nss-devel-3.44.0-7.el6_10$>4w&+kDw>8?d   P CIP4 4 4 4 4 4 4444(e8l3983:S3Gl4H<4I 4X@YP\Lj4]X4^bjdeflt4u4v̤w4x4yδCnss-devel3.44.07.el6_10Development libraries for Network Security ServicesHeader and Library files for doing development with Network Security Services.]V[x86-02.bsys.centos.org sCentOSMPLv2.0CentOS BuildSystem Development/Librarieshttp://www.mozilla.org/projects/security/pki/nss/linuxx86_64  TCyQGy'!r7 p0$%z+#z?3c_? ;f:8DNpA큤]I]I\\\\\\\\\\\\\\\\\\\\\R'\\\\\\\]Ib\\\\\\\\\\\\\\\\\]Ib]I]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-3.44.0-7.el6_10.src.rpmnss-staticpkgconfig(nss)nss-develnss-devel(x86-64)@@ @ @      /bin/sh/usr/bin/pkg-confignspr-develnssnss-softokn-develnss-util-develpkgconfigpkgconfig(nspr)pkgconfig(nss-util)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(VersionedDependencies)rpmlib(PayloadIsXz)4.21.03.44.0-7.el6_104.21.03.44.03.0.4-14.6.0-14.0-13.0.3-15.2-14.8.0]@]]]n]z@]c]c[9@Z3@Z@ZZ2@ZZ@Z`@Z%ZZZ)-@Z%8Y@Y i@X@X @X,Xf@Xs{@XOXF@XAb@X,J@X%X#X!@X@X2@X@W%W@V3V@VJVV͛@V@Vk@VVy;@VMVLh@V'~@U@U|@UzUrU@U2G@U+U) U'@U"u@U@TuTd@T"@SS@S@S׌SSQ@S@S-S@S@S@S!@SSU@SFS2@S2@Rb@R߲RƦ@RR$RR;R].@R].@RR@RQPRNREs@R@-@R:@R:@R9R2@R2@R+@R)R)R R@RR@Q@Q@Qzl@QR@QQQNP@P[PqPM@PM@Pd@P@P@PPx@Px@PvO@O O@Ọ@O Oc+@O`@O_6O_6OTOLOLOLOB5O&@O#@O@NU@NNGNN@N@NNw.N`@N`@N`@N^"@N\NGNENNN*N*M@M@MUMMlMfH@M] M:M4/@LL@LwLvW@LvW@LvW@LvW@L @K[KKKO@KK]KUKRKRKMKMKLd@KD{@KD{@KD{@K4@K,@K*@K@KJ@J1@JSJSJ@Jv@J@JG@JG@JJJ@JRJ J@JiJiJ@J@JJJu@Ju@Ju@Ju@Ju@J#J#J@J@JJJJ/@J:J:JzJjJ?r@J?r@J,@J)J)J@J{IzIzIIIԨIԨIIII2HHH+H@H@HoH@H`HCHG@GQG]@G@G@G~G-@G-@G-@G}G@G_@GSG1G FFFޚ@F@F@FvsFkF` @EE(EEl$E D@E D@D@D@D@D@DvCC@CC@C@CZCZCZCZBϼ@Bob Relyea - 3.44.0-7Bob Relyea - 3.44.0-6Bob Relyea - 3.44.0-5Bob Relyea - 3.44.0-4Bob Relyea - 3.44.0-3Bob Relyea - 3.44.0-2Bob Relyea - 3.44.0-1Daiki Ueno - 3.36.0-9Daiki Ueno - 3.36.0-8Kai Engert - 3.36.0-7Kai Engert - 3.36.0-6Daiki Ueno - 3.36.0-5Daiki Ueno - 3.36.0-4Daiki Ueno - 3.36.0-3Daiki Ueno - 3.36.0-2Daiki Ueno - 3.36.0-1Daiki Ueno - 3.36.0-0.1.betaDaiki Ueno - 3.34.0-3Daiki Ueno - 3.34.0-2Daiki Ueno - 3.34.0-1Daiki Ueno - 3.28.4-3Kai Engert - 3.28.4-2Daiki Ueno - 3.28.4-1Daiki Ueno - 3.28.3-3Daiki Ueno - 3.28.3-2Daiki Ueno - 3.28.3-1Daiki Ueno - 3.27.1-13Daiki Ueno - 3.27.1-12Daiki Ueno - 3.27.1-11Daiki Ueno - 3.27.1-10Daiki Ueno - 3.27.1-9Daiki Ueno - 3.27.1-8Daiki Ueno - 3.27.1-7Kai Engert - 3.27.1-6Kai Engert - 3.27.1-5Kai Engert - 3.27.1-4Kai Engert - 3.27.1-3Daiki Ueno - 3.27.1-2Daiki Ueno - 3.27.1-1Kai Engert - 3.21.0-8Elio Maldonado - 3.21.0-7Elio Maldonado - 3.21.0-6Elio Maldonado - 3.21.0-5Elio Maldonado - 3.21.0-4Elio Maldonado - 3.21.0-3Elio Maldonado - 3.21.0-2Elio Maldonado - 3.21.0-1Elio Maldonado - 3.19.1-9Elio Maldonado - 3.19.1-7Elio Maldonado - 3.19.1-6Elio Maldonado - 3.19.1-5Elio Maldonado - 3.19.1-4Kai Engert - 3.19.1-3Kai Engert - 3.19.1-2Elio Maldonado - 3.19.1-1Kai Engert - 3.18.0-5.3Elio Maldonado - 3.18.0-5Elio Maldonado - 3.18.0-4Elio Maldonado - 3.18.0-3Elio Maldonado - 3.18.0-2Elio Maldonado - 3.18.0-1Elio Maldonado - 3.16.2.3-4Elio Maldonado - 3.16.2.3-3Elio Maldonado - 3.16.2.3-1Elio Maldonado - 3.16.1-14Elio Maldonado - 3.16.1-13Elio Maldonado - 3.16.1-12Elio Maldonado - 3.16.1-11Elio Maldonado - 3.16.1-10Elio Maldonado - 3.16.1-9Elio Maldonado - 3.16.1-8Elio Maldonado - 3.16.1-7Elio Maldonado - 3.16.1-6Elio Maldonado - 3.16.1-5Elio Maldonado - 3.16.1-4Elio Maldonado - 3.16.1-3Elio Maldonado - 3.16.1-2Elio Maldonado - 3.16.1-1Elio Maldonado - 3.15.3-11Elio Maldonado - 3.15.3-10Elio Maldonado - 3.15.3-9Elio Maldonado - 3.15.3-8Elio Maldonado - 3.15.3-7Elio Maldonado - 3.15.3-6Elio Maldonado - 3.15.3-5Elio Maldonado - 3.15.3-4Elio Maldonado - 3.15.3-3Elio Maldonado - 3.15.3-2Elio Maldonado - 3.15.3-1Elio Maldonado - 3.15.1-15Elio Maldonado - 3.15.1-14Elio Maldonado - 3.15.1-13Elio Maldonado - 3.15.1-12Elio Maldonado - 3.15.1-11Elio Maldonado - 3.15.1-10Elio Maldonado - 3.15.1-9Elio Maldonado - 3.15.1-8Kai Engert - 3.15.1-7Elio Maldonado - 3.15.1-6Elio Maldonado - 3.15.1-5Elio Maldonado - 3.15.1-4Elio Maldonado - 3.15.1-3Elio Maldonado - 3.15.1-2Elio Maldonado - 3.15.1-1Elio Maldonado - 3.14.3-37Elio Maldonado - 3.14.3-36Elio Maldonado - 3.14.3-35Elio Maldonado - 3.14.3-34Kai Engert - 3.14.3-33Elio Maldonado - 3.14.3-5Elio Maldonado - 3.14.3-4Elio Maldonado - 3.14.3-3Elio Maldonado - 3.14.3-2Elio Maldonado - 3.14.3-1Elio Maldonado - 3.14.0.0-12Elio Maldonado - 3.14.0.0-11Elio Maldonado - 3.14.0.0-10Elio Maldonado - 3.14.0.0-9Elio Maldonado - 3.14.0.0-8Elio Maldonado - 3.14.0.0-7Elio Maldonado - 3.14.0.0-6Elio Maldonado - 3.14.0.0-5Elio Maldonado - 3.14.0.0-4Kai Engert - 3.14.0.0-3Bob Relyea - 3.14.0.0-2Elio Maldonado - 3.14.0.0-1Elio Maldonado - 3.13.5-3Elio Maldonado - 3.13.5-2Elio Maldonado - 3.13.5-1Elio Maldonado - 3.13.3-7Elio Maldonado - 3.13.3-6Elio Maldonado Batiz - 3.13.3-5Elio Maldonado Batiz - 3.13.3-4Elio Maldonado - 3.13.3-3Elio Maldonado - 3.13.3-2Elio Maldonado - 3.13.3-1Elio Maldonado Batiz - 3.13.1-6Elio Maldonado - 3.13.1-5Elio Maldonado - 3.13.1-4Elio Maldonado - 3.13.1-4Martin Stransky 3.13.1-3Elio Maldonado Batiz - 3.13.1-2Elio Maldonado - 3.13.1-1Elio Maldonado - 3.12.10-17Elio Maldonado - 3.12.10-16Elio Maldonado - 3.12.10-15Elio Maldonado - 3.12.10-14Elio Maldonado - 3.12.10-13Elio Maldonado - 3.12.10-12Elio Maldonado - 3.12.10-11Elio Maldonado - 3.12.10-10Elio Maldonado - 3.12.10-9Elio Maldonado - 3.12.10-8Elio Maldonado - 3.12.10-7Elio Maldonado - 3.12.10-6Elio Maldonado - 3.12.10-5Elio Maldonado - 3.12.10-4Elio Maldonado - 3.12.10-3Elio Maldonado - 3.12.10-2Elio Maldonado - 3.12.10-1Elio Maldonado - 3.12.9-11Elio Maldonado - 3.12.9-10Elio Maldonado Batiz - 3.12.9-9Elio Maldonado - 3.12.9-8Elio Maldonado - 3.12.9-7Elio Maldonado - 3.12.9-6Elio Maldonado - 3.12.9-5Elio Maldonado - 3.12.9-4Elio Maldonado - 3.12.9-3Elio Maldonado - 3.12.9-2Elio Maldonado - 3.12.9-1Elio Maldonado - 3.12.8-2Elio Maldonado - 3.12.8-1Kai Engert - 3.12.7-2Elio Maldonado - 3.12.7-1Elio Maldonado - 3.12.6-6Elio Maldonado - 3.12.6-5Elio Maldonado - 3.12.6-4Elio Maldonado - 3.12.6-3Elio Maldonado - 3.12.6-2Elio Maldonado - 3.12.6-1.2Elio Maldonado - 3.12.6-1.1Elio Maldonado - 3.12.6-1Elio Maldonado - 3.12.5.99-1Elio Maldonado - 3.12.5-8Elio Maldonado - 3.12.5-7.3Elio Maldonado - 3.12.5-7.2Elio Maldonado - 3.12.5-7.1Elio Maldonado - 3.12.5-7Elio Maldonado - 3.12.5-6Elio Maldonado - 3.12.5-2.1Elio Maldonado - 3.12.5-2Elio Maldonado - 3.12.5-1.14Elio Maldonado - 3.12.5-1.12.1Elio Maldonado - 3.12.5-1.11Elio maldonado - 3.12.5-1.10Elio Maldonado - 3.12.5-1.8Elio Maldonado - 3.12.5-2.1Elio Maldonado - 3.12.5-1.2Elio Maldonado - 3.12.4-15Elio Maldonado - 3.12.4-14Elio Maldonado - 3.12.4-12Elio Maldonado - 3.12.4-11Elio Maldonado - 3.12.4-10Elio Maldonado - 3.12.4-8Elio Maldonado - 3.12.4-6Elio Maldonado - 3.12.4-5Elio Maldonado - 3.12.4-4Elio Maldonado - 3.12.4-3Elio Maldonado - 3.12.4-2Elio Maldonado - 3.12.4-1Elio Maldonado - 3.12.3.99.3-30Elio Maldonado - 3.12.3.99.3-29Elio Maldonado - 3.12.3.99.3-28Elio Maldonado - 3.12.3.99.3-27Elio Maldonado - 3.12.3.99.3-26Elio Maldonado - 3.12.3.99.3-25Warren Togami - 3.12.3.99.3-24Elio Maldonado - 3.12.3.99.3-23Elio Maldonado - 3.12.3.99.3-22Elio Maldonado - 3.12.3.99.3-21Elio Maldonado - 3.12.3.99.3-20Elio Maldonado - 3.12.3.99.3-19Elio Maldonado - 3.12.3.99.3-18Elio Maldonado - 3.12.3.99.3-16Dennis Gilmore - 3.12.3.99.3-15Dennis Gilmore - 3.12.3.99.3-14Dennis Gilmore - 3.12.3.99.3-13Dennis Gilmore - 3.12.3.99.3-12Elio Maldonado+emaldona@redhat.com - 3.12.3.99.3-11Elio Maldonado - 3.12.3.99.3-10Dennis Gilmore - 3.12.3.99.3-9Elio Maldonado - 3.12.3.99.3-7.1Fedora Release Engineering - 3.12.3.99.3-7Elio Maldonado - 3.12.3.99.3-6Elio Maldonado - 3.12.3.99.3-5Elio Maldonado - 3.12.3.99.3-4Kai Engert - 3.12.3.99.3-3Kai Engert - 3.12.3.99.3-2Kai Engert - 3.12.3-7Kai Engert - 3.12.3-4Kai Engert - 3.12.3-3Kai Engert - 3.12.3-2Kai Engert - 3.12.2.99.3-7Kai Engert - 3.12.2.99.3-6Kai Engert - 3.12.2.99.3-5Kai Engert - 3.12.2.99.3-4Kai Engert - 3.12.2.99.3-3Kai Engert - 3.12.2.99.3-2Kai Engert - 3.12.2.99.3-1Fedora Release Engineering - 3.12.2.0-4Kai Engert - 3.12.2.0-3Dennis Gilmore - 3.12.1.1-4Kai Engert - 3.12.1.1-3Kai Engert - 3.12.1.1-2Kai Engert - 3.12.1.0-2Kai Engert - 3.12.0.3-7Kai Engert - 3.12.0.3-6Kai Engert - 3.12.0.3-3Kai Engert - 3.12.0.3-2Kai Engert - 3.12.0.1-1Jesse Keating - 3.11.99.5-2Kai Engert - 3.11.99.5-1Kai Engert - 3.11.99.4-1Kai Engert - 3.11.99.3-6Kai Engert - 3.11.99.3-5Kai Engert - 3.11.99.3-4Kai Engert - 3.11.99.3-3Kai Engert - 3.11.99.3-2Kai Engert - 3.11.99.3-1Kai Engert - 3.11.99.2b-3Kai Engert - 3.11.99.2b-2Kai Engert - 3.11.99.2-2Kai Engert - 3.11.99.2-1Kai Engert - 3.11.7-10Rob Crittenden - 3.11.7-9Kai Engert - 3.11.7-8Bob Relyea - 3.11.7-7Kai Engert - 3.11.7-6Kai Engert - 3.11.7-5Kai Engert - 3.11.7-4Kai Engert - 3.11.7-3Kai Engert - 3.11.7-2Kai Engert - 3.11.5-2Kai Engert - 3.11.5-1Bob Relyea - 3.11.4-4Kai Engert - 3.11.4-1Kai Engert - 3.11.3-2Kai Engert - 3.11.3-1Kai Engert - 3.11.2-2Jesse Keating - 3.11.2-1.1Kai Engert - 3.11.2-1Kai Engert - 3.11.1-2Kai Engert - 3.11.1-1Kai Engert - 3.11-4Jesse Keating - 3.11-3.2Jesse Keating - 3.11-3.1Ray Strode 3.11-3Christopher Aillon 3.11-2Christopher Aillon 3.11-1Christopher Aillon 3.11-0.cvs.2Christopher Aillon 3.11-0.cvsKai Engert Rob Crittenden 3.10-1- Add back missing Mozilla Policy- Fix gtest failure detection- Turn off cp TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 by default- Fix cipher order - fix broken gtests- fix problems found by qe: - AC13: SSL3 "disabled" - AC26: Chacha20 and TLS 1.3 ciphers should be prioritized - SHA-384 PRF => *_256_GCM_SHA384 ciphers should be reenabled for consistency - AC28: nss-policy-check is missing from packages and $PATH - extra: apostrophes in certutil manpage got mangled- restore Conflicts: with curl- Rebase to 3.44.0 with critical fixes- Backport upstream fix for CVE-2018-12384 - Remove nss-lockcert-api-change.patch, which turned out to be a mistake (the symbol was not exported from libnss)- Restore CERT_LockCertTrust and CERT_UnlockCertTrust back in cert.h- rebuild- Keep legacy code signing trust flags for backwards compatibility- Decrease the iteration count of PKCS#12 for compatibility with Windows - Fix deadlock when a token is re-inserted while a client process is running- Ignore tests which only works with newer nss-softokn- Use the correct tarball of NSS 3.36 release - Ignore EncryptDeriveTest which only works with newer nss-softokn- Don't skip non-FIPS and ECC test cases in ssl.sh- Rebase to NSS 3.36.0- Rebase to NSS 3.36.0 BETA - Remove upstreamed nss-is-token-present-race.patch - Revert the upstream changes that default to sql database- Replace race.patch and nss-3.16-token-init-race.patch with a proper upstream fix- Don't restrict nss_cycles to sharedb- Rebase to NSS 3.34.0- Fix zero-length record treatment for stream ciphers and SSLv2- Include CKBI 2.14 and updated CA constraints from NSS 3.28.5- Rebase to 3.28.4- Fix crash with tstclnt -W - Adjust gtests to run with our old softoken and downstream patches- Avoid cipher suite ordering change, spotted by Hubert Kario- Rebase to 3.28.3 - Remove upstreamed moz-1282627-rh-1294606.patch, moz-1312141-rh-1387811.patch, moz-1315936.patch, and moz-1318561.patch - Remove no longer necessary nss-duplicate-ciphers.patch - Disable X25519 and exclude tests using it - Catch failed ASN1 decoding of RSA keys, by Kamil Dudka (#1427481)- Update expired PayPalEE.cert- Disable unsupported test cases in ssl_gtests- Adjust the sslstress.txt filename so that it matches with the disableSSL2tests patch ported from RHEL 7 - Exclude SHA384 and CHACHA20_POLY1305 ciphersuites from stress tests - Don't add gtests and ssl_gtests to nss_tests, unless gtests are enabled- Add patch to fix SSL CA name leaks, taken from NSS 3.27.2 release - Add patch to fix bash syntax error in tests/ssl.sh - Add patch to remove duplicate ciphersuites entries in sslinfo.c - Add patch to abort selfserv/strsclnt/tstclnt on non-parsable version range - Build with support for SSLKEYLOGFILE- Update fix_multiple_open patch to fix regression in openldap client - Remove pk11_genobj_leak patch, which caused crash with Firefox - Add comment in the policy file to preserve the last empty line - Disable SHA384 ciphersuites when CKM_TLS12_KEY_AND_MAC_DERIVE is not provided by softoken; this superseds check_hash_impl patch- Fix problem in check_hash_impl patch- Add patch to check if hash algorithms are backed by a token - Add patch to disable TLS_ECDHE_{RSA,ECDSA}_WITH_AES_128_CBC_SHA256, which have never enabled in the past- Add upstream patch to fix a crash. Mozilla #1315936- Disable the use of RSA-PSS with SSL/TLS. #1390161- Use updated upstream patch for RH bug 1387811- Added upstream patches to fix RH bugs 1057388, 1294606, 1387811- Enable gtests when requested- Rebase to NSS 3.27.1 - Remove nss-646045.patch, which is not necessary - Remove p-disable-md5-590364-reversed.patch, which is no-op here, because the patched code is removed later in %setup - Remove disable_hw_gcm.patch, which is no-op here, because the patched code is removed later in %setup. Also remove NSS_DISABLE_HW_GCM setting, which was only required for RHEL 5 - Add Bug-1001841-disable-sslv2-libssl.patch and Bug-1001841-disable-sslv2-tests.patch, which completedly disable EXPORT ciphersuites. Ported from RHEL 7 - Remove disable-export-suites-tests.patch, which is covered by Bug-1001841-disable-sslv2-tests.patch - Remove nss-ca-2.6-enable-legacy.patch, as we decided to not allow 1024 legacy CA certificates - Remove ssl-server-min-key-sizes.patch, as we decided to support DH key size greater than 1023 bits - Remove nss-init-ss-sec-certs-null.patch, which appears to be no-op, as it clears memory area allocated with PORT_ZAlloc() - Remove nss-disable-sslv2-libssl.patch, nss-disable-sslv2-tests.patch, sslauth-no-v2.patch, and nss-sslstress-txt-ssl3-lower-value-in-range.patch as SSLv2 is already disabled in upstream - Remove fix-nss-test-filtering.patch, which is fixed in upstream - Add nss-check-policy-file.patch from Fedora - Install policy config in /etc/pki/nss-legacy/nss-rhel6.config- Ensure all ssl.sh tests are executed- Update sslauth patch to run more tests- Fix syntax errors in patch that disables sslv2 tests - Resolves: Bug 1297888 - Rebase RHEL 6.8 to NSS 3.21 for Firefox 45- Resolves: Bug 1304812 - Disable support for SSLv2 completely.- Add patches for ABI compatibility- Disable extended master-secret due to older version of softoken- Enable two additional ciphers and keep another one disabled - Prevent enabling extended masker key derive- Rebase to NSS-3.21- Prevent TLS 1.2 Transcript Collision attacks against MD5 in key exchange protocol - Resolves: Bug 1289890- Package listsuites as part of the unsupported tools set - Resolves: Bug 1283655- Resolves: Bug 1272504 - Enable TLS 1.2 as the default in nss- Rebuild against updated NSPR- Sync up with the rhel-6.6 branch - Resolves: Bug 1224450- Additional NULL initialization.- Updated the patch to keep old cipher suite order - Resolves: Bug 1224450- Rebase to nss-3.19.1 - Resolves: Bug 1224450- On RHEL 6.x keep the TLS version defaults unchanged. - Require softokn build 22 to ensure runtime compatibility. - Relax the requirement from pkcs11-devel to nss-softokn-freebl-devel to allow same or newer. - Update to CKBI 2.4 from NSS 3.18.1 (the only change in NSS 3.18.1)- Update and reeneable nss-646045.patch on account of the rebase - Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL7.1]- Fix shell syntax error in nss/tests/all.sh - Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]- Restore a patch that had been mistakenly disabled - Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]- Replace expired PayPal test certificate that breaks the build - Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]- Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6] - Resolves: Bug 1131311 - rhel65 ns-slapd crash, segfault error 4 in libnss3.so in PK11_DoesMechanism at pk11slot.c:1824 - Temporarily disable some tests until expired PayPalEE.cert is renewed- Keep the same cipher suite order as we had in NSS_3_15_3_RTM - Resolves: Bug 1123092 - openldap-2.4.23-34.el6_5.1.i686 fails after updating nss to nss-3.16.1-4.el6_5.i686- Resolves: Bug 1158160 - Upgrade to NSS 3.16.2.3 for Firefox 31.3 - Remove unused indentation pseudo patch - require nss util 3.16.2.3 - Restore patch for certutil man page - supply missing options descriptions to the man page- Resolves: Bug 1158160 - Upgrade to NSS 3.16.2.3 for Firefox 31.3- Resolves: Bug 1145432 - CVE-2014-1568- Fix pem deadlock caused by previous version of a fix for a race condition - Fixes: Bug 1090681- Add references to bugs filed upstream - Related: Bug 1090681, Bug 1104300- Resolves: Bug 1090681 - RHDS 9.1 389-ds-base-1.2.11.15-31 crash in PK11_DoesMechanism- Replace expired PayPal test certificate that breaks the build - Related: Bug 1099619- Fix defects found by coverity - Resolves: Bug 1104300- Backport nss-3.12.6 upstream fix required by Firefox 31 - Resolves: Bug 1099619- Update nspr-version to 4.10.6- Update pem sources to the same ones used on rhel-7 - Remove no longer needed patches on account of this update - Resolves: Bug 1002205- Move removal of directories to the end of the %prep section - Resolves: Bug 689919 - build without any softoken or util sources in the tree- Remove unused patches rendered obsolete- Fix pem module trashing of private keys on failed login - Resolves: Bug 1002205 - PEM module trashes private keys if login fails- Restore use of indentation patch until another bug is resolved - Resolves: Bug 606022 - nss security tools lack man pages- Update to nss-3.16.1 - Resolves: Bug 1099619 - Rebase nss in RHEL 6.6 to NSS 3.16.1- Resolves: Bug 689919 - build without any softoken or util sources in the tree - Add define-uint32.patch to deal with using older version of nss-softokn - Fix suboptimal test failure detection shell code in the %check section- Prevent users from disabling the internal crypto module - Resolves: Bug 1059176 - nss segfaults with opencryptoki module- Improve support for ECDSA algorithm via pluggable ECC - Document the purpose of the iquote.patch - Resolves: Bug 1057224 - Pluggable ECC in NSS not enabled on RHEL 6 and above- Install man pages for the nss security tools - Resolves: Bug 606022 - nss security tools lack man pages- Fix the numbering and naming of the patches - Resolves: Bug 895339 - [PEM] active FTPS with encrypted client key ends up with SSL_ERROR_TOKEN_INSERTION_REMOVAL- make derEncodingsMatch work with encrypted keys - rename a patch, dropped the experimental moniker from it - Resolves: Bug 895339 - [PEM] active FTPS with encrypted client key ends up with SSL_ERROR_TOKEN_INSERTION_REMOVAL- Resolves: Bug 895339 - [PEM] active FTPS with encrypted client key ends up with SSL_ERROR_TOKEN_INSERTION_REMOVAL- Revoke trust in one mis-issued anssi certificate - Resolves: Bug 1042686 - nss: Mis-issued ANSSI/DCSSI certificate (MFSA 2013-117) [rhel-6.6]- Disable hw gcm on rhel-5 based build environments where OS lacks support - Rollback changes to build nss without softokn until Bug 689919 is approved - Cipher suite was run as part of the nss-softokn build- Build nss without softoken, freebl, or util sources in the build source tree - Resolves: Bug 1032472 - CVE-2013-5605 CVE-2013-5606 CVE-2013-1741- Update to NSS_3_15_3_RTM - Resolves: Bug 1032472 - CVE-2013-5605 CVE-2013-5606 CVE-2013-1741 - Resolves: Bug 1031238 - deadlock in trust domain lock and object lock- Using export NSS_DISABLE_HW_GCM=1 to deal with some problemmatic build systems - Resolves: rhbz#1016044 - nss.s390: primary link for libnssckbi.so must be /usr/lib64/libnssckbi.so- Add s390x and ia64 to the %define multilib_arches list used for defining alt_ckbi - Resolves: rhbz#1016044 - nss.s390: primary link for libnssckbi.so must be /usr/lib64/libnssckbi.so- Add zero default value to DISABLETEST check and fix the TEST_FAILURES check and reporting - Resolves: rhbz#990631 - file permissions of pkcs11.txt/secmod.db must be kept when modified by NSS - Related: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Add a zero default value to the DISABLETEST and TEST_FAILURES checks - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Fix the test for zero failures in the %check section - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Restore a mistakenly removed patch - Resolves: rhbz#961659 - SQL backend does not reload certificates- Rebuild for the pem module to link with freel from nss-softokn-3.14.3-6.el6 - Related: rhbz#993441 - NSS needs to conform to new FIPS standard. [rhel-6.5.0] - Related: rhbz#1010224 - NSS 3.15 breaks SSL in OpenLDAP clients- Don't require nss-softokn-fips - Resolves: rhbz#993441 - NSS needs to conform to new FIPS standard. [rhel-6.5.0]- Additional syntax fixes in nss-versus-softoken-test.patch - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Fix all.sh test for which application was last build by updating nss-versus-softoken-test.path - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Disable the cipher suite already run as part of the nss-softokn build - Resolves: rhbz#993441 - NSS needs to conform to new FIPS standard. [rhel-6.5.0]- Require nss-softokn-fips - Resolves: rhbz#993441 - NSS needs to conform to new FIPS standard. [rhel-6.5.0]- Require nspr-4.10.0 - Related: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Fix relative path in %check section to prevent undetected test failures - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x)- Rebase to NSS_3.15.1_RTM - Resolves: rhbz#1002645 - Rebase RHEL 6 to NSS 3.15.1 (for FF 24.x) - Update patches on account of the shallow tree with the rebase to 3.15.1 - Update the pem module sources nss-pem-20130405.tar.bz2 with latest patches applied - Remove patches rendered obsolete by the nss rebase and the updated nss-pem sources - Enable the iquote.patch to access newly introduced types- Do not hold issuer certificate handles in the crl cache - Resolves: rhbz#961659 - SQL backend does not reload certificates- Resolves: rhbz#977341 - nss-tools certutil -H does not list all options- Resolves: rhbz#702083 - dont require unique file basenames- Fix race condition in cert code related to smart cards - Resolves: rhbz#903017 - Firefox hang when CAC/PIV smart card certificates are viewed in the certificate manager- Configure libnssckbi.so to use the alternatives system in order to prepare for a drop in replacement. Please ensure that older packages that don't use the alternatives system for libnssckbi.so have a smaller n-v-r.- Syncup with uptream changes for aes gcm and ecc suiteb - Enable ecc support for suite b - Apply several upstream AES GCM fixes - Use the pristine nss upstream sources with ecc included - Export NSS_ENABLE_ECC=1 in both the build and the check sections - Make failed requests for unsupoprted ssl pkcs 11 bypass non fatal - Resolves: rhbz#882408 - NSS_NO_PKCS11_BYPASS must preserve ABI - Related: rhbz#918950 - rebase nss to 3.14.3- Revert to accepting MD5 on digital signatures by default - Resolves: rhbz#918136 - nss 3.14 - MD5 hash algorithm disabled- Ensure pem uses system freebl as with this update freebl brings in new API's - Resolves: rhbz#918950 - [RFE][RHEL6] Rebase to nss-3.14.3 to fix the lucky-13 issue- Install sechash.h and secmodt.h which are now provided by nss-devel - Resolves: rhbz#918950 - [RFE][RHEL6] Rebase to nss-3.14.3 to fix the lucky-13 issue - Remove unsafe -r option from commands that remove headers already shipped by nss-util and nss-softoken- Update to NSS_3.14.3_RTM - Resolves: rhbz#918950 - [RFE][RHEL6] Rebase to nss-3.14.3 to fix the lucky-13 issue - Update expired test certificates (fixed in upstream bug 852781) - Sync up pem module's rsawrapr.c with softoken's upstream changes for nss-3.14.3 - Reactivate the aia tests- Recreate the distrust patch by backporting the upstream one - Resolves: rhpbz#890914 - Dis-trust TURKTRUST mis-issued *.google.com certificate- Resolves: rhpbz#890914 - Dis-trust TURKTRUST mis-issued *.google.com certificate- Remove a patch that caused a regression - Resolves: rhbz#883620- Fix locking issue causing curl hangs and authenticate to the correct session - Resolves: rhbz#872838- PEM peminit returns CKR_CANT_LOCK when needed to inform caller module isn't thread safe - Resolves: rhbz#555019 - [PEM] invalid writes in multi-threaded libcurl based application- Add dummy sources file to test for and prevent breaking rhpkg commands - Enable testing for 'rhpk upload' and 'rhpk new-sources' breakage such as hangs - Related: rhbz#837089- Update the license to MPLv2.0 - turn off the aia tests - Resolves: rhbz#837089- Resolves: rhbz#702083 - NSS pem module should not require unique base file names- turn on the aia tests - update nss-589636.patch to apply to httpdserv- turn off aia tests for now- turn off ocsp tests for now- Rebase to nss-3.14.0.0-1 - Resolves: rhbz#837089 - Update ssl-cbc-random-iv patch for new sources - Remove patches rendered obsoleted by rebase to 3.14 - Add a patch to enforce no pkcs11 bypass- Resolves: rhbz#830302 - require nspr 4.9.1- Resolves: rhbz#830302 - revert unwanted changes to nss.pc.in- Resolves: rhbz#830302 - Update RHEL 6.x to NSS 3.13.5 and NSPR 4.9.1 for Mozilla 10.0.6- Resolves: rhbz#827351 invalid read and free on invalid cert load failure- Resolves: #rhbz#805232 PEM module may attempt to free uninitialized pointer- Resolves: rhbz#717913 - [PEM] various flaws detected by Coverity - Require nss-util 3.13.3- Resolves: rhbz#772628 nss_Init leaks memory- Resolves: rhbz#746632 - pem_CreateObject mem leak on non existing file name - Use completed patch per code review- Resolves: rhbz#746632 - pem_CreateObject mem leak on non existing file name - Resolves: rhbz#768669 - PEM unregistered callback causes SIGSEGV- Update to 3.13.3 - Resolves: rhbz#798539 - Distrust MITM subCAs issued by TrustWave - Remove builtins-nssckbi_1_88_rtm.patch which the rebase obsoletes- Resolves: rhbz#746632 - Adjust the patch for new sources- Resolves: rhbz#746632 - pem_CreateObject() leaks memory given a non-existing file name- Resolves: 784674 - Protect NSS_Shutdown from clients that fail to initialize nss- Add two needed patches - Resolves: rhbz#783315 - Need nss workaround for freebl bug that causes openswan to drop connections - Resolves: rhbz#747387 - Unable to contact LDAP Server during winsync- Rebuild- Resolves: Bug 784490 - CVE-2011-3389 - Activate a patch that was left out in previous build- Resolves: Bug 744070 - Update to 3.13.1 - Resolves: Bug 784674 - nss should protect against being called before nss_Init - Resolves: Bug 784490 - CVE-2011-3389 HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)- Resolves: Bug 761086 - Fix nss-735047.patch to not revert the nss-bz689031.patch- Update builtins certs to those from NSSCKBI_1_88_RTM- Bug 747387 - Unable to contact LDAP Server during winsync- Add to the spec file the patch for Bug 671266- More coverity related fixes in the pem module- Coverity related fixes- Add relro support for executables and shared libraries- Add partial RELRO support- Fix the name of the last patch file- Retagging to pick up two missing commits- Update builtins certs to those from NSSCKBI_1_87_RTM- Update builtins certs to those from NSSCKBI_1_86_RTM- Update builtins certs to those from NSSCKBI_1_85_RTM- Fix CMS to verify signed data when SignerInfo indicates signer by subjectKeyID- Fix pem logging to deal with files originally created by root- Retagging for updated patch missing from previous tag- Update to 3.12.10- Resolves: rhbz# 703658 - Fix crmf hard-coded maximum size for wrapped private keys- Resolves: rhbz#688423 - Enable NSS support for pluggable ECC- Add "Conflicts: curl < 7.19.7-26.el6" to fix Bug 694663- Construct private key nickname based on the full pathname of the pem file- Update expired PayPayEE.cert test certificate - Conditionalize some database tests on user not being root- Update to NSS_3.12.9_WITH_CKBI_1_82_RTM- Fix memory leaks caused by SECKEY_ImportDERPublicKey- Short-term fix for ssl test suites hangs on ipv6 type connections- Add requires for pkcs11-devel on nss-softokn-freebl devel - Run the test suites in check section per packaging guidelines- Prefer user database ca cert trust settings system's ones - Swap internal key slot on fips mode switches- Update to 3.12.9 - Fix libnsspem to test for and reject directories- Add suppport for pkcs8 formatted keys in the pem module - Add verify(not md5 size mtime) to configuration files attributes - Prevent nss-sysinit disabling on package upgrade - Create pkcs11.txt with correct permissions regardless of current umask - Add option to setup-nsssysinit.sh to report nss-sysinit status - Update test certificate which had expired- Update to 3.12.8- Increase release version number, no code changes- Update to 3.12.7- Rebuilt- Appying the changes in previous log - Changing some BuildRequires to >= as well - Temporarily disabling all tests for faster builds- Change some = to >= in Requires to enable a rebase next- Fix SIGSEGV within CreateObject (#596783) - Update expired test certificate- Fix nss.pc to not require nss-softokn- rebuilt using nss-util 3.2.6- rebuilt using nspr-devel 4.8.4- Update to 3.12.6- Update to NSS_3_12_6_RC1- Fix curl related regression and general patch code clean up- Resolves: #551784 rebuilt after nss-softokn and nss-util builds - this will generate the coorect nss.spec- rebuilt for RHEL-6 candidate, Resolves: #551784- Updated to 3.12.5 from CVS import from Fedora 12 - Moved blank legacy databases to the lookaside cache - Reenabled the full test suite - Retagging for a RHEL-6-test-build- Retagged- retagging- Fix SIGSEGV on call of NSS_Initialize (#553638)- bump release number and rebuild- Fix nsssysinit to allow root to modify the nss system database (#547860)- Temporarily disabling the ssl tests until Bug 539183 is resolved- Fix an error introduced when adapting the patch for 546211- Remove some left over trace statements from nsssysinit patching- Fix nsssysinit to set the default flags on the crypto module (#545779) - Fix nsssysinit to enable apps to use the system cert store, patch contributed by David Woodhouse (#546221) - Fix segmentation fault when listing keys or certs in the database, patch contributed by Kamil Dudka (#540387) - Sysinit requires coreutils for post install scriplet (#547067) - Remove redundant header from the pem module- Remove unneeded patch- Update to 3.12.5 - CVE-2009-3555 TLS: MITM attacks via session renegotiation- Require nss-softoken of same arch as nss (#527867)- Fix bug where user was prompted for a password when listing keys on an empty system database (#527048) - Fix setup-nsssysinit to handle more general flags formats (#527051)- Fix syntax error in setup-nsssysinit.sh- Fix sysinit to be under mozilla/security/nss/lib- Add nss-sysinit activation/deactivation script- Install blank databases and configuration file for system shared database - nsssysinit queries system for fips mode before relying on environment variable- Restoring nssutil and -rpath-link to nss-config for now - 522477- Add the nss-sysinit subpackage- Installing shared libraries to %{_libdir}- Retagging to pick up new sources- Update pem enabling source tar with latest fixes (509705, 51209)- PEM module implements memory management for internal objects - 509705 - PEM module doesn't crash when processing malformed key files - 512019- Remove symbolic links to shared libraries from devel - 521155 - No rpath-link in nss-softokn-config- Update to 3.12.4- Fix FORTIFY_SOURCE buffer overflows in test suite on ppc and ppc64 - bug 519766 - Fixed requires and buildrequires as per recommendations in spec file review- Restoring patches 2 and 7 as we still compile all sources - Applying the nss-nolocalsql.patch solves nss-tools sqlite dependency problems- restore require sqlite- Don't require sqlite for nss- Ensure versions in the requires match those used when creating nss.pc- Remove nss-prelink.conf as signed all shared libraries moved to nss-softokn - Add a temprary hack to nss.pc.in to unblock builds- caolan's nss.pc patch- Bump the release number for a chained build of nss-util, nss-softokn and nss- Fix nss-config not to include nssutil - Add BuildRequires on nss-softokn and nss-util since build also runs the test suite- disabling all tests while we investigate a buffer overflow bug- disabling some tests while we investigate a buffer overflow bug - 519766- remove patches that are now in nss-softokn and - remove spurious exec-permissions for nss.pc per rpmlint - single requires line in nss.pc.in- Fix BuildRequires: nss-softokn-devel release number- fix nss.pc.in to have one single requires line- cleanups for softokn- remove the softokn subpackages- don install the nss-util pkgconfig bits- remove from -devel the 3 headers that ship in nss-util-devel- kill off the nss-util nss-util-devel subpackages- split off nss-softokn and nss-util as subpackages with their own rpms - first phase of splitting nss-softokn and nss-util as their own packages- must install libnssutil3.since nss-util is untagged at the moment - preserve time stamps when installing various files- dont install libnssutil3.so since its now in nss-util- Fix spec file problems uncovered by Fedora_12_Mass_Rebuild- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- removed two patch files which are no longer needed and fixed previous change log number- updated pem module incorporates various patches - fix off-by-one error when computing size to reduce memory leak. (483855) - fix data type to work on x86_64 systems. (429175) - fix various memory leaks and free internal objects on module unload. (501080) - fix to not clone internal objects in collect_objects(). (501118) - fix to not bypass initialization if module arguments are omitted. (501058) - fix numerous gcc warnings. (500815) - fix to support arbitrarily long password while loading a private key. (500180) - fix memory leak in make_key and memory leaks and return values in pem_mdSession_Login (501191)- add patch for bug 502133 upstream bug 496997- rebuild with higher release number for upgrade sanity- updated to NSS_3_12_4_FIPS1_WITH_CKBI_1_75- re-enable test suite - add patch for upstream bug 488646 and add newer paypal certs in order to make the test suite pass- add conflicts info in order to fix bug 499436- ship .chk files instead of running shlibsign at install time - include .chk file in softokn-freebl subpackage - add patch for upstream nss bug 488350- Update to NSS 3.12.3- temporarily disable the test suite because of bug 494266- fix softokn-freebl dependency for multilib (bug 494122)- introduce separate nss-softokn-freebl package- disable execstack when building freebl- add upstream patch to fix bug 483855- build nspr-less freebl library- Update to NSS_3_12_3_BETA4- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- update to NSS_3_12_2_RC1 - use system zlib- add sparc64 to the list of 64 bit arches- bug 456847, move pkgconfig requirement to devel package- Update to NSS_3_12_1_RC2- NSS 3.12.1 RC1- fix bug bug 429175 in libpem module- bug 456847, add Requires: pkgconfig- nss package should own /etc/prelink.conf.d folder, rhbz#452062 - use upstream patch to fix test suite abort- Update to NSS_3_12_RC4- Update to NSS_3_12_RC2- Zapping old Obsoletes/Provides. No longer needed, causes multilib headache.- Update to NSS_3_12_BETA3- NSS 3.12 Beta 2 - Use /usr/lib{64} as devel libdir, create symbolic links.- Apply upstream patch for bug 417664, enable test suite on pcc.- Support concurrent runs of the test suite on a single build host.- disable test suite on ppc- disable test suite on ppc64- Build against gcc 4.3.0, use workaround for bug 432146 - Run the test suite after the build and abort on failures.* NSS 3.12 Beta 1- move .so files to /lib- NSS 3.12 alpha 2b- upstream patches to avoid calling netstat for random data- NSS 3.12 alpha 2- Add /etc/prelink.conf.d/nss-prelink.conf in order to blacklist our signed libraries and protect them from modification.- Fix off-by-one error in the PEM module- fix a C++ mode compilation error- Add 3.12 ckfw and libnsspem- Updated license tag- Ensure the workaround for mozilla bug 51429 really get's built.- Better approach to ship freebl/softokn based on 3.11.5 - Remove link time dependency on softokn- Fix unowned directories, rhbz#233890- Update to 3.11.7, but freebl/softokn remain at 3.11.5. - Use a workaround to avoid mozilla bug 51429.- Fix rhbz#230545, failure to enable FIPS mode - Fix rhbz#220542, make NSS more tolerant of resets when in the middle of prompting for a user password.- Update to 3.11.5 - This update fixes two security vulnerabilities with SSL 2 - Do not use -rpath link option - Added several unsupported tools to tools package- disable ECC, cleanout dead code- Update to 3.11.4- Revert the attempt to require latest NSPR, as it is not yet available in the build infrastructure.- Update to 3.11.3- Add /etc/pki/nssdb- rebuild- Update to 3.11.2 - Enable executable bit on shared libs, also fixes debug info.- Enable Elliptic Curve Cryptography (ECC)- Update to 3.11.1 - Include upstream patch to limit curves- add --noexecstack when compiling assembler on x86_64- bump again for double-long bug on ppc(64)- rebuilt for new gcc4.1 snapshot and glibc changes- rebuild- Update file list for the devel packages- Update to 3.11- Add patch to allow building on ppc* - Update the pkgconfig file to Require nspr- Initial import into Fedora Core, based on a CVS snapshot of the NSS_3_11_RTM tag - Fix up the pkcs11-devel subpackage to contain the proper headers - Build with RPM_OPT_FLAGS - No need to have rpath of /usr/lib in the pc file- Adressed review comments by Wan-Teh Chang, Bob Relyea, Christopher Aillon.- Initial build  !"#$%&'()*+,-./012343.44.0-7.el6_103.44.03.44.0-7.el6_103.44.0-7.el6_10nss-confignss3cert.hcertdb.hcertt.hcmmf.hcmmft.hcms.hcmsreclist.hcmst.hcrmf.hcrmft.hcryptohi.hcryptoht.hjar-ds.hjar.hjarfile.hkey.hkeyhi.hkeyt.hkeythi.hnss.hnssckbi.hnsspem.hocsp.hocspt.hp12.hp12plcy.hp12t.hpk11func.hpk11pqg.hpk11priv.hpk11pub.hpk11sdr.hpkcs12.hpkcs12t.hpkcs7t.hpreenc.hsechash.hsecmime.hsecmod.hsecmodt.hsecpkcs5.hsecpkcs7.hsmime.hssl.hsslerr.hsslexp.hsslproto.hsslt.hlibcrmf.anss.pc/usr/bin//usr/include//usr/include/nss3//usr/lib64//usr/lib64/pkgconfig/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=genericdrpmxz2x86_64-redhat-linux-gnuASCII textPOSIX shell script text executableUTF-8 Unicode textcurrent ar archivedirectorypkgconfig fileRPRRR?7zXZ !#,Ho]"k%nÍdڴ4@KOZ6M}Yƭ`@iUťlaVQhԈ:~[ bŮ4y~Q4Z Vij$z !U͚/{QF}1Yp߽(j*7_`R[Ěh&MTYMޕ=+23YX. &340k61F});F.p  |龠$[܏nQi ?g+ ͤ0ZYiѤT駦3'AA͐øMG^ũqb2+*i{^U1w =2<_vN}xz\dEvyF憉*;fnB,"=Se0oMH)ahݢB੣ q>y[->)٥i(È'8{PۆnF7'ĵ !5QgHDIZ.'Bp'WSJ-4\Wnn @l3)03+M q$w 8Rsyˏl: ȭH 74\8!VlxsR0R rlD R^shPcw B[-H;UJ!A? vпO }Px2;z#CF? M|z- ,b5qV15yMo>C'1bbj5m}☱%FIMllM[Yȏltpsľ}%{<,qVGF2;7kV&+B4*$2p H_`5ZamW+kܮ3BeHC>@vG<ЧW塅d|  ~4 E_=.])gW~BK77GVp0N/9w)Tϫv˙r̥@RLh$r n*hKGҶeyS;ʆbjwWOǤ( [H\f9&v#P?`kgŚέg:3{J.Aq}']%~H&]@/ezz0Zr58r'd}=lqd5MaK0_҉^X) Ƭ㉗l׍G)..?S-x3cӂRe27@H]_BaQѳ/!v&0Sumjϕ̰1'\\]KY[AYX.Z !"hBXۚ(0ܸb8lW 쌐 ~D4N2@nK&<2Er˝@WO7As3 RPH԰~ .!& Fl|YO{~nLoBFITp!Naۯ&@g+s]\ a\А㇣7Ive^P•35՛x0 Lʐaihk mɑ4o)/@Dvu@*ӆ `(/$ OW>djO,?hj,{cdgJUa**0sod0 laW|̓4WFdw;Z{ٸF8N@?Ndxdh+z<}eO{B Y}ߐO ˲(?6;^Z$T^6o P %xȣpYk訙lq-p`3-Uӭ/y8A(Θ+GOl?ZʼnsyEOĘIdelbjgw݋ *NdR ?#cq=PLJ 23LgP*kd#Fd4q\=w3.]f,D?g 4ˆhf~PZݢrV{S%Ef2 8dQ(mC z|4;"UbF}v$;ShLP T @0:ddrʡ b|tE.`Iֻsˀ7xbc8\-@0f*9?+h PƍՕT+Weƭu),bW,Q]ԩhk2)x :B{g1mfP+(Ћ*%ahy:`Bcɋp,W>cj%H 9]@EpraЭ0H[v o\km>%W7k/>A7J5)JԤVtm@|ߡq累w0Qåպe@E1Γ͎g,~ʅwDj&*VT/3ţIGst5b\ u'$|\ĤeA&Gu'2k%6`W{@$)l Fkdk70YXO0m '[M缾X>;`{z*x r"hSe@^  ga<\ |ڈor1gDrOF 𘠮VPJ[%0m%miSՕeir\ki{Ne2X:b#=h΅COҊ"*\F 4s?Cp~f?4Nc;uL;3bIgb!z0E`j2ծ@bHi8~#=dF]@aoղ\;'ȕ-,JSL4%?}<ȵکoheŁuk fc,+x2VGgSPFG* z0 +A<Ǟ,J}I~V\<16Lٿ]|;y\oٖp>'`L$v62T+;s2q0}ͤl4zc%0V:"V {xVQޢhJGJECܽ1cNѼ=#ስ ,34{xNJW7&Gڴ|\;udv(*!rdP s?'b k1:izSXO >f臭/@j 8 ϯ"'ޫܪ>s꾰[Pe%S=\LWː?8Yj4483+VM?:|.ʭAܸuǠӨ6\0!Pf~󳌂 Уj*y閥:^ *{+?#`(i`ȷ6hw%4g@@y,畑˂P4I;)5noFP?G[}M̂ٵ KǓW٬sC)8d. pDH +JP[STV'2,Sϧ%gm{tgrS Ow8#+ rՉpÎ)EA`!sG.' D>Y{LU~d@ Lz_X \\'!ULMDүrI9〰^R{,A.p9AŔ?8zg;}F+;EH \Z"eg;"LBs>[g6)JE)sz5L] [!OguH\iT`qCKS.s SjjvGb?bZxGR,~k豯j[KK0='5F,\~"FS X# 3鱢|ZWQpl@ =-PT0dq-N, q4\!%1i54Pg]@hon[S4ms'H. SÅT96{5S(7ٟdA^&a/=/yBʯFl3>H8]ݦE I/,M'|(2AFSZ<[`Xz 40x|=D~'Ss2'b3X~vFtI*tߥBvqʔ*lƍNWeVEUޒEScg此۲ǻsLB{r2nAMN&NW8 `Cڂ&$S֯D+i\y@210GO9bQNӪ:?{X(QN[t E;{_A|󃲭9y gCҤ3+ zyM ٤F,V t+4upIm/Ĵ_aOH0_a;>_A5]8m5b?2/x۬S1rm )l򝉧uf˃lq@JniBJvL0Obb!;$oX팇:5uE 7S*REʩ٥#) 6`sT;W.'&an;')җyy6M9> L Uzq@$u ޝ)GB6NRiW]ġs4oQ¹ua +%(*bxoz)FBv $xroƵZ]Wi|*rOXX)J;|&ŁXB"5i}FZjB5M+uD :<]go5 I!dj˰Pujq7ٚtV-OT񉿫wlߌC+B G{ѩA-7Y ٢jq4/[6@YY|$ jV0 JaPw^%]'U6\2ecS K ϴ+^ e"|f+Y8B#HfcWl$W ڍlUzYӺaǐ9{0RX!֊2yyT9!~P pc'(LY.)HδᰩKa uDuGimuH2hjNeW9B\z9ɀ9~X7-(7^8Rp |Ny΂'eĚ">Xf FZ??)4#/ Wˁn .@"qXX";*"I9\O `aH{D$4}\Dq`c2jO>CO}%NzÀ2-a2ե#jl ?F. y ASJzO{5w/PCr@V=O4gh0n?=vdPr`Te7+6;}{\ r?V*|~:C ww7@[+vZ wP &5sVPE1ԙRK#]Q^P8%Mc8.6=Еv[\ߓFp =*Pۦa@2Fؘtf}fJ> qz6΋fe=L6.?R  ;֫bb+0ϵQY/sj1.:nBNɯIYS9 ʦ sğdHP *g,7bFs\qfPݍA?ؓؾFzX-A߂>&Q,EFXOvVug,gH2OUeXGf[yRFa' &b`4y4i.n=a=D) V Co46 /U˹TR)[<^wevy`,2'BfP#$!Һ3xBc :DDžiR\%e.*pHLH~OȥOv9[G-P ݬ4F^V?dï ߬!#17h0ly+qW/à\g GsinILv옝r 4ٺ$삄4qB9 hC/u=a9 1ye wšRPM%~SmJE:?3,\mA8'bqF]( f0*_yG cq3n;M0vpF#)/q_`4FvS۪303[ᰉ|-TLNfxVPr.&qPBOZX>'e/Tu~s$3WKaeF/%Oovm3& " V{TSXP9;4rՙP!!)&K!TYmi~ 9w`| f 7Tz.6"3ssap9N1~ Fk[\5{_0qSvPnqwU:W~ 75 ƛ4I}Ky͸4_p&҈Jc)Q] 9=nsjNt{=][WpQDs3d-IlՎeoMʑu~jIʻc󲐏=F.)(\%(e2kk!Sg߈v#/=W)0\~Jݳ^l.4:`Ϥ9?tv1fyLg8QLs@Ɩ,`H@% +< L<>k, bRJ?DaÁ~YI4bԾ׶xcEIW;+JRI2-Xk-i+`=;NQ@;9RѤh=ky(FteF̴f wCַcLɆߍaP%i޶V} o9m'sq_[vR_MӑBncY6Yc$fQHns/֭Rs((V Ih:jF-E3`5MFu Im]j;PK wyo7 \W"PKGj&8c}ߨA37A(l) q+8/Ö7RoR,1eС5)gIY]Ԡ= ,Dem 2"Gy=Q낙*ĭ,p2ߒP dbw]c:!ЪHIZ>ZL3!&._MY&Z T9SE3}, 3tԎ~L=m[ t &8||*GIp{T/Ou3_kZJ*ot6mg 1fSBljjN, ?lxV+?GV`Yt8|F8.7o42r>S|_}xyqHVjQ?UP%NBV^ {Tb;$ VM޹EXvƻMք!XGf oo!?7e bN{{l?ɶX_ᴹSl&IϨj^OjC"hOb r4'$.31 ˿=8#ɺ˝7kO,^"Q,BFĬ߁v?8I)5dq`G&8o%KPl"˫gNeYryIiuK(3; E߼eV*7woׂġ*(w~u1.YOZ~gz DO.tϵsɡ xnk8 >@ja}ۉ "a,b8 12y$tOZ!5kKcyg=1Xյ;W5+rBF(}ӽ0J9Up|W$0iWd7[䵤۽mpGV ٩NdzCmh}{[ iuec-5Q:=5kd5E5x >E~l\ է k{B'de>2=5LE-Zk>@51ccbSGT@dzJSVx` qdީm/So]Y5Cɿq4z:/a4H9MF7A)̳ jUio 3S%:A0_2 JB| +9$,ϲ$LQ fv)ʛ,Dw1"n]/YZk'1q*BkC4H5x}LCvƇ1̬A(i:'ˠAt涒/ 5Kj X (+Z P{FP5=a 1//xD"n3:Gi_X?nd$*0<#fJ,3}-^c*\`8=j[O&I'h6#67eN@1 _5Pg }6Ͽ]6] lU<\  ]x'l8*b6T&7öE%Z-+Rr+4! T&;dqAfrMDNy[,!$$CxoI΍(QK/i>9/'\<曚b4;wږjSJD`+W^ێԝ\?Mn3m!Oc qzi`WUqͱ++. 汸͈5Z6hXsav_zi eCd S*K++\׽;%1=EҦP&px4H.@|lGkh)LSD.wٗ 2xOQ&᧪REH槒ceK/guNG^.~_X5oj^yv.ySsЅ MxyF PJ;ęvu{ Z+nEVC 4:K͈Tkv ʛJl*1Jwgn{ GBHZzNqޭR XY(7?S-mWœKpE0+Q^?g# .B a(┌Cn[aż0pO6$4P9ϻ/:Wq?kwx huYU 7s{}{5mo9LGD_aԧf}5vӛP; VQn#_ݥD 5Ǝ9;ffcwHd ?-M5+A;K" me, lͅ)-'HUos;Y9U8Ըgf#aZVN? &Na& 9ifCd뾟ӍwQ~ҰM\‹=KZ  X7c hUe0r2 [W;_@,"7;5''r3jfԜ$'O<)/.fpѿYp闝CHhYFY$_$M+>0zζT(? = { @izlcH@p$Iޖ$$&7finW,xLv)wiP ƛ:a z[W  d @:ɠ&:z8\HBʿ+Ed w~Fj:PH3,,){!gf7Q0ZnƏ{9QN+)_b~t@t[0ӤeC2o@lefvK VHipxG MV+,a{9uINTSNb)0ݍ#?iG x}VdÄ0U!w]uɮg^#Z[7˱ФP%aaft]_O4@&/'}))89OtyJ`o*1 0% g~:7m*]x@Tc4kՔک_B/^VϻOV7;;}˄|ߠ_`T-ݶț+e!&Q2Z\UT=ԋ2I_yOGF[zs#5J$a~t+bP{:bW5lTCWoe嘃Lc$p\;BzJ3@H }? )Ӵ: AGH-uw+6Q|~0’hDyӧ8~Iq#LP 1ɟQ^JB{jhd_%) mc|qJ$K߰SDqznlWcZ{jUEQlhHqdx }fLo x\"iYW! j7uS|?ƳQssCg%+gE͋@y:irBsBfiv̢J(M [tѥ?4}6;PPջWXݚAWOGIG^E]6`TB%)+V/Zkiyk>\ .+(IVN۲qOAS}st8Y='q |R _!W-1vKwiNdvuB٥Z+;b$czuJ~+&8[AG ~ȩ:0evPuN \5/K{j>ks`[vǖ엤_,5[\3LI>0FZNelj󎆛0lz4PI^G{>swv r߫[DpLL43ddzhhB`2P\Z9.O|6/q ]["Nao<үsʾ*IqLoZ1 M%\9iM{,Eܩ&evP593!K$4emUL>WZ-0o%JmPE/Efu˄jM5Cmn)"-NW)boܾ1=vxK+6|΢U5 R |VG?rfĂϢ? >ށ-Isgsoc:C`89(#7qLy&{ kYx .lҹﻈ9%h{£Nd~yKmL$ʳ) Jq.B4x K NV &\Ec5=p.[&ͳ`LΰߚiT"ԇ>HN^Ӭ.|{rF* XV7q[^;{M._Hb2A{ Nr|QF)xy.mo\\%`h_kO~ ;a6PSD|]fS}=!^۸!:5dsT:_cD3 K2dz XcD$<\O(` K@,Bз!Oq`" 류#v)I'e5hPÒ"NH"8~Sdcgex@QZ}'LM>333~2-m|Zu?M"&:vLf_U!ѾvX!*!=~N 'ۉ fqT+2>Ep+ |M\ra iNXi*FX-8tllF6m!UY %\a7#,#=8` XKu~^xtR|zODG3(,sZG`6%$pC̆~M),Wt;P]E$[dܟ/uƲWקuJB-.L/a5l; #>"T:T4KOӥ/VXM,PÉFld`jVBYC`IixI$ϷT *E9ʩ JQoY< Ec<x]$u&)4Gݼ8+=ipZ`>ath͝~__Itux[֋ 2A[\݁d 6_LPIPiMu'8[0+Fjmj~h uľALv%9̶DF|R{8_6NT7.AZDv @%4;Na2p;I?CmkyK"VIU0_Ӎ[5ZzIRy;,֡+dAӪдJ` q&wu-Eح7ND 5急q؝Xm=̃ZKKzkaB Rm΁Nu6|Vww9 ܂g5alHAo's$v{/8EA4B b`͜j2:1= P*0"qI]CO2]2ʺݬMT-7}Č#ْM]vp&ջ~Ӟ;,rhl E)owjYI1GʭxnWD޿^!1nD\i=ZEe>rQBZdMO=͉W:]Bv[S(*_}WN=B6_2Z…,2*?/DTL塣?c fV$}j..6N6&B$˦N--P$"muн;$I<|%LQEU'5eqQ. BLmem[.yj)Xm{m2^1/ Jw?H*;i $t4%tUDUsritYUk|xAO )Jugo x&-{;XQogE+:a6~1i p^*lG2UX'`j箫UL+LfQL AJ hy4WNJ l`#4:V,@z%0Š`z?y5{g^sXUZ^᝗͋{+ze˛鲀4['Po2֫. ٻ2F!4d~$*gVeKg &T