%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /usr/local/bin/
Upload File :
Create Path :
Current File : //usr/local/bin/openssl-0.9.8

ELF	>>"@i@8@(&@@ @ hh    ...>">"Aa&a&h	h	0K0{&0{&>PGg&g&RtdAa&a&h	@Ptd""44Qtd  HH/libexec/ld-elf.so.1FreeBSDFreeBSDFreeBSD%* >GP]ep{6Sb~ )3:@HNU\dnu*<Ne}!7Lcm-=JW`is-6CKR^gs /?MZkt~(=Vi	)	D	Z	i								
!
/
?
O
e
u
~







+<IZmv
&3>N[hr{
 
(
/
<
L
_
m
|






%0BUgu#6Kbt	):K^o*3?ISfq{%1=I`t 8M[i}.IWr'8DKP`glw~)9N^m.GU_u,E[n~6Ncu+Na|	'@Kbv4K[kz$6H_p'7AN\kv
-@Tds
 + 7 O j     !!;!X!k!}!!!!!!!!!!" "9"F"Y"i"""""""""##%#:#F#[#v#########$$$!$3$C$H$O$X$^$d$t$|$$$$$$$$%#%?%Y%d%|%%%%%%%&& &2&B&N&U&e&u&&&&&&&&&&	''+'4'?'P'['h''''''''((,(>(F(N(\(h(t(((((((((((()))!)'),)>)B)I)N)X)e)v))))))))))))
**+*7*G*^*l*******+&+<+H+U+g+{+++++++++,, ,3,F,[,p,,,,,,,,--&-8-R-e-|-----.%.A._.l.y......//"/./;/B/J/_/d/o//////0'0=0B0I0N0V0d0r0000000000001.1I1m111111122$282G2_2t2222222333-3@3a3u333333344(484G4`4r44444444455#545F5T5b5q55555555566)686H6T6h6{666666677.7?7S7c7w7777777
8#888Q8f88888888890{&@&9(z9(z$9(z-9WWPvݣkYY:*&K4AEA/@	!Ki,as~W]R!bQ3 ep[yQEAs 	|HjNvJ?$|Z2V6^B\hS_`F,52?^'M/&L-U?uM@JCF.DI#;!~86+Xz+*+7oC{BETk5[	qt|VrTnP"Oow;=d%~?.${R>m,U}]>`IS7+d@g#Hw-m$C cU%'Sp&<g_Xd8^
u.%f
i9
IPL\(1JX	xOhB/3]ck&K04l)>:1HkWtW(
IxNSWPZ9T</YGalAKH>e#MQh$
zjTb}y*1g;6%0On(Jwqa)GUp83Brm0*7Oq4Zfz)\5LN9=t{:!r`s.v_lx"21<=f26YQ57jFRCy:eV
 X#nD@'DE
ib9-u;[PY"=R}L8G3c(NoM,-)0D4
"V<Fv'G__progname_init_tlsatexitenvironexit_Jv_RegisterClassesBIO_ctrlBIO_freeBIO_free_allBIO_newBIO_new_fpBIO_printfBIO_s_fileCONF_modules_unloadCRYPTO_cleanup_all_ex_dataCRYPTO_freeCRYPTO_malloc_debug_initCRYPTO_mem_ctrlCRYPTO_mem_leaksCRYPTO_set_locking_callbackCRYPTO_set_mem_debug_functionsCRYPTO_set_mem_debug_optionsENGINE_cleanupENGINE_load_builtin_enginesERR_clear_errorERR_free_stringsERR_load_crypto_stringsERR_remove_stateEVP_cleanupNCONF_freeNCONF_loadNCONF_newOPENSSL_add_all_algorithms_noconf__stderrp__stdinp__stdoutpfflushfgetsfprintffputsfwritegetenvlh_freelh_insertlh_newlh_retrievelh_strhashqsortsignalstrcmpstrlenstrncmpBIO_new_fileERR_print_errorsPEM_X509_INFO_read_bioX509_INFO_freeX509_LOOKUP_ctrlX509_LOOKUP_fileX509_LOOKUP_hash_dirX509_NAME_onelineX509_PURPOSE_get0X509_PURPOSE_get0_nameX509_PURPOSE_get0_snameX509_PURPOSE_get_countX509_STORE_CTX_freeX509_STORE_CTX_initX509_STORE_CTX_newX509_STORE_CTX_trusted_stackX509_STORE_add_lookupX509_STORE_freeX509_STORE_newX509_STORE_set1_paramX509_STORE_set_flagsX509_VERIFY_PARAM_freeX509_freeX509_get_subject_nameX509_verify_certX509_verify_cert_error_stringabortprintfputssk_freesk_new_nullsk_numsk_pop_freesk_pushsk_shiftASN1_TYPE_freeASN1_TYPE_getASN1_generate_nconfASN1_parse_dumpASN1_tag2strBIO_f_base64BIO_pushBIO_readBIO_writeBUF_MEM_freeBUF_MEM_growBUF_MEM_newNCONF_get_stringOBJ_cleanupOBJ_create_objectsatoid2i_ASN1_TYPEi2d_ASN1_TYPEperrorsk_valueASN1_INTEGER_freeASN1_STRING_set_default_mask_ascASN1_dupBIO_snprintfBN_freeBN_newBN_num_bitsBN_printBN_set_wordBUF_strlcatBUF_strlcpyDSA_freeDSA_generate_keyEC_GROUP_freeEC_GROUP_get_degreeEC_KEY_dupEC_KEY_freeEC_KEY_generate_keyEC_KEY_get0_groupEC_KEY_newEC_KEY_set_groupERR_peek_errorEVP_PKEY_assignEVP_PKEY_freeEVP_PKEY_newEVP_des_ede3_cbcEVP_dss1EVP_ecdsaEVP_get_digestbynameEVP_sha1NCONF_get_number_eNCONF_get_sectionOBJ_txt2nidPEM_read_bio_DSAparamsPEM_read_bio_ECPKParametersPEM_read_bio_X509PEM_read_bio_X509_REQPEM_write_bio_PUBKEYPEM_write_bio_PrivateKeyPEM_write_bio_X509PEM_write_bio_X509_REQPEM_write_bio_X509_REQ_NEWRSA_freeRSA_generate_key_exRSA_newX509V3_EXT_REQ_add_nconfX509V3_EXT_add_nconfX509V3_set_ctxX509V3_set_nconfX509_NAME_add_entry_by_NIDX509_NAME_add_entry_by_txtX509_NAME_entry_countX509_NAME_freeX509_REQ_add1_attr_by_NIDX509_REQ_add1_attr_by_txtX509_REQ_freeX509_REQ_get_pubkeyX509_REQ_newX509_REQ_print_exX509_REQ_set_pubkeyX509_REQ_set_subject_nameX509_REQ_set_versionX509_REQ_signX509_REQ_verifyX509_get_pubkeyX509_get_serialNumberX509_gmtime_adjX509_newX509_print_exX509_set_issuer_nameX509_set_pubkeyX509_set_serialNumberX509_set_subject_nameX509_set_versionX509_signd2i_DSAparamsd2i_X509_REQ_biofputci2d_DSAparamsi2d_X509_REQ_bioi2d_X509_bios2i_ASN1_INTEGERBIO_debug_callbackBIO_f_mdBIO_getsBIO_set_callbackBIO_set_callback_argCRYPTO_mallocEVP_MD_CTX_set_flagsEVP_PKEY_sizeEVP_SignFinalEVP_VerifyFinalEVP_md5HMAC_CTX_cleanupHMAC_CTX_initHMAC_FinalHMAC_Init_exOBJ_nid2snOPENSSL_cleanseASN1_d2i_bioASN1_i2d_bioBN_bn2binDH_checkDH_freeDH_newDHparams_printPEM_read_bio_DHparamsPEM_write_bio_DHparamsd2i_DHparamsi2d_DHparamsDH_generate_parameters_exDSA_dup_DHDSA_generate_parameters_exDSA_newsscanfBIO_f_cipherBIO_number_readBIO_number_writtenBIO_set_flagsEVP_BytesToKeyEVP_CIPHER_CTX_set_flagsEVP_CIPHER_CTX_set_paddingEVP_CIPHER_iv_lengthEVP_CIPHER_nidEVP_CipherInit_exEVP_get_cipherbynameEVP_read_pw_stringOBJ_NAME_do_all_sortedOBJ_nid2lnRAND_pseudo_bytes_CurrentRuneLocale_ThreadRuneLocale__mb_sb_limit__tls_get_addrfclosefopenmemsetputcharsetvbufDES_cryptEVP_DigestFinal_exEVP_DigestInit_exEVP_DigestUpdateEVP_MD_CTX_cleanupEVP_MD_CTX_init__assertstrchrstrncatERR_error_string_nERR_get_string_tableSSL_load_error_stringslh_node_stats_biolh_node_usage_stats_biolh_stats_bioASN1_ENUMERATED_freeASN1_ENUMERATED_newASN1_ENUMERATED_setASN1_GENERALIZEDTIME_freeASN1_GENERALIZEDTIME_newASN1_GENERALIZEDTIME_set_stringASN1_INTEGER_newASN1_INTEGER_setASN1_INTEGER_to_BNASN1_OBJECT_freeASN1_PRINTABLE_typeASN1_STRING_cmpASN1_TIME_checkASN1_TIME_freeASN1_TIME_newASN1_TIME_printASN1_UNIVERSALSTRING_to_stringASN1_UTCTIME_freeASN1_UTCTIME_newASN1_UTCTIME_set_stringBIO_putsBN_add_wordBN_bn2hexBN_hex2bnBN_to_ASN1_INTEGERBUF_strdupCONF_freeCONF_get_sectionCONF_loadEVP_PKEY_copy_parametersEVP_PKEY_missing_parametersNETSCAPE_SPKI_b64_decodeNETSCAPE_SPKI_freeNETSCAPE_SPKI_get_pubkeyNETSCAPE_SPKI_verifyOBJ_nid2objOBJ_obj2nidOBJ_txt2objPEM_write_bio_X509_CRLTXT_DB_get_by_indexTXT_DB_insertTXT_DB_writeX509V3_EXT_CRL_add_nconfX509_CRL_add0_revokedX509_CRL_add1_ext_i2dX509_CRL_freeX509_CRL_newX509_CRL_set_issuer_nameX509_CRL_set_lastUpdateX509_CRL_set_nextUpdateX509_CRL_set_versionX509_CRL_signX509_CRL_sortX509_EXTENSION_freeX509_NAME_ENTRY_freeX509_NAME_ENTRY_get_dataX509_NAME_ENTRY_get_objectX509_NAME_add_entryX509_NAME_delete_entryX509_NAME_dupX509_NAME_get_entryX509_NAME_get_index_by_NIDX509_NAME_get_index_by_OBJX509_NAME_newX509_REQ_check_private_keyX509_REQ_printX509_REVOKED_add1_ext_i2dX509_REVOKED_newX509_REVOKED_set_revocationDateX509_REVOKED_set_serialNumberX509_check_private_keyX509_get_default_cert_areaX509_printX509_to_X509_REQX509_verifyaccessatoli2a_ASN1_OBJECTmemcpystatstrcasecmpstrcpyPEM_read_bio_PKCS7PEM_write_bio_PKCS7PKCS7_freeX509_CRL_printd2i_PKCS7_bioi2d_PKCS7_bioPEM_read_bio_X509_CRLPKCS7_SIGNED_newPKCS7_newd2i_X509_CRL_bioEVP_MD_typeX509_CRL_digestX509_CRL_get_ext_d2iX509_CRL_verifyX509_NAME_hashX509_OBJECT_free_contentsX509_STORE_CTX_cleanupX509_STORE_get_by_subjecti2a_ASN1_INTEGERi2d_X509_CRL_bioERR_get_errorERR_reason_error_stringEVP_PKEY_get1_RSAPEM_write_bio_RSAPrivateKeyPEM_write_bio_RSA_PUBKEYRSA_check_keyRSA_printi2d_RSAPrivateKey_bioi2d_RSA_NETi2d_RSA_PUBKEY_bioBIO_dumpRSA_private_decryptRSA_private_encryptRSA_public_decryptRSA_public_encryptRSA_sizeDSA_printEVP_PKEY_get1_DSAPEM_write_bio_DSAPrivateKeyPEM_write_bio_DSA_PUBKEYi2d_DSAPrivateKey_bioi2d_DSA_PUBKEY_bioDSAparams_printPEM_write_bio_DSAparamsEC_KEY_printEC_KEY_set_asn1_flagEC_KEY_set_conv_formPEM_read_bio_ECPrivateKeyPEM_read_bio_EC_PUBKEYPEM_write_bio_ECPKParametersPEM_write_bio_ECPrivateKeyPEM_write_bio_EC_PUBKEYd2i_ECPrivateKey_biod2i_EC_PUBKEY_bioi2d_ECPKParametersi2d_ECPrivateKey_bioi2d_EC_PUBKEY_bioECPKParameters_printEC_GROUP_checkEC_GROUP_get0_generatorEC_GROUP_get_cofactorEC_GROUP_get_curve_GFpEC_GROUP_get_orderEC_GROUP_get_point_conversion_formEC_GROUP_method_ofEC_GROUP_new_by_curve_nameEC_GROUP_set_asn1_flagEC_GROUP_set_point_conversion_formEC_GROUP_set_seedEC_METHOD_get_field_typeEC_POINT_point2bnEC_get_builtin_curvesOBJ_sn2nidd2i_ECPKParametersEVP_PKEY_save_parametersOBJ_createPEM_write_bio_X509_AUXX509_PURPOSE_get_idX509_STORE_CTX_get_current_certX509_STORE_CTX_get_errorX509_STORE_CTX_get_error_depthX509_STORE_CTX_set_certX509_STORE_CTX_set_flagsX509_STORE_set_default_pathsX509_add1_reject_objectX509_add1_trust_objectX509_alias_get0X509_alias_set1X509_asn1_methX509_check_purposeX509_cmp_timeX509_delete_extX509_digestX509_email_freeX509_get1_emailX509_get1_ocspX509_get_ext_countX509_get_issuer_nameX509_issuer_name_hashX509_ocspid_printX509_reject_clearX509_subject_name_hashX509_trust_cleari2d_ASN1_HEADERi2d_X509i2d_X509_NAMEi2d_X509_PUBKEYtimeEVP_aes_128_cbcEVP_aes_192_cbcEVP_aes_256_cbcEVP_des_cbcEVP_idea_cbcRAND_statusRSA_X931_generate_key_exBIO_f_bufferBIO_f_nbio_testBIO_f_sslBIO_int_ctrlBIO_new_dgramBIO_new_socketBIO_s_nullBIO_sock_should_retryBIO_socket_ioctlBIO_test_flagsBN_bin2bnDTLSv1_server_methodEC_KEY_new_by_curve_nameOCSP_CERTID_freeOCSP_REQUEST_add_extOCSP_REQUEST_freeOCSP_REQUEST_newOCSP_RESPONSE_freeOCSP_RESPONSE_printOCSP_cert_to_idOCSP_parse_urlOCSP_request_add0_idPEM_ASN1_write_bioSSL_CIPHER_get_nameSSL_CIPHER_get_versionSSL_CTX_callback_ctrlSSL_CTX_ctrlSSL_CTX_freeSSL_CTX_get_cert_storeSSL_CTX_load_verify_locationsSSL_CTX_newSSL_CTX_set_cipher_listSSL_CTX_set_client_CA_listSSL_CTX_set_cookie_generate_cbSSL_CTX_set_cookie_verify_cbSSL_CTX_set_default_verify_pathsSSL_CTX_set_generate_session_idSSL_CTX_set_info_callbackSSL_CTX_set_quiet_shutdownSSL_CTX_set_session_id_contextSSL_CTX_set_tmp_rsa_callbackSSL_CTX_set_verifySSL_SESSION_printSSL_acceptSSL_callback_ctrlSSL_clearSSL_ctrlSSL_do_handshakeSSL_freeSSL_get_SSL_CTXSSL_get_certificateSSL_get_ciphersSSL_get_current_cipherSSL_get_errorSSL_get_peer_certificateSSL_get_rbioSSL_get_servernameSSL_get_sessionSSL_get_shared_ciphersSSL_get_verify_resultSSL_get_wbioSSL_has_matching_session_idSSL_library_initSSL_load_client_CA_fileSSL_newSSL_pendingSSL_readSSL_renegotiateSSL_set_SSL_CTXSSL_set_accept_stateSSL_set_bioSSL_set_msg_callbackSSL_set_session_id_contextSSL_set_shutdownSSL_set_verifySSL_stateSSL_versionSSL_writeSSLv23_server_methodSSLv2_server_methodSSLv3_server_methodTLSv1_server_method__isthreadedclosefilenoi2d_OCSP_RESPONSEi2d_SSL_SESSIONreadselectshutdownsleepwriteBIO_dump_indentBIO_popDTLSv1_client_methodENGINE_by_idENGINE_freeEVP_PKEY_bitsPEM_ASN1_read_bioSSL_COMP_get_nameSSL_CTX_set_client_cert_engineSSL_SESSION_freeSSL_get_client_CA_listSSL_get_current_compressionSSL_get_current_expansionSSL_get_fdSSL_get_peer_cert_chainSSL_get_servername_typeSSL_set_connect_stateSSL_set_sessionSSL_shutdownSSLv23_client_methodSSLv2_client_methodSSLv3_client_methodTLSv1_client_method__errord2i_OCSP_RESPONSEd2i_SSL_SESSIONgetsocknamestrstrAES_cbc_encryptAES_ige_encryptAES_optionsAES_set_encrypt_keyBF_cbc_encryptBF_optionsBF_set_keyBN_optionsCAST_cbc_encryptCAST_set_keyDES_ede3_cbc_encryptDES_ncbc_encryptDES_optionsDES_set_key_uncheckedDSA_signDSA_verifyECDH_compute_keyECDSA_signECDSA_verifyEC_KEY_get0_public_keyEC_KEY_precompute_multEVP_CIPHER_CTX_cleanupEVP_CIPHER_CTX_initEVP_DecryptFinal_exEVP_DecryptInit_exEVP_DecryptUpdateEVP_DigestEVP_EncryptFinal_exEVP_EncryptInit_exEVP_EncryptUpdateEVP_md2EVP_md4EVP_ripemd160HMAC_UpdateMD2_optionsRAND_cleanupRAND_seedRC2_cbc_encryptRC2_set_keyRC4RC4_optionsRC4_set_keyRSA_PKCS1_SSLeayRSA_set_default_methodRSA_signRSA_verifySHA1SHA256SHA512SSLeay_versionalarmatofd2i_RSAPrivateKeydupfdopenforkgetrusagegettimeofdayidea_cbc_encryptidea_optionsidea_set_encrypt_keymallocpipesysconfBIO_s_connectSSL_connecttimesASN1_HEADER_freeBIO_new_fdBN_pseudo_randBUF_MEM_grow_cleanCONF_modules_loadCRYPTO_reallocENGINE_ctrlENGINE_ctrl_cmdENGINE_ctrl_cmd_stringENGINE_get_idENGINE_load_private_keyENGINE_load_public_keyENGINE_register_all_completeENGINE_set_defaultEVP_PKEY_set1_RSAOPENSSL_load_builtin_modulesPEM_read_bio_PUBKEYPEM_read_bio_PrivateKeyPEM_read_bio_X509_AUXPKCS12_freePKCS12_parsePKCS12_verify_macTXT_DB_create_indexTXT_DB_freeTXT_DB_readUI_OpenSSLUI_add_input_stringUI_add_verify_stringUI_construct_promptUI_create_methodUI_ctrlUI_destroy_methodUI_freeUI_get0_user_dataUI_get_input_flagsUI_get_string_typeUI_method_get_closerUI_method_get_openerUI_method_get_readerUI_method_get_writerUI_method_set_closerUI_method_set_openerUI_method_set_readerUI_method_set_writerUI_new_methodUI_processUI_set_resultX509V3_conf_freeX509V3_parse_listX509_EXTENSION_get_objectX509_NAME_print_exX509_POLICY_NODE_printX509_PURPOSE_get_by_snameX509_REQ_get_extensionsX509_STORE_CTX_get0_policy_treeX509_STORE_CTX_get_explicit_policyX509_VERIFY_PARAM_add0_policyX509_VERIFY_PARAM_newX509_VERIFY_PARAM_set_flagsX509_VERIFY_PARAM_set_purposeX509_add_extX509_get_extX509_get_ext_by_OBJX509_policy_tree_get0_policiesX509_policy_tree_get0_user_policiesa2i_ASN1_INTEGERd2i_ASN1_HEADERd2i_PKCS12_biod2i_PUBKEY_biod2i_PrivateKey_biod2i_RSA_NETd2i_X509_biorenamestrrchrBIO_get_callback_argHMACRAND_bytesSSL_CTX_check_private_keySSL_CTX_use_PrivateKeySSL_CTX_use_PrivateKey_fileSSL_CTX_use_certificateSSL_CTX_use_certificate_fileSSL_alert_desc_string_longSSL_alert_type_string_longSSL_state_string_longbcmpacceptbindconnectgethostbyaddrgethostbynamegetservbynamelistensetsockoptsocketRAND_egdRAND_file_nameRAND_load_fileRAND_write_fileSSLeaySSL_SESSION_newSSL_CIPHER_descriptionSSL_get_cipher_listNETSCAPE_CERT_SEQUENCE_freeNETSCAPE_CERT_SEQUENCE_newPEM_read_bio_NETSCAPE_CERT_SEQUENCEPEM_write_bio_NETSCAPE_CERT_SEQUENCEASN1_INTEGER_getEVP_PKCS82PKEYEVP_PKEY_add1_attr_by_NIDPBEPARAM_freePKCS12_SAFEBAG_freePKCS12_certbag2x509PKCS12_createPKCS12_decrypt_skeyPKCS12_get_attr_genPKCS12_set_macPKCS12_unpack_authsafesPKCS12_unpack_p7dataPKCS12_unpack_p7encdataPKCS8_PRIV_KEY_INFO_freeX509_STORE_CTX_get1_chainX509_STORE_load_locationsX509_keyid_set1d2i_PBEPARAMi2d_PKCS12_biosk_deleteuni2ascEVP_PKEY2PKCS8_brokenPEM_read_bio_PKCS8PEM_read_bio_PKCS8_PRIV_KEY_INFOPEM_write_bio_PKCS8PEM_write_bio_PKCS8_PRIV_KEY_INFOPKCS8_decryptPKCS8_encryptX509_SIG_freed2i_PKCS8_PRIV_KEY_INFO_biod2i_PKCS8_bioi2d_PKCS8_PRIV_KEY_INFO_bioi2d_PKCS8_bioi2d_PrivateKey_bioASN1_STRING_setNCONF_load_bioNETSCAPE_SPKI_b64_encodeNETSCAPE_SPKI_newNETSCAPE_SPKI_printNETSCAPE_SPKI_set_pubkeyNETSCAPE_SPKI_signEVP_rc2_40_cbcEVP_rc2_64_cbcEVP_rc2_cbcPKCS7_decryptPKCS7_encryptPKCS7_get0_signersPKCS7_signPKCS7_verifySMIME_read_PKCS7SMIME_write_PKCS7ENGINE_finishENGINE_get_DHENGINE_get_DSAENGINE_get_RANDENGINE_get_RSAENGINE_get_ciphersENGINE_get_digestsENGINE_get_firstENGINE_get_nameENGINE_get_nextENGINE_initERR_print_errors_fpstrspnASN1_GENERALIZEDTIME_printBIO_new_acceptBIO_new_connectBIO_new_sslOCSP_BASICRESP_freeOCSP_BASICRESP_newOCSP_REQUEST_printOCSP_REQ_CTX_freeOCSP_RESPONSE_newOCSP_SINGLERESP_add1_ext_i2dOCSP_basic_add1_statusOCSP_basic_signOCSP_basic_verifyOCSP_cert_id_newOCSP_cert_status_strOCSP_check_nonceOCSP_check_validityOCSP_copy_nonceOCSP_crl_reason_strOCSP_id_get0_infoOCSP_id_issuer_cmpOCSP_onereq_get0_idOCSP_request_add1_nonceOCSP_request_onereq_countOCSP_request_onereq_get0OCSP_request_signOCSP_resp_find_statusOCSP_response_createOCSP_response_get1_basicOCSP_response_statusOCSP_response_status_strOCSP_sendreq_bioOCSP_sendreq_nbioOCSP_sendreq_newOpenSSLDieX509_get0_pubkey_bitstrd2i_OCSP_REQUESTi2d_OCSP_REQUESTBN_dec2bnBN_is_prime_exlibc.so.7FBSD_1.0FBSD_1.3FBSD_1.5/usr/local/ssl/0.9.8/liblibssl.so.0.9.8libcrypto.so.0.9.8libthr.so.3i& i&!i&"j&6i&Ii&i&i&i&i&i&i&j&j&j&0j&
j&9j&X j&(j&8j&j&j&k&j& k&=j&>j&j&j&k&7k&Sk&TH&P&X&`&h&(p&x&&&0&&'&&&&&/ȟ&П&؟&&&&&&.&+&*&, &&(&#0&$8&1@&
H&P&X&`&h&
p&x&&&&)&%&2&	&&-&EȠ&FР&8ؠ&C&7&9&4&>&;&=&<&H &D(&S0&M8&J@&:H&OP&LX&N`&Qh&3p&5x&6&R&U&T&P&A&G&@&B&Kȡ&?С&Iء&d&_&V&c&e&a&`&b&[ &\(&]0&X8&g@&iH&fP&WX&^`&Yh&hp&Zx&&&&&&&l&}&&~Ȣ&wТ&zآ&y&&|&x&p&&&& &k(&0&8&@&H&P&X&`&h&op&rx&&&n&v&&{&&&&ȣ&У&أ&&&&&&&&& &(&0&8&@&H&P&X&q`&h&p&x&&&&&&&&m&t&sȤ&Ф&ؤ&&&j&u&&&&& &(&0&8&@&H&P&X&`&h&p&x&&&&&&&&&&ȥ&Х&إ&&&&&&&&& &(&0&8&@&H&P&X&`&h&p&x&&&&&&&&&&Ȧ&Ц&ئ&&&&&&K&P&1&R &J(&+0&O8&S@&
H&P&X&`&h&-p&x&&&&2&3&&4&5&G&ȧ&Ч&Iا&/& &&#&8&L&N&M& &.(&00&68&7@&*H&P&%X&&`&Uh&$p&Hx&&&F&E&D&&&,&T&	Ȩ&)Ш&ب&Q&&@&;&<&(&&&C &?(&'0&B8&@&=H&AP&>X&:`&
h&p&x&"&!&Z&V&[&W&Y&X&^&]ȩ&_Щ&\ة&g&e&c&b&h&d&a&`&i &f(&l0&p8&o@&kH&jP&sX&r`&nh&qp&mx&y&v&x&u&w&t&{&z&&}Ȫ&~Ъ&|ت&&&&&&&&& &(&0&8&@&H&P&X&`&h&p&x&&&&&&&&&&ȫ&Ы&ث&&&&&&&&& &(&0&8&@&H&P&X&`&h&p&x&&&&&&&&&&Ȭ&Ь&ج&&&&&&&&& &(&0&8&@&H&P&X&`&h&p&x&&&&&&&&&&ȭ&Э&ح&&&&&
&&&& &	(&0&8&@&H&P&X&`&h&p&x&&&&&#&&&&&Ȯ&Ю&خ&&&&&&&
&& &(&$0&8&!@&H& P&X&`&h&p&x&"&&&&&&&&&ȯ&Я&د&8&9&:&;&'&(&-&)&+ &6(&.0&?8&5@&2H&@P&&X&7`&<h&4p&=x&%&3&/&*&0&1&,&k&l&~Ȱ&а&xذ&w&t&r&H&c&i&M&C&| &F(&0&v8&u@&NH&DP&}X&j`&gh&Gp&Jx&z&s&y&_&[&`&b&p&q&aȱ&hб&Lر&K&A&B&{&f&E&I&W&Y &](&Z0&^8&X@&\H&VP&mX&n`&eh&Op&Px&d&U&R&S&T&Q&o&&&Ȳ&в&ز&&&&&&&&& &(&0&8&@&H&P&X&`&h&p&x&&&&&&&&&&ȳ&г&س&&&&&&&&& &(&0&8&@&9H&P&X&`&h&p&x&&&&&&&&&&ȴ&д&ش&&&&&&&&& &(&0&8&@&H&P&X&`&h&p&x&&&&&&&&&&ȵ&е&ص&&&&&&&&& &(&0&8&@&H&P&X&`&h&p&x&&&&&&&&&&ȶ&ж&ض&&
&&
&	&&&& &(&0&8&@&H&P&X&`&h&p&x&&&&& &!&.&)&+&*ȷ&&з&$ط&#&%&'&(&,&"&-&R&< &0(&E0&H8&5@&FH&4P&9X&G`&Dh&Cp&Bx&Q&8&@&:&J&3&L&M&K&>ȸ&;и&/ظ&I&?&=&A&1&2&N&P&O &6(&U0&Vaes-192-cbcaes-256-cbcrc2-cbccast5-ecbquitError loading directory %s
 [-engine e]-outform-keyout-days -key file      use the private key contained in file
output_passwordPrivate Keyprivate key length is too short,
DSAencrypt_rsa_key	dh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);
%d-bufsize%-14s passphrase is the first line of the file argument
passwd != NULL-noemailDNgenerating index
 -msie_hack      - msie modifications to handle all those universal strings
malloc error
The subject name appears to be ok, checking data base for clashes
00ERROR:There is already a certificate for %s
Everything appears to be ok, creating and signing the certificate
CERTIFICATE WILL NOT BE CERTIFIED: I/O error
 -outform arg  output format - DER or PEM
-passin arg    pass phrase source
failed
	if ((tmp_3 = BN_bin2bn(ec_cofactor_%d, sizeof(ec_cofactor_%d), tmp_3)) == NULL)
		goto err;
	if (!ok)
subject=  -startdate      - notBefore field
 -clrtrust       - clear all trusted purposes
-state-no_dheunable to create curve (sect163r2)
 -mtu          - Set link layer MTU
 -WWW          - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>
---
Ciphers common between both SSL end points:
drop connection and then reconnect
 -tls1         - just use TLSv1
 -cipher       - preferred cipher to use, use the 'openssl ciphers'
no EVP given
des      Available options:
public+R4:%ld:%d:%.2f
ECDSA verify failure

%s
 [sysconf value]%7d bytes:%.2fdes cbcDoing %d bit %s %s's for %ds: Unable to get connection
error creating name index:(%ld,%ld,%ld)
%s Policies:issuer= %s
SSL3 alert %s:%s:%s
, ERROR:TLS %s extension "%s" (id=%d), len=%d
errno=%d Memory allocation error
-outform X      output format (DER or PEM)
%s [options]
-crlfeolVerification successful
               to load it (if -t is used)
-respin file       read DER encoded OCSP reponse from "file"
-path              path to use in OCSP request
Need a responder certificate, key and CA for this operation!
Select error
Unknown option '%s'
smimedes3cast5-cfbcast-cbcOPENSSL_FIPS-trustedwhere options are
-nameopt-asn1-kludge -noout         do not output REQ
-----
old subject=string is too long, it needs to be less than  %d bytes long
sha256	DH *dh;
		return(NULL);	static unsigned char dh%d_p[]={-salt-iv-a/-base64Password: error on line %ld of config file '%s'
writing new certificates
The %s field needed to be the same in the
CA certificate (%s) and the request (%s)
CERTIFICATE WILL NOT BE CERTIFIED
Signature did not match the certificate
no name/value pairs found in %s
                (can be used more than once)
 -crlnumber      - print CRL number
uncompressednamed_curveEC_GROUP *get_ec_group_%d(void)
	{
	if ((tmp_2 = BN_bin2bn(ec_a_%d, sizeof(ec_a_%d), NULL)) == NULL)
		goto err;
-serialGenerating certificate request
-nbio_test-servernameserver certificate private key filewarning: id_prefix is too long if you use SSLv2
 -nbio_test    - test with the non-blocking test bio
cert_status: ocsp response sent:
'%s' is a directory
-legacy_server_connectSTARTTLS/stream:features>write R BLOCK
 -showcerts    - show all certificates in the chain
   i:%s
nistb571aesecdsab409ecdhk571md5      DSA sign failure.  No DSA sign will be done.
ECDSA sign failure.  No ECDSA sign will be done.
ECDSA verify failure.  No ECDSA verify will be done.
ECDH computations don't match.
%4u bit ecdh (%s) %8.4fs %8.1f
aes-128 ige-www option too long
SET_USER_INTERFACEOut of memory
unable to load number from %s
file name too long
%s.%sverify return:%d
read handshake_failure, ServerKeyExchange'random' data can be kept in (the file will be overwritten).
OpenSSL 0.9.8zh 3 Dec 2015Warning unsupported bag type:  -key arg       create SPKAC using private key
-nosigs-from               encrypt PEM output with cbc aes
               load the file (or the files in the directory) into
signing key file-preIllegal timeout value %s
-VAfile-no_nonce          don't add OCSP nonce to request
responder private keyError loading signer certificate
Error parsing response
	Revocation Time: Error connecting BIO
%-14s number of checks
des-ofbOPENSSL_DEBUG_MEMORYtype out of boundsno-
Cipher commands (see the `enc' command for more details)
 -i            indent entries
asn1 -text          text form of request
options are
-checknon-hex digit
/private_keyInvalid name options: "%s"
 in entry %d
missing hold instruction
 -extfile file   - Configuration file with X509v3 extentions to add
failed to update database
-certfileunable to load the file, %s
 -noout          don't print key out
-inkey file     input key
static unsigned char dsa%d_q[]={	/* build generator */
x509.c -cert arg     - certificate file to use
cert_status: error querying responder
.html-fallback_scsvgetsockname:errno=%d
EHLO openssl.client.net
 -cert arg     - certificate file to use, PEM format assumed
%s is an unknown cipher or digest
aes-192-igeecdhk233ecdsap160 ecdsap192 ecdsap224 ecdsap256 ecdsap384 ecdsap521
You have chosen to measure elapsed time instead of user CPU time.
+R3:%ld:%d:%.2f
%30ssign    verify    sign/s verify/s
hmac(md5)aes-256 igeno_auxuse_quote, CLIENT-MASTER-KEY bad_certificate export_restrictionerror setting random cookie secret
-LMKEnter Import Password:PKCS7 Encrypted data: Shrouded Keybag: -nocrypt-embed-nocrypt        use or expect unencrypted private key
-nooldmime-out file      output file
usage: engine opts [engine ...]
-trust_other       don't verify additional certificates
-no_cert_checks    don't do additional checks on signing certificate
Error Opening OCSP response file
No issuer certificate specified
Timeout on request
rc2des-ede3rc2-ecbrc2-ofb-informError writing output
-newkey                the random number generator
 -reqexts ..    specify request extension section (override value in config file)
Error getting passwords
unable to get '%s' section
to be sent with your certificate request
Error Verifying Data

	-5-v-P%-14s decrypt
invalid hex key value
bytes written:%8ld
-table             format output as table
salt_len <= 8-keyfilecannot lookup how many days to certify for
 -selfsign       - sign a certificate with the key associated with it
 -revoke file    - Revoke a certificate (given in file)
Signature ok
affiliationChanged -text           - print out a text format version
 -in arg         input file
 -aes128, -aes192, -aes256
		{ DSA_free(dsa); return(NULL); } -param_enc arg  specifies the way the ec parameters are encoded
                 in the asn1 der encoding
 -out arg          output file - default stdout
 -list_curves      prints a list of all currently available curve 'short names'
-req-clrrejectGetting request Private Key
 -set_serial     - serial number to use
.srl-aes128-tlsextdebug-status_timeout-cert2 -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg'
s_server.cCiphers supported in s_server binary
Allocation error in generating RSA key
-reconnectdidn't found STARTTLS in server response, try anyway...
bad select %d
write X BLOCK
-mrrsa4096signECDH failure.
usage: s_time <args>
error converting serial to ASN.1 format
-x509_strict-policy_printunable to write X509
 -ssl3       - SSL3 mode
Error reading sequence file %s
-twopass-passout p    output file pass phrase source
-engine e     use engine e, possibly a hardware device.
certificatesEnter Export Password:-v2Unknown cipher %s
Error decrypting key
tDH -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands'
[Error]: internal stack error
-respin-status_age-cert file         certificate to check
-signkey file      private key to sign OCSP request with
-req_text          print text form of request
-text              print text form of request and response
Waiting for OCSP client connections...
Error setting up accept BIO
Can't get connection fd
enccrl2pkcs7desxbf-cfbcertificate file -genconf file file to generate ASN1 structure from
unable to load DSA parameters from file
-nodes-subjyesModulus=unavailable
%s_maxsha512	if ((dh->p == NULL) || (dh->g == NULL))%s [options] [numbits]
enter %s %s password:-%-25sin_stdin == 0-crldaysSuccessfully loaded extensions file %s
\0x%02Xinvalid revocation date %s
 -extensions ..  - Extension section (override value in config file)
Error Reading Output File
-oaep           use PKCS#1 OAEP
	if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))compressed	if (tmp_1)
		BN_free(tmp_1);
		}
usage: x509 args
Error parsing URL
 -nbio         - Run with non-blocking IO
 -no_ssl2      - Just disable SSLv2
TIMEOUT occured
no client certificate available
'%s' contains '..' reference
Error opening '%s'
rwrite W BLOCK
 -key arg      - Private key file to use, in cert file if
aes-128-igeecdhk409ecdhb163ecdsak163 ecdsak233 ecdsak283 ecdsak409 ecdsak571
%ld %d bit DSA signs in %.2fs
%18ssign    verify    sign/s verify/s
+R:%d:%s:%f
Can't access file descriptor %s
SSL_accept>>>, ??? %02xs_cb.cinvalid IP address
 -context arg    - set the session ID context
Usage nseq [options]
-certpbe-password p   set import/export password source
Error reading key
-nointern      don't search certificates in message for signer
-certfile file other certificates file
RANDNeed an OCSP request for this operation!
bnsha1OPENSSL_CONFunknown option %s
 -noout arg    don't produce any output
Error loading config file '%s'
where options  are
 -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'
 -subj arg      set or modify request subject
 -set_serial    serial number to use for a certificate generated by -x509.
For some fields there will be a default value,
-hex            output as hex dump
unable to write DH parameters
	return(dh);
	}generator may not be chosen for DSA parameters
 -noverifyUsage: passwd [options] [passwords]
%sname_optemail_in_dnmessage digest is %s
policytodayerror while loading CRL number
default_crl_hours -startdate YYMMDDHHMMSSZ  - certificate validity notBefore
 -keyform arg    - private key file format (PEM or ENGINE)
 -ss_cert file   - File contains a self signed cert to sign

emailAddress type needs to be of type IA5STRING
%s=Unknown (%c).
<NONE> -hash           - print hash value
 -nextupdate     - nextUpdate field
 -outform arg    output format - DER or PEM
 -conv_form arg  specifies the point conversion form 
unable to load elliptic curve parameters
	EC_GROUP *group = NULL;
static unsigned char %s_%d[] = {<No Alias>
No
 -f4             use F4 (0x10001) for the E value
           - a DSA parameter file as generated by the dsaparam command
 -dkey arg     - second private key file to use (usually for DSA)
 -ssl2         - Just talk SSLv2
 -no_tls1      - Just disable TLSv1
 -bugs         - Turn on SSL bug compatibility
 -servername host - servername for HostName TLS extension
 -key2 arg     - Private Key file to use for servername, in cert file if
 -legacy_renegotiation - enable use of legacy renegotiation (dangerous)
CONNECTION CLOSED
cert_status: Can't retrieve issuer certificate.
Generating temp (%d bit) RSA key...connect:errno=%d
. CAPABILITY
 -servername host  - Set TLS extension servername in ClientHello
ecdhb409+H %11.2f aes-128 cbcevpDon't understand line '%s' from child %d
%d connections in %ld real seconds, %ld bytes read per connection
-connect host:port - host:port to connect to (default is %s)
-www page     - Retrieve 'page' from the siteext_dumpnofnameError configuring OpenSSL
%s.attr.%sSSL_connect unsupported_certificate-in file  input file
-des3         encrypt private keys with triple DES (default)
Enter MAC Password:Nothing to do!
%s, Iteration %ld
-inform X       input format (DER or PEM)
-passout arg    output file pass phrase source
-spksect-des3          encrypt with triple DES
signer certificateError reading S/MIME message
Bad output format for PKCS#7 file
Usage: rand [options] num
-base64               - base64 encode output
v -t[t]       - for each engine, check that they are really available
-respout-path-signer file       certificate to sign OCSP request with
-rkey file         responder key to sign responses with
-nmin n            number of minutes before next update
passwdgendsaspkacinvalid mode-CApath -[digest]      Digest to sign with (md5, sha1, md2, mdc2, md4)
 -multivalue-rdn enable support for multivalued RDNs
Error Loading request extension section %s
bad input format specified for X509 request
verify failure
You are about to be asked to enter information that will be incorporated
Name '%s' too long
unknown option '%s'
-d              to output debug info
Error getting password
Error setting digest %s
p value is not primeGenerating DSA parameters, %d bit long prime
This is going to take a long time
%s	%s
 -out file - output the key to 'file
-notext-crl_CA_compromiseInvalid certificate options: "%s"
newcrl_extensions -outdir dir     - Where to put output certificates
 -spkac file     - File contains DN and signed public key and challenge
optionalError getting CRL issuer certificate
Error getting CRL issuer public key
Public Key= -conv_form arg    specifies the point conversion form 
  %-10s: secp192r1need to specify a CAkey if using the CA command
 -addtrust arg   - trust certificate for a given purpose
 -CAcreateserial - create serial number file if it does not exist
-f4-certform-no_ecdhe-no_ticket -Verify arg   - turn on peer certificate verification, must have a cert.
 -nocert       - Don't use any certificates (Anon-DH)
sv_bodyRead BLOCK
<pre>
Error writing session file %s
write W BLOCK
 -keyform arg  - key format (PEM or DER) PEM default
                 'prot' defines which one to assume.  Currently,
---
Acceptable client certificate CA names
ecdsak283ecdsak409rc2-cbc  program when this computer is idle.
USE_TOD No CIPHER specified
-reusep12no_issuerext_defaultdump_dernoneerror converting number from bin to BIGNUM
error creating serial number index:(%ld,%ld,%ld)
-ignore_critical unknown_casockets_socket.cunable to load SSL_SESSION
-clcerts-noiter-out outfile  output filename
-noout        don't output anything, just verify.
-passin arg     input file pass phrase source
keyEnter Encryption Password: -challenge arg challenge string
Can't find SPKAC called "%s"
No recipient(s) certificate(s) specified
     -no_chainIllegal validity age %s
-nminResponse Verify Failure
Response verify OK
%-14s hex
ecparamaes-128-ecbaes-192-ecbbf-ofbOpenSSL> -noout -newkey rsa:bits generate a new RSA key of 'bits' in size
oid_fileEC
Please enter the following 'extra' attributes
-hex-crypt             standard Unix password algorithm (default)
 -2        - use 2 as the generator value
 -engine e - use engine e, possibly a hardware device.
-gencrldefault_cathere needs to be defined a directory for new certificate to be placed in
Data Base Updated
 -gencrl         - Generate a new CRL
 -policy arg     - The CA 'policy' to support
Revoking Certificate %s.
-crlnumberdsaparam_mainneed_randThis could take some time
 -des            encrypt PEM output, instead of 'des' every other 
                 cipher supported by OpenSSL can be used
unknown curve name (%s)
	if (!EC_GROUP_set_generator(group, point, tmp_2, tmp_3))
		goto err;
		group = NULL;
-addreject-email-issuer_hash/* issuer :%s */
unsigned char XXX_public_key[%d]={
 -modulus        - print the RSA key modulus
 -clrreject      - clear all rejected purposes
-F4                 load the file (or the files in the directory) into
                 the random number generator
-Using default temp DH parameters
 -crlf         - convert LF from terminal into CRLF
 -ssl3         - Just talk SSLv3
Reused session-id
---
New, usage: s_client args
 -nbio_test    - more ssl protocol testing
 -sess_out arg - file to write SSL session to
Server certificate
response parse error
ecdhk283ecdhp160  ecdhp192  ecdhp224 ecdhp256  ecdhp384  ecdhp521
-multi n        run n benchmarks in parallel.
RSA sign failure.  No RSA sign will be done.
options:cast cbcca_defaultesc_ctrldn_revauto%s.attrMac verify error (wrong password?) in PKCS12 file for %s
undefinedwrite%s:failed in %s
TLS 1.0 , CertificateRequest-ousage:version -[avbofpd]
 -text           - print ssl session id details
-?-pk7out-nodetach      use opaque signing
Error writing signers to %s
-resp_no_certs-no_internreqgendherrstrdes-edecast5-ofblist-standard-commandsusage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]Error parsing structure
-text -utf8          input characters are UTF8 (default ASCII)
%s [%s]:etaonrishdlcupfm-%-14s to use the %s message digest algorithm
%02x	if ((dh=DH_new()) == NULL) return(NULL);
		};hex string is too long
-create_serialca.centry %d: not revoked yet, but has a revocation date
 -batch          - Don't ask questions
 -subj arg       - Use arg instead of request's subject
error unpacking public key
NULL -print_certs  print any certs or crl in the input
 -certfile arg  certificates file of chain to a trusted CA
crlNumber=nextUpdate= -passin arg     input file pass phrase source
Public KeyError Reading Input File
Error reading input Data
-certin         input is a certificate carrying an RSA public key
 number        number of bits to use for generating private key
	DSA *dsa;
-list_curvesbad number of days
 -CAkeyform arg  - CA key format - default PEM
 -pubkey         - output the public key
 -md2/-md5/-sha1/-mdc2 - digest to use
 -3              use 3 for the E value
e is %ld (0x%lX)
-tls1-dtls1-servername_fatal%4ld server accepts that finished
-prexit. STARTTLS
---
SSL handshake has read %ld bytes and written %ld bytes
nistk571ripemdecdsak233Available values:
To get the most accurate results, try to run this
no_extensionscompatmultilinedynamic, CLIENT-HELLO internal_error, HelloRequest-nokeysUsage: pkcs12 [options]
MAC Iteration %ld
-challengeError opening input file
-noattrNo recipient certificate or key specified
Usage smime [options] cert.pem ...
-crl_check_all check revocation status of signer's certificate chain using CRLs
From: %s
[Internal] -url-index file        certificate status index file
ec
Standard commandsError loading untrusted file %s
-passin -inform arg    input format - DER or PEM
No template, please set one up.
Invalid PSS salt length %d
-non-fips-allowsha224(stdin)-C%-14s buffer size
invalid 'bufsize' specified.
salt=in_stdinsalt_p != NULL%lx-crl_reason%d entries loaded from the database
UNIVERSALSTRING:'ERROR:Serial number %s has already been issued,
Successfully added extensions from config
-print_certs -noout        don't output encoded data
-lastupdate-asn1parseRSA operation error
DSA *get_dsa%d()
	{
	if ((dsa=DSA_new()) == NULL) return(NULL);	return(dsa);
	}hybrid -param_out      print the elliptic curve parameters
 -check            validate the ec parameters
ec_a-ocsp_uri-subject_hash -req            - input is a certificate request, sign and output.
Yes
-aes192Generating RSA private key, %d bit long modulus
-named_curve-no_ssl3-key2 -crl_check_all - check the peer certificate has not been revoked by its CA
                 or any other CRL in the CA chain. CRL(s) are appened to the
                 the certificate file.
                 not specified (default is %s)
 -no_dhe       - Disable ephemeral DH
(NONE)%s, Cipher is %s
'%s' is an invalid file name
-no_ign_eofsmtpSTLS
RENEGOTIATING
 -pause        - sleep(1) after each read(2) and write(2) system call
 -no_ign_eof   - don't ignore input eof
 -ssl2         - just use SSLv2
---
Ciphers common between both SSL endpoints:
bad multi count
ecdsak571ecdhp521-timeoid_section <empty>
 UNSUPPORTED-CERTIFICATE-TYPE-ERRORChangeCipherSpec bad_record_mac record_overflow certificate_unobtainable, Finishedstatus requestunable to load 'random state'
-maciterError %s getting chain.
    No Octet String in PrivateKey
-content-passin arg    input file pass phrase source
-t argument "/lib/libdriver.so".
OCSP utility
Nonce Verify error
x509CRYPTO_r_unlock on write lockError loading file %s
error %d at %d depth lookup:%s
 -in arg       input file
Certificate does not contain EC parameters
distinguished_namedgst.cRead Error in %s
               the random number generator
%-14s output file
%-14s encrypt
iv undefined
-1                 MD5-based password algorithm
usage: gendh [args] [numbits]
-preserveDNdefault_startdatecannot lookup how long until the next CRL is issued
,%c'
usage: ca args
 -name arg       - The particular CA definition to use
 -out file       - Where to put the output file(s)

The string contains characters that are illegal for the ASN.1 type
matchThe mandatory %s field was missing
 (%ld days)SPKACcessationOfOperation -inform arg   input format - DER or PEM
-fingerprint -inform arg     input format - one of DER NET PEM
 -sgckey         Use IIS SGC key format
RSA key error: %s
-raw-ssl	dsa->p=BN_bin2bn(dsa%d_p,sizeof(dsa%d_p),NULL);
	dsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);
                                  explicit
 -text             print the ec parameters in text form
                                    hybrid
 -engine e         use engine e, possibly a hardware device
	int ok=0;
unable to write elliptic curve parameters
CA Private Keyunable to write certificate
 -certopt arg    - various certificate text options
unable to create BIO for output
-nocertUsing default temp ECDH parameters
 -serverpref   - Use server's cipher preferences
%4ld cache full overflows (%ld allowed)
shutdown accept socket
client certificate private key fileCONNECTED(%08X)
shutdown
                 are supported.
nistp256no multi count given
ecdhb283md2      %ld %d bit ECDSA signs in %.2fs 
rsa %4u bits %8.6fs %8.6fs %8.1f %8.1f
camellia-128 cbc-bugs         - Turn on SSL bug compatibilityunable to load certificate
sep_multilineonelineFalseAuthorityCan't open BIO for stdin
 NO-CERTIFICATE-ERROR certificate_unknown bad_certificate_status_response, ClientHelloelliptic curvestcpaccept-nomacver-nomaciterprivate keyPKCS7 Data
-topk8          output PKCS8 file
-to-signer-nosigs        don't verify message signature
               -vv will additionally display each command's description
               -vvv will also add the input flags for each command
 -c          - for each engine, also list the capabilities
-resp_textIllegal update period %s
-sign_other file   additional certificates to include in signed request
signer certificatesversionpkcs8shaideades-ede-cbcqexitlist-message-digest-commandsstdinmemory allocation failure
-multivalue-rdn -passin        private key password source
Unable to load config info from %s
Invalid global string mask setting %s
writing new private key to stdout
rb%s%s(%s)=  -out arg      output file
DH parameters appear to be ok. -2            generate parameters using  2 as the generator value
%-14s input file
bad password read
key=bad decrypt
-salt string       use provided salt
hash != NULLstrlen(out_buf) < sizeof(out_buf) -5        - use 5 as the generator value
-startdate-crl_compromiseInvalid extension copy option: "%s"
Malloc failure
CERTIFICATION CANCELED: I/O error
CERTIFICATION CANCELED
 -infiles ....   - The last argument, requests to process
suppliedThe %s field does not exist in the CA certificate,
the 'policy' is misconfigured
undefSuccessfully added extensions from file.
unable to write pkcs7 object
-encryptstatic unsigned char dsa%d_p[]={	dsa->q=BN_bin2bn(dsa%d_q,sizeof(dsa%d_q),NULL);
 -text           print the key
	if ((tmp_3 = BN_bin2bn(ec_b_%d, sizeof(ec_b_%d), NULL)) == NULL)
		goto err;
Invalid trust object value %s
-crlextnotAfter= -outform arg    - output format - default PEM (one of DER, NET or PEM)
 -idea     - encrypt the generated key with IDEA in cbc mode
-msg-no_tls1second server certificate private key filesecond certificate private key file -no_ticket    - disable use of RFC4507bis session tickets
-showcertsSTARTTLS
AUTH TLS
<stream:stream xmlns:stream='http://etherx.jabber.org/streams' xmlns='jabber:client' to='%s' version='1.0'>write:errno=%d
 -reconnect    - Drop and re-make the connection with the same Session-ID
nistb163speed.crsa512   rsa1024  rsa2048  rsa4096
pipe failure
sep_semi_plus_spaceenabling auto ENGINE support
pass: certificate_expiredserver namerenegotiateContext too long
 -v          - verbose mode, a textual listing of the ciphers in SSLeay
-chain        add certificate chain
-CAfile arg   - PEM format file of CA's
Key AttributesSafe Contents bag
%02X -signer file   signer certificate file
-engine e      use engine e, possibly a hardware device.
Can't read content file %s
Verification failure
-out file             - write to file
-nonce-verify_otherNo prime specified
s_servers_clientspeedmd2aes-256-ecbdesrc4rc2-64-cbcbf-ecbrecognized usages:
%s: -dlimit%s [options] <infile
 -verify        verify signature on REQ
                load the file (or the files in the directory) into
Generating a %ld bit %s private key
bad output format specified for outfile
There are quite a few fields but you can leave some blank
-sign-d -noout        no output
%-14s the next argument is the md to use to create a key
-noverify          never verify when reading password from terminal
*salt_p != NULLmsie_hackDone. %d entries marked as expired
policy is %s
Write out database with %d new entries
certificate file name too long
crlnumber -verbose        - Talk alot while doing things
 -keyfile arg    - private key file
 -updatedb       - Updates db for expired certificates
%s=Revoked (%c)
unable to load PKCS7 object
error loading certificates
-pubin -pubin          expect a public key in input file
RSA key ok
A private key is needed for this operation
 -inform arg       input format - default PEM (DER or PEM)
ecparam.c0x%02X-trustoutIt does not contain a public key
Private key -alias          - output certificate alias
 CAwarning: id_prefix is too long, only one new session will be possible
                 (default is %s)
 -chain        - Read a certificate chain
                 with the assumption it contains a complete HTTP response.
 -tlsextdebug  - hex dump of all TLS extensions received
Lets print some clear text
shutting down SSL
GET /-ign_eof -host host     - use -connect instead
                 only "smtp", "pop3", "imap", "ftp" and "xmpp"
 -no_ticket        - disable use of RFC4507bis session tickets
Compression: %s
nistb409hmacecdh
RSA verify failure.  No RSA verify will be done.
%ld %d bit ECDSA verify in %.2fs
+F4:%u:%u:%f:%f
no_validityalignNo value provided for Subject Attribute %s, skipped
 NO-CIPHER-ERROR close_notify unrecognized_name, Certificateusage: ciphers args
<stdout>Key bag
-nsdb-rc2-128-verify        verify signed message
-pk7out        output PKCS#7 structure
-rc2-40        encrypt with RC2-40 (default)
Error decrypting PKCS#7 structure
[Error]: command name too long
Illegal accept count %s
-rsigner-no_certs          don't include any certificates in signed request
primebf-cbcOK
-randec:-no-asn1-kludgeno_min-signature-signature file signature to verify
Error reading signature file %s
static unsigned char dh%d_p[]={0x%02X,-dsaparamunable to load DSA parameters
%-14s passphrase is the next argument
decryption-apr1-enddate-policy-selfsignpreserveentry %d: bad serial number characters, char pos %ld, char is '%c'
ERROR: on line %ld of config file '%s'
missing compromised time
 -days arg       - number of days to certify the certificate for
 -utf8           - input characters are UTF8 (default ASCII)
RevokedType          :%s
Was revoked on:%s
Subject Name  :%s
unable to load CRL
issuer= -outform arg    - output format - default PEM
 -issuer         - print issuer DN
-pubout -passout arg    output file pass phrase source
Only private keys can be checked
-revuse -clrext instead of -crlext
We need a private key to sign with
unsigned char XXX_certificate[%d]={
 -dates          - both Before and After dates
out of mem
-idea-accept-dcert -CApath arg   - PEM format directory of CA's
%4ld items in the session cache
%4ld session cache misses
%4ld session cache timeouts
cert_status: callback called
FILE:%s
s_client.cecdsatype        +F:no engine specified
cannot load %s from engine
bad input format specified for key file
no_signameno_pubkeyesc_msbescape character at end of string
Error reading password from BIO
depth=%d %s
Alertgethostbyname failure
-keypbe-aes128, -aes192, -aes256
-passin p     input file pass phrase source
certificates from certfile -spkac arg     alternative SPKAC name
-inform arg    input format SMIME (default), PEM or DER
Error creating PKCS#7 structure
-rand file%cfile%c... - seed PRNG from files
-no_cert_checks-index-resp_text         print text form of response
-validity_period n maximum validity discrepancy in seconds
-no_signature_verify don't check signature on response
Error reading OCSP request
responder other certificatesERROR: No Status found.
-checks <n>des-ede3-cbcFIPS mode not supported.
>

-genstr-genconf -length arg   length of section in file
 -oid file     file of extra oid definitions
-modulus-set_serial -outform arg   output format - DER or PEM
 -pubkey        output public key
 -keyform arg   key file format
Error Loading extension section %s
Error adding attribute
-sign   file    sign digest using private key in file
winvalid hex iv value

%d out of %d certificate requests certified, commit? [y/n]Error Loading CRL extension section %s
%s:unknown object type in 'policy' configuration
unknown%s=Expired
NONE -noout          - no CRL output
 -engine e       use engine e, possibly a hardware device.
rsautl.c -rand         files to use for random number input
-no_seed -outform arg      output format - default PEM
 -in  arg          input file  - default stdin
                                    uncompressed (default)
Certificate will not expire
%s%s :  -des3     - encrypt the generated key with DES in ede cbc mode (168 bit key)
Generating DSA key, %d bits
ACCEPT
 -ssl3         - just use SSLv3
---
Certificate chain
des-cbc  des-ede3 rc2 cbc%d %s's in %.2fs
snamelname-policy_checkUserfile: ???, fatal access_denied unknown_psk_identitygethostbyname addr is not AF_INET
Error reading certs file %s
-v2 alg         use PKCS#5 v2.0 and cipher "alg"
Error parsing config file
No signer certificate specified
Loaded: (%s) %s
 [%s]
[ unavailable ]
 NB: -pre and -post will be applied to all ENGINEs supplied on the command
%s: %s
-reqin-sign_other-status_age n      maximum status age in seconds
-noverify          don't verify response at all
ciphersbad exit
error reading the file, %s
no certificates in file, %s
-strparse                have been reported as requiring
input_password-binarysha384 -engine e     use engine e, possibly a hardware device.
unable to load DH parameters

	};
	static unsigned char dh%d_g[]={-[pP]-table-reversepasswd_mainapr1new_certs_dirdefault_enddateerror while loading serial number
CAkeyTimeIA5STRING:' -key arg        - key to decode the private key if it is encrypted
error unpacking SPKAC public key
%s Fingerprint= -in arg         - input file - default stdin
 -out arg        - output file - default stdout
-sgckey -out arg        output file
-verify         verify with public key
-conv_formec_order-CAkeyform-signkey-addtrust-checkendunsigned char XXX_subject_name[%d]={
x509_main -dkeyform arg - second key format (PEM, DER or ENGINE) PEM default
 -state        - Print the SSL states
 -quiet        - No server output
DELAY
verify error:%s
GET closed
%2d s:%s
-elapsedecdsap192idea-cbc aes-128-cbc aes-192-cbc aes-256-cbc +F5:%u:%u:%f:%f
Unknown type '%s' from child %d
-ssl3         - Just use SSLv3aborted!
unrecognized purpose
LOAD illegal_parameter%s %s%s [length %04lx]%s%s
clientgetservbyname failure for %s
-descert-inkey file   private key if not infile
-in  infile   input filename
-info         give info about PKCS#12 structure.
-certpbe alg  specify certificate PBE algorithm (default RC2-40)
 -verify        verify SPKAC signature
Error opening output file
               (only used if -t is also provided)
<no flags>
issuer certificate-out file          output filename
-reqout file       write DER encoded OCSP request to "file"
Error loading responder certificate
signer private keyError opening file %s
ocsp.ccrlCRYPTO_w_unlock on read lock-oid'%s' is an invalid number
 -x509          output a x509 structure instead of a cert. req.
 -asn1-kludge   Output the 'request' in a format that is wrong but some CA's
default_mdstring_maskCannot modifiy certificate subject
unable to write X509 certificate
-c              to output the digest with separating colons
-binary         output in binary form
 -text         print a text form of the DH parameters
 numbits       number of bits in to generate (default 512)
               - load the file (or the files in the directory) into
dhparam.c-a-pass <arg>%-14s   from a passphrase.  One of md2, md5, sha or sha1
enc.c-reverse           switch table columns
-spkacentry %d: invalid expiry date
invalid reason code %s
Netscape SPKAC structure not found in %s
lastUpdate= -des3           encrypt PEM output with ede cbc des using 168 bit key
Certificate                                   hybrid
CURVE DESCRIPTION NOT AVAILABLE-certoptSignature verification error
/* subject:%s */
 -signkey arg    - self sign cert with arg
-Verify-context-dpass-crl_check_all-status_verbose-hack -named_curve arg  - Elliptic curve name to use for ephemeral ECDH keys.
                 Use "openssl ecparam -list_curves" for all names
                 (default is sect163r2).
 -no_ssl3      - Just disable SSLv3
---
Reused, </BODY></HTML>

'%s' is an invalid path
.phpxmppError setting client auth engine
s_client_main -quiet        - no s_client output
 -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol
                 command to see what is available
Can't use SSL_get_servername
---
No client certificate CA names sent
dsa512cast5ecdsab163 ecdsab233 ecdsab283 ecdsab409 ecdsab571
aes      +R7:%ld:%d:%.2f
problem creating object %s=%s
esc_2253dump_nostrRFC2253%s:error in %s
DTLS 1.0 , warningmax fragment lengthwith much random data.
usage: sess_id args
-idea         encrypt private keys with idea
-keypbe alg   specify private key PBE algorithm (default 3DES)
-keyex        set MS key exchange type
MAC verified OK
-nsdb           use (nonstandard) DSA Netscape DB format
Warning: broken key encoding: Signature OK
-nointern-noattr        don't include any signed attributes
-from ad       from address
[ available ]
<no description>NUMERIC-rkey-nrequest n        number of requests to accept (default unlimited)
dsapkcs7nseqidea-ofbnot lockedopenssl (lock_dbg_cb): %s (mode=%d, type=%d) at %s:%d
               ASN1 blob wrappings
unable to load EC parameters from file
-reqexts -modulus       RSA modulus
 -newkey ec:file generate a new EC key, parameters taken from CA in 'file'
x509_extensionsRSAunable to find '%s' in config
No signature to verify: use the -signature option
(stdout)Error Signing Data
-2warning, not much extra random data, consider using the -rand option
%02XWarning: truncating password to %u characters
-certwriting %s
Valid
invalid type, Data base error
File name     :%s
ERROR:Already revoked, serial number %s
keyCompromisebad input format specified for input crl
usage: crl args
 -outform arg    output format - one of DER NET PEM
read DSA key
%s [options] [bits] <infile >outfile
using curve name prime192v1 instead of secp192r1

	ok=1;
ecparam_main-CAform-CA-CAcreateserialSET.ex3serial= -CAform arg     - CA format - default PEM
 -extfile        - configuration file with X509V3 extensions to add
Yes (WARNING code=%d)
 -des3           encrypt the generated key with DES in ede cbc mode (168 bit key)
-dkeyform-legacy_renegotiation -pass arg     - private key file pass phrase source
cert_status: can't parse AIA URL
read R BLOCK
-connectUnable to set TLS servername extension.
 -status           - request certificate status from server
nistk163-multiecdsap224hmac     sha512   ecdhk163  ecdhk233  ecdhk283  ecdhk409  ecdhk571
%ld %d bit public RSA's in %.2fs
DSA verify failure.  No DSA verify will be done.
+F3:%u:%u:%f:%f
sep_comma_plus_spaceerror on line %ld of db attribute file '%s'
SO_PATHEC point formatsno port defined
This means that the random number generator has not been seeded
Netscape certificate sequence utility
-cacerts-des          encrypt private keys with DES
-nodes        don't encrypt private keys
-keysig       set MS key signature type
              the random number generator
-content file  supply or override content for detached signature
               -vvvv will also show internal input flags
-no_signature_verify-validity_period-verify_other file additional certificates to search for signer
-no_intern         don't search certificates contained in response for signer
-rother file       other certificates to include in response
s_timebase64castrc2-cfb-keyform-reqopt-extensionssubject=the g value is not a generator -dsaparam     read or generate DSA parameters, convert to DH
 -5            generate parameters using  5 as the generator value
-pass-nosalt-debug-out <file>%-14s use engine e, possibly a hardware device.
           - load the file (or the files in the directory) into
Updating %s ...
extensionsinvalid object identifier %s
invalid compromised time %s
 -in file        - The input PEM encoded certificate request(s)
Check that the request matches the signature
Signature verification problems....
Certificate is to be certified until CACompromise -inform arg     - input format - default PEM (DER or PEM)
ec_b		EC_GROUP_free(group);
-CAkey-alias -fingerprint    - print the certificate fingerprint
 -extensions     - section from config file with X509V3 extensions to add
 -clrext         - delete extensions before signing and input certificate
 -out file       output the key to 'file
-no_cache-ssl2second server certificate file -keyform arg  - key format (PEM, DER or ENGINE) PEM default
 -cipher arg   - play with 'openssl ciphers' to see what goes here
 -timeout      - Enable timeouts
 -servername_fatal - on mismatch send fatal alert (default warning alert)
cert_status: no AIA and no default responder URL
<HTML><BODY BGCOLOR="#ffffff">
-pause<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'read W BLOCK
 -debug        - extra output
 -serverpref   - Use server's cipher preferences (only SSLv2)
secp160r1nistb233no engine given
rsa512ecdsap160ecdsab163aes-192 igestarting-new          - Just time new connections decompression_failure-nomac-cacerts      only output CA certificates.
-LMK          Add local machine keyset attribute to private key
: -topk8-noiter         use 1 as iteration count
-nochain-keyform arg   input private key format (PEM or ENGINE)
-outform arg   output format SMIME (default), PEM or DER
-CApath dir    trusted certificates directory
-post line, or all supported ENGINEs if none are specified.
[Failure]: %s
-CA file           CA certificate
Timeout on connect
carandmd4cast5-cbc-CAfiler -nameopt arg    - various certificate name options
Using configuration from %s
you need to specify a private key
%s_default-x931-engine e       use engine e, possibly a hardware device.
 -outform arg  output format - one of DER PEM
 -check        check the DH parameters
p value is not a safe prime%-14s key/iv in hex is the next argument
%-14s print the iv/key (then exit if -P)
-engine e-1strlen(out_buf) <= 6 + 8default_daysnext serial number is 00
default_crl_daysUnknown CRL reason %s
holdInstructionInvalid time format %s. Need YYYYMMDDHHMMSSZ
 -preserveDN     - Don't re-order the DN
-hashError initialising X509 store
 -check          verify key consistency
                 possible values: named_curve (default)
 -no_seed          if 'explicit' parameters are choosen do not use the seed
SET x509v3 extension 3issuer= Getting CA Private Key
 -inform arg     - input format - default PEM (one of DER, NET or PEM)
 -noout          - no certificate output
 -CAserial arg   - serial file
-des-aes256 -idea           encrypt the generated key with IDEA in cbc mode
-bugs -dcert arg    - second certificate file to use (usually for DSA)
%4ld client connects that finished
%4ld callback cache hits
Error getting client auth engine
dsa1024ecdsab571ecdhb233Error: bad option or value
available timing options: %30sop      op/s
unable to load certificates
no_headerno_subject decrypt_error-f-out file output file
-twopass      separate MAC, encryption passwords
-nooctDSA public key include in PrivateKey
-nocerts       don't include signers certificate when signing
Bad input format for PKCS#7 file
  <illegal flags!>-no_nonce-trust_other-VAfile file       validator certificates file
-port num          port to run responder on
Responder Error: %s (%d)
Unexpected retry condition

Message Digest commands (see the `dgst' command for more details)
-untrusted -offset arg   offset into file
-verify -nodes         don't encrypt the output key
 -engine e      use engine e, possibly a hardware device
_maxDH *get_dh%d()
	{
-K-in <file>output == out_buf + strlen(out_buf)-outdir%s need to be a directory
old -enddate YYMMDDHHMMSSZ    - certificate validity notAfter (overrides -days)
variable lookup failed for %s::%s
Certificate request and CA private key do not match
 -nocrl         no crl to load, just certs from '-certfile'
 -des            encrypt PEM output with cbc des
writing RSA key
explicitwriting EC key
using curve name prime256v1 instead of secp256r1
ok
	if (tmp_3)
		BN_free(tmp_3);
notBefore= -passin arg     - private key password source
 -subject_hash   - print subject hash value
 -issuer_hash    - print issuer hash value
 -CAkey arg      - set the CA key, must be PEM format
error with certificate to be certified - should be self signed
-nbio-mtu-id_prefixserver2.pem -cert2 arg    - certificate file to use for servername
ERROR
Client certificate
issuer=%s
-no_legacy_server_connectftp                 not specified but cert file is.
 -mtu          - set the link layer MTU
 -tlsextdebug      - hex dump of all TLS extensions received
nistk233ecdsap521ecdhp224The 'numbers' are in 1000s of bytes per second processed.
PKCS12ext_parsereasonend of string encountered while processing type of subject name element #%d
Error loading PKCS12 file for %s
error setting certificate
read from %p [%p] (%d bytes => %ld (0x%lX))
???, CLIENT-CERTIFICATEclient certificate URLserver-hCan't open output file %s
              load the file (or the files in the directory) into
-nooct          use (nonstandard) no octet format
-CAfile file   trusted certificates file
(%s) %s
 -post <cmd> - runs command 'cmd' against the ENGINE after loading it
-issuer file       issuer certificate
-host host:n       send OCSP request to host on port n
Error Opening OCSP request file
	Next Update: pkcs12ocspdes-cfbalready locked-help -dump         dump unknown data in hex form
 -strparse offset
 -genstr str   string to generate ASN1 structure from
Can't find 'asn1' in '%s'
RANDFILE-fips-fingerprintError opening signature file %s

	};		{ DH_free(dh); return(NULL); }-md%-14s pass phrase source
encryptionerror reading input file
bad magic number
-apr1              MD5-based password algorithm, Apache variant
1-stats%s: bad error code
-crlhoursCA certificatecopy_extensionsentry %d: bad serial number length (%d)
unable to find 'section' for %s
no input files
keyTimeASN.1 %2d:' -cert file      - The CA certificate
The %s field needed to be supplied and was missing
Expires on    :%s
 -lastupdate     - lastUpdate field
-certin-raw            use no padding
 -name arg         use the ec parameters with 'short name' name
ec_cofactor	if ((tmp_2 = BN_bin2bn(ec_order_%d, sizeof(ec_order_%d), tmp_2)) == NULL)
		goto err;
-dates-purpose-ocspidCA Certificate                   missing, it is assumed to be in the CA file.
-crl_check%4ld session cache hits
DONE
SSL_do_handshake -> %d
Write BLOCK
---
-host -port port     - use -connect instead
 -verify depth - turn on peer certificate verification
======================================
nistb283ecdsap384ecdhp256%ld %d bit private RSA's in %.2fs
des ede3User interface error
no_sigdumpinvalid engine "%s"
-explicit_policyfd:<<<, CertificateVerify, HelloVerifyRequest-bunable to write SSL_SESSION
-caname "nm"  use nm as CA friendly name (can be used more than once).
No certificate matches private key
Error encrypting key
Signature Failure
-rc2-40-crl_check     check revocation status of signer's certificate using CRLs
-rsigner file      responder certificate to sign responses with
-resp_key_id       identify reponse by signing certificate key ID
aes-128-cbcrc4-40des-ede3-ofbrc2-40-cbcofferror in %s
list-cipher-commands
 -out arg      output file (output format is always DER
Error on line %ld of config file '%s'
-passout -days          number of days a certificate generated by -x509 is valid for.
verify OK
into your certificate request.
-keyform arg    key file format (PEM or ENGINE)
Verified OK
unable to check the generator value-piv =usage: errstr [-stats] <errno> ...CA certificate and CA private key do not match
ERROR: loading the config file '%s'
start date is invalid, it should be YYMMDDHHMMSSZ
 -status serial  - Shows certificate status given the serial number
The Subject's Distinguished Name is as follows
Sign the certificate? [y/n]:Check that the SPKAC request matches the signature
superseded -text         print full details of certificates
-nocrlError getting RSA key
-keyform arg    private key format - default PEM
                   in the asn1 der encoding
	if (point == NULL)
		goto err;
		{
-setalias-next_serialno request key file specified
 -email          - print email address(es)
 -ocspid         - print OCSP hash values for the subject name and public key
 -checkend arg   - check whether the cert expires in the next arg seconds
-des3 -out file - output the key to 'file'
unable to load DSA parameter file
-status_url-timeoutserver certificate file -dtls1        - Just talk DTLSv1
 -HTTP         - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>
%4ld client connects (SSL_connect())
Error accessing '%s'
-sess_in<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'/> -sess_in arg  - file to read SSL session from
dsa512   dsa1024  dsa2048
-evp e          use EVP e.
private+R5:%ld:%d:%.2f


Now timing with session id reuse.compatibleSubject does not start with '/'.
Invalid Policy "%s"
, SERVER-VERIFY protocol_versiontrusted CA keysNo certificate present
Error converting key
recipient certificate fileTo: %s
-resp_key_id-no_cert_verify-ndays-respout file      write DER encoded OCSP reponse to "file"
-CAfile file       trusted certificates file
-resp_no_certs     don't include any certificates in response
validator certificate	Reason: %s
bfdes-ede-cfbidea-ecb	%-10s	%s
-out               a series of these can be used to 'dig' into multiple
-pubkeydsa:%s [options] <infile >outfile
 -out arg       output file
req_extensionswriting new private key to '%s'
Modifying Request's Subject
ERROR: cannot modify subject
Modulus=mdc2static unsigned char dh%d_g[]={unable to read key from '%s'
-S-bufsize <n>do_passwdError verifying serial %s!
Error reading certificate request in %s
%s:invalid type in 'policy' configuration
Certificate Details:
%s=Valid (%c)
unspecified                 encrypt PEM output with cbc aes
unable to load Key
 -text         print as text
secp256r1-CAserial-clrext};
 -hash           - synonym for -subject_hash
 -ocsp_uri       - print OCSP Responder URL(s)
 -setalias arg   - set certificate alias
 -CA arg         - set the CA certificate, must be PEM format.
error with certificate - error %d at depth %d
%s
-3 -des            encrypt the generated key with DES in cbc mode
-port-dcertform-WWWSetting temp DH parameters
%4ld client renegotiates (SSL_connect())
SSL SESSION PARAMETERSlocalhostServer public key is %d bit
Expansion: %s
nistk283rsa2048sha1     rsa      This is a key...+F:%d:%src5-32/12 cbccamellia-192 cbcdup failed
-nbio         - Run with non-blocking IO-ssl2         - Just use SSLv2apps.creading certificateno keyfile specified
unable to load %s
no_versionTrue, REQUEST-CERTIFICATE, ClientKeyExchangekeepalive-keysig-name "name"  use name as friendly name
%s: <No Attributes>
<No Values>
-embed          use (nonstandard) embedded DSA parameters format
 -passin arg    input file pass phrase source
 -noout         don't print SPKAC
-nodetach-text          include or delete text MIME headers
NO_INPUTdsaparamengineSSLEAY_CONF cert1 cert2 ...
error opening the file, %s
-length-dumpdh:-batch-newhdr -config file   request template file.
 -newhdr        output "NEW" in the header lines
error on line %ld of %s
default_keyfile-verify file    verify a signature using public key in file
 -C            Output C code

			dh->length = %ld;
-quietpasswd.c             the random number generator
-name-infilesunable to stat(%s)
unable to load Netscape SPKAC structure
Adding Entry with serial number %s to DB for %s
unable to write CRL
 -CAfile  name   - verify CRL using certificates in file "name"
-oaep                 possible values: compressed
                   possible values: compressed
                   possible values: named_curve (default)
 -genkey           generate ec key
ec_p-clrtrust -x509toreq      - output a certification request object
-no_ssl2server.pem -certform arg - certificate format (PEM or DER) PEM default
CIPHER is %s
 NOTdidn't found starttls in server response, try anyway...
 -state        - print the 'ssl' states
 -fallback_scsv - send TLS_FALLBACK_SCSV
no peer certificate available
nistp192nistp224blowfishecdsab283ecdhp160ecdhb571%ld %d-bit ECDH ops in %.2fs
HZ=%g+F2:%u:%u:%f:%f
+H:ext_errorspace_eq-check_ss_sigPasspharse callback error for %s
verify error:num=%d:%s
Private key does not match the certificate public key
, SERVER-HELLO -cert           - output certificate 
-info-nocerts      don't output certificates.
-noiter       don't use encryption iteration
-maciter      use MAC iteration
Unknown broken type
-rc2-64-in file       input file
-no_certsError signing OCSP request
Invalid request
not dgstgenrsa-verbose-offset -inform arg   input format - one of DER PEM
defaultrsa:-x509 -extensions .. specify certificate extension section (override value in config file)
 -reqopt arg    - various request text options

unable to load X509 request
Error getting public key
ripemd160bad input format specified
	dh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);
-none-K/-ivOPENSSL_malloc failure %ld
-statusserial -noemailDN      - Don't add the EMAIL field into certificate' subject
ERROR: adding extensions in section %s
ERROR:name does not match %s
 -fingerprint    - print the crl fingerprint
-in file        input file
-pubin          input is an RSA public
-genkeyError, DSA key generation failed
	if ((group = EC_GROUP_new_curve_GFp(tmp_1, tmp_2, tmp_3, NULL)) == NULL)
		goto err;

	point = EC_POINT_bn2point(group, tmp_1, NULL, NULL);
The certificate request appears to corrupted
 -serial         - print serial number value
 -des      - encrypt the generated key with DES in cbc mode
-crlf-no_tmp_rsa-HTTPCan't use -HTTP, -www or -WWW with DTLS
 -accept arg   - port to accept on (default is %d)
 -verify arg   - turn on peer certificate verification
 -debug        - Print more output
 -www          - Respond to a 'GET /' with a status page
turning on non blocking io
Secure Renegotiation IS%s supported
pop3<proceedrsa1024ecdsab233internal error loading RSA key number %d
RSA verify failure
ECDSA failure.
Forked child %d
problem loading oid section %s
Error opening %s %s
no_attributesignore_typedump_allsep_comma_pluscan't use that engine
unable to rename %s to %s
error setting private key
 no_renegotiation   truncated HMAC%u.%u.%u.%uUnknown PBE algorithm %s
-clcerts      only output client certificates.
-rand file%cfile%c...
Mac verify error: invalid password?
Error outputting keys and certificates
Bag AttributesBad format specified for key
 -engine e      use engine e, possibly a hardware device.
SPKAC=%s
-encrypt       encrypt message
-rc2-128       encrypt with RC2-128
-recip  file   recipient certificate file for decryption
|-no_explicit-nonce             add OCSP nonce to request
Error reading OCSP response
-checksbyeMemory allocation failure
wb -in arg        input file
 -rand file%cfile%c...
problems making Certificate Request
unable to write X509 request
If you enter '.', the field will be left blank.
_default-pss_saltlen-hmacHMAC-dh.c-base64Error setting cipher %s
-extfilecertificatecert_optNo entries found to mark expired
 -crlexts ..     - CRL extension section (override value in config file)
      check the database/serial_file for corruption
certificateHoldbad input format specified for pkcs7 object
 -text           print the key in text
 -modulus        print the RSA key modulus
 -pubout         output a public key
-inkey-pkcs-out file       output file
-ssl            use SSL v2 padding
-pkcs           use PKCS#1 v1.5 padding (default)
-encrypt        encrypt with public key
dsaparam.cstatic unsigned char dsa%d_g[]={-param_out -rand file        files to use for random number input
checking elliptic curve parameters: 	EC_POINT *point = NULL;
	if ((tmp_1 = BN_bin2bn(ec_gen_%d, sizeof(ec_gen_%d), tmp_1)) == NULL)
		goto err;
 -keyform arg    - private key format - default PEM
 -purpose        - print out certificate purposes
 -key arg      - Private Key file to use, in cert file if
Shared ciphers:%s
-sess_outimap -connect host:port - who to connect to (default is %s:%s)
 -dtls1        - just use DTLSv1
nistp384ecdsak163-decrypt        time decryption instead of encryption (only EVP).
ECDSA sign failure
+R6:%ld:%d:%.2f
timing function used: %s%s%s%s%s%s%s
idea cbcDoing %s for %ds on %d size blocks: pass phraseRequire explicit Policy: %s
SSL 3.0 DTLS 1.0 (bad) , SERVER-FINISHED decryption_failed unsupported_extension
   bindError in cipher list
Can't open input file %s
-nocerts<Unsupported tag %d>
Usage pkcs8 [options]
Enter Password:DSA parameters included in PrivateKey
-sign          sign message
-subject s     subject
cert.pem       recipient certificate(s) for encryption
-engine e             - use engine e, possibly a hardware device.
 -pre <cmd>  - runs command 'cmd' against the ENGINE before any attempts
, -rother-reqin file        read DER encoded OCSP request from "file"
Error creating connect BIO
Error Creating OCSP request
	This Update: dhdhparamsess_iddes-ecbopenssl:Error: '%s' is an invalid command.
-engine -dlimit arg   dump the first arg bytes of unknown data in hex form
Error: offset too large
 -new           new request.
utf8%s_value-prverify file  verify a signature using private key in file
-%-14s to use the %s message digest algorithm (default)
Error opening output file %s
key file-k-kfilebufsize=%d
-crypt-crl_holdT61STRING:' -crlhours hours - Hours is when the next CRL is due
 -md arg         - md to use, one of md2, md5, sha or sha1
Error in revocation arguments
Serial %s not present in db.
%s=Expired (%c)
-issuer-decrypt        decrypt with private key
 -inform arg     input format - DER or PEM
bad input format specified for key

	};

 -addreject arg  - reject certificate for a given purpose
-www -dhparam arg  - DH parameter file to use, in cert file if not specified
 -no_tmp_rsa   - Do not generate a tmp RSA key
%4ld server renegotiates (SSL_accept())
lf_num == 0cert_status: AIA URL: %s
.htm-ssl_client_engineclient certificate file -ign_eof      - ignore input eof (default when -quiet)
 -bugs         - Switch on all SSL implementation bug workarounds
 -starttls prot - use the STARTTLS command before starting TLS
-evpopenssldsa2048ecdhmd4      sha256   ecdsa
rc2      +R2:%ld:%d:%.2f
getrusage:%dseed cbcSSL_CIPHERbad input format specified for %s
engine "%s" set.
unique_subject = %s
-issuer_checksSSL 2.0bad gethostbyaddr
Consider setting the RANDFILE environment variable to point at a file that
options:  -toseq    output NS Sequence file
-keyex-caname              encrypt PEM output with cbc aes
Can't read Password
Certificate bag
STRINGIllegal validity period %s
Usage ocsp [options]
-url URL           OCSP responder URL
WARNING: Status times invalid.
verifyrsautldes-ede-ofbidea-cfb-i -subject       output the request's subject
Wrong Algorithm typeout of memory
-prverifyGenerating DH parameters, %d bit long safe prime, generator %d
#ifndef HEADER_DH_H
#include <openssl/dh.h>
#endif-einvalid hex salt value
-in file           read passwords from file
*passwds != NULLstrlen(passwd) <= pw_maxlen$-msie_hack-crlextsopenssl.cnferror loading the config file '%s'
I am unable to access the %s directory
PRINTABLE:'^%cSerial Number :%s
%02X%cunable to write private key
                                  uncompressed (default)
unable to create curve (%s)

	0x00 -trustout       - output a "trusted" certificate
 -days arg       - How long till expiry of a signed certificate - def 30 days
usage: gendsa [args] dsaparam-file
 dsaparam-file
-serverpref-cipher-ssl3Setting temp ECDH parameters
error setting cipher list
 -context arg  - set session ID context
 -crl_check    - check the peer certificate has not been revoked by its CA.
                 The CRL(s) are appended to the certificate file
                 or a default set of parameters is used
 -CAfile arg   - PEM format file of CA's
 -tls1         - Just talk TLSv1
GET /stats read:errno=%d
nistp521aes-256-igeecdsap256aes-128-ige aes-192-ige aes-256-ige -mr             produce machine readable output.
aes-256 cbc+DT:%s:%d:%d
Collecting connection statistics for %d seconds
-reuse        - Just time connection reuseOpenSSL application user interfacecopyallenv:Error reading %s %sunable to get private key from '%s'
write to %p [%p] (%d bytes => %ld (0x%lX))
, CLIENT-FINISHEDHandshake, ServerHelloconnectunable to write 'random state'
-export<stdin>Error loading SPKAC
-recip-inkey file    input private key (if not signer or recipient)
-to addr       to address
               -tt will display error trace for unavailable engines
 Eg. '-pre "SO_PATH:/lib/libdriver.so"' calls command "SO_PATH" with
engine.c%s%s(input flags): -nrequest-no_cert_verify    don't check signing certificate
Error accepting connection
des-cbcidea-cbc-config -keyout arg    file to send the key to
default_bitsit needs to be at least %d bits, not %ld
new subject=attributesWhat you are about to enter is what is called a Distinguished Name or a DN.
_valuestring is too short, it needs to be at least %d bytes long
-cVerification Failure
bytes read   :%8ld
-stdin             read passwords from stdin
end date is invalid, it should be YYMMDDHHMMSSZ
next serial number is %s
 -engine e       - use engine e, possibly a hardware device.
Extra configuration file found
ERROR: adding extensions from request
signature verification failed on SPKAC public key
removeFromCRL%08lx
 -CApath  dir    - verify CRL using certificates in "dir"
unable to write key
-decrypt-sign           sign with private key
-hexdump        hex dump output
 -genkey       generate a DSA key
read EC key
 -noout            do not print the ec parameter
 -param_enc arg    specifies the way the ec parameters are encoded
                                    explicit
ec_generr:
	if (point)
		EC_POINT_free(point);
add_word failure
usage: genrsa [args] [numbits]
verify depth is %d
verify depth is %d, must return a certificate
 -dcertform x  - second certificate format (PEM or DER) PEM default
%4ld server accepts (SSL_accept())
Peer has incorrect TLSv1 block padding
                          read X BLOCK
                 for those protocols that support it, where
                OCSP response: 
======================================
ecdhp192ecdhp384ecdhk163ecdhb163  ecdhb233  ecdhb283  ecdhb409  ecdhb571
idea     -elapsed        measure time in real time instead of CPU user time.
RSA sign failure
gettimeofday %11.2fkcamellia-256 cbcError reading header on certificate
no_serialunable to open '%s'
Subject Attribute %s has no known NID, skipped
Can't read environment variable %s
Invalid password argument "%s"
%s:%s
 BAD-CERTIFICATE-ERROR certificate_revoked decode_error user_canceled, ServerHelloDone%s (Library: %s)
 -tls1       - TLS1 mode
-CApath arg   - PEM format directory of CA's
-nokeys       don't output private keys.
-descert      encrypt PKCS#12 certificates with triple DES (default RC2-40)
-v1 obj         use PKCS#5 v1.5 and cipher "alg"
-decrypt       decrypt encrypted message
-des           encrypt with DES
-noverify      don't verify signers certificate
[Success]: %s
-ignore_err-serial n          serial number to check
-CApath dir        trusted certificates directory
 is %sprime
rsamd5des-ede3-cfb%s
%-15s-inCan't parse %s type
-key-subject -batch         do not ask anything during request generation
encrypt_keyerror, no objects specified in config file
%s_min-hmac key       create hashed MAC with key
:%ld semi-random bytes loaded
-nopadzero length password
%-14s base64 encode/decode, depending on encryption flag
-revokeunique_subjectdatabasesigning CRL
 -config file    - A config file
 -multivalue-rdn - enable support for multivalued RDNs
The matching entry has the following details
%s=Suspended (%c)
 -idea           encrypt PEM output with cbc idea
rsa.cUsage: rsautl [options]
 -modulus        print the DSA public value
writing DSA key
 -C                print a 'C' function creating the parameters
	BIGNUM   *tmp_1 = NULL, *tmp_2 = NULL, *tmp_3 = NULL;

	if ((tmp_1 = BN_bin2bn(ec_p_%d, sizeof(ec_p_%d), NULL)) == NULL)
		goto err;
	if (tmp_2)
		BN_free(tmp_2);
	return(group);
	}
-x509toreqrequest keyCertificate will expire
 -subject        - print subject DN
 -text           - print the certificate in text form
 -C              - print out C code forms
-dhparam-chainid_prefix '%s' set.
Setting secondary ctx parameters
usage: s_server [args ...]
 -dpass arg    - second private key file pass phrase source
 -no_ecdhe     - Disable ephemeral ECDH
Swiching server context.
HTTP/1.0 200 ok
Content-type: text/plain

-starttlsCan't open session file %s
4433no response sent
nistk409+R1:%ld:%d:%.2f
%ld %d bit DSA verify in %.2fs
ECDH key generation failure.
dsa %4u bits %8.6fs %8.6fs %8.1f %8.1f
Got: %s from %d
localhost:4433P12
issuer=show_typeoiddump_unknowncopyunable to get certificate from '%s'
 unexpected_messageserver ticket-toseq-CSP-export       output PKCS12 file
-certfile f   add all certs in f
Error opening input file %s
-v1-req_text-reqout-ndays n           number of days before next update
Error creating SSL context.
Error querying OCSP responder
asn1parsermd160problems opening %s
-newCertificate does not contain DSA parameters
-utf8promptweird input :-(
OPENSSL_malloc%s is an unknown cipher
-ACipher Types
%s is an unsupported message digest type
error writing output file
-stdin-quiet             no warnings
salt_malloc_p != NULLmd5crypt-ss_cert-updatedbCA private keymaking CRL
Invalid object identifier %s
 -crldays days   - Days is when the next CRL is due
Signature did not match the certificate request
ExpiredTXT_DB error number %ld
49-nextupdate-hexdumpError allocating DSA object
unable to write DSA parameters
-param_encInvalid reject object value %s
2.99999.3Certificate purposes:
Getting Private key
 -enddate        - notAfter field
                   exit 1 if so, 0 if not
-dkeyerror setting 'id_prefix'
 -msg          - Show protocol messages
 -engine id    - Initialise and use the specified engine
Hostname in TLS extension: "%s"
subject=%s
HTTP/1.0 200 ok
Content-type: text/html

%-11s:%-25sDSA sign failure
DSA verify failure
%s %-13s%4u bit ecdsa (%s) %8.4fs %8.4fs %8.1f %8.1f
blowfish cbcaes-192 cbc+DTP:%d:%s:%s:%d
GET %s HTTP/1.0



%d connections in %.2fs; %.2f connections/user sec, bytes read %ld
Can't open file %s
 insufficient_security bad_certificate_hash_value -ssl2       - SSL2 mode
-password-nomacver     don't verify MAC.
-CSP name     Microsoft CSP name
%s: <Empty Attributes>
-nosmimecap-rc2-64        encrypt with RC2-64
-binary        don't translate message to text
Subject: %s
-hex                  - hex encode output
<0x%04X>-no_chain          don't chain verify response
responder certificateWARNING: no nonce in response
Error converting serial number %s
Error parsing OCSP request
Salted__./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz'F0F9FSF9F9F9F9F9F\FVm



?AB@??????????????????????????????B?@%=%=%=@UA%^__(_`fm5ihhihemaggmm.A?@@@ư>MbP?o*4Vx4Vx4Vx4VxVx44Vx4VxVx4x4V	;;@ string to make the random number generator think it has entropyFFFFFFFFFFFFFFFFFF#FFFFFFFFFF(FF2<FFFFFFFFFFFFFFF#FFFFFFFFFF(FF2<~****G+8/H/[/.v/H/H/.(242I214242421kCbCiCiCiCiCiCiCiCiCiCiCiCiCiCiCiCiCiCiCiCiCkCiCiCiCiCiCiCiCkCiCiCiCiCiCbCiCiCiCiCbCiCiCiCiCiCiCiCiCiCiCiCiCkCiCiCiCiCiCiCiCkCiCiCiCiCiCbCiCiCiCiCbCRSSSSSS{RRSS{RRWuZuZuZuZuZuZuZuZuZTYuZuZuZuZuZuZuZuZuZ`YlYxYuZuZuZuZuZuZuZYuZuZuZuZuZuZuZuZuZYuZYYYYYYYYYZuZuZuZuZuZuZuZuZZuZuZuZuZuZuZuZuZuZZZuZuZuZuZuZuZuZuZ&ZuZuZuZuZuZuZuZuZuZ/ZuZuZuZuZuZuZuZuZuZ8ZuZuZuZuZuZuZuZuZuZAZJZSZ\ZeZnZUHWVWWWWfW*WuWYqYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY&x˖˖HTTP/1.0 200 OK
Content-type: application/ocsp-response
Content-Length: %d

;0<5L9t:===$>DCtE\FG<T4dl|ܨ̵L<t|<<	4	,d	|			l/
0L
2|
l6
8
<,><<PlX`mLx,܂\,
LD
|t


,<\!##-4:d<@kllLm<rls\t,u	,	L
|<,LT,\<Ll| !#4$d')\+\,$,.T//<1\11$l3T,4<56,77,7L\9|9\;<>4,?\?@L@l@|@@$BTlEEILM<\NlPP|QR,S\<X,Y\ZL[L\4\]\,`a|alcldLeteeiLp<tLw|<̓,l\l̚ LD ,t  ,  ,!|d!\!l!
!l"zRx$/AC
P4Dp4AC
BnAbAj,|5AC
MEA$7AC
OEA7AC
E7AC
N,7AC
MHA$D=AC
L,lh>OAC
J A4?+AC
JEh,@AC
MA,M6AC
P6$4jAC
Bc,\؃AC
P/A,8wAC
P5A,Y	AC
M6	A,AC
MA$xjAC
Bc,D:AC
PA,tAC
FAV,`AC
GA,0c	AC
PA,pz
AC
PA,4NAC
M<$djAC
Bc,(AC
P,DAC
PA,H%DAC
IA,h&5AC
M#,Lx(jAC
MIA,|+AC
J|,.AC
MfA,1tAC
Mb,2AC
P
A,<DAC
M,lhLAC
PA,HT
AC
P
,ac
AC
PN
,l
AC
MA,,xvJAC
M8,\~AC
MA$XjAC
Bc,
AC
PA,pAC
P
A,0AC
J,D4AC
PA,tpAC
J,AC
P$jAC
Bc,AC
MhA,,	"AC
Pz"A$\	XAC
G$	 $AC
F[A$	(AC
F,	
AC
PA,

AC
PA$4
+AC
F,\
H-AC
PA,
09+AC
PA$
[tAC
Fi$
P\AC
K,]mAC
PX,<HbAC
BAH,lbAC
BAH,cAC
BAH,(dAC
PDA$AC
_,AC
IAH,LfAC
P7A,|AC
PALXAC
CpAIAIAIAaAI$=AC
Fn,$
AC
MAT
	AC
F$t
p	AC
F
	cAC
^
8
!AC
BY,
H
yAC
CXAW,
nAC
CMAW<
!AC
BY\
"AC
],|
3AC
M!,
AC
J$
<AC
L+,AC
J,4pAC
M7A,d@&AC
PA,@DAC
M2,`AC
M,0AC
M,$AC
MATPAC
H,t@LAC
M:`AC
H,`lAC
CGA\,AC
M,$AC
GkEt,TAC
GA$AC
Gs$iAC
F^$  |AC
Fqx AC
I,x AC
PcA$L!wAC
Gk,t0"~AC
P]A,#AC
P-A,$AC
P$&1AC
hAC$,&AC
CT`' AC
Wt`'@AC
w'AC
L'AC
Ep'AC
I,p'AC
PA,$@)AC
P#A$T++FC
BZE,|+,AC
M4A,/(AC
M,2AC
GAK,x3AC
FyAT,<3AC
P$lx5AC
F$6AC
F,6AC
M|<6AC
GWAiEPE,,7AC
J$\<AC
F$p=#AC
K$x>AC
K,@?AC
IA$@AC
GA,,@AC
M|A,\CAC
J,HDjAC
F@A,DAC
M,HFAC
NwA$GAC
GDG
AC
H$dGrAC
Jc,GiAC
MA,K1AC
M,(RAC
PA,UgAC
MU,L(YXAC
PC$|XqyAC
Lh,qAC
MA$0tAC
F|,tAC
M,,u6AC
M$,\xOAC
M=$8zgAC
F\,zZAC
JK,zv
AC
P*	A,AC
MA,DAC
P2A$t@6AC
Cn,XAC
PA,
AC
PA4ظiAC
P-Eb,4AC
JdAC
A,.AC
P"A,AC
P,PbAC
MPUHAWAVAUATSPIL?IcL$IH=)zuL% zIE~IHug&Ht/HH;HHt΀/tAI9sUA1r	1ɸA}%uIEHEDƉAUHMHII9rDLLDLL	fUHAWAVAUATSHHUHuиg&HA A">">"H)LkHHIHHtGE1AIHHIHHHIFL9tJ>"HrDHuHUa&Aa&I)MnMLIHHtI1A"HMLIHHHIFH9tHa&HrDHuHUH[A\A]A^A_]DUHSP>">"H)HXHHHHHuH[]jHHIHHtH>"HHrUHSPa&DHHHHrHH[]@HtUHH= ]t
a&=UHAWAVAUATSHxIAHEEHp'H=HutHZ'H;u1HHHtH
@'H	HǾjH=Ht^H5RqHu<1111E19H&HH=l1;H=
SH=HuH=5Hu
IHHE1HO&H1H
F&HHUHHuH)&H;HH&H{u1HC 1HH8H@uH
HH=H5IHtH{tLH~H{ H[uI<$H`H޺(H]HuL[H/ACLuкL`HGH
/L5S%L=T%1A$HHDI6I>ILHA<$LHÃHH
m/|)A<\M$tH}L`LHUHM`uHULWHp$tH;HEHH5n1H;1۾11HEH
.	I$DLPAL%$MuBHAILDLE1DIL%#MuL%#LuE1MtLH#H;HudMupH}Ht,1&1I<$8I<$Ht
:I$DHMtL!H}HuL%'#I<$H5241]ALuM58DUHSPIAHtu{A&v	Hlu>tdELrC<tKH	H:HDC9u1H[]DH=ar<t	H>e4H[]HDH5Z"H>$H5C14H[]f.UHAWAVAUATSHE1~-IHHt"IHEHuHtLPADH[A\A]A^A_]MuH5LH5LzAtH5LatH5LNtH5L;xH5&L$H5L
H5~kLH!H;H5L1CH;H512L=!I/E1E1H H81IIEHHEHuLE1IUHtHH5L1ALEH;IWH51I MEAiA=3333rE/E9tH;H5j1[H;H5tj1HE/E9tAtAuH;H5Z1#AH;H51
AAGA'H;H5K*E11AAHH8E11IHHSH0L5HS HHtD9+uLL1qLG7fUH+uHHv]]fDUHH]"fUHHHv]UHAWAVAUATSHXI}HuEHEIHHEHIF(
L=aI?Hu8HIHt!H
EH	HǾjI?1E11D{D}ILeȃL-L5DQ1HE1HE1HE1HE1HEfI$HLtOHLt\HHH}HuHULEo
tw}pD}ELeAD}ID$HEIL$HMAD}ID$HEIL$HMIDDxD}ILeȃI"LeI$HH5WtgHH5ZtHH5HH5_HH5*}ymE`MԍAEԅpIL$HMIT$HUI5MԍAEԅEIL$HMIT$HUI
MԍAEԃIL$HMIT$HUI1HE1HE1HE1HE1HEL-I}Hu1,IHuHLutLLH$HL}HMH]t/LE1u*I}H5LE11E1LHH=Ht5HǾHE1u0I}H5rLLuE1HǾ1E1nH]Ht HIHuI}H5E1/E1H]H:HHH(I}H5H1I}L%oI<$H5ME11I<$H5Ұ1I<$H5t1~I<$H51lHMUL}1ۉIM,$HILLH5lLH19|LuL}E1H}HtMtLHLHLHHEHX[A\A]A^A_]1Ƀ}~91HE1IHEH4LLLMHHcEH9|t1HEL1LIMV;-E1Luf.UHAWAVSHIt2uAu
1L=3i\IHt$HHH޺HEAHcHH=DH1AHƒ%ˍHPڃ"ك+u
1LH[A^A_]DUHAWAVAUATSPIJHyIH5KL?HIH1115HI@H(L0tAL4HH0HtL1HH9H8H5E11mRLuLHH8H5B(L1DLE1$HH8H5pE1L1E1E1LLLH[A\A]A^A_]HH8H5'E1L1뻐UHAWAVAUATSPHMIHIL5fI>L
&1HHIL5eI>HHHEH51!HHL1HLLLtdMHuHtHHAHEH~@IH=U-I>H[A\A]A^A_]2HH;#H;LH[A\A]A^A_]UHAWAVAUATSHxIA
zH+H8Hu?HHHHt!H
H	HǾjH;11HE1IHEKHthHEA|wE1HEHxHEHEHEEEEE1HpH5x}1HEHBN1HpEEEEE1HE1HE1HE1Hx1HESHI~HIML}MHHLjaLmMLuH]t&LlL;HLHLlHHMH5o|LHHH;H5)L[HH8AE11HE1E11H}HMtLH}HtE	MtL!HtH$H}Htv!DHx[A\A]A^A_]Af.IMEEMANI_HH53;HH5~THH5dXMoEfHH5/THH5IHH5)>HH5+rqBHH5kZRHH5kC^HH5.,SHH5"_HH5lHH5AAIGHE@AAII%Eqf.AAIGHEEAAIGHE*E(EAOAIGHEA4AIIHpA
IEEAIEtAAIwIH}^AAIGHx<HHLj1CM@1HE/HIHǾ &@HxHHMH	LeH=HL 1HIHhHH\HxHu"H5oH#LHHLeHH;H5ɡL1H;?1E11HEE1y}u*lH$H]HHL]L}	1HELLE1AIvLHߺ,IA$LE1uH]1E1LILwME1L1AL|MIFH`H`LLE1HEL}H]Le^IIFHEH]HL}H1HEE1Lm,HCHHHMLc H]LmALA9LD-Ht]HHMHI)Hh1HhL
HH}AHHsbeHuHLDHH5$H1H]E1LcpM)MI9AELEDH}Ht!HEJ48H}D~H}D9$DLE1A}LeHuHƉLMDEOHH8XAE1mH2HhH~?H5*VE1LHM1FHhH8H5}E11E1!H5H5NE1LHU1qLLLeHH81HEH}A1E1H}ML=
I?H5ϷE11I?ZH}ALeH
H;H5E11H;$AL%j
M<$H5E1LH1I<$ALeH}PH%
H8H5H1YH

H;H5HU1=H;H5g1,H;H5oj1H;H51
H;H5'T1H;H571H;H5D1׿H;H5E1ƿH;H51赿H;H5JL1褿H;H5{1蓿H;H5+1肿H;H5EL1qH;H5\1`H;H5*1OH;H5%L1>H5ʾH;1-E11賿A1HH8lMUHAWAVAUATSHIAHDžHDžHDž(HDžHDž
HHXH
mHH;u1軼HüHHtH
H	HǾj诼AI$HxH`EHE1HEȸHH8EDžHDž$HEHHEHXDžHHHHHEиHH@HEHH0DžDžlDžDžPDžTDž EDžDžDžpDžhE1Ml$LH5\,DLH5Ҝ]LH5oxjLH5lLeIA_LH5%YĺyLeLH5詺pLH51蒺hLH50{LemLH5`wLH5`XILH52LH5tLH5PLH5LH5$ֹLH5
_迹6LH5^訹\LH5葹TLH5?zLH5ɺcXLH5LPLH5d5LH5BLH5âCLH5/XLH5ٸtLH5H¸iLH5d諸aLH5Y蔸VLH5\}NLH5ӹfFLH57OOLH58GLH5o!eIL
HHHEHH@AN-AI|$IDpafA-AI|$I4A,AID$HEA,AID$HEIEEADžEALeAAALe,AID$H@Ap,AI|$IfEAO,AID$H0fA0,AID$HGA,AID$H(A+AID$HEA+AID$HA+AID$HXA+AMl$IEuAкH=aL&t}A	vwH=DTLH=LFH=ZLзH`+A,2QI}A
IBDHH(AH`DžjDž[ILH53ӸHIH111	HHȵL11ǴLuL111H"HHH"IŃ8tmIUH=H5źIQDžILH52HHEH薺H!HH}111苺Ht>IHH舺!L舺DžT)EHp軴LuL11足L111عH_'IHԹH!!IŁ8uI}'HL,LHE'H}bH8HHHH(UDžhdE1LԹH謷LMLuv!LHH{ԹHH(H`AHEELeAgA*(It$H!(A4A'HEHpH'ALeDžlDž wEkDžP\DžPMA'ALeID$HEDž$AW'ALeI|$I詶D\A"'HEHp1苸HH&ALeIEHHEL(LH5'Ut7LH5B&A&ALeID$HA&ALeID$HHIE1HDžHEDžpH`E1DžhDžDžEDž EDžTDžPDžDžlDž1H01H1HE1H@1H1HE1HH1H1HDž1HX1HE1H1HEDž$1HE1H81H?L5I>HLHuH跾H@HHDžhLHtI>H5
.H1谰1HJHHHI>HH5T1HEH1gI>H51HE1KHH0H5uJHLHt&htMI>HHH5_-1$I>HHH51EH5JHtXI>[H=IH1NHt)H5,HHtHH躲HI>H5I,tEHtFMH=IH5H۲IHul螮AE11HE|H=QIH5qH螲Ht$H聳HHHEHMu@MrHH߾11E1A6H5HH7H=HHL13E1Hu+H=HH5H	HHu賭Hu+H=rHH5H迱HHu~H=GHH5gH蔱Ht6HH褳u,I>H5%I>H51HEL$DH}L}t:H=GH5Hj HteH5rHHH@HHuTH=GH5HmJӰHHu2薬E1H{聬H@HHtLL11E1AhH5GLiH=GLH1eHEL}HHHHHH]L}HEHI>Hu1_HuHLxI>LH
ЌH$E1U1IHHEHmH=?FH5_H#9茯HHuOI6E1H1x4L}MI>H51HEH1蜫1HE1HEE1Ls"1HMEH=EH5H8HHu轪I6H1HXHtoH(H0H=\EH5|HivH(Ұ.H(L`AGI>*HH5z1HE1軪I>H(H5v1螪1HEL}H]
Lx1HEL0Mt'H߾lL֨H&L虮H%HH߾j1諨ptH1H111IDžPHMHxEHEHtu$軯HHEЋ=tM(=u蠯HM
蛯HIH=CH5HHH5HͧE1}H]HxHH;H5I>H5I>H5]&1HE
I>H5SE11Ѩ?HDž(I>L`AH{H5HDAH
HEH51誮HDžIHH
& H AHELxu|yI聮IMMLo(HLL_ttH}оLZt_L^L5AuhLLML}LtL1HL51lMtLML	Au?ML8LH}оL裭l1H8ML}I6HHHu&H=-AH5MH7KzHH=I>H5DH1躦H}ȾlH$HFH=@H5H^!HHu(H=@H5H{HH5HΤ1ɅHHD1ۃTHEHH$H}LI1E1E1Ьu;׬?
%m1
KHH$H}LLI>H57E11譥H=?H5HU'HH=?HEH[HEHH=?H5HpHH0H=m?HHHXHI>H51HpH03I>H5dH1HpI>H5J1HpHU1輤P~*IEHx0&uIEHx0EIEH@0p*1HE}tMkIHbuLXIHLHHHH11LE1E1藩H5@>H蘩}Hu!H=$>HHLLHuHE1L}MH]}Hht6L=6I?H5@1mI?IEHP HH5ۋHH@$HHLHsAHxEtrIE@hL}Mt$H
H9HP HH5nnM}HuLHpHRH;H5@t1H}IEHp LeIH@ H81HKIH@ HxHcHiQĩH$IEHp L軩L軩HILH贩LLLLL1E1E1GH5;LHu!H=;HLL;LHuHPtuL}M}H]5I>H5{TLE1&
H~ILH葨LWxHH8t5H551BHI>H56H1נ&H51ĠHuH8L}ME1tl HHt-HHtHHH)HH}Ⱦj1趞蜟1HXL1	tvLH1HpH}HH@$NHRHLHE1AHn1HEH\1HpI>H5}11yHRHH}Ⱦj1ߝŞH	H}ȾlH賝
t,LڦHHH}HH:L} t.HH}tmH}Lݦlult~}tYL蘠HH5]H}HTHBH;H5I1yH;џ]H}L耦ltIEHP HH5H}x}t
LݢLӥHL=IHt.H=;蛜;u5HCHp H};H=ΝmHnIH=`HHТI7
åL}EM	t@ɋj}`MWu6H}L芥uH}LuHH;H5<IEL` L}Lf1LҠHpHNHQ-t,u
:t.uފHE1+@HH<$LH@AALޞ9zLΤ}L5LHLXL蟞1Hp1LHpHHLH@Au!LR9|L1HE1HE1HEE1E1HZH}L1H:H;H5U\#H}L
H蝟IEH@ H=}5u~HH;H51H;H5/1
H;H5f1H;H5U1H;H5L1ךH;H5CN1ƚH;H5<1赚H},TLuL1|1HpL54LH1Ɉى$HTH@HAA`LuL蘜92L`HEL`LHÃID$HH-t,u
:t.uހ8LEA<$+I|$IEjT_HEHHdHH1JdTH=3HuHHEHu謘HTHEHEHHdHHHU1H=E3HuH虜IHu\HEHHdHHHn1觡H=3HuHH}uHDžHEHHdHHH1TH=2HuHH*taxmHcIM4ILH5軖LH5N褖`HDžDžxHEL`HHE
2MuHfH8H5LHM1薗L%GI<$11LLLVLH5|+RI<$H5ZlL1=<
t_<."K<<HH5J荕K<<HH5bqH}HE8HHHu蔟HH5*萟

THeHH HHH 

g	HcƄ
}~	;Ej	xH;x_	HH8H5TLHM1HH811\ƅ=0tfDž
;HHH膕H<
t
<.tOuXH}NHE8AHHHuFHH5l)B

HHH HHH 

HcƄ
}~;EHH8H5`HU4xWH;xGHhH8H5:}x1虔=.yE1AH̘H-aL5!I>H5i1Hp1OLHH}LGL}MHH;H5oG1
1HEE1E11H8H
H8)HRl}HXHX&~2-u)HJH;H51聓H;H5
1pHXEHH8H5VHH;H521HEE1E11HH	HH;H5o1HE11HEE1E11H	]HX<]9HXu袖HELpLb`tdHHL1KdUH=,H0HHEHu誑HMHEdHHHNL1H=H,H0H處IHu\dLLHgL1謚H=,H0LHuHDždHHHL1[H=+H0HH.tE躐HDžEHELxHHEf+MuHH8H5RLHM1L=I?E111WH+HL谙HH5$謙I?H5eL1蘐*<
t<.t\ue=H}HE8H*HHu3HH5Y$/
=w*
iHi*HHH HHH <
aHcH5*D}~	;E}x
H;ML`H@H
)A輘H@H8H5бLHM1pH!H811؍)=)tf)
?HHH=|)E1H_)<
t
<.tGunH}t@HE8t7H2)HHuƗHH5"—+=
)
u"]HX%]9H(HvHH HHH <
HcH(D}~;EHH8H57ZHU+}kH;M^HH8H5vU1=B(ecHH8H53L1ԍHA}H8HjH;H5r1HE1蛍{HGH;H5"1HE1x1HEE1E11H8OHH8H5bE11CEL5LHpLHuP1ɅHpQHH8HEHPH5	E11HH8H5j1ЌE1H|H8H5XHUHeH8H57ux1薌E1KH?H8H5i+H)H;H5E11]H;赍
HH8H5=XE1HUHH8H5tE1U1HH8H57L1HH;H5(1HEHx1ӋH;H5Z1‹H;H51豋H;H51蠋H;H5>1菋H;H5(1~H;H5}|1mH;H5t1\H;H5s1KH;H51:H;H5+1)H;H51H;H5	1H;H5N1H;H5o1H;H5:k1ԊH;H51ÊH;H5U1貊H;H5=::1藊H;H5a1膊H;H5]1uH;H5B1dH;H51SH;H5a1BH;H5#11H;H5.1 H;H5	1H;H511H;H5VF1H;H5'_1܉H;H51ˉH;H5Q1躉H;H5ҏ1詉H;H5-1蘉H;H51臉H;H51vH;H531eH;H5i1TH;H5a1CH;H5W12H;H5
41!1HE1HEE1E1H;gAL}H=6#HtHH;8t@H}gH}讉H}LLՋHMtHHt裈HL8HtHHtzŋHtH踑MtLkDH[A\A]A^A_]fDUHSPHӅ*+Eȃ*E
EȈMHzHuH{11RH[]UHAWAVAUATSHIAHDž8
茆视H5\ sL="I?Ht>HHul赅H轅IHtUH
H	HǾj詅I?6H5gJE11AE1E11H8H5
5
1E11tA1HPH]I<$HH޺(葌H9HMl$E~AEDžx1HHHEHEHEDžpEDž`HEHE1HE1HEDžX1HPF1HEE11HEE1DžxEDžX1HE1HE1HE1HEDž`EDžp1HE1HE1HE1HHHt	H}t8HH}u)}t#HH8H51HE1LEUIU:-HHH;H5I1HE1H;H58v1H;H51H;H5%1H;H5t1τH;L5L1軄H;H5B1誄H;H5)1虄H;H5A1舄H;H51wH;H51fH;L1YH;H5Z1HH;H517H;H5@H
(YH1H;L5~H
LH1H;H
>LH1H;H
LH1ЃH;H
߽LH1蹃H;H
LH1袃H;H
ilLH1苃H;H
LH1tH;H
LH1]H;H
 LH1FH;H
.LH1/E1E11HEE1H]AA AID$HEf.IHEMEEMIE~HA:I\$;-,HMHH5N6HH5HH5HH5HH53ڀ1HH5ÀHH5zE謀HH5蕀HH55~HH5^gHH5kPHH5=9.HH5"3HH5+HH5#HH5HH5vHH54HH蛅HHMlfHPHEf.AAID$HEAAID$HEAAID$HEAAID$HEIDž`HEE_AVAID$HEIE4Džp-E~AI|$itRƒHEuRWAAID$HEAAI|$I躄EHEI pMAAID$HEgDžxdDžxUDžXFHH5HEH
iHM#AAID$HEHMLhL-I}Hu1ؠI }H(}H@H}HEȃXtH5H,IuH0H]I}H8Hu1E1#t[H]Ht{H}tt1H}ËxEH}HtHH01_H}DptYthH51fI}H5]1HE1}E1HMNHH8,1HEE1E1IHH81w~H5fH}HtKHEH}H2H8`HH:HuU1E1MPzHMHHH;HHEH5':1HE1}H;m~E1E1H]ALe H謆H|MtLg}H]MLuH8Ht|L}LHtH|MtL!}DH[A\A]A^A_]E11HE1HEL8HHy9HuU1MP$HI1HEMH}tmHtz]H5=H}f~ILۅH5ÉǺhfMHELHƉLb|H]]1HEE1Lm1HEHt(H@H}Ⱦx1	zH@XEt&H@H}Ⱦx1yH@D-H}Ⱦo1HMyHt}]H}H]H~IE<HEЋ8HXE1H}H6H5.HDDHUЃ}Lm1E1LhLuDMHeH;H5H1zH;IL~AHH9]ILH}lxMTH~HH}HuHUHPAMuAVARH5PuuH@DEL11wxHH9]vMLmH]HHH߾j1@xHL Lb5LLmLMIH]HHPDEHEMuPASARuuBH@AmML=I?H5HU1GyI?zLm/ME1LmIH]'MHH;H5HUgHpHHHxE1EHhL`LX$H}Ⱦ118wLmIL9}JH}lwHLnxHHhJ<[xHxHÉH54辁MIHhNLHHhHJHpM1HH}HuLL`HPAMuuB4AUuuH@EEEMLwJ<{EIL9}MLmH]D}HMH*H8H51HE1[wAE1E11HEE1H]Df.UHAWAVAUATSH(LMDEЉMIIH}H]8Le0HtgHMLp1guLL؀HvHMLHމE1̀HMLx1)uHL羔1uLu(]LeLL @zxJuMtHMLx1tH}LHM`H5l1H}1$v(HӿH;H5L1vH;_wH([A\A]A^A_]H]HHMLx1FtH}HULHLe09H]ȋEЅUHLyH}8HM1L羔1skHH;H5mH}8H]Le0LHULL`LhEЅuLu LtHL$y}I}AUH5lL}L1t}AL5JH@DLL1tCT%LH1tIHcEI9|HH;H501VtJH5@H}1?t;LL ~EԋEЅ
L51L}f.ATLL1sHHcEH9|H5L1sLe0H}8A1UHAWAVAUATSHHI
rL5<I>Hu8qHqIHt!H
 H	HǾjqI>11͖AI$HEE1HEL5iHEHEEEEA1HE"ID$HEIMl$LL3qLH5RqLH5GqLH5pLH5H.pILH5jcpLH5(pLH5spLH5tpEoI|$IvAf.@QI|$IvE/ID$HEID$HEEHEtEh1HEAEEEE1HE1HE1HEpL5I>Hu1+oH3oHoH#oIHMLmMH߾lLnHH]H]HLlHnHoAA1LeH=5H56HU1zIH]}tH}Lrz}t?HuLpzEԨkz}I}
uXHI}tAH5B#ߺ
xHII}HyAH=D1qqEEfH1&HA4H1?qEԃED92iȫ*TUUwH=f1qEI>+pAE1HMtLoM)LKyHwHH߾j1lH]H]H
HEHLj1lALeH}111xIH]#I>H5E11nI>koALeI>H5LE11mAH]HinMH=2oI}LSxH=XD1oEYL=}1!HA4L1oEԃE9}*iȫ*TUUwH=e1moEH=<oH=_D1KoH=UoH=oH=MDD1oH=[DD1oH=lnH=UnH=snLlL5`]E1}t
LeH]H=LeLL7wH=~fnEԨH=zOnEԨwH=u8nEԨhH=!nEԅYH=G
n}MFL3pAE1HpAE1LeLLvH]ȉEԅI>H5Yr1kI>lAI>H51lkAHH8H5pL1FkHH;H5.HU1*kH;H5TS1kH;H5\1kH;H51jH;H5o1jH;H51jH;H51jH;H51jH;H5N1jH;H5B1jH;H51jADHH[A\A]A^A_]H=GnLUHAWAVAUATSHxIAE
#iHԳH;Hu8ohHwhHHt!H
H	HǾjchH;11HE1_AI$HpEEEHx1HEE1HE1HEEE1HEEMl$LH5_gTLH5rIgmLH50>gwLH5gyLH5$pg{I\$EwLH5ZPgLH59gLH5"g}LH5goLH59faLH59fSLH5`fELH5f7LH5$IHU1r}f.AAI|$IlEf.fAAI|$IlESAiAID$HE6APAID$HEA7AID$HxILEEIAHEEEEEEEAAID$HEEEEE1HE1HEE1HE1HxEEeL5'I>Hx1nEԋM̅DeuEExvI>H5mCHͯH;H5YfHp1eH;H5'N1eH;H5/1eH;H51eH;H5B1eH;H5۠1eH;H51eH;H51eH;H51ueH;H5
1deH;H51SeH;H5s1BeH;H511eH;H51 eH;H51::1eH;H51dH;H5ߕ1dH;H51dDeEADDDEH]EI6HuH(HE1踴HuuI>H5O1^dHt-H
L0H臵H50:LL5H1,dEoHI>UH5vE11dHpuHEH$H11E1E1n@HnIH#mM'E1H]	bH	bHIH]HLlHaHHgnII>UH5&D16cI>H5v1%cMuHMLDJnt{I6E11TaH\aIHH]HLlH>aHHfI>dHkE1I>cHZHLj1`MЉȃu/E0H=bH53L1l!I>H5q
E11bHHLj1r`}tLLal}t?HuL_lE&5}#LeI}fXHI}fAH5ߺjHIL}H=$LcH=oD1[cI}LkH=JDuD18cE]L=L5ޭ1"@HA4L1bEE9}&iȫ*TUUwL1bEH=_bI}L$kH=Cu1bE~ZL="L5K1HA4L1obEE9}&iȫ*TUUwL1AbEH=ςbH=HbH=aH=@]Љމ1bH=?މ1aH=_aH=!aIuHtH=`1aH=lfaL_L5/L}Le1ۃ}EWH=gLLjBH=7H58L1iL111cHHHjIHDhMI>3`E1E1H=Qq`EH=`EH=`EH=C`EH=k`}I>H5G$L111hIH-I>H5E11^I>j_E15LLhEuI>H5d1]I>5_MtLS^MtL^MtLYhHx[A\A]A^A_]I>H5ˡ1]H=:aLeMufUHSPHӅ*+Eȃ*E
EȈMHzHuDaH{11[H[]UHAWAVAUATSHHuAHDž HDžP
[L%aI<$H1%=	HEH8LL(Rbbase3e643E1	AALgHuDtencMDMAHECE1H0HEH8H`EDžtEEHxHHH@HhH(1HXDžpE1HEHu fEHEAH^EoILfLH5YtDmLH5&0YLLH5}YSLH5IfYZLH5OYaLH5T8YyLH5!YkLH5[R
Y]LH5v0XOLH5dCXDLH5X6LH5X(LH5QXLH5Z7XLH5iXLH5
RXLH5:;XLH5$XLH5
XLH5WLH5@WLH5VBWLH5WLH5cWA<$-uIL?dHHEHL#LH5t]W1HEf.AALIFH`bAALIFH8DAjALIFH(&ALALIFHEf.HEUELECDžp7E.E%EEE
DžtHދEAxAALIFHEmAALIFHXLArMnLH5bHnIHH߾HWHDLbHWL
t
uHAHH
t
u[HX|AALIFHhiAALIFHHHHX)AbALIFH@AAALIFHxH0PtTH|TI$HH
H	HǾjcTI<$1hyC{L%|I<$1H011wE1H81H`EDžtEE1HH1H@1Hh1H(1HXDžpE1E1H8eY`HОH8H5Z2H1UL%I<$H5F1TI<$H5H%1TI<$H5H?1TI<$H5BH˸1TI<$H5ŅH`1TI<$H5ZLH1jTI<$H5*Hu=1QTI<$H5jHk18TI<$H5P5HU1TI<$H5ؘH1TI<$H5/H1SI<$H54H1SI<$H5EH1SI<$H5&}H1SI<$H5&H61SI<$H501wSI$H5^I<$H5|1PSI<$TL%I<$Hu17uHxHt?HWHDuLmuGI<$H5q0H1R11vvQDuLmH}8?\MHtWAM1tdI1HH4QHAMIt6QЀ	v܀kuA}:I<$H5{Du E1GDIDHPPCރ}DޅtI<$H5V1REEL=nLW^[IƍCHHiVUUUHH?H HxHcHiɫ*HH?H#эHRLX[HELuMH}OHOHOHOH]HHHE9H0}t=L=AH]HLZLuLLZI4$HZI4$LZH`HH}ȾlH]OHLXM+VI<$HcH5`E11P1HEE1E1I<$QH}HH}t	H}PMtLPH}Ht5QMtLPMtLPH Ht:PH[A\A]A^A_]I<$mQE1I<$aQE1H}LmOH}hlMtHH811O[HHH}Ⱦj1%NLXMu0H(Ht$I<$H 1E18]L HhH}H8HM]H}L%LDZZHzOLLHM1WH}LZtYL==OHH}_ZhZHLHM1WH}HڋMIZuHE8L%/FL}H8Ht;H}lHLHL@PHR%DH
HHH}j1LML@tH;11Y}tsQHLLHHxIƃ}tH5ėLTWI4$LXWtt
LbY}tuLHu@QHEHMvE1HMHEHEHx^I<$H5_E11IM:L%I<$H51+ME1E1LmLHuPHHEHEH}H`tuLM}*E1LHLH}HLLAASARXHHEI95LLxLLH'E1LmfDHHuЉ2P~3H}HuЉ}P9HxH`tI<$H5)1H}11J}oMM4$H}WH5A1LH1KM4$H}WH5CLMLmH1K}HHHKL%A+H5LnI<$E11nKI<$H5<HUL%ML)K ~%H5mI<$E11KI<$H5ޠW)1H57<@H@H9tSAT
AD
tCz@
r z@wz@x©tH@H9uM	u0H}Vt#I<$H5{E11_JLmHhLmHh#J@~%H5lI<$E11JI<$H5AW))~z1H5.;@H@H9tVHhtCz@
r z@wz@r©tH@H9uUHGHIHPHǾ1G0tHP\UHPLmL11E1DMNUbptHP1?UHPHL1DM
U}tH5LMRI4$LQR}Lm}H=)r1JuHH1JuH1JuH1zJuH1lJuH1^JuH1PJuH1BJuH14J
ZTLmA}~NH=1JA}~(L%1L1IHIcEH9|
TL%YA}~UH=1IHEx~,L%1L1IHHEHc@H9|ݿ
SL%1ۃ}sLmI<$H51G~HHϺHJH5u=LeHHLJHރuHSalted__H9H5L%eI<$TLuM4$L4R}PH5\LLuH}RL%NHE~t1H57@H@|H9tSHHt@z@
r z@wz@x©tH@|H9u}uoLeLLHuzIHEHxH`)MM4$H}3Q|OH5[LMH1uEI<$FLmH5)H}~Iu!LeH}LdILOL%َI<$H5"E7HH8H5	1DHH8H5LHH8H5VLfDUHAWAVSPLAHǎ9~oIdH%HHHu
HHDAtCH5DLL1SDu&H5]L1.DH[A^A_]H53KL1H[A^A_]Cf.@UHAWAVATSAIHCIC6D9} H|H8H5fE11CIcL1PAEr1HAHA9tNtBQЀ
r$QQw'ʨtHAHA9uD[A\A^A_]HŒH8H5C4AUHAWAVAUATSHIHDžXHDž`
AHeH;Hu8AHAHHt!H
IH	HǾj@H;1E11eA@H@E1HHHHH}j@I_HvMo1HEAHEEHEEAEEHpHx1HE1HE1HE1LhHE1E1HMHuA	#EfIcHhL,IH\HHuHH5?HH5ֿ?HH5e?E1HH5*?HH5i?LHH5R?HH5G;?HH5t$?HH5q
?HH5a>E1;-HuPE1}AHMIDHME*fDHE1EE1HuA	HEE1HuA	mIcHhHLHHuHAHXE1HE1A	9IcAHhHLH‹u̅HUHDHUDuEEHuA	}HMEDHMEHuA	EA	~1EEHpHxE1E11HE1HE1HEE1HE1EE1Hp1Hx1HM1HM1HMHuAHUA	DLmD	DDDH}L}LmE1EHEALDHUHH
H1HEHHLXL`E1}LLLEDMuuuAWxpH0HHHuE1E1|HH;H5lDE115=H;H5_%1$=H;H5nW1=H;H5Zn1=H;H51<H;H5x1<H;H51<H;H5,	1<H;H51<H;H5e1<H;H541<H;H51z<E1:H:Ht3IH}t6ELlHM:H4sE1E1FEkHHLj1~:1EHEALDH}EAH5D/EHIMHEDEHPfDLLmLUEKAL
GHt	Lm8Lm@LH޺EAƅ~H߾
GH}HXH`HMLEDMuAUuAWxphH0tEGE1HLmCHxLm0E1$1ɋEEH#LDXFtuE1HBAH;;H`Ht{:MH]tLj:MtL:HtH ;DHĈ[A\A]A^A_]E1HكL-HLIH=H5H
FH=H5H
1kFH=ÕH5H
9:LFH=H5H
Dc-Ff.UHAWAVAUATSHHF	HHMHU	EMIE8EDe0L`I?H	H] LmL9H9v)EuHH8H5118LmADL8H9	}(L`tSI7H]HlED	eHuIIH	EU}(H;I?/D	eHME	EHkHHDM?HE78HEf*$L%#LHDL8fB $LLDL7HQH]1EHD@HEI<HH}7H	@ILLD+ALH1~DLL}LLmLxDHLHaDLHuHUQDLHADLH]HL/DLLD@LH1CLLLDLHLuLCLLLCHuL1CDH-LLef.LLCwHLmLHC}Le/L5}LHELIDLICu1HL1BCLLDLmLIDIDLCLL1CLMi$ʉM)DAAABA)i«D$@AI)?LH1|BLHEHDLuLHDLfBEfDHUMtLHuJBfAL}LLL.B	H=BEHE]DmDeEHEEHEEHEȊEHHEHpEH(EH8EHhLuLuEHEEH0EHxEHEL=L4LI9!DAAL@HE؈EL}DHPABAAHEDELpDHXAHHAHUAAALhDHpAH8AL(DHxA@H04@LEDÃ?H5H1A$ANH@$?Ȋ1ANE$?Ȋ1ANHEH0ANHP?0ANA?Aϊ1ANE$?0EHEH0EHX?0hA?Å1xA?AŊ0EHEH0EHp?D$0A?AD,1?D<2IE1A?A2@?@@<7?ۊ3IA0HEAA?E1H@40EAFEAFhAF	xAF
EAFEAFEf
EnE~E^AVA~A^ANENAvAFL5L1H)H>L`HMEUtuH5DLHLttH5DLL11H5LL11H[A\A]A^A_]H5M:HHIH;%=I?HIH?HI@E8D	H;tI?)H5	N:HHIH;1=I?HiIQ?QIQ?QIQ?QIQ?QIQ?QIQ?QIQ?AI@De01H=H5H
Y<H=H5H

<H=H5H

u`<H=H5H
A<H=
H5uH
?8"<H=s
H5VH
';<H=T
H57H
x;H=5
H5H
Dk;H=H5H
k;UHAWAVAUATSH8IE
-EL%~xI<$H}HHEHu:	-H-I$HH
MxH	HǾj,I<$1QE1HE1HE1HEL%wI<$Hu1=P,H,H<IH]HPLlHr,HKH12E1HE1HE1HEEDMAfM}LH5=&,trMeDsLH5g,tLH5F%+tgLH5V+t`LH5y+IEHEIEHEIMADE8vIEHEI<$2.11TPWHvHLj1+I4$1|H]HuuI<$H5`1o,Ht M<$H}H5GLH1J,I<$UH5]ԉ10,I<$H5>1,I7HtPINjuHMHlj@7t;I4$1}LL61ۅLAuH81-DL,"E1I<$-L,MLJ6H5HUL1p6t
}/L%#uI<$H5\1Y+I<$H5P>1G+I<$H5E15+I<$H5ag1#+I<$H5E1+I<$H5!::1*I<$H51*I<$H51*I<$(,H8[A\A]A^A_]fUHSPHӅ*+Eȃ*E
EȈMHzHu.H{11(H[]UHAWAVAUATSHHA
)L5sI>u1e(Hm(IHtH
sH	HǾjY(6A#H{H5J(
(H(HtYIHvsHLj1(Ht06HL66HL66HL6L'*E1AHAEALE1,f.H}кLo6L+IM9tJJ<H5RHU13uJ4H=1*H=/*AIM9uE1DH[A\A]A^A_]UHAWAVAUATSHHHuAHDžXHDž`HDž HDž@HDžHDž8HDž@DžHDž
&H	HDžPHHvqH;u1&H&HHtH
\qH	HǾj&E|$AyDžDžHE1H`HhHpDžHHHHxDž,HHhHHHH8HH0HEиHHHPHHHEHEHHxDžpDžDž1HX1H EH]@%DžDžHE1H HE11Hh1HpDž1H1H1H1HxDž,1H1Hh1H1HH1H81H1H01HE1HH1HP1H1H1HE1HE1HDžpDžDž1HXEH=)#H
H=="H	 2L`IH~$HH
H5wGߺ#-IHLL`HL-H5LHJ-H5LHHm1-L	A
AH]HCHEf.DHEEE|$A(	fHXLEE|$ALsH]LkLH54"LH5"LH5"LH5\#!LH5l!LH5F!LH5]!LH5j_!LH5Mp|!LH53e!LH5WN!LH5p7!LH5 !LH5$	!'LH5KK :LH5 ELH5 TLH5o _LH5( YLH5 tLH5\h LH54Q LH5: LH59S# |LH5 qLH5`<iLH5aLH5!VLH5ljLH5)/LH5gLH5}krLH5.T}LH5i=LH5&LH5ONLH5wLH5LH5JLH5qLH5~\LH5*3LH5nAAH]HCH`@A`AH]HCHxA>AH]HCHHlAAH]HCHFHEdEXHhGAAH]HCHAAH]HCHAAH]H{H("HHAZAH]HCHA8AH]HCHEiAAH]HCHEJAAH]H{H;#$AAH]HCHhAAH]HCHHPAAH]HCHHpAUAH]HCHHH wA#AH]HCH0QAAH]HCH/DžLH;8/Dž DžAAH]H{HJ*HXA^AH]H{H*H`A3AH]HCHHAAH]HCHPAAH]HCHHDžAAH]HCH8AAH]HCHHDžpAlAH]HCHAJAH]HCHxHDž,nAAH]HCHxHDž,>AAH]HCHxHDž,AAH]HCHxHDž,H]HHxHHldL`E1H;H5HIH11HH HHMtLeHdH;H5d=H;L1:<IH=Gu*H=6H5
H5H$HH=HDž`H31kHH5זHHHHH'H I<$HdH5H1mDž`MdDž`L5bI>H5jE1L1(I>Hp HKH1
I>H(H1I>H^H1I>HmH1I>HJH1I>H4H1I>HH1I>HH1I>H6 H1mI>H	H1YI>HUfH1EI>HH11I>H3H1I>H%^H1	I>HH1I>HRtH1I>HH1I>HMH1I>HH1I>HIH1I>H+H1}I>H`TH1iI>H
+H1UI>HH1AI>HH1-I>HH1I>HA:H1I>HH1I>HH1I>H-:H1I>HeH1I>H_H1I>H}H1I>H'H1yI>HH1eI>H;H1QI>HfH1=I>Hj\H1)Dž`H5H1	Dž`MLtDž`1bF=Dž`H;H5HH
0E111HO_H;H5H&H=H5pHHHuH
_H0H]H1eH=ZH5[HwHtHHHu>H^H8H5OE1H11HE1HE1E1E11<EAH}lH=ڳH5۳H,GH>H5HAI(H;E1E11HE1HE1E1E111HE1Hx1HEDžhL
LHMtH5^L}H]uH;TH3LehtHPHtH@SH}EHxH}H`tH}1!H=H=HH[A\A]A^A_]ADžH=dH5eHHL(tHǾ>{fHnHVH^IFHNI6H>HHEMMHH}%H=H5H!HL}-HH<H@H]HEHL>MW)))LeL
xH5
5}	yHHHLuLLmHLHLH.Hq[H8H}E11HE1HE1HE1Hx1HEDžhL}<H}u*H=H5HHHEH'LP1Mu?LeL%ZI<$HPHh1E1_LPLehH]HZH8HHHu1L(P&HHxHPHtHHHVHxHHHPpLe1HhHYH8H5#H
E11E11HE1HE1HE1Hx1HEDžhH}E11HE1HE1HE1Hx	HHHiYu&H=ȮH5ɮH5HHH;L
Н1L(!HHEHHxLeHEE1䃽pHELDH=GH5H\H <y(HXH8H5K11MHHtHHtHHtHHtHHtHHttE1HXH8H5\E1HU1H1HE1HE1Hx1HEDžh|H?HWH8H5H
SE11
1HE1HE1HE1Hx1HEDžhj0HLsL
LLHQL
HHHtgAL=WL%W%DD@D+HB3LIt,DExE9/~dH%HaWHHuI$HEHxHHHEL-VL}LeLuYRiVyI}HH5?V}I<$H5E11Dž`1HE1HE1HE1HxLe1HEDžhL}H}H=bH59HQHLut <yuKH=)H5*HPHt.IH8H)1ۅu HUH8H5(.H=ҪH5ӪH?HtqIH@H8(1ۅu^H3UH8H5L-UI}HH5C11JL}LeLuHHdd
H==H5>HoHtyIHH#)uhHTH8H5[GE1L1
1HE1HELe1HEL}H]LuH}l1HEE11HE1HE	HLMur tiH=H5Hff
HIHǾ6HL6%=@6H=H5Hi
HHHH}3HPHLHH@Hx&HH]P1L0L$LuAH]HCHxL9MHCHxHuM
HHLC8RDžHDžHDžHDžHHLLH.AHH1HEL0Lu?A8LKH{HtDžLtMDžLMH[H*HK1Ҁ;-HE)ЃƃH??uyAHiPЀ
rP%w	HrHQH:HUЃH)DH56UE11[H;H54E111HE1HEHEI}HH5zE9I}HH5MR I}HSH5KS1%HHIIH/HPH8H5H
kE11HH;H5ÌH
E111HE1HE1HE1HEL}H]H}[LeHBPH8H5!1yE1H511\HHXt_HPHLuLjHsLbL5OI>HCH@H5/1I>H5\1H1LHpHrOLHXtH;H5{H1H1
IƋ8H5e(	HMIvIcHHLIcH5H]HHEH@HxL0zLE1DžpH]MAEEI@pH}NH8IVH55[1H]AHCHxA9
HCHxDL(A}VuIHXHH56vHHubE1H
MH9HUЃH5E11Lv1LeHMH8H5v,LeHMH8H5LeHyMH8H5>L1LL}E11HE1HE1HEHH}LH7HMH8HUЃH5HLH8HUЃH5-&DžpH]AH]HCHxA9}}HCHxDL(A}VuIHXHH5~HHuMAEEI@pHWLH8IVH5Y1iHH}pLHLt)HLH;H5>E114wXHKL0tH;H51Mtz1;H,H HL2XtH;H5aL1H8u+H=H HwH6HHDH8H H0Ht]H}lHkH0LeH H;HH5NE1HH1HJHH}jo1H0HHu&H=H5Hgc`HHH<HtkH1HH tuH=H5HHH5LH1ɅHHHIH8H5E1H1a1HE1HEȃHu-H=H5HK|HHHeHH߾11E1A8H5H9H=HH11HEHIH8HUЃH5cE11L1HE|H5HHU,gH5HHx.EXHHLHL0LH;H5*Dp1HܝHeHH8H5H
>aH5WE1HH11HEHHXt,HHHH8	H5HH13H}u*H=EH5FHHHEH<XtHGH8H5iCHU1H=H5HcH HH=;H8u-H=H5Hi!HH8HHH߾11E1AH5fHH=WHH81HFH8H5bRE1H811HEDž`5HHFH8H5ÂH
HHpFH8H5H
'E11HIFH8H5R1HEH1sDž`1HE1HH=iH5jHBIHt1L11 HHHuHEH8H5d1HH`HXH	eH=H5HzHXuHDžXH=ƚH5ǚHEH`\H`1H8Hu)H=yH5zH,HHHt(1H	u)HDH8H5zHHHu)H=H5HVxHHHt*11H9	u&HfDH8H59a
1HHu^H=H5H<yH4t	H
HDž1HuHCH8H5H u1H@HtoXxlH{Ht+HHCH8H5H1HLE11HE1HEL}H]LeHLCH8H5UGHDž`1HXXtHCH8H5t1JHHEHH}H}HI1HEMzL1H]HLHXH@HH`HiLcHLLHEH@Hx1HEE1"DHEH@HxA9HEH@HxDVHH8Ru6HIHsHnt	uHEHsH@rH@1IH@rHDž@MALLLH}LH[AH8H5X)1HE1H8AH8H5Ov1oH=HuOHH1HHEH9HPH@HHHH)HH@HH8HHH1HPHHH5(HHEH4HHLHHH@ HH}l1HE1HTHAHDHAAjHH]ȃH}yH]9H}HuHpLpIFHH-t,u
:t.uހ8LEHpHXLcJLH5t(kHpHxHHHCH>H;H5s1H1+H;H>H8H5E1HUH>H8H5ѧH}RXtH>H8H5M1Hx=tDž01HPDžpHHH@HHHHlHH@HH8HHH=H81HEHH1L(IHEHUXtH=H8HuFHw=H8H5Nj1H}eHHÃ0H}HAHH,=EH8H5e1TH}1HHDIHHxHUHLLMj8PXHhAUHĐLH}
H6<H8H51HE1gH@	HH}	HPHPH;H;HH5GHP1H;RZ
AH EHMHMAAAHHHu11LEE1H5H}t&H=HHHMMtZH1OHHH}ȾXH1E1HeHHMЅf}AuH}DMt&H5+1HELH1^H}HxHH}HuzMtH5H	vLHEЃH9H8HH1L(IHyIHHu,HxULH59HHU3.H5HOuHHJ9H8H5
1Dž`
H5%~1HE1^
H
9H8H5\HP1:H>H8H8}H!y
H8H8H51H}S
H8H8H8H8HH5i1HHIHHH
;8H9H5{1jHHLLHHxHUHLLMj8SXjHhAUHĐACH5R1HHP1H8H5WdH5r1H}H	0HHHxLLLpP8@X518HhAU@ua
HĐ/t`Hq6H8H5Ԁ1HE1H@AHH}HPHPE3HEHL4D0DE1
IL9K4HHxLLLpP8@X58HhAU@u.	HĐPH:5H81HEH51kH@
HH}HPHPH}H4L8H}sH5{01HM1HML1H@H5,H 1h)H5HHU	XtH94H8H51pH}NLXE1MH]HLHLp~H}LcDH}A9H}DHHHXD3HC6)EDHcH9HCHEHHHHH5|HdL<(IǐE~=H=?1LL)HELHrV1IHD9}M9r
fA00IA.pemAGH2H8H5jVHH1H}lHYH1LvH}LPpH}LH}L)q1HEH*2H8H5IH2H;H52>1HEHP018H;11ƅH2HH
H <yH1H8H5$1HEH1H8H5kD3E1MH]HL&HL;p`H}LDH}A9WH}D\HHHXD3H/C6)EDHcH9HCHEHHH?HH5BHL<(IǐE~=H=?1LL)HELHS1IHD9}M9r
fA00IA.pemAGH}lHHLH}LpH}LH}LH}H5_HkH KH5=HrkH4)Hm/H8H51HH51AHHrHtH1HPEH.H8H5Hy1HE1H@HH}1H0pHDž0EHHPHH)1HE1HEL}H]LeLuH}Lm0Dž0DžpHH1HEDž`H-H8H51HE1Dž`wH-H8H5)UH-H8H5 1HEDž`:UHAWAVSH(IIEHEHEHEH}HuHUHMI	1ۅtdMtdHuLtO1ۃ}Ht9IHcuHt>1LL1E1t#HUHuVlE1E11})H}H}LH}H([A^A_]E1HUHt1L1E17tHUHt1L1E1wf.fUHAWAVAUATSH(LMMIHUIHHIƺHǾlLHH]LmL111HIL}ȋEptH+H8LxL=+I?H5`X1tLHu`L`HHLHAHEI?DLehH]H5`1OH}HuHUHMLEIًPAWPuxATu`AUEpPEXPuPuHu@E8PE0Pu(u uHĐH*H8H5~L1hI?H5J1HI?H5f113I?H5QWL H511iI?LMtLH([A\A]A^A_]f.UHAWAVAUATSHHIωUIIW)E)E)EH11HHELdH1IƃxL}t
LUH=IHEL8HtNMtII|$HU[Ht@HH}HH )H8HUH5H)H8kL5(I>HUHMH51&L=L)	}HEIEH@ HX;L,	[HEHsHcHHEHcHEL3	#HEHH}H}H54HlHEVHE@H5]8A	HttHMHHMHHW)EHMHHHMHH)EHMHH HMHH()EH@0I|$HLLUHMI>H51H8RL5s'I>u
HUH5ZKcHSH5[1}HuHHRHAHC0I>H5I1YI>ID$HP H51?H}Ht<H}Ht.H}Ht H}HtH}HtH}HtHH[A\A]A^A_]I>H5fDUHAWAVAUATSPIC2L=#{LLm L=FJLLSL=fSLL9L=RLLL=sLLL=LLL=LLL=jLLtnHt%H8H5ZY1L#H[jL=7LD2L1HHoHL=zZE1E1E1E111HIċMLÃMt
LÃH5ߺZ
mHt{IIt$HcHHMt H5LHLLHMt H5LHLLHLGMemE11H)$H8H5YH$H8H5E1L1GLH[A\A]A^A_]DUHAWAVAUATSH(HMHUIHLIHǾ,Ht-IIL,mHtIIHu
&E1E1HtHHL)1MH5,xLyGH5RGLb:H5uPLK*H5dL4H5pL
H5LH5LH5LH5WL9H5gLkH54L[HG"H8H5H=E1L$1HEȹnH!"H8H5)E1L1R1HEE1H]LeMu`f1HE1.!1HEE1H]LeMtAHtJL3AMtLMtHt DH([A\A]A^A_]H}HuLLAMuML}E1L1HLeMHEtI$E1H]L}KMtNEL}EIHLE1tf1HEH]LeL}MH H8H5oH H8H5$E11qHt H8H5LLQH[ H8H5LL11HE;@UHAWAVAUATSH(IIPAǸD)D)1҅OHH]H߾ D)@HHHH]HE:HuL1AVB	w"H
HcHH53H5*H5dL1A#xH51H5L1A~WM~L5?L%iLL1cI~&AB<^v܄x@LLLH5H5#L1 H([A\A]A^A_]f.fUHAWAVAUATSHML`IHhII-H2H(H}W)E)E)EHL0t:U(Hu HHH}`HHE`H@HLxL8LptHH8H5j1.HE`HL` LLeE1}0uVALtA9xLD0HH5IH:Iǀ=ru^H;6AAFuL2AFA0tuAFLe"fA0Le	AFLLAN0qDt6t1I~A6tuA~OA~DHH8LLSf.@AL4A98LDHHIHIǀ=qu^H;AAFuLAFA0tuAFLe"fA0Le	AFL0OLAN0u,t2t-I~A6ztuA~tA~H]H8LLHCH8H5V11xgHIċH}uHhHHx(EH]ILeH`Lm1E11HPH`HEHxRH@HHAH]HHHDADžxHDILmALm&E1HEHXHH5gD\HH5z
HH5M
L AE1DDLHHDAǃu	EkELmx>LD&IH 'HLIHPHHuEMu$MH}L1wD\EH@H`9Lm;=fnH}H}IHE1E1E1BHH8SEE1XHH8H52E1E1E1HuH8H5(HbH8H5E11EE1E1E1H0H8HEHPH5E11\EE1LeD}XEtHH8H51&M}0tLeLmA}txLzLHIHǾ0xELILLL0ÅyEyH=ZHEHHp;t8H{HU/Ht!IHH8HUH5k1;KH{HUH!IL=I?HUH51I?H5n1HH;H5ɣ1I$<E-<V.<R/H7*H]H8H5|E11LH5H8H5TE11iEE1HH8H5*E11?E1wHH8H5qjE1HHH8HEHPH5EtHH8H5=1H}IHHsLHLeYLL`HGH9H8H;H51qI$8Ru$ID$HHHEH;H51DIT$HL-IDH;H5`ZE11IT$HIDH;H5Џ1IT$ HIDH;H581IT$(HIDH;H51LeLmH}HtH}HtH}HtH}HtH}HtH}HtxMtLMtL}0u
MtLH(tM]tL;
H0L8]ԉH[A\A]A^A_]HH8HEHPLLMtIL$HPHLmtL@H5+E11AH\H8HEHPH5X'H>H8HEHPH5E11jEE1LeE1Hh1LHH]Le@H]8H5HIHI H9t
H}1IH@ HxMt
L\
HiuHQmLLeLnH}`mHLHoAHEH}hLeKLmI}HuHIEHI}HHtH5	HEH@HLmhHtLMHhLHM`E1E1H5%gHtj}XtHH8H51H5fLLTH=fLLLO}XtbHBH8H5	HH]pLLHHLLL}XtHH8H5s1/LHu`LmA}0uLLuALH]xL-I}H5He1HI}LmLLH]PL%\I<$H5=1I<$IH@ HpHUHHtI<$H5Q1cI<$H5}Z1Qu_I<$H5\1;I<$11ƅHHHH <yL8A}tuHxLHH1tL%uHL&HA}uHxL@HHtLuHLHLLHx rL-(LHEIH@ HX;LnHEHsHcHHEHcHEL"6HELH11HEH}$H}HH}HH5]HEVHE@H5N8/HHMHHMHHW)EHMHHHMHH)EHMHH HMHH()EH@0HpHyHE1L%
I<$H51I<$Le
L%V
I<$H5oL1I<$I<$H5QvI<$H51YEI<$H5
E14I<$H5
1I<$HpH@HP H51UHAWAVAUATSHHI
H|H8H1AIHEE1HEEE1HE1HE1HEEDM~LH5
LH5LH5ALH5^MnDcLH5yLH5bLH5(KLH5}4IFHEkI~IwENfI~IWE.tIFHE^IFHEIMADMAEEٸHE7H?L=
IHH
u
H	HǾj I?1&M1HEEE1HE1HEEE1HEkL5	I>Hu1F葾H虾I聾H艾IM'MHMHBLleEIL1VIH]HDHyLlHH}tI|$1ۃLet	LmID$ HHHL0L!M(L}'}1L-?SLLHLL:Lo9|I>>M11R'HHLj1EL111"IH]HI>H51aI>蹿I>H5s1>H
HLj1蛼}1ۃ}EȃDiLL6HH8H5L1ŽHvH;H5ZHU1詽H;H5ӥ1蘽H;H51臽H;H5D1vH;H51eH;H51TH;H51CH;H5)T12H;H51!H;H511"LH5Q3Lh9LILH}uLLWLLjII>H5K1葼I>I>H51vH	1LVILHLLLH5XPnL裾9|ML莾LmLe}BL%
P1fDLֿLHLLL59|1PLmL%O1L薿ILHXLL}LLL9|1LmLeL1MtLԻMtLHH[A\A]A^A_]UHAWAVAUATSH(I
L5I>u1FHNIHtH
H	HǾj:IEHEE1HEL=P1HE1HE1HEAIMuLLLH5͸LH5H趸LH57Q蟸LH5V舸LH5q
HEHuHIuHEHI)fI}I臾Af.DI}IWEsIEHEIHEEIEHE1HEAE1HE1HE1HE)H1IH!IMM}1{AHIL}pHIǿ*IFM~ IO(HAI?fHIGHtHH詺DHHEIGH}HL}H}YH}ȅu1LmIHHC]HHHH߾lLHyH111边HIH]HƹE1H}fH蘹L蠹tQL褹HH0HtH}蠹HAH]HH8H5ZL1ԶAE1]H}Hu,/HnH8H5L1袶HAE1]MtL1ELmL}(H}H}9H]HXLlH豴HSHpHH8lAE11MMtL˶MtLHHmH]HtKLlH*H)AtFAu~L1HHBL}HUHLj1۳AuL111gHHL5I>H511!I>yHH8H5"11AE1L|MHH8H5L1ôHtH;H5QHU1觴H;H5ќ1薴H;H5x1腴H;H5`	1tH;H5ig1cH;H5qQ1RH;H501AH;H5l10H;H5r:1ADH([A\A]A^A_]H}諶1L}HHLj1UEătu6LLmLLpE1HVH;H5G[HCH8H51zPHA1lHH8H5`L1HHH;H510H;舴AUHAWAVAUATSHIAHDž`VIƾ
ԱHH8Hu? H(HiHHt!H
bH	HǾj
H;1Lh11AH=Qu2蹰HHQHtH
H	HǾj1謰AE1HEEEEEEEEEHpHEEE1Hx1HEf.M|$LH5LLH5‘LH5LH5MׯLH5LH52.詯I\$EuLH55良LH5rLH5S0[LH5DLH5n-LH5*LH5KLH5-LH5~ѮLH5躮IL覴HhHAAI|$IEf.fAAI|$IĴEAAID$HEApAID$HpIFAPAID$HxA4AID$HEIHEfDLEEIAz*HEE׋EԃEԉEAIt$H`AKEԃEԉE돋EԃEԉE끋EԃEԉEpEԃEԉE_EԃEԉENEԃEԉE=E1E1E1HE1HxEE1HE1HpEEEEEEEE1HEAHIIHH]HAL-qLlHHLEL1IHL}SHkHHpHIƹHǾHUE1[uL1E1@KHH HuIƹHǾHxE1uL1E1H8H11uQI$HPH8HP蝿HXIHP芿MH]LL肿ALgEI}HνH5@HD1HH8MAnHHLj1LE7L111ҾIH<I}H5b1蔫I}I}H5d1wLE1E111HEȃ}{AL5j?L=pLeDLeAED;mADD9mt5D9mtWD9mD9mD9mD9mgfH=JI$HPH`H5D9muLX11HH=IH51菪H=IHtHHóH5#襻H=IL1TD9mEHII$Hx趽HH5wH1"D9mH=QIH51H=<II$HpOH=(IL1ީD9mH=
IH51迩I$Hp H=HHtH5'1薩H=HL1腩D9mOLLhLHHM*HHL0HH5H1,EA
1fH=IHHH9ù:ADL1HcEH9|2H:Ht[IMLpML=fLlLHLҬM(E1E1HH8軩E1AH]H葬I}H5'HH8H5ekE11ALeH]RHHLj1e}MtLL衺}tE1H]Et9uOLLW2I}H5I}H5E11胧LLsuI?H5L
I?H51RH]AE1H]HH8HH5X1HH;L5]HE1L1H;H;L1H;HL1ϦH;HL1軦H;HܟL1触H;H{L1蓦H;HL1H;H5L1kH;HRL1WH;H`L1CH;H5L1/H;H
L1H;HtL1H;HL1H;HKL1ߥH;HsL1˥H;H"L1跥E11AL脦H=DxHDL%HtH84H,DHĨ[A\A]A^A_]UHAWAVAUATSHIAHDžpHDžx
HH;Hu8]HeHHt!H
H	HǾjQH;11S	AI$HhE1HEHHHEHEHEHEHEEEEEEA1HE1HE1HEA1HEEEEEEEHE1HE1HE1HE1HE1HEޢHoH;Hu1IH;HpLxHuHUHt(DmEDet*Et%H#H8H5-H;H5訡H谡AAE׃}ADIHH8LpELHrH$HuM"HHLH讶IHM7H]HFLlH(HX}=MHEAMt$LH^LH5ߠwLH5ZwȠLH5>豠LH5蚠LH56胠LH5]lIALH5M%LH5d6LH5LH5M|LH5wqLH5ڟfLH5tß]ILoH_HEf.A[AI|$IA\f.fA+AI|$IĥE,AAID$HEIAAID$HEIAAID$HEIAAID$HEIAAID$HEIEEtEhE\HENEBHaH$HuM膵HH1ӤHDH8E1.HPHLj1ޝ}tLL1+	}t.H5<L1,Iv LPH5>3L1ELtnu{ǥufAtYHeH軲LHH1諞趲聥u AuH5oL1qLHtHH8踟1ۃ}t#MtLMLۤHH8H5$1Et,D	eLLL11LmDAH5uǺd!H`HHH`L1D躱LHD謡H脝1$D	etdLL蜱yHH8H58H菡H股LLr?HH8H5O1HxH$LLHU1E1E1A1ۅHH;H5j1远H;ZHhH8I$H5ס1蛜HLH;H59Hh1|H;H51kH;H51ZH;H5q
1IH;H518H;H51'H;H5X1H;H5R1H;H5:1H;H5s"1H;H51қH;H5r1H;H531谛H;H5M:1蟛H;H5P1莛H;H51}H;H5P1lH;H5
1[H;H51JH;H5P19H;H51(HpHt"HxHtHĈ[A\A]A^A_]UHAWAVAUATSHhIAHEL-rI}HuHjH81pHIEE11Etn蟙芙A|kEEEE1L-xoEHEHEHEHE1HE1HE1HE1HE1E1E1I}EEE1E1E11HEE1HE11HE1HE1ٻII}HMH1E1qIutb11E<<`<GL}I}LEHzH$HuU1M8IMH1HHEf.DAI\$HL薗HH55HH5BNhHH5QHH5U
:HH5T#IAHH529HH5'HH5֖HH5w迖HH5訖HH5=葖HH5zHH5DMcHH5_LHH5K5yHH5XqHH5cHH56WHH5Keٕ~HEEfAcAID$HEIACAID$HEIA#AID$HEIAAM|$IAAI|$I訛EpAAID$HEIPEGHE<HE1E(EEE
EEHEEHEEL-I}}}LeHuH514HtH;H5m1諕H;H57B1蚕H;H5K1艕H;H5Ї1xH;H5,1gH;H5B1VH;H51EH;H5J14H;H5$1#H;H5J1H;H5O1H;H5b1H;H5J1ߔH;H5J1ΔH;H5R1轔H;H5b1謔H;H5F1蛔H;1H5w1舔E1E1E1E1L$HLDMtLgM]tLWH}HtIHh[A\A]A^A_]L}I}HH$HuU1E1M1IMuFI}L
EHuU1M若HtIL}H臘ILܖMzLeLwILܘMtqH}HH5ΕHHI}H5ݷ11^I}赔EE1LL}jLeLL}HuVI}H5E*11I}iEuHH81輓HH}Ht>H5E$IHu>I}H5E11跒I}E H{H81aILAC|-}H5a
ڛIDH5JÛIHLU}MIAAAu1LEAx1DAwHcA7AA7ALHcA?A\A?HI9uAMLtA<HcA7ALA<7HuHcHDE׉LLLCDE׉LLL,DE׉LLLۥDE׉LLLԥ~A}trLLABEwHH8DcHH]HH8H5}1H;H]E,}tLLU
LL趔EH+H8H51b舎UHAWAVAUATSHxHAHDžxHE
L5I>Hu8cHkIHt!H
H	HǾjWI>11YAA|wHHpE1HEL-RHEHEHEHEHEEEE1HEA1HE1HEA1HEEEEEHE1HE1HE1HE1HE1HEL%I<$Hu1ްHI<$HxLEHuHUoH
I<$HAIH51vI<$Lx}#HŲH$HuDIrHH#HIHcMH]H)LlHxH2} 0I<$H56+Ef.DALcLL'/LH5mHLH5bTLH5)\LH5$ˋdLH5!贋lLH5I蝋tHALH5æ~ LH5g]LH5PTLH5g9KLH5"@ILΗHHEf.fAAH{HUAf.AAH{H%E]AAHCHEH>AxAHCHEHAYAHCHEHA:AHCHEHAAHCHEHHEHEEEHkH$HuDIHH1LI<$H5)1I<$QLɋHHLj1K}tLL1蘟}t9HHH=:Iv0L讒H3
豒A}I<$H5b1OEȃtu*E	Et6LLUE	Et.LL@I<$H5J1bLL	HEH$LLHU1E1E1E1u5I<$H5N1迉HHI<$ALtLPH8H8HH51lHH;H5T&Hp1MH;H5wq1<H;H5G1+H;H5+1H;H5o1	H;H5:1H;H541H;H51ֈH;H5}1ňH;H5D1贈H;H51裈H;H5_1蒈H;H51聈H;H5'1pH;H5Q=1_H;H5z1NH;H5_1=AHxHt6H}Ht(DHx[A\A]A^A_]UHAWAVAUATSHxIA
چHH8Hu?&H.HoHHt!H
hH	HǾjH;11AIHEEEHEEE1HE1HE1HEEEE1HEDMoLH5}荅LH53gvLH5[_'LH5_#H(LH5B1)I_EfLH5ILH5=LH533/LH5̈́(LH5趄4LH5+gHU1EEEf.@AAIIՊEtAdAII赊ETADAIGHE8A,AIGHE AAIGHEf.ILEEIA&HEEEEAAIGHEIEE1HEEEEEE1HE1HE1HEEE1HE譃HI؂HIMtpMtkL}ML5
LlL躂HEH]5AHLlH艂HHHH8IA1MYMtL諄HtHLQHHLj1EH]AHlHcHLj1I>Hu1s}t;I61H]H1Ht IH}vH5YHH1"}DžhIHpHHx}HI>HUH5x1ǂI>H51趂uHhH$H11E1E1覍D<EȃH=H5fL1̌HHD}tLHlD}H]LmH{莇IލXHI~tAǃH58ߺT[HWILeI~HoAH=D}D1E~YEL5E11AtL1HAI9t*عHH#@DuH=8y1苃H=]HEHx L݋AH=su1YE~\DL5
E1E1fCt%L10IAL9t+D๫HH#@DuH=x1H=/̂HEHx(LLAH=6u1ȂE~[DL5|E1E1Ct%L1蠂IAL9t+D๫HH#@DuH=x1jH=<H=]1IH=@H=H=މ1H=މ1
H=dzމ1H=,ρH=PyÁH=跁L5XELeLmH]ȃ}}EЃ};H=aH5bH*AHHHEЃL~LH(PH5]~I>H5+rAH=LH觉L111dHHDhI>H511~I>I>H5)11~ALMH]}E1mALH耓DI>H54]1$~I>|A0I>H5D1~AL=A1aH$LH11E1E1HH]I6E11I>H51}H]H=ZρALmLHH8HH51R}HH;H5HU16}H;H5`e1%}H;H5)1}H;H5_1}H;H5{1|H;H51|H;H51|H;H5k!1|H;H5_1|H;H5J1|H;H51|H;H51{|H;H5^1j|Hx[A\A]A^A_]H=/H5U2H
/ՈH=H562H
趈fDUHSPHӅ*+Eȃ*E
EȈMHzHuH{112zH[]UHAWAVAUATSHIAHDžXHDž`
azHH;Hu8yHyHHUH
H	HǾjyH;1裞8AIEHPEEE1HEHqEHxHpHEHEHhEEEE1HEA1HE1HEEEA1HEEEEEEHhHE1HE1Hp1HxE1HEyL-I}Hu1ܛI}HXL`HpHxgtmwHxIwHwIMtXMtSHhHLlHwHH}E1I}H5p_I}}zE1MMtLyMt,L~HXHu$'11kHXHtxH`HtxHĘ[A\A]A^A_]EIEDuH;oAM}LHvLH5XvLH5[MvLH5vLH5vLH5vLH53mvDuI]Et$LH5IvH]DuLH5*vLH5vDuLH5VuHnLH5-u0LH5uDeLm3LH5Pu=ILPHHE&f.@AAI}I{A=f.AsAI}I{E
APAIEHhIA.AIEHEIAAIEHpIAAIEHxIAAIEHEIiHELmEAFAHlAM}ILH5Qw5tELH5`tLH5tEHA*AM}ILH5_sHMtZLH5sEELmEA|EpEE[EOECHHLj1*sI}H5C1tAtAu(}tAL1̉T}t;L111Ɖ>I}H52E11OtL1諉HXL11覉IHHMt/HtOLlrHQH}ExI}H5E11sI}-ulHHLj1-rLxHÃ}tLu!}tLu }tLL1I1ۃ}tLsMBEHH;H51,sEt"u0}t9H=bLL}}t1LL豈vH;H5"E	Et0LL蝈RE	Et(LL蘈=H}vLL荈"H`H$LLHU1E1E1y1ۅH H;H5A71WrH;}HH8IUH5ow13rHH;H5HP1rH;H5>Z1rH;H5J01qH;H5z1qH;H56k1qH;H51qH;H51qH;H51qH;H5D1qH;H51{qH;H51jqH;H5c1YqH;H5s1HqH;H5uz17qH;H51&qH;H561qH;H5p1qH;H5j1pH;H5j1pH;H51pH;H51pHXHUHAWAVAUATSHIA
woH(H;H1AIEHhEEA1HEEDžtHEHEDž|DžxEDž\DždE1HP1HEDž`1HHmHnHHH
AH	HǾjmH;11HHEEDž`HEHPEDždDž\EDžxDž|HE1HEADžtE1HEmmHmIlHmIMMtvMtqL}L}MLlLlH~0L}MH}оlLlHLuLsrAE1HƷH8foALE1HMtLnMELr811UhHHLj1lL}MDHkHH}оj1kLuH%H8Hu1o}E111YHÉH5EvAH#IHH#HL}LeLhHjLeIL-AM4$A|$vMH
XLDHH
n(HDLH5<H1lLLL1lIHuH}lE1HhE1HesMLhtvH5LjH5ELjL}L>ÅHŵH8H5LL}LkE1L}iH51LL1&vH5/L}H5xHDH81k諁Ht&HHNju訁H]Hߋu詁HhNHH8H5y0E1L12kAHhLL111oHEHHtH}u=`tH}udt
H}11"}tLHu1tp\L5NI>H5!1jH}1I>tuH51ej{HH8H5E11HjAL6A'HH;H5sE11jH;LikA
H5M1iI>Hk}[H}eHpHHEHpHEHoHHEoHHEoHHEoHHEHA=DeE1H]HHuLmLHME1HHIHE1HLHME1HoE1HHu1LmE1HHu1H}nAH}nH)1.De1HEE11HE1HE1HE1HEE1䋅taE@KH=HuHUr+AIEHEIAJMuLH5^fLH5%HhfLH5<QfLH5Q:f]DeI]EgLH5fLH5eLH5XeLH5Ye~LH5geLH5eLH5(FeLH5se)LH5\e-LH5Ee=LH5.e?LH5"eDe]AO'fAAI}IUk2f.@AAI}I%kAAAIEHEAAIEHEE>E5Dž\)ADe]fAIEHEEIEDe]rADe]+AMuILH5fcHHLH5OcLH5:cEPADe]AMuILH5}OscDž`tYLH5VcEpDždEDžtEpEdDžxDž|ADe]AIEHPIDžxH}E11HE1HE1HEH}Huy*xLmL5I61HPH1HtHIH59HH1c|ehAHHHHughHjEtH}Hyx|tVgAHH=H5fH
~CoHH8H51bA[E1SL5sI>H51bI>dA(1HE1HE1HELmH=?fA1HEE1HHcH}gHIHH9HBH}gHIHH9HBH}|gHIHH9HBH}\gHIHH9HBH}I9gHIHcH9CH5kHIH9H]HHuDIHHLuLDM|HHHuDMcH^0HHuDMJHHHuDM1HHLDMH5VH1`H5KHD1`H5H1`H5TjH1`H5OH1`H58H1`H58HDD1y`H57KHDD1b`H5HDD1K`H5H
H1:`H5RH1)`H5HDD1`H5g
H1`H5H1_H5HDD1_H5BHDD1_H5f|H1_H5fH1_H5.H1_H5:aH1~_H57H1m_H5H1\_H5.H1K_H5BH1:_H5H1)_H5H1_H5|H1_H5`H1^H57H1^tMH$H}H11E1E1tHcHZH0E11腰 HDH8H51{^HcLmH}HHH8H5cL1B^HH;H5*Hh1#^H;H5MF1^H;H541^H;H5+1]H;H5J1]H;H5W1]H;H5B,1]H;H51]H;H51]H;H5N51]H;H51y]H;H5W1h]H;H5q1W]H;H5i1F]H;H5д15]H;H51$]H;H5+1]H;H5|1]H;H5D1\H;H5+1\H;H51\H;H5L1\H;H51\H;H5W1\ADHĘ[A\A]A^A_]H=9`E1LmH}bMtLbH}HtbH}HHhtbH}HtbH}HtbMtL\L}LeH\M
f.@UHAWAVAUATSPMIHH5te1[ALLEfALuAAE14HEB(HH5`1f[DIUE9AII9tNDẫHH#ID4ItHH5R1[H5g H1[5E1	A9LuuH5RH1ZC>H5KH1ZH5iH1H[A\A]A^A_]ZUHAWAVAUATSHIA_HXHDžHDžHDžh
SYHH;HQ1}hH
H81ZHE[HH
3HH(AHDžtEHPHEHxDžEHEHxHDžDžDžDžDž<DžDžLDžDžDžDždDžDž,DžDž`Dž(DžpDžDžDžDž$Dž8Dž4DžDžDžDž0HHHEHHHhHEEDž DžE1H1H@1HE1HPHH81XHH1a{E1HE1Hx1HEE11HE1HE11H1H@E1E11HPE1
E1HEE11HE1HE1Hx11H1H@E11HP1HEE1L%ѠI<$1Hx11yIAEHDžAHxHDžDžDžDžDž<DžDžLDžDžDžDždDžDž,DžDž`Dž(DžpDžDžDžDž$Dž8Dž4DžDžDžDž0HHHEHHHhHEEDž DžE1H11HM1HPAIEHKEAMfLHSLH5(5kSLH5oTSI^EoLH5TO5S)LH5eS(LH5S4LH54RCLH52}RnLH5&RrLH5RyLH5&)RLH5}RLH5fRLH5ORLH5&8RLH5!RLH5X
RLH5QLH5TpQ9LH5QLH5ӸQLH5S;QLH5QLH5Q|iQLH5oRQLH5>~;QLH5=$QLH5R
QLH5;PLH5@PLH5*PLH57tPLH5PLH5}PLH5nlPLH5'UPLH5>PLH5Ԅ'PLH5PLH5OLH5OLH5OLH5OLH5jOLH5tOLH5oOLH5|KXOLH56AOLH5}*OLH5OLH5,NLH5NILTHXH)f.fA
AI~IUEEEAzf.A
AI~ITEEA7A
AI~IT EEAxEIIA<
AI~ISTE#A
AI~I0TtAHEI~kREAIEEA`AAIFHEAAIFHx~AxAIFH`AZAIFHEEA?AIFHh'A!AIFHIHEEHE(AAIFHIHEEHE`AAIFHEAAIFHzAtIv1SHPHTAIHP@A6I~I1O^HHC%IH@Hu[OHAH@KA
I~I1^HHCl%IHHuOHAHLXODždEEA&Aw
AIFHIDždUAK
IvHhi+.
A$
IvH<j
A	AIFHEHEHEHEHE,rHEHE\HEHEFHEHE$0HEHEHEHEHEHE<HEHEHEHE0HEHEHEHEHEHEHEHEjHMA4HMȉ8IHEHE3HEHE4HEHE8AKAI~IMHxDž$HEHEpDždHEHEHEHEHEHEoHEHEYDžLJHaH8H561IDžL#HEHE
L%$I<$Hu1mkID}EtI4$1H11{HE1H@DtH]H@/HI<$HH1E1VtLH_t]HUH` HHE}HEtstoI<$H5M]I<$H5[1HE1HEI<$IE1HE1HE1HE1HE1HE1E11Hx
HpHxHHDžP1\GHPHEHHVGLDtLMu*L5XHH}LjKIHu-GMLPL11E1A)MLH]H*MHLL1*MlLDtL1HE=ur`(TDtEHEHIHMHLlHxEHH7KLoGI<$L
(HuU1LMgXHIDt1ۃ`L@HxI<$L
HU1LXH1HEE1HE1HE1HE1HEH]HPI<$H~H5I/Hx1F}I<$H5PL1EI<$HG]I<$H51HE1EE1HEE1HE1HE1HEH5
Hx1EH]E1HE1HE1HE1HE1HEH<HLjCL111!KHLEHHHxHHH]H@(H{H@HnHxcLD}LxLLHILHLALIEI<$H5=1HE1{DI<$IEHP HH5$dWKEHIHPHLLKLHxHHp MLKHxHHp LKMIH@ H81qKIH@ HxHcEHiQVKLxLgKHLHiKHHL%BLD}ԃ`L@Hx1HE$0uWptN1HEI<$DE1HE1HE1HE1HE1HEE11HxH]bH=J"H5ݱH?Z>AHFAHHhHHE8HǾlH$AH3HFE1HE1HEI<$H51HE1cBI<$H5ۉ1QBE1HE1HE1HE1HEE1H5jgH}1BHɋH;L5YIHC1HEL1AH;HuL1AH;HL1AH;HL1AH;HL1AH;HfL1AH;H`L1xAH;H{L1dAH;HL1PAH;HL1<AH;HL1(AH;HL1AH;H5L1AH;HL1@H;HL1@H;HL1@H;HJ$L1@H;H0 L1@H;HL1@H;H~L1t@H;H]L1`@H;HeL1L@H;HɷL18@H;H߇L1$@H;HL1@H;H.L1?H;HKL1?H;H<L1?H;H~#L1?H;H<]L1?H;HwTL1?H;H6L1?H;HL1p?H;HL1\?H;HL1H?H;HL14?H;HL1 ?H;HL1?H;HjL1>H;HL1>H;HL1>H;H+L1>H;HSL1>H;HL1>H;Ha9L1>H;HL1l>H;HL1X>H;HdL1D>H;HdL10>H;HL1>H;HL1>H;HL1=H;H
L1=H;H*sL1=E1HE1HE1HE1HE1E11HxD}LmH]EtH?H01mHLmLeL}Lu@L<L1>L)>H?HxuFH}L@H}C@L[BH}RBH}IFHPMFHVH@H>HH>HHt<EHĘ[A\A]A^A_]I<$	>E1HE1HE1HE1HEH]HHWHj1:HHt
LStL~StL}SMt2L>~&1L@LHeSLz>9|LMt2Lb>~&1L?LH7SL<>9|܃}HcEHiQHL51HE1HE1HELmD}6LRHH}LH[LhAD$D;e9Hht9uL=HH}H59u>H]HH51:LfBHHKNHH51:o9$L1BH1gKEHHþH7JH1IH~IH@H]HLMLCHH5e{KLm9,t79t/9L1QHH}H59,u
LQLQIHN<LmL5~+1L=LLH19L<9|LLQD}LmL5"9u
L8Q9u7L6QH}H5H1A9H}H5ClJ9GH}H5n1	9t:E1(H}H5d18LmAH:A9YDG:HHPAHQ:ILDeD1PH}H5}LH
:18tu'LmLH5SdLmLH57B1Q8LmLH5188H}ȋu'PLH5LH
1
8
uH}H5AH}H5Q179uHL<HIH}H5M17AtIGHp t9u-L4<HRHH}H\?H<Hh9mH]H 9HLPL9LmLH5L17HyNHL8LH5TL16H1NH5g)(@IHPH8HHPNALH5R16LuLPEEIHE1H}H5D1J6؃uH}H5Z1.6I9HHPIGHp0H]H4>H]HH5)15HH515L;CHh90HHhH}LmL=#AtH}H515H]HH51l5HEHHx0HPMAHH5|R1?5HEHPE~iEIHE1H}H515؃uH}H514I9t
HHPAtH}H514H]HH514H}HPLAHH5o14HEHPE~iEIHE1H}H5R1X4؃uH}H5h1<4I9t
HHPAtH}H5>14H}H5.14H}4fHh94u$H]HH5ELmIEH@ H02Hh98uCH]HH5erDLmIEH@ HpHEHH5DD}Hh9H}HXHPH0|KnHXF=H}H5H130r1PHH9ù:
DH}H512Hc0H9|/<Hh9(HL|H8H512H}uGH-|H8LH	zH$H 1L%HHHEHHEt!8HXHE=Hh9`H{H8H5J11HptGHs{H8LHfH$Hpt1LkGHHEH
HEtg7HXHE=
=)=7HX
L}L5HHHu~CH߾AIH)6L2LHf8	HEHH@ H81Y8H	HEHH@ HxH58H	H}HuO8	Lt'H}H~H]H1HHHH}tZL}L?7LPLLL1E1E15LH]H5HLHL5	H}HuHX7>Hh9<HcyH;H5[*1/H;HLH?H$H 1L<EEHZIHxH8H5T11/Atu$5HXA=u5HXH}LHX>HL)4HH]HTpDžp1=c4HXfH}P3HHHuAH3HPHHU1@1thHPIHHDž0HH.IHh9}H}LmLyF~HwH8H5l1-E1L}LH]Ha>LH6DžpH-IIIDH5+ 6Ht!IHt3LHLH6aHwH8H5u}1>-1LHL6Lt.t
HuLH5'L5L1QHHt?H<tL1HH0hSHgvH8H51,L,H3L0MHPHHuD@HD=uHPI/XH}Hu9+H}.H}H3&H}L#3HEHH@ H813HHEHH@ HxHb3HLt'H}D~H]H1DHCH}tWLmL2L0LHuL1E1E10LH]H0HLHL0tBH}HuHX2HP>t(15HtH8H51*HP>HtH8.,HPuL
4&E1HE1HE1HEt^14CHcxHHPIEH@ HxHPCH
"H5HHEH}16*H]ptEH]ytiEH}L42\H];I<$H5^M1HE1)E1HE1HE1HE1HEE1EdH}LGBEH\H8Dž0H0HPLXBH`H=sHPHu3HrH8H5Bm1(EH]SI<$H51HE1(I<$-*H5F1HE1(E1HE1HE1HE1HEE1D}H]#1H]L5(rI>H5]1_(I>)E:HtzH1HE1H^NLH;/H[11HE1HE1HE1HE1HED}H]M=1HE1HE1HE1HE1HPmHaqH8IH58f81HE1HEHP1HE1HEH'qH8IH51['>1HE1HEHP1HE1HE1HEHpH;H5'HpH;H5;1'H;Y(ED}H]LmFHpH82(E8HwpH8H51&E1HEE1HEH5dH6pH8'1HEyHpH8HH5+H=9H5H
-BB2H=H5H
BW2@UHAWAVAUATSPIH>At}tHoH8H5ڭE11%\AL>L-ooI]H'H1H1EMmL>Ic'H5rLDI1m%DH[A\A]A^A_]UHAWAVAUATSHIAEHEr+Ht~HE

$DžhHnH8HpHhHxHuI7#H?#HnHHt+H
ynH	HǾj$#H;11HE1H"H"HHEAHE1HE1HE1HE1HE1HE1HEH#L=mI?LE1HU11I?Hu1FH]HH}lHT"HLuH(HkmH8H52Y1HE1HEHEHEHE1HE1HE1HEfDHEEIAMnLH5ۿ!LI^EgLH5?!]LH5@!tLH5B8{!LH5wd!&LH5M!LH5o6!LH5!LH5?!LH5r 
LH5T LH5(N LH5G LH5 AAIFHEfAAIFHEILEdf.KHEAAAIFHEAAIFHE:HE%HEw:HEy:HE{:HE}:HEH5q3HjHH}j1nLuI71qMuu=:uI?H51 MtILqH5HH1 I?UH5L1 &HIƃ}tO&IHHu&uHhLL9L&L=i:LeLHuj&uHhLLX&I711qIF(p~5N
uuHHI?H5EHH1}HEHXHEH`HXH$L
iH}LHU1E131ۅAE1H}%L%H}HIIE1LH5HUL1)t
}HhH;H571H;H51H;H551H;H5̟1H;H5	1H;H5#1uH;H51dH;H5m1SH;H5,(1BH;H5D11H;H5t1 H;H51::1H;H5;1H;H5;1H}j$E1H}HtH}HtEuHbgH8HĈ[A\A]A^A_]f.@UHSPHӅ*+Eȃ*E
EȈMHzHud!H{11H[]UHAWAVAUATSHHIHE
L%fI<$H91X@lI<$H51I<$H5b1I<$H5w1I<$H5kt1oI<$H5z[1]I<$H51KI<$H519I<$H561'I<$H57::1I<$H51I<$H51I<$H51I<$H5%1I<$H}HtHH[A\A]A^A_]HI$H!H
5eH	HǾjI<$1>1HEL=1HE1HE1HE1HE1HE94HEDMuLLLH5mqLH5ZLH5gC%LH58,ILH5XLH5.LH5jLH5CLH5FLH56H}AA>-Lu.D IEHEIIEHEIIEHEIvIEHEIYF2<222(2H}uI<$Hu1-;I<$LE1HU1&[HcIƺHǾlH]HWHL111`HIL<HHIH]HLlHHH811;I<$H5*kI<$H51#I<$zMWLJI<$VHaHLj1SI4$1hH]HuuI<$H51Ht M,$HhH5|LH1M,$IH5o1L1]Lt.I4$16iHEH$LLHU1E1E1G,uI<$zLLe KHHUHAWAVAUATSHHAfEQHDž@HDž0HH))0ID-H
yzHµHǵHĵH:HfzHHHzHڵH`]HƵHbgh]HrHc_H8HuH\_H81bHH@_H81HE19H_ALeEDžtEDžxHEAEEHEEDž`Dž|EEEEHP1HX1H81Hh1HHELcLH5
LuLH5dLH5LH5Nz	LH5?zYLH5o`LH5J)hLH5hqLH5lQ|LH5:LH5#LH5?LH5ٳLH5cLH5LH5KyLH5LsE}LH5HzLH5#cLH5>LLH5P5LH5xLH5LH5HLH5nLH5KLH5eLH5ELH5n}LH5fLH5OyLH5w8nLH5!mLH5
LH5PLH5wLH5LH5OLH5LH5e~LH5isLH5RhLH5&;]LH5|$ULH5
MLH5ELH5H=LH5s<2LH5O'LH5y%LH5LH5	lLH55ULH55>LH5'LH5ЗLH5
LH5
LH5<
LH5[
LH5Y
LH55
LH5
o
LH5;X
_AAHCHHkf.@AH{HuY\yAH­AXAH{HH
XH
WH9H5?AAH{HnH
oXH
WH9H5~1
IEELALu1aAAHCH81AAHCHHqA}AH{HtEA]AHCHHbA;AH{H2E?AAHCHEAAHCHXtAAHCHPVAAH{HxAAHCHHAyAH{HptzASAHCHEA8AHCHH=Dž`4AAHCHH~E
MMM@MAAHCHH AAHCHhΪªߪuתiϪ]êoGAAH{HjHoAH{H5oHoH
oLoY$@A9EHUEE}EqDž|bթSƩD5M)MMM@#HE#HE#HEE#HE@AAH{HHAfAHCHHkADAHCHHIA"AHCHEAAHCHHDžAAHCHH#mA1HEE1E11HEE118ADžt1EDžxE1EE1HEEDž`Dž|EEEEHP1HX1H81Hh1HHEHQH !H;H5M)IH;H@L0LHU]H5HuH5kH5L(LeD}H=,uHkH1ɸHEлA`HHHMH]H5Hu
HHHPH;L0HxFH$t1L(MH;HMIH52L
@x1MSHH]TI_H;H51HE1wE11E11HEE1AD}AHP=LeMH;H5l1HEL=OI?L@HXH$U1H(II?HHEHyH5jL
U1IoHHH3HMI?H5_L@HDH$U1IXI?HIHH5iL
}U1HIHME1E1H]HNH01YUH}Hu-u)wH}uHNH8H5q1H}Ht'HNHVH5HH]H1H==29$uzH|AE1E1A1HELe]HMH8AE1I?}A1HEHMH81Hģ`tBHhHEHBH?HhHqH}HqHH=AHtwoHv	H5TKHHMrH5H
MH;1KH=H5XH;HޢH51HH]HǾ0}tH=ˢ 1"={uH=@ 1H=HcU̾ H`1 tH=k)1}tH=MH5LH=:}t	,1
*1H=HhHHtH=uHKH8eH=֡yHcuHHuMt/H}HHu(HKH8 AYH=H=pH5.1H=CHtzqHvH5VI1E17HHKrH5HKH;1CH=H5PH;H֠H51H]H=+}tH=Π 1=vuH=@ 1H= H`1 tH=r)1}tH=TH5JH=A}t*,1+H5)1DH;A*1`H=HhHHftH=۟fuHIH8CH=WHHu}HXHuH=cHtoH5|HHt[H111G
IHH=EMt=H51bAE1E11HEE1H]	H=H5[E11"M
HtFHH=c@1HCH=c1{HCHKHHDHHDIH]H=119H=1LH={HXurH=bH5{HtVHH111"	HHHt5H=H5Þ1=H=11LIH]H=1LCL|HPHt^I&kHeHH=H51OH]HUGH8AE1E1>H=MH5(31oHH&H="11H=1HnH=Ht1HSH+H]H=؜HuH:AH=HtLHU~:jMtH=LL_:K}u+H=rH5C>H=gHtH5+&H5HtH=;H='5HF
H=H5`H=H5FH=H5FH=؛H5QHrFH=H5?`HHH=L55LH=uH61HH=P5L{H=<61HHhHt:H]HHbHhHHt:HH?H=ؚH5bSE11=}HH
nHDHG_uL8DH=H5q"iH]DH8H5-L1A*H7DH;H51nH;H]HDH8H5HP1>AHCH8H51AHCH8H51HCH;H51HE1H;H51H;H5,Q1H;H51H;H591H;H51H;H5"1oH;L5AL%[LL1QH;H5׿1@H;H5{%1/H;H5-1H;H51
H;L=	&LL1H;H5q1H;H5h1H;H5@z1H;H51H;H51H;H5V1H;H5Y1H;H5]1nH;H51]H;H5^1LH;H5=1;H;H51*H;H5q1H;H51H;H51H;H5*V1H;H5-H1H;H5"1H;H5z
1H;H5p1H;H5n-1H;H5U1H;H51oH;H51^H;H51MH;H5ľ1<H;H5q1+H;H5Op1H;H5&1	H;H5J?1H;H51H;H5]1H;H51H;H5#1H;H51H;H51H;H51H;H51pH;H5ȏ1_H;H5>1NH;H5f1=H;H5d1,H;H5=::1H;H51H;H5Fo1H;H5L~1H;L%/~LL1H;H51H;LL1H;H5^>1H;H5<51H;H51sAE11E11HEE1H=-HtH}Ht]MtLPHtHcMtLVH@HtH0HH]tH=!YHtH= YHtH=YHtH=HtMtLHtHH=[HtHFDH[A\A]A^A_]H>H8H5L1FIUHAWAVATSIII2LHӓHA$H9HBLHA$LL>A4$LJHHA$H9HBLHeA$LL?A4$LHCHsA$H9HBLHA$LLA4$LHH+A$H9HBLHA$LLfA4$LrHHA$H9HBLHA$LLgA4$L*HkHA$H9HBLHEA$LL
A4$LH#HSA$H9HBLHA$LL
A4$LHۑHA$H9HBLHA$LLF
A4$LRHHA$H9HBLHmA$LLtKA4$LHOHA$H9HBLH)A$LL1Ʌ[A\A^A_]ÐUHAWAVSPH=&tHH[A^A_]ÉsHH=uIƀ=u+L=:I?H51I?11YL,t$HHt$HljL1uH=HtCHp=%u)H0:H;H51gH;11L
H9H8H511f.fUHAWAVSPII1iHt7HIHtH5MH1I7Ht HtA_F1I?@81H=t%IH511H5sL
1ۉH[A^A_]f.UHAWAVAUATSHIAH5@HEHD
HI
HMQIHE=ZuSHDž=uH8H8H5
1H~fDX
yHe8H8@Lu>
HH=V9
HEH=u.H9H]H߾8
H
H߾91
MtLH}L

D1
Iǀ=ju
HgHLIH]HLL	H	LmH:LLo=8u<H]ǃ`H	H598H!H	H5BH=u)H58H]H	H
H߾1	AL=|]LeH]!H=KHu{@=u?LO	LU	wArڹbHD	H11H	LHuȺ?/;O`uRL	H=$L1J;
H=ҳHuH==5HuHEL`L1\1/H tt!u.u1/؅u뵸.uH5LH5@eLH5oLH5zL=C1L=XHH4L]LL=HHcVH9|H5L.H5eL1H}HEHHAB;DAσtZAwH}IHSILXLH5$LH1aDtDuLH5m~H5_~LrH}HuȺ@HHH5E1L1L-E1<:uUD)LH58	AAiǫ*=UUUULH}HBLHE1<:ttBLH޺AH<:u놀=H3H8H5s}LLeA$HH5WPHDL1LHHIHH5\LLH1LLHHyLH1LLHnLH1LHt,HH51qL1LHLH
H5LH5OLXH5LyH5't	H5kLPH5LL1f.fL11_LnuH}оH=H5@1H}MtLlH[A\A]A^A_]A<$/uH5LH5NMHL7x.%=@u6H5|LaH5H5aLFH5ЀH5dL;HtpIŀ=uH0H8H57L1=`A~fLHÃ|VA<}LH5u>HuH5LH5LL1SLVu9A~IH5MLHtH5ťLtHTLH6LHuȺ@~tAL=LHuȺ@Aą~P1A9~HcHMH4D)LL)tH=NL1tA9LpUHAWAVAUATSHIԉH5@2IH=~uRHDž=uH.H8H5.1H~f}yH.H8*H=~Iǀ=HHO/L8jH
cL91d=MtLZLLMLL1=IĀ=ۃu@()ELmL!1LfotfEL#1LmH=L 1HtHL1==(H=pHA
?H8-HHGH
GH=@@1MH,H8H5E113	)IĀ=t0IL'11 L 1=SuHPHLILLLL=E$ALJ`LH5E-H-LH5NH&==u*H-L8H
L91CEHcӸH]ȉHHEHHUL-,L%+LL@LL@L4A}I<$
hLbHcH9cLlffEfpf`fPf@f0f fA}L%+I<$,HI<$A}L%*f.L8HLfD$$H=q+H5gHHE1E1qLHHIH=?H5i1aH=*LL:HH޺:H=H5H1"LHH޺
H=H5hH1L
LH޺HtH=H5|H1LHH=vHH
HDH5׆H1AL%X)tH=?H51aL
110L-*tH=H5i10H~LL11HHšH[HDHH5L1OHL%(GHHH	HEHMH	L!=uLI1H]HtIHuE1}H11fL=u.LJ114H~H(H8H517*A}H(H;tyH;HHHA}tmjoH=}H5d<*H
HcHH=}H51HGHHGHHEHHEH'8H%(H
D'H9t
tD< L5IE
DHfo%jfo-w	11wDHH)f1fɐfAnfAn\ftf`faffftf`faffHH9uffpNffpff~Ht1A<
@HH9uEMIcHDHH~2A\HcI4\0A|
uAIHHD
ą={t&@LIĀ={EAH"w2HOHcHLHH5$A<SuFH\{LHH9*AF<
<
AF<
<
1&fDH=	{H5l1+IcHE)~@I4LDALtHruQHEHEL-%L%$L1L(LH=ik1x= zH5/%LH
8zL19=yH=zH5b12H#H8AH=yH5%#1LIMtL<H=yH51Mt@LLtH=yH521DH[A\A]A^A_]H=XyH5KjBH-#H;H5b1dLHHHhH57HH14H=xH5i11LeD1zDH"H8H5"1=X=A<=:=A1HH={xH5ni1LA=gLmD1DLH=WH5H
ݗUHAWAVSPHIH11_H5(LH1H߾11:H5qLH1H߾11H5ixLH1H߾11H5bYLH1H߾11H5LH1wH߾11H5LH1RH߾11H5pLH1-H߾11\H5gLH1H߾117H5'LH1H߾11H5'LH1H߾11H5XLH1H߾11IH߾+11H5uLLH1H[A^A_]SUHAWAVAUATSHHHILf HE~(tH5&LULIHHHEtWIH1HuHUHMLEHtH]{(tJL1H5HLH1*HH$HEHCHEHCHEH]CEL}LHE1HH11.LHHpHSLeHIHxE11LHHxHHLHH1HEHML}LB1}H}A91@H}uLHƺ5H}9|HUHMLEDMHE@$H]HLHvHuHEHE1RHMLGHEx(t'H5H]HHHuE1E1H5CLAALE11HEgH5LH4H{ H5MALE11HEE1)E11HEE11HE	1HEIH]AHzEH]Ht#H}H}H}HMtLMtLH}HtDHH[A\A]A^A_]E1H]H5tHA5UHAWAVAUATSHIAfEQH5sHHDžffDž\Hþ
rrqqqqHH8HuHH81HH~H8E11I6H5" IHbH5" HCIH5f" HhHHXLmLHHqADž|Dž<EDžEHDžDžHEHH@HEHDždDžHPDžDžDžpEDž,H HH1H0E1HH1HEH]MoLH5`iLH50pRLH5@;LH5^T$LH5<
6LH537LH5<i>LH5BIGHEEt$LH5_ALH5/53LH5Dv%LH5}_LH5sHLH51LH5$LH5eHLH5CLH5WLH5yLH5p
LH5
LH5*yLH5bLH5GFKLH5ѓ4xLH5oLH5iLH5fmLH5UeLH59uLH5NmLH5AeLH5_B|tLH5e{LH5NLH57zLH5I LH5	LH5}LH5DsrLH5gLH56\LH5;QLH5
FLH5Th8LH5Q-LH5S:4LH5#)LH5}LH5 LH5LH5AAIGHnAAIGIHRAcIMfEfu-LABIH1HM$AIEH]EA#AAIIH
H
H9H5י1HEAAIGHEAAI_IEqA|AIGHEKAaAIIE,d/d&DžDžiiH]L}wifiiipikiRiMiDžEmHXoHXqHXrDž<fHXWDžHANAIIPHDžDžpA	AII|AAIGH0AAIGHHDž,AAIGHdAzAIGHFMJM>M2M@&M@MMAAIGH ogAAMoILH5LH5vLH5~LH5OLH5Q.qHP.EA;AIGHE
A AIGH@HPAAIGHHPHPHPE1HH8H5cE11HHt	Mt LLMt LLMt LsLH=eHt*HeHĈ[A\A]A^A_]E1E1HHbbDž<1HEE1HHDž|1H01H1H1H Dž,EDžpDžDž1HPDžDžd1H1HE1H@1H1HE1DžDž1HEDžENyL%
I<$HuPIH@Ht$IHLuI<$H5	FE1LI<$HH01E1tkHHHHuHDHI<$LHH$H΋|1MHuHH@HuOI<$E1I<$H511dE1H@1HEE1g1H@HtHI<$L
U1MHHEHLmu*I<$gE11HEE11HELmI4$1HHu-u)1HuI<$H5/1HHt!M,$H5xLLmH1wH=buB=bbu!QbtTbuMHHH81HCbHX/HHEHMtH}LLHcEHHpHDL}L 1tHcLM1<LhuH})1}tH5H}H HtH}mH]HLeLuLH]HH@E&LHHYtL]uH
H8:LRHcdHHHt;Hh
HHH_L5HL61L4IHEHtuH5}=IHHHH=H5aH1E1E1IHMLLLLmLhHtL!1HtL71HHbHUH}<HHHH5Dž|LH={_U1Y=Z_u<HDžH=V_H5nn10}~fH=^uADŽ$`Lg}=H]1^HEȋ}HpHNH}Ⱦ Hp"tL()H}Ⱦ!1HfoܢfH}Ⱦ#1HͼH|9L 1LH11HEH}Ⱦ'11xtHRHHuHEȀ=]uvADŽ$`H}H5bMH5]H}M=]tJ=]uoL8H$GH
]L91A=j]tE=L]uLH5H
L]L1=*]t=%]u@LA1H}?H/H
\H}@1LHUHLLdHP}H
HcHHIHHu/LL |A-t1LH5o1@L11诺L-ULL xAHhLHEALh|A-tL11VLLVH5LLmH]H8H5b1蔻H5HHHLmL)HL |A-tH߾11輹HTH輻H5(.H]HL ܾHH51HL 軾aHIIHHu芾LL 1LH51觺L0L11L-H0L ALLvHEA|A?.uL0L11跸LOL跺H5LLmuHH8H5׵1H5SL1LLmL 褽PH]HH}H51誹H}L iHALH5|3HuLH5Ht
H}H5KS1SH}L HADLH5h;HP
AdE1Hp1E1Dž DžXEDžH|IH=X1H5)1踸UЋM	DžXDˉMDžHDЉUMD0Mfffffffffpffff f0f@fPf`L`=uLI1LLHuE1L`0LmtL11Ht{thH}LuLH5E
ȹHt\HLxfD$$H=H5XHHE1E1H2E11AHH8H5L1LmH=	WL拕|PtHH8H5Hh1軶Dž|AHP,zHD0tLXE}tZH8H-H;t&AIH;H8tOAIGHHL	pXt_H8HH8t,HHH8H}8tsOHGHHH	Ht(LHLqHHH	p}t(LUHLCHHH	1ۋdHpH1MLu=u.LJ11H~HH8H5"1дLLhtlLHu]LMȃH
HcHDž DžXMADžHLJHHHL4HDDmIcLLHpLEqDA݃lH
MHcHUHp)ЋM11Hp@Ɖu‰U"H
a9HwH:t>MHfH
?H:HHH9t&$H=H
HGHHGHs9H:LHHHpLH;H8HH;H;HHHpH8tH=REH5,H=RH5Lm HcLD0Ic/yÉ A)ĸHNȉHEXNȉXMELH= RH5 1MlEMEpHpBH=QEH51觱MEEEpHpMEAH=xQDžXH51HMEDžHHGHHpGHËMHH
H9t
t&LHw	11ƃHH)f1ffo%fo-fAnfAn\ftf`faffftf`faffHH9uffpNffpff~Ht1A<
@HH9u~DHcH
HH~1A\>HcI4\7A|>
u݃IHHD
HptP LHp1ɀ=OEEpA<RtEE<Q`HH81HpH511LMEE,H=O1HPH51LLL1=L>HUH}<Dž|LLhH5H.HH5HLm1W}1}H]hI<$蓯E1HE(I<$H5TI<$kLEE1LhH]E1
I<$H5"tLE11ɭH;!EH]HbH;H5+L1薭H;LmH]H2H;H5HU1eH;轮Lm[HH;H51<H;蔮H]WHH\H5#H1	LLmLhHH8CH=LH5=1ɬH]LEH^HH5DtH=LH5&H.H8HHH5hHH]Lm1D}1}ERHHWH5H1(H=LH5rHH8H5<1ګLmH]LLE1"L#HOH8H5°L1胫H4H;H571kH;H5?1ZH;H51IH;H5?<18H;H5cHLH
Dž1H;H57<1H;H5@1H;H5Q1H;H51ժH;H531ĪH;H51質H;H51袪H;H51葪H;H5q1耪H;H51oH;H5!1^H;H51MH;H5w$1<H;H5+1+H;H51H;H5Q1	H;H51H;H5?1H;H5}1֩H;H5i1ũH;H51贩H;H51裩H;H51蒩H;H5a1聩H;H5a1pH;H5!Q1_H;H5k21NH;H5	1=H;H5Mi1,H;H5u#1H;H51
H;H51H;H5Li1H;H5ay1רH;H5C1ƨH;H51赨H;H531褨H;H51蓨H;H5[::1xH;H5u1gH;H5B1VH;H51EH;H5z114H;H51#H;H51H;1H51E1H@1HEE1LLmLhtH=GLMtLH}HtHtH诪H@Ht辬]HHmmH=H5XH
f.UHAWAVSPIH1IHnt(H߾11HM AFHH8H51٦1H[A^A_]f.fUHAWAVATSHHHMؾF1~IH5ewH̷H}tNIcE1Hu1HtOIH5FwH蝷HL1@H57H職LYH5܀HhA#H5cHQHuHDmDH[A\A^A_]f.UHAWAVAUATSHIIL6HLmHH5)L1蕥H
ALL5E1!f.fAHԧA9HD@H(HL(LH5DL1HDH~HLLLL1ޤ=DqHDƨLH[VE1E1LmAH55L1葤LHHH5L1lD5iDuLHH@LHL9H5LL1%H蝻HL
H5,LL1H5KL1LnHH]IHF~H5o1L1諣L#~pLL=7L膧HLvL^LL葧LL聧Lƥ9|H5L1/HLmLHHH5QE1L1L=pf.IcHiQHH?H#э)ƒLH5tsߦAAiƫ*=UUUULH6HBL详HE1<:tt$LH޺莦AH<:ujH5h6LfLmLjHHL7HH5vLHH1L}AHH5
	HDL1СLȾHH荾IH蒾H5LLH1蛡Mt.LNHH#H5bBL1pH訦L}LL113HHHH\HDH5PL1-LHLIL=LHtHHH5L1MtLIH5ALL1ȠLнLHսH51L1褠H}Ht趣L11H[A\A]A^A_]UHSPeHHH="1ֺHC8H=+A1迺HC0H=d@1診HCH=1葺HC H=@1zHC(H{8t*H{0t#H{tHK HHDHHDHH[]1H[]f.fUHSP蕪HHH=b1HC8H=k1HC0H=1عHCH==1HC H=F1誹HC(H{8t*H{0t#H{tHK HHDHHDHH[]1H[]f.fUHSPũHHH=R16HC8H=[1HC0H=D1HCH=-1HC H=61ڸHC(H{8t*H{0t#H{tHK HHDHHDHH[]1H[]f.fUHAWAVAUATSH#IA\
͜H==`1:fWf)HDžf)f)f)f)f) f)0f)@f)Pf)`f)pf)f)f)f)f)f)f)Pf)@f)0f) f)f)f)f)L=I?H1YfWf)pf)`H5 HHH5b  HEHH]HDžfWf)f)f)f)f)f)f) f)0f)@f)HEEf)f)f)f)f)f)f)f)pD*pEtExE|E|xtplhd`XPH<\TLD@840,($ 1H`DžDžDžDžEEEDžl1HE1HXE1!DžLuAADSIFHEMfALH5GLH5ZLH5`g7LH5HUחBLH5
eLH5L詗LH5P著'LH5zYLH5mcLH5LLH5͝5LH5LH5MLH5	LH5ٖLH5u–LH5mC論LH5g蔖LH5c}LH5}fLH5+OLH5w8LH5w!LH5{
LH5LH5_ܕ|LH5WŕtLH5讕oLH5%藕dLH5W耕YLH5iQLH5MFRILH57;ALH5˒$HLH5v
"LH5	LH5uaߔLH5ZȔLH5{豔LH5%>蚔LH5w2胔LH5}lLH5c
ULH5/>LH5'LH5#LH5ljLH5LH5˓LH5贓LH5蝓LH5\膓LH5u&oLH5SXLH5LALH5Y*wLH5loLH5_gLH5_LH5
ΒWLH5C跒OLH54<蠒GLH5艒?LH5r7LH5[/LH5;DLH5d-LH5LH5%LH5pdLH5ёLH5Kd躑LH5dž裑LH5a茑xLH5upLH5^hLH5͕G`LH50XLH5VPLH5(HLH5:@LH5RԐDž<DžHDžPDžXDž`DždDžhDžlDžpDžtDžxLuADž|EEEEADžA+II>贜HHXHuI>ݕHHEHxDž8mDžWADžlDDž5HH8AvII61ADžA~II>E`ADžHH<5Dž<DžDž@xDžiDžZDžKDž <Dž$-Dž(DžDDžHDžL蔰H蜰EEDžDžDžDžDž|H`kDž\DžMDž>HH(HH Dž(H`DžDžDžDžEEDž\DžTDžLDžDDž@qDž8bDž4SDž0DDž,5Dž(&Dž$Dž DžDžDžDžDžDžDžDžDž Dž$Dž(Dž,Dž0Dž4Dž8LuADž@DžDDžLDžTDž\'EEEEDž|DžxDžtDžpDžlDžhDždDž`xDžXiDžPZDžHKDž<<_HgIHt~H
H	HǾjSI?1YI?H5N1讋I?.I?H5N1苋I?H苋c.11밋EpEtExE||xtplhd`XPH<\TLD@840,($ EȉEEEEH`]LuLm?HcH腪HEȅHEL8L-EL%D91f.fLXzI}HH8B{<菧8HMȉL1&HH9]L E1L=fIL;m;HEB<H5ީILH{HtLuLmEHH(BXD BD L=%DLL0HwL
ʔHt +eH=\cLD1A +F1":f	M չH$
HmHcH$HfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅH'Hf.CHtHτt
HHHHI?H5LD1YD#HfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅH#H#HCHtHτt
HH(HuH#1
HfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅ
KH
ttHLcHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅIuIfAFIttAII1H2O<H$BXBAHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅL!LCHttHLE1L3H#BXDBDHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅIuIAFIttAII1HBH+"BXDBDAHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅL#Lf.CHttHLE1LCH,!BXDBDHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅHLuHHH
t1Lu}$HfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅHHCHtHτt
HH蘂H$H!fWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅH!HːCHtHτbHHS$HfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅHuHfCHtHτt
HHȀH3 +H1":f	I?H5&bH1~HfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅ
fKH
ttHHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅ
IIސANI
t	MAAIMAI1H蒜IcHHd HMt$`f(^f(^Xf(^MAHL fWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅL LHH
ttE1LjHCHHMt$_f(^f(^Xf(^LuH1L}AHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅuCHttHHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅHHؐHH
tt1H{IcMt6]f(H
@^f(^Xf(^H
H1R{HfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅ
fDKH
ttHHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅ
IIސANI
tMMAAIH1yHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅ
fKH
ttHH	fWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅ
IIސANI
tAAI?MMAI1H蟕IcHHHMMt$Yf(^f(^Xf(^MAHL=ͽfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅLLHH
t4,AI1HnIcHHHLmMt$Xf(^f(^Xf(^AHfWf)f)f)f)f)f)pf)`f)Pf)@f)0f) f)f)f)f)f)ƅƅL"LfHH
tt/*E1LJHHHME1L#HHHMMAbMMAGAp1HXE1DžlLuAE1=
L=PI1趒L5rFHLH1qI蒒HLH1qH=,1TsHRHH1;svHH1)stHH1srHH1spHH1rnHH1rlHH1rIH5$VHH1.qH=1rH=1r(H*H=urH=U1gr
|L
AH
+LDЃLLFH0HDH=(HHI1SARrHE4L5I=FBH=c|V8
<_e<LuLmEL=uff(Sf)f)f)f)f) HH0f<DžLf)HEE1 $(,048<@DHLE
=GLeu!uI?H5a1m
Lm&u"I?H5O1qmI?H5i1`mHYH 1H >1-H`HHfH H `1HhHHH H 1ˎHpH!HH H -	1蚎HxH%HHHH=OHcH=DH0PH=9H=HRHHH߾2H=RH@H=RH8HhHHHHhHڹH HH8HH5'b}jL=IE1L5H$H1貍HH
H5HH+HH+H*H*^
PXP_EЀ=L5I>H5HnnHEH
`DjUWA*^W*MYH
BIIIHH@QF,I>=H5J#H2HEE1QjI>11h趌=Let1H5褌H=1mLuHDmMcAE1{LLH1IE1uIA?uۃ=4LePD1HH"HH
4H5%KH=:hIH=_gI>L=,*HN=
HIE1iI>=
HIE@1iI>=}
HIE1iI>=`
HIE1miI>=C
IEH޺ 1PiI6
pL5L%L=;uL-<:1ALHNHE	iH2H0
pHII(HHH8I=H5H	1hfH5HH1hAD$f.MYH
H9^aMLLHMMHE9hAD$f.*MH
LH9vu^MLLHLHEgAD$f.LH
H9vu^LLLHLHEgAD$f.LcH
H9vu^sLLLH]LHEIgA$f.;LH
]H9^LLt*=
u8H#H8

UJH=wiH5%m11+hHԯH8

=j
/H5,lf@I?H5,1e[EpEtExE||xtplhd`XPH<\TLD@840,($ EȉEEEEH`L=xI?H5H1cwEIf(^^H5.d1ۃtgucH=fH5tj11zeH#H8
=uGHf(^^H5	c6H
׬H9
tH58xcEtgucH=fH5i11dHoH8D
D=uGHf(^^H5Ub6H
#H9
tH5
bteuaH=^eH5i1dHH8
=SuGaGf(^^H5Jb6H
qH9V
VtH5	b}t*=u5H,H81
,N}7H=dH51h117cHH8
=vu#H5_|a}u8aFf(^^H5;Ja1ۃ}tgucH=cH5g11bHBH8W
W=uGEf(^^H5A;`6H
H9
tH5z`}gteuaH=4cH5f1aHH8
=)uG7Ef(^^H5: `6H
GH9l
ltH5_AE1L-HHEE1DfH)BBLH5PD_AIII@B%tSEt>u:E1H=RH5e1`H{H8A=wfH
YH9AZIEHBBLCf(^^H5)?H^;AE1L=6E1:C<
C^H5D^IIHIBptUEt@8E1H=H5d1_HyH8=wfH
YH9\HIC<
B^H5JH]J1L=LuLeI?~^L&]L]H`HtcHhHtcHpHtcHxHtzcHHtfHHtfHHteHHtaHHtaHHtaHHtsaHHtbaHHtQaHHt@aHHt/aH HtaH(Ht
aH0Ht`H8Ht`H@Ht`HHHt`HPHt`HXHt`H`Ht`HHt`HhHtt`HHtc`HpHtR`HHtA`HxHt0`HHt`HHt`HHt_HHt_HHt_HHt_HHt_HHt_HHt_HHt_H Htu_HHtd_H(HtS_HHtB_H0Ht1_HHt _H8Ht_HHt^H@Ht^HHt^HHHt^HHt^HPHt^HHt^HXHt^Hĸ#[A\A]A^A_]fWE1L5L=E1HH1{HH
H5HH+HH+H*H*^
~>X>_EЀ=RL5sI>H5mH=\HEH
?DXUWA*^W*MYHBLPII$HH?F,I>=H5Hr HEE1XI>11Vz=}Let1H5rzyH=1;zLuHDmMcAE1f.D[zLLH1IE15zIA?uۃ=LeA1HHyHH
H5<
HE1L5L1tyHH
H5DeHH+IH+H*H*^
m<X<_EЀ=AL5bI>H5\H,ZHEH
6DVUWA*^WA*YHBLxII*HH<F$I>=H5HaHEE1VI>11}Tsx=lL}t1H5~axhH=1*xDeIcHEE1LeIH*LHZLHuL1IE1!xIA>uL=L}71L5{LwHtH
H52cHH_^H50HߺHE1^L=1L5jHH1)wHH
{HH5i]HH+H
H+H*H*^
 :X<:_EЀ=L5I>H5HWHEH
D7TMWA*^W*YHDH]ؠHH7HH:D$I>=mH5HHEE1SI>11+R!v=H]t.1H5,vH=71uDeMcAE1LeLLfL111E1?]LLLuLH1P]I;uI߃=}&1HHouHH
HH5o!H]UЃL5[L=vH`E1 L5QL1tHHH
1H5"HH+IH+H*H*^
7X7_EЀ=L5ћI>H5˪HUHEH
DQUWA*^W*MYHBIIHhHi8F,I>=+H5s
HHEE1zQI>11Os=Let1H5sH=1sDmMcAE1Lu{ULLH1IE1sIA?uۃ=dLeSt1L5LRsHH
dH5UN<L%tL@1HPH1rHGH
0H5!HH+HH+WH*WH*^
5X5_EЀ=L5ʙI>H5ĨHSHEH
>DOUWA*^W*MYHH]ؘHHHH_6D,I>=!H5iHHEE1pOI>11Mq=H]t1H5qH=1qDmIcA$E1LufDLHLqIA<$u=`Tt1HHRqHH
dH5UO@L%tLp1HPH1pHGH
0H5!HH+HH+WH*WH*^
3X3_EЀ=L5ʗI>H5ĦHQHEH
FDMUWA*^W*MYHH]HHHH_4D,I>=!H5iHHEE1pMI>11Ko=H]t1H5oH=1oDmIcA$E1LufDLHLoIA<$u=`Tt1HHRoHH
dH5UOL=tHE1L5OL1nHFH
/H5 HH+IH+H*H*^
1X1_EЀ=L5ϕI>H5ɤHOHEH
DKUWA*^W*MYHBIIHnHg2F,I>=)H5qHHEE1xKI>11Im=Let1H5mH=1mDmMcAE1Luf.DmLLH1IE1mIA?uۃ=TLeEd1L5LBmHH
TH5E@ML=aH1L%=L1lH4H
H5HH+I$H+WH*WH*^
/X/_EЀ=L%I<$H5HMHEH
DIUWA*^WA*YHHMHHHYHJ0HMD4I<$=H5OHHEE1VII<$11Gk=t1H5kH=1ukAE1LeHLLLkIA?u=NUb1L%L@kHH
RH5CPL5b1HEH1jH<H
%HH5MH]D}HH+H
H+H*H*^
-X-_EЀ=L%I<$H5HKHEH
DGUWA*^WA*YH@HH'HfHO.D<I<$=H5XHHEE1_GI<$11Ei=H]t1H5iH=1ziD}IcAE1LeMLf.LLHHMAiIA?u؃=10E1HH#iHH
5HH5#+MH?E1L5!L1hHH
LH5DuHH+H
H+H*H*^
+X+_EЀ=yI?H5HkIHEH
DEUWA*^WA*YHLuBhII6HTH5,F$I?=H5?H
HEE1FEI?11Cg=Lut1H5gH=1bgDeMcE1IH]L@HHLHL0MjHPgHIA>uL=L=@+1L5LfHH
LH5& LL5E1HH1fHH
H5ML}DeHH+HH+H*H*^
x)X)_EЀ=LHmH;H5gH7GHEH
DCUWA*^WA*YHBIIH\H*F$H;=H5HiHEE1CH;11A{e=tL}t1H5iepH=12eDeIcAE1LeMLLLHHHMAeIA?u؃==1HHdHH
H58$L5E1HH1udHH
H5ML}DeHH+HH+H*H*^
g'X'_EЀ=;H\H;H5VH&EHEH
D~AUWA*^WA*YHBIIHSH'F$H;=H5HX	HEE1AH;11t?jc=cL}tw1H5uXc_H=1!cDeIcAE1LeMLfLLHH@MAcIA?u؃=>1HHbH|H
H59(L5E1HH1ebHH
H5ML}DeHH+HH+H*H*^
W%Xs%_EЀ=+HLH;H5FHCHEH
Dn?UWA*^WA*YHzBIIHKH%F$H;=H5HHHEE1>H;11d=Za=SL}tg1H5eHaOH=p1aDeIcAE1LeMLfLLHH8MAaIA?u؃=Ѻ>1HsH`HlH
H59D
L5E1HH1U`HH
H5DeHH+HH+H*H*^
N#Xj#_EЀ="HCH;H5=H
AHEH
ǺDe=UWA*^WA*YHqBII'HzH#F$H;=H5H?HEE1<H;11[;Q_=JL}t^1H5\?_FH=g1_DeIcHEAE1LeL}LLLLHUHHMA_I;uIރ=L}71H\H^HUH
H52HL5ΆE1HH1>^HH
H5DeHH+HH+H*H*^
7!XS!_EЀ=H,H;H5&H>HEH
DN;UWA*^WA*YHZBII0HkH!F$H;=H5H(HEE1:H;11D9:]=3L}tG1H5E(]/H=P1\DeIcHEAE1LeL}LLf.LLHUH@MA]I;uIރ=L}.1H<H\H5H
H5)LL5E1_HH1\HH
pH5aDeHH+HH+H*H*^
X3_EЀ=HH;H5H<HEH
D.9UWA*^WA*YH:B8II0HSHF$H;=fH5HHEE18H;11$7[=L}t'1H5%[H=01ZDeIcHEAE1LeL}LLf.LLHUH8MAa[I;uIރ=~L}.1HHlZHH
~H5o)L5E1?HpH1YHgH
PH5AML}DeHH+HH+H*H*^
X_EЀ=HH;H5ߏH:HEH
D7UWA*^WA*YHBII"HH}F$H;=?H5HHEE16H;114X=L}t1H5XH=	1XDeIcAE1LeMLf.LLHHhMARYIA?u؃=a5u1HHSXHH
eH5V0L5uE1&HWH1WHNH
7H5(ML}DeHH+HH+H*H*^
X_EЀ=H~H;H5ƍH8HEH
D4UWA*^WA*YHBIIHHdF$H;=&H5nHHEE1u4H;112V=ӰL}t1H5VH=1VDeIcAE1LeMLfLLHHhMARWIA?u؃=Q>e1HHCVHH
UH5F9L5e~E1HGH1UH>H
'H5ML}DeHH+HH+H*H*^
X_EЀ=H|H;H5H6HEH
D2UWA*^WA*YHB0IIHHTF$H;=H5^HHEE1e2H;110T=îL}t1H5TH=1TDeIcAE1LeMLfLLHH MARUIA?u؃=A>U1HH3THH
EH569L5U|E1H7H1SH.H
H5ML}DeHH+HH+H*H*^
X_EЀ=HzH;H5Hv4HEH
D0UWA*^WA*YHBXIIHHDF$H;=H5NHHEE1U0H;11.R=L}t1H5RH=1qRDeIcAE1LeMLfLLHH8MARSIA?u؃=1>E1HH#RHH
5H5&98LeLXL5:z1LX1H5tQHpH+H
ZH+
H*H*^
X_LeLXH]UЀ=nHxH8H5HY2HEH
Df(°.UWA*^HUW*YHpHHMH]A?:HH
D$HwH;=H5H
eHEH¹E1.H;11~,tPHHQltHL1H
LqQHL1H
LdQH19=tf+1H5)PDAltfE1H]L`L%4xAǐHHLHEQIA<$umH=1ODAluE1H]L`L=wAf.HHLHEPIA?uރltHHuH`PHHuH`PLeL5ZwLX=t21HHNHH
HH56LL%L1NHH
LIH5H]HH+H
H+H*H*^
X_EHOUMA<$X7HH
ZD$HGuH;=H5]H
HEH¹E1a+H;11)M=t1H5MH=1MIcHEAE1H]L}ML0f.@HHuL1ME1yMIA<$uM=4bGH=x1	MHrH+[H
\H+
E]H}$6E1LmAAAGAAMcBtN`rHu$LLPM,NH=BHsH;=xH5HHEUH
XLA
1)H;11'(
L=tA.1H5,L?H.sH;H5?I1e)H;*H=
1KHt1f.DrHu$HMLPMMtHHHs8u˃=dt]|1L-
LZKHH
lH5][HdrH;H5H1(H;)=uL-OL1JHFH
/H5 HH+IMH+H*H*^

X
_EHqH8=H5HHEHڋMа'WH*M^LHH
uLmDPrHu$LMKHBL-JqI}=H5G
HHEUH
LbA
1W'I}11%
I=tT1H5IRL%pI<$H5q1'I<$Y(BDŽH}wH=19IHqE1fDPrHu$HMMJ~HIH`q8u˃=t`1L%LHHH
H5^L%oI<$H51*&I<$'A=uL%L1jHHH
H5HH+I$H+H*H*^
fX_EHboH8=0H5ǖHnHELMа%WI*M^LHH
LLmHHJ<IL)11H}1>tH=@BIE1AAAGAA	McB|tNtHuLLMHH
BHBnH;=H5@
HHEUH
 LA
1P$H;11"
F=tA1H5F?HmH;H51#H;U%H=1FFHn1tHuHMLMGtHHHpn8u˃=t]1L-LEHH
H5[HmH;H51;#H;$=uL-L1}EHH
H5HH+IMH+H*H*^
yX_EHulH8=CH5%HHEHڋMа"WH*M^LHH
eLmDtHuLMFHmBL-kI}=H5HRHEUH
LPA
1!I}11e 
[D=TtQl1H5jMDOL%lkI<$H51!I<$"BDHH=;1CHElE1f.fDtHuHMME~HIHl8u˃=t`1L%:LCH3H
H5^L%jI<$H51 I<$!"A=4uKL%|L1
CHsH
\H5MHH+I$H+H*H*^
X"_EHjH8=H5HHELMа! WI*M^LHH
LLmHHEJ<IL)1N,=u0D+9L-jtH=@CwE12HCiH;H5W1zH; AD$AAMcBtHB<9JHtIH1CL%1HuHLTMCHpBHhH;=kH5HHEUH
LoA
1H;11
A=	tA!1H5A?H!hH;H5L1XH;xH=1@AE11HuHLTMBtGHA}uЃ=ita1H5b@HH
tHH5^_HegH;H5.1H;=uH=P1?HJH
3H4H5HH+H
H+H*H*^
X_EHfH8=H5SHHEHڋMаWH*M^LHH
DT1HuHMMAHBL-JfI}=H5GHHEUH
LLomA
1WI}11
>=tR1H5>PL5eI>H5)	1I>[BDŽHsyH=1;>HfE1f.DT1HuHM/@uHIH_f8uʃ=t^1L5L=HH
H5\L5dI>H51*I>A=uL5L1k=HH
H5HH+IH+H*H*^
hX_EHddH8=2H5dH3HELMаWI*M^LHH
LL-7eHAAEpEtExE||xtplhd`XPH<\TLD@840,($ EȉEEEEH`H51r3EpEtExE||xtplhd`XPH<\TLD@840,($ EȉEEEEH`L=_`I?IH5
1߲HJ<I<L)1"=Iu:/tH=1@: L5xL-*1HMf.AHcكptHMH:D<D0IH`D{0H]HLMILHLlLLYLLHHB=|HI1AL9H`LHLI9ALeL9H@LHLI91A9MIuVE~Q`:@Eȃu8Ar2D
_
?8uHqH9Hr18u HV^H;H51H;HHMЋH(^H;=H5&HHEUH
LA
16H;11
6=L-^LtJ1H56HH]H;1H;7H]HMrWH=x16AEE1Luf.L88H`HHLM08IHE^8uЃ=ُt21HH5HxH
HH5Ϲ0HH1}5HH
ϺHH5H=\L5&H]HH+H
H+H*H*^
eX_EH?=6H5ںHW{HELMWI*M^HIL-W+HtH<H<H)1=u6De=BEpEtExE||xtplhd`XPH<\TLD@840,($ EȉEEEEH`L=	ZI?H5F錬EpEtExE||xtplhd`XPH<\TLD@840,($ EȉEEEEH`L=9XI?H5<鼪H+XHH=kO

xEpEtExE||xtplhd`XPH<\TLD@840,($ EȉEEEEH`L=?VI?H51vI?L5L1bI?H531QI?H5C1@I?H51/I?H51I?H5|1
I?H5&1I?H51I?H5|1I?H51I?L1I?H5{j1I?H5"1I?H5W1I?L1|I?H5d1kI?H54j1ZI?H5-1II?H5N18I?L1+I?H5L1I?H5e1	I?H51
I?H51
I?H5_s1
I?H51
I?H5$*1
I?H5{1
I?H51
I?H5T1
I?H51p
I?H581_
I?H51N
I?H5r1=
I?H5`1,
I?H581
I?L1
I?L1
I?H5N1	I?H5G1	I?H5y1	I?H541	I?H51	I?H51	I?H55)֥HESHH=fUHH5KH$T]f.fUHH9s1]H]-UHAWAVAUATSH( IA
H/HQHְHӰHذHŰHH}HjHH]HRH8uHRH81
	H
QH^'HHRHREAbEEIA<M}LH5'xSkI]Et$LH53tLH5 `LH5C	XLH5tLH5LH5LH56LH5+LH59LH5hLH56QLH56:LH5#LH5"5AAI}I	ÃAAIEIHELBF3AAI}In	H
oPH
OH9H5j1ALAIEIHĭA-AIEIHeAAIEIHCAAIEIHq!AAIEIH7AAI}IH=MH=HNH8H51EѬ$$HHmNH8H5	L1E=}H=H=H51H=ץfH=ZH=mcNH=m;BH=6H=*H=H=1+AH=ޫHt$HɫDH( [A\A]A^A_]}-H=HAHtHǾ=quH=` 1H=HH5QH=5H5FHG"@5EH=H5/H0ktH=kuHLH8HH=u8H="H˪Hu HLHH=VȪ5H=E11H1HcHH=9'1H]H9H='+m*f)E#WH*f(U^fWf(Xf(fU
fTfVf)M1WA*f(E^HH=D1TH+EHc
	HHDHH eHH_LE1fDH߾HK!ǾH7!H߾11rHAL=JI7>	I?H>1H9E16HHH
HZ LH1	LHLf.DHL  HHt=t=u3'2t*	1H=
HH12$H=1AHHH
HIH	L L1LHL#HL 0H߾HgǾHSE11Lc-|IH=z<HQH=Z#1I9H=N#C+-*f)E WH*f(]^fWf(Xf(fUhfTfVWA*^HH=D1%L)Hc
{HHDHH wHHqHHHH=-L=GLE1f.fH߾CHǾOHPH߾11rHAI7I?m1FI9HHH
Hl LH16L>HLHL (HOHt=t=u3G2=t3*)1H=	E1HH1AHf.UHAWAVAUATSHIt!HHZIH
yHǾd1Mt
L=MH=1ILLLKL#!ÉLuL5EL=ZLPfI>L1LW)P)`)p)E)E)E)E)EHcȍxHHH	PL11E1vL~ ÉuuLuЅSHEH;H51QHFHc8HHt>ZH5YHH1&MuLiE1LHĈ[A\A]A^A_]HYMuUHAVSHD7ANπCw@HHcH[A^]ø[A^]ø[A^]ø[A^]H5gHtOH5Ht<H5Ht)H5HtA Aet1[A^]ø[A^]f.@UHAWAVSPAIH/HpHHDIcLH[A^A_]UHAWAVAUATSHIHIHGt	DIAD$H5ZnI$HVAD$LHOHs1A1I4$HI4$HDI4$HDI4$HDHH9uH!f.I4$HHHuE1LMIHL)CHHr< tbLuMct$M9HuHUI<$B4L¹HDAI$Et$IcI9HULH}DJIGH9tlAHItI4$HHIuH@I4$HI4$HDI4$HDI4$HDHH9I$J<"t<'u I$JLuАKHt48u.LuЍHr"ft4< CHHICHtHD:I$IH[A\A]A^A_]1UH]DUHAWAVSPIIHH11HH5kLLHHL?H11HH5LLHH5LH1H[A^A_]fUHH=HH5RHH=H5lH=H5H=}H561]f.UHSPHrHzHH[]f.DUHAVSHIH[tGL_Ht:Hbw*LBHHt:tLHJ[A^]HCLH[A^]UHAVSHIHt<LHt/HwLHHt8t
[A^]vHLH[A^]fUHSPHRHHH[]f.DUHH=HtH]f.@UHAWAVAUATSH(A։IE1Ht-L9MtBL?IA9DOIcLLH]E1H=?Hu"H]LyH=f!HHH5HLIźH߾1E1	HEDxHLmLLeLAEAEtYELuAx?H5CH}Ⱥ-IHEH$HLLAEAEL}yCLuE1EL}/HAąyH߾11E1=uMtDLLExH}I_At2E1AuPL5p<I>H5~E11I>LuHG<H8H5QE11{DH}/HLoDH([A\A]A^A_]f.UHAWAVAUATSPLEIHIIE1Ht;HtLH1҅D,MtLLjI$Hu31MuMtI$HtLHD8HMHHu1HEHtHH[A\A]A^A_]@UHAWAVSHAHIH52HH5Ht|EH=HHiAtH=bHRH
aHtHHHHHHt|HnIAH5|IHBt`H5H*tzH5*HH5H5AE1L1/H5vHH5/mH[HHiHH5HHPxp1cH4Ht[BH*H5HkHH	H}9H81[HHH^H5'0H5E1LH1ULH[A^A_]@UHAWAVAUATSPHIHH1HdIHHHZIHpAv1LIHPHxHt7L49|BA5H5E1LL1IUIMH5IWE1L1lDH[A\A]A^A_]f.UHAWAVAUATSH(MAIHHEHE~HIHt[H]MtoLlLpHH5E1H]HLL1H%HEHvXHE1HEHY;L5w7I>11ILj1AAwHJcHE1L1CH5KE1H]HL1(HEHH7E1L11HEH]HeIH-1(LRHcIwL(vÅyH=^HEH$E1H]HLL1E1E1HEHuH5#H1JHH}HtMtLMtLZHEH([A\A]A^A_]MgLeLcHu1LHEHt9HHHtHpHtHcH=t(H5H}1H]HEHY;LemHCH}HuLIHEHtHHHMH@f.@UHAWAVAUATSH(MLEIHIH1HtWILuLmH]L-HL1uL11tFHMLLHUE1LH5tLH1H([A\A]A^A_]MuL%5LL1HMAԅH}x3=
Ƅ
LLFhH5
H}H5ϒHU1/Zf.UHAWAVAUATSH(AAHILeHELEHuHt`AueMH4HMLHHEHH5:LL1LHEHAtPEtKHHtBIHuGEtBL5A3I>11ILj10H5iLLlHH~^AEH
4HcHLLHHMEHEH59L1HEHH5LHUH1LdL1HETH59L1cAH2HML1HE&H$H
2LELMLLHULLeHEHu H5LL1LOHEH([A\A]A^A_]f.fUHAWAVAUATSH(DEHMHUII(HIHME1A(HtxIcHsL()AŅtyH5#LHUHM17@HCHEIcE1}AHu11rHtIHBLLgH-L%E1LH([A\A]A^A_]UHAWAVAUATSHAIILeLEHuHt6Au:MHHMLL
HH^CAtNtJHHtDIMuMtIH&0H;11HLj17H5LlLeLeLlLgH~JAEwqH
6HcHLLLHMEtHc/H8H561nH51LHUL1~L9L1*H561L1UH/HML1HLLeHuH51LL1HH[A\A]A^A_]fUHAWAVAUATSHMAHIHMHu6H>IHHLlH$HAHIH.1HML1IH9MH52/Lf.L9}LH0HtILIEH-HLj1aAFH5ߤLL1H5ѓLLH1LH5fE1L1LMtL	LH[A\A]A^A_]1f.@UHH%]fUHAWAVAUATSH(HUH}HH
IHHEHHE1E#fELN9LL`A$<+t <-u IAHEH0HIE1HEH0HtLufLXtI6IHusIFHHuH#HINHHH!H	EHEHG1EH5,LEH([A\A]A^A_]@UHHU&]f.DUHAVSHIH5+Ht/H5/Ht H5cH~1t[A^]1A[A^]@UHAWAVAUATSHAHkHbAօWHHIHA$E1ALmLDHEHIHHƺFAf.HDIHDLHL_AǃuHHuȺvtwALmLA9YA]ALA9}KLD$IHHHƺuHLuE1E1LmH5%*LDH[A\A]A^A_]UHAWAVATSIIIHtLD%1H=MtB=uH5sLLLL|H5zsL[A\A^A_]L119HLHkH5IsL\H[A\A^A_]f.fUHAWAVATSIIIHHHHHMt+HǾLE1u&H5LLZHǾ1E1HHHt5MtFHǾLE1uAH5]LL11H1H[A\A^A_]ùHǾ1E1Dof.UHAWAVATSH\AHIH5HTH4IHEtL1LE1H
H57L1E1ALLH5{LH1<LH5TE1L1H=3Ht>IH5NHH1itH5G<L11R"LbH5nE1LH1L$H5L1LL E1L[A\A^A_]ÐUHAWAVSPHIHu
H$&HAHt1H11H5L1 LxE1DH[A^A_]UHAWAVSPqIHHH
H5}ߺb<IHt2LLHH5LHH5LHLH[A^A_]@UHH(Hv(]f.@UHAWAVAUATSHI׉IHIHHtxIƺHǾlLH~qHLLL1HHH$H8H52111HZ$H81HHt%H߾@11-tHLnHuH
$H8H51AMt/Ht*M'L-H#H8H51L1
LLMHH[A\A]A^A_]L01f.fUHAWAVATSIHIHu
IHtBE1L@11VtMtLLHtAHu
LE1D[A\A^A_]fUHAWAVAUATSHIIHIIHt7HD=}+HHLI1<A~H"H8H511HLHHtbIHHǾlH1L1}Ht?ILHH5xlLMt?M>+H!H817H!H8H5|1LLLGH[A\A]A^A_]L&1fUHAWAVAUATSHIIIILHDLD9M=| H7!H8H5mE11kHkHHLM1#LLHLM1HLx>LLyFH H8H5fE1LL1H=`%08t
E18uHL}AxDH[A\A]A^A_]H? H8H5E1HL1iH=G`LL"UHAWAVAUATSHIIHHEHIźHǾlLHhLHIH
HHL11IHUHH~\H5^wHttHLxMA$MHH811HUHHH8H5FH1Mu'-HHH=MtLEL1oMtdH4L1]HtHǾkL5LE1LH8H8H51L1jLBHH[A\A]A^A_]f.UHHt$ЃIw1HHcH]É]f.DUHAVSHHH
LE11tXA;tuH{HH
LuNHPH8HCHP HH(L@0H5~E1!H*H8HCHP HH(L@0H51QD[A^]fUHHH@0Ht]UHHH@0HHvHf.~0Hvt]pUHH19V]f.DUHH(]fUHH(Hv(].f.@UHAWAVAUATSHIIIHHt?ILFHL;=|7HH8H5)E11'HH8sE1LeHH,E1L1HHLM1H̿HHLM1LlHHHEHpL~nLHHúHǾlHH~nHEЃ8HH%HDH5`H1HADH[A\A]A^A_]L7HH8H5E1L'HHsH8H5E1H1f.@UHAWAVAUATSHIII^ILSHDLED9M=| HH8H5-E11+HHKL1HHHLM1L=HLLM1LLLLM1LLHLM1eHLfxHLL7HyTH
H8H5E1LL1;H=Ye8HtTE18HLHHxAHLyIHH8H53E1HL1H=X8t
E18uHHGAxHDH[A\A]A^A_]H	H8H5~E1HL13H=XwKHH8H5~E1HH1H=WDLHHLLL]f.Ht%UHSPHHHtHH[]DUHAWAVAUATSH(UHuI`HHL5&oLHEHHIILHLIljLHIDLeLgIMMH	MA}/AA}iI}1LHIHHH(f.fA]oIYHHA]\tڄ,I=uAA}HHAM+IHHAM\tބt"I/t+uAD	ADH@A}5IH~H8H5IHhH8H5zf11HMtLMtLMtL~1MMtLlHH([A\A]A^A_]IHH7L>L6L.1LHIHHHYHHA]\tI=A]IAA}HHAMIHHAM\tڄt/uIADH@A}:HUIHtAHHEЅHEE1fIHH8H5S11	gI
1[IHH8H5}9HH8K1IL9etSK<H5ӛtKL9H5tC$H߉HUAA:uLeLe.@UHAWAVAUATSH(LEIHUIH}L/I]M}H5HLeLmH5QYHH5H}H57HfH5mYHOH5.H8H5s!H!H5ZH
H5HH5HH5pHE1A@MH]t&L1IHuH5bLL1E1HEHAE1E1;HEH8@HuHHEH8HMtLEH]uHEH8LEHEH8DMt:LH]xAH3AGAAH]E1"AnH5]&E1L1HEHAE1E1;HEH8uTH]\AAAA AE1E1E1H]Ѓ;HEH8HH]t(HEHHMHHHAHt
H+EH)DH([A\A]A^A_]UHAWAVATSIHAHuHH8E11HLXIL]HzHgHDH5~H1L@H5UHH>L6H5HH$Et	[A\A^A_]H[A\A^A_]fDUHAWAVSPIHIH51OMZH5dYLwL01DLLHƺL{9|H[A^A_]H5LH[A^A_]UHAWAVAUATSHIAHHLALAH}HHH޺vH'H8H5BDH1XEuPHHIcaH5lHDH1*HE1D98AƸMH
AH
H
HcHH;H5	K1H;IHH@ H0&H;H5k1H;IHH@ HpH;H5W1v7ILHLQH;H5}L1=H;H5ED1)DH[A\A]A^A_]@UHAWAVSPHtaIHI~RMIEALH޺~DLu^HnH8H5{kE11AA9L=II?H5L=6I?H5bE1H1gI?DH[A^A_]ÐUHAWAVSPAHt}IH~8HL~<HuSHH8H5jE116HH;H5>LHH;H5`rE11H;DH[A^A_]UHAWAVAUATSHMωMIAHHtRIAtAu=L<$H5KL<$H5lLHLDEM1BLLDLH[A\A]A^A_]fUHAWAVATS H}H
HDHHD@u)A@uL@tE[A\A^A_]Hn
L0H5>LHH1[A\A^A_]@HHHDH*
L8DIDH5LHLI1[A\A^A_]:H	L0;H5xH	L0 H5)]@UHAWAVAUATSPMHMЉЅH
QHHDLeL~{H
(~0tQtvLMЁH
(u7bLMЁjH
xu9H
xt-(LL/H
I(uMCHEHHH5GHMAHELzH
HHH5HcHHLIHE@ffHH5HIugH]Њ<H5dH=5HD<L}'LECL3H5HsH5HcHHqLMLHH5LM1ARSHMRHyLrHH5ILLE11SAR'LayHIHH5 H
LE11APS舽HnHHL%yH5LLM1ARSLLL|LL4fL{L7_LlLGL]L2LNLWL?L)vL0L{GL!HuH	HvHH7HH(HcHHH#HHH)|HsH>jHʰaH WXHOH3FHŽ=Hl4HCu+H"HHHHH5%LM1SAR蔻HH5FlL1L-tHGE1(fHEB8LH1JIM9tMtDHuLL1$H5@OL1L11H[A\A]A^A_]rfUHAWAVSPLEIAЃ#w#H
3DHHcHH
#XAu	H
FH
=H
LE4H
U+H
?k"H
H
H
@,H
HHEHDH5HE12HLDH߾11H[A^A_]鉸fUHAWAVATSHpIIHL%A<$u!H=	A$HE1HMHǾ.1H5pHteHËẺEfC۽HMH$H5\LeAHǺHMHG]LLHAA.HH8H5T|HH8H5ǭE11DHp[A\A^A_]f.UHAWAVATSHpH8AIE1HMHǾ.1H5eHtdHËẺEfCмHMH$H5QLMAHǺHH?D9}uDH}LztE1 HH8H5J{1ADHp[A\A^A_]UHAWAVSHAωHIHuHtlW)EEff]ҋEEԿAuLtvEHMǾAEy#H=YY13Ãt(HuЉߺtAH[A^A_]H=zH=\>1f.UHAVSHIHHMLELMH5gHU1uBE=w%MsUwuH.H8H5OuHHtDfxuPHHH		AHHH	IANHHH	IANH@H@AF-HH8H5HH8H511H[A^]AANAVAvUHAWAVAUATSH(MIIAW)EfEf}EuÃuÃEHMԉ߾AHuߺAu߾MtA]A!L-z]f.Wf]ELHUu8tAH=7]dHtdIH8txH5pH%I}H}IGHPLHu7LHxt HH8H5u1E1LDLALAHtDWD_E1LAׅyAʼn߾5HoL0H5%L1DH=طE11H=l跷1E1DH([A\A]A^A_]H=xHH8H5HH8H5:1f.fUHAWAVAUATSPIIII:lHtZHMtLLt]HMtM'HuH5HvHt6@ffAA@H.H8H5Z$E11b#E1HH8H5E1H1=DH[A\A]A^A_]f.UHAWAVSPII{uH5*LHt@ffAH[A^A_]HH8H5h1L1踱fDUHAWAVAUATSHIL=ZMtH5)ZL<=L%U[M9LIGMtH5ZL
L5[L9HIGHEMtH5[LԱH=\HEHtH5[L許H\LHLIHMH襰H1M9L9HFHEH9EHFHiبL5YI<HuAEAMB3B3H[H[J3V1
E1?H
\[HH
Q[HiHXL,IŀH
)[HLH[A\A]A^A_]UHAWAVATSHAIHHtHH߅~"Z9HHHtHu	t ZADH[A\A^A_]E1EuH5nE1L1H5!L1	H5EL1HuH5opE1L1߮H5(L1ήf.fUHAWAVATSIE1f.HIƄtSMIA\$:tIA\$uAD$A?tLYLHfI|YL[A\A^A_]UHiY]UHAVSH1ۀ=MYuK@YuBIHuH HHtuH5)w1L1謭H[A^]UHAWAVAUATSHHA
jL=I?u1踫HIHtH
H	HǾj謫E1AAASEEAEEEEfDAIM9,N,LH5JtLH5>7LH5S/ LH52	LH5A~LH5۪twLH5bȪEAEEEE-fEEEEEEEEEEEDut$H1HH脭}tHl}tHT}H=m1\HHH1C~HH11|HH1zHH1
HH1HH1
EtH訬1ۃ}tH莬H[A\A]A^A_]H=_}H5H1腬}HH8H51.UHAWAVAUATSHXIA
HH8u8HHPH
HHtH
H	HǾj5AE1HEEEHE1HE1HEEEf.I\$HH5ܧHH5ŧHH5@~讧HH5E藧Mt$E}HH5wHH59`HH5IHH52dAuAID$HEf.@AKAI|$IdEaf.fAAI|$I4E4AAID$HEAAID$HEIEMEMAu_EԃEHEߋEԃEԉEыEԃEԉE1HEEE1HE1HEEE1HE菦ʥHҥHHHMHH߾lI败HDeDmEăH=H5H1fIHHrH}HH车AGh!HqH8H5,1訦HOH8HfHH߾j1DeDm̋EăAH=)H5GH1E1E1IHDL5I>H51I>nHH8H51H|IlH脳Et}uE1H$Ht8IHMHtRLlHHQHѩgH(H8ȦVL覩]H*HLj1踣}t%LLG}tIHtFL荴D	mtM1EIHAAuBL$H5@LD	muAt0AuH=oLLlDHKH8H5cWD$$H=6H5,ELLE1E161ۅ7HH8H56HH8H5ZH1HH;L5\H^
L1H;H8L1H;HL1ѣH;HL1轣H;HL1詣H;HL1蕣H;H\L1聣H;HLL1mH;HL1YH;HFL1E>L֫uHH8H5ɟ1MtLLHX[A\A]A^A_]UHAWAVAUATSHIRHEо
诡L=`I?uH[H81aIHgH81MHEȃIE1L-;1HE#@HEMIMM>LL賠tLH5蠠hLH5&h艠XLH5rHLH5,膢eLH5?cIff.HE01HEE1YH}pIHMtLLLHIǃ}ALֽIH苣LuL1LufLHL&LHL@9|Lu1MuBrH]H8H5'Z1蔠语H@H8E1M5L觻M),H
H;L5H4L17H;HL1#H;HL1H;HÜL1H;HrL1L13HLepH5LH1貟LHFIŻ@LH5tu1LH5ǦL1kLIŃHuH5t3L1E1MMtL}H}HtH[A\A]A^A_]1LAMuUHAWAVAUATSHHL5I>uHH81莟I֝E1HEL5vzL=sE1HfDLcMA<$-LLt)LL#L+HM4HELH5:贜uHHHMHsHH;H5<1H;H51H;H51ӝH;H5ԫ1H;H5y 1豝H;H5_1蠝MH5LΟIH/H]HH5&H覟IH2E1L111H7IHx蛟a1ېI|$ILHLL若I|$^9|HH81蔝IH]HOHH81sIEVIɞID$@L111"I|$Ht
Hٞt{LL1HH8H5UE1L1%E1E1fHH8H5&E1H1E1>HH;H5E1HH;H5L1进H;L:L肜L:H[A\A]A^A_]UHAWAVAUATSH(IHDžHDž
D迟H
HHL=I?H\1諾sI^HM~EAE1H(HPHHHEHXHpHhHEEEHEEH ADžxEHEDž|H8H@1H`1H01HE1HEMM@M~I^H1;-HH5;gtHH5[THH5;=HH5WS&HH5HH5HH5&yHH5|BʗnHH5r賗cHH5	蜗^HH5/腗VHH5nNHH5]bWEHH5@?HH5`1)/HH5HH5uHH5IHH5h͖HH5Q趖HH5z蟖HH5<舖HH5
qHH5ZHH5CHH5,HH5KHH5L]HH5`pHH5Z<ЕHH5"蹕HH5r袕HH5Y苕HH5ltHH5t3]HH5FHH5++/HH5x,HH5YMHH5seHH5DRӔIFIHMDDDH(HEH(HEMMMMMMMMMMMDžxMEMEMAMzHEMi脮!ݙ膮菮蘮衮H
JHM/H MEMEMEMHHMI^HIHH5GHHxII^HKIHH5H8E]HH8IE@MA2IFIHMDDDHMHEHM	IFIHH0HEH0(AIFIHH`HEH`MDDDHaH8IE1H5uD1蒓PEIFIHMDH@HEH@Dž|MLIFIHMDH8HEH8hIvHt]IH}uMHEI6H}蝕IFIHHMHEHMIFIHHMHEHMAMIFIHMDDDHhHEHhIFIHMDDDHpHEHpTIFIHMDDDMEʉMHXHEHXIFIHMDDDHHHEHHIFIHMDDDHPHEHPL=oI?EH51HE1藑I?H5y1膑I?H5Zm1uI?H5C1dI?H5%1SI?H5Im1BI?H5]d11I?H5$1 I?H5j31I?H5m#1I?H51I?H51ܐI?H51ːI?H5r1躐I?H591詐I?H5A1蘐I?H51臐I?H5c1vI?H5~1eI?H51TI?H5k1CI?H512I?H571!I?H5#R1I?H51I?H5b91I?H591ݏI?H51̏I?H5?c1軏I?H51誏I?H5>1虏I?H5m1舏I?H5E1wI?H51fI?H51UI?H5L1DI?H5i13I?H5O@::1I?H51I?H51I?H5q1I?H55
1ԎAE1HH81腏HI181HEE111HEE1AM

I?EHEE11HP1HH1HEE1111HEE1HEEH DžxEE1Dž|1H81H@1H`1H01HE1HE'LLmH(LXHpHhEHIDMHDLDELD1胯HEI?LLLHLM
CEMDI$HADDuHHEHhHHEHpELuH}tG1HEIHHI71HLt#IH}	H5bHLH1貌͋H}HL`
H5ݎIHH}H@H5i?踎HEHE}HH2tkH]I?H5`N1AH]LmMz{LmI?H5U1HE1E1H]LmAM@A]̉؃UI?H51螋AH]HpH81NIHH}H]H]HI?HTHEH5pg1HE1AH艏`H
H81HH]H]HI?H
HEH5G1HE1H5L1趱H]oHEEu}uHH2菓LhLpHEH@HIHxH|HtuPI?H0HHDuLHH{LMPHHuH]A~1L`HEE1HEI?L
AHu1LEŤHHEHH}H]HE1HD舍IHHu9]AHA9|s1HEI?譊*H:~H21i1HEI?H5QK11HE1HE1HE/E1
H5_H1Ո]̃}tTA}H}tL褯u'I?H59d11苯H}t1}LDI?H51xHuLH}LAE1t1HE%I?H591HE13I?苉AH]LmH}}L11ȳL11,HDML=]LmH`HtfI?L
1LE财HHEHLu~HLH"HH]ExMHIHHPHHuL/1LLLHU1LH~sݲI}L=I?H51HE1ʆ1HEH]LmA1HEI?H50m1HE1蒆AH]LmjE1	HLtGHL=M7H]LmJQH51HMLH1A2EL聈Lu|)LLH~LS9|L1ʼnH݈LeEDXLmLLu91ېL膉ILyHL虜Lއ9|H8HHUt!HtH׾A-HU|L=LmXt HtH׾X11AHUH]}uHH2赍HUHhH@HMLEDMuj 衰H HDMAHHEt'HHHp1E1jtHEHH}HpE1aHHA2؏HU)I?H5=F1HE1I?LFA1HEH}HtH}HtH5臅H}HtɆHEH}Ht袪Mu}t
I71mLH}LHtHHHt^HHtMDH([A\A]A^A_]UHAWAVSHIH1LL1ׅLH~
ϮIśE1	HzM>H[A^A_]UHAWAVAUATSH(LMDEЉMIH}H赮Ht,IHA9ELmE1<E1-f.fLH5>LmAL葄A9LDIHxqtuLLDmD%IL(IDmML0x1fDL薅H}HLDDELM@L9|012fLH5^LmDL诃9*LA߉IHx莒5LTIHH8H561ـDm?HH8H5u1踀ID$ H@HpLLDmDIMcL(1fDLfH}HLDDELMtL轂9|H5ELE1LmH57L߁DH([A\A]A^A_]ADUHAWAVSPHHFH@HHHMHcHu15HtGIHnL8H;+THI~HH5LHH1LH[A^A_]fUHAWAVAUATSHLMDEAHIIH賁HE1LDLHHDDELM<tALlA9|ǹ1ɉH[A\A]A^A_]f.UHAWAVAUATSHLMEĉMIIIH>jH
jHcHAtH!H8H5p1X~AIuH/LI]H躪HIHs H9LHHHEH$LAt$HH8H5s1}IEH0AIuH7/ML"LLU4HHHHIHs HMLHH_HHEH$LL1E1E1LiAtHH8H5]?1}A\I}詩HA;HH;H5ik1|H;IuݍH;H51|AtHBH8H51y|IuH-LMmL~1f.L6LHLMELM^t}L~9|˻iAucIuH}-LkIEH8_=u=ML蝨Ht+ILH誄LLOL~
HM1ۉH[A\A]A^A_]f.UHAWAVAUATSHIIHIH}H5YPLL19{L}L-j1Lu2LH51z]LuȃLm}9L]ԉ~IH8MALH5H1zEt4D\LH5*H1zI}4rfI7L襋LH51dzI|CI1H~tAtyH@Hx0ILH5*OH1
zLzH@D0E[Lx1f.ALL1yHI9u.H@D0E~"Lx1ېALL1yHI9uLH5
1yLuȋ]LH5331gycH5H5[LL1EyH[A\A]A^A_]ÐUHAWAVSPIHE1111}H2fLH{H111}HuMxADH[A^A_]fUHAWAVAUATSP5IIAL=1ALL1~xHI9uH[A\A]A^A_]UHAWAVAUATSHIHEHEHH;HuHH81xHHE11虛1HEwwEEEHauL%
THxEE1HEE1HE1HE1HEE1IM}MA?-LHu=LLuQLH5nu\LH5xWu_LH5ubLH5(u[LH5$lvuTLH5_uOLH5HuHLH5k1uALH5su:LH5
u<LH5]2t>LH5gKtCMuIMI}HeHHEHsMI}H~EQ`I}HozE2I}HUzEEIEIHEIEIEIEIIMHHMHIMHHMHIMHHxHmLH5{sIMHHMH=hH{H;Hx1–IH;HMLEHuHUWH}A
EDEDEMt|H5LvIHuyH;H5-LE11L{yHuLtH}Ht-tH}1HtH;H5[kHֽH81tIL}L}Mt1H5&LvHEHu.H;H5L1siH|H81btHEЃ}LtH;LEHH$LUȹLM1HL}tiIHNju*HtcIƃ}ẼYLL}tPEȃugL111I]LsHH;H51rH;tEȃL111賟_L1諟IL}MEHH311L;rLt$M$DHuLI߉E1E1fH3HH1ẼL}LH<L14IH,H]HuH@H+H߾21b}HqLHމILMt_LHIA?HH8H51GqA_HH
H4TH;HϺH;H5nyHH8H5"1pL蛝L#vLqHH;H51LLHHdH8IUH5.n3H;H5u1pH;qDH/H8IUH5E!1bpHH;H5,*1JpH;H5tX19pH;H51(pH;H5~1pH;H51pH;H5V1oH;H5]%1oH;H5~1oH;H5+1oH;H51oH;H5F1oH;H51oH;H5*1~oH;H5d1moH;H51\oH;H5C1KoH;H51:oHĨ[A\A]A^A_]L@HƇL2zL蜛L$tH}oH5HH81nLiẼt+H]u6HEH$HL11E1E1[uCH]HL/H#H8H5H)HH1HnI?oLLpsH}GLH̛H蔛L輚LDsLnH}HUHAWAVAUATSHhIAHE
lHcH;H1(AIEHx1HEHaHEHHEHuBHEHEHEиHEE11HEEEEHʶH81mHH1胐[HEE1E11E1E11HEHHEH2HE1HE1HE1HE1HE1HEE1EEkH0H;HMHu1E1#zH;%Hu1]H]H7IL=M7H5YHjE1IDLEHZH$HELH޺MˁHoI蚙IH]HtIELpHkLHމ聙LML胙uLLH耙L舙IH}HH59mHHH5K1HEHL1FkLNkE1E1H5}E11"k1E1E1E1HEMUH5LAmIH]HW1jIHL1ژiLHuHSnHnHǾyHIH}HH5ElE1E@AMeLHhLH5hLH5h LH5=?h(LH5{h0LH5vdh4LH5xMh8LH5%6h<IALH5\hLH5ah!LH5#gEEEȋEDEf.AAM}IDAAIEHEIAAIEHEIrAAIEHEISA|~AIEHEI8A|cAIEHEIA|HAIEHEIA|-AIEHEIHE}HH;H5NE1Hx1
hH;H57P1gH;H51gH;H51gH;H5V1gH;H5
1gH;H5|1gH;H51gH;H5
1gH;H51tgH;H51cgH;H51RgHE1E1E1E1LfL~wLgHgLVlH}HtgHEHh[A\A]A^A_]HΰH81gHHxHH;H5uE11fH;h1E1mHH81jgIH]HHEH2H;H5E11ffH;gHEL-I}H5տDHEL-I}H5H11f$HEL-I}H5/11eI}FgHH81fHHtj}uHLדLuIă}t0LLuLeL%HI<$~\H51zeLeЃ}tHLem1LHEL%I<$H511:eI<$fH51eI<$ufLeUHAWAVAUATSHHDžPEHDž0HDž8HHu
cL-^I}Hu:bHcIEHt"H
@H	HǾjbI}11HE1	DžLDžhE@L%L5"2EHH@HpHEHEHEH HEHHXHHHHE1HEDžl1Hxf.fEԅL}IHz;-qHLaHLaHH5aHH5aHH5iaHH5RaHH5;aHH5$aHH5
aHH5<`HH5Y]`HH5-`HH5L`HH5 `HH5v`HH5il`HH5U`HH5o>`HH5T'`HH5`|HH5C_sHH5_mHH58P_gHH5V_^HH5G_XHH5[_RHH5o_gHH5X_vHH5;A_HH5O*_HH55_HH5^HH5*^HH5^HH5^HH5R^HH5^HH5pr^HH54[^HH5tVD^"HH5?-^5HH5-^DHH5 ]OIMH}1HUL8JEHEEHEEHEEHEEHEfcHEHExwHEHEeHEHERHEHE?HEHE,wHEHEwHEHEwHEHEMHEMHEM HEMHEMHEMHEeĿHEMHE}MĀHElMHE^MHEMMHE<IGHIL}HMHEHEIGHmIL}HxHEIGHGIL}HEHEIGH$IL}HHEIGHIL}HXHE{IGHIL}HHEUIGHIL}HpHE/IGHIL}HEHEIGHiIL}HEHEIHFIL}?aLHEIGHIL}HEHEIGHIL}HHEvIGHIL}HHEPIGHIL}HHE*IHIL}`hHEIHtaIL}Z`lHEIGHt;IL}H@HEIGHtIL}H HEEHEEHEHEkDuAueEHpHI}H5QAE11HE1HE1H`1HE1Hx1HE1HEEHpAtAuHMHMHMMHMEH9I}t]Hx1|II}H0Hu1E1gD}EtDIu1L}M1Mt(I]H}H5/HHpH1YHpEĉA,EAEHL5HLIhHXL=OLD}Hu1Hx]1}+^I}H5]k1HE1XAE11HE1HE1H`1HE1Hx1HE1HE1HEDHL=LIlHL5DLD}HuIH}u	\HEZHxHEH0HQHI}1MIiHnHxHZHEHHHMHpHuHu]1}u8Hpt.I}L
fHp1MciHuHGH`HI}L

W1M|rHHuI}XA1HEE11HE1HE1HEI}H5~1.WEHEI}H5$p1WEI}H5~1HE1VI}H5?1VI}H51VI}H5*1VI}H51VI}H51VI}H5ӡ1}VI}H5le1kVI}H5*1YVI}H5š1GVI}H5815VI}H5F1#VI}H5'1VI}H5E1UI}H5}Z1UI}H5s1UI}H5*1UI}H51UI}H5v1UI}H5"1UI}H5#81UI}H5?Z1oUI}H51]UI}H51KUI}H519UI}H5ȧ1'UI}H51UI}H51UI}H5J1TI}H51TI}H51TI}H51TI}H5l1TI}H51TI}H51TI}H51sTI}H51aTI}H5[1OTI}H5S|1=TI}H51+TI}H5Ճ1TI}H54::1SI}H5(C1SI}H5Մ1SI}H5,1SAE11HE1HE1H`1HE1Hx1HE1HE1HEtIu1i1ۀ}uI}TDL-NHxLUH}LUH8HtTH}T1BVH}9VH`-VH}DXLeH}SHPwSH}SH0HtRH[A\A]A^A_]1HuHE1}u(Ht#I}L
1M8dHdMȃHEtukHuHEpHEHHEHtLI}L0HAH$L1M	hHHEHu 1HEAE11HE1HEHHLI2THL@I}H5i1HEL1QAE11HE1HEA1HEE11HE1HE1H`1HE1HE1HE]1HEA1HEE11HE1HE1H`1HE1HEHH81QL@HEMtMLLHSHHEHDhuKI}H51HEL1PAE11HE(HH81uQHEDhDeAuDI}HHyqHIH&IG(H8Ht
L^QE1HEAL}DeuKHxHHUD}D}~rI}rQA1HEE11HE1HE1HEXA^HD}D
lAEA@DEH`HuHUE~IHHXt7Eȃu?LHuHUHME}I}H5
	I}H5+^HPLLuLHULEE}I}C]H56LE11OLHD}IHpHtXH5H*QH&HELEQ~'1LRH}HIWLQ9|H}!OL9QAAAfHPH}A1HEE11HEHHtH5H}H1NHXHHtH5TvH}1MHtH50H}H1Ml>]tJH}LHUD\|H}LN`E1HEH1`H111`IHHXL D,t<MHPMH5KLuOHPHtHHXsI}H57\I}H5k1HE1LAE1RH5wI}H5v1HEL1LA#I}H5m1HEH1LA]H}L&_E1HEȋ]I}H5[1HE1MLAfUHAVSHAHe+t
Auu
1HD[A^]UHAWAVAUATSH8HuE
JHH;Hu8JH&JHHH
cH	HǾjJH;1oaE1HEEE1HE1HEE1BAHEHDHHuH ʉрEEDHEHuEEIcHELtMEoLH5vItLH5cILH5!LILH5x5ILH5dIAAH9dH%HHHu
HHDA}LH5C+HU1U1ɅDeDeAA	fDAHEHDHHuH ʉрEEDHEHuAHEHDHHuH ʉрEEDHEHupE1}AEYE1}AEBE1}D}EHH;E }Hu1(kH31LeM1BMtL3L2H5LH1H9GHAGHHMIHLl&GH5X1HH;H501zHH;H5R1iHH;H51XHH;H5B::1=HH;H5W1,HH;H5*1HH;sIH8[A\A]A^A_]11kmHHLjKFEt$iKH!FHHL]KIDeE}Hjf.fADMHDqEAEOE1fB=LH1GIM9uED)EAWH;YHAHfAEMHD
q~gLHDJED)EAʃ}tH5LW1L11EL=3I71aI?GMu"QL=I?GM4LG'UHAWAVAUATSHIAQHHEHHH@HIǾ
D	SHH8HuHH81FHHwH81HE1?iHxnL}HuH81[FHEиHEEA1E1HE1HEELmEAIEHEEfM}LH5<ELH5<CLH5tELH5Y4ZCLH52CCLH5vWELmkLH5eCTH}LGILH5TsHL2DH9LmHÃILH5ArIHLCH9LmHLHEHMAIIuHxAIIuH}<FEOH]LuLFu3[rHt)HHkLHEHErHHuLEL}X	1E1LuAF	HьH;L5aJH8L1BH;H@L1BH;H{L1BH;H{L1BH;HL1BH;H{L1BH;HQRL1BH;HL1rBH;HAL1^BH;HZ)L1JBH;HL16BH;HL1"BH;HL1BH;HL1AH;HLL1AH;HqL1AL}LuAH}H5
CL}LmL8alLD9LloEHH`HIHPpLeLH5HH15ALHxLL{iHH?t*LdiHLoLH5šHH1@}LXEHDžXLoHtLH5HULoHtLH5T!HULoHtLH5>HUyLoHtLH5!EHUwQLgoHML1Hp1Ѕ5A1ېHp<ILHHU"HI9uLoHOL1Hp1Ѕ7A1Hp<qILHHUHI9uHXHt;tH}H5)H1;?HC?Lu}tSH]HH5mFHLX1
?LunHH5̩1>LLHLVn},L
11E1fL11E1fA@HHEELLm7f.f1i>H]H߾L1E1pfAą3EH߾L1E1MfAǃ}DuH}L1E1fiH5|@GHJIH}LHE1eDu:H}L1E1eH5	FHHH}LHE1jeLeEL`H}H561=AELuAA3H}<DOL}ILH51<LH5UMA1LeEL`vH}H5UMALuA{IHHHKHDEH}H5H]H1?<AMH]HH5H
UUH1<EAtH}H5cd1;1AA1ALe1A+L}ILH5BH]H1;DEH;MtL;LuL`EHH5\H}H5I1I;AuAu:AueH}H51 ;H}H5q1	;AtLeLH5p1:LH5P1:At)LeLH5?1:LH5D1:LetLH5/1:ELH51x:H]H|:Mf.@HH8;HH51+:}tHH8i9};b}9H}H519"E1LeHH8+;HLH;HxHz;LHo;MtLr:DHĈ[A\A]A^A_]H5H}=;L}1H5H}";LZ9HL}AtHC9LuLf.UHAWAVAUATSH(HH}HuHy;EԅE1H]+f.fH5A
L18AD9mH}D<IHǾ:%EHLIIM)AIcHHLFBƄ5IH}HH]L
H}L11`H߅UH5ִL18Hl9AD9mM3H55H1H([A\A]A^A_]7H5H17H([A\A]A^A_]UHAWAVAUATSPIIIHHu-AH5%j@I$Ht~I$HL7ILA7LA7H9r$A7HH߹uI\HI$Ht0;tIcH51H@I$IcHL?1H[A\A]A^A_]f.fUH]UHAWAVAUATSHIHDžHDžH'HDžH,H;H[1YrtC?P8HDžx,H@HDžHAW8HǸH`HXHDžHhH`H0H8HEHHHxHpDžDžHEADžHEHEHEиHHHHH1HE1H1H1HE1HEHfI^Hs
;-j
HuM~HH58!3IHH5
3bHH5\2uHH5K2HH52HH52/HH5/;2&HH5v2HH5i2HH5UR2HH5>;2HH5$2HH5
2HH51HH5L1HH5_1HH51HH5Ķ1HH5TT1HH5Tl1HH5
U1HH5<l>1HH5'1HH501HH5j0HH5"0HH50HH59u0*HH5&0>HH5B0RHH5o0fHH5/X0uHH5aA0HH5
*0HH5A0HH5A/HH5y/HH5/	HH5@/HH5G/HH5؟/HH5HJr/HH5[/HH5dD/HH5|-/HH5/LHH5.dIFI1HMEHMHEHMGfIFI1HMEHMHEHM f.I^HH=HEIH}Ht/HHHt/HtH/I~HHHHL%I1҅uH0yH8H5V11g/IHHEHHHH7IFH%IHIFHIH1MMHu,Dž1Dž1Džx1Džx1H`1H`1H81H01H01rH01cH01QH0 1BH010H01!DžDž1Dž1Dž1IFI1HMEHMHEHMIFI1HMEHHEHIFI1HMEHHEHiIFIH0HH1HMEHHEHHEH0"IFI1HMEHHEHIFI1HMEHHEHIFI1HMEHpHEHpIFI1HMEHxHEHxvI^HaH9H@Hy* I^H;H9HHH IM1IFI1HMEHHEHIFI1HMEHHEHIFI1HMEHHEHIFHIHXI~lIH}.HuH8I61E1L
L<HEHI~IL6.HtH8I61E1L
<EHIH}Z H}uiIHHEH!1LHU[IH!HHH0-n!H}H<IHY!I6H-:2 M~MGH} H}uHHHEH/!H]H,HEHYHP1Lz/HHY.HHuHPHYIH3M HLP, H}L\HH II6H ,VGIFI1HMEHHEHMIFI1HMEHXHEHX"I^HIH6H`M1I^HHa6HhI^HH86IIM1IFI1HMEHMHEHMoHrH8H5aH1O(MAA</IFI1HMEHMHEHMHqH81(HH1KE1HE1Hx1HEE11H1H1HEE1E11HE1HX1H`1H@1HH1HP1HE1HE1HE1H1HE1Hq1HECH}H]HutT1H}H]HuuCHu>Hu4HH 1HM1HXE1HHXILPLpH}HtH5j|(HtpH81Z'L=;pLLmH1ҋxDH}EщHPHH5TaL~(HPHH=CqH5Dq1HHH1q0IH&LLuMI?H5yI?H5{1Hx1%E1HEL1HE1HE1HX1H`1H@1HH1HPJ1HHH}uuHHti@H#HIHTHHúHǾvL#1HEHHH߾e11s#HMwHEHIDHEI?L
L1E1f6I?H7IL
1HX1E186HhHuHt%I?L
gx1E1_?HHxI?H.H$Hu1E1E1:HKHHmH8H5H1$HmH;H5S1Hx1#H;H5\1#H;H51#H;H5ф1#H;H51#H;H5!1#H;H51|#H;H531k#H;H5!1Z#H;H5\1I#H;H5Io18#H;H5!1'#H;H5Vv1#H;H5!1#H;H5:1"H;H51"H;H51"H;H5	1"H;H5A1"H;H5W1"H;H5/1"H;H51}"H;H5	1l"H;H5 1["H;H5@1J"H;H519"H;H5u1("H;H5|1"H;H5|1"H;H51!H;H51!H;H5ؕ1!H;H5nu1!H;H51!H;H51!H;H51!H;H5w1~!H;H5I1m!H;H5*1\!H;H51K!H;H511:!H;H5}1)!H;H5<1!H;H511!H;H5R1 H;H5}1 H;H51 E1HE1HE1HE1HX1H`1H@1HH1HP1HE1HE1HEE11HELukE1111HhH(HHLutI?H5E1H1 HHL	?H@HLXM Hh Ȉ>k`<iPQHcH01HE11HM1HMLH11HMf.@MLuHxH`Le11HL%"iL|?HE1LeL5if.H}H )~ =POSTtY<
t<
uH=)jH5*jHU1_)HHEHu;I>H5m1I>*  MLeI>H51H}tH}1TNHHL5+hHHHDHI>1E1L
f-/HIHHEt)I>H1E1L
X9HHEI>HH$H1E1E13H?I0"H}LL`LHLEL8|M,HPtHu1iMHLet:HH5YHHH=}hHHU	(HLeHtA>Lm"Mu8H1FHIHHuLmM(LmH}Lx%!H1HhT;HLI110$HEиPt1H0$HEE1LeH]@HEH$LL1E1LM^LLeH]fDAD9x"LDDLHLLIHHNLt*HEH$LL1E1LMK@111HMLHW)@)0) 1U,HHt{t(H**H=A}H K{uH=~#,IH8H!HEHxH (HL-HH<RLet!<VH]HEH$LL1HDž HDž HDžDž,LCH H,H He@,L HEH$LLLMJHHtHǾ1E1JH]"H HH]tHǾ1E1JH (H >(H(LLJ]LHXH@HL(L`fJ1LlJILeH}LmL1IJI(O)`(1)P()@()0() ƅpL}Mt@L18LH 1#H=\dLL#L111HEI1IIE11E11Le'L&H7LxIH]HLH(])`(?)P(!)@()0() ƅpL1-7HH 1:H=scHL"H߾11"1HEHHLe3&
?1HEL5|aHLeG|HHt@I>HLDHE$HuHI1HELeqHHXH5cRHLeHH=qbH5rbH1!IHM1HEf.@HLxLet@HH5H`HH=aHLxLs!H+LcGtHHceGHPH5H‰1kLuHxH`HxtHPH15H}d1Hh)HhH}H}4H5E1H`I?H51HE1E1Hx1HEL1HE1HE1HX1H`1H@1HHNH5v1Hx1\E1HEL1HE1HE1HX1H`1H@1HE1HE1HEE11HELuLpL}H;SH}
H^H}H`H@LLHXLH}FH}lHH`HPH}{3Hx3H}EHHH}HH}HMtL)HHHDut
HtHDH[A\A]A^A_]E1Hx1HEL1HE1HE1H`1H@1HE1HE1HELu1HELXu1E1p1l1HM1HMEH]LuLuLpHML}LhH`-I?H5PE11I?lHHLE1HE1Hx1HE1HE1HE1HX1H`1H@1HH1HE1HE1HEE11HEHB\{I<$H5wL1HE1jI<$AH\H;H5t1HEHI>H5sL1HEH1E1HE1HELuLpL}LhI>H5L1HELm1E1HE1HELuLeI>H5L1HE1E1HErEL1HE1H`1HEBEI>H5UL1HE1GEL1HE1HE1HELeLuLpL}Lh1HEEL1HE1HE1HELuLeEL1HE1HELuLmLeL5hZI>H51HE1EL1HE1HH1HE1HELe`E1HxHZ1HE1HE1HEL1HE1HE1HEE]I>H5\L1HE1E.HYH;H51Hx1E1HE1HE1HE1HEL-hYI}HpHx0HHEHHEI}L
ƫ1E1[*Huw1HE1HEHXLuLpL}Lh1HE'EHX1HE1HEE1HEL1HEE1HEH?HEHttH}tH}Hu?H}HuHUH0?yH}1HU1?H
%XH9~9H5'1XFHXH;H5b1HE181HE"H5'1HWH8pH}HL@LHHdHTHDE1PHPHH5H H>H5HAHHA9HD\IHDJHPHH5PH1/
H H$H}LHH,L L,>H5abHH LL>uHPHH5HHc=HPHH5H1HH5&HH=HH5H t4HPHH5~H HO=HH5J`Hc,HK]=HPH5aH1)1HEEHUH
xUH9tH5;1HE1H51H@UH8H5lH*UH8H5$VE1HE1HEE11HE1HX1H`1H@1HH1HP1HE1HE1HEE11HEHTLu31Hx1HE1HEE11HE1HX1H`1H@1HH1HP1HE1HE1HEE1H@TLuL}2H,TH;H51Hx1Z
HTH;H51HxL11
XE1HE1HE1HE1HX1H`1H@1HH1HP1HE1HE1HEE11HEH|SLuL}1HxH_SH;H51Hx1	E1HE1HEE11HE1HX1H`1H@1HH1HP1HE1HE1HEE11HELu%1HEHRH;H51Hx1'1HEHRH;H5e1HxHRH8H5THjRH8H5<BUHAWAVAUATSHELHMIIH9HILuHtLdHAk'HC"HIǺHǾ!1S"L9HLIŋ]HEu[Le11WgLHuLP9HH51L1E1]HEtLf1Le11'HMLi1HLHuL8HIL}HcL LufH}L8W)E)E)p)`)P)@)0) HcMԸHHH	 HEH]L5#t}ԃL1!L#:}ԃ1L1MF$5H5L"HMLi1HW)E)E)p)`)P)@)0) HcMԸHHHH	 yHEHcHEH LE11#FH5m H51H}1mH5H}1CH5H}-1-H5H}H}H5_aL6L}H]HuHNH8H51MtL' MtLHHĸ[A\A]A^A_]UHAWAVAUATSHHAHE
HCNH8u8HH
)NHHtH
"NH	HǾjLcLkAEA%fAELLcLkA~lA}-ueLH5B~tLH5kA
AH{H(ALcLkA
EAMtCHIHtHWMHLj1I4$}t%H}R#HMH8H5]F18zH}4HuLQH}1D114H1HHDH5L1H}q	LhHLH8H5L1HmLH;H51H;H5.H1H;H5HV1tH[A\A]A^A_]UHSPa&DHHHHrHH[]HHH#H5b%d@%bh%Zh%Rh%Jh%Bh%:h%2h%*hp%"h`%h	P%h
@%
h0%h %h
%h%h%h%ڀh%Ҁh%ʀh%€h%h%h%hp%h`%hP%h@%h0%h %zh%rh%jh%bh %Zh!%Rh"%Jh#%Bh$%:h%%2h&%*h'p%"h(`%h)P%h*@%
h+0%h, %h-%h.%h/%h0%h1%h2%h3%h4%h5%h6%h7p%h8`%h9P%h:@%h;0%h< %zh=%rh>%jh?%bh@%ZhA%RhB%JhC%BhD%:hE%2hF%*hGp%"hH`%hIP%hJ@%
hK0%hL %~hM%~hN%~hO%~hP%~hQ%~hR%~hS%~hT%~hU%~hV%~hWp%~hX`%~hYP%~hZ@%~h[0%~h\ %z~h]%r~h^%j~h_%b~h`%Z~ha%R~hb%J~hc%B~hd%:~he%2~hf%*~hgp%"~hh`%~hiP%~hj@%
~hk0%~hl %}hm%}hn%}ho%}hp%}hq%}hr%}hs%}ht%}hu%}hv%}hwp%}hx`%}hyP%}hz@%}h{0%}h| %z}h}%r}h~%j}h%b}h%Z}h%R}h%J}h%B}h%:}h%2}h%*}hp%"}h`%}hP%}h@%
}h0%}h %|h%|h%|h%|h%|h%|h%|h%|h%|h%|h%|hp%|h`%|hP%|h@%|h0%|h %z|h%r|h%j|h%b|h%Z|h%R|h%J|h%B|h%:|h%2|h%*|hp%"|h`%|hP%|h@%
|h0%|h %{h%{h%{h%{h%{h%{h%{h%{h%{h%{h%{hp%{h`%{hP%{h@%{h0%{h %z{h%r{h%j{h%b{h%Z{h%R{h%J{h%B{h%:{h%2{h%*{hp%"{h`%{hP%{h@%
{h0%{h %zh%zh%zh%zh%zh%zh%zh%zh%zh%zh%zhp%zh`%zhP%zh@%zh0%zh %zzh%rzh%jzh%bzh%Zzh%Rzh%Jzh%Bzh%:zh%2zh%*zhp%"zh`%zhP%zh@%
zh0%zh %yh%yh%yh%yh%yh%yh%yh%yh%yh%yh%yhp%yh`%yhP%yh@%yh0%yh %zyh%ryh%jyh%byh%Zyh%Ryh%Jyh%Byh%:yh%2yh%*yhp%"yh`%yh	P%yh
@%
yh0%yh %xh
%xh%xh%xh%xh%xh%xh%xh%xh%xh%xhp%xh`%xhP%xh@%xh0%xh %zxh%rxh%jxh%bxh %Zxh!%Rxh"%Jxh#%Bxh$%:xh%%2xh&%*xh'p%"xh(`%xh)P%xh*@%
xh+0%xh, %wh-%wh.%wh/%wh0%wh1%wh2%wh3%wh4%wh5%wh6%wh7p%wh8`%wh9P%wh:@%wh;0%wh< %zwh=%rwh>%jwh?%bwh@%ZwhA%RwhB%JwhC%BwhD%:whE%2whF%*whGp%"whH`%whIP%whJ@%
whK0%whL %vhM%vhN%vhO%vhP%vhQ%vhR%vhS%vhT%vhU%vhV%vhWp%vhX`%vhYP%vhZ@%vh[0%vh\ %zvh]%rvh^%jvh_%bvh`%Zvha%Rvhb%Jvhc%Bvhd%:vhe%2vhf%*vhgp%"vhh`%vhiP%vhj@%
vhk0%vhl %uhm%uhn%uho%uhp%uhq%uhr%uhs%uht%uhu%uhv%uhwp%uhx`%uhyP%uhz@%uh{0%uh| %zuh}%ruh~%juh%buh%Zuh%Ruh%Juh%Buh%:uh%2uh%*uhp%"uh`%uhP%uh@%
uh0%uh %th%th%th%th%th%th%th%th%th%th%thp%th`%thP%th@%th0%th %zth%rth%jth%bth%Zth%Rth%Jth%Bth%:th%2th%*thp%"th`%thP%th@%
th0%th %sh%sh%sh%sh%sh%sh%sh%sh%sh%sh%shp%sh`%shP%sh@%sh0%sh %zsh%rsh%jsh%bsh%Zsh%Rsh%Jsh%Bsh%:sh%2sh%*shp%"sh`%shP%sh@%
sh0%sh %rh%rh%rh%rh%rh%rh%rh%rh%rh%rh%rhp%rh`%rhP%rh@%rh0%rh %zrh%rrh%jrh%brh%Zrh%Rrh%Jrh%Brh%:rh%2rh%*rhp%"rh`%rhP%rh@%
rh0%rh %qh%qh%qh%qh%qh%qh%qh%qh%qh%qh%qhp%qh`%qhP%qh@%qh0%qh %zqh%rqh%jqh%bqh%Zqh%Rqh%Jqh%Bqh%:qh%2qh%*qhp%"qh`%qh	P%qh
@%
qh0%qh %ph
%ph%ph%ph%ph%ph%ph%ph%ph%ph%php%ph`%phP%ph@%ph0%ph %zph%rph%jph%bph %Zph!%Rph"%Jph#%Bph$%:ph%%2ph&%*ph'p%"ph(`%ph)P%ph*@%
ph+0%ph, %oh-%oh.%oh/%oh0%oh1%oh2%oh3%oh4%oh5%oh6%oh7p%oh8`%oh9P%oh:@%oh;0%oh< %zoh=%roh>%joh?%boh@%ZohA%RohB%JohC%BohD%:ohE%2ohF%*ohGp%"ohH`%ohIP%ohJ@%
ohK0%ohL %nhM%nhN%nhO%nhP%nhQ%nhR%nhS%nhT%nhU%nhV%nhWp%nhX`%nhYP%nhZ@%nh[0%nh\ %znh]%rnh^%jnh_%bnh`%Znha%Rnhb%Jnhc%Bnhd%:nhe%2nhf%*nhgp%"nhh`%nhiP%nhj@%
nhk0%nhl %mhm%mhn%mho%mhp%mhq%mhr%mhs%mht%mhu%mhv%mhwp%mhx`%mhyP%mhz@%mh{0%mh| %zmh}%rmh~%jmh%bmh%Zmh%Rmh%Jmh%Bmh%:mh%2mh%*mhp%"mh`%mhP%mh@%
mh0%mh %lh%lh%lh%lh%lh%lh%lh%lh%lh%lh%lhp%lh`%lhP%lh@%lh0%lh %zlh%rlh%jlh%blh%Zlh%Rlh%Jlh%Blh%:lh%2lh%*lhp%"lh`%lhP%lh@%
lh0%lh %kh%kh%kh%kh%kh%kh%kh%kh%kh%kh%khp%kh`%khP%kh@%kh0%kh %zkh%rkh%jkh%bkh%Zkh%Rkh%Jkh%Bkh%:kh%2kh%*khp%"kh`%khP%kh@%
kh0%kh %jh%jh%jh%jh%jh%jh%jh%jh%jh%jh%jhp%jh`%jhP%jh@%jh0%jh %zjh%rjh%jjh%bjh%Zjh%Rjh%Jjh%Bjh%:jh%2jh%*jhp%"jh`%jhP%jh@%
jh0%jh %ih%ih%ih%ih%ih%ih%ih%ih%ih%ih%ihp%ih`%ihP%ih@%ih0%ih %zih%rih%jih%bih%Zih%Rih%Jih%Bih%:ih%2ih%*ihp%"ih`%ih	P%ih
@%
ih0%ih %hh
%hh%hh%hh%hh%hh%hh%hh%hh%hh%hhp%hh`%hhP%hh@%hh0%hh %zhh%rhh%jhh%bhh %Zhh!%Rhh"%Jhh#%Bhh$%:hh%%2hh&%*hh'p%"hh(`%hh)P%hh*@%
hh+0%hh, %gh-%gh.%gh/%gh0%gh1%gh2%gh3%gh4%gh5%gh6%gh7p%gh8`%gh9P%gh:@%gh;0%gh< %zgh=A"b!!!yV!!!!M!!!zF!`!l!X!i!e!!?!j!!!Lq!<j! t!@ 7!Wq!F!!V!!*7!D!!-!!?!aq!]!P!
! ;!@!Ȉ!67!F!!c!`!PW!?!-!``x!`x! `Hj!E!@`N!I!ӈ!^W!F!?!j!W!x!n!x!N! G!W!+!!s!s!s!s!s!s!s!j!!o@!!!!s!s!s!N!]O!!!69O9_9r99Ю 	 M0& Lu 
~9oXZ |Z a&&
&o`S oZ oh&`&P&X&@{&P+%@& &^%[%e%g%d% ^%_%D&&H&P&(&!!J"!0T"7A!`"!"! "!"8!"0!";A!"AA!"Μ!P"!l#!z#!#!#J!З#}H!0#o9!0#O! #!#0!$c!$c!PM$c!Ё$[!%Y!@r% !\#<!d#!u%z!|%&!%F!P%Y!p%0!%!к%ќ!%S!%M!%l!&c!"֜!"!"Y!"$!"!"!"w9!" "9!" "c!"b!"*c!"!"F!"Y!".c!"!"n!"O!"i!"!"HA!"r!"!"Y!"t!"R!"R!"!"F!"!"!"!"^!"!"+!" "{!"n!"!"2c!"ij!"%l!"=c!"K!"9!"ڜ!" "!"PA!"!"!+!X<م"uoLʒK3DWFPi)v'kL>|Gt3e8`$ԜLz"
h__;kܾz:'IC=~,^{nln8]V}S>$
ki&+pSFbP3K<R0;_$O{L@73-ZZ@fv}1SP@1VSz"Iq>ʼns;lIǟ
D0پ[_׉t),TQޠ/$kwޢhR }!ڻbG6g茪8a<N*%xchC<-eP}Q+Ӧ %CՑ}Ʌ6Hh`h:?؂zw
S->(1gPޛ~,Pa孽6N@}
K?nAj)}G0	j3=S.Ys>u1GzR٦{8h~KS[Yqenfk6(ץ,9&Kښp7V#^9OCeòp[PI1lՅePfeoMLoPF%ho0i](Hޙ?_s$
 ]*?'b{tbSa'z	MTXItU~#Za~qM4)h^ 	lAsj~22g蠋kEvϑGjZ 7dy=a!t]LQG\LzrSxH:џ}G{tPVW+AV8F
NDC!]n&1
!Ľ$PH,.I_W'6 +٘4PXTctvR{(JN؜y؛f/ϬyEx~"Qg&#8pMO@~rR33Π%]oO4~o0o٠]\A2¢~h\(!XcLNKMX\Ug}nTo@gL[<zgi
@v&CV(_;i6,Qw/W{b;@{h
8!]F#rQFyٽ,W~={k&'jw,B҈ӒQd\lG	%??!
]Te}ðhϛ3MӔ>btơu,xY4cO/<8?~%r9캐[:Xl0B71jj	)F˅0^9""4ah7=.J[HcӖd4ѠѮl/HC!0_ޣpx.}nBܷF6MF=<F@w
uLѩ0(vl+oۀf&ǎ;r܇
LJq"dYiNCܫfҭ6)іpYx5eUR84Vx4VxVx40:A3O<}UO[g[h4ޥ.3n4^qإerwW_UWIAWj`Rrf};
B#(%%/p߁ImT.&ުY1!G;ZFŹ+	xz3pBkh$!
hwn|ڼ>S"絮nUe LsjI)aF
X׈^{BXEA 1W=[/_OGV? )[Iz*!,IOQmKKR,0\ܘC=C[Щ>˃uk4A)jUMp쮇8
 EwnW`W"ˏ3:7o림Sp!v>/E$Y2.;#x=gO7NGL-OA.-",SU+?X:0ڰ-O&8=pQQy2{-'ŜyR<d4}(NCѦm-r#m	/.\tH6=MjKnu /ˬFA)e3RhOwFǦ)ڰ[c
.f~;ALNaC۰R,ʍ{
~8[.{8!(w 1q,.ʪ7@AYKa58yRAcoI~e5ƒ^fR@6j}FAAN!$.iqe턍B!iV`Q)4ݹg,|F*@x]Qz) 
Bw~k[Sz+jcorL]Y~-FIE0><Sg?O/Z/X'RjJsG%_&x"G8clzƏAbg2#?)&,}I3:`<d#id]	aӬ^D:MR)۔Ex1Wy2tx/4ER/1;IY^52aPH|f[Om6R@,'6D} ̞`8M
'Kи]U>|I ˊf$3;@VP澄%Ӝlb]+}=zlTQ	[GdUZ7%}!ioɊ@zp
NFz۳˃#ĽԪ]1FΞugSGD%s~ЎYѲZ/9ͣ¹ǹHƘMʄl)Y5dY!3kQ^޸_ƹ"eFD#33kYtj>6P!Бl/&0ej0VboVqIZM4Xy0UlZL,YV蝯
xQUC;l-A(Пj~Ы|}5'IQcd>amS9'Ogw:o s>z(a#+΄W~%Te̕
0YakNCy% Hh	f+vFNY	LeHxC,$}ZpEl)@?[GD9rzڪ*	T#7[a
~$sm@r	HlF9<A'2u$)(q0/Lp#.IkzvD|vӇuY$~'DIrӊ,6}Z܅nT1:pW[>OxFj1d	8<*+16`-t2蜓n{q%8*7Dΐ?RR"8v	iXj}|,2O

7C]$'FTSbq+qAu:a)F:ck0N%U<NDW0	)qC;QWq+e!S_()O|D(AOj(P9gS,<˖A@2pe:"y<uN:6O%K KiC
	(,ԁm!ܷ;cx#p~7ێ>j̙r}m䐵pNH`*z=$)ڽפ`-"ek(/y|CB<h߹iBNW&{Vm@*Uל5"wy?Ӹ	?<,I8mfD"#ġԬi5L96ͤҕ
"2(ҋ80܌uOjz>jEO.4T}my.QMyVD7ZHH?,QFAƑrUs,tP:/mwmEi'e^4Ӂ=0C#Bv1sFa
9@zۀ,
4ԒlnOϯLwvrGќJ3nuv1w)R.R0u͉lW'=/\v)K	xraao9N>Ǐ68%zJԠ>!9r=P]_?mU
![&+wOv,"j办VxD^`ey1#.t॔KXU346Wy.;N!\HJ`)S--oB.q1mo+#ߴ@,
}}Kߑk
iif[F}pm~uNwMA?bq^8K,0oI.ɚ]	U:%#Вã/MUZ1u,A_uc,h˓QsI`&FP_YT͘At_	`{< 뤓ʚ'e[yn&(;smSX`\vCX$;$ET7c}t!HĔD"-->Z1ܕAX@_ڬ?*kX_Hx $< %kBl61z&vjb
|I
wgG!?C!F0bQrHg͞!0A4w>9g*{/@pO?vJ5NG+]tC3{I@fbz˓SԀH'KAa߿=q%qJWl!}5EjC\T_$.@ޒ#YҡLe[·Uq<
$ka3B+wtyyϭW5	tqXk2]vH9#wJp>lR$AZz^15uĖt۴Ȍ;fPGeb4<p./e<J*ACBM'uA/DWm[2ƷlWzyrh-8仍eV92ݻ5٬C1^5={o݅5hc<G39>X5j,Zhxdk>Nz¶vœjiV4J
n5`#0d9`vQJ<:, `iJ!IT X!QG>TFٶdT/ϥ(9v[-C$oio}_x@	(eƞVpRҔJ%L.y\ՎTU%vcP"/XXykAg&lWa:}1-8b6BB$ge|oDɫLE{80X+]
TIM"@P.x(x$V—,Cfr_S챱^@ H{?j!5GŊO^c`q[JO`ƺJ$ .:΍'!
QU0c׍ąN'|.墣Lc9wfʠqP=5.`haCʚ#JEraww*-Va^jFJ?PֺוeSánCӁFFHNy@4q^J^Op-=:ը

9_!1trkd5a
9!f
|ʡZqT(pCl{hMEFC,FN&.۰U*PD!c!y!֜!!@!$!!.c!!!!!x!!!"?!,!"!V!/!!,!!!e
!!J!!-time arg     - max number of seconds to collect data, default %d
-verify arg   - turn on peer certificate verification, arg == depth
-cert arg     - certificate file to use, PEM format assumed
-key arg      - RSA file to use, PEM format assumed, key is in cert file
                file if not specified by this option
-CApath arg   - PEM format directory of CA's
-CAfile arg   - PEM format file of CA's
-cipher       - preferred cipher to use, play with 'openssl ciphers'

g&&&&&&&6&F&V&f&v&&&&&&&&&&&&&6&F&V&f&v&&&&&&&&& & && &6 &F &V &f &v & & & & & & & & &!&!&&!&6!&F!&V!&f!&v!&!&!&!&!&!&!&!&!&"&"&&"&6"&F"&V"&f"&v"&"&"&"&"&"&"&"&"&#&#&&#&6#&F#&V#&f#&v#&#&#&#&#&#&#&#&#&$&$&&$&6$&F$&V$&f$&v$&$&$&$&$&$&$&$&$&%&%&&%&6%&F%&V%&f%&v%&%&%&%&%&%&%&%&%&&&&&&&&6&&F&&V&&f&&v&&&&&&&&&&&&&&&&&&'&'&&'&6'&F'&V'&f'&v'&'&'&'&'&'&'&'&'&(&(&&(&6(&F(&V(&f(&v(&(&(&(&(&(&(&(&(&)&)&&)&6)&F)&V)&f)&v)&)&)&)&)&)&)&)&)&*&*&&*&6*&F*&V*&f*&v*&*&*&*&*&*&*&*&*&+&+&&+&6+&F+&V+&f+&v+&+&+&+&+&+&+&+&+&,&,&&,&6,&F,&V,&f,&v,&,&,&,&,&,&,&,&,&-&-&&-&6-&F-&V-&f-&v-&-&-&-&-&-&-&-&-&.&.&&.&6.&F.&V.&f.&v.&.&.&.&.&.&.&.&.&/&/&&/&6/&F/&V/&f/&v/&/&/&/&/&/&/&/&/&0&0&&0&60&F0&V0&f0&v0&0&0&0&0&0&0&0&0&1&1&&1&61&F1&V1&f1&v1&1&1&1&1&1&1&1&1&2&2&&2&62&F2&V2&f2&v2&2&2&2&2&2&2&2&2&3&3&&3&63&F3&V3&f3&v3&3&3&3&3&3&3&3&3&4&4&&4&64&F4&V4&f4&v4&4&4&4&4&4&4&4&4&5&5&&5&65&F5&V5&f5&v5&5&5&5&5&5&5&5&5&6&6&&6&66&F6&V6&f6&v6&6&6&6&6&6&6&6&6&7&7&&7&67&F7&V7&f7&v7&7&7&7&7&7&7&7&7&8&8&&8&68&F8&V8&f8&v8&8&8&8&8&8&8&8&8&9&9&&9&69&F9&V9&f9&v9&9&9&9&9&9&9&9&9&:&:&&:&6:&F:&V:&f:&v:&:&:&:&:&:&:&:&:&;&;&&;&6;&F;&V;&f;&v;&;&;&;&;&;&;&;&;&<&<&&<&6<&F<&V<&f<&v<&<&<&<&<&<&<&<&<&=&=&&=&6=&F=&V=&f=&v=&=&=&=&=&=&=&=&=&>&>&&>&6>&F>&V>&f>&v>&>&>&>&>&>&>&>&>&?&?&&?&6?&F?&V?&f?&v?&?&?&?&?&?&?&?&?&@&@&&@&6@&F@&V@&f@&v@&@&@&@&@&@&@&@&@&A&A&&A&6A&FA&VA&fA&vA&A&A&A&A&A&A&A&A&B&B&&B&6B&FB&VB&fB&vB&B&B&B&B&B&B&B&B&C&C&&C&6C&FC&VC&fC&vC&C&C&C&C&C&C&C&C&D&D&&D&6D&FD&VD&fD&vD&D&D&D&D&D&D&D&D&E&E&&E&6E&FE&VE&fE&vE&E&E&E&E&E&E&E&E&F&F&&F&6F&FF&VF&fF&vF&F&F&F&F&F&F&F&F&G&G&&G&6G&FG&VG&fG&vG&G&G&G&G&G&G&G&G&H&H&&H&6H&FH&VH&fH&vH&H&H&H&H&H&H&H&H&I&I&&I&6I&FI&VI&fI&vI&I&I&I&I&I&I&I&I&J&J&&J&6J&FJ&VJ&fJ&vJ&J&J&J&J&J&J&J&J&K&K&&K&6K&FK&VK&fK&vK&K&K&K&K&K&K&K&K&L&L&&L&6L&FL&VL&fL&vL&L&L&L&L&L&L&L&L&M&M&&M&6M&FM&VM&fM&vM&M&M&M&M&M&M&M&M&N&N&&N&6N&FN&VN&fN&vN&N&N&N&N&N&N&N&N&O&O&&O&6O&FO&VO&fO&vO&O&O&O&O&O&O&O&O&P&P&&P&6P&FP&VP&fP&vP&P&P&P&P&P&P&P&P&Q&Q&&Q&6Q&FQ&VQ&fQ&vQ&Q&Q&Q&Q&FreeBSD clang version 11.0.1 (git@github.com:llvm/llvm-project.git llvmorg-11.0.1-0-g43ff75f2c3fe)Linker: LLD 11.0.1 (FreeBSD llvmorg-11.0.1-0-g43ff75f2c3fe-1300007)$FreeBSD$U4^STSXTXTT4^_4A^Xz^A_Xz_A\Xz\\]]UXUPUX0SRPvPRP:U:\)T)+vP)Q)+vHDp0p^0SPPUWRboRouS}SPP%,PP%,P%4I?:;I&I$>I:;I'	I
.:;' :;I4:;I
:;
I:;8I!I7$>.@B:;'?:;I4:;I1UXYW1411XYW41111BB1 .:;'I<?!'".:;'<?#.@B:;'$1B%B&'U%
:;%4I?:;4I:;I!I7I:;I	'
$>.@B:;'4:;I
4:;IB.@B:;'$>%4I:;I!I7I:;I'$>	.@B:;'
4:;I4:;IB
$>U%
:;9|7>"?S	0{&DIeR	@&jIt<(G?				B<Pn
b;SeXe?-
8m:V[`k	Fv
/$,13t>
oooo	6
!m!Vo$f%g%i&9&q#|1#|u#r
wwBwow>"V22e62S5eb4;X6e;J$/Bj?"e@J@=
?b#.9DO9Zz?"(?"+y?"	-~C?"]?"Qs?"?"Q|T~Uf?"Q|T~U 
\;	!"#@"Ve\be;SeeXeebhh^g~4@"P@"QHTPU|@"P
A"QHTPU| #;	;	e	e"M,# A"[VVbYYX$RA"%PyA""+[
4j&	;	e	ep/usr/src/lib/csu/amd64/crti.S/usr/obj/usr/src/amd64.amd64/lib/csu/amd64FreeBSD clang version 11.0.1 (git@github.com:llvm/llvm-project.git llvmorg-11.0.1-0-g43ff75f2c3fe)init&fini&97A"T?$	H&UA	a&arldq	
UD	a&\i	a&arA",VEIbL
KaPA"A"$V1o-9|,7&,?	a&K\Vd[$?+	a&t?.	a&	&,V3
b6I5KP&
-\/usr/src/lib/csu/amd64/crtn.S/usr/obj/usr/src/amd64.amd64/lib/csu/amd64FreeBSD clang version 11.0.1 (git@github.com:llvm/llvm-project.git llvmorg-11.0.1-0-g43ff75f2c3fe)04AXz&&&&_finifinalizerapfn/usr/src/lib/csu/common/crtbegin.cFreeBSD clang version 11.0.1 (git@github.com:llvm/llvm-project.git llvmorg-11.0.1-0-g43ff75f2c3fe)handle_argvhandle_static_initlong unsigned intr_infocpuid_count__size_t__JCR_END__Elf64_Xword__prognameElf64_Relas__ARRAY_SIZE_TYPE__intint64_tcpu_stdext_feature2_initargvenv__JCR_LIST__cpu_stdext_feature/usr/src/lib/csu/common/crtend.c__uint32_t__DTOR_LIST__charElf_Addrunsigned intdo_cpuidu_int_init_tls__uintptr_tr_offset__int64_tElf_Relauint64_tuint32_tElf64_Sxwordregister_classescx__do_global_dtors_auxsize_tncrt_funcrpptrtarget/usr/src/lib/csu/amd64/crt1_c.cuintptr_taxmain__do_global_ctors_aux__uint64_tElf64_Addrcrt1_handle_relaarray_sizelong int_startenvironcleanup__CTOR_LIST____CTOR_END__where/usr/obj/usr/src/amd64.amd64/lib/csu/amd64argccpu_feature2__DTOR_END__process_irelocsr_addendcpu_featureatexit__dso_handlex,>"AC
J4@"AC
M	, A"[AC
BgEx$A",AC
Be$A"$KC
Ix$&,AC
Be&
/usr/usr/obj/usr/src/amd64.amd64src/lib/csu/common/ignore_init.ctmp/usr/include/x86/_types.htmp/usr/include/sys/_stdint.htmp/usr/include/sys/elf64.htmp/usr/include/sys/elf_generic.hsrc/lib/csu/amd64/crt1_c.ctmp/usr/include/machine/cpufunc.hsrc/lib/csu/amd64/reloc.ctmp/usr/include/sys/types.htmp/usr/include/stdlib.hsrc/lib/libc/include/libc_private.h	>"2	
>/~tJ<.<<.BtJD<<5.J,<.wHJ9JDX
<J<<DJ<<3	X
<J/g.Z"J/g.[<
k</Kg.@:
/usr/src/lib/csu/commoncrtbrand.SD>
/usr/src/lib/csu/commonfeature_note.SHB
/usr/src/lib/csu/commonignore_init_note.Sa5
/usr/src/lib/csu/amd64crti.S	&!	&(@:
/usr/src/lib/csu/commoncrtbrand.S}:
/usrsrc/lib/csu/common/crtbegin.c	A"
	=*l"
5=a8
/usrsrc/lib/csu/common/crtend.c	&3
=*lc5
/usr/src/lib/csu/amd64crtn.S	&K	&!K<&&<&&
 A"[@"Ue'2a&@a&Na&[A",qA"$H&pJ"J"`G"J"F"p&P"S"+Q"O& &&""j)&29>Hp"jNT &a"	p "}&"@P"z
&)&H "j`=#5&J#?#j
&&&%&-5>D&LR[al#jsx#0#&P$jD&&I$X&&&&P&@|&'&1+$Ep&J$&U(&`G$l&x8&H&`&P&@&&l&0&4&t&@&8&
d&h&'&9&D/$Vp:$
^&0h.$$s&x&`0$
&&̿&ȿ&п&ؿ&Ŀ&Կ&&ܿ&y$y$mDx$t%)&5&Ex&S&e&oP&y&Ѕ&І&&&p&&&p&@&@&&AP&&0&&,q&;p&M"U`&X`&^&`f&o"@xp&@p%$"&"&"&" ""@.P"@Ja&g&`pp&y &-	Њ&>P&&&&0#%H&@&&&P&&&&& &.&?&I&PWP.%<d8&x M%M%L%L%@L% 8%	4%&	`Z% 	pb&5	<%LD	@d&W	*%!`	0&j	)%!r	*%yz	*%n			 n%	`&	p&	&	&	h%		 &	$&			


#
+
3
;
%6D
K
T
 %_
%h
%iu
|



a&
a&
a&
&,
g&
>"
>"
a&
a& >"4>"w&}&J0{&>"@&A" *EQjz

/
G
X
d
o
z





0T"
`&
P"D
%%
|%
X&d#l#
P&. +%"@"J "Y	R"_#JhЗ#v0#
~0#":%
"@{&"N$#h&!(4?C%|P%gZ%.d"c	pP%X|\#p%v
&b%%=%`"6z#c
#
PM$9+$"%fu%1
`)%c$к%/Ё$:%ELS[J"g@r%it #4~4Lcw2<RcpV%(1%`C%iY%A%	&:JWdmv$%!BKX`gs|$5DTbo'=Rk~#>Yo~!6DTdz
0%p%0q%Dq%rX-%cq5%D@R%,@%F%w<%=%$->Sav"w9%(2;CJYo-<Up'5DKQX`"hpz*<Tav&7K[kz   . 9 C T ^ w       !!(!<!J!W!p!!!!!!!""#"1"E"Z"s"""""""##:#I#c#t######$$$$p>%($R%+3$C$K%O$PD%^$I%i$pD%u$C#$<#D$$PI#t$K%1$@O%$H%$@M%$F%~$>%l$$%%E#%1%E%P%_%m%(%|%%%%%%%%%
&&6&M&g&x&&&&&&&''$'0'C'L'`'t''''''''
((-(E(R(g(|(((((()$)7)L)^)s)))))))*+*B*e*w********+%+E+^+}++++++
,,),<,J,Z,f,v,,,,,,,,--/-8-F-V-[-k-{------P+%3---...,.7.M.^.m.w.......//%/4/I/\/p////////0+0J0g0000001,1>1I1[1e1n11111111122*2A2W2d22222222223373H3W3a3m3w333333^%3 ^%34j%4m%j4"4e%#;4M4]4_%d40&v4{4 &44]%444d%4[%4g%4@&44455)555C5U5g55555556656E6R6g6{666666l%66g%66D&77+777K7Z7e7p7{77777777788858L8c8w888888888999*979A9Q9]9a9m9y99999999999999:0$:$:`$':1:>:O:\:q:x:}:&::::\%::::::;;#;3;J;X;p;;;;;;;<(<4<A<S<g<s<<<<<<<<<<==2=G=\=q========>>$>>>Q>h>>>>>>?-?K?X?e?y????(%???@@#@0@:%;@B@@%O@W@l@q@|@@@@@@A4AJAOAH&bAP&pAwA|AAAAAAAAAAAAq%
BB/BFBZBvBBBBBBC"C6CJCXClCCCCCCCD!D1D%;D%gEDRD0%fD%6{Dp%D(&D%yD%ZDDP%ODDDDE&E:E\EjExEEEEEEEEF%F7FKFdFwFFFFFFFFFFGG'G6GFGUGhG{GGGGGGGGG
HH-H@HSHeHwHHHHHHHII(I<INIaIuIIIIIIIJ+JDJUJgJxJJJJJJ.interp.note.tag.dynsym.gnu.version.gnu.version_r.gnu.hash.hash.dynstr.rela.dyn.rela.plt.rodata.eh_frame_hdr.eh_frame.text.init.fini.plt.ctors.dtors.jcr.init_array.data.rel.ro.dynamic.got.data.got.plt.bss.comment.debug_loc.debug_abbrev.debug_info.debug_ranges.debug_str.debug_frame.debug_line.debug_aranges.symtab.shstrtab.strtabcrt1_c.cfinalizerhandle_static_initcrtbegin.c__CTOR_LIST____DTOR_LIST____JCR_LIST____do_global_dtors_auxregister_classesopenssl.cSortFnByNamecmpdo_cmdhashlock_dbg_cblock_dbg_cb.modesverify.ccbcheckload_untrustedv_verboseasn1pars.creq.cadd_attribute_object.bufbatchreq_cbreq_confdgst.cdh.cdhparam.cdh_cbenc.cenc_main.bufenc_main.magicshow_ciphersshow_ciphers.npasswd.ccov_2chardo_passwdmd5crypt.out_bufpasswd_main.passwds_staticgendh.cerrstr.cca.ccertifyconfdo_bodydo_revokeextconfmsie_hackpreservesectionpkcs7.ccrl2p7.ccrl.cbio_outrsa.crsautl.cdsa.cdsaparam.cdsa_cbec.cecparam.cecparam_print_varx509.ccallbreqfilegenrsa.cgenrsa_cbgendsa.cs_server.caccept_socketbio_s_outcert_status_cbcipherctxctx2dh512_gdh512_penable_timeoutsengine_idgenerate_session_idhacklocal_argclocal_argvprint_statss_cert_files_cert_file2s_dcert_files_debugs_dkey_files_key_files_key_file2s_msgs_nbios_nbio_tests_quiets_server_session_id_contexts_server_verifys_tlsextdebugs_tlsextstatussession_id_prefixsocket_mtussl_servername_cbsv_bodytlscstatptmp_rsa_cbtmp_rsa_cb.rsa_tmpwwwwww_bodys_client.cbio_c_outc_Pausec_debugc_ign_eofc_msgc_nbioc_quietc_showcertsc_status_reqc_tlsextdebugocsp_resp_cbprint_stuffspeed.cKDF1_SHA1Time_F.tendTime_F.tend.239Time_F.tstartTime_F.tstart.238dsa1024_gdsa1024_pdsa1024_privdsa1024_pubdsa1024_qdsa2048_gdsa2048_pdsa2048_privdsa2048_pubdsa2048_qdsa512_gdsa512_pdsa512_privdsa512_pubdsa512_qdsa_resultsecdh_resultsecdsa_resultsgetrusage_usedgettimeofday_usedlengthsmrnamesresultsrnd_fakernd_seedrsa_resultssig_donespeed_main.dsa_bitsspeed_main.keyspeed_main.key16speed_main.key2speed_main.key24speed_main.key3speed_main.key32speed_main.rsa_bitsspeed_main.test_curvesspeed_main.test_curves_bitsspeed_main.test_curves_namestest1024test2048test4096test512usertimes_time.cCAfileCApathbytes_readdoConnectionhostmaxTimeperforms_time_meths_time_usage.umsgs_www_pathst_bugst_cert_filet_key_filetm_Time_F.tendtm_Time_F.tstarttm_ciphertm_ctxapps.capp_get_passapp_get_pass.pwdbioindex_name_cmp_LHASH_COMPindex_name_hash_LHASH_HASHindex_name_qualindex_serial_cmp_LHASH_COMPindex_serial_hash_LHASH_HASHload_netscape_keyload_pkcs12nodes_printset_cert_ex.cert_tblset_multi_optsset_name_ex.ex_tblui_closeui_methodui_openui_readui_writes_cb.cs_socket.cGetHostByNamedo_accept.fromghbn_cacheghbn_hitsghbn_misshost_ipapp_rand.cegdsocketseededversion.csess_id.cciphers.cnseq.cpkcs12.cpkcs8.cspkac.csmime.csmime_cbrand.cengine.cappend_bufidentityutil_do_cmdsocsp.cprime.ccms.ccrtend.c__CTOR_END____DTOR_END____JCR_END____do_global_ctors_aux_DYNAMIC__fini_array_end__fini_array_start__init_array_end__init_array_start__preinit_array_end__preinit_array_start__progname__rela_iplt_end__rela_iplt_start_fini_init_init_tls_startatexitenvironexitmain_Jv_RegisterClasses__dso_handleBIO_ctrlBIO_freeBIO_free_allBIO_newBIO_new_fpBIO_printfBIO_s_fileCONF_modules_unloadCRYPTO_cleanup_all_ex_dataCRYPTO_freeCRYPTO_malloc_debug_initCRYPTO_mem_ctrlCRYPTO_mem_leaksCRYPTO_set_locking_callbackCRYPTO_set_mem_debug_functionsCRYPTO_set_mem_debug_optionsENGINE_cleanupENGINE_load_builtin_enginesERR_clear_errorERR_free_stringsERR_load_crypto_stringsERR_remove_stateEVP_cleanupNCONF_freeNCONF_loadNCONF_newOPENSSL_add_all_algorithms_noconf__stderrp__stdinp__stdoutpasn1parse_mainbio_errca_mainchopup_argsciphers_mainconfigcrl2pkcs7_maincrl_maindefault_config_filedestroy_ui_methoddgst_maindh_maindhparam_maindsa_maindsaparam_mainec_mainecparam_mainenc_mainengine_mainerrstr_mainfflushfgetsfprintffputsfunctionsfwritegendh_maingendsa_maingenrsa_maingetenvin_FIPS_modelh_freelh_insertlh_newlh_retrievelh_strhashmake_config_namenseq_mainocsp_mainpasswd_mainpkcs12_mainpkcs7_mainpkcs8_mainprime_mainprogram_nameqsortrand_mainreq_mainrsa_mainrsautl_mains_client_mains_server_mains_time_mainsess_id_mainsetup_ui_methodsignalsmime_mainspeed_mainspkac_mainstrcmpstrlenstrncmpverify_mainversion_mainx509_mainBIO_new_fileERR_print_errorsPEM_X509_INFO_read_bioX509_INFO_freeX509_LOOKUP_ctrlX509_LOOKUP_fileX509_LOOKUP_hash_dirX509_NAME_onelineX509_PURPOSE_get0X509_PURPOSE_get0_nameX509_PURPOSE_get0_snameX509_PURPOSE_get_countX509_STORE_CTX_freeX509_STORE_CTX_initX509_STORE_CTX_newX509_STORE_CTX_trusted_stackX509_STORE_add_lookupX509_STORE_freeX509_STORE_newX509_STORE_set1_paramX509_STORE_set_flagsX509_VERIFY_PARAM_freeX509_freeX509_get_subject_nameX509_verify_certX509_verify_cert_error_stringabortargs_verifyload_certload_configpolicies_printprintfputssetup_enginesk_freesk_new_nullsk_numsk_pop_freesk_pushsk_shiftASN1_TYPE_freeASN1_TYPE_getASN1_generate_nconfASN1_parse_dumpASN1_tag2strBIO_f_base64BIO_pushBIO_readBIO_writeBUF_MEM_freeBUF_MEM_growBUF_MEM_newNCONF_get_stringOBJ_cleanupOBJ_create_objectsatoid2i_ASN1_TYPEi2d_ASN1_TYPEperrorsk_valuestr2fmtASN1_INTEGER_freeASN1_STRING_set_default_mask_ascASN1_dupBIO_snprintfBN_freeBN_newBN_num_bitsBN_printBN_set_wordBUF_strlcatBUF_strlcpyDSA_freeDSA_generate_keyEC_GROUP_freeEC_GROUP_get_degreeEC_KEY_dupEC_KEY_freeEC_KEY_generate_keyEC_KEY_get0_groupEC_KEY_newEC_KEY_set_groupERR_peek_errorEVP_PKEY_assignEVP_PKEY_freeEVP_PKEY_newEVP_des_ede3_cbcEVP_dss1EVP_ecdsaEVP_get_digestbynameEVP_sha1NCONF_get_number_eNCONF_get_sectionOBJ_txt2nidPEM_read_bio_DSAparamsPEM_read_bio_ECPKParametersPEM_read_bio_X509PEM_read_bio_X509_REQPEM_write_bio_PUBKEYPEM_write_bio_PrivateKeyPEM_write_bio_X509PEM_write_bio_X509_REQPEM_write_bio_X509_REQ_NEWRSA_freeRSA_generate_key_exRSA_newX509V3_EXT_REQ_add_nconfX509V3_EXT_add_nconfX509V3_set_ctxX509V3_set_nconfX509_NAME_add_entry_by_NIDX509_NAME_add_entry_by_txtX509_NAME_entry_countX509_NAME_freeX509_REQ_add1_attr_by_NIDX509_REQ_add1_attr_by_txtX509_REQ_freeX509_REQ_get_pubkeyX509_REQ_newX509_REQ_print_exX509_REQ_set_pubkeyX509_REQ_set_subject_nameX509_REQ_set_versionX509_REQ_signX509_REQ_verifyX509_get_pubkeyX509_get_serialNumberX509_gmtime_adjX509_newX509_print_exX509_set_issuer_nameX509_set_pubkeyX509_set_serialNumberX509_set_subject_nameX509_set_versionX509_signadd_oid_sectionapp_RAND_load_fileapp_RAND_load_filesapp_RAND_write_fileapp_passwdd2i_DSAparamsd2i_X509_REQ_biofputci2d_DSAparamsi2d_X509_REQ_bioi2d_X509_bioload_keyparse_nameprint_namerand_serials2i_ASN1_INTEGERset_cert_exset_name_exBIO_debug_callbackBIO_f_mdBIO_getsBIO_set_callbackBIO_set_callback_argCRYPTO_mallocEVP_MD_CTX_set_flagsEVP_PKEY_sizeEVP_SignFinalEVP_VerifyFinalEVP_md5HMAC_CTX_cleanupHMAC_CTX_initHMAC_FinalHMAC_Init_exOBJ_nid2snOPENSSL_cleansedo_fpload_pubkeyASN1_d2i_bioASN1_i2d_bioBN_bn2binDH_checkDH_freeDH_newDHparams_printPEM_read_bio_DHparamsPEM_write_bio_DHparamsd2i_DHparamsi2d_DHparamsDH_generate_parameters_exDSA_dup_DHDSA_generate_parameters_exDSA_newsscanfBIO_f_cipherBIO_number_readBIO_number_writtenBIO_set_flagsEVP_BytesToKeyEVP_CIPHER_CTX_set_flagsEVP_CIPHER_CTX_set_paddingEVP_CIPHER_iv_lengthEVP_CIPHER_nidEVP_CipherInit_exEVP_get_cipherbynameEVP_read_pw_stringOBJ_NAME_do_all_sortedOBJ_nid2lnRAND_pseudo_bytes_CurrentRuneLocale_ThreadRuneLocale__mb_sb_limit__tls_get_addrfclosefopenmemsetputcharset_hexsetvbufDES_cryptEVP_DigestFinal_exEVP_DigestInit_exEVP_DigestUpdateEVP_MD_CTX_cleanupEVP_MD_CTX_init__assertstrchrstrncatERR_error_string_nERR_get_string_tableSSL_load_error_stringslh_node_stats_biolh_node_usage_stats_biolh_stats_bioASN1_ENUMERATED_freeASN1_ENUMERATED_newASN1_ENUMERATED_setASN1_GENERALIZEDTIME_freeASN1_GENERALIZEDTIME_newASN1_GENERALIZEDTIME_set_stringASN1_INTEGER_newASN1_INTEGER_setASN1_INTEGER_to_BNASN1_OBJECT_freeASN1_PRINTABLE_typeASN1_STRING_cmpASN1_TIME_checkASN1_TIME_freeASN1_TIME_newASN1_TIME_printASN1_UNIVERSALSTRING_to_stringASN1_UTCTIME_freeASN1_UTCTIME_newASN1_UTCTIME_set_stringBIO_putsBN_add_wordBN_bn2hexBN_hex2bnBN_to_ASN1_INTEGERBUF_strdupCONF_freeCONF_get_sectionCONF_loadEVP_PKEY_copy_parametersEVP_PKEY_missing_parametersNETSCAPE_SPKI_b64_decodeNETSCAPE_SPKI_freeNETSCAPE_SPKI_get_pubkeyNETSCAPE_SPKI_verifyOBJ_nid2objOBJ_obj2nidOBJ_txt2objPEM_write_bio_X509_CRLTXT_DB_get_by_indexTXT_DB_insertTXT_DB_writeX509V3_EXT_CRL_add_nconfX509_CRL_add0_revokedX509_CRL_add1_ext_i2dX509_CRL_freeX509_CRL_newX509_CRL_set_issuer_nameX509_CRL_set_lastUpdateX509_CRL_set_nextUpdateX509_CRL_set_versionX509_CRL_signX509_CRL_sortX509_EXTENSION_freeX509_NAME_ENTRY_freeX509_NAME_ENTRY_get_dataX509_NAME_ENTRY_get_objectX509_NAME_add_entryX509_NAME_delete_entryX509_NAME_dupX509_NAME_get_entryX509_NAME_get_index_by_NIDX509_NAME_get_index_by_OBJX509_NAME_newX509_REQ_check_private_keyX509_REQ_printX509_REVOKED_add1_ext_i2dX509_REVOKED_newX509_REVOKED_set_revocationDateX509_REVOKED_set_serialNumberX509_check_private_keyX509_get_default_cert_areaX509_printX509_to_X509_REQX509_verifyaccessatolcopy_extensionsfree_indexi2a_ASN1_OBJECTindex_indexindex_name_cmpload_indexload_serialmake_revocation_strmake_revokedmemcpyold_entry_printparse_yesnorotate_indexrotate_serialsave_indexsave_serialset_ext_copystatstrcasecmpstrcpyunpack_revinfoPEM_read_bio_PKCS7PEM_write_bio_PKCS7PKCS7_freeX509_CRL_printd2i_PKCS7_biodump_cert_texti2d_PKCS7_bioPEM_read_bio_X509_CRLPKCS7_SIGNED_newPKCS7_newd2i_X509_CRL_bioEVP_MD_typeX509_CRL_digestX509_CRL_get_ext_d2iX509_CRL_verifyX509_NAME_hashX509_OBJECT_free_contentsX509_STORE_CTX_cleanupX509_STORE_get_by_subjecti2a_ASN1_INTEGERi2d_X509_CRL_bioERR_get_errorERR_reason_error_stringEVP_PKEY_get1_RSAPEM_write_bio_RSAPrivateKeyPEM_write_bio_RSA_PUBKEYRSA_check_keyRSA_printi2d_RSAPrivateKey_bioi2d_RSA_NETi2d_RSA_PUBKEY_bioBIO_dumpRSA_private_decryptRSA_private_encryptRSA_public_decryptRSA_public_encryptRSA_sizeDSA_printEVP_PKEY_get1_DSAPEM_write_bio_DSAPrivateKeyPEM_write_bio_DSA_PUBKEYi2d_DSAPrivateKey_bioi2d_DSA_PUBKEY_bioDSAparams_printPEM_write_bio_DSAparamsEC_KEY_printEC_KEY_set_asn1_flagEC_KEY_set_conv_formPEM_read_bio_ECPrivateKeyPEM_read_bio_EC_PUBKEYPEM_write_bio_ECPKParametersPEM_write_bio_ECPrivateKeyPEM_write_bio_EC_PUBKEYd2i_ECPrivateKey_biod2i_EC_PUBKEY_bioi2d_ECPKParametersi2d_ECPrivateKey_bioi2d_EC_PUBKEY_bioECPKParameters_printEC_GROUP_checkEC_GROUP_get0_generatorEC_GROUP_get_cofactorEC_GROUP_get_curve_GFpEC_GROUP_get_orderEC_GROUP_get_point_conversion_formEC_GROUP_method_ofEC_GROUP_new_by_curve_nameEC_GROUP_set_asn1_flagEC_GROUP_set_point_conversion_formEC_GROUP_set_seedEC_METHOD_get_field_typeEC_POINT_point2bnEC_get_builtin_curvesOBJ_sn2nidd2i_ECPKParametersEVP_PKEY_save_parametersOBJ_createPEM_write_bio_X509_AUXX509_PURPOSE_get_idX509_STORE_CTX_get_current_certX509_STORE_CTX_get_errorX509_STORE_CTX_get_error_depthX509_STORE_CTX_set_certX509_STORE_CTX_set_flagsX509_STORE_set_default_pathsX509_add1_reject_objectX509_add1_trust_objectX509_alias_get0X509_alias_set1X509_asn1_methX509_check_purposeX509_cmp_timeX509_delete_extX509_digestX509_email_freeX509_get1_emailX509_get1_ocspX509_get_ext_countX509_get_issuer_nameX509_issuer_name_hashX509_ocspid_printX509_reject_clearX509_subject_name_hashX509_trust_cleari2d_ASN1_HEADERi2d_X509i2d_X509_NAMEi2d_X509_PUBKEYtimeEVP_aes_128_cbcEVP_aes_192_cbcEVP_aes_256_cbcEVP_des_cbcEVP_idea_cbcRAND_statusRSA_X931_generate_key_expassword_callbackBIO_f_bufferBIO_f_nbio_testBIO_f_sslBIO_int_ctrlBIO_new_dgramBIO_new_socketBIO_s_nullBIO_sock_should_retryBIO_socket_ioctlBIO_test_flagsBN_bin2bnDTLSv1_server_methodEC_KEY_new_by_curve_nameOCSP_CERTID_freeOCSP_REQUEST_add_extOCSP_REQUEST_freeOCSP_REQUEST_newOCSP_RESPONSE_freeOCSP_RESPONSE_printOCSP_cert_to_idOCSP_parse_urlOCSP_request_add0_idPEM_ASN1_write_bioSSL_CIPHER_get_nameSSL_CIPHER_get_versionSSL_CTX_callback_ctrlSSL_CTX_ctrlSSL_CTX_freeSSL_CTX_get_cert_storeSSL_CTX_load_verify_locationsSSL_CTX_newSSL_CTX_set_cipher_listSSL_CTX_set_client_CA_listSSL_CTX_set_cookie_generate_cbSSL_CTX_set_cookie_verify_cbSSL_CTX_set_default_verify_pathsSSL_CTX_set_generate_session_idSSL_CTX_set_info_callbackSSL_CTX_set_quiet_shutdownSSL_CTX_set_session_id_contextSSL_CTX_set_tmp_rsa_callbackSSL_CTX_set_verifySSL_SESSION_printSSL_acceptSSL_callback_ctrlSSL_clearSSL_ctrlSSL_do_handshakeSSL_freeSSL_get_SSL_CTXSSL_get_certificateSSL_get_ciphersSSL_get_current_cipherSSL_get_errorSSL_get_peer_certificateSSL_get_rbioSSL_get_servernameSSL_get_sessionSSL_get_shared_ciphersSSL_get_verify_resultSSL_get_wbioSSL_has_matching_session_idSSL_library_initSSL_load_client_CA_fileSSL_newSSL_pendingSSL_readSSL_renegotiateSSL_set_SSL_CTXSSL_set_accept_stateSSL_set_bioSSL_set_msg_callbackSSL_set_session_id_contextSSL_set_shutdownSSL_set_verifySSL_stateSSL_versionSSL_writeSSLv23_server_methodSSLv2_server_methodSSLv3_server_methodTLSv1_server_method__isthreadedapps_ssl_info_callbackbio_dump_callbackclosedo_serverextract_portfilenogenerate_cookie_callbacki2d_OCSP_RESPONSEi2d_SSL_SESSIONmsg_cbprocess_responderreads_crlfselectset_cert_key_stuffshutdownsleeptlsext_cbverify_callbackverify_cookie_callbackverify_depthwriteBIO_dump_indentBIO_popDTLSv1_client_methodENGINE_by_idENGINE_freeEVP_PKEY_bitsPEM_ASN1_read_bioSSL_COMP_get_nameSSL_CTX_set_client_cert_engineSSL_SESSION_freeSSL_get_client_CA_listSSL_get_current_compressionSSL_get_current_expansionSSL_get_fdSSL_get_peer_cert_chainSSL_get_servername_typeSSL_set_connect_stateSSL_set_sessionSSL_shutdownSSLv23_client_methodSSLv2_client_methodSSLv3_client_methodTLSv1_client_method__errord2i_OCSP_RESPONSEd2i_SSL_SESSIONextract_host_portgetsocknameinit_clientstrstrverify_errorAES_cbc_encryptAES_ige_encryptAES_optionsAES_set_encrypt_keyBF_cbc_encryptBF_optionsBF_set_keyBN_optionsCAST_cbc_encryptCAST_set_keyDES_ede3_cbc_encryptDES_ncbc_encryptDES_optionsDES_set_key_uncheckedDSA_signDSA_verifyECDH_compute_keyECDSA_signECDSA_verifyEC_KEY_get0_public_keyEC_KEY_precompute_multEVP_CIPHER_CTX_cleanupEVP_CIPHER_CTX_initEVP_DecryptFinal_exEVP_DecryptInit_exEVP_DecryptUpdateEVP_DigestEVP_EncryptFinal_exEVP_EncryptInit_exEVP_EncryptUpdateEVP_md2EVP_md4EVP_ripemd160HMAC_UpdateMD2_optionsRAND_cleanupRAND_seedRC2_cbc_encryptRC2_set_keyRC4RC4_optionsRC4_set_keyRSA_PKCS1_SSLeayRSA_set_default_methodRSA_signRSA_verifySHA1SHA256SHA512SSLeay_versionalarmatofd2i_RSAPrivateKeydupfdopenforkget_dsa1024get_dsa2048get_dsa512getrusagegettimeofdayidea_cbc_encryptidea_optionsidea_set_encrypt_keymallocpiperunsysconfBIO_s_connectSSL_connectset_cert_stufftimesASN1_HEADER_freeBIO_new_fdBN_pseudo_randBUF_MEM_grow_cleanCONF_modules_loadCRYPTO_reallocENGINE_ctrlENGINE_ctrl_cmdENGINE_ctrl_cmd_stringENGINE_get_idENGINE_load_private_keyENGINE_load_public_keyENGINE_register_all_completeENGINE_set_defaultEVP_PKEY_set1_RSAOPENSSL_load_builtin_modulesPEM_read_bio_PUBKEYPEM_read_bio_PrivateKeyPEM_read_bio_X509_AUXPKCS12_freePKCS12_parsePKCS12_verify_macTXT_DB_create_indexTXT_DB_freeTXT_DB_readUI_OpenSSLUI_add_input_stringUI_add_verify_stringUI_construct_promptUI_create_methodUI_ctrlUI_destroy_methodUI_freeUI_get0_user_dataUI_get_input_flagsUI_get_string_typeUI_method_get_closerUI_method_get_openerUI_method_get_readerUI_method_get_writerUI_method_set_closerUI_method_set_openerUI_method_set_readerUI_method_set_writerUI_new_methodUI_processUI_set_resultX509V3_conf_freeX509V3_parse_listX509_EXTENSION_get_objectX509_NAME_print_exX509_POLICY_NODE_printX509_PURPOSE_get_by_snameX509_REQ_get_extensionsX509_STORE_CTX_get0_policy_treeX509_STORE_CTX_get_explicit_policyX509_VERIFY_PARAM_add0_policyX509_VERIFY_PARAM_newX509_VERIFY_PARAM_set_flagsX509_VERIFY_PARAM_set_purposeX509_add_extX509_get_extX509_get_ext_by_OBJX509_policy_tree_get0_policiesX509_policy_tree_get0_user_policiesa2i_ASN1_INTEGERapp_initd2i_ASN1_HEADERd2i_PKCS12_biod2i_PUBKEY_biod2i_PrivateKey_biod2i_RSA_NETd2i_X509_bioload_certsrenamesetup_verifystrrchrBIO_get_callback_argHMACRAND_bytesSSL_CTX_check_private_keySSL_CTX_use_PrivateKeySSL_CTX_use_PrivateKey_fileSSL_CTX_use_certificateSSL_CTX_use_certificate_fileSSL_alert_desc_string_longSSL_alert_type_string_longSSL_state_string_longbcmpcookie_initializedcookie_secretacceptbindconnectgethostbyaddrgethostbynamegetservbynamelistensetsockoptsocketRAND_egdRAND_file_nameRAND_load_fileRAND_write_fileapp_RAND_allow_write_fileSSLeaySSL_SESSION_newSSL_CIPHER_descriptionSSL_get_cipher_listNETSCAPE_CERT_SEQUENCE_freeNETSCAPE_CERT_SEQUENCE_newPEM_read_bio_NETSCAPE_CERT_SEQUENCEPEM_write_bio_NETSCAPE_CERT_SEQUENCEASN1_INTEGER_getEVP_PKCS82PKEYEVP_PKEY_add1_attr_by_NIDPBEPARAM_freePKCS12_SAFEBAG_freePKCS12_certbag2x509PKCS12_createPKCS12_decrypt_skeyPKCS12_get_attr_genPKCS12_set_macPKCS12_unpack_authsafesPKCS12_unpack_p7dataPKCS12_unpack_p7encdataPKCS8_PRIV_KEY_INFO_freeX509_STORE_CTX_get1_chainX509_STORE_load_locationsX509_keyid_set1alg_printcert_loadd2i_PBEPARAMdump_certs_keys_p12dump_certs_pkeys_bagdump_certs_pkeys_bagsencget_cert_chainhex_prini2d_PKCS12_bioprint_attribssk_deleteuni2ascEVP_PKEY2PKCS8_brokenPEM_read_bio_PKCS8PEM_read_bio_PKCS8_PRIV_KEY_INFOPEM_write_bio_PKCS8PEM_write_bio_PKCS8_PRIV_KEY_INFOPKCS8_decryptPKCS8_encryptX509_SIG_freed2i_PKCS8_PRIV_KEY_INFO_biod2i_PKCS8_bioi2d_PKCS8_PRIV_KEY_INFO_bioi2d_PKCS8_bioi2d_PrivateKey_bioASN1_STRING_setNCONF_load_bioNETSCAPE_SPKI_b64_encodeNETSCAPE_SPKI_newNETSCAPE_SPKI_printNETSCAPE_SPKI_set_pubkeyNETSCAPE_SPKI_signEVP_rc2_40_cbcEVP_rc2_64_cbcEVP_rc2_cbcPKCS7_decryptPKCS7_encryptPKCS7_get0_signersPKCS7_signPKCS7_verifySMIME_read_PKCS7SMIME_write_PKCS7ENGINE_finishENGINE_get_DHENGINE_get_DSAENGINE_get_RANDENGINE_get_RSAENGINE_get_ciphersENGINE_get_digestsENGINE_get_firstENGINE_get_nameENGINE_get_nextENGINE_initERR_print_errors_fpstrspnASN1_GENERALIZEDTIME_printBIO_new_acceptBIO_new_connectBIO_new_sslOCSP_BASICRESP_freeOCSP_BASICRESP_newOCSP_REQUEST_printOCSP_REQ_CTX_freeOCSP_RESPONSE_newOCSP_SINGLERESP_add1_ext_i2dOCSP_basic_add1_statusOCSP_basic_signOCSP_basic_verifyOCSP_cert_id_newOCSP_cert_status_strOCSP_check_nonceOCSP_check_validityOCSP_copy_nonceOCSP_crl_reason_strOCSP_id_get0_infoOCSP_id_issuer_cmpOCSP_onereq_get0_idOCSP_request_add1_nonceOCSP_request_onereq_countOCSP_request_onereq_get0OCSP_request_signOCSP_resp_find_statusOCSP_response_createOCSP_response_get1_basicOCSP_response_statusOCSP_response_status_strOCSP_sendreq_bioOCSP_sendreq_nbioOCSP_sendreq_newOpenSSLDieX509_get0_pubkey_bitstrd2i_OCSP_REQUESTi2d_OCSP_REQUESTBN_dec2bnBN_is_prime_ex 	 H XPo`S `S(oZ Z@7oXZ XZ$A|Z |ZGLu Lu~9OЮ ЮY Mc2 k"4y">".&
&
&
3a&Aa&Aa&Aa&Aa&Ag&Gi&I0{&0K#0&0o@&808i{
	$0/PX<HW (t'_HqiJ

Zerion Mini Shell 1.0