MZ@ !L!This program cannot be run in DOS mode. $wVJ8888D8D8D8D8K8K8F8n89A8G8n8n8n8Rich8PELY  .@'@INIx=]8H@l.text `.rdata`@@.data;p&T@.reloc]^z@BÕ=pFtDpFDpFpD pFdD$pFD0pFxD4pFlD8pFhD|$PL$L|$PD7Ɗ:utP:Quu3u&L$LIL$L|$PD$8Dƍd$:utP:Quu3u&L$LIL$L|$PD$thD$VP}hD$(hDP|L$QAu+ʀ|  ID ~ ;}UhDx.;~*ShDD5ȦF{F u^uZL$$@D$jjP$L$Dt$(}EhD5ȦFz3ʕ̡FS\$ Ul$ Vt$W|$ $uVt$hD5ȦF_zjjj 5ȦFEzt:hWhF{hhDhF{WhD5ȦFz$2=FFuJDPhhFD 6F)< t <.uL=F uC_^][fF t>thVhF{hhDhF{FQ$Au+ʀF IF~ ;}UhDx.;~*ShDD5ȦFyF uh_^][jhFt$8t$0t$${ hD5ȦFx5ȦFay 3_^][hD5ȦFx_^]3[̸FD$S\$UVWS@3D$'yl$,~wWSyu֊ t'$:t,t.t JBuB:E>+uF3Pjjul$8UVt$(zt1SGx;|t$zuh D5ȦFw_^]3[YÃ|$$tC|$ 3Wgx~0VW]xjpUpt$0CztWF7x;|_^][YVt$t$t$N tVt$ yVu y3^y^̸Ɛ$VPxt$4D$ t$4t$4Pt$4"~D$Pt$(yD$Pdx3^̸V$VP.xt$4D$ t$4t$4Pt$4~D$Pt$(xD$Pw3^̸$VPwt$4D$ t$4t$4Pt$4B~D$Pt$(xD$Pw3^̸vVt$VD$Ewt$D$ jt$$PVTU5FvD$uUfD$(tt$,t$8PS5t$4t$4Ut$Wt$,S(tt$$SvE_^][ øpF3ĉ$=F$$D$$D$$D$U$L$(@l$D$ush`D5ȦFrhD5ȦFrhD5ȦFrh D5ȦFrh\D5ȦFrhD5ȦFrhD5ȦFvr8U3s$SVW \$0l$ CU\$4 s;SUr|$(w΍QAu+ʃ|5FD: utH:Juu3t΍QAu+ʃ|7FD: utH:Juu3C΍QAu+ʃ|7FD: utH:Juu3ƍP@u+ƒ|7DƊ:utP:Quu3Ίt I<:t<,t<.t AAuA9E>+uF3V\rSwD$]hD5ȦF.]hD5ȦF]hD5ȦF]@hHD5ȦF\hlD5ȦF\j;j;hD5ȦF\hD5ȦF\hD5ȦF\h$D5ȦF\h`D5ȦF\@hD5ȦF\hD5ȦFt\hDD5ȦFd\hlD5ȦFT\hD5ȦFD\hD5ȦF4\hD5ȦF$\h8D5ȦF\@hD5ȦF\hD5ȦF[hD5ȦF[hPD5ȦF[hD5ȦF[hD5ȦF[h0D5ȦF[hD5ȦF[@hD5ȦF~[hD5ȦFn[ut_|$DD$ptUhHD5ȦFB[ j\L$tFQUP\unUt$thhD5ȦF [FFu#5ĦFhD5ȦFZ  |$Dt5ĦFhHD5ȦFZ FtZP5ȦF赾hDj5F[ u[#hDPK[tV[V<[5F5ȦFFB$u9hDhD5F|[ uZP[L$TEȉL$P\$LhDhD5F7[؃ \$LUZ|$Hu%hDhD5F[ D$Hu)Z|$4u%h DhD5FZ D$4uYhDhD5FZ Y|$8hPDhD5F}Z u|Yjjjj$jP \5F$P[jS$P5F[0ShDVFZcVh(DXDI:utP:Quu3D|$8\$\h\DhD5FY؃ \$\XXPX$WPWj$5ȦFȃ $$tihDQt$Pj$P5ȦFȿD$ hDhD5FX u Xj5ȦFVx$ |$|$ hDhD5FX؃ uWj5ȦFS'$ t P3D$$PhDhD5FYL$4|$`$DʉL$$WL$lQL$,Q$QP5ȦF? t$(Xjjjj$$jPY5F$0PrYjS$<P5FPY0ShlD/3|$$}B$ttu1hD5ȦFVt$,hhD5ȦFUu0WD$lPD$,P$PV5ȦFe t$(|$IUK 3_^][YPD$ PjjjjKt$4JD$t PLt$,tUJUJL$0UJ 7J؅u t$h8DV)JVQI 3_^][YSJ t$h\DVIV$I 3_^][YÃ?uDt?jVhjjS_J&t$hDVIVHS7J3_^][Y_^][Y̸apF3ĉ$SU3D$8VW$3hhDh D$$D$H3D$(D$8D$\D$xD$ DŽ$D$t$D$,D$PD$XD$D$dD$lD$|D$p$D$0D$hD$4t$DD$`J D$HuhD5ȦF&G2ȦFu8FPFȦFt!D@Pjjj5ȦFFȦFjPj($P7$PnH$KD$@$|$47>--DƊ:utP:Quu3u D$PDƊ:utP:Quu3u D$PDƍI:utP:Quu3uKvGD$x[Dƍ$:utP:Quu3uK&GD$t Dƍ$:utP:Quu3uKoDƊ:utP:Quu3uKGD$pvDƋ:utP:Quu3u%KFoD$DD$LDƊ:utP:Quu3uKoD$LDƊ:utP:Quu3uKGD$hDI:utP:Quu3u!KVwD$3 DƊ:utP:Quu3u'KP75ȦF; D$@DƊ:utP:Quu3u D$|$DƊ:utP:Quu3u D$ f,DƋ:utP:Quu3u D$ '4DƍI:utP:Quu3u D$l8DƍI:utP:Quu3u D$$LD`DƍI:utP:Quu3u D$(gpDƍI:utP:Quu3uK6GD$$xDƍ$:utP:Quu3uKGD$\Dƍ$:utP:Quu3uKD$8uYAD$8JDƍI:utP:Quu3u0K|JD$Tu ^AD$Tt5wPVAt"FP(BtD$0K|$4$hD5ȦF#@h t$LmCt$PrAD$H t P@t$8D$dt PLAt$,@t$At V@D$Tt P@D$Xt PAD$t Ps@t$@Ż$_^][3m[ĜÃ|$LtD$hu hDj8-_PhD5ȦF"?hD5ȦF?hD5ȦF?hHD5ȦF>hD5ȦF>hD5ȦF>hD5ȦF>hD5ȦF>Dh$E5ȦF>hTE5ȦF>hE5ȦF>hE5ȦFo>h E5ȦF_>h@E5ȦFO>hxE5ȦF?>hE5ȦF/>@hE5ȦF>hE5ȦF >h(E5ȦF=h\E5ȦF=5ȦFhn@A(D$|3ɅEL$@L$=P=|$@mAP=t$|$lth&DW@5ȦFW@jD$hPjt$|5ȦF͂u hE|$ u 3D$ D$xtj5ȦFP0 t$ttt hTDV=hEV=jD PP@D$,u.EEPhE5ȦF<5ȦFO=t$\3ɋ|$$33ȃ~ hEGtK|$DhEt$Dtjjt$$U5ȦF5t$ljt$$U5ȦF]D$3D$St$D$VP5ȦFNl$Tt;U3<~,d$VU<Wt$ m~CUF}<;|؍D$Pt$=Ah8E5ȦF<5ȦF"< &WhE5ȦFj;5ȦF<D$t PE=$|$$|$(t$tD$(PjjxV;jt$<>t#l$jWUhW>D$|$#l$D$$D$$PjjxVD$$:u#hPE5ȦF:5ȦF4; j|$LD$t$Ut$8Pt$4t ><uhhE믋l$8t;U3 ;~(VU;Wt$ ձ~gUF:;|؋t$l$h|$hEU:t$=hhDW/=D$XutUhEWhDD$(D$(PjjxV9D$0u K=D$0t$Pt$0= T$PhEu hEWPV0:V|$p: UhE_t$t$)Vl$ )uv5ȦFl%)5ȦFT%n(St$D$h E5ȦF$h E5ȦF}$tVD$\PSt$ U(t?5ȦFj8$P8$؃\$ 5ȦF$5ȦF$#P#|$L\$,u9DPSjjW#D$0t>t9hE5ȦF#HSjjlW#S@D'j}uWhDhDc' jjW'u#h E5ȦFN#5ȦF# V'Vl$m'5ȦF#uKWhDhD&l$PPjW"u4PWhڧDhD&l$$jjW&D$$QhE=t$4u]D PVjjSu"|$8t US&|$<=HDD$PUS&u45ȦF"VjjlS "V@DD$thE׋D$thE׋D$th0E׋D$thXE׋D$u hxE׃|$@u%u4r%hh4 EVl$P$؃uhE@Dl$hH EUhE׋D$ Sp&%Uh| ED$\3t$9t$@~Sl$@I* @+uh E׋t$3PhE׋t$Ft$;|l$-uFP|$ u;E E:utP:Quu33|$ t$K6jt$5ȦFe D$dcW hE5ȦF:3ۃ33sh E5ȦFWh EuhD5ȦF hD5ȦFh Eh E5ȦFh Eh$ E5ȦFh8 EhD E5ȦFhH Eh` E5ȦFh4Dhp E5ȦF}Dh Eh E5ȦFeh Eh E5ȦFPh Eh E5ȦF;h Eh,E5ȦF&hDhhE5ȦFh EhE5ȦFHhEhE5ȦFhEhE5ȦFh4EhDE5ȦFh\ EhXE5ȦFhEhE5ȦFhE5ȦFȦFD$$DŽ$PhЛ@jhD5ȦFB3ۃ33sW%=u!hE5ȦF 3ۃ33s\$t3SD$|u+Sh<E5ȦF3ۃ 33sND$|3ۉ\$4t+ȍAЃ wXY\$4kt>FFt$uՃ|$@tP;B؉\$4|$TtMShE5ȦFK 7F \$4t$>thhE5ȦF%3ۃ33s hhEhUKVUUU|$4鸫*hhEH4ERV؃\$Pl$xPx|$|t|$Ht1h&DUh&DW5ȦFU5ȦFW \$l=(Du1l$5DtjjjP׃Pjjjt$$'SjjlUS@DWl$|$,D$hjL$`QjP5ȦFVhE5ȦFl$|$\$5ȦF D$,t Pt St U&t W1D$Lt PD$0t Pt$dIL$`t Q^$_^][3+ËD$\D$,t$ |$P|$$E\$ EDVSP PhE$ hPt$8D$@$,QhP$tS)VSPPhE$ hPt$8D$@$,QhP$uD$(8eD$,t$ $DӃ Pjjjt$ tjjjӃ P׃|$|$@ߋl$l$PpD$0|$Ht"h&DP5ȦFD$-tuߋ 3ɋl$t$D$uuDl$Ń5D|$H9L$4uDPDl$TD$4t4thhEh8E֋D$@ PjjlU 0uhhEhTEփ DPjjjU3|$t D$$|$u|$t D$$3u.hhhEPD$dȉD$, L$<Q33Ʌu>@F9l$,u D$PuE3PhxEt$`Q D$<@F;uhhEhEփ t$l$(t$[VWt$0t$Pt$`t$PUPD$hPD$XPt$X0;u3uhhEhE֋D$, \$$=4DCSPU j t$$׃t .IhD$`PU ~D$\j P׃tt$D$Ht$t$$t$0t$Pt$`t$Pt$Dt$@PD$XPt$X0D$ [3hE5ȦFhhD5ȦFhE5ȦFhTE5ȦFhE5ȦFhE5ȦFhE5ȦFzh$E5ȦFj@hXE5ȦFWhE5ȦFGhE5ȦF7hE5ȦF' 5ȦFD$Ht PqD$D:utN:Huu3uO|Ist$Ot$D$PhDE3,D t |$hE5ȦFXhE5ȦFHh0E5ȦF8h\E5ȦF(hE5ȦFj;j;hD5ȦFhE5ȦF@hE5ȦF33jt$5ȦFzPuG5ȦFL35ȦF<t Wt S}_^][Ë\$uED PSjjWMj5ȦFjY u7u7h E5ȦF&h(E5|F5tF $uh(E5|FxtWh(E5ȦF h(E5|F5tF0 l$tuh(E5|F裩%=xFu0t$8uahD5|F5tF t$8u>t$Dh(E5|F5tF t$Durjjjj$(jP85tF$4PjV$@P5tF0uVhD5ȦF D$TKVjCuh)E5ȦF$uD$DH)Et$huzhP)E5|F5tF t$huWD$ u*D$ Ph)E5|F5tF1#D$ D$ uCu?h)E5ȦF Vjuh`)E5ȦFo j$U@ D$uh)E5ȦF= t$tLxuh*E5ȦF1P Vh *E5ȦFtVt$$W5tFCu $Ph<*E5ȦF: D$4uhD5ȦF $$D$,$$$V5tFt$PVt$<$t$ht$x$t$x$t$Pt$XW$S$t$tP$P\ ~jhD5ȦFD$4Zjt$$Y t$0t$8$tDŽ$L$@t$8L$@$$D$,$$$$t$(5tFVQt$D$t$p$$$$t$Xt$`W$S$t$|P$P5d ~BD$,hD5ȦFLjt$$K t$0t$8$$D$,$$$$t$(5tFVt$`t$D$t$p$$$$t$Xt$`W$S$t$|P$PL d ~BD$,hD5ȦFcjt$$b t$0t$839$<$D$h$D$0$$$t$(5tFt$Tt$`t$D$t$p$$$$t$Xt$`W$S$t$|4$PZ d ~BD$,hD5ȦFqjt$$pt$0t$8,F;$<t$4V|$@t$(t$0h`*E5ȦFjjj 5ȦFƄ$TDP$Xj PD,u h*E5ȦFD$T($4$4_^][3O(SUWPl$UjjlSU@DVjjjS)uUh,E5ȦF z|$`tV5ȦF*h,E5ȦF|$tt+t$Vuh,E5ȦF3V(uh$-E5ȦFWUVvU y%h@-E5ȦF3'5ȦF uhh-Eh-E5ȦFt$|t$|t$|t$|t$|t$xt$xV$$$$$$$$$$$$$$$$t$|lV^t S6_][̋D$VWPt$pjjP5ȦFR_|$XtV5ȦF`Sh,E5ȦFV؃ u"h$-E5ȦFǿV<[_^USVS y%h@-E5ȦF3茿]V[_^u%h-E5ȦF3e]Vٿ[_^h-E5ȦFBPjV.؃trjt$tt$tt$tt$tt$pt$pS$t$xt$xt$xt$xt$xt$xt$xt$xt$xt$xt$xt$xt$xt$xt$xt$t|S&h]V0[_^̸fS\$$D$ UWP3SUl$z D$ u,St$hhD5ȦFb5ȦF_][VhDP=Vt$, uSh4E5ȦF rD$u5ȦF蝾3V@D$ 諾`SV蝾uΊt<:t<,t<.t AAuA9E}V?(4EI:utN:Huu3ju3l$u|h04E5ȦF45ȦF˽ \$S胿l$t$$ ^t U_][jjjW|$dWPt$4赿tl$l$|$Tt$ CV;)h4E5ȦF薼Ux uh4E5ȦFwIVUDV5h4E5ȦFKh-E5ȦF6\$VSݾVj$$$$$$S$j$$$$$W$$$$$$$$$?x^t$0h\4E5ȦFf ;̸pF3ĉ$SUVW$D$h$D$H$D$,$D$p$D$l$D$D$D$<$D$t$D$8$$D$$D$\3틄$$D$T3$t$P$D$(l$D$ ͿD$`uh-E5ȦFW39$W$$tCSWV/, u5ȦF赺 \$VS謼V@a \$9$(th-E5ȦFϹ3XS\$(葼US'W7W)؃=Ft?7<~u V~u 0t F0u ~uFS0u $tdS0u~u|Ft. t)6v詾u 9FthP.EVu~t$(tVS5ȦF \$$ES蛻; |$u!hDh.E5ȦF蔸3K $0t l$$UdD$,pTl$(D$0 t$D33ۉD$XVD$8\$DSVt$ v跹 P贽D$LWPUh؃ y p3 SUQv|$d.Eƍ:utP:Quu3u.EƐ:utP:Quu3uV/EI:utN:Huu3t$0Wt$PVa؃ (SVSUcVD$DYPD$lD$HPu|$dtjjVt$D$Lt$l$$v\$@t$DCV\$D!;(|$=FtW譸U%D$ $th(0E5ȦF $|$(hD$ph.E5ȦFڵ W VһhD5ȦF輵 9 tCD$4/EtHD$Xu/E@QPD$ ph/E5ȦFtD$phH/E5ȦFU D$ph /E5ȦF6 D$ph/E5ȦF vh.E5ȦF yWܺl$(uhD5ȦFѴRjj0U1 x)WU-WU*V覺jj0U y׋|$D$@h$EP襱h?h$Ej$荱h@h$Ej$u0$jjt$莮P% $$U$F$8$*"6vQ$hQh$Ej$$ 3E$ 3EH$V$@裰$t$P$G$G$G $G$GGWvuNh3E5ȦF֬Fph3E5ȦF3IF|W D$ hD5ȦF~|$t$0ޮt WѮD$(t$u P趮l$t$`蚱t$$tU蟬D$h(Ƌ$_^][3 ļ̸$pF3ĉD$ D$4WS\$4Ul$4Vt$4WjjVt$ D$D$$D$4D$8+P± D$,jVP~u hl0EVqD$$V^|$,e|$$ZD$PjuN t$,t$(h5E5ȦFhG h$EjJD$4D$0hJ h$E@p@P'D$D6vPD$PhQ h$EjD$`@D$(|$|$jh3EPD$$h_ h$EjVD$0@裭aD$D$FD$ FD$$F D$(FD$,FFVu1u4h3E5ȦFEph3E5ȦF֩V>D$(WD$,D$u{t$SUt$ D$VPFtt$,hH5E5ȦFc ut$$hh5E5ȦFB u8Rut$$h5E5ȦF" Uv h5E5ȦF t$Sȃuh5ER@NhD5ȦF˨3Dt P&F|L$0_^][3$̸VW3u_SUjPΪh h$E\$@P豫uV3sUVjh|6EU(0Dt$43Ʌ3ۋFL$,pШ$FSp踨8Vuwjh|6Ev0D3Ƀ D$;u1NŐ:utQ:Puu3&}"GE@v h6E5ȦFl t$CFp;V\$^S觬U諨][_̸pF3ĉD$S\$(WVt$(WD$D$ D$ QAu+h h$EAP%Ѓ T$uh'E5ȦF讦΍yAu+t=0QIAuD$+Q@VP Nd$FuD$+D-yAu+QVR\ NFuD$+D$3t%= DP׋L$vD1D$0uD$ Pjs  ut$h5E5ȦFǥ DNJ:utP:Quu3uNST$9EI:utP:Quu3u D$DǍI:utP:Quu3uN-ST$$j9E:utO:Huu3Nu6l$sU(N ՓP P |$\$DPSjjUӒD$ jU跙؃\$U腓_^][3hjjjU豘D$؅uAh:E5ȦF茑5ȦF# 3Vhl:E5ȦFg3<3Ft$4'-jL$8jAqӖNjA6ԑF tSPʑ3D$谑؅D$^t>P3臑~+Vt$zPSx]t$F\;|׋D$P]\$(D PSjjW]D$(t$4VWh:E5ȦF35ȦFʐ t$4t Ut Wt V踖D$t Pk_^][SjjlWɏdS@D듃uEǍ:utP:Quu3uEl$l$<>ENj:utP:Quu3uEl$l$dT>ENj:utP:Quu3uEl$l$,DNj:utP:Quu3uEl$l$H(>ENj:utP:Quu3uEl$l$08>ENj:utP:Quu3u El$l$DWD>EI:utP:Quu3u D$PGP辉D$$f|$Nt$ Vt$8Q؃\$豇|$`PWՇjjt$tjVʇuPjPjV跇裇PW薇t[jjt$pjV菇uPjPjV|‡jj$WPDhL>E5ȦF35ȦF苇U݇5F҇SFD|$l tD$xPˍW豆$@_^][3蕢43hEt$t謈D$tPu h>EVSV躇 uhDhD5ȦF輅t$(D$T|$uh>E5ȦFVP h>Ejjjt$(W5ȦFuV҅Pjt$(WVSvV贅WD$P虅\$Y|$;H9|$E5ȦF\${h?E5F؅hD5FQ9|$(up肋Ph ?E5F-9|$LupdPh ?E5F 9|$du3h(?E5Fp 5F膉hD5FЃ9|$,uPh4?E5F跃@tP5FEh@?E5F荃hD5Fz9|$0t$$D$P$PVS臊VԆPȆPhH?E5F-\$,3~W$+~ $$:֍*;DQPhX?E5F݂\$(F;|ɋ|$l$G|$;\$hD薂P薂u5ȦF0\$\$8u9D PSjjUa|$@\$t SU|$Ht,3`SjjlU0S@D\$(|$Pt CHtD$Xu SU0 u&SU蘈uh`?E5ȦFӁhD5ȦF軁3̸Pf3D$HS3ۉD$ UD$3D$4D$0D$D$ D$,D$@ȦF\$ \$L\$<\$(\$DD$Vu8,P,ȦFt!D@Pjjj5ȦF ȦFjP \$(\$<\$dW|$dOt$t$PD$\W3Dƍ:utP:Quu3u#Oxst$PDƊ:utP:Quu3u!O%soD$PDƊ:utP:Quu3uOST$,QDƍI:utP:Quu3uOST$@Dƍ$:utP:Quu3uO8CD$<Dƍ$:utP:Quu3uOCD$8e Dƍ$:utP:Quu3uOCD$4x?Eƍ$:utP:Quu3u D$?EƍI:utP:Quu3u D$?EƍI:utP:Quu3u D$Q?EƍI:utP:Quu3u D$?EƍI:utP:Quu3u D$?EƍI:utP:Quu3u D$ ?EƍI:utP:Quu3u D$ Q?EƍI:utP:Quu3u l$ Dƍ$:utP:Quu3u D$LLDƍI:utP:Quu3u D$DDƍI:utP:Quu3u D$HTEƍ:utP:Quu3u D$0FPHD$Tt_t$O|jt$85ȦFR؍D$4PD$4\$hPt$Lt$T5ȦF h,D3h|$u&|$ut$$jjjt$\SWhSWh t thD5ȦFQ`gt$4S$h ut$$jt$SWg!|$u|$u SWgSWgSa\$8 hHE5ȦF_5ȦFm` 3hHE5ȦFR`t U`t W`t Sc_]t$D$t P`L$t Q`^[D̋L$*uD$.*uD$+uD$* DˆD$Vt$D$jPv_jjj v^^̸Px3D$8U3D$D$D$8ȦFl$(l$0l$,l$D$ l$4u8y^Py^ȦFt!D@Pjjj5ȦFZ^ȦFjPhSVt$`W|$hNl$l$D$0D$ D$L$DÍ$:utP:Quu3u!NiwD$0PDÊ:utP:Quu3u!NwD$ [DÊ:utP:Quu3uNWT$DI:utP:Quu3uNyWT$ DÍ$:utP:Quu3uN)GD$$tLDÍ$:utP:Quu3u D$40EÍI:utP:Quu3u D$8IEÍI:utP:Quu3u D$@DÍI:utP:Quu3uNGD$(_DÊ:utP:Quu3u D$<-D$PhDES,D D$D$,D$N[ZPZ؉\$TZPZ|$Lt$2DPVjjSZt$8D PVjjWwZjt$(5ȦFat$ D$Dt:l$(3P5ȦFjY tUlPh` E5ȦF#Z|$,-DAȦFD$TD$XD$\`DAuhh JEh0JEՃ ^؉\$hDJE5ȦFYl$D$Pt PZt WZt U]_^[t$8D$@]P7hl$8 R+u hEփPhEG;|̋l$hE֋D$SpfZUhJED$L39|$8~l$8 R+u hEփPhEG;|̋l$hEUh$KEhhD5ȦFI\$%hOE5ȦFH5ȦFI3ۅt WIt VIt SP\$_^t$TD$(t PIL$(t QI][T̸x&b3D$DSUVWD$L3D$pD$H3D$\D$dD$`D$8D$tD$@D$DD$D$lD$h$D$$D$(D$,D$0D$D$4D$xȦF\$D$ D$X|$|t$u8GPGȦFt!D@Pjjj5ȦFGȦFjP螫,$$OD$PD$<E$uDƍd$:utP:Quu3u%OuBt$D$PPDƊ:utP:Quu3u%Out$D$<>Dƍ:utP:Quu3uOSEt$D$@DƍI:utP:Quu3uOEt$D$DLDƍI:utP:Quu3ut$D$`WEƊ:utP:Quu3ut$D$hEƊ:utP:Quu3ut$D$d"EƊ:utP:Quu3uOEt$D$LOEƊ:utP:Quu3ut$D$HGLEƊ:utP:Quu3O^UD$TLEI:utX:Yuu3ut$\$LEŠ:utX:Yuu3ut$\$xLE :utJ:Huu3t$\$4LEƊ:utP:Quu3OGUD$XLEŠ:utX:Yuu3ut$D$ LE :utJ:Huu3t$D$ dOEƊ:utP:Quu3ut$D$\#DƊ:utP:Quu3ut$D$lIEƊ:utP:Quu3ut$D$tD$8DƐ:utP:Quu3u"OEt$D$pD$8F D:utN:Huu3SO_ut$\$OA*AP*A|$ APAl$o g |$@DPWjjt$(@|$DD PWjjU@jV5ȦF $|$HjjIhDhTE$ QCtVUTICUAl$$苼D$ t PAt U'A_^][xuh@hSE5ȦF>h\SE5ȦF>hSE5ȦF>hSE5ȦF>hSE5ȦF>hDTE5ȦF>hhTE5ȦF>hTE5ȦFu>@3Wjjlt$(W>hW@DWjjlU2>eW@D3ۅtJttATEDEt$EQhUEV=WhDV=C;$rU6?l$3k|$L $UENJ:utP:Quu3uDh0UE5ȦFn=PBFWhUE5ȦFB= dUENJ:utP:Quu3uhpUE5ȦF<W~EyWEhWhUE5ȦF< a|$ WVhESVgE;D$Pujt$ hDjv@jjjt$(E|$0u#hUE5ȦFO<5ȦF< |$Tt SVD|$Xt WVD|$\t jjVD |$`tjVUD |$dteh VE5ȦF;jVDu3h4VE5ȦF;5ȦFL< V;D$Cht$(:>t$0E >t$8;G>t$@;G=t$,;G=t$L;G=;hGhTES =؃(\$xuhE@D,SWh@VEt$0USWhHVEt$HUSWhPVEt$`USWhXVEt$xUPSWh`VEt$$USWhlVEt$TUhxVEU9Wh|VEU9hVEU9DhVEU8hVEU8hVEU8WWh WEU8WWhpWEU8WWhWEU8HhXEU8hhXEU8WWhXEU8hXEU8h YEU8WWh0YEUt8@WWhYEUd8hYEUY8h0ZEUN8hWD$<u WU?jjjjjWU ?W>t5ȦFj:D$||$D$$t Pe;D$(t PT;D$,t PC;D$0t P2;t W%;D$4t P;D$xt Pa7V>$hD5ȦF5W= VhE5ȦF5Q5ȦF<6>Wt$|$ t$h|[EWp5D$xuh[EWX5S\$UVSP3*9h~< R+uhEW5PhEW5F ;|ĸ* @+uhEW4Ph[EW4 ^][hEW4_Vt$ WV4ti|$ thlE5ȦFk43_^V4jP4Pj5ȦFyW4PV4PWhmE5ȦF4_^̸MSUVt$WV=V4|$ D$3IVUt$$=؅DDmEDQt$ hHmEW3uhPmEW3#uhXmEW3Sh\mEWt3 F|_^][Y̸MSVt$(WV5\$0SW8jWW<W4V3PV5 j@0S5jjt$<@p-5SV]5|$8t"Ve<~jV\<VP< |$@tE5ȦF1$t'$$$؃ uD$,VP|:D$4h@Ps:9=FuD$,P1;$U^7uh%E5ȦF0Uc1PV`3 SVB3j@03jj$@p29$t"V$:~jV:V: 달$tEjV2jjjV$D$,PA3D$0UP03V$D$@PU38t.$$$V5ȦF赹ED$,P6u5ȦFV0$u S91_^][Ĥ̸FISUl$VW3D$uL$QAu+ʃ͍QAu+h!YhjES2 u&hlE5ȦF/W4D$_^][YSu>t$Vt0 ƀ>t8.t@8uShlEVY0ShlEVH0UV90 jt$$V̝ t5jW3uhlE5ȦF|.D$PWjVV/Wg3D$_^][Y̸HpF3ĉ$SUVWȦF$3D$(3D$4DŽ$D$DŽ$D$tDŽ$DŽ$DŽ$D$0DŽ$(D$ t$ht$pt$$$$t$dt$x$t$X$8$$$4$$$$$$$$$$<t$L$t$8$$$t$@$t$T$@$$$DŽ$$,$$t$|t$`$t$Pt$lt$<$0t$D$t$,$$t$H$$ $$$5F=DuU׃@P/ȦFjP9H%j׃ P{/DŽ$ DŽ$t$D$\D$DŽ$+D$|$hoAP+$Ol${-$DΊ:utA:Buu3u!O*sD$\a$gE΍$:utA:Buu3uFD$,,gEΊ:utA:Buu3u!OsKD$4gEΊ:utA:Buu3u$O:s$nD΍d$:utA:Buu3u?OD$tu**D$tsP*Dΐ:utA:Buu3u#E΍d$:utA:Buu3uOC$0D΍d$:utA:Buu3uObCD$<D΍$:utA:Buu3uOCD$$QD΍$:utA:Buu3uO C$ TgE΍d$:utA:Buu3u0Or C$D$@D$,$ `gEΊ:utA:Buu3u*O CD$dD$@D$,D$8< dgE΍:utA:Buu3uO CD$x lgE΍$:utA:Buu3uOb C$ D΍d$:utA:Buu3u*O sP(D$0 @ xgE΍:utA:Buu3uO CD$X gE΍$:utA:Buu3u5Ob P3*% D$hun%D$hcgEΊ:utA:Buu3uJO P33* D$pu -%D$pVP.%D$@ gEΐ:utA:Buu3u$O C$8D$@ gEΊ:utA:Buu3u-O. s$P֧ Y ,DΊ:utA:Buu3u*O sD$LP DI:utA:Buu3uOr C$ E΍d$:utA:Buu3uD$@$e gEΊ:utA:Buu3uD$@$$ hEΊ:utA:Buu3uD$@$ hEΊ:utA:Buu3uD$@$hEΊ:utA:Buu3uD$@$aDΊ:utA:Buu3uD$@$, DΊ:utA:Buu3uD$@$$hEΊ:utA:Buu3uD$@$LDΊ:utA:Buu3uD$@$]=E΍$:utA:Buu30hEΊ:utA:Buu3@hEΊ:utA:Buu3uD$@$$ThE΍$:utA:Buu3uD$@$edhEΊ:utA:Buu3uD$@$<$@DΊ:utA:Buu3uD$@$4>EΊ:utA:Buu3uD$@$(>EΊ:utA:Buu3uD$@$axhEΊ:utA:Buu3uD$@$@$hE΋:utA:Buu3uD$@$"EΊ:utA:Buu3uD$@$"EΊ:utA:Buu3uD$@$ShEΊ:utA:Buu3u,OsՃ$DŽ$hEΐ:utA:Buu3uOrC$ hE΍d$:utA:Buu3uO"C$^hE΍d$:utA:Buu3uOC$D΍d$:utA:Buu3uD$@D$LhE΋:utA:Buu3u D$@hE΍I:utA:Buu3uD$@$EhEΊ:utA:Buu3uD$@D$ThEΐ:utA:Buu3uD$@$@hEΊ:utA:Buu3uD$@$hEΊ:utA:Buu3uDŽ$HiEΊ:utA:Buu3u#hiE5ȦF=DŽ$(iEΊ:utA:Buu3uD$@$D>EΊ:utA:Buu3u DŽ$(wFPeD$Puc3h-|$t$D$O!jP5ȦF[~D$8D$,PD$4jPj5ȦF= u hEmPVjjlW|$0uV@DIjjjWS؃uhqE5ȦFW3D$ Pt$(uID PVjjWj5ȦFj蝱 D$u:u:h E5ȦFf?VjjlWPV@DtPnPh` E5ȦF%s PhqE5ȦF SB5ȦFj賲t$(jjjUSW$35hLpE5ȦFhppE5ȦFhpE5ȦFhpE5ȦFhnE5ȦFwhnE5ȦFghAE5ȦFWhAE5ȦFG@hBE5ȦF4hHBE5ȦF$hE5ȦFj;j;hD5ȦFhE5ȦFhE5ȦFh(qE5ȦF@h8qE5ȦF335ȦFMD$ t Pt Wt St$,qL$$t Q_^][ ̸Wt$ D$ *?jt$Jȃ uD$.,uD$+ uD$*D$ DˆD$jD$ PWjjj W_Y̸(vS33UVW3D$$3D$0D$43D$D$ D$ȦF|$l$(\$uPD@PȦFjPkXD$,t$@$>s?-jPDǍ:utP:Quu3u 9Flv|D$, L ENJ:utP:Quu3u97D$$ DNJ:utP:Quu3u%9P65ȦF(y D$nqEI:utP:Quu3uA9|$|$D$W6P5ȦFjN\$DNJ:utP:Quu3u9FtFD$(qEǐ:utP:Quu3u:9t$|$D$W6P5ȦF\$?DǍ:utP:Quu3uI9gL6SLihqE5ȦF5ȦF  rEǍ$:utP:Quu3uD$wLDNJ:utP:Quu3u D$4=GPD$0uAQhrE5ȦF |$DtZuVUD$$PD$,UP5ȦF6khE5ȦF\$hqE5ȦFh0rE5ȦF=hLrE5ȦF-hdrE5ȦFhrE5ȦF hrE5ȦFhrE5ȦFh$sE5ȦFhdsE5ȦF@hsE5ȦFhsE5ȦFhtE5ȦFhPtE5ȦFhxtE5ȦFz(|$3D$t P8t SOt VFj$W|kL$(t Q_^][(Ël$(t1hTDUu3UhtE5ȦF|$ ljD P>h`AS5ȦFSl$,D$$PSt?'htE5ȦF5ȦF|$ t$VMwh8E뿋D$,ut$ D$4jjjPt$(Vst$V]huE5ȦFp5ȦF D$4t>jjt$Vt h$uE5ȦF*5ȦFM |$31htE5ȦF|$̸6S\$D$;thpuEt$3[YUVt$D$ WjVPl$0 u2tjVUh uVhuE5ȦF 3_^][YWjjjD$,jPD$(t PUt$ t(|$(Wt~ ;_^][YVt$huEV|Vt Wg_^]3[YUl$ }th8uEt$ 3]Vt$WhDV uVhDt$ 3_^]SjWQW uVhD5ȦF 3[_^]t$ St#W~S}[_^]Ët$hTuEVV* t WySL3[_^]ø&Whf hEj uhE5ȦF33_YS\$VwVS3jS7G 6jSPhq hEw @G?t;t7D$ D$ PSFGhDE5ȦF=F3^[_YhE5ȦFt PGt PW3^[_Ỹ=FS\$VW|$ unhE5ܚF43t@ItjhЏE5ܚF PCP5ܚF F;rjhD5ܚF L$$t$W|$ASP1VW<t _^[Ã=Fu6hԏE5ܚFP75ܚFujhD5ܚFc _^3[̸S$3UV3D$,3D$ W{9CthEW$PD$,D$(t`L$,QL$QL$(QL$ QjPPuhEW79stUjt$,wPhԎEW9uhEsD$CD$CD$ C D$,jj$}PPD$HPm|D$4Pt$(PD$DjP:"h$EWvD$DP :&t$8t$(jt$DD$ >D$LPD$$PU\D$t$PjjB$ t$,37~1Vt$ *jPUt$F;|sjt$4t$,t$(t$(UW蕚 uhXEW}^PD$0PV~9t$0PjG$l{thEW<jVW33WM|$(t$t$t$t$(WWD$t PHt UGt V"_^][Ĵ̸UWD$ 3Pt$4=FD$S\$V;_uRÃr ;ustB :u't7J:Nut*J:Nu tB:FtD$u^[_]ËGtEF7wW ^[_]S\$ Ul$VW3uS~PFʍyIAuE+;sx@u+PRS.uSt$(5t F r_^]3[à s_^][Vt?jhhrFSjjhsFFBF ~tt^V3^̋D$SUVW=Ftb\$l$;_uNËr ;ustN :u'tCJ:Nut6J:Nu t)B:Ft!uhE5ȦF3_^][ËGhlE5ȦFD$(w D$,Pj_^][Vt$jhj,V@h@AVh AVhpAV(^̸ 6pF3ĉ$VW$WVWO50FhE5ܚF58F50F54F8FtphE5ܚF hE5ܚFW@q=FtW5ȦF(WP5ܚF=WhE5ܚFhV5ܚFD$hPVPjD$PhE5ܚF+D$hPVP9D$PhE5ܚFVrhD$PW tD$PhE5ܚF WPW5ܚF蠋W5ܚFĊjW5ܚF(EEPh0E5ܚFsD$jjjWHPhEV#jjjWPhܗEV jjjWPhEVDjjjWPh$EVjjjWhPhPEVjjjWPHPhtEVjjjW5PhEVjjjWPhEVuDjjjWPh̘EVZjjj+W,PjjjWPhEV/_^̸V5FD$WthPvE5ܚF5F|$uh`vE5ȦFt,ύQIAuW+QhvE5ܚF5F sFǍd$:utP:Quu3t<5sFWhvE5ܚFX=FthwE5ȦF<_3^YÅthvE5ܚFD$P5$Fu5$FhwE5ȦF 3_^YËD$L$P;~ Qh4wE5ȦFV.3_^YVt$ V=Ftt$hlwE5ܚF D$_^Y̸6Sh} hE5sF؃ u[YVWP3P&j5sFjuVoU5КFDl$=Ft hPOCj8Ue5ܚFjj9UOT$$t$ʍi$Au+͋l$QRU jt$ PPUqUmUjjmWfWVa0=Ft:jUh 7CU=P5ܚFU%P=Ft)h;CUWF ܚFEQjjUjjjeVjV*ijVtqVuchE5ܚF58F}50F54F~8FtphE5ܚF[ hE5ܚFFjjjeV1VhE5ȦFU5ȦFyIsFHPSVr jVANhPE5ܚFjVtVuhHE5ܚF58F50F54F8Ft>phE5ܚFb RhtE5ȦF5ȦF hE5ܚF'CNJ t uHOu=FuuWhES0D toWjS}G PSVjjj V(jVtDjjj V~=Fu.5ȦFhE5ȦFcjUf]St VC_^[YsFFFFFsF(vEFFsF4vEFԚFĚFȚFКFؚFܚFFFFFF F̸S3D$0UV3D$ W3D$0QDŽ$3DŽ$3DŽ$DŽ$DŽ$DŽ$D$HDŽ$DŽ$DŽ$DŽ$DŽ$DŽ$D$XD$ DŽ$DŽ$DŽ$DŽ$t$Lt$4t$@t$lDŽ$DŽ$t$ht$t$\t$dt$|t$Tt$Pt$`$D$8t$xt$,$$DŽ$$$$$t$pfD$t$$D$(D$D$DŽ$$|$$D$$F$ ,FȦFuPD@PȦFjP48_h؉\$LjS^jSV$$ O5F5ĚF5ȚF$$ 3E΍$:utA:Buu3dEΊ:utA:Buu30EΊ:utA:Buu3u\O$|=$ 38DD$8$ 0h E5ȦF \$8337%DΊ:utA:Buu3uWOF$|$ 35sFt*hE5ܚFMSSj 5ܚF8V:Vjj5ԚF迥V$St$`$t$t5КFJj FtP5КF<ԚFtSj$t$8PEJ"t$t St$ht$\V5КFJ$u*hPB5КF褥ԚFthPBP荥=$Fu =Ft/=FthĖE5ܚFhA5КF薣5F5КF舣u+hE5ȦFݦ5ȦFt |$\$NhPC5F5КFjhsF5КFh9C5КFh@SC5КFԚF(hPC5FP蛣jhsF5ԚF菣ܚFh0Aj55ԚF$ˣ$Pjj65ԚF讣h0Aj55КF袣@$Pjj65КF肣$$SP4F8F0F覰 t"USh(E5ȦF荥|$$\$hPCj5КF譢h0F5КFhA5КF諢7t3UKP5КF =ԚFtU-P5ԚF h\E5ܚFjjj 5ܚF$t$8t$Lth0A=ؚFthPBhBD$tu3>u#5rFWEPhEW蚊}t#5rFWEPhԝEWpS}/uu 5rFWNjVhEWG*V~ 5rFW蚋VhEWhDVD$u&5rFWdVh(EWW耊=FuVh@E5ȦF載 =ؚF΍QAu+ʃ~TFLE$:\$\$u(|$tX:Z\$\$u|$u3TE΋:\$\$u(|$tX:Z\$\$u|$u3t2\Ed$:utQ:Puu3uhtEhuEW!5sFUt$$芉 ~l\$I3~@+PPWi $jWt4hdE5ܚFM;|5sFSt$$" \$t$l$jjj W"jWVtjjj W~jS[^h\E5ܚFÇU+ t W貈_]ËB`B`B`BBB=lFS\$VW|$ unhhE5dFd3t@ItjhЏE5dF8 PCP5dF F;rjhD5dF t$$FP6WSt$(t$(nF3_^[̸薠SVD$PjjFt$Jt$$hLEV|$uh\EV^[YWSD$Pj贑 u"hpEVڇjSt$Vi3_^[YhEV踇jWV'hEV複W _^[Y̸֟pF3ĉ$ SU$ 3V$ Wl$\$9$,U3؃hEVD$诅So hD$ PWSSP  P袋D$(PWhEVgD$hPWSP PnD$(PhȳEV4=\FtWSPVJSGօ;m|$hdEVU%؃ \$thԳEVф=\Ftu SVhD$ PS1PȊD$(PhEV莄D$hPSP蜊D$(PhEVbhEVRUY؃t{S~nhEV(S3 ~bWS݄hL$(QP+L$0QAu+ʍD$QPV؄jhDV˄SG蔄;|h4EV躃hD$ PU菀 h`EV菃3ۄtx3<:uYQk+ÃP5sFVNEVUUU3ۋj@+ȸ EDDPV  jWV CGGul$jhDV UV,UVf-UPVPUP@PhEVÂ\$(U DE4EDQV蠂UpWtPWdPhPEVyt#S W8Ph̴EVXW,jjjLUEDDQhEV(U>UD$4:$D$t P-@?EPhEV t W @?EPhEV́ =Ft?D$PD$PU,~5FhEV蟁t$(t$0V臂jhDVz0D$PD$PU |$v+h(EV\t$t$VDjhDV7 h8EV1U}t0hPEV U1PV"~ =`FhEV5`FhEV؀5sFhEVǀh h0E5sF ؃,`FʍyAujjj+QR5sFSU} uh,E9h8EVa39=sF~;PhEVDG ;=sF|hDV-S蒁\$hdEVt S胀jjj V$,_^][3̸薙LFthE5dFLFL$ ut-hȟE5dFtQhE5dFw V5sFt$h#EVt$ Ԁ;=LFtPt$h E5dF)D$P5$FƉu5$FhwE5ȦF~ 3^YËD$L$ P;vQh4wE5ȦF~V93^YVt$$՚V!=LFtt$h@E5dF~ D$^YÃ=LFthXE5ȦFp~3^YU$ pF3ĉ$ E WS3ۉD$3D$|VW3DŽ$3\$<\$ DŽ$QDŽ$D$hEt$\$$DŽ$DŽ$\$|$$$$\$0$ $$$$$$$D$TD$t$D$L$$D$XD$lD$HD$d$D$4D$($,$0D$`$D$,D$8$DŽ$(D$@$$$$$$ DŽ$$D$xD$p$$DŽ$D$PD$$|$$e{D$HFlFpFLFXFȦF\FuPD@PȦFjPLl2zD$p[2jPxzjt$|mzhh0Eh K؃\$1hh0Eh & D$<1hh0Eh  D$ 1M\$I5F5F5DFM\$I3Eƍ$:utP:Quu3u"MIM\$D$h\EƊ:utP:Quu3u4MIM\$3iP*_dF=XFt<=hFu3DjЃ P|bhFDjЃ PcbdFj$Pj$5ȦFCu"hE5ȦF^\$ |$$3t$W[t$4u5ȦF#_\$|$$$t PV[39@FPj$t$|5ȦFVu5ȦF^\$|$$\|$PWt$($$$$VBu+h@E5ȦF]5ȦFj^\$$ |$$tHSV\u1hlE5ȦF _5ȦF-^S`\$(|$$So`=$Fu =@Ft*=LFthE5dFA]h#BV[ p\$(t.ȦFh cBj5V$8Y$8Pjj6VY$$u*PVYuhE5ȦF.[\$iXF$LF$$PVbXhbBVY$4VY=XFu=LFu $ uhcBVYVWt$<|$PnhDVu[؃u$VhE5ȦFwZ5ȦF[jjjSXS:[uD$8PVWXVX\$4 |$@tjhj!WWt5Sjj7WWu#h E5ȦFY5ȦFZ 3$\$lSPt$pD$PPx5XD $t$Dh`E5dFY =DFt.ujjj STS_SU\$H|$PuhE5ȦFThPES{Th t$HS\U@s^PDTSVCU|$, h WVW ~-tjjj VTV_VTh`ESTh t$`ST|$|,t$hhpESSt$,h VSThܱEV05Dփ uGhEt$$փc h t$$SrT I L$ hܱEQփth$ESUSh t$HS6TL$PhXEQփD$ t$WDŽ$TDŽ$\Q=u&$PjjIWxPt $\$@D$@WP0t"jjj W@PuD$t3|$t$D$ttGhEPPStWPPVOV:S$PhdE5ȦF3R =tFthE5ȦFSW5ȦF$VW5dF ~N$|$Ltt$ h#E5ȦFQ D$L$it$WN\$WO=u&jjjJWN~hE5ȦFWQ5$XPWOPj6D$H\$8D$SPWNVWN$[B3t$0t 9t$,[D$tK$P3tWlO9T$PtF;r;u@sWEOT$P\$tK$X3tWO9\$XtF;r;u@sWN\$X|$,||$(tM$4DŽ$4Pj$`DŽ$@P$\Pt$t\Du1Du-t$@$\jP$\Pt$t\Dt$0)t$H+މ\$83D$(D$bh̲EhܲE5dFlOD$,3t$D$-hE5dF=O*3D$(D$-%3D$(D$|$,tND$<\$\t$`SP3 +؉t$`t$\$\D$,t$$PPW2MP1hlDt$Q$ht$m؃D$33ɉ\$8~ < uBA;|sx2I|$ 9ǀ< u JC Nyۋ|$P\$8thhpEhED t$=pF ؃V>t$~ u ~u~u[hE5ȦF?hE5ȦF?S5ȦF;AhĬE5ȦF?W5ȦFAhD5ȦF}?0SWJt _^[Ã~u5~ thЬE5ȦFG?W"C@WSuhE5ȦF?_^3[̋D$8s3t$ t$ t$ J ̃|$VuljjjhlBhj8FPDu#\DVhE5ȦF> VTDP`D=8Fu5XDjփ=8Ft5sFt$ 荄^VBjjhFHjhhFFHjhhFFHjjhFF Hjhh(FFuH%$ Phh$EA%H$0 PhhlE'%$$PhhE%$HPh$EL%h$E$ jP %hh$E$djP%h$E$jP%H$,h$EjP%W 9$XE$!$!XDD$FsF $7=FHEj5sFDP5ȦFjjj 5ȦF$F 8FjjjhlBhjPD,P`D=8F jӃ=8Ft5sFj]3F95F;'j"Pj$\$P7U"F=Fu5sFj@]\$0D$ E=FE$5sFDD$@VP5ȦFfn΃ɹXED$fn^L$YD$sFw$D$FsF $I7=FHEj5sFDP5ȦF3jjj 5ȦF$F 8FjjjhlBhjPD*P`D=8F jӃ=8Ft5sFj[3F95FC/jhEBPj$l$P7U F=Fu5sFj[\$/D$ E=FE$5sFDD$@VP5ȦFfn΃ɹXED$fn^L$YD$sFo$$P!jhPj$hXEP D$8FsFI7=FXEj5sFHEDP5ȦFNjjj 5ȦF7$F 8FjjjhlBhjPD)P`D=8F jӃ=8Ft5sFjZ3F95FXIIjjj$jP 7$UPj$d$P$P,F=Fu5sFjY\$ -D$ E=FE$5sFDD$@VP5ȦF fn΃ɋD$fn^L$YD$sFZ$P-$D$`FsF7=FXEj5sFHEDP5ȦF}jjj 5ȦFf$F 8FjjjhlBhjPD7'P`D=8F jӃ=8Ft5sFj?X3F95F5'jPj$|$P7U F=Fu5sFjW\$_+D$ E=FE$5sFDD$@VP5ȦF_fn΃ɋD$fn^L$YD$sF}$ D$0FsF7=FXEj5DtFHEDP5ȦFjjj 5ȦF$F 8FjjjhlBhjPD%P`D=8F jӃ=8Ft5sFjV3F95F,I$$P7U, F=Fu5sFjJV\$)D$ E=FE$5DtFDD$@VP5ȦFfn΃ɋD$fn^L$YD$sF$ D$XFsF $7=FXEj5HtFHEDP5ȦF>jjj 5ȦF'$F 8FjjjhlBhjPD#P`D=8F jӃ=8Ft5sFjU3F95F,I$%P7U F=Fu5sFjT\$)(D$ E=FE$5HtFDD$@VP5ȦF)fn΃ɋD$fn^L$YD$sF$ D$FsF $7=FXEj5LtFHEDP5ȦF jjj 5ȦF $F 8FjjjhlBhjPDX"P`D=8F jӃ=8Ft5sFj`S3F95F,I$8&P7Ul F=Fu5sFj S\$&D$ E=FE$5LtFDD$@VP5ȦF fn΃ɋD$fn^L$YD$sF$D$FsF $7=FXEj5tFHEDP5ȦF jjj 5ȦF $F 8FjjjhlBhjPD P`D=8F jӃ=8Ft5sFjQ3F95F6I'jPj$$P7UF=Fu5sFj`Q\$$D$ E=FE$5tFDD$@VP5ȦF fn΃ɋD$fn^L$YD$sF|$D$FsF7=FXEj5tFHEDP5ȦF^ jjj 5ȦFG $F 8FjjjhlBhjPDP`D=8F jӃ=8Ft5sFj P3F95F-IUU7$l P=F=Fu5sFjO\$H#D$ E=FE$5tFDD$@VP5ȦFH fn΃ɋD$fn^L$YD$sF$D$؜FsF$7=FXEj5tFHEDP5ȦFjjj 5ȦF$F 8FjjjhlBhjPDxP`D=8F jӃ=8Ft5sFjN3F95F7I(j$<$P$P7UU%F=Fu5sFjN\$!D$ E=FE$5tFDD$@VP5ȦFfn΃ɋD$fn^L$YD$sF{$D$FsF7=FXEj5 tFHEDP5ȦFjjj 5ȦF$F 8FjjjhlBhjPDP`D=8F jӃ=8Ft5sFjL3F95FGI8j$<$P$P$P$P7UU{ F=Fu5sFjoL\$D$ E=FE$5 tFDD$@VP5ȦFfn΃ɋD$fn^L$YD$sFk$D$FsF7=FXEj5(tFHEDP5ȦFnjjj 5ȦFW$F 8FjjjhlBhjPD(P`D=8F jӃ=8Ft5sFj0K3F95F7I(j$$P$@P7UUF=Fu5sFjJ\$ND$ E=FE$5(tFDD$@VP5ȦFNfn΃ɋD$fn^L$YD$sF{$ D$@FsF7=FXEj5,tFHEDP5ȦFjjj 5ȦF$F 8FjjjhlBhjPDP`D=8F jӃ=8Ft5sFjI3F95F7I(j$$P$,P7UUYF=Fu5sFj/I\$D$ E=FE$5,tFDD$@VP5ȦFfn΃ɋD$fn^L$YD$sF{$ D$hFsF7=FXEj50tFHEDP5ȦF.jjj 5ȦF$F 8FjjjhlBhjPDP`D=8F jӃ=8Ft5sFjG3F95F7I(j$$P$8P7UU F=Fu5sFjG\$D$ E=FE$50tFDD$@VP5ȦFfn΃ɋD$fn^L$YD$sF{$$ D$FsF7=FXEj5PtFHEDP5ȦFjjj 5ȦFw$F 8FjjjhlBhjPDHP`D=8F jӃ=8Ft5sFjPF3F95F>\$$(j$$P$@P7SU F=FűXD5sFjE\$gD$ E=FE$5PtFDD$@VP5ȦFgfn΃ɋD$fn^L$YD$sFt$( D$ПFsF$7=FXEj5TtFHEDP5ȦFjjj 5ȦF$F 8FjjjhlBhjPDP`D=8F jӃ=8Ft5sFjD3F95F>\$$(j$$P$,P7SUn F=FűXD5sFj8D\$D$ E=FE$5TtFDD$@VP5ȦFfn΃ɋD$fn^L$YD$sFt$, D$FsF$7=FXEj5XtFHEDP5ȦF.jjj 5ȦF$F 8FjjjhlBhjPDP`D=8F jӃ=8Ft5sFjB3F95F>\$$(j$$P$8P7SUF=FűXD5sFjB\$D$ E=FE$5XtFDD$@VP5ȦFfn΃ɋD$fn^L$YD$sFt$0 $8hDPzj hlEPD$4oD$ FsFI7=FXEj5\tFHEDP5ȦF^jjj 5ȦFG$F 8FjjjhlBhjPDP`D=8F jӃ=8Ft5sFj A3F95F,\$ 7US F=FuދXD5sFj@\$ID$ E=FE$5\tFDD$@VP5ȦFIfn΃ɋD$fn^L$YD$sFt$ $ D$ FsF7=FXEj54tFHEDP5ȦFjjj 5ȦF$F 8FjjjhlBhjPDwP`D=8F jӃ=8Ft5sFj?3F95F6(j$$P$P P7UU]F=Fu5sFj?\$D$ E=FE$54tFDD$@VP5ȦFfn΃ɋD$ fn^L$YD$ sF|$ D$ FsF7=FXEj58tFHEDP5ȦFjjj 5ȦF$F 8FjjjhlBhjPD P`D=8F jӃ=8Ft5sFj=3F95F7I(j$$P$8 P7UUF=Fu5sFj=\$D$ E=FE$58tFDD$@VP5ȦFfn΃ɋD$ fn^L$YD$ sF{$ D$ FsF7=FXEj5jjj 5ȦF'$F 8FjjjhlBhjPDP`D=8F jӃ=8Ft5sFj93F95F7I(j$$P$8P7UUF=Fu5sFj8\$ D$ E=FE$5tFDD$@VP5ȦFfn΃ɋD$ fn^L$YD$ sF{$D$ ȝFsF7=FXEj5 tFHEDP5ȦFjjj 5ȦF$F 8FjjjhlBhjPDXP`D=8F jӃ=8Ft5sFj`73F95F7I(j$$P$pP7UUF=Fu5sFj6\$~ D$ E=FE$5 tFDD$@VP5ȦF~fn΃ɋD$ fn^L$YD$ sF{$D$ FsF7=FXEj5$tFHEDP5ȦFjjj 5ȦF$F 8FjjjhlBhjPDP`D=8F jӃ=8Ft5sFj53F95F7I(j$$P$4P7UU F=Fu5sFj_5\$D$ E=FE$5$tFDD$@VP5ȦFfn΃ɋD$ fn^L$YD$ sF{$ {|$<D$@P @D$@0Ph|ED@PtD~3hEghE5ȦF%]hE5ȦF Eh0E5ȦFhD5ȦFhLE5ȦFh`E5ȦFhlE5ȦFhxE5ȦFhE5ȦFhE5ȦF@hE5ȦFrhE5ȦFbhE5ȦFRhD5ȦFBhE5ȦF2hE5ȦF"hPE5ȦFhD5ȦF@hE5ȦFhԼE5ȦFhE5ȦFhD5ȦFh$E5ȦFh E5ȦFhD5ȦFhXE5ȦF@h|E5ȦFlhE5ȦF\hؽE5ȦFLh E5ȦF<h@E5ȦF,hHE5ȦFhE5ȦF hE5ȦF@hE5ȦFhE5ȦFhE5ȦFh E5ȦFhE5ȦFh$E5ȦFh0E5ȦFhXE5ȦFy@hD5ȦFfhD5ȦFVh\DVhE5ȦF VTDP]|$(3D$<FsF0-7=FXEjP@tFHEDP5ȦFjjj 5ȦFh$F Pt$p$D$,PD$Dh$EjPD$lP D$\jP8FjjjhlBhjPDP`D=8F jӃ=8Ft5sFj/F؅X395F5$ 7D$UPD$hUPF=FuԍD$PD$`UPK395F- 7D$UPD$hUPF=FuԍD$PD$`UPl 5sFj$/D$dP\$$lD$$ D$4D$4D$H$057=FXEjP@tFHEDP5ȦFjjj 5ȦFp(F 8FjjjhlBhjPDAP`D=8FIjӃ=8Ft5sFjF.3F95F=\$HI"jSj$&P7U%F=FuҋXD5sFj-\$ D$ D$4R=FE$E5@tFDVP5ȦF^fn΃ɋD$%\$D$ E=FxE$4tFDVP5ȦFL$0fnƃ^F%U$͍<+3|$(E=F^yj@hEPF3퐃P z4tFt$D #hE5ȦF5ȦF} 3jVVVD$`P$$PjWjk$(hE5ȦF5ȦF) =FEj h`EhE4HuFEDP5ȦFGjjj 5ȦF0(F'8FjjjhlBhjPDP`D=8FIjӃ=8Ft5sFj#3F9=Fm$XVD$TP$$Pjt$8j?G=Fu#hE5ȦFW5ȦF 5sFjo"\$D$ E=FE$4HuFDWP5ȦFL$0fnǃ^FVt$T$$Pjt$8j{.hNPFwuҽD$t P6ֽt W6诽D$t P6袽D$x P6蕽L$0T$4 t RQ6聽 D$tjP6x uED$ tjP6^ uED$$tP6FuEL$@t +D$,)_^][(_^]3[(̸FpF3ĉ$$ SU$D$IPE؃u][$3<V$Wt Ɓ|PD$PU xAtWD$PS ;u,+ut$jjSϮhS0S謯 S蟯$_^][3̋D$ W|$D$u#hhEjPG諱 u_39O~$A;O|SUVt$3>tIt< t< t< u FFuD$L$ ^(][_À>tG;|AhXhEP7誺t͉_;}d$A;O|4E<'t'<"t#t< t< t< t FFuN'>uNFD>t ;tF>uF>%:^][3_̸S\$D$D$|$ UVWP蛺3W|$ l$,蝭d$UW荭PD$(荺jPSD$,ht<|$,tHl$VSRVSEWjUS4 u׋l$$|$jt$ S" tEWl$( ;sD$hDWD$_^][ø[SUVt$\jjjgS边VhDV u^]3[W蘬UW蛬jjhYS~VnhDV聫$t SWi_^][̡FtPFSVjjt$ӫPj\$h@DS裬VS蜬V萬 jjt$訴P3hESpVSihDS^VR(3^[DP|DVt$tFt P:V^̋D$S;|[UVWS3(~Y-0DVSL$QP+|$u'WA~W9jhEWՃtSFϪ;|_^]3[Ë_^][3[Vt$hBhBjjv_u#FppphE5ȦF誩3^Ã>tChpBh`BhBjvu#FppphE5ȦFb3^ø^̋D$p:ËD$HD$@:utP:Qu u3̋D$39V+̋D$@ 80u d$@80tD$鷵̋D$@ 80u d$@80tL$I 90uA90t:utP:Qu u3̸&pF3ĉD$S\$ UVt$0W|$0hTES謩VhpEhxE蕲PWVUVVU\UVVU@D$P?D$UP:jD$ PVǨjjj V迧D$8P#VUhES$FD$_YV$P$u5ȦF辛VD$ ^_YS\$u%DPSjjVu;jVաBSjjlVɚS@D[V衛D$ ^_YÃuGjjjV裡D$ uCh:E5ȦF耚5ȦF [VUD$ ^_Yhl:E5ȦFP[V0D$ ^_Y̸VW|$3W~#VWݚP uWFÚ;|_3^YÍL$D$Qj5ȦFPD$_^Y̸膳$Pjt$$t$$t$$t$$t$$t$$#D$ $̸FpF3ĉ$UVW$3MPMD$u5ȦFߙ>WjjlU' W@DWhE5ȦFSjU艨؃WhED$hPUj*D$$PD$,PW$ .D$~L$QPhE5ȦF蝘}W3hehEj֛ uhED@PtD>$ ^3ۅtt;h$EjW藙 t jP t Wmt S蜧[U$_^]3̸ 薱D$ SUl$0Vt$ D$ D$t$Wu+|$,t \$(|$ hXEW臗\$(uu|$4u|$ hpEW_WStD$P5FVW@WD$$4D$|$ UhEWW諗UP|$$u W腗+uF9t$,t@VjV5DP(DPjjjU讖t$D uBjUFD$VjjlU胖ՋD$8VPhEWqW uD$Ph0CjUyD$tptku$jjD$PD$ PD$Hh0CPUW W uU;D$C uD$Ph0CU) D$%hEWӕD$8SPVUWHD$$U蝖l$<D$uUhEW蘕W4D$ _^][ ̸6SUVWm3؅tNtJh(WKt8l$d$Gh(PU tHx+(PWuWS֖3_^][Yt$ t$(hEt$$۔΋GD$3|$(PjVD$PjtW贕VS _^][Y̸FpF3ĉ$$($ S$(UL$3틌$4VL$$<W$,L$$DL$$HUPL$quShEW jhDV5 uPPV& upt$D$$0CjDL$,hQЃySh4EW褓 U=}spD$PD$(PV͡ uShXEWr #D$$Dt$t$t$$PV裡V蒡$$_^][34L̸֬D$SUVt$WD$3D$ D$u&9|$(t \$$udhXEV֒\$<\$$uDL$0uhpE5ȦF詒\$<T$R5FPQ虡\$D}fPfuV\$8[D$ uH9|$(tB5DPjPP(DPjjjU#t$< uGjU\$<PjjlUt$ \$8ShEVV} u8jUi؅tCt SWS\$8 uD$Ph0CjU覟뷋\$43luD$Ph0CjU莟\$DJt/t* uUz\$8*hEV(\$<S\$8St$(UVUuShEV _^][̸薪pF3ĉ$$S$VWD$ 3™U肐P肐u 5ȦFmSjjlUg9$ u S@D<֘tWV uhE5ȦF$t D$t83U]t W蕑$_^[3hD$PWUuShE5ȦF跏 jW>uhE5ȦF葏xSVWt؋ӍB Bu+hKhEz W趒 u_^[WSV͐Wh($EVǐWh,$EV軐$_^[SVW|$3ۋNFu+srύQAu+h hEAP0Ѓ 3tH;t 8,tL+ˁw*ˈ X@;vՋD$N_^[fR3_^[S\$Wt$hPESc|$ tBVhDSW3  ~#IVWjPS@WF;|^_[h`ES_[̸趧SUVW|$(NFu+hcFhEV!heFl$,hEVhfhEV\$4hghEVD$Xې̓03ЉT$l$ ;t$(?/thhE5ȦF73G*8rӋ\$0+T$(T$d$ :t.$\uPA =t%A@uUhE5ȦF 3O@A8tۉt=\uPtNA/t+uu A@u@EAl$ 8tT$BhE\$CD$3~}l$+\$(+\$6貍ȃu6hE5ȦF <38u6h0E5ȦFԋ 4.jjPt$u3t$\$ESU{;|_hDSdz][^YËFT$!F t$t #Vt$h@Et$V u^Ëu ^S\$ V3W@EÊ:utP:Quu3uhHEt$y蕈_^3[S||$u/t$SW uShhEWxyWz3_^[Ã|$tjWjjV?jj5FjhEV+hVD u hEWyWyV|3_^[VPhEWx_^[hEth .CPFph@.C5Flh.C5FVh.C5FR$3VWxtAxPVxt.|$jt2jWjPxu/Wh(Dt$Mx VPx3_^jjjP~xjxPV]xtЋ|$jtjWjPSxuWh@DjjjP8x~x_^hBt$Vt$u3^ÊFthEjjjPWFtv$u_F^hEW*h_3^̸ց|$ESUl$ EVW|$DD$DDD$ց+tǃt-u[EEXE,t -t Hu*EEEqE-EtED$$w9$@CEEr#D$$H@Hw $@CE|$$D|$$ ED~|$$$EDk|$$TE4`E*pE EE EEEEEEE8ELEpEE|E|$$EhC>C>C>C>C>C>C>C?C?C?C5>C  Iu?C?C?C?C?C?C?C?C?C?C?C?C?C?C@C @C@C@C)@C3@C=@CG@CQ@C[@Ce@Co@Cy@C@C@C=C  ĎFS\$VFW|$t+UEEDPQhEWQaN vu]hEW8ajjjct$(^t!EDDPWyb_^[hEW`_^[̸zVt$Vs`>SUWjjjnVI^؍D$ PjjnV8^|$[Vv$\u^hhEj,^Ѓ uËL$BB BBBBB(B B$J$tABQ(BSVW3339\$u9\$tFZt$t$VXj tht$$VVjjjt$$W9\$(t Vx9\$u9\$ t-BZt$t$$Wj tWjjkt$Wt VZt WZ_^[̸sUD$Pjjgt$ [Wl$S\$WhlES[3VID$EAwMJC$JCE:E3E,E%EEEE E3thЏESZt VSZUhES Y G;|$c^hDScZ_[]Ð0JC7JC>JCEJCaJChJCLJCSJCZJCoJC  ̸6rUVt$jjjZVU ^]YShhEP[؃ \$ uhEt$Y3[^]YWSjjZVUt$(h$EVfY3~WthEVMYt Ph@ESgu S7[Ph#EVW\$G ;|SX|$ hHEVX\$$jjj]ST3~OthEVXjWj]STSgu SZPh#EVW\$(G ;|uh@?EVpXhDVbX_[^]Y̸pSD$Pjjot$KT؃Vt$Wh|EVX3~^thEVWD$ t%HtHtQhEVbV hE hEhLEVWD$ G;|h@?EVWhDVW_^[Y̸oVt$WVU|$u VWjVWjVWD$ PjjlVLS(tt$6YPh`EWU_^Y̸Fo$Pjjmt$RW|$ hdEWVt$ W tu=SVt$ dVZ]PdVF]Sdu SXt$ VPVhEWT^[t$V_Yt$VPhEt$}VPhxEWTt$kV_Y̋L$ t3#PC$tPCEEE EE},EvE7E0E)E",EEt3EE|$Vt$t$ QPxEpEDPh8EVVSt$0t$0V [jjj V6S4^ÍI}OCOCOCOCOCOCOCOCOCOCOCOCOCOCOCOCPCPCOCPC ̸vlSUVW|$WSWRWRt$$ =FD$tPh E5ȦFcR t1hjURP5ȦF_hD5ȦFSh,E5ȦFSuMSRPSh8E5ȦFQD$$9F|95FFD 3FC) SC$RChDjE5ȦFShjU#[P5ȦF6_hD5ȦFRkh8kE5ȦFYQE@05ȦFVhD5ȦF6Q3hDkE5ȦF!QE@pŃ=FuW5ȦFuu9Fu2W5ȦFt=FuVhPE5ȦFP _^][YÍIQC?RCwRCRCRC̸d&jpF3ĉD$`=FD$hu3L$`3@ldWL$Qjj.PMPPD$3t%thEh^hE_ VhahEW,S u&hD5ȦFO^3_L$`3kdD$ t3thEhvhE6_ $fD$foD$FfD$fD$FD$PD$,PWVjhЪFSVP_VPL$( 9L$xlt$tT$(r;ust=:?t.B:F.tB:Ft B:F L$h^_3jd̸fhSUVt$3WD$3ۿF;v\$thpPV0D tǔC8F|ǃusFV$DЅu_^][YË΍yAu+ρs:i|$XF+ΊvD1uoFFؤFF_^][YËFFBi˔_^]F[FؤFY̸fgAuYVD$D$PhHFt$WHFLDuPDPhE5ȦFMM 3^YSW|$t*jjhLF(D؅u%hE5ȦFMD$_[0^YË Qd$Au+hhEAP6PЃ uhE@DV`D_[3^YËUiIAu+͍APSRN7]uhEfxbhE5ȦFcLV`D_[3^Y̸ fUVt$D$3VUt$ l$Pl$u^] ËD$ W|$ t8S\$4Iu!D$PD$PW; tal$t$t$t$0t$(VUT$<D$t UM|$$ujVXDV`DtKt$x$t t$$jWXDW`D[_^3] jWXDW`D[_^] VW|$ j:W4DuhE5ȦFK_3^ËD$FtPWtD$t8t$Vt_^Vt$V3$|w$@|D$D$ FD$FD$~h4E+t0W,ȃuhE fyt&hE5ȦFI_3^L$3eËA A @FA @FA @L$F_^3^e̸c$$Pt$uYt$D$t$Pt$Y̸bpF3ĉD$Vt$$W|$$|tyt$,WD$fD$u@hE5ȦFo?5ȦF@ VE@[_^hl:E5ȦFB?V#@[_^̸$XSUV3D$,Wt$ t$,t$(t$t$t$95ȦFu3>P>ȦFtD@Pjjj5ȦF>|$83\$ u#VS(7uhhE5ȦF_:[hD5ȦFJ:Ft:D$u WSw< uWSS=uhE5ȦF :D$0t S:V8D$4_^][$̸ SpF3ĉ$SUVW$8\$D$ D$$D$C7=ȦF5DD$ujփ@P<ȦFjփ P<j5ȦFl$$_$4Kj7X Eƍ$:utP:Quu3u D$  EƍI:utP:Quu3uD$$D$ EƊ:utP:Quu3u?7D$EƊ:utP:Quu3u 7D$VjhEV0D ED$I:utP:Quu3K5t$n4؃\$(t1D$PS6hE5ȦFu7335ȦF8t S4t W4\$t U78$,_^][3%S á\$$thEU6Wh#EU6FVSX6uы\$(hDUj6|$D$W.43Ul$ 7VU6|$$txU5ȃ%WPuRh0Et$$51uhPEt$ 5RQhlEt$(5hD$0PUx5Pt$$7l$,FUM6;E\$(|$l$D$̸OSU3D$VW3D$3|$D$D$ 9ȦFuUD@P8ȦF5t$,:-E:utX:Yuu3u D$ DI:utX:Yuu3u9ntL^\$ED :utJ:Huu3u9nt ^\$tphE5ȦF3hE5ȦF3hhD5ȦF3hE5ȦF3hE5ȦF3hE5ȦF30_^][Ë\$t5hDSi4؃\$,u8D$Ph(E5ȦFc3 m5DjP6؃\$,5D|$t1hEW 4t$u/WhtE5ȦF 3 jփ Pf6D$D$ B3jjjSE5t!IPu3jjjS5uuZ3u(D$PhDE5ȦFx25ȦF3wUVzBcjjjScBu D$PhdEu32~1\$Wu2VS蹆VS:5uG2;|׋\$,D$S2t$2UAD$$ _^][̸ KSVWt$ D$PD$PD$PAt$R7V5|$4Ph#EW1$|$AAPt$A؃%3D$PD$PD$PpAt$6sD$$jjPTAt$06P4,PV4PhPEW0Euz|$DAPt$@F uPjD$jP@t$U6P4Pv@Ph\EWy0V@S@L|$u7@Pt$}@tvf@PhtEW20Vx@h4EW1hDW1_^[ ̸ISt$D$p@؃u[YUVWS30l$$WS{0v]5 u(V@D$(t\hE5ȦFz/CuoD$(t'hE5ȦFY/F@p5ȦF}Ut$$V? D$(tCt$,PUt$,Vt$,^hTDVt:.SG/;9D$hhDS.D$_^][Y.̸vHSUl$VWU3d/\$($WUM/604j >$wCthE5ȦFK.FD$hEvPvV>D$BhEvt$ Vt$8jjj5ȪFt$0V11t$8/,t#hE5ȦF-F05ȦFD$hEvPKt$0t$0V>V=D$hEvt$ V=t$-QEƊ:utP:Quu3u L$Eƍ:utP:Quu3u D$XEƍI:utP:Quu3u D$XEƍI:utP:Quu3u L$\Eƍ:utP:Quu3u L$Eƍ:utP:Quu3u L$Dƍ:utP:Quu3u L$Eƍ:utP:Quu3u L$\0Eƍ:utP:Quu3u D$DEƍI:utP:Quu3u D$\EƍI:utP:Quu3u D$Eƍ$:utP:Quu3u D$dYEƍI:utP:Quu3u D$ mEƍI:utP:Quu3u/ȪFmEƐ:utP:Quu3uv'ȪFmEƐ:utP:Quu3u/ȪFWmEƐ:utP:Quu3u0/ȪFmEƐ:utP:Quu3u.ȪFmEƐ:utP:Quu3u.ȪFmEƐ:utP:Quu3u.ȪFWmEƐ:utP:Quu3uH.ȪFmEƐ:utP:Quu3u.ȪFEƐ:utP:Quu3u D$pEƍI:utP:Quu3u D$LYEƍI:utP:Quu3u D$LEƍI:utP:Quu3u D$LEƍI:utP:Quu3u9GGD$hDƊ:utP:Quu3uȪFW$EƐ:utP:Quu3GD$dwP5ȦFM uwl$Hh\E5ȦF!hhD5ȦF!hxE5ȦF!hE5ȦF!hE5ȦF!hE5ȦF!hE5ȦF!hDE5ȦF!@hpE5ȦFl!hE5ȦF\!hE5ȦFL!hE5ȦFL$3ۋ\$33<uh,E5ȦFNfD$DE‰D$Du:$ɋD$Thʃt?It<tRhEWR R@0p!VhDW2V,@0pWhDWhEWl$CU;^_[]Vt$th@?EƊ:utP:Quu3uD$ ^V,L$uVhE5ȦFj 3^̸*pF3ĉ$3D$(SD$03ۉD$DD$8D$4D$@D$$UD$L33D$@V$WD$D$4D$D$D$$D$,D$XȦF|$uPD@P2ȦFjPs#D$(D$ 8S~7>- Eƍ:utP:Quu3uE9ot+wD$0u7hrE5ȦF w_EƊ:utP:Quu3u&9otw^t$u7hE뇹EI:utP:Quu3u=9oWwjjjPjD$(47hEDƍI:utP:Quu3u 9ow3D$(PDƊ:utP:Quu3u 9owD$ 8EƊ:utP:Quu3u D$LHEƍI:utP:Quu3u D$T@EƍI:utP:Quu3u D$4LEƍI:utP:Quu3u D$TEƍI:utP:Quu3u D$H\EƍI:utP:Quu3u D$DƍI:utP:Quu3u9/9D$PDƊ:utP:Quu3u9/D$Dy Dƍd$:utP:Quu3u9/D$X/DƊ:utP:Quu3u9oGD$HDd$:utN:Huu39oGD$<hdE5ȦF hhD5ȦF{ hEE5ȦFk h|E5ȦF[ hE5ȦFK hE5ȦF; hEE5ȦF+ hE5ȦF @h4E5ȦF hXE5ȦF hE5ȦF hE5ȦF hE5ȦF h t$D装t$PT W6 D$<t P L$,t Q $_^][3%ĄËD$XjP5ȦFD$DD$8PD$4PD$XPD$hP5ȦFON u h,D6|$u 9l$0 Dt$Ht7hEV ȃL$u8Vh(E5ȦF |$3DjP D$DD$u|$jjjW3|$jW3u|$jjjWs|$jWzD$u'h,E5ȦF5ȦF2t$ t$$ujh@Et$dj2P ΍Q$Au+QVt$VC u#hPE5ȦF*5ȦF UȃL$uhEȃ}tVhhE5ȦFEHw#$\ChEhEhE hEhF5ȦFL$ D$ ut$,jjjjQS3uQS3htE5ȦFUԞC۞CCC̸@3SUV3D$W3D$8D$43D$(3ۉD$LD$@D$D$$D$ D$DD$D$,D$0ȦF|$<~uPD@P>ȦFjPgD$D$HD_ t$X>?-DǍ:utP:Quu3u 9n=vsD$+PDNJ:utP:Quu3u 9nv#D$HDNJ:utP:Quu3u9.D$8DNJ:utP:Quu3u9.oD$4O DǍd$:utP:Quu3u9.%D$0DNJ:utP:Quu3u9nFD$DNj:utP:Quu3u9n}FD$-YDƍ:utP:Quu3u9GtSGD$ DƊ:utP:Quu3u9GtGD$ DƊ:utP:Quu3u9D$qLDƊ:utP:Quu3u D$$7DI:utN:Huu3DhXF5ȦFThhD5ȦFDhEE5ȦF4hEE5ȦF$htF5ȦFhF5ȦFh\E5ȦF8_^][ËD$jP5ȦFʀ\$, t-hDSu0Sh(E5ȦF DjPDD$t2hEPL؃\$u0D$PhtE5ȦFF yjӃ PD$jVwD$u hF5ȦF5ȦF 0uPSCD$L$$tjjPS D$(t$Wvt$ VD$8_^][̋D$=ftGt% ut$t$t$t$t$ 3t$t$t$t$t$f t$t$t$t$t$m =t=ut$t$t$ h  t$t$t$t$t$9 ̸S\$UVW|$,33t$ttuthDE5ȦF^jD$Pjt$45ȦF=uhE5ȦFY'D$0Kt[Kt9KuyhDEPSt$,t$,5ȦFbV؃tVSSChCEPjjt$0t$05ȦFdhDPt$jt$0t$05ȦF_UL$9t$4ED$0PUUt ti1t'tt uEV6V.V|&VtuVV V-3D$t P_^][Y̸XS3D$$U3ۉD$L2ɉ\$H\$h3VW|$lD$XOD$8L$L$L$3ɉD$$D$dD$?-|DEǍ:utP:Quu3uD$ t$'DENJ:utP:Quu3uD$ "t$DNJ:utP:Quu3uD$ St$FǍd$:utP:Quu3uD$ vt$WDNJ:utP:Quu3uD$ $t$FNJ:utP:Quu3uD$ 5t$mEǍd$:utP:Quu3ut$t$mENJ:utP:Quu3ut$t$=mENj:utP:Quu3ut$t$ FNJ:utP:Quu3ut$t$ FNj:utP:Quu3ut$t$d FNJ:utP:Quu3uot$t$ mENj:utP:Quu3ut$t$ mENJ:utP:Quu3u?t$t$ mENj:utP:Quu3ut$t$D mENJ:utP:Quu3ut$t$ mENj:utP:Quu3uxt$t$ mENJ:utP:Quu3u7t$t$m LDNj:utP:Quu3ut$, Fǐ:utP:Quu3ut$ Eǐ:utP:Quu3u t$ Fǐ:utP:Quu3ut$l Eǐ:utP:Quu3ut$, Fǐ:utP:Quu3ut$ FNJ:utP:Quu3u㿃t$ $FNJ:utP:Quu3ut$h ,DNJ:utP:Quu3uˀt$& 0FNJ:utP:Quu3ut$8FNJ:utP:Quu3uD$Ht$@FNJ:utP:Quu3uD$Ht$_HFǍd$:utP:Quu3uD$Ht$TFNJ:utP:Quu3ut$`FNJ:utP:Quu3ut$DNJ:utP:Quu3u,9t$$D$@t$; DNJ:utP:Quu3u!9vt$D$t$DNJ:utP:Quu3u$9%t$$t$lFNJ:utP:Quu3u$9t$$t$BpFǍ$:utP:Quu3u$9vt$$t$@DNJ:utP:Quu3u$9"t$$t$xFNJ:utP:Quu3u9F|$(tKD$,u D$,WPt$D$4Du D$4VPt$D$t$D$(t$FNJ:utP:Quu3u!9%t$D$Xt$ ENJ:utP:Quu3uH~FD$0$.D$0hF5ȦF LDEǍ:utP:Quu3x9FT|$tNt$(!D$,u 3D$,VP4D$<D$(u D$4WPt$t$D$t$oDǍd$:utP:Quu3u/~FD$0Yt$D$ht$ 9Eǐ:utP:Quu3u$9Ft$$t$DNJ:utP:Quu3u$9t$$t$cDNJ:utP:Quu3u$9t$$t$DǍd$:utP:Quu3u!9Ft$D$lt$DNJ:utP:Quu3u/~FD$0^Wt$D$|t$[PDNJ:utP:Quu3u/~FD$0Vt$D$\t$Dǐ:utP:Quu3u$96t$$t$F:utO:Huu3u!9t$$t$XD$pP5ȦFD$8PD$jP(u1D$@PD$0DD$0t$t$t$|$0qD$ @u&9|$4uL$,thF5ȦF:L$,t$t|$(uhF5ȦF|$(t>u ȉL$,t$(QD$<u D$4Dt$(VPD$,uhF5ȦFD$0D$(D$t$@v"u/|$Xb|$u[hF5ȦFD$0Mu+>uh@F5ȦFaD$0t$@u D$0t$@|$07hlF5ȦFhhD5ȦFhF5ȦFhF5ȦFhF5ȦFhF5ȦFh$ F5ȦFhL F5ȦF@ht F5ȦFh F5ȦFh F5ȦF{h F5ȦFkh F5ȦF[hE5ȦFKh8 F5ȦF;hTE5ȦF+@hh F5ȦFh F5ȦFh F5ȦFh F5ȦFhD F5ȦFh F5ȦFh F5ȦFh F5ȦF@h F5ȦFh4 F5ȦFh\ F5ȦFuh F5ȦFeh F5ȦFUh F5ȦFEh0 F5ȦF5hl F5ȦF%@h F5ȦFh F5ȦFh F5ȦFh(F5ȦFhHF5ȦFh`F5ȦFhF5ȦFhF5ȦF@hF5ȦFh0F5ȦFhF5ȦFohF5ȦF_hF5ȦFOj;j;hE5ȦF;h@F5ȦF+@h E5ȦFhF5ȦF333_jt$ 5ȦFNjD$LD$pPj$5ȦF? u!hE5ȦF333_t=$3P5ȦFj藂 tV誃Ph` E5ȦFaD$u㿋L$ t|$\uD$tTDÀTDED‰D$t t|$|u$DŽ$EÀEDD‰$`uL$D$T9tChFt$@jj15ȦF%ZPt$XwL$L$9u$t=h\Dt$@jjP5ȦF)D$Pu5ȦF333_L$XD$ tF"uJhFt$@jjQ5ȦFL%D$d5ȦF333 "Su:D$uD$(t*hFt$@t$hjt$xP5ȦF.D$t9D$ltJ$RPrD$8uFD$lPh(E5ȦFn 33L$XD$ujDPD$8L$|u L$DQP'ujjjPzjPD$$uhF5ȦF|$,3$tZt$DhEV D$Du;Vh0F5ȦF|$0 3hF5ȦFv33$t5T$tRV8ȃL$u5VhtE5ȦF6 |$$CjD PD$D$ $uJ$$5ȦFXL t$xthCVL$xt QVD$ D$u+|$Htt$8SUVt$`gD$ S|@t |$\u|$Htl$P@St$-<DEI:utP:Quu3uD$$xDEƊ:utP:Quu3uD$$"x"DƊ:utP:Quu3uD$$SxSeDFƊ:utP:Quu3uD$$?x?%FƊ:utP:Quu3uD$$vxvDƊ:utP:Quu3uD$$$x$TFƊ:utP:Quu3uDŽ$edFƊ:utP:Quu3u+D$$09E|$$l$E$ tFI:utP:Quu3uD$$5x5|FƊ:utP:Quu3uD$$'x'FƊ:utP:Quu3uD$$xEFƊ:utP:Quu3uD$$)x)FƊ:utP:Quu3uD$$xFƊ:utP:Quu3uD$$xFƊ:utP:Quu3uD$$+x+EFƊ:utP:Quu3uD$$-x-FƊ:utP:Quu3uD$$xmEƊ:utP:Quu3u膺l$D$(mEƊ:utP:Quu3uxl$D$(AFƊ:utP:Quu3u0l$D$pmEƊ:utP:Quu3ul$D$(FƊ:utP:Quu3uXl$D$({Fƍ:utP:Quu3u l$D$(3FƊ:utP:Quu3ul$D$(mEƊ:utP:Quu3ul$D$(mEƊ:utP:Quu3ul$D$(mmEƊ:utP:Quu3utl$D$(+ Fƍ:utP:Quu3ul$D$pFƊ:utP:Quu3ul$D$p,FƊ:utP:Quu3ul$D$p_mEƊ:utP:Quu3ull$D$(mEƊ:utP:Quu3u0l$D$(mEƍ:utP:Quu3ul$D$(<FƊ:utP:Quu3u TLDƍI:utP:Quu3uFƊ:utP:Quu3uEƊ:utP:Quu3LFƊ:utP:Quu3vEƊ:utP:Quu3uAFƊ:utP:Quu3u FI:utP:Quu3u$FƊ:utP:Quu3u ,DƊ:utP:Quu3u ˀSdFƋ:utP:Quu3u 0FI:utP:Quu3u lFƊ:utP:Quu3uFƊ:utP:Quu3ui8FƊ:utP:Quu3u .@FƊ:utP:Quu3u  HFƋ:utP:Quu3u TFI:utP:Quu3u v `FI:utP:Quu3u 6 DI:utP:Quu3uDŽ$ FƊ:utP:Quu3uDŽ$ FƊ:utP:Quu3u $y Fƍd$:utP:Quu3uDŽ$5 FƊ:utP:Quu3u<}E|$XD$u D$XD$0t$\l$ Fƍd$:utP:Quu3u<}E-|$`D$u 脯D$`D$0t$d}l$Y 8Eƍd$:utP:Quu3uDŽ$DŽ$ FI:utP:Quu3uC}Em $D$Q0蟸D$8 $l$D$x FƊ:utP:Quu3uF}E $D$Q0,D$d $l$$ @Fƍ$:utP:Quu3u9E~ l$ED$h PFƍd$:utP:Quu3u5}E- D$j0s$ l$` DƊ:utP:Quu3u'9E l$E$D$P Dƍd$:utP:Quu3u9En l$E$DƐ:utP:Quu3u9E l$E$flFƐ:utP:Quu3u9E l$E$pFƐ:utP:Quu3u9E~ l$E$@DƐ:utP:Quu3u9E. l$E$vxFƐ:utP:Quu3uo9E t$4tKD$@u 3D$@VP4l$ D$HDu D$HUPl$D$l$ED$4FƐ:utP:Quu39E= uat$Du蒪l$t$DhFjjjl$ u5ȦFD$tK PV^l$D$t2l$E$pFƍ$:utP:Quu3u9E~l$E$ EƐ:utP:Quu3u3}E-D$0y$l$bLDEƊ:utP:Quu3ur9Et$tNl$4D$@u D$@UPD$PD$4u D$HVPl$l$ED$DƊ:utP:Quu3u+}E(D$0/l$$e|FƊ:utP:Quu39E|$$uD$DP x#|$u|$4t3D$HtPl$$t98tShhFj I k>譧|$lFFut$l $pl$Ɖ$l$upyl$|$$QFƊ:utP:Quu3u+}ED$0.l$$9EƐ:utP:Quu3u9E^l$E$DƐ:utP:Quu3u9El$E$VDƐ:utP:Quu3u9El$E$DƐ:utP:Quu3u9Enl$E$DƐ:utP:Quu3u+}ED$0,l$$ZPDI:utP:Quu3u+}ED$0,l$$DI:utP:Quu3u9E^l$E$FI:utN:Huu3u9El$E$ Y$P5ȦFD$TPD$jPu&D$@Pl$D$(uD$L l$ \$ l$|$L$u |$XL$`hF5ȦFkZD$0hF5ȦF٢ <D$0h0F5ȦF転 D$0h`F5ȦF蝢 D$0hF5ȦF hE5ȦFghF5ȦFO3L$`t$D$$؃@u"u9L$XthF5ȦF芣yu&9\$Hu|$@thF5ȦF`O|$@l$4tuhF5ȦF0t9u y|$@UWxD$Pu \D$HDVPXuhF5ȦFcD$LD$43t$P"u?$}9t$8uw9t$huqhF5ȦF D$LguA}u0|$8u)|$hu"|$Duh@F5ȦF̠D$Lt$Pu D$Lt$Pl$|$LghF5ȦF腠hhD5ȦFuhF5ȦFehF5ȦFUhF5ȦFEhF5ȦF5h$F5ȦF%hL F5ȦF@ht F5ȦFh F5ȦFh F5ȦFh F5ȦFҟh F5ȦFŸhE5ȦF貟h8 F5ȦF袟hTE5ȦF蒟@hh F5ȦFh F5ȦFoh F5ȦF_h F5ȦFOhD F5ȦF?h F5ȦF/h F5ȦFh F5ȦF@h F5ȦFhLF5ȦFh4 F5ȦFܞh\ F5ȦF̞htF5ȦF輞h F5ȦF謞h F5ȦF蜞h F5ȦF茞@h0 F5ȦFyhF5ȦFihl F5ȦFYh F5ȦFIh F5ȦF9h F5ȦF)h(F5ȦFhHF5ȦF @h`F5ȦFhF5ȦFhF5ȦF֝hF5ȦFƝh0F5ȦF趝hF5ȦF覝hF5ȦF薝hF5ȦF膝@j;j;hE5ȦFoh@F5ȦF_h E5ȦFOhF5ȦF?(333ۍw]j$5ȦF#jD$d$Pj$(5ȦFp u!hE5ȦF333ۍut=$3P5ȦFjV tVWPh` E5ȦF蒜L$ D$uΈL$ T$$t$u$DŽ$TDTDEDlj$E t$u$ǹDD$|$(u 赝D$(|$8t%|$duhF5ȦFכ333D$8tc|$Du 膜D$DD$8tJhFt$Xjj05ȦFD$ttPt$HVD$D$tD$8u$t;h\Dt$XjjP5ȦFD$u5ȦFś33>$D$$t;"u6hFt$XjjQ5ȦF"$t$uKC?u,hFt$Xjjt$D5ȦFD$\un"tƒSu@ul$4t4hFt$X$j$U5ȦFD$02$t8$QUȃL$,u4Uh(E5ȦF 336jDPsD$,ȅ($u D$hXF5ȦF3$$t2$WVȘD$u1VhtE5ȦFȗ jD P!D$D$$$t0uT$$5ȦF $hCV耗$t QVeD$$t$u\$ t$,SV藩"\$ t$,S$V D$$|$09hF5ȦF|$\$t$5ȦFh|$Pt5ȦFjwRh&Dt$H膖h&DS{$t PD$@t PFD$Ht P5D$8t P躗D$dt P詗$t P蕗$t PG$t P%D$`t PƖD$Xt P赖\$lts袖sS/ޅut$$贕t$x$t$ht$@[U蛧$菧t$p$(Dt$P;t$d2WD$0t Q蜖_^][ Ãu\$ t$,SjV\$ @St$,\$(t$4jzzt$D3V艕WV}L$tt9>t vu \$ SPUM؃ tS0vP }Sut$ptSZjjjVP蕟t$DGV\$$;\L$8tt vu \$ S$Rt$hUm؃tS\vP s$tPSNVt$\訑t$4D$dt$HGVD$<̑\$, ;D$$\$ Su*t$,SjVU&t$,D$"tSjjjjU3D$8t5$t$h$PUuhF5ȦFȑot*$WU uhF5ȦF蚑AD$ht%jPUƢ uh(F5ȦFm|$SWt$DjjU脢hPF5ȦFŏ'u&|$SWU \$3t$+u*|$SWt$DUW\$$3t$)uQ|$SWt$DU¡~"hF5ȦF7\$3t$bhF5ȦF4-u5|$SWt$D$t$HUm\$, 3t$$|$S\$Wt$D$SU:hF5ȦF蓎\$<tEUVSA u&ShF5ȦFa\$  t${V$U5ȦF\$3t$ThF5ȦF$!5F t$ 0u_S$\$SU$Q~"hF5ȦF訍|$ 3t$hF5ȦF膍|$ $t/$|$*jjUW\$$3t$~$uq$|$tPhFW $tPhFW $tPhFW |$$vSu t$@UW 0VUW&u|$SVUWu*|$SVUWܞ_\$t$hpFW|$ W#_SUVW3 ~*l$VWSU~WF;|^][_ShD5ȦF5ȦF菌3^][_̸薥UVt$3Vl$ 肌~uS\$W$UVm3U] ~4VUUhESWS}hDSތUF)$;|̋l$t$EVl$;|_[^]Y̸SUVW3D$l$3Uы~\SUɋjPjjjj tFt;WV谋t-Vt$3蝋tU3Cu;|D$_^][YhDt$xt V藜t Wx_^]3[YVt$&tL$tQu3^3VPt$jj5^̸֣SUt$$3U迊]Vt$$WSU譊L$ QPڜCShF5ȦF‰uhF5ȦFy#hF5ȦF5ȦF( D$ PD$PD$$PD$Pt$(whFVʊt$,]t$0XjWPVHhFV衊<|$thFV茊t$V6ujhhTFSφ u_^[ȉD$QAu+ʋT$UjBu+Ջ/ ;r0jr+hTFP6 ut$}3]_^[Ë8t7hЏEP} 7t$6m ]_^[̸,膜SUVD$4D$(D$,D$0cD$ZD$ QD$$3~ȦF-DuSՃ@P˅ȦFjPaWjՃ P袅\$H|$DKD$-0DjhX E7Ճ AVFuhTFQ+D;r7FNFu+t$8"XFXFt($Ph#E5ȦF臁Fv u\$_5ȦFh(Dt$$?h(Dt$01h(Dt$<#t S0^][,Ë7DƐ:utP:Quu3u D$,TjhXFVՃ uWAD$0VFuh\FQ+D;AQIAu+ʍqt$47`FƊ:utP:Quu3uK7t$(hFƍd$:utP:Quu3uKE7t$,WjhEVՃ (7Eƍ$:utP:Quu3Vt$$oKy\$ S=u'蓒tV[PS6V耒uS3USV! DWH\$PVhpFShLFSt$@W[W(:utH:Nuu3t"WPW諍Ph|FS~|$,WD$D$趑t$hD$PD$hDEPW苑t$hD$PD$hHEPW`t$hD$PD$hFPbyW5t$hD$PD$hFP1HW tMjL$ QjWЋ؃3~6hD$PD$$4 PD$ PF;|W趐tSjL$ QjWЋ؃3~<hD$PD$$4謀PD$ P|F;|W\tSjL$ QjWЋ؃3~<hD$PD$$4LPD$ P/F;|̋D$\$t8tPhFS| t$}|$0tohLFh#ESa|W]t&hFSI|hLFSt$8WW9,hFS#||$4tD P,|D$8~hLFSPWlW~\$$ 5ȦFm|ES|;\$3:̸VpF3ĉ$$U$$V$$WVD$t$ ||$y&hFUB{_^]$35S3ۅd$SV{hEVDD$u3PPVt$uiVh<FUzUu{t$C;|h+NWD$$VPɖ s^D$j@D<$PD$(Pt$}|$$tVh,FUpz h FU`z$ [_^]3Rj̋D$ SUVt$3WPPhdFV3z\$(uhxFVzG_^][thFVythFVyt*thFVyhFVyt*thFVyhFVyyt!thFV]yShFVNy thFVjWt$jt$0Ć!D$(ut$,P1yhЏEPw|$$u^\$,ˍQAu+;~1͍QAu+ʍ1N~t$(hDVdwSVx\$(Uh#ESHw =t$(FEPUhFV&w|$$|t$,SV t\3\$(Ulx3t W]x3jjt$j t$0D$~hDSvD$h(Dt$vt Uxt WwD$_^][ _^][ W|$uh.F5ȦFOv3_Vt$ >u t?Wt$t$ۀ t(Wt$ vtW6迀t^_h.F5ȦFu3^_W|$uh.F5ȦFu3_SUVt$>u臀W!vW|$ WjD$0x؃uWh/F5ȦFeu 3^][_St$$Ut$(ڈSvt*Wt$(vtW6t ^][_h.F5ȦFu3^][_̸趎pF3ĉ$S$U$VW$ 3VVjeWt%h/F5ȦFt5ȦF;u 3WD$hPW;w0DujD$h 0FPӃ u(pD$< t2< t.hD$PWw Qh0F5ȦFttW t3_^_^̸pF3ĉD$D$$WS\$$VWjPD$D$$D$({xuh/Fhnh/F耂 ~u hl0E7tVw|$VwD$PjswWsL$8_^[3}̸$&SUVWt$<333t$3D$(Wj!'jjt؃D$`tT$\+T$\jRPjSt3D$$9D$(Pt$@謅P謅D$8VjjPj蟅t$LrwP>uPps,D$ D$t Pk|t$Djt$(5|VPD$(8tUSjjjVWFVD$4Pjjj!t$Dt$Xȃt‹-Dƍ:utP:Quu3u9G|$D$T/EI:utP:Quu3uMGD$0Ճ$D$0hF5ȦFl D$FƍI:utP:Quu3D$lt Pm|$D$tt Pm|$D$|t Pm|$GD$|D$tD$l$D$QL$lQL$8QL$XQ0vuhE5ȦFkD$D$LD$lD$0D$tD$hD$|Eƍ$:utP:Quu3u9GC|$D$L_EI:utP:Quu3u9G|$D$0FI:utP:Quu3uEƍ:utP:Quu3uDŽ$ LDƊ:utP:Quu3uDŽ$DŽ$ FI:utP:Quu3uDŽ$J FƊ:utP:Quu3uDŽ$ FƊ:utP:Quu3u9G |$$ FƋ:utP:Quu3u9GS |$$l xFƋ:utP:Quu3u9G |$D$D FI:utP:Quu3u&9GL$ |$$FƊ:utP:Quu3u9G]|$$vFƊ:utP:Quu3u9G|$$(DƊ:utP:Quu3u9G|$$D:utN:Huu3u9Gs|$$$P5ȦFD$PD$jPʪt|$|$$3ۋt$k? |$F7Ɗ:utP:Quu3u7GD$0Ճ$D$0h F, FƋ:utP:Quu3u7GoD$0Ճ$D$0h8 FTgEƊ:utP:Quu3u9G |$$%T FƊ:utP:Quu3u9G|$D$\\ FƊ:utP:Quu3u9Gs|$$h FƋ:utP:Quu3u9G#|$D$h?>EI:utP:Quu3uJGt$HD$aD$hp Fjjj05ȦF!D$Hj"Eƍ:utP:Quu3GK$D$`D$h$Ejjj05ȦF蚾$uYgt$XD$(t$LSVPD$0t$T` hEƍ:utP:Quu3u:GD$u f؋D$t$Xt$LS0D$4Pf Fƍ:utP:Quu3u9G|$D$@/`gEI:utP:Quu3u9G|$$ FƋ:utP:Quu3u\Gt;D$0Ճ$y!D$0h F5ȦF^ D$|$|$p-D$pN Fƍd$:utP:Quu3u7GD$0Ճ$D$0h F FƊ:utP:Quu3u4GxD$0ՃD$pD$0h F FI:utP:Quu3u9G|$$, FƋ:utP:Quu3u9G|$$ FƋ:utP:Quu3u9Gtw|$$ Fƍ:utP:Quu3u6Gt#D$0^$u4D$*D$$FP]؃D$۹DD$|$|$|$[|$$$t$Tu%u!$u|$0> |$@3 |$0 thEV\DDjӃ P_D$,u#hF5ȦF{[3ۋt$ID$43ɃED$4HpEŊ:utP:Quu3u PP^ hEU[u h,FijVhDhD^V|$8[u'h8,F:D$0tP D$8+$$hT,FjjjP5ȦFD詸D$`u hl,Fh$Ejjj$5ȦFwD$|$t)h,FjjjP5ȦFλ$h,FjjjjS5ȦFD$xdD$8th,F5ȦFYD$@t$l$DtLt$0PD$ PD$0P|$4Wj`m؋D$ SP\$8e~u\$\u9\$Lu9\$4u 9\$@Ih,F5ȦF+Y\$5ȦFY$Y$Y$ t PZY$Zt$|Zt$PEY$9Yt$p0Yt$x'YSVYt$XYt$PuYWkct$TJc$8pl$-w$DƊ:utP:Quu3u D$1FƐ:utP:Quu3uL$1FƋ:utP:Quu3uOs|$0u j@D$t%PVTtt$4VTu!\$VoTh5F5ȦF3? WlTUBTSDAt$ Et$(\A_^][ ̸fYSUVWhEt$(33l@؃\$7t$|$WT؃_T VhlDSWTt$ SWT Vt$4SW{TVt$8SWjTVt$,t$4SWUTVt$؃USQRUWS|_^]3[RBthEURi>Fts?D$t7L$JQPHFuh<7F5ȦFF=9D$Ft$$t$$FtD$(tPbRFu V:R3S=WcQ_^][̸VVt$ D$Wu*=Dh$E׋uh$E׋u_^Yj=tD$PVW= 2D$Vh8$E5ȦFV< Ph\$E5ȦF@<VhHD5ȦF$<hDjW=t5hDP<u5ȦF<V0=V<r<W5ȦF}u5ȦFZ<_^Y̸fUpF3ĉ$SU$3VW3DhDUK<؃u';Uh6F5ȦFH;jV$BthqhD$PVSBHuUhE5ȦF; 8jV@t'V<jW3? tVWh@u Vc<3S;W?$_^][3V̸VTD$ SUVW3D$333t$hEPK;VUNQD$u/DL$u QP= hEQ;؃tvD$t$,t$,t$,t$,PStRDL$4 u QPQ= hTDQ:t$|$8WVtN2NtD$5ȦF<:U:S:V:WMD$$_^][Y̸&SSUVW3D$Wt$33?tZUM؃tKMt@Mt5j7?t%WVMtSUVM D$33U?SM|$u VYM3WlM_^][Y̋D$(SUVW3333t7hEPm9؃9t$ WCLthp6F5ȦF}75ȦF8Sk8jd8j]8jV8WP8VK_^][VWhEt$3 8t6t$V!>~%hDVu8~V7_^t$ h7F5ȦF6 V7_^Vt$ WVu!t$ h6FjVKjVK_^WVC_^̸l&PSD$(UD$33D$`3D$<l$\$ \$HD$(D$8D$D$DD$ D$4D$0D$D$D$@D$XD$TD$PD$lD$hD$dD$\D$$D$LD$p|6ȦFu@5P5ȦFt)D$pD@Pjjj5ȦF5ȦFVWjP虙?$$Nd$DÍ$:utP:Quu3uN6 GD$4 2FI:utP:Quu3uNGD$h2FI:utP:Quu3uhx2FÊ:utP:Quu3uNVGD$$-2FI:utP:Quu3uN_\$DI:utP:Quu3uNGD$0"EI:utP:Quu3uNfGD$@=FI:utP:Quu3u\$L$"EÊ:utP:Quu3u D$LDÐ:utP:Quu3uNGD$(m2FI:utP:Quu3u D$,+DÍI:utP:Quu3uNGD$<2FI:utP:Quu3u D$TLDÍI:utP:Quu3u D$8[2FÍI:utP:Quu3u:h2FÊ:utP:Quu3uNGD$ DI:utP:Quu3u#NG\$L$D$LDEÊ:utP:Quu3uNSGD$`*xFË:utP:Quu3uNGD$\0EI:utP:Quu3uNGD$XDI:utP:Quu3ujhHDÊ:utP:Quu3uN&GD$tDI:utP:Quu3uNGD$pDI:utP:Quu3uNGD$l` DÊ:utP:Quu3uN>GD$dCP/D$P\$L$D$NucU5ȦFQ D$0uu h E5ȦF-PPh` E5ȦF-jL$LQjP5ȦFrumh2F5ȦF:-5ȦFjt$Lx.t$T.O.|$x_^t5ȦF-ȦF][lÃw$DxDt$$tt$4t$WY?_^][YS\$ u[VW|$3Gp*|$Iuh~]GVp*ȃ8Iu1I ÍI:utP:Quu3t|GFpI*;|_^[Å~GVp1*9It.H Ê:utP:Quu3tGFp);|_^[_^[t$t$hl,E5ȦF(̋D$ xW|$tPVWPD$@p)w t$(h9Ft$$(3I4Vh9F5ȦF(F|_^W|$~[S\$ UVt$CVp4)M9It4h9FWVt$$VSah9FWjIuS- PVSB^][_̸(ApF3ĉ$$$0$,D$$4D$$8S$HD$$@VD$ 3$HWD$$D$$PjD$4L$ hPt$L$89$Tt$D<,tt$t$ Vh:FSU't$D$t$t$PD$%P%=ȦFt"D@Pjjj5ȦF%=ȦF3ɋ$D$H$t$I6Dƍ$:utP:Quu3uD$$t$ DƊ:utP:Quu3u'$t$I$^"EI:utP:Quu3u,$t$I$BFFTEƍd$:utP:Quu3u+$t$I$VT$(:FI:utP:Quu3u$t$D$L;FƊ:utP:Quu3u$t$D$H`;FƊ:utP:Quu3u$t$D$D;FƊ:utP:Quu3u$t$D$;FƊ:utP:Quu3u+$t$I$bVT$8u;FI:utP:Quu3u+$t$I$FD$PDI:utP:Quu3u+$t$I$VT$<DI:utP:Quu3u($t$I$BVT$$X D:utN:Huu3t$$I$VT$XI$t$3ɋt$(tth(;FW!=ȦFt$F5ȦF|$, D$F5ȦFj jIwt$(Q xD$ V@ptH@G3t$5ȦFt$pQPwwUJ UT$tUh>F5ȦFT$ tCK33R5ȦF_t$\wPQSVUȃ Qv$G  ?>;l$PtUG|$ =|$HtBy Uh?FGVpUhH?F5ȦFRD$0L$$\$$HT$$~D$(D$33ɉL$h=F5ȦFD$$ @/Uh>F5ȦFD$$ \$@Uh>Fߋ\$D$tPh?F5ȦFf \$4D$,t Pt5ȦFD$\t5ȦFPFt PmD$ t PHit$d<0$_^][3/Ā̸$-pF3ĉ$ $0$(S$DD$$8UD$ $@V$8D$$HWD$$3D$$L$PWD$4D$ hPL$8̈$TD,,tt$ t$t$$Vt$ h:FS~D$,PhP:FS t$D$t$$PD$(PD$uS 3[_^ ÃuShDB뮃uShDe!SZ 3[_^ [_^ [_^ _3^ ̋D$jpD$ p0D ̋D$pËD$tPjPnPhDt$ ËD$ FFEȋD$ ERQhFFt$ ̋D$tPPPhDt$ u ËD$ FFEȋD$ ERQhFFt$H ̸#V30 SW|$$EFV PD$PD$(PD$PD$,PD$(P D$ t/t$_ PhEFW t$(J PhEFW ^t$hEFW D$EFDPhEFW t$( PhEFWx D$L$8S$l @ЃW5ȦF5FjD$ht CPAPV؃ |$`3CFCFDՃ PVDՃ PDPSWD?ǍP@u+ƒ~|8\u +뒍D$PD$ PD$hPD$,PVtMt$t$t$ V xVtD$0hCF5ȦF) jjj 5ȦFhDF5ȦFt$t$3ۋD$t PIFtP%Ft VD$ t PjY:j~5ȦFUȦF tP5ȦFSD39 FtF@ A8uWh Dj QhFDhDhDu_Ã=FVFtVW ~u^_%dD%hD%lD%pD%tD%xD%|D%D%D%D%D%D%D%D%D%D%D%D%D%D%D%D% D%D%D%D%D%`D%\D%XD%TD%PD%LD%HD%DD%@D%OKgOR %!Jc ;; x ~twu 8 Nt0  jl\`ml?5Hk ]I  / 0 |[CDB=;76  Q%z/MLnsW _bGMf V7 @C ^ s H { | ` m=  { !M w L3 O P S* ev  ebY\" ~d e P+o S Jfo):5J`:klT v  ) V e z Z Y Uz on| "] N d ` `   . R<FUc c  5MF.(-&#[_P  [h a m ] V G D^XV5 Hkc P y } ZY[L M L 6  a  H ) D  f d T D      mQi >9 oPtP W  ! | x %&p | O "l  zUD/.|$kji_^EO]kafbg^_zo6 x|b1jprm}glrn32tu adaZaLa>a4a,aa`````````|`j`Z`L`>`2```___________v_l_`_V_N_D_:_0_$____^^^^^^^^^^^^^~^v^l^b^X^P^H^@^6^.^$^^^^^]]]va1RO}7uW;pv:-lN#0C@H>6K=x!I^H?SMAJ cdg/&#afe(y "SX%i'x$.;Z<IE<F=Btn:U p`8V+mcibwG(&~yn}{tTV ]4zw*qts743 oVDDpDiDY}`H`8Y H8-CApath-CAfile-untrusted-trusted-CRLfile-crl_download-engine-help-verboseError loading file %s Error loading directory %s untrusted certificatestrusted certificatesother CRLsusage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check] [-no_alt_chains] [-attime timestamp] [-engine e] cert1 cert2 ... recognized usages: %-10s %s certificate filestdin%s: OK [CRL path]%serror %d at %d depth lookup:%s Memory allocation failure -inform-in-out-i-noout-oid-offset-length-dump-dlimit-strparse-genstr-genconfunknown option %s %s [options] outfile where options are -inform arg input format - DER or PEM -outform arg output format - DER or PEM -in arg input file -out arg output file -text text form of request -pubkey output public key -noout do not output REQ -verify verify signature on REQ -modulus RSA modulus -nodes don't encrypt the output key -engine e use engine e, possibly a hardware device -subject output the request's subject -passin private key password source -key file use the private key contained in file -keyform arg key file format -keyout arg file to send the key to -rand file%cfile%c... load the file (or the files in the directory) into the random number generator -newkey rsa:bits generate a new RSA key of 'bits' in size -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file' -newkey ec:file generate a new EC key, parameters taken from CA in 'file' -[digest] Digest to sign with (md5, sha1, md2, mdc2, md4) -config file request template file. -subj arg set or modify request subject -multivalue-rdn enable support for multivalued RDNs -new new request. -batch do not ask anything during request generation -x509 output a x509 structure instead of a cert. req. -days number of days a certificate generated by -x509 is valid for. -set_serial serial number to use for a certificate generated by -x509. -newhdr output "NEW" in the header lines -asn1-kludge Output the 'request' in a format that is wrong but some CA's have been reported as requiring -extensions .. specify certificate extension section (override value in config file) -reqexts .. specify request extension section (override value in config file) -utf8 input characters are UTF8 (default ASCII) -nameopt arg - various certificate name options -reqopt arg - various request text options Error getting passwords Using configuration from %s error on line %ld of %s Unable to load config info from %s oid_filerdefault_mdreqx509_extensionsError Loading extension section %s input_passwordoutput_passwordstring_maskInvalid global string mask setting %s utf8yesreq_extensionsError Loading request extension section %s Private KeyRANDFILEdefault_bitsprivate key length is too short, it needs to be at least %d bits, not %ld parameter error "%s" Generating a %ld bit %s private key Error Generating Key default_keyfilewriting new private key to stdout writing new private key to '%s' encrypt_rsa_keyencrypt_keyno----- bad input format specified for X509 request unable to load X509 request you need to specify a private key problems making Certificate Request Cannot modifiy certificate subject Modifying Request's Subject old subject=ERROR: cannot modify subject new subject=verify failure verify OK Error getting public key subject=Modulus=unavailable Modulus=Wrong Algorithm typebad output format specified for outfile unable to write X509 request unable to write X509 certificate promptdistinguished_nameunable to find '%s' in config unable to get '%s' section attributesYou are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. _min_max_default_value%s_defaultName '%s' too long %s_value%s_min%s_maxerror, no objects specified in config file Please enter the following 'extra' attributes to be sent with your certificate request No template, please set one up. %s [%s]:%s weird input :-( Error adding attribute string is too short, it needs to be at least %d bytes long string is too long, it needs to be less than %d bytes long param:Unknown algorithm %.*s Can't open parameter file %s Error reading parameter file %s Key Type does not match parameters Internal error: can't find key algorithm Error allocating keygen context Error initializing keygen context Error setting RSA keysize -%-14s to use the %s message digest algorithm .\apps\dgst.cout of memory -c-r-sign-prverify-signature-engine_impl-hex-binary-d-fips-fingerprintetaonrishdlcupfm-non-fips-allow-hmac-mac-macoptCan only sign or verify one file No signature to verify: use the -signature option unknown option '%s' options are -c to output the digest with separating colons -r to output the digest in coreutils format -d to output debug info -hex output as hex dump -binary output in binary form -hmac arg set the HMAC key to arg -non-fips-allow allow use of non FIPS digest -sign file sign digest using private key in file -verify file verify a signature using public key in file -prverify file verify a signature using private key in file -keyform arg key file format (PEM or ENGINE) -out filename output to filename rather than stdout -signature file signature to verify -sigopt nm:v signature parameter -hmac key create hashed MAC with key -mac algorithm create MAC (not neccessarily HMAC) -macopt nm:v MAC algorithm parameters or key -engine e use engine e, possibly a hardware device. Error getting password w(stdout)Error opening output file %s MAC and Signing key cannot both be specified key fileMAC parameter error "%s" Error generating key Error getting context Error setting context Error setting digest %s rbError opening signature file %s Out of memory Error reading signature file %s Read Error in %s Verified OK Verification Failure Error Verifying Data Error Signing Data %02x *%s -%s(%s)= %s(%s)= :-check-C -outform arg output format - one of DER PEM -out arg output file -check check the DH parameters -text print a text form of the DH parameters -C Output C code -noout no output -engine e use engine e, possibly a hardware device. bad input format specified unable to load DH parameters p value is not prime p value is not a safe prime unable to check the generator value the g value is not a generator DH parameters appear to be ok. .\apps\dh.cOPENSSL_mallocstatic unsigned char dh%d_p[]={ 0x%02X, }; static unsigned char dh%d_g[]={ }; DH *get_dh%d() { DH *dh; if ((dh=DH_new()) == NULL) return(NULL); dh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL); dh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL); if ((dh->p == NULL) || (dh->g == NULL)) return(NULL); return(dh); } unable to write DH parameters -dsaparam-2-5%d%s [options] [numbits] -dsaparam read or generate DSA parameters, convert to DH -2 generate parameters using 2 as the generator value -5 generate parameters using 5 as the generator value numbits number of bits in to generate (default 2048) - load the file (or the files in the directory) into the random number generator generator may not be chosen for DSA parameters warning, not much extra random data, consider using the -rand option %ld semi-random bytes loaded Generating DSA parameters, %d bit long prime Generating DH parameters, %d bit long safe prime, generator %d This is going to take a long time unable to load DSA parameters .\apps\dhparam.c#ifndef HEADER_DH_H #include #endif static unsigned char dh%d_p[]={ }; static unsigned char dh%d_g[]={ { DH_free(dh); return(NULL); } dh->length = %ld; Salted__-%-25s base64enc%s is an unknown cipher -e-pass-p-v-nopad-salt-nosalt-debug-P-A-a-base64-bufsize-k-kfileunable to read key from '%s' zero length password -K-S-iv-md-none-in %-14s input file -out %-14s output file -pass %-14s pass phrase source %-14s encrypt %-14s decrypt -a/-base64%-14s base64 encode/decode, depending on encryption flag %-14s passphrase is the next argument %-14s passphrase is the first line of the file argument %-14s the next argument is the md to use to create a key %-14s from a passphrase. One of md2, md5, sha or sha1 %-14s salt in hex is the next argument -K/-iv%-14s key/iv in hex is the next argument -[pP]%-14s print the iv/key (then exit if -P) -bufsize %-14s buffer size %-14s disable standard block padding -engine e%-14s use engine e, possibly a hardware device. Cipher Types AEAD ciphers not supported by the enc utility Ciphers in XTS mode are not supported by the enc utility %s is an unsupported message digest type invalid 'bufsize' specified. bufsize=%d .\apps\enc.cOPENSSL_malloc failure %ld encryptiondecryptionenter %s %s password:bad password read invalid hex salt value error writing output file error reading input file bad magic number warning: iv not use by this cipher invalid hex iv value iv undefined invalid hex key value Error setting cipher %s salt=%02Xkey=iv =bad decrypt bytes read :%8ld bytes written:%8ld hex string is too long non-hex digit ./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-crypt-1-apr1-stdin-noverify-quiet-table-reverseUsage: passwd [options] [passwords] -crypt standard Unix password algorithm (default) -1 MD5-based password algorithm -apr1 MD5-based password algorithm, Apache variant -salt string use provided salt -in file read passwords from file -stdin read passwords from stdin -noverify never verify when reading password from terminal -quiet no warnings -table format output as table -reverse switch table columns .\apps\passwd.cin_stdin == 0in_stdin.\apps\passwd.cPassword: *passwds != NULLpasswd != NULLstrlen(magic) <= 4$strlen(out_buf) <= 6 + 8salt_len <= 8output == out_buf + strlen(out_buf)i == 15strlen(out_buf) < sizeof(out_buf)salt_p != NULLsalt_malloc_p != NULL*salt_p != NULLWarning: truncating password to %u characters strlen(passwd) <= pw_maxlen1apr1hash != NULL%s %s usage: gendh [args] [numbits] -out file - output the key to 'file -2 - use 2 as the generator value -5 - use 5 as the generator value -engine e - use engine e, possibly a hardware device. - load the file (or the files in the directory) into the random number generator -stats%lx%s: bad error code usage: errstr [-stats] ... unspecifiedkeyCompromiseCACompromiseaffiliationChangedsupersededcessationOfOperationcertificateHoldremoveFromCRLholdInstructionkeyTimeCAkeyTimeusage: ca args -verbose - Talk alot while doing things -config file - A config file -name arg - The particular CA definition to use -gencrl - Generate a new CRL -crldays days - Days is when the next CRL is due -crlhours hours - Hours is when the next CRL is due -startdate YYMMDDHHMMSSZ - certificate validity notBefore -enddate YYMMDDHHMMSSZ - certificate validity notAfter (overrides -days) -days arg - number of days to certify the certificate for -md arg - md to use, one of md2, md5, sha or sha1 -policy arg - The CA 'policy' to support -keyfile arg - private key file -keyform arg - private key file format (PEM or ENGINE) -key arg - key to decode the private key if it is encrypted -cert file - The CA certificate -selfsign - sign a certificate with the key associated with it -in file - The input PEM encoded certificate request(s) -out file - Where to put the output file(s) -outdir dir - Where to put output certificates -infiles .... - The last argument, requests to process -spkac file - File contains DN and signed public key and challenge -ss_cert file - File contains a self signed cert to sign -preserveDN - Don't re-order the DN -noemailDN - Don't add the EMAIL field into certificate' subject -batch - Don't ask questions -msie_hack - msie modifications to handle all those universal strings -revoke file - Revoke a certificate (given in file) -subj arg - Use arg instead of request's subject -utf8 - input characters are UTF8 (default ASCII) -multivalue-rdn - enable support for multivalued RDNs -extensions .. - Extension section (override value in config file) -extfile file - Configuration file with X509v3 extentions to add -crlexts .. - CRL extension section (override value in config file) -engine e - use engine e, possibly a hardware device. -status serial - Shows certificate status given the serial number -updatedb - Updates db for expired certificates -name-create_serial-startdate-enddate-policy-keyfile-cert-selfsign-outdir-notext-preserveDN-noemailDN-gencrl-msie_hack-crldays-crlhours-crlsec-infiles-ss_cert-spkac-revoke-valid-extfile-status-updatedb-crlexts-crl_reason-crl_hold-crl_compromise-crl_CA_compromise%sOPENSSL_CONFSSLEAY_CONF.\apps\ca.c/openssl.cnferror loading the config file '%s' error on line %ld of config file '%s' default_cacaunique_subjectdatabaseError verifying serial %s! private_keyCA private keycertificateCA certificateCA certificate and CA private key do not match preservemsie_hackname_optInvalid name options: "%s" cert_optInvalid certificate options: "%s" copy_extensionsInvalid extension copy option: "%s" new_certs_dirthere needs to be defined a directory for new certificate to be placed in I am unable to access the %s directory %s need to be a directory entry %d: not revoked yet, but has a revocation date in entry %d entry %d: invalid expiry date entry %d: bad serial number length (%d) entry %d: bad serial number characters, char pos %ld, char is '%c' %d entries loaded from the database generating index Updating %s ... Malloc failure No entries found to mark expired newoldDone. %d entries marked as expired ERROR: loading the config file '%s' ERROR: on line %ld of config file '%s' Successfully loaded extensions file %s extensionsno default digest email_in_dnmessage digest is %s policypolicy is %s serialdefault_startdatestart date is invalid, it should be YYMMDDHHMMSSZ or YYYYMMDDHHMMSSZ todaydefault_enddateend date is invalid, it should be YYMMDDHHMMSSZ or YYYYMMDDHHMMSSZ default_dayscannot lookup how many days to certify for error while loading serial number next serial number is 00 next serial number is %s unable to find 'section' for %s %d out of %d certificate requests certified, commit? [y/n]CERTIFICATION CANCELED: I/O error CERTIFICATION CANCELED Write out database with %d new entries writing new certificates certificate file name too long writing %s Data Base Updated crl_extensionsError Loading CRL extension section %s crlnumbererror while loading CRL number default_crl_daysdefault_crl_hourscannot lookup how long until the next CRL is issued making CRL error setting CRL nextUpdate signing CRL no input files variable lookup failed for %s::%s Error reading certificate request in %s Check that the request matches the signature Certificate request and CA private key do not match error unpacking public key Signature verification problems.... Signature did not match the certificate request Signature ok Signature did not match the certificate malloc error The Subject's Distinguished Name is as follows emailAddress type needs to be of type IA5STRING The string contains characters that are illegal for the ASN.1 type %s:unknown object type in 'policy' configuration optionalsuppliedThe %s field needed to be supplied and was missing matchThe mandatory %s field was missing The %s field does not exist in the CA certificate, the 'policy' is misconfigured NULLThe %s field needed to be the same in the CA certificate (%s) and the request (%s) %s:invalid type in 'policy' configuration The subject name appears to be ok, checking data base for clashes 00ERROR:There is already a certificate for %s ERROR:Serial number %s has already been issued, check the database/serial_file for corruption The matching entry has the following details ExpiredRevokedValid invalid type, Data base error Type :%s undefWas revoked on:%s Expires on :%s Serial Number :%s File name :%s Subject Name :%s Everything appears to be ok, creating and signing the certificate Extra configuration file found ERROR: adding extensions in section %s Successfully added extensions from file. Successfully added extensions from config ERROR: adding extensions from request Certificate Details: Certificate is to be certified until (%ld days)Sign the certificate? [y/n]:CERTIFICATE WILL NOT BE CERTIFIED: I/O error CERTIFICATE WILL NOT BE CERTIFIED unknownfailed to update database TXT_DB error number %ld no name/value pairs found in %s SPKACunable to load Netscape SPKAC structure Netscape SPKAC structure not found in %s Check that the SPKAC request matches the signature error unpacking SPKAC public key signature verification failed on SPKAC public key Adding Entry with serial number %s to DB for %s ERROR:name does not match %s ERROR:Already present, serial number %s ERROR:Already revoked, serial number %s Revoking Certificate %s. Error in revocation arguments Serial %s not present in db. %s=Valid (%c) %s=Revoked (%c) %s=Expired (%c) %s=Suspended (%c) %s=Unknown (%c). 49%s=Expired Unknown CRL reason %s Invalid object identifier %s Invalid time format %s. Need YYYYMMDDHHMMSSZ ,PRINTABLE:'T61STRING:'IA5STRING:'UNIVERSALSTRING:'ASN.1 %2d:'%c\0x%02X^?^%c' memory allocation failure invalid revocation date %s invalid reason code %s missing hold instruction invalid object identifier %s missing compromised time invalid compromised time %s -print-print_certs -inform arg input format - DER or PEM -outform arg output format - DER or PEM -print_certs print any certs or crl in the input -text print full details of certificates -noout don't output encoded data unable to load input file bad input format specified for pkcs7 object unable to load PKCS7 object unable to write pkcs7 object -nocrl-certfile -certfile arg certificates file of chain to a trusted CA (can be used more than once) -nocrl no crl to load, just certs from '-certfile' bad input format specified for input crl unable to load CRL error loading certificates error opening the file, %s error reading the file, %s usage: crl args -inform arg - input format - default PEM (DER or PEM) -outform arg - output format - default PEM -text - print out a text format version -in arg - input file - default stdin -out arg - output file - default stdout -hash - print hash value -hash_old - print old-style (MD5) hash value -fingerprint - print the crl fingerprint -issuer - print issuer DN -lastupdate - lastUpdate field -nextupdate - nextUpdate field -crlnumber - print CRL number -noout - no CRL output -CAfile name - verify CRL using certificates in file "name" -CApath dir - verify CRL using certificates in "dir" -gendelta-hash-hash_old-issuer-lastupdate-nextupdate-fingerprint-crlnumber-badsigError initialising X509 store Error getting CRL issuer certificate Error getting CRL issuer public key Missing CRL signing key CRL signing keyError creating delta CRL issuer=crlNumber=%08lx lastUpdate=nextUpdate=NONE%s Fingerprint=%02X%cunable to write CRL -sgckey-pubin-pubout-RSAPublicKey_in-RSAPublicKey_out-pvk-strong-pvk-weak-pvk-none -inform arg input format - one of DER NET PEM -outform arg output format - one of DER NET PEM -in arg input file -sgckey Use IIS SGC key format -passin arg input file pass phrase source -out arg output file -passout arg output file pass phrase source -des encrypt PEM output with cbc des -des3 encrypt PEM output with ede cbc des using 168 bit key -seed encrypt PEM output with cbc seed -aes128, -aes192, -aes256 encrypt PEM output with cbc aes -camellia128, -camellia192, -camellia256 encrypt PEM output with cbc camellia -text print the key in text -noout don't print key out -modulus print the RSA key modulus -check verify key consistency -pubin expect a public key in input file -pubout output a public key -engine e use engine e, possibly a hardware device. Only private keys can be checked Public KeyRSA key ok RSA key error: %s writing RSA key .\apps\rsa.cunable to write key -inkey-certin-asn1parse-hexdump-raw-oaep-ssl-pkcs-x931-rev-encrypt-decryptA private key is needed for this operation CertificateError getting RSA key Error Reading Input File Error Writing Output File .\apps\rsautl.cError reading input Data RSA operation error Usage: rsautl [options] -in file input file -out file output file -inkey file input key -keyform arg private key format - default PEM -pubin input is an RSA public -certin input is a certificate carrying an RSA public key -ssl use SSL v2 padding -raw use no padding -pkcs use PKCS#1 v1.5 padding (default) -oaep use PKCS#1 OAEP -sign sign with private key -verify verify with public key -encrypt encrypt with public key -decrypt decrypt with private key -hexdump hex dump output -passin arg pass phrase source -inform arg input format - DER or PEM -outform arg output format - DER or PEM -modulus print the DSA public value read DSA key unable to load Key Public Key=writing DSA key unable to write private key -genkey%s [options] [bits] outfile -text print as text -genkey generate a DSA key -rand files to use for random number input number number of bits to use for generating private key .\apps\dsaparam.cneed_randError allocating DSA object This could take some time Error, DSA key generation failed .\apps\dsaparam.cstatic unsigned char dsa%d_p[]={static unsigned char dsa%d_q[]={static unsigned char dsa%d_g[]={DSA *get_dsa%d() { DSA *dsa; if ((dsa=DSA_new()) == NULL) return(NULL); dsa->p=BN_bin2bn(dsa%d_p,sizeof(dsa%d_p),NULL); dsa->q=BN_bin2bn(dsa%d_q,sizeof(dsa%d_q),NULL); dsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL); if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL)) { DSA_free(dsa); return(NULL); } return(dsa); } unable to write DSA parameters -conv_formcompresseduncompressedhybrid-param_encnamed_curveexplicit-param_out -des encrypt PEM output, instead of 'des' every other cipher supported by OpenSSL can be used -text print the key -param_out print the elliptic curve parameters -conv_form arg specifies the point conversion form possible values: compressed uncompressed (default) hybrid -param_enc arg specifies the way the ec parameters are encoded in the asn1 der encoding possible values: named_curve (default) explicit read EC key bad input format specified for key writing EC key -list_curves-no_seed -inform arg input format - default PEM (DER or PEM) -outform arg output format - default PEM -in arg input file - default stdin -out arg output file - default stdout -noout do not print the ec parameter -text print the ec parameters in text form -check validate the ec parameters -C print a 'C' function creating the parameters -name arg use the ec parameters with 'short name' name -list_curves prints a list of all currently available curve 'short names' -conv_form arg specifies the point conversion form possible values: compressed uncompressed (default) hybrid -param_enc arg specifies the way the ec parameters are encoded in the asn1 der encoding possible values: named_curve (default) explicit -no_seed if 'explicit' parameters are chosen do not use the seed -genkey generate ec key -rand file files to use for random number input -engine e use engine e, possibly a hardware device .\apps\ecparam.cCURVE DESCRIPTION NOT AVAILABLE %-10s: secp192r1using curve name prime192v1 instead of secp192r1 secp256r1using curve name prime256v1 instead of secp256r1 unknown curve name (%s) unable to create curve (%s) unable to load elliptic curve parameters checking elliptic curve parameters: failed ok ec_pec_aec_bec_genec_orderec_cofactor EC_GROUP *get_ec_group_%d(void) { int ok=0; EC_GROUP *group = NULL; EC_POINT *point = NULL; BIGNUM *tmp_1 = NULL, *tmp_2 = NULL, *tmp_3 = NULL; if ((tmp_1 = BN_bin2bn(ec_p_%d, sizeof(ec_p_%d), NULL)) == NULL) goto err; if ((tmp_2 = BN_bin2bn(ec_a_%d, sizeof(ec_a_%d), NULL)) == NULL) goto err; if ((tmp_3 = BN_bin2bn(ec_b_%d, sizeof(ec_b_%d), NULL)) == NULL) goto err; if ((group = EC_GROUP_new_curve_GFp(tmp_1, tmp_2, tmp_3, NULL)) == NULL) goto err; /* build generator */ if ((tmp_1 = BN_bin2bn(ec_gen_%d, sizeof(ec_gen_%d), tmp_1)) == NULL) goto err; point = EC_POINT_bn2point(group, tmp_1, NULL, NULL); if (point == NULL) goto err; if ((tmp_2 = BN_bin2bn(ec_order_%d, sizeof(ec_order_%d), tmp_2)) == NULL) goto err; if ((tmp_3 = BN_bin2bn(ec_cofactor_%d, sizeof(ec_cofactor_%d), tmp_3)) == NULL) goto err; if (!EC_GROUP_set_generator(group, point, tmp_2, tmp_3)) goto err; ok=1; err: if (tmp_1) BN_free(tmp_1); if (tmp_2) BN_free(tmp_2); if (tmp_3) BN_free(tmp_3); if (point) EC_POINT_free(point); if (!ok) { EC_GROUP_free(group); group = NULL; } return(group); } unable to write elliptic curve parameters .\apps\ecparam.cstatic unsigned char %s_%d[] = { 0x000x%02Xusage: x509 args -inform arg - input format - default PEM (one of DER, NET or PEM) -outform arg - output format - default PEM (one of DER, NET or PEM) -keyform arg - private key format - default PEM -CAform arg - CA format - default PEM -CAkeyform arg - CA key format - default PEM -passin arg - private key password source -serial - print serial number value -subject_hash - print subject hash value -subject_hash_old - print old-style (MD5) subject hash value -issuer_hash - print issuer hash value -issuer_hash_old - print old-style (MD5) issuer hash value -hash - synonym for -subject_hash -subject - print subject DN -email - print email address(es) -startdate - notBefore field -enddate - notAfter field -purpose - print out certificate purposes -dates - both Before and After dates -modulus - print the RSA key modulus -pubkey - output the public key -fingerprint - print the certificate fingerprint -alias - output certificate alias -noout - no certificate output -ocspid - print OCSP hash values for the subject name and public key -ocsp_uri - print OCSP Responder URL(s) -trustout - output a "trusted" certificate -clrtrust - clear all trusted purposes -clrreject - clear all rejected purposes -addtrust arg - trust certificate for a given purpose -addreject arg - reject certificate for a given purpose -setalias arg - set certificate alias -days arg - How long till expiry of a signed certificate - def 30 days -checkend arg - check whether the cert expires in the next arg seconds exit 1 if so, 0 if not -signkey arg - self sign cert with arg -x509toreq - output a certification request object -req - input is a certificate request, sign and output. -CA arg - set the CA certificate, must be PEM format. -CAkey arg - set the CA key, must be PEM format missing, it is assumed to be in the CA file. -CAcreateserial - create serial number file if it does not exist -CAserial arg - serial file -set_serial - serial number to use -text - print the certificate in text form -C - print out C code forms -md2/-md5/-sha1/-mdc2 - digest to use -extfile - configuration file with X509V3 extensions to add -extensions - section from config file with X509V3 extensions to add -clrext - delete extensions before signing and input certificate -certopt arg - various certificate text options -checkhost host - check certificate matches "host" -checkemail email - check certificate matches "email" -checkip ipaddr - check certificate matches "ipaddr" -req-CAform-CAkeyformbad number of days -signkey-CA-CAkey-CAserial-force_pubkey-addtrustInvalid trust object value %s -addrejectInvalid reject object value %s -setalias-certopt-email-ocsp_uri-serial-next_serial-x509toreq-subject_hash-subject_hash_old-issuer_hash-issuer_hash_old-dates-purpose-checkend-checkhost-checkemail-checkip-trustout-clrtrust-clrreject-alias-CAcreateserial-clrext-crlextuse -clrext instead of -crlext -ocspidForced keyneed to specify a CAkey if using the CA command We need a private key to sign with The certificate request appears to corrupted It does not contain a public key Signature verification error CA CertificateSET x509v3 extension 3SET.ex32.99999.3issuer= subject= serial= Certificate purposes: /* subject:%s */ /* issuer :%s */ .\apps\x509.cunsigned char XXX_subject_name[%d]={ }; unsigned char XXX_public_key[%d]={ unsigned char XXX_certificate[%d]={ notBefore=notAfter=Getting Private key Private key.\apps\x509.cGetting CA Private Key CA Private KeyGetting request Private Key no request key file specified request keyGenerating certificate request Certificate will expire Certificate will not expire unable to write certificate out of mem .srladd_word failure Error obtaining CA X509 public key error with certificate to be certified - should be self signed error with certificate - error %d at depth %d %s CA%s%s : Yes No Yes (WARNING code=%d) unable to create BIO for output -3-F4-f4-des-des3-seed-aes128-aes192-aes256-camellia128-camellia192-camellia256usage: genrsa [args] [numbits] -des encrypt the generated key with DES in cbc mode -des3 encrypt the generated key with DES in ede cbc mode (168 bit key) -seed encrypt PEM output with cbc seed -out file output the key to 'file -f4 use F4 (0x10001) for the E value -3 use 3 for the E value load the file (or the files in the directory) into the random number generator Generating RSA private key, %d bit long modulus e is %ld (0x%lX) -usage: gendsa [args] dsaparam-file -out file - output the key to 'file' -des - encrypt the generated key with DES in cbc mode -des3 - encrypt the generated key with DES in ede cbc mode (168 bit key) dsaparam-file - a DSA parameter file as generated by the dsaparam command unable to load DSA parameter file Generating DSA key, %d bits -paramfile-algorithmNo keytype specified parameter setting error -genparamUnknown cipher %s Usage: genpkey [options] where options may be -out file output file -outform X output format (DER or PEM) -pass arg output file pass phrase source - use cipher to encrypt the key -engine e use engine e, possibly a hardware device. -paramfile file parameters file -algorithm alg the public key algorithm -pkeyopt opt:value set the public key algorithm option to value -genparam generate parameters, not key -text print the in text NB: options order may be important! See the manual page. Can't open output file %s Error generating parameters Bad format specified for key Error writing key Error printing key Parameters already set! Error initializing context Algorithm already set! Algorithm %s not found Error initializing %s context Lets print some clear text HTTP/1.0 200 ok Content-type: text/plain server.pemserver2.pemClient_identitypsk_server_cb Error: client did not send PSK identity identity_len=%d identity=%s PSK error: client identity not found (got '%s' expected '%s') PSK client identity found Could not convert PSK key '%s' to buffer psk buffer of callback is too small (%d) for key (%ld) fetched PSK len=%ld Error in PSK server callback SRP username = "%s" User %s doesn't exist SRP parameters set: username = "%s" info="%s" usage: s_server [args ...] -accept arg - port to accept on (default is %d) -verify_hostname host - check peer certificate matches "host" -verify_email email - check peer certificate matches "email" -verify_ip ipaddr - check peer certificate matches "ipaddr" -context arg - set session ID context -verify arg - turn on peer certificate verification -Verify arg - turn on peer certificate verification, must have a cert. -verify_return_error - return verification errors -cert arg - certificate file to use (default is %s) -serverinfo arg - PEM serverinfo file for certificate -auth - send and receive RFC 5878 TLS auth extensions and supplemental data -auth_require_reneg - Do not send TLS auth extensions until renegotiation -no_resumption_on_reneg - set SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION flag -crl_check - check the peer certificate has not been revoked by its CA. The CRL(s) are appended to the certificate file -crl_check_all - check the peer certificate has not been revoked by its CA or any other CRL in the CA chain. CRL(s) are appened to the the certificate file. -certform arg - certificate format (PEM or DER) PEM default -key arg - Private Key file to use, in cert file if not specified (default is %s) -keyform arg - key format (PEM, DER or ENGINE) PEM default -pass arg - private key file pass phrase source -dcert arg - second certificate file to use (usually for DSA) -dcertform x - second certificate format (PEM or DER) PEM default -dkey arg - second private key file to use (usually for DSA) -dkeyform arg - second key format (PEM, DER or ENGINE) PEM default -dpass arg - second private key file pass phrase source -dhparam arg - DH parameter file to use, in cert file if not specified or a default set of parameters is used -named_curve arg - Elliptic curve name to use for ephemeral ECDH keys. Use "openssl ecparam -list_curves" for all names (default is nistp256). -nbio - Run with non-blocking IO -nbio_test - test with the non-blocking test bio -crlf - convert LF from terminal into CRLF -debug - Print more output -msg - Show protocol messages -state - Print the SSL states -CApath arg - PEM format directory of CA's -CAfile arg - PEM format file of CA's -no_alt_chains - only ever use the first certificate chain found -nocert - Don't use any certificates (Anon-DH) -cipher arg - play with 'openssl ciphers' to see what goes here -serverpref - Use server's cipher preferences -quiet - No server output -no_tmp_rsa - Do not generate a tmp RSA key -psk_hint arg - PSK identity hint to use -psk arg - PSK in hex (without 0x) -jpake arg - JPAKE secret to use -srpvfile file - The verifier file for SRP -srpuserseed string - A seed string for a default user salt. -ssl2 - Just talk SSLv2 -ssl3 - Just talk SSLv3 -tls1_2 - Just talk TLSv1.2 -tls1_1 - Just talk TLSv1.1 -tls1 - Just talk TLSv1 -dtls1 - Just talk DTLSv1 -dtls1_2 - Just talk DTLSv1.2 -timeout - Enable timeouts -mtu - Set link layer MTU -chain - Read a certificate chain -no_ssl2 - Just disable SSLv2 -no_ssl3 - Just disable SSLv3 -no_tls1 - Just disable TLSv1 -no_tls1_1 - Just disable TLSv1.1 -no_tls1_2 - Just disable TLSv1.2 -no_dhe - Disable ephemeral DH -no_ecdhe - Disable ephemeral ECDH -bugs - Turn on SSL bug compatibility -hack - workaround for early Netscape code -www - Respond to a 'GET /' with a status page -WWW - Respond to a 'GET / HTTP/1.0' with file ./ -HTTP - Respond to a 'GET / HTTP/1.0' with file ./ with the assumption it contains a complete HTTP response. -engine id - Initialise and use the specified engine -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg' -servername host - servername for HostName TLS extension -servername_fatal - on mismatch send fatal alert (default warning alert) -cert2 arg - certificate file to use for servername -key2 arg - Private Key file to use for servername, in cert file if -tlsextdebug - hex dump of all TLS extensions received -no_ticket - disable use of RFC4507bis session tickets -legacy_renegotiation - enable use of legacy renegotiation (dangerous) -sigalgs arg - Signature algorithms to support (colon-separated list) -client_sigalgs arg - Signature algorithms to support for client certificate authentication (colon-separated list) -nextprotoneg arg - set the advertised protocols for the NPN extension (comma-separated list) -use_srtp profiles - Offer SRTP key management with a colon-separated profile list -alpn arg - set the advertised protocols for the ALPN extension (comma-separated list) -keymatexport label - Export keying material using label -keymatexportlen len - Export len bytes of keying material (default 20) -status - respond to certificate status requests -status_verbose - enable status request verbose printout -status_timeout n - status request responder timeout -status_url URL - status request fallback URL Hostname in TLS extension: "%s" Switching server context. cert_status: callback called cert_status: can't parse AIA URL cert_status: AIA URL: %s cert_status: no AIA and no default responder URL cert_status: Can't retrieve issuer certificate. cert_status: error querying responder cert_status: ocsp response sent: ALPN protocols advertised by the client: , ALPN protocols selected: -port-accept-nacceptbad accept value %s verify depth is %d -Verifyverify depth is %d, must return a certificate -context-CRL-serverinfo-certform-cert_chain-dhparam-dcertform-dcert-dkeyform-dpass-dkey-dcert_chain-nocert-chainCApath-verifyCApath-no_cache-ext_cache-CRLform-verify_return_error-verify_quiet-build_chain-chainCAfile-verifyCAfile-nbio-nbio_test-ign_eof-no_ign_eof-tlsextdebug-status_verbose-status_timeout-status_urlError parsing URL -msg-msgfile-hack-state-crlf-brief-no_tmp_rsa-no_dhe-no_ecdhe-no_resume_ephemeral-psk_hint-pskNot a hex number '%s' -srpvfile-srpuserseed-www-WWW-HTTP-ssl3-tls1-tls1_1-tls1_2-dtls-dtls1-dtls1_2-timeout-mtu-chain-id_prefix-servername-servername_fatal-cert2-key2-nextprotoneg-alpn-jpake-use_srtp-keymatexport-keymatexportlenCan't use -HTTP, -www or -WWW with DTLS Can't use JPAKE and PSK together JPAKECannot supply multiple protocol flags Cannot supply both a protocol flag and "-no_" server certificate private key fileserver certificate fileserver certificate chainsecond server certificate private key filesecond server certificate fileError loading CRL Error adding CRL second certificate private key filesecond server certificate chainwarning: id_prefix is too long, only one new session will be possible warning: id_prefix is too long if you use SSLv2 error setting 'id_prefix' id_prefix '%s' set. Error loading store locations Setting secondary ctx parameters Setting temp DH parameters Using default temp DH parameters PSK key given or JPAKE in use, setting server callback error setting PSK identity hint to context Cannot initialize SRP verifier file "%s":ret=%d ACCEPT %4ld items in the session cache %4ld client connects (SSL_connect()) %4ld client renegotiates (SSL_connect()) %4ld client connects that finished %4ld server accepts (SSL_accept()) %4ld server renegotiates (SSL_accept()) %4ld server accepts that finished %4ld session cache hits %4ld session cache misses %4ld session cache timeouts %4ld callback cache hits %4ld cache full overflows (%ld allowed) .\apps\s_server.cturning on non blocking io MTU too small. Must be at least %ld Failed to set MTU .\apps\s_server.clf_num == 0DONE HEARTBEATING SSL_do_handshake -> %d LOOKUP renego during write LOOKUP done %s LOOKUP not successful Write BLOCK ERROR LOOKUP renego during read Read BLOCK shutting down SSL CONNECTION CLOSED shutdown accept socket LOOKUP during accept %s DELAY verify error:%s Client certificate subject=%s issuer=%s Shared ciphers:%s (NONE)CIPHER is %s NEXTPROTO is SRTP Extension negotiated, profile=%s Reused session-id Peer has incorrect TLSv1 block padding NOTSecure Renegotiation IS%s supported Keying material exporter: Label: '%s' Length: %i bytes Error Keying material: read R BLOCK GET GET /stats HTTP/1.0 200 ok Content-type: text/html
Ciphers supported in s_server binary
%-11s:%-25s---
Ciphers common between both SSL end points:
---
Reused, ---
New, %s, Cipher is %s
---
no client certificate available
GET /'%s' is an invalid file name '%s' contains '..' reference '%s' is an invalid path '%s' is a directory Error opening '%s' FILE:%s .html.php.htmrwrite W BLOCK CONNECTION FAILURE LOOKUP renego during accept CONNECTION ESTABLISHED CLOSEAllocation error in generating RSA key Generating temp (%d bit) RSA key...Out of memory adding session to external cache New session added to external cache Lookup session: cache hit Lookup session: cache miss psk_client_cb NULL received PSK identity hint, continuing anyway Received PSK identity hint '%s' created identity '%s' len=%d created PSK len=%ld Error in PSK client callback usage: s_client args -host host - use -connect instead -port port - use -connect instead 4433localhost -connect host:port - who to connect to (default is %s:%s) -cert arg - certificate file to use, PEM format assumed -key arg - Private key file to use, in cert file if not specified but cert file is. -keyform arg - key format (PEM or DER) PEM default -reconnect - Drop and re-make the connection with the same Session-ID -pause - sleep(1) after each read(2) and write(2) system call -prexit - print session information even on connection failure -showcerts - show all certificates in the chain -debug - extra output -nbio_test - more ssl protocol testing -state - print the 'ssl' states -quiet - no s_client output -ign_eof - ignore input eof (default when -quiet) -no_ign_eof - don't ignore input eof -psk_identity arg - PSK identity -srpuser user - SRP authentification for 'user' -srppass arg - password for 'user' -srp_lateuser - SRP username into second ClientHello message -srp_moregroups - Tolerate other than the known g N values. -srp_strength int - minimal length in bits for N (default %d). -ssl2 - just use SSLv2 -ssl3 - just use SSLv3 -tls1_2 - just use TLSv1.2 -tls1_1 - just use TLSv1.1 -tls1 - just use TLSv1 -dtls1 - just use DTLSv1 -fallback_scsv - send TLS_FALLBACK_SCSV -mtu - set the link layer MTU -no_tls1_2/-no_tls1_1/-no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol -bugs - Switch on all SSL implementation bug workarounds -cipher - preferred cipher to use, use the 'openssl ciphers' command to see what is available -starttls prot - use the STARTTLS command before starting TLS for those protocols that support it, where 'prot' defines which one to assume. Currently, only "smtp", "pop3", "imap", "ftp" and "xmpp" are supported. -sess_out arg - file to write SSL session to -sess_in arg - file to read SSL session from -servername host - Set TLS extension servername in ClientHello -tlsextdebug - hex dump of all TLS extensions received -status - request certificate status from server -no_ticket - disable use of RFC4507bis session tickets -serverinfo types - send empty ClientHello extensions (comma-separated numbers) -curves arg - Elliptic curves to advertise (colon-separated list) -client_sigalgs arg - Signature algorithms to support for client certificate authentication (colon-separated list) -nextprotoneg arg - enable NPN extension, considering named protocols supported (comma-separated list) -alpn arg - enable ALPN extension, considering named protocols supported (comma-separated list) Can't use SSL_get_servername SRP parameters: N= g=SRP param N and g are not known params, going to check deeper. SRP param N and g rejected. .\apps\s_client.cSRP userCan't read Password Protocols advertised by server: SERVERINFO FOR EXTENSION %d-host-connect-sess_out-sess_in-prexit-pause-showcerts-psk_identity-srpuser-srppass-srp_strengthSRP minimal length for N is %d -srp_lateuser-srp_moregroups-fallback_scsv-reconnect-starttlssmtppop3imapftpxmpp-ssl_client_engineError parsing -nextprotoneg argument Error getting client auth engine client certificate private key fileclient certificate fileclient certificate chainError setting client auth engine PSK key given or JPAKE in use, setting client callback Error parsing -alpn argument Unable to set SRP username Can't open session file %s Unable to set TLS servername extension. connect:errno=%d CONNECTED(%08X) getsockname:errno=%d EHLO openssl.client.net STARTTLSdidn't found starttls in server response, try anyway... STARTTLS STLS . CAPABILITY didn't found STARTTLS in server response, try anyway... . STARTTLS AUTH TLS -connect host:port - host:port to connect to (default is %s) -nbio - Run with non-blocking IO -ssl2 - Just use SSLv2 -ssl3 - Just use SSLv3 -bugs - Turn on SSL bug compatibility -new - Just time new connections -reuse - Just time connection reuse -www page - Retrieve 'page' from the site -reuse-cipher-www option too long -bugs-timetime must be > 0 SSL_CIPHERNo CIPHER specified Collecting connection statistics for %d seconds GET %s HTTP/1.0 %d connections in %.2fs; %.2f connections/user sec, bytes read %ld %d connections in %ld real seconds, %ld bytes read per connection Now timing with session id reuse. Unable to get connection starting EEEEEEE E@EEEE$E,E TrueFalseRequire explicit Policy: %s AuthorityUserF9E5B365665EA7A05A9C534502780FEE6F1AB5BD4F49947FD036DBD7E905269AF46EF28B0FC07487EE4F5D20FB3C0AF8E700F3A2FA3414970CBED44FEDFF80CE78D800F184BB82435D137AADA2C6C16523247930A63B85661D1FC817A51ACD96168E95898A1F83A79FFB529368AA7833ABD1B0C3AEDDB14D2E1A2F71D99F763F.\apps\apps.cl > 0buf[l - 1] == '\n'l == sizeof s3a.hhkl == sizeof s3b.hkAuthenticating with JPAKE serverclientJPAKE authentication succeeded, setting PSK Hostname %s does%s match certificate Email %s does%s match certificate IP %s does%s match certificate http://To get meaningful results, run this program on idle system. Hz>Overall ValiditySign with EE keyEE signatureCA signatureEE key parametersCA key parametersExplicity sign with EE keyIssuer NameCertificate Typedepth=%d verify error:num=%d:%s verify return:%d unable to get certificate from '%s' unable to get private key from '%s' Private key does not match the certificate public key error setting certificate error setting private key error setting certificate chain error building certificate chain Client Certificate Types: RSA signDSA signRSA fixed DHDSS fixed DHECDSA signRSA fixed ECDHECDSA fixed ECDHGOST94 SignGOST01 SignUNKNOWN (%d),Shared Requested Signature Algorithms: RSADSAECDSA%s+0x%02X+Peer signing digest: %s Supported Elliptic Curve Point Formats: ansiX962_compressed_primeansiX962_compressed_char2unknown(%d).\apps\s_cb.cMalloc error getting supported curves Supported Elliptic Curves: 0x%04X Shared Elliptic curves: Server Temp Key: RSA, %d bits DH, %d bits ECDH, %s, %d bits read from %p [%p] (%lu bytes => %ld (0x%lX)) write to %p [%p] (%lu bytes => %ld (0x%lX)) SSL_connectSSL_acceptundefined%s:%s readwriteSSL3 alert %s:%s:%s %s:failed in %s %s:error in %s >>><<<SSL 2.0SSL 3.0 TLS 1.0 TLS 1.1 TLS 1.2 DTLS 1.0 DTLS 1.0 (bad) ???, ERROR: ??? NO-CIPHER-ERROR NO-CERTIFICATE-ERROR BAD-CERTIFICATE-ERROR UNSUPPORTED-CERTIFICATE-TYPE-ERROR, CLIENT-HELLO, CLIENT-MASTER-KEY, CLIENT-FINISHED, SERVER-HELLO, SERVER-VERIFY, SERVER-FINISHED, REQUEST-CERTIFICATE, CLIENT-CERTIFICATEChangeCipherSpecAlertHandshake, ???, warning, fatal close_notify unexpected_message bad_record_mac decryption_failed record_overflow decompression_failure handshake_failure bad_certificate unsupported_certificate certificate_revoked certificate_expired certificate_unknown illegal_parameter unknown_ca access_denied decode_error decrypt_error export_restriction protocol_version insufficient_security internal_error user_canceled no_renegotiation unsupported_extension certificate_unobtainable unrecognized_name bad_certificate_status_response bad_certificate_hash_value unknown_psk_identity, HelloRequest, ClientHello, ServerHello, HelloVerifyRequest, Certificate, ServerKeyExchange, CertificateRequest, ServerHelloDone, CertificateVerify, ClientKeyExchange, Finished, Heartbeat, HeartbeatRequest, HeartbeatResponse%s %s%s [length %04lx]%s%s %02xserver namemax fragment lengthclient certificate URLtrusted CA keystruncated HMACstatus requestuser mappingclient authzserver authzcert typeelliptic curvesEC point formatsSRPsignature algorithmsuse SRTPheartbeatsession ticketrenegotiation infonext protocolapplication layer protocol negotiationTLS paddingTLS %s extension "%s" (id=%d), len=%d error setting random cookie secret 0OKNOT OK %s: %s Suite B: NOT OK not tested Checking cert chain %d: Subject: Missing filename Server CertificateServer KeyServer ChainError initialising xcert -xcertError adding xcert -xkeyKey already specified -xchainChain already specified -xchain_build-xcertform-xkeyformClient cipher list: SCSV0xProtocol version: %s Ciphersuite: %s Peer certificate: Hash used: %s No peer certificate -no_ssl2-no_ssl3-no_tls1-no_tls1_1-no_tls1_2%s needs an argument Error with command: "%s %s" -named_curveJPAKE sets cipher to PSK P-256Error setting EC curve PSKError setting cipher to PSK Error finishing context unable to start WINSOCK, error code=%d socketkeepaliveconnectaccept error %d bad gethostbyaddr .\apps\s_socket.cgethostbyname failure gethostbyname addr is not AF_INET no port defined %u.%u.%u.%uinvalid IP address tcpgetservbyname failure for %s unable to load 'random state' This means that the random number generator has not been seeded with much random data. Consider setting the RANDFILE environment variable to point at a file that 'random' data can be kept in (the file will be overwritten). unable to write 'random state' -b-f-ousage:version -[avbofpd] OpenSSL 1.0.2m 2 Nov 2017%s (Library: %s) options: usage: sess_id args -text - print ssl session id details -cert - output certificate -context arg - set the session ID context Context too long No certificate present unable to write SSL_SESSION unable to write X509 unable to load SSL_SESSION usage: ciphers args -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL -V - even more verbose -ssl2 - SSL2 mode -ssl3 - SSL3 mode -tls1 - TLS1 mode -V-h-?Error in cipher list 0x%02X,0x%02X,0x%02X - 0x%02X,0x%02X - 0x%02X,0x%02X,0x%02X,0x%02X - -toseqNetscape certificate sequence utility Usage nseq [options] -in file input file -out file output file -toseq output NS Sequence file Can't open input file %s Error reading certs file %s Error reading sequence file %s -nokeys-keyex-keysig-nocerts-clcerts-cacerts-info-twopass-nomacver-descert-export-noiter-maciter-nomaciter-nomac-macalg-certpbe-keypbe-LMK-CSP-caname-passwordUsage: pkcs12 [options] -export output PKCS12 file -chain add certificate chain -inkey file private key if not infile -certfile f add all certs in f -CApath arg - PEM format directory of CA's -CAfile arg - PEM format file of CA's -name "name" use name as friendly name -caname "nm" use nm as CA friendly name (can be used more than once). -in infile input filename -out outfile output filename -noout don't output anything, just verify. -nomacver don't verify MAC. -nocerts don't output certificates. -clcerts only output client certificates. -cacerts only output CA certificates. -nokeys don't output private keys. -info give info about PKCS#12 structure. -des encrypt private keys with DES -des3 encrypt private keys with triple DES (default) -seed encrypt private keys with seed -aes128, -aes192, -aes256 encrypt PEM output with cbc aes -camellia128, -camellia192, -camellia256 encrypt PEM output with cbc camellia -nodes don't encrypt private keys -noiter don't use encryption iteration -nomaciter don't use MAC iteration -maciter use MAC iteration -nomac don't generate MAC -twopass separate MAC, encryption passwords -descert encrypt PKCS#12 certificates with triple DES (default RC2-40) -certpbe alg specify certificate PBE algorithm (default RC2-40) -keypbe alg specify private key PBE algorithm (default 3DES) -macalg alg digest algorithm used in MAC (default SHA1) -keyex set MS key exchange type -keysig set MS key signature type -password p set import/export password source -passin p input file pass phrase source -passout p output file pass phrase source -engine e use engine e, possibly a hardware device. -rand file%cfile%c... load the file (or the files in the directory) into the random number generator -CSP name Microsoft CSP name -LMK Add local machine keyset attribute to private key Error opening input file %s Enter MAC Password:Nothing to do! private keyNo certificate matches private key certificates from certfileMemory allocation error Error %s getting chain. Enter Export Password:Unknown digest algorithm %s Enter Import Password:MAC Iteration %ld Mac verify error: invalid password? MAC verified OK Error outputting keys and certificates PKCS7 Data PKCS7 Encrypted data: Key bag Bag AttributesKey AttributesShrouded Keybag: Certificate bag Safe Contents bag Warning unsupported bag type: , %s, %s, Iteration %ld, PRF %s, Iteration %ld%s: %s: : %02X Unknown PBE algorithm %s -v2-v1-v2prfUnknown PRF algorithm %s -topk8-nocrypt-nooct-nsdb-embedUsage pkcs8 [options] -inform X input format (DER or PEM) -passin arg input file pass phrase source -outform X output format (DER or PEM) -passout arg output file pass phrase source -topk8 output PKCS8 file -nooct use (nonstandard) no octet format -embed use (nonstandard) embedded DSA parameters format -nsdb use (nonstandard) DSA Netscape DB format -noiter use 1 as iteration count -nocrypt use or expect unencrypted private key -v2 alg use PKCS#5 v2.0 and cipher "alg" -v1 obj use PKCS#5 v1.5 and cipher "alg" keyError converting key Enter Encryption Password:Error encrypting key Error reading key Enter Password:Error decrypting key Warning: broken key encoding: No Octet String in PrivateKey DSA parameters included in PrivateKey DSA public key include in PrivateKey DSA private key value is negative Unknown broken type -text_pubUsage pkey [options] Usage pkeyparam [options] -text print parameters as text -noout don't output encoded parameters Error reading parameters -sigfile-peerkey-peerform-verifyrecover-deriveError setting up peer key Signature file specified for non verify No signature file specified for verify Error Opening Input File Error Creating Output File Can't open signature file %s Error reading signature data Signature Verification Failure Signature Verified Successfully .\apps\pkeyutl.cPublic Key operation error Usage: pkeyutl [options] -sigfile file signature file (verify operation only) -pubin input is a public key -certin input is a certificate carrying a public key -pkeyopt X:Y public key options -verifyrecover verify with public key, recover original data -derive derive shared secret -engine e use engine e, maybe a hardware device, for loading keys. -engine_impl also use engine given by -engine for crypto operations -passin arg pass phrase source Peer KeyError reading peer key %s -challenge-spksect%s [options] -key arg create SPKAC using private key -passin arg input file pass phrase source -challenge arg challenge string -spkac arg alternative SPKAC name -noout don't print SPKAC -verify verify SPKAC signature -engine e use engine e, possibly a hardware device. Error opening output file SPKAC=%s Error opening input file Error parsing config file Can't find SPKAC called "%s" Error loading SPKAC Signature OK Signature Failure -resign-pk7out-rc2-40-rc2-128-rc2-64-nointern-nochain-noattr-nodetach-nosmimecap-nosigs-stream-indef-noindef-nooldmime-crlfeol-to-from-signer-recipUnknown digest %s Illegal -inkey without -signer -contentMultiple signers or keys not allowed No signer certificate specified No recipient certificate or key specified No recipient(s) certificate(s) specified Usage smime [options] cert.pem ... -encrypt encrypt message -decrypt decrypt encrypted message -sign sign message -verify verify signed message -pk7out output PKCS#7 structure -des3 encrypt with triple DES -des encrypt with DES -seed encrypt with SEED -rc2-40 encrypt with RC2-40 (default) -rc2-64 encrypt with RC2-64 -rc2-128 encrypt with RC2-128 encrypt PEM output with cbc aes encrypt PEM output with cbc camellia -nointern don't search certificates in message for signer -nosigs don't verify message signature -noverify don't verify signers certificate -nocerts don't include signers certificate when signing -nodetach use opaque signing -noattr don't include any signed attributes -binary don't translate message to text -certfile file other certificates file -signer file signer certificate file -recip file recipient certificate file for decryption -in file input file -inform arg input format SMIME (default), PEM or DER -inkey file input private key (if not signer or recipient) -keyform arg input private key format (PEM or ENGINE) -out file output file -outform arg output format SMIME (default), PEM or DER -content file supply or override content for detached signature -to addr to address -from ad from address -subject s subject -text include or delete text MIME headers -CApath dir trusted certificates directory -CAfile file trusted certificates file -no_alt_chains only ever use the first certificate chain found -crl_check check revocation status of signer's certificate using CRLs -crl_check_all check revocation status of signer's certificate chain using CRLs -engine e use engine e, possibly a hardware device. -passin arg input file pass phrase source load the file (or the files in the directory) into cert.pem recipient certificate(s) for encryption recipient certificate filesigning key fileBad input format for PKCS#7 file Error reading S/MIME message Can't read content file %s signer certificateError creating PKCS#7 structure Error decrypting PKCS#7 structure Verification successful Verification failure Error writing signers to %s To: %s From: %s Subject: %s Bad output format for PKCS#7 file -sign_receipt-verify_retcode-verify_receipt-cmsout-data_out-data_create-digest_verify-digest_create-compress-uncompress-EncryptedData_decrypt-EncryptedData_encrypt-des3-wrap-aes128-wrap-aes192-wrap-aes256-wrap-debug_decrypt-no_signer_cert_verify-keyid-no_content_verify-no_attr_verify-receipt_request_print-receipt_request_all-receipt_request_first-receipt_request_from-receipt_request_to-secretkeyInvalid key %s -secretkeyidInvalid id %s -pwri_password-econtent_typeInvalid OID %s -certsout-keyoptNo key specified .\apps\cms.c-rctformNo Signed Receipts Recipients Signed receipts only allowed with -sign Usage cms [options] cert.pem ... -cmsout output CMS structure -certsout file certificate output file -keyid use subject key identifier -keyopt nm:v set public key parameters No secret key id receipt signer certificate fileBad input format for CMS file Error writing certs to %s Can't open receipt file %s Bad input format for receipt Error reading receipt Signed Receipt Request Creation Error Error creating CMS structure Error decrypting CMS using secret key Error decrypting CMS using private key Error decrypting CMS using password Error decrypting CMS structure Bad output format for CMS file Signer %d: No Receipt Request Receipt Request Parse Error Signed Content ID: Receipts From List: : First Tier : All Unknown (%d) Receipts To: Usage: rand [options] num -out file - write to file -engine e - use engine e, possibly a hardware device. -rand file%cfile%c... - seed PRNG from files -base64 - base64 encode output -hex - hex encode output usage: engine opts [engine ...] -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands' -vv will additionally display each command's description -vvv will also add the input flags for each command -vvvv will also show internal input flags -c - for each engine, also list the capabilities -t[t] - for each engine, check that they are really available -tt will display error trace for unavailable engines -pre - runs command 'cmd' against the ENGINE before any attempts to load it (if -t is used) -post - runs command 'cmd' against the ENGINE after loading it (only used if -t is also provided) NB: -pre and -post will be applied to all ENGINEs supplied on the command line, or all supported ENGINEs if none are specified. Eg. '-pre "SO_PATH:/lib/libdriver.so"' calls command "SO_PATH" with argument "/lib/libdriver.so". N.\apps\engine.c%s%s(input flags): [Internal] NUMERIC|STRINGNO_INPUT<0x%04X> %s: %s [Error]: internal stack error [Error]: command name too long [Success]: %s [Failure]: %s v-tt-pre-post(%s) %s Loaded: (%s) %s DHRAND [%s] [ available ] [ unavailable ] Illegal timeout value %s -url-header-ignore_err-nonce-no_nonce-resp_no_certs-resp_key_id-no_certs-no_signature_verify-no_cert_verify-no_chain-no_cert_checks-no_explicit-trust_other-no_intern-req_text-resp_text-reqin-respin-VAfile-sign_other-verify_other-validity_periodIllegal validity period %s -status_ageIllegal validity age %s -reqout-respout-pathissuer certificate-index-nminIllegal update period %s -nrequestIllegal accept count %s -ndays-rsigner-rkey-rother-rmdOCSP utility Usage ocsp [options] -out file output filename -issuer file issuer certificate -cert file certificate to check -serial n serial number to check -signer file certificate to sign OCSP request with -signkey file private key to sign OCSP request with -sign_other file additional certificates to include in signed request -no_certs don't include any certificates in signed request -req_text print text form of request -resp_text print text form of response -text print text form of request and response -reqout file write DER encoded OCSP request to "file" -respout file write DER encoded OCSP reponse to "file" -reqin file read DER encoded OCSP request from "file" -respin file read DER encoded OCSP reponse from "file" -nonce add OCSP nonce to request -no_nonce don't add OCSP nonce to request -url URL OCSP responder URL -host host:n send OCSP request to host on port n -path path to use in OCSP request -CApath dir trusted certificates directory -CAfile file trusted certificates file -no_alt_chains only ever use the first certificate chain found -VAfile file validator certificates file -validity_period n maximum validity discrepancy in seconds -status_age n maximum status age in seconds -noverify don't verify response at all -verify_other file additional certificates to search for signer -trust_other don't verify additional certificates -no_intern don't search certificates contained in response for signer -no_signature_verify don't check signature on response -no_cert_verify don't check signing certificate -no_chain don't chain verify response -no_cert_checks don't do additional checks on signing certificate -port num port to run responder on -index file certificate status index file -CA file CA certificate -rsigner file responder certificate to sign responses with -rkey file responder key to sign responses with -rother file other certificates to include in response -resp_no_certs don't include any certificates in response -nmin n number of minutes before next update -ndays n number of days before next update -resp_key_id identify reponse by signing certificate key ID -nrequest n number of requests to accept (default unlimited) - use specified digest in the request -timeout n timeout connection to OCSP responder after n seconds Error Opening OCSP request file Error reading OCSP request responder certificateError loading responder certificate responder other certificatesresponder private keyWaiting for OCSP client connections... Need an OCSP request for this operation! Error loading signer certificate signer certificatessigner private keyError signing OCSP request Error opening file %s Need a responder certificate, key and CA for this operation! Error Opening OCSP response file Error reading OCSP response Responder Error: %s (%d) validator certificateError parsing response WARNING: no nonce in response Nonce Verify error Response Verify Failure Response verify OK No issuer certificate specified Error Creating OCSP request Error converting serial number %s ERROR: No Status found. WARNING: Status times invalid. This Update: Next Update: Reason: %s Revocation Time: bn.\apps\ocsp.cError setting up accept BIO Error accepting connection POSTInvalid request Error parsing OCSP request HTTP/1.0 200 OK Content-type: application/ocsp-response Content-Length: %d Error connecting BIO Can't get connection fd Timeout on connect Unexpected retry condition Timeout on request Select error Error creating connect BIO Error creating SSL context. Error querying OCSP responder -generate-bits-safe-checksUnknown option '%s' No prime specified Specifiy the number of bits. Failed to process value (%s) not is %sprime %-14s hex -checks %-14s number of checks %-14s generate prime -bits %-14s number of bits %-14s safe prime -section-query-data-digest-token_in-token_out-reply-queryfileError getting password. usage: ts -query [-rand file%cfile%c...] [-config configfile] [-data file_to_hash] [-digest digest_bytes][-md2|-md4|-md5|-sha|-sha1|-mdc2|-ripemd160] [-policy object_id] [-no_nonce] [-cert] [-in request.tsq] [-out request.tsq] [-text] or ts -reply [-config configfile] [-section tsa_section] [-queryfile request.tsq] [-passin password] [-signer tsa_cert.pem] [-inkey private_key.pem] [-chain certs_file.pem] [-policy object_id] [-in response.tsr] [-token_in] [-out response.tsr] [-token_out] [-text] [-engine id] or ts -verify [-data file_to_hash] [-digest digest_bytes] [-queryfile request.tsq] -in response.tsr [-token_in] -CApath ca_path -CAfile ca_file.pem -untrusted cert_file.pem cannot convert %s to OID could not create query .\apps\ts.cbad digest, %d bytes must be specified could not create nonce Response has been generated. Response is not generated. Error during serial number generation.Warning: could not open file %s for reading, using serial number: 1 could not save serial number to %s Verification: FAILED invalid digest string usage: srp [args] [user] -verbose Talk alot while doing things -config file A config file -name arg The particular srp definition to use -srpvfile arg The srp verifier file name -add add an user and srp verifier -modify modify the srp verifier of an existing user -delete delete user from verifier file -list list user -gn arg g and N values to be used for new verifier -userinfo arg additional info to be set for user -engine e - use engine e, possibly a hardware device. %s "%s" %d = "%s" g N entryUser entry.\apps\srp.cfailed to update srpvfile Validating user="%s" srp_verifier="%s" srp_usersalt="%s" g="%s" N="%s" Pass %s Internal error validating SRP verifier Creating user="%s" g="%s" N="%s" Internal error creating SRP verifier gNid=%s salt ="%s" verifier ="%s" -add-delete-modify-list-gn-userinfo-dbfile and -configfile cannot be specified together. Exactly one of the options -add, -delete, -modify -list must be specified. Need at least one user for options -add, -delete, -modify. -passin, -passout arguments only valid with one user. trying to read default_srp in " BASE_SECTION " default_srpsrptrying to read srpvfile in section "%s" srpvfileTrying to read SRP verifier file "%s" Database initialised Default g and NNo g and N value for index "%s" Database has no g N information. Starting user processing Processing user "%s" List all users user "%s" does not exist, ignored. t user "%s" reactivated. Cannot create srp verifier for user "%s", operation abandoned . user "%s" does not exist, operation ignored. user "%s" already updated, operation ignored. Verifying password for user "%s" Invalid password for user "%s", operation abandoned. Password for user "%s" ok. Cannot create srp verifier for user "%s", operation abandoned. user "%s" does not exist, operation ignored. t user "%s" revoked. t User procession done. Trying to update srpvfile. Temporary srpvfile created. srpvfile updated. User errors %d. SRP terminating with code %d. asn1parsedgstdhdhparampasswdgendherrstrcrlrsautldsaparamececparamx509genrsagendsagenpkeys_servers_clientspeeds_timeversionpkcs7cmscrl2pkcs7sess_idciphersnseqpkcs8pkeypkeyparampkeyutlspkacsmimerandengineocspprimetsaes-128-ecbaes-192-ecbaes-256-ecbcamellia-128-ecbcamellia-192-ecbcamellia-256-ecbdes3desxrc4-40des-ecbdes-ededes-ede-cbcdes-ede3-cbcdes-cfbdes-ede-cfbdes-ede3-cfbdes-ofbdes-ede-ofbdes-ede3-ofbseed-ecbseed-cfbseed-ofbrc2-ecbrc2-cfbrc2-ofbrc2-64-cbcrc2-40-cbcbf-ecbbf-cfbbf-ofbcast5-cbccast5-ecbcast5-cfbcast5-ofbinvalid modetype out of boundsalready lockednot lockedCRYPTO_r_unlock on write lockCRYPTO_w_unlock on read lockopenssl (lock_dbg_cb): %s (mode=%d, type=%d) at %s:%d OPENSSL_DEBUG_MEMORYoffOPENSSL_FIPSFIPS mode not supported. WARNING: can't open config file: %s >OpenSSL> error in %s bad exit no-quitqexitbyelist-standard-commandslist-message-digest-commandslist-message-digest-algorithmslist-cipher-commandslist-cipher-algorithmslist-public-key-algorithmsopenssl:Error: '%s' is an invalid command. Standard commands Message Digest commands (see the `dgst' command for more details) Cipher commands (see the `enc' command for more details) %-18sName: %s Type: Alias to %s ExternalBuiltin Type: %s Algorithm OID: %s (none) PEM string: %s %s => %s DeleteFileWkernel32.dllFindFirstFileWMoveFileWMultiByteToWideCharuser32.dllgdi32.dllshell32.dllsecur32.dllunicows.dlladvapi32.dllcomdlg32.dllversion.dllmpr.dllrasapi32.dllwinmm.dllwinspool.drvavicap32.dlloleacc.dlloledlg.dllsensapi.dllmsvfw32.dllsetupapi.dllLdrUnloadDllntdll.dllsecurity.dllxFȧFACCG8`E 3??HpFIFRSDSͻk$LD"-~d:\build\ob\bora-7074970\cayman_openssl\build\release\win32_vc120\openssl\build\out32dll\openssl.pdbPP9DDiD|DIDYIIIIIopenssl.exeOPENSSL_ApplinkZ]J]h\]]Y_`HJRcBc(ccbbbbbbbvb^bNb@b*bb bbaaaaaaa` ] u {z|M*mtq, dTb{*y@ oX,.Z*i;VBp2jteks  ~  W & X   2 Q 3 V  z \  w ~ S : i STf O ]N4Vur$ \o q.,+ } {9vuk RBYmWC;{ q c9X ?nF  00<vNW/)b=68mhfZXA_^]Y @zx  C E ?SL6ik8+% n<CSNx!>OKgOR %!Jc ;; x ~twu 8 Nt0  jl\`ml?5Hk ]I  / 0 |[CDB=;76  Q%z/MLnsW _bGMf V7 @C ^ s H { | ` m=  { !M w L3 O P S* ev  ebY\" ~d e P+o S Jfo):5J`:klT v  ) V e z Z Y Uz on| "] N d ` `   . R<FUc c  5MF.(-&#[_P  [h a m ] V G D^XV5 Hkc P y } ZY[L M L 6  a  H ) D  f d T D      mQi >9 oPtP W  ! | x %&p | O "l  zUD/.|$kji_^EO]kafbg^_zo6 x|b1jprm}glrn32tu adaZaLa>a4a,aa`````````|`j`Z`L`>`2```___________v_l_`_V_N_D_:_0_$____^^^^^^^^^^^^^~^v^l^b^X^P^H^@^6^.^$^^^^^]]]va1RO}7uW;pv:-lN#0C@H>6K=x!I^H?SMAJ cdg/&#afe(y "SX%i'x$.;Z<IE<F=Btn:U p`8V+mcibwG(&~yn}{tTV ]4zw*qts743 oSSLEAY32.dllLIBEAY32.dllWS2_32.dll__iob_funcclearerrWfclose`feofbferrorhfflushkfgets_filenoyfopen{fprintffreadfseekftellfwrite=_close_lseekS_read~_setmode_write;_openprintfabortperroratoiatol/strchr;strncmp+sscanf#setvbufislowermemsetF_wassert9strncatgetenv_stricmp]toupper _accessmemcpyNexit_time64isxdigit{_kbhitBstrstr}fputcv_errnofreemalloc$signalisdigitAstrspn~fputsqsort reallocMSVCR120.dllP_crt_debugger_hook__crtUnhandledException__crtTerminateProcessw_except1k_XcptFilter_amsg_exit__getmainargs__set_app_type_exit/_cexit@_configthreadlocale__setusermatherr _initterm_e _initterm__initenv_fmode?_commode5?terminate@@YAXXZ__crtSetUnhandledExceptionFilter_lock_unlock._calloc_crt__dllonexit:_onexit_invoke_watsonC_controlfp_sz_except_handler4_commonCloseHandlePGetLastErrorPSleepQExitProcessCreateThreadGetStdHandlehFindCloseOReadFileWriteFileGetProcessTimes GetCurrentProcessIdOpenProcessGetSystemTime[SystemTimeToFileTimedGetModuleHandleA SetLastErrorLoadLibraryAFreeLibrarygIsDebuggerPresentmIsProcessorFeaturePresent!EncodePointer-QueryPerformanceCounterGetCurrentThreadIdGetSystemTimeAsFileTimeDecodePointerKERNEL32.dlltEEEEEEEEEEEED,E`EEEEETEEE,EhEEEEHEpEEE0EhEEE4E`EEE E\ E E E!EX!E!E!E0"Ex"E;ED;EP;E;E;E;E`- EEE EE$E0ES"絮nUe LsjI)aF X׈^{BXEA  1W=[/_OGV? )[Iz*!,IOQmKKR,0\ܘC=C[Щ>˃uk4A)jUMp쮇8 EwnW`W"ˏ3:7o림Sp!v>/E$Y2.;#x=gO7NGL-OA.-",SU+?X:0ڰ-O&8=pQQy2{-'ŜyR|I ˊf$3;@VP澄 %Ӝlb]+}=zlTQ [GdUZ7%}!ioɊ@zp NFz۳˃#ĽԪ]1FΞugSGD%s~ЎYѲZ/9ͣ¹ǹHƘMʄl)Y5dY!3kQ^޸_ƹ"eFD#33kYtj>6P!Бl/&0ej0VboVqIZM4Xy0UlZL,YV蝯 xQUC;l -A(Пj~ Ы|}5'IQcd>amS9'Ogw:o s>z(a#+΄W~%Te̕ 0YakNCy% Hh f+vFNY LeHxC,$}ZpEl)@?[GD9rzڪ* T#7[a ~$sm@r HlF9OxFj1d 8<*+16`-t2蜓n{q%8*7Dΐ?RR"8v iXj}|,2O 7C]$'FTSbq+qAu:a)F:ck0N% Uj̙r}m䐵pNH`*z=$)ڽפ`-"ek(/y|CBjEO.4T}my.QMyVD7ZHH?,QFAƑrUs,tP:/mwmE i'e^4Ӂ=0C#Bv1sFa 9@zۀ, 4ԒlnOϯLwvrGќJ3nuv1w)R.R0u ͉ lW'=/\v)K xraao9N>Ǐ68%zJԠ>!9r=P]_?mU ![&+wOv,"j办VxD^`ey1#.t॔KXU346Wy.;N!\HJ`)S--o B.q1mo+#ߴ@, }}Kߑk iif[F}pm~uNwMA?bq^8K,0oI.ɚ] U:%#Вã/MUZ1u,A_uc,h˓QsI`&FP_YT͘At_ `{< 뤓ʚ'e[yn&(;smSX`\vCX$; $ET7c}t!HĔD"-->Z1ܕAX@_ڬ?*kX_Hx $< %kBl61z&v jb |I wgG!?C!F0bQrHg͞!0A4w>9g*{/@pO? vJ5NG+]tC3{I@fbz˓SԀH'KAa߿=q %qJWl!}5EjC\T_$.@ޒ#YҡL e[·Uq< $ka3B+wtyyϭW5 tqXk2]vH9#wJp>lR$ AZz^15uĖt۴Ȍ;fPGeb4X5j,Zhxdk>Nz¶vœjiV4J n5`#0d9`vQJ<:, `iJ!IT X!QG>TFٶdT/ϥ(9v[-C$oio}_x@ (eƞVpRҔJ%L.y\ՎTU%vcP"/XXykAg&lWa:}1-8b6BB$ge |oDɫLE{80X+] TIM"@P.x(x$V—,Cfr_S챱^@ H{?j!5GŊO^c`q[JO`ƺJ$ .:΍'! QU0c׍ąN'|.墣Lc9wfʠqP=5.`haCʚ#JEraww*-Va^jFJ?PֺוeSánCӁFFHNy@4q^J^Op-=:ը  9_!1trkd5a 9!f |ʡZqT(pCl{hMEF C,FN&.۰U*PD!e8`$ԜLz" h__;kܾz:'IC=~,^{nln8]V}S>$ ki&+pSFbP3Kʼns;lIǟ D0پ[_׉t),TQޠ/$kwޢhR }!ڻbG6g茪8a(1gPޛ~, Pa孽6N@} K?nAj)}G0 j3=S.Ys>u1GzR٦{8h~KS[Yqenfk6(ץ,9&Kښp7V#^9OCeòp[PI1lՅePfeoMLoPF%ho0i](Hޙ?_ s$ ]*?'b{tbSa'z MTXItU~#Za~qM4)h^ lAsj~22g蠋kE vϑGjZ 7dy=a!t]LQG\LzrSxH:џ}G{tPVW+AV8F NDC!]n&1 !Ľ$PH,.I_W'6 +٘4PXTctvR{(JN؜y؛f/ϬyEx~"Qg&#8pMO@~rR33Π%]oO4~o0o٠]\ A2 ¢~h\(!XcLNKMX\Ug}n To@gL[<zgi @v&CV(_;i6,Qw/W{b;@{h 8!]F#rQFyٽ,W~={k&'jw,B҈ӒQd\lG %??! ]Te}ðhϛ3MӔ> btơu,xY4cO/<8?~%r 9캐[:Xl0B71jj )F˅ 0^9""4ah7=.J[HcӖd4ѠѮl/HC!0_ޣpx. }nBܷF6MF=>>>>7?{??? 100001110161@1F1P1V1`1f1p1v111111111111111112 222#2)262R2l22r33333n4t4444444$5*555x556+6\6a6t66+7:7@7T7~77777718t8888889:9@9T9k9z999999999999: :%:2:K:e:s::::::::::;;u>>>>>>???1?6?o>>+?\?j???@*0j000(1y11 2I2223S3334\44R5g5m55555555555555555666!6+616;6A6K6Q6[6a6k6q6{66666666666666667777%7+757;7E7K7U7[7e7k7u7{77777777777777777888!8+818W8]8u88888888888899979[9a999999999:#:(:.:H:M:S::::::: ;;`;e;k;;;;<<#<>R>\>h>>>>>>>>>>??%?>>/?|??`0\0r000'1g11113222v3|3Y4w4}44444444444444445 555 5*505:5@5J5P5Z5`5j5p5}5555555555"6.6J6[666666666*7=7R7j77888/858@889 9K99999I:W:}:::r; 8>Y>l>>>"?A?k?????p<$0{001c111)2d2233!32383B3H3R3X3b3h3r3x3333333333333 44?4D4j44444455+5=5v555556606m666666666667(72787K7Q7a77 8*888B888<999#:g:::';g;;;5<<'>@>F>`>f>>>>> ???"?K?w?????0 0'0,0K0Q0\000000 11H1f1111111"2:2@2Q2Y2n22222-3@3[3b3i3r3{33333334!4'4485S5]5k5u556B6d666F777#8g888#9g999':g:::C;;;;;;;;;<2_>e>>>>>>>>>>>>>>>>>?? ???"?/?4?:?D?I?O?Y?^?d?n?s?y???????????????????0 0000)0K0W0]00000N1T1t1z111E2P2\2h2{222233834 4%4x44C5O555+6Z6666Q7W777777x8~8888 99*9:9N9z99999^::::::::%;+;;;;(<@>9>?>u>z>>>>>> ?;?m????????????? 00050;0t00t122222(3?3^3h3|33333333 4(4q44445Z555:6667]7778{888889F9a999999 ::::::::::;;;;%;/;5;B;H;R;X;b;h;r;x;; <<*>A>G>Q>W>a>g>q>w>>>>>>>>>>>?D?\?s?y????????0K0g0q0000r1|11111 233333 44!4S444*54555 6J666+7<777&8~889f999J:::; ;;";(;D;;;; >?X???TF00011115222231373R3^3u3{3333333441494>4D4Q4Z4_4q4z44444445555G5M5S5y555555666667 7(7.747G7M777777D8J8P8a8g8y88888889999<9E9K9Q9z99999999: :2:8:h:n:t::::::::::: >/>5>H>N>m>s>>>>>>???-?3?E???????00W0]0u0{00000000000111#1K1Q1W111111122!2'2P2V2\2}22222223%3+3D3_3e333374=44M5S5566<66(7.777777778 8&868P8p8v89g999;:@:V:[:t:z:::::::;;F;P;V;;;;;;;;< <1<7Y>>!?G?L?|?????000w000$1/111111122B2H2p2v22222333333 442484W4]475=5H5_5~5556e6k6v67 7"7(7N7T7c7i73898k8B9H9999::::; ;;)%>+>D>J>c>i>>>>>>>*?z?????????0 0000-0B0H0`0f0{00000000H1.2k222222222&3,3U3[3f3333344'4-4:4@4W4]4n444444525S5c5{56/6>666667!77<88888859I999996:<:W:]:w:}::::::@;s;~;;;-<3<<<<<=====>>6><>U>[>r>x>>>> ???L?S?n?x?}??00D0H0L0P011 2242E2o2~222233-3i3o33333334B4H4x44444{5555536667777 8M88889p9v99999999999999999 ::: :H:N:Y:::W;;;X<^%>/>=>>>,?u??0011%1+151;1E1K1U1[1e1k1u1{11111111 222228243f3l3w334442484K4k444 55(5D5Y5m55 6\666C777<888 9H999(:h:::(;e;<<<<<$=*=7=<=F=L======>>1>B>>>>>??"?5?;?H?N?l?r?????????? 0 000%0l0r0000101|11111;2t2~2222=333#4s445W5556W6667W777E8h8}8888888888888889999#9)93999C9I9S9Y9c9i9s9y99999999999999999: :1:7:::::;;L;R;};;;;"j>u>>?-?c??00W000L1112N2223H3334H4444j555555566$6]6c6n66666666667I77777?8E8P88888889999!9'91979A9G9Q9W9a9g9q9w99999999999999999: :::':-:K:::::;k;;w>>>`?????????????@X0 000"0,020<0B0O0U0_0e0o0u00000000000000000E1W1]1q1111120262\2m2s2y22222H3N3333334'515?5I555L66637w777@8888969\9v9|99999999::@:Q:W:a:g:q:w:::::::::::::::::; ;;;D;i;z;;;;;;;;; <&<1<<<<<<<==.=^=m=========>>>!>(>2>A>`>>>>>>/?K?Q?i?o???P<0F0T0^00 1\111C222'3g333*4f44475w55"6C6X6^6w6}6666666666666666777!7'71777A7G7Q7W7a7g7q7w7777777777777'898?888889X999999o:u:::::::;;; <}>> ?W???`H"0n000/1p11 2222333333333333334444$41474A4G4Q4W4a4g4q4w444444444444444445 555$5*5Y5~555555+616W6]6o666667J7P7[777777889: ::):::K:_:p::::::::::::;;;*;:;E;P;[;f;q;|;;;;;;;;;<<<1<7<^.>F>>>>>>.?4?^?}?????pt00*0}1112222233r444445#5k5}5]7c7{7788n889K9a99:y::::6;;;#>>i??0u00 1L1112P2223N333 4L4445X5556y667f777+8i888,9\9b999::&:+:B:H::::::;;*;D;T;;;;;<>>0>6>P?V?`?f?x??????001.1\1}11112w222 3M3w333=4o44444-5;5\555555616a6o666667o7778 8!8;8e8j8888899999999:::;.;8;B;H;S;e;k;};;;S<<<<<C>Z>d>r>|>>>>7?r???+0x000:1z111:2z22)313H3N3X3^3h3n3x3~33333333333333334 444!4/454B4H4R4X44444505K5o5u555555%6L6R6i667 77"7S777G8889N999:N:::<;Y;j;;;;<<3<9<\b>>>*?????000;0y0~00000000000011171C1n1t111111222&2,2P2V2i2s2y222222223 333+313<3A3G3R3W3]3l3r3333333344,4R4X4h4v4|44444H5`5{5555556)6D6o66666666667;7A7G7U7]7c7z77777777888A8G888888H9[9s99999: :::%:2:>:D:S:Y:}:::::::; ;;;+;7;=;O;U;`;r;x;;;;<'<6<<<<<<<<<<<<<<<<<<==="=,=6=@=J=T=N?Z?d?o?????0>0r0000001R1Z1`1m1s111111122p222#3j333"4o4y4415~555K6667`77788Q889c999Q:::;R;`;;;;?<<<0=>=o=y=====>;>I>{>>>>>??S?y???????? 0020c0q0000 11X11111 222-2m2223,33334 448445Z55555 66Y6667a777"80888888.989999Z::::N;X;;>>B>N>Y>b>j>r>v>>>>>>>>>>>? ??B?O?U?k????????00020L0V0\0r0)1/1:1o1u11111111222.2D2M2Y2q222222223333-343F3W3a3k3u33333333344"4(434F4K4Q4\4p44444444 5'595K5b5v55555566:6a6666&7,7B7T7f7778"888A8T8p8|8888888889 99+9=9T9e9k9999999::/:5:b:h::::::::;;$;9;L;R;a;|;;;;;<9>,>4>>>D>N>T>r>>>>>>>>>>>? ?S?v??????0 0L0R000000001 121G1W1_1m111111111G2e2w2}22223&323Q3d3|33333333S4_4i4444455!5.5f5l55555506q6w666666666777j777777777777+8M8S8e8k88888888888899!9'9=9C9_9e9w999999999999999999::::&:,:6:<:F:L:V:\:f:l:y:::::::::::::::::;;;;!;';1;7;A;F;L;V;\;f;l;v;|;;;;;;;;;;;;;;;;; <<<"<,<2<< >>>(>.>8>>>H>N>X>^>h>n>x>~>>>>>>>>>>>>>>>>????'?-?7?j>y>>>>?j>>>>>>*?4?k?y?????0+090k0y0000 11Z1111=2T2_2p222H33333 4T444#5m556U66667777A888,999:o::;q;;CK>>>A????@060@0000011&1,1D1M1S1k1o1y11111111122>2D2l2}2222223&3g3m3x3333334464<4J4W4`4v4|4444444445P5g5z55556 66>6G6P6X6^6k6y666666;7g7u77788k8q8888888 9"9(9399999: ::!:':^::w;};;;;< <<<3<;?>>>>??#?????P060I0g021f1l1z1111111B2H22333#4-434\4b4'5555555?6E6666 77J7P7b7h77777778>8X8^8w8}888888888889 9$9*989>9N9T9c9n9|999999':T:::A;W;`;s;;;;;;;;;;;;;;;;;;;<<< >>>'>->7>=>G>M>W>]>o>u>>>>>>>>>>>>>>>>>????"?(?2?8?B?H?R?X?b?h?u?{????????????????`\0 000"0,020<0B0L0R0\0b0o0u00000000000061Z1e1222222u3{3333334444"4R4X4444445555$5*535=5F5u555556&6:6K6_666666A7Z7`7k7777888'888C8V8e8V9c999999999 :::!:3:9:C:O:W:\:h:v::::::::::::::;;;;&;2;:;?;K;W;c;k;};;;;;;;;;<<"<(%?/???pO0f000001p111F222 3J333 4J444 5J555 6J6667R7778R8889R999:R:::;R;;;:<<<<:=~==>R>>>6???*0z00 1s11 2f222@333@444@555@666@7771888 99999994:F:X:o:::::::;;.;L;f;~;;;;;;;;;;;<<<'<0D>M>p>v>|>>>>>?"?'?4?:?B?G?Q?b?p?z?????????>0G0j0p0v0000001 111"131A1K1Z1g1v1|111111122$2/2@2z222222222222333,353D3S333333334,414D4J4R4W4a4r44444444444"5+5N5T5Z5e5v5555555566 6*696F6U6[6l6u6666666677P7l7q7777777777777 88$838l8u888888899$9*92979A9R9`9j9y99999999: :/:5:;:F:W::::::::::; ;;&;5;;;L;U;d;s;;;;;;;<; >>>">'>1>B>P>Z>i>v>>>>>>>>?)?/?5?@?Q???????????? 00%0+0<0E0T0c00000000+1G1L1T1Z1b1g1q111111111112=2F2i2o2u22222222333"303:3I3V3e3k3|3333333444'484r444444444444555,555D5S555555555"6>6C6T6Z6b6g6q666666666667>7G7M7p7v7|77777788$8*82878A8R8`8j8y8888888889 9.949:9E9V9999999999: ::':6:<:M:V:e:t:::::::;;;W;\;d;j;r;w;;;;;;;;;;;<>%>0>A>{>>>>>>>>>>>>???,?5?D?S????????H070<0D0J0R0W0a0r00000000000-161Y1_1e1p11111111122 2*292F2U2[2l2u222222233!3[3w3|3333333333333 44$434m4v4444444N5T5^5j5t5z5555555555555556 666'6-676=6G6M6W6]6g6m6w6}66666666666666667 777 7-737=7C7M7S7]7c7m7s7}77777777777777778888 8&83898C8I8S8Y8c8i8s8y888888888889 999 919C9e999999999 :E:e::::; ;;;);7;A;P;];l;r;;;;;;;; <&<0<6>>>2>U>[>a>m>x>>>>>>>?? ???-?;?E?T?a?p?v??????0 00'0J0P0V0b0m00001E1K1V1n1t1{111111111111222-2q2~222222222353;3F3d3j3q3v3}33333333333444f4s4y444444445F5g5u555556 660666=6B6I6N6X6i6w666666666657B7H7S7f7777777788-838:8?8F8K8U8f8t8~88888888889E9K9V9i9999999:>:L:q:}::;;;;;;;;;;;<>$>1>>>K>]>s>>>>>>>>>>>>??1?9?E?Z?l?????????d0(030>0Z0f0k0u000001161<1Q1[1q111111112<2o2t2z2222222!3'3-3M3l33333334 44&434W4]4k4x444444445?6V666666777*777777+898k8y8888888*949z9999:$:j:t::::;";S;a;;;;;;;<<*<9>#>)>;>M>[>a>h>n>v>>>>>>>>>>??b????0 00$0=0n0000000000001111111111111R22223 3>3k3q3y333333344444"4)40474>4E4N44445545W5h5y5555K6{666666 77-7;7E7O7777777878k888899 ::$:B:J:R:X:f:u:::::::;;;r>>>?T???0R0001D1112D222+4E55v77818D8o88888O999999 :::7:=:K;f;r;w;;<"+>d>i>o>>>>? ??,?>+?????,0B00001a1n112>2v222%3R3u3{33344?4c4o44;5R555566b6h666_7777748888889999:6:<:::: ;;m;;;;;;>?$?K??????? 0000001&1E1h1n1x1~1111122"2(2|22222~3333333 443494C4I4445#535L5e55555 666K6666$7K7i7o7778 8.8O88"9f999&:\:c:::::::::::;N;;;Y<<<<===???????0@0 03090V0\0001B1{1111/2m23S3333K4{444v556$6:6V6s666666Z7t777 8S8j8p8|888888889'9@9Q9W9y999999$:.:o::;K;t;;;;;;;;<<)>%>,>1>G>Y>z>>>>>>>>>> ???*?3?J?Q?Z?j?q?v??????????????@0 00 0*040>0H0R0\0f0p0z0000000000000000000000000111 11114181<1@1D1H1L1P1T1X1\1`1d1h1l1p1t1x1|111111111111"2-2<2C2M2f2222373b33334M4l44444555555s66666666E7K7V77777H8v89%:,:1:8:?:F:M:T:[:b:i:v:::::::::::::l;;;;;<+>>?r?y?~?????????????????Px0000%0:0?0H0t0x0|000000000000000000!161<1_1i1o1~111111111112!2+212@2F2Y2c2i2x2~2222222222333K3W33333344`45A5U5b5i55555555555$63696F6L6R6r6x6666666$767<7K7 882898L8S8{8888889 9"9K9t9{99999::;8;D;J;;;;;;;;;J>U>g>r>>>C?\?{????`F0[0e0s0001W1112f22222222233!3.353N3d333333*404;4W4]444445k556S666777777788^88889:9@9O9U9999:":=:R:::;M;;;;$<*>>>?K?????????????p060<0O0j0w000!1'121j122%3l3334%4@4F4Z444D5N5T5n5555556F6h666687>7K77777777777788999:::t:::4;t;;;49>o>y>>>>>/?9?o?y????L70w0012191z1111111111112 222 2-232=2C2M2S2]2c2m2s2}22222222222222223333 3&33393C3I3S3Y3c3i3s3y333333333333333334 444&4,494?4I4O4]4c4m4s4}44444444B555%6j667Y77728889m9999:7:=:X:h:t:::::::::;;K;Q;;;;;N>3>9>P>>>>N?????00P0V000000n111122L2l2222/353[33334444445m5w556W6667W777&8p88999$9.949>9D9N9T9^9d9n9t9~9999999999999999:::::::;;;8;Q;^;{;;;;;;Z<`<<<<<< =Z=`==>>/>o>u>>>>>>>>>>>>D?J?\?`?d?h????4000 1f111B2223K33333333334 444 4*404:4@4M4S4u44445+515F5i5|555266666.7|777E8K8U8[8e8k8u8{888888888889)969S9Y9999 ;;/;@;F;e;u;;;;;=L=]===#>s>>?c?? 0M0c00061t112T222D3334444444L5R5f5u5{5555555666K6Q666666D7`77 8~88888U9b9v9|999999999::::!:':1:7:D:J:T:Z:d:j:t:z::::::::::::::: ;_;g;;;;'W>>>>?D?N?T?^?d?n?t?~????????????????l0}000000}111111122.242?2l222222/353b3344415;5H5R555"6f66667778X88819x99:Q:::;Y;;;<[<<<=b===,>n>>?o??T0r01l111122N333K44 5^55)6/6\6b6667787>7{777777777777777778888$8.848>8D8N8T8^8d8n8t888888888888888889 999$9*949:9D9J9T9Z9d9j9t9z99999999999999999 ::: :*:0:::@:J:P:^:d:n:t:::::::::;8;>;m;w;|;;;;;;.<= >#>)>c>i>>>>??0'00 11N1T1{111112"222223334555556E666 7J777 8e888*9j999*:j:::.;p;;;<<~<<=D===>R>>>?R????l*0e0001U1112=2x22253z333:445e55S667f77 8Y88899 :S:: ;; <<=y==>i>>?u??0000000011 12181J1P111111162<2222233$3*343:3D3J3T3Z3d3j3t3z333333333333333334 44 4*404:4@4J4P4Z4`4j4p4z444444444444444445 55 5&50565@5F5P5V5`5f5p5v555555555555555556 666*606:6@6J6P6Z6`6666667 7J7T7Y7j777788W8f8|88888#9>9~999::0:G:M:::::::; ;x;~;;;;;;<<<<<<<< =A1G11111E3K3s3y33333b4h4445 585>5v55555566666(7777 848 99999:::H:q::::::+;\;;;;;;2<<<*=v==== >#>)>^>>!?9999999:%:A:P:b:p:J;;;::>>>>>>?@?O????????0hI0O0Z00000445556e66667775888:9z9994:w:::4;t;;;7u>>?l??@0O0001!1o112U2222/3=334e4455F555 66h6677788$8a8888889+9C9M9`9|999999n:t::Q;e;v;;<3<@c>>>>>>,? >9>b>h>>>>"?'?0?j????`00;00-131k11 22i2334]456S6Y6667C7I7Y7_7u7{777777 878Q8W88879d9z999:;;;;;<"<0>S>>>:???p%0u000E1112W222=333%4j445R55556 6N6_6e6x6666777777D8H8L8P8z88859;9@9L9X9`9:::; ;N;c;;I<|<<<$=======>^>> ??u??$ 0R000U112222223'333J3V3l3q3333333333443494f4k4{444444453595L5R5x5~55555555555556 6661676B6J6O6h6n6666P7[7777777880868z88888 9$9*979<9V9\999999:M:R:f:l::::: ;;E;K;;;6<<<=/=5=====f>}>>>>>>?3?9?e?{???(000w111112233-3k3333.4b444565n5555555556 626>6D6Y6_6y6666 7?7t777777)8>88888&9<9S99999::&:5:@:::::::::::; ;;+;:;J;y;;;;;;;;;;;-<7v>>>>>>B?L?b?m?????????????\00000 0&0,02080>0D0J0P0V0\0b0h0n0t0z000000000000000000000001 1111"1(1.141:1@1F1L1R1X1^1d1j1p1v1|111111111111111111111122 2222$2*20262<2B2H2N2T2Z2`2f2l2r2x2~222222222222222222222233333 3&3,32383>3D3J3P3V3\3b3h3n3t3z333333333333333333333334 4444"4(4.444:4@4F4L4R4X4^4d4j4p4v4|444444444444444444444455 5555$5*50565<5B5H5N5T5Z5`5f5l5r5x5~555555555555555555555566666 6&6,62686>6D6J6P6V6\6b6h6n6t6z666666666666666666666667 7777"7(7.747:7@7F7L7R7X7^7d7j7p7v7|777777777777777777777788 8888$8*80868<8B8H8N8T8Z8`8f8l8r8x8~888888888888888888888899999 9&9,92989>9D9J9P9V9\9b9h9n9t9z99999999999999999999999: ::::":(:.:4:::@:F:L:R:X:^:d:j:p:v:|::::::::::::::::::::::;; ;;;;$;*;0;6;<;B;H;N;T;Z;`;f;l;r;x;~;;;;;;;;;;;;;;;;;;;;;;<<<<< <&<,<2<8<>> >>>>$>*>0>6><>B>H>N>T>Z>`>f>l>r>x>~>>>>>>>>>>>>>>>>>>>>>>????? ?&?,?2?8?>?D?J?P?V?\?b?h?n?t?z??????????????????????<00 0000$0*00060<0B0H0N0T0Z0`0f0l0r0x0~000000000000000000000011111 1&1,12181>1D1J1P1V1\1b1h1n1t1z111111111111111111111112 2222"2(2.242:2@2F2L2R2X2^2d2j2p2v2|222222222222222222222233 3333$3*30363<3B3H3N3T3Z3`3f3l3r3x3~333333333333333333333344444 4&4,42484>4D4J4P4V4\4b4h4n4t4z444444444444444444444445 5555"5(5.545:5@5F5L5R5X5^5d5j5p5v5|555555555555555555555566 6666$6*60666<6B6H6N6T6Z6`6f6l6r6x6~666666666666666666666677777 7&7,72787>7D7J7P7V7\7b7h7n7t7z777777777777777777777778 8888"8(8.848:8@8F8L8R8X8^8d8j8p8v8|888888888888888888888899 9999$9*90969<9B9H9N9T9Z9`9f9l9r9x9~9999999999999999999999:: :::!:&:,:1:6:;:F:K:Q:V:[:`:k:p:v:{:::::::::::<<<'<1<6<< >>>>%>,>3>:>A>I>Q>Y>e>n>s>y>>>>>>>>>? ????%?,?3?:?A?H?P?X?`?k?p?v???????????0>0c0000111112Q222223 33333333333344 444)41474C4N4W4a4h4n4s4x4}44444444445$5*51565C5R5Z5b5v5|55555555555555666$6j6z666667/75777888,8[8c8r88888888888 9'919m9r9999999I:N:^:d:j:p:v:|::::p3|333dX:d:p:|:::::::::::; ;;$;@;L;X;d;p;|;;;;;;;;;;;< <<$<0<<>>>>>>>????? ?$?(?,?0?4?0<0 +70 0!0 +]*0VQA]K00W~|NYKw;0  *H 01 0 UZA10U Western Cape10U Durbanville10 U Thawte10U Thawte Certification10UThawte Timestamping CA0 121221000000Z 201230235959Z0^1 0 UUS10U Symantec Corporation100.U'Symantec Time Stamping Services CA - G20"0  *H 0 ITK %y"W*oܸ&Csk¿.PZvC%CE{t"״MD$k_E;DCsi+˙r&Mq1QaSI,xE/W?=ƒJ{3y uAQlie)`; tޒ"t|'JÞ-'}aqPK],e ؖ|NHDD h]jxdE`F~T|yq00U_n\t}?L.02+&0$0"+0http://ocsp.thawte.com0U00?U8060420.http://crl.thawte.com/ThawteTimestampingCA.crl0U% 0 +0U0(U!0010UTimeStamp-2048-10  *H  yY0h O]7_R DnmX|0i#s oG9*ÎY M1\*zzWLey@b%n7j!AW?wI*^8j"Q~0085njP0  *H 0^1 0 UUS10U Symantec Corporation100.U'Symantec Time Stamping Services CA - G20 121018000000Z 201229235959Z0b1 0 UUS10U Symantec Corporation1402U+Symantec Time Stamping Services Signer - G40"0  *H 0 c 9D#DIa Sۭ,Jn"hcSit<üu00Y WC0+*0  *H 01 0 UUS10U VeriSign, Inc.10U VeriSign Trust Network1;09U 2Terms of use at https://www.verisign.com/rpa (c)101.0,U%VeriSign Class 3 Code Signing 2010 CA0 161102000000Z 191221235959Z0d1 0 UUS10U California10U Palo Alto10U VMware, Inc.10U VMware, Inc.0"0  *H 0 ߢB $_ R0[WR‚lkJR%_1QNdqpޅ1i P2zĠ"Cj-V?g2I-/y{u&0.zDٜ +$+ٰSA"YEIWD6wST^BaXbx\٪d؞nk QcH4xH䞜6:9^P񜥏K]0Y0 U00U0+U$0"0 http://sf.symcb.com/sf.crl0aU Z0X0Vg 0L0#+https://d.symcb.com/cps0%+0 https://d.symcb.com/rpa0U% 0 +0W+K0I0+0http://sf.symcd.com0&+0http://sf.symcb.com/sf.crt0U#0ϙ{&KɎ&ҧ0U/ vqD.?%^+0  *H ,acû )8-Tauq55նF7l420]2/f%\M\)ϊSBn= +@{&<%^V>y6uqg{W=YؼLٌIo'f4 DTdZlIO̽{AZnm4pWHuJD\I`jC_țuE)d%=JS'a[]k͆eⲾ#j GMy9a: W|Gfض]JGqC2 wߖqU&J@<& m%{Ͽ?/wƵVz;T0Sb4Z(LN~[uGr.4L~O =W0֦6րv.~4-00U00pU i0g0e `HE0V0(+https://www.verisign.com/cps0*+0https://www.verisign.com/rpa0U0m+ a0_][0Y0W0U image/gif0!00+kπjH,{.0%#http://logo.verisign.com/vslogo.gif04U-0+0)'%#http://crl.verisign.com/pca3-g5.crl04+(0&0$+0http://ocsp.verisign.com0U%0++0(U!0010UVeriSignMPKI-2-80Uϙ{&KɎ&ҧ0U#0e0 C93130  *H V"4aHVdٌĻ z"G8J-lq|pO S^tI$&GLc4E &sЩdmqE`YQ9XkԤyk Ar7" #?Da̱\=ҍB=e6Դ=@(#&K ː]L4<7o 4&ٮ Ś!3oX%|tXuc?1|Sv[퓺]!S‚Sc P=TR,=.ǓH1$0$001 0 UUS10U VeriSign, Inc.10U VeriSign Trust Network1;09U 2Terms of use at https://www.verisign.com/rpa (c)101.0,U%VeriSign Class 3 Code Signing 2010 CAY WC0+*0 +0 *H  1  +70 +7 10  +70# *H  1E6Y ٢Q(e0* +7 10http://www.vmware.com/0  *H "}5]<_M~?cWfUEV"2˸GrQV@N(V@uC\7,x̬&V[)7pყJif|7(;N 81v'](Ns8t__s}|Bq:jbɶժ!0 *H  100r0^1 0 UUS10U Symantec Corporation100.U'Symantec Time Stamping Services CA - G285njP0 +]0 *H  1  *H 0 *H  1 180108101548Z0# *H  1_̈́ hM0  *H J+4W bHL'W45ZxF)#_Ya,]# B0Jy_"cuZ:8˛Ue|F6u˛סu)Z#m UqWYGIZp-~wDӷx 0Cc]oI9|#};xĤ嶛eD+{Q_5.2V>tPi&m0Q/ - kID!Rv7Z0 +71q0m *H ^0Z10  `He0\ +7N0L0 +70 010  `He !6cґwJ$PW Av;D00e;s&a0  *H  01 0 UUS10U Symantec Corporation10U Symantec Trust Network100.U'Symantec Class 3 SHA256 Code Signing CA0 150724000000Z 180822235959Z0d1 0 UUS10U California10U Palo Alto10U  VMware, Inc.10U VMware, Inc.0"0  *H 0 ™-;d K7Z"=?ل_KDw.mQ7OB[MmM"l_@ST;?yQFbt09㇀EF~dٍvD_Y]MFߥwX$Q؈H?o&:u\e0}DGv*7ԣ_b0^0 U00U0+U$0"0 http://sv.symcb.com/sv.crl0fU _0]0[ `HE0L0#+https://d.symcb.com/cps0%+0 https://d.symcb.com/rpa0U% 0 +0W+K0I0+0http://sv.symcd.com0&+0http://sv.symcb.com/sv.crt0U#0;Sy3}.+ʷrf0Ufodjq%É!w%t0  *H  69N̫ V! u *x~I)QɨPqUZR`AUtԦ{bhί:zn9@@Q-K=WދYnx0S4j ]1-3ůn1KWIJ&'MU,6~<؞LߓfE B">s&@8ijM1HI"cw߄_&ܪ 0 \;xp_0Y0A=xvI`a}ʆ*0  *H  01 0 UUS10U VeriSign, Inc.10U VeriSign Trust Network1:08U 1(c) 2006 VeriSign, Inc. - For authorized use only1E0CU٦V?.)|=꺓P")L:_֤%k/L'{ "`?MLrgw'Ǻ5I(J D 6+P]'KT+^t É"wCL?d!00 a0  *H 01 0 UUS10U Washington10URedmond10U Microsoft Corporation1)0'U Microsoft Code Verification Root0 110222192517Z 210222193517Z01 0 UUS10U VeriSign, Inc.10U VeriSign Trust Network1:08U 1(c) 2006 VeriSign, Inc. - For authorized use only1E0CU'a[]k͆eⲾ#j GMy9a: W|Gfض]JGqC2 w!;*?\U0  *H `tV:"5W'vڡ}\Gw>mUFn`F\);!v8zӌ4ih෋ S.DuR~Juh+ \ :M 0  +71 0  *H  z0 v10  `He0 *H  0 +2010  `He mk}QCeXAzexyτ\uxt2TJ20180108101549Z][0Y1 0 USG10U GMO GlobalSign Pte Ltd1)0'U GlobalSign TSA for Advanced - G200!h[͏ w0  *H  0[1 0 UBE10U GlobalSign nv-sa110/U(GlobalSign Timestamping CA - SHA256 - G20 160524000000Z 270624000000Z0Y1 0 USG10U GMO GlobalSign Pte Ltd1)0'U GlobalSign TSA for Advanced - G20"0  *H 0 ǒ(P ])DYdνQnlb6C^ dw]wE^$A7f7t̳Lsɖ5|Tl֮cx_Y."'ز[Ec'= eRA4TJT㿗?@&|C0pxN J:w#ȓV]F̊Ҫ [2A{NTʫR^$V ݽyAãg3q2sg0c0U0LU E0C0A +20402+&https://www.globalsign.com/repository/0 U00U% 0 +0FU?0=0;975http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0X+L0J0H+0_Edȉ3L?Ē򾱬*COp543| 2$ |>200 1P0  *H  0L1 0U GlobalSign Root CA - R310U  GlobalSign10U GlobalSign0 110802100000Z 290329100000Z0[1 0 UBE10U GlobalSign nv-sa110/U(GlobalSign Timestamping CA - SHA256 - G20"0  *H 0 ëQ%OF#Eŕ[lW3<~SHzÌGBJl Ħ[D !XMg 4vm7ŠG&yW+|"x"6kwyN1Kqb#9DyvW/FҌthiQv]$[T=&@'Y }Y*8k@eWv[O,ۄPO܋iL{0&zXYrWv؀ n 00U0U00U!J]d7GA+L0GU @0>0<U 0402+&https://www.globalsign.com/repository/06U/0-0+)'%http://crl.globalsign.net/root-r3.crl0U#0K.E$MPc0  *H  VJ|ɿ6fѾ5l1YlA_.B%Ա7h(jtKcwa;/3}l,b6s6^촀xvy!Ģg۳s@"9wԘqoNu=dj;^NF*]tb #\*8ψ(id*sFnŘGVtGxX+lєP{ x"].}DNnz 6P100q0[1 0 UBE10U GlobalSign nv-sa110/U(GlobalSign Timestamping CA - SHA256 - G2!h[͏ w0  `He0 *H  1  *H  0 *H  1 180108101549Z0/ *H  1" GѮ@!TMVGq^OCQēW&J0 *H   1000}UZVsCT\\* 0u0_]0[1 0 UBE10U GlobalSign nv-sa110/U(GlobalSign Timestamping CA - SHA256 - G2!h[͏ w0  *H PNnV8]"GvuuANZYidx< c7:f<|JEM1XT0-K2IrZ9Wގ6^'PEmxM