podofo-0.9.6-150300.3.6.1<>,lc$&%p9|)'t* M4BVUsZWyo~DLbyXcUҽ$঑ (P' TCŅnb_b Uogn遗vbDd-5;B q~,:X:,'+E+ZbfU-n~XP3Ǥ9ulǏD#'C"m_jr8{w>SwGEzx!e۰ʈ_ KSEAXsR*0>PY3P͊3,O) ͗K{^>r>>RT?RDd   9hlx| $(( ( d( (  (  ( t(<(((<(8 9@ : F8G8,(H8(I9l(X9Y9\9(]:d(^<b=Sc=d>}e>f>l>u>(v?8wMp(xN(yNzQQQQR@Cpodofo0.9.6150300.3.6.1Tools to work with PDF filesCommand line tools for working with PDF files.c$&%s390zp36@SUSE Linux Enterprise 15SUSE LLC GPL-2.0-or-laterhttps://www.suse.com/Productivity/Publishing/PDFhttp://podofo.sourceforge.net/linuxs390xː8ʨx*8\XP{=8(:x X>FYQ(l~ CA큤A큤c$&c$&c$&c$&c$&c$&c$&c$&c$&c$&c$&c$&c$&c$&c$&c$&c$&c$&c$&FOW(c$&DiZ3*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-0.9.6-150300.3.6.1.src.rpmpodofopodofo(s390-64)@@@@@@@@@@@@@@@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libgcc_s.so.1()(64bit)libgcc_s.so.1(GCC_3.0)(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.2)(64bit)libpodofo.so.0.9.6()(64bit)libstdc++.so.6()(64bit)libstdc++.so.6(CXXABI_1.3)(64bit)libstdc++.so.6(CXXABI_1.3.9)(64bit)libstdc++.so.6(GLIBCXX_3.4)(64bit)libstdc++.so.6(GLIBCXX_3.4.11)(64bit)libstdc++.so.6(GLIBCXX_3.4.20)(64bit)libstdc++.so.6(GLIBCXX_3.4.21)(64bit)libstdc++.so.6(GLIBCXX_3.4.9)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3c#b^@\@\mA@[[O+Z`@XM?XM?Tmgorse@suse.commgorse@suse.comqzheng@suse.comalarrosa@suse.comchristophe@krop.frplinnell@opensuse.orgalarrosa@suse.complinnell@opensuse.orgplinnell@opensuse.orgcrrodriguez@opensuse.org- Add podofo-CVE-2018-12983.patch: fix a stack overrun (boo#1099719 CVE-2018-12983).- Add podofo-CVE-2019-20093.patch: fix a NULL pointer dereference (boo#1159921 CVE-2019-20093).- Add r1969-Fix-CVE-2019-9687-heap-based-buffer-overflow.patch (boo#1129290, CVE-2019-9687).- Add patches from upstream to fix several CVEs: * r1933-Really-fix-CVE-2017-7381.patch to fix a null pointer dereference (bsc#1032020, CVE-2017-7381) * r1936-Really-fix-CVE-2017-7382.patch to fix a null pointer dereference (bsc#1032021, CVE-2017-7382) * r1937-Really-fix-CVE-2017-7383.patch to fix a null pointer dereference (bsc#1032022, CVE-2017-7383) * r1938-Fix-CVE-2018-11256-PdfError-info-gives-not-found-page-0-based.patch to fix a null pointer dereference Denial of Service (bsc#1096889, CVE-2018-11256) * r1941-Fix-CVE-2017-8054-and-other-issues-keeping-binary-compat.patch This patch was rebased from the one upstream so that it applies correctly and modified so it doesn't break binary compatibility. (CVE-2017-8054, boo#1035596) * r1945-Fix-possible-incompatibility-of-PdfAESStream-with-OpenSSL-1.1.0g.patch * r1948-Fix-CVE-2018-12982-implementing-inline-PdfDictionary-MustGetKey.patch This patch was rebased from the one upstream so that it applies correctly. (CVE-2018-12982, boo#1099720) * r1949-Fix-CVE-2018-5783-by-introducing-singleton-limit-for-indirect-objects-keeping-binary-compat.patch This patch was rebased from the one upstream so that it applies correctly and modified so it doesn't break binary compatibility. (CVE-2018-5783, boo#1076962) * r1950-Fix-null-pointer-dereference-in-PdfTranslator-setTarget.patch * r1952-Fix-CVE-2018-11255-Null-pointer-dereference-in-PdfPage-GetPageNumber.patch (CVE-2018-11255, boo#1096890) * r1953-Fix-CVE-2018-14320-Possible-undefined-behaviour-in-PdfEncoding-ParseToUnicode.patch (CVE-2018-14320, boo#1108764) * r1954-Fix-CVE-2018-20751-null-pointer-dereference-in-crop_page-of-tools-podofocrop.patch (CVE-2018-20751, boo#1124357) * r1961-EncryptTest-Fix-buffer-overflow-in-decrypted-out-buffer-in-TestEncrypt.patch This patch was rebased from the one upstream so that it applies correctly. * r1963-Fix-heap-based-buffer-overflow-vulnerability-in-PoDoFo-PdfVariant-DelayedLoad.patch - Renamed fix-build.patch to r1942-Fix-build-with-cmake-ge-3.12.patch to keep its name consistent with the other upstream patches.- Add fix-build.patch to fix a build issue with recent CMake versions. - Run spec-cleaner- Update to 0.9.6 - drop patches from upstream all are now upstream: (CVE-2017-5852, boo#1023067, CVE-2017-5853, boo#1023069, CVE-2017-5854, boo#1023070, CVE-2017-5855, boo#1023071, CVE-2017-5886, boo#1023380, CVE-2017-6840, boo#1027787, CVE-2017-6844, boo#1027782, CVE-2017-6845, boo#1027779, CVE-2017-6847, boo#1027778, CVE-2017-7378, boo#1032017, CVE-2017-7379, boo#1032018, CVE-2017-7380, boo#1032019, CVE-2017-7994, boo#1035534, CVE-2017-8054, boo#1035596, CVE-2017-8787, boo#1037739, CVE-2018-5295, boo#1075026, CVE-2018-5296, boo#1075021, CVE-2018-5308, boo#1075772, CVE-2018-5309, boo#1075322, CVE-2018-8001, boo#1084894) * 0001-fix-a-crash-when-passing-a-PDF-file-with-an-encryption-dictionary-ref.patch * 0002-fix-stack-overflow-crash-when-XRef-record-references-itself.patch * 0003-Fix-for-CVE-2017-5852-with-added-error-code.patch * 0004-Fix-for-CVE-2017-5854.patch * 0005-Fix-for-CVE-2017-5886.patch * 0006-Extend-fix-for-CVE-2017-5852.patch * 0007-Fix-CVE-2017-5853-signed-integer-overflow-and-CVE-2017-6844-buffer-overflow.patch * 0008-Fix-infinite-loop-in-GetPageNumber-if-Parent-chain-contains-a-loop.patch * 0009-Fix-CVE-2017-7379-encoding-array-too-short-to-encode-decode-code-point-0xffff.patch * 0010-Fix-CVE-2017-5855-CVE-2018-5296-NULL-pointer-dereference-in-PoDoFo-PdfParser-ReadXRefSubsection.patch * 0011-Fix-CVE-2017-6840-Out-of-bounds-read-in-ColorChanger-GetColorFromStack.patch * 0012-Correct-fix-for-CVE-2017-6840-Too-strict-check-for-given-arguments.patch * 0013-Fix-CVE-2017-6847-NULL-pointer-dereference-when-reading-XObject-without-BBox.patch * 0014-Fix-CVE-2017-7378-Out-of-bounds-read-in-PdfPainter-ExpandTabs.patch * 0015-Fix-CVE-2017-7380-NULL-dereference-in-PdfPage-GetFromResources.patch * 0016-Fix-CVE-2017-7994-NULL-dereference-in-TextExtractor-ExtractText.patch * 0017-Fix-a-memory-leak-on-document-load-exception-in-podofotxtextract.patch * 0018-Fix-for-CVE-2017-8787-Read-out-of-buffer-size-in-PdfXRefStreamParserObject-ReadXRefStreamEntry.patch * 0019-Changes-needed-to-compile-podofo.patch * 0020-Fix-regression-from-0007.patch * 0021-Fix-a-build-break-with-OpenSSL-1.1.0f-configured-with-disable-deprecated-option.patch * 0022-Correct-boundary-comparison-in-PdfListField::GetItemDisplayText.patch * 0023-Correct-in-parameter-test-in-PdfMemoryOutputStream-Write.patch * 0024-Fix-CVE-2017-8054-Detect-cycles-in-PdfPagesTree.patch * 0025-Related-to-CVE-2018-5308.patch * 0026-Revert-part-of-0024.patch * 0027-Correction-for-reverted-part-of-CVE-2017-8054-fix-in-0027.patch * 0028-Fix-for-CVE-2018-5295-Integer-overflow-at-PdfXRefStreamParserObject-ParseStream.patch * 0029-Try-to-address-an-eventual-use-after-free-in-PdfObject.patch * 0030-Fix-CVE-2017-6845-Do-not-disable-PODOFO_RAISE_LOGIC_IF-for-Release-builds.patch * 0031-Fix-clamping-avoiding-crashes-in-PdfPagesTree-InsertPage.patch * 0032-Fix-wrong-use-of-memcpy-instead-of-wmemcpy.patch * 0033-Fix-for-CVE-2018-5309-integer-overflow-in-the-PdfObjectStreamParserObject-ReadObjectsFromStream.patch * 0034-Fix-for-CVE-2018-8001-heap-based-buffer-over-read-in-UnescapeName.patch * fix-missing-include.patch- Add patches from upstream to fix many issues (CVE-2017-5852, boo#1023067, CVE-2017-5853, boo#1023069, CVE-2017-5854, boo#1023070, CVE-2017-5855, boo#1023071, CVE-2017-5886, boo#1023380, CVE-2017-6840, boo#1027787, CVE-2017-6844, boo#1027782, CVE-2017-6845, boo#1027779, CVE-2017-6847, boo#1027778, CVE-2017-7378, boo#1032017, CVE-2017-7379, boo#1032018, CVE-2017-7380, boo#1032019, CVE-2017-7994, boo#1035534, CVE-2017-8054, boo#1035596, CVE-2017-8787, boo#1037739, CVE-2018-5295, boo#1075026, CVE-2018-5296, boo#1075021, CVE-2018-5308, boo#1075772, CVE-2018-5309, boo#1075322, CVE-2018-8001, boo#1084894) * 0001-fix-a-crash-when-passing-a-PDF-file-with-an-encryption-dictionary-ref.patch * 0002-fix-stack-overflow-crash-when-XRef-record-references-itself.patch * 0003-Fix-for-CVE-2017-5852-with-added-error-code.patch * 0004-Fix-for-CVE-2017-5854.patch * 0005-Fix-for-CVE-2017-5886.patch * 0006-Extend-fix-for-CVE-2017-5852.patch * 0007-Fix-CVE-2017-5853-signed-integer-overflow-and-CVE-2017-6844-buffer-overflow.patch * 0008-Fix-infinite-loop-in-GetPageNumber-if-Parent-chain-contains-a-loop.patch * 0009-Fix-CVE-2017-7379-encoding-array-too-short-to-encode-decode-code-point-0xffff.patch * 0010-Fix-CVE-2017-5855-CVE-2018-5296-NULL-pointer-dereference-in-PoDoFo-PdfParser-ReadXRefSubsection.patch * 0011-Fix-CVE-2017-6840-Out-of-bounds-read-in-ColorChanger-GetColorFromStack.patch * 0012-Correct-fix-for-CVE-2017-6840-Too-strict-check-for-given-arguments.patch * 0013-Fix-CVE-2017-6847-NULL-pointer-dereference-when-reading-XObject-without-BBox.patch * 0014-Fix-CVE-2017-7378-Out-of-bounds-read-in-PdfPainter-ExpandTabs.patch * 0015-Fix-CVE-2017-7380-NULL-dereference-in-PdfPage-GetFromResources.patch * 0016-Fix-CVE-2017-7994-NULL-dereference-in-TextExtractor-ExtractText.patch * 0017-Fix-a-memory-leak-on-document-load-exception-in-podofotxtextract.patch * 0018-Fix-for-CVE-2017-8787-Read-out-of-buffer-size-in-PdfXRefStreamParserObject-ReadXRefStreamEntry.patch * 0019-Changes-needed-to-compile-podofo.patch * 0020-Fix-regression-from-0007.patch * 0021-Fix-a-build-break-with-OpenSSL-1.1.0f-configured-with-disable-deprecated-option.patch * 0022-Correct-boundary-comparison-in-PdfListField::GetItemDisplayText.patch * 0023-Correct-in-parameter-test-in-PdfMemoryOutputStream-Write.patch * 0024-Fix-CVE-2017-8054-Detect-cycles-in-PdfPagesTree.patch * 0025-Related-to-CVE-2018-5308.patch * 0026-Revert-part-of-0024.patch * 0027-Correction-for-reverted-part-of-CVE-2017-8054-fix-in-0027.patch * 0028-Fix-for-CVE-2018-5295-Integer-overflow-at-PdfXRefStreamParserObject-ParseStream.patch * 0029-Try-to-address-an-eventual-use-after-free-in-PdfObject.patch * 0030-Fix-CVE-2017-6845-Do-not-disable-PODOFO_RAISE_LOGIC_IF-for-Release-builds.patch * 0031-Fix-clamping-avoiding-crashes-in-PdfPagesTree-InsertPage.patch * 0032-Fix-wrong-use-of-memcpy-instead-of-wmemcpy.patch * 0033-Fix-for-CVE-2018-5309-integer-overflow-in-the-PdfObjectStreamParserObject-ReadObjectsFromStream.patch * 0034-Fix-for-CVE-2018-8001-heap-based-buffer-over-read-in-UnescapeName.patch * fix-missing-include.patch- update to 0.9.5 - no change log, but it is available online at: https://sourceforge.net/p/podofo/code/commit_browser- update to 0.9.4 - no change log, but it is available online at: https://sourceforge.net/p/podofo/code/commit_browser- Just use "lua-devel" as BuildRequires current versions support lua 5.2s390zp36 1663313445  !"#$%&'(0.9.6-150300.3.6.10.9.6-150300.3.6.1podofoboxpodofocolorpodofocountpagespodofocroppodofoencryptpodofogcpodofoimg2pdfpodofoimgextractpodofoimposepodofoincrementalupdatespodofomergepodofopagespodofopdfinfopodofosignpodofotxt2pdfpodofotxtextractpodofouncompresspodofoxmppodofoAUTHORSREADME.htmlpodofoCOPYINGpodofobox.1.gzpodofocolor.1.gzpodofocountpages.1.gzpodofocrop.1.gzpodofoencrypt.1.gzpodofogc.1.gzpodofoimg2pdf.1.gzpodofoimgextract.1.gzpodofoimpose.1.gzpodofoincrementalupdates.1.gzpodofomerge.1.gzpodofopages.1.gzpodofopdfinfo.1.gzpodofotxt2pdf.1.gzpodofotxtextract.1.gzpodofouncompress.1.gzpodofoxmp.1.gz/usr/bin//usr/share/doc/packages//usr/share/doc/packages/podofo//usr/share/licenses//usr/share/licenses/podofo//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:25951/SUSE_SLE-15-SP3_Update/5dc71a8668dd2495562502e964d662aa-podofo.SUSE_SLE-15-SP3_Updatedrpmxz5s390x-suse-linux ELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=c9bc833a04ef0da09247dfab789b7ac02d92eafd, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=258ac8989d3d717513c30b93662a6f07a8189dfd, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=1b43ca4f9ce0a5c98c636cbf2990af0505190a73, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=854bbe7b63bfd4000c6e5965cb2facb3a3ff8000, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=536b4ef571318a689bb4331941106f565b5b6e1b, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=adb0134804fe90c1a38f127fe3e82cce593738c5, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=d775c0775fbf2924bef39d9b759e761fd342b527, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=9aaaa58c98e1ecfd94d578963534829cc9d746cf, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=a8fbc254c1ad666768f7be5e010225f8e603e58d, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=628a95046a6f66e6d32994945ac2b05f8010384b, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=edef4ddd77426c609f2ea68b9bd2c1aceaf83c39, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=e727f1791e2c8ece1ce4f51a8d2fca05c6ec0403, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=827f7665c15a644349deff357238e8b61542013a, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=7a2a1624b9c584d4863d68c28a032821045bc4b6, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=0ecd09237d5c527e6899a4be3c8daa466b2d210b, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=8bd966bf92fb4d0a297a5a8214ec735583b893d1, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=9829a8d5b2f20e01c38cb7638d766e4795e52938, for GNU/Linux 3.2.0, strippedELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=751b9fe4d8145392ad94f93846fdd27cefa1efb0, for GNU/Linux 3.2.0, strippeddirectoryASCII textXML 1.0 document, ASCII text, with very long linestroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) !-7BLYiqy    RRRRRR RR R R RRRRRRR RR RRR R RRRRRR R R RRRRRRRR RRR R RRRRRRRR R R RRRRRRRR RR R RRRRRRR RR R RRRR RRR RR RR R RRRRR RRRRR RR RRR R RRRRRRR R R RRRRRR R R RRRRRRRR R RRR R RRRRRRR RR RRR R RRRRRRR RRR RRRR R RRRR RR RRR R RRRRRRR R RR R RRRRRR RR R R RRRRRRR R RRR R RR=56#~IQ,$eSAd-Qo܉!=ι^i=e!*S~ޏ(ǣ7ة"2Jq !- :"Cr?ΡO>֚.P%pWESHW>%%kl*A}OPc-x&eQ,ܫ Q`ae4D(]|g]9#ʱ^ ]ϯRX=<͋,TָEw FJqȳ)LJ хg0l//62#Dmb&#@+dDFL.w|}G&x *&+{7?W&cܱPF6R%KtUQ[Md٠kT<#}ajI.z#΢,cQ_揰@O5@Zi;' 0F+ <ΎRqIWfĹi|*7O`κg ~0P\Ef^Q0 ᄍ R/_Wイp3{]_dLhpjD8ٹt(YR7˭N2g; 21 -zrˌOb< 1jsEm[BcQM#`/z2_ϫdJ`ױy xf-\ef@ HIO\InDZVAVbP!v$ծcrytxqEy+DH 40mEdo( OnN4͠ ??өUZIHΓSɳ۩/*͸ŐOtkXp/Ut/,qXq?@ &.ihjGuaprYIg0|Tj$!ihռnfL<^/I|./[]hl6IX}| BV9c-mQM:]/<|NnCwN@nوwj<ߒ j)K7_{hWI5{Tu OUŐ(&߁C M#47ӏ[ Ӑ:)al%9'{6߅Ac# > ս mq ]{BST|qřvgX@[G6 rbF6d/?w~_ .ޫdCJ}d,稠U?j/*&"U`/CE\xĞ0:L@&?T,m8no_XW{6w) t?s{Ouy$k8EtTʞ,A9p4ϘLZӢP'p\n#['}V@ 0+41)Ȫv!+t=Pÿ 盍n1dgYXJ GY//~- gvBA`:@6:|_I9^UDv& ֐x Xj2yk?b8n3Dw握r& |ŞܗanxhgMAw} u"@G6s¾ <+r/ق=6JZeW HApbWE&pIC2v|B3, ZD\_j wX=ђ TB ]Z} X"t]0Ȋ~6J8qSi̞ScA}pS&9u$q /4'p5>WW Ͱ&#n2 5bW{h '';lOl7 j>ng;mNBS pL֊Ԑ\7BED¢){n`Hs/>ȳ6>/ʼ-ZBr>zxn3CE.# e(ua.XǥOOEn1`$v,%gQE8(c(~<_Qp1:a o@~K_z3[l҃W S`xv3l _E0쒰dsbRe)E \ V~Z sF]IA4ty.f!Bsq*QB=S4Βuq۠*U !(cRfkfnMd\/"p2\Q.0q{y)W6D{8TA"2rZtm&I=l5ld f&h498 oȉ Tbrcuoy^tWsN%\pF ۉjA$f4E9kTKx2CK!|ôirev*5#bt,G!' y0ƌx'u-=ކS- ?/xS5i{# X~'{ԺSɴ|0 f6xs=+IR9t 4>ɜ;y[EL8! j:_߲(* fj7 a&x:|OA0lƂQwGZI]Kx6lVzM1@RXH Ú<m:\$6ÕQֈӌKb̂RB]0@N EM>u+?eEf\pS~%M?x;S3L/vT (1 Ђ"g9$%NY2ܚQ@)"qlIo;=Y;aUeab ְpȭS@n,%(C {b[itZ+1/'dh=Ok^e%x*TuY H\C^/* ,P[:3xᚎu2* ]S:g?hҁUؑ.-vdW.oq =߬ b>VȭQ a(TM$C.[)ll~ǫ 0&C}6~1Ƌ0 M ɤҧUb9ebE#IP"7A=x{U= Bj$9G6n,S\ `A}/ѳ@ˌje 2H>0hlj< @>`>FUFRlp!0GŶrx9,UIXh12.ِ\V']zrLgx_KP3 ^l1BQ9D};4*hb), ]Y1Dul'p!>؃00c^*(zuHZ;x `0s3U@Jمc'@^cwBzGBCxq=bH2gVy;d]~&c2/2.[lt"Ӄ}@F1?c{Ыb6@rcu|ҵBPfΧL#T{;Rw,4Z3F5xeNpn٭ţf7gTMNxQKnGUI,j8ȱF!ئsQhs.]T1@hgMۘx{_)Q<5YFz(,9#0vo%^{t"!z߻m> 'QgMIWt(Q㞲0##v]w(;uDy-{(,O4'y\mtxfE]N [ղ_8#glK*D_;[ÌsZdp\̒CDhBJeiwI>Cۄ3ra|'ca 7'57Ewe3vdzDđ٦t%PЙ+H/~HlX+")UFo\> SI34Wg07bR+'aO1t,׍l@n' aWU[} h9׍v ;4=[IhDI-#oG- :]e||*Mz"[I\>FI(G61V괡EhoFfۂۊvVw&2 }n*V_ד< YKӸ|FC`:˜?mPxJ6 pރPzdBܛp|wɬ"/L;]+sLYq調1pMZpmJ%# ).[5{R1!$W9g MuDȲ^yVi3␌ <NQˠNWH%)6zee%e x} 6\ }MlND/eChMܠ#k3NXt]t55- l'ӡ{-B q(D ߥ2B{貙ݭݻ[Ht R,N3:P7m[];W z`=NiN;L'vp)Ve1^cJp%JqW>n#)"L:9'rū Mxzm]W{[XYU%,4!-Y=7ʶ YZ