php7-tidy-7.2.5-lp151.6.28.1 4>$  Ap^?/=„jdf;jT 2l.ʅӹC<./vH l֘DuM{Y[Y^̒S8ޞ/7\o48)8pdɤZåWC$;q#Op?69yK5 mVzs$L{(;w+XJ86Hƭ72%SN4LI^q?H/<+<, #[³0Z+?u9 d1fadcffa4c9673a2f9d92908241bae71254c9cb3d015a219d168bcdf207c60e681e3a8117d752cac4d19a65cf557b1f7bfd7a3a^?/=„r--|Biw1皇 'a==ѫu48  ZxV}.m}\stz 7j )lvt Q(֚x. ZW'R3!@b7۱5уg4낰~g9D:-p+,:1 k]}Iظ_K .`$6 "|AA<5s)3(("_7N|w >rZvdh̀1u#E&`=>i1'ȇ ( O>pAOP?O@d   FLPX\ox     r t|   ((809P: BKFKGKHLIL XLYL ZL`[Ld\Lh]Lp^LbLcMkdMeMfNlNuNvNwNxNyNzNNNNO<Cphp7-tidy7.2.5lp151.6.28.1PHP7 binding for the Tidy HTML cleanerTidy is an extension based on Libtidy (http://tidy.sourceforge.net) and allows a PHP developer to clean, repair, and traverse HTML, XHTML, and XML documents -- including ones with embedded scripting languages such as PHP or ASP within them using OO constructs.^?'goat09'openSUSE Leap 15.1openSUSEPHP-3.01http://bugs.opensuse.orgDevelopment/Libraries/PHPhttps://secure.php.netlinuxi586K܁^?^?6fbc01d5acbc7a5c2077a6a30cd68b26ecd6c9fc1c4fccd8b8f0aca8421866717254ac84156289df220fce4b3f72bd70a6ddaaef96c73c52b9778c8485b366ddrootrootrootrootphp7-7.2.5-lp151.6.28.1.src.rpmconfig(php7-tidy)php-tidyphp7-tidyphp7-tidy(x86-32)@@@@@    config(php7-tidy)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.4)libtidy.so.5php7rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)7.2.5-lp151.6.28.17.2.53.0.4-14.6.0-14.0-15.2-14.14.1^˳@^k@^\@^:@^ @]]4@]@]@]^]@\\@\@\+@\\M\~d\2\U@[:@[@[9@[[e@[2*ZZ4@ZZ?Z@Z؄ZԐ@Zľ@ZZZZZw@ZZZZ@Z@Zz@Zk@Zg#ZTZKt@Z3@Z.s@Z@Y@YY@Yχ@Y˒Y˒Y@Y@@YKY@YYV@YYx@YqYlYlYZ1Y:YX @XXX@X@X@XAXN@XN@X%X X@Wڍ@WW@W9Wk@WgWL+@W!@WWKW@VbVn@V'@V&@V=@VT@VVwVn@Vn@VhVetVRVI@VI@UUUU@U@UUUUq@UY@U:0@U4@U%@U/@UQUQU T@Tء@Tи@T,@TT|T@Tk4TN3T=@pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comPetr Gajdos pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comMartin Pluskal Petr Gajdos Petr Gajdos Petr Gajdos pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comidonmez@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comguillaume.gardet@opensuse.orgpgajdos@suse.comdimstar@opensuse.orgpgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.combluemer.mark@gmail.compgajdos@suse.compgajdos@suse.comjengelh@inai.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comjweberhofer@weberhofer.atilya@ilya.pp.uapgajdos@suse.comjweberhofer@weberhofer.atilya@ilya.pp.uailya@ilya.pp.uapgajdos@suse.compgajdos@suse.compgajdos@suse.comtchvatal@suse.compgajdos@suse.com13ilya@gmail.com13ilya@gmail.com13ilya@gmail.comkukuk@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comfbui@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comschwab@linux-m68k.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comjimmy@boombatower.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comjimmy@boombatower.compgajdos@suse.comjimmy@boombatower.comjimmy@boombatower.compgajdos@suse.compgajdos@suse.comaj@ajaissle.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.commrueckert@suse.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.com- security update - added patches fix CVE-2019-11048 [bsc#1171999], supplying overly long filenames or field names if HTTP file uploads are allowed could lead to exhausting disk space on the server + php7-CVE-2019-11048.patch- security update - added patches fix CVE-2020-7064 [bsc#1168326], read one byte of uninitialized memory via malicious data + php7-CVE-2020-7064.patch fix CVE-2020-7066 [bsc#1168352], URL truncation if the URL contains zero (\0) character + php7-CVE-2020-7066.patch- security update - added patches fix CVE-2020-7062 [bsc#1165280], null pointer dereference when using file upload functionality under specific circumstances + php7-CVE-2020-7062.patch fix CVE-2020-7063 [bsc#1165289], creating PHAR archive using PharData:buildFromIterator() function will add files with default permissions + php7-CVE-2020-7063.patch- security update - added patches CVE-2020-7059 [bsc#1162629] + php7-CVE-2020-7059.patch CVE-2020-7060 [bsc#1162632] + php7-CVE-2020-7060.patch- security update - added patches CVE-2019-11045 [bsc#1159923] + php7-CVE-2019-11045.patch CVE-2019-11046 [bsc#1159924] + php7-CVE-2019-11046.patch CVE-2019-11047 [bsc#1159922] + php7-CVE-2019-11047.patch CVE-2019-11050 [bsc#1159927] + php7-CVE-2019-11050.patch- security update - added patches CVE-2019-11043 [bsc#1154999] + php7-CVE-2019-11043.patch- provide test results via multibuild :test [bsc#1119396] - added sources + _multibuild- drop -n from php invocation from pecl [bsc#1151793] https://github.com/pear/pear-core/commit/f94454a74785865cec50bf9d64c410efc29b587a- turn off run of testsuite as we get Kernel panic on s390x- security update - added patches CVE-2019-11041 [bsc#1146360] + php7-CVE-2019-11041.patch CVE-2019-11042 [bsc#1145095] + php7-CVE-2019-11042.patch- security update - added patches CVE-2019-11039 [bsc#1138173] + php-CVE-2019-11039.patch CVE-2019-11040 [bsc#1138172] + php-CVE-2019-11040.patch- security update - added patches CVE-2019-11036 [bsc#1134322] + php-CVE-2019-11036.patch- security update - added patches CVE-2019-11034 [bsc#1132838] + php-CVE-2019-11034.patch CVE-2019-11035 [bsc#1132837] + php-CVE-2019-11035.patch- security update - added patches CVE-2019-9637 [bsc#1128892] + php-CVE-2019-9637.patch CVE-2019-9675 [bsc#1128886] + php-CVE-2019-9675.patch CVE-2019-9638 [bsc#1128889], CVE-2019-9639 [bsc#1128887] + php-CVE-2019-9638,9639.patch CVE-2019-9640 [bsc#1128883] + php-CVE-2019-9640.patch- upstream bug #41631 is already fixed [bsc#1129032] - deleted sources - README.default_socket_timeout (not needed)- security update * CVE-2019-9024 [bsc#1126821] + php-CVE-2019-9024.patch * CVE-2019-9020 [bsc#1126711] + php-CVE-2019-9020.patch * CVE-2018-20783 [bsc#1127122] + php-CVE-2018-20783.patch * CVE-2019-9021 [bsc#1126713] + php-CVE-2019-9021.patch * CVE-2019-9022 [bsc#1126827] + php-CVE-2019-9022.patch * CVE-2019-9023 [bsc#1126823] + php-CVE-2019-9023.patch * CVE-2019-9641 [bsc#1128722] + php-CVE-2019-9641.patch- asan_build: build ASAN included - debug_build: build more suitable for debugging- Enable testsuite during build time and save log to subpackage   testresults (boo#1119396)- add security patch of imap extension, which is currently disabled * CVE-2018-19935 [bsc#1118832] + php-CVE-2018-19935.patch- security update * CVE-2018-17082 [bsc#1108753] + php-CVE-2018-17082.patch- reenable php7-dba support of Berkeley DB [bsc#1108554]- align patch names: php7-CVE-2018-14851.patch -> php-CVE-2018-14851.patch php7-CVE-2017-9120.patch -> php-CVE-2017-9120.patch php7-CVE-2018-1000222.patch -> php-CVE-2018-1000222.patch- security update: * CVE-2018-1000222 [bsc#1105434] + php-CVE-2018-1000222.patch- security update * CVE-2018-14851 [bsc#1103659] + php-CVE-2018-14851.patch * CVE-2017-9120 [bsc#1103661] + php-CVE-2017-9120.patch- security update * CVE-2018-12882 [bsc#1099098] + php-CVE-2018-12882.patch- main package requires wwwrun:www user [bsc#1093025]- better workaround for [bsc#1089487]: build mod_phpN.so instead of libphpN.so- rename freetype-pkgconfig.patch to php7-freetype-pkgconfig.patch to align with the rest of patch names- Add freetype-pkgconfig.patch to fix build with new Freetype: use pkg-config to find Freetype libraries- updated to 7.2.5: This is a security release which also contains several minor bug fixes. http://php.net/ChangeLog-7.php#7.2.5- build-test.sh: generic spec file name- apache2-mod_php7 does not provide libphp7.so [bsc#1089487]- updated to 7.2.4: This is a security release with also contains several minor bug fixes. http://php.net/ChangeLog-7.php#7.2.4 - php7-no-build-date.patch refreshed- build firebird extension only for openSUSE (sle15 requirement)- Fix build for %arm and aarch64- drop imap extension [bsc#1084461]- BuildRequire pkgconfig(enchant) instead of enchant-devel: enchant is moving to version 2.2, with an enchant-1 as compatibility package. By using the pkgconfig symbol, we don't have to care for the actual package name.- updated to 7.2.3: This is a security release with also contains several minor bug fixes. http://php.net/ChangeLog-7.php#7.2.3 - removed upstreamed php7-pgsql-memory-leak.patch - php7-systzdata-v15.patch refreshed and renamed to php7-systzdata-v16.patch- php7-honor-re2c-flags.patch: honor RE2C_FLAGS everywhere. - remove generated lexers so they are recreated at build time- php7-date-regenerate-lexers.patch: honor RE2C_FLAGS- Support password_hash("...", PASSWORD_ARGON2I), buildrequire libargon2 in supported products.- Remove buildRequires on: * libevent-devel: php7-fpm does not use it. * pam-devel: not used - Add buildrequire on zlib-devel explicitly. - libvpx is not needed but libwebp is, only when not building against system gd. xft likewise.- fixed memory leak in pgsql extension, php function pg_escape_bytea https://bugs.php.net/bug.php?id=75838 [bsc#1076970] (internal) + php7-pgsql-memory-leak.patch- updated to 7.2.2: This is a bugfix release, with several bug fixes included. http://php.net/ChangeLog-7.php#7.2.2- do not build against system gd when suse_version < 1500- fix build for SLE12*- updated to 7.2.1: Several security bugs were fixed in this release. http://php.net/ChangeLog-7.php#7.2.1- build against newer webp [bsc#1074121]- build with SLE12*- updated to 7.2.0: features and improvements: * Convert numeric keys in object/array casts * Counting of non-countable objects * Object typehint * HashContext as Object * Argon2 in password hash * Improve TLS constants to sane values * Mcrypt extension removed * New sodium extension - patches: . php7-systzdata-v14.patch transformed to php7-systzdata-v15.patch . removed upstreamed php7-aarch64-mult.patch- updated to 7.1.12: This is a bugfix release, with several bug fixes included.- Add php-cli as provides to php7- updated to 7.1.11: This is a bugfix release, with several bug fixes included.- fixed installation of wrong cli [bsc#1061555]- Update not-so-useful repeated package summaries. Update the descriptions to have a bit more explanation. Replace old tar syntax.- build and ship embed SAPI + php7-embed.patch- updated to 7.1.10: Several bugs have been fixed, see https://secure.php.net/ChangeLog-7.php for details- aarch64-mult.patch renamed to php7-aarch64-mult.patch- php7-devel requires php7-pear [bsc#1057104]- Changes related to boo#1056822 - New packaging macros in macros.php: %php_pearxmldir, %pear_phpdir, %pear_phpdir, %pear_testdir, %pear_datadir, %pear_cfgdir, %pear_wwwdir, %pear_metadir, %pecl_phpdir, %pecl_docdir, %pecl_testdir, %pecl_datadir - Updated packaging documentation in README.macros- Updated to 7.1.9: Several bugs have been fixed. * ChangeLog https://secure.php.net/ChangeLog-7.php#7.1.9- added /usr/bin/php7 [bsc#734176]- php7-pear should explicitly require php7-pear-Archive_Tar otherwise this dependency must be declared in every php7-pear-* package explicitly. [bnc#1052389]- Updated to 7.1.8: Several bugs have been fixed. * ChangeLog https://secure.php.net/ChangeLog-7.php#7.1.8- Replace %__-type macro indirections.- date extension: regenerate lexers when needed + php7-date-regenerate-lexers.patch- dropped mcrypt extension [fate#323673]- updated to 7.1.7: This is a security release with several bug fixes included.- Drop sle11 support as we are not building against it anymore - Remove php7-BNC-457056.patch that was applied on sle11 only - Remove dependency on imap-devel, it is not used - Switch spell from aspell to enchant, dropping pspell subpackage - Remove unknown switch options from php cli build - Drop support for berkleydb format, by default there are more supported solutions built in php - Use %configure macro in the build phases- updated to 7.1.6: Several bugs have been fixed.- Updated to 7.1.5: Several bugs have been fixed. * ChangeLog https://secure.php.net/ChangeLog-7.php#7.1.5- Updated to 7.1.4: Several bugs have been fixed. * ChangeLog https://secure.php.net/ChangeLog-7.php#7.1.4- Updated to 7.1.3: Several bugs have been fixed. * ChangeLog https://secure.php.net/ChangeLog-7.php#7.1.3- Don't install the init script if we use systemd- updated to 7.1.2: Several bugs have been fixed. - deleted php7-getrandom-test.patch, upstreamed- updated to 7.1.1: This release is the first point release in the 7.x series. PHP 7.1 comes with numerous improvements and new features such as * Nullable types * Void return type * Iterable pseudo-type * Class constant visiblity modifiers * Square bracket syntax for list() and the ability to specify keys in list() * Catching multiple exceptions types * Many more features and changes… - migration: http://php.net/manual/en/migration71.php - php7-systzdata-v13.patch replaced by php7-systzdata-v14.patch- suggest php7-* instead of php-* [bsc#1022158c#4] - do not suggest php-suhosin at all as we do not build it (not ported to php7 yet)- updated to 7.0.15: Several security bugs were fixed in this release.- Replace pkgconfig(libsystemd-*) with pkgconfig(libsystemd) Nowadays pkgconfig(libsystemd) replaces all libsystemd-* libs, which are obsolete.- updated to 7.0.14: Several security bugs were fixed in this release.- updated to 7.0.13: This is a security release. Several security bugs were fixed in this release.- adjust firebird dependency- updated to 7.0.12: This is a security release. Several security bugs were fixed in this release.- updated to 7.0.11: Several security bugs were fixed in this release.- php7-getrandom-test.patch: Fix incorrect test for the getrandom syscall.- updated to 7.0.10: Several security bugs were fixed in this release.- updated to 7.0.9: Several security bugs were fixed in this release, including the HTTP_PROXY issue.- updated to 7.0.8: This is a security release. Several security bugs were fixed in this release. - removed: php7-mbstring-missing-return.patch (upstreamed)- systemd unit: remove syslog.target from After [bsc#983938]- updated to 7.0.7: This is a security release. Several security bugs were fixed in this release.- updated to 7.0.6: This is a security release. Several security bugs were fixed in this release. * removed upstreamed php7-no-reentrant-crypt.patch- aarch64-mult.patch: fix asm constraints in aarch64 multiply macro- build for sle12- correct public key- updated to 7.0.5- firebird builds now- update to 7.0.4- updated to 7.0.3- require postgresql-devel < 9.4 for sle12 to fix build- more versioned provides- update to 7.0.2: 31 reported bugs has been fixed, including 6 security related issues.- update to 7.0.1- php5-pear-Archive_Tar provides 1.4.0 - install .depdb and .depdblock files along metadata * php5-depdb-path.patch - versioned provides in subpackages- Provide obsoletes for sub-packages to improve upgrade process.- Obsolete php5 since php7 conflicts and should replace.- marcello at ceschia.de: fix path php-fpm.conf- set pear's metadata dir to %{peardir}- Spec cleanup * Split Archive_Tar from -pear sub packge to allow updating this part via rpm * Added "Provides: php-firebird" to -firebird sub package * Added "Provides: mod_php_any" to server api module packages - fastcgi and -fpm- test mod_php with %apache_test_module_curl - restart apache during mod_php upgrade- add php5-fix_net-snmp_disable_MD5.patch [bnc#944302]- fixed segfault in odbc extension when result set is containing NULL (php bugs #52554, #53007) [bnc#935074] (internal) + php7-odbc-cmp-int-cast.patch- updated to 7.0.0 * see NEWS for changes * see UPGRADING for 5.6.x -> 7.0.x transition - removed unneded or not upstreamed patches for long time: * php5-cloexec.patch * php5-missing-extdeps.patch * php5-format-string-issues.patch * php5-per-mod-log.patch * php5-apache24-updates.patch * php5-crypto-checks.patch * php5-systzdata-r12.patch (new: php7-systzdata-v13.patch)- updated to 5.6.11: Five security-related issues in PHP were fixed in this release, including CVE-2015-3152.- php5-systemd-unit.patch: set Killmode=mixed in order to ensure fpm and children forked by script can terminate cleanly.- mod_php5.so executable- use apache-rpm-macros- updated to 5.6.10: Several bugs have been fixed as well as several security issues into some bundled libraries (CVE-2015-3414, CVE-2015-3415, CVE-2015-3416, CVE-2015-2325 and CVE-2015-2326).- enable apparmor support: new BR libapparmor-devel- update to 5.6.9: Several bugs have been fixed. - systzdata patch updated to r12 - php5-systzdata-r10.patch + php5-systzdata-r12.patch- update to 5.6.8: Several bugs have been fixed some of them beeing security related, like CVE-2015-1351 and CVE-2015-1352. - refreshed php5-crypto-checks.patch- configure php-fpm with --localstatedir=/var [bnc#927147]- systzdata patch updated to r10 - php5-systzdata-v7.patch + php5-systzdata-r10.patch- build against system gd and libzip only for 13.2 and above- update to 5.6.7: Several bugs have been fixed as well as CVE-2015-0231, CVE-2015-2305 and CVE-2015-2331.- build against system gd [bnc#923946]- build against system libzip [bnc#922894]- update to 5.6.6: fixes several bugs and addresses CVE-2015-0235 and CVE-2015-0273.- added README.default_socket_timeout [bnc#907519]- fix sle_11_sp3 build- update to 5.6.5: This release fixes several bugs as well as CVE-2015-0231, CVE-2014-9427 and CVE-2015-0232. - removed patches: * php-CVE-2014-9426.patch * php-CVE-2014-9427.patch * php-CVE-2015-0231.patch- added php-CVE-2015-0231.patch [bnc#910659]- added php-CVE-2014-9426.patch [bnc#911663] - added php-CVE-2014-9427.patch [bnc#911664]- update to 5.6.4: This release fixes several bugs and one CVE related to unserialization.- update to 5.6.3: This release fixes several bugs and one CVE in the fileinfo extension.- update to 5.6.2: Four security-related bugs were fixed in this release, including fixes for CVE-2014-3668, CVE-2014-3669 and CVE-2014-3670.- upgraded to 5.6.1: * Several bugs were fixed in this release (including CVE-2014-3622).php5-tidygoat09 15924754317.2.5-lp151.6.28.17.2.57.2.5-lp151.6.28.17.2.5-lp151.6.28.1tidy.initidy.so/etc/php7/conf.d//usr/lib/php7/extensions/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:12909/openSUSE_Leap_15.1_Update/b609816993780c550b95696bf353a97d-php7.openSUSE_Leap_15.1_Updatecpioxz5i586-suse-linuxASCII textELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=74e786dc67b1e7863b2a6e09e58a16547789f52a, strippedRRRRRNȨ>dsmzutf-86f805e58dc3f74a5d888e5ad84f6ab772b27525d0095cea03b66a4fbf88f1c84?7zXZ !t/ٿ<] crv(vX0/ڎ!#r8"! /Ww>n1N>B>%c=8Vu5;8C4\A}W EPy422W o\MHL*5]Ma}-\qwʺ.Gh|X}3765ǧtWm7ϜK&Aǹ]GDZBr;Nr~\-b Y`D`~T'|66vX+f= 8SEes0[\L--ܵmUFGNY8ٲ]:=,mj-ܶ=0ښ$*\iG /QK ;wҗAd+G|nwG- :5 Xu;NMU 0!]Qe&F`RY !䘿 {}Z#61:MwȝӳBVkeQ(d.K3:SV#Q6̮ Қ o V)gkfcn)/#I?nR ٩TxDB,S"E 2ԗ1ғlhUmS5_!*2#VcId_Т&= %Pd%kD{˥U3)K'Z<+ho!y}JqJ'G $T1nmͻ (b0V,B\+f/F%~ QӸo\colZrC8;nU7t'EH #Vi(HW=yNm~шvuz"H䎦e+~7tmMTVm^?HJ- nir[/͕3]Ư5WxVpo>E~εlIR]?Tfj4Lz{)5힮brח[;˿nIadMv :Os>$&MrVO#"GG *3a^'qo׷2+R*Gg*-U]쟬;?E;ʳ7;/xIT,ŐmmܺW607_f<^ꕝ1cO;p'46TGA5u89BwIdάVy[kr3[TaBw#6EsGGϛq/B..;գ4oo?AQ* (E]t7#>9"˝. Vgo6x!rPiջ u5us)XhI1 ``Bq#G+t+\S); W8 5٭v&Vyq/ N rDkzs>Mok,":h)o=GUpD鏉>bΨM0m04SHgNfϲ+# .\#_)VxEu%;6o zLfl!R{ ,9sXc,;50ģbL5wȊ4fT \.a*EkM6:Х\\O-&)7} "s<:4"d=Iv{lҞ*Mdz'4`y%/Zux&^z!cR݄ fn\:hvO\ߡ!Zl\*d.uכRI<&3յ7`hrw_gɚO\=~SĪQuIFn#"cqm]f %LlXe)n:%>a ZZWX+6!UFLEKCa~9P'Ct@딐%wAQѧ9h xax}4m\2+$Y}rR/quM*tye\y>l<a qLe9J^Rû-o`TȞm[7\w YXAe,%j&uwp+3/K[wj̵r^Eh0j10}W*J.i|ZiBx~H)&0׍7k7ʁC֛輛3D) *.ZsXyazR*uo ICc[g<'ri&(e38Vէ?_~`:xxJP9vi?68.¾! Ϯ)p>rHI2Jv] MpѤ&[x KT(Q;3BBn0}^a 7|HIFʇ&vCC/ص2DmeZw3 $7Q3BC=#q.PK 2!;BHwaJmJ^h ɹm9K03qI2gŦŎlsD^>JΗ< j%ҡ̳ $<^aHBi&sz[AoA${{n7ҾY3L! 39dYA.Sˉum5);^\I7'sE D0ևe9pSN<.yxpr>\Cb\SqsϣjX d$SDQ%^q+TYC_B:k5HPyP<[ܡ QjT,;NY|a؜}y4-n_P SuϾ?@ q+@ݲ #+G` gx,^ޒm'٤_T`>M [jvA^|Fɣ ?b+hۥE57Ϸ[w_EfND2 )OM Sm fOE C57Ki$05ҼQyeG&߁v狊PL'bkO]sx^K> iAE>ɄOYwk@Mn;}l`±X_]XU ,wS5JTj6MG@$(.>x2i_9aV](M)V]h7(076V ?0bUγIyU[aK; ;9cZ'6x#ɖ'̂ $= e/Tin3S'd*1p!5|]+C&!.:gۊ9񛀇Ϯa˜l>7cV8 2M-nؤ/$1q'uRqɤawb˦ n/bD>pI\1a{L{˺P`)Q"3୐hy77J#1)v {mMxF@3yR979iQb,_-ayCLkv$ibCbQue(cKf]5T\4h Yhx?iN((m6lW볜d Z:2 +3쌺<&t5Tz͠"v0+{ Vb[rg<˖CA;/ " U!s=\`gq2O+ TW!` H[|4J]to=x91Wt0/Y`f}7 Gݣ}$3=|p|!n[iAI= ["#׫ބ-zW(0Trl.1Q0ǝn[_&&{n&s?2uT u~L %Te蟦 <¢WX#c^XRKB΁P,C:sSwq;Q f]'xf'ײjIf̞S\` eEn}B4u ajwn5žb[.N0-'7)$6GP嶜$Xp_U_b7,;6 f3-\J'B ʧ,]E>En[:K[{'xo#f@m9DArE$ <TD`!$WPc*"_KlLNۮ`1WY>knV{T]"4v3bvtTb/b&B h%EUvwWv-mگz`X]XKHJ|ށ6t sIf,h78l|+7JI2wKaxn0KvQm H1 ~CҩhOzC"❍uw%\Ŋp8й;qr^R;ln"%Ϗ6P!H F4=1E Ļ0el~IH.G8+I4^S+gN;a \\JEU[% A0\7X9u(!9ϾIo] hMo f v3F瑢%VآS>|IzM|&]"OT&l`Aqa^UDV;kV{ҺerSe@*y PgL찚?;,m#uyEGzl$ĶM"1L ֵx)(P\I#]~r#vm-\UƛH}ۭXjI&'͏3i5BA1]iEB5Tu%㕵Ho~"L\S~bnSP6Ր?~L{],T9.u]᪚aY"s|S j"^Zͥ'PdPr/`f6KCQA&)X;_TrJS_yܠ5\e%á'$]{ v Ctk(B#\mN+>\mbZ_D^dQ"TQp29x 쳪RtyEgM7uZ9pfdav_>I>nR.T PkŋQgU<*n-NZrcAn֌.4 o jwցR܏f=W  SjIKCs+hAaF0ZM:<~jz!y:6+)N,^ւ+&ĺę=a*>Ty.Kwb#iƔZb߁\xRsBmkFM:P`#̙_M5/?}"u=Ppf5(%3Jx_]'@n {|92y R Lky}'& ]Th<Ɋ|ASg7C)<%faE~KQk2P P/d^;0L\!'P(jb`d3$"_yemĮ C3<ވspvHh8c:-ұqw{p>{.QM܀4]>=4i4rrDV a{{tHX_O|\1h=\[z&I;{]fVBl>ZG5 lW 7lŗ~o+"&^ߴquU OQZǡtc1V`Ne9wVi_c F[~!m?7J#\ O%oQ!=CQZ]u^@;H5Z</ޤ" jz kO`|x8Qٯ/uz"*k7/ޑ0hs1wHU bW}:Ǒ>8 "]Ȇf;l2໕KZfe]cm<+Ou~d΁}1c\~}l$~ͿCK#;w;+TMgAPU:: , 'ZҿBw>MPTs SظDv,a΢/*: e1\\XCؾ Qy@@ _ U-hV駜oU*r<~ʀҲ?iu;l;EMH2ЗvPX>09ߦaRd}.l3~m@€/ݍ߸/mקo@Ybiq)XGL-v#[`J԰`Y\}Q^ETM iȰBG]h2_(֘8~BS=ҵNjv2(#S ?`«%r]KԬMFb1)nNt/w+ԠnHYlfF HB)#+J6,']Y/RFk16@l?ZAaNjw1ZXa,-hPN"&D7 qnoaD1!&ʇodׯ  _bS9"T-@ZBLqЯ>!Z5 ήJoA39aoOHQ'>Ș6y*)'dE9u62XK?A6P#[3b""5N☹ձwriqYn:սXcS)XT>;M vmmVc|JnHd;@JaP:T p7>9xEq@= V"1ݘ n1Ydk6Ca]3t!tȺM]Ζd&OSc&8f겋?1rJA2]}`'ض:@} vq toy]"GbkʚJ2\>7#?ٹ c,h[7":y3R2-#[};=ѕQۓ-;0)(6kl<\g!m#N&;@xkE8hoMjT]Py3{374 X 'd>do){Q Z ~}W`AVCa(XۈO֠snIJug6 cQO!/䥆G d}U箏J2 ?39Ni8/7hx!K$0 !;g: 匶v= a0gykmė:Iae%ӏQ omC?XmEH?Ve4$ݵhHy3IqR[P~BRW=ίC|_|`8௑ 9D8V'`b؞y0vco TӞqvJpTԓ\lUV9itIn&l"GFz4ƃkG*G-Z')",aߓrcWt4<#s8Z-j۟#wp_V!C[.IAFu"ռ H]H^a^im*yX9V6]L ,X)q Ϲ)bf{, xaMvlǓpvLbtݳ0PKF}V"[R򀼩xB${,5޲Jk[i)0y"_{,γ)𪤁ȜW$[v!3I[z @z  Pℭ@9gڔX]PHB塸{/S2;<).SsN%`W @1U lnW׃v9,tR*6?@g2znxc7Lߋ@{~̣@\N,Yx~> 1(;:W4wH%jA'*5PbhkN0 m,xҝJ!ܯܷH@쵠dgzҿ >|g~_FKIv|d/^b3v͒lQ `PFײE2؜B1 @Ili5qR02O*!R#ouyGv6]̷ِ9{jM=aSXsz<=oY~$vk@ G Vk? +w ^z 樜Իޡ>$;VEs9)<@w؃ZKA6Aqx}||=2-b?S& @Hx8O{BN]OQE~xBFbw woӥ)l{ WTc]r`SKpڷ<%[mr 6wj |JJ^<ٹyɾN (TݍFδ{rz2W Ĉ7|^ $[~|(k>e| س>JB%:BO @Fnf\@]v*ĵ\M1#5dr')xeӼ2h+t|IHB%ԌrU`z 1+t$YtSتd᎚6xJJɉK`}iX{4dRJ tGS8hR "8& @B$$u>%]JUGvPu2^j˗Q\a覥S,# )'/$uynpOѦ'Jh[{$g?ݘ|}j1IЧ1T^mH$IK=ـ}L3<'=k@,]@+;`Aژ,<pqHX0 v{`0<O@+nddLr%PaÚ;vv6YFepV~5Ʋ#;>*H(DSk4rj NRoFC@X/93S3>$3Q!_FTݑ+W/?ܹ3cs rhLUWB} #ÀIOFK!)K!JqQVŎԾ]y9<K,PV''zG YZ