#1041264)- Add reproducible.patch to call gzip -n to make build fully reproducible- Trim filler words from description; use modern macros over shell vars.- Updated to 20161216: v1.9.5 (FATE#321510) + Add 2nd generation of LCP creation tool source codes for TPM 2.0 platforms. + Add user guide for 2nd generation LCP creation tool + Provide workaround for Intel PTT(Platform Trust Technology) & Linux PTT driver. + Add new fields in Linux kernel header struct to accommodate Linux kernel new capabilities. + Fix a pointer dereference regression in the tboot native Linux loader which manifests itself as a system reset. + Fix the issue of overwriting tboot when the loaded elf kernel is located below tboot. + Add support to release TPM localities when tboot exits to linux kernel. + Fix the evtlog dump function for tpm2 case. + Initiaize kernel header comdline buffer before copying kernel cmdline arguments to the buffer to avoid random + data at end of the original cmdline contents. + Move tpm_detect() to an earlier stage so as to get tpm interface initialized before checking TXT platform capabilities.- Fix wrong pvops kernel config matching (bsc#981948) * modified tboot-grub2-fix-menu-in-xen-host-server.patch- tboot-grub2-suse.patch: fixed bad if/elif- Updated to 1.9.4/20160518 (FATE#320665) Added TPM 2.0 CRB support Increased BSP and AP stacks to avoid stack overflow Added an ACPI_RSDP structure g_rsdp in tboot to avoid potential memory overwritten issue on TPM 2.0 UEFI platforms Added support to both Intel TPM nv index set and TCG TPM nv index set grub2: tboot doesn't skip first argument any more grub2: sanitize whitespace in command lines grub2: Allow addition of policy data in grub.cfg grub2 support: allow the user to customize the command line Mitigated S3 resume delay by adjusting LZ_MAX_OFFSET to 5000 in lz.c. Added SGX TPM nv index support Add 64 bit ELF object support Gentoo Hardened, which uses the GRSecurity and PaX patch sets Disable -fstack-check in CFLAG for compatibility with Gentoo Linux. Enhanced tboot compatiblity running on non-Intel TXT platform with a fix of is_launched() LCP documentation improvements - tboot-grub2-suse.patch: refreshed - tboot-grub2-fix-xen-submenu-name.patch: refreshed - tboot-fix-stackoverflow.patch: upstream in 1.9.4- tboot-fix-stackoverflow.patch: fix a excessive stack usage pattern that could lead to resets/crashes (bsc#967441)- Updated to 1.8.3/20140728 FATE#318542 * Added verified launch control policy user guide * Fixed a bug about var MTRR settings to follow the rule that each VAR MTRR base must be a multiple of that MTRR's size. * Access tpm sts reg with 3-byte width in v1.2 case and 4-byte width in v2.0 case * Bugfix: lcp2_mlehash get wrong hash if the cmdline string length > 7 * Optimized tboot log processing flow to avoid log buffer overflow by adopting lz Compress/Uncompress algorithms * Added SGX support for Skylake platform * tpm2: use the primary object in NULL Hierarchy instead of Platform Hierarchy for seal/unseal usage * Fixed a bug for lcp2_mlehash tool * Fixed system hang issue caused by TXT disable, TPM disable or SINIT ACM not correctly provided in EFI booting mode * Fixed bug for wrong assumption on the way how GRUB2 load modules * Fixed MB2 tags mess issue caused by moving shorter module cmdline to head * Fixed compile issue when debug=y - fixes a boot issue on Skylake (bsc#964408) - refreshed tboot-grub2-fix-xen-submenu-name.patch/bin/sh/bin/shgoat04 1689227362  !"#$%&'()20200901_1.10.2-150400.3.4.120200901_1.10.2-150400.3.4.1tboot-symstboot.gzgrub.d20_linux_tboot20_linux_xen_tbootlcp2_crtpollcp2_crtpoleltlcp2_crtpollistlcp2_mlehashtb_polgentxt-acminfotxt-parse_errtxt-stattbootCOPYINGMakefileREADME.mdhowto_use.mdlcptools.txtmanlcp2_crtpol.8lcp2_crtpolelt.8lcp2_crtpollist.8lcp2_mlehash.8tb_polgen.8txt-acminfo.8txt-parse_err.8txt-stat.8policy_v1.txtpolicy_v2.txttboot_flow.mdtxt-info.txtvlp.txtlcp2_crtpol.8.gzlcp2_crtpolelt.8.gzlcp2_crtpollist.8.gzlcp2_mlehash.8.gztb_polgen.8.gztxt-acminfo.8.gztxt-parse_err.8.gztxt-stat.8.gz/boot//etc//etc/grub.d//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/tboot//usr/share/doc/packages/tboot/man//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:29793/SUSE_SLE-15-SP4_Update/d824a1c8a505925423e919998b88ec3b-tboot.SUSE_SLE-15-SP4_Updatedrpmxz5x86_64-suse-linux  ASCII textELF 32-bit LSB executable, Intel 80386, version 1 (SYSV) (gzip compressed data, max compression, from Unix)directoryPOSIX shell script, ASCII text executableELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=f32e56ef3139d12b526205290af52b4cb44710ef, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=8c3371bc11912789c43131bba97dfc2c237f3eae, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=7185c093c7e7b5319b48c8f07ed02f16e112a34c, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=fffbdd65c4462908a55170d1c27c0d43c7734f9d, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=f4cba0febf682df4f0515733650c026ad7f9e05f, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=e24a7e832b4812ffbb91b80e1f3d5b0a9bedbc80, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=d02c839397db0505c8b06dbae50485b9879d1010, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=6c8a152a83fe5d28036edf20f3a5e7a8cb49a001, for GNU/Linux 3.2.0, strippedtroff or preprocessor input, ASCII textHTML document, ASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) #+/2 RRRRRRR R R RRRRRR R R RRRRRR R R RRRRRR R R R RR R RRRR R RRRRRRRRRRRRnI5 7? if test -f /run/update-bootloader/reinit; then rm -f /run/update-bootloader/{reinit,refresh} /sbin/update-bootloader --reinit || : elif test -f /run/update-bootloader/refresh; then rm -f /run/update-bootloader/refresh /sbin/update-bootloader --refresh || : fi/bin/shutf-8a8d3bb93db0a196356021d1f913a815dec6d9f6a75da26bc43b4c57f505a3130?7zXZ !t/YE"]"k%wKNrB1DQ&e7Qvq>^yrmT.ٴvM9a$*wc($%Jj]>3B{jVկ[@3ir40\q @-|_&⦖ .\2;E%;; hj-+#{AhQ$2lՑ QtU3\lnhqu]:Gl t<^[{eM1ߛiFЮӦQ0n>Jђ;%~k`Q1e\\d^L܏jJi8y@0ҺhA!qNuT?\2Ï bZ7)=y_Ethi&biλ#6Ʈ-[%}%kjwv|kQ4L$}uޖTXNܜdzR3j7Y!P*}Mn޾S1kg(QRz.px{8.W>`]1Z> ܪ +Qf7`+}$n^IypFx"-bFDxE5ּ)czs!: k3N8FW/ boBn٩q0SÅwC 8sKVqҴ_S8hAQTav#aLbzӰ; -B4ɒ$'P[Owإ.iEUK%=)Lgfʨ} =yㇴU[G数`d}UU a>)ɐ4*L$߱;'9=˩1cM.wlKN皫mŁsa'Nˆ?,m" 7wo![0 JlUCdB=?9Lcv|yX%5Y9A2Ԛik7h4@6t˖ns7#'cO=hApCt߇0v#1Kt(*%D6e0J`?R ]/TrYXnENt]ouzk-QJxBv -0mC[sb8$ >W,~m{ ՗#9A17}WPc1d f=q}67cQp +K2@EpASd_= s&n* 2ѶL2eήiY!EDs ^fI7^Lo"cXMQn/`3ǽ #eϪAGHqwoD7KǕ0GzG ZDCF3dnXyS %ab֥ՌM%(eyCM.IK\(ek6iv@iA4,ySWjM*RLW~DDw|-iDɫZƺX$zsbɸ5Qp.- Mw&*nN`ܷ-\n5؍k츢j.!xQ7--Zˆep eJ@ E"0ɛ L6 o4'4S_LOJV?WNjZk)SAck^8bťhQe\;RT ;NFj>7I l ]fZ)y.EPtcTpggɹJC7\|"s${? X bLeYf' TPH&1A^B[qa]׵ ]0[>23kŢ̦iPM3ދnL!U-jWPNPsޱ4,cS1 YAq_~VGYnh楢ZXD4 7o_sQA.EXMC"$P.n-w;M >i;]3^E |QuإU^.匒}?VRH܏ qB:ew΋__dOIli2ip.BJ=,ú]R񍳻GNZif'K $ W]g P 9߆2s*h-cFf}x~X6~ݯ"hFcԘsmipgAm+&,h WԸ2NT5:Sy|hLt𻅾V}i/يt%H.1AIϽG?viGqœċ zi]³7 z];ґbCɥ0o)òyvrߟt=[pm%|\B'$#W@@@B[jkG>j#snqP rRyAE@N̍!0r[#^ithlÿX& BL;QʛwaVL%ܟSGKb1%1"xOJJ=[d{d 1hb2lM.`<AűB ^5}V_Cٽ_ A>+#m׋kQ"JUrKGh^EgʽU 4Sc_ѫ*rcFb|nv60Ohc@c?.4T6OIL{/ ́"]>6N,4lbL%a3XZ=(D;rIUg )GCu*8E9$Tb XiA+yUNqPE߮JlSsN^^c _JveQyoݫ5HV1yC4nagװ6G5XkiE~mO'Lmv`h\>‹j@1[$4{AB~`fxiHqpZ΁P3Z!589ϭ~V $*5IGVR~o8UMB=6\(3 Ԋ  5&S_ 0`0ax.nP^+!,~FV { EpQa+D XDJ81,iyֱjNXpl7NNxe,tcW_w)s7Y$+ B]QMwc ̓'cx3oJA&Aw2FVˡm (%g#`ĥsDHD? r 5jګނg^MK` 4lҌq򯴯EЙB'xLp@*(<ǧSk9vQ˚,\SǼX~v;iXY$"{=mHϖjt VÝyM&U2Tr8s &q-IJXƵ@C|>e,Зy^B'b<1хDOܼ+XJ|C.fLC=" $=hmsP7^HѨ$ +y&[PB)smNEBr)-&w,zh qt:5B2 p;CE7YC8/^z֛xN*$H sL62uvaVOq;D%UJ-C췢 `+M 4b>q52Hь Z[dJʟv@g7=!y%`^"&nzЄ:9mӉ!.~PoP$CȯialiƮߝ gaB !B+@l 1RE:B3}G gшL0[:KՋٟ㯕?fDŽlgp ztDSYvvL:"aֻ"ǂOc΋R7J'ly!x)%[hCv}C:k){^1R,e)vI=RZ܏őKo|^q( 6_'U:~vi_1n xLH:,BYH5Vm䱄T΢8DXRR3HikGCaBxG_0U-Lf)dnJ¥dzJi~ڢsQFTʓ:optl(,lie'.3fk4$,kڈKoU硻uX 7+镅|ԍf`1oDUSQHm1(xV=&2iP'73R1  EYNSjrmn8^pa 2`dU(jmQWZ:B=wY@^:J?.?ϊT1f̙3*БA!jM:$Dz-jBj)&))h~bPQ;^[G` V@T@r&k#tR1wng73Yܦ6ٻZ׆5$inZgj͓{B#㼪]ICMIн)ߵ;(K&}!ѧ11w9Z-~5(L>A7K%Hv/^PbKhAY2\vjy?%ժџ@'pT% n# 4Iw(T)w0tNĭxOsj"+F*/^/,hߧ c WjWG)1LQ{ݎjx, YC#T5}>MDt荕݅IaE;1ujuB7ąOOuvhT/MDrΡF娗Jߦ V)ypb9gZTa8,xs 9v2Bi:"bl Fٕjd.xGߔ(YEbIד@FxgdpԊ Zx"MUpVިtihx[.jԤw{ZsCZQ{|ͤLxd-ϤT`YHDLj2RH)/$FT=~xbcsXuCĒףKÖ5ucmUګ%WWHp1l‘)Ⱦ)+@-2@A n21c/}3XH+G H菫CqaO[Rb Re"=Q}d77>4BSB1IRapY -zdE&gq]CH6T%݈  $̟L }˰Yhž,YwugVч@vIt^h'ؘ](7dKKr&FfFhknq6Ȉù9]JПf58x'ؾ㲅SQѱŠcN[x\T1e6Կu"la؇.+RE&3U`-&[㞊80?(];f}'eAU`n:OVi'E7^1=]o磻.u)C8xVsLHiw^R昔:4 uv/Ok:e("LQzl9 ȋS+R{|ɫE/* R8_ޥmC3i^F,^qKqDQm+X{ԕ#ŁB?XhڮJܭl zMg3`=$rXABW6.1يr$(WDaoMR޷[p1S$Eҋl<.ppV@؏.ڑ/$Q[J8ƍ1v2b:LuÂH{IwJ$'LgiW%o\ 8)gӸ I9u§HrvM!HCgĪӒȹ ׇd5̬Q̓1v u>qtL}Dkp?2-7fc+2q:~o)9B]zw#N8?od;N -tf{RVjƕfUqO E19 ξ P¦jULxaH~]08zdfнTvm5BR5 -z b.g\RaEm[81kasoY'q$~-OHcblt~ -mNH3qiZDϹpt= &D'%V$gtH$fG2 G8sF3eg+Y@Ԉd1ϾKtjQhOg:CNV]V@?f^z`I{fQ64Ay݅gw⚇ / {B"oB~a f 8=⌮D$R,y! Y °XKm됄& bF- =Rqq+%{7):El%h& /"W{/\[3cSe#%nlF a'+p*+R/] 5AsJn }>Se$rsOy>o]#lLb(3RT+0WU!RI# 7 hT{+<5?y`_}xJ.\ QmSm[+/TC 9KVn{1̟ F%#W 3*iZ@ ,l괓݇hg5_2wީ},/Zq(O\qvQgSʰG$H@÷ 1}柹ʞbGtX~ 7[s5'^Ed@[_9zcސ!o($,O= N}&{KaN,)M`N5jefZm 7%-)LwT3ұ"Tmd$v^&YG˼s鲍@NCYMDej e-SASl"nǑ:QW7Lx`ͽ-bR.c/o #>%}C挜vw̩1jNxTq(c ,|9?X1f&̀]]Irی_#}J^TU8cȩ#@1OP DVe_'oLJ">yfZnCP= Ƥ%aMyf" ѿD.`4(jgvcǽ.􃲎f3ezP巏)+́ s@'V]<; kqKÓ ֚kV:5|/k[џá3O_!0Q+Fuޅ|:%z첳f#aU{IF/gyo%?l {38`_ҢS:5C`-C{|g0R_͙\md =mB1 [($P3f7e=:Ӕے+WYym\M`젡;3.y>rp|Lß~a3}˱ &5πq;zK|v&UK\_K3gjjnP90ur6[8QXIʵPVp oU`N'YHW=s[!1dǖP]{]eb{ K瓉:31@(同lI17DmfQf'Ĝрe 3a8KnXrꠓNI4!䤣TV~TSo*㡽`xy)(Ga4 ޥ_16bI5t[yn@vmOc}Nhs\S͓` A=Y0G -M-vlu̙?W:oԶ%ďK[ļegi޶qݑ|dv&45DV>ӍMV{|ː w= W6e>bOU:+RCH|8%O9I"dӢ6֗21:si+4NM@9'oO#4 BggFQ1W O +}C'jDC7AEGu:Oq|tޑyܶbpNilNǧ]A2} Jf٧(*7"k󑅖5&1q7(ku[EN_~ u;R,4UE;W}(E 9[g?~%8 +k2v+\O"0=k',]$2?ڹȨr;՞Lƈ|m&%=ĵvoM0\}]h4y x ЌSѳH ]$W]io. x8)2P,K.}P ge6Z4=z_/xR1СQ=Ȏ"zCN?uN!VW P*ɲٱms)?Vp_1^՘nU@~0ɀϓd\-A~Ngt7!)V&yEg5e-F^J3& 8*;,֫sI f{†`hbʎ#Q{BLL^xQ~RAq#pn=߼4&V$8q:8Nc@{gƅ9"')-/9J7 |)c .{1 ~@yFre̖⣼}˧H+l:=HD㊙w& Mv)A!#-0zHf:6ƠmfzjK^S|9f']VUY= :Wq!΃N;%,Vnu@CoB,0@so&eg6U7}˿HE1[K8giB_zh"F`D3hЂ!.M2u&H4d"'K(b#$Vdp㛣x^)f\aȱm%mqY37s6z5UI/mG{#pb#E z5Aftc&@5k-ޖ~/ǶuSs|vXe 䶴a<0%a l먢ߏ2<8K(! 蛎P rmdht HôE+\GR2e: ɛutUMoؼJoy͕v %Ԧ-AhRɩQX$.e6:Ƀ "շ}x湟Oka8ga5#⫸F5D2: @2<3~X/$'2)FGoǗ j,tW56HMZ{p4C> xz"9'|CUO`];pZ2?^sb6Ԫ?sY2 0X@08-'r8YMHF!$(W"m %qi}41}G(?ئ=RADY; YW]Yfn¸6S5=uyIIF_o13I쪾L ^)Xq>j?7^, FӋ2B0}f"otYkc{#ʘHнRi_55ܚ!%d)]W 8IJ%}I:'FN$> r쀡$|S)FUVY 9hEKYCTy,U[E"Pڳ] r( S|(=-6C 5WPS"O/HPxI@9nH~(ZPd9s_˾4&za` ܔ'/q=Aa>}qbI.,)''fJ)B4@e,{I ;^VP&qJ%S<ijXWy~ ˆ;؜c^dƢy=s-ZNDg2,P | v~ H^Ke !Aa5y8Վ\Ͻ+ґ<u ںރ84L^%0N_Y}іuѲ?WNWb/uWi 4ˏ>ryb⪟jv1q:Ң[Y'֋@ u8Źlz]$Ǒ L+{y$;-cw:k2$I'o(m+JPKnzU/bvӸzT8X!9^OvamLDŽgqsnm\:4Hoݗ2L "Pz2Dc(Nb:9(؉H{=V{ .d:Ѭ]qF[9fp8~fE{8]oV`}=Dx눀 I9{Nghh v‘Я8ROa3@% {wk 5xx:eѨ{7{kK OK~wf{E{V=1a ##oP͆H Y3Lk6k w!-F8ř9pM%)XsR')XO??-{"ݢ&sME {# d1:M9Pc9#3\NzJaXK:Eb!8p` $+fG{2n@1ݾ2>4ѭu;&لC9q%#b9VnLx}=ouix-Wx9BD>HE+P8>O+k@( OH;ƫ~t; ]!K:Jb1-XZghv:t0n?+^캖!+*BW`j38ӏs!T>wOψmzSifLFGC> Sȍ;IȖXn!#JrH(])#޲jHz r9Vj9pgW>',}< HUszd(KzHN$XRGN!>4%0O1nROAX 5|ռ?DxxtW^a3C'#!8'F95P~$|Xї(߸Py78#t(nkST4ɓlUQS˄VIRVj1H\E,?ٍWD(> ٸ&4L6! Tf&O"wKjFX(YҾ=ŗU[&~F7hr_5M{" &^o= 8$KltX\3ok`QL"+hWQ$#.r\I` aK xL*Eݲ'֊"|BX YZ