libgcrypt-cavs-debuginfo-1.8.2-lp152.17.3.1 4>$  Ap`ԓS/=„#>9~4gb?E4jz?x|q=!wn=3Qx{ U2"LvUNaaz_hMGM~d"YAe#,.&!ESLTFwn` )ZlXfjGuMjwiGA%nG DڦԚ:$]UGucfH\F|evG&k[Qm"x4Ӛ`ϼk k5f55b280290be965184b7750d374693cbcd487a095a6a76c0e3bcb2523c5c95975d521ba6834e06854207296e6321abcec583ce2L`ԓS/=„RCܺZR^Pڞ1PN~QCc6Ոl ͋˟A Itc lZ$2&LS'HjAp‚呕%`Ve@ɍor#8Ιs4HJ^8r H{H7 4NzFҮw-DPe+xPv1k5vzJo=7ou.k7n .p>p@_<?_, , Y /8d }  4 l  T@(38<696: 6FWGWHWIX XXYX,\X]X^Z bZc[d\"e\'f\*l\,u\@v\xw^x^Ty^z^^^^^^^_(libgcrypt-cavs-debuginfo1.8.2lp152.17.3.1Debug information for package libgcrypt-cavsThis package provides debug information for package libgcrypt-cavs. Debug information is useful when developing applications that use this package or when debugging this package.`ԓ>lamb26openSUSE Leap 15.2openSUSEGFDL-1.1 AND GPL-2.0+ AND LGPL-2.1+ AND MIThttp://bugs.opensuse.orgDevelopment/Debughttp://directory.fsf.org/wiki/Libgcryptlinuxx86_64/]-[|AAAAAAAA큤`ԓ>`ԓ>`ԓ>`ԓ>`ԓ>`ԓ>`ԓ>`ԓ>`Ԓ`Ԓ`Ԓ`Ԓ`Ԓ`Ԓ1edf5ed163e0802535ee885d7554c6edee2103dce137480e4f2c788653e89685bb95a56770746a00a3bf56040254dbedd8b4cc724e4f6f75397748f6e0f1484c../../../../../usr/lib/libgcrypt/cavs/drbg_test../../../../../usr/lib/debug/usr/lib/libgcrypt/cavs/drbg_test-1.8.2-lp152.17.3.1.x86_64.debug../../../../../usr/lib/libgcrypt/cavs/fipsdrv../../../../../usr/lib/debug/usr/lib/libgcrypt/cavs/fipsdrv-1.8.2-lp152.17.3.1.x86_64.debugrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootlibgcrypt-1.8.2-lp152.17.3.1.src.rpmdebuginfo(build-id)debuginfo(build-id)libgcrypt-cavs-debuginfolibgcrypt-cavs-debuginfo(x86-64)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1`P@^@^@^H^@^@^|@^|@^j$@^U @^%@^!^!]@]e@]]ʞ]m@]A]0_@]G@\@\@\@\[@[*AZ@Z@ZZ1@YYu@YqYTY3@Y1S@XXRXOWF@WQW9@W9@VVUUJ@T@TTԬTԬTԬTZ@Pedro Monreal Pedro Monreal Gonzalez Pedro Monreal Gonzalez Vítězslav Čížek Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Vítězslav Čížek Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Jason Sikes Jason Sikes Jason Sikes Vítězslav Čížek Vítězslav Čížek Vítězslav Čížek Pedro Monreal Gonzalez Pedro Monreal Gonzalez psimons@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comfvogt@suse.comastieger@suse.comastieger@suse.comjengelh@inai.deastieger@suse.comastieger@suse.comastieger@suse.compmonrealgonzalez@suse.comrmaliska@suse.comastieger@suse.comastieger@suse.commpluskal,vcizek,astieger}@suse.comastieger@suse.compjanouch@suse.depjanouch@suse.deastieger@suse.comastieger@suse.comvcizek@suse.comdvaleev@suse.comastieger@suse.comastieger@suse.comcoolo@suse.comdimstar@opensuse.orgcoolo@suse.comandreas.stieger@gmx.de- Security fix: [bsc#1187212, CVE-2021-33560] * Libgcrypt mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm - Add patches: * libgcrypt-CVE-2021-33560-ElGamal-exponent-blinding.patch * libgcrypt-CVE-2021-33560-fix-ElGamal-enc.patch- FIPS: RSA/DSA/ECC test_keys() print out debug messages [bsc#1171872] * Print the debug messages in test_keys() only in debug mode. - Update patches: libgcrypt-PCT-RSA.patch libgcrypt-PCT-DSA.patch libgcrypt-PCT-ECC.patch- FIPS: libgcrypt: Double free in test_keys() on failed signature verification [bsc#1169944] * Use safer gcry_mpi_release() instead of mpi_free() - Update patches: * libgcrypt-PCT-DSA.patch * libgcrypt-PCT-RSA.patch * libgcrypt-PCT-ECC.patch- Ship the FIPS checksum file in the shared library package and create a separate trigger file for the FIPS selftests (bsc#1169569) * add libgcrypt-fips_selftest_trigger_file.patch * refresh libgcrypt-global_init-constructor.patch - Remove libgcrypt-binary_integrity_in_non-FIPS.patch obsoleted by libgcrypt-global_init-constructor.patch- FIPS: Verify that the generated signature and the original input differ in test_keys function for RSA, DSA and ECC: [bsc#1165539] - Add zero-padding when qx and qy have different lengths when assembling the Q point from affine coordinates. - Refreshed patches: * libgcrypt-PCT-DSA.patch * libgcrypt-PCT-RSA.patch * libgcrypt-PCT-ECC.patch- FIPS: Switch the PCT to use the new signature operation [bsc#1165539] * Patches for DSA, RSA and ECDSA test_keys functions: - libgcrypt-PCT-DSA.patch - libgcrypt-PCT-RSA.patch - libgcrypt-PCT-ECC.patch - Update patch: libgcrypt-FIPS-RSA-DSA-ECDSA-hashing-operation.patch- FIPS: Fix drbg to be threadsafe [bsc#1167674] * Detect fork and re-open devices in_gcry_rndlinux_gather_random * libgcrypt-check-re-open-dev_random-after-fork.patch- FIPS: Run self-tests from constructor during power-on [bsc#1166748] * Set up global_init as the constructor function: - libgcrypt-global_init-constructor.patch * Relax the entropy requirements on selftest. This is especially important for virtual machines to boot properly before the RNG is available: - libgcrypt-random_selftests-testentropy.patch - libgcrypt-rsa-no-blinding.patch - libgcrypt-ecc-ecdsa-no-blinding.patch * Fix benchmark regression test in FIPS mode: - libgcrypt-FIPS-GMAC_AES-benckmark.patch- Remove check not needed in _gcry_global_constructor [bsc#1164950] * Update libgcrypt-Restore-self-tests-from-constructor.patch- FIPS: Run the self-tests from the constructor [bsc#1164950] * Add libgcrypt-invoke-global_init-from-constructor.patch- ECDSA: Check range of coordinates (bsc#1161216) * add libgcrypt-ECDSA_check_coordinates_range.patch- FIPS: libgcrypt DSA PQG parameter generation: Missing value [bsc#1161219] - FIPS: libgcrypt DSA PQG verification incorrect results [bsc#1161215] - FIPS: libgcrypt RSA siggen/keygen: 4k not supported [bsc#1161220] * Add patch from Fedora libgcrypt-1.8.4-fips-keygen.patch- FIPS: keywrap gives incorrect results [bsc#1161218] * Add libgcrypt-AES-KW-fix-in-place-encryption.patch- FIPS: RSA/DSA/ECDSA are missing hashing operation [bsc#1155337] * Add libgcrypt-FIPS-RSA-DSA-ECDSA-hashing-operation.patch- Fix tests in FIPS mode: * Fix tests: basic benchmark bench-slope pubkey t-cv25519 t-secmem * Add patch libgcrypt-fix-tests-fipsmode.patch- Fix test dsa-rfc6979 in FIPS mode: * Disable tests in elliptic curves with 192 bits which are not recommended in FIPS mode * Add patch libgcrypt-dsa-rfc6979-test-fix.patch- CMAC AES and TDES FIPS self-tests: * CMAC AES self test missing [bsc#1155339] * CMAC TDES self test missing [bsc#1155338] - Add libgcrypt-CMAC-AES-TDES-selftest.patch- Security fix: [bsc#1148987,CVE-2019-13627] * Mitigation against an ECDSA timing attack * Added libgcrypt-CVE-2019-13627.patch- Fixed an issue created by incomplete implementation of previous change - [bsc#1097073] * Removed section of libgcrypt-binary_integrity_in_non-FIPS.patch that caused some tests to be executed more than once.- Fixed a race condition in initialization. * Added libgcrypt-1.8.4-allow_FSM_same_state.patch - Security fix: [bsc#1138939, CVE-2019-12904] * The C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) * Added patches: - libgcrypt-CVE-2019-12904-GCM-Prefetch.patch - libgcrypt-CVE-2019-12904-GCM.patch - libgcrypt-CVE-2019-12904-AES.patch - Fixed env-script-interpreter in cavs_driver.pl- Fixed redundant fips tests in some situations causing sudo to stop working when pam-kwallet is installed. bsc#1133808 * Added libgcrypt-1.8.4-fips_ctor_skip_integrity_check.patch * Removed libgcrypt-fips_ignore_FIPS_MODULE_PATH.patch because it was obsoleted by libgcrypt-1.8.4-fips_ctor_skip_integrity_check.patch- libgcrypt-1.8.3-fips-ctor.patch changed the way the fips selftests are invoked as well as the state transition, adjust the code so a missing checksum file is not an issue in non-FIPS mode (bsc#1097073) * update libgcrypt-binary_integrity_in_non-FIPS.patch- Enforce the minimal RSA keygen size in fips mode (bsc#1125740) * add libgcrypt-fips_rsa_no_enforced_mode.patch- Don't run full self-tests from constructor (bsc#1097073) * Don't call global_init() from the constructor, _gcry_global_constructor() from libgcrypt-1.8.3-fips-ctor.patch takes care of the binary integrity check instead. * Only the binary checksum will be verified, the remaining self-tests will be run upon the library initialization - Add libgcrypt-fips_ignore_FIPS_MODULE_PATH.patch - Drop libgcrypt-init-at-elf-load-fips.patch and libgcrypt-fips_run_selftest_at_constructor.patch- Skip all the self-tests except for binary integrity when called from the constructor (bsc#1097073) * Added libgcrypt-1.8.3-fips-ctor.patch- Fail selftests when checksum file is missing in FIPS mode only (bsc#1117355) * add libgcrypt-binary_integrity_in_non-FIPS.patch- Apply "CVE-2018-0495.patch" from upstream to enable blinding for ECDSA signing. This change mitigates a novel side-channel attack. [CVE-2018-0495, bsc#1097410]- Suggest libgcrypt20-hmac for package libgcrypt20 to ensure they are installed in the right order. [bsc#1090766]- Extended the fipsdrv dsa-sign and dsa-verify commands with the - -algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455). * Added libgcrypt-fipsdrv-enable-algo-for-dsa-sign.patch * Added libgcrypt-fipsdrv-enable-algo-for-dsa-verify.patch- Use %license (boo#1082318)- libgcrypt 1.8.2: * Fix fatal out of secure memory status in the s-expression parser on heavy loaded systems. * Add auto expand secmem feature or use by GnuPG 2.2.4- libgcrypt 1.8.1: * Mitigate a local side-channel attack on Curve25519 dubbed "May the Fourth be With You" CVE-2017-0379 bsc#1055837 * Add more extra bytes to the pool after reading a seed file * Add the OID SHA384WithECDSA from RFC-7427 to SHA-384 * Fix build problems with the Jitter RNG * Fix assembler code build problems on Rasbian (ARMv8/AArch32-CE)- RPM group fixes.- libgcrypt 1.8.0: * New cipher mode XTS * New hash function Blake-2 * New function gcry_mpi_point_copy. * New function gcry_get_config. * GCRYCTL_REINIT_SYSCALL_CLAMP allows to init nPth after Libgcrypt. * New gobal configuration file /etc/gcrypt/random.conf. * GCRYCTL_PRINT_CONFIG does now also print build information for libgpg-error and the used compiler version. * GCRY_CIPHER_MODE_CFB8 is now supported. * A jitter based entropy collector is now used in addition to the other entropy collectors. * Optimized gcry_md_hash_buffers for SHA-256 and SHA-512. random pool lock). * Interface changes relative to the 1.7.0 release: gcry_get_config NEW function. gcry_mpi_point_copy NEW function. GCRYCTL_REINIT_SYSCALL_CLAMP NEW macro. GCRY_MD_BLAKE2B_512 NEW constant. GCRY_MD_BLAKE2B_384 NEW constant. GCRY_MD_BLAKE2B_256 NEW constant. GCRY_MD_BLAKE2B_160 NEW constant. GCRY_MD_BLAKE2S_256 NEW constant. GCRY_MD_BLAKE2S_224 NEW constant. GCRY_MD_BLAKE2S_160 NEW constant. GCRY_MD_BLAKE2S_128 NEW constant. GCRY_CIPHER_MODE_XTS NEW constant. gcry_md_info DEPRECATED. - Refresh patch libgcrypt-1.6.3-aliasing.patch- libgcrypt 1.7.8: * CVE-2017-7526: Mitigate a flush+reload side-channel attack on RSA secret keys (bsc#1046607)- libgcrypt 1.7.7: * Fix possible timing attack on EdDSA session key (previously patched, drop libgcrypt-secure-EdDSA-session-key.patch) * Fix long standing bug in secure memory implementation which could lead to a segv on free- Added libgcrypt-secure-EdDSA-session-key.patch [bsc#1042326] * Store the session key in secure memory to ensure that constant time point operations are used in the MPI library.- libgcrypt 1.7.6: * Fix counter operand from read-only to read/write * Fix too large jump alignment in mpih-rshift- libgcrypt 1.7.5: * Fix regression in mlock detection introduced with 1.7.4- libgcrypt 1.7.4: * ARMv8/AArch32 performance improvements for AES, GCM, SHA-256, and SHA-1. * Add ARMv8/AArch32 assembly implementation for Twofish and Camellia. * Add bulk processing implementation for ARMv8/AArch32. * Add Stribog OIDs. * Improve the DRBG performance and sync the code with the Linux version. * When secure memory is requested by the MPI functions or by gcry_xmalloc_secure, they do not anymore lead to a fatal error if the secure memory pool is used up. Instead new pools are allocated as needed. These new pools are not protected against being swapped out (mlock can't be used). Mitigation for minor confidentiality issues is encryption swap space. * Fix GOST 28147 CryptoPro-B S-box. * Fix error code handling of mlock calls.- libgcrypt 1.7.3: * security issue already fixes with 1.6.6 * Fix building of some asm modules with older compilers and CPUs. * ARMv8/AArch32 improvements for AES, GCM, SHA-256, and SHA-1. - includes changes from libgcrypt 1.7.2: * Bug fixes: - Fix setting of the ECC cofactor if parameters are specified. - Fix memory leak in the ECC code. - Remove debug message about unsupported getrandom syscall. - Fix build problems related to AVX use. - Fix bus errors on ARM for Poly1305, ChaCha20, AES, and SHA-512. * Internal changes: - Improved fatal error message for wrong use of gcry_md_read. - Disallow symmetric encryption/decryption if key is not set. - includes changes from 1.7.1: * Bug fixes: - Fix ecc_verify for cofactor support. - Fix portability bug when using gcc with Solaris 9 SPARC. - Build fix for OpenBSD/amd64 - Add OIDs to the Serpent ciphers. * Internal changes: - Use getrandom system call on Linux if available. - Blinding is now also used for RSA signature creation. - Changed names of debug envvars - includes changes from 1.7.0: * New algorithms and modes: - SHA3-224, SHA3-256, SHA3-384, SHA3-512, and MD2 hash algorithms. - SHAKE128 and SHAKE256 extendable-output hash algorithms. - ChaCha20 stream cipher. - Poly1305 message authentication algorithm - ChaCha20-Poly1305 Authenticated Encryption with Associated Data mode. - OCB mode. - HMAC-MD2 for use by legacy applications. * New curves for ECC: - Curve25519. - sec256k1. - GOST R 34.10-2001 and GOST R 34.10-2012. * Performance: - Improved performance of KDF functions. - Assembler optimized implementations of Blowfish and Serpent on ARM. - Assembler optimized implementation of 3DES on x86. - Improved AES using the SSSE3 based vector permutation method by Mike Hamburg. - AVX/BMI is used for SHA-1 and SHA-256 on x86. This is for SHA-1 about 20% faster than SSSE3 and more than 100% faster than the generic C implementation. - 40% speedup for SHA-512 and 72% for SHA-1 on ARM Cortex-A8. - 60-90% speedup for Whirlpool on x86. - 300% speedup for RIPE MD-160. - Up to 11 times speedup for CRC functions on x86. * Other features: - Improved ECDSA and FIPS 186-4 compliance. - Support for Montgomery curves. - gcry_cipher_set_sbox to tweak S-boxes of the gost28147 cipher algorithm. - gcry_mpi_ec_sub to subtract two points on a curve. - gcry_mpi_ec_decode_point to decode an MPI into a point object. - Emulation for broken Whirlpool code prior to 1.6.0. [from 1.6.1] - Flag "pkcs1-raw" to enable PCKS#1 padding with a user supplied hash part. - Parameter "saltlen" to set a non-default salt length for RSA PSS. - A SP800-90A conforming DRNG replaces the former X9.31 alternative random number generator. - Map deprecated RSA algo number to the RSA algo number for better backward compatibility. [from 1.6.2] - Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. [from 1.6.3] - Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. [from 1.6.3] - Flag "no-keytest" for ECC key generation. Due to a bug in the parser that flag will also be accepted but ignored by older version of Libgcrypt. [from 1.6.4] - Speed up the random number generator by requiring less extra seeding. [from 1.6.4] - Always verify a created RSA signature to avoid private key leaks due to hardware failures. [from 1.6.4] - Mitigate side-channel attack on ECDH with Weierstrass curves [CVE-2015-7511]. See http://www.cs.tau.ac.IL/~tromer/ecdh/ for details. [from 1.6.5] * Internal changes: - Moved locking out to libgpg-error. - Support of the SYSROOT envvar in the build system. - Refactor some code. - The availability of a 64 bit integer type is now mandatory. * Bug fixes: - Fixed message digest lookup by OID (regression in 1.6.0). - Fixed a build problem on NetBSD - Fixed some asm build problems and feature detection bugs. * Interface changes relative to the 1.6.0 release: gcry_cipher_final NEW macro. GCRY_CIPHER_MODE_CFB8 NEW constant. GCRY_CIPHER_MODE_OCB NEW. GCRY_CIPHER_MODE_POLY1305 NEW. gcry_cipher_set_sbox NEW macro. gcry_mac_get_algo NEW. GCRY_MAC_HMAC_MD2 NEW. GCRY_MAC_HMAC_SHA3_224 NEW. GCRY_MAC_HMAC_SHA3_256 NEW. GCRY_MAC_HMAC_SHA3_384 NEW. GCRY_MAC_HMAC_SHA3_512 NEW. GCRY_MAC_POLY1305 NEW. GCRY_MAC_POLY1305_AES NEW. GCRY_MAC_POLY1305_CAMELLIA NEW. GCRY_MAC_POLY1305_SEED NEW. GCRY_MAC_POLY1305_SERPENT NEW. GCRY_MAC_POLY1305_TWOFISH NEW. gcry_md_extract NEW. GCRY_MD_FLAG_BUGEMU1 NEW [from 1.6.1]. GCRY_MD_GOSTR3411_CP NEW. GCRY_MD_SHA3_224 NEW. GCRY_MD_SHA3_256 NEW. GCRY_MD_SHA3_384 NEW. GCRY_MD_SHA3_512 NEW. GCRY_MD_SHAKE128 NEW. GCRY_MD_SHAKE256 NEW. gcry_mpi_ec_decode_point NEW. gcry_mpi_ec_sub NEW. GCRY_PK_EDDSA NEW constant. GCRYCTL_GET_TAGLEN NEW. GCRYCTL_SET_SBOX NEW. GCRYCTL_SET_TAGLEN NEW. - Apply libgcrypt-1.6.3-aliasing.patch only on big-endian architectures - update drbg_test.patch and install cavs testing directory again - As DRBG is upstream, drop pateches: v9-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch 0002-Compile-DRBG.patch 0003-Function-definitions-of-interfaces-for-random.c.patch 0004-Invoke-DRBG-from-common-libgcrypt-RNG-code.patch 0005-Function-definitions-for-gcry_control-callbacks.patch 0006-DRBG-specific-gcry_control-requests.patch v9-0007-User-interface-to-DRBG.patch libgcrypt-fix-rng.patch - drop obsolete: libgcrypt-fips-dsa.patch libgcrypt-fips_ecdsa.patch- libgcrypt 1.6.6: * fix CVE-2016-6313: Issue in the mixing functions of the random number generators allowed an attacker who obtained a number of bytes from the standard RNG to predict some of the next ouput. (bsc#994157)- remove conditionals for unsupported distributions (before 13.2), it would not build anyway because of new dependencies- make the -hmac package depend on the same version of the library, fixing bsc#979629 FIPS: system fails to reboot after installing fips pattern- update to 1.6.5: * CVE-2015-7511: Mitigate side-channel attack on ECDH with Weierstrass curves (boo#965902)- follow-up to libgcrypt 1.6.4 update: sosuffix is 20.0.4- update to 1.6.4 - fixes libgcrypt equivalent of CVE-2015-5738 (bsc#944456) * Speed up the random number generator by requiring less extra seeding. * New flag "no-keytest" for ECC key generation. Due to a bug in the parser that flag will also be accepted but ignored by older version of Libgcrypt. * Always verify a created RSA signature to avoid private key leaks due to hardware failures. * Other minor bug fixes.- Fix gpg2 tests on BigEndian architectures: s390x ppc64 libgcrypt-1.6.3-aliasing.patch- fix sosuffix for 1.6.3 (20.0.3)- libgcrypt 1.6.3 [bnc#920057]: * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. - update upstream signing keyring- making the build reproducible - see http://lists.gnupg.org/pipermail/gnupg-commits/2014-September/010683.html for a very similiar problem- Move %install_info_delete calls from postun to preun: the files must still be present to be parsed. - Fix the names passed to install_info for gcrypt.info-[12].gz instead of gcrypt-[12].info.gz.- fix filename for info pages in %post scripts- libgcrypt 1.6.2: * Map deprecated RSA algo number to the RSA algo number for better backward compatibility. * Support a 0x40 compression prefix for EdDSA. * Improve ARM hardware feature detection and building. * Fix building for the x32 ABI platform. * Fix some possible NULL deref bugs. - remove libgcrypt-1.6.0-use-intenal-functions.patch, upstream via xtrymalloc macro - remove libgcrypt-fixed-sizet.patch, upstream - adjust libgcrypt-1.6.1-use-fipscheck.patch for xtrymalloc changelamb26 1624544062 5993985b0de59a087eeb3bb484bdcb4796f88140bc3d88a77669fa1a3c15b269b6f8aeac7e34bee41.8.2-lp152.17.3.11.8.2-lp152.17.3.1debug.build-id5993985b0de59a087eeb3bb484bdcb4796f8814093985b0de59a087eeb3bb484bdcb4796f88140.debugbc3d88a77669fa1a3c15b269b6f8aeac7e34bee43d88a77669fa1a3c15b269b6f8aeac7e34bee4.debugusrliblibgcryptcavsdrbg_test-1.8.2-lp152.17.3.1.x86_64.debugfipsdrv-1.8.2-lp152.17.3.1.x86_64.debug/usr/lib//usr/lib/debug//usr/lib/debug/.build-id//usr/lib/debug/.build-id/59//usr/lib/debug/.build-id/bc//usr/lib/debug/usr//usr/lib/debug/usr/lib//usr/lib/debug/usr/lib/libgcrypt//usr/lib/debug/usr/lib/libgcrypt/cavs/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:16602/openSUSE_Leap_15.2_Update/412aa4b6bcf12d4bdbf3394ac45afd30-libgcrypt.openSUSE_Leap_15.2_Updatecpioxz5x86_64-suse-linuxdirectoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter *empty*, BuildID[sha1]=5993985b0de59a087eeb3bb484bdcb4796f88140, for GNU/Linux 3.2.0, with debug_info, not strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter *empty*, BuildID[sha1]=bc3d88a77669fa1a3c15b269b6f8aeac7e34bee4, for GNU/Linux 3.2.0, with debug_info, not strippedPP* lP;wci]libgcrypt-debugsource(x86-64)1.8.2-lp152.17.3.1utf-8c9229c76724fcb792ccc912c77096fe83824b516908cafe412257cb300a34f67?7zXZ !t/˲] crt:bLL .lA2/N}_:j-ejDUbuH FN,H;:iF"Ѕ0ÿ|B[M2v_ZA(L*H)V#kJ9u8޵ݚ= V/yW7 m!x6)Fyޞ-1-c*|CytQEq 7O.|ѱVesvŠG-†Ge%8 BL3SUqm72Rp;>+1)iCYjM9ą R99.x:6_o#~ym;yR# [on2̌޿~ ܛ)ȍ9H/7Eg}ǚՁ bJԢX =x4Lr]]2߈NK>'[81:ok[O2giA$f/hV˂ˣ/w_%,|7t8P;BZ9řgw46AG~xi}dݠAJ! W9!/[lZn$C3@㠗*V[tռO[6kZj+_I}}󀳘{ 2Er"~nXU֫q8$ݚojw+'ٰBd$U#}1ܨ; 'W'y3Bs*bcQ<9.URX?%:n[_glc$({$׵ʥW^{fdW@risENQ"6Csy,W pw!.c`Sv}PgHqe:4zۘvkļh k=ѯF0!Gh)")?J$* I:"=pk ^\IOF䙛Γ2۪ELLnyR^mnsɄruoSg?@!;axB0* U,? NgǛ8cOުƑ&4v3@qm|Y{~zuXNE×G &^UEE|dY!y)`!}ػ]7Ą!qۨqdME(G Og$S\H Y2 "%(jELɍhx~<ԓ>U\x\%=6vȬ4b_8Ia}]El l. ԝY!״>%uqaJuDZl6{<=`0G]Pѕه7VGͺ q-6Fs99L0G(#!̉3k K$>4M%WbRM(%f|r0@>;DeH;z!agԃ8EOzVcpe-vr ?d+j' s -PU}z!|ECmg8-*mQ 扣E!ƃ -&jvPo3Z]K^Rs~]Q3<[3lwNzȷG:.fI|Z׾5T^i}XoA,euɘząN2ZR0) 0QtJ,\ t~F"/>̾+7j8DuZsF*q&7qiejor V 2gV@UJ=6lȩiޡ0Zyz2~qd!q`gHXǯ*csx4Ԕ߶zu7zNg,cߛDBbje@ P=]<a%?cJ_<ߢmȂ@)nlIoAMWQ `jdJls#䱑 ==,.jP_N/T +M%R fhs@OE`dL'4?::-QMԐ +c BWe𕬷0iHzZ^!+֣E+Y"R%6NgPW(rMdۖZ?C- Zz`)RLBDB2*o&A{er2Tj1+raw:S խ.3xy"0RkTۧ :`Gj$ +Y& ;JH. %M]}Uwܒ-̪(ė""/EOBEٮsY@E0h3Hx0U{n[FZ zsa4Md\p2 LuNAv}0vFel; ]Q>z,' d`VTБ >͹K)O)su9!0HzXۏ6)AW &Ecc#h%.:<^sjAC^d'5QJ'gt5毆QjQX !Dl#<-!]_dBmY,]8`ψ?4 1HT!1N}xũ0Wz'f޲CA c˯aSո:pH je{g );WO5WNxJؖT恙l̀E3wM@m1#|HEIÏ4pq;i%7/ۯSp\XO0xgȇ&05K YF}9aM/+6B͙NOZNjnΈ$=KjxވH6l1x1(p`5Oyqַg3(t#3GR}61r믕+t5nhOf肶`hII}pЌ_w/s>7d;Ә"8+(]{3#nj1KmM. \@wR>`LalL'PU|K̓?/cл2@QujggL *#i`w/א/-*?AO5;%Һ2RȎZȌ2-y4 T iMJ9EyٻLNF~^U8 B>:V,FR LS hZ 5 iYMvq#tm,WËB2w0SG2': IkɡfɽľR.>Q/<~~_`~Ы:&}5&}y6R>_ⷎ4 ,=>z[xε*:2'ȶiIGqf.jTn )o#mxڔU6/Z\$2?.=6[d_ b+RΦ@1'c*DKΝtGi4Rbd+fzNEĥөbvc.Pg9Hl.!ӛ|ѬVȻ4IUbOWJXZ"|bS'p0b/8H-#V ,H(4|ffՄ³~eG0Z18 vA߈x`!m9ki0p] M=蓱rn30ZrILb7 s u6RgrX-twu< e{Գ'd5/wU}XR}YNZ6pCyVe[eAq{mPs'PLVr@WVo#1,@-@6(C(0I"= y1Zzѣ޽=T84顆kP9>p,#+8i Z{}ϰf %6%1*\k tI[T?. E`4:ΦL h޻?=M򨦗R=5: .rpzW:5cאXJuӞW;@AAZhۍ{ădVE(.Xɳp٩Y r֬bTܫ|fZOU"Zz }|$H^0w'\tUc}sN6ϫ]*3NUt3.B.e0"CᎳ) I$<-S &2C:G[3cLlOo).1 b<"sN@B&.<'ߌTwy2 k+Y"_;2*ĩ/{ "eb2ykjQ=HR&v %Qn%`,gt ^ E [n]5CRk^ۺqD4h–M{M}hK_r熑:3YH7:aGƃù-wߚD+ (_zNO+P1O^ٶaF_|:W#.rpa;"0ZM/ MBT'@HE*\TMNgb4X*v!W~`MˆM݆x I)?gBE`v#Jtߔù") ˤ9lb8pq6><ʩ߽/ td;KHT 3tQD A~7GmV& $-ܞa.?fdQaqFȌXGEHq\v-D4?3y Zknap0%6bh돛Y>a-y$ӬDRO(\{$ *? ?ޙHr;Cjo%>b/y"=R13%ˉvg/J@Jd OkM,*֯]b4*]]IX9@* 0dwd蜫V$M&WX?T3$z!Wy+]z1> ,݊o9w7|, Xeb, BGfycl@`ʕnǹ,t\F '^&ͯd=o?=ys'ޘɰ㮥D%+e CT=ۇm{lEE 9w hfP[u1:-q!941/Is!?Rwa-::ug'jq N1a0OIDrPTEaQ]BoJ%a_R=e$p[rwXL07$8ЏfTc:SnG5]:X {Zd4OѺKiֵɠ6>JWܿ0=ܕC`)H #G"tH4\|r,^ֈ}O=|Lk.ꆮTC n1'ܥ@!T3nEx'1ۚ`ڨV#fC3PtwTba"?mM[9*&K[ @Ͳz,zOJ{6 a|EAH ~xgȮ25jSgS*i]T4/bm9fno8/]~=˼u"ط^2s >ʜ^(2T.Jp~'+-d<_!ϯ;Cxnds 0IWB~ ߭Ĵ ơKTJ<"CΪ-sɜf<#iysqg俔kbly`h|ƒ]:He~X+h:X^#Bi?2<%psnSn7M5)LI9-˛fU;+&*Pb$VuжPcX+{|_C/IPeln{x ~kóζZO>: 42Pܣ,nUvr t$0r ^2T5 7d<D!wyA4sZI8W5iK{ A:wH@ta.~E.ژU_ @$c Mw$ S̜ԍtd#x ;ib@-;mK Ҫ 40!軄_-jb Jp\畮wy|*Z}c1-(H.'np,:~)q bKVLw*(Q!JN,ls_Sa^|JSs齝3֖FbE2 0 D؂bu# !VQ'ғ8 aT _NқY87ゐ]]nc~nϐuk3qQei - Z -v͐gQ4ÀwLhNʢ/":/(9e6$nGX7P]Q։*ʂ v|.ipHϬ[p>^9PQyeb2QpB w#sջ #5O6 V Sy%g25vy4 ѕ& +ū43xꀢ@U0QHݪa Sqiȕ) yg?2QH=]}K9&済27WC䫸]kr5AeWd30FNX0V#kGnIXhT>8]} Uܬ̦ٝ|Ǝ}Sn]dhFd~&Y$,: bPW3wlv۱w7&|Kj|v@n7 zgUĶI%!v˨ۗ[nhy=p^VvJ ][08UCo4}HUb#|;n SQ2 Fyrp9 1.[gKZ @%V Uf=H.qKu]QNv+5XꛅXOfk68aYDgkW)XX`n )'pUhC='&;'tW5]*K5|^ygSdnO%O%2Ο vvެ/{:0z/NЧp2eQ5Ust#Z󨑏, q7ϛjtIR࿔Yм8Melu( sj?jq Q3DXy\,VNy'OښZ&Dr))"aU0GЙձ\O0]&9<~Wv3u\n̍Lp>fvHN'rX_C!ͱP10F-w`A_ss'*7D7??cEa #{!זZ\XxXSk䧼IEElv¡As4|&x ]=ZOVп^?;BDe"y䔄1I{Te%xG,p$ӑD"ܻ+,ng |[ !nm2_IJr?VkW:ɐwhĐ2,gJ;r~AFmR؞CgA5ks>]d5;*jC) _NS Ozh¸$O÷TdVU_zW3ɒW*"(1/+U[-&!7i)ŭ\o4V HSȊx;硡*O2JWiY?̵3N!dӒfPYp6y=](=yPer͸:\'IK aTQM#Ą|jIRakUWq?]V5ejl\X)R_̋ډ[98].+mk> oUCn:)(\OsOx.#,fW;Bm'/zZ"~оkc^t1]X̜W^p2AlJ)’#4Q P")1t@nR::V[[/u+G8 z(UpH>] 1Ԓ@RAdYSok|!|Pj Bg-Eo!at{fa1ŋՊ]E+Nmiz?s-WQX ha;-䫆cwodE+֨KɎ8(߂I2JQ%IQőMaQ#_c+OZ|)%gŌYL ĭzW+cMРƐ5t@">WIrna:!yp _K@2p#4G׺2F^30?x^z 1=fqDrh=a:40Tr-=RHP˹"9P`d/|$|kncmo3@0=~\+ƌD^D!ߓGsMGI|kΡt$; txK9d-Içم0BdLۀCchjɯB κXSVR6V8$+K Zobg*-Ą;;'1K e .X)<>FrCw(}13V]TCܡ.Bѡwj ~I_S_G}9 y (Oـ@cGM8o܉dT~mq*ت~ZóJ~_la쾸Ҍ\MK<G > +bXXXlao??㩱x>qy7#ī) PKoys8 sJ8J> '3n`֌M4*ڒ" 9Gy1]+Zql N~7V O%OTwrT ?U gnI d(2H6vW6 /sxJ C~EODs(/[|8ou}gUgR"HM͕Ȟ;W3ѣ2Hb(+Vjea])R]ij'hзqT9 XC\,9>z$/q $ /"Ya(RAGw[9G \t*Mj!*j[坎=rO:bw. s|Q է Q楞 #x[ȟ&$Y 8Ȍ4˵}Wl{7ۆ*(`pXN?r73"NSvDlֺpj3c1Y>vmRԴe^efBbfV;04!-)TNO*`0R tcp+qSУy[Ljc:}5 ZC)oC`:%an*n/H1P CHdI-v;/DhW̑ho:dM6λhT1&M Oi1pNұAJKk fZ2U?nJhY ZsFo4!x1AOReP̄O='1vhL"أAtm9BG ߪZ&ÝR01lZ-|zΎckcqzjw#=v*/# ~^6@VirqWn`O!b՜q`P^,[#Dl9cFujc Oc FUV?Jf(9_{h7S.=5avd}[^Anb3k`Mqj?y@+egO7u-DHH.X ÏG |"eYXKt(7rq#z*e MUGj&̺iӆcWm5b3,IELŲPJq#PEDn'KU_^|\|W"&F(S}#͸WeKg'@KAVu:O0w"xQIV&DJE 8+S'*_q2i?aH'`n$L~37|i >7Wsgd٪Ɔ|5j+҃N7^GP %74{'Vo2ڊg¼*QՕq_to\4È gSA@g3VFWn-!TW:.GRr|%q0w@%cmGy~Ks~\{z/n\ *E*ے JypvOJӦ*Vd 2Fbn AeF|W< /ڡd4)%goþGwJnz53S{;˨Kꆟ*gC\%֪S֖^)EDįo.-Hi3vNgS\<ZXvۏCb>)%A'u'poI"KA8QCNfUSDO((q 4aBJaMt2Fia߁\Ј+j``%?1񋻎gҕB-KBR{kXӍVhw{萌y 1 *TA5lAXGÇo ޫ+R ׀{˚)-z"Gt>PjS(ҵN>݃܉ &Xji^@&{PѥW0H%6QuYfE+TM1vbys鰟g?zvjhPKDAknbfP: 7D e/j8e]m෍9)ZiH\5hJLN ȧˤQ63cX}o"cYT+c('|<ށ͕Sh#Kjz:FËM we P=5V4ڬih_O)#c6sAC1+'z3/Ac.5䧥 rG/ȭƕk{K@mz} fMyQ۵ ^?FƊ{īfa|ڥշ ~,C=|+`ӿmW{K|+B7!?!LP!;B~IAAO+j7n9`54{%X 2F|ӱ_~>$D jRJ0DR%v~,ݮR3]tքTڪ<uQi\)eь3T_ 2<n%Txów&e!x\UfWVw2R0qnDhkb[wi^Q+cdԳjH|;7 7iI#b~E9^xdrf[Z|eP/}DR+w^>Xa ӍN&Qo %9*[WM~ @=Lv2 _uoyV[ܙwV[ mCd7l6@vs{z0UHpc1^`d-a^?dIX ljΚRt LAO1u }"07I}Vm+*)6ǠAg}a: hU\&PGΪB" LW[RTF=kt/X CJvEw ] -%d8LVMwm\>1 i2d_{ @۹-ܚio.Pin-Vnİ}Z{ =v 83G,b_ͯH Ɩ8 @+ +m GLOm7OUADψ:ClZ`wJ)s'8:Fv">Y\oR.4Qf笰 ŇIE"YH_%CwJY.Ȏ8=JOQGܓ$ߐ/Y6ɝy3S,ے>,ѵ*+@PLQG6dbr]z-)#W#):F(g%ǤY_tk8y<X=}4d4)|3/e.R-7ǽFLl'oH^ ;x!EL~EkI)8d i-N4s>0ݦ=*gTԑA8{j*j@XsD_!eh~qd;`iEv]?޽NcaxThlbNUO9,^h'P?O_ [l)#<z .|P~>5;3Ch\e<9P(H !*eD"ݍs·?e6 yv m*8}Y(Ֆ#LVKxdaJqRW%qS׊ 5NJEzaȋ"9vBRP11RۊWƱ~+nGq埕S~|C/>[Fu$17vjO_{4PBf࿙on8ؚ#*FstY`(}Jݗ}N{ס",SQޏ 5ޜXqFЍ, ٜBtlnAkC%3r|HY¬첗Orx}yX\cd.k_-F IW)  jktg]e]^ʠ Prk[ڨw Rɍcji. ߢb3v#)ӵ*ʁjLU\$qpN38cY? EcSwJzڙ~q%\ ']7hPTA  bG0EI. "f Uu@3| RMtzà GGt'nJI4 ^_SOy Ϟ 7W Dm=zU9ʷE|ƸlN3|v~7,Dr"=&^i[[$ݜ,f2Bo6v%5Z6Q^Jt!$tp1%H rx|:g,`-A/&=:bԍW-nt|\1dn`ǖ`:6 h+9'|^=%9-T3'_ϣ"徆_|r}Uمt`FѼp"#%RhI,/ZXWEn$.eV pq;dA}oIj|⌓%vjȔY>f0U(${0l<Ɨ+ м^} Xdl r F6 9ҤSmpqZPF8y(Y/y~HnJ-]dUmhU%+h!2}XϲyR  g݋%w|Y 㢡ABАgzJiX"Ryt1ʽ+MIN5. 윌Qe 2\{QY=h;QHz2On+i!.OtUHV. xZ>J;k+gƁ)N 52]*dN)\EOKԋ`w[Z_*:VBVqv$PQ*‰' BԲfn#6ye̅ ?3GMem*pJ{UI8H?!zW=@rx1U*"lWc46u),#uy~0 cշOOc.ʠw΅RY-F,\r5rPji=xVv$+󾗋+ƙIGx[XYcƷ39ݬQI/3 Ρ7\+~*l@ߓ?";ܢN{91Z^aC`iQ7W#`<_|b1'|>~}жi̙a蹣,Hӎ.=Q܋`@5U3Te v>AR Yca<NIލR'N9@OBgw/LG[zsrv1B%:69G/BztἮ!{^ %BW/ȺmMݡ6s,=[̬is %CG wM omTabD-:K+g.5R%3R˜VeS*5!CAR0!qؚҙ2;^n}cԼ#sM'4Мx{/LL4y] -HP~tgmlJh#Pȩ`_r-֍Bp<% ijR!'ƣ TO$*KWcYz &@Ӥ;yL}?>Ky sssŀiǢndSph>+$_c8"ញ0dcؼիRM&-:f:- 'uaΎN'ec6qC04EY-_w!(I>o@F38#A(3{ s>%Fc!ĩ~/o=P5fA(rÃŤAOwűO  fڏO`3ܛ{ tf0ȸ{v&"qMu̙ih$ A}V ?`%˲2HVjj+mV〓zKB]BH^ո(!ųe<Պ8hf1 1{#f<;-DE(H J$d0!E[Gt]"/ti}=bM+,%]=MRپTSp0<UU\CzĪ |=p7Ѷ'EΡ6^$RNuCT'`m@v[q35t&SC &&2g{VR~Wגu[4ӸgT6/Z]D'{c zg-*%SS:l<qp1I!osfpU _ Cp,pR. G$|銀 /&pvdmR*ٚ"rp0zt8!lw 4A{ ׯGLѶ1B;,^M,)'wqto-n2y .` C$SXc~O볊.&kO]# F2=XۜI]$/TA7Y0M1R&̝ +vR3aS_-7&ݴPX~u B^h*ח``qq9e@M~%wmq֣0Q9Z+ J*:T悉aowRGQ^FrӇV`$*z37@LuO[8㛎KZP#XÈnHĈY%sNhޙ@e*LjK'øj87?㵁, Z GBu8CQqSc*%2MZP4E GkW {KmV>A[/WX FKw03^oi;9erVyYTc4b c4<ˬC3WV+WXwe :@>1M& %mZeT~2+;M|.숙boܿš^$ߴl!aBy|G˙a_[١%bq5S=a z# -5tټv[@k!4 uvPdK/3v4'#"J/hq[ޣXȀ8u8< "U[̘C5jn\v}qL8R .œB4]oJ%K?9'KK.$ 9yݠpDHkcnUǷYhEx0oQK%]]L^Q |7 '#FWZ- -bYC%>G&3N->ie`PZcKc})+k@u! ‰|"?m..ݵDc)} @Kl@9Jq0vMiZ#ԩɜ9N3A2`oLи;?[u+ꤼ S]8 FqE,$*U"8'b-Hq(fp]/_]G)u`|F4gAnM!.?p;*1a[*^\1İYS_/jq'/XEjK`TAHNm>(/@X ^tRAņZ^y-S]sԱ:@LO/GqSB0ĺ@dݙ-.н3z55o#pm~"`zˬ[-?5t~HnvX 6WҏmX='Ceth֙STy05*-=0ėLBsiVDk 1w{.g`U{ :%ս/,VM J`U.QlF_^lp੹tgPAt54x{[xc.,3* A/SA-ÉF̱@NfNdýdb>9{{r"o)t]TTJt%eug(Vg b;ԇpicDxEJCc'$uK\l}nKZ-#2eZdlωK7+nHuS)|ZeDY hMB^be ZVSc-X Ҏ1;٘W7rt$ 5ғr@D)zYjN,`Ǚ49=X &!vz%e_ L<H/R/މSa؏ߊyoK6qxhZcsLжaq 2D 7m=Zf޹iMk!j3g: [Ad+SeC=Q ,rukBBCHEvLp8L LAw2̋YYL,KobÎܪ3L$+6kʺsH /BedIg*hG^0ՇewO'^"$ꬦx?PyP^FSMEy藩 8C NC:HtT%  WA:@.3? ɡH|"6ݲ`ب7r0Pb-^ES' 5nzvE2˰0'Ҙ- J@&R"MTh甅KvQO$8AYvukp=xfw<8`x54Uߢ"]7ECH艎QQ1Oҝm%m#1v6Uٚ$UTĒ+ ~z3M5kf(_wz%}$5pƶxR9] IMX2V]n~#V5 J6E4Z}1%y;xMKfy^^ѻFjx)knQ/eZֹ*AU50jF B 3h2KiS#y֓`) _ VDxԯ<腔~:/J5p!gV^@ 0P6ΟBkwjfJM;`}{t~ζf+4_9V;P -? yJX\8 {Qg6y,wƏ|/4_KIw_<5 C,-*q^%Sί1Q4$z;\Lc^x6 ; [xJaYzpS'YP4@2 D5l]18etί{|d7Y?%I$n0κVjy%[<^I%!X`pT¸i nDp {GY42Ob2̘5KƎi(ӑ(*Be*⺅bsŽ6r\¼if|Z_(Ơ-iYl5{7^rlV̮ig%d lƉSG}r(u&#j*YIXD M+Y̎|g6eKXWS D,`X}À~E/Umkx"᪑M" *>Jd`3UlMR:9:O>09 ;\.cp2ɶzl iF#i.%"gUPXG3\ߩ873]`6Um ќ uqDOӞT=eӢIQV5٭Kjet@VXzR =P]5# pLA-FtvR/=P -$*'m=D/!bQ$/5MRu0  PM0QXeKpِȤD% /3c&CVHEN~"mw`?D~>y ;H}I\$wR&KxXA=i+Z凐eA +/OdRͮmTPe H.96ZjpW9ц`~ сc }]kkꊜ$oPhOeJcr>ƺAxbJ,.U9)7̌Vu鯦_Ǐ#ՁXQ~ݖ.ڐhŅ }eZLZj78 v,ve!4* GuAu=0Dh$H0!MX"TCBU/=O#NDݦchspe8$sLn`_fb,_誷8-+Tf% ZK/],&$;Ū&>i\M 9,ajR) =`6+6C@LFlc]`,4-%KiMzLSc\X_\q^ƤW/PCN 'b2,EQ9΄vǢ& sŝ>lrmoK!g (ZlV$hCJ0}ܤyYډFvYP= }|#qL il}|;SC+Zt|c?~N")QaW1E>͸sQFiM:גzu`$)a%9F@LjZ֎ٮ~;1^ۦr心 04 µiHt\%3|7ꭁmJе1Du4ba(GQgn_MNax2z-0*NX'h6et,J^p/W>SC AP7οZW7ͺ.!ٜ95mG7dE"zKdlXZs0_P\sZ8]t2M{f0)!wq|v$PSC ]Î$4&.#>Ӭ/JʄKl),g3V/)#׼= ITedɚD QALܿ.{Pn&RkD:Wk\H],%"3$!#h%ܰĠ]N'y\.w3c.OSm]Ay2 Ez sl+1D086(?v6gD5>B`e&Znnb.T8QY*-|D/-Bω\@MaNuI96R[X &$70:SyZBS<vu`ţra$_G)cc,_(]tׯ5F)qJ /dϣee.GXPA=˩h!fYeıN̡$Mvs)'q'GޫA?C--zd~5(ktfީereC#J$<#. dXa/M!!,6;vmxR DKNČa=^ a `RlRfyE<qx7ai@q!5m)2pP95v$y\..΂ eku}K«cXӿϑ㬚1ށNiˁB TX׮y50p{x9zlKT2"NU 9ʽi g %Ɔu<φ5R6>iK7alQ疧=quNpе #;X?wra &iV$^bwgLwv|pe͒:H=}H ٛ{ [(yPs/yTiiX }vFS,]V ETlkN /:*YzLɳrb:#!w!!ɵT#(l9nJ4@XcUy#ǝPzw6%õfsh!rHݣ4Z63 kpk70׌X2GwqHm6ُy. bq9|e'{l۳f(r^$f꺿ڋB3A={΂ Y%l7;Omd7hQAȊ> tSAH$bJo Dd?C=ې U" Y SDw0qGZJ{{*h~;̥&- vȸ11$>yZ"zmGd6XzCa-i P[k|*is$qvB/hŢ'jޠd_rJSOvň_L_Ma@E_0ttC)lY6yVvaHG L? -<᙭L&^9 di-]Ny|mp;DJsO[@`q]aaĠ!Uw6y x7J^&żJh~7&ZGp2t)\#xkFuJؗnZ:0@GLtt{8qKXӵ@:d.pe`qQFUه &>)5&}8pׯ)pqSDlCۛ?cq&^4ѝJ^Ӷrv)`(KT.jțJXs7cؼ3@'nIxՊN@VR{&.Cc=&1ELBocCA=MjW'?ؠ%2YѰ=FF{0&94m/G+ၯ%sWBimd[eu0 (]~'ѫE==;EQB:*I`a6דb0A޷8q5w>ڶ<!, w0zEYxr j8Կ9?ndpwLޫhT+f*^jAC[,XV3DmbRf%K₆V7&zPw $>JUJm#6Ȗ[\ر\A/vѿ ,``=_ 8b(/̌Z"9l3t/i+WW "<^~ PAu >"o9QrPޜ ?bJk%?n\׵yaYւFd'_ "TS ÎNZPX*J"3,r&[NW1)Y>7h$a}NitgS8rm'AR4 A{{YAm<9N?)/ {+ay ϤIlOz\I]' M137+fjvåi]l[k9;vWt ڃiOCLmJ:Ӈè"vչop(Z0)Xi33ާB#TjuILJ xb[i]r4BJMJiF>b6J}[sRjװN ܢpΏ28 TwE~Jku%VRFеJ'|{46:aS:{*/)*(>-߳vBpv$FmDDz A$zGRDg>GO3ե+8OVŇPּY& ΜN*\X-W3DpS x+tp.uiC{HE2EWb3j9c9B8zږ1sCG \!O"#SrÑ%K_hkwB@t1`Nc;?Ճre7wZh}vȏ-W Eq|,QG;:l܉Sʎ&?,r@k! JU |楛s,,]XS'Z.^ژj: S¶Qٙ(f$>N'lMJ̤hؖq1QV;lW &fZ!,zK+ 1.i:6Rz"4 iO\W( mݵm |\qED ڶ8f[T7N'قİ 0Vv󙈳텏w`LgLG)u7\Y5z\.wG =cmOS7zD"IȀ;)橺fl7|wҚr?OWb 1%NV0:&Į\^AHr卋otEc1c(AL\:[7}/e` d__GP194}m>UgUc=]Y(YQϧφA wl Oc>||Ӭ`2$3q >vY[]Uu`z&wB&p[7}-}H${mM?a$vvRi{gɂEӏ øtqsd ɒABp a0lzԖ=?([7F}Mfp*9GERڧKg%[P3lqXpQoH㜡|+l_%3f z R x]ax3F SqlXnum V2/m D*""Tn?e.-d_VR%xOlTɋ6ƑgN&R?.q (R$qӮ .F\+m53yf× 2Q؍.Hȫ( H2$]kPk՝5yWDb}Q`uk%Uu@pT꠿/)~&fJ=3+e ;q(ttl۸͟xI ʭk}'FUei/p<FIϕzf7@|ĪO4.Xٸ~n}N٨Om t?ox"1y&kmJ#ڐո/ꋥ1l! c;jdǷC˪ӟ}]d/|+49&A@f sۣ6*rl)FTmb+6 R.ch~3+럴Kp};l<~ S92l\CjMh3 \SR"!(,FR^*|5/{;mukf_l=Y%aV5 7xQHE|HMoʤV_)@S쌳4h]5}ɉX΀JL}ewkP e~[$ ԃۅ [4RҴAO2'82RڗA|h'$욈 X.Lڐ Ah! #^V(kG0rQvX%wR?ŝIo\:Bwc65א01o}9 =]lcAU&kp9O١UNsV;2 (, ҂!O$?47>݉7drhKnz2SuV0HdB2 ._ 3{ݖzRz"b#WYU],vKa)}OHMdgfk[Oi{&:Ӽ!y-h^3.$L-ۉ؎C2tϣq0)4&=K@]=F#]=~/ܵJ'XU!0[ń; XlP@anptgì!2֚~uyf};J45D>weV&#T~DD+6s F4c}85o֝qVWhI.PW<@G[-N#WLZ{ !S'UBk1ãPLļϢ)$j#590֟.A"y׳2> \cT%ԣos'?8dLu+1Ah݇{)O"\Zȁ VChZCr:_GSݼ&-p"?F [ДU4҃woO< 3ysZ,'䒯R 4HgX 'I5׾isKZd˩Iˁ@kX0hKhu Ӗr)_N00d O6 F@@.jڏ/,޵XQ٪u|`59Az^6.7Cw)w|/q5Mӛ">MTWsIۭ3z&b.8> Y"}c5w)Y˫jcV~3r# srHO/>O7=yrFVi#xTk<ρ R af97ީTD@x*H!H@[r)+(䕝d.GߎUcۚU^(VrqyV⢘WQa&j= 7CJxt]xߖQP8Ml#p 8)2$pJC\ZumlN#PBP_n5^.-,$o"fLv7VNvǙAn?ʴ%~z`Wq6(ahNИ,G )EݒǭЎp^>(X.x_)<, l6g@%=7~0+gͽ54 D(R#[(`6]u[VkiBqinoزQ ϓu4>HQ=9 scL@CwwMBՠ E+Ya5 G<qPG/0stszZ`ɹZ##$l~MP 1vFo׮E)(Xy>F'8LPᅙvf;w#-==\ j}|^ z>7ޭ7RKtHy_K1 m7f"3"y}>mE Qڍ=1_|9ۿZ7ZN\GjCvϋdo1E5&&@_Thd0iR}:ѯfoمv`5)æVC\:oGTq:r@,nᇼjIyؤb;懧i!TIi&9*FB%xw?hkRhkk@(wqI_ރӥ ȢApSkvi瀸Ҭ)@TZ)h05F-Rob]2 %r1b/\wyĤ2~jɋٞRGInm0LϪ K58+$wUe-y 1cp fe").r&noK:;8ȟ`9uA:')9yL3/2i؋qׄWٍJx^l|jߗ>ݩE(!wX .2&ƂIHR#΂rFk?؝PHe"n:gܚdy&CyN_OV+Efq >/4ʎ, s 5 Nl*+9NG&|8i7JKűbef4xHԿ3.+mH>`m~枧:2\ jԜ{H<=Wptw@/TU{8AV'GP7 ޮnµx.D^KbKkUHͣĮtS[: wK˯E3̪֟:'b, dR#Wt$臠eoUCLx>ΘIUxZdP&Sr'UmC84ҙ=?AFDMoE/4Ypܫg1 NMjkY#:Fa%'l֐x3쵥īr!eQF["J ?MMJM Šxh%jOpH푾*S3pl̓MDWvru5c;e|e> )!nHhL32+uF/I]_ 6_FE1PX]S ܼW=qrf)dFrA_)G_|>_?^YlLPuHR=/Bֽ,l3eh.eMÞdP,O zԹs1Ξ"ęfrhȉ B! +Vޙ_熮UY׬] r !SM3T f^Nd Eun-<:Vdo5dᘄ'?ܞ..ÓcCx6 -`؈L5N3 ''fk,Xו%$MU'h{R{20`V7`TmS|De\%:32kV{+61*!7P]M))*gdte:”/)KlE? %?u+>6tŸOh85c^5G;5%)REm;Cy-ݯ݈Dv}+uyEpC!Z5(H3 #A 0/h"TDC:υvb׺I تDP]Q pky]"Ө f4pmRM%ɽd{ankhXҏc~]{Α }#O3$L_՟<́{wT{Bր~:keBcRe2uz\K2.8^YsE.t۝dgGX>={ɴNضZdƍ/5 | l_u#9xChQV@+3i߭Oe(o9!sf=MU! %/R[0MCbԩȪZ/ivE1_ؠpV1շ@dҎn&O[0|BKibНl韻3:3as?{2>b*/wJKaC Jސe^ݮ4"+yGբ^wIR1_l |Z4dz8>*S($tHRoj\n(`IYs΃ŗJ#ڀD)#JM <0˓R*!=xJUB /,]g:NjmAMا2Qέu@zǎ3#I K.{rcu4zEǾǬp n '32]+OP,laC$qZsl+e2ql]9>dA!>ms]9[)%;@3_D[N1ҳ@4tfKJ3|]cOtK㳚ZJ A:S^ 2爥$rd0wGAHk/Qe{Oͳj`h9AZF$ʮѻt& q/_԰J?{ؾ?e﬒߫פъ$_yׯH!ąOSX6dLn`"E0J-i8B}SF5svWC+/Ww MfD ȝ|#~*v0j8#u L%9s%F6YI ^tW cn!d v.0t!I!gbseTPl%Fy& }V =>,[4aEvy,BNjR~fT ~*iB۰nM=cv5^.f'hLxc*7'SC:uTWck]e/ RUXީ(@y!\aWn*d,ެ3?ѵYMv8g3+ޠH=E<:l۷Zέy,ɔ/"eA%^_0c 2TnjD鿱(Ihު=ȍÈ!Eiv|r9ÏyVu1"* |<\$nShi7|ND"ƛ%{ד2_xwK-"4ʯ sͭYHB\._]Slhaf5e)Yxšp&^2/#56Lԑ+ naI<#bV ߲@O)cOR8{Q*F ;df?&ôa@+κ$z1˜:Qy$s7nPJJToRY~y/g!Є{dF#C'Bj٥WDl>=니f`=4ߤ+%NeV%.o!|PۀTiA><,`,"@ 7=m`RGw#8oʞr>ne827lL,=0v-|V"p4c=J=o ]ߓWJM) ηUx[v|+/Q-g`mqlkfnǓ럚ϤzVrd>5)WxGG&=֓j9hzLK$3bӔɕZݕb*s<[fr/'E'5@ޖpyB4=zS,nqB(8 a @Qmrr1YlJ;Zi`} !L`vtC0OZz0`PWDxću}vS4r1GS7JA<ͪU+sG.|*lF6Q+^uSn=o}:\#qR\lO#ȋhm+'}u{n4{