php7-xsl-7.2.5-lp151.6.3.1 4>$  Ap\ /=„i:MIis:sEP0DpAG$?Gd   3 (?ELT X \ d  $,`u(8}9}:}BCFCGCHCICXCYCZD8[D<\D@]DH^DWbDcE.dEeEfElEuEvEwFxxFyF zFFFFGCphp7-xsl7.2.5lp151.6.3.1PHP7 Extension ModulePHP's XSL extension implements the XSL (Extensible Stylesheet Language) standard, performing XSLT transformations using the libxslt library\^morla5|QopenSUSE Leap 15.1openSUSEPHP-3.01http://bugs.opensuse.orgDevelopment/Libraries/PHPhttps://secure.php.netlinuxx86_64I|\`\o81834339da438bcf7a1c37ceeb629edeab2b57ac7093b05b9862f77bd26c613721576d81a01cc8bf1b601501fdd42484971295524d8a42182671cf450e823728rootrootrootrootphp7-7.2.5-lp151.6.3.1.src.rpmconfig(php7-xsl)php-xslphp7-xslphp7-xsl(x86-64)@@@@@@@@@@@    config(php7-xsl)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.4)(64bit)libexslt.so.0()(64bit)libxslt.so.1()(64bit)libxslt.so.1(LIBXML2_1.0.11)(64bit)libxslt.so.1(LIBXML2_1.0.13)(64bit)libxslt.so.1(LIBXML2_1.0.18)(64bit)libxslt.so.1(LIBXML2_1.0.22)(64bit)libxslt.so.1(LIBXML2_1.0.24)(64bit)php7php7-domrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)7.2.5-lp151.6.3.17.2.57.2.53.0.4-14.6.0-14.0-15.2-14.14.1\\@\@\+@\\M\~d\2\U@[:@[@[9@[[e@[2*ZZ4@ZZ?Z@Z؄ZԐ@Zľ@ZZZZZw@ZZZZ@Z@Zz@Zk@Zg#ZTZKt@Z3@Z.s@Z@Y@YY@Yχ@Y˒Y˒Y@Y@@YKY@YYV@YYx@YqYlYlYZ1Y:YX @XXX@X@X@XAXN@XN@X%X X@Wڍ@WW@W9Wk@WgWL+@W!@WWKW@VbVn@V'@V&@V=@VT@VVwVn@Vn@VhVetVRVI@VI@UUUU@U@UUUUq@UY@U:0@U4@U%@U/@UQUQU T@Tء@Tи@T,@TT|T@Tk4TN3T=@pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comMartin Pluskal Petr Gajdos Petr Gajdos Petr Gajdos pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comidonmez@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comguillaume.gardet@opensuse.orgpgajdos@suse.comdimstar@opensuse.orgpgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.combluemer.mark@gmail.compgajdos@suse.compgajdos@suse.comjengelh@inai.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comjweberhofer@weberhofer.atilya@ilya.pp.uapgajdos@suse.comjweberhofer@weberhofer.atilya@ilya.pp.uailya@ilya.pp.uapgajdos@suse.compgajdos@suse.compgajdos@suse.comtchvatal@suse.compgajdos@suse.com13ilya@gmail.com13ilya@gmail.com13ilya@gmail.comkukuk@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comfbui@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comschwab@linux-m68k.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comjimmy@boombatower.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comjimmy@boombatower.compgajdos@suse.comjimmy@boombatower.comjimmy@boombatower.compgajdos@suse.compgajdos@suse.comaj@ajaissle.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.commrueckert@suse.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.com- security update - added patches CVE-2019-11036 [bsc#1134322] + php-CVE-2019-11036.patch- security update - added patches CVE-2019-11034 [bsc#1132838] + php-CVE-2019-11034.patch CVE-2019-11035 [bsc#1132837] + php-CVE-2019-11035.patch- security update - added patches CVE-2019-9637 [bsc#1128892] + php-CVE-2019-9637.patch CVE-2019-9675 [bsc#1128886] + php-CVE-2019-9675.patch CVE-2019-9638 [bsc#1128889], CVE-2019-9639 [bsc#1128887] + php-CVE-2019-9638,9639.patch CVE-2019-9640 [bsc#1128883] + php-CVE-2019-9640.patch- upstream bug #41631 is already fixed [bsc#1129032] - deleted sources - README.default_socket_timeout (not needed)- security update * CVE-2019-9024 [bsc#1126821] + php-CVE-2019-9024.patch * CVE-2019-9020 [bsc#1126711] + php-CVE-2019-9020.patch * CVE-2018-20783 [bsc#1127122] + php-CVE-2018-20783.patch * CVE-2019-9021 [bsc#1126713] + php-CVE-2019-9021.patch * CVE-2019-9022 [bsc#1126827] + php-CVE-2019-9022.patch * CVE-2019-9023 [bsc#1126823] + php-CVE-2019-9023.patch * CVE-2019-9641 [bsc#1128722] + php-CVE-2019-9641.patch- asan_build: build ASAN included - debug_build: build more suitable for debugging- Enable testsuite during build time and save log to subpackage   testresults (boo#1119396)- add security patch of imap extension, which is currently disabled * CVE-2018-19935 [bsc#1118832] + php-CVE-2018-19935.patch- security update * CVE-2018-17082 [bsc#1108753] + php-CVE-2018-17082.patch- reenable php7-dba support of Berkeley DB [bsc#1108554]- align patch names: php7-CVE-2018-14851.patch -> php-CVE-2018-14851.patch php7-CVE-2017-9120.patch -> php-CVE-2017-9120.patch php7-CVE-2018-1000222.patch -> php-CVE-2018-1000222.patch- security update: * CVE-2018-1000222 [bsc#1105434] + php-CVE-2018-1000222.patch- security update * CVE-2018-14851 [bsc#1103659] + php-CVE-2018-14851.patch * CVE-2017-9120 [bsc#1103661] + php-CVE-2017-9120.patch- security update * CVE-2018-12882 [bsc#1099098] + php-CVE-2018-12882.patch- main package requires wwwrun:www user [bsc#1093025]- better workaround for [bsc#1089487]: build mod_phpN.so instead of libphpN.so- rename freetype-pkgconfig.patch to php7-freetype-pkgconfig.patch to align with the rest of patch names- Add freetype-pkgconfig.patch to fix build with new Freetype: use pkg-config to find Freetype libraries- updated to 7.2.5: This is a security release which also contains several minor bug fixes. http://php.net/ChangeLog-7.php#7.2.5- build-test.sh: generic spec file name- apache2-mod_php7 does not provide libphp7.so [bsc#1089487]- updated to 7.2.4: This is a security release with also contains several minor bug fixes. http://php.net/ChangeLog-7.php#7.2.4 - php7-no-build-date.patch refreshed- build firebird extension only for openSUSE (sle15 requirement)- Fix build for %arm and aarch64- drop imap extension [bsc#1084461]- BuildRequire pkgconfig(enchant) instead of enchant-devel: enchant is moving to version 2.2, with an enchant-1 as compatibility package. By using the pkgconfig symbol, we don't have to care for the actual package name.- updated to 7.2.3: This is a security release with also contains several minor bug fixes. http://php.net/ChangeLog-7.php#7.2.3 - removed upstreamed php7-pgsql-memory-leak.patch - php7-systzdata-v15.patch refreshed and renamed to php7-systzdata-v16.patch- php7-honor-re2c-flags.patch: honor RE2C_FLAGS everywhere. - remove generated lexers so they are recreated at build time- php7-date-regenerate-lexers.patch: honor RE2C_FLAGS- Support password_hash("...", PASSWORD_ARGON2I), buildrequire libargon2 in supported products.- Remove buildRequires on: * libevent-devel: php7-fpm does not use it. * pam-devel: not used - Add buildrequire on zlib-devel explicitly. - libvpx is not needed but libwebp is, only when not building against system gd. xft likewise.- fixed memory leak in pgsql extension, php function pg_escape_bytea https://bugs.php.net/bug.php?id=75838 [bsc#1076970] (internal) + php7-pgsql-memory-leak.patch- updated to 7.2.2: This is a bugfix release, with several bug fixes included. http://php.net/ChangeLog-7.php#7.2.2- do not build against system gd when suse_version < 1500- fix build for SLE12*- updated to 7.2.1: Several security bugs were fixed in this release. http://php.net/ChangeLog-7.php#7.2.1- build against newer webp [bsc#1074121]- build with SLE12*- updated to 7.2.0: features and improvements: * Convert numeric keys in object/array casts * Counting of non-countable objects * Object typehint * HashContext as Object * Argon2 in password hash * Improve TLS constants to sane values * Mcrypt extension removed * New sodium extension - patches: . php7-systzdata-v14.patch transformed to php7-systzdata-v15.patch . removed upstreamed php7-aarch64-mult.patch- updated to 7.1.12: This is a bugfix release, with several bug fixes included.- Add php-cli as provides to php7- updated to 7.1.11: This is a bugfix release, with several bug fixes included.- fixed installation of wrong cli [bsc#1061555]- Update not-so-useful repeated package summaries. Update the descriptions to have a bit more explanation. Replace old tar syntax.- build and ship embed SAPI + php7-embed.patch- updated to 7.1.10: Several bugs have been fixed, see https://secure.php.net/ChangeLog-7.php for details- aarch64-mult.patch renamed to php7-aarch64-mult.patch- php7-devel requires php7-pear [bsc#1057104]- Changes related to boo#1056822 - New packaging macros in macros.php: %php_pearxmldir, %pear_phpdir, %pear_phpdir, %pear_testdir, %pear_datadir, %pear_cfgdir, %pear_wwwdir, %pear_metadir, %pecl_phpdir, %pecl_docdir, %pecl_testdir, %pecl_datadir - Updated packaging documentation in README.macros- Updated to 7.1.9: Several bugs have been fixed. * ChangeLog https://secure.php.net/ChangeLog-7.php#7.1.9- added /usr/bin/php7 [bsc#734176]- php7-pear should explicitly require php7-pear-Archive_Tar otherwise this dependency must be declared in every php7-pear-* package explicitly. [bnc#1052389]- Updated to 7.1.8: Several bugs have been fixed. * ChangeLog https://secure.php.net/ChangeLog-7.php#7.1.8- Replace %__-type macro indirections.- date extension: regenerate lexers when needed + php7-date-regenerate-lexers.patch- dropped mcrypt extension [fate#323673]- updated to 7.1.7: This is a security release with several bug fixes included.- Drop sle11 support as we are not building against it anymore - Remove php7-BNC-457056.patch that was applied on sle11 only - Remove dependency on imap-devel, it is not used - Switch spell from aspell to enchant, dropping pspell subpackage - Remove unknown switch options from php cli build - Drop support for berkleydb format, by default there are more supported solutions built in php - Use %configure macro in the build phases- updated to 7.1.6: Several bugs have been fixed.- Updated to 7.1.5: Several bugs have been fixed. * ChangeLog https://secure.php.net/ChangeLog-7.php#7.1.5- Updated to 7.1.4: Several bugs have been fixed. * ChangeLog https://secure.php.net/ChangeLog-7.php#7.1.4- Updated to 7.1.3: Several bugs have been fixed. * ChangeLog https://secure.php.net/ChangeLog-7.php#7.1.3- Don't install the init script if we use systemd- updated to 7.1.2: Several bugs have been fixed. - deleted php7-getrandom-test.patch, upstreamed- updated to 7.1.1: This release is the first point release in the 7.x series. PHP 7.1 comes with numerous improvements and new features such as * Nullable types * Void return type * Iterable pseudo-type * Class constant visiblity modifiers * Square bracket syntax for list() and the ability to specify keys in list() * Catching multiple exceptions types * Many more features and changes… - migration: http://php.net/manual/en/migration71.php - php7-systzdata-v13.patch replaced by php7-systzdata-v14.patch- suggest php7-* instead of php-* [bsc#1022158c#4] - do not suggest php-suhosin at all as we do not build it (not ported to php7 yet)- updated to 7.0.15: Several security bugs were fixed in this release.- Replace pkgconfig(libsystemd-*) with pkgconfig(libsystemd) Nowadays pkgconfig(libsystemd) replaces all libsystemd-* libs, which are obsolete.- updated to 7.0.14: Several security bugs were fixed in this release.- updated to 7.0.13: This is a security release. Several security bugs were fixed in this release.- adjust firebird dependency- updated to 7.0.12: This is a security release. Several security bugs were fixed in this release.- updated to 7.0.11: Several security bugs were fixed in this release.- php7-getrandom-test.patch: Fix incorrect test for the getrandom syscall.- updated to 7.0.10: Several security bugs were fixed in this release.- updated to 7.0.9: Several security bugs were fixed in this release, including the HTTP_PROXY issue.- updated to 7.0.8: This is a security release. Several security bugs were fixed in this release. - removed: php7-mbstring-missing-return.patch (upstreamed)- systemd unit: remove syslog.target from After [bsc#983938]- updated to 7.0.7: This is a security release. Several security bugs were fixed in this release.- updated to 7.0.6: This is a security release. Several security bugs were fixed in this release. * removed upstreamed php7-no-reentrant-crypt.patch- aarch64-mult.patch: fix asm constraints in aarch64 multiply macro- build for sle12- correct public key- updated to 7.0.5- firebird builds now- update to 7.0.4- updated to 7.0.3- require postgresql-devel < 9.4 for sle12 to fix build- more versioned provides- update to 7.0.2: 31 reported bugs has been fixed, including 6 security related issues.- update to 7.0.1- php5-pear-Archive_Tar provides 1.4.0 - install .depdb and .depdblock files along metadata * php5-depdb-path.patch - versioned provides in subpackages- Provide obsoletes for sub-packages to improve upgrade process.- Obsolete php5 since php7 conflicts and should replace.- marcello at ceschia.de: fix path php-fpm.conf- set pear's metadata dir to %{peardir}- Spec cleanup * Split Archive_Tar from -pear sub packge to allow updating this part via rpm * Added "Provides: php-firebird" to -firebird sub package * Added "Provides: mod_php_any" to server api module packages - fastcgi and -fpm- test mod_php with %apache_test_module_curl - restart apache during mod_php upgrade- add php5-fix_net-snmp_disable_MD5.patch [bnc#944302]- fixed segfault in odbc extension when result set is containing NULL (php bugs #52554, #53007) [bnc#935074] (internal) + php7-odbc-cmp-int-cast.patch- updated to 7.0.0 * see NEWS for changes * see UPGRADING for 5.6.x -> 7.0.x transition - removed unneded or not upstreamed patches for long time: * php5-cloexec.patch * php5-missing-extdeps.patch * php5-format-string-issues.patch * php5-per-mod-log.patch * php5-apache24-updates.patch * php5-crypto-checks.patch * php5-systzdata-r12.patch (new: php7-systzdata-v13.patch)- updated to 5.6.11: Five security-related issues in PHP were fixed in this release, including CVE-2015-3152.- php5-systemd-unit.patch: set Killmode=mixed in order to ensure fpm and children forked by script can terminate cleanly.- mod_php5.so executable- use apache-rpm-macros- updated to 5.6.10: Several bugs have been fixed as well as several security issues into some bundled libraries (CVE-2015-3414, CVE-2015-3415, CVE-2015-3416, CVE-2015-2325 and CVE-2015-2326).- enable apparmor support: new BR libapparmor-devel- update to 5.6.9: Several bugs have been fixed. - systzdata patch updated to r12 - php5-systzdata-r10.patch + php5-systzdata-r12.patch- update to 5.6.8: Several bugs have been fixed some of them beeing security related, like CVE-2015-1351 and CVE-2015-1352. - refreshed php5-crypto-checks.patch- configure php-fpm with --localstatedir=/var [bnc#927147]- systzdata patch updated to r10 - php5-systzdata-v7.patch + php5-systzdata-r10.patch- build against system gd and libzip only for 13.2 and above- update to 5.6.7: Several bugs have been fixed as well as CVE-2015-0231, CVE-2015-2305 and CVE-2015-2331.- build against system gd [bnc#923946]- build against system libzip [bnc#922894]- update to 5.6.6: fixes several bugs and addresses CVE-2015-0235 and CVE-2015-0273.- added README.default_socket_timeout [bnc#907519]- fix sle_11_sp3 build- update to 5.6.5: This release fixes several bugs as well as CVE-2015-0231, CVE-2014-9427 and CVE-2015-0232. - removed patches: * php-CVE-2014-9426.patch * php-CVE-2014-9427.patch * php-CVE-2015-0231.patch- added php-CVE-2015-0231.patch [bnc#910659]- added php-CVE-2014-9426.patch [bnc#911663] - added php-CVE-2014-9427.patch [bnc#911664]- update to 5.6.4: This release fixes several bugs and one CVE related to unserialization.- update to 5.6.3: This release fixes several bugs and one CVE in the fileinfo extension.- update to 5.6.2: Four security-related bugs were fixed in this release, including fixes for CVE-2014-3668, CVE-2014-3669 and CVE-2014-3670.- upgraded to 5.6.1: * Several bugs were fixed in this release (including CVE-2014-3622).php5-xslmorla5 15602745267.2.5-lp151.6.3.17.2.57.2.5-lp151.6.3.17.2.5-lp151.6.3.1xsl.inixsl.so/etc/php7/conf.d//usr/lib64/php7/extensions/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10388/openSUSE_Leap_15.1_Update/68fe546bf05edf2816509987a8065d6d-php7.openSUSE_Leap_15.1_Updatecpioxz5x86_64-suse-linuxASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=233c89c98721096ead56f489fa623ac7ce01ea24, stripped RRRRRR R R RRR׫'ʆsf/pRutf-8932f6e0d3713df8ce3625f7d211ca907d7f798eca166b0089b62b184c37a6b69?7zXZ !t/}'a] crv(vX0}r'¥~{^UĚ<q.1oFz-mr.A~C X<8hNfI 1YW^$;b _$$*o~:#-k+C f$gV14#D. )U/EC(\rwb,G@,k2Sͬ8t$g?d.QnC G,5/g9ˆ)L>%+ւ@&@c tnɈHG1%/],O^B5^.W[Ō}~9ڒ&:T qFi MJdBo MPM$Ԏ \[cH4hhi'@_A04K̠b_rgӧ:r)_^6XӻB͍FǷqQWivk=/:Ak'ǂŚXLk*y֙S+I91krV%@?=SLzqqs"u ؅aKIviS¹&l,\{4m RY4! AZ W!k]6_q-ޒYu`j}L(n_ +]P@/l (ItwU Tq_ @|\mءS/W gk!O#-k\p ?oHnxg_buDT݁Obc'/NkMŸ9{.ej)b\I[zz}Aq1Mfm,XkL[āV)40'zY7ds'uTOC.γʸpQ o굹EFqEb#*[٬x^A9H3Ȇ)0bUBeލ[,քO#\ mE8ks@ /h9p+̬k+ V$CNzbNy{-}%jȣ:sqaEHKp#FuE،Fz8~5@n^ckj4srfYYtj(ͩ& %E} ʖ;1yn  S?Z\[lt.haÏ?uߦr#4]l)}}i< Tzj1=-l'gr(ub&@yQ't C7m䤗͹ {*Ġ a+Z>ɎY\Qʹ!'V=ȁPRfޱsgC] \4#{T;~$a ςoVܿaUɿptΈ9R )jȕ"[5 \:21Fzeq ;- ^v MQň^ŐOgH kP'|jh=O/KE'\c|@>⫲NW{h{4⧾::vt#j@_#̥ٴ> i/jGC M .;E>jm%4Iu>{?feg*{z'y%y|-i2=r[yPtc~TXu! ,PyeߚiVb0zDO|_)kiFmFqgȲY MQul5Kom8Z\ ـM?] UٽC"CZ!c|96 vF'PE([D$``;옷ٺ޺64XH`.١6NF ,9pYj֛ hQ𖛵tMTbT9RLiylW+Tc*iC2:ܪD_aXDJ  %T{3X5mVJ_j>{^1ccSZ*~"B԰l9>NFc`Z2%4>vp]G~AРTxt!GZ1F` #8 ќ;PK LztɡI,Tj N eM(͞t'ڸIYb>K%XnѿdHJju}"˗pwXb('Ulm:UJ4ཁ3PGhl#kJFJZ0=Nos<'SݾyBWпӇX$OaYT(lMlx&`7"aViB]pO6(#Kon<73jm4./-Wjq1!#- pDv3x(r!^ux<f 2pʁP.f]G3v~%e~BM!(zt0^Oj>T^1x}F?UDl\-V{fMm ߠI_`&1.) oM?LY],evO3?k,9ֈ;p/a.=/ve5cF/u+onIu KR ;.59k@;Y4fKe@B N>DcEI Zv{8#NpɨZ/v%sKl%Zfg%e5wn13y(xt&k  ȧ׺Bgu)SYՆ-KNn`Zjgd/BA!J*IAr >y\q:hh+Քua0=CBIya2 T1EmQ<ɏ5_lnw͚GYL~'Sf.`YosFx%FQDhMq Mq&7!I]A;{y9He&rd c&Ng җo(2Eh =0ቍ{zf/qǘԱ]򔪬:7 !Oʩa r!aM翐,=2mUq }n4׳ /pDY;XAI"*>ڈ] &P,#ƹQ%o#iqmq2F!!'m`%ܘ%_ 'NV-xp)"{k\5mh*TmTR'l NNcC}.m '8îHZrZmoӸg[wa71CH"yr!N5SIk`>e6Rb9jJict`,r~bĦI~*)O,8NPXNrzzx~B%WP^dΦd - ˻6|QK M(8U''I+{8a 悾֧\BXylp7"cfse=ED3lP=8pqK~U,-M>^DBiQ &n2D#Ah.@"D0/ͺLIA ӎֽb AL䓃چLGkl`@* Drd>[HǡnNr)7 {c'|W0{ Fo[J:")w0k?\}s%w}lo-ki ?Yrm%_@lxgVr I4.]8A)qqyS{ԸrF`SͯA噭dcv/ؠO(GocZ$'9Ѩ{kȄ 49x;X ={({uΌԸ OWHƆ`o1u"ZK& PN15ڰ5>qVcg}smfL|T)an*?k;I&c1yV /omUo/0ѿӪ)?ѳwv w0P<*Wk%),WnK ,&"S:6''zmxbkë|<'JE2^_Yq+zPN'ꬩl@!`N !&QˤU'Ay& n}CAZq+R8?oVWpd/fQgm~P%q*AQЬ/yuz97w F'''N[[„tCSS56'teYJ bI-. Oa_`?u|N}lſ8au~5Q:LLɦ h֒o[M5魭?KlO7VIw2"Ńh&ϷӀ2Ъ$1rHv薸`5 KۦCƂ =C"|Ѳ][itI "5$~Bz!$ nob"Ir'xhy*PBpYiCqqKy>s\u䃓  GoݻCoi(jBr'Txi;MhXh>vhA%&GyMe3Խ,A }0`f"Eޯ;z3y=6Ϻq4!mԁ<2F#xV6J>-lpx ~LkEI*_~R{WH+IEolx`!۽Rc*~-[AU4i+H"Bsŀ@7F.:0 0GLMO,s2 k2e$59?41o),iILdkOMT t EX6m qJ_bի gѓËz6K$l 凩gOnh(`^e4%+TnL oN\=<3w-u{NZj;Rځ/¸ϙYU+E@a2)DqqPC ’p!$4~W4/QcDHfC^t!0snz-p0_GYZL4CF}Ps{ɏRPbŒ:RZr=>AI71ld ʰ5w>;c$MqT/᙮b ?ݦCW}}A]Ϧ ~F\S@.ius!)3;ǿ෬a=8yCs/3EGQ-LPF~%⿲so#܂ڈ']lo*EҝOTr\үqRVO611{,ɕҷWh.Wr7#DO.;?ILWrn$))4В!'dzjT%IU>(4lk X:o콟\o$0(plύlM2 Ͷ,\Қ;]BNDxdV=|hZp̄, N镎+m߿Σ[/VO^$Q^jQt44; )cψI=_zijL5 r Y,ÏVrS'(Y%k)4egdK7,&8gKkt:#iYr,q[ R^&Fġ%|x-bH:CuUs6ҍCfJt }p~\W JyjKT. ' Mc`EW ~I{TNM0sYSiT}V1Og"=Dt! 9|e2l \Td+  ')ԙ1,=;Mgi4iz ʞ٨ZQOYJkzF/`ѫ悥Ɖ|@nJz?{r؀}Qݷ'oi2)2VU墸32@#k `4ZJQ(.6t@7hڨ{4]FGjBӉJ?GӇd@>wݘiUBƳ|p]&5MK(<$%Y}cACMҎШBYݧU]<(/z^47-b2lZ|\MhA0:/H?~6˚c? Ђp>}()9$u+Af^'؈4\{Ճ^k51hHJ_ۙՆuZnHrџ+ί[寉f-uwfR9#v_ӨbB]h0_ ,\M{?NJ3BO n[7Z#\ _wu{kus.ąnGJҀkrI)m6?}oZTŽs g-%H)1a\SY&vvJ C7q~_FS[}nW%ESXBt5@}VEi_wF(w\PK]l(bEfd|u'AP0ė>) zD0lfG)gPI{{`L2Y}>ÑG\WgSMMg*d}&+4)\apx?2D`uS܋A+,.M'浅Uwdд[M…@ɲ<[H5 g>$NϔݬPb}*Y]jr>8HS |u/#[< ͥ(rmsv;x'ණ@SoM+SK3a d2 $jIqrALaRrZR꒻* % H saC. }@t>{-J  >&Gږ5:R Dzc :F1ꔽ˽N]5Jkt0@>G.!Hq&p]j3\"A)@Onʗ!&oegh^|u|* & H8&";ݾ. ̐R[, JR oLb)GHdvwtsI~zs-=HG&( D7E ~حͤ>x ZxpJ@N~P,ZuںuIQwC-B{uJ6-HGN .'a &A4Dϒߜ`;x"e]@>Ҧ9r\wJǿb]S.*AM<SVuUq|MPc{SDg?=`,2onóܹb, '$FwP( p]seWw_c `^4z\Z% ~g 37B.}}Fu<sحr9$ |l<`|N2YQAZGQH CK-#BfRGC%-&: hW&\UNLAݪFp=`N2{+X[E&l|&keM (jnZH@2=MY;z#MgGd& X*:E>bH~`IbٽXWZ#LQo0N4KET9upx}zs`35Ј'2rKӒkl$TۿxPv֌4#CZ$?zgZW\%sY<Vd!+\6ًaCPو%I/U@pP'~Yx!f8 G3!{+oMIZKD{jk*l +VR vW]JE5]@MW&#D׬ c,ə V(:TZw@w&uDe[gdt%6 RH(~aP\| G>FgւvC( N9ZDD>֤^4FPrK7EOsvz,(Im{61!RiQOE~h YZ