podofo-0.9.6-150300.3.15.1<>,dgp9|ɟ*xSC/^$Z2!he:I2D}8+;[u7hxݙxfpQ2Xe=ǻ.}co+%\ds*%1 .^/;`zdA_s\B<oťk_XB)sqĸUv!> [0' 0SR]F&æΈ Qu ,)ղTqALGR0t\xvNSAɭloRT4Tr{hq>>XD?X4d   :lp| ",(( ( l(  (  (  ( |(D( 0(D((80 9` :9 F<G<(H=(I>$(X>LY>T\>|(]?(^AbB cBdC5eC:fC=lC?uCT(vCwS((xS(yThzWWWWX0Cpodofo0.9.6150300.3.15.1Tools to work with PDF filesCommand line tools for working with PDF files.gh02-armsrv3 SUSE Linux Enterprise 15SUSE LLC GPL-2.0-or-laterhttps://www.suse.com/Productivity/Publishing/PDFhttp://podofo.sourceforge.net/linuxaarch64   `     H  x h   p H   x>FYQ(l~ CA큤A큤gggggggggggggggggggFOW(gDiZ3*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-0.9.6-150300.3.15.1.src.rpmpodofopodofo(aarch-64)@@@@@@@@@@@@@@@@@@@    ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libgcc_s.so.1()(64bit)libgcc_s.so.1(GCC_3.0)(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.17)(64bit)libpodofo.so.0.9.6()(64bit)libstdc++.so.6()(64bit)libstdc++.so.6(CXXABI_1.3)(64bit)libstdc++.so.6(CXXABI_1.3.9)(64bit)libstdc++.so.6(GLIBCXX_3.4)(64bit)libstdc++.so.6(GLIBCXX_3.4.11)(64bit)libstdc++.so.6(GLIBCXX_3.4.20)(64bit)libstdc++.so.6(GLIBCXX_3.4.21)(64bit)libstdc++.so.6(GLIBCXX_3.4.9)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3ftftfr@c#b^@\@\mA@[[O+Z`@XM?XM?qzhao@suse.comqzhao@suse.comalarrosa@suse.commgorse@suse.commgorse@suse.comqzheng@suse.comalarrosa@suse.comchristophe@krop.frplinnell@opensuse.orgalarrosa@suse.complinnell@opensuse.orgplinnell@opensuse.org- Add podofo_security-fixes-validate-more-encrypt-dictionary-parameters.patch: Backporting 8f514d69b from upstream. PdfEncrypt: Validate more encrypt dictionary parameters. (bsc#1213720)- Add podofo_security-fixes-handling-of-invalid-XRef-stream-entries.patch: Backporting 535a786f from upstream. PdfXRefStreamParserObject: Fixed handling of invalid XRef stream entries. (bsc#1213720)- Add patch from upstream to fix a NULL pointer dereference in podofoimpose (bsc#1127855, CVE-2019-9199): * podofo-CVE-2019-9199.patch - Add patch from upstream to fix an excessive memory allocation in PoDoFo:podofo_calloc (bsc#1127514, CVE-2018-20797): * podofo-CVE-2018-20797.patch - Add patch from upstream to fix a memory leak in PdfPagesTreeCache (bsc#1131544, CVE-2019-10723): * podofo-CVE-2019-10723.patch- Add podofo-CVE-2018-12983.patch: fix a stack overrun (boo#1099719 CVE-2018-12983).- Add podofo-CVE-2019-20093.patch: fix a NULL pointer dereference (boo#1159921 CVE-2019-20093).- Add r1969-Fix-CVE-2019-9687-heap-based-buffer-overflow.patch (boo#1129290, CVE-2019-9687).- Add patches from upstream to fix several CVEs: * r1933-Really-fix-CVE-2017-7381.patch to fix a null pointer dereference (bsc#1032020, CVE-2017-7381) * r1936-Really-fix-CVE-2017-7382.patch to fix a null pointer dereference (bsc#1032021, CVE-2017-7382) * r1937-Really-fix-CVE-2017-7383.patch to fix a null pointer dereference (bsc#1032022, CVE-2017-7383) * r1938-Fix-CVE-2018-11256-PdfError-info-gives-not-found-page-0-based.patch to fix a null pointer dereference Denial of Service (bsc#1096889, CVE-2018-11256) * r1941-Fix-CVE-2017-8054-and-other-issues-keeping-binary-compat.patch This patch was rebased from the one upstream so that it applies correctly and modified so it doesn't break binary compatibility. (CVE-2017-8054, boo#1035596) * r1945-Fix-possible-incompatibility-of-PdfAESStream-with-OpenSSL-1.1.0g.patch * r1948-Fix-CVE-2018-12982-implementing-inline-PdfDictionary-MustGetKey.patch This patch was rebased from the one upstream so that it applies correctly. (CVE-2018-12982, boo#1099720) * r1949-Fix-CVE-2018-5783-by-introducing-singleton-limit-for-indirect-objects-keeping-binary-compat.patch This patch was rebased from the one upstream so that it applies correctly and modified so it doesn't break binary compatibility. (CVE-2018-5783, boo#1076962) * r1950-Fix-null-pointer-dereference-in-PdfTranslator-setTarget.patch (CVE-2018-19532, bsc#1117514) * r1952-Fix-CVE-2018-11255-Null-pointer-dereference-in-PdfPage-GetPageNumber.patch (CVE-2018-11255, boo#1096890) * r1953-Fix-CVE-2018-14320-Possible-undefined-behaviour-in-PdfEncoding-ParseToUnicode.patch (CVE-2018-14320, boo#1108764) * r1954-Fix-CVE-2018-20751-null-pointer-dereference-in-crop_page-of-tools-podofocrop.patch (CVE-2018-20751, boo#1124357) * r1961-EncryptTest-Fix-buffer-overflow-in-decrypted-out-buffer-in-TestEncrypt.patch This patch was rebased from the one upstream so that it applies correctly. * r1963-Fix-heap-based-buffer-overflow-vulnerability-in-PoDoFo-PdfVariant-DelayedLoad.patch - Renamed fix-build.patch to r1942-Fix-build-with-cmake-ge-3.12.patch to keep its name consistent with the other upstream patches.- Add fix-build.patch to fix a build issue with recent CMake versions. - Run spec-cleaner- Update to 0.9.6 * Includes fix for bsc#1023072. * Includes fix for bsc#1023190, CVE-2015-8981 (most probably since 0.9.4). - drop patches from upstream all are now upstream: (CVE-2017-5852, boo#1023067, CVE-2017-5853, boo#1023069, CVE-2017-5854, boo#1023070, CVE-2017-5855, boo#1023071, CVE-2017-5886, boo#1023380, CVE-2017-6840, boo#1027787, CVE-2017-6844, boo#1027782, CVE-2017-6845, boo#1027779, CVE-2017-6847, boo#1027778, CVE-2017-7378, boo#1032017, CVE-2017-7379, boo#1032018, CVE-2017-7380, boo#1032019, CVE-2017-7994, boo#1035534, CVE-2017-8054, boo#1035596, CVE-2017-8787, boo#1037739, CVE-2018-5295, boo#1075026, CVE-2018-5296, boo#1075021, CVE-2018-5308, boo#1075772, CVE-2018-5309, boo#1075322, CVE-2018-8001, boo#1084894, CVE-2017-8378, bsc#1037000) * 0001-fix-a-crash-when-passing-a-PDF-file-with-an-encryption-dictionary-ref.patch * 0002-fix-stack-overflow-crash-when-XRef-record-references-itself.patch * 0003-Fix-for-CVE-2017-5852-with-added-error-code.patch * 0004-Fix-for-CVE-2017-5854.patch * 0005-Fix-for-CVE-2017-5886.patch * 0006-Extend-fix-for-CVE-2017-5852.patch * 0007-Fix-CVE-2017-5853-signed-integer-overflow-and-CVE-2017-6844-buffer-overflow.patch * 0008-Fix-infinite-loop-in-GetPageNumber-if-Parent-chain-contains-a-loop.patch * 0009-Fix-CVE-2017-7379-encoding-array-too-short-to-encode-decode-code-point-0xffff.patch * 0010-Fix-CVE-2017-5855-CVE-2018-5296-NULL-pointer-dereference-in-PoDoFo-PdfParser-ReadXRefSubsection.patch * 0011-Fix-CVE-2017-6840-Out-of-bounds-read-in-ColorChanger-GetColorFromStack.patch * 0012-Correct-fix-for-CVE-2017-6840-Too-strict-check-for-given-arguments.patch * 0013-Fix-CVE-2017-6847-NULL-pointer-dereference-when-reading-XObject-without-BBox.patch * 0014-Fix-CVE-2017-7378-Out-of-bounds-read-in-PdfPainter-ExpandTabs.patch * 0015-Fix-CVE-2017-7380-NULL-dereference-in-PdfPage-GetFromResources.patch * 0016-Fix-CVE-2017-7994-NULL-dereference-in-TextExtractor-ExtractText.patch * 0017-Fix-a-memory-leak-on-document-load-exception-in-podofotxtextract.patch * 0018-Fix-for-CVE-2017-8787-Read-out-of-buffer-size-in-PdfXRefStreamParserObject-ReadXRefStreamEntry.patch * 0019-Changes-needed-to-compile-podofo.patch * 0020-Fix-regression-from-0007.patch * 0021-Fix-a-build-break-with-OpenSSL-1.1.0f-configured-with-disable-deprecated-option.patch * 0022-Correct-boundary-comparison-in-PdfListField::GetItemDisplayText.patch * 0023-Correct-in-parameter-test-in-PdfMemoryOutputStream-Write.patch * 0024-Fix-CVE-2017-8054-Detect-cycles-in-PdfPagesTree.patch * 0025-Related-to-CVE-2018-5308.patch * 0026-Revert-part-of-0024.patch * 0027-Correction-for-reverted-part-of-CVE-2017-8054-fix-in-0027.patch * 0028-Fix-for-CVE-2018-5295-Integer-overflow-at-PdfXRefStreamParserObject-ParseStream.patch * 0029-Try-to-address-an-eventual-use-after-free-in-PdfObject.patch * 0030-Fix-CVE-2017-6845-Do-not-disable-PODOFO_RAISE_LOGIC_IF-for-Release-builds.patch * 0031-Fix-clamping-avoiding-crashes-in-PdfPagesTree-InsertPage.patch * 0032-Fix-wrong-use-of-memcpy-instead-of-wmemcpy.patch * 0033-Fix-for-CVE-2018-5309-integer-overflow-in-the-PdfObjectStreamParserObject-ReadObjectsFromStream.patch * 0034-Fix-for-CVE-2018-8001-heap-based-buffer-over-read-in-UnescapeName.patch * fix-missing-include.patch - The fix for bsc#1027779, CVE-2017-6845, is also reported to fix bsc#1027776, CVE-2017-6849 and bsc#1027786, CVE-2017-6841. - The fix for boo#1027787, CVE-2017-6840, is also reported to fix bsc#1027785, CVE-2017-6842.- Add patches from upstream to fix many issues (CVE-2017-5852, boo#1023067, CVE-2017-5853, boo#1023069, CVE-2017-5854, boo#1023070, CVE-2017-5855, boo#1023071, CVE-2017-5886, boo#1023380, CVE-2017-6840, boo#1027787, CVE-2017-6844, boo#1027782, CVE-2017-6845, boo#1027779, CVE-2017-6847, boo#1027778, CVE-2017-7378, boo#1032017, CVE-2017-7379, boo#1032018, CVE-2017-7380, boo#1032019, CVE-2017-7994, boo#1035534, CVE-2017-8054, boo#1035596, CVE-2017-8787, boo#1037739, CVE-2018-5295, boo#1075026, CVE-2018-5296, boo#1075021, CVE-2018-5308, boo#1075772, CVE-2018-5309, boo#1075322, CVE-2018-8001, boo#1084894) * 0001-fix-a-crash-when-passing-a-PDF-file-with-an-encryption-dictionary-ref.patch * 0002-fix-stack-overflow-crash-when-XRef-record-references-itself.patch * 0003-Fix-for-CVE-2017-5852-with-added-error-code.patch * 0004-Fix-for-CVE-2017-5854.patch * 0005-Fix-for-CVE-2017-5886.patch * 0006-Extend-fix-for-CVE-2017-5852.patch * 0007-Fix-CVE-2017-5853-signed-integer-overflow-and-CVE-2017-6844-buffer-overflow.patch * 0008-Fix-infinite-loop-in-GetPageNumber-if-Parent-chain-contains-a-loop.patch * 0009-Fix-CVE-2017-7379-encoding-array-too-short-to-encode-decode-code-point-0xffff.patch * 0010-Fix-CVE-2017-5855-CVE-2018-5296-NULL-pointer-dereference-in-PoDoFo-PdfParser-ReadXRefSubsection.patch * 0011-Fix-CVE-2017-6840-Out-of-bounds-read-in-ColorChanger-GetColorFromStack.patch * 0012-Correct-fix-for-CVE-2017-6840-Too-strict-check-for-given-arguments.patch * 0013-Fix-CVE-2017-6847-NULL-pointer-dereference-when-reading-XObject-without-BBox.patch * 0014-Fix-CVE-2017-7378-Out-of-bounds-read-in-PdfPainter-ExpandTabs.patch * 0015-Fix-CVE-2017-7380-NULL-dereference-in-PdfPage-GetFromResources.patch * 0016-Fix-CVE-2017-7994-NULL-dereference-in-TextExtractor-ExtractText.patch * 0017-Fix-a-memory-leak-on-document-load-exception-in-podofotxtextract.patch * 0018-Fix-for-CVE-2017-8787-Read-out-of-buffer-size-in-PdfXRefStreamParserObject-ReadXRefStreamEntry.patch * 0019-Changes-needed-to-compile-podofo.patch * 0020-Fix-regression-from-0007.patch * 0021-Fix-a-build-break-with-OpenSSL-1.1.0f-configured-with-disable-deprecated-option.patch * 0022-Correct-boundary-comparison-in-PdfListField::GetItemDisplayText.patch * 0023-Correct-in-parameter-test-in-PdfMemoryOutputStream-Write.patch * 0024-Fix-CVE-2017-8054-Detect-cycles-in-PdfPagesTree.patch * 0025-Related-to-CVE-2018-5308.patch * 0026-Revert-part-of-0024.patch * 0027-Correction-for-reverted-part-of-CVE-2017-8054-fix-in-0027.patch * 0028-Fix-for-CVE-2018-5295-Integer-overflow-at-PdfXRefStreamParserObject-ParseStream.patch * 0029-Try-to-address-an-eventual-use-after-free-in-PdfObject.patch * 0030-Fix-CVE-2017-6845-Do-not-disable-PODOFO_RAISE_LOGIC_IF-for-Release-builds.patch * 0031-Fix-clamping-avoiding-crashes-in-PdfPagesTree-InsertPage.patch * 0032-Fix-wrong-use-of-memcpy-instead-of-wmemcpy.patch * 0033-Fix-for-CVE-2018-5309-integer-overflow-in-the-PdfObjectStreamParserObject-ReadObjectsFromStream.patch * 0034-Fix-for-CVE-2018-8001-heap-based-buffer-over-read-in-UnescapeName.patch * fix-missing-include.patch- update to 0.9.5 - no change log, but it is available online at: https://sourceforge.net/p/podofo/code/commit_browser- update to 0.9.4 - no change log, but it is available online at: https://sourceforge.net/p/podofo/code/commit_browserh02-armsrv3 1728057523  !"#$%&'(0.9.6-150300.3.15.10.9.6-150300.3.15.1podofoboxpodofocolorpodofocountpagespodofocroppodofoencryptpodofogcpodofoimg2pdfpodofoimgextractpodofoimposepodofoincrementalupdatespodofomergepodofopagespodofopdfinfopodofosignpodofotxt2pdfpodofotxtextractpodofouncompresspodofoxmppodofoAUTHORSREADME.htmlpodofoCOPYINGpodofobox.1.gzpodofocolor.1.gzpodofocountpages.1.gzpodofocrop.1.gzpodofoencrypt.1.gzpodofogc.1.gzpodofoimg2pdf.1.gzpodofoimgextract.1.gzpodofoimpose.1.gzpodofoincrementalupdates.1.gzpodofomerge.1.gzpodofopages.1.gzpodofopdfinfo.1.gzpodofotxt2pdf.1.gzpodofotxtextract.1.gzpodofouncompress.1.gzpodofoxmp.1.gz/usr/bin//usr/share/doc/packages//usr/share/doc/packages/podofo//usr/share/licenses//usr/share/licenses/podofo//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:35911/SUSE_SLE-15-SP3_Update/bdb9e78881f4008b9e7e255a6ecea096-podofo.SUSE_SLE-15-SP3_Updatedrpmxz5aarch64-suse-linux ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=d460100d4ee095c10a0397db4beaa06005abdac2, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=caa7b76e6d57a1d524b7ee019abc36112f9a8687, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=bc0fd7c9469e1d0d8dce6ad04304df2ca43601f9, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=171cd823b243f2baa31fac0539fd9490860c3b3f, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=ccb435e8e5af1968d59e68d5337143abc9fb730f, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=a2e60b57fb24de0117477447764e12d40183f0f4, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=6c3328fe5bf76a3d148dc4c37252c39b62bf3b1c, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=65d171263271dde799a01f4bf444876aa9cf3038, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=903462044a4308c2b98969c3fdc0e911646a91c9, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=e878ee18b7dfbc33fccdaba08262e472d47b2b89, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=398292703467ecc71a2e3da4867f8980cba9ab5b, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=3eb488713918a27bbe913d009b8d3b899e2ea025, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=92bcb9c631da42770b6974a082704b3c39fc7a8d, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=968ea5562a1e4ad2542274c6e3f68b19dc75a84c, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=01f07c0d26b20b3018731ea0bd299fed64be6eff, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=842ada9e2cbd4bbc902b81e9ea4bac9639cb0f2c, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=51e99db30b9df07e07289383bdbba30c41b0ff18, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=3f5dd5882f679604d3fbaffe20040b40c58a42f4, for GNU/Linux 3.7.0, strippeddirectoryASCII textXML 1.0 document, ASCII text, with very long linestroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) $0;GR^ox    RRRRR RR RR R RRRRRRRR RR RRR R RRRRRR RR R RRRRRRR RRRR R RRRRRRRR RR R RRRRRRRRR RR R RRRRRRR RRR R RRRRRR RR RRR R RRRRRR RRRR RR RRR R RRRRRRR RR R RRRRRR RR R RRRRRRRRR R RRR R RRRRRRRR RR RRR R RRRRRR RRR RRRRR R RRRRRR RR RR R RRRRRRR R RRR R RRRRRR RR RR R RRRRRRRR R RRR R RRRc0׎#ҫ%UQ,utf-8501faa977fb9ac51f1083a397358fb59674485a683eb4ddff09bf384918a3d63? 7zXZ !t/6]"k%w#0 gΛg׸rOѽЀܖe"–b&Tvy2OR..3⿗@͓NB|cF\o4^E=|򧗺:U0&)OZޠݴ #ЧBhOX"]%l| 9K;$yp(7":oBꤩy@1p,Mecf ozdo6(j: #5aX S Z ۄIEfL+rqϜԔrIm vƲiZryyI0+uWe]3,ǣMmE)7%)]xIXPCԳ;"r#3Y%j( B,fOJb١(.XB?a~1{08sXENiӮX:dKHOg!0!&ʼ'g$;("t=tWK,`|c)E^P_">. `b7 "?][b\IZ;膖w}pҶ^^!h2OIF y%SQbIpoRS W茠 ))J;oDmfv)/S Jw.͇?ڱ93q< ,ƥ"P Alo)ziBA!JS7rl erivQ!AXKS0E<&c RK¯ȣdnpR1BN& %,Zq]m]cCTna@xFQ _ld|E+gE2Z'oLⶴD4Õoi>m|(@f^@tTc97 hĝRr#7QQ$Ab5^"CQ09P#.wr7rl/M^S GY^ ű#^ݬ nCٌEAY/ -02 a\,1RHQpŔe 04{4\C :^=OWwl0Io7emm@O2 T=:Lyu@蕠!M}1q=L/ '/R@Dpxz /9%VLv8ɀ!KwXvEV}qܰ l @R=&P"4!>v7&1PpvO\"T+lZYfrE4_¿ALD5k4$Zgj,FKL!QЗމkG5U̜W͓'tے ,t_[ԉ;~xیPoʱ𭜓32 m@a3@jAL wŝe饂ћIyxslTeXBؖSe+F5[QK?f^{ @.= fn)HxAwIK˰;f1Ht2aHInGkW8[u!ߒ"K!ADw ?[ PRlA6RUH+c¥p_Ğ ! @[S?86g_L` "K"h{&pֽIzQDgݩMA^Zx@^Q-[TCg"/ӹ8Q8YN HyxOF 2UOq(fKQtlGV Ψ@Gqw7Ϥ/n>Wqg[m Eb UQ!_J㪤OXo?LDƏ@b0mvV,GC* YZ