rpms/openssh/devel openssh-5.4p1-0.beta1.fc14.src.rpm, NONE, 1.1 openssh-5.4p1-1.fc14.src.rpm, NONE, 1.1 openssh-5.4p1-23.fc14.src.rpm, NONE, 1.1 openssh-5.4p1-fips.patch, NONE, 1.1 openssh-5.4p1-gsskex.patch, NONE, 1.1 openssh-5.4p1-mls.patch, NONE, 1.1 openssh-5.4p1-noacss.tar.bz2, NONE, 1.1 openssh-5.4p1-nss-keys.patch, NONE, 1.1 openssh-5.4p1-pam_selinux.patch, NONE, 1.1 openssh-5.4p1-pka.patch, NONE, 1.1 openssh-5.4p1-redhat.patch, NONE, 1.1 openssh-5.4p1-selinux.patch, NONE, 1.1 openssh.spec, 1.193, 1.194 openssh-3.9p1-askpass-keep-above.patch, 1.1, NONE openssh-5.0p1-pam_selinux.patch, 1.1, NONE openssh-5.2p1-engine.patch, 1.1, NONE openssh-5.2p1-redhat.patch, 1.3, NONE openssh-5.2p1-selinux.patch, 1.4, NONE openssh-5.2p1-sesftp.patch, 1.7, NONE openssh-5.3p1-fips.patch, 1.1, NONE openssh-5.3p1-gsskex.patch, 1.1, NONE openssh-5.3p1-mls.patch, 1.1, NONE openssh-5.3p1-nss-keys.patch, 1.5, NONE openssh-5.3p1-pka.patch, 1.2, NONE

Jan F. Chadima jfch2222 at fedoraproject.org
Wed Mar 3 09:01:20 UTC 2010


Author: jfch2222

Update of /cvs/pkgs/rpms/openssh/devel
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv27470

Modified Files:
	openssh.spec 
Added Files:
	openssh-5.4p1-0.beta1.fc14.src.rpm 
	openssh-5.4p1-1.fc14.src.rpm openssh-5.4p1-23.fc14.src.rpm 
	openssh-5.4p1-fips.patch openssh-5.4p1-gsskex.patch 
	openssh-5.4p1-mls.patch openssh-5.4p1-noacss.tar.bz2 
	openssh-5.4p1-nss-keys.patch openssh-5.4p1-pam_selinux.patch 
	openssh-5.4p1-pka.patch openssh-5.4p1-redhat.patch 
	openssh-5.4p1-selinux.patch 
Removed Files:
	openssh-3.9p1-askpass-keep-above.patch 
	openssh-5.0p1-pam_selinux.patch openssh-5.2p1-engine.patch 
	openssh-5.2p1-redhat.patch openssh-5.2p1-selinux.patch 
	openssh-5.2p1-sesftp.patch openssh-5.3p1-fips.patch 
	openssh-5.3p1-gsskex.patch openssh-5.3p1-mls.patch 
	openssh-5.3p1-nss-keys.patch openssh-5.3p1-pka.patch 
Log Message:
Prepare update to 5.4p1



--- NEW FILE openssh-5.4p1-0.beta1.fc14.src.rpm ---
í«îÛ   openssh-5.4p1-0.beta1.fc14                                                          Ž­è          T   >      D     
            è      ,     ì      0     ï      @   be7f18b346bfc59f914be1ec9d3d743c4a5268bd     ¾ž†ƒ‰ðƒ6‘
6pÌ“ jˆ   >   ÿÿÿ°       Ž­è       -  °(   ?     °      d            è           é      
     ê           ì           í      \     î     Ô     ï     Ø     ñ     ð     ö     ô     ø     ø     ú          û     ‹     ü     |     ý     ¡     þ     §          ¬           ,      	     l      
     ¬           ,           L      
     l           ì           Œ           L           Ì          $          8     (     m     8     t    9     ä    :     Fm    F     ªÉ     G     ªì      H     «l      I     «ì      \     ¬      ]     ¬Œ      ^     °     d     °     e     °
     f     °     “     °   C openssh 5.4p1 0.beta1.fc14 An open source implementation of SSH protocol versions 1 and 2 SSH (Secure SHell) is a program for logging into and executing
commands on a remote machine. SSH is intended to replace rlogin and
rsh, and to provide secure encrypted communications between two
untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.

OpenSSH is OpenBSD's version of the last free version of SSH, bringing
it up to date in terms of security and features.

This package includes the core files necessary for both the OpenSSH
client and server. To make this package useful, you should also
install openssh-clients, openssh-server, or both.  Kûlocalhost.localdomain    X|BSD Applications/Internet pam_ssh_agent-rmheaders pam_ssh_agent_auth-0.9.2.tar.bz2 sshd.init sshd.pam openssh-nukeacss.sh openssh-5.4p1-noacss.tar.bz2 openssh-5.3p1-dso.patch openssh-5.3p1-randclean.patch openssh-5.4p1-gsskex.patch openssh-5.4p1-pka.patch openssh-5.2p1-edns.patch openssh-5.3p1-selabel.patch openssh-5.4p1-fips.patch openssh-5.1p1-scp-manpage.patch openssh-5.4p1-nss-keys.patch openssh-4.3p2-gssapi-canohost.patch openssh-5.2p1-allow-ip-opts.patch openssh-4.3p2-no-v6only.patch openssh-4.3p2-askpass-grab-info.patch openssh-5.1p1-askpass-progress.patch openssh-4.0p1-exit-deadlock.patch openssh-5.1p1-log-in-chroot.patch openssh-4.3p1-fromto-remote.patch openssh-5.4p1-pam_selinux.patch openssh-5.3p1-audit.patch openssh-5.4p1-mls.patch openssh-5.4p1-selinux.patch pam_ssh_agent_auth-0.9-build.patch openssh-5.2p1-vendor.patch openssh-5.3p1-skip-initial.patch openssh-5.4p1-redhat.patch htt
 p://www.openssh.com/portable.html linux i386   Ø  °  ³  ß  ¾  
f  ê  Ø  Ž  	Õ  ˆ  •  -  	  á  N  ]
 hÖ  2( 
Ô  £x  õ  /ó    1Á    ã_   ®  ¼ žd  ø  ?´´´´´´´´´´´´´´´´´´´´´´´´´ý´´´´ý´                                                                Bçs,D?\¢D»šJî«DØ|iH‡k\IÖ
H‡k\Jm=JqYÌI¶mwK/TKy;óKXºJÅýSJÅýSK‹ò?K‹ü K‹Î†K‹ËK‹Û’K‹ÏK‹õÏK‹ÌAK‹ÍÌCô%KŽ âJÜJÜK]¬K&J°îc318ccf12ed6fbcab9d4654a2c409c27e55db8b862171edc1a249da08d378482 34e73f7e387bae067f8a51cc3a50c5cb2b898c810b32a8fe80721b7b7fc69298 f5a57feca79c97ffdbf98d7f1f97e40c0f48fc19b8ca55e6a900d6ce509fd3e7 29d27cecaac4c1a60e34aee3170a6ad45d1ad02435e08d4581dffba943ac7f4c 33c496b386c22e100b9d45d3ffdcb4a7d88e1b4bb143d20e083f3c53aef5e895 c0e8cce3a5d7955d4be905efb8680593d60f961c1a5acb0a45d2cea7b15c99b2 74ae918188166d81bd347bdf24145b0b2c77578b6cb7895d562bf93b651beda2 3ee3434d53169bf594fd69e8907ea229d73dcbaadc026bd720b32352b4189f28 5ce41a8264987beabb21f4fc24127ef9efb430f115aceaa2441daa502db68c2d ac4ce494759385a692a2b040d02578da7fddcd7ade60cf75268ba69bac5a992d 4d2ffc5a4ec9dc0ef8df198624fdd82872c1fa820f9eee0433a74b6d0e7f79ac 442e685bdc1a5b7e322432209c2f430b73d09d59f98e8941df1cca125fc33a5f 62a1e924fcfb0ef3e9750cb9d8452184b12ffb01b491451fc55fc37d22440581 dcdc08fff0c0d37b423ef90bc68d19f572e086e3161a2
 bf880da3fdaeea43367 46c07b0472968cb90cbb46e248ef143ed971beae2eeb28b0b73a3435154f52f9 462d90610cb1b497b7a1b2925a653a1f4e36f95b440e12dc5ebe67ce6c693477 8904c83b8668910cf7360285615e5e7576e91f53b03c21fd53c2490f1a9b47a5 04cfa6d2f1edd29f1ff79b55d8f9932dd8fe31c45ce9f7ef4da1438c99f11210 f107f9cc9edbeaa9454e6dc533512c0187de779b2f66bb06e344666d5cc35307 65cc8bd09faedc1047a4efcf33b79c151943ce49cf2a83e06ba9edb30420552c 4877db8b1f7600221896bd7e9760b5aed47a1b7d8f13c20decdf9013f9cd119e 7c62602d03fb5eec839dd6b11d19ae47a70b89d9577b8cb95744c388e8b0b1fa 0a5d9ef1e034cc7d9d772a65db7e344636606a1584a134eedbf8ef43356e801c cda10494caef7ca563bc717034a1f78a04a38bcf5830a070c3f85efe3d074046 6f537b00248891e216050e0908e2b527c999fb3a98ad21859f65c371a9d09d5f 1501e4835035cff795d0ea5e6265884259f616a6e5a228bfa324fda6aa10d4d0 aa7a2e49f1bd2cebfcb03f96acaded08e45f91ce55332365d9f9d36e9e22832f db27d60a24fe8c394658a22b6a7e5728440ca2d6d34250f9c1ab0b3fe78ba4d4 44bc68ac4beee7eb476552ff7668e538db4e51aa3c1da49e29704ae4af4
 97888 76c80b6482ea5d03e1f33514f30ac77cd56e2fc8cb233a470562686df7426f4b c9039b4ae1a8d9f3ad306d45f62fc9f5cb35c6cd071d7ca991956340f4fbdff8 64468969e6f63ef3665c2a7d3f6df240737106dc15afd80b115aadb5369bc0f0                                                                                                                                                                 jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch games games games games games games games games games games games games games games games games games games games games games games games games games games games games games games games games ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ                                                                               
  
gtk2-devel libX11-devel autoconf automake perl zlib-devel audit-libs-devel util-linux groff man pam-devel tcp_wrappers-devel fipscheck-devel openssl-devel krb5-devel libedit-devel ncurses-devel libselinux-devel audit-libs xauth rpmlib(FileDigests) rpmlib(CompressedFileNames)              0.9.8j    1.27.7 1.0.8  4.6.0-1 3.0.4-1 4.8.0  Ky7 at KbÍÀK]‡ÀK]‡ÀKXAÀKVð@KUžÀKG@KC)ÀK/c at KùÀK¿@KÊÀK„ÀK„ÀJîÉÀJéƒÀJæàÀJÜTÀJØ`@JÅë@JÁöÀJ»_ at J°Ó@Jª;ÀJ¤õÀJÀJÀJ›»@J—ÆÀJ•#ÀJŽŒ@Jq‹@JjóÀJi¢@J`gÀJMòÀJIþ@JH¬ÀJF	ÀJ@ÃÀJ2C at J
Y at Iù’ÀIìcÀIÕú@IºJÀIµÀI¦„@I”@I‚ëÀIo%@IA ÀHø~@H‘©@H‡@H4ÀH1kÀGúÀGÏÜÀGÇóÀG±Š@G|Î@GUA at GUA@GBÌ@Fîl at FßëÀF»ÀFyÀEÿÌÀEþ{@Eä@EÝ…ÀE¬¾@EŠw at EnÇÀEl$ÀETiÀEIÝÀE ÿ@DìC at DØ|ÀD¿p at D»{ÀD´ä@D?ŽÀDÞ@Cþõ@Cû ÀCðtÀCì€@Cç:@Cà¢ÀC§ò@C™qÀCƒ@C}Â@C|pÀCqäÀCbÀCTãÀCNL at CFc@C„ÀCÕ@Bçw at B@B¨/@B¤:ÀBˆ‹@BQ, at BB«ÀB8ÀB#ÀBÍ@B	û@B©ÀBcÀAÙ3ÀA«@Aa;@ANÆ@AFÝ@AE‹ÀA7@A7@A7@A4h at A+-ÀAÛ@@ÎäÀ@ÎäÀ@ÆûÀ@ÄXÀ@¿À@¼oÀ@¼oÀ@Vì@@EÈÀ@C%À@=ßÀ@=ßÀ@9ë@@,¼@@@@@@/@?ÍÐ@?º	À?¯}À?ª7À?™@?Š“À?Š“À?jïÀ?jïÀ?jïÀ?hLÀ?hLÀ?hLÀ?hLÀ?fû@?fû@?fû@?fû@?fû@?XzÀ?XzÀ?KKÀ?8ÖÀ?8ÖÀ?%@?'@>í±@>í±@>ß0À>Ýß@>~ó@>LÚ@>G”@>.‡À>Á@=Ðí@=¬@=‚À=€À=nÀ=ZF@=þ@=[@=	À=@=  @<÷eÀ<óq@<äðÀ<äðÀ<©@<™Ë@<‡V@<‡V@<‡V@<„³@<sÀ<jU@<N¥À<-°@<ºÀ;ôÿÀ;ñ@;êsÀ;é"@;³À; ŸÀ;—e@;€ûÀ;{µÀ;r{@;q)À;n†À;^´À;L?À;7'À;-í@;lÀ;I@;÷À:ñH@:ïöÀ:݁À:ÐRÀ:ÈiÀ:»:À:¹é@:·F@: ÜÀ:Ÿ‹@:šE@:”ÿ@:’\@:‘
À:@:‰!À:8À:mr@:h,@:fÚÀ:@Ÿ@:,ØÀ:$ïÀ:#ž@:"LÀ: û@:cÀ:@:À:îÀ9ýbÀ9ãÀ9Üm at 9ØxÀ9¶1À9£¼À9rõ@9l]À9dtÀ9c#@9_.À9]Ý@9[:@9X—@9@Ü@98ó@8Ï{@8f@8/õÀ8-RÀ8(À8&»@8ÝÀ8Œ@8:À8é@Jan F. Chadima <jchadima at redhat.com> - 5.3p1-22 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-21 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-20 Tomas Mraz <tmraz at redhat.com> - 5.3p1-19 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-18 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-17 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-16 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-15 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-14 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-13 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-12 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-11 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-10 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-9 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-8 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-7 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-6 Jan F. Chadima <
 jchadima at redhat.com> - 5.3p1-5 Tomas Mraz <tmraz at redhat.com> - 5.3p1-4 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-3 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-2 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-29 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-28 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-26 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-25 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-24 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-23 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-22 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-21 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-20 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-19 Tomas Mraz <tmraz at redhat.com> - 5.2p1-18 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-17 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 5.2p1-16 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-15 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-14 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-13 Jan F. Chadima <jchadima at redhat.com> - 
 5.2p1-12 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-11 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-10 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-9 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-8 Tomas Mraz <tmraz at redhat.com> - 5.2p1-6 Tomas Mraz <tmraz at redhat.com> - 5.2p1-5 Tomas Mraz <tmraz at redhat.com> - 5.2p1-4 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-3 Tomas Mraz <tmraz at redhat.com> - 5.2p1-2 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-1 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 5.1p1-8 Tomas Mraz <tmraz at redhat.com> - 5.1p1-7 Tomas Mraz <tmraz at redhat.com> - 5.1p1-6 Tomas Mraz <tmraz at redhat.com> - 5.1p1-5 Tomas Mraz <tmraz at redhat.com> - 5.1p1-4 Tomas Mraz <tmraz at redhat.com> - 5.1p1-3 Tomas Mraz <tmraz at redhat.com> - 5.1p1-2 Tomas Mraz <tmraz at redhat.com> - 5.1p1-1 Tomas Mraz <tmraz at redhat.com> - 5.0p1-3 Tomas Mraz <tmraz at redhat.com> - 5.0p1-2 Tomas Mraz <tmraz at redhat.com> - 5.0p1-1 Tomas Mraz <tmraz at redhat.com> - 4.7p1-10 Tomas Mraz <tmraz at redhat
 .com> - 4.7p1-9 Dennis Gilmore <dennis at ausil.us> - 4.7p1-8 Tomas Mraz <tmraz at redhat.com> - 4.7p1-7 Tomas Mraz <tmraz at redhat.com> - 4.7p1-6 Release Engineering <rel-eng at fedoraproject dot org> - 4.7p1-5 Tomas Mraz <tmraz at redhat.com> - 4.7p1-4 Tomas Mraz <tmraz at redhat.com> - 4.7p1-2 Tomas Mraz <tmraz at redhat.com> - 4.7p1-1 Tomas Mraz <tmraz at redhat.com> - 4.5p1-8 Tomas Mraz <tmraz at redhat.com> - 4.5p1-7 Tomas Mraz <tmraz at redhat.com> - 4.5p1-6 Tomas Mraz <tmraz at redhat.com> - 4.5p1-5 Tomas Mraz <tmraz at redhat.com> - 4.5p1-4 Tomas Mraz <tmraz at redhat.com> - 4.5p1-3 Tomas Mraz <tmraz at redhat.com> - 4.5p1-2 Tomas Mraz <tmraz at redhat.com> - 4.5p1-1 Tomas Mraz <tmraz at redhat.com> - 4.3p2-14 Tomas Mraz <tmraz at redhat.com> - 4.3p2-13 Tomas Mraz <tmraz at redhat.com> - 4.3p2-12 Tomas Mraz <tmraz at redhat.com> - 4.3p2-11 Tomas Mraz <tmraz at redhat.com> - 4.3p2-10 Tomas Mraz <tmraz at redhat.com> - 4.3p2-9 Tomas Mraz <tmraz at redhat.com> - 4.3p2-8 Tomas Mraz <tmraz at redhat.com> - 4.3p2-7 Tomas Mraz <tmraz at re
 dhat.com> - 4.3p2-6 Jesse Keating <jkeating at redhat.com> - 4.3p2-5.1 Tomas Mraz <tmraz at redhat.com> - 4.3p2-5 Tomas Mraz <tmraz at redhat.com> - 4.3p2-4 Tomas Mraz <tmraz at redhat.com> - 4.3p2-3 Tomas Mraz <tmraz at redhat.com> - 4.3p2-2 Tomas Mraz <tmraz at redhat.com> - 4.3p2-1 Jesse Keating <jkeating at redhat.com> - 4.3p1-2.1 Tomas Mraz <tmraz at redhat.com> - 4.3p1-2 Tomas Mraz <tmraz at redhat.com> - 4.3p1-1 Tomas Mraz <tmraz at redhat.com> - 4.2p1-10 Jesse Keating <jkeating at redhat.com> Tomas Mraz <tmraz at redhat.com> - 4.2p1-9 Nalin Dahyabhai <nalin at redhat.com> - 4.2p1-8 Warren Togami <wtogami at redhat.com> - 4.2p1-7 Jeremy Katz <katzj at redhat.com> - 4.2p1-6 Tomas Mraz <tmraz at redhat.com> 4.2p1-5 Dan Walsh <dwalsh at redhat.com> 4.2p1-4 Tomas Mraz <tmraz at redhat.com> 4.2p1-3 Tomas Mraz <tmraz at redhat.com> 4.2p1-2 Tomas Mraz <tmraz at redhat.com> 4.2p1-1 Tomas Mraz <tmraz at redhat.com> 4.1p1-5 Tomas Mraz <tmraz at redhat.com> 4.1p1-4 Tomas Mraz <tmraz at redhat.com> 4.1p1-3 Tomas Mraz <tmraz at redhat.com> 4.1p1-2 Tom
 as Mraz <tmraz at redhat.com> 4.1p1-1 Tomas Mraz <tmraz at redhat.com> 4.0p1-3 Tomas Mraz <tmraz at redhat.com> 4.0p1-2 Tomas Mraz <tmraz at redhat.com> 4.0p1-1 Elliot Lee <sopwith at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.9p1-12 Tomas Mraz <tmraz at redhat.com> 3.9p1-11 Tomas Mraz <tmraz at redhat.com> Tomas Mraz <tmraz at redhat.com> 3.9p1-10 Tomas Mraz <tmraz at redhat.com> Bill Nottingham <notting at redhat.com> 3.9p1-9 Thomas Woerner <twoerner at redhat.com> 3.9p1-8.1 Nalin Dahyabhai <nalin at redhat.com> 3.9p1-8 Bill Nottingham <notting at redhat.com> 3.9p1-7 Nalin Dahyabhai <nalin at redhat.com> 3.9p1-6 Nalin Dahyabhai <nalin at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.9p1-5 Daniel Walsh <dwalsh at redhat.com> 3.9p1-4 Daniel Walsh <dwalsh at redhat.com> 3.9p1-3 Daniel Walsh <dwalsh at redhat.com> 3.9p1-2 Daniel Walsh <dwalsh at redhat.com> 3.9p1-1 Alan Cox <alan at redhat.com> 3.8.1p1-5 Daniel Walsh <dwalsh at redhat.com> 3.8.1p1-4 Elliot Lee <sopwith at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.8.1p1-2 Nalin Da
 hyabhai <nalin at redhat.com> 3.8.1p1-1 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-36 Nalin Dahyabhai <nalin at redhat.com> 3.8.1p1-0 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-35 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-34 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-33 Thomas Woerner <twoerner at redhat.com> 3.6.1p2-32 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-31 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-30 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-29 Elliot Lee <sopwith at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-27 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-26 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-25 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-24 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> David Woodhouse <dwmw2 at redhat.com> 3.6.1p2-23 Nalin Dahyabhai <nalin at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-22 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-21.sel Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-21 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-20.sel Nalin Da
 hyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-19 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-18 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-17 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-16.sel Bill Nottingham <notting at redhat.com> 3.6.1p2-15 Bill Nottingham <notting at redhat.com> 3.6.1p2-14 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-13.sel Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-12 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-11 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-10 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-9.sel Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-8 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-7 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-6 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-5 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-4 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-3 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-2 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-1 Elliot Lee <sopwith at redhat.com> Florian La Roche <Florian.LaRoche at redhat.de> Nalin Dahyabhai <n
 alin at redhat.com> 3.5p1-6 Nalin Dahyabhai <nalin at redhat.com> 3.5p1-5 Tim Powers <timp at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.5p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.5p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.5p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.4p1-3 Than Ngo <than at redhat.com> 3.4p1-2.1 Curtis Zinzilieta <curtisz at redhat.com> 3.4p1-2gss Nalin Dahyabhai <nalin at redhat.com> 3.4p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.4p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.3p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.3p1-1 Tim Powers <timp at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.2.3p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.2.3p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.2.3p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.2.2p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-4 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-2gss Nalin Dahyabhai <nalin at redhat.com> 3.1p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-1 Nalin Dahyabhai <nalin at redhat.com>
  3.1p1-0 Nalin Dahyabhai <nalin at redhat.com> SNAP-20020305 Nalin Dahyabhai <nalin at redhat.com> SNAP-20020220 Nalin Dahyabhai <nalin at redhat.com> 3.0.2p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.0.2p1-2 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.0.2p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.0.1p1-1 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.0p1-1 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 2.9p2-9 Bernhard Rosenkraenzer <bero at redhat.com> 2.9p2-8 Nalin Dahyabhai <nalin at redhat.com> 2.9p2-7 Nalin Dahyabhai <nalin at redhat.com> 2.9p2-6 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at red
 hat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Preston Brown <pbrown at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Trond Eivind Glomsrxd <teg at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.co
 m> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Damien Miller <djm at ibs.com.au> Damien Miller <djm at mindrot.org> Damien Miller <djm at mindrot.org> Damien Miller <djm at mindrot.org> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> - ImplicitDSOLinking (#564824) - Allow to u
 se hardware crypto if awailable (#559555) - optimized FD_CLOEXEC on accept socket (#541809) - updated pam_ssh_agent_auth to new version from upstream (just
  a licence change) - optimized RAND_cleanup patch (#557166) - add RAND_cleanup at the exit of each program using RAND (#557166) - set FD_CLOEXEC on accepted socket (#541809) - replaced define by global in macros - Update the pka patch - Update the audit patch - Add possibility to autocreate only RSA key into initscript (#533339) - Prepare NSS key patch for future SEC_ERROR_LOCKED_PASSWORD (#537411) - Update NSS key patch (#537411, #356451) - Add gssapi key exchange patch (#455351) - Add public key agent patch (#455350) - Repair canohost patch to allow gssapi to work when host is acessed via pipe proxy (#531849) - Modify the init script to prevent it to hang during generating the keys (#515145) - Add README.nss - Add pam_ssh_agent_auth module to a subpackage. - Reenable audit. - Upgrade to new wersion 5.3p1 - Resolve locking in ssh-add (#491312) - Repair initscript to be acord to guidelines (#521860)
- Add bugzilla# to application of edns and xmodifiers patch - Changed pam stack to password-auth - Dropped homechroot patch - Add check for nosuid, nodev in homechroot - add correct patch for ip-opts - replace ip-opts patch by an upstream candidate version - rearange selinux patch to be acceptable for upstream
- replace seftp patch by an upstream version - merged xmodifiers to redhat patch
- merged gssapi-role to selinux patch
- merged cve-2007_3102 to audit patch
- sesftp patch only with WITH_SELINUX flag
- rearange sesftp patch according to upstream request - minor change in sesftp patch - rebuilt with new openssl - Added dnssec support. (#205842) - Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild - only INTERNAL_SFTP can be home-chrooted
- save _u and _r parts of context changing to sftpd_t - changed internal-sftp context to sftpd_t - changed home length path patch to upstream version - create '~/.ssh/known_hosts' within proper context - length of home path in ssh now limited by PATH_MAX
- correct timezone with daylight processing - final version chroot %h (sftp only) - repair broken ls in chroot %h - add XMODIFIERS to exported environment (#495690) - allow only protocol 2 in the FIPS mode - do integrity verification only on binaries which are part
  of the OpenSSH FIPS modules - log if FIPS mode is initialized
- make aes-ctr cipher modes work in the FIPS mode - fix logging after chroot
- enable non root users to use chroot %h in internal-sftp - add AES-CTR ciphers to the FIPS mode proposal - upgrade to new upstream release - Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild - drop obsolete triggers
- add testing FIPS mode support
- LSBize the initscript (#247014) - enable use of ssl engines (#481100) - remove obsolete --with-rsh (#478298)
- add pam_sepermit to allow blocking confined users in permissive mode
  (#471746)
- move system-auth after pam_selinux in the session stack - set FD_CLOEXEC on channel sockets (#475866)
- adjust summary
- adjust nss-keys patch so it is applicable without selinux patches (#470859) - fix compatibility with some servers (#466818) - fixed zero length banner problem (#457326) - upgrade to new upstream release
- fixed a problem with public key authentication and explicitely
  specified SELinux role - pass the connection socket to ssh-keysign (#447680) - add LANGUAGE to accepted/sent environment variables (#443231)
- use pam_selinux to obtain the user context instead of doing it itself
- unbreak server keep alive settings (patch from upstream)
- small addition to scp manpage - upgrade to new upstream (#441066)
- prevent initscript from killing itself on halt with upstart (#438449)
- initscript status should show that the daemon is running
  only when the main daemon is still alive (#430882) - fix race on control master and cleanup stale control socket (#436311)
  patches by David Woodhouse - set FD_CLOEXEC on client socket
- apply real fix for window size problem (#286181) from upstream
- apply fix for the spurious failed bind from upstream
- apply open handle leak in sftp fix from upstream - we build for sparcv9 now  and it needs -fPIE - fix gssapi auth with explicit selinux role requested (#427303) - patch
  by Nalin Dahyabhai - explicitly source krb5-devel profile script - Rebuild for openssl bump - do not copy /etc/localtime into the chroot as it is not
  necessary anymore (#193184)
- call setkeycreatecon when selinux context is established
- test for NULL privk when freeing key (#391871) - patch by
  Pierre Ossman - revert default window size adjustments (#286181) - upgrade to latest upstream
- use libedit in sftp (#203009)
- fixed audit log injection problem (CVE-2007-3102) - fix sftp client problems on write error (#247802)
- allow disabling autocreation of server keys (#235466) - experimental NSS keys support
- correctly setup context when empty level requested (#234951) - mls level check must be done with default role same as requested - make profile.d/gnome-ssh-askpass.* regular files (#226218) - reject connection if requested mls range is not obtained (#229278) - improve Buildroot
- remove duplicate /etc/ssh from files - support mls on labeled networks (#220487)
- support mls level selection on unlabeled networks
- allow / in usernames in scp (only beginning /, ./, and ../ is special) - update to 4.5p1 (#212606) - fix gssapi with DNS loadbalanced clusters (#216857) - improved pam_session patch so it doesn't regress, the patch is necessary
  for the pam_session_close to be called correctly as uid 0 - CVE-2006-5794 - properly detect failed key verify in monitor (#214641) - merge sshd initscript patches
- kill all ssh sessions when stop is called in halt or reboot runlevel
- remove -TERM option from killproc so we don't race on sshd restart - improve gssapi-no-spnego patch (#208102)
- CVE-2006-4924 - prevent DoS on deattack detector (#207957)
- CVE-2006-5051 - don't call cleanups from signal handler (#208459) - don't report duplicate syslog messages, use correct local time (#189158)
- don't allow spnego as gssapi mechanism (from upstream)
- fixed memleaks found by Coverity (from upstream)
- allow ip options except source routing (#202856) (patch by HP) - drop the pam-session patch from the previous build (#201341)
- don't set IPV6_V6ONLY sock opt when listening on wildcard addr (#201594) - dropped old ssh obsoletes
- call the pam_session_open/close from the monitor when privsep is
  enabled so it is always called as root (patch by Darren Tucker) - improve selinux patch (by Jan Kiszka)
- upstream patch for buffer append space error (#191940)
- fixed typo in configure.ac (#198986)
- added pam_keyinit to pam configuration (#198628)
- improved error message when askpass dialog cannot grab
  keyboard input (#198332)
- buildrequires xauth instead of xorg-x11-xauth
- fixed a few rpmlint warnings - rebuild - don't request pseudoterminal allocation if stdin is not tty (#188983) - allow access if audit is not compiled in kernel (#183243) - enable the subprocess in chroot to send messages to system log
- sshd should prevent login if audit call fails - print error from scp if not remote (patch by Bjorn Augustsson #178923) - new version - bump again for double-long bug on ppc(64) - fixed another place where syslog was called in signal handler
- pass locale environment variables to server, accept them there (#179851) - new version, dropped obsolete patches - hopefully make the askpass dialog less confusing (#174765) - rebuilt - drop x11-ssh-askpass from the package
- drop old build_6x ifs from spec file
- improve gnome-ssh-askpass so it doesn't reveal number of passphrase 
  characters to person looking at the display
- less hackish fix for the __USE_GNU problem - work around missing gccmakedep by wrapping makedepend in a local script
- remove now-obsolete build dependency on "xauth" - xorg-x11-devel -> libXt-devel
- rebuild for new xauth location so X forwarding works
- buildreq audit-libs-devel
- buildreq automake for aclocal
- buildreq imake for xmkmf
-  -D_GNU_SOURCE in flags in order to get it to build
   Ugly hack to workaround openssh defining __USE_GNU which is
   not allowed and causes problems according to Ulrich Drepper
   fix this the correct way after FC5test1 - rebuild against new openssl - put back the possibility to skip SELinux patch
- add patch for user login auditing by Steve Grubb - Change selinux patch to use get_default_context_with_rolelevel in libselinux. - Update selinux patch to use getseuserbyname - use include instead of pam_stack in pam config
- use fork+exec instead of system in scp - CVE-2006-0225 (#168167)
- upstream patch for displaying authentication errors - upgrade to a new upstream version - use x11-ssh-askpass if openssh-askpass-gnome is not installed (#165207)
- install ssh-copy-id from contrib (#88707) - don't deadlock on exit with multiple X forwarded channels (#152432)
- don't use X11 port which can't be bound on all IP families (#163732) - fix small regression caused by the nologin patch (#161956)
- fix race in getpeername error checking (mindrot #1054) - use only pam_nologin for nologin testing - upgrade to a new upstream version
- call pam_loginuid as a pam session module - link libselinux only to sshd (#157678) - fixed Local/RemoteForward in ssh_config.5 manpage
- fix fatal when Local/RemoteForward is used and scp run (#153258)
- don't leak user validity when using krb5 authentication - upgrade to 4.0p1
- remove obsolete groups patch - rebuilt - rebuild so that configure can detect that krb5_init_ets is gone now - don't call syslog in signal handler
- allow password authentication when copying from remote
  to remote machine (#103364) - add spaces to messages in initscript (#138508) - enable trusted forwarding by default if X11 forwarding is 
  required by user (#137685 and duplicates)
- disable protocol 1 support by default in sshd server config (#88329)
- keep the gnome-askpass dialog above others (#69131) - change permissions on pam.d/sshd to 0644 (#64697)
- patch initscript so it doesn't kill opened sessions if
  the sshd daemon isn't running anymore (#67624) - don't use initlog - fixed PIE build for all architectures - add a --enable-vendor-patchlevel option which allows a ShowPatchLevel option
  to enable display of a vendor patch level during version exchange (#120285)
- configure with --disable-strip to build useful debuginfo subpackages - when using gtk2 for askpass, don't buildprereq gnome-libs-devel - build - disable ACSS support - Change selinux patch to use get_default_context_with_role in libselinux. - Fix patch
	* Bad debug statement.
	* Handle root/sysadm_r:kerberos - Modify Colin Walter's patch to allow specifying rule during connection - Fix TTY handling for SELinux - Update to upstream - Apply buildreq fixup patch (#125296) - Clean up patch for upstream submission. - rebuilt - Remove use of pam_selinux and patch selinux in directly. - request gssapi-with-mic by default but not delegation (flag day for anyone
  who used previous gssapi patches)
- no longer request x11 forwarding by default - Change pam file to use open and close with pam_selinux - update to 3.8.1p1
- add workaround from CVS to reintroduce passwordauth using pam - Remove CLOSEXEC on STDERR * Wed Mar 03 2004 Phil Knirsch <pknirsch at redhat.com> 3.6.1p2-33.30.1
- Built RHLE3 U2 update package. - Close file descriptors on exec - fixed pie build - Add restorecon to startup scripts - Add multiple qualified to openssh - Eliminate selinux code and use pam_selinux - rebuilt - turn off pie on ppc - fix is_selinux_enabled - Rebuild to grab shared libselinux - turn on selinux - un#ifdef out code for reporting password expiration in non-privsep
  mode (#83585) - add machinery to build with/without -fpie/-pie, default to doing so - Don't whinge about getsockopt failing (#109161) - add missing buildprereq on zlib-devel (#104558) - turn selinux off - turn selinux on - turn selinux off - turn selinux on - additional fix for apparently-never-happens double-free in buffer_free()
- extend fix for #103998 to cover SSH1 - rebuild - additional buffer manipulation cleanups from Solar Designer - turn selinux off - turn selinux on - rebuild - additional buffer manipulation fixes (CAN-2003-0695) - turn selinux on - rebuild - apply patch to store the correct buffer size in allocated buffers
  (CAN-2003-0693)
- skip the initial PAM authentication attempt with an empty password if
  empty passwords are not permitted in our configuration (#103998) - turn selinux off - turn selinux on - Add BuildPreReq gtk2-devel if gtk2 - rebuild - modify patch which clears the supplemental group list at startup to only
  complain if setgroups() fails if sshd has euid == 0
- handle krb5 installed in %{_prefix} or elsewhere by using krb5-config - Add SELinux patch - rebuild - rebuild - rebuild - update to 3.6.1p2 6 rebuilt - add patch for getsockopt() call to work on bigendian 64bit archs - move scp to the -clients subpackage, because it directly depends on ssh
  which is also in -clients (#84329) - rebuild - rebuilt - rebuild - patch PAM configuration to use relative path names for the modules, allowing
  us to not worry about which arch the modules are built for on multilib systems - update to 3.5p1, merging in filelist/perm changes from the upstream spec - merge - fix to build on multilib systems - added gssapi patches and uncommented patch here - pull patch from CVS to fix too-early free in ssh-keysign (#70009) - 3.4p1
- drop anon mmap patch - rework the close-on-exit docs
- include configuration file man pages
- make use of nologin as the privsep shell optional - update to 3.3p1
- merge in spec file changes from upstream (remove setuid from ssh, ssh-keysign)
- disable gtk2 askpass
- require pam-devel by filename rather than by package for erratum
- include patch from Solar Designer to work around anonymous mmap failures - automated rebuild - don't require autoconf any more - build gnome-ssh-askpass with gtk2 - update to 3.2.3p1
- merge in spec file changes from upstream - update to 3.2.2p1 - drop buildreq on db1-devel
- require pam-devel by package name
- require autoconf instead of autoconf253 again - pull patch from CVS to avoid printing error messages when some of the
  default keys aren't available when running ssh-add
- refresh to current revisions of Simon's patches - reintroduce Simon's gssapi patches
- add buildprereq for autoconf253, which is needed to regenerate configure
  after applying the gssapi patches
- refresh to the latest version of Markus's patch to build properly with
  older versions of OpenSSL - bump and grind (through the build system) - require sharutils for building (mindrot #137)
- require db1-devel only when building for 6.x (#55105), which probably won't
  work anyway (3.1 requires OpenSSL 0.9.6 to build), but what the heck
- require pam-devel by file (not by package name) again
- add Markus's patch to compile with OpenSSL 0.9.5a (from
  http://bugzilla.mindrot.org/show_bug.cgi?id=141) and apply it if we're
  building for 6.x - update to 3.1p1 - update to SNAP-20020305
- drop debug patch, fixed upstream - update to SNAP-20020220 for testing purposes (you've been warned, if there's
  anything to be warned about, gss patches won't apply, I don't mind) - add patches from Simon Wilkinson and Nicolas Williams for GSSAPI key
  exchange, authentication, and named key support - remove dependency on db1-devel, which has just been swallowed up whole
  by gnome-libs-devel - adjust build dependencies so that build6x actually works right (fix
  from Hugo van der Kooij) - update to 3.0.2p1 - update to 3.0.1p1 - update to current CVS (not for use in distribution) - merge some of Damien Miller <djm at mindrot.org> changes from the upstream
  3.0p1 spec file and init script - update to 3.0p1
- update to x11-ssh-askpass 1.2.4.1
- change build dependency on a file from pam-devel to the pam-devel package
- replace primes with moduli - incorporate fix from Markus Friedl's advisory for IP-based authorization bugs - Merge changes to rescue build from current sysadmin survival cd - fix scp's server's reporting of file sizes, and build with the proper
  preprocessor define to get large-file capable open(), stat(), etc.
  (sftp has been doing this correctly all along) (#51827)
- configure without --with-ipv4-default on RHL 7.x and newer (#45987,#52247)
- pull cvs patch to fix support for /etc/nologin for non-PAM logins (#47298)
- mark profile.d scriptlets as config files (#42337)
- refer to Jason Stone's mail for zsh workaround for exit-hanging quasi-bug
- change a couple of log() statements to debug() statements (#50751)
- pull cvs patch to add -t flag to sshd (#28611)
- clear fd_sets correctly (one bit per FD, not one byte per FD) (#43221) - add db1-devel as a BuildPrerequisite (noted by Hans Ecke) - pull cvs patch to fix remote port forwarding with protocol 2 - pull cvs patch to add session initialization to no-pty sessions
- pull cvs patch to not cut off challengeresponse auth needlessly
- refuse to do X11 forwarding if xauth isn't there, handy if you enable
  it by default on a system that doesn't have X installed (#49263) - don't apply patches to code we don't intend to build (spotted by Matt Galgoci) - pass OPTIONS correctly to initlog (#50151) - switch to x11-ssh-askpass 1.2.2 - rebuild in new environment - disable the gssapi patch - update to 2.9p2
- refresh to a new version of the gssapi patch - change Copyright: BSD to License: BSD
- add Markus Friedl's unverified patch for the cookie file deletion problem
  so that we can verify it
- drop patch to check if xauth is present (was folded into cookie patch)
- don't apply gssapi patches for the errata candidate
- clear supplemental groups list at startup - fix an error parsing the new default sshd_config
- add a fix from Markus Friedl (via openssh-unix-dev) for ssh-keygen not
  dealing with comments right - add in Simon Wilkinson's GSSAPI patch to give it some testing in-house,
  to be removed before the next beta cycle because it's a big departure
  from the upstream version - finish marking strings in the init script for translation
- modify init script to source /etc/sysconfig/sshd and pass $OPTIONS to sshd
  at startup (change merged from openssh.com init script, originally by
  Pekka Savola)
- refuse to do X11 forwarding if xauth isn't there, handy if you enable
  it by default on a system that doesn't have X installed - update to 2.9
- drop various patches that came from or went upstream or to or from CVS - only require initscripts 5.00 on 6.2 (reported by Peter Bieringer) - remove explicit openssl requirement, fixes builddistro issue
- make initscript stop() function wait until sshd really dead to avoid 
  races in condrestart - mention that challengereponse supports PAM, so disabling password doesn't
  limit users to pubkey and rsa auth (#34378)
- bypass the daemon() function in the init script and call initlog directly,
  because daemon() won't start a daemon it detects is already running (like
  open connections)
- require the version of openssl we had when we were built - make do_pam_setcred() smart enough to know when to establish creds and
  when to reinitialize them
- add in a couple of other fixes from Damien for inclusion in the errata - update to 2.5.2p2
- call setcred() again after initgroups, because the "creds" could actually
[...4574 lines suppressed...]
øð-â¾#ÇTVµF¼**Ø[ðŸ^za@¾ÛôÙ:x§JL	$™2Ô_דÉÝ7cë¿ÉOG' £¸d„míˆ ¶…4ç@‚¢;ì«”Dú@È–ññ>¼™q3qœyûL´¯¨tx2€ÃÀ3H@ŒEh÷vüü±§L^ÞÍ¡Aømd™ww…ßô§ŠÂ9fØ<¶ÿªd£|,
´Â!ÏÜÐ<Û¨)TÎ@•ÞžÔ‘fu @â	Éû€$T€¥±=mžm4 EÕÏÁ¾kŒŸóïÙÝQ»Ã°ò?«Óçú5›Ì„b5!`‚Ÿf.üOÄÓ•_•ÙõL„RLü6O©˜ÐÍI‡üWi¡:HY×tŒ$A™ôÖ£ãCk÷^kW¸›ÉRCK÷wYJ™6Ò͍YµcjŸ
¶[úÌÌ$QE›«ÚöqÒÇÕð‰ñžhÈS>KH¯=RJ”³¯ÃÆ­:ˆ«×o¿ª•/ÙÕåæã#	"ȶºÈÖÞWH­»],EHBHºBJ9ï0bàa[«{³¡;ºRƒ/„ŪF|ꉵ,•X’~Ñcé•òÊèýÌ|ox!­< -uÕN8ÁÆõ¸àg™–ɦ—ÊŒ‚•¤ È\5K¶näpK’DÜ” õ €x¿–ÿe²Ÿ
kdy'¶6V3š¾'7iÐR2SÍõÁh’.bf`fC2$A$$ØFÔÓüÚ¬¶Í{|ó±,ʁ3BlÕÔʏ‡E1-¦ÞxdȲ1ÅÃv½M”B;Nü½æÁvê@5.O„«òÖé#rŽ«=KŒ7Wzw{º·j&Ñùœ.,Ú	9îð±\mÌÉ\eUñ·²ç((/rL¡Ž;¼zÖÛÐ@Žê8úÃßWÅŸ<5öÓǼ\ù¶êßF¬·ñD
3óÇ7ÑêÝÃ\<tóU88ßˈyê’I$Ú~ŽbE~Múpëï9vhãÙ@ôï‘„¨WU”‚A#²¢Î«hJ%
,UPò–Ž‹gÇt£àºöiñ£¦º eàFÇnmp¯[£`õí¼µhiq»Ù¤k8pr¥òé_ýsðìÌÚý$ «§Í¢Ý½žXÍö{ñÜT2“äªù óúXِýÊkëiþ¨‘Ý[¹®ú¾Wߌzv?¾`ƒ?…¤Á{
Bè`{îYæ‡ä‡<ÿ=ÛO[nnnw¤ß…¶G„§ÒÄÏÅ;†Rí"	¿ Hd—ç½wó¹õ®bkþH2f`ùl¬ß=1bl{}1çÛá9~ê’IR´I~3ý ö*¿TB$qm+!pè ÐNڬ¤ïÒÍ}¦ê=ð/ZN–)›+%4`@{í|ÜC.þ8úKÓ7Oc;®­˜J"xè•N¬Ý‹T¦ªv&–ÁÍÖ‡üiÊSƒ`yKÑaîc+ή§)m[ݍ™bÁ‹YIH¥È3øNùdŒ`Â&$Ml» $:¯eÓïPæ )1(2@$0>‰s÷ûxõŸeÔëG-Y F¢f ô°KÉ<ÞºsÿlYr‘kÓØWlð‚i€‡ ´Ã06iö'dí—3¥ŽS^¬—q`¿eÚËáƒc€g2ñÍæ‹`(7œx1)C\G.k}#Ôªoü:C~»ß9ô¬ƒ ›Å~lï-<–ãÕGÇ­¬¾ÃÐ6šouŽ}_‘€Ä4MY¤Ðs«ßâSÂùé՝*!×Ú"Hž¨‘! ýÐ (ŒŠÈY[·Û„ý↠Ÿ—ó¬¥ÂuÀÛÚ$F$LõBÄ_Óðèøò¹ißv| þ¬ê@,xÒ&=t€ëŒú<i7
t>¾Ü.«ñp?®(GpoI:­¡šbØÛWm–©¢pd2 ~ÐD5xLú‚92Zöòõ%¹’§Gõ’¶,¾óæyù7Dm
On1¨ý±Ø·Ë¯~Ém Q‚Ý+BJ?Ó®'§]~½.£¿êå »/]¼>ÓS‚³c$Œ`Äñ>®ݧKéð8ŸB¢‡³K›¤~*ñKó0W¥ïêù9ìχ®»£$‡*:-PU) @IÛ¨tœ ÈŒ‹{ w=Q餉°± úþ®Ó[€˜ð@ÎÞŽìx[’v@‰+%çª:‚¼‰|™˜ È›®gËàòÕËZÇHì(ªþ²ŒmÕKj ÒÅ­ä¨úá¦nìUù??Å¡6/ßvÑ{ÿ»åç¯[žÏ1$¼A+®ž¾®z¦ˆ&¦¥!Rªk¨ÂMJ÷z.y‰¿•A		îI$ÍÍYº¶«ˆCãY¡÷AF“œi^)Å"v%–“rgI
gÆ4vþóó¼` r’i\¡n¶ÎŒ¤d	þ)žÏŸr텍Ôò}åòÂÐ2‹ëü«rŠ¿w=ñK¥¡BÆDë'ô‚ÜãFµE°£¹,¨/NPQ7CyÂ*iÁ¤¼:sCࣴ S+óöVžÓB{ÿ&3	9ß~ÖÀîáÃ+ZZJdš™oó(O}*—‡µÄD•£Éd(…=ìŽÓ+£!Ø_0ßϛλJÃ
Ý—ân²¬…º,Ž~.«ÌÕÓ=¹«Ã·åë%ié—¬k2k
Š²àîW08ÄuŠZ±<D”–²C ]oÔ•v¡K²“Æ4¬Wd•0€EÙg-Ô¬• Ýp;ºï FDI;
Šf>
D~º©l¨¢qXé4€ýéö|'cÀÇŽk3< !@Ç(ˆZLÞ×TáE{é³Í¿-ÜRøt	D’!"§„—·R8ç«]y'bdgôéïaëäbP™"Éi]߯ž÷ÿ*IøåÒ¥ ãï7nKgW6Œli_0k8”Œs$ˆD–y×M±FéǍŠMÇãGž34÷ósœR+tšŠCÂ+y$’’Xï Ûºx”[Œ*}S×jÖ"dH¯*£±gw¯ÍÛØìCÏ/»‹êQï„;¨ݬqÿ¯³ï³ÎÊl¸¤´ª;¬¾ì×ÿ¿8ŠʐÒ!Ú~	 O¥‚‚}×cç²bÊ…•éXµÏO<ë²FKºµyˆ‹A…欗æWžgìðMA”inB;òÎG‹²aĐ%ƒS™œŒß㪴ätX¢nÇgm}X»äR¥,Yp„V®/ÊXŠ>²ÀKA!’™h.^æô˜´ŽÆÁÛy·V‹¬$ïYÕ³/֐$>wÔf@wxé·1n®:xkŽp@©C¤™$|‘3é[amÕÙ\ÑQz›ûqrl`r®°Œ²PM«5bèe…OƒYžd¢ `Hp¦¥ý\Rè&1©¨%OžN­,Â,›`iøÙP{H›ÆC$¯’½{^Ñ!{©ÖMü²‡( †hW·ž:Y˜	Ý¥wz#Q‘“Û=ßÆÐsÝVTã§YýÁäßDHG8€ €¨ ']ü"Œ¼ F‚¿ž4IBì„‹¨,ˆ2(â'HAaC	)H[	Oâ±!l&¡ЁôåiB Dad?_ó¡H¢â’, „P¥}JÕ$‡ã­´Û_l…ÌWîØHNå¥Ð¨f+™"ùá@È*U%ÐõÙ÷Å.$‚m•­o”þE^/\Õ“\ÛnÊƍÐ(	ÎëH8!îÓõ–âO¯ªÐ-Ø¡"
,!ƒžï=Xöa¦‡öËð—ÏGç-õ„ØP {«º$åÆzh; O¢®­À‘{¡P='‡}ƒDÁÁŽ*N씄` È!±AZdÆHUä‘%‡¢WŽßLzå)}›)x¿åÀÞ¼Jùb(‹Îú)f&Âí„1* ÉW»ÊFDÄP53¢ ¤ˆ	 ‘H\&µì‚"šЈw°jyca€D%›šŸ£Ï"h£÷-kÝoašµ
¢°3q þÄžr6p¡˜ŠE‚¬ª™«b­·ZUU¾™¼2·ùªÚçªÌj]kWdåªåjBZ
BœØÀü×:
$˜¥¤#	VFÉ-&°ÑFêФ„!
±ªPD¡%JMI Ý{Sù\KՍ…kiõØl Զ­™£Zµ(›W*–o¦Í¶Ý–j5fm°ñ×ÍãmbÉ!5JPJ
 ´Iöëm«òy	Í™gb¡ùDæñµp	x¹ãé]2$Šý5éJ#ˆ²ïˆ´ßÿ7‘.¿¬ïAj€äH³º°( ¦žzÌ%?O«¿+Ü¡­†k†œÁbÈ'FtM5…Ï—ð¶ó–k]Düÿ›øoñwß;ÚÒÖ*ªªªªªªªªªªª©m«ž3ýp° Þ*…ð¡S6i¡#¹$!RkŸ#Lmpåw;r&vl&ÛD —œê‹ãCÄ“ï-`›Í4dVëÕÇž¼ºo“\n9]†9 ™ ²% ¦M¶áG›n‡Ñåçdu ›(­ˆ‚ lÅl€K~3g,cZ"€FêKpŒÈèÂì­hðd«k£ô^Ëú¯þG€M[ˆ¨èÀ¤ˆ±p )hˆ‘­7G#ª'£Ì‘VLåõ]˜›•’Ý¿áÈTP	® ƒîT7)ÞïÛ_–6µZŽ-ÓîÝœ@˜½;	-MP·§Ÿ{O{ž‡x{1[É_/mß™’.I&<»ÐU2°h*»„å¾RðœsËLd‚•¦¾r“ !_¥¡Ø)ù@AõÀxá(d¦IDP	¤‚…BÔúä‚ýÐ ÎZ
v ŸE ¢2/»¥§ÔEÿoúÏÒ7ëWý1þ¹ÿ®žõq•ì­²×öòÛä
d#F/Î7œYØ>|°4j5 "¿äíãsòä¡Wí#?ÎÜb9Kl/ÅmÐ~3öêW¿ópôá‘…O€»=ËØ©ž'"T™Ñ~P/¢îgó(ú‰d×z¦6ïÓ‘Ã{'¬kw    ýªœ"E:]ó>Ï¡Ög£çø±«c6wÈd«ÁÆ©™¨ß/{nîtÛ„‘”€@•¶SÏ:¯·ùŸwxB¯ç¨ëõð»ª_ÏB{z5~®ˆ¦¡a'¦’xÙÙ±Í ˆH€f  É ˆJÃ@R
:*©…vçev%Ó9¯ªÌš%Óþ阛%Ó‚¸K$v_KvIÉç¯ü½A|Îà™¢·×¦ê&ÐN`% 
e©»qÌÛF$‹2)
C A-o,1‘^d~}OüQŠ
 )YïUÐvP
ã—°ØmãFΚ?©ÜžÀAxˆf2ð GaÎ>Y:›¿4<:GšAÁ ê[%Ï
æÞeÄhLõ+öÂ^IV·„´š{–¥IŸ§éuUCû¸[¦s¨Fp.o¯g')^«FÈ’ñ±/!Ñ(Uõ¿íÌíaD$ÒÞ‘~ø¡"È·~Ø-G
„Ø öÎlÕlvžý›tç}:cÿ¦Uå±ÓÑçŹÐ~Ó`‚¾
f©qs€$cÕ΀ñiн?NîrRn8ó¾Mæ|x9Æw½ˆHÊÀ¼I-¦9Ò"œ¡LÁ¹òì#øF¼£6‰#]‘<‹º\>„ÃçèðHV²¹­” XÀ*†ÜZÃD î@¯n|¸œóP¹·¨Óg¼w0®.bö“ˆ~¿¹Èá}çˆÆÒÞx:;ÐÛáØð3ˆÖñC%ŠHüõˆ¼Ï2Ã#o×Æ–ÝäÓD©#݈¼7.÷ˆ«y7¿© CŽ¡ÛgŒë%[µÎŠ¢w–K,â±|p€"Û<g=G>“Õõ,™!}¯šúU˜ä´ìÿIk…„
¢œ«Žì‘^”Ui@Ú†ö¶@ô……ö D¤²:Au#ÃôAìtÜU©
@SzpL`NùÝ`šÍõèŠ:þ';=Ca§Tó_m¯*鮲"ÀC	)"7ð=Úó’Y¼û+-ÔI$eÌ!˜HÑ<¾Þ/gí.=7긧OϦxÿ—£‚·åú¿Ç¡LÔ’“úa¢
Œ¥wÏæû|Ûµ–’2úNc,‘&[õ¯™Q4¿Q„ƒ¡’åIÕF 
ïà|ã;B!@¿í ÉIÄ7žÉ¸h$5á2ËõÀ¯§ï²uE$S¿¦5ÙWóËÊ÷Aô@6€‹Â
xÀá ” 
r}¤¼ú!b;†PÓDE¡¿"#Ë¿½õ¢¤È¡QüXÍý°ºŠ.û‘DŒy‘>&D²Z|d6DZ|+:,+ï%“Ÿ‡)x%8ª‹>ÊÕéXd$j«&ºãùèþCðbíHãçŠâÂ*Ç1#¹S>Y}é½zöëÉ  "KàïRðaÙ„yãÍS`»’ÑE.oã2Ãí;ŽsïÑõ"·9qW¯Y¦üSù ¥eò„´Ô•s&¦¸º[ØÁ¤çŸ¥¿vþÆë@üˆ î‡ÜY T‚ %“}ܹ.ÞŶØ'l¦ÚúKn ™Ã0Wöù¯(„O¡,l!	MÝ“®!zÈo—;
(:·{‹<´!¿AÑ‚1n-•¦eÃvÉžÈ%ZÞS¼u,¿å\U(Þ5)Šu‚ ®FÉŠ"Û7Ýòy;g.Ÿ”šóA
õòü/Ÿ>•övSUõ‘T†ÛV™0—L…5@§?1k£Žyóšõ#æù8ª$´ò£Úœ
ì;éa˜a†øX{0Ϥ‹8KÅÕk~þ~ð®^üw«³NØcõ}ЁFrWõSœŸ™ØBûN9üŸÓGùÿ\~oUÿáêúr/ñ8tOÖò ì	L‰'ÂÍz¯Q%ŠŒû*ÒÒ‡Úx4Å+$„	m(ìáöÄ…“²õ€eÓ™úwÕ«N³î‚6
ŒëOÙ0;32fa¿¬ÙÎþLk[†bùïŽh›_Ýò¾’\Y‡Î¯¶;}~7oƒýð͈§#Ãå¿ÙÏ-†ñÔþX-ê*ccKŒ`knf¯Ý½#“­í—nx–팴tçs§­gÖž½_=yoÚíÎýÜ|·^:¶	àmãÛ^£¹âÎÞ_ݶ9ÆŽ{énË\ÿI5ðßNõOØó¼ð’ìENä3‘ýúí2ÑÇ¡ÑøI:kÒyÈìvý(ÛÇÖÝiGöög›!Ç xûz b$˜i}>œŸÿ·pz Ov–Î~óð¾8PåÈ„ŒuZB¸Ä‰ü§Åó~ÿ¨LRXÛÏbOŸ‡çÖäíÑyÎÑ?F]Sï\Ïî… –håGyCúñh9-3—Š ©ß·Ÿ¾|‡2è{¿îï4ÛK¾kzC|£1÷Í[¾¤q‰iŒc¢ÄGïd]#Èí_z©ÔCVËýíþÎF» 6«*‹ŸÔ&ÔC”Ev“MÓ÷|9þü½þÉÝ4»®[¨¾£JR-lHÐH°wlIDGÓŽ«†ÀÇÂOÇÚ\ZXPAƒëb¥æ¼ÄÜŒRJªÆ(.ídnh1 É öýÚ'‰è»ŽÜ	§aŸíP¯P‘BÿÝIqU€ '–`N;­¸Z
›Õ RK)_i S $~¼<ॊ(`H´-2K (lÕê 4hã:}Yî@·tKVÈÏX¥VÒdÔ¹ÚÙÆ+.µ_žmI¿_&êýUöüÀÓª¬×cEB¡Hœ+.E5lÆí¿7ÍømɵͫlÛÁ¤zqáÎXrP„×®ÿ†º£Ùl©€Ðß­„I|»<ŽÇø0”D„ĸ/Fþ¾®ƒ~νØÔšÃûÓ·Ùåᝈ±cÝŒcª{Í}û¸+SÕ(‚c"sA æ )@˜Š )Ž?Ïá%{Vë€D@ÉShh{¼	ñƒz‡F…/8
´n‰£ô@@N™¶(ºÄ%>õB¯ŸÒ„oñ…­t‡ó’LðÌÃAÈÅìrÝ›÷ÆMõ÷·üƒ=r—>ÈhF5—þXäòÖ’í30¼æT¡žª§´I`%±€QÏ÷zÑai ¨ëÍLÞ4ø8˜EYi®ü7þøÊñà<˜§6­ç•M,³©oœå)J6írfÍ¥“¯fóA^’ݱþ ŠH£éšŠþ´§f.z´R­…ÄY|XÂM?$í¸2L õ_”$†œ™iæ"ͯä,”3 ˆdÞÛrÇu7ÛÈSzB;Ðz·ÇÊ.Å6IÆ5ƒÕ“ZBs"ÿÈùj÷|È_J¾GÎYXH„:fn:É¿ ŽÐ'J at jèÓP	YTIÀÔådñMÖ: Nt˜Þ{~ŠáÕG®ƒÑßÜdªf Æqö;}=ñ¹à[BB“7H¶%@™5š¡mV¢ÁE'52ÚeŽÑÓ2ð“xÝ‘ÃåÁ%º„òÿc®à‘³ºLoF~|¸Þd¨¬!Ÿæ‡¢CóñK²ÓmÒܹOÙŒ“Pq³Ñ l6¹œ“0unåˆtPWa«CNÍφyé$ŠFBª(,¸rã‘s®ïì`»
ÜIPŒ¯cÔþ.ú; @Û¾g\}‹i@ÌÕr­ZMº' Î`±ÓnzðD2VC(Ë!¶5~l5%4âoÏb9Œô¬
F2À,_Šë$4/IU¹«Ü¤–‚‘¿åC4þñ¯ƒË0MÔù/ß4X`f  2š±…ò˜Ðê–ƒ*[J)À	;pjW54Q&‰$!$›CÝµKC–WHN¢5ž;\¦ÌMè!$9TÒöߢ7ÁáhjI"²I
•ç~£®>Z¦ªš©ÉÓáËM¡ÿ`áòe^S£
[˜6Í„HIãz at xªûrų‚òk]KzêHÄâð»·&ÈÃ[fìµPÔŒ¥Ç©£©äð©È/Ù#sÑ¢R
Ã3–Ö5µ±÷7wŽŸÄݺ<±–Éšù<tqñÞ¬l¼¡ úkÒ@±•8:;¦ò’Ò¬Là$2†µômùÚŒúiÒpÔk"$ºÆ¾h;|Ò $LÙ›•ÏäîÜ=µ’)" 0Á^ã#>‚6Á½?r׬“œ§´Ô7t7sìÁdaÃbtt?8Èuâé	
a :ÿgŽ¾°ÔÐà#@sçÝ ‹/ϺiqÁšáããÛXi¾úhf¾V=³|•Sn[¦¶8–e A<´¬r-[Î笠:\ÖBɐ¾¶ÛŽ’Y´ƒlíTïsõ’žA¡ßC\ë'œH‚ƒüJçŠI_¾g,Õìu_–eÞ²L-æJµÉùh•uõ@ÞZ“ÆIí3Ù~>þÖÚ÷ÿ[¸¯vÕÀ    5Pz_dÚ÷E¶6·€
kêîú§Kåym¯oWEÈ€Eˆò+©‚Ÿ­>´¤èð}ÇÕ?Á]úvˆ
> HxI+ó„r9h°"P ‘ØaÐÅ)Jô¬HÜ#˜I|ƃ8mÜN@G,bD}\¡:-š8F†©óѯ&@ˆi˜åö[H¦>Z×{|®ºÑ
’+íÃà󎟵˜è~@Dü)º^ºX±¨±ÁšH3Ðå­ 9(Âþ™RWóãç_…Õtfk^Wdô¿<ÆEb (Ý¾fÄ2ú(ôÑûëD}Ë¢ìÅ3Ú¼`!ó AȬȴjË©$!;ÑÂ5×e0 APÍKµq@‡÷í£í‰ƒ\˜œÆõéÜf”G•¯¶	Í…Èó±ÖG®ð-¯9/²è;à`\Ž*iÓ…¼ï"%dì¬5¶[8e³á îy*Ÿj©ï¹°†Ù –½½å‹¢È"Š$Kòlr弄{‘–&96À¢!D''«Ó~‚C¢†¨laL«»«‰Ð ›]+6Ó=Éd €É]~‹óQ¦FýkM•¦D›»· š¤Íª|µ)VÁ$	”̱*«ø®êUKŸ.Oñnˆo!Û¦7_Ëš4ÆØ¿ç(¹Ï”(¿R”Šñù'“V%C\W£7ˆ?P’¯°J‡ z¾è…ˆu‰Q#"ÓX44òj³PÍbZ¥EÔэ=5çEˆˆðâö~—Qe†íEF4N[¸Ü蜐Br¾ÑZc¢uG¡L·QÑŠ÷ßý÷•–vZÜqB­åo?g©kyªÑ¡¬	h¼3ÕV:\oÆ0à"¾3Â}rEC1-ÒË).”+®íà؈6ý8É	Õ<ċ<º7„¤/”ÅYZyìH ¾ˆH‰"H¨’ €uïõNÎ\úkiâŸÂþÍýzÚÂÎv áq(&uA
 ¶+Ó‚­äzñ“iX¢Á†/þ#1Hc,²ùÃ0…1„&™ûõf‰ÚÜÍA\Ʋ0¼.=ücà515`F:À´#ËHѦùé*çˆõL¯^ÙÏ#>A½]`ö•˜¼¥]¦'¬³œƒ®ºÊ2t«‚°" y¥üSNsØ á¬6ÀǶ‚w€¨E«!‘® íWð!ÊÚ¦+}„8鍤 Šs˜àÜbÿ8@Áª÷¼µþóÖpÑêF‰ëd÷ÕƦõDëm»Ì7…ÂÖ:M“Ö”oL×p
P	,GBZ @¢¤"§bÅT,X¯%Ú ¡š YÈE
· °(d DD
P£ün üÌ–‚¹@4A µ"“뀢•ÂjÉþËûÔ}å±Ãƒ+†%EL.UÑ™öå^ÔñÌöæÜÔ
 É€³ú±Q𞁙sÑÒНåŽ=Ìûñ„t™’„‰ƒ`D25‹¸û¯¯°/G3'd°Ã‹Y•Id
µYg…m%h®ULÌ,ÔñÔCÏß²,iÌdí±Ñ#SvŒa8Óëñ¤ñ?ƒÆ|_içz"
-ö€%d59×zoÜRB°"`¢¶¾ž¿)(¨€@.ÂZ`T±·Ò=»€NŸ^GJó÷Ê<ã¹	0€–	l;ÏSÎ¥ô7ÚÍDZrAÏÂ3òò?i;±yyÑ·õ1Ý[Ã*ù¶zØÅa3&jÎTmC ‘mÔè
çM‹Óf>½6°’ìzLÕéÍo3K]Ç–n×èÖ_j‹.ÁxØ9ƒä@od…³F…
pJíÐñ5WÒÜs¡^YNØZ
ˈw؃‘„ƒéz 6Š¢HTßÅb2×î,9ùA Œ‡ÏXÕ™*pCY>µ2]´a
4`v1ß.`ÛÆ‚”C埏ºv2"I|x{>܈>½PHâ!dëŠÐ"ídÕ
¯.X×CS$ÚcY£PÁB ;#a,¤k‹}`!µf‘ƒz‹Lã­@E”OCWÏa…É·æ,4d.Ú±UßÑË;D?Ì|¼¤	„“ùÂrK.¬7x4#!|
Jth­ GUHì`$€ñff­ØfÈWðòzý-UEMÒîî­®îî­»|sx|Dè%CW
PP]Ãvw¾X§y¿±ßìÄQ‹ÆÓ.¶è=¹qo¿€†Ý/%$¶ny¸6Ñð#»>$7Cvî>p(
À«ôðµkËÑÆ=dlßÆæ*ƒ(¦¾ˆŠH“bŒ›&ª·/b¼î!ŸkJp¶ŠÐˆïBQ0x`´ÀM8ò)9`9U‡µ€â¥RøP4yB„/&(PÝkÜïœ2¨ p€ïîÓ¼¾}Õg¸k^󟱵É"ØŠ/p)Ì;/ê”âG{Z1EŸv&J‰óa ¨Æ%2€1‘à$±9!A>âÒi‡ÉFÍá.þ•èzZÎÀÕxדMMíPåÄ1¡˜YéŒøÛ{óƒiÜD
_ÂB“’W±Apðlò€¸ÈÃqQ/VË)VX/‚“¼Nf”Ââš-6â3D#C!Œ:
JN¹Õ,±¥9pû§	ð9J~©ËÙîôݱÙßéQâW°;ÃÆåÕ ƒÌñ
ªêK’OÀfD—iï>GºªPs þ}hFþ³ˆ	ì6D[âÿ”Ø$=¿Ì 0éTØñålꃫc<Á>íCÅ_Ëq¸I)¿æš9>Z®.²†úQX£OÊ„îH(ŸtT!‡Mü
‘³oM¤*YZÁ±Ž#‚' 9ƒFO'‰Ž+Ý}ÿȬ´#6e[¼x£LeU¸Ó0;X H°•·ŸÆ‡nOœçú~J4!î˜îíDÿt¯ñöu…ù°I7“{æЇ9¾j4Óôð+,Š(jÆŠÄч9Q_Ïu”SŸ’Àý>_¯@÷oÛ—BŒ8cè’¤¥AŸ}†‚ÌHdf1çýq2íÝ¿Wä+ì8.ÇŒÊ(4 ‚‚R¹©i¨ø€F£$›"Æu“¸Ã¨d
¡¿ú÷½?»†q§±”sºc Ô•C‰FY¤q¶5hP¯³ÙÜI?ñø¸î͝•—ÞÀFûÆ”’$‘ù™"¢•‹Ö=xÛšÔô†®€‹]±Ï~l§-±¯ÖL6¾[¯‘|Èyb封kå3ÎAºèùg&Wò9º÷Ú»„œ¡C8 …Ra“D	÷çF“I])-¬DDDDO¦¹ëˆzÅóOfR
æÏz uMïúÿˆé ³-<©„k(É{!í7Öíå¦ #¾„ôª(ñ1×òøn:½7ÛMÇ&9ÕÕ›éÇq1ÇqÄÇL_qÇ÷‚EfŠ]@ÓqÍê.êìÉÚQ_›—ø@õÑÐDv=]û=r::®P㡾v<¬¸Ä"{w„5vmÂŘRMŠIÉ1Uµ”©ÜªìÿCó_šP Üo˜ÕÉcKiµfMûwgìÙÏþ鞍¦aY柏Ç
Ö[skÝ¢yÔ-³àDôrRú$_ô>éC·T^`2´|åmƒ²3½Û²Ä®ˆ4ØÕ8⤅›ð ç³;S{Ÿ«kÙá€~„
ßxÔ"´s†]$Oùãðõ¾™UD[]·Æ|eTUþ^ípMe“çH	­í©ØVþG3Öå	‡zªJ d¶£j1 at S‚ÉÍ:«·^zBc1äU¨˜ßXf‡6.ÎKŽã¼_A‹>P€¦O–D¤ÉÊìü6®©4=–š,½‹É´ž)LI®ÛIÏ릟»ey¤­Ó"‚Z8tgÏ~J8òãóÃ_œ®!j*÷P5A$—€´ÝÎhç½CsÆëï±ßòùbr†¼h’@hdÊCqQl†bBÓ>Sx×åÆ«ëpf”¨“±ÀCœÄkŽœû­<'MfÂÎIÄfâÍQ<GW³)ψÌ ]V{ùB„6×Îàâ¬d‹Pl²À㬒E.€d–¢Y“W §f¨€sÞ<p”ŒÒÏGÜZ%~[ ±ã½kmqÓÑ™âyò3œì)ô fq0Ç, at 1Îpƨ‘‹,¨ã¹'ُ'Sá‘ú·9
ß%ô–@ã’K+v¹¸iT-ᝮk(tªýAÕ{’AÛl}*3›JFf|3ûë£S`{ß'Íœv% a»÷à‹ÝaAùäõEιìSµYà“C׎)ó"AŒcîÌ+oxèOȏ‹6ŽO†0tI^›>¾£FœdÔWHê´ÆV$TçÂœ[ÓQ:©Ön¢ã–UÉß]Fç´ÜñÏ“†HÏ6}rÜmËjWhr‹ÕŸGˆR¹_Á™˜fff½YK•{ã\Ê
lu…ÖÐ"÷Ó2/•R‰ ÍEfºUJ[Ÿ¥$˜žx4'ôÛêG>Ÿ?æÜl+ɝ”²8Ÿ»üÞ+3Ó>f’K«ÊËw†ì¾ODMÚŠÑaäÞ§XE v‰'IQ<Ç$ ú,ÈÏ·Ž‘ŒÆ’Æ©RÚd䮸݊¹Ç '€‰ÍAC·-g+Ú­m¡5„·)´‘š„$žÀ|6Ó³D²ØHXæïÃ@Qn5ùžÙ fùwé¾ò²3}nj•ÆÀèe<›x}/×(¡$ȏoäèyÑ|âW«þ‰¸ynaîi0T%å 4.Š•éd5›•Xq ’`%á]qŸœC$“…B–ÊÑÈæËl:úk¨Šˆ6ëϏ…yäç׬ËyÌà@¢ó„Š/jG7ïp"Ì&"J¦¯GåÒ7”´¶2*Ã%PÔÌJèÂÈjèÓ#œ†Þ$3; +@ìTn{ó±%_a†4G[ÏŽFyÑ•’¬ 9 Ævsèúß¿—kXÝuÄ都±$Ã Zô[¡ãe0™K¹ˆBP‰4X5­‘ˆÖ~'Õ–ÃÙß/²Â¢%¬Ù8·e;ÎŒÅYË+ãѺnÞ¶vÕ…ÔG	ñIÁ	~M¬ÔW¶ŽGaŒý»èH"A°'fÏ‹‡âÏ:ejÒ‰GF²ßu­`ÖÃÏ®ã™
0iChQå'9Šw:ƒ¬ÆÒQËŸ£=’½Ÿ3¸ÏSÝìáLµ	÷…5ˆa²U™´]^m>	•¿Vm8Ʋ`’¨%ãër›G×´>fÏö;Ýzf‘‚![<›¥½o2N‚ÍŠ;ƒ³Zw3åz3L†5‹ðÌ<zydq•<·-ô<`HX)ƒ(	Il¹Tµk¼¦œ5Dà³t…Q´a†4Õ8GW‹šáárDCÒûb<!µ!”®,‘HÇW~°ÀÙ8fh°Ò64[»>7©Rh™õP͌ͭK4¶_U)r—QôÒqÝ`’2‰Öð/‹çÌCŠÃŽ«Øò @"Ä<±B”`)¸\„ÁE¹, Y YDYð6G	8YÂ’Ò!#H
äݺZ~-DœáqO"@蚶ñUm[fÕ
Z©¼†¯R•M)
6ut¼Ër½H«‘ÑÛÚJÆ”ƒ(ד`B¶R“æhs;Kš!è-§HðÂf¾JlEt=—î€_[ÒûhÓ’7³zjŒä5˜@IWpðϬ¤ºH+ɽtÏ9¬–j tÐj¼Lì"Ž†Êð$½D‰)•ÓsÍßNW¹õÖõ?{“¯"lj) 1‰®Q¥= MN7 #ÛmÒmI¬<1Ï
±%À’ÈvÕdyk@ƒ»å³GrüU㝉…¶@Š§ˆa#+¼u4ÞšÞŽø}ÓŸ—  =Œž©„ òáßd6Íu˜˜ž¬Ï7èýOHúóƒ|½UPLÔ®¹ñoî²q	î®îîîî.‚{pwÜÝ]îî>ß?çLM¹˜gUõ»ºª×e÷z/VU/‹HaÆñq±òü8‹”±gÚ„
]RÔé3ª~Ò-ìYz3JœSܯ/;±J&´Z¢ÂY=®â «úËY±éûOì&1C)cÃ˳/ü/,·0Ñ&‹AA€váovÅ»œvì?ævøH‘vKŠszÜ{ÿ,—–vç÷äLð+m:×ÒkŸÕÚÙòˆN&µc6ù&Œ²ó¾¨‚V-²ÏheË=ýñ]ÊÚ«XögÆ(äµ9ÂðÒz­ÙcæÈ2`‚ƒ*?ËnÜñã$vC	ˆ„PœE%à7Hüãn¼WQ3îÏ6å¶þÚ†¦X.!èãûÆ™É'Mò
Šäú»Ÿâåך–GOË&±‡‚Y¸~°®˜ÞxòLÞö¡oŸ~IrQ’ïI‹pAWz\þ'C*,˜xŽz§,õS€°žÌ× — ¢ù¢!Ú!u²Q`m4’ñµ‘eÛ‰(’íÒ¤X½C”î7qoöÃ
ïØHùð«»Ê:´•‡¢ÎnÒØ™g-H“÷ãz̾µÈñ6{DÈïÜ“äå	Å7ýÉiÂÝegUÍÙôٝ$•ÙþŽžCaÝ{üW*Äç@žTh÷Ö`@
_gSʇ&¿Ê&‡[¸þ|û‰æxÞŸÀ@ã‰)Ãå±Án ŽaÓ	^„68¾ø¬­ëUÓ^)è(09o©Ã©ýá±ë—u$‰™ûÞ±,ì-à
òºAO€©T¢@„"l	iô÷82ƒý£)W }ôO³ýKî()êÉ*´PäŒ5˜<ñÞ[¨‡€Ì8´ž…µÝ‘PjÖº kN~®à_0qs½ñEõò¾ó,Ë73ìï–L	·½ôð/×
—rèe"ùPç_e`;Ž‰©Àa¸©Š¼aÒ¦½’—;H䣦õëι;¡?ïɐ¤e45ù
¢SòÖÄ-ÉíŒaϾ‰&`Š˜I†Ðü­—Èó£CÄUŠÆ¢P;‰úeañ4úSŠQÕÖsÃC¾$ðr_û)°*ÆðG<GÉAÝÏ ÓÚ"ÃLPýv	ú‡

Eé'à.ñ"ð¥­Ê!k䬺¹2ÔúÈó*©|ŒGÒas	o³Vú×è~Ê,sZÕî,•ƒ½z/õ…ói?¶~ËñÂ^•¯.#x/Zôm¦wëÞ׬›2ÙaETG–0¿<W#Ȩ_š.cVÜëýj»ö;(H˜¡²hBÂü¢LrÂÇMÀ!?c(< F
iûö›CÞ*+µ[¨šŸÛëLjFÚÉ‘éîÓ[Rµ½ƒªB†þŸ4ÊšJƒ 1·<‚u%ß„š%¶ºiÍÕã‹aщÁ”±!)P‰¯.Aäˆè_i“®rË“DJ7‘#1ß„o?Š$†MþnÏí8jÒø¥¢ñKsbýéÆ ˆÏtGjO?„•
ßœ_3wºX¼»¸ièƇÆì^©Ú0ß^ò¿·¤=¾4ðÀ¡Ç	xSåŐ/ôÄaÒßð6/Á<ùsŒnt¦è¬®¡¦§©RÁp˜½—>ÚÄCd4«m¬‰Nä‡4À0ë´í‚6‹’¨ãÎ`Ѓ˂	oÔ—eÐ|8J|õ‹î|ÓqTŠ‰dc¼žä¸[6ƒá• (B/k¤Ë<§þÅß<{‘º	åT "tYÈ€D ë½:o™Púu¥Áˆ^\·ñݤeHÞ£eR®qÙhº"Ò.â@¦¨ü¼ðxt®ø<1=õ§©_r+°â#|ä?K’®þ«T£©,]1Q-ø¢”šÒPÇ,ßùÛŠn9Ž\­»êÞËgkjM;îbQaô#¯lýU¬}*-Ý56-mù¥õôêøà`ñw¤4÷ýÍÉQâÊë¿ß>7CIWBí¡æ.¢¦ŸmõßµósšÖÁîí•-+j¸úuÍ,?Ì+	÷ágR˜/.®RdQØj4·ˆõ}¥=ºrœOO]]˜-èy:ºÖ„d;±ÔóüÃtu©&ûq¥~Ö…y\°šî	˜iž=Ñ:ñóãS¿ð•WæÔT÷ƒGŒEì6$&céR›¤¯++†~¦_>Žgˆ+Hñ—‹˜ÓÆøˆ$L÷Cp]Ái§?®;ぎì®Ê²w·Ã¹uéDáµ—7¢÷¶Ã_Îþ˜Kçð¤¢TÐ'äá°Ï7ÉôL³ÛxâÕ-ª:€pûm‹;PzKé˜Ð@YÏê¨õ*º—£©oT´J²Ë_¢
K
EI:B„åύ–ÓŠ+d$)Å‹Ù¤Ï ‹Ñ•••´…Ñ´ÿIrÂÜyiÃq2ÿÉE8!…­É¹ò«¼‡,’2íASIhX]Iab!Fô⒁<àˆ‚¢œX9ÚA·úèÜÜ”Äï'('Þ¨Ìûwov{£â0~˜Š£ºz‰L¬ÙYbÄ}IN'9˜ÚtÜ[rWϵKÏAÏbv$†$™D”}­œ%XÝBFŒÆë‚VUµ.Èé:e7ÑÝ•ãUž·÷&d:Œ›íPË2V¥Æ†už«Ü]%¨·<eó`ã)$­¿@ê!“‰ÿZSí¼Õ¦O·˜Ì·ýWèÑšµÍÓ´´ô76ÒËͱŽì,õÕ;b§ñ;[ž¿2ÒÃIs\¤ÖK§“è
 W„kV=¬¤ÀêáúmúT‹hÈ%# ?+%á!Ô€qŠe(
¶’£ Þvu2)öʼ¤—hRe6âÑ;Vþ±lЇoë ßôAìÇú™G<u¹ÓýŒAšØÉ„³Ûú
_ƒÐYnº™s§„;êR¯à»0‚è¾ÐÔYaaÙ|›yîj)^‹Ÿ9±Ðn@”œ®yÚšñ„yÜÀª*azºã^-Ãõ=ðPÄ£-¿’f¹¬Ñ—Ÿ?•Üç¿wŽ1ø(BWW³Æp¢`¡ÚSTÖ}šF
WƒJb‡G3Ìoðæg\X«KªÈ·øÝldÞ+›N‹‚LÆÖü¯eacî˜x£ÝËòø®'ÞÚ>¥¿âÙÞ8“¦Ô¹’u“ïì€Ú‘•ÞèˆÚñ$ÙEKúÃ#û·‘åŒ÷æÓîÌœ
8£ bbËò¸ÉÆøØ„ Ü&çЍŠ;ªD§ùÔwšã•á|X²e±"¦Sž¬*Ä̏Y
mkH­‚·–¤VŠ?̯™ü½:Åyéašøt¨¡9Á¥4­“~ŠR£|_ˆYù¶ÞÇ›@˜ÝÕT#Ž“SÒE…dûpÿªgo7û¦à“›‚®¯ž/BÌÖü˜FìWá]Z÷Kžµ6‚ã‚gšÆù§ ¸¨ØhÿI‰£¦'T—ŸZwôÙðü,‰!Ç$§"_âg[«#³ÔcgÏŽëéÁcŠ7ü?KkZ,»F¥­½|M9|qOo•Gõ𒊲0aTVÓ„~”œ"eSô±ÿÞ11z)p“T:U
ŠL‚z³I²À
—ïä‚M„A‚xÑ“»É|–Õ4Ç'R—è=õÖu¡Ça`^ÑÓž^fê–jƒ3ËÏÔÔ؟ѹ.7Ï¡n
}ͳ tÁXÌïº
 ̯IçÂŽžñÇK‡m=âŸÕl’ŽR´<½°ožþ³ÆI-#XÓ·]g‹øè\L?\Þµ’]‚´Õ7ÞvKÝz÷ªn®³×ýJ¹GºvÖôÝX3#†æ®sõü°(c`W¿ï
§¯ùÀµˆ˜ÎV0Û£÷Ð”pìo³$s‚…t|‚æËùhë5_Ä3çî´¢‘w_¢ŽD<œ÷ã·fèyUñɯûfQI\ª’Ê$ñaþæ¼:ÿ@H=s_Ô¦<9œEÏeæî/ê(êá’IuÞ{u|ÞC} 8W®íä{zTz\¾Þi?„ïqhbò~%ƒqdv-»JAûx …ˆH?‹<™|ø6h}ý§(Á!£{†äå;½}¥!ôpÿÎwÙ¿|
Û6Ï«$7CD„Ó†‚ãSˆñÉ fã(daŒ`læªxЂ†¥­”ŒüWŒd¦¸/B¤Sè§ü-Wé´c1	"®ñªz£ Cƒ…„8©éo-~xpÌuúI«
¯R›º`¿wñ¯góÌ68á¨u˜¬‹?Q…À•é;ñÒq~æa˜µ\ú<Æý¨škAFÃZç·ôN–™ò>_»>2HÇ l‡Œ±ëÉ«,1]n¦á$‘ðõïQÅS¾ºñWDÇ:‚SZÒØUWìëÝñÖ‡¯ïvä7Šå9ÓA€Kû›]btj½Ä›ÔفCA^ÊëQp–MƒP OžXÌ5ïÇvU×ÔØÏU¶ŒF¡DÊìæéµp*ÞÍ”A\’a³AX:•Ï\Í+L¿ë~¨XµŒä‰ÔÄÚ¥­q÷äz7‹qZÿχÖñ9]PÒþóiD‚èÒ~I2™ð™3ªŽ2TdÌâZlŸÛ¤½µÓ‘¿­­n´ñ û¹ßñ3Œ%9© ‘œ `¬²{nU•U¿ÃŒMU‹…V-kË–‡†TƒÚæ“Á	jiO±D9”<rxF#LFd:•Hfõ¿¾Ï:[3'÷¾a~æSôjÍ6¦VKÉ«{=5•«'¬1ÌR—Ä-µOkM™í÷ÜÎxöuûK‡a’#ÿO~| 4ƒÂ²IIe¼‚ÉÙ—¯†YŒ{pÔ»äýêž~Ffr—ß«çÜè&„%~×æ:ªÅGçI
À'_fW“²áZ·‹ƒØÖÅ¡Û8YC&1þ4DLà,KXÛ{Œ_m?¡¸ÜUÎÏWMý`6)¤¯’‘ÕÑQ'ЕTS/)jÃVÿ¿Áøßú¿ù?wêêj ªpùÒñÿudjåÿ‡Ž£u,YT«ð’|©m{Fo—Ø´túÿFÏÏo褖Øõd6›G™üÒQW/ÑÜq¬õ·˜uOÆáq¬/‘ýÃô3M 3'ùf‘©+
Æ ÉJò©+û(¤Bø±w­´Xð)Æœ
Y@d H4„:*ì96©‡¦
•eÕc ÐkÀD§ÕTmÖЀ£¾Ž^Š‚ÌÃÛ«õ¾Ò‘AçˆF¼4…“‹ù7æaÖ"Eñ’g›ÊÐ6HÅ°ü+…ÙSGK3 ï…gF at o£4ÁÒ®ãeHš0Pa2~æŒu'k›^Ó‰B%±¾’¯vöo4·…§J< Ìa7tAP² ¬Q@7·1i}õOtè9ó®Ìâî…D±7š#LÜE01­fèkùæÔQit„:­  °8ãÿ,êè(פ41¢‚+»þ«-ÐÚ€–jº?\©8º¾É^HX^p at k¥Y‚¾*ÅkfUÓˆI‘õ^û­©^.H©ªÄ
‘û…ýÕÈ‚Ú']I–nä0\Ô.«&ÒTùRó×¥±AX`;:–J:AYòëºh“ƒ[žÛ‹/›óAe
Ò×ïF¡…å?‘d-¥,×£4òÕfý:Z‚sÙV¨Vœ/h­íºÞ?,5˜h–ùö¹¸mmœS‚è`† ÉÌ¡8Á!€ÂPS4’]n7³ÃjÑ$E•Yl”Ùt¼2篱T´v]!¨s´tN…êÄŽ§TÛRtD,”Ž5•¬èÃÀ5 "?ÂD,êJX°%£k„e†~#¼ñ¹&ÄiŠÃšüüTà8³ùé}KfÝ#†*ú\™ä-†å
Ÿ¸}Û]ý²ƒDùœ¼¡#?'Cø	À„:ò<«ÒAo’Ä‚¸"U¼­½÷_pþ#ß®ô35{˦gŽ‰áY»¾´NÝÃû·ù¡=/¹yw"V}ÒÇ“˜Ço|wªgªü¯Ÿ=ÛÏ/nÛ–Ì«Ò~—óã¼üS[©¥±ë±Dábro—bÒ|rÓ”„.šL2}ÜQÛï‚…)RÀ?†1“Nq=†Ëë'ìG›¤ôýq8£Úèª(¬h§Z;œ~ÚÀ«ÿ¼V9>„ï¨Ê0ö&“‡T7ð[n™á™#®§»ýÛ P/ØDᱧå|T¸†TÓ飼‚3féo B“@$îýÛu>¾2)}ùg¼Ö8úAed‰H9–ď›bÅ×0rÁ„?}“	B3ž7×S,µ¾gÔ!Žßó^¡Æ,E»?w¦„]È'ºß¾1!+Q:¨§(㘀%Ä ¡W³rK¾ªŠò†1ŠquŒ\S«APÜó"”½^Ö9›ë‚ä>Z	ÆŠoOƒ ´Ï;‘9ì–­q»Oí†y?ªô+dÅ@{xiN£'‡!¸¸Ü,‘fÆAÛÕ÷î{B?ñÝÒ·Ì&m8Ãç	¿nΗ¬…ßñ°DáJ‚jÈ•åK~4GìAïà¯Ç½TÈ4I­ž³$)½pd9¨4T®—ˆE mÃÛ£¹"©´{†•…mÆ4%cxXH6Å£sÛX~k^zùaл¥r/yÇÅôÝ&8"4§ÀTÆY µyú”ØØŸ¡	JLrK˜Ôá•û籯T¼7ªO·¯ñè—¶Œ0¢¼Å\¢±Û®âÚ?¼îˆ¤(8¤¬=Väñúb¼±0ñýʇ–®R@DsR*#­­_#ìïAJ€´ü¬2íÔªbˆ@0mE ¼N:+¤C¼›Ì)ªåA»å–}á_‰ŒŠZ*Õ7›-\_O…§=3ª^0¿9ËYÔž¤ýj'‘kò€fZúúh-kÔ€ä„}ë¨>þúøDb<×U*¼ïsúXf8ís0nù›D:F3‘EüØï£+éày<¨:Ââ³mޝék»…M…XÏY¥`25Wàß}S– ÇÎ#+!Q£S@—B`‡w"éýüÉΈd¿ó[C†]ü
A;g+
ûþÑ[EnÏ€£âVrUÁ%ÜK7åÆIØå7ǍӲŽ£à¨û£c.À Ô@  åûE]¦9Û÷k`lY2E峂¼Ö,ù¤›êlDì«m„8(h̦+ºduk¹½Æí›ÒØðÍ+ݶZÃ掀82YN­ASŽêåíÜÒXîZ¦8™‘ïóS£¥ÿ’×?QûÆJ?Îd'I”-œ›º
6Íû­|gï…8¿ŠÈ ‰ÉGGçw…îÞÐìÄ„ˆß¹k	ؾ¡dÛTö(&vÏ0‰k©¦¼Ø®Fƒß¿K¡s1&mNÃ,†0ì
Õ¤Ly¥Ï¡[ã¬/SRR´üYI aFzgèÙvge'
Û1q_mÔy¯~´\xfȐ@‰–¬°tË{囐bŸ§0ú_ÏRÙž^7x`ºipã€oUÚÍø{y7œþÂ:ê$å½ÙQÁŠu1ów~’ì+L„Âr0"´Hq¨þŸð—×jT]Þ¼[®/-µôœ;>S<ltIåÛ×^N!·¤4íî¯jWŸ•º©”TŒÿÀïé=**¿ëb"ª^LÜ+Œh0Aò^Üã~tHÐè€+^L»‰A«ÙЉAÒrdð‚	ý ^DµQ$ÒÅ2BŽ½ËÙ¾Š«Zh•
à³ÇøÏ7¾ÃKæcèR4j‘]¸Ò*
yhF	H2ouEÆË{DN$§éF¢ëC€»k¾r6Â÷æHërÐ4l†DâúÖ?üC{Öã_“ˆüèK¢638ƒ¾zšÔs 6 €N¾€3/fz&CO·‹A"„\ªÏŸI,÷À
VT¤J<þðÀd4gl
—Z1%:GáóšnǤŠ'?J_݉£¢aMÍ4’”µ\¬þ¸×ûþ¼º™TF.Ôß SÐ̼lvˆŒå»ok¡êìYUGë—ò'c”'œôOµw|®Ý@Ù€N†bÅ+E¾¿¯YO¦5àòÞ7«K@æ(’ŒäÆð}>™Òv	·-ØK
Z¤íÑ@Õ*|WE"AîŸQ%·ó¯©ñãٍä׎Ð%§øW‚¢
,ëÄî`´6ì»iRŒ¥ R©á‚~|P$$¯~@§ÔÐú°eµ&™ø‚§‚çŠôäx偍3{ð4c.Ôä'ÁJñ,(_ׁvþÆ\tq³zçŸÇöx›»{ˆß×/
ÃoxGXrT:Ý£¿`çj%UDzÑÛl†•^3Æð†®vG¾n¸	|µe`L“7t¾yëi|-·ãšôô(lÞº}vr6~ª“¦žyüà·ÿ@àFmÊ
¨ôj@zgÕG] hZu• ×ÕwýævQ··«©@½STÎÚVß{¦ÃJ	T%¢Ã’¾I5T™æC®s?Þó~z¯˜gm=R‚0ÄuH»Gg6¤i¨gŒÝÕ±ßôºêe>Íë·Úkp,¤Æñ	Í¢ŽÚ‹UbšùÍiã‡
œï–wmßƾŽn(à3ï’0e Ðp|­úûy^$ùsÛmÛ3“¦¥‘Ü“£¢yËñ°ÿínAžãAËÓoõ©½ x|À‹úûUkI|îp¦r	Ûõê¡ì2JØÒS`µæõÑ«½¾!\±có"rnå£ñ<Å%‡„,‡Ã.8Yß؆o=“Ü€úÈÖ‰ÚìQœñi»àl‡ë µH/ÌË©Vé&ÑfßW*½Hn
QàÔ—¿òõ”n[!#y.¨ÕÓ‹µ[7Ú¡ÑÁ™Jœ:E”¼zÙ’MÚË×Nä‡_Rw–\¹;³á·9U–¤â- ¦v3ëûŠÀá7ÔDÿÔmàAãìÈԐ~Í™¸ÏŸêÆd¹’±ø˜™ƒù@óä9KRñ\òã$>ß63_$¯6?ã»àÁÞÆâ±°pϳ»“æ@–9ß¼ÆëófÔѪþ¶„è÷¸Ówáñ^h¤Qzïh8áãà™÷Ä
ŒVemÔ;N=Î:Beõ÷Ë‘æòÞDÃhò]Éñ¾/Ò(”uëÙœªïtLÒéÒ+ž› s§TØ<xµ7ÎÒ‰R´øI„*sý6</Ñæn¾‡Š`Û;y¹pÈɪñi+§©Èéì×È3H9-J:8Šå"¸‘¤©¯"3ôg”).|É_D(ÖŽ¬3LJL'·=A
¬¦“è$u¿ˆêÈIz¨é|'®nâlÚ 9"4‹™'fµ2Y}H̉R+³þ ‹·;õ/³âá¤â:ÂMŸ‡ŽEÃ~†ËïWÁ®Í–V¤z6Ã%ˆ—Y¬}µW+÷«§k’ëͤË#D泌 ¸ET'9€1 Nï"»ZÃ7e_¿Àî
,‰ H¶~Ò“Ê÷ÈdáýSꯨK;2T_‚É=\µ}Ð\ù¨¿ÂY#£òq› N„–ñ"="à8lÉß5ÐóºÇ½;tÀœ!ѵJjf÷ÔEÎÑúvŹU_¸L-5?#s´Óáï<D7:ÿ°ÑÖ´”0”XÐ3“Ú £J2W71”pútñ©ïĤÛ6FImaÖ.¡{ÝGBjÚ/Òÿ7+?Ò=~4¦&wà!í¾>Jõ…UsWÍb'ÓÙ•¯?2ÉLPU©p¥Hº°!Ó›±8œötº¿ßlˆW/¥i‡aë%@;ª.>¾Ò;¢ø¢º5Ì"}6,ã@‹ƒ¢C»iÇBQq|/§.®ßVý÷Ngù˜˜ë¦`R`U[˜Ücþ™)ú·µÜCKoú¼Íg¬LS¿>Ÿ°?é³CXUXU—2²ó©±or¹ðÞ³KûªA	EüÐÛc•D‘_¿"êB—=í\©£m">mMöµ`’¥nHÕØت…{×ÿŽ¥€÷¥÷`‘o½O$!xA»51½6ùã“Kßi–›% ®$P“ni+{ Qtvî,?ï׌:-zò”>‰ÊÆuE$8s0ùòÝV
KøBˆršP¹gãm$olÑaPj×wK3}â•NΊzÐC{:‹˜‘¸ª.nºhƶ.âùUÛÙ˜‰–ëz®¶’¼ÑL(¯ãB¸>¹ûc4 MOäË_ñ-˜¹•e×÷»âKÚï4¶î¿Ð
‚
C~­WßöËaÛîÞUdhevtFF^“¨…ëàæð·Ñ‡a-hYW®N¥÷3¦ÝÙåseŏ;äЄvÔUÛÑ-C$Þ Ÿ–gK°ýtF 0å$°L.¬-øq%l.—¢®2*6åŽgzGÚÓr%d³u=Y N¢(q…÷~çöóéºU[Ÿò#wl˜¨ËúÍd_£Lu’^ScCµãc“F`£aêé!ÂÀ£ûëéÝÝâ^•½·ÐúúɌŒlÐEâE|â$
Ó¡©¾%°ˆ¥?‹š	åjý‹zÔ^‰Õ‚-úÿ%î‚¿õb÷Â:$¶}Æ&Ž0òxÓ7jÛyF÷ìl’erŠ?í°ªoqQÔ¹ßZÅÝ¢ŒŸ¸ äñ»§
iA˜yûu$llšÓÒO(\´îR¶Ì“ŸYaó_ÈÅ!ÊýÑ-9ãl³nÁÃðž³³gÞNµ‡žÎÏÛD9ɍé5E®ÝRª5Á$g*¡§Ú—Gr=ýÈ	õp¼Oú
ùå§#w/è ÌYÙÓÓYaiÝ–Þìx¸0Ûù¨D¶*Ùß³vð ‹È<Ң݃<u¨Ñ`s“J’ôšø‘öHhKðÎQIsG¾ÍóFº›;;&.TlÀÃðϏ”—âì׸dÂÎ~«_×
3Ø…­ÝÃë[(`l1Â¥<ågî~·³c,,˜Éo¸Š÷®ü=-uù_p¨6ZCÐéEÂ+›È@‹d ‡0Ë‘g¹‡žØƒ	5q)Ä…H¾,ˆ…q¨/U3Ú‘ë!¹–hßÇ4²-—tómŸØð#•ŽÜzI8ÄBŽõeÏ¿þ“¢wÕ€Õ€p7ôz¦Oêä°Í²ˆÑ<
Ö^8¢Íšý Í1t¤¶Ÿ¾:4° IÞ$ìE§æRÁ7ÚUkÈû¯›|K/—Šâû—·ž…î¬=ë2 :MJŽ·cŒ	ÿ.ÎEB‘¡äõK—nԝ,ï÷m ˆ¢w(lÚÏŠ‹ô»@Žá^BEñ!{C­˜OdÔŸY½[ì&¢´QéÊxªNÇᎡþ¯N¯áØÙÙ9Çð—n•ÝA Âþdô_·Y{‹íÝhÁ_§p¡¨5?î°qcpXknd¾¦™‚GÚÀTi¶V¦Ê£_mÈCLƒËG¤"_þ0f80¸Ú£âXa
úŽ†jcÔ/ÛE)›±ÙÄRÇþâOBØ7ŽŠwç[$¥sïhyã>:ÏÒ¯ž÷’;:%‚ßt-q÷ Uì³Kî²(á_,8̸ð•Ü»›ÁèUò=ZáŸt›FÐ!4µaôòUáØ6»Ž[†++¡öòIÑó7ç0Pçqû±;è‡ß×}.7g9éËÃ’±͆Ž¤‚.ú1‘Yb´#,rqKd¼y…ÿ108úb?¥\š…¹¨¾íB½–Û|¼ÒêØ@Ö+¹â‘ð•_¿¸‡+ñG¥ J›»¨_ÒñIFv¯ÇYÀHgúÏb_aAˆ±*¿ Åä0Ã0ÊóE´1¥/…¬ç’œ²Lß%ô#Ñ+^­.yóƒÜº÷ŽòtÜóʈ$Öuov§Cë0ó}©|¤œ6³ÁadnÏ'tNßÀ¡_5ÔÓÔU^H¬Ê›>m߇}Ãl(äwˆ
äßkd%›ÒGå\î20èÎR¨úÝc“/`*7‰7V¡ð²ó+æÉjwhԃű¼NÑêÖ‘×r]ŠšvÔ©s¤°¹bò1‰8…{ÈpA,!GF¬÷ðrbAµt–}"åýÝ?wýðVgÌ#”–ˆÜݯÞ739˜f„À"‚@Œ)B“›£Þßáð‰%ëWañºà Æ -qœ«X¦#
§ÀJ"q{äìW«7]éâ·XpÙ¨‡RÕÕV¡.©èÈp#nÆ„d{;[üü]Y¶¥t»Geg™äg_[u©•-ïVAz§Mƒ_%‚á ºå8òîNJ"/YCޏ™Jé‹¸‹/ß"FC^Ð?ïüöÖ³F‹5·¼òiãk’]3Êdmk¡4”êͧ†>¬!à8c,IÊN	8ÞuIœã¨‡ܽ~YÁÀ21 ¤§ÿÍûÎS,¹=‚ò'±çG7i@	ü¼ÐK¸9!„¼Ú¼"ÊA–Ï‘‘éåïT_BÂiéÚö*…"‰¾LJ¡ç‘/ª/$Y:T˜Ä^ÿ¥èõÙ,N«aÈ?xÔb¾I,4–ÀxòaŸ÷'fÖ‹Ù´øW»ãOò@wCIEn=01œY%%Ú·«b†ŠÜ/Rm¥¿9T½üçQ©Å¢
+×p,íï£0¢ }©Ž|¬ø®ï?)•HØåçÈLbfå…+ÉsV‡wf²Éq<æpB”Ñ®ŒßFòFV.ÃiÒ4©5(ßÍCjjHu>=‰Š;ÿ	‚
òÌã=øY\²hhãÅùÚA¬Öœèã|@鿘Ïê^%rÒ͉½~/F’½T±N#<²4Ä\ºûØ+&8¢38ë5Ó Lv"¤ÈºiÍž+K¾tá%"dI" p	 œ$N‚  ”ìuãU¶5†xÑ"ǵ±Á
±ÐÛ£h	zÑEJ¢’Ú}¾ºŽþ~wd    °ýOHxá4È:ß~ñ74&ÈêÑ^Ws¼s©¹2KŒš k——Ê Bݧ6©Å3Œ5I‘ðÿ-luÈ?`Sl?t/!'j`ê
ä´´_³“¢ÀÕP¨ì” æFKkCÔ#”¨¯~„¾=Á…aHzôŠ~öñ¹ÍäÉÇÖÐ??=n‚Z™.·Æ&üäo€À;Û»)|&j!Ãv(˜Z¶U³Ræaý#,'èáŠ×ÇùË·€í%!R¬ ¯äª)n{¯Ç­)óxáqþ4ÙÎ$²‡Ý¬7‚Œ¢=£ëe;Ñ4Õ®“¬‘C›æt–AÑ;,‹à‹|®É¢>åƒPv†ù!ÅÊ/Æx0³ÙmKv5뮑wõ7Ä-†zh–®`D6Ì€r±?‹g¿ºƒ_/à%%èÌ$PÑNK uZ$7s°¾±}ø-
½¼÷rˆ]C‘Œ[Ì+VVSð¦ò¾¶½5]Þ¯¬dÉÌ5Òå¼ýÍtCšò…H{
}<CcâìfE84µµc8š‚ÍŒÉ×HG;Ì"çƒÕxpcúe"  ³¶+{ð;u$—ÙvAÔÝäÕš$9Ìnç}Üh4
Ák™.Ò{{u£Ø“6@¡ÝAG(¬È¥Õ†Gq¬x7›ôg+c’]ˆªM+»—ìŸtvÇlcH Ê]Tý	ëìNP lÄU+®EÐŽÊñá1£=Ûº"P,$?{ò4 at Re#¡dŽÓ¿0¬÷mIðenu:®¸CÁ)?ŒFÍOôxP/‰ýîa6R¶¿zšß£é¹ÂuóÕÐ#ÏÝÓÔ=ñ«Àu|ÒÍC¸µÎ¬Ü¦q5|JR¡
Š¨,¹+™¡#߀íD9"àßćÜ4ë·‘ëÇ}gš|žj
xû5Œ;kE2H¨
1ZZÖšXóQù¨¿Y›éÙÕ¹ì™*šªá‚B©óšñù-Ѹì1›†ȈZ×m×mkNü茌5R#¹KÆâX~ÎåúÛ¯¨CݍšaS¡"DP™Å±Â.òM~ƒWÉ–.°Ž>9,xn¢ô·àPO´¬î:ï­KAå
×wGÝ9¨D3ŒqUPB‚Z‚Ùl–IÕáUKƒÞZ×*M^‘í¥î¯–:‹tï‰{‚%êÅ´âùGõ‰Wµ¤ÊúTyÜ©,p‰Ü7â߉dˆ`¥r*•nIp´$p$'Jþ–„hÚó/O¸ð³£å¥HµŒðCY˜Ãq?ó[_†õYòƒûº“§eûüSŠ-·²šb]<‰Vx2IZ0kÒàðãöNŠŠZPû¤c.YÞ'.Ê¢íBcDé%Ù°¤UOuá}9`”À³¹
=”âAªŠ<IÎìës4¦Æ´·”S¥sôL¨}‘ï½ÅÞõgþFµ7ïŸa,”M×y*+âi0ñ¨1 R4~æ6P@¥‚”¯RøI÷B3ƒ
¸$@Áb"<¼J×ý¹_¿]Ï>âûÚ{Ïë|iR Yùü¤Fgþ£ˆÒÈú¢ó†p¹öÙ¢O†‰¸ÄG>È+¬¾=G/¦ì(U*…O
Y/øÅ“\s} Wœ–6§‚ÒYê²Õ
J;«" #|ß¿x­ù$êßv®ŒÛGsšÚ?tÚï°á«ØøÛêÄ6wj¬»5™„Á°À°Aý$ö}…y»}Ë*)N~¿øK‘"¢Øy[òøÑcü†uC[ìéQ¨8²ñ~ÞRvú”_pòͯ_Áêòqi‰µË^ó‚ã¥1™@mºQf²Õ2ÅY'S[ÓaÌ#6w±¨hçq¾^MϦþð¼Î(¯H¯ÖJöoLHQèúWÉ9±´49a5㊟åa;áaßjèߌv’I¦°Ð;^ââë‘:x™Y|ó®Ö§¼0·FÔÆøxw(®º=—FJY¦R>7밐ŒNB 
êÕ|‹\y9&llAbÝ=ö9l°•1itÅ-8‰G™ò®[†úü&SÏ0|\Rò¤–s÷ë»".*K;ñFyØë™ëq=ƒ™*ÆLNjª=Îr¹YJá¡(%òO´oV.³X±3CQ®kE
 ôÚõaˆ rXÒ·¾—­„ßÈS$1KøïLoÙ]×®ZÅìXY3'›Ò@•?<þ9ý¹‘4™×¼@­~±L¢ Úb©pbßÁÚ8ù—¼ç€å®B³?ö£«ÿÍK«³©µT¶ß9vri{"¬ÛQ3ß`¸•%Ñ–0³iV 5<=åÐßÎÛæz96Š—¹ÓoÞÂÛWøF¯ä>ÿÜ%
zË-Z‰¿"4zÚ•òIKxh󡀏»üq^aW³?Ù²g­–Åi_)§¤Šb*ÌÅ1jQÉ…D Èÿvd”®OÑmé·ß¬Îem>½­šÂ¹2)‹^ÇÂ3,4—¢ï(1G¢á”‚®ŸýÖß
j/ë>K]sÔ•ÕÕ«×™ýL&;Çþ&ò͇%4;M~’=z¸ö÷Ö6”h,ê
GݘX#V¢ú?ÿ›~ZQ]Á¨e21¼éÜÏÞWâ&n•dÝ}ºüéöÚßR	í›bÛº>Þ£?æOñâ–Ú;¶04nÌ÷벆§ó¸'5w6ÖШ~Ïv·n
¨ˆÂÂß$–ëQêΗ
þŒ«i}èÏËZã×>Ÿ>¡’²°÷¹žKOØÛÛë®RÈÈŽ x°šÖÕÅ8ŸkçßÜ©Ù{v[|wIŠÊ}+.>ñgw8vì;ÄOjÖÉImdzþû¸P/N²{OO•ÏS¬¾'–ŒŒIAêùïýÓ>é¨*IÖ
+8„#HÒ	lªÌgU¦ E’„DÒâ%=~"峌ÒbhÃFfí„0ý†ôù5/‰EÃÂfˆ¢Éˆ;„ÇDTûS—
 Å	a9ºWÞ]ô—¾&›Atz’ƒb3WŸ±×Ÿ®$<ȮЏ,=Âc‰¯:,ž£bhïF¸RŒ¿}…*Pºw@¡·|Ÿ½¤äaEMt7Я?‹•È 踓çyѱÆÅïËȁœ2³cZå+GI2"0ëê~†Œ¾[‡Ä–«=e‡~ÙÏgCŠ,´YŸøøÀ€R«žãÖâ×i4¨èûLÂøóùþ±z½Û¤	/8,[T4btà°™fPéÃnrlÅr¼%	o!C?5߸äÆè›ÖIp¹˜ËŸ§Å0rDôoG®Jh$DS2okÝ4dD¤Qó刘£ý€Ì§;ZžƉ!–ÙÎj£l(”””d£OE™\h±(ÁP3ÕêqwK >ø-îy£‘óäŸq0‰—Ë¿rm·™Aç ´Rd½ ÅÁo„qɁdþQðÁÙдƨü°ÕÈofñM´jnx	´	IbŽÁ½"€#¾|üîzÌ+xOÍAÊr† ¨i袳Ǐ¤Ìl¨vu‰t—Áç?5ÄÇC¡¦°K¤ßë×ǽ"qÊ5xRVhØ
Ð
k<GQ¥sJ,8Üly¯ÕsXdˆ0ŸÑ_¨¾Wmì"c<ãß­¤3•×¯¾/½î¿ãøÌi4tkˆÁ§ƒöWèÛ®g荤!@Y³0âù`{X²

,̵ÁB Ê|!V}‰6ûNN>…Ñ¿þb"ǃ½W¤ìï2ë‘Z^ó]¡Æ %Î¡‹ãjB6qÿ{ÿCˆïõeš…‡‹˜³ŸˆPf¨¬ªÀ 9–mŒ¸V)TgI1‚cm+VA`ˆ~Ðh³G
>þ6s¯ ñÒÁ`ä¥íŠò~˜1þ‡«!¾mY`
£„Wót1ÏÑ&ZØLˆ»=Z£Â¢¢IùãÕÝŸIThü¦=â‰@UOî€Þb2ºƒ

òÁn¸ý+ߣÛ‘Mìi•·Ù¯ ãâªoCúÜSPÐìÒ20ØSÞI9ÒêµrÇS8 ûÆ3m&'ÏÄ_ZÈ PѧtéŠÝ¶$5µ2áŠçäÊqÙ°IC¦1òe£’ÿs÷öøŸŽ¬ÌpÑR(Ò\.¼™ô¢”¦¶`ˆ~Æ`5¡`wš1£ßæÌÞ-ñ¼öÅüö—(DªÊèñößà‹pc8ÔÄ_
½O¯ö—U×]†Nˆ¢!dsWo¹+¿Â‹ÌÖ f„¯'­â
ˆï°0Ç4S0¯TNM?‹sj6gx{÷×9%±°Á£ÜI?T%í–âžM8l½»ŒŠ~wÛ8«×Ï6íýtÉÏÖ#PÐÀÒÅç¯Å
lîùñæõV@ÛKŠÒ|6A–x2T~—
âízGÝÕ´@PÕÜ­·ùÈ¿®Ú³£¤9­œ¦§­¨qÖÔÙŸPc±ÿš[kÁçõ{tšÕÐö–P¼,ŠvAKÔ§0{hãqFá·ÿ]š²"âìyòíOøjØù'Ó4ò%3´†TÆL	e{†ÃJK=Cd¶IES|¾:äl
pRÛ§Á×ïòúM¥«ïîún5·BËx0áŠÚ‹Fnòæ¿Q0¸U,%šÕ»èØè¢ò€Žüe˜+E’Ó7u„bxQŒÙ¸ó4«2³D	ÀdeF«°Bkõ·Umç.ÎÌpc”+ëܧµ¦j\µ|›a*ƒ~£î¶2ÈbFZ¤A-PxðNŽÄô¢gâ—ƒgY÷œÐҐ̄iè>&öV†N¼5
Ñ1¸1@%|Ÿ÷ã7‘0CÜÙŠ/ùǁŠG/BŸH4ûJP]wí@‘¯Çª`Ç©na’mîìrt{ñröIŽ7s§þô¤^¼Ì½¯v_ò@Â[ tÇ!n¤Òˆî©eÒ¬+[èöüYh=ÛEŸ6•¦*{ÚJ13³Âêâš8xZ–bL.*¥&Æ™ÕÝ‘…âÕGóPt2Ñýö½z lŽøMœ¬ëX~Âr™ƒQvÌJ%„âÏU·Âj·h#tãƒßBåı{xÑÏÊœ2•~@Ê&7"¦Z~¬¼‡™#cþ÷&à´ÎwñE‘UìÓ9DÈ_„›4á<\•Ù…ñ3ÝO6X45Ápy³'ËPñƏ«.ö¬{yMeOBEBB¯ãeCrü©ªX±ÿ4C—o 6‡Íøýjõ”‚’V!^Òw·Pwèp7·Ñ°¨é#dÃÏ‚šwýø=,逘ÀÌp¡âo.‘Û%´\}V:(è,z¬á	´Àz2Ë-ßQ£ø†)âý	
4£Mh„LŠ$z¸{y.¥eJO¢ò=ÌÑê£ãkü
YÙE»oËhù•P$+•D_¯…òµOC€†ÿ_€Òw$Öԁc^JéI 	-’‹@Ì~›R'z|Q¦„ï8%MJ>šfÀ£Wµ™–¿>Œ„Kɪ žV°÷þnŸH^8ÙÁ”R¼IÔ~åp'KgˤUµÿ®×	d†?.ô1¹c¼C‚çwüÍÙÄ)2{p·*Ìʸ~kJî™±òÖ—i¯â£+²XéX%F‚¾ÔՐcb„82’ÜYôYˇ´ÙË·ëÑÂ7ŒK²A\@ù<œÿ¹ Ès¢U6¬UðU7ÚȤ©‹½J”êO‘R|ÂV—µ«b-¸º¯$&a2 ´c=ñ%4ᬒ^—™™IJÈŠUh®š›”¬,Kaq8’Š¾Þ	mú.Ý<š‹a5i{²ø÷7»}…<‡Ä´™è øÊ;²”¾…)`έgéráoÙ?$¢¤™¡™ý]ƒçeäݾ^øǵ_ÑÁrè`òK‹|.
DúÉDØ8
Ø9I
&ыݤa‘½B¸p1¼²‹›$Ú,ŸÞÙˆK	́ñ®‚Õkd[£ºo¾B"‹rÀ¿nŠ`T2ï¬8«E ‚Ô¤ÎNƒZˆl)¬!WãyçLÛTBž‹ÇÙ½ÃzÕL(3K(ätCóC)ñ—y`>ãCEæmkwÙRÌ—¹‹’ÏÞËzt"Ô¦¦Òq­Ï_(®Ñ@]Æd¥5²ç‚o at N¹ÿí£¯<Ù÷lîй_èÒ	0Œ‚æÊrŠ}fœ_h+¨,⾫1•‚¶ƒüRbgLPðu^kÍ6\6]â²foƒ4D1C"2ytBCÝþEó™îݻΧH¨`بPÜ!ÑÊÊ
×òI6Ê*X~e±N—	dž“‡N“èùmySW¯¶ôu˜Ê†#úþš×œx	'¤JôÜ€ö‹hºÑØCTÄ&ëÒ~
4‰øˆpÈ%ƒÜ÷01Äθ<ysAO
â7ÊÒŸÎ,Þ™©ø{=nÃäA1æÝãdÁ!~¨gB¢?³–ÚÒˆ½_)EÚ¡b‘¸vúY­3ú‰"¨ZfúÐÀÐЋÆ"ý§äÖj•)1?HP¥`i½n 3†öÃÉ‘*!°}%õñk¤0×ÌÁ™ÌSÄúZôA €Æsˆ‹¾>4†t6~ÆÎÁAÈ4D•
£€Z¥hÔÄ•Hd¿‹£¯SC|[ƃÅ“e&aÍdÐËí°¯Iøý­ðµš—oF\¤û>DkTg4£÷Ø<ˆ%Øš.#_3LÜ©L|9'ôŒNë‰;çªÌ%tÒIÔ„Ÿ»ð—xcÙ±ÉþM2øl|vrÁK0Ÿ¨„ÈY)Æ9F8Ê–è7I¬4ÖP¬Ê,;€
ð½õ'XÝ…í„©ÇJà†]ê†~ÎI]¾Õ¾…•º.õ¯ƒ‚…ΐ6L|0Ü´ì©Þ!!²>8š8‰|Qêzô5wžL&–DøøMçî–öÅy¡—Hà	'Vî‹“Dí6.S,”R–Ó-³dÔ÷bXuŒè_¢–”Á@Lœ9Úó	Ñb>ËbÀm®Z‹7»µIŠ¨„%Ö’ŸåºI^7M²ŽÖNÃ8D‘JA‡9N'¼mÁ.ÔêÅcšB2É£I”Ùçä/Éœ	‰8‡«È†c–Å¡ú‡o›8`›4a¨¦;F¹²¨ŽüQ–.½J5ߐkºX¶ðVÔ¶µíœMöR®P{.$•Òpv‘‚'ï= 6z~%uã…¨‰$~·Že?ÿ U‰BÀFz„¨çÏZPN.<™a»sÉ”n)$ÆC$vpÛ"wõ5k÷òƒO¿b¿öYFÿÃ9ÂPj†6Ѿó«¥ÊâI³ÛÑnŒ²˜þÿMœº›åýür7CœW;—-ÒÜ!	%ßd劋d9ÔAz
ê™uw4ÓТ•CKòa]¿üR¨BLǏX£üÐ<æCÁo¿…ü¸FXØpøY "Ó ãP:r3:ZŸŽÞ\Ñ¿$z`pB’DÓIØͲIó¬'—™2™FTä¨)%¾ý! È
‰£NZe*Õ…8ºÂŽLÒn™¤Áükx•ÔÕÞa€5-¨,CdW:‡I!¨hh~ÔM?å4î	¯n5ßõ‡IP&[r…Vt§¦û¼©ö÷hžƒüÀÎ×Ϭpq†å=CŽúSÈqIK7±ì#´ø.›Õ}H¦ª—Æ!E™~µ¶wŸÐtµ)gc±"iZs˜¡ÐÏ”’4H+$%Éî¼(à“1ëb‡ðëRJU§çŠ
±(Ñ>3%ÁÕûï…xâê3»Mʇ†W>þ»E¥´—…kh[²ìj7h‹ÜNwOŸƒ˜_žî}êê<SÿÆå½n±«–÷Dè^zL—ÃJ­SRÏ(C_*lVS%üUá…ÉGœÉ}Õíhd€†–Ãõœ)çER¡7d¬nûiFÆwjËÉ3UfÒõòH»:1\â®HpB´/³GÈ¡¨LÀþ¡CÒ[§ýã£R¸Áœ$—{
‹Šq…v¨0ä3daWûC4ËžÎr]Z™s/¬Ã[7–	û¥©ÉVo.A1Ó}~5Ÿä:ë´×©¸¹C)v2>x6À^–¹Fh_ÃG•ý¼’x‘‡MvHjï›Ù=ÞpònËýÌ“ýƒ¤…7JéåNF7Ÿ’	/‚’,ê¶Bü襂’»péé8þ¿fçktº ¿"®‚*–=E˜úñ‚'#/ŽKÎw4	Ø$ÈÍ“õ[5sm¬w ÷ aišjì(Yh×yÃßµe GgVضNV8ôô;C“æ¢_É@¯&=°‹®.æK½Hp_+JdÃØ_XºÃ/@x]
dpM¡Û-‰h»JC§tƒ}à@\è•øÕ‡èænuÚ`- E™ôÍÓ¥›ÿÁ_ö_ÁVÞÖ¦ßÎr3µu¸—[T§O+V{ÏN¼n.
q8N32™FAjJIî´ÎÐTšÚbça¥³wÅe2¨ZÂù›|ŠìŠ5ZßU;öÝ4ƒsiH<¹õÓkݝ>àÅ c‚
’W±Vh!˜ïYÛ!ˆ½|í"Ü?s†Ë½O¢ƒÄøv#$IeúJpµîQ{Û%KÈ4ÈltÒ™¹ÓÉ@ж¹-¨qŽˆ˜¤ÇáV$»ÐÔë×à÷¸Â®[!ÌDˆ$©ÿv%`ÍÈš)èK5ƨàPbY0{ï,:²Š9;ôÐ6×Èa
¿‰†nŽJ&ïíûÂ9rSð
}—Ùç6â©UôsPÞL]d¾v­¬øïËÔ«Š¸ædÛYâ]"°Ø
ŽÃÁÀÔ'QN܉ ¬Âøû—µDÖ^ +a“i^Áùw»IÛòéNÒË6EÎ2E^âu…ϼ?t¾3D•Ï`Η­éž&æ,y-P06—3²¶‡¿q ñ½qrãïˆØ=·D†.`KI€»eÛhj{§}]Tóqiø-|G¯Æ4>„B¿t\yøAýZ“Åz©¶ûuÈŸ€RDdÙ£µ|[ÿJ鉒«„*,Âì€=ÃÜÿ-æù>àÙÿU$K,äŠ!öþç‚Cs+.„ppóêòÃùSkïœÓ€ü¦çÁ,‡ûÁ…4,Ùï’Ì›Å_¨K€ò¢	PÏ«I¦©Ìг
ÿŸŸhxs-}„(üñõžAM8Qûh*„z‡$„Þ« ÅB/†ÞB/‚QŠˆ” ¡º4
¡#]šEš ˆô.‚HQDPQDÿ¿÷Þ÷˽3÷žÝÙçì™9ÏžÙٝs¾ãí™e^¯ûç=~G†ãòå¹÷÷¹të(ñ÷ä?:GI^äãŽ/kßßbª½ðžÌ=½WTäýùÑfÙ½»™ìM÷8ÿÊývó^0%PƒÏ›~{ѪgÀÊš#WÄ"
~î¾bO””@<¸¸¬ÜScw3øvÒÛõ}玏þ àˆà)ãÅk­ÿÜfÞ\féÝ H.6ÁÔÿÜ>¶ŽÔüæ°@€²¡J¥öWŽ:¦bÕ ’u´÷»þ4$ÅIÚP+Ìù<Ý1Ñó~)
g˜Éóª›E4*|ªr5Ó{OSsHEù•y ð—Ë0ˆ>aé•+FZ$ѽùôØ.ŽM"¸ûÂñ“K1Ðâ ð™wòö§ 󿉿O OþY°£bó8LõŠPøÒWmȆW|¹Èl›bGÕý¥¥ï&FŒ8§ÍOáÃ_
c."uKã/:ò?2€¨~Âx_ ÐD`Icb½5™¹ò楿޷w၆bøn
(ä_Kc¡NÖ»àÑèÉ›wb®}{éõù¨![˜Õûnd˜åþŸû¥ëÌH?¤eŽøÙ·«ÊûÿæÌÅ·›^Ô
w=þ熱j:8SVL¾“uZÌvñ%‹š’zÌgf)¼á;þµH¬?ÿ‡pÑÂx{î~aÔcÆÌ­ý8ÅêÃÏŠs	Õt»Måðmºóúoê  ±i$LJ@¥ˆ‘)µ¤±ª>øTˆš¸pLµ•µÇÒ€0
S-8PNDa´^}¡.£	gøˆ¹›TIcG8qþA.$ŽôjFµý‹hä;®o.½ây{spÀ¦[bì…‰ªuðÍÖ™sQ3s–;sVÌ}
òÖT:Zô®wÝZílŒÀ"&øìEg·kÛý
Ð\~`"šB©9ýÛ ¦x!ÎãP§MéØ…ø)õºHqÚXÒ	~ÈIƒ8ÌU2aVM~ϏŠ{¤p1¼odk‥ØBá¼J¼Ë><%wæy".®Ô¼¥4Z‹å7$úGuóüªý¼[%|x8}h¦e$ý&ÎSJÄüŠÃU	^温rp%¶8<·C郌úú[.H%„ì
Ôx¾×w³mVÍbA“~™%+ïé1:ÚTöú䌽Û6¤¤ãUŸ@&ZYƇ[úìÆá×–y?NjsàrJJèñá:}î¬ib«³²ÂkãÌÁçc÷µ¯¨–<é«
O]¦?·R4‚_0¼2wç214z¯[{[»›™t›~G0k‰„úyZõÁ·Àq>nm5.õ¼‡‘:¡­Eÿà~+Ð^ ÃGAîã5Oþ
­û≳ץLªQh\µâ'çÆxXž³8D¦è
–¯:1%ŸG q¬ƒ‰FužÒ0ªäµF[¸:RÉþÓX®ãϸYRn7Y‰9¬VùÅTLû¿òJn pp¸ÉüW~1м
þ#b„5FÛ€†ý
îßá5çv¨1ÐcWúé›3Å®ÿ`ïÅp³Öõ8>iÕr:^^Zý‚ÆË_Ù7d™€‰®ÛÖ¡Ï›^µl¼Ãƒü
¢mۏËÌtÌ"ÉæÝÉw<Þfôû,æ"|³G?ËÛUæhþ°½èãuò>Ë#yaøˆ3±Â©
ݧPCŽ–"ݕ5Ò€.Šóä:™z-ÿ¸²BP_ üËí
ð„	-7Åa\ñ[áƒü_Cë1±úq 	o¹³ÞË=?ãÒtQ6®‡‡·× ]ò\ëÇÖ³E;W£¡ê£	¹'nÊhˆÓ3P8a‘ÑyíütÈÙÞãV=RvevAŽå€ IH{ùÍðT@÷RBó4#8ëOy¿p·0Ì£‘ø¿ÖK-!ç§QÎ÷Êc¹›OŒØ%ûžot
^|‚œn¿ucmûJvI‚®¹…2ý…ÿ¿Ÿþ%ò´»¾* mKಿdŒ Q†!-|Õ˜éà÷P$ð31ñ}1 at 7H¦UE-3¾‰ÂŠÇá4ØÿüyMק’üi!ÿø,¿KR­°´:ßA5þU3°¬D]%}4gZ™Ìûu«?jŸh«Ká8Ü,¾I4#jÎ`Q4¡„Äᵪ=prI^Ì•fÀib÷ðx‡¢šP×ôç°Ç˜	LŸ&Ñ õî¼í„Ü´ {cßóòwèÕúxqÄ
Ò+‘<Æs¶£€Tõ—B ?0h½^‰dÖ`Î^&ØÀ…0 l =.Pɼ”>ës½ümÖhxü&Û{|ñº­óû|+ mk·“"an?Rþ´Ó>ex
±××`1Öõ&°”ŒUC⎭N;½VUòø&½°S„Y^½æzÿ±IÑ…F“6ž<gðr£«'
^¢Ÿ¦ÕGçkÃmìa´H”Ô,ÚÆã¸EXÿ†vH¼A™Žüª}ʉFƒ×fi¾N+Ñ1îÞ	_Cë©á¥ùòuo䞉|‰€ësþoïµ·?;ú„Ù•(ï†[¼¬j-yà€¹z~öځDk¼ Ki$Kgçï{÷V¥ï|ú¼Ñµv'8F"ç¾bN&HÎñÞZC³ÝJJžX*Ï£l=ͨÈÌ,Wwê\óÚc–¨è‘{ùàÕý_ಜ:Ï3òjäøŽø‰\‰žá«!Þ/¢¤XHuPþÆÄøñ±ùiÀÄqÕÛÉÜ0à¹Îù¯Ð£oэÇO
Mã ;ÿÑÈÌ ¦>p¾Q*½5ß dO¤	°ª`ø5§ƒÖд‘CÂ[ºñ16¶,<c'Z€A‚9•ã>3$è¾zOï#á«ú“«Oó58+Yß“_BXfQ`þzÙÝc‘4‰Š	&fLWcÙ,¢È/n:I˺ïa~|{–¨W7 Gþ„ÃàDQcYIŽD&içðæ;¯„Ü٧Ǘ¯Ë¨•·ÊÝŽŸ‡YáÆmDZ,®ÚN«Fñûé)V>ïjƒ'¤ßTxœÃ@ºf<½ÛŒ„ñÛM×»„"I¼YÓ¯=êPu ©ìq«÷#Fí…@ôž)š¾Gø=wkY{“ýÁ¾ÚVõF*MS«Õ1M)Lå’… ‰ª~ Š¤÷À:ó×ép×S܏~<6™¤ •v“öNé·‡úÎ «É5²à`E‡€±äa8j’"«º¡M‚s°Fæ–µ^»Ò˜º/w²ÄiÀ¦FG@'W…p!9«MœhJ#¿ÚñÝÇ¿M/­÷,ŠiWú~ö5ÖPõPb'uX$qüÁýr=¦êÈ~
¶·‡|Ž8ÅÌÃJ«\gMž
ÿš¡¡\<uíA·&,ýémRob™Z°ÆÝmËEž——2=dFl·U<¡¯Jø»æ{Á‘UPpkô˪§ Ì@‰H÷
	"i—7 zé‰ €µ]¼¦>˜¾Ï`D„ÈH.O	ñø›XÔ<Çüþûï•~دÕ'#kA7¾KºTÐ4¥Ã½Wè>3˜aè€XX%Eaý‘ÆÂ5Akúv2qeïŽsô…ñö¹ÿuS©××Aõ?Nã çùpWÛþƁ1S_2ÿõ²{ùà(NwñÐIp”•Ï°!\sn(èÑŸ{C¶óã—çüò©¶&	F"»‡A((ÁóNR|¦}Ç'õ§æ
£\Ú÷h¿ÜëðaFe$BøçNVÉÛ-•íŒ(z¬^‘_evþËRƸA¤)ÊëÊ ÂÑ+!!<m_WƘ‰çm‘‚Ç íCr7¹ƒQáË6쏶MÊÿMÞþ¹Ì<­ù¾xGW©OŽÀŒ8n½n^/âylÜûu-7O%3RÙªP zÐkÕ;ÛDóN•Ù¯d‚,f>Ô:á|‚IÉ
{cÖǞϔÙÖuÉ{ñSÓ3VXxŒÚÛÕUÿÝCŸƒUÂ(<ÈÅ¢÷ ¦õJž1/<ïÜöÓÊÕ”ýó!TlŽ1ì½Ë&Ç0*DuûôóñÚÚ­èÜÞ ùXtm]®Z]@¶V[ÎŘ”[• 0½;/5öOt~q/üñ„éåŸ©ì§Rå{ηúÄÊQµÊ'†/%½ŸI.á.;\â’áþõ<—&ï¿8ré5@]àہٯ¯Õ71ã;QÌ·Ú•Û§æ‚â9æÄ悧º•›Š–Ì]y5ª÷TÞÈ-Ë‚^d§)ÈxdXÞW+	RSÌT[
j_ó^3ïüÏöÿÞzéHŒðTpüç“þÃÿcá—büOµØä)öJÀyydï^îË%½,ù_’VÅÂÿmPûØ‚™j£%ž4¶'k4Š›åO&ùKÕ¢:ׂ2;V–×\ÊþÓþ¿fu±ëÈžÊ?Oº¯ÿÎËðjWãi…fD¯úex(’FQ8’"iä¯þœz·rzyiè‡íÁ}D+”G^Em•?ˆ©3ùC	T¼-Lï~B÷ØÃÁ‹ï\æ–äH£Šf!÷Þé¦fHò´ Êa]<	q[€¦ ‚Õ{5JÛý uÚ‹z´7p¾2ñ‚˜zšÒá#VqP´n¹ÙH”iœ.œ~$ÐT5Ñ+ú QÌ÷„¨-6ÓÍe5{ßf×bêoÂ>FJV«ʲœ¤ŽyÃê.YKòT'GQb¶œ¯²ŸˆYP©¼ÌÙY{~=µ†}ÓE‰7PXëˆd˜Iºt× •ZLð€!üjËýDô  Žš/‰Rì<tZÝ‘È¿»X¯j£h$Ú%P‡ÙÄÂð0ãí1姎8$ˆ“%;&öØmÊ!ÉxýX;…Z›ofô™e¡óEŒFo¦í5²åa/¥ß…=ÖfK“*Î;WÔʨÌyÙ³m¸â~ö9‰ÉCVå}û©KqwrªbÝpчΨ‰ÑdÿžÓ
ƒÙ¸5pŸ~ŽMåøY_¢ªÂò×s)
"" DO:Cå,oÁ¼59fÑ16cVPc14›µáÛÂqñÜ2¦“³(‚&8üÛ¼3ªýA„ÇÄù4²¶tÓÏ2Kææ ¡ã„ÍR:^¥)U.76eÏæj¢Î[7©=#­}»„
©:>)öÜÓ7Á¡vú¬.:€Ã,KMó‹ô½0¬6qšœ‡$ =+ÇôÂÛðè$€ª˜ 0òù4Ä]ãWeòƒ0¨”ÛH~ó¢×à««`ãŒz¶h}¾´M9彪aw3´}&YüNéÛ/Ê4†í¿DkŸaXÙuý«°­G`ä艠ppèåЍê(·³5ŽH¢è»Æ›«¥­.¼ï“Ë¢ª:O¿à!Ÿ)T,Æú+©–·4%”únšÞ½”÷»þnèjajº=WªC%ûn&»jžßAKÒC4¡ÄgÁýš³'݇EMa3^Œpd¬‹å%˜ñ† ÂD阍Œbùƒ1üŸMI¿{[ŠX>)‡“ûÒÓ8‚ÙA at Fú•oYÚñƒ‚’ßM	ýÕÃѽì»+´ºÉ†)ªd‰Íå^h1|~uàÎðày2ë®cÒš0b§¥¥Þ;fþxû6E5„†Õ±~Ë“‚§dÉ‘‘+?É6Žc%'Ä[Z¦/±4"¦ÛË/•4^Žþx¾ý%R<T÷ÎÿÈýõê­ÕÒ놯Öå¤ÂDF¢ú³Àro?©»
ÉÈágσzñAVêÌ›äOÒñì2
/|Øq ý™$²œ š&¬…Ödn§	Þå+dƪÌÁ“<cnøvÛÍi*‰†ý_¦Ú­ö’!Âuê™pçÈä®ȃ</”Ò5Ù¶êŏ–·”K‚éRÓˆ	?Ì=}cVÂã++YPõw0ÊU–•  ÛÙ-~¹5»Î€®Ý³¨Vß/¡ ,P1:#Ò‘M¿Ú…Ÿ'õGÌ·ël¾*6[ì²v
i£¯ìf€¤cã°µºÙP*‚îØ–°™†ãX|x…%Œ
\T¢Q&ånÑUIâùƒØˆr,Oüø—˜Õè;§_ÆUbÜ®ÑóîM¡îH­cIüJ6݈(îÇ@$oÈÚxqÓÈ–R©AàR@Rxxý‚¼¤X³ÓuM“‘ùsVú:¿x…[Ù'BŒÀ‘–08H½${Xa눜»ßó*é)½÷³Â²úuùy—­…E`É>©ŒErQ¶/Ü£‚펁µTæžA¢*æÚ6!LMà@.4ž0ÌAÐYì–’b³Rh)z 4Þ—zÉGÐčVûõPÀ¡­%Óè|1Ë]šG…7TöoKÈJ1sŒæè£ÆŸ•nyoDŸ3ß]ò“bB1À=9q(F…z¡wõÕS%…´··˜	8/öïN‰†D©©ƒÞ'ìµ½¬ò¾´>@mߨÍçÆßÍsƒw¶Š7[Y:YyÔ{”ya™¬§õ0€¾ÙݺïÅ„“ª]ÞîÂî«X#þ*ý¼ç™úuÞï û§Ã¯ðÏÛ§À)€<6ö”‡Mhꣴч§œ ì*»â$¼œ
Ç[ûŠ!û4^¢BøÓè_ŽWìé»áˆ«у€b| Ó4>Ó_‘сc²ø»ú´±„‡pÅw§3ƒS°"àMgH‹Á£ë¬oê×äçþš°{5ÇöâmÑ$c§Õêç|[k1AzÑ["P0É®PŽ€óÕëªõŽ‰\g#U,½h\ój«ªÿP–^ô#¦V—«¡ÚÇì¨"Ì6h™¤È¾þbRé¢ßÎÀȦ£K¿-N­Ÿâ’ÛQãO}Ê‹Ñi½¬õìµ¼ž D㶹yô_ÞÒŽÞç›ã„G?|šªzFŽy^+Äœ®k½ lå™ÌàD—›>'²ÝWa€•µHÁ›¥ÇˆÄSët± 'Òžlz6Éü#gsÌbfÍmßFI‚ZÝÅ*èéA›íg¢‡»q_Q=ï\¼eHƒ*`D¼Ä¿þUu1ÑÿÛ{{à„fH[iî.2,x­‹Dà ögMÌp7s`Â8÷Œ^r™Æ¾*´êAÀkzáLL`å_}KS@¤Žù?7¦Ð7_6ùû¦™CJ+œ€€ÇªéfḵÇê¬RT•ÊfÙ”€NÒÕQ¹·RBß><äÜduäl¾´û+ðõp8FÌc(¬~™ÌžÎÉmD…áà8«E.ÈeÇü<ÞË+ÂâPÅú;ω¢êZÁÈ–š
@LÍul^-É‘0@dddµ!) ZôEÇÚQiŒP³p<}Õ" €3já©@Hµ¬<êt ¬D2F_ä‘ áb×eGÀ¸Hå¿ŽËæ¡
N;5dñy.!UlËŸ&‰(¿¢ü#ÞB!?5I㫪ڰl|ØקùøyàRPæ%¢qdéMáƒNXˆËª”WGátáVóÓw—†jlcP¿¼?N²µŠ>q½5«’hãÜÛÔÛd”¨¤68ω˜Umm¯”˜3VŒGË>¼¬Ðøº{õ½ñ¯àm¡ž&   UŠŠªþ¶P(mÛ<Û»$¿¶±!q3Œ/#ìÃ
º-ÔNíWT¤oVûã•Ý9×KÕßé>ô^û̾d{`³$ª†$t¯yevª-OµA~G-é’¦1:U,*—ÈöÅ´ón/,˜–n½Æ$Ú²ï¶Â9üõ®Ð#£	p1dÚø(-H\ŽÝ×¼ï|óØvy„Žªl[9&&Ô>œ\óo”qP3AòpÂyr_sö2²£žwáíOyu}o0³åeNyt9l¸…Jøw!ω êÝO9°£¸y®zÖøÆÞÌ@½ø>’}Ј¶ÉÀØzyÒ„%ÈcöY©%Ù·iâºÒ>lôCj¥¹ÐçF¨ÖöúÙôM~¼Ó8é>«Ã59(ŸbÒ»GùÎo‚šß¯©Åñ,˜Û¨=¹®êÿó?Ÿ äÿÆÿ"=„A£ÿO!ƒ0 €PüBâþÇô­àžæM·ˆW–àÀxÏðýú«-Yð1é”Ç	Rˆª§HÅ»^ӧ㷯0
=‹ü5Ýü"´Ü¹"å¡~Á›Vÿ±²}%¨èmÑ Îaš„¦ “Ýa‰œ…¯€ÜqàÁdIžç1¹ƒŽHäŒd·½CãǸ½5^Ìw}ý ;‚ŲöeLÔM»ñ[²Ç„cðD>	Jmê+ÑWøx.œà#¥Æ¶í@b…£Ò˜xÉÚ «B`x¼¾à(z6>¯¿Úã²'{j{#zÉň5 1¦ÅÆtºC7?Ï£YDUŒuQuAÐ#´•ïŽš8ÑŠ”ÏÚÍ+~üpLíótž7·åÙÝç±­{@ÅdN%‡úŒÈtC
†@Òâ†ñlR0Z':0šŸöáJ rày€ <c‹Äõ+viՏnô}]„Ù Æî$ôÕ6Øýmõ«BË€ Ñþ¯·@NÙèDZíú,­°h^‘mó#þ*†Ï–rSŸåæÌa+Dæ;f<Ê >uîVzXÄeDïÒBãN½‘ä“}v±|bõ&ºh¿áT±—~+þ”ƒùûŒòêÀ(
†}Í ìîE#Z¾ãyOÇ͐o eªæ¶é<ã×ê
.E‰rª$*«Í–0`Z5
TQ at p3ê‘=1,y²…¤R6–÷l—¸ÄÇ*`¸úH–“ûédtâþü‰nåb¾"M\hŽÃ[^–:)µ±¹ö”±“Û90’´TøR¯Z†Ón¡pÁï)ŽÈ„*¦ ;C…XFõ3唇_¤Ë~˜“Ìp-|FC)H‘ñÜ9|{veO£kaÓ:õdÔ…É1½Ý _†LåcŒmòó;éA×úÂĘ’~¾Dx¤¾òÐä$Ü	<¨H±ƒgÒfÇãªÐõ™¨ÑŸˆ³Åµ·¬N¦€º•–°/>w!LŠv«Ç·2ÿ$âvMŸ
CЦãÕã­<qáä*Àã’éï«D8ÞÓÅÍ¢Å$3’
:úÐi•:Àš›ñ¾ôÉw×,jݤûȹéÞOo–аSSxÃâ9sœéãÝãM¶¤öã¼Æ
Ïý×Rc§Ñ	nŽ–©fƒ²Ú¼Ý*_~†¤†¹4Î9Ë<>7¥˜àD#¦8©ñˆÙY­ÌDGPªÉa¾æhdN¨~yI»VÌAÛI•qíÀ ’vw‘n‹Øä¸|Æ&‡GýœÙ)ÔYz‡8>{­„à
e›ßžÄ39ǵ‰u¾Ó-‡i¦	A\Í2Ë)Ò}~+X}z+±ÍñðT¢Usù•@V^ò<6}8Cîsoá}ßÇ‹_TŸV)îæ‰òŠäÙ''€Y4Y¾bðI14åFKTˆ4qó­µµr"¹ä̾0b“7ŠÌT¤ßÉÝM	úóDX8©:·“ O…Ö#ro¥¯kÍgÈUg˜k$¼±Â®üúj*NržC	Ī¹Šÿñ8ßq}U§2ÛèÕX.êäÔ.rÙm퇧Lrm§;$yœ£
`¯±©¤!ÁNt2†•Æ?Ôׇ¦QÄÙ~ÓjÍH?Lè5l”»í˜Óg£EÒAáBûõ0ïÐyì^^hoƒR„Ò,©4ÚQç7+"=/)ï&ÛÛðIn)hm½IoiO‘³ƒ*°}Èq°¡“ÆLJñ¹Á:~:¸—þ±já=ŠÙ`(zãx
M_úhœVû‚å©|VRÄɇ½^u{Q©	±˜
bUA۝£6մ⻺…–}ð¥·àl/ɲt…s´ÒÒ\J,Âçú¨ðIjŠ—ò–dõ@&üJëÚsÃ=ùƒ½œè'{<šÄÛ>>>7øvšMNN¾¾…‹_}içÍ4Ö!LvIz7Êu.âÛìÎݲhGKÃ5ÝjÚ4+ 5u¯K8ø¾PJ1¡¤—ÄjÁ}üV=ÅI¶‘fb¸­à·Ú÷µ7xê?û϶Ï&åÛ¨Õ¬ÆMí~ÿ¾x´²vïx÷]áJÌ£’Ý£f×X«ÂÿÍ×p©"€=Ð÷¢™I9·
…¯™5Ô€¢c%¢ n
šÏn³am-7¶ûbH±2™ḺRd
º{wñ¤ÃÜ~÷yý…!‘)8ú›‘çWé3{…Y}hioóC·Êy‡³SÄÃÆ“o½ýV˜'	›Dw€
ÂüÙ»¨Sö1Çö-þ2 at W²¼pƒ°£É4)çlç1*Ë—Ù!xü\P#‡DZr|<ôì•+Œ
ú Æ*¹f`?‹zd/ûÇݱ^Wõ\ÐoÕ2F~Öwý¥µƒñ«
H¶'lŸq%Ç·i^©¥ÄT¸¶éÁ.&¢o=5¹QT›Ü]iyuñÆš5ݤ"å/ †æù`I•ˆ( ‘çV™0rêo¿uÍ’ºasóóÝèiókûú[íÞ^¹ÌíVj¥­É¿oWs¶2ëëéÀz^pvÓA [Õ½O.¿늕	”—@4…£‚$·Àt‰¡íå3eוãí—¹U[¬RøÔ9“
3‰¤b´*qûÞ,ïAK¤Uª /ƒ Xèè‡ï­@ƒxQ“\;­Äf,ïAQT53‰u(¼ñ½ðFލIÉ¸LC~ÏÊ™¦ÛÛ÷ÔUkØ»©S>Z‹úîÍ€%û{w
Œ~^š‹nBA§Ï»hÌo¾HãîD¯°	„­²ª…¡`–L’ÊïñÇS
Òm­¬`‡ÇcCÓ%¿yÕ¿>­€pNoμjäi*ú2ó{Š9Œ³j?øg`“‡Ðé}±ùa‚1âÆööUÇÄZÕ}­ëO€Sn>zQÏõ.5%‰Þ̹1Ž.–#†¿3O±}6ëU™lººþDö×ôÒ]@ž4S öHŒ±÷¶ºwÓX'æÀ)Í'•—qMpq‚ñaÕÌšoîÓ—«[7ß\Vÿ²S|¸r_=ȤíXÑ7"(rÙëi‘PsÅ÷ßÅ’ÔŠ‘Ù	MnhÛñª¸mNÏ^ltUÒ­óZGöÐcy½ÇÆLòxüa4ða-\3%ûqó‹î–Ä­²[KVÞ‰}ëâ'QûãËR7`³–BÜ‚qùRØoöÅKúª]3óyÛT#4'cØCÖq[zÇ[SÅëÁlíÚª*2 MœŸ6Öà}£Ã¤®ïZ9犥á
aÁ˜¹Mmž›/Ô'¾v"©ëa’¡žÑÞ¥è$žBü'Îgª1·"÷eå怪IlÓÈK±°ý–{MG[ FMûº²©ègÆ‹²Fö´ïzŽ_žŽR}îð˜Ç N>ùŒ*suð6ÌµÐ}»ç
vòqÜÏbô²æ*!ÂoNym~º‚ƒñ×€HCÛŸäü^Ï÷?˜ß¾ÿPY+ͱê]€Ìñ1ÍH‹zv^IŠ¬’=hz8|Óf=é³.æ£`
OLÌÙSå„
ã1Å@Ÿ5ó2pRˆLÛŽE'Ú7C’¢Âë€ÚCÜ×”•sežìËՐ<ÊV*'hc|U3ž´Œº·•íô*¥öæ”QÄK¤¨@19×Î[á¡Ž†©îO&v¢¾_J•írpW˜x¬±éµUž”ÙwþçF¤Ã݈Lpèȧž´áY×{Õ×[ÛW(õ•¹QK®½õ¡)÷#”ˆwæ%¶‰S4%~‘7”Õ0©0¶=p”½Xgš­>wæ€ö¿-ö-˜H¾×az¢Óßus¡};ó¡)DYàׇɲê8ß3Ê*;Íw»â¶‹Æ·q{QèúHþ ps0Ããe³{Ë%*Û¥lâaº6aÂt2 "OÞÌÆ3¨p*ñûÛЖÏVnæºI=ãú-»±	mNn–·uÉ_0½«åÜ”òÓMw'¼ˆû´Nágt¢ÙÇá<Pòk«¯œ÷®÷J3UþRAÈê£ñdHª°›ÊOJ­ÊF™¬ô_¹Î©|øÀGÓ^\÷.ûÈ wÁÁ—ÕŽŸ²'8	H,éWZJ%"/ˏö&älh}éDhçtÌŠ‡8FCm±°:¼îÓ4ÓVÒ¼	
1h†0^‰†¦Øõ̺Óéð(ðñe¤#ê‘Qº.㓶Ð6­¢3(¬:U#êν´£ˆ½Ã*†±ë€oRpU0èæ$OªÌÍÄ	Ò€–§½™òï\Ë9}ØÂöý¹j½TUIö…cs)Q¦£Hi\ÑaøæE¨gb·Ý­·C|DÆä÷O@;nƒ¾øп§ß‹ÖZRUý&”zG÷죬‡Ù‚àf2³ôǃ¢å~::èÝ3÷QýïtÇ“_¶íÖGçiq‡Ðö ¸Sd(-W•¸W捥ª¤Ÿìqs¨\ô°“Ž+àÝC2Ǎ•—ËÙ­"ói»<¤4<º®TƒC²qô39ð/‡/Y`ŸËA]i•£¦þ{ЦšRУñ€øüLi«rn’y«›K1³šTýË–‰ãËYÅ…ÍôØÀ±iëZ]ûŠø7’’(Y¯Èe%LjH¦7éï°Z\#¨1ê¶ÐB՝jé1ý¢5=ÿmå"í,ˆSèšøÏüWå‘[¿bHÈ-Â&]ÃíÆt¡7ûõ?æstžùiÄÕ`±.£tÙqc¤;¨jâ|k[e(œŒ ÒïÙ-/6zêwØ«-D5VW\=ÙÈ[™›¨~û-%Š~Ïk—/[`Ž™|#cšøZ$gWžC§^hòÚ°¹*_¿LÞÈpo6û¨ êÙþ]ö¼vÔeÅ9æßGjҐd=SKƪ„¢¶Oø³ÕÐ:ýy„³é[JÞ1Ü<ŠÐò¼)~­sEI?‰÷+vlÌøß#!=¿¯¸ƒõÝy¤ÀæbéðŸ/yËzðÑ*ᶟfEÎуðhªÊ™BòóO—W?íjAqZìV×	ž,ïef’ê³…sÃÓDD	ò쓯p2‡skN.ÜTKèÝ£%ïm㪴â	d[ŸOX‘]ô·D-Š¦¨mô­Ö'Oñ¡á­Š>æFżÜpŠQÙú .<éð²CŸ:Ó{: §Š¸ÍGå†j
­ZgbÚ§ÀãZ}²9*‚òô=&ü,O1ȾX­q¦Q	µ´NN·)Ã*—»¿Ô»Gc÷¹åïÝ
câ_¶ŸŠÏÒûf7°Ø°;pÛx0ßkwDÞe`P°«ÿ4c±|'’"ìÛmKÐË˸VOÈÈ`ƐæÏ#ëBò
Âm!ƒ·õ?„ë1Éù8­W,¿7S"HÀËn
¼õvª–˜†r üýAôó¤l…ù­‘åœÍ>°‡Kéä|ö•zl^h†Á zÞ/0P*]Jì’¥á#×–8…6iOÇ0 9ÆÜ=ӍNÉAñ54}‚ðˆÕõ‰sµ`l­]Îݏ”àçjùr [ír	!tÑ…u„€ÃõÚ”
‰þzgŽ+-â­úÿ`‚ª'‚ê—ç ¬s˜‚‰¤>]<aBôÇ÷VãX&Isz'ëw.:vt½½ŠPîì^ƒa…`5ÀúÍ“µQ=×´>lžå#a,
Ú-Ïø˜sŒ€o’ҍ^Iuß‘”ˆqÁ´2ƒÃ㼤À¾ýÅÑ÷î]<xêüédB5§ÑNº5¾8c±”èNkbm¯ß$óN^ž¢°¨9gù 1^¬[ÙiM¸öÆôž˜E–×þJqì¥uVáàæD
溔ÜQ³EHX·µðTÈn(±vz?­(®.)¡òÚ|¯~ ¤¦ÒÓY™–´ 	¶}ÆÁäï{›­}íÅÒ“Ö—¦7;é¦5|ï[@€·uöÎ~óÌ~4—¹âF:2®…»›†r–`½Ž.eQʟ۸葓¤Éa'P¿î8ÒÔ7ò!EËý°¸ßÁ “#Î0ªn=Ž£–²^ý¡¿ö¢l|Ò<ŽáE1A7)wKýZ÷×è5Û—	Éo‚úÞ:^l¤	~×&ãGI4ÿýðç/‰P€Ã± ¬žñÖq!è9"j’ç¹2aöëõÑâ[»Þ–Q$V‘0ùl”áÃüu™#K}å$]%‘„å2@µ;¡;ñ\¢iE”"æm¾µ¥8ÑISû~o†öÝìì°ÎzW;Ÿ¯¦RG­ßÄUÓ@FêP#ð¨-yÅ„«X»àRAÈaSBcô6{‹’ŠxÁ¶ºŽºH¥]ö×	=\ë^¸X7jMÑUd"§Šµ„j·þ |k܍(x„ÀžOúZw¼f”m/•é|ÒëïꇐvË:í_Eü¸c>P3/Ù¢óF8(t4‘8l¦ò€¥ˆ³3À² Q`K›“8ú«tx-2™—.aSžRs˜W+PCÓhM'ÆäKe9»
a¢GÉo¿ÄZ!Þ8Ì"ÇYNdJDÃ0‰ìÛp¡<PËeº<›Ð¢O%ùÑ;9€È6nTyDZg®Ä¨j•Ú“ U2	ÂÓª‡YIjsHøq°q
$!ô’ÖG%°X=†`_&=zx±©Ÿß[ó<
Ùܨ;Ÿð¸¡Q’EE—ù¾ùaè’øBpœÜ:9X!×t5hIF¦Fèa˜ឤò]}7»ûú@µW3é2?ÿœ–.Óõ_×FE^÷ÔHÅg;yšñZÖ梚nl={ÂøoÈÅL¨´¥ç¤ïáËÑl2yÆÌu-sÓÖ
=VÛ  I° ¡Û?Éz¼Å.=ƒ¿5¿bCa®Yg<³ão všïµd
Õ÷s×ßaçhÅA·i2kg¬êüÕÚGeÑ èYøi$³î1p:óFük-Mëa¦-ot	lc2R³Â/p¾¾œ~é"]:¸0ts»w2¨ÃKc¾üÔa ¸á¶‘9îôâå8"LÂ6à
(Åc_¼¹1&¥oì7(!aÀÆšAÐÞ$gkçÜß!êq37z~Cú©®Gtº¹ôZf°º¦ÀéŠÀ+©¬Ùg®bµ” €®ÅþØ©"±/M JÌ`°Æ…O4 hä­?DûOÿKbýI€¸1äÇ¦×3
϶ìü²f»¨V¢hqÓcÍ >˜GŒ6ðƒ0ó0®qdþïç]Ï»:Žö¿ÔÙÚ£çÉú·í6Ë…JîÎ.•õÞüïs\µ]ŒB¾bŽ‹_µ !øïÒR•hµ’˜ÊVÅú
î»ìªyÈú8¹ÊߥYIÜâe3üþ³vÕ`tNT¬¨a‡ß%èïÂÕ£».å€wš•æªr%Õ+jæbD3—$}œüèüüÙÑ#q‰w2­_™Än–q}9Ñ̼<rÕûðsˆ}ü‹í¡BÚÖ-’^må=´¡UÄ0f	·ø5èVb ‘˼([Û¹`øÍeG²Ë¸´…^ûÀM(^< 	õ'0Ú`1º~	®(šÑÒ/®¶UíàòmaÆ\©
 V¹……羟#kžM|‹²/Ìs€é6þMaÂÒ
­iúÈŹÞ|
´jå].”ÓÇѪâ0WáÁßî7î¶} ^¶š@MÌæ¨/aÒ/hoðýÍïn H}è9ԁ$'÷ŠÕZ…—Š©2:¬EÖËÌ¢0‘¤´à³ñ %j#‰O«íiEF3`‡¼HélPN¦!	ÚâH¤K íxŸê£ Ñ¦þÍk¯+S`4HÒƒÔv¾,OœjX0çº|j-MðRÑ7üJ|h[±}×-L©ß¶2zt~B½³PQñžÒ5Äu°Eo•¬óŠÃf…X*zÄÀ³0ôÞ1÷ÕܾÌ~¾ÃÅz&ÈÔ”Qê>üé…L €>§Æ9›ðc^”‚HDzîòùЫZÒñ%šêë-778ÿþÍÁÛ¼§É¯x¤oˆ—šU©¤ýBÛ?Gˆ¬·ÜB¶Þ¡-í,bÃÕ.2aÄ|c]´i@”n.§ËÂÚU-—°XÆ÷A*¦bVß{z{÷~ÿþöºb)œÑÄ2æ†f ¡àÃíâS#5¯L
Å›‚ß#Ú!ݍG_$µz‡oªÜ÷ÐU†,‡Ä Ä|£
ˆ¦Y,™*ô_aˆÍ¾Ç@ú{cæǹçÚItÙo at nÂs_¿ÐÒK\± Q?O±ØÕ¿Ó?K·~é”[½º+÷ôLãVŸ¦„	½®DuœU¼4°ì·¶áe–-e€Ðä{ú¨õt÷â³ÜÛ×@Å'jÛt¢é®É_…jÝ©ßèë=†1ªœ0ª(ªÏfå7%ã(72Ô˜ù’6Fs} ²=„•Ì¸N¯q˜P¹^¼±¸¬LŽ\j“P˜¡ä®ý­#†Áô<ÐÍèÌ-ÝýQ/¢;Þ
ƒ€Üš“ÀAjƒÂç‹›•Ë5É¿]?r­ä ï€‡Aè1‰OallØx‰‰8"P†Ì£DÓhTò훀”
½2Tþñ¤þˆý$ÀxHÖßÌY;ÉbµŸ¯¼v¨k…	“³p¸f[‘_ð\¤BÈ|¦”Òr­ùÉYJM^ŠÐ*áÄÝÏ„ª.jlÎwrºqÝ\6ÓiÄ»ÛI¬Ú9Ú8•ß¹S?Óö8lÍÅÌJ¨©àš>eå„IròHò%ͯ¾5il
º±¦¶`•™$Ûµò©ÍѸ½ÚÙžŽF¡éX!<&œÒ,ïEKžÚwx­‰_Þ¼1½ÄxÅ<)ï—¬—„ft
æà¬Ã]º ½š«·4)K9õs¾ w9î0бšÿÂöS³21råFflƹ›‚"åÝŒ’<ƒF	…EŒ¶®™gërð£Æ(’(%”°øç4]æ~u˜ËMf…Ë»Æ|!Ô)Õ}¦¶ÿÂûÄnZïóþ)œÆUÏòç‰-&}vÏþôå•«ædoÆJÔÞ°®¬˜¾§ä ¶Ixô$	?IDß²)‘Í’Uü˜±=÷Ïà¶}Ù9\®šjð‰ÊêTMÏðÈËå»H€âûVÏøÐ-ôÅC÷{õ=‹3ˆ!E¯‘<45 at f/ößù¤åÉ[ruG g’LÓôàð”8I"µm…Æ@p’H†mŽ?KÀ€óñ˜8‡+Feîîר‚¯†f¼ÊVH$ѳîÛ›…ÓÔvfÔó0#֝l4O÷†˜cŸ-I×÷IòNQÖê¬ö]Úíd÷!›Òkã	¬ëÁ9zðÈ¡ iöLs-“o'êªØ/‹I2¡ccû8Øã‡G
®m¸M÷?£çðBz

L?jê=Ã'ßµ‰&Òon«g¼Ý|á+Å;|›¡]a*yŘ^cg”̱;[2ÀÝR]I·
IÉ
©qï—¡–÷¯ìœ\ô.uŒœD rØöGñV/yŒYŸº›¥Ÿj#›ÑNÌ©(IÔÂ'¢@9Ô9áß„¸ÊY˜0Ÿ§¸]ì9$Ô*A³'Ö?ºY’¿Ôì¼Öý¡ÊcU&»ïbÉUÞŽÙ`6p²ª@?!Aoêj}4Ì ’0qÃ+Ùh»YáÄÓõ
%`Sos8ç¾u±j^0<:fì-J}9ñ{|¨¡°V-(Ï®Àm´¹‰{ÒA½ëi"øŸ[šÐ—@2ní:
a{c•R·Ë‘ä1 §ÉlaÈÆZébëã.Î|®ë—tvV]Wë¬råLç0‡ÛHdØ):Tr¶5j­š<èâ9ÍÿàYžn$ÀA4àŠVÊKUÚ	Ã:øþ½¯¬*ú:c0XÃf8I1;+Ô	Dä5h`•é~¼ƒæh]Q’$•åzÁ{ôѳ*q…@/nÖ  ³·ðsœ
âo¸û׬ýä¯/2LñÝ’Y£®Š®[²öÅÂ;©tÌÜJ%ý“{
ù¥Þ°Ü¡¯æ,¹îݬ§˜òÍß óJ,Ž ɪøXl¹¶ÍƉ­ýu€”*ö"}©¶¯y<êGÔ’hKóKݯçöm²ÆNÉ!¿,â„÷Ë:â=AvÍQƒ^7RÓ'zýL”Œɽÿétäòþñi™ôL'­eVÞ–æšÆ1ðð¥ñÍqþî3‹Ù^íŸh};z6c^sžWFMå?Ú÷œˆ}‘_VÐœ…QZoÕÃ+DߏÓ船&K.GE„ÛÎÀñŸ'5€¥3ˆì´úÖñ„N™“aK—òŒ?áv%yXzÿ‹¯%‰v4`¢&ãBÁ6rŒ.HŽvƒ=Ƥ׋)vÝ?	 eêiÞÏÏ1æÞÒîU€Ç%¶ŒAÞ(ØÇq’j!Ly·ÒõüVîð »#Ï-bu^¶g~raZ°jÜÊÏù Íƒœ}”¿,êOSnÐÆààŽë6ŒŒŒJüÎ@i(“°M<þ•$þ51¡P
’a¼ÞÔ%õ¯Úy¡¦>øç£×םïþ:»ñ=åÞnZs’¹uÆûüܝÕ,’ç‡Êãp3Ý@% dTå€Ev–qYÉ‚éjívÕ
×æ´ü?]çø?î:3ø"îKDÿÅóÎüàälä7±ÐfUt§Q£,¸F½éXJ #IÀÍâÌfR+eÕhP	BLÉ‘³ž†qÆDµÏÔäœ˝AB6bT¢£Â¸Rš&£Jl5OѯÍo”º*Ûhd¤„Ne5Ò½ÿXv>¥N’i@òôpjûÌOß<¾]ø!â{½	ˆ7æÀ1=—	u_²íÐ%²)ð*èŸÙÜ:"¦ø»'YÛŸ«©–ù((º`Â6ß±ÊßßÕúý†oõgâš”¿àÓã…¿™Ç9«4Ÿ?ûeù2Ð`;¿¶ÄÜ4áÐ|÷
x,8÷ì~¯®Òb
·p(ÇóØ‚$ÛéZû©£ê¼º™ ¡éu‘«%ÐåÖ§!¨kùà ?$±qw/¯ïÈ\ÌJ¡g̈³¸ØòBƒ1¡V{R‚”زq="ù£fßåàáí¡"³mñ	jðóF0“uì¹-GÂD¢Hœ×—¨çϯî"š8DJ¢Íc’£­
À“<¶ÏS¥$†¦÷ÖkGÎl…Ö*œœNà™hˆ
ªÇf	âŒÆ°‚X¾}Úfi²læ¼oÄÃ^‰‘6®hÿOÝ›†sU9V÷jY“wc°~ôÄ:E ‹E·wzQïR̺| ÖñB=ÎD£*Ø· 5vìIÑkQ'x3©Ó‹s<@
ÝÜ6ÖõÖ&H*£m1˜¬‘±ÅT²¡8ÁÑ7é
Žã+Þ/õõ„Ñž$›÷„&ûUƒ˜ôŽ®7²Î\.换¢m]ɨ”t¥ÀšÌ&ejÛÇ(±c‰Wx…«•SíVfôqLò`]BIä¬úþL‡³Òl—mw¬¦¥ª‘© Á¡½’¥ˆ¼ÎφÐZÄÚK
U_Ò$?zÒMud–‹-u-k7Ý‘{Ç{ÛõеOêQòãìuGwâÖS3gƒn˜¨‰ÆÑ`·[W¦°Ü”$“ÖÄW­(ÆÈߢ°SžmãeòzãˆÕoÒáÉb`I©‡Áj‘À¿*¾6 y¬9éa<¡8ª•»Êû0YÒô	;…àn4ž%  Ç|X Êšúˆ`~=ÜoÝÿ@à fú±ÎÎËËý®ŽÜ’¬¥ƒîºÝBE‚º†•©F1æø™^ CÈ ·u]&~ÌËÏ?¤”	£j]ó5¥ã¿lvtaÚ‚g&DTA6R|EÈãÇE´øž âãåÌ&,ß	<Bñ{ÌŽ°÷Œé“?òʆٛ­ím`škt¢X6ÝƶùïÌh¥ÉÕw)Z„/fçæy@3»Žî±8ÃÛÉÂÿ•ÕKDOa‡ì#m>üs=6¾‰:·;ÕmöMÓ¥hûŒþ‚^³qy¹­§«Ô
Çã[AåþÞ?C)z°™ø£¹¶\gSíàE´"ö­,vĈèÁ*$ø†t?:HD
:º©ÂPÌ„’p‚Ä%±JÁ8kO+ aq³ÎíÅXÛ©ÈeSžÃ¿äÞàJ«‚\tD¶
8O
¥7ð~ûö–ñ¥°çÌ]ælp$°V5;›9i}\³²q«4^Swcäc«;`Ì
Å›0ñ‹æÁ¼gâ®BÝ™Æ6l³*ÀZÓO™È7³½»šY*þØŸN”Ç^Wñú™ÇÔ$ÁÉSâ3ÌñåË¢…©˜Á*Äéâ“WÀcí÷Üò‚¥ó–Ç:<³B¯(Ä;­?ªÐ"3•9×2ïÿ\Z,«0Èøöø%õÀcúö4•ÊøˆUl`‰“À0s8^Ç<šcˆw“öƒyHëqF
n#lˈ†Ï,É¿(¢Ä<] ü¢ª;ûà‰·/ˆkÈ—ãˆkœ5(<{Eèkã:q¸wÐ>0ÆBƒ×	ÕP®Û,äÔ·é«+*°šrô›šc·‘3F#›H2ƒÆ§UòŸå+W®Ž
nÄ߈*ÄÃĵè°Á‡åVs-G¬;Åpœ+àŒ÷Çî™
û¤@£X™¢—@Œf0 xßOžÝþÚ7øûööÊŽ3–jý÷[å+1KyâÆìóÅkn4]uèÅ @Þ¿YÈYÎ^Ÿü¶€$qæ †­’¡Ó~¡rÞ¹æEÎ1F—JÐ~úmóýgÂæiàíÉU:†Žp¿¶(Òª Nå‡q”tÜ@?sÊ6ã—5îÓ'H'Â7ˆË€‘=¼aw>Ðéæ3RV&-(_Òè;­HþQ,ý,qÁ(ÒÅÍ¢Y¹ö«ô)¢Ý¬®9lÒ/§5 iࣀö'ç¾
ôž¾žÜÍé+ )ñhÄ¥ä
_‘ÎÔ×RMÿ84‘<ÿlãÏŸ°ÍKGºŒõ¡ä¾!aa/œMzÄÁe©•uø*C˜è굸¢ßŸá‰›Vûҏg²à1áNaB2¨Vu´4Ä#.Q~±hô-¼~M´çËàž]ÐÏm=Å @‘TÆ؝šò7ñ%nKnþPø|êK×7\™õ@Œ:>™èzÄJ- Òýv ý=!œübðÌ *&Â*ö‘¨uÍiãöí¿ôNnµ{´w5ð—N>ž<hÎvU_7gzˆÓÞbý^ œÔ×(®^ϝ-®ð±g-o“ˆlr·$û˜Ïì/3¢që{ýŸ~ì
<öbÛ'{yyдdæ‹\Õ+Õ¸Äö€ƒ(Ãg	éø(šð+´]—%vN jxø +þlŒ™@¦ÞRJcG°‚ÁœæܸŸg7Œ¸\Ú‡bqL¤rKª@ªŒ_Ò;êéÆkA,ÐÖE´yĪ	
… ^\*×O+È`„°Ç¥Ý	Í©Åéåü´L`Wn]BƒÜH	­)á2t<JäšÛQH¼hÖèÂk‡Ÿó׶
ëÎð‘^Bցï‹pw\H¤…>ªl1ú¢ë†ONÄ«wÍó5ûÃc­Vr¶EôÅU¢¨eß–§$âÒËuÄ2µ*‡cá­þíüw/–£‚¬â¹0éã¸ÆßQédtíƒC’ÐÅXŽz¨Œ,èÿ´våñPîmffÆ6K¨îCȾGjŒÁ Œ]Ù™±Ã0d«ÁX’4–Eö%IY*BQ*BYRJÚ÷H:Õyg¨sê<ç<ïó¼Ÿw|f¹×~}¯ßïºîûééŸÒÓrK…	ó—ÎŽ³Êh38Ýü'íë—ö¤øž¾lÎ×Õ-ŸMðë`5ÅŽ–ç& /7¶j»~f·ß$TÅ­öq»ÍÉ…f6zÐÕÙƒzÀ;¬ÔÁLÌ\i
´(Á6ò8,„I5ÀdÇõHŽt9à”±þÝÊ»ù¦&¡–ynú´3Á€˜ü)Qˆ¡)m
Éæ™0¿x’¾³WÐ4 ®s.„ä…ÈÉÙ Oõχö{0À0Óèþm÷Û$zÆH¦_}§AÀ|çÙ3ÑO6g»|6Ú{°öó†<Ùqþu;=G¤ëÓ)„¬8u$Ë™] vª—Š_3”yE÷dÖ2ív¤=ütêrnìýœXÌzïU¨öÖv‘­šÎGÄ#g¯•h~=zÊ
01ö
Æ=é{è ¦¡æõĦ{TWt1šd2ƒ· b‹zgí‚‘†yéúGø›†<v–•²ÒŒŽišÐUìœÒ߈ ‡czÌt+¯…—²7áXלӒ(‰K Û <H×EkGwúg¾²º-X þ ãlnÇmÒ]‘o‹HØ¥ÊéàêÆ÷o¯tK?:¥
䛎­¡ÞmW½eoª7z¥ƒ!Ú11­nÒNb³Þ§ãŸ)Yv:í%½¾’÷<56okG~ ‡([(Ÿ‚ÊQ¶ÃÜt× ™fé=ÛM`fºûÜŠemfödžy'|ªxÞ>7*ü¥3®Êõ[ЀawAñ‡'Ì2Ç2áë@Ö¦*\zË(O(BLJ‘l+lÎ^yQûYd×Ik;:™‚Í]_Ö²]g—_U—MªÔXç(.îªÚR…ñebÏ»#짌%ÅÝ¿™vdî(ømSøùä^Àã¾×‡¹¸MW$»šjH¬Yx¾‰£F/lì¦ZƒÂñ —jQA‚éf"Óê†,wbõñMQS5’rû}W»›¢Í{Qûp =WFK6Æd‘‹6—Ÿ¬=’ïp4Íóù™[gªb÷™›xÇÎ<ž×ßØVû||ùÕ>˜ô Ð™Û‹¶¾ ©tlI‹8¼å¨ß‹ÜŽºÔø·ì”`r€G|!Mšª×jj›Üаû!T
k^x¼ošÅñûŸð)NÊýŠ¶JÎ,fn,uºy‹rª¸QÕEú±Ô2OXœp·È˜œ6¿)l6Þ^C*;¿V4u¾ÙÞà˜°–Ý”ˆKÁ÷9£zDQ*·$ïÝî¼h;–•Š ²Ñ;wÜV¹|»¤©Xf¬®A¯Õ%ä@ÕŽií¶ú¢«¡äÖ)1Ûãbæ(L³Ÿ¨w÷ãáru¹“)a%|·^ŠÏdÉ
(,Bc5}>ZÆÁ7PÝŸpgøâ„šå©f$bV³¸muóèÈÀòS¶?*JÊw" úàz„bEêôœø65 Bʞȼ%SÌLB¨[£Î9€^áÔ…%àHãmŠ„fö#†_TgÆí:ÿ-Ÿÿ}ŠßÔ‰n‰SúOU|Ùr• 7ü{Pý°q]Ï3ÚûÙ|ii/q#P¨ô}Û͉*Õµ“B•ÁET•Î'ÚíØçX2Øô™XlÔ»˜ÎÆ]$€îT’%	™62y¨*tä9ÖF¾šÔ|SÁżèо¢]CÏ»Üëj»—.#à6ó1‰ì>„¯'Xbçæ ç5Ì”¢­œ±X‚¯®`í!LU%xœª.ÛT¿#äLc¨Ì Ïõ¦Vך8¾6]ñ”U¥€GÄû¦¸Ã7^ZUÏP0gÉÃþ¸Ë àh‡
Å|þ‡)v¤»+$d¯4†Ü…™¶ZÊ‘IZŽíÜÀsˆì„³ŒˆáCõHy倖dÚ9ɼèwdg»Q†‡D» ‹US]G´¶‘I–H`ïà	áñúœ-<âÏ—fv#
˜ý–V”]Q‡=y»‹Ÿ±ë¥JqìÞ‚N‡¶‰¶³„WeKwt¯>vn€ö¡LëN˜ÁyN)½Ï4Ÿí±Ñ´C~Bœbåáì÷Œw?@Íò
…[€ˆ,Ò ÖŸ™ñ)ëðGñ ­½*è(7«=¦=;×›*Û@,^ob“oåœ[CÞ­#'ÏS¬Vb0iæù[ûJaÉõkŠ¯eE ÷­r$µw¢:›‘JÛB=[³ñ
ÖÝÓ2ÅÏož£‚‹\µå[Þö	be1Çû1Ȭz˜
»@8o{jÔj³¼`ÆêÈÌ[:Ñeí™óHඅ©C;-þHýxã$²ñœX7¯¾²2ÒQ¡ßÍ«jÝn¸ñAëÓV`Mô¨ Ç,É]…üoÖHŠ¦Àž?nßÿbA£„ú˜R75Þ\YX!m\ӐÚ$À+]µÄ¶9(Û ^N´‚±Û×>¬y[	²Žc‰áh¹üƒ	ÏáWbx7ç9
`R- #(é[H ’Rîe‚!<dù™¦Ýö¬ÉúÀÀ}¶;,ô§
ïW1eÄ}í&²Eàás›…ã&d–ó6ñÔÖ)"±Øû;f¢”‚ùÙÓ9š¥ÙaÐÇ2UFø'þ•ãÅr†–`Ç|xy¥êNÍ%¹a1¶‰±¯Jó…)__Õ†qûOFhžÈh„±ÅXˆ¹©ý†(ñ#2Y.’¬#β]¾Ž8à¥ÿÉŽëéæYÕ<fþGs4àDbž<Dóa^}»‚œê
çþƒ¨íàV©‰ä¹çäê;ño^¿Ú úéZl“þ±Z†‡y°ÉaQ¿­;,½P´È^E2mìÞ–¥ãÞ¿yX…¹6-¥Éèç¡îƒÀ›ëR)(2Î
¬-³Ž®Íǯ5TÏs°Áµ	H§–æiä}YL-‚j[ѳ)߶Nˆ	ÚÆ@ÓÞ.'¤x_¯tåÈ,„®_ËtÙ¬ºpwéRüMóü,šg±ÇDß1£uòÁ›ae‘“ª9&ÂQoß9*ŽLÀ+ ÙdåJ|F©ù-¼…ðg„{…tÝÔÛOO7*¨-ŸôÙ})á­G­U‹El2%“æÅÞ¢õ(¹âñ»i:X¾ôOe`Alúf8 âÿš.®¹#«EEîÁ›T¡fÁþûºYÉ2·º×–«ª”ú+ÄŒ-#‡‡³†¶ÒÙ®òdxMQêò¬’TBSÔ¢l½l±ÏÇMº~椳©bâ‹oH7bª;éX©¡š|Œ˜$ü9nè9chÙÄÂ7y4‰…[‡¸èµ¶•4Ÿv=ìvc:ùâÆW_4z¨î¨t³	ka³*r|>OJG at wbbÄÖ¾ßfë•Œ>žºoonŽ´xÛWAR–<µ®õŒÒþzžáòÏH—
ÅeÜL(Ó#6—
lŒ?³x…ìR	ø½ß-i”IÞß×m4¹+Òx-9…
©£:8½XÿÍ×äw)~×Tóúkél:ÄÙÚ‘ô´–
€G^Š1¤'ú¹³ûa#Î…IÌ/´™›7ÁX°üÂQé¡RjËl*#¨-EëéeFÎþsµÞÕMà^×ZÔ»Ûi€wC+³fÚn´o³°gH½5î§Oè¿,ª&`¥OɽÞ1ÅMäúcďÑö
Að½:á^'Ú¯i½ÑÈ8¬ÎRùÐÛaÜ'~Sé«]PK׶ùSç3Œ#øïÀøŽ(œ=V+Ý0uÚƒN²ãwÛvˬØ)»Ÿ•Ì¨8éwÙqH_:66(n›G§ž`ùŒùûƼ¹!…/.Oѧ×älÿbð$ãLªÑíTÓ©ƒ‡êc¡‚0Ü4±x×5/>hp?¶«*sYÖÀçDÑÞv•=C*ÇÌ<ËSÎóƒßËðAõ…î8ðŒD=å÷ŠÙx)õ<”8:û2ynXÎ|ÜÉo•W£†•Þå“Ř–ÖúÔ0ÜŠ¿¨Ÿn”°¾M¹ÝüÍÙùß’ÝfDã¼ãm²/»ÍVRõ<¤H11ÓëØçýQèÁËãE“²}€y|ÿnÐyô]}\{—½ÊFÿõ·0ýoJòoaå­ EH“‚W‡Cœ¾¿x}yS§»v$Á; .êÚ(5wª4(Òq_\55Ë7¹ÕûF«G·¹eây³k»jç…ö®É/¸„îÛ|p¢Gìu:ˆ÷²‰G ?|Y¤¥Ùž•>†˜>yåͲQîõÞUÍqÆ+>€ðé÷áðË\—ýoÌ–èn¼oMä™38ÏT4C¼î)HØóÎ8ërxŠOۻΙl“BUJšíÁ1éÒ¿`2>œîxœb¨8d½õ›W»Ng.¨Ú»b·]®°’haŸ5‰÷ NC%S|bª‘‹Ž‘æÛ{ˆ0ÿ˜95q9ÏùÝf“ÝècF›ã^}¾Ù±>7>Û±p	EGèω€k+Úܸ›ÿboËãgV(Œ$Tʲ˜8	Ò¬úÀ&3˜Ö/¡]z¥)aÛmNÄæ#¿HÞÏÄ€ùïÜå{?ýM£sÁn¶F%'g„-k–z¹awA&ÁA¦2Ó]eû{¢Í#iƒº#gÅŸÉ J=鯍|÷¿ÓoÍh~.xSÛOò„ð­T®‰=|A|÷=oÐiÑ–óu€Øüi+%$Oà }4ÍÑrX(ÖWŸ¢­·ä’R`MäE=P˜V¶©n¹0N.kÒT#¹Ðbu½áÊðAÒ°l›ú¯Þhd_E†²4^^OS*O‡Ö•äW5S¿|y¡º]xpb_Y)€4êR»G탿x&ŽòCá±Є vPÈV§þ6Ñ©c{É»GõOvï4ÔC7÷Ґ<™àv ½ÎŠëÚï°
öÉ"X°ù…â‰t„•`¯ŒÑÁã諨ù‡•¬iÖmOGáÇùþ‡êU•ôaf'4UmÄ<TPkÒÑ|/5‡r Õ5Ý
§ClÃ1Qª{é(#1™ŒMÈeÔíë/{²Á!vy…ÏSõw*ùKBÕ†ØV"¤XÚ‹ÏÚuÑ÷ª•’5¿ôQïaï°¨bœMë
É×Ï2×_]WxÝ
•ŸW‘îwPZg{¢Ç
êý0C×!OI0»|ýŒdÿ ÿ5¦Üls,›-É4Ç€‘J;»÷«Bû‰¹=3ŽŽf+¤¼z 1cU>ôÊ·> ìå°¡é…K
äÞ]¿t=]1›ÙesÄ&¨’^vå¶X+LÛ¾y¨&RÓ´EiG6Ïk@¹]Ç9«‡X©éˆ1å ˜æQ*ÔáHêåí Ôm:ÍA½ôe‡ðÒ%>o3¢êu¤XL™Wá`wz›YÁyY_>¦®ëE˜‘Õ-ì#ÐP.s·%à×f…'è<*tì-v‹âs­…sQHLMºLEÆADó!¥Ëè|ò|Ûö*‰é6?3|LÈ…NØ~‚ŒLzÕñ”£øà¼i]ü§õ3ŒùoëÚÚ”’IÓöha$å‹SïþÐpe]0µãž°a²³s+Ú>i8·®ÍÅÖ)~
äiZr„kÞçÄ_óMÅÌ	p>‹m(‘·ݩþ1/å¦:à2dù–µÆ‰b֎ȧ6wDŽV‚¯v¬íߤ.TRµ¨è@Ö両œáPF}ùä×så÷Åí°nù|Ò†dø»Ì¹3%,š revZ íŽød.%…_›Hrë!¼~QQs¨ØdQâkZ´Õòx›zø±[ð̾— t/8fwÕþ‚\³Þ”™û96h O<›ŽÀ©jœ:;{º¿±Ëzo"ZÒmÁ¶¦6$áudã
ýcÊêˆKð¬}uïØóèÍ&o/sÝÓ1(‘I©]As|Ã	¼Ð.g€>±þ¤Ï[‰‰š£ð`HìàºCºÚJå¡%¬ YÂè‡ûût¢ù>£¥ŸNwÛâÊ9·|Í8&ìdóûc˜'£hlxð®3<sx7>vÅ"Xƒ>‹ùzr&q j²*6eÿ–—fVS”ÎƏ‘ÞŒº$ƒ˜q±W at K[Æý÷Âê*ðGú%³³ˆ’€ç±×úü6õ®”£YVæ¨m¢¤»™9`xŽ§2Úlóâ'ÈÁv»ôë_‚Ló/L@GõzÎg‚ÕÃÑKKE¦e0 £ŸP×ô·]?ºcܶñª­d[¥)H=
ÓwfØnyD·‰÷L}Ó™òñÂis×’å©Q—“-ûöuºÌx5Ø:–TŽYkÞ›!5wö¨êÝšÍþ &½c*ñTûL@ô’Þœ =
¿ø¼”gpV9ÿ~¹´°¯R&žÉûÎøI.5ý°só¶¡kþËv¶IS­&"dTp\¶f襝­âêЈ²h¨â+¹3³¹³5¬äÌ\Ì;ɺ;O‹´‹•™£ó3ýr9«A«²ò}ns­^o=Íw°ï[9 at f%Àå¨,m0BTŠq÷ñ)3DŠwš«Eɨ„‡ï䔋¥ÂÇÆXî^¯©dµš„cõó
ÇN”­¥™˜y>F²È-=¶+,¶
vÈa˜O*ˆú"ÕFóLJÍð_\ܲ_-ÊħŠ®£m½&„~Õ”zX#rq}o¶ˆ]—â&/9?‹®7Wô
í67Hk©f)bF°®ÂègbÂYU¹ºÉezµ_ÃAv½P¨Èz9ÿ žs:|rä6ÉõRåçµ~#
ʼnM•f^ü­{dPŽ÷ul{Ž©|§vû±§#O”k7Lò~KŒYS¬³U$vàˆß+&áâñç&ÅÃÀÛœ©Ã_¯¼Sˆõ5 ¾yÏ™ž>§ƒ¾<LÓg’O˜è”É0‰±8֏·¯]¯ìÊaÔϳ_bs=rÍŽ
}¼Ýƒú«žøê®ná3‹AO×[çm°‰Þ¦XrÈZÔ¸5
~Œ}/ç2¦ÌÒï‘ÍuŠ.y¦ÉæW¼:2§:¬95~Ùg2¯Ð&{{‰ñþP\•íˆÖ}‚F×´«y]{²l_jÞþÄ·fT}퍻¼Ââå/äƒìO?yY¬íîæǏRö–[E=V8ÂÏê «ë¥#(HAZL¸qëéç± iYÿ¨³†2^KÍ/FZù½’døM
Bä{R•ƒïêÔeÝs`æ„R²xÄSÓGn|óQÔ:6ìZ‹Ì‘H:YY¥PÚ,’/ªÕ5týð0Uéµì„øä·ö4ªm‚Ee	2_C½@ÓàT$z=qÐÁ2(8mL5c”Ç/”£E‹È·j„Þê³CÙ†Ù!G%
ÏÕGY©¨ /Y„g&äåë¾}ä³[ïnér…”µ²ž-#¤ûêXͨÇg£§ÚJßjVmÚô¥ÑXÜz!Ø]ƒ)·&}ÏOí¹%újO²Sþó\_ƺå¬èûn{£çL·0âJ2®m˜ˆ(ضEEáh¹r‚OöÉgÒb+Œåf–Éj
(‡êb‹zi¿¾Ö.ß
ÒâåÑL‹yÂf¿`%ÚiJ8ߏ_r
茋¥ÛWD«…¶öŸ¿¹ëøiÛp5'¼Â›{ÝšE†²6L3ë™efƒîë„xzîÄô¿´eO”a§À!™ÅÓ>gí'¼µÖ>€´9zr«´Éé–8I!wŒ7 O°­ér~Vk|®éÎ[åèX€ä³Àáæ@OÜ«æû®Oø6^&÷{ËÇcz‡ü?§ó¢¯g1Ε¼ÚÍ÷ØôrÉ‚µØv™zÏRxóË›:Âø¥‰ü¥ßläYü0ÿŠH/d>µIªR6±©-à0êKš•D”ƒËó„ Ê‚Ò²±µ8	–4(åÊ‹IaސƒEÀš¦qÏŸBø̳«è**³UÒí§«Y¬\|ðsœy	ê_ËCdH1Ôy„ƒ‡Îž¢ò:}ÝÕH…—ݼ|éZKo69ØéUU+ UD±&Ç Ùžƒ§Ñ—ÄÄoÄ'·m–0_Û5p¬¬Áñ·ÁZæ&ü°‘‡}cw1kº·Í¥•ôh"{â•{t4}³ÑÅ2¾ÜÙX9¾ Ö¬©L^xEgéø­)9E2”ÍLP²
ŸLaŸ½éÞ("à4ÓT˜XQ^ÂwŽ¡”,_/‰5:˜ïÏ/Û
˜•v¬=¥¥»|­%láÔx	þÀ‹»VŠ^–Ý·.íª"Ùj"ÑXká¯ÉßÜ!²[9ùîˆ~<o2b'yÂT‡Ç/¹³AWj‡ÁŽzrbÝùfšÇm3®½,ŸŽŸ¹Ôl¿¹Ò渨¢ß‹Ñ°á=à^s5jAvýÍH߉[aÏ»€‚È-­Zx\
ºgÝÃ:i™k_MvCD¦hc$¿áaevÄÎaÁKq‰»-¯¼V¿õ%M}Ó³Ožë—³ŽiÕ3¯ÞƒV©ÍfÄëäÅîW7ÍdAal(Ië¨Í´NÜ'[;©;†ï&”y]Ûë=2]úƒÙÅM-"OºŸæœâpWA~`áÃûŠ÷‚–å/}'¦h
f7oܽLªyîÌSÌ'^Ž¿„8ªA'%Ù½3ø­>ÄõB˜À@ìù¡ÔbØg4gæ½Yî*‡Ó*œ|oùÛ‹™¢Ã4Í­®”x«:¾éMÞµatÇí¯‹ãm_›5·#$ñ™ïªUP‚°ú÷ÖjclåÍ7UBëhçÈ€ïëzv"z/ÿ‘K‹[‘˜†Ô›èî»~~þû““õ³„Ý>Óçb§îWSJÔ–MJO:ˆ+n;ïµ`üîõWÉ;g.¬;¯WA¿W¹¼?"~ûy;_^•/ò›qÖ<Þ*v_ƒ‘ÛÊýOê¤$×ÀiÌÌ«×ms cwQe°Š`mûRÕÁynw”mí%»N˜»ÝîL¾ï³{äùº%Ú㓧_ßY¤?zºü r&bz
¶!\µÔú•ë‰/>¢S÷&®‰:­
› “'%äLv9í¬8]ÚÇÊÔœ0NU|›ÆÌÔ…©ÝM•ãÉúÄ㻑pÂRY
B³ÙÒ'ý·ç×Hû*Ô
Ä×5‚Æ’Û{ƒé2¶“ÓØ"¨ÒÕ0Wµ6;/P#›ý%XJ’¼/í ”É†IÆ\–݆²`¥ŠÈ³XyAÄ	C¢¯\
³5/½0WÇ4²ôuT…#‰èyïxsÔ.Ív4Ÿà–ß7܉3SŸ=Uÿ¨¢‘ûïbÁYMqWaÞh¬z·¨Ô”¤Dà?ƒ ·û‰Z?ßTº˜äúäšpLò£Í¹Ô¢pÁÅs/wùJMˆ®}X¦9N0\SÓ3ÔìCo{òàí‹à ÃÞØÔ?I4Më«Ú™'tÚÒ½DÀlWhþµà%ÛwšçªŽ"‘Dücw¨|Z麉ÑÌ<"êpýà–âEËHìûyQ+iöùnW“Í;?Î~ˆKÏÒn8l:æâÍ~!yFë@gðÖ£SÛ­ñp#	‘ºÞ±æž‡ ±uòy–±¡™uKË7Ð|P¾ Þ²ˆ¼­Z£éž0
[BÂÔ<•hQÜŠECÉùÈ3²KŸ÷«
>ðüzl`ò¦øöåßn¶=	ŒLAɸÏ^Í…ú¢Q.U{z«÷’÷ÒçfˆYÎ}SëÛuø¼üXpÖ\aÚ
ºåËÛLøÆNþØuΑ³LË„²íÏóË›:áNû×É!e¤²
LÔÓ]n·L†owv$¸Ì<')SΠڇwoJ[ú‰²øÝ›®g›$3×Üm“ÌTºúf²zpºeÁòCÍ#/Fùz¾ßÛÑ’Û
‡îéhÆFUà˜Š=¤Ù>Ò Pë)¶/µ¤’É•[ˆÂâ1•|þ
bŽÑÝùÇvõæ/”nz}Ts²¿œ˜ø¼Ý&¡±©C6~,7×IÛ5¿ÍpTGXT0\\?áì‹„}4ÑíŠõù†¤„˜Û‰-v£GOgù«¶d?i’ÝUÏ€ž¸[sžÈrPʜȏ§\µ„lXjoœ;r.¶ዪfš•2˜p¤³bd*؁ʫsÊà† –ìÎpöJ+º þɨ{íxnÌà…ó뫼OkÚm?h¸¦0×Å—ñúrx>•þõQÌçî<“m`ÓÆæ#¢7×ðßNòO,}9A„½œñÎ{c‰éºñù íñ‘ɨ¶$¿–V؍öó›ô¶9*EôJÙ…àFD¯€UŸß£iÛ}ë›Iу'e"upð6ÛÔË®u]ŸÀq”9ñ¶¿”º’Y19 oyo®èØðý/åñÙïè|÷ªC†˜¯Fvf|
fŠC†·¯/Ôz–˜*ì2•ÑÝÖì ?Ñ›Êõ¦þP2\„ð:í6^&,Ë‚QÛ4O‘KB£#·<ž…(ÍŠî0~w£.ÐÝÌÆë¡Nü·Xçëê ‡“}Ô4éØ5©7Ð-fø‡³³6—ÊÐÚL%vÙVúBé¡
bË
×1—ª²„ʙȾ‹WØvß6ˆß-KOBÌÒo¦°›ë¡pÍLçaÆo¡‰9ªH80¤MÍ2·¹Õ»ñú±~^y¡–!ƒçGjÖßm“Ï!F§|[“è>8­g8]C²~ ­#G;³HxÖÒ+•ß‡Ænq¯ 峑jes-YoŒüûÞü½ Ë3À^Ì—³Z=±‚=J¢•k×Êâ%¥_iÚ8ÉÌzßSR_š>=~Xsñšó{C–g¤Å¦ŒÔœöò¢îþf÷ÉÍ·—Ê·6FbªZØ­ßwï	©×ôJAJ ¦8ú|Î|îZ9­½rù&yaà¡ìò½Ãµ¬½1*'Öä°/ë$¦X_.ñöx«º˜WO”§"_Ð]/•ð7Ê::žo!
øA Å0Üݐ¥Æè‹ås×d÷\²™}¤¦[ž_™˜wRÛ	>ôøy¹”@±ŠÍ¶ÛaEaeÌæíåAêV÷Ž²MuDÙBn†_ƒ¹7ùž¼4ƒåË£OMá±àÇž0ªV‘wJBVLSSÐP™{e[JZ2HXì¹ ¦7WÔÜ­™æ?kÎÌcY›eŒèÐ.–FRPETGžž¸,ǾSÃ6–¤r¢á<®(ݍgè— Ã¶£á(ŸÜÚDE3ípwjÐLP´§ځ›}Y¤²p]©#›ïß™µ_½wòê’¤ð˜ºtÙqÕŒ©.2´Éš,¤çl‹‘‘3‹$ïhö`yÞ	M^{S,ÆÜacö°õp×õ½†z+Õ6…P<"Ó!Gum8WÓß,¦^%¹Ž:ÿÚûx÷%­1+R~›LÄ^ç1æþ8í^Uôcâ£õ¹í62F•ìTËg¯UåÎ?Ú*œ-Pé•ðŽwËéà¹6ÓÞAÏ#QŠTæ§ÚF¯
Ez*Ã˶¼ƒ“7ÓƒàæÖ¥©ôM/™$é7cSz+GîU¢çDwi:#RÞd!Æìêx¥ú˜èTb[j¿GëdI‡ÅÆ wç5ìÇÆ_©QÃ.Ÿ¹:.ÓßäòØíá{i%4F éR†ép,Ä:®ßl&´¡UPÂ7KMÖ‡AxáãÃXñÓ,œ°ÿ¤ºr
ÔŽÀ«œm0UJÅ-‘Ö@mêP
#w\5^E”Éìzäºyj¬«	;	(³óû(	6Š÷YövEA³Ûá6\!cQØb3"˜Ê/,‘´âËok’g*F*½¯n&#}+vø6Wì%KFK9º¾º½Q§§.×%\ÕL_€•,žS
7 êûã‰8ÎØ}Áyú äzìÛt¢\Wf„qt
²½èÁÓ[Çp»cù­F>V0©¥¨ì¬ÝÇájÈBiD[QéæŠ ÇK½•EV4ÛV˜:C0[9²ó†’æ•dšUe`r¢NL9qŸ™“¹þÞâ#ü†N=™W¿f3×;
tڏpâG;büªø΢›R©Â)×’4Т2QæNæërb6+µmnð¥’I=\ZÔûÜèÈKLFö[*ôáBêeÐ8!¼ß¦1–iÖ° bQÂð@ËÆj13¶öG3fùo—Â-sØ9T/!ÔIOácN¾x‹Qƒà÷b#å‘kà™:ͤwor*Jš1‡ÊUs@Žž~\Ž¬9ɪ„ˆ½z‚“ŸyK]w¥iYýa_aÇ|=Ý«t`æÙüâýÏׯ‰œz'¦ûÀÖõº˜¿™P_Ià,ŽÍ’ís°Ø§{+H"ÍïP…†Î¿©©UÒ—G ž¾ÿ\÷1¡?.¨S=
tLÓåx¬‰9M¸šGs¶$ÑÉsÆË‘áYƒ'RÉñoîj«ÁQ·q 6Eô$ußB¡;˜ ü„iJ,:xgì×Tø«ä¦Oåér!P%m©šÚ¼sÛüwæÛ’HÍЏ¥±B"ëhº]ÀM.—f†ecFdÈ›¾Ñ7–éCëÍ_[ÎÚfQ`ÅÖW¾}¡–¼;9S㞍cb SÏÅýæÂfå;…ŸÍͶp®J³B½þà*(æÇ}©‰i‹Õöò#™²KümNtá±JZ‡YÉÙqÚgšîÌð+Õs‹ø\³ó]߃_ÓÒ<o‡KŸ=¹_E<åÊՁ¹»6 “þO™†ù0M蔢oEçìK`¹eWO‹£·E)ytóŠ!ÖNþÊèi~zT=ò=Ñ0Jµóë¢c öI ER¡ >ü¤™aäWÙÍ…‹YáX§;èá‚[n¶¤={e "yŒƒåg&ÖIv‰¶¾UxŪ‹ªz_ä“jq}*¡>•>zŒ¾µ쉙ýÝ3‰	;Ò.ߊvsLS?'¿Z#ª•‘滐óa]ɼeÁ€5Ÿ¬Ù·¾4‚º©Î¼Ou£´TCPOf|]æ‰{ù?Sg^<ŠEM
l/pdåXÙ•5³J5 #Õvßä¢ü‘‹>EöªãõµÕ•Ún.‡öùñ¿gÄ7jlÛÍâUᯊ»‘Ï ¡…?èê¹{ﲜùï¹QMwX¾ù„E”ûZ&s-õJ"s\M>zƽÒF&?Ê“gå2hÔyF‚b­
Ý%5n³hSóìZ}LG¾s²Ò¡€¬LžÄ–Æ&/éÄux¾@

'2^óã;n—M>L$n[ÓgˆîA˜9ënD
‚™J‚`ƒõ¡Ä,Kÿ£½çfâÁžbÇy㟚ךÑ`³wÞ]í7!–Kˬé’òÓÍ/vÇj„ïÚ} ÍM=P1É3ù^ãkí©Æ}/®žè´IõüºËY„7繸tðàOD™V¤Ö׶/Ôé^°7a$
¾9Z£$Šz‡Ì2Ý·"ËîQ¶ÈoZž¬ÆT}Cµª.2Ù`òÐ_$¹Ý¾j7_@ŠXðê‡u›n1Ú²Ð
ÒBÁ¡&ž'©ûÊsR?Ò}
f?
³.˜«*¦ê*[×\]#^Z*}PJôÄãíß3k »"”û^Jô^™{ñˆ*ƒÿp4££s`=™Š½`Ó‘ƒÌÃhÃðòÑ×R—ò°O÷79œ~yyl^ãÐÕT¸]Ïý;à®æçñ‚C›ªMü±J{’Ú·¢S×<ØÓ·Ûmzæ\0+ãË—sªR¸6¸#Wôþ{Ù½ÒÇKùò…ÝAµL±-®cp	¾ÚÐÑxµ)з™ê	ýÍ·‹á-Ùª’·ºÉÅ>ÚÝjVÇÎf’!æüÛ?°Ã׳Ī@oS=	‰ßx#í…{*í}’{¦d|ñùÂ0Ïë× Ð–ä;r™¯öø9•k*YwöÔ•ÇT|=v¢«@]Eù÷•°îlÀœ%­éÞ°*‚‰Ã}Öæ1…˜¦–OèuYËËžíÙï h-wFüâ?Vþ%‹Ôd²…÷µ˜eC 	U9ëß&*8×Ö½Ësuã‹Cüõí¹Jk€
i6Û×êô§ÝÅYä+½‰[TçÜ”³õÒ#5ù\`RµíW\R at 04(]é]&ä9ìÒýS¿·ÛÄ:Ñi
Ž£ö&jRÚM§„¥<47ß2kj)fÔEŽmʐ{êSyùœØ¡t•¯[±…'Î_ì³,NNfZRœ
*My}:HYð¥>ÑÁ ÝYs·}
U~†’DÇ¡)u¹Öhö®ë3HÛ»IÕS¶Ö^=ûö­¬Êá.11¨
-VÀÎÉû)RKù}mµÀ¦P—ÆWäSy3ùŠ‡~3Ÿøº¥OmÔ(Ñ„ØÖˆìAs‹l$l3NW™Èòññë”jl=F–ÓmÏQêÖ±è6{>Ù›‹^ŠÒt at _U|.PÑf`üA8ò­w·Èš|{^©ƒìàíãçãÚÇ×el1
ßcŽ'¾/Þ£²‚˜WnW\}ãŸé´›xk»ªvJy%VäV©ÄÌ!!(X
ª×< e³˜‘s]—Ç»€=§êˆDûë§#ƒ˜Ý ºW|²©úsGŒcÇÞƒT&Rø3lmK…:£ŸK¨AËŘyâÇ—ã–ôg\ÏÛe·ÔCYiH€I¨”¦í·þRxçÝÏÎvˆ…Ï%ðe¥Ïº¼÷²J•j³AaÐu5¾z É‚¦ÖžßÒ]e˜ôyŒd´§Æàõ±ñ¥Ÿ†cï¿ÙÔTN…íª<–¨ÿìLõ™&,le‡:Ú¦\NôõÃO‘p{p]pYÀÏN³¥5?¨	3Uk˜o;äx ¹ŠpXÑÉ;Òï­St«	t}`2×=}žïd_=¥2*ݝR”}ô™Š”Îis׉6+$Låʧ_âz`žŽ:Q¡Ï]Svñ¢Ï!Úië‚ï•L»Ã© w™KÚ¬L/•[7¶=MO3mÓºdÝ/¦—qj«Šmº+ï‰uåúû||J,Ëø«C¾p°ýä—B^M–{J_	j¨4žu·5Ea”³,DÉéõ2
áVÎÃ?5Mí)9¹4þbIˆbÏ´¢é%?yó­ÓäJJ^çK“²k*
±yæØ÷;ï\¾˜\·nXç.˜5Ô žwÛùh{ýõ¶Ûô½‰Kažãtý¦Î2:Nz6<®0.ò:÷züDK›½½‚wøѸðsøO¶lw,ÌJ!¢ÊnPRßv)U°ü6,ßV?ÀË|ì1c­€3sÇlnt¨Üëâ1åÚùd!vñ·Ý>Ã:ñ™ìÔfsÈãß_«¾¨$Á™ð^óà´Á¼`Þ!ßÛ{úXc9»ü¹±i×Q7Ëo¯
¤Ü/2#5yÓmšKGÈùæâuÇÊmcåfú‚m×ÕÜY½ ¶OC<	ëš´u¹õþ‹e½ß]ïÿò»Ï|~wæP4J®ç÷OùÊ—X)uͺšœ?-MMM=­@η¦¡V Yóï_ZºþZ›4µõW.´
ÿJþ9¿?¢£ƒÉê!!1 y´†H„†¿_t0B!p)p¸SŒ=`D1ÁÀ>’áäD¢)ôX
 ûQÂi+ÌÁa´ˆÀ #@[GWÐÓ´õ8ëdJt =$2&„apEC¢? ’N‹¡Ш@ ÎQÀ S :GWˆ¦P©€_@ %:Zðä¨øååÌQÀ5ÀáåúýoS_ñŽc«/Â/œb´×ãïîjPb48kÜ·O0-:Æ'Œÿ¿ÑÕ#þÿÄC÷‹ ÓÂ}¢)”2CöY]åzB¡r¼Òˆõ£kÐ+tuÎ2!//àÍ-­ì +;+g·…=G‚D§Å†pÒúG Ž”(FBV[ÊÀRi~TŸÀh A‰‰£Ñà lt|4•ô+3-òÞ?Xœ‚iêŸÚþu}Eð_U(~jÌAm@Ðô~!p%5-@U=FðK}üµü"±úú¯ë
!‡ÿ_ˉŠ¹á'H¸[…Æ s2"¸~Ôº=¡¾
;=@¬ÁÝcœ¯<Ñ\¹Hǧ€“ÃÕŠàX‹‰	‰ŠFx jß‹æq¥4 /@QPÿ;áhîìjºÍDÁID	†»ˆAp ãÖ˜ÉJ‰q¯4¢þQ
,—ë‡-üOîFYIƒ?…J‹Âi+™ô#ûùS)óí–æv&ŒhúÊ‘Á±£ÆÙA”'c„UBôw
áèdªåÑ1ùû­Æ!ÿ•í·ÂAøGòw’ÁÇÂj›¹Éßl#ΕK¡š`•8ÙÔÔ ¬Ò5ec€ëG0”€`à‰ÅÊc e‚LãÚÖòY
JIHDÀC 
¨q¶Ê€ /cnŽ"pøŠ¼Z€ÅXR"(t?.ˆÜºÔ8Ì ×W€£ÌÀpxéá\lÿÐÂYá莡pXп¸@cWs
¨Ej1 ש_YÔÌ€
 5;îçE
2%V#‚STø§‘N{øÅàe]Ý?—WÎ48|5PµÀ*‚tŽ_ð9eöS´+›ç_èÿ¢)0„ûÍXÙtœÔpéÜ4 AßsD‹àæc%yÜR£)+b~!TîÎý_à”!1€bÕçüºƒÜœö¿îŸpûGØ~aø/Aû{Ìþß û_ûoûïñ"ÿ3^„ÿ/Â?áEø¼ÿ„ù;^„ÿ^„¿Å‹ðÿ…áßãEø/ñ"ü_ðâúÃé”>Ñ~œ–ïL	SRFpÃrNðõ;œØÕr€3ü矾˜­t2ƪ ·cœ.ÎñŽÓÙ9!œƒ:„ŒAüpoÕŸWV­¯¤tÕ/ )	Xñ^oe=ðo篟ØôpyÀŒÓá8£ÂŠIŽ×nV¹}|5ÌNl¢©‹³½™£¹©³¹“¹£«¹#
§d€6vÚÙÿØ/þªàl {»m?<ü×fô}…ü³êïè ~Ú+£wk¬ôø•í°š¬=ÉÙÊÞΉ[õ?ꆓ„ï0üÜO¨Q¢¸ qebhŒ€à•¹qe¨@|ƒN‰aÐ#~¬C‹\Ååg¯h‘‘¿zµº" Œï÷Q˜ȝÖWqôÅpŒþÈwC„…P©’ß+šKù³Ž~5‚YIÍÏaÉs±£|/* ؏Ã-4:ÅŸFãœÕß'ƒS€çÍY‰àª‹æ¤jepƒs¾•áÈÙŒÄð9…²:8qUPiÑ2ç‹âAý©t~(Æ ˜55Ú¿,êÿ%غ_$÷Èq6w´ý3|®K+‘Ú[þ8Š~XåæÆü·ø}?ÿ‚/:gÐó#ÿ1Ç•Õÿ?È 5¢éïqû‹©îOO¿ozn³à–÷“³À¥qÿ ŠÏX¸ß¹Wƒ}8¿cÑ?D¹¿µH ûc~hœ©Ÿ;Î~¿ÝøYÈ'ê»ÂÀŸùç`¡¨Ååð‹¦ ¬†SZßÝRæv¢?•pAX9r49ë«®ÁáÆÆ«‘(¯hà'?O‚Áîû	­ùýøžŒmßÃ^1NùÙÌjnþêԏsÐ`…ŸËñ}%¡j
ýœàï,œ@þn#)†¯ö³é¿1¡ùã0ü9–ŸŠfõÄû›óGçükYÿ)ù#pÎõ‹¥…º_ e•B¥P"ï\«ùø£#þ(3ý?šêÊÇ*,\ÿ	ÿ¹,ÿÕ'@Íû.ªý³å£
ãíDáÜak‰«9åÆ”ô#Á«™Oú–¤  iÕÛdâ'£”h¿ Ä
?Îê_ž7ù­>oò×ýÇçM~þš›ÈÊÊ•¶Nàø¼iÓ/Ï›"ýÂA y’©­š–º&Ì=èßNÀ9tŸhJ$…ιgŽ¦­0|¿×‰ 2ȔՋH¿èè8¬Æe at pnîiŒˆà'Mß¹Â}"hTZPHÄŠ²?Ùþ²WÿžKXu•ÁØÉQ¾zúÑ+J8÷Î+]"0„Ι9¿·N;áìÜçê_µý[敨!dn`ÿâ÷0ûáÓŒ¸Ò¨œzŽÿø?:÷†ŸC¢ì¤0b8$NWäú͈¦Ð¹í-†²3æ?õxÅ$%"Ö'ҏîý³må™
çfû‡g~Yy(Â[)gŽâXZØ/ñþ›Ôƒþ¨ÛÿäõŸòýõåÿㇳ£)§?8¢Ñhî¶ú!ôšàˆj 

--- NEW FILE openssh-5.4p1-1.fc14.src.rpm ---
í«îÛ   openssh-5.4p1-1.fc14                                                                Ž­è          T   >      D     
            è      ,     ì      0     ï      @   066c7d9cc1a8616e9707671bc255b067ffc4f03f     ¾|iË—ÆÐÕCP´øÐY jH   >   ÿÿÿ°       Ž­è       -  °$   ?     °      d            è           é      
     ê           ì           í      V     î     Ð     ï     Ô     ñ     ì     ö     ð     ø     ô     ú     
     û     ‡     ü     x     ý          þ     £          ¨           (      	     h      
     ¨           (           H      
     h           è           ˆ           H           È                     4     (     i     8     p    9     à    :     Fi    F     ªÅ     G     ªè      H     «h      I     «è      \     ¬      ]     ¬ˆ      ^     °     d     °     e     °	     f     °     “     °   C openssh 5.4p1 1.fc14 An open source implementation of SSH protocol versions 1 and 2 SSH (Secure SHell) is a program for logging into and executing
commands on a remote machine. SSH is intended to replace rlogin and
rsh, and to provide secure encrypted communications between two
untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.

OpenSSH is OpenBSD's version of the last free version of SSH, bringing
it up to date in terms of security and features.

This package includes the core files necessary for both the OpenSSH
client and server. To make this package useful, you should also
install openssh-clients, openssh-server, or both.    K΁localhost.localdomain    X=BSD Applications/Internet pam_ssh_agent-rmheaders pam_ssh_agent_auth-0.9.2.tar.bz2 sshd.init sshd.pam openssh-nukeacss.sh openssh-5.4p1-noacss.tar.bz2 openssh-5.3p1-dso.patch openssh-5.3p1-randclean.patch openssh-5.4p1-gsskex.patch openssh-5.4p1-pka.patch openssh-5.2p1-edns.patch openssh-5.3p1-selabel.patch openssh-5.4p1-fips.patch openssh-5.1p1-scp-manpage.patch openssh-5.4p1-nss-keys.patch openssh-4.3p2-gssapi-canohost.patch openssh-5.2p1-allow-ip-opts.patch openssh-4.3p2-no-v6only.patch openssh-4.3p2-askpass-grab-info.patch openssh-5.1p1-askpass-progress.patch openssh-4.0p1-exit-deadlock.patch openssh-5.1p1-log-in-chroot.patch openssh-4.3p1-fromto-remote.patch openssh-5.4p1-pam_selinux.patch openssh-5.3p1-audit.patch openssh-5.4p1-mls.patch openssh-5.4p1-selinux.patch pam_ssh_agent_auth-0.9-build.patch openssh-5.2p1-vendor.patch openssh-5.3p1-skip-initial.patch openssh-5.4p1-redhat.patch h
 ttp://www.openssh.com/portable.html linux i686   Ø  °  ³  ß  ¾  
f  ê  Ø  Ž  	Õ  ˆ  •  -  	  á  N  ]
 hÖ  2( 
Ô  £x  õ  /ó    1Á    ã    ®  ¼ žd  ø  ?´´´´´´´´´´´´´´´´´´´´´´´´´ý´´´´ý´                                                                Bçs,D?\¢D»šJî«DØ|iH‡k\IÖ
H‡k\Jm=JqYÌI¶mwK/TKy;óKXºJÅýSJÅýSK‹ò?K‹ü K‹Î†K‹ËK‹Û’K‹ÏK‹õÏK‹ÌAK‹ÍÌCô%K‹ÿjJÜJÜK]¬K&J°îc318ccf12ed6fbcab9d4654a2c409c27e55db8b862171edc1a249da08d378482 34e73f7e387bae067f8a51cc3a50c5cb2b898c810b32a8fe80721b7b7fc69298 f5a57feca79c97ffdbf98d7f1f97e40c0f48fc19b8ca55e6a900d6ce509fd3e7 29d27cecaac4c1a60e34aee3170a6ad45d1ad02435e08d4581dffba943ac7f4c 33c496b386c22e100b9d45d3ffdcb4a7d88e1b4bb143d20e083f3c53aef5e895 c0e8cce3a5d7955d4be905efb8680593d60f961c1a5acb0a45d2cea7b15c99b2 74ae918188166d81bd347bdf24145b0b2c77578b6cb7895d562bf93b651beda2 3ee3434d53169bf594fd69e8907ea229d73dcbaadc026bd720b32352b4189f28 5ce41a8264987beabb21f4fc24127ef9efb430f115aceaa2441daa502db68c2d ac4ce494759385a692a2b040d02578da7fddcd7ade60cf75268ba69bac5a992d 4d2ffc5a4ec9dc0ef8df198624fdd82872c1fa820f9eee0433a74b6d0e7f79ac 442e685bdc1a5b7e322432209c2f430b73d09d59f98e8941df1cca125fc33a5f 62a1e924fcfb0ef3e9750cb9d8452184b12ffb01b491451fc55fc37d22440581 dcdc08fff0c0d37b423ef90bc68d19f572e086e3161a2
 bf880da3fdaeea43367 46c07b0472968cb90cbb46e248ef143ed971beae2eeb28b0b73a3435154f52f9 462d90610cb1b497b7a1b2925a653a1f4e36f95b440e12dc5ebe67ce6c693477 8904c83b8668910cf7360285615e5e7576e91f53b03c21fd53c2490f1a9b47a5 04cfa6d2f1edd29f1ff79b55d8f9932dd8fe31c45ce9f7ef4da1438c99f11210 f107f9cc9edbeaa9454e6dc533512c0187de779b2f66bb06e344666d5cc35307 65cc8bd09faedc1047a4efcf33b79c151943ce49cf2a83e06ba9edb30420552c 4877db8b1f7600221896bd7e9760b5aed47a1b7d8f13c20decdf9013f9cd119e 7c62602d03fb5eec839dd6b11d19ae47a70b89d9577b8cb95744c388e8b0b1fa 0a5d9ef1e034cc7d9d772a65db7e344636606a1584a134eedbf8ef43356e801c cda10494caef7ca563bc717034a1f78a04a38bcf5830a070c3f85efe3d074046 6f537b00248891e216050e0908e2b527c999fb3a98ad21859f65c371a9d09d5f 1501e4835035cff795d0ea5e6265884259f616a6e5a228bfa324fda6aa10d4d0 352a8dfd8e1b18aad213302d8345220085cf15d9c17a5b70b86f20dbe6b0f9ac db27d60a24fe8c394658a22b6a7e5728440ca2d6d34250f9c1ab0b3fe78ba4d4 44bc68ac4beee7eb476552ff7668e538db4e51aa3c1da49e29704ae4af4
 97888 76c80b6482ea5d03e1f33514f30ac77cd56e2fc8cb233a470562686df7426f4b c9039b4ae1a8d9f3ad306d45f62fc9f5cb35c6cd071d7ca991956340f4fbdff8 64468969e6f63ef3665c2a7d3f6df240737106dc15afd80b115aadb5369bc0f0                                                                                                                                                                 jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch games games games games games games games games games games games games games games games games games games games games games games games games games games games games games games games games ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ                                                                               
  
gtk2-devel libX11-devel autoconf automake perl zlib-devel audit-libs-devel util-linux groff man pam-devel tcp_wrappers-devel fipscheck-devel openssl-devel krb5-devel libedit-devel ncurses-devel libselinux-devel audit-libs xauth rpmlib(FileDigests) rpmlib(CompressedFileNames)              0.9.8j    1.27.7 1.0.8  4.6.0-1 3.0.4-1 4.8.0  Ky7 at KbÍÀK]‡ÀK]‡ÀKXAÀKVð@KUžÀKG@KC)ÀK/c at KùÀK¿@KÊÀK„ÀK„ÀJîÉÀJéƒÀJæàÀJÜTÀJØ`@JÅë@JÁöÀJ»_ at J°Ó@Jª;ÀJ¤õÀJÀJÀJ›»@J—ÆÀJ•#ÀJŽŒ@Jq‹@JjóÀJi¢@J`gÀJMòÀJIþ@JH¬ÀJF	ÀJ@ÃÀJ2C at J
Y at Iù’ÀIìcÀIÕú@IºJÀIµÀI¦„@I”@I‚ëÀIo%@IA ÀHø~@H‘©@H‡@H4ÀH1kÀGúÀGÏÜÀGÇóÀG±Š@G|Î@GUA at GUA@GBÌ@Fîl at FßëÀF»ÀFyÀEÿÌÀEþ{@Eä@EÝ…ÀE¬¾@EŠw at EnÇÀEl$ÀETiÀEIÝÀE ÿ@DìC at DØ|ÀD¿p at D»{ÀD´ä@D?ŽÀDÞ@Cþõ@Cû ÀCðtÀCì€@Cç:@Cà¢ÀC§ò@C™qÀCƒ@C}Â@C|pÀCqäÀCbÀCTãÀCNL at CFc@C„ÀCÕ@Bçw at B@B¨/@B¤:ÀBˆ‹@BQ, at BB«ÀB8ÀB#ÀBÍ@B	û@B©ÀBcÀAÙ3ÀA«@Aa;@ANÆ@AFÝ@AE‹ÀA7@A7@A7@A4h at A+-ÀAÛ@@ÎäÀ@ÎäÀ@ÆûÀ@ÄXÀ@¿À@¼oÀ@¼oÀ@Vì@@EÈÀ@C%À@=ßÀ@=ßÀ@9ë@@,¼@@@@@@/@?ÍÐ@?º	À?¯}À?ª7À?™@?Š“À?Š“À?jïÀ?jïÀ?jïÀ?hLÀ?hLÀ?hLÀ?hLÀ?fû@?fû@?fû@?fû@?fû@?XzÀ?XzÀ?KKÀ?8ÖÀ?8ÖÀ?%@?'@>í±@>í±@>ß0À>Ýß@>~ó@>LÚ@>G”@>.‡À>Á@=Ðí@=¬@=‚À=€À=nÀ=ZF@=þ@=[@=	À=@=  @<÷eÀ<óq@<äðÀ<äðÀ<©@<™Ë@<‡V@<‡V@<‡V@<„³@<sÀ<jU@<N¥À<-°@<ºÀ;ôÿÀ;ñ@;êsÀ;é"@;³À; ŸÀ;—e@;€ûÀ;{µÀ;r{@;q)À;n†À;^´À;L?À;7'À;-í@;lÀ;I@;÷À:ñH@:ïöÀ:݁À:ÐRÀ:ÈiÀ:»:À:¹é@:·F@: ÜÀ:Ÿ‹@:šE@:”ÿ@:’\@:‘
À:@:‰!À:8À:mr@:h,@:fÚÀ:@Ÿ@:,ØÀ:$ïÀ:#ž@:"LÀ: û@:cÀ:@:À:îÀ9ýbÀ9ãÀ9Üm at 9ØxÀ9¶1À9£¼À9rõ@9l]À9dtÀ9c#@9_.À9]Ý@9[:@9X—@9@Ü@98ó@8Ï{@8f@8/õÀ8-RÀ8(À8&»@8ÝÀ8Œ@8:À8é@Jan F. Chadima <jchadima at redhat.com> - 5.3p1-22 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-21 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-20 Tomas Mraz <tmraz at redhat.com> - 5.3p1-19 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-18 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-17 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-16 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-15 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-14 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-13 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-12 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-11 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-10 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-9 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-8 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-7 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-6 Jan F. Chadima <
 jchadima at redhat.com> - 5.3p1-5 Tomas Mraz <tmraz at redhat.com> - 5.3p1-4 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-3 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-2 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-29 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-28 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-26 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-25 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-24 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-23 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-22 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-21 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-20 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-19 Tomas Mraz <tmraz at redhat.com> - 5.2p1-18 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-17 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 5.2p1-16 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-15 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-14 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-13 Jan F. Chadima <jchadima at redhat.com> - 
 5.2p1-12 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-11 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-10 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-9 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-8 Tomas Mraz <tmraz at redhat.com> - 5.2p1-6 Tomas Mraz <tmraz at redhat.com> - 5.2p1-5 Tomas Mraz <tmraz at redhat.com> - 5.2p1-4 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-3 Tomas Mraz <tmraz at redhat.com> - 5.2p1-2 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-1 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 5.1p1-8 Tomas Mraz <tmraz at redhat.com> - 5.1p1-7 Tomas Mraz <tmraz at redhat.com> - 5.1p1-6 Tomas Mraz <tmraz at redhat.com> - 5.1p1-5 Tomas Mraz <tmraz at redhat.com> - 5.1p1-4 Tomas Mraz <tmraz at redhat.com> - 5.1p1-3 Tomas Mraz <tmraz at redhat.com> - 5.1p1-2 Tomas Mraz <tmraz at redhat.com> - 5.1p1-1 Tomas Mraz <tmraz at redhat.com> - 5.0p1-3 Tomas Mraz <tmraz at redhat.com> - 5.0p1-2 Tomas Mraz <tmraz at redhat.com> - 5.0p1-1 Tomas Mraz <tmraz at redhat.com> - 4.7p1-10 Tomas Mraz <tmraz at redhat
 .com> - 4.7p1-9 Dennis Gilmore <dennis at ausil.us> - 4.7p1-8 Tomas Mraz <tmraz at redhat.com> - 4.7p1-7 Tomas Mraz <tmraz at redhat.com> - 4.7p1-6 Release Engineering <rel-eng at fedoraproject dot org> - 4.7p1-5 Tomas Mraz <tmraz at redhat.com> - 4.7p1-4 Tomas Mraz <tmraz at redhat.com> - 4.7p1-2 Tomas Mraz <tmraz at redhat.com> - 4.7p1-1 Tomas Mraz <tmraz at redhat.com> - 4.5p1-8 Tomas Mraz <tmraz at redhat.com> - 4.5p1-7 Tomas Mraz <tmraz at redhat.com> - 4.5p1-6 Tomas Mraz <tmraz at redhat.com> - 4.5p1-5 Tomas Mraz <tmraz at redhat.com> - 4.5p1-4 Tomas Mraz <tmraz at redhat.com> - 4.5p1-3 Tomas Mraz <tmraz at redhat.com> - 4.5p1-2 Tomas Mraz <tmraz at redhat.com> - 4.5p1-1 Tomas Mraz <tmraz at redhat.com> - 4.3p2-14 Tomas Mraz <tmraz at redhat.com> - 4.3p2-13 Tomas Mraz <tmraz at redhat.com> - 4.3p2-12 Tomas Mraz <tmraz at redhat.com> - 4.3p2-11 Tomas Mraz <tmraz at redhat.com> - 4.3p2-10 Tomas Mraz <tmraz at redhat.com> - 4.3p2-9 Tomas Mraz <tmraz at redhat.com> - 4.3p2-8 Tomas Mraz <tmraz at redhat.com> - 4.3p2-7 Tomas Mraz <tmraz at re
 dhat.com> - 4.3p2-6 Jesse Keating <jkeating at redhat.com> - 4.3p2-5.1 Tomas Mraz <tmraz at redhat.com> - 4.3p2-5 Tomas Mraz <tmraz at redhat.com> - 4.3p2-4 Tomas Mraz <tmraz at redhat.com> - 4.3p2-3 Tomas Mraz <tmraz at redhat.com> - 4.3p2-2 Tomas Mraz <tmraz at redhat.com> - 4.3p2-1 Jesse Keating <jkeating at redhat.com> - 4.3p1-2.1 Tomas Mraz <tmraz at redhat.com> - 4.3p1-2 Tomas Mraz <tmraz at redhat.com> - 4.3p1-1 Tomas Mraz <tmraz at redhat.com> - 4.2p1-10 Jesse Keating <jkeating at redhat.com> Tomas Mraz <tmraz at redhat.com> - 4.2p1-9 Nalin Dahyabhai <nalin at redhat.com> - 4.2p1-8 Warren Togami <wtogami at redhat.com> - 4.2p1-7 Jeremy Katz <katzj at redhat.com> - 4.2p1-6 Tomas Mraz <tmraz at redhat.com> 4.2p1-5 Dan Walsh <dwalsh at redhat.com> 4.2p1-4 Tomas Mraz <tmraz at redhat.com> 4.2p1-3 Tomas Mraz <tmraz at redhat.com> 4.2p1-2 Tomas Mraz <tmraz at redhat.com> 4.2p1-1 Tomas Mraz <tmraz at redhat.com> 4.1p1-5 Tomas Mraz <tmraz at redhat.com> 4.1p1-4 Tomas Mraz <tmraz at redhat.com> 4.1p1-3 Tomas Mraz <tmraz at redhat.com> 4.1p1-2 Tom
 as Mraz <tmraz at redhat.com> 4.1p1-1 Tomas Mraz <tmraz at redhat.com> 4.0p1-3 Tomas Mraz <tmraz at redhat.com> 4.0p1-2 Tomas Mraz <tmraz at redhat.com> 4.0p1-1 Elliot Lee <sopwith at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.9p1-12 Tomas Mraz <tmraz at redhat.com> 3.9p1-11 Tomas Mraz <tmraz at redhat.com> Tomas Mraz <tmraz at redhat.com> 3.9p1-10 Tomas Mraz <tmraz at redhat.com> Bill Nottingham <notting at redhat.com> 3.9p1-9 Thomas Woerner <twoerner at redhat.com> 3.9p1-8.1 Nalin Dahyabhai <nalin at redhat.com> 3.9p1-8 Bill Nottingham <notting at redhat.com> 3.9p1-7 Nalin Dahyabhai <nalin at redhat.com> 3.9p1-6 Nalin Dahyabhai <nalin at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.9p1-5 Daniel Walsh <dwalsh at redhat.com> 3.9p1-4 Daniel Walsh <dwalsh at redhat.com> 3.9p1-3 Daniel Walsh <dwalsh at redhat.com> 3.9p1-2 Daniel Walsh <dwalsh at redhat.com> 3.9p1-1 Alan Cox <alan at redhat.com> 3.8.1p1-5 Daniel Walsh <dwalsh at redhat.com> 3.8.1p1-4 Elliot Lee <sopwith at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.8.1p1-2 Nalin Da
 hyabhai <nalin at redhat.com> 3.8.1p1-1 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-36 Nalin Dahyabhai <nalin at redhat.com> 3.8.1p1-0 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-35 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-34 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-33 Thomas Woerner <twoerner at redhat.com> 3.6.1p2-32 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-31 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-30 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-29 Elliot Lee <sopwith at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-27 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-26 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-25 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-24 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> David Woodhouse <dwmw2 at redhat.com> 3.6.1p2-23 Nalin Dahyabhai <nalin at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-22 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-21.sel Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-21 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-20.sel Nalin Da
 hyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-19 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-18 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-17 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-16.sel Bill Nottingham <notting at redhat.com> 3.6.1p2-15 Bill Nottingham <notting at redhat.com> 3.6.1p2-14 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-13.sel Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-12 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-11 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-10 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-9.sel Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-8 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-7 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-6 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-5 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-4 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-3 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-2 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-1 Elliot Lee <sopwith at redhat.com> Florian La Roche <Florian.LaRoche at redhat.de> Nalin Dahyabhai <n
 alin at redhat.com> 3.5p1-6 Nalin Dahyabhai <nalin at redhat.com> 3.5p1-5 Tim Powers <timp at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.5p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.5p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.5p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.4p1-3 Than Ngo <than at redhat.com> 3.4p1-2.1 Curtis Zinzilieta <curtisz at redhat.com> 3.4p1-2gss Nalin Dahyabhai <nalin at redhat.com> 3.4p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.4p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.3p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.3p1-1 Tim Powers <timp at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.2.3p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.2.3p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.2.3p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.2.2p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-4 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-2gss Nalin Dahyabhai <nalin at redhat.com> 3.1p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-1 Nalin Dahyabhai <nalin at redhat.com>
  3.1p1-0 Nalin Dahyabhai <nalin at redhat.com> SNAP-20020305 Nalin Dahyabhai <nalin at redhat.com> SNAP-20020220 Nalin Dahyabhai <nalin at redhat.com> 3.0.2p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.0.2p1-2 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.0.2p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.0.1p1-1 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.0p1-1 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 2.9p2-9 Bernhard Rosenkraenzer <bero at redhat.com> 2.9p2-8 Nalin Dahyabhai <nalin at redhat.com> 2.9p2-7 Nalin Dahyabhai <nalin at redhat.com> 2.9p2-6 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at red
 hat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Preston Brown <pbrown at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Trond Eivind Glomsrxd <teg at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.co
 m> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Damien Miller <djm at ibs.com.au> Damien Miller <djm at mindrot.org> Damien Miller <djm at mindrot.org> Damien Miller <djm at mindrot.org> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> - ImplicitDSOLinking (#564824) - Allow to u
 se hardware crypto if awailable (#559555) - optimized FD_CLOEXEC on accept socket (#541809) - updated pam_ssh_agent_auth to new version from upstream (just
  a licence change) - optimized RAND_cleanup patch (#557166) - add RAND_cleanup at the exit of each program using RAND (#557166) - set FD_CLOEXEC on accepted socket (#541809) - replaced define by global in macros - Update the pka patch - Update the audit patch - Add possibility to autocreate only RSA key into initscript (#533339) - Prepare NSS key patch for future SEC_ERROR_LOCKED_PASSWORD (#537411) - Update NSS key patch (#537411, #356451) - Add gssapi key exchange patch (#455351) - Add public key agent patch (#455350) - Repair canohost patch to allow gssapi to work when host is acessed via pipe proxy (#531849) - Modify the init script to prevent it to hang during generating the keys (#515145) - Add README.nss - Add pam_ssh_agent_auth module to a subpackage. - Reenable audit. - Upgrade to new wersion 5.3p1 - Resolve locking in ssh-add (#491312) - Repair initscript to be acord to guidelines (#521860)
- Add bugzilla# to application of edns and xmodifiers patch - Changed pam stack to password-auth - Dropped homechroot patch - Add check for nosuid, nodev in homechroot - add correct patch for ip-opts - replace ip-opts patch by an upstream candidate version - rearange selinux patch to be acceptable for upstream
- replace seftp patch by an upstream version - merged xmodifiers to redhat patch
- merged gssapi-role to selinux patch
- merged cve-2007_3102 to audit patch
- sesftp patch only with WITH_SELINUX flag
- rearange sesftp patch according to upstream request - minor change in sesftp patch - rebuilt with new openssl - Added dnssec support. (#205842) - Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild - only INTERNAL_SFTP can be home-chrooted
- save _u and _r parts of context changing to sftpd_t - changed internal-sftp context to sftpd_t - changed home length path patch to upstream version - create '~/.ssh/known_hosts' within proper context - length of home path in ssh now limited by PATH_MAX
- correct timezone with daylight processing - final version chroot %h (sftp only) - repair broken ls in chroot %h - add XMODIFIERS to exported environment (#495690) - allow only protocol 2 in the FIPS mode - do integrity verification only on binaries which are part
  of the OpenSSH FIPS modules - log if FIPS mode is initialized
- make aes-ctr cipher modes work in the FIPS mode - fix logging after chroot
- enable non root users to use chroot %h in internal-sftp - add AES-CTR ciphers to the FIPS mode proposal - upgrade to new upstream release - Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild - drop obsolete triggers
- add testing FIPS mode support
- LSBize the initscript (#247014) - enable use of ssl engines (#481100) - remove obsolete --with-rsh (#478298)
- add pam_sepermit to allow blocking confined users in permissive mode
  (#471746)
- move system-auth after pam_selinux in the session stack - set FD_CLOEXEC on channel sockets (#475866)
- adjust summary
- adjust nss-keys patch so it is applicable without selinux patches (#470859) - fix compatibility with some servers (#466818) - fixed zero length banner problem (#457326) - upgrade to new upstream release
- fixed a problem with public key authentication and explicitely
  specified SELinux role - pass the connection socket to ssh-keysign (#447680) - add LANGUAGE to accepted/sent environment variables (#443231)
- use pam_selinux to obtain the user context instead of doing it itself
- unbreak server keep alive settings (patch from upstream)
- small addition to scp manpage - upgrade to new upstream (#441066)
- prevent initscript from killing itself on halt with upstart (#438449)
- initscript status should show that the daemon is running
  only when the main daemon is still alive (#430882) - fix race on control master and cleanup stale control socket (#436311)
  patches by David Woodhouse - set FD_CLOEXEC on client socket
- apply real fix for window size problem (#286181) from upstream
- apply fix for the spurious failed bind from upstream
- apply open handle leak in sftp fix from upstream - we build for sparcv9 now  and it needs -fPIE - fix gssapi auth with explicit selinux role requested (#427303) - patch
  by Nalin Dahyabhai - explicitly source krb5-devel profile script - Rebuild for openssl bump - do not copy /etc/localtime into the chroot as it is not
  necessary anymore (#193184)
- call setkeycreatecon when selinux context is established
- test for NULL privk when freeing key (#391871) - patch by
  Pierre Ossman - revert default window size adjustments (#286181) - upgrade to latest upstream
- use libedit in sftp (#203009)
- fixed audit log injection problem (CVE-2007-3102) - fix sftp client problems on write error (#247802)
- allow disabling autocreation of server keys (#235466) - experimental NSS keys support
- correctly setup context when empty level requested (#234951) - mls level check must be done with default role same as requested - make profile.d/gnome-ssh-askpass.* regular files (#226218) - reject connection if requested mls range is not obtained (#229278) - improve Buildroot
- remove duplicate /etc/ssh from files - support mls on labeled networks (#220487)
- support mls level selection on unlabeled networks
- allow / in usernames in scp (only beginning /, ./, and ../ is special) - update to 4.5p1 (#212606) - fix gssapi with DNS loadbalanced clusters (#216857) - improved pam_session patch so it doesn't regress, the patch is necessary
  for the pam_session_close to be called correctly as uid 0 - CVE-2006-5794 - properly detect failed key verify in monitor (#214641) - merge sshd initscript patches
- kill all ssh sessions when stop is called in halt or reboot runlevel
- remove -TERM option from killproc so we don't race on sshd restart - improve gssapi-no-spnego patch (#208102)
- CVE-2006-4924 - prevent DoS on deattack detector (#207957)
- CVE-2006-5051 - don't call cleanups from signal handler (#208459) - don't report duplicate syslog messages, use correct local time (#189158)
- don't allow spnego as gssapi mechanism (from upstream)
- fixed memleaks found by Coverity (from upstream)
- allow ip options except source routing (#202856) (patch by HP) - drop the pam-session patch from the previous build (#201341)
- don't set IPV6_V6ONLY sock opt when listening on wildcard addr (#201594) - dropped old ssh obsoletes
- call the pam_session_open/close from the monitor when privsep is
  enabled so it is always called as root (patch by Darren Tucker) - improve selinux patch (by Jan Kiszka)
- upstream patch for buffer append space error (#191940)
- fixed typo in configure.ac (#198986)
- added pam_keyinit to pam configuration (#198628)
- improved error message when askpass dialog cannot grab
  keyboard input (#198332)
- buildrequires xauth instead of xorg-x11-xauth
- fixed a few rpmlint warnings - rebuild - don't request pseudoterminal allocation if stdin is not tty (#188983) - allow access if audit is not compiled in kernel (#183243) - enable the subprocess in chroot to send messages to system log
- sshd should prevent login if audit call fails - print error from scp if not remote (patch by Bjorn Augustsson #178923) - new version - bump again for double-long bug on ppc(64) - fixed another place where syslog was called in signal handler
- pass locale environment variables to server, accept them there (#179851) - new version, dropped obsolete patches - hopefully make the askpass dialog less confusing (#174765) - rebuilt - drop x11-ssh-askpass from the package
- drop old build_6x ifs from spec file
- improve gnome-ssh-askpass so it doesn't reveal number of passphrase 
  characters to person looking at the display
- less hackish fix for the __USE_GNU problem - work around missing gccmakedep by wrapping makedepend in a local script
- remove now-obsolete build dependency on "xauth" - xorg-x11-devel -> libXt-devel
- rebuild for new xauth location so X forwarding works
- buildreq audit-libs-devel
- buildreq automake for aclocal
- buildreq imake for xmkmf
-  -D_GNU_SOURCE in flags in order to get it to build
   Ugly hack to workaround openssh defining __USE_GNU which is
   not allowed and causes problems according to Ulrich Drepper
   fix this the correct way after FC5test1 - rebuild against new openssl - put back the possibility to skip SELinux patch
- add patch for user login auditing by Steve Grubb - Change selinux patch to use get_default_context_with_rolelevel in libselinux. - Update selinux patch to use getseuserbyname - use include instead of pam_stack in pam config
- use fork+exec instead of system in scp - CVE-2006-0225 (#168167)
- upstream patch for displaying authentication errors - upgrade to a new upstream version - use x11-ssh-askpass if openssh-askpass-gnome is not installed (#165207)
- install ssh-copy-id from contrib (#88707) - don't deadlock on exit with multiple X forwarded channels (#152432)
- don't use X11 port which can't be bound on all IP families (#163732) - fix small regression caused by the nologin patch (#161956)
- fix race in getpeername error checking (mindrot #1054) - use only pam_nologin for nologin testing - upgrade to a new upstream version
- call pam_loginuid as a pam session module - link libselinux only to sshd (#157678) - fixed Local/RemoteForward in ssh_config.5 manpage
- fix fatal when Local/RemoteForward is used and scp run (#153258)
- don't leak user validity when using krb5 authentication - upgrade to 4.0p1
- remove obsolete groups patch - rebuilt - rebuild so that configure can detect that krb5_init_ets is gone now - don't call syslog in signal handler
- allow password authentication when copying from remote
  to remote machine (#103364) - add spaces to messages in initscript (#138508) - enable trusted forwarding by default if X11 forwarding is 
  required by user (#137685 and duplicates)
- disable protocol 1 support by default in sshd server config (#88329)
- keep the gnome-askpass dialog above others (#69131) - change permissions on pam.d/sshd to 0644 (#64697)
- patch initscript so it doesn't kill opened sessions if
  the sshd daemon isn't running anymore (#67624) - don't use initlog - fixed PIE build for all architectures - add a --enable-vendor-patchlevel option which allows a ShowPatchLevel option
  to enable display of a vendor patch level during version exchange (#120285)
- configure with --disable-strip to build useful debuginfo subpackages - when using gtk2 for askpass, don't buildprereq gnome-libs-devel - build - disable ACSS support - Change selinux patch to use get_default_context_with_role in libselinux. - Fix patch
	* Bad debug statement.
	* Handle root/sysadm_r:kerberos - Modify Colin Walter's patch to allow specifying rule during connection - Fix TTY handling for SELinux - Update to upstream - Apply buildreq fixup patch (#125296) - Clean up patch for upstream submission. - rebuilt - Remove use of pam_selinux and patch selinux in directly. - request gssapi-with-mic by default but not delegation (flag day for anyone
  who used previous gssapi patches)
- no longer request x11 forwarding by default - Change pam file to use open and close with pam_selinux - update to 3.8.1p1
- add workaround from CVS to reintroduce passwordauth using pam - Remove CLOSEXEC on STDERR * Wed Mar 03 2004 Phil Knirsch <pknirsch at redhat.com> 3.6.1p2-33.30.1
- Built RHLE3 U2 update package. - Close file descriptors on exec - fixed pie build - Add restorecon to startup scripts - Add multiple qualified to openssh - Eliminate selinux code and use pam_selinux - rebuilt - turn off pie on ppc - fix is_selinux_enabled - Rebuild to grab shared libselinux - turn on selinux - un#ifdef out code for reporting password expiration in non-privsep
  mode (#83585) - add machinery to build with/without -fpie/-pie, default to doing so - Don't whinge about getsockopt failing (#109161) - add missing buildprereq on zlib-devel (#104558) - turn selinux off - turn selinux on - turn selinux off - turn selinux on - additional fix for apparently-never-happens double-free in buffer_free()
- extend fix for #103998 to cover SSH1 - rebuild - additional buffer manipulation cleanups from Solar Designer - turn selinux off - turn selinux on - rebuild - additional buffer manipulation fixes (CAN-2003-0695) - turn selinux on - rebuild - apply patch to store the correct buffer size in allocated buffers
  (CAN-2003-0693)
- skip the initial PAM authentication attempt with an empty password if
  empty passwords are not permitted in our configuration (#103998) - turn selinux off - turn selinux on - Add BuildPreReq gtk2-devel if gtk2 - rebuild - modify patch which clears the supplemental group list at startup to only
  complain if setgroups() fails if sshd has euid == 0
- handle krb5 installed in %{_prefix} or elsewhere by using krb5-config - Add SELinux patch - rebuild - rebuild - rebuild - update to 3.6.1p2 6 rebuilt - add patch for getsockopt() call to work on bigendian 64bit archs - move scp to the -clients subpackage, because it directly depends on ssh
  which is also in -clients (#84329) - rebuild - rebuilt - rebuild - patch PAM configuration to use relative path names for the modules, allowing
  us to not worry about which arch the modules are built for on multilib systems - update to 3.5p1, merging in filelist/perm changes from the upstream spec - merge - fix to build on multilib systems - added gssapi patches and uncommented patch here - pull patch from CVS to fix too-early free in ssh-keysign (#70009) - 3.4p1
- drop anon mmap patch - rework the close-on-exit docs
- include configuration file man pages
- make use of nologin as the privsep shell optional - update to 3.3p1
- merge in spec file changes from upstream (remove setuid from ssh, ssh-keysign)
- disable gtk2 askpass
- require pam-devel by filename rather than by package for erratum
- include patch from Solar Designer to work around anonymous mmap failures - automated rebuild - don't require autoconf any more - build gnome-ssh-askpass with gtk2 - update to 3.2.3p1
- merge in spec file changes from upstream - update to 3.2.2p1 - drop buildreq on db1-devel
- require pam-devel by package name
- require autoconf instead of autoconf253 again - pull patch from CVS to avoid printing error messages when some of the
  default keys aren't available when running ssh-add
- refresh to current revisions of Simon's patches - reintroduce Simon's gssapi patches
- add buildprereq for autoconf253, which is needed to regenerate configure
  after applying the gssapi patches
- refresh to the latest version of Markus's patch to build properly with
  older versions of OpenSSL - bump and grind (through the build system) - require sharutils for building (mindrot #137)
- require db1-devel only when building for 6.x (#55105), which probably won't
  work anyway (3.1 requires OpenSSL 0.9.6 to build), but what the heck
- require pam-devel by file (not by package name) again
- add Markus's patch to compile with OpenSSL 0.9.5a (from
  http://bugzilla.mindrot.org/show_bug.cgi?id=141) and apply it if we're
  building for 6.x - update to 3.1p1 - update to SNAP-20020305
- drop debug patch, fixed upstream - update to SNAP-20020220 for testing purposes (you've been warned, if there's
  anything to be warned about, gss patches won't apply, I don't mind) - add patches from Simon Wilkinson and Nicolas Williams for GSSAPI key
  exchange, authentication, and named key support - remove dependency on db1-devel, which has just been swallowed up whole
  by gnome-libs-devel - adjust build dependencies so that build6x actually works right (fix
  from Hugo van der Kooij) - update to 3.0.2p1 - update to 3.0.1p1 - update to current CVS (not for use in distribution) - merge some of Damien Miller <djm at mindrot.org> changes from the upstream
  3.0p1 spec file and init script - update to 3.0p1
- update to x11-ssh-askpass 1.2.4.1
- change build dependency on a file from pam-devel to the pam-devel package
- replace primes with moduli - incorporate fix from Markus Friedl's advisory for IP-based authorization bugs - Merge changes to rescue build from current sysadmin survival cd - fix scp's server's reporting of file sizes, and build with the proper
  preprocessor define to get large-file capable open(), stat(), etc.
  (sftp has been doing this correctly all along) (#51827)
- configure without --with-ipv4-default on RHL 7.x and newer (#45987,#52247)
- pull cvs patch to fix support for /etc/nologin for non-PAM logins (#47298)
- mark profile.d scriptlets as config files (#42337)
- refer to Jason Stone's mail for zsh workaround for exit-hanging quasi-bug
- change a couple of log() statements to debug() statements (#50751)
- pull cvs patch to add -t flag to sshd (#28611)
- clear fd_sets correctly (one bit per FD, not one byte per FD) (#43221) - add db1-devel as a BuildPrerequisite (noted by Hans Ecke) - pull cvs patch to fix remote port forwarding with protocol 2 - pull cvs patch to add session initialization to no-pty sessions
- pull cvs patch to not cut off challengeresponse auth needlessly
- refuse to do X11 forwarding if xauth isn't there, handy if you enable
  it by default on a system that doesn't have X installed (#49263) - don't apply patches to code we don't intend to build (spotted by Matt Galgoci) - pass OPTIONS correctly to initlog (#50151) - switch to x11-ssh-askpass 1.2.2 - rebuild in new environment - disable the gssapi patch - update to 2.9p2
- refresh to a new version of the gssapi patch - change Copyright: BSD to License: BSD
- add Markus Friedl's unverified patch for the cookie file deletion problem
  so that we can verify it
- drop patch to check if xauth is present (was folded into cookie patch)
- don't apply gssapi patches for the errata candidate
- clear supplemental groups list at startup - fix an error parsing the new default sshd_config
- add a fix from Markus Friedl (via openssh-unix-dev) for ssh-keygen not
  dealing with comments right - add in Simon Wilkinson's GSSAPI patch to give it some testing in-house,
  to be removed before the next beta cycle because it's a big departure
  from the upstream version - finish marking strings in the init script for translation
- modify init script to source /etc/sysconfig/sshd and pass $OPTIONS to sshd
  at startup (change merged from openssh.com init script, originally by
  Pekka Savola)
- refuse to do X11 forwarding if xauth isn't there, handy if you enable
  it by default on a system that doesn't have X installed - update to 2.9
- drop various patches that came from or went upstream or to or from CVS - only require initscripts 5.00 on 6.2 (reported by Peter Bieringer) - remove explicit openssl requirement, fixes builddistro issue
- make initscript stop() function wait until sshd really dead to avoid 
  races in condrestart - mention that challengereponse supports PAM, so disabling password doesn't
  limit users to pubkey and rsa auth (#34378)
- bypass the daemon() function in the init script and call initlog directly,
  because daemon() won't start a daemon it detects is already running (like
  open connections)
- require the version of openssl we had when we were built - make do_pam_setcred() smart enough to know when to establish creds and
  when to reinitialize them
- add in a couple of other fixes from Damien for inclusion in the errata - update to 2.5.2p2
- call setcred() again after initgroups, because the "creds" could actually
[...4554 lines suppressed...]
±ªPD¡%JMI Ý{Sù\KՍ…kiõØl Զ­™£Zµ(›W*–o¦Í¶Ý–j5fm°ñ×ÍãmbÉ!5JPJ
 ´Iöëm«òy	Í™gb¡ùDæñµp	x¹ãé]2$Šý5éJ#ˆ²ïˆ´ßÿ7‘.¿¬ïAj€äH³º°( ¦žzÌ%?O«¿+Ü¡­†k†œÁbÈ'FtM5…Ï—ð¶ó–k]Düÿ›øoñwß;ÚÒÖ*ªªªªªªªªªªª©m«ž3ýp° Þ*…ð¡S6i¡#¹$!RkŸ#Lmpåw;r&vl&ÛD —œê‹ãCÄ“ï-`›Í4dVëÕÇž¼ºo“\n9]†9 ™ ²% ¦M¶áG›n‡Ñåçdu ›(­ˆ‚ lÅl€K~3g,cZ"€FêKpŒÈèÂì­hðd«k£ô^Ëú¯þG€M[ˆ¨èÀ¤ˆ±p )hˆ‘­7G#ª'£Ì‘VLåõ]˜›•’Ý¿áÈTP	® ƒîT7)ÞïÛ_–6µZŽ-ÓîÝœ@˜½;	-MP·§Ÿ{O{ž‡x{1[É_/mß™’.I&<»ÐU2°h*»„å¾RðœsËLd‚•¦¾r“ !_¥¡Ø)ù@AõÀxá(d¦IDP	¤‚…BÔúä‚ýÐ ÎZ
v ŸE ¢2/»¥§ÔEÿoúÏÒ7ëWý1þ¹ÿ®žõq•ì­²×öòÛä
d#F/Î7œYØ>|°4j5 "¿äíãsòä¡Wí#?ÎÜb9Kl/ÅmÐ~3öêW¿ópôá‘…O€»=ËØ©ž'"T™Ñ~P/¢îgó(ú‰d×z¦6ïÓ‘Ã{'¬kw    ýªœ"E:]ó>Ï¡Ög£çø±«c6wÈd«ÁÆ©™¨ß/{nîtÛ„‘”€@•¶SÏ:¯·ùŸwxB¯ç¨ëõð»ª_ÏB{z5~®ˆ¦¡a'¦’xÙÙ±Í ˆH€f  É ˆJÃ@R
:*©…vçev%Ó9¯ªÌš%Óþ阛%Ó‚¸K$v_KvIÉç¯ü½A|Îà™¢·×¦ê&ÐN`% 
e©»qÌÛF$‹2)
C A-o,1‘^d~}OüQŠ
 )YïUÐvP
ã—°ØmãFΚ?©ÜžÀAxˆf2ð GaÎ>Y:›¿4<:GšAÁ ê[%Ï
æÞeÄhLõ+öÂ^IV·„´š{–¥IŸ§éuUCû¸[¦s¨Fp.o¯g')^«FÈ’ñ±/!Ñ(Uõ¿íÌíaD$ÒÞ‘~ø¡"È·~Ø-G
„Ø öÎlÕlvžý›tç}:cÿ¦Uå±ÓÑçŹÐ~Ó`‚¾
f©qs€$cÕ΀ñiн?NîrRn8ó¾Mæ|x9Æw½ˆHÊÀ¼I-¦9Ò"œ¡LÁ¹òì#øF¼£6‰#]‘<‹º\>„ÃçèðHV²¹­” XÀ*†ÜZÃD î@¯n|¸œóP¹·¨Óg¼w0®.bö“ˆ~¿¹Èá}çˆÆÒÞx:;ÐÛáØð3ˆÖñC%ŠHüõˆ¼Ï2Ã#o×Æ–ÝäÓD©#݈¼7.÷ˆ«y7¿© CŽ¡ÛgŒë%[µÎŠ¢w–K,â±|p€"Û<g=G>“Õõ,™!}¯šúU˜ä´ìÿIk…„
¢œ«Žì‘^”Ui@Ú†ö¶@ô……ö D¤²:Au#ÃôAìtÜU©
@SzpL`NùÝ`šÍõèŠ:þ';=Ca§Tó_m¯*鮲"ÀC	)"7ð=Úó’Y¼û+-ÔI$eÌ!˜HÑ<¾Þ/gí.=7긧OϦxÿ—£‚·åú¿Ç¡LÔ’“úa¢
Œ¥wÏæû|Ûµ–’2úNc,‘&[õ¯™Q4¿Q„ƒ¡’åIÕF 
ïà|ã;B!@¿í ÉIÄ7žÉ¸h$5á2ËõÀ¯§ï²uE$S¿¦5ÙWóËÊ÷Aô@6€‹Â
xÀá ” 
r}¤¼ú!b;†PÓDE¡¿"#Ë¿½õ¢¤È¡QüXÍý°ºŠ.û‘DŒy‘>&D²Z|d6DZ|+:,+ï%“Ÿ‡)x%8ª‹>ÊÕéXd$j«&ºãùèþCðbíHãçŠâÂ*Ç1#¹S>Y}é½zöëÉ  "KàïRðaÙ„yãÍS`»’ÑE.oã2Ãí;ŽsïÑõ"·9qW¯Y¦üSù ¥eò„´Ô•s&¦¸º[ØÁ¤çŸ¥¿vþÆë@üˆ î‡ÜY T‚ %“}ܹ.ÞŶØ'l¦ÚúKn ™Ã0Wöù¯(„O¡,l!	MÝ“®!zÈo—;
(:·{‹<´!¿AÑ‚1n-•¦eÃvÉžÈ%ZÞS¼u,¿å\U(Þ5)Šu‚ ®FÉŠ"Û7Ýòy;g.Ÿ”šóA
õòü/Ÿ>•övSUõ‘T†ÛV™0—L…5@§?1k£Žyóšõ#æù8ª$´ò£Úœ
ì;éa˜a†øX{0Ϥ‹8KÅÕk~þ~ð®^üw«³NØcõ}ЁFrWõSœŸ™ØBûN9üŸÓGùÿ\~oUÿáêúr/ñ8tOÖò ì	L‰'ÂÍz¯Q%ŠŒû*ÒÒ‡Úx4Å+$„	m(ìáöÄ…“²õ€eÓ™úwÕ«N³î‚6
ŒëOÙ0;32fa¿¬ÙÎþLk[†bùïŽh›_Ýò¾’\Y‡Î¯¶;}~7oƒýð͈§#Ãå¿ÙÏ-†ñÔþX-ê*ccKŒ`knf¯Ý½#“­í—nx–팴tçs§­gÖž½_=yoÚíÎýÜ|·^:¶	àmãÛ^£¹âÎÞ_ݶ9ÆŽ{énË\ÿI5ðßNõOØó¼ð’ìENä3‘ýúí2ÑÇ¡ÑøI:kÒyÈìvý(ÛÇÖÝiGöög›!Ç xûz b$˜i}>œŸÿ·pz Ov–Î~óð¾8PåÈ„ŒuZB¸Ä‰ü§Åó~ÿ¨LRXÛÏbOŸ‡çÖäíÑyÎÑ?F]Sï\Ïî… –håGyCúñh9-3—Š ©ß·Ÿ¾|‡2è{¿îï4ÛK¾kzC|£1÷Í[¾¤q‰iŒc¢ÄGïd]#Èí_z©ÔCVËýíþÎF» 6«*‹ŸÔ&ÔC”Ev“MÓ÷|9þü½þÉÝ4»®[¨¾£JR-lHÐH°wlIDGÓŽ«†ÀÇÂOÇÚ\ZXPAƒëb¥æ¼ÄÜŒRJªÆ(.ídnh1 É öýÚ'‰è»ŽÜ	§aŸíP¯P‘BÿÝIqU€ '–`N;­¸Z
›Õ RK)_i S $~¼<ॊ(`H´-2K (lÕê 4hã:}Yî@·tKVÈÏX¥VÒdÔ¹ÚÙÆ+.µ_žmI¿_&êýUöüÀÓª¬×cEB¡Hœ+.E5lÆí¿7ÍømɵͫlÛÁ¤zqáÎXrP„×®ÿ†º£Ùl©€Ðß­„I|»<ŽÇø0”D„ĸ/Fþ¾®ƒ~νØÔšÃûÓ·Ùåᝈ±cÝŒcª{Í}û¸+SÕ(‚c"sA æ )@˜Š )Ž?Ïá%{Vë€D@ÉShh{¼	ñƒz‡F…/8
´n‰£ô@@N™¶(ºÄ%>õB¯ŸÒ„oñ…­t‡ó’LðÌÃAÈÅìrÝ›÷ÆMõ÷·üƒ=r—>ÈhF5—þXäòÖ’í30¼æT¡žª§´I`%±€QÏ÷zÑai ¨ëÍLÞ4ø8˜EYi®ü7þøÊñà<˜§6­ç•M,³©oœå)J6írfÍ¥“¯fóA^’ݱþ ŠH£éšŠþ´§f.z´R­…ÄY|XÂM?$í¸2L õ_”$†œ™iæ"ͯä,”3 ˆdÞÛrÇu7ÛÈSzB;Ðz·ÇÊ.Å6IÆ5ƒÕ“ZBs"ÿÈùj÷|È_J¾GÎYXH„:fn:É¿ ŽÐ'J at jèÓP	YTIÀÔådñMÖ: Nt˜Þ{~ŠáÕG®ƒÑßÜdªf Æqö;}=ñ¹à[BB“7H¶%@™5š¡mV¢ÁE'52ÚeŽÑÓ2ð“xÝ‘ÃåÁ%º„òÿc®à‘³ºLoF~|¸Þd¨¬!Ÿæ‡¢CóñK²ÓmÒܹOÙŒ“Pq³Ñ l6¹œ“0unåˆtPWa«CNÍφyé$ŠFBª(,¸rã‘s®ïì`»
ÜIPŒ¯cÔþ.ú; @Û¾g\}‹i@ÌÕr­ZMº' Î`±ÓnzðD2VC(Ë!¶5~l5%4âoÏb9Œô¬
F2À,_Šë$4/IU¹«Ü¤–‚‘¿åC4þñ¯ƒË0MÔù/ß4X`f  2š±…ò˜Ðê–ƒ*[J)À	;pjW54Q&‰$!$›CÝµKC–WHN¢5ž;\¦ÌMè!$9TÒöߢ7ÁáhjI"²I
•ç~£®>Z¦ªš©ÉÓáËM¡ÿ`áòe^S£
[˜6Í„HIãz at xªûrų‚òk]KzêHÄâð»·&ÈÃ[fìµPÔŒ¥Ç©£©äð©È/Ù#sÑ¢R
Ã3–Ö5µ±÷7wŽŸÄݺ<±–Éšù<tqñÞ¬l¼¡ úkÒ@±•8:;¦ò’Ò¬Là$2†µômùÚŒúiÒpÔk"$ºÆ¾h;|Ò $LÙ›•ÏäîÜ=µ’)" 0Á^ã#>‚6Á½?r׬“œ§´Ô7t7sìÁdaÃbtt?8Èuâé	
a :ÿgŽ¾°ÔÐà#@sçÝ ‹/ϺiqÁšáããÛXi¾úhf¾V=³|•Sn[¦¶8–e A<´¬r-[Î笠:\ÖBɐ¾¶ÛŽ’Y´ƒlíTïsõ’žA¡ßC\ë'œH‚ƒüJçŠI_¾g,Õìu_–eÞ²L-æJµÉùh•uõ@ÞZ“ÆIí3Ù~>þÖÚ÷ÿ[¸¯vÕÀ    5Pz_dÚ÷E¶6·€
kêîú§Kåym¯oWEÈ€Eˆò+©‚Ÿ­>´¤èð}ÇÕ?Á]úvˆ
> HxI+ó„r9h°"P ‘ØaÐÅ)Jô¬HÜ#˜I|ƃ8mÜN@G,bD}\¡:-š8F†©óѯ&@ˆi˜åö[H¦>Z×{|®ºÑ
’+íÃà󎟵˜è~@Dü)º^ºX±¨±ÁšH3Ðå­ 9(Âþ™RWóãç_…Õtfk^Wdô¿<ÆEb (Ý¾fÄ2ú(ôÑûëD}Ë¢ìÅ3Ú¼`!ó AȬȴjË©$!;ÑÂ5×e0 APÍKµq@‡÷í£í‰ƒ\˜œÆõéÜf”G•¯¶	Í…Èó±ÖG®ð-¯9/²è;à`\Ž*iÓ…¼ï"%dì¬5¶[8e³á îy*Ÿj©ï¹°†Ù –½½å‹¢È"Š$Kòlr弄{‘–&96À¢!D''«Ó~‚C¢†¨laL«»«‰Ð ›]+6Ó=Éd €É]~‹óQ¦FýkM•¦D›»· š¤Íª|µ)VÁ$	”̱*«ø®êUKŸ.Oñnˆo!Û¦7_Ëš4ÆØ¿ç(¹Ï”(¿R”Šñù'“V%C\W£7ˆ?P’¯°J‡ z¾è…ˆu‰Q#"ÓX44òj³PÍbZ¥EÔэ=5çEˆˆðâö~—Qe†íEF4N[¸Ü蜐Br¾ÑZc¢uG¡L·QÑŠ÷ßý÷•–vZÜqB­åo?g©kyªÑ¡¬	h¼3ÕV:\oÆ0à"¾3Â}rEC1-ÒË).”+®íà؈6ý8É	Õ<ċ<º7„¤/”ÅYZyìH ¾ˆH‰"H¨’ €uïõNÎ\úkiâŸÂþÍýzÚÂÎv áq(&uA
 ¶+Ó‚­äzñ“iX¢Á†/þ#1Hc,²ùÃ0…1„&™ûõf‰ÚÜÍA\Ʋ0¼.=ücà515`F:À´#ËHѦùé*çˆõL¯^ÙÏ#>A½]`ö•˜¼¥]¦'¬³œƒ®ºÊ2t«‚°" y¥üSNsØ á¬6ÀǶ‚w€¨E«!‘® íWð!ÊÚ¦+}„8鍤 Šs˜àÜbÿ8@Áª÷¼µþóÖpÑêF‰ëd÷ÕƦõDëm»Ì7…ÂÖ:M“Ö”oL×p
P	,GBZ @¢¤"§bÅT,X¯%Ú ¡š YÈE
· °(d DD
P£ün üÌ–‚¹@4A µ"“뀢•ÂjÉþËûÔ}å±Ãƒ+†%EL.UÑ™öå^ÔñÌöæÜÔ
 É€³ú±Q𞁙sÑÒНåŽ=Ìûñ„t™’„‰ƒ`D25‹¸û¯¯°/G3'd°Ã‹Y•Id
µYg…m%h®ULÌ,ÔñÔCÏß²,iÌdí±Ñ#SvŒa8Óëñ¤ñ?ƒÆ|_içz"
-ö€%d59×zoÜRB°"`¢¶¾ž¿)(¨€@.ÂZ`T±·Ò=»€NŸ^GJó÷Ê<ã¹	0€–	l;ÏSÎ¥ô7ÚÍDZrAÏÂ3òò?i;±yyÑ·õ1Ý[Ã*ù¶zØÅa3&jÎTmC ‘mÔè
çM‹Óf>½6°’ìzLÕéÍo3K]Ç–n×èÖ_j‹.ÁxØ9ƒä@od…³F…
pJíÐñ5WÒÜs¡^YNØZ
ˈw؃‘„ƒéz 6Š¢HTßÅb2×î,9ùA Œ‡ÏXÕ™*pCY>µ2]´a
4`v1ß.`ÛÆ‚”C埏ºv2"I|x{>܈>½PHâ!dëŠÐ"ídÕ
¯.X×CS$ÚcY£PÁB ;#a,¤k‹}`!µf‘ƒz‹Lã­@E”OCWÏa…É·æ,4d.Ú±UßÑË;D?Ì|¼¤	„“ùÂrK.¬7x4#!|
Jth­ GUHì`$€ñff­ØfÈWðòzý-UEMÒîî­®îî­»|sx|Dè%CW
PP]Ãvw¾X§y¿±ßìÄQ‹ÆÓ.¶è=¹qo¿€†Ý/%$¶ny¸6Ñð#»>$7Cvî>p(
À«ôðµkËÑÆ=dlßÆæ*ƒ(¦¾ˆŠH“bŒ›&ª·/b¼î!ŸkJp¶ŠÐˆïBQ0x`´ÀM8ò)9`9U‡µ€â¥RøP4yB„/&(PÝkÜïœ2¨ p€ïîÓ¼¾}Õg¸k^󟱵É"ØŠ/p)Ì;/ê”âG{Z1EŸv&J‰óa ¨Æ%2€1‘à$±9!A>âÒi‡ÉFÍá.þ•èzZÎÀÕxדMMíPåÄ1¡˜YéŒøÛ{óƒiÜD
_ÂB“’W±Apðlò€¸ÈÃqQ/VË)VX/‚“¼Nf”Ââš-6â3D#C!Œ:
JN¹Õ,±¥9pû§	ð9J~©ËÙîôݱÙßéQâW°;ÃÆåÕ ƒÌñ
ªêK’OÀfD—iï>GºªPs þ}hFþ³ˆ	ì6D[âÿ”Ø$=¿Ì 0éTØñålꃫc<Á>íCÅ_Ëq¸I)¿æš9>Z®.²†úQX£OÊ„îH(ŸtT!‡Mü
‘³oM¤*YZÁ±Ž#‚' 9ƒFO'‰Ž+Ý}ÿȬ´#6e[¼x£LeU¸Ó0;X H°•·ŸÆ‡nOœçú~J4!î˜îíDÿt¯ñöu…ù°I7“{æЇ9¾j4Óôð+,Š(jÆŠÄч9Q_Ïu”SŸ’Àý>_¯@÷oÛ—BŒ8cè’¤¥AŸ}†‚ÌHdf1çýq2íÝ¿Wä+ì8.ÇŒÊ(4 ‚‚R¹©i¨ø€F£$›"Æu“¸Ã¨d
¡¿ú÷½?»†q§±”sºc Ô•C‰FY¤q¶5hP¯³ÙÜI?ñø¸î͝•—ÞÀFûÆ”’$‘ù™"¢•‹Ö=xÛšÔô†®€‹]±Ï~l§-±¯ÖL6¾[¯‘|Èyb封kå3ÎAºèùg&Wò9º÷Ú»„œ¡C8 …Ra“D	÷çF“I])-¬DDDDO¦¹ëˆzÅóOfR
æÏz uMïúÿˆé ³-<©„k(É{!í7Öíå¦ #¾„ôª(ñ1×òøn:½7ÛMÇ&9ÕÕ›éÇq1ÇqÄÇL_qÇ÷‚EfŠ]@ÓqÍê.êìÉÚQ_›—ø@õÑÐDv=]û=r::®P㡾v<¬¸Ä"{w„5vmÂŘRMŠIÉ1Uµ”©ÜªìÿCó_šP Üo˜ÕÉcKiµfMûwgìÙÏþ鞍¦aY柏Ç
Ö[skÝ¢yÔ-³àDôrRú$_ô>éC·T^`2´|åmƒ²3½Û²Ä®ˆ4ØÕ8⤅›ð ç³;S{Ÿ«kÙá€~„
ßxÔ"´s†]$Oùãðõ¾™UD[]·Æ|eTUþ^ípMe“çH	­í©ØVþG3Öå	‡zªJ d¶£j1 at S‚ÉÍ:«·^zBc1äU¨˜ßXf‡6.ÎKŽã¼_A‹>P€¦O–D¤ÉÊìü6®©4=–š,½‹É´ž)LI®ÛIÏ릟»ey¤­Ó"‚Z8tgÏ~J8òãóÃ_œ®!j*÷P5A$—€´ÝÎhç½CsÆëï±ßòùbr†¼h’@hdÊCqQl†bBÓ>Sx×åÆ«ëpf”¨“±ÀCœÄkŽœû­<'MfÂÎIÄfâÍQ<GW³)ψÌ ]V{ùB„6×Îàâ¬d‹Pl²À㬒E.€d–¢Y“W §f¨€sÞ<p”ŒÒÏGÜZ%~[ ±ã½kmqÓÑ™âyò3œì)ô fq0Ç, at 1Îpƨ‘‹,¨ã¹'ُ'Sá‘ú·9
ß%ô–@ã’K+v¹¸iT-ᝮk(tªýAÕ{’AÛl}*3›JFf|3ûë£S`{ß'Íœv% a»÷à‹ÝaAùäõEιìSµYà“C׎)ó"AŒcîÌ+oxèOȏ‹6ŽO†0tI^›>¾£FœdÔWHê´ÆV$TçÂœ[ÓQ:©Ön¢ã–UÉß]Fç´ÜñÏ“†HÏ6}rÜmËjWhr‹ÕŸGˆR¹_Á™˜fff½YK•{ã\Ê
lu…ÖÐ"÷Ó2/•R‰ ÍEfºUJ[Ÿ¥$˜žx4'ôÛêG>Ÿ?æÜl+ɝ”²8Ÿ»üÞ+3Ó>f’K«ÊËw†ì¾ODMÚŠÑaäÞ§XE v‰'IQ<Ç$ ú,ÈÏ·Ž‘ŒÆ’Æ©RÚd䮸݊¹Ç '€‰ÍAC·-g+Ú­m¡5„·)´‘š„$žÀ|6Ó³D²ØHXæïÃ@Qn5ùžÙ fùwé¾ò²3}nj•ÆÀèe<›x}/×(¡$ȏoäèyÑ|âW«þ‰¸ynaîi0T%å 4.Š•éd5›•Xq ’`%á]qŸœC$“…B–ÊÑÈæËl:úk¨Šˆ6ëϏ…yäç׬ËyÌà@¢ó„Š/jG7ïp"Ì&"J¦¯GåÒ7”´¶2*Ã%PÔÌJèÂÈjèÓ#œ†Þ$3; +@ìTn{ó±%_a†4G[ÏŽFyÑ•’¬ 9 Ævsèúß¿—kXÝuÄ都±$Ã Zô[¡ãe0™K¹ˆBP‰4X5­‘ˆÖ~'Õ–ÃÙß/²Â¢%¬Ù8·e;ÎŒÅYË+ãѺnÞ¶vÕ…ÔG	ñIÁ	~M¬ÔW¶ŽGaŒý»èH"A°'fÏ‹‡âÏ:ejÒ‰GF²ßu­`ÖÃÏ®ã™
0iChQå'9Šw:ƒ¬ÆÒQËŸ£=’½Ÿ3¸ÏSÝìáLµ	÷…5ˆa²U™´]^m>	•¿Vm8Ʋ`’¨%ãër›G×´>fÏö;Ýzf‘‚![<›¥½o2N‚ÍŠ;ƒ³Zw3åz3L†5‹ðÌ<zydq•<·-ô<`HX)ƒ(	Il¹Tµk¼¦œ5Dà³t…Q´a†4Õ8GW‹šáárDCÒûb<!µ!”®,‘HÇW~°ÀÙ8fh°Ò64[»>7©Rh™õP͌ͭK4¶_U)r—QôÒqÝ`’2‰Öð/‹çÌCŠÃŽ«Øò @"Ä<±B”`)¸\„ÁE¹, Y YDYð6G	8YÂ’Ò!#H
äݺZ~-DœáqO"@蚶ñUm[fÕ
Z©¼†¯R•M)
6ut¼Ër½H«‘ÑÛÚJÆ”ƒ(ד`B¶R“æhs;Kš!è-§HðÂf¾JlEt=—î€_[ÒûhÓ’7³zjŒä5˜@IWpðϬ¤ºH+ɽtÏ9¬–j tÐj¼Lì"Ž†Êð$½D‰)•ÓsÍßNW¹õÖõ?{“¯"lj) 1‰®Q¥= MN7 #ÛmÒmI¬<1Ï
±%À’ÈvÕdyk@ƒ»å³GrüU㝉…¶@Š§ˆa#+¼u4ÞšÞŽø}ÓŸ—  =Œž©„ òáßd6Íu˜˜ž¬Ï7èýOHúóƒÖ@F^Ž:618‹ëɈI|½UPLÔ®¹ñoî²qBpwÝ@pwwww'¸w· ÁÝÝ%@€àîîóýsÎÔÔ™‹yVU¿««z]v¯÷bUµ›à&TÈ’‚vŸ±`õ“NaÏÒ›aâìœÂ~uXÙ‰eú0¡åZ Îêq»8YÕ¿XŽŠMŸ¢7‰ŠÞX}aa¹„ˆ6™õüµ
«·+üÛå°eû1·ÃKŠ´[RœÓã–Øûg¹´´;¿'g‚OqÓ©–^ë¬ÖÀÖ†[d21°ƒ´Éï3a”çE´jž}F+Sîáà‡ï\Ö^ż?3F!§ÅŠ—ÖkÅ3G–XùYvã†'¾B@$ˆâ$"Ÿ¸Aâw{䵊šq¶)»õ×&$Åb	¹@ß'ÎT.i’[pP8×Ïí/¿Ö¤<zZ&‰-ÌÌùƒeÅäÆc{ò¶}ûôK’³¢\OZ¸ýºâãò?iR!)ÄÄsÔ;… ÉŸê TÿõdÞÕ¸Íu‘É“uˆ²?K£¡¬°û¨µë¦pxù“LŸ Åêz€¸P¿ñˆ[³7VhÇZÒ›OÍY@Ɓ ­<uv“žßÖ,kyDŠ¼÷Ð}ö­E–§Ù=\nçþ˜$/OÈ_0¾iìONî.›‹JæȦ÷Èî$©ôvz„eïEà_© ¯=5zR¡í[ƒ>5|u)/šÜ*«,náúómì'˜ý	x'ª—È
38¸8f„M'xDÚ`ÿâ½NH´®[M{%¯-ÿÕiK
Nõûˆm¿ŒIÌ\DDzß4¿Èó=:¸R‘Š°%,¦ÑÏýÈö†lÖÑ?ö/¹£¤¨'«Ð‚‘3V`òÄ{/Á2£zf–vBÉY«‚¬9¹¹‚AÄ
LõFÕËûN³ÌßíM±#,¾&ÜöÒÿ\7\Ê¢—	çC“†í8&¦‡â¦*ð„J™ôJ\î ‘šP`Ô¯;åü¼'C’<”ÖÐà-ˆNÉ[{´ ·5‚U8‹8IÀ6•¦ù[/žçK‡ˆ+E¡zõË4Â<†cnô£¥ª­g‚‡|Iàáºö•gQˆá,Ž’!*‚†;Ÿ;@§µA†™$* úíøŠÒ—ßMü…ÿK[•}ÖÈYus!eˆÕ‘ÇUR3ø¤Ã"æÞz­ô¯áý”iæ´ŠíY*;[õ^êÇÓ~lý–Ã…
o]FÐ^´ÈÛLïÖ½i7e²ýŠˆ¶a~y®z a¿]Ƭ˜çûÕv=l(Pˆ¡²hBÜì¢LrÂËEÀ.7c 4 F
nûþ›]Þ*+µ[°šÛóLjzÚÉ‘ÉîÓ[Rµ½Š|†9þŸ4ÊšJý@Q×p<‚uEíß„%6:iÍÕ㋡щA”±Á)PB‰¯Îäˆè_h“®rË“„K7#1ß
n?ŠÄ‡ÿnÏí8hÐø¦ ñIq`ýéÆ ˆÍtGjM?„–
Ýœ_3u:›¿;»ªëćÄì\©X3Ý^ò½·¤=¾4páÇñ{QåŐ/ôÄaÒßð4/Á<ùqžŒnt¦h¯®¡¦§©PÂø³›¾—>ÚÄ‚¥5ªm¬‰Läê7À0i·í‚6‹’¨ãÎ`ЃʂoÔ–¥мÙK|ôŠî|Òq”‹‰db<Ÿd¹Z6ƒà¡(B.k¤Ê<¦þÅß<{’º
æT "t™Kƒ„ë½Úo™Pzu¥Aˆžœ·ñݤeH^£îe’.qÙh:ÂRÎbÀ¯Qùyañèœñy¢ºjO5’¿dW`ÅFxÉ&–$]ýW%©<FSYºb¬R ¬˜’ÒPÇ$×ùÛ’n9Ž\µ»êÞÓ{kjM+îbQ~ô#¯lýU´}*5Ý%6-mù¥õôêøà`ñw¤×ýÍÉQâÊë¿ßÞ7CIWB­¡æ.¢¦ŸmõZù9MëÇ`·öÊ–U\½ºfæf•„ûð3)úLW)2(¬µ[Äz>Rö]9N§§.‡ÎLæôÜ]k‚2Xjy~¡::T“ý¸’?ëBÝ/XLöõÍÆ4ΞhyÏùð©_xË+sjªûÁ#F¶â“±t©MRוC?Ó/Ç3Ää%ùÊ…Íèc|„¦û!¸.à´ÓםñÀ6%™»Ûáܺt¢°ÚË‘{›á/gLƒ¤€sx’QÊèrpXç›dº&ÙmÜñjæU@¸ý¶ðÅ(Ý¥tLh ŒGuÔzÝËÑÔw*ZÅ™åoþÑ¥"$ÁBrç†ËiÅÒ”…bŬRgÅèÊÊJÚÂhÚÿ$9aî¼4†á8™oä"ÀÂÚäTùMÎ]I‰ö ©$$´®¤0±#zqI_pÄ AQN¬í [~ôlnJà÷”oTæýº7;ø¼Pñ??LÄÐ]<Å&Ö쎬°Gb‹¾$'“ŽLm:ì-¹©åÚ¦ç g19C’ŒÃ˾UN,o¡ÃGãu@«*š—üät2›ènJñÊύÛ{ÒFͶ¨e™
«’cÃÚÏUn.þÔ[î2y°ñV_ õÉÄ­©¶^ªÓ§[_ͶýWèÑšµÌÒ45õ66ÒËÌ°ül-ôÔ:b§ñ;[ž¿1ÒÃI±_¤ÖK¥“ék“
 W„iT=¬¤ÀêâønzW«Ë&# ?+&á!Ô€qŠ¥)
¶’£ ^¶52I¶Ê¼¤—hR%VoâÑ;¾±lЇ Oë ïôAìûú™{<u¹ãýŒ~šèÉ„“ëú
o½àYnº©S§¸,êR¯À»‚ȾàÔYaaÙ|›Yîj)^‹¯±à®”¬ŽYښфYÜÀª
azºÃ^-Ãõ=àPؽ-¿’f©¬Ñ‡Ÿ/•Üû¿wŽ1è(\GW£Æ`¢`®ÒSTÖ}šF
S…JbƒG3Èoðâc\X«KªÈ7ÿÝlhÖ+“N‹‚LÆÚô¯eacî˜x£ÝÝ“òø®'ÞÊ.¥¿âÙÎ(“¦Ô©’e“ïdÚ‘•Þè€Úñ$ÑEKòÃ=û·¡ÅŒ×æÓîÌœ28£ bbËâ;¸ÉÚèؘ Ü:çЕŠ+ªD»ùÔgšý•á|X¢e±"¦SŽ¬*ØÔ—ImkHµ‚§–
¤ZŠ?̧™Qâ´t0M|:ÔÐœàRšÖI?E©^¾/ȉ¬t[ïíE Äæb¢ÇA‹)aŒ¢L²y¸Õµ³ˆ‹›}“÷ÎMA×SË&fm~L#ö­ð*­ûÇ)ÇRÎ~Á=MãôSP\ˆT茰û$ŽÄQÕ¬ËO­;úlx~–Àý*«,WâkS«-³ÔckdžëáÎc‚7ü?KKZ,›z¥\M9|qOo•{õð’²’80aTFØ~”œ"e]ô±ÿÞ11zÉ“T:U
ŠL‚|³N2Ç
†—†ïä‚M„F‚xÒ“»ɼ—U5Æ'R–è=tÖu Ça`^ÑÓž^fê–j‚2ËÏTUÙžÑ9/7Ï¡øo
¼Í² tAXLï:
 ÌoIçBñÇK‡m=bŸÕ¬ö’´Ü½°áo~³FI-#XþÓ·]'óøè\L_\žµ]´Õ7^¶Kݺö÷*®.³×ýŠ¹G:¶VôÝX3#f.sõ|°(c`߈†Sqˆç|ÀZxLg+˜õÑëFpJ(ö·i’ÁBº=>?Aóå|´Õšâ™SwÚ‘È‹»/QGÂîNûñ[3ô…<*øä×}³¨$ÎUIeø0s^í‡ ¤ž¹-jQž	Ì¢ç2qu‡uõpJ§:í½:<ï¡>Ðœ+Õ‚vò=Ü+=G._ï´Âöص0
y¾ˆÁ80¹”]¥ }<€‚…¥žEž‡Œ?|4¿ýS”àÑ½ƒóòß"@i½\¿ó„÷/ŸB·Íò*‰ÄLá´ àxåc¼3¨™ÇØYbÛ9+4¡ai+%"ÿ#™*ìÂiø*}ÏUûzÚ±˜„	‘×xÖ½Q¡ÁB‚Uõ¶
	?ÜÙgÚý¤ÕW©M]°]|ëÙܳ
Ž8ªÆëbOTÁpezÄŽ<tŸy˜0¦-ú—ޏqø«æZÑ°Öù,¼’¥§G§¼Î×®ôÓ1(Û!c¬àzò*Lç›i8	$üC½{T±”o®|ѱà”–4{6•Æ»:7¼õáëß»ùb߸ϴàÒþf—žZ-ò$uvàP—ƒòzädÒ È“'æsÍû±]F556Ãó@å-ÃQ(á2ÛyzMœŠwS%§Dèl –vå3góÁÊ×ßu?”-[Æôó„kbmÓÖ¸zr½šE9¬þçCëø‹œ.(©¿ù4"t)ß$éLø̇i*²&1MÖÏmÒÞ¿ZéÈß×V
7Z†¸õý\ïø†ƒTÐHŽ 0VÙ=—ŠòªïaÆΦŠùB«¦ƒEK}Cª~móÉൔ‡¾h¢,J
9<£!&#2r$“Úߟgí­™“{†P_3÷)zÕ‡æ
ësË¥äÕ½ýšÊÕ–}&ÉKâ–Ú'ýµ¦Ìö{.'¼»ºý¥ÃP‰‹¿‘ÿ'?>‡A¡	Ù¤¤ÒžAälƒËWÃÌF=8j]r¾uO?Ã3¹ÊïÕrõoôFB#´8jñÑy…“üñÉ—ƒØ”D¥¡¬9×m£À`yÖuÑDè6–àIŒ?
á“8ËâVvîãWÛO(Îw•…óóUS?˜Œ髤e´µÕt$TÕJJ†‡Ú°Õþo0þ·þoþϝššª¸8Ș*L®tü¿F™Zùÿ¡ãhKÕ2¬$_2XËŽÑË96-þ¿ƒÑóóÚ©%¶=™ÍfÑCÆ¿´ÕÔJ4vj½áͧFÝ’q¸êKdþpÇ}MÈÌH¾›gªÃŠ€1(A2¼jJÞŠ ɐP.ì]KMf|Š1ÇBfÐ(
„¡N€
{ŽÍ„ë¡iCdXt ôê0Ñi5U›54à¨o£—"ƒ ³ÐÅö€jÝotdPÅ9"á/Faä‚~y˜u…HQ܇äÙ&Ò´’1ÌÿJaöÔPEÓDõÁ{a™áÐÛ(M°´ë8GÆT˜ŒŸ¹ã†ÝÉZÆ×t"PI,¯ä«ýÍma©â $3ØM ] ” kPÆÅeDZ_ýÆrFδ+½¸{!^ìƒæ wDE+ŽòZ¾9uT®F+L( ,Ìø=‹88ÆÆ5)NÌ+#Âʬÿj°Ò§¥šîS,Ž®o²Â†’ÓÐFi– ï†JDðšYTÕcRd¼Ö~k¨•K‚+C+±‚Å…Eaór£öIU’¥ÚµË¨
·C¾ÔüunlâߎŽe€’@#ƒNP’ø¶.ÒdïšçúâÃêtP™‚ô-Á0¤°üïg!’Œ…‘¤9òz”z¾á£ê¬oGKP.ë* Õ’ã­õ¢]Ç뇅FÂWšeÞ}N.k§” :˜!h23h NPð 0čd—ËÕô°ƒZ$IAyev¯Ìé[,­mW0ê-ca†±Ãi8Õ¶$3¥CM%ú0p
 ƒÈ°‹¸$lIëâF™¢ßm<A®	qšâ°&ÿ=•û;Ìl~zÝ’Yõˆ¢Š<W&y‰byÁÁgnßvW¿ì Q>'¯CèÈÏÉ~G0¡<Ϊ´‚Ñ›$°`®HnkïýœþˆÁ@Ç·+þLÍÞr†é™ûÊð¬U_Z'€ÀæîõÛìÐŽ‡Ü¬;«>écáIÔý·v¾Õ3Õþ·ÇÏžíç×m¦U)ßËùñp¾©­ÔÒØõØ¢0QÙ·KQ)^ÙiJBg¯Ò}\QÛï…ü)’À?1“Žq=Ëë'lGôýq8£Zè*(,h§š;¾ZÀ«ÿ¼V9>˜÷¨Ê ö&ƒ›T'à{n™Á™®‡›ÝÛ `ØX	ᱧå|To¸†TÃñ£¼‚#fé¯?B$îýÛu>¾')}ùg¼¾æ8úAed‰p9–ø›b…×Pr„?}“	‚37×S̵ü>gÔÁy¯Ðc"ÝŸ»SBÎä“þÝoß¿"+RÚ«§(áƒÅÅùå!W³²K>*
r1
quŒœS«æP\󔽞V9›ëäÞæš	F
oöOƒ ´Ï;á9ì–­qÛO­†y_ªcô+d}… ;x)Ã'‡!¸¸Ü,áfÆA›Õ÷®{B_±ÝÒ·Ì&-8ƒç	ßnŽç¬…xXÂÀ0ÅUäÊò%_š£¶Àwð·cõ^*䚤VY~’þ^8²ÇT*—KÄ¢N€–ÁíÑ\‘dÚ=ÃÊŠcš¢<,$›âÑ©m¬?¿5/½ü0ðÝB©—¼ãbún’SH`"í$
€Ú<}Jlì‡ÏÐ¦&¹‰&LjóÈþsß×	G*^ŠÕ£ÛWôM[F˜NQÚb
*Q†Øn×rn^wóGRRÖ+p{~±;ÞX🈸ò¦¥«äWÑœ—ŠãHiéÕHB û{EÒ -‹t;µŠ("LJá/ŽÎéë&sŒjyÐj¹å[_øW"­¬šJõÝz×GÙC~àiÏ”ªÌgÆ|5‡'a·ÚIäœ< ™–º>ZËÕ'9aÛ:ªÏA„¿>>Ñ…˜Æ
Äu•
í;Æœ¾”L{Œ[ü&‘ŠÑHd;öýèJ:x,¤7ÿÂÌd“wgòÚÂfn]!ÚsV)LÍðwŸßÞ„ùè¾óÈBH”Ç(ÿÕ¿K! ŒÝ+‘ô~þdgD¢_–é­!Ã6~… £•†mÿè­"·gÀAa+¹ªà
‹rã$ôò»ÃÆiYÇÎQPÔýÑ1'` jÀ€‡qQ—°iÆzÀ5ÆÛGcŠLQ¹Æ$/§9K>iʪ2ûj.F
³îŠ.DÝZ at n/ƒqý.Ž46|óJ7„­Ú°¹Ã/†L–„S«_÷µGåòvni,w-SŒL˜Èçù©ÑB•oÉ󟈱]c¥/Dz³£JŒ&οMyëæýVÞ³÷…Bœ_Ed€Ää£#‚ó»B7/h6bBÄ®ZÖï(ÙÖ•=
‰Ý3_Å4U
R^lV£Áï_ˆ%€Ð¹“Ö§¡æC
vúªü’&<Rç…Эq¡V—)))š~,$€¿0#½3ô¬»³2À~yÈ혘ê¼g¿zZ.<;dˆ¿DSFHªå½òMP¡€×ÃVý¯G©LO¯+<0Ý$¨qÀ§*í‚fü½¼Noau’òÞô‡ˆ@ź¨Y‡Iö&Ba9Z8Œ¸ TûOøÊkÕ+ÈÎ.oÞ-Ö—–Zú	Nž‰)¶ô»$óíê.§[Ršv÷WµªÏJ]UGJ
*Æà÷ô•ßu}%ª^LÜ+o0FôZÜãz´OÐhƒ+^L»‰A«ÙЉR²dð	ý ^DÕQ$ÒÅ2Bö½ËÙ¾Š«Zhå
à³ûøÏWÞÃK¦cèR4já]¸Ò*u9hFqH2OuE8;ÆË{xN$‡ÉF¢Ëƒ¿›7K¾R6BDs$»U¹5hš6Ã"~}ëö¡5ëþ¯IXnô%Q‹	ƒ œA_=Mê1 ëÀþ§Ž_À™3=„!§ÛÅ aBN•çÏ$æ{vvà*R%;_X@²=š6Šs­¨¢9ƒÐyM·CRÅ“/¥ÎÄQÑŠ†FIÊZ®>VÜë}^ÝLª{£ö'j‹¿	è	æÞ6;XÚâݧµPeö,”ª£õKù“Ê“zNú§ê;>çn l
@'M±â™"×ß׬+@Óêÿ÷ÐLéÏ›å% @sIFrcð>ŸLi³„Ûä©
-Üö¨¯b¶«,ž ûÏ°’Ëé×ÔøñìFòkGHƒ¢cü‰AQ–UbwZöÝ4)F°b`©äpÁF¿9>(’€ˆW? Slèù	Ø2ƒZ“H|ÁSÆsAzr¸r
ÇÆ™=øEš2jð‘	cH¦x”ƯkÃ@;}g*º¸Y½óËc»¿ÍÝ=Äïë…â7ó¿#,Ù+ïÑ_°s5“*"=é­7CK¯cxBV»#_7\ù¿Ù00¦É8ݼõ4¾–[…rNz¸4mݾ9:™=?ÕŒIQÏ<~ðÙ} p¡6eùWz6 ?½³è¡.4-Œºˆ“ë蹈ü
u½
¯ÛÛՐ§Þ)*gi«ï=Õf¡ªÑáGIݤ¨ŒÇÌó!×¹ïy?½V̲¶)Abڤݣ‡3R4Ô3FnjØoº]õFÒ	Ÿfõ[í58æ’ãø„ˆ¦QGíEƒÊ1Í|f4
ƒFñÃúNwË»6ocßF7õåñ™vHü¿f Ð°|«üûyV$ñsÛuÛ#“¦¥‘܃½¢yËá°ÿínAŽýAÓÃwõ©½ x|ÀƒúûUsIlî;p¦r	Ûåê¡ì2Jȃµæõѳ½¾!L±có"rnå£ñ<Å9‡„,‡Ý6(YÏÈšw=“\ŸúÈƉÚôQŒñýëvÁÙçAk‘n¨§c5¬ÒM¢õ¾dz‘ Ü"ÿ©_åë)ݶ|Fò\`«‡'K·N´}£½•uŠyõ²«”§­ðߤî,Ùpr7&gÂïs4*ÌIÅ[@
­f–÷þÃ降~©ÛÀƒÆÙ‘©!½š31ï?Ս;Ȳ%cñ13ófÉs¤b¸äÇI¼>m¦>Hžm¾FwAƒ½Åc¡agw'ÍÊ0Ì;²>y×çͨ£U5|m	Ñïq	8&ïBã½ìÐH£ô^ÑpBÇA3ï)ˆ­JZü©wºu„Jjï—#Í彉Ñä»ã}_¤6P(ëÄ׳9T0Þé¾J¥K¹¯@znÏSaóàUß8npHKÄHÒâ'v*Ïõë[s¿„G›¹Rtø*,¸ƒmîädGÀÁ'c¨F§­&§³ß"Ï 5f´(éà(æ‹ F’z¤¾ŠÌŸQ&¸ð%…¡@š;2N0)1\âô)¼°Ž"“Ôý¦¨#'é!&ó¸:‰³iƒäˆÐ̦˜ÁÔJdôÁ1'Š­LzƒÌ^nÔ¿L‹‡“Šë7½:…
ú.#®‚\š-,Iu­‡K/³Xú&j¯VîWO×$Ö›ÍI—GˆÌÄgÙíAq‹¨r 	b@Þ3Xvµ†wÊ¾~ÍXNlõ¤+™ïžÉÌó§ÔOA‡vd¨¾“k¸jû ¹òQo…3²FZùã6œ-íIrDÀÏ~Ø’¿«¯ëy{wh9C¢c#4”ÔÌ桃œ£ùýŠc)0ª:¿p™Zr*~Fúh§ÃÏi2ntþa£­i)a(° k*¹AG•d¦fl -îøéì]߉I·m„’>Ú Ã<¬UB÷º„Ô´_¤%öoV
¤{ühLUöÆß]Êm}”ê‹ÆªùN8¦“od’©€(ªbáJ‘TaC¦c;#p8íét¿3È ¯^8JÃÃÆ“ŸvTMl|¥w(„	D'ðAumçŸEúlXƁ.E‡tӏ£âx	^ÜO]¾¯úí4Îò~eª›‚IUiùêjûóÏLЯ­å®Z*¢éó6Ÿ±2Míú|Âî¤ÏaUa`UM.ÊÐֻƮÉùÂkÏ6í›:%qôEoUA8F~û†¨S]ö´se¨†¶€ø´A4å0ØׂI–n°!õM}c«F(î]/ÿJïKï3À<ßjŸH\à‚vkbzm:óÇ&§žã,³?\I€ÝÒVö ¢ÈìÝY~Þ¯5Zôä)=åëŠHpæ`ò#$ÂFKèBršP©gãm$olÑ~Pr×gK#}â™N΂zÐC{2‹˜‘¸ª.nºâoƶ*bùUÛÙ˜‰–ër®º’¼ÑL(§íL¸>¹ûcÔ?MOøË_gg±-˜¹•e—÷»âÚ·_èG…Á¿Ö€…«oûå‹°mwïÊÒ4‹Ò;Ú##¯IÔ‚upó
øÛèðæ´,+W§RûÓnl¿ò9³âGŽíshB:êªmé–!âo€O‹Î³%Ø~:C ˜rÐ&Ò’ü¸2“MQS	rÃ3	¹#íi¹´Þºž, 'Qû—ƸÀ{½sùzwݪ®Où’;4LÔeýþjW£Du’^ScMµãmF`­nâé!ÂÀ£ûëéÕÝìV•½·ÐúòɄŒ¬ßEâItâ(Ó¡¡¶Å¿ˆ¥7‹š	åbõ‹zÔ^‰Åœ5úÿ%õb÷Â*8¶}Æ:Ž0òxÓ' jÛiFçìl’
erŠ/í°ªoqQÄ©ßJÙͼŒ¸ ø1ÂÚ´ Ô¬ý:66Íqé'.ZW)kæÉϬÐù/äb{¥þè–œqÖÙ	× axÙÙ3/ÇÚC§çm"ýœäF÷ôš"†N—nIŠš ’•àSíÇ¿Ë#Ùž‹~ä„ú
8ž'½†üòÓ‘»t æ¬LÉ鬐”NKov<\(¿M‚\T"k•¶ÌïY[øÐEdiÑîÁGžÔh™q%ÉzMüH{$4ˆŽ9xç ðUcG®ÍãFº«&.T¬ÿÃðϏ”—âì׸dÂÎ~Ë_×ò3Ø…­ÝÃë[(â`lQÂ¥<¥go®~׳c,,n˜Éï¸
÷.|=-uù_p¨6[ƒÑé…Ã*›È@‹d ûP‹‘gÙ‡žØý	U1IÄ…Hޏ,ˆ¹QˆU3Ú‘Ë!¹¦HßÇ4²
§TÓmŸèð#•¶ìzIÄ\–åeϯþÏW¯ªË¡n©õLKîNÔÉaëeaÃy¬¼0Dë5»šcèH-_=5h(`’œq$Ø“NÕ¹‚w´;ªÖ€ç_7ù§n.EÄ—·ž…î¬=«2 :MJŽ—CŒ1ß.ÎEB‘¾ÄõK—NԝOÄ6PXÁ+
6íkÉIÁŸc0¤‚WVxHÅÞP-æÃõ#EVë½	/mT¼2šj§Ó¶¿#ÆE¨ÿ«Ýk0vvvŽDÆ>ü¥[yw(?†?ý×uÖÎ|{7\Zàש:\j͏;lÜfƒš™‚oi&à‘60Uš¥‰Òè7kò`“ òÉÈW Œ)®Ö¨V¨¼žƒ»êõËvÑ_Ê&,6ÑÔ±¿8Ä“¶£âÝù	©Ü;Zž¸Î3ùô«ç½äŽŽFñ 7mÜ=yHÛì’½›JØsvSN|E·îf0z•\&EØ'Ð憺!t0Mm(½\Uö…õ®Ã–ÁÊJˆ¹\RôüÍ9ÔyÜÀ~ìÂŽ8úaĺ÷åæ,}yh2V€éБdàE¿&2sŒV¸y.Î`‰´Ðß"짔KÓPg•·]¨×rëWZmkÈz%gü#>£Òë·0E¾¨´Q)3gµK:^‰È.âõ8+éBÿYì+,1Vù´¨,f(Fyþ¢°æ"¦Ô¥¿Õ\’cv‚É»¸^$zÅ«å%O~ k÷ÞQÞƒ¶[^™<‘øºÎÍîtHf¾•·¤ãf68”Ìõù„ÁÑü;8äÛ£ºZššò©ýƒeyÓ§Íû°O¨5¥£ÜQÜ{
‚t€DSú¨¬ó]ÝY
5¿[lòLå&ñÆ*^v~żYíZ–ç)ZÝ:òZC®sQÓŽuŽ$6gL>&‡P.ˆ9âÀˆõVN, š€Î¼O¤´¿ûç®ÞràŒi„Ò‘«ûÕëf&ÓÔ\œXD€1Eh|stÃó;>±dÀý*4^ü@À´!ŽseÃtDáXŠ'nœýjõ¢+]ü~ .ueW¥ºÚ*Ô!näÆÍؐhÃckgŸ¿+˶jw¯ì,“øìk«.µ´¡ãÙ*Hï´nð­D0D·GÞÀÝIIä¡3mÈû1SIã>}wQãéSÄhlÀúç•ßÞzößp±æ–G.m|M¢kFiàƒì¡m-„†R­ùÔÀ›%g„%AÙ)dz.sµbÿ‚»×/#Pæ,
€ôô¿yÝyH€%Âà1·GPþ$öü¨â"õ/Ÿ|	3£#„W›µQDÙËðÚ"2~}ù;Õ—ŠpZºv€}§Bለp¢'RèqäƒêI–
Qc&±ÆÿD)z}6ÓlgòÚµ˜-Fc†&0žü†Ûåý‰™õ$E6©þÕêø“<ÐÝPR‘[ÌD£FVN‰ö骘¡"÷T]éoQ+ÿyTj>‚¨‹ÂÂ9Kûû(”È_O²ã#ë ¾+â'¥"	›Ü™q̬ƒ\¡P%y®üêðÎL69NƒûN°Ú•ÑÛHÞÈ
ÃeMšµ:å»Yp-@©Î»'Qaò?AðQAž9`´?‹K
m´8_;ˆܺ€}œ(ýóYÝ«HNº9±×ïiÍ(L²—*ÚiˆG–†˜Kw{õŽèÄrôu&;RdÕ´fÇ™%Wºð¿a²$a ¸„€N’'A  J¶:†ñ*›‰¼háãÚØ †XèíQ
´Ýè"E	­>?ßÎ;2    Xÿ§
$´ph•o¿ødùh§£1Þ¹Tƒ\™%JMÐǹËÃå	¦îSÔäÆš¤Hø‚¶:ø°)¶Ÿº—5 õrZÚŒ¯ÑIQàb XvJu¥¥µ¦ìLÔS;BßžàÄ0 =zE?ûøÜþêÁËÚÐ??=nŒZ™.»Æ*ôägëÀ3Û»)t&b.Íz(Z¶U³Rænõ#4'ðáŠÇÛéËwÿí%AR,Ïä*)®{¯Ç­)óxaq~4ÙN$2æ‡Ý,7Œ"=£ëe;Ñ4Õ.“,‘C›ftÑ;Ì‹à‹|ÎÉ¢>¥ƒpPv†Ù!ÅÊ/Æx0“é-6UË®¡WõwÄ-†zh~æ® DVLÿrÑ?‹g¿ºƒ^/àÅ	ÅéLÅQÑNK u~š'7³³¼±~ø.
½¼÷°‹^C‘Œ›Ï+TVSð¤ò¼¶½5^Þ¯¬dIÏ5Òå¼ýÍtEšòHy~<Ccâìf…Û7µµc8˜€MÈ×åIG;L#çƒT¹qcú¥Ã¡ ³¶+{åñ;µ%–YwAÔÝäÕ$9L®ç}\h4
Ak™ÎR{{u£Øú“Ö@ÁÝA(¬È¥Õ†1¬xWëôgK#’]íàðªMKÛ—ìŸt¶Ç¬cH Ê]þT½	«ìN`0 lÈY+¦IÐŽÂþá‡1£5ÛºÂ_,(7{ò4 at Re-®h†Ó¿0¬û}ï«ÀËÜËt\q‡¼c~(ª¯,èñ ^"ûÝÝt¤l#~õ4¿GÃc…ó$曁{ž›‡‰[â7þëø¤›‡0+í9XÙM£jø”¤BQr2Þ›‰rDÀ¿‰Ùi–ï#׏ûN4øÜ?T;äñökÂwÖŠ¤‘Pb45­4°æ£òQ7²4Ó³©qÚ}­hª†¡ÎkÀà³@ã´ÃXl^Z #jE\·9\·©9Yð¥34\TOäT(õ‹cþ9—ël¿¢q3l†M…
BeÇ
9Ë5ù6^%[8Ã:xç0ãñ»ŠÐß‚C<вºë¼¶.p”6\ÜHtæ M1ÆU@		ª	¦³YÆU‡W-uºk]œ¨4=ºE6—:¿ZêÌÓ½&jì–¨ÓŠçÕ&:\Ô×’*ëSåp§
°P¸Á%²ß‰'’!‚íË•©”S¸p$ÀÑÀa¬ù[h¢IÏ¿<¡ÂÏŽ–—"•2Â%!vÄýÌï}VgÉnëŽíóO)6\Jª
uñ$š¡àýÉ$)a@¬qƒýÛ;I*j­“Ž¹d9ï¸(ó¶õÅ—dƒ’V]•…÷eÿQæ*ôŠÉz(ò$YÓoÏјêÓ^’Ž•NÑ3!vE>÷æ{ןùÕ^<^„°P6]æ©,‰§ÁÄ£F€H‘øl˜7JØH@•2R¾rá'ÝÍ6à sˆ‰ðð U÷ç~ýv=ûP÷Spï=¯ó¥QPžfåó7’*)ø<D”B<J=ë‹öÂåÚg‹&â/ù Úö½¨’ƒdIˆ$>5<d½àwrÍõ\qZÚœ2vJ_d©óV;4(夂€ŽðÁ/tÿâ¹fèd wÛ¹2nÍab÷Ði·ÃŠ¯lí7~l£ÛÜ©¾îÚd
ÃÃ
õ“Øçæíö-«¤8ùýâ/EŠ°Bçq0lÉãGÑÖQm±‡{m€nÀÈÆûyKÙéS~ÁÉwß~i3¨ËÇ¥%>Ô.;ö—Æd µÉF™ñfTËGtmM‡·èXÜÅ¢‚­ûùz5=«zØÃó:£œ¼j+Ù¿1AÁë_%çhĆÐRä„ÕŒ+¾‡í8„‡}«!3ÚI&¿††Üñ_××ÁKÏâ{›uµ>å…º6¢6ÆÇ»AqöÐ…ë:7RÊ-åuµ

Îè$*¡^}À·XË&—cÂÆ$6ÜÙaŸÃYQ‘FWÜR“¸•(ﺥ)¡oÁoÒõÃÇ%%Oª9w¿"páP™ÃÙˆ7ÊóÀžÏœ§ˆëLT™0¦²’SíitûÈÍ’ÊE©(‘¡}²r˜D‹ŠÒp] (R !×.C˜Ã’¾õ½¬hEüFî"ñYÂÇ`z‹îºv•*&‡Êš9™”ªüáñÏéÏíð¤É¼æjµ‹µ y•ù»–ÆÉ¿ä=Œ(_på›ý°]ün^ZL¬$³}Ïé°“KÛa]
˜xÃ,-ˆ¶„˜L²ü©áé)‡þ†sÜ6כ˲R¼Ì˜|÷*Ú¾Â7|%§ðþç&¡ß[nÞJü
¡Ñö¤§HJÜ]“Ј|Üå‡ó
›¸šýÉší4ük¹,FƒüJ9%YSa&†Q‹²H.(Eþ·#£tEhŠnK¯ýfu.kcðémÕÎå«’Èu,<ÃBsé úŽ"S$J >@1ðúÙ—ý]¿ö²îó°Ô%GMIM­zÉ×x²sìo"ï|hB³ãä'Ù£»KomC‰ú‚€®PԍɁâ€Q@%ªßó¿é§•LÿÚ¯Æ7ûÙû*@ÜdÀ­¢Œ›w—¯ÝÞBû[*¡]Ó¡l[×Ç{ãÇü)^üÀR{džúÙ~]Öðtפ†¡ãÎÆÕïÙîÖM~eXø›Är]êOùRŸq5­ýyYË¢<óZçÓg#T’ævÞ×Sccé	{{{ÝUòüÙñá–3Ã::çsí|›;5{Ï®‹ïÎIQ¹oÅÅ'~löçBÝc‡øIÍÚ9©_Ÿÿ>.Âß‹‘ìÞÓSå³Å«mÀ‰¦aaRzü{ÿ´K:ªŠD’±Ä

&ÇH ’t›*óY”(h‘$ ‘´¸GIŸHùÌ£´Z°‘Y;Á_ÿ@Cxÿš—ÀƇ‚¢ ‚aa3D ÑdÄBcÂ*ý©Ëâ„Н+¯.úKã öÍ@:]	ÿÁÑ™«OŠØëOndèG桱ÄWmfÿQQ´‹‹wC\IÆß>‚(Ý; [ÞÏÞRòЂ¢&ºèןÅŠdtÜÉsŠ¼èØ£â÷eä éÙ±ÇÍò•£$i
a˜u5_ÆŸ­Cb‹Õƒž²Cßìç³!fÚ¬O~|| ©eÏqkñë4Tô}&aüù|ÿX½îmÒ„'–
*1:pØT#°ôá
79¶b9Þ‚„§¡Ÿšw\bcôMó$¨\ÔùÏÓb(9¢³4ú÷#E4¢)é·µn2¢	Ò¨yórDÌÑ~@æSƒ-;-÷ãÄ`‹l'ÕQVJJJ²Ñ§¢LN´X” ¨™jµ¸»%Pü×¼»áÈyòÏ¿8˜ÄËåß8·ÛL¡sPZ)²^Ðâà7w[„C9€ä@2?Œ€(xÿ lhZ#T>Øjä7Óø&ZsUW¼Zö„$Q‡ ^á‡@!o>~w=æ¼‡Æ e9C Ô4tÑÙ¿ãGR&sVTÛŽºDºË óŸêbã!PSØ%Rïõ€‹ëã^á8¥<IK4ìè†5Ò9Eæ .ÖŽ€¼×ê9,2D˜Ïè/TUú{ ÈøwK©LD¥õ«ˆ¥·Ãý!ï™"õ†nuQøt0Ðî
}[Üå£‘4(cJ<dK¶¡Ž…¹6XTž/äĪ/ÑbÛÉɧ17ü×\Läp°÷Š”!½©é9ßbPäïº8®V/dó»÷;„ø\_¦™[»«3‹ê3Ùúzƒ¥‡Êª
ô‘cYÇȁk•Ò@5ÖàC8–¶be†è=Á6«qÔ ã_`S0×
/F^Ú®(ï‡ã{¸âmÐ’Q¦0Š{6Osmr£…λ١õ8ÈÓÉÿ *š”;^Ýý™D…Ƨoò^Ð#–ÔWñàòï-&£8®  _è†Û¹ð>ºÞYÇžVy™’ý
4*®úñv1¤Ç55ÉÞ(-ƒ=ä•"-_+wŒ1…ü³o<ÒfròŒý¤õ}Š—.ØmK’S+.ˆpŽ.ì—
›4dê#_6*ù>w¯aÿiërÂJ-… Íå›J-Jjh	ëeV
t§1únÎìÝÏk]Ìo‰rO¤ªŒ¾kÿ
¾3‚CMüÕÞûôjwYuÝeàˆ(L6wõ–»ò+¬Èt
bJøzÒ*.Ö€øsL3ùFõçÔä³8§fsv§wÃH<Ê•ÄðCEÂv)îÙ˜ÝÆ«Ë°xpàwç±µ“ZýlÓÞOçül]yu,
|¾ZÜ€&¡žožoäÞ긽¤(Ígd‰'Cåwù Ñ@žîСwôÑ]
s¥QÝzëü몝Ñ9[JšÓÊiúqÚŠ'
íý	Uf»o¹µV¼®P¿GG¡YlnI±ðþõAË"h´D}ò³‡Ö~g¾ûðR”ágÏ“·hÂVCÏ?¿A#_2A«KFaÌ”P–±eد´Ô3DfW4Åçc¡CΦ WÁµ}ê¼ýÎa!ß•»úî®ïVs+4]€.(!½häÆh~ƒ[Å’"Y½‹ÎÊèÈ_†9S$8|RG(†E™Œ:O³*c1ûAäð˜ ÌA&´Z ´f[ÐfîâÌ7F	°ò±ÎuZk¢ÊYË»ùª<8á;êf#,jø IØ…ïèàNL r–!v9x–uÏ-ÉL˜†îûÊÖÊЉ·ÆL!27¨„åõš`ü.jÀß`Œ;[ñ%ÿ8@áèEð³‰f`_J¿ë®¢(üíXåì0Õ-DB²ÀõM–n/^Ö.ÉáfîԏžÔ“‡©÷Õ6üKHh„î0Ä…TÞ=µLšueÁ–?­k³èݦÜTeG[©>fjZX]\Ó CË\ŒÉI¥ØÄXÂà'½º;²P¼úh‚N&²ß¾W€Í»‰“qËO¸`G.³7ÌŽY©„Pü¹ê–_íi„.úÊøà×·P9qìVô³²A§L¹²†É…ˆ©š+çnêÀ˜ÑœÖŽ[^Å>C„Lð†»*‚ANÃU™]?ƒ0Ü8ðDaƒDR–7{²n|9ëbϺ—×”÷Ä•ÅÅu;^6$ÆŸªŠúO1Ä}xhsˆÐŒÞ¯6Q/@)(ù`eâ%=7s5û73kuóš~0B6ü,¨y×—ÏÃÞ‚¾ ˆ	Ì,þî¹]BKÁÙW`©‚nάË–@¬'³Øò5Œo˜"ÞŸ ¡@3Ü„FÈd H¢‡»gg—cáRZÂQ¦ôô((Ýí>:¼ÆÁ߀•œµú¶—PÙ`E2’Iôõš(?QûÔùiøþù+F ±¤óPJMi‘<™ù;`öÛ;Ñã‹2Å5yÆ)iRòÑ4’ î½*Í´|Eð¡$œŠ¶Pð´½÷wû„Œ@@ò¹ð. ”âM¼ö»YêDk&ˆŠ]„n[$	þ¸ÐÛøŽñ	ZŒÏá7G‡ðìÁMܪoÀú­	¸gÆÒKOt¤µŠ®À¢o©m™	úRWCŽ‰ìÀHrgÞwd%Übh'SÜ®Kß<0.Á
qåssüç‚ Ï‰–Ù°êTAWÝh#“Ú¤ÎvÊQ*?õ…Kñ	[×®Š5á꾑?†Jƒ¤ÑŽuŖЄ²J‚{gf&) +â¼hDT!¹ª¢¬¬’22Ì…Å¡àH*úzG´é»xTt³hN†Õ¤íÉâßßm[ôäóìÓf¢á?*ïÈRú¦€9·Â¥Ë…¿ez|‘ˆ’f†föwõŸ—‘wû.xà×~EÉ¢g€É/Íó9)é'a[à(Ôcç$Ô¿Š\ì¦ 
ïÂ…‰â•]Ü$IÓfy÷Ά_ŠkŒw¬^#Û¦Ð}÷^”þuU £’1{eÅY.$'µwšTƒeJaÕ	9Ï;gÚ¦òœÝÏîí׫fB˜™X™C( _ ›
˜rH‰¿|ÌóÚ(2o[»Ë–b¾Ì=И—|ö^Ö£¡®|m*mÓüü…â
ÔaLV\Q%{.øäà—ýÏÑ>úÈ‘Eds…ÌýB—J€ag0S’UÈè3åøB[AeŽ”ˆ¡Ê X
ÚôM‰1FÁ×~e¬5ÝpÞtŽËš½
TÁÏäÖ	qýÍk²wï2Ÿ"®Œ=`÷¡
@yàwƒD+)ñË_˱'Y+)cù–Å:^&yL:N¢ç·åM]½ÚÐ×a*Œøëùi\sà%èŸø“*þÑu†Û-¢éDcQ¯KùÊÓ$â#ºÃ!—rÝÃTÄ;árçÍ>5ˆÝ(I}:1{10d¦âïõ¸“Ƙu“û¢ž	ŠüÌZöoK#öz¥n‡ŠEâܐGêg±Êè'
§j™éCG CC/ò	÷Ÿ’[©V¦Äü A•D‚¥õ¼ÎÚ#Gª„Àò÷•Ôǯ‘Â\3e2MëiÒv€üÏÝ!ÎzzÐúRÙø;Q “`VŒjå¢Qc"áý.rŒ¾Nu±miwfLF”™„5ãa@/;¶ý¾aÄ[ák5=ÞŒ˜p÷}°æ¨öhFï±Y s]F¾F¨˜c˜ørNðÖwÎE‰Sð¤9’"°	?wá/ñÆ"²C3’ÝšDÐ/Ø@¹ìä‚ç ^qá#²RŒsŒ0”-‘ïXi,!X•Y¶ + ¢õ'XÍ™õäk%ÿ
ºä
7üœ’š\/ª]7
u\ê_{ysí!-˜ø ¸i™SÝCB"d=p4qù¢äõèkî<™t,‰Ðñ›öÝ-í‹ÓB/ÿw¬ìGñÚmܯá°PŠY†_o™$¢"ŠaÕ0¢‰XP1q.diÏ'DŠy-Š·¹ªQ_AX<Ù­M’D%$(YèЖø,—Mò²¸i’u´vÆ!ŠT
:Ìq:¡ms6ÁVW(n“*qM¢ô>8'IúLPØ)˜XY&³,ŽÕ/lÛØÛ¸	C%Ý!Ê…Ye䏒TéUÒ¨Ù†lÓŲ¹—‚–Mçlb§òp…ês!©¤º“³$<yï±áó+©3Ô@M$ñ»U¸”Cèø	ø¨J6Ô%D=Ö„rtæÎݝK¦tuO!1r"±…ãß¾«¯Y»¸—|úû­Ï"<èΆb3´±Öo-UwšíŽVc”ùôÿoÚàØÝ,Ç(àë›»á€ì´Ú¹ÜhÁæ™H(ù.#[\$îªÿÒýWˬ»£ ™†y¬Z’ûíúå›*Ol2~Äåëæ>~[ø-èË9ÂÌŠÃ×Ȭž‡Ð‘›Òi?Ðj{wôæŠü%éЃ’Ä›NBo–ë˜f=8M•ÈÔ£"GM(ñ큖HìpRÊËP©ÎÄѶd¶Ë$
fߪ$¯öý­hAe»R9_勆ÖáG]õRNãžðêVó]~f²&WhF×qh¸Í›hEDsÇ(ëçï v¾}f…1‹1,ïy°×ŸBŽK™»‰e1 ÅvY-ïƒ3½Q=u1)Êôªµ¼úô§«M¾r4+& 5‡þL)Iƒ´BR’lÏ‹ü?³.v¿-¥Tuz¬HsÓ‹í3QQ½ÿ^ˆ'®>³Ýä§|hxåå»[YHyš»„´%Ë|A¡v÷v…v7Ïítóð>ˆùåáÆÞ§¦Æ=µño\Îóö»jùwO¸Î¥ût9¬ä:%õŒô¥üf5UÂ_e˜|Ä™ÜWŽFhh	Q\ù—r¤!ezÆ궟¦d¼§6ÜSeÆ]OÁO€´«ƒõ@®ŠGD»2;„Š*ìÚ$½…qZ?>*!…LI²¹×°¨Wh‡òCÞ@f6Õ?D³lèÌ×¥•9÷bÀ:¼u#éÐ_š°!‘¬õfâdSMPàç7CüIγN;튛;”bG£þ7`ìe™Ëa¸ÖU1|TÙÏ+Y€'yèd‡D¡æñ¾©Ý0Ñã
϶ìÏ<™?Hšèp£”žndtó)™ðÂ(ÉR©®+ďžÊ(¹—~—ãÿkv¾F»»°ð+ü*°bٝPøk?^ÐdäÅqÉùŽ«8¹Y²®½@«F®µÕÀÿ Ä-ESn¢3
é:oø»¶tïÌ
ÝÖ.À
ƒžrchÒXô-èÕ vÑÕÅ|©êkE‰l aù	Iuøú­«‚ô¯‘¡)0tºÅ2lVièo°ì‰=¿yÝÜ­Në¯ù£(ñ’~§yºtõ;øËö+ÈÒËÊäû™|n¦–6×r‹ÊôiÅjïÙ‰çÍ¥GÃBÃiF&À0PU1ɍÖ	šJCKôÜ=´tö®¸Ì]u‚BS(“WM¡F3B¥“ßU#(—&Äã—k?½æÝYá^0&° É`k…‚ùžµŒØËÛ.Ìõ3g¸Üë$:P”w7\‚Tºÿ¡WóN µ·]¨„LýÌZ;‰+m“;Ñ‚瀈IzfI²M½þw
~3ôºÂD„H’úoWÖ”¬™‚¾äQ}Œ
%–³÷ΰ#«˜£C^msÖà»Ø`Èæ¡DòÞ¾¬¡ïP„ô>—!w­‚Ϙ½Òfê"ÓµKeíÄ·ðX® ^ElÆ%7Àh$ÛÖïÙvxt~¦>‰‚pâNeîÀϯ¬%²ö]›Lã
ί۹ PʆWg’^¦)röëYä1 ^GèÌË‘ñC;‚!ª|s¾´hMçü01gÉs‚±¹œ‘¥=,荍÷ƒŸè|GØö¹%2d[RÜ-ÓFSÛ;í㬒KÃgî3z5¦þ!ò¥ãÊÝoêךÖKµ5„Ø·Cî”",3Ȇµ¨éÓúWRW„ŒX9¸P©`fìêöo1Ï{ðÏYb!»`±×?gš;X1A„ƒ˜?P—NŸêÈX{çúŒˆà?0=¦9\Τ¡É¾—d&ØÌ~‚½Xü¬”M€zeH2Me†zȘU`دø4(ƍ ƒ›k©#D¡«Ý¹?øò¦ñ¯í–—Rcߎÿ/¾Þ3¨	'jM…ÐCÐ{¤BèÅЛ@èE"J‘ TC—¦!t¤K“¢tAé]‘¢ˆ¢¢ˆ(þï½ï—{gî=»³ÏÙ3sž=³³;ç|;òÜ\:‰u”ø{òœ£$/òqǗεïo3Õ^ø	OåžÞ+*òþôh«ìÞÝLö¦û‹œåþ»y/˜¨ÁçM¿³dÕ3à
eÍ‘+b‘†Ž<w_µ'JJ \\VnŠ©±»|;éÍÆ¿¾ŠsÇGpDð´ñÒµÖ‡ns	on³ôn$—š`
ên[Gj~óŒX @ÙP¥Rû+_:¦cÕ ’u´÷»þ4$ÅIÚP+Ìù<Ý1Ñ~)
g˜©óª›E4*|ªr53ûOSsHEù•y ðçË0ˆ>aù3•+FY$ѽþøØ.ŽM"¸ûÂñ£K1Ðâ0ð™wò @ûS€ùßÄß'§	ÿ,ØQ±y¦z‚@E(|ù«6äÃK¾\d6ˆM±£êþòòw#ÆœÓÖÇpŒá¯1‘º¥ñù@T?á¼/ h"°…¤1±ÞžÊ\}ýÂ_ïÛÛð@C1|·”ò¯¥±P'ëmðXôÔÍ»N1W¾|{áõéKC¶0«÷ÝÈ0˃?÷K7˜‘~HËñ³oW•þÍ›‹ï4½*:¬î4züÏ
cÕtx¦¬˜|'ë´6˜íâs5%õ˜'ÎÌR xÓwâk‘Xþá¢ÅmðÎüý¨nj™Ûq$ŠÕûŸç6ªév!šÊ5àÛtçÿô_×A at b3H˜$”€J#S,j!HcU}ð©5qñ˜j+k¥#`¦Zp4 œˆÂh½üL;RFÎðs7©’ÆŽp(ãüƒ\HíÔŒjûÑÈw\ß\zÅó<öæЀM·ÄØUëà›«2ç
¢fæ¬t欚ûä­«t´è4$,^ﺵÖفEL=ðُÎn׶û ¹òÀD4…Rsú·AMñBœÇ¡N›Ò±ñ1Rêu‘â´±þ¨;ó“q”«d¬šüŽ;ÿHá"bäÀÈÖÄK±…Ây•xW|xJî,ðD\\©yCi´ËoHôêæùUûi9¶Jøè2pæÈLËHúu&œ§”þ󠇫¼ÌqKåðJlqxn‡Ò{õ7\4JÙ©ñ|¿ï*fǬšÅ‚&ý2KVÞÓct$´©ìÕÉ{·mHIÇË>L´²"Œ·üɍï-ó~œÔÖÀå””Ðã£
>úÜ9ÓÄVge…WÆ™-‚ÏÇïk_Q3,yÒWžºBn¥i0¼4wç214z§[{[»›™t›~W0g‰„úyZ
õÁ·Áq>nm5.õ¼G‘:¡­Eÿà~«Ð^ ÃAîãuOþM­ûâ‰s×¥L©Qh\µâ§æÇyXž³8D¦è
–¯91%ŸG q¬C‰FužÝÒ0ªäµF[¸:RÉþãx®ãϸYRn/Y‰9¬Vyp:¦ý_y%7 8<Úbþ+¿hÞÿ1£m@#~÷ïðšs»Ôè±+ýôÍ™f×°?8Ò¬õ@=ŽOZµœŽ——ÖãའñáÊWöM™@&`¢ëŽõdèóæŸW-›ïðàƒhÛâ²³ÝsH²y7Aò-·ý‹¹ßìÑϲÏv•9š?l?úxƒ|ÀòH^~'âL¬pºB÷ý)Ԑ£¥HwµpàF4 ‹âÄ<µA&‚^É?®¬Ôÿ|{<iBËMq˜PüVø ÿ×ðFL¬~hÒ[î¬÷rÏϸ4]”ëÑÑíõ£h—<×FıõÜCÑεh¨ú˜DABî	…›2–âôNXbt^??v¶wƸU–]™[”c9¤ÆÅÅHÒ^|3<н”Ð<ÃÈA#ÎúSÞÁ/Ü-óh4þ/¤õRKÈùi”óä½òXîæ#v	Ã¥þ€ç›]C!§;oÜXÛÁ¾’]’ kn¡LáÄ硫<í®¯
Hâ¸ì/#@”aH_3f:ü=ÉüDL<G_Ð
‘°iUQ+Œ/@¢°â	8
ö?^Óõ±$FÈð/þËï’T+¬­Î7APÿ@Õ,,+‘CWIÍ™V&ó~Õê: Ú*ÄR8Ž¶ŠïG͈š³XM(!qd½ê_œ\’s¥pš˜Ä=²Þå$¤¨&Ô5ý9ê1¦CÓgH4@½;oz!7-ÀÞØw|üzµ>^qCô
D$ñ¼í Õc#Ç¥PÀOYoT"Ù£5D˜³W6p!(›@‹Tr /¥Ïù\/Óƒ5™¸Éö_¼aëü.ß
@ÛÃíd€H˜Ûρ”?í´O^A,Ãõ5XŒu½	,e‡ãՐ¸c«ÓŽD¯5ƒ<>‡)/¬À4aŽW¯¹Þ|Jtq–Ѥ'ϼÒß(ƒÃêÀ‰‚—„èghu&Ð9ÆÚ0G{-%5‡¶ñønÖ¿!‡oP¦c¿lŸ6F¢Ñàõ9š¯3JtŒ{wÂ×ÑÄzjxi¾|Ýk¹g"Ÿ#àúœÿ#B;ûííϾ|ÄìI”wí ^Vµ–<pÀ|=?{í@¢Œ5^¥4’¥³ó÷½{kÒw>þÞìZ?‰'‘s_2'$çyo­£Ùn%
'O.—gŒS¶ŸfTdf–«;u®{í3KÔNöȽxðžjŒþ/pYNçy5r|_ø‰\‰žák!ÞƒQR,¤:(cbüÄø4`℈êídnð\çüWèî—oэÇOMã »ÿÑȨ̀ßs¾V*½µÐ dO¤	°ª`ø5g
ƒÖÑ´‘Ã#‚Ûºñ16¶,<ã'Z€!‚9•ã>3$è¾vOï#á«ú£«Oó58+Yß“_BXaQ`þzÙÝc‘4…Š	&fÌTcÙ,¢Èƒ7¤eÝ÷1?¾=KÔ«Ð#
Áap¢¨±¬$G"“´sxóW‡Bîì3+×eÔÊ[ånÇ/À,Œp6"-WmgT£øýô
+Ÿö´Á“Ò…¯+<Îa H]3ÞkFÂø큦]B‘Î$Þ¬™Wu¨:Tö„Õ»Q£öB zß”GMßÆ#üž»€µ¬½Éþà@m»z3&Ž«Õ꘦¦rÉBÐDU?P
EÒƒ{`ƒùëL¸ë)îG?›LRJ»I{§ô¿ÛC}gU‰ä‚¿]t°¢CÀXò0µ I‘5ÝЦ?Á9X#ó?+Z/F\iLÝW:Yâˆ4`S£/@'W…p!9«MœhJ#¿ÚñÝÇ¿M/oô(ŠiWú~ö5ÖPõHb7uD$qâÁýr=¦êÈ~
¶7‡}¾pŠ™-…=”V¹Îš<þ5CC¹xúÚƒnMXúÓÛ¤ÞÅ2µ`»;–5Š</.e~qôµÝQñ„¾,áï
XèDVU@Á­Ñ/ªž0%"Ý7$\ˆ¤!\"Ü è¥$ Övñšú`ú>ƒQ"#¹<I$ÄãobQ_ðdóûï¿—úa¿ÖžŒ®Ýø.éPAÓ”÷^¥ûÄ`†¡ba•8=†õG×$­é›©ÄÕý;ÎÑ
ÄÛçþ×M¥:\_Õÿ8ƒž/räÃ]mûÆ!L}ÉüWÔËî僣8]ÜÅ;@'ÁQV>#†pÍùá Gî
Û.0Lt\ž÷˧Øš$‰ìU¡ Ï;Iñ™öÕŸš7*ŒepißO ý|¯ÃC„=•=áŸ?Y#ï´T¶3¢è±zEj|•Ùùw,K㆐¦tV(¯+CG¯„„ð´]c&ž7E
C´ÊÝäÇ„¬Ø°?Ú1)ÿ75tûç
óŒæ»Bà—8ºJ}rfÔqûUóFÏcãžØ¯ë¹y*™‘rØÈV…Ѓ^«nö½&š·ªDÈA%d)ó¡Ö	çLJnØk³>ö|¦Ì¶®KÞK›ž±ÂÂcÔÞ¬­ùïù®Æà©è@.½5­WòŒyáy—à¶W¯Ž¢¼èŸ£bsŒé`î]69†Qi$ªÛÇŸ××oEçö-,¢kërÕê²%°Úr.ƤÜ®ä ‰è½©ñ¢KûᏇ%L/g øLe?–*Úsv>Ô'VŽ©U>	´(0|!éýLrwÙá—Ä(ð¯ç¹4yÿeÀÑK¯ êßÍ~õx­Ý¸‰™Ø]Œb¾Õ®Ü>=7$È1/6>Ý­ÜT´l¶äÈ«Q½¯òZ®hX4˜¦h ã‘ay_­$HmLL1Sm-¨}Ý¿s>¨zݼó?Ûÿ{ë¥k 1ÊSÁñŸOúÿ
ÿ1ü…_Šñ?Õb‹§Ø+ç命w¹/—ô¢äIZ3ÿ´Aíãÿqfª•xÒØž¬Ò(n•?™â/U‹ê\ÊìX]Yw)ûOûÿšÕÅþ­£û*ü<é2¼þ;/Ã3¨]§š½æ—á¡HCáHŠ¤Ñ¿úóêÝÊé奡ïw†|­Pyµ5þ ¦Îäÿ
%Pñ¶0½#ø	ÝcS,¾s…[’#*š
„Ü{«›š!ÉÓ‚*‡uuð$ÄmHp˜VïÕ(m÷/  Ôi/êÑÞÀùÒÄbêiH‡ZÅAeкå
d#Q¦	ºpúÑ@PÕDDD¯èƒD1ßs¢¶ØL7—Õì]›]‹©¿	û8U(Y­2 (Ër&:î
«»d.ÉGPyœE‰Ùr¾Ê~>"þeA¥ò2ggíùõÔö-%Þ0B`
¯"’a&éÒa\ë€VjA2Á†ð«-÷Ðc€€8j¼$J±óÈMhmW"ÿîR½ªŒ¢‘h—@aÃÃ\ŒwÞÇ”Ÿ:Fà N–ì˜Øc·}(‡$ãõcíjmv¼™Ñ'–ÅÎÁÞLÛkd3ÊÃ^J¾{¬Í–&Uœw®¨+”Q™ó¢gÇpÕýìS&“‡¬ÊûöS—âîäTźé¢U£Éþ=¯³qkà>ý›Êñ³¾DU…å¯çr:ED ˆžt†ÊYÞ‚yërÌ¢ãlÆ&¬ ÆRh26k+·…ãâ
¸e\'gIMpø·ugLû½‰óidmé–-že–ÌÍACÇ	›£t¼L#Rª\nlÉ:'žÍ×D·nQ!zFZv	Ru|R칧¯ƒCíô!X]t ‡%X–šæ1é{a2.:Umâ4µ I at zVŽë…¶áÑI U1`äóq˜»Æ'®ÊäaP)·+üæE¯Á	VVÁÆõlÓú|nÿšvÊ{Y/ÂîfhûL²ø­Ò·_”Û‰Ö,>ð²çúWaGÀÈÑAáàÐË¡ÕQngk|!‰¢ìo¬•¶ºð¾5L.‹ªê<ýŒ‡|¢P±믤ZÞÒ”Pêo¸iz÷^PÞïú»¡ï©…©éb<ô\©•ì{™ìªy~‡-IÑü…Ãœ÷k4Ξt5…Íz1‘A°.”—`Æ‚
¥c6þbËŒ	àÿdJúÝ»ÔRÄò‰àH9š:žÁñÈ2’Я|+ÒŽïünJ诎îe‘8Ø]¡µ-6LQ%Kl.÷b‹àÓËCw†Ï“Y÷“Ö…8--õÞqóÇ;·)ªA 4¬Žõ[˜<-KŽŒ\ýI†(°Áp«ñ8!Þ*Ð
}‰¥1
Ø^~©üƒñJô‡óÏ‘âñ º·îøøGî¯Ön­•^7|¹!'&‚0ÕŸ–{û™H=ØSàHæ @Ž>yÖ‹±R`^$¿’Žg—ixQàÃŽÌ&‘=èà‰Ð4a-´&s<Mð._ù#Û0VežäYsÃ7;nNÓI4ìÿ2Õnµ—Æ©ÓϤ€»_Lîz<ÈB)½QSmk^ühÙK¹$X.uèQ0˜ðÃÜÓØG0f%<¾²’U£\eY	
²Ûæ÷[÷·ëèÚ;‹jõý
£3"éÐôk]øRô×È|»Îæ«bsÅ.말6úÊnH:6[«›
¥"èŽmùá[i8ŽÈ‡×YX¨ÀUH%eRî]•$ž?„(ÇòÄO|ŽY‹¾súyB%Æí=ïÐêŽÔ:–įfӍŠâ~Dò†Œ£÷·Œl)õúA—ZBÀÃëå%Åš®kšDˆÜÈŸ·Ò×ùÅ+äØÊ>•bŽ´„ÁAê%Ù#’[ç@äüýž—IOyìe¸?›†”=ÐϨËÏÈ»l-,KöIe,’‹²ut
¶;ÖR™{†ˆª˜k;„05C¹ÐxÂAg©[NHHŠÍJ¡¥èÒDC\ê%A7ZíWÃG¶–LcÅ,wiqÞP9¸-!+ÅÌ1–£WL|Vºíe¼}Ît|wÙOŠ	Å ÷äÄ¡ê…ÞÖWOo–ÒÜÞf&à¼Ø¿;%¥¦{Ÿ°×ö²ÊûÒú M´}£¶ž7Ï]TÞÝ.ÞBlgédåQïQ„e²
œ6 úfwu߉	'+T»¼ÙƒÝW±FüUúyÏ?2õë‚ßaöO‡_áŸv: NS y|ü)›Ðôi£÷O9AØ5vÅ'Hx9Ž·ö%
Böi¼@… ñ§Ñ¿¯ØÓwÃW¢‡ Åø@¦}¦¿"cÇdñ·õiã	á:ŠoOg‡§aE Á›ÎƒG×Y_ׯËÏÿ5a÷jŽíÅÛ¢IÆNkÕÏù¶×c‚ô0¢·Dþ `’]¡çk»&ÖU“¹ÎFª6XzÑ¸æÕVUþá,½èGL»­.WCµÙQE˜Ð
I‘}üÙ¤Ò-D¿=€‘MG—~GœZ?Í%·«ÆŸú”£ÓzYëÙ+y=AˆÆmsó迼¥½Ï/¶'~ø4UõŒó¼Vˆ9]×z5&@ØÎ-2™Å‰ /7}Jd»¯Â +k‘‚7;J‰§ÖébAN¤‹Ù8ô\’ùÎæ˜ÅÌš+Ú¾>’µºÿ’UÐÓƒ6ÛÎDvã¾¢zÞºþxÐ<UÀˆx‰ý%ªêb>ØÿÛ{gà„fX[iþ.2"x­‹Dà ög]Ìp7s`Â8ÿŒ^r™Á¾,²êAÀkzáLL`å_}ËÓ@¤Žù?7¦Ðן·øûf˜CJ+œ€€Çªéfë̱Æë¬RT•ÊæØ”€NÒÕQ¹·RBß<<âÜbuäl¾´÷+ðÕH8FÌc8¬~…ÌžÎÉmD…áà8«%.ÈeÇü<ÞÉ+ÂâPÅú;ω¢êZÁÈ–š
@LÍul^-É‘0“@dddµ!) ZôEÇÛQiŒP³p<}Õ €3já©@Hµ¬<êt ¬D2F_ä‘ áb×eGÀ¸Hå¿ŽË 
N»5dñy.!UlËŸ&‰(¿¢ü#ÞB!?5I㫪ڴl|ØקùøyàrPæ%¢qdé(MáƒNXˆËª”WGátñVókÓ·—†klcP¿¼?L±µŠ>q½5§’hãÜÛÔÛd”¨¤6¸À‰˜Smm¯”˜7VŒ›@Ë>¼¬Ðøª{
õ½ñ¯àm¡ž&   UŠŠªþ¶X(mÛ<×»,¿¾¹)q3Œ/#ìý*º-ÔNíWT¤oVûãÕ½y×KÕßéÞ÷^û̾l{h³$ª†$t¯{evª­L·A~G-ë’f0:U,*—ÈöÅ´nƒ–LK·^cmÙw[áþ€zWè£	p1dÆøKZ¸»¯yßùÖ)°íò(UÙ6¾zLL:©}8µîß(ã f‚äá„óä¾âìedG=ïÂ۝ò êú^cæÊËœ:òèrÙp‹•ðïBž“AÕ{s`&Fq"6\õ¬ñ³¼™6*zñ}$û m“±õ"ó”	;KÇܳRJ²oÓÅuµ}Äè‡ÔJs±ÏþH­7ìÕ³™›ýx;§	Ò}V‡krP>Ť·Þ
ó_5¿[R‹ãY4·Q{r]Õÿ1æ?ÈÿÿEz<ƒFþŸBa  ¡:4ø?„ÄýéÿZÁ=Í[n/-ÁñžáõW[²àãÒ)¤UO	Š·½¦O'n_a~ùk¦y0´Ü¹*å¡~Á›Vÿ¡²}5¨èMÑ< Îaš„¦ “Ýa‰œ…¯€ÜqàÁdIžç1¹CŽHä¬d·½Cã‡Y¸½5^Ìw}õ ;‚Ųöe\ÔM»ñ[²Ç„ãðD>	JmêKÑ—øx.œà#¥Æ¶˜í@b…£Ò˜xÉÚE «B`d¢¾à(DŸ×_íqÙ—=µ½½ìbD†Ѓ‚€Óbc:Ýᛟ‚Ñ,¢*FÈǺ¨‡º hŽÚÊwWMœhEÊgíæ?~8®öi&Ï›ÛòìîóØ¿Ö= b2§’C}Æ于!C iq#x6)­˜ˆ-Ìøp% 9ð<	@ ž±Eâú¢»´ê7úξ.Â\ cwújìþŽúÕI¡@ÐXÿ×[ §ˆlt"­¿v}–VX4¯È¶ù‘
ÃgK¹©Ïrsö¨"s‰3cPŸ>w+=*â2¢wé	¡q§ÞHòÉ>»X9±z]´ßtªØO?ŒÊÁü}Vym`”Ã>ˆfPv÷¢-_ñ¼§ãfÈ72]sÛtñku—¢D9U•U‹fK0­š©( ¸ŒõÈž–<ÙBR)›	Ë{¶ÎK\âã0Ü	}$ËÉýt*:ñ`áD·‡r1ß
‘¦FnD´âÞ†á-/Kƒ¿(µ±¹ö”±“Û90’´Tør¯Z†Ón¡pÁï)ŽÊ„*¦ ;C…XÆô3å”GÓeßÏKf¸>£¡¤Èxî½9;‹²À§Ñµ°iz2êÂä˜ÞŠnÒ¯CfŒrŠ1Æ6ùŽùô k}abLI?	Ÿ#<R_zhrHîV¤ØÁ3i³ãqUèzŒÌ@TèOÄÙÒúV'S@ÝjKØgHŸ»&E»ŒU‚ã[™q»¦Ï†!hËq”êñFž8ƒpràqÉô‡…÷U"œŒïi‹âæÐb’É}è´J`MŠÍD_úÔÛkµGî	Ò}äÜtï§7KhØ©)¼añœ9Îôñîñ&
ÛRq^†çþŒë©1C3è7GËT³AÙ@mÞ^•/
?CRÃ\šàœcž˜ŸVLp¢SœÒxÄ쬀Vf¢#(U†ä0_ó42'T¿¸¤]+æ í¤Ê¸~hPI»·D·MHlr< >c“ã~Îî€ê,½CŸ½»VBp…²M…ïLᙜãZ„Ä:ßê–Ã4Ó„ ®Îf™åé>?U¬€>½•Ø`s<<…¨‡DÕ\~)Õ…—<MɐûÔ[xß÷qÄÒgÕ'‚UŠ{yb…¼"yöÉ	`@M–¯<dJÌM¹ƒÑâMBÜ|km­œH.9sƒFlò¦Ã‘™Šô»¹{)Až'UçÖÁa´àéÐÚ`Dî­ô
­y`á,¹ê3k„7VØ•__KÅéO-p(X5×ð?þ‘ç["®/ëTæ½ËEœÚE.»­ÿð”ÉaC®ïv‡Ä sTì56•4$؉NƈÒÄûúúÐ4Š8ÛoZ­Yé‡	½†r·súl´È@:¨#\è æº€ÝÏíoRŠPZ#€ •FÛ#êüfE¤ç%å½d{ÛC>I€Ã-­í×"é-­#á)rvP¶÷96tÒáø0>7XÇï1÷Ò?V-¼_b6Š^;^CÓ—>š Õ¾`y*Ÿ•qò~¿Wä^TjB,fƒXUÐvç¨Mw­úÅ®m£e|î-8ÛO²,Fcáœ0­4ƒ„4—€‹ðù>*|Ššâ儼eY;”	¿RãºþÜp_þp?'úÉ>&ñ¶Ï
þ‡fSSS¯náâ×^ØDÄy3wS…]’ÞŽqK†øð&»s·,ÙßQÇÒpÍ´š6Í	hMßëþ£/”Ò@L(é%±Zp£UOqR§md£™i+ø­ö}ý5žúÅþ“í³)ù6êc5kã€	S»ß¿/­®ß;Þ{[¸ó¨dïK³k¬ÎÕÆáˆæk¸TÀ>è{Ñ씈ۆÎÂ×Ìj@ѱQP7Í¿g·Ù°¶–›;}1¤X™L&æX)2ݽ»tÒan¿÷¼þȔ@ûÍÈó«ô™½ÂœŒ¾N´´·ù¡[å‚ŠÃÙ)âaãÉ·Þþ
+̏„-¢;À†aþÎî_Ô)ûˆcû–~ +YÝÆ!ì‡CÀhA2MJã¹Ûy̤ÊÊåFv?ÔÈ!‘–Ü ?{é
cƒ>€±J®ØÏ¡ÙËþqw¬×U}ô[³…‘Ÿõ]aí`ür’í	;`\ÍñmZPj)ñ®oy°‹‰è[OOmÕ&wWZ^]d¼±nM·©ˆA@ù‹ˆ‘„>XR%"
hä¹]&Œœ~ëÛoF]·¤nÇÜüt7zÆüځþv»÷¢W.s»•ZikòïÛÕœ­Ìúz:°žAÎn:t»º÷ÉåWa]±2òˆ¦pÔbä6˜.1ô£½|¶Làºr¼ý
·j‹U* Ÿ:o²©110›H*F«'±ïÌòıDúW¥
ò2Š…Ž½ÿÞ
4ˆ5É%±ÓJlÅòEU3“X‡Ãß	oæݘҙŠË4ä÷¬œmº½CpO]ƒ°†½Ž1壵¨ïÞ
x_r°×À¸áç¥ùè&ôèÌyùÒÍÁ4îNô† ›@Ø«Z
fÉ$©ü<Ý ÝÖÊ
vx<><Sò›WýëÓ
çÌÖìËÆ€@^¦¢/3¿§˜Ã«öƒ6yM‘ÞÁ­÷“Œ7vv®:&Öªh]ï|œvóÑ‹z®w©)Iôfέˆ	t±1Ìèø­yŽí“Y¯ÊTÓåЍ'²¿f–ïò¤™ú µ_Ä{o[ {·ŒubÒ|Ry×—&VÍ®ûæ>}Q°¶}óõeõÏ«ñ0Ň«÷Õ£LÚŽ}£‚"—½þ˜	5W|ñ,–¤VŒÎMjr[@ÛŽ×Ämszöó`ck’n×:²‡Ëë
86–`’'Á£káš)كĭϺÛv·Ên-[y'
ômˆŸDL¬HÝ€ÍY
Ar#ÆAäKa¿Ú—N,é«öÌÌ|lSÐœŒaY'léoM3l³µk/ªªÈ€4q~ÚÛ‚÷Ž’º¾kåœ+–†7„cæ·´yn¾pRŸüÚ‰¤¬GH†zFû—¢“x
ñ9Ÿ©ZXÄÜŠÜw”•›ª&±Í w-ÅÂZî4}Ù1jÒØוMG?ãx0Q”5*°¯}×sâòüH”ês‡Ç|8uòÉ'¼P™«ƒ·yd®…î›}W°“ãAc Ï°e0W	–xsÚkë㌿Ì@Þù(ç÷já¸ÿûáÂÎý‡ÊZ©hŽ5ïdŽylF at ZÔðóJRd•ìaÓÑ›þ³IŸt¹0kxbbΞ*'l+ú¬CX˜W€SBdÚp\(:Ѿ’^Ô®澦¬œ+{ø4à@®†äQ¶Z9I»ã«šñ¤e̽­l·W)µ7' Œ"^&E5 ²ˆÉ¹vÞ
u4Lto|2¹õýÚpªl—³€»Âäc-¯íò¤Ì¾ó?7"
îFd‚CG?ö” }Ϻީ¾ÚÞ¹B©¯ÌZví­M¹¡<@¼Ë° ±Cœ¦)ñ‹¼¡¬†I…±íƒ£ìÅrà8Ólõ¸ó´ÿM±oÁdò-¸Óþ®kœ‹í;™M!Ê¿ÞO•UÇùžQÖØi¾[Øw\4¾MØ‹
x at 7Fóo›ƒ¯˜Ýs\)QÙ)}oÓµ	£f’yâ(ðV6žA…S‰Ø߆¶|¶z3ïÈMê×oÙÍ-hsr³¼­Kþ¢é]Í(ç> ”Ÿžhº;a0îã…ŸÑIˆæ ‡ó@Éwnv®¯½*p>X¼Þ#(ÍT=ôSH!¤JPÄ“!q¨Ân*?)µ*e:°Úå:§^ðÑ{,M{QpaÜ»â# Ü_V;~Èžä$ ±¤_i)•ˆ¼,?Ú›³á}ô¥¡ÝÓq+R,â
µÅVÀêðºOÓL[iH&(ĐÂx%šF`×3ëþM§Ã£ÀÇ—-Ž¨GDéºLLÙBÛH´ŠÎ °êT¨;÷:ÐŽ"6övkrÄž¾IÁUÁ c„“<¥2?'HZ™ñ
dÊw¼s-çôaÛ÷çªõRU%ÙŽÍ¥F™Ž"¥	E„áëÁPÏÄn»[o†ùˆŒÉv݆Þõ¡G¿­µ¬ªúM(õ2ŽîÙY³Á£Ì>dfÿè‡E+ýttлgî¢úß鎧>ïØmŒÏÓâŽ íp!§ÈPZ®*q¯<ÌkKUI?Ùãæ<$P¹èa'WÀÛ‡dŽ«/V²[+DÒö<xHixt];¨‡dã<ìgrà'^þ_	²À>—ƒºÒ*GMÿ÷ M5¥* G9âñù™*ÒVåÜ$óV7—:c„g5%¨*ú—-Ç糊›™ñ÷b3Öµºö9ño$%Q²^‘ËjŽ‘LoÒßaµ´NPcÔ
:j¡…ª;ÕÒcúDkzþÚÊEÚY§ÐuñŸ-ø¯Ê£·~ŐÛ„-º†ÛŒéB¯ê,äè<óÓˆ«Áþb]Aé²ãÆIwPÕÄ…Ö¶ÊP8;¤ß·[YjôÔï°W[Œj¬®¸z²™·:?Yýæ[J8	üŸ×._¶È3õZÆ64ñ´HÎ
®:‡NjòÚ°¹*_½HÞÈpo 6¨ êÙÁ]ö‚vÔeÅyæß_Ô¤!Éz4¦–ŒU	Emñg'ª¡uúgÓ7”¼c¸y3 ?äy#RüZçª’~ÿöWìø¸ñ¿GBz~_q‡ºIÍÅÒá?yËzðÑ*ᶟ‹fEÎÑCðhªÊ™BòÓO——?íjAqZìV×	ž,ïef’ê³…sÃÓDD	òìS/q2GóëN.ÜTKèÝ/ËÞ;ÆUi³ÄÈŽ>Ÿ°"»èo‰ZMQÛØKZ­žâ³B#Û2|ÌŒŠy¹á£²!]xÒÑe‡:?u>¦?öt@<Nq›%ŽÊ
ÕZ³ÎþÈt@/ŵúdsTåé{LúYžbþ}ß=YµZçL£þjhœn3R*FT2.w®	v7ŽÆpËß»
ÁÄ¿h?Ÿ£÷Ín`±awà¶ñ`¾-ÖËÀ `WÿqÖbåN$E:Ù·Û– 9ž—q­ž.‘ÁŒ+ ÍŸGÖ„ä‚ÛB2†në¿×c’ó0p0Ú¨Xyg¦(:M€+–ÝxãíT-1å øûƒèHÙ
Û£+9[}`—Ò©…ìK;õؼ40ÐƒAõ¼[d Tº”Ø%KÃF¯-s 
mÒžŽc r2Œ%:¸Ïz¦›’CâëhúÿàfT×G΃µ‚ñõv9w?R‚Ÿ«å‹nµËQ$„ÐEwÖ×|`Ph#P6%úë9®´ˆ´êÿƒ	ªžª_ž‡²Îc
&“ú<tñt†		ÐßOXc
˜$Í靬ߺèØÑôöß+B}¸[`°{
†‚Õ ë×?LÖßGõ\Óz¿u–Œ„±4h·<ãcÎ1¾NJ7z)Õ}GRF< ÆÓÊ }ó’ûöDßo¸wuèð©óÇ“I-Ô¼F8=èJÔÄrà¬År¢;­uŠµ½b|“Ì[y
xŠÂ’æ¼åƒÆx±ne§uáÚ3ûbY^‡(ÅñÖY…C[“)˜ëRr_š-
@‚¼­…§Bvɵ3iEquI	•×zõ!5•ž˜ÎÊ´¤EIøˆí3î( ÷øÛØlíkƒËOZ_˜Þ줛ÑðE¼k9ÞÔÙ;û-0ûÑ\æˆíȸînÊY‚õúr)‹RþÜÆEœ$M;ùƒúuÇ‘¦¾‘)Zî‡Åýq†Quëqµ”ê÷ýµeSæqƒÅhÝ”LÜ-uökÝ_£×m_$$¿ê{ãx=°‘&LømO˜@Œ%Ñü÷ýŸ¼$z@Ç‚°Z|Æ[Ç… çˆ¨IþoäÊ„9¨×WD‹oïuz[F‘xXEÂä³QF„÷×e¾Xê+'é*‰$¬$ªÝ	m܉¿àýH+¢1o‹ð­-ʼn8THú›ÚŸðûx+´ï¦`g‡uÖÛÚÉø|5•:jý®š2Z‡E€ÇllÉ«&\•ÀÚE—
B›£ ·ÕûÛX”TĶÕuÔE*µè²¿JèáÚðz‡€HäÅź™PkŠ®"á°8]P¬%T»õçÐ à[+ànÈ@Á#ö|†Ð׺;à5«l{©Lç£^W?„´'XÖiÿ2âÇ󁚙ȝ×ÂÙ@¡/“‰#f*8QŠ8;,¶´9‰£¿JçÐ"“yè¶ä)5Gyµ5ô!ñ7ÖubLž±T–³Ë à&z”üöK¬õâ#,rœåt@¦D4ó—ȾÊå¹\fÊ#°	-úôP’½“ˆléF•G¤uæJŒ¨V©=	R%“ <­ºqh ‘•¤6‡„—Q ×@R‘B/iclH‹ÕcöeÒ£gá€Wëú÷ù½5Ï͍ؐÚì	%YTt™ï›….‹/×ÉÉ
ÒÉÁ
¹fªA«H*0:0JÃ$÷$•ïé»Ù•Ø—xÔª½œM—ùùç´t…®ÿº6*òº§F*>ÛÉӌײ6ÕtcûÙÆÃ.`B¥-='}_Žf“É3f®k™[¶V€èñÚ H‚„ÁÝþIÖ-véü­ù›
óÍ:ј]°ÓB¯%S¨¾Ÿ«¸þ.ÃG+žº¥H“Y;kUç¯Ö>&ãˆEÏÁO#™u3™7â_iiZ0Åhy£K`óh“‘š~‘óÕåœðKoéÒÁ…¤›;
¼SA^å§Á
oµÌq§/&a~°W@);øúƸ”¾±ß„„kA{‹œ­s—¨ÇÍÜüñù
駺ÑéæÒ?h™
À蚧+/¥²æž¹zˆÕR‚ ºã?¤ŠÄ>7*Ql0ƒ¡>Ñ€¢E·þ0í?ýωIô'âƐ³˜^Ïp4<Û²óóºí’Z‰¢ÅMuƒfø`0ÖÀÂ,À¸&ù¿ŸWt=ïêørð¹ÎÖõ8OÖ¿m¯Y.Tron¹¬÷æŸãªíRò%s\üš	Á—–ªD«•ÄTÖ°&ÖWpßeO­ÈCÖÇÉUþ.ÍHâ/›ñÐ÷Ÿµkcó¢bE
»ü.Aÿ¨~é°ëRx«Yi®*WR½ªf.F41sIÒÇIÁ¿œŸ?ûòH\Dâ­LëW&±›e\ŸO43/^õ>úbßÿl{¤¶}‹¤W[ymch1B…YÂ-~
¹•@ä2/ÊÖw/˜~sÙ‘ì2.mcFÖÿpŠ—ÎhBý	Œ6XŒ®_‚+ŠæG´ôàÕ¶ª]\¾-̘+UÄ*·¸øÜ÷SdͳÉoQö…9b0ÝÆ¿)¬"ÃXZ¡uM¹8×›¯ ’6P­¼Ë…r:â8#ZUæ*<øÛýfÂݶ÷ÀË6P¨‰Ù<õLzöÿÄðßüî‘‚Ôûž#Hrr Xý€¡Ux©˜*£Ãzd½ÌÂG
IJË>Pâ¡6’èð´ÚžVd4vØ‹”ÎŐád’ -Ž”AºàÐŽ÷©^5
ûaêAáߺñª2Fƒ$=HmçËòÄ©†% s®Ë§ÖòØô/
sïć¶ÛwÝ”úí(£Ç&Õ;ï)]C\[´ñ¶P)À:¯8lVˆ¥¢G<Cïs_Í=áóܧ«1\<¡g‚LM¥î#O‘^Èj ècqj|³	?vàUA9 ˆD¤ç._½ª%_¢©¾Ñryƒóïß¼Í;šüŠGú†xÉ ©9•JÚÏ´ýó„ÈzËmdëÚÒÎ"6¬Qí“FÌ7ÖE‹‘Aéærº,®_Õr	‹Õi|¤b*fõ½§·wÿ÷ïo¯*–ÃM,cnh@
^0Ü>5RóÊÔ‘P\°éøò°ÒÝøå³d£öCïð-•ûºÊ•°‚”øƒoÔ@Ñ#‹eS…¾ó+ì ±YÁw8HÜü8÷\;‰.;ã5ÈMxþëgZz‰+$Šà{â)›¢ZâwúgùÖï ’c«—wåžžiÜêÒ”0¡×•¨Ž“ °Š—–ýÖ6¼Ì²­šzGµqƒî^|–{û:¨øDm‡N4Ý5ù«P­{ õ}½Çˆ1F•Fõ å@õÙ¬üá¦deàfB†3_ÒÖÀX®DV 'ƒ°š×é5ó*׋7—•Éq€KÃCm
3”ܵ¿uäàÁ0˜ž¢½›‚¹¥{0FàEtÇ[aRó8HMbPøBq³Òc¹&ù7ë_\+9è;àazEâc‡6^"D"Ž”!óèÑ4•†|& ¥Bï•<©?b¿	0’õ7sÖN²X-ǧ+¯êZ¡AÂä,®ÙVäüF©²)¥´Rk~r–R“—â4J8q÷3¡ª‹›óœ.E\7—ÍtµÇîuëŸvŽ5NçwîÖÏv„=[w1³j*¸¦OÙ@ùa’œ<’|IAAkoL›‚n¬«-Z%d&Év­~ls4n¯vö†§£Qh:V†ƒ	§4Ç{ÑÇ’§6Ì^kâ—·`LG/1‹^1OÊû%ëÄ¥¡bƒ9øëp—.B¯æê-OÉRNýœï À]Ž»t¬æ¿0‚„ƒÔ¬LŒ\E¹‘›1‡Eî– Hy7£$ϐQ‚GDaãG-†ëæÙºüè„qŠ$J	%,þ9C—yPær“Yáòž‡1ŸEõ}JuŸ©íÀ¿ð>±›Ö¼
gp•Åsüyb+IŸœÀF†?}yåª9ÙÛ„±µ7¬++fî)ùªm½IÂOÑ·¬DJdóƒdU‡>dlFgÏÿ3¸mß@öBŽ”«¦|¤²ºUÓ3<òrù.à„ø¾Ý31|}ñÐýE}ßbÖbHÑÆk$G
Ù‹ýãw?jyò–\ÝÀ™$DÇu=8<%N„Hm[¥1Pœ¤Å#’a[Ï0à|<&ÎáŠQ™»û5ªàÅ+€¡¯²Iô¬ûözñ4u—õ<̈u7ÍÓ½)æØgKÒõ}’¼[”u…:§}—v'Ù}ئôÚDëFpŽ<r8Hƒ=“Æ\ˤÃÛ‰º*öËb’LèØØ>õøáÄ‘‚ë›îC„%SŃOèÄy¼ƒžBӏZ ‚zÏððÉwm¢‰ôëÛê¯D·}£xGn3´+L@%¯Ók쎑9öæJ¸[ª+év )Y!U"îýÒ£ÔòþÕ}ƒ“‹ÞåŽÑ“@ÛãÞê1ëSw³ôsBmd3Úéq9%‰ZüHh#g¢“:'½â›W9âówŠ=‡…Z%höźà_n–ä/7;¯÷G¿¯òX“Éî»Xv•·c6˜‡
‡¬)ÐOJЛºZa I¸á•l´Ý¬ÇpâéƦ°©·9œóÀºX5/3þ€¥¾œø½?>Ô‚PØǪ•çVá6ÚÜDŒ=鰍Þõ´üÏ-Mès ·~
…°Æ½¶J©[…åHòÐÓd¶0dc­t±õqg>×GôK:;«®«uV9Šr¦s˜Ãm$2ì*9ÛƵVMtñœæð,O7à pE+å…*mˆ„aüàÞWV}q˜
¬a+œ¤˜›ê¢@ò4°J„t?ÞAs´!‰¨FI’Êr½à=úhṕ¸B 7k €Ù[ø¹	Nñ7ÜýkÖAò×ÁSA|·dÖ˜«¢ë¶¬}±ðng*3·RID`ÿTÆ~C>C©7,wø«9K®{7ë)¦|ë7À| ‹#H²*>[©m³qbk ¥Š½H_®íkžˆúµ,äÒüB÷«Æ¹}›¬±SrˆÃ/‹8!Æ£ƒ²Žx at O]sÔã WÔôÉ^?%#ƒGrï~:}qy÷ø´Lz¶“V‚2§NoKsMãxøÂøÆÖ÷™Å\¯öO´Î=›1¯9Ϩ+£¦òí{NľÈ/*h΀(­7êá¢ï&htÄ\“%W¢"ÂmgáøOSÀÒYÄ@vZ}ëDB§ÌɈ¥KyFŸp»’<,½ðkI¢˜¨É¸X°…£K’ãGÜÅ`1éõbŠ]÷O@™zš÷ósŒ¹·µ{àq‰-ã×
öqœ¤ZSÞ­t=¿Õ;<èîÈs‹XíÙ€Ÿ\˜¬·òs>hógåïE‹ú‡Ç3”´18øŸãºÍ ##£¿3PÊAÀÁälS‡%‰MÌc(”‚do4uIý«v^¬©þùèÕu绿ήF|O¹·—Öœdn1ɾ0
wg5‹äù¡ò8ÜL7P	S9d‘e\V²`AºZ»]uõ9­üO×9þ{Î¾ˆûÑñ¼³?89ùM¬´YÝiÔ(‹®Q¯;–ÈHp«8³™ÔJY3R‚Srä¬g Dœ1‘…Eí59çÄrwˆ“è¨0®”¦É¨[ËSôkó£®Évš)¡SYtï?–]H©“d<=šÞùóÓ7o~ˆø^ïDâ9pLÏåABÝ—l;t‰lŠ¼
úg6·Žˆé!þîIÖNƧjªe>
Š.˜´Íw¬ò÷÷Dµ~¿á[ýɇ¸.å/øÚôxñoæqÎͧOþãY¾4Øί-17M84ß¾FNÄ}'»ƒß©«´XÃ-Êñ<¶ ÉÇvºÖ~ê¨:¯n&Hhz]çEä$dÙt¹õiêZ>8ÀIlÜÛÁë;2³Rè3â,®¶j0&ÔjOI[6¯G$ÿ`Ôì»<²3\Ábv,>B
~Þf²ŽÝ%·åH˜Hé‘óúõüàùÕ]D‡HÉ¢@´9b\r¬U˜`’'Âö‰bª´‹ÄÐôÞzåș͡ÐÁZ…“Ó	<- ±¡1PõØ,AœÑ8VËw@Û,íQ–Íœ÷xÔ+1:ÀÆíÿ±›`Óp®*Çê^-k’àbl֏X§t±èöÎ,é=CŠY—Ï Ô:#ÕéL4ªâ€}‹PcÇž„Q½eq‚7“:-±8Ǥ ÑÍmc]om‚¤2ÚƒÉKPL%Š}“Þà8Ž°êýB_OèíI²yßhh²_õ7Iïèz-ë̵èbÞ(*ØÑåÁŒúAIW
¬ÉlR¦¶}Œ»æx…—¸Zù×Õ¾aEaFÆ%§Ðe!”ô!ΪïÏt8+ÍöئpÇjZªú™zúQÚ+YŠÈëüœa­E¬½ÔPõ9MÒñƒÇÝtGf¹Ør×Ê·vÓ]¹·¼·]\û4¬%?Ì]—qpç!n=5s6膉šh|êbëJ–›’dÒšøªÅù[Cv˳m¼L^m~aõ›rx²XRêaàc°V$𯊯
@ž kNyO*Ž²jå®ñ>L–4}ÂN!¸Md	È1_€²¦? ˜_ô[wÇ?8„™~¨³óòr¿«ã·,ké »a·X‘ °¡!DeªQÌ„9~¢È2Hàmݤ‰÷òó)e¨Z×|Méø/›}¹0mÁ3"*Š ›)¾¢ä‰ã"ÚE|OPññJæ–ïžC¡ø}fGØ;Æô©ye#ìÍÖö60Íu:Q,›ƒncÛÂwf¬ÒäêÛ-ÂçG³ó ¼	 Y‰=G÷XœáídáŒÿÊêe¢‚§°Cö‘6þ¹›ßdÛê6ûÉ&Šér´}FA¯Ù„¼ÜöÓµFj…ãñ­ r=Ølü—ù¶\gSíàE´"ö,vÔˆèÁ*$øšt?:HD
:º©ÂPÌ„’p‚Ä%±JÁ8kO+ aqsÎíÅXÛéÈSž£¿äÞàJ«‚\tD¶
8O
¥7ð~óæ–ñ¥°çÌ]ælp$°V5;›9icB³²y«4^SwsôC«;`Ü
Å›0ù‹æÁ&¼gò®BÝ™Æ6l³&ÀZÓO™Ì7³½»–Y*þØŸN”Ç^Wñú™ÇÔ$ÁÉSâ<3ÌñÅ‹¢Å阡*Äéâ“—ÀcíwÜò‚¥–Ç:<sB/)Ä;­?«Ð"³•9×2ïÿ\^*«0Èøöø9õÐcæö•ÊøˆUl`‰“À0s8^Ç<šgˆw—öƒyHëqF
î lˈ†O,É¿(¢Ä<] ü’ª;÷à‰·/ˆkØ—ãˆkœ3(›:{Ièkã:q¸wØ>0ÎBƒ7ÕP®Û,äÔ7ék«*°š÷rô[šã·‘³F£[H2ƒÆÇ5òŸ•+W®Ž	nÆ߈*ÄÃĵè°ÁGåVó-_Xw‹á8WÀ3ö)F±2E/Í`@ñ"¿%Ÿ<·óµoè÷íÕ]g,Õúï·Ê—b–òÄ͹ç7Š/ÖÝhºêÐK- €¼³³œ½>ùMIâÌA[%C§=¨rÞ¹îEÎ1F—JÐ~ümóýgÂÖiàí©5:†Žp¿¶(Òª Nå‡q”tÜ@?sÊ6ã—5îã('H'Â7„Ë€‘=¼awÞÓéæ3RV§,(ŸÓè;­HþQ,ý,qÁ(ÒÅÍ¢Y¹ökô)¢Ý¬®9lÒ/f4 ià/íOÎ}èÿ<}5µ—=ÚW RâшKɹ"©¯¥šþax2yáÙæŸ?a[—¾è2Ö‡¾—û†„…
:›ôˆƒË.R+ëð=T†0ÑÕkiU¿?Ã77£ö"¤ÏdÁc„dP­ê4hiˆG\¢übÑþà[xýšhÏç¡}» }žÛzŠA"¨Œñ;5å¯ãKÜ–Üú¡ðéÔ—®o¤2ë7tz2Ùõˆ•Z@¥ûí@
ú{B8ù!Åà™AUL„U Qš3Æí;é2Üj÷/þhïià/|8yÑœíª¾aÎô40§½Íú½@9;;©¯Q\½ž;[\áCÏzÞÙänIö+0Ÿ=XaDãÖöû?þØxìÅv@öòò* iÉ̹ªWªq‰íQ†ÏÓñQ45
àWh3º.KìœÔð4ðVýÙ3; L½¥”(ÆŽ`ƒ9͸q?Ïnq¹´Çâ˜Hå–T<€T¿¬÷¥§¯±@[Ñæ{¨&T(‚¼T®ŸVÁaK»šS‹ÓËùh™À®Üº„#¸‘*ZÓÂeèx”È5·?¢xѬ±‡׎>å¯ï֝á#½„¬)ß—àþH}TÙRôE×
ŸœˆE,Vïþºç+ö‡ÇZ­äl‹6èàU¢¨e߶§$âÒ!ËuÄ
µ*‡cñþíü·ƒËŠQAVñܘôq\o©t2ºvŠÁ¡
Ièb,‹G=TF””ô+)1«Œ·;ÄÐ5_cüZ»òx(÷¶?33cŒ%T÷Œ!dß#5Æ`Æš²3c†aÈVƒ±$i,)Šì!J’²T„¢TdÉ’RÒ¾GÒ©Î;CSç9çyŸçý¼ã3Ëý»öë{ý~×ußÿHo58Óô'íã›ú¤èž¾lö×aÕ-ŸMðë`ÕEŽ–ç' /7¶žn½afï$Te{Íã6wš“Í&t䐫³;õ Wh‰ƒ™˜¹8ÒhV‚läq,X6“b€ÉŠí–îtÀ)cüº”÷ðM9LE-óÜòn	b‚1ùÓ¢CSÚ’7Ä3a~,Öÿ$mW ©?\ç|0É‘½Ažâ—ísg€a¦Q}Ûî·Jt’ ýLߺÿùŽsg£žlÎrùl´ïPÍç
¹²cüÉêvzŽHקSYqêp¦3;_ìt¿fð/õŒêΨaÚíÉO}øé<Ôåüèû9±èƒôžkPí­m"»Z4ŠGÌ^/Öü zì´`cìŒ}ÒûÐ.LCÍë‰M9ö<¨.ïd4Ê(d0nCÅõÏÚ!
sÓôò7ºï*-a¥Å×4¡«Ø9¥½AEw›éVÜ&/em6±ò¯;§&RC·Ay®‹ÖŽnô‹Î|¥µ[°@Ü!ƹœöqÒM‘o‹HèåÊiઆ÷ooôwK?:­
䙎®¡ÞiS½moª7rµ!Ú>1­nÒFd³Þ§áŸ)Yv9í#½¾šû<
5:okG~ ‡(](›‚ÊRµÁÞrÓ ™¦í9“ÓE`f¸ùäߎamfvgœ}'|ºhÞ>'2o쥁3®Òõ[`¿aW~ч'ÌRÇRáë@Ö¦(\~Ë(‹/DLJ‘lËmÎ]}QóYd÷)ë;;˜‚Mí_Ö²]g—_U•NªT[g+.î®ÜR‰ñab/¸! Œ&ÆÞ»•ztî:(èmSØ…¤Àý¾ç‡‹9¸M×ú%;«I¬Yxüþ‰cF/l즃‚1—*QA‚éf"ÓºYæÄê团 ¦j¤íÈ÷]ì.Š4÷EÍÃþ´-Ù0“IB.Ú\yæ¿öhÞ½#Q4çgoŸ­ŒÙonâ3óx^G at GhÍó±åWûaÒBgÇm}@RÉè˜|’qhË1ß9íµ)q»nÛ)Áä ÷H>ø Bš:<U§ÕØ:¹¡~9æCˆÖ"¬à:yÿ5‹÷?ᓝ”ûm•œYÌœê&tÓånUq£ÊKô5bÃî)¥°Xá.‘Q9m~SØlœ7¼šTza­hÊ|“½Áqa-»(	:ŸŒïuFu‹¢TÛ½ö„»ñ mXV
‚ÈFïlØ9®re¼¸±Hf´¶^¯Å%ø`åÎiíÖºÂk!ä–)1Ûbæ(L“¯¨W× ã‘2u¹SÉ¡Å|·_ŠÏd	Éõ+,B£Õ½ÞZÆA7Q]Ÿpg
øà„šä©f$bf9³·ºul¸ù¨)Û)å3áß}p#\±<ezN|›ƒ… !eMdÜ–Éb¦E"Ô­Qç@¯pêÂp¤q·6EB3ëàQÃ/*3bw_ø–Çÿ>Ùwêd—Äé‹}§Ë¿l¹‹Š‡~‰=¨zØ°®ûíõl¾¤¤‡¸ Tò¾õÖÄI•ªšIw¡Š BªÊE瓇ìvîw,hüL,2êYLcã.‘NBw)ɁâøŒv™\T¥:bk#_uJž©àbnTHoáÇΏ!\îu¶ÞK“Ø>ó1‰ì:Œ¯'Xfçd£ç5Ì”¢¬œ±X‚®	`í%LUÆ»Ÿ®*ÝT·3ølCˆÌY ×õ–Vçš8¾&Mñ´U…€{øûÆØ#7_X•ÏR0çÈC~¸+  (‡rÅ<þ‡Év¤»+$dŸ4†Ü‰™¶ZÊ–IZŽîÚÀs˜ì„³Œ†ˆáCôH¹e€–dêyÉܨwdg»†»D› ‹U]UK´¶‘I’ˆgïä	æñüœ%<ìÇ—jv3˜ý–Z˜U^‡=~»›Ÿ±û¥J¾q̾ü‡Ö‰Ös„W¥Kwt¯=v®‡ö¢LkOšÁyN+½Ï0Ÿí¶Ñ´C~Bœfåâì÷Žp;HÍô	
[€ˆ,R?֏™þ)óÈGñÀ­=*èÈíV{M»w­7U¶X¼ÞÄ&ßÊ>¿†¼GGNž§H­Ä`Ò:Ìûó¶ö–À’êÖ]ÏÂï[eK4hïBu4!•¶…x´dáë­»ò˧eŠžœ§‚]µå›ßöbe1'ú0éÈÌ:˜
»@8o}jÔb³¼`FnÏ
È]:Ùií‘ýH`ÜÂÔ¡
Š
{¤~¢aÙx^¬‹W_Yé¨PˆïâUµn3Üx”‰ õj+°&ü»Õ@Ðã–äÎþ7k$E“aÏ·x± QB}L®ˆkª((—6ª®Oià•®\bÛ’­/'ZÁX„kV¿­ ÙûE²Äð@”\Þ¡øçð«Ñ¼›s0)a”ôm$PA)ó4Á²|ˆŒÓ.{Öd]@À~۝úS÷+™2â>v
Y"ð°¹KMα2˹›xjj‘‚‚Xìý3‘JAüìélÍò’¬Pèc™J#ü¿Š±"9CK°c¼¬¯žRy'‘æ’T¿ÓÈØ_©ù”¯·rØý'#$×
d4ÀØb¬ÄÜÔ~C¤øQ™LIÖÑpgÙNGðÒïTûð4óÌ*3¿cÙp"1W¢ù0·®MANu¯†sß¡ö~Ôp‹·ÔDÒÜsr՝¸7¯_íöWùt=¦Qÿx
ÃÝ<ÈäȨÏÖ
–V Zh¯"™:zoËÒ	¯ßÜ­B]—Reô‚rQ÷Áà͵)gÖ–YG×æãW„ªç:ØàZ…‡%†RJr5r¿,&A5-èþÙäo['HÄxmc q_§R¼·GºbxBׯaºlV]¸»t9î–y^&ͳØm¢ï˜^†:õà͐²È)ÕláȷGÆãl²Œr>½Äü6ÞBø3­\ºvêí§§Ô–Oyï¹ÿŽÖ­Ö¢Å"6š’IóboQ‡»•\ñø=4,_Ú§R° 6m3ñû
M×ܙ٬"÷àMŠP“`ß}ÝÌ$™Û
]kËTUJüˆåbú‹æá#ƒˆYCÛGilWy²¼º0eyVIª¡)j
Q¶^¶Øï½]º~ö”³©b‹oÈíÄ7ÒñC5ùh1IøsÜàsÆಉ…OÒH"
¶vÑki-n81ízdûÍé¤K_}Ñ8äi ºS¢b»Mh3›]_ží“ÿyRZ8º+ -¶þÈýV£Ï$ô‰”|ûr²¥Å[¿
’2Åà)µ-g•Ôñ•}Fb ¸(.KØÿV|©±©´cÜÙÅ«d—
˜Àï
ø.IãÀ<HҁÞ.£ÉÝÆkÉÉTHÝ(ÕÁéÅúo>&¿K©ð»¦˜÷/Ð_KcÓ ÎÖ¦ˆÄ§5|h <üB€T„!=ÑÏ™= v.Hd~¡Íܺ)Æ‚åŽI–ˆP›gS­ÉZO¯0²œ¯ñªj÷¸Ö Þ
ÛN¼Z˜ÕÓv#½›…
<‚ël¬±p_•8BßQ}4+}ZîõÎ)þë"7ÆŒ²¯„ïÓ	ó<Ùv]+ðFú…㵖ʇßá>ñã˜J_í›;·ÍŸ¾ádÎÆwTáÜñéVÿ©3ît’ÿöm·ÍŠœ²úXIŒòC¾Wõ¥cbc·¹wè	–͘¿o(øÀ›\ðòØò}zMöŽ/OÒϦ§˜N:\­„€¤ÆiŒÅ»Îyñƒû1•˲Þ'÷µ©ìT9næQæ˜|ü^†ª/tǁïP"ð)¿OdôÆËñ¬ç!,À¹ÀُÁsÓræã.~«Üj5¬ônïLþ€ÔÔ–§†aVü…}üs[ Tÿõ­ºÈæoÎÍÿ–´}F4Ö+Î&ëĉÒq¶’ªÇaEÒ°‰™^û~¯B^ž(œ”íÌãúö€öÊ£ïêãÚ:íU6ú­¿é{Sœw+o)Dšä¿:òàÌø¥cè+›:ôØ5à 	Þ~uQסȹӥ ‘Þðûâª)™>iÈ­^7[Ü»Ì-.˜]ß]3÷(¤gM^þetïæCÝb¯Ó@¼WLÜüàË"%(Ͷ̴QÄô©«o–rnôœ¬lŠí7öGXñ„GHßG^æ¸|è{{”d¶D/ßÎûö8ÑÔHž9ƒóHA3ÄkŸ‚„=ÎâŒ3¯„%{'²½jÉ6ÉT¥ÄyÐ^“.½ñ&ýÙöÇÉÖ	Šƒ&Q[/¾yµûLÆ‚ª½+vÛ•r+‰fö9“p7êT2Ù;º
¹èa¾ã·‡‘~󏉐ÓWrßm6Ùƒ>n´9öÕç[íësâ²–Pt´¿Þ©±ìp¸¶¢ÍÍ»y/ö5?~f…ÂHB¥,€‰S ÍÊl2ƒùh
ñ2úðå‘:b¶Ýælò‹èýL4˜ÿÎ]¾÷Óß4:ìÖa«U²CqFØÒa©—öägd*2Ü$P¶¿'Ø<’6¨=zN,á™°¡ÄƒþÚØßçÀ;ý–ô¦ç‚·´}%O
ßN!àÙCÅ÷Üóm¾PˆÍŸ±RBòtîÐÇR-‡„b|ô)ÚzK.ÉùÖD^Ôs …ia›ê–	ãä2'ÝAÕ2ÍV×Ù®"
ɶªïDðêDÔò•§+KãåÅð4¥²4hmq^eõË—J!;„&ö—– H£Nµ{Ô^ø‹gâ(_{MØ	`„lEqêoœÚw¿{T÷„`÷NC=dÓ	O
ÉSñÛ¢×Y1b\ûœü·Á>Y	6½P<™†°ì‘1:t}
5ÿ0¿‚5Í÷p~œçw¸NUÙHfvRSµÀFÌ]µ&
Í÷Rs0pW
VÓ-w:üÀ6©Z¾Ž2“Iß„\Fßxٝ¶Ë-xž¢¿KÉOª6ȶA EÒž|Ö®‹>׬”¬ù¥y
ñx…¦CcmZnJ¾~–±¦èÚº‚V¨¼Üò4ßCÒ:;ryÝoRï烺¹J‚Yeëg$ûúù¯3åf™cYØ,I¦9ŒTÚÕu@ÚGÌùhì‘~´`$K!ùÕˆ«¢à¡gžõAaO‡
/\’!÷îú¦iìíŒÞÌ.#6B•ô²*¶ÅXaZ÷òÍC5‘š¦ÍJ;³x^Êm:ΙÝÄ
MGŒ)(Å4T¡EP¯ì@x ¡.Óùëê%/ۅא.óAx›•¯#Ä¢K=ºÒZÍò/Èúð1u]/ÁŒ¬nc2™»ÍÙ ¿6+,^çQá€cO‘3XŸc-œ#¨ˆBbªÓdÊÓ!šû)]Aä“?èÓºOIL·é™ácBž(tÂödxÒ³–§Å Lkã>­ŸaÌ[צЪüDš¶G#±(œz¯ð‡ú«ë‚¨%·ø]“][Ñö‰C9µ­.¶Nqk OS“Â]s?'Üüg*fN€óYlC‰¼íJñ‹~)7Õq—.Ë·¬5F³vD>µ¹#r¬|c¤}mß&u¡º¸¸Sª……3'ÇåÓëÊ&¿ž/[x¸÷n§uóçS6$Ãßeη›)aÑØX +³ÃmwÔ;c)1ìúDâön‚ÀëåÕ‡‹L%¾æ¢E[,OÔnR;~žÑû€îGï©<ŸcÖ“<s?Û
à‰çÒ8RµSG‡sw×7viÏ-Dsš-Ø6 £ßÔ†$¼Îl¼¡oTYqž¹¿ö{½±©ÃäíΠ{&%2)µ;pŽo(žÚ‰CàC'žôz)ñ"QsÞ@ É„ZwX·_[) ,d£„•âA$Kýð@¯N_üg´ôÓé.[\ç–¯	Ç„†l~ód
Ú}–g¿]¾Ö Ïb¾žšI菅,„ˆMYã¿å¦šU¦±ñ£¤7#.I flÌUÐÒ–1¿}°ÚrüÑ>ɬL¢$àqüµ>¹+åX¦•9j›(énF6žíቌ2Û¼ø	r¨Í.8íÆ—@Ó¼‹Å½î`õ0ôÇ’‡iÀè#Ô6}­7Ž„ì³m¸f+ÙZa
RÄôÞ†¶YÕÇŸÇmâ=[×x¶l¬`ÚܵxyjÄåTóþý.3žõ¶ŽÅ£Öš÷æ‚IMݪz·g³>€Iï˜JüùUÞP'½Ä7'AÂ.=/á˜Uλ_&-죔gòþ†3~F’K@
G=ìؼmðä¤ß²]¿mâT‹‰“-…zjg©¸:4`-ê+ùŠïÌlîh	->;ýN²öÎÓBí"eæÈüLŸ\öÃ*@Ъ´lÿö¹Ï·æ;Ù÷­ ³à2T¦6!ªŸy{—"Å;ÌՁÂ$TüÃwrÊERa££,7Ï×Ôr²Zuüñºy…ã'K×ÒLL=ž!a™äæn[ˆ–
ÛÁ;d3̃¦D}j#yãBgø/-n9 iâ]I×Ѷ^“B¿jL9¢±¸¾'KÄ®Sq“§œ¯E盫z†v›ë¥µÔ3•3ÃY×`ô³Ña¬ÊݤR½š¯¿a
!»_(”ç=½¿Žœ‡PÏ>@>5<Nr½\ñy­ïp}QB#Ae£™'Ë^”ãÃýíÛžã_*ß©ÙqüéðS#åš
S§½Þ£×élÉ„<êûŠI¸tây€IÑð6{êÈ׫ïÔýc|ˆo`^sfg¦Ïë ¯Ñô™¤„“&:¥2LbŽµÁýík׫»³uóCì—Ø÷³#BÇ»1BÁ‚bU_ÝÔ­ÃýpfÑèé:ëÜ
6QÛt R6Y‹»Fa—±ÿå\zèôÁYzØu²¹NáeTÙ¼òWGçT‡t"¦Æ®xOæØdí(6>‚«´Öºª±_Ð膃v#·so¦­óKÍñO|kFÔ×Þ¼Ë+,^öB>ÐþÌ“gqWÄZïn~ü(y_™Uäc… ü¬²ªN:œ‚¤E‡·œyŽœ–õ‹<g(ã¹ÔôðR„•ï+I†ï¤ D¾;E9è®Nmæ=1ÖHv%“G<%møæ7oEÁãC®Õ1Èl‰ÄS•
%Mâ ùÂ]C×S”^ËŽBˆO~kK¥ÚÆ[T#ó4Ôó5
NG ×,ƒRGUÓ‡@¹üBÙZ´ð<«èí^;ä m¨rD¢à|]¤•Š
ò²EXF|ÞW¾®ñ£Ÿ·÷ì‘.SH^+ëÑ<LºïЯŽÕŒ||.ªaZ µXAð­få¦M_܈E-W@‚Ýux rKâç±¼”îÛ¢¯ö†";ä?Ïò¥¯[ÎŒº¿}_Ôœ‰ãFl‰Qúõ
1ùÛ¶¨(+³BNðÉ>ùLZl±¶‚e2[üË`‡;Ù¢žÚ7ƒ‹À·µxyôR£Ÿ°Ù/X	všÎ÷ã–\ý;bcèöåQj!-}ní>qÆ6LÍ	¯ðæ^ׇ&‘ÁøÌ
ÓÌ:f©…Ù€Û:!žî;Ñ}/mÙ¥Ø#ÉpHÆcñ´…Ï™¯­µ mGÚ*mr¦9VRÈ
cÁõƒÇâm«;ŸÕŸo|€óÒ†F::æ#yc-p¸9зÊùÞ>
WÈ}^òq˜žA¿Ïi¼è™Œóůöð=6½R¼`-¶C¦Î£^ëüò–Ž0~i"oé7y?Ì°<Á‹™Om’ªP Ml*C8Œøf%eà²\!¨² ô„lLD?N†%
H¹òb’™7å`á°ÆiÜó§>ó¬JºŠÊl¥tÛ™*+ß<Âœ`^†úÕðÙÇú“MtÞ aàÅÁs§©¼NŸDw7Ra¥·®\¾ÞÜSŠM
rzUÙHR¬ÉÑh¶ÇÀôåx1ñ›qI­›%Ì×6A
+ªqü­°f¹ú	_lÄaÿè]Ìš®ms©ÅÝZÈî8ånMŸ,tŒ/s6ÖBŽ-ˆ5i*“^ÑÄY:¾kŠO“e3╬Â&“Ù'eo¹5ˆlœi,H(‡(/á;FQJ–¯—ÄÌä•nÌJÚ׎ÔÒ]¾Þ:Àpj¸`‚Å]/Á-Ëî_—zM‘l5‡h¨±ðÓäojÙ£œtwX?Ž7	±‹<aªÃ㈗ÜU¯+µÓ`ÇF=9¹îÂI³Íζé7_–MÇÍ\n²ß\asBTÑ÷ÅHèÐÞp¯©
µ »þV„ÏÄíÐçÀFAä–-<.ݽîªa­´ÌFŒµ&»€!"“µ1’ßð°R»|bǐàåØ„=–Wû_«ßþ’ª¾éÙ'õ˙ǵê˜×îA+ÕfÓãtûsc¨›æ
² 06¤µ×dØ%ì—­™ÔÅwJ½Ž­í»ý™&ýÁìÒ¦C§ÜÎð?Nv¸« ß¿ðá}ù{A˲—>S4³p‹[7ï^!U?÷	â)â“	/HG‰_FÓ “íÞüVìz1ÔF ?æü`Jì¬3š3óÞ*s•ÃiL¾·üíÅLá‘šæVþW‹½Tßô$íÞ0²süëâXë×&ÍI|Æ»*” ¬î½µÚ¨[yó-Ä£ZÚy2à󺎝€ÞÇôòâV$¦>åúƒÛžúß…ŸÿþäTÝ,a÷ô…ø˜©ûU”bµe“’SâŠÛ.x.¿{ýUòÎÙ‹ëÎÁëTÐïU®ÛqÁ·Wå‹üfœ5W¸ŠÝ× ä¶2¿S:É	A5pj3ãÚ
Ûlèè]T)¬üãX›È¾\yhgîö;ʶ‹ö’'Í·w$Ý÷Þ3ü|Ýíñ©3¯ï,ÒNœ9Sv9>=Û¦ZbýÊõäoQ÷©{×EÎÕ„N€É“r¦ý»v•Ÿ)éeehN§(¾MefèŒÀÕî¦Èñd½â	q‡I8á~©Ìz¡Ù,éS~;òª%‚|jâj‹€jAcÉ=AtÛÉil!TéZ¨«Z«§¨Íþ$%IÞŸzPJÇdÁ$£¯ÈnCY°RDäY¬ÜK â„!ÑG®áÙšK‰“^˜«eYú8ªÇÀ‘Dô¼Wœ9j·fšOpËïîÇŠ™©Ïž.{TÞÀýw±àÌÆØük0/4V½KTbJR"ðŸ‹ÃA’Û|E­Ÿo*ÙFLt}r?.ùÑæ|=j/HQ8ÿÒù—»}¤&D×>,Õ#®©îlò¦·>yp˜öE𐋅á
mlì›$š¦öVîÊ:céV,`¶;$ïzÐ’í;Íó•ÇÈ~"þ±T>µdÝÄ°hF.u¤n`KÑ¢e<$æý¼¨•4ûB—«Éæ]g?ÄĦej×1
uñb¿‡<£µ£ÓyëЈ©Öx¸‘„ƒÈN]¯sÃPŒØ:ù\˘ŒÚ¥å›h>¨Ÿ?o:YDÞV­Áto(…-!ajžB´(jÁ¢¡ä<äYÙ¥ÏÔxüN=60yS4~å·qÁÖ'aƒ‚É(·Ùk9P4Ê¢jOoñZòZúÜ1˾oj=^€ÏÍ‹gΤޤ[¾gÂ7vðǬsŽ˜eZÆ—îxžWvÄÔy¦È¯V)ë •™o¢~„î2Þ<¶EÜÙYàb at 0gðlœ¤L9ƒjÞ½%mé+Êâwk¼‘	l’ÌX{hMSyðVțɪ5Âi–ùË5¾>rôë…&|O{sNº·½	YŽc*v“f{I@‡Øþ”â
&{D>ìUL
‹ÇTðùÕ‹9FuåßÝ“·P²cðõ1Íɾ2bÂó6›ø†Ævٸќ'm×¼VÃaQÁ0qýøs/â÷ÓD›µË×ç’â£Çší FžÎòWnÉzÒ(»ªž-8y·ú‘å ”1‘G¹f	Ø°ÔÖ0wô|L-ÂUÅ4+a:1áHgň°•Wç´ÁMA,ٍáì™ZxQü“Q&æú‰œè‹ÖWzÑ´ÛqÈpMAŽ1Š/ýõ•°<*ýë£èÏ]¹&Û¦ŒÍGEo­áOôK,y9A„½œñÊ}c‰é¼ùùí‰áÉÈÖDßæØͶ›ô¶9*…÷HÙã†E¯‚UŸß£]iÝuû›IáAƒ'y"uh`œmêiײ®WàÊœ8î'¥®dVDöï]Þ—#::ôAÿKY\Ö;:ßýCêP >ú«‘_½™â ¡ÅøÅüÃbó…ý¦2ºÛºƒ<üõ'zòN»ÞÒL‚‹ð žg¶•
˲`ÔV
äSä’ÐÈðm÷gÁJ³†¢;ßݬ
p3³ñ|¨“
ÿ-Æù†:èád/5U:fMÊMt³þ¡ÀìÇLÿÍ%2´ÖÓ…	¶U>PzˆD£È²ÜÝðeôåÊL¡b&¢7Øâ¶Í§â{ÛÒƐ
³ô)è"ä¸+\7“ƹ„›ñ[hbŽ)jS3Íí‚o÷l¼q¼WC¨áAÈ Áyšuw[峉QÉßÖ$ºÎèNWS#­H+ÂÈQ'Ä,âŸ5÷Håõb†°[ÜÊAylä„ZéÂ\sfø#ßAÀ¾'¯èÊ°“óåœVwŒ`·’hÅÚµ²xIéׁÚ6N2ó†^÷”Ô—¦ÏŒÑ\¼îüސåa±)=%»­¬°«¯ÉmróøòCù–†ÈÃLU»õûï=!õá‘žÉH	ÀGŸÏžÏY+§µï¡Bߤ /<˜U¶cø †u°'ºCåäšlöÿ„dë+Å^~oWñê‰òÔBäó»Êñ%^aF™‡@§Ãò,¤_¤†»¼Ôu©l.ýºL½á^‚K³ƒtÀtÉó+sBj:À‡?/“(R±Ù6ZZÊl*Ö^ nuk‡á(ÛT‡•-äfø5˜û’îÉK3X><úÔd~¬áI£*iq§Ddù45핹GP¶¥¤&„ÅžªazrDAM]š©~³æÌ\–µYúðÁÞ~íai$UHuäéŽÍtì==dcI*#Î〠òÐÝ8†~12tŽòΩ§M”7ÑŽt¥ÎÄ…{Ûá!í¸Ù—…*7”Ú³øø^”YûÕëD¯.Iʏ©M“SMŸê$óÃA›¬ÉÒ‰zζ9³bÐÎ&6‘çÐäõ7Eb̝6f›QwßÞg¨‡°RmUxQn Å#2²Ug`ÐúóÕ}Mbê5‘Ò¹ë¨ó¯½Nt]Öµ"åµÊ„oàueˆÕî±QE?&>ZŸÓf#cTÁN±°|öZUÂY5žñïx×mg9:ßjÚ3àq4òb¡Ê|ÃTëÈõÁexé¶SW¢qòfzÜܺT•Þ	òe“Dý&lrOÅð½
ôœènMgDò›LĨ]­¯T/BlMéso™,n·Øø.ü‚†ýèØ+5j蕳×FÃdú]oøžGZ	H¼œnº ¶Ží3›	©o”pÁÍRSƒô!…^øØVü'ì7©î€\µ#ð*gaëM•RpK$‡5P›ZTý0Æ
W…We2»n¹.žjë*Â.Ê,Ûü>J‚â}–µ—]žß$ÄvçAƒËe,
šm†Sø…… ’V|Ùc­ò쥂¥÷UMd¤OùNŸ¦
‚½riÁh) [×G·'òÌ´À%ãÚøkºi°â¥˜w*#aFýýD}?<Ç»/š#/B߈y›F”ëÌ7Ž*DAv¾ xxéîp,»ÝÀÇ
"5–ž³û8TY(	o-,Ù\¨âx¹§¢ÐŠfÛÛŽNÌRŽè¸©¤y5‰fUЊœ¨SNØoæd®¿¯è(¿¡“@wƵ¯éäŒõNýöcœøÑŽßJ~†³è¦ªpòõD
´¨F”¹‹yкŒ˜ÅJix©dR—õ:?2ü“žõ–
}8…z™
4L°iˆašÕ/ÈŸ\”0<ؼ±JÌŒ­ýÑŒYöÛ•‡pËlv6ÕSuÊCø¸“ÞbÄ è½ØpYÄÚøG¦Nó éÝ[…ìþòâ&Ìá2Õlãŧ—#ªC2+ "ƒ¯žàä'EÞR×]m\V˜ÎWÐ>_AB÷)œy6¿øFÿóë"§ßɇê>°u½!æg&Ô[0‹c³d{,öëÞT„Hó;T¢¡óoªk”ô刧ï?×~Œoã
ìPO×t9cbN®âÑœm%I´ArñrdxæÀÉrÜ›»ZAj°GÆ„Ô8À&‹>€¤ì_(p”Ÿ0­Cˆ…‡îŒ~ø’ÕŒÜô©,M.ª¤-U]“{~‚ÿÎ|k¢©	šì¾4Z@$`Mwl—Ë¡™aÙ˜aÙPâ¦oô¥Dúàzó×–†³¶™X‘õµCoc^¨%íI
ÃT»e!Á˜hÀÔcñ€¹°™@Ù.á'ds³-$œ«Ò¬Px—„
Šùq¾EJBê¢C„½üH¦ô2«]x´‚ÖnV|nŒö™¦;3ôJõü¡"Þ×íüBÖ·Âà×µ4/ØáÒfOPO¾z­î®
è”ßS¦aL:¥èSÞä:û!Á’XNéµ3âèm‘JîƼb¤µ“ŸòzšŸ…Ñ_¼IO0ŒTíøºèè}A’0@‘T(HÏ ?)ZfùUvsÁbGfÖéÎz˜à–[Í©Ï^€Hîcàù™‰u’¢-o^±j#+ßz§Ø_ZŸB¨K¡…§o-{`æE÷HdÂŽ¶É· …·;¦ªŸ—_­Õ…ÊHó]Ìþ°®xÞ2¿ßšOÖìàöÞT‚º©Ö¼Wu£´T}*Pb|]æ‰{ú=Ug^:‚EM
l¯tdåXYÕ³JÕ #Õzßä’üÑKÞ…öíªcu5UÚn-‡ôúò¿gÄ5hlÛÃâUᯌ½‰Ï ¾™?ðÚù{ùï2ùï½YEsX¾õ„E”ûZ*s-õJ"cLM>zÖ­ÂF&/Òƒkå2`ÔqV‚b­
Ý-5f³hSýìz]t{žs#²Â¡€¬HšÄ–Ä$/ëĶ{¼@
%0^óãÚÇK'H&¶­é5Dw#Ìœu7"ÁL%A°Áúb¦¥ß±žó3ð`a±ãŽ¼qOÍkÌè
°Ù;ï.Žô™Ë$ƒdÖtJùêæ¹a5Âvï9غ]=@1É3ù^ãkÍéƒÆ½/®œì°IñøºÛY„7纸´óùãOFš–§ÔÕ4/Öê^´7a$¾9V­$Šz‡Ì2ݶ&ËîU¶Èk†Zœ¬FU}B´ª.2Y`òÃàn$¹Í¾j†7]DŠXðêƒu™n1Ú²ÐÒBÁ¡Fž')û˲S>Ò½óg?µÎŸ«,¢ê([W_[#^R *‹yPJðÀãíß3«!»Ã•{_Jô\{ñˆ*ƒÿp,½½£=™‚½hÓžÌÅhÃðòQ×S–r±O4:œyyet^ãðµ¸]÷ý;àΦçð‚
ƒ›ªLü°J{Û¶¢SÖ<ØÛ»gûôÌù Vúi&–/!úT¥`mP{Žèý÷²û¥òå	»j˜b[\Gá|5!#Ùð*S w2Åú›O'ÃK²E$mÝ.óhO‹Y-;‹I†˜óïøÀ[Ï«ô½Mñ $|㍰zì¡´ïIÎÙâ±Æç‹C<¯_ƒ@[’îÈe¼ÚëëT2¤©<hÔÑ][]þõÚ‰®uåCÞWº±s–´¦[ý:¨&÷Y›ÇbšR6¡×iQ$${®û€ƒ¢µÜ5ñ‹ßhÙ—LR£ÉÞ×b–õþ$TŬ_«¨à\k×n3ÌQÔÍ/q7vä(m¬T Ê¥UØl«3Ÿöe„“¯öh$lQÛ®œ¥—¡É瓪i»ê’‚¡AiJï2 Ïa—ïŸþ½Í&ƉN«w±7Q“Òn<-,容ù¶Ycs£6btSºÌèSïŠ+çŧ©|ÝŠ-8yáR¯eQRó8ÐœìlPaÊëíßNÊ„/õŠîÉü˜³¸íSˆò{4”$:M®Í±F³wߘAÚÞM¬šº¸µæÚ¹·oeUŽtŠ‰A…lh1vN^O‘ÚXÊïk«6…¸4¼~\/Ÿ¼È›ÁW4ø›!øä×Ý(}jÀFA°&ĶZ¼pÔ/šSh#a›~¦ÒD–oL§DË`ëq²œöH[¶R—ŽE—ÙóÉžŒìÐR¤† úšâsòVãÂo½ºDÖäÙóJbí»Û6¶.KÀ³ˆiØ^s<ñ}YÐ^•<À¼:^~í_J„ÓâíªÚÉe–X‘Û%3g…„ `5¨^S?”ÍbFÌu^Fœèöžî¯%íoœ‰r`vj_ñÌ¢êÏ5Ž}R˜HáÏ°µ5.êŒ~.¡-c抟XŽ]ÒŸq]p¼`—Õ\'e¥"&¡Bš.tÀþùKá]w?;Û!’=–ÀW”>ëJðÞËZ(QªÉ…B×Uûèp$šZ{aK7týÕ!ÒçQ’ÑÞjƒ×ÄÆ–6~Ž¿ÿfS]1º»bàx‚þ³³Ug±°	\¤êX«rÑÇ?EÂíÅuÂe<;Õ–"Ôô :ÔT­µ¾õ°ãÁ¦JÂE'¯¼—NáíFЍþÉ·´y¾Ûýu”ŠÈ47JaÖ±g*R:¥Í]'Z­0•³(ï>‰¹:ê|D…^7m at LÙÅ“>‡Th£­ºW<½½(”@å»É\ÖfexªÜ¾¹í±hZª˜i«žÐeë>1½ôÓ[%PlÓݹO¬+ÖßçãS
 bYÆ]ôƒí'¿ðj²ÜRQúJÐD…ñ¬›­)
£œi!JN«“P³rÞö©qjoñ©¥±KB{¦M/éÉ›o&W“s;^š”^W©É5Ǿßu'ÿÊ¥¤Úu“À:7ÁÌÁzñÜqçcÑìõ7ZÇéû–B=Æèú7Mc´Ÿ,2ð¨\ço\èyþõØÉæV{{¯°c±açñŸ.nÙáX™L.@•Þ¤¤¼íTªÈ7ìgùnXW?ÈË|ì>c­€3sÃlnp¨Øçâ>åÒñd!fñ·=ÞC:qì”&sÈãß_«¾¨$Á™°ó ÔÜ ÞAŸñ½½¬üÑìÝ~‹ØظûØvËo¯
¤Ü.1#4yÓló›J†ÉyæâuG	Ê­£efú‚­7ÔÜX= ¶w}	뚸u¹õþ‹e½ßßèûò»÷|^WÆÍ4J®û÷OyÊ—YɵMºšœ?-MMM=­ η¦¡V Yóï_Zº~Z›4´õW.´ÿJþ9ß?¢¢‚ÈêÁáÁÑ y´†_p¸†ŸoTB!p)p¸S´/=`D ÑAÀ>‚îäD¢(ô
 ûRÂhá+ÌþA¡þ´ð€à@#@[GWÐÓ´õ8ëdJ”?=8":˜npEƒ£ _ ‚N‹¦ùÓ¨@ ÎQæÏ S :GW4ˆ
¢P©€¯¿?%*Jðà¨øååÄQÀ5ìÏáåúõoS_ñŽc«/Ü7Œb´×ãïîjP¢ý58kÜ·w-*Ú;”÷¿ÑÕ#~ÿÄC÷
'Ó¼£(”2Cö^]åzL¦r¼Òˆñ¥kÐá+tuÎ2!//àÍ-­ì +;+g·…=G‚D§ÅsÒúG Ž”HF0BV[ÊÀRiþ¾Tï€( N‰Ž¥ÑClT\•ø+3-âÞ?Xœ‚hêŸÚþu}Eð_U(¾jôAm@Ðô~!p%5-@U=ZðK}üµü"±úú¯ë
!‡ÿ_ˉŠ¹á'H¸[…Æ s0Âý¹~Ô`?º/=¡¾
;Ý_¬ÁÝcœ¯<Q\¹ǧàp€“ÃÕŠàX‹ŽŒB¸jß‹æq¥4 O at QPÿ;áhîìjºÍDÁID 	†»ˆAp åÖ˜ÉJ‰q¯4¢~Q
,—ë‡-ìOhæJYIƒ…J‹Âh+™ô%ûúQ)ó–æv&Œ(úÊ‘Á±£Æف”p'c„UBÔw
áèdªåÍ‘1ùû­Æ!ÿ•å»ÂAøGòw’ÁÛÂj›¹Éßl#ΕC¡š`•8ÙÔÔ ¬Ò5ec€ãK0ÿ àÅÊc e‚LãÚÖò^
JIH@Àƒ w 
¨q¶Ê€ OcnŽÂpøŠ¼Z8€ÅXRÂ)t_.ˆÜºÔ8Ì ×W€£ÌÀpxéa\lÿÐÂYá莦pXп¸@cWs
¨EjÑ ×©_YÔÌ€
 5;îçE
2%F#œSTø÷
£‘N{øÅàe]Ý?—WÎ48|5Pµ]À*‚tŽ_ð9eöS´+›ç_èÿ¢) ˜ûÅXÙtœÔpéÜ4 ßsDçæc%yÜR£(+b¾ÁTîÎý_à”]ÁÑ€bÕçôºƒÜœö¿îŸpûGØ~aø/Aû{Ìþß û_ûoûïñ"ÿ3^„ÿ/Â?áEø¼ÿ„ù;^„ÿ^„¿Å‹ðÿ…áßãEø/ñ"ü_ðâúÃé”ÞQ¾œ–çíDñURFpÃrNðõ;œØÕr€3ü矾˜­t2ƪ ·cœ.ÎñŽÓÙ9Áᜃ:˜ŒAüpoÕŸWV­¯¤tÕO 1Xñ^oe=ào篟ØôpyÀŒÓá8£ÂŠIŽ×ánV¹}|5Ì.l‚©‹³½™£¹©³¹·“¹£«¹#
§$€6vÙÙÿØ/þªàl {»m?<ü×fô}…ü³êïè ~Ú+£wk¬ôø•í°š¬=ÉÙÊÞΉ[õ?ꆓ„ï0üÜO¨Q"¹ qe¢iÿ •¹qe¨@|ƒN‰fÐìC‹XÅåg¯h¿zµºÂŒÏ÷Q˜ÀÖWqôÁpŒþÈwC„S©’ß+šKù³Ž~5‚YIÍÏaÉs±¥|/* È—Í-4:ŏFãœÕß'ƒS€/çÍY	窋â¤jepƒs¾•áÈÙŒÄð9…²:8qUúSiQ2ç‹âNý©t~(Æ ˜55Ú¿,êÿ%Øhºo÷Èq6w´ý3|®K+‘Ú[þ8Š~XåæÆü·ø}?ÿ‚/:gÐó%ÿ1Ç•Õÿ?È 5¢éïqû‹©îOO¿ozn³à–÷“³À¥qŠ÷X¸ß¹Wƒ¼9¿£Q?D¹¿µ ûc~hœ©Ÿ;Î~¿ÝøYÈ;ò»ÂÀŸùç`¡¨Ååö÷¢ ¬†SZßÝRæv¢?•pAX9r49ë«®ÁáÆÆ«‘(¯hà'?O‚Áîû	­ùýøžŒmßÃ^1NùÙÌjnþêԏsÐ`…ŸËñ}%¡j
ýœàï,œ@þn#1š§ö³é¿1¡ùã0ü9–ŸŠfõÄû›óGçükYÿ)ù#pÎõ¡“º¯?e•B¥P" ï\«ùø£#þ(3ý?šêÊÇ*,\ÿ	ÿ¹,ÿÕ'@Í÷Ÿ£û.ªý³å£
ãåHáÜak	«9åÆ”ø#Á«™Oü–Ä  qÕÛ$â'£”(_Ä
?Îê_ž7ù®>oòÓýÇçM¾~š›ÈÊÊ•¶NÀø¼iÓ/Ï›"|Ã@ y’©­š–º&—Ä=èßNÀ9tï(J…ƹgŽ¢­0|¿×÷§2ȔՋߨ¨X¬Æe at pnîiŒðhà'M߹¼ÃiTZ`pøŠ²?Ùþ²WÿžKXu•ÎØÅQ¾zúQ+J8÷Î+]" ˜Î™9¿·N;áìÜçê_µý[敨Ádn`ÿâ÷0ûáÓŒ¸ШœzŽ¿¸?:÷†ŸC¢ì¢ø3¢9$NWäú͈¢Ð¹í-š²+ú?õxÅ$%<Æ;—îõ³må™
çfû‡g~Yy(Â[)gŽâZè/ñþ›Ôƒþ¨ÛÿäõŸòýõå÷ㇳ£)§?8¢Ñhî¶ú”LxQHj 

--- NEW FILE openssh-5.4p1-23.fc14.src.rpm ---
í«îÛ   openssh-5.4p1-23.fc14                                                               Ž­è          T   >      D     
            è      ,     ì      0     ï      @   e9c195aec04bf166229e1df205632e09241c69b8     ¾†‰Í›=:ÓDZ¼ -»öK© jX   >   ÿÿÿ°       Ž­è       -  °$   ?     °      d            è           é      
     ê           ì           í      W     î     Ð     ï     Ô     ñ     ì     ö     ð     ø     ô     ú     
     û     ‡     ü     x     ý          þ     £          ¨           (      	     h      
     ¨           (           H      
     h           è           ˆ           H           È                     4     (     i     8     p    9     à    :     Fi    F     ªÅ     G     ªè      H     «h      I     «è      \     ¬      ]     ¬ˆ      ^     °     d     °     e     °	     f     °     “     °   C openssh 5.4p1 23.fc14 An open source implementation of SSH protocol versions 1 and 2 SSH (Secure SHell) is a program for logging into and executing
commands on a remote machine. SSH is intended to replace rlogin and
rsh, and to provide secure encrypted communications between two
untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.

OpenSSH is OpenBSD's version of the last free version of SSH, bringing
it up to date in terms of security and features.

This package includes the core files necessary for both the OpenSSH
client and server. To make this package useful, you should also
install openssh-clients, openssh-server, or both.   K΅Olocalhost.localdomain    XLBSD Applications/Internet pam_ssh_agent-rmheaders pam_ssh_agent_auth-0.9.2.tar.bz2 sshd.init sshd.pam openssh-nukeacss.sh openssh-5.4p1-noacss.tar.bz2 openssh-5.3p1-dso.patch openssh-5.3p1-randclean.patch openssh-5.4p1-gsskex.patch openssh-5.4p1-pka.patch openssh-5.2p1-edns.patch openssh-5.3p1-selabel.patch openssh-5.4p1-fips.patch openssh-5.1p1-scp-manpage.patch openssh-5.4p1-nss-keys.patch openssh-4.3p2-gssapi-canohost.patch openssh-5.2p1-allow-ip-opts.patch openssh-4.3p2-no-v6only.patch openssh-4.3p2-askpass-grab-info.patch openssh-5.1p1-askpass-progress.patch openssh-4.0p1-exit-deadlock.patch openssh-5.1p1-log-in-chroot.patch openssh-4.3p1-fromto-remote.patch openssh-5.4p1-pam_selinux.patch openssh-5.3p1-audit.patch openssh-5.4p1-mls.patch openssh-5.4p1-selinux.patch pam_ssh_agent_auth-0.9-build.patch openssh-5.2p1-vendor.patch openssh-5.3p1-skip-initial.patch openssh-5.4p1-redhat.patch ht
 tp://www.openssh.com/portable.html linux i386   Ø  °  ³  ß  ¾  
f  ê  Ø  Ž  	Õ  ˆ  •  -  	  á  N  ]
 hÖ  2( 
Ô  £x  õ  /ó    1Á    ã/   ®  ¼ žd  ø  ?´´´´´´´´´´´´´´´´´´´´´´´´´ý´´´´ý´                                                                Bçs,D?\¢D»šJî«DØ|iH‡k\IÖ
H‡k\Jm=JqYÌI¶mwK/TKy;óKXºJÅýSJÅýSK‹ò?K‹ü K‹Î†K‹ËK‹Û’K‹ÏK‹õÏK‹ÌAK‹ÍÌCô%KŒÒ™JÜJÜK]¬K&J°îc318ccf12ed6fbcab9d4654a2c409c27e55db8b862171edc1a249da08d378482 34e73f7e387bae067f8a51cc3a50c5cb2b898c810b32a8fe80721b7b7fc69298 f5a57feca79c97ffdbf98d7f1f97e40c0f48fc19b8ca55e6a900d6ce509fd3e7 29d27cecaac4c1a60e34aee3170a6ad45d1ad02435e08d4581dffba943ac7f4c 33c496b386c22e100b9d45d3ffdcb4a7d88e1b4bb143d20e083f3c53aef5e895 c0e8cce3a5d7955d4be905efb8680593d60f961c1a5acb0a45d2cea7b15c99b2 74ae918188166d81bd347bdf24145b0b2c77578b6cb7895d562bf93b651beda2 3ee3434d53169bf594fd69e8907ea229d73dcbaadc026bd720b32352b4189f28 5ce41a8264987beabb21f4fc24127ef9efb430f115aceaa2441daa502db68c2d ac4ce494759385a692a2b040d02578da7fddcd7ade60cf75268ba69bac5a992d 4d2ffc5a4ec9dc0ef8df198624fdd82872c1fa820f9eee0433a74b6d0e7f79ac 442e685bdc1a5b7e322432209c2f430b73d09d59f98e8941df1cca125fc33a5f 62a1e924fcfb0ef3e9750cb9d8452184b12ffb01b491451fc55fc37d22440581 dcdc08fff0c0d37b423ef90bc68d19f572e086e3161a2
 bf880da3fdaeea43367 46c07b0472968cb90cbb46e248ef143ed971beae2eeb28b0b73a3435154f52f9 462d90610cb1b497b7a1b2925a653a1f4e36f95b440e12dc5ebe67ce6c693477 8904c83b8668910cf7360285615e5e7576e91f53b03c21fd53c2490f1a9b47a5 04cfa6d2f1edd29f1ff79b55d8f9932dd8fe31c45ce9f7ef4da1438c99f11210 f107f9cc9edbeaa9454e6dc533512c0187de779b2f66bb06e344666d5cc35307 65cc8bd09faedc1047a4efcf33b79c151943ce49cf2a83e06ba9edb30420552c 4877db8b1f7600221896bd7e9760b5aed47a1b7d8f13c20decdf9013f9cd119e 7c62602d03fb5eec839dd6b11d19ae47a70b89d9577b8cb95744c388e8b0b1fa 0a5d9ef1e034cc7d9d772a65db7e344636606a1584a134eedbf8ef43356e801c cda10494caef7ca563bc717034a1f78a04a38bcf5830a070c3f85efe3d074046 6f537b00248891e216050e0908e2b527c999fb3a98ad21859f65c371a9d09d5f 1501e4835035cff795d0ea5e6265884259f616a6e5a228bfa324fda6aa10d4d0 6704262eabd44485e275b706ee385422b4f3d565d65ff24e13800260323de701 db27d60a24fe8c394658a22b6a7e5728440ca2d6d34250f9c1ab0b3fe78ba4d4 44bc68ac4beee7eb476552ff7668e538db4e51aa3c1da49e29704ae4af4
 97888 76c80b6482ea5d03e1f33514f30ac77cd56e2fc8cb233a470562686df7426f4b c9039b4ae1a8d9f3ad306d45f62fc9f5cb35c6cd071d7ca991956340f4fbdff8 64468969e6f63ef3665c2a7d3f6df240737106dc15afd80b115aadb5369bc0f0                                                                                                                                                                 jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch jfch games games games games games games games games games games games games games games games games games games games games games games games games games games games games games games games games ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ                                                                               
  
gtk2-devel libX11-devel autoconf automake perl zlib-devel audit-libs-devel util-linux groff man pam-devel tcp_wrappers-devel fipscheck-devel openssl-devel krb5-devel libedit-devel ncurses-devel libselinux-devel audit-libs xauth rpmlib(FileDigests) rpmlib(CompressedFileNames)              0.9.8j    1.27.7 1.0.8  4.6.0-1 3.0.4-1 4.8.0  Ky7 at KbÍÀK]‡ÀK]‡ÀKXAÀKVð@KUžÀKG@KC)ÀK/c at KùÀK¿@KÊÀK„ÀK„ÀJîÉÀJéƒÀJæàÀJÜTÀJØ`@JÅë@JÁöÀJ»_ at J°Ó@Jª;ÀJ¤õÀJÀJÀJ›»@J—ÆÀJ•#ÀJŽŒ@Jq‹@JjóÀJi¢@J`gÀJMòÀJIþ@JH¬ÀJF	ÀJ@ÃÀJ2C at J
Y at Iù’ÀIìcÀIÕú@IºJÀIµÀI¦„@I”@I‚ëÀIo%@IA ÀHø~@H‘©@H‡@H4ÀH1kÀGúÀGÏÜÀGÇóÀG±Š@G|Î@GUA at GUA@GBÌ@Fîl at FßëÀF»ÀFyÀEÿÌÀEþ{@Eä@EÝ…ÀE¬¾@EŠw at EnÇÀEl$ÀETiÀEIÝÀE ÿ@DìC at DØ|ÀD¿p at D»{ÀD´ä@D?ŽÀDÞ@Cþõ@Cû ÀCðtÀCì€@Cç:@Cà¢ÀC§ò@C™qÀCƒ@C}Â@C|pÀCqäÀCbÀCTãÀCNL at CFc@C„ÀCÕ@Bçw at B@B¨/@B¤:ÀBˆ‹@BQ, at BB«ÀB8ÀB#ÀBÍ@B	û@B©ÀBcÀAÙ3ÀA«@Aa;@ANÆ@AFÝ@AE‹ÀA7@A7@A7@A4h at A+-ÀAÛ@@ÎäÀ@ÎäÀ@ÆûÀ@ÄXÀ@¿À@¼oÀ@¼oÀ@Vì@@EÈÀ@C%À@=ßÀ@=ßÀ@9ë@@,¼@@@@@@/@?ÍÐ@?º	À?¯}À?ª7À?™@?Š“À?Š“À?jïÀ?jïÀ?jïÀ?hLÀ?hLÀ?hLÀ?hLÀ?fû@?fû@?fû@?fû@?fû@?XzÀ?XzÀ?KKÀ?8ÖÀ?8ÖÀ?%@?'@>í±@>í±@>ß0À>Ýß@>~ó@>LÚ@>G”@>.‡À>Á@=Ðí@=¬@=‚À=€À=nÀ=ZF@=þ@=[@=	À=@=  @<÷eÀ<óq@<äðÀ<äðÀ<©@<™Ë@<‡V@<‡V@<‡V@<„³@<sÀ<jU@<N¥À<-°@<ºÀ;ôÿÀ;ñ@;êsÀ;é"@;³À; ŸÀ;—e@;€ûÀ;{µÀ;r{@;q)À;n†À;^´À;L?À;7'À;-í@;lÀ;I@;÷À:ñH@:ïöÀ:݁À:ÐRÀ:ÈiÀ:»:À:¹é@:·F@: ÜÀ:Ÿ‹@:šE@:”ÿ@:’\@:‘
À:@:‰!À:8À:mr@:h,@:fÚÀ:@Ÿ@:,ØÀ:$ïÀ:#ž@:"LÀ: û@:cÀ:@:À:îÀ9ýbÀ9ãÀ9Üm at 9ØxÀ9¶1À9£¼À9rõ@9l]À9dtÀ9c#@9_.À9]Ý@9[:@9X—@9@Ü@98ó@8Ï{@8f@8/õÀ8-RÀ8(À8&»@8ÝÀ8Œ@8:À8é@Jan F. Chadima <jchadima at redhat.com> - 5.3p1-22 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-21 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-20 Tomas Mraz <tmraz at redhat.com> - 5.3p1-19 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-18 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-17 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-16 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-15 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-14 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-13 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-12 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-11 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-10 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-9 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-8 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-7 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-6 Jan F. Chadima <
 jchadima at redhat.com> - 5.3p1-5 Tomas Mraz <tmraz at redhat.com> - 5.3p1-4 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-3 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-2 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-29 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-28 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-26 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-25 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-24 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-23 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-22 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-21 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-20 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-19 Tomas Mraz <tmraz at redhat.com> - 5.2p1-18 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-17 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 5.2p1-16 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-15 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-14 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-13 Jan F. Chadima <jchadima at redhat.com> - 
 5.2p1-12 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-11 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-10 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-9 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-8 Tomas Mraz <tmraz at redhat.com> - 5.2p1-6 Tomas Mraz <tmraz at redhat.com> - 5.2p1-5 Tomas Mraz <tmraz at redhat.com> - 5.2p1-4 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-3 Tomas Mraz <tmraz at redhat.com> - 5.2p1-2 Jan F. Chadima <jchadima at redhat.com> - 5.2p1-1 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 5.1p1-8 Tomas Mraz <tmraz at redhat.com> - 5.1p1-7 Tomas Mraz <tmraz at redhat.com> - 5.1p1-6 Tomas Mraz <tmraz at redhat.com> - 5.1p1-5 Tomas Mraz <tmraz at redhat.com> - 5.1p1-4 Tomas Mraz <tmraz at redhat.com> - 5.1p1-3 Tomas Mraz <tmraz at redhat.com> - 5.1p1-2 Tomas Mraz <tmraz at redhat.com> - 5.1p1-1 Tomas Mraz <tmraz at redhat.com> - 5.0p1-3 Tomas Mraz <tmraz at redhat.com> - 5.0p1-2 Tomas Mraz <tmraz at redhat.com> - 5.0p1-1 Tomas Mraz <tmraz at redhat.com> - 4.7p1-10 Tomas Mraz <tmraz at redhat
 .com> - 4.7p1-9 Dennis Gilmore <dennis at ausil.us> - 4.7p1-8 Tomas Mraz <tmraz at redhat.com> - 4.7p1-7 Tomas Mraz <tmraz at redhat.com> - 4.7p1-6 Release Engineering <rel-eng at fedoraproject dot org> - 4.7p1-5 Tomas Mraz <tmraz at redhat.com> - 4.7p1-4 Tomas Mraz <tmraz at redhat.com> - 4.7p1-2 Tomas Mraz <tmraz at redhat.com> - 4.7p1-1 Tomas Mraz <tmraz at redhat.com> - 4.5p1-8 Tomas Mraz <tmraz at redhat.com> - 4.5p1-7 Tomas Mraz <tmraz at redhat.com> - 4.5p1-6 Tomas Mraz <tmraz at redhat.com> - 4.5p1-5 Tomas Mraz <tmraz at redhat.com> - 4.5p1-4 Tomas Mraz <tmraz at redhat.com> - 4.5p1-3 Tomas Mraz <tmraz at redhat.com> - 4.5p1-2 Tomas Mraz <tmraz at redhat.com> - 4.5p1-1 Tomas Mraz <tmraz at redhat.com> - 4.3p2-14 Tomas Mraz <tmraz at redhat.com> - 4.3p2-13 Tomas Mraz <tmraz at redhat.com> - 4.3p2-12 Tomas Mraz <tmraz at redhat.com> - 4.3p2-11 Tomas Mraz <tmraz at redhat.com> - 4.3p2-10 Tomas Mraz <tmraz at redhat.com> - 4.3p2-9 Tomas Mraz <tmraz at redhat.com> - 4.3p2-8 Tomas Mraz <tmraz at redhat.com> - 4.3p2-7 Tomas Mraz <tmraz at re
 dhat.com> - 4.3p2-6 Jesse Keating <jkeating at redhat.com> - 4.3p2-5.1 Tomas Mraz <tmraz at redhat.com> - 4.3p2-5 Tomas Mraz <tmraz at redhat.com> - 4.3p2-4 Tomas Mraz <tmraz at redhat.com> - 4.3p2-3 Tomas Mraz <tmraz at redhat.com> - 4.3p2-2 Tomas Mraz <tmraz at redhat.com> - 4.3p2-1 Jesse Keating <jkeating at redhat.com> - 4.3p1-2.1 Tomas Mraz <tmraz at redhat.com> - 4.3p1-2 Tomas Mraz <tmraz at redhat.com> - 4.3p1-1 Tomas Mraz <tmraz at redhat.com> - 4.2p1-10 Jesse Keating <jkeating at redhat.com> Tomas Mraz <tmraz at redhat.com> - 4.2p1-9 Nalin Dahyabhai <nalin at redhat.com> - 4.2p1-8 Warren Togami <wtogami at redhat.com> - 4.2p1-7 Jeremy Katz <katzj at redhat.com> - 4.2p1-6 Tomas Mraz <tmraz at redhat.com> 4.2p1-5 Dan Walsh <dwalsh at redhat.com> 4.2p1-4 Tomas Mraz <tmraz at redhat.com> 4.2p1-3 Tomas Mraz <tmraz at redhat.com> 4.2p1-2 Tomas Mraz <tmraz at redhat.com> 4.2p1-1 Tomas Mraz <tmraz at redhat.com> 4.1p1-5 Tomas Mraz <tmraz at redhat.com> 4.1p1-4 Tomas Mraz <tmraz at redhat.com> 4.1p1-3 Tomas Mraz <tmraz at redhat.com> 4.1p1-2 Tom
 as Mraz <tmraz at redhat.com> 4.1p1-1 Tomas Mraz <tmraz at redhat.com> 4.0p1-3 Tomas Mraz <tmraz at redhat.com> 4.0p1-2 Tomas Mraz <tmraz at redhat.com> 4.0p1-1 Elliot Lee <sopwith at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.9p1-12 Tomas Mraz <tmraz at redhat.com> 3.9p1-11 Tomas Mraz <tmraz at redhat.com> Tomas Mraz <tmraz at redhat.com> 3.9p1-10 Tomas Mraz <tmraz at redhat.com> Bill Nottingham <notting at redhat.com> 3.9p1-9 Thomas Woerner <twoerner at redhat.com> 3.9p1-8.1 Nalin Dahyabhai <nalin at redhat.com> 3.9p1-8 Bill Nottingham <notting at redhat.com> 3.9p1-7 Nalin Dahyabhai <nalin at redhat.com> 3.9p1-6 Nalin Dahyabhai <nalin at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.9p1-5 Daniel Walsh <dwalsh at redhat.com> 3.9p1-4 Daniel Walsh <dwalsh at redhat.com> 3.9p1-3 Daniel Walsh <dwalsh at redhat.com> 3.9p1-2 Daniel Walsh <dwalsh at redhat.com> 3.9p1-1 Alan Cox <alan at redhat.com> 3.8.1p1-5 Daniel Walsh <dwalsh at redhat.com> 3.8.1p1-4 Elliot Lee <sopwith at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.8.1p1-2 Nalin Da
 hyabhai <nalin at redhat.com> 3.8.1p1-1 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-36 Nalin Dahyabhai <nalin at redhat.com> 3.8.1p1-0 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-35 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-34 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-33 Thomas Woerner <twoerner at redhat.com> 3.6.1p2-32 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-31 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-30 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-29 Elliot Lee <sopwith at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-27 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-26 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-25 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-24 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> David Woodhouse <dwmw2 at redhat.com> 3.6.1p2-23 Nalin Dahyabhai <nalin at redhat.com> Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-22 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-21.sel Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-21 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-20.sel Nalin Da
 hyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-19 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-18 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-17 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-16.sel Bill Nottingham <notting at redhat.com> 3.6.1p2-15 Bill Nottingham <notting at redhat.com> 3.6.1p2-14 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-13.sel Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-12 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-11 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-10 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-9.sel Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-8 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-7 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-6 Daniel Walsh <dwalsh at redhat.com> 3.6.1p2-5 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-4 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-3 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-2 Nalin Dahyabhai <nalin at redhat.com> 3.6.1p2-1 Elliot Lee <sopwith at redhat.com> Florian La Roche <Florian.LaRoche at redhat.de> Nalin Dahyabhai <n
 alin at redhat.com> 3.5p1-6 Nalin Dahyabhai <nalin at redhat.com> 3.5p1-5 Tim Powers <timp at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.5p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.5p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.5p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.4p1-3 Than Ngo <than at redhat.com> 3.4p1-2.1 Curtis Zinzilieta <curtisz at redhat.com> 3.4p1-2gss Nalin Dahyabhai <nalin at redhat.com> 3.4p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.4p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.3p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.3p1-1 Tim Powers <timp at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.2.3p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.2.3p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.2.3p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.2.2p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-4 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-2gss Nalin Dahyabhai <nalin at redhat.com> 3.1p1-2 Nalin Dahyabhai <nalin at redhat.com> 3.1p1-1 Nalin Dahyabhai <nalin at redhat.com>
  3.1p1-0 Nalin Dahyabhai <nalin at redhat.com> SNAP-20020305 Nalin Dahyabhai <nalin at redhat.com> SNAP-20020220 Nalin Dahyabhai <nalin at redhat.com> 3.0.2p1-3 Nalin Dahyabhai <nalin at redhat.com> 3.0.2p1-2 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.0.2p1-1 Nalin Dahyabhai <nalin at redhat.com> 3.0.1p1-1 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 3.0p1-1 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> 2.9p2-9 Bernhard Rosenkraenzer <bero at redhat.com> 2.9p2-8 Nalin Dahyabhai <nalin at redhat.com> 2.9p2-7 Nalin Dahyabhai <nalin at redhat.com> 2.9p2-6 Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at red
 hat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Preston Brown <pbrown at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Trond Eivind Glomsrxd <teg at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.co
 m> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Nalin Dahyabhai <nalin at redhat.com> Damien Miller <djm at ibs.com.au> Damien Miller <djm at mindrot.org> Damien Miller <djm at mindrot.org> Damien Miller <djm at mindrot.org> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> Damien Miller <djm at ibs.com.au> - ImplicitDSOLinking (#564824) - Allow to u
 se hardware crypto if awailable (#559555) - optimized FD_CLOEXEC on accept socket (#541809) - updated pam_ssh_agent_auth to new version from upstream (just
  a licence change) - optimized RAND_cleanup patch (#557166) - add RAND_cleanup at the exit of each program using RAND (#557166) - set FD_CLOEXEC on accepted socket (#541809) - replaced define by global in macros - Update the pka patch - Update the audit patch - Add possibility to autocreate only RSA key into initscript (#533339) - Prepare NSS key patch for future SEC_ERROR_LOCKED_PASSWORD (#537411) - Update NSS key patch (#537411, #356451) - Add gssapi key exchange patch (#455351) - Add public key agent patch (#455350) - Repair canohost patch to allow gssapi to work when host is acessed via pipe proxy (#531849) - Modify the init script to prevent it to hang during generating the keys (#515145) - Add README.nss - Add pam_ssh_agent_auth module to a subpackage. - Reenable audit. - Upgrade to new wersion 5.3p1 - Resolve locking in ssh-add (#491312) - Repair initscript to be acord to guidelines (#521860)
- Add bugzilla# to application of edns and xmodifiers patch - Changed pam stack to password-auth - Dropped homechroot patch - Add check for nosuid, nodev in homechroot - add correct patch for ip-opts - replace ip-opts patch by an upstream candidate version - rearange selinux patch to be acceptable for upstream
- replace seftp patch by an upstream version - merged xmodifiers to redhat patch
- merged gssapi-role to selinux patch
- merged cve-2007_3102 to audit patch
- sesftp patch only with WITH_SELINUX flag
- rearange sesftp patch according to upstream request - minor change in sesftp patch - rebuilt with new openssl - Added dnssec support. (#205842) - Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild - only INTERNAL_SFTP can be home-chrooted
- save _u and _r parts of context changing to sftpd_t - changed internal-sftp context to sftpd_t - changed home length path patch to upstream version - create '~/.ssh/known_hosts' within proper context - length of home path in ssh now limited by PATH_MAX
- correct timezone with daylight processing - final version chroot %h (sftp only) - repair broken ls in chroot %h - add XMODIFIERS to exported environment (#495690) - allow only protocol 2 in the FIPS mode - do integrity verification only on binaries which are part
  of the OpenSSH FIPS modules - log if FIPS mode is initialized
- make aes-ctr cipher modes work in the FIPS mode - fix logging after chroot
- enable non root users to use chroot %h in internal-sftp - add AES-CTR ciphers to the FIPS mode proposal - upgrade to new upstream release - Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild - drop obsolete triggers
- add testing FIPS mode support
- LSBize the initscript (#247014) - enable use of ssl engines (#481100) - remove obsolete --with-rsh (#478298)
- add pam_sepermit to allow blocking confined users in permissive mode
  (#471746)
- move system-auth after pam_selinux in the session stack - set FD_CLOEXEC on channel sockets (#475866)
- adjust summary
- adjust nss-keys patch so it is applicable without selinux patches (#470859) - fix compatibility with some servers (#466818) - fixed zero length banner problem (#457326) - upgrade to new upstream release
- fixed a problem with public key authentication and explicitely
  specified SELinux role - pass the connection socket to ssh-keysign (#447680) - add LANGUAGE to accepted/sent environment variables (#443231)
- use pam_selinux to obtain the user context instead of doing it itself
- unbreak server keep alive settings (patch from upstream)
- small addition to scp manpage - upgrade to new upstream (#441066)
- prevent initscript from killing itself on halt with upstart (#438449)
- initscript status should show that the daemon is running
  only when the main daemon is still alive (#430882) - fix race on control master and cleanup stale control socket (#436311)
  patches by David Woodhouse - set FD_CLOEXEC on client socket
- apply real fix for window size problem (#286181) from upstream
- apply fix for the spurious failed bind from upstream
- apply open handle leak in sftp fix from upstream - we build for sparcv9 now  and it needs -fPIE - fix gssapi auth with explicit selinux role requested (#427303) - patch
  by Nalin Dahyabhai - explicitly source krb5-devel profile script - Rebuild for openssl bump - do not copy /etc/localtime into the chroot as it is not
  necessary anymore (#193184)
- call setkeycreatecon when selinux context is established
- test for NULL privk when freeing key (#391871) - patch by
  Pierre Ossman - revert default window size adjustments (#286181) - upgrade to latest upstream
- use libedit in sftp (#203009)
- fixed audit log injection problem (CVE-2007-3102) - fix sftp client problems on write error (#247802)
- allow disabling autocreation of server keys (#235466) - experimental NSS keys support
- correctly setup context when empty level requested (#234951) - mls level check must be done with default role same as requested - make profile.d/gnome-ssh-askpass.* regular files (#226218) - reject connection if requested mls range is not obtained (#229278) - improve Buildroot
- remove duplicate /etc/ssh from files - support mls on labeled networks (#220487)
- support mls level selection on unlabeled networks
- allow / in usernames in scp (only beginning /, ./, and ../ is special) - update to 4.5p1 (#212606) - fix gssapi with DNS loadbalanced clusters (#216857) - improved pam_session patch so it doesn't regress, the patch is necessary
  for the pam_session_close to be called correctly as uid 0 - CVE-2006-5794 - properly detect failed key verify in monitor (#214641) - merge sshd initscript patches
- kill all ssh sessions when stop is called in halt or reboot runlevel
- remove -TERM option from killproc so we don't race on sshd restart - improve gssapi-no-spnego patch (#208102)
- CVE-2006-4924 - prevent DoS on deattack detector (#207957)
- CVE-2006-5051 - don't call cleanups from signal handler (#208459) - don't report duplicate syslog messages, use correct local time (#189158)
- don't allow spnego as gssapi mechanism (from upstream)
- fixed memleaks found by Coverity (from upstream)
- allow ip options except source routing (#202856) (patch by HP) - drop the pam-session patch from the previous build (#201341)
- don't set IPV6_V6ONLY sock opt when listening on wildcard addr (#201594) - dropped old ssh obsoletes
- call the pam_session_open/close from the monitor when privsep is
  enabled so it is always called as root (patch by Darren Tucker) - improve selinux patch (by Jan Kiszka)
- upstream patch for buffer append space error (#191940)
- fixed typo in configure.ac (#198986)
- added pam_keyinit to pam configuration (#198628)
- improved error message when askpass dialog cannot grab
  keyboard input (#198332)
- buildrequires xauth instead of xorg-x11-xauth
- fixed a few rpmlint warnings - rebuild - don't request pseudoterminal allocation if stdin is not tty (#188983) - allow access if audit is not compiled in kernel (#183243) - enable the subprocess in chroot to send messages to system log
- sshd should prevent login if audit call fails - print error from scp if not remote (patch by Bjorn Augustsson #178923) - new version - bump again for double-long bug on ppc(64) - fixed another place where syslog was called in signal handler
- pass locale environment variables to server, accept them there (#179851) - new version, dropped obsolete patches - hopefully make the askpass dialog less confusing (#174765) - rebuilt - drop x11-ssh-askpass from the package
- drop old build_6x ifs from spec file
- improve gnome-ssh-askpass so it doesn't reveal number of passphrase 
  characters to person looking at the display
- less hackish fix for the __USE_GNU problem - work around missing gccmakedep by wrapping makedepend in a local script
- remove now-obsolete build dependency on "xauth" - xorg-x11-devel -> libXt-devel
- rebuild for new xauth location so X forwarding works
- buildreq audit-libs-devel
- buildreq automake for aclocal
- buildreq imake for xmkmf
-  -D_GNU_SOURCE in flags in order to get it to build
   Ugly hack to workaround openssh defining __USE_GNU which is
   not allowed and causes problems according to Ulrich Drepper
   fix this the correct way after FC5test1 - rebuild against new openssl - put back the possibility to skip SELinux patch
- add patch for user login auditing by Steve Grubb - Change selinux patch to use get_default_context_with_rolelevel in libselinux. - Update selinux patch to use getseuserbyname - use include instead of pam_stack in pam config
- use fork+exec instead of system in scp - CVE-2006-0225 (#168167)
- upstream patch for displaying authentication errors - upgrade to a new upstream version - use x11-ssh-askpass if openssh-askpass-gnome is not installed (#165207)
- install ssh-copy-id from contrib (#88707) - don't deadlock on exit with multiple X forwarded channels (#152432)
- don't use X11 port which can't be bound on all IP families (#163732) - fix small regression caused by the nologin patch (#161956)
- fix race in getpeername error checking (mindrot #1054) - use only pam_nologin for nologin testing - upgrade to a new upstream version
- call pam_loginuid as a pam session module - link libselinux only to sshd (#157678) - fixed Local/RemoteForward in ssh_config.5 manpage
- fix fatal when Local/RemoteForward is used and scp run (#153258)
- don't leak user validity when using krb5 authentication - upgrade to 4.0p1
- remove obsolete groups patch - rebuilt - rebuild so that configure can detect that krb5_init_ets is gone now - don't call syslog in signal handler
- allow password authentication when copying from remote
  to remote machine (#103364) - add spaces to messages in initscript (#138508) - enable trusted forwarding by default if X11 forwarding is 
  required by user (#137685 and duplicates)
- disable protocol 1 support by default in sshd server config (#88329)
- keep the gnome-askpass dialog above others (#69131) - change permissions on pam.d/sshd to 0644 (#64697)
- patch initscript so it doesn't kill opened sessions if
  the sshd daemon isn't running anymore (#67624) - don't use initlog - fixed PIE build for all architectures - add a --enable-vendor-patchlevel option which allows a ShowPatchLevel option
  to enable display of a vendor patch level during version exchange (#120285)
- configure with --disable-strip to build useful debuginfo subpackages - when using gtk2 for askpass, don't buildprereq gnome-libs-devel - build - disable ACSS support - Change selinux patch to use get_default_context_with_role in libselinux. - Fix patch
	* Bad debug statement.
	* Handle root/sysadm_r:kerberos - Modify Colin Walter's patch to allow specifying rule during connection - Fix TTY handling for SELinux - Update to upstream - Apply buildreq fixup patch (#125296) - Clean up patch for upstream submission. - rebuilt - Remove use of pam_selinux and patch selinux in directly. - request gssapi-with-mic by default but not delegation (flag day for anyone
  who used previous gssapi patches)
- no longer request x11 forwarding by default - Change pam file to use open and close with pam_selinux - update to 3.8.1p1
- add workaround from CVS to reintroduce passwordauth using pam - Remove CLOSEXEC on STDERR * Wed Mar 03 2004 Phil Knirsch <pknirsch at redhat.com> 3.6.1p2-33.30.1
- Built RHLE3 U2 update package. - Close file descriptors on exec - fixed pie build - Add restorecon to startup scripts - Add multiple qualified to openssh - Eliminate selinux code and use pam_selinux - rebuilt - turn off pie on ppc - fix is_selinux_enabled - Rebuild to grab shared libselinux - turn on selinux - un#ifdef out code for reporting password expiration in non-privsep
  mode (#83585) - add machinery to build with/without -fpie/-pie, default to doing so - Don't whinge about getsockopt failing (#109161) - add missing buildprereq on zlib-devel (#104558) - turn selinux off - turn selinux on - turn selinux off - turn selinux on - additional fix for apparently-never-happens double-free in buffer_free()
- extend fix for #103998 to cover SSH1 - rebuild - additional buffer manipulation cleanups from Solar Designer - turn selinux off - turn selinux on - rebuild - additional buffer manipulation fixes (CAN-2003-0695) - turn selinux on - rebuild - apply patch to store the correct buffer size in allocated buffers
  (CAN-2003-0693)
- skip the initial PAM authentication attempt with an empty password if
  empty passwords are not permitted in our configuration (#103998) - turn selinux off - turn selinux on - Add BuildPreReq gtk2-devel if gtk2 - rebuild - modify patch which clears the supplemental group list at startup to only
  complain if setgroups() fails if sshd has euid == 0
- handle krb5 installed in %{_prefix} or elsewhere by using krb5-config - Add SELinux patch - rebuild - rebuild - rebuild - update to 3.6.1p2 6 rebuilt - add patch for getsockopt() call to work on bigendian 64bit archs - move scp to the -clients subpackage, because it directly depends on ssh
  which is also in -clients (#84329) - rebuild - rebuilt - rebuild - patch PAM configuration to use relative path names for the modules, allowing
  us to not worry about which arch the modules are built for on multilib systems - update to 3.5p1, merging in filelist/perm changes from the upstream spec - merge - fix to build on multilib systems - added gssapi patches and uncommented patch here - pull patch from CVS to fix too-early free in ssh-keysign (#70009) - 3.4p1
- drop anon mmap patch - rework the close-on-exit docs
- include configuration file man pages
- make use of nologin as the privsep shell optional - update to 3.3p1
- merge in spec file changes from upstream (remove setuid from ssh, ssh-keysign)
- disable gtk2 askpass
- require pam-devel by filename rather than by package for erratum
- include patch from Solar Designer to work around anonymous mmap failures - automated rebuild - don't require autoconf any more - build gnome-ssh-askpass with gtk2 - update to 3.2.3p1
- merge in spec file changes from upstream - update to 3.2.2p1 - drop buildreq on db1-devel
- require pam-devel by package name
- require autoconf instead of autoconf253 again - pull patch from CVS to avoid printing error messages when some of the
  default keys aren't available when running ssh-add
- refresh to current revisions of Simon's patches - reintroduce Simon's gssapi patches
- add buildprereq for autoconf253, which is needed to regenerate configure
  after applying the gssapi patches
- refresh to the latest version of Markus's patch to build properly with
  older versions of OpenSSL - bump and grind (through the build system) - require sharutils for building (mindrot #137)
- require db1-devel only when building for 6.x (#55105), which probably won't
  work anyway (3.1 requires OpenSSL 0.9.6 to build), but what the heck
- require pam-devel by file (not by package name) again
- add Markus's patch to compile with OpenSSL 0.9.5a (from
  http://bugzilla.mindrot.org/show_bug.cgi?id=141) and apply it if we're
  building for 6.x - update to 3.1p1 - update to SNAP-20020305
- drop debug patch, fixed upstream - update to SNAP-20020220 for testing purposes (you've been warned, if there's
  anything to be warned about, gss patches won't apply, I don't mind) - add patches from Simon Wilkinson and Nicolas Williams for GSSAPI key
  exchange, authentication, and named key support - remove dependency on db1-devel, which has just been swallowed up whole
  by gnome-libs-devel - adjust build dependencies so that build6x actually works right (fix
  from Hugo van der Kooij) - update to 3.0.2p1 - update to 3.0.1p1 - update to current CVS (not for use in distribution) - merge some of Damien Miller <djm at mindrot.org> changes from the upstream
  3.0p1 spec file and init script - update to 3.0p1
- update to x11-ssh-askpass 1.2.4.1
- change build dependency on a file from pam-devel to the pam-devel package
- replace primes with moduli - incorporate fix from Markus Friedl's advisory for IP-based authorization bugs - Merge changes to rescue build from current sysadmin survival cd - fix scp's server's reporting of file sizes, and build with the proper
  preprocessor define to get large-file capable open(), stat(), etc.
  (sftp has been doing this correctly all along) (#51827)
- configure without --with-ipv4-default on RHL 7.x and newer (#45987,#52247)
- pull cvs patch to fix support for /etc/nologin for non-PAM logins (#47298)
- mark profile.d scriptlets as config files (#42337)
- refer to Jason Stone's mail for zsh workaround for exit-hanging quasi-bug
- change a couple of log() statements to debug() statements (#50751)
- pull cvs patch to add -t flag to sshd (#28611)
- clear fd_sets correctly (one bit per FD, not one byte per FD) (#43221) - add db1-devel as a BuildPrerequisite (noted by Hans Ecke) - pull cvs patch to fix remote port forwarding with protocol 2 - pull cvs patch to add session initialization to no-pty sessions
- pull cvs patch to not cut off challengeresponse auth needlessly
- refuse to do X11 forwarding if xauth isn't there, handy if you enable
  it by default on a system that doesn't have X installed (#49263) - don't apply patches to code we don't intend to build (spotted by Matt Galgoci) - pass OPTIONS correctly to initlog (#50151) - switch to x11-ssh-askpass 1.2.2 - rebuild in new environment - disable the gssapi patch - update to 2.9p2
- refresh to a new version of the gssapi patch - change Copyright: BSD to License: BSD
- add Markus Friedl's unverified patch for the cookie file deletion problem
  so that we can verify it
- drop patch to check if xauth is present (was folded into cookie patch)
- don't apply gssapi patches for the errata candidate
- clear supplemental groups list at startup - fix an error parsing the new default sshd_config
- add a fix from Markus Friedl (via openssh-unix-dev) for ssh-keygen not
  dealing with comments right - add in Simon Wilkinson's GSSAPI patch to give it some testing in-house,
  to be removed before the next beta cycle because it's a big departure
  from the upstream version - finish marking strings in the init script for translation
- modify init script to source /etc/sysconfig/sshd and pass $OPTIONS to sshd
  at startup (change merged from openssh.com init script, originally by
  Pekka Savola)
- refuse to do X11 forwarding if xauth isn't there, handy if you enable
  it by default on a system that doesn't have X installed - update to 2.9
- drop various patches that came from or went upstream or to or from CVS - only require initscripts 5.00 on 6.2 (reported by Peter Bieringer) - remove explicit openssl requirement, fixes builddistro issue
- make initscript stop() function wait until sshd really dead to avoid 
  races in condrestart - mention that challengereponse supports PAM, so disabling password doesn't
  limit users to pubkey and rsa auth (#34378)
- bypass the daemon() function in the init script and call initlog directly,
  because daemon() won't start a daemon it detects is already running (like
  open connections)
- require the version of openssl we had when we were built - make do_pam_setcred() smart enough to know when to establish creds and
  when to reinitialize them
- add in a couple of other fixes from Damien for inclusion in the errata - update to 2.5.2p2
- call setcred() again after initgroups, because the "creds" could actually
[...4568 lines suppressed...]
øð-â¾#ÇTVµF¼**Ø[ðŸ^za@¾ÛôÙ:x§JL	$™2Ô_דÉÝ7cë¿ÉOG' £¸d„míˆ ¶…4ç@‚¢;ì«”Dú@È–ññ>¼™q3qœyûL´¯¨tx2€ÃÀ3H@ŒEh÷vüü±§L^ÞÍ¡Aømd™ww…ßô§ŠÂ9fØ<¶ÿªd£|,
´Â!ÏÜÐ<Û¨)TÎ@•ÞžÔ‘fu @â	Éû€$T€¥±=mžm4 EÕÏÁ¾kŒŸóïÙÝQ»Ã°ò?«Óçú5›Ì„b5!`‚Ÿf.üOÄÓ•_•ÙõL„RLü6O©˜ÐÍI‡üWi¡:HY×tŒ$A™ôÖ£ãCk÷^kW¸›ÉRCK÷wYJ™6Ò͍YµcjŸ
¶[úÌÌ$QE›«ÚöqÒÇÕð‰ñžhÈS>KH¯=RJ”³¯ÃÆ­:ˆ«×o¿ª•/ÙÕåæã#	"ȶºÈÖÞWH­»],EHBHºBJ9ï0bàa[«{³¡;ºRƒ/„ŪF|ꉵ,•X’~Ñcé•òÊèýÌ|ox!­< -uÕN8ÁÆõ¸àg™–ɦ—ÊŒ‚•¤ È\5K¶näpK’DÜ” õ €x¿–ÿe²Ÿ
kdy'¶6V3š¾'7iÐR2SÍõÁh’.bf`fC2$A$$ØFÔÓüÚ¬¶Í{|ó±,ʁ3BlÕÔʏ‡E1-¦ÞxdȲ1ÅÃv½M”B;Nü½æÁvê@5.O„«òÖé#rŽ«=KŒ7Wzw{º·j&Ñùœ.,Ú	9îð±\mÌÉ\eUñ·²ç((/rL¡Ž;¼zÖÛÐ@Žê8úÃßWÅŸ<5öÓǼ\ù¶êßF¬·ñD
3óÇ7ÑêÝÃ\<tóU88ßˈyê’I$Ú~ŽbE~Múpëï9vhãÙ@ôï‘„¨WU”‚A#²¢Î«hJ%
,UPò–Ž‹gÇt£àºöiñ£¦º eàFÇnmp¯[£`õí¼µhiq»Ù¤k8pr¥òé_ýsðìÌÚý$ «§Í¢Ý½žXÍö{ñÜT2“äªù óúXِýÊkëiþ¨‘Ý[¹®ú¾Wߌzv?¾`ƒ?…¤Á{
Bè`{îYæ‡ä‡<ÿ=ÛO[nnnw¤ß…¶G„§ÒÄÏÅ;†Rí"	¿ Hd—ç½wó¹õ®bkþH2f`ùl¬ß=1bl{}1çÛá9~ê’IR´I~3ý ö*¿TB$qm+!pè ÐNڬ¤ïÒÍ}¦ê=ð/ZN–)›+%4`@{í|ÜC.þ8úKÓ7Oc;®­˜J"xè•N¬Ý‹T¦ªv&–ÁÍÖ‡üiÊSƒ`yKÑaîc+ή§)m[ݍ™bÁ‹YIH¥È3øNùdŒ`Â&$Ml» $:¯eÓïPæ )1(2@$0>‰s÷ûxõŸeÔëG-Y F¢f ô°KÉ<ÞºsÿlYr‘kÓØWlð‚i€‡ ´Ã06iö'dí—3¥ŽS^¬—q`¿eÚËáƒc€g2ñÍæ‹`(7œx1)C\G.k}#Ôªoü:C~»ß9ô¬ƒ ›Å~lï-<–ãÕGÇ­¬¾ÃÐ6šouŽ}_‘€Ä4MY¤Ðs«ßâSÂùé՝*!×Ú"Hž¨‘! ýÐ (ŒŠÈY[·Û„ý↠Ÿ—ó¬¥ÂuÀÛÚ$F$LõBÄ_Óðèøò¹ißv| þ¬ê@,xÒ&=t€ëŒú<i7
t>¾Ü.«ñp?®(GpoI:­¡šbØÛWm–©¢pd2 ~ÐD5xLú‚92Zöòõ%¹’§Gõ’¶,¾óæyù7Dm
On1¨ý±Ø·Ë¯~Ém Q‚Ý+BJ?Ó®'§]~½.£¿êå »/]¼>ÓS‚³c$Œ`Äñ>®ݧKéð8ŸB¢‡³K›¤~*ñKó0W¥ïêù9ìχ®»£$‡*:-PU) @IÛ¨tœ ÈŒ‹{ w=Q餉°± úþ®Ó[€˜ð@ÎÞŽìx[’v@‰+%çª:‚¼‰|™˜ È›®gËàòÕËZÇHì(ªþ²ŒmÕKj ÒÅ­ä¨úá¦nìUù??Å¡6/ßvÑ{ÿ»åç¯[žÏ1$¼A+®ž¾®z¦ˆ&¦¥!Rªk¨ÂMJ÷z.y‰¿•A		îI$ÍÍYº¶«ˆCãY¡÷AF“œi^)Å"v%–“rgI
gÆ4vþóó¼` r’i\¡n¶ÎŒ¤d	þ)žÏŸr텍Ôò}åòÂÐ2‹ëü«rŠ¿w=ñK¥¡BÆDë'ô‚ÜãFµE°£¹,¨/NPQ7CyÂ*iÁ¤¼:sCࣴ S+óöVžÓB{ÿ&3	9ß~ÖÀîáÃ+ZZJdš™oó(O}*—‡µÄD•£Éd(…=ìŽÓ+£!Ø_0ßϛλJÃ
Ý—ân²¬…º,Ž~.«ÌÕÓ=¹«Ã·åë%ié—¬k2k
Š²àîW08ÄuŠZ±<D”–²C ]oÔ•v¡K²“Æ4¬Wd•0€EÙg-Ô¬• Ýp;ºï FDI;
Šf>
D~º©l¨¢qXé4€ýéö|'cÀÇŽk3< !@Ç(ˆZLÞ×TáE{é³Í¿-ÜRøt	D’!"§„—·R8ç«]y'bdgôéïaëäbP™"Éi]߯ž÷ÿ*IøåÒ¥ ãï7nKgW6Œli_0k8”Œs$ˆD–y×M±FéǍŠMÇãGž34÷ósœR+tšŠCÂ+y$’’Xï Ûºx”[Œ*}S×jÖ"dH¯*£±gw¯ÍÛØìCÏ/»‹êQï„;¨ݬqÿ¯³ï³ÎÊl¸¤´ª;¬¾ì×ÿ¿8ŠʐÒ!Ú~	 O¥‚‚}×cç²bÊ…•éXµÏO<ë²FKºµyˆ‹A…欗æWžgìðMA”inB;òÎG‹²aĐ%ƒS™œŒß㪴ätX¢nÇgm}X»äR¥,Yp„V®/ÊXŠ>²ÀKA!’™h.^æô˜´ŽÆÁÛy·V‹¬$ïYÕ³/֐$>wÔf@wxé·1n®:xkŽp@©C¤™$|‘3é[amÕÙ\ÑQz›ûqrl`r®°Œ²PM«5bèe…OƒYžd¢ `Hp¦¥ý\Rè&1©¨%OžN­,Â,›`iøÙP{H›ÆC$¯’½{^Ñ!{©ÖMü²‡( †hW·ž:Y˜	Ý¥wz#Q‘“Û=ßÆÐsÝVTã§YýÁäßDHG8€ €¨ ']ü"Œ¼ F‚¿ž4IBì„‹¨,ˆ2(â'HAaC	)H[	Oâ±!l&¡ЁôåiB Dad?_ó¡H¢â’, „P¥}JÕ$‡ã­´Û_l…ÌWîØHNå¥Ð¨f+™"ùá@È*U%ÐõÙ÷Å.$‚m•­o”þE^/\Õ“\ÛnÊƍÐ(	ÎëH8!îÓõ–âO¯ªÐ-Ø¡"
,!ƒžï=Xöa¦‡öËð—ÏGç-õ„ØP {«º$åÆzh; O¢®­À‘{¡P='‡}ƒDÁÁŽ*N씄` È!±AZdÆHUä‘%‡¢WŽßLzå)}›)x¿åÀÞ¼Jùb(‹Îú)f&Âí„1* ÉW»ÊFDÄP53¢ ¤ˆ	 ‘H\&µì‚"šЈw°jyca€D%›šŸ£Ï"h£÷-kÝoašµ
¢°3q þÄžr6p¡˜ŠE‚¬ª™«b­·ZUU¾™¼2·ùªÚçªÌj]kWdåªåjBZ
BœØÀü×:
$˜¥¤#	VFÉ-&°ÑFêФ„!
±ªPD¡%JMI Ý{Sù\KՍ…kiõØl Զ­™£Zµ(›W*–o¦Í¶Ý–j5fm°ñ×ÍãmbÉ!5JPJ
 ´Iöëm«òy	Í™gb¡ùDæñµp	x¹ãé]2$Šý5éJ#ˆ²ïˆ´ßÿ7‘.¿¬ïAj€äH³º°( ¦žzÌ%?O«¿+Ü¡­†k†œÁbÈ'FtM5…Ï—ð¶ó–k]Düÿ›øoñwß;ÚÒÖ*ªªªªªªªªªªª©m«ž3ýp° Þ*…ð¡S6i¡#¹$!RkŸ#Lmpåw;r&vl&ÛD —œê‹ãCÄ“ï-`›Í4dVëÕÇž¼ºo“\n9]†9 ™ ²% ¦M¶áG›n‡Ñåçdu ›(­ˆ‚ lÅl€K~3g,cZ"€FêKpŒÈèÂì­hðd«k£ô^Ëú¯þG€M[ˆ¨èÀ¤ˆ±p )hˆ‘­7G#ª'£Ì‘VLåõ]˜›•’Ý¿áÈTP	® ƒîT7)ÞïÛ_–6µZŽ-ÓîÝœ@˜½;	-MP·§Ÿ{O{ž‡x{1[É_/mß™’.I&<»ÐU2°h*»„å¾RðœsËLd‚•¦¾r“ !_¥¡Ø)ù@AõÀxá(d¦IDP	¤‚…BÔúä‚ýÐ ÎZ
v ŸE ¢2/»¥§ÔEÿoúÏÒ7ëWý1þ¹ÿ®žõq•ì­²×öòÛä
d#F/Î7œYØ>|°4j5 "¿äíãsòä¡Wí#?ÎÜb9Kl/ÅmÐ~3öêW¿ópôá‘…O€»=ËØ©ž'"T™Ñ~P/¢îgó(ú‰d×z¦6ïÓ‘Ã{'¬kw    ýªœ"E:]ó>Ï¡Ög£çø±«c6wÈd«ÁÆ©™¨ß/{nîtÛ„‘”€@•¶SÏ:¯·ùŸwxB¯ç¨ëõð»ª_ÏB{z5~®ˆ¦¡a'¦’xÙÙ±Í ˆH€f  É ˆJÃ@R
:*©…vçev%Ó9¯ªÌš%Óþ阛%Ó‚¸K$v_KvIÉç¯ü½A|Îà™¢·×¦ê&ÐN`% 
e©»qÌÛF$‹2)
C A-o,1‘^d~}OüQŠ
 )YïUÐvP
ã—°ØmãFΚ?©ÜžÀAxˆf2ð GaÎ>Y:›¿4<:GšAÁ ê[%Ï
æÞeÄhLõ+öÂ^IV·„´š{–¥IŸ§éuUCû¸[¦s¨Fp.o¯g')^«FÈ’ñ±/!Ñ(Uõ¿íÌíaD$ÒÞ‘~ø¡"È·~Ø-G
„Ø öÎlÕlvžý›tç}:cÿ¦Uå±ÓÑçŹÐ~Ó`‚¾
f©qs€$cÕ΀ñiн?NîrRn8ó¾Mæ|x9Æw½ˆHÊÀ¼I-¦9Ò"œ¡LÁ¹òì#øF¼£6‰#]‘<‹º\>„ÃçèðHV²¹­” XÀ*†ÜZÃD î@¯n|¸œóP¹·¨Óg¼w0®.bö“ˆ~¿¹Èá}çˆÆÒÞx:;ÐÛáØð3ˆÖñC%ŠHüõˆ¼Ï2Ã#o×Æ–ÝäÓD©#݈¼7.÷ˆ«y7¿© CŽ¡ÛgŒë%[µÎŠ¢w–K,â±|p€"Û<g=G>“Õõ,™!}¯šúU˜ä´ìÿIk…„
¢œ«Žì‘^”Ui@Ú†ö¶@ô……ö D¤²:Au#ÃôAìtÜU©
@SzpL`NùÝ`šÍõèŠ:þ';=Ca§Tó_m¯*鮲"ÀC	)"7ð=Úó’Y¼û+-ÔI$eÌ!˜HÑ<¾Þ/gí.=7긧OϦxÿ—£‚·åú¿Ç¡LÔ’“úa¢
Œ¥wÏæû|Ûµ–’2úNc,‘&[õ¯™Q4¿Q„ƒ¡’åIÕF 
ïà|ã;B!@¿í ÉIÄ7žÉ¸h$5á2ËõÀ¯§ï²uE$S¿¦5ÙWóËÊ÷Aô@6€‹Â
xÀá ” 
r}¤¼ú!b;†PÓDE¡¿"#Ë¿½õ¢¤È¡QüXÍý°ºŠ.û‘DŒy‘>&D²Z|d6DZ|+:,+ï%“Ÿ‡)x%8ª‹>ÊÕéXd$j«&ºãùèþCðbíHãçŠâÂ*Ç1#¹S>Y}é½zöëÉ  "KàïRðaÙ„yãÍS`»’ÑE.oã2Ãí;ŽsïÑõ"·9qW¯Y¦üSù ¥eò„´Ô•s&¦¸º[ØÁ¤çŸ¥¿vþÆë@üˆ î‡ÜY T‚ %“}ܹ.ÞŶØ'l¦ÚúKn ™Ã0Wöù¯(„O¡,l!	MÝ“®!zÈo—;
(:·{‹<´!¿AÑ‚1n-•¦eÃvÉžÈ%ZÞS¼u,¿å\U(Þ5)Šu‚ ®FÉŠ"Û7Ýòy;g.Ÿ”šóA
õòü/Ÿ>•övSUõ‘T†ÛV™0—L…5@§?1k£Žyóšõ#æù8ª$´ò£Úœ
ì;éa˜a†øX{0Ϥ‹8KÅÕk~þ~ð®^üw«³NØcõ}ЁFrWõSœŸ™ØBûN9üŸÓGùÿ\~oUÿáêúr/ñ8tOÖò ì	L‰'ÂÍz¯Q%ŠŒû*ÒÒ‡Úx4Å+$„	m(ìáöÄ…“²õ€eÓ™úwÕ«N³î‚6
ŒëOÙ0;32fa¿¬ÙÎþLk[†bùïŽh›_Ýò¾’\Y‡Î¯¶;}~7oƒýð͈§#Ãå¿ÙÏ-†ñÔþX-ê*ccKŒ`knf¯Ý½#“­í—nx–팴tçs§­gÖž½_=yoÚíÎýÜ|·^:¶	àmãÛ^£¹âÎÞ_ݶ9ÆŽ{énË\ÿI5ðßNõOØó¼ð’ìENä3‘ýúí2ÑÇ¡ÑøI:kÒyÈìvý(ÛÇÖÝiGöög›!Ç xûz b$˜i}>œŸÿ·pz Ov–Î~óð¾8PåÈ„ŒuZB¸Ä‰ü§Åó~ÿ¨LRXÛÏbOŸ‡çÖäíÑyÎÑ?F]Sï\Ïî… –håGyCúñh9-3—Š ©ß·Ÿ¾|‡2è{¿îï4ÛK¾kzC|£1÷Í[¾¤q‰iŒc¢ÄGïd]#Èí_z©ÔCVËýíþÎF» 6«*‹ŸÔ&ÔC”Ev“MÓ÷|9þü½þÉÝ4»®[¨¾£JR-lHÐH°wlIDGÓŽ«†ÀÇÂOÇÚ\ZXPAƒëb¥æ¼ÄÜŒRJªÆ(.ídnh1 É öýÚ'‰è»ŽÜ	§aŸíP¯P‘BÿÝIqU€ '–`N;­¸Z
›Õ RK)_i S $~¼<ॊ(`H´-2K (lÕê 4hã:}Yî@·tKVÈÏX¥VÒdÔ¹ÚÙÆ+.µ_žmI¿_&êýUöüÀÓª¬×cEB¡Hœ+.E5lÆí¿7ÍømɵͫlÛÁ¤zqáÎXrP„×®ÿ†º£Ùl©€Ðß­„I|»<ŽÇø0”D„ĸ/Fþ¾®ƒ~νØÔšÃûÓ·Ùåᝈ±cÝŒcª{Í}û¸+SÕ(‚c"sA æ )@˜Š )Ž?Ïá%{Vë€D@ÉShh{¼	ñƒz‡F…/8
´n‰£ô@@N™¶(ºÄ%>õB¯ŸÒ„oñ…­t‡ó’LðÌÃAÈÅìrÝ›÷ÆMõ÷·üƒ=r—>ÈhF5—þXäòÖ’í30¼æT¡žª§´I`%±€QÏ÷zÑai ¨ëÍLÞ4ø8˜EYi®ü7þøÊñà<˜§6­ç•M,³©oœå)J6írfÍ¥“¯fóA^’ݱþ ŠH£éšŠþ´§f.z´R­…ÄY|XÂM?$í¸2L õ_”$†œ™iæ"ͯä,”3 ˆdÞÛrÇu7ÛÈSzB;Ðz·ÇÊ.Å6IÆ5ƒÕ“ZBs"ÿÈùj÷|È_J¾GÎYXH„:fn:É¿ ŽÐ'J at jèÓP	YTIÀÔådñMÖ: Nt˜Þ{~ŠáÕG®ƒÑßÜdªf Æqö;}=ñ¹à[BB“7H¶%@™5š¡mV¢ÁE'52ÚeŽÑÓ2ð“xÝ‘ÃåÁ%º„òÿc®à‘³ºLoF~|¸Þd¨¬!Ÿæ‡¢CóñK²ÓmÒܹOÙŒ“Pq³Ñ l6¹œ“0unåˆtPWa«CNÍφyé$ŠFBª(,¸rã‘s®ïì`»
ÜIPŒ¯cÔþ.ú; @Û¾g\}‹i@ÌÕr­ZMº' Î`±ÓnzðD2VC(Ë!¶5~l5%4âoÏb9Œô¬
F2À,_Šë$4/IU¹«Ü¤–‚‘¿åC4þñ¯ƒË0MÔù/ß4X`f  2š±…ò˜Ðê–ƒ*[J)À	;pjW54Q&‰$!$›CÝµKC–WHN¢5ž;\¦ÌMè!$9TÒöߢ7ÁáhjI"²I
•ç~£®>Z¦ªš©ÉÓáËM¡ÿ`áòe^S£
[˜6Í„HIãz at xªûrų‚òk]KzêHÄâð»·&ÈÃ[fìµPÔŒ¥Ç©£©äð©È/Ù#sÑ¢R
Ã3–Ö5µ±÷7wŽŸÄݺ<±–Éšù<tqñÞ¬l¼¡ úkÒ@±•8:;¦ò’Ò¬Là$2†µômùÚŒúiÒpÔk"$ºÆ¾h;|Ò $LÙ›•ÏäîÜ=µ’)" 0Á^ã#>‚6Á½?r׬“œ§´Ô7t7sìÁdaÃbtt?8Èuâé	
a :ÿgŽ¾°ÔÐà#@sçÝ ‹/ϺiqÁšáããÛXi¾úhf¾V=³|•Sn[¦¶8–e A<´¬r-[Î笠:\ÖBɐ¾¶ÛŽ’Y´ƒlíTïsõ’žA¡ßC\ë'œH‚ƒüJçŠI_¾g,Õìu_–eÞ²L-æJµÉùh•uõ@ÞZ“ÆIí3Ù~>þÖÚ÷ÿ[¸¯vÕÀ    5Pz_dÚ÷E¶6·€
kêîú§Kåym¯oWEÈ€Eˆò+©‚Ÿ­>´¤èð}ÇÕ?Á]úvˆ
> HxI+ó„r9h°"P ‘ØaÐÅ)Jô¬HÜ#˜I|ƃ8mÜN@G,bD}\¡:-š8F†©óѯ&@ˆi˜åö[H¦>Z×{|®ºÑ
’+íÃà󎟵˜è~@Dü)º^ºX±¨±ÁšH3Ðå­ 9(Âþ™RWóãç_…Õtfk^Wdô¿<ÆEb (Ý¾fÄ2ú(ôÑûëD}Ë¢ìÅ3Ú¼`!ó AȬȴjË©$!;ÑÂ5×e0 APÍKµq@‡÷í£í‰ƒ\˜œÆõéÜf”G•¯¶	Í…Èó±ÖG®ð-¯9/²è;à`\Ž*iÓ…¼ï"%dì¬5¶[8e³á îy*Ÿj©ï¹°†Ù –½½å‹¢È"Š$Kòlr弄{‘–&96À¢!D''«Ó~‚C¢†¨laL«»«‰Ð ›]+6Ó=Éd €É]~‹óQ¦FýkM•¦D›»· š¤Íª|µ)VÁ$	”̱*«ø®êUKŸ.Oñnˆo!Û¦7_Ëš4ÆØ¿ç(¹Ï”(¿R”Šñù'“V%C\W£7ˆ?P’¯°J‡ z¾è…ˆu‰Q#"ÓX44òj³PÍbZ¥EÔэ=5çEˆˆðâö~—Qe†íEF4N[¸Ü蜐Br¾ÑZc¢uG¡L·QÑŠ÷ßý÷•–vZÜqB­åo?g©kyªÑ¡¬	h¼3ÕV:\oÆ0à"¾3Â}rEC1-ÒË).”+®íà؈6ý8É	Õ<ċ<º7„¤/”ÅYZyìH ¾ˆH‰"H¨’ €uïõNÎ\úkiâŸÂþÍýzÚÂÎv áq(&uA
 ¶+Ó‚­äzñ“iX¢Á†/þ#1Hc,²ùÃ0…1„&™ûõf‰ÚÜÍA\Ʋ0¼.=ücà515`F:À´#ËHѦùé*çˆõL¯^ÙÏ#>A½]`ö•˜¼¥]¦'¬³œƒ®ºÊ2t«‚°" y¥üSNsØ á¬6ÀǶ‚w€¨E«!‘® íWð!ÊÚ¦+}„8鍤 Šs˜àÜbÿ8@Áª÷¼µþóÖpÑêF‰ëd÷ÕƦõDëm»Ì7…ÂÖ:M“Ö”oL×p
P	,GBZ @¢¤"§bÅT,X¯%Ú ¡š YÈE
· °(d DD
P£ün üÌ–‚¹@4A µ"“뀢•ÂjÉþËûÔ}å±Ãƒ+†%EL.UÑ™öå^ÔñÌöæÜÔ
 É€³ú±Q𞁙sÑÒНåŽ=Ìûñ„t™’„‰ƒ`D25‹¸û¯¯°/G3'd°Ã‹Y•Id
µYg…m%h®ULÌ,ÔñÔCÏß²,iÌdí±Ñ#SvŒa8Óëñ¤ñ?ƒÆ|_içz"
-ö€%d59×zoÜRB°"`¢¶¾ž¿)(¨€@.ÂZ`T±·Ò=»€NŸ^GJó÷Ê<ã¹	0€–	l;ÏSÎ¥ô7ÚÍDZrAÏÂ3òò?i;±yyÑ·õ1Ý[Ã*ù¶zØÅa3&jÎTmC ‘mÔè
çM‹Óf>½6°’ìzLÕéÍo3K]Ç–n×èÖ_j‹.ÁxØ9ƒä@od…³F…
pJíÐñ5WÒÜs¡^YNØZ
ˈw؃‘„ƒéz 6Š¢HTßÅb2×î,9ùA Œ‡ÏXÕ™*pCY>µ2]´a
4`v1ß.`ÛÆ‚”C埏ºv2"I|x{>܈>½PHâ!dëŠÐ"ídÕ
¯.X×CS$ÚcY£PÁB ;#a,¤k‹}`!µf‘ƒz‹Lã­@E”OCWÏa…É·æ,4d.Ú±UßÑË;D?Ì|¼¤	„“ùÂrK.¬7x4#!|
Jth­ GUHì`$€ñff­ØfÈWðòzý-UEMÒîî­®îî­»|sx|Dè%CW
PP]Ãvw¾X§y¿±ßìÄQ‹ÆÓ.¶è=¹qo¿€†Ý/%$¶ny¸6Ñð#»>$7Cvî>p(
À«ôðµkËÑÆ=dlßÆæ*ƒ(¦¾ˆŠH“bŒ›&ª·/b¼î!ŸkJp¶ŠÐˆïBQ0x`´ÀM8ò)9`9U‡µ€â¥RøP4yB„/&(PÝkÜïœ2¨ p€ïîÓ¼¾}Õg¸k^󟱵É"ØŠ/p)Ì;/ê”âG{Z1EŸv&J‰óa ¨Æ%2€1‘à$±9!A>âÒi‡ÉFÍá.þ•èzZÎÀÕxדMMíPåÄ1¡˜YéŒøÛ{óƒiÜD
_ÂB“’W±Apðlò€¸ÈÃqQ/VË)VX/‚“¼Nf”Ââš-6â3D#C!Œ:
JN¹Õ,±¥9pû§	ð9J~©ËÙîôݱÙßéQâW°;ÃÆåÕ ƒÌñ
ªêK’OÀfD—iï>GºªPs þ}hFþ³ˆ	ì6D[âÿ”Ø$=¿Ì 0éTØñålꃫc<Á>íCÅ_Ëq¸I)¿æš9>Z®.²†úQX£OÊ„îH(ŸtT!‡Mü
‘³oM¤*YZÁ±Ž#‚' 9ƒFO'‰Ž+Ý}ÿȬ´#6e[¼x£LeU¸Ó0;X H°•·ŸÆ‡nOœçú~J4!î˜îíDÿt¯ñöu…ù°I7“{æЇ9¾j4Óôð+,Š(jÆŠÄч9Q_Ïu”SŸ’Àý>_¯@÷oÛ—BŒ8cè’¤¥AŸ}†‚ÌHdf1çýq2íÝ¿Wä+ì8.ÇŒÊ(4 ‚‚R¹©i¨ø€F£$›"Æu“¸Ã¨d
¡¿ú÷½?»†q§±”sºc Ô•C‰FY¤q¶5hP¯³ÙÜI?ñø¸î͝•—ÞÀFûÆ”’$‘ù™"¢•‹Ö=xÛšÔô†®€‹]±Ï~l§-±¯ÖL6¾[¯‘|Èyb封kå3ÎAºèùg&Wò9º÷Ú»„œ¡C8 …Ra“D	÷çF“I])-¬DDDDO¦¹ëˆzÅóOfR
æÏz uMïúÿˆé ³-<©„k(É{!í7Öíå¦ #¾„ôª(ñ1×òøn:½7ÛMÇ&9ÕÕ›éÇq1ÇqÄÇL_qÇ÷‚EfŠ]@ÓqÍê.êìÉÚQ_›—ø@õÑÐDv=]û=r::®P㡾v<¬¸Ä"{w„5vmÂŘRMŠIÉ1Uµ”©ÜªìÿCó_šP Üo˜ÕÉcKiµfMûwgìÙÏþ鞍¦aY柏Ç
Ö[skÝ¢yÔ-³àDôrRú$_ô>éC·T^`2´|åmƒ²3½Û²Ä®ˆ4ØÕ8⤅›ð ç³;S{Ÿ«kÙá€~„
ßxÔ"´s†]$Oùãðõ¾™UD[]·Æ|eTUþ^ípMe“çH	­í©ØVþG3Öå	‡zªJ d¶£j1 at S‚ÉÍ:«·^zBc1äU¨˜ßXf‡6.ÎKŽã¼_A‹>P€¦O–D¤ÉÊìü6®©4=–š,½‹É´ž)LI®ÛIÏ릟»ey¤­Ó"‚Z8tgÏ~J8òãóÃ_œ®!j*÷P5A$—€´ÝÎhç½CsÆëï±ßòùbr†¼h’@hdÊCqQl†bBÓ>Sx×åÆ«ëpf”¨“±ÀCœÄkŽœû­<'MfÂÎIÄfâÍQ<GW³)ψÌ ]V{ùB„6×Îàâ¬d‹Pl²À㬒E.€d–¢Y“W §f¨€sÞ<p”ŒÒÏGÜZ%~[ ±ã½kmqÓÑ™âyò3œì)ô fq0Ç, at 1Îpƨ‘‹,¨ã¹'ُ'Sá‘ú·9
ß%ô–@ã’K+v¹¸iT-ᝮk(tªýAÕ{’AÛl}*3›JFf|3ûë£S`{ß'Íœv% a»÷à‹ÝaAùäõEιìSµYà“C׎)ó"AŒcîÌ+oxèOȏ‹6ŽO†0tI^›>¾£FœdÔWHê´ÆV$TçÂœ[ÓQ:©Ön¢ã–UÉß]Fç´ÜñÏ“†HÏ6}rÜmËjWhr‹ÕŸGˆR¹_Á™˜fff½YK•{ã\Ê
lu…ÖÐ"÷Ó2/•R‰ ÍEfºUJ[Ÿ¥$˜žx4'ôÛêG>Ÿ?æÜl+ɝ”²8Ÿ»üÞ+3Ó>f’K«ÊËw†ì¾ODMÚŠÑaäÞ§XE v‰'IQ<Ç$ ú,ÈÏ·Ž‘ŒÆ’Æ©RÚd䮸݊¹Ç '€‰ÍAC·-g+Ú­m¡5„·)´‘š„$žÀ|6Ó³D²ØHXæïÃ@Qn5ùžÙ fùwé¾ò²3}nj•ÆÀèe<›x}/×(¡$ȏoäèyÑ|âW«þ‰¸ynaîi0T%å 4.Š•éd5›•Xq ’`%á]qŸœC$“…B–ÊÑÈæËl:úk¨Šˆ6ëϏ…yäç׬ËyÌà@¢ó„Š/jG7ïp"Ì&"J¦¯GåÒ7”´¶2*Ã%PÔÌJèÂÈjèÓ#œ†Þ$3; +@ìTn{ó±%_a†4G[ÏŽFyÑ•’¬ 9 Ævsèúß¿—kXÝuÄ都±$Ã Zô[¡ãe0™K¹ˆBP‰4X5­‘ˆÖ~'Õ–ÃÙß/²Â¢%¬Ù8·e;ÎŒÅYË+ãѺnÞ¶vÕ…ÔG	ñIÁ	~M¬ÔW¶ŽGaŒý»èH"A°'fÏ‹‡âÏ:ejÒ‰GF²ßu­`ÖÃÏ®ã™
0iChQå'9Šw:ƒ¬ÆÒQËŸ£=’½Ÿ3¸ÏSÝìáLµ	÷…5ˆa²U™´]^m>	•¿Vm8Ʋ`’¨%ãër›G×´>fÏö;Ýzf‘‚![<›¥½o2N‚ÍŠ;ƒ³Zw3åz3L†5‹ðÌ<zydq•<·-ô<`HX)ƒ(	Il¹Tµk¼¦œ5Dà³t…Q´a†4Õ8GW‹šáárDCÒûb<!µ!”®,‘HÇW~°ÀÙ8fh°Ò64[»>7©Rh™õP͌ͭK4¶_U)r—QôÒqÝ`’2‰Öð/‹çÌCŠÃŽ«Øò @"Ä<±B”`)¸\„ÁE¹, Y YDYð6G	8YÂ’Ò!#H
äݺZ~-DœáqO"@蚶ñUm[fÕ
Z©¼†¯R•M)
6ut¼Ër½H«‘ÑÛÚJÆ”ƒ(ד`B¶R“æhs;Kš!è-§HðÂf¾JlEt=—î€_[ÒûhÓ’7³zjŒä5˜@IWpðϬ¤ºH+ɽtÏ9¬–j tÐj¼Lì"Ž†Êð$½D‰)•ÓsÍßNW¹õÖõ?{“¯"lj) 1‰®Q¥= MN7 #ÛmÒmI¬<1Ï
±%À’ÈvÕdyk@ƒ»å³GrüU㝉…¶@Š§ˆa#+¼u4ÞšÞŽø}ÓŸ—  =Œž©„ òáßd6Íu˜˜ž¬Ï7èýOHúóƒÖ@F^Ž:6|½UPLÔ®¹ñoî²q	î®îîîî.‚{pwÜÝ]îî>ß?çLM¹˜gUõ»ºª×e÷z/VU³òü8‹”±gÚ„
]RÔé3ª~Ò-ìYz3JœSܯ/;±J&´Z¢ÂY=®â «úËY±éûOì&1C)cÃ˳/ü/,·0Ñ&‹AA€váovÅ»œvì?ævøH‘vKŠszÜ{ÿ,—–vç÷äLð+m:×ÒkŸÕÚÙòˆN&µc6ù&Œ²ó¾¨‚V-²ÏheË=ýñ]ÊÚ«XögÆ(äµ9ÂðÒz­ÙcæÈ2`‚ƒ*?ËnÜñã$vC	ˆ„PœE%à7Hüãn¼WQ3îÏ6å¶þÚ†¦X.!èãûÆ™É'Mò
Šäú»Ÿâåך–GOË&±‡‚Y¸~°®˜ÞxòLÞö¡oŸ~IrQ’ïI‹pAWz\þ'C*,˜xŽz§,õS€°žÌ× — ¢ù¢!Ú!u²Q`m4’ñµ‘eÛ‰(’íÒ¤X½C”î7qoöÃ
ïØHùð«»Ê:´•‡¢ÎnÒØ™g-H“÷ãz̾µÈñ6{DÈïÜ“äå	Å7ýÉiÂÝegUÍÙôٝ$•ÙþŽžCaÝ{üW*Äç@žTh÷Ö`@
_gSʇ&¿Ê&‡[¸þ|û‰æxÞŸÀ@ã‰)Ãå±Án ŽaÓ	^„68¾ø¬­ëUÓ^)è(09o©Ã©ýá±ë—u$‰™ûÞ±,ì-à
òºAO€©T¢@„"l	iô÷82ƒý£)W }ôO³ýKî()êÉ*´PäŒ5˜<ñÞ[¨‡€Ì8´ž…µÝ‘PjÖº kN~®à_0qs½ñEõò¾ó,Ë73ìï–L	·½ôð/×
—rèe"ùPç_e`;Ž‰©Àa¸©Š¼aÒ¦½’—;H䣦õëι;¡?ïɐ¤e45ù
¢SòÖÄ-ÉíŒaϾ‰&`Š˜I†Ðü­—Èó£CÄUŠÆ¢P;‰úeañ4úSŠQÕÖsÃC¾$ðr_û)°*ÆðG<GÉAÝÏ ÓÚ"ÃLPýv	ú‡

Eé'à.ñ"ð¥­Ê!k䬺¹2ÔúÈó*©|ŒGÒas	o³Vú×è~Ê,sZÕî,•ƒ½z/õ…ói?¶~ËñÂ^•¯.#x/Zôm¦wëÞ׬›2ÙaETG–0¿<W#Ȩ_š.cVÜëýj»ö;(H˜¡²hBÂü¢LrÂÇMÀ!?c(< F
iûö›CÞ*+µ[¨šŸÛëLjFÚÉ‘éîÓ[Rµ½ƒªB†þŸ4ÊšJƒ 1·<‚u%ß„š%¶ºiÍÕã‹aщÁ”±!)P‰¯.Aäˆè_i“®rË“DJ7‘#1ß„o?Š$†MþnÏí8jÒø¥¢ñKsbýéÆ ˆÏtGjO?„•
ßœ_3wºX¼»¸ièƇÆì^©Ú0ß^ò¿·¤=¾4ðÀ¡Ç	xSåŐ/ôÄaÒßð6/Á<ùsŒnt¦è¬®¡¦§©RÁp˜½—>ÚÄCd4«m¬‰Nä‡4À0ë´í‚6‹’¨ãÎ`Ѓ˂	oÔ—eÐ|8J|õ‹î|ÓqTŠ‰dc¼žä¸[6ƒá• (B/k¤Ë<§þÅß<{‘º	åT "tYÈ€D ë½:o™Púu¥Áˆ^\·ñݤeHÞ£eR®qÙhº"Ò.â@¦¨ü¼ðxt®ø<1=õ§©_r+°â#|ä?K’®þ«T£©,]1Q-ø¢”šÒPÇ,ßùÛŠn9Ž\­»êÞËgkjM;îbQaô#¯lýU¬}*-Ý56-mù¥õôêøà`ñw¤4÷ýÍÉQâÊë¿ß>7CIWBí¡æ.¢¦ŸmõßµósšÖÁîí•-+j¸úuÍ,?Ì+	÷ágR˜/.®RdQØj4·ˆõ}¥=ºrœOO]]˜-èy:ºÖ„d;±ÔóüÃtu©&ûq¥~Ö…y\°šî	˜iž=Ñ:ñóãS¿ð•WæÔT÷ƒGŒEì6$&céR›¤¯++†~¦_>Žgˆ+Hñ—‹˜ÓÆøˆ$L÷Cp]Ái§?®;ぎì®Ê²w·Ã¹uéDáµ—7¢÷¶Ã_Îþ˜Kçð¤¢TÐ'äá°Ï7ÉôL³ÛxâÕ-ª:€pûm‹;PzKé˜Ð@YÏê¨õ*º—£©oT´J²Ë_¢
K
EI:B„åύ–ÓŠ+d$)Å‹Ù¤Ï ‹Ñ•••´…Ñ´ÿIrÂÜyiÃq2ÿÉE8!…­É¹ò«¼‡,’2íASIhX]Iab!Fô⒁<àˆ‚¢œX9ÚA·úèÜÜ”Äï'('Þ¨Ìûwov{£â0~˜Š£ºz‰L¬ÙYbÄ}IN'9˜ÚtÜ[rWϵKÏAÏbv$†$™D”}­œ%XÝBFŒÆë‚VUµ.Èé:e7ÑÝ•ãUž·÷&d:Œ›íPË2V¥Æ†už«Ü]%¨·<eó`ã)$­¿@ê!“‰ÿZSí¼Õ¦O·˜Ì·ýWèÑšµÍÓ´´ô76ÒËͱŽì,õÕ;b§ñ;[ž¿2ÒÃIs\¤ÖK§“è
 W„kV=¬¤ÀêáúmúT‹hÈ%# ?+%á!Ô€qŠe(
¶’£ Þvu2)öʼ¤—hRe6âÑ;Vþ±lЇoë ßôAìÇú™G<u¹ÓýŒAšØÉ„³Ûú
_ƒÐYnº™s§„;êR¯à»0‚è¾ÐÔYaaÙ|›yîj)^‹Ÿ9±Ðn@”œ®yÚšñ„yÜÀª*azºã^-Ãõ=ðPÄ£-¿’f¹¬Ñ—Ÿ?•Üç¿wŽ1ø(BWW³Æp¢`¡ÚSTÖ}šF
WƒJb‡G3Ìoðæg\X«KªÈ·øÝldÞ+›N‹‚LÆÖü¯eacî˜x£ÝËòø®'ÞÚ>¥¿âÙÞ8“¦Ô¹’u“ïì€Ú‘•ÞèˆÚñ$ÙEKúÃ#û·‘åŒ÷æÓîÌœ
8£ bbËò¸ÉÆøØ„ Ü&çЍŠ;ªD§ùÔwšã•á|X²e±"¦Sž¬*Ä̏Y
mkH­‚·–¤VŠ?̯™ü½:Åyéašøt¨¡9Á¥4­“~ŠR£|_ˆYù¶ÞÇ›@˜ÝÕT#Ž“SÒE…dûpÿªgo7û¦à“›‚®¯ž/BÌÖü˜FìWá]Z÷Kžµ6‚ã‚gšÆù§ ¸¨ØhÿI‰£¦'T—ŸZwôÙðü,‰!Ç$§"_âg[«#³ÔcgÏŽëéÁcŠ7ü?KkZ,»F¥­½|M9|qOo•Gõ𒊲0aTVÓ„~”œ"eSô±ÿÞ11z)p“T:U
ŠL‚z³I²À
—ïä‚M„A‚xÑ“»É|–Õ4Ç'R—è=õÖu¡Ça`^ÑÓž^fê–jƒ3ËÏÔÔ؟ѹ.7Ï¡n
}ͳ tÁXÌïº
 ̯IçÂŽžñÇK‡m=âŸÕl’ŽR´<½°ožþ³ÆI-#XÓ·]g‹øè\L?\Þµ’]‚´Õ7ÞvKÝz÷ªn®³×ýJ¹GºvÖôÝX3#†æ®sõü°(c`W¿ï
§¯ùÀµˆ˜ÎV0Û£÷Ð”pìo³$s‚…t|‚æËùhë5_Ä3çî´¢‘w_¢ŽD<œ÷ã·fèyUñɯûfQI\ª’Ê$ñaþæ¼:ÿ@H=s_Ô¦<9œEÏeæî/ê(êá’IuÞ{u|ÞC} 8W®íä{zTz\¾Þi?„ïqhbò~%ƒqdv-»JAûx …ˆH?‹<™|ø6h}ý§(Á!£{†äå;½}¥!ôpÿÎwÙ¿|
Û6Ï«$7CD„Ó†‚ãSˆñÉ fã(daŒ`læªxЂ†¥­”ŒüWŒd¦¸/B¤Sè§ü-Wé´c1	"®ñªz£ Cƒ…„8©éo-~xpÌuúI«
¯R›º`¿wñ¯góÌ68á¨u˜¬‹?Q…À•é;ñÒq~æa˜µ\ú<Æý¨škAFÃZç·ôN–™ò>_»>2HÇ l‡Œ±ëÉ«,1]n¦á$‘ðõïQÅS¾ºñWDÇ:‚SZÒØUWìëÝñÖ‡¯ïvä7Šå9ÓA€Kû›]btj½Ä›ÔفCA^ÊëQp–MƒP OžXÌ5ïÇvU×ÔØÏU¶ŒF¡DÊìæéµp*ÞÍ”A\’a³AX:•Ï\Í+L¿ë~¨XµŒä‰ÔÄÚ¥­q÷äz7‹qZÿχÖñ9]PÒþóiD‚èÒ~I2™ð™3ªŽ2TdÌâZlŸÛ¤½µÓ‘¿­­n´ñ û¹ßñ3Œ%9© ‘œ `¬²{nU•U¿ÃŒMU‹…V-kË–‡†TƒÚæ“Á	jiO±D9”<rxF#LFd:•Hfõ¿¾Ï:[3'÷¾a~æSôjÍ6¦VKÉ«{=5•«'¬1ÌR—Ä-µOkM™í÷ÜÎxöuûK‡a’#ÿO~| 4ƒÂ²IIe¼‚ÉÙ—¯†YŒ{pÔ»äýêž~Ffr—ß«çÜè&„%~×æ:ªÅGçI
À'_fW“²áZ·‹ƒØÖÅ¡Û8YC&1þ4DLà,KXÛ{Œ_m?¡¸ÜUÎÏWMý`6)¤¯’‘ÕÑQ'ЕTS/)jÃVÿ¿Áøßú¿ù?wêêj ªpùÒñÿudjåÿ‡Ž£u,YT«ð’|©m{Fo—Ø´túÿFÏÏo褖Øõd6›G™üÒQW/ÑÜq¬õ·˜uOÆáq¬/‘ýÃô3M 3'ùf‘©+
Æ ÉJò©+û(¤Bø±w­´Xð)Æœ
Y@d H4„:*ì96©‡¦
•eÕc ÐkÀD§ÕTmÖЀ£¾Ž^Š‚ÌÃÛ«õ¾Ò‘AçˆF¼4…“‹ù7æaÖ"Eñ’g›ÊÐ6HÅ°ü+…ÙSGK3 ï…gF at o£4ÁÒ®ãeHš0Pa2~æŒu'k›^Ó‰B%±¾’¯vöo4·…§J< Ìa7tAP² ¬Q@7·1i}õOtè9ó®Ìâî…D±7š#LÜE01­fèkùæÔQit„:­  °8ãÿ,êè(פ41¢‚+»þ«-ÐÚ€–jº?\©8º¾É^HX^p at k¥Y‚¾*ÅkfUÓˆI‘õ^û­©^.H©ªÄ
‘û…ýÕÈ‚Ú']I–nä0\Ô.«&ÒTùRó×¥±AX`;:–J:AYòëºh“ƒ[žÛ‹/›óAe
Ò×ïF¡…å?‘d-¥,×£4òÕfý:Z‚sÙV¨Vœ/h­íºÞ?,5˜h–ùö¹¸mmœS‚è`† ÉÌ¡8Á!€ÂPS4’]n7³ÃjÑ$E•Yl”Ùt¼2篱T´v]!¨s´tN…êÄŽ§TÛRtD,”Ž5•¬èÃÀ5 "?ÂD,êJX°%£k„e†~#¼ñ¹&ÄiŠÃšüüTà8³ùé}KfÝ#†*ú\™ä-†å
Ÿ¸}Û]ý²ƒDùœ¼¡#?'Cø	À„:ò<«ÒAo’Ä‚¸"U¼­½÷_pþ#ß®ô35{˦gŽ‰áY»¾´NÝÃû·ù¡=/¹yw"V}ÒÇ“˜Ço|wªgªü¯Ÿ=ÛÏ/nÛ–Ì«Ò~—óã¼üS[©¥±ë±Dábro—bÒ|rÓ”„.šL2}ÜQÛï‚…)RÀ?†1“Nq=†Ëë'ìG›¤ôýq8£Úèª(¬h§Z;œ~ÚÀ«ÿ¼V9>„ï¨Ê0ö&“‡T7ð[n™á™#®§»ýÛ P/ØDᱧå|T¸†TÓ飼‚3féo B“@$îýÛu>¾2)}ùg¼Ö8úAed‰H9–ď›bÅ×0rÁ„?}“	B3ž7×S,µ¾gÔ!Žßó^¡Æ,E»?w¦„]È'ºß¾1!+Q:¨§(㘀%Ä ¡W³rK¾ªŠò†1ŠquŒ\S«APÜó"”½^Ö9›ë‚ä>Z	ÆŠoOƒ ´Ï;‘9ì–­q»Oí†y?ªô+dÅ@{xiN£'‡!¸¸Ü,‘fÆAÛÕ÷î{B?ñÝÒ·Ì&m8Ãç	¿nΗ¬…ßñ°DáJ‚jÈ•åK~4GìAïà¯Ç½TÈ4I­ž³$)½pd9¨4T®—ˆE mÃÛ£¹"©´{†•…mÆ4%cxXH6Å£sÛX~k^zùaл¥r/yÇÅôÝ&8"4§ÀTÆY µyú”ØØŸ¡	JLrK˜Ôá•û籯T¼7ªO·¯ñè—¶Œ0¢¼Å\¢±Û®âÚ?¼îˆ¤(8¤¬=Väñúb¼±0ñýʇ–®R@DsR*#­­_#ìïAJ€´ü¬2íÔªbˆ@0mE ¼N:+¤C¼›Ì)ªåA»å–}á_‰ŒŠZ*Õ7›-\_O…§=3ª^0¿9ËYÔž¤ýj'‘kò€fZúúh-kÔ€ä„}ë¨>þúøDb<×U*¼ïsúXf8ís0nù›D:F3‘EüØï£+éày<¨:Ââ³mޝék»…M…XÏY¥`25Wàß}S– ÇÎ#+!Q£S@—B`‡w"éýüÉΈd¿ó[C†]ü
A;g+
ûþÑ[EnÏ€£âVrUÁ%ÜK7åÆIØå7ǍӲŽ£à¨û£c.À Ô@  åûE]¦9Û÷k`lY2E峂¼Ö,ù¤›êlDì«m„8(h̦+ºduk¹½Æí›ÒØðÍ+ݶZÃ掀82YN­ASŽêåíÜÒXîZ¦8™‘ïóS£¥ÿ’×?QûÆJ?Îd'I”-œ›º
6Íû­|gï…8¿ŠÈ ‰ÉGGçw…îÞÐìÄ„ˆß¹k	ؾ¡dÛTö(&vÏ0‰k©¦¼Ø®Fƒß¿K¡s1&mNÃ,†0ì
Õ¤Ly¥Ï¡[ã¬/SRR´üYI aFzgèÙvge'
Û1q_mÔy¯~´\xfȐ@‰–¬°tË{囐bŸ§0ú_ÏRÙž^7x`ºipã€oUÚÍø{y7œþÂ:ê$å½ÙQÁŠu1ów~’ì+L„Âr0"´Hq¨þŸð—×jT]Þ¼[®/-µôœ;>S<ltIåÛ×^N!·¤4íî¯jWŸ•º©”TŒÿÀïé=**¿ëb"ª^LÜ+Œh0Aò^Üã~tHÐè€+^L»‰A«ÙЉAÒrdð‚	ý ^DµQ$ÒÅ2BŽ½ËÙ¾Š«Zh•
à³ÇøÏ7¾ÃKæcèR4j‘]¸Ò*
yhF	H2ouEÆË{DN$§éF¢ëC€»k¾r6Â÷æHërÐ4l†DâúÖ?üC{Öã_“ˆüèK¢638ƒ¾zšÔs 6 €N¾€3/fz&CO·‹A"„\ªÏŸI,÷À
VT¤J<þðÀd4gl
—Z1%:GáóšnǤŠ'?J_݉£¢aMÍ4’”µ\¬þ¸×ûþ¼º™TF.Ôß SÐ̼lvˆŒå»ok¡êìYUGë—ò'c”'œôOµw|®Ý@Ù€N†bÅ+E¾¿¯YO¦5àòÞ7«K@æ(’ŒäÆð}>™Òv	·-ØK
Z¤íÑ@Õ*|WE"AîŸQ%·ó¯©ñãٍä׎Ð%§øW‚¢
,ëÄî`´6ì»iRŒ¥ R©á‚~|P$$¯~@§ÔÐú°eµ&™ø‚§‚çŠôäx偍3{ð4c.Ôä'ÁJñ,(_ׁvþÆ\tq³zçŸÇöx›»{ˆß×/
ÃoxGXrT:Ý£¿`çj%UDzÑÛl†•^3Æð†®vG¾n¸	|µe`L“7t¾yëi|-·ãšôô(lÞº}vr6~ª“¦žyüà·ÿ@àFmÊ
¨ôj@zgÕG] hZu• ×ÕwýævQ··«©@½STÎÚVß{¦ÃJ	T%¢Ã’¾I5T™æC®s?Þó~z¯˜gm=R‚0ÄuH»Gg6¤i¨gŒÝÕ±ßôºêe>Íë·Úkp,¤Æñ	Í¢ŽÚ‹UbšùÍiã‡
œï–wmßƾŽn(à3ï’0e Ðp|­úûy^$ùsÛmÛ3“¦¥‘Ü“£¢yËñ°ÿínAžãAËÓoõ©½ x|À‹úûUkI|îp¦r	Ûõê¡ì2JØÒS`µæõÑ«½¾!\±có"rnå£ñ<Å%‡„,‡Ã.8Yß؆o=“Ü€úÈÖ‰ÚìQœñi»àl‡ë µH/ÌË©Vé&ÑfßW*½Hn
QàÔ—¿òõ”n[!#y.¨ÕÓ‹µ[7Ú¡ÑÁ™Jœ:E”¼zÙ’MÚË×Nä‡_Rw–\¹;³á·9U–¤â- ¦v3ëûŠÀá7ÔDÿÔmàAãìÈԐ~Í™¸ÏŸêÆd¹’±ø˜™ƒù@óä9KRñ\òã$>ß63_$¯6?ã»àÁÞÆâ±°pϳ»“æ@–9ß¼ÆëófÔѪþ¶„è÷¸Ówáñ^h¤Qzïh8áãà™÷Ä
ŒVemÔ;N=Î:Beõ÷Ë‘æòÞDÃhò]Éñ¾/Ò(”uëÙœªïtLÒéÒ+ž› s§TØ<xµ7ÎÒ‰R´øI„*sý6</Ñæn¾‡Š`Û;y¹pÈɪñi+§©Èéì×È3H9-J:8Šå"¸‘¤©¯"3ôg”).|É_D(ÖŽ¬3LJL'·=A
¬¦“è$u¿ˆêÈIz¨é|'®nâlÚ 9"4‹™'fµ2Y}H̉R+³þ ‹·;õ/³âá¤â:ÂMŸ‡ŽEÃ~†ËïWÁ®Í–V¤z6Ã%ˆ—Y¬}µW+÷«§k’ëͤË#D泌 ¸ET'9€1 Nï"»ZÃ7e_¿Àî
,‰ H¶~Ò“Ê÷ÈdáýSꯨK;2T_‚É=\µ}Ð\ù¨¿ÂY#£òq› N„–ñ"="à8lÉß5ÐóºÇ½;tÀœ!ѵJjf÷ÔEÎÑúvŹU_¸L-5?#s´Óáï<D7:ÿ°ÑÖ´”0”XÐ3“Ú £J2W71”pútñ©ïĤÛ6FImaÖ.¡{ÝGBjÚ/Òÿ7+?Ò=~4¦&wà!í¾>Jõ…UsWÍb'ÓÙ•¯?2ÉLPU©p¥Hº°!Ó›±8œötº¿ßlˆW/¥i‡aë%@;ª.>¾Ò;¢ø¢º5Ì"}6,ã@‹ƒ¢C»iÇBQq|/§.®ßVý÷Ngù˜˜ë¦`R`U[˜Ücþ™)ú·µÜCKoú¼Íg¬LS¿>Ÿ°?é³CXUXU—2²ó©±or¹ðÞ³KûªA	EüÐÛc•D‘_¿"êB—=í\©£m">mMöµ`’¥nHÕØت…{×ÿŽ¥€÷¥÷`‘o½O$!xA»51½6ùã“Kßi–›% ®$P“ni+{ Qtvî,?ï׌:-zò”>‰ÊÆuE$8s0ùòÝV
KøBˆršP¹gãm$olÑaPj×wK3}â•NΊzÐC{:‹˜‘¸ª.nºhƶ.âùUÛÙ˜‰–ëz®¶’¼ÑL(¯ãB¸>¹ûc4 MOäË_ñ-˜¹•e×÷»âKÚï4¶î¿Ð
‚
C~­WßöËaÛîÞUdhevtFF^“¨…ëàæð·Ñ‡a-hYW®N¥÷3¦ÝÙåseŏ;äЄvÔUÛÑ-C$Þ Ÿ–gK°ýtF 0å$°L.¬-øq%l.—¢®2*6åŽgzGÚÓr%d³u=Y N¢(q…÷~çöóéºU[Ÿò#wl˜¨ËúÍd_£Lu’^ScCµãc“F`£aêé!ÂÀ£ûëéÝÝâ^•½·ÐúúɌŒlÐEâE|â$
Ó¡©¾%°ˆ¥?‹š	åjý‹zÔ^‰Õ‚-úÿ%î‚¿õb÷Â:$¶}Æ&Ž0òxÓ7jÛyF÷ìl’erŠ?í°ªoqQÔ¹ßZÅÝ¢ŒŸ¸ äñ»§
iA˜yûu$llšÓÒO(\´îR¶Ì“ŸYaó_ÈÅ!ÊýÑ-9ãl³nÁÃðž³³gÞNµ‡žÎÏÛD9ɍé5E®ÝRª5Á$g*¡§Ú—Gr=ýÈ	õp¼Oú
ùå§#w/è ÌYÙÓÓYaiÝ–Þìx¸0Ûù¨D¶*Ùß³vð ‹È<Ң݃<u¨Ñ`s“J’ôšø‘öHhKðÎQIsG¾ÍóFº›;;&.TlÀÃðϏ”—âì׸dÂÎ~«_×
3Ø…­ÝÃë[(`l1Â¥<ågî~·³c,,˜Éo¸Š÷®ü=-uù_p¨6ZCÐéEÂ+›È@‹d ‡0Ë‘g¹‡žØƒ	5q)Ä…H¾,ˆ…q¨/U3Ú‘ë!¹–hßÇ4²-—tómŸØð#•ŽÜzI8ÄBŽõeÏ¿þ“¢wÕ€Õ€p7ôz¦Oêä°Í²ˆÑ<
Ö^8¢Íšý Í1t¤¶Ÿ¾:4° IÞ$ìE§æRÁ7ÚUkÈû¯›|K/—Šâû—·ž…î¬=ë2 :MJŽ·cŒ	ÿ.ÎEB‘¡äõK—nԝ,ï÷m ˆ¢w(lÚÏŠ‹ô»@Žá^BEñ!{C­˜OdÔŸY½[ì&¢´QéÊxªNÇᎡþ¯N¯áØÙÙ9Çð—n•ÝA Âþdô_·Y{‹íÝhÁ_§p¡¨5?î°qcpXknd¾¦™‚GÚÀTi¶V¦Ê£_mÈCLƒËG¤"_þ0f80¸Ú£âXa
úŽ†jcÔ/ÛE)›±ÙÄRÇþâOBØ7ŽŠwç[$¥sïhyã>:ÏÒ¯ž÷’;:%‚ßt-q÷ Uì³Kî²(á_,8̸ð•Ü»›ÁèUò=ZáŸt›FÐ!4µaôòUáØ6»Ž[†++¡öòIÑó7ç0Pçqû±;è‡ß×}.7g9éËÃ’±͆Ž¤‚.ú1‘Yb´#,rqKd¼y…ÿ108úb?¥\š…¹¨¾íB½–Û|¼ÒêØ@Ö+¹â‘ð•_¿¸‡+ñG¥ J›»¨_ÒñIFv¯ÇYÀHgúÏb_aAˆ±*¿ Åä0Ã0ÊóE´1¥/…¬ç’œ²Lß%ô#Ñ+^­.yóƒÜº÷ŽòtÜóʈ$Öuov§Cë0ó}©|¤œ6³ÁadnÏ'tNßÀ¡_5ÔÓÔU^H¬Ê›>m߇}Ãl(äwˆ
äßkd%›ÒGå\î20èÎR¨úÝc“/`*7‰7V¡ð²ó+æÉjwhԃű¼NÑêÖ‘×r]ŠšvÔ©s¤°¹bò1‰8…{ÈpA,!GF¬÷ðrbAµt–}"åýÝ?wýðVgÌ#”–ˆÜݯÞ739˜f„À"‚@Œ)B“›£Þßáð‰%ëWañºà Æ -qœ«X¦#
§ÀJ"q{äìW«7]éâ·XpÙ¨‡RÕÕV¡.©èÈp#nÆ„d{;[üü]Y¶¥t»Geg™äg_[u©•-ïVAz§Mƒ_%‚á ºå8òîNJ"/YCޏ™Jé‹¸‹/ß"FC^Ð?ïüöÖ³F‹5·¼òiãk’]3Êdmk¡4”êͧ†>¬!à8c,IÊN	8ÞuIœã¨‡ܽ~YÁÀ21 ¤§ÿÍûÎS,¹=‚ò'±çG7i@	ü¼ÐK¸9!„¼Ú¼"ÊA–Ï‘‘éåïT_BÂiéÚö*…"‰¾LJ¡ç‘/ª/$Y:T˜Ä^ÿ¥èõÙ,N«aÈ?xÔb¾I,4–ÀxòaŸ÷'fÖ‹Ù´øW»ãOò@wCIEn=01œY%%Ú·«b†ŠÜ/Rm¥¿9T½üçQ©Å¢
+×p,íï£0¢ }©Ž|¬ø®ï?)•HØåçÈLbfå…+ÉsV‡wf²Éq<æpB”Ñ®ŒßFòFV.ÃiÒ4©5(ßÍCjjHu>=‰Š;ÿ	‚
òÌã=øY\²hhãÅùÚA¬Öœèã|@鿘Ïê^%rÒ͉½~/F’½T±N#<²4Ä\ºûØ+&8¢38ë5Ó Lv"¤ÈºiÍž+K¾tá%"dI" p	 œ$N‚  ”ìuãU¶5†xÑ"ǵ±Á
±ÐÛ£h	zÑEJ¢’Ú}¾ºŽþ~wd    °ýOHxá4È:ß~ñ74&ÈêÑ^Ws¼s©¹2KŒš k——Ê Bݧ6©Å3Œ5I‘ðÿ-luÈ?`Sl?t/!'j`ê
ä´´_³“¢ÀÕP¨ì” æFKkCÔ#”¨¯~„¾=Á…aHzôŠ~öñ¹ÍäÉÇÖÐ??=n‚Z™.·Æ&üäo€À;Û»)|&j!Ãv(˜Z¶U³Ræaý#,'èáŠ×ÇùË·€í%!R¬ ¯äª)n{¯Ç­)óxáqþ4ÙÎ$²‡Ý¬7‚Œ¢=£ëe;Ñ4Õ®“¬‘C›æt–AÑ;,‹à‹|®É¢>åƒPv†ù!ÅÊ/Æx0³ÙmKv5뮑wõ7Ä-†zh–®`D6Ì€r±?‹g¿ºƒ_/à%%èÌ$PÑNK uZ$7s°¾±}ø-
½¼÷rˆ]C‘Œ[Ì+VVSð¦ò¾¶½5]Þ¯¬dÉÌ5Òå¼ýÍtCšò…H{
}<CcâìfE84µµc8š‚ÍŒÉ×HG;Ì"çƒÕxpcúe"  ³¶+{ð;u$—ÙvAÔÝäÕš$9Ìnç}Üh4
Ák™.Ò{{u£Ø“6@¡ÝAG(¬È¥Õ†Gq¬x7›ôg+c’]ˆªM+»—ìŸtvÇlcH Ê]Tý	ëìNP lÄU+®EÐŽÊñá1£=Ûº"P,$?{ò4 at Re#¡dŽÓ¿0¬÷mIðenu:®¸CÁ)?ŒFÍOôxP/‰ýîa6R¶¿zšß£é¹ÂuóÕÐ#ÏÝÓÔ=ñ«Àu|ÒÍC¸µÎ¬Ü¦q5|JR¡
Š¨,¹+™¡#߀íD9"àßćÜ4ë·‘ëÇ}gš|žj
xû5Œ;kE2H¨
1ZZÖšXóQù¨¿Y›éÙÕ¹ì™*šªá‚B©óšñù-Ѹì1›†ȈZ×m×mkNü茌5R#¹KÆâX~ÎåúÛ¯¨CݍšaS¡"DP™Å±Â.òM~ƒWÉ–.°Ž>9,xn¢ô·àPO´¬î:ï­KAå
×wGÝ9¨D3ŒqUPB‚Z‚Ùl–IÕáUKƒÞZ×*M^‘í¥î¯–:‹tï‰{‚%êÅ´âùGõ‰Wµ¤ÊúTyÜ©,p‰Ü7â߉dˆ`¥r*•nIp´$p$'Jþ–„hÚó/O¸ð³£å¥HµŒðCY˜Ãq?ó[_†õYòƒûº“§eûüSŠ-·²šb]<‰Vx2IZ0kÒàðãöNŠŠZPû¤c.YÞ'.Ê¢íBcDé%Ù°¤UOuá}9`”À³¹
=”âAªŠ<IÎìës4¦Æ´·”S¥sôL¨}‘ï½ÅÞõgþFµ7ïŸa,”M×y*+âi0ñ¨1 R4~æ6P@¥‚”¯RøI÷B3ƒ
¸$@Áb"<¼J×ý¹_¿]Ï>âûÚ{Ïë|iR Yùü¤Fgþ£ˆÒÈú¢ó†p¹öÙ¢O†‰¸ÄG>È+¬¾=G/¦ì(U*…O
Y/øÅ“\s} Wœ–6§‚ÒYê²Õ
J;«" #|ß¿x­ù$êßv®ŒÛGsšÚ?tÚï°á«ØøÛêÄ6wj¬»5™„Á°À°Aý$ö}…y»}Ë*)N~¿øK‘"¢Øy[òøÑcü†uC[ìéQ¨8²ñ~ÞRvú”_pòͯ_Áêòqi‰µË^ó‚ã¥1™@mºQf²Õ2ÅY'S[ÓaÌ#6w±¨hçq¾^MϦþð¼Î(¯H¯ÖJöoLHQèúWÉ9±´49a5㊟åa;áaßjèߌv’I¦°Ð;^ââë‘:x™Y|ó®Ö§¼0·FÔÆøxw(®º=—FJY¦R>7밐ŒNB 
êÕ|‹\y9&llAbÝ=ö9l°•1itÅ-8‰G™ò®[†úü&SÏ0|\Rò¤–s÷ë»".*K;ñFyØë™ëq=ƒ™*ÆLNjª=Îr¹YJá¡(%òO´oV.³X±3CQ®kE
 ôÚõaˆ rXÒ·¾—­„ßÈS$1KøïLoÙ]×®ZÅìXY3'›Ò@•?<þ9ý¹‘4™×¼@­~±L¢ Úb©pbßÁÚ8ù—¼ç€å®B³?ö£«ÿÍK«³©µT¶ß9vri{"¬ÛQ3ß`¸•%Ñ–0³iV 5<=åÐßÎÛæz96Š—¹ÓoÞÂÛWøF¯ä>ÿÜ%
zË-Z‰¿"4zÚ•òIKxh󡀏»üq^aW³?Ù²g­–Åi_)§¤Šb*ÌÅ1jQÉ…D Èÿvd”®OÑmé·ß¬Îem>½­šÂ¹2)‹^ÇÂ3,4—¢ï(1G¢á”‚®ŸýÖß
j/ë>K]sÔ•ÕÕ«×™ýL&;Çþ&ò͇%4;M~’=z¸ö÷Ö6”h,ê
GݘX#V¢ú?ÿ›~ZQ]Á¨e21¼éÜÏÞWâ&n•dÝ}ºüéöÚßR	í›bÛº>Þ£?æOñâ–Ú;¶04nÌ÷벆§ó¸'5w6ÖШ~Ïv·n
¨ˆÂÂß$–ëQêΗ
þŒ«i}èÏËZã×>Ÿ>¡’²°÷¹žKOØÛÛë®RÈÈŽ x°šÖÕÅ8ŸkçßÜ©Ù{v[|wIŠÊ}+.>ñgw8vì;ÄOjÖÉImdzþû¸P/N²{OO•ÏS¬¾'–ŒŒIAêùïýÓ>é¨*IÖ
+8„#HÒ	lªÌgU¦ E’„DÒâ%=~"峌ÒbhÃFfí„0ý†ôù5/‰EÃÂfˆ¢Éˆ;„ÇDTûS—
 Å	a9ºWÞ]ô—¾&›Atz’ƒb3WŸ±×Ÿ®$<ȮЏ,=Âc‰¯:,ž£bhïF¸RŒ¿}…*Pºw@¡·|Ÿ½¤äaEMt7Я?‹•È 踓çyѱÆÅïËȁœ2³cZå+GI2"0ëê~†Œ¾[‡Ä–«=e‡~ÙÏgCŠ,´YŸøøÀ€R«žãÖâ×i4¨èûLÂøóùþ±z½Û¤	/8,[T4btà°™fPéÃnrlÅr¼%	o!C?5߸äÆè›ÖIp¹˜ËŸ§Å0rDôoG®Jh$DS2okÝ4dD¤Qó刘£ý€Ì§;ZžƉ!–ÙÎj£l(”””d£OE™\h±(ÁP3ÕêqwK >ø-îy£‘óäŸq0‰—Ë¿rm·™Aç ´Rd½ ÅÁo„qɁdþQðÁÙдƨü°ÕÈofñM´jnx	´	IbŽÁ½"€#¾|üîzÌ+xOÍAÊr† ¨i袳Ǐ¤Ìl¨vu‰t—Áç?5ÄÇC¡¦°K¤ßë×ǽ"qÊ5xRVhØ
Ð
k<GQ¥sJ,8Üly¯ÕsXdˆ0ŸÑ_¨¾Wmì"c<ãß­¤3•×¯¾/½î¿ãøÌi4tkˆÁ§ƒöWèÛ®g荤!@Y³0âù`{X²

,̵ÁB Ê|!V}‰6ûNN>…Ñ¿þb"ǃ½W¤ìï2ë‘Z^ó]¡Æ %Î¡‹ãjB6qÿ{ÿCˆïõeš…‡‹˜³ŸˆPf¨¬ªÀ 9–mŒ¸V)TgI1‚cm+VA`ˆ~Ðh³G
>þ6s¯ ñÒÁ`ä¥íŠò~˜1þ‡«!¾mY`
£„Wót1ÏÑ&ZØLˆ»=Z£Â¢¢IùãÕÝŸIThü¦=â‰@UOî€Þb2ºƒ

òÁn¸ý+ߣÛ‘Mìi•·Ù¯ ãâªoCúÜSPÐìÒ20ØSÞI9ÒêµrÇS8 ûÆ3m&'ÏÄ_ZÈ PѧtéŠÝ¶$5µ2áŠçäÊqÙ°IC¦1òe£’ÿs÷öøŸŽ¬ÌpÑR(Ò\.¼™ô¢”¦¶`ˆ~Æ`5¡`wš1£ßæÌÞ-ñ¼öÅüö—(DªÊèñößà‹pc8ÔÄ_
½O¯ö—U×]†Nˆ¢!dsWo¹+¿Â‹ÌÖ f„¯'­â
ˆï°0Ç4S0¯TNM?‹sj6gx{÷×9%±°Á£ÜI?T%í–âžM8l½»ŒŠ~wÛ8«×Ï6íýtÉÏÖ#PÐÀÒÅç¯Å
lîùñæõV@ÛKŠÒ|6A–x2T~—
âízGÝÕ´@PÕÜ­·ùÈ¿®Ú³£¤9­œ¦§­¨qÖÔÙŸPc±ÿš[kÁçõ{tšÕÐö–P¼,ŠvAKÔ§0{hãqFá·ÿ]š²"âìyòíOøjØù'Ó4ò%3´†TÆL	e{†ÃJK=Cd¶IES|¾:äl
pRÛ§Á×ïòúM¥«ïîún5·BËx0áŠÚ‹Fnòæ¿Q0¸U,%šÕ»èØè¢ò€Žüe˜+E’Ó7u„bxQŒÙ¸ó4«2³D	ÀdeF«°Bkõ·Umç.ÎÌpc”+ëܧµ¦j\µ|›a*ƒ~£î¶2ÈbFZ¤A-PxðNŽÄô¢gâ—ƒgY÷œÐҐ̄iè>&öV†N¼5
Ñ1¸1@%|Ÿ÷ã7‘0CÜÙŠ/ùǁŠG/BŸH4ûJP]wí@‘¯Çª`Ç©na’mîìrt{ñröIŽ7s§þô¤^¼Ì½¯v_ò@Â[ tÇ!n¤Òˆî©eÒ¬+[èöüYh=ÛEŸ6•¦*{ÚJ13³Âêâš8xZ–bL.*¥&Æ™ÕÝ‘…âÕGóPt2Ñýö½z lŽøMœ¬ëX~Âr™ƒQvÌJ%„âÏU·Âj·h#tãƒßBåı{xÑÏÊœ2•~@Ê&7"¦Z~¬¼‡™#cþ÷&à´ÎwñE‘UìÓ9DÈ_„›4á<\•Ù…ñ3ÝO6X45Ápy³'ËPñƏ«.ö¬{yMeOBEBB¯ãeCrü©ªX±ÿ4C—o 6‡Íøýjõ”‚’V!^Òw·Pwèp7·Ñ°¨é#dÃÏ‚šwýø=,逘ÀÌp¡âo.‘Û%´\}V:(è,z¬á	´Àz2Ë-ßQ£ø†)âý	
4£Mh„LŠ$z¸{y.¥eJO¢ò=ÌÑê£ãkü
YÙE»oËhù•P$+•D_¯…òµOC€†ÿ_€Òw$Öԁc^JéI 	-’‹@Ì~›R'z|Q¦„ï8%MJ>šfÀ£Wµ™–¿>Œ„Kɪ žV°÷þnŸH^8ÙÁ”R¼IÔ~åp'KgˤUµÿ®×	d†?.ô1¹c¼C‚çwüÍÙÄ)2{p·*Ìʸ~kJî™±òÖ—i¯â£+²XéX%F‚¾ÔՐcb„82’ÜYôYˇ´ÙË·ëÑÂ7ŒK²A\@ù<œÿ¹ Ès¢U6¬UðU7ÚȤ©‹½J”êO‘R|ÂV—µ«b-¸º¯$&a2 ´c=ñ%4ᬒ^—™™IJÈŠUh®š›”¬,Kaq8’Š¾Þ	mú.Ý<š‹a5i{²ø÷7»}…<‡Ä´™è øÊ;²”¾…)`έgéráoÙ?$¢¤™¡™ý]ƒçeäݾ^øǵ_ÑÁrè`òK‹|.
DúÉDØ8
Ø9I
&ыݤa‘½B¸p1¼²‹›$Ú,ŸÞÙˆK	́ñ®‚Õkd[£ºo¾B"‹rÀ¿nŠ`T2ï¬8«E ‚Ô¤ÎNƒZˆl)¬!WãyçLÛTBž‹ÇÙ½ÃzÕL(3K(ätCóC)ñ—y`>ãCEæmkwÙRÌ—¹‹’ÏÞËzt"Ô¦¦Òq­Ï_(®Ñ@]Æd¥5²ç‚o at N¹ÿí£¯<Ù÷lîй_èÒ	0Œ‚æÊrŠ}fœ_h+¨,⾫1•‚¶ƒüRbgLPðu^kÍ6\6]â²foƒ4D1C"2ytBCÝþEó™îݻΧH¨`بPÜ!ÑÊÊ
×òI6Ê*X~e±N—	dž“‡N“èùmySW¯¶ôu˜Ê†#úþš×œx	'¤JôÜ€ö‹hºÑØCTÄ&ëÒ~
4‰øˆpÈ%ƒÜ÷01Äθ<ysAO
â7ÊÒŸÎ,Þ™©ø{=nÃäA1æÝãdÁ!~¨gB¢?³–ÚÒˆ½_)EÚ¡b‘¸vúY­3ú‰"¨ZfúÐÀÐЋÆ"ý§äÖj•)1?HP¥`i½n 3†öÃÉ‘*!°}%õñk¤0×ÌÁ™ÌSÄúZôA €Æsˆ‹¾>4†t6~ÆÎÁAÈ4D•
£€Z¥hÔÄ•Hd¿‹£¯SC|[ƃÅ“e&aÍdÐËí°¯Iøý­ðµš—oF\¤û>DkTg4£÷Ø<ˆ%Øš.#_3LÜ©L|9'ôŒNë‰;çªÌ%tÒIÔ„Ÿ»ð—xcÙ±ÉþM2øl|vrÁK0Ÿ¨„ÈY)Æ9F8Ê–è7I¬4ÖP¬Ê,;€
ð½õ'XÝ…í„©ÇJà†]ê†~ÎI]¾Õ¾…•º.õ¯ƒ‚…ΐ6L|0Ü´ì©Þ!!²>8š8‰|Qêzô5wžL&–DøøMçî–öÅy¡—Hà	'Vî‹“Dí6.S,”R–Ó-³dÔ÷bXuŒè_¢–”Á@Lœ9Úó	Ñb>ËbÀm®Z‹7»µIŠ¨„%Ö’ŸåºI^7M²ŽÖNÃ8D‘JA‡9N'¼mÁ.ÔêÅcšB2É£I”Ùçä/Éœ	‰8‡«È†c–Å¡ú‡o›8`›4a¨¦;F¹²¨ŽüQ–.½J5ߐkºX¶ðVÔ¶µíœMöR®P{.$•Òpv‘‚'ï= 6z~%uã…¨‰$~·Že?ÿ U‰BÀFz„¨çÏZPN.<™a»sÉ”n)$ÆC$vpÛ"wõ5k÷òƒO¿b¿öYFÿÃ9ÂPj†6Ѿó«¥ÊâI³ÛÑnŒ²˜þÿMœº›åýür7CœW;—-ÒÜ!	%ßd劋d9ÔAz
ê™uw4ÓТ•CKòa]¿üR¨BLǏX£üÐ<æCÁo¿…ü¸FXØpøY "Ó ãP:r3:ZŸŽÞ\Ñ¿$z`pB’DÓIØͲIó¬'—™2™FTä¨)%¾ý! È
‰£NZe*Õ…8ºÂŽLÒn™¤Áükx•ÔÕÞa€5-¨,CdW:‡I!¨hh~ÔM?å4î	¯n5ßõ‡IP&[r…Vt§¦û¼©ö÷hžƒüÀÎ×Ϭpq†å=CŽúSÈqIK7±ì#´ø.›Õ}H¦ª—Æ!E™~µ¶wŸÐtµ)gc±"iZs˜¡ÐÏ”’4H+$%Éî¼(à“1ëb‡ðëRJU§çŠ
±(Ñ>3%ÁÕûï…xâê3»Mʇ†W>þ»E¥´—…kh[²ìj7h‹ÜNwOŸƒ˜_žî}êê<SÿÆå½n±«–÷Dè^zL—ÃJ­SRÏ(C_*lVS%üUá…ÉGœÉ}Õíhd€†–Ãõœ)çER¡7d¬nûiFÆwjËÉ3UfÒõòH»:1\â®HpB´/³GÈ¡¨LÀþ¡CÒ[§ýã£R¸Áœ$—{
‹Šq…v¨0ä3daWûC4ËžÎr]Z™s/¬Ã[7–	û¥©ÉVo.A1Ó}~5Ÿä:ë´×©¸¹C)v2>x6À^–¹Fh_ÃG•ý¼’x‘‡MvHjï›Ù=ÞpònËýÌ“ýƒ¤…7JéåNF7Ÿ’	/‚’,ê¶Bü襂’»péé8þ¿fçktº ¿"®‚*–=E˜úñ‚'#/ŽKÎw4	Ø$ÈÍ“õ[5sm¬w ÷ aišjì(Yh×yÃßµe GgVضNV8ôô;C“æ¢_É@¯&=°‹®.æK½Hp_+JdÃØ_XºÃ/@x]
dpM¡Û-‰h»JC§tƒ}à@\è•øÕ‡èænuÚ`- E™ôÍÓ¥›ÿÁ_ö_ÁVÞÖ¦ßÎr3µu¸—[T§O+V{ÏN¼n.
q8N32™FAjJIî´ÎÐTšÚbça¥³wÅe2¨ZÂù›|ŠìŠ5ZßU;öÝ4ƒsiH<¹õÓkݝ>àÅ c‚
’W±Vh!˜ïYÛ!ˆ½|í"Ü?s†Ë½O¢ƒÄøv#$IeúJpµîQ{Û%KÈ4ÈltÒ™¹ÓÉ@ж¹-¨qŽˆ˜¤ÇáV$»ÐÔë×à÷¸Â®[!ÌDˆ$©ÿv%`ÍÈš)èK5ƨàPbY0{ï,:²Š9;ôÐ6×Èa
¿‰†nŽJ&ïíûÂ9rSð
}—Ùç6â©UôsPÞL]d¾v­¬øïËÔ«Š¸ædÛYâ]"°Ø
ŽÃÁÀÔ'QN܉ ¬Âøû—µDÖ^ +a“i^Áùw»IÛòéNÒË6EÎ2E^âu…ϼ?t¾3D•Ï`Η­éž&æ,y-P06—3²¶‡¿q ñ½qrãïˆØ=·D†.`KI€»eÛhj{§}]Tóqiø-|G¯Æ4>„B¿t\yøAýZ“Åz©¶ûuÈŸ€RDdÙ£µ|[ÿJ鉒«„*,Âì€=ÃÜÿ-æù>àÙÿU$K,äŠ!öþç‚Cs+.„ppóêòÃùSkïœÓ€ü¦çÁ,‡ûÁ…4,Ùï’Ì›Å_¨K€ò¢	PÏ«I¦©Ìг
ÿŸŸhxs-}„(|µ;÷_Á,þõÿâë=ƒšp¢öÑT=ôI½WAŠ!„^½	„^)¢)B5tiBGº4)Š4Aé]‘¢ˆ ¢ˆ(þï½ï—{gî=»³ÏÙ3sž=³³;ç|;=~G†ãòå¹÷÷¹të(ñ÷ä?:GI^äãŽ/kßßbª½ðžÌ=½WTäýùÑfÙ½»™ìM÷8ÿÊývó^0%PƒÏ›~{ѪgÀÊš#WÄ"
~î¾bO””@<¸¸¬ÜScw3øvÒÛõ}玏þ àˆà)ãÅk­ÿÜfÞ\féÝ H.6ÁÔÿÜ>¶ŽÔüæ°@€²¡J¥öWŽ:¦bÕ ’u´÷»þ4$ÅIÚP+Ìù<Ý1Ñó~)
g˜Éóª›E4*|ªr5Ó{OSsHEù•y ð—Ë0ˆ>aé•+FZ$ѽùôØ.ŽM"¸ûÂñ“K1Ðâ ð™wòö§ 󿉿O OþY°£bó8LõŠPøÒWmȆW|¹Èl›bGÕý¥¥ï&FŒ8§ÍOáÃ_
c."uKã/:ò?2€¨~Âx_ ÐD`Icb½5™¹ò楿޷w၆bøn
(ä_Kc¡NÖ»àÑèÉ›wb®}{éõù¨![˜Õûnd˜åþŸû¥ëÌH?¤eŽøÙ·«ÊûÿæÌÅ·›^Ô
w=þ熱j:8SVL¾“uZÌvñ%‹š’zÌgf)¼á;þµH¬?ÿ‡pÑÂx{î~aÔcÆÌ­ý8ÅêÃÏŠs	Õt»Måðmºóúoê  ±i$LJ@¥ˆ‘)µ¤±ª>øTˆš¸pLµ•µÇÒ€0
S-8PNDa´^}¡.£	gøˆ¹›TIcG8qþA.$ŽôjFµý‹hä;®o.½ây{spÀ¦[bì…‰ªuðÍÖ™sQ3s–;sVÌ}
òÖT:Zô®wÝZílŒÀ"&øìEg·kÛý
Ð\~`"šB©9ýÛ ¦x!ÎãP§MéØ…ø)õºHqÚXÒ	~ÈIƒ8ÌU2aVM~ϏŠ{¤p1¼odk‥ØBá¼J¼Ë><%wæy".®Ô¼¥4Z‹å7$úGuóüªý¼[%|x8}h¦e$ý&ÎSJÄüŠÃU	^温rp%¶8<·C郌úú[.H%„ì
Ôx¾×w³mVÍbA“~™%+ïé1:ÚTöú䌽Û6¤¤ãUŸ@&ZYƇ[úìÆá×–y?NjsàrJJèñá:}î¬ib«³²ÂkãÌÁçc÷µ¯¨–<é«
O]¦?·R4‚_0¼2wç214z¯[{[»›™t›~G0k‰„úyZõÁ·Àq>nm5.õ¼‡‘:¡­Eÿà~+Ð^ ÃGAîã5Oþ
­û≳ץLªQh\µâ'çÆxXž³8D¦è
–¯:1%ŸG q¬ƒ‰FužÒ0ªäµF[¸:RÉþÓX®ãϸYRn7Y‰9¬VùÅTLû¿òJn pp¸ÉüW~1м
þ#b„5FÛ€†ý
îßá5çv¨1ÐcWúé›3Å®ÿ`ïÅp³Öõ8>iÕr:^^Zý‚ÆË_Ù7d™€‰®ÛÖ¡Ï›^µl¼Ãƒü
¢mۏËÌtÌ"ÉæÝÉw<Þfôû,æ"|³G?ËÛUæhþ°½èãuò>Ë#yaøˆ3±Â©
ݧPCŽ–"ݕ5Ò€.Šóä:™z-ÿ¸²BP_ üËí
ð„	-7Åa\ñ[áƒü_Cë1±úq 	o¹³ÞË=?ãÒtQ6®‡‡·× ]ò\ëÇÖ³E;W£¡ê£	¹'nÊhˆÓ3P8a‘ÑyíütÈÙÞãV=RvevAŽå€ IH{ùÍðT@÷RBó4#8ëOy¿p·0Ì£‘ø¿ÖK-!ç§QÎ÷Êc¹›OŒØ%ûžot
^|‚œn¿ucmûJvI‚®¹…2ý…ÿ¿Ÿþ%ò´»¾* mKಿdŒ Q†!-|Õ˜éà÷P$ð31ñ}1 at 7H¦UE-3¾‰ÂŠÇá4ØÿüyMק’üi!ÿø,¿KR­°´:ßA5þU3°¬D]%}4gZ™Ìûu«?jŸh«Ká8Ü,¾I4#jÎ`Q4¡„Äᵪ=prI^Ì•fÀib÷ðx‡¢šP×ôç°Ç˜	LŸ&Ñ õî¼í„Ü´ {cßóòwèÕúxqÄ
Ò+‘<Æs¶£€Tõ—B ?0h½^‰dÖ`Î^&ØÀ…0 l =.Pɼ”>ës½ümÖhxü&Û{|ñº­óû|+ mk·“"an?Rþ´Ó>ex
±××`1Öõ&°”ŒUC⎭N;½VUòø&½°S„Y^½æzÿ±IÑ…F“6ž<gðr£«'
^¢Ÿ¦ÕGçkÃmìa´H”Ô,ÚÆã¸EXÿ†vH¼A™Žüª}ʉFƒ×fi¾N+Ñ1îÞ	_Cë©á¥ùòuo䞉|‰€ësþoïµ·?;ú„Ù•(ï†[¼¬j-yà€¹z~öځDk¼ Ki$Kgçï{÷V¥ï|ú¼Ñµv'8F"ç¾bN&HÎñÞZC³ÝJJžX*Ï£l=ͨÈÌ,Wwê\óÚc–¨è‘{ùàÕý_ಜ:Ï3òjäøŽø‰\‰žá«!Þ/¢¤XHuPþÆÄøñ±ùiÀÄqÕÛÉÜ0à¹Îù¯Ð£oэÇO
Mã ;ÿÑÈÌ ¦>p¾Q*½5ß dO¤	°ª`ø5§ƒÖд‘CÂ[ºñ16¶,<c'Z€A‚9•ã>3$è¾zOï#á«ú“«Oó58+Yß“_BXfQ`þzÙÝc‘4‰Š	&fLWcÙ,¢È/n:I˺ïa~|{–¨W7 Gþ„ÃàDQcYIŽD&içðæ;¯„Ü٧Ǘ¯Ë¨•·ÊÝŽŸ‡YáÆmDZ,®ÚN«Fñûé)V>ïjƒ'¤ßTxœÃ@ºf<½ÛŒ„ñÛM×»„"I¼YÓ¯=êPu ©ìq«÷#Fí…@ôž)š¾Gø=wkY{“ýÁ¾ÚVõF*MS«Õ1M)Lå’… ‰ª~ Š¤÷À:ó×ép×S܏~<6™¤ •v“öNé·‡úÎ «É5²à`E‡€±äa8j’"«º¡M‚s°Fæ–µ^»Ò˜º/w²ÄiÀ¦FG@'W…p!9«MœhJ#¿ÚñÝÇ¿M/­÷,ŠiWú~ö5ÖPõPb'uX$qüÁýr=¦êÈ~
¶·‡|Ž8ÅÌÃJ«\gMž
ÿš¡¡\<uíA·&,ýémRob™Z°ÆÝmËEž——2=dFl·U<¡¯Jø»æ{Á‘UPpkô˪§ Ì@‰H÷
	"i—7 zé‰ €µ]¼¦>˜¾Ï`D„ÈH.O	ñø›XÔ<Çüþûï•~دÕ'#kA7¾KºTÐ4¥Ã½Wè>3˜aè€XX%Eaý‘ÆÂ5Akúv2qeïŽsô…ñö¹ÿuS©××Aõ?Nã çùpWÛþƁ1S_2ÿõ²{ùà(NwñÐIp”•Ï°!\sn(èÑŸ{C¶óã—çüò©¶&	F"»‡A((ÁóNR|¦}Ç'õ§æ
£\Ú÷h¿ÜëðaFe$BøçNVÉÛ-•íŒ(z¬^‘_evþËRƸA¤)ÊëÊ ÂÑ+!!<m_WƘ‰çm‘‚Ç íCr7¹ƒQáË6쏶MÊÿMÞþ¹Ì<­ù¾xGW©OŽÀŒ8n½n^/âylÜûu-7O%3RÙªP zÐkÕ;ÛDóN•Ù¯d‚,f>Ô:á|‚IÉ
{cÖǞϔÙÖuÉ{ñSÓ3VXxŒÚÛÕUÿÝCŸƒUÂ(<ÈÅ¢÷ ¦õJž1/<ïÜöÓÊÕ”ýó!TlŽ1ì½Ë&Ç0*DuûôóñÚÚ­èÜÞ ùXtm]®Z]@¶V[ÎŘ”[• 0½;/5öOt~q/üñ„éåŸ©ì§Rå{ηúÄÊQµÊ'†/%½ŸI.á.;\â’áþõ<—&ï¿8ré5@]àہٯ¯Õ71ã;QÌ·Ú•Û§æ‚â9æÄ悧º•›Š–Ì]y5ª÷TÞÈ-Ë‚^d§)ÈxdXÞW+	RSÌT[
j_ó^3ïüÏöÿÞzéHŒðTpüç“þÃÿcá—büOµØä)öJÀyydï^îË%½,ù_’VÅÂÿmPûØ‚™j£%ž4¶'k4Š›åO&ùKÕ¢:ׂ2;V–×\ÊþÓþ¿fu±ëÈžÊ?Oº¯ÿÎËðjWãi…fD¯úex(’FQ8’"iä¯þœz·rzyiè‡íÁ}D+”G^Em•?ˆ©3ùC	T¼-Lï~B÷ØÃÁ‹ï\æ–äH£Šf!÷Þé¦fHò´ Êa]<	q[€¦ ‚Õ{5JÛý uÚ‹z´7p¾2ñ‚˜zšÒá#VqP´n¹ÙH”iœ.œ~$ÐT5Ñ+ú QÌ÷„¨-6ÓÍe5{ßf×bêoÂ>FJV«ʲœ¤ŽyÃê.YKòT'GQb¶œ¯²ŸˆYP©¼ÌÙY{~=µ†}ÓE‰7PXëˆd˜Iºt× •ZLð€!üjËýDô  Žš/‰Rì<tZÝ‘È¿»X¯j£h$Ú%P‡ÙÄÂð0ãí1姎8$ˆ“%;&öØmÊ!ÉxýX;…Z›ofô™e¡óEŒFo¦í5²åa/¥ß…=ÖfK“*Î;WÔʨÌyÙ³m¸â~ö9‰ÉCVå}û©KqwrªbÝpчΨ‰ÑdÿžÓ
ƒÙ¸5pŸ~ŽMåøY_¢ªÂò×s)
"" DO:Cå,oÁ¼59fÑ16cVPc14›µáÛÂqñÜ2¦“³(‚&8üÛ¼3ªýA„ÇÄù4²¶tÓÏ2Kææ ¡ã„ÍR:^¥)U.76eÏæj¢Î[7©=#­}»„
©:>)öÜÓ7Á¡vú¬.:€Ã,KMó‹ô½0¬6qšœ‡$ =+ÇôÂÛðè$€ª˜ 0òù4Ä]ãWeòƒ0¨”ÛH~ó¢×à««`ãŒz¶h}¾´M9彪aw3´}&YüNéÛ/Ê4†í¿DkŸaXÙuý«°­G`ä艠ppèåЍê(·³5ŽH¢è»Æ›«¥­.¼ï“Ë¢ª:O¿à!Ÿ)T,Æú+©–·4%”únšÞ½”÷»þnèjajº=WªC%ûn&»jžßAKÒC4¡ÄgÁýš³'݇EMa3^Œpd¬‹å%˜ñ† ÂD阍Œbùƒ1üŸMI¿{[ŠX>)‡“ûÒÓ8‚ÙA at Fú•oYÚñƒ‚’ßM	ýÕÃѽì»+´ºÉ†)ªd‰Íå^h1|~uàÎðày2ë®cÒš0b§¥¥Þ;fþxû6E5„†Õ±~Ë“‚§dÉ‘‘+?É6Žc%'Ä[Z¦/±4"¦ÛË/•4^Žþx¾ý%R<T÷ÎÿÈýõê­ÕÒ놯Öå¤ÂDF¢ú³Àro?©»
ÉÈágσzñAVêÌ›äOÒñì2
/|Øq ý™$²œ š&¬…Ödn§	Þå+dƪÌÁ“<cnøvÛÍi*‰†ý_¦Ú­ö’!Âuê™pçÈä®ȃ</”Ò5Ù¶êŏ–·”K‚éRÓˆ	?Ì=}cVÂã++YPõw0ÊU–•  ÛÙ-~¹5»Î€®Ý³¨Vß/¡ ,P1:#Ò‘M¿Ú…Ÿ'õGÌ·ël¾*6[ì²v
i£¯ìf€¤cã°µºÙP*‚îØ–°™†ãX|x…%Œ
\T¢Q&ånÑUIâùƒØˆr,Oüø—˜Õè;§_ÆUbÜ®ÑóîM¡îH­cIüJ6݈(îÇ@$oÈÚxqÓÈ–R©AàR@Rxxý‚¼¤X³ÓuM“‘ùsVú:¿x…[Ù'BŒÀ‘–08H½${Xa눜»ßó*é)½÷³Â²úuùy—­…E`É>©ŒErQ¶/Ü£‚펁µTæžA¢*æÚ6!LMà@.4ž0ÌAÐYì–’b³Rh)z 4Þ—zÉGÐčVûõPÀ¡­%Óè|1Ë]šG…7TöoKÈJ1sŒæè£ÆŸ•nyoDŸ3ß]ò“bB1À=9q(F…z¡wõÕS%…´··˜	8/öïN‰†D©©ƒÞ'ìµ½¬ò¾´>@mߨÍçÆßÍsƒw¶Š7[Y:YyÔ{”ya™¬§õ0€¾ÙݺïÅ„“ª]ÞîÂî«X#þ*ý¼ç™úuÞï û§Ã¯ðÏÛ§À)€<6ö”‡Mhꣴч§œ ì*»â$¼œ
Ç[ûŠ!û4^¢BøÓè_ŽWìé»áˆ«у€b| Ó4>Ó_‘сc²ø»ú´±„‡pÅw§3ƒS°"àMgH‹Á£ë¬oê×äçþš°{5ÇöâmÑ$c§Õêç|[k1AzÑ["P0É®PŽ€óÕëªõŽ‰\g#U,½h\ój«ªÿP–^ô#¦V—«¡ÚÇì¨"Ì6h™¤È¾þbRé¢ßÎÀȦ£K¿-N­Ÿâ’ÛQãO}Ê‹Ñi½¬õìµ¼ž D㶹yô_ÞÒŽÞç›ã„G?|šªzFŽy^+Äœ®k½ lå™ÌàD—›>'²ÝWa€•µHÁ›¥ÇˆÄSët± 'Òžlz6Éü#gsÌbfÍmßFI‚ZÝÅ*èéA›íg¢‡»q_Q=ï\¼eHƒ*`D¼Ä¿þUu1ÑÿÛ{{à„fH[iî.2,x­‹Dà ögMÌp7s`Â8÷Œ^r™Æ¾*´êAÀkzáLL`å_}KS@¤Žù?7¦Ð7_6ùû¦™CJ+œ€€ÇªéfḵÇê¬RT•ÊfÙ”€NÒÕQ¹·RBß><äÜduäl¾´û+ðõp8FÌc(¬~™ÌžÎÉmD…áà8«E.ÈeÇü<ÞË+ÂâPÅú;ω¢êZÁÈ–š
@LÍul^-É‘0@dddµ!) ZôEÇÚQiŒP³p<}Õ" €3já©@Hµ¬<êt ¬D2F_ä‘ áb×eGÀ¸Hå¿ŽËæ¡
N;5dñy.!UlËŸ&‰(¿¢ü#ÞB!?5I㫪ڰl|ØקùøyàRPæ%¢qdéMáƒNXˆËª”WGátáVóÓw—†jlcP¿¼?N²µŠ>q½5«’hãÜÛÔÛd”¨¤68ω˜Umm¯”˜3VŒGË>¼¬Ðøº{õ½ñ¯àm¡ž&   UŠŠªþ¶P(mÛ<Û»$¿¶±!q3Œ/#ìÃ
º-ÔNíWT¤oVûã•Ý9×KÕßé>ô^û̾d{`³$ª†$t¯yevª-OµA~G-é’¦1:U,*—ÈöÅ´ón/,˜–n½Æ$Ú²ï¶Â9üõ®Ð#£	p1dÚø(-H\ŽÝ×¼ï|óØvy„Žªl[9&&Ô>œ\óo”qP3AòpÂyr_sö2²£žwáíOyu}o0³åeNyt9l¸…Jøw!ω êÝO9°£¸y®zÖøÆÞÌ@½ø>’}Ј¶ÉÀØzyÒ„%ÈcöY©%Ù·iâºÒ>lôCj¥¹ÐçF¨ÖöúÙôM~¼Ó8é>«Ã59(ŸbÒ»GùÎo‚šß¯©Åñ,˜Û¨=¹®êÿó?Ÿ äÿÆÿ"=„A£ÿO!ƒ0 €PüBâþÇô­àžæM·ˆW–àÀxÏðýú«-Yð1é”Ç	Rˆª§HÅ»^ӧ㷯0
=‹ü5Ýü"´Ü¹"å¡~Á›Vÿ±²}%¨èmÑ Îaš„¦ “Ýa‰œ…¯€ÜqàÁdIžç1¹ƒŽHäŒd·½CãǸ½5^Ìw}ý ;‚ŲöeLÔM»ñ[²Ç„cðD>	Jmê+ÑWøx.œà#¥Æ¶í@b…£Ò˜xÉÚ «B`x¼¾à(z6>¯¿Úã²'{j{#zÉň5 1¦ÅÆtºC7?Ï£YDUŒuQuAÐ#´•ïŽš8ÑŠ”ÏÚÍ+~üpLíótž7·åÙÝç±­{@ÅdN%‡úŒÈtC
†@Òâ†ñlR0Z':0šŸöáJ rày€ <c‹Äõ+viՏnô}]„Ù Æî$ôÕ6Øýmõ«BË€ Ñþ¯·@NÙèDZíú,­°h^‘mó#þ*†Ï–rSŸåæÌa+Dæ;f<Ê >uîVzXÄeDïÒBãN½‘ä“}v±|bõ&ºh¿áT±—~+þ”ƒùûŒòêÀ(
†}Í ìîE#Z¾ãyOÇ͐o eªæ¶é<ã×ê
.E‰rª$*«Í–0`Z5
TQ at p3ê‘=1,y²…¤R6–÷l—¸ÄÇ*`¸úH–“ûédtâþü‰nåb¾"M\hŽÃ[^–:)µ±¹ö”±“Û90’´TøR¯Z†Ón¡pÁï)ŽÈ„*¦ ;C…XFõ3唇_¤Ë~˜“Ìp-|FC)H‘ñÜ9|{veO£kaÓ:õdÔ…É1½Ý _†LåcŒmòó;éA×úÂĘ’~¾Dx¤¾òÐä$Ü	<¨H±ƒgÒfÇãªÐõ™¨ÑŸˆ³Åµ·¬N¦€º•–°/>w!LŠv«Ç·2ÿ$âvMŸ
CЦãÕã­<qáä*Àã’éï«D8ÞÓÅÍ¢Å$3’
:úÐi•:Àš›ñ¾ôÉw×,jݤûȹéÞOo–аSSxÃâ9sœéãÝãM¶¤öã¼Æ
Ïý×Rc§Ñ	nŽ–©fƒ²Ú¼Ý*_~†¤†¹4Î9Ë<>7¥˜àD#¦8©ñˆÙY­ÌDGPªÉa¾æhdN¨~yI»VÌAÛI•qíÀ ’vw‘n‹Øä¸|Æ&‡GýœÙ)ÔYz‡8>{­„à
e›ßžÄ39ǵ‰u¾Ó-‡i¦	A\Í2Ë)Ò}~+X}z+±ÍñðT¢Usù•@V^ò<6}8Cîsoá}ßÇ‹_TŸV)îæ‰òŠäÙ''€Y4Y¾bðI14åFKTˆ4qó­µµr"¹ä̾0b“7ŠÌT¤ßÉÝM	úóDX8©:·“ O…Ö#ro¥¯kÍgÈUg˜k$¼±Â®üúj*NržC	Ī¹Šÿñ8ßq}U§2ÛèÕX.êäÔ.rÙm퇧Lrm§;$yœ£
`¯±©¤!ÁNt2†•Æ?Ôׇ¦QÄÙ~ÓjÍH?Lè5l”»í˜Óg£EÒAáBûõ0ïÐyì^^hoƒR„Ò,©4ÚQç7+"=/)ï&ÛÛðIn)hm½IoiO‘³ƒ*°}Èq°¡“ÆLJñ¹Á:~:¸—þ±já=ŠÙ`(zãx
M_úhœVû‚å©|VRÄɇ½^u{Q©	±˜
bUA۝£6մ⻺…–}ð¥·àl/ɲt…s´ÒÒ\J,Âçú¨ðIjŠ—ò–dõ@&üJëÚsÃ=ùƒ½œè'{<šÄÛ>>>7øvšMNN¾¾…‹_}içÍ4Ö!LvIz7Êu.âÛìÎݲhGKÃ5ÝjÚ4+ 5u¯K8ø¾PJ1¡¤—ÄjÁ}üV=ÅI¶‘fb¸­à·Ú÷µ7xê?û϶Ï&åÛ¨Õ¬ÆMí~ÿ¾x´²vïx÷]áJÌ£’Ý£f×X«ÂÿÍ×p©"€=Ð÷¢™I9·
…¯™5Ô€¢c%¢ n
šÏn³am-7¶ûbH±2™ḺRd
º{wñ¤ÃÜ~÷yý…!‘)8ú›‘çWé3{…Y}hioóC·Êy‡³SÄÃÆ“o½ýV˜'	›Dw€
ÂüÙ»¨Sö1Çö-þ2 at W²¼pƒ°£É4)çlç1*Ë—Ù!xü\P#‡DZr|<ôì•+Œ
ú Æ*¹f`?‹zd/ûÇݱ^Wõ\ÐoÕ2F~Öwý¥µƒñ«
H¶'lŸq%Ç·i^©¥ÄT¸¶éÁ.&¢o=5¹QT›Ü]iyuñÆš5ݤ"å/ †æù`I•ˆ( ‘çV™0rêo¿uÍ’ºasóóÝèiókûú[íÞ^¹ÌíVj¥­É¿oWs¶2ëëéÀz^pvÓA [Õ½O.¿늕	”—@4…£‚$·Àt‰¡íå3eוãí—¹U[¬RøÔ9“
3‰¤b´*qûÞ,ïAK¤Uª /ƒ Xèè‡ï­@ƒxQ“\;­Äf,ïAQT53‰u(¼ñ½ðFލIÉ¸LC~ÏÊ™¦ÛÛ÷ÔUkØ»©S>Z‹úîÍ€%û{w
Œ~^š‹nBA§Ï»hÌo¾HãîD¯°	„­²ª…¡`–L’ÊïñÇS
Òm­¬`‡ÇcCÓ%¿yÕ¿>­€pNoμjäi*ú2ó{Š9Œ³j?øg`“‡Ðé}±ùa‚1âÆööUÇÄZÕ}­ëO€Sn>zQÏõ.5%‰Þ̹1Ž.–#†¿3O±}6ëU™lººþDö×ôÒ]@ž4S öHŒ±÷¶ºwÓX'æÀ)Í'•—qMpq‚ñaÕÌšoîÓ—«[7ß\Vÿ²S|¸r_=ȤíXÑ7"(rÙëi‘PsÅ÷ßÅ’ÔŠ‘Ù	MnhÛñª¸mNÏ^ltUÒ­óZGöÐcy½ÇÆLòxüa4ða-\3%ûqó‹î–Ä­²[KVÞ‰}ëâ'QûãËR7`³–BÜ‚qùRØoöÅKúª]3óyÛT#4'cØCÖq[zÇ[SÅëÁlíÚª*2 MœŸ6Öà}£Ã¤®ïZ9犥á
aÁ˜¹Mmž›/Ô'¾v"©ëa’¡žÑÞ¥è$žBü'Îgª1·"÷eå怪IlÓÈK±°ý–{MG[ FMûº²©ègÆ‹²Fö´ïzŽ_žŽR}îð˜Ç N>ùŒ*suð6ÌµÐ}»ç
vòqÜÏbô²æ*!ÂoNym~º‚ƒñ×€HCÛŸäü^Ï÷?˜ß¾ÿPY+ͱê]€Ìñ1ÍH‹zv^IŠ¬’=hz8|Óf=é³.æ£`
OLÌÙSå„
ã1Å@Ÿ5ó2pRˆLÛŽE'Ú7C’¢Âë€ÚCÜ×”•sežìËՐ<ÊV*'hc|U3ž´Œº·•íô*¥öæ”QÄK¤¨@19×Î[á¡Ž†©îO&v¢¾_J•írpW˜x¬±éµUž”ÙwþçF¤Ã݈Lpèȧž´áY×{Õ×[ÛW(õ•¹QK®½õ¡)÷#”ˆwæ%¶‰S4%~‘7”Õ0©0¶=p”½Xgš­>wæ€ö¿-ö-˜H¾×az¢Óßus¡};ó¡)DYàׇɲê8ß3Ê*;Íw»â¶‹Æ·q{QèúHþ ps0Ããe³{Ë%*Û¥lâaº6aÂt2 "OÞÌÆ3¨p*ñûÛЖÏVnæºI=ãú-»±	mNn–·uÉ_0½«åÜ”òÓMw'¼ˆû´Nágt¢ÙÇá<Pòk«¯œ÷®÷J3UþRAÈê£ñdHª°›ÊOJ­ÊF™¬ô_¹Î©|øÀGÓ^\÷.ûÈ wÁÁ—ÕŽŸ²'8	H,éWZJ%"/ˏö&älh}éDhçtÌŠ‡8FCm±°:¼îÓ4ÓVÒ¼	
1h†0^‰†¦Øõ̺Óéð(ðñe¤#ê‘Qº.㓶Ð6­¢3(¬:U#êν´£ˆ½Ã*†±ë€oRpU0èæ$OªÌÍÄ	Ò€–§½™òï\Ë9}ØÂöý¹j½TUIö…cs)Q¦£Hi\ÑaøæE¨gb·Ý­·C|DÆä÷O@;nƒ¾øп§ß‹ÖZRUý&”zG÷죬‡Ù‚àf2³ôǃ¢å~::èÝ3÷QýïtÇ“_¶íÖGçiq‡Ðö ¸Sd(-W•¸W捥ª¤Ÿìqs¨\ô°“Ž+àÝC2Ǎ•—ËÙ­"ói»<¤4<º®TƒC²qô39ð/‡/Y`ŸËA]i•£¦þ{ЦšRУñ€øüLi«rn’y«›K1³šTýË–‰ãËYÅ…ÍôØÀ±iëZ]ûŠø7’’(Y¯Èe%LjH¦7éï°Z\#¨1ê¶ÐB՝jé1ý¢5=ÿmå"í,ˆSèšøÏüWå‘[¿bHÈ-Â&]ÃíÆt¡7ûõ?æstžùiÄÕ`±.£tÙqc¤;¨jâ|k[e(œŒ ÒïÙ-/6zêwØ«-D5VW\=ÙÈ[™›¨~û-%Š~Ïk—/[`Ž™|#cšøZ$gWžC§^hòÚ°¹*_¿LÞÈpo6û¨ êÙþ]ö¼vÔeÅ9æßGjҐd=SKƪ„¢¶Oø³ÕÐ:ýy„³é[JÞ1Ü<ŠÐò¼)~­sEI?‰÷+vlÌøß#!=¿¯¸ƒõÝy¤ÀæbéðŸ/yËzðÑ*ᶟfEÎуðhªÊ™BòóO—W?íjAqZìV×	ž,ïef’ê³…sÃÓDD	ò쓯p2‡skN.ÜTKèÝ£%ïm㪴â	d[ŸOX‘]ô·D-Š¦¨mô­Ö'Oñ¡á­Š>æFżÜpŠQÙú .<éð²CŸ:Ó{: §Š¸ÍGå†j
­ZgbÚ§ÀãZ}²9*‚òô=&ü,O1ȾX­q¦Q	µ´NN·)Ã*—»¿Ô»Gc÷¹åïÝ
câ_¶ŸŠÏÒûf7°Ø°;pÛx0ßkwDÞe`P°«ÿ4c±|'’"ìÛmKÐË˸VOÈÈ`ƐæÏ#ëBò
Âm!ƒ·õ?„ë1Éù8­W,¿7S"HÀËn
¼õvª–˜†r üýAôó¤l…ù­‘åœÍ>°‡Kéä|ö•zl^h†Á zÞ/0P*]Jì’¥á#×–8…6iOÇ0 9ÆÜ=ӍNÉAñ54}‚ðˆÕõ‰sµ`l­]Îݏ”àçjùr [ír	!tÑ…u„€ÃõÚ”
‰þzgŽ+-â­úÿ`‚ª'‚ê—ç ¬s˜‚‰¤>]<aBôÇ÷VãX&Isz'ëw.:vt½½ŠPîì^ƒa…`5ÀúÍ“µQ=×´>lžå#a,
Ú-Ïø˜sŒ€o’ҍ^Iuß‘”ˆqÁ´2ƒÃ㼤À¾ýÅÑ÷î]<xêüédB5§ÑNº5¾8c±”èNkbm¯ß$óN^ž¢°¨9gù 1^¬[ÙiM¸öÆôž˜E–×þJqì¥uVáàæD
溔ÜQ³EHX·µðTÈn(±vz?­(®.)¡òÚ|¯~ ¤¦ÒÓY™–´ 	¶}ÆÁäï{›­}íÅÒ“Ö—¦7;é¦5|ï[@€·uöÎ~óÌ~4—¹âF:2®…»›†r–`½Ž.eQʟ۸葓¤Éa'P¿î8ÒÔ7ò!EËý°¸ßÁ “#Î0ªn=Ž£–²^ý¡¿ö¢l|Ò<ŽáE1A7)wKýZ÷×è5Û—	Éo‚úÞ:^l¤	~×&ãGI4ÿýðç/‰P€Ã± ¬žñÖq!è9"j’ç¹2aöëõÑâ[»Þ–Q$V‘0ùl”áÃüu™#K}å$]%‘„å2@µ;¡;ñ\¢iE”"æm¾µ¥8ÑISû~o†öÝìì°ÎzW;Ÿ¯¦RG­ßÄUÓ@FêP#ð¨-yÅ„«X»àRAÈaSBcô6{‹’ŠxÁ¶ºŽºH¥]ö×	=\ë^¸X7jMÑUd"§Šµ„j·þ |k܍(x„ÀžOúZw¼f”m/•é|ÒëïꇐvË:í_Eü¸c>P3/Ù¢óF8(t4‘8l¦ò€¥ˆ³3À² Q`K›“8ú«tx-2™—.aSžRs˜W+PCÓhM'ÆäKe9»
a¢GÉo¿ÄZ!Þ8Ì"ÇYNdJDÃ0‰ìÛp¡<PËeº<›Ð¢O%ùÑ;9€È6nTyDZg®Ä¨j•Ú“ U2	ÂÓª‡YIjsHøq°q
$!ô’ÖG%°X=†`_&=zx±©Ÿß[ó<
Ùܨ;Ÿð¸¡Q’EE—ù¾ùaè’øBpœÜ:9X!×t5hIF¦Fèa˜ឤò]}7»ûú@µW3é2?ÿœ–.Óõ_×FE^÷ÔHÅg;yšñZÖ梚nl={ÂøoÈÅL¨´¥ç¤ïáËÑl2yÆÌu-sÓÖ
=VÛ  I° ¡Û?Éz¼Å.=ƒ¿5¿bCa®Yg<³ão všïµd
Õ÷s×ßaçhÅA·i2kg¬êüÕÚGeÑ èYøi$³î1p:óFük-Mëa¦-ot	lc2R³Â/p¾¾œ~é"]:¸0ts»w2¨ÃKc¾üÔa ¸á¶‘9îôâå8"LÂ6à
(Åc_¼¹1&¥oì7(!aÀÆšAÐÞ$gkçÜß!êq37z~Cú©®Gtº¹ôZf°º¦ÀéŠÀ+©¬Ùg®bµ” €®ÅþØ©"±/M JÌ`°Æ…O4 hä­?DûOÿKbýI€¸1äÇ¦×3
϶ìü²f»¨V¢hqÓcÍ >˜GŒ6ðƒ0ó0®qdþïç]Ï»:Žö¿ÔÙÚ£çÉú·í6Ë…JîÎ.•õÞüïs\µ]ŒB¾bŽ‹_µ !øïÒR•hµ’˜ÊVÅú
î»ìªyÈú8¹ÊߥYIÜâe3üþ³vÕ`tNT¬¨a‡ß%èïÂÕ£».å€wš•æªr%Õ+jæbD3—$}œüèüüÙÑ#q‰w2­_™Än–q}9Ñ̼<rÕûðsˆ}ü‹í¡BÚÖ-’^må=´¡UÄ0f	·ø5èVb ‘˼([Û¹`øÍeG²Ë¸´…^ûÀM(^< 	õ'0Ú`1º~	®(šÑÒ/®¶UíàòmaÆ\©
 V¹……羟#kžM|‹²/Ìs€é6þMaÂÒ
­iúÈŹÞ|
´jå].”ÓÇѪâ0WáÁßî7î¶} ^¶š@MÌæ¨/aÒ/hoðýÍïn H}è9ԁ$'÷ŠÕZ…—Š©2:¬EÖËÌ¢0‘¤´à³ñ %j#‰O«íiEF3`‡¼HélPN¦!	ÚâH¤K íxŸê£ Ñ¦þÍk¯+S`4HÒƒÔv¾,OœjX0çº|j-MðRÑ7üJ|h[±}×-L©ß¶2zt~B½³PQñžÒ5Äu°Eo•¬óŠÃf…X*zÄÀ³0ôÞ1÷ÕܾÌ~¾ÃÅz&ÈÔ”Qê>üé…L €>§Æ9›ðc^”‚HDzîòùЫZÒñ%šêë-778ÿþÍÁÛ¼§É¯x¤oˆ—šU©¤ýBÛ?Gˆ¬·ÜB¶Þ¡-í,bÃÕ.2aÄ|c]´i@”n.§ËÂÚU-—°XÆ÷A*¦bVß{z{÷~ÿþöºb)œÑÄ2æ†f ¡àÃíâS#5¯L
Å›‚ß#Ú!ݍG_$µz‡oªÜ÷ÐU†,‡Ä Ä|£
ˆ¦Y,™*ô_aˆÍ¾Ç@ú{cæǹçÚItÙo at nÂs_¿ÐÒK\± Q?O±ØÕ¿Ó?K·~é”[½º+÷ôLãVŸ¦„	½®DuœU¼4°ì·¶áe–-e€Ðä{ú¨õt÷â³ÜÛ×@Å'jÛt¢é®É_…jÝ©ßèë=†1ªœ0ª(ªÏfå7%ã(72Ô˜ù’6Fs} ²=„•Ì¸N¯q˜P¹^¼±¸¬LŽ\j“P˜¡ä®ý­#†Áô<ÐÍèÌ-ÝýQ/¢;Þ
ƒ€Üš“ÀAjƒÂç‹›•Ë5É¿]?r­ä ï€‡Aè1‰OallØx‰‰8"P†Ì£DÓhTò훀”
½2Tþñ¤þˆý$ÀxHÖßÌY;ÉbµŸ¯¼v¨k…	“³p¸f[‘_ð\¤BÈ|¦”Òr­ùÉYJM^ŠÐ*áÄÝÏ„ª.jlÎwrºqÝ\6ÓiÄ»ÛI¬Ú9Ú8•ß¹S?Óö8lÍÅÌJ¨©àš>eå„IròHò%ͯ¾5il
º±¦¶`•™$Ûµò©ÍѸ½ÚÙžŽF¡éX!<&œÒ,ïEKžÚwx­‰_Þ¼1½ÄxÅ<)ï—¬—„ft
æà¬Ã]º ½š«·4)K9õs¾ w9î0бšÿÂöS³21råFflƹ›‚"åÝŒ’<ƒF	…EŒ¶®™gërð£Æ(’(%”°øç4]æ~u˜ËMf…Ë»Æ|!Ô)Õ}¦¶ÿÂûÄnZïóþ)œÆUÏòç‰-&}vÏþôå•«ædoÆJÔÞ°®¬˜¾§ä ¶Ixô$	?IDß²)‘Í’Uü˜±=÷Ïà¶}Ù9\®šjð‰ÊêTMÏðÈËå»H€âûVÏøÐ-ôÅC÷{õ=‹3ˆ!E¯‘<45 at f/ößù¤åÉ[ruG g’LÓôàð”8I"µm…Æ@p’H†mŽ?KÀ€óñ˜8‡+Feîîר‚¯†f¼ÊVH$ѳîÛ›…ÓÔvfÔó0#֝l4O÷†˜cŸ-I×÷IòNQÖê¬ö]Úíd÷!›Òkã	¬ëÁ9zðÈ¡ iöLs-“o'êªØ/‹I2¡ccû8Øã‡G
®m¸M÷?£çðBz

L?jê=Ã'ßµ‰&Òon«g¼Ý|á+Å;|›¡]a*yŘ^cg”̱;[2ÀÝR]I·
IÉ
©qï—¡–÷¯ìœ\ô.uŒœD rØöGñV/yŒYŸº›¥Ÿj#›ÑNÌ©(IÔÂ'¢@9Ô9áß„¸ÊY˜0Ÿ§¸]ì9$Ô*A³'Ö?ºY’¿Ôì¼Öý¡ÊcU&»ïbÉUÞŽÙ`6p²ª@?!Aoêj}4Ì ’0qÃ+Ùh»YáÄÓõ
%`Sos8ç¾u±j^0<:fì-J}9ñ{|¨¡°V-(Ï®Àm´¹‰{ÒA½ëi"øŸ[šÐ—@2ní:
a{c•R·Ë‘ä1 §ÉlaÈÆZébëã.Î|®ë—tvV]Wë¬råLç0‡ÛHdØ):Tr¶5j­š<èâ9ÍÿàYžn$ÀA4àŠVÊKUÚ	Ã:øþ½¯¬*ú:c0XÃf8I1;+Ô	Dä5h`•é~¼ƒæh]Q’$•åzÁ{ôѳ*q…@/nÖ  ³·ðsœ
âo¸û׬ýä¯/2LñÝ’Y£®Š®[²öÅÂ;©tÌÜJ%ý“{
ù¥Þ°Ü¡¯æ,¹îݬ§˜òÍß óJ,Ž ɪøXl¹¶ÍƉ­ýu€”*ö"}©¶¯y<êGÔ’hKóKݯçöm²ÆNÉ!¿,â„÷Ë:â=AvÍQƒ^7RÓ'zýL”Œɽÿétäòþñi™ôL'­eVÞ–æšÆ1ðð¥ñÍqþî3‹Ù^íŸh};z6c^sžWFMå?Ú÷œˆ}‘_VÐœ…QZoÕÃ+DߏÓ船&K.GE„ÛÎÀñŸ'5€¥3ˆì´úÖñ„N™“aK—òŒ?áv%yXzÿ‹¯%‰v4`¢&ãBÁ6rŒ.HŽvƒ=Ƥ׋)vÝ?	 eêiÞÏÏ1æÞÒîU€Ç%¶ŒAÞ(ØÇq’j!Ly·ÒõüVîð »#Ï-bu^¶g~raZ°jÜÊÏù Íƒœ}”¿,êOSnÐÆààŽë6ŒŒŒJüÎ@i(“°M<þ•$þ51¡P
’a¼ÞÔ%õ¯Úy¡¦>øç£×םïþ:»ñ=åÞnZs’¹uÆûüܝÕ,’ç‡Êãp3Ý@% dTå€Ev–qYÉ‚éjívÕ
×æ´ü?]çø?î:3ø"îKDÿÅóÎüàälä7±ÐfUt§Q£,¸F½éXJ #IÀÍâÌfR+eÕhP	BLÉ‘³ž†qÆDµÏÔäœ˝AB6bT¢£Â¸Rš&£Jl5OѯÍo”º*Ûhd¤„Ne5Ò½ÿXv>¥N’i@òôpjûÌOß<¾]ø!â{½	ˆ7æÀ1=—	u_²íÐ%²)ð*èŸÙÜ:"¦ø»'YÛŸ«©–ù((º`Â6ß±ÊßßÕúý†oõgâš”¿àÓã…¿™Ç9«4Ÿ?ûeù2Ð`;¿¶ÄÜ4áÐ|÷
x,8÷ì~¯®Òb
·p(ÇóØ‚$ÛéZû©£ê¼º™ ¡éu‘«%ÐåÖ§!¨kùà ?$±qw/¯ïÈ\ÌJ¡g̈³¸ØòBƒ1¡V{R‚”زq="ù£fßåàáí¡"³mñ	jðóF0“uì¹-GÂD¢Hœ×—¨çϯî"š8DJ¢Íc’£­
À“<¶ÏS¥$†¦÷ÖkGÎl…Ö*œœNà™hˆ
ªÇf	âŒÆ°‚X¾}Úfi²læ¼oÄÃ^‰‘6®hÿOÝ›†sU9V÷jY“wc°~ôÄ:E ‹E·wzQïR̺| ÖñB=ÎD£*Ø· 5vìIÑkQ'x3©Ó‹s<@
ÝÜ6ÖõÖ&H*£m1˜¬‘±ÅT²¡8ÁÑ7é
Žã+Þ/õõ„Ñž$›÷„&ûUƒ˜ôŽ®7²Î\.换¢m]ɨ”t¥ÀšÌ&ejÛÇ(±c‰Wx…«•SíVfôqLò`]BIä¬úþL‡³Òl—mw¬¦¥ª‘© Á¡½’¥ˆ¼ÎφÐZÄÚK
U_Ò$?zÒMud–‹-u-k7Ý‘{Ç{ÛõеOêQòãìuGwâÖS3gƒn˜¨‰ÆÑ`·[W¦°Ü”$“ÖÄW­(ÆÈߢ°SžmãeòzãˆÕoÒáÉb`I©‡Áj‘À¿*¾6 y¬9éa<¡8ª•»Êû0YÒô	;…àn4ž%  Ç|X Êšúˆ`~=ÜoÝÿ@à fú±ÎÎËËý®ŽÜ’¬¥ƒîºÝBE‚º†•©F1æø™^ CÈ ·u]&~ÌËÏ?¤”	£j]ó5¥ã¿lvtaÚ‚g&DTA6R|EÈãÇE´øž âãåÌ&,ß	<Bñ{ÌŽ°÷Œé“?òʆٛ­ím`škt¢X6ÝƶùïÌh¥ÉÕw)Z„/fçæy@3»Žî±8ÃÛÉÂÿ•ÕKDOa‡ì#m>üs=6¾‰:·;ÕmöMÓ¥hûŒþ‚^³qy¹­§«Ô
Çã[AåþÞ?C)z°™ø£¹¶\gSíàE´"ö­,vĈèÁ*$ø†t?:HD
:º©ÂPÌ„’p‚Ä%±JÁ8kO+ aq³ÎíÅXÛ©ÈeSžÃ¿äÞàJ«‚\tD¶
8O
¥7ð~ûö–ñ¥°çÌ]ælp$°V5;›9i}\³²q«4^Swcäc«;`Ì
Å›0ñ‹æÁ¼gâ®BÝ™Æ6l³*ÀZÓO™È7³½»šY*þØŸN”Ç^Wñú™ÇÔ$ÁÉSâ3ÌñåË¢…©˜Á*Äéâ“WÀcí÷Üò‚¥ó–Ç:<³B¯(Ä;­?ªÐ"3•9×2ïÿ\Z,«0Èøöø%õÀcúö4•ÊøˆUl`‰“À0s8^Ç<šcˆw“öƒyHëqF
n#lˈ†Ï,É¿(¢Ä<] ü¢ª;ûà‰·/ˆkÈ—ãˆkœ5(<{Eèkã:q¸wÐ>0ÆBƒ×	ÕP®Û,äÔ·é«+*°šrô›šc·‘3F#›H2ƒÆ§UòŸå+W®Ž
nÄ߈*ÄÃĵè°Á‡åVs-G¬;Åpœ+àŒ÷Çî™
û¤@£X™¢—@Œf0 xßOžÝþÚ7øûööÊŽ3–jý÷[å+1KyâÆìóÅkn4]uèÅ @Þ¿YÈYÎ^Ÿü¶€$qæ †­’¡Ó~¡rÞ¹æEÎ1F—JÐ~úmóýgÂæiàíÉU:†Žp¿¶(Òª Nå‡q”tÜ@?sÊ6ã—5îÓ'H'Â7ˆË€‘=¼aw>Ðéæ3RV&-(_Òè;­HþQ,ý,qÁ(ÒÅÍ¢Y¹ö«ô)¢Ý¬®9lÒ/§5 iࣀö'ç¾
ôž¾žÜÍé+ )ñhÄ¥ä
_‘ÎÔ×RMÿ84‘<ÿlãÏŸ°ÍKGºŒõ¡ä¾!aa/œMzÄÁe©•uø*C˜è굸¢ßŸá‰›Vûҏg²à1áNaB2¨Vu´4Ä#.Q~±hô-¼~M´çËàž]ÐÏm=Å @‘TÆ؝šò7ñ%nKnþPø|êK×7\™õ@Œ:>™èzÄJ- Òýv ý=!œübðÌ *&Â*ö‘¨uÍiãöí¿ôNnµ{´w5ð—N>ž<hÎvU_7gzˆÓÞbý^ œÔ×(®^ϝ-®ð±g-o“ˆlr·$û˜Ïì/3¢që{ýŸ~ì
<öbÛ'{yyдdæ‹\Õ+Õ¸Äö€ƒ(Ãg	éø(šð+´]—%vN jxø +þlŒ™@¦ÞRJcG°‚ÁœæܸŸg7Œ¸\Ú‡bqL¤rKª@ªŒ_Ò;êéÆkA,ÐÖE´yĪ	
… ^\*×O+È`„°Ç¥Ý	Í©Åéåü´L`Wn]BƒÜH	­)á2t<JäšÛQH¼hÖèÂk‡Ÿó׶
ëÎð‘^Bցï‹pw\H¤…>ªl1ú¢ë†ONÄ«wÍó5ûÃc­Vr¶EôÅU¢¨eß–§$âÒËuÄ2µ*‡cá­þíüw/–£‚¬â¹0éã¸ÆßQédtíƒC’ÐÅXŽz¨Œ,()éWRbV3îÿ´våñPîmffÆ6K¨îCȾGjŒÁ Œ]Ù™±Ã0d«ÁX’4–Eö%IY*BQ*BYRJÚ÷H:Õyg¨sê<ç<ïó¼Ÿw|f¹×~}¯ßïºîûó—ÎŽ³Êh38Ýü'íë—ö¤øž¾lÎ×Õ-ŸMðë`5ÅŽ–ç& /7¶j»~f·ß$TÅ­öq»ÍÉ…f6zÐÕÙƒzÀ;¬ÔÁLÌ\i
´(Á6ò8,„I5ÀdÇõHŽt9à”±þÝÊ»ù¦&¡–ynú´3Á€˜ü)Qˆ¡)m
Éæ™0¿x’¾³WÐ4 ®s.„ä…ÈÉÙ Oõχö{0À0Óèþm÷Û$zÆH¦_}§AÀ|çÙ3ÑO6g»|6Ú{°öó†<Ùqþu;=G¤ëÓ)„¬8u$Ë™] vª—Š_3”yE÷dÖ2ív¤=ütêrnìýœXÌzïU¨öÖv‘­šÎGÄ#g¯•h~=zÊ
01ö
Æ=é{è ¦¡æõĦ{TWt1šd2ƒ· b‹zgí‚‘†yéúGø›†<v–•²ÒŒŽišÐUìœÒ߈ ‡czÌt+¯…—²7áXלӒ(‰K Û <H×EkGwúg¾²º-X þ ãlnÇmÒ]‘o‹HØ¥ÊéàêÆ÷o¯tK?:¥
䛎­¡ÞmW½eoª7z¥ƒ!Ú11­nÒNb³Þ§ãŸ)Yv:í%½¾’÷<56okG~ ‡([(Ÿ‚ÊQ¶ÃÜt× ™fé=ÛM`fºûÜŠemfödžy'|ªxÞ>7*ü¥3®Êõ[ЀawAñ‡'Ì2Ç2áë@Ö¦*\zË(O(BLJ‘l+lÎ^yQûYd×Ik;:™‚Í]_Ö²]g—_U—MªÔXç(.îªÚR…ñebÏ»#짌%ÅÝ¿™vdî(ømSøùä^Àã¾×‡¹¸MW$»šjH¬Yx¾‰£F/lì¦ZƒÂñ —jQA‚éf"Óê†,wbõñMQS5’rû}W»›¢Í{Qûp =WFK6Æd‘‹6—Ÿ¬=’ïp4Íóù™[gªb÷™›xÇÎ<ž×ßØVû||ùÕ>˜ô Ð™Û‹¶¾ ©tlI‹8¼å¨ß‹ÜŽºÔø·ì”`r€G|!Mšª×jj›Üаû!T
k^x¼ošÅñûŸð)NÊýŠ¶JÎ,fn,uºy‹rª¸QÕEú±Ô2OXœp·È˜œ6¿)l6Þ^C*;¿V4u¾ÙÞà˜°–Ý”ˆKÁ÷9£zDQ*·$ïÝî¼h;–•Š ²Ñ;wÜV¹|»¤©Xf¬®A¯Õ%ä@ÕŽií¶ú¢«¡äÖ)1Ûãbæ(L³Ÿ¨w÷ãáru¹“)a%|·^ŠÏdÉ
(,Bc5}>ZÆÁ7PÝŸpgøâ„šå©f$bV³¸muóèÈÀòS¶?*JÊw" úàz„bEêôœø65 Bʞȼ%SÌLB¨[£Î9€^áÔ…%àHãmŠ„fö#†_TgÆí:ÿ-Ÿÿ}ŠßÔ‰n‰SúOU|Ùr• 7ü{Pý°q]Ï3ÚûÙ|ii/q#P¨ô}Û͉*Õµ“B•ÁET•Î'ÚíØçX2Øô™XlÔ»˜ÎÆ]$€îT’%	™62y¨*tä9ÖF¾šÔ|SÁżèо¢]CÏ»Üëj»—.#à6ó1‰ì>„¯'Xbçæ ç5Ì”¢­œ±X‚¯®`í!LU%xœª.ÛT¿#äLc¨Ì Ïõ¦Vך8¾6]ñ”U¥€GÄû¦¸Ã7^ZUÏP0gÉÃþ¸Ë àh‡
Å|þ‡)v¤»+$d¯4†Ü…™¶ZÊ‘IZŽíÜÀsˆì„³ŒˆáCõHy倖dÚ9ɼèwdg»Q†‡D» ‹US]G´¶‘I–H`ïà	áñúœ-<âÏ—fv#
˜ý–V”]Q‡=y»‹Ÿ±ë¥JqìÞ‚N‡¶‰¶³„WeKwt¯>vn€ö¡LëN˜ÁyN)½Ï4Ÿí±Ñ´C~Bœbåáì÷Œw?@Íò
…[€ˆ,Ò ÖŸ™ñ)ëðGñ ­½*è(7«=¦=;×›*Û@,^ob“oåœ[CÞ­#'ÏS¬Vb0iæù[ûJaÉõkŠ¯eE ÷­r$µw¢:›‘JÛB=[³ñ
ÖÝÓ2ÅÏož£‚‹\µå[Þö	be1Çû1Ȭz˜
»@8o{jÔj³¼`ÆêÈÌ[:Ñeí™óHඅ©C;-þHýxã$²ñœX7¯¾²2ÒQ¡ßÍ«jÝn¸ñAëÓV`Mô¨ Ç,É]…üoÖHŠ¦Àž?nßÿbA£„ú˜R75Þ\YX!m\ӐÚ$À+]µÄ¶9(Û ^N´‚±Û×>¬y[	²Žc‰áh¹üƒ	ÏáWbx7ç9
`R- #(é[H ’Rîe‚!<dù™¦Ýö¬ÉúÀÀ}¶;,ô§
ïW1eÄ}í&²Eàás›…ã&d–ó6ñÔÖ)"±Øû;f¢”‚ùÙÓ9š¥ÙaÐÇ2UFø'þ•ãÅr†–`Ç|xy¥êNÍ%¹a1¶‰±¯Jó…)__Õ†qûOFhžÈh„±ÅXˆ¹©ý†(ñ#2Y.’¬#β]¾Ž8à¥ÿÉŽëéæYÕ<fþGs4àDbž<Dóa^}»‚œê
çþƒ¨íàV©‰ä¹çäê;ño^¿Ú úéZl“þ±Z†‡y°ÉaQ¿­;,½P´È^E2mìÞ–¥ãÞ¿yX…¹6-¥Éèç¡îƒÀ›ëR)(2Î
¬-³Ž®Íǯ5TÏs°Áµ	H§–æiä}YL-‚j[ѳ)߶Nˆ	ÚÆ@ÓÞ.'¤x_¯tåÈ,„®_ËtÙ¬ºpwéRüMóü,šg±ÇDß1£uòÁ›ae‘“ª9&ÂQoß9*ŽLÀ+ ÙdåJ|F©ù-¼…ðg„{…tÝÔÛOO7*¨-ŸôÙ})á­G­U‹El2%“æÅÞ¢õ(¹âñ»i:X¾ôOe`Alúf8 âÿš.®¹#«EEîÁ›T¡fÁþûºYÉ2·º×–«ª”ú+ÄŒ-#‡‡³†¶ÒÙ®òdxMQêò¬’TBSÔ¢l½l±ÏÇMº~椳©bâ‹oH7bª;éX©¡š|Œ˜$ü9nè9chÙÄÂ7y4‰…[‡¸èµ¶•4Ÿv=ìvc:ùâÆW_4z¨î¨t³	ka³*r|>OJG at wbbÄÖ¾ßfë•Œ>žºoonŽ´xÛWAR–<µ®õŒÒþzžáòÏH—
ÅeÜL(Ó#6—
lŒ?³x…ìR	ø½ß-i”IÞß×m4¹+Òx-9…
©£:8½XÿÍ×äw)~×Tóúkél:ÄÙÚ‘ô´–
€G^Š1¤'ú¹³ûa#Î…IÌ/´™›7ÁX°üÂQé¡RjËl*#¨-EëéeFÎþsµÞÕMà^×ZÔ»Ûi€wC+³fÚn´o³°gH½5î§Oè¿,ª&`¥OɽÞ1ÅMäúcďÑö
Að½:á^'Ú¯i½ÑÈ8¬ÎRùÐÛaÜ'~Sé«]PK׶ùSç3Œ#øïÀøŽ(œ=V+Ý0uÚƒN²ãwÛvˬØ)»Ÿ•Ì¨8éwÙqH_:66(n›G§ž`ùŒùûƼ¹!…/.Oѧ×älÿbð$ãLªÑíTÓ©ƒ‡êc¡‚0Ü4±x×5/>hp?¶«*sYÖÀçDÑÞv•=C*ÇÌ<ËSÎóƒßËðAõ…î8ðŒD=å÷ŠÙx)õ<”8:û2ynXÎ|ÜÉo•W£†•Þå“Ř–ÖúÔ0ÜŠ¿¨Ÿn”°¾M¹ÝüÍÙùß’ÝfDã¼ãm²/»ÍVRõ<¤H11ÓëØçýQèÁËãE“²}€y|ÿnÐyô]}\{—½ÊFÿõ·0ýoJòoaå­ EH“‚W‡Cœ¾¿x}yS§»v$Á; .êÚ(5wª4(Òq_\55Ë7¹ÕûF«G·¹eây³k»jç…ö®É/¸„îÛ|p¢Gìu:ˆ÷²‰G ?|Y¤¥Ùž•>†˜>yåͲQîõÞUÍqÆ+>€ðé÷áðË\—ýoÌ–èn¼oMä™38ÏT4C¼î)HØóÎ8ërxŠOۻΙl“BUJšíÁ1éÒ¿`2>œîxœb¨8d½õ›W»Ng.¨Ú»b·]®°’haŸ5‰÷ NC%S|bª‘‹Ž‘æÛ{ˆ0ÿ˜95q9ÏùÝf“ÝècF›ã^}¾Ù±>7>Û±p	EGèω€k+Úܸ›ÿboËãgV(Œ$Tʲ˜8	Ò¬úÀ&3˜Ö/¡]z¥)aÛmNÄæ#¿HÞÏÄ€ùïÜå{?ýM£sÁn¶F%'g„-k–z¹awA&ÁA¦2Ó]eû{¢Í#iƒº#gÅŸÉ J=鯍|÷¿ÓoÍh~.xSÛOò„ð­T®‰=|A|÷=oÐiÑ–óu€Øüi+%$Oà }4ÍÑrX(ÖWŸ¢­·ä’R`MäE=P˜V¶©n¹0N.kÒT#¹Ðbu½áÊðAÒ°l›ú¯Þhd_E†²4^^OS*O‡Ö•äW5S¿|y¡º]xpb_Y)€4êR»G탿x&ŽòCá±Є vPÈV§þ6Ñ©c{É»GõOvï4ÔC7÷Ґ<™àv ½ÎŠëÚï°
öÉ"X°ù…â‰t„•`¯ŒÑÁã諨ù‡•¬iÖmOGáÇùþ‡êU•ôaf'4UmÄ<TPkÒÑ|/5‡r Õ5Ý
§ClÃ1Qª{é(#1™ŒMÈeÔíë/{²Á!vy…ÏSõw*ùKBÕ†ØV"¤XÚ‹ÏÚuÑ÷ª•’5¿ôQïaï°¨bœMë
É×Ï2×_]WxÝ
•ŸW‘îwPZg{¢Ç
êý0C×!OI0»|ýŒdÿ ÿ5¦Üls,›-É4Ç€‘J;»÷«Bû‰¹=3ŽŽf+¤¼z 1cU>ôÊ·> ìå°¡é…K
äÞ]¿t=]1›ÙesÄ&¨’^vå¶X+LÛ¾y¨&RÓ´EiG6Ïk@¹]Ç9«‡X©éˆ1å ˜æQ*ÔáHêåí Ôm:ÍA½ôe‡ðÒ%>o3¢êu¤XL™Wá`wz›YÁyY_>¦®ëE˜‘Õ-ì#ÐP.s·%à×f…'è<*tì-v‹âs­…sQHLMºLEÆADó!¥Ëè|ò|Ûö*‰é6?3|LÈ…NØ~‚ŒLzÕñ”£øà¼i]ü§õ3ŒùoëÚÚ”’IÓöha$å‹SïþÐpe]0µãž°a²³s+Ú>i8·®ÍÅÖ)~
äiZr„kÞçÄ_óMÅÌ	p>‹m(‘·ݩþ1/å¦:à2dù–µÆ‰b֎ȧ6wDŽV‚¯v¬íߤ.TRµ¨è@Ö両œáPF}ùä×så÷Åí°nù|Ò†dø»Ì¹3%,š revZ íŽød.%…_›Hrë!¼~QQs¨ØdQâkZ´Õòx›zø±[ð̾— t/8fwÕþ‚\³Þ”™û96h O<›ŽÀ©jœ:;{º¿±Ëzo"ZÒmÁ¶¦6$áudã
ýcÊêˆKð¬}uïØóèÍ&o/sÝÓ1(‘I©]As|Ã	¼Ð.g€>±þ¤Ï[‰‰š£ð`HìàºCºÚJå¡%¬ YÂè‡ûût¢ù>£¥ŸNwÛâÊ9·|Í8&ìdóûc˜'£hlxð®3<sx7>vÅ"Xƒ>‹ùzr&q j²*6eÿ–—fVS”ÎƏ‘ÞŒº$ƒ˜q±W at K[Æý÷Âê*ðGú%³³ˆ’€ç±×úü6õ®”£YVæ¨m¢¤»™9`xŽ§2Úlóâ'ÈÁv»ôë_‚Ló/L@GõzÎg‚ÕÃÑKKE¦e0 £ŸP×ô·]?ºcܶñª­d[¥)H=
ÓwfØnyD·‰÷L}Ó™òñÂis×’å©Q—“-ûöuºÌx5Ø:–TŽYkÞ›!5wö¨êÝšÍþ &½c*ñTûL@ô’Þœ =
¿ø¼”gpV9ÿ~¹´°¯R&žÉûÎøI.5ý°só¶¡kþËv¶IS­&"dTp\¶f襝­âêЈ²h¨â+¹3³¹³5¬äÌ\Ì;ɺ;O‹´‹•™£ó3ýr9«A«²ò}ns­^o=Íw°ï[9 at f%Àå¨,m0BTŠq÷ñ)3DŠwš«Eɨ„‡ï䔋¥ÂÇÆXî^¯©dµš„cõó
ÇN”­¥™˜y>F²È-=¶+,¶
vÈa˜O*ˆú"ÕFóLJÍð_\ܲ_-ÊħŠ®£m½&„~Õ”zX#rq}o¶ˆ]—â&/9?‹®7Wô
í67Hk©f)bF°®ÂègbÂYU¹ºÉezµ_ÃAv½P¨Èz9ÿ žs:|rä6ÉõRåçµ~#
ʼnM•f^ü­{dPŽ÷ul{Ž©|§vû±§#O”k7Lò~KŒYS¬³U$vàˆß+&áâñç&ÅÃÀÛœ©Ã_¯¼Sˆõ5 ¾yÏ™ž>§ƒ¾<LÓg’O˜è”É0‰±8֏·¯]¯ìÊaÔϳ_bs=rÍŽ
}¼Ýƒú«žøê®ná3‹AO×[çm°‰Þ¦XrÈZÔ¸5
~Œ}/ç2¦ÌÒï‘ÍuŠ.y¦ÉæW¼:2§:¬95~Ùg2¯Ð&{{‰ñþP\•íˆÖ}‚F×´«y]{²l_jÞþÄ·fT}퍻¼Ââå/äƒìO?yY¬íîæǏRö–[E=V8ÂÏê «ë¥#(HAZL¸qëéç± iYÿ¨³†2^KÍ/FZù½’døM
Bä{R•ƒïêÔeÝs`æ„R²xÄSÓGn|óQÔ:6ìZ‹Ì‘H:YY¥PÚ,’/ªÕ5týð0Uéµì„øä·ö4ªm‚Ee	2_C½@ÓàT$z=qÐÁ2(8mL5c”Ç/”£E‹È·j„Þê³CÙ†Ù!G%
ÏÕGY©¨ /Y„g&äåë¾}ä³[ïnér…”µ²ž-#¤ûêXͨÇg£§ÚJßjVmÚô¥ÑXÜz!Ø]ƒ)·&}ÏOí¹%újO²Sþó\_ƺå¬èûn{£çL·0âJ2®m˜ˆ(ضEEáh¹r‚OöÉgÒb+Œåf–Éj
(‡êb‹zi¿¾Ö.ß
ÒâåÑL‹yÂf¿`%ÚiJ8ߏ_r
茋¥ÛWD«…¶öŸ¿¹ëøiÛp5'¼Â›{ÝšE†²6L3ë™efƒîë„xzîÄô¿´eO”a§À!™ÅÓ>gí'¼µÖ>€´9zr«´Éé–8I!wŒ7 O°­ér~Vk|®éÎ[åèX€ä³Àáæ@OÜ«æû®Oø6^&÷{ËÇcz‡ü?§ó¢¯g1Ε¼ÚÍ÷ØôrÉ‚µØv™zÏRxóË›:Âø¥‰ü¥ßläYü0ÿŠH/d>µIªR6±©-à0êKš•D”ƒËó„ Ê‚Ò²±µ8	–4(åÊ‹IaސƒEÀš¦qÏŸBø̳«è**³UÒí§«Y¬\|ðsœy	ê_ËCdH1Ôy„ƒ‡Îž¢ò:}ÝÕH…—ݼ|éZKo69ØéUU+ UD±&Ç Ùžƒ§Ñ—ÄÄoÄ'·m–0_Û5p¬¬Áñ·ÁZæ&ü°‘‡}cw1kº·Í¥•ôh"{â•{t4}³ÑÅ2¾ÜÙX9¾ Ö¬©L^xEgéø­)9E2”ÍLP²
ŸLaŸ½éÞ("à4ÓT˜XQ^ÂwŽ¡”,_/‰5:˜ïÏ/Û
˜•v¬=¥¥»|­%láÔx	þÀ‹»VŠ^–Ý·.íª"Ùj"ÑXká¯ÉßÜ!²[9ùîˆ~<o2b'yÂT‡Ç/¹³AWj‡ÁŽzrbÝùfšÇm3®½,ŸŽŸ¹Ôl¿¹Ò渨¢ß‹Ñ°á=à^s5jAvýÍH߉[aÏ»€‚È-­Zx\
ºgÝÃ:i™k_MvCD¦hc$¿áaevÄÎaÁKq‰»-¯¼V¿õ%M}Ó³Ožë—³ŽiÕ3¯ÞƒV©ÍfÄëäÅîW7ÍdAal(Ië¨Í´NÜ'[;©;†ï&”y]Ûë=2]úƒÙÅM-"OºŸæœâpWA~`áÃûŠ÷‚–å/}'¦h
f7oܽLªyîÌSÌ'^Ž¿„8ªA'%Ù½3ø­>ÄõB˜À@ìù¡ÔbØg4gæ½Yî*‡Ó*œ|oùÛ‹™¢Ã4Í­®”x«:¾éMÞµatÇí¯‹ãm_›5·#$ñ™ïªUP‚°ú÷ÖjclåÍ7UBëhçÈ€ïëzv"z/ÿ‘K‹[‘˜†Ô›èî»~~þû““õ³„Ý>Óçb§îWSJÔ–MJO:ˆ+n;ïµ`üîõWÉ;g.¬;¯WA¿W¹¼?"~ûy;_^•/ò›qÖ<Þ*v_ƒ‘ÛÊýOê¤$×ÀiÌÌ«×ms cwQe°Š`mûRÕÁynw”mí%»N˜»ÝîL¾ï³{äùº%Ú㓧_ßY¤?zºü r&bz
¶!\µÔú•ë‰/>¢S÷&®‰:­
› “'%äLv9í¬8]ÚÇÊÔœ0NU|›ÆÌÔ…©ÝM•ãÉúÄ㻑pÂRY
B³ÙÒ'ý·ç×Hû*Ô
Ä×5‚Æ’Û{ƒé2¶“ÓØ"¨ÒÕ0Wµ6;/P#›ý%XJ’¼/í ”É†IÆ\–݆²`¥ŠÈ³XyAÄ	C¢¯\
³5/½0WÇ4²ôuT…#‰èyïxsÔ.Ív4Ÿà–ß7܉3SŸ=Uÿ¨¢‘ûïbÁYMqWaÞh¬z·¨Ô”¤Dà?ƒ ·û‰Z?ßTº˜äúäšpLò£Í¹Ô¢pÁÅs/wùJMˆ®}X¦9N0\SÓ3ÔìCo{òàí‹à ÃÞØÔ?I4Më«Ú™'tÚÒ½DÀlWhþµà%ÛwšçªŽ"‘Dücw¨|Z麉ÑÌ<"êpýà–âEËHìûyQ+iöùnW“Í;?Î~ˆKÏÒn8l:æâÍ~!yFë@gðÖ£SÛ­ñp#	‘ºÞ±æž‡ ±uòy–±¡™uKË7Ð|P¾ Þ²ˆ¼­Z£éž0
[BÂÔ<•hQÜŠECÉùÈ3²KŸ÷«
>ðüzl`ò¦øöåßn¶=	ŒLAɸÏ^Í…ú¢Q.U{z«÷’÷ÒçfˆYÎ}SëÛuø¼üXpÖ\aÚ
ºåËÛLøÆNþØuΑ³LË„²íÏóË›:áNû×É!e¤²
LÔÓ]n·L†owv$¸Ì<')SΠڇwoJ[ú‰²øÝ›®g›$3×Üm“ÌTºúf²zpºeÁòCÍ#/Fùz¾ßÛÑ’Û
‡îéhÆFUà˜Š=¤Ù>Ò Pë)¶/µ¤’É•[ˆÂâ1•|þ
bŽÑÝùÇvõæ/”nz}Ts²¿œ˜ø¼Ý&¡±©C6~,7×IÛ5¿ÍpTGXT0\\?áì‹„}4ÑíŠõù†¤„˜Û‰-v£GOgù«¶d?i’ÝUÏ€ž¸[sžÈrPʜȏ§\µ„lXjoœ;r.¶ዪfš•2˜p¤³bd*؁ʫsÊà† –ìÎpöJ+º þɨ{íxnÌà…ó뫼OkÚm?h¸¦0×Å—ñúrx>•þõQÌçî<“m`ÓÆæ#¢7×ðßNòO,}9A„½œñÎ{c‰éºñù íñ‘ɨ¶$¿–V؍öó›ô¶9*EôJÙ…àFD¯€UŸß£iÛ}ë›Iу'e"upð6ÛÔË®u]ŸÀq”9ñ¶¿”º’Y19 oyo®èØðý/åñÙïè|÷ªC†˜¯Fvf|
fŠC†·¯/Ôz–˜*ì2•ÑÝÖì ?Ñ›Êõ¦þP2\„ð:í6^&,Ë‚QÛ4O‘KB£#·<ž…(ÍŠî0~w£.ÐÝÌÆë¡Nü·Xçëê ‡“}Ô4éØ5©7Ð-fø‡³³6—ÊÐÚL%vÙVúBé¡
bË
×1—ª²„ʙȾ‹WØvß6ˆß-KOBÌÒo¦°›ë¡pÍLçaÆo¡‰9ªH80¤MÍ2·¹Õ»ñú±~^y¡–!ƒçGjÖßm“Ï!F§|[“è>8­g8]C²~ ­#G;³HxÖÒ+•ß‡Ænq¯ 峑jes-YoŒüûÞü½ Ë3À^Ì—³Z=±‚=J¢•k×Êâ%¥_iÚ8ÉÌzßSR_š>=~Xsñšó{C–g¤Å¦ŒÔœöò¢îþf÷ÉÍ·—Ê·6FbªZØ­ßwï	©×ôJAJ ¦8ú|Î|îZ9­½rù&yaà¡ìò½Ãµ¬½1*'Öä°/ë$¦X_.ñöx«º˜WO”§"_Ð]/•ð7Ê::žo!
øA Å0Üݐ¥Æè‹ås×d÷\²™}¤¦[ž_™˜wRÛ	>ôøy¹”@±ŠÍ¶ÛaEaeÌæíåAêV÷Ž²MuDÙBn†_ƒ¹7ùž¼4ƒåË£OMá±àÇž0ªV‘wJBVLSSÐP™{e[JZ2HXì¹ ¦7WÔÜ­™æ?kÎÌcY›eŒèÐ.–FRPETGžž¸,ǾSÃ6–¤r¢á<®(ݍgè— Ã¶£á(ŸÜÚDE3ípwjÐLP´§ځ›}Y¤²p]©#›ïß™µ_½wòê’¤ð˜ºtÙqÕŒ©.2´Éš,¤çl‹‘‘3‹$ïhö`yÞ	M^{S,ÆÜacö°õp×õ½†z+Õ6…P<"Ó!Gum8WÓß,¦^%¹Ž:ÿÚûx÷%­1+R~›LÄ^ç1æþ8í^Uôcâ£õ¹í62F•ìTËg¯UåÎ?Ú*œ-Pé•ðŽwËéà¹6ÓÞAÏ#QŠTæ§ÚF¯
Ez*Ã˶¼ƒ“7ÓƒàæÖ¥©ôM/™$é7cSz+GîU¢çDwi:#RÞd!Æìêx¥ú˜èTb[j¿GëdI‡ÅÆ wç5ìÇÆ_©QÃ.Ÿ¹:.ÓßäòØíá{i%4F éR†ép,Ä:®ßl&´¡UPÂ7KMÖ‡AxáãÃXñÓ,œ°ÿ¤ºr
ÔŽÀ«œm0UJÅ-‘Ö@mêP
#w\5^E”Éìzäºyj¬«	;	(³óû(	6Š÷YövEA³Ûá6\!cQØb3"˜Ê/,‘´âËok’g*F*½¯n&#}+vø6Wì%KFK9º¾º½Q§§.×%\ÕL_€•,žS
7 êûã‰8ÎØ}Áyú äzìÛt¢\Wf„qt
²½èÁÓ[Çp»cù­F>V0©¥¨ì¬ÝÇájÈBiD[QéæŠ ÇK½•EV4ÛV˜:C0[9²ó†’æ•dšUe`r¢NL9qŸ™“¹þÞâ#ü†N=™W¿f3×;
tڏpâG;büªø΢›R©Â)×’4Т2QæNæërb6+µmnð¥’I=\ZÔûÜèÈKLFö[*ôáBêeÐ8!¼ß¦1–iÖ° bQÂð@ËÆj13¶öG3fùo—Â-sØ9T/!ÔIOácN¾x‹Qƒà÷b#å‘kà™:ͤwor*Jš1‡ÊUs@Žž~\Ž¬9ɪ„ˆ½z‚“ŸyK]w¥iYýa_aÇ|=Ý«t`æÙüâýÏׯ‰œz'¦ûÀÖõº˜¿™P_Ià,ŽÍ’ís°Ø§{+H"ÍïP…†Î¿©©UÒ—G ž¾ÿ\÷1¡?.¨S=
tLÓåx¬‰9M¸šGs¶$ÑÉsÆË‘áYƒ'RÉñoîj«ÁQ·q 6Eô$ußB¡;˜ ü„iJ,:xgì×Tø«ä¦Oåér!P%m©šÚ¼sÛüwæÛ’HÍЏ¥±B"ëhº]ÀM.—f†ecFdÈ›¾Ñ7–éCëÍ_[ÎÚfQ`ÅÖW¾}¡–¼;9S㞍cb SÏÅýæÂfå;…ŸÍͶp®J³B½þà*(æÇ}©‰i‹Õöò#™²KümNtá±JZ‡YÉÙqÚgšîÌð+Õs‹ø\³ó]߃_ÓÒ<o‡KŸ=¹_E<åÊՁ¹»6 “þO™†ù0M蔢oEçìK`¹eWO‹£·E)ytóŠ!ÖNþÊèi~zT=ò=Ñ0Jµóë¢c öI ER¡ >ü¤™aäWÙÍ…‹YáX§;èá‚[n¶¤={e "yŒƒåg&ÖIv‰¶¾UxŪ‹ªz_ä“jq}*¡>•>zŒ¾µ쉙ýÝ3‰	;Ò.ߊvsLS?'¿Z#ª•‘滐óa]ɼeÁ€5Ÿ¬Ù·¾4‚º©Î¼Ou£´TCPOf|]æ‰{ù?Sg^<ŠEM
l/pdåXÙ•5³J5 #Õvßä¢ü‘‹>EöªãõµÕ•Ún.‡öùñ¿gÄ7jlÛÍâUᯊ»‘Ï ¡…?èê¹{ﲜùï¹QMwX¾ù„E”ûZ&s-õJ"s\M>zƽÒF&?Ê“gå2hÔyF‚b­
Ý%5n³hSóìZ}LG¾s²Ò¡€¬LžÄ–Æ&/éÄux¾@

'2^óã;n—M>L$n[ÓgˆîA˜9ënD
‚™J‚`ƒõ¡Ä,Kÿ£½çfâÁžbÇy㟚ךÑ`³wÞ]í7!–Kˬé’òÓÍ/vÇj„ïÚ} ÍM=P1É3ù^ãkí©Æ}/®žè´IõüºËY„7繸tðàOD™V¤Ö׶/Ôé^°7a$
¾9Z£$Šz‡Ì2Ý·"ËîQ¶ÈoZž¬ÆT}Cµª.2Ù`òÐ_$¹Ý¾j7_@ŠXðê‡u›n1Ú²Ð
ÒBÁ¡&ž'©ûÊsR?Ò}
f?
³.˜«*¦ê*[×\]#^Z*}PJôÄãíß3k »"”û^Jô^™{ñˆ*ƒÿp4££s`=™Š½`Ó‘ƒÌÃhÃðòÑ×R—ò°O÷79œ~yyl^ãÐÕT¸]Ïý;à®æçñ‚C›ªMü±J{’Ú·¢S×<ØÓ·Ûmzæ\0+ãË—sªR¸6¸#Wôþ{Ù½ÒÇKùò…ÝAµL±-®cp	¾ÚÐÑxµ)з™ê	ýÍ·‹á-Ùª’·ºÉÅ>ÚÝjVÇÎf’!æüÛ?°Ã׳Ī@oS=	‰ßx#í…{*í}’{¦d|ñùÂ0Ïë× Ð–ä;r™¯öø9•k*YwöÔ•ÇT|=v¢«@]Eù÷•°îlÀœ%­éÞ°*‚‰Ã}Öæ1…˜¦–OèuYËËžíÙï h-wFüâ?Vþ%‹Ôd²…÷µ˜eC 	U9ëß&*8×Ö½Ësuã‹Cüõí¹Jk€
i6Û×êô§ÝÅYä+½‰[TçÜ”³õÒ#5ù\`RµíW\R at 04(]é]&ä9ìÒýS¿·ÛÄ:Ñi
Ž£ö&jRÚM§„¥<47ß2kj)fÔEŽmʐ{êSyùœØ¡t•¯[±…'Î_ì³,NNfZRœ
*My}:HYð¥>ÑÁ ÝYs·}
U~†’DÇ¡)u¹Öhö®ë3HÛ»IÕS¶Ö^=ûö­¬Êá.11¨
-VÀÎÉû)RKù}mµÀ¦P—ÆWäSy3ùŠ‡~3Ÿøº¥OmÔ(Ñ„ØÖˆìAs‹l$l3NW™Èòññë”jl=F–ÓmÏQêÖ±è6{>Ù›‹^ŠÒt at _U|.PÑf`üA8ò­w·Èš|{^©ƒìàíãçãÚÇ×el1
ßcŽ'¾/Þ£²‚˜WnW\}ãŸé´›xk»ªvJy%VäV©ÄÌ!!(X
ª×< e³˜‘s]—Ç»€=§êˆDûë§#ƒ˜Ý ºW|²©úsGŒcÇÞƒT&Rø3lmK…:£ŸK¨AËŘyâÇ—ã–ôg\ÏÛe·ÔCYiH€I¨”¦í·þRxçÝÏÎvˆ…Ï%ðe¥Ïº¼÷²J•j³AaÐu5¾z É‚¦ÖžßÒ]e˜ôyŒd´§Æàõ±ñ¥Ÿ†cï¿ÙÔTN…íª<–¨ÿìLõ™&,le‡:Ú¦\NôõÃO‘p{p]pYÀÏN³¥5?¨	3Uk˜o;äx ¹ŠpXÑÉ;Òï­St«	t}`2×=}žïd_=¥2*ݝR”}ô™Š”Îis׉6+$Låʧ_âz`žŽ:Q¡Ï]Svñ¢Ï!Úië‚ï•L»Ã© w™KÚ¬L/•[7¶=MO3mÓºdÝ/¦—qj«Šmº+ï‰uåúû||J,Ëø«C¾p°ýä—B^M–{J_	j¨4žu·5Ea”³,DÉéõ2
áVÎÃ?5Mí)9¹4þbIˆbÏ´¢é%?yó­ÓäJJ^çK“²k*
±yæØ÷;ï\¾˜\·nXç.˜5Ô žwÛùh{ýõ¶Ûô½‰Kažãtý¦Î2:Nz6<®0.ò:÷züDK›½½‚wøѸðsøO¶lw,ÌJ!¢ÊnPRßv)U°ü6,ßV?ÀË|ì1c­€3sÇlnt¨Üëâ1åÚùd!vñ·Ý>Ã:ñ™ìÔfsÈãß_«¾¨$Á™ð^óà´Á¼`Þ!ßÛ{úXc9»ü¹±i×Q7Ëo¯
¤Ü/2#5yÓmšKGÈùæâuÇÊmcåfú‚m×ÕÜY½ ¶OC<	ëš´u¹õþ‹e½ß]ïÿò»Ï|~wæP4J®ç÷OùÊ—X)uͺšœ?-MMM=­@η¦¡V Yóï_ZºþZ›4µõW.´
ÿJþ9¿?¢£ƒÉê!!1 y´†H„†¿_t0B!p)p¸SŒ=`D1ÁÀ>’áäD¢)ôX
 ûQÂi+ÌÁa´ˆÀ #@[GWÐÓ´õ8ëdJt =$2&„apEC¢? ’N‹¡Ш@ ÎQÀ S :GWˆ¦P©€_@ %:Zðä¨øååÌQÀ5ÀáåúýoS_ñŽc«/Â/œb´×ãïîjPb48kÜ·O0-:Æ'Œÿ¿ÑÕ#þÿÄC÷‹ ÓÂ}¢)”2CöY]åzB¡r¼Òˆõ£kÐ+tuÎ2!//àÍ-­ì +;+g·…=G‚D§Å†pÒúG Ž”(FBV[ÊÀRi~TŸÀh A‰‰£Ñà lt|4•ô+3-òÞ?Xœ‚iêŸÚþu}Eð_U(~jÌAm@Ðô~!p%5-@U=FðK}üµü"±úú¯ë
!‡ÿ_ˉŠ¹á'H¸[…Æ s2"¸~Ôº=¡¾
;=@¬ÁÝcœ¯<Ñ\¹Hǧ€“ÃÕŠàX‹‰	‰ŠFx jß‹æq¥4 /@QPÿ;áhîìjºÍDÁID	†»ˆAp ãÖ˜ÉJ‰q¯4¢þQ
,—ë‡-üOîFYIƒ?…J‹Âi+™ô#ûùS)óí–æv&ŒhúÊ‘Á±£ÆÙA”'c„UBôw
áèdªåÑ1ùû­Æ!ÿ•í·ÂAøGòw’ÁÇÂj›¹Éßl#ΕK¡š`•8ÙÔÔ ¬Ò5ec€ëG0”€`à‰ÅÊc e‚LãÚÖòY
JIHDÀC 
¨q¶Ê€ /cnŽ"pøŠ¼Z€ÅXR"(t?.ˆÜºÔ8Ì ×W€£ÌÀpxéá\lÿÐÂYá莡pXп¸@cWs
¨Ej1 ש_YÔÌ€
 5;îçE
2%V#‚STø§‘N{øÅàe]Ý?—WÎ48|5PµÀ*‚tŽ_ð9eöS´+›ç_èÿ¢)0„ûÍXÙtœÔpéÜ4 AßsD‹àæc%yÜR£)+b~!TîÎý_à”!1€bÕçüºƒÜœö¿îŸpûGØ~aø/Aû{Ìþß û_ûoûïñ"ÿ3^„ÿ/Â?áEø¼ÿ„ù;^„ÿ^„¿Å‹ðÿ…áßãEø/ñ"ü_ðâúÃé”>Ñ~œ–ïL	SRFpÃrNðõ;œØÕr€3ü矾˜­t2ƪ ·cœ.ÎñŽÓÙ9!œƒ:„ŒAüpoÕŸWV­¯¤tÕ/ )	Xñ^oe=ðo篟ØôpyÀŒÓá8£ÂŠIŽ×nV¹}|5ÌNl¢©‹³½™£¹©³¹“¹£«¹#
§d€6vÚÙÿØ/þªàl {»m?<ü×fô}…ü³êïè ~Ú+£wk¬ôø•í°š¬=ÉÙÊÞΉ[õ?ꆓ„ï0üÜO¨Q¢¸ qebhŒ€à•¹qe¨@|ƒN‰aÐ#~¬C‹\Ååg¯h‘‘¿zµº" Œï÷Q˜ȝÖWqôÅpŒþÈwC„…P©’ß+šKù³Ž~5‚YIÍÏaÉs±£|/* ؏Ã-4:ÅŸFãœÕß'ƒS€çÍY‰àª‹æ¤jepƒs¾•áÈÙŒÄð9…²:8qUPiÑ2ç‹âAý©t~(Æ ˜55Ú¿,êÿ%غ_$÷Èq6w´ý3|®K+‘Ú[þ8Š~XåæÆü·ø}?ÿ‚/:gÐó#ÿ1Ç•Õÿ?È 5¢éïqû‹©îOO¿ozn³à–÷“³À¥qÿ ŠÏX¸ß¹Wƒ}8¿cÑ?D¹¿µH ûc~hœ©Ÿ;Î~¿ÝøYÈ'ê»ÂÀŸùç`¡¨Ååð‹¦ ¬†SZßÝRæv¢?•pAX9r49ë«®ÁáÆÆ«‘(¯hà'?O‚Áîû	­ùýøžŒmßÃ^1NùÙÌjnþêԏsÐ`…ŸËñ}%¡j
ýœàï,œ@þn#)†¯ö³é¿1¡ùã0ü9–ŸŠfõÄû›óGçükYÿ)ù#pÎõ‹¥…º_ e•B¥P"ï\«ùø£#þ(3ý?šêÊÇ*,\ÿ	ÿ¹,ÿÕ'@Íû.ªý³å£
ãíDáÜak‰«9åÆ”ô#Á«™Oú–¤  iÕÛdâ'£”h¿ Ä
?Îê_ž7ù­>oò×ýÇçM~þš›ÈÊÊ•¶Nàø¼iÓ/Ï›"ýÂA y’©­š–º&Ì=èßNÀ9tŸhJ$…ιgŽ¦­0|¿×‰ 2ȔՋH¿èè8¬Æe at pnîiŒˆà'Mß¹Â}"hTZPHÄŠ²?Ùþ²WÿžKXu•ÁØÉQ¾zúÑ+J8÷Î+]"0„Ι9¿·N;áìÜçê_µý[敨!dn`ÿâ÷0ûáÓŒ¸Ò¨œzŽÿø?:÷†ŸC¢ì¤0b8$NWäú͈¦Ð¹í-†²3æ?õxÅ$%"Ö'ҏîý³må™
çfû‡g~Yy(Â[)gŽâXZØ/ñþ›Ôƒþ¨ÛÿäõŸòýõåÿㇳ£)§?8¢Ñhî¶ú"ø·Xj 
openssh-5.4p1-fips.patch:
 Makefile.in                     |   14 +++++++-------
 auth2-pubkey.c                  |    3 ++-
 authfile.c                      |   20 ++++++++++++++++----
 cipher-ctr.c                    |    3 ++-
 cipher.c                        |   29 ++++++++++++++++++++++++-----
 cipher.h                        |    2 +-
 mac.c                           |   12 ++++++++++--
 myproposal.h                    |    7 ++++++-
 openbsd-compat/bsd-arc4random.c |   27 +++++++++++++++++++++++++++
 ssh-add.c                       |    3 ++-
 ssh-agent.c                     |    7 ++++---
 ssh-keygen.c                    |   12 +++++++-----
 ssh.c                           |   20 +++++++++++++++++++-
 sshconnect.c                    |   27 ++++++++++++++++-----------
 sshconnect2.c                   |   14 ++++++++++++--
 sshd.c                          |   24 ++++++++++++++++++++++--
 16 files changed, 177 insertions(+), 47 deletions(-)

--- NEW FILE openssh-5.4p1-fips.patch ---
diff -up openssh-5.4p1/auth2-pubkey.c.fips openssh-5.4p1/auth2-pubkey.c
--- openssh-5.4p1/auth2-pubkey.c.fips	2010-03-01 17:55:26.000000000 +0100
+++ openssh-5.4p1/auth2-pubkey.c	2010-03-01 17:57:56.000000000 +0100
@@ -35,6 +35,7 @@
 #include <string.h>
 #include <time.h>
 #include <unistd.h>
+#include <openssl/fips.h>
 
 #include "xmalloc.h"
 #include "ssh.h"
@@ -269,7 +270,7 @@ user_key_allowed2(struct passwd *pw, Key
 			found_key = 1;
 			debug("matching key found: file %s, line %lu",
 			    file, linenum);
-			fp = key_fingerprint(found, SSH_FP_MD5, SSH_FP_HEX);
+			fp = key_fingerprint(found, FIPS_mode() ? SSH_FP_SHA1 : SSH_FP_MD5, SSH_FP_HEX);
 			verbose("Found matching %s key: %s",
 			    key_type(found), fp);
 			xfree(fp);
diff -up openssh-5.4p1/authfile.c.fips openssh-5.4p1/authfile.c
--- openssh-5.4p1/authfile.c.fips	2010-01-12 09:42:29.000000000 +0100
+++ openssh-5.4p1/authfile.c	2010-03-01 17:55:28.000000000 +0100
@@ -146,8 +146,14 @@ key_save_private_rsa1(Key *key, const ch
 	/* Allocate space for the private part of the key in the buffer. */
 	cp = buffer_append_space(&encrypted, buffer_len(&buffer));
 
-	cipher_set_key_string(&ciphercontext, cipher, passphrase,
-	    CIPHER_ENCRYPT);
+	if (cipher_set_key_string(&ciphercontext, cipher, passphrase,
+	    CIPHER_ENCRYPT) < 0) {
+	    error("cipher_set_key_string failed.");
+	    buffer_free(&encrypted);
+	    buffer_free(&buffer);
+	    return 0;
+	}
+
 	cipher_crypt(&ciphercontext, cp,
 	    buffer_ptr(&buffer), buffer_len(&buffer));
 	cipher_cleanup(&ciphercontext);
@@ -421,8 +427,14 @@ key_load_private_rsa1(int fd, const char
 	cp = buffer_append_space(&decrypted, buffer_len(&buffer));
 
 	/* Rest of the buffer is encrypted.  Decrypt it using the passphrase. */
-	cipher_set_key_string(&ciphercontext, cipher, passphrase,
-	    CIPHER_DECRYPT);
+	if (cipher_set_key_string(&ciphercontext, cipher, passphrase,
+	    CIPHER_DECRYPT) < 0) {
+	    error("cipher_set_key_string failed.");
+	    buffer_free(&decrypted);
+	    buffer_free(&buffer);
+	    goto fail;
+	}
+
 	cipher_crypt(&ciphercontext, cp,
 	    buffer_ptr(&buffer), buffer_len(&buffer));
 	cipher_cleanup(&ciphercontext);
diff -up openssh-5.4p1/cipher.c.fips openssh-5.4p1/cipher.c
--- openssh-5.4p1/cipher.c.fips	2010-03-01 15:09:22.000000000 +0100
+++ openssh-5.4p1/cipher.c	2010-03-01 17:55:28.000000000 +0100
@@ -40,6 +40,7 @@
 #include <sys/types.h>
 
 #include <openssl/md5.h>
+#include <openssl/fips.h>
 
 #include <string.h>
 #include <stdarg.h>
@@ -93,6 +94,22 @@ struct Cipher {
 	{ NULL,			SSH_CIPHER_INVALID, 0, 0, 0, 0, NULL }
 };
 
+struct Cipher fips_ciphers[] = {
+	{ "none",		SSH_CIPHER_NONE, 8, 0, 0, 0, EVP_enc_null },
+	{ "3des",		SSH_CIPHER_3DES, 8, 16, 0, 1, evp_ssh1_3des },
+
+	{ "3des-cbc",		SSH_CIPHER_SSH2, 8, 24, 0, 1, EVP_des_ede3_cbc },
+	{ "aes128-cbc",		SSH_CIPHER_SSH2, 16, 16, 0, 1, EVP_aes_128_cbc },
+	{ "aes192-cbc",		SSH_CIPHER_SSH2, 16, 24, 0, 1, EVP_aes_192_cbc },
+	{ "aes256-cbc",		SSH_CIPHER_SSH2, 16, 32, 0, 1, EVP_aes_256_cbc },
+	{ "rijndael-cbc at lysator.liu.se",
+				SSH_CIPHER_SSH2, 16, 32, 0, 1, EVP_aes_256_cbc },
+	{ "aes128-ctr",		SSH_CIPHER_SSH2, 16, 16, 0, 0, evp_aes_128_ctr },
+	{ "aes192-ctr",		SSH_CIPHER_SSH2, 16, 24, 0, 0, evp_aes_128_ctr },
+	{ "aes256-ctr",		SSH_CIPHER_SSH2, 16, 32, 0, 0, evp_aes_128_ctr },
+	{ NULL,			SSH_CIPHER_INVALID, 0, 0, 0, 0, NULL }
+};
+
 /*--*/
 
 u_int
@@ -135,7 +152,7 @@ Cipher *
 cipher_by_name(const char *name)
 {
 	Cipher *c;
-	for (c = ciphers; c->name != NULL; c++)
+	for (c = FIPS_mode() ? fips_ciphers : ciphers; c->name != NULL; c++)
 		if (strcmp(c->name, name) == 0)
 			return c;
 	return NULL;
@@ -145,7 +162,7 @@ Cipher *
 cipher_by_number(int id)
 {
 	Cipher *c;
-	for (c = ciphers; c->name != NULL; c++)
+	for (c = FIPS_mode() ? fips_ciphers : ciphers; c->name != NULL; c++)
 		if (c->number == id)
 			return c;
 	return NULL;
@@ -189,7 +206,7 @@ cipher_number(const char *name)
 	Cipher *c;
 	if (name == NULL)
 		return -1;
-	for (c = ciphers; c->name != NULL; c++)
+	for (c = FIPS_mode() ? fips_ciphers : ciphers; c->name != NULL; c++)
 		if (strcasecmp(c->name, name) == 0)
 			return c->number;
 	return -1;
@@ -296,14 +313,15 @@ cipher_cleanup(CipherContext *cc)
  * passphrase and using the resulting 16 bytes as the key.
  */
 
-void
+int
 cipher_set_key_string(CipherContext *cc, Cipher *cipher,
     const char *passphrase, int do_encrypt)
 {
 	MD5_CTX md;
 	u_char digest[16];
 
-	MD5_Init(&md);
+	if (MD5_Init(&md) <= 0)
+		return -1;
 	MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
 	MD5_Final(digest, &md);
 
@@ -311,6 +329,7 @@ cipher_set_key_string(CipherContext *cc,
 
 	memset(digest, 0, sizeof(digest));
 	memset(&md, 0, sizeof(md));
+	return 0;
 }
 
 /*
diff -up openssh-5.4p1/cipher-ctr.c.fips openssh-5.4p1/cipher-ctr.c
--- openssh-5.4p1/cipher-ctr.c.fips	2007-06-14 15:21:33.000000000 +0200
+++ openssh-5.4p1/cipher-ctr.c	2010-03-01 17:55:28.000000000 +0100
@@ -140,7 +140,8 @@ evp_aes_128_ctr(void)
 	aes_ctr.do_cipher = ssh_aes_ctr;
 #ifndef SSH_OLD_EVP
 	aes_ctr.flags = EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH |
-	    EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CUSTOM_IV;
+	    EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CUSTOM_IV |
+	    EVP_CIPH_FLAG_FIPS;
 #endif
 	return (&aes_ctr);
 }
diff -up openssh-5.4p1/cipher.h.fips openssh-5.4p1/cipher.h
--- openssh-5.4p1/cipher.h.fips	2009-01-28 06:38:41.000000000 +0100
+++ openssh-5.4p1/cipher.h	2010-03-01 17:55:28.000000000 +0100
@@ -78,7 +78,7 @@ void	 cipher_init(CipherContext *, Ciphe
     const u_char *, u_int, int);
 void	 cipher_crypt(CipherContext *, u_char *, const u_char *, u_int);
 void	 cipher_cleanup(CipherContext *);
-void	 cipher_set_key_string(CipherContext *, Cipher *, const char *, int);
+int	 cipher_set_key_string(CipherContext *, Cipher *, const char *, int);
 u_int	 cipher_blocksize(const Cipher *);
 u_int	 cipher_keylen(const Cipher *);
 u_int	 cipher_is_cbc(const Cipher *);
diff -up openssh-5.4p1/mac.c.fips openssh-5.4p1/mac.c
--- openssh-5.4p1/mac.c.fips	2008-06-13 02:58:50.000000000 +0200
+++ openssh-5.4p1/mac.c	2010-03-01 17:55:28.000000000 +0100
@@ -28,6 +28,7 @@
 #include <sys/types.h>
 
 #include <openssl/hmac.h>
+#include <openssl/fips.h>
 
 #include <stdarg.h>
 #include <string.h>
@@ -47,14 +48,14 @@
 #define SSH_EVP		1	/* OpenSSL EVP-based MAC */
 #define SSH_UMAC	2	/* UMAC (not integrated with OpenSSL) */
 
-struct {
+struct Macs {
 	char		*name;
 	int		type;
 	const EVP_MD *	(*mdfunc)(void);
 	int		truncatebits;	/* truncate digest if != 0 */
 	int		key_len;	/* just for UMAC */
 	int		len;		/* just for UMAC */
-} macs[] = {
+} all_macs[] = {
 	{ "hmac-sha1",			SSH_EVP, EVP_sha1, 0, -1, -1 },
 	{ "hmac-sha1-96",		SSH_EVP, EVP_sha1, 96, -1, -1 },
 	{ "hmac-md5",			SSH_EVP, EVP_md5, 0, -1, -1 },
@@ -65,9 +66,15 @@ struct {
 	{ NULL,				0, NULL, 0, -1, -1 }
 };
 
+struct Macs fips_macs[] = {
+	{ "hmac-sha1",			SSH_EVP, EVP_sha1, 0, -1, -1 },
+	{ NULL,				0, NULL, 0, -1, -1 }
+};
+
 static void
 mac_setup_by_id(Mac *mac, int which)
 {
+	struct Macs *macs = FIPS_mode() ? fips_macs : all_macs;
 	int evp_len;
 	mac->type = macs[which].type;
 	if (mac->type == SSH_EVP) {
@@ -88,6 +95,7 @@ int
 mac_setup(Mac *mac, char *name)
 {
 	int i;
+	struct Macs *macs = FIPS_mode() ? fips_macs : all_macs;
 
 	for (i = 0; macs[i].name; i++) {
 		if (strcmp(name, macs[i].name) == 0) {
diff -up openssh-5.4p1/Makefile.in.fips openssh-5.4p1/Makefile.in
--- openssh-5.4p1/Makefile.in.fips	2010-02-24 08:18:51.000000000 +0100
+++ openssh-5.4p1/Makefile.in	2010-03-01 17:55:28.000000000 +0100
@@ -139,31 +139,31 @@ libssh.a: $(LIBSSH_OBJS)
 	$(RANLIB) $@
 
 ssh$(EXEEXT): $(LIBCOMPAT) libssh.a $(SSHOBJS)
-	$(LD) -o $@ $(SSHOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
+	$(LD) -o $@ $(SSHOBJS) $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(LIBS)
 
 sshd$(EXEEXT): libssh.a	$(LIBCOMPAT) $(SSHDOBJS)
-	$(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(SSHDLIBS) $(LIBS)
+	$(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(SSHDLIBS) $(LIBS)
 
 scp$(EXEEXT): $(LIBCOMPAT) libssh.a scp.o progressmeter.o
 	$(LD) -o $@ scp.o progressmeter.o bufaux.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
 
 ssh-add$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-add.o
-	$(LD) -o $@ ssh-add.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
+	$(LD) -o $@ ssh-add.o $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(LIBS)
 
 ssh-agent$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-agent.o ssh-pkcs11-client.o
-	$(LD) -o $@ ssh-agent.o ssh-pkcs11-client.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
+	$(LD) -o $@ ssh-agent.o $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(LIBS)
 
 ssh-keygen$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-keygen.o
-	$(LD) -o $@ ssh-keygen.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
+	$(LD) -o $@ ssh-keygen.o $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(LIBS)
 
 ssh-keysign$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-keysign.o roaming_dummy.o readconf.o
-	$(LD) -o $@ ssh-keysign.o readconf.o roaming_dummy.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
+	$(LD) -o $@ ssh-keysign.o readconf.o roaming_dummy.o $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(LIBS)
 
 ssh-pkcs11-helper$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-pkcs11-helper.o ssh-pkcs11.o
 	$(LD) -o $@ ssh-pkcs11-helper.o ssh-pkcs11.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
 
 ssh-keyscan$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-keyscan.o roaming_dummy.o
-	$(LD) -o $@ ssh-keyscan.o roaming_dummy.o $(LDFLAGS) -lssh -lopenbsd-compat -lssh $(LIBS)
+	$(LD) -o $@ ssh-keyscan.o roaming_dummy.o $(LDFLAGS) -lssh -lopenbsd-compat -lssh -lfipscheck $(LIBS)
 
 sftp-server$(EXEEXT): $(LIBCOMPAT) libssh.a sftp.o sftp-common.o sftp-server.o sftp-server-main.o
 	$(LD) -o $@ sftp-server.o sftp-common.o sftp-server-main.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
diff -up openssh-5.4p1/myproposal.h.fips openssh-5.4p1/myproposal.h
--- openssh-5.4p1/myproposal.h.fips	2010-02-26 21:55:05.000000000 +0100
+++ openssh-5.4p1/myproposal.h	2010-03-01 17:55:28.000000000 +0100
@@ -55,7 +55,12 @@
 	"hmac-sha1-96,hmac-md5-96"
 #define	KEX_DEFAULT_COMP	"none,zlib at openssh.com,zlib"
 #define	KEX_DEFAULT_LANG	""
-
+#define	KEX_FIPS_ENCRYPT \
+	"aes128-ctr,aes192-ctr,aes256-ctr," \
+	"aes128-cbc,3des-cbc," \
+	"aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se"
+#define	KEX_FIPS_MAC \
+	"hmac-sha1"
 
 static char *myproposal[PROPOSAL_MAX] = {
 	KEX_DEFAULT_KEX,
diff -up openssh-5.4p1/openbsd-compat/bsd-arc4random.c.fips openssh-5.4p1/openbsd-compat/bsd-arc4random.c
--- openssh-5.4p1/openbsd-compat/bsd-arc4random.c.fips	2008-06-04 02:54:00.000000000 +0200
+++ openssh-5.4p1/openbsd-compat/bsd-arc4random.c	2010-03-01 17:55:28.000000000 +0100
@@ -39,6 +39,7 @@
 static int rc4_ready = 0;
 static RC4_KEY rc4;
 
+#if 0
 unsigned int
 arc4random(void)
 {
@@ -82,6 +83,32 @@ arc4random_stir(void)
 
 	rc4_ready = REKEY_BYTES;
 }
+#else
+unsigned int
+arc4random(void)
+{
+	unsigned int r = 0;
+	void *rp = &r;
+
+	if (!rc4_ready) {
+		arc4random_stir();
+	}
+	RAND_bytes(rp, sizeof(r));
+
+	return(r);
+}
+
+void
+arc4random_stir(void)
+{
+	unsigned char rand_buf[SEED_SIZE];
+
+	if (RAND_bytes(rand_buf, sizeof(rand_buf)) <= 0)
+		fatal("Couldn't obtain random bytes (error %ld)",
+		    ERR_get_error());
+	rc4_ready = 1;
+}
+#endif
 #endif /* !HAVE_ARC4RANDOM */
 
 #ifndef ARC4RANDOM_BUF
diff -up openssh-5.4p1/ssh-add.c.fips openssh-5.4p1/ssh-add.c
--- openssh-5.4p1/ssh-add.c.fips	2010-02-26 21:55:06.000000000 +0100
+++ openssh-5.4p1/ssh-add.c	2010-03-01 17:55:28.000000000 +0100
@@ -42,6 +42,7 @@
 #include <sys/param.h>
 
 #include <openssl/evp.h>
+#include <openssl/fips.h>
 #include "openbsd-compat/openssl-compat.h"
 
 #include <fcntl.h>
@@ -270,7 +271,7 @@ list_identities(AuthenticationConnection
 		    key = ssh_get_next_identity(ac, &comment, version)) {
 			had_identities = 1;
 			if (do_fp) {
-				fp = key_fingerprint(key, SSH_FP_MD5,
+				fp = key_fingerprint(key, FIPS_mode() ? SSH_FP_SHA1 : SSH_FP_MD5,
 				    SSH_FP_HEX);
 				printf("%d %s %s (%s)\n",
 				    key_size(key), fp, comment, key_type(key));
diff -up openssh-5.4p1/ssh-agent.c.fips openssh-5.4p1/ssh-agent.c
--- openssh-5.4p1/ssh-agent.c.fips	2010-02-26 21:55:06.000000000 +0100
+++ openssh-5.4p1/ssh-agent.c	2010-03-01 17:55:28.000000000 +0100
@@ -51,6 +51,7 @@
 
 #include <openssl/evp.h>
 #include <openssl/md5.h>
+#include <openssl/fips.h>
 #include "openbsd-compat/openssl-compat.h"
 
 #include <errno.h>
@@ -199,9 +200,9 @@ confirm_key(Identity *id)
 	char *p;
 	int ret = -1;
 
-	p = key_fingerprint(id->key, SSH_FP_MD5, SSH_FP_HEX);
-	if (ask_permission("Allow use of key %s?\nKey fingerprint %s.",
-	    id->comment, p))
+	p = key_fingerprint(id->key, FIPS_mode() ? SSH_FP_SHA1 : SSH_FP_MD5, SSH_FP_HEX);
+	if (ask_permission("Allow use of key %s?\nKey %sfingerprint %s.",
+	    id->comment, FIPS_mode() ? "SHA1 " : "", p))
 		ret = 0;
 	xfree(p);
 
diff -up openssh-5.4p1/ssh.c.fips openssh-5.4p1/ssh.c
--- openssh-5.4p1/ssh.c.fips	2010-02-26 21:55:06.000000000 +0100
+++ openssh-5.4p1/ssh.c	2010-03-01 17:55:28.000000000 +0100
@@ -72,6 +72,8 @@
 
 #include <openssl/evp.h>
 #include <openssl/err.h>
+#include <openssl/fips.h>
+#include <fipscheck.h>
 #include "openbsd-compat/openssl-compat.h"
 #include "openbsd-compat/sys-queue.h"
 
@@ -225,6 +227,10 @@ main(int ac, char **av)
 	sanitise_stdfd();
 
 	__progname = ssh_get_progname(av[0]);
+        SSLeay_add_all_algorithms();
+        if (FIPS_mode() && !FIPSCHECK_verify(NULL, NULL)) {
+                fatal("FIPS integrity verification test failed.");
+        }
 	init_rng();
 
 	/*
@@ -285,6 +291,9 @@ main(int ac, char **av)
 	    "ACD:F:I:KL:MNO:PR:S:TVw:W:XYy")) != -1) {
 		switch (opt) {
 		case '1':
+			if (FIPS_mode()) {
+				fatal("Protocol 1 not allowed in the FIPS mode.");
+			}
 			options.protocol = SSH_PROTO_1;
 			break;
 		case '2':
@@ -581,7 +590,6 @@ main(int ac, char **av)
 	if (!host)
 		usage();
 
-	SSLeay_add_all_algorithms();
 	ERR_load_crypto_strings();
 
 	/* Initialize the command to execute on remote host. */
@@ -667,6 +675,10 @@ main(int ac, char **av)
 
 	seed_rng();
 
+	if (FIPS_mode()) {
+		logit("FIPS mode initialized");
+	}
+
 	if (options.user == NULL)
 		options.user = xstrdup(pw->pw_name);
 
@@ -733,6 +745,12 @@ main(int ac, char **av)
 
 	timeout_ms = options.connection_timeout * 1000;
 
+	if (FIPS_mode()) {
+		options.protocol &= SSH_PROTO_2;
+		if (options.protocol == 0)
+			fatal("Protocol 2 disabled by configuration but required in the FIPS mode.");
+	}
+
 	/* Open a connection to the remote host. */
 	if (ssh_connect(host, &hostaddr, options.port,
 	    options.address_family, options.connection_attempts, &timeout_ms,
diff -up openssh-5.4p1/sshconnect2.c.fips openssh-5.4p1/sshconnect2.c
--- openssh-5.4p1/sshconnect2.c.fips	2010-03-01 17:55:28.000000000 +0100
+++ openssh-5.4p1/sshconnect2.c	2010-03-01 17:55:29.000000000 +0100
@@ -44,6 +44,8 @@
 #include <vis.h>
 #endif
 
+#include <openssl/fips.h>
+
 #include "openbsd-compat/sys-queue.h"
 
 #include "xmalloc.h"
@@ -116,6 +118,10 @@ ssh_kex2(char *host, struct sockaddr *ho
 	if (options.ciphers != NULL) {
 		myproposal[PROPOSAL_ENC_ALGS_CTOS] =
 		myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers;
+	} else if (FIPS_mode()) {
+		myproposal[PROPOSAL_ENC_ALGS_CTOS] =
+		myproposal[PROPOSAL_ENC_ALGS_STOC] = KEX_FIPS_ENCRYPT;
+
 	}
 	myproposal[PROPOSAL_ENC_ALGS_CTOS] =
 	    compat_cipher_proposal(myproposal[PROPOSAL_ENC_ALGS_CTOS]);
@@ -131,7 +137,11 @@ ssh_kex2(char *host, struct sockaddr *ho
 	if (options.macs != NULL) {
 		myproposal[PROPOSAL_MAC_ALGS_CTOS] =
 		myproposal[PROPOSAL_MAC_ALGS_STOC] = options.macs;
+	} else if (FIPS_mode()) {
+		myproposal[PROPOSAL_MAC_ALGS_CTOS] =
+		myproposal[PROPOSAL_MAC_ALGS_STOC] = KEX_FIPS_MAC;
 	}
+
 	if (options.hostkeyalgorithms != NULL)
 		myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] =
 		    options.hostkeyalgorithms;
@@ -529,8 +539,8 @@ input_userauth_pk_ok(int type, u_int32_t
 		    key->type, pktype);
 		goto done;
 	}
-	fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX);
-	debug2("input_userauth_pk_ok: fp %s", fp);
+	fp = key_fingerprint(key, SSH_FP_SHA1, SSH_FP_HEX);
+	debug2("input_userauth_pk_ok: SHA1 fp %s", fp);
 	xfree(fp);
 
 	/*
diff -up openssh-5.4p1/sshconnect.c.fips openssh-5.4p1/sshconnect.c
--- openssh-5.4p1/sshconnect.c.fips	2010-02-26 21:55:06.000000000 +0100
+++ openssh-5.4p1/sshconnect.c	2010-03-01 17:55:29.000000000 +0100
@@ -40,6 +40,8 @@
 #include <string.h>
 #include <unistd.h>
 
+#include <openssl/fips.h>
+
 #include "xmalloc.h"
 #include "key.h"
 #include "hostfile.h"
@@ -789,6 +791,7 @@ check_host_key(char *hostname, struct so
 			goto fail;
 		} else if (options.strict_host_key_checking == 2) {
 			char msg1[1024], msg2[1024];
+			int fips_on = FIPS_mode();
 
 			if (show_other_keys(host, host_key))
 				snprintf(msg1, sizeof(msg1),
@@ -797,8 +800,8 @@ check_host_key(char *hostname, struct so
 			else
 				snprintf(msg1, sizeof(msg1), ".");
 			/* The default */
-			fp = key_fingerprint(host_key, SSH_FP_MD5, SSH_FP_HEX);
-			ra = key_fingerprint(host_key, SSH_FP_MD5,
+			fp = key_fingerprint(host_key, fips_on ? SSH_FP_SHA1 : SSH_FP_MD5, SSH_FP_HEX);
+			ra = key_fingerprint(host_key, fips_on ? SSH_FP_SHA1 : SSH_FP_MD5,
 			    SSH_FP_RANDOMART);
 			msg2[0] = '\0';
 			if (options.verify_host_key_dns) {
@@ -814,10 +817,10 @@ check_host_key(char *hostname, struct so
 			snprintf(msg, sizeof(msg),
 			    "The authenticity of host '%.200s (%s)' can't be "
 			    "established%s\n"
-			    "%s key fingerprint is %s.%s%s\n%s"
+			    "%s key %sfingerprint is %s.%s%s\n%s"
 			    "Are you sure you want to continue connecting "
 			    "(yes/no)? ",
-			    host, ip, msg1, type, fp,
+			    host, ip, msg1, type, fips_on ? "SHA1 " : "", fp,
 			    options.visual_host_key ? "\n" : "",
 			    options.visual_host_key ? ra : "",
 			    msg2);
@@ -1131,17 +1134,18 @@ show_key_from_file(const char *file, con
 	Key *found;
 	char *fp, *ra;
 	int line, ret;
+	int fips_on = FIPS_mode();
 
 	found = key_new(keytype);
 	if ((ret = lookup_key_in_hostfile_by_type(file, host,
 	    keytype, found, &line))) {
-		fp = key_fingerprint(found, SSH_FP_MD5, SSH_FP_HEX);
-		ra = key_fingerprint(found, SSH_FP_MD5, SSH_FP_RANDOMART);
+		fp = key_fingerprint(found, fips_on ? SSH_FP_SHA1 : SSH_FP_MD5, SSH_FP_HEX);
+		ra = key_fingerprint(found, fips_on ? SSH_FP_SHA1 : SSH_FP_MD5, SSH_FP_RANDOMART);
 		logit("WARNING: %s key found for host %s\n"
 		    "in %s:%d\n"
-		    "%s key fingerprint %s.\n%s\n",
+		    "%s key %sfingerprint %s.\n%s\n",
 		    key_type(found), host, file, line,
-		    key_type(found), fp, ra);
+		    key_type(found), fips_on ? "SHA1 ":"", fp, ra);
 		xfree(ra);
 		xfree(fp);
 	}
@@ -1187,8 +1191,9 @@ warn_changed_key(Key *host_key)
 {
 	char *fp;
 	const char *type = key_type(host_key);
+	int fips_on = FIPS_mode();
 
-	fp = key_fingerprint(host_key, SSH_FP_MD5, SSH_FP_HEX);
+	fp = key_fingerprint(host_key, fips_on ? SSH_FP_SHA1 : SSH_FP_MD5, SSH_FP_HEX);
 
 	error("@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@");
 	error("@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @");
@@ -1196,8 +1201,8 @@ warn_changed_key(Key *host_key)
 	error("IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!");
 	error("Someone could be eavesdropping on you right now (man-in-the-middle attack)!");
 	error("It is also possible that the %s host key has just been changed.", type);
-	error("The fingerprint for the %s key sent by the remote host is\n%s.",
-	    type, fp);
+	error("The %sfingerprint for the %s key sent by the remote host is\n%s.",
+	    fips_on ? "SHA1 ":"", type, fp);
 	error("Please contact your system administrator.");
 
 	xfree(fp);
diff -up openssh-5.4p1/sshd.c.fips openssh-5.4p1/sshd.c
--- openssh-5.4p1/sshd.c.fips	2010-03-01 17:55:27.000000000 +0100
+++ openssh-5.4p1/sshd.c	2010-03-01 17:55:29.000000000 +0100
@@ -76,6 +76,8 @@
 #include <openssl/bn.h>
 #include <openssl/md5.h>
 #include <openssl/rand.h>
+#include <openssl/fips.h>
+#include <fipscheck.h>
 #include "openbsd-compat/openssl-compat.h"
 
 #ifdef HAVE_SECUREWARE
@@ -1298,6 +1300,12 @@ main(int ac, char **av)
 	(void)set_auth_parameters(ac, av);
 #endif
 	__progname = ssh_get_progname(av[0]);
+
+        SSLeay_add_all_algorithms();
+        if (FIPS_mode() && !FIPSCHECK_verify(NULL, NULL)) {
+                fatal("FIPS integrity verification test failed.");
+        }
+
 	init_rng();
 
 	/* Save argv. Duplicate so setproctitle emulation doesn't clobber it */
@@ -1459,8 +1467,6 @@ main(int ac, char **av)
 	else
 		closefrom(REEXEC_DEVCRYPTO_RESERVED_FD);
 
-	SSLeay_add_all_algorithms();
-
 	/*
 	 * Force logging to stderr until we have loaded the private host
 	 * key (unless started from inetd)
@@ -1578,6 +1584,10 @@ main(int ac, char **av)
 		debug("private host key: #%d type %d %s", i, key->type,
 		    key_type(key));
 	}
+	if ((options.protocol & SSH_PROTO_1) && FIPS_mode()) {
+		logit("Disabling protocol version 1. Not allowed in the FIPS mode.");
+		options.protocol &= ~SSH_PROTO_1;
+	}
 	if ((options.protocol & SSH_PROTO_1) && !sensitive_data.have_ssh1_key) {
 		logit("Disabling protocol version 1. Could not load host key");
 		options.protocol &= ~SSH_PROTO_1;
@@ -1742,6 +1752,10 @@ main(int ac, char **av)
 	/* Initialize the random number generator. */
 	arc4random_stir();
 
+	if (FIPS_mode()) {
+		logit("FIPS mode initialized");
+	}
+
 	/* Chdir to the root directory so that the current disk can be
 	   unmounted if desired. */
 	chdir("/");
@@ -2274,6 +2288,9 @@ do_ssh2_kex(void)
 	if (options.ciphers != NULL) {
 		myproposal[PROPOSAL_ENC_ALGS_CTOS] =
 		myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers;
+	} else if (FIPS_mode()) {
+		myproposal[PROPOSAL_ENC_ALGS_CTOS] =
+		myproposal[PROPOSAL_ENC_ALGS_STOC] = KEX_FIPS_ENCRYPT;
 	}
 	myproposal[PROPOSAL_ENC_ALGS_CTOS] =
 	    compat_cipher_proposal(myproposal[PROPOSAL_ENC_ALGS_CTOS]);
@@ -2283,6 +2300,9 @@ do_ssh2_kex(void)
 	if (options.macs != NULL) {
 		myproposal[PROPOSAL_MAC_ALGS_CTOS] =
 		myproposal[PROPOSAL_MAC_ALGS_STOC] = options.macs;
+	} else if (FIPS_mode()) {
+		myproposal[PROPOSAL_MAC_ALGS_CTOS] =
+		myproposal[PROPOSAL_MAC_ALGS_STOC] = KEX_FIPS_MAC;
 	}
 	if (options.compression == COMP_NONE) {
 		myproposal[PROPOSAL_COMP_ALGS_CTOS] =
diff -up openssh-5.4p1/ssh-keygen.c.fips openssh-5.4p1/ssh-keygen.c
--- openssh-5.4p1/ssh-keygen.c.fips	2010-02-26 21:55:06.000000000 +0100
+++ openssh-5.4p1/ssh-keygen.c	2010-03-01 17:55:29.000000000 +0100
@@ -21,6 +21,7 @@
 
 #include <openssl/evp.h>
 #include <openssl/pem.h>
+#include <openssl/fips.h>
 #include "openbsd-compat/openssl-compat.h"
 
 #include <errno.h>
@@ -524,7 +525,7 @@ do_fingerprint(struct passwd *pw)
 	enum fp_type fptype;
 	struct stat st;
 
-	fptype = print_bubblebabble ? SSH_FP_SHA1 : SSH_FP_MD5;
+	fptype = print_bubblebabble ? SSH_FP_SHA1 : FIPS_mode() ? SSH_FP_SHA1 : SSH_FP_MD5;
 	rep =    print_bubblebabble ? SSH_FP_BUBBLEBABBLE : SSH_FP_HEX;
 
 	if (!have_identity)
@@ -1808,14 +1809,15 @@ passphrase_again:
 	fclose(f);
 
 	if (!quiet) {
-		char *fp = key_fingerprint(public, SSH_FP_MD5, SSH_FP_HEX);
-		char *ra = key_fingerprint(public, SSH_FP_MD5,
+		int fips_on = FIPS_mode();
+		char *fp = key_fingerprint(public, fips_on ? SSH_FP_SHA1 : SSH_FP_MD5, SSH_FP_HEX);
+		char *ra = key_fingerprint(public, fips_on ? SSH_FP_SHA1 : SSH_FP_MD5,
 		    SSH_FP_RANDOMART);
 		printf("Your public key has been saved in %s.\n",
 		    identity_file);
-		printf("The key fingerprint is:\n");
+		printf("The key %sfingerprint is:\n", fips_on ? "SHA1 " : "");
 		printf("%s %s\n", fp, comment);
-		printf("The key's randomart image is:\n");
+		printf("The key's %srandomart image is:\n", fips_on ? "SHA1 " :"");
 		printf("%s\n", ra);
 		xfree(ra);
 		xfree(fp);

openssh-5.4p1-gsskex.patch:
 ChangeLog.gssapi |   95 +++++++++++++++
 Makefile.in      |    6 
 auth-krb5.c      |   17 ++
 auth.h           |    1 
 auth2-gss.c      |   50 +++++++-
 auth2.c          |    6 
 clientloop.c     |   11 +
 configure.ac     |   24 +++
 gss-genr.c       |  274 ++++++++++++++++++++++++++++++++++++++++++++-
 gss-serv-krb5.c  |   84 ++++++++++++-
 gss-serv.c       |  220 +++++++++++++++++++++++++++++++-----
 kex.c            |   18 ++
 kex.h            |   14 ++
 kexgssc.c        |  334 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
 kexgsss.c        |  288 +++++++++++++++++++++++++++++++++++++++++++++++
 key.c            |    2 
 key.h            |    1 
 monitor.c        |  108 +++++++++++++++++
 monitor.h        |    2 
 monitor_wrap.c   |   47 +++++++
 monitor_wrap.h   |    4 
 readconf.c       |   35 +++++
 readconf.h       |    4 
 servconf.c       |   31 ++++-
 servconf.h       |    3 
 ssh-gss.h        |   39 +++++-
 ssh_config       |    2 
 ssh_config.5     |   29 ++++
 sshconnect2.c    |  119 ++++++++++++++++++-
 sshd.c           |  110 ++++++++++++++++++
 sshd_config      |    2 
 sshd_config.5    |   28 ++++
 32 files changed, 1949 insertions(+), 59 deletions(-)

--- NEW FILE openssh-5.4p1-gsskex.patch ---
diff -up openssh-5.4p1/auth2.c.gsskex openssh-5.4p1/auth2.c
--- openssh-5.4p1/auth2.c.gsskex	2010-03-01 18:14:24.000000000 +0100
+++ openssh-5.4p1/auth2.c	2010-03-01 18:14:28.000000000 +0100
@@ -69,6 +69,7 @@ extern Authmethod method_passwd;
 extern Authmethod method_kbdint;
 extern Authmethod method_hostbased;
 #ifdef GSSAPI
+extern Authmethod method_gsskeyex;
 extern Authmethod method_gssapi;
 #endif
 #ifdef JPAKE
@@ -79,6 +80,7 @@ Authmethod *authmethods[] = {
 	&method_none,
 	&method_pubkey,
 #ifdef GSSAPI
+	&method_gsskeyex,
 	&method_gssapi,
 #endif
 #ifdef JPAKE
@@ -289,6 +291,7 @@ input_userauth_request(int type, u_int32
 #endif
 
 	authctxt->postponed = 0;
+	authctxt->server_caused_failure = 0;
 
 	/* try to authenticate user */
 	m = authmethod_lookup(method);
@@ -361,7 +364,8 @@ userauth_finish(Authctxt *authctxt, int 
 	} else {
 
 		/* Allow initial try of "none" auth without failure penalty */
-		if (authctxt->attempt > 1 || strcmp(method, "none") != 0)
+		if (!authctxt->server_caused_failure &&
+		    (authctxt->attempt > 1 || strcmp(method, "none") != 0))
 			authctxt->failures++;
 		if (authctxt->failures >= options.max_authtries) {
 #ifdef SSH_AUDIT_EVENTS
diff -up openssh-5.4p1/auth2-gss.c.gsskex openssh-5.4p1/auth2-gss.c
--- openssh-5.4p1/auth2-gss.c.gsskex	2010-03-01 18:14:24.000000000 +0100
+++ openssh-5.4p1/auth2-gss.c	2010-03-01 18:14:28.000000000 +0100
@@ -1,7 +1,7 @@
 /* $OpenBSD: auth2-gss.c,v 1.16 2007/10/29 00:52:45 dtucker Exp $ */
 
 /*
- * Copyright (c) 2001-2003 Simon Wilkinson. All rights reserved.
+ * Copyright (c) 2001-2007 Simon Wilkinson. All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
  * modification, are permitted provided that the following conditions
@@ -52,6 +52,40 @@ static void input_gssapi_mic(int type, u
 static void input_gssapi_exchange_complete(int type, u_int32_t plen, void *ctxt);
 static void input_gssapi_errtok(int, u_int32_t, void *);
 
+/* 
+ * The 'gssapi_keyex' userauth mechanism.
+ */
+static int
+userauth_gsskeyex(Authctxt *authctxt)
+{
+	int authenticated = 0;
+	Buffer b;
+	gss_buffer_desc mic, gssbuf;
+	u_int len;
+
+	mic.value = packet_get_string(&len);
+	mic.length = len;
+
+	packet_check_eom();
+
+	ssh_gssapi_buildmic(&b, authctxt->user, authctxt->service,
+	    "gssapi-keyex");
+
+	gssbuf.value = buffer_ptr(&b);
+	gssbuf.length = buffer_len(&b);
+
+	/* gss_kex_context is NULL with privsep, so we can't check it here */
+	if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gss_kex_context, 
+	    &gssbuf, &mic))))
+		authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user,
+		    authctxt->pw));
+	
+	buffer_free(&b);
+	xfree(mic.value);
+
+	return (authenticated);
+}
+
 /*
  * We only support those mechanisms that we know about (ie ones that we know
  * how to check local user kuserok and the like)
@@ -102,6 +136,7 @@ userauth_gssapi(Authctxt *authctxt)
 
 	if (!present) {
 		xfree(doid);
+		authctxt->server_caused_failure = 1;
 		return (0);
 	}
 
@@ -109,6 +144,7 @@ userauth_gssapi(Authctxt *authctxt)
 		if (ctxt != NULL)
 			ssh_gssapi_delete_ctx(&ctxt);
 		xfree(doid);
+		authctxt->server_caused_failure = 1;
 		return (0);
 	}
 
@@ -242,7 +278,8 @@ input_gssapi_exchange_complete(int type,
 
 	packet_check_eom();
 
-	authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
+	authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user,
+	    authctxt->pw));
 
 	authctxt->postponed = 0;
 	dispatch_set(SSH2_MSG_USERAUTH_GSSAPI_TOKEN, NULL);
@@ -284,7 +321,8 @@ input_gssapi_mic(int type, u_int32_t ple
 	gssbuf.length = buffer_len(&b);
 
 	if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic))))
-		authenticated = PRIVSEP(ssh_gssapi_userok(authctxt->user));
+		authenticated = 
+		    PRIVSEP(ssh_gssapi_userok(authctxt->user, authctxt->pw));
 	else
 		logit("GSSAPI MIC check failed");
 
@@ -301,6 +339,12 @@ input_gssapi_mic(int type, u_int32_t ple
 	userauth_finish(authctxt, authenticated, "gssapi-with-mic");
 }
 
+Authmethod method_gsskeyex = {
+	"gssapi-keyex",
+	userauth_gsskeyex,
+	&options.gss_authentication
+};
+
 Authmethod method_gssapi = {
 	"gssapi-with-mic",
 	userauth_gssapi,
diff -up openssh-5.4p1/auth.h.gsskex openssh-5.4p1/auth.h
--- openssh-5.4p1/auth.h.gsskex	2010-03-01 18:14:25.000000000 +0100
+++ openssh-5.4p1/auth.h	2010-03-01 18:14:28.000000000 +0100
@@ -53,6 +53,7 @@ struct Authctxt {
 	int		 valid;		/* user exists and is allowed to login */
 	int		 attempt;
 	int		 failures;
+	int		 server_caused_failure; 
 	int		 force_pwchange;
 	char		*user;		/* username sent by the client */
 	char		*service;
diff -up openssh-5.4p1/auth-krb5.c.gsskex openssh-5.4p1/auth-krb5.c
--- openssh-5.4p1/auth-krb5.c.gsskex	2009-12-21 00:49:22.000000000 +0100
+++ openssh-5.4p1/auth-krb5.c	2010-03-01 18:14:28.000000000 +0100
@@ -170,8 +170,13 @@ auth_krb5_password(Authctxt *authctxt, c
 
 	len = strlen(authctxt->krb5_ticket_file) + 6;
 	authctxt->krb5_ccname = xmalloc(len);
+#ifdef USE_CCAPI
+	snprintf(authctxt->krb5_ccname, len, "API:%s",
+	    authctxt->krb5_ticket_file);
+#else
 	snprintf(authctxt->krb5_ccname, len, "FILE:%s",
 	    authctxt->krb5_ticket_file);
+#endif
 
 #ifdef USE_PAM
 	if (options.use_pam)
@@ -226,15 +231,22 @@ krb5_cleanup_proc(Authctxt *authctxt)
 #ifndef HEIMDAL
 krb5_error_code
 ssh_krb5_cc_gen(krb5_context ctx, krb5_ccache *ccache) {
-	int tmpfd, ret;
+	int ret;
 	char ccname[40];
 	mode_t old_umask;
+#ifdef USE_CCAPI
+	char cctemplate[] = "API:krb5cc_%d";
+#else
+	char cctemplate[] = "FILE:/tmp/krb5cc_%d_XXXXXXXXXX";
+	int tmpfd;
+#endif
 
 	ret = snprintf(ccname, sizeof(ccname),
-	    "FILE:/tmp/krb5cc_%d_XXXXXXXXXX", geteuid());
+	    cctemplate, geteuid());
 	if (ret < 0 || (size_t)ret >= sizeof(ccname))
 		return ENOMEM;
 
+#ifndef USE_CCAPI
 	old_umask = umask(0177);
 	tmpfd = mkstemp(ccname + strlen("FILE:"));
 	umask(old_umask);
@@ -249,6 +261,7 @@ ssh_krb5_cc_gen(krb5_context ctx, krb5_c
 		return errno;
 	}
 	close(tmpfd);
+#endif
 
 	return (krb5_cc_resolve(ctx, ccname, ccache));
[...2534 lines suppressed...]
+
+	if (options.gss_keyex)
+		gss = ssh_gssapi_server_mechanisms();
+	else
+		gss = NULL;
+
+	if (gss && orig)
+		xasprintf(&newstr, "%s,%s", gss, orig);
+	else if (gss)
+		newstr = gss;
+	else if (orig)
+		newstr = orig;
+
+	/* 
+	 * If we've got GSSAPI mechanisms, then we've got the 'null' host
+	 * key alg, but we can't tell people about it unless its the only
+  	 * host key algorithm we support
+	 */
+	if (gss && (strlen(myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS])) == 0)
+		myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = "null";
+
+	if (newstr)
+		myproposal[PROPOSAL_KEX_ALGS] = newstr;
+	else
+		fatal("No supported key exchange algorithms");
+	}
+#endif
+
 	/* start key exchange */
 	kex = kex_setup(myproposal);
 	kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server;
 	kex->kex[KEX_DH_GRP14_SHA1] = kexdh_server;
 	kex->kex[KEX_DH_GEX_SHA1] = kexgex_server;
 	kex->kex[KEX_DH_GEX_SHA256] = kexgex_server;
+#ifdef GSSAPI
+	if (options.gss_keyex) {
+		kex->kex[KEX_GSS_GRP1_SHA1] = kexgss_server;
+		kex->kex[KEX_GSS_GRP14_SHA1] = kexgss_server;
+		kex->kex[KEX_GSS_GEX_SHA1] = kexgss_server;
+	}
+#endif
 	kex->server = 1;
 	kex->client_version_string=client_version_string;
 	kex->server_version_string=server_version_string;
diff -up openssh-5.4p1/sshd_config.5.gsskex openssh-5.4p1/sshd_config.5
--- openssh-5.4p1/sshd_config.5.gsskex	2010-03-01 18:14:28.000000000 +0100
+++ openssh-5.4p1/sshd_config.5	2010-03-01 18:14:29.000000000 +0100
@@ -379,12 +379,40 @@ Specifies whether user authentication ba
 The default is
 .Dq no .
 Note that this option applies to protocol version 2 only.
+.It Cm GSSAPIKeyExchange
+Specifies whether key exchange based on GSSAPI is allowed. GSSAPI key exchange
+doesn't rely on ssh keys to verify host identity.
+The default is
+.Dq no .
+Note that this option applies to protocol version 2 only.
 .It Cm GSSAPICleanupCredentials
 Specifies whether to automatically destroy the user's credentials cache
 on logout.
 The default is
 .Dq yes .
 Note that this option applies to protocol version 2 only.
+.It Cm GSSAPIStrictAcceptorCheck
+Determines whether to be strict about the identity of the GSSAPI acceptor 
+a client authenticates against. If
+.Dq yes
+then the client must authenticate against the
+.Pa host
+service on the current hostname. If 
+.Dq no
+then the client may authenticate against any service key stored in the 
+machine's default store. This facility is provided to assist with operation 
+on multi homed machines. 
+The default is
+.Dq yes .
+Note that this option applies only to protocol version 2 GSSAPI connections,
+and setting it to 
+.Dq no
+may only work with recent Kerberos GSSAPI libraries.
+.It Cm GSSAPIStoreCredentialsOnRekey
+Controls whether the user's GSSAPI credentials should be updated following a 
+successful connection rekeying. This option can be used to accepted renewed 
+or updated credentials from a compatible client. The default is
+.Dq no .
 .It Cm HostbasedAuthentication
 Specifies whether rhosts or /etc/hosts.equiv authentication together
 with successful public key client host authentication is allowed
diff -up openssh-5.4p1/sshd_config.gsskex openssh-5.4p1/sshd_config
--- openssh-5.4p1/sshd_config.gsskex	2010-03-01 18:14:28.000000000 +0100
+++ openssh-5.4p1/sshd_config	2010-03-01 18:14:29.000000000 +0100
@@ -78,6 +78,8 @@ ChallengeResponseAuthentication no
 GSSAPIAuthentication yes
 #GSSAPICleanupCredentials yes
 GSSAPICleanupCredentials yes
+#GSSAPIStrictAcceptorCheck yes
+#GSSAPIKeyExchange no
 
 # Set this to 'yes' to enable PAM authentication, account processing, 
 # and session processing. If this is enabled, PAM authentication will 
diff -up openssh-5.4p1/ssh-gss.h.gsskex openssh-5.4p1/ssh-gss.h
--- openssh-5.4p1/ssh-gss.h.gsskex	2007-06-12 15:40:39.000000000 +0200
+++ openssh-5.4p1/ssh-gss.h	2010-03-01 18:14:30.000000000 +0100
@@ -1,6 +1,6 @@
 /* $OpenBSD: ssh-gss.h,v 1.10 2007/06/12 08:20:00 djm Exp $ */
 /*
- * Copyright (c) 2001-2003 Simon Wilkinson. All rights reserved.
+ * Copyright (c) 2001-2009 Simon Wilkinson. All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
  * modification, are permitted provided that the following conditions
@@ -60,10 +60,22 @@
 
 #define SSH_GSS_OIDTYPE 0x06
 
+#define SSH2_MSG_KEXGSS_INIT                            30
+#define SSH2_MSG_KEXGSS_CONTINUE                        31
+#define SSH2_MSG_KEXGSS_COMPLETE                        32
+#define SSH2_MSG_KEXGSS_HOSTKEY                         33
+#define SSH2_MSG_KEXGSS_ERROR                           34
+#define SSH2_MSG_KEXGSS_GROUPREQ			40
+#define SSH2_MSG_KEXGSS_GROUP				41
+#define KEX_GSS_GRP1_SHA1_ID				"gss-group1-sha1-"
+#define KEX_GSS_GRP14_SHA1_ID				"gss-group14-sha1-"
+#define KEX_GSS_GEX_SHA1_ID				"gss-gex-sha1-"
+
 typedef struct {
 	char *filename;
 	char *envvar;
 	char *envval;
+	struct passwd *owner;
 	void *data;
 } ssh_gssapi_ccache;
 
@@ -71,8 +83,11 @@ typedef struct {
 	gss_buffer_desc displayname;
 	gss_buffer_desc exportedname;
 	gss_cred_id_t creds;
+	gss_name_t name;
 	struct ssh_gssapi_mech_struct *mech;
 	ssh_gssapi_ccache store;
+	int used;
+	int updated;
 } ssh_gssapi_client;
 
 typedef struct ssh_gssapi_mech_struct {
@@ -83,6 +98,7 @@ typedef struct ssh_gssapi_mech_struct {
 	int (*userok) (ssh_gssapi_client *, char *);
 	int (*localname) (ssh_gssapi_client *, char **);
 	void (*storecreds) (ssh_gssapi_client *);
+	int (*updatecreds) (ssh_gssapi_ccache *, ssh_gssapi_client *);
 } ssh_gssapi_mech;
 
 typedef struct {
@@ -93,10 +109,11 @@ typedef struct {
 	gss_OID		oid; /* client */
 	gss_cred_id_t	creds; /* server */
 	gss_name_t	client; /* server */
-	gss_cred_id_t	client_creds; /* server */
+	gss_cred_id_t	client_creds; /* both */
 } Gssctxt;
 
 extern ssh_gssapi_mech *supported_mechs[];
+extern Gssctxt *gss_kex_context;
 
 int  ssh_gssapi_check_oid(Gssctxt *, void *, size_t);
 void ssh_gssapi_set_oid_data(Gssctxt *, void *, size_t);
@@ -116,16 +133,30 @@ void ssh_gssapi_build_ctx(Gssctxt **);
 void ssh_gssapi_delete_ctx(Gssctxt **);
 OM_uint32 ssh_gssapi_sign(Gssctxt *, gss_buffer_t, gss_buffer_t);
 void ssh_gssapi_buildmic(Buffer *, const char *, const char *, const char *);
-int ssh_gssapi_check_mechanism(Gssctxt **, gss_OID, const char *);
+int ssh_gssapi_check_mechanism(Gssctxt **, gss_OID, const char *, const char *);
+OM_uint32 ssh_gssapi_client_identity(Gssctxt *, const char *);
+int ssh_gssapi_credentials_updated(Gssctxt *);
 
 /* In the server */
+typedef int ssh_gssapi_check_fn(Gssctxt **, gss_OID, const char *, 
+    const char *);
+char *ssh_gssapi_client_mechanisms(const char *, const char *);
+char *ssh_gssapi_kex_mechs(gss_OID_set, ssh_gssapi_check_fn *, const char *,
+    const char *);
+gss_OID ssh_gssapi_id_kex(Gssctxt *, char *, int);
+int ssh_gssapi_server_check_mech(Gssctxt **,gss_OID, const char *, 
+    const char *);
 OM_uint32 ssh_gssapi_server_ctx(Gssctxt **, gss_OID);
-int ssh_gssapi_userok(char *name);
+int ssh_gssapi_userok(char *name, struct passwd *);
 OM_uint32 ssh_gssapi_checkmic(Gssctxt *, gss_buffer_t, gss_buffer_t);
 void ssh_gssapi_do_child(char ***, u_int *);
 void ssh_gssapi_cleanup_creds(void);
 void ssh_gssapi_storecreds(void);
 
+char *ssh_gssapi_server_mechanisms(void);
+int ssh_gssapi_oid_table_ok();
+
+int ssh_gssapi_update_creds(ssh_gssapi_ccache *store);
 #endif /* GSSAPI */
 
 #endif /* _SSH_GSS_H */

openssh-5.4p1-mls.patch:
 configure.ac                |    1 
 misc.c                      |   10 +
 openbsd-compat/port-linux.c |  298 ++++++++++++++++++++++++++++++++++++++------
 session.c                   |    4 
 sshd.c                      |    3 
 5 files changed, 273 insertions(+), 43 deletions(-)

--- NEW FILE openssh-5.4p1-mls.patch ---
diff -up openssh-5.4p1/configure.ac.mls openssh-5.4p1/configure.ac
--- openssh-5.4p1/configure.ac.mls	2010-03-01 15:24:27.000000000 +0100
+++ openssh-5.4p1/configure.ac	2010-03-01 15:24:28.000000000 +0100
@@ -3360,6 +3360,7 @@ AC_ARG_WITH(selinux,
 		SSHDLIBS="$SSHDLIBS $LIBSELINUX"
 		LIBS="$LIBS $LIBSELINUX"
 		AC_CHECK_FUNCS(getseuserbyname get_default_context_with_level)
+		AC_CHECK_FUNCS(setkeycreatecon)
 		LIBS="$save_LIBS"
 	fi ]
 )
diff -up openssh-5.4p1/misc.c.mls openssh-5.4p1/misc.c
--- openssh-5.4p1/misc.c.mls	2010-01-10 00:31:12.000000000 +0100
+++ openssh-5.4p1/misc.c	2010-03-01 15:24:28.000000000 +0100
@@ -423,6 +423,7 @@ char *
 colon(char *cp)
 {
 	int flag = 0;
+	int start = 1;
 
 	if (*cp == ':')		/* Leading colon is part of file name. */
 		return (0);
@@ -436,8 +437,13 @@ colon(char *cp)
 			return (cp+1);
 		if (*cp == ':' && !flag)
 			return (cp);
-		if (*cp == '/')
-			return (0);
+		if (start) {
+		/* Slash on beginning or after dots only denotes file name. */
+			if (*cp == '/')
+				return (0);
+			if (*cp != '.')
+				start = 0;
+		}
 	}
 	return (0);
 }
diff -up openssh-5.4p1/openbsd-compat/port-linux.c.mls openssh-5.4p1/openbsd-compat/port-linux.c
--- openssh-5.4p1/openbsd-compat/port-linux.c.mls	2010-03-01 15:24:27.000000000 +0100
+++ openssh-5.4p1/openbsd-compat/port-linux.c	2010-03-01 15:25:50.000000000 +0100
@@ -35,13 +35,24 @@
 #include "key.h"
 #include "hostfile.h"
 #include "auth.h"
+#include "xmalloc.h"
 
 #ifdef WITH_SELINUX
 #include <selinux/selinux.h>
 #include <selinux/flask.h>
+#include <selinux/context.h>
 #include <selinux/get_context_list.h>
+#include <selinux/get_default_type.h>
+#include <selinux/av_permissions.h>
+
+#ifdef HAVE_LINUX_AUDIT
+#include <libaudit.h>
+#include <unistd.h>
+#endif
 
 extern Authctxt *the_authctxt;
+extern int inetd_flag;
+extern int rexeced_flag;
 
 /* Wrapper around is_selinux_enabled() to log its return value once only */
 int
@@ -57,17 +68,173 @@ ssh_selinux_enabled(void)
 	return (enabled);
 }
 
+/* Send audit message */
+static int
+send_audit_message(int success, security_context_t default_context,
+		       security_context_t selected_context)
+{
+	int rc=0;
+#ifdef HAVE_LINUX_AUDIT
+	char *msg = NULL;
+	int audit_fd = audit_open();
+	security_context_t default_raw=NULL;
+	security_context_t selected_raw=NULL;
+	rc = -1;
+	if (audit_fd < 0) {
+		if (errno == EINVAL || errno == EPROTONOSUPPORT ||
+                                        errno == EAFNOSUPPORT)
+                        return 0; /* No audit support in kernel */
+		error("Error connecting to audit system.");
+		return rc;
+	}
+	if (selinux_trans_to_raw_context(default_context, &default_raw) < 0) {
+		error("Error translating default context.");
+		default_raw = NULL;
+	}
+	if (selinux_trans_to_raw_context(selected_context, &selected_raw) < 0) {
+		error("Error translating selected context.");
+		selected_raw = NULL;
+	}
+	if (asprintf(&msg, "sshd: default-context=%s selected-context=%s",
+		     default_raw ? default_raw : (default_context ? default_context: "?"),
+		     selected_context ? selected_raw : (selected_context ? selected_context :"?")) < 0) {
+		error("Error allocating memory.");
+		goto out;
+	}
+	if (audit_log_user_message(audit_fd, AUDIT_USER_ROLE_CHANGE,
+				   msg, NULL, NULL, NULL, success) <= 0) {
+		error("Error sending audit message.");
+		goto out;
+	}
+	rc = 0;
+      out:
+	free(msg);
+	freecon(default_raw);
+	freecon(selected_raw);
+	close(audit_fd);
+#endif
+	return rc;
+}
+
+static int
+mls_range_allowed(security_context_t src, security_context_t dst)
+{
+	struct av_decision avd;
+	int retval;
+	unsigned int bit = CONTEXT__CONTAINS;
+
+	debug("%s: src:%s dst:%s", __func__, src, dst);
+	retval = security_compute_av(src, dst, SECCLASS_CONTEXT, bit, &avd);
+	if (retval || ((bit & avd.allowed) != bit))
+		return 0;
+
+	return 1;
+}
+
+static int
+get_user_context(const char *sename, const char *role, const char *lvl,
+	security_context_t *sc) {
+#ifdef HAVE_GET_DEFAULT_CONTEXT_WITH_LEVEL
+	if (lvl == NULL || lvl[0] == '\0' || get_default_context_with_level(sename, lvl, NULL, sc) != 0) {
+	        /* User may have requested a level completely outside of his 
+	           allowed range. We get a context just for auditing as the
+	           range check below will certainly fail for default context. */
+#endif
+		if (get_default_context(sename, NULL, sc) != 0) {
+			*sc = NULL;
+			return -1;
+		}
+#ifdef HAVE_GET_DEFAULT_CONTEXT_WITH_LEVEL
+	}
+#endif
+	if (role != NULL && role[0]) {
+		context_t con;
+		char *type=NULL;
+		if (get_default_type(role, &type) != 0) {
+			error("get_default_type: failed to get default type for '%s'",
+				role);
+			goto out;
+		}
+		con = context_new(*sc);
+		if (!con) {
+			goto out;
+		}
+		context_role_set(con, role);
+		context_type_set(con, type);
+		freecon(*sc);
+		*sc = strdup(context_str(con));
+		context_free(con);
+		if (!*sc) 
+			return -1;
+	}
+#ifdef HAVE_GET_DEFAULT_CONTEXT_WITH_LEVEL
+	if (lvl != NULL && lvl[0]) {
+		/* verify that the requested range is obtained */
+		context_t con;
+		security_context_t obtained_raw;
+		security_context_t requested_raw;
+		con = context_new(*sc);
+		if (!con) {
+			goto out;
+		}
+		context_range_set(con, lvl);
+		if (selinux_trans_to_raw_context(*sc, &obtained_raw) < 0) {
+			context_free(con);
+			goto out;
+		}
+		if (selinux_trans_to_raw_context(context_str(con), &requested_raw) < 0) {
+			freecon(obtained_raw);
+			context_free(con);
+			goto out;
+		}
+
+		debug("get_user_context: obtained context '%s' requested context '%s'",
+			obtained_raw, requested_raw);
+		if (strcmp(obtained_raw, requested_raw)) {
+			/* set the context to the real requested one but fail */
+			freecon(requested_raw);
+			freecon(obtained_raw);
+			freecon(*sc);
+			*sc = strdup(context_str(con));
+			context_free(con);
+			return -1;
+		}
+		freecon(requested_raw);
+		freecon(obtained_raw);
+		context_free(con);
+	}
+#endif
+	return 0;
+      out:
+        freecon(*sc);
+        *sc = NULL;
+        return -1;
+}
+
 /* Return the default security context for the given username */
-static security_context_t
-ssh_selinux_getctxbyname(char *pwname)
+static int
+ssh_selinux_getctxbyname(char *pwname,
+	security_context_t *default_sc, security_context_t *user_sc)
 {
-	security_context_t sc = NULL;
 	char *sename, *lvl;
+	const char *reqlvl = NULL;
 	char *role = NULL;
-	int r = 0;
+	int r = -1;
+	context_t con = NULL;
+
+	*default_sc = NULL;
+	*user_sc = NULL;
+	if (the_authctxt) {
+		if (the_authctxt->role != NULL) {
+			char *slash;
+			role = xstrdup(the_authctxt->role);
+			if ((slash = strchr(role, '/')) != NULL) {
+				*slash = '\0';
+				reqlvl = slash + 1;
+			}
+		}
+	}
 
-	if (the_authctxt) 
-		role=the_authctxt->role;
 #ifdef HAVE_GETSEUSERBYNAME
 	if ((r=getseuserbyname(pwname, &sename, &lvl)) != 0) {
 		sename = NULL;
@@ -75,38 +242,63 @@ ssh_selinux_getctxbyname(char *pwname)
 	}
 #else
 	sename = pwname;
-	lvl = NULL;
+	lvl = "";
 #endif
 
 	if (r == 0) {
 #ifdef HAVE_GET_DEFAULT_CONTEXT_WITH_LEVEL
-		if (role != NULL && role[0])
-			r = get_default_context_with_rolelevel(sename, role, lvl, NULL, &sc);
-		else
-			r = get_default_context_with_level(sename, lvl, NULL, &sc);
+		r = get_default_context_with_level(sename, lvl, NULL, default_sc);
 #else
-		if (role != NULL && role[0])
-			r = get_default_context_with_role(sename, role, NULL, &sc);
-		else
-			r = get_default_context(sename, NULL, &sc);
+		r = get_default_context(sename, NULL, default_sc);
 #endif
 	}
 
-	if (r != 0) {
-		switch (security_getenforce()) {
-		case -1:
-			fatal("%s: ssh_selinux_getctxbyname: "
-			    "security_getenforce() failed", __func__);
-		case 0:
-			error("%s: Failed to get default SELinux security "
-			    "context for %s", __func__, pwname);
-			break;
-		default:
-			fatal("%s: Failed to get default SELinux security "
-			    "context for %s (in enforcing mode)",
-			    __func__, pwname);
+	if (r == 0) {
+		/* If launched from xinetd, we must use current level */
+		if (inetd_flag && !rexeced_flag) {
+			security_context_t sshdsc=NULL;
+
+			if (getcon_raw(&sshdsc) < 0)
+				fatal("failed to allocate security context");
+
+			if ((con=context_new(sshdsc)) == NULL)
+				fatal("failed to allocate selinux context");
+			reqlvl = context_range_get(con);
+			freecon(sshdsc);
+			if (reqlvl !=NULL && lvl != NULL && strcmp(reqlvl, lvl) == 0)
+			    /* we actually don't change level */
+			    reqlvl = "";
+
+			debug("%s: current connection level '%s'", __func__, reqlvl);
+		}
+		
+		if ((reqlvl != NULL && reqlvl[0]) || (role != NULL && role[0])) {
+			r = get_user_context(sename, role, reqlvl, user_sc);
+		
+			if (r == 0 && reqlvl != NULL && reqlvl[0]) {
+				security_context_t default_level_sc = *default_sc;
+				if (role != NULL && role[0]) {
+					if (get_user_context(sename, role, lvl, &default_level_sc) < 0)
+						default_level_sc = *default_sc;
+				}
+				/* verify that the requested range is contained in the user range */
+				if (mls_range_allowed(default_level_sc, *user_sc)) {
+					logit("permit MLS level %s (user range %s)", reqlvl, lvl);
+				} else {
+					r = -1;
+					error("deny MLS level %s (user range %s)", reqlvl, lvl);
+				}
+				if (default_level_sc != *default_sc)
+					freecon(default_level_sc);
+			}
+		} else {
+			*user_sc = *default_sc;
 		}
 	}
+	if (r != 0) {
+		error("%s: Failed to get default SELinux security "
+		    "context for %s", __func__, pwname);
+	}
 
 #ifdef HAVE_GETSEUSERBYNAME
 	if (sename != NULL)
@@ -114,14 +306,20 @@ ssh_selinux_getctxbyname(char *pwname)
 	if (lvl != NULL)
 		xfree(lvl);
 #endif
+	if (role != NULL)
+		xfree(role);
+	if (con)
+		context_free(con);
 
-	return (sc);
+	return (r);
 }
 
 /* Set the execution context to the default for the specified user */
 void
 ssh_selinux_setup_exec_context(char *pwname)
 {
+	int r = 0;
+	security_context_t default_ctx = NULL;
 	security_context_t user_ctx = NULL;
 
 	if (!ssh_selinux_enabled())
@@ -129,22 +327,45 @@ ssh_selinux_setup_exec_context(char *pwn
 
 	debug3("%s: setting execution context", __func__);
 
-	user_ctx = ssh_selinux_getctxbyname(pwname);
-	if (setexeccon(user_ctx) != 0) {
+	r = ssh_selinux_getctxbyname(pwname, &default_ctx, &user_ctx);
+	if (r >= 0) {
+		r = setexeccon(user_ctx);
+		if (r < 0) {
+			error("%s: Failed to set SELinux execution context %s for %s",
+			    __func__, user_ctx, pwname);
+		} 
+#ifdef HAVE_SETKEYCREATECON
+		else if (setkeycreatecon(user_ctx) < 0) {
+			error("%s: Failed to set SELinux keyring creation context %s for %s",
+			    __func__, user_ctx, pwname);
+		}
+#endif
+	}
+	if (user_ctx == NULL) {
+		user_ctx = default_ctx;
+	}
+	if (r < 0 || user_ctx != default_ctx) {
+		/* audit just the case when user changed a role or there was
+		   a failure */
+		send_audit_message(r >= 0, default_ctx, user_ctx);
+	}
+	if (r < 0) {
 		switch (security_getenforce()) {
 		case -1:
 			fatal("%s: security_getenforce() failed", __func__);
 		case 0:
-			error("%s: Failed to set SELinux execution "
-			    "context for %s", __func__, pwname);
+			error("%s: SELinux failure. Continuing in permissive mode.",
+			    __func__);
 			break;
 		default:
-			fatal("%s: Failed to set SELinux execution context "
-			    "for %s (in enforcing mode)", __func__, pwname);
+			fatal("%s: SELinux failure. Aborting connection.",
+			    __func__);
 		}
 	}
-	if (user_ctx != NULL)
+	if (user_ctx != NULL && user_ctx != default_ctx)
 		freecon(user_ctx);
+	if (default_ctx != NULL)
+		freecon(default_ctx);
 
 	debug3("%s: done", __func__);
 }
@@ -162,7 +383,10 @@ ssh_selinux_setup_pty(char *pwname, cons
 
 	debug3("%s: setting TTY context on %s", __func__, tty);
 
-	user_ctx = ssh_selinux_getctxbyname(pwname);
+	if (getexeccon(&user_ctx) < 0) {
+		error("%s: getexeccon: %s", __func__, strerror(errno));
+		goto out;
+	}
 
 	/* XXX: should these calls fatal() upon failure in enforcing mode? */
 
diff -up openssh-5.4p1/session.c.mls openssh-5.4p1/session.c
--- openssh-5.4p1/session.c.mls	2010-01-12 09:51:48.000000000 +0100
+++ openssh-5.4p1/session.c	2010-03-01 15:24:28.000000000 +0100
@@ -1559,10 +1559,6 @@ do_setusercontext(struct passwd *pw)
 
 	if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid)
 		fatal("Failed to set uids to %u.", (u_int) pw->pw_uid);
-
-#ifdef WITH_SELINUX
-	ssh_selinux_setup_exec_context(pw->pw_name);
-#endif
 }
 
 static void
diff -up openssh-5.4p1/sshd.c.mls openssh-5.4p1/sshd.c
--- openssh-5.4p1/sshd.c.mls	2010-03-01 15:24:27.000000000 +0100
+++ openssh-5.4p1/sshd.c	2010-03-01 15:24:28.000000000 +0100
@@ -1987,6 +1987,9 @@ main(int ac, char **av)
 		restore_uid();
 	}
 #endif
+#ifdef WITH_SELINUX
+	ssh_selinux_setup_exec_context(authctxt->pw->pw_name);
+#endif
 #ifdef USE_PAM
 	if (options.use_pam) {
 		do_pam_setcred(1);


--- NEW FILE openssh-5.4p1-noacss.tar.bz2 ---
BZh91AY&SYËØò¹}ºÿÿÿýëÿÿÿÿÿÿÿÿÿÿÿÿ ²D at 2 @  ØI˜HcÑœ{¾ì}€ O@ }öz       ö /`           È:÷¾vƒ Ð‡}÷ŒF÷ض}õŸg}÷Ò¯L{;ë‡Ñóäöèû0«ÝßÍPÛv¥IAlkÐ z^ï­áâ>¯Ÿu›ìûl(Q@‚
Þvr[ïLƏ 5¼£Ø=öû¾ç­æûŽk ù[`  µÖè­€z;îù|Ïn««]ΗÝvñìÝ}ÛΓS¡ï³×Ý÷M·}÷Ú÷Ý­»wUZÎ g€ø›7Ë]õß>ú=}ëo|Úp¶wÝê¡pÍàwp÷»®ï]ÞrûÛçºÑ—Æï¯}"OZ÷8UO|Óvì×>Ô„²£}·a´ÝÞöújß5ìd<|nžÛ‘¾ûzÁÞK½|vöîYÓvz¼øè =:H¡IvÅØzÝ€ö¬£åçÛϵ"Dzƒ¯
€¥önƺ0Ÿ}ž@ÐÕ:<‡Cvú§…TƒÖJhv4Ëv˜iQï§t  ûì ´ }
RÖ>Úè	h€f¡T € ̀ĩé—ßcG"%{j ÷·U×  %D’¥T”—é¨†#ÓH‡ÞÛÜÜ{PO½`=wzÙ¼âðv÷Ø®Û=—ÃЪª´ À{œë64Øïžó¾÷Þ÷°ú KÑ÷Ø[×Wo})öeõÕqM÷œô¶ûÙÐîÓ,u¹»ÛÝ…éÌï»içkï¹Ví½WßcÍ€ 5 Un0È (û`   (    ï¼  h Ü[˜/wzx^…^÷y¾µ°€ÛÊêãGG¦¥îÁ§¯}Ÿq€( }ºûÏOºÀí;­v%Vî·³®…h×{Ïw«—Þ_n×Ñ@è »œ$RKWÔéwÞÎ
]Û€G×Ï®5ÚŸ w}÷Í,¾|>í·0®îo=ðë^»î÷^­ß{®®Í5âËçzÝo6÷®ï]:Û·¼÷½|ûëgÏ¯{ÞãÓí÷œç»ÊôwϽ<ûà{Õß8Ûmxñ§7Ï·¶2½Û3·5ō.K®bÖ.ÞÝçÞ×ϼöß<›³£­}5O&  €ûÉo/nøiœ7×Ï{ۏ}÷bÀóà{r„†÷·ÜxûçÕÞÞï±òm€u :hg¯°‘£;îúsÑîúø(ÎÞnÐÒŠ}Æì&Ùåºcé‘reìÜû¹W›xœ²¼»ïºïžÖgÂË»;Û;zÝë6ì_Nªô};¯¸ë“˜-»RÅ”ôdôSz¶v1νçß}ÚŸ»º¬Škª4gR&Å*;6Źc­¯¼îòÍ¢†Üõ½µiêÚîïfófÞ®–ÚÃSZß}îî\òzmS×sâ)¸27ßsŽç_o»}S©ê³®ÍÛ{Ö÷LõÓ§Kg¬çpíë{ÛYåÑóäßluï	öûyŒ{î÷Ø>^¾êOgÕ²ûήܺù×ÞݾöùÖv¯]»zÜ^ß{ïž}Ý·³WnìW%n»jÑÕgmo{›Þ]¬ï,]véîÝo2Æö½ÑsÌ{Éìí¶ôçuïf½·Ý’ïwVÏ{¹NÇŽ°ŠW˜t·][»síÞxõÚìA»Y•hku´à¯c¹µë ®+½Îžß|ç¶Áå•$ûõ{µuîÓWÙ…]mõÜûØÑ]½Ý:ûÛÞåÛÓÀzßWǯvUØ[tå"ÆV5ÓªûeBÛyÕïÚíºËNëE³@ª•k¥¤ûh׫­W[c>̨VËk[ZŒØ²Ùaª¢M½7´®öãµv ÜÀ»qÛ»·Þ<÷ÅöO=æí©µ5Þ»ÞÍ÷ßGCß3èbAŠ\ÑTÐ  @ƒGYµ (½`=µ­óÞvm°+FØÆi<1
 	 ïróZé}Χ&^®éÝݵ7Ïó½våd}ó «¡´jÂû>¨ûçq€:KÞmðÀ®Œõ¨½«¡ÝÛ©_azÓC]$5VÙöe½Ê÷½UÀÜÓÞóíºwO\5XéìÔvמÜíì÷z¶ÕÚ›®éT
ECu”G@«ÞKÞë£ÁóåíÞ®]šŽí¾ÞÖ±yp "ÅéÓ®¢ö½Ÿxû=ÁÛ·ß ¾Í¯„¾îˆª@ ;™×Z ¬Z:½´èöëÛ¯6ݳÃÞóÉ«w,öíÐZOv·zí{{u§ ¡éÉ{À¼¯uÙ”u´êºg»vt©ïwsïn½Ú¶nÁ4:]ÒÛqlî}'g¢ìÈ)ì"†Ö­í¹™¥¯xó³ÓM¹Ù×uºÚÂ"$ (R W¶–F¨ƒµ7ËÅ}4D ¡J‘ïž÷€¹ŠîÍnsŽ6äéA   ä®îÜ×$ˆßs£×qÝÙ¼ƒCI-aêß{ÁÐô¤Ð]€ó±×¡ˆ®Œ¶ÍÞ'»DíÝC±vä…÷##ÞwWÓë½}ÏcÁmå͍¹ÚÑÑØwÛG{;:5vvg7NÕݨ}îìÞÁ½½À÷8€žÁª(A*õ£¶W¬­jöhè8Ùw@`jë=jŸoƒŒúîk@£uݶÚÅ kAudŽºPǽõzÄtÐâ‚€1 
=×w6•E 5<û¾Ý·¼<ö·­íÝNî”®à=erîÜõÊë¹×vov÷µ®¹›EÆNÚÜíÕ¹°Ø§A©À¢ÝpÖŠÐ4â/`<^•Âómë J P°   tîöµHU[e{¸«¥zr…8r:h
PÓÒºI]½E^yînƒ©u@ ×t»xðòtß{Þö}jm­Ù[Õ4ömç)ÉÏn/îM^înÕÍUÝvê«r*•¢»séž­PÞÄ>ݽ^µÞѽaÐ6¹Û¬7j
ë"ºk²·KÓnî&7¼¾óà@¢¥{a[kîKía€¶ 'ӝíï0ÓD   h š Â
# š§¦)‰¡êzž¦ÔÄÐФz†ÔÚ‚S@‚A	 ˜M4Õ<Ñ4ÈÔôLB5?E) m h  h   A" ÄÐÈLÔô(Ù
Ÿª~'¨'¢x©á©¨ýS Í@ddŒ˜‰£R" `B4ÔÓÔcH`M’x˜‰µêcSM   ’5<€€L„Â4hÑ 
Týê§íM”žÔd›
dd hdzš
   ’ ¦‘¡14#M†„ÊŸ”ÒzO&“a5GˆÒ~•7¦£D= F€ 
 ÜÿÿÖ¨Œ—ýXÿæÞ/ý’äïï™ÜÃüpÿ³þ¾ºÔœW=¿|gðD絩Šˆ¤<0¡Š OQi @ö	ø?m]:ÄCñgH?“íÓ—ò}µ‰²be+"ÒLªLŸ¼=L$¢ŸÔÜÅjb¢!Wteo÷ø ©¤$?àŠºEBe…X £QQ’¥‰’´ž]ÅL $Âf`ÀåvíÙB•PB‡ÝÕTÒ’±sXJĦÁJç
54öð¡]Áê„©*À¢
¢sªW(š¹‰x°L*¨|^..9JMÌÓãé8ètggØÒ ìÒGÿoþý íNb‚‰H	i˜Y`„(R!$ŠJ@•Dó] L fˆ € h ¢$X‰˜’ŠbU”d"EŠ”¤‰")!¢¤u²J´ÉJÀ%´	
+ˆSBjÄ•–A¤)‰(rAÀ"‰i¥
‰ „"BÌÂ)		¥•i•&€ J…ÈŒÆH0 èÜ«Dé" ‰„ÀT@%¦J
 ¤†R)Yb
(¡ˆ)•J(I•’A"P¤
%”€ˆB`RH
‚ )"
1Ã\¦BhP•7 ºˆQÐ œJIEßCh€ýäüñ]dS\Ì+­ED
‚/@‡ÿë"ÿN("ä¢þ	ÿ!ÿ·% ƒ™"(IüoýŸãý²nο×
ÿ fO›þ_ùK
1 BÑTAöE4RDÀE1$TQADÊ””žs„PHEÉ@SI!ERQ%%1S
!4³2RÅETÁ14ALÒSD»°&šfbˆ¢(™©
J ¡(¥"U˜i$ˆª(Š	‚*Šª•¢™š’b*¢¨(
bª‘$]ž¨m]D¶)>µœƒþ¼À‚ ¤«³C
6µ¬ýY‰ni³/¶A0 »ñŒ€‹;N%DÓª1pÈ È ²Ê;³$ ÖQ%YŽf$ÛÖ¢rœÈ̳ª¬2h,³¨ŒhÌÅHÿ¦ìË´¶çŸúÿªÿŸúmÿ[?ç³À÷'ÂÅÿ¸Ï
ØgÍlr¯MŽ¶[ÿÞ‡õÌçs¬ÑðìåKœ©Ðì|Ù3&ú¡Âšˆ)!©~0!LH€ƒéOŸ_¿Yÿ×—ÿÄyçÙ1¥cPÞ;åÅBRùù)x”dC(È‘JÄÁQT„EÑTÒŠ²!E3)KK4‘0DL…PP‘ ФC$‘(JÒQK5$ŒDÄ‹H4Òµ
L‘UPSD4LELETÔUD”‰$ŒD ÊETUP_ÚÃ(‰ª¢V*¢"¤‚‚ Š¥"ZŠ&˜˜©¢"™’%
¡¢ˆ"fh!$Yµ90M$Å4ÌU%)%0Ô11Q Ä´ÒUUSEDMÓ@Ò´-S3BDD AÁPÓ!˜Å, J“D”Q1²QTLÃ@AL„HDEQQHQ5T-TLÑ	E2Ò	PË1@ÓÐÄÔLÌ@ÌÐÑJUUPÄ
ECQJ´ÒP4KLJÔALA$UHP•2±ÁT‘)AC
D±1R6fDPKÐÉTT zB†J¥ ¯æ—	) ¡™"ªŠŠ ¡hŠ¦ˆ(a–‰`e€&¡š$jˆ€"
ÄLÒR”Ĥ2Bj"J¢’d (˜edZX”!H$%i˜Vš˜”ˆieIV‘†b–ÔdÃ,TQPDE4Ë$BPÅ,EC˜eAE1!CQ*d†£2&ˆ¢‰f–™– š&) ˆš"VE&!iQ B…‰YV?õbåQRPSD!TT´ÄT±4M´³CUTÄK5A5DPA	AID„BSTÓML…
E4E2TE!4AELÅ@DR5ET…4L4T²EDAPRURHMSTÁ5MPEQDLPÐHKM,Í²I2•T’E0D“HDPÉ1ü™&%B˜‰V)" $(ˆ¤àÁEE1I5-A	EDQULS33AQ1TÓE2A,’Õ!IUÌEUTÓÔEAM4D´H мç¬032HŠµ™-D.àÈb¢¢‚má•Vë5…Xf>~­þlr£ŒB²9ÍØïGºJ(Ø:%æ9³ók(†Ö	„4-íÍ… ~+Pj¡)Ü‹’Ó£ýXižÅý0ÀCQANTOüÑžWMx:þº¯4My1"ˆ”€›¢…uwyéxýÈ¡xÏ¡Ðk˜°þe2Z†!«PNÜ0ÞZÇO9ŠE)Á	ž?NµóFAdÓQ%3-%­AQ$ È/Ã=?Ÿzˆþ|Â/Ñ™»*[öš&š¢¿Lá×éÊ#Dï2tNE–a‰E4ªª)5)†zû¸æã•ŠæL#{ÃQo3]Ø©š"¡¢·9%fa3T9†aX9T“:ƒ$§¶Ñû³/¯2**˜ˆ‰æȨ̂
1ïÖ‰-F6F[ ñÞ.è*Ì1ÈÄÌjŒ‹xÝlÀÔaÚqcfd}ŽŽ!ÿ?üñrCL²!´ÄÓ¼½-qP«ï@ÁFò^obÑãÒv@‘tÉ“Ð@ßÕÎ0z7/ëü5«r×íU¾™Ä4÷Gh]s§ãƒqêŽ=2çˆR©‚b‰ŠýF(~»RaX‡þRÔ‹ø¤§A”$²Ð¶a„Åôaƒ œÉ…	0#'-a†8Ìi¢eˆ%1+˜Í8:¡Ï`EQÈF1!
íÄ9“è_.±3x|7j²“·ãÖ‡¸ÌBªªB(  ç‹1ÂÌ4FâÙ¾w©jŠÒlËPkZ2ÔBÄéÖÑ8RSMEL•K at U5D2 <T¢e¢P\«†’h‚b‰&‚`‘¨	¡)ª( ˆ•¨ !¤bf€ÃA¤C(adÑUIQ4AA©L¢¬#
b#S•4	Q$!)IM14QRÐÃE5LÔA,DRäŒ<i]IDA!J	#	M4ÒÓJÓ
D	²2†©
( ©bhšŠ ’
T¡©Š‚€¥*©’–‚”ˆZ
¡ €i)ZŠ–ÌÊ€` ‰dÌÊÈ„¦a$RR¨˜Hšb‰¿$¸T%2CU3-D at HA3EIÁA%DQM1„ÅHÁ)LÁQë@‘f‰*!¨pÅ\%b¢K	ˆ‚¦hˆ¸¢G˜Ô4DU
dÒ˜ë5(j
hJ•¥J¤™hXŠ!‚bi ’‰b¢ªˆQ¡¥„(’Z@ˆŠ$‰`ü²a `Ê)„¤!"&:X‘(RS”„Í3ID¥
QMLPBPEDE%1MSI ´•	CKIKTDÍU+‰
+×1’†
h¦‚¨J’
š¨*¨š(JJ(X¤

ªZ
)Y‚¨¦¥)‚h"bbR–jb‰¢ *’bšHˆ!&ˆ ¡¡ª ©¢F	Š*
h!J‚X
*&h˜ˆiŠb’š‚ª –¢`*&JH†""ˆ‰˜ˆ¢ª
¢˜ˆª ¢h$¨ b&Y¢šŠi(‰š*j¤ˆ ‚bbf „š…Š& ªŠ©‚Š*&*–€‚‚*i*"’¢b¦ Š`šXf”’&‚	¦ˆŠX¡Š$˜b†‚$hi&Šˆ&¤j‚
JŠ&¢¢i¢‚‚†’*R’f¦¨™dJUJ)†¦!J"¨’*ùì(’¢‚
©¶A’MQÛ0"f)¦©Š&ˆ¨KNc`F4%ªDúdr˜hj¤†…ˆ	 i	¢X`ŠšhZ)h)‚ÞF´Q1I3S5UUTQUT¥lœ©$*`•Á*ƒT•Q+$	ASEUEMRQ31“3¤,ŒDUQPE44”E$„PU*PÅAASÌ)"Š™	ˆæ-,´BL”ÌOôXÄÄ„¸£% €„„‰‚"J†P"” $e`˜ )i"j€Š% ‘ `I¡”„!  "˜˜&)d’*$ Š)dŠ Pßèã{`(¨ˆ$ ’’8Ã);f4ëœu4ø‘‹1DMLî—D¨ÐQEÔ±D±$”…-eºƒ5”ÐÓÕ4U0¬~ìÆ–ªª‰&¤R„¹Ä
˜$šj‚
–‚&H
(iI$iøáÈI`ªYe(ª	dbˆ $æÄs	ƒœEÈ	 (h”™ý>Ï›óðpÑE%D4DDDA%MÍU5!4ÉĐQ5E0Ä-B@ÀQ2BÈ”ª’(“B´´Š„ ’¥„ÑÓ5 TPTTL4RI$ÚH¿Üøþ´?èsá!¬‡øë×2Ç!<8˜²êÑÆ–ãW_íúò¡
ù¿÷Ù _좢Û¥‘:|P^æÛÒïûC;«ã—pç#ãêØŠSbì%Å·Pòù
ïéÿ´¯Ðá©ì|487ÿOL6ŠT
`"”="%C£
ž4c­Øy²cËD÷¨{7
pÔÙ’5ÁÃ4‘͹L µ‹ïbõï–ma h\@:¼@Ó‡¬ËYJÈø«†7¨aèá­Q† ¦±Øòã(“CM5.;ÅáÝ´ÐŽ+Ks$8!£å`½ÜuôêÎk¬üªZ
AŒGt`hd'#Jž³Œ©§U¤l*@B*I™¡¡Cs«M/´¢Ó$&H`ƒ*æ!(„îI_Í"}S»3Ñÿi@Œ\&A\“¬ñ…A/ÕããИy«<ç§þé-»fËäóŠy‚F‡î
9ey¬¼…ÊÒ_SFÏŽá¬z„kÜj&œ¦oEQ©âÛSsGDù¯wåþŒ8éÃTèýÁ<zM?j,;ø‰a°d B±Ò£B`<8Š;8¨ÞÞ®3ox56ƒÜ"Û"¾1¶³[å¥t[,‘Ƙ4Èf Æm…iá
§ÀK[ijJáNãQVF
6?„ƒlc9È·n&¡2ç0
dL6·”
”ZoÐ{y’Vs"cêØÚ=A½:ëlÍÀÌ.]ø…iDkŸîI¼6öÜ43Nf‡¯ÒóK–ÈŠÛÐÏ'˜ ÛÉ8‘íši´Üf
G0{{Í4¦®ó±ÃËs,(66ó4;\‡l5»28ÓICÉßSG6Ž3%^¶Öæ†§20ƒ‚Ó3>¢6Ðà1
°&¤aƒyUF˜Ûq	¨ò£XÄž©ªÃ&˜F›Ñ›`6Y
å³s°Æ'HV›ƒM&™¿e9¨(B‘
úCÑ<àû00CòÁêø¶YÐþÔa$‘¢ìÚ×&ð<X8‹Ó¹ªÐjrÔè²C¡Ž˜™-Y‚™WI ËÙ3äb}8ê
œà˜~RÂcÒrÙ¿aj+P_gý²¹ò7£¯.O—Ù×ë¯Pçìó‡WRé§cç;a&W,X~êÖ…ëZ´MÈCŠZtÁbž‚þ¼cðïç26§OÈøì-ß®ˆöPSzªcˆ‡ä™
v#3.¤nd5“S.œo‘ƒ'ýZ¦°ŽjC2R3j²µ×nau2Â6?L­•dQŒmµŠzJ-ðôêßû}±Ñé­¡¯¥É¾_÷CäÚõæäÐt¿î³ªÐ@j±Î{JÈ:Ø)ÿìw|zXbÂÛ½Ž„c&•j6AŒÁï_cR‘Ãjm$=÷O>¶·9$ h1¸¤ÖÈ–œÚS¾Ô]z…/¼/qªºX¨a,g]©ÎÃ&‰„çþH<FŒ±÷å'êÌD‹³¹…˜0«JÀ6ú…ØZ»ñ­a(àÇàI%¥Ï7	$“ã}·ðzhÁ\úܺ÷-5–*÷+2ª•|H’5ÝúYÕî¯
IÊWh}P¥µºì"ijéží_K
çž¿#ÇÚî”	ÞHz‡M †	/ÃàÜn«g²´Êæ˜ Yæ(¢ÝÍyA/¸úÂPöýª~Æzßë6±½¨·kÝ•7TnŸÖêe:þDý÷=óÙ
ñìóù¯Ž)Ý y×_¾¾ÜL½wº2LPâÕìÌ¥65,œ3+ŸE1“–”m(Ð6‰$ƉË%âÑ]ÊÀÆ›M­5¦D	©_o\X›?ƒn=µH í¬
ÅÓHmR6~Is’°µôv²u·ß3z¡6éNXõÆØÄ3"…!l|µÏŸGÇ1À–ËÃc[+åÔӐDÞêK®*£Y'^qÜyNŽ}Å[& U™%:ƒÆ¬ù7Ùmr°Ãˆ
CQVZ&MEƒ sŒ=Ë‚ŽØ1
×S¶@Ø\ñªûx=Þý~§Ï³¢½Wk4vÔƒŸ½F0É:dÀÈû®Ìæq6R*Rì¥Í6Xs#eS-¯N¼¼ëZß½tCyjþÎ9¹%û%Éœ™0qˆntî
.šàu®2«„d—0ŸÍ5“TÑcuŽ¸ž22»vÅ{kfóMÖžL®oa›fƴ¸ÒÿuÖø˜AÃPv¾&35ÿ*{{ ¤Š=ÅŠP‡‰¬’.ÅE&ºø©‚R~:|sè¨ÔUNd7-œ "á.ß'@U„’±†Dé’Þª‡¥Iô™úª‘Éé”u×5Ó#[æÓEÔ\°\:pj™C-¢ÈE¢8njíÁ±ƒÔ#8jñ§¼jÐh³¢ÍƒÓdÛÖòúÓ_n‡ÞS©cÅ~“ÙèMÂ)6˜ZA_.áÑûÖs¸’?¦?± )Eþ؇(\aÁõ̧1˺'´¤ñ…øPB)ܯo,”
—Þ÷	}ȸ¢ùÄ;¦È'O_Üõ؝ՂÐJ´Fõ@% ÔL˜„Õ5nÃ-F˜ü¿
8ËCÑj`Ê
ƒd1ӏ¿qÖ•9>œÌ-`A©ÉÌ
é0h‰5&ûXêRÅÄ‚b%€+H+[Ä+Xàj"V”#@¢á¥(´8aMòÃÁqC˜ÄnmæŽE7é.ÍO͐b|ØAœÚÆeaünu5/7 9ñ¸Ò¤’)=Yä$ibPRiît¬Î·‘ñ¤F†ž£l‘’V^ÎõÔ§æÜ0ŽË
†«Ôl„Â6ÚÖæ²+íì¼Êt„þš”Èè'R8²) G bÂÈÈrÊŠ
šzÔ-TAP4Ò4SKDE¼Ê}’7Å1=Å=Ê·ü¿³fñÍ®"d"ž«‘B\@ì5)àK\P Pñd??ô§?ê֏ÉðÞW›ê.°Áxü¥ßÅïZ)ÆÏ”CGþQ‚9r$2ÁÈ—ÇçõÝDäýHi÷v
ñÚ͈T¦»èÆ)çÒ¼Wa³ÌXÒ(J'S÷ïÛZayãO´~Æþ{ôËvŸ¶²Jh%âØõ[=Ju*Æ`¼‹o`À˜͝Úc
ä]«
$ëO2'GÏ>BÏOÝñø«Š Ôª J&>S¼k†ÿ;;8Æ+é‚7œbäcä2ÚÂo³ßKfáó}^§D‰Q½†»T}$FüTä¢çÐb×ÆÎ
MæZ
êP‚ÿ	x™á_4d''‚zpk÷{ôô{…ô‹ª)!vÏû¨9m‚y
uÙv.|sœ#ç”X{ϲS –œ¢´s„ß)ÂïÞ7]rÊQÞ5Ã\ô‡G¦L!sà¥ÝRë{‡þ›ºÇgÕÁÛ+è
7QÁ(=Œð+Wí#éÿ·§Àõø`ð~¯_§+ò”IöÂ}ò…F¹°Žj±œŽj")9²2¹ÁÉV–¿Á[ݶ‚Œ’ƒ®¹­\y"ƒ%”mˆŒ+£BŒÿu¢d l ü3Ï:ŒšÌ°(#%È1Êƒ,ŠL’Œ¸€ËVfzN­xÁþ(ÔsãQ¦r8žÿf&¸n/æó4]¿YóòþgmþoãÆûw`…ù^m ˜) Ÿ/3¸6å™&„ªdïÿ1­xÇCxQ¢ÝG81–LÍùÿŽû;àž¤NÝ´lÆØ\ÎÎl•ZïÑšxzögG+\_¢xK²^‰ªdhw;!S‡ª§”œmùìÕŸ^Pi58XFÑÇÞz½ƒ¼FÚQ÷pm¥ÆA°ŽH6¡Œzƒd‘r â¡Ôe”Zƍsl¢¾’ɤ©ŠèÞçXTVùk|m§á™DHE­Ø„uÅ0ŠR‡uâTBÞ#?—NÍÕ_Ep6„`žùH},¦k<\¨dc$q7âJ“¡ €èJ7ûCû¼zü58ðÓ˜/A„æ“»# V“q»D4Ž™Mk
p´Öµ£SDÏøã%¨‚ˆ¢†bFQT¬ÁD0ELUCIFîê9ÀÑe½f¹Ã[¨¡;wÆÄÁ
=Š.cbåód‘LsIaŒ””mÂލ5¼Ý­Ú³YïÌ¢*i7œzÃûZl1"ÁÉš*\Yî`[U_o·55*”ÔE*g
‰$Ð*v}-îJ¤äWgFÝŸšŸ#wXej$õÒ–„†ÊŸ•¼%L皍ftü4õÃë‘â)K»PB ~xƒ)ãù¨ô²$åê°¸"uûþÊåÄQ Ù©J—†$ FoÖ2æ .BS¦-Y@¡Ùy÷<hë£%‘å—‰ØiT5ØOӁ@dG8,–¬HUqŒ¦Çr sÔÞ澎aÏU䈂L5BÈ.qÐZ	Kº¼Ù—Ù¡ÔªŒ¡¹# ÞbrÍÖ9KÃÕD•M@*O-|:»»»¼®ÈƒøîTN£xzöàþXhˆm;óÙ†íðŒôoíý_W—õzýmúö2õx•!d®(ÀlmVÄãM7úÁ—2Ò×´eiÑŽ4ï2²
˦	€/͇ç—n×&ÃE,¥M6›-¶´6ü$+o
¯ò¹ÏÌá­Ý,¬þ¸×ôC“_^qi("Z"î•ÂGô²Ü*¶A¥ý,ôÈ<®×«%”îOŏC4´Ø3 ò¦ÂÐÕPfc²Ž¼ÌHdjdq›¯òöpòõôv3—ÑV6BB,£xèì&TÙ\Ç\xð3—’8È<J›$®¨äåÐbÞoz­°Óu·…„qãÇ]ŽblmצJÑѐ¥Z++²Ó,ô…y’¹!Zc,7MÃ-WM°¬‘‡†¦&£ºŒÌÌdþ+–,gÐ"©,\†¥ÊC	Ý‘Ü\<I$'¢±ºY¨çY9€Nzì5ŽâÃ(°‘&Ë!fždÅIrÞuü3u½"‹Ì«T9ƒÜæ$*£7N>xßÐF¾®L!Ò»çÌöSY½EŏÞgªÞd6c_Ó É
FPCTSĦTPÌ
)bH’B’Š"j¦¤õkî`(¦¦ªbH©˜x ¦#×FaQ/ò|(kSÁÞ\|šŒ°j5óa`¾½kDFTY³E™–E™1„U`Èm6•ã¿¬þ h?Þœ¾r6[
0­w͘F¢#ãÃz^!ôîö뙧‚
y'3,Ì—2@9’RET™*Ñ„TŠ·Ë1¶šEÈ‘(û±=…¢*›èçC8õk®Â„¸Î®;çS&ÍÆW"vŽÕËÆ7Q‘Æ7ëÜÄó£¬Ì!&6[\LrÁWY˜LmäR6ÒfrdLÙ§NŠ'ŒÖ–šÕ¢r5¨ÌkY¨‰¢c É Õ[#&Z‡-`BÉŽVÆ`HF£"4C„kXüÐñFê1âÃWìIâ+dØg
Û¦&¤¯`ÜI.
	œ` îÌ6qXóÎnª¢²•jÂÈ-&%^¨È9ƒ Šœ±¦J(š&c¬™üÖÕ•M3A&øÜBåõÚ˜ô}UwË\ŽWl8rí­»×gíØ._ éQ^ðRf².(¶ƒs Á«Dc‰
öT‘$1Oߘp’œá¨b" (ª""‚Š	šˆ ¡ÉÉ2Ë2Ç'’sYo
—¹`ÖFƒCM´Òå†n-Æ¥±;=TÍÁ—2kÈ5'ѨBFLjª@1‡†9†íhÌÜPŽwŸ·qûР½þ+ÀB””Г
Óça#NC´-"REULQ
1õHdD-“BRQAM[“*VšG»òcé!¾3ˆT´µ@´©BIš„Âþ¿¦ð6÷óÓ_Çؽ”5÷A”Lû3#¤VZ̝E&UIE@cÓYÄäÿÿ“Ó´pÀä
QOuLD­4!JS¨Ö²’3312Â\*hMF«Y©2
\Ã5kQ¨“˜$Þ±É
ÁIš–€ªhµ””ƒ©Læ=3eC(âÁ„¤À†I’ƒAÉ&KEQM(YˆäÆ°rr% )CRa ¨Íb&KB48AE1	T…d£‘¨§"@CÑ£·’ûw¬^n)ÏñbǁP —‰t@0될‡ŒÚÑm2¹,áï“9Ì­c4#ªkF»¸0
BðèAíϵWç®Ê)Š?U·Wh®çz´3ëªèIëë"ž´¬{"êÁwí¥[!l£t°ã/ÂJþ™È;P¼†½ä‡΢ö½ÑJ:Ñêè×Øp׃P{iöÌ®Äˆ?å°EÒîêf)*”L§¤;ÔÖ˜ÕÍbué¬ÅŸ†×Ûp(h€£PÅ&¤5 5é‚RäŒu€ü°>ȧš)¯.½ÇÆEØL!¸Ûv0
”¼cTo-UFFqŠPäj9’Ö;ÈQc1˜1YqÛ~=¬°¿»ä Å%ŸWëFs×ZÞXÞ«ó¨P>ÍC^ViØØ6‹'ëÕ飁®‹„¿y‚ÃåR·KF§Xë)3Ó¡n$\n²ÏñÆƬ¨‚ª¸ÌÇëhÁj…hzhÉG-ÿÒ8Êê2œp”Ò§Dþá1›ßµÂZÉÂÃþ.m)sÒ7E_+Ý66áhî†k”¥sŠ¬|¹µ¿}xÂ÷ÖUìæßpêârc¯izr^]Ì»j‰‡~úë¿·Rat¢;õvãYÊåtîñëUè±Û¼B¤‘©~·‚»v{óHBéžù;R‹ÙRT£VYÕ:ûçt±ÂBÅuÙm«RÝS÷rŒ×“IS¬‰<ZEpÕ²¦ëªtxs°‹ŸÉkk‹ë–ų¯ÁñT ‹lÓo¿ôàl%ÏJäl–ÊJ:'¦6PwácÛ©„‡a:³¯]£+ðåÂ-Ñ&€[EVN.ʏF<÷ 
@¬¸vé}‡omMÕ«gì©à‰ŒÙhWGƒ ¢bõHú
_Ïبߢ«½Ëñ¿6ؼþ+ó–(E=ê•Ò\¨‘¾Yv§NÆ?•AÝ3åu ý:ãžoÁýŸß–÷s¨`’¯;!H0f飪ƒÐ¢0Û¦¨Óà!õe&8ZºoѳÎ/^žÇØ>ºÆï¡U›ÃfC3Õœl±Õ¶ÉFæÔ‰"uޒǧÂZÙe6÷šcÁÀÿrÿpÅ®±‘ز#ÔTJ¤"w {}ˆ-Û&•C3Ñæ&=yv`†ž5Ÿem*Ä=])×ôUG„8ÚUÂ&ø‰0iŠbÂãƒYéz;š0:òa\öZ©5d4Ô›éŽüøÂ’© £E²µªªæyà£îÙ²l…/,¾þ^7Mú0J'õvœKá1LJþÐ5DÐR4„KN@`VµL[ýKÜ…Q÷Mø!!ºƒi:Ÿû?,r®Š“¤¥c¯t–Ñoté%Mh\?dÂûmÄiº‰¼§ê	"`¾)PRKÀøàØ„^^ê{¹Î;®.]g%‰q:¡û{Їš
§÷v–pþ²¿®wÆp7th£´½ Í7‘þ•–ûâû'sÔ5ž £:ܶ×mð‚«²dD^&—
³Ç[ìróþ¡;`€,ÎË Ú1pö_ñÞ>[HÀÑÝ-ü,,¾Ö]<4ãE¸C±L(9ì $§Jð¾Q¦ßêÂ|¼°Ïj“=~(¸'øÿÃ9­cO–€ ÇUSkQ˜d2p!—kÄq m ,ÿÍú®þ«ç…%_¡OÕ«,Ÿ>œVº§Ü|Ñ|5+À@±Nfæ}ZOEÒ;£”ÚA¥„ïáÛH).¿Ôåž{˜^Œ€Ûh~yÅp€Ï×!û='?v‹Ë,·K²zc—½¼¶­„‰*&Â7úò÷µ?ß?·§ê¹1›xDåóšÿÆX˜·þ›ÍÑfwÊµ—yWùW¬ÍãYJ/ùJèXÒŸnõXÍê¡ïn]>“º¬§ÍU¡óëf³²*wˆÞTou:;çªbÞ«7¬àÆ£N	ÞwŒê¡c7K9«1z…9ÌnHÅ–CàÍ
mÖb`¡T¤úÊIÌäÆff£6åUšœ>/;|íf÷¬Þ®ó‘Þ÷­P‹rŸX/{¨XÆ®±{"2÷™¤>7˜­šºËÊ›XΉͬŽ–]ì—tíf±¢'yµMo†Üs:ó[ÿúõ‘žUOS<!íöð cN3Y-{ïé2²(.ÅE"Í)Êz«qLÂu±E¸>SÎç?¢²®}.z„«ÚV7ÁÚÌdò`34(q
=ss$_V7ÁÊm©ÖkÓe¥â\I¾Ëß¿=
oL	 ¼è¬¬vOVŒ±ƒ>$ƒÔ·[9Œ'¯†Š³|nWFu§×k£÷ù¾jßÀã·]@_ÃdRot1`çnçMT»EV<}ZÅÛƒ“„§e¯…m:Éã•áRNÚ›y€¨zÛðe%4i^ÞµÀÃÁƒHªi(r¸i¢…dR.#
¥\,Ie¼ýþ/rþÞïœqW³—.}Tò˜ôCí@¢Ã\Ž'ã.
0¸ñ‡MpîlYúlÐË’ÎARÒ•‹#íÒtwiJQõ—(‚E›±kHÎøÐ?®+ôIØtZl5̐éqœ\ðˆ²PˆE•U|"³3‡2`sKf“>ïƒ'¦–Ò®n›é²ÿ¨xþíCîô³ý¹¦úœñzýÖCàZ(;¨4C®‚uþÇcÃåÕa¨q
¯YKcÖ¶­ÃÉë©üï*)ô6àéîÅÁ‡Íúë`³ÃááÚ5o’ÍJÓ|­YÚ†,Çû¨Ãì‚#ÿ‰Ç£ÈJXá¿S×ÒÞoÇ}ßCãõšJÌ&ËÔSkÿ-O픥’³ö<ï³ÙÈ…›\5lÞôHžÂ	Ò3]ÎRÄ^IGâ„­$8(&¢žù´Û:ŠNµR	 ü—«MZ<"+¼T¸RýHñÏ_ËÆmT<­r—ÆY­bñ¥ÞÓ«N’b3+§ÕLaO÷ïÏçšÊK¿$¿4ðôš½Ý«Ã¥WÌÿDÍ0öã¿o¸Ÿ\ Â—¸!D>£‹};?ïv®–ŸIщô‰üqßµ2Á0't¹OÓŽŽÇ”‹‚ÖÍÕAÊ?™ñ•6fPVúšMpõtû¬IQÄîe<çS¡A‹"•TøØà‰ÙMa¸hº·Gèw&rê"ü7ÖUq–øEµãcýòÉÿš¥˜»U;þ­/²Ä†F¥²>Ù‡þíùU)Œ^­}pÎ]qtúöK£–ãçXR{Œgt.Ìݾ^‹ê¯`œ+³‹<ðæÄB?å–í÷K±w7ž›[k(Ï5Ц¶¾ÝæMèBI(„j{5ûïѝÛ÷iŒÂõût~
öö8{)ٽߑm͏—„äøÎÃiŽÃCOè?vOô þ1½ÙÇ–í´·ÓDr˜Ç1^Ò¹« 9`Qî€âà¸vÄ;û£pµÌzœ†-wšPUQùZñ'~˜½Ë ’j¢¨¯SaUUUU_NUUU^UUa™aW¿»]Ø!›€¯Å×ÓÝøf}³ì­xSÁß~¶ûµüº÷ë)¼!	RJ	
ª‰<ø€µÉ!•ú;k>3„´wü—±qw†úÜ—uÂ//
$·K°Åþbœ‡ÜsF©‘ö½BBè9-màû{©øm:z>Å÷ÐvꐠØB.aǧ6Sû°Œ­˜Im·Y ›0ôV÷fê]\ÖßBH‰(ém¡}œ)äÇ¢€ÈÐÑ{‚±!7z])ág®Œ“H B
s˜Dp焪“ÏÑÖÝÇ.áÚ%šh«Þˆ!ÛLÔEjfnN^¨rÁ¯Š!
B¸Z.
{þ> k<’0 F~–OeyaÒx*a‚
ኯÑð3MsïÁ²2	§ìøôü9gZz‹k&¡ö¯éþKúõœ0'|†@¸Gñ LƒÚ”	·j)þc0é2íÃÄ:“ù=Ü š^é;}–Ú‚h‚d‚a¨\ðùÖì‚SyëA0³ñÚð2‚Ñùí`Þº(6Æ¡Ñ7ðÍ”$r`÷B=HDÄMîb€Ã:/m‚£ß®éž’|µ‡Õ|DN¿ˆÙ²ñò­A»úÔˆfs¬#Wߏëž)ÖýظGA-1-çÍõvR©¢Œ	ÙV8«–-#iY~+ļûDâi/hô“‡59fÛÈqÆøâýúÞ±Ï의kë
NÞ5|â13\öMžÐñÙsú^´ÿ~ά0áÏ_×>:` gOûÒÑMð8Äٍ/é•úä óÀ:¥ãiÓ,èÆaeA.]Ž]§ßäÝO_îèóŸí—Ñ%ý±ëšÅÒ”öжwAYôûª“ßSÇÏ“B*þÙÒo”ªã„uPUã³?W?-Ô‡1^q6þÝØæ65NsI_±®t+‰mvM‰?çFÚD.P–²úA&^ö5"‘xÆêJµåtV)D·së
õmÙ§ÑÛÂ;òý ¬êœLÊ:â¶C–ÿ?Ä}_O"“üYçèIzÆŸP‡°~ßO¯kšì‰»™*
š…Îñƒ†ï\
üØÄswìñs¿Ñåú/	{ÕH€øŒU™Ê  ´€'OÂwæͨVr{	Œ]õ/ãcAÓEð¬Xª™ª’)s6
%Óìxù¯Ë™ÂºÃ‚]š®)ù?ÏFÅ„}õÃàU9}[úª#HüÆwËǤ’jÙÞ4‹9vh×æå·›fÊÆžÿ¬¸?÷‚39iT.<vsT¤~ïY,â[ÓºÍÁûµmÂD`-z€¬K»£Ÿn9Ò¶¶È
t™|ÊI$Œ€)$’A\WëYlB6¹îþ1$"úÛêRçp#OnÁ¶Çεì¥>{Ç4™½Žsœöši¡ì?¨d:¨xT8 ¼_ô?w̨-#ç1ŽM!9ÎPO¤}Â!5Ïýu­¶P6Ðˇ:Fs®§\V“ñÛë>"^·?ѳÓÙ|ä
«‰«ÓêáÌ@
õ¬N *7  ¶N—Ü¢­C™âûA|×ü—»“H8O‰2è‘BHd¹L—å¿á$åÌ‚:DŠRê;­Æ¯1‰,©™ÇqEô›I›:A	¦GC ˆrfоXzri³¼d}èÙYe„¼¼)w…<5Ðù˜ß$ý¬í®iâ8ø„ÎÒ2´ÑáÚUtÒâš;°‘<NFÛ¹2É=m¤³ƒPÒ¢ð(%Ê@ñPdó‰ÇEC‡…ÚìqÏÃgÙ‰Úâ]ŬèIšÇ³0
°@­
S@…Ôh¤:"… ))ýhÆT€CòY4D³Íß8ìÞbWÙ†ysªÿGÁ}ø¹%QGêßkˆŠ2ËþL?½­ÜF‘6]ñ¨©
ÿ‚S ù·ñhËpP&Âs)‘ï²5ã*pBj–ƒ™ƒ@€¾„:_ãììxûC¬Ùóü•Pp#ó!:‡IKÌäJÓÜ  2ˆ¥‚$é*~©ù¡Sr””D% ¨Ò<Hé {30L„ä²”w+ˆP¦­‘Gv>}]ý¹z~êÓ[ÙýûGØßÔEÚÒB`r*(KHøh³øäùš¿n-ùì­†숼ˆmkŽ=¸`ˆ7oGsKX!tª%.@ýœžè¬d¸8ô®Ÿ»Ï8ý¾0Ó;‚U§ªþMi'÷þ5ZvÚ6‘1öÿ?ðs¤4WÊõþnÏjbÞßEõpѳRujßš¶wq¶>O¦•s~Á
Οp=cc¼ÐÓ 6k
.ÅÚUI<l¾º¬ôÀCñÃò´mŽøŽÍ(”~8T=N±õ÷ŒMÏû‹©sù2CûhÒâWÚa4~"ÿ;g–œ»P|Å:H Í…ÂÝT1Á­`:ˆ#ôÍÑ€|D ïCñŽëê§IˆÔ±ïsL­º rªäè&üÌNä€Ü„h#âÎ|ÍïD
ªa)AUTQN[¯
?†ß^®CÀSÌ­á’(ëuÃkœåm~°î?Ua3pØ@M  è›å°K˜	½zνÇÍa5”`c24á–(ä°:i0aùš¥ìil(AŒÅA†4‰RÑ!RªN»öW?vi›žBm&Ø€Ç12µ>Z¿¾}QÝ}|ùV}V¬+|@?îøFÝqÉ+$¤Ÿ¯§èÚ{l<Ä2¨‹Æšb ƒ1.ÕŽßx¯Tôç¸
·¶ßÐyÍ[õ}úüû&Ãò»gÑs¹ÊF‰Äpã·Ê’!ƒØ¦=´g
&…%¢
ˆùa8ÕôNO‡pDæƒ^Ôìéìè«a4”éí·ÇßõÚŠ(¼«û½
ñ…C…ü~´î*©£ç‡$þ˜S~ß'åÑæõ£;ÈÛt–†¬ßÖñ¡â{
Ägœ\Á”ÔÛR% ñ€©Ü¶ò¥Vp"ÎÞgˆ>ļŠéÔá JËÛk­‰›ÄM‘Õ
‹UëU՝b±€+lÝ¥ÞT@à ~~‘H™ ¡wh¸B²vùvº!úë“ÅÐAèk¿–M¿—BúÚGÈžÿ	ÅöTÅüLlG_ð	·ãä†ØvôKQ½¯þ*È"2»ûû¤ìÇ?qÍDJ~dT_®2ÖdQ‰‘e”LE5A4ÃäASÝÅߏ<âs4qœk.) þ['QûJ”$5uÓ¯“1TE@¾Ú3_I%‘ˆ¹Þ.Ρƾ_c.Ì«¯o¦Ëžü!¿^×~úða}Áåj©CËÚÿ}º/âŽã*Hò@Ç×Gò}ƒ•É¶?$¬ž±6…Rèy`°îÔð9U±î¹
) ”ŒÙ%‹Õu‡wÅ\FEfaž®¡0YQϧ/-¸Zi»±p""
‰¨%?–2ªŠ‚*­„YAIRffPY‘†T‘2ÍBq`ÑA†9Uòf7èãDÄj,ª (¢A¦¤*¾éôëþN<»:vq·×gª8~Atìõþ.ü××ôè÷w\hªŒŒÌ̬Ê%h?GŽC£Õë1k·¦pu»a„DD˜¹	CYVIE%ÁëÍUU†@æa„S,””,Tya“:‡÷Èj#Œ††Šƒ+¨xŠŒ¶¯ÎpÞc˜1°’môöõnôêŠ	 	® ›`¨–‚€eD>™ÑÌQ«Ñ@Û¦?ý_Í›7Ð<áßvaãâ~ˆ"Š)ôŒŠé{þ®4<AAòtÖ©¬ÌJB˜)…ªhÖ`v„È*’¨X€mš„ÔSËñ`†äÜ”P4% UQIM%-#Ç1š”b’Œ†—!¢¨î½Äì6÷G-”T-¶5!×
Õ¸»`®ª¼¹ÓöOú‚‘b÷¢ BŠ”Q û·ZÐþGEºîþ(g˜¾*?g«·f¿—»5tˆ	’ AUNb™åú­%P êC bäÙc9ŒEŸðbèÄL
%,Aí¦ˆ¤¥$L
A""®™ŠÉQy
K3UA
ŸÑöàºBÏ0"¼¥2d‰zÉŒËA.~L0¦¤…‘B¢¨¡’•$d_zfì †•À) ¢  IF$š ¢=™CÈ‰†¯Õ†fD~ŠÅÀ9<”ÇD1)èS
%
JeØHE0•#K¤Å"¦dðŒÑ&QÐ1p€ÔáÙX®–@P312SR4†Ta-˜fa5L@TQ!@)HrA¥ª‚’òÌha¡*^4Ë7c
$D¬PèÅq|ҏªw?º?ÊuÄ‘|åüÄ萉VïÄOSá™
Á(Ñûã†SrÐô•s\SR	Z‡ T Ov` J®@;œ–…)E2C$!^-óÙõU+AE'Û>Šéˆv…«®g´³×ÑH#¶ÎQo^5q¸g"ûþm>rèãBš¹J¿æþîvL6Ó¬ÒDáÓUh?äîü§¢þ>ÚõùH8dáû>ÈÎ"ÙÑ-ÿÝð	‚éùáD?ݐþ¶¸
Íž]ÅÃÄF:I Ç}zï~û°æÒÈkÂÅã¤0B£ãè¦äA¹÷P†¸ƒßùˆð‚îèHe²ÔÓ'Ÿ'²Ô¼t%à«ð±PáÓòÜm¾*ÊÀ:ax©‹æYÞU+üùTlXššDdì‰h‹¡Ù ÷Ä6 å-‰#œJùâ"êEBš¡=Ĺ"~)øO÷Œ5¼ ×â¨q‡ŒôA@ÚêôѧäÄ7 at oú}æõý_Í«³³º…R˜Â%šðßmC¼˜’>;VÒMµA¶r
©­b…i,1Ä0 Øk@EIEK(Hõñ¡÷Iü;bsæ„ÉZ*;ëŠS¯S»hÿ‰Úz¬~-œòa	Bu°ò±–@ùåqü×}Ò-–h`ˆ˜Ò:`È;Y(Ç¥cÙ‘N‚VÌDH’ŸžÑ£Nµa$FˆCòõÙ¥JÞ= e!’jвi9±ÆÆpÓá» t]&8§¤ñ½Uw(s4XMFLt¡M"t-ºÊ¡«™#¦c¨òÖ,UA0PF‰Ã—´"¡™'§jŸ¦Ës¢ŒÓWJsn=‡iuQœ¸Æ™Ö?˜÷hnC:nÉ4~Fº~чwø?ûhbÄH€þ"fÂ`”ÉJoß½•Ö,Žî¹/#ÔƒÍP’Ê JKÚ¼“¶½c88(†&R®1ÃHþÊ&ù›{‚‹@:§ž„!lkŽVÿ“Db™¶QT†Àâú¯¾#Ã{
²¹šÕÒU—çµÃ-~ïS˜Ù„‚ΉZîpBäç[ùãÝysú?_óà[ocÇBЄٷ#§>ß~	r_·Ä|xJß%ãkk~Ââ”$ù€§O¸Võ`ÁÛõû$!„×¥]"å,&Á–aãî{Ä!KõU`‹ÅHLíVñ˜SfzíX
~]šó®ù,…ä<|·(ýeÿ‡.	Šy¸nì=a@éø¨Ùw"?gçþÉþ|¾ c ìØU¿¤ ½"ñƒš[OUŒŸ6­¯9h!ëIPë'µÿ/~:ÊU”š·;‚ÔÊãŽõÄNw¯ßELwä›pãq³w}ùÙfJ§aƒÆÖÌ£7À@$¤†±˜è¬Ä;H¬-d`œîIÞLé
OÏ•`¾·×Æ»^bÑkùhöÙ ŸÏCm×x¾ûp˺í#膞ž›H0$mß]}`Â\šiç·ô­°Ç^ñ/Ø¡H¦3`óÚ¿»^Ÿ„k±— @’ ÖÀÁ4]ð0Ýüϧþ~3ïüñD·åùqÒ–G”í"À= ¨–ù
-*‹`%Î ÷ —Î98%]0xÁ!d`<l"Q³†áæƒßzç¤àt|D?À†Ó¨èç¡ì×{¤Ñ(ðæƒ×¿¯.œ©ÊtFß³®³öoòµd±À>ž`*tØ Þ*Y†õû’7­øúU33O•ãl~4Eu§aîè×,:r∗ǽ֓|Çoužq:&S*ÖÆ…»'›³,K…jòx)º™´F†ÊÞ|Pã˜ô§ ùùÑ>x°>dã
Ï­ÛglÚ\´;Ó·0öð k´ÿwÔŽï’”É{Æ#óÇöL¬UJˆüµBÿãþ?éò
ÿï¿ýrÿ¦wÅ«užd|Í]ƒQòá•SEg±ý_7×õ÷ž›IàüÞÍ–1þ>–Åý>6(lé$ñ%¬ü¡öfƒç5û&Íñ'^PžôäÏrpO8§¡»ÊèÕþ«Üª«³‘–JЏ|vy
(6 äj„Áþ7VT@X ˜ÒŠÌ»Àa*þ‰ÞÚÄ7‹…óQü>dð¡ñÉÕ…ï©IF ³(Ö¯.¸3aô 4X/88'½j_xî²Èû¦LÇVÍórÇ¥qH9k5j²	zMÀúò¶:‡LÌÎ܍ÓïÄôÓ˜ÎÜ“ˆ$°¹\òa/À>¶|w<TœFúuD5¢
LmݱÚÅPNá¯àƒpˆŽ½
'´éÚGŸ*ÿ`\ÌÃC»>\Êj"URÖÑ„)p?xòò»d†b¡`¶!B5|2H‹Ã=¬!_FÔæðbЈry†ñ0çƒ_&3
L3–²Ãc-Yê…Œk1‡Ôí;¡ý~A«£eZ+x}ùÂF,13")¬FŽ‡3xÛQãã뿆ƒ̼ªò÷?ò«"ý!]R©Œ»Õ?Åù‘lÔVAõ9×GïK»·j¼¶=o·–¨À’±ŸÎf{qx$ð,¦8¦H¸‰‰¤ƒ÷uÉyŒ°7^cú3ääLyw§Ñç\·¬úuX>ôj
\öù9Ž,J;‰B”ض¯Ј(Ô9†_í¼	¯6|5{5ק[mðóíC‘†Óz–­×8)"„q—ðUjÞ,q]·kõ’\D6XºklTrH#€_ÐQ4´¼›|4‚ÇäùÍh?Œ¶d-ÁõtéòÔ[ <\ÁìØ—½™Ð
ټ
ÿ?c¼?ñu¤R࿈ýêÆYMââá7
MušÇ"þî±ß‚CÝH¶sµ)!ACÍAÝŸ¬Ë¡6¬/Ÿ«*2’bW—"Çä÷êô%»*ëK6íMÛ†ØC>xîvŠt°µ^9õ¨, 	a…žM	‚
’HT»x/ïÍÏÛä±Îð°\ð7eµ€ºµ¿ø-¯¥•SŸœsÓ¨ô^÷8X+û#–ÊÃG0¤–íX‹¸7‰Ç'´]©iµ{P翳^aAð3Hµû²÷mÄç>ÏëùM¿ësöw6AíÄE1„ˆŒÈP!@~7ÿéϧõ~ÿ/´;!gÙ‚0D©]€ç×µtŒÑGRlÏvb@\@9L)瀅㑯{$å¹Ï0u {ÝkïÕú¾ÈEŬ.TúmEÃ=ÞºêÍeÅä¹WÃZžXoÐÔठ¢×/"n >ÄþãZHbžoajÅ,¾È]<œÍòŽóÒ³éàßúk~Åí¼¤É	„-Ó¾.@`¡„—S ìyZðßÌ~®þ~	»[w&äçåÖ¿¢š ŽØ‰ü¡·ü*”ƒ X³ U¸7¹¯ '.wkBEƒ¨±$”;ú(ãÞº,Ì@Ò(Z9ÅèaÝ“H»89±çø‰À28î7ë€m™òçV†¸$JÒØŠø “‹×­{ òí¯K£ËRÀÒ€)@N?¶¿ôøï'û‰ûWßý½Mþû<ãV(wjDíÓ &ç­èêëôk¶˜WÝϧ‘ûDOŒôø_üôwró¨Gùþ43~ ‚R”Î<zž?òø屸õÕ¦ÊH…†rûé8¼jLzýâ–~¢¶.9RG†va‡x¶uÉNú¿ò™O#t\5¶ > Ój4°Eáß­^¨ùξî5±^Ó5E!ççÎîßÃn&]÷÷W,¶‰°`®ðØš3‚`(Dža†âA„¾æC¦ñÜŽPDXBxK		~ŽÛ;¢©¶z4uÍ\ÏöX1Kªµ=ñý8V%ZÌì,að@ EÚ@ÆßK8 ,7åÕ­­ÎZpĪñü{œñ2Ð!Ä×Î-OëF,#ÚCežsJC”Ý^N_ïÝyŒ¬:3zp¥
Ñ_Ý­ýñ^¨óŽâQþJ  Uð_l–B³ï[à"ûœ´AvØ@œà¼õ<³9Ñ®·Ü«k)36…r€[ÂA8€í~óy2d‡nÚ]ßtdЩ™†Ž¶“–E&@r%•/pOÄ¢”žæFï©d/çÊÞm¥}]|:·qßý¹·é­±¹åeçª99­edóë¯ÏŐ:ˆÜ4›``€S
€Å‡Gi|¢å'´¶yàÀç;Пo’6WoÝ¥¸@ïä¦þ]Ý|‘.zâ[€ÝѸÆã¬B¢ºÂDCJ6©Ý$Û|~N7q
ýXõpÁˆ·ÙMJŒ„Þ”ÑìÑÛ
$5¤û*ÖÅÇ=¤ÎîQ{Ëé¦8^oÕ¹`ñ•ÖÁØNŸ#vêÖ÷K
j‰KWPãËîÀ~'ýïD£ ýE·›òÎ[¥'TþŽ_›ü>¦ 	ØüÃÍf/pÒÕ5=éV‚M^¥±nËjU]ca$kýö/^å!úl¢yð%X¬±ÛrEª™!(ªJ?»e¬(Êh‰¢’(¢¡U©j’ Ë ¥©&©¨&”Tª†(
$ÿŁ„j2Š•@ª@ ¥	 "¢j‹!ÖŒ ™¢%šªª
ª¨*¥FÖdTF@N²i&ˆ‚µ˜Õ…‡­±ª‰ª[Ïª~Ç
Q‰¼ÌɈÃ0¢¦*‘Nl"³¢a˜ª
4f%4'•SE
o"=†iFb*hi‚ˆŠŠfbta…–Wo0ÄÑUK\ôøzõø¿RÑ0Œ8Î$h`Óð|
x”%€ýï^|°¹$i̦9‘·ón•í]vÇñqþ3\Ž“{a‘Œ„l£pnA`ÈÜŒ¢£§¨‹èÝÏ —h°óQ\#U	uÅ0!;’ÔzN-¤z`¹Ñÿ@—åÏþ?rþ
pß8R¦Ë4ΐ¬uc!(ËO
¡°±M²±ÈA˜÷-”3Ž*QˆZ(£¹p<õù~í[kT7ƒ®20µF¤Šnß¡78ç>¿ÑáˆB ?/þaH·—ÐÝÆóæ—h¯âœ=ÁT…r‘¡tb£½UÊ;ÎÓs@±y‡²°ô{øejƒýÎñ°VRŒeýìâ'¶+e¢ÑJƒsGî&«h‘­DÌðYO1
Š§²§Ùó0}
U0`C¬dùL?XiÙ	cUnI™ÏâÂnP`t‘ËF¨p™FJ°C E·:õ©‡uJŒ0·9IÆU(&«ö ºyìý±²ÚÇ°I•(íÅC(|×S—2AwüE¶½ÊŠNÛ;e°u
iW-?Š«ÿ‡áÇU;­›ZM›s+ͳ²·tÇ”Ê3Ó’ËdFÑ?o¬É)¸ï<Õæ`œ»6ÿo/]«²J“qý¿ÅÌɔިæ&ëÒ{ÿ'-aݹ¾HFÌŒ4èÊÇs‹)¹¬"1yK ÏëµDD™ì$Â!´´+ýž×Ì¡Úlk¦Š+¢Q3Mf0EŒw+€“ÕF½ÈHBJ3ñPó¥z98Zcø»o÷cŒ-²¶yMøW/‡Éù	Æ"•íB	·;^¶Xù'VEƒ™Ól.êÅ™ d‡®Ö¬ïâj‹d
Ñi¢´OËnoìžWXˆï79Ìþ±I.üþ²?W¼]fÓÑòöhóìçª[úªp®ÝWîdmYínË²õWüu„—δ8ñð±T˜
¿:œê§ÔB×)
ÓõãF|(a¿ßC„݆t`'D/”A¾Ø“ðóñÛ1íÄ+G†t&5¨æOðÏhN1‘1‚Àœ"ì‡ãrõò~“«§ì›8m5¸¾†ø]jp¿V½/}ˆ!ƒì9Ôf¶Ú%é ‰Œ¢*¶o=Ö¶ëX¾g[Ž—ç§Õ $RIFiü¸†Ü¹Ûà¿
ƒR÷Ù†~ï])\»´qUœGÔõŠg].2„Hù<£UüŒðg\7HJJJp7dӝ¸T°é<9Ì_z&Q|èÎAaR‚U" GLç€H®-u:±NºD{~„?VþW]ʱhAÝߐ1ÑÕøË›µþ‹@ø¤‰þ«—ñØQf¶ÛÀbêç¦T7È`‘`…Œ¨X	’¯‡‹¥Œ7Oy!6KÙ?YÊzŠN*×çïöÁÝÒœô"¢ª(¯Ywõ_ÚË!V‹Gö Â6ë¤úÉv‘N¤öNQ<Á†v³_”¼m÷¾µ×ã^ï"ûÓC7³¸8c#‘ŸÖK†d†kˆùLÑ$qcT
¬3Kªƒú ˆfL‘Ä	:3æō¾’÷þÊ1(0;›ƒ
Šë5pLÜ»*3m253 ‰È>F=뎯<ÍR-gJ# ®oˆ%Ôx;i^—55IСסFÖ}¼aeúÂÍ¢H3W2Z1÷e†J1.’ŒÓùqûß(ifùŒö~î­˜™G”ÓÓ¨;õ¬(Р뇴S9«Èƒ»'&ˆ´+¢âŒ'€˜˜åÅm CËæ”ñÁ€ÑõÞo@´4¹ÍÕô>Ìáq@>82 È"²U¦ßW}y§Ìú¹î>}É»_Ÿ@M{k>8¯–ÓíÄMÑ;¤‚4©vΦ=´Ù.PÅžIº	ˆˆs÷S”/w’Qíi8T¼9=VýÂæ&CÒ¬>[!¡h€¡(öf(Rº}8Ôyöù÷ó’~+¯Lí@%
@PHkÕ‚wJ;¡8Ï“@®Js.s‚¥51,õ97Ý ÒzâÓ\ðÈ•¤=Âu}{MÜ귐ãa–ÇY›ÑB*Ù!þÚ$òCQÄâ5˜DFf¥ÐS˜™I‡îã·Áäžû»ÀûƒêçÁ7ëÃVÃa§ÂÀ¿‘í§ÿ"Ÿc[uÄLjã`òÙxáëϬþx÷PKàóÇ´·â¯9«c¤ˆGv?ëÎö^Ç~&Híu‡ñ9•R0êIôtIמÀ½•DW¿ÕJ¦È®É&cœý@B‹€òs'—Ÿ-{ngëŸې"nŠå¾ÆGL4Äã\´ŽqÑEŒL<´S!ØøØ°AÚ‘äÓKéõuõøãæÏpnHí¶Ê@¹Æ”1êŽRáω44¬hî²ÞI àó§›úüIµuòhj"o ó®öm‡J)ˆ`Ìš‰ åײÎÇ´Ž‡AÂcº/Hš\Úh¦¡mf&Ã0„a; QåáÝu¹Ž69îFT*5™›­ŽÜ6/D*$ÃQ”:‹)x‹¬¢«Ëúþ\ÐHW6¸-›ýøyíxË›»«Ÿ–¨ƒã­ƒ‰àb#)âlˆnAö‰ìþ÷¨ü|r=Á	vpù…RÊaEVdOc”Œ¯>칃ý~‹ó¢Í}ôÕ>Ī
õ~¿¥ ò…ïþq‡vU¿uL0–Œ,ñ²·q žŸ›ñòêëÌÜmøõù? cPïà=Áê¦D$’£E$¥’Yõ‡Ö¿&£)öN/o~Üýu}‹ïË Â/}cµÖH:À(4Âá²—a($†”âˆL,ˆ‚e§dI¢
$É¢¢irXf“ц6æ¢3²0²Z™™ƒ! hʐ(˜™h"‰ÆªÌb2jŠˆ8àCÇU™˜Ð¨~ã:’!¢b¸Ì@ˆ6›¿Êí®Èyçˢúy½Sè(£à=Á˜zö<)b°¨#ýŽ[µ:¹ÿŸ*?Qþø˜ž3¾yŠsSÆ/n”ÄPÄ»ZQiÙTLDáÈâJ«*Õ2XŒÄó%¦¨Í¶T”"ióK~ý7Dò#EÃï§+qŲ0I¹gY¶Åïž\—¤9ÿgOd$BEbS_>8Í)ÄASR‘2‘˜å ST¤)A51NQ%1
•HÑ@a
9Ž*Ñ
%¬úYÊU]]~lD©r6‰!Io çû?¿õÚygÍþÌÿ!óh&C%A1ë d¼ÞP½~Ö‚³
‚Šà±ùߪ[glîòtÅ°'ⵏ–‚ÞÝԏH6',.§$*#ªÞèÐ^x	Q!…{ù¹„K<Óõ©ª2Ù9"9øÙ¨¹±aÍÓI°­?—ù7ÉøðÙÓs”’'»æ§Ï=ôb/ñôIa%q%Ä»ÍâE2­Quv«ë¸yê—Øo‚wåÈ™ŠÆbéåìÿBÚ.Jg·6ÿ¦½B(·±ÝÊvŒ¬KÈDLÈ-@'U­bÝa M Uœ(qáO>ܶÔÓ)RùKVš{þ=¼wýc`ÐÃÏ@03§ltÞoáÇß
ˆnê€wB’#LAI†9T?^D3	@ÒTDBQ at I²kîôD<¿9ùXáÙ”3 tD
üÕöûgª!zE/×$Š­…€ð^nÇU_E`w¾ç9䣾ê‚ü'¬jO¦¡Ô€‚C¼±¦BüóïõhÒC˜7ÝöýZØ/JQoíû¿÷É+ãPØu˝¯³gV~KŸˆ„Œà&‘j lŠOm"ž¸=ÑMØ)(Æ„üp¼Héß)Ét™bræÐÒü⣌Æe4ágVä;p<Cý§Ë¬+ÇĹŠiÇ;ĘÂÄή3§„!ÍPAîQÏØ‹q9ÃŽ;~Y
€L	Š(QÔ¢%¼7>ŽäMÿÛþ긲¶A}‘|õ§§y_,0ä}¦½ä°@çÄÚÿÔIPz~
 ¡‚¯'çé~]–Ð<—SPjÌjô$Z.<yZñÑÑÒ=û£œ!ª]˜¶‡þáz\|AUHp)ŸéÙ÷œë”uÏ/`Yâ,
juýÛwæ,̍ŽÕE½Ø@>Ó¾#	Q¸dă/³yÓÛw?
ñƵ<E6ög bá…–âÐg	ထ¼¤Ð%dnŸh¿ÞIPm8‡<ÉövpòÈ{‚ ¶úÕúGÖ#w5äµP÷âÛà@zˆ™ppÊQ$¸å×µÀKÊ%/×1^â>z.½W‡Ë\9þ)¥|ÿ¦®Ý3?gÉ‚þÝß)ørEãQýˆÚº¹ˆp¢Ò:ûý	„ à‰øYôk´¿IFûtÈ}L£]P‹³¤vÕôê>Îõ!ˆ
BÖ)d媗ϫl,€n‰ªhs
¸SàD Ê+٪غ!ˆ Z5Éú/Œ±Û—\òl îàÎp@äeBC'1¸z~ê²ì±CGÑEXIã	GÜ=aó¬hc»ô–«=	;ƒM³Œr±¶š§ Á’?þ%ïä΁ì¿çµu>ê.gí»/ÐâJƒo…þ[™&ÒaÝ®ºëêØh¸qiÇ>uÿæEòFÎ}p‡šÒZ°uzì}ÄLË
€ObtÃ’^ÑzRÅQ×ÙM®_EâK$?+*ê:ËIýòÙæ@-¢
Ÿ”Q]ª÷€;û‰XÍÖ=sy_ЩÑ8˜-Π‚z¤ö\ª‰ù ¾Ñãð¢F¸†ìq‘ýé$‹l«049è‰3«Àä8K?‹ÐÒ[¿õ"ÁãKP[ᯎõÆH‚T€Þ¸a’†²1r¦Aó(òÀ£¸ízt9_}(zl®N;äéIƒ˜‰$M¦× òÿ)¹­/|nòhµìçÃÛƒ>s>?dôIÒ{ʊÞ'ˆ›|ž=ôNBŒ¾§/EMj*ŠEÏx¤J¬¹{@}‹íÈæ“Q¯ó®ÈUo}u½òU°Èïî¦ 8 ´)1V°ˆ ò$uMD	
¥ÔWkYŠ—jr¦ývLD‰‘K)ºMK„‘,ª3èñXÐ!rLç=¢mqÌã.µñ«ˆÃ¥)±&÷y}šþKpÔ¿ÑÀy6óMl9ûº25äSÞ Ü¸(:’ú•à:dƈC±ª=–½.ðÿU…öáæs×Ϙ‚OôÝ­ÒÄVppåjÕlΪÐ,
Å`ÕBÈÛ4¦/A]Ž<bv)HÞsÛžfƒœæŸ×?‡=îõ¿b"7§$bcB dÍðø;ÔC3oxðÄþ
ê,ÙèWÀìQäß
kßÈcí’ óóùZkñ~<ÒE–»}’´ÍîÇVÕ'ÓÓ;kÅöG·Ìú9)ŒËäá)»X]ZëŠFÐm“áKÆ·^¡È
!’	ÑpzG)ͯ£nAÏ»ÌC3¨N€êÛžü%‹«ÎÅ*`ïÐÑ3xóžèáÔäìh¤ºâ”R]»‘éíT-?æ¹+°åë©úᾪ´{˜:2cç/_~´¶ÈA덑„[øV½m<ÁF^Ô£<ÝB½9V4ç¾"8,,B“ÑABÖ±¤Ѫ­úqÒ¦AÖ^,I&ýÔÑe¢ÜéÃÐ,a±z#~ù„ý&ñžæ NU^Û´iV&¢ a)²¸)%b±w̤PpM‰H€Ì‡‹‡$ÖÔz¬a ¨:^ýIM	¾Äé˜õøïÎx;šO­LvpÈd*ø]×)Ç=hˆq¾‚Ï8ÔQÜZÓ¨ púñTCËS{UWÜìuç¢(GL	‚^Iþ_*µªÒ;FÉ£«}BÜç@pæê >ÓD}ªZ$ð(‰<Ç]ŸŸŸÁG’ªžvÇŸ´-A¿ŸlC ö6ûlMÜŒj¾QˆUÏ—xñs6$ìäm¾¾^ Þ!Qù¸èl;ñ­#\hÁ —›û9'D¹D™áÆ4o¦¸Íµ©èZ‡ðüÏ–ô‡I—GF~ÚÇ¢FéÏ»MÆÌ=
:kˆ+7üïL7Æb¡7JSH*`Ô ‰“ Ï—Ëá˜>€»±´¹{ìúñæÖ4±¡³Ì¼˜x(3䐱öÕÏÑ•WWg›Ðvx:Äl$SjVíµ"Ï8à'3b¼¤½8JŽ¶"©;Y›(µñßÉÁ½óJ˜Ï	ËP¬s‘z\ò}Z'$ÅFz{Ì»¯®u™è^b³tèŸ]zHßU>pë—álÕQ0Y§1"¢„âýÑx$ ð™6¼¯µ"•gHŒ˜ÓLß0"*{Ü@Ö‹«ÎøèÙ£œeÕÒŸ õoŸ‡gò{¾ì€ÙC°*j¿S€Æ›e)(@Ý“­på)&øMûøIL•jM•µAèîÃ"èQ
<Ù–„Î@ôë­°ßEt³¯ö.‘ |!KŠAõzDïýÝrWêK¦CaýOŽ‹ §bwOfÜ¿å¹UÜ
gÏÒD‘¸¤F®|]…_”ô¾‚C…Õ8#hVG¨£kÄ
z1H"Ï—ëÓQJ'ìË<˘<LÜ÷¯¢K¨¡äÑg1ìúÜ+ìj¸?&N½_ˆ¢õrŽ÷A¨cÛDn_뛸$q®ïڝÿ7HD@ ~<ØSè#¼£×Ú¹åŸFGÈ"^ߟ¸ûÏáãG|‘
BF	ª“<nê¢IúæŸa™«§õv}>OܽؼDNÏû¸D÷¯«›Œ6MÐN-÷DãïA.€jôˆ‹«éÏ,ºïù
~xÃô”y¼ÕÇÜ^£_›eH‚nTùIrýnÝeíôön	ÿ%mj»Â ìŸÕC[¸žÖî5øP!GxJyƒ•9œŸ—ÙªMD¼dj‡ÛnØ'«‰¤&zkÙ}Ø ˜5ö^Ê7¦uk¥
/=d0öñ8p²VÒž&Ar×YytìynØhÍæG:(×Õí uqË_!$R2OŒÓ³·›×³®æq„»R%m=&:R'l>4šÜ5[âàVÿ=æšs—O”DÏ››^¾'>¾½YUEë;b]þÌú®^²¿g äÏq „dn7Žÿ–2"TūͨÕ<$-ù36r›Š$<ÇënYõaÓ^­á
=V“†”eü”æýZPþl/½yˆªsGØ4PÒET¦dª.þn³y«÷U|35·F°èË“ù,žOzô ?jЈ²b7v3!š`½HjÖzZ[dÁH%53·ÖŽ6¿ÑÕê7ÑQ<Ä=ÕÃS¯Hy¤fsCä®wwšêb”lIÿ9»·w¿VÐä &¸ð‹¼‡…ÁãÒÔ}=¦þ­öêæÑû¼•þèç‚”ÚD+²ÅY'“jØ:÷b̝YîãcŒÛ:a~^nŽ'ä_Ђn‹1Ô œ¦‡í-
N—ÅÏ//&ÑZ¼ ô„:$6Ø%ç¾·ý›e»^:ëû¿iã÷‡t¿ÖNÇYMž8Q<h®$@¢c•P/z9˜tû<¶mrszæC„zˆ)ýÁõk‡•Š½WÆŠ^¼ ¼ßÉCf£¨R`“ݳ\?77÷¢*_¶ÆÆX;ÈϤ0¬¯idõˆŸZûóDìNÃP†P‘õ' \ÞËÐèraÑ"QÑ4§ºÂ&¼ðùÄO?”õí­ÿÇǏš´«Zƒ){˜@â"ÜñïÏÛóx÷’49Ï|±”.Hd#ÇB¸± 0Q¦Ê!!(H Œn]Dç×V	¢e³ièË/63à"r½šŽÏzý‚¤A:9Ñ—ô¯²	êN~¸cûË;#øšgh¥¡¾· ¬˜Z¤’Olûp£¨‰ä{.jÒ¸µØo>‹¾š©¶%“yEUéÖe	Ö{\ac+õmœº` ñ´ ¬	GÅý㬳í÷JÁtwR—‚=fzs¹ž:aH‚t at J  9ÙÑž8 #*ù ô³„†Á–ÕpÌÁŸ:²MécƒgÃ
þ¨Á†êæH™}z÷£à‰ç·öŒ1:øží'÷)¹Hx ž+»¦ žÒ—¸DˆJÝÓ¸î²	©iE?/³}â%Øé靹ö³ØíZúöBD;×bˆÑqÁ]p¶t´Àû"ôxµmŠh@Ì€øy0`ÈÁþÞlúºÎ\où¥¡óUÌ®ÑiPQ©QÑŠPý•pÓÇ‹^)‹­±r zÆ°]«®Qûêw¸¨z’jUD2Û^ÍÀI”wÈßJos„ fù©Ø>N‚;¦À0 at A(Í”vÞ‰XÊü¹ÊRY at 3:*Ð;òêž^>­Þ«™ôeõ_õ⧯$wè0€òòçã¿@D‡ÚhHKÓ¤â‚~µšûþÏŽ»7ßgp(%í¯ñH¤ÈB@Å—"¾•¾Cæ¯~j9‘âåòàö?&ðè–
CWv_P©"󝠩ßÕg†õSµIP—…5~›ý‡evÌ'¼0GÛöŸ˜à@PX©ÊÆ<<@‰CÕ1ªäó›Z}¾”[,ç·²‚Ƶc­¸iæ׎¥
dk6lËmÆÁ²o÷ˆšZÞ¤Ý\±ßMù™õîA ‰§‡¿fx¯J™N½Ùp0úšvrÃƽy0‘U ÆT~ÏøÜWKó-gh9ÀË&’$‰b&aš(Hše¢š¥r‰q*’¡µáÏO;»žógÅÇf¿*á¿ìÊ€Üj($é*°!Yˆe`¾J0pK=ž´{W³çA;Ö„Kæ‚`D²	ø„J2f­Û	×­ÞcŽÁŽ„öß`ç;P¢Ú×xû%ÐKЉ¯ðw›øßÕ/ð4ão!9»xý;8 >µëA6fm8!¸.õQ쟒©°J¸'¯?H„Š=}F¤ÈËÝ™¡¢û56ŽÕV·(Rë²È9å^¸F“–ÈâãÉC+oÎ!„ED’I$xõ\Ç!šÑÏ„žÐÆø8L|²§žï«ðóÜP. âñPÁƒj~–T‚Áɤ—.cb¼…Jãsn9u`zÞã¬ÃŸ¿fŠà(ã¢0!¸p×s¡â6‹©Ô7v:ð¼io†a·W[ñí$5ˆ
'n~Ääæ34:<Úm+°‰=0­=;@Ž
J’3Éçš½|¾fÅÖE×ñ¹Œø€‘½“vî#tT1À9
 ÒÄr.Ž8ˆhìQ¼„~‡ÏJõŽClw  )q=Å›rÍ=xå©òDîx@•_èo×xcóùÃÅ‚ø·tƒ¢.Aáäãëínf!LF£èuIâkaØž–‡±¿x}C´ï:2“*¢·ôUR_ˆŸÊ–PÉ!Ä<A¸
B†
›Û‡n|ø¼>Ôœ<y“»§(ôˆ˜ýˆWý¿'Õâ¾	Ã}ÌÝÜh°DäºjÛCÍ/‡µòežØlщï_•bŠXÁ#8ü„LôЭL¯ìž8tqô[Œ Ý5•*×Ûw™ÁÀxC$j欸ÀÍUTp‡bí½œèÈ¢=ÅAE51¬0¢&¢“Ó ª·˜Ÿ…¸
)˜4aŒ•I$%!h’'0“	ˆ#á™´ºá£O§O#o+	i×ÙA–8Þ‘Té&L“vz‡
þxœ#™KÄ_æˆ@ƒèD1†7¶ÿÙ`ãx~X¦Ï›Ô;.	á£of_GRß‚Æ‚7)P@‹Áa+ßɘ†"$¢	ù»0ß僋wü?ÐðR¤Áq†êë`ßwj€§×}L~Y®9êL…ÂÄþìÂÐìâ듘dXùáá2©¾JS¹á{®zéOÂ:.™ëùOÄÉe –A=¢'‚'Þ·²	û—ˆ$^\Rú¼õó ?¯äåÈÅo·«Ï[Œ;¿>Ì{h»¼¿ŸÀÍ6Fzä«Za(+mŽ6ÛQ¿(µcÅc±¶Xˆ?Ók3ýÐÖÈüeÖXçÕ
:Ö
;n@£¡mHÂ]J`ØÜa–ÂÔÛŸ%1¯„{ ©,Ö}*éÅAØw<X… ­2ˆ“Îî’£ž'URnçˬû1ƒ!7¬" <øs?‡E²³Ü<Ú`䆠Hª0z©!B‡(dqg.¸^\.ݐÇ=Êè"6”TпwÇŽò€ÇÖ‚|‹p)µw :é2ÖœÀbpÈ}Þåøõð:åDT¶hÔë^VW"Àt!æm2£Â<o¶Ig胲Eîò¤·\üW)X[ò1ü!ÅN|3ß³í¶<Sª)Ù<=½Aú½¥1Ø­ç¶#×r¯ç>_ƒÏöôë>CÛÕÝë’&°Þ¸0[*߁鮛.è¾øœ‘üÊb‘8û½öl|H&1¢«X5Ed$âSsÏgÒäê)áAu0ú¾} Ô÷†EAO›³]¡`ˆÖ]ÓùŽ’(øšÈÀ§Ü©ï%'æ]‡è9’Iªªªªªª/³:Txõ̸ºG¯úuªˆ&¿2¥åÆe59é_çdõõD~³Èú™RÓàr,ç3‰$ÆX,Ê8±™ô7Í!ÈkjºBÆçÄVad$¢ñ¦~ÚŸ¶F“ìAážÊ/·ó›ÓìóvÜé1t+)!8ì$:§»§{©èk£ÈGPLÇ@Á‡iZ‚€†bn¼€?Ž~
uÄ2àÌ
'aG§ØRÛQ^—©k]}I¢ºÄzßwû’íïïóŠðùGñÿWë}¶þ#†¸ƒ§ßëϪtªÕ¾J)5ŒÑ’¶°ust~ºW¢’«±áEŒMªA­øOOÌ#gŽJÇûþà˜Œhclû¸öq[û29Pé
Ï>™½³ã&tÃ!¡?žL<³i—Ÿ<QçÇv»t×|•­_½EÒ}f#ó?	·ú<þj㍸ãÄSð;–sWŒsÍ1ð®óˆU1sÒÑÃÃSܘS-ñï.¸Îò@k˜'3˜!¹ÔÒTæ‡'?g\ç5FeÎZËCÉ
ܵïZhèÒì-ÂwÝXjŒ…ŒÂað…×2g'½Þ³ë?£³Æö˜¤ï—¿SÉãRâÌãSu8em±ŒvMœLæª2 zÕi†c›ÏµcCáb±lÜ•fk)ÐwŽÑ•Û;—>Ú8‹æõŸ•õ©e÷vÌoC§Çvâ[J"êMäåjbÛÖ~3Ø¢yh~â9ÒÌKï1®¤‹.ßZsóç·
xÞ4¡:^
›˜(*šof>hû¥«qÙ.¶U¥¡4°FÕà-qø\ÊP" [4+p†A…üðräg'ìÖ„ú@ý¼”v„¯ýÿ¾É(}dÛ£>Fx¿ywîšT@»9At`6èË"èÖ†çóéÒù³…Nþ"®`Î]ÍÊ[ÎêùôMþeuî‡Þ0E¹vg{<å†pªÊò©ñm¤5awë¸D¥Yäý½«yiMü"ÀZ,V0„ñóI­S÷'-Pb4U%¦¥|%¢*ƒUBó[,SIAÑ:ÈÐ--ñ¤‡3ƒ]·!³ž¥t®˜ºY!…–mÉ)i¥o [§tá
Õhk¶Ç3 Û4T9j²®ˆUßÑGk„Fá
9«½BNkº±^&F×»5s9° _l~ë!ÞÃFwCÀ-UîÆwà°\ŵҳ×_y|ˆyç]Aàd{/ïD†Ä½Ó:²hn¦áúVÙR©ÅÈ“xv=pì˜FÜÝnº*¡tóþ­áí-›ý9˜ïë÷ÞjŒ”ü(ûR™m8É.V ꂆw;ê1•4ZôwÜýãaz€n)ÕÛœP:»"çzrVqßÛt s“¥¼\ùÊØ阧Êè
µêg@Ÿ#0Ýa4·ôΤƸMïtW­:óª{\BM—F%pø*­Ï–œsœº¢]ÝPÏÇuÁŒòí–Ýþnªó(­…ê¦JðKÞ©g–·s8æJ{.¾Ïžª4ü[ü\°ø[•!V±Áߍî+•d*ª[/»Ÿ`²Û«äû2ק§ÃV#Ùëüz¾Î£fá=/õ·PÙ=.lx½ã™ªv-(B¥¹QÚZöºÿ³˜æq>VËã\ÙÄڜֶ晹òó¾‡×&1“ÅTƒäûߌ}-
¶3>¡DŽƒ˜àö{ª`ç"’ÇÉøÕ{›¶Ÿée‘§ˆŸ…ïºÿ-¸­Wì‹âS&T/0zJÓð¬<›î¶[û7ÙléÖ×…sìÛhùÂúg Õ›ñú¼µT
ÞŒþ\ªºz`¼VЛæQðGÌÏìË<ƒkã>ÏaÀwþ_ ÇæëçQwSD Ap…Zcìa‰[xijŒ¹k·ó;ÂAute]†:§iáˆQx* ò­*ƒáxˆW@ɜγ>‡Ó$ᆕºfÞGWrŸª—kÛȪT­DALÒâ‡ÒFúÌ}͇šrðn|qtÿpù©„ë,¢¥#ZøØ¡Å…y²QÀM¿b AÛQæCRŠF1“‡*?ÉXêkÛ=bM¥«v-,?ñ]b¡­ÄC¥XÏÅ× áŽ;':Æ#5WjsûMš=Á¤ê(ªFûö$­›"ëØÉ$GÈf	®É¯®¿Ši	§Ï'Ênå)XˆÄrŽ[§=r¤[%g9Ø]Dâ°Â2"ðèöÿ7?ÑïpÖg§ˆo”×~̈øàÍëÉ®\Œ5N1­Ó—uhëùr÷Ìk›6r±OÌ¥[ñ±Œ+M†Ê¢„MïçX¸Ÿ~t}ä˸OS®y×Òö;Ëï;ô os¸Iñ
(kàçÖÖ½¢
\›¢d½ñ¨…ݱ‹Ë·¤8E¡ì½à\P}:—Q8zV™Uâ¥/€ã«³Ž|©ïøé2-¾±,:î•“£¿7#¦3ŸäcÌ==EWâ½ Â>¿ìÖ¯¯1½_·}S°àªŒ8³U_^õf#g'øÀ {®‹˜’E}=ôMÞnók¦rL–>y/'×Cc$§ùO
7XàŠvîN÷Àܐ2†Î~ûíÃaž0@×æ$mð.l947œ^§.nÊá®iꮏ}\ÀÇM©{£5R.3KßdeùõW(Um’@ê­“*Ê£ÍôÔ/­õBå/_‹j\IìWš°^¢½£gB£Xt:ûK˜a‹ÝV­ [;©ê!ÕÙQУÓà©…2éQ™ˆjæ˜'¬ýÿ·g[(%!…XjDÃ'!Ø¥"r9h~6âc1]b½ •( ¡]ë£æ€[|n“¹×uúž-Êøür!\ †õJóZxÒÐ'hV LˆÊe—X)nóÏ<Åå¸o…ÄtB“k®ã5ý8A‚ä ´¡/Z>±Fì3?Ê¥A…®!æ§/1c¬Šs“üM¾.<¶94Å”k=F£SÜ ”>%¢.ôñMòÿ£ÓÚÇ	1´å
òŒX‚„tîwhô\ÃŒbÞ+ê¼V1‹Âи#ç7u‘õÁÀ¤ûÔ3ÁGM´íWOH—ãÑÓ:]—MGôððsëÝ΋›²2Zä³?†WŸZcCwýËðËñª×Ñq®ÐÞçÚ)eà:ÇI’7Á2AG0Þq>âö*òüü!fÙ{UiÒ6ŒÈÂÖѝøz^$Ðœ^é×'ÜÕÍ`zÂ(#ÌŽù¡VÉ"~„S±oÜn(”A;6ߪù¾©Ã']Ç>[-û./˜#$X	Š¾w®õÐ,Š›k÷ùtM9ÿ»Zg(¿UÄ6Ã8‘½]ôÍ›­XˆR-AxEy eÎy_b30ÐþÔ(´ªÕÕ­ØEÒŠ
eA½qú¤²ý›õ%á”ðÕæ:¢°<Ô1‹+Ít8™c–ð$d=xž¯“f µh¹ƒÛ§)"š
"‹¸åÒ8ã¿1 ºYñ¦¬8M­Kˆ÷ק€ðÿ³…£§%¯Dñº×û2·'l
¼ñÅlƳ»ÅöS„vrùùA×l@ܨ+1~îé™i?öaüÎ Ê)y–âÜc÷¦Ât½Ïåh£ì\d§5c56!Oçž_Ï5¦æ©®Æ BWöæß™4P•Bw­SW¥¾—ãfƒÔäÉCçm•šróEú˜3åfÚë'¹•†„)àQ´:~µ{Ì–è}ßhÏxáOðaÌ*¢ƒ’xõõbÃ×Óêñ^ÆM…ÊUÈöØá؁|KŽ2VÝriåïÏñ~…óxx.‚u†!¶Ø¤ O¥‡™TCpýp?T"¯Û:±ÐÐy Í°þ§5:™:\M`ƒj©ä/P y?:‘4ÞSˆ“G%Ø,¦ÑªB¿D:瀢:ͽ}£Ú=¡úû;j%ûèÖ~þ[8qxØÃ=òî©„˜^ÿ8…oúZ=ÃÝøÃ×P!‘?°êhŒ3ÝN$ü=ê?α‰õ—œ‰Ú˜oÚ³øâeúà½ùº²¼æi(qqÒtÛ²Š±•J#Øt÷ͺ_Ü!mâÔ] &£¶j‰=‡';*=ä[–öæJ"<_(.øŠ‘=e%™
´Ô-¾õ/½_c
–˶ó%J)ûüæ éÛCÏŸo®ædª¢nžÍ9m~rªI$’IR4Ü7iú¿„ºeª=ÜøÝ>G:Ô½‚1¹\îs«[¡ÉÉ®ç@ÆTžLùKYóŒ$ÅŒd*¢Âü$ñBK¢ªèìiáӷÖûóZÄݼDC&z%quÙÎöòRÈ+õ‹mlaÎ
Ù=´A@
&wӢܣ
Ëçý3’B¼·°ÔDÍ)mcp䛀±Z1@R”ÅL‚ú0A^4.¬õ¿=¯™®¥³QN×6xÁ-tW^H$ì[¶(q yEW¢ÇR?‘]>/L&¢`âÔä&NIQf´ tÙZÓƒ%RE¼J\ñãC¿Çε„X.$á˜Rå)t8VP–bŽãP¼g¨lÙ‰ŒæAõ5ìçø^¿ø=lù$3ú*‰*¯Iƒßæ—0èùuýœÄaÍ«ëö;8Ê;'̼x+ä$!WÞ»¼FÙ‰k¹Xv…¹Ñò}L1«'JJw9Vä bGn­ªÈ/øF–~ Ú
‰f±ÎhQVüB<–jšaàæDzyf·~Ýñ8$G_Ì8„n‹ƒì]ŽcŒ†2$™rfFÌ}EÖëÏ¿¹Íñ#s%Éîzç¿ÿdÇœÇX[èñL3r€é­&+Þc>ãž‹~àI-
Û’Ú…/˜Š^æÀ® “YlqÉ Nj½³kGuUã,±Äjð­…¶fö®N)žº\þí÷Þùç1cѧ”¸ª
˜M¬{˜ù|w!ŽÑ|vznp@“ð–eë5¯èÔ˜@DTAm]$3—
›]‚PzckèG *ý˜«œkv‡1|÷ÇUŸ@„Ùï"§l`âûgêõŽÌWõµôQ2ÃC„5XÂ#Ç4tÅ$¢À‹ýñ^×"0Ö媩.kÊ.„{ÌlWì³·GâºG9Šj"Ýù¿‚‹¸ ÀVÍ“zDê$c©sQ™‚È1 AŸ¸5aˆ¿äˆ»Dêðç¥^Z5òQ7vÑÒkß(a·o
¢‚¦:ëÂ!ñ…«`[`\4Ç #ƒ"ƒLs¥D:¯úHƒ}/ª~­˜cêÚ ±o
P’¨Óoñë¥}yZaE££jH¾`kÜå÷ë
¢š
†¹ì.eF	Ð=­áÊò«\}|Kõ{¦ê_ÊD10t$8†ýlx‰à%°ÚÙ1 d&Û~Bìn-‚Tˆ$¢€­BÀ¡aÔÃÓ‹•ö³Ë—¶¢Q¢Š–×¼œ¦Ý%-UÕÓj±JÔš<™\­G&¬¢pTHiñ´wü9Øt³šïÓûõꄯŽ{¹ÛÂ~ h[‚X~–ó1¹"kŠ$…ê3H„l÷6“PªÖ³e^Z:BÄL«’ÀÊT£úWœæd@È_uÔԏ(ëçKÈòµ7n·êõÐiÔ?Ÿå¿›_	É«³·\6žöïŽçbi­ÖíìØä5z=Ù§± ÃÙ¯Õ´!‰hÛÓÑZÆÿ®ò­ßPjD+‘GžNÍ×—ì˜ÂÐ`äÌ¿Û«7}=DÄ›ZãÕ=‡ÆnäŠÄ|ŽEÿ3¾Ç~G£‹~U«ywä½ÑАíÕ‚OeÒÍ`…Ì,Mv-Ç@P#$å ±xÑ«c*o^¦DHfðã•Âf†×Vâþ5QMB/#LBÝŽˆÄý|à&5ù݉k-þ¿®c'Íâ&:Å"]ûy¨úQð§~¶ªgD±Íœ]XSµÄ­‡žÝ3	´GB±qø:™¡ž_»Õö}F3ºÁu•cñ¥5zšÁ6þ8]Ó¥¤’BûïIMr‹J\ðkó‹ AH"<—€|0[©|„~ŠU8ö×Zéš×–Äi 3ƒ7¢9È1%ŸÛ1…X$Š¨Õ|˜	{Ûf½Õ4{¡ã<Ðù e´ªªÊÛòþ.]]/¦!$|05§¹Íh$ÚUAÄDLlóãèÏpÑ
 GG6ÚYµ÷pݤRùHM_>»&½ÚÞ5>h‹fvR?Ë®ÏBb?—XO¼qGMàƒâ½€¹
>C¿Ñï×gôO7ËYôc­„{jÛ"áz¨=~ï_x2ÍæÍ·Î1[Žæ¾I5÷ÚÄ—Û6’L8‹"¼Èôwªàª	X~**Ÿ]½Ž¬È#èíQp'u2Æ1ÌuQÃ9Àëu:¤ÇïPÝ#¾h<ItM«§L4=q»×ÇF:“ªÊNmHŽFù\,©„³Ô5`ÿf	ŒmK¦øµá@@‚.'—"fÕ‘ªåÀ„§yŠVäüeúˆuUi¥* ´ipä‰! Ú1(–púGg7ÅÞâ¿Bú¹\ _ÓDNcYAæBˆJP”dz–…ýpsìÞÝú´¿tþ¥ÐpÊÐi»g°}#Ö:¡?QîAB
€gÓÎd,Uò—¹ÉÒ•9˜îÊ&®ù:6ÙWÊ*®J4PòX䣠øÎÿw²ÉÈèÛ…NNaêp¨‡Þž2Ë Ë¦o2ý'ÏrÆÕò~«û«ªsÝ×t%¿TpWpåâz#£ëŒ¢:dҍ8LÈléð²f&À‘Ï ßsåìåÇÉrÇGZNˆöJÖ„DJ¶_SxÝBå<š’ÀJzô{yý‡Ãá÷WצӶCá
ùhpû(|Ð
„á Bh"H­xnønð–É—0QúyXUkõ¾t®]©ÄK™ÒkUPWë4jƒ ‰îÙ8k%mòÔNûÀ „$A€¡%Š§…­ò}T)œ”ý!–ë¸Þ Ž
PhÓ<=+Ô5E¶-}ƒ1û"á55LD£ô‰Ëçô®«
c_ï MÛÊ $+ ¤ Ü¡ ~c^?]팅ƒ.žõsA3ÁöA$nMpÑ|LöH_ôpZ'7Í1á…ÿ68ð侉õ`ë·k Æ¡‚o¹RvµýPBÏ5D„7­oü¯Na×YqBË¡Ÿ·à5R6'“à¯wRÂÔ
ªõŠúÝ=»ô××Ð’ Î7²vìþñóàîΙGv\ós°´£T‡[œA÷¯AKΔIjNЉ°@@ûxŽ½á“UeBå\U|ÿV‡@¦ã²¥‡Omâ°Áåvª,Á8ÀAJ¿ð¾ÒdyÏp2dtë²ØÎyØS²ç@cMcr*B¨Rž’œ+Qÿ¯üÂ×ï³KY¿¸)CÌ2|mm¸¿©WfÒ€iæ<pß९/+b‹T栏0Ë”'%h{†÷h{åm=•„Ì
ƒ ¡ÌÕVžJ+ÍÁî2Ò1|/o1sª_¿•‹3®ûNµ)¹Œ2ýµÜø…twLÑÕ¿Ÿ{7_Àï9Ðå7 hpþãËnÖ@dYU`Å3êמûmá¹ßª,+©k•,DJ¤2
ìà‘;)(
°ˆt\Èë¯âоRŸ:À÷
*V7¢í–®%ßÝê÷›=îøx_Š×]TW‡e|±QšùêZ額g°Öé×b¦¡­÷¨dÚŽý P(Ϊa÷Á†ž¯è‘ ÷À}§nPƒ¨6€EúC("n’ˆÍBþ÷ÐyAðo$8Dìü¢Ë^@Ž­àE–ÿ‹•,P 3M~}1ko]–.Pa«= ±—“þHß}]v;8I¦0¯ÅâÂÞ΁ž"û -ÇÇ>{Df@ qÓÃ+#¦¥­r÷(æ°
V9.ײy·˜Ìƪ߲Ž²
À]–
·ÏI“ubœH1óoòÀðT;Fv‹·Puéés°¿v§’ãÅUZŒpè%ш	2º¯QæPõÚÜšIz9Ãפ—äÆ•âI>ŒXÏíg!‚WwÒtÙ`ô¸öéÒåa¹‰à`ˆí*uéŸÙÕÃ}YÑÛ¶æ
7ž1SŒ#
s_ßt±ïGÀZ¡:	¶<óKÓ4n|wsôwq¸öqþmvãsð_»]W@ÊC]¡ÙA×"±Vv•´U\†/Ñ\óÁÝC!Æ¡î76Q¯Äó‚U° -(0jܱ“û!òÕü¹ªÁ
‰©—à ’0(šÉ
‰ "»¹= /öü±<c[ü°»£	µ?ïÌHgÚ´á]j’ö[c8’Þˆ•â+.®¶
˜YÙTÝBc<@Ë$%é®/Dkï¨W”¹c–¡UÄJJABw6q(ÏÆJ®|HC¦9ÊAÞ‹’qã}ÝXYæ?béd¡//Uàæ$È@sg®|ÙAEd8µ;~÷YõOžê¡WÒû‰þ6QÂsQ°ÔåÝj¸‰+žì^Ûn²%Ò›¤éþ5¾•ÏsÙÛ”_y¡õ[¤×lqI¾£úD ¨Ü6…!ƒÿŠ‡°–§tkY›Gø5ÂoZò¤O
}ƒàðÜÛð½`öót­ÛþÚ½ý¥û¾º}=#9Üß×ܼ~‡ÑñøÎÉ\Œ4>¾ÕR ¼Qƒ5¤UƒÄL>]}°„ÕÄ›`£æ³È1R{OÇä`¬,=ž¸¶&'é9¸Ô`„*~2öüY­.z×{.8À>¥i̽۸•%I{¨àò‘ÝRžfˆ‘ŠÄ,.W~~«’W´+¹ì	Š>6ï ³@\wÞ¨Áà,‘©l€~÷ÛÁä¿èÕq¢tûÅοVÐ׭Є斎#J;ìse8}»,cºªÓ„Md%ªUT7ûrV¹Q8ÖÏ0'ò‡eèðÞ^8=ÕÐc(~‹‚ߤ=.»<Ÿ“àŠ(Šy“ÕÉÞ~ÉÚù㲌ÿdŸ¥7|¿òAÙcg{ñÚî‰"üA~žõwáêsPÿI›§Ô5(tLa@ÍÒ<8¹Ñj•[2³‹QÑsE®ºŽƒŽDÙjê”EtHtŽ›õJ@µP@‡‹tŠçÓëÆ+^2W·{#[4&9ÉþÞÿèq>ÿÅsfËÒh+Ñ Kɤ;ŸDRՏ׮¨P­²ÊèŒRýY
Í´]6uÂÕH*bÑõ^š0wÖª\dµbJ2*ëÆ2Ûb±³¡qæ’2òì[Ib”Ç?.ã~îìÑŒ7¹+@Ó™@áM·mÀi~yßeYJGßÝe#Y ˜}FÍï€9âÎÃyvZ+Õaq[ ž¹hß
	åÆѱµEÉ{æÍ_׆•g9ÀYQôX{jä‰w›‚!’CœÚƒl¸SEÌڝÐÚBÌ-ëAô¢&¹
ýÚšEà••fÃ[žz,ï©¡
ú¦}ﯦ(¡îLÑ*EéñÁDbPD+a”¿/±ÒAûghdLáƒë¢ð¿›rFØ
AÉcIîý#gÕŠÕ(oùðñóØf!ªŽËB‰‰!ôÓEΕ%õ ÁÑ,ýð"æøáµÛ£ûAX”$.4Ð&ÚãÐ2€‹–*‘V:mçóåc>¶^ë²T%¨âÞ!1nöð’UÙEÂaÓl2¢‘-ÈGS 3ۍ\¹:}žÞ;ûû…ˆ AíÀ]šdõ†7èÑзá
,¤>hLÙ*'ž3´:"®nÆ°¹âù9âÿ"UÓòe‚£håÎñÁô­C„AÌNîg}gÁ‡0¦¸H6!E œ3Ç®M}ÎÇâ®+ÃÊ4å{}{-ŠV­`öjG”éƵEŠ°)p;àÿæ„=S„èDÑÊ*úýí+µa”ò·]™[ž€Ã¯¾ö!6;c}WjŸSJRÀD{PÑÉ#5 w•GG¶*ö<Ù8;>­5àÞ' †{to©Ÿ×Às
†8È@Šj-|Ô徐‡µãu¸Ý‘AQD1g%·¶ÙHÿFËsƤE†9$0f¹—§ñžè/Bô|wõývm䯗Ÿ“w_êÞpé6î·ö{`˜"µ@ÕBÞµâ~¬Õи-©|ظc…ñqÐ:*™÷‰¢5…LÝwˆï’§²oÎ"ž›C
÷[¬p6[›7¿ÙG³År½ð¸^ÇÍÍ7`PÌkœ®Àè"Ãë
îîëê¿D…'ÑÍwsɆ ƒÊB&M´iñÐrÕ´´X+}8â.£ËûAìš·®&fQ›¢ã·ÙíZGmŠ(:·[îÏvܺô³9k§Êô/²ÈPYˆ9Á	5œíB^u¯gM½©ÓÕÕéÝm‘Ýòì§lRñ£7ô,¡Ø­^¡xª‹}cP$‚]
iÄËÓõ«1± »°@˜_}‘‡Oë…Qþµzäÿb
¿‹-îTTúó¤fªð$þqH40ê’÷@N/i«ƒYÕûõvA K l$æ_£¥itd’{Óð{aÃ	<G `5L¸HcïŠjsëCcà!wgßûrq.öïñú¦WŠôÃÊÀt˜;ib~„çæganR!ïê¢üÊ+ñ£Ë¶…laðX*嬱£+Ö;uV‰î›å#Ž õCýñp1ØHë»T³Þ]òÖý‘Ñúqã¼ÃuÈ‹Ý+øòH'„FŠž³c–˜>BÕ&QO>î‡û<‘¹‰Ä.¸ú§éW|cf¼bPú‰•ðœKåóìãe|qï®!qÁú¿(©á6ú+)ïÜ~,aŽû´†§Ù8[zÄw·ÂãÂŒºëzà»1Pæ¯çA‰o	ñ‹ƒ-”½ó‡¾ç1‚™ß}W¼»…Baÿ¼½ï|_Ô·ZåöX•¼:Ý”õA"@– ä@% ,õg-¢Z'{¤Y×Â8|Ü¿|ž%#vÕ‡ã…ÒÌVTNJõdiì[u~6Vo¦¡@¯ÅÿSG4“ÜÒ»òi5ô¼1{æ¤Ùx\ÜØFêp>5<N²Æ£`tˆ>˜¢‰`ðº¯ÉúÏåÏŒôþK¥‡_$dýµžÇº¾™³þ„üÏ<‡‘’Nö‡ x/Óî0CwD*.Eð¸dˆÒÆÌL h£Ó¤YíÊ'œk2
(šJBGLhÞD¿‡.ˆ9`ˆøb¬îO|~uñ@Œ°òóç'ù:¸SãpW°u.‹p“ÙÃ7u-°ÔzTM辫¿nih]Ã\2:@„dG¸˜ÍâÌEý=[ÅÜ­R‚©ˆ}!î¨ <ÂÂß,Qo¶ç÷®ýaE2vÙ	×|7»è6:2.îU¹öºöaƸ™Z¯bȺUÀ6zš1¤.‹ºl6RQŒ&¯#¢/¹:<+2è•B**½ÁÙx1©áý¶ÿ°ƒìu^a¶€#çÝ&“ÂŒ#ŠȬC4–Ø6†D¤“? «åý¦œzšØy
¼
ªæ¸Æ¨)¦Õ 1Âê	#¾Š&ü«©Ô{tQ\cœD—zìºË7>UãgCÅbÊæ#¦Œ$±8IéÏT&±u·Âu|à7WÓT†\Ñõ×ÓèµóÇ°Xñ&Ókž0› ÷ª¸’Š?æðgˆm%´¸8€Õ­cÖµ Ýý¢]%õùý,9û½L\½2ž©‹6|ý]ÚgVöY?Ë”°¥»¹¥­R$åì>®kã"&ˆe £„qwƒXûl¤î¸TÒ3–3`û ©O{ GðrEÞ‡¤ªr¦µó½¥§¾a9åç3–%Ò¹`ðD|Ö“žÿ›>9qø%·ÅG¿NÛÙãFªúÍ*w5ÆÝ(8]Ô&ìd÷ÅñXUÕTO:ã××ΗçîA°Q€Ah»•Üâ R$‡#bòÞØ­ûUBãA E¶7a³é"ð/-N´VªýtWZæü{¢â3’kxÐ@°¡( mƒ‹lgž…RGæ	W@ÀÛ¦¶l­VæÁ¸çÍTÔ’+‚È­E«”<9\ŠÑUàáh¨z€¯ò©Â/ ¯~1Â3"?Ç̾«°Ö
3®ÚÚ×
ñ“\®¤ëéÎɲòΊª‚=³„-¯\aL&ìÁ““ÿ;ïÒ‹Ôð”DKGÊnoêñÑ
ôë¨@$ā¡GNa¤«´è`ý°¦OÒËë|6	6͵ê~Æ\‡º" €íX+ä¬èlÈ%Â…P:}¾ùý lj¢s
Hcw‹p¨`œ8cœ‹EuAÞ›†¨AñªMaú5[·J2sF—õµŸ,<’)(QA Ùä™nü8ÙÈè73ÇF~Ó¨ÜOMϞ蘃f'0/˘Aºˆ#nLÓ“Œ†@”E$‘óXagPÚ¶àà@Ž2a¸Ò•†/×ùŬÆ.ôÜ°š-ÍvÌj$K[¹xû@<0ªjûjªÐ£#_FŒÌz–"ØV8ED@	>5Rf»$ÖѧIzÚx‚Ëj,VP#ÿSi<faî÷þg_ˆ£r‘¯uJ;³>ÎÑjõ‚$»Ý~ŦçäEt{*Fû¯¦Õ©a~ù­]¢Œñ A@£„|\„mTºùÆùX¶„3ÙÀÌH^Cì²Bê(ý=<Ú‚YÂÙÚþÚ…
µiüò]‰Zk,>8UK¶$Mêü8&ªÄÎ+§MQ©ë]ÔÖú¤õ¬nH”÷ÁúëÙÜkC3I]½ÂÐäGZAªÜÌ
"îÃk¨C[Žx:ÂðÒùá#!yÓd‘{«ˆ­öœy>§gÔ ™J(€¢ P€0]vÍÔÐ-töÑ—isðÕ×Ù-7OÎhšÐ]MdŠ‰Xô…Ó¨©3Y8V•#“Î3ˆlƒþŸ‘«1q=…¥Ü”ÜŸ%$ËóìõÉQb€=ÁÏuÕl•h ÑØŠA>ÿЂ£gÊ¢0†_í î€ÕTS˜b{®u)ýë8ó@Bj.þ¤hÐ<†ê)µ#Dz*,ÊÇY~üu¹P’CV6þöÊæ7â_xî‚äwÜìS•/Nçü¬,œ+C5j„kË¡×j4 at Yµ‰?®pp#_’Ïâ -•y½¬°‚­ 4W¿EŒà£EvíÄW€ÐÂ&81æáµE—J«2l{6eUU¦5>yaÅ^¾fƒä¢Gê‚Y:ááG²nNëyŒ”*º}Îhƒñ‹ª[ª
ˆ6±Ç~á	[u5ó3V6(Qn@Å ²…½9ÁÒãÆÛJ“)líí¶¯t¾ã²cˆBJ" H pA	æˆj{h'ìoB½ÚTk(LŸ¸ÃkøêËoL1§3¾`£uC‰Ë´ÒࢃçísÃóÛ²nHytòlý“aMê@× ‡ÆBW>Ñ®a%	|Æ„KÞ>è–´S£Ç‹‡Hq ‚ƒ&ôXŽ›ÆÒ°I”lRô4¨U0¨SEkGC¨ÌºÕ_à×Ô¢ Þoö·9ù„˜SKÜŸ¦äT 3
:7œI$	Š9õbŽ¬·½;Mf9»×^TZOƒnxP*P¤’E
§¹Ýá é¥ZìÂê8£Ô¸…½°iÞ9%ÒÝ=.­õ¶½ýËÜ~¯±°|¸’χY4Œï•û@á¼ÖÅÏÓS×)}ïQ 6>—¸ª@°€Y303]A/¢jçµÁtë£À Ôa#:ůß3ŽõÎîIEÓ1Ÿð}Q–AXBÈ@Ã΀`Yí~‰lÊÏaÎúQèsÛëe"ó¼mjÀ†æžYÏcÜ_Ffã;ˆ¢p´/ÏWŒu²¹O«ÑöÏ
ˆûøk¶§š¬ÓsRí!Ô¦-VµÞ*¡{µ»™lNJ©+"MÓp¹]–”í7Ì¿[àú&³ì=}#ëöl³hƒ«‘ö"ìÅ•~ŠŽŠorÝžY³.²ñš !-)ÐRT>wé]ÉŽ•Ÿ…c(ÿLQ=÷Â_™åu<(³Q!-ñi
p-[µÄTˆ*w÷ìâh¤Ö²¨-v*Ã6b`¡œ´&C&E•VÚZ3êñߺä¶é«4¨s7ib1Dÿ›©Î}Í’DfâMcâüÚöocÆñõ‹€¹š±ú§¼é:±á–ÔÌú®ëG¬ç5ÓÀŽÐÎR“
¯É¨Á”6E÷å˶´gAPðUì5°zѹÝ=
(¥%˜/z~ ±
™,½­jËË·¬É,¤&O±è÷?G«ëU„ùJ"k®9ÙUM\»ˆí¢äk¼U*yîuêœÆáÖ"à2Oÿ£Øf®ç»Òü!­éþ~Ó#SV‚¶‚Ñ·Q揜‡qw8žBó_Isáð›–¯ÂZ©¥V£h™%yñvÃx’Q—¹C§@ûÀ]d·, ­–¬!|PÁn…eLï5Y-Œ¦ç)j,Cÿcè)Ç쇄֙ÎOÌitÖ%Sm4ÓÑ ÷ ÞC§Ï©Úp¿Æê\ûö÷\Yé&§v65<¼µjA†$·£þŽ‚#ùõ³¸{T×~_2öçÞH›À™Ñ¤Ú‚‡‚¹
ÚH”c`üd°«t
Ò—?¬ÛØ;0Å9bOp¦&>•dýFñ8,þ';Òž1$NŒ¼Ô[ž«p;¦KÞ53„a©•KD¿RLãPf‘1Š£ÒePKÛ0ËËŸ>D5&ÂÂ6ï9ü2_ù(û~2Ìþz–xÿÁÄÛ¬ô’ƒí	c-QV¥’·,UÛ+
í­¦ì-¤j9üRkõÐÿKÑÇö^Æe0$ݨr¥ÃÎ^’\¦+þW&´° ‘Ì 84C´‡§¿-^UÖ‰ze^ÆhEoQ§uñ«‰­÷þún%÷ŸÃÆqÎ)§u®I?|Ô4âmßþ]M{ñæu¯ÇlH„ŒÄœO÷eóiÌÙúØ«ßؐq¢¼ó¯¸??2>4(9…<¿ìÖ,=ðjòö ò—øÄÀgi©Kþë|ª0@ l8ÝW
ÁŒf¬ŠEL?3ƒ”yùppC6i¢’Ž¸MÎmªìÀØT°lÛËAáO-—` -ÏÒ¬GéúÒB³\ð¥O8|×»QÑ9•‘EU•Žê¤ä® Ä/:2)æDì‡Éß¼B»lY†l\ëñŠ_Ì¢ô 5o…•xb"dÜFß­ìþ|°§Ó§o~7·ujÏe1ÖOŸ{àñ«7́ØÂÁ¾÷ðùbF—òí†@᳤Uço’2lªŒúØÀ̇D_17®pk£Ý±Ãï…Me «NUT›óéM2*”dwÐå±æ² Ÿ‚ò€tá'Iì*Ü…ð[àÛTj€Ÿ[UHš)èãÕ߬`.ú¹¬|Ò¹­’dë’篰(j#»H¸E.À?Éßœ5t‘¥ºëãùñó—/Îãlw&Šüߟ† ù‹%¤(“§
/wP`&j"Í2£Q¬d‘jÔy4«ê? å¶d O]#ûZïgN?s¹Æ’õ Çcâ ×}¶Ý'Ðn¤Š?ÁÀÊN@Õ9V…÷„têÇì¢ -ßo–ö×xȨ¦0!ƒŠ
ßYïvúA.Le–›,®È´V|¯|ôÝãÚ8ò¡Æ¬«|A‚‡=UÌ+Å`È8#¸ýÝ+ËÉ¡Q:@¹:¼È«ƒïÕxø?a€ VCÿvínä]…ZÃ5_ Rø<
ÓZŽ‰í“€‘óg’0:TLüÿdlnŠ§gf6&Á¹7Ë_Õ4½,¤ß2~·MlJYˆ^]^+ïË‘lB þ¶7ç¿\þ#‡áàÊ3ýtê}.ÉaGa|lDo'lQš>çDÜDàã®ÉZ㸤a+kyÌÛ^ð¿9§yú¹õÁ7¯šf
ÝÇýÜýÒÀŽDou}
³ã´Qƒgc'$†O _G=ÖÏ”ûª6WÍ]IeBWr°ˆp‹Ë¤G÷º$‡ê{Dêx uU멇©(5v7±Ï)
‘f§G ð€9F „>PŠÊO½Eԍâa)	9Aõ.VÉâu™°õ&C~¯|a™ýÌz9b|cÙ,ýç‘Á˜žt«Fz0ÁƒDT¬úžÎ\@}U>D“*q\xãü«¬Z&*5­ìü9ã³µ˜²,£ìÏãú3+I/õC‰¶Å=hÀ~hÁ3F"ä`5<~^‡öxi¦Çú¬ÅúvÅxYAWAQ	@ځ*iFéàìÍóh­eõýãÏYtÌê\t›¿çÆéñ¦L­ò‚ŽWå;,¾½ïƒ±g8|,¿
F›~÷%™%qTé¢W«LœÑ²…:¶xeœìž#S]Óèx{ÞüqçLÀ€P„ž>Ë o¦C
½L'¥…®Œq¯ÀTúþ|Š1jR45‹-´Ûcˆ*ä/ìÉ„¬uE+ƒ†ó°ìýJ{áX¹l„Ø<"qXô‘§F{L=ßLÚ©*7¾Ý:àŒ(Ró`Ðmôl ´ÂIÊ{*p¾Û&ObƬïpvZ¨ÎXÂlÑ2Q'òa£µïðà)XzUE+Ô"X ¸ Ñ%Râo‰'7Ú=º)w¾’ÔjËšö¼lÎ÷°YE”ì²8•Ç¿î¸O¢M‘Û7#+zÑØ"ÙTÂ*ónn¥³ièa¢0¿Mæ;?)Š~[èn›†q÷ñ¯ŒÔžuà"rQ4ñ£^žÿ06?6Ì{ý}œû½¶ß}Æå.l!»¹ÎqI‘‰êQÝQ*<L tÔ¬QƬTyãS³\‚ @AN²QMP¾ÕÙ~¨ÅØ|cpôS›Û~R·È‹õêÍúó?­Ù<,Yí"
š¥"9ëè1Û\¯}C5¶ppóÁÏ®Rì÷B¸K³žF²©y0š€ÀrX |Y|þ_$#¢4ÜÖyœá¦Å‰64Ðo~1m1| û%pHõöžÁEb‰ß®©ƒ*2 Ž¯Ñe2ÕâÇûÝVÏ(>¹Õö¡Юh —~WeÍ	y/_á
Ùc(}·c?Щ  ú"WŸ®qñ7"v„&Ë’iŸ’CTàÙ5Q}(KÝ1aÒÍ%D#P㾡'Œì·•(õû«ÆUD]®bÁ£‡OÄÛ¶žîkÄvE1Ð[D݇DFŠjdz­'ÒårDƒ[hfaˆR§6ÑWD,¬Ïl
Š÷¤c×F;×'Ìît{­Uñ£ÆO|ô0£Þ¥V
ÂÀÙ€>N¦³ô"déî÷âr¿”(ëT A°×{bžÔÕ>@0Õd„ž46Ÿ]vä[lp}u^îi+ʹM}yºf‘¸‘2ðÔá¼:ç`n†›†ˆùœIòÏÚ†ïÓŒÃTr…¥8o18T/¦u×|]óÜK¦ˆGÏ¥ÃQšš0×Xÿš=&šsgû:h)÷Ì:í\ðÏ.áZÒÇ;VW)íÒ¥©bÚÂ!±ØÄ|…ð»f„‘ ’ñ[d¯"¶¬¶{n… ú,TB Qk£«øUsª±¾¢Õ7UT7`0ª<°ì‡¿gïÙ
ÝŸã5Ù’«`UÃ@êmcN£È W=Í-|QuÚëápá¦ñ¯ž¼-{o»¶
Á’fQžÎ(áU«]cQ,×é_~Åcf$Jþ_épw¢Ô=…u¾ÁÏëÙª)ŽÎ9Ž@mÃØàÃjå‰E‚[¡°C¸yl",ð#PùJËjÄnýÀ+¸Ž‡†pFI·²Ê†½U4%)…pÕ§*ù.Õ/ƒÚÝÅf¨¨‡´AÐaŽ6»ô“Ò ‘ˆ"ªQ÷¨â)Ô#oº(]Û p³Tk²"¾µ
èŒEABÖ£S1pÜ\=Êa¸þí˜É%0µÚ…÷ónx
=	œ@:È ôÀ/òpÝÇÖOÃo,ƒDËZ>%¿ÙáÁ¢âH˜õÏ×ÖøðMñÎKg­p^‰	ˆí:\«»¹Ñ0Ä,d,J•Éƒð
år¼ f*	±S©‘󘜯zXc‚s p!W¿ ‘¢ÉDל½
…Ë“ ûo¹\h
€x)¦•3JmtÔ»7¯Íõ¿,^.;‰ðÎ]VЇYž2WœErCÐç¥\Ÿ
lr/…H/Glø´€½Þ4¼  8pîÎC
„ã	ô#ú&‚ ÇD$ƒLMÃX¶{>˜Þ•íÞ5£hÿe9–ÿ­»_GÊFa\ëµI/¦r) mfRçTù”š;¨~Ou˜ÔñõËnøK]âÇSØSÊ—îTqO~™‡8D“ÕdaÞ~‚¾ýïg“¶á5Cdà\=^4.ïôèNZ½ztF­ì`‚Þq‹ù=9úZ-èÆS.™µHýŒ2ò»~µ=F!Ý«"ÀH)¶¼]€ˆå¢Lùu:}µÉó˜nç¹vá±-캋ù“¬Zçæ†ÇgÜnµá¬bþ~ϹáЊØþÖs2ÿÍÃphphažNÌ[Û±g¸W|gb–ƒ®!¸®(“t
¯HOð™!'äÍb‚3!
4„Ù’
¶V”LKÁ8ï!aÒͬÆÕßó¹p¦mB1$ù60ÔD°$:.n¶\¢q‰{Å0Õ¯@äpÆ¥-¯t¬ŠÁ¢\v÷\‚J"Ác‚©;¬âç°­©!›Hcøë˜Â šz‚kFð1e÷>Y¢ÆÇGÝÒWÕ¿}€n—ÁàhÁdûðY<ól;Â>³›L‰0¿2te¯·s³eYòx‹Ç*:ñdTb$?@¨š‚!DBr¹n;”[[ƒJö‹Ý±Ûd£Ïd–Ù/…ùMW_qí<å×÷ÔÖóœIÏäOËú¸±†<Œ1€Û¬ù™Ó¯½ŸŸº>Sêø4™æçý1Yw< O8[èÎKÂz+ÉâXÞ\´zöWUTW{‹¸&¸_þ³ËGúˆŽâ™çc
*ÞށøAQàaÔ6óÊ¡'›ÕvàYx!㣛v ^°WÝr‡T1·Á<•¬b¿#Äcïú9ô½›¹ç›ä_É;*’Bl¨ü¢²BÔ1v‚ÚTÑÊ)¼;x5«‘©˜ŠâªVàäô-÷ë>k,œ¦$¡L¯=¶ú…jÌyJ⑶¶*lPÂÔš©¦&¢ÈDDÒÍŠ2­¶¨Ò
Ö°hN²tÄìÔl´¨gGIx×ÊÅ ™ÅV¾|×z®ükAù½…œìðB£)ƒ1~ǺĞŠ x	Ž·é‚éËSoûjÔÂðƒÇU¶F$zŽ
™ª zŒá°“øG_•”$°;áÃb…á6ó͹ú翯ۙ‰‡…¿¶ª5³œÎS=çh(ÏöÎxu\ááónJÁUtËø­z¿f´MUyãy.´¯bê
;CQÚ!iQˆè }k"3i¤Õv>¾tèyE.@þjå¿ïL3m0ÝôuyM^eIhÜI%Òœý`„q`f
[...3138 lines suppressed...]
|p(Ö7¹tá,†¡çZ7°Õ[)ލ©w
ç5p:ðª²#cn<2°ØëŒqƒ†Ùª<‘êãl6Àlýÿ'¦#÷7ï^æpi Ú™æþ}^TՐ™$fld’/e»NC[õ2žÃ0“Œ8Ö#½)ìpŒöÖè¿› ³[¼ÌËœÇp,çF<LÉbh|@É•¬PbAôØõÕïu–HǬ&®*W…f]7“AÔD’¼“|ï55½Id¥NtÅqA$4ÉÀî·qé2s*MµÌ‡ø†ÛyÆ‚1‘ÚÓø{w‡"4ÚHcCÔæÊFë¡u7æw½éDùcÖøɈ
´!°lZ88íLàs
á3A$ÄØBáÙ·jU£Õ¼÷-¨ƒþ^Îmìëò4÷ËA.uçÿ“Å¡æúªœer®ß†Ï‡¶s¥ä?¿«×-Çs5Š(
ºO_$!ÊÝ£ìvÿzbH¹­_Ž]B#3Þ¾tñ}PkX/ÖΙùžu‡WÃÆ;Q³YƒqMC=G;3Ý!¥&ÈJÉ¥
? •¾¬lËmmù¡•V¬Š*ªŠªÞù9ç€Éüñ‡kŒrÙÝbü¯,~‰lQÆO"–²½Å™tqF6=5
ñã_j¹š†C,-$oϬÑÞd=\L„æŠo"¹gL%MÀŽgÕ0Æ?ˆqm˜·H{239¾ÇÉëöŠ{¤ÑÛ#!ÚØÕ¬hÑQ5QIEAä§ka¬§!Ç[°‡i\³¦@n±4ÚcR(£mHÛpóÞ]™#,Â^eQk¹Â’n24Ùe–MÛ¿·ƒƒF\$IQ¯Nô>ÿCˆÛüŒo“™Aø2V<‰´NÎbdaÒ™M-%44Œ‘TR5‘ë”Ô´uÌš#rcI’¦Á(ƒ$¢–‚‡VAk  Ôá:&’,²u&¥3àہîÙĆêöìO–ŽPýø äç‘îˆÝ	’ ˆKß7ü;íµýãö÷BßgÍ„o¿ º©øk´MÁ!ʾ¿v l¶Aƒ#ÓcÓǘi˜ñÔ`˜>V (&	vVýKã.—§þ’á'¶ëX½ÿ¢[Þí‹Ç"¯r6ñÁ½ºòÁ;v>ïeÙ±›®Jåø¤Ñ–ר>r
†2i×ÝÜlúäæV!ùO[éÐʏ±£ü¾_.ºðéÃqiÍIJì-Êm‹¦¶íF™ò}↲ Øi¥qÎFƒ÷ \sù¹ôCrÇ!ÉÎ9–S8Ù…™e0fe‰ê,€.µˆ>ëÙš2 Ó]U…d0£‰MôÃܵ ˜Dõˆ-UÜ.¢Q¦§kÂqlËßx»Üç•e0l¼KÍí³‡¦(»°Ðã]¨¸f´1õõTüPŽúxð&êg¿FBú¨¢Š#=9éÖzžpn
"m7»Ï˜PpOh`ç’(èÛ#Sqƒèù<ú5—nT»q}Òs}	$ÈŽ
'“¡œ2HLÂVhùÑÁX^+e@¤ˆ#¬ý;Æ®íöWeð«ÕÑéÂH.¥Ö<9aF¥°'dæùaI¹Åà¿ü¼Òš“B¸;Ìæ|jq“ƒº@™Ëä#²w™Nqß½¤u¨Äž„q‰=ûžŸŽÊéc?,Îؾ?HupB.–=îÍBÕ)ý»£]-Ÿ/zW®$6Å‹«Gl,üî¯CժЮ·Mw#ïº[G¿~[e}*…µÅ8E,ÞÝr.®·ÍèÇç›Þ¯y¼†T}4ØBì~¸Êôœù–M’¨4+Êô¯Rÿ×òúý\éd×Öáx¹W	ŒqÎN"D×M£³â¾è>Ý•áqæèþóí(A&gÞÁüú‹L)Q~Ò"‘†»?ŸòCëÿo®Èùì81¤îûˆ‡:9+Ñ£ž[õ¼ßbêQÚÅl˜ù¿ÅÕë2üÇFˆÞ:ÁõlSÿc÷Oèçá–ÿñ^”Þ·^3nèJ~8Ôº¦ñ&×Àq“¬»ï#€ÂÄè6½ã~Û~£ô·’ö¬aoÍ_h±ÇÊfh¨{bù#³{Œël>¿Õ{LË´¯¯"ߝRI˜·!'¹íésgÍe£g¦Ï·£úi†—ºÒ¬¤—¿3CGn_ÕN¯óÞÌWÁÉk…<£‡à®Ö ¡(W}p=?Õ¾:}󟉇›ù âfÏïèÔ0˜yü³Ê”oAø›6á¦ë¿›ÑaWïNvó%eØè®ú:cÐhÐkìüÜçësÏì°¡/Ÿñb=j[6¿y9µKݱà•]Ô‰)ºÈŸ¦ÏÙ]š.N¯X¯â¹ðj¾ Á7^.×|#É
hˆ2‚8§¾Ÿ<Jû©T9kiÉ$«ÒíEô{]¡°yËè‘Nañœèë¾ió5ÄpôÇRbÛ0cN”Öa[$À`×dãïþ¾“„ÙB\aœš*šÔDDIv»ssÉko8šÇ;£7n5šÂ Ç–â±*¤Æg•ãçƒ
!—ŠkvE©Ô	¹v_šu“û`ìIzKÈè<´ûùw<¤sÂñë…}›¬7á_ƒ‡rgA..ÐÇѬtÝ‹<°^‡#lßÈkÖ«¤ñÏâÏRÞŸi¡F“žÍÇ	~QêŽrÙ‡1Ö£?~:h–Ûòÿ¯ÛÛŠã=HÛŒÀ]<C¥˜ÄUâûØ&)„_¦'œ^º|éóeÍCSÖ¾à÷ï4Äá—dfyQ3œTV‡‡_^Ñ®¿ÍÃÙxÛÙc­®BxèŒ÷Lr#¥KϦqV+jòÔÜãtìGÈDUæg.Æõÿ=ø=óÆÿ+ä9LŸÊÏ>¤ÝA°zÈR?3´j#Õöiœ×¾Ø<ó—­|YÞ+×açM1U}ù¯@8L1UI²I~ŠˆÛ¤ÈO›êgÕKam«YkvíºÃ&?¿!\\¢Š¤*®`•‹X³vÄ“QãºfÑ•:$C:~ˆƒ»g®÷1’xÌbeÌ=–~ðwø!œ/ ”'@ü”ã èN)Lvþ¬i›dç+À#	ÿ;ËRy˜é•2¤ÓA[ßÞÑÆü—ć@“|
K7¡7‚ŸìaÌÚ¾Ÿ¦ãI×Ïå·9\i5Æ%)ƒ`2¸ˆý0Ÿ#<ˆÑcd¶Í’V>¥ÕëÝñÅæü7}^ÿ®Éüè9zì6–õ]ì°Î½ÙF綗GHÖJPñÚ¹YA§Tý•]nª£·ªQ6ê¯Mš¨=OnÌk@رÿºcRfƒÓ՝û4Õ
kOͧ,£Û¶æ%´Ê'ŸdbhIæC<.ï÷?d³Ç?0aF{íÛŽÄ—BL—µA|(vHQ=©½‚"+õߏ©KOl¨KÝɪ²¯L¢NÈI)¥®þXpß(s2=UÇï°Í¼ÖH^dõš«Š#©hÓÁ÷zãî© 3¯Y˜Çקµ×Ù-sósæ²Ì›mip¯÷¿ŒŒqÏŠ»q‘‰ƒoåy* ÈH„„ðU¿UºróYŽ+M™–×:¢žyã‡uÛ§¢Ý—Ezèr[³c^ÇR"žëuU\f¬5› h•wŒ`’_Í‹PH¨de‡yŸ^7åÅärùöGµUß$Q$ÅR at yÇQ0šÌ ~0=LÇ–ÚÒ++­(6{½ûL¾w„dê•#D
ö<%Dù­Þ¥üaAÄ僓—¥f( ôT€ˆSŒ
€()×Ù•‘èzºmoçO®e¾ č´¼¥´BLàŠN 3 ’Ù8LR?wd;Y  Ìc¸mš×¥â"v@.0Ž0†NaÐÀ_Sá´v!ü1\ÏoogÇÔÌÂLrZ½·_Àœ¼Õ0“1ö šÔ‚ºiçaºÎéO³‰úzhe»|僞ãé‚a]Å€ø\Š¨8`WÓ§ž’ 8õä~k‰«Ð¦¿éç¨Ïfdì¦ñ¹TyJ„õè<çPœy ¤ÆÎwfä·Šøm=0ö+¹dyX
&Á: k_
¼`éŽDM™&7¹Î-þu¾nç5‘ Dûç„ö⏷Õ(ìpiJ¥=<)VîøÀB¢ZuD_(p‚¡€áÿ™UØs¯¢Þ
Ið:ÇMJÏÐç…åþ¦šøNå	øX¡Ç(?º¡Ï¡¶ˆw9ù!Iz$<«%è@I$µšKø"Í?]]²ÿ¯ÄrÍÆz¼ yQƒ6ühA·ƒÂ†ÉÞ½B6B½r:óÎóˆ¯Êl @SµñpÆÁÝÛm,hĆü~L_f)Ûòhž14éõêgþ†¦vïK „€Í­nAéË‘ÈbÛCeŠ›\´þ’À¤
”žö¨·8í¡ ¾<
çãÆô!’¼^ÈÛ¿îÒ£K=TN‡‰{!ÛdF±>“:ƒt…·gÃôZTÌföžŸ9èh|Hé̲Lې™ÿŒ¿î©©SúVzõÎwM;pSê;ø0u ¢fgÉ
é·,åçÀÄx€ý¨
w·dãµùl*썵XCº×š”Y›Î¬?¯i ÈAʈÐ;”q’I& kÈë‹<†³'Z7ÆXÒ¬þ*ú¥ÍŽ£Ròé_“ؾÞ^oëwê·,k×ø# HY#æS^"»aÚikjíðÂèîÕKœKDØ&"†ÑämþÍr2RCÐñEqÌfg­Yr‘€`̷ܱ 	Ÿƒ|$4Ž!ØJ—$‡)ôU±.dQù¶\ÙzƒÛè¥å—UÕ:“4}'‰aŽ^M¨€-6\í½0ßr
æ'øñz1:yÍøǁõÝâsÚ| ›¢¦èe©éðR¤¤)ÝèQoIù„|ŒY8äO—¹¸HˆOÁúÁá¯à– "÷È:°?~Å‚&Š‰B³óÙR-£"7‹ê
Â
m
ˆ¤ 2¼eL##Œ+q	XäŽB46”jh‚·dMF൭
g›Y;°ˆŽÌŠó?tãJl‚œÌÌ1§#.#"¢¤& ÃÒ4*ù<O§x?1úXØÝý Öê7C Xš„E€CïY´€À,bYù)dÎTdjñAþ³Š~Nžuxá»Êü7ŸZ¦¾ÙÐ5Üü‘µzãRŸMjjËg
h?Õ7h¾«ˆ„)Jÿ< ²“Á|éè°^
&¼;š·ÐѽhŠÒ’H¹Ô¡~	Ù 'wÃmÑ\J¯¾P©ÒÑ8ýªSWéÓjëƒË3ÙÍbcõŽv£Zt€{î,æCº¡ÙÂpß>UIî™X¥ rh—obÓµ`‘ôk}„àm‡%ú,óvuÒó¯¯Db"Â×DûrÙýb8g{÷õ{ôô¥~Ÿ|©Óæm›r š?ÛÆÿ¢¯á6cíæù…ù&Ý×û?FMáéîèß»èô(Tw'­xªâèt:0ö»`ßr·Ê⪨$	y‘å“Ö¢¼:'áu'v-³K}pù[7ýn{™@ý³
Cʧx𺱤DÐOаé°Ü"9åmÍ_Ûýˆä›~‡2˳Q7öN6w8ðmAÇèÏŒPa¹ó¹ÍpýÐÔØôÓóÒ˜îêËÚ¾;±šM~€ÜÔ?£ûáümþCYxð5—€ÕÞ] ]åÚÖs—h#Y*©ÈÓá¸̻ϸ?êSN®NSr¿ÐÉ—å{nÃ.ôɃX<$oˆZÓ£ÖX@¸¶@º3T„¦LUÌÒK‚â§UnÐÉŠªŽ()j«Éû LÙ³æ+ÇžË"cñíñ?>Ý0#Ÿata»,0²|¸å¿ó瞧QJ­³Zºˆpð”ï)øÈuÄwg[#
Îíôe‘'ôF’üæóª?qüæ%§`½æQ‚AŽÀǶóÃ,¢ˆ¦EÉÏÍ(4âé&=‡CüSyŽ'G©ünz®=Ît׃ÊÆ~¨ª·u¡ág‰âOáeõ¸†!Ê!Õ¨röo#x¼hsR3‡zÇð<ãŸGnÝ›wh>©pØûQ½BŽîûê]‰(ÚïüìÌkó÷~ÏGÏ %ýÇôÕ¿µÈfñ„„‘hµSDNF“tQ¼ÒHtÍ&#!ÆØã±á5™óø|_ß);m×sˆ&foÚ˜HrÂFÍšüÞÉs!úÑê¬!«»(è÷Èg4TÙV~Kœ`Í“;'w¨ƒ§1­ó_×ÝôÄ‹‰µPí#k|Zäüùå'3,µÊ7.úRð„=½dl%'>ÑoÁ‰‹4û¬¸^b½õ¹‰ù*³J²RâÐ kìøS2Ž@MÆ	.bš}6£F˜½Æè§R ¶Q- A•$Ö¦JlÝ5•dÍËbÄú<ÐGN®~™KÍ8’Û•±ñ¶ØCg!×m–[ÒtœIK§•=¹s“Š™Ûÿ3//¡éóÝÔ¤[’…„	Ca;&FÌ,‡³@%Íþ`“w~·Ž––Ú]7¶wc=ñÛnºö6:dCÊ&_+˜šc}ü9Xà¯Öù†o4-µøÐq£/óeߢáßã9“µýsˆô85¯ûÄ×Îéa€†
Ž65³ET ààHv*¨‰çéø¯!ö~ŸÁôe¯Ô(h¿ò¹)Iä˜" tÌ€‚§»6Æ6@­-âÉ~ýˆ&æl“ßûwÃ?_¯Äö¡ž{= ºPch‹äD	Xhï†
äÇ뵧\ʃ`dØXÏ-§R«ZÀ„®ƒFïk|gÅÇco³ÜɨP¡î>‹ßï P(
FÈÌZøBovxe¨áiâ‰tƪ<¶ØõF¾Ç^Ú[TzïhÜõÕNs̓í°åpw1…Í›x縀ÌLDcFLwøð¶r9&@ä@ä
0µeŒYá@=Úe'™†;æƧ¤Öî8lªü°éÖ‘è¾Ðö%g+LéŽ7ÂÍbX·8ðCwšÝé^gµí;NÓ´ððôwÆ:¹n0bôjæŽFä¨iÍ8°NT¤*'$ÊUHé.-ï—újÆ]¢^îòÇ—
‚—+J¬¯+j¿&\Æ:$RüJïÒêT›V…™D4éˆ¨$›ÈQƒEÕP•ˆv…¯,~ö«¶ovxk°ØÕƒþü´Ò…õÆ!­Í3Œ5c¢ú…M'u¦Nf‰“#‹Æؐi±:;©Q½ÎÅ;2·ß³8a„è¯2ð;ÊhŒ£µ™Ãïýài¡Rת0ö2áaÁÊž”Ÿ}öD÷þ“—÷³~ sñg 6m¦m |{Ñ´ˆ»oÝÝúiÝ‘þ^0yW•Ö‰¥³8œ¼e3¡™ú úNïá:Q˜Ü®
ŽÌB溄ñK ¡$”¶Ý(ZÝ)kt¥­Ò…­·JZå–]Ée—r wør÷8h¾K·y>þâc 5½B"œÊ€B;ü1e§, îp<s°£#õè6øówǦ‡(€€ÔÕºd9Z/†³`ÍΆHfQBD$_ϹåXØÛ:ù`¤„ ;
Æ5:+»”ú€íý€j­ší¤
B-C†­‹MŒÒ‡s7/ÃJYOž:°´± LhlxɃZ²#ìEÁ ´ƒ.°‡mVì?œ
¥êº<l²ïoB.—mX3åô÷$.FKÞéࡸ™?cúËFÛà/©™3j‹ž¹œylf}/ª@ÎÆÄ!-o¡£èœÈ螶b/=ùe“4
åö— ²ûA¸Ð„¦¹n£X“¦j„ÑO›ym½’m%WB÷l3VÁˆé|A¬,®\M¡Ð39½àcÑ{ù—ÛCíÿÝÜC–„—5yс~£ÍΨ=®jnWŸõWP¬mÁšM™PŒ$„ªeçê_™ý'ê¼á¡Ö‡}zQs1sQž'x»þß°¡»]9Ò%¿¡»È~ÃT&r&ë>¦Ïæî•Ø‡5ù¯½ñé4ó#ð_•ƒA_Ì´“0¬Äï~NϐÄ´ŒË‹š­æÖ.'ð¯ÑX¿Ï_?/l9›³ÊLäEæp¾wa’43Và1
¶'µµXç);Éô®¥<Fåëé€T¼5ÓÄÀ÷F8
àçg
œc°}º/Œ}P/L!s?w¸ìíf܈b²c_+Œ<B	Œ"p¾êéÄÛ¯¯ÎTôæeá &CðXø3lÐú¾P&6¹3@xè ©³hä@ó1 Çõ@	3 .Òpèß³ã`èÐYÅ®`·m»›ÔŒ	B>É©è¢.D]_2-³LΡ5¸;¢k¹jÚÍWåb,O¶èAö®»8—âÍF§h»õ3ܝ;3åçrk¼$zîp>«½zŒ5Ctælìè›Eº‚øDŒvoY¦[}Ûb
Ä#­b(1ƒ1Ý°fvH؃$Chœ©ß–R]zºšU‡
,Ñ;ÀãøÒêž»õçÍ*0Þ³£¥ J&ô’ïvjTŠÓ‚×݆&MrH.ÔtÌ}ÖžD™‡00c#Né_6Ä ?b¾~óô„Nhe—Þxf!Õ¶ŠóPøĸ1Á“ÐZƒú%ÈLR
ùe*‰Ö#H at 7¬4ƒ¯°ú€ñèf‹6À9À:y/Åû´5_o-·Cb¾ÿ‰ŽdMkFÄ-Ž:@ÚÁº¾Ó#ÄåÄîÓ9 ~XO‚ÑFò³
ÈÂ2+1FH2BZEgìŸMÄÛlOQ›ˆRJ	Bs<¶ÏÖò‹=؝ÕIÞr‘¬°úL;¸	Ý&ozÌ|Ó’'‘Ùs*>ßÎÁôÀY-¦´È#¡ÏbT	Ÿ­Í²V†t`Lü¤|¢@uh„øk·-od6ÉvfU«Œù;þNEÈ.­ÄHDMXÄ\‰ªYÙ	ÞÇék¹Uqwû€¤5p“Xc«ÞÒ‚!÷hÒZ}¥¼I’Ôwê38ÎârQyH‹1á,ºsU¢	jª3ó3E‹³˜‡K1˜ÍãðâŠac달=ɪrY›‘ŸªËGi‡sZ¶»¦Uk©Žf(TnĬŒÈ‘±í6è²5N| ”B%Á¯%ûù³à“7´ütdÛ†ßBB;äàîKÆ(æÈÊú7€½4؃ºÅ×H¹
R{饑îOþk—¦MMê²±ßEë×TÐ[µ>ÀC–gõ´ëodžÚi½Î¦Îe5œk¨jƒÖx¦'m®ÝñIJ$È5„«ŽÒ8ѐw>sÚÐB„rŽjû£¾0ÛHH2QüìaÊ›âÞð³J/†	„Hk¾öòø†‡4ìCeשõŒcúV=È>Î8h4©¯O
¸ØÌK\ "€Èq²e÷—“|±wàáì߹1_µ†ª¤åwÇ=u\÷õÁÁƒ‘Øä§âŠ,­çÅGØTâ°‰ö¬eU­Q†™_,>ߺ6{Íþˆûä(9‰‰¡³ÝÿŽ»e¿‰m¦ûöÄ»X§+Ü´†Å›„Ëj¤Ž7£²ç•ÎP1¹ťG~s¡‰Là
Ž…Ñdûw©®]ÛrA³‡¯Ý‡G­ó¹î?lþ(×:¦Â>]TW¶N¤­žrX~t8Íõ§ã$#…†É銵š¼«jÈl­ª“XÑÖ«1éÛ<%æe™F¨,¹¹DšØŠÑÙÆjgavR£GKÚÒ(då&I-v7~m@³MD:!EHé‚ñÙÿOÌRyxPrí6‚ï-)Ú?]‹8žï_«©pH&I¶EçØ<ÖF%©ís£–òd786d-ÎbÊ¡ÅôÓ–*…”ËZn›âNÊ]l‹
BX3ÛQ†õÐ7,Mk¹‰i’,%;I‚e‡Úž—GGÒdði›[ý1F<æ;c¡oôìç¿_iÑ–Ž<$œuÕ33/e±‚O”’…¥¢Gïàñ°ýú{ì	½[ô'äø#œ%$>DÓ§9§z™°	ÇWר¨Vøp¨Èi>5E9d†NFî"tÌü[.–ÚÒˆÆkt‚Ã5r. 2‚kWRõ••² Êy²]œn7¶l»Ö7H”ªÐÄjšÏÛ:žØòŪLËŒ2]cSѐßEÊÆ\!$€š*è¹+Y¤Í4XÜ‚3üÏë并Ò0¦Ò’ýë%ã‘®LæNw~·õŠé÷ªÛ$Á²÷(¸·Ù~÷4hq§=
 ~È·ôòW<ž•9Ê!úbhG2
>·	ñ¡ÙAˆlkƒa˜y¹H`Š4i#Ë£ŸŸ}m•[øÇR0À\#õè./ úã}tñ‡ˆkhCAóYLänƒda8L"^QòÓ½læàhÝó-õð+Å ôf=N@„^‹F]Ëbemµ»$·­3»¤ƒ1”¤bÌW¾r·³ªùq´ß§J®£Q¨„¥»D–Œü)ٝ!GCé,xI%¶WLv´8ÛlÒ(ìQ3!	fÝÆo%n½k½3‰Í‚Ê„ºO”Y3.Ȩî£ňz$ÃÕ-ruqå¦8ì”ä¯Cæ¼|ÄÁt{“`Ñî,°†£Œ
µ0Ûrš€±$©ÇÙâ-´æŠi|î;2A'‚ ’ç³¾5…{ðÜ£ƒ×!\JéÕ] ÐÜdifqšÒ†7djƬCìrù§™yõdª(g6†€’ï8è¡Åü¢&üÃû\WÕéëï£û»ú9òÙsoi*2Ø
þtÁr¨ V Ó0w s89›’¯‘ÊPgpZ³…¾eŸ
v>ƒ7Fzh¯FR›r†Båí̯+³³-oap÷·O,%¤*{v·CVšþ~à{B @HàÔ
Ë6Pma>O껫«–ŒªªCÆ7
‰Ë®¼Û
­+&mÛ²ŒÙ“Dõß‹dSMdæãp2£ l‰¯¦upHoǶá šÐlç*þóg$ÐbN·ð¿Aº(ì
 Ö%îtK‡¢²C…÷cxòÂÞŽEy
ëz“cYuPn}8@¨›7·ªö.š{Jȱ·¶­D‚ô•ãØ2{n%™QV¥äk˜ãsDØMšL¡È~ÄysНU9umÇÊË©ˆ£pÑÝi&‹"Q%sΪjî‹Ò¦›”úlî“ÛXY{Þ|
F»³ŸÏÁ•†Ásâ¸?c›©ÎS
=†PäEâR[¸JSÚe}¿Ä;ùÜ ¬Ìáa¦Z¸‘&lQÙ
>w·µÇ¬sB°ºP2ct÷ì$5ȽŒ´¾Ù!°ú9b52¬“oFBÓq¦Êþ¶ÜÔ1©ÛWÃ[óšÏ¿G0ç	ØÚÚY“‹ XõÓËÚŒzü3¬^¿CõÁcÜ#kË{уRRjïªÒk©y+¦»ù½î@-Ȳó#Ë*Îy¤eÀTÀ÷VX7 ˆVñcQº:â°F‘ÄH"dãõŠdÙØŸÅÀ´”ªøA´+$i»I”ãªÒƒÈ™6ÀD2|¯ëòŸbܧ¬pjÄÀÂ7ïѝóÏñžÚ/ÅãÊ5_ÕåBÝ\˜¶|íӍÍŽÃw³ó×o—?·$í#žsú”LõaúæJЄN3'²bTÎ%Ï5>ð(“îŒ{ŸP äÞ9„„¡uŽ²Öö™Q¯Îḽâè±1#†âë41JùãúÎF1•Ù=6äšƨ ·Ó›#ÎÌŽžäãß~0®B¥†á$Ç„þ¼´GØCαsôTñÇϯDŸ™Ò>—’xzSú—Þpqðöî¶;>TžhæÂý×î/g?,ÙÝ™&5bJ¥Ñ‡ÙòB»®ðv}æý²kj4ð©2vÞ²áÂle8snøZLègUH¨Î¤“Eªù,c×qR6YÍU³&9ÅËUÈ|˜	¬ÇÓõÜ,+ö¼O*p¾lõÞrí.ºliöOxô.PªØâEë«[g—”´ºîû#`ºùäFûŒ|°°õÙ¡N:éZØa‰CH™Øø«†Ö·ÊGÒD±_)#‘4’,Œ …'ļ…ƒîáo͏,ÌØœQ¼õéŽX…ùž†…|<öÔ\VT‚‹ŒÑb¶–`G0Mï×UÙÇÛB¡ÕNÞÆÕ8ð¤0]›Ov|?4ô•ÛG¢ÕÂ@ÔŠtIvs>)íkl°{i
yʦ¼¹Ûó_¯(4Óáƒ:WÄõÀåÏ‹×Õ5yŽÐ\OÒäz;3ûcëçâ¹óë’¥üìÆ$þ	vžn*ÈfôžÏž«ÐdKǐlÉ÷]J	ÇïÓÔ¹B0zÖ+X13¤Î –?\—ñfz†¢Èí Ì|šºeK`‹Çø1¸LZÈ·’-1Cà4hAòÕ}¢;j|Fè…ÆGçxû«á¶¬Î5&:­ì¦dšäìN‹,õíã|§ƒ.\	
	9>£"î¼³–è5šp[5ð!§u¸Ê²ZݸM§»Øø
<ŠýÀÙÛ†¿×¶¼êmŬ~›5.HBzEZüY‹žÒÊü'Z¡¨ä™ð¬CuŽYÄõ¬9öéÝeXZãnÐ'F{‡i§:ì"³r®U¶¼èŒ®…¿$q—>tu¦óñ€ðÜ=ŽgqÇKäzì.p¯
»ë¸åVc\@‰15ÃdŠ.FØ°^¨µ·¶„Ùã„éÞ÷¨VvÖA)"TCr!HÛ™“¶Ø’MÈ^¯¢OÅq‰ãð—m‹?è/_«ºÇԁ«.ŒˆÌœ%#J¶™òNe˜Ì²	wÞ×6sÃuß'Ì”î`’""&ª `Ÿ<†Ij>Qú–ÎÐ,µRO\=žiKÄ&ŠMJˆûõ?ÆåmЩ×~·ÁÎV!4T×ùÚ«¾G!üë—ª&®˜ÕP°È–3 AóUP@½Ð×{²D¯XZõ­>9h‚Š ÎâÜäâf¤sv͹B!¤RŽ"JÅR¥—b<Ú¹nîvg½è¾F
wMº%ÙÁZRÙ–Ó±4PC´G[¤•]šƒ^»¸¶¬Ê…™*Ác§oÜ%»¼R+µÕM]åCøOŽx…C7 ßjɦ"²®{cʝªïZÜ.Øcçê{öÐTð鶙Áúc¯plÎü7|ò¥òZ29³$¦Ãêi˜DeL§#ÁèÑpm<´Û­†¡™#ƒú±®A&nµ×híí\µ+… { Χ|QY™zdT´‘p7‡ÀTl*zî,ZNá(è0f•ß ÊZpùI‘g’S5×ÄH²Y&I.ٻт'|ê…¥{DË·giOŠÐü<äs½ÚjôR§Å
¸È&§+@Ð!¦116÷¦jYWÇÝTËç|1ÃÂXr<‘`”¡aeHÔœ!$†÷¼lkq'©¾UuXaID1]ôDJ;bÞQÊýµÆÛ^
éÚY"þä0X#u»³	8Ùìy8dçř٫SçõüLzÊ?5“±:Á¿q$”irb,°C\Ï·˜I$TM	þJ¿@㤖×ȧËÓR%¢ïØ™ît4XýŠ¥¾<~7ÑRân%㲪ګDÖ×̐Uª3‹6—Ê5«ã0ÚYøù^Y§æÖ<4£8
sDÇ#éÇ5­{`  @'=‘ÇmSTEZ"‹øC—=V]›íEb¦&eB“ƒ¹X)æ«Hl÷p ÄüĐƒñSŒi!!Õ;:Ú8)ƾ‹U‚¾f8ð‡Ù ¯»àÜB^ß5}e†¶-fBd%"§x?¹‚o1+¿MÄJáw/Žo½Çáü^ìWóäñ˜­SB6~;B:vq"†m:ùS Öì$Í6¤–ìüÃì±ûœ}¼’zþݶÛ͍WZ°ÿɏ»ӓð²GÇ;‚IM´UEÊLâf¸èÚ&¹À’lÅ$…Ò:‡Ö!HŽVTýþ¬ÜKu¶ù°ÿg-©š˜)•¿éUœò΢wcg¨›áil
À€åûÉ=NÝa¿«ŽÉÞi,Pˆ=üv±zÖI¼ƒM¦bI)<ÚÃÙÒîBcûÎBA½˜Ð’:1Ø×ï75ŸWÇ¡õ0JÏ™[=uf|úmR ‘@Üä*¡yöL¥—Y[$]ó×OÅyóN‡É£w3º©S®	}i­ëêí(ê!A%ª¹’¢ùšSüÚ`Ñ#iÒR»1¨´Ä+$DóºF|Õw•ŽÕ`Í |q;-u"d™ºáÍÁ¨gîžÒ}[¦Ø%5(\”§ÏTaOª6aôü¯OIéç_tý:m¹‹ ‰3¬ùòú…¡µu2†˜7žBÐ©oä~Êý©˜Ý]ÅkÇØW°ºp>IIB§ÉG:ƒpóÅÉ»xâ<ÂãáÀ¯àð͏ÁVQñ9,Жy‹@} @V	fŒ?oǁ+ZGË É>µ£#+¨}$ó![xÄ &ºHȉŠhT+Prܽæ6Ü}°8ß]žën| ó6R¨4•‰^ñìHX
>Ãâã|ÈÜ'ñLj¸ékØàÑÚšrèrÌ;†5g¾ƒXùï»á±­7
ËhcíçA£¼ÀKܤ‹‘GPfN`>½Ôs<Ã+ê¹Æ¸£= „Ð8ó§ +xNᇥã¶3÷M’Ü:9ü“Öä†
Gæ`ÎO.9,ÄtøÁ³Ú›°îÁèÍã6ùò܏Ìô±ÝÌÉÝ·8*rì‹ Ædv85ž\vš$¹œHR+,rÉ5ïŠ÷÷ÄUŽJó˜ƒFr}*Ïà»ßð7®E¾§åÃ^vêr­l¢uЉ;lQbÅܾª²§vaÈ‹frgn1¾Â¬ª2R$@ä?W9Üs7iØïØ’t{ŽÉ„Ž±³O¼ƒd?]£lÕ!êG„d$ÖN­/:9ñCæEYSfc(àeÝðc¨•¾œÚ°ë•Ø‡æ8öFê9ÔL¿2N£¢Ñy%BꡍS±îª±Åðî.¼,Í™„``VoO6•ƒÖp$U®ªˆÐêk‚ù!ñS·¸s~-¢ö¿dÛ)–ÒcåV07EV×µZ<ôsžwQ	ՍMrï<Æ&c¾î‹<ÎhØAcc¨‰Q° Þ:oWDÍ+jùÜwz1sÜ;1€ŒÐ„$pÎÛ;®›M6•ç>Ms‹ž×¶Çœ0 D+phæíÒWYíÈ¥šŸo)bE䐨™ÙÒ…«ÏÍýø’C|jÁ>„^„q—wŽ§ø‡û¥ÒN™Ð’2ÞÜíuü÷<•Ô]JÚoµSvx]Ïbs&¨²çÄfA?cè+ŒâÄæDfgnØÒz‰ªoù$üFélIÝØÝcn,è¿)¬µôXY`þÞ­F&™üq¿yjÈèÓ½ºÌšíÕ[\Xk“8É°®ΘojúÃF[
ÿ>Yk©UªFVO'¤¯ŽÝ™

s!­ç…´éãÆÕƒüØu©òå¾yW^†Ãn–†×T={43<±]ki[ZK+éׄl¡:ÌÕ+TH‚£—ƒ¹“™8=D_]Þ£Ë&•Æ­êEy½hy;ÆÏ"g®ðÃ4òTÂ[Á¸µÂeöÅÏ„Ž7_w,ßyQ´¼ð×^ÒU©ÄýzÙô	ßD·FöÌ*ÞVé.ßoÓýuñèÏ®ßVw«Åqì9¨ôÎX0Ú’íß%
è!—Ðáïù›H“Dî:­ðÔρÇ:ð)(~͈m·±@‡7½žÒÌ×
^Þ²²‰2rGÞïz#™³¨’Éf(ûêýÎ~›ˆ~<ÁÂn(sk¿ê•a¼>G¥
5@È…¿;„åà~0!u-]3_$vTrLè
¯¸ùo
I©ep¨åÆRóöÔä*Ëm k„…¦wè˜^ªIõA·…-ÑËf†eû	è08ƒñôî¥prø$ô:{®þØjmà†lšÉ=c!Ëeèï Ì(˜¯PÜõ×ñY™âwŽ¡ÙÂxyáú¡ês“—ír–\ruzŽ1×ÈàÙA½#±[*l§¡¨dœ~÷ßgFýLU›3g8ê+£˜ç±É;œ4^‡,sóbr8²²·ûã·,íÒ5Þ3'Ì󄕆&WåËêa?e¤í½¶$(¶ú~Ž<3WY3 ýÌÚÖ
PFG
8‰÷êË%pÍØfxfH&袱=5œ=ÙQÝŒ%_™òr»o¹­ñÆžù0^-7lÓpAwRàゲ5æã+—ÑG&Ž0-š&c.Í‚«„qŽØxÔkŽž5ÉÉȁ«o™Ë[™¨ƒ¬O]›paîÁ”œêv)'ˆ|o5FOpk¬A‚Ž"
¾²Ï8ÍøíìçV·}sÆð>Ü[ë‹ǦšÐ-V½{ÑÇhÆûòNMÚÆ	 —¢‰~¶’CÕAa£ÎÃÓÑ„çg¶—ŽŸÍÏ'Vâµ}•›qpæ{ý_¬!¡ŸÏÑÆvßWǠᯪÏI÷lÃiÍcóÉU.ÌZ¿LâqN>ÑŸ„ç_"ö:—ç¬7'/³›B뮓–2r¤%ééÛô(™[˜5„W$hÉEñÙT—ܬ›“)þoéËÉgˆÑ“]~~¹F!¿¢#ÃRø{Fˆn#c)ŠByQ^µ‡ó7¬Gò8¹ÇÊNøÇ›4ÅôƒZ(QõÙéâ¾¼”p$ѳv)9CDT*üªiÒZnØ‚$ÙùÙ“„fEÛ¬›ˆ=KÇä}ý]T»¶Œ%ÁCŽ‡6°ˆX¡L„UÔ"{&x`”Ýá¨òNì)ŽÈÔ‹b¢®Oªºû(u2-:ЙÃJhœ¹zQAV<ÜùŸ ¡ÊÛk!P/s–yá"®JTËU´ÙÞd=Èea¶xÊ1YáÅT;HAAŸ %d^NÑj¢üÜ˹eyd´™	­lÊ)\Ú ¬3	3z$ã7 at 9îÔóÓ¡Å‹†2’‡Ím	´íÙÜ]¾‡§x’NÄ&xú=|q†ŠÖ}‰ç·Ȥ™¥—didÝ»k®<_‘^ŠôÌtjqçÉàrïå•ZÙH“ï®ö’Ž7H{l'iDóÌ$¦´Íòíc0@Ù͵«\aüb‰XÍŒ„ȧd’¼ƒhѧkâÃS°LJ*]ÜAÌé jL7^4bšI¾îüìŽ	™\„؇ŒL¦$%ôÞø%9	ì&|p'öNïAǁÕ#±ã²‡ÈBk:܃k=Œ3Ü ½Z ±OÏÛÇ'¥1pØ3!3t8˜ãê™—Á}Êg"ØÖñl*!‡Q赆7 ˜ÊWðcmvçN»Ü'MD÷lOŪñ?:ë]â´âO—ŽûUEöÜRÜ©Hžê1eûL!cVá‘Ìèâ¨º	+Q)6‘”Á_^»’“ùŠÏ¡Åœž^Ê*§\†ž¶l›<õñ{K«bè:»ç{Í2©Øלe!]X;Xñ´Pm!gá×#Qš¶¸ÕÑ,SeAú]ññr§‡=<M;àGÈtÖÿ_½šògG7{]Í8pg¾w=”A#,=¦Š'Ÿã''ºÍ&©8Ñ|Ü¡QÊ»¸&´ða ãÝßßÝ™#°c°ÆÈ0Õàfë#|)vjfTµýtê5-Ê´@àˆU=3}z5¿ô½|û;'?
 Æ ¥¡"¤h(
 ¨iZ;áÌ=|Ù¹,Ũ•BDù%·”—
~ŽŽ¯–ÿoñÿý9ýÆ}”×òß&¾n$_ñ<À¿'Ét: CÖûîîïkD›ß(ŸG F¥W3˜.•3j¥?¨>›†?Šjš,’D!‡ÊŸý?ˆõé‰s·¢ÀÜÿhæ¿Øýÿª«ù!“«>ÍOð<!ËèÒÈrOšÀd'ÇV‹p„É0Ó=?³Û²_Åà{ŠÏ¶ð!ß«ªFÈŸ–Ùšªär¨þõÕžT—½}T¸«ÍämEêÍÎölÀkMz)Oܝ˜i¾
i¬0ty™,øánŠm‰¦H'
ö›O;qÆ«FÄÕˆ¹æ˜zäåJPœ!ʈ5ÐÉË°úz ™Kó…´?øp®`du˜¢‘ûÙ‹ÅOc0ˆee*ŠÔ¹2QFB`f2ѐ™I¢1¥ ¦¢#Uˆ¸3PÉNbkOÿ6:”1ûv„Z¡
¥
Rõ`ˆ”Ä	ì¡Oß!¼ò2lâG\PÒZëšqH.–1Ku‘Õ!ÕûÄVC°àÌ¿ãŽòzCÜA±'X{µ€~¤b°iúð6jU–2'X	÷|€+º”  q#ˆ’г¨WÙÿ	¦<QcvY€F»1ªJ‰RŠMãbف²1DÄڍgfçLÞÄlí}œÏ£ÑökŒ¦óîvíy;Aš´ÓDQ|s-E=PÑÞ=kÁ›âz_è5”ý	¿<}Ð[Ýõ>ק?R^ˆÎ©ÊÄš¢ˆ†tɐâwI„î:Mb(¡ëôoÙ¹¼AÕ&=ha«±ÿî	Ùo°oèæù>¯§^¼«~½ü6_§‡É·ìù÷ó736­CµÕ¹Å
šB¸æzþØËÓ¤JBÈ0p
¢LÚJ†$˜.zOµ¤-‹©øHÆ{^Žg§rs\¦6¤l?tzûûš6ôòFÆCy$ˆ®Ò@„q¹T£ër˜ã,©VÆ‚"CNdÈ2þÛÄŽºêxuZsÒéasš©!;ß]Šèy»y$0tÈ> ¡ˆ¾$…¶èÃú{¾Ï·í¡ÿƒoþ4XkJH„e0@^þ]Oò˜?0	#ÿCÉúNÅ®«$6̼é|¶×ÑÙ¡…E¤|ÿ—|#&B‚H³òkŽ‚JÉø;.`õÇð>µ¯¥U8¤É.Ÿ«0·‰ÏÕé…WÛqo1™«ËÆ;ŸÃöˆ÷ü8%]:ºÀ¿ÜUo7…×Lø‡groÐïÓdjá
“A&j¶»}JÕ$¢€Õ(’®:§Â9õ†Ô5ã¸t"§åý˜§Ù…#}äÍ}'é5ËDõ˜ÿ•ÇjÂä—üŽ‡¦l0L‘*i»)‚m8¹´f(cDPFáSs©7zjíСàp'µ1
Q­–O©“h_ëûÚØW_—K„¾™G·	ïn)¢¨¢Š²í<5)cZEŠ±¦Þ™7?(øòÍÕªÒ‰&½ßô=F<g•ñÊ2ÚÄ •Eï¦3ù±ÎFfÏ!ø÷S,qîƬÌ2A’1@nÊ+^mXsîï .ÃJ¨¡°‘õ†}(8*²øÒøl–GohW«®†˜jÒ^tÉ"E äpÛ2œÏ¥²œ6mP†`»­Ã^–qãÀã¶ò¼fÎVôzM~~tody@õhJbh¢ŠH&	‚`‰ˆO2´‘Ý“L4‰#NÔö
Y†È•Èîr3ž©Ê?& ƒ
¤`Ám›©^ÎJãJ˜ØšñÐ@|ž_ƒf»òV“Jn1›úê!é2ßËüêÙ:t^˜5£vòù"T;I”Œq‘µãb¬PÓ±žŽéã£No8šàõuJºç	ñA‡1™;£à\×ß]ìZA؆Ôß"[ƒ¯=zõõP4
±ÀòLG‹sb”½*kBd2c«|žîbX%oͳ,}ïe„m`Ú€†Í3T[Jˆ‘~õ"ÌúÝÒ¨gdr89Ê;[GÐ
µž(!qµ
È•â–C™ÖŽÖ‰€Ðƒj¤òƒ´l¾l”dLîL@»µ)@fÁ!3$	 	%‘aÍÛ2ÎÓÄá»$îîÇt¼»¥×NÛïS:çî	úŠçRóÍ᪽ÔæÅ›ÎËšË)	A±
¦Ü
Æÿ//GB?d+‚ß
ç§é#
ÜŸ²9<ì]^ò%ñ¿“òIÝ!ìnúøÖüí~ôÆ=ÏÚÉ1åvnj«­¡ˆPa½S˜Rqv„ÌÒÓ*ßï¾ó³§¼êIænøÕ(ü¿áßX2X¥‘û{F¦Q§gá§,)í%¯”N8ä Bî;ôg»²q•gþk?VUS¿ìÝëÑóX_£·…/6«‘Ê­ª•×줺Tn}“®²pªU§œ+®5Û™Àí‚Ǥ”\=v‹|z>·è½Y;r¦š¢ž]öY¯d%\ù÷ssþnce_võðŽpè]_‡ŒzåڝGŒ™;ÅÑIÖêP§ÇAÒ½óTnîß=x^¤Ÿ¾Hª¶ªfõ‹§UfáÍàɺü {WwFï×
·^ŠzÔü}cC²—‡'=×é¼Ì,ááÇã²}e½ÞŽ¦ëi|_<4›9Ô3PâÑ Ö8lyTXjßÜI®è9ùìÝôՍd"ÆYœeÚж%:âÜæ¨}ý`cä…zŽ'¬Î>ÀÅŽƒNQZ=‹ëƒÁ]!GûW­‡æ5À¼ ˜®Ù^UzëåÏeÍczžêAáߣ6^ؘ*	ªêÂnÝŽZQ¡RÚ®eÔîŒ=-Æ”ª$(æèLŒþG1¤m1xzËzë‰'ø}…»”«Ç×Á^Œ+ÛÐB[Uê	 ÏŸÑݲÊ[—ñvÑŽ8A¹&Žÿ<*[ð–ËK´»ìÛ[lß|°F~…ÌC~““ÂQ´!ÑGÁ¾fßü§,Kß(Uyð$»ºëùrÐyû›]ÏÖ.¤;AE!”E-Æk&éÕ7ª	Š¯WË¢£çþÕõ^ÑÀä[ÇÀ¤Lþ_‚NOÑÜ×ú­×º¿&³Õòz=Yñá1ášaEàvÓ'mÈÅ—üp¹çB>2ˆ©kÜMÃåUÃL:/t¡dê‰Nží]Þ<Ô¾ºn·Ùzõ맆SâÌÈB1”£vçèk°µìpþÙáü¤Èò¿<d´¾…’e¥½NH ˆˆ€€€€††ÈQ8Ÿ&K-1çIa ùý¿€žÙƳnÄ_rÉF8?‰óRÊ®öŸß	/,νýÏ‘ö×ê²Çk¸Õ)ÝÈÃFÀ«R÷WBí]‹LŠºa¯ºh²'àÒfŽ3ÂŽŽÕòH»WšÈÏÖªˆ¦m!ã7¯'•ïz`ÕårƒÃZ%ïWZÓȲAÓãešë×é+—‚ˆ²Y^ðÖF1ŒKìY¶8Ç>5í¨¸Ò_%¶Ý£^	יִ¯ÁåV5rF£ÃÇo4j%§,ð!¯["Ükµ¦ëK£ŸtUõÆÍ“»”À§ÑGÅãJFr†×y|¹rôNAÐãÙM~ˆB7ËL%f¢Íhô&¹]ºÌ"}“1é²ß$Rõ•âÎ6nMþ”ý\þb×ÝS«*VM/\}XìM8œûs®ìÜ¥wÙŒ¥ÌVI5UË·#³mö«:•%)*òw1”£½e+=푝gj²ùZõÓLvjR£­ð…o_6ºaüڰ錮}éõ¾8C„,µ±“óÆ©goò㶓¯EP¯ÕMÜøÊvØæ×rî©ÒÈNSÚ»Ecñ©>Ü'‘j}7Ý»=°ÂÞTù­«œ4<ãMÞK×Èz´^$¬¹ôǯ¨˜H·“Ñ
Ú¢¯ŸZtÇןªvûjÃ]‚u©Ø•ú~Ù×¥´5SЙ˜ž³qŠUóvÇ*ë¾~¨Êµ(z=2‹ÕÄ„Û$i¼»*ª¹Ž”ú5t÷·|Ö§ŠÒšòµdX³ÅÎïí¤%.dj‚jiÇt‡Ÿ–æŠóC¿\°º¯	u¢¹ÀXìø*²WyîŒ)-·lðÂF•íksýdCÄ,ĈQ“Hê&O¿ÍxL$`˜I¹åÍâŽo¡?¡Œ¸žP”v’¸|=Žîˆ41th€H¹$J}NJ0ý˜Ôh789οmæQ%"RF"dbX`(!¨‚aî”áЦ ±($MEÄ
QLE1%*UMHDM#5MM!"IR±,E4RT°M-$”É$TPÁ„¥!RÀD‘T‘TD”QÒµMRT°ÔÀR4TIH3RUGña‰T4E(ZÄȪñf!T!;Œª‹VULD4U5!BÔCBDêzÄ¡¡ÞdII!·Ô«÷Ë©ûgpZ¥¨´6Äúˆ¦è!úH¢÷Å]±Pý±MßÑNÏðš¾áþ1õGý1zOûî/
ŽŸÝ‡3Äõ¿ºUÏÏûõÄ)ß'ñÂnßï°Dþû5J¿ê¾6:Ý$ð¯f%÷Ô‡ãþQøߊj‡Ò{ ¿×àŒ‚Y§RÁ?Y?BWXph¡Óæ(t€åÚÛ“eŸiãÔÑ¥@3„@PqóPý]Gä@jÞ3tùôÐe¹r€Øˆ'[F™yñÀÀÂd#Žµ5‡
oç+íùíû=_Ãüç×GÙü|ÿ‹íÿD?WíVUøÛþûn¢‡órý?IÄAô¢	ÿ'þÔDý)˜­þØeb>©í’Y&´ÇQŒØëk—‹‘%…Qvûæ]q~ü*í…³üÝMÑlŒ2?›<1º¯Î›}d«™õ½ô‹÷~¯×9ó_@ÜÃ_míÏ18yØ‚`m»1r
¼]®daòã^½t-pƈîzµaŽ7í'ìölÚ;5dh¶™~ÕFU帻øãÃU[9<žÞžióçqá:»ÿâü3ûqó3#Aè×¢°åêÆ[÷5ÄÈŽšÄÐ@M$4ãÇ}UR›¬òì륆Kpõò]>«á–ÏÞ¡º–[¶²ÕTªÜy¥áÑ_Š§¿»„ôú{¶znºq­Ç=سŒE4Öãé¹g îÚr7'¸f—1Èxéi&yØHÍþ Ú
äN¬7n®þéy¹Y­Q5kÕïç:6?qÈ|'I?˜×|eò.—Šï”¹z塍zuëº|zKyÒí.f§û€vcŒE>6mG.Ÿé]7H«¿ÈÅhP‚4)ñ‰›3蹶i®é¦ÑÍ`²-dÙ¯ÑÞ?¥q椡64ð”3å+®þ€av¡Šö|lPKFo/A¤–†«lJ`ý6àvAÉ>Qî:궫VÝn]â
z¥Eê¡ô–=ãÂS®
;4C2|¢vØÜy4Rªöqu¿Pú¯>7àP}6ñé­´œú'Ë_–“^ª{J´ÓI«2ËøÞXÅ¢BViµI&Ïq¿®¢ˆº¬z<ÝT&/qXuá;GÕ°ª~gÜhæj%•=[ø"‡aÍ#¨~m:c^žÏWE
`[R:ŽÈ¶˜ª‚Íy¯lùY€&ÝäeW+zòµÞZª"°.*Þ¨éc×éÛÓ`fOÑ»“dC'OÌ;R[‚ÈG–‡Êul1᷾닅7-½*eˆžœëd‰£˜rmòHå$Èì¼¾°º›®Õ³:ÚÂRèÒxƒ\V¥‘v9¿?7&f§(w2{Í=Ò;*á½s‰aª¹…#ƒ˜q¶ÄÜÅÛzÛH¹$ÓâðR籘 ƒÁÔW ê„¨öeqiÒìWæ00:ç
_Mf$Mm¸ÞCf‹YY…“š§*.§ªªµ1®´£Êj6oczψ<ýöÎËÔš&žÄèŽRŠ0MØ€ä­7?ƒ›4³YÛ™›¶²–´‡müÏé™ÃGÑTMa[|	Àå °-°ëXXi¤I<¹5óD42kKKK‹~‹f	„Âà M´êÇlO
·–¦*Æüý\ã£äûðîöOâ}rë]Ú#Y# î”@±÷÷Î94qâ…œúsçôÙØñFö;;UpÕñãžž^Ûñ5Øûzõ7®þZ°À£3*œªˆ²Æ³0rޏQ÷ŒM21DÑJÀH 's(‡ïMÚ1>h¹{üe„ÏîYüGÄ~#fÛÅS¨õ›M™9	Ö§†Šñø”PCÒé#B YCb4·…Õ(RÒ¥ßVç€	€`†V]†vÝiÚÿD~"´r泜 AÃkݨå•<ç—“³å B3Ñä>©úñ§‰y—q’Iø;†C‘•Tîî8ä»o/;Åj&e …'(]K»àÐ	õ@WÑ–Ú‘‡?¼8i}!:»7±”~9*òðÇA ª¥vCÀ-®V<Êâ£ÑÐ:X¬;(
©Õ[\£h^WÕ‹c^VT§gUÆËÊÆv±®={ŸLgÚßxñùâŒ9ßÍ´,öæ
Özæ/8ýä…Dâw|!¦J¿ŸñÕ•Óÿfmô£ížôeËlj²/%’
ÖNBO
U(Êͪ—x|0·Õm𻊌ÿ_+þ:±¾=<?×ó×÷|t-¹ñ·–©âH­8¨ë±‘¦F­óž†Ä£gÀn#;ýÏ=s{„ülŸFtˆíÄ«ÁmÙuÃ[-m1pyÆ$û²ìoÿ<ïŽõG®í,}Ž>Œàtq’N»°Õø½ú¦t‰r¾&|TÆq¸zFÊðW»N½ëEÜÂyöõ덹ò`’8¯µo®º9¤áø¾3έµÑOJÖ\qà÷)ãi{CÂ-
ŸjÀLú>å Å?OQG{éV%ññ˜F_HzgÃÔ’Aªs·¿˜XT ý^™.¯Ö:Ýôî,fó4ør8¬Døýæg×ëž-qÎ1×®këýGms®2Ü'XÂB”ûa¹zÓ²ø¸öÌãҝáþìÇ¥{¯Ïnˆ2!íGÙj­üGR|==á{¡Ë^´çªÂì‹{Å1ÇÍ|¯Ûwö_ßÒ´üMRô¿Ž
¦ïÛaÛuºÒáIê¯o/Ý\ááó0±‡Á¾µbÈ­õùÞŒ66bí㏍ߙ÷uòzI®Ÿ+V^WEcŽÔ~	˜ió‘]k5‡”¹Ëâ¨Á8¥%:Ÿ6ÿkÌËÍK†dï™&~Í÷ùóãögÝ}±·¦úc´¼pQ´Ê¸â©¯MÖì+ª,Õ³U|l«‚ÕÜøݧLÌ
O_~—áW	Ë\­zò'ÕŒ>•ã,ñ)7¬s	ŝ÷yäÿ…:zÏéšý\yU9ÿÖX‰u…€‡ð—ÜÅNš+dîx?`@_©ý’E¼ÛsêöôõùÚ•{<˽eU¼oØC¬«ã{nnxˆbé‡ç…¼%À/¯¹cGõ¼¿zâ#³ïÄþ-f³—Lj£Çë×¥ÏtD)ÏÝÞã¬-üvwÆó×äôšŸ~%âynÂÄEý’…>žoQ|IÄ›ƒ+ÑQŸ<¶	ñ×ÑÌñŠÞéocñù;µ­îVXtмó‡ô	û»Ëéà'˜‚†Ã
ÖÇyÏÌñý’6¨‘‹Ü’~*©å ÅS%2ÛßÇè.ž€ÿ8Æ* <çѸyCñŒ:þOÔŸèéD= ¯¹ô‚#yüòj…5¼þ{Fà"i)³ƒãkUÍ3B`Ö/ê¼:<7?‰Ê‰?[ìÛÍŽ&úHVä’G-­ƒ°m±¹b`NÎ9.†‡FA•9Çü1Þê8ÒàjÌÀª.gEó?‰Óøs¿
Ì9s‡†Ü‡òZ6š?Ä÷ €È?Ø:„ø@ߣíùaîøÿ$ÉÑ
Qï—3"ºþjËam¥Ä‚ÿi‰÷~\ÏIÛåÚÞcÎÇú±)'ïø¾ÃÖ€ÿ‚þèþqóE•ä@ë@$—xƒk}€|fóCTÚ¾¢Þº:ÑA¢Ù©¤Ê.ÂÔi¾Ef‘
û ÀÇá&å€Éšb ö™@ŒÏñÕ„H²'ù
Ö ¸‘i¤ùìfc»Ëý—…‘”€„Ü`wÐʨÚ0’€–íþï›KâëŽD §Óö†	kî1À0})³†üyð üÆ
ŸºéOŸ"óùÉ$Rk jÇ-zi¯L2öý³Bõ®²Q‘coÄFW¼(¤ŸÊõáƒ#€ÀÏj¥,9†g Í¢,c"‚‡Ž±ÙÆOÎùµÖã¶ñC„B”¦ib‡Ú2ˆ¥OÓèþóÿ˜ÿ_þ³RY7?ì¹ÇüþÂHþøÁ!Œì~ôyz0Aí`_8B{äõ$-„&I†I/6ãÍ\Èó.1…)H;Ôåt2
U#TR¨>£¶Ç~
—SžT¶ñ1 )’ÆýÎJlFðìY›Ã9¸
‰˜oƒkÛ­¬Ü©1œÀ„þ~quhGKhK‡Îc6ƒ1í®eq¬qÀb"@‚4áþE9‹B°G$zÄ$—ü£†4½(_øÖ¿SŒè]nA‡{u)øÂä·¯²¬œñr¾A…YäW<I§olĘ	ßl~U%^ɐ(GÜA‚?¯^»I‡ô¦þÊÁÞÍ»|0ïû•©bèTY5Ž©¼
m‚bƒRk§ÓF¡wm…	¬öžÓ4™MIà:ÓXfÖCI:œÖ@Ü™»¿¹Á‹Û6“Üj©?öÉ£zŽîPæäØæú$ÊýA…yã*¿:#ˆ¤†síspŸÃý1;z0W£HõþiIÁ£Áù˜¤ŸË™
€ßdCN܈:‚á8ñ%´–ešT8{ßìÏŒ ¾¯©$!áyƒ¶lŠK2¿Ó‰‰ÈƒEIF
Mšç&¸GúoqN9õÊû#†á×%\ÈÑ:˜ß)d
¢£`úsç‡,Çc—ò¸È’’fêG€‹*¤	¦ø’á”g¡ÞvÃacÅ
/ÔkŠPhè‡(Å$¦Í‚™Ÿ‡ÝûL_ÊüˆÊ}DÐÅd¥­“ò’"´ØP°¬v&Ôê¢ê7E˜=·ÞbÈtõ`ýûùa ¨Õ9=š`Cè¶ðDµ8Ä·‚ 
?Ik‘&DÂ=Œ;)ÛÄs(/AÒ‚úï³Xq—:Z ›õ(Ã
áÆÇþèûÓ3署ݻ·Æ3×GŠ‰á !ݍ!ÄvÄÄ#ªP~•¸‰E#`´X	Âã (q@“{PȈܠW_
ü)á" m¯s»¡9g΃éC$8¯Ã‰™©x¥0QCô±óþ>œt™L‰|®„šdÎ81R¨±K3z}o¢‘+‚U×l®|«ÃãÕbGHØ’G¤
ïëô·Të\âŠBìšÉ4Ð1¡Š’x-^oO¦äC¼‘ç68J&¢ÉÁ”A5D0_YOÆaóûïâwk“éRp"Ð&3¶˜D'p;lóm¬·ÎÅ‘—ÅõÑÎdÅã	ºRf™ç¤d%jKÁh/»˜‰x¹Qž® .FÄ|i¡êG§³ÌzÀbÅy¿	}Fç$\ó-±!;)¤‡Ε_ºÀÑAÞÕizÔ_LlЛTܐȅ9©„¤Â)—ë^4™Bçi“©æHÞN!i£½™	5L×ojŽÑŽ‚~Ÿ@îûwk5TÖ©ÎÕ7ÞÙÞ³³U"‰ÙîĐB$>ÀDð­#†Çh_´M•ÊÙJ,›¦9ågÐÌÌ—dˆyXþz
	
 !üv×àÓì2x
fÑF~úÇò»ºyK¼¶ÑŒ¥'CI®<‡Í7Á0^YÒFÑ%*Ý̨fa8ÖmàM÷lɏ·L^<òø~MwI*Æ™ê7…«:p(ðï½ûÁS˜’•4M7Jß°O3¤Vìr.`!1;Á´±¬ƒðôn¶©_8ሼÀá4Éâ"c`¸­731BvmZ¨º[”“§cn—€‚®ºößÇÖð>Ÿ&hr˜Ë˜/ÚtD´Ãm0ï;Ø‚RM6BEE„MlÛííþT¥˜î½Ð„„_kAÎՐkI¯¥&Ƙƶ摅õtPi“f|]ä¬PÆ® Iñâ@˜fK0LD3ÿM¼“œ¢
d=ù>/ŽPã‹Áàî16n¶ö«ó–†?‹/:	QžÿᶌñN øŒèŒoq	‚`lðTè¶ùÖúNJž	ÇaÜón_06irƒ×EFIâ2[|-†¯/KxTt9èB
©ÂÛè1ÍÒ¿UŒûK›F75ï<#„dUô0’Ïw¶Ëþœ6â²éfp¼³1“a,Eµ«ó
ûÔêõ¦«i³
SŒX·
„e0èÔ*Ù;ð²ë\p©—LXÎPÓ½Áõž™œïñóඅ@O
¦WÝm¶ÆéO/ \ØDmµÙVo›KbûðÜ
j®ˆß7^a¨y™™Íæúªä%‚G J睷W$6ž¾öñûŽ¹Æ¡å¨*H§®”ƒº&É„L"¶–oò}êò˜}ŸWâ—‡Ëøï-õã_Ç——œ¦¼àžoRß/åÕ!Õè_Ÿ`‰>nGŠLYüë´8’VüD¢;qû1¬²Î3ûñ’T±ÝðçùnVÊJ?{ É|çû½ÕÇölá
λôáü¥“6EÒèh"Y›Þk[î°à@Œ,××ý¸wô›¾£âñëô(|q&G±ô9ƒ:£¥þ#¿§pjåðùu×˸Ÿ™#žŽ=÷¨Ã»Ì†ÀRC:	&`}ã²FÒÂûÏÃ%̇„0}ÕîÏLæ\³¿IRHG*Wl‡¾—¤C8ùJҐçlLØýûh†˜%ý¤W§ì.*‘vA4€s‚tí¤,ËÃ\9û­µö=9\ùì+GcѺŒÞâ/›á¸$œqèæ¨Ö°DfÐy ’bõãcŸboËSçuvÿ"@9I
A0yö´ï[-¥­Õ´pû“1ʍ1Æ.®t‚ƒ?¦öºÞE_„¸y§Å¥ùyNûštiz—5ø]+¯Ö´L½›¥}jî”rŒ	!HŠ°wU¡¬M!ÿµuF;»ŸáÇt·Tû­°0þ¤šÒu»i]±|–Â÷îÊ_™E«Y! îm]ˆŠbÕ!ÃqI—Ê·Çèüò³¾+”kZ:ÇÊb_öP³|xÁs‡X‰¤éõB¡ìÆ~ýo%ðŠzuýÖo×Ù4“'âã\¹Ì
âIñUèÈÏmšu“ðOµ¦ƒú*Ñ í›òæœ2Þí †¸X†Ô¦¯^¯Æû~K¬©ÚV>ÕÅ@|{㊖ÕĺB:>-^¿^ßõWUºS[Ígyï†h9Ú,›¦v-Š¼|-õ[Ð cjYöÀôs¾Ž>ȍb, at M7vpù¢q¼Scs–²·?<Y‹ÑÌø{î%ûwÙW[B¡ÙŸÅ;!ÑÆ¿¾<¡óÍ^jð­åQê‹—‰³X!¨ºMÓ²wÍáréx¶©zàxðfÀ‘˃‡Š‘Ýþ+$AãZ 3{×Ôº¢× \Þ˜²ˆ(˜#嶓¤ð£Š|ÙVå…+hšç_WÃá}>Ja
{è¼]"i=‘´‘wâ™VüÏ8¬šH4iwÕ	eîVCŸ×d½êß²únÓ:.uæfeËí¬6ø ÷9¸fl(	i“Ξ\.ûçX8{øí0n
¬~˜ÔGâÀɁԁé n#¿ñŸG~ÿ‰Ü~D@þ¢@Œ… òʃðBÿ§üÓ†aü¦ŒLèÅ_é!DØ4!QSˆÆ9˜”K&ƒ7ª Õ°DÏî5¬
Œ¹ýf„Ø"Ùf0Y+Á´ÊËFh@iÃF·¤^k\†š@ca at G=Š‰’¢hšà ʝɒá76@âÈ´F1ª$é?Á׉çúó:rŒÓÖÄ2(ðžœbŸá΅ΚUà‡vùõþdrø~ϬøŸÇûž|‰' Uü½
Åú }ÊA “…©â„!¨x}`ÂÂ¥€T#øãÇ+ŸøÕ?'ee·ù}ß{Wf=ýÝ÷J~ ¨¼›ðõ’Ò}ƔɚÀþ´ÃÿNð„@¢™¨5ý8À Ð`ýª?¸¬ýrCYŠ‰û—2ày€.~`²Ÿ|‡ô3D	þhìƒÜÁ¶½ˆ¾'òp9ÿ^¬œÎ„2"Åô àkfàJŸž|¸®è<Ú+·¥â¡†ãy at 3«‘À;¡³.& b`õš
ƒ›’:“_Qа‰´å5V_üɕе٠7”°yŠ`±<~%è4âUQ[DwŽ€j
Ho,s
Xp
 ÝP¾Rò íÃÿ-6òótOé‰Rþ›?‘(¦š·»|jÂÏéKë_”L8¯ü‚Yˍµ+µ(Ö£# ÿ$!!ã79ö1ØJ^ï§âþýÖ“ˆ”æ<ç(Äc®äÍ8¶j·c›Ü¯÷+Ç5©¬£[Û©>Í+ÒvŒ¢"×¾àìb†Žëòù›¯GFÌíÅZPÿ•¬Ž.Y?ÕDXF†·]Oßô¢h¸!â‰Å1´„ø3¦yåˆ÷“ϾR—;\ø†&%Qý•eÕ„„‘øyCñ>Ã"ÆL|A¤qÃügZµ„JšíÇöNӐͼMÊf“Yåü[¨c˜:­giÀÓM14`ó
r>øy…×°r°Wy‘ËæD`m
NJ“‹‚49I¬-l²ÍßûïÑ®ÛÜIíÄ{…üŽƒƒqÜ
,Ím!Q óÖ+3æµÜt^“¸ç”Øç®@’”Ä9@£•hrNìã->‰]Ë›ÂÖ«—¹ÎœaÒÉÉÕó±PUE$DPSQ5ÕÑÉUPUAUAPUQ4EÜYâãŒíÛF‡5O×q蔟{À£õ½'wÁ<+)Ñë%ẫ:ôÚ,°oJ°ðëœSQžÌ°0.êJ!Œ,Y<­häš°_
ÿ5_b„×aŽ„@¥†7’<¨uë %À¨ñ¢Ö¾ÄͶ3ÌõiY
o²ƒržµMkÆãuÐ	éŒÓƒqØî2Ñ8F&’§+°v^³ Ø`}°žÂ­$C_ló0#	¸Öø¢„ëëù¬¨„€^/Œõ£(ŸÎ?ÆŽ´A¡‘xä9Ǭñ-<0Áñµ¬yŠ^ –àdw­Öè~01Þ$¸‡§3j!¢ öVËm.¨— ÝjÕ 8_‘ˆgl‰‘ssFPS܉ä_ÊBI!$Ø ÝF kt<0ë æ/Š¾bÈdü!IÁx[)—7H9»Ô8ÂÈPxô»÷&!´4£ZEÛ›Éx	p q‹pBgÕx†NH0Úº7¯ëÃ!ÙÑ`Zõ‰ÚëÁ°
È’ö/¯{“À0ÜS 6¥ y&ÁMÀY‡—Qí•5µëAw`e8YDظ9£ÍX¶Và-„Iˆ5^ãY‹¥\]ˆA
À !±x ÌQ‚‚'y#Pi´r`Ü“‘¼zã!XîǍfØÁ‚s‰ÿ â%`¹âoõú½ z’åá"z£#g×'ælŽ,1‚˜Ïi¯¬Jâqê궈1¹XÛ‡¯¸ÀyƒBùˆvÜýXßÓYºÊ?ÔYþãéæèkݤ֡т⇧ÑUUUV;ÝpÔL:J¿’	úÞ³ên}r»äŒª æ@¨¢’}q¬ÎÑG÷¾÷Êf9˜Q•%£ò'wdùŠîµà”%ÕAl©B×\/Ó€b!Æ…ìqÚ»mƒHb&,Ç«ãÔGD1Nˆ|Ò¥bžÔ}††õ~D¤0ˆ1†I‰‘H×Ûj PÜ¥Ú\v>f}?:L @ƒ×ÙºäÆ´vÕ PõNR˜à@Í6bÌT@âÆ°Õh,(+¼ijâ+Ò§(þx~}¾‹€ÁÐ5 ”ê(G.R„ …ß7ÐœƒÓ(Ë äò7ÀhÑKÁh9…+P KÉÈë‹Ý”{™Èr<¦«­ì¢I<LèF˜u%Š<@u´
 d˜’çךöù1hm\õ|D턆‹ÒXB€mBº†jýÄÐÎnÏÛ@~:Q²¾rÎ]«Òy“ç”6 p?sÃŽÃm¬w‹¿${’u±Ê,Ê̪±^@`j@•žÊ€^®YþD§oGoDõ^[7,8êUâC”¢!$!š{`í:€…'óIêØ©ÃftÊX¤³!yÄf¤0ÁaIs[к”Ó¨¨„C1Ë
÷C¯h¼ß\ß
u’KRÃøžàó™Ô*(ª±5U81É}ŒÌø1xãð%?¼_7Ä‘™^Â“ïHà ûߏcoOý¯¬©bæ`ñbân·€@í‚bD‡%®š àDx{§Î±žxJ•UUU,@ù\º‡¦	üó÷ºç®<–ò`{¾“ÓÙc/¯†;@„à¨æ\”7q*}š †à!âÃ)X³,¬všŠ!×ȤòˆÐÀ5
}ˆ¤4TÚ'P\|ëÚÝ€pÉ“S«‡–hjGJ€q€N*Ãd0ÄaˆÊR”¤ÄÂN@ç„ñG¨~ƒUøаºôT*.±DÚ•JP-EEB‘ñq1;àza¶!°^•<ÇߺŒNg¾$ÆÀeâê8/\0åÏ5LSäA¨ëJØKXò<\
¿…ïžx>³þ-uÍ=ç“øóCé::ûn±·kv­a¦x‰zÏ¢y4/µ-K³‚„=ĹèÄ\íÊ?xãCdöߦÚ;asù›_ºh@*°<@Ì
…îCQë…¼ü*‡P—õýAx†¯Ÿ¬±à"m†¤ý±¯_
<ûŠñL¨Ëf¬²úàçÀŸ^b+¬aOqçONyK»©%(
 `@‚’?ÀFԐ…Œ’Eò4ŠqǤ~A>{ìyÎȆ¡]…-¤A‡íÞ£J`ÝÞOQ­Jܹ ßÐÌĵò€“Z£°[4
fÓ—ºæ©$ÔE3Ô€ˆØÚ/—Ýç=€¢à¢¾®XI…ÀÉL8ìÌì€€@ PPÙÀ	®ö	à@šÉž¡:‰¨’„ˆD¥9\~ =úߟtè@jŠø¬ª
ª!ãûžGxT¿îÑø`•{­¢Ö0 z¼NÈ!¨`3 S3_]Ç-n Râ9©_	g‚æmÌÚ ˆk¶4@½S å¼óJ1 at jpMwA[©uwÅ• ›Í7Iäðoz@ÈÅÀp„2…‘Ëס€†ÊE‘w@(xj`õW9¦Ñ,°0è\™dä‘œœ``	ÑÜX°›àP:DƒsÕÂ
²èRd:Fª=¹¡¨¯TÌ
7ïõ{ÝSç‚YfeŸZC¼‡“'ÐyÕ•Eô¤0%ÿÛõ(a/ßCâEùO[ªÇ³Ïìé³UMIȵûàD	%=LpâgeP$35pUž‡˜ÇuîeAh‡(uM. mªV	x›‹Šl¶%qÑìw#äh<WغɒEe‰¢<W[e€YÏTڝ+3à¹4ùë@NÊ+ò®vñFÁ¤€
‡#`{1\Ñx
ÃZ)"ì<EÒÆ¿°‡ï}hÏ•‹ˆ^.Óñe3åÔ®I$ ¾¶³!Ê]’%$›œ|ˆž¡E4ÔÔÙ
B×m¬!˯î^€¥Ûùøô–šZœ|ÞX}Ï‹Ãj°(p¹ŠÒïÌßp|ž˜È1ë±u’NƒpQv`þbó!’u9 jæÑ´ 7í¸@d{@”!"¶h|‹âLŒ’HÃð&
â{×N¦ê``½ôi÷K*j7	ˆ<2Ö˜ØÈËÚÙÌÌKO× “d%9ùi S¨d%¡h…W‡GÀpG ÛH ÀrXr5€k ÜX9Áæ’‡îZ$‰ãUs$Î‹úpÐél°yóæ8£À'¤Äß	ØÀ&)äŒ;¨{÷ÕO!‡›Ñ³¸'>qv„ª¿µ5—‹¿îuö]K×Á^ Uì¬ñ]ˆ9YÔÔF¡EªÝý®;ü²²ÛVÙ¿Þ¸N»Ã6j57ÛÄ.@Ðvnâo vRH°ˆ™.fÄfÄ{¶1È•’›“AEó©x ”
“'`§#@tAèß—¼N d¦þ
df¿m	ºI‘ ÁHÑO)âv ên<Ì
LLŸ=­tÀ`a)¤ 
Q<6`s¡)ˆ*I€ohz ¾cÈ'C¡ØyÚ°wž?kÛÐGÈ>L着ª]	íG€à¿i‚Ÿa`I>¦ÊG?¯÷îYoÃjî(ñ{Êž©?
©¼O˜À£ü éâµË¬Ë<W!.åß´c/˜dHFäž…¾ ˆùŠÏhºeòÙGøè(`ûÉš°X at .•Ø›¼ˆK>¿MÞüùFCÙk.³¶÷¡Á¤2¸oHú­naÇã´¡45jÈM†&Bû½`×$ô…5ßÐ~âX±ßŸvçô&×UË ýU•…ŸL›â«ßȪŠ¨¬°‘¨‰Š¨¢aÔåUEVaÃåÀêÈ÷]ÜëG)e¿¸¾ñ“Ÿ°¿KŸ>X2õ»2E€@6@ÿl¿Õ~¸ÏÉ›áškíÍÁÊ›’ ù‰ýŠ€f
3i$A(£fí¡õ!ÀÌ%‘rl€ÜgÝpÅ¢Wš“Bd½v¢Y7qÕêDøMÂHn7k76HW,Ш"VŒ©‰œF uÒ“ ·n~ݵ¡ôGîD:[r;y–
„5y Xþ—v-!»Q»ŽÀØ‹Ì\j	€`–
âoâBP‰³BHL„^PðÂ@„B‘#w‡«Õ}4æ
€A   'BïØ7
ɝÍ"Üv†&įÞ|:ê’E‚)’²¬¢"£0Ȧ	P’r2¢ Ê‚%ÊÌÈŠÌÉ+3(¡³&œÂÃ+q”ÔK°¦†‘ªkõc'YŽDeQUUP‰úýç1Wy_¼]ÇâpçÚNˆ½$vªt‡ÐàEóG@£¬ƒA¨Â#Û}Áê€O´õ›ð–0Å4Fgûµ°;8‚q¸Ì0ªˆpˆCP´HU#$ê±è¼{TGŒ3чÅ÷ëbŒÁÉGõ{¿¥€èˆ{µ†Ñ§x¥†â x> `~Ãy¼ÀºÄÖº*èØ@Ø‹ÃgHIIÓËà`¹¤<>
³hTª¦£êž—Öû‰Ð|›<í7‡':DÅøB•ÎÂd& <rm}þØÿáGØìwºÜ`–M¢îR0îI0oEx]ÌÖœƒ¢’@7¢¯K .‰äšnÎ`skäG	W'o5õë'S¬j›•Ûu8îívk©Ô{xdKnêh™µY¨ƒÀ8¤Ù•OŒ<xZÁV®Âå÷j?>†XëfíÂ>ˤÄ0ºÞ_5¸}èyâr¢a‘@‹Í=ǹhš»Í0
!‚´€ïX8ß9¾p#‹qšw Å‘&"ãÖ”¨w—1¥3¯DŠLiÐFäž?«ûOŽêA÷¡&†óó¦òûœ7FP|cˆƒŒ¨PŸ—ïæ.y´Lá1›Ãíû
áÓ¤WNîÿëÕNEVm’Â9?˜×øŒuýL7k¹Ñþ›ã(ÖSP¿@}›°b65Šïí¾
xîƤìú ñ2É‚“åîÜvY·t	åÙ¹ö9ŠAÏWHžt
ÿúv°Áã=0÷’_ç?Á¤ì›~¢5i›¢R¯¥H‹•Ÿ½¿½õ¯ñÿOä”Bo£ÎDZý½ð:+Â[áøú"bµ33n™&Ü44”áòŒÇ^·Œgü}Šš¾È@¡{‘‹·u¾lû[Ʋ£Kº|±'ß÷¡ÏoK¦íÃùÉ3×µ·º&kœ,o¢¡}6 at BláƆýê=°rfÌ3G?·q±Ï›åÐïä¹'ͤ¯íÃ\jçË«¬‘øÚhèúA8ëüeH°š÷Ÿypýÿô~ñIþJÖ™†&|è~Q¾ 餄I$ À,§«ìCòÁÀ׏Z†æ‹þÍkú³4ÈÈûPäÑâA¨†#ðºN$™Üs‰é‹ì“	v:¶º½õT¾®ç;ø¡Iž½f6ä5Ф8žvpç¯49b U#µÌ4móŸÑ8£ßˆj]ã‘âÔŽÄÇ@ê w¯gDØ'ò8ÙÄ£Hs³Žz
NYnâj¹y€SžZ
Ÿ {¿¿*@ÐÖbFɆ :5 Ð1=€ö`pô`OÏNs9Ñf¡Ù¼œ¼rð’Bž¾Z͆£a˜n9Ž¥éöðÏh~²²ºX7Å‚‚I.
¨4l#Cƒ¬4'$ø@3Dh/Ï÷-Áò#ó#Á×þ%@;ØWå…Gù~è|Þå~ÄŸwÖx¯•¦B/°¥!ùKÑçûø}õ-®§z
	êy¨¨ˆªªcó§Ý<üxçÂ×OÈo[Øm&m6n l±_öÓŸa€Cpß²™W	¦ƒQ@”ò?Ü Ý ¹äòAØ~ÑאŽ»·–
3#¶ hC¸(ÒÛcÉçï&xœpx£Ü?ÄFe…E˜©ÈpBƒŽG3,vˆô!ŽG†e“«ÝA²Å͇ó•Ü°ÜI-¼õ ª[ØÓý viŒÂf‰%õXí†\e#VJÉFH3 8;¸<üƒ>§!ݤ:ãÒÞŽƒÖ’—¯&»ÿž¢ÕÀ{8éRUJ6½_àiuTJÚ>7bXHJê[„y›9–=ê)Ìôï'ü\ÃGw6wSvg¼˜nßÂs„N fMJ¤4J©Gp9(dvt:§^¿‰$híß	9µǃß
ᡱµ­—Ŷ–.…LªñÄ¡Á‰Ê¢§Y<ì¡¢ ªj
)fyæïë–¡ÁuBÔ;ɁMaÍÄ9P€žúŽÃà^”±m®;ò–Þ]šîFÈšoI8+9nÌè‘zT½’K.è‡#isŠÝÃÈIAaӏŸm} >
¤yçA&(ÊÄQÀϳGrvwö恚ê1u㸰d)?¸Ü0¡=)Âå–ß–œC#κ€	Kn8èQDÁSј¬4Å3`j†£Aj©:S*ä߈óf£$’$I‘Ô+¨k‘*ûÏ71æ¨h9«ÅLÈk3)ò›Ij¨A£s3~NˆÑT`¨¦Ë+Óa€’JSåJ8a¤ N®€™¨œŽ¤XšÑ¸Öä\l6À\ûB潚:±´CÊjï"tNÐn8>|L1ÎáÜóNÍ…¶†D*2HÈFÖïqßëñïü™à?	Ôñ	†QN´^5°1c91Vq41Z)ÊÃ<Š½],K0/I7à=«;ÀêOIÑôzÖ	=ŽÕ‘aÃŒah4‰šˆ‡þ yàˆèÊøu3]S¶‰™ª‹LJÀ÷“óû½Ø^~¾^ï“û`þºšXù¦¤*$i(h¥f©§„ƒéTÄ_6š"Í–ŒÖdSø1ÇXeÛ4ù¹¢ÌÀHˆˆµŽôê@‰Ñ*ÿÅ£T¥ ‘%0HCJ}Ü¤s -¦ˆYlD=µD5©ó…ÏÚ8sv|#"÷,X¸`Îæ*S0ê(ÍV£ÕiïoŸºY	Ëøæ×@`ÄÎZ\`BL#¸øüONÓ`:%Æ %ý?£ùA¨ÖDiYËÐŒ;yK’„°u\¸¯/ÂÒù A˜‰ô™H‡Õž®Ä4 SP¿‰F“¯~CúJ{»/ðºrŽæŒpì"Ýž§§gê‡È#g+?«»L,ÔŽIÃPûLxH|Ó¸“õR6Ž8GìÝ.)ŒBw´&¨a6i´~z°¨>úþŸÕŸ‹ö»í¶ßã$„™–á?î_L›toøõ7}ÐR&‘9ƒ€ÀP! ÃØô‡¥ºŽ›#ÛÉX&¤
ôíOì…å)¼‘´ÿ.µ¨ÌÊŠ‹Í|7ö©á°õ)êPñ™Ì¢ù!!ìÅr’ˆh$ŽÅêï).ù ÉÑòÕh`6A¼!'ã?/wòµõJ·1Òðë
"#Ï#8jh4Taôa†‰
c
QB쩝ØæGlC;›³bÒ“x¶„ <Æ–ø½°ÏXÌ©d‡DD,
5ʃ!ø>=uVa‘¡!ð<CÂ`‡Øf´v)ð‰ºRÙ*Ús$wÒöÃSi']›ÐOX_áôz07É•LaÜÜŒl¥Q¤‘ʸE!Æ4.Œ$  å*.by¶ÑA#5[ïé¥×viÂA0Åvx·AffdG‰ºŒÔ8hòOÊæ‰ù¥ „½RˆGÒt¤ÚÜ×Î4yÙøÓpROÝ鞪%cõ*l& Ðì
†Q
 daSjÖlcÐƽ†u«SöíII«YªRð„7(êC,'5( & ª¡–!"Ô¾ØG]ÕZ]½îH¸T2S¬~r8”9¥ûÜý¤¢îýmHD3
4%Èx&ÂQ"xb¡ÑNÄ>x1•¡b‹ës}5¯9vMDz»~]!‡Ð	Ùf–ŽPw
皥*§Ÿ^Ðmž|BÌrɱ(~&“’›wú
Rô“ºJ*¨Ñà·g at Dû}0ïîRZ ˆrEÌÅCá²V ’
Jj'(…@1p¤ÚwèþÎñ:°cÄ͸-Ð<®!"á TLEzò"šúöÁcgC.£­X¤Áò{8’©ç™b»à™žo4¡ D$	Bl©èï9-Û–9yè$ç·²Hɾ+OÓ:VŠ#1Â$Ì3ä—I©˜/ŸáO@ÑÙQÀͧðÉE/’pp&à߸%E¸{
ó¡k¬Ä(FF¨.˜ƒá(ý&ÞpÓ¥î!ý_0=ÔK2Ò»'„È€‰ª©Iá@î-DˆB*4ÄñQB؁֯|DE !и„a< ã$´›ôí…üÚÞìÛc†6#{û¬êw¶	LH…09M˜#Wé@A¯¹¹œ¬Å—Z²I ›š„T¸àî	H —
‡‚`ßF-Oã§1°;œé
ô!„;ªV´£8‹Nø¥<yKImmŒt/Ô·DLX©¸3Cæd#‰F–L(Ѭ²Z(¹ÀÉJNXÖjµ@1€äL(ÊÁ¢Ø•£oV$ˆˆ)ü.C at x”Ä.ÓJ	´1FŠ0QÉÂ̱ˆm`ÆâYT§úz!‰
ʇÜEï¨hZ!±ï¡Ò#§`7|;Ÿ+p*Ð,z<Z©F½$’»,ã¹7imÏÀāRÈãü9-&dBCÓИ¹ˆÛ즀ЇnºnÆRšøÀûâ•*Á¥hh *؈Ùg©_ˆ•î>tòˆÄÏò£8 ‡|ÇÕvo"˜D’öÝÓ`Äp¿±Ñèô_|ãÓqW×ì÷›ˆµ0폙¸7û6Ò9
ÞY¹a1‘	90‡œZ7fÖéËÖúŽÓ C÷ã´= Dü¤­Iåîœ^ei; nbc29	ñÀ^Ô掔‰ èï¯á¾_Ð}—E‘å»çÙMQw?UF)(X%ÓßC¿ËY¡$¦FIA’á!L’@ÅPRéXÐ&Y“f´\ýþ‡Gvg‡êÇQ5SrŽ<x–Ÿ0}!ÍRDl»¦f<CQm5¶ßõ“O|þ“æ ™ß#N…V²E dFŒíiBk*Ö3A
8l|&ì´i6‘ù‘ˆ
™X¥Hm]O£·l0BHü¾*$èµ"¹+ Ї<	Š%ñ´f% U„RÙfWÇ¥éI
e×ÒŽÿóÎ1‘ð—ú¢<Æ„Ž°-ØË~F
>“­‡¥ ¿\š°À‹+<ÐQAéðÀ|$MúnEPP©õçÞÿOSÎ=š£ª2:à—"jøøp׸ÆØEÊI´Í©á(ÈHs׃¡…Ô€”,2'O'LÈÑäŠÃ0úpë˜Øœ…¼ûæÑ9à™Ç#£‘ªÖ¬B«Z1\Ú
jc€—n§·CKщzlEÐÑ·DÈöF6‘1CG#hAñdB	`‰èAˆüþ†E¿%ÙšAI¯ÎgxDLz1ÂZPˆi(–‘¡dÕ^pâ’v óÙ°/ÛØs~H
Q(E]nd§Üð5ß=Íš‘,À²¥TtPvÄQäÀºZŒ4Vµ†`Dl\ÁÚÉ‹`ih€]ÀÁz‰àEÊTß@Î
A(!3«tz—S­­Ù¸(:÷44RуPˆp€*,!Óíœ
¡¿`3Û'íTŽøñªFpaL
ª,5I-Y1£M±Š™B0ª1¦¨êí+hF6);!È`W-Õ‚^©ßd”²¥ˆi¶Çã¼^(‰$VÞaD:Æ’"5w܉Vµ¨cGç÷žë²ûLÄuaX˜Ï{¸ä(p¶ÏfÅ»¡ÉO	ì;éE
èî%ŽzMh®ê¸u‰s<=NÑät%2K$`1(P¥"á¬ÒûÆ÷¼§0Æ(f™¬pQÀ¤ (
ː±Àº:åܾ¼4D
Ìo6¬îéû}7Ñ
0—áRQÝT¡0!¶ªº¬P(œLҷƳOR™z8ÌÍ XMXicI at bÚ‰J§2 qwAGˆ8rBò^ô·˜<Ð$@" ¯õ¡jI²,*¨­
å6й(+%?A­H;wQÏ~tçz4Ä7õùó˜C!7Óaø&˜«<ÊbÊdè—˜¥ófMRT@§¬“c´qS¡ÆóN°ÒÌ¢~è)Èæ%ÆÂa6V+~¯®ï~UɯÐr6›À÷'›¦èLëÂž6CŸ%o1—1!Ôa]˜áú@z‹h;Nzð1­@bÕóo±5€*‚HœJ€³IäÐlx¨â‡3„ ¢	”´fX”5w&˜a*‰Š˜LBG$Câz…šöâ¥$ûÃÛ³,"x=JEF@–¬lúyø]?°×ºš\®œ:ùy!Ô½êà3†Ìÿí—ª9 l„žk	pè…ZýKYØ	Ú[Ý÷LÈÐƐC)SôYZÃOÒBdsÏoƒ€8[bƒ– <˜VcO¯Ç>ÆJv‰þçûttÝ0ÀEl±tÞÐÉ&Íut ÇLÌ»:štÒU~ZýÓLQà‹j”ìM³áèaú*Q
Ý)ãzñšŒ'³Ûr„‘ü8e<C‘ßÙÀ5¶›<R  a#'ÙTz™Ä ƒMMI*ƒJ¦Lf$,#àê#Àˆâ…6aRO&M
cGÙFàÕ(8¦­á†&D40LhÃQ×[=Y¥¶ÔQ¡‚xHØ#j@èϬÓi•“ec¡XäŠBXEFq}R*˜3±´Q£c##ԁƒp{îœá¶rb˜…U`íÓW”;iXA»z•Šï¸ÀÙ­ÝYlšíð³;:ðڝD‘—|¡ í¨CTDN ÌÀÑÐèž'S¹6daK‘
¬Ã©oI’ÊÒŒ'H#S–…Á†0¢á”h=ŒJAt«bBj¬Õ	È3mÑt•¾E)¤­›“ÂÇ
<‘Ãxâ/2,!Ì'ãÐR†ë0A´Ã Òèúk‡QÃK‹›+J&ØX™èÀ¼4µ¡ñøSüÅ·–®¶Ze…EEZÌ
zÈë³`|€d‹—sAæe	ˆHt¡Ù‡ûpIT“t TIhm“²ƒGÇf3WZP…8n¹l>°ìœû9.¸—)CÒW#‰
BZfAH¤Å jéØ”2tã{i¤]T>^nZ¦+ßÞõ‚üá̽ÝƬDÄ,P´`èM,¦öìM„,^Ý¥:°?Öuµ¤aíž¹jÌîµßiGGLÒH¼ãªjjj+÷{!µû‘ɾí½{´>@‰ \=š}Žâ*"ªì»;öÒsÕ<
ô®\³f—’©H…„ó<ÐäñÌ`/m!ñ·Ú1°æ
à
³!G®¼þ~û/û›"§ÙÐ*‹û÷óSÌ¡Ÿ³J¥C$QM4´3*uñT™!2¯âŒÑ4ÑJn Y€ml"(Ü~¬6>èûéóIDÂ?‹Ó½áª4‡cHèg¸µ^;ãÑxãð+‰ÌF%&¤1I³É¸ŽÚv×¹€’šB‚Hˆ	!h0LÞÔ_4£ICB$žÔ êBâ
sʸ%)¨=»Ñ ýI>ƒ Ìãs‘7;ð _°ä^Q0;ˆàÐøó¬Åæ¬AûÁ&€Š€‡SÃ ï ²+½Íã!#mšnõiõ9"aŽ³÷!a'&	º0gÂøÄ1A›cÃ!¶5–M‰ÛˆÌÓÚ­`ù¶ÐÔ¢">v/;Ð^	"ñX„‚pÃyBSÛq´ÍLÀmJäýz×]õ~/ø2oaÈ#Ë.ïûp5X¡qNH„H@~¾fÚE´º|añùªœb+º“”vy[C3¢HHŸ
²çq‡Çä[Ø‘S$סidhµªÅRHÜÓÇk­¼XusâXv‰=†å%¡¡Ï>ÒS Çru|À] %œ~s¥r}òöÞÉ‹
‰BMZßÑüÒbE”GÔrÄæ½Øæ°:æ!´ú‚“[¿ÛãøgNU°83³j_™~+™t”çðõÉ®ŒmÚ4N“º*7̦
ž‚0ï(ªvâLæ…¥t¹Qr:Þ8¶tûyáõÅÃïœ)lNO&ü30];0Ý&3c¡vθaŒ­[ÖFïi‹àun}œvÃìX¬ÌõY(†Ø/(nDÁIµ.	,Ì#Àð:7v<ð¶j¨ë¶7©½.ꍔuø›7–ç]K3as! ÚÂ9$-“2k`ËÃŽ\êH²L`´Qhv²:à(7 p\Žv%2rSGB§A˜Ž8¶ÒÌ÷LÒØr±,òqÅ …Îüpýg“;.+J‰À	ŠßI€õS%¢Œ.›´7n­JÓ2‘’­µrÝœôáγG|‰™ýLÄæl·94ÎÐÝ›rtƒ».
’DúàfÕ™‚#Žr&ó¾|!lƒyîÊ	 AEÞrqÍѵèÞî¤sµm2jÒ!¹–bo·7:c¾ça
›,Ï
⁦ˆ¨ñZàeäfD7ÕâáÛ¿r(FΛ$ìh;ƒ8‚Õö¢Ë$`4ÅÄp»˜t !&À€iÚ
I¡1ãO›å̳ M,Ëgx—Iæ\z
´j‰™MfüŒ†t!Ö‡ÇUS|…Y¶ÅŒpÅÖ¸´Œ9ÉËæKg¾Z㸎f,€2l=;d\Û&4뮬m‰ÎÎÇHAÒÒL%¸á˜Ï˜‡ßÄìkÆñÜßhfàÍSìӝ]³S>a¢–,röºjÇ“~8ª
9ã+Ê꯿¨Æ$ìÝ		™&Ò,›Â”òü’ãa
Hƒf÷6N`á6‘´ˍ³
^Mµ…†HvÍ,Ž¬x™ÙŽìÑgH%1;vçC†¥Üè—vl˜úi›„ܤTå‘íÍAAð&è'G"fv쇡g¦â‹’+Tvl³0@µ Á£b2!E›ã¼ß4ùsƒb–›ocƒXÎCYÏË
Ylœ0ÚqOV#LË	m'\ÚW™»ªÙRдCÉ´HíI—‰¡P†<‹•i(çdEÔÚ½Üà<Í=:'Z×’;t~‘À¦¯B¦ÉËž.t"â7§ß\´ÔnĆsÑ1´SX·sH*ÐàqíÆaÐo¿ƒ¡Ù¢p9dÉÝJŽÙÝ3˜ÁgY
UCÑ^Ér³Èøà’›0_‹zZÖ»"Ñ6øc.vÈí")
H’ø.úë–ÆYœd©ß„q“$«c‘˶ֹAo,áJé52Ì7yaå>Çì‚g9[=Ðnû볶¼ÑÍ™ÈÌþžQÙµl6»à±Ùü*˜ë‹ËU%<™XÃÀN½Ù¶R.,
‰µ\v,‹5©ÞºèQŒ¡vzf-(÷
&ê7 î§±2C“k…º5B1´@Æ‚…Þ	È)³²\ö4f³ˆ"X†BácÏ›iÁxûŒ¾Á@íjI}p"tÎé!M«d=ØŠR Q]K“
WÂ{¹v¹ÅÓ+Žæ0
‹ÛÎÍŠtìr¸áñ]Üpߝ:Jp”õ}ÈXk?ö£‰ÉoQ œ·ˆµÔoÕÜŒ¯58ù³WV#y˜ŒF%5£S:àÕIǝj8âÎ5Y¶£êú@ŸÙcÙxÛ/Säفëz¡™Är–ŒrqŽF1ÅܺðÍ“fÌéN¥% ðG‹$§xPöu­o­‡àâÑ°ëÔÃkÜbÞjv¤pŽ‰,I¡¨`l0±M]
LxBƒz6W–)hr:»ùŠdèSž‡¬NPé†5JkÙB!‹@|-ÜÆ(WšžØÇ|Þ’0àÀ9mâ`’ÄûÄš^¿¤í5Ãø	A›¶
¹¿wnÝ/{Õì€vø	€Á9È@l&ƒë3SH¢†ð
Bä$È2c–À¨ 9ç~¥À//ÒÙJÊR-H=E‹ ÞCF†.ÀÅ»€VAJ½èt`-‘½ÙÇDtD5!¯Ÿnýú¶µey)wýÝ4×=*Ù¬¹)â:ˆÀ÷ò¶ë:›×¨péà‘Óéã Zjwò‚θtK›8áB×;òcç,“ˆÞ›èMJ5(åäs„ìåøè—&Ìt8áfAÔ
a\Ö	-p'ðí£“XLV÷aI"뜎͞	N°Hô»Ù4Ï9nE®zœtíEË$º*òæ(¶™4’ÃÁa/m¾ë½j91Ù„ÉÁØõñç‚[Ç~lÍ°r®”ƒÁÙÒ9:$amä¾Î΃ßMÝABð,·bH”ÒŽÚ}ÎkÖHñàKÁ^ÞEVÝø"4çuÝ“à‡ÒèĈé™-@ÓÁàkß ÌðÆEÇ îç]Õ×ÍóuÚ›aÆ3#™ê°œàË5´çpë=µ»ÃñøOt‰ÚoTÛÛîÙè9Þ¤vá8„zwv㞣a¼÷âšúouÊ
rÆñÝ6Žjü&^,“õÍéRO at w¬+D@.˜&MÖ$Ü€”ÔštS؉ÁM™
ÿ®—vØT	MAOžQ0
î!’Aù©1¢É	  *!¼‡˜Äº‹!ÒX9ñÈÜ*4(„¿/Ý`"çjƒñ÷‰òÒï<&ì!ŸÃ+ä~ð¢`C‹±Täe at B€Žƒ¦gk™fÊ£
1ñ!˜|‹9m`)̃c0LàrhB"t’Ї&8ñC>²è–^ƒ½}(8ûË~e¯â¤äžgºÁ{ŒPJ¯F§‚rw×rða¾5A*‘ *~dDàï} wƒḨ±UA¤ÅY™êC^ú=˜~Cƒj°¾ÑM‹ÈÀì%	({/²AøCÎ`=Ò]€dó߆©’¹æò€b	2¡ê¡†géÆ”e3)(¶–¨àf’’ª¶²ìуI™A«¼0po
B´Äµ£!˜1¶¡½°Ñ	"H‘Ë@«6À:êÐÌÖ`Ž¡sQ(¤B& Ìvs9Ùƒ™ñ®ÞQ03»"~SÇ嘆$ËRùBÁ¬³ܪ¾lŒ‹N‡FÛ‘¸„!!ÈûåÑ„ŠPB%Èú>>âýÏ\M"P„ë8¯8%wõ'!.ìÔ²7!O!Š©ÒÈŽï¨öÃÉÞû¥`‚!qO%
cX1iE-‚èÅθ3ÓfÁhäÑh|6¸Í‰­é¬¼É¦£¶ËÁ2H§6‘4ˆ°~~K˜*¤C
¸-s¶k¤0C«¬o¨ôQ‰£…f@„!àÔcƒ9œbñx äR£Ã«¹wœá×Ö ‚,wD×TXؽ“XgëÈ|öªAÇŲñ‰}Q|ÝXÔö×.Ûòöûý=H÷gÝc]ôƐ“¢²42Ó†}è˜s”H‰Ý8çO¾*e¶T;¡t[ÒbHè0¸ŒµÞB*d²Þ?QEñÌ;kÞpl¬È†-ÍÇ?l]§Ø>ó+º8C8",DäNpß…Ì”àÉN–djoÏy¸ZaD.:›Ä'©‚PiÐœÙh €Y檁kzãm
¡·ž©ÀØá#‰‡Rr¡Ša«…‡
ÎdVI8Í»ñty·JËÎSÂJ0Â3ÝãÝe=œ„arÎîùÞ.ª!:9ÇêÇÌ9ZWÑ> ëY	|¦†Mƒ”&G@â‹$t*#814'AЇv»Æ¨p<$(Z™qG¼ž"hmÑ”Oàž;º![Ê ­Èm‚?g¸‡ð¥ÍFZŒE iHR)‹` ð`ôƒÈ3.à§úbBëšÀ{w‚¾÷ú_Ck ø%ìÂä }TS H»Þ° À48ôªŽ ¦R†B°Á‹3ZÕ† #Ϙfqƃڐ{HPb@ð/dEÜb6‹?Àâ¦wƒÞ(}24¥ PHš8/J§s‹á¿w	¼{±%òË7´÷Ó³V›òñÍGâ…]‹ÒÂg“Ë~­¹`TÇtc-&DÆŽ“øß|÷1²F<ÑÀ8‘mºíwǹÖÿtr1Î8fØ&³4u¶qq‘áqÎ
;hæÎ`Pe>öØéüaò¬ÜßM¹ä†b 	`êº2xÉàãô#¾Òl8QB‘¤Øãh(
NÈ	ÍÝàîÓÌ—³ ÇtI]¹Ï>32ÇBÚÒ8éo0^–S•øÂHTH…’ÊDçªÌðgŠ†²ƒÓq5ÂÅ÷/Q\è­jŒ«A'y”]OYÍkžý¤ fìšÏʘ@6{ŸGƶ*ñOB86Š¨ãå&­)Sw¸ì÷ìâÀãdˆÈû‡Cß°;×®ÑòxeRÆ`T|1˜Ía™¤¨ÖcˆcBêñúb$S’ ØP ¦""ˆ”CÛ#‘»Üõ:RwÃÄ÷¢
B-‡§ÉN,5ŒÖ˜=BÀ²Ð)
@
á¹>"»Œrwj5£*Hòßz7Fá|6ØHØñ‘¬Â)Pg	Ñ´n(¥~¤cÖ*àpéܸé]cÅvg¤læz$JèÉ"W0+Ä	ÈLh
x†‹Œ’ö|@ïþYç±’l0aؐW“ÓÆ<ì8("ª˜¯Z˜B¤AûG)óÏyÓ¤GzYO˜Œ!¤sÒY´cŠ{t`Pð„8Å!Š
ô#(Á3?z
ý!ƒÙñö˜BQÅ°·	mÝP_iÜw\tă"´9.l]Æ¿"¸Rn[sÈ
ƒ_z`tN°9A
(äh÷"oÙBÙI¸—ëš'#³‹û	$^ƁcËfÈ.h}?H[BHáà'1
1»‰düm<ƒ\ê ¢F)’`‘	%˜„È!
h`C!à‡!2Á‘ 梁›»ÓÞýDcàG tŸ¿Y
Fžû'Ût0 4ª'Ä󊁣vÿ~ƒ¸„:Ys
¦ "a†Ð1ŠR	P-PèHthí=ü0w‰U%Æ/Ì06h¤lpÌãHi´KŒÌX#”—uEE¢pÂÀs 0‡1ÀÀ„¢°¡"Àƒ#Ã@äÆ›c+Ãl1d!¦ Þ¾¾jî`,û\g†²	7'ßµÙpßÀˆ|’4èž%7)©¾›¶ËË±æ(E;Á!´wºÂê÷r"Ãr‘GqË!ÚDH ÷"yQB”(¦ª!S¡ÿ*¦ö~»Ï_Ú›õæ
ÄxåøMa‹PԀ̈m0²ÁS|ÅBÛ²Š.…B%?3œ	 |ækT¹ÄñCÒì?1Ó´,l’´¥¼Ž')ùÏç<ÝŽÁÖa¿
8
ÓB€Œ".⢠÷"XCê+á©f/Åôi}çxIÌÑNzpCÙJÀnÚˆõ;
÷&‹ú·É­¢T€Ú6<Ã,¡×ççŽãYÙ—lÖq)QÆ
nҐ€8ÁÑQMA	}¼‚ÀŽf þj·-÷Ù¢”àE›üÏ €eÄ\äÛ†f	ßÝ‹eôÙ¤
DÈi}@øùÁhøGÓA’¥L`Áä‡4à$ Mö–F`À^˜
dïüñ!2é9Á³aµ4ُà"‚(Š_h'Ä«!°›»çƒÝ™´¿Ý£‚7º4B¢P^䐐4ºM at EZ’•ð
itvpÕ ƒ3W»Já”Nœ’+Ä
H1¢P	ØfË)¨Ô¼Jy§‚'®"Aq‚!“áߐ¦]
Ó…H léÊ4î#DUŽH8ýEtxí¡DafHÂÅ
Èn³ì†ƒ­ÞCÒJÂòÆ<¹³½wdÑo"¢ôéCghqp.¡—ÈŒM©	¨ÃÛ‡DØ<NÿÇ÷*käà>«:&æádhŽ~XŠÊb‘!Ž0C5#‰	Ü2™†ôÁuBJ:ÞÛ—È$3N¤·9£¦’š#,n9†$4Å-Àt9C±ðžïà‡Àƒø[nnê§ÈÓù^¸ÒøÒΟ¿1·w(‚Ãt$:	Ç:L·•´v¤ÓB3_$"÷ŸØ{ÜuÄœæ,ÁÔ_Dã].`ÉÊÌo)€dZÆz¾g²î àeZ‘‰¼}¡æ‘™ë¸80
h±NsÒfïÀ@ÄH$X(À‘SøRî|ˆd¾ÌéɸOÄ]>¼ûìGIú8â΍ÚСF6èMâ\BBI’D7lŸ©º/6ò›€ˆ!’;¨Áe,÷ËÙÇ@2ÈÜr¡Rð"R'åÏ•$r¤øÆ},01‹%
–?Ø(A_Gøífҏ”Þ­á½¼ÚÄÁoR©lŒ+‚q8¡CôŒ¨‘¿ÔF³ȸ-¨Ì@°"ŒI”…*,lbB 7a
E´|ÿÉŠÀ<q}ïÙFˆˆ™ÌqÆF×AD«Ú’Q±¤Ü®Jà9óZÞñËæ(¢ˆïÓ10	š(¢†[ÿ áK Ã<G–ñòsNLÕ(ø#†/è`ª)ˆ ¢¤Ô¦TT‹‹A…1 k;ËHDÑ/.Ç÷‘ƒ{TƒC²‰
q¿ŽJ H'ÃD'¯ÚKk¥_:‡vâv†	ê>ñôÅ**¥ªÛx>Q–2÷ú¼~ÖÚ„¶$Ÿ§”¿)œùf	f%%™0Æ…ûÁÇ!çA÷ÁßöºõHAQB”ŽE)f&E!0¬M
Èf8D3!°@Ò	Ä¥$H²Ä
1 ”H¬f„´P-R(D$ÊÕSAQR4©IA at DDf”	)IAPP- ÐRDLÊD‰E´I%-*”„H¸„çAÄÔE)¡i&[h?00ûüÆÄàûHØñžÕÆ0²’ª°Ì3H à”Oœ„C’6Û‡$ë6aŽ|l)=DI&ºŠ¹Ã"²x!¦H&›<a¨¯œuNk1ª± Q%U431)LMD@@1,1A­	LEÚÎÃOû~ç°ÌÀá6,(GnHè}̈à!ʈ‘¿ºG—&îS¨yÁ.r€â!?>5û¾ƒ,Nâ|“I8þËbú‡8…%±¤JŠÙö=0
4-8tƒÔýÜTó"ÁÚ;äÌa…¬ŸM¡"\׆ëó	©ge•(Mžt÷®(^aªèû¡ >ˆÒ`x¨?_R•6£0°š±ñ;ÍáÆ
ÏóµB³âú½Zò¹‘øg¡f•R…zÿ½&
¬Œ28<z|Ÿ.Õ-‘‘iPcáª%þ 
¡J|sAï"¼ùú
ÀÀ
M­ä¥m
	Ô¡€0)°‰>½¦Ü$Å1›å²5HH õR
/ˆï3r›5¢yrɵ­S.¹`	eŠÄÁ ÉL$\ƒ"‘bD„&w'™¨xŽ©Ï@º£¯{›Cé ÷qá SFUä'É$¥­	UlR9	Q;–ue)ã=cF®vVjÖ–¢ÂŒåÖ¦³0,²ª ËJÜÕ¨¢‰&X›‰á.8Êd¸8≼hllcQ2cs€åÀ8Š#uo€mþWn&ÜàÔƆ¢qà9ñŸ‹¯|@áÁC0¨LlLÒ’¸äÛp“!´Ÿà½ÐÒÛÂH’Xvò( º Ü¥ú
'žSm:äœM~"Ð&*Ûìvðï$€hð~”GðÆHÆv
 Á¤W˜È/à`1×V„7	f)¸ŒÞ?–ÞìXãŠR€¦”¬"ª„‚ÃzŠ½Ñ©s¬ÄŽ'ÌK÷%—߈TQNhw at z¤ïQ©ÐQ
n¶(‰°†Ø7ŠÙ¹) u« :ÈjðÃFhí“Û^ð²P÷%„¸$u
‹áaôRŽ AÄÕ¥þ‰+L‘Ü<øìTÏ  ‰¨“hzØE
¡ü{¤ûJF~žò&
	Ùö0tC¨"Ck. ´r€žõRÞ1³¿œH²QÞŸvQï`ï“*ÈÕЍgW—¿¹|²žuñ¨¼¸`½ üæS4348¬‹ð1	Ð6J:‡dê&,­´û¼2è‘îŽÁ¶†¨ãŸ Ûd;“*¹'ÃHk¥‚N±†-y3HD¯—‡DÒ⤯+8CƒJžºVÇH4ÚŒ;H»ÆUÏqXœçö™ðž ‡õή$§¡ô}M©ÂCs ¶z{Š8ÔJ…H¥( ^Õv ï=‰ïüʁÝITˆU(CøŠ8˜ÊÏöl5ø\¼!1>J_4x)NÇ íÏÝ_pˆƒ$ªRÏRàãd>¹x„
pE?hÑËvý™“éð0?ñë[ÕoCu*¡G‡œ;>:ø<'AÊOLVýj>!&s*qîù¶FÝOÇ%Hâ,Á­T|bæ°Â—•] L9€‹Å/!O!^ž>ýÉœ;³(+qáþƒŒÞ
(eCF ê²yWιhÍgµÖÙÆ´;Ž0â[+±AÈ‚2Ðjuƒ,-émŽyÈn;GŽÃ±À»vá>|r+b|¢Sæd;ðÏ2;AàÝ>é͝3s‰L9‚Î	¼-!ŽÃŽ™‘3>sÆ.9ÎŒÃÆži»å›§åøÍ	„Ò/*
‰k…†iŠM2àâ0tçkjV(‡
øäÒDÝÚFg"°Û€˜&¹˜ý¤÷èT%9‚@—ó‘ú¼pX³™O§t­
ê@„õ
4ÊåÓ·7ø4¦`0mÒ¡rãp‹F›)Jôš«QTW–ïxg&iãdE§½HŠ€‰PŠ‘,ûŒ‡Qü¾xÍxráwß0ˆ>D>hZbƒ}s¸S¤N¾¾“§ÊŠ“šRnçÝX¾ão°È<`’"„‰2ÒP„
DKIB	BÑ’¤HÁ Q4DÃI@¥
5HR@‘$@´„ÂčR‘!2Ä”14¨R„ L…TE(LD­EL°10D”P5EE3 ƒÌÌŠ¿§ÏòçŽ:£Zr°l
¾éöXZ0GÚ	¨‚…úˆ‡« Ü#içŽÃlÔ©·žÒžø¯Ô–¢tx&Œ˜*~	F"‰€ÑÄz,“	ãÖ‹uO©>©îòÐ07iª¯,üò¹+IJÒ9d)©‰"	+0Ȉ¥$Õ¬ÇK9˜3HS+ at F`¸Áä|0ªƒ,’ˆV¢„†H"hVÞŒÕfRBS3’8Äñ*·M…ƒ°êLŒ„K >׆&àüwàH³d†@D-àm„öÛÍ‚<HŸ	Ùa=p[¡‡åéô?¥vÝ;†`Û_ Âd¶%íkÜÒèýZf\ˆë*Bî”ä	É]®b40|KKÅၚöÇ>¥(ëÓU³aÌvÜ	eh¹&Å?¢ž£ "¦(8ò­öpŠ&OÖ@QžKצŸyÚH=HÒ’(bCh;€:‚6ÅÞ^h0™6xi×iפM¤„«Äo$—£'š5éà "!(XJFãbÀL
ƒ>ÖÆF€Ö€(y#߈Cã;gÊ1çîØ5-@˜Yž®¾P3G«›í£îBÇã÷'ÞL5ØÕ4íîGeÄ?`4ׄlO–#,hŽ0SäjÒ;Uƒk!±ÀÔXñ@ÊÞB0äPXÕch…§nù%ó†&3‰èÑ£LaÆ‰d¤Ž¸ãŽ8
("P"X±P©` D  D  DfCMaùò
Š²!ª.òŒ.*IDd?{èÔ›R'§¹¦‚ç°>‚5E'×È›ãœ\b äë`KD>Œ¨e4BŽ
öQ÷¥QMzáÀ%<ÑР”‘¶¾Ü!„•úØ8.àø4§iMÔDÛ ‚ Â~ˆ‘KcŠÄq4s(ÃpÌqÈú“0™Cæ<*é´M!§Fͪ?fÃôêµ ðž³aA¥»Ó	ô ˜ß3‡Ø‘¶P…›© õûí£Øûæñ¤„”
ñ"iŸ ¯cF!¿Pl@Îåuö^†$QHi%Š¾$æ´;=ìÏàCPŦgSþù±&
“ñ­_ÊpCš†ÕÓÒea™!²Àâ"!ƒXȦ]‘`%F¶à4Æ™÷‚
PP#z·OµÔॢ‰‚ÔƒÂ$Dò!‘F‹Z6Êh)‚Ù8B±0D9Ž6êZÙNÈÆ-¡@´QN· Ø’A÷	ˆ
I0ʦ¥ØóMŽâ90‰áºMcd
±j±°Óºi½¡æ#ŽH×<°„x à`èA›H<‘î>/Ú|@! C´^ òxM±#0cg¶&„,=¾‰Üù\¤ÄäYhÌâkœt#ˆ`,dèøìo2;”¶ÎD¨R­˜A†
bĉ¾ìÚíäb¤¤0äùùÀøÊ×tnÒÆG\$@Š³
L’0Ö÷߅ãfC1lxb‚kM”ÞOkRQthºze“L400L
f at ZáK="Þa•d-uáÖ†’(‰˜<ÿ=­HŸ½âLíOeퟋcÝØî7
Œ2+<(ÓlV5$"ÙÀÒ©k†ì¢-;Ìz‰@~¬Öv˜V4!½§	ùíZÂTú%ÿ„xrÃâm(}éVÍw}¯—ƒ9æýkµEƳE31=m_ƒ7§r¥ÊL{ßz¢‡Zž£Z G³ÊN…šµP‡Ð%ÇGÀ_/c¿Äô¾Ú)ÏC‰%h5"7¼f¾^-s§í³Øt*ïw›D,§R”@ SÑdNj`4~ªž[õ:-å‹MQç±–UÑï9	Yí!s»‡upÝwtÑ —7O¬bܲ’]Й˪giAÀR»C” „Q¤2ÿ¼#„UhDû"TÐÐph"cPaCš0
ZT•ª(Ûc%ŠµJØ1H¬s!ñÐ& [xˆñLI©qVE%BaÑ8	öÉ^H@!9e¨ðÞ˜‘hwÁûå‹XèŸsàÛ†1-„:À³<(gòíœ0³¨A7L 	_”z„DJ(Â,°q÷%A¸¿”‰ã“p==çýB7ýŸuÄþéOëŒeˆs%Cëò„Eeûü†:½ôòˆ‡² ·î
Q¼PóDŸ$î$+>jBªdp¾¹b¯Ì
PÕâ­ cì	g€ˆŸÉ)û晬|M-܈[#oðëëƒð&jªiÉ–àÉ‹„ð¯Xë›Ènyqd ˜ta¨gf-‚i—p¾væ6¶>SUsµa¬:qÅF+Ûµ2’§CÍ».HE¹UTT’ö¢F+¶‡@mü
ã¦@Ç?†ò–±ÑøŒXm¯ÕL>ýbbB+ЉèÜp®1‚€Ù2',Êf7l¨"üB›{KE«°˜pxKt­
²Y΢Km&ù7ÆM|_ؘø&Â)FX‹ž[JÜMpÐœhÁ·‘›ûüãähn&²îCp¬Ò„4Š}€F‹Ž¥d’i at fÑ"¡ñØÀÒ¡
³æ!@X®®æaD&ÿ3Gèaž)„üŸXtE,LÑü®>þ[û
h(’<uC€Pt‡"BI!©§@/QwÇŽ¦»Üw”< ¥
ïÊ#„²Ÿžzë9w'>Ú¨vjFJÔN%˜‘gXÑA¨rÈË¿XFœÈRœÔê†Hª¡¡w$PBCÂyÐ`ï“ÞÙô‰Ãÿ±¾¢#3ëò°¨±KÎ!‰;‘òd at 3™ÃÀ(–"'ˆ§Œ12ä¤â­ÅÂ;p'L$•4L]SàA{H X1h€ÓœÀøw á¥Q¨©EàÁžÌˆBI½ÛÙõ
ü¢ºE³bQ†Þ/n6éÍà=õ—æNÉ=ï±"Ÿ˜—g~²> 01¨‡wwqqŠ¹w˜X‰È³î0Sr£—D(Âí‰î$.zå†þp¥8ª„=,Š¬`ˆP‰›ŠÈ[iï#KƒèÏaÒ
22CØ3.&ÛÈbL´em¤ï=9óN´b~”WXåö	3ÜÑÓkH€z씊÷xlr)æõ™Ö±É(='ÛѨŠ²pô“Ã7ÐÚeðÃZ€£ü±Âë"±îÀUaÄ0±(´
1
×uC $³eœÇ0ÓÈàð@bŒMàjN
:aÂN°i0[
 Z1ZB0¡*·%¹2%FA2J¤.5lCr©¶
Œ¨Š’_ë´@¨c¹™X¥!Æ!0
èª̦F'c«àxÝŒM\NˆIš†¨e{%•¾.Nw¢gxŽÈÜðâÌÄÅ!#&4$”na* ÉY£1¹Ã* ‰€ÅQ² ¤*4f&#YMÌÈQš–¦°³0£c‰Æ4Bý$K0£œÃiݲ™“5’(Òm´•aˆ‡$Cr(Ø>[Î348@‰¢F3)HG7¤qf«E…)46ÚèãmÃþ§$)
8+á¾}	ÇyMFe`u²:&ÆŽ!È¡òê
Ôd=ÉFã,(FÑJR
@ ÛŠ¸ÈáFFfEF2d$–'5uƒLCCH[ÁÉÉÉJÔj]P%˜•~+f¶k†5Á9æx+õæj]J'g‡B–¬<‘†ú}1â¤ð—–ƒ°`‹‚õS“2
2‡å/$n@Ðb¾q.ú‘Q]
ª4Š$4$h1‹VÎg¦§¸ÇeÓÙ¶xõ5fz¨1oŽWïÓ3[„—J¬PêY»ñfŒY½|@6q)¦4k5¯¸¸˜½_±Þñü´–'Û1Æ·›ŠÍ5³¨ª%©!^PŒ"lÀp¹ÞˆU–GÐ	°i"Ñýœ`=ʼn.É‘â
¨u
v5,HêDu­²‚â	
Ô›#R®¤rU0…§†-¸JÆ$ÁኅLä1i5¢<FÌ1>èï†Ñ}Bè"
C’õ€¥1H¨<‚m‚ŒŒ4fZ4y<Iüç;AbX""Ž#(Z –I( "™jýr’?€'Ø÷ß7:+zÓ»)›1W“•øÉbhxM“ÔG°§X2bmMè
¦Ä¯òž»¶e	*ƒŒÖ¨âÂ&|L=
0ÃâûÙdc•ëðfÈ.>ÐÝé}P"á§Á"ˆ‘ h‡ JdH•J_1eJ"âÄShÈ,!â@ª º¥î!oG¦}šž¡Ø<ÝÀJ:Hðåúa7§çÌ!@‹c!=åg¡(ÛzÚsu ât=:NÊ2õó¢0p‰ÆÔ+PÔ	ÁJA`DXÁ)ª$5Ô@¾ËáÃÒ’ãǤÅóbJH!â ò¯¶0ž ÄïÑ4Ò:<ŒÖ˜ÅßD‘:bõD-x~€NJ®IÂgZ{餼}¶i4éÂzàË.Å<§„N‘5á.B)©òuBCã=œ?‚˜“ó2v}çí2ý©êdL‹¯mË쀙ýNrÞ(FbPE¸ˆ"SÂPÔ!
‹¼£ƒÅ€ìÉ U¡ƒp&LL‚f
Ê+±¸ )]=y8B¡i¤LÏÀf$Ä ØýìQ)äøÝ)ÀQEE450W&cabm²"&©ªXIHBˆkŒL¢„†¨c!–QRÍ1lhÕb‰Ì!Š ”ˆ™¥@˜ˆ*I)€dg%qÒI„Ž`›5(â	‰¬Ù²#Û·dœ¦ˆ@A±d*#µ-
B~.ƒÓÏw8I|ƒQ@”­´)!DÒJDˆ^Ñ­Štü$xáììIÕ^"ý8{.¾ë°û2h<¤ýò„2€œT8ƒÜ3™x‡™È)Ca£Ä×*„\ÈY¡Hûü~ïoƒ§žöĬô]ÀuÎŒ#{¥%Ô)tÃå/"6•õðÖ’ÃN;¡]žI	T #Èàg\àøDH˜t–KþØ“Ã@q¦€;nƒ…@‰TÜ8ØfGçʹ@ʼn„pÔj0îeä‚Df“à–€ßeƒ¤89A€˜=e¼Žrÿœ¦´Åš/ £¦h?mœ5†Y1; ÿ"Ô(€¥¦|Á6i»9ˆD°ÌÐHæ²	„çc+›˜:’€³ ßÙÅÁúYCq€wúþÀ+¨’1BêîÐè¦lP‰ Yc
‚©{Žô=ÿ>xÚ|øÀôŸyÁ‚H)_çœ(#ôNKÐDMTUIÀhÌXOx…à-?1Àð@;íôžÇ€¤ª‰8 jWìÏŒˆ† >¸LbE6(ó
] {Æ‹¹||A„Ø%1 ä÷à јU3JE	’) „‰…¥ PuòTC›Ç¸
ÛLIÏI
ªkPÑTñ鎳%mªÐà„._K BA¬_ÖöŒDCÀEÃáï觉úeÖuJI ¡‚¥%©béðkNŒ,‹0ÀÀ¥9üyìÆžp²±´ƒ—Rdß1p >ÄÓ2± ĝĢd14>ò¾˜H`J`Pãqû1ˆ&dF$û&IDÀ1 ™-(à|‘ŒKÝ*8$Ÿ	F˜La2	Wvf)„w¿(OÚãw~ÒÀFÉÐGÌ@wcƲ5,!É-- É)31ÉL‡$eå!N­ÃÇÙ‰^€Ó_´	­\ªx%JqÑ™˜qž">'E_T¢Ò!Ótv•Bœr. mÓa$Ûc÷Bà:v `*ší¢"¢`^G	@ ï0…ÄÌ#;/ª ÏYBq=¹+Ih®ÀGù‡-ÆÛ…¬¯‡Ç=Ûâ]›!Øèõ¹}F_ÊìÇj„%Í×ÿïÿŸåÿòþïWîþY¯þßåò·wêíý¿÷Ø¡¿ñc{ö§ÎÙG£í1õÑk@!ôÄ©ö@OÅ dM‹Ìþ°¡ô	ô@iÙ!btm„•ª0lÇÄŒˆ¹÷`(3VÍY‘	æ‰(ÞŸ«eWüØ™^L‹íæ™4åèÄq2
êNiXÏèpÆf4ØpÅÞC¡`”9•‰pËH6»¡…]×,h™ˆ  9,!dßMïظv49øz8Ä40Dÿ’Âc¸ÿªÔ­Í#&y¥X’'lµ2 at 6J­L¡cÆÒ­øƒe¡¯â)NÃlX± }B<¢]€jÊÂ8²¡?hÒQû–jse§¥£?Æì®ȾP|:â‘%0e““„¯À_ÏÑ(DýÔ6§)Åž1ƒ²©R Q‰ 4 e‡Ob(`d‘à}
A1Á
)ÓÚÁl¢£–UÆ+ªÓøÑü¡km-lµ¥!å7#ûyì1a›€blãR )„™-)*hp\Q¢„)ÃÅn‰hB#ýQ*D2KëÀÁR%…£¬¡Ýù§Üw”ô ¥éK‹@§G_ÊyÜ=Uî²JR'ç0‰§O‰eTï?B¿`4x½$ŏŠøñ2$2/¤0±ËñÆæ'„p–LG'úq5ÌÊ7ï%!ý•X!û蘹˜›û…>³ž‹øX\eߪ3ƒ†˜¿‡”h3•…ÞRŸ¢À}>7;½L!™:õO¶à=‹óYäƒFè|»LÐJRÁ(¬4ˆ-wz‘w<00"_§ÏxÑ®('
¢ã†ýzõžd¿ŸéÄÃ?ØOðs¥¥§k]Ö‘¹øÅFýq³©ËH^ªënÕQa))žÿŸ¢ìÖ0ÿ£±˜`Ù
ÉpÃKÎÿ	ÇŠ¦k—Æa žOÉïËoø.õÄy at rK€àî–jmcÕ²©´Zq«ø%dr{‚¡Ñ¸Ž4C¤{ûä?ëÝÅç‚[˜P"òÁƽ<{1ž)­@œÚDѳNµ?ëTá`gÖKFN~ûÛNÜ·ùçY—Çyæ¼×”›ÏÍ/%E¿g¥{lU×#îã¼]ÎZÊAہ6Á Ú‰ÀÒ; Y€r÷ pèS¤‡q:¨( Ma7¤<#4G[cćYx–¬“Á¢üL,õÖ*¤¸yÅ°8Á>[•µvh´µÎ!Oᣒ§AAªf at 5ýF æ\ äšÞ{«ññ¸F‚î@û¢Åíþ`îH‘}ÌÔj¨_Uñ>ù-””$CQ4t}ášT ˆXI¦÷3iôÁ›EéçêyÇ"¤`RqІÒ]LP6ý‰?µí™ÝA¨h}:%ŒJóÖ®ÚnÁfØqàI!E"›~cr6ƒÀÈõëë°»wc¾\“'h]ûJ¬4éAtcÍ8œJãFš‹3 *+ÔÖp$—É5GŽnÔ* d¢>þ&§D^A•2ëWy)’!$P²n`q'%7p·–·ÈgæðLYŸÕÎú„†@H$=Ïó•b@ˆô
OL/cl½~,)ªHAÎQj­ö±ì̦u˜}rÊ|âä-mû–‡Ü0À¦iG¸ò´Ñ’»»ìXÀ"$ Aš”ý^´¼I$„å¼€_"kIԝÀ¼Ú¢Ö¼ô07+Çb>Äf—æ”Çå— â;4dD]sóZ;ç¬=’˾¢}¹ˆh°ýÊîeÀÆœ	ýÞ؉ôŒ{VN
.Çr½ÓG²ŸB¾ñÓ1ì(<â\
!uÆÍ© u&s?sßdy@ »8=ldÜM¬Z‚š\ŒS7¦4lЧƌ&ñžtš²r}d
Ÿ)ÂG½á”žf ½‘Ä9#Ráâê.<{£7J})zµ°7âEUÛ¾ÒT—ÂGÛÔŠ)¢˜F#ãpË]NXí¢ïY¦G}ä/l>ƒLµÄJÿ*áªÆ=Ɛ“ŽAòݼîCÞ„yOÓþ¿ÛH©û|Þ$z‡D£‚yP¯¯É¹mò@¯ßô8ÉÛT0ÖzçAL1)¼Ô†ˆ®úÃD£n#ÖiG\Æ$ƒˆ ˆÕO8æ†`ŒâTáY‰3;CÃ8ãàš4òjÙ¥\”‘ñ“£0õ¢Ñ®Ó+Á”ÔRñ½©bR(ŠŠ?·g ²F$6Æ(Å„Û ÍÅZt“NéšèF˜s†0CÆ`”qEÓ:ðtä¬ÂàN”òÍaа e
†9¾6¡@FÒ±%·ÀëTż¹lPi‚Á…%¦š­I402¢5„mAMHÆ];¬ ‚¥P ÄÂ-ã°Ó£•AQ	DӐĬAÉ-2s™É9Ïv­bIàaÛ#X9%'%q£çüÞ½ªt;ImtDÚËDCRÞ˜CzÚI(,
”Š¦Å5¹§¡x¼£m0‹3a¥5² ³D¦!.‘€JŸ¤¾ êŸ TlßZ 'ä>‡8PÝgf+¦‘ó¨ò¶ˆŒ
Cö`öÂŒä‹qb·weÐ÷Ì’o²pHÅMlIcÁƒ¿ogIÝ©¡3
þA>®;ù¥æèê?!XacZ¾ÎäÈÝî˜1!šú‹Qøpûäm:RPÑ3".ø2:’ÑïF£#NPd¸áœ°cA’z	æýÙ·ê1Ú:	¦²!Jú,]Ù‘0þ¬BD™7˜”|¸@A CÃ*9BD&½Z”Üiƒˆµ†Ò­F¡E]l”tÀ!Æ°‡
•ïGÓ	’Ê[Ý'Û£F.@î8‡†mFQq	‘’:bˆ±HóXèÜ ÞÏËìSØgÁÐÙPØ:ÂAÌh”>ÿ×G¡IËu?îPh~uœÑœ‚eI##¹7<Ê0vúª Ù–ª’¸öJ’ œ‹˜S¦'EQ1)B«åÃ	|nIÁ­ƒ¿Ïò|åHlË÷qô÷»/6'¦ œ„Àìc’ìŒ"¤ƒٿшSöþ½Ua0‚Œ^ÇçøºŠv‹¾"ƒ¬kÇëó%ÙóÂðP—V³ k@è218#ƒPTãò<q`@4ŽÃ°ð>Œ8Dã=i	™áÚ"ë`‘
4¯6÷…dEË™`óBw”½ýç|ï:áÅ–!Ýà|	£— 2d.T ÑCíØM‰{"÷<UouèìÚÕá¢IG!º–@O5hˆ{€Ü@"•¨¢UýPá#hhR_ñæ8‰„"=¡ïSÞ|ƒ•è…ÿxÅ^t©cÿ‘AöœÐ9$}>ÙÇè`i×vÆÌ°)PÌ5´QæT§i‡Ì'Ù$k +Eè¤M¸ò††Á”vÒ‰‹þ~ÈžI€ a%xpHO8é FÌ!̱j*2§
Á!%IR`P€:™%4ê0‚‚!‚´‡!êÌpòG @ó7"gy¾@)¢ØD‚<äŠfÄïа(k&ù à'¶Ž¢(\ò&ßuwŠ¢!c_yâPCÞ0Ž$ÒY$€DzÃé ›Ý‚”7çQHžô¬ìyŠV€*`FꇙøïJ”0L+ÓÀ^‰þ€ë€0;nXvÀR÷ jÖH\
+HÉŠ€éM$ENô®ãÎ	‚è•A H³òþ '¥ß£ÙO¨d_ñ²“n'„^T”Ä 8!ĸ2"\Dɉ’s1‹,30*Â,ÄpÃä+!¦˜3„qÆpàÅÃXd©"‘>/ @Ì$v{›NÖµ ƒê'¸Q ŽèÌ0¤"LÅLªC¹Ñ‡F$ML_!ðûܪvú¼ÿ§ìxSÇðþL·xNRÙ]c²½ãèüU´–o£)®·ˆ>šÞ7¿]æ¦ÿ†õr¡Ú†IÁr™‡\.uuý{(ÎôHe”È®B´·³…j9_øåõèÕW|’r³}ðöxóFüû±áiuË™GµU8“¾0t¤øÆDU•Þ¨_nªï÷m)ø¬Ä&VĤC—|1]æ›Û—‚ßÑ	|¼Ï¸,Èû·h6ˆL|ùN‹CX&›ÎÇß5Õ[&Å
Â	a
Ë!щéIoöí9Š‡t·ðƒ©=r<ˆ“Úº8†„Ì{Á»wŒFŸåé~ìµè׈L2@õ‡gNCiÀ|Íq%Øõ#ŽÝöQT²2w®&Ù‡ÌwAsP–Ü‚0BŽ‘t4£Q83¸l"	gSѲPùf¦R¸¨pRàÉì9X?MX1ã|]4³qECÉÔƒ¢jb4"Oàš
&-¼S
ÔÎK`u–ËÅ1Ï& „/Lo*“((vÒÀ±1ÎOލ/‚õÀ
§Gû*K“¾¢™Œ×DàÇn3Œuwäö2wÇHn¶'ãFÉö!¹óêEwq’ÞNÒfø=Ø éP’ÔŠ‰¬VQÌwy›êmQ¬ºwfz™Ê÷Ë6`£ShÐå·‰/ΰ†ÒQ	Æ43UHA²-ÄØe9éE1.¶bŽÆF)Ggqɤ½ó,ífŒúD±Ý¼œÙŠfåÇ6^|îKHÓ¸+×ß½õ3Œžã¦$T"QÅh(ÇÒ-÷½u„ZS£`#Æd;a¨æ(zÌ$ïOˆ$qÙ ùN^%Ž–kŽÉÙ·”)®FòÔ®uº©‘'H¹OŸëîà«É‹ :
 óóìUɐÐêªÜbàpdÈB,L…Ýzš‚qâÊ,°E˜ŒU	’ Bې!šÄØ—8C)v*„TÈ8¡Ä.KÔËJ4 y^pÛ–ð#ѼuÏŠê9g³ÅÆå «28®²RT]„璉™kZ!§›c’“ŽŠwgwf-¬€Ç‡)‹ìÞß'sFpÀlÈ(FË\€ŠÇ¬x‰y¦¾/ÑýØ[ž³=W™‚
‚%
“ŒÂV©²²Æ@Ö­Ö=†¢Šç{ßl˜ª6#K3DT
“»Žiš]q€ tøÊPfî3sn+zâ¡„gtœª{ q6ë´D¡2‘ø
ôo6zú¾vÙ³zôÕÍpÖçörŸg¾Î?´Ç“4oå#ZË7Qotƒa³SʻښIŸ(ÆéEE¥™Í³,¼"­&|"Qê‡tÔ&¼ÒW|Übuu:»™oº¯"ˆ[&õÃHnožhQœ<½ò®“•Q黁d+#tîºuËeÒŸ{ĽU†¼ÔÆ»oWd9™	XSY²'SÔª€0 at a폟QC"˜ ëß%4Uny?W°¬‹¥¢0ŒÖ=œ{¶_o2f@!—†ÖURÔèÞsN.Õ§:jk‰!
1¬Z Æ5\Á±’ØÆÛ(ä€ä6xŠÕKåž°ÐïÔ—r¥Ä„\ÂÂXÛÖJ¥AáÕóJšS×ÔSqT¯Ë)üG8.‰¢g3Ëu&"Q°ÈCzQ'­”B¾¶^×,ÑTý2ÄÁóÀØhkûº¬p·x|‡Ñ'§Ç]@s`bŽä%¢	#+=(†±~¬8¼$4Í•háÚ•l±Ðí‚xεA¡³S„	¥X‚ŒVÆßq×ÀõÚmÊ1´éÚ:˜[tØ<ÍžéüÈ8#ÛtíÙ«Ù$¶T0ŒÀªÉ2<„àž4[Üh2I„¸yq ±fõÖBêâœ;Üh”cÑ‘Ó¥°kÉ¿.ýPêä Àö¡&Žb*€“PÇZ¨¶¤ÔÆ&8àIUPM¥£ØJvãY˜?Pô#Üì+€œ	9‘|@öËE	B­
C"@¦ÅLg!ùVšÒTP¯ ÎY–e­Åö¬é ÐÆÐox²ú£ü½×M;ù3ÚÊ*aƒ}…¢oÊŠßÃmÍÕR±Ãd«Å§P¤ƒê_/5ØÊ{©ë—˜á5ö
äƒ&¤øX$ƒªÜï¤cgE÷˜u‚ã¨RƒƒÌ£­EÔ¬Ù­au±ŒeDñ¨ìñfØhå.,~‡ÀzÉ:l÷êÅ•|:j‡1C™Õ„o„|l	®"HÙªQˆ6ƒb&½Ò‚bBÈ$êäÄîÂÎÄeðƒ‡äLØwžd×rxèŸ@ʘŠ
(菑 º>¥¿"B¦ŽØçbÕAAæƒPKóÏ—…1í!á x@Ñ¿Nh¤)aUDzkƒ|‘@ULÉNìeƒÀŒMæAC*2‡8dDѬp"’œð܇»»bHLgwö͸¢¤!ðEG«n”^&W1IEhŸŒ£â1÷¯Ý—‰$ñǃÄåIFâGqÁgrö‡'P˜N¿ú¸¨"J"Nï¬Ñzf¨"šŠÒê¼ÅùfŒ3F¢­íeզȎdqóoµ2‡ fƒ@NK tæ{e+ž Pœ‰œ^ò_]	®Q€ŠÃK“Ø7|moªÎûÒ°íAøÏ¿©Oõƒ‚›Ã,“å4:
ľ¤ÈŠ x@Æ`Ä)2пbThNºpˆ
˜˜ ót<·¬âTŒ·¤×ØG@ä\¸q½(oÁLõáY]l¹A땨JÊL5nUºaÒhȯ\Ò»#†ã'x\q­U\9—˜È>V<s(ªÈ™‰ "̺×àÀü7‹ÏôÞ«j±µ¬„!®–…“‹7¬Ð(óe‹GŽ4„0ÚÐ\Z¬)HÒXq5„Ö®ŠS1ªÞšøNuw5 0¾rH®B4BãÏ+õ†Õ0ð¥ÃUr\%$K\ÍàF&õJgâžÀv´Fé;61¦3Ûë¯vi`jÀ÷<7äŽÝ4*{^ißgÝZØ~Â4Â{@B¨Cê[Õ„7ƒ(¦À£¢gAÌØ"XA02J5k ôä`EØ—õbê1Kq“P7u¡ÄÀÉߺ¥}_ÜøI at PLÒÐпžLíËÝ÷
—Ϫ «Ô¸˜m‡¤Ýï@mƒì2¨œrdjKceÆÇ(8oAÖÌëG…„†T&E¤Ÿ[ÞèC8©œ	*#ñHæµH
ÓBX{"-Á‘Ô›rÃW—¶½Gmc@
ÀYJ&úßßØסB½ŽLuŒŸ6`b^i(ód„™#)é¶ÿúu´Vª¡o)x°ª¤YûÉR–ü ×I²¤öZù¸•ŽWlƒ•L9hÈøšÚ;¾ ‘Jê&A
Iºª†—«Ï÷¾!Mµ9ÒÈé—Ê«‘†žsMÞ='Òåè”ÖèG¨pNèzPâô.¤2ËgV©ìG ‰jþÊž
3”zEˆôâ3óçé
LKìþG³ÂñDà)ë×>}à–Snƒ<¼zv<?S]yíŒ3§èî‹ŒËvFZ¾ñ^»ëƒRa™†I&8¬âö©5uÏGɾƒQѬõÒåÌ!6ù4Í; \÷tÛ:‰%o0K¹.õƒ½ÄÇ‹&ÐhmJ.)¹yt¸Ë”GdÁhFço<ñ:¼dCQ*Ãxgqõ+2£(áڐ»ÆxMÍåå_¸,nNãÈÅtè)¸SR!’¾ŽÛ¢ÅƒZ†àÞ°iñÌ-÷A at f`âuØl ”Ê\9ã0Ê^+æø 5RŠZÀ>\Ú	ãÃî‹H ÅL“º¨
6Ì&Ø»¼ŽrœXè|ê<4öe)PÁ‘ÚÔpï
à35lŒ5a¨§†Rç#œ³xãhl¡Ì4Œ)àv"¬èdHĹ…îêLÍ%zUÈë\ðD®Ùs|;ì_âY´FÙCdnŸ†µ’ÎÍ»¹E©mκX#½lZfy|ªrsÐ_4ˆÙlì	e˶2å•”fB2ô˜´ØLÆ;ḣHí¬¸n‹«T¦üMJk+da	kuõydØ)Î3°88â @e$EØ@`“\»wa$
:|p²UFˆˆ¬	6æ#1m#­[—RégúÉn
§Li„ÁÕª>Œc'3¿®Q›³h™“b\Œ`•¤ÎQ‹c9)+ñª—sVjªª"à|Ha„g‰©t,fbäîÓÔû˜Às]Ӑ9;ÕÍU‘Bý/…Rš ؉rRAw`A,BC0BÄJ·ïc©4Œòaæ­Ö‚\ì:ç¹zA\ íç2t'§%´Å›
¹xÁd¥Çög’q¶0D†Kbu.,bsokRÒg6Ò¸C™w“ÜAjÑ'äƒ/¨\éç`€y©q.›E3R3×rÐ1`×DD«Ï	Ýy)Ä„;½Ç*šµÃDݵA‹¹½CHÒ˜`¢5ÕE
ˆá‚¥/wý›žgaQ¾N2(*ªªKFu24hI‰U‘
³’·&;±-X4<
8èqÉZC²ñ P¡°ËF±4R;€:iÁí.¡Ý´†[„'$U?	¨2mŒ”áó/Ô°¡Öc®–´?,c)ÂjGÓÛda߈@Ù=Χ¾ŸIÙÆ
‡à˜•Z¢€t)TiWx4†-¼Ú7/ % ÂS3ãõ>ž9:>gAv	HhÑ']ûßpÐO~.jtHl âd5IH"4a˜PÀópéŠ8°“l‘™@$hÅ8w•‘¨
Èl”Á
ÛËã®Hß»ØÑç̶/*IÈתŠ†—n—G…ç…è˜Òv®ÆsÊÓo—‚ºåÐ/$S5pM6·7Æ÷yM©0¿CK`Ã(‚£½òµyè8LùYÃçÜ¡`2D!	>ç<‹º«³Þ´K‰ÙŒWnÎ'uœѽv…ñY…ÃðîñBBxÐì a¼tfÂ'¤lFý“}÷h³FÁ|Á„ô0ÍÚ
˜Â6ÐÄI(åTEL„(i|‡½Õ¢ >Ÿ}žÌëĦœ²¬ðã‚Cz&ïDìiwçJiWZ…<×”–% ÕçƒÛÓ8 at n[p
¸#{Ûû<'¤B!wkD¢Ú¨¡µ÷@^‘mAË*&á w ¡B R™.HÐ
"Ð#Byõ³@îUµ€p§Ñ	©h¡ïíäGÃÃ"#$°À"ˆ‚Š .øÄ*n‚û¶î'¬•ó2eúj„C(£".¸bˆdft놄Ê9*zëTo4,sÕ•ž€ ðˆ“
©ääದÔð'P<ÛPu*78,“Ç'a! Ž˜A¯*ùG¼™_ÏIÂB' ëÌ)ìG#ŸglÎ=Z({¯Q}f¢Ê2ٝå¬e‡gF0$B#$x†Ð¦Íól>fAá̽`ƒ²l¶T	Ù˜N¤öë’£K/
é ¢“h ÄHHrèé4äA! ›#S¢¬Ö>S
p·#¨‚"
	šó™‰Ñ¼ÑZ³) ¬%Èm
‰•”ëCš©ÍfQeD at j2(áà×8bÞ‰‰8lr8p•¥GRg“3TÂáqÐK•
2EáéØ+ªoY³a¸í{Ç·!Ð×0tH˜Â"	)GW#
‹‹´O6Ó¥ÃÄn¡=Æóçá¾l7Ê}¯šÖv)´Ù³9DJŠTyÄÔ1
M'¶@êAÔ	NHèœ ¢!CP(C
º)7.¢–‘<±„f`˜	©MRûìð Õ. Xwî 8Ô;˧“„›ÖMÝ;ÈêkQj€–ˆb¢d‚pÀ…
dæJ= cC¬ƒ¹Fìv[†qÊï‚‚èú@Ðy$÷d˜1£QH@Žfࢠ¯6	dPrˆ+ SP(xé}òt2¾²
íá-!PU£Æô[ØÉ:q/àÝ&µXFÏõæÌƨ°øß'H¾‘6QpÎ[x8Xr=œÌ ƒZ­õ%35”­’Gâ–®ÁÁBHí$CÔ*0LÔ UŒ$
Cev>š®g{AØwTe ä~þx^ó38#M‡H=‘¨W3ÛÅà!“‘€¤‚¹b$a:8
.1ds
;Ul˜!ÈE àéðB„ŽDÆB"(0l‰¤dÓVVb˜Âs™¬ÂÌJ%ÌÇ
”Á`¢{Ì©ã~×big~š.ZùÊ:ôYó-Q°9Q±ËéönÈ‹$™‚üÜÔˆo681øÛËð²{DzÖšF3ïúq½dÛÉn·%Q")‰#A8z÷Ÿ —™ÄÆÏï$zCÒ©be÷AÔyÅ?
†~jçݱÅ`,Š0€vªmECÒEi<Vf$€kJ+ÈíMOtZ@üˆ£ÜÏñ”Snò‹É À=@{ÁðÊSí)ƒXý³zŠ¬¢h<o ñƒÍ‡…‘–kyhÒe„cQé5ý…ÅE<„#ŒÛ ëª›1ÞÒ¶ã"š8£X£€Ým¶î&±-æR@ø¤û…t§÷ólØ\Pùå:çÈù@ï‹àìUlœáòdfÁžê÷^ìCµwÈÁ#‘ZE i	RFdªI.™óaL1ÜöžG€%*²ƒÒsÈUyà¶0ÄGí€ú÷>wY °âX7„¾ï墦²3ô;‚R{'J8P¿®rûRáÒs÷ýaô`F²Ïmbåç¤†ˆ<à×€&Žv´I‰«i>Ö•êˆ,e+>c=ßq¶˜4^xŽ µ0à‡4
sãFž"™ˆBÁq+„1HÈF^¸¤!ù 4@ í¤«´2c…¾é@àÆ™#p¶!ŒÐu¨@@@_ß䜜9¸K!°Æ\§~”<¼ßÃól÷‚Â(>0û’ÉDF ÂhÃ	OÝp¬ÿ=—¨„ i¯@4AbL'䓘
ÈFK|üXxOSF$Y¼Á§$™žZ=46Ž÷lÞûR¼Oçˆ>øˆH!L=ÕK1>^´;æ%š¬2Ïvœ¨ƒFFY•5úùŽ¬#+ÂV
ªYI" p‰"yyцpÁ‰ƒÃóAÏ¥Cô¬¤*
 Q,P¬ÔQJu>­£Ù¶K¨³D‹°è›ºÚÐ
J;NÐþü:¤›’âüåc6”uô	'ÐzXcž}Çã1
V·sïD•ê®B¶Á›ˆS¼&ÖÞ=l I"¶W±Ùˆ0èat55Êè­C쉐>ó ò u;9&‹Ž&eD!Q˜g‰!†¡ÀdÈ@
ƒ™¬Í–‹DÀ;RÄX{ à3ì
 p<Ù%!DB‘DÄæ8Ìhóª–ÞÕ†^7f‘F&RâÚH¿{¨ˆ1$PcÅ‘\±¸C „È‘‘â9¶lMô)ˆ6ªPôª:s£cÑ ù‚"&¢%©	£ý··®8¢
Fl€:Í@Á°çd;¸†’›Î›]ûÙ&NKU!Ýþ,÷·Ìrl	?†0‘Xþ ô!Ûx« ôBC è˜œQœß±öá²/܈¢w*뺹
¨/
™€@ÄâGj:tJ¨a¨ÂZ”ˆ^(Èv~“¾ÊLCTþÞYðÓÿÄåAÖ"ȹ	J•E?bõ
z[Ð'æÀùSÈJwÉÝä‹G{ üã_&ó‚ô?<Ä€ô\h ‚
i\˜I4Ø 7ˆi#Í­ÀžLç3v…2ځóK_¼(<=ã퀙Aa¨ÁŸ>FþŽ}†ú²ý=Ž¦’ŠH2úï3„²'÷½(›õµtvQpŠ¸X±`(5èíÀiHþ›p1H	5õõø¼6æ0ו
ªŸÏŸÏ­„†èý¹9€†„¢í‡sîƒÃÇ^šŽƒPé`kŽÚß&iPÆ»è™Ò£Žz:MkaèBR
†BaŠ!—ë5¶^5â
§{õ?Ñ„®øzõÆ”ÝîœZÆð0®yš¤zù3±êº@ÛŠ¶è
¢´cWz$wšYNš,h“$ˆrL‚Ç}¯Ö“ºíËŽ˜†%VùØu|qôðP¼kX 4Á6•8&,h”¨¦ŽÁ†qÐà£ãóY™?¤`P
¶ìÎÞAÈ,ƒ.`“l`Ÿ€ã¢\šÅAœÀj&ûl€¡%9eˆ"ñh´Ä£´;à|8¨3x¢‰d!ল܉!…L÷Õ7EŒàÝ“–;»lPÙ‚·3C=f¥2Å'–¦ÓY0hp´¬Ëi(Dʐýþj9ΠJ"#§– s†FÈ“‡vÀt9ÃÄàé¯Ë¼
›-4fD^2§§3n`!šOYU&m¢á¡óÂ
Ë%ɪ‹3%Þæ#FML[bwãW}ÄËJU3™Í™9Å“T®8·Y³sµk²jI’UjRša¤¶lsFð€ð\$’éА
ëf‘ˆtÈ¡]-!‡(lpÐrG,A;LI;O·åQ£5@os#²L¾p‹õ?rƉ pÍ€f ýèåswb°@÷‘NÞ¢DŠ”<¼/#f„M‚ÑREAݪ"mÈuu± Mÿ4Õte«ßúªˆ	‘®È¢|K$b#¥´ýÌT2H	?·áÿ‚þ=þˆÕ Ḩ«Äñ¿ñ~ÿó?øÿ)ØæOÁHÀ‘ ¤¯ËæFI(È	À›7˜»vZÄ‚œ&£¦2Č年–Ü?þØÉé5ÒCÜTýâîH§
Æ>; 
openssh-5.4p1-nss-keys.patch:
 Makefile.in  |    2 
 authfd.c     |   39 +++++
 authfd.h     |    8 +
 configure.ac |   16 ++
 key.c        |   61 ++++++++
 key.h        |   20 ++
 nsskeys.c    |  443 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 nsskeys.h    |   39 +++++
 readconf.c   |   37 ++++
 readconf.h   |    4 
 ssh-add.c    |  181 +++++++++++++++++++++++-
 ssh-agent.c  |  121 ++++++++++++++++
 ssh-dss.c    |   36 ++++
 ssh-keygen.c |   51 ++++++
 ssh-rsa.c    |   42 +++++
 ssh.c        |   30 +++
 ssh.h        |    6 
 17 files changed, 1124 insertions(+), 12 deletions(-)

--- NEW FILE openssh-5.4p1-nss-keys.patch ---
diff -up openssh-5.3p1/authfd.c.nss-keys openssh-5.3p1/authfd.c
--- openssh-5.3p1/authfd.c.nss-keys	2006-09-01 07:38:36.000000000 +0200
+++ openssh-5.3p1/authfd.c	2009-11-27 13:43:00.000000000 +0100
@@ -626,6 +626,45 @@ ssh_update_card(AuthenticationConnection
 	return decode_reply(type);
 }
 
+int
+ssh_update_nss_key(AuthenticationConnection *auth, int add,
+    const char *tokenname, const char *keyname,
+    const char *pass, u_int life, u_int confirm)
+{
+	Buffer msg;
+	int type, constrained = (life || confirm);
+
+	if (add) {
+		type = constrained ?
+		    SSH_AGENTC_ADD_NSS_KEY_CONSTRAINED :
+		    SSH_AGENTC_ADD_NSS_KEY;
+	} else
+		type = SSH_AGENTC_REMOVE_NSS_KEY;
+
+	buffer_init(&msg);
+	buffer_put_char(&msg, type);
+	buffer_put_cstring(&msg, tokenname);
+	buffer_put_cstring(&msg, keyname);
+	buffer_put_cstring(&msg, pass);
+
+	if (constrained) {
+		if (life != 0) {
+			buffer_put_char(&msg, SSH_AGENT_CONSTRAIN_LIFETIME);
+			buffer_put_int(&msg, life);
+		}
+		if (confirm != 0)
+			buffer_put_char(&msg, SSH_AGENT_CONSTRAIN_CONFIRM);
+	}
+
+	if (ssh_request_reply(auth, &msg, &msg) == 0) {
+		buffer_free(&msg);
+		return 0;
+	}
+	type = buffer_get_char(&msg);
+	buffer_free(&msg);
+	return decode_reply(type);
+}
+
 /*
  * Removes all identities from the agent.  This call is not meant to be used
  * by normal applications.
diff -up openssh-5.3p1/authfd.h.nss-keys openssh-5.3p1/authfd.h
--- openssh-5.3p1/authfd.h.nss-keys	2006-08-05 04:39:39.000000000 +0200
+++ openssh-5.3p1/authfd.h	2009-11-27 13:43:01.000000000 +0100
@@ -49,6 +49,12 @@
 #define SSH2_AGENTC_ADD_ID_CONSTRAINED		25
 #define SSH_AGENTC_ADD_SMARTCARD_KEY_CONSTRAINED 26
 
+/* nss */
+#define SSH_AGENTC_ADD_NSS_KEY			30
+#define SSH_AGENTC_REMOVE_NSS_KEY		31
+#define SSH_AGENTC_ADD_NSS_KEY_CONSTRAINED	32
+
+
 #define	SSH_AGENT_CONSTRAIN_LIFETIME		1
 #define	SSH_AGENT_CONSTRAIN_CONFIRM		2
 
@@ -83,6 +89,8 @@ int	 ssh_remove_all_identities(Authentic
 int	 ssh_lock_agent(AuthenticationConnection *, int, const char *);
 int	 ssh_update_card(AuthenticationConnection *, int, const char *,
     const char *, u_int, u_int);
+int	 ssh_update_nss_key(AuthenticationConnection *, int, const char *,
+    const char *, const char *, u_int, u_int);
 
 int
 ssh_decrypt_challenge(AuthenticationConnection *, Key *, BIGNUM *, u_char[16],
diff -up openssh-5.3p1/configure.ac.nss-keys openssh-5.3p1/configure.ac
--- openssh-5.3p1/configure.ac.nss-keys	2009-11-27 13:42:57.000000000 +0100
+++ openssh-5.3p1/configure.ac	2009-11-27 13:48:44.000000000 +0100
@@ -3526,6 +3526,21 @@ AC_ARG_WITH(kerberos5,
 	]
 )
 
+# Check whether user wants NSS support
+LIBNSS_MSG="no"
+AC_ARG_WITH(nss,
+	[  --with-nss   Enable NSS support],
+	[ if test "x$withval" != "xno" ; then
+		AC_DEFINE(HAVE_LIBNSS,1,[Define if you want NSS support.])
+		LIBNSS_MSG="yes"
+		CPPFLAGS="$CPPFLAGS -I/usr/include/nss3 -I/usr/include/nspr4"
+		AC_CHECK_HEADERS(pk11pub.h)
+		LIBS="$LIBS -lnss3 -lplc4"
+		AC_CHECK_DECLS([SEC_ERROR_LOCKED_PASSWORD], [], [], [#include <secerr.h>])
+	fi
+	])
+AC_SUBST(LIBNSS)
+
 # Looking for programs, paths and files
 
 PRIVSEP_PATH=/var/empty
@@ -4253,6 +4269,7 @@ echo "              TCP Wrappers support
 echo "              MD5 password support: $MD5_MSG"
 echo "                   libedit support: $LIBEDIT_MSG"
 echo "  Solaris process contract support: $SPC_MSG"
+echo "                       NSS support: $LIBNSS_MSG"
 echo "       IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG"
 echo "           Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG"
 echo "                  BSD Auth support: $BSD_AUTH_MSG"
diff -up openssh-5.3p1/key.c.nss-keys openssh-5.3p1/key.c
--- openssh-5.3p1/key.c.nss-keys	2008-11-03 09:24:17.000000000 +0100
+++ openssh-5.3p1/key.c	2009-11-27 13:43:01.000000000 +0100
@@ -96,6 +96,54 @@ key_new(int type)
 	return k;
 }
 
+#ifdef HAVE_LIBNSS
+Key *
+key_new_nss(int type)
+{
+	Key *k = key_new(type);
+
+	k->nss = xcalloc(1, sizeof(*k->nss));
+	k->flags = KEY_FLAG_EXT | KEY_FLAG_NSS;
+
+	return k;
+}
+
+Key *
+key_new_nss_copy(int type, const Key *c)
+{
+	Key *k = key_new_nss(type);
+
+	switch (k->type) {
+		case KEY_RSA:
+			if ((BN_copy(k->rsa->n, c->rsa->n) == NULL) ||
+				(BN_copy(k->rsa->e, c->rsa->e) == NULL))
+				fatal("key_new_nss_copy: BN_copy failed");
+			break;
+		case KEY_DSA:
+			if ((BN_copy(k->dsa->p, c->rsa->p) == NULL) ||
+				(BN_copy(k->dsa->q, c->dsa->q) == NULL) ||
+				(BN_copy(k->dsa->g, c->dsa->g) == NULL) ||
+				(BN_copy(k->dsa->pub_key, c->dsa->pub_key) == NULL))
+				fatal("key_new_nss_copy: BN_copy failed");
+			break;
+	}
+		
+	k->nss->privk = SECKEY_CopyPrivateKey(c->nss->privk);
+	if (k->nss->privk == NULL)
+		fatal("key_new_nss_copy: SECKEY_CopyPrivateKey failed");
+
+	k->nss->pubk = SECKEY_CopyPublicKey(c->nss->pubk);
+	if (k->nss->pubk == NULL)
+		fatal("key_new_nss_copy: SECKEY_CopyPublicKey failed");
+	
+	if (c->nss->privk->wincx)
+		k->nss->privk->wincx = xstrdup(c->nss->privk->wincx);
+
+	return k;
+}
+#endif
+
+
 Key *
 key_new_private(int type)
 {
@@ -151,6 +199,19 @@ key_free(Key *k)
 		fatal("key_free: bad key type %d", k->type);
 		break;
 	}
+#ifdef HAVE_LIBNSS
+	if (k->flags & KEY_FLAG_NSS) {
+		if (k->nss->privk != NULL && k->nss->privk->wincx != NULL) {
+			memset(k->nss->privk->wincx, 0,
+				strlen(k->nss->privk->wincx));
+			xfree(k->nss->privk->wincx);
+			k->nss->privk->wincx = NULL;
+		}
+		SECKEY_DestroyPrivateKey(k->nss->privk);
+		SECKEY_DestroyPublicKey(k->nss->pubk);
+		xfree(k->nss);
+	}
+#endif
 	xfree(k);
 }
 
diff -up openssh-5.3p1/key.h.nss-keys openssh-5.3p1/key.h
--- openssh-5.3p1/key.h.nss-keys	2008-06-12 20:40:35.000000000 +0200
+++ openssh-5.3p1/key.h	2009-11-27 13:43:01.000000000 +0100
@@ -30,6 +30,11 @@
 #include <openssl/rsa.h>
 #include <openssl/dsa.h>
 
+#ifdef HAVE_LIBNSS
+#include <nss.h>
+#include <keyhi.h>
+#endif
+
 typedef struct Key Key;
 enum types {
 	KEY_RSA1,
@@ -37,6 +42,7 @@
 	KEY_DSA,
 	KEY_RSA_CERT,
 	KEY_DSA_CERT,
+	KEY_NSS,
 	KEY_UNSPEC
 };
 enum fp_type {
@@ -51,6 +57,15 @@
 
 /* key is stored in external hardware */
 #define KEY_FLAG_EXT		0x0001
+#define KEY_FLAG_NSS		0x0002
+
+#ifdef HAVE_LIBNSS
+typedef struct NSSKey NSSKey;
+struct NSSKey {
+	SECKEYPrivateKey *privk;
+	SECKEYPublicKey *pubk;
+};
+#endif
 
 #define CERT_MAX_PRINCIPALS	256
 struct KeyCert {
@@ -70,11 +85,16 @@
 	RSA	*rsa;
 	DSA	*dsa;
 	struct KeyCert *cert;
+#ifdef HAVE_LIBNSS
+	NSSKey  *nss;
+#endif
 };
 
 Key		*key_new(int);
 void		 key_add_private(Key *);
 Key		*key_new_private(int);
+Key 		*key_new_nss(int);
+Key		*key_new_nss_copy(int, const Key *);
 void		 key_free(Key *);
 Key		*key_demote(const Key *);
 int		 key_equal_public(const Key *, const Key *);
diff -up openssh-5.3p1/Makefile.in.nss-keys openssh-5.3p1/Makefile.in
--- openssh-5.3p1/Makefile.in.nss-keys	2009-08-28 02:47:38.000000000 +0200
+++ openssh-5.3p1/Makefile.in	2009-11-27 13:43:01.000000000 +0100
@@ -71,7 +71,7 @@ LIBSSH_OBJS=acss.o authfd.o authfile.o b
 	atomicio.o key.o dispatch.o kex.o mac.o uidswap.o uuencode.o misc.o \
 	monitor_fdpass.o rijndael.o ssh-dss.o ssh-rsa.o dh.o kexdh.o \
 	kexgex.o kexdhc.o kexgexc.o scard.o msg.o progressmeter.o dns.o \
-	entropy.o scard-opensc.o gss-genr.o umac.o jpake.o schnorr.o
+	entropy.o scard-opensc.o gss-genr.o umac.o jpake.o schnorr.o nsskeys.o
 
 SSHOBJS= ssh.o readconf.o clientloop.o sshtty.o \
 	sshconnect.o sshconnect1.o sshconnect2.o mux.o \
diff -up /dev/null openssh-5.3p1/nsskeys.c
--- /dev/null	2009-11-27 11:08:21.619709673 +0100
+++ openssh-5.3p1/nsskeys.c	2009-11-27 13:45:42.000000000 +0100
@@ -0,0 +1,443 @@
+/*
+ * Copyright (c) 2001 Markus Friedl.  All rights reserved.
+ * Copyright (c) 2007 Red Hat, Inc. All rights reserved.
+ * Copyright (c) 2009 Pierre Ossman for Cendio AB
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "includes.h"
+#ifdef HAVE_LIBNSS
+
+#include <sys/types.h>
+
+#include <stdarg.h>
+#include <string.h>
+#include <unistd.h>
+
+#include <openssl/evp.h>
+
+#include <nss.h>
+#include <keyhi.h>
+#include <pk11pub.h>
+#include <cert.h>
+#include <secmod.h>
+#include <secerr.h>
+
+#include "xmalloc.h"
+#include "key.h"
+#include "log.h"
+#include "misc.h"
+#include "nsskeys.h"
+#include "pathnames.h"
+
+static char *
+password_cb(PK11SlotInfo *slot, PRBool retry, void *arg)
+{
+	char *password = arg;
+	if (retry || password == NULL)
+		return NULL;
+	
+	return PL_strdup(password);
+}
+
+int
+nss_init(PK11PasswordFunc pwfn)
+{
+	char *dbpath;
+	char buf[MAXPATHLEN];
+
+	if (NSS_IsInitialized())
+		return 0;
+
+	if ((dbpath=getenv("NSS_DB_PATH")) == NULL) {
+		struct passwd *pw;
+		if ((pw = getpwuid(getuid())) == NULL ||
+			pw->pw_dir == NULL) {
+			return -1;
+		}
+		snprintf(buf, sizeof(buf), "%s/%s", pw->pw_dir,
+			    _PATH_SSH_USER_DIR);
+		dbpath = buf;
+	}
+
+	if (NSS_Init(dbpath) != SECSuccess) {
+		debug("Failed to initialize NSS library. Attempting without DB...");
+		if (NSS_NoDB_Init(NULL) != SECSuccess)
+			return -1;
+	}
+
+	if (pwfn == NULL) {
+		pwfn = password_cb;
+	}
+
+	PK11_SetPasswordFunc(pwfn);
+	
+	return 0;
+}
+
+int
+nss_load_module(const char *modpath)
+{
+	char spec[MAXPATHLEN + 40];
+	SECMODModule *module;
+
+	debug("loading PKCS#11 module '%s'", modpath);
+
+	snprintf(spec, sizeof(spec), "library=\"%s\" name=\"Foobar\"", modpath);
+	module = SECMOD_LoadUserModule(spec, NULL, PR_FALSE);
+	if (!module || !module->loaded) {
+		if (module)
+			SECMOD_DestroyModule(module);
+		return -1;
+	}
+
+	return 0;
+}
+
+static Key *
+make_key_from_privkey(SECKEYPrivateKey *privk, char *password)
+{
+	Key *k;
+	switch (SECKEY_GetPrivateKeyType(privk)) {
+		case rsaKey:
+			k = key_new_nss(KEY_RSA);
+			break;
+		case dsaKey:
+			k = key_new_nss(KEY_DSA);
+			break;
+		default:
+			return NULL;
+	}
+	k->nss->pubk = SECKEY_ConvertToPublicKey(privk);
+	if (k->nss->pubk != NULL) {
+		k->nss->privk = SECKEY_CopyPrivateKey(privk);
+	}
+	if (k->nss->privk != NULL) {
+		if (password != NULL) {
+			k->nss->privk->wincx = xstrdup(password);
+		}
+		return k;
+	}
+	key_free(k);
+	return NULL;
+}
+
+static Key **
+add_key_to_list(Key *k, Key **keys, size_t *i, size_t *allocated)
+{
+	if (*allocated < *i + 2) {
+		*allocated += 16;
+		keys = xrealloc(keys, *allocated, sizeof(k));
+	}
+	keys[*i] = k;
+	(*i)++;
+	keys[*i] = NULL;
+	return keys;
+}
+
+static int
+nss_convert_pubkey(Key *k)
+{
+	u_char *n;
+	unsigned int len;
+	char *p;
+
+	switch (k->type) {
+		case KEY_RSA:
+			n = k->nss->pubk->u.rsa.modulus.data;
+			len = k->nss->pubk->u.rsa.modulus.len;
+
+			if (BN_bin2bn(n, len, k->rsa->n) == NULL) {
+				fatal("nss_convert_pubkey: BN_bin2bn failed");
+			}
+
+			n = k->nss->pubk->u.rsa.publicExponent.data;
+			len = k->nss->pubk->u.rsa.publicExponent.len;
+
+			if (BN_bin2bn(n, len, k->rsa->e) == NULL) {
+				fatal("nss_convert_pubkey: BN_bin2bn failed");
+			}
+			break;
+		case KEY_DSA:
+			n = k->nss->pubk->u.dsa.params.prime.data;
+			len = k->nss->pubk->u.dsa.params.prime.len;
+
+			if (BN_bin2bn(n, len, k->dsa->p) == NULL) {
+				fatal("nss_convert_pubkey: BN_bin2bn failed");
+			}
+
+			n = k->nss->pubk->u.dsa.params.subPrime.data;
+			len = k->nss->pubk->u.dsa.params.subPrime.len;
+
+			if (BN_bin2bn(n, len, k->dsa->q) == NULL) {
+				fatal("nss_convert_pubkey: BN_bin2bn failed");
+			}
+
+			n = k->nss->pubk->u.dsa.params.base.data;
+			len = k->nss->pubk->u.dsa.params.base.len;
+
+			if (BN_bin2bn(n, len, k->dsa->g) == NULL) {
+				fatal("nss_convert_pubkey: BN_bin2bn failed");
+			}
+
+			n = k->nss->pubk->u.dsa.publicValue.data;
+			len = k->nss->pubk->u.dsa.publicValue.len;
+
+			if (BN_bin2bn(n, len, k->dsa->pub_key) == NULL) {
+				fatal("nss_convert_pubkey: BN_bin2bn failed");
+			}
+			break;
+	}
+
+	p = key_fingerprint(k, SSH_FP_MD5, SSH_FP_HEX);
+	debug("fingerprint %u %s", key_size(k), p);
+	xfree(p);
+
+	return 0;
+}
+
+static int
+nss_authenticate(PK11SlotInfo *slot, char *password, int pwprompts, char **output)
+{
+	int i, quit;
+
+	*output = NULL;
+
+	if (!PK11_NeedLogin(slot))
+		return 0;
+
+	for (i = 0; i < pwprompts; i++) {
+		SECStatus rv;
+		CK_TOKEN_INFO info;
+
+		rv = PK11_GetTokenInfo(slot, &info);
+		if (rv != SECSuccess) {
+			error("Failed to get information for token %s",
+				PK11_GetTokenName(slot));
+			return -1;
+		}
+
+		if (info.flags & CKF_USER_PIN_LOCKED) {
+			error("Passphrase for token %s is locked",
+				PK11_GetTokenName(slot));
+			return -1;
+		}
+
+		if (info.flags & CKF_USER_PIN_FINAL_TRY)
+			debug2("Final passphrase attempt for token %s",
+				PK11_GetTokenName(slot));
+		else if (info.flags & CKF_USER_PIN_COUNT_LOW)
+			debug2("Previous failed passphrase attempt for token %s",
+				PK11_GetTokenName(slot));
+
+		if (password != NULL)
+			*output = xstrdup(password);
+		else {
+			char *prompt;
+			if (asprintf(&prompt, "Enter passphrase for token %s: ",
+				PK11_GetTokenName(slot)) < 0)
+				fatal("password_cb: asprintf failed");
+			*output = read_passphrase(prompt, RP_ALLOW_STDIN);
+		}
+
+		if (strcmp(*output, "") == 0) {
+			debug2("no passphrase given, ignoring slot");
+			quit = 1;
+			goto cleanup;
+		}
+
+		quit = 0;
+
+		rv = PK11_Authenticate(slot, PR_TRUE, *output);
+		if (rv == SECSuccess)
+			return 0;
+
+		switch (PORT_GetError()) {
+		case SEC_ERROR_BAD_PASSWORD:
+			debug2("Incorrect passphrase, try again...");
+			break;
+		case SEC_ERROR_INVALID_ARGS:
+		case SEC_ERROR_BAD_DATA:
+			debug2("Invalid passphrase, try again...");
+			break;
+#if HAVE_SEC_ERROR_LOCKED_PASSWORD
+		case SEC_ERROR_LOCKED_PASSWORD:
+			error("Unable to authenticate, token passphrase is locked");
+			quit = 1;
+			break;
+#endif
+		default:
+			error("Failure while authenticating against token");
+			quit = 1;
+		}
+
+cleanup:
+		memset(*output, 0, strlen(*output));
+		xfree(*output);
+		*output = NULL;
+
+		/* No point in retrying the same password */
+		if (password != NULL)
+			break;
+
+		if (quit)
+			break;
+	}
+
+	return -1;
+}
+
+static Key **
+nss_find_privkeys(const char *tokenname, const char *keyname,
+    char *password, int pwprompts)
+{
+	Key *k = NULL;
+	Key **keys = NULL;
+	PK11SlotList *slots;
+	PK11SlotListElement *sle;
+	size_t allocated = 0;
+	size_t i = 0;
+
+	if ((slots=PK11_FindSlotsByNames(NULL, NULL, tokenname, PR_TRUE)) == NULL) {
+		if (tokenname == NULL) {
+			debug("No NSS token found");
+		} else {
+			debug("NSS token not found: %s", tokenname);
+		}
+		return NULL;
+	}
+	
+	for (sle = slots->head; sle; sle = sle->next) {
+		SECKEYPrivateKeyList *list;
+		SECKEYPrivateKeyListNode *node;
+		char *tmppass;
+
+		if (nss_authenticate(sle->slot, password, pwprompts, &tmppass) == -1)
+			break;
+
+		debug("Looking for: %s:%s", tokenname, keyname);
+		list = PK11_ListPrivKeysInSlot(sle->slot, (char *)keyname,
+			tmppass);
+		if (list == NULL && keyname != NULL) {
+			char *fooname;
+			/* NSS bug workaround */
+			if (asprintf(&fooname, "%s~", keyname) < 0) {
+				error("nss_find_privkey: asprintf failed");
+				PK11_FreeSlotList(slots);
+				return NULL;
+			}
+			list = PK11_ListPrivKeysInSlot(sle->slot, fooname,
+			tmppass);
+			free(fooname);
+		}
+		if (list == NULL && keyname != NULL) {
+			CERTCertificate *cert;
+			SECKEYPrivateKey *privk;
+			cert = CERT_FindCertByNickname(CERT_GetDefaultCertDB(),
+				(char *)keyname);
+			if (cert == NULL)
+				goto cleanup;
+			privk = PK11_FindPrivateKeyFromCert(sle->slot, cert, tmppass);
+			CERT_DestroyCertificate(cert);
+			if (privk == NULL)
+				goto cleanup;
+			if ((k=make_key_from_privkey(privk, tmppass)) != NULL) {
+				nss_convert_pubkey(k);
+				keys = add_key_to_list(k, keys, &i, &allocated);
+			}
+			SECKEY_DestroyPrivateKey(privk);
+		} else {
+			if (list == NULL)
+				goto cleanup;
+			for (node=PRIVKEY_LIST_HEAD(list); !PRIVKEY_LIST_END(node, list);
+				node=PRIVKEY_LIST_NEXT(node))
+				if ((k=make_key_from_privkey(node->key, tmppass)) != NULL) {
+					nss_convert_pubkey(k);
+					keys = add_key_to_list(k, keys, &i, &allocated);
+				}
+			SECKEY_DestroyPrivateKeyList(list);
+		}
+cleanup:
+		if (tmppass != NULL) {
+			memset(tmppass, 0, strlen(tmppass));
+			xfree(tmppass);
+		}
+	}
+	PK11_FreeSlotList(slots);
+
+	return keys;
+}
+
+Key **
+nss_get_keys(const char *tokenname, const char *keyname,
+    char *password, int pwprompts, int num_modules, const char **modules)
+{
+	int i;
+	Key **keys;
+
+	if (nss_init(NULL) == -1) {
+		error("Failed to initialize NSS library");
+		return NULL;
+	}
+
+	for (i = 0;i < num_modules;i++) {
+		if (nss_load_module(modules[i]) == -1) {
+			error("Failed to load PKCS#11 module '%s'", modules[i]);
+			return NULL;
+		}
+	}
+
+	keys = nss_find_privkeys(tokenname, keyname, password, pwprompts);
+	if (keys == NULL && keyname != NULL) {
+		error("Cannot find key in nss, token removed");
+		return NULL;
+	}
+#if 0
+	keys = xcalloc(3, sizeof(Key *));
+
+	if (k->type == KEY_RSA) {
+		n = key_new_nss_copy(KEY_RSA1, k);
+
+		keys[0] = n;
+		keys[1] = k;
+		keys[2] = NULL;
+	} else {
+		keys[0] = k;
+		keys[1] = NULL;
+	}
+#endif
+	return keys;
+}
+
+char *
+nss_get_key_label(Key *key)
+{
+	char *label, *nickname;
+	
+	nickname = PK11_GetPrivateKeyNickname(key->nss->privk);
+	label = xstrdup(nickname);
+	PORT_Free(nickname);
+
+	return label;
+}
+
+#endif /* HAVE_LIBNSS */
diff -up /dev/null openssh-5.3p1/nsskeys.h
--- /dev/null	2009-11-27 11:08:21.619709673 +0100
+++ openssh-5.3p1/nsskeys.h	2009-11-27 13:43:01.000000000 +0100
@@ -0,0 +1,39 @@
+/*
+ * Copyright (c) 2001 Markus Friedl.  All rights reserved.
+ * Copyright (c) 2007 Red Hat, Inc.  All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#ifndef NSSKEYS_H
+#define NSSKEYS_H
+#ifdef HAVE_LIBNSS
+#include <pk11func.h>
+#include <prtypes.h>
+
+int	nss_init(PK11PasswordFunc);
+Key	**nss_get_keys(const char *, const char *, char *, int , int , const char **);
+char	*nss_get_key_label(Key *);
+/*void	 sc_close(void);*/
+/*int	 sc_put_key(Key *, const char *);*/
+
+#endif
+#endif
diff -up openssh-5.3p1/readconf.c.nss-keys openssh-5.3p1/readconf.c
--- openssh-5.3p1/readconf.c.nss-keys	2009-07-05 23:12:27.000000000 +0200
+++ openssh-5.3p1/readconf.c	2009-11-27 13:43:01.000000000 +0100
@@ -124,6 +124,7 @@ typedef enum {
 	oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias,
 	oDynamicForward, oPreferredAuthentications, oHostbasedAuthentication,
 	oHostKeyAlgorithms, oBindAddress, oSmartcardDevice,
+	oUseNSS, oNSSToken, oNSSModule,
 	oClearAllForwardings, oNoHostAuthenticationForLocalhost,
 	oEnableSSHKeysign, oRekeyLimit, oVerifyHostKeyDNS, oConnectTimeout,
 	oAddressFamily, oGssAuthentication, oGssDelegateCreds,
@@ -210,6 +211,15 @@ static struct {
 #else
 	{ "smartcarddevice", oUnsupported },
 #endif
+#ifdef HAVE_LIBNSS
+	{ "usenss", oUseNSS },
+	{ "nsstoken", oNSSToken },
+	{ "nssmodule", oNSSModule },
+#else
+	{ "usenss", oUnsupported },
+	{ "nsstoken", oNSSToken },
+	{ "nssmodule", oUnsupported },
+#endif
 	{ "clearallforwardings", oClearAllForwardings },
 	{ "enablesshkeysign", oEnableSSHKeysign },
 	{ "verifyhostkeydns", oVerifyHostKeyDNS },
@@ -613,6 +623,28 @@ parse_string:
 		charptr = &options->smartcard_device;
 		goto parse_string;
 
+	case oUseNSS:
+		intptr = &options->use_nss;
+		goto parse_flag;
+
+	case oNSSToken:
+		charptr = &options->nss_token;
+		goto parse_command;
+
+	case oNSSModule:
+		arg = strdelim(&s);
+		if (!arg || *arg == '\0')
+			fatal("%.200s line %d: Missing argument.", filename, linenum);
+		if (*activep) {
+			intptr = &options->num_nss_modules;
+			if (*intptr >= SSH_MAX_NSS_MODULES)
+				fatal("%.200s line %d: Too many PKCS#11 modules specified (max %d).",
+				    filename, linenum, SSH_MAX_NSS_MODULES);
+			charptr = &options->nss_modules[*intptr];
+			*charptr = xstrdup(arg);
+			*intptr = *intptr + 1;
+		}
+		break;
 	case oProxyCommand:
 		charptr = &options->proxy_command;
 parse_command:
@@ -1052,6 +1084,9 @@ initialize_options(Options * options)
 	options->preferred_authentications = NULL;
 	options->bind_address = NULL;
 	options->smartcard_device = NULL;
+	options->use_nss = -1;
+	options->nss_token = NULL;
+	options->num_nss_modules = 0;
 	options->enable_ssh_keysign = - 1;
 	options->no_host_authentication_for_localhost = - 1;
 	options->identities_only = - 1;
@@ -1183,6 +1218,8 @@ fill_default_options(Options * options)
 		options->no_host_authentication_for_localhost = 0;
 	if (options->identities_only == -1)
 		options->identities_only = 0;
+	if (options->use_nss == -1)
+		options->use_nss = 0;
 	if (options->enable_ssh_keysign == -1)
 		options->enable_ssh_keysign = 0;
 	if (options->rekey_limit == -1)
diff -up openssh-5.3p1/readconf.h.nss-keys openssh-5.3p1/readconf.h
--- openssh-5.3p1/readconf.h.nss-keys	2009-07-05 23:12:27.000000000 +0200
+++ openssh-5.3p1/readconf.h	2009-11-27 13:43:01.000000000 +0100
@@ -85,6 +85,10 @@ typedef struct {
 	char   *preferred_authentications;
 	char   *bind_address;	/* local socket address for connection to sshd */
 	char   *smartcard_device; /* Smartcard reader device */
+	int     use_nss;        /* Use NSS library for keys */
+	char   *nss_token;      /* Look for NSS keys on token */
+	int     num_nss_modules; /* Number of PCKS#11 modules. */
+	char   *nss_modules[SSH_MAX_NSS_MODULES];
 	int	verify_host_key_dns;	/* Verify host key using DNS */
 
 	int     num_identity_files;	/* Number of files for RSA/DSA identities. */
diff -up openssh-5.3p1/ssh-add.c.nss-keys openssh-5.3p1/ssh-add.c
--- openssh-5.3p1/ssh-add.c.nss-keys	2008-02-28 09:13:52.000000000 +0100
+++ openssh-5.3p1/ssh-add.c	2009-11-27 13:43:01.000000000 +0100
@@ -44,6 +44,14 @@
 #include <openssl/evp.h>
 #include "openbsd-compat/openssl-compat.h"
 
+#ifdef HAVE_LIBNSS
+#include <nss.h>
+#include <secmod.h>
+#include <pk11pub.h>
+#include <keyhi.h>
+#include <cert.h>
+#endif
+
 #include <fcntl.h>
 #include <pwd.h>
 #include <stdarg.h>
@@ -57,6 +65,7 @@
 #include "rsa.h"
 #include "log.h"
 #include "key.h"
+#include "nsskeys.h"
 #include "buffer.h"
 #include "authfd.h"
 #include "authfile.h"
@@ -307,6 +316,128 @@ do_file(AuthenticationConnection *ac, in
 	return 0;
 }
 
+#ifdef HAVE_LIBNSS
+static char *
+password_cb(PK11SlotInfo *slot, PRBool retry, void *arg)
+{
+	char **passcache = arg;
+	char *password, *p2 = NULL;
+	char *prompt;
+	
+	if (retry)
+		return NULL;
+	
+	if (asprintf(&prompt, "Enter passphrase for token %s: ",
+		PK11_GetTokenName(slot)) < 0)
+		fatal("password_cb: asprintf failed");
+
+	password = read_passphrase(prompt, RP_ALLOW_STDIN);
+	
+	if (password != NULL && (p2=PL_strdup(password)) == NULL) {
+		memset(password, 0, strlen(password));
+		fatal("password_cb: PL_strdup failed");
+	}
+
+	if (passcache != NULL) {
+		if (*passcache != NULL) {
+			memset(*passcache, 0, strlen(*passcache));
+			xfree(*passcache);
+		}
+		*passcache = password;
+	} else {
+		memset(password, 0, strlen(password));
+		xfree(password);
+	}
+	
+	return p2;
+}
+
+static int
+add_slot_keys(AuthenticationConnection *ac, PK11SlotInfo *slot, int add)
+{
+	SECKEYPrivateKeyList *list;
+	SECKEYPrivateKeyListNode *node;
+	char *passcache = NULL;
+	char *tokenname;
+	char **xkeyname = NULL;
+	
+	int count = 0;
+	int i;
+	
+	if (PK11_NeedLogin(slot))
+		PK11_Authenticate(slot, PR_TRUE, &passcache);
+		
+	if ((list=PK11_ListPrivKeysInSlot(slot, NULL, NULL)) == NULL) {
+		return 0;
+	}
+	
+	tokenname = PK11_GetTokenName(slot);
+	
+	for (node=PRIVKEY_LIST_HEAD(list); !PRIVKEY_LIST_END(node, list);
+		node=PRIVKEY_LIST_NEXT(node)) {
+		char *keyname;
+		SECKEYPublicKey *pub;
+		
+		keyname = PK11_GetPrivateKeyNickname(node->key);
+		if (keyname == NULL || *keyname == '\0') {
+			/* no nickname to refer to */
+			CERTCertificate *cert;
+			char *kn;
+			cert = PK11_GetCertFromPrivateKey(node->key);
+			if (cert == NULL)
+				continue;
+			kn = strchr(cert->nickname, ':');
+			if (kn == NULL)
+				kn = cert->nickname;
+			else
+				kn++;
+			keyname = PORT_Strdup(kn);
+			CERT_DestroyCertificate(cert);
+			if (keyname == NULL)
+				continue;
+		}
+		pub = SECKEY_ConvertToPublicKey(node->key);
+		if (pub == NULL) {
+			fprintf(stderr, "No public key for: %s:%s\n",
+				tokenname, keyname);
+			continue; /* not possible to obtain public key */
+		}
+		SECKEY_DestroyPublicKey(pub);
+	
+		if ((count % 10) == 0)	
+			xkeyname = xrealloc (xkeyname, count + 10, sizeof (char *));
+		
+		xkeyname[count++] = keyname;
+	}
+
+	PK11_Logout(slot);
+
+	for (i = 0; i < count; i++) {
+		if (ssh_update_nss_key(ac, add, tokenname, xkeyname[i],
+			passcache?passcache:"",	lifetime, confirm)) {
+			fprintf(stderr, "Key %s: %s:%s\n",
+				add?"added":"removed", tokenname, xkeyname[i]);
+		} else {
+			fprintf(stderr, "Could not %s key: %s:%s\n",
+				add?"add":"remove", tokenname, xkeyname[i]);
+		}
+		PORT_Free(xkeyname[i]);
+	}
+
+	if (xkeyname != NULL)
+		free (xkeyname);
+
+	if (passcache != NULL) {
+		memset(passcache, 0, strlen(passcache));
+		xfree(passcache);
+	}
+	
+	SECKEY_DestroyPrivateKeyList(list);
+	
+	return count;
+}
+#endif
+
 static void
 usage(void)
 {
@@ -334,6 +465,10 @@ main(int argc, char **argv)
 	AuthenticationConnection *ac = NULL;
 	char *sc_reader_id = NULL;
 	int i, ch, deleting = 0, ret = 0;
+#ifdef HAVE_LIBNSS
+	char *token_id = NULL;
+	int use_nss = 0;
+#endif
 
 	/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
 	sanitise_stdfd();
@@ -351,7 +486,7 @@ main(int argc, char **argv)
 		    "Could not open a connection to your authentication agent.\n");
 		exit(2);
 	}
-	while ((ch = getopt(argc, argv, "lLcdDxXe:s:t:")) != -1) {
+	while ((ch = getopt(argc, argv, "lLcdDnxXe:s:t:T:")) != -1) {
 		switch (ch) {
 		case 'l':
 		case 'L':
@@ -373,6 +508,11 @@ main(int argc, char **argv)
 			if (delete_all(ac) == -1)
 				ret = 1;
 			goto done;
+#ifdef HAVE_LIBNSS
+		case 'n':
+			use_nss = 1;
+			break;
+#endif
 		case 's':
 			sc_reader_id = optarg;
 			break;
@@ -387,6 +527,11 @@ main(int argc, char **argv)
 				goto done;
 			}
 			break;
+#ifdef HAVE_LIBNSS
+		case 'T':
+			token_id = optarg;
+			break;
+#endif
 		default:
 			usage();
 			ret = 1;
@@ -400,6 +545,40 @@ main(int argc, char **argv)
 			ret = 1;
 		goto done;
 	}
+#ifdef HAVE_LIBNSS
+	if (use_nss) {
+		PK11SlotList *slots;
+		PK11SlotListElement *sle;
+		int count = 0;
+		if (nss_init(password_cb) == -1) {
+			fprintf(stderr, "Failed to initialize NSS library\n");
+			ret = 1;
+			goto done;
+		}
+		
+		if ((slots=PK11_GetAllTokens(CKM_INVALID_MECHANISM, PR_FALSE, PR_FALSE,
+			NULL)) == NULL) {
+			fprintf(stderr, "No tokens found\n");
+			ret = 1;
+			goto nss_done;
+		}
+
+		for (sle = slots->head; sle; sle = sle->next) {
+			int rv;
+			if ((rv=add_slot_keys(ac, sle->slot, !deleting)) == -1) {
+				ret = 1;
+			}
+			count += rv;
+		}
+		if (count == 0) {
+			ret = 1;
+		}
+nss_done:		
+		NSS_Shutdown();
+		clear_pass();
+		goto done;
+	}
+#endif
 	if (argc == 0) {
 		char buf[MAXPATHLEN];
 		struct passwd *pw;
diff -up openssh-5.3p1/ssh-agent.c.nss-keys openssh-5.3p1/ssh-agent.c
--- openssh-5.3p1/ssh-agent.c.nss-keys	2009-06-21 09:50:15.000000000 +0200
+++ openssh-5.3p1/ssh-agent.c	2009-11-27 13:43:01.000000000 +0100
@@ -80,6 +80,10 @@
 #include "scard.h"
 #endif
 
+#ifdef HAVE_LIBNSS
+#include "nsskeys.h"
+#endif
+
 #if defined(HAVE_SYS_PRCTL_H)
 #include <sys/prctl.h>	/* For prctl() and PR_SET_DUMPABLE */
 #endif
@@ -714,6 +718,114 @@ send:
 }
 #endif /* SMARTCARD */
 
+#ifdef HAVE_LIBNSS
+static void
+process_add_nss_key (SocketEntry *e)
+{
+	char *tokenname = NULL, *keyname = NULL, *password = NULL;
+	int i, version, success = 0, death = 0, confirm = 0;
+	Key **keys, *k;
+	Identity *id;
+	Idtab *tab;
+
+	tokenname = buffer_get_string(&e->request, NULL);
+	keyname = buffer_get_string(&e->request, NULL);
+	password = buffer_get_string(&e->request, NULL);
+
+	while (buffer_len(&e->request)) {
+		switch (buffer_get_char(&e->request)) {
+		case SSH_AGENT_CONSTRAIN_LIFETIME:
+			death = time(NULL) + buffer_get_int(&e->request);
+			break;
+		case SSH_AGENT_CONSTRAIN_CONFIRM:
+			confirm = 1;
+			break;
+		default:
+			break;
+		}
+	}
+	if (lifetime && !death)
+		death = time(NULL) + lifetime;
+
+	keys = nss_get_keys(tokenname, keyname, password, 1, 0, NULL);
+	/* password is owned by keys[0] now */
+	xfree(tokenname);
+	xfree(keyname);
+
+	if (keys == NULL) {
+		memset(password, 0, strlen(password));
+		xfree(password);
+		error("nss_get_keys failed");
+		goto send;
+	}
+	for (i = 0; keys[i] != NULL; i++) {
+		k = keys[i];
+		version = k->type == KEY_RSA1 ? 1 : 2;
+		tab = idtab_lookup(version);
+		if (lookup_identity(k, version) == NULL) {
+			id = xmalloc(sizeof(Identity));
+			id->key = k;
+			id->comment = nss_get_key_label(k);
+			id->death = death;
+			id->confirm = confirm;
+			TAILQ_INSERT_TAIL(&tab->idlist, id, next);
+			tab->nentries++;
+			success = 1;
+		} else {
+			key_free(k);
+		}
+		keys[i] = NULL;
+	}
+	xfree(keys);
+send:
+	buffer_put_int(&e->output, 1);
+	buffer_put_char(&e->output,
+	    success ? SSH_AGENT_SUCCESS : SSH_AGENT_FAILURE);
+}
+
+static void
+process_remove_nss_key(SocketEntry *e)
+{
+	char *tokenname = NULL, *keyname = NULL, *password = NULL;
+	int i, version, success = 0;
+	Key **keys, *k = NULL;
+	Identity *id;
+	Idtab *tab;
+
+	tokenname = buffer_get_string(&e->request, NULL);
+	keyname = buffer_get_string(&e->request, NULL);
+	password = buffer_get_string(&e->request, NULL);
+
+	keys = nss_get_keys(tokenname, keyname, password, 1, 0, NULL);
+	xfree(tokenname);
+	xfree(keyname);
+	xfree(password);
+
+	if (keys == NULL || keys[0] == NULL) {
+		error("nss_get_keys failed");
+		goto send;
+	}
+	for (i = 0; keys[i] != NULL; i++) {
+		k = keys[i];
+		version = k->type == KEY_RSA1 ? 1 : 2;
+		if ((id = lookup_identity(k, version)) != NULL) {
+			tab = idtab_lookup(version);
+			TAILQ_REMOVE(&tab->idlist, id, next);
+			tab->nentries--;
+			free_identity(id);
+			success = 1;
+		}
+		key_free(k);
+		keys[i] = NULL;
+	}
+	xfree(keys);
+send:
+	buffer_put_int(&e->output, 1);
+	buffer_put_char(&e->output,
+	    success ? SSH_AGENT_SUCCESS : SSH_AGENT_FAILURE);
+}
+#endif /* HAVE_LIBNSS */
+
 /* dispatch incoming messages */
 
 static void
@@ -806,6 +918,15 @@ process_message(SocketEntry *e)
 		process_remove_smartcard_key(e);
 		break;
 #endif /* SMARTCARD */
+#ifdef HAVE_LIBNSS
+	case SSH_AGENTC_ADD_NSS_KEY:
+	case SSH_AGENTC_ADD_NSS_KEY_CONSTRAINED:
+		process_add_nss_key(e);
+		break;
+	case SSH_AGENTC_REMOVE_NSS_KEY:
+		process_remove_nss_key(e);
+		break;
+#endif /* SMARTCARD */
 	default:
 		/* Unknown message.  Respond with failure. */
 		error("Unknown message %d", type);
diff -up openssh-5.3p1/ssh.c.nss-keys openssh-5.3p1/ssh.c
--- openssh-5.3p1/ssh.c.nss-keys	2009-07-05 23:16:56.000000000 +0200
+++ openssh-5.3p1/ssh.c	2009-11-27 13:43:01.000000000 +0100
@@ -105,6 +105,9 @@
 #ifdef SMARTCARD
 #include "scard.h"
 #endif
+#ifdef HAVE_LIBNSS
+#include "nsskeys.h"
+#endif
 
 extern char *__progname;
 
@@ -1234,9 +1237,11 @@ load_public_identity_files(void)
 	int i = 0;
 	Key *public;
 	struct passwd *pw;
-#ifdef SMARTCARD
+#if defined(SMARTCARD) || defined(HAVE_LIBNSS)
 	Key **keys;
+#endif
 
+#ifdef SMARTCARD
 	if (options.smartcard_device != NULL &&
 	    options.num_identity_files < SSH_MAX_IDENTITY_FILES &&
 	    (keys = sc_get_keys(options.smartcard_device, NULL)) != NULL) {
@@ -1259,6 +1264,29 @@ load_public_identity_files(void)
 		xfree(keys);
 	}
 #endif /* SMARTCARD */
+#ifdef HAVE_LIBNSS
+	if (options.use_nss &&
+	    options.num_identity_files < SSH_MAX_IDENTITY_FILES &&
+	    (keys = nss_get_keys(options.nss_token, NULL, NULL, 
+	    	options.number_of_password_prompts, options.num_nss_modules,
+	    	options.nss_modules)) != NULL) {
+		int count;
+		for (count = 0; keys[count] != NULL; count++) {
+			memmove(&options.identity_files[1], &options.identity_files[0],
+			    sizeof(char *) * (SSH_MAX_IDENTITY_FILES - 1));
+			memmove(&options.identity_keys[1], &options.identity_keys[0],
+			    sizeof(Key *) * (SSH_MAX_IDENTITY_FILES - 1));
+			options.num_identity_files++;
+			options.identity_keys[0] = keys[count];
+			options.identity_files[0] = nss_get_key_label(keys[count]);
+		}
+		if (options.num_identity_files > SSH_MAX_IDENTITY_FILES)
+			options.num_identity_files = SSH_MAX_IDENTITY_FILES;
+		i += count;
+		xfree(keys);
+	}
+#endif /* HAVE_LIBNSS */
+
 	if ((pw = getpwuid(original_real_uid)) == NULL)
 		fatal("load_public_identity_files: getpwuid failed");
 	pwname = xstrdup(pw->pw_name);
diff -up openssh-5.3p1/ssh-dss.c.nss-keys openssh-5.3p1/ssh-dss.c
--- openssh-5.3p1/ssh-dss.c.nss-keys	2006-11-07 13:14:42.000000000 +0100
+++ openssh-5.3p1/ssh-dss.c	2009-11-27 13:43:01.000000000 +0100
@@ -39,6 +39,10 @@
 #include "log.h"
 #include "key.h"
 
+#ifdef HAVE_LIBNSS
+#include <cryptohi.h>
+#endif
+
 #define INTBLOB_LEN	20
 #define SIGBLOB_LEN	(2*INTBLOB_LEN)
 
@@ -57,6 +61,34 @@ ssh_dss_sign(const Key *key, u_char **si
 		error("ssh_dss_sign: no DSA key");
 		return -1;
 	}
+#ifdef HAVE_LIBNSS
+	if (key->flags & KEY_FLAG_NSS) {
+		SECItem sigitem;
+		SECItem *rawsig;
+
+		memset(&sigitem, 0, sizeof(sigitem));
+		if (SEC_SignData(&sigitem, (u_char *)data, datalen, key->nss->privk,
+			SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST) != SECSuccess) {
+			error("ssh_dss_sign: sign failed");
+			return -1;
+		}
+		
+		if ((rawsig=DSAU_DecodeDerSig(&sigitem)) == NULL) {
+			error("ssh_dss_sign: der decode failed");
+			SECITEM_ZfreeItem(&sigitem, PR_FALSE);
+			return -1;
+		}
+		SECITEM_ZfreeItem(&sigitem, PR_FALSE);
+		if (rawsig->len != SIGBLOB_LEN) {
+			error("ssh_dss_sign: unsupported signature length %d",
+				rawsig->len);
+			SECITEM_ZfreeItem(rawsig, PR_TRUE);
+			return -1;
+		}
+		memcpy(sigblob, rawsig->data, SIGBLOB_LEN);
+		SECITEM_ZfreeItem(rawsig, PR_TRUE);
+	} else {
+#endif
 	EVP_DigestInit(&md, evp_md);
 	EVP_DigestUpdate(&md, data, datalen);
 	EVP_DigestFinal(&md, digest, &dlen);
@@ -80,7 +112,9 @@ ssh_dss_sign(const Key *key, u_char **si
 	BN_bn2bin(sig->r, sigblob+ SIGBLOB_LEN - INTBLOB_LEN - rlen);
 	BN_bn2bin(sig->s, sigblob+ SIGBLOB_LEN - slen);
 	DSA_SIG_free(sig);
-
+#ifdef HAVE_LIBNSS
+	}
+#endif
 	if (datafellows & SSH_BUG_SIGBLOB) {
 		if (lenp != NULL)
 			*lenp = SIGBLOB_LEN;
diff -up openssh-5.3p1/ssh.h.nss-keys openssh-5.3p1/ssh.h
--- openssh-5.3p1/ssh.h.nss-keys	2006-08-05 04:39:41.000000000 +0200
+++ openssh-5.3p1/ssh.h	2009-11-27 13:43:01.000000000 +0100
@@ -28,6 +28,12 @@
 #define SSH_MAX_IDENTITY_FILES		100
 
 /*
+ * Maximum number of PKCS#11 modules that can be specified in configuration
+ * files or on the command line.
+ */
+#define SSH_MAX_NSS_MODULES			10
+
+/*
  * Maximum length of lines in authorized_keys file.
  * Current value permits 16kbit RSA and RSA1 keys and 8kbit DSA keys, with
  * some room for options and comments.
diff -up openssh-5.3p1/ssh-keygen.c.nss-keys openssh-5.3p1/ssh-keygen.c
--- openssh-5.3p1/ssh-keygen.c.nss-keys	2009-06-22 08:11:07.000000000 +0200
+++ openssh-5.3p1/ssh-keygen.c	2009-11-27 13:43:01.000000000 +0100
@@ -53,6 +53,11 @@
 #include "scard.h"
 #endif
 
+#ifdef HAVE_LIBNSS
+#include <nss.h>
+#include "nsskeys.h"
+#endif
+
 /* Number of bits in the RSA/DSA key.  This value can be set on the command line. */
 #define DEFAULT_BITS		2048
 #define DEFAULT_BITS_DSA	1024
@@ -501,6 +506,26 @@ do_download(struct passwd *pw, const cha
 }
 #endif /* SMARTCARD */
 
+#ifdef HAVE_LIBNSS
+static void
+do_nss_download(struct passwd *pw, const char *tokenname, const char *keyname)
+{
+	Key **keys = NULL;
+	int i;
+	
+	keys = nss_get_keys(tokenname, keyname, NULL, 1, 0, NULL);
+	if (keys == NULL)
+		fatal("cannot find public key in NSS");
+	for (i = 0; keys[i]; i++) {
+		key_write(keys[i], stdout);
+		key_free(keys[i]);
+		fprintf(stdout, "\n");
+	}
+	xfree(keys);
+	exit(0);
+}
+#endif /* HAVE_LIBNSS */
+
 static void
 do_fingerprint(struct passwd *pw)
 {
@@ -1083,7 +1108,8 @@ main(int argc, char **argv)
 	Key *private, *public;
 	struct passwd *pw;
 	struct stat st;
-	int opt, type, fd, download = 0;
+	int opt, type, fd, download = 1;
+	int use_nss = 0;
 	u_int32_t memory = 0, generator_wanted = 0, trials = 100;
 	int do_gen_candidates = 0, do_screen_candidates = 0;
 	BIGNUM *start = NULL;
@@ -1116,7 +1142,7 @@ main(int argc, char **argv)
 	}
 
 	while ((opt = getopt(argc, argv,
-	    "degiqpclBHvxXyF:b:f:t:U:D:P:N:C:r:g:R:T:G:M:S:a:W:")) != -1) {
+	    "degiqpclnBHvxXyF:b:f:t:U:D:P:N:C:r:g:R:T:G:M:S:a:W:")) != -1) {
 		switch (opt) {
 		case 'b':
 			bits = (u_int32_t)strtonum(optarg, 768, 32768, &errstr);
@@ -1156,6 +1182,10 @@ main(int argc, char **argv)
 		case 'g':
 			print_generic = 1;
 			break;
+		case 'n':
+			use_nss = 1;
+			download = 1;
+			break;
 		case 'P':
 			identity_passphrase = optarg;
 			break;
@@ -1187,10 +1217,10 @@ main(int argc, char **argv)
 		case 't':
 			key_type_name = optarg;
 			break;
-		case 'D':
-			download = 1;
-			/*FALLTHROUGH*/
 		case 'U':
+			download = 0;
+			/*FALLTHROUGH*/
+		case 'D':
 			reader_id = optarg;
 			break;
 		case 'v':
@@ -1299,6 +1329,17 @@ main(int argc, char **argv)
 			exit(0);
 		}
 	}
+
+	if (use_nss) {
+#ifdef HAVE_LIBNSS
+		if (download)
+			do_nss_download(pw, reader_id, identity_file);
+		else
+			fatal("no support for NSS key upload.");
+#else
+		fatal("no support for NSS keys.");
+#endif
+	}
 	if (reader_id != NULL) {
 #ifdef SMARTCARD
 		if (download)
diff -up openssh-5.3p1/ssh-rsa.c.nss-keys openssh-5.3p1/ssh-rsa.c
--- openssh-5.3p1/ssh-rsa.c.nss-keys	2006-09-01 07:38:37.000000000 +0200
+++ openssh-5.3p1/ssh-rsa.c	2009-11-27 13:43:01.000000000 +0100
@@ -32,6 +32,10 @@
 #include "compat.h"
 #include "ssh.h"
 
+#ifdef HAVE_LIBNSS
+#include <cryptohi.h>
+#endif
+
 static int openssh_RSA_verify(int, u_char *, u_int, u_char *, u_int, RSA *);
 
 /* RSASSA-PKCS1-v1_5 (PKCS #1 v2.0 signature) with SHA1 */
@@ -50,6 +54,38 @@ ssh_rsa_sign(const Key *key, u_char **si
 		error("ssh_rsa_sign: no RSA key");
 		return -1;
 	}
+
+	slen = RSA_size(key->rsa);
+	sig = xmalloc(slen);
+
+#ifdef HAVE_LIBNSS
+	if (key->flags & KEY_FLAG_NSS) {
+		SECItem sigitem;
+		SECOidTag alg;
+
+		memset(&sigitem, 0, sizeof(sigitem));
+		alg = (datafellows & SSH_BUG_RSASIGMD5) ?
+			SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION :
+			SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION;
+
+		if (SEC_SignData(&sigitem, (u_char *)data, datalen, key->nss->privk,
+			alg) != SECSuccess) {
+			error("ssh_rsa_sign: sign failed");
+			return -1;
+		}
+		if (sigitem.len > slen) {
+			error("ssh_rsa_sign: slen %u slen2 %u", slen, sigitem.len);
+			xfree(sig);
+			SECITEM_ZfreeItem(&sigitem, PR_FALSE);
+			return -1;
+		}
+		if (sigitem.len < slen) {
+			memset(sig, 0, slen - sigitem.len);
+		}
+		memcpy(sig+slen-sigitem.len, sigitem.data, sigitem.len);
+		SECITEM_ZfreeItem(&sigitem, PR_FALSE);
+	} else {
+#endif
 	nid = (datafellows & SSH_BUG_RSASIGMD5) ? NID_md5 : NID_sha1;
 	if ((evp_md = EVP_get_digestbynid(nid)) == NULL) {
 		error("ssh_rsa_sign: EVP_get_digestbynid %d failed", nid);
@@ -59,9 +95,6 @@ ssh_rsa_sign(const Key *key, u_char **si
 	EVP_DigestUpdate(&md, data, datalen);
 	EVP_DigestFinal(&md, digest, &dlen);
 
-	slen = RSA_size(key->rsa);
-	sig = xmalloc(slen);
-
 	ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa);
 	memset(digest, 'd', sizeof(digest));
 
@@ -83,6 +116,9 @@ ssh_rsa_sign(const Key *key, u_char **si
 		xfree(sig);
 		return -1;
 	}
+#ifdef HAVE_LIBNSS
+	}
+#endif
 	/* encode signature */
 	buffer_init(&b);
 	buffer_put_cstring(&b, "ssh-rsa");

openssh-5.4p1-pam_selinux.patch:
 auth-pam.c                  |    2 -
 auth-pam.h                  |    2 -
 openbsd-compat/port-linux.c |   83 +++++++++++++++++++++++++++++++++++++-------
 3 files changed, 73 insertions(+), 14 deletions(-)

--- NEW FILE openssh-5.4p1-pam_selinux.patch ---
diff -up openssh-5.4p1/auth-pam.c.pam_selinux openssh-5.4p1/auth-pam.c
--- openssh-5.4p1/auth-pam.c.pam_selinux	2009-07-12 14:07:21.000000000 +0200
+++ openssh-5.4p1/auth-pam.c	2010-03-01 15:27:23.000000000 +0100
@@ -1069,7 +1069,7 @@ is_pam_session_open(void)
  * during the ssh authentication process.
  */
 int
-do_pam_putenv(char *name, char *value)
+do_pam_putenv(char *name, const char *value)
 {
 	int ret = 1;
 #ifdef HAVE_PAM_PUTENV
diff -up openssh-5.4p1/auth-pam.h.pam_selinux openssh-5.4p1/auth-pam.h
--- openssh-5.4p1/auth-pam.h.pam_selinux	2004-09-11 14:17:26.000000000 +0200
+++ openssh-5.4p1/auth-pam.h	2010-03-01 15:27:23.000000000 +0100
@@ -38,7 +38,7 @@ void do_pam_session(void);
 void do_pam_set_tty(const char *);
 void do_pam_setcred(int );
 void do_pam_chauthtok(void);
-int do_pam_putenv(char *, char *);
+int do_pam_putenv(char *, const char *);
 char ** fetch_pam_environment(void);
 char ** fetch_pam_child_environment(void);
 void free_pam_environment(char **);
diff -up openssh-5.4p1/openbsd-compat/port-linux.c.pam_selinux openssh-5.4p1/openbsd-compat/port-linux.c
--- openssh-5.4p1/openbsd-compat/port-linux.c.pam_selinux	2010-03-01 15:27:22.000000000 +0100
+++ openssh-5.4p1/openbsd-compat/port-linux.c	2010-03-01 15:27:53.000000000 +0100
@@ -36,6 +36,7 @@
 #include "hostfile.h"
 #include "auth.h"
 #include "xmalloc.h"
+#include "servconf.h"
 
 #ifdef WITH_SELINUX
 #include <selinux/selinux.h>
@@ -50,6 +51,7 @@
 #include <unistd.h>
 #endif
 
+extern ServerOptions options;
 extern Authctxt *the_authctxt;
 extern int inetd_flag;
 extern int rexeced_flag;
@@ -211,29 +213,38 @@ get_user_context(const char *sename, con
         return -1;
 }
 
+static void
+ssh_selinux_get_role_level(char **role, const char **level)
+{
+	*role = NULL;
+	*level = NULL;
+	if (the_authctxt) {
+		if (the_authctxt->role != NULL) {
+			char *slash;
+			*role = xstrdup(the_authctxt->role);
+			if ((slash = strchr(*role, '/')) != NULL) {
+				*slash = '\0';
+				*level = slash + 1;
+			}
+		}
+	}
+}
+
 /* Return the default security context for the given username */
 static int
 ssh_selinux_getctxbyname(char *pwname,
 	security_context_t *default_sc, security_context_t *user_sc)
 {
 	char *sename, *lvl;
-	const char *reqlvl = NULL;
-	char *role = NULL;
+	const char *reqlvl;
+	char *role;
 	int r = -1;
 	context_t con = NULL;
 
 	*default_sc = NULL;
 	*user_sc = NULL;
-	if (the_authctxt) {
-		if (the_authctxt->role != NULL) {
-			char *slash;
-			role = xstrdup(the_authctxt->role);
-			if ((slash = strchr(role, '/')) != NULL) {
-				*slash = '\0';
-				reqlvl = slash + 1;
-			}
-		}
-	}
+
+	ssh_selinux_get_role_level(&role, &reqlvl);
 
 #ifdef HAVE_GETSEUSERBYNAME
 	if ((r=getseuserbyname(pwname, &sename, &lvl)) != 0) {
@@ -314,6 +325,36 @@ ssh_selinux_getctxbyname(char *pwname,
 	return (r);
 }
 
+/* Setup environment variables for pam_selinux */
+static int
+ssh_selinux_setup_pam_variables(void)
+{
+	const char *reqlvl;
+	char *role;
+	char *use_current;
+	int rv;
+
+	debug3("%s: setting execution context", __func__);
+
+	ssh_selinux_get_role_level(&role, &reqlvl);
+
+	rv = do_pam_putenv("SELINUX_ROLE_REQUESTED", role ? role : "");
+	
+	if (inetd_flag && !rexeced_flag) {
+		use_current = "1";
+	} else {
+		use_current = "";
+		rv = rv || do_pam_putenv("SELINUX_LEVEL_REQUESTED", reqlvl ? reqlvl: "");
+	}
+
+	rv = rv || do_pam_putenv("SELINUX_USE_CURRENT_RANGE", use_current);
+
+	if (role != NULL)
+		xfree(role);
+	
+	return rv;
+}
+
 /* Set the execution context to the default for the specified user */
 void
 ssh_selinux_setup_exec_context(char *pwname)
@@ -325,6 +366,24 @@ ssh_selinux_setup_exec_context(char *pwn
 	if (!ssh_selinux_enabled())
 		return;
 
+	if (options.use_pam) {
+		/* do not compute context, just setup environment for pam_selinux */
+		if (ssh_selinux_setup_pam_variables()) {
+			switch (security_getenforce()) {
+			case -1:
+				fatal("%s: security_getenforce() failed", __func__);
+			case 0:
+				error("%s: SELinux PAM variable setup failure. Continuing in permissive mode.",
+				    __func__);
+			break;
+			default:
+				fatal("%s: SELinux PAM variable setup failure. Aborting connection.",
+				    __func__);
+			}
+		}
+		return;
+	}
+
 	debug3("%s: setting execution context", __func__);
 
 	r = ssh_selinux_getctxbyname(pwname, &default_ctx, &user_ctx);

openssh-5.4p1-pka.patch:
 auth2-pubkey.c |  159 +++++++++++++++++++++++++++++++++++++++++++++++++++------
 configure.ac   |   13 ++++
 servconf.c     |   30 ++++++++++
 servconf.h     |    2 
 sshd_config    |    2 
 sshd_config.0  |   14 ++++-
 sshd_config.5  |   13 ++++
 7 files changed, 216 insertions(+), 17 deletions(-)

--- NEW FILE openssh-5.4p1-pka.patch ---
diff -up openssh-5.4p1/auth2-pubkey.c.pka openssh-5.4p1/auth2-pubkey.c
--- openssh-5.4p1/auth2-pubkey.c.pka	2010-03-01 18:10:48.000000000 +0100
+++ openssh-5.4p1/auth2-pubkey.c	2010-03-01 18:10:50.000000000 +0100
@@ -186,27 +186,15 @@ done:
 
 /* return 1 if user allows given key */
 static int
-user_key_allowed2(struct passwd *pw, Key *key, char *file)
+user_search_key_in_file(FILE *f, char *file, Key* key, struct passwd *pw)
 {
 	char line[SSH_MAX_PUBKEY_BYTES];
 	const char *reason;
 	int found_key = 0;
-	FILE *f;
 	u_long linenum = 0;
 	Key *found;
 	char *fp;
 
-	/* Temporarily use the user's uid. */
-	temporarily_use_uid(pw);
-
-	debug("trying public key file %s", file);
-	f = auth_openkeyfile(file, pw, options.strict_modes);
-
-	if (!f) {
-		restore_uid();
-		return 0;
-	}
-
 	found_key = 0;
 	found = key_new(key_is_cert(key) ? KEY_UNSPEC : key->type);
 
@@ -277,21 +265,160 @@ user_key_allowed2(struct passwd *pw, Key
 			break;
 		}
 	}
-	restore_uid();
-	fclose(f);
 	key_free(found);
 	if (!found_key)
 		debug2("key not found");
 	return found_key;
 }
 
-/* check whether given key is in .ssh/authorized_keys* */
+
+/* return 1 if user allows given key */
+static int
+user_key_allowed2(struct passwd *pw, Key *key, char *file)
+{
+	FILE *f;
+	int found_key = 0;
+
+	/* Temporarily use the user's uid. */
+	temporarily_use_uid(pw);
+
+	debug("trying public key file %s", file);
+	f = auth_openkeyfile(file, pw, options.strict_modes);
+
+ 	if (f) {
+ 		found_key = user_search_key_in_file (f, file, key, pw);
+		fclose(f);
+	}
+
+	restore_uid();
+	return found_key;
+}
+
+#ifdef WITH_PUBKEY_AGENT
+
+#define WHITESPACE " \t\r\n"
+
+/* return 1 if user allows given key */
+static int
+user_key_via_agent_allowed2(struct passwd *pw, Key *key)
+{
+	FILE *f;
+	int found_key = 0;
+	char *pubkey_agent_string = NULL;
+	char *tmp_pubkey_agent_string = NULL;
+	char *progname;
+	char *cp;
+	struct passwd *runas_pw;
+	struct stat st;
+
+	if (options.pubkey_agent == NULL || options.pubkey_agent[0] != '/')
+		return -1;
+
+	/* get the run as identity from config */
+	runas_pw = (options.pubkey_agent_runas == NULL)? pw
+	    : getpwnam (options.pubkey_agent_runas);
+	if (!runas_pw) {
+		error("%s: getpwnam(\"%s\"): %s", __func__,
+		    options.pubkey_agent_runas, strerror(errno));
+		return 0;
+	}
+
+	/* Temporarily use the specified uid. */
+	if (runas_pw->pw_uid != 0)
+		temporarily_use_uid(runas_pw);
+
+	pubkey_agent_string = percent_expand(options.pubkey_agent,
+	    "h", pw->pw_dir, "u", pw->pw_name, (char *)NULL);
+
+	/* Test whether agent can be modified by non root user */
+	tmp_pubkey_agent_string = xstrdup (pubkey_agent_string);
+	progname = strtok (tmp_pubkey_agent_string, WHITESPACE);
+
+	debug3("%s: checking program '%s'", __func__, progname);
+
+	if (stat (progname, &st) < 0) {
+		error("%s: stat(\"%s\"): %s", __func__,
+		    progname, strerror(errno));
+		goto go_away;
+	}
+
+	if (st.st_uid != 0 || (st.st_mode & 022) != 0) {
+		error("bad ownership or modes for pubkey agent \"%s\"",
+		    progname);
+		goto go_away;
+	}
+
+	if (!S_ISREG(st.st_mode)) {
+		error("pubkey agent \"%s\" is not a regular file",
+		    progname);
+		goto go_away;
+	}
+
+	/*
+	 * Descend the path, checking that each component is a
+	 * root-owned directory with strict permissions.
+	 */
+	do {
+		if ((cp = strrchr(progname, '/')) == NULL)
+			break;
+		else 
+			*cp = '\0';
+	
+		debug3("%s: checking component '%s'", __func__, progname);
+
+		if (stat(progname, &st) != 0) {
+			error("%s: stat(\"%s\"): %s", __func__,
+			    progname, strerror(errno));
+			goto go_away;
+		}
+		if (st.st_uid != 0 || (st.st_mode & 022) != 0) {
+			error("bad ownership or modes for pubkey agent path component \"%s\"",
+			    progname);
+			goto go_away;
+		}
+		if (!S_ISDIR(st.st_mode)) {
+			error("pubkey agent path component \"%s\" is not a directory",
+			    progname);
+			goto go_away;
+		}
+	} while (0);
+
+	/* open the pipe and read the keys */
+	f = popen (pubkey_agent_string, "r");
+	if (!f) {
+		error("%s: popen (\"%s\", \"r\"): %s", __func__,
+		    pubkey_agent_string, strerror (errno));
+		goto go_away;
+	}
+
+	found_key = user_search_key_in_file (f, options.pubkey_agent, key, pw);
+	pclose (f);
+
+go_away:
+	if (tmp_pubkey_agent_string)
+		xfree (tmp_pubkey_agent_string);
+	if (pubkey_agent_string)
+		xfree (pubkey_agent_string);
+
+	if (runas_pw->pw_uid != 0)
+		restore_uid();
+	return found_key;
+}
+#endif
+
+/* check whether given key is in <pkey_agent or .ssh/authorized_keys* */
 int
 user_key_allowed(struct passwd *pw, Key *key)
 {
 	int success;
 	char *file;
 
+#ifdef WITH_PUBKEY_AGENT
+	success = user_key_via_agent_allowed2(pw, key);
+	if (success >= 0)
+		return success;
+#endif
+
 	file = authorized_keys_file(pw);
 	success = user_key_allowed2(pw, key, file);
 	xfree(file);
diff -up openssh-5.4p1/configure.ac.pka openssh-5.4p1/configure.ac
--- openssh-5.4p1/configure.ac.pka	2010-03-01 18:10:47.000000000 +0100
+++ openssh-5.4p1/configure.ac	2010-03-01 18:10:50.000000000 +0100
@@ -1323,6 +1323,18 @@ AC_ARG_WITH(audit,
 	esac ]
 )
 
+# Check whether user wants pubkey agent support
+PKA_MSG="no"
+AC_ARG_WITH(pka,
+	[  --with-pka      Enable pubkey agent support],
+	[
+		if test "x$withval" != "xno" ; then
+			AC_DEFINE([WITH_PUBKEY_AGENT], 1, [Enable pubkey agent support])
+			PKA_MSG="yes"
+		fi
+	]
+)
+
 dnl    Checks for library functions. Please keep in alphabetical order
 AC_CHECK_FUNCS( \
 	arc4random \
@@ -4206,6 +4218,7 @@ echo "               Linux audit support
 echo "                 Smartcard support: $SCARD_MSG"
 echo "                     S/KEY support: $SKEY_MSG"
 echo "              TCP Wrappers support: $TCPW_MSG"
+echo "                       PKA support: $PKA_MSG"
 echo "              MD5 password support: $MD5_MSG"
 echo "                   libedit support: $LIBEDIT_MSG"
 echo "  Solaris process contract support: $SPC_MSG"
diff -up openssh-5.4p1/servconf.c.pka openssh-5.4p1/servconf.c
--- openssh-5.4p1/servconf.c.pka	2010-03-01 18:10:46.000000000 +0100
+++ openssh-5.4p1/servconf.c	2010-03-01 18:13:23.000000000 +0100
@@ -129,6 +129,8 @@ initialize_server_options(ServerOptions 
 	options->num_permitted_opens = -1;
 	options->adm_forced_command = NULL;
 	options->chroot_directory = NULL;
+	options->pubkey_agent = NULL;
+	options->pubkey_agent_runas = NULL;
 	options->zero_knowledge_password_authentication = -1;
 }
 
@@ -312,6 +314,7 @@ typedef enum {
 	sMatch, sPermitOpen, sForceCommand, sChrootDirectory,
 	sUsePrivilegeSeparation, sAllowAgentForwarding,
 	sZeroKnowledgePasswordAuthentication, sHostCertificate,
+	sPubkeyAgent, sPubkeyAgentRunAs,
 	sDeprecated, sUnsupported
 } ServerOpCodes;
 
@@ -432,6 +435,13 @@ static struct {
 	{ "forcecommand", sForceCommand, SSHCFG_ALL },
 	{ "chrootdirectory", sChrootDirectory, SSHCFG_ALL },
 	{ "hostcertificate", sHostCertificate, SSHCFG_GLOBAL },
+#ifdef WITH_PUBKEY_AGENT
+	{ "pubkeyagent", sPubkeyAgent, SSHCFG_ALL },
+	{ "pubkeyagentrunas", sPubkeyAgentRunAs, SSHCFG_ALL },
+#else
+	{ "pubkeyagent", sUnsupported, SSHCFG_ALL },
+	{ "pubkeyagentrunas", sUnsupported, SSHCFG_ALL },
+#endif
 	{ NULL, sBadOption, 0 }
 };
 
@@ -1332,6 +1342,20 @@ process_server_config_line(ServerOptions
 			*charptr = xstrdup(arg);
 		break;
 
+	case sPubkeyAgent:
+		len = strspn(cp, WHITESPACE);
+		if (*activep && options->pubkey_agent == NULL)
+			options->pubkey_agent = xstrdup(cp + len);
+		return 0;
+
+	case sPubkeyAgentRunAs:
+		charptr = &options->pubkey_agent_runas;
+
+		arg = strdelim(&cp);
+		if (*activep && *charptr == NULL)
+			*charptr = xstrdup(arg);
+		break;
+
 	case sDeprecated:
 		logit("%s line %d: Deprecated option %s",
 		    filename, linenum, arg);
@@ -1425,6 +1449,8 @@ copy_set_server_options(ServerOptions *d
 	M_CP_INTOPT(gss_authentication);
 	M_CP_INTOPT(rsa_authentication);
 	M_CP_INTOPT(pubkey_authentication);
+	M_CP_STROPT(pubkey_agent);
+	M_CP_STROPT(pubkey_agent_runas);
 	M_CP_INTOPT(kerberos_authentication);
 	M_CP_INTOPT(hostbased_authentication);
 	M_CP_INTOPT(kbd_interactive_authentication);
@@ -1666,6 +1692,10 @@ dump_config(ServerOptions *o)
 	dump_cfg_string(sAuthorizedKeysFile2, o->authorized_keys_file2);
 	dump_cfg_string(sForceCommand, o->adm_forced_command);
 	dump_cfg_string(sChrootDirectory, o->chroot_directory);
+#ifdef WITH_PUBKEY_AGENT
+	dump_cfg_string(sPubkeyAgent, o->pubkey_agent);
+	dump_cfg_string(sPubkeyAgentRunAs, o->pubkey_agent_runas);
+#endif
 
 	/* string arguments requiring a lookup */
 	dump_cfg_string(sLogLevel, log_level_name(o->log_level));
diff -up openssh-5.4p1/servconf.h.pka openssh-5.4p1/servconf.h
--- openssh-5.4p1/servconf.h.pka	2010-03-01 18:10:46.000000000 +0100
+++ openssh-5.4p1/servconf.h	2010-03-01 18:10:50.000000000 +0100
@@ -155,6 +155,8 @@ typedef struct {
 	int	num_permitted_opens;
 
 	char   *chroot_directory;
+	char   *pubkey_agent;
+	char   *pubkey_agent_runas;
 }       ServerOptions;
 
 void	 initialize_server_options(ServerOptions *);
diff -up openssh-5.4p1/sshd_config.0.pka openssh-5.4p1/sshd_config.0
--- openssh-5.4p1/sshd_config.0.pka	2010-03-01 18:10:46.000000000 +0100
+++ openssh-5.4p1/sshd_config.0	2010-03-01 18:10:50.000000000 +0100
@@ -352,7 +352,8 @@ DESCRIPTION
              KbdInteractiveAuthentication, KerberosAuthentication,
              MaxAuthTries, MaxSessions, PasswordAuthentication,
              PermitEmptyPasswords, PermitOpen, PermitRootLogin,
-             PubkeyAuthentication, RhostsRSAAuthentication, RSAAuthentication,
+             PubkeyAuthentication, PubkeyAgent, PubkeyAgentRunAs,
+             RhostsRSAAuthentication, RSAAuthentication,
              X11DisplayOffset, X11Forwarding and X11UseLocalHost.
 
      MaxAuthTries
@@ -461,6 +462,17 @@ DESCRIPTION
              fault is ``yes''.  Note that this option applies to protocol ver-
              sion 2 only.
 
+     PubkeyAgent
+             Specifies which agent is used for lookup of the user's public
+             keys. Empty string means to use the authorized_keys file.  By
+             default there is no PubkeyAgent set.  Note that this option has
+             an effect only with PubkeyAuthentication switched on.
+
+     PubkeyAgentRunAs
+             Specifies the user under whose account the PubkeyAgent is run.
+             Empty string (the default value) means the user being authorized
+             is used.
+
      RhostsRSAAuthentication
              Specifies whether rhosts or /etc/hosts.equiv authentication to-
              gether with successful RSA host authentication is allowed.  The
diff -up openssh-5.4p1/sshd_config.5.pka openssh-5.4p1/sshd_config.5
--- openssh-5.4p1/sshd_config.5.pka	2010-03-01 18:10:46.000000000 +0100
+++ openssh-5.4p1/sshd_config.5	2010-03-01 18:10:50.000000000 +0100
@@ -618,6 +618,9 @@ Available keywords are
 .Cm KerberosAuthentication ,
 .Cm MaxAuthTries ,
 .Cm MaxSessions ,
+.Cm PubkeyAuthentication ,
+.Cm PubkeyAgent ,
+.Cm PubkeyAgentRunAs ,
 .Cm PasswordAuthentication ,
 .Cm PermitEmptyPasswords ,
 .Cm PermitOpen ,
@@ -814,6 +817,16 @@ Specifies whether public key authenticat
 The default is
 .Dq yes .
 Note that this option applies to protocol version 2 only.
+.It Cm PubkeyAgent
+Specifies which agent is used for lookup of the user's public
+keys. Empty string means to use the authorized_keys file.
+By default there is no PubkeyAgent set.
+Note that this option has an effect only with PubkeyAuthentication
+switched on.
+.It Cm PubkeyAgentRunAs
+Specifies the user under whose account the PubkeyAgent is run. Empty
+string (the default value) means the user being authorized is used.
+.Dq 
 .It Cm RhostsRSAAuthentication
 Specifies whether rhosts or /etc/hosts.equiv authentication together
 with successful RSA host authentication is allowed.
diff -up openssh-5.4p1/sshd_config.pka openssh-5.4p1/sshd_config
--- openssh-5.4p1/sshd_config.pka	2010-03-01 18:10:46.000000000 +0100
+++ openssh-5.4p1/sshd_config	2010-03-01 18:10:50.000000000 +0100
@@ -45,6 +45,8 @@ SyslogFacility AUTHPRIV
 #RSAAuthentication yes
 #PubkeyAuthentication yes
 #AuthorizedKeysFile	.ssh/authorized_keys
+#PubkeyAgent none
+#PubkeyAgentRunAs nobody
 
 # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
 #RhostsRSAAuthentication no

openssh-5.4p1-redhat.patch:
 ssh_config    |   11 +++++++++++
 sshd_config   |   13 +++++++++++++
 sshd_config.0 |    6 +++---
 sshd_config.5 |    2 +-
 4 files changed, 28 insertions(+), 4 deletions(-)

--- NEW FILE openssh-5.4p1-redhat.patch ---
diff -up openssh-5.4p1/ssh_config.redhat openssh-5.4p1/ssh_config
--- openssh-5.4p1/ssh_config.redhat	2010-01-12 09:40:27.000000000 +0100
+++ openssh-5.4p1/ssh_config	2010-03-01 15:15:51.000000000 +0100
@@ -45,3 +45,14 @@
 #   PermitLocalCommand no
 #   VisualHostKey no
 #   ProxyCommand ssh -q -W %h:%p gateway.example.com
+Host *
+	GSSAPIAuthentication yes
+# If this option is set to yes then remote X11 clients will have full access
+# to the original X11 display. As virtually no X11 client supports the untrusted
+# mode correctly we set this to yes.
+	ForwardX11Trusted yes
+# Send locale-related environment variables
+	SendEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES 
+	SendEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT 
+	SendEnv LC_IDENTIFICATION LC_ALL LANGUAGE
+	SendEnv XMODIFIERS
diff -up openssh-5.4p1/sshd_config.0.redhat openssh-5.4p1/sshd_config.0
--- openssh-5.4p1/sshd_config.0.redhat	2010-03-01 14:30:04.000000000 +0100
+++ openssh-5.4p1/sshd_config.0	2010-03-01 15:14:13.000000000 +0100
@@ -501,9 +501,9 @@ DESCRIPTION
 
      SyslogFacility
              Gives the facility code that is used when logging messages from
-             sshd(8).  The possible values are: DAEMON, USER, AUTH, LOCAL0,
-             LOCAL1, LOCAL2, LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.  The de-
-             fault is AUTH.
+             sshd(8).  The possible values are: DAEMON, USER, AUTH, AUTHPRIV,
+             LOCAL0, LOCAL1, LOCAL2, LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
+             The default is AUTH.
 
      TCPKeepAlive
              Specifies whether the system should send TCP keepalive messages
diff -up openssh-5.4p1/sshd_config.5.redhat openssh-5.4p1/sshd_config.5
--- openssh-5.4p1/sshd_config.5.redhat	2010-02-26 21:55:06.000000000 +0100
+++ openssh-5.4p1/sshd_config.5	2010-03-01 15:14:14.000000000 +0100
@@ -865,7 +865,7 @@ Note that this option applies to protoco
 .It Cm SyslogFacility
 Gives the facility code that is used when logging messages from
 .Xr sshd 8 .
-The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2,
+The possible values are: DAEMON, USER, AUTH, AUTHPRIV, LOCAL0, LOCAL1, LOCAL2,
 LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
 The default is AUTH.
 .It Cm TCPKeepAlive
diff -up openssh-5.4p1/sshd_config.redhat openssh-5.4p1/sshd_config
--- openssh-5.4p1/sshd_config.redhat	2009-10-11 12:51:09.000000000 +0200
+++ openssh-5.4p1/sshd_config	2010-03-01 15:14:14.000000000 +0100
@@ -31,6 +31,7 @@
 # Logging
 # obsoletes QuietMode and FascistLogging
 #SyslogFacility AUTH
+SyslogFacility AUTHPRIV
 #LogLevel INFO
 
 # Authentication:
@@ -58,9 +59,11 @@
 # To disable tunneled clear text passwords, change to no here!
 #PasswordAuthentication yes
 #PermitEmptyPasswords no
+PasswordAuthentication yes
 
 # Change to no to disable s/key passwords
 #ChallengeResponseAuthentication yes
+ChallengeResponseAuthentication no
 
 # Kerberos options
 #KerberosAuthentication no
@@ -70,7 +73,9 @@
 
 # GSSAPI options
 #GSSAPIAuthentication no
+GSSAPIAuthentication yes
 #GSSAPICleanupCredentials yes
+GSSAPICleanupCredentials yes
 
 # Set this to 'yes' to enable PAM authentication, account processing, 
 # and session processing. If this is enabled, PAM authentication will 
@@ -82,11 +87,19 @@
 # PAM authentication, then enable this but set PasswordAuthentication
 # and ChallengeResponseAuthentication to 'no'.
 #UsePAM no
+UsePAM yes
+
+# Accept locale-related environment variables
+AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
+AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
+AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE
+AcceptEnv XMODIFIERS
 
 #AllowAgentForwarding yes
 #AllowTcpForwarding yes
 #GatewayPorts no
 #X11Forwarding no
+X11Forwarding yes
 #X11DisplayOffset 10
 #X11UseLocalhost yes
 #PrintMotd yes

openssh-5.4p1-selinux.patch:
 auth.h                      |    3 +++
 auth1.c                     |   17 +++++++++++++++++
 auth2-gss.c                 |   11 ++++++++++-
 auth2-hostbased.c           |   10 +++++++++-
 auth2-pubkey.c              |   10 +++++++++-
 auth2.c                     |   17 ++++++++++++++++-
 configure.ac                |    1 +
 monitor.c                   |   36 ++++++++++++++++++++++++++++++++++--
 monitor.h                   |    3 +++
 monitor_wrap.c              |   19 +++++++++++++++++++
 monitor_wrap.h              |    3 +++
 openbsd-compat/port-linux.c |   32 +++++++++++++++++++++++++-------
 12 files changed, 149 insertions(+), 13 deletions(-)

--- NEW FILE openssh-5.4p1-selinux.patch ---
diff -up openssh-5.4p1/auth1.c.selinux openssh-5.4p1/auth1.c
--- openssh-5.4p1/auth1.c.selinux	2010-03-01 15:19:56.000000000 +0100
+++ openssh-5.4p1/auth1.c	2010-03-01 15:19:57.000000000 +0100
@@ -384,6 +384,9 @@ do_authentication(Authctxt *authctxt)
 {
 	u_int ulen;
 	char *user, *style = NULL;
+#ifdef WITH_SELINUX
+	char *role=NULL;
+#endif
 
 	/* Get the name of the user that we wish to log in as. */
 	packet_read_expect(SSH_CMSG_USER);
@@ -392,11 +395,25 @@ do_authentication(Authctxt *authctxt)
 	user = packet_get_string(&ulen);
 	packet_check_eom();
 
+#ifdef WITH_SELINUX
+	if ((role = strchr(user, '/')) != NULL)
+		*role++ = '\0';
+#endif
+
 	if ((style = strchr(user, ':')) != NULL)
 		*style++ = '\0';
+#ifdef WITH_SELINUX
+	else
+		if (role && (style = strchr(role, ':')) != NULL)
+			*style++ = '\0';
+#endif
+			
 
 	authctxt->user = user;
 	authctxt->style = style;
+#ifdef WITH_SELINUX
+	authctxt->role = role;
+#endif
 
 	/* Verify that the user is a valid user. */
 	if ((authctxt->pw = PRIVSEP(getpwnamallow(user))) != NULL)
diff -up openssh-5.4p1/auth2.c.selinux openssh-5.4p1/auth2.c
--- openssh-5.4p1/auth2.c.selinux	2009-06-22 08:11:07.000000000 +0200
+++ openssh-5.4p1/auth2.c	2010-03-01 15:19:57.000000000 +0100
@@ -216,6 +216,9 @@ input_userauth_request(int type, u_int32
 	Authctxt *authctxt = ctxt;
 	Authmethod *m = NULL;
 	char *user, *service, *method, *style = NULL;
+#ifdef WITH_SELINUX
+	char *role = NULL;
+#endif
 	int authenticated = 0;
 
 	if (authctxt == NULL)
@@ -227,6 +230,11 @@ input_userauth_request(int type, u_int32
 	debug("userauth-request for user %s service %s method %s", user, service, method);
 	debug("attempt %d failures %d", authctxt->attempt, authctxt->failures);
 
+#ifdef WITH_SELINUX
+	if ((role = strchr(user, '/')) != NULL)
+		*role++ = 0;
+#endif
+
 	if ((style = strchr(user, ':')) != NULL)
 		*style++ = 0;
 
@@ -252,8 +260,15 @@ input_userauth_request(int type, u_int32
 		    use_privsep ? " [net]" : "");
 		authctxt->service = xstrdup(service);
 		authctxt->style = style ? xstrdup(style) : NULL;
-		if (use_privsep)
+#ifdef WITH_SELINUX
+		authctxt->role = role ? xstrdup(role) : NULL;
+#endif
+		if (use_privsep) {
 			mm_inform_authserv(service, style);
+#ifdef WITH_SELINUX
+			mm_inform_authrole(role);
+#endif
+		}
 		userauth_banner();
 	} else if (strcmp(user, authctxt->user) != 0 ||
 	    strcmp(service, authctxt->service) != 0) {
diff -up openssh-5.4p1/auth2-gss.c.selinux openssh-5.4p1/auth2-gss.c
--- openssh-5.4p1/auth2-gss.c.selinux	2007-12-02 12:59:45.000000000 +0100
+++ openssh-5.4p1/auth2-gss.c	2010-03-01 15:19:57.000000000 +0100
@@ -258,6 +258,7 @@ input_gssapi_mic(int type, u_int32_t ple
 	Authctxt *authctxt = ctxt;
 	Gssctxt *gssctxt;
 	int authenticated = 0;
+	char *micuser;
 	Buffer b;
 	gss_buffer_desc mic, gssbuf;
 	u_int len;
@@ -270,7 +271,13 @@ input_gssapi_mic(int type, u_int32_t ple
 	mic.value = packet_get_string(&len);
 	mic.length = len;
 
-	ssh_gssapi_buildmic(&b, authctxt->user, authctxt->service,
+#ifdef WITH_SELINUX
+	if (authctxt->role && (strlen(authctxt->role) > 0))
+		xasprintf(&micuser, "%s/%s", authctxt->user, authctxt->role);
+	else
+#endif
+		micuser = authctxt->user;
+	ssh_gssapi_buildmic(&b, micuser, authctxt->service,
 	    "gssapi-with-mic");
 
 	gssbuf.value = buffer_ptr(&b);
@@ -282,6 +289,8 @@ input_gssapi_mic(int type, u_int32_t ple
 		logit("GSSAPI MIC check failed");
 
 	buffer_free(&b);
+	if (micuser != authctxt->user)
+		xfree(micuser);
 	xfree(mic.value);
 
 	authctxt->postponed = 0;
diff -up openssh-5.4p1/auth2-hostbased.c.selinux openssh-5.4p1/auth2-hostbased.c
--- openssh-5.4p1/auth2-hostbased.c.selinux	2008-07-17 10:57:19.000000000 +0200
+++ openssh-5.4p1/auth2-hostbased.c	2010-03-01 15:19:57.000000000 +0100
@@ -106,7 +106,15 @@ userauth_hostbased(Authctxt *authctxt)
 	buffer_put_string(&b, session_id2, session_id2_len);
 	/* reconstruct packet */
 	buffer_put_char(&b, SSH2_MSG_USERAUTH_REQUEST);
-	buffer_put_cstring(&b, authctxt->user);
+#ifdef WITH_SELINUX
+	if (authctxt->role) {
+		buffer_put_int(&b, strlen(authctxt->user)+strlen(authctxt->role)+1);
+		buffer_append(&b, authctxt->user, strlen(authctxt->user));
+		buffer_put_char(&b, '/');
+		buffer_append(&b, authctxt->role, strlen(authctxt->role));
+	} else 
+#endif
+		buffer_put_cstring(&b, authctxt->user);
 	buffer_put_cstring(&b, service);
 	buffer_put_cstring(&b, "hostbased");
 	buffer_put_string(&b, pkalg, alen);
diff -up openssh-5.4p1/auth2-pubkey.c.selinux openssh-5.4p1/auth2-pubkey.c
--- openssh-5.4p1/auth2-pubkey.c.selinux	2010-02-26 21:55:05.000000000 +0100
+++ openssh-5.4p1/auth2-pubkey.c	2010-03-01 15:19:57.000000000 +0100
@@ -119,7 +119,15 @@ userauth_pubkey(Authctxt *authctxt)
 		}
 		/* reconstruct packet */
 		buffer_put_char(&b, SSH2_MSG_USERAUTH_REQUEST);
-		buffer_put_cstring(&b, authctxt->user);
+#ifdef WITH_SELINUX
+		if (authctxt->role) {
+			buffer_put_int(&b, strlen(authctxt->user)+strlen(authctxt->role)+1);
+			buffer_append(&b, authctxt->user, strlen(authctxt->user));
+			buffer_put_char(&b, '/');
+			buffer_append(&b, authctxt->role, strlen(authctxt->role));
+		} else 
+#endif
+			buffer_put_cstring(&b, authctxt->user);
 		buffer_put_cstring(&b,
 		    datafellows & SSH_BUG_PKSERVICE ?
 		    "ssh-userauth" :
diff -up openssh-5.4p1/auth.h.selinux openssh-5.4p1/auth.h
--- openssh-5.4p1/auth.h.selinux	2010-02-26 21:55:05.000000000 +0100
+++ openssh-5.4p1/auth.h	2010-03-01 15:19:57.000000000 +0100
@@ -58,6 +58,9 @@ struct Authctxt {
 	char		*service;
 	struct passwd	*pw;		/* set if 'valid' */
 	char		*style;
+#ifdef WITH_SELINUX
+	char		*role;
+#endif
 	void		*kbdintctxt;
 	void		*jpake_ctx;
 #ifdef BSD_AUTH
diff -up openssh-5.4p1/configure.ac.selinux openssh-5.4p1/configure.ac
--- openssh-5.4p1/configure.ac.selinux	2010-03-01 15:19:57.000000000 +0100
+++ openssh-5.4p1/configure.ac	2010-03-01 15:21:12.000000000 +0100
@@ -3358,6 +3358,7 @@ AC_ARG_WITH(selinux,
 			],
 			AC_MSG_ERROR(SELinux support requires libselinux library))
 		SSHDLIBS="$SSHDLIBS $LIBSELINUX"
+		LIBS="$LIBS $LIBSELINUX"
 		AC_CHECK_FUNCS(getseuserbyname get_default_context_with_level)
 		LIBS="$save_LIBS"
 	fi ]
diff -up openssh-5.4p1/monitor.c.selinux openssh-5.4p1/monitor.c
--- openssh-5.4p1/monitor.c.selinux	2010-02-26 21:55:05.000000000 +0100
+++ openssh-5.4p1/monitor.c	2010-03-01 15:19:57.000000000 +0100
@@ -137,6 +137,9 @@ int mm_answer_sign(int, Buffer *);
 int mm_answer_pwnamallow(int, Buffer *);
 int mm_answer_auth2_read_banner(int, Buffer *);
 int mm_answer_authserv(int, Buffer *);
+#ifdef WITH_SELINUX
+int mm_answer_authrole(int, Buffer *);
+#endif
 int mm_answer_authpassword(int, Buffer *);
 int mm_answer_bsdauthquery(int, Buffer *);
 int mm_answer_bsdauthrespond(int, Buffer *);
@@ -213,6 +216,9 @@ struct mon_table mon_dispatch_proto20[] 
     {MONITOR_REQ_SIGN, MON_ONCE, mm_answer_sign},
     {MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow},
     {MONITOR_REQ_AUTHSERV, MON_ONCE, mm_answer_authserv},
+#ifdef WITH_SELINUX
+    {MONITOR_REQ_AUTHROLE, MON_ONCE, mm_answer_authrole},
+#endif
     {MONITOR_REQ_AUTH2_READ_BANNER, MON_ONCE, mm_answer_auth2_read_banner},
     {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword},
 #ifdef USE_PAM
@@ -682,6 +688,9 @@ mm_answer_pwnamallow(int sock, Buffer *m
 	else {
 		/* Allow service/style information on the auth context */
 		monitor_permit(mon_dispatch, MONITOR_REQ_AUTHSERV, 1);
+#ifdef WITH_SELINUX
+		monitor_permit(mon_dispatch, MONITOR_REQ_AUTHROLE, 1);
+#endif
 		monitor_permit(mon_dispatch, MONITOR_REQ_AUTH2_READ_BANNER, 1);
 	}
 
@@ -726,6 +735,25 @@ mm_answer_authserv(int sock, Buffer *m)
 	return (0);
 }
 
+#ifdef WITH_SELINUX
+int
+mm_answer_authrole(int sock, Buffer *m)
+{
+	monitor_permit_authentications(1);
+
+	authctxt->role = buffer_get_string(m, NULL);
+	debug3("%s: role=%s",
+	    __func__, authctxt->role);
+
+	if (strlen(authctxt->role) == 0) {
+		xfree(authctxt->role);
+		authctxt->role = NULL;
+	}
+
+	return (0);
+}
+#endif
+
 int
 mm_answer_authpassword(int sock, Buffer *m)
 {
@@ -1104,7 +1132,7 @@ static int
 monitor_valid_userblob(u_char *data, u_int datalen)
 {
 	Buffer b;
-	char *p;
+	char *p, *r;
 	u_int len;
 	int fail = 0;
 
@@ -1130,6 +1158,8 @@ monitor_valid_userblob(u_char *data, u_i
 	if (buffer_get_char(&b) != SSH2_MSG_USERAUTH_REQUEST)
 		fail++;
 	p = buffer_get_string(&b, NULL);
+	if ((r = strchr(p, '/')) != NULL)
+		*r = '\0';
 	if (strcmp(authctxt->user, p) != 0) {
 		logit("wrong user name passed to monitor: expected %s != %.100s",
 		    authctxt->user, p);
@@ -1161,7 +1191,7 @@ monitor_valid_hostbasedblob(u_char *data
     char *chost)
 {
 	Buffer b;
-	char *p;
+	char *p, *r;
 	u_int len;
 	int fail = 0;
 
@@ -1178,6 +1208,8 @@ monitor_valid_hostbasedblob(u_char *data
 	if (buffer_get_char(&b) != SSH2_MSG_USERAUTH_REQUEST)
 		fail++;
 	p = buffer_get_string(&b, NULL);
+	if ((r = strchr(p, '/')) != NULL)
+		*r = '\0';
 	if (strcmp(authctxt->user, p) != 0) {
 		logit("wrong user name passed to monitor: expected %s != %.100s",
 		    authctxt->user, p);
diff -up openssh-5.4p1/monitor.h.selinux openssh-5.4p1/monitor.h
--- openssh-5.4p1/monitor.h.selinux	2008-11-05 06:20:46.000000000 +0100
+++ openssh-5.4p1/monitor.h	2010-03-01 15:19:57.000000000 +0100
@@ -31,6 +31,9 @@
 enum monitor_reqtype {
 	MONITOR_REQ_MODULI, MONITOR_ANS_MODULI,
 	MONITOR_REQ_FREE, MONITOR_REQ_AUTHSERV,
+#ifdef WITH_SELINUX
+	MONITOR_REQ_AUTHROLE,
+#endif
 	MONITOR_REQ_SIGN, MONITOR_ANS_SIGN,
 	MONITOR_REQ_PWNAM, MONITOR_ANS_PWNAM,
 	MONITOR_REQ_AUTH2_READ_BANNER, MONITOR_ANS_AUTH2_READ_BANNER,
diff -up openssh-5.4p1/monitor_wrap.c.selinux openssh-5.4p1/monitor_wrap.c
--- openssh-5.4p1/monitor_wrap.c.selinux	2009-06-22 08:11:07.000000000 +0200
+++ openssh-5.4p1/monitor_wrap.c	2010-03-01 15:19:57.000000000 +0100
@@ -297,6 +297,25 @@ mm_inform_authserv(char *service, char *
 	buffer_free(&m);
 }
 
+/* Inform the privileged process about role */
+
+#ifdef WITH_SELINUX
+void
+mm_inform_authrole(char *role)
+{
+	Buffer m;
+
+	debug3("%s entering", __func__);
+
+	buffer_init(&m);
+	buffer_put_cstring(&m, role ? role : "");
+
+	mm_request_send(pmonitor->m_recvfd, MONITOR_REQ_AUTHROLE, &m);
+
+	buffer_free(&m);
+}
+#endif
+
 /* Do the password authentication */
 int
 mm_auth_password(Authctxt *authctxt, char *password)
diff -up openssh-5.4p1/monitor_wrap.h.selinux openssh-5.4p1/monitor_wrap.h
--- openssh-5.4p1/monitor_wrap.h.selinux	2009-03-05 14:58:22.000000000 +0100
+++ openssh-5.4p1/monitor_wrap.h	2010-03-01 15:19:57.000000000 +0100
@@ -41,6 +41,9 @@ int mm_is_monitor(void);
 DH *mm_choose_dh(int, int, int);
 int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int);
 void mm_inform_authserv(char *, char *);
+#ifdef WITH_SELINUX
+void mm_inform_authrole(char *);
+#endif
 struct passwd *mm_getpwnamallow(const char *);
 char *mm_auth2_read_banner(void);
 int mm_auth_password(struct Authctxt *, char *);
diff -up openssh-5.4p1/openbsd-compat/port-linux.c.selinux openssh-5.4p1/openbsd-compat/port-linux.c
--- openssh-5.4p1/openbsd-compat/port-linux.c.selinux	2010-03-01 05:52:50.000000000 +0100
+++ openssh-5.4p1/openbsd-compat/port-linux.c	2010-03-01 15:22:19.000000000 +0100
@@ -32,12 +32,17 @@
 #include "log.h"
 #include "xmalloc.h"
 #include "port-linux.h"
+#include "key.h"
+#include "hostfile.h"
+#include "auth.h"
 
 #ifdef WITH_SELINUX
 #include <selinux/selinux.h>
 #include <selinux/flask.h>
 #include <selinux/get_context_list.h>
 
+extern Authctxt *the_authctxt;
+
 /* Wrapper around is_selinux_enabled() to log its return value once only */
 int
 ssh_selinux_enabled(void)
@@ -56,23 +61,36 @@ ssh_selinux_enabled(void)
 static security_context_t
 ssh_selinux_getctxbyname(char *pwname)
 {
-	security_context_t sc;
-	char *sename = NULL, *lvl = NULL;
-	int r;
+	security_context_t sc = NULL;
+	char *sename, *lvl;
+	char *role = NULL;
+	int r = 0;
 
+	if (the_authctxt) 
+		role=the_authctxt->role;
 #ifdef HAVE_GETSEUSERBYNAME
-	if (getseuserbyname(pwname, &sename, &lvl) != 0)
-		return NULL;
+	if ((r=getseuserbyname(pwname, &sename, &lvl)) != 0) {
+		sename = NULL;
+		lvl = NULL;
+	}
 #else
 	sename = pwname;
 	lvl = NULL;
 #endif
 
+	if (r == 0) {
 #ifdef HAVE_GET_DEFAULT_CONTEXT_WITH_LEVEL
-	r = get_default_context_with_level(sename, lvl, NULL, &sc);
+		if (role != NULL && role[0])
+			r = get_default_context_with_rolelevel(sename, role, lvl, NULL, &sc);
+		else
+			r = get_default_context_with_level(sename, lvl, NULL, &sc);
 #else
-	r = get_default_context(sename, NULL, &sc);
+		if (role != NULL && role[0])
+			r = get_default_context_with_role(sename, role, NULL, &sc);
+		else
+			r = get_default_context(sename, NULL, &sc);
 #endif
+	}
 
 	if (r != 0) {
 		switch (security_getenforce()) {


Index: openssh.spec
===================================================================
RCS file: /cvs/pkgs/rpms/openssh/devel/openssh.spec,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -p -r1.193 -r1.194
--- openssh.spec	15 Feb 2010 12:20:04 -0000	1.193
+++ openssh.spec	3 Mar 2010 09:01:20 -0000	1.194
@@ -27,7 +27,8 @@
 %define libedit 1
 
 # Do we want NSS tokens support
-%define nss 1
+#NSS support is broken from 5.4p1
+%define nss 0
 
 # Whether or not /sbin/nologin exists.
 %define nologin 1
@@ -68,10 +69,10 @@
 
 Summary: An open source implementation of SSH protocol versions 1 and 2
 Name: openssh
-Version: 5.3p1
+Version: 5.4p1
 # Do not rewind release to 1 on version upgrades unless the pam_ssh_agent_auth
 # is updated as well.
-Release: 22%{?dist}%{?rescue_rel}
+Release: 0.snap20100302.1%{?dist}%{?rescue_rel}
 URL: http://www.openssh.com/portable.html
 #URL1: http://pamsshagentauth.sourceforge.net
 #Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
@@ -79,39 +80,37 @@ URL: http://www.openssh.com/portable.htm
 # This package differs from the upstream OpenSSH tarball in that
 # the ACSS cipher is removed by running openssh-nukeacss.sh in
 # the unpacked source directory.
-Source0: openssh-%{version}-noacss.tar.bz2
+Source0: openssh-%{version}-snap20100302-noacss.tar.bz2
 Source1: openssh-nukeacss.sh
 Source2: sshd.pam
 Source3: sshd.init
 Source4: http://prdownloads.sourceforge.net/pamsshagentauth/pam_ssh_agent_auth/pam_ssh_agent_auth-%{pam_ssh_agent_ver}.tar.bz2
 Source5: pam_ssh_agent-rmheaders
-Patch0: openssh-5.2p1-redhat.patch
+Patch0: openssh-5.4p1-redhat.patch
 Patch2: openssh-5.3p1-skip-initial.patch
 Patch4: openssh-5.2p1-vendor.patch
-Patch5: openssh-5.2p1-engine.patch
 Patch10: pam_ssh_agent_auth-0.9-build.patch
-Patch12: openssh-5.2p1-selinux.patch
-Patch13: openssh-5.3p1-mls.patch
+Patch12: openssh-5.4p1-selinux.patch
+Patch13: openssh-5.4p1-mls.patch
 Patch16: openssh-5.3p1-audit.patch
-Patch18: openssh-5.0p1-pam_selinux.patch
-Patch19: openssh-5.2p1-sesftp.patch
-Patch22: openssh-3.9p1-askpass-keep-above.patch
+Patch18: openssh-5.4p1-pam_selinux.patch
 Patch24: openssh-4.3p1-fromto-remote.patch
 Patch27: openssh-5.1p1-log-in-chroot.patch
 Patch30: openssh-4.0p1-exit-deadlock.patch
 Patch35: openssh-5.1p1-askpass-progress.patch
 Patch38: openssh-4.3p2-askpass-grab-info.patch
+#??? - 201594
 Patch39: openssh-4.3p2-no-v6only.patch
 Patch44: openssh-5.2p1-allow-ip-opts.patch
 Patch49: openssh-4.3p2-gssapi-canohost.patch
-Patch51: openssh-5.3p1-nss-keys.patch
-Patch55: openssh-5.1p1-cloexec.patch
+#???
+Patch51: openssh-5.4p1-nss-keys.patch
 Patch62: openssh-5.1p1-scp-manpage.patch
-Patch65: openssh-5.3p1-fips.patch
+Patch65: openssh-5.4p1-fips.patch
 Patch69: openssh-5.3p1-selabel.patch
 Patch71: openssh-5.2p1-edns.patch
-Patch72: openssh-5.3p1-pka.patch
-Patch73: openssh-5.3p1-gsskex.patch
+Patch72: openssh-5.4p1-pka.patch
+Patch73: openssh-5.4p1-gsskex.patch
 Patch74: openssh-5.3p1-randclean.patch
 Patch75: openssh-5.3p1-dso.patch
 
@@ -189,6 +188,7 @@ Provides: openssh-askpass-gnome
 Summary: PAM module for authentication with ssh-agent
 Group: System Environment/Base
 Version: %{pam_ssh_agent_ver}
+Release: 23%{?dist}%{?rescue_rel}
 License: BSD
 
 %description
@@ -234,7 +234,6 @@ The module is most useful for su and sud
 %patch0 -p1 -b .redhat
 %patch2 -p1 -b .skip-initial
 %patch4 -p1 -b .vendor
-%patch5 -p1 -b .engine
 
 %if %{pam_ssh_agent}
 pushd pam_ssh_agent_auth-%{pam_ssh_agent_ver}
@@ -250,20 +249,17 @@ popd
 %patch13 -p1 -b .mls
 %patch16 -p1 -b .audit
 %patch18 -p1 -b .pam_selinux
-%patch19 -p1 -b .sesftp
 %endif
 
-%patch22 -p1 -b .keep-above
 %patch24 -p1 -b .fromto-remote
 %patch27 -p1 -b .log-chroot
 %patch30 -p1 -b .exit-deadlock
 %patch35 -p1 -b .progress
 %patch38 -p1 -b .grab-info
-%patch39 -p1 -b .no-v6only
+#???%patch39 -p1 -b .no-v6only
 %patch44 -p1 -b .ip-opts
 %patch49 -p1 -b .canohost
-%patch51 -p1 -b .nss-keys
-%patch55 -p1 -b .cloexec
+#???%patch51 -p1 -b .nss-keys
 %patch62 -p1 -b .manpage
 %patch65 -p1 -b .fips
 %patch69 -p1 -b .selabel
@@ -316,6 +312,7 @@ fi
 	--disable-strip \
 	--without-zlib-version-check \
 	--with-ssl-engine \
+	--with-pka \
 %if %{nss}
 	--with-nss \
 %endif
@@ -489,11 +486,13 @@ fi
 %attr(0755,root,root) %{_bindir}/ssh-keyscan
 %attr(0755,root,root) %{_bindir}/sftp
 %attr(0755,root,root) %{_bindir}/ssh-copy-id
+%attr(0755,root,root) %{_libexecdir}/openssh/ssh-pkcs11-helper
 %attr(0644,root,root) %{_mandir}/man1/ssh-agent.1*
 %attr(0644,root,root) %{_mandir}/man1/ssh-add.1*
 %attr(0644,root,root) %{_mandir}/man1/ssh-keyscan.1*
 %attr(0644,root,root) %{_mandir}/man1/sftp.1*
 %attr(0644,root,root) %{_mandir}/man1/ssh-copy-id.1*
+%attr(0644,root,root) %{_mandir}/man8/ssh-pkcs11-helper.8*
 %endif
 
 %if ! %{rescue}
@@ -529,6 +528,9 @@ fi
 %endif
 
 %changelog
+* Wed Mar  3 2010 Jan F. Chadima <jchadima at redhat.com> - 5.4p1-0.snap20100302.1
+- Prepare update to 5.4p1
+
 * Mon Feb 15 2010 Jan F. Chadima <jchadima at redhat.com> - 5.3p1-22
 - ImplicitDSOLinking (#564824)
 


--- openssh-3.9p1-askpass-keep-above.patch DELETED ---


--- openssh-5.0p1-pam_selinux.patch DELETED ---


--- openssh-5.2p1-engine.patch DELETED ---


--- openssh-5.2p1-redhat.patch DELETED ---


--- openssh-5.2p1-selinux.patch DELETED ---


--- openssh-5.2p1-sesftp.patch DELETED ---


--- openssh-5.3p1-fips.patch DELETED ---


--- openssh-5.3p1-gsskex.patch DELETED ---


--- openssh-5.3p1-mls.patch DELETED ---


--- openssh-5.3p1-nss-keys.patch DELETED ---


--- openssh-5.3p1-pka.patch DELETED ---



More information about the scm-commits mailing list