openssl-perl-1:3.2.2-6.el9_5> M Mv ĉJ4!!%joLne)Ip-Bm5 ']g%*releng@rockylinux.org p-Bm5 ']f{jt^z/Na3_nraJtCxWW7>Vس]#|Kήs9{_91R>u mJride,)5T~L{xㄌ:ձq\1Nu47c127028880ebf4c10fb513f64d80f9af51f5855f29cae8f67dc57f7ed3df59a15957b1403e5b83b245b2c22b783bfbe0ed4919v,  ||d>>5?5ud  $ G DHX}    6  L  x      ; r (8&9d&: &G0 H0 I1 X1Y1$\1D ]1p ^1b2d3e3f3l3t3 u3 v3w4 x4 y44445054Copenssl-perl3.2.26.el9_5Perl scripts provided with OpenSSLOpenSSL is a toolkit for supporting cryptography. The openssl-perl package provides Perl scripts for converting certificates and keys from other formats to the formats used by the OpenSSL toolkit.g%pb-1d1ecc17-b31c-4aae-959a-3bf49b998dfb-b-x86-64v+Rocky Linux 9.5Rocky Enterprise Software FoundationASL 2.0Rocky Linux Build System (Peridot) Unspecifiedhttp://www.openssl.org/linuxx86_64VgAAAAA큤g%g%g%g%g%g%g%g%g%g%g%a1d6e3bc4fcfb1bcfbe0372863b7c1cfb665e29cf49fe19b3105f157f0a4d1566628a5f51adc4ce870bcb006a803f74c17a68e78b124681defbd29f13db47c1d4f0f7260c1bfbc859cdd850b142903cc7a44b28ab46393d8f71959d5b4fa7e2ce99b8bdb8a5bb6e3f10b929806d07103f665b65db1e4ccde9bb7ca9c80d5b35a5cc83706e688add72fabf3493856ebf5f9239c93f69b7c1558fb9ecc82bea8d1tsget.plrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootopenssl-3.2.2-6.el9_5.src.rpmopenssl-perlopenssl-perl(x86-64)@    /usr/bin/perlopenssl(x86-64)perl-interpreterrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)1:3.2.2-6.el9_53.0.4-14.6.0-14.0-15.4.18-14.16.1.3fٝ@fKffvfif`S@fO/f Dee\e-%ddD@dd}du@dkY@df@dZ5dP@dK@dBzd>@ddJdV@dddadxcccc\c|cr-ca @cY!@Dmitry Belyavskiy - 1:3.2.2-6Dmitry Belyavskiy - 1:3.2.2-5Clemens Lang - 1:3.2.2-4Daiki Ueno - 1:3.2.2-3Daiki Ueno - 1:3.2.2-2Dmitry Belyavskiy - 1:3.2.2-1Dmitry Belyavskiy - 1:3.2.1-2Dmitry Belyavskiy - 1:3.2.1-1Dmitry Belyavskiy - 1:3.0.7-27Dmitry Belyavskiy - 1:3.0.7-26Dmitry Belyavskiy - 1:3.0.7-25Dmitry Belyavskiy - 1:3.0.7-24Dmitry Belyavskiy - 1:3.0.7-23Sahana Prasad - 1:3.0.7-22Sahana Prasad - 1:3.0.7-21Dmitry Belyavskiy - 1:3.0.7-20Clemens Lang - 1:3.0.7-19Dmitry Belyavskiy - 1:3.0.7-18Dmitry Belyavskiy - 1:3.0.7-17Sahana Prasad - 1:3.0.7-16Dmitry Belyavskiy - 1:3.0.7-15Dmitry Belyavskiy - 1:3.0.7-14Dmitry Belyavskiy - 1:3.0.7-13Clemens Lang - 1:3.0.7-12Clemens Lang - 1:3.0.7-11Clemens Lang - 1:3.0.7-10Clemens Lang - 1:3.0.7-9Clemens Lang - 1:3.0.7-8Clemens Lang - 1:3.0.7-7Dmitry Belyavskiy - 1:3.0.7-6Dmitry Belyavskiy - 1:3.0.7-5Clemens Lang - 1:3.0.7-4Dmitry Belyavskiy - 1:3.0.7-3Dmitry Belyavskiy - 1:3.0.7-2Dmitry Belyavskiy - 1:3.0.7-1Dmitry Belyavskiy - 1:3.0.1-44Dmitry Belyavskiy - 1:3.0.1-43Dmitry Belyavskiy - 1:3.0.1-42- rebuilt Related: RHEL-55339- Fix CVE-2024-6119: Possible denial of service in X.509 name checks Resolves: RHEL-55339- Fix CVE-2024-5535: SSL_select_next_proto buffer overread Resolves: RHEL-45657- Replace HKDF backward compatibility patch with the official one Related: RHEL-40823- Add workaround for EVP_PKEY_CTX_add1_hkdf_info with older providers Resolves: RHEL-40823- Rebase to OpenSSL 3.2.2. Fixes CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, and Minerva attack. Resolves: RHEL-32148 Resolves: RHEL-36792 Resolves: RHEL-38514 Resolves: RHEL-39111- Update RNG changing for FIPS purpose Resolves: RHEL-35380- Rebasing OpenSSL to 3.2.1 Resolves: RHEL-26271- Use certified FIPS module instead of freshly built one in Red Hat distribution Related: RHEL-23474- Avoid implicit function declaration when building openssl Related: RHEL-1780 - In FIPS mode, prevent any other operations when rsa_keygen_pairwise_test fails Resolves: RHEL-17104 - Add a directory for OpenSSL providers configuration Resolves: RHEL-17193 - Eliminate memory leak in OpenSSL when setting elliptic curves on SSL context Resolves: RHEL-19515 - POLY1305 MAC implementation corrupts vector registers on PowerPC (CVE-2023-6129) Resolves: RHEL-21151 - Excessive time spent checking invalid RSA public keys (CVE-2023-6237) Resolves: RHEL-21654 - SSL ECDHE Kex fails when pkcs11 engine is set in config file Resolves: RHEL-20249 - Denial of service via null dereference in PKCS#12 Resolves: RHEL-22486 - Use certified FIPS module instead of freshly built one in Red Hat distribution Resolves: RHEL-23474- Provide relevant diagnostics when FIPS checksum is corrupted Resolves: RHEL-5317 - Don't limit using SHA1 in KDFs in non-FIPS mode. Resolves: RHEL-5295 - Provide empty evp_properties section in main OpenSSL configuration file Resolves: RHEL-11439 - Avoid implicit function declaration when building openssl Resolves: RHEL-1780 - Forbid explicit curves when created via EVP_PKEY_fromdata Resolves: RHEL-5304 - AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries (CVE-2023-2975) Resolves: RHEL-5302 - Excessive time spent checking DH keys and parameters (CVE-2023-3446) Resolves: RHEL-5306 - Excessive time spent checking DH q parameter value (CVE-2023-3817) Resolves: RHEL-5308 - Fix incorrect cipher key and IV length processing (CVE-2023-5363) Resolves: RHEL-13251 - Switch explicit FIPS indicator for RSA-OAEP to approved following clarification with CMVP Resolves: RHEL-14083 - Backport the check required by SP800-56Br2 6.4.1.2.1 (3.c) Resolves: RHEL-14083 - Add missing ECDH Public Key Check in FIPS mode Resolves: RHEL-15990 - Excessive time spent in DH check/generation with large Q parameter value (CVE-2023-5678) Resolves: RHEL-15954- Make FIPS module configuration more crypto-policies friendly Related: rhbz#2216256- Add a workaround for lack of EMS in FIPS mode Resolves: rhbz#2216256- Remove unsupported curves from nist_curves. Resolves: rhbz#2069336- Remove the listing of brainpool curves in FIPS mode. Related: rhbz#2188180- Fix possible DoS translating ASN.1 object identifiers Resolves: CVE-2023-2650 - Release the DRBG in global default libctx early Resolves: rhbz#2211340- Re-enable DHX keys in FIPS mode, disable FIPS 186-4 parameter validation and generation in FIPS mode Resolves: rhbz#2169757- Use OAEP padding and aes-128-cbc by default in cms command in FIPS mode Resolves: rhbz#2160797- Enforce using EMS in FIPS mode - better alerts Related: rhbz#2157951- Upload new upstream sources without manually hobbling them. - Remove the hobbling script as it is redundant. It is now allowed to ship the sources of patented EC curves, however it is still made unavailable to use by compiling with the 'no-ec2m' Configure option. The additional forbidden curves such as P-160, P-192, wap-tls curves are manually removed by updating 0011-Remove-EC-curves.patch. - Enable Brainpool curves. - Apply the changes to ec_curve.c and ectest.c as a new patch 0010-Add-changes-to-ectest-and-eccurve.patch instead of replacing them. - Modify 0011-Remove-EC-curves.patch to allow Brainpool curves. - Modify 0011-Remove-EC-curves.patch to allow code under macro OPENSSL_NO_EC2M. Resolves: rhbz#2130618, rhbz#2188180- Backport implicit rejection for RSA PKCS#1 v1.5 encryption Resolves: rhbz#2153471- Input buffer over-read in AES-XTS implementation on 64 bit ARM Resolves: rhbz#2188554- Enforce using EMS in FIPS mode Resolves: rhbz#2157951 - Fix excessive resource usage in verifying X509 policy constraints Resolves: rhbz#2186661 - Fix invalid certificate policies in leaf certificates check Resolves: rhbz#2187429 - Certificate policy check not enabled Resolves: rhbz#2187431 - OpenSSL rsa_verify_recover key length checks in FIPS mode Resolves: rhbz#2186819- Change explicit FIPS indicator for RSA decryption to unapproved Resolves: rhbz#2179379- Add missing reference to patchfile to add explicit FIPS indicator to RSA encryption and RSASVE and fix the gettable parameter list for the RSA asymmetric cipher implementation. Resolves: rhbz#2179379- Add explicit FIPS indicator to RSA encryption and RSASVE Resolves: rhbz#2179379- Fix explicit FIPS indicator for X9.42 KDF when used with output lengths < 14 bytes Resolves: rhbz#2175864- Fix Wpointer-sign compiler warning Resolves: rhbz#2178034- Add explicit FIPS indicators to key derivation functions Resolves: rhbz#2175860 rhbz#2175864 - Zeroize FIPS module integrity check MAC after check Resolves: rhbz#2175873 - Add explicit FIPS indicator for IV generation in AES-GCM Resolves: rhbz#2175868 - Add explicit FIPS indicator for PBKDF2, use test vector with FIPS-compliant salt in PBKDF2 FIPS self-test Resolves: rhbz#2178137 - Limit RSA_NO_PADDING for encryption and signature in FIPS mode Resolves: rhbz#2178029 - Pairwise consistency tests should use Digest+Sign/Verify Resolves: rhbz#2178034 - Forbid DHX keys import in FIPS mode Resolves: rhbz#2178030 - DH PCT should abort on failure Resolves: rhbz#2178039 - Increase RNG seeding buffer size to 32 Related: rhbz#2168224- Fixes RNG slowdown in FIPS mode Resolves: rhbz#2168224- Fixed X.509 Name Constraints Read Buffer Overflow Resolves: CVE-2022-4203 - Fixed Timing Oracle in RSA Decryption Resolves: CVE-2022-4304 - Fixed Double free after calling PEM_read_bio_ex Resolves: CVE-2022-4450 - Fixed Use-after-free following BIO_new_NDEF Resolves: CVE-2023-0215 - Fixed Invalid pointer dereference in d2i_PKCS7 functions Resolves: CVE-2023-0216 - Fixed NULL dereference validating DSA public key Resolves: CVE-2023-0217 - Fixed X.400 address type confusion in X.509 GeneralName Resolves: CVE-2023-0286 - Fixed NULL dereference during PKCS7 data verification Resolves: CVE-2023-0401- Disallow SHAKE in RSA-OAEP decryption in FIPS mode Resolves: rhbz#2142121- Refactor OpenSSL fips module MAC verification Resolves: rhbz#2157965- Various provider-related imrovements necessary for PKCS#11 provider correct operations Resolves: rhbz#2142517 - We should export 2 versions of OPENSSL_str[n]casecmp to be compatible with upstream Resolves: rhbz#2133809 - Removed recommended package for openssl-libs Resolves: rhbz#2093804 - Adjusting include for the FIPS_mode macro Resolves: rhbz#2083879 - Backport of ppc64le Montgomery multiply enhancement Resolves: rhbz#2130708 - Fix explicit indicator for PSS salt length in FIPS mode when used with negative magic values Resolves: rhbz#2142087 - Update change to default PSS salt length with patch state from upstream Related: rhbz#2142087- Rebasing to OpenSSL 3.0.7 Resolves: rhbz#2129063- SHAKE-128/256 are not allowed with RSA in FIPS mode Resolves: rhbz#2144010 - Avoid memory leaks in TLS Resolves: rhbz#2144008 - FIPS RSA CRT tests must use correct parameters Resolves: rhbz#2144006 - FIPS-140-3 permits only SHA1, SHA256, and SHA512 for DRBG-HASH/DRBG-HMAC Resolves: rhbz#2144017 - Remove support for X9.31 signature padding in FIPS mode Resolves: rhbz#2144015 - Add explicit indicator for SP 800-108 KDFs with short key lengths Resolves: rhbz#2144019 - Add explicit indicator for HMAC with short key lengths Resolves: rhbz#2144000 - Set minimum password length for PBKDF2 in FIPS mode Resolves: rhbz#2144003 - Add explicit indicator for PSS salt length in FIPS mode Resolves: rhbz#2144012 - Clamp default PSS salt length to digest size for FIPS 186-4 compliance Related: rhbz#2144012 - Forbid short RSA keys for key encapsulation/decapsulation in FIPS mode Resolves: rhbz#2145170- CVE-2022-3602: X.509 Email Address Buffer Overflow - CVE-2022-3786: X.509 Email Address Buffer Overflow Resolves: CVE-2022-3602- CVE-2022-3602: X.509 Email Address Buffer Overflow Resolves: CVE-2022-3602 (rhbz#2137723) 1:3.2.2-6.el9_51:3.2.2-6.el9_5CAcertscrlnewcertsprivateCA.plc_rehashtsgettsget.plCA.pl.1ossl.gztsget.1ossl.gz/etc/pki//etc/pki/CA//usr/bin//usr/share/man/man1/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19x86_64-redhat-linux-gnudirectoryPerl script text executabletroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRutf-86d7ef15c08147c46905085aaaa5d7713af38f26a916238ecf74d3bf87fbb000d5821eb5f9e6f85a560bedbb4a83b7d6eb6b2be33d99e674dda05a3be044ca743? (/hsJb.P]=S 2Zi:EN5:b+Mt0?t(.,4`PMñЭ7OҶ;bCnîc)"ř'8lAe1EH,hqopOϸT#֘s\PsI]IjSշ~z􍯛f#YRV.&Nhٞ߻{zp`ޏ\sn11GopEs_& l_txXe=~/9YPl蝟f%"13Lb|45 $nϋ?vN!]#"v9i@.KWt#꫗e7(fVKUn<%.VNA8mA nUpFj7N 66okwGR}ec%Xp jK NLhms+l&FKd<0:7?DH4Mӻ:,6_ps _L〳`{tܳSO?˝LoK+U'\Ai֧pϢz'阼.YMJx}0bxFİ\n~k/|hbQbkcsUHXT;fpcpͅB#=;~[[4e·R fi=2`e!$4k&I OÝ隌[Y"дxӱcՀ]:t~8Z;_x8[G:$,*LT`MIg{. c8YI> *{Ob.2־gM"u#yD$IAP$$F )?C1""HI 5q-fBJ^RC_)6GLxS5M1YY%HYnE9oJrչu# q:ǖ1#(K4^)t%3+Iţ+~~)e*mLBbRp |,,Y4:!^Sb}"}.\2}"0T{#V]4VqF"ֆ뛅p:3-b2dPBV<^ "໐>yǃF]ПYY*Η1K|V]r@R_IX65e|̬G+tEDZs4Ǧ' 9f@֮oM9Ŕ0NI«qH\/6qS͹y@F:y+tʖ#7#-X3 l D_,' lB_u G$<[u{w_2>O V]=^,*+j]쮅ij2-vs> h.bPnIyj a)ebz t<ڣs( S߳O[g9X!ʱ{T,ҡ"C,c{EŢ+KRpM ?TK`qhXP]py[n`e 7102SKj>Q %1@Jk+{RxAS#zx".l Kd7 'Ldm??]\c|+YO>ЙW4Kc,JۆO6+ΧTxBA^w&CL54^%Nw: p6qi+bJ!VM8, 659S cj'zqjo*l g dy~X4 _b LaS@O3qId ޟPcd ;Y"S# ]/R|>&4Og oZ@G(#6gݑ/_y.&j8^ԡg0IBIR#dXe=QިF@vbN24D?D_QO&߯lDj;gawM\6V@f(E6F_!zlx\eQ~^(uabzTpGXeB +#>ʙ,o]}5=p{wOnb͘-/^҉DI2h"9Mh4x(MVBff{>}Aar'_|)otX@x%-7jmP9gr2:1 "%tk=/XsFPҊV%HCaT% P@{b K[`jnQ4lƵcTfpacX~sp!ׅ-(H*7U?`;1Y$E9zV3Y4BE|PZSH˽lM/öu@6AhC)B^o #ퟶ9,eX~tX WuVj}ESͫ#w&ڵr)%TďTqf%Ÿ0 I%z\+N^OXuز#PE1d|mhusb\"HCkRg1$l<6F$ ddA|wP<^WQ563*p^3zI ݿ`C'`Zo aY2kz}QnIl(LIXR*:u .z$8?4/%LB=z H((0l\=6{k)0Nγ=0`M&gKc*69i3UE$mOD68ILj\qQxvȲ ̂+)ՋSf2:.Hl~)m4$nupJ3LNT 7 BL0AOJ;~o@ ;g1Rġ<ΣL>0$&B""D"DI$Ɣ:F-0Q80A0tfFO(VǒN>- DKđhs/BX+|2S-i,HO\ 2 &)&RMP(mf;]1 n{p)DLrh/Uc(5QQN %Y3P6iG1 ”>ucۚL䒷 Rd` i| \Ùڄ*=Ql.v\)} G75Ix#4A2Af \!gzTə.녗D_^+}0]uEŞT!Fy:WHp\Ŧ5qIJ҅PW#A$7P7/?WH* Nߕ{^Ή`sOsKsE5->)396+>*l;xIp9,#,լhN܏Hj L[҂'pxƧkV4@lr9j3IDTݯ_A:!" ݮMqM`CVfU‰ }G@#8_/zejm )BRg*Oի>P?2=~ćܻTɂrU}7?n'wa9r?H_NXsv:E'8T.?jV*DrDl":<;Lb)5mngl#Q)dcbglĚUcD*`mqU#(B}ZRE5[d|QOWVa')3B@^uPY>Trsj`7 /DYU!\QesoPG>-5/eQmJO/ܖ~ki=-=FK+GFylN N?5Rq6$A01b89H #$I &8رjC}(O,$㋗H7;%JeeW'=>]-s##/@ BCjA䅸m~zӟ-3'9Uc|`8wm#դP>giA u!M:",@>z%~Jfz duHR`9_֚W♍ԷHV$ڱ 1t ("-")e.tsrc/;Fwhol;base(\.[^.]*'_. : .->flu"vR-PxV,Vb[%KysLA;vΪm'폎#'` RP!_ڄ 4Gi}oF >#1V殞7xk 71IU#>jӨ=KlrQ}TGnհ(GH]+B2$`߃-k$ ĒNOPʦln:?"Bvx "wHpo=86e A(BP4WIB|,tnO* 4LY\ 05`w}2U dbĎۛw`BQm+ 3I4+1(<]/@\XLA]r|y*Qc3^X]a"K1`?lO2+C^!O.Xӗo e5fa |9N0b@`y3j-ѹ3w)F)i~B,ׅXT)wnu~%^>/?@uuT2<)"roIkxbvL| L7wC-4rDźAsU\:Impj;!zwv:üq.oGyj4h {q˦:)mS}W|_O\p3&x8#}sm;)X9[uϞ%}]rpp<vL0nw`4fm9pOOs5f:s>R;w Ajr>{;OO?,l{kDtFHW=Gmx=1Ⱦ}2sETh;89ܴ ѫ,FNg iR/p0qaЮNAh2@G rI;9:>R4h[uFz4#C99~.`E$v2*^;WX;/.Jq$)(Y5}}]]3'L)NulAmωVDrوnq-Cщ(Uw.gB_4-ghkYGj[NDY\=\V3$ 1ID3<2<<8\Q`")}{-Q  Fw+d'MZ"4D' <ͼJxo6WU&yJ!ˊ0nEVQ*:uy@.P #'B2>/Zn#T8=;CR rI-K0([&2H5nngY煳w|ŝbjVՆk\84[@;M]$Z!D:}gasng1A%c7 $~pሆ:!BkxHOMyGԁD*4 5.CS' vKċ3*~UJf_اJDj-QCC5`dʐL㈠ðSw>w`.8覉mM $ d E-\=/>TD5ӧOQl0?3Jc#}5"z)fԂBEi 85SQPQseH]  9TTjY姐µjb6=*x $\CtH4Q~“QWW8BM>)p7( DPG$њog| 5Bӟ Wn}sۋp|.nRXjπHUe~Ky BDBnfkq^`'f&oE =QF -q' Dמ-6HׅAiRo`WcY@x$ޡ}මg'IԖm&2Xl欈;V"S };!qZwlL;w+W fkHţrqGUܶ/W[$ExPKԣx\M19Fu(X!)6x`;Uhd(7Ɏ 6]-`jd(KT>081)xJ(a4P!p]BWP+=d3U h\(GDR`±&8\,n9()dHx^7CrPiloUEAs$w07*bAlFj֖ݴa/;x2L-|Lr N ~pj ic0t|N'H5=Ȕ4@Z 5慍 O)!tGidmi cZ驌yK~~&_K$Bgmԃp&􀓚'WsbY6Zq?TmimDJɑߟ IW2\j (m!:XޛMѴ)׮~ VDٵbZ!B5*[i;-#FU#?K>͞IL\0j٤ӕ؞:IگjPIY^r_a c(7,j))m c#tJYʕMn(,}ۋ!O/o~LA.})dr\֔e}S:,/؃ϼ>ҞPe0"2ժ#wWȠJ d (%}ۚ* ڛ  &A/ N-sN[xjZ`d%^1gpcUYp(ŧ7'>ØkcI JFZFwg~8 l5g|u:jU-Cː=p&iT(9T:t}.1fuz_Aw%'?>OŌ%[,(K ŭV)کd3U79 KV)D(a1:΢c;}UCBEB_Oov^Yv;לm7kUL]yݥfeS^|ԏonxqo>G!J&?pg(I@D*}2iе>j (J1ÂrME5&?4JͺO\r0Dz[@ fBY|=C/KJ,/̬ܶWYgǛ6dy* ^M-b5067ksH_˜ 62`gMR{LSƓdj44RZa7~%5gw^\Q5pU1/BGц-D"r^6l+3wZj8 ,=kЇM <X "1PM6@"Ɍ"a{-{m!FჍٴYXJ&\HgI4FI B6Ә-HM~YTjUz#-AH0gf,]A¢_td*&>@|b",M@Q LOwXDXhwWc4PfR:`j)`* T$=y][݇Փ^cejzM^+xm֠6vˁ'z-,Z妃NDRZ*{%!`v훥[Mz}ΰQ.=R#4iȎ{(8ӁrfjXM :6,P8_Pi}٦e,i^/VbY*hzq@iʣPOq\=韜Pꥴ஄!to3'O%DRp3eB kj2?2ǯ+?_oO~\}J9b,mɖQtERLъ@! eQxeD|Τ)3,JYQ妚& Hv;5s=gHO5b̅~1gDdyDpDѿ:~bOwJaY::ݧhOݾM&25b'b_V*I?q=ח ]Z#4${!4Cb&ٰ>DDAb ]nنr5kh8\i:`8bnrB̏B@gLS-+U[ڳwGқYIzL5߯Uk¬fRKGkam=9{q34 K6,kߣ,v̎PʝIbife8f⧗eߋq.>1s]7xr7y%z?crsmzms_P,y2cˍdk(`x?JeI~7"I\lA@L@Oj&l%wjHIH&N<-)*t3AeZ5 5nLۙ#H3fs k+"KvEi:Y|ӱcYGdx #lZ>1}Fm_y(6}S>?˒=,/#}юG^J89X12Ra:*$)yeBMi&~Bg-{HH5$GϜ^BN&~geZ kSXv Aaw;r0tPPVُ|U-#"BJQܡкWCv%˲rn#\yE1AU C~C&6GeHaP5qaB/ʚ"`CCłիu7U vv&ה઒9;x됪{,s;~"mjPNNyϮ5Pne=[[U@jul֩߹xf|{;fx;x}< ԱӕD4QUzյm*׽%+ UA@EFvo33Uީ~( /S(n#1~\КGak>w%w0){U>r&BT;NvN5tXeWZ`ѶPGnuO~Qhw䱕U%utB/R/QEIydˢ'';"hUۂE!ɥrP:- r=U []=Af "Ԍ'Le}S**P$fŏS#c}8>/lTQjr8f :.SH?gV Tl>Y^jc :ʖ(|(ZՀb^wnp6^Uҩ:"im&m[Hj՗l\:LWr+tKNyZ_mCP:Y|6OojIQ s^Ï-)d2Rd 6f+x{zp\;J|#L!jncPe.8zL~tuM5=JeRyE&yX3&Fe /Sjő0{fVXEm̈k3JjeoՐ䜪^h'!eQC7T!6S l6ZA".^O/($%r Lb[FOJIdp+e Ž,bTRER!!!aI9$QB s1Ǯryd@2"#$H()h1Xvk[?*O)R7fZLQ5@dD8fs>S]9QŻ*.#=U nyAL*A)=|+%OvGfܯgAx1TReXcLB CQSylw❪t#Њ_P5VۈŸC W բ-*(% (j:-]V9sm  vScR# \vf3J>p뤁$7Sw6{H C؟ut䆼ϷٙhP}I`Ab.ّC&O;E֖Tcvйsw&>AJk$t#8pkI z~ iәL $ӴO=: Zu 僴D`݃$%q1;"; eƒ200V!yB:<+^qfibO\-0ҹEDfJ/ r 0 3q'"FL*!pŵ Qx֥#˺ٰR x]^@H" l.KieHC7paBjG9fgTG Km