libsepol-devel-2.9-3.el8 > 6 6_6 3!pQp)Tξ7]mtZ`agH ]mtZ`'0{>Eia$>kӌ͟"`m0g-P/.\EDeQ H&Jt |ɺD_KΦ[pl(89zwt̠Ǵmٻ8QMKSicxq \xgSrcafϚ@%ӡͰl9"v¶R:g1{jAmA/ Ńbe1C#khe=*DMV2c;*si3D{Is)#֏T v\(vGS,?i{22X5 qεY(X~:e06*_w8dbX?,c?}~_ s&ПxNO:uJupt^BiN, fM(4vzLoH4]:v&~Ϛ39d2ba1248d15877f3e9d17f9c6c69825a14890f4c777cd4dc97fbf672966699c1fb9768537af1f535ad3f6e0d62d7c97847ac84E3!pQp)Tξ7]mtZ`agH ]mtZ`s!?w,}n Ӡsܚe,ljJ-D׮Xz-ʮn7lґGvdBrY/0k$O0X;) ȀqW[Lo?<X~y&dvgV5=Ix Z|{~x:ɉp0-7A 'gL C *Fp( jk}m3+|1r: ѦHA2pPvv̏e}8MC}a^uq+2]^et_faJs0vU]vE@XI h*<)Z0%qd2ɄW63}tvM7=4Opa ب T)"koqgnAC*vExA9u ,%:fu4wѤ2\p<?мd  ^ %+3 Q]7x7 7 T7 07 '7 l7H7[7n7ha(89t:BG7H7I7XY\(7]7^ʆbd@eEfHlJtd7u@7vwΨ7xτ7y`lpvиClibsepol-devel2.93.el8Header files and libraries used to build policy manipulation toolsThe libsepol-devel package contains the libraries and header files needed for developing applications that manipulate binary policies.aford1-prod-a64build001.svc.aws.rockylinux.orgKojiRockyLGPLv2+infrastructure@rockylinux.orgUnspecifiedhttps://github.com/SELinuxProject/selinux/wikilinuxaarch64 SqkC0{}~ xI  We}  hH(ex!N S^ P cA큤A큤A큤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.so.1rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootlibsepol-2.9-3.el8.src.rpmlibsepol-devellibsepol-devel(aarch-64)pkgconfig(libsepol)@@    /usr/bin/pkg-configlibsepol(aarch-64)libsepol.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)2.9-3.el83.0.4-14.6.0-14.0-15.2-14.14.3a@_@\@[0[Zz@ZZI@Z@Zz@ZfY@YV@Y@Y}@Y{'@Yx@XN@X@WH@W9W~Wk@W,@W'A@W#LW@V@VIVɦV=@UXU@U+S@S @SShRrF@QQ@QQsP @P@P@P@PYPQPw@P@PO0@OD@O[@OtNON@N@N@Nܲ@NNNw.NqN_sNLN6@N/M@M@MM>M>MMQ0@MK}+Ka|@KJJս@JG@JjJS8III2HHHr@H^>HO@H=I@H1kG@G@GƢ@G@G@G[@G@GZ@G]*@GO@G0W@FIFFFvFɂ@FS@Fzh@F$F Eɿ@EE~El$EH@E>@E4E4E@D@D@D@DD@DB@D@DX@DDD|3Dr@DlaDhm@Dc'@D_2DU@D3@D*vD'D#@DDj@C@CCi@CtCtC@CCC@CCǖ@CáC[C @C @CC,C@CqCC+C@C{@CqCp@CoACiCiCf@CbC_oC^@C\CX@CTCTCTCP@COCJWCJWCFc@CECBnCA@C:C3@C1K@C/C)b@C(C%mC@CC CCB2@BB=B=B@BTB`@Bw@B@B@BۙBSB@B@B@BBB@B@BBn-@BlB^[@BIC@BBB9q@B06B-B$Y@BB@B@B LBX@A@AA3A(A%A$@A A@A @AVit Mojzis - 2.9-3Vit Mojzis - 2.9-2Petr Lautrbach - 2.9-1Petr Lautrbach - 2.8-2Petr Lautrbach - 2.8-1Petr Lautrbach - 2.8-0.rc3.1Petr Lautrbach - 2.0-0.rc1.1Petr Lautrbach - 2.7-6Petr Lautrbach - 2.7-5Fedora Release Engineering - 2.7-4Petr Lautrbach - 2.7-3Petr Lautrbach - 2.7-2Petr Lautrbach - 2.7-1Fedora Release Engineering - 2.6-5Florian Weimer - 2.6-4Petr Lautrbach - 2.6-3Fedora Release Engineering - 2.6-2Petr Lautrbach - 2.6-1Fedora Release Engineering - 2.5-11Petr Lautrbach 2.5-10Petr Lautrbach 2.5-9Petr Lautrbach - 2.5-8Petr Lautrbach - 2.5-7Petr Lautrbach - 2.5-6Petr Lautrbach - 2.5-5Petr Lautrbach - 2.5-4Petr Lautrbach - 2.5-3Petr Lautrbach 2.5-2Petr Lautrbach 2.5-1Petr Lautrbach 2.5-0.1.rc1Fedora Release Engineering - 2.4-4Michal Srb - 2.4-3Adam Jackson 2.4-2Petr Lautrbach 2.4-0.1Fedora Release Engineering - 2.3-4Tom Callaway - 2.3-3Fedora Release Engineering - 2.3-2Dan Walsh - 2.3-1Dan Walsh - 2.2-1Fedora Release Engineering - 2.1.9-2Dan Walsh - 2.1.9-1Dan Walsh - 2.1.8-8Dan Walsh - 2.1.8-7Dan Walsh - 2.1.8-6Dan Walsh - 2.1.8-5Dan Walsh - 2.1.8-4Dan Walsh - 2.1.8-3Dan Walsh - 2.1.8-2Dan Walsh - 2.1.8-1Dan Walsh - 2.1.7-4Dan Walsh - 2.1.7-3Fedora Release Engineering - 2.1.7-2Dan Walsh - 2.1.7-1Dan Walsh - 2.1.5-3Dan Walsh - 2.1.5-2Dan Walsh - 2.1.5-1Fedora Release Engineering - 2.1.4-6Dan Walsh - 2.1.4-5Dan Walsh - 2.1.4-4Dan Walsh - 2.1.4-3Dan Walsh - 2.1.4-2Dan Walsh - 2.1.4-1Dan Walsh - 2.1.3-2Dan Walsh - 2.1.3-1Dan Walsh - 2.1.2-3Dan Walsh - 2.1.2-2Dan Walsh - 2.1.2-0Dan Walsh 2.1.1-1Dan Walsh 2.1.0-1Dan Walsh 2.0.45-1Dan Walsh 2.0.44-2Dan Walsh 2.0.44-1Dan Walsh 2.0.43-3Dan Walsh 2.0.43-1Dan Walsh 2.0.42-3Fedora Release Engineering - 2.0.42-2Dan Walsh 2.0.42-1Dan Walsh 2.0.41-3Dan Walsh 2.0.41-2Dan Walsh 2.0.41-1Dan Walsh 2.0.40-1Dan Walsh 2.0.39-1Dan Walsh 2.0.38-1Fedora Release Engineering - 2.0.37-2Dan Walsh 2.0.37-1Dan Walsh 2.0.36-1Dan Walsh 2.0.35-3Fedora Release Engineering - 2.0.35-2Dan Walsh 2.0.34-1Dan Walsh 2.0.33-1Dan Walsh 2.0.32-1Dan Walsh 2.0.31-1Dan Walsh 2.0.30-1Dan Walsh 2.0.29-1Dan Walsh 2.0.28-1Dan Walsh 2.0.26-1Dan Walsh 2.0.25-1Dan Walsh 2.0.23-1Dan Walsh 2.0.21-1Dan Walsh 2.0.20-1Dan Walsh 2.0.19-1Dan Walsh 2.0.18-2Dan Walsh 2.0.18-1Dan Walsh 2.0.16-1Dan Walsh 2.0.15-1Dan Walsh 2.0.14-1Dan Walsh 2.0.11-1Dan Walsh 2.0.10-1Dan Walsh 2.0.9-1Dan Walsh 2.0.7-1Dan Walsh 2.0.6-1Dan Walsh 2.0.5-1Dan Walsh 2.0.4-1Dan Walsh 2.0.3-1Dan Walsh 2.0.2-1Dan Walsh 2.0.1-1Dan Walsh 1.16.0-1Adam Jackson 1.15.3-1Dan Walsh 1.15.3-1Dan Walsh 1.15.2-1Dan Walsh 1.15.1-1Dan Walsh 1.14-1Dan Walsh 1.12.28-1Dan Walsh 1.12.27-1Dan Walsh 1.12.26-1Dan Walsh 1.12.25-3Dan Walsh 1.12.25-2Dan Walsh 1.12.25-1Dan Walsh 1.12.24-1Dan Walsh 1.12.21-1Jesse Keating - 1.12.19-1.1Dan Walsh 1.12.19-1Bill Nottingham 1.12.17-2Dan Walsh 1.12.17-1Dan Walsh 1.12.14-1Dan Walsh 1.12.12-1Dan Walsh 1.12.11-1Dan Walsh 1.12.10-1Steve Grubb 1.12.9Dan Walsh 1.12.9-1Dan Walsh 1.12.6-1Dan Walsh 1.12.5-1Dan Walsh 1.12.4-1Dan Walsh 1.12.3-1Dan Walsh 1.12.2-1Dan Walsh 1.12.1-1Dan Walsh 1.12-2Dan Walsh 1.11.18-2Dan Walsh 1.11.18-1Dan Walsh 1.11.17-1Dan Walsh 1.11.14-2Dan Walsh 1.11.14-1Jesse Keating - 1.11.13-1.1Dan Walsh 1.11.13-1Jesse Keating - 1.11.12-1.1Dan Walsh 1.11.12-1Dan Walsh 1.11.10-1Dan Walsh 1.11.9-1Dan Walsh 1.11.8-1Dan Walsh 1.11.7-1Dan Walsh 1.11.5-1Dan Walsh 1.11.4-1Dan Walsh 1.11.2-2Dan Walsh 1.11.1-2Dan Walsh 1.11.1-1Jesse Keating Dan Walsh 1.10-1Dan Walsh 1.9.42-1Dan Walsh 1.9.41-1Dan Walsh 1.9.40-1Dan Walsh 1.9.39-1Dan Walsh 1.9.38-1Dan Walsh 1.9.37-1Dan Walsh 1.9.36-1Dan Walsh 1.9.35-1Dan Walsh 1.9.34-1Dan Walsh 1.9.33-1Dan Walsh 1.9.32-1Dan Walsh 1.9.30-1Dan Walsh 1.9.26-1Dan Walsh 1.9.25-1Dan Walsh 1.9.23-1Dan Walsh 1.9.21-1Dan Walsh 1.9.19-1Dan Walsh 1.9.18-1Dan Walsh 1.9.17-2Dan Walsh 1.9.17-1Dan Walsh 1.9.14.1-1Dan Walsh 1.9.12-1Dan Walsh 1.9.11-1Dan Walsh 1.9.10-1Dan Walsh 1.9.8-1Dan Walsh 1.9.7-1Dan Walsh 1.9.6-1Dan Walsh 1.9.5-1Dan Walsh 1.9.4-1Dan Walsh 1.9.3-1Dan Walsh 1.9.1-2Dan Walsh 1.9.1-1Dan Walsh 1.7.24-1Dan Walsh 1.7.22-1Dan Walsh 1.7.20-1Dan Walsh 1.7.19-1Dan Walsh 1.7.17-1Dan Walsh 1.7.15-1Dan Walsh 1.7.14-1Dan Walsh 1.7.13-1Dan Walsh 1.7.12-1Dan Walsh 1.7.11-1Dan Walsh 1.7.10-1Dan Walsh 1.7.9-1Dan Walsh 1.7.6-2Dan Walsh 1.7.6-1Dan Walsh 1.7.5-2Dan Walsh 1.7.5-1Dan Walsh 1.7.3-1Dan Walsh 1.7-2Dan Walsh 1.7-1Dan Walsh 1.6-1Dan Walsh 1.5.10-1Dan Walsh 1.5.9-2Dan Walsh 1.5.8-2Dan Walsh 1.5.8-1Dan Walsh 1.5.7-1Dan Walsh 1.5.6-1Dan Walsh 1.5.5-2Dan Walsh 1.5.5-1Dan Walsh 1.5.3-1Dan Walsh 1.5.2-2Dan Walsh 1.5.2-1Dan Walsh 1.4-1Dan Walsh 1.3.8-1Dan Walsh 1.3.7-1Dan Walsh 1.3.6-3Dan Walsh 1.3.6-1Dan Walsh 1.3.5-1Dan Walsh 1.3.2-1Dan Walsh 1.3.1-1Dan Walsh 1.2.1.1-1Dan Walsh 1.2.1-1Dan Walsh 1.1.1-2Dan Walsh 1.1.1-1Colin Walters 1.0-2Colin Walters 1.0-1Dan Walsh 0.4.2-1Bill Nottingham 0.4.1-2Dan Walsh 0.4.1-1Dan Walsh 0.4.1-1Dan Walsh 0.3.1-1- cil: Fix out-of-bound read of file context pattern ending with "\" - cil: Destroy classperms list when resetting classpermission (#1983517) - cil: Destroy classperm list when resetting map perms (#1983521) - cil: cil_reset_classperms_set() should not reset classpermission (#1983525) - cil: Set class field to NULL when resetting struct cil_classperms - cil: More strict verification of constraint leaf expressions - cil: Exit with an error if declaration name is a reserved word - cil: Allow permission expressions when using map classes - cil: Reorder checks for invalid rules when building AST - cil: Cleanup build AST helper functions - cil: Create new first child helper function for building AST - cil: Remove unused field from struct cil_args_resolve - cil: Destroy disabled optional blocks after pass is complete - cil: Check if name is a macro parameter first - cil: fix NULL pointer dereference in __cil_insert_name - cil: Report disabling an optional block only at high verbose levels - cil: Use AST to track blocks and optionals when resolving - cil: Reorder checks for invalid rules when resolving AST - cil: Sync checks for invalid rules in booleanifs - cil: Check for statements not allowed in optional blocks (#1983530)- Drop unnecessary telinit (#1838257)- SELinux userspace 2.9 release- Fix RESOURCE_LEAK coverity scan defects- SELinux userspace 2.8 release- SELinux userspace 2.8-rc1 release candidate- SELinux userspace 2.8-rc1 release candidate- Prevent freeing unitialized value in ibendport handling - Add support for the SCTP portcon keyword - Export sepol_polcap_getnum/name functions- cil: Create new keep field for type attribute sets - build: follow standard semantics for DESTDIR and PREFIX - cil: show an error when cil_expr_to_string() fails- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild- free ibendport device names- reset pointer after free in cil_strpool_destroy() - cil: Add ability to redeclare types[attributes] - cil: Keep attributes used by generated attributes in neverallow rules - use IN6ADDR_ANY_INIT to initialize IPv6 addresses - fix memory leak in sepol_bool_query() - cil: drop wrong unused attribute - cil: fix -Wwrite-strings warning - cil: __cil_post_db_neverallow_attr_helper() does not use extra_args- Update to upstream release 2017-08-04- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild- Rebuild with binutils fix for ppc64le (#1475636)- Fix neverallow bug when checking conditional policy - Destroy the expanded level when mls_semantic_level_expand() fails - Do not seg fault on sepol_*_key_free(NULL)- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- Update to upstream release 2016-10-14- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild- Check for too many permissions in classes and commons in CIL - Fix xperm mapping between avrule and avtab - tests: Fix mispelling of optimization option - Fix unused/uninitialized variables on mac build - Produce more meaningful error messages for conflicting type rules in CIL - make "make test" fail when a CUnit test fails - tests: fix g_b_role_2 test - Change which attributes CIL keeps in the binary policy - Port str_read() from kernel and remove multiple occurances of similar code - Use calloc instead of malloc for all the *_to_val_structs - Fix bugs found by AFL - Fix memory leak in expand.c - Fix invalid read when policy file is corrupt - Fix possible use of uninitialized variables- Warn instead of fail if permission is not resolved - Ignore object_r when adding userrole mappings to policydb- Add missing return to sepol_node_query() - Add missing include- Correctly detect unknown classes in sepol_string_to_security_class - Sort object files for deterministic linking order - Fix neverallowxperm checking on attributes - Remove libsepol.map when cleaning - Add high-level language line marking support to CIL- Change logic of bounds checking to match change in kernel - Fix multiple spelling errors- Only apply bounds checking to source types in rules - Fix CIL and not add an attribute as a type in the attr_type_map- Build policy on systems not supporting DCCP protocol - Fix extended permissions neverallow checking - Fix CIL neverallow and bounds checking - Android.mk: Add -D_GNU_SOURCE to common_cflags- Fix bug in CIL when resetting classes - Add support for portcon dccp protocol- Use fully versioned arch-specific requires- Update to upstream release 2016-02-23- Update to upstream rc1 release 2016-01-07- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild- Improve compatibility with Python 3 SWIG bindings - Resolves: rhbz#1247714- Pass ldflags to make so hardening works- Update to upstream release 2.4- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild- fix license handling- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- Update to upstream * Improve error message for name-based transition conflicts. * Revert libsepol: filename_trans: use some better sorting to compare and merge. * Report source file and line information for neverallow failures. * Fix valgrind errors in constraint_expr_eval_reason from Richard Haines. * Add sepol_validate_transition_reason_buffer function from Richard Haines.- Update to upstream - Richard Haines patch V1 Allow constraint denials to be determined. - Add separate role declarations as required by modern checkpolicy.- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild- Update to upstream - filename_trans: use some better sorting to compare and merge - coverity fixes - implement default type policy syntax - Fix memory leak issues found by Klocwork - Add CONTRAINT_NAMES to the kernel- Update to latest patches from eparis/Upstream- Update to latest patches from eparis/Upstream- Fix libsepol.stack messages in audit2allow/audit2why- Update to latest patches from eparis/Upstream- Update Richard Haines patch to show constraint information- Add sepol_compute_av_reason_buffer patch from Richard Haines- Revert patch that was attempting to expand filetrans attributes, but is breaking filetrans rules- Update to upstream * fix neverallow checking on attributes * Move context_copy() after switch block in ocontext_copy_*(). * check for missing initial SID labeling statement. * Add always_check_network policy capability * role_fix_callback skips out-of-scope roles during expansion.- Try new patches- Revert patches- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- Update to upstream * reserve policycapability for redhat testing of ptrace child * cosmetic changes to make the source easier to read * prepend instead of append to filename_trans list * Android/MacOS X build support * allocate enough space to hold filename in trans rules- Fix off by one error that is causing file_name transition rules to be expanded- incorrectly on i686 machines- Add support for ptrace_child- Update to upstream * checkpolicy: implement new default labeling behaviors- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild- Update to match eparis pool- Additional fix for default transitioning labeling for semodule- Add Eparis patch for handling of default transition labeling- Allow policy to specify the source of target for generating the default user,role - or mls label for a new target.- Update to upstream * regenerate .pc on VERSION change * Move ebitmap_* functions from mcstrans to libsepol * expand: do filename_trans type comparison on mapped representation-The filename_trans code had a bug where duplicate detection was being done between the unmapped type value of a new rule and the type value of rules already in policy. This meant that duplicates were not being silently dropped and were instead outputting a message that there was a problem. It made things hard because the message WAS using the mapped type to convert to the string representation, so it didn't look like a dup!-Update to upstream * Skip writing role attributes for policy.X and * Indicate when boolean is indeed a tunable. * Separate tunable from boolean during compile. * Write and read TUNABLE flags in related * Copy and check the cond_bool_datum_t.flags during link. * Permanently discard disabled branches of tunables in * Skip tunable identifier and cond_node_t in expansion. * Create a new preserve_tunables flag * Preserve tunables when required by semodule program. * setools expects expand_module_avrules to be an exported * tree: default make target to all not- Add patch to handle preserving tunables- export expand_module_avrules- Update to upstream * Only call role_fix_callback for base.p_roles during expansion. * use mapped role number instead of module role number- Update to upstream * Minor fix to reading policy with filename transition rules- Update to upstream * Release, minor version bump- Update to upstream * Warn if filename_trans rules are dropped by Steve Lawrence.- Fixes for new role_transition class field by Eric Paris.-Update to upstream * Fixes for new role_transition class field by Eric Paris. * Add libsepol support for filename_trans rules by Eric Paris.- re-add Erics patch for filename transitions-Update to upstream * Add new class field in role_transition by Harry Ciao.- Apply Eparis Patch This patch add libsepol support for filename_trans rules. These rules allow on to make labeling decisions for new objects based partially on the last path component. They are stored in a list. If we find that the number of rules grows to an significant size I will likely choose to store these in a hash, both in libsepol and in the kernel. But as long as the number of such rules stays small, this should be good.- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Upgrade to latest from NSA * Fix compliation under GCC 4.6 by Justin Mattock- Fix libsepol.pc file- Resolve specfile problems Resolves: #555835- Upgrade to latest from NSA * Fixed typo in error message from Manoj Srivastava.- Upgrade to latest from NSA * Add pkgconfig file from Eamon Walsh.- Upgrade to latest from NSA * Add support for building Xen policies from Paul Nuzzi.- Upgrade to latest from NSA * Check last offset in the module package against the file size. Reported by Manoj Srivastava for bug filed by Max Kellermann.- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- Upgrade to latest from NSA * Add method to check disable dontaudit flag from Christopher Pardy.- Upgrade to latest from NSA * Fix boolean state smashing from Joshua Brindle.- Fix license specification to be LGPL instead of GPL* Wed Feb 18 2009 Dan Walsh 2.0.35-1 - Upgrade to latest from NSA * Fix alias field in module format, caused by boundary format change from Caleb Case.- Upgrade to latest from NSA * Add bounds support from KaiGai Kohei. * Fix invalid aliases bug from Joshua Brindle.- Upgrade to latest from NSA * Revert patch that removed expand_rule.- Upgrade to latest from NSA * Allow require then declare in the source policy from Joshua Brindle.- Upgrade to latest from NSA * Fix mls_semantic_level_expand() to handle a user require w/o MLS information from Stephen Smalley.- Upgrade to latest from NSA * Fix endianness bug in the handling of network node addresses from Stephen Smalley. Only affects big endian platforms. Bug reported by John Weeks of Sun upon policy mismatch between x86 and sparc.- Upgrade to latest from NSA * Merge user and role mapping support from Joshua Brindle.- Upgrade to latest from NSA * Fix mls_level_convert() to gracefully handle an empty user declaration/require from Stephen Smalley. * Belatedly merge test for policy downgrade from Todd Miller.- Upgrade to latest from NSA * Add permissive domain support from Eric Paris.- Upgrade to latest from NSA * Drop unused ->buffer field from struct policy_file. * Add policy_file_init() initalizer for struct policy_file and use it, from Todd C. Miller.- Upgrade to latest from NSA * Accept "Flask" as an alternate identifier string in kernel policies from Stephen Smalley. * Add support for open_perms policy capability from Eric Paris.- Upgrade to latest from NSA * Fix invalid memory allocation in policydb_index_others() from Jason Tang.- Upgrade to latest from NSA * Port of Yuichi Nakamura's tune avtab to reduce memory usage patch from the kernel avtab to libsepol from Stephen Smalley.- Upgrade to latest from NSA * Add support for consuming avrule_blocks during expansion to reduce peak memory usage.- Fixed for spec review- Upgrade to latest from NSA * Added support for policy capabilities from Todd Miller. * Prevent generation of policy.18 with MLS enabled from Todd Miller.- Upgrade to latest from NSA * print module magic number in hex on mismatch, from Todd Miller.- Upgrade to latest from NSA * clarify and reduce neverallow error reporting from Stephen Smalley.- Upgrade to latest from NSA * Reject self aliasing at link time from Stephen Smalley. * Allow handle_unknown in base to be overridden by semanage.conf from Stephen Smalley. * Fixed bug in require checking from Stephen Smalley. * Added user hierarchy checking from Todd Miller.* Pass CFLAGS to CC even on link command, per Dennis Gilmore.- Upgrade to latest from NSA * Merged support for the handle_unknown policydb flag from Eric Paris.- Upgrade to latest from NSA * Moved next_entry and put_entry out-of-line to reduce code size from Ulrich Drepper. * Fixed module_package_read_offsets bug introduced by the prior patch.- Upgrade to latest from NSA * Eliminate unaligned accesses from policy reading code from Stephen Smalley.- Upgrade to latest from NSA * Allow dontaudits to be turned off during policy expansion- Upgrade to latest from NSA * Fix sepol_context_clone to handle a NULL context correctly. This happens for e.g. semanage_fcontext_set_con(sh, fcontext, NULL) to set the file context entry to "<>". - Apply patch from Joshua Brindle to disable dontaudit rules- Upgrade to latest from NSA * Merged error handling patch from Eamon Walsh.- Upgrade to latest from NSA * Merged add boolmap argument to expand_module_avrules() from Chris PeBenito.- Upgrade to latest from NSA * Merged fix from Karl to remap booleans at expand time to avoid holes in the symbol table.- Upgrade to latest from NSA * Merged libsepol segfault fix from Stephen Smalley for when sensitivities are required but not present in the base. * Merged patch to add errcodes.h to libsepol by Karl MacMillan.- Upgrade to latest from NSA * Updated version for stable branch.- Add dist tag and rebuild, fixes 6 to 7 upgrades.- Upgrade to latest from NSA * Merged patch to compile wit -fPIC instead of -fpic from Manoj Srivastava to prevent hitting the global offest table limit. Patch changed to include libselinux and libsemanage in addition to libselinux.- Upgrade to latest from NSA * Merged fix from Karl MacMillan for a segfault when linking non-MLS modules with users in them.- Upgrade to latest from NSA * Merged fix for version comparison that was preventing range transition rules from being written for a version 5 base policy from Darrel Goeddel.- NSA Released version - Same as previous but changed release number- Upgrade to latest from NSA * Build libsepol's static object files with -fpic- Upgrade to latest from NSA * Merged mls user and range_transition support in modules from Darrel Goeddel- Upgrade to latest from NSA * Merged range transition enhancements and user format changes Darrel Goeddel- Fix location of include directory to devel package- Remove invalid Requires- Upgrade to latest from NSA * Merged conditionally expand neverallows patch from Jeremy Mowery. * Merged refactor expander patch from Jeremy Mowery.- Upgrade to latest from NSA * Merged libsepol unit tests from Joshua Brindle. * Merged symtab datum patch from Karl MacMillan. * Merged netfilter contexts support from Chris PeBenito.- Upgrade to latest from NSA * Merged helpful hierarchy check errors patch from Joshua Brindle. * Merged semodule_deps patch from Karl MacMillan. This adds source module names to the avrule decls.- rebuild- Upgrade to latest from NSA * Lindent. * Merged optionals in base take 2 patch set from Joshua Brindle.- bump so it's newer than the FC5 version- Upgrade to latest from NSA * Revert 1.12.16. * Merged cleaner fix for bool_ids overflow from Karl MacMillan, replacing the prior patch. * Merged fixes for several memory leaks in the error paths during policy read from Serge Hallyn.- Upgrade to latest from NSA * Fixed bool_ids overflow bug in cond_node_find and cond_copy_list, based on bug report and suggested fix by Cedric Roux. * Merged sens_copy_callback, check_role_hierarchy_callback, and node_from_record fixes from Serge Hallyn.- Upgrade to latest from NSA * Added sepol_policydb_compat_net() interface for testing whether a policy requires the compatibility support for network checks to be enabled in the kernel.- Upgrade to latest from NSA * Merged patch to initialize sym_val_to_name arrays from Kevin Carr. Reworked to use calloc in the first place, and converted some other malloc/memset pairs to calloc calls.- Upgrade to latest from NSA * Merged patch to revert role/user decl upgrade from Karl MacMillan.- Couple minor spec file clean ups- Upgrade to latest from NSA * Dropped tests from all Makefile target. * Merged fix warnings patch from Karl MacMillan. * Merged libsepol test framework patch from Karl MacMillan.- Upgrade to latest from NSA * Fixed cond_normalize to traverse the entire cond list at link time.- Upgrade to latest from NSA * Merged fix for leak of optional package sections from Ivan Gyurdiev.- Upgrade to latest from NSA * Generalize test for bitmap overflow in ebitmap_set_bit.- Upgrade to latest from NSA * Fixed attr_convert_callback and expand_convert_type_set typemap bug.- Upgrade to latest from NSA * Fixed avrule_block_write num_decls endian bug.- Upgrade to latest from NSA * Fixed sepol_module_package_write buffer overflow bug.- Upgrade to latest from NSA * Updated version for release. * Merged cond_evaluate_expr fix from Serge Hallyn (IBM). * Fixed bug in copy_avrule_list reported by Ivan Gyurdiev. * Merged sepol_policydb_mls_enabled interface and error handling changes from Ivan Gyurdiev.- Rebuild for fc5-head- Upgrade to latest from NSA * Merged node_expand_addr bugfix and node_compare* change from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged nodes, ports: always prepend patch from Ivan Gyurdiev. * Merged bug fix patch from Ivan Gyurdiev. * Added a defined flag to level_datum_t for use by checkpolicy. * Merged nodecon support patch from Ivan Gyurdiev. * Merged cleanups patch from Ivan Gyurdiev.- Fix post install not to fire if /dev/initctr does not exist- Upgrade to latest from NSA * Merged optionals in base patch from Joshua Brindle.- bump again for double-long bug on ppc(64)- Upgrade to latest from NSA * Merged seuser/user_extra support patch from Joshua Brindle. * Merged fix patch from Ivan Gyurdiev.- rebuilt for new gcc4.1 snapshot and glibc changes- Upgrade to latest from NSA * Merged assertion copying bugfix from Joshua Brindle. * Merged sepol_av_to_string patch from Joshua Brindle. * Merged clone record on set_con patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged cond_expr mapping and package section count bug fixes from Joshua Brindle. * Merged improve port/fcontext API patch from Ivan Gyurdiev. * Merged fixes for overflow bugs on 64-bit from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged size_t -> unsigned int patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged 2nd const in APIs patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged const in APIs patch from Ivan Gyurdiev. * Merged compare2 function patch from Ivan Gyurdiev. * Fixed hierarchy checker to only check allow rules.- Upgrade to latest from NSA * Merged further fixes from Russell Coker, specifically: - av_to_string overflow checking - sepol_context_to_string error handling - hierarchy checking memory leak fixes and optimizations - avrule_block_read variable initialization * Marked deprecated code in genbools and genusers.- Upgrade to latest from NSA * Merged bugfix for sepol_port_modify from Russell Coker. * Fixed bug in sepol_iface_modify error path noted by Ivan Gyurdiev. * Merged port ordering patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged patch series from Ivan Gyurdiev. This includes patches to: - support ordering of records in compare function - enable port interfaces - add interfaces for context validity and range checks - add include guards- Add Ivans patch to make ports work- Upgrade to latest from NSA * Fixed mls_range_cpy bug.- rebuilt- Upgrade to latest from NSA- Upgrade to latest from NSA * Dropped handle from user_del_role interface.- Upgrade to latest from NSA * Merged remove defrole from sepol patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged module function and map file cleanup from Ivan Gyurdiev. * Merged MLS and genusers cleanups from Ivan Gyurdiev.- Upgrade to latest from NSA Prepare for removal of booleans* and *.users files. * Cleaned up sepol_genbools to not regenerate the image if there were no changes in the boolean values, including the degenerate case where there are no booleans or booleans.local files. * Cleaned up sepol_genusers to not warn on missing local.users.- Upgrade to latest from NSA * Removed sepol_port_* from libsepol.map, as the port interfaces are not yet stable.- Upgrade to latest from NSA * Merged context destroy cleanup patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged context_to_string interface change patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Added src/dso.h and src/*_internal.h. Added hidden_def for exported symbols used within libsepol. Added hidden for symbols that should not be exported by the wildcards in libsepol.map.- Upgrade to latest from NSA * Merged record interface, record bugfix, and set_roles patches from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged count specification change from Ivan Gyurdiev.- Upgrade to latest from NSA * Added further checking and error reporting to sepol_module_package_read and _info. * Merged sepol handle passing, DEBUG conversion, and memory leak fix patches from Ivan Gyurdiev.- Upgrade to latest from NSA * Removed processing of system.users from sepol_genusers and dropped delusers logic. * Removed policydb_destroy from error path of policydb_read, since create/init/destroy/free of policydb is handled by the caller now. * Fixed sepol_module_package_read to handle a failed policydb_read properly. * Merged query/exists and count patches from Ivan Gyurdiev. * Merged fix for pruned types in expand code from Joshua Brindle. * Merged new module package format code from Joshua Brindle.- Upgrade to latest from NSA * Merged context interface cleanup, record conversion code, key passing, and bug fix patches from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged users cleanup patch from Ivan Gyurdiev. * Merged user record memory leak fix from Ivan Gyurdiev. * Merged reorganize users patch from Ivan Gyurdiev. - Need to check for /sbin/telinit- Upgrade to latest from NSA * Added check flag to expand_module() to control assertion and hierarchy checking on expansion. * Reworked check_assertions() and hierarchy_check_constraints() to take handles and use callback-based error reporting. * Changed expand_module() to call check_assertions() and hierarchy_check_constraints() prior to returning the expanded policy.- Upgrade to latest from NSA * Changed sepol_module_package_set_file_contexts to copy the file contexts data since it is internally managed. * Added sepol_policy_file_set_handle interface to associate a handle with a policy file. * Added handle argument to policydb_from_image/to_image. * Added sepol_module_package_set_file_contexts interface. * Dropped sepol_module_package_create_file interface. * Reworked policydb_read/write, policydb_from_image/to_image, and sepol_module_package_read/write to use callback-based error reporting system rather than DEBUG.- Upgrade to latest from NSA * Reworked link_packages, link_modules, and expand_module to use callback-based error reporting system rather than error buffering.- Upgrade to latest from NSA * Merged conditional expression mapping fix in the module linking code from Joshua Brindle.- Tell init to reexec itself in post script- Upgrade to latest from NSA * Hid sepol_module_package type definition, and added get interfaces. * Merged new callback-based error reporting system from Ivan Gyurdiev. * Merged support for require blocks inside conditionals from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Fixed use of policydb_from_image/to_image to ensure proper init of policydb. * Isolated policydb internal headers under . These headers should only be used by users of the static libsepol. Created new with new public types and interfaces for shared libsepol. Created new with public types and interfaces moved or wrapped from old module.h, link.h, and expand.h, adjusted for new public types for policydb and policy_file. Added public interfaces to libsepol.map. Some implementation changes visible to users of the static libsepol: 1) policydb_read no longer calls policydb_init. Caller must do so first. 2) policydb_init no longer takes policy_type argument. Caller must set policy_type separately. 3) expand_module automatically enables the global branch. Caller no longer needs to do so. 4) policydb_write uses the policy_type and policyvers from the policydb itself, and sepol_set_policyvers() has been removed.- Upgrade to latest from NSA * Merged function renaming and static cleanup from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged bug fix for check_assertions handling of no assertions from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Merged iterate patch from Ivan Gyurdiev. * Merged MLS in modules patch from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Merged pointer typedef elimination patch from Ivan Gyurdiev. * Merged user list function, new mls functions, and bugfix patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged sepol_get_num_roles fix from Karl MacMillan (Tresys).- Upgrade to latest from NSA * Merged bug fix patches from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Merged boolean record and memory leak fix patches from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged interface record patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged fix for sepol_enable/disable_debug from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged stddef.h patch and debug conversion patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Fixed expand_avtab and expand_cond_av_list to keep separate entries with identical keys but different enabled flags. * Updated version for release.- Upgrade to latest from NSA * Fixed symtab_insert return value for duplicate declarations. * Merged fix for memory error in policy_module_destroy from Jason Tang (Tresys).- Upgrade to latest from NSA * Merged fix for memory leak in sepol_context_to_sid from Jason Tang (Tresys). * Merged fixes for resource leaks on error paths and change to scope_destroy from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Merged more fixes for resource leaks on error paths from Serge Hallyn (IBM). Bugs found by Coverity.- Upgrade to latest from NSA * Changed to treat all type conflicts as fatal errors. * Merged several error handling fixes from Serge Hallyn (IBM). Bugs found by Coverity.- Upgrade to latest from NSA * Fixed several memory leaks found by valgrind.- Upgrade to latest from NSA * Fixed empty list test in cond_write_av_list. Bug found by Coverity, reported by Serge Hallyn (IBM). * Merged patch to policydb_write to check errors when writing the type->attribute reverse map from Serge Hallyn (IBM). Bug found by Coverity. * Fixed policydb_destroy to properly handle NULL type_attr_map or attr_type_map.- Upgrade to latest from NSA * Fixed empty list test in cond_write_av_list. Bug found by Coverity, reported by Serge Hallyn (IBM). * Merged patch to policydb_write to check errors when writing the type->attribute reverse map from Serge Hallyn (IBM). Bug found by Coverity. * Fixed policydb_destroy to properly handle NULL type_attr_map or attr_type_map.- Upgrade to latest from NSA * Improved memory use by SELinux by both reducing the avtab node size and reducing the number of avtab nodes (by not expanding attributes in TE rules when possible). Added expand_avtab and expand_cond_av_list functions for use by assertion checker, hierarchy checker, compatibility code, and dispol. Added new inline ebitmap operators and converted existing users of ebitmaps to the new operators for greater efficiency. Note: The binary policy format version has been incremented to version 20 as a result of these changes.- Upgrade to latest from NSA * Fixed bug in constraint_node_clone handling of name sets.- Upgrade to latest from NSA * Fix range_trans_clone to map the type values properly.- Upgrade to latest from NSA * Merged patch to move module read/write code from libsemanage to libsepol from Jason Tang (Tresys).- Upgrade to latest from NSA * Enabled further compiler warning flags and fixed them. * Merged user, context, port records patch from Ivan Gyurdiev. * Merged key extract function patch from Ivan Gyurdiev. * Merged mls_context_to_sid bugfix from Ivan Gyurdiev.- Fix MLS Free- Upgrade to latest from NSA * Merged context reorganization, memory leak fixes, port and interface loading, replacements for genusers and genbools, debug traceback, and bugfix patches from Ivan Gyurdiev. * Merged uninitialized variable bugfix from Dan Walsh.- Fix unitialized variable problem- Upgrade to latest from NSA * Merged debug support, policydb conversion functions from Ivan Gyurdiev (Red Hat). * Removed genpolbools and genpolusers utilities. * Merged hierarchy check fix from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Merged header file cleanup and memory leak fix from Ivan Gyurdiev (Red Hat). * Merged genbools debugging message cleanup from Red Hat.- Remove genpolbools and genpoluser- Upgrade to latest from NSA * Merged loadable module support from Tresys Technology.- Upgrade to latest from NSA * Updated version for release.- Fix reset booleans warning message - Upgrade to latest from NSA * License changed to LGPL v2.1, see COPYING.- Upgrade to latest from NSA * Added sepol_genbools_policydb and sepol_genusers_policydb for audit2why.- export sepol_context_to_sid- Upgrade to latest from NSA * Added sepol_ prefix to Flask types to avoid namespace collision with libselinux.- Upgrade to latest from NSA * Added sepol_compute_av_reason() for audit2why.- Upgrade to latest from NSA * Fixed bug in role hierarchy checker.- Fixes found via intel compiler- Update from NSA- Update from NSA- Handle booleans.local- Update to latest from NSA * Added man page for sepol_check_context. * Added man page for sepol_genusers function. * Merged man pages for genpolusers and chkcon from Manoj Srivastava.- Update to latest from NSA- Update to latest from NSA * Cleaned up error handling in sepol_genusers and sepol_genbools.- Update to latest from NSA * Merged sepol_debug and fclose patch from Dan Walsh.- Make sure local_files file pointer is closed - Stop outputing error messages- Update to latest from NSA * Changed sepol_genusers to also use getline and correctly handle EOL.- Update to latest from NSA * Merged endianness and compute_av patches from Darrel Goeddel (TCS). * Merged range_transition support from Darrel Goeddel (TCS). * Added sepol_genusers function.- Update to latest from NSA * Changed relabel Makefile target to use restorecon.- Update to latest from NSA * Merged enhanced MLS support from Darrel Goeddel (TCS).- Update to latest from NSA * Merged build fix patch from Manoj Srivastava.- Update to latest from NSA- Add optargs for build- New version from NSA- Apply Stephen's chkcon patch- New upstream version- Newversion from upstream implementing stringcase compare- ldconfig tweaks- Ignore case of true/false- New version from NSA- Initial version - Created by Stephen Smalley   !"#$%&'()*+,-./012345672.9-3.el82.9-3.el82.9sepolboolean_record.hbooleans.hcilcil.hcontext.hcontext_record.hdebug.herrcodes.hhandle.hibendport_record.hibendports.hibpkey_record.hibpkeys.hiface_record.hinterfaces.hkernel_to_cil.hkernel_to_conf.hmodule.hmodule_to_cil.hnode_record.hnodes.hpolicydbpolicydb.havrule_block.havtab.hconditional.hconstraint.hcontext.hebitmap.hexpand.hflask.hflask_types.hhashtab.hhierarchy.hlink.hmls_types.hmodule.hpolcaps.hpolicydb.hservices.hsidtab.hsymtab.hutil.hport_record.hports.hroles.hsepol.huser_record.husers.hlibsepol.solibsepol.pcsepol_check_context.3.gzsepol_genbools.3.gzsepol_genusers.3.gz/usr/include//usr/include/sepol//usr/include/sepol/cil//usr/include/sepol/policydb//usr/lib64//usr/lib64/pkgconfig//usr/share/man/man3/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-redhat-linux-gnudirectoryC source, ASCII textpkgconfig filetroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RPRutf-8f73886b15febcbb276b8fdad11aedc287e57402be6ecf514a70a128c29473376?@7zXZ !#,p] b2u jӫ`(y՜h%q:O1WVBi#461ɾRc;`^Lon u,60ְc1O<j˪^chM[$XVYlğ9MEhq;ȍy. @IMXQmY t׃_6~ ۢ#s!8ףӕcԉ)XYߝ?:J4Y˹Gʕk-;46Kh}Yf(j㴴*mn2A\ȁlr-E.lwhU (.kZBk7 LW[<﹉ U|4< z]=p_Eu jwv8&.Oip_uPIKNXOמ*ic»Vs>Iu= C{dL[c[ ڤeTApȯNm(D([`{[\7m3nBur :(fHOm౶EbD[ [\Sl=w9  A_fO=WW;T!iR@5_=E(m.o_a(ʄy`kF.~.eY&sm _Wլ){F\P0`.O4r4惡lsZs/G\!hitPi4:[kVf<,Jt3ƄfG .j:4a?]nSu13>{92hKU$|_m-z̘#jR[0bFoF8*ܔ;}3_Jbc#$в7xHI%lKkJUa@R5gObjU&]ߟUr>hˑK1=}s:Q@[fDi O|ʆcc?@ =2tcOUX;J">$zqi WB{΂D(ΕG=b|e.ߒєkoppp<0h]+gBgoZIoaKD;b4P[ +KɦgbL2tok;V -TA2"hO!7mNg&L;- Mc#`\ީ 5JyAn3CWۘϫɡݤ?^3vڋjZt]۩{?ircPnayqȤJSPi. r.1[PؓJBLdmOX{(jXɆkA=+X RdFŷ5b!ोZikM=MϙGLix,EXONK) wճ{}kUB0,t&f .|W%uo:X2 >O:wTL`TH )owYeb`FM]R=MP/{4Cߪ]O͹r-Z$n 7Ti 6y}DD=ǹli{\WV!Q*Fgh]}mA`) j;]Qެ럩 N©|񨂘3ж[W^h~FgNeߣ/I&z% |ǣ(&&]8kfؿU1}hj۾yuF#LqOM9;A s?Y<;.B$J-ɕƩdl\#(]$bwYqAPgE"Dm/E>3hY<̩d܅cWT@ñlJTXIЖfͦXZ  e~Kʈ:ѨR\'+vct T6Ntʈ:vuIϜr-;2j=YMxŠx-ZL!~BBha+w&#.0Ǟ'Lc&bc[w7l$`WS]˫D&"#,#D!l\!N81ذXGD/%rUBr4X/@#.dw[\:4kŎs ^Kb2N8@|xi&Tt7ĊI5x[#RBU3hψiUaeGdd5~ IɊ .$>^2!( ]A|v09/o&$[?gwj=(U"!`ur3P#6Y$c7דI@k9"VY#X@~##LsnJmݭdG#kʗNɝ0<9%=(^|8)ޤ,ު%U[}ify.LF |d2Ý+n#yzdg[e1-D'A=q+;qFR؅j.^d2.W~ vk޵xfx#{24rcqC|N E9{{i)&!'([bִ/Vh 7%vj{ ?g4!A5fOl fRPƚ9\uodY4/C=j=c:Kh) b"Z0߃.uL/g۽dQgwtzL U1J%s|#zZ:kһw;yo L6 N~+&2Ue'T%_7\x-G0}("? 7HO4ๆ+4Z|SnI@quAes5 }klh5z2{ xtrzo)j6yz4T>hjZ¤N-KZ7ҁLqAG>_#L0{+y I(WBt׮c|iI& (TE FQ;lGh4'Jm/E^GޙDݬ摧<8C3OkȏNCؖM2opФ,_jp3pFmBDs6%n眊`]VLјVc#p/p VV@bN i"i ;}##7|- %di\,HH;L[y-ͮx)0?K 5٨-%;ϵ(יh'쏻:ف8wF#q GXLHSA/g`MO>+le_Se]p뒑 J-L#hfjFi=R۪VxQTIoXV(:#@i"ںsf7NϺ$JZ̑X@a$@6ϕ,G6pSsK U?"fVKkHg 05=V~m2hG1i~fSul۵/^¤h5AJͬy'{$Zv>: 9OS~8xt:p@hQp{[xci{E=HhlZM VT#y% as=]og۰0NVE<[DlʽR8jVm|=Q<ކSGEH9^8m#T?^8 cUy~d %L]#Hq61_h%){qүVB!D4ta>YWja- S9v6bDP! DJ~Rڼz'զ"8:~ulE]v[7cfl4ϖGV.FG?=Th8=f2oDi)2 ,Sm9lU^5Xoˎvb5̋ ȍY5Ǧʪ %I T{i>r 2 E|c(8TJÕ0`cSa݀~Ɵ/b0&|R;8qT Ǐ=mmQ.x.R5jO[9(8MyyF"L+P.!a#W)!Il5v lYEd*m) '2&H_!uI֜_ _;TlKt-قo* ocP._HXW8p2́o |{Q+כ @cl? 'n#;WC,F# %_ iP3vʃ`;K.HJ :Zl~0u{aiժ~#REOc9vǓU ÈSM3|B WӶ 3Zɞg/j>@mV>sYa<=0O!_fL9NX&y ܪ_%*:D<[tHXo_ꅼ *S|iN_i\dZHʯbX'JWX  !v[:鎦" &"*TdT2qN[E"*-Պ!}38?[Wk<T?gYQ1"e8 \^h@ {ڣ|v6'`~/JFWi_1Og4GDѩfENN4{eacEWTMg# bd9I7-KLUDm"vKw\mpDD߽=yTr*S~O\/&qpA#q@X8*-R=[9yUjF#2]^)*UHHlMuh2#-$ 3ЂUrWnX8zN2y~ٙe,q{O8cm#2[J% 0Msn5gϘӑv^^2^exha t"^SQ,N?MC5}x $(_D8*38p=э^NsцH'-J4 sOcYtټzoͥR GQ6OB5qfJh[q$;k' 4Тb#_V{]Q]WS/SI~:_I %SybZ,FuOo x"u=q QT#|0SI.q8VT0SUtJtjSrH1 yiXIt޹EϖN4b5)q{y&i:`&~ѷ9rXg>O6ߧ&>"sX {^ Ǣ D50-?%(ΫOuX=Q8f|0b;W%qwsZa%,+=b3hcy8o.1=^N'yBuLJQe9dlRc>w0 cmx_x*G?쏵 |nt[pf VV L߳v(!'!j4uy^c7G hy%EqD"P2.!mq+yr,ɡ,%CKn*(BWc۶qߦ1pIHr1`~h_oijm[>Ɛș[oyrZlwS0߁N>G 1KDyy?s8Ŏp\0x`l$i쩺u)I'E'HJ*6Rv~侩 h^Kt0j3wsӻPd01nl!6j&Dn v^z:w/s/kxBGC76jծ3|,]ʷcZuUőZiU58O{>XO|T4 8[}1Q9h;7Shs4|I |SUΊleMVҪdߌ{HPY29 !o*aXꎄg=XDWR=7bz2ą%Or|,S@TcI|XT^"ML4im++h;XF,vb ("oC_Yz X7*#YU"Tdf%HMυW?] ٬83J܂B5iGKpO5WBD,'G`$z>R׊5Tcʌw8㝗ȴQ`P KAuw__Fn5?P@WTq 7Lhmrw ո(LtۓWvEaV`kst=- `epw8>3=`6PkO@fwPtڐ2@(7D;>Q]A I`87O4n.zS0)iE(pt{Wʮ}&jd|/,a}ĦIh*>>䎩wC >VßSuޘda ]ib Ni_Pa "6D{|YˬkIHߑxt\OtmOȣX\3W[n+z40 X~m.9fɘ6!VAԫz?;Hɐw&XLJItAG[%0BT96yD^hu’]s`]x1ff#oqg&`8Ʀ "H1ѕw_%C|F E[izܡ%,2X1{&,UЯ,cGP[-4CrOJ2L6=b↖^'.<?I\0$Wĺ%qj=:[XT \)4qa6@=w?#b.@P^:kTK3`g  >=JXd/izBůPX 1; G>Xܪ_*4Xi Q)E},8oS@cYЦ^(םw`w|ͻTh T0ǎd('_T0A 2e|e4dE sg0J+d֊]/,1/Qk,Q> Df 7=;C؏Zə_HX{ '(Ee&[ 5#g2tiӇ"ǦuxޓIKv=p hu]3dkXe7Bۨ`ұ`c"TeDg550Vum:nxSԟdDjxa첌f}[Qz%#|GRyVnLTz}{Czܬ("ט*,-@EQv:㇯$JJZLJqO%hH/a=F(9i@cz<ƤrR*Ie>/S`AꑫNop=B4Թ$&PŮNX!GKGBG!IQx7K kL]9Ůx1*1]j9nK[tRL?@DH[:V@е!0и¤߆_qjKS>{%Ra_*Ƭ"2!{ En=mt-{ʡ`KQ#:MeFdML T{̷k>yUP::YgD a>r"m M{o3UX Ezhxs_ *!*)󦅧*סsn\| < W{NZ)W \]c\{)\}=n~HfSIK!&׍<_ic_ܥDaŹv9͹q?X)E3A"$ɡ3ƻ즏QNr?z_?PK!7l4e%T]pNRi@]t~B§zlRvOH4CƳYk ATcv?RB z_RB@1C)xN#x-I^?V&lPxRȂ}XE;l\EX>+\?E 2z&y2Q-x}D%k$ڶ~hX}dBM˂a'!Us%`Nc[{\-3VClnQ8F!|(A!*3(Lp_{qg*yTG%R( b jp^GPʀMA`Q Y$s|WYYRpEդ?X: I5\&" RǏ@'H&yfl1Z(&$%ViM+*Z l}:pݴ6/lȰ٫sڰ۶l !0j 0ߪQĥ7%LȨxeS mznx#MS βWs*-fUiVLgEPRsj޾8?ajUl[*')ÜHBHdU蓅rh*4gX~z5_&(tmeF&ad겫a&VˆУGkCr0{=U߽i7)ڴMNpiphIuk]ɜEW*y8I)jjgKq?".֑2t)LkqO6 \Kl=. 5b6=0| 6cs `v7@'Օ׭!fSd.aE VrмUI?U~ gEHl@ R[i55;%S%AN,u6B;\$,~}}h}<88\$B 1m_IzB_KsHJmεk9r_G(Tଣ$I{ZFYR)ofasN10Akae;'?τV##^6l!s8~T{*J0B&˜\Ŏv='CAS.)Oz [ukW[cIqIjxʥk'vI|1ߍ$}}0OQ4pסIl=N#z9m"KD̶mi;8 L!PwI3JbI6v3VJ.3Co.OU'e q~+t&[Y}/e-C}r|FWRmvFYgڊN) u\2g/m|mY,)Ssn)SG!o.} ۽2EW@ԬN35 uAE]O7Ӆ=*3>؄.uΛ:xP=um mzjvbP-Z5_CI^,e`t0kJ< fWUo#g)"ȗCl(ox=] y\k=`X練/|=fʭXT+OB+@6.C/3p 1IXb еGϠ/,^OLՆ=4_BrDYpMގbG>?MS'je,VJin렢J P[% Fz[o %(WQ-f,czLAos&fv9֧GY7#q 9up.dMA:0[T.== k&eӕ38C21-N|#ʮyeuo`+q@N7IU\U$vrU]Du%tGp r˶BwY҄B 1#9IؙZ_5T}m-S׋\ح6xOg0vHI18F׏m1Zצ sz.<΅Dt>#ytَ㿛/cwTjXʮ;#Yѣfv٧J"p;X|9ckhP]׍Z"(%Yt㠈 y\34 W]{KQO-|QG4FTOT;˒땨x{lZWU"=*@.+Uv5 J#|⌫>i±a;H:2բzs[C5jκiBB82Ik`[^;`i'iHgD DӺd<-3(ʀpSgu">ٺѩ& <:X6E+PQ6,v2hȻv;e^/;8 QqʐqNow@0^=AR2rG_Apkt`ӳw9*EWJǴ+Ll1 :PeL7{~Vb⠐3PQ ˑ`}$rnN5$y -m&$(j1gl8qV,g!Zd3w8wi zZUR:G3غ KK8̀X_Ư["i̓ʐW<ȽdNT&ը4JVj A 5@T{Zq uN%j3e~۳ 6}y"U"`tt4F2 a|nLQfpe/\ LOm^ⶊ,ߵcdf /ü2Dܯ.jZfF Q_`lTjilz[Uu!a8$blcͶ#VEj:^싅lBxB8"{uJIh/*5R`?gc&LC"8 9AHzC(AsY8wi?oXSS:4Nz_]R8_0H%b v\|@;%{-jb)Dgpw /BmlBqP3[[Ñ$7a<=ݧP\|jr;f zٚ"Vc ~i$ ۦ5j8tВː8{ !'2Œ,Mgbu{ +(ߙn 1 Ûݶ [^oW)=k,b_ƁIlӣє{YWdzv Z鄭h5WOuA'y}埳D蕫&,t/ޅvxGXK4A؎v 87: ;SA~N@gbAģ A!9{ҤXT@Ԁs$ǖ> d-.(0"\RrEL#*jmޗ::_6*$zI\gX8έf r63t8Vmk ``dJPC?ub .i2MHfo[R 7X[T[LlZr@R,w yE:."bs:IC#U< +E1#8[(sU%^RM{&3LL@yL%P$3Zk=Ǥ{.DG{5y|֙h |곌~rhe[MoFy`_wg?֩|Mu=M?@A}ZENd8N( aO@^s Tꁚ*'D5v`iA nH_$u׊%=Z"ixsjB=T V#) y% F=2꾇?'Tɲ+F/Sz 0.]\\BGWw1X~24_~}^$N Q> Pc4߹>UFQ#ӲI,"XV)M;Gs} uE"F'%`w\21;gmnS: m|Z ;),Ldbް"<3SƓ}#~6t4ΖqlW xyְBn'ȁ_Z&~rGRe1O/CBb | bj|Vd,1cAoQb%6od#w:]<4#ybl )ٝm\cgj\E-lIkjI5zu 6L3ڶ*ت4$[}-TuHN;yzTFnV5_ HǦa;t_#~'bqUb]ۭ/-|C@Hca%M k5a,D 1 eX!]4ylc38P~]>΋SA@v8e,|½:wTG `4ԡH/9gֹd*RaIBi$J]aRZ ~_3` / Q mn]ZBbNX>|?6@ݫNLqlgÆτ0_ix^SXݮ/(D1*J}So بL9]Fe|- c3~$vĘVHHʇBN/!@7-gZRQA99nߖD`hMH/9Rek#tf rܥѼ {q$=BDg4UQͮkEE}SxxlЯT0gl班Mx-VUGF@ldPw\r~ J ౶8Xr›gK3gkYm=ˌq<~Ad4%uT$`҇WҀeYq ]ٜ*[Ytrv"FqENLZ{AR)-K;DW# g"sޖbތo#+{ {<'T͋u:T\l(Rz3":>[b b[!ӎ)90!Fܭ:R%eR=9UZa M*^J0/?Hk4F\PP\qYp_ e賯yL#v8a[&@Rd>QoH* IS0& $ 5-Rtr}WK$ 0bj4c°~UP瞎Iאjrj:!&(dS1R6-+A0)!rE;T H!gJ%*]G׽VRq7"}#}q25VEb%Rz))cSo'( J3?4[#+~LLRc{RU' a+-(|z)#~!>pDx Z(RޗClk~gG sY},tN|=TjCds)S[%H|ɹ?iq6xO]̰~`_.$gfvΨ vif>zkNK^^%!f9dSQ?'S8LLLlGt71vؘD 5v2SrmceRwBhf@3p-SθYV_wOKOƱvv:YdpGǦX{GpF9ޯ{ w b 2u[}3 -pKrAm rC6v5/γ0|wg?lx~T--ougoi"6=L |,ͻw's G^`!̘mmX^'a>D{E1^) ְv>-V_K=Mꫥ2QuDNP18}#I\YCF=;uؘL!K3c BwϮW\d_godm(3#'ʭp:?R:li\ť5S)"!D@yn\Ds&]IHAKdb|μLbE-K#+ìx ]̀h(0RFUcJ^P*ָG\y4Xk ͳCP6h(Vv, 'kR' ghd8>mtQ@IzWv|{&Z!]s=yἥBٗ+N3:3}Y%=Q#N(Rv)d`d\*7Bo4i$]4d(JaDv6A0#ݘa~rlGsCGz2ìoy # > 0GEWz7o:#{T7a! v<u[>bi,h0QL]—ijR p59wOI3eJM[o,ݗH,ʪb/$y`7ׯXl;Nuewvp'e ^zP8z% Cd+~=s -u֣2S7qEgt|C9"nf*/xUS:XF/zzC<2e?f`۩ ~<= OT0qX{-wjk=Ϫ҄I9Ԓv7.{eXw @*SG|jF QX7n<븉x@>|l$C5P:#z|b_gC :2ǵDOSYuސ%R{Ǎ^4ee2w[<>#ZhZT#S2~$bw~5xc[e֢}!~yR5FX[P=ERc۲!0j7T2e7g^smB$7 T ?K6n'Ɍ O46)E#&Q_ux:ʯO[ePbq* .GXoez+8]!}y+Й4bBNJ G5uU L3s $ ,n _CIwuQ}8~?s~V= PrP\ZشWtlwUX;2NcePd;ZUzo:zi(ƥM*n]͗ӫṡyUT~{TTvޭHa*`xO,ǿjPD+ ;|Wcwxĭ8({AhQM ;.%hm[dlC9QY6 ĭ?ə>hF 1gO:"4^:ОuՋIX1"wu5xajBѰn-Wi-6XÊ:kzu2i'81ÒG0IJqK[0 *Slk \-QANrAT5$t.2 OXg ~'V'Js:݁ Fd NKl@٪EeL=urv/,G5g\LzW3/{HJ$ςF& 2uj~Nʝrxl"Qr7P/O8Mhnure_)1nQ+IoA#&&>V<ԽJRmzL vZD) u4ڽޮja?ؤQOCV$8;U6#};r[[[?hBD\CEѠL4&Uzk< ;a${& Bw(T ;!rӊU9MY^xM)c &R{)෺'QR) I8>p;m5G߉ܽ4#]sKLpI9kNT&~vmiXd?pUY%sX_w89BSGs)hF9Z*sk(qm<-V1EBwfA:^V|\vk%EQ:vea.6žsp#yrS_+wVlRR( r L׶$L:< m4^Ͷgy0ܦpPoZ 7{EM5|?)BC]/?[XnLZCaem{GZ~!"  kOcZ̬n+x{D~XQߌiʝx~ ?':#p "ٟ"aeR /Qwmu Q`3as@7hY}< ~-v`OGbb@ i_##MdrK,{ǞZVݥ)ʋ`t[$[CU"-h7=Bs Ѥvd!1|~]tZbL g dsE&jLP\ls]2Vq~CaS0Km9J*m< hFtm k&z P25H \e$ AOźP4"B6 >9=f(A˝m5_ Esi,,&oM?zRΉ(/0k8n CiuN}5@3ǒn!"n ЮE hs:{3vMRHSWCXtyԡ2wa$ۑIy .Ua!%j#8H%0/kM̏aid:diO*h3=R|4{$l+Ga8 >_Tԯ1_5J< eռ$6n);jrȔhQtigIp@+hgH+ꦝ:CPΦVaأ09=$F?20t)Q&_|!㲬NlYQk?|q4\OW߭vMׂn??CG|K| z_@HtYqUDR_W!Au#MD>VXgHsoDVrGXX"7' G Zyd UYV&n9$0y=Sey_'޼ѫ40>^}6 *?[=YicomfېJ p(^Sn,'G+ޕ*noS."?o"R gU,m4":v`w]]*ٛ3~­[V`5GBd ;zz+Oh-@>!,hAnu?(>[ G1| FE">;DSw ޲ii~i'g+7 fX{77q  8 o5UN `H&h,fT2y7eлf2 +݄ͩh@̖4F};Q3K+B>R:bI(ѧ%3h6]J],E:!ŸsqØPʊYضRP!08韄?;+@<ƥ_ QZ D\ ?n9 i1b,b-bӣCHvOZmO]ۀ- c1 ZbfZT3(͵=z!;`+&r5W?7L 8 WB^I,_Id.)~:PmR)Ӆ9ՔPIgl#e|`%g4SaS,ӒXoA•',S qVcɶ{D$ELGYbgP=LP$"Ta>e(M5tZk9WzYtI2 d{fPk]ْt\huV15z\^ *tY^$n/LeDݦI}f\F(yݻ\?8b_IC5J([T{;2E>ڠ(6>lX|Zu_I@d4a%D@*v3_0h48%㒣&Il_ bnq? 7 Gգ‹4N;1ӎ+E`:=vs0>Yb;i'b UđRl]s[L=GqU$EPO .TP"2_r:hyԁe[rͣɯG]YfX{H/ܤq$QoY:mHf 26Znkpe6jJ ,7n\RĊ/BsIT N\+T[z6/93D 1> P;f$R͂$? bN/s/~20Bz[tg1{O- kK! t٘#ߦk_96RIDFVwQXkF2[tQ3RWHd>&CU:`4{z,06^&%[fxnC# %Wm[w"j~m\,Fl&:ːAo3id-'ڨ^B`_S@-ajr>z]&1mMnvʩޜ< K\sdLJ |X~s#40w'KAF Ex2jN{lk}Pk)w.r쌩;/WtMfO_$R bxn_<f4]bۀȲ> -VgܴEIwNG56V4'43q@!l2/;ԹPs}<].Wbi8iB ̇\PwpMJV7uB0S l񡈻Cϧw+X՜&X tؙOwEs6wipj[dTY,VJߐK KpZ[ ܻ!^A0 jWՙ0\5ዷص:c? YZ