libfido2-1-1.13.0-150400.5.6.1<>,fdJp9|Z~hۅ .:CE:n{ԉ^shʙ C}TԌ*SVJk5 F^&6_y?1ETͅmy0G%Ӛ%N#mo)FF)FpH_6)9P} Ͻ\MjBO,~դ)oHÁx}= dXh$n_S3ZU(,W2]O(ZU9y?40Lj2clfH'wS?ؾ6,Tuw>C3?3d  ! A .; Qq     @XJ(y8!9!: !>/U@/dB/sF/|G/H/I/X/Y/Z0[0 \0]0,^0wb0c1d2!e2&f2)l2+u2<v2Tw2x3y3,z3t3333Clibfido2-11.13.0150400.5.6.1FIDO U2F and FIDO 2.0 protocolsThis library supports the FIDO U2F and FIDO 2.0 protocols for communicating with a USB authenticator via the Client-to-Authenticator Protocol (CTAP 1 and 2).dJs390zp36]SUSE Linux Enterprise 15SUSE LLC BSD-2-Clausehttps://www.suse.com/Development/Libraries/C and C++https://developers.yubico.com/linuxs390x@QA큤A큤dJdJdJc-dJc-96846af23e2b10ea0212c08b83ebfdd232568a26386a229980d4b5a6fba1ab4a63e265c0fcb92d60b812319bc503338068722c8837746e76097b050d1d3da0c281f1393cb2500690e04cde6b62adbf3aaff8f64b707c462b777ce309565aadcalibfido2.so.1.13.0rootrootrootrootrootrootrootrootrootrootrootrootlibfido2-1.13.0-150400.5.6.1.src.rpmlibfido2libfido2-1libfido2-1(s390-64)libfido2.so.1()(64bit)@@@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfigld64.so.1()(64bit)ld64.so.1(GLIBC_2.3)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.8)(64bit)libcbor.so.0()(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libhidapi-hidraw.so.0()(64bit)libudev.so.1()(64bit)libudev.so.1(LIBUDEV_183)(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3d8cc=qbA@aaaI@a@`z`@_@_X_N7_@^^@^˳@^[]]y@\"\ \\N\|\5@[ @[ @[[[+@[ Z@meissner@suse.commartin.sirringhaus@suse.comsimmphonie@opensuse.orgsimmphonie@opensuse.orgguillaume.gardet@opensuse.orgsimmphonie@opensuse.orgpaolo.perego@suse.compaolo.perego@suse.comrpm@fthiessen.dempluskal@suse.comhpj@suse.comidonmez@suse.comidonmez@suse.comstefan.bruens@rwth-aachen.deidonmez@suse.comidonmez@suse.comidonmez@suse.commrueckert@suse.dekbabioch@suse.desimmphonie@opensuse.orgkbabioch@suse.dejengelh@inai.dekbabioch@suse.dekbabioch@suse.dekbabioch@suse.dekbabioch@suse.dekbabioch@suse.comkbabioch@suse.comt.gruner@katodev.dejengelh@inai.det.gruner@katodev.det.gruner@katodev.det.gruner@katodev.de- Use openssl 1.1 still on SLES 15 SP4 to avoid pulling unnecessary openssl-3 dependency. jsc#PED-4521- Version 1.13.0 (2023-02-20) * Support for linking against OpenSSL on Windows; gh#668. * New API calls: + fido_assert_empty_allow_list; + fido_cred_empty_exclude_list. * fido2-token: fix issue when listing large blobs. * Improved support for different fuzzing engines.- Version 1.12.0 (2022-09-22) * Support for COSE_ES384. * Support for hidraw(4) on FreeBSD; gh#597. * Improved support for FIDO 2.1 authenticators. * New API calls: + es384_pk_free; + es384_pk_from_EC_KEY; + es384_pk_from_EVP_PKEY; + es384_pk_from_ptr; + es384_pk_new; + es384_pk_to_EVP_PKEY; + fido_cbor_info_certs_len; + fido_cbor_info_certs_name_ptr; + fido_cbor_info_certs_value_ptr; + fido_cbor_info_maxrpid_minpinlen; + fido_cbor_info_minpinlen; + fido_cbor_info_new_pin_required; + fido_cbor_info_rk_remaining; + fido_cbor_info_uv_attempts; + fido_cbor_info_uv_modality. * Documentation and reliability fixes. - Version 1.11.0 (2022-05-03) * Experimental PCSC support; enable with -DUSE_PCSC. * Improved OpenSSL 3.0 compatibility. * Use RFC1951 raw deflate to compress CTAP 2.1 largeBlobs. * winhello: advertise "uv" instead of "clientPin". * winhello: support hmac-secret in fido_dev_get_assert(). * New API calls: + fido_cbor_info_maxlargeblob. * Documentation and reliability fixes. * Separate build and regress targets.- Version 1.10.0 (2022-01-17) * hid_osx: handle devices with paths > 511 bytes; gh#462. * bio: fix CTAP2 canonical CBOR encoding in fido_bio_dev_enroll_*(); gh#480. * winhello: fallback to GetTopWindow() if GetForegroundWindow() fails. * winhello: fallback to hid_win.c if webauthn.dll isn’t available. * New API calls: - fido_dev_info_set; - fido_dev_io_handle; - fido_dev_new_with_info; - fido_dev_open_with_info. * Cygwin and NetBSD build fixes. * Documentation and reliability fixes. * Support for TPM 2.0 attestation of COSE_ES256 credentials.- Use BuildRequires: openssl-devel instead of forcing 1.1 since 3.x is now supported.- Version 1.9.0 (2021-10-27) * Enabled NFC support on Linux. * Added OpenSSL 3.0 compatibility. * Removed OpenSSL 1.0 compatibility. * Support for FIDO 2.1 "minPinLength" extension. * Support for COSE_EDDSA, COSE_ES256, and COSE_RS1 attestation. * Support for TPM 2.0 attestation. * Support for device timeouts; see fido_dev_set_timeout(). * New API calls: - es256_pk_from_EVP_PKEY; - fido_cred_attstmt_len; - fido_cred_attstmt_ptr; - fido_cred_pin_minlen; - fido_cred_set_attstmt; - fido_cred_set_pin_minlen; - fido_dev_set_pin_minlen_rpid; - fido_dev_set_timeout; - rs256_pk_from_EVP_PKEY. * Reliability and portability fixes. * Better handling of HID devices without identification strings; gh#381. * Fixed detection of Windows’s native webauthn API; gh#382.- Removed fix-cmake-linking.patch because no longer needed- Update to version 1.8.0: * Dropped 'Requires.private' entry from pkg-config file. * Better support for FIDO 2.1 authenticators. * Support for Windows's native webauthn API. * Support for attestation format 'none'. * New API calls: - fido_assert_set_clientdata; - fido_cbor_info_algorithm_cose; - fido_cbor_info_algorithm_count; - fido_cbor_info_algorithm_type; - fido_cbor_info_transports_len; - fido_cbor_info_transports_ptr; - fido_cred_set_clientdata; - fido_cred_set_id; - fido_credman_set_dev_rk; - fido_dev_is_winhello. * fido2-token: new -Sc option to update a resident credential. * Documentation and reliability fixes. * HID access serialisation on Linux. - disable fix-cmake-linking.patch, not needed currently- Update to version 1.7.0: * hid_win: detect devices with vendor or product IDs > 0x7fff * Support for FIDO 2.1 authenticator configuration. * Support for FIDO 2.1 UV token permissions. * Support for FIDO 2.1 "credBlobs" and "largeBlobs" extensions. * New API calls * New fido_init flag to disable fido_dev_open’s U2F fallback * Experimental NFC support on Linux. - Enabled hidapi again, issues related to hidapi are fixed upstream * Added fix-cmake-linking.patch to fix linking- Update to version 1.6.0: * Fix OpenSSL 1.0 and Cygwin builds. * hid_linux: fix build on 32-bit systems. * hid_osx: allow reads from spawned threads. * Documentation and reliability fixes. * New API calls: + fido_cred_authdata_raw_len; + fido_cred_authdata_raw_ptr; + fido_cred_sigcount; + fido_dev_get_uv_retry_count; + fido_dev_supports_credman. * Hardened Windows build. * Native FreeBSD and NetBSD support. * Use CTAP2 canonical CBOR when combining hmac-secret and credProtect. - Drop 7a17a4e9127fb6df6278f19396760e7d60a5862c.patch - Do not build examples as their build fails- Add Conflicts: to supersede version 1.0.0. This is needed for a clean upgrade path on SLE.- Add 7a17a4e9127fb6df6278f19396760e7d60a5862c.patch from upstream to fix 32bit compilation issues.- Update to version 1.5.0 * hid_linux: return FIDO_OK if no devices are found. * hid_osx: + repair communication with U2F tokens, gh#166; + reliability fixes. * fido2-{assert,cred}: new options to explicitly toggle UP, UV. * Support for configurable report lengths. * New API calls: + fido_cbor_info_maxcredcntlst + fido_cbor_info_maxcredidlen + fido_cred_aaguid_len + fido_cred_aaguid_ptr + fido_dev_get_touch_begin + fido_dev_get_touch_status * Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. * Allow CTAP messages up to 2048 bytes; gh#171. * Ensure we only list USB devices by default.- Cleanup udev rules, trying to use the Debian specific plugdev group fills up the journal. - Make the udev rules package noarch, correct Summary- Create a udev subpackage and ship the udev rule- Don't build with hidapi support to fix issues with Yubikey 5Ci https://github.com/Yubico/libfido2/issues/190- Update to version 1.4.0 * hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. * Fall back to U2F if the key claims to, but does not support FIDO2. * FIDO2 credential protection (credprot) support. * New API calls: + fido_cbor_info_fwversion; + fido_cred_prot; + fido_cred_set_prot; + fido_dev_set_transport_functions; + fido_set_log_handler. * Fixed EdDSA and RSA self-attestation.- Version 1.3.1 - fix zero-ing of le1 and le2 when talking to a U2F device. - dropping sk-libfido2 middleware, please find it in the openssh tree.- Version 1.3.0 (2019-11-28) * assert/hmac: encode public key as per spec, gh#60. * fido2-cred: fix creation of resident keys. * fido2-{assert,cred}: support for hmac-secret extension. * hid_osx: detect device removal, gh#56. * hid_osx: fix device detection in MacOS Catalina. * New API calls: - fido_assert_set_authdata_raw; - fido_assert_sigcount; - fido_cred_set_authdata_raw; - fido_dev_cancel. * Middleware library for use by OpenSSH. * Support for biometric enrollment. * Support for OpenBSD. * Support for self-attestation.- Version 1.2.0 (released 2019-07-26) * Credential management support. * New API reflecting FIDO’s 3-state booleans (true, false, absent): - fido_assert_set_up; - fido_assert_set_uv; - fido_cred_set_rk; - fido_cred_set_uv. * Command-line tools for Windows. * Documentation and reliability fixes. * fido_{assert,cred}_set_options() are now marked as deprecated.- Version 1.1.0 (released 2019-05-08) * EdDSA (Ed25519) support. * fido_dev_make_cred: fix order of CBOR map keys. * fido_dev_get_assert: plug memory leak when operating on U2F devices.- Use automatic dependency discovery for libfido2-utils -> libfido2-1_0-0.- Added Conflicts to libfido2-0_4_0 to make sure upgrade goes smoothly as outline in sr#690566- Split utilities into sub-package libfido2-utils and package man pages correctly (bsc#1131163)- Version 1.0.0 (released 2019-03-21) * Native HID support on Linux, MacOS, and Windows. * fido2-{assert,cred}: new -u option to force U2F on dual authenticators. * fido2-assert: support for multiple resident keys with the same RP. * Strict checks for CTAP2 compliance on received CBOR payloads. * Better fuzzing harnesses. * Documentation and reliability fixes.- Version 0.4.0 (released 2019-01-07) * fido2-assert: print the user id for resident credentials. * Fix encoding of COSE algorithms when making a credential. * Rework purpose of fido_cred_set_type; no ABI change. * Minor documentation and code fixes. - Dropped patch that is included upstream now: fix-release-build.patch- Added patch: * fix-release-build.patch: Disables regression tests as proposed by upstream- Applied spec-cleaner- Build package without regression tests - Version 0.3.0 (released 2018-09-11) - Various reliability fixes. - Merged fuzzing instrumentation. - Added regress tests. - Added support for FIDO 2’s hmac-secret extension. - New API calls: * fido_assert_hmac_secret_len; * fido_assert_hmac_secret_ptr; * fido_assert_set_extensions; * fido_assert_set_hmac_salt; * fido_cred_set_extensions; * fido_dev_force_fido2. - Support for native builds with Microsoft Visual Studio 17.- Fix RPM group. Wrap description.- Version 0.2.0 (released 2018-06-20) - Added command-line tools. - Added a couple of missing get functions. - Version 0.1.1 (released 2018-06-05) - Added documentation. - Added OpenSSL 1.0 support. - Minor fixes.- update to version 0.1.0- Initial release version 0_git/sbin/ldconfig/sbin/ldconfiglibfido2s390zp36 16896682371.13.01.13.0-150400.5.6.11.13.0-150400.5.6.11.13.0libfido2.so.1libfido2.so.1.13.0libfido2-1README.adoclibfido2-1LICENSE/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libfido2-1//usr/share/licenses//usr/share/licenses/libfido2-1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:29838/SUSE_SLE-15-SP4_Update/42ca331cf489504e653ba09288e18023-libfido2.SUSE_SLE-15-SP4_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=0e8655b4e3e4613f7122085564d838798a81984d, strippeddirectoryASCII textPRRRR R RRRRR R R RRRRR3MHeP%utf-88bb34e0f225eb0754a547c38961d60710cd9430ca276fd3288a1b24504e908db?7zXZ !t/A.]"k%]du QaRr;╋[$G%mp{7isLS2g480" }2F>~`ޫ0Oi5nOQuk&LX<= &u[:TdLRTS"1δ£~c}#3y=5idQ$Ѿk:?3A01UFvZ׷7?"4&K('~nGU6 ֋,!(&2Ѧ,5`FQW.ZOˢdiMs]- |PN=Rh?'1v?-!-VG/ ޴-S\eR^(޴vRaFl(ٖ^K M:߶a: i.@&~n4UDɿI2w JED9=#֓I-al+y&+iє=^&pfR{)ի\G20]M }p;IK˙V 1#RȲJ5%RO@^$ P.#]:M;$*@e.9hòQu YpC/`aoqg4T7 Z@P6[;W=e˔nGvt CmII ne{o'h?)u b7(5jRE_p|Twm~A\g"Ag3b*uy\n%&zxbw]@Sv^; Ȇ@.)UWGώ䱩މ/(v7Pg26 "𑅨AIWr iQBcU;8Kj#졇8G#%s!עӀktD,l:ils-o ڦ |C)T"1`P˯`~S?W!iVkch|~@Z"(Q[PpEiQ!'OvS9$SŌDJ+laد4([01TZ!YIc=dvBkT7Ao4U0Iv pԷuW.H b_%튛h5Zͮ v.$ZZ뇤(\ͮbZsvsu,|rx3Σ>v'JD?>"޼|>>ժڑvBXSZ 3ȓh*\}5Vx%OK=.n'8vB:eDZlqA%&>ϙ&ڳHՖGFvaSXD ;pVs /Lڦ>IdOm?wT:@C#paX1: K_W7*Hk"蚁~#  /I٘}i*9fs'mF-9cx{T"7'Tay٘T&>H2[vl{1Bm/<'gsƸX-eh spOX'D4c6g' "9M'[hmӄ>jcҦ LE*WH8L:J%4ڪrMM\I)3އ Tp/"CtwJΘɠ^阖9읫[!,6͎)lo4,LM7aQ"DW[A6ŔB7X(Lyo:GFxG"HڦaŒ(3ШAgfhȮp BzQy+:y*=g9qtƷ:@=ΒNQYo$&l,ބ`r\3¶:; o5M!2] It['wLwo`B`%-˶e1rh]F8]6^cvZ5(@-Ulh9:ܓqʹ 0Lz / +d̔nh8ڄa(ƒ\#^se*]aZbk( 7)l‡ Ihr㟳 =:ɜg[kH,1K%/H^|gM֛p$B#P8YnmFJި^F hEi3R<2J.1Pf]BhǪL^g&dÞ+&qXЇp[$G/R͞1@?"LNT6"z~/[ aKhvre) 6Syi"p*j(·z ẢR<UhIƻ=ҧعay@Y1\p}=qjׂ/m"|RbclY~0fGh) zdjۀZ0Q첒c;fSݤ.]v)PS-'ɜuy&3CsQ?0 HV裋%."d"Kf4iV ү5d W˧,Jq5EJr'oaMM7W)G!峫`dRMkZ2H"@3û;EY4@[fzy rX֖?&ḇT2^G(XJ`_.z똘e?f!m)Jy.R##WI4N^5io/mDb)^6z,3'Ouپhu:Vr]?ݹΤ̍fmF%D\ΪN}摴;x| 6S0UӾ0;A2bQt|߽fSvNmJ1 湜W\bȳ^دd?'Ѿ<i#iȚ nXUshĻxVQԌXOp"H{GJ_MҮ/;u#)0 r =T!l7S֞$p5} !*7?rf!yS?M{TŁZxS>+w4%) |~.HM;ip6!]Ы\0$}b8i~xy(1A8B凌ͮ8)ǔm++jOh4ѣZcW׋ĉ& ;8 .z)^෮/:X>f0"8riQAwcIc*:WDC=GÏt`t8?4 F rwBT.G+D;o9]> @Y_&b 0."2*MS80O` 2UؚmYMcǁ(tR}O]EIF_ԾubZP0!)*A6H^/1Pd J z(fP@ѐf/y&|)# ^@{"pg|N2^UgM{6,3ځj툂/m]6 =j?ͯg!ɼIJ5ڤ#+HDg@2Vx)X6b@"Ft?; -ūv U911+(an\yRț,Uc84 :d߽J<>'Bj{ P>xFX̵2bKjLfX3f'Q$c{](H~&er<{n9_xl(`z-['$)/ /A_?yˎ}' /86?3ʢoW exDLydkoKndݰi'`CL:T7RM2˙3ˍ)la|$FI쥐5 Au.cʑa<5cM5@QV;Ua#TNLUPI-+Yn pzs:EJ,zG6ww"&IPA)T^31fkE;& @WJH3T 0IN[5CK_'5I%Kl %!59 v攓#_aɒϽ&!)Ob d<9$ejko%O=-7ZvnqJ]&*%xY!zײՓ:K|~?%w'] \Ǽv@w+κ,M텒ޅ.϶ DB|5kF9NAFrɼ |9vob iNP1Нn0U0pO܏3~?w7e$o&'g($sgf%dbQM8HVk>#ܵE-DLet982 =Ԡ\@=~;fQ &YrӪ֔2DeRɚe)tcx>g ,$R@{TDXF2}QT4 PZ Hf5Շ%4^bF7w,V(*=60`f(aпRO)¤癀f *&AK_Eypb{Q@`bb7v3F(3r5z.o&O&2eo1iĂ& w)Zz1ѶA1妴{ Q"TmIzt1W 9 Z?`ȳYE|[ N֍-D!&k\4J~%Q{m;X"ؼB +eIPC hQnrS0ԝ2Bn3+4gPK.׋G5$8CڡX(mkle`pSJ_=#:t$tb\H,>Bx0Y\`{SrB杣G3(_εgkv|muڏRUJK0Dž"y~f3YiǟBrm&Ǭ9RYVpvR18ɸajYc~eqxzUoo,هވ8PCDA' n.cE[M@/,;ݭ7C̰1e.~<-$b}K:+pKT+8ɼ< V2 hh^C0+{HI&|\hL&8kKS^lpb nV!OZ3Ts ^S_^:[gz#-@f@g ~؃&Jd︱ވŅXƐ_l/W`{jI4Qb#zg"%݁~tS':$D[L@KݹqO[ 7*%&ׁjx:khi̍H{1@"[sfR_Rƿ-v*JJip|`w~ʞ9wq]s-^d"-xt%CU%w8[ 5B\f= -΋Z(];i.kx Ρ6Q*$Yt%w.W ^w('ImhP^j6{7-H24-H`MsR_.pTEmeaB'JJs`#4FGF$T2=bux02(kOlFA hzv&SyRR3} \s_@E[o8vډZOִD[]7B5~yO#5:M54d#@zrmJSpqz435z+ n֗M ƅ]"p̏Y)Q.55I.FIk!$EM(NY2- =Bsk2{&'f2ƒ'K䬧4}u_a jr:[Õ[W94ʾךLIÛ*_]S^zӈH]s$:t-0E#^pWgAbb)py+/zk);fG3|)!"5Lک'/=HjyqNg&iΒ{ ?{KGdjt.eF}dqٱ5tM5)6b mq(z} z%xHE%,D qcv:$5L]2%轵͊/Qzg rx E9b)0Zənx嫄 ShGnj?+we}"E$d8ݬ/ok% PAa 9o[I".rt^͓Xx#A v6;7fA Bi3-Lk4vs~ .H2dz -o28DΈG̫DPR,T6s9{f]%U,V%wdt^|P-¢Ğ0jdW(m$s4ݎ^ 8$?${9t4;%enmQEY@4F9eA%˩U+}ji>a|[!`'Cȅ(Ȭr#*Ou%1mKʹJ?s'0'x3pw&`V~&rVԺ_ F"?s N54Lh>5MzߪGA _=!->~:NlPPG0~pf2s7+7C(Lk{%rSKC#5˨+*hP]tD!E,ui')roUCکwp|.6 pV6/>-,†@CzO8Sthf5&-hL.vi2쩠[?} c PYyZF&i"/}S{$@b1AFȼ+KMC.:!N@YM'^ ]tҹ2fDRPyFЊz@I w(`q#00宋AhU)vE5ഐ-Y$HW=#7;#ڵ| ΅۹W{ܨRR N:K+53%M_p\:u>>'Zƹݿ 47&clFˬzƩS+?7e`p^b_fVJ)g^{8 vSRqD%$'v 63H_-ch[G]* ,NVg=bHpνdWKϽZ)K9H41~YpT_3Y%t^Q>4u[v-yZ3MnӒXc 6s(JmBB9+p3*$.'nw4A' މ+(/q'JFRjSvq`8f&hZ%93t\i]'8rVXv6of-k PE5_L-et•Z-`1ibI*#Lz&}7b5= 'L\B鉈' /뎫74oKwז-iMtN!?gHǥTEv'9)zzAA)p%u6>|ES®ǦjN9s4/Rs%+g?IO͚9J]ՕR EtoYO (ƛg|'Io\IL*{쏷GӘ4PĴէw>$oHgG|Nf$2">ceIO0>FP*r<bC@_2+yڴK඲,ʐ5?),gOUХp3"iYw|&pu-.p>h="F,~SDUT hbw2]˵ӹ".|_11?o*<&g >/1C}HNbütuSLsM &'ڵ%#n'@Xqc44< IQ"T}ϻ_,oQ54@S0N W+չKX)B,̬@iױfz<00 E4:ۼhgJ1ԙAդ^P40Eh{f!Mv Ac5=KZߍT- 2@XJ 93zL~L1uMқs9@#|EP)u»;7 Z%o9,J̇mb5_MWJ48d{G]Rڃڠg?Y-9;fưsO'O;?8XmuF5:lVwc>YLBsxNBv4*{C'-؊#ErY[ƍz $Ǒ+?D:!:g dE~Bz&nkvu!^bc)))*EĈd's $FJ9d\w+Ŷ YZ