hostapd-2.6-lp150.2.3.2<>,[ќ/=„X0J4Ɵ,sQa$#GE[ណ>)dꕉ<h͖0.^ CGgA~;b ab= ;y T>*Zì>Fe0?e d   O  &4BHO H K  , x  4`##,#(v89:9=]1>]9?]A@]IF]QG]dH]I]X^Y^\^L]^^_b`c`da;ea@faClaEuaXvawcxcydDzddddeChostapd2.6lp150.2.3.2Turns Your WLAN Card into a WPA capable Access Pointhostapd is a user space daemon for access point and authentication servers. It implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and RADIUS authentication server. Currently, hostapd supports HostAP, madwifi, and prism54 drivers. It also supports wired IEEE 802.1X authentication via any ethernet driver.[ќbuild74~openSUSE Leap 15.0openSUSEGPL-2.0-only OR BSD-3-Clausehttp://bugs.opensuse.orgHardware/Wifihttp://w1.fi/linuxx86_64 test -n "$FIRST_ARG" || FIRST_ARG="$1" # disable migration if initial install under systemd [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$FIRST_ARG" -eq 1 ]; then for service in hostapd.service ; do sysv_service="${service%.*}" touch "/var/lib/systemd/migrated/$sysv_service" || : done else for service in hostapd.service ; do # The tag file might have been left by a preceding # update (see 1059627) rm -f "/run/rpm-hostapd-update-$service-new-in-upgrade" if [ ! -e "/usr/lib/systemd/system/$service" ]; then touch "/run/rpm-hostapd-update-$service-new-in-upgrade" fi done for service in hostapd.service ; do sysv_service="${service%.*}" if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --save $sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" -a -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -eq 1 ]; then if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl preset hostapd.service || : fi elif [ "$FIRST_ARG" -gt 1 ]; then for service in hostapd.service ; do if [ ! -e "/run/rpm-hostapd-update-$service-new-in-upgrade" ]; then continue fi rm -f "/run/rpm-hostapd-update-$service-new-in-upgrade" if [ ! -x /usr/bin/systemctl ]; then continue fi /usr/bin/systemctl preset "$service" || : done for service in hostapd.service ; do sysv_service=${service%.*} if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --apply $sysv_service || : touch /var/lib/systemd/migrated/$sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable hostapd.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop hostapd.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart hostapd.service ) || : fi else # package uninstall for service in hostapd.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi fiA%+0AiAA큤[ј[ј[ј[ј[ј[ј[ј[ј[ј[љ[љ[љ[њWWWWWWWWWW[ј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-2.6-lp150.2.3.2.src.rpmconfig(hostapd)hostapdhostapd(x86-64) @@@@@@@@@@@@@@@@@@@@@@    /bin/sh/bin/sh/bin/sh/bin/shconfig(hostapd)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.2.5)(64bit)libnl-3.so.200()(64bit)libnl-3.so.200(libnl_3)(64bit)libnl-genl-3.so.200()(64bit)libnl-genl-3.so.200(libnl_3)(64bit)librt.so.1()(64bit)librt.so.1(GLIBC_2.2.5)(64bit)libsqlite3.so.0()(64bit)libssl.so.1.1()(64bit)libssl.so.1.1(OPENSSL_1_1_0)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)systemdsystemdsystemdsystemd2.6-lp150.2.3.23.0.4-14.6.0-14.0-15.2-14.14.1[@YB@WV#U8T|S~@SNpRL Qo@QnQdPOE@N@N@Ns:@LZ@L@Karol Babioch chris@intrbiz.comchris@intrbiz.commichael@stroeder.commichael@stroeder.commichael@stroeder.comcrrodriguez@opensuse.orgi@marguerite.sudvaleev@suse.comaj@suse.comcfarrell@suse.comavm-xandry@yandex.rucrrodriguez@opensuse.orgglin@suse.comlnussel@suse.deuli@suse.comjengelh@medozas.dejengelh@medozas.desndirsch@suse.de- Added rebased-v2.6-0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch Ignore unauthenticated encrypted EAPOL-Key data (CVE-2018-14526, bsc#1104205).- Fix KRACK attacks (bsc#1063479, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088): * rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch * rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch * rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch * rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch * rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch * rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch * rebased-v2.6-0007-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch * rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch- update to upstream release 2.6 * fixed EAP-pwd last fragment validation [http://w1.fi/security/2015-7/] (CVE-2015-5314) * fixed WPS configuration update vulnerability with malformed passphrase [http://w1.fi/security/2016-1/] (CVE-2016-4476) * extended channel switch support for VHT bandwidth changes * added support for configuring new ANQP-elements with anqp_elem=: * fixed Suite B 192-bit AKM to use proper PMK length (note: this makes old releases incompatible with the fixed behavior) * added no_probe_resp_if_max_sta=1 parameter to disable Probe Response frame sending for not-associated STAs if max_num_sta limit has been reached * added option (-S as command line argument) to request all interfaces to be started at the same time * modified rts_threshold and fragm_threshold configuration parameters to allow -1 to be used to disable RTS/fragmentation * EAP-pwd: added support for Brainpool Elliptic Curves (with OpenSSL 1.0.2 and newer) * fixed EAPOL reauthentication after FT protocol run * fixed FTIE generation for 4-way handshake after FT protocol run * fixed and improved various FST operations * TLS server - support SHA384 and SHA512 hashes - support TLS v1.2 signature algorithm with SHA384 and SHA512 - support PKCS #5 v2.0 PBES2 - support PKCS #5 with PKCS #12 style key decryption - minimal support for PKCS #12 - support OCSP stapling (including ocsp_multi) * added support for OpenSSL 1.1 API changes - drop support for OpenSSL 0.9.8 - drop support for OpenSSL 1.0.0 * EAP-PEAP: support fast-connect crypto binding * RADIUS - fix Called-Station-Id to not escape SSID - add Event-Timestamp to all Accounting-Request packets - add Acct-Session-Id to Accounting-On/Off - add Acct-Multi-Session-Id ton Access-Request packets - add Service-Type (= Frames) - allow server to provide PSK instead of passphrase for WPA-PSK Tunnel_password case - update full message for interim accounting updates - add Acct-Delay-Time into Accounting messages - add require_message_authenticator configuration option to require CoA/Disconnect-Request packets to be authenticated * started to postpone WNM-Notification frame sending by 100 ms so that the STA has some more time to configure the key before this frame is received after the 4-way handshake * VHT: added interoperability workaround for 80+80 and 160 MHz channels * extended VLAN support (per-STA vif, etc.) * fixed PMKID derivation with SAE * nl80211 - added support for full station state operations - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use unencrypted EAPOL frames * added initial MBO support; number of extensions to WNM BSS Transition Management * added initial functionality for location related operations * added assocresp_elements parameter to allow vendor specific elements to be added into (Re)Association Response frames * improved Public Action frame addressing - use Address 3 = wildcard BSSID in GAS response if a query from an unassociated STA used that address - fix TX status processing for Address 3 = wildcard BSSID - add gas_address3 configuration parameter to control Address 3 behavior * added command line parameter -i to override interface parameter in hostapd.conf * added command completion support to hostapd_cli * added passive client taxonomy determination (CONFIG_TAXONOMY=y compile option and "SIGNATURE " control interface command) * number of small fixes - renamed hostapd-2.5-defconfig.patch to hostapd-2.6-defconfig.patch- update to upstream release 2.5 - removed 0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch (CVE-2015-1863) because it's fixed in upstream release 2.5 - rebased hostapd-2.4-defconfig.patch -> hostapd-2.5-defconfig.patch ChangeLog for hostapd since 2.4: 2015-09-27 - v2.5 * fixed WPS UPnP vulnerability with HTTP chunked transfer encoding [http://w1.fi/security/2015-2/] (CVE-2015-4141 bsc#930077) * fixed WMM Action frame parser [http://w1.fi/security/2015-3/] (CVE-2015-4142 bsc#930078) * fixed EAP-pwd server missing payload length validation [http://w1.fi/security/2015-4/] (CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, bsc#930079) * fixed validation of WPS and P2P NFC NDEF record payload length [http://w1.fi/security/2015-5/] * nl80211: - fixed vendor command handling to check OUI properly * fixed hlr_auc_gw build with OpenSSL * hlr_auc_gw: allow Milenage RES length to be reduced * disable HT for a station that does not support WMM/QoS * added support for hashed password (NtHash) in EAP-pwd server * fixed and extended dynamic VLAN cases * added EAP-EKE server support for deriving Session-Id * set Acct-Session-Id to a random value to make it more likely to be unique even if the device does not have a proper clock * added more 2.4 GHz channels for 20/40 MHz HT co-ex scan * modified SAE routines to be more robust and PWE generation to be stronger against timing attacks * added support for Brainpool Elliptic Curves with SAE * increases maximum value accepted for cwmin/cwmax * added support for CCMP-256 and GCMP-256 as group ciphers with FT * added Fast Session Transfer (FST) module * removed optional fields from RSNE when using FT with PMF (workaround for interoperability issues with iOS 8.4) * added EAP server support for TLS session resumption * fixed key derivation for Suite B 192-bit AKM (this breaks compatibility with the earlier version) * added mechanism to track unconnected stations and do minimal band steering * number of small fixes- update version 2.4 - added 0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch for CVE-2015-1863 - updated URLs - require pkg-config and libnl3-devel during build - replaced hostapd-2.3-defconfig.patch by hostapd-2.4-defconfig.patch ChangeLog for hostapd since 2.3: 2015-03-15 - v2.4 * allow OpenSSL cipher configuration to be set for internal EAP server (openssl_ciphers parameter) * fixed number of small issues based on hwsim test case failures and static analyzer reports * fixed Accounting-Request to not include duplicated Acct-Session-Id * add support for Acct-Multi-Session-Id in RADIUS Accounting messages * add support for PMKSA caching with SAE * add support for generating BSS Load element (bss_load_update_period) * fixed channel switch from VHT to HT * add INTERFACE-ENABLED and INTERFACE-DISABLED ctrl_iface events * add support for learning STA IPv4/IPv6 addresses and configuring ProxyARP support * dropped support for the madwifi driver interface * add support for Suite B (128-bit and 192-bit level) key management and cipher suites * fixed a regression with driver=wired * extend EAPOL-Key msg 1/4 retry workaround for changing SNonce * add BSS_TM_REQ ctrl_iface command to send BSS Transition Management Request frames and BSS-TM-RESP event to indicate response to such frame * add support for EAP Re-Authentication Protocol (ERP) * fixed AP IE in EAPOL-Key 3/4 when both WPA and FT was enabled * fixed a regression in HT 20/40 coex Action frame parsing * set stdout to be line-buffered * add support for vendor specific VHT extension to enable 256 QAM rates (VHT-MCS 8 and 9) on 2.4 GHz band * RADIUS DAS: - extend Disconnect-Request processing to allow matching of multiple sessions - support Acct-Multi-Session-Id as an identifier - allow PMKSA cache entry to be removed without association * expire hostapd STA entry if kernel does not have a matching entry * allow chanlist to be used to specify a subset of channels for ACS * improve ACS behavior on 2.4 GHz band and allow channel bias to be configured with acs_chan_bias parameter * do not reply to a Probe Request frame that includes DSS Parameter Set element in which the channel does not match the current operating channel * add UPDATE_BEACON ctrl_iface command; this can be used to force Beacon frame contents to be updated and to start beaconing on an interface that used start_disabled=1 * fixed some RADIUS server failover cases- update version 2.3 - removed patch hostapd-2.1-be-host_to_le.patch because it seems obsolete - hostapd-2.1-defconfig.patch rediffed and renamed to hostapd-2.3-defconfig.patch ChangeLog for hostapd since 2.1: 2014-10-09 - v2.3 * fixed number of minor issues identified in static analyzer warnings * fixed DFS and channel switch operation for multi-BSS cases * started to use constant time comparison for various password and hash values to reduce possibility of any externally measurable timing differences * extended explicit clearing of freed memory and expired keys to avoid keeping private data in memory longer than necessary * added support for number of new RADIUS attributes from RFC 7268 (Mobility-Domain-Id, WLAN-HESSID, WLAN-Pairwise-Cipher, WLAN-Group-Cipher, WLAN-AKM-Suite, WLAN-Group-Mgmt-Pairwise-Cipher) * fixed GET_CONFIG wpa_pairwise_cipher value * added code to clear bridge FDB entry on station disconnection * fixed PMKSA cache timeout from Session-Timeout for WPA/WPA2 cases * fixed OKC PMKSA cache entry fetch to avoid a possible infinite loop in case the first entry does not match * fixed hostapd_cli action script execution to use more robust mechanism (CVE-2014-3686) 2014-06-04 - v2.2 * fixed SAE confirm-before-commit validation to avoid a potential segmentation fault in an unexpected message sequence that could be triggered remotely * extended VHT support - Operating Mode Notification - Power Constraint element (local_pwr_constraint) - Spectrum management capability (spectrum_mgmt_required=1) - fix VHT80 segment picking in ACS - fix vht_capab 'Maximum A-MPDU Length Exponent' handling - fix VHT20 * fixed HT40 co-ex scan for some pri/sec channel switches * extended HT40 co-ex support to allow dynamic channel width changes during the lifetime of the BSS * fixed HT40 co-ex support to check for overlapping 20 MHz BSS * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding; this fixes password with include UTF-8 characters that use three-byte encoding EAP methods that use NtPasswordHash * reverted TLS certificate validation step change in v2.1 that rejected any AAA server certificate with id-kp-clientAuth even if id-kp-serverAuth EKU was included * fixed STA validation step for WPS ER commands to prevent a potential crash if an ER sends an unexpected PutWLANResponse to a station that is disassociated, but not fully removed * enforce full EAP authentication after RADIUS Disconnect-Request by removing the PMKSA cache entry * added support for NAS-IP-Address, NAS-identifier, and NAS-IPv6-Address in RADIUS Disconnect-Request * added mechanism for removing addresses for MAC ACLs by prefixing an entry with "-" * Interworking/Hotspot 2.0 enhancements - support Hotspot 2.0 Release 2 * OSEN network for online signup connection * subscription remediation (based on RADIUS server request or control interface HS20_WNM_NOTIF for testing purposes) * Hotspot 2.0 release number indication in WFA RADIUS VSA * deauthentication request (based on RADIUS server request or control interface WNM_DEAUTH_REQ for testing purposes) * Session Info URL RADIUS AVP to trigger ESS Disassociation Imminent * hs20_icon config parameter to configure icon files for OSU * osu_* config parameters for OSU Providers list - do not use Interworking filtering rules on Probe Request if Interworking is disabled to avoid interop issues * added/fixed nl80211 functionality - AP interface teardown optimization - support vendor specific driver command (VENDOR []) * fixed PMF protection of Deauthentication frame when this is triggered by session timeout * internal TLS implementation enhancements/fixes - add SHA256-based cipher suites - add DHE-RSA cipher suites - fix X.509 validation of PKCS#1 signature to check for extra data * RADIUS server functionality - add minimal RADIUS accounting server support (hostapd-as-server); this is mainly to enable testing coverage with hwsim scripts - allow authentication log to be written into SQLite databse - added option for TLS protocol testing of an EAP peer by simulating various misbehaviors/known attacks - MAC ACL support for testing purposes * fixed PTK derivation for CCMP-256 and GCMP-256 * extended WPS per-station PSK to support ER case * added option to configure the management group cipher (group_mgmt_cipher=AES-128-CMAC (default), BIP-GMAC-128, BIP-GMAC-256, BIP-CMAC-256) * fixed AP mode default TXOP Limit values for AC_VI and AC_VO (these were rounded incorrectly) * added support for postponing FT response in case PMK-R1 needs to be pulled from R0KH * added option to advertise 40 MHz intolerant HT capability with ht_capab=[40-INTOLERANT] * remove WPS 1.0 only support, i.e., WSC 2.0 support is now enabled whenever CONFIG_WPS=y is set * EAP-pwd fixes - fix possible segmentation fault on EAP method deinit if an invalid group is negotiated * fixed RADIUS client retransmit/failover behavior - there was a potential ctash due to freed memory being accessed - failover to a backup server mechanism did not work properly * fixed a possible crash on double DISABLE command when multiple BSSes are enabled * fixed a memory leak in SAE random number generation * fixed GTK rekeying when the station uses FT protocol * fixed off-by-one bounds checking in printf_encode() - this could result in deinial of service in some EAP server cases * various bug fixes- Update hostapd-2.1-defconfig.patch and spec file to build with libnl3 instead of libnl1- update version 2.1 * see http://hostap.epitest.fi/cgit/hostap/log/ for details. - change hostapd.diff to hostapd-2.1-defconfig.patch - remove patch: hostapd-tmp.diff, no longer needed.- fix host_to_le32 undefined on BigEndian architectures (hostapd-be-host_to_le.patch)- Do not package /etc/init.d - Do not install init file since package contains a service file and is only build for Factory - Cleanup spec file - Use /run instead of /var/run- license update: GPL-2.0 or BSD-3-Clause README makes it clear that this is a dual license - i.e. choice of either or- update to version 2.0 - fix corrected file name hostapd.dif to hostapd.diff - in default config includes all features (IEEE 802.11w, Hotspot 2.0, IEEE 802.11ac, WPS, etc.)- Add Native systemd units- update to version 1.0 - respin hostapd.dif to fit the new defconfig - change the file permission of the config files with passwords to 600 (bnc#740964)- update to version 0.7.3 - don't use /tmp for dump file in default config - verbose build - fix build for older distros - enable driver 'none' for radius only mode - add init script- cross-build fix: use %__cc macro- Select libnl-1_1-devel- Use %_smp_mflags- udpated to release 0.6.10 - updated hostapd.dif - git-commit-eb1f744.diff: * Move DTIM period configuration into Beacon set operation; fixes "Could not set DTIM period for kernel driver; wlan0: Unable to setup interface.rmdir[ctrl_interface]: No such file or directory" error when using "nl80211" driver/bin/sh/bin/sh/bin/sh/bin/shbuild74 1540280732 2.6-lp150.2.3.22.6-lp150.2.3.22.6-lp150.2.3.2hostapd.accepthostapd.confhostapd.denyhostapd.eap_userhostapd.radius_clientshostapd.sim_dbhostapd.vlanhostapd.wpa_pskhostapd.servicehostapdhostapd_clirchostapdhostapdCOPYINGChangeLogREADMEhostapd.confwired.confhostapd.8.gz/etc//usr/lib/systemd/system//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/hostapd//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:8998/openSUSE_Leap_15.0_Update/2bcf83adfb26e57ac64ebeb3bb901122-hostapd.openSUSE_Leap_15.0_Updatedrpmxz5x86_64-suse-linuxASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=0b4b0542213a7ede75f5e55d32c36c6f14386438, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=c5e0331fdb10917e334db303f9a482a656c01dd8, strippeddirectorytroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) RRRRRRR RR RR RR RRRRRR RRRRR RRR RR RRU@J=א utf-8c8d2db25f89fbaf5351ab10201e1cd40aaf169ca49ce15e56c6a39cb66bd13a0?7zXZ !t/yW]"k%f'@K^}gq^,37ShX{E@澠@Zf S 2l+C)k(ta0MA+E$v6%!)XG?]<=be|l)h2p%E &4Vz'ynSdgM~|t4*ۥȍd5 TuNe*7M}_o+Kdf娶gͩOqMfAdEQt39`"}+3T*&7?Də۵/֢ΉS"ݝa,<3 <7'ɒnx%;J/jfje;oq?f:w O--mprfj/nǖ1~g]ShK٥Ut2iRlqJW> b*v:6XzV0Gʣ\E%Wc7#B[>xjmY#m:1xҷ 1%(s밂yYc%Z\s1<jZf_y}ȳ+?kA<ȗB' [ 1 ~M]RR8}'OϤڛy9OJ 'aT ~CGC9&1虭k|Vzyt{{8 zN2j dmai;KFDY'ubELltc\5/C|to84` Lq &#6&a{W԰ Ru r^kb\Hjb帊&([&5X*=>!u4"iExI'-,>\F%4K"ƔAl@bmHdD/>!oN>X̢G-gz<ߩ#δPZ[q[1kzo[ijn8ҨA(sؽD"ps5nTh¦izI5,15k_F Pc[A a ]ݴR(%dc_`2gLs=7JA:D5z|0,; _CO9G;Y1[mI]E|Tki % :PˋӥHX0dG[WSl @Y Jq"yDQB_Yƨ9.N^kP.?^u/S̖6/ 4j1 .79 V= 05'?>: 5*V?I{Ȋno |@^saً5 n_X5bJ@wֵ/{hhKﴇJxHxirȁ$H[rp}clUvs]l;DP|sRl'3;w7mOg h妆5'w*Sv9u QދIeYNbܭ ws`k$/PA"Fao Je* 2rckDf#,ȾR5PVdcB? Uz$GP<)fD[폐PtIQzU~SᲤ#-ԿS٠q#DCUv9JS޶k/O"PPvhK r8"I]A/@'PyMrHbꋌ'UoI Xv<~1 ȿ]d '@ BrwQSz t1a 쇖Hjyp|;;A ,MjvĕdRG5H CH [;)r af~@zfR'xUCTߌ3 ;/.3R]xCrY bOƄ?S^EJA/$F1$f)JE ]*%o4NCH,3| /kD~ 2[!"L؅W-<@@˼bڷ~Y4 rA;ǜh7O tc[li+S `D,`;)m;[o/bi %O|XyѴ5$*zhU![\288 9)F{{p(klٗzk=Xm#[>q#&z":(QX=3R6h˔Rc_t}.~mz _2W|a =YêS.6+}gueidbFk E`h K[3Rr 18пcfA,_@ya7-}8w]2Lg_zH1_K C(h%a7 3pc# `j ]+n:5z)&5 (X.1۹n_ugQsn͛"wy'h.|6EjN7'մtTDwYsۉ> m'ZVz#[h^ozߐ<3lvKݷYKd}θ+oIJOy'sQ9)fler@ `\uJF;XDft{ 笰Kl!\r.KP gɗ-&C* ڡ"kTٱ&qL`#ѣTU.e9Ϩ_D{6FE[T0=njdB#GBdQvaB*L3Z,ֽ-wRwkұÞiq Y= T~JxҐ +w1 EQP?y$/֏j(ڞS ֥Pos ~q3Μ>߂*X2;/F 'vx-E*_ Qlpz d7lDsƶ8O2☌`O '`*u5i>x#Qxqh蟆CJ+s:(zfT?=ER$)KoF@}!ӶpyoHޅ4tZ!:{Flf7o?/ܺGp*@Yn^tll LU ez|HRHvag1̅i)? p{4RRl;'!MFj@UG-{c#ixH鑝fOV&uYXеӛ{ |:h,7 @_+$;^ >;9ᝎ]Lt؛Ȱ.ECkt-V2XcZbGj"ɦi2ab1m/]˴Өgl^wlIS"\N>xl7`Υg1 y!Ǯʧ? BֶeHrnXؠb8OcN'Y>1'lcP//">vk/NQ)G?]qT`l4iCʯa-sFT % <] /\ȳvW(ˀxAR|z_e K$Ip!Sf4HyKм\7]XS/T`(UA3<4I &°/TXvEJ'N>)֤I|' 62=i\ak s. +4>9PPLI%*@%P-DUU!b" `W2r,8܅)s:9?àpf7Ԣqo$FMfXyRV=exh%D̽O5cG.LAyUFSlO BDn CA/ 2 b p蕯3fa|wH K!. GJA2ְ)tnGࠧ9ye6:R=,uRut%D M<uѤ/P,CFk-@ڃ lњ?S8Z1Rꑪ ,c׊@br/DmtoN2@w@NHVUEMD{XçV$*J~#un Sht[3C+wZ,`CXiŽ452v=̱Bu, CNF[8X:*X$9 Yy[WaJ;Y -ἴm19&G}5)"~34 h͗OpԜ-[_Ǻ\>\@zBC qr*u%zc-]cyoK14gs-+4Q0PM\>A`$=74NpaC'dD?ͻL6T鶉)NM6q%R_/&wFZq熻OȇP` Zao6τǸJzLMT01pǟ4lҚ]vH$Clk|ƣ*4sbI1Ԣ!32qډ/k9{6]Ӎ 4$SvX FNIŶ&p}([~b5qvk gGr"1Qq֡&U䡽ߢND!ϥF/2xpT=cruj+?9?vjKFvuƓwA֚\xBW߃xT^27jJ4*\xu?#P,O qgKC4>GFb5[ p{gz,b'nQ}bď5;2`L|PRÌ]ԥ WPSxIdAXPn/~\Z"4P'<-x)3>E>>Ɠzd t|*tQ~,HHwszncx,$朏@ kViS:m& ]p5ao99&'EX߸Vʣ)bT 6i|czw y5N;FKpQ(iq=Kؕc/^'%yO6a悅uU;1]Ŏ(sQjp YwX=YlŭPVD - hCυ8]K ( 6ř^}Oʈ z, ;bqڶeY(ۛ C`}2Sw@pt=xZ|r }@`x> `V9 |_+ C P3Q4zy<C/Jh>g55 i@CjЉv,*Q8Amq͠:޳CfC~, OQ=6@uvѺ6& 9ٓďTl6ǹۧy vZ@]x>R"Z!~<'weA [pd) 7(%2gHJ04>K/y?,uV$67"5GbO;A-rlv PO i!58͟oo|0rP"lNcF[;<]Jpwi(׵:NjdWK@\EW+*A~x%ٓj:g\>s|| x~ts8#*lN|Ns\%/0p."%p&jMqb%m @ ͗$ A04dJ6juBvj"!LZU4K@G.0sϟa}4zch0KQvO!/(:&y4AyjVcq, S9/-AzdD)t/+H(wPѢ[<:ݑyi (]ӺT`* 9CQr_1t)Gʂͽ$Q8ȶoax+n EOǬr%17r'g뻖rTH‹:'ZY#Q~i9dFfsnLJWY>.LF]U܉Xzr\GcmuF%i'X^ Y%m9 S+5g@$L MΖPU.^c1CdrD*M35\i35W{'{5ΘOͪ"М#kҿ1WrW(@0Bv/1Q_ޅ^+Ԍkǭ$BOq3Uk C%[OMJO+s,ΐ*CB7| *Z_ϙ' hL|/K:i3ϥ;rsd C+}^vGϼp O:AGօqÙؔ5lx1CqtPe6,6)r;A/0vM륍 ZUwEqt0~]W8;Od٥0m#:;wZtrt2IDߠ'fllحIZ32B?ZK, ig0_*EL1"ӧ=1+Pr( &yN;mGd_!6t+sߓĚ?SѝfRnnT^yGAïf+V⊳~L&cAvm;F7bȧO91J7H*LmlUjBt;ܷfa*eHl)rcB2RɼA~nAUR cqa:t|$DU )mو&{Z 7US6?JqDـEC+KU+WJJM6r%ZY}u(VO鳵tAn2}bwK}a=rq,-r9fg.Ue,`*n^Kz_ː ]DǃcbI]!|)# |2{UӫYuoh眸Vp0a7sL] L)ћ_଼0!;(%~AOHME&Q[,XKx'% =e3]PٰqUyw+ $j9ٶhNyPhk+lmrZFg@v$˓[LfLT:p%%+3Pяm$0F Ĩ; S<2 iC7' %*A]h^دtUė~<F2:N"IB[!9m=K\Ŀ;sJ՝+ۘ_5@{82<٣t3*@ko徰Vj(r1޽#6ܨܸHM%gff+lk{;- ҏ{\")|GBHm~$V`UqMBwYKbIJ \gr|xۧJfMcDeK}!¼9(|O5EvwW;3?X}E'Qu:w+Ey'] 2:_A34pވ_?@X8: j@ZZ<%\[_: !m'-WNpH& [50ZU⊥^"cu[*"8EZ!|N'xcq0Ѐ Z %[ɿ5zֵ{@lL p8u.Esܾ:z ,wZ'f?9{4,DH\0ʰXd$Թhoӿ.EP!q|wWܷSQ cuG Qٞ{pƒ4&zj$[5FlY{XfLtbgouGL=U1 Fa uN PbX>ΪAr6u5ze*s*i hD$yYoym#ݳ'h]@ {Y]>{ӷSKiu4yl4 g.#IQ5M9!N"Dˮ?xYa'n&<ɗ,`=y_y18K%#!qv?Y޵zg,"?!2qAE܌etσ#P28BsʹvAc``}E7 5zJN F`XھLR0:",E^N*, CYZwCʺo}yޗvcYoM$fjm~RVNKF*.d'"NBtDЪJP H縪(W4t!M0FB^ELoϢa[pn~ .0n.,?v4_4?W? (T/1Zgk~7CnjIyq?;Te dpﺍS)`˷@SNiR+ǁm-_OU]!D4jV`<C8-h}.=$ytN3-FXցIj T#9t<`sUًձ~lGHaF@uY- wl@v 7qef=M/9קvY{]GF^U 1Qό('['U}f蘭Ec'5>nK,~xz"J ֆaw1dmnEWu^C`/F{,!L^wbzli#0 egxz䊡KeꔆD^TGAr+RT*=}'ިj/O]J)(" ڌ%Xzg!>cO< +ۖK#R,z?hxK5(7Z~=TMSs<_8v/xeᲆ(Dh|M?C&8҄dq(mfdR["ߗcBz;AN.0ɵ CYHt߳vjpNۄs~:>G /[/(f>V%{o>@ h(OG_Nn8SJJ/Ώ=AK,lXrדQNJOS,>A?2p`@7 7M\[1^FPøp=9Lt"Ʀ]2/Y^خ|qĠݷl> y{qІjT%孱MS|c'uJ#Ǒ1t*1]~Il+|b#$INCbmLԝuѣ|!r}OSjRI,q^:~BF@S sT X E`D [egcwwq +}(UcyPNʢ'<=)􇱥-G.ǡA. qy75 "+ϯ'PTDQƟL֘7$RO : s 3Opnqn,==Aj eM !zfL~' 8[i^"߰K-n.40t;$…(4waC@؆x)lžsk=᭨ɹ}1ʮ`)`Fzr/Ç:W%V&^7Y lIl0;U~*,&|V3l5dzb`HO"N#مOEs-nm*%]%+e #_~|F<{$pw +9wX=+hW^~^rCv nݔ+ x?|cGP挔٘1mt O?Yu-n]yS@IE匃 T "kH֝3U6!eW{Df}I5w;)0.]l#LX:;B~̊Z"P,${8HGIx!V?|lcĹ_qvp{cBeW}*ޖErIa.>Mpؓ1> 8$SMB675zS/aFP^B{xY#ItˡRHiY5vZֈ$P 9Kg =Qᇌs(6dQe'e;}yM ^vk"0aQ[Cp4>JMs+HJL3ȽeSeGp(] L5n i·@]aw.UQhf ׍t(4(z9By#|a)edTLiWkK0s! y޿x\*,x=Tq,'Nd$6a,W#DF DP/r?!Iȯ?(a>cb{Ӄzձ>wZ=[UNr|D66oni}Im]+1`fWJ~4 W(a1`{I.4(A;.xn/A{ >s꺶B1+Y["Oϼm;[ӞE)xZ6G> ?yze2cgid m^ 4sö %߁ p )8E`}-*9"ƨ3bcYN@Pm+- (Xd%`^>o-*G>05Rf R0zi)]>s?gsa?7oM Wkg% *| ;[DT]E iplI$RϳMv n}?/n),hUq7_#LqGѭMp2*]ّEu*d:?a- `r9cl;岶 auh̀vuˬ+q?46X,yK{; ^ :zTU(q 1x.#Y1Ta"R@r7Ы@5mNHfmq9)KλlL_ni`;lj?m;1weAg71L`H KQf{^ܮkk(|\P QslwYյỲbϐ30n1t4 \gEeQChE-t'G .?o { WAbc)[]C5*[:v>/?d*!g4ƌl ΀l({g8Nw?˜& -80Tqdt/Jnh弞gW8) #+5媹ʅ15t DXs76Mu4Eja6{)6i Р0.[H!U4EFMh8Nu8ϊ ,e3aUKCM3o%7 4.Zu503*}/oi#jB@pk(8.=/2. 3EkX^Fv 8}P&=s+B:IC ѝ S$PuqPI60ܸ <0s/,:}- 9ێ5NO}w[|>rc|=lw\p֙`UmƉ/ @\U3SO9HUS&OJ6hxl c[c\ЀhSXJs z2.*4<҅C>2ьsrP_|je2O~W]Zܯ%ViJk<:{JF$&cbC'~"*̉ę̬?$8#i#Uge*H"r.H/^[iʩq:|IyW\&tWfό2(:o4ӠI+'Hضk\ v.sPkk.U'gK-m h^ɮgDh%~tC-}gQE=vɓ 𳖄ypA)& ">G3nHWS2ެ=L(B.m6|Ǎ,?yϿd_ۿ7 ֕p>;q|&[I:xJߧj+AbJ-Ă=EZ7e){۸ի@}`8ä:%ͱ !^j3}0HͿΤe"Q{Ő;҃Q@UHn)}< t&k8@^S.S7~޶a9 0cT>Z#KÄtUo"{ <>oHetB?|Ф B l>LH.\XŐ1_Ν͆3).e{^go<+^[C3lA%jOofjk xy|Z-+0+g,R[Luy#jw}KFcV cU2&6+Ltdy"뉌,FYC1kTֆ Rk?+AtyBpdtcboGA^ *^6>mdrbI)In1cn.Lma>aq~R|V'f(ʺ1ƹ+߈ Q('OIg,mXoZb⡢>)0퉌q1E4\5@+4sb􂈍HPga1CSL˗oKP'BN\$Q/p)Rl)q<`LwV1t݆:PE捏v WكXrDIlvG-&#HI{kwy٫)eKARq_6!~JvcrcMQqԧU s 1qX=U]N'b_3`6 E_ MYvT^FƿVy\Ԍck2ԅ=aGO`jn| K9î-IcЊ5/ DD͗e}:;Sr5[~ze ֎1 20:G0a~7]PpXl-]>H)Q Τ ӢcuGUCqԐb/~r]QwO}sG'NV BKGAv0/8,syS c~CiP~,=J?q~Ldjn\ƪzǶU~ܷK{[^0A $f_6]v>֒İ3y'j4t<͉P ({1  664ћԔsasmE!lh=j fI 8L3T D%D5Lj#)1Aw>tV} ih`؈IOORc_RföokAYLEX]d4cKB&Ê66UJH'wj<9 }]hJ!d4 PmIF]bnyl0 AK ԣšÆfK髲L}KEєH#IYyX%mDi̼(9mv|49 P;5l("'">UiOO%^QGM}%i$0+^O5-C?UX* &KBa u"?fw0qX1|}yqprjȅl_d2ɨX~mƹ Ϭt@uKb |)A!"Uq+qv6+_w 7^?Y?ُx3Ű$L"3 7~g@jM k/[ ,}sS)Y?~w-ެˆEfwRL|G]q84|s .85֬'v8o#rtYy {dG 9-A?) wݢedQn1X 3O00`,by8R7uMp <;A<Jis)3}"/e6ΐbetcˀÔV>^5"s2.9Pޘn(4Đ}Lr"3GZVzԷ@E,c/OznU4ZV<Ѝ/Wyۉ :.v)XPUCV=ؘ]"LD8E MUp4jPwS&#٘jV¶1U@8qW-6x`7pȩ&yH+Bla<!ε-y@1  &U3MX1$dCH0A|ruuXlzkY6 OprFs1o%L0A(57ejYPVK8& {@R8 DnS=!%J&Е1kx7AW'qU/+ɪ>*cv:u$^4[ * *kxE]вK+?0bX=[x,mgu<^^F~$xIsnc;"h[Z4]zIIаzpRD#@aô&1a=12sp}) FHh.:~_L'K,l|ѫͺ[{XL䮁"y_*x+&Њwv$ffBa=#4o( g*w I ;2|Wt?76oDr) !Z gyrHVnKF;{_NZXTnGfTh!Hp޲CiM6h$t?ԠYn 9B-d#?0Kc{[NJsIcWl&yhNԶ@lx\—7hNw6p~ if .dQz\k9#5OEf*/&=1 6^as`{j`8[95R< ?oXLqY&uA-|;JY u4-!z7R!Xڐ)2,z1`_/PH*^VclP ʛX~ij&EXn~"$mP^EC-\bVWᛁe!{x X?V E٥ɴ*ݐ-R+Ԥ$I8ӻAzj4bi5=TF? d* 6hm%h]'iQEv9*2PÊ `(`-$2n] 6Ld 7iUEGrX ;ϩH0tF/|lJ>x5ec5&/>/p/S}eh \uE\ALC5YiۙkjKwRxgo"u aGwp0Mjj9qa"C[qc\n슧Ӄ2ȇ h^9[,<?VA[q"U &v)r)dn#`njAuv)Yd`u `d50+wc`$9'ISe<׳aDET|ݾȆUV;D :^Jƙ+{zLw#QHqgAzJ-#GS&ⴅ ^UM޿PLǖ0Qcf_ZKPSUܙFmiV,DCPq 6e2 NOgaP~pcѩoKSϽfu ;bp.($=us=:DZ;R⠳#5 ӂ,UCn6^Ƽ4Zl ۵lJת e%=3eM @YTa@Xvٚ5z\dhדA$!CU׹vk~߅FN/-.fx!5i%NFCz-}kIA}Ե ‡;t@DP(yZB,g<) IXp'9iY_SD X? G@< njcT@2BAfn^ ܯ\6+'OkHhNO  5btG8BQPlؠS3Cu,\CSnTWBZWcL\2X93 ֪][^zucJ-ΊbN ]yl0y݆MJ4C0x|uQцy,s: ui[cN 2:3Fkkb6I+6Es[Ď^[$XB5*zZ-_f<\xUTS'SvV ,{b8!`^$9d)*--Eo:z3 4A<zmz_RYj+Ls>kKf:2`Yhr/e`COĠ:]eFʥԪ\.lF^Z}rfFrI3漏׈Nx'*Hn6(Ϧ[ P6).N !d"X1<^㞶܄V:jzR|z=tbr=OW9u54BM 9`U;8eF9+ՂjbjA޼u7Z@1ĒMhTЮs0- YZ