ELF>@p@8 @ЮЮA-A-88ppp`"B000 $$Std Ptdlll  QtdRtdppp!!GNUGNU3_w  MΕ; }I {e DG5 u! q] V"\zY  ?!y $)$ # 2>T g<$< &]D M: |dp%-]#K( 0P k#  #F"^3U!kLTo!8  B %!&qUj$m9d7 #nG> lk#4  0 $H#Q  # 4 %A[ m"Tt $z!# s&l   ,pr4bv #XLm % Z  |= TV j$?}  #!>%o$`# e' y "mH  Jk u_D/T$&  $ d "cI&,"2,H" x#" ]o "Z@$ Y".C  =q L! x#" S  I   Dd"" *#%  b^ " Xu T}%j %" d%% QG"H hmRYe0>"fP @^!xr /d U% %  2 16J ?Cr$/#"!02  ~) %- H2 , 6!|=!$ r%L%5  $R/ !R"` U`p__gmon_start___ITM_deregisterTMCloneTable_ITM_registerTMCloneTable__cxa_finalizessl_moduleap_prelinked_modulesstrcmpOPENSSL_init_sslOBJ_txt2nidERR_clear_errorapr_pool_cleanup_nullapr_pool_cleanup_registerapr_dynamic_fn_retrieveapr_optional_hook_addap_mutex_registerOBJ_createapr_pallocap_log_cerror_apr_optional_hook_getSSL_get_ex_dataSSL_freeSSL_newap_md5_binarySSL_set_session_id_contextSSL_set_ex_dataSSL_set_verify_resultap_add_output_filterBIO_newapr_brigade_createBIO_set_dataBIO_ctrlap_add_input_filterSSL_set_bioSSL_get_rbioSSL_get_wbioBIO_set_callbackBIO_set_callback_argap_get_brigadeapr_brigade_destroyap_exists_config_defineapr_file_open_stdoutapr_file_printf__stack_chk_failEVP_default_properties_enable_fipsapr_pstrdupap_register_input_filterap_register_output_filterap_hook_pre_connectionap_hook_process_connectionap_hook_test_configap_hook_post_configap_hook_http_schemeap_hook_default_portap_hook_pre_configap_hook_child_initap_hook_check_authnap_hook_fixupsap_hook_check_accessap_hook_check_authzap_hook_post_read_requestap_hook_ssl_conn_is_sslapr_dynamic_fn_registerOpenSSL_versionstrchrap_hook_expr_lookupap_hook_ssl_bind_outgoingap_register_auth_providerapr_bucket_immortal_creatememcpyap_pass_brigadeapr_bucket_transient_createBIO_get_dataSSL_CONF_CTX_freeSSL_CONF_CTX_newSSL_CONF_CTX_set_flagsapr_array_makeapr_array_appendapr_pstrcatstrcasecmpap_log_error_ap_check_cmd_contextstrlenstrncmpap_server_root_relativeapr_statENGINE_by_idENGINE_freeENGINE_get_firstENGINE_get_nameENGINE_get_idENGINE_get_next__isoc23_strtolapr_array_pushap_state_querySSL_COMP_get_compression_methodsOPENSSL_sk_numap_getword_confapr_pstrmemdupap_lookup_providerapr_psprintfap_list_provider_namesapr_array_pstrcatap_expr_parseapr_uri_parseSSL_CONF_cmd_value_typeapr_bucket_flush_createBIO_clear_flagsSSL_in_initSSL_is_serverBIO_get_shutdownBIO_set_shutdownBIO_set_initapr_bucket_type_eosapr_brigade_cleanupBIO_set_flagsSSL_CTX_freeSRP_VBASE_freeX509_freeOPENSSL_sk_pop_freeX509_INFO_freeap_ssl_add_cert_filesapr_is_empty_arraySSL_CTX_set_default_passwd_cbSSL_CTX_use_certificate_fileUI_create_methodUI_method_set_openerUI_method_set_readerUI_method_set_writerUI_method_set_closerENGINE_initENGINE_ctrl_cmd_stringENGINE_ctrl_cmdENGINE_load_private_keyENGINE_finishSSL_CTX_use_certificateap_ssl_add_fallback_cert_filesSSL_CTX_use_PrivateKey_fileSSL_CTX_check_private_keySSL_CTX_get0_certificateX509_get_ext_d2iASN1_INTEGER_to_BNBN_bn2decCRYPTO_freeBN_freeBASIC_CONSTRAINTS_freeSSL_CTX_ctrlEC_KEY_freeEC_GROUP_freeSSL_CONF_CTX_set_ssl_ctxSSL_CONF_cmdSSL_CTX_use_PrivateKeyEVP_PKEY_freeSSL_CTX_use_certificate_chain_fileERR_peek_last_errorapr_hash_getd2i_AutoPrivateKeyapr_file_openapr_file_closeBIO_new_filePEM_read_bio_PrivateKeyBIO_freei2d_PrivateKeyap_reallocfilenoisattyBIO_f_base64BIO_pushd2i_PrivateKey_bioBIO_free_allapr_sleepPEM_read_bio_ECPKParametersEC_GROUP_get_curve_nameEC_KEY_new_by_curve_nameOBJ_nid2snSSL_CONF_CTX_finishapr_hash_setSSL_CTX_get_cert_storeOPENSSL_sk_valueX509_check_issuedX509_STORE_CTX_newX509_STORE_CTX_initX509_STORE_CTX_get1_issuerX509_STORE_CTX_cleanupX509_STORE_CTX_freeEVP_sha1X509_digestapr_file_read_fullOSSL_PARAM_construct_octet_stringOSSL_PARAM_construct_utf8_stringOSSL_PARAM_construct_endSSL_CTX_set_tlsext_ticket_key_evp_cbSSL_CTX_set_timeoutX509_up_refPEM_read_bio_DHparamsDH_get0_pBN_num_bitsDH_freeBIO_s_memPEM_write_bio_X509ap_ssl_ocsp_primeSSL_CTX_callback_ctrlap_mallocOCSP_cert_to_idX509_get1_ocspX509_email_freeOCSP_CERTID_freeX509_NAME_cmpSSL_load_client_CA_fileX509_NAME_freeOPENSSL_sk_findOPENSSL_sk_pushOPENSSL_sk_freeapr_dir_openapr_dir_readapr_dir_closeSSL_CTX_set_post_handshake_authSSL_CTX_set_client_cert_cbOPENSSL_sk_new_nullX509_check_private_key__memset_chkX509_STORE_load_fileX509_verify_certX509_STORE_CTX_get_errorX509_verify_cert_error_stringX509_STORE_CTX_get1_chainOPENSSL_sk_shiftOpenSSL_version_numgetpidap_get_server_protocolENGINE_set_defaultEVP_default_properties_is_fips_enabledapr_hash_makeBIO_s_filePEM_read_bio_X509ENGINE_ctrlmemsetap_global_mutex_createERR_peek_errorERR_get_errorap_add_version_componentCRYPTO_get_ex_new_indexBIO_meth_newBIO_meth_set_writeBIO_meth_set_readBIO_meth_set_putsBIO_meth_set_getsBIO_meth_set_ctrlBIO_meth_set_createBIO_meth_set_destroygetenvsrandapr_global_mutex_lockfileapr_global_mutex_child_initBIO_meth_freememmoveSSL_readSSL_get_errormemchrSSL_set_shutdownSSL_get_shutdownSSL_shutdownap_log_cserror_SSL_is_init_finishedapr_table_getapr_strtokapr_pstrndupSSL_acceptSSL_get_verify_resultapr_ipsubnet_createSSL_connectSSL_get1_peer_certificateX509_getm_notBeforeX509_cmp_current_timeX509_getm_notAfterapr_table_setnSSL_set_alpn_protosSSL_get0_alpn_selectedSSL_ctrlapr_bucket_eos_createap_bucket_type_eocSSL_writeOPENSSL_sk_newOPENSSL_sk_set_cmp_funcap_set_deprecatedap_log_rerror_ap_remove_input_filterap_map_http_request_errorapr_brigade_partitionapr_brigade_split_lineBIO_get_callback_argapr_snprintfap_array_str_containsap_is_initial_reqSSL_get_servernameapr_table_eltsap_getwordap_pbase64decodeap_getword_nullsap_pbase64encodeX509_get_subject_nameX509_NAME_onelineSSL_get_client_CA_listX509_get_issuer_nameEVP_PKEY_up_refap_bin2hexSSL_CTX_get_ex_dataSSL_SESSION_get_idap_vhost_iterate_given_connSSL_client_hello_get0_extap_strcasecmp_matchSSL_set_SSL_CTXSSL_CTX_get_optionsSSL_set_optionsSSL_get_verify_modeap_update_child_status_from_serverSSL_CTX_get_verify_callbackSSL_CTX_get_verify_modeSSL_set_verifyEVP_aes_128_cbcEVP_DecryptInit_exEVP_MAC_CTX_set_paramsRAND_bytesEVP_EncryptInit_exap_select_protocolap_get_protocolap_switch_protocolap_ssl_answer_challengeBIO_new_mem_bufSSL_use_certificateSSL_use_PrivateKeySSL_check_private_keyERR_error_stringSSL_get_srp_usernameSRP_VBASE_get1_by_userSSL_set_srp_server_paramSRP_user_pwd_freeapr_procattr_createapr_procattr_io_setapr_tokenize_to_argvapr_proc_createapr_cpystrnEVP_read_pw_stringapr_file_putsERR_newERR_set_debugERR_set_errorstrrchrUI_get0_user_dataUI_get0_output_stringUI_get_result_maxsizeOPENSSL_cleanseUI_set_resultUI_destroy_methodstrncasecmpX509_NAME_print_exX509_get_serialNumberi2a_ASN1_INTEGERX509_get_versionapr_time_nowASN1_TIME_checkapr_time_exp_gmt_getapr_ltoastrspnASN1_TIME_printX509_get0_tbs_sigalgX509_ALGOR_get0OBJ_obj2nidX509_get_X509_PUBKEYX509_PUBKEY_get0_paramOBJ_nid2lnX509_NAME_entry_countX509_NAME_get_entryX509_NAME_ENTRY_get_objectX509_NAME_ENTRY_get_dataASN1_STRING_print_exSSL_get_certificateSSL_get_current_cipherSSL_CIPHER_get_nameSSL_get_versionSSL_get_srp_userinfoSSL_session_reusedSSL_get_sessionSSL_get_peer_cert_chainSSL_SESSION_get_compress_idSSL_CIPHER_get_bitsapr_itoaap_get_server_bannerapr_time_exp_ltap_run_http_schemeap_get_server_name_for_urlap_get_server_portap_document_rootap_get_useragent_hostap_get_remote_lognameSSL_state_string_longSSL_alert_desc_string_longSSL_alert_type_string_longapr_table_setOBJ_txt2objX509_get_ext_countX509_get_extX509_EXTENSION_get_objectOBJ_cmpX509V3_EXT_printX509_EXTENSION_get_dataASN1_STRING_newd2i_DISPLAYTEXTASN1_STRING_freeBIO_vfreeASN1_OBJECT_freeap_escape_logitemi2d_SSL_SESSIONSSL_SESSION_set_timeoutSSL_SESSION_get_timed2i_SSL_SESSIONERR_peek_error_dataERR_error_string_nap_strcmp_matchSSL_get_SSL_CTXSSL_do_handshakeSSL_peekap_expr_execSSL_set_cipher_listSSL_get_ciphersap_request_has_bodySSL_verify_client_post_handshakeSSL_get_verify_depthX509_STORE_CTX_set_depthSSL_get_ex_data_X509_STORE_CTX_idxX509_STORE_CTX_set_ex_dataOPENSSL_sk_dupSSL_renegotiateapr_brigade_lengthX509_STORE_CTX_get_ex_dataX509_STORE_CTX_get_error_depthX509_STORE_CTX_get_current_certX509_STORE_CTX_set_errorapr_pool_create_exapr_pool_tagap_cstr_casecmpOCSP_REQUEST_newX509_STORE_CTX_get0_current_issuerOCSP_request_add0_idOCSP_response_statusOCSP_REQUEST_freeOCSP_RESPONSE_freeapr_pool_destroyAUTHORITY_INFO_ACCESS_freeapr_uri_port_of_schemeOCSP_request_add1_nonceOCSP_response_get1_basicX509_STORE_CTX_get0_storeOCSP_basic_verifyOCSP_BASICRESP_freeOCSP_resp_find_statusOCSP_check_nonceOCSP_check_validityOCSP_id_get0_infoBIO_readOCSP_crl_reason_strOCSP_cert_status_strCRYPTO_mallocapr_global_mutex_lockapr_sockaddr_info_getapr_socket_createapr_socket_timeout_setapr_socket_connectapr_socket_closeapr_socket_sendapr_brigade_pflattenap_make_dirstr_parentapr_procattr_dir_setapr_procattr_cmdtype_setapr_global_mutex_unlocki2d_OCSP_RESPONSEd2i_OCSP_RESPONSERAND_seedapr_file_readapr_vsnprintfBIO_putsGENERAL_NAME_freei2d_OCSP_REQUESTBIO_printfASN1_i2d_bioapr_bucket_socket_createapr_atoi64BIO_writeOCSP_RESPONSE_newASN1_d2i_bioap_ssl_ocsp_get_respOCSP_CERTID_dupOCSP_REQUEST_add_extOCSP_response_status_strOCSP_response_createapr_file_getsapr_file_eofX509_NAME_get_index_by_NIDRAND_statusap_rwriteSSL_CTX_sess_set_new_cbSSL_CTX_sess_set_get_cbSSL_CTX_sess_set_remove_cbSSL_CTX_set_info_callbackSSL_CTX_set_alpn_select_cbSSL_CTX_set_verifySSL_CTX_load_verify_dirSSL_CTX_set_client_CA_listSSL_CTX_set_cipher_listSSL_CTX_set_ciphersuitesSSL_CTX_load_verify_fileX509_STORE_load_pathX509_STORE_set_flagsSSL_CTX_set_client_hello_cbSRP_VBASE_newSRP_VBASE_initSSL_CTX_set_srp_username_callbackSSL_CTX_set_srp_cb_argSSL_CTX_get_client_CA_listPEM_X509_INFO_read_bioTLS_client_methodSSL_CTX_newSSL_CTX_set_optionsSSL_CTX_set_ex_dataap_max_mem_freeSSL_CTX_set_keylog_callbackTLS_server_methodapr_pool_userdata_getapr_pool_userdata_setlibssl.so.3libcrypto.so.3libc.so.6mod_ssl.soGLIBC_2.38GLIBC_2.3.4GLIBC_2.4GLIBC_2.14GLIBC_2.2.5OPENSSL_3.0.0R&`g&ti r&ii ~&&ui &7& +p&C& +p&pPxP FȮЮRخR7SHSSSST U(HT0h8T@xHTPXU ]Яa3 0@P5mbL6Ȱаذ,=Qbs (08@HPX `h-pAxNp&hȱбD@+( 18`@H%`hp%  #8 P6ز 6 07(@!0H87P!X``P)x"u08H")ȳ"гس8"0*X# (9@#HP<h$pxC@$`,$ ȴ -$#0B%/ 0x%8C@0;X%`RhP%d&}е@&صh&`: &(0H&PXp('xpB`'@$'ȶжDP( -(  `98(@:H*`X)hTp*)m90*<ط**9*H++(h+0+8 :P,X`xx,,ȸ,иظ=@-- (G@-HP-h`.pxB/' `/?ȹ/Xp./p.08@0/X`hP/PH(0кP0غ0:0`F 0(!0@H81P0X/pp1xL 11h01Ȼ 2л`0@22p2 82@H0`@3hp3Hؼ33@PpP!``hp9xTiw/VinX`hpx     ȿпؿ (08@H P!X"`#h$p%x&'()*+,-./012345678:; <(=0>8?@@HAPBXC`DhEpFxGHIJKLMNOPQRSUVWXYZ[\ ](^0_8`@aHbPcXd`ehfpgxhjklmnopqrstuvxyz{|}~ (08@HPX`hpx (08@HPX`hpx (08@HPX`hpx (08@HPX`hpx (08@HPX ` h p x  ! "(#0$8%@&H'P(X)`*h+p,x-.0123456789:;<=>?@AB C(D0E8F@GHHPIXJ`KhLpMxNOPQRSTUWXYZ[\]^_`abc d(e0f8g@hHjPkXl`mhoppxqrstuvwxyz{|}~ (08@HPX`hpx (08@HPX`hpx (08@HPX`hpx (08@HPX`hpx     ( 08@HPXHHHtH5"%$@hfhfhfhfhfhfhfhrfhbfh Rfh Bfh 2fh "fh fhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfh fh!fh"fh#fh$fh%fh&fh'rfh(bfh)Rfh*Bfh+2fh,"fh-fh.fh/fh0fh1fh2fh3fh4fh5fh6fh7rfh8bfh9Rfh:Bfh;2fh<"fh=fh>fh?fh@fhAfhBfhCfhDfhEfhFfhGrfhHbfhIRfhJBfhK2fhL"fhMfhNfhOfhPfhQfhRfhSfhTfhUfhVfhWrfhXbfhYRfhZBfh[2fh\"fh]fh^fh_fh`fhafhbfhcfhdfhefhffhgrfhhbfhiRfhjBfhk2fhl"fhmfhnfhofhpfhqfhrfhsfhtfhufhvfhwrfhxbfhyRfhzBfh{2fh|"fh}fh~fhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfh Rfh Bfh 2fh "fh fhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfh fh!fh"fh#fh$fh%fh&fh'rfh(bfh)Rfh*Bfh+2fh,"fh-fh.fh/fh0fh1fh2fh3fh4fh5fh6fh7rfh8bfh9Rfh:Bfh;2fh<"fh=fh>fh?fh@fhAfhBfhCfhDfhEfhFfhGrfhHbfhIRfhJBfhK2fhL"fhMfhNfhOfhPfhQfhRfhSfhTfhUfhVfhWrfhXbfhYRfhZBfh[2fh\"fh]fh^fh_fh`fhafhbfhcfhdfhefhffhgrfhhbfhiRfhjBfhk2fhl"fhmfhnfhofhpfhqfhrfhsfhtfhufhvfhwrfhxbfhyRfhzBfh{2fh|"fh}fh~fhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhfhfhfhfhfhfhfhrfhbfhRfhBfh2fh"fhfhfhfhf%6fD%6fD%>fD%6fD%NfD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%~fD%vfD%nfD%ffD%^fD%VfD%NfD%FfD%>fD%6fD%.fD%&fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fD%fDH=)H"H9tHHt H=H5H)HH?HHHtHHtfD=u+UH=ZHt H= d]w1fHufHtIN4u`u(HF@HH@0HcRHЃx@HFHxHDuHGø@HeHOHwHcPHAXHv0HH4HtdH8tNHHDHHt,HAXHЋVtHtH8HHD1DH1HuÐHHOHwHcPHAXHv0HH4HtLH8tFff%ÐHHt$HAXHЋVtHtHHff%f1DH1HufHGPH 1HcIH@0HȉP 1HGPH HcIH@0HȉP81HGPH HcIH@0HȉP$111FH1ff.@HV01DHGPH aHcIH@0HH@(1HGPH 1H@0HcIHH@(H1HGPH HcIH@0HH@(1HGPH HcIH@0HH@(1HF@҉81HF@҉01HF@҉41HGPH AH@0HcIHȉP01HGPH HcIH@0HH@(P\1HGPH HcIH@0HH@(Pt1HGPH HcIH@0HH@(Px1HGPH H@0HcIHH@(H11H1fUHAUIATL%SHH^@HxLH(tHHu1vHH!H -1LHH1[A\A]]fHHH= DUHAVL5AUIATISIcFHwXHHtXH 1MtXID HCHt[H A\A]]ff.UHAWAVAUAATISHLwHMN HcHIqXHL<΁tHe؉[A\A]A^A_]fDIHH2H uvAǁHeظ.N[A\A]A^A_]ÐIHHH2H H=iDIO@DH;}HH IHHIF ǀEAG8HH=IT$HIT$HPIT$HID$He1[A\A]A^A_]HzH=FHH=E1WH=1H}aYH}^fDHtlzHHE1S1H=0XMN Z]DAG8VIQHr Ht IQH DIQHr Ht ZIQH f.UHAWAVAUATSHHH}H_HudH%(HE1HHEH LpL`M9E1E1I)JH w4Ht IAM M6M9MFA@ u IFH= vIAH=wsM9A@ ubIVH,H wIH= 0IF D]LL)LMP(LMD]=WfDMAHH PHELH I+HHH#Hc 1 HELxM9HEHEIWHHt[1HUHuLPHUH H H:H= HuH1HEH IGM/IOI7I(H1IIwHqPLAW0M9#MIGDX EOH E1NH=<Q0HPHELH 1AYAZHEH@L9H HtiHPHELH IHHHHc 9 HEH@I9t[HuHEdH+%(hHEHuHxHe[A\A]A^A_]@LvLf1M9HFL9u@1HUdH+%(He[A\A]A^A_]@H+x LuHIVL`IVHIVHBIFHǃ 3IAHH HHc r|IVHH+pHEHH HH6H8HLcB<@@ M6AIDHuIAH x IIgMNAgIZHtH IHEH@I9oM9uASE1 =HAWH=} P1\HEH LxM9GH@I9G DHEH@I9,HVE1|P 1H=XH ZHHE1dH=PHPHELH 1Y^LMHUHuLD]APD]LMAt vIVLm D]IE H8D]IEHHǀ HؿA1H=%RSHSH]LK A\A]IAHH HtHc *IAH HhHAH=\1SHSH]LK _AXHuHAH x 4D]E1H=mAQIFIɹ 0H{R P13IVD]H HAHx HtHc<@HH=PIF0HPHELH 1A^A_ff.fUHCHLLHrIx*HtmH Ht"Hc 9xɸfDHt[z~LHHE1PHH=?P1$XZIQHJ HtHc yIQH fDUHHLHrIx*HtmH Ht"Hc 9xɸfDHt[z~LHHdE1PH7H=P1dXZIQHJ HtHc yIQH fDUHH̼LHrIx*HtmH Ht"Hc 9xɸfDHt[z~LHHE1PHX-H=P1XZIQHJ HtHc yIQH fDUHH rHPLJ Ix&HtqH HtHc 9xɸfHtcz~H@LH HE1PH%H=P1XZIQHJ HtHc yIQH ff.UH3H<rHPLJ Ix&HtqH HtHc 9xɸfHtcz~H@LH HLE1PH.H=+P1XZIQHJ HtHc yIQH ff.UHcHlrHPLJ Ix&HtqH HtHc 9xɸfHtcz~H@LH HE1PH7H=[P1@XZIQHJ HtHc yIQH ff.UHSHtH@HLH RIx*HtuHHt"Hc 1xH]1DHtcx~HNSE1PH1H=qXZDx~H]DIAHH HtHc yIAH xy@UHs1]ff.@UffvɸHAUATISHHL-TGG8GHO`LHG HG(<G0HLJHHGXHGpHGxHLJHLJHLJHLJHLJHLJLJH HLH HH YH HH  7LeL0H(ǃ8H[A\A]]fU@HAVAUIATSL@HH@H@HSC0HCHRHC HC4qLHC(HIL(RfLI@H@ ID$LIMt${LᅠIFHxHHHHǀH1H)HIT$ H[A\A]A^]UHATISI<$HHH[A\]fDUHAUIATI@SLH`LIE@HHL(AfHCH@ @H[A\A]]ff.@UPHATISLHMHCLHHCCHC HC(HC0HC8CHCLH[A\]fUHAUIATISHHB,ofnB(fnfbfAD$(C0uAE0AD$0HC8HID$8HC@HID$@HCHHID$HHCPHID$PCXuAEXAD$XHH|I$HHTI$HH,I$uAA$uAA$HHI$uAA$uAA$HHtI$HHuII$HHuII$HHuII$uAA$HHI$uAA$HHI$C\uAE\AD$\HC`HuIE`ID$`HChHuIEhID$hCpuAEpAD$pCtuAEtAD$tCxuAExAD$xC|uAE|AD$|HHuII$HHI$HHI$HHI$H(I(I$(0uA0A$04uA4A$48uA8A$8H[A\A]]Ð~F(fDIg@I?@I@IX@I@I@I$@I@I@Ix@IEPEIEH#IE@IE8UHAUIATISHHeIUH HtQID$HHJHHHHJHtgHHHJHtJHR HHHt%HP H[A\A]]fDHCHHSHR HP H[A\A]]ÐHKHIfDHKHIfDHKHIoUHAVIAUIPATISHA$uAEIT$IuL謹HCAD$ AL$A#UA T$SAD$A#E ȉCA#E ЉCID$ HHC AD$(uAE(C(AD$,uAE,C,ID$0HHC0ID$8HuIE8HC8AD$LAT$HCLuRSHLHHK@Iu@LIT$@ID$@H@HHS@HBH[A\A]A^]ID$@SHHC@H[A\A]A^]ID$HCAD$CID$ HIE IE0-AUHNIE@H@oUHAWIAVAUIATISH}HI$HHAD$uAECAD$uAECAD$ uAE C AD$$uAE$C$AD$0uAE0C0AD$4uAE4C4AD$8uAE8Md$(Ls(C8LMm(LLL%IFHID$H0IEH8躹IFHPID$HpIEHx蜹IL$HAHtnIVHBHAHtMHBID$ HHt,IV HHH[A\A]A^A_]IEIE HIEH@fDIEH@fDUHAWAVIAUATISHHHGPHH@0HcRLL蹤H5L蝤}H5 L聤!H5eL:H8@H@HHL5fCfDu@H8IIt$@|HH8xHptH{@HKHPHHDHHtBH8xcHH1 螼H8CHsLHfH8@D@ILźHDDHEdH+%(H8H{@E1H H5HPHĨ1[A\A]A^A_]}DH8IIt$@LH@HEdH+%(H{@E1H LH5HEdH+%(uUHĨL11[H5A\A]A^A_]DHEdH+%(uH{@E1H LH5'wUHATISHHĀdH%(HE1tCI4$H{@dHHI$HK@Hp?u+}u%H}~HEdH+%(H1[A\]HEdH+%(uhHC`I $E1LEH{@HH0H1[A\]fHEdH+%(u(HC`I $E1HH{@H0H1[A\]驜d@UH5HAUATSHHHUHGPHLeH@0HcRLL,кɠt)HuHHtH[A\A]]fLeIE(H@H8L H1[A\A]]ff.UH5WHAUATSHHHUHGPHFLeH@0HcRLL,к)t)HuHHtH[A\A]]fLeIE(H@Hx{L H1[A\A]]ff.UHSHuHHUHGPHH@0HcRHHu HS(HMHJ@H]UHSHuHHUHGPH`H@0HcRH/HuHS(HMHR H H]DUHATSHuHHHUHGPH H@0HcRL$Ht H[A\]@HCXHtHH$[A\]IT$(HMHH[A\]ff.@UHSHuHHUHGPHH@0HcRHOHuHS(HMHRHJH]@UHSHuHHUHGPH0H@0HcRHHu HS(HMHJPH]UHSHHuHHUHuHS@HMHH]fUHSHHuHHUHu HS@HMHJPH]ff.UHSHHuHHUCHuHS@HMHRH H]fUHSHHuHHUHuHS@HMHRHJH]UHAUATHuSHHHUHGPHٔH@0HcRL,IHtHL[A\A]]fH{@HuMm(IHL[A\A]]f.UHSHuHHUHGPH`H@0HcRH/HuHS(HMHH]DUHATSHGPHH@0HcRL$Ѕt sH諜u[HA\]1AD$41[A\]DUHAWIAVAULmATISHHHHuL蕳H5HHctH5HPA$HEL5o8u!f.HEA $8~IHL"LHHtIG`IHHE1LaH\H01芖H[A\A]A^A_]H5H詥¸WH1[A\A]A^A_]ff.@HGPHHH@0HcRHHP(HXDHHHP@HXfUHAWAVAUATSHHUȀ:HEIIHEqfIH5#Lͤ~.A-0A~L$A D$fnfpfAD$HEfAD$8CI}HHu英D0IAFըxt AD$H5L<ÅH5L#ÅE11H5uLH5lLH5cLףH5[LfDH5L虣u~,A-A~L$A#D$fAD$fnHEfpfAD$81H[A\A]A^A_]@fA-SA+ufnfpoD ֐@I}@E1H Q1LH5gzUHAWAVL}AUIATISHHu>tlI|$HL虯D0HAFըt*H5(H[uwHHe[A\A]A^A_]ÐHH5H-uA-uHEȀ8u1fDH5ԣHueA-tHeH[A\A]A^A_]ÐH5HѡtH5H辡AAEEUxH5bH艡t5H5UHvAEAA-tD AE/fAEAA-uAA!EUH5HE1ujA_HDUML$PE1H!H=PID$`S0HP1FDUH fH5H衠t5H5fH莠tJH5jH{u?A< AAEA-A+DA ID$`I|$HE1HLHH01Аff.HGPHHH@0HcRHHP(B,H(ff.HHHP@B,H(fUHAWIAVAULmATLSHH dH%(HEHGPHHHcIH@0HHUL`(lH5EHH:tH5_H'A$HEL5 8u DA$HE8IHLLHHȞtIG`IHE1HL5H0H01^HUdH+%(u3H[A\A]A^A_]H5Hq¸H1מUHAUATIHSHHH_dH%(HEHGPEHcRH@0L,HUBzHtHUdH+%(u2H[A\A]]H{XUtAT$(IM(7UHSHHHUHdH%(HE1EyHu HS@M䉊HUdH+%(uH]ҝfU_HAWAVAUATISHHHGPHUH@0HcRHL(1IHtHL[A\A]A^A_]H5LtH5LΜ:L)IHtHH{@LIL)IHLH=蒒IE HtYHSHHK@I}(LIEPHHJH{@HH5p1[A\A]A^A_]铓IEH{@H,H52yH{@,HH{@LMHH51=HyDU_HAWAVAUATISHHHGPHՈH@0HcRHL(豣HtH[A\A]A^A_]D:LێIHtHH{@LIL)譞IL=ZLH=]LAIEXHt@HK@HSHI}`LPHtH{@HH1[H5<A\A]A^A_]NfDH{@LH5EH{@,H贕H{@MLHH5`1 UHAVI AUIATISH@JfE1LH@It$HI|$@@ID$8HP0@8CHoHSHڋ@C͠Ht(I|$@[H1A\H5iA]1A^]ȊI~跞L(HX1[A\A]A^]DUXHAVAUATIHSHGPHHcRH@H@0L,Mu(rH{@LIIE(Hu[1A\A]A^]DH{@L[H5A\1A]A^]鳐UHAVAUATISHHHHGPHYHMH@0HcRL,IE(H ytutGH5RHLu؅txIE(H(萝HLpH1[A\A]A^]f.HuLHtH[A\A]A^]fI|$@HH5ٹ܏H[A\A]A^]I|$@L11HIhHuLDH4H[A\A]A^]ff.UHSH"HH(PLKILHHHHc41@@ HCHxHsHVHHVHPHVHHFHH@ HxECuHSt ChH]fHKHHt]x vLKHH E1PH=1{Y^D@IAHp HtHc4@HAH fUHAVIAUIATASâLH賝HH@(x<HLKPIHDHHHc 1 HCLIcHP]HSHJHHJHHHJHHBHH8脏HsHH@ Hx訖CuHSDt ChHe[A\A]A^]Hx ]AT E1HH=P1Y^1HH85aHCHx耊HsHVHHVHPHVHHF5DIAHH HtHc IAH XCg*UHAUIATISH ~[ wVH }HcH>␁u:HLHRIxHHHtsHc 1xh i1f.L舙HHe[A\A]]DL轝He[A\A]]DLHe[HA\A]]HtOx ~HSE1 P1H=iQX1ZIAHH HtHc IIAH fUHSHHH߾YH1?H]@UHAWAAVAUATISHHXHudH%(HE1J@Dp I1HL$IH H@(x<&I](H&HCLCL9HCI9IcHEL}HELmLeLELcID$H;HuDLLPAŅ=~ADLeLmAM  I}(GA}~IE(qHEHdHUdH+%(RHX[A\A]A^A_]fHUHHMHEL4L9s HIH)HuH}HU،ID$HUH9H)IT$ ID$HULuAHMH9MHCH9EDLmAM@EzHcPI}HIF0HHHIEH@Hx{IEDHDX EDE1MH@J DHpN4M-HxH1H5+σH胐H5zLI}@I}h L苐!HDžIELH@D9` ~H@HpHHHH5H=\zH5ŲHH*H5HKH5HlH5Hm|HHOHHf:H)H) fHn~xHHDž0flLHDž08l~HSH9FHHH)H-HHH讃HpH HpBzHP@  IG H Hc4@+ @~~HME1HHchPH=1诈HH PxIG HtHc5A(~Hp11H5ڌHHtMHpHE11AH5HHDžd}HH HHpHHHhHy HpHҒHHI}H@H=wIMIULH艄IEH=HIEH臀HHtjL@@ ~_1LILDALfAH(E;|$ }HHLLvLDIED9x HXHX(L@I}HvI}jI}9HH,11ҾWHlIHIxH1LpLpH#HLHHp藄HpLHHH 1H@LHHp茕HpH5M(H@‹HHƆ(~?HME1 HH=lQPHP1CH IW`HLH^HP?IG H2Hc#<~8ME1HXH=ֈAVP1軄H IEIHD9` rDMH@L8DM}HLH{DI}1ɺvD/DHLDzDI1H8DE1L%cH HXH`HC(HppHC(DH.H(x LLXDL0xfDHH@ HHc<~.AwE1LAv1A6SL7H IG(AIH(D9h 豈IVI6H`~HP\Hx(r랐A( HiqHI1E1H=PHP1菂XZA.NHEdH+%(HeD[A\A]A^A_]fME1HH=MPH`P1*AXAYHME11ɾQH=^PHP1LAYAZeI}HhyHh{L؂[Dž(ME1HH=}PHЫP1ZAZA[Lx}HH1MH4E1mPHAVHP1H L1ҾpH\f+qu H<  cHHH5HcPIG0HHHPH1H@dyH@HHHHy@藌HpHHP@ (HHpHHHNÅu.NVHMA1ɾH=DPHP1LXZHHHHxHۋHt:HPHHt*HH1epHHtI}$}HH1MH`E1PHHP1,H L1ҾHHL!LL"DA(SAFNAE f HcmHcPHIF0HЃxPHEIV`HH51UwME1HH=bSPHP1D~[A\8@A(HH1ME1HcYPHHP1}L1Ҿ\HHHE11H MaHHP1}H 1HLdDLA@HHE11HMPH?HP14}L1ҾHL:_AXEDHH1MHJwE1PHHP1|L1ҾyDA($LH1ɺHHȁÅxHPHHpHHPLHDžHHHHpHDž HDž(Dž0H8H@HPxIG HtHcx <~> DA(~0ME1H¢pH=P1{AZA[HDž H@H5HH|uHHHH1H@H uH HH{HHHP,bH )IG HHc<~:ME1JHpH=~P1zAYAZH tH迀H HH@HpHXHpHpHHH(uHH1H@0tH@LcHHyL9t$LLpH@LpHHALHHHHHps,tHHpHAHHr(~$H tH=iHtH516wH=iHmH=imHiHwiqf.HH5ȃ=sHHHMD(9|hHH H@(@0u]XHH=i)ڃ1H 4}H5cv ffHHME11H|+PHpHP1Ax1HL.H=hhXZHt#H51uH=LhH5|1uL(D,Et|HtrHfH8[x4uXHE1MHH{HߋPHAP1wHL4_AXUHME1HH{!HߋPHIP11wL#HߺY^H=SgH5DHfDH@HpHHxH HHQHH9HIG HHc<ME1HS@H=zP1^v[X<fDƒscfDƒt];fDƒu0[uHHHHHK v1HH H HHkHHVHH5voHHB1H 蜄H HHuHHfDHcHlH yH5G1r{HcHi@KLn/H5hLDnDHI111H}LHtHDeHojDAM6DHH8H,I}1ҾrHDHc@IV H<DDBuME1HH=wQAWxPHP1sDH  IG H Hc <ME1DHpH=wP1AsA[[fDLH`DuDHXDHC(Hx|DAH1ME1PHsHvPH1rL1ҾHPY^HEdH+%(HeL[A\A]A^A_]DHL1E1LSHXMsH9vpH0HWP1rH 1LHHEdH+%(ssfDM=HME11ɾH=uPHAVP1qH H@HHxqH@HHHHpH{@VwHP@ (ME1HH=.uPHQP1 qXZwI}1ɺvnDHH1MHtE1PHbHP1pH`}L1Ҿ1ɺuE1HXDH@(HxZnDDLXLfDIE(HxuIHMu(1HDžI~}}H1HDžI~RHm-fHtLHH`mhH g9|kH11HH*iJHLH } HDžH~HAxHH p1LHHEHHsH^HHE1H=rPHAWAuP1LnH IE(1ɺuAHxliDLHXLh(M} I7HHD|!LHHHsDnHHHu0Dr`DfoMLHUH5rLDAOfoUAro1HrH5rLA_oAg(HIG8SioLAo@oAwPHIG`aI}oH5AhoAOxHI^DHPIN HHc |cHME1pDH=pSIN0HpHP1lHXDH Lh(HX,I}D@DHc eDHkHA~\_H>1ɾPH=p1ATLLDXZHME11HoPH?HP1kL1HlY^LH5AveDHH(111DHjpHIkMDI}1LD!iHDHc@IV H<~[LDKjHsmME1HH=nQAWxPHzP1jDH LDxDLhHtHVLHHxLnHxJHH1nHx/HH!HHHI@fH=ncHHL@@ E1LxIDpMLhEAI(E;n HHHLAtLxDpLhA~\tI~H=1?qHP<HH@ H(Hc<"HH[E1PL1H=mhHpXAZA[HH1MHlE1dPHAVHP1hH L1ҾgH.HH1MH]lE1PHpAVHP1-hH L1ҾHA~( cHZhHx(H|W A(BHME1IH=kQHQ1PHSP1gH LDHXLh(A~(HcHg@HME1RHH=6kQHQ1PHfSj0P1 gH0LDvA({NLxDpLhA~\HH=VrHHx IAQI1ɺH=kpHP1ATLL?H HU.fDA(hL sH H@H@sH@H(HHpHAkH@L HyIG HHc<#E1MPHɎpH=iP1le_AXHHM1PHWiE11iH:eL1ҾlHL@ZDYA~(A(_}1HLebH>LHx}ULxHHZH(Lpbfo] LpI1HLLLxAEH tSMBHABLpyoH1KiHH17dS<HEHH H{Hc l~1HHE1PLMaH=Y1UHcC^_HuHV0HHHP HtBt Hx0L_HcS1HEHEH@0HL GID$XHt6I|$`HMHUMfoAHE,H5XZ)EPID$ H I|$(HMHUMfo HEH50Z)EPH}|QSHE}HEHH HlHc ]aHEx(HcfHEx(bDH@H8|^AD$ffD1bHSE1PHYPHՅH=WPLM1SH fHHmE1P]LMH_SAuP1PL%WE1LuL1M}SL1ҾL+L胾AXZE HEdH+%( HeD[A\A]A^A_]HuHcƒ~(~6HHȇE1PLM1|H=WRHcCAYAZHLmL}M6IN@A~HL)AFHMAFLMHcCHIO0L,IO8A}L4uIO H<~-AuE1MH@H=\VP1DR_AXLEHULLHuAąIE(LHEM'Sx IG HtHcx <~F fDA(~7HME1HۆH=WP1QHEY^LEH[HxH%HxLlDVE1LpLxLhDLLL111L]IHMu^IHuHE1LpLhHA(gHUHuLAą[E11ɺdLG`LLpLhH@H5T?L|\HxPHEHǀHSME1H}PL%U1L!PLL羠̻L$XZHE LuL}AF ~LAFI~1HcGHSE1H+AF E1PH=S1OA[A\LeHcC-fufA|$NHcCMd$MIT$0L,AUufA|$NPuIT$`H}P1H5nSHSjPE1h3H=SPHPLM1NAUH ffDLEH1Hx01AIL jHwN&]ZY'RHAuP1E1PL%R1LuLMrNL1ҾLmDMmM HcCIU8L4IU0Hƒxt1EVHEtIF@LLHHgtA@H@(1LLHHftD1CCH <Ho1LXIT$`H}1H5QsFShE1jP<H=QPHmPLM1aMH LpLh>Ht:HH %lkRHuHxZMHELMHHMS1PLuE1YMH=Q1LLʷA[A]AąFfDHH}S1PLuE1@MHxLH5;;LcXHEHǀLmLe11LQLLLL1LQ1LeIԍH}1LILQ1Lm趍LLIXBSHEH@ HHc<~7AUE1HJQH=OPHԁAVPLM1vKH D :Ey;L%E1E11L11+HE1E11L11:H:H5PL-cEH5̵L%U`HH[;VH=O;H58{LH=<;H5{NH=);H5| NH=;H5O:ZH=;L[?H=:L,MH5\PDH5}HH:EVH=:H5wLH=:H5}NH=:H5a~|MH=}:H5YH=j:L>H=[:LLH=OMIHtVHE@LL@Hxx OSAąHAUE1E1P1H=MIY^E14HH|S1PL}HxME1OH1MXIL1ҾQHAXAYHEdH+%(H}He[A\A]A^A_]8HEx(aHSE1H}LH=(NPLM1HA^XHpAUEE1PH=L1H_AXJSJfUHAWAVAUIATISHL57HF0IcVHHJP1FGIcVID$0HHH{0HtHC Ht@ubH{htHShH GLLt1H{pt*HeHSpLL[H GA\A]A^A_]ffDHe[A\A]A^A_]ÐkOH{0LHIPuIcVID$0HHnAVMtWHAH 5G1AWMKH=\MQH ~QSGIcVID$0H HHf.H FAM1QH q~OH=MQGIcVID$0HHXZff.UHAWAVAUATSHHL5q5HG0IcVL,MeID$ HI|$(HP ID$XHt I|$`HP IcVHC0L,L=P5fDIcVHC0L,Me(I|$Ht 7ID$I$HtLIDŽ$IE(LHRH[HuH=_6PH=K6PH1[A\A]A^A_]DID$XHHcNPH_v{uAwPHuPIGXHȋMp@14H0fDL611Ҿ H1E1MGXHc]IsIE1H-$H5AHߋPHmuP1X6HMHߺA[[IE1H#H/5HߋPHmAUP16HMH߾诠A\A]A.N0H}Hu11L^;HDMvHuHI"6DMZA?*u2A.u+H}.k)HHtIw5DM"H#PHt H= HHl Hc 1]  HEHD@ EE1I<$HUHuDM,HMDMH UHEH]E1HLup DmILeIDMAIFLHJ4I2*E9HH]LLuHLeH;7HH!Pi HH{ HH Hc 9 HuIE1H^mVyPH=213H Hx HaxDEA'$DED=H8x.HCHH HtHc HCH xHCHH HtHc HCH xHCHH HtHc  HCH xIV(HH,HI<$HM1Ҿ7'HH9 PHpH!HHhHc 1Y =HiuIE1P 1H=.12AYAZ HH&HIE(I~HpPHH>HHRHc 1CAHL,(HIE1HqiH=]0P1H}91YH}^HxLIE1HH=!0H)ȹPHFhuP10H -HE1IٹH\kH=/P1H}0_H}AXHYPH}HHHuHc 1faHEIٹHjH=V/P1;0A]A_.BHHH:Hc 1+HIEHiH=.P1/AZA[MHcPHH HHHc 1QHhuIE1P1hH=^.F/XZ!I$H=4HE['HHHP@ E1LuDmELmILeIfAI(E;t$ LHAvLuLeAE A HUPHHhHHHc 1SHfuIE1P17H=U-=.H}AYAZHEx !HuHCH xHuHCH x HuHCH xHIE1Hf+H=,P1-IG@A[E1A_ HuHCH xkHEH;@NfuHEH@0HкxPHDHMH50DEHQ`H1%HDEIH H=(,QPHUgAPEP1H},H}H HCHH HtHc HCH HduE1IPH=+1H},H}HM5_AXkHCHH HtHc HCH HCHH HtHc HCH LuDmMtLH{`H-H519:HuHCH xZHuHCH xDMH]LuDmLewHCHH H}Hc  eHCHH HHc TrM>AHCHH H>Hc &HCHH HHc mHuIE1HcAWOPH=)1*HEH HHCHH HtHc 9H xzHCHH HHc 1HCHH HtHc 1H xHIE1H]eH=,)P1*XZHuHCHCHH H&Hc 1HH2HC%*ff.UHAWAVAUATSHHHLwdH%(HE1HG HE I>IAMBt EfIH AN #AAFMfH!AF HUdH+%(P1HHHL[A\A]A^A_]rMfHiHcrHPXL4AV8xt3HEdH+%(HHHDH[A\A]A^A_]%HH=(P+HSHHSHPHSHHCAtAF81fDHUdH+%(vHH[A\A]A^A_]fDIwLmHULLAF HuHtIG LHh(HSHHSHPHSHHCif^fDHHSHHSHPHSHHCg(HUdH+%(1ABEn0EtOIN8Icվ HHM'Ht2HMHAF HIF8H)IA)HuEn0DHEHE E1HEHEMHM LHHUHMHUHUl'HUHHM IL)HEHUK4,Lt AF :@HH=%)HSHHSHPHSHHCAAF8L)AF HpI4)HuIF8AV0AF HHUHcMf8AV0V&f.UHAWIAVAUATSHhdH%(HEHGHEHG DEoHEIH8LeI|$1I|$H1HCLHEIGHUMGE1HxL9MLEH;HCHE1I~HHHSHPHEHpHFHCHFHHFHXH^%AŅu IF hAąDEHEHxIGHUH9ZEQI_HCD` ELMHxHuHPAŃ \=~AąA MnI}^HoMN PIx-HHHt%Hc 1x fHx HML]HM0L]'I}/I}UHuHE0LcL9]u}HEDhEAHCH H{(HHHKHHHCPHS0IGHUEH9HEdH+%(ZHeD[A\A]A^A_]MN I}11Ҿ LpLMH I(LMLpHH]HEHPIxbHYH0HtZHc4>@xN@LH'L]E1 u{H=!P1"AZA[L]DHx-HEA.N@.NfIAHH HtHc IAH HEHxHEDhfDI}1AHEHH89IALHHcPAIA^(HH0HHc4>@@H=IAXHкHH@xHEDhEfIv H}1Q@HMLII@IA H=HHUHc 1F EHH[E1 PH=1 AXAYBf.IAHp HtHc4@IAH fDEE1ApHEH=D@QH[LmAUM)AUP1wH fDA.NGDHEdH+%(HHe[A\A]A^A_]~ fDHUdH+%(HeLH1[A\A]A^A_]CHE@ A f.HAgRDxXHHHtPHc 1xEHEHH=D@H+ZP1c^_HxIAHp HtHc4@AIAH x4IAHH HtHc IAH x HuHEH=D@HYAUP1LMH}HV LMH}HcPXYHuIAHH HtHc IAH ^ff.UHAWIAVIH=AUIATISHHMtHLLLzHbt>MtE1HLLL蕺uy1HHeH[A\A]A^A_]DME1HY PHXAUL-PL1LL6Y^qH ME11ɾ H=XPHXATP19H5Z H18'XZJH HOHwHcPHAXHv0HH4HtTH~Ht1Ʌt1HHHtH@XHЋVt HtH1ɉH1HuHt>HmHD1ff.fHt>HmHD1ff.fHHcPHGXHHt4HHt HɉHHtH@XHHtHfHHuǹfDUHAWAVAUATSHHhHxLH?dH%(HE1L}IH;IHEk IH;IY HEHPHEHHHHHc 1 HEHELhHEHEHHu11A AÅiHEL`M9PD]~fHUHu1LPADžHUHUIFH3LP u}IFIHIINHHHEHHHIHHINHHL1LpM9EMM$$IFH;DH E_E1H3LP tHAH1H=Xl IًRWH=Y^AHEdH+%(HeD[A\A]A^A_]fDIHx n@ADD]H PHEHHHHHc 1 f.HUH9x EH}D] HD]Hx(1wEHHx(1vEHMHuHD]H=, D]fDHtkx qHD]E1 HkAW)H=ouP1LMMD]H 0HEH@HH HtHc HEH@H HixE1 PH=1LMA\A]HEIٹHvH=PHiP1_AXHEH@HH HtHc lHEH@H x ZE1HEIٹHH=QPHH1HzH~It$HrIt$H1It$HNIT$HPH@H9WID$Ml$HEL9t H=H9xt-HC HHEL(IT$HPIT$HID$H[LK PIuHHHiHc 1Z HHhE1 P1H=YAXZf.Hx HDUE1 HgAVVH= AUP1DUH LDHL AIHPH@H9E1IAHH HtHc VIAH x HHHHPH9tHHIt$H1HHIt$HqIL$HpH1HHIL$HPHPsHx eHC H IT$HIT$HPIT$HID$%DHqHLK PH%fPDEIAHH HtHc  IAH Xjf.UHAWAVMAUAATASHHhHdH%(HE1Ht@H1IHt.HIIXHc@H HHy@A$~Hv,HEdH+%( HeL[A\A]A^A_]IIqMH  H9*HH9HDEA  H{ L=H9H< DH H9HH1H< AH Hk HDHE1 H=SPHAUPHdP1H@@H9,H#y L=~HL=HLDHH9y t}AHH AWHDH5HHDSE1a QH=  AUAVPHPHcP1LLHPA?HHLE1MupfDAH\DtHHAHcH9}D`HIIPH IH9HHHHc 1 +E;HMcHDžE1LIHDLxLLDDH,L1E1AAHIA-HB 0 DE1IOAIt3IcǾH)I<K.H9H1IAIuIcH1H)LLLA7@HHqB (A<_.C1IAM9t1IcǺH)I<HL9H(1IAM9uMcH1K<W H=P1XZoHME1H:x H=PH\>P1lA\A]+LHME HH=>PHC>SP1"A[[e1HkHME1H=WuH=PH>P1H ME1HcH=PH">uP1Y^yH(E1MH!H=sPH=uP1U_AXUHLME1HH=&PH=uP1XZff.UHAUIATISHHHtdHH]HHtMHHHPLHp LH(L@H߅xBLHk1,H1[A\A]]AEsH[A\A]]AEPUHSH1HHH@HcRH@0HHt%HHxxHtHH]H5V1H]fUHATISHH}HH dH%(HE1t HUdH+%(H [A\]@H}1ɺuHLHu HHUf1LEIH@H2IuuIT$HeIT$HQdff.@UHAWAVAUAATISHH(L L=~C(HS~ gIA0IcOfL4HcCHfC(x;B }HRHHI~(G0t;H{LUvUHC He؉[A\A]A^A_]fDucH=sMIA HHcx|<yfIcHLfHsH=L AWMK8IA H+Hc<~<Ay(~-HH;E1P1H=`AXAY{(RK0L=EfD1HDLduOLH…H=GH5;1H52L:IF(x0uDLtlHf(H=1Ҿm1 D1L+f.Ay(HE1H5:H=P1N^_C0H=rH51HK@HS81H=SH5fH=9HH5 :1H=H5:1H=H5Q:1zcDHG8H{ HEH{8:IiL AWIH@HEMt2BIA H5Hc&<~:f.HY:LUE1uȾ>H=wP1LUXZHELIHs8H{H)&H}1 IFHHHIFHuLIFH{蠷IcLH2Lx|IA Htsxk<~.H7w8E1PH=1OI~(XZHw8H{\uCAwL @Ay(Ay(H{Hu )IF(AWE1L H4p8H47HP1\HbH1Ҿm1 uD1LAZA[ff.@UHAVAUATSL%~ =bLHIct$~C(IA0fL,IM(fC(A0AAtAHeD[A\A]A^]fDuCH=+HrIA HeHcV<~zXDHsH=L AT$Mt*xIA HtHcx <~7 DAy(~)HE1Hq8H=P1JZY{(C0C0H=eH51HK@HS81H=FH5DIA H0<~.H,7q8E1PwH=1IM(AZA[Hq8H{L AT$MDAy(HE1H-7H=P1>^_Ay(ZH=YHH5+51H==H5V71f.IE(L E1AT$~H=p8H^6P1AXAYDUHAWAVAUATSHH(HuH}H $HIHHcQH@0L,HHIHLDIHcHH]I{HH1HIM(HËA0ƒL}AXD1HDH$uOHH= H5Z61{H5LIE(@0uDH襪tHuHD}U:@ItOHwHuH}HIG HuHHe؉[A\A]A^A_]ÐL}IfDLi8bMIHPMt%IA Ht|Hcxq<~,DAUE1H5H=P1XZM,$IG8LLID$ID$I|HUHH I@Ay(UHSHHHHHcRH@0HH@(@0tH]DHH5IHQH]fDH=Ht8UHH={]HHfDfUH1]ff.@UHATSHtRAu9HH5u HC(H HHCHS0HHE1D[A\]L%HL}uIHC(Hn5HHC0L fHH5PuHC(H 'HHC0H돐AUHAWAVIAUIH5sATIHSHHxdH%(HE1H5UHH5RHH5NHH5HqD;EH{H51dASAI:LIMt HaHcPIH@#HHH1ҹLHͿHEdH+%(CHxHL[A\A]A^A_]鱆HHH?LHHdHLyHHEdH+%(HxL[A\A]A^A_]DLHUdH+%(HxHP1L[H5A\A]A^A_]zf.LHfIŋC)E)EEu ; H{HS{B HAJkdHJLqЍEHuH}BDHωEBBDHщEBBDHЉEBBDHЉEBB DHЉEH4ׂCH}HH?HLI?HHHH)HI)LHQpHW)QΠELHH?H H)HDHUdH+%(Hx[A\A]A^A_]fD1HHH{H5AŅAS}AI LbHhH_HHpSIH<H93HxH5;Dž`Hp_HHt'LpH5LLI5I9fHp DždHxL5H&HxHpHjADžuHH9x IIAHu1wLIHHHtLHAHL趂H8fDLfDH5H[H5[H|H5HehH0HHLHHLHfDH5HbLkH5pLXHDžxH AH54HIH@HHWI91 HLMDLHxALӆ]HEH@H; |H5XL@L(H}11HH}H5Vu4LgLH}11I1@iH@43LHE.Dž`LIOH5LXHDžxHA11LLHHH5HHxHxMcH[ILfAHhA9HhDHI]Hu;CudAdLHhH5L_iL{ H5L菾AŅHpHHxnLHLH)Dž`HpZ 1LGdHpH)HxLIHHH`LHHc*HEdH+%(H5L讽AŅeHLHHxff.UHAWAVIHAUIATSHHxHhL>dH%(HE1żIHvH5HMoH5!HH5HH5HBIv>H5HhIvH5NHF~H5HOWH5H8IH5BHH5.HLFHHtfHEdH+%( HhHeHKL[A\A]A^A_]f.LؼHtHKHH11HUdH+%(He[A\A]A^A_]@HEdH+%(}HeL[A\A]A^A_]7HEdH+%(MHeHsL[A\A]A^A_]LIHdHHHLIH1HHI1LLH{HHLjI1L jH gH5w$H5HHhٽLXHhZLHhIHhDH5H H5PH H5^HAH5HlH5H-LHHHEdH+%(HeL[A\A]A^A_]LH H HDfDL0HH|HH]dHc|HHǸ 9HOHL|qHLijHH56IHIgI96H1 LHt9LI芿HRHHLHHEdH+%(HeHL[A\A]A^A_]y1LHt9HHH@sH0dHXfDLhLcDž|hHtH|Hҳ€{H5%L牕hqh8H5HHMLIE Me(LHh詵LHLH It[Hu}HhtsL=HhL>LueDMaLHhHhF@HM2HhHEMu HԺIĐLH5L1̸f.H5L牕hKhH5FL.|LHLIHHhHKHL1LHHEdH+%(B;L=ZHhLL11ҾLL聴H5HHEHEdH+%(L踷HHL]HGHAHHcRHpXH4Ht5H>tHHHHtH@XH4Hu1@HHuf.UHAWAVIAUATISLHhL=HN0dH%(HE1IcGHHHHLIMpH+aHHHHHHH H51HH55HھH53Hþ+H5/H謾,H51H蕾H5)H~BH59Hg HHvqH5"HuYI$HsHHbf.MM,$fDH5xHM7IcWHIFXL<MI?H\HEHH5HjzH5\HsH} v H5?H08H55H9H5.H"H5#H #H5HDH5HݼH5HƼ`H5H诼&H5H蘼H5H聼H5Hj)H}H5'H#H{rHf.IH\H@XL<OH5HH5MtI?HJHEfDLPHhHUdH+%(He[A\A]A^A_]DH5KH\H5HeH5HNNH5H7H5H  It$HHSMt{I?tuLHKLLH;fDH5pHѺI$hHMtHfHHHE$H5bHyH5jDHHHH5H1umIt$pHeDH5H H5HI|$(H{HzHDHf.H5H豹H5H蚹H5H胹kH5HlRI$HLHMHxMHMHEM.HxNDI$H5QԴHH>fDI$pH%DID$HpXH @I$PHD胬H}H藷EH5LP1I$H54HHfD3Ls~fDI$H5HH^fDHs LH@L谹HH*f軫H}H϶HcUH5/LHHiQH%)kd)1I$H5LHHfDLiH5 HIH5H2pI$@H_I$XHEDL萭HH*f軪H}HϵUL1H5/fDI$H5?lHHfDLХH5L1̭HH9H}HMUL1H5虭tI$H5HHZH55HeH5*HH5 HյI$8HH5H諵urIt$0HL_HH\H}HpUL1H5輬I$H5HH}HݩHCH5H'HSI$HHU述HUHHI$H蟰HH 蛨H}H诳UL1H51ҾL7HHTH}HhUL1H5贫L'HHH}H(HcEHLHHiQH%)ȉkdPEPE)H5GPEPEDMD@19H Kff.UHAWAVAAUA1ATISH HLH觩L==HCXIcOHH:Ht[DEuAt x<A tpIT$It$MLI<${Htր8tLHHI菲MoMuAF IT$It$LE1I<$L*H5HHHIT$I<$LIt$LH5ݵHHH}耔IHuPI<$DH51˛IT$It$LI<$IIHtHLH輱ALD98fDH}DO EHuE1L=MLuILeMDHLL19HHIFJIBE9f LuHuLeaH}G )E1LuL=׳ILeMĐDHLL1ɚHHIFJIҰE9f LuLeH}W E1LuL=gILeMĐDHLL1YHHIFJIbE9f LuLe8H}O E1LuL=ILeMĐDH|LL1HHIFJIE9f LuLeH}w KE1LuL=ILeMĐDHLL1yHHIFJI肯E9f LuLeH}DG EHuE1L=LuILeMDHeLL1HHIFJI E9f LuHuLeRff.UHAWAVAUATASHhH}HuHMdH%(HEHXHcPHFXHHHHHEHH1H臫IHHE*IMLE1H}ƉEޛLUH"HEDtLxAD9}DLߧHHLH)uPH11HHIHHH@HE赠HcHxH]HHEkH HuLQH}H}H1ҾsLHEiHEH}HHpLEILA"D9}HMDtq u1ELHM违jHM@IMq1HEdH+%(HeH[A\A]A^A_]ÐHHtH@XHHtHH}HPHEHx&HHHtHc 1xfHxuLME1HOH=P1ΝXZH]oHEHH(HEH@HH HtHc VHEH@H XLHMHMhHPHEHx1HtfHHt)Hc 1xf.蛡NHtQx~uLME1HmH=+P1_AXHEH@HH HtHc yHEH@H 荝ff.fHwHHѺUHHAVAUATISLwHHc@IVXL,MI}H5 LH5LʡH5L賡tH5L蠡HsH;HLL˭Ht>8t9H;H[A\A]A^]fIHtHRXL,Mt I}L[1A\A]A^]ÐHsH;HLL DHsH;HLLޫsfH5@LtMH56LΠt:H5:L軠tGH5/L訠dIE(HsH;HLLwfH}@UIHSHHHHWHwH?:Ht8tH;H]HРH]1UHAWAVAUATSHH $HH $HHHH1I͉MMdH%(HEHHcPHG0LHL8=(LHLLL߉MW LABumI(AVMPHHAR(ZYAIG @u01EHUdH+%(He[A\A]A^A_]fDH(|fDHL|MW LhDH }IE1H=QPHP1迗^1_^豙UHAWAVAUATSH1HdH%(HE1rHIH%IVXHc@HLz@IW0HLchL!HuHHM6IǢUMIJ (LLHi@BMLLL[H{LDHL IAUH5HAHEdH+%(uHe1[A\A]A^A_]輘ff.UHAWAVAUATSHH $HH $H8dH%(HEH AHIDž(HcPHG0HL ID$ @u{HLI|$(HLQLDMP0ZYAID$ @ud1EuH1L:HUdH+%(u=He[A\A]A^A_]@H@@EDUE1IH DpH=PHP1+LCYDUDpM9^G@u~HDU貘DUtjIv8HHiHDUpDUEt@w@ H=ǕHHHc 1^ HIE1H/wPHHPHpXP@LCM9[D]EEPE1fHELx(IHtAHEH@(HHttLhDpDUDUDpLhuGIHtPHEH@(HHt'LpD]DUwDUD]LptABHIE AHvHPL;{IHEEH@(HHEH-fDMA A}uDE-H~uHE1ۋPHȅH=HH Hc 1EH$uPHHy HHHc 1LwLIMHEMpLh}`HxdIHH}u1LHELEHELE߁HUHuLHHEHLp}x H}A蜇H}L~H}ŀH}dLHc虄H}H}7LvI9tH5tL;HuMLLHEL}M_ L|LHI蘊A LHIE1H wsH=đQPHHXP1H @AD҃DDDHEHH H/t1HE@HH2H5&AqDHxH=xMf.HHIPHE1XPHD]謑D]Iv8HH HD]iE H rHD]PHMHH8s H}H8@E AHCHHHH5֑uHLt}9H xH xmI1HCHHLCI@ txYHH=MH}HsHHiLCI@ HtHc hI@ HCHHyH=HHLC뼾:DHuHCHHu LCI@ x@HC(H;HHDHEHCHfsAIHCLLMHxhLMLs11ɾLLvHєHHHEHopHHCHHHc 9dHuLوAE<L)vLLiH0oPiH@HrHHKHc 1<1LHu~AE<LHCIE@HuHCHHu LCI@ x@HuHCHHu LCI@ xl@H}耍HuHIA{HxIHHIE1HnLH=PPHP1AYAZ@HuHCHHu LCI@ xHD]IE1H(PH=ދ1XD]Z?HDUIE1H^FPH=1~XDUZȃ-HCHHLCI@ HHc A4$E1IٹHP1H}`~_H}AXoLCAx(HE1IXH6PH=ϊ1H} ~HdlH H}PHVHHCHIE1H0H=oP1}A_X&HRIىPE11H=;}}XZlfDL}LϾL\yLMH}LoHIE1HkH=ԉPHP1 }HCǀY^yHIE1HH=P1|A_XI@ 5HHHIىPE1H=1sAXAYkI@ HtHcELCI@ HHc H}LuLmLpLm!rLU2uH}LmLuLpLuqLUff.UHAWIAVAUATSHpdH%(HE1tLQw1HItf5aLHcfHH5aHHHHcVHhHI0HuHL4HKXHEL$DEID$HLh@AUXLUmLElUAuXH tEtH tHtHDLHxu{uIغHxIEH=~VQ1PHP1VIHEH HDEHE@(E}Wp} LA xE HHEHcPHȅ4H2H H, 0LtkLHxzHI1HxIEH=|}RPHP1-HH I|$Ht_ID$ID$Lk1ID$(HEHH@@s}iM9}HHuHIE1H=|VPHjQP1pH yj1ID$(HEdH+%(He؉[A\A]A^A_]fDH@@ fEAMn(/pA MuFHLHxxHEHHuH]lHEpHOHHHGHc 8`1L3v0fH\HSXHEHc@L$I|$@HW0HhL4ID$HHE2LA2uHEHIٹE1PHH=zP1nHEHAZA[E2HcPHȅHuHCH xfDALDhHuHIE1H=czVPEPHP1>nH DHE@, @HEPHx.HHHt&Hc 1xf.HxHzID$ AHCHH H}F > HEHcPHHAEXH.HH 1LsAƃuG@HCHH HtHc HCH EAfDHuHCH x oUfHMHIE1H=txQPH jP1QlH 0HE1IٹHH=4xP1l_AXNfDHCHH H`KfDHx11H}DmH}H5~twHEXHH`hHxIF(HHpHp:HxHpH`^fAyHxHx gHxH5y~H8KyHxfxPz[LHp-tHu1HogHXHGHXHpqH+IF(DEUHpHIF(HL`HHxHHHD^)HxHHxcHMLhE1H=Q}QPHP1iHpl\Hx pY^H}o2LpLcHELcfDHEpHH*HHt~Hc xs%HHIىPE1 H=|1\iAXAYHuHCH xHuHCH xf.H}11ɾl1HDžpHLXE1HpLPILHfL_9}QMuLLE1lH8Im=uID$8uH@H`HpgIf.LHpLPLpHLXLHuHpIF(HHpHHJIPH={E1 1g^_mHEpHH HHHc IF(HEpHx/HHHt+Hc x !H}lHuHSHB x~HHRIPE1 H=)z1gH}lA[A^HuHSHB xEE~TAvLHcEE9UI~NDHHJLcASC'HGHL[A\A]A^A_]@pLHcEUILHAJLcC'K|7H]18PfDE1ff.UHAWAVAUATSHH $HH $HHLu MLHLHUHHM LdH%(HE1d8LcMDHPHHVH5%]HD)KLFHHHt 8~H5\HoKH5\H`KLEHHHt 8%H5\H&KH5\HKL/MHHL H5\HJLTHHYTH5w\HJL:HH7TH5[HJIcHD)L"H~ DHƄHiEMt{H3pIHhHHHc 9D 1K<'L)HþMMuHHH3R~(!HI HHc 19wHfUAWE1LP1H DXZEH@9.HUAWM鋍PE1H1DY^HEdH+%(He[A\A]A^A_]HHIHHHH5wZHH@IEHH HtHc IEH HHI($E@UIHAWAVAUEE1ATISHHH}HtHLMHMNLMLUAMDLU DEmAcH}Ⱥ1LM_?LMIH?11ɾULFE11LMHDELUIƍsIDEALULMu4f.AFE9=AAt E9ALn9D9DL GH9uك}vH@HUH8 HMHU9uAtE9uHBHuH@HEHtHMH}rjHMH9\=H}H5@>H9HE8,HpgIHH1[A\A]A^A_]LMH5 0LLM)MLMI9MKHH[A\A]A^A_]fDHrHus>H;KHHuHHENHuH} HHEvHEH8FHUH^HE8 HpHu>HJHHuHHEKNHuH}HHEHEH8eFHUHfUHAWMAVAUIHATSHHXHu1HUHQXdH%(HEH}.Hc@HHR@HR0HH@(Li/E1=HIH5VIH1UOMtAMPIU L1H5V6OME8AEPH SMM M9IU0H5VLHHD֋uVH5yP1NHUH=.L>AYAZMHUMMHLLHEH11ҾL2HL0HLI0HH}IHEAIt$LLH0IT$HuLHPIT$HHID$WHH;H5|UHE4H}! 3HHxE1H}AH}H-HcH}LHLH8?II-H g,HqxYHtdH HtQHc 9xF„tPHIPE11H=B^>XZdHt#zfHSHJ HtHc yHSH zH=,TIE1H+PHطWH=?BP1=Y^E1H}w8L=HEdH+%(HeL[A\A]A^A_]f.ID$E1HuHMH9EzLuIHMfDHH1HHc4>@@HuH}=IEIUHIEIUHPIEI}(PLAU0ID$H9EMl$1HuLIELP=~bHEHtH Z*INjQI H(HthyCHIE1AWH=@PH*P1JP1g:A]A_bfDHLuIAH ' H=>1QH Q :A[[BLh9Luh IE1HPH=7>19AYAZHCHH HtHc  HCH xHuIE1H*'H==PHhP1\9Y^DHIE1H&H==PHP19XZ?:U1HAWAVAUIATSHdH%(HE1+HH&HKXHc@H HLy@Iw0H4HHIHHy@HHDž(Dž$x]IO HtTxL<OL8:IHt%8Lu1LHLL;tkAA(~HME1H۳L;1PL16A\A^fDHHw(H3fH@LHLILH?uaH@HVHHHFHcҾGLE1+HEdH+%(' HeD[A\A]A^A_]fH=lMT/HHDX LHEE1H LMLEIHDAI(E;n }JLHLHHA$tLu"Hc HHLHH@(x\tpH$PIG HHc<HME1H,PH=9P15AYAZHH=2%AIHH}#I|$P~fIG HYHcJ<~/HME1HL9YPL1i4Y^H(L MLHH$HHHAƅH"L(PM $?Hxt.H"PIG HcHA<~@HME1HBLH=28P1A3LXZL: A(+-A(H!PxdIG Ht[HcxP<HE1MH@H=7P12_AXA(A[A(Hk!PIG HHc<~:HME1HLH= 7P1_2LY^LHPLHDžP4LHPHcоGL'LOIO HBHc 3~:HME1HL`6bPL11XHU ZHc@IW0HHHxpLeH9HcH53#LeMM$ff.fUHAUIATISHH5$HH#t{H5%H#thH59Hq#tmH5x9H^#trH54HK#t_H5Z9H8#udAEH1[A\A]]AEH1[A\A]]AEH1[A\A]]AEH1[A\A]]ID$`I|$HHE1L?#H:#H0H1[A\A]]^ff.UHAWAVAUATSH8dH%(HE1HEHH|L5;1LmMLe"H}u*M9t%E< t< tAILLH #tHDHHEEH)HHcHEdH+%(uH8H[A\A]A^A_]1"HHv0HcHHGXHLHtTH8tApt HtHfDH1HtH@X1HAHtHtH8uH1HuUHAWIAVAAUATSHHPdH%(HEHHcHHG0HHHLi8A} I]!E1DMLHDž\EAIH8DAHE;~ D9+uC4u1HHpHpH8x)f2HHcH@HHHHH=)ȉ))*^ZYZH5n'H@1 -Hº9OAHHH(\E;~ fDH LHPxKIG HtBHcx7<:n tuHEdH+%(He[A\A]A^A_]A(~Ƌ\HE1M }H=5PHPP1RH uME1H H=4PHPP1XZNHsHhM#"Hhs,Hh\jDHCLH@sLHH@H0H)H0H@LHBHB7HhHH4sHh\DDž\2 ff.UHATL% SHG0HIcT$HHHx0(uHe[A\]DHAT$IAH R1H=!iQXZHe[A\]fDUHATL% SHG0HIcT$HHHx0+uHe[A\]DHAT$IAH 1H=!\QXZHe[A\]fDUH HAVAUATSHGHcRH@0HL Mt`I|$ tXAHAHAtXH=2wID$ @I|$(DHP@ID$ @E[1A\A]A^]H=2Hھ$H=X HھH=1HھYH=XHھ H=1HھH=1ID$ @DH{SID$ 1fHھ H=1|Hھ H=1h[1A\A]A^]DH{E@UHII1ɾ1Hc@HHRHWXH=I&HHR@HR0HºpHP1H U1HAWAVAUATISHHLzHG0HuL-,LIcUHL0IVI~ t-H5LH5LH5H(LL{H5EfL-L1H53<'L{!+HgL/ HH/AUID$ HHc<~5HME1HH=P1HAXAYHHHtHL HCHHPHHHHuLHHEHuL[LL{MAUID$ HHc<fLLHHtL)H{L= !$H{IH.LEADsXAAH{P4AUID$ HHc<fDǃ1ǃ11@fA|$(HLHUa%HU(HHҙM1AUPL=E11LL1LUL譀^_EHe[A\A]A^A_]@ǃ@A|$(RA|$(H ~H{H52H{HfD1VfHH1MAUPE1H=1L{ZY fDL8H:HAUME1HPH=\1JA^A_HAUL5=1ME1=LpHP1L1Ҿ@L{L{ZYiHHU1MAUPL5E1L1L1ҾL`{LzAXAYHe[A\A]A^A_]DH}1H1H5I+DǃH{HAAZAUAWME1AWH1ɾ/H=pHP1H L zDHH1MAUPL5E1L1L1ҾHAUME1AWHRH=pHjP1jH fDA|$(QAH MH_H=.HDHE1PHAVP1H AUxID$ HcH@A|$(L`H}HHM1AUPE1H=1 LxA^A_vHH}1MAUPH_E1H1B L1ҾHxXZHe[LA\A]A^A_]8xAA|$(A|$(H}: A|$(k{\IcUID$0L{HHL2IFXH>I~p}H{`{puCp{tuCt{xuCx{|uC|XHu HǃH ?LcAUIL$ HHc1<HHs1XHH#?MH#HHEAU1E1HPHӔP1 L1ҾCLAUPH1PHyIME1H1Y L1ҾKA|$(ME1WHH=P1 AXAYrHR(z\uI$L @t P1H I~hjM1IZYu,I$VI~pMj1H 1L"_AXHPAUAVMPE11ɾH=(1~ LuAZA[HC`,HɒAQE1PM1ɾff.fUHAUIATISH4HlHtGLlHH/~11LHHH[A\A]]% DH[A\A]]DUHAWAVAUIHATSHH >B(HcqIM0L4AH52 A L!ILDƃH!MH !HD΃HDփ]ȉEH!HEE11ZHH?DHPhIE H[HcL< OI|$xCH[PID$HHED}EP1ɺ|HluȺx1ɾ{HMA~ :A~4t HAV8A~$L1HJ1H1HHH81ɺNHI$HHxxtH5)HI|$He1[A\A]A^A_]f.A}( HfSE1MP 1~H=n ^I|$XZ[HD]Eu/DUEB1ɺ|H@1ɺ|HMąu׺wH1ɾ|}̺P;1ɺ!H@HcA~$QHK?fDHHH1PME1jH=H 16AXAYHe[LA\A]A^A_]provided via SNIInitial (No.1)error-notesssl_engine_kernel.cSubsequent (No.%d)ssl-access-forbiddenAuthorizationBasic:passwordBasic timeout=%lds deadOKREManswer_challengePrivate key %s (%s) Enter pass phrase:SSL_PeerExtListUNKNOWNssl_engine_vars.cRAW0123456789SAN_Email_DNS_OTHER_msUPN_dnsSRV_falsetrueGENEROUSSUCCESSResumedInitialDEFLATENULLLZSNONECLIENT_CERT_CHAIN_" }, issuer rdnSequence:"{ serialNumber FAILED:%sCLIENT_SERVER_HTTP_USER_AGENTUser-AgentHTTP_REFERERRefererHTTP_COOKIECookieHTTP_FORWARDEDForwardedHTTP_HOSTHostHTTP_PROXY_CONNECTIONProxy-ConnectionHTTP_ACCEPTAcceptHTTP:REQUEST_METHODREQUEST_SCHEMEREQUEST_URIREQUEST_FILENAMEREMOTE_ADDRREMOTE_HOSTREMOTE_IDENTREMOTE_USERSERVER_ADMINSERVER_NAMESERVER_PORT%uSERVER_PROTOCOLSCRIPT_FILENAMEPATH_INFOQUERY_STRINGIS_SUBREQDOCUMENT_ROOTAUTH_TYPETHE_REQUESTENV:HTTPSSSL_VERSION_SERVER_SOFTWAREAPI_VERSIONTIME_YEARTIME_MONTIME_DAYTIME_HOURTIME_MINTIME_SECTIME_WDAYTIME%02d%02d%02d%02d%02d%02d%02d%s: Handshake: start%s: Handshake: done%s: Loop: %s%s: Read: %s%s: Write: %s%s: Alert: %s:%s:%s%s: Exit: failed in %s%s: Exit: error in %sSSL_CIPHER_ALGKEYSIZESSL_CIPHER_USEKEYSIZESSL_CIPHERSSL_PROTOCOL%s%s_%dSSL_TLS_SNISSL_SERVER_S_DN_SSL_SERVER_I_DN_SSL_CLIENT_S_DN_SSL_CLIENT_I_DN_SSL_SERVER_SAN_EmailSSL_SERVER_SAN_DNSSSL_SERVER_SAN_OTHER_dnsSRVSSL_CLIENT_SAN_EmailSSL_CLIENT_SAN_DNSSSL_CLIENT_SAN_OTHER_msUPNSSL_SERVER_CERTSSL_CLIENT_CERTSSL_CLIENT_CERT_CHAIN_%dssl-secure-renegversionciphersubjectdnclientcertSSL_CLIENT_S_DNissuerdncacertSSL_CLIENT_I_DNerrcodeerrstrBADcachingSETreuseFOUNDrenewalMISSEDGETssl_engine_log.c*envelope*bad*decrypt* -- client doesclient does notSSL connection requiredssl-renegotiate-forbiddencipher-suitequick goodrevokedssl_engine_ocsp.cmodssl_verify_ocsphttpRSADSAECCwrong pass phrase!?*CLIENT_HELLO*http*request*speaking HTTP to HTTPS port!?*no shared cipher**no start line**bad password read**bad mac decode*SPOUUIDSSL_SECURE_RENEGSSL_COMPRESS_METHODSSL_CIPHER_EXPORTSSL_CLIENT_VERIFYSSL_CLIENT_M_VERSIONSSL_CLIENT_M_SERIALSSL_CLIENT_V_STARTSSL_CLIENT_V_ENDSSL_CLIENT_V_REMAINSSL_CLIENT_A_KEYSSL_CLIENT_A_SIGSSL_CLIENT_CERT_RFC4523_CEASSL_SERVER_M_VERSIONSSL_SERVER_M_SERIALSSL_SERVER_V_STARTSSL_SERVER_V_ENDSSL_SERVER_S_DNSSL_SERVER_I_DNSSL_SERVER_A_KEYSSL_SERVER_A_SIGSSL_SESSION_IDSSL_SESSION_RESUMEDSSL_SRP_USERSSL_SRP_USERINFO[n/a]n/aproxyOCSP responder... [subject: -empty- / issuer: / serial: (ERROR) / notbefore: / notafter: (none)POST http://%s:%dHTTP/get_stapling_statusmodssl_stapling_renewNOT matchesdoes not matchoptionalrequireoptional_no_ca%.0fssl_engine_rand.c
TLSSessionCacheStatus SSLProxywithwithoutTLSv1.3, TLSv1.2, TLSv1.1, TLSv1, ssl_moduleAH10272: SSL Proxy requested for %s but not enabled for us.AH01964: Connection to child %ld established (server %s)AH01962: Unable to create a new SSL connection from the SSL contextAH01963: Unable to set session id context to '%s'AH01996: SSL handshake failed: HTTP spoken on HTTPS port; trying to send HTML error pageAH01997: SSL handshake failed: sending 502AH10232: coalesce failed to read from %s bucketcoalesce: adding %lu bytes from split %s bucket, total %luAH10233: coalesce: failed to split data bucketcoalesce: have %lu bytes, adding %lu more (buckets=%u)AH02012: unexpected %s bucket during coalesceAH02013: coalesce failed to read from data bucketAH02014: unexpected coalesced bucket data lengthcoalesce: passing on %lu bytesBUG: %s() should not be calledBUG: bio_filter_in_ctrl() should not be called with cmd=%iTLSv1.3 ciphers cannot be set inside a directory contextAH10510: 'SSLEngine optional' is no longer supportedConflicting SSLFIPS options, cannot be both On and OffSSLPassPhraseDialog: Invalid argumentInvalid SSLPassPhraseDialog exec: path Your SSL library does not have support for per-directory CASSLCryptoDevice: Invalid argument; must be one of: 'builtin' (none)SSLSessionCacheTimeout: Invalid argumentInvalid size for SSLRenegBufferSize: SSLOCSPResponseTimeSkew: invalid argumentSSLOCSPResponseMaxAge: invalid argumentSSLOCSPResponderTimeout: invalid argumentSSLStaplingResponseTimeSkew: invalid argumentSSLStaplingResponseMaxAge: invalid argumentSSLStaplingStandardCacheTimeout: invalid argumentSSLStaplingErrorCacheTimeout: invalid argumentSSLStaplingResponderTimeout: invalid argumentSSLRandomSeed: byte specification not allowed for builtin seed sourceSSLRandomSeed: invalid number of bytes specifiedSSLRandomSeed: invalid context: `': This version of OpenSSL does not support the Entropy Gathering Daemon (EGD).Invalid SSLRandomSeed entropy source `This version of OpenSSL does not have any compression methods available, cannot enable SSLCompression.SSLProtocol: SSLv2 is no longer supportedSSLv3 not supported by this version of OpenSSLAH02532: %s: Protocol '%s' overrides already set parameter(s). Check if a +/- prefix is missing.'%s' session cache not supported (known names: %s). Maybe you need to load the appropriate socache module (mod_socache_%s?).'%s' stapling cache not supported (known names: %s) Maybe you need to load the appropriate socache module (mod_socache_%s?)SSLOCSPProxyURL: Cannot parse URL %s'%s': invalid OpenSSL configuration commandbio_filter_out_write: %i bytesoutput bio: unhandled control %dAH02569: Illegal attempt to re-initialise SSL for server (SSLEngine On should go in the VirtualHost, not in global scope.)AH10085: Init: %s will respond with '503 Service Unavailable' for now. There are no SSL certificates configured and no other module contributed any.AH02561: Failed to configure certificate %s, check %sAH02562: Failed to configure certificate %s (with chain), check %sAH10131: Init: Unrecognized private key identifier `%s'AH10132: Init: Failed to load engine for private key %sAH10149: Init: Failed to initialize engine %s for private key %sInit: Initialized engine %s for private key %sAH10136: Init: Unable to get the certificateAH10133: Init: Unable to get the private keyAH10137: Failed to configure engine certificate %s, check %sAH10130: Failed to configure private key %s from engineAH02574: Init: Can't open server private key file %sAH02575: Reusing existing private key from %s on restartAH02576: Attempting to load encrypted (?) private key %sApache:mod_ssl:Error: Pass phrase incorrect (%d more retr%s permitted). AH02578: Init: Unable to read pass phrase [Hint: key introduced or changed before restart?]AH02579: Init: Private key not foundApache:mod_ssl:Error: Private key not found. AH02580: Init: Pass phrase incorrect for key %sApache:mod_ssl:Error: Pass phrase incorrect. AH02582: unencrypted %s private key - pass phrase not requiredAH02583: encrypted %s private key - pass phrase requestedAH02584: encrypted %s private key - pass phrase reused OK: Pass Phrase Dialog successful. AH02564: Failed to configure encrypted (?) private key %s, check %sAH02565: Certificate and private key %s from %s and %s do not matchAH02566: Unable to retrieve certificate %sAH01906: %s server certificate is a CA certificate (BasicConstraints: CA == TRUE !?)AH01907: %s server certificate is not a leaf certificate (BasicConstraints: pathlen == %d > 0 !?)AH01909: %s server certificate does NOT include an ID which matches the server nameAH02568: Certificate and private key %s configured from %s and %sAH02540: Custom DH parameters (%d bits) for %s loaded from %sAH02541: ECDH curve %s for %s specified in %sAH02407: "SSLOpenSSLConfCmd %s %s" failed for %sAH02556: "SSLOpenSSLConfCmd %s %s" applied to %sAH02547: SSL_CONF_CTX_finish() failedAH02572: Failed to configure at least one certificate and key for %sAH02217: ssl_stapling_init_cert: can't retrieve issuer certificate!AH10177: OCSP stapling added via hookAH02814: ssl_stapling_init_cert: no OCSP URI in certificate and no SSLStaplingForceURL configured for server %sAH02815: ssl_stapling_init_cert: can't create CertID for OCSP requestAH02218: ssl_stapling_init_cert: no OCSP URI in certificate and no SSLStaplingForceURL setssl_stapling_init_cert: storing certinfo for server %sAH02604: Unable to configure certificate %s:%d for staplingAH02286: Failed to open ticket key file %s: (%d) %pmAH02287: Failed to read %d bytes from %s: (%d) %pmAH01913: Unable to initialize TLS session ticket key callback (incompatible OpenSSL version?)AH02288: TLS session ticket key for %s successfully loaded from %sAH02206: no client certs found for SSL proxyAH02252: incomplete client cert configured for SSL proxy (missing or encrypted private key?)AH02326: proxy client certificate and private key do not matchAH02207: loaded %d client certs for SSL proxyAH02208: SSL proxy client cert initialization failedAH02270: SSL proxy client cert chain verification failed: %s :AH02271: loaded %i intermediate CA%s for cert %i: AH01882: Init: this version of mod_ssl was compiled against a newer library (%s, version currently loaded is %s) - may result in undefined or erroneous behaviorAH10104: %s, SSLSrvConfigRec shared from %sAH01888: Init: Failed to load Crypto Device API `%s'AH01889: Init: Failed to enable Crypto Device API `%s'AH01890: Init: loaded Crypto Device API `%s'AH01883: Init: Initialized %s libraryAH01885: Could not enable FIPS modeAH01884: OpenSSL has FIPS mode enabledAH01886: OpenSSL has FIPS mode disabledAH01872: Could not initialize stapling cache. Exiting.AH01873: Init: Session Cache is not configured [hint: SSLSessionCache]AH01874: Could not initialize session cache. Exiting.AH01887: Init: Initializing (virtual) servers for SSLAH01914: Configuring server %s for SSL protocolConfiguring Trusted OCSP certificatesUnable to configure OCSP Trusted CertificatesAH02560: Init: Wiped out the queried pass phrases from memoryAH01915: Init: (%s) You configured HTTPS(%d) on the standard HTTP(%d) port!AH01916: Init: (%s) You configured HTTP(%d) on the standard HTTPS(%d) port!AH01876: %s compiled against Server: %s, Library: %sSecond Application Data for SSLAH10226: Could not open log file '%s' configured via SSLKEYLOGFILEAH10227: Init: Logging SSL private key material to %sAH02024: Cannot reinit %s mutex with file `%s'AH02025: Cannot reinit %s mutexAH01991: SSL input filter read failed.AH01992: SSL library error %d reading data%sConnection closed to child %ld with %s shutdown (server %s)AH03309: ALPN proxy protocol identifier too long: %ssetting alpn protos from '%s', protolen=%dAH03310: error setting alpn protos from '%s'SNI extension for SSL Proxy request set to '%s'AH02002: Failed to set SNI extension for SSL Proxy request to '%s'AH02003: SSL Proxy connect failedAH02004: SSL Proxy: Peer certificate is expiredAH02411: SSL Proxy: Peer certificate does not match for hostname %sAH02005: SSL Proxy: Peer certificate CN mismatch: Certificate CN: %s Requested hostname: %sAH10273: SSL Proxy: Peer did not select any of our ALPN protocols [%s].AH10274: SSL Proxy: Peer proposed ALPN protocol %s which is none of our proposals [%s].AH02006: SSL handshake stopped: connection was closedAH02007: SSL handshake interrupted by system [Hint: Stop button pressed in browser?!]AH02008: SSL library error %d in handshake (server %s)AH02009: SSL client authentication failed, accepting certificate based on "SSLVerifyClient optional_no_ca" configurationAH02010: SSL client authentication failed: %sAH02011: No acceptable peer certificate availablelikely due to failed renegotiationWant read during nonblocking writeAH01993: SSL output filter write failed.AH01994: SSL library error %d writing dataAH01995: failed to write %ld of %lu bytes (%s)AH02210: Failed to load SSLCACertificateFile: %sAH02211: Failed to open Certificate Path `%s'SSL dialog mechanism for the pass phrase query ('builtin', '|/path/to/pipe_program', or 'exec:/path/to/cgi_program')SSL Session Cache storage ('none', 'nonenotnull', 'dbm:/path/to/file')SSL external Crypto Device usage ('builtin', '...')SSL Pseudo Random Number Generator (PRNG) seeding source ('startup|connect builtin|file:/path|exec:/path [bytes]')SSL switch for the protocol engine ('on', 'off')Enable FIPS-140 mode (`on', `off')Colon-delimited list of permitted SSL Ciphers, optional preceded by protocol identifier ('XXX:...:XXX' - see manual)SSL Server Certificate file ('/path/to/file' - PEM or DER encoded)SSL Server Private Key file ('/path/to/file' - PEM or DER encoded)SSL Server CA Certificate Chain file ('/path/to/file' - PEM encoded)TLS session ticket encryption/decryption key file (RFC 5077) ('/path/to/file' - file with 48 bytes of random data)SSL CA Certificate path ('/path/to/dir' - contains PEM encoded files)SSL CA Certificate file ('/path/to/file' - PEM encoded)SSL CA Distinguished Name path ('/path/to/dir' - symlink hashes to PEM of acceptable CA names to request)SSL CA Distinguished Name file ('/path/to/file' - PEM encoded to derive acceptable CA names to request)SSL CA Certificate Revocation List (CRL) path ('/path/to/dir' - contains PEM encoded files)SSL CA Certificate Revocation List (CRL) file ('/path/to/file' - PEM encoded)SSL CA Certificate Revocation List (CRL) checking modeSSL Client verify type ('none', 'optional', 'require', 'optional_no_ca')SSL Client verify depth ('N' - number of intermediate certificates)SSL Session Cache object lifetime ('N' - number of seconds)Enable or disable various SSL protocols ('[+-][TLSv1|TLSv1.1|TLSv1.2] ...' - see manual)Use the server's cipher ordering preferenceEnable SSL level compression (`on', `off')Enable or disable TLS session tickets(`on', `off')Enable support for insecure renegotiationSet user name to SSL variable valueStrict SNI virtual host checkingSRP verifier file ('/path/to/file' - created by srptool)SRP seed for unknown users (to avoid leaking a user's existence) ('some secret text')SSL switch for the proxy protocol engine ('on', 'off')SSL Proxy: enable or disable SSL protocol flavors ('[+-][TLSv1|TLSv1.1|TLSv1.2] ...' - see manual)SSL Proxy: colon-delimited list of permitted SSL ciphers , optionally preceded by protocol specifier ('XXX:...:XXX' - see manual)SSL Proxy: whether to verify the remote certificate ('on' or 'off')SSL Proxy: maximum certificate verification depth ('N' - number of intermediate certificates)SSL Proxy: file containing server certificates ('/path/to/file' - PEM encoded certificates)SSL Proxy: directory containing server certificates ('/path/to/dir' - contains PEM encoded certificates)SSL Proxy: CA Certificate Revocation List (CRL) path ('/path/to/dir' - contains PEM encoded files)SSL Proxy: CA Certificate Revocation List (CRL) file ('/path/to/file' - PEM encoded)SSL Proxy: CA Certificate Revocation List (CRL) checking modeSSLProxyMachineCertificateFileSSL Proxy: file containing client certificates ('/path/to/file' - PEM encoded certificates)SSLProxyMachineCertificatePathSSL Proxy: directory containing client certificates ('/path/to/dir' - contains PEM encoded certificates)SSLProxyMachineCertificateChainFileSSL Proxy: file containing issuing certificates of the client certificate (`/path/to/file' - PEM encoded certificates)SSL Proxy: check the peer certificate's expiration dateSSL Proxy: check the peer certificate's CNSSL Proxy: check the peer certificate's name (must be present in subjectAltName extension or CNSet one or more options to configure the SSL engine('[+-]option[=value] ...' - see manual)Require the SSL protocol for the per-directory context (no arguments)Require a boolean expression to evaluate to true for granting access(arbitrary complex boolean expression - see manual)Configure the amount of memory that will be used for buffering the request body if a per-location SSL renegotiation is required due to changed access control requirementsEnable use of OCSP to verify certificate revocation mode ('on', 'leaf', 'off')URL of the default OCSP ResponderForce use of the default responder URL ('on', 'off')Maximum time difference in OCSP responsesWhether OCSP queries use a nonce or not ('on', 'off')Proxy URL to use for OCSP requestsDo not verify OCSP Responder certificate ('on', 'off')SSLOCSPResponderCertificateFileTrusted OCSP responder certificates(`/path/to/file' - PEM encoded certificates)SSL Stapling Response Cache storage (`dbm:/path/to/file')SSL switch for the OCSP Stapling protocol (`on', `off')SSL stapling option for maximum time difference in OCSP responsesSSL stapling option for OCSP responder timeoutSSL stapling option for maximum age of OCSP responsesSSLStaplingStandardCacheTimeoutSSL stapling option for normal OCSP Response Cache LifetimeSSLStaplingReturnResponderErrorsSSL stapling switch to return Status Errors Back to Client(`on', `off')SSL stapling switch to send tryLater response to client on error (`on', `off')SSL stapling option for OCSP Response Error Cache LifetimeSSL stapling option to Force the OCSP Stapling URLSSLLog directive is no longer supported - use ErrorLog.SSLLogLevel directive is no longer supported - use LogLevel.'Require ssl' does not take arguments'Require ssl-verify-client' does not take argumentsfilling buffer, max size %lu bytesAH02015: could not read request body for SSL bufferAH02016: could not read bucket for SSL bufferAH02017: could not setaside bucket for SSL buffertotal of %ld bytes in buffer, eos=%dAH02018: request body exceeds maximum size (%lu) for SSL bufferread from buffered SSL brigade, mode %d, %ld bytesAH02019: could not partition buffered SSL brigadeAH02020: could not split line from buffered SSL brigadebuffered SSL brigade exhausted%s: %s %ld/%d bytes %s BIO#%pp [mem: %pp] %s+-------------------------------------------------------------------------+%s: I/O error, %d bytes expected to %s on BIO#%pp [mem: %pp](default host as no SNI was provided)Reason: You're speaking plain HTTP to an SSL-enabled server port.
Instead use the HTTPS scheme to access this URL, please.
AH02031: Hostname %s provided via SNI, but no hostname provided in HTTP requestAH02033: No hostname was provided via SNI for a name based virtual hostReason: The client software did not provide a hostname using Server Name Indication (SNI), which is required to access this server.
AH02032: Hostname %s %s and hostname %s provided via HTTP have no compatible SSL setupAH02034: %s HTTPS request received for child %ld (server %s)AH02262: Re-negotiation handshake failed: Client verification failedAH02263: Re-negotiation handshake failed: Client certificate missingAH02035: Encountered FakeBasicAuth spoof: %sAH02036: Faking HTTP Basic Auth header: "Authorization: %s"AH02267: Proxy client certificate callback: (%s) enteredAH02268: Proxy client certificate callback: (%s) downstream server wanted client certificate but none are configuredAH02278: no acceptable CA listAH02279: found acceptable certAH02280: found acceptable cert by intermediate CAAH02269: Proxy client certificate callback: (%s) no client certificate found!?Inter-Process Session Cache: request=%s status=%s id=%s %s(session %s)AH02043: SSL virtual host for servername %s foundAH02044: No matching SSL virtual host for servername %s found (using default/first virtual host)AH02645: Server name not provided via TLS extension (using default/first virtual host)AH02289: TLS session ticket key for %s successfully set, creating new session ticketAH02290: TLS session ticket key for %s successfully set, decrypting existing session ticketAH02837: ALPN client protocol list emptyAH02838: ALPN protocol identifier too longAH02840: ALPN negotiated protocol name too longAH02908: protocol switch to '%s' failedAH10266: Failed to parse PEM of challenge certificate %sAH10086: Failed to configure challenge certificate %sAH10087: error '%s' using Challenge key: %sAH10088: Challenge certificate and private key %s do not matchAH01965: Init: Creating pass phrase dialog pipe child '%s'AH01966: Init: Failed to create pass phrase pipe '%s'AH01967: Init: Requesting pass phrase via piped dialogAH01968: Init: Requesting pass phrase via builtin terminal dialog%s mod_ssl (Pass Phrase Dialog) Some of your private key files are encrypted for security reasons. In order to read them you have to provide the pass phrases. Apache:mod_ssl:Error: Pass phrase empty (needs to be at least 1 character). AH01969: Init: Requesting pass phrase from dialog filter program (%s)AH10143: Init: Creating pass phrase dialog pipe child '%s'AH10144: Init: Failed to create pass phrase pipe '%s'AH10145: Init: Requesting pass phrase via piped dialogAH10147: Init: Requesting pass phrase via builtin terminal dialogA pass phrase is required to access the private key. Apache:mod_ssl:Error: Pass phraseempty (needs to be at least 1 character). AH10148: Init: Requesting pass phrase from dialog filter program (%s)AH02042: rejecting client initiated renegotiationAH02041: Protocol: %s, Cipher: %s (%s/%s bits)AH01970: could not parse OID '%s'AH01971: Found an extension '%s', but failed to create a string from itAH01875: session is too big (%u bytes)AH02311: Fatal error initialising mod_ssl, exiting. See %s for more informationAH02312: Fatal error initialising mod_ssl, exiting.SSL Library Error: %s%s%s%s%s%sAH02219: access to %s failed, reason: %sAH10128: Reduced client verification depth will force renegotiationAH10228: could not buffer message body to allow TLS Post-Handshake Authentication to proceedAH10129: verify client post handshakeAH10158: cannot perform post-handshake authenticationReason: Cannot perform Post-Handshake Authentication.
AH02253: Unable to reconfigure (per-directory) permitted SSL ciphersAH02220: Reconfigured cipher suite will force renegotiationAH02254: Reduced client verification depth will force renegotiationAH02256: Non-default virtual host with SSLVerify set to 'require' and VirtualHost-specific CA certificate list is only available to clients with TLS server name indication (SNI) supportAH02257: could not buffer message body to allow SSL renegotiation to proceedAH02221: Requesting connection re-negotiationAH02258: Performing quick renegotiation: just re-verifying the peerAH02222: Cannot find peer certificate chainAH02223: Cannot find certificate storageAH02224: Re-negotiation verification step failedAH02259: insecure SSL re-negotiation required, but a pipelined request is present; keepalive disabledAH02260: Performing full renegotiation: complete handshake protocol (%s support secure renegotiation)AH02225: Re-negotiation request failedAH02226: Awaiting re-negotiation handshakeAH02261: Re-negotiation handshake failedAH02264: SSL cipher suite not renegotiated: access to %s denied using cipher %sAH02227: Failed to set r->user to '%s'AH02265: access to %s failed, reason: Failed to execute SSL requirement expression: %sAH02266: Access to %s denied for %s (requirement expression not fulfilled)AH02228: Failed expression: %sSSL requirement expression not fulfilledAH02229: access to %s failed, reason: %sAH02255: Changed client verification type will force %srenegotiationAH02275: Certificate Verification, depth %d, CRL checking mode: %s (%x)AH02037: Certificate Verification: Verifiable Issuer is configured as optional, therefore we're accepting the certificateCertificate Verification: Temporary error (%d): %s: optional therefore we're accepting the certificateAH02038: cannot perform OCSP validation for cert if issuer has not been verified (optional_no_ca configured)No cert available to check with OCSPSkipping OCSP check for valid self-issued certAH01918: no OCSP responder specified in certificate and no default configuredAH01919: failed to parse OCSP responder URI '%s'AH01920: cannot handle OCSP responder URI '%s'Skipping OCSP check for certificate cos no OCSP URL found and no_ocsp_for_cert_ok is setAH01921: could not retrieve certificate idAH01922: OCSP response not successful: %dAH01923: could not retrieve OCSP basic responseAH01924: Bad OCSP responder answer (bad nonce)AH01925: failed to verify the OCSP responseAH02272: failed to retrieve OCSP response statusAH02273: OCSP response outside validity periodAH03239: OCSP validation completed, certificate status: %s (%d, %d)AH02276: Certificate Verification: Error (%d): %sAH02039: Certificate Verification: Error (%d): %sAH02040: Certificate Verification: Certificate Chain too long (chain has %d certificates, but maximum allowed are only %d)*CLIENT_HELLO*unknown*protocol*speaking not SSL to HTTPS port!?*SSL3_READ_BYTES:sslv3*alert*bad*certificate*Subject CN in certificate not server name or identical to CA!?*self signed certificate in certificate chain*Client certificate signed by CA not known to server?*peer did not return a certificate*No CAs known to server for verification?Too restrictive SSLCipherSuite or using DSA server certificate?Bad file contents or format - or even just a forgotten SSLCertificateKeyFile?You entered an incorrect pass phrase!?Browser still remembered details of a re-created server certificate?AH01934: stapling_check_response: Error Parsing Response!AH01935: stapling_check_response: certificate ID not present in response!AH01936: stapling_check_response: response times invalidAH01937: stapling_check_response: cached response expiredAH02969: stapling_check_response: response has certificate status %s (reason: %s) for serial number %sAH01948: Failed to acquire OCSP %s lockAH01972: could not resolve address of %s %sAH01973: connecting to %s '%s'AH01974: could not connect to %s '%s'AH01975: sending request to OCSP responderAH01976: failed to send request to OCSP responder '%s'AH01977: failed reading line from OCSP serverAH01978: failed reading line from OCSP serverAH02321: empty response from OCSP serverAH01979: response header line too long from OCSP serverAH01949: Failed to release OCSP %s lockAH01927: OCSP stapling response encode error??AH01928: OCSP stapling response too big (%u bytes)AH01929: stapling_cache_response: OCSP response session store error!AH01930: stapling_get_cached_response: cache missAH01931: stapling_get_cached_response: response length invalid??AH01932: stapling_get_cached_response: response parse error??AH01933: stapling_get_cached_response: cache hitAH01953: stapling_cb: retrieved cached responseAH01946: Cannot reinit %s mutex with file `%s'AH01947: Cannot reinit %s mutex [certificate: -not available-]%s%s%s HTTP/1.0 Host: %s:%d Content-Type: application/ocsp-request Connection: close Content-Length: %d AH01989: could not serialize OCSP requestAH01980: bad response from OCSP server: %sAH01981: OCSP response header: %sAH01984: OCSP response: got EOFAH01985: error reading response from OCSP serverAH01986: OCSP response size exceeds %u byte limitAH01987: OCSP response: got %lu bytes, %lu totalAH01988: failed to decode OCSP response dataAH01982: could not read response headers from OCSP server, exceeded maximum count (%u)AH01983: could not read response header from OCSP serverAH01951: stapling_cb: OCSP Stapling callback calledAH01950: stapling_cb: OCSP Stapling disabledAH01926: stapling_get_certinfo: stapling not supported for certificateAH01952: stapling_cb: retrieved cached certificate dataAH01954: stapling_cb: renewing cached responseAH03236: stapling_cb: error checking for cached response after obtaining refresh mutexAH03237: stapling_cb: don't need to refresh cached response after obtaining refresh mutexAH03238: stapling_cb: still must refresh cached response after obtaining refresh mutexAH01938: stapling_renew_response: querying responderAH02621: stapling_renew_response: no uri for responderAH01939: stapling_renew_response: Error parsing uri %sAH01940: stapling_renew_response: Unsupported uri %sAH01941: stapling_renew_response: responder errorAH01942: stapling_renew_response: query response receivedAH01943: stapling_renew_response: error in retrieved response!AH01944: stapling_renew_response: responder error %sAH01945: stapling_renew_response: error caching response!AH03040: stapling_cb: success renewing responseAH01955: stapling_cb: fatal error renewing responseAH01956: stapling_cb: setting responseAH01957: stapling_cb: no suitable response available[%s] modssl_X509_match_name: expecting name '%s', %smatched by ID '%s'AH02412: [%s] Cert %s for name '%s'%sSeeding PRNG with %d bytes of entropyAH01990: %sPRNG still contains insufficient entropy!AH02027: Failed to release SSL session cache lockAH02026: Failed to acquire SSL session cache lockSSL/TLS Session Cache Status: AH02277: Proxy client certificate callback: (%s) %s, sendingConfiguring client authenticationAH01895: Unable to configure verify locations for client authenticationAH01896: Unable to determine list of acceptable CA certificates for client authenticationAH01897: Init: Oops, you want to request client authentication, but no CAs are known for verification!? [Hint: SSLCACertificate*]ALL:!COMPLEMENTOFDEFAULT:!eNULLConfiguring permitted SSL ciphers [%s]AH01898: Unable to configure permitted SSL ciphersAH10127: Unable to configure permitted TLSv1.3 ciphersAH01899: Host %s: CRL checking has been enabled, but neither %sCARevocationFile nor %sCARevocationPath is configuredAH01900: Configuring certificate revocation facilityAH01901: Host %s: unable to configure X.509 CRL storage for certificate revocationAH01902: Host %s: X.509 CRL storage locations configured, but CRL checking (%sCARevocationCheck) is not enabledAH01903: Failed to configure CA certificate chain!AH01904: Configuring server certificate chain (%d CA certificate%s)AH01893: Configuring TLS extension handlingAH01894: Unable to initialize TLS servername extension callback (incompatible OpenSSL version?)AH01958: SSLStapling: no stapling cache availableAH01959: SSLStapling: cannot initialise stapling mutexAH01960: OCSP stapling initializedAH02308: Using SRP verifier file [%s]AH02309: Unable to initialize SRP verifier structure [%s seed]AH02310: Unable to load SRP verifier file [error %d]AH02231: No SSL protocols available [hint: SSLProtocol]Creating new SSL context (protocols: %s)AH03378: No SSL protocols available [hint: SSLProtocol]SSL/TLS BufferSSL/TLS FilterSSL/TLS Coalescing FilterA_@mod_ssl/2.4.58ssl_pphrase_Handle_CB; D(8dPdhXhHx  ؇4H\HpxȈ8h ȉ$ 8 L ` x H < Xt ؕ  X X0 p x 8 L بx ( HD xh x ȳL|8hLHHؽ(x4Tt8XxLh|(X(Lp8H 8d(X4TtX( @Thx(h(xTxXHDhH0`hX8Xl,- .8h3p7K(P XXLYZHZxZZ`Hd8nhoxy(z,zX}h~Xx@8lxLhȖ8 , H\  (  ح4!!x!h!""hD"t"("H""h#@#l###h#X$L$$$$X$$%T%!%x"%"%X% &(<&)l&*&8+&,&,('-X'1'4'<'K (xLP(hMt(hN(hR(S )xT8)UL)X|)(Y)Y)8[*[(*xjh*j*o*(p*zRx $< FJ w?9*3$"D\P\] t}}|8~~@)\)x) ( <0P)d0x0 ,)H-d--), @(T[EC BEL J ,AC BIED| D $Ă EC BIX E 0AC BELo J P  (NEC CB 40TEC I H  A h܊tqC C| ,8EC BJO E EG H CEF Er $HEQ DH <$ AC FEHB G ^ B  D 4dEC M: I C E $HEC | L D D $EC | L D D $xEC | L D D (EC @ H H H (@EC @ H H H (lXEC @ H H H (EC AQ F D L EC H $~AP DDd ( AH DF  8*EC BD[ $\aAC BEPE  PEH BDs (yAC BED B 0AC BEDb G f B 4EC BEJD" A W I ,@4EC BGEH. D 4pEC DGDm D i E 0|EC BEFS H U A 0EQ G] F V J ,ĪuEL Cf F c E L <@EC FEKk G   E r E 4AC BD H Y G r E ,|EC Gt E X H X ܭLEC Iz  HEC Iv ( <7EC Am H \4EC Aj h |8EC An , EH FEHx H 4 EC DIDk D [ E  QEK Ew , TiEC BEFk H \ ,@ ~EC BGFJ G U  p \EK EB  \EK EB  \cEK EI  YEK E  YEK E   ([ER Cs  @ d[ER Cs  d cEK EI < EC FED F > J  J 4 \ AC BD A y G r E ( 4EJ ER J c (, EJ ER J d X HEC Iv x LKEC Iy , |EC Gt E X H X  ܸLEC Iz  HEC Iv  <7EC Am ( \4EC Aj H |7EC Am h 8EC An ( vEC I| C e  KEC Iy ( @[EC Cy D R 0t!AC BGFH D x 4p+H,\hEC M E 4ؽAC DFEHS B ^ B P2|,IEC BGN A (EC DGY D H^EC AO A 0lX{EH HD H  H 0)EH HDy F  K 0EC BJEDv M Z ,,EH FKL F X <82EC FD K ] C ` H I  xGAC E J ,EC BEED H 4h>EC BED D Z F T D p<EH Am ,$EC BIDV C $T EC DH 4|*AC DO C  J @0|>#>#>j4?AC I G  E ,C6EF DEED D ,,H EC DEED H 0\RFC EY I O A0R EC I I t D ,[AC BGED\ F (\|aC EV A y ( \sAC BDP F N ,LH]AEC BNc E $|h`faQ S K F J,`EC FJ  F , dJAJ BEGDi J ,@fEC HJ K (40gAC G D `i1EE A^ $iEE C G 4jIEC FEH A  D ,mEC DEGHq G ,pEC HD B 0@dvEC BEDm H W A $tv^EC AG H E $wAC BDA E ,wEC FED G (0}EC GZ G , 9EC I] B $PjEC Ay F a x,NQC W ]\EC H $\EC C] H D AC DELG: F ^ J y O  G T((AC DHF O K E d L h H  M , L tf,Д EC DGD F , EC DEGH D #,AC BEGH A ,8REC HHe C ,hLSEC HHF B |0EJ FD G n B $$HEF Ao E G (LAC h G (4EC I A (`AC h E (xEC DEEJ $EC U C y ,tEC DEM A ,4rEC I I 0@EC BQ6 G t #JC H K(0AC e E (rEC ER A Q (X~AC BHh J } ,AC e A ,HLAC BEED C (xAC DED A (~AC BHh J } ,\AC h K ,DAC h! C ,0iAC BEEHN H (`~AC BHh J } (h!AC e K 4lEC BEEF{ K N B (kEG DEDQ , XEC DEEH E ,L HAC e6 A 4| EF FHD I y G , EC BGI[ K , EE FM J ,!#EC DD A `  D! $EC  A h!$EF H A ,!%EC DEEH K @!)"EC BED H T D T D T D m ("*EC M A ,"8+,@"+EC BEO I (p"$/zEC BHh F y ("x/zEC BHh F y 0"/EJ G H  F "(1]E[ | <#h1EE HD E  F [ M ,\#@{EC BEHO J J 4#X@EC FM K o I (#0DEC BQG F ,#$EEC BGJ G PP FRR7SHSSSSTUHThTxTU ]a 3jecdk05mbL6,=Qbs -ANp&hD@+(1 `%%  #8 P6 6 07@!H7!`P)"u08H")"8"0*X#9#<$C@$`,$  -$#0B%/ x%C0;%RP%d&}@&h&`:&&('pB`'@$'DP( -( `9(:*X)T*)m90*<**9*H++h++ :,x,,,=@--G--`.B/' `/?/Xp./p.0/P/PH(0P00:0`F0!@810/p1L 11h01 2`0@22p220@33H337&C&R&\& 4pxo5 & @0~`0 oo_oo[o.00@P`pа 0@P`pб 0@P`pв 0@P`pг 0@P`pд 0@P`pе 0@P`pж 0@P`pз 0@P`pи 0@P`pй 0@P`pк 0@P`pл 0@P`pм 0@P`pн 0@P`pо 0@P`pп 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0OpenSSL 3.0.13 30 Jan 2024342PAP!`/usr/lib/debug/.dwz/x86_64-linux-gnu/apache2-bin.debugJjG&%Q97f7ac335f77860af9080a0f4dce953bc102d0.debugEX.shstrtab.note.gnu.property.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.data.rel.ro.dynamic.data.bss.gnu_debugaltlink.gnu_debuglink  $1o$; 1C55&Ko[[*Xo__g``0qB~~0{v @@P 44 ll ss $ppxx 00@@ @ K 4P