tcpdump-4.9.2-12.1<>,T\iI/=„Ђ;ەxNnLw'7L!uomm,`@eU Ne[3?!\% ?tD'_X: 80$.fgϬqW , D>OZ (֠hCCa(һ~̪33)d5ݘaϸGAdysZq¬='>0;nWG\Sa:$XK5jL^ s*}t@ŀƶ:Dه "A>:S,?Sd   & !9?H x        $  < l   0H(89l:8FMGN HN< INl XNxYN\N ]N ^O=bOcP9dPePfPlPuP vQwR xR yR zS Ctcpdump4.9.212.1A Packet SnifferThis program can "read" all or only certain packets going over the ethernet. It can be used to debug specific network problems.\iIcloud120openSUSE Leap 42.3openSUSEBSD-3-Clausehttp://bugs.opensuse.orgProductivity/Networking/Diagnostichttp://www.tcpdump.org/linuxx86_64Sp :Hi $%>7STA큤\i@\iHYzYzYsYsYsYsYsYsYs\i@be3ce851c45e32adfb761626f650f95c0dc23aefe022a1e3bdab9e47c58ef2b61c8d89f5f90cab146d069f0f305d836e1d4b0366557951c84a94fabe3529f867d0b9d69d7e1786a745e778cb3c83b8a4f62c99424d4bde287c842a1dc9d33cec2d2f4c9ef37a9ff6addd6f0b55acf1d204eb6463bab3266110142040ae9fa63ca7753832551077724d0c8386ce10699340dff1d07ccc831575cc15425b683576README.mdrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootroottcpdump-4.9.2-12.1.src.rpmtcpdumptcpdump(x86-64)@@@@@@@@ @@   libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libcrypto.so.1.0.0()(64bit)libpcaplibpcap.so.1()(64bit)libsmi.so.2()(64bit)rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)1.8.13.0.4-14.0-14.4.6-14.11.2\ @Y@Yw2X@W5W@VU<@U0U @U@TԬT@TS@RH@R2@R0[@O#O@ONwK"@Pedro Monreal Gonzalez pmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comvcizek@suse.comro@suse.debg@suse.comastieger@suse.comastieger@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.dereddwarf@opensuse.orgjslaby@suse.dejslaby@suse.depuzel@suse.comvcizek@suse.compuzel@novell.com- Security fix [bsc#1117267, CVE-2018-19519] * Buffer overread in print-hncp.c:print_prefix. * Added patch tcpdump-CVE-2018-19519.patch- Update to version 4.9.2 [bsc#1057247] * Security fixes: - CVE-2017-11108 segfault in STP decoder - Segfault in ESP decoder with OpenSSL 1.1 - CVE-2017-11543 buffer overflow in SLIP decoder - CVE-2017-13011 buffer overflow in bittok2str_internal() - CVE-2017-12989 infinite loop in the RESP parser - CVE-2017-12990 infinite loop in the ISAKMP parser - CVE-2017-12995 infinite loop in the DNS parser - CVE-2017-12997 infinite loop in the LLDP parser - CVE-2017-11541 buffer over-read in safeputs() - CVE-2017-11542 buffer over-read in PIMv1 decoder - CVE-2017-12893 buffer over-read in the SMB/CIFS parser - CVE-2017-12894 buffer over-read in several protocol parsers - CVE-2017-12895 buffer over-read in the ICMP parser - CVE-2017-12896 buffer over-read in the ISAKMP parser - CVE-2017-12897 buffer over-read in the ISO CLNS parser - CVE-2017-12898 buffer over-read in the NFS parser - CVE-2017-12899 buffer over-read in the DECnet parser - CVE-2017-12900 buffer over-read in the in several protocol parsers - CVE-2017-12901 buffer over-read in the EIGRP parser - CVE-2017-12902 buffer over-read in the Zephyr parser - CVE-2017-12985 buffer over-read in the IPv6 parser - CVE-2017-12986 buffer over-read in the IPv6 routing header parser - CVE-2017-12987 buffer over-read in the 802.11 parser - CVE-2017-12988 buffer over-read in the telnet parser - CVE-2017-12991 buffer over-read in the BGP parser - CVE-2017-12992 buffer over-read in the RIPng parser - CVE-2017-12993 buffer over-read in the Juniper protocols parser - CVE-2017-12994 buffer over-read in the BGP parser - CVE-2017-12996 buffer over-read in the PIMv2 parser - CVE-2017-12998 buffer over-read in the IS-IS parser - CVE-2017-12999 buffer over-read in the IS-IS parser - CVE-2017-13000 buffer over-read in the IEEE 802.15.4 parser - CVE-2017-13001 buffer over-read in the NFS parser - CVE-2017-13002 buffer over-read in the AODV parser - CVE-2017-13003 buffer over-read in the LMP parser - CVE-2017-13004 buffer over-read in the Juniper protocols parser - CVE-2017-13005 buffer over-read in the NFS parser - CVE-2017-13006 buffer over-read in the L2TP parser - CVE-2017-13007 buffer over-read in the Apple PKTAP parser - CVE-2017-13008 buffer over-read in the IEEE 802.11 parser - CVE-2017-13009 buffer over-read in the IPv6 mobility parser - CVE-2017-13010 buffer over-read in the BEEP parser - CVE-2017-13012 buffer over-read in the ICMP parser - CVE-2017-13013 buffer over-read in the ARP parser - CVE-2017-13014 buffer over-read in the White Board protocol parser - CVE-2017-13015 buffer over-read in the EAP parser - CVE-2017-13016 buffer over-read in the ISO ES-IS parser - CVE-2017-13017 buffer over-read in the DHCPv6 parser - CVE-2017-13018 buffer over-read in the PGM parser - CVE-2017-13019 buffer over-read in the PGM parser - CVE-2017-13020 buffer over-read in the VTP parser - CVE-2017-13021 buffer over-read in the ICMPv6 parser - CVE-2017-13022 buffer over-read in the IP parser - CVE-2017-13023 buffer over-read in the IPv6 mobility parser - CVE-2017-13024 buffer over-read in the IPv6 mobility parser - CVE-2017-13025 buffer over-read in the IPv6 mobility parser - CVE-2017-13026 buffer over-read in the ISO IS-IS parser - CVE-2017-13027 buffer over-read in the LLDP parser - CVE-2017-13028 buffer over-read in the BOOTP parser - CVE-2017-13029 buffer over-read in the PPP parser - CVE-2017-13030 buffer over-read in the PIM parser - CVE-2017-13031 buffer over-read in the IPv6 fragmentation header parser - CVE-2017-13032 buffer over-read in the RADIUS parser - CVE-2017-13033 buffer over-read in the VTP parser - CVE-2017-13034 buffer over-read in the PGM parser - CVE-2017-13035 buffer over-read in the ISO IS-IS parser - CVE-2017-13036 buffer over-read in the OSPFv3 parser - CVE-2017-13037 buffer over-read in the IP parser - CVE-2017-13038 buffer over-read in the PPP parser - CVE-2017-13039 buffer over-read in the ISAKMP parser - CVE-2017-13040 buffer over-read in the MPTCP parser - CVE-2017-13041 buffer over-read in the ICMPv6 parser - CVE-2017-13042 buffer over-read in the HNCP parser - CVE-2017-13043 buffer over-read in the BGP parser - CVE-2017-13044 buffer over-read in the HNCP parser - CVE-2017-13045 buffer over-read in the VQP parser - CVE-2017-13046 buffer over-read in the BGP parser - CVE-2017-13047 buffer over-read in the ISO ES-IS parser - CVE-2017-13048 buffer over-read in the RSVP parser - CVE-2017-13049 buffer over-read in the Rx protocol parser - CVE-2017-13050 buffer over-read in the RPKI-Router parser - CVE-2017-13051 buffer over-read in the RSVP parser - CVE-2017-13052 buffer over-read in the CFM parser - CVE-2017-13053 buffer over-read in the BGP parser - CVE-2017-13054 buffer over-read in the LLDP parser - CVE-2017-13055 buffer over-read in the ISO IS-IS parser - CVE-2017-13687 buffer over-read in the Cisco HDLC parser - CVE-2017-13688 buffer over-read in the OLSR parser - CVE-2017-13689 buffer over-read in the IKEv1 parser - CVE-2017-13690 buffer over-read in the IKEv2 parser - CVE-2017-13725 buffer over-read in the IPv6 routing header parser * Dropped patch tcpdump-4.9.0-CVE-2017-11108.patch- Security fix: * Crafted input allows remote DoS [CVE-2017-11108, bsc#1047873] * Added patch tcpdump-4.9.0-CVE-2017-11108.patch- version update to 4.9.0 bsc#1020940 * CVE-2016-7922 The AH parser has a buffer overflow * CVE-2016-7923 The ARP parser has a buffer overflow * CVE-2016-7924 The ATM parser has a buffer overflow * CVE-2016-7925 The compressed SLIP parser has a buffer overflow * CVE-2016-7926 The Ethernet parser has a buffer overflow * CVE-2016-7927 The IEEE 802.11 parser has a buffer overflow * CVE-2016-7928 The IPComp parser has a buffer overflow * CVE-2016-7929 The Juniper PPPoE ATM parser has a buffer overflow * CVE-2016-7930 The LLC parser has a buffer overflow * CVE-2016-7931 The MPLS parser has a buffer overflow * CVE-2016-7932 The PIM parser has a buffer overflow * CVE-2016-7933 The PPP parser has a buffer overflow * CVE-2016-7934 The RTCP parser has a buffer overflow * CVE-2016-7935 The RTP parser has a buffer overflow * CVE-2016-7936 The UDP parser has a buffer overflow * CVE-2016-7937 The VAT parser has a buffer overflow * CVE-2016-7938 The ZeroMQ parser has an integer overflow * CVE-2016-7939 The GRE parser has a buffer overflow * CVE-2016-7940 The STP parser has a buffer overflow * CVE-2016-7973 The AppleTalk parser has a buffer overflow * CVE-2016-7974 The IP parser has a buffer overflow * CVE-2016-7975 The TCP parser has a buffer overflow * CVE-2016-7983 The BOOTP parser has a buffer overflow * CVE-2016-7984 The TFTP parser has a buffer overflow * CVE-2016-7985 The CALM FAST parser has a buffer overflow * CVE-2016-7986 The GeoNetworking parser has a buffer overflow * CVE-2016-7992 The Classical IP over ATM parser has a buffer overflow * CVE-2016-7993 Buffer overflow in protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM) * CVE-2016-8574 The FRF.15 parser has a buffer overflow * CVE-2016-8575 The Q.933 parser has a buffer overflow * CVE-2017-5202 The ISO CLNS parser has a buffer overflow * CVE-2017-5203 The BOOTP parser has a buffer overflow * CVE-2017-5204 The IPv6 parser has a buffer overflow * CVE-2017-5205 The ISAKMP parser has a buffer overflow * CVE-2017-5341 The OTV parser has a buffer overflow * CVE-2017-5342 Buffer overflow in protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) * CVE-2017-5482 The Q.933 parser has a buffer overflow * CVE-2017-5483 The SNMP parser has a buffer overflow * CVE-2017-5484 The ATM parser has a buffer overflow * CVE-2017-5485 The ISO CLNS parser has a buffer overflow * CVE-2017-5486 The ISO CLNS parser has a buffer overflow- Don't install the versioned binary (bsc#944294)- fix filelist to fix build on s390/s390x- correctly reference SOURCE1 during installation for s390x- tcpdump 4.7.4: * PPKI to Router Protocol: Fix Segmentation Faults and other problems * RPKI to Router Protocol: print strings with fn_printn() * wb: fix some bounds checks (previously patched in, removed CVE-2015-3138.patch)- fix a DoS vulnerability in print-wb.c CVE-2015-3138 [boo#927637] adding CVE-2015-3138.patch- security update: * CVE-2015-0261: issues with IPv6 mobility printer (bnc#922220) * CVE-2014-9140: issue with PPP printer (bnc#923142) * CVE-2015-2155: issue with force printer (bnc#922223) * CVE-2015-2154: issue with ethernet printer (bnc#922222) * CVE-2015-2153: issue with tcp printer (bnc#922221) - added patches: * tcpdump-CVE-2014-9140.patch * 0002-test-case-files-for-CVE-2015-2153-2154-2155.patch * 0003-test-case-for-cve2015-0261-corrupted-IPv6-mobility-h.patch- update to 4.7.3 - fixes four security bugs: * CVE-2015-0261 - IPv6 mobility printer (bnc#922220) * CVE-2015-2153 - tcp printer (bnc#922221) * CVE-2015-2154 - ethernet printer (bnc#922222) * CVE-2015-2155 - force printer (bnc#922223) - drop patches with security fixes (upstream): * tcpdump-CVE-2014-8767.patch * tcpdump-CVE-2014-8768.patch * tcpdump-CVE-2014-8769.patch * 0001-Clean-up-error-message-printing.patch- fix CVE-2014-8767 (bnc#905870) * denial of service in verbose mode using malformed OLSR payload * added tcpdump-CVE-2014-8767.patch - fix CVE-2014-8768 (bnc#905871) * denial of service in verbose mode using malformed Geonet payload * added tcpdump-CVE-2014-8768.patch - fix CVE-2014-8769 (bnc#905872) * unreliable output using malformed AOVD payload * added tcpdump-CVE-2014-8769.patch * added 0001-Clean-up-error-message-printing.patch- fix CVE-2014-8767 (bnc#905870) * denial of service in verbose mode using malformed OLSR payload * added tcpdump-CVE-2014-8767.patch - fix CVE-2014-8768 (bnc#905871) * denial of service in verbose mode using malformed Geonet payload * added tcpdump-CVE-2014-8768.patch - fix CVE-2014-8769 (bnc#905872) * unreliable output using malformed AOVD payload * added tcpdump-CVE-2014-8769.patch * added 0001-Clean-up-error-message-printing.patch- tcpdump 4.6.2: * fix out-of-source-tree builds: find libpcap that is out of source * better configure check for libsmi- tcpdump 4.6.1: * add a short option '#', same as long option '--number' - includes changes from 4.6.0: * all of tcpdump is now using the new "NDO" code base * nflog, mobile, forces, pptp, AODV, AHCP, IPv6, OSPFv4, RPL, DHCPv6 enhancements/fixes * M3UA decode added. * many new test cases: 82 in 4.5.1 to 133 in 4.6.0 * cleaned up some unnecessary header files * Added bittok2str(). * a number of unaligned access faults fixed * -A flag does not consider CR to be printable anymore * fx.lebail took over coverity baby sitting * default snapshot size increased to 256K for accomodate USB captures - includes changes from 4.5.2: * man page fix - add build and runtime libpcap minimum version - remove old patches, thus making package patchless: tcpdump-4.0.0-prototypes.patch tcpdump-4.0.0-aliasing.patch - run spec cleaner on spec file - remove gpg-offline, now part of source validator - remove versioned binary - run regression tests- update to 4.5.1 Version 4.5.0 revised for non-code related edits - some NFSv4 fixes for printing - fix printing of unknown TCP options, and tcp fast-open - fixes for syslog parser - some gcc-version-specific flag tuning - improvements to babel printing - add OpenFlow 1.0 (no SSL) and test cases - GeoNet printer. - added STBC Rx support - improvements to DHCPv6 decoder - clarify which autoconf is needed - Point users to the the-tcpdump-group repository on GitHub rather than the mcr repository - Add MSDP printer. - Fixed IPv6 check on Solaris and other OSes requiring extra networking libraries. - Add support for VXLAN (draft-mahalingam-dutt-dcops-vxlan-03), and add "vxlan" as an option for -T. - Add support for OTV (draft-hasmit-otv-04). fixes for DLT_IEEE802_11_RADIO datalink types - added MPTCP decoder- verify source signature- update to 4.4.0 - RPKI-RTR (RFC6810) is now official (TCP Port 323) - Fix detection of OpenSSL libcrypto. - Add DNSSL (RFC6106) support. - Add "radius" as an option for -T. - Update Action codes for handle_action function according to 802.11s amendment. - Decode DHCPv6 AFTR-Name option (RFC6334). - Updates for Babel. - Fix printing of infinite lifetime in ICMPv6. - Added support for SPB, SPBM Service Identifier, and Unicast Address sub-TLV in ISIS. - Decode RIPv2 authentication up to RFC4822. - Fix RIP Request/full table decoding issues. - On Linux systems with cap-ng.h, drop root privileges using Linux Capabilities. - Add support for reading multiple files.- remove tcpdump-4.0.0-uninitialized.patch, it's solved differently- update to 4.3.0 - fixes for forces: SPARSE data (per RFC 5810) - some more test cases added - updates to documentation on -l, -U and -w flags. - Fix printing of BGP optional headers. - Tried to include DLT_PFSYNC support, failed due to headers required. - added TIPC support. - Fix LLDP Network Policy bit definitions. - fixes for IGMPv3's Max Response Time: it is in units of 0.1 second. - SIGUSR1 can be used rather than SIGINFO for stats - permit -n flag to affect print-ip for protocol numbers - ND_OPT_ADVINTERVAL is in milliseconds, not seconds - Teach PPPoE parser about RFC 4638- update to 4.2.1 - Only build the Babel printer if IPv6 is enabled. - Support Babel on port 6696 as well as 6697. - Include ppi.h in release tarball. - Include all the test files in the release tarball, and don't "include" test files that no longer exist. - Don't assume we have - check for it. - Support "-T carp" as a way of dissecting IP protocol 112 as CARP rather than VRRP. - Support Hilscher NetAnalyzer link-layer header format. - Constify some pointers and fix compiler warnings. - Get rid of never-true test. - Fix an unintended fall-through in a case statement in the ARP printer. - Fix several cases where sizeof(sizeof(XXX)) was used when just sizeof(XXX) was intended. - Make stricter sanity checks in the ES-IS printer. - Get rid of some GCCisms that caused builds to fail with compilers that don't support them. - Fix typo in man page. - Added length checks to Babel printer. - drop tcpdump-4.2.0-ppi.patch (upstream)- update to 4.2.0 * patch that adds missing ppi.h * Summary for 4.2.0 - merged 802.15.4 decoder from Dmitry Eremin-Solenikov - updates to forces for new port numbers - Use "-H", not "-h", for the 802.11s option. (-h always help) - Better ICMPv6 checksum handling. - add support for the RPKI/Router Protocol, per -ietf-sidr-rpki-rtr-12 - get rid of uuencoded pcap test files, git can do binary. - sFlow changes for 64-bit counters. - fixes for PPI packet header handling and printing. - Add DCB Exchange protocol (DCBX) version 1.01. - Babel dissector, from Juliusz Chroboczek and Grégoire Henry. - improvements to radiotap for rate values > 127. - Many improvements to ForCES decode, including fix SCTP TML port - updated RPL type code to RPL-17 draft - Improve printout of DHCPv6 options. - added support and test case for QinQ (802.1q VLAN) packets - Handle DLT_IEEE802_15_4_NOFCS like DLT_IEEE802_15_4. - Build fixes for Sparc and other machines with alignment restrictions. - Merged changes from Debian package. - PGM: Add ACK decoding and add PGMCC DATA and FEEDBACK options. - Build fixes for OSX (Snow Leopard and others) - Add support for IEEE 802.15.4 packets * Summary for 4.1.2 tcpdump release - If -U is specified, flush the file after creating it, so it's not zero-length - Fix TCP flags output description, and some typoes, in the man page - Add a -h flag, and only attempt to recognize 802.11s mesh headers if it's set - When printing the link-layer type list, send *all* output to stderr - Include the CFLAGS setting when configure was run in the compiler flags- update to tcpdump-4.1.1 * Don't blow up if a zero-length link-layer address is passed to linkaddr_string() * Fix printing of MAC addresses for VLAN frames with a length field * Add some additional bounds checks and use the EXTRACT_ macros more * Add a -b flag to print the AS number in BGP packets in ASDOT notation rather than ASPLAIN notation * Add ICMPv6 RFC 5006 support * Decode the access flags in NFS access requests * Handle the new DLT_ for memory-mapped USB captures on Linux * Make the default snapshot (-s) the maximum * Print name of device (when -L is used) * Print new TCP flags * Add support for RPL DIO * Add support for TCP User Timeout (UTO) * Add support for non-standard Ethertypes used by 3com PPPoE gear * Add support for 802.11n and 802.11s * Add support for Transparent Ethernet Bridge ethertype in GRE * Add 4 byte AS support for BGP printer * Add support for the MDT SAFI 66 BG printer * Add basic IPv6 support to print-olsr * Add USB printer * Add printer for ForCES * Handle frames with an FCS * Handle 802.11n Control Wrapper, Block Acq Req and Block Ack frames * Fix TCP sequence number printing * Report 802.2 packets as 802.2 instead of 802.3 - drop tcpdump-4.0.0-autoconf.patch (not needed with new autoconf) - compile with -fno-strict-aliasingcloud120 1545038153 4.9.2-12.14.9.2-12.1tcpdumptcpdumpCHANGESCREDITSLICENSEREADMEREADME.mdatime.awkpacketdat.awksend-ack.awkstime.awktcpdump.1.gz/usr/sbin//usr/share/doc/packages//usr/share/doc/packages/tcpdump//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9322/openSUSE_Leap_42.3_Update/7a1058ac68816b7bb2b98883c9b6abb4-tcpdump.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.0.0, BuildID[sha1]=44d9cbc142b7e689b12c4e93328ceeac1468845d, strippeddirectoryUTF-8 Unicode textASCII textawk or perl script, ASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) RRRRRRRR R RVVV'm=Oз?`]"k%Q`x`סD#6fOj AfL˭DtX8*ݠo`s 8nGw1,^A}{><`+bI20vAmcގ J[/#zP᫈Q8nigZ.Z_{Hs? ?Ϣ3 `o7Ϡ~2dA/c;s/^i⯮ĭA 2C̾d=P;z8Bz>MAz^hu#†f>uwҺE&#'E Õn?XV#杈ʚ(D_nj_/㌿,iwńU9wUk&]$>t?cPUJyJ*O x,NBK<:Fikpʃ W_;TJzE\WoI][*Λ&>Z76Zx*n _Y(]( kfM,چU9PдOP*C{3/\g^=t_Ef-jД}PNLBRZdQ{eҵivSog6p1zfm{D2od\"l:s)bI;V ?/c"(r?JUKؙz&e]la }=cHUFK5jbKڗg_JH<)X y&c [@ 7ɱ_i$Ҍo(oFZb\?rOꤨ9xKdTwf4Sj@PP e)[\bS#fYheGeq^_,?2 Iq~jqYOx@w;hM /u& b?w9?{hw%Fo\{?(yS)ǿ*g8g|N KV몐UiϽ"]1-z׮ ΀NM S"-# 9Cû"iYv`K@x6PaL53^}'5Ɋ'e m?ʾR}CL6E$E$.5+B'ܪ)}0Z:xZL3Ӟc4Zbi2`OU3E°j^v6_ ۩ఫ!T揢f,Yaמϗ{o t a!X1k<U8;~+Drdҿ>5z~.'q uM pdH_ҍh7iK"&XCbc\巜,<- s<1=eo:ӁX3Kb ="oj[HLY~Gc *Yas(I,mABɺ&uUs9DOHtV&wKލb Q<@L΅QzM?W[ull4VeˉV~8m_'-U!5JI%E9E>ζfؕ%g-gSoÏ{yq7K B*;[]է`7U2k&6i*ɯ,ҀP&w=W=u彞9kWMºٱO9O1hB< YѠ 6.z^5BR A"EFEӓ`h4|4@4upBXE%XUτ)v8;UI$S$r]/fA["HlMs58='ogŷbb>'{71P/mqlPMZϧl[ >:8HsH&4C{O;2%*$D&5Z,}Ɂ¸9=Z~ a"ð4Y6䄆ZT#eXQ2HF}TI ~hq'<@UjEW=1<=[J; -yWQ!ZurEy_\^+ϝHc V?РZ,yMS]|?g"X {\jP,">RdK54F<->( Xl;Cx`H<O.–f]o aRdbF0WV-G zH17L k}geN'՛FJ;HR2ػOߣb%( !3 uN(KMaUC 5d^9Xix/<7d!2Fxþq/x6 31gaI k">["A9|Z_R(O#uJj-9' pJdjS<2:e - wo*|sqH}yggbq8?e{c&Uf [gt?a5G|x\7п +n"‹X&S܁ U6mm/i| bRWA7Ge{Nl~a.$+7yB&F&wT Q5 β}"Jg ! ӎX26G?_80#۵&/S:v,eXوo⯚3 h՝{`ypJ:ݤK(-vd:Dbx?us>OR/nkdT*)Je 1{7˧6NJɟ%nצkj?ifuʰgU:10/p$&AaWN 䉘HpP>fRnz<>z\.aOe{ʵGV(I;ϕ_Mxjp`;Ձz~ 40Gxhz4$V=r(4 >XLe_ggVMP)ߘRU"nQ P~Q @jT!EgJq**>NBvvZcu-{Xᑬk0"ߋʿ{vdwe90=Qlr^IտxԖ1Nͣ\?Z= U}*GJzxGկ鸛^@ѦFDz߈ _kUڊ~:`L0윜s7W4\.hR!jZe_VM˿ \i$͓Pv2#D$`6;=6!h`#N)|d)WX=4DEeZk@紀<~R)M4.Cd"ŮGgՕ;r_;[iINsEMcB.XZ=3)<ok'ͧ8scAк!خWWm&v~jijLsbJ_"*헫e bl”BfcbE8\N6~#9/MJJao)ҡ3~Xh7|Zg;Xbw`a?U5&=OLJL>cSp/v)j j O ~*sn#Bkrcϋ91Qc˶`NQUN!a^ʿ MṳwJ nh%2;K=;; Puq[ @ٵ~˛@J?Ok#JN,eni,e= @eib@A CHB7zSQ2Rn}oFpu@P,c*Y_lLrƳ(feT٫@4[8zK6!5(Xjz؀\m$Sd*"rmWu }8A7x;3c^B({RǕ ,06/蜡N/H-Rأh$8ʵM7y"~$ 7ӪYo`/>3?o@6m6T)n5t?0{C0F `pD~^[-w*$ =u*+cJ)BB=;T F_z=pJ ?@P1* Qp9]HvkS奜k r&ަV @"TY18$ dHë0╙[!Ns*b}Ð7{?K2=ۃT>bV3EAv؂ K^';kh^%ؼ[|Zz\:| S3xi9j@b::h9ȿD <]_"y~!BgA4:2g"A@F [nh0la~óA)5Fj0h}L6 *5I)ӯ L9l!x2:7 0A56x{B=V Jjp]uyP(QpukQO44j[U{$S!4 H;;zX1g:vpu"e[<4EײEw\])DG>@nLnU[3ఉ$r)CNZA ~"jB%>p'\Mk&mhA,=|?&;E|T$`=_<g\梄eTsÀۗZ@T~ACe.bHTO6̜LP>"!Єa-}^f{x$^JRJ%.+&GzA1[Rp~wh;Sv rC㢀!7^۱Z2u86X+F#?l+=g4,ᓴJK*פAš̝"C,^N ݈u rɊ~71tU-k!e^ O\g!Lw ^%.W|CNtղw[96Tp@fW2d%w_G }J$c!OW=zƚnM^˛QT ІPN(- 3FSFŌ`;N\D=4 EՒM?bhaw V؅"&/mdW&H. 1'RuԧrxoşFD+B<$ 3/ObJ&]SW<iUC+^<\pCK#cp/$CM[|EN_쌄4J-R͕]XzQ,J#e |~vO?{EюK%؞ v&`@G [f|\Aܬp <>秸P?,1VAo?`Ï[;zap%.΅i K a[k]_!*=~<r/^0x+nQsԼOpMW:dwPx\A_84sd:m\>%*f+c;xEb)f"lJԞzJ"2TOfz'qu;G ?a;Tau~1Z.g_ZC"~/E%@ރB;Z=HQlGI7ݽȃTy':BwggE0\Kbh\K&BŃi?NVu":<_<7zLmsHp(41COE%gvHnǏti g9NvIʰN*)c'gy4Wr7ED7H> lW*z&=噥V3MtxwELOΡZUH]A|6F6tuo0%,*$-@#܊ ;au%=?OH:4y.@6M-ܷ"튉gп3"3Fڨrl8U H}5.h'CW]mP*tqRaZ柢fR*Am/]33 )U41h)X؛2-q6_2eGҨ\Ws*Oи˳;1`Hy&gNBQt()-Bӑ0.({\J<Ƴon\ 16%\wOJ3+v3PmLwǡR_q!m.?WHt R8SNdc7],6:… 8u@B Fl^o"OWXEƤײLN wl [KO(EDM#]Kn=rg΂ 'A ܊qsN/z 3V1,&/t3-k= S `(ŇPDs-3C~[Iٚց[29U`MDhߠ(~gJ:J-4h1gVܤ64:z'T}cr"O`tWE$(E-.xJi36{+#wr9ա&]pCc>MS(I)vdKX*^r _uQ"9;ײOH*Mj*\ٲ#[IMcN/"e YMC)C?mLsymTdZh%ҡ-DO?h >B.)cTW@wb Ĥojɳ+o?d2(FEKDx&e#?Z%#?7l&4Pt.ˀhkA5!+S:G;[LZl;2(k&xD'TzOj.4Si28Y"Ȯ1!"?ң FѺ&5!`^^2uJ@Z+e#m:h x+3,p(heg3 YK _'uOQ7q+:ow)<}t_2Fg >_w)R5Hul\Rä,L@$Qk{d@{k`e 4V۽3:u2Rc$@g[>~kkNXV?U ]Y%Q8PM SiԾ/dqXj p\ºWNfhPTu EwR"L;zH 0qagOCE2$BWq%>sߡk;W.2bɛF›wn,v*7-/9F }hv7Mz?5/ #~p*\0\fT E=)n5pQ8{ ΍x%)wX4MGsC,U-Vf ";!/=Im|Aty x/;2|U$ )O{>?EF!HCjdyRzB3k³gf 1 "W(hG`W7Zf@X<+pތW'K:JIೀVƧ4`zz*;4!<z ~B*́Md!7AZwأSaD^AF2:TS$fٚuaxA%Mzth\vX]k&e̸ֳw+t`ah3stLm>O%Rē9^QcqJZ9cۇf~j9Nhy)}s _ +diz4h 0Ӯ ,i; W;.ы0ƥBP03Zr#P QwA5mvM~S|ì" 9}J&hf~c 11j`'^`|]D^>.EvsCZ r;.-4HPҒHZX$\\)[z+n $a)KKܛ=}ys#YwsA Ž8||z^5cn(?Y1tVN ^O,\I:)xz0<07.+BaPJmO!iwܖ5vCk \!!X@D~2XʧRlBΨԵ0T?S.?B1% חY^`ʁxscՔZPfQKNͤhh|!~ øl|R !{O:t`u?~?#g v'܀QHy jLO*(6(ؓhsfц'9pUɽpߨu$]gwŰZuA'b;U-Z^ ^'Ũ W;䞛k,|nRy-+t*9R;PIP#^%5 $(3-fן>%5 ׉w%!aNrSХZAlX%v֯R]o O aT.%ͅ B}jY] o`~8>y*ʇŌڦn ËU!SEuz4M" P# tf, >BDLq̆r ?>\R{ ;&=n {fiR<0q^.kwGb> z4?`&FV0AV$3ftSpa+M;T^CR"#Pw#5 8H\d5tNX"n89MMϯCC4$']ac `j[F'tS m1/`mz @67q :WeA;ag]ƹM;BH5\Ou:;,.2n-m׭y=*'|a[/[4gzB b~1#AVm^+]ȤC0eo B~r&9g%_hGqY?& ߀P/%5|nðNxOlXjap_ 8)GUǣ:4k6__܀.†N2r VZ^d~NÔ]u[ ߢbX8#0ҳq'h98Pq3~zGl䓌þJɸ;!ZTWfSJy9}))IS]HFht?6>^h~H?rLb ,Zڼ'HDr? 2'w,,U_4a$+rɬPHvF 3co`Sj`BXNO({4YNS2ia)PҘNrGԭhtTEȰ <_wd@T71$Gz+Rox*`'$e+KU uc槅CZ<P~MMJqBKJ`b=)KlH]?Rb^^ǸƁ=WWb 䇩 pԊ |~O}ΝMBYOaҬ?ԡ Ǝ^}6>Dù3'@iT9WR [wUOڱ&Y u~܍VQ#{$T]H|$ zPZ{`MA)Qs ᪂M}x>?LZ9uyY U7aX{$|'`+WrK56NaU;,O 2(c $wo [dSucq069 4-+ڦC-Y=BûN,#{Y .ǰZ.{CK$m_ʟ;R?^Q:E!Aܠ֓CE \v8R0j?eS} Bj`o?8]#",;ƍ):^n;OU,S)0WFDҬo &bޝ'JLZũhˊc;dq8Rc]j̓;r?֎Ñ,KWFljt@9G?TcyN>dN9䔣[4:Rl!&h&.]MeJbtgWcsM;EdeZ$z^ѽKE)3a1ҵeKi?<<~>=^djWXd\xXW%je(O)7WH9 KLi`|? BԍdloХ yXQrja$oEH=>qեyVNvM[SLgu]II鸽 ܀wzyhe#z>nX욈bjaV-=䚔 yMQߴ-ؾdPQoH; bt֔>t/x^^l"+8ez0 Ql>aH=ei{ywp%L9HvpgW]MEep;3byB!50ɓb'b}GAZ`#iɂZ1>Ъ=!? Bᓹ3j R鎒}ś́U-jLpX.c~ i6Ǫ~d䡫99uBhɎ8܈ݤ/ K1*VRv䙚Y:<-_һp`r/t/S8S$Qci)WԖEsDe@mQWo'v}"1i[ڈۤA(uZJ(cfMa1ȜX2$[WQ_컐#Z(%hr@ h6G@m¦se\/^z(VjZ퓎V)C?.+L6AFRݮO*(BoG9ѐg^qFWbdiȀ͂yj%rB̦AJ?m!wԒ|d!ҟqCs=8C~n! Μ&YrKT=tB ͩRQL rl2:iADLk(ĆN i(i+z_8@}@d JS0Pr,,rM 32jЃ_ĄJt>mMTMۑXy[(Uza f$J39'p$(5;J `R%t{ QCe !h\lSH'.y!>gFhVKQTZ>ӷ#ÇoB(pu̫PEGmtYLRp%B緝28:7Wޫe}8X,TE# ߸fs]' A%G~ &e-TgVTSVLx8Ͼ;>I] TLxwBs|-ީE>پW`d*iBSO)]*fNϸX3+}A9"E 2bB$9A1+yO{T-fS^> 4JdS4ݖHrU B\"]LFRrtU\[BL9Zj̻q#g2^nL(6 ""ᆒ*IY-3R!p@R&MMy3؀Nd ^= B4$*#lpAny~TOyr$Nl+G`zz/irH۫qNLsP%"|`IRf&e~:edx)Bkk]kd/(=tլwQsOIyӰKE$}تm|3q>-ؑ%{(:i%Ki`*;WgYOg`RAKI?J&bl }:a_4^1f.0}`TTp}~فJ= O{G5||+خ^sg`@: gG}LO`9M50tC9 \Hi68j:ۂ<|4$d,xNGA8ig`p~{k}ٜ+_Gw# ʇh?NOj%_zrm̠ђw.ַ|o<XKͲ7UIeRfʆT~΄A§ 0w~Uѫ-Xr#Z"(" T\;Kשp6KQ@LV*bMI˄%{% A$5 黉%.L3umPj薏E^bQŠߎ'לCL=B냷Z ~`Z Bxjqs{|i|H܄dz d$N31P69oWRtxEaݮUa@lRgjf!IX RѲa<6$ ApO(N!QIO}Dz1?CO[!S<Su_e\z2rRu6Rjtuk [gh{>1+%S7{ *je?]u8}zv|;!mEM'ŮU2oQ}x`^gslrOS5(n̪+mtGcLc2.}H"L& 7R,M=N-b a0zN4<I+ @7<[(0Z >/|(zhscަf+{es )L؟HYLk1"@Ia44zP~$c>&oŲd*Z~ŅE49ЉC}n܄xk(ϗ"z7`˴Tg!]/gmYkHLM~A750Üi]EA-tYr9@`NIL0aay*RJ_ ف v/'agLKk,ky˪x>a[5\BR G\qɬFlb?X7mrRomM +#Q8Xoj.#A6Ӌ "~!wv[8bx- }pAqwkVO.և d;#UT;]n;S͢>x=2q_nKQq(:@Sf27F#S;Y✓Q'L%!MIuy9;,7կFJ^)LzCãpr{ xkWe17ܒ9.RU{sz)c ^ik{SU0H6mNm&\ nӇP/6v0 XdhH08-6_DAy ;{Y/2`o펔:s0No+ǧ4MX!a㍒} 'tbp3zKFދhd4629LMuU]2ƆVPb]xp:/sy5 Fg6qNCtL"Zz EhF ϪxG* 9<тUuP]G'box-odRzf{h"uΡj<,w=SnSU"úf{@G=Ux*M, U"A;ØWa3z]sސ7z 8F"}C=>G'{<ǹ:8fͅ2Blƣhf|yQN~Yߤrԟ@/P@t*#W,y;FQvqzۯ>X ~Sc_td[`^-t{hg'F EЈ@W6k29A?"!>;?Uhж b 9L'Q|qRKiۢ|Yj nruG󺍷)ư#YITAd42}ϔ4] F)5 6_,Y;`&^u MCnp^ﵐaKAn- 8>QaL9[f]w=M/kxs~lB k&iKt;T^Rjb.la\U;#^gr"gU3J55iI"r%n;@2'3^w b`ƹoUS q87o3]@ii@(s^!;R4-*b =[&%SV )?>}=W*~MXib/;[L1!{OY˘L:G+- +)am㺘\hVfΝpr9\ b4_=ļ<p:zz[W7 Y`_ÁgeXy G8m^AҀ~W = :@Mt=6d[L~/,䕈?C{6/ sAN.,ˑF;Wp):.,N復g) Lz4n:Rs TRiM=¥m%&[Rvh',Hʐ$ (%.*eh>fxcsV՝G!cL4x_\ 3^];]u6_.?ŀS`K׷UY8JC2x`imG[iȤ'Zkػ }A3l(t.Jf\%pvb>,HW9uW#+\Ky2X#I )&?JƪX q|3D yxM [R XV6H|ޗTAI{ 9A)i7H[63VLAc#[fu͉(']Q a"6:\i.u3 rQ1ZZt;a˚S7+Ay{'_WurG8^óN-nJ%!g,Jb.ϹnuR2@g;Xχ;LߟV^ޟ'ސ9&R\4{?B u]خ"F@[${clmb*ͷumkm*7u =p]ʒ?JXZ5Eq"X,(;r}OzpNlAh7_W8~)`Ys/PLn"6xژ"3^wHeV##_Eڏ< N3ezq뛖\(~gտߜ(Bɚ^y!=jƩiֳ-= IF+:k*^]9āT gi']3h` ?Q[ggC뻍Wbq!k`ZeTc%fP`tpI [RɴUP32cFUw:P*ݪѿn2 /%- 9B퇘4,|W:"(hإFj p\Hu{K%!u7RDsŝY5JG'Cђʅ T&"O(BX%&e#ytaaZ@p w%uu<5:-&qռ:yoِosrGJ#] 20{%CoWnKt2]A icK-aKn>h/ȓvW[4zjJ/QǨHI^y&f^ώ%Y,yldgh"? a6 zLK :i I5Ny5YK-kp 1BGӃ_<$X:@M3v\}M3ח|wf*\C)UVX_z Q5n¾5w'z%ꝛ!.ɨr%;U8bT~aćxZ7:80+(ӣ|feVK4B'!g%Sw!qyTek xHv$#b%7QHhVpe\,Ba _X;>GnM ˡy}@! ɑĭ*H|YB,="X]NC*;cIEWV趇㫆}R! ]^$c52?BQe$FgUc!W_b9ɆnW|{g 8h|kمKe?X_gr<-[Pb>L"iM$1E%zEYN dpozԥ3K̜"&V $nF>D {72XS"T"1= f -`ۙ5" U^0?‰h S([5?E0Q;jQyzDڜEOAe|Ǝ<-w]%r:4c/ՊRWB [67?ij]neP  H-*ts/b'jz8k%,rĤծ {JG^=]qM3L3P6$ CҶz󆘞W(ǓҢ<޺׽clVH՞pw ej"- KL;ʊ/ضN Hd5e+Ȭ5^ 78Nbqy!#% Г}zoIG;"5o6AOz^GCbnv6 `_~{N L~"T?tϢԺ_xHN;J&I:>ABOr&jB/('t l+F|i}p1>kthU g5Jl/dtT-tp Ca@ cFrZǂ0||K[e~7Tt64+Q;U PP+_(JM+`7qK.;VnLw8< AR8O 3(dvQ4.v{YGˤwʾ]\jTCz+J 1]^]]DJ4BflZr1dtNO2ڶZEP)1pw5S0NoO}h!pG*'痈s ƻK$);&MhZ;缎ÒfO)^<5jMcA2C^K5y֌~I7{A2Q?;w F,p+ ͔?vOCN Fw3+[b;əH =z^ytPS15@R6 6u^q]O)REEOmp$s:0ytMhy4&&eA>*fB HjU*ݘaL.A+Xއ[7Vqm+Fi&SX7:kB%uHv\݌LætJ*K!95ȡH'Cu"7;Y$l{|hw$9:>E팃h<o(ʆT , Qf c f_Ʈ$It同:2At4$,lz~}/X0ɇN!߂}q^HNx4{`pj0%4:gJ h))+^BZKJIM \:g "tB1QȮqRxnEOw{AB$uVdeR_&:\PLIa@fO_I6֟Vc3ȥGVɖw&Dl5h ޳$n L&S/.lEݜihd ԹGc45bܚgz:J6' 3ŁJG@4hp :qǖJ·6Y^-< -šz^~BtSJrʄI{Jz$=jȣzHmpt_&čX M+NЇ"GN[%].y9