From 37987cea294a6dff9e8b0d5e30f6b5ab69666d94 Mon Sep 17 00:00:00 2001 From: Reese Date: Sat, 22 Nov 2025 12:53:20 +0000 Subject: [PATCH 1/2] fix(vscode-ext): improve Windows path handling and add Python dependency checks - Update upload service to run as root for Windows bind-mount compatibility - Refactor path translation logic to use PurePosixPath for cross-platform consistency - Add fallback logic to strip drive letters and map Windows paths to container paths - Implement Python dependency validation before running upload client - Add build infrastructure with Dockerfile and platform-specific build scripts - Improve script discovery --- docker-compose.dev-remote.yml | 2 +- scripts/remote_upload_client.py | 38 +- scripts/standalone_upload_client.py | 39 +- vscode-extension/.gitignore | 30 + vscode-extension/build/Dockerfile | 17 + vscode-extension/build/build.bat | 70 + vscode-extension/build/build.sh | 41 + .../context-engine-uploader/.gitignore | 7 + .../context-engine-uploader/.vscodeignore | 10 + .../context-engine-uploader/README.md | 2 + .../context-engine-uploader-0.1.1.vsix | Bin 517011 -> 0 bytes .../context-engine-uploader/extension.js | 103 +- .../context-engine-uploader/package.json | 12 +- .../python_libs/bin/normalizer | 8 - .../certifi-2025.11.12.dist-info/INSTALLER | 1 - .../certifi-2025.11.12.dist-info/METADATA | 78 - .../certifi-2025.11.12.dist-info/RECORD | 14 - .../certifi-2025.11.12.dist-info/WHEEL | 5 - .../licenses/LICENSE | 20 - .../top_level.txt | 1 - .../python_libs/certifi/__init__.py | 4 - .../python_libs/certifi/__main__.py | 12 - .../python_libs/certifi/cacert.pem | 4678 --------- .../python_libs/certifi/core.py | 83 - .../python_libs/certifi/py.typed | 0 .../INSTALLER | 1 - .../METADATA | 764 -- .../charset_normalizer-3.4.4.dist-info/RECORD | 33 - .../charset_normalizer-3.4.4.dist-info/WHEEL | 5 - .../entry_points.txt | 2 - .../licenses/LICENSE | 21 - .../top_level.txt | 1 - .../charset_normalizer/__init__.py | 48 - .../charset_normalizer/__main__.py | 6 - .../python_libs/charset_normalizer/api.py | 669 -- .../python_libs/charset_normalizer/cd.py | 395 - .../charset_normalizer/cli/__init__.py | 8 - .../charset_normalizer/cli/__main__.py | 381 - .../charset_normalizer/constant.py | 2015 ---- .../python_libs/charset_normalizer/legacy.py | 80 - .../python_libs/charset_normalizer/md.py | 635 -- .../python_libs/charset_normalizer/models.py | 360 - .../python_libs/charset_normalizer/py.typed | 0 .../python_libs/charset_normalizer/utils.py | 414 - .../python_libs/charset_normalizer/version.py | 8 - .../python_libs/idna-3.10.dist-info/INSTALLER | 1 - .../idna-3.10.dist-info/LICENSE.md | 31 - .../python_libs/idna-3.10.dist-info/METADATA | 250 - .../python_libs/idna-3.10.dist-info/RECORD | 22 - .../python_libs/idna-3.10.dist-info/WHEEL | 4 - .../python_libs/idna/__init__.py | 45 - .../python_libs/idna/codec.py | 122 - .../python_libs/idna/compat.py | 15 - .../python_libs/idna/core.py | 437 - .../python_libs/idna/idnadata.py | 4243 -------- .../python_libs/idna/intranges.py | 57 - .../python_libs/idna/package_data.py | 1 - .../python_libs/idna/py.typed | 0 .../python_libs/idna/uts46data.py | 8681 ----------------- .../requests-2.31.0.dist-info/INSTALLER | 1 - .../requests-2.31.0.dist-info/LICENSE | 175 - .../requests-2.31.0.dist-info/METADATA | 122 - .../requests-2.31.0.dist-info/RECORD | 43 - .../requests-2.31.0.dist-info/REQUESTED | 0 .../requests-2.31.0.dist-info/WHEEL | 5 - .../requests-2.31.0.dist-info/top_level.txt | 1 - .../python_libs/requests/__init__.py | 180 - .../python_libs/requests/__version__.py | 14 - .../python_libs/requests/_internal_utils.py | 50 - .../python_libs/requests/adapters.py | 538 - .../python_libs/requests/api.py | 157 - .../python_libs/requests/auth.py | 315 - .../python_libs/requests/certs.py | 17 - .../python_libs/requests/compat.py | 79 - .../python_libs/requests/cookies.py | 561 -- .../python_libs/requests/exceptions.py | 141 - .../python_libs/requests/help.py | 134 - .../python_libs/requests/hooks.py | 33 - .../python_libs/requests/models.py | 1034 -- .../python_libs/requests/packages.py | 28 - .../python_libs/requests/sessions.py | 833 -- .../python_libs/requests/status_codes.py | 128 - .../python_libs/requests/structures.py | 99 - .../python_libs/requests/utils.py | 1094 --- .../urllib3-2.0.7.dist-info/INSTALLER | 1 - .../urllib3-2.0.7.dist-info/METADATA | 158 - .../urllib3-2.0.7.dist-info/RECORD | 70 - .../python_libs/urllib3-2.0.7.dist-info/WHEEL | 4 - .../licenses/LICENSE.txt | 21 - .../python_libs/urllib3/__init__.py | 166 - .../python_libs/urllib3/_base_connection.py | 173 - .../python_libs/urllib3/_collections.py | 481 - .../python_libs/urllib3/_request_methods.py | 217 - .../python_libs/urllib3/_version.py | 4 - .../python_libs/urllib3/connection.py | 906 -- .../python_libs/urllib3/connectionpool.py | 1183 --- .../python_libs/urllib3/contrib/__init__.py | 0 .../contrib/_securetransport/__init__.py | 0 .../contrib/_securetransport/bindings.py | 430 - .../contrib/_securetransport/low_level.py | 474 - .../python_libs/urllib3/contrib/pyopenssl.py | 548 -- .../urllib3/contrib/securetransport.py | 913 -- .../python_libs/urllib3/contrib/socks.py | 233 - .../python_libs/urllib3/exceptions.py | 318 - .../python_libs/urllib3/fields.py | 345 - .../python_libs/urllib3/filepost.py | 89 - .../python_libs/urllib3/poolmanager.py | 637 -- .../python_libs/urllib3/py.typed | 2 - .../python_libs/urllib3/response.py | 1132 --- .../python_libs/urllib3/util/__init__.py | 44 - .../python_libs/urllib3/util/connection.py | 137 - .../python_libs/urllib3/util/proxy.py | 43 - .../python_libs/urllib3/util/request.py | 256 - .../python_libs/urllib3/util/response.py | 101 - .../python_libs/urllib3/util/retry.py | 529 - .../python_libs/urllib3/util/ssl_.py | 515 - .../urllib3/util/ssl_match_hostname.py | 159 - .../python_libs/urllib3/util/ssltransport.py | 280 - .../python_libs/urllib3/util/timeout.py | 279 - .../python_libs/urllib3/util/url.py | 471 - .../python_libs/urllib3/util/util.py | 42 - .../python_libs/urllib3/util/wait.py | 124 - .../standalone_upload_client.py | 1266 --- 123 files changed, 336 insertions(+), 43227 deletions(-) create mode 100644 vscode-extension/.gitignore create mode 100644 vscode-extension/build/Dockerfile create mode 100644 vscode-extension/build/build.bat create mode 100644 vscode-extension/build/build.sh create mode 100644 vscode-extension/context-engine-uploader/.gitignore create mode 100644 vscode-extension/context-engine-uploader/.vscodeignore delete mode 100644 vscode-extension/context-engine-uploader/context-engine-uploader-0.1.1.vsix delete mode 100755 vscode-extension/context-engine-uploader/python_libs/bin/normalizer delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/INSTALLER delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/METADATA delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/RECORD delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/WHEEL delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/licenses/LICENSE delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/top_level.txt delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi/__init__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi/__main__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi/cacert.pem delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi/core.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/certifi/py.typed delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/INSTALLER delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/METADATA delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/RECORD delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/WHEEL delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/entry_points.txt delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/licenses/LICENSE delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/top_level.txt delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/__init__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/__main__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/api.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cd.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cli/__init__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cli/__main__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/constant.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/legacy.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/md.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/models.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/py.typed delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/utils.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/charset_normalizer/version.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/INSTALLER delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/LICENSE.md delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/METADATA delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/RECORD delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/WHEEL delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna/__init__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna/codec.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna/compat.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna/core.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna/idnadata.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna/intranges.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna/package_data.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna/py.typed delete mode 100644 vscode-extension/context-engine-uploader/python_libs/idna/uts46data.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/INSTALLER delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/LICENSE delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/METADATA delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/RECORD delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/REQUESTED delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/WHEEL delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/top_level.txt delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/__init__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/__version__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/_internal_utils.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/adapters.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/api.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/auth.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/certs.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/compat.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/cookies.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/exceptions.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/help.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/hooks.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/models.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/packages.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/sessions.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/status_codes.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/structures.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/requests/utils.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/INSTALLER delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/METADATA delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/RECORD delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/WHEEL delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/licenses/LICENSE.txt delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/__init__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/_base_connection.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/_collections.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/_request_methods.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/_version.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/connection.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/connectionpool.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/__init__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/__init__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/bindings.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/low_level.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/pyopenssl.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/securetransport.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/socks.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/exceptions.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/fields.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/filepost.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/poolmanager.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/py.typed delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/response.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/__init__.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/connection.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/proxy.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/request.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/response.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/retry.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssl_.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssl_match_hostname.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssltransport.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/timeout.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/url.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/util.py delete mode 100644 vscode-extension/context-engine-uploader/python_libs/urllib3/util/wait.py delete mode 100644 vscode-extension/context-engine-uploader/standalone_upload_client.py diff --git a/docker-compose.dev-remote.yml b/docker-compose.dev-remote.yml index 74f4444a..28440ebe 100644 --- a/docker-compose.dev-remote.yml +++ b/docker-compose.dev-remote.yml @@ -320,7 +320,7 @@ services: context: . dockerfile: Dockerfile.upload-service container_name: upload-service-dev-remote - user: "1000:1000" + user: "0:0" # Windows bind-mount to /work requires root to create workspace dirs depends_on: - qdrant env_file: diff --git a/scripts/remote_upload_client.py b/scripts/remote_upload_client.py index aac98034..4755136e 100644 --- a/scripts/remote_upload_client.py +++ b/scripts/remote_upload_client.py @@ -20,7 +20,7 @@ import tempfile import logging import argparse -from pathlib import Path +from pathlib import Path, PurePosixPath from typing import Dict, List, Any, Optional, Tuple from datetime import datetime import requests @@ -48,15 +48,33 @@ class RemoteUploadClient: def _translate_to_container_path(self, host_path: str) -> str: """Translate host path to container path for API communication.""" - # Use environment variable for path mapping if available - host_root = os.environ.get("HOST_ROOT", "/home/coder/project/Context-Engine/dev-workspace") - container_root = os.environ.get("CONTAINER_ROOT", "/work") - - if host_path.startswith(host_root): - return host_path.replace(host_root, container_root) - else: - # Fallback: if path doesn't match expected pattern, use as-is - return host_path + host_root = (os.environ.get("HOST_ROOT", "") or "/home/coder/project/Context-Engine/dev-workspace").strip() + container_root = (os.environ.get("CONTAINER_ROOT", "/work") or "/work").strip() + + host_path_obj = Path(host_path) + if host_root: + try: + host_root_obj = Path(host_root) + relative = host_path_obj.relative_to(host_root_obj) + container = PurePosixPath(container_root) + if relative.parts: + container = container.joinpath(*relative.parts) + return str(container) + except ValueError: + pass + except Exception: + pass + + try: + container = PurePosixPath(container_root) + usable_parts = [part for part in host_path_obj.parts if part not in (host_path_obj.anchor, host_path_obj.drive)] + if usable_parts: + repo_name = usable_parts[-1] + return str(container.joinpath(repo_name)) + except Exception: + pass + + return host_path.replace('\\', '/').replace(':', '') def __init__(self, upload_endpoint: str, workspace_path: str, collection_name: str, max_retries: int = 3, timeout: int = 30, metadata_path: Optional[str] = None): diff --git a/scripts/standalone_upload_client.py b/scripts/standalone_upload_client.py index 76a42432..dfc63c8b 100644 --- a/scripts/standalone_upload_client.py +++ b/scripts/standalone_upload_client.py @@ -19,7 +19,7 @@ import tempfile import logging import argparse -from pathlib import Path +from pathlib import Path, PurePosixPath from typing import Dict, List, Any, Optional, Tuple from datetime import datetime import requests @@ -204,15 +204,34 @@ class RemoteUploadClient: def _translate_to_container_path(self, host_path: str) -> str: """Translate host path to container path for API communication.""" - # Use environment variable for path mapping if available - host_root = os.environ.get("HOST_ROOT", "/home/coder/project/Context-Engine/dev-workspace") - container_root = os.environ.get("CONTAINER_ROOT", "/work") - - if host_path.startswith(host_root): - return host_path.replace(host_root, container_root) - else: - # Fallback: if path doesn't match expected pattern, use as-is - return host_path + host_root = (os.environ.get("HOST_ROOT", "") or "/home/coder/project/Context-Engine/dev-workspace").strip() + container_root = (os.environ.get("CONTAINER_ROOT", "/work") or "/work").strip() + + host_path_obj = Path(host_path) + if host_root: + try: + host_root_obj = Path(host_root) + relative = host_path_obj.relative_to(host_root_obj) + container = PurePosixPath(container_root) + if relative.parts: + container = container.joinpath(*relative.parts) + return str(container) + except ValueError: + pass + except Exception: + pass + + # Fallback: strip drive/anchor and map to /work/ + try: + container = PurePosixPath(container_root) + usable_parts = [part for part in host_path_obj.parts if part not in (host_path_obj.anchor, host_path_obj.drive)] + if usable_parts: + repo_name = usable_parts[-1] + return str(container.joinpath(repo_name)) + except Exception: + pass + + return host_path.replace('\\', '/').replace(':', '') def __init__(self, upload_endpoint: str, workspace_path: str, collection_name: str, max_retries: int = 3, timeout: int = 30, metadata_path: Optional[str] = None): diff --git a/vscode-extension/.gitignore b/vscode-extension/.gitignore new file mode 100644 index 00000000..520a0ed9 --- /dev/null +++ b/vscode-extension/.gitignore @@ -0,0 +1,30 @@ +# Build output directory +out/ + +# VSCode extension build artifacts +*.vsix + +# Node modules +node_modules/ + +# Logs +*.log +npm-debug.log* +yarn-debug.log* +yarn-error.log* + +# OS generated files +.DS_Store +.DS_Store? +._* +.Spotlight-V100 +.Trashes +ehthumbs.db +Thumbs.db + +# IDE files +.vscode/ +.idea/ + +# Temporary build files +**/standalone_upload_client.py \ No newline at end of file diff --git a/vscode-extension/build/Dockerfile b/vscode-extension/build/Dockerfile new file mode 100644 index 00000000..e591fbbc --- /dev/null +++ b/vscode-extension/build/Dockerfile @@ -0,0 +1,17 @@ +# Docker build for clean VSCode extension +FROM node:18-alpine + +# Install bash/coreutils for staging logic and vsce for packaging +RUN apk add --no-cache bash coreutils \ + && npm install -g @vscode/vsce + +# Copy entire repository into the image +WORKDIR /workspace +COPY ../.. /workspace + +# Run the shared build script to produce a clean VSIX into /workspace/vscode-extension/out +WORKDIR /workspace/vscode-extension/build +RUN bash build.sh + +# Expose the output directory as the final working directory +WORKDIR /workspace/vscode-extension/out \ No newline at end of file diff --git a/vscode-extension/build/build.bat b/vscode-extension/build/build.bat new file mode 100644 index 00000000..cfb6f5dc --- /dev/null +++ b/vscode-extension/build/build.bat @@ -0,0 +1,70 @@ +@echo off +setlocal EnableExtensions +pushd "%~dp0" + +for %%I in ("..\context-engine-uploader") do set "EXT_DIR=%%~fI" +for %%I in ("..\out") do set "OUT_DIR=%%~fI" +for %%I in ("..\..\scripts\standalone_upload_client.py") do set "SRC_SCRIPT=%%~fI" +set "CLIENT=standalone_upload_client.py" +set "STAGE_DIR=%OUT_DIR%\extension-stage" +set "BUILD_RESULT=0" + +echo Building clean Context Engine Uploader extension... + +if not exist "%OUT_DIR%" mkdir "%OUT_DIR%" +if errorlevel 1 ( + echo Failed to create output directory. + set "BUILD_RESULT=1" + goto cleanup +) + +REM Ensure the source extension directory has no lingering upload client +if exist "%EXT_DIR%\%CLIENT%" del /f /q "%EXT_DIR%\%CLIENT%" + +copy /Y "%SRC_SCRIPT%" "%OUT_DIR%\%CLIENT%" >nul +if errorlevel 1 ( + echo Failed to copy upload client from scripts directory. + set "BUILD_RESULT=1" + goto cleanup +) + +if exist "%STAGE_DIR%" rd /s /q "%STAGE_DIR%" +mkdir "%STAGE_DIR%" +if errorlevel 1 ( + echo Failed to create staging directory. + set "BUILD_RESULT=1" + goto cleanup +) + +robocopy "%EXT_DIR%" "%STAGE_DIR%" /E /NFL /NDL /NJH /NJS /NP >nul +if errorlevel 8 ( + echo Failed to copy extension into staging directory. + set "BUILD_RESULT=1" + goto cleanup +) + +copy /Y "%OUT_DIR%\%CLIENT%" "%STAGE_DIR%\%CLIENT%" >nul +if errorlevel 1 ( + echo Failed to place upload client into staging directory. + set "BUILD_RESULT=1" + goto cleanup +) + +pushd "%STAGE_DIR%" +echo Packaging extension... +npx @vscode/vsce package --no-dependencies --out "%OUT_DIR%" +if errorlevel 1 ( + echo Packaging failed. + set "BUILD_RESULT=1" + popd + goto cleanup +) +popd + +echo Build complete! Check the /out directory for .vsix files. +dir "%OUT_DIR%\*.vsix" + +:cleanup +if exist "%STAGE_DIR%" rd /s /q "%STAGE_DIR%" +popd +endlocal & exit /b %BUILD_RESULT% \ No newline at end of file diff --git a/vscode-extension/build/build.sh b/vscode-extension/build/build.sh new file mode 100644 index 00000000..4e8bf797 --- /dev/null +++ b/vscode-extension/build/build.sh @@ -0,0 +1,41 @@ +#!/bin/bash +set -euo pipefail + +SCRIPT_DIR="$(cd -- "$(dirname "${BASH_SOURCE[0]}")" && pwd)" +EXT_DIR="$SCRIPT_DIR/../context-engine-uploader" +OUT_DIR="$SCRIPT_DIR/../out" +SRC_SCRIPT="$SCRIPT_DIR/../../scripts/standalone_upload_client.py" +CLIENT="standalone_upload_client.py" +STAGE_DIR="$OUT_DIR/extension-stage" + +cleanup() { + rm -rf "$STAGE_DIR" +} +trap cleanup EXIT + +echo "Building clean Context Engine Uploader extension..." + +mkdir -p "$OUT_DIR" + +# Ensure extension directory is clean +rm -f "$EXT_DIR/$CLIENT" + +# Copy upload client to the distributable out directory +cp "$SRC_SCRIPT" "$OUT_DIR/$CLIENT" + +# Prepare staging directory +rm -rf "$STAGE_DIR" +mkdir -p "$STAGE_DIR" +cp -a "$EXT_DIR/." "$STAGE_DIR/" + +# Inject the upload client into the staged extension for packaging +cp "$OUT_DIR/$CLIENT" "$STAGE_DIR/$CLIENT" +chmod +x "$STAGE_DIR/$CLIENT" + +pushd "$STAGE_DIR" >/dev/null +echo "Packaging extension..." +npx @vscode/vsce package --no-dependencies --out "$OUT_DIR" +popd >/dev/null + +echo "Build complete! Check the /out directory for .vsix and .py files." +ls -la "$OUT_DIR" \ No newline at end of file diff --git a/vscode-extension/context-engine-uploader/.gitignore b/vscode-extension/context-engine-uploader/.gitignore new file mode 100644 index 00000000..ea5aa09e --- /dev/null +++ b/vscode-extension/context-engine-uploader/.gitignore @@ -0,0 +1,7 @@ +# Temporary build files +standalone_upload_client.py +*.vsix + +# OS generated files +.DS_Store +Thumbs.db \ No newline at end of file diff --git a/vscode-extension/context-engine-uploader/.vscodeignore b/vscode-extension/context-engine-uploader/.vscodeignore new file mode 100644 index 00000000..17c65883 --- /dev/null +++ b/vscode-extension/context-engine-uploader/.vscodeignore @@ -0,0 +1,10 @@ +# VSCode extension - exclude files from packaging +.vscode/** +build/** +out/** +*.vsix +.gitignore +build.sh +build.bat +Dockerfile +README.md \ No newline at end of file diff --git a/vscode-extension/context-engine-uploader/README.md b/vscode-extension/context-engine-uploader/README.md index dc01b8d8..65d9d5bb 100644 --- a/vscode-extension/context-engine-uploader/README.md +++ b/vscode-extension/context-engine-uploader/README.md @@ -16,6 +16,8 @@ Configuration - `Run On Startup` auto-triggers force sync + watch after VS Code finishes loading. - `Python Path`, `Endpoint`, `Extra Force Args`, `Extra Watch Args`, and `Interval Seconds` can be tuned via standard VS Code settings. - `Target Path` is auto-filled from the workspace but can be overridden if you need to upload a different folder. +- **Python dependencies:** the extension runs the standalone upload client via your configured `pythonPath`. Ensure the interpreter has `requests`, `urllib3`, and `charset_normalizer` installed. Run `python3 -m pip install requests urllib3 charset_normalizer` (or replace `python3` with your configured path) before starting the uploader. +- **Path mapping:** `Host Root` + `Container Root` control how local paths are rewritten before reaching the remote service. By default the host root mirrors your `Target Path` and the container root is `/work`, which keeps Windows paths working without extra config. Commands -------- diff --git a/vscode-extension/context-engine-uploader/context-engine-uploader-0.1.1.vsix b/vscode-extension/context-engine-uploader/context-engine-uploader-0.1.1.vsix deleted file mode 100644 index 9b68b131d9df4b15344deff66ac3aad4a5680238..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 517011 zcmZ6yV~}XU(k0rqZQFg?wr$(CZQC|Z+qP}nw%v2?dogq8n~034+JE+s6}d92veuH9 z0tP_=004jhu;p;kdb(O>#|HlQ2@L>%_HQw9cQ&zgvaqwIb9J(Cw=uA_Fg0;<9#-A7 z#bQM8k?k4S;Jph*CsK(l7{jSb5`ERw*|0#I+k*I;q)YuK@!96G!pFT_rR?s)=|i!9WlTAN$QU=CnSa_J)Rh;xSFq#aGjPrfs8S_rmBdA{7C&FBd;yRFGd0^96-#3aV3 zJrgwC6;9z#Tt4o-5&^1f=Riw57JPAZu084fgfZcFGQ%InRA2|GX~+T2*(!KU&6GdT z2*zC`&?oQ7#i9V!fmR3Rft_X%TD=$k9^%m{dmp=u#TU9(D;tlQl%TF2B?tw2M+s>& z*nEz!A7eSwlQ(J%*drziZJU~uaSNcOqP!3mX9T^&CMxM-r9daQW@&hSq6y0Lw@@!f z0;h^?{xHmu5k|@^FIobREADJ{wTe+#)&^Hq2y?mRLW3EJy#iGqC)a5!)>Zu3W`Fn$ zag^x!Z(RKL`hzC|YWvY~p$~%IN`8?>@CSLIG)${@Gq_V{LbR*xj_`pRJEmpYzv*FnB| zN5oS4Bb}g|G$*I`YO|dlJrJFRbi9*3O~Cx{)hf*pdMMNL4y=l0g;aZz&gjkRCQb$S z4&2_SwyK_g8+a<8Ku_dPgxs>)mS|EhSys9!D<}BMtVtehv)lD?bR7o*JqbIth`f0E zOHeKzR0npw2VZ^xl&=%WjZVmJF6dclH6!0hp-0X&bk`{})(x3@%#Fa?r7E z|A3+c0RZ?YWg(jOpH+}F<-%7VbH8aK#<=DBQj9QOm_^%|Jl$L9l#&zn#1 zWYiSG*SM--aXw`43xbZ{j=a+=WN;~Z-WBqS+^YY!;5zGEA2}Q^^Bz^!RgmFL$9n5* z1ekfQ5NU9HjacUH)7^qBY7m#1@NI=<3_QnfR*Y+eEOBQCmbK64igs(6ZD@OtW?|h_ z-xlPeyLs=x@OBoF4Ex|n^FX{W=Gy*dY*5R~Ud&C2;0=e5frJNKnx7Y${bT0(-0D=l z?9tY~KrY`&xSLCi28?RPOPXR7oll@{urI#9;FjYutkWa3D$l&&zNL^qMd~&#FR88X z<x9rG;T>_?h*0C_|iAn7hjgjQ!nW<&*D(_@WkM$7 z%6pfzF2S^91I5~)Z|JEZ z%;J_P@q00nk(pyq1&gS>?}8@_*2pc%r6e;Y3w;F#8)MEnPO!_GY87Y{d4x8UlO>|4 z3gHXfg;Xp2U3)&EIUOS;IG9!dZJt8oAT(*KdD zPR<6l#s=1QwkCQm_SSX=#(GB97XSE8XYXxrRkx zLyc^Nv{{$44g7`yLaTtbiSn0_Qg37K@+a^+UWH)_3jPnUf1$C0VABdDhSsZ}ySOG!M-JPiD;^b4X*j z)T1Bnu__Y3vRlD5%lKa3?9?$e8Rkc%DthsJ2P0SP&UoPFuu%FT`dCSI+EDclFRg2o z@wPrw1U2i(A;X2b{Jz#iafnOZt3z7JjK;lZY_fPFstk~;Mm;fR@tA~8Bez73Sy(%D z&H|}qjvHHz!M#0c_#VVxV2<2DQ{>7tLuMg8CW?Ik3#OFDKX5!6ujm~pmu~Wmm3PhH z4iUnzL{N6DGRzw;Xc&2OQ%iU``ugzqQ>EuOnLg@UB;gk=j@n&)1e73Xy24Tc?`ly= zffeJ_N$^|tkKU2U@Pnf7XY~}*d$;6C{a24R8S=XiT1q2xyTWpzVPlJ|JV0xx-3`B<#H|FbS~q+CViQ^*JJh6fd4; zfHp`Y^Ra@oUa)x*P35|RW9A(_-Q4bDldh8nall}Fut_Qjz>f;|M3ve5(U}=K+fxh2 zP8!2zq=VZ%GO8p-Kb+!wpKQ3}q{Ae)GM)->Y;y{1INQSu;1s}#2J={oLBvqK2jK4* z-k(35oLIQ^Mf2-tN9N9s?%W;v{b%)5g$^O3P-V9Gi#zCHz?@$QCaqHJiT0tD>9VX@ zV$d5gfc*fw`Z)s*yb=5SFRpNMaiaTYd1>hWO=cT_xD>ZIW8VwsQ3Jb@G+(qGaT5*+ zG*r*|h2V9^hZ{koq2#^ytsH3mzYY2Mgi$7cvC-JN&Q2syX-%Os!M_qj zjA$?_^O!zQ-34Ip;;67XNtxtGfy}gL3I)-3RMg$m)GP`U)Oksis802i@7X0SHol^$ z$lfM2vP(S`kF7G5e*nU!JpS1EGFx~m|4^3*{FFqUAk$=s4R4e9&DHTu|2{ku&;anbW(DK@=IxQGK}o>rBkUXZY>o zN8>vCGhdtD0>PV@3~afvNXbE#H$qu3{TFc*nSwxP(hn6gjfK?#zRTKK)!)3+msyTH zvlLM_PjIBZs5S=I++P~^*=hFUBeU$2UO+vDNuOb+3K;3%nXL=&*&`#T+MnDxydk~@ z3Mq4-H?e}0cr0|tI#l5Lo`ui#;Lw8J1_r9XQfu1xUu4TD6;G)RsozZ->ls5ziDm=F zNCaFQ{9xPU2EyK;kX8N%B)|d0Gh|QIqc1<9avW*k5*N1)Xy^n+@_JWq;Us)0k_uZ- z50QWqdTX9wU4r7u{6&SUfGG!N8y=$Us^GIAgO<0LBYNL?SD1i0{kfBMjromLrCxk) z03C&6QI2a8wv9L|wPLu>V2y7MiF<2+^ni>88phVHE_WZbt2n@YYk+mk$I`LxUjB~s zK3wudE2z@%SbaQz4o#S#9mJv2>q0<+7qebQ1ZOxr;aMoIvJ-d@2Q}KlhixE~7@zF` z=cF>F5rkvN56Z&`@(P4N;EviK&`9d3YSM#M@f4<;0T!Z@O&g1IkWYsPr)<6Jm3Jp) zy_O*2!msQ<6PROagww|5nOW*RoNw7f+WmbVSPqo@|r$aAeDSQF(Wedl4F zwjd3j2z;@JBEzCj;QBT6kAFHR{bz3s!f=!K%?te@+3&pw?gqRqjz{J(03an}LPO7A zT}LPpQ0Hg8%)P>8P%pGTM{{DSox+HSRSoQ+;^F4b%jnF%h4klDFu=+uUoy;wKSx$d zar4b$ZNOZUrdNZpDr*XIK5W$r&V%c0<%ik!c+uI!3F0IOZr?ZwP++#{3K%K%l?O}$ zL+8OCx!(8)NU5i8L(_(lNc>{NY6y&M1W9v{l`(2TNa<@>cJx7c<7ND7Q7mF4Jj%`* z1XQyz*(GxuLG#oqmN;qN2o=-m4`}Q=t{QFUMSg&S!Cofnq?o%m2OAliKl8^$RY2T@ zm0|5?`kT}$iTnC1%G*G3M%y@y5c&Y5w~OD^*B=+c>54wr_?`1GbMV(0?zmR2<>YAG&!03)G zSmIJcnK~#*`vp3|5OG2M1?-%m$B~{PnmA0veEetG=S()YqGe7OgtyH64oG5ZYK^Uu zvy|IqcBU4MnMpS%2(e&{T(eHt2qrEEjUTwCSjU4gQ?wM? z5u00uavlU=0%rCt72BAK1qBVt`=GX1)^w$-YNMvfWzZsGhPGlL#S><;lR5{Z&468m zpBgeAG{nLUj>#UIU$;KqtpxV1^f$`%D zHI%k|;5c6-!$4us zXn<^g*AOqSDg$-)CDhqW@!OOQ)!6DoRABX9Spu2Ji+DTXjXs9VQL-=2cS1yz+}5RT z)eVTa9@`{cKRL8te0h5Q#6>l>h85jiT_1nWxZnbw*yl%&XhM?SW}o~G6#itlK7oyf;1k7k zJ`P8gt@Sax%56ND1m$SUSCs&RL~56+(Mz(M9OVdYP2bq+?SINr~a(!Yh^5tf2DEZ0M=?5 zvA%nFBup?dJj$&<6(9md$~_CAK8)pwKcM|E9nB)ho9TssDN|8AR%HCffFnoV;FnKm zUh8_2%^L@LOG2CY4WRR&A*~5NL5H|?^|s+;ouq{}`6*mxc`tL7deRNW!y1SESqW{0 zGY%YWCD*WQ(H}iDAcXZk!i5`x6Yu;8oxLU3U}TO!r7CPpGSW5EX{m_H8}%F8WyOdM zZ52S7;B9gf$E0EjlcYM5tP{t1Z)`F8=(UG6f^z(h4O5P@w=7w%DP{P)`n!rs$&S^^ z)KC@;6=t`IO)f@NEf@Xd>YzSt3t)i8bhiQyAfnV*YBi+$r3({bi6YYoL62B$4sPaX zwB?8#%ceQWKl=%8Fi=E?Npq>uyFns|a!I2GVaZyMZe_00vr8T==g)LpU-r=j=0}YD zudJIv0s=$=$T5mH1wiGm$i>NQa)Jgc?uUQy*tj5={PiooR)gbVFCf5pbqFa|;bI2C zSre3Yg?p?_Ni^J%S2jd#}NHT&{E6GP;D4m}(uM>j%og%T_B{Fg0SM)l(IZRAl%MG!ta~)opk`Nr3F`V-fU@ik%4|Iu0QTbt7;(hT z-6d9tH;ysmbgEb$BOTu6Mg3wcZ5UW&?(7qufQ_k0(K z{gA|wLZ6IZR|!&k3JVX%CYg~DcWp29irlmY-u57$$rzz;*r2&oFUoTlYhQ4UM-VoX|7=R+aqL=I(9P8wu9qP;NE6ezL@*P zj}CLDclJF}#{-ovrpwYM2%&|`Un4bbN(|W8MD}B;Dz}qllj%_l=rCviQJ332_k;mp zPLdA+D2yU_RM~@@)_o8koIWKTr2nmxQyg{S(j(Wcw3ks;eIUaK9~N_X zMi|WiiDA|Ogw{)Pb=Av5X!xY@70**ndz!O6$)I6v9MK^r7-I!Y(?Sd&wPsHQ@fyJQ zf1?tq^BJz542Gv)VJ{6OV@lPhvfF!{*qZ63Nm34W@gJfO`Z)YZjv+5NI%9=e(Smnf zCmj>am)^DXLv%wW1s&;)l(*shi**Zt^+(# z39EM3o5l8K{vq~osw$dwFvf)~7DqG5qjHhMN6c!g;v@2;oXTCH9|oJO+eUh8Nxtc4 z{~}@-nLTahwXIUL0qwSlNR@CPX7Iew62EzOo1}a9yA`=Zo~n~3!x(_{%C~T{f!LL5 zN&Yvcw6|iSmmy|$agt(eDU1;ZC*z&apg`R)?fW_zI9;tA2BIif zJyD{5f{z2KXtjF7oA$@Zs}sL7$r01|Gt6#y?sesHO1wdWTtIv9Tn+g1TJ)EiHJ$FQ zxjvlhJ%yB5YsT(CFiD}kpNLzYmQdxyJZsHE*@yFFLeq&78+V))Fvq2LK1_02Ufia! z{(>@{nZ&>57z1r6bs~Zl6O9D*MI4?}Rp%J(MLBJj^JhoI->9~pPodl0S_qCA-|8U19 zRp^ooP3f*ysf$r zG%mLtN%fbrGD`;-$=oeue8O{xlz5G-l#Gizs~ysIvPVZ%Q*DLqleI-maBwXqOAHl1 zt3p~T>q#zpE}e;ig>6YJ2pD0M5s@8A1RYpXI$eDDoW6@v*`(ctvzJc{!b``jB8rX3 zqGJM?yB9PozI>X>rsGry3$3uM^$151PLLh|{G$j#y?_W>t?jwijo6v0@3X3I^DQ4~ zRYf8T2nlNDgXVlCk5Dhe>l+plj!-|ESVH+CPJ)%x$R!J6l3 zPp}ns^)JB6^r|7xVN0qd^i8(~7d|u_WgnUMR_tRF{O^Y=-I12tURI!t^^Y1PF|P+< z1~*(w8s-(t4;lO3C<+eE*B6%reCBqenGt#I-1bwI?5UXq%1=4aK)&3xngW$yV&-p( z%0ZgEeMF+4-0>y6QpAd~4G9m+?T#rk80ER^MqBMDIzka&FhhFT3)2$Ret#02?&V*a zC-MOVNN@Y!Uc9b{tM6Dxa3S31ZKYW6xCrYm5?z0nFuV^falfJV{oikkM>hIv`a5?hxf|CYo zc6ZUcj%8WQ;H-`FG1tnR*dS|j^1+>IRl&w;yWbQuX#19#?z1lZ82s6CTv{-Sad~u) z*ApCb6H558>)Y`GH$meMw1zzeUY1JP>C>razFPxW>#*MPfk&+8;KUGg0^k&=QW#@e zVod4j;n^@|@3TL2eHCSSl?aG@%XKXUKl{>~ndzu&b#|`vyj<|om*f-2BA1BtnoPCm z3k=jk^4OG?Gh9uu7s5ALs!be=HbNQERS}U{5asaV5xE4|l`&2dQlJu_boT4y>)~RF z^R%LTpXoQU_vy<3{8(E*ws~ZD>w}A;@MHYO!|X12aQUEdHxZGXZXBWVSS#fM%lD337rhT=s!eD>{5CyCQ{7)Mr!E6$ACC ze02V^cg%+erJTK+J6N%%0p4i$Ta@Vma(ycmW)MwL0O;_$40e4+f!2-T2`(D(b)W5*R()PdXML|4^T2}uv5Vq4|K0c;bT|pU z)mIs|H_MWH`1@aIdI8{6KWBNDs??c>gF$9NZYqxS*~Usqj?ye}=z%Iu67t>F{f0&U z_#|qTbF^X6lX1A6PaBGm<%3*%d0bPTY16?DcWN?}X35b4AmL(Oz7u_8_ z{qc5#+GQl1!NGEa4=7GNr3>LPpkyuz+Q~0oLHEi^8;tv3Z z)2w_HxFObFyIHLE5$Bc^T)^LG5_!`P{Rqf>IoCY7lSQTa@TdXU!(vW>2-P>2bD(?K z(r2^7xGN7ZC^snCq%Wj@KLAWV*#)F zIZw3S>(?!J<(tQ6Q?ER~kFoGOonoH`C&6i5MdU~iJDn`OGcoNZO^OFbL<*OP#){Lx zR*U6M?3+LTr<#H%&OD~UCI}pY@A}faUjnzM@K|EZ%ss8gWg2@8CoEQ+0(?QsDy=(? zJxVC?qFPXHz{5kz)tYcx#)B8dcR1m0IM)Zly1|JpL+ja}n`0a;oh1v>ewygdxXa&S zsSE>;0DUC+rSBnHr!Ey>+-AfF9z&38{h2w~#+8`&oedD)s)#;=(h_@TUtiB10L<2p z>cI-gWR%)*;+QxuA+X6J3K9Q}@P_|?&>?rBw-0u~BUAJ|G8NJ}( zLQ-9?lfU@wc2S@MrXPn{zjsFHXM=GBEnlZ|a%4Zq$folyO1Fo-F!iUbRD!32fQE>UN5B>98-xcdG3kD;HO$| z%?d}aZ=wj#veT-kyPJ7JWku7{Kjz|cliCD1uA=rvE-ppF-=P|RonQ8!t`#o(*S&9) z7v0SNqzpMvj^8%4T1*tX;_=NCnpl`hX)rOc+R8tqp?Of3AQ%?QDH0)>7`rEF#3NiV{Rd^B-@n^-${6>S|g&)cj54^HXoHrcyLzf@~sP@L6j zN|`Ba29(Nmt-31Z&A-@4o>qjQdyBtGn2OpOef(Gq^J6lWPRwFpJ0m3BZ{Lk~roRv7LebVXQ z9KKXADd$-3_yGSaRVprjce_fF@o~`V#p#qu5C0zPhMlKy*wd(g*{yCvg)E@-&oc(dl5Ob<`<2e`j0iCMz|xxk|XbV}<-MOWhx75gasT}k~iXhHboc0RB?*}{lH z4swBWcE<+=1AR7)486u(zN?*nnV7MA42 zs_Akj((0?em^o$wy**;)#JR9JR^Ppqu8r`|M=tyHeaxKt4B*Qco36* z@XRz6@akSwf#5n?-D&)|%%}NmF##Q-7z-3f&@H$}=l^B3fwEL8YK!M$Y(t-`_jMlB@UA?4BT3ZZxL7#DloHKy-FzFwh1hJTgv z_uoSQJiBgrmAAMP<_H(fNieelPyI&LcS)|wKi=iRm19r1Q$5E*(+FEZ`z<&_ zYgTft&Aie9EqgE}4XPmo@PkyX6?GRNW6A(>>hp$*56*T zC?my=U|p1|8^JnYr{}VXj<^HZ!e9)?`Au3h*Y4~}QhU!{y~pk*w4HXG>Evy*l^3{` zhq$74bW*R3@xB3RZq9R#PHQJa(>WeCVH70mE|c|#-)xkmfc-f@1#Olo`P=%!d_UqI zsTl>x0-k1fXN6nogQJ#>WQ2i+W$}IXNB~&S&L3onyl(ipC)5R3B2}t4;;>og7Vf*v z>(pLK5W}w-rUz);n=~#AmSVJYhF8zYlIW5!E#rWXLW>&DxZXAC8N-6-GJ4@N^<%}& zct1>6=22V?V2O6&qmYV#AGqQUuYCJBzpoVo2&&gB^t3LQ1sG)yC5^I-4Za+wf@EbX zahzm^`?aAuW0gPifenvfucAYiox*DX1wZ9ocJ(HI6IpE#T5uLc zDNq^j5%pyOH+tC0+{hEwChbG!Ed=8f^kMaeZd)|JIaZM)wm}-o-Gr7%aI6B0hb1la zgh;C!)1q5Ws0Sc;gN=j98n5<@k#T}=V*dW!PUAyq8z&T3eX6*%A>r4tEbLWAg3fum z2EP4`-od|oHG7OLFde?z@E6RnC8o5t^bm?gs6t1xZ%c5IW#u3X`Rsp3`OEtW$jAQ| zhP&DP|Kc|*hyMl=wZL;)tie}F3d5AK4qiA^j{KLMOiD+%fH^pJj~KRe?%$P0d0P^h53}vetff8DYoFMNq#y>QFL0 z=;fJquOK;gu;2*I;_(DHj0;CfMbU-I&4a6dZz%t=`QIA~$T({2Q;d`RXX7|tsUhft zd*=}6hTe3yfhuXPk5h%Th>s0@kx}VPx|{q3s?fx7FlvP*tAj>}hERSex|tok*#7$Fd<*>g6xWzy zu{8*hmVdFtj3$Clr`HYRT%y2)Z{Eyl4bkj!)xiZ#YWm`m+~m$b8w9g z8u0x;1xBV!*JD|3jvh3SWK6k1(k4&D0^j$Isj@l%`exW%|a(NHkJrnZ$s=Y${(wGTM!)<`0 zPDO#T=&=IOlwnZ*k7xVhanHQ6=(oly+nl;2{2pQKG4n>jkdL{qs?vuFE8#rLSKHp6R-DO)(cE**3oGuB1f5d zIcc!qAq~J}a42>?qo9tQ$}Fp)?6cmj`l{{nj=%Fnv)qN_;<~(CBp=ub+1ka1K^y!-dkVj^6iTL310R5m( zMo;NeX-)~H5Zn4drXKsPh{i$IK7i$<8Cvl5ZAY~Y)cKXDPo>riK$Qg1dH}K$E5`ho zF&rU5MXEyvDm2q!ID2ku!iA^^RfDrYxqG@j9$8B|NX1ml#aO5U($fcF*95d?@4(hz z52x1PcbF&UtQcFr-?zUC(FqZF=dh^arY6ybU+KzP{bE1X#wuR$n*p!X!}0Pk{vIsT z_AEtBA^CuZa(U_mjzXuCiOEgZa}>bx5DUdFen4q4sTM3>!LVI0(VVAIR<7ppB@!wr=kA%;lmQkxB6p z^}^u;EhDBdbRF!d$1JAh%!f#w=Ww!He&84l&ol2&{_A)MBKLSRCo{)!NTv7N*t# z1#Y!#%O<{&8)S3Ko?9mVYxag-ZOqWr#PgVu`XGbogcO6+9&5n?nc(C^QFSY!k?>v0 z1w}yDE?NiDV3Q7lcd$e%aYviR-F!yVdR;ep^)K}5zbicY%S|l;Nd^hE$!ef7`YK3! zMZH`*UU35TE=J4$GzwD53L%SzRmi$BNrhEjR5aq0N>7S1_WPO+U|1>YaJ2H6>GOzMu53KeUH1Pf;Ygk!r#x6muK&VHzC%c_IQ@o4A zuj@Q6RyJMj0hGK-`}x}eW-x6lKBwX|GJpAsb$on8(^oz1h07L#cCjlsB#9A>LLxh>xRsZko24O=n)IeM(+CI8V1KNar0MBLq(&+c!z zBgZhZz_;u?ilkg=+*F>Yv&8B1+#Cd5+o+^;!E(E5af;is8z`oA+1Wu| zKQ{rmZ>s~?U^$QRkS{1B>o`x|EkAhC-a}I}GL>p1 zJkolbLcdiQ<2V*Dt4w=PaQP=U^4pJ9cer$JiA}HR-&vGxH&2xB*lPYPtOvv&)U`#! z?#(nbl)$kwY7^?~!(}iAR99t3GhStR zI>b}OLqtF|Wm2^$`5`u4VBBZbo5uJYU7=jbtb1&nxQ7Bzpo6uwTVUJOY6I~Z#ZTe> z&zZKX9q^Y)^~f{OrIC}_Erik^>(6}AzHGR!(P1P^Zl>dlC_7VMiN2jdD`s*r-Fbm- z&Da+(sfAjwaXXJaB>h2qC)!j3lgDnm4Fj{Uc|P zUH*LLCWZko%DIz8kn3fM01?VqKKSe2piIEbTwDNk@1%KvaQva>+Vc`4%R~jVH5DV6 z!-Vv%n~UdbI+Y?hTq9s2F4tM_FQ$Nm!3csdfwZhy-Y+b{2zuh(eD0icCQbLgf@Lu{ zVqX8*Gtw0(aTeiTpYx~9Z#6{^hTV^kKn~+vpEH~#g}h;lD%9NkNL(PeA`) z7#vLujBQN*>9s?YyZ`C65q6$Y*vQIpZvi<$1b|Q|;t6aQRZu({b05pz`)MD6NHuKC*YQ4n>vcq#2+Rd0@Vf#`?kLA0PaKh>u9^5G=4I z)HCc(s>Nh@r0GC0bk>CFNpu-PD}`*>$Tp()V65;lYKW1QrzgG{ak_hn=Ig9Us zK0}8e1-9UtPb|Vo5hL9{Ld>TO!@%1t%>>5o=@87P10C?TRjXnMbQmD0)>El6vXt^u z(qSX!O9;>Cssc!r*UDA;LH?G5)6eq79e>v;)tMu9x1?q?hgTpvI^E}WuTEvCS~>bY z`!oLjecb8uPh!w_j&e){%Lp#nlO}5^^*0Qs!G^S16FyXjv#~%sdaA?HCdz{_rpG9t zRBGY85XF{R?CNrm-VfJAvnD(BD#bfJ*Wev{7~YAYv4aAnMb$x^aaN_qZcQ=-luQ)dgbB}8qyQsGBPd`j)EN>`}tL;p2-4%*kn% z?g2|U6ccd64RxQOnn&__YNIQ4WUr3p0VkC+_0KTz;ZvB+=s2ZWfiAbJdWdDAdX+-~ z*-Evk6-0-h?Mc~on{9C4;?8X{AzvMXt56R@LBp!iY`EG|P2<)i4cs{Nka6$7H@Ok+ zPe9gfYu+&4-P{W`d@sP2adpq#YrzOqg|b;;k+R`PZa-`s(FQHqM2qrpB8*yc(uj>q z-ev+bz`z=qe8txe+`SF{IDVJIBPt%kkOT34ZjlR<##MP(%3wJ|&`y_&rT{yM>|V2s zbr>miej)=O2VcEU7`sr(Yex?eb2-%r`A|4i@7tYL8Ed^w4uKRN`eWsWQp(e<=lv3Y zz*+qk#-eNQQ7pm131b43?QpZbE+T<7EvcvM2l!uZkpDAMz1^K|#r-ogT71u%fFn51@wyzT@G26h0hDd8{iDX7w#o zn$E6Aeq@?-h4Y_m+_XBK@ft8aw1CQ~EzQfRJWYdeqd9AA-b(4q&R=Fu-tu#$-m|e1 zTtB47+abCNwJp_L>f zBdpF>eCiFI!oYfF1o!pvO!`(XQem)uvkuGH&zrTV-ZR>djiPCA$1dD?`OOh)O@H@NuNlnztt0%*J-5o4=q3(gnS#_vQRyfggIERyVKhMsM6%{E(mKx1OEs=5O z_2I(n-I+XYf`ZnonaL96b^d!M5{gsUZekc}JbP`FZLCpDE3vWvRNAOJCqX|ExI+H< zmaURt;omoM7O?VC3Y^ItBDr46MQyewRx5Qob)djIh0$`eun!ld^YvZR5}hShasTa! zf9>WmQ)%Sk=nKaDW3q22+t*Y&9vQf}yz=wa`;PT9`nB1*jkmR^cmibh#g_XR*ctU2 z7V~J#y)(KOSpDU_8b${ODy0Bua;E7H+42LlRO>1QEZ6XPaPU3JT07%oxTxI=YiZ(f zdOU}qes>b7jioRdNvcCQ*&vPF0T&Y)fq1A_bn_c;-_5sy^9}l63je3Qxw}1Q)ItIP zeE+k0{0}cA{r~Cr|42Noxox+}j^sD1*ALV$35G-H73L)|ul2OBEfk>BWbSz;gwPZ% zyt$Dgk|RDmZQ|qi2^&`YM)*-w4ZS60m^Ao)FcrsCEVTnAfhRmpEvg%z`|VZkm1^cm zlEuSEop2Bl9&4-F@EkFrvaO8YnVTjJA-1W|{xH7e#@31Ovjw!uB8|j5W*fgsz0p!N zFN94sxvVv<8%N`=*PtKllUjw!Vz=u+_Z%Ou40nLvA^`{AXq2eS-iGnGt4Hk&ZK@nQa0Xb)t&pbMR%E+;O7EcmhvYa zVXy;Xu$$tuLn%;X9@a1gJTRV}0ZMpt`0!23{x1=X^mf5vj9e0Sq{E$w68$ENmB~G| z))>e8{evUxzIL*Acd1QDwwd!hnI*J_oYl%wV5a)LOwDKp4vPvt zfua4Qz2h0xZr5uzTf>dxrES3G&ZJuNSzG=qtP|Xym+(TfNloz;y~_aaFpn{ctR!zy z-7nmtpm<+%JA!Bptw2@hcA5-^eY{&)Bivh}!=?CfCb9>e(EFRtwdKYn zn`{G@KF)SSn;J-@&dipdoRcpd9RGD^sK>!3m>dMdkcswH+P%xn3h8edYOVlgV~B~% zB}0`0CB_M`;B(ybJ57f-I^Ce&D9;SX&CplBzIT;|z}DIeNrCG`9pd-7qHYc^02t?) zzv#m7sLu8JB`Ab08{6yAUw1M3Cc^`{UIfTnl`=iZS5kL=W^N&Z=7 zQ`sQq6SfS8Z2*H8d;a&9Y0VVFY_kMUJ5BCTusNIk^qf7Rvh#U#R=&Jnl#AKDX+Nyo~=ikdQuB{6|Z(S&T0^Pe@a_dYpWXc5j*I{JufZK+=aSyxD?j1P7V}moWG%Af*9PG5SZ#TO!sOL zRuO`%{E9TRT)I@<@f+$6Lj?>=HZ9em^R&^hMEfb>z@LC^oB{cu>Id0iM5zl*zNeLL z8m}lrXC{3q3y1fMb-ldMX-8}}n%%RX(2ZI_H-Y-!pgtNDAAT5JV?*cQ5mhEs(!&|K zuuC8r72wN&ZRwLNt^?m1D=q5-oR5Xi>0Hduf%P*7EY!yJw+5Am(dyb7pfWPCyY+$i z?h3`x6y@AE)(wkX!?t@|lJFTgFIx(daNvKd%ha8|h2ynAul^mIBB5*3ElJ+ab zwtLQRW!JWrs5Mo-r-}SCpcOZ;v6)oPQT=U@+~o~Y#sEb@DX-KV&zo{QEyQxrb3BSx zx7^d&psNmW>_v}pu?|dz+25w`2f0>|ERQzFc$Lp$37dN-wowK8;n=nAM1y$i#&@PA zj%E(CbM4#FNy11y%$_169mEvLpUEmlREnJ9%gxn0mrOs)$nW5XzKuCRoBdV0?Tytw z$9~rDyf!c-sCJscgW_LpTJy+RYGYZeyjiS#|*P&dQar?>yqt0|K3`8h_lHp-1H+o`%T zP6&!-*iefx73tEdDhM9GAGzr?Y1d0=oC1rgrtfv>W90ag|MT?j6VuW9qIXSq{m@ig ziT>=MMh@Tl>iZtD?C40P-1mw4M5lwC!Y88rvxr+jG$SLfg$Ll_uR4cmF^)Ht$%0rR zdj(#nw`5oJ|1`)$>pCnsW|`KgxzW0C`YJ~N7@xLx_`KDgUAT(sX0eDU7|$X{N$!+4 z5&}u$78f{oeQ-%WMeDniF>jMMm|#a`-l|zo*DSYrx(AtRZyP`7TyMOR%8+m*aQrK! zPoML{Ad;+r`Axo?k1n+8wl|<#^A$x|7dKD7C2!WB0I*U9R_% zPDgCya>ZN9YA>1P=}nnhgUf!R$~+B*wPxkX@kSpS^rQFc#NMG*o0?VWiWUO>*F80! za9p<&Oj_U-I%f=haSq^sL+JZ=gyQ;Ld_jFF{7ruW+vNA&lRnr=ixIKcJ_ppVs1ZF# z*4*@H8*|#duTXfS)8sX{s&4m-!K(V|sUM2ErT@$*AVG5yGG3i4VeR`ejfYU-XhkW0(dc%_U>1TFcA+zByb=I7EyRPyL8j?)DzMDmK- z;Y8D*sud(Iwnav#3#a@q0AWC$zvAJ6`m-d0BRcKBu(a{%y*eC0(^>~ld0u8Dg5Dk3L3-R~7Xx_MMznVsLb8jCPWN8Z%W|9@uUs949lDzy?*@sD zzm$0WoCAykkXEZkcHw<0G_L8Hs5|o6LuHU&jt-%vxwsC^$*| z^Ur`lL_xa_VkQ4{d;WyFZ0{h4)siuF4dlm?A1?tHlO`%>?`hk$w(02mA$1gpJ36_kn-?bI*E zrs1PTqpJz)4O?}LyLn8Zc|@T`8|;~apGBOgP*Y5lMTlFzx4)+93YevTUvT&cvdr-0 z8{^jedJjXggG0boPl40NI!@6;o~TD-RUzm)4*fWr5O|fIPvKf`L;Xh$(LTOZrutSg z^2j~?+;(hjNWQPv3{o|>&|p(uT%!i3dvvJ zyfM&@Qd79`D{Kp5$H)Yc%da~;MJqP`J~8OBCePU0GdL)Rh5^ENyvNG}1QxSey(~Ch zXRx3D15ir?1QY-O00;nYFm+qtAYz(!R{#LNSO5SS0001GcywiMb7^mGFJW_YWpr~d zX=870E^uyV2q$~Y& zcXd@F6y(I=ps}F=005k%goqLV00j6iLjwOR77_WG{%biYi3H{HAGA`B+X=H z0o4EMkN}`CO8_X~e=ouY{6`@9Kmd^c)$^|}ANc={0s-U5-qgoL2ULbiztzyv*G@(H1(P>RKh%T>U>3-3Wvh;=>H1&bx2 z=pJJcgX+4vIi{H%I<*}oB?^?z^TxyIgosoE z08uzt67g7``!Ry+-jB8weLo)w7S#Nf7MJ(OvpBx@x~`kvvYMKjA=cmRd+j8#97g-Y zy5iB8^Q`&ftkF93{C)$Ue*ABTPb<1VPuZM!?~&n1z&?;bWAAQ#UZ>TXP2RnmN);07 z1uE1~6Fx87)|zS`s02<^Owwtz3B5WPdavq_JQ%|-+g@&S`GQwIqREf}y&(eBDesp} zvxJQvy^hY}ys`TDZq8^2}8#asE>LO>bKt(KJ z;oC)!ubFDJs64aE4gUGceoHSd1oAtqF(SkTI+L?9T*5l0z-~sW@_*?%d^x9>l}*lJ z10;aBgiFoOP9O3+Q;88g{t#^CgW1eGKZYsPw8@KbC83Kj4uvIpkDq$tb1D9J#u>zL z)O;2b&(!Nq`c9f74vBb85S1-G+SIu|Di%s*wk$G|rnAGK7Vz~T>6N+SWSz9B`Q=}r z#9*h`a$D0Op4j&_7vNC!uSC%0KvpV*BHQ>v?TcHXT1Afs=8B8OP=AJl8+-erjx2&+N z!3KBu>4ar_#2rf12f#Y&4}S)JMaQ8zm&rI z^GB`YaAV=IC}$XSqoXc;ivgd1!ZFoqdoSadYl!ld&-V)HR8OiHuoZOz9gMDZg*#TC z4p}Gw{RXcG5|leBSWftf395XAASEHj=%!M+td%de^=jJan|iaIDT%-wy>&1y-egI6 zPIR}_p5C*%g6>&@=W@Ysdp2O>X-#o$wcVNN5uKt@`L?*Zz$xa)vgKW;;yuW~iuoR% z{!r_F5`+7Eh(;wKU)Z%---NYvl>T0}qKT$7)!X=)S?vSRxQlSpy*kU!m+Z%lUwLRT zQ@w1hB|wfMupRlS>UePiQMJR2Gh28H{f_Dk4G8_U@xpf7GUNh*#mBz!X-x41!p)@q z;QA~(^k8nWEka`0;hR;kRgPwk-FtjiXUt_WU*QF}u`$DWw^W+>mS%MPuCu8(e5 zZ8PGVP@ZS!PT;i-p4-=ChSlpUS8@)9c&r#IOo&A@;>8ngGSBDzsA~d~oPunk%`sh+gS4-xdu4!4k z3v!po+M0=Wct3n~mcXE`*M5a5_|xWW&NZ0M;rf7B#u}i~J3|D&6D%qLZlnu3A@ZC* zndU>Rl93(a1hsQ_zfHoR1}+i%E@C9lFlxXrfNWp?$%%~k_2z8KwSB8hd~VT2 z$8cvIH(QnrDlERcblYNVX&rmDwZFx6FXUyv|9F0D=Xy1!;GW}X<`rj!zGu!V$8+%o zXjfXxr$N``vhO^gchQSYb&a5){{iRyQDRW?w@r(w1rJ}x=1t}3^+Z}g@GBq(1Z}~C z1Of+dBTlN3++sMM&$+oFx_l{6+~IW5Uvwr#o%x|RZIB{&o-o{Q()~U`xO;D?W!t*_ z(V2pui|)!PW!uTAvff!S>MT2QMi7cyatxe@jEATFyU8`pGa!R*^Fv6J8+~@*Y@Kk8 zm!KDU*jVW--pCC_qU0~eeFaXFA>>}F6g!p77nZV$S zQu%}L0sm`Sf8>I~vLX9Kzvzg6xhG=WB*>C)>o3>1T(&V8MCba3uVtk+*G#ls)f(qY zld})Zd9M?&liI$ua(atyN&FR(nG7G5sP#Q81JXvKhEGI zCD(#xPMg*5YO)U}nrT5}ccX;97!-)8D$HT&s4%%YKb=Cp`fKc`xjNDfd2b96!}W=- zw7O=?M~E|9vL%}e5juS3E;@Y zfB6*=fBHiKo+3wV%NMN7;97^ltwJ8Tu4f9LBJIa z%mo6LKZ4BTL7fsRmUI~9Tm(UXsqvWPzGZ2~b78&W-XRXN2EMhr>5wa5)_?)V^|kYB zzpg7}+Qq5bEP6$D@_}fAbZTjXN}B&DvDD{Rl-|KxtC@f>BV_6Dg$4QJNT*v;UQbax z67?d8W(7R6lE0OR=d@g2Z9DxWcT^DOn2=U|@#u?C-8i*Ua1Ft&E>ES5H!a8jk-Unf zRKVHgmxCxGjfExalr-{F*sJUIley;hlD9A0pX*M(9);CeSKp&0xVxwB8-&p+eSQ5b zvTT#gv?`^AU^C@j2`tKK8!>)}A;Y6FkGU`OMSXvak!og|^r;k+xc|eEbdV7a_WQtcMWO7nT`udBxlSmX<-JS7>JVUb9`>AMglxzmi zkvQl#U86hW8jkaCUDgf93JMS=?8YmHU`0$#@thDu4IVfXP6LBof}V|e9|SQI)))4MW!Fm^y;6VSJ46o%WW zHCZ@L`rm+YmA_A+9bE4hrKQuiJ!idMhJ||)Lk@EiifMQ~9;#8w=LrZB%(}!3gZaU| zGDi*wvM))m7m%B?*xw|+d!aUFp&J8X`M4%=n}z84;s#ez`R*&+F6T@0MdDepD97Ub z-+ypy)A@Wn(=pk0{C+?VM&^Ju=+CE!GTc z(H^DNw!Cd4w5&d7ro4O_#G)h1XoW{v+m3P3D(#CtN)eSeAX5umc7q0U7HCNhwTn*b zC0xBOhe4KxU1vYyLvuqvXCYeHSiKJ*iC;E8(1Sq0vC5(_^p(nHh0^iqdwo3}d2Ja* zO~0&}?@Y68R2LKgH5LAR?EIASd|bjX^tMOd01?6!(O!&>gYP))P#(@UCK`K#EO(bL zGnpfVBCFpQj_(82T%IM<{J2U|pv4D@sq(w{Nj#39zOL&ichx5Q6vxXxa5uX4dZiLB zE;l8J6ufwVB6s=wEiWSR&U(?uzPsQgWkUu!8LSWu5F%~}MFeR>l`5D! zV~0H;XYdlOjY;bP^R+VgXQG1VzqC-^eO+5NEYWKuMSPz~CUHc%_w&4p)91K5^(hoi+i!DKg}3)FGwtHS z{v93PkK;oeA6^L#2yYRg0wOOSGBgn;v2n7v1C-UOqFGLkA^MFUjVVs9_ZA%;{c&DQ zh98yb$p`*AuEK_=Z$+Gp+ezGVE0~7Y>D<@LmfH^q!lvUS-HM)9_`$F-dZxZ+ARt&O zDmd+Lz9N!?Bsg^e_B*2E0u2pB5?S2i)QnB3fVWm^lg(KpMXvXLqBQ;6c~zYd&{L~J zeQA!OMYKla+ZckL^Kzoq5kQ z0vTsF+N>sBIqZ{wY97R69wRU!zuj|a4w@&qTd>F$r(uDXu* z^S6f+H%yTm6sm%%#g-v>ZXLg`C+*)YXk0`C+C-_6=<=208f>Dy6}O@dE7Tu%DnO*+?s+#CY+Od_f~fB$|?fO zjr8vASWp_k_*O^~pcY~ytWzEj$F@CBY*FZR)K1TlmI}gO)^@!u-|0-#`o5~!Oe`JW zo)7XoEv!c#TaqbRzkndiAUqP&7!z=vl*i?dO2e04!6+d|@4IveHrk@s46d}lm40e; zd1)8OF)BTGM-SNUNNo>QRK91`3K1y7do&2P4XDE|xbuFY5Yc z$`wbPxnAZ+GuXE?y-pFNW_zX<;!Fe@69f_rDyJfb>43?!&7xwG(HNzWS)jq)kwqNK z^1Ll<>5VTtHf~1=q^`P?(il$TeXnH(7(P+&LqvFDE6=re)>T8*x<;)E0kX0&|3s-q z0}}<68V&v{iL!7%?J15hQB+4TV+b3uM0|uu^9=}}42H;cWZ*8u#|bP_F?@AJzv1Z> zNMn3=6NSG)alb{%37R{UB^+W+=~J_E`Yi^>idtP~lpz5&I}opLQY zn=m29Nr;tskDx02K4U3jH0J#Tq#Zr2th%Po!N6qh>(^}s(BA|!QWlO3wd`6}{N`X?~a{sh*C=_mp zo`IqFl~~crIYHv_1qLQa|DX8CvTp^auDCfX3OY6vGMy-4fC0Dc2EtBY8PLwkxD;HH zrbsg%mJnMl@FDI}n2pYGT}<(R-^rt0^BP+YudT;>T_R26G1A(62jy@{G~IdB+G;T0 z>EKD=Qeq`%IEDfv77Mmhy1l8WCBT5jT27}Q!C6>!?qUSVaSeo3KBS5hze?Heg?$a(h*;i+Tghvp{%xp*N``?Yqz5zSb?(x1QotI5IFo=|mIi&vfP?jUQ8WowN zWY+^p)rkq6X_;#p=FvN@yI_4btCr#fAKhooHz}}!YGA05ox4FoqY34@o@_Y}Ei$s6><=wDv zEjbt9GPKJ*HH%~(e)eNfcv#|K?~_qS)#bt&k$4KxP;;=QdaU3lx}zhc?9zc&4Tq9C z|Gd9(+vIRxErnDBKW%qKh#=De>G1)xUYbyU5;4+8_KO)tTF>&nM577>G$_qF;MhX? zHL59du=FB3NmQ9`O2ex6Eq;f~_(-xLP><%^9v36}}ZS`c5}Tt!d+dro1X z`{x@1lTy9o#q9!d=+n3IJ3;5!XImIWJLS@Jw9fGyqH{Ghj2=M9SPmLy5u7#%0W1f* z%u99(??M8G^Dv=?K9w#rg1#K*@fIgFz%3rh=45H zT-veI2I$Ag@!BmXgh!(Vk|c{#yeV7cAL-V%Bi>kah+(=4LXO~G&&0UrAt~hMK<^ut z;iSJ=0&oD6s@%j^x;rqD*+a;}r|wF|`bpf*GfUvi4~QBFrOtQ!)Ln1sPi*DfxFfh3 z9bDA3ZP#Mb28VnHe9_sGyp=hqpJ7X%4kuja&ERHr9aDioP5WZi1M3h zws6HiUJb)!YS3Me;XYEqpK2zmQuvD+&tOVAvq=JpUW7+VJSpv|AcYA56*vg)JG5W7 z%?3cv&(5j_f|R&DQV2^_b94ShE3j2Tz?7sNh@wo9fyGiX=RsBA;XR=?v!blqkyj=o zwwAvK_{fM;^EfJ;EUe`+Aq#O?h?m9(N~!~uH^E{)c$YqaigrywJB}d;Jl_}eo+C9` zyxCesUP{xre2?Jr<|c;sb_nPu3n4*LJ^T#29#CEsh(Dq zSi-$dSdY-fyg1`xsXcbg9{Tho#eFlZa*-=v3o`r4^fpc5)j~FBGaVE`j4(k`*j7Gs zZ~6&KNvHdXKvXojy|L`$POw)?LNIKyKm}8{`_MQI;Gp}{HmGI0>Mh7;Aig@Dzi4uo zOTh@;vGj8fl1xbmYq8o56;IJ0S{qhf8(s-ix8i<_&crT%Nw^IU7!=Zri_oeGw!kp! zg2MM;4xprf35%KlA!V#*kU=5%!w3#+Yv|*AN4%w;bw@!3_Gd;N5gdlU5D~jpK5}Zs zYKTxT2)s*iDHK_|DEL>N(^6_zfc+9`-6-1PK;PiY?e1&oh&eL-J=D&+U7sfZ(VW18 zqNvsot|f^YPyjGggc;{6i}$7mVN#-eoMp9@L3Ec{+@9NH=w3)x(v#@h)#-h7Ld<3? z$4jJ`kW>nSDCx+)_TSVF{fCYsNRHzUniH14GyBP>I>2H5VAr%)UA1}Ai8Uu1!?d4u zf7h&H;WhS}Pra3-toO4!WVS|%MKGwBlPb}UdXros3e?-B+MV^onRCKAA^;cLmed-; z{CI@=Nfuo76@Ww~2U2d!Hl%uLPbGsNvTuiCxHQ`ObgFuuRhKRjX2)P-9?WiHeE}_i5=? zg#d$^t`f!KAzO#MM2<#TLT3*mA84ixgnGy{ew*-z@)ib(vW*c?0Y^C!&hELFx55o0 zh*_bZ5o0ep(CCX47|6)#8@;ZiHgXK%ouuw-d$x~hQpj3=iOruNijHM-tx}yjikJ}Z zL8NE}V(WhC0j&#D7@)sk7p(uDuQkoIoE^Q3fOP0a;U~^r$N%7P=W{I|L9+!&gcifc zi`6$Jy0lVhX@XP1?xP7w@Qul-#NU#Y-T9R~^55ToLH$){0ofvCl~Bls1?ph|5f!pU zbzUwxJ?gK*^ju%RDHGfXqNYr&&D3Vy;e|783+q#zT3eAk^hT)Cc#$J@5LpQ>M^n^pSoff2Y>krDzkFv4x~&V@$s8EN#OWt*G38E-DY`2KRY z!du)fGl3lxSC99l5)2?5XBCd8ETYYkYF(WmZI>)W76ZzH4zco?!p^tWUwER~oMN%X z&qVAWFqF_Erno1oat)9ukLlhb0&I*SIQDt5 z&E8o$T}!gwhMlvb^xBL10)^xYCZos?CKRcud6B5NgDrc0U%x;LDCYoA!WW>VAaE|@ zp2IJ$068@OmJc8KiRs*7b&a54yMO%hM$vbk7eq5K=Oniy7CwSy25SL2HCn=AMWg)^ zS|8RmBpMPr0_dMw?AiPCcVyJbensgJ(SG3-H%5_SB}p|)Xj7u#!s?(2V+39CwSM!1 z8-#BNN=ys2|E(+M=tAhVMX;pdcD3huo0ajbJ+U*`=yLz#_KDfcEeI}(F3~#@H{6|b z$cPQZTOUA-w2R;2FAa&8A^F}?(&^TcrfYF#XWAs)#WwyBvsP#27NR;V?aS$t0`?Rm z=*lA8X9uJK3K|bUU5%_I_h}YXpsHVP%G$fw-hFmNzQ{a&`c3EF^J}x&w~`yhN4ocX zA66hdL?#W5I6KguTyzouE$!_O;syIb#1d=}QMwtLEe!l#@g}DEO+B z6$1Y#;;bv{(5DWdrxjC>==D#&-j68)6`BTjK}*v+j>36w%N7YT+)S_)RyVIU{TjF2 z9A+tg6h80hWQeMp14*zeIF1x51ml|2Ak;j>Jg0@?HKNa!uB2P&x%m2|o%Z{cbGC3E ziY6MS#aIkO2d6HLhbk7ofClHO`u5QS3;=-TE&w7VPh$=$3zrVQ!!p_a%N#lv7v#n;3 zEo6wJ63K|ph({v{h!iNT@Rg+S-sTUu(A_;}yE@Xkfm@R>jWRFR8{%NzuJHj1fg;Q! zDCqCP&{SyIB?43-HEuWmfUaE(s1;c{zf6HFI780hWew)nHRDF6Hf;>sl(kWeunrtf zYrg(Whk+pa_z8EoN=hMc2;?}F!Gxy5coU3pzg`6IExo;=HSB`jJGGH|Q76gWih$u4kVDa!Re|AboU_l%0S1*jnF8C3Fm@Hxi1*w$Y<`AyWU^Iy5 zNs3gE_f@9*5M*6<7D!@TbwwU3(F`q_HZ<2s{w8QRY=W%>z93>Qm4M?d(!odQi(Snl zl3fw+SmR%p?32bd(=CRtWS|7}gv3hjND(r<;)aPH_UeCEEGJg{O$|^siY;SyM7qsT z=>f7>IS9Y_bJ*!A(N8Gf_wU{IAF-?@*h+CU22)_YVH}18BH&77X9%?2mUIV@lSWYk zy`OQQ-8l5Tw(Gw#=4mTX7rZXkewcCPTtS_sHG~Coo1j_>U-Zigh=LDko>@Be-2gKQ zfRfaMMLM5c3!>Q9!8_%sLyHuKyWlEw2(G$oh!BDo@<8H5&VVh} zJW?@BXTf8fIL~W{k0IEUm}yQg*f~4$%^Q`ex_-y+br#g8SxlOXuO+_Q|M0{V`JQM` z5_&ZGJWA(csR4%;$ZBxBgF!>|Pt5QfH)K1*BNcY*P7%gE|u+Ga)m z@+HGT)Lbx=Q+|a{L`9_%wh6=HzXw6cRy9N;0TVQ_I8{a$?%SN+PPYc3Im92bJ-R6^h#yJKG`zo2RM~&BOKn70sMU2}zFg9}tw3zeah#*w&0&$?|Vp8UFym~wF z3N+2L41Z$*(~So&g#L5arWeHf3+@;Hl!e)f|}8YkhmvHXw-*%miib zFRX!FB;o;{@ywd5qyGs8&y_Pvz{uC@wg?B5CZR)((lY#_tcXcX4i2RV$vkv0%)=ML zN63R?bFW3dA->wqtxV@{wUySE{bsk780o;I5wz6wFO`6{$wzJ??YI)}^(QySt7&OOX`el6`@1#`%9d#_upa86`WmO-ptU}BUK zb<+xn#d(jpe;z`31Z#>owHJEWx?Ekw;cfOT`l&i8n$P$E9kT)!moqR`U!e?!4oa5Rl2l zK-kitkP`~?MY1;|RO}JxlCfNsFouNh4GwUEy;^w@@nwhgmSWMLSe&jIt_xCRsB92U zujdsG4Bx+(YkQcAqn{IUwpAHvsmxvH&#|xNY4E?H8U%1fs6)KtrPqq7CF;X7b-7^3 z4Uqy0v`XUR-F8MbB@sS6mcHEUc!nFr)}JpjU`szE`tGs0T`yZVY@6oAaNzKH+7&4G zVPE3-zh86OcD_AlvZel{G$hzK`RRMsj=8KY6qz=EI=^^<^(W}3nl{F#0jZKBv$!tY zcidYzy@flEwDk5~?@A{5eijkfHBJBJ09oxv((yKg*(QrZ?|XXQc-eHC9YWxbCP7RJ zb*N0@>aVwRcJk6}z~iL>VM0GcIY3F^yNB0AVwPj31wMRNT5X>tsi0O5P(>Db$S-mJ zy7Amg(@gwsaJ6|6*|$4ut+dmrC;KS~!*#rL7`5&Da>qSIhK`7SIG*;p8^NgU`wms* z8BB1R(9)bS<8&fcQbSJJsdRqqZrO1Q*uN8@Rt?(%stOhYuI)s0I+?zpXGGxttWVST zIJ)k--uAlb$;!;M2UWng9<#?*BZ})W$O4C7_51lM05Ejl4sL&3qCD_;k9pZL_2ihv zy;R%8(-wnUqNsHyftC-eNd?shP{_b%mDuq}Y&68|IS+Mp#0NaawHkYkB>CA{*Cc-D zxNUn(B%9xKylnHnY{Hn^D7|ySB*W>1d}>+OJbm2|+&!|$?>L;`75&8%6|7qd39^3E z2(3H}9U5HwtwtS@QMs=356~67;4nGjcS2MN$KdL$w0!)Ir!vrHXiNtran*J1{Qe6E z9B2Ke4+h6kNtjCjoh)cO=@g3m6G!k9*Z1>v*yP7FLW5t;z46XbC&w7bjtKdznUjvF zh#ABUJ5YxUDLU;;08!&@`96A-$xnqQZb-3Za)0eSnK)qzUzY26t}M^nvM9&hRBkMm z+?XG~U%cDRI|HT^p?1Aimbd2naaFar`s-uCbkbfU-{!8e+djFxL%|R3-xaAx^_rf& zz%W@{r~FIBy5YoxwIi?%%HS!#AKo?}&+^ndYwO|6nZDj;{r(KtaoklZ^gF{(>L60! zr2iow8vDi0@Ntnt(Ry@KiNlPa<$g~KxhXOVF%JWxY!I}vJ3~~Tqq8O&FOfK0H%0q4 z_ce-BI}2;)SnE-$Js7KHY}_EOm8nf#;&*>mrtkBlDz_Q%sO(M6io_SD+AGL4z~;Ky zE{^|Chu_f@fnX}q>UF2@_@o7;kQbo$h6+EiZQAQ_pXd=kdV#$@+jeQA$4V#>i?oM0 z18IL|98YOB@qanLQxki>pOxh~PEa9!%^9$gvPsEE9?@1Y`VCay{7^oO9b9iAkfz?n zw$hGY3Re2xBgv^#_A_dl*6PRyDMH3OFQ8!KX*(mYeBDOA=rEKn-bYEHEfq^9)wbVD zU24SEVlNg8QN2u*Nkr8OLWII;{}*f+)aXk*$ol<{7E5JOMuSz8rAt>L|W2Eglex&Y^=eswXaiWc01tuAr=sr&A96EF^ zQ=5!{WVi;BMcDD#?DIQ!FDK0|r(x4Le}?O$+Tq|28jNT`DYFz(A~e5^F*b^X*OO6$ z{Vg-PK1R6|u_-MzGd*eMjFZtRyLqm+R2GwR zoAIgv`Y&3S$bNwzq1=hy3G(rNppfaoFhUk~NLEb|mT%`FTeSz7t4Hrib-d}js$Euz z)wtMqB-t@WfpcSKEWcZWp!&O7qMXi*@Iy<4ptaN6b?%o&4|RBIZxcv%r+36qsIy$Mg9Q??HSe3cuegKLr(|(|*sOpj~9A(dtKz@2O zLsUI&0RdyAVinKBY@JD*z-QyCEh@mSOvVr*flmqne6RTgKrBMn>pY(LyKSrWTvmTo zKkT?=MeideO<&LN@syYxK?oz6X%ndEz?S!B>t#EO>#0PZ@9m~gG>VBmORjA?i~r|g zmY?G4DxgZf50d-+w8-ycW2dl4KgB_UFO3Wu3{h%NQ3zB|2#pLom0p2&h2 z{GM8t85^mCbduvK{kpHf%ls(wgud;BByiPZpMFpvf-uPwy0RIB-HK2`U((?W`P6aW zCwx~c2*R%ANsXowkPgFjw4_Ync}l=EddKKM%MhJvLMtP{07GzYp}@#=F@g0ofPnWp z>-X*SewMW3_v3Tawvp@82Gjf?$Gv4g1UD247gBwIr~FE7h#ZvVsL6*6CrAuqKT<&b zvgP-qs{ZAHRxs#Q_)pBzjz305OvOx#4$(%^b<8o%7PmSc{K?^c#MTJ~clU@@zNu>x zC*tZ+RiybhgWvs?j}USq%(i|8Z|fM0AV%zJF$#uoVsXTSoNSxcMXeSdA{#w<4F|Oxdhm-;q^$B?U;1>MHo@ucN-nRW*l?(#+i^e=uENd zQ(MoMUC{RLhvV+Lam!R=G-=S2$^h&EReG8L2w{nk;EJQLe_Sb}$dyQ$sMMwEE|V;| z%@qVwj#ViZWsf$p-YDeP$>4k7xk@^-a3lP*hgPEINyJSoo{Y}9y+1A1-*QLj|pqkRGfLN}RkCbK8I6g1_!y$5wZ%m--U;0nINs6jN zEZ~|X%jh7Q>{8R%L&Li3hTNfN!pp?9wk}W*R=ETD=$X%3GGbmHZ+{Rz{Cw9vzNuTd zQHErj5HS-!?av4*_zqe^WZlm@pauqn=-cjli1i+IwjQ%X>*{Wq?ABupA*M)B!lTiN zBC=`}n-wg9U&??`ptohFJL`^L)OKADMpJN=6u9~a?aSQPEXF6)2f=f-uN#+L>bjg3 zLC?+2t{x$1ZbMAmd zY}26eob*G_`N8A3djsoXl^cwkNS}yHnq59&98W4(Z0p8NL0)bUE-#PsPSA7dClxY+ zH~k52sD@QfNRc!>=EG#dY5@>* z8M3G#r<{Tl%U~~kQPX9s+~wkh7ENP&Rs`)|GIIK+j(at>95<1VjA4o)uY!E~nV-Ar zyeLbftG1mwZE8N98N#K~%2$x?GD$y^!~ar#@P)uPm`E>yTBe9bjDVb~Uj;UqEpgG3H)@pQ&WiY6}CMe=+2a#lSQ#{M`g=S@cj~Bu0Jx9b_a`?VMmZOLJD-c zr${+RgzbYrQ)7}Ds_&LsAX+wER>x%Vd-TjsBhRMUcam)k8EJePqh!!@k|TPp&2>xF z3Ts-Pf)Lbvsm*@Ao`9Bh6(b*=(}lXP*lIMJ%L9~ zUUbw@k5++&gdi9&pt?sQi3&o6$RRM`GO{3k-%Wq3W=09?*sHn(%?+b#fR~lpt7y^XpAdo@4R}~ zpWYjZ^iyxiUtuyDas5@ys>MQu!mzj)wi02{Y!Ws5q9o>hFW+8^Wq#=QZNPtuV!6%- z`o4a@hVOA+N{B0t)0mh@mFW71b0hlhet#S_VjQ_G=h5)zYd*E75dddu5%zA_?hIIzO&9SO9<@_A{_FN~r1WEF2EM`4XoMI7USB_e1J0cZZ0F`{(m|Ml#*H-e!~45Y5_ z^9w!6*eJ-jNU4&Znwn>-d}Q1GAm%?LElJbUYPTmUCV0ZAO$l$f&@b$ApXyUaiFgvQ9s*S2dntYhESbX~mC;!%W`jDRgn z-Une1sFDz|H)poN)2~K39QM7dh2+NCR*`|hx?G)vR=T*jXut=`6QssFt>!|fN-cny z=eek6`FS1XuQ3Q7=JR|!ZQJ&4s?8;D5p~iABn_&Eq*&4m^FHB@{B4>`J}FtDk?wbY_^5vq@R*dZ zu8T_s=b{O-+CS|tlXeJCQB4e}M1M09)>$k&FVT*|60Oa);L(TfKxGgBhV!5`nPh+^nAJ1)c(<9p8uzM84_EGQC%-2;%%zjySWwY_WSCKuvV z9*w~S&To2N_`EmaULoZZrNXHNar>i%MwoN)TsM)7!S^*QU<&r89`pVvCq=u@w+0s{ zwwGIgf*CdigvQ-ta5y8^LHmm)WDq5-Hot*veW}*AoJXa~4Qepm2ZF)C^FGd5*Y<$_ zqF2it!!zZ8B_-bsHiA7L&IWtH!1epQOVjf_ixfrK-~RowWq=|P{;5`Al=0U*&&PFH zRXvR7DYwCo2Jpw}W##7)8o`_Oh?9(jhC2HtExH@}6(&KDZ>+wA?>cEZ=m4=1#B;&@j*Fi!Y6K%ZnPbl&k=; z07ouDLT?pZOm-?A&Ps`HsQmd!T0qEr{L!K&{Nd62X8b-;mPTLQG#WC-xEFg)kQjOA z!2SpBtgdQEODp3};X7nOS+M|Z&?w0^+Bqcfd`Fki1TAX0{sp3kF*U8a0ElrswX?JL z0Tz_0-9B(Dq@i=Z_gbM(43*&8B>qT*`JAVUdoYO74c2?eNUM4z z+K!Cs?Nc$>O&KHLO7BeE^X?cl6HNuV09mozqS;cm=AB={kdU1>!d5<1caU0e{Sv1U zEl~XrW`1-Aj(5p&3C!ZmY52hxP5Z3FIsCja=d3VR!SzQ0Jpkyb=`Q( z;9;7%bA1iRAhT;_SuhnLk}Q@b+iVu6P&*w==+vmXiZpAeCS3W}zD;j#i1z&8b&fJH zJs)m$;(@8}arP6M;h{RbyH7*o3kuVg{w%^rD-hw@lNX~Z0QfeXh1N=y5PCRm2yuTD zsnB6DJyXukXdOeVqWk24c2vO)qCf?l)R`DnXjP)J|I+y)7zJ(-wZ~c5Fk}TInB=_4 z3?Ojpgw!lwOjuNRn!?|1J-ghL>{|yw&Xpsi4_a|}!9ii*YK2EouxPe`m=)~26EE{6 z91MPJ+D%LtLgw{~lwBVY-ZZr_QS3E9o+1W4i@+QYUs06DEE!)r)}*-)fO)%Sz-W|x ztLq(PeT4By)|p=9e$GGjqUgkrCJU~>^>JltWLpjiWS*i)y*<9{bU(0|r8KHTneujQ zuY5=E@uu2=B$(M8Nl8dsM4ZBK(5gfRWdjX&DVDb!X=<9LYpMF_gq)XZieP7rznwrF zRI6301XLbgD{8BI{o&0FSB2$)rBLUJM~MQ zgsNM#1QFtz=9$0}N zb^r5DUO*@EIO5>ggTmscn>H5*HR{6`W&Tjkp>Jo>(~`F=C7=WnGJ8neLeSr&JX(c= z2@l>B2O`|zxyKhCLL)d(KPCpamXXi2Ng#Ax$+8j%{;Lm0Q;pbE%s@Kf`pu1bc zb;o+XMU-Ig{oB(btCz|3(qQr}Kur1D)DXP|Jx#V_4pA{&j!f*1L<_4-255d9r6lYi zG#6N6ONlBM@vP{#$0UedM2X1(jCMtb0}{t`CL^B3rTg~Zhcg~k9{ z!Y0y^x^gU$l3AbCbHscGEBs3Io;G@`tIr$xnVA#|rL+RtojYppnZ)u!LmT62NNj zRL+v$6oOd4>faQs4rjU)~ddFbEuG5p8J-CoG zIkIH$erQ1K>rumd3@ZwSFI1j$8I1);@vqyF7Bn!4ALoR08kUWWN?Sx<0thw!(-XfW zJ1VdO%9CGvQ2q+2_cK_fs;bb;^z^0`V7OoUK>k|ge;^t`%aC^k4(pKy1$0M``O4Er zmOkt!Gi}HyJjwAgfcbTh91J5I5kLB4_`g3_kAPEnjK{Mn6JN$;zUt_(S3h<#{uR3KQPNH9^&5V+Sc zxJ|8aczPE{kuyTHg{dp9zwXqitil3EB!ZRU34|q~sniM3VS3Gv zUSR%@i@l@$2?em8EK=!EnxFr?+tsC4gAKtp^WXBbSiVY&mdtw2p6#K;3_6H}LxfQ= zL-1+g@xF?Mj@wB&NXVL;!O4`pV~l7)x31e-ZQHhO+csC*wr$(CZLhX%+qQ2fH}~dz zJK5)){iBlkt5TKBkuj>?QSVdyxq|L&Xsp2~n*q+oO75`!PE8&jdvC)yi_adypB){2 zw@20F`P=Q*x*;Z5Q_wIvjTqO0Xyn*%azWZv6Q7}fuM0z_T@CTZK@}0yEJ3c}N?x3JiOp~e}^#)MpMIh_9hX!lf+Ch^ZK$KTreM`T(8 zhF=QFI2?&R!~pA(`=`t|moa#5ZCr!iKHkVcCE9F_EWDGf;=U@}>oJp@RQWX$2$Y4) z0~vDN@`G~Ti^<0@-JHnhi#oR;Ov?Sl`R{QqT`=9HT#!kKMz$4Oj~6&2A?nE{00O4c zd!j|vShO*&tLd7k7tZOzghpP{K-^8Z4eYFOdK>K6I+{Vr1qCEX*!B!WAgJ^AtS-_64%Q_9kg_K>~FJKvGkltO1XP4{yyto3y(KZtXVoA zEQ~+mEb{w54*`=jrgQe$85zzCJA3;4%t~`b^#e}P{6 zUSD|CIOaZZ+&9W8?d=nj5(lrZVt;4Qw@R_Kf4gtepyL`CT73#e$M&2MfDI@S#OUl} zj2Yi-a)M!eZ{3Ld{3$%(ljX}}{-V24gAQmgrp1=8a8&{>;#4$0R0j1RCfr=SqaX$= zhM|UIcQW*x3^0Q-I-K}zJ)@hKx*p`@Azw@xd{bdO_`6ciLGJ9)0y!=na%$^$FbL_q z^3&ZO=cu@@W7Gnd$?UX)vv_QvFrpEuVbr%w=4NA7SI`FN9!anUUuY_w!I4g(53JUq z>gP_opz6t^t5Zh5@Wozpt6xSS0e(BV9NSw@%W{|b4{AfRw0l>+4dQPysQM*}*ZX%x zLNU|Jl=HD7s!wJnliKS__BFZ?6%l&TGjP$z{>teBX-DrNV$RV=BHo6;zOsJASOoF| zLQAa(ylK41^{av}f|X-ep4_tS&%w4R;{h0b@@EcRjAON4{!p{)CqSvCn?J5m1-XrV zy&!lGy2G5nAP(zWSAhA9){3X<{d0I@F^Lb-t2Zmt1J8o47xBe@PiLjWY0^%4 zTws@LgYQwhq0)y{z@S+i1LNLqtH8H!0XppF{Xg?$LIx%U{>(VPqeo}BhBuT&?=(qX zyanQ?uJzu}UgJ3||6oN;T1;RRXcA|YD^4vQkDB5p;`sp`GB(%+Kn``Vklc%cILD#{ydOiWY)NO9}r z(YrQ-;%1Brm*&-7Mr;wFCNd%5Jt$Iadr2me3 zzpzC)nC;(m@7Rj8FnRfoGzwS8pAP-#_;{e;?l=Li{6|=Ye|~y3++c8;O9CDMa@U{X z)~&4leq6wQ0SntSP^zT(iElK8osS}*a`uGT)TUkc8{KqKO?MN8DRZ{qPf6RtC&OF? z)^D;c!|j*i!ei3I7q-Q5zFIf~rU{kOh&Z$2n+3sYuMIjt^^Ror$^o`jqAQI?Ar%~V z&89ooZYYo_#ZbX5OnSIA%n+J+Jp>g2+ep4g=uN*ocbJ6<6VLd04-#%AD7UOQS;OPDEcU`6!di9WtWG+Wel-7bEa0Srk~ypang zZUyp-?#(1uTg$HV*Hsh<9|UmdE@Dzt#%cCkB4z{!e0P+JB8CRM;rhoHiGcmLJ6)5U zb1KC}!rSiy1auCmU&o|v%|!t{t%wMTlwB7~N>?1YR2)do8JBzTXIeu#+p2)VP54e? znj-gw3mI9Fk<@Q&HAA!$;Ll{aZ`rTa=(dtc-BX?Tuw83#Vthb9>a$2aL@CC=ydf!G z?(!|2hP>Z$lD6ICJn~SaIoEmLt3QOIApWS2sMpGa);iRM2xNR*x*S;`|Lj#uF9DA4 zJ4#9(@C^Ak@y17w-rO}SX1B`=xIIC`EWuR7&KMLO) ztZnP~p3kTXotXcghI0kUBNxf0IVJn;n*tr$w(OQ;l-TM!%KFsg3XK!9h+CTMHPhqq za?x)b+Huh%G}H-i&!1Nfb3fiCy2e8tt1qv_ABcY1$y}ZgJJmz(2%2BY)+6-qY zz-z|Tpn?m+My-k3%&Fgfh~x5J&eR)=ql{BS5nR#h00s%G2hbhHm+z?EpVZo##QC$s z0St>Tn1Iuyhezf$5#^5$&fj3Nv}Ixy!(UW8I$UznLJo%jEi}^^F}vMKnU79uH4Vk} zxF+tFuBD<$06(Z_Y{b%OSNQeFBkseT*7&m6UNy zrsU6g=IC927(eYG0^P_hhbw_aCq9-Zew9fux@Xhr(fg27)9$J*eK?zxJ%?Uo>!Ppk z8BX^`A>gQ(Ol^^??s(T*Xxs>6Pawp!`l37AzKo@nM7rM-XgyojEu14(+uARO`UvQq zeRC3+J*ie6q(vHY_l~7=x5&QEcK6aP0*M=vSa2LE@`x?g;n?Sljl%7vevJbP$}&Wu zfimim;Hz;gX{&M{*Tm>x{87p*%K?;w_N?kSz+?Pk*5qDO=5-dk2}dq}apZ4DZ)ZHa z)&eO*MlgwdI+b%kiu;^QCY87fQ^}S6Tpqz-ySFJ)ZY9rpf^hL8g~4zS{mIL{@j7vk zV}nm9KI`$#4xht>;wskGa1yN!dSvRTv5VM9MbGr@`!!gjVR}5~wSP5$_(m~lqjo7- z&(cN)b@FMf>PD6J(#VV)b_9I7{$Z;*F<_5e)(0mrlyJXn47qE)l|D+k!=o}asKt0* zeqg1hLvih~UC#ZI*eo69662iZEM>L(M5(#|aHT2L4ul}pxqbw%VRsP8MQE-nBa2lh z_0Ba^@$120+N#y(sV}-N~tXn{ybky+B#Kd=t3d4wx_>6T~H53;+q*jclQ)y8ox$M z3;)vR%6q3fGG*j|J9VJ^w#N1ca5fK7`Q;1+iXF@chtQ}X4+(EakMnbC)#x_eT8@Sw z;LR2e3)Iyq3e((siL0~@q!&W|FmKPZ^sX$Gu1>eSK$8*0IWWTjE<@Feh3v|kaywUi z${eRFJAJym#`4cOa1T7;BxvvQAPx_hi7YP!OTjAu_BG9=qqxmVruacJWMV}+WrA`4 z&N6FX-d!0lFYqHmr?)c3RBO|rz=(%<9kkUd-n1B>8i-u|L&Yc!lx0p<<)lvYorZp( z4uNgHsxGima!!f$$C?>yj(-cwYJE(&r_Ce}5U4$4yA?$^!oLqp1zoU8o>8sR9R&8T z<3Zx9DCrrOi?}by59Kk*>$N8Lqn-8nw72QRnCTKk3x@#Jf@^Rt-q^3Th<3^9SzmS! zY?o!Kv(7+RcjDxE@x!as)a3DXb+~2Uc=x&Sg)Y2{H+ic9KxT2B@H1G-tK>X&MDo7R zsSOH7JADeiBz|n-pc>6VJ%e@Au#Fb0KGoT6M-Y(_AAq8O&AvnxQ6b2KooS8drp@RX zO#slHSiH=n{09}!&h>jHeH#k_jx*8VSBbEp!ZbsDq<^^gr?oExCY^XVkd3L`I5 zs0$b3`A*9rUizIF(-WO}&ipfwr_LjfoN zI6%YJxy3$kllP*ZZ|JNp@YlmF#d=pj^7gBljqe^^?%&MGvW@3GZ7723VwImF2wkff z1TG`(F|O3^e|!CtzDrWk;{ReZbLkuR;$J)9T)N+<=y^5#tmr_PZJT3>>c%YEx8r&) z;rj=L_#HYUO&qn0n_?hE3st7UIB|7j!$%{n7jVh!xS<_jxVp{YG@X#s#TJ)bzt6_I z>+U|(tcx9%bKQ$+aIKKRI0HwGKIhjjSVXd{P)`sS$At1`K-tBf-3q$L@@MM{Kn)vu z7Rm&G(m1u@G0}+25+6ApNku}n2My#mO(8TAiU+0!T{!!w=4FOmrs4bCYxS-U20Y;j zgt>n5S)^aJ+*~+WcSW(y`{plDU!=AOZ{k|d(;tsQ1`tk`tI!b@9F6z%rOMzpe_hJT2T)5+mA6b@1Bl*hjYeZ2B?tD z`03tp9T!hkTwE|$`;$1TK(j+1a?SP@J44{)IJhTRpG_wSKVz=M5qEF>g)wi=N(huj zEKDHTdBX?8U;BZG+@Yif&1J=mX2_4K=e@XbPwoNUG>CdKvrS_W)U%4wYN~#ra657> zlCU*_7;f6P(pBs@f5KC)D8H@D%e}FWZQQj&<}bzf5%&R2cbE@i({3PcJd*U$q<|QM z&V7ScbhGdv>k6&4L+Qt#1CLJ1pR0x9G}S+wyP(ru;rYhPJ%*bXW`0tv_iXuviB%bjVWmVlr;V_gBQXV`WC+NFo#A@xFQBUshm`fd0np z*LZ^JuGPzHSnzc>CZ)7w6zU9Vm=0~hgvq7ianr|ds@*UBvrDp)Lvn>}si%T}cL5J? z-1-rg{mSVSs!jPV$3VXb^pCQxU~Kw;lk?b)vIM<*t~Le7pv1G4G)?&s&DE0UkiN-* zlCjN&bj>(z(<9TEeM{oOO#aY7iK54BxN$=Xuf#j!_#X@kGRuI%0-eOFlgWx_xEXm` zGm6zaO!1y}jxuEuQl-W|G#~(z)O}i#=RjAl_vI-=kb2UFkJF(_a1EIi(>_? z!7+nhFG3~frs}#_*alVm3Yi}jF|lwE(;jw9cUCmC1KBe#1XvCA{MuIKU~+4vx-qBH zg8;z009{d-F}$9})d_QTNtfn|8||a$8apuzExpg^Ddm#SWX{VW96{zw?6wB3Bj)xR z7v-OWt@wpIz*^nw5DP>Ks&>#CR$N!D+%2U+2st6%Dj~;*RMyeo0b*6&NZlP6m`18U zmUlay3}XU2RPV%^`Hnz;Bmn>DUeqlvR&%%e1Ak--oXPPNJ5T2A90xj|O&`5B3`0D0 zlr4O+w?trS1l-PpDR@3ZB@OFTuWnQU#L{B2yM9{_*J$yN|K*?AtF6N^H*+nq6o^;b zBmbss`Mx$@J}(l!y%3U3K?Nrw=^q0s=VRs%C0a{eOJ=hFb(g`lY|@6?q3+pHfz5OuJgJ)VSDV{58~cSxJmmb1mGk!_>2` z2O-=IZ733Aiahro#2L zCW5G$$nA(>0)#P1l!UB%USr(wHp3qqAA###Q2g-_z%&l##(xn3vHpDeOWN{X(RbO~ z&IJTxt(!i}={5RuosF$aPPLDc$rJ!4b@MX@7yTf1kg>kEbY1$^`gaE0B%*!?E$Etr z#1DfrrV%;8eZf;0^)v=aykEt7MDDAA(xsI4l~+nmg}2Y(#F>0^E(pU=zh=i0l z_%3St?M#m;kL3jlMA|?V{TMjlA%$%(R%rbe8L&KD7Gb5iDiY{oAJotN6Z3^gx#2us zE-T{dW_lD;Zm6UYoOn6Q>lN-Y{!wS+DMRpgCL*hIq7Kew+x(`?ADrocml&KF*c1OHHH$wkCm)kt zm3>+WZD^avZ(<`s_Pl+{$GRc)qGB6>F32ih`cE-dZ@6lFyicL5cd*;iUX_b)@Szu! z&YOn%8csE<{Lqxydnjd-IEdxa9N=515Qs2r{C>jb>coNetI+-4?aHK`EY4>|K$$(6 z+2~(C+n(-j-&ei3Uq0SeMeGIkATb7W?tuh}$)%6pyVm_c~lQkVHQ zGO(qdRX~T~*I&BD&P6z+SKIFV3o7QThS>eNvwKBFG&E`tk!}%9#@j2fSHfLnk4MIk zauCHyfUjXS3QITl3fC)}U$s7cmqBa3lgB1xyvJr;K8VhGr4R`%Be$W=S>8V3hztiW zH>a3F?1fEx$^>wMPq$f9|HRxgC@?zvcYK|T-uOe<0nfrj*0#Yih06v<-_ z0j@H>`*2-1@)-f05tDz|lu890kiw0oPF&edgT8CI)rC~Figm|WkADFElgBWypLt99 zi&Xgo3IM?TA7;IF?oMX5HhNa(2EUHIMmG91OtcL2v_|HRPBi8=Cbo3a5<()fN+Q2J zqGrV@hYeQvo&yROhX_-2l6p@IId}+(G{qtyKUJq93G!iR2{-Uj++J^2f_Bw&M>^KQ zt*>vF)DFK+y0_V!fZ%y&7s!lMSGnJt)2pAVmxqvwq)JdDpPQSxKSq}yKt8F+eRw-fPCc#kIfBAq^&-(AtGutKlsb(10Q7HR8pi4_fS@2mQI;L$ zKe4Drmm$m1F2m9`d=~sQmGIlld7ZyL(%)bhb}nM{-8Zs@*#;ji`L*ahBm2;XSXY

Ed|hU zFBcEgq(c2QMe%5|4*ETXq(e_Y#i-$BA&FlNz49&FHxYu!Hs%QSvI-wE&VouF7=rCw z^jQ@HYt&3;k^#JKl)dSo6#DJ~Oo;GnUBO6Juz)i=sDtMFDuH@cMaPT{EsEF3YV7Zo zC~waJ_D^IXs`FLxTRRmA(F>?_F({ls8^$L};+8mpLHsIMtCF!ubp2*21tpCDTV zkFY++QX7(v<6c$gl?R(Ee(UUm@zE}d_5htimu6J{7Rd64go$c$)X|tI{A&?oep@$< z@9TtYorGu0*g9l+$sX!I3?!++%7ko2Ctt~i4rR5IY1`r2`@jS6W+9bAF8z!9Vu3R1 zK>@aJnBCsr=n&e3`p6L1#I{MR2_};QY*N-m=23pmI%pJTG>hGn!QW8hnx##cG>k^{ zSz#E0f0fmTw~Y&pA!SrW$(Jspsw%NIZ*UC-e#u^uNj5qpmA~{rSnzT3Kx7}#kLbRe z2p|~=`v`tRgLeN)*24jSsbn$LaA%5@g7H5pmV#?iG&Xi>h{@Fu31%j}#9%h}YGA=!vn)vgdY1dTva`4zvD^ZdT@@WxnIdAaiHMj#E&oh zN6(*XtEE<-WZ^BYy=zVI&ByZjsSp>x9HUyq~Kl-U!JJ1Sq&W`m(j z76J`hd6L^UAs?!Ixd;h_VQ3Gf|ArXwKGGSWdAn*f_}>gX2=W?3xWd)$K^7!woHIkWxE2j*f+RutRf9_u1z{IMhs7UFIyK>-+|Ds5DC&)qUJABk6g- zLO?cAk1SQ5A`;KQUI?+=H)XFeee_4SXt@d5)%j-b^cuCAu)14D;Yy)S6QLbUnn0=& zS$9Sb8LWGUT`YtDB^0u-MCUzNXOLk`*-IN%LgNUIH5rs7E1|qy zW&-3U{{a1Gd`to0`6>R!g~IQk`ya)Jnz)FFG}Mf^%+wr=6bR?{UXz@gWQx9 zjU@FLU4x?d#2B>#{cZu3n1!xj#@v#x921OEba*0DQafucMvNGny@zF`~ zIq9*A1K@v2og;Xu|9-RPuW>v80Mq|yc@nZp$^z2TB8pU_)Vo0cW!iqdO+!&Q0Du}Y z0074S(X=um$^yay$^u)Oziq{0Euh+tUwncA;^PSw-_1#pRWI8>IlgyvJsE>*z6 zGtO!_oqc*AlpeH~7?Yc^zok`FGxy~;V_gf;7}Y`rOM|1=hR) zD2<}k7#H-)m9aCm&jn{ysc!X^Q_^MKf>E%@M(9K{=gP`YN-!y_CSiwCInhS$1r5JW zpt60nYb3wa8cAo8vW81Ccw%(Rdo7)cFK?ZKqyO&T6?VVkbE>kIJ4qCUih*V!KiyiX z1RQDVEN`R^j4#hAkXA1#RaXevSJ5h)jAKI$wWT;44(;W;;fL%uF`6gB7h89w8Ch84 zNoW+o+bkAoqJ$S%=b%5{e>Wc_SF6y9n%6*CUq~(=ueX?TDg+-5(T$K5HIHliLH6)r z;DxSOYU%DkqVTEWTPbRQYux_Nz^=7MK&-EQ!Fp?SIKIjU*l9-EL>fVP)kNG!xV5@I{cs*zp6 zIh;)5+-r_vswkNOp)shcfEo;1W%ps&?(&{lmA)vhTGU*{Q!JCA)IivDy5tsnH67oU zJ$0^T(lHbQ6CMfM7gAtZpr{kS90a@bzDox z)LhG8<&Jvc{rkn72=x@V?2C91mU*Ec&qi4uTC2wsICfkI(Zq-q=B|_aZ0G4&a^cPt zj+AIiw_UUW^0ARPDc#}-;a1+_>%qwD`F4K7kbjO@jbw>MVyD_5zXZ3i(6m@%i(BCpbv65%j20)F3(Z-OryD`Xc=`dPuU!kZ-1mz)uX>uR6&Y zkJXxWRE?Z%(0XC<^EVUZS$eFfWv~&1D8rGZh=M7dKBei|UwpKO^p7_=0xw8=LDm5F zjWNxx9=r*J>A@2&xYggC310Zb64Z%y+2eSDZ^(JB=1gi86rO->6cX>01+3q;POCce zmuJ2$_gZsv1mdlrGP$BZuhN->_TNJ6CM@ud!F8$1i!${m<{T^CA-JU`MAf|-(XjjNi?RzDs> z==|xDgh#<>CTr>OCX0N4SGFt*P#wncN=I1?2iKi2-=Esa40%tKR+4!M(Pd3)8C2)*JjmY8DP6H&MAm zc>Kf9%2qz4`5v+~_r}50pZOOU?c6m2q4g!h=%wcS>b$q+`{6vZl5bee_x1Xw_WPq# z&-dkNsaN~!?i@~SXVVfz0tB2lFizI>tVTMcT zTst|Z#n)JbFscF2OkovB5fG5%J@<(kGG<4qjGN;CU7m!JKr5ryg_o9`NIv+#awMdWPn^cPr{|gP*@l@2{ah1!hKj zWQ&-x%Z?YocYy6rfBN^9HpFn6Sd)aYi+x zyv?ARY+6nZ8D=#N3WsRiQdQZ|8gy{y#cj+v^{9&oNd(D51&EStb>uJ!gNj835v>6W zw2wR9^sgozbavAF9!X#f8Af!q*!lM1XpmF>)Rx8KB3euS!Jg0O9Vnj0MqA&XtDA&& zO8x+^@Xhpi{7^%)@p4!M{IBK4xwWy#Q!^(I2UZW#93CDn&v!|$_9dGM#>OCUEO4+I zc|?r@;tAmr3pcFPT_zR3QfL;KKeylhQsL7}7Iv~MR)82`ioXW!l&K`fBEVH0!0e3SHlBrlvm-{pRLbxnVksJNu+h zJ>$G_`Tk}WoxZoHRTj#4)M#B%DbQpe4s_NLFQkWBEw9)OZ7!4r-8T;Kk2Ea#P>llR=Imp@T*gzEGuc@_qTWawQ)(i{~Se0V*UIZt0p z3)M;ux=2`izP3pF<6Sc|767w*nOkiKQ7zfP%3l1d=RIhFYFmv#Ty}Bo-bZgqvL*TY zWcXHrK`s9-I!5I9R~sXljv1MTYp+kMlVe_OGHaZVSKidqw+e+@Wd*eF36N>EueL1G z#hWZM{t?hCF=5nz(5n#~=XbRb z#;q>ot?O8_4fDy@=EJHR%I10H)gY>HjgY337yk(2095U7(Cmoe(05Me##B|Wq%FTU zA(Qlq8AnDrlu` z(j%8Chd1w-kbwIW9pz^%|LjqJQXi9MEip8=%97QRo~K$i=NPgSRi&P0l+XnMT`jFt zpSe)Ztpo0_TV{OP*}fiLP?{RPU)~-4F0&2pE})X^U#hC8WFehNS-1MaE`*M$TNP}0 zsFU?F5YmU_i%gjyxxnA8QjV74^pGSQ%uXJlk~9krug%M*BGyfG$P;71;TAPvbBLro z?1Y?qs_a>TAUNC)4kb1|hCD;>hl(KrTRh-Zutgv4AXZZHRL3ghx09tc7{)h8O9IZ1tx<><@B6HM2x!&m$+EKm7vDsJ$0U-yLRl*X!Ep+SuK(Y0p9T z6L(KUJM>6Pwl+H*WN3Vgl0X`SanRw|`0f`jA@hUVM0MTI=L&+1Ntf+x z2&g9&8`9KTKSVQl6b-Va`7Elf=p0gz{Dv&9B?lFB7FWF`Qs~73n4az&s@_l)$|yT) zp}T{UAf_O#u=;c1 zTRtA`7+D!Y!NVOg@$d0Hl#1REm~sX+P2R4)xo0G&AU_(wd-hV6GsgmcVl<3+ct&h`*BAGJe7@G798LTsyg>V zLPph$D%eyZjL!HIQ@F&8_(}*F zEx4k3+_gjpOYda69AOx-7lYL!1pV%1@rr4vy6_?*Ma?l0*P(#x+T-;`hgw=>x8yf$ ztQkszBeOK8P2xiQk~#NvUFSF&Y~umcdpIAPUeN$jvmF<1C|2vGTrZAo_5)IFt>1E8 zf-+%7B;dli~JcBnzYNJzRdEsV4@HC6~qlp zB*9x*eF44Z99=Jf*h+#WyAei@DWG~>XI2p&qf zk%06TuCYP^3Bt8zFzxa`4HH*pSbBPv{~p{lg?Yq1vq$XDtAx_aRsR%wF5aLtq^Ain zA&H>L7a^+_wFaZ@@?sEp9cOZlgap>^!n_>mUHk!Pmw5Z1!YOPt^xU15mEs+_%~zeR!m_&?-COL>3N>+bMgE|W1kEp%lu`^7hP$>RQ5c3F z+KBI!h{D3attY$_Pyg+I12Cw|fzQ7YAo7?1RB(la9M7wF=(ybG%cm0~oeGt7S|TRn zKI%?Ssm<-qr&`)j`vUE_)hqqR$)`FwziF+obO!#$$F)bKc5I-%P1N^+f2$84E`l$pyJV(COE&m?bXfe{S7@V! zH~vtB?%%LViW~vbYoI6|>XL+VMY=THcTcwq6-iLo&v)t9AJ>ty#v|!mZ-d$j^U{)k zI1q3vP0%bn+#Q7Df;^X5Uj1WN2&cEO&cf?{Ih8--cAwZQaA(mNrwR zaMzOZ$KQhm+xzMT2Ia$=F~6M0`*ytMPyu-pjnQhuCUzn6fBSshpZXg3VA00jR3CC_ zPJQ&SlY41q+I_Rk$y5#-QX&_=sYsp6Y9zEm&_UEdE;!wgrTt z_8yOW+r?Km$1yq|DO!i^H>`Q1ddck~8Q;ZaddbS)#ZMQ*O96vqlIm~j@ocEMfJTj|Ji04RvSu3{Rt})zl8PBV?m-XDhh6M0yjm$PRTr+ zO&>R}xvZILh@lqB`^z=FOEA%z1(nY{y^VwyX;Gm14y*S^`v~J7ff?PW#$|=J-^zx~ zuPcv>`=*ZqXCQ|uaEOu0ZapC!IFr`; zNFYTA{DgE_DTH$Ea|1A$cB5jz3~fLSIn#HS^(WrK)cFlN>?luM=+FHq5*ba6>bdK;lKm+XyfK8YlzvIqe=hLb=wF9wC8v9Dm2(-bjSczUS+I=wMip^QUT;hB$J!CKx5HnX6A3r2%2^mLKER%X#r1 z$7Yivl+u;PD8EE5L;NiMdehq*V_pK=>EaOMRrT628gs4fl1}SSlO?=Wr-g0Amp&VH zh(}y($b(Vgv2eFm_#4tXC-vOfW@bm~t*(d?ABxKAiW}1c1MG+MChiSN#|$zv#}M_b z_JJ?;RHXAo^G^H~7c{-`HJ}o9FumWZA@=H-L45@S4P;r9>1jFl^2;HWA=Vnri^o9lL|;5ePB~W?Rh7o=doKZNuN&B-T1(AIBhL_p^tdR ztl_F8hxRUeHD8)yBt$%9A~s7VE0@YUf^zNH*j(4VdPX1fuEGlE$!ya;8*HcJiMR53 z_b=V#R0=VE7LG4cwKe~{RSM3<(o{lsrC+>m|D^T}c&t)*`d$N-xqy@=a?R*Vemt9!%1e$ncXqfRq z^>69==$HzX*da|f0wN8Xs0^n&n~gfq2<`JRO!nuFNMv9D(=+F-x-#Ym(e}k8cBUdZ zq<3bcV3V5vP^Feg*4anEP*1x$ejWcS&R_}!pbMuCk_R=#b>E@#`Dae$jJ_G?xLdb= z^sFiilhZ!vf|n3lcLBsYF3Yorq|0Ojn8J?>_gO@6-6ME;@Mkl^u~7X})Bs5BNR7dV z{jGC}X%-%gT=v*VUI>wa#chMei9}5usoxLI%6T5Zd>CzCy zFjncSaD{Z;nWkJ}4FCLc@#0Kc{BgpC#Z1LumQXg$@YJrcbaZP|8b4`pb|lKjcBpe< zzueGfR{gr)IUI?TC}@8dhvOk{00fL^O9LLza`4;dSz&Jx_{y_Tmbo$tJ)cpzt7jC= zPh6xts35*3{37o5J4V~jM>N;1XDq1xtB#?C5AZ(|d|6wRkm_$W^Goaf-$)q$U4s9= zP+3OBsU@aI$0nt~B+)eijsorgYu04WV)68iWA>owbs`#7fchc+si^P>LBj>>IDY0fZMK~mNwpt#zm4J#^=`KaWw zzO}TJ3>q0!?^3ZNsC^I|x0NOr67`H4DIS<;qFI$Ovw2mS(x2`^Gs=`fsu@Aw&fpOb z-|FZ2!af!TDQ7BZ9$z+V!n$@LUBH0>f+*X?BKnw*Oj3@MB2~lm^?COzv(VnGN(;rU ztdI~T{h(+}(2RzF*jtCt0B249+_K|TeN!Y_r6#^P`0w=XsdgHd20{1$C|IymlR4CC zp~oeDWHk9&xSgn8o%c20z@~3c1H?}S-GFqPz%A@C*C&$Wa($mlSE9ndV1toOb?yG1 zAp^~7irz;H(Z!e|p326*E_#Kfm5DNGiX4>1ThMs!74CRH`Xu$)z=ukplAfm&ePIOGaWEpv;{_ zTZcV(o)x51QdPyp(vdW%4P4|06^-KYLxk-8!N(DrshXMrh41va4Zz%C)dEmw-+EWwj;>EGIKaxRyGMIzo~p`h!a_LDi)7`dPe||dl48?pBH1JNSWWIYpm$^(6>D~Mpd!9(n6T3JP zTcDUe4e``}$u#ADea2XkX(XhKYV&a-jtXS+)kc&@*p_ExG`>Fdcqk%P>uLjzjbh?G zRr;+53Q4)A20KPH5KljJ|Ul}K~@Vd;J7{fSFeOg-0lme=q+q1&LU6)iDp#* zXAUAlu1hCY71Qd??T-M0UZjP}C63eBL}bP*9R-RM z79d$rL4R3C*r}7NscQPN_K;n=(W%whxiO=AdC7fq-5u35U-Dz;Y3k~E zBQohL??tH0XH)d;`ehT2cI{u~4WVr`&O1B(rhGOL$^|ws*8n2~04Y@L6Xi$Qvo{YB zYg&M`M156l^RoBc*g{hvuKw{$EH4$TXj4rf0NoaUX-U&odPy~CShR&kNX-z<6X z=<2RofRxv}=`%hq-ff9=@9TUt#wqr0g4Ne4T>c)cf|H8hphrbhiK-2k&g-+{_L&+6 z$49us${&lj?CFwJTMsEgT{CmrfESY7Ip(UQCNrPljE)@vvpUHjgdre=K?oK~Y(d*r z4FYxPaTY^jhw{TC2m*&5gHM-%X`M!n7kW^CdV9FK+DcxclNo%F$wA+fC_c{wV z7DEt^ob+Bon3=h{o=^?*K$WGiG}wXhWSC)6inGSJ8zlmi^oBB!ppn=a#)F-9$^&gM zV4*)5{ziw$z{yP;6#^a2y+-EfVofc*wU53S#A>Om2J@|asTLdh)=q`7bMVR->FRah zHkDyc-rOi@ysA89PZFD1K^~CbMoJrTiy-UmXd)Go{Td{&-w%*yo?&WNR;sNm>uIfk z-#ru0wu^&v%Zvf98(jCDAwE4;p^ywy)bMd@H7gRlx>mj4rL|MNFg5va!yQ&IY11@7 zP|jyge!qS2`I=!FkH(v4i+}}azv~X*nNSoVA02d*+c0Usm<1GYWv_pu_AyjhU@ZJm zWMPSos;XR@Ou&tXF}GzYG;wrP``7m>u*kw6LQs|ht2g;lB0xJbUe!uU$UOD5upDQ2 zYu=cdiW+;guI37))3|g_Bv&_Vi26S%=gc&WO@2#-99)qZ*`Vunk9; zZ*fJ#vaBEg?0w7~KIyk}dHJ#VWNfB~MRx0}aX6USjS^>5EnP<8{Im7GKNq<_X2><= zY6UcV?zAXv074E$-`b=&cnwIwpNMJsAo|U_)S8G5=kvC2)kF=lD4N;E1p51m%@}ca zs-*$>s_tQoNYlCgmTaxyeI0ZP%H&*9S=3u$X2`2g2%!jxXk^lBbL z@+4kV>|7!!Dh}tU&_yU6OaEZi5?|S^NA12Gm!-nPqL^tF33I#tvL>skyk$|Tr|!Kq zW>;Hla3B6ZR>rHGV@w1A2NBB68*BLV`_-K}(Y51}9+454(7bayvMcXxN! z3^2@a2R-rr-gC}-?z;D%yVhN6^L;-1v!7?PpZ$&fz}lg1hGATI6{&ruR>{>B1?8Sv z*&bufqq*X$|5WGIq1iKU;p=>MQMmm1I3Z%L;A7H(FZ^L+=|oUaQN9Zi%Rn%Bfn-ei ztR#H#n%pHi9NUf7nAS*#A3DLe+`!ED-?V*k zPYIN>`SR+{SKi^GsI_FZ3CSbPMO{}&dtOy%zHO+55D6U{q3_VQAjWj#I3l^2FH%y^ z?Q;DwH}%e5UJ5YXcOM=nXi+_o@KxmG&A1@Y> zDw;smryh~g6Di%6`mc`}e>}sAV|u6%=BM!mv)!V4Ht40P=M)y1(znK<(vI!%)+5{$i#ctErWP9qK^UkM=A!sI3I$!PBqsybcPBcudX86`J?((cNP!q9r0_ zVE%Hfa+u-6KO~23>GwJYWH8D$ojkqiDu5uQg)>|12jD8r=;JpM8_kd2n1RL03O=cD z-0|#)zUXpr+5GPIvU9Bb?TbOrTHzj*kEi!73bo$_)DIEB>ggxZ$LGtm55j$!ok*z6 zSnD|AS`j!)dKU3()h8{Nt~goouJUgMfc__j=*r5(!~)4Ng-*ur`%@d;9nj6}NC+4vM7LyA zGL}M%{lbghlDy`WXyVH+1xB#A($yPpL2WG8Oq@5w z;q&60+klei>p{&Dg>EERImW8(+YI`B6eT9ltGqx@c|XyZK9IAjX2NI)s#mpM{rD&% zrn2e|lYVvD&PVU)SuPv@(QnEmO-UH_chX@Q&Hj=$KT>K!gbi?do_n}{YWyntu>5Fu zN1aYpdo-{pw5)^f3vRAM5F=?bweph@Bg+2wVOti@rDyMEoY-_|J+B1vY}|De^kxpq zGL`#8ftIW<^KssNE+Jy2sVZDkE&nGsUg_r-y&XPRgJ~|=?sXK<`f`rjj*HlaDMCV0 z7WZ+i3XA2v-#btR#!kq?zkCDRaF<&0_Ls#z5XN{J^m1BUkX%!52&U2jU45+`uA-N~ za_WSxKNu+Gf{Xj+I{3+`&D|iL+oVmmvAva zQk(z8(HMVrr1s|BOMQ}=A#&=SbD^AN-TcEvMci(z2Z=O`UpZ9k&Gf{2r%5PZ2n-7b z69xId2qX(@Bc!VN`5xpuO2h(L*WSqZA#coR9y3Q5>l$Ws?6RC+XReV_xkRP_(!`4n zULoUO|AMxH5NGzRFa=O=MxHH9JGn&ER4bF5)sjTTbZE=?x$6oe(661V3ZKHjyqPD? zsgI2Q>}l6Lm&>Fm4l=U6{h;rlk8-wPFzfHBe!*bXB4s(Yadr;5 z9V(nj9_Rk1P{5Zw9-&)@m_?$8S#trv-*c-TwR zPb8zD87sHBRS5i;$|tj$y*E%h>$}usoxDjg#?o;>4Jwz_5ki#PjD?zNHj8ZA2P>P|?G9=pbj& z!k%FBYoo_1RXKzwSFJb_YSkM>FZ%HR=U@J}GtmU__|VXnU!$YZ{dGUz^v2)%*fCMF z@Hwwt;=+b1$22S3xPo6_vj4W$C`|)=h6V&% zq47Gu=xDsyFT7r=O$J@V7m!D~*QeZ#@FiVDA0hDiFjp6GiJCyu0lYfOT)5t!XhiO_ zHo)i8f%YKiB~lf1)kouX2~WOuNd;YvIl~rU*Xx8p9kC#%Lv#H$ z5X5N1R>e4rKYuqFyMWcloP*~@0zS)KRlk6ik;U{wuf_da`%6BREnv?=^MQ#XO=Rmg z_eVjQXNyxWllCsZ?sT{wX2U8wYF0{?3n&_hVNRZHXF~|$pMzIN>g1$g2ni5w|y6fi^JVKJ8i2HK<7u-O@<2atSZ$wh17u=weoP*rxVG@!`21lVJ*!hX?@y-=}6Mj*tnmw zCBaX4NZob73D1%*Nam9_5zS>I*lk&|XGd2i1VLB{M%04(C#`-`=PysVes#Qzz}mr^ z_s7|fUYd5gWuJDh%(78>4zm5?@Jzce zW91=J`HKeO=t8SA0__GCI%dWN=gnis-(2uN`y5791;&yyFHc5c&f9SQ?+2(W<3jeq!SJPaxAPXf_S=DiuOu9jju;w7nwWyh z%77ZvG|YS8C@7C6{98U?cbwYEoUpb$V9xABCBBlPdaN`5oz)&kWks5%`BD~;=4=CU z=H6x)EaON*PoTxo$tv@xsw$;DtNll1_uswJZ6mckyFI-tvFL&Mfof${gkWH*(IZI{$dR8le?%I;57Occ%JyQw*Gn~85s-65y+|Dxde`$)~S zaXlrl^mefXfGfL$?ric0b^NGdq??5TSXw#w(jUcelx10)pt3iP`fr`EAyr-T2dV^h zz1Swp+$76V<2`Bq>2IlWeMFeut=(;EtGP9yRY zrN134gGZ7`#>Dscg4p*UM$eFxZly~Kq3_wJoW6{xYx-FIXnk}IYkt z@gUtJ`WU6d7YjFFuG{(LLcT}kzW`3ImlW~DA${E{V$<8=VpLlu*bZfweADQjZH{Zv zX#$nod8T9PBRQoR%Er>UEF`LlocRQV(;5$bl}Uqd^4d%VHELRpj#b;+He+K;IX%tF z(SErs*s9tD1vQVfAR^Vu#`kmkpQ~J;BQmF7ckCjUud)BNinc(0jf;lkQQ7vg=~(+nPH?6&scbGwl1k!iE?>2(qg~)8)%dF-8BDa+q6fb1fP_Fn3oK0p^^N$&3y6q}~6Ss>c;rr>H zu;B)G(}nsplJb`mziRw*T`X(0-wONBloNMy`6m9>;JNoUFNG2>bNS9xD<6!;HsuT% zjhU31m8o-1=TTUygmC4)i&uv9p=dxij9~%d0Y3f%AeG;jZxB1@>Jzby3!LU4D&JyK z95GGLP!yKV^pBIl=S-w9CR&|LlIONh^vaD&Darj)hb=P`? zcs|2aPkN+DLz$gp6*XM*Yx~oprcF!wA3rd{(_O{|?Mly#d__j5~w0E+0 zX6DZJ_Ai~BJ!|>5RTuVC#{gws0sW^0`8V(sL3N2F$RA8S7#f6`YzDKRwv%i488(zL z5XMb=NcV*#cRO#3z?3c(>1#5%gcR#Nb1G#MLzA|z6ca%?DvITCIb%xs8D^Yg7nyGG zQK<^vvwjMw)ScWLWkq*4jP^wp2r}h=PPeK+!I~)rZcWBH1>2~gQl*4+p~c}z3sZ{< z4lYfKua?@UQ#E;|j_StPSC&HtV+JE>lXYV_m3&L%&m*XgDusg;gC&EHGc5YHXX7fX zIj!x@=hw&U`tn`lHBY!I*DbC3W@fkNHRERiXDS+VnubV#?aTDS*VjX_O%Qe;v0S(b zf;xW?;yLv~Cs-(0KKL>vqC9JW+05RDTs!!8?Tj*>rt&yuhF%;4S0+gpLv6>9z_rXA za$+NKP3Jg`bkhy7k$!MSB8@aZFwV(~WADmj`eG&CK~O=Mco@ImG{>f`I#^RKs+?!t%6;{A z%8`XuylDw?{S1EK{Ye{T#UiaS0A+#MgQ(mZ^Hyc))|$1D;~_h=YcwSK73MkiA>krT z6VMy09pwEh+HSC1jaQM66cEOoc>UDF}Vro1Ns-@_B9@o{EGeD z_;6q`xf$pO`WFKI8UuOj3iq7!clUXN&_QiP#783e=kV^v059T8; z9eM~pg6)LVS1SF_OPG}^cdut4mF-k)(80`$f2}?2V{+UODj?Ox;~z_pv04^dMNN2YI-$=eLDL3 zf?0S0-HQz5@D+H82K*|<_mh@tB|P*$LB$6OlvT|2mr2+HgKIRD_DhX%)w60E_l~)l| zYqG;USZIQCp9Ygx;vp~l@VM`uHeI!$cJ)O~J(U3n<~XEilh43_N9p2!ja# ze5aFHg&}b3SH<2buiQqFUC!DywN8Eu{W7t z;1Zom-IXU`5c@{dO}^%9CmIWN{DwNyW9{?tJM|swW?j-N;+JUzl4%6yX{fh2T)1_u z{qIG2GYztCaRB#^Vo;|5A4z$|eZJzUMtLW& z*XY-nNbD=Zb90ujpe>Ib=EA}aLu=O+0i+I0a+YmB6Y;&{GW1va$;|%^(2c(Kg>AQ| zh_$r=56-rSd40>BbXU8`xq1GUdpV+N?W>(ob=s`l?dw}e+$+*^)2_J>QhGH>WuECb^_jv@YnrpKb;Efp<(i=k^xxRKZ>Y^@)?k zx2^nTk2Tk`!iZZ((_C=1f&}xe*7(Y{xC!(00fon?WH>4(?<PO||B8EaI9f)eyH-12}g-ge@L4FZeZLg9wq-SN}qkBLu}dXe(#s z$1hT0g|A*LqP7;ftHxH3X0KCh;)ZV2Y%q2D8Q^H$M05x1fsd5l12rrz^wj|;rWEaz z`;ViW+&2mKxfk!aVEDXw_ISb81@rS8+CiMWLP#cek!w48kq*`)bXjjLlIl%vzxg+G za(dZbyqowO7>P}fU*RytHQd~zUK#JUEAAayyHyn*Wu;L=imp*3Zx3l1mZvH_tb2MG zB>wn*XPwv+IUJ68$Vrfp-mxr6;bfh!8^`ugmRP2KJrNm}iCU&U74cay;i35iauO#? z^;e6+?tH-b{O0-K9S01*re{TWJcMbiN9|ZKMqA|x#Q=}aZ2l7vI6E9|g|urYxtXY) z+(x}PTK(m_oYq@|^;SO#D03xPKhf_yhJn1$#hQrTKpevSkbL5A8&U6fM+qb34gIS- zQW(Kabl%;9;cg<^_p`AThFRYLo^C_i-ljY-!Q%4~`rVN=!fvRgW+In?r$m=oidm*h z(zw>2kEYG@33WE%79AIdC4R3Pwd5fkcpzGLZf?d+W($rz_)dPLH*c4l# zm1XeGn~^4N#>0@i7LPC~JDQ>h8fDIJ-}QN)az7o7@efF5*NIo+$cZ;T}N z1*0yW8soWW@7HxKChNgNd-Ae+gSvl-)8b_kA8EAJyU_CLWz3r{PNBl1yXzO&qL=n6 zCTkbM2+!&k%wbc?IxT)rllylOo#XIgf6YFGS=+F6eA0q*)lV0t9IU(O6cr|9<2H|? zHGe0TdpOT9V&B}j3C7~EdS#;H%-@98X!S35!^qO~=sCg&d`cgbAkGr5^|V^VF7N@} z`xx82;g^A6 zG5T2J?O@&ZkU7QG>Og{N=ZT=OEPoT?r&MFuj%1KvJf5ODMac`6<|2hDhQVwY4zGK z>f*JqBgkEn8^Od87CCW67h8-6;$Wdv`k06T^#<=!P~n5lM^ul92kq(EmokpwVR1=X z=8!*tq2abT$-L?t!7IX0Z5TXz3l-HK-y6)Fl^+TArd`Cr!dRH)xG$I4qm|NqF0y`W zknDp8-3fkEkzZFqvzJv-GUe|0?b`BYE6XCycndi?%5S(Xs7L%}KEJ+GbrUvhf?wZ8 zC*8d1OK*5w_>?31Zku4J8_)JqRse+hFF=x;%l1-sKqmFSf~(!;C1*kcpoPu(N558C z%12%^i&!Q2A9@C8ih`4N)97nAyI9#hESH(#X zvX6KalQv;(NrChZmRu!O{p7OJ_+O-3zbt7IYw^|Ge~Hh(LboEJEZ|q5{?C9`4*Ujy zadv0)?_l*o=kqYh$I)+onSYVcmWA9UH~#x)q)_>UN$vC4B<`k~kh~dj0Lm0bX%)cY zfCp#dqqOp1k-q|LXPu+8ieM?gZ$S9-)m7HgvMN3)(7ftgyS1H=lEtgq=Ip&B<-w2( z_?~xJs=F{`a+9hcTRJ+(6 z@O1 zcwI3HIdfagP2p=gv)sEQf)V)VAT}a7%|rN{VcH*Y9F`105@anFN@WC zQ+mW+WbNHYa+`xvcgzJ7H3+9P-h#c=I}Hui!D^^(L4Cjc(d8fWQUx~tcKSb>$3N`k zPv9Tc@MmD10K74hU-W-5l3#}OPb2wf7dTpFKZmLXQFrua?L_Jpcc~hCm?WS=J~-0sJ2D7vP@* z;Xg*ie*u3S*#0rX{R!MYBO5i80}BEE0??hsj2bF{B>;Z`NY2zo4dub2fWH7-XOp9b ziePELe*^=Z4WP?0Yp-i=AQEu^x||zmMD|&O&R1waS1Zn-qdB0L);R)%WJLgxwP%QA z5R9H?Z3B#O^SnBN%Qn7k#cX(cP0_b6)N@Xuy&)ufK>;|!tOFf!ZtL{x723SwVNAg5 zzf0&2n~=utWBo}@l|QI5|TUY?mACpdq*c#J8VQMokw$Cl*q z?!5HDT%J>$iZDB$^p?X&ZSMTsrbGJ3Ubr^RREUf!-`wfGnFM#hX185Tk??1#@rQVp zcl|kU3CH{DuLcO(P10r#$7XaXN#~6;$S1d`;7jJ}$NEU(YZ)ynU`9)nE9HDtV0P^L zNKmZAhzD5X4~%Ng{5P4IZI_dzve=sWs8;PMrHkp=GlA(Or^GR%2R35 zFzQkH>Le{#@c5rX0DMaE!Zr9?-MjbmPoEctM^uV;ng3X2Ryh7Yq;;fjDyeMyzo|qp zW{#rSJ=nAEr=Z|uJ*29>a17x|8e>xWmzLS5Lwhi^yYpVbE5#%=cfoYMTZNbiYB(LE-{ zI~2s9*zm?*Ym|y{WtR=o91GQcE!v%zJgARr*4B4ljl0Y0H}=4M&#wa7tN~BS_beJ0 zG%=^iD<_}}w+V84I*cnJqX=;PrBu{DH%s2SEQ{N0l#+QngyQU7up8uE z{ZQKcf1*Pl^@T(D>^Q_iw>y8|#&I3Gy-*x8C%VT~2^QUBF{*69M`e}w3XGhUYnjPH zm6@}lojKqlD`GM`gi5EI8CAX;EsmX&-m@}t zR;^_o45cs;!!1KKc?e@K%g1T=hOM2N8{4;XGQXl?Mut*=I#6)oUceM!bYI_zu-rXn zPI!;n2qssXzYutXDsLYR`JVIKl**R7yZQOG3@!e!;i_WL!neBXd^5d9&obBIn{Dj} zpJ<%idUGwhT?PGUoLVKd9p^MC|IlS(7DA@Xi{7k}2vy_sfyn;>eH1e%wpX#wVCMYL zQtE-D)C2I8=cpBBjtEtb$WC1vfpQwY@^2YIpd5j({Qs8hqoYfdmXd9SzE{?$_`ohF zVVn|iRv;dG)&82c)mpOC`?k{bdqJ?s+`4Ry%r^&3 z=vK|{NF;!5i?+|OmY}mHB(%oOf*ZWYH@~%Btc}ezCs2{w;dC-tKs|%H!GCS8<@h(` z8buY!)=#5E`ONe|LFw8*ZtXLyL^Crv;pycJs9AqC@u)EU5V9yY@n}6xSld3voWQY9 zzkt_Qa9GPei;&=?ITiPNYl3A~DZYJ0YCo67m<{Sti;vbf6-@bafm`D`QWft&D5%bw z^#ysh<<7IqQ}fr0Ze^uHHuYQAhED1FI7~J8$NllCNC_#?zy)`wBZfEKtnG7CLk0Ys zDZb!Qj^SIn1>i6E^OfMU>Izf2ss#&_iBhk33R6wFZB8gnBouZuWf$fa>e?l9{urZp&@yA;Tr_OilY( zb1%|48!g&Bx5}1ELT$5!ne4xeiA;{|(ox{C#`|dSNtW$$>hSp%e;%C}#!339T<1V% zENz%=Uehz~5IufX!a0{t^t>m>#gw?vupFXXm!CUB@nG*BJ_%;!ts~8seRP^SnjPLV zr}N4Omcl;Tku6htoYor_(#G5*6d2>0@(Y%`XJ-NDBF)ptcSz%{j-84gw%1H6Dr%YRMmbsf@FD zKc%T_!9R;T6d<82gw&eU0=6$KxQBS4YL~-9GK*^THV!5(c|<(w6rqu|&6nc1A~N!| z!BhE$`-aSILk@9<`aSX!0_$;N?D{gL?mG_1;`3FL$97Ejc=?DxD5=d^{AP9Y*=2DN z3~%fMSz;=fLrieHlj|HrZ}c?#n4MiQn#8LsM<9;w*v$y-(TPwWAW_UH0W|Fqu(qVj z_Hc~Vs+uAc{;ZbJZn$o(!DW^E!fb-Jc}uc@)(&*Vo=`3JLyDl(*kn1h(t#Xkn`{b; ztr{qUKbGhKGS}cv7tfb)KO&FlFOcp0>@oj{G%UdwQ-hS^aNyhf4=rt(_BQIe<(h(o z1&AHynKO!5es@Fd`6jS-VQ?YW#pS%t=c^jy?a}Wkyt2^HTHmrx1EicD$dztc>qU7kCCC$MAI*1a%$+N6se_TB;L=-i zs`8Cd=8JKPAY{aOfQ4>6k;`>&@EDaza}Bv-1gi$o&^zPP&8~h!8E& zBJa)z+@kKyzSTkPJz}GE{pmh|Ay%bSz-N(}v)&)IW5^4KpCMk|z6&tex;J)fc+I&( z80^bzyK(FeB9?El&*lTG;Ltqasprv_$-(`L-~qf5{vichW2hl!tCJDX>6L{s6rw%X zzuQ6Wzt`(k2AqjSxExfl!;3@oHEZjO!TRo{G?e5O-0smUM&H2r8@QA_6OWke zFY2@AzH-7w-Adu~3XZu;h^m@zR}Z=Zm}}l8ELxb44uO5dE(JCr^`K&tG=0cBaL5#m zK8OQOy9+h~eL@WFit(31rohY(W~P%v&TYg{^*?iBgBMF0(3jF2HOUwOp%S|vpoWk( z6r5g4?DewvK1t$i*_O^9i}=#v#04+bG%zlunR$K#b#EXg-3>G}(1cePf4m_O=M^s2 zh9hk(sMbmE8bBe*)9t$*4T0LI7vGqfKGD_#y@uoNvKj#|3oQ}wcXeh&4`FxUxl>?m z;@UXGq)Kt_l&(IA6MkQH*9@vUsoUrERnZBRtvoP-a!)SwB5%Xvr@$^oK*bH%mklm= zs}B2G0BJ3^Q{{#M++TW}M{1lWKEGOQb6mQTfWLOjzslBm1YeWii5rf+OJj8HjcDB! zOK1$30v|0>|IX4BfnpGobR{UR%2so>iheiQ==u|4WVgdB5`g;s!Y~f_4F_C41oR8`HPwJ)M)x5LGZwG`CsMQLpLwG_$*f2}jwv#VPKibaq`?|p>YxAt(s zt5-h8BW90F`n>jCr;LEy^%kYcwK^431D32ayBiJBmQb2W>y>>^z3bQT*P)XgyB+7Y zG^N)~NJFS0Zl54ZHG>xMV$+i%rOBgZlz?r7W%)97v3Ln-YGMN=O7qbZPeclP-=O-maq*^pb!dhD+>3LE=pGaWn#xAS8zcg-!07$^P$1F`7@k93QS{F6OBJiQyrH#$VKd5>^55x|q+_g3W z1t8{j4~iP&5mZoAWN1ZNL7gWT`j7sCUiw+W`C#GrJ2#pm+r3-ed*zo+fO))OldQ5B>->x;)WsFe@n%vIm?1 zVQN0Ct>2^f91mZvTpA~AhT|++MxO#66#AQkKESE=?@ticdM&!mOnqVU(X7~^FR0Xx z62Eg8b>9YDg|rWT=0rPF7u8Xx;sQ8HfMv~`=*arYov+uj$@&ihSlW{>(hn5?*45;K z-mI;~(WNt<1O-5-Rv#07MHu-ZB3uvmcC++ih2g#0a%Sx1dh1)7^3-)=(oeRd1m}ud zTNH?O0F7adrh#$l8&7K2zzYy;YCLdL$=}F=WV7-@fMl}{C4VQnd1@ShJ9VT zvPHmH1P+wG6xfXX0HvQy?nPq3Bd3z}Kx}aK-2o%ibd9Oqfg)f$YSxBvDXFr13_nQjDx_t0A)cbctu4nv;pZ2s2TAG4j8uub8OKzVY@P(GD!PN)7NX&t_(*p*3 z#zJsYxEad6HUG%cA3w61+7*MV=OLI(fWhU-xAu&S|64u(?&heQ9s)a+KP=VV(6p-l z<*TGNwWyG6uxBI0ua!r|ViFKs-g;}#rr4=UX;Qt9x{ZFV%Xa_Po>{R|d5Sjkc)`DG z_;8*M#ddnE6_t}yX=!V}m6Ox2Ao)lC8SnBwk@n-nPRriQMC{+VHKH$OdD$6a{CN8i`A>|z`4rq@b`k+ zgO!EdtuEy2O$C>jfoGutSyr*>iTt}vz#N#|LvE@nc<*gSSQf0ZE_)t#-*8WV0>N4j z#9VZ5L-fh)w`>ozA#UO$%{btJwg1b7rCqmx9iVfj>+%@t!)5!UiO$DL{1{l)LC=O) zMX@b{{lFHS<7a8!Ahzq^zHOdLRjY%1GP@ObZQs*x^W!1#0tk!oPR52+fh*xIvmG;@ z0{bUz$*`>Kl~#ZgK_9)qOi9k`0UIXS#aFV6;Y*NXdfB{w{EY> zX)n6Ee7On+TWi;YJC7@veyBE;484r0_PJO#B7(SB6gq1KQtGK-z6!V};g5_UdJhQ`(UTNCpcj%HZS+(mxPu53pxFtfToZ zkaLu!mhPdvB7c-Wpvsw9a4G+p``#W_($U4x#=1+(49<_X`Zz${6Veq7IIqvMpy=o6 z_L!HH;!bIYZ4hPWD_moc4^}sB*#_3m%9IvTkRZwB!$J6Z+^&?4m!skQRHp!<3of3U zp0-Z3!y?wOStWM@JcdwP}gl%$uyV5PZLum&vmf33|S?EU8v>) zoY38Ei|$z^SGii(1qvJ$(+<~bk|&<$XL@f;OPta;+`9936~HF7NPnr|P_HdrDr zcpU=}haM%TtK$-PF2_2so|U_PLcGWM${wuB#Q;cuc%}(^ z_O%gwj@!d(o22^{)bPm--1(}y=>(7Fg4C#>@H2f*qKUxJUfX(LrkUqTpb(f2tY~_qlyk}Uvl5#bLIE>wF#RtVF zZ7VkCBhtPnpSFYD3`P}oG{3p`db*H@7L=* zp2iV3;2mU%bmhuDelsRG#dAQ5Tt11W4DzdK2XKDDu{U1u1JStVn$S-^*2LRj zUILzW4UC=C@!&6Y+=@%w6gVnV4QW&xN~&6=c6|vO6%!T%`54es$O;^Y1$+39i5Yqd zz&94ekZkWj^Y$JVoA{GBtI9f$CvkZE+HDF}U{qR_u)0#iVx?7UsDrlN6i!vvbE?`< z?VyVKZO^OqwpK#}i^KUZX9+2ln!fvhmK^n@48j*m)=e^UbM&s8)Zx9bHTriX2r~dA z(0y0nX!PPKn7Ag9OyKp6Dmt=BcUl$P55frtoG{|4Smbs^R&YvlTF9BG&Zz;iSp3bJ zu?H+zVf$Tbwg;oCfTIgs_JFxLTUk*mGe;(lCK-3*t;_>jYAf4ifI;%nj%yX6jTsFP zwTVXlSybu{VMCxb4Nt?|V^Hnd1zJ9KJUXN<-de?QN;^@RvHHBunVjibFD7nqF#-FMEc%)? zJ0|@4BQ~4DSb}sq%3zBL+c{;miRg=t>h^)B4tmi zYk?~l639>(r#k`V!mIF>)_PVp?o^qC%%rvs7^V`rY-{bKi89Dk{;F4pcd7BK&_JhFY8Hlbxo~I9dvb3OKTm&i)GqSOKV|*qN6y^ zPzM~4E$Znl-MUvYJZjmR?({u_-o-ub$JTS_bj2$~w&BGN6L?vtSTwaGFrSF~`{4q7 zr{g5p>MXw8;(+U0v_r(ZN^C1z18J*d>X=8!yi|@7A)*1ZH;$iv0>dX-4>%s9)7WQ8 z@H68xP*X~qob2Y%Ix{Am#Qp z9je{^yl*U8;>m)T?%1D>3u@qLpn>9|p;e*|8+rQIOLh&d?LMNqcZ|XmJi`U81>MT^ zD!w;!sI_kt_9CpeSlXHGMTCT0o*`M8)J%70gvz(|$&_o)1=<&ZKNx7He#{Vuxrl@x z2uk?xaCF(R;qu}h%P=gksUVfx^uv0m64uK~J0m!|l80aEJUF|sj0=#Ef>2-FYo(#$ zHJ0-t*m#{EP0+$KU{d#??ox+9%I{gf=^eBTnEtzohquQ|U)@$3d7PFI$$nhNo_;^E z*d)%#;=W+ZV6XdExMv}|@&}m>iT+G-KUs20v@aZA)g~xGjQ*{{&}<&xWZ8Cu*B{QW zH}#e;5@p1mx_H{29JBRAL+GRM}-(V6HNWQ zsZACMtDi;$R)fR(G++IMaopY5Xi|yu9(8{6zDr=WN>_3awQ1E31zlE5lM)SfuYk z(AlGJz0}S^Nrf?iSgsG7nv6zO(StwbbM#L6P8yBk4=a}OC7*(R>IPm@?~1aY3YBM3 z=CP?Q!wod5nqrMVFsNof`5~qIXoNF&e2o35i@}BbLLBmzLUjUuZ=tYGoVDZY?$Av=3fxt;;tP9o zu7;GkdZ4S(CM&KGZGI=o?k7H;$KxxsM+FH7%J=TxBPw9|NGSKUd_KTfS0CE91S`yY1W!1Wb?ihBGPp9{m+m;`dVdAb@BwtCr6Dt>dIRBEuHiO76 zp1Ai7p3RU)h2H-CFe|bpsV_pPJtUb&9SCJZZRK>u$-;yQWJ9m&8Sqt@s^Se|7;qkP zJqe(_SN<3?PYbPh^D8bjCA-(n7A77dlRyG5B$x=-zgye+S(jR?cqn4SU)0r^p zx%KSX8^#=w=l-vi{7=ME=tWPAY>SP^+wM!4gCCjns`&KVNzh`Yjcv1JG4uK98Su@4 zSL=TW+&v((xz&&F5%ft!qL;d9W8Vi|E0O6-5Q3nR)6Z$GnnGP4`RPgm-Q&VI3r;HczUL;u0h*s;)rU%ln$E!^eyeHUu?|wy@Y9MF|8WXpEThu(-GE zxa_!CU_XHUMQXmcnY;6SP~GSAXzm~@>~=<{EvwNOKQI^iX7)Xf^*EuHpFhwqg#4Cu zyul+J{n@ASoMq33BWZUdih4{-eKk&`F&yQSEMQ8qr5Fx$TLQ!CKkUVg!*UQw>!DXq zl6{xzdp*nA4GL!P*WqzhNwQ}+n#cX+;%u+JM+Uso4Sy9h`5-SXDmm6sfVghvF8`+J zaoD?@Sp8U)RZep$NVw0B5~-3*KK@oaA z3zHN!w=%ls-qk!049M(=cw@3tsZf=sWv%d>ddW#_N=pgQ@y6XWE6F-dA!5@#=3q_k zI_1$!kme|1+DX4@6z!eC$_G(tAA;4EMfGs8USefFHFSV5TydYOaI0=C666G?&71kHxEBaYXtC^A))@vlmIguP0^$FpRjK*i^foY?V>3%xG85TuR4XJNgGPqgVM2EAEt~Tee2753ZM>?7EU18 z`u3pUFGhVW>_Xp8nsH6F6|w=JH`Jx3oY#KJ3IV-ms> zQytKhU?+M@Ya9JTyIQ<<8eA40TsEW{xqe64Yy}_Zm2;SAnZiuxxp3)MLFu@1z0TB! z1E!CZ+(oqAzb8HD0SF!O$FNtw)LjimE|f7=LCsF&Ao6c@3KVB46!UYx#u(x3nERjn4_Z1i+$Ugf~!df}QyH|$Vmso?0Z!T^%*U(0E zBgwTPoD=#wg36&ph?3o$`z6r_3EQ(nO3?st}R)LsT)2^4=ql6{)TlBvA;6o zK<~woNnA0fbnVFpe4L6p-pB!P#xhj6T+F+@u4?FhPwyMr4ye#tZPG@)p{MstRyt+p zr`@^lx7V@oF&I>jSQ$hFXB&XjOPs~twucvMXx6MxUb!mD+zTdetb3t~FCI=Wnnc3e zJVW4ggtysutj?A@G2o&oL-$5msFk7-kacHP{n(p+@Hx35{+)`Nvl(1F7q$qP+G=`> z&sFU5g(FGpliV+g*Uo*=-MpV_NH|*4y~HocbkB<)sn|%0zlyV21klR zP^>_(5F-a7m@wHC*DfmY%48ifF}vC$t{QKf#K8H}|~ECpfc#DQVX`Iu5(|ItHfyMcP|H)v{pX)IGi%mckF~q@ zu5W*PcU5(tLsu=R_C&avuO(Maj&r%7$yXrPnO^RYIBs@m*5#4Uzf)59z<)(6|+6g>|{Asil3J#B766gujT)YMd9qd06C8W`3o&zS!VPa4p= zM$i0ER+GEa_NY9|@`>%onnwgmA&Q=eQTRvTzuY>60`Bqb1}k(fFYL8E4)&+nrW%?q z%v0=+PbK-UrmOT`ioJR8kI}nJBK*ZJP_Z)i`2X7C7nmqK1Ku(E=Z739|IaTO1>QQ! z`BlETEn)XW5!d8}*dC{7Av06U-I48F9Z8P1Dj zrLYO=dYNvRhenK5mu9Cp$NGhRc!(pS_wgWY(4JZ6IXVl@?HJppe})6Ht-73|yvjT@H25=ePb|j=06j z7?_#X@0aGs&~tySbbJyuGCQ6Y>ops0I3>7BjwyD2cpStpO(^fWXfec5D|O@*~h;DZzGb*F&+0h~={ z!V2Yx+i==jN_{!}=t)VVP^C8@H$opBzeZA`(e!;{-HW+=$x~0cqE}0`<0dbW1$`A8 z)I1}qvA+ThuQ!pk@H^Mb1I3*`S9|!VH zWKT6&C>M5XI`}!PDJs2?@%CQ;Q>oA8%u%@A@QuOdMuj7-6^{7UYPco-ue2W|r@q{j zVOeu1sWWVmxDUcAxo{kXiKmlzswH@<9MQ-O(bCutZc zZX;qQ{gU7DGUhcKNUz;2cP>vkkXs+a_DP+8AU%@RUp9tnRhJh1lAA4QYMewz7G8|9 z(VVxLNwR8`5JO!r6WVX+`qZ>>>rB&RJn!y57SC}5^FM#|%nS#Jx=WuuYc6{Ef7^J_ z&DDkD-9P(u)wf&4>PjV3UI_%i(A${HPU(H>9M18%P@8GPq%rjFkUuy4xFZ^)qEl9% zTrgC&C;1X1SVRS%*37z4x{{(0LniVQ7Ly1Zja@;UOjL%nticxQnWKjpR-BL#Lr`AU zt~*k&0UK;k&|cf-p+Kwor9R)~{8u5p(@UZD+ZEu|mVSqXHVXj`_jBaP3m&`V9?R~# z?UxV6!+IVI0exbPg3f*WHvT7{IAi&bzO^Gio-Z~o2kaUw`R|f9KKxdkxw|{K^{?Mp z;Um)OxQ)4W@cDhwdf2(^;C}(h3YgP5%_qM5JrYjT(3>0Natn8H6k0d>pAl( z)%_^>l+FzcT3A&4a7q=T)tDvA@X4oQ!8;J?bJKzrHWfeI(vfI22gx!%@~NEKozV|5 z(tq{2Ma2!f#yxKNL$rE8Z<&zEzi``R&ZFY&Y>DJlj*OIUns^zj1}M^6UfrY!ueFR- z6C^M-s|hL-LZ8Zs+!+-I{gHEvvR;c8AaFhWAV)`xq9f*xLOgyKVn-UUFJ+Gm-s5$a zig2wa_Xv~rCv2t{_nraggh@a0I(tN5%zy*nz$d)UiV~u9j+g~(vSByq1Bz8O zIdX`3kqe<0i+G#w0}oIT!J#tego||#Zh}#cPp-8hJg@KgpPZCW1t(DWqmtV{qOKCL`3=f7lGXJ_=0 z%Qjlgqyi6pDz&Uvp3`03qzcccthO5OpVZT3waTDM%f0f4|4+hDMQeUJnvSBJ(4q9d z$kuhr{csVAs!QilGV|GYxI!iPLZwfINDr+w%CwVtJ-e02H7eUvDsE2O?XleAZI>dS z<}nogIl9{(ovfKc)J9XvHsvNx9YRw*`14SX7l~WU3U?lU-iD0d~oALP#)aNZ^q_Q1e9*#epRbi%YNKq;R7NAu0Vq z`bviIEvfX5C9H@_u74?MsmT+9oJ%P)HTbE*F=>j1asElfrv8Vx&6PYjBznx#z)#T} z)+^7~D)*KuFZt(3tLCd2mfw6)zn?36uvHIeC==3|%BkEL)i}5KKfsg6WzdN+Bq_qF zYURFiu%ZR5>OH<&8{D;PGRxE`0L3bDp%vZm?RdhRY@39X`p5F>d->kHGAet_kI^K^ z5tK-c7n?kmU7KJGk?|6b>tp|`s$mmOB1mF4|0?XiD&-&b_K$D>FS8s_-EmS|A0%oM zr4YPA6x1=~{s2n<03&w)0Egm#86653iv1=7Ai0MtdtD5%vD}xK{SeV7;}oMuWh@f= zY_XFxi(Cv*d6m-7141tK))enX5{$qm{?_yc)kvi%@-kWwaWRKR*_=|gP4moZ>qb11 zjahkBAWu=Okyf0v}cti(k}r z<%?qyQQ<(mR0N|h54Q6yY8QMC*i5F7O3ZPEy^f)j;5RIzuVgZ1(o2HC&{0U8sk1M6 z#SyMnvb;6hD@;N1!T5gV*tjkWQ!O^09aN>OXa+edPTa1yK$89fel|!jP+td&5CMML zSSF}Qvczk=yeC~qzdjzy52=G(2~Ymf+#-Lq=RdmXkA4QZ`bTq%CW;ZQ4DiGshtP!c zcd5HjtidTGdBv&69ftydblL#7SfUB-J*$zvou4F@SQug6f==`(#2EV17`kNaD~Uy( zf<=CbMXoC-CGd6WllM|oCPmNWspxfPGPMA0Vm9``WpPjQ0!wdy6<-nS%FR&6_(|(!MNmS4@U1>p&SN}_)%fjF zUd|cEMk0J#RS^8#rKq4x%NOR*h446;>htzE#jtMU$;;D2mjmfie4F z7x*HmJcwJK8Osdxk*q6*=sPgTT;mknMaGeQqNF7bP833oKdGfy|HF5|mQxXYO&idq zO0BwNdeL`DWzv7qXLzd^k}1zH_kd&j7#WukN%@O7cwY#W$FUk0;mn6euVg)S@@!$st|{U3aHr z22lyGW8qFsR>d!#!Ja0N8WG8L@xL~D@M=nr0w+FF(wdHK7=*csMt9#O6x^utyZ|Q$ z#OF{*k$gA>>XbG_!JI<4bsM#&!zMKw)G}gn)BH^Lun3LV-5(mVD2$Bfu$TmmE9SdQ z@0(u9px!XECfiesDN-`kexwS>Z8I|Wk3QE){YX5xuA`d)JXY1C&G>!fkluM=*whP3 z!A4jPULg~zqW=h;pX3zALc_Xkm5nFdWJ z()h{FC5NuL3}I}g5mPcZkr#SL8Dl!qpW*$#$lMXdv;4?Sg^+01@dtF(Pf#TAHGcd0 z_-=AH5;~9WxZjC*?oHNw@k;kLr1D-)yDtH@tt;yfSVIeLF7GSkp!p9P6dhY(bHMkXCz(=J90ANt+R5;Bgk|yE`iE9*-`28$9FaiCQB!e0nk*3);7hmt z40TGtVh=lWYz^|aA;nB@WZUL_PCs;7t@oX+pJ4A*#gWwmXESZ*e)Umr9HJIMKOA*s zBWLG2UmJ$M+`F>#`Q64`knHytId4rAtojC5<)sOVeg}wZt)@8^ zf`hCD(O)GHD^3?4)i9?rpSu z=w+iA7-wlLzmweWzHy_|jbr#8r^VUH^Z6TQzE!t^o4zV%>B^M!H}u8i1=BXIRg1c$ zO6vO?gesWAy}m97wk#)S?yT-AO%IZKpmQagfD9f!f#0bDFcmg9PEKwCP}On3AasBp z)OObaM{NmbeqHVuR0K|0*5nZR&Kv;bwSul+s&9!G8K#YfYzTr_YsDxtf@}oQodd0+ zud&O%U__s$jU~yO40Vo8$$aO_d8?Pq(R&B4*N?IHA4ih>cM-tR|Hn~|A%B+UxRTtP z8j#zX926^v&NTiL=aktLPE`v;B_X&8q?0idw21N@Vb7&c81NmzxX!c?)uc+g&ZIrz z84anDr#t0Qg}P+F)k{;`a4CXp@}sw~l@4vngGarnT+LL{M$^c0PUW`-3fOYkVftLd zIC7z>Dvt6N(r;vAXrF-koPU7B{=ey^*ZOZzt$>Gzsssk*bTOiWb!XaGf)kSaWI3<1 zHvW-#^IaLQk6k=+E*;dJFEK{6()R_f2|qiI{Nz9EKNMzzYB{&xobU-RWl}DeF!y0v zW_*ES_S^PggbZt)gx@&p2A1*2WycMv%8UHWq$Dn3UVrYr!QdryPwOSmQ_`;PsPz3R zlQO)F83wUxlY!PXjUkOp>*TKyw9X?3r$;4M^xI=3UNnW1MummXLMC^R41<r26y z8DSI#ZQ>JxG4R*GRw07z$)XHpf>$kw=mHFVSuc_o9?2NqwCjPhzqC}g>ewWrYMu7fob2+9VS|TF@N4GF-^`=nWAL3B+`|b0E^)s>(f<|z#r!T!Ve{{?7Kk-@ll z#n^_JGO4npY(gXRu%Rzb@>=weDvVUb3ba857>o7SHm)Xy*V zPSm{4{5Q*JxIzFGyB2#*%BBFAb)Dei@oL0~O4XG8D0x%No+5#^4i{(el$1WcA7c(d zcl|mJx!*L(_I2`!Zxh|XljZ-{qOy5y{vS)>#Md&F4LDICh@Tj*NdD-AVzgqNyXPluLdc!p?GS zAxt6tKDcyhx+L4AhZmwB%o)Yz_hI6VRtw!o5bBB8(Fjp~%b(lN26vmuaH z6iFR6Q>Y&7A_zg^3vDT-s)uOxdbx)pBhI>zS6Pf zxGv*6&!*QM^*vBAo7!YP>*p=oW0d4{rVwM7RLts?yY^Per;hNIaX1k5*ZnGuH)3)* zK2<5~UQfDP)Oe`UEjTmQO4sV$^NuWIS&&=*n#O>XRVuh^cH+?r$j&eCx(Y8vjnsql zsmue;I{wB2oSTwT7qdPWP4^J*=2(?`O?Uq4qZe23aLj=Ys-7@+ZlN>ZmX$nT`Zjjy z{62iED_g`on0#p_6W1Y+axe(1Vxak$4F2q&OYcbkqRwDonGth)p4m*#N$cfjgPow| zsGob9b#PvVzPJ9Aos}wr-ktGZrzo3etIcR##sW3n+x^Y3LC+`s+v|1_LkH2;IVGp7 zF1z*Wp4oPS$>ox5_8VK^S{U4ylsk2#tMayJ+EpP_eyF8jb%?q*Dt#$dEnckzS%7Bt zimKtT%liIH%_StC7HMeXptcXpG_NM`Oye(itrN<>SS&rcM+4pXMy9Nt7w2{sr8Yb! zdeA_xGPmhGqYEx`(uKe|N)*{j8&!P&HTr3Zefsx4HU^T-(Z##a!H&VA8++g{%tP7L z;Y?JQmMWK2M&!J{$$|%uDZUWFS-Cxl7lH(7r2=Ve3QfTj?SG5xwH;fHwsg5FAZk0Q zpG38@^5Q$`D;1RcACh)c@{;dK&I3sQ$hd5CKZ)?1vdtHj`KZ5Amw%=~YbWu)6A@ZF z5!!PPK+@XO-PPO<~K;OPp`~M|Oi%s*q(%{p9-j)dT)$ugzQfLlQdgJc-WK{TK~83Y}))QyYlB^S*6|I zv_~4BB$>NpJ-s41TZT~}K|8xj^K!jW2B|H%wA8KiYEzraWx5b=_bYUISGJ=%Q_QXK z%v6t-xwdNEGtP|GhG*GYE3VGIU;#={whqX+@YiTsPUrne9HyNkRZXPO<3-7A#zl&< zOFXU1Qt)_~WXy`UyT#<4&;6XFz@`6{-y_&`X1#nAJ{8oF=nc9jJBFj0ulKsN_d1c%SrTc>v9n@h5T> zfscxSNOpOscp!aWHmXN|KAU!Cs^9wT=?;@uP^#7jv5(dwrB4-n*Tw8Secz8sutxUp z1^1-sTVk>#beC-9FV^C9S=wB0!$t(tg#O;&_R^iYERp zmRQYmdG&_c^zb*r3%`^CZtcmPX6L&UQGdTV#S_~ljd(Q1vL#)fj`sp0F-Cj3EzWmt zPAL?`^Id0;Ol~OzKW6D&*RSlKtU}bu31ftm8v+5IFiOz4#))<_a(-o!RWz^4j0B;~ zmN=oUY+69hj)aHlL9|Vk6MB-%0YpM!a-4F25Auw7NU8K7rplb4ze&n9nB2yAdt0j3 z^*sMW)nWbzEU?S)fO(6#Rv-V!S%&G&dnlby)H)k*G_O@@JvKzoi`Q1bVfC)dh)3#7p~| zplvrMGbGp~pEC3(@kXKfktvWNo5fa5(XW;3+%L_#vCWEFXr@N-1T(sd#+RnC&x%qf z>6WLT3dmYeQc5D*N}!!eZ=%P(uhPnCq?EZWDd+q8OO`Tjm#hDL ztpA)gu~}X^!a1!JYduXnTB2D)zxnJ`_lsaTZHg-MXdxQJ<(|qLWiwvIb@+tllP(oh zyxDX~_e&;8Gr!U-=U};yc5-`6qM2fj+Akf2wzu$wE#}ue?J;!ac;}`Mg*MZNguCS~ zJjOm;+^%wAv3c2o6Gg@9@&=cNLh)fG)yu8K^v)DJg9M5*71h%&#W@4Vi!)O1FIrVB z{nFaE(=ka=&fNko;qRAPI&ax3Nq1~UtE=y4I&^2GLgjPahi|O+NwBnUG3JLb>%yef z&Y+rD^KNwY$_(`nOmMV=qL&_|GN~n#YpwF@n#uFEj4t=TyfYKy?>vT2O0wv{gHd$K zUT??0vJe?#jkzj5+la!f{Z*O9bz!W&^Ac+$a z^L{Ds!a|_ig9;y-`dy+CZmVx6iHGK~2jlX7EE8S-{T(4|Upx11$S^D>uk4#Ng83Fp z4_v6_Yj#%}^-#DjfL2m0DwFMc1&A*>a^Ka~3fv4fPT# z{?yzb2;~p5^s8_S1BPKpN)<{*<}B#br!JQ8iAc?5aOBG~IGiViYgJ`k5UvHoC68gw{|ws3c(jZ1z_-g39$7t3Q!k{*Z+KkXqk7krrhC z1i(Jo;pXavVCKq-vY(I?4GncGs2qKH8OKRslDazHb)7u}$k)nDJxQ{Im<=FPPiPc^ z4@o6KzT2Oxo>;2ZQ>@Xo6hQmsDwI!KOn|}AqMBm<3De-0d0+H!Z?8s4DYDw=B zR0`*`>lW8U-*Y9G1?jYI?R$88KlL?^ysd(ujDj?1u|N2-KclQxD6Nn2g8KAX&x0w^ z=M8?+6I5$kr44kDjY|~@v0)?*DY6|dvFosY5I=7%Uz!w&J9U6$j4`N$JeJc|vG;m% z!vBgcQwwcs_L|=_hoA$`C+E#!!VgW8OZL%cA+lbHCYxlj&U>o3ZKJ$!t!h`3>v%e9 z{v$ZP5tse+Wnjzq7D(JEeF|}vRkbqUk(~%@wUolOmjn?5dq#7(Z*Bs+c)$Am_)?OG z_tm`FqIC|``UcZN;*IMmChxN(i_&jxFK_AHglkpaSek(#Eb8v=pZOW6D;xU;D&SZFl6Y*Z_6$+mHuUZVgILW$>B`KRJd9jACA+*)CYTW&7 zKV$=u?W${)xcgO~?S>>&yc`O2fmY6Zpv%CnNj9dV{83 z5}KlJCk~c~Xw`owRdM6p9OE=0^o)2l1wk{f!hLs*0(z7@xNshJoJIl*+PQwn7oq&} zofHodRAIJ}&MJTmF2UCt8RGo$j2I3+okxw>3KVZ1EN1kcJ$y&Cmz-W0_CTf_Q1E40C3nek&ds zEVHhfi+(2PsgI@MGHm|pXzsMGA>HO3`N!Ct84k&WR8-;V7O(|OD-Z|4;yP*iT_O{m z2|?g;jxDu$=SNrAeUOz(IrLsZjoK!}E4dFa$m+}2- z++FTc2dt5J33-ko`!NefIGj{mE3m%^o2SM&GscJ9rHGQ&(uXb0Tgep%orcXhzAS?A z4RycZ4%>P_(}44%A;;7#g8Md_fP1uo&)LU$GF2^@+}6WX?-_9ab_3_j`7`DR5OUW) zqeAEv74tNZt>l;bQXrXkPYuW}MA!Qz;=Ny#Z|gzFSPbXPI{<(w`@ntj-w4)xRMo!z z{R344Qc|)i3=g5%F3F&4vpHm&Mkic$urw$$rp_%cV?MtK$iGVx`}@y@B81ZNKV7KG z;0m1;;6i!oQ4Fp;HCG?If6X%w;I6uX`N7m|w=r*|y!0q`ZN%T(LAx(xvIo&QL4WQN zj@ZAKUT(AHshf%?ABmni2T;cUxuHzF|GDHU|4@;4|K260q=zL|pv*SE^b1|hm2cRW zx&kk>*I6|)hc>BF#wgT;+u?<)Ur z--;;PtV+79Fj9~8BMCCE6B76wQ0dZ4E>g^jl;fVraG zeqZ+foP!19mQ@2y`XvE@38hi$g-HcP+*@w$UfC{`gT4kc+KhZ+kE0LM4>xfgq?b+j*IJA4J$rW-KhDsVGAz4BHIUVN3sshWagMrU z(=(-HQ`b-!ZwR%a)aVv~Opt3HXurpFLS{RoVU@yGb{f__H-o+v z6Ks28j(l}eJXkESxaHcOTcr}vSt_t7&p5O7OUSmf|M{hIPb(I`#q)qOGy{Cz(lre6 z7F#hlZ7+3XuXCqah_1+j<07|7dBWvZ+B19u9;ucM7NEC-fa#WSSnY6fKm5L}_mX}-mFE4@M9w4}_ z|5B6d`r(FZc^Sz3E2-1K0oegD)ZaFz1u@LGGpJonabLNHfnsb&6t{A&%;Qe%+y-UE zN#8ql*t^eb+sN|VWOWHG=eyxoXKaSIOj=>$SK$WTf0$zu`=%-*81DTY&fw?Rky^@VZXA7U zBFUN?@`vV!Fl?8>`nEnV9!;$kxaZr1sdk9XEU_wsXmFJb8oTM^mBgQxyL_)xHEqM* z3H8ct;N1_{dsNQYecc|lkO-It^)w6FOyrD4Jxrdv&cD9zKkXQ&M-?*+7=rKYbtPcF zLx}Z@c86&kmfeN@VID9<-`ab&Of??x-o)vkv-fiOQ7W}UXfGXvl!mTaaPH@G!wTa= z=~VlEOfippVmK>=KH$x~6V4C!cI396Xb4EjoxsHz&Kh*C1XZFH% z2T~1U&7!Z5r_F{uY)4XO3IuxFi1yhvbPo?6A*q^qrx{(p!D9DY_xQbSaP6V2LP3w2 zterpM;F-F!mf&8z@W5u>V6+=bogsK@LN8s@81%~Le^q(^1u79K5_kxMLoq1{+<%~v zBefbuz6|$Txu-Xo%_AuK!aXL(%pkPN!rWe?6#S#@tc#5d>GUW3CvNT`xmYRArs|rl zKmaB(AG&2R5_uI~D(m7THQnYi{4h+s+6Rg5Ya$>VVshKiLK$=kYtUBu{awK|no;NO z{X&{^Yq`yZfT#e(({VWd-WrqSK2 z*DsFOlB4B9<~8^g(YB{0K3La8*9`myN0w<|TOnc@ft*-PKM`!Hf0L;Djmjp;6h=|} z^1fzMD@}SvKr|bY)fle~ilcVsg-R1d6d1?aA{F?+~Fta)s1?gVUEYVe-Fi#nl(?eY-{Lbb|e;ua4yYn zqA%!uKgp$-SbQNaLlx>>x_s~Qx*Y-&Rwloy+4>A79bfHRDt85LTn#x3^GX0_r}hhs z5^Sc7!2`I4XKB0@1aZYb@c0cx(ywKI4rwNucf@m?Viu%TQw;k`SZ&bDu^Y&wU&8^e zc=L`t4wvMO`rCH6@UP9qRV)f8n7uL`UEE;xCcQ7bA)}l&%-A+JF_Q}?P@I_xQDG;F z!JIzUw$khOt&0X7pR+rJ^~v?hajK^7iaZt#T1d9#fsZM8LqKHYuxtK(G?s9Gpmc_MiOk{GP5A0Pu@kb$ zc;AB9VAKO%J{GD&@pR<2=7Sbz?GA_l#*PmG` ze$LiwD`ZwW`lKxN4bgB)htY6cuN}#7+@Kw{W~;`m>&oZD*=$|%BN3L~G`lgD-*j*$ z`M8w;EH7I7bZ~*mxQzg=irj5nccrf?ar{-JFlofES8zNFBbLuu7f6+)R}=z8VLjer zuw9i3lLocIz`eao5GMWT^D640Q}c7G)#Y0Z_I>|A<01hPrJ?#aFmTroUxZ1Q!(YK& z3oR`rAeR;|LVW|6fSLgSKa>N016Yic`@NJ=6tBIRl1dk{RL86)2XQOL);r6FZy+ocwGhb7PV{L4MH=Pze zuaBF06#xiwx8?*IKH{&+z{f)LNCgPHy@RoRoNRDjy5u==eVlb~=QLA%R@d^-D~is& zo8#6k)?UDWB)*S$aR7t$EP(tQlW^cb$@{>-cbz`B4qa!w;e#^_>t3KLEy}K5GXuM6 zV7V`e4nrV&8M`Q&7bDI3wu{3hyjPeuqeOJf!=Jc^m@ZNH$;rmY@lv*52a}F;^bmf+ zjWEiz*lz_%GyLLX{4+Xn>&?qhs|X~RmzRB*FTS7N(vGR7$#>ry85fF?F5er$)jg>dBE4|Yj@!tBY81unWkntr zOtOK~+aI7iq)^|>aQtgRxa$Mz^fJ)}FMpwNHB7Qmz`3*a$I0nP0639VO`bT&s=0rZ z%ikLPYPY&ARL*IL?%heDus$aKwFi(vk#1@v}uXfkijj{SpMb*5#SroQpoq6BU3TZLRemH+a%%p?kz8|V z2&ea|Z1I7H9{cC6kbrPm=cX5F-to~6Fz?)sp3`$3l~Tjduv3*);gYR*VIw7JajVZn zgN{nz!)5I|chW^r?US8L=Hd6#oe*FYd6f!WKZd@1GR*;VB=Y4~LudA$IoLtt!m7C; z{f6rK{Sp*8vc5La?(obZIMf_;+jf)_p8j6=?c&onv!4BBpKE!%Tpyn4Flu3PybF&R zAvScOED!44VEK9d(ze)po=|LH`|kNWr8@Uwn=pO8Z^<d=|PmTzV$`scH%aBnuA z{UXz9Wq;RKFhczMn#9JVcf)rQi1jnwADJbH<_-8b98N&$RRxftFju%pyB60 zlWCSK;-|#)fRzABevLYBOWPQZEFlyPi%;}fayBDuSwi17Z-GF6+H*+WbEd@^M zf2Na9kol{pOb@>OF(A84^v-;vDvsT9HY&=N48~{Id+lc6WwKyg?<%(+KIT_Y?ljTh+Ri|y*TkDfI z5qoBk-fxtj=bg`!Ci!wEtDX|a>Dp*LAL1NrXZ^~bPEvKt7G65d=Tk*kLQ|DYKW!6^ zb~07hB;&hpDdhC^VPEC3fgf*_b9cGw%t7;}@m#;4Wg2)vG4O6;he2;xCvtdb4`>9d zO`|8LdOF4{7*G7uAsE-{?3tyKxS@0Aq-uV#0esBE4ypF*#@}1jL}Y9QFj4{MD3$9v zj%S+N^)%t$`OZl(8&1IQwW^=WxJdgiCR1=YAFJj~nR$(9RF%CN> zCu0>|?Kvj%`>6W5Hw9kV|4|?0o|MR49Wg!dUDE!0D;&Rn*#7%CGFR;xP!dxQ&Ijca z3yRpg!N>StQScx#a^I{ZbSF0eOhpxfLKrC_-zZ%JRY8v{HO~=C+ks7_oD;bQt4>$U zn43@Ujh0r-lLcoVSIo1e3?IXFXm$+YPLUepipPTPi96)=KfqrEG=VTA0d++c%UkpK zgYZrQAo9`7j{}T@-?h&HLh$q|BalPESwI_Lw2M180F=WM%Qv?|zOhn-fJ^XX{Jqxd zN=J>fmF)l;G7pm_P+lgyF@I7MK?{kLME>3E7zFo6tXMy)`kh?lcIm8>fj~4UTp#>&uA&69Y*9* zaXVW;#U7`23%0EE)$hDJPsZjt-ji%!?|EN=TQh2Z%=(~jTd(7re3kPK^wC*p?XIV1 zGt$6*;uVbzCc%%UE8h>UGr71*4S3ujr(>7~v)S#&s~52rd*?d7X?2M5JzG6?3!^1C z?Mt_SGy%Q^6Ul7NbQ=$#`^Si*-CfzaziTYJAbSbH$R~j4oAsK7UwT?kj9^jDJryLPJipKW1{V zdr8XSmR6K$BW!w1wpnZJ=j|=6Z1~wQHt%E$+;@4=*_)`J#&)*6qS(^OR`OFm+(gvG z=#yDbVZ0@_GsBM(-nFEUMck9dZD%+L^))ctCjZUrowO-P6Et4V--_x?xNk@wX-Au{ zx5rL$#yj8Rj)Jc$*|~um#Tb#l$Uxq0A=Rp70Q59MtfMIGYU{J71tetzDdIijF=|qK ztj?Yo0ii_z8a}F2pO-C(C%^vSE=)*lpUu6tv$sSI+#A|nM$w72ul(338AR3V{*sQ~ zcQmmUYEpRBCY3=r=bq%%*h-{UZQyfu(Wy1iY9-s}#8C5{v{~l2i`=XeoxS*|n62P*%6zKIYm&F%F+Q-fB)I6W=@D%hy5k zYcpDsG@m(^`dx@?_m7#f7isc1{69$%iY}}*US}ywSq(ME7L{G4p6%LkiVbyB!j(t;8Vwq-8H)Pmim%+M3a>yO)u^hjoZ>eX#PC;zHs5#nC+O_sf2w z2HM$mj=3N1D6Cig`sRYQ6IRY~%W%0@Zwb!`8)x@9P}|_hPSAPPxZb(-P`hea+m=Ns zZcUEQs$u4gDQDKw(hKIUv74xB_=@)Z>M5$a3W+KBq_gLrKBR2!@+tL3yhdR5IcF|8 zWECs-yr1CmwY$jsnA#1g5I^T=Mq4{kjs;EFdc~M8RNeL^{Z7Xtbo%KPN>Q^$bQgQ+ z_rN7`_XtM!t~TLSI8(^$ef+K7&wl z>cy9CZw71Ze}W_Z`oGr2%}_MeFiqyjylHJGB%n(yAa}Xa{X+Z*zx$4{0zTX+uUv{M zYkI-M(TIxTXS|I%(e|$@b%}zUPiTIeO`G3u#tfv%97luCIqc>88@`7*!X%{T*#(~) zO_H&i{d$crs*{-7Vi$~C9^6m>WUks`SCcL2Vmfm33&s0WWa-Mg zS(Lh~zgoMj8^a0T7PkFu_-bY%BI&2NR6GYD38Sn$xbeF;UZS!!6#pg{ct%8Q<^>*7 zcfGC(B|AtJb5iM?gU@q4_LLwV0`Fl}&FpIg&*sroEuM51x~dhRCvRj-73g(|=UJZu z#fqkL;|_0FtXF^#KT99rNwtc)kTB4PXvkSH2q?oI9E=BkBbxs>w=s@-(wI8NbiWa4 zdb3k+Jc8%q&gJFLTff`l@W{*W1A0r2s_10V@ZH%Qy6UAp%b<1-!JIVsv3s%&f2dA_ zm6~g$PUHC{e=1@#s9UWSe<)1f+Sqy#(OkBHxz^t`<5ON>;an z*SkMHiW|c%B2I@xMW6J$I$l<4ReMu6V}+suN+)Ak06OXB1Rw;$vF^zhd|L!D%g9o9 zu32fS<;hn33gpG^ZnZW5-j082ku3tYL}aNq*9YbU&L|#TH0q+gMMJ->Y^tJzMMDAl z=mkg$rldV|aDtaBDvjFS9)n$Rc!9<|JH1(Xh@Vr07kT=0atLI+QJRL|Gc-ZZb%ID6 z+pSgx^wh;Prag0g+#U%ik8NYx79e!r2|Sy@%X0)CJcDa<1nxZeOp}Dx80@j`E@SJj z-Lr;_67k!1Io9W?%N=3OjR&p~-_YGK|93u!UCl`ydyR#BB15r zvobHi{NBk@ED@#((yo?~23VFbi76B$@!@>`mA~p?JmgRABu=2~a~`WgG8n z3CB-5_Mx1K1Vp&LS>H^8M`8I{uPVN&20Ng5nje8)9OB)v25!C%5dAF>EJS6{ zn}lzqkIVZ$8o%Qn4`=pKxuK7@o73>#xiy=R~VEUKlJ3=wRIyxWBY*Ti)-eN8dacat2T$Q{O=B_p*g}2`GkEi zNY}_Y{<45$tM@VmY@`qw?=W!R;28sE4GCa|zg(>{Qi0&dhXZqAiue{*oK^evOP98U5w$^AMwL1n;wU@%(HkFO4*5pSbYb0SXtxGm* zzJA*XGZlt>+G!N-`H7n#0CbFyn@ z^;w>XZvf(q*SBczYu?9{aX1IJt=3?1!d{ZWOrN{k{Z;I?#DLBujj`GVos4dhfmiLQ z!8GV+k_+sUu!`g;WU{m~gQSRGdk;G7@1-iVeY-1*8hwHB&mI@l%$^^GQw zZ4@<{+>1eJSI*DTasb@EaapKPrIw_(xj@9hXA;e5f`O1l)dD4|y=<~zHls_7w~23C ziy=Ak?LNHw_tjm2c?Y%rV+DIxWX$Yleb`oMw0s?q0r|OO2^I5!7-nZS)$vRJrh>e~ zdrKLK<=gM^Q5}~ilxv00f3lLB<;2C}%HiZoba7Wnb#d1MM?G*f0!IsQv`ckuJR^?G zVE3gsSSQ$yIn8^p`Vh1js6Xk!Poc!T%h#0$LOQGKxcq-ed+Vq;o^EY4NN_@s;1b;3 zJwTA)3BlciI}9Fzdw>AJgF|q4cMmQ>2N{A43UgNf5mGMU zOs_~IMu}Eeb)577w;~ODdHy&1n5YZP!zGq)Jb-hwA>wUAfGLH(KY@at&QLZ6%OYpF zxo@z@8_dJrcEj*=@?I`A;mEffHl|_h7%WSiz4W8vJQ8RVZY7Sd! z37LWL`JaZCd=$4Y;Y3|tNF=gW?rW#h{=h2279-_Z)+|k-w)u`=lGYP;kL%W!-5%!F z`pj0>6Iadz2NfFLuq#eA)@;rMl5W)0LgfX?$n;XX)w+m4pf5g>IzGp{YTw4daUJ%$ zO{*q}gI08b^gE7sM#$j*QLqQx52?NzV9! z7ZKayX8?MAS+bNiAxM0>*S(a+J|+|4H-OBa*4d;k2u)*Yes`Z?~mTqhsU$z49h zvCM2u@cSt4XDREhj-rUhqO&!_V8);1yQkag>?9k9KH2Q=6O|2b_OR`J%;cuel_Yn= zpsh_i`MkHmyfYuu9V~e{IXrq>F@p&s7qh#e1e;++n@(d#1qxrU8)1)FGQF)LPp?>#_nhp;GD^90+`+cD9@?*ew~)O5nPRMOU>-I*_PuO2&VOMh z7=%?YJr}PaRp0`O1*MQERT*d}m+#E-H7kpA)Ge}M8|u;1+jt$MubCxh72E(LnyLxa zKii#n<#W+`ftz}9Y}wnT82t;g@(>#qYbDfC>6cxf-nohLoxkGPQt&tHJKjvs)ox>z zpQoe`S>rJ!hKmMXor5tYUX{#lHyW@x%X(xb9^O1pPG*^{V#{B^>>9&R6dQ{v5g+BS zUMs~+Dcb36MLIhi|JIt|6lNbesZfHqqx2f@GMFi)no2k_q-S1nDLz%XHz3oU{wQ3b z(!@gTH{B7coN=#EioPcq4-?I@({OHt#SnEgO`>?XSd@Y%1rIaLve$57gast6Zqef; zsC9k~@|5b=!+B!7$D{Z3Q0rs+k@;Gn(RIy{Xq`V|=!DnMLfn{z=%>rLUsej?SVpFi=TQ|5=9lA&S-M2rN`RZP%RqbN{`5Nsj$rvbl{D{XlD!D84A2|7K$Pu)q zPT28j9wh*xuoRz<+L!N6u|G6@k68Xg39%yR-B(7bhe3bD-)9}+QWj2kd}5>XK}O%N zmIrhfAUZiNWUVKf5rDoeAv*EL7zjGUxH$9Q*TSe_Q26Ow@=z(z{HY7;h79NIUSXrz z_@f*rCP5j+@bdI zYbT<;b~C;=;Z^1yKlKb7RAWC;-RAb~r=zHxkfCJJ=d&q>92Q!ugS5onFPd7WnUA8y z-1_{G!@=^M@$*Wp6aH9fu39Z9pb%NF7Wk&(wmvzNPMnZ`GVXGkAkb8x77r z{c%Yrg*VXQ$LPug-6fL780f%pZlVbVub=LCqWZXCETWW(@1 z;5X$W*1+wzeMDttBZikwU{eGi8;S9A3SIn18lP^ZbBN=3l-C(zhbB07IqO$$!|2v z-otYd7AMr&w25os_OS|=RA>BV%Ynm75tfhC*0d@2;pMS904M+lSK*)+?ZQ2(tLjxw zYGC;-4qYr%^2l!HKDRwQ%wi_Eh^u%t_j_2D9TZSUmUF*f=GsBGihk(2 zmV8IvPsdy(V8|7&pA*zDJVlK#fE_@ZCh7SG6 zKg!qTJ$3ft@nL4=PhKS{8df_5Py*+F6ox6`_hZbwt{8Qgz@CdQB*LMkp3ml84@iYW ze`)UhVP~@DS22}!{`|3~T8yOPkv1#$8!aukxl1g?bvWVG#hSpofEKa41%8=lKNW6vYre?Dk(Zt{CY+6# zGl!Fxs&6>Z?xv2-dK&Utfg8EbdvjeG_9B0san(ZA*LDHLxhq)4BbBjetS?3&{D4DE zIW>Gs>0b(r<6nx6%CmXH?5`X+=TYR}+g7iae~u{Zu1rnF=5%Dmysx}J`u_vDJB9)y z69c4De)AuxzU=%f`~MZ1nrz6)B9rtLy;*L#taID8c4CwiT@3JaygNF!x2^xjmqB`L z4H=wTpDdEQU2cH^Z`;5JW&{Zk^Q%I0olN|r|?B0NLe=^IKu-dQV1`<+cs&>J`yzyA@u&KQS_;V2`hNp7@GhRUHRCY%%`IVNGGU z&%vpjS{KLRo=RlZeip&>8^j)ysUuIMry81of4DC_hTek0*teGO>^JYGg-%pYkdY3f zERGpzi1*mD-*}=Vd-9^{m{>MXjlvFw6Pc(?VPJ+ogm-#kS&Gi*z6Gle(@ni-l3(HFM1XVWYMT2{LZ&Dqs7K)isrV@b}4rl69inXE=IY zzdympZ}=r6fZYJ?)7v#@wp#OUU?DwDzu1?1{m`bp{Atd|JwK(#tE%>C>BYWL+`zdn zbt~~+n9%st9+&yFX+TT}I^(mk(*P=-mE@CfuC3zoJY3qln0ZCk@K>BE)Qv_oEu}^@ zZN;evWo{$B7e0Ru6tkH3(hF~AWRz=P4O)Lum#32;ItG>8S6<5l0x0z9cfK zzLBE_9n#jZ6)=={bkNkZm&6%4%+mJGI@yq{WICvxrrSSV1Y~8glP+E zc%IyW)me{{+sgP}H9>^TTUrm^7I2}kgB5Q}?_Uu;nki5x%ti}VpHo;W`dt3dIDJ%eN$A6Bnb-aAEjl2dZBa4?Yjb=((t6I%=J;iNZVvU0#faxy{^my!fd z*dsizo6Zq@!^uu%Dx7Aq1Mh)Vw*B9jY$G5h@!Tk#*Hi%C{5@PG;TZq5T>i0G|61Wc zt>Mq!DgDvq%&O_x5)Xi1N->2m=_4Y02+x{;Q$uV|{n+^$%dMJzHTW3rd@D)c9NUvp zjrIk2s>NO}$0p^1)%ZEb*o<}11oJ7rA{Rw4`wld9DTaGVnmZIPWXJ^btuj4gW-xns zLXR(2-*?=xZ28aJ|sCUAOpS^^ttFdJ&Q&I+q#bct^y zrho&kP#Og`FKqQ0(2sBd%ys0ITK+MILq57_NjPS))NP2>d zpPp`dLSIS;A8k0huZ`R@{mYpc^2Vb=5@GvgC0^I1+ElBZYD>e!GSkk$i(j zi$nMy7mq)PbwK@vFff5Z4l_Vp_#@H$dcX=QcRqGNB0saQ`+YKcE*1p#R-M zj)C4u;^X#g;O+6D^w=+Th1267Z7wCLo8a4AeqeLS<_Cs)-eIEh$O(r}$ZD zKtPf;6W-(?s%~^1%iNBoq(+h7jr$ALGLNYNgeOk5a?(MiTLG{RCYm#WDJgJrsh-oJmpq|}Rzg{2G zHKw+91Z9eAzV~nSi4eyqm}IBiNkE$MhY4TGCP)eTXdn!oGHLT+NbU3w+Ug^X zEFF2&&245g(U~}2WibWDltao8O7r8E9P|wk;Z#k~eINhqObqc#G9aemgX13O6p!;` zQfxVi>vl`cB*K-XU)TjobD#v@aPE&Oc^R!fV4`BSgOPxyxs|9^A3vbR1BsF#-W5R8 zXLc@}VokK=n%(zmakYAuJLr7Rep*Smmn znKOZ)m$6jz6{$X8#B+oE8$XdN=vk<>#F!hx>f?SYu!L^I>;w}~X&;P$XnF6VkGE7) zp-11~S3(!K1qT{ftL0Y(Oe|*DI=ortA z5q_lv;@NvrfwMdlbZcxdCPCf&h@1Cqmi3dSkj8>IQRX28IT# zN(dkoXJ5xi-x5xFX)76PWbIhT!)n)fq`;6B@d9B~65D!NUi!XxKm}OT@W|&KX^nyL z3VZQPG#_#9)c?U~CxauP{}S!Rw?Q|=P-_l8Bo-<5NuKx+MfK>a8V@;UrUpe>_L32; z>{})j{?&d`;`wi3YIW9edg^`m?W$7rB?ClhHB!_i1IJ=*Z!2tIv0RhC)Iocw18!R_ z;u9Ou?^N=MmNaAwi>A37yO`$q0+M`@Jkkf9YEk6UiXu(y)eCISYC){~5JughyjQbe z+{Rm`DLy}um;+IQb1&K{^)FVW_lfKj7`(B@n~*%VSqoO*7=?`NBM2;}|JMkvl|h0? zheBHzImZ1R?o{nU|7(yzF2U@Fre^ppD17lqp@x!T^94r~S8VpCCYB;s>_W|?6haZq zi27;&>$oUm6t^?FTVbXSzSY-wY|oP^9ce1wy<`y=lRo@{`1aQT;|C~Fgkt!^$N9cbe6LK{*!@d;d(kG0kfP5oQCt0`mH4_W@C}apFh5Ul z(|95g8MD7UoD=Q+u5;7V-s!%@kz7^_np(TCaicST!44Fi&?L(>w|Tkei}p;8g!Sk~ zl5dI{xq1#$ZA$fDg2Y#(pvFO)7axj291LfwJmOD3E#@0qyu?7RV*Kg7L<_m2}N8 zP4~2S7+4k%#t_pUJm(k0b+#j;g@;C~w!b47PBY$|{Gl4rbf;`+gq{7l9OdMXvyNB9 z-a=y-D5g8q;eRkg62jGS(S;ev$R+CQy^LvZPUzhOIutzxJCY~%PN0|q8kc3c z*->v6bEqqoC#w6Fsci0Lq6jJwdTtuQ6IfK9==^Nux|}r zVI3hkhDu8k1o2Y`tttYma^;}ik1uY4Qmfo4f`WndelXMMWL zy9k~mobU>ubuvOj=`C1VUsZd#NBH6aZc~`SFtAnVDYEa7op(PFwyqF;+l%Z=l`pFk zIe*zJAV?Q%^QjL zD`AA#hLc_UyPAvZmeIcVy%3th1&}&1E!^)Ej?b@peI$CK=>SCS6mcxXHguOicLmaW zjQT9}!osY9Oa2T^KPf}Ky$NkL?tz88{2)8JaGdP5DIppnju#$+*4LM(s*S%G(C+LW zjPQ}y`^@`Lf|lRNJqLll+>%IbZgJC0VIT*E59y9kqqQqA=7+xeiE(0c~6=8BuCec7$dH4QyTV_dMvQg~%@t_Z1qeuO4tev3zpU1qphXk&341pKbXI=q4CATP=5(F? z_H$&)j$u+_z=(b=L&$)}CWHd?B#k}-$kF6ZfQA^~7;PN3(U5hF`>8u$Fs)zuIp}xX z{+nTKP$I+oHsjxPJGTgdoYD=Wn6f3Fd_(IJfSUBW#Pg2e5Ie+nsJ>-5_jI)J{0{K8 z10Q#!8@3I_4xWG43}66MuO(KQ5-k`f+I(DE9tVI@+PA#JvkX!{1_|o3hS(-wMXMiQ z8&cMw&9j^=hS)-`eH}_tjuX)59Ze2n)Q@+#FUwR)F6pg4!!z``q zCegkZ^^V<*R7a6uz$TpF!Ilg4ATg@-Mb71l!&^2}R~ zGTqm9Rh5?VXwxfYcHW!Rdbi{8(%B$PF6Fh>(dmtLe{YUNVM~c(f0+F@D(_!1V#D!6G``F(`h2{bRG&W(G^fAHU`32Y zNKwCMT{LPZ!%QWzTVR4;Gv3b$j+w6<%u%e3Rkxma37R)Clb65vgbI zBR4;iVIw*!JE1R)>*wx2r)pLnE5<|kIJT3KZ1RgU>Co_#;$zr?VNvaZWgf1g`adE@NItC^i9GS0fG@bVES8*FVF_A}sb3KVz51C+|r z@FHV3YB$1<`o3Eammf;bPApDO!*di*0>XZCL4~M6e1_+XbpY zZdmD;;d;BH0=W?w$Z>Hji-{P0|f zs-%tj1ZN<_JQivK+b#{dnW$0i`km_|uydaPkEQhx-0@fF`Fv%1VG2}m>-8G8H`QA& zUvJ}p_iJm!I(}YuCeZh6i=2`y*|EE=!QNqJEl`u}T%Af|BSs_av5T?8xjJ5?XlpNQ zw(R3wfA6pguTaaj;1-P9+tCEJ_xY;a=e#p$AcF{n z(CL}Cle&`;3E*=0>q5EMs{jsfqBbBHU+l=#L4(FAl^v}gzOjHYrd(*Du(b71A454J#ylzs8i!l_YkO8 zv|7ETlS6jJrBG(A#2ATiwV7#9Vxc@R+9rzB@?u-mA}usR?~KY{o&lHP=1kvlEjznRD7qoz!6NZ~IrCic=`U;WIZ+$XK#) zEGQHq`PO$x7i$ZW&!@sVmR=5$^59U6n^(ZW?Lo=sfOd}r1KgV@a({C9NQNcdwNfOp zLaKm~`y9j+%k}O##W>Z1;6u=LbtepGE}X=lqdmHF8q(XgPxe>MMVSvzMqzNRIw13} zG@96VyRenZDbud|lWC0Y-V%H>k5M)SRQXc_WiRA%qP1DeC5Wo5E?PkR`BU?2pPS5r zKc_G)zuci$6hNDPGJ-OVh4fe>jPR{BPkr+(aldb`EU-IeOGH zLdj>|tO6zVe$N7RY_7>Kjw<0(z-a)5S_Oz6)&Qd6@ZRU9JYU5=2yme|$zFX)nSyz# zRf%hDS?FGwj1jn`YKAf6ot3a@^c#o1S9tRjFyDERO}+ZfR7*{-AMCC$vhW^YNT^tT zrMa*@#Uj}F^hIH$=_TX4Gj@fjFB~|vG!)~c_%;cN>QY7pbnibCF{8iOkyVUG^G-;_ zld{lwM>8DrSnStt=2-_G<3(KJHpe^aT9a#zySW&-*!!GViz zaM|%n|H+1RgJH(?{cU-p9ex)PO97DK$~)H3tNfAEWcU^d0q})mgtZTlm#N$tjn@DX z|AQ)0t7o|C(9qia)7HbKY5oB0IIKUxjo+p1Hr{_SPtFVTa(li7XvV1wKk9n_cEl`*g3;wDHbjCG{ ziR)1vDZjO$4Q9JI!R=2^)ME{tk((glf7xh}5NN*X9>Bi(EWg z&||&GR@pUtQKB#NPaQrX_|~ZIPg=%EHzdr=GdI#;~wsFJxF8PF};sipL=?j)?yen zY|K=|@tjjv)$k>yDPmkJql5C>%Ys;z@2N*ByA-9Ed8L@wtjhK-9ppF+t1wWxERQVSi=pbW&&s^-(Io7ivO4jGb#MU zwZ%Wy_udF~{>RlTR(K64dQY zenHnyWww7!Wkzk40=wt!OO2y#GNw+rUW{nOe~sELEqu*Auv}{VH40K{%tf;Dhe$cD z@k>$c!7ur*9@!5VB~v&%A*@9Umx6j1<-G_$pwsH(R0m$XcU_by8d$ll-Ojy#a4T9~ ziRWd4(dVCPBs}p5ioD;)EXqST_*ANFnoFQmwvxQgRD4_w3W-G=!SvaqPd4MIa8c*2 zWGgCQHmc3^L3NSxs535cx=ai+{9)*DEh9|HLPnHGq%4a#|CB-N)qkfDR1yxo>-%POe=vG*k__ z5J~lAqYECXoXt=Ci=x&O7ekdTu=v!6b@9~2D&0TUH;%9(28yenjHw)8C0l;-bW75Q zlM>-GlE%QEuT>L`g+^{gj_HoR8jU-GG~ zP7x>+Sn>uWgMCu^v`U*Q*^wwf%Ge>ZhfA_8vLg{d7M5k~sxXSRzT<2RG#QURrXo4_ zFkArso=T~%eRdlKiA~@1z?xO{URmwlKJ-`C&Gfh}wZ5s3b*H`#`^RhzUe0rhzH`R& z(R7H~UNZMoj%6bh<(!dsTckX3g?QLMg{m{?`7lYjnpP{7r!_PqTAMr7dza-BQHn z3^uJA$v1IRc?5_noq5R!>+DP`K25CCxw?|ca8|zH8Xiz`7tusAgW=7S*>#f`<-Lo* zzV20eFJFY94T_9v;1^Gln0#r5RzLmiSK4m}#GWd{JTR-u#%mK|zFSRVJ_H*??D*GZ zBZJSy`cVYJymRMYo0s4y=GiIB@v&=?CY>saJ|j($NaRUu8nRi+OhOR80B zxJVxjAtCPPE!ENsUY%BYKTuMtoX!=*aGOYhm_+$zevLG#OF=V+G|5CkDXoZG3@13O z+49GZGEanc?d%8Fr6ucnW?L*hxd_GpyOIFz3;m4wv2!wXBPBbTFw3n5D`Ea_>74u1DYWx4;xnU_I6-*}yPt7QH-Bq|or`*k6Z{7f^L65c#YNBd zHO8u{W02@?D&lj`oV%>XZI$Q3)9f?l!$h_T<`>#A-cF}g=rW#~;oOoUw1am(3|8Z; zHzC|zDQ`&5ktEE=@p%mg@05p0&L#Zgxg}-)#CYFK|H%VhSpLCq26)@~PEuonu^6zx zUvAy^^x>c$(m~27)|5a+Qvc4@{KPiVYlQ~=Pzyfx=;i?ytAk&uNPrj4$q!P*+$2cJ z`s&lktqlN}q~&-#7R%C48mfaF;&Z(V%0V$ZDa!!;0;#p3uQ|(CynC@@NFmg>zoZ7+ z?;g^)IlID%&(D0n0t)c5xik37<^m)iAMI`%DTU+MI6E)afU6nB^me>N`i6 z4NemW-z&3=AJF5DQqDvvAkj$Ixd^|4ZY;GecU$@+Pojl#YeoVj7nUr#az5DCZW!AE z)y4<=D0|s-tO0^$9}FP^jSsAHmP|!I9=u315Y=JKeSR3-fmPhJPatwnCS#vuk|78Q zB04)FZ?2+sx8Qzs`|HSyk9_uT3!u5nJrSXOl7;(m677{W@;6?@A0!C-G5>~9bOk=L z-ENR(fYoqqkkZ5MsA5$vecd%w&`~nAFBNiVxlPhCI9l4j`M#Lv0ZCo4s9K(Wf@*5y zBZy0<6l=EqKsW@a6wj}^cIP$kGRyK}eRy6gR=9_cv@pi5R{E>|w6M*t#!P6@ZPpI77K~L`U6m&i_HIdgnnZ^AsEjE(m*7&f zzF!^VmgT^-dj(G7#4?#rDJBTzGFe_f`*P{|*>+6hV1ET6bLH&IL6_La_xjljZ^H_G z#%A&3o!ehZMsBB|R(k_`Shl})44>7Tk%lQ+pbRizB@bgoky3U){{|lvROAw-NoBF~&-J>^ zkvPb(i^)Tl^p>=(lmCZm6Tl#u|53SA$*>=l@xJ?y%1xD>Cs@SrLy4@FI^^IPHl*wo z!Aa)ZiAL0NfmPvre3TSYXy$Cy^Fu7JNhWExC#W56s$J6MT&u#x#?&c9(9CHW@&!U@ z=3DpuCqBNA7>71(g_ly`m>_C>OWUHV@+;y z#SUycKZWyW1+-wtnQwVko>Z7ZVrE8A$~OR1BS2{iN?g6^2q_Qf(Q#;U)3VlNYxpT# zcBnK=CTi_5IY85vRoD8b9|I5~wCB4XNPldOGUw@8S8R^<^IcKhXP1P_W`%yI0B+RW z)WJ#JtifqTb4dB5l;82j5A?GAxjFPQCI^T85KVXJ2~eH=`ghf=DPsB}E9pN~EQMGf zv|#$jwa>o?l!+6@vILZ|&*vlUN*=_-bG+!9f51REYFe3}&IRM9^@u>K>M0b!f4`lJOqom?6qYV6f*sIBcq_y7~UCKVmLjN_R%7&0UJClBbX< zyc6Dx8YJbxL;9}A&rpUdqR3lT$BlATF|~;qx#o2`s3e=w$h{%>A*gFg3?^~jf4&n5 z84-OD^Ui4w+YtPBsJE<#ac_fPNKj#FA5r&&* zcLv6JGNDe16KP}7W}}NuuF_^>idB-zwLb?L2*z9+Y{Ec%VAV~R1TL`Arb`+ZxUhR$ z+O(fFXsEC^Vi7SuIuzFlnKBiVb{#{k5=+jH`m|Yq7zPA*aDh9zw+n@7CD6o*rVz8= z+zw&7%NeXlGAzMsqat4L%mepRL3kZ20S?tRdQmAm(c-Zz20ZMxmysFlcH^vLZmdIO2T zymcC|9Q!NWe&7;aZbVt<{?mrcKW#+D2~DM*zm~{m94zzhn?!!Ls1FO^9N^oIh`#b= zX2_E>Xx~ucX5#QB6qzDO2OfT9S8vBJWln=VI!fi8CSnX^@6 znz#pUBD8 zzHojioG;=|LyTtuZ{pK%79o+h6oHb3YO5zV&F>h#rs3Ue zQkkWDzhMGR9RtK8OBn z#84dL%P@o2@R&45OTINFy_Wat^tNN9pR2YuHht~L#;=-+ewO&Q);y+~(d}oqKS#Wv zw%K`b$Y-1tfGR0risfg``9p1ZWn#~aZWH~_Ex;RHmFOSwFvX$!J=Oiv@uyqqM$FTe z2OKx{<=1F|6(gy5b`lR-I85{leyh`cnvwieUcXH=%_ijApMa1VSvRIV{3Ge9wsQHm zHO!`mC?=Ycb$+|Z*E!G=`mfF#=tas>d3hLW0xrYE^y>ZXs}o#E|M&PdtgLds)H@S( zzIchb3*}{3`aEP_H|=vpdQe(hs{lvO=qf!7M|F>5MA5|JA-moDlsm9$c@)one8aA? zmcU@#&e)ctiXdjh&Nwk<>1?!0G3NJtOuXrQ%+$*=lEZi&Bd6BjSPP^V>{XlL=7Z&Bjk0DI zx^!X=)Gav<;yxU7S9KLbQ=vNnjTdOGpI4_EwQdO$Z4Q98p|sbA4BK11B9(J%yJgsf*1cXskCv>Gsg3QRtj^GkumYJOIUD zF$Fv~_0djMn*5f;dBP^zO%kcnx){7U_3@CTMCj%(Pd*UEK>Hi`2+q?de;{!dZz3!P zu*GBWHNYD+%zOl5yCRTYAys-KxFCM$=6^~X_XN8+n?8~kz!;^$&wqS86#gpoly5VA z{`t^H6oaYr0pV{5i@g3W&p&iu7#L?FlR8g0MCSwa;&U+DkB@eazSQ&A4igTX1*BaS zkWZMUgHCo6r~6{+JWx88&$4-lk|IV*8yoa|H5|E-9+6S4YVXzM9g2qU;cB^$kga1s z6jH|WM*wz%?$}zaB3rlo86+tKz9&DXXShm@ye;d$kAz6-Ijcd{#)naiOsyg{+jY%e z95H2|-74v!h8@w;q# z3oVZA(3^X=gEZYih=i_|tJ*M#&PrE}b;ntJ`wHjo=Dh!8!p3(ECZZWx>zCau3A^(i z2y`-MpbD5n~bm>RkEjt{AU{w;E(pR|1$**VbnKZq2GK zpPaK?pKgi7|27*8bV_)u#b*F{P~TZKlAS!(B#4~i1X;0O`}}bhhxy(N6IaeAu(Ixn z8AS>2f_pFePqK<7a&Gm_{JopAL6VtDK$8#5

jYNR`^vrq1=Z@E`i*XPmRTro4M| zAaQX8TOxrEEsz`Q>|sf_)}I^(YB2`qakueGew}tV!-sm=8wNx7)Vb-_5?eVETaww@ z5^0cR)8@(JL;SAAb4^6Ra&DeH;l%H18V5bF@j`JdC+~}Ql1;THZ$Mvu@YK@Aeq80W z%G6(cu}yHQycy+!0pf5T5PI7FyxA-hQGy6wLy;?qi$D4Xu?{kq^~bm!wgQ+Dx&gN; zLe*2aM-UMrKiiBi^x5rhPs^_kT#MNGycww1(G6U55l)^~HkW_ILDV+T(rTEgBS?MW z{7W}#45Rrs+koX$1D_Ot$sw);FjKP&0jAQ_I|HrmLThFY*3JJneZ?3~yabYU7v8@B za@hpJv%q29OAjd|JB+uQ*wz@5k+nPw|pIF=rE ztDp4sh7T$5(E;qe64FIqpW~br`0%L;Z}O3nxwizUMb;+ zVpN{!k0*GS$9S-HdX``Lb=J%GV#X9%d}F{TRH{x5vBPUsSo!vfgQt56eVZgqEb?xF z{%b|#Xh~95!AtU&1XMWJq;$64wo6*GF6-KJPkbH2*_3Daii+?v`Zli%o4E00HCEcNg67~Q)K6VSj|Z0QO;jGTgy zM>+YVr}_5@|8UOg49qDZ_ZyS9-8fUGtUQM}QBbt_jR_YyXIZHR*87C58o!(DZED9m z1;4BbX3b%K@iRKVAF=YiJ?Arg%;tAB9YU&Xn~DRM;8!&tSzr9T+P@@sE;K`3#WW~g z>XcuE`~%*>!CT6;9Hh$kN5B--X7TLS4`O{Gx`_$YKoklEJgS`t$cQ9?29E_k_QBKE z*Z<9+x?)_q1fOc64SpvD_w%ak8=^LW4H{!tsw6Twp3mxGyb-}=Cj{7W&I!ncFe?>2Or^; zNw>y$jbJV^6U|zh(SeSSqPGGy*+YH%2^;D-VZP2Y-CkEAkD8Xa(6M3v@4aYOyE_t^ zHX*kdt~uX@TCuG0B5vRB;zILbE0%uZKFzAE=N$N}_jVA8?GxqGtE#M9F&8zWz-NI~ zpT-_9>+r6ycg}}zi8>5Vy^kbXTZ_l84-z?Q0C}Ta3Y4lb?~{0r>8z@;8-+!Bttxl< zGUDO;_OoA6iF-||?oH8CEhIh6#Nc2@Ip?U4*9954nX3{K2Uf_8#_?0FBt4~kaX4*& z;D}R$3#PbuxS)xff(!CEoOVDE#;E~dgg63e0;BIB zVkjS<0tTwjrKOCgbnoAu{ul=mYn{T4mp>E+!}dkx#VA!E0BL)5 z2R5X%hcCq9bhk31p}>|KO%X|7Urk#RV!p4ywnZ+2rz8{+*N>-~2SE97hz$GhrYm}LU=AXWB`Z0#`VABUQYUNRSe~Tg&G*P$rU*i+)YP` zbD0PdD^UUfb^xdcfI$G*R|EhS04M=~6aZj?1B?KW2>@0A@Zk*r&;h__01$xZPyhhx z$RSZh1`oH-@%_s^VtCf5#|oJgnY1pR&*K0<008CzKnwts*(2-BRo`S%B)tJ2eU-wq z9;#0e65WgHU*?vgn~dW+`c=g!MVBIn%x^_tpd&*@%J|sB{_PsOERa}ZIez?5fCoS-m+-!W zN#7&K{UGb|JR`tUT6&^phTgXEhRyU)G?M9<%BM!dONEhudyvjr`N~}AnmIH zq*Z_v4JSDPq={pIR0k(D0HkbBfb;`SS_Vk00BLE+y*M#LXQ>QHB3-*)xg2Pn6^ya4Guvg{Z87U*^FZz*c zva>-i31{(f`W1b^K{|43V$bdNBT>x|;G}HEWpX7*B$?Ton2StjMKS)w%o`e~QqqOU zXTRuXKfPm2BNP*HG5HMX51M|FWuaI98bI!UL`E})&`%?0fdoaq;h)Iex+Pjn1FPSK zNOSOs)T22$^UHlW{S#Z zcKjDc)Aj8-_{0~8Wq;`WpN*j!kN)j{GmOr!hRROyg^oDW`{u+Hd%ycOz(Opz*4*}KJw>_IDYvccOp*T?{tt6Z4$RPQ5 z5hXBPt|RVm&mj4yjA5CrTcU8E@C1MLN|PFI8-KZHI2dV=N|M<=hNTL)7y(z3S6a`A zXh~UrG%ui&>+`T^q*+y|wSxwnsDi>&XWP@K31$9a90^ceMQ=^1HT-P|#B zbUxz{6!K0b%WMz6dvhoDFMSMK72q?TU;ybt0ctNmHFZ9#BtxVt2qVvi`!|+a9uqf`9Vg3uy7P^V-WT3S)PYN;0`4To z)UUt=0GKSb7R|d7F|>%{!KrEuL;>?eC!epsJJ2|Te4?(%{s zS^SsY(6iCDvUy@?4p6zTeHV%EI_$6>*7*T9DL{<{+=Kts9W0yS%bw z&%FpIHgx#{ou=zGL9xig5977~J~n+uG0%c{IU& z2$sFZA>5MG`TsI-I=+DJ{>>u}>B=Gb-k$+|DVigAHqxixb}9 zKUZl|_qXHU9{jD?dau%Y9&g8WLQZ($oEX__3Emwf9EW6(pVcrbT+gw&*#tEN;0;}c zR`G|R=aBV=OvUcrO9;*Z`a#GPwnr}{Ok~T=+`DTE8@mS*7PjdoBXio4OAS(JqDyi8 zN55YE@!Zex16n5+AF?qq=_gJs>>eV3iV3(wbE&U;0k`RYb<1=Cm&Sji!ZZJG%kxi> zL+~E`=OPNkPyTrR|M2z}z;P@~y0Dm;nbBfqX0|PsEM{hlnPo9ESh6fx47Qk=nJjz6 z%*>;|eeS;d?mch!y@=h2Kj!P~sxPy$vb%b!Yib(Wxwv7@fC&EUEc!&c*Wa!9fI@&j zU%&?l@bO<~r|qMM{$`Z{Y^xGb@C&f5v%t360Nct9>+7-WZx3eVOR}{N3S-p@0q0X&eMui??>O#`&pD>cXEEj_bTh5Nq+-W zmAqKnv6)pks*a7PAfcht(cKCO-6e?Yv#@|fi0MkLh)C@4?;D$lx zxj%C^l0+A{fBh!f2f5P*Av_QAJ?5eh{XIvDCUOn({np?rPM`8y-9HUlaOF7v@EghW zi1nR@+D?$FR@+d(f%y;LZw0PJ}ogs1t3UjP%=I}Likq_pkpBLlp9{cn*4 z8G*u-lhbmtQOLZ{7x{;UB-4x}U0PQ4u3&yb&ruYMzx_@YB zegvuBzUbxk;Z2Wp8daz-LkX_j*?GX}?-eZsRH+&x@0+j5?TyGuRa^8xbfm*V!|3Co zytUV57q17134o9W2;{l$L06tuHmOp8$ODM5KZGrLp7tIK-12x2hF#W?c$LK@WJ~&s@&5O5ln$F-5X#KokRP^x zVfsp=>W{K!2N&oBCnjxTxdsCI*#Ctd6mZXVZVyU8RNt|I1gT}Y3A=iqacM-4GHPfR z5gZo}iluFkyt16+a6j{SA$9|M=-csL6h#ii2CVmggx()v%0Y-YmSwSy<;sB=f#vf@ zg!~aPe?;;hk^M(}{v*Eq5%qsWD~HP+)=zdoZ2l34f5hb<@%TqT{m~+E5F?I_kDk&> zo9+s}jm~ltrz;g}t{YFxq8qQoVBunt9verR;pCFy=KFu*BqxV5TYo_pF+2m-*%8j! z8nZXigxP@Ocs?zzVL5D|9WZ2c07e_8+OU@pVtjb6>9e z4#H;;N`Mnw7hmXF&g~7rH3){*kG~J)QwIRuZ?QWCQbq-kUji2#13^cQ8l43T&25Q? zf{_ITXkpm{kp&R$e~4^d_SDi~N}dMepvCbJNK-CkxUvam0t!BW00Be@Krl=)6TJB( z%v2=6_y9{|2rh{EGhMJ{)t!GwVM| zNZAqTL=DprghdI%_SNZ1cwEj0V~r(WMeCRbWI$+;*|1pGR(SH$1qbrY>#D1$Jh z%`YPgDO31h5VHW2VZdb9!l|qd^wzGUDEuZu@Cfy0k(el!55_;EopQJh(Ep}&LfB;W zmYV(uxM)-YVWb*dMo=6l^T8PWF=;(USB}1--TEC<6INNj;*{surJR$5`F& z*5=dS(W|1^5CvE|&s{!YTX}d&4d#466A;oW1FpT0Gs@8i_pY1)ua zGg_Wi%!(GOPlL46-im)M>kv!39a1_@;pgV@J4?kltx%8>{~GITv|t69_rBL(vjEn8 z6!A{;f^3?R@t5|1ulUzWXQQ+|$h=uVnGf$iij1z|fIrR1A^g_EL@X5HMtq?jGEaCf z_zehJ(0dYEvmM_3G8g`v7yACT0J;VX@$`rrS=pvYValHHTfiOtlc-lVa0(#*Kml~^ z@Kad83F6G?-Bk#L8XWj*2BIM0eGhJkDqO%hmIOWY>zo6S2ImP*b`(g+KYslL0~}+~ z(2`h6BpAs$n?Z^FSny#q>HHKlb^VZ(2c4TRP{7x51C=s5oG*+94+I!_32_DG5q1Nq zC`ox!2?WY$SV}+@1`rtkn<#--!^DA9mc)^qJ^O(G_;7)tJm^7&$vb{pxB4U73b6l* z)G~pG@ZOU~11*h)(~E+<+v{;kbxQNRo!dU_mb;p*zMT&8q6d$t!kSv z^XC&C_m&2>^E%^1&Uq3?%0B6=e20G||6fwzFDdw!6#7dF|0PBKNGzH^6aDz~9&{o~ z8Gp$su|Iq=`d>W%Upyd>1Er?kA1W`uMzDq)egIbaL<;y4#rUcAfD*u|ee=#tnIZKKrKNMb~Mi-mct(L=MO!R8jR0qgB>8@h-6-Eb?q$K+9x8~I`LQIbp7Ot^J|-&5Re7TL-zv4P&* z@b|U-*;cvI7uk$Ok@^j(yb7P~-bg|0>*27qeg1l92IiAzGXvkWZq{*lcOT_AgMez-|hBD!Q$ItueI8* zz;I^@n3#D2UlIQ~fKa0gbFE@U`OJ6$e2wIdJW5gNno(~T?NPmLAxwxox?VBLO3KXn zJ9ILW{sX|(EtwoT{{)S_UgpeD!W7cdL^IQU)UPQO^a6U&@~`U!?@iAM6(g1Lh^Ll= zFVTv{1vy{=da!r9p;&ao`@XyE{DRE2yUA;BtH*XFo#`ymGc1A8EbuYbN6%6*dfP70 zKhnDhn^+!sTto5F-&cIyj?XR4AHodU1wP&bk}v^OxzkRV1|pF_8xgq`-d*09Sib%v z5#CJH6?1Qu0Z?A9_>&llpCu7e}2u=?5H70h!$)Fm>qHyXWOV z)AQ@k$z`d z%hp1<*@6g5g9!wo`aR6{QP8|l`&EPI5S0N<>Rp@$v|@%G3SpGy!h8OpgWF$_%1wJ{ z#;qcr5OXIj(3y@?q}}emrx2y9Zt(2C^M(FtvTm;YFD1x0nYn;}9sbyhnCqB-(?j|X zYidz|`waNNK7lCBu?ARazz5w=NM*hmpql90L=&3>qgwiGlt=%F&nKK0cGF{G<~7ds z2j~IaqCWM92@1k4ael+y{r&~dxalkY1;VWN&1cx2=kEUVi6+%xD;k|cv$U0q!)Ka! zRnq#1`X;HxIgb}9wC@2A{rF?_^Ph*Ehj3`e)K@peT;<}0=C|K;r{a;g4v!qskK9SB z8Ft)J1%G8TFz}1$Ru5xUW6FNhtsZ+CFbVdFnO)GY!SITin_&5#&fHB4)?-;fat=S! zVw!*wmN|O-Vh5A|!S5{A6d79h;r=m351DLzWJFu-o8~@bzU0RnTwfOT@#@LCF0%9A zF~fwe%q6;c+P)&t!YjUK*gS~n=jLY}W44G6LG->(qEu%ju2+YGzTC@C0x~QxUiEj6 zV`DJ+#~lHR+WZ1PhpO1v0q(SB{;~vuFKA)*6+-P66e#(QA2OmtOtS(D`qxGut~U;F zG*CtRTF)O@$;TF@|MZgt34ANRNy$J!@mmxR8Dw&{hf|EVJ_0(L8WEB+ z_}-}q5_nT_qj|fL(s9R{(iCxMdsFiH3JQqTL*{}BsAMV`V;k!>u^0_0{QmK-I2es-v-Cm&q$eCJSXZLh|*|Pqs!%dx_OCCJK7L@eSV|# zYf9S>Me}odRr9Wx24Y~@xBk7WJannFGMozFVydy12G#b0L6_S`1>wLx&u=IyS_ZSsfsDxq}p1AU!ar~LOVWG)=z_f^rL zx%HAi21Kdzj!zJ(p-Dd-$h&PY-nX4V^QWQzDWp4z;3jOF)h-|yDe-&lJU6e2)<7G- zdhWNrx4y;rT;EMDsEdDAYvJWn{%%RTlW%%MpT}W~x2c0V*dhM)2U>g+MXWO%zt(qI zugmJ+Q=9KS!s>dqer9>u%|@BAJ|21X^7W>qoCM&G1yLVE4z;n#61dF_ZRsu`s8#>) zp<*qTBlvz;?!_z6Tc)WtWcOCK8J6S>VzP@=Ji)eV&xoG=*5iY3vUXOzEG7y$P&nh9IlgV;cq&aQO7!XE`jLs(U45eqBDO3VIG@~kHxYpe@tqA!w?o~ zcQ$~s71d{nzZFhRjgn&!t6dq(ZhuR{!RVfiJ2v*#R%K+3E@Vr`AR1pIj@?h@ zUF$>B)u@xnCNf5#mbQGNI9Rts{t$X!tfInYE)+AOqFq`T5o!AHjRIO?kk+@l9)vzk z!+342owdoFE|onRE2JMgf{Zz})W$ar%^RZ#eT8CXYp9`y)YRNQv6Y7O(A?RvmDNc_ zFvJL2OY+yBCx#DIk~33)Gp}?|AUC6{ld0=*%4@L{q2FGgWrwO!G#D^mP%@F?oUQ=vMXsMUuL#4pmzFbHZM0Fw+p1J}|oht@s@y_gbQL0@*( zBAeVmDky!a-D%sNtHT5`gzYnB0XN8-rL@JRgGcO}Y*EmrY`vEroKt<4VGEJwWRbi# z73k4%b&Mw8NtLjuQS<|(InjR50x>d1``9b%_)FSHTi$F;MF*Nj_8wy29@pN`n*=hRH;J5+9Ewm9GiQ#fA*tj`1zqNtJ?gaSE5)YaerA2tKk^iqhYp{a~x?q}XA) zWg}_7I=&(r`WCf-Pjh9A+}D#cl}L%Uio?67P-s%nd#H42SchxkoreRr{K?t*h4Fp2 zDPM2TL_x9y$`htmm*rZ#_zO=o?6JI#A^jH$qQ#m{(>2tJmk4vn#!91?hq*%JpvPiA66ss5iD3o z4PkTLWYIS(<#@uP2mHZXxwv%0p%7VuUcgR9U*xe{UZLbaX9qS(p2&W4C>huess^w z1rRd&@~7Z|0%{v{6@Wwh6jptA1cV;_<8G`;!9Te3?ug}fsrDX^&|&&M;6>O4!M)SS zDTxqWZ;j0eih&Pqn-12cU4n9l@QrgudDQNVM29ss$$Eq=H%m2% zMF=W4d|x+Z)To6C{qCr|S*$C&EOX)XjsTPGu-(U_ijqYc- zeLAuWQ2?t97;540Mb2 z=N7PZg4O59-Ny{U$YH$fC9%a7^~PzSh=9S2gxd>~!9@&Q_R*AkG}WUOtJvb4!;Glg zOZYAQjELLI0C$IgD6~LugYgg>p41?|Pb&Td*HXbDWAT1o3z)~7@w3P7jS=>zsKuPOXb1a?6M)8U=_ zSuJ-k(NuMV1sV+XX1m|VT-bhM7PQ-(F-K$1uwPZt-(*q|S)S(2?Wn7$jUp^j)|}-n zQD<4Fw0IgSJ$=^!y_V$bEF>V^x9d3>h63ikW6THcom8Nh*AafUbQxv$nE~CF4yE#A zQnj{SUDPY=MD=3$wxfsld#T_x-{@v8ocqwG&e=3=R7BDB{%_Ok=#Iigv|B_}&zF3y zon@50XQHYhh*Zy@3iHA+jR5B@Zo;F&H24qNA9?yOLy4`fQ7R(z$eeE<5OynQYRtI0 zL7Jw7!#ln;m|w#_bdC+;0BPx!D$0yAQ3*Ka;T_<06`7p)TK=kP(zg3MzD|iVSUwM+ zoNV83MHy!XR_u%X`E;Qn*s}f#Owv3sR~^LLUjG<|mEeWcpn8dwUR zd@aK4-3U`KLFXOhg+|ndFS+%%!U%#+-+bW){Ke;}_IG6)zN<8MfVDqx8#j;M&51*b zB=qNd5U-1Q)TS?agPfFQ=LN1WM_H99@a01Fm`Z#==f3Jt8?i>2@H^A)FP$F06Q$;W zn((_LO#VTcMgGeimWcZ*G)L`HLEZyOZYq8a#i><%5W4IVp0B`?zx`mT(_~`aXRO(IT`YxP*%W#^MW4XDu-U4K|DjO**kp2y}Kag zO)1t@1G0H#7-yGnQacgDRgSuOZX{=yK=H~j(dhH3n>j-`kdvyUOMUQ^A238L?o#E{ zpp^zKt*jx3?CGj}UreJoEuanO>h~@+Uc%Vp+f#Uea|yV@EqA7vJabH%M*}iAS+i0( zYr--hp~i;^^%6LVz@7#55?<_4k#|eB40ptjOSKQ`=8GsMfmhs&5@EH0R|cH3lFMtt zDs=CsZ}_Ha$>YVl#G!Co!MnPg7LnCm-VrZ6C}8HNjg%ff{Aezzr8RpSh0hVyT`l4t z2wTAsl^WGWM@||A;g}IUY{~o>tzZ>iB|B+HdZkEPgeQ2uCIzIB`YzwB7Xjsf=w|Bc zy9wIO_~|vi34#8^L5VULp`9T){Q;EK~Ex(LXau-k)?vVKX1 ztbL$OVUR!1(f&SeAQiIKE?XLzxX!0N;*5eAa7E->j&QZ4aIivW36%)q6QjQJhc;PTUWTU}H3eN*i@+B)0=21>!&BHC^3oE zHL{sceYhs8Bz1rce%+9y{AU|>bEESnm8YvDaLF$9@= zEE8TfHpIX?Ghz)}uj2`?4gBD#hl{}0t=H?JS6#AKE05;_k86SpGnuJ08T51+wRD+; zbeXAi8T1SpwG5er44J76xv7kyGZvpt;r|R&KAnHSYk%!0^MBxK|6zCLYNB{AXDAO zu@)&v$ghe0Karwz?Pu{9G_U=(q_5Gz=e}!C_-juyMz8BruM15nldlDY2ju=|39t7F zuP5ZsVsDk8VQ?TIAP^v&*gf>?=b2YzpdcWiU?3m_0M^3G-NMn$#>tV*+1uUP$SwnYGj7fPcl{4D52l>R|8ml^QdvI4I^|Z?d39DPo@0RTLyT<4@L}jRtA`w5oMVzdId=kh{I& z15FNyaWv1NDs%&n$YbI-rtt%_Jm@=EPWpM~%#f7u<%ArtU{&fqml?X1)_42IKH>OD zzk7%8k25iSPl5S)3#42u3UhoZ&a2mjel06xX$vRaNui4bst)&`P|Xg$xaK+}!M`yo z%VFT9518}{pg5dVWM@gNQ>hE$Pb1<*-L@RiFP_2dzvwhN%nFyq2qlr7(Uu7s6m_!A zH9bQ*Z`=*s477bVdJb?p&)FCG7&w6;EC!zMm-b2Af2O-ZB=&jJ!8*r?cznMZ`nkBs z(;x@_)$04m9l^*uVHwexfU(X&>^B<-hwcM~v8G#?Z*moqzKO}ZEXH}aaAAGIgB5za zB_R85szG+Ek{nZ+oF+SMn?=y&+y0=}cGVQ*q_q;ieUW-T;heahv(CE~AqG+2z`!Ti ze?KzuV7);8d&CAqr?*HzqzJ$w{@;t(-O1U=-r}Q$J*&HyyOJu)n-S%)Z77I; zuV;unqZbbF4}57Mg#UZ>D5$DyNGL1Iyk{C_UjMuQM{iz>6=(>E3PcD9q5qzL6&Vc) zX$cL9JS}~vRbHHcy&8UKI2y<|jFWoy*we;_*(QUz^HFmhi;eE~bsI9&j8=y=Ym~IQ zx3_PteUj0pcD6hneZ;4fPQ5Sb_2^?KH|YGw$Xa?ykQxn-VTco|oj_k2bOqZ?j$|1f zS4p(0YGNa@@!9+mYPs-i?a)5s_@JZjRwO1H@i*u6)x@#VmL7W+vzIFfM28dl)uevV`Z-tO< zYW3*&4tVr+uV9f2{CxCwYkA{X&L?0p{3p@_#DnOGP??A;9UwU zVut(bxvR(SQ4)n7tI5bsC*lYd{hbe6c*W#3!VAdtizJ+yN1KM)TT~}8<%I<8h59_( z3^4!7=GPHCF|{9=25Nj+Dts+jj+_Eq2gfYFy_HCfg;c2gY zv`awHN>2(0nE69y{c-n~!V%KT9VQqj;yt6do3!cu54Fe)pVS+cVupjD_3G^4fw%E> zoU>4e?(JkZdw{;wp1*a0*Ox}UZ)$2sX#TiZX8j$}BdDb1LD)H)^T+h0TdVrGmg^<^ zkCkhAUSbTi`(RFTIO=I!?GxLiUcItx28=v(3^GF-qCQLYPd*JJZi7MjXThQgihUZE z1s}>HL>C*1QctG`XNb<0%i&Gs1RtqND*ASQKO_Bc5$OnCoVfopwpJUip;!zJXcC3P-YnaH2%La*+i}A;cWzp$K?s-xE7M#b>g!=h; z`eGR?!IQPzrHu$O*%Ys99E5F4M#@j5W;RF#Lw*TLtGA!$sn`&; zZICjMQi>*VJjomem)n_TK7^{3p=jDOj5Q1@bY8^9sS|xOR>@n>7EGS>K=wO#f`7$B zF{vw5UV%NxVJJxskTlH+x*CKd>!Z456xP;A_9u)y#OVvUwcOWU*HC}opGk6OxAS2dr>G z9NX)x`oO>SNH0g1yn;Y?bO!VoV*hoIVQu2-X5nt+=;Z2PVsGPP;mX3r$_;$}KAOl& zS7`Vwj}v}JI`azSH{SOdpQ^0zGs>G*%0v#>6w0hXfBhK;-QO0P_lC7QetVX?BHnJC z51GoMtPla+?XBK~1bs+S(Q<}bsD7DXQ43Rcd3qw- z$z#aQY!(FGM{5_=ek@?f&1b)3gD4w>jJ-tHY&t&hsmer8sk6yWR4@^>zVBQ;$<>MK zo!LZh7@di=ZQUAr>(u(uv7g{7eL%ME>*ajDC`omsrC5e71&pCm%vTRz7=#rH0T{P8 zGSmdRzY)V{u^}PaudVd*1)0HhVO^7|GrA{%+RI@7g1H5&TAq`IVMU{4CqgS(R)|*xLnMZh6(-Jp zCtKH>CIY`HHOVFa^izDPylsrH4{bTGt(dQ0pPQQ1m^z^R47cHprnfN`$STEZ#(S5q zBBzcVjmj?5;Y}h$YwT>#adnBc5Vp@nHkyikc-Mm0gV#xWvzV7P%pnuOJc3>hVdkcIb>+v;hNK3IVYOM&)Fx299Hc&Z^ap1mfq+6|E zVw3tA8y#x(?M~{;Kn8kLf@$Ww6eb+{o4&D_cOSyPn0q(dRWwmg+BVd3NOE=5J(f<# z@4@EjO!y^ql0x4pEk4>bRIn;yvO?n&7?lQPdf^1XFybT*dw2MXrl8 z(p4(T8bXg>jZ>O>ohqW5_5E8*Xsf%3Qv6RMRAc3Y9D=nI{ClvUJV$c7)8X2`50w6O z2r2qM>6ZR~9!R#qXDFlxKdU$`UPya7epnt_SJjr)aBS>xzi~x9&cu=zTFR z5EnME$o@~_`}g7Qf7Cwp&yY6%J~I8+k+0N@ldUma57}LX0S9hdB>d6N-mv$APA^veZQF<_qv77UyWOP zGe@{FI+h&7aM8zLU(9%(t}EQ%Atq3&T2NKdM4`CgDt6Jecc&+@DX-y`rghJqzV|BK zqCXErT>1s$nByfy0~u#J)?em6XHF*Vftb)bWLhC~x4uCvh0;du_^7|>VLC}Y#C~x( z)yE(YwRXO}IvP&)a8Q#klzwg2Jtz~X(-I$YW=wdKz_&MqkSdnq$X*fcog8-IQq19& z>@CPq*=^@%#X9aSRpgvnT+87Ss?f(}renOdEp>P4fA)OXv9Yq#qXx}%Lj#cq(Rzir z*wi0YVngp{1FvPzFJT5ND}I&I&C~@-*uvqZ;H=Uo6miHx>m<_dOdgZLSh=W6?8IG; z7po|byeaU|Pm*PM`a~9iU+@?oK31EFFmINIy%cL^bvTSrOB);%f`Lf~7u3LwH#B6b zHV?}@q{>3_6_Ssxnz>`?4*OtL9RBzGM+ougn)03?;Avh^zhxm3#jrzZ?eilO3{i~{ z^dtDAjNlOI@?}c*Hjwwk8OjBUXKFIUd%)Oa16>~ZkL@n!+k9vR&x125Yt}pkV8x?@ zn#Ka~=p4tdpZaVK&sl;ln>sm051IVcDg5>0Jbe~rpvW$THdpGvG{L0UBb22&uP3ttgOLeUFo82?fIlD z@ONetsCRYaa158yaLDHVR?e<(3DxiUhUT-j3P-~B^+Y;e1LgW8!e?D-^Q?A>$GP0| zZ(9@6B)Si6&OK3k@$L?@z#{^mTg`4roiLVV{rH}AF^Uv@xm?s+Xo+An`hKD0pk%-? zn}QLXZbCPq2lI6#>pD2(#)nbf&Do+406GaIJZg?Q!QA&b!gzi@cAZeQhhm8kSIWDA==_ z5xR-^uqjl<2XzR|wuqEx19yVsnxzHMe+VMnb;~r6p3BHmP)@ZEtd^edNM=&jM%zrF z!c2R}bos7)u?cQ5CUAxiHA3ao9=`?in7G|Xw402+w$87`Eb3a9|NK#vFvA0A4W#c z=Lm2jTkA&*IxqPAN6$vKO&)OBZ^Fqu9fn}apmlNHxy5e7%4RVkp`$k?Uw_cg(FzIi zc(I|uI29B2*^N5=T!GZ^V@q|%6notBz0i$2Ke>gg*WxaGt?a!LyOpci<{ zpRZQCUYpbc_BL$D2;fT^)Xgr~>_;ZpCo116>S&T6KP9E!ttClTEJumo_L zh+hc0$sSww(F-0Gy_1n4zTNP@wLQtGR9T545Oc}yogzO!eGP&!mXhc zX5Klbft?!-A5roBzVX|X)Ws5wdT{JU?*$}1aCn@=44~&Mw@tv~*UupT#NgmupPl!R ztp6+oPdfC0h|8*VK=c3=BK}m?vThZJ<`)(+Jl?fs#c$A>ZMy;aV#*IQqG%YB>F)I( zQ|7;Fv#a`cuM54WZE~vmMowqIpwrW$-v^nu{m07_a9v4Lfl#Lv5k~!$mgrd8pA)y$SmvWg*N1MMhG)=X~F{9YKX*|zFrS@M-$7 zw$|YW_t}3AB~@fya||J{a|*Xj>}GH)RkAL-+Lk&()yS2??~+8px&&XaL(IAVBA}>6{5kB6fa_Y(n$<`Nu59e+@75Jx46)xF{<1|58}i3rZ`k~Rx-I2&ai zICrBH`tC0!o22597(xBFC4}nh2ACl}vloywI+Ac}SahKD!EubETWMS)Hv`1`3TOth zZy2$AEXraWI{MEquNeO1;_e2cJ(_RGZCa-h6PVI2yhx^)&OI~J^H=(TVb48D+%0fo z{N06lHcp_iG(-S{Zul&jn|n8=h|r9?4^L|N_M`JsVb&YQPFH3msle)~u5csI`>}o_ zQSjxtc34;GJriahI$uXmWX08-6Vnm!c!!Iu0OE)Xmcu@B0|M8>{t_1%3<0j8y$`;n zsY#Vg;#?#R5s0zBa5g@Pe|mEPuY?l1EP>Of-0iHPh)J#;wpqGBJ|DVTh-rdA;fM{= z+jLK(_{A;jZ-{*(I5_*s4B`uG&}44r=VS4A9HyCNY9JxRPS41*9wd5++zLdUj|eCs zPbF6k6tW}*FlZLG6AFo!*-0fqY;mZWdj%4vTMfwY<@ANw_#1EyI&r}yrbpv+gZUg? zpNbb$U{Iq=45LKE_$M^8!`MF%nu~iMTeB`Eng%qVn#v4>hQ63OdoYULOidx)^?GcE ziC z*BySQ<}eovED8+`7yDOiW%Ar?3@{IZER*{nO>0)`0LDfRq{)h^Yv z$voRCpP%8a@>_RfWfCn)<$bwbB+@AmMo2VfgduDS3<8|H)ddDVd}6HRR)tdY+U?l- zlK*G85E>BKff#gbFzr*z5&z1L`&PJ{?jxikuk;*7&05*r1{+Jr_v-h1U$o(eFCS&2 z&2Z<4nJYJz`e9ZKF@DHG^VmYC5;`Z&aF!-v${~u8Nk1@A>eG0rVXyAXp-F=FyCo{5 zq?S29#?fK2mO*Z#35B;6K9IO3YQUtzAP~cr8AdC5TT}{kev)u`AuMuZ;!b&3tXsAn zml)wr^+=}g;Y$s7fbyysEVj{2pw=^~=vXrB;0k%yjS{^PJ+%_yh?`#$$kt5-p>HL< zba2^Zn;T+JY@zDm&7SSm#7|5MzZqYq`LbTo%MA3uM)|Ev5p}J4hbKyRp#!2yRcD#2jg=6wo z7@}lTxO-#P<7W;;A2s1YvNVvMk#G zd81C6`g+Y*h_W{nHXk?}>5cggI3%vrwts05dNrmC;M-fY7+)YZgXCr=K3+)5y*Y;s z)9WTuHg-!z(7ZU6{sg^v&iYdudSuIt;uAFEH*x7i6ULw)qeazwG6Ua6XJ6O?8AT^D z(njg$gZvvWi_I7GYI;zochR6Ej-aZV*>(Gd%8RcXnqWp^CkYj7&qLm7-Hpia!HfHZ zTNh;2KIF2$`LgA$sJ|A5q~%bGD^B9fvJ78xj#*RdyOhil@xS^Xz$rLevCfu$1~#r&)L(P276&Q zeq=Z8H=OZcyxstxB>OZu$)`;|FcqZ7B$RO<)13)>UU}5t8xUgE^rabF zGspYb%k^~GTiil$2$L)C^GM-4a1I96&wpXfab-76=+AYFqu-N3z)`}Cu$gIoP{-vh zQVSPVmL?O7C6J3R`F0vUkm3BMdC?k*eXBvwXQ5w15kEC2HRd!}gl@Qvot7eZxhTYk zUJ@5th*04+eY&~oIM5I+8m7-u}MR7SK6(W_dYKi11BBlJhZQ0U5YtdB7ek_Yp6oqYa!wHOX zfW<(7Eo&5GLiBsHD@`186`BWS<)in80ZJ*70(6X7y1#yqh14^vYPm8N{6zcLPBqPB zowCSuA5wwl+vycHub`Yx>#01`i4D455*Eq5P^+{9=Ar zuFYvF6BFr=3iW20X<55O4Sd`6340=mK%s2=m1-`0YB{ka_uJ1-dDjI;vc%i>>%-yh z9B5^>0!&u4rSy`om2k+xv%Ip;Em)Tu#i9$Q?G4Pz*FNAYF$B$!5GBM6%<$aTsaKqW z2W~vl0W7hu&sn@sJx$+yNWWky-XHCK0-q<{1?=;u3#z?c7=mFJ4NR_sr$R|Q(nlNE zV*J((DTWGJS@PTd`@o+10klLQs_S_A>-Ey4*b6Om_|6Fhsd68@4$hG!-D%*X99E$S z9V)zwJ1MNXaF7J0yv$IED&Je;AQMnl{1_b5shPA322O54Bn8I@t85Lp0~#Ugi<7;@ zrikgLew0dmngN@7cE;jF@^ZxzM4wR{>qpaA2!<7^4nxEZr*)`g1r&`kweuvXJSFzF zYcIu_hyh#e-;@8d~I9a(Xf9{O`Rq!R6Z&S0&dp#*IJi)kH=mu0+ zcieO94<4}+KISLLjrJ^St-d)3&Xvah6#hRAy2_WO(eZRWOnWkND8BRNqJ%P$TV|GZl)zd<~-pJnxp56bi!1q>+D z43MS{>unBw?AEd0mL2(4eQ&fHK!+Nd>EXMwX_xW#og65s5z;PZ(viB%JP=1zl7kGQ zH@6dDlargAzQyGr2}fmkd{mP7Q>r+G$|IJ(FEY>Z!bv++;!gAQ<L4-+xDT)?3fZSKBaV|1v@F0!b0f zF|8xA*{7e1z>)l9J}xU5k+!i>w`1=G)ssN012GgESQCkQG^ z{Kzq|iEeZ9-BtdJJJ;nY8auJs1Zg9s_|}XLUpJcdn>dNpmgvwPnQqTS7&uv`-yGHJ z9VveD^o0}#(GiG-oVW9}3j6|MJ6!MW68251k=f)vGNEBhQxxAl*3GBSY>%m?5<9alP`+v%n} zW^4^&oEgo@c7=G`T$8xj*h-J9*T8Dw2*I^n@ zl>>beEk}z8Qaa_ZNBlX0rfyE?uYRxcj)L1On8N@jMMnyaog>;A${=oCc? z%?5GKPlqJba>EaLdG^;6RNO%UQf_AZk~mPKvZRt48XX~zk>A^TW~D#9A6&8GK$8 z41#L$n1~m(u+a<;ov~)W=S6G?Q`AGHXVy%`6yXeRx8^X)zE_z?yQuL6M*`Fe_Eah^ zO;j0;tQt*T;yk=sbD$@24E%Y$JQwRLbnJ^OTpsJZE7=S1j|J6_g?+#EnzoIn=WCpy z$|7J0i;Cqil9n){+}|N%CQO&F!k`&Zs^JRdH2BtW=Z0> z)&>vJc^+LKdsi?<_c&RBb45gbW#MUTP0RQQ>ZpS$2EQ(Bx~<6^eDvTvdH=*xcZj$V zu|~ZRC@dccz*B`RWwalJswKEGQA@Ntd02R5cPi2he&mE_ z^hDBLXvjF4zZx;t8et8dR)9AJO&ONS4AZTvt7c&z-G?~mMMQNi;>OrLxHM=UXG~U& zhN{MUbg(}KGx^A6d~@M<7mO71 z2ulJFor*WH@~ox{_=NJrTEV^CL=t>$NIKMcR%F06k)J^M1#jf+N~KgEuzOD#0KoJR z1?=T8o&ar2VASqVLLpj{w2dJ)06wy$#-xv)0mbB`2JiUBY@!zGBD{M*!uOC~AB^{> zg9C;b<-q5PBFd?re(%?Ik?4Domk=f|q?|y3YC@xH_w3z+kWu_SpScG4V*FE0Pn2(@ zNT%mlHLqzCLR9Gk2>TYmy1i)G5i+WDQG1=0NFPK$N(xD1Ub%!!_(B5D$FN>YB=wwG zjV-s8F0EMbAr`3m$goewH4#44oJqUTOA56pPZicYQ!A3{r7Tm?saVY<{Q+w;PfyJX z6~RiS*dw|pQJ1YSA(^xQ40cf)NQ|SnF;r7y*R6TJj7K2WkjrT|DL?!m((ZP{mZA85 z?mK&8kb&QT+9O5z+OkBhYstQED|U@j8+U09^fSppGSP)a0eA}>OMhZte!b%x4{{dM z;R+5?J}%@K(6gwE?x2|!YLoJ^OF+qzY^iIIg{VgkNS--1{?ueoFzT4W!jG2B$Eh3Z zC;jAyrD9Aw>21bLAD)?~Qp0X z?vs22SPwR*6}bYd2RK3ftc|I6CB2$$8z{6csqm2^V&83m4Hkc*Mma2`-R8<@O~&lA z(K1w~-7NGIFKvBujD>bTiFIE0ndq)q4zIk4s^eb7D(VfFA=<`Kq#-9?Pm0GjWGCN! z!gs>SC?kG9J|pND{$ZF=vJbBV`dgxM&Bna3>{1j2g;`x&WG%8_;N z=Ba^4T$6CN_jdIm)Y%ct(%-@HG7JOt4JB~g=3unWF1m+OYb*9&Ofuv&D?5ItJQx%s zoZ41bELYFA)%KEZ*@)ci_?U}^syo0!j&C%nny1dE8X4$S2hY91ZTzw33HtpUZpPWX zJAU&5d=r+9Pas*gG*u;P1=3`bkn(y0H%uUaN4y`sU#fbdh@(xSD_cedJLb*y3KE9;PGIJn@3(Gs8QvVX0wL0PwOzimhxU*^Eqd zSDf_{kIOe{Fq9W8B0apSbohE{c|Ykn;F+2Cbk&M4U+$mZf`W^ zsygBg60xqq3J;$h)*oejJ;Zl@wj_^3NnVz|Gm{>tx zbIf2u6;aX_GO41n>K`!=lg4Yh5iwiEpkoq1RQqbxI4O_8Q-!ADvl%lUf?V!a2Nem( zG>ga%pLbNVh@B{>i}2zjT3H=jmcG;pJ~Jr3_W+Ns-ybL%S3}~NEgu}>3s5zxlVhAx zfAG@bm9*2Ye3a$UAfPog>M_@g)V~2CS*f?cAu~Lp-iW$o0@!9&9#)E;sQHlVFx9o zhyM^zjmGG2uz{lt!JFpBq3e~8h3tYH>a7kQBvNl^tlIO48jM9%INiE+EerCemhrZDoRWi{N(Wn1SjfM zCtDj*AzX%pN|*9-oxN0%OId}9bP(fE`Sn+)=|Rc-Oz9{!w8T_x`o>r?d2B1v9zi+XSnOmsyH&cFxe@Z*QFTpy#_-6&(v&l;K2OiS_!q~hJx zR7y@W`z#0I#nm#`;mvmc_{;t;@uQTCU9Hx@o%xgKJ$H=D0szd%`i9S(;)fr$M>fZ! z0owzjwYl?)z7!&xL?VtWAaMp|p*6=&C^`~2Mhc$;(_oKa9~mbWm`#IP=E_n1BiM}+ z&wAlWKqY#zR3JCH==JY2<`v!LZ!Zfj50b9<)XK@~qKno=p2y)YI8@9RX*JD6?AbRm zu_PxtcCdanYOc#3oB5ra@&^WLf~3d_aXP!Pll<)3?zjd7&ikMohmfu~Dt(_y8K4{W zhaRt9+`nwvb}ihQgnzeYIVEFusy#8-S|>&$6*!lsVG9chV)mKAhIv+RtYARmfxKkdidpOuH=>XP2{kL zb)(DtGm6Nwa1Gz4z4jB zonJw6@ThX|%(<)pxdzzeU&}+AtMPK>zkI1r#0pv};t%$lb87zZ5Zvlk%wsG=zjJt@ zL<&PE>DY#RX&|cbBtt@#-e_1lnXpfqn@XBptt zZfvVKjG3z8dTOoeU@e+S0kjQUO3S+f*~$&?Igd&4@R59sgGSm4B}OfI*W z*#&oYFc|L%k-KIWepFkX(`7^IWeKp`nGu$xCnaJVt+a8vdO;+CvfdGUvTScZ0dO_fNo)`OKC_;mr!0Pq1rw7 zSPJi7<6epLJ$qMbz#CimRv{k#K!4Fs<*od%1mOD{t9oX$x1vd=yvr=bu|obD$+mG~ zg(gr{+C1Jk6BlX|jraGi)w=S4BAMwLFErmayfxvJ7ev$C# zTIZEI!3tGq4CM@9jz~{lmu;lMH<1@QvvamV!2P~z>EFwVZum*qfv7#a6*gYt+3u?> z*A?==M6##1&E^P?m%v|^_Gmh#Dp_&)EOiho@gJ2V!q&w9_D|C>Kdk^Ht3o}Y^S=3^ za15boq_e?-WW}u(`7BhU&&D(8syYR}OPY`7JOAj7Sfv5=yX0wQ3g8HbjX=ue>~F2} zSg%Lv@{ku+W5V#zHM)rBa2rage{J^CD9wDXXPxUt${Tal%1Xo7i<&TZxJ-;gmvN1}__?JwGqjbNWm2-mGBfNh^c=4eIe}(JDmRU1SWGi-5LJL>XW)SEsgvF< z^jR0YfDaEpu+Ymt{MrJGL2Z(Jd>k+es>}1?_?PRX>fM-rJrBftb#_cXaH;B2bW7AC zVH8vpA{j%xr`h7J4o=oEC4PWmSvS*u-;9l{(a_Rp)2K{B4I?=kIreh%Nz(w2j{~U$ zqPql^uMa3kuDm?F$8f-8Z94?7qh{Q8)Ub9ylY;8Y@w~e>Ey(fEhjF?g%DrvTt$Bz= z-A)_@3}97Ee(mpnV4io^Szk`j6&EvzOI83+Pf=C~Ljf%QT@p_3hqdNzZd(1B*IlK6WAM`s|&lRABV*tb9n|SsRwPag(50Hv{M8cCAJ1aYUnxvLk_mT$YtcB9f#8?1QbK_jgE8;&|E5R|J=3Ef@4!Z1y8FNAU z3i#WcmFngiNemJw=XczV87(5^3S9d17m9EIM7y3k%bBv)zyILpqiPMJdYqy1i-2$& zq0KX+ZD`7)Z7QTHzyunOG~KnJTT1IHo*6a|GDk!$3I7%4aYyJDA-p6tizcf%p_33a zK>JjEwa2{c(MVI|XOv5eBldLjO~}UavzBf^LCW3dh2RKV{z4vzS1`5;uKf#D+F6EW z;jq29E8!5YxCMYCd$?Qi#Kt8sqjhQediHOc_xGtQ$Un9z)ZZ8MH49jC#sxm|$zn$9xl_apY(^cB@R|Cuw zROnpO)eb*luPRGD{_0;UC=F|{7Lj}-x0cSu?G`(y86_+ca6>N`@StXJJWBRg(w}nQ zxrv#jJ~2m3g?H?ZTS!d12;2mZYl`Q7s z8P57hTRrHm{0t07v?+chEyyn@B{65en*kHn zMKu5=4gYx|bg(Ie#XDFU@1Ec2LO_XHLxpa(RT#u1;0K>3~td1RSR=>i63wOB_NY&@peB0 z^yVZot$C}2Qz8{wwy|^zXj?S;L!DNZG^}jvFXZ2~@3%IH)Pg;JifVt7;<)%h#wnObGUH{I<(_=6 zC}{&1LI(d39$l?ES>c0HSThMqmqO}fsj*J*^xs96I&d122RtanB(aV?%}a4HiWxAh zfum69{is^>VK}^ZeRTrS6yir6Mypx4?D2bJ&vD8*l4}IfvNQ(omtzaeF1g?rep&K+ zrDU$(Dd?|E%1XxI&VdL4w=f(K-AhX#=iWv8=I4gS%uU~o1r~Mq3jcBPWm9IiQ%9@~ z71Zx;>0%NL8wtkPJ7B@o=DS<6l7{_3%48Y-LaM>WIRn;6FU16NYJMxfT|$ciW=IUkZ79kSh)~7@TMI_=%nh|B?^& zQO9H}%VosceQy@dx3F+%5NecPjn`7Bi|WgW8+|5LE7ixc-uA%+fBBVUdFU9d*iodv zOGP>%iqI~K-JDomXtguFa(h4uW~Viq%PHYNJ2k*upHe8_!^I9N@lQK3RM-8~AR@ow z9(kg(f`tuc4|2}qoivTmj<83yg|UZK`OqiTg2YCJno)R3k}FM`vpPIiw5CCboJxWX zM0VzIF*kpVCYhIU(l-xx`coe9$!3!0G0RAxS==$^HQ=nbHqr%yK^vP!M(@&3MTa$a zIOh4a8+rik)d}#sXjy&Ab;Dc;{nz43liRYYbf_9l>`D%{YBst+ww>tW$YP1?*}j(DFemegIcKihP*1DDhrLORBh^(m>Qzs}e?@x|U(Db@`PC zA_0bga#07yfLamosoad9T|Kq7{f_ZB!lz7r8g+Kq$tXwf`!H(gc=-dQ?^H98VK~9Z zq1|)a*9xCS)UTlS-j4UqfDK-Boo(PxpDGH0rwGDY0R(V9r^OyTf703+v6p+?JGGyC zG~H6cj@~nPi2d`@g}!!yo0nbfpZmkl1FN6=9#6;{J$+#Km!Kr0xxLhW=w+p^9U#cA z(``fak@}C?fE_}Am8zVlh;**w_2szJ=!@&=`hfepZXeQG!5v)#cyFdJYB-4#zUl#QKmR*H!>acuc?bars6hb;h~YmBTrk?1GB|oo=reH*Up)9v+k_GGGDp@H4mr^ej( z68e)sE-np=fzPqZ!gKWdj&;`y=b+v&&3y9MT*?LGQ-W2YjM=8Hx6A5#HqB}vXzqA0 znBsxOKHxrf#!4g`mb1Bl^Bi0=t!+_b>_Iv5cSl+ix}jFFmXBFaPU#iNaPa-HWM(x> z9vb}!_U*?+;QLI&7GA7+@etmEdi>cr!`Piqb z95x)p{>@82xk#B;;(R@kvqEN5BoN~`3PrNi6hzjT%+&0t@xB(GM%w~hnwOuO{Mtt_ zIWm<==wR$RiX(-~H?Ay@a)VTnHBBx3H);d65p%vvfk#G@r@Pc3xVW6Ay9`hna>qx8 zoNyfZ0?q!b@L(gkBGz7$^>1^5aZD?0Nz;ijxUs$QHE5C|Jgi$5`n+YVrc;v1Ku_n0 zYN2mgZW zzwC?0LYA# zN1~IJ!UIU{wJ=+1i9y*JY*uw$s87d~zkP0E^T+Qi7>P3Y?4;VvM zdT4{w|Lx~NQVQ=3@_|-)!nfjC7m5-_%zk>uztn1xe9}(Wv(C>gh*O90h{`L#PkQ@~gSZXTjUQY6H}Det#XdU#nIt8$UZYggs-3rLmH9#xTnoj`%T!B z^(>_0_}OfhdV^+ zPc%YQolw{(@q2!Y!quFN;!Kr2hZ%4UL&Dvo!#lY>`DeW?I=U3>vwBRv^>lN_Fww&z z+KPKjLsHhVRylO6;JemTpihEYmq)sLoa)&f0&`x0SzITf!`3s*uSs;bR-0HB_*ycY zqe<6wU|Y9hTL|j)F8#WZp!l)EyCF4P{-Rf=55tlc&RpcaV9$?juh4BzRMr)! zKgS$tf-;Wa$DpX6+PLZ{W7{xXqMOFb|CbP^c*twVQtX?66UBkX#9)Hy!7p&ILT1o) zGpgh8m~XM75~OE_O1?G`Ntx*L?t*FZR!8N6oGD0#R%epzk{)-#x z4w1J!UHUd4UYv#9<;e1anmrMX$}D?4T1i8}&7dY&+s1=AFPX5~wT(K{k%S5iW{@f83ql@Y`&AR8D%Laco zGvBbXijGw4?fCjmXS4Cvga#wt7M6a8T4MF5w~0`dKv!Q8cfaX zng}o$XwS6~$i=1fVr$W;85boY+8vh&v&}eC3QgL!E+8J`d!&YHriyCtHo-Av|HilE zY?e3?dUgJHe2IxhZ6q{r%4v-o_(Ea@oh&CB7cbJ3xU08#V32}*pFktu1gX>7{=6_I zLrbil)UNy9(2t8%dxhk;(%&|DYpZZvREOR8KUZ<4xFmS@S5Q{A0fpkD+R=tP%P-jM zqV*Ei3c}c@w|(j{V-W*I1H{;TBXwP`>;rW_d#i-6=x_qoK+OWly`^zG;qVsM^}qk# zQ{r^3aOxVLX@u82^;e9!!>oBV^`RXo|H$9p@#p+dXP8VMjkU2}Dj~isu4ups26#Ml zS{Gl@#w_vs+?QIW>m@%B=1<1UA@iy!xWaQ?16 z><$Y$vy`o)tq`@rrm@Ae(Imvc9bhbkd)5FAVLUJcn;5RsKX=}PG{V{%`bS(f)gwd_ z?PsVdkMZ`K3TcvLnA}i555>z*yC%Sg2FU{3cV6?4JWkrnaZdud5cG}^-B4ccY#W%N zam3Y}#|qCRCyZBek}d3L7b**2G*}UJ#`|oz@E(J)BFMckw5hcPQ+;|Np1}1l_ewt` zJP^t6yZvG4L3(?u%G`}mP7qIvEa)f_6!AG8LLUu{Vd)Td0>Oi~Ma4K{U-EYCVs^KI zK5to0-K}zY4h*J$+k~9y+*z4!7l3xyG~29dJ$>E|3-yO`7r2T3+ePGActar2MTz}< zz+-6lDI*Cnziw6p*Cc)*Gt@2FX+KW_Bx^K;ByObZ(}9Y=DX^8J{2pYhvQ{8k1`ci# z>KZ``n7_Q1sgrOQaY0AK+o;8Gu@-PQ+sWmj?wtQ}@jDM8G>;l(UzKU!TD&~sh=Sye z$VfZ1p;(wYb-{CRFuK$6PL0F=ee$_=1Nc0zPmFnGu~WotDq_6gMg5f|P?bmK2NSe! z;jpqwVDe;c@3X2l+W0YnUSW7{A%|IU5VV`uJTLAK`~Glj&%-dYH63gQ{w79iRN4k1`-ps6pv4Rs3?h0^0J?+vnY$u~Hi`8hT82Tb3 z7DY}D$CMsrnp;SN*nfVavVlXwxHMPmGv`>vnb5kqSY12_?7-3x$$3JHOALhd8L9^c zO4pWE&s2H4a~hSRrORG{tI@NEOQ)ety24Tv?^B9|{Z9>yVGeOEsVz*!LM#)`#as<~|2hs!d zO#{#e9VwnZJ7BYWOAMAVWIx&W8&lWZL*}HB3-O@c8@WGsWXRyq=v-SNNy7rX??zPO zniLQ^Am(X&;Z3*+PJ-)#r?B)S3fELpke91c(6?%Tzi!nf%=m0qYW^Gf37*Uvd*uE_ zC>9Zm$$xWIQR?26u=ZOX#x!CR-&fIvAZdc0>$8Kq)WBiZ4EbKasE_tLU_)@Z)NajV4gEgZCuPRhY&B;}&I(-&}M6 zfeG%#L94ebfVgG85KN=k&G~WncWm?REmgvR8M@8>1ah(U4?VW&FA{s6(4KpKgS5#4 zO(Bwcse^KOq+cVH5lnX4GjTjk*ySt4N?)C@GzO0(f8B@;ibO7+#$EN8d`H8EjCFek z#fXG)$fQ#C3rO_FJuIO57r?NljrIE`#klV(ckoz?Tl5d`*6K>NBu~?u!hAI%jd)C@)QL5e72yG6tTSj&fGo*oHH46 zAO!H=$#CZcS)DGWde}kB$`V91L(^HheimC~S$g!n)0TJk| zpwk7K-J7uWRyz;uc#%E%=)xfODI>eFjX}XNIn3dLJdCL?KFj&Q+Pm8lEBEwDbe*uc zQr$D$@8DVJCWUSFQxH8M8NR3Z_w$D zK}i<%_vkEz*VBCDgmPRC3cvdNKAf1&!CmKDJv;liz)cmviMH`#5JX++AAr#~6Y@Bq z1omZ8NjM8G$`lq@qQW6g5XZmf2Y&vK;_L3LahJ9wJmf=e;=vzz+taUYF^v7A76fiK&zvB&H4}tGa)2xw2p* zh%rzPk@W)=m@PjA+<=ftRjN;*c66e6~QrYNAqTq zs)<`q*EQ7-cvwB6(e~G+7tE~_l-pIkw5h^Z37%?hYx)}(l90L;Q$w_I34bnusY3K8 z^bTV3SDA)IRko#(DY2XZ!5b7?Uv^g-BoRa2{eyDorMsHzsH-@mx-!*_&2?ufwA+5 z39I9X(@b+X?UI^(wd>OPXba~@L8O_;^>IO5aDX8_c1UK%bydXuJ zmyk(Ywh>uRe@2l!YlW1&0n&biVJ+@RPCIIih2WHbK-p-j8XHxb@k%CnOp400R0`fl z3!qBgr-hebm3Kqg>VY90Axd&kDFi@7EpEJa)TUOZ*$pNOTMRQ~Wr%_g7D;HQV4M7t zW%-aqt^Sy$M;Q-4^4imA+R(8FO51MfXd91T2By0jc7@fUGSj8t*~Am6(axhBud6PX5)=7}?{su}D2%?X_5SVJW)?gz*O zRsVDA#DyLHmkhHg$7b;r;l{B}^5E{(N{Z=YaD##qlnr4c;~+>e!JRNMuqzeqU`$j1 z_+=u+c*&I0=0G1j+9}SSzd9w!8q85-%1~?I_>j4DyZBq>@A>ayyz))wgI5#Di1^jo zAgnpqbZOQI$twE?Y(ae4Z_E9fBK=-{S>6Hg%g>eG>O!5RT#hZGpe?MHgBBq4R>G9< zMibMZW?9$-cZIg6&k>i1jb9cKmxoV}g7ie~=pMlkg5~({UrV(z&aX7S&?-C*#)dnt5>16ufQUGE8@Y;;Casa_){Qwm^{L(l z{LLAhZwdSW3*8Htr^}~Jjb4KyQrfaWYKq9tx+p zUpZUbw{*T5Jk9w({Qa}07=Zo){AUxJ9-BpBIGXoYgXKh_7{UzyI}C$tbb#pm9qlc| zK=;#%6U}Xtoc7PgqI(ae-wQy85B?kce=A_SWuBKGJP?reKcmZks(^M5re?M-|0-Y& zuAa+g``vaQNSWL}{fGKhbBFXYmCERy9>4s)jqM8o9}WVU2nHis1*!0dYscryH3Jk9 zkg#-mg#igjSIqFWabFAiSj@tY|7 zvDO4F09)y)qCmY{+w4qtR*m-ibJ)ZB{G@X1$y2$G6JCNE&XHe3)VV7t?D5vC7r%j) zT81IUd1$936|Z5_J2@)6=?H*C^ zy8ZACl*y%e%u}r)2Az?X_^(TcrhGisC%G{+iNb^G$X$ZOZ5_(GvuQ7fZ#Ft#CX;TF z^(dh=K#hdCNsGpH|4Hd6ZENYY-1e`tL`nN zoZ_-jGYSO*d8ln#n8Yzz+Lj9pV(sQqG!d4gB%oR^MWmXO#Se|Sz$_ul_V> z&w#rBZ@DXtz0EZCoyU?wE323l8WNWT;$d)(Y^nF!1zW3j6sc`rvJbw4siyhM0<%DQTH=wsPW3*xH9Jp%Wiz*D{&Z!|YN>F7tS--0H9dl9WSeHw;fq zc!0gw_F1;!?4)l%4?%z3KO8^6{qri_1f4n}-w*SH+?(GL^FSI!bf!xJr`Eu&8_Rhw zdY|cLG+KFn(a5xo7tg)g%P~FK0iq1PnxzNJ=jmRJo9%SoLuHeDRrMX&O; z430gX+9>`2LC*EiAKxo-1cYiOL~Hw~{QFt#2hp2+fpIM~x3v1y zF^)@Uej9Sn4$VC_%P_qjub=y2SoY+JgXlC3`^SCB4Cn}5Dc0zWmAH=N-#nQV3w4sV zpeu#2f0&2wj5vAE$*A2{i+HN6Q|)v=3Z#~ZTe%Z7x1Hb-H1k=ABOIPiCl>b z?5<Q zu(#FNXB+9cYn0~{p-v`wa5-auF>30MbvQ8L9-iq@e_7_sx>v9An0tFjAPs9vHC{NB zUcNF=mf%NRwF!4%zLc@Ds07LRgzeboWBGgr_RM{NxPyQlZ(%GUa5vCCp6rh05lIJI zL36WDfyP)Nc&Shm)&Ay~y3Svqvw2>0p1bs~XEl1h&}L-sq;ESEg=t}_vF2ck_yea) zJ?SY0;2r2Z#O_K$N2LzSoBRZ3>l&Qq6W-_}8U1IQH+N2e3QaByFHht*9?Wk7w@ou+&EENGL=63|H3C`lL`2R$+D zk=Y`ObA7qVQZ?2I)<)6t%+N z7%Ku|z$Ipegk5umqy|)AT@pGIMkD z;x+S%5i6=o1FqzAr&xSm2s9_q3LqIF!y?f+n12wuPA*WWj`&R67-GB|K=LK#c#FbS z%pRR~5AW@Y-QJz~&5M;61P0O0c!xqNgmpS-l8{&4{an3TweC6+x?Dh2GCSmDs^{j6 zyVSCpSTV;d!Kin$4Nv4R?i56u&u#!KX9)y_jPX?U2aGVtorbwulMIV;BD#eT8CQ!T zIyoG1mBb8!pSmb-%HU2B!f48G?RefMFe zoF_Mo6;>N;YD!dSAV%4R)Fj81SIXroq*sP@6~E{y7AgU@!gs!j%TXkAtpxJ3h(ngj zStk5_ls+!BHP|0%+jX1Ggv(8>3p_j^O|ARtD3;cCKL|!jlV+dJ^|Jxp5wT4L3dbS+ zuFs*TmW+jrbXnGNCDKXhP&S9dJJIB24C({d_I-k0>(_616Wl>Zo+XWZNCDt)V5U=N zpr+W(a$i2%tjBcA;pee_nSN9R

-*Q{yvblh= zw_PnX`u@5LZ7VBsw)-TEY5}i5*Js}=nSjH=*X$i08H$?(yLG4thDCjPr*l;Cr7pnuLACbXy68C{h=leMWF`aI)g@E>O|*zmRQOBjBV=wEey?SEVkmfh6#_kCU5 z0HsSF{1A#vCIUN~B2+*%c%9lmkog4VIc)WJyTZ$~SlxhgxOvnW=-j*=#2l?Et)hS(yiVAeygs)@Ev}TS$C9keX3;L(zHqSKv%`f5#9-NwexguT8{%9hWM0e zd&H|=&1{v(8d^uOYhCu3Ee_Fym3SG+%~pA!7}D&)JmYaZL=}2~Uop>6>-u#^rqgxL zgUs#&m0g``Z``_~ymtBmTkAF^tfL}SlQ^PjE#=)|D}>vC3+7~R0QX~(uGS!7J1L?r zjNaU0y#&Wq$=uxu-`(!%)Fl*} zoZv!UJ=a~`ER!!#^n(5^00#Ig(099;sISnmKD1;j+Pp%fV)vzK-Lo#33UZ-C~kG%qi3M+!X_A-x9T_wd=^^V5lu3$_A+Sp71i;BzLO#oM688 zd@|NYG`&BXbS~wqFMu4Dw6z}&brJX*FxnQm17R8 z=l4+BpcMO|xnz)r{S8%xl*_ zt8Ada&RPGhl~(X&FJ18jy(1HC3;5^MV5giwjpjwdPj$*KzP~dRxmn6}n_Tg;@tk-C zPH+@8B^~6?LN;O{8Ooe+r8WJKs|N(yN-sE^TxZC0X$4M?9u~PH5ZW8lfsm(_2BKX> z1TdLF;l+rALOOxK3!nrAe){ay{Kr9?D}@7B4H%!YxMQZs2RdKdiu$ME0jO8FE`QRj z!+v4{?XAk%%;FqQe!ET_Jvz+K|NI~GXw&+2DA_+XJ;y))J==e2XBik+*;~0982rPz z7S(C{O$nsl8x^_K5Ne^qjYAZuIAC%&WZ(uoE`{2mXuL#NMvtiN-?~pq%^insIY7d( zL{0`l{zVAmB{luMX_PaZf*;c}ZLBzPLop&ezu5G&G-PVN#VEhu_fRds2dQP?`)E&~ zcW_$7Pu3ACZgEjcP4(z73YIsd+dyf^go8To>zmlQQm~P}h3lPK!K?~6PDb>xq(qU~ zDyCD$O`L3{?Z}NFF7!@j5-1$isSs1;X3gUJ`wrdl;7vPP+q`3ZO)qZQTfN9;b=tr} zFo~)rv@$W|lx#E^)MILE<)HDKBXG3}BjVf~0p-o7GCey0qs)9a&rS67^~zY$OxjWc zvJYQ9wH4-V&B&95Dm3d^yb};01VqG-aMARrjvg~5v+R|Q%%o>au2;bNImi zc01Gt@I-cfjGh*h%HKa4@)4|6&#NS@p6ZAMX>SG3+eK1hZil(u{>W=YqUI$&D3K^q zA4q3Z_r3U2In$=5*~Bp&0l#dlE%AL$mAXZRlTq7%**vZWm)}3E(`l$KU2wG=T^2th zSh)vSMl@uUwQg{yVzNb0;r}_vC;VA}u?M77uQd%%E|z52q!!+BMI0Qh7n9yvzwKK- z9hWa^uFFJ=Pow$KNqjy6#$HM7nsz7kZY+x&^FgZpyOJqLuy&$Tbde%&rP_ z&Vy6)gPt#R8-3#+rUX423e3@Ujfn6CgCjfO>x}OY1Yx2%7P|`)SpgaA^Xtu@uW2}G z>Cc1%-^*a8+UBC2Rj(%5 zy0JsN=>4GUSO4UZmNTuYPluK$;ls6jl2ZqF&zcIO0@cxa;XW*&{CSz}+?V`NL=1t=lauLT@E=*Hnm;eDp41gh{vs66{q%ObcOR?$ z*Kg)5yD6MZ{`vNF_V+E+X87ADz-!a?_5S`UCaSy4s})tKgqo%CCRfbv9iOg?QRq86 z>B-&fA0>iVK2dyDhxDgOUbR|0X9|_Ms;!0tSHny-GC-|)(NoK;4F?u_)-&ZUbxzQN zgf^KQNCpGIP-NA+z!*)XFM2^E-BF#buBJ^f@2Uc0(QBNkaYjcYlUYr#8Pdal2u-{` z#58J2{QoFBr}j#iXj>;8Cmq|iI<{>m9ox2z72CFLCmpWX$%>tH*s*cGbME%J+jUXT zQ-5GqjZyC$bCS*G;@PBajb`dNx?%#G)HhV%);sTxA|{RIhprZf`m6F&;dj*Z5Mw(+AcE0c}l$5oHA z5u!s3ONk~C3fK z=`J{FGMSRh@)(0c^c^0GKZI-kX;x7FOT{&v;JCHM)~-8a`0u)@qm;;UlL;Y8Z%Sh> z?|jh?dhIg@ywS%TLoc1bT9Sjsdj|=zrFYhJ#XL$&vnIU7$f9Rvla_>>qN3$AI8p38Z`sbRoO0gL%tp22CnUP8E>*MY+JH^%tQrRQ^ z&E^2bDIk{^;|&j_4Tir7^vIafHOk==ebX7T`g_Y!^)Mp}E(|Gu@R~ z*gtAF67L;Rt$I?h+-pmEO7k5?{o^K~*Mz>`*t7BmeD|K<3CJm|8lgj05-#GK)F6)F z*yR_TDlB^n&iqp7N)XsoJig1KaCV2y(~#zzk0dVI3#eEb@s!O9UequFsKy@^)!nvI07I-( zz^FX)8R#YuyI<{~%{p3p(YS@xR46G~NDf@7%F|RY+4oskDpj6hBlXcJr|V5Xv+DCc z!N_#;k~u1MR;k`O=%UGFq(UTEpE?uB+5-#MvWSS#vP%2p-akN{8?~cRsa>4>Cuezn z(D;aURgXxr1l+=+wrn6dgaiD{N4`U#7y*yAbC6bc{W-~rkgtDLzUFlVVqvW+XM$n zXhKMn-uahjHBeF}yhnUq5GQ(ul4jX9#H7KKV6Y!6TPW3MQN_6R>xt2q{)CKPI5h5$ zQ4wcYM`hfgqq#F(koSWHW9&tmOw$hqS7r}U9Qb62tf3difxfTDkB1L^2nl?FO^c_7 z&4JC>O>%;V2%|(~z=l`L1-{n;{uX;=2m9}0b%<_wBFw#nnKbdkqM17;_TQjL40D+` zreg%%NZUG~4`(69hY|*%o0+mx>=IlxU?r+DMavDKh-yapA_j-Fkbf6zX$e1EoEZ#QwmP6r#Hu3m5D_AGlyIt`?;Lvqrt z!}hv;VL}+4xav<{tcTv>GG@Mtw{HF%&i@o;q!gEihrRem4Pm~W1E;PVoc=RS-c;+f zP+*U;sx*K_d1nJm01w2UDS}+Z4%l9vHtneCiOly z<5!duXd^{$>{R&s{fVYTIl6NCzA`A0scv|Fdc4xg%-id>2wXtJdcxfaKP5!Pw-2cSj>XIpJ3`TP)E%7 zo`JYw?=tWPsZtUZj!AP@r0y6wG|Y`9iT<0?V{QFeIDe}D}~ zzFi|>_yD>X;b&b%XfLtB)0YtyALf=V4cg-fPC*dO;nK*?J5}l6&$ee2XC2E*09g;%uV%_%Jg|YUZ8XPPFTy(EtHh*V)gPw}x*q zX&Y9Y`QPSf1pEg%J*ANKw5X2E!uEp5Hh4wJ_`WGmUGZp@Cln-p=ZBM~eN1VwmjiQ_ z8g#SwcNzcH$W$!+W;NcvV&c%#QCC6_<5_HS&itk&hIA7skK_u+mHaO|eh;tH5l0aU z@@-mZB3}fE@coh>1y1ycEJ%YK=Id`lM9~9C4!k{TU{9bF-53JS4~VdhUg=#AfKI!fi8d zghlbr_q-V7g8fJfrx%(882gY<&bDlWF8CKJM%p$7lL<9HWUF~LI@b7p{yByE`ja*7uk zEH8XA_@YJrB?CSl&NEV_Q8jqni)rJYT69(2;4W4pwQdSY`kw%Z(oT9@sK%$z>W@%V zrA`hykHUL@EVS^)fCK)IzM{H+ZOH3W>1Ece#4ImCWm%_z1{QX03E4TTeMw+lkxl%tYE5$`3x;NIl&2F@}m#`zyzhms*-U4`0&xX*H zi~mj{Gl%8-IVxq$Vo5%2nv`owic`;UT89Gf7J+b{2V}8hMz|&Mo zc?E^38s!m~98Ucz3|_+nanO;r++Kv1;Pcm7$(9f8M3W0#`tmQsiCp{Y2j;(!@eOY2 z;^b^s#pLyEg2|znHNQTlw_aGgKYq?j#?TXED4ott<3hQRSBo%gYr9N)QA>bNqPoH# zC$}=KN(*QYABJW8+Re&#oHkJVv;5wn<4*&QyD>Y0p117#AOqxaFDA`E{o!Y1S}q2j z0-^Q%k^ULsWxz1itwU!J{i2EaXGK@HkiqyQWaD2@TR0D6pijsMmP@see+_TFC-XtM z{-F63MM(z0j2tW-YxNv9UmePY`X+qK>sy#ddq?%*q_md#vg;%vXt6{ zwNh<(;oufK&)tf*QLXR24JaAr#O6z6TuI>droOszGU1-xG`>%WEdwHQK#@{;XK{)C z6lAyzV7#Z*WN7l#TgktsRxgx>;R8Q?;x??SNuE^nE;kMeUoU9+{DgVyc-Rmz8zdiA zH`}EI8iE$~_Y=)q%#u<^j{tRaPr6Sc(Ht3*i$;j0JmL(%vZHwy>c&{)GIQ-U>g;hf zTN_i&@Yd%YzM$LfpjiEjk{ZoXtv&gSS4-%Cp^3`z_Z9oW>oq`i;q&nr&(_bHYDU3! z(Ye0pLn22q_e^wG+&LVlvT`{jG_8PdorsfU`waC~&C8zwPVq?dP+B zcQ2^Lk?E%L1L3`io;4Js>ZMfRzo}WZmRP>Z#3WCRxn#6b_GqA?4+X$4UD_n7mBplP ztNSq56sFi)M&s^4-^yWq!gCX~1a(qL+v*Ncoz>m+oJ6N5++q)LE;yBnhz5+Oi~M%^ zPO$v{jK(ZBGlu;YIcU=PuA%qRKl*bwM9ii!BL{4SEXW2&q8rCNH~Y326T}j#VCc>L>gvpulx#Tv~)c%O}FQEzRC5{vDV!sbQyW= znHseN<+`TGx#AS7ZA}7)bOHLe?;Tz%jvS^?yBK3UQgJ>RayM!+luHtQcIqKb}$t5}TJNJ2c+VnQD@?QR2TG>u(^toqljeYDIf@c)X-WvJ=qyu9S3q}>hx|TwA zXD{$W9b3PKU>e~j?=XzL1$b;lG|f97{`DWAy8lBEs|`jxJ$N`T+{KKRUcDszCgwQ9 zQ;#fNj!5PZ+q8{9y1p-8Yj|ls0|Fun(RrJ5)BUo zp8S4`$uc&Y5+;(?-!-7njzG7D>8v*jl$}}qM)vt9?7$ehwmR#mv-bRVPm`YX^ogR^ z9N=t2 z)|DOa{{Ub)pYvefg)aV=TzP~5wEe-*GJAUgF(bv`rcJ6g8V;GmBw45!v!u7%ZHG*# zjj$lU7Z5M45*ViZUWc;VrA9y}1W&QM5!S9_o6T8AddK0&v63BO&m#m7KM#NWqj~0iLhj(G}jyYc> zz7={qMq#aNplA6o$^HT%$d?Otx%h}sqP0g>c7b^ilm66JQuI}qV|UCe={N>f&PgWb zUWE1RPXCiO2T)e)R$ph-VtwW{@Ax*Ki_i{_OY5kL!yk^78--x9RDGT6dPstT{L?V- zdQ2hjYA^&<;5i7;#O#{GmGo=NAW%^FC^=->p;azQZhj)74x)-}Af|HA{>7J*EN(oE zyww#XyBFK#t)a)-adP8#rCf!IeuGEoO)pLkYNdddYai^Xp3*3)>0FU2clZ}H0#!4R zl%9>OzJQ%S56_8-egs^!dr4~27A3YF4)K3eMc0rCK09*DuRa(K@WpQ`{g*rHeUnWRSymdVAu=!feO^!l@*j@n`G`To#zn1QmX~KxUtcksmTnG+WALWn>*A9b4wjY{l~3YDYb_}a zNa>d?sA`zk4>Ba7-MsB0uChD;4w`s2?e@&`|I{35KW&N>v)Bx4SQVjxef$(w{sSRo z!=B9XSTJsR7J|)ywPjcuI40=%Bcn@wevDw@z)&%@xYdu^jQ#}SoRDn`9uwn!A6XdP zy>i@oq#0tO0N#e^Js$Q4^XB6a$fL5w%tpxUY%KSk>5;#Ufzwtv&moVsAY2{NSnO(} z288a{j+#tN4P}dV_fx4EVhB3`r8#N?1fF#{9SZW?v@zZwxp7S=tJ-PYwxTTMMT%5a zHZ&7ITHh(;<8Ozqc*^4OVRM+`m?Fr0db#`X@TxM_MZeV#+!#&y1aI(!S_J%7Hu ztmWWt?>-6VAfPFn3Wnkn@HInH^fm3_3qOhqLxkm|q+;o$-Y6!UwOQ zeiMPN9FZw8VLR3lxCOLvZwr$_%2Lv6yCupsHtvj3$S-iVo(ybcu#2box`5qY;u{dFZ^;e_PYA4n z#(RFzmAGkZw7b2WL&l z1fsKPcTosRW{>vb9!?F#gv?)Beh6~$))T)caeOm$WMF%9%B#i~lEtu{-e6hjt5PKC znkCqCK@IY=5l_0-u!CuJ$dyaCMM-n~?=p|7b~Q35g318WW)RX)Yx5#uGkK{=jAX~o zx&BE7rB@PBUs<(eL+uRc&mS^|q@xDha9HnCz-p=FeH4AUUpTzHi#a6>dgc0%NWpbZ zg$nEoF~%7T8TN@QcbyX0+(<~TP3dGx=`iZ5X{YWoW*ltu@<*>O8_!@hr!kVt6~qO8 z9sZNd!I`^VE4W>wKYS8deWn3Ohd)mdDyp>5@dzL%_PJ_(dBkpxPs|11I2bM^E@f%u zoVwzsPhljMU~e^|9KojR>&36x>IG0p5!d&Vd>$_*NsI=PzFJ3zwU?L5YT)rpqR0^~ zLOq_X(Z{W=0{O!O9wx+Hp!D?oSIE3g4Kf|`RVm~m^KJ#K-vhNt8j7d}E`_qVN0RRv zv~aK+6fP#j!Er3MUVXxi5A6Ks#nQTa)TgwAa3@Id zuc2jF$MpxS3zZAS<6v{J_qTHbp7hbS%RPCMI0cNrNvEwgMYLto9vN1e_bis)ZSKq| z+9rbmN`{o8(~KxpctAhu)S#o~ctMikZ=6KWEljz;vL5lGk_|wd2BlswTT|~#&+-RX z7ouiZz!``FeZBgMpsgi%*}zgMo5H>RV{gp#`iJ6Dq_nk1vkaLHeCh!)Vk_x%M zqm|_48qOEk`_R7sG8Jk`QA?|k@j&X&>Zj+ghl5#T?SCc0&WSh`MzWE7!T;=!O6QoQ3bo-iW3`h}t;9!So%o!RnhlAU06fviW0! z^2MUvIf@Hen&oxk#UAZ4K1<}rcb?J*zlGBb+yd^J2_3FD#%WeuJF`i+og&cuC{4=j zX@rp#Wmy-onhVk3`6+iC?RC{8L*$wg$+d#%KnXH4Fp(i4(yiDfM4VIBMW9*yV4yo* z;6T8%%GF7oFEDkzFj%;ulf{8dH|ta<5SgDxR$wn(+S+{W#hIcUvmu#_1mB7J__cBf zRZm(GUD7;d;R!`o6zS0UTUNHNF234%Gu?{*8s4sWxfHs@9L2XDv3mca7>k47GgY`7 zn38?xdP1GGvRjT7dQ;79c)DVQALuMaApL`cKKJwt*}w2_5=GS{zD5k#A1A2bJ2e(e zxl;$EAWXycT2>Ffp6KV&#uidaL52{l$~72O#H-7xh1vE( z4OM5Apq1?-7M-0^?fO59DJ{N=v(?mcVvm@Z%5OX(mocp<+l-KVwYIkXUa!q0Zm7bd zEtt4mh`oUG?~^bkU7g?I^yTJd9?GjRUU6^w+fX*%RCCA^250{LNSAzf2glFWzz|M8 zwqwACb6YNtg)ro~RfHA>SMUcfxVD;K9{hem&}63QedEA8qD-WFyPqfQ8!IrDOPPpi znX8cGVsKt) z!*tEs#I~*kjkq&e1DMB>Jn|9!#-k3N^LaPzB&0T-Gj#;IjEXVe6lg&9eB6ztE_y@v zE?WoS2fqbg`|#+2Mh=z}mo}gtr4y$5gC3rN;V%aiTUc#za_}ZT%TET1X8` znbbRl8zwT$FD-xd>BHn`lwxUucs`_rzNor`A~cd&3PqZH-0>K3#BzcK}? z!mmKZry4(A@YJ_}H>;dFtZDSkXAGG-b)b!UTU_uKWRjP0i%QKDnRs>y z9Xor4jaJ9wPd&y^)le}BG%-xqi1>=KmS=g6Nf$aOh2|JPc!o56pbQdd00Z4!Xe4QH zvCs{qBx?Fdhe^B|29R(PH^&Oa`SdFH-q^9*r69n zt!IV*M8|sh|B@Xtb#!obGj?$M4`tZ)Uw6fq%0A`$hKJ-c*^Exw>O}rGtC)zvxNuN} zN%QQsi6oiCfJzwx7AJeaoHO&`11)Zs;H55(EhemlAIT;@`(To2=S;2kSEku+7{7}HuY z5tw*Rt1PEjxx15?AC#>u6XLqEw&$A%DPudd#=DKazqM7KD<^*>5K2^*pJ>HLcrlb& zv5Xga4HePpqXO_&d|DObb$mL-oW#gnVtv0up zyDLh{t_S;XVB#I>=pSWR(?HrI?=$4J}Vgrq_yJ17Zb42rohcCvdCRt;9d=S^i#c+1$))PC>suUy}`4j@CW7b%!V> zq&R98!t@c$Jf1ZrCItG}OgQs9I1~A521+{V2ZZQKm~mfYb8uYQ+Y|1mcb}ZZI~@k{ z0eR+Mg2iIWxSa(Ycz*A;R+vP7e?RLft_+lvOU~!qUlioL;1T*|wMTS6mA9{=mDda( zyLfVc8juphynB`%^mM1Co^#_Yg(dPW>TeG?zwUVU|EuKzZH%n%f}9KM-IYu`ON#2s z`m5TUxiCY+&@NQq4#Nj24^*VI#ARsoX*vEVF*xtscY0#Ts5DTtF-ftlHQ?ZGpE-4f zQeyCQP94KmyuX*&6yV9FvGA-a0ya-!)TIuaQt>V{dpuXtP!rQFhOv^3?_;=jPmSB+ zNLww?{6Ps#u2iItM${e+AxeR9hl?+yrAinfk-E*E+p6)PS}vgq(GpxZz0I+u$#awQ zizJ7X*8#kyV}zifhjfHRT$umeP zk}VkO5>;f7Q_T7=w&hi=nP=Hx8zB`c$0SuLhP59&|cb&Ld^O@{S*L z5?Oj9_pFfTq6mDjQ=t)`NE;MK*wg}i@z96qQxk3DX#LK_4ZFFDRnpLU$YdL-{WIx( zq6?*~JYn?BajoR6AgI(vV2P2lAZ@kYS}S>o(8TY!72vG2O3w0ItLha0cqD9U@0h)|XQbi~MCCyJr=hX*TlVnK zHEVL>6QLt{E8cnH@&w?t>^_Fhj}zsLk3$qG8SaK|dV$t`fsi=_T16-QKqoiZ+PVpL zizNV3BStY>$=dL(0jzq*M_}Pa9#QZASZBnKDs;b=e%^%3pRZPs>u}*>yFH@54;3s_ zjl|PIN=QfTTH6fwOA|Xsn}j8x-!GsgJdTv4P6SwUe&iR(Og5MO!oG{Vf9WefVYl_q zE4PS3WpUt*^^iC;h$Dd|-ha-DUa2N>mo8=ha|gF__pWf3XnDeSaSM zTCa4^Rw>h*Y6$GuRqCqb*{C9UDeJq1QRrz8nlDg5R0l^7#VtujR=Dw+YIsFpEo zeGLgF73)HfVI6Xjmbz#g-xKzT*g0)fsC{+Hf+m6zFSN(mr=q*OfU@AD5JL_P6>ZHj z`PF-gfd|{(NCckX-I)AXNf9!L*7-GwuBjFnOfwI09OqZ-k>L@{k|KOiNnr*ejv8N1 zMQo2H{voKgUu~qdoup)CGU!;nt|_W)4?Zw2M&y@O4ZcuZQs1MC{#uAe=^DlfDQeMb z3Tc~mgcwyx{TCipb7UEEckaur_CL5WsvH;86?P1d<~aL2H7pwt`K7KJ5wh=QiOOy% z^GrmMUr3rKeM8|`DEcpCkq|Np7Zm-Q%(eEn2wrsInp~-NSief0R$U0g2&Z(MWOqZ# zW+?Julwb%|on&IzzI&AT2aQCc8(gNFwTdcgn-Yu1=9qP9=>f$DR;8aPF!daZalOpt z9!Kr)th7Y`Dtcr@&s9K7@JntDj=pN1% z3A=NdmfZHT2Nw?@q)X{7CtJrA+Da;C{Gv(Oeho9aq7lVsmdem<*;U7XMx*GM1X836 zKV@^aZ`?haMQ~AYiT7@EDvD#@;J+heW+Nngz>#L4zxrh?b#dgB?l)GZ=2BAid>(KA zi=rd@Dy%9ez_uFsFFW%LI)tGQ;u{tEN zy+}I18*8A0Y`Ttp0!_gPrWX^=tqnttO!hGfL4DCicw2i?Uq` zs{FiZ1d=78oKPnOu*UxEA;)~^f==C}6eb=?;U7A6#nz=v{4e2o6gi1sKUTIhkz;B< zpr+too!a3YZxBy{IChKlCGZTCRepMde@ens_V7T5c8G)%3zzw2ph{1PMl8D$RO{Rc zQBKG}xYeX_LvD%lnBAL2Q*+SE(&I@A)T9yW`}YyLQP7CHkSEKN90J7kjq@FES? zm!+R%O=W*RBkA5tVw%7tGx_AZYJ??zsvgG>Y-t$ck~ZTRC*FEXa*I~BN`m5>8OONK zp(*MdL5X6mBL1q6?v{p(vV>P{NtaiHBxN(;y2T_;Ni{^m!Syzmsgp$$oc*4!qb#DB`cwzQap*<9zL^;p&gmJCYB3PVaQ*`qr+1GoZw$X^%4m< z@b}OCr@(@`p@q2K8$sZ0-DD9cekOB$u0@mF$ZC)NL&VjE?7H{FhaMszYK95`pz(nKrMl?Pl4yYLIhV@mQ!IswJ8BHxoNF~oi znN$fr;^Z!y@3zX>-`|7}lMlMEqnn;Ml_FIU&D)&bl>B37f;h$0K4 zAnG1a8ngkA>7GXDx9OB<6;!n_;Zpq3v=mt&#`|=X!W^@u^aNz18JLr}>kBeTqk4pj z2$SM)vfQ<1@8vFzO2P|IUKY+PiAsD{jZ&g;Qm%=QB8J&5{jKP)Gj2sNxTpo(T;m)GV>Vh8zzl zfu9hH6wyMLWUyaPR?>8O0W`=W8aJQ`m{~7N%kz-#wNvYkiiI&gyi4cNY*mQI&2S&7 zST$3jQhs^-RaZL2bt5~g;vQ0|KrX42iOrJua4s(oUfxu!}33Coi6%q9Dh**%fgB zDlt{LsO+7R)tqIxn2$0AwVN;AV|wLKo{l=Km`c1J_XIJ^Bzes)=hQQ$C&5fK2XE#l z=g%qeilIkbbpYPDA?v|p9v-}R?@I%3oPnQvp8=}$HZgZb(bN=p+j+H!x5#Wj5c(-6 zzOvt#tjKTcf$YCx?Ao(WDNKtZ`vq!26z|d>!;bp&QR9zqac>Q{?YFTK3Mj~w=L5-& z0jhp+G*V8418ajUd6K%#N>NGWDFeSLpHlYv7^@!UWnBl2IIZB=P_+_5zUjW|C z(3IO{6y}KersGbgB8New_d&$ARnm@cu5l#cW^Me!qOHX)C_UJ}E+q$TH=n)|Nv6iq zgoMSSg1^GBlr+?4gDy>9At;os&M&mO%%WWYi&8mxXmVsZ9_9mRSNPJEENLb(_-G`3 zO`2cJsl}@2kY+Klf%AhgfG`Zo{~%A{4J-aoRa3lbP2u*%7eE!)48%4TMraU)x%Iwt zIEvo50g>IfZ!yH)<_}h*Js1}E0sbP=8Om2!9;bQbZxZX1tHW21TtH{3H{CcCp7Vz& z%g`-*$M9nP5+lC5QD98IxzY3;qde;kpmXuMCpodKQp|A(U$f6*!jmnYrgJ2j7 zvag(qeRMJnQsqMV1?%R_pbDpz%q|Zt%B8K0t&{>vro}o?H7dH<8dHx}sWps&W+7kk zL3RJ!mQ3bjlC- z24nSzSAa~+Zq<03LtHU%c!{pDt!G!b(L7>EXgYEeC5I^WHu19UMXYpPHHw^%;RC|j z&8d(&Sy7ptmWp&S$~tnydv+C2GtnMXke-KM0%64(8`4ssnR|gQTbhtO?D()3NeQa3 zD&!?yzkUQnQo`PUI*~c)N-Xk3k)m2d7d<@DVvKSVDBz_=4lRkk30Hk@(dEdZU{SKW z%m^dF6SxSJdPN0YP_Om6?8x)#DP}ClQxNX@C%qVNoVZQ~I0mhD>Mkx|Y!eax1e!}T zH8Lk(YsS-UW5|_*7jwy6qu;`&JQ3zKXP`TosAZ4=(V(7%OK0jR$<8oFliVYMQuOrT zZMV1CgE0w}*U2aalvU12U?mY!u}Y?9ZmI?NN*HE@gc!TM>WOm))6v;tR}*h2ET6Q;KxYN$%6_Q6-sj3l1)2aQ|TuAG=~X`@X+MO%#`} zC&Ok7HyKDip@_QGqgA*qHJYb$N~=byz2xZLYNeRgsN%|s(ClOwgZ|4wo}ce7v5fO4 zX#ww>M9a>LpL#OI_ke}Y`#N!9o~mm%-|ezd*$kmv zj`e-a&XQB(e^(xEe)|L#c*DA!ADFZijB9i@b^ z505OJE8_FOUX-szHNsSp5>^8p&(JbrI={hrW9GXqv0dD`aQ17G!5B9=8JEd>CN?nn zrt~GuW`-w9%g$)&0wCK~TsU?7fcq&#ZLKeJSsf=-vC!ng6WVGnxmNxu9c*rtV$jB4 z%0nHsEnSi7{w2dpS9fMcq2Mek`JDdb<5}@uatrQ*3NrtV_a%eDL4aBnRm-$)l@shZ z%?8o6JC30k1qv#m%u7w{T0Q8&Hp_SB3kyV(s3zu~HO0-R&!Es(pB8zazThvv^hprKu!2~6))*O@{G27MVh@hK?ED9Rz1mQHMy3NJ>L$U zsmrEXw&jByC8{ESlS8P;7kYv-l*I`^Zrg9AJE_@P?fk9`XxRQ0_mKh`n{40yZ}8TJ zbjGIG`E(sb_TrQpqQi7*y|hjnNF)A|^{t<1k<%)n!b)!AkiHmY_g0s36;p(w1W{g> zt4IoP-V3_5)HI z4%?F~!i?nbuUbT!08!t2YsK?_u+Pe!Sq2prLj;Lx)C-}bnYAIM#XE(nf5H;lDx+-&>82)v zojGgveQNwyW*x*deo%NbE5WSky0>?Dtp{_y+cCpOy*pqcdh=-QDBmPq*!nvwIyo~h z4IbPW+rwm0B*w{Ayu3m6SBC z+n)qcaAbC z$BwtF2c*-h${$G^E(>my2amVDI3tG_mmhLJ9>jyR2cRU=D7lVfO*Q; za|jXF@7jj#OBS&*Y_m&W4e3LDO6`fcv_-z*z( z4tt`b=KnLkj-RQ9;}GrZdM=PYX1zk2O$`tK1#Eg4J;RL2wM?js_Hw^QJ!X}4$W286 zhQ{oFstTcNg-{CkBAHVSU-07l!IIEAJ z`wEW7e75R0?Q5}+QczISx7C-j)s@nBMgLXTZ9I8x)MT|} z<)R(^^YkY+m_4!+_H?}y*be&+HZT4Ws}x&vyzayk@)3ORHKHtLwwK5s+$HhiZTy#! zk+Gu@U)}WVVLjtgbt0r~3T zaIy>tjecL=lO^M8I=w=gz`?_j(4loAVb9(T)`B7V1TG|l=N^-m9DKBoutdc#-==rr zJz%1S^c&sA3_M^D)I5ypza7x}-zKe$Y;1x;KxdXC9;sB`aw(mFDo_k^xm}y>$WKkC z>sCRiiWmCl7X2TvBhg*6SF`SpENhSGt^%7`7xjW`9f)Z5YBYbFDQ7a?^zdk6nCQx; ziPlIZtmYwcGLE?Vuk`6)Z97BU!RfhgE49&;-4GUd1uqDf+Rx4Zi0K%mL z*o>w+VG~LujfxFtF}%|a(SyI~-RQR`Z0aSX#2UBzgLQb-MDYgDJl~V&;3?H$rMAWy zzUcwywAK&N#)rD^Bt+uZIuKS^-V@z|kIb1Ebs}iHnKRV$VWF!2!*R-D#+yudlV7=gMUeBK~>}J~*I}g$x)|oL)&=46u zvHAVf+soPI1-+exU{C9$#cbp8sofnopMP{;caDC460yM)Q{J>=Y!h|G{ry}E{j=+H z1^in7By#>DGegVL(&a2Brzd6L1%|JSQlN)H0nRe^Y~y20*9tCY+60q=S;p%_O_yzG z7d3kLK8)QlQI2mG-*bq90b^{Q$#cX*`03?x_)v-5Yg0oDeT7Sf)IGC7Q+U?a$ne&~ zkDQ)aDo3m_3wRT1&t_Z8^%psRkMO#@nR@%9i1e14rS&rUw@XvbzG@}K^U&w@ZH{)A z_&y>t*Wt?tuYg0e9v?POhordP>3Y4HJg*6=a!?+^<*eA}7Icq~#(-DHFE>6NV^n#|g1{bXi5HR$k4kkQi?lGsKS#HVh2$#>l_!noH;csA_UE>1k=SRrb5$7h3 z1)JJ>Th3eA+18~Dr+?^7tYyad`iq$VSFT_HX%A<1;Fqu=cZTmrW}cuLFxT92^?}+G zG)?)r!N_^v_Vu9Y@M!n-bu~1~^EvWUSAW5Bd>v@|c`&opqQU8tR+n%wO#b=@)!*aS z^ItQM$9BPw*ghW}oZg{y!*jL@SFHl<{_YXU`Xi!TvzXHs`qPJtmbdV!*HPWe>9V0V zz$TSgDgVS~B9b6WSV7j_n`T%Pn?f1+NSodU!R2_}&(KzXN^ zW3pePQ6F#3Ut}qP90j^vbKI^C^(~{LTjz-WZw}XE+aGVgba7_t@`1Z^N2d-=w^Ena z&4SLXf!}iePZ0sGJVN8t)D@t)qO*!kwwwKHBzJ0|7x|St#cb;5#h5{y2O4=vz zn>Y*Oue4+9D;IVjE*@zJM^OGY@!LEqoo=BD&PCn11zwYqRPfluja8QGakg(u8Xo5+ z#y1w%cRpWVQCl}DLs}*4WyX0i^V3(Ciwrq|GfYB8OVsOQqnC@}Lm=FzmB-7;urHHt zr?avzH*MnH^10cIHMVuk*`%1)>8{IjqkwB9eD5JitVi47x2}xW*Vq6DZ9_cc1}xW$ zB|Eq3U!3WNzO{z_v*okc4oWSzEdB>}*LT?gUoOTsk^wGBjLtj-MlJNOX;QCkzUz-E zUF-OEcUbuQ&FtlKb4T^F$K(0OYisw+ST4_}uAZ8AuCA9)A%fmo15QaZd6SIw%}G*S zzBP6>*?IYs+u2Lh2jcZ&j_#N=b#HZANyZbeln7N1hIag#Y5bzhif0BM4gC5~Z z29br~u2~D$ovYkiN>A4#pPe_k=b?6hL(wn3%DFz^Hh%_RpsWy2k>LPvRjD~kYQ4<0 z3&4E;47g*acC9ge-6XfOXW{Z>>EWy^n8a}4pX%?=)bAfpk66#6{A`ain zZP`V{-9tGxx2Scc`M!0%e!Q4+-m44!sd`}OnZ>-PZx{THqiwQOVrLy0mpfgb$E??1 zGC;7_P+&ygayh$ZXUG2RmWSAH!PeliWcoImwRP^w`DJeGBs#z|Cdu4FodMc2_y4l- zIHuk7DlH&hW1hxl3M||0tYO|UTH{eOI4xH?ui*Z&aX6u~B*FQh+MC}@D)+J|JJFufMpv&pq$A10YU%g|XKKl4nGD6~N8{T+?(97CAM{Q@-GkLBn1EdQEjW)S#54*z-gbs6aKAD!eKW|IyMj0 zXPj{`#dmA5c|pZtE*z1-d*nD**Xx@0Av|X5++}-zBQLNMcrAFCJz752WpOry6YolD z)==-94<94I@n02mXDDRMM!jC+yS`@Wa>$IJMVz?|TJtDus$UUBP=pQe3NUiUaabRX2fVJ1CY7`L z1^OwyE+v#IXrp)#Yin z6>{&&By>80*?xDz_+%Ef)Vlgo_xrZH<({ z&BUVRk398gU_0sHtc{fhWI3Gy6se* zTR*n#oSH4*5s1qAj?+5C5*LD7zh==oXVdO_LsxTKQd+4Wjddp+r7!qx3bp1M$lRvV zTHtkEO6_=l+smFbG5!uxxV>yBSWJWNZc!6-n4~Ru&0Yc90zWb5NK3K$`1L&BZm*kg z_}G@vXfC~!*5$05=C-x~HuiS(i_zQ1juw>vSotIBsoW z%V0!xqsVw64W7RRi`zuj#z^n_(F;07KqpoXgWF-U65JPuuMthBN4d8Idj4O;%)haR z7Pr<`Ui}s#=?#_2*))DhyU0ar*+Iro0!m!*u9dVq$2^^%-GT=AA*+bY2`dJ#m@UUV z9sD|FEuL9dm(Km$=)jv#>#;QV$MB3KpNdiYg=nb_C0Y^&+**!T8@$F&FnexpV0fz~R+zaP8nB`W=OFnT;r17pVFwDfc(J}bHrAEJitGRuH=jZ z3<-NPqPdq{94jJ&ny;(|6Gco1&V(7Sn(fVhTl&z3QjRZ8l$ zi#!;zZP6=UnjvE+A|S6`e@p(3>c?Z(fu86;Co9ZByv*FPwm|*(A6m zdRN?7E4rT0;Ue6&*bVtia{@{x8(;XYv{+9>QLEEEbX=ae6GlHGoDRw}nB+BihOil; zu_l@~T0cA7c3=CG^Af}ipi$g}`G6*BqF$Uz5x^a`%fQqeUbM&^rH2;~S0LV1N9G0H z@7i`p9^7^}M-{Jkk|ER6z*?589i ziSQixyHtm9^Z@zk9Q23%SYdCPybeRs@KJ#{LCflDk`0iD`2)&3jHj;Y1b@>D#(ot| zCmQKY1Lh@7xPPi3b)p~u>6e(95;Hpu0RPZ?#N>vd2nR9ZNHBzo&$L0sYJtrPjEzP> z6wYFf*CJsY{~iWEdQaFgL->F-lpgh0!<5!z%n?h-5m|^&rf@%z2#GmErwBIb0EO9{ zmAO(ByA>Z>`98i{DN>Xl46zOj<0jey-M?3dm~e*HQiM#TG-Q0g&k@BzDYPEfLShW3 z#CNm8|IUbi|M;JqngT_wO4zKv*iJ&(@!X8MK3kD^OOSNhkk;#wbSjWK;$r@E;h>Al zSj^?4YI8;gaG1^;@_nKuIlz_p!?_!e?e{YXtnG&~A~j3pew(NlL$ERn|L5VE?1)tB zpw?Hm33?@0Bl)!o_aOfE2%UoUO9=kolL^DWGac)lmC)Bhe@zs+D91iHQ-5^38NwS3 z$G&}|_S?v?{k@HQOYEDxMu*d_T#Vvkp8d1MZEEIdP8A>?J}!>U#rLXjL@8`roRS2bpps0~>p z&`xSm>klrB^WnHQh^3DHxcc|Ib!lEwC>LE(9o_jrP25T>x&tM^X5&=f3Y5 z#}?(=5778ApIGp>H~hyT z4f{yq=5H+@;$$(8z&?0g8`73C8@DPxkWt^Vag}u;4!ZLl0XbkyRV{W6z02S^&)0~Le&C)6!FP^TXdj;&6X9Ve z$fN4#HN0=K5|8*x%+gtLt18VakL4R(#3AV#LU=;J${nM`gl<-F5`V}z(&RNk{T8(B z&vPWfF9Nrvv=LU_{k0wWD92v+ApEguTW6`wInGoBbhA}Hsmjw+V zXTJue>x%^qLU&(BZP8dhS>UmYNF9U&ZhB`82ig;mzuq9kxW7J;kVfO5jPFM=(^4&+ z&Gl^H83yA)XjAVj5F5{XSORcA3@DRI7iG zsM0(BT-(5Vqc4AaAVi~^!$%W)^BVqasq5Z?`3-^J%0*{X)F&VOGlVH!V(sodJPYA~9Q$m10YUKKp68{UyLW^gDZf}T5{|_nXURcme-LAn- zkgE@@_03bl*(d$QD{*o9H4uA8^z|LZ?)eAc{3&6gHw5pDxVZn?K#SYxUF1Q7q0cl> z&{|OjF;lYDXiGyZunjussMQEHVT~MYP#5j-5obuWP;dvvIF?#&74)#BkBI2;wY2qU zsDcB=Ztf^>aT)L52gfw9U26xz03NONFaT4*sR;ZFv4)^dM;*oN{yIPZ_PhF*pw^g6nm7Ol8sZ)wzU#U*f@4rGC#w5Z}L zFD>7)tR{bl0S{l=jmtG$iwjf9w-r?3WT6Wo@17u%NdJxpYNN$`K;|3fPqMMjKjK;5 zh~tCv&*%p`-J2Tw9n+c~mxdpWf%+HqjAWM~Gxj~%ZkuTXkJm5$?B=oyHCBcX!$dN6 zC7#ihG5#k#)9JqPt4S+)h>wTO%tNa?oM7bZE1E63zq}zOu+9a?3SESY^iq|7V4f)# zKT?TRWY6Jkgwpj<6;EZOh1iMkJ7E^4%C}*H;N2tSf9iAoQmcn2+n~~mSPSLcpc*pF zHWJ_@`>_Mn;UFT{1OHUT*SP_M`C`so6#ip;=w{1rcv^iWlTNw4L-PmgOg4GPl&_feT$zMK|5(^Xf@axb-qn zt#7+*9XGbsI`m@EpM~QDrQZVBus%^82ZZ%-Gzj@ z25?90vIQGbaL4beLKyaJDUfk)FEw~k3Ou4UB>8pe9XOSsf;U1(B= z3a;>(DOczQodj*R^LyN`I}|lK(LhN!V|C)!GwHvgi@V6t*w(Qhy9c`HFAn7~BloG} z9^6jwUth%9C&u!t*1iqLJ(itd4sXPySDc(TU6#Nd5&s)Ty!zJNzMbIB?y!Pg#?>9i z{)YfW@@Jf>*H%>=l(E43q2{Bf z_(jpgeNehrh;054(LEFKhPNw2xU1hllDFa~c=<@Skul;c8UZv+=I`!j&jY zdz1G1fiPnksV!Xn1)(v70Wukic}l+d#4g`41jP6KykqX8n!Kc85lw5uqOd?q`4U!X zWVW%%I@ft3s@_;^`z@Fv8gOhcIsL!UI`{mh9P0nP{`UXY_kYXW%gx;3Kg=9vCvP_^ zM+ZYYYZF&yQ!8T^S93Q*2S*osV>@dfa~EbqLwjRuhyRZD6pt4E$JRlDy7m^oDaIuQ z+%w8nFha@EaeVY%3U4m<&7^3g1}${ABGsShXS;r{BGIqp7c=Me?Kt#>-Ji-!#+1fy z7teKu>jEPf2L1t%y#01B!u_9P2{bf9&xuH2U}yhu68~RBT+{z1;u389n_Yg`G7S0` zkaR)Uc+i$xLuh#>pL5}X=}Y+IvWWm0wooXV)loK~rP^A%@?kH7J_#ipRysY7EA)*h z`U-=kxF|>yiS)OPW?F+5Kt@+Ughgw|?-T-j!?S&%3?-yFaM7E2<4Q2kLI#p9&v7z5y>sgD=_9C$EEw zg8JRP?Oxd3U9V2w6#3hF`r<3sGdn%8wcpYZ+dt#4vE%9~^6IeGQY5?ns1uZ#PlAx& zf0~YX`^*+*;k3$u0~6TfX>2t>*{KwgKa&c&B3v!foI*q37vEva@zODZLsBdCqtU)0uIN#~4W)$EZ z&l32&g&R}2T%Q}bv7f1uBcH$Wf`YIMxD7^V*=lLfgWzZ2P~l-Q@F~Vx>zP&NbvfD5 zO2)@tU@SzW3BGKyTqJ61na?_^L&j~JIP1kBmgT*4e`y6_YoWpAXM|Ea`G_?p!N||R z;AV_FqSG`?YbD72L!3TV93T9p%<+B~*{xRKXM)7y)d3d`e_5mKW}G145eCd?k$sz0 z9H)y7D<}hWSb!Jg3q;G`W-Wh*Y5i&97O(1uq!>@RRa`9{HIRnD=flU7l~gpkQpfRY z_`IbJlK{HShDsYjiIXp*EV>?3whXzw(~wmgO^vcLFln;U2srld{k>tc)6(wtDW}2sk z^`Hxh6_bS&t|w}JS&N>1;3;SLAyU^OT7)Sn{~NoGdbJj`4VhaDldZ%x(#C0!@VCIT zMHjRzcw?pM&+%QIP;Y#D?7}>~d~x1MQyjR+JbK$*Kj0XB#=M?SpX2*!X%fvaW z*p8zuL);*~Ik`3C54ArWTaf$*As?8&EvP|LRX~ZAEO%@pb5xH_w5MoSCOOQQ*Vo(e z1XSgR|Djm=;4pUZ74c6`5Sus$mgB3{xDT=tKx6hOBvWM}p+v!Nbh7{Xb31?QeBZEc z`43HWaxf+lLz&$6ItVfyw>VLL%(oUt99c7)Pd7H;ZJm_1B8MeZ{?iD1J?Y+os^h-e zxgKJmeot~QDDohNILXKAcV3#lD4F*;Ff-xm*HAt zO|y`>S!|ruL=y2tk)+}oPQvYO1ZN+x$+!7t?Fgbtlu+ZT&&Sk$9sDx+7EPoAP9fG- zXl+YeWsBf13F}VB9jpb2BKF56Ph=G9JuY=<<~FCKXKbFvE<&VGG6vqU0MY43zbPtY zV1Sn5?5VCGKp?V5-(O{P%lAoa=$=UAWblcmq_+mm*^(HvxKG)2&zWGx(0S;#W4_YS zJ}|xpC)o%RgI8_5uiDw${f66cQGR8dw3mZ%s#)VFip(_zLzuS1NcV;wOJ7qun~KL#(Yd0~ z5Ad5GjuEy}R@cySES{#qnBzc1N)xZl6hYBrwX!C6R7+GA9rI%N01{P*6nZlK3=sk; zPH;QevL+?1(K7FWM`5?@lZ&MiWE{v#g`R=smg%UJV7O_TDDsIH)1rvR3tLDm0XATpe9i%rAkZ1blRS<-|_{pdsURG-5 zBX}=4(3pJP#3D&rqa)`rnV+QYFhC!BEhX8-C-9rd!;gX$z0h3pG#1w4uX!T8IjOPf zgp%^i_J#7I_`#&51^k$4%1nf$-#i~#q*gIS4M%}v>Zj2?9LK>9HL{`}BzqdW>E!;7 zuv*tw5On?`(Ba4Fla~lQm?3G^VvSE@=&zL4U^}`WvK>E?yE}1vuV1d7E0o0yeMvQI z_1g2OylbN3U(r2!Y#33j$4repabun#B_Dh)hx037AXBF04T>&i^ zKczdr53R|J`7n1n_Y5~iz#oKAK0yj%Ed|ig`o(i}-KRL5JTHWRl z8zpI&f1Fh8Cr*%e$f0e;_|4Vf0%rvXonW9rIT8pLxbf^jZ0=5PRGb3bVa5Vo(g|x@ zPxA)3Uq+NWAoFPwBgV;B>0wc6G257L(u?U^CP)Z!AIfMQbQucZt>X%urmxw|raA|kw#}bfbB?Xg z^FRFXgE>>@Xd#?)=2WjDlsAP$1+l8{VtkCy%ZQE=wro*O`nJVL{HAHcIB!dGp#|GFjflZAJe`V5>WeaCzdU$&}E zm*pbxoAs#Y@49l_MYTm}f4w`CXy86wcnkb|xP~X08Ub_Hlhd8K!GM#rRMH1{LKD3h z=)k7nBaE9_czb9Aad%iXq#gCxXkIFlSetHX@8^)6&GMh6 zKLh4UUvzU8-GBUxjAk==aoUTX4$Y!ouAZ=(3Wk@lL(t30^aH8|*xWh#G=EwN0MAy4 zb)Q~xP++Tuse}|+_U1$l63Rrlr}pFmdBpGlM@y`xpl49G>13k)W}dLO0x9DR?Dg-R zk28kV5i2jF-lI+jegWPW4TBn;Q(+iVM|S~eSLot%HeKX{>Y_DOmQmf4^@Hj^CQFBD z#=hJq^sHasj?)84hiJnmSf95r#5zsT(r$?nQW~e?qB=9Bg3i*b$J4#aL_x?swouwl zlXt;O?eEZ2-51ejH1D^Byi6Aw_7H+8%)v+oYw%jk5F-v3p~4QmMp(XH*_28e1Gj#; zeot2gOnXvI+?FHjavti*r<7Rms=mb%w<2Un%$-LcVZFB`k>x9PygF4zJ7d~h1OGk? znD#z^$tI73nQx$Ruii zd$JuGG{jF+ja*TUGXJ^nB@2#gG{NDWp|4^i6j%}23Nf+qf=5CfK3GD%(`Mm$bdzG0c{U3FXuA-whe&*FwzsXDnE6ATO}1qMd@ z|E$4W%$?oMUETf_V~&ot*5>~~w@{uq{6J=(VExNWWt249D)( z5<*>x>?ct$c4Jk{B+w&zwBiPX+$)3 zs|G|z2ej5Q(pODv^|02c6E0r-BQ*N_Vi2BTFXGZ4J~!9!Nd)V`eMhuV>tJF#2;_Pz zdfQI>;qNRgw5YD#y1t~{jL-^It;sQWU!d8-Vcwm(#*=tP)ol~=`?pB zQrKNFlbU6vKMd$ZS99?xI(nI?jtR?e)4@~16563i@X%+cGX4HNe&jnHF{6np1ZrYQHbdD(_4KWG!(99<9cR9F5D`GP=`0x5MsswS+DOqv}B92nG{t1IF)140Fv>Ok!i zyflMbVE1KI@)Rqa$kD}AV3&KZ)oQTMtxOM~^I1Ohp$aH!N-%D%8d3I<9{Igvp|*~8 zhmR_(Swb*|!Tw!363V`E7JhdIpGHsuQ*bN20w1BjBG|~&V(qrC*{B>h1u)!VCwQTd z1l{`1n4;~v_o-*tv^{3Nk}M4e8GTTw&!=m2`~S_Q)28poC2&v2elU;bm7DFchX@eF z{Bw(HWW3d+AW|U(j-K1pLzxrj5+9 zAD)CLO=vLG=jTDLxStR1$5{hfn0`!n;`XhoHk9$+)l|W_$KxRjUJg$l(N>0CC*%{R zV%u#m1T^DiWff@?E!Q`gV$4^6`;NZ0D>nKx#+hF;9zI=g`Gr47;c#%bPD?MJ)OY>G;WDdNytjdh!jAkHP%*4^J1M1=t9}?92^LCm1jYRW+(-ks~vSZkN z#Ht7(pLzQmC?YDV?{|M~?cFCk2~xX>(c+JWI4gLpwD?Yy z^>p_He8}h`M$W70qy>MU^jYjIr&*AiQ(xyFCuGK9od>BO}Poy`0TRZ#Pg zpLmEKjHRFXUNk{jW4h&(Ar1D3#yV9OkDP7pL7)Mjhw1Q1dpOU<{g-geyLA%-vc)3b z93E7mU=!7(ex9W!n(2H#t7S-NM=Ju$2MJ)dLy% z!)KdtZK)bpvo>0?mGP7m_+`bchy3EA>5U7QN9oG0)QtIT5=9Mv9I#NVn=>a|k&*H4*Q2(vn%@cv1oAsJYU%``+j&hT;d9@3#%DUSw0&AEMqJ zAl+?JH2|>{fQjG82^`y@pPWgFZ9=H-+rGs*sZQ2=<5_hA9ZE_R+VFY!Q zRc;Fe1w&*Fc+EDZ^{E_F#-wmzRtf!k4Wy0YqNrGq{Ro#c1B=g!&@z32Lp*)cF8&v# zg_MYhHv1oL#4u}b;9sl?3iCpC3U^~J2BI?v>r5Zgc?gs8*9vFWwW~P=Ui1T#a1b|T& z$*|VJXq*UmphzipyYh!66y8|4JI`{2HMKqnNQmCCH8cfUnMk4@{y)CLs~{8H?TAiD zHie>WgbOtBt3o_h2%!y(F6suo4kfj9OvJdTm~9ByAo}SU_oRYQAf+sw#&uxsJs6WP z#_A^zmC;t-8&D{Epb4uD+%^ntRKHIcciiF4p2M3L6F8pe>fs`RO-TBbr z$Pm1;a+-#1-TiqLvC@wQZ`A#%s(rd!akFo)pPFJ%(0xglU|E2xHq;<8knW$k6Cxhm z^HNOUVx$^!q_2;D3>?nnfqA!p6s@Wv1W~B;&8MFq4x;b6t{6%(T= zix{5=t0r_xR^Pw73R?^FM&-y-gIss0Jo9P(j;Q#mb5#|Fn9;+EHiKAp*)ZR>6Wx}- zBuPVBUcu_6ig7cEf5y=5hQ01bzd_#pO>w*UvOSe+c+K==3<_h1CO)Q~K@8%88l-LI zcx0W^V~-mc%A(ONpr)}UBE9pab0=``BeykvGa7Lf7>Q46UzOz!MGgKW4>-ca=!Lt5 z?ujDIip+TdTFx0xlUc6MgQc0vK`_Im)HDuG!D%@2Im?!E(A8qr%r;tj3sSBVd~ap# z+c`fdhsCrm$)~IwH)7eIQ(6{rg7hXgIE>he%!fRpAAjnx7(!ib`%UmbWJd&!F5QOs z4K>53$tObkzW8X^n_7VsBPgHZx3)0G^5Q4WR`PdxmLiWRJ;hR3kMK>hin4L6%)Q#p zjjIyY_&+o(q{+oQuQ?3f3ySEaEZ2tLCWK{g;hXXcHYQ!g?kwTIQ$4W{pDGc;rGWEO zDXv{9FZ%U6G>4TxEe@Zud}_p!<>N3Ol}z``Q2OpMQ5yMTEr`pV zSR9O`7ALE{ds(4s>uac&K8`-3Ea1#^j2}ojZCI8xD9)Aq^~+PE+7mC3X+)1#Z121+3l#sH~4fP|x1@tXq7dRqGX@qDKzoRGI9vU%gdP+u1Dl1T- zt_pR>&;FAXKZYSl-ldTW^c2RZolN)JZ84KcEGtF0tIFHl%~psH;>;S|#{`5O=X^D7v*Nb>wWWz2 zegmY~JkfxC?f+%DW6Eg}C@JWixoX&@mP9=@l;q*?6V#_xdRpfh@yE^^<=PE59L=M< z$vCVWsK?`oggE<}PYp+*y$n6{$26yW=~0Ngir~|J1{qvXy7bOS`?X^^)XNfUBG$5U zYbnGVvwp@R2E)%DR(Rn;edl|N5m^^fe^uY}#`7Rj-g?hm-36SOxo=$F@^QrioC4>j zQ*=BE<+$>nKdSHSy6EE^qUYcYBaoO zZ@|kg#3m^wc?*HI83LEpPhW=y8?{A^_X-GJ@km-xjd6vx(>jrep>uo4AUKn0<>e;a zLk!G3fg|;)rgo&PW%m87URnGI=kY)+GZ*0C?_)bdYe&c(eSuZG*P2mmiJDszw>XPq z5+wyGMcT73>ZE)YB%_OoW@SIJTc(fyp-3jXmzN{vgY<9KV!p9eDukj!(lBYq=l^|exW za%^2G0@vNQl9(J3Hd|`9ejLU6LZ_OVeTXDF4<($6=(CxF9M(UiF2?^fDgea=Z3p|a zlem~y2ZZv~YC$l+vfXdD4-q*?Cqd!F5F+iQ)$9>Myy%NYFuPfugMFyma_mWMA=7mn zA{hVjv|;q=9RxfYi%;I@Gi4(gE<1;b$8}ldkL%HKSW4I4rgceA*=g zuqWf6ubHQ)9nnZ%nEA;;&p*EgX3eY=LV%y`BMFCbbksGWaS(ICR? z+ETUKsQ4`#Vvn;QT~%QudwpbGkFY*p5_GWxpbuKPx|G`OjqkZRf#HayDqEP}uId*f zNo(C3Igjs?iVx;s1v$zaKj9JW2y64mGz!DtH*}~PHxmi4PRek1kJr4Vp;J!;KxuW< zZL)}#;2`>p4n}7W`~c4W-;wAdJt*2V$C^nXv}0qB$Ay%VIernoue7P(hb8DX>mQY%0)>!rg&6!zf>R0E2;9+WX?A0w602NOhM5D z5wCU=M~}=>PntH}+nfuHXqmkz*#%qzd|2MCnOvVm4$b2EbC&%fqz5Wq#bzlF3*%hlTcoAHkto)6g;+(871_Zx})jBHc-%xECT6U?sAPY{Wz3$ zF9$3{fUmLv_3hT-q%6cp`oxWecr5xL(Z@z4NaLzvPn@j_!HTv4DuyjpX>Cl3I%G0W zLbt1og>0V>gqQW-DJ&Ks)<}MInU36BG{!1s=joQ;F@Ge&!_Ucuj<#*?_Ot|Mp$-;eDg(xUM$uOa0^J zx4R2#>00-J;&(?+Il-ku-~E284e>60A~ur{#8=rv!8DW%*Y8}>dsuF)vJ1WQo8E%j ze5)?Ica-fO^trFh;bP2x90i56dFy0vnHV)k((LhBXdUjP9DW{|@e5s!d+DZ9J2PA&J4;mS~Y%bHJ>4+IL1{2rO8upQhF zsMEdO-(!$zX|geZZuQ>VfBhGMK}PfYWy#X3e~rqS5!X3H-Jy@bzWz2*=4=&GX6r)|0YpxB_>` zbusCcR`{rVcM?^J7Zf>Y)@z&6ra)QL|M^~f=|^Yv0Dq~FUGwN@@uCb%GiK3C7bT<# zaWwh_2WRAb7TYJp9uk5b=M#Tk%x5v^#C1ANN%>Uz7qdC$aE^38=Go~C5J90!`eZR4 zFE9CJh~BX$JcXxavp|1jCD{oWWyxQ@T_l+Z-=-Dn@l-Zz76#<5zw%WSh5lNRmWIlm zKw1p0D;Q&N?DU}HIEh8X;BFLf6vJ$FE}aJG1;}iC{V&)fx2MIH-@knJNop`Ks{gwO zXzcE0^&iF~f$cxW<6UPUwBiezuPuFii?#8Rmf6Myr&TtNG|q~sGF+4RhMk%6w+ikx zz|)3fIBI0lC3p9*F=~V>Pz>jI*xNOOCW<%7pE+}ZuCyf2^AkUSH+Pap(~N9^&D4zC zMc%viXC8ZSAH#~D2nQ}t<|5y8hME~2CC?Mq5A?a~8*#E?7&MOA=hZ;$2|?+j{ChpN ztUEuA?%ik`XK8a3*-G|Q6X6lHh9b+Mn%MZf20wC@<%TNf0oQ3W1yJ!4pDKw$G$m|M zopxc9m;jCsIS%x1Y*v7M`Ww{eqckljSZ0{c%6V8@JbBAXnwrC$QEC*gFi}bwq<<$JY$2xaCL4C9 zQ!gM@v7|EA#C3u841}M}Wcs$6n`DRF&*eln&vtypfGW znoC@P$RQynB{Fq^HprkeAr6oC9(kx4l$?d#>lc+Cslx-O#Ky!FlFc&*0N|R?R_ehE z9=>l!kcLc@QR43UBbdl8`VBysF7=#D1(A~elcsJ}D_H4Fj<(o4nW=9KwtFe*mRhU}QdF+Xp)IOh*FQaV?rykbh0y5F+9u754)6qo6{BdX0R$ZwlPl# z6JSzwe63;0VN~aHrv@+?kUDYa)Eb2y%Lm1k-SyfM`|B=EoPF>Rdb7<)V5{T$hJf>o zt14j+;ZE<`ns+uULsLS8KtDdkH%!-V(Lna!g_O6(8C=53`vg^gIz#eL^#G$Q)-9HQ z@@ZEnHzTU6*ZznLSALhj>FQ*1e)3^0#L=%J8I{Xoxbhak&oBcTCGoIWs<(U%w-uVBgd2_Ma@V zqxD2F9p59u6U_n8pYa%UaUSvWrCp-X1Oj;Hd@HMEIhYJB%x=r z*5g6NlC4oE8b-ewMRw)#t&DZZ4Aj+7-*Uk18hP?;wEU23f&(%jj~(RDwQQxln&e1H zeMYdl-D59pUbzyipK^Jw+fGstIy^~7W$PYzAX9H1`oj3dUe8NcY{sxiL*$%r` z7VJX5i|`aI9Qy@43T$W@Diu)7=eVbzNtGIUjR~-ntRYV6)K=2^eoa6fReGV7NHHL+ z*6c{e7}aOWYB$;!?Beo{$I2;z3hj4cFi<4Ssyv@Izz~0dp|HU=+n_4n{ETe(j3-=!pn4tAgsCXnS!R#BN)7&W zFlz^yCxr)W{V#7Qpc$EiM4R1Xx>4ydAwL=A?fCafNOW>^wAHG$RP2K z88=k-k$mSkk|0<8UUua$R8&ZM5cvD(A5X6E$RM7ZFcTM3?A_!Q-cD~}$jdsq-Tlkk z4*5!+k8@7=DO8efS?1FgeH4^@Qu|ff>i3dt=ug2$edeoWVnIRf&3aR<7g@_&H=G~XmmZ#QEx1N`Mt z;!)zpTxO_U=OSr9OFto~nObNz`6iu2Ws0J#?RrF`q8|&Dz<=}JB)3j)5vEX6u*C-S z*bZ#LmfSr90b}|_b&$i^2=IY~mz)06@6U7lYc|NhF(%6QWu;nVAHO-oWt42&i0*KG zeI5hd>oWl>TTkpqp@N?wuym`-D3ua3)GOcFf3H^AQ*1kZ{gE$V|06+zO7XxMUO1qS zHx?o6Pv>iB8~K>)}^5AaT~orC+ch8STZpYx>mhA@9SXPZ;;OS762q^90oZFWW%J zhT^Z*yY(-~(R8r_7Ac2xi5xXC!?a6WL9yWpD7!9Z?&vv%W!2|O?5OCpF@tjC_=B`V zFO(S9K&OvqjKgx`kji%td^+Q~og{Lv-bO5oJ@K@5maND_A@a3_IRZLckGw1*afP;P z)m}B3D9zsClu$fMk5zQwRbs@rG%*`*lWhFW2+L@T zF_Ga7BzqJP{vRdsiMU2-Ys$qm1!*<)dsusIi+_! zIdioGX0uOEv8Eh!GWxX|loUGStW<`(hBUEl}@#K3}K`ann`O?8DnFB1gei zU=Co!>+1ojuT3`vYX7SF#f(ScT7$^3xse@Ym}=TZy+yy|HtV{1;1p_NbA1|(8*wT2 zVi%a-MG%za+@f3w6_VaXKKu0ag{&R{_mD%k+h#1a>(RcRdYRzba@a134?81=Pw-HF6aipx_~q?aH0|1}HrTqs8!zu?Gf7fALSaovRi<0*!5io$`;*|#WA21rY6?zwEu1X}b|1dB8dXzg^)h+(xdW;}ca%!x0p_Fk+|PEqLB-bLQxrcNDv zr)^5HS|-WpAl#_QuC2*ALHZ_W&u+NOw+OU}%91KdSpUu%o{P>Y)xntJHRGJ;OSo7l zWYrF_i_Fc&=C=GTM@(RK+fG4eI<(om3st*=06ap~nw<>gOh`55Ve!c61iC#C{w2pi zG!lGv=u3np6@ULv6z+(j@GB#&`(nd!KVe2}4}iXNvd#JD?@QIg5%l_|aWxPFqQ|5I zRrTDVmM9r944gSpd`?tsY2eQiB(%Wqq}!B zzq|Wy)l|8AyPZo7r@D7CW3zGv?*UU~*RwRUje5FGF3xF*hINA)p?>Dn(!@!}Oq8ru zZ@G-=CeWshX7XGvyFn)V)g}fgIGA5#<_Pw8VmZ69Qr-H33*>HiZddc9q28_$%{FUn zmD8G(eqC8odw*x%QrSeAWN=+FbM6+uLk+4fcULcdsjdKRf>%yzCoZqW=4EyS zV@sX8WjYkJ+ddw=yu48aSm^e-Tx_g~+cXX%k&@wAH_)tPH?`Pr7iS~)k@<>|+$ ztNsy8)fP77v^H-#m*xiPNBANLlm#!C`n=3qbCiy5K9)6Q8SkuNunaKYA9u*$KF9&5 zjYER0ypDdw*JbVNFe^rhw}*1%sHxKe<7E46lzW$Qx$2^_ zzt5&wM$>mIyv%!R_ee)yRv1`d&n*%@BUtQ@=$)yrA3ns8#QkPt2aXJ5e{{D#3Dry> z9OXMU7;BuAbUCjP$dnEqR?oMS5T6CX;6)hntFMQ|8 zEho(r@R9rL?|nBoAF*-_T1-x_Q&5bXwX8Gj_I97Kb)KD>iJvjN1wEz0(4Cbi*<2*o z=vP%NcCZ59&1H>W2fORC#JAKgHx8CgG{fe@#uHR^OBEqBdTimZcXIRcZ$pWE+!5H! zp7%;>GyNkYfy5i59c|;4jTw=LEzAh|np5}hNaj7&9QQL9kg7)jZQ)s&9gATX4`rs- z_ddN;c@)%^?4^u)#`=rq?HORAh4%iVKMwOj2w4o4U z0Tm>Z6mE1W#BZRZsyqBDz0&BCPws^|{d<<(U6Vwb%3=jU-{!x`;f%Qx!XGm+Bg(2O zbnxX}*h+Q6?v1cS#n*Q7I(Ckz2}~l?SuQjL3!nTNg;^W0G!tM*^=uDITR$TpFJDv! zk(L4A1@2tHR{7LDnG!*Gpnf9~r-r*v?6nYX+D}3~Xwz4jkb%{I!@sT*M9vz9K`^e} z$_J*h8vy!4#VqeagBrDo@6E_gkp1p`=S}Nz4KEs77T&c?-zlH~X?^klP$lcC<#w&F zLwbj#VS*7^k`u61$Z-T7g!?m2x8DBvRdUwzF@9w46LksEL_xx85-J!mYwG5?f>n{Af!~f(Id~ zEaa=!+@AT}In5i7%9TH{8gr{GvO!s5RKm6pxB2Cm+cj*vW^pW6$?ao#JGcf z34i#8n6sm3;O$lX(v(0D1v7A~YW`hR#(2S%ZTMu15>-L9w(LY?{SFM0e&jT($Uq}f z*m`lE3sUs*__^K1?L5i&8~*}$t3X%otl-&Lsjc~YSK4mktbC$LZ;;8nzB^DeBT+zo+o z_Wc)D26X-O@x~CmGv#38DSHpL5wBMwPz4X=qAdh{=HQ?#_g%rC*JK-?+{<~EEZEvT za%29)u!vG>n8d#U4g@owec`GhcR?lZYxk|r!d++2E_O!K>MSFc`W3jLT0m*#qt;s1 zmS`q#E?+qP}n zws+m`+O}=%+P2+YyJw%=eGa=7*h)MATp+rxDh2JQK;G26B~~xqn2bKUMnX(n%3~3rlC{JpL1_U z6l7K4GA~iW_=9c#W(c^AAT}7GFx|M!-O?vvIln?YGBhjdy~r}StU3WeOX0}Yt8a)DL&AP=R(BlL*?I+XIoGjh+2cdA0}WLGDtP4 zLf5onVs-U=hF!sk;sR^8lR0T@{?VTZ3Ae0B)6l@5@o1=0W~6 zo9D%h=)D{L%?M|_o4?%IS7R(NaUeDaW{;3VpR0~}{?WMdkXZo)Lu>8=;L8pvD6&z| z0UmVAi<1KrZtlpE$R9$8XX#U4$Jt7VK71BGE{abgX9a(qc)S#L!{$m*!0(+jobQ6{ z6OroG%Lm`u|ANSh;-eE!||FXMC4$dqG9q z=l6&I1T9tR!||UgGbdEJuxwKnl&HFSjD+8p^4BcZMZ8SZkZ*F0R|V|jFpyEcnk{Gu zR5S9_u-D^j$KWdy_KswUO$`SO-+)ac-@Y0&M2HRSJ8l-SdNTiI#+9+dmtlP1I=hbA z`7w5!n1crp7->5X>2t}YyH9G6=}=c<9XrZaQ#nb~<*BKXee2M?{@i2GyWn?2jzEJ; zJM$P#!$f~+_9My86g@1f4Y5n+sUR>Wv(BU(5EK#Vxp`5HStzdoC=(dy*9Nu$|y-hO-m=N*dL?tA3!L7!R-ZUvDg+eWWJr=kSz|p^1xTDn*pD zy7_o6wR1ZV;%3~&eePr~<^YLD;Oo>&<1-VZ;#^pRn#I`~(igZibHnMeUspzDc>d}k zsG2q6GJn(QuNd%A;YMdvG7i!a+7Tjhn4P2O3~Rvi66Q*0=lOgas3v*OmHmIE69VHU zHkNVez=2j8(gcDe@yP~ZK~M9|=O!}w^eUa`vkiX+W=26N)Gab>Kz zP?UEwWK59aLQ}bFco(_ne521cTZOx(1tXkjUAZ9BTne0BG|p*(wP6eu1diW0Iu}N? zOSgiQKX{h1w>3?s9;_b4Tu%kXc_?q;xD7p=@t{dOwf#TGd#s_ zgVA5$8VDQ=p*=3f727DzYo!fXu{05I&#^}5NGZ`#vtyn5zsdF*I{HcGhvKyGv>y%` zSs;3G`TZZStYU=+BRw?5ImN1an!LIBWUS-H46Rz+sNK7Z$mSe#Fa$^N=zLU{do=Ek z&It(I%qj{9>+3nPc0kw95%ez)8hb&$ZgaC8IIw^C>lOy9UEK^{#)UM9jD59vZTe+7 zWj&C4bPYuSznxi*ZvAf59W;1{LPnY!KtHSioi^>gC#+$>1P+K-q{RM>V_;`-8!FBr z_ml_~F>MnFXYylR$h0sn)_^V9C0HEL)sOtN75GXjMIw03?_-E<$F7X{iGL$6v@nL-Dh7BJYFS48 zohw{d2A<+(OWE>O1Bk;9FO3-_F4J83Jh;VATR>(XUVzB$*veLAs4t*jN%i)>YLyWB;bg}%%@ES6wqWNCu zVBpYe%Y6;ZBIk|NKxnE7n9lB=sJ{uf_5w&B z`+pue8l0fs+WLNllD+1AlcN>)|2*}z0>=|cZFH292ZemJ+z78`5!FQSP+(tY z`yG<;<#f^-e;n%FqWxxj-LLqDXG*9MivYu8hj2*KCrpP zdVI*dku_(W^Za(M#ZJ#i4oJ#%#kM9kX=!)6RU4SR7(o`Bd9?gzTg1Uzh&L>R9%n-;ElvZAU#t0~pS+ObE2cdiuOb8xx zWs=hFGGy+JdFPTVA;xTly>NfZYaJmu>7|#-IK=DA7=232s1^SVBozxI(03I1utd2tdIYb{QUX|4g}^ z7JDaY0~dAc+c#bDK*HJaY($AF&Fq;=YK}gwhg!=aGNFqKygdqKH9`-}dy06>7~iW? zTcJ?o2fP$KuNRq2w0~gTC_T^47Iw}Iw5T8xF~BWV zG7e2L?bK!5S!PxYP_E$t{a@%%dG$aU7nDKgRuif1}BEU(Y=r2we{@T6P|X`p6V$~COsI&rGz1rg464R~;ffDw6q8=2>2 zPTvJ~EwdMD z6?$aM3<#I-o=ZP4?Vs;o_z44c`#*ZVb@b-J0!3J?oUsGbVc))aBG^N zx^Az@Nd_J5?A|3Ve2W}I#bROfkLh4rh0GUHNsnP3+u!y;vv@4B^~9xfSQnoFx;MH% z-(VmG{y=T%qnt|3>z4|uT+xSClWrxW=-;PCJ`e|Y=c7h7lsf`zmGn=0;QXVN}y z$DkMNlD}i1zG!kb1@|Q}G!5OWYJBg=STRLc+R z!lItZ&$1q|Up|BuETqn;7t2liz8EcvBkgOr%CzH__$>CQoe!g-0w*{Q3Py%cFsi8x zXl~u+$wHMZt&Imsn~5+p$3)X-W-L={q&4SC>MpGXg$aLSygUiBS>3iKR8lLQ4Prih zz;bT_CSz*NIEiaoH{8qwr|9ZDxEq3(Ejs)G80KRA@My5~0%CSZ(H1KH=%9T|>CT?Y zO;+Xcgt3?`1074PqNT_Pg>ktYxtT5F%Q{9JYNQsdfkQ4HS{1kYet#eh;^H2N+`WD# zEu)gjH+k7Xd@7s&P~^}AAGO2b&zH2VaTv0Jr5x6aM8dopqW`4>*BEvbh?o$i+_4_fBzM zlUtLzSX1wuTB3p31C%A{tRA6+GJ~9j!+4Whc!|Ay{h@ANhqGCuY21O3+<1nm6+NGp zBRS-1HaQQBOc=-D8?P4{5z(3pFwR#$$Y=K94jx#jZqIXcTLfncOY6hSfM|n2v<67) zJ!`27j@zYCDakQ)h7?}Vaoh&*SusYfV1cdmy(}g5)r{A128U>36~AwT+gm$UiDa3_ z*?DWMw%_eI2?<#a`|N3o2c9&^YDA#45r-YWN9uOeC1+mO)n&Jj;xPerxs?Ic%UwD{ zQGZ@CxHpx-if@b@xXu9oQ_OKhQDkO4h%0Bk`i{&*t461AcsX-g{2mU_L8(qDU(Wu`5)BFVuA6DmdEE^f2lJ{0tZP`|KR;;Wh7XfRj z@E|c62^ik9{8F%zD{^q-QB%URk85k~_@)6R3Mpg^Z%{hAL!G)+e&8ImHKq$OtziE0 z1-U97?tSJu%axqPCrMLRcIUQ7w0ks}O%7hTl>>N{C#uPAOJpa> za^Z|`Ukr)Ql2C>_cC>gXs_S$q-^hFvO+^br4rGtYBu2Ie%PN@9#9Fe7Y5enTAT*eW z(GwUlpRXwu7Jthnd>*q(*eq1)e$jVl0_Ot}Ezo)0vtdg3Ea`qxTREw=Xj^&cTBo0D zLR@QCNk=m97T@t&m*#@{MgF>X5=OLVJ^dbpPEkwQ!FBvOcf z{uubZ=pyD}s4lY_qbE+QFvz-;^2R^UQZF~bQMw`j>mEYnz^g%+{Vb)2k@tw$kU(pJ zD7HFWwgaxLXeSHiLERHMarRedfuzD#L*<(b5g1Lawj5xb5$MqanzC5 zIY^#*d|C4Cp&)m#=T7X>1rPTam#RaS6}=#7_z&06FI-}I-H2^?6(I-3v`+A*hr0Ud zSKhQ8IXB|T{E&BYkKG$kIDF>WZ5UlRgDPfmgnI-R$eFSwaD+9?{ zq!)3GT(5t^<&sF|E+Vqc`rgM)%<%GsVlnz)(ImvXzC zku-7&>kT)Bd|?IX+L_1w1N$ej=x#M4Aaz1+iD#Y~=G!)r;OIX4P1l?w@9@d*y|!Mb z&e|~m>IV4S*cgr{6gL@t!KtDoH~cNvS;Kg%bp>9Ub^m_!dGs?OzZ0W3+K>0a?1dpTD#)M?UU7qcea6^W#(mZ+&mI1` z0Y~(^V74RL(+@@eDn5NtF%jKntb?9<+F`M#K${B@Gu`_^FV!xbkODtww%ry(yU^Xa zN^T76sv*J_qCO9cv$HBhj`cZt;^wN~YuwIU!?7oO(!F)nA4&$iGceE3)lT3kMU3nH zJ+s&&MRZ@U@MDw)Q|y3Mm17_*`W&RLgVvf6v#mNr8As_nav1cfEL=LAUPV^k(9pT= zFt`?5aKX5mQPSdU=ZCLVWVmg6o((u)6j!M-0vq95nSEHu%%}|DR3inE6B}f{m?#s{!j=4TBh)l${ee;)1VazOFnxeBnOS8ew%*8w8&?rDI zV1ZWgyXQ3tiOgxmz4v~tsxD1ph*E%X7+c*;$yF5IDrI&(%XqU$&rM2oY{X3L8xb7t zHg>hy8^L>HkY%W?bHsZx!bN|@6VD;n{w&EP+nlq;bEUTKdXYuRtv|++BDJ|@8?iP} zf20tPCDmh~dyDCYo32qVSq9m>UkF`K@%HO1!b9RkQ;J%!#bp2X7}Dy16pMDhA-zY; zgOaztqM*>9%ip?gY^WKF7qG|8D&5!U#pi|a=7iho%*rs<> zpu`Yd`c3&ye%F>1EvBACds#%s?-A{2@n9^bkuUGaAs7zq;JKxLiDHnc^>jUKRJ^jS z@%k(A$^=I+;GUDSmw56L8!bOikF5&b;7hJgPgQ9^TYO8=Y7M;DBrrk069f_1N4?tZ z^%OSzxis-tGS~Wv2+=)xhAEioD^w!#u9Uf&c08a+C-Bl0OM5I;_cXF!abNs}Up$>3 z!owyB(=)oakSC^{){Lv;7ccXTtxmX3iSPJAg*WX7Je zt3~yelkAQ+m`4FZIAq07pm!n0=6fH&z?5x+$uz{2ym>3z;okRZ+*?A3@0rG+YoNFu zGwBBIk_HBkHHpJ*m^8;5V^;I~h!P44U0!L1vt>JHqMpwv5Ah6W7Jv2i1=o!shVUK0 zq5tJK>p%kk=IjbA&|)A=4-*hQ9AXs^QG81;Zoj8B3r4szrXR8c=%JJt;I|3^`zfbL z!V9P=m{z0MVCaXw+NxT@*j5}B*78#51X%8ksii$m+F7AwQY@Z69vKK^XXoTi$0wLG z@OS&Yy%(Qe@LXuRz2gtX-Y(XiW)KMQW%g=j1lrPIRQT*V3ui!Lbz%%&VM?ZlZgDqcHT(HVPc9asVgEHhVYCn(&}OTPZ5eM_bWi zdLmQWC!=3^?$p4;&G(-7^k+CSfWG3swvsN2u7}1<3>e8UIe!J`t>e@}I863#AoVJS zUH)}S?dw+!(D1|ZBtoXIkNm^NSoZH>ilqh{Xa9#Se;lCkjTku6-hF-$FGFa8=dnn4 zyQhrmksvCVbjE%!Q*BsR{K|8JCf$e()11NQOf%qP{-^R}ZP|D=vh^FZR}uHtER12b|bDM!99?ASl;qBDfdN9gHE(oewv^Ju(DuZN)Yz98HZ z{xnQL&g|Mj0LYY*hJuO zv=E>7Cb^{JC)1{~rqgrhuH2Q<$8&5MfV8p`K36KcpF?v6Q)U;3r;vwQamCQSmk?U6 zCL(|triB*_RTTm57^qv|=L0(&@c#rfYJwy%Er5Z5w*T4f|7EQIKcKt+3t6!I2U+;< zbcWrp0qYP!r10Ahw2+<*Bwrw+2w{XU;V||#B-cU{U1Rs_n=BOJ_bWV&IH^rwy|2}` zligiHsL+DhwCX0MlBa>_+Xxh6Jt_^%~d%_gT^x@MhIL{7*=$>1tzzX&9>QcPxiC
?G2eu zu(rh_P)yOmq6|?!G8iV zs_6}xtpC-i3LFTC@_(+CiG!V^k?X%=g{jIpY%;?2TxuY#mjE+6SlWXJ72O`un>?-=#@Jz88rthq7~yuFGhHv?kAU|!LFWh8B-r(X z%@eBv=fx$M+E6xcYHtNo(GXyE+9qS!v_puH7E+7&3%TAEoec7{gH2%da|hvs2bQqM z8=iuiatHX%8_8JHW8mSy>JoDDGN-%~9$CPdcFQaY?+7`S*P)GLRZ@vUYV9+PMemnB z`NIrEuwWCF%|s~cJm7#@VkfKp!}FzhgF1APsJ}q4{*Cf7;8~H#Z(k)+s#t>jP0n^s zBNw;nMWi3MEg4UcQqWw<5VlVG>H7oAj?5qTgUXjPQ_MBYJZm$b~kg zEQ28&_F&h`B!$xA%!Oy~XU^(&KV?~~T@tmy0@AbUb&ktMIiu05_*S?qrDH3b7y zSKQMV(x^E;C&V%(jh3`H=_qZx9FT5}jag={IF@?7nh_G*6L7CjgBw3kb*z4LM27J>M(`7t5JO*OyekG0CWjEfKv5SF0<=hkYcVr~VM z@8+eQ+GeY6zi2EKF{%nx78*m-T6^exmOgOkY@6ySX+Y{)t)?)Zl~sHo2~5^i2!y&7Om4X|Onzd+4tbaC ztkmdH42J64x|?a(HkImBUz&qHCcaI(>nUZC>)?KZ)hTe~Ca^^_a7 zu6obA!xQ?Hx~mEGpkEW)XowMAH|cp;VSl;0KR>@{=~U;66!1onZJXyLYyh;h%uh?q zn?E1Ue;bgP{v_G8tOm?yq7zOG@mzqZ`e)4&2ZlU{rbgbnOj}?P%!kC&^j^ME4IKan;-{!Tn^q9O`F7MdVduRku}~iD1Z_-5vY#$9BXF; zBU?IEp0X_En3%BwXs4rLo`J^kQwP|$+@2sXr(rY)>DYJK*3=?c zuL{u1D||nprvyA`@`e87`uaFJKVRhhTy;6*;^N{~|EX>HIkQ}MeWzhwolt*hc47(;N(;4a62%IWRctLTro z?$7*OH06Gd)#lD&#ddcEmz4g|1*k13+5*-g+T0f>E#BFuiX3sqbeWu?LV zg_~u&l2M9n4b!*U!d)Z2?)p(tN-L))`djBwk0sjK1tfXA0m2oC0bb3hLMelGFBZmw zl&|fm5Z{Rh)yA&oAjr&Ko<0C3G#UEOAs%nmT3`n>*rKB4qVL*{s;kNaI)NRx1r#}e zCv_qJ({HB@lq{j}e%h8}U#1f9W{M{n$7Du0y?ViH(^P8%HVEdnI1$ir zZ7h`SjNIlRgu!^;b)2tJQI*+Q$_DqU-~KqX*lTYQkInM$^Df6|G%P_v!i;~8FZQbQ z3zKi;uioKW?dE=8K!r)={O!dnXLq5~;?KoTg5r-rVGkX~k{>3V+cR7DF%8$`Zem@&J<;AACEqIF zrgXKtC@RQ<7q^PSSl-O|6$F=mm)i>B$;b8AM*oW*Y-bFm#`V&v|IDZ3EOI>P;5ZE7 zLcqiyyvy;4BR0BWi2j2q!D<75AwyYm#q1=p`NdsoSEpxGl?dNnd49UAlg!mfYt7@d zu&r_e`bHxWMr8ZPr`d(-==!i*hc5L?OF>{iX!^9Yso7ShK!IVK#j$^B^z4hX+7*nJ zwfg91?wgf5g7dQvwEbsnd*d^4eHq1!eBvfo+ab)Tr>56zW$}V23f-cvdxwr0 zGni)d?d*a922I=yElsqW;s$`HTDO0*kJ2$_o82UXR_N3(oW!c_R<7@;>_91fGm6&r zlK2fiU2{yxhxzkoT`+SOiuBLBMZa~k5wzg2v03XAdy^w)z=at1PS3ur;??^D6WdRg z9D7qRF52#o$4Wwrhl@QE!i6lUi045v;=9AA z*&vFczO$!5M$8wo^`bt9Jgc{?4RfaBIA8@&c0`OcU6{$EI}7hNHqa2+jfn7BUv1a+ zwlKj0;~5IiK+q=B&?NV{ABc$4vtH70AdWlfK}pAt;s#3PSB#%C;&HmBg2Y;M{Urrk z$m6hL=MpB#jF;BnS;SWI+l~mhK&^rpEu>L3i~@puyi< z7s~;vpR-yaB<%ZzKqaPPF%vgQ^w1H32=j%Uv+5e3DduIeXo&9O?giKQVYd$*Mp6Rb zuSL+J89-GJV9|nu8~rW&xQO3(7gqzae2l-eKYjF7t+sV}JLk4TDiDd${SDPJ9bc*t zf$k0y!ap8)@kk}qTw}x>%#k$O`aB;9ipZA$gT08-vF-=yC~**G#e1(}vbjP;Ny3Vx zF_`XglgKIi`p(g%5BmIpLE{Y+B^;YKX&4NTUpp4dMnd>o7JS`{ZFA2w#%g zvwAWS$>~4Pcw_KZWm}7%?OMA5l z{q?#~Mz7YmLTL8LthdJzh`}I)GF1xn^9Y4+^-tm^2W24bW%sq@EPz-&NZnTP-OvJsbtrLfVanU|7u1IEUKZbL0#@KK+56=7AmkGV>O za-x4E%|zXW?={}2SRw@Jnk|?HRx4~t0tpQyna`ssk@JY8xnR{=GFVQ_6Z{&lahP=q z_T{#9jpnFOqo{k1KFRF-yaK#S=`RAA3}>mZh86<04TS-JnrUZ8mbrr6H-aC3 z9&J>oB%@=ivN9a8KssfBn{9W3E_ltK?KnFg@-3$5^W?3d&LFPm+b@N(|@a<)b+(;$ysY2#KmHJ^ zQs3xX``+KLo{G>LM5A_};>yi9!ebzH#jMU9L7+%9`abAaMaFY^ zKnoS~8_Wy#fWoG)x1>#hgz4xNrOEkDD!Juf=RJl%wCEZ;_BYH-7XF#kLCBK1KPL$U zg{vlB&Ue$Xp!1oLoS>>y>zLGnyePUNUq|Z!J4M9z>;$?BrppmiR9IBlslVY)s|R;~ zKbuG{o7J^;8^j1*DVXbi0<=%w)Oe%ypz1HNNm26eC_M_M_S=oucxeenY{JoDB>w~; zdFT=ww?;umv7kHeeJs;`m|MMR%~ey?6mlQf>Zfr>vlbqc)BLH`pTSj>Nr{mu=}Ju% z)C!4e|06YDx=&}s3M;M14h#$l$D^n7bn^uJ^hl8BhZv*Ay#dJgVb04RgQN)01u{io z<>RGJmQ`7})L!CBf~G$;6r^_Fee@X{nXN$W1yq9B4qVZ|w70N=$ZETl^C0{nU6@C^ z0h@zCxrx(RWdDJ|7E9K%og?SFLA1GB(7`sELCTXDfJZLPLykFncuS7pp3aI{L4->h z%MIsP+K^dDXcAmO1y)FTzzTo&m`>+%v<9|f=~QOJviwx%NMCPNYkNWv1;QM4e<3Po z_&I8e8jFkUHkmmjAw~E{3jF&#EJemHV0(;HW6$h_8fX`M)h=KKAYDR>IXY*k4b|##i*dIH^xQ9LeEFbF zt2NxLQ^WekD$#K5&*J@yu(D`jp_n{NihT)F8X6`a)7Di*_jnp6lX2uX*+gr4CcFla z_@Pi$^V7~)<%fES^as-9h~&&H!JdJs?vLkv+EG}fKh;y9$e0S$L|qGbPMgYW!FFJX z`Lf;pm9{7C{dDu;g_jN>W z>vS99rp|q+V7*8f31_{!E|)wBOX4On&zCwi7_HnYIRPMq&HPO3L#5W!XRciusn?|4%btn$VvX8q%Xvf+05pbvq#RSk;Ba+~HG3?c9Mv5M+ zo2q+?XIwK|xV%?n`jMPXiHmX2De(AWsk(5!k(2--Spnlh9O0?7r^wuXK;M^M0v)E0xMmop`3|risSI;oG=Y>8<`O&ymWT?AWBJ08ctgw&h1)! zUUMkzth;utc0dyMD8run%QQwFM&aGf0n+88_@e5Wtaga1j9pUU-f%8I5^G&e^siVc zMZs*Rw6qCa1&*kbF8TEr87MIjBUX98LSfFHfK={>bNFnsbV2{Tx=f{Tmz8YUuA!Z8@QK>um-`YyPpnt`ZU`y%9L5%;#;PaPO6{#A`( zCRWgjWa++8o?9;sHH~BOYyHXcEf`~pC}SC6X+Ju-!iS*OvIze7D3b<;2L%^G?BM9hptcseolF+%>=T&hq6fs~3EdNmW%4Mcgu*aq8lJYFtlg@+Aaf7v0_OO8| zXDsC5=&xw}4#Agf3k79V&Ib$%1PZw~qLnlM8jGx7U@9MTfom|Y*54kWuR9aXhzo$M zEN|hIXrYa~g6*OYu|O1Rd07DpZk|rp7#!IztBhPdftNX>%>i)_+yvpvQ~WW>?b$>K zCRK+|%^@H(1?2$l&W;YQLNqa-aYjT@52RvaLs{u&Zr}#|%2O|UZoWc!WER6t3)8XR zB$Q~VNhan*Or9d6U&*q%fv5see9D(Sza)Nxh9Mx==cV4VIS+ePk3eu5`lT^4757jF zs9>k!QISaSEre2%#RfKsX$}bSW6zbFVk32SGXv|7wL_f`fP^kg8IkPs!HA_-a(J2y zz}E{puU3=M^88Sun?)_8=xCk2%@nN`z-R+xfnFGI!*CiOpmaeZ*8#&FDf5!(TmOp}C)Z zi-Zfl2bt=E{y1#RJoK1?kdu43?#Q?sxmrcJ2!*z7>29}*zAoDt`zz#NT5*Q^jR|6T z6ssvj6+2!s_3x|LM`Y*Zrb^Hl0*!-5t0gRzcfxIUZBcqj;)&{}t4_!c-g;ugIBpeo zwRFw}b=wV-q{C_QM_hbi+&&Qx8q3+}Svx%|BoT!r_!1JrJ5StlPayZms0VY=iMgGkMvx8*}=crs~L z9~vl=MeZcON7v5{^fxIc5)cx!FlNJPbo8RU__}uI3aYnAl7OiM9m83-&YOVVypORXrsqeTc&O}be~of;n)+6O!!q)*nVE-Z6kr@eq6*bSaLqa0 zW7IH|s%$^JEgi+-VaF|>@iO?Hl$$^r<$=8BLqwS_#{4lg&mduw)I^JbE7hZD;i?)t zL)nO!D6G612-GUC)17mN5n_M|vX6><#^5B_5dkrdNkw)VT{_Ls^hm(V@1J+f7F0jE*eP5~j! zIRKW`Xk!Fq*7GsOX6>QagGw&DYii55fTj)Vs9vL}KYL!MZ9J5Bo7vFu%*s_d^sXn| ztQ8#Oesg}f`0Q}IqT5_!9?odTch2dK>bpc|SG-a!A4u$`a;Ss**U=o{%&}&*kr1=5 zxP_BUHTXS6zxZNvY?nCm-{=G9IJ6rQ{}SXVO?))JVS&CkS6$ja+%#%P!L>~%AK_-= zk7EaG_kK{rnV8=$@l*(3ZyJF(}DLT+ba4wvO@(z1NguP|TK_tboe}^d~)v?;Z;y<^0?fr~K z=ibaz0}qfe6#(;;+&=c1%b+dXUHp0j%zWDnUjfI% zsJpQOqUE5QD1IQBhrS5Mk8+;+IXSu&-IrBT>Y@#g6hOSWKt$%rj?5@~ZKeaQ^yK58huyhJ9 z!%wP+mnKsws_L3?1{FMw9yULq#I%lFMAOO}J$uo4SOrA~H(ncJZjlPFnU;R?{0)Wx znhbsGy_u@u0(s_AZTdU}iW%|JOJ|}~%pJ1fJ83qQfkfNJAv~ci-`g#8Kjk6xE-adg zZ=HQ@THO-=Y_f!(Y^n!hc51raXTZx~t_XoI#XjiOO9fZ1Ep6xC9->eVk-l>e-LZW6 z$m7B*43@?dieRD8+2}9~Z9@Fmo~w*NG&(2X9~M$%j^GeXS36;CJ4WI0dKf!)UMu$C zl+ZTlpix_1?z=4g{uz1St=AmM*X+kJ<#a$t^?b9&khq|fvSPIoFwsMHG$NbeP{_?> z!Ja=Jb>5scP@vhzPR9W&xP7f&Y>Gm0ZJoCYA^%{y_RMPT4lp(PcB?=Ugw@c^T{#Lv{dDaUh$ z{8?T(ZfQNVNhe7U&#Eeq8{vdLtoA#adSVwO`^kOef>mg1Enl>C@@^{l#$>W z&reFp=$p>|L@IJQ_7RA>XYbxJJgRipu}SI6cd$f^m>4t(Tj5cVCo580RNGApR8Pm+ z@iz3}H$)|gG3ieHR53Z6Y+d7-n!tP(xeRa3UTQi;GiL{iTtTE7OV4=Sq~ly|eD&x( zl-wyHa&QG^akb1=rV0xPca7EN{hIrL#%s$R+an_nH98lA#Ult{K^+VCIt(nv@m}OU zC!G?pH%X9EDwnJf_{(Ee4TyBWWZ@^YKxvj9q&h$5teHTErG<;{M?(*Pc!c1Cv3bF! zuJ?FX3Vf2nz@3)a?;ieEUAA|roq+8JD5B+TLGQy+O>WyO{}MsLD`)LNE1;6r=bk_X z3dF8U6z&nwBz9jty$3;ZKI+oYTi^I1UUM01@1QaZo!&E`g8A-l3!sA7( zipl1qN=;vFOCjXaf+hAc?kTU#2`x@=6Do!V4z+kGJy(MNGvS#2N;=dHka5pJcP%gq z2p&HvXlLbft|Gi4Lp6t^>k)DL6J#eAWan(~hbOSxd!{9B)QxLM64=;^5@5}m{1?Mv z%akGqIE6W*xQwQ&1zc$$_56h7BJhR1BnZ^*WC$xrq;5oNGzik6Y8}yg51rdbFrv=4 z6VdmjhtEf_tFCVymf4p>9?FGN;u=XW_YSUvkOl%Q0^nm>_)0}bOsP4YaTn4FqSo_C`v4BEnt%d^pD?^r}C zk?WXI|0Ng5C2bi#m`4ZN^WHFmJ;vwE_XH@R%)}h;Uo&X5w%{>u$@+=U+}5t9v+@R7 z_2L;%xkp3|sJpk~@V3#}YPyOZ(ls3}ds04q1Hhf7=;+7!(Y1wwwbs2rqkBFPAiy15xF2EH7pSYe2wXDr#zD;DCAB zE}r#DH)Q?#lMo^l76}SmXbTVHsBqq?vVH-u>svsl(&0l;k)B<2ffj$|5N9-X@>|1WE|v$s2~;$Mj^ zr#|Z?>g|=yGnl6W;Dj1>f85mYKyTl@8M6HqWxJ_Rm;Yky8-hfMx}@8-ZQHhO+qUuA zwr#$)ZJV!c+jjTg-$eY2na#|i))jH%R-HU2^JG@%pW2DQ@xAe3n0(l9io8U8Xd;p^ zlBqx|ayn)>X21L8?SlJ?%&)4BfgF|)na2(fEj#RyG{$F1-|yN)6O=}CxbJK5iaiX1 zt%%q5!!rvP;(YO*P-mN+953nL@x|$Hv6VD}oXqzxD(V*L!^knRnO|e;TB$6Xx{8o~ z24u^@lUNL=8OCqXy?2oZCunZ(?k!H*gtaCi)5zsEO&)ikcfG30noB2-_DQw7W)E%yC~_B0g%dV0#%O zX6f1LTGeS-%XKu|PO0V!EFE8>Y>VF?e%SZ0XF!x(-;#E4=s)^tGiNnubX*E`(#tip zmg%TI!P1fD@}n4fUs>QzqIv(_nGFiddBT9EWnrRkn)5 zSd5|wx8AmbiDPiAzh$R~lA^EVE%tu>eLu#ut`(QCqBbhpzMztNdwFwNGIdz)WECPF zo{uzZZ^iliPqwWy6Htj~XJU+dcf2vB8NFmnWo2C`qxYU_FH}69uGN6S2fjk!(q#d) zFwuzTKZK4Luu^dwB&n~!(dd@+B>u8CaCe0d>!73359D~n)!|wm(xr*?go78#<_->4 zW)UnEIA#xpn^pOk)bMLQbul}0lH>Y2V5D!pf7`?V$a1Auvb*dEsI5ODWnGDxH=hyU zU;Y{DC0;rS*7E-Q=b{Ur9d>(~TYUS-QHpP!zT5#(jMkj`LEK2>$9pzuaCJ8*JlbY|QkTAfu7xUV< z-04NcI!A($qQCM=tGi=zCg>8e%;~ZG7>5j<1()4q{$@T^9%g7EpzD31>a>=26iR8Y z&j3!tBX;fyK!Cf^IAJu1rDqrq_dCFs2TUpro3?Cr%F!Jkmouj~Pz3J}T&(O_89k*l zZkP`araiP!>jJYXHM!Vn|w0y8mHE+64pcV2Ql3G`Y4jzY<)$9Z% zj7&wjxH;&b6(=bN{@`XI#csNbq#-q-`lxOe3#TOhS?HWpUMDbEPoObr>&=IKseAk& zWSL6hY|q35J=7|( z`X04)Uyb~7137`b)GD;4|EPT?TfR`?k1h!_bUc_Tzql``#%0i5PFxuS$H9 z+ZgJoXpChCN@YznkiIEpdI~Qn?+pk$>^cedbpb4Q&*th6WS1)b2pWmLj%jdmO^HAj3;I#xbcGnhtLd`d# zyYV-7uXw=q-#(+1LVZ1RJO_QM`MkV3I@H=o2nfslaL6ik@9GdMe(*gI^rUkTCZ`KS z=!?*QvcF;Np-u{R0eo*aR^%Dt z9yvL0@&g8~%*m(t-Rk#SZ{nxP<#YMVR<^uDu8aljulLSQn2Q*4Ma9RDDOR|J#iqWB z83b;qlHzJD`11q#-vw{GUNbz%zhc_z-{=1zrZqNoa`}(mO*Ot=ZioRU^o3_wUh}$G z*i5mRvyJ1tco1?VaUW_a=YwEe zQNbitn_(2`Dx6vP_NhLS?H!9DoCO}JG(m+}PA(&rt5Pm1y?sQuw}(d^$jeTLNT<0T zV3qBy1SF1Zl8zXB`|zZTaIs;HF=>uHe3*&8qG&r+G>XHt$>d|(;Nr3U4^O~V9e+1y zVDIa&wPzTvU_jplCfao?W#O?%u_9nDoUG zNeiOZ>C>rox*_c2PGg1lfBO$mSacOf>cX1$#TwB5B2!t5j~dy!n%6BB(^$4vZ)NHK z_j8q!ICg^u2LLesO@sSCxX9`2TiRK={8t8dvxe=j6ExCyjXqw@)5hh@UyvjYVbEiEHkYeN}nxk-1_wta6H%9D}!^^<=mK}5+O%x@MPy3=QH_&*j8 zAr|Qc%G@n_)*odl^Jm~m=Ez$V-V%#r-@L@55i73dfvZ^>hyezenzvfk6|se^jScum zxhhoUk6nFZe!*E9mih)nO00x*ykv&ZG!m)zI(BW%5f^e)+Y4Nc6`f@491uT4EtAKU zN$m>OjayTMzT~JVXrxXlD&Yxhi}6S`T-r4UWZ9Mx6)(;#ULGEjl!YXT<_sC`2oY>E zs~j_?lhig2ZtIohq!A`_epM+ul#MF`Ow_8)MFtC_X?005={BRP&FTtI1QJOhhvUJI ztc~sC$Sde^r}XrwDUrN4-=56P#=_$VNf{5_*OlSEt^(ndMc}y06RlqtZZ}Zx!>PIy z^#xl+O2teG($F6>oV&O_Q4}^dctVGrkjYfIKvvk`I!3zaFz6^dLqxVm`n{lHzf zNy$uFb=fI*9E#&U1;>A`ro^MpUQ(IP@9htj-ulAU= zRc9U33oS@JC#dw!dS)MfEZ!giiXSC|v*Tvkr7Y~05%G0GpKuUgXqH~HDI=wpQZjK2 zEf<1Cx!YXr(j~=KDA{O&iMr#7ahSjWJw||Py^>e{wF{_+pKwvXxhLxzs^L#sCdxO!iVrn~MFD z#ssBJTJuJ0Xa~e;8m39qP_w&9t-C29t;%+d?*Qjw8?j$RsxlTf&%l*y&x{6ctxDe$ zsgLio4{z#+HjR$d3vHe)lizE1GQSyis_4|2<)z3N;hhIG7tPThoRWpR@a@;`#F*n(DnIOzyDymGTiqtf-}oO!Zw4-j)k zgF{==e?3A)iO~!K3QuCss^*8Fxh*$nY$7_q(%<3Ao>S^yqO3aOLg~e0 zVD;e93@>>&<#XFhYTP?Zxf?)lX@gq;)DZz<#52I|GQ9vYd%lx+@4;=i3i@TMC-N)v z8B6F-4|vE-4jbjW^Z5l06<>SCI>{*DU-D1m=#@<-a+%bC-E_yoboi1b(^sjXnH5|2 zDD${O&+6@RR>Q`6hyTV|V3)TPu#giL=CtYrUexFQ12w+%=f2(@-!=KFmFvvEn-Zt+ zI!nZHK`-?{V9MhSt8q6AwxxFSfd9ADGb_fles`4E3G8rUl?H3)X4u=v{@8gJ{w4qE zj^U!dxZoJgs|9f^ErZ8RU`BG6SPi|c#U#j}m}ecTu~D|I({1||h@phTDo3%$6c%$u zvp~4VnS&DC4_y$kJX~ySdku4mmnK!|9!~*&bYZW9fSbBoRGIPxDDPf!@2VjsjNzNk zNHyRjvzL{|PFV$I>@__%TiV^$+0^7%=Nyf6q2|+^);EVWU+-QllH7YcRct}R^mISZ zg3)B|2LgZb#$hu}>pbSTU%{!iwnewIDI~9_NR0!}M*mLZk<6RlXIVW+1DXSgmJ&gz}2uUJ}c%bN87|Oz(@qC z(VJ4iO}&A5d%R<6uxEEeau}LDw3Yjo zTUIkBLB1dxe&-D?Vn=zUnd1JN)j02Mw>sy@OKHZnGVy=D2NYd3VX#lvXbs4H5M4e@CO_>aNAksqv|PXaHeQ|mepQbunxA9Xw=dqx}y znIuw|B z*r%J7n<^R!&$wB*^~jlWcnm#;(Gxv!ce{0P-G1-uVU`uI@DbSuyAzw2xrV2m9+#?X zQiwlZ>o<p-oLvlET%Glee6iVXtwi*Xy7Q#(vs2czp)_0Q}0PtJe5acmS^b()u&t~tv1H8lT-^WV$8H! zySCA${5^g@+|GKh+mh-YgP(F#lP)__l~nT#i{3*bs*)#*9SJg2@%1wPPB+zBFL*AP zB#RaI6BdRqA@>cgjfEcG)ax|~=;)&TyD!Jn*rn?;8nacOjcGHT3491<9>-zk`G6pT zn5_+JXq#Toh#~UF^!RHm4@xd0#O|JdzRS*~ABfJircOlfW||UtOt~FtH84^LotUtwb)lauI#Vph2k+=q>{%DIy_>w6Vju_O!0jNR7xXLk-6&%z{=F z51k}BmEK5H<=mtBEC^LxF6L!5JRHzX(#<#uqzQR-{6_e~5N7pBCq;&P=~m__C{t}m z!43a1tu>u3y45Uh>-vL<7|k9$IqmxX*viyi$Uu`#N{-9+(b1rNVt^Xq@z~2&vq>Fi zF(U6uQao(dzm_Qo0Por>V4)tl z=RtGJ!ta_o5}WHG7U3?8(^2p7KZ^zx>FMJ;rl~L$Fy8$Dd_MQ=c#Rq%L=7{ zu>8ORwq@8xVVB8EDXQIC#x+H|txqOlt1C5UaZVMrVqC4rMJA)ZIan#sa)AZp$i=Rh z-1D-qXG2SIGH5xxiNw>l77d>JEWk>~fI4^rNMjRTaR8AGL3|Av<{Zu}r3t65yIfZ< zsj5pH+l?;lPR5;{{J>1X9=IS&J;o7UWf}QdPOEL=c+OX9 z4z88Oa!+dvSIPmCWWdsWg?{RYRJZCIbB2%f7XGSuzymTqS9Ona&kqAnyUlYe+-D@x zctdZn#NWI|dAQ`L4e$Z=iG&1qO=E!jh8wT;a`6aw5u}-u{cKpP2TctU_c(-EXRiouFm5mj{a1H&@&AvYxn^Cf$-GC7)gke}{*x{G~pj@?GOD9H8u=8xD?oM8u?;!2;P&I^aw z7CQsB8fka<87%9(W@H#gb-Uyy8!Q>10XQy{VT@m>yLKj%V7Z;dq=)>+J--PV(!d}n zzf}tYz@EWX`#-@+gTF0zH}Lq&_e{**y$r7Ca`Y$_D$fJi&0N!@I)P1uM z<#lnF!lBWumr>kz;rWz9;WT-d-bScg_^{veJp_g>2XkdcJ)1WX{cxp@WswqU8g7bq zHWMf!pTb7OS=fd=&ildFzdUju%Fg>AXT4}2xm4mV1}0n$C#7GfO6WW!?pV@P->DMJ zIMp@SItCx42Nz*HK;q*VT93SB5@W7_ak#Wn$}C!q>*fG2RqF)`ay|>Pw|p3Vl$%u$ z^U`s0T+Bmx)wR1$JbggtXUFA>SGyNs`x{86#cS}L7H>FmpjW1DxdY;FpZh6+xd$ge&qq2sPvoc zS_hn6UkBZH^;g{W)P2Ea^|RWO=lQcSruYpOO{;=EZzZGZ-H!AzC;p8mC_hD$+>Y%d zclRlW>la*lhh7g_FW`T_3Rn%IZ@|A-q4D>j{oi4YzP_8O(|;W2|7%!a8aHh<$bb-h z;~P25*@RBr;3GkaqU8noh$Q6&y;{)~A!0MWBySms-=lQMl1vo3mGiYK2u%Rm4mGyZ zPOt`4s_kD6L4=&Gf4WfzYg-l223bp6sFi4?RA)ThQ0n;aX_e&`puHbHZh4Jo6<5pd z@U&RXvYnH&0JW-h1NO2xpcy~Cfuv#kF#>TW=GnKs3x^0y^8~~#Q=7=ugnxc@CkwS) zTBzvj+H@yJ_Fc5HqnIUqDoi424qXK*$6r19n!A_I(ZER#|Mo7O0-3OInlP~YuQDJmYLXxkephzCEUwxijt!qJw*w*+^_$!9DeC3EUf$s z5*aZ807(D$(=>Fj{KbY>8rt?7Y$(1jwH&v2Ht025rrt=I0G9i-mO&(CxR-{wR9aju zYZ8TGN_U%vA6MLA#fKDI;krl!gkNP)SbtDP|FL8Y|045C#+ z&Rn=C=?KzyW+h{!!W7PIAmnp(YC`lf1s4I|V(q^=I5B0&8ZjMb(jFRupx4Ud8H--zf3ShXQ_+elm;iGm zM`)in;c2bGHZJLI}j;uh3~aR z2Lqk4w;-cuWc-_G%~r)`QS&b*={6qsCYnmi?Q(GPY>g6fLCNI4I~{pvmOa?z&Rw-y zp}346#Tm_!B`aqzVQ0BaQ+gr;JcL|ISE`FPJIHN!yBp=b6g&=jnz48GoZ}jmXjHFB z^rT$fWIsKY(bLb~*0JpyaTGZ3NY#wAyun|zP^lE5Tb&4(m01>f}#grsTJ#12?h4(J7{ z6`F#*&v{ECc4B3$e5M#>3Zte21V*X@z^j04eM#5Az?u6nb?gR~WR-vNts}>xeu`F;?j{UenLWhzpApL}T2pN}i z2frapB93_`=yb?kkiu5DM%qgQ3xGWE)Q#xg{6SxE@gsl8^M*TVtHVt*w0f7)rKZp3 z?jJ*xFe8mXkkMNmsbZq=StA`!5smGjjL*T1SD;3EK%?6&1!$9tV|EeH0~^LfsbkGM z21?~QlDXu!kf}Jv z7^b=(gy{+|Qe@PU7ec|H}kqi@j1W6#43^sja1vV@5x@(}pF^jyxh-*e#+U{8*m{X1Ql`zZ%rz ze7BSBcZWm$t0!&ZJ`Ca*NI;yzpdEwG!^=-6k*8xabn231Fl8`jBPk*Uv)h!IK#iKH zdBjN5Bz~g;?aIXmfu@I~M}3*(RJr=|g56j%FsxMcpp7&CH4QHD7R|uc#6x4TTjFfj zB}((tJt%scYDLN| z%U?EdgDkOY`v%GWoVDfgfsy^Gsr<)^0S!TWhHU(XIm9GV=Ka8h2{b0WC_EoDSO4=d zrii@?x5Qow#2$|};Y8h=NU6@*ex(Su)lKNaavF8DSvHXvWyFh8+@mQpG)!V8LqJGf z5hn%zt@-&!LCnOSp?Ifzk3#UQ3u7~a9r&HFZhThZ+v6H$IIcDxenk-Ph>sDpr;q#5 zT!B8FnAHzQ`jxsaxcAyX)iq1yh4E~kI-v)GNY(xB6wNbORt;YizemcKbS_PRpmcWyW!!Fq0ipYW8cYb@$?$Zp$RB4@%NCZ!)_@x{l0(hH5~n^zB1IafV6xS{ zY*-S9y9_Q-qUXiT905e;Kt60FlLGZ$VQQC54r+;^Umj1iu7xYP6U%N~h^@heiCIV@ zm`y*eLrnbqglhU=zA9UtrNQ=wL8p)j=%Gf@l%QmvcV)ehkgem1IxQp=jrAg!&;i5@ z?3o&CD=}L9U|~f{OMXIqwHm6(7UAOuHn|kFiB**u%@@}jOI9g<(l|@T-#qdYNiO++ ztvjiZ*$G0@sHCA@$W^t=cN01vt$O1ZE46|1kncvE{02YZ8E9$r82Yp|%e+r7@1W0& z8?$Yfh_-AwG`&;kyo@}U^B8j4IJn4{2OI^b^72yegNWW_l2*MKbB&fXnHX{yxUCpe zH;TdVAzy~kM{S^$O5@dS!aJ}++o4wiY4 zVkr+=bxugJfFoV9u)cC#GduDY^sDFdn>J^G3ALKtsJw6qEhFYUnQh#dg6R7!$(%0H zJAujvyQ7Dqr<}G#>S#bRn0<#}WYBKRm>n8iCn^%bB4ti<7%*VxoAm2J4TD)yCt+SF zJy^(n9={c5lrXtuIwMN@4@MO)s6&H(7TxjwnGO?w5OGlQ(4msqCgFDUV8Kh~5yASB zl6dKRfA#<++JSed)BHtv&u6#MsUpHN<0s;9550!O0r)um z16bVPFuxi&@d{=a?zKS5yxgP3Xp>BpXOcD%;Bv(?al6~Us*UGbou3s(0(YXA#R(IJ zw+Z}?Lf3rpXYd2Y8agefQ*u(ONsWuIxa&lP?)iTto$Ak6-6>K60F(v(pSZ*Sf0ws> zY`r&I>QCLjppv<&+h!uY>JJWVx+HP6?H0LOD$@>|8sKGV>yfH;orIl8seLzhd{1Br z1f0~Zyl1;-yS*~KBmsa87??4pU_u2EY?9wsN@~ujw3gSZ)?dS3TI(I1GE}YfiYGJF zq8i#}lyoVpGM8GdI;O~7)eciC=##WaOVlQ%{+^Rn(l_ehLY~5EXHHcBRm!9>v(o-1 z&@6RK{VtpU#2@_$=qro?2yIT7Mi#^OPkjouQ1dYfn{4c^A=89(fXVx~W#b%P};7gB-P0$F!4PT6*|^3occ2 z`ThQiNwFT^`qqZRE&7kg?d5R4;^#x7dKi6fP8TOvtl#U#c)x?{-rYE2nrq~%t2f_Z zOaM$IxYejov!4_ibVV@yiDZc^u~$#E>o7mP3+&JbjivC8&vJ%1n1WVY&u$#YuB$sCU*i5s#E!t%skD z!yBiM*Tco3W{e7^Saaco1fz=ZP}@H;5*3s-E2p0`G@CcfpWWkocTV8@ad{|SCdY%i zMer6T*WGF#D~GUt0-(->QBK|o0Pm-MdwV)RNIzx-PLSzuD-muByM$Jc!K9(vS8*nl zwnBmZoqyaYQz64C+8X}f1<6!E~B|tR*6)itef|m{Y>9x@Xw+#=_P9XS~;-GMtraa*2 z#0qAspNnS`UTkr#6!Dbmu1r3{U-7nA-(V{;E0V+uF!6Bs!k86!LX)ln7AWz&T)v~E z2LO)3esHp|0(=vh(am#%2O%$_YTBQN&IS@WkE>Xy5T#eOJV3?i3CRtqyB>@Kl0g^$ zqC-p)uIxCrkR3YbM|3At&-F9u9{NRUxeGB zC3hxLlIg=vngJpUy}7h?Omb6))Klt)98^K`m!4S^eJRZ(@k}tE3%w9;DeH#XZiL9$ z-7whgn~1{BKsUG)8&tU%CxrkNSXs=&n(nmX5{3nS)?0nJ|Lq0qRG>kVruZ>j+hDCg z6$LJUf8p{L*9=sF%;Q8m^gB7y;ovo3VKdCOXum&teTR}Ipw&taEWX0vDIj~c4%u6X z8hYctj%wM}agw*oH}BwSp#P33ws0LO!oF}YWAPjO-O*ltR45;c3uG&8gQybr(M$^n z>t`7tNAXdhD!Ek^U5t$p23HJLjYq7AvLn7fT0$SXWXy;CdR=Jc5y7KX0r?usf+aCg zLOhOC)MkG>%vSAO$k)C>O2u%v#So0a<@NKoFZc#sA$oH;hKi;zvLO|5JqM^^26d5{ z_Ig2Roh?b9%A{!KB3I#H{M0>Dd143MAj%jpeRkaPFCSp#YSL^Nr;whME-~(=j`J5t{`QL3@ z(?(SpZo>Rlon+0Be;XBZ!WvpJ_PhQLkoS*b_5lsAj*v7Wg{psP`-)9{9n3n0jd!sA zgbOs+0762~8BitG55I|XM5x``=a_KTExV>R?fP&?N(BRG`RI}*Vflpx!8?2}a$G_^ zSJu9~^hR`e;n9#M?}gR*i5=AZ*$pEGIi>)z)f7RwyW7|z4Dqdakw zrX;GGPbnRNLfDI|=?VAyvcIEe7=bTdH%m2p0UMdUuoWbDXs)EDrK#p1W(LS2DvftYR0@7A;n8yV+eII0-io% zslLrq^o?)KQS1=(VDyv7|H}Yb2M(_7Bv9-VzycyZlR;%w~>x+N%m{ zMNy5A=!h)`*9GT|&FG?asNMX#BXA$uzH-a`2!24NpznVGgEV2^A!21IJ(eK`orf@R z=#-&v=yM4QQ8jpyTNOx2ID5dhV)}yj*%`AkHn=PmG}H^U6|3^3cJsw+Utz5D4!@&N zgg<8o+DnhTN`-*2cI(8F{m(FD*aloGEFbF@1cadikSjcL#we?oXdsjDcKJKMRmeOD z?OkVuJ`=0nxxcpIHN<^jfI5>tv0*0sTPhis_Q5nT9R#HJ??jXQSZDjco3xB&%Qw0WGrDOiwHGyTK z&b_!qPMg@;Qp|@3!WAgL>@{F1)1jZ%jl~*OGDi`XE zpp8!ZNT&IT1Sl7!VDYVGi%8@!EhJj!8aIt3@~vL`7M@2&KS4Ai9;eH$TlBq8K{(jM z(Wg#YN{Jjs8--+-tlwCvB1!_Sy5DQQ(k53*W4T=<5bWb?YAQr>fzPToJ@e|n1)&9- zXsf0v=3wAXmeV`};!MiKVepx1hVuu5!<>>kh(T>OX{@rPfu4oc&uFC>-Vi}0*@mfl z;)HesnAZrC1{-UptFgLPElQ($@T;?(I?WWp;6#{UQ?O_VqB>W%v~q_BJ~^aGu=5rH zZuGuYZkNk;$_ctog%AvNkJbPvVDf^JXSFp$p>m4p9eCNvua~VP3vssb+(k|=JgkA? z2RWf!3NELAg2^BsK(kn?!+1Dc`+MJ(Gq5Di+6;RdP+Tmy(v{TtDkEH1sFOI0M^K@V z&}`#YDqxk=ZoYG9L%8a=!;@QiUNov26Blqc?HXl4pFr>dY56pLy(xXnV~(4E*0IMf zHYvEsByyq~(z#Qv5KzL6+_}l8U_p1vq*2IK7H~>ktPPonn99hi7)6IBsyCm+6yC2) z7>WKCEy7jdnc0JquXd+x6q@`)trFtB!q66TUF+Ki?lrtB;S=FvAfnELKg^MVIQIuT zOdJ5kLlmmNl*uWWjo*yn5QVNJ>7du2Y_StK>L-72m9Emd(cN;{X;vt@A%#FV$H27Y zBxwQE#)NwH#tzoupxkKiF;gWPJ6N}iVh|Fz1dV3KDdekhl=|4VQY9>G1i~yy(O!1y ze_NEvV;guS$bz9+er(6d7~kR$WBIpfrqE*%L_7 zPN8K5tWplW#wBln*3xADVn78x^Qunol@V=l*C1G#ec`gx2RYsr2lOsfp+JYHkcpi!tB9`#ErU6aDXzOzoAZn zLs$mNlArbpJ6d{^3PM3m^JEQKBv{A6lY$RK1vD*W*x@2=CWepTteXyH1V`ug_wh!) z^Y)3|kCIJLCFVVl$kPcB?BgB8&Rk|qKi@+eQWYQ!7VpW5VMIAc2 zs$ksc?m`3K}#x&Z|nE-Wkv zxloG?%C6GaGaqj{Xt7A~y5sYrJ8LsDKd<5iew?ZGrO>Leux@pp15jYy zARdC!qHqpb!HARbwH1sWjX)ZX$d{)H9u4a-)bM4?)U4tTbHhAsHq`j$ zv_r`(CJiHp?dcdM1Sz)YNFj7`N=3cA%J%ty*NjzxU_3?QE0==~iUZWxh1Z4+Q2q^T zG_ac|AhX*^z6Hsw3%#~7{KHwu?_$LsJYA2|ras@dlIZH)R5{+P+kiGj#q{>q|5M)_ zG|t9R;)nj9wfzoK;Q8aQGUh{XH=Ji!COgBxE$MpTv8FC9ePgB3iCCI?@7YlZlr2lM zb1A;a5KfN80-JX{Z9qo_N;`q$0yntFN$dIPk#lqJ$7=-Fv4mMO{T_B0r}h^4q^6Qo zJX0vdY|@p~pmHG05Cdgq;sJ*l)*v~R0m`-?Jt+j#maisX1})$qN@b=UGof07((I=? z&Xw4e;+cek{%&qL9gccydymsab5RbHBWoWA35s{A40lrLXelUpz2hj=| zF5FP0QJunpq%Kw8-G0SB@f`&4wm3eBkp}S4Rl$#9nI#LLXssANf(rg{2BG5{r4cn< zoim(d+;Ne`gZa>6wk%VG;1cP@ToCo+ zfBrH~!78jLeBx|@3MhtT#CDhwFoeO;pFJy4=mOL<01k(k(vm!S`&@+mE=4W8d`vd* z&9h?OH;gJVzV`wLYa zFmqaJvA~Z?MHf0{DQ@f<#|*dx+{I!~^^Eo!1%(#5b7I1f1!39%h-W$mcCZE)eRg*_ zR~Ro!sX#Gd0I;IbXl^-xxeB@r3E=n+e&-GO?A)7iq=|v!f@F{Fe@#TNx6?kD37#MM z2mK*Dd4ZL7@PJEgeHNK^Pw0P$fWeHhYl2`mdN4rzLP2k~DA*ptJ|t7Q858~}F@LbM zFrx)A#&6}Cw-#!JzPuTdK46D;Z_e6!ul>M)KW>-7{9wQNJqZX1TU{RH{$51h2Vuf(gTf>2I(nn#lWZtPV zM(`4H;5-GJ5XX2~rWGpZ?CnbmFd%q>K#^?M`t8q5T{K-(ySukzPcqF^aZ~qruuk*U zZ-AbwhCpgK1NSQC8~G=rSrSzR&Rb7H_qZFXK#6|TDK_>w{GVz z$3je+mBCkQnKM;HLRSA-^5#QUT#xVmN0}l4n@;pMN`l(QC7&0#pP;rH+q(&Jf*fkt zDgnl7tM+X$chQ>HR;gV!a|YX`YlFjmJ$ASd_c0uOBJ#e>helzp@&-R}il+|m8;4co z6eWI9`l>U*5AX+{oTt$aXU9bqICu}BRGzyl!2;iYF6*$OzW1|FJ z#g#Sw4xUt(bZEf>{q9~7_JN6AooZ+)1rSTJUuSs36Q=BCbIN+*XjA-1r6!ap$b5}2Uz!^cu+i6*htxrSM zlq>J^v;FlAzb{TXg8L2{4>PQDKoAeAlN7B0hFDN(zyY~;z%ldlrI%r?(Xzl<%;+8x zd!W)njQS%(inhF=v2-E$j&#hO=B?euR}jPd`3KADyJlYYp7dwNT7%f|vuo>beCJOiP>bseU)@s-GTC_iA@buIqqBcyMK6bc`=HXuR)X-aV%X zbtU(a#+K8(;55*G(t0;+Vr2h-dRHN$Uw4*H3LI+AiGM5~#nsN*s5UEGD42JTBK>&L!&Q8}uTs_(}n9 za|BRYTcvh6ER83Nk`=Bqj63gRgZ*bp=^N+n;e-hU3xT0;6xiWFf{^oo^=Jj00E>~D zVM9#CoD+HFLf-&G(e8$|CV~1)%qogb3JZ)1>zp~7)`Dy;bNdx*+c?`>@bAUw?uR(0 zXGGKzj_#7XAW>GMZi8EG9IECnv$`XC%FI?Yx4i8*HCw_^LkfTZ7v6SIPUDHPR(Uog zav3HDyflEM(Z_O3)=s7qSc^Zs;5@B_sR_AH&01&V)Y>3n3%%QaaHx9`Jq zt@tSUU;dwaeZLQHr(b=cgJXtISLXDC(VeyC(&R;!d}}W#fmz^I_gC2O-}N(3zGp3V z-wy=)Siop%a{6|_G=sJ9kY#6iiKKwJpH}NH<49i@(=+@11{q5&SyVcx#cUdnemfN) zj&qDQIkrssz5?LGS(FKxVb$An>_Sdq~Ejcyc2;=Df%_7I8cd zc3^*v>NvdGyeRP)JA%`RS_pa5`Yr+FI>U6_Q1tT5`s#rR|1 z>)i?D1=!X$p+h{HzqY;@nXZf@a2&RonVv>wdC9gu2l^ZKsj^0YN+zK!_yXusoSN z@XH>oaSdvw(s)S_Sx)brOL6bGJQ44Cyc^(-=k4q3OaA+#Xh31QxsQRhEmH|Rc%$8n z(cm?pgrKxTiecSg$~Q7~Lk3?|7*bZ#WWYlVIAu-)TZ2ZOerX%1ro{PBkXbpI&T=8k zsB1`GS}T~lRJEoEg3JECi{v^V`EVvNtJ-gak%P!J1q1_V%NuA}{%Pw2+51rm(bUjf zXAjBY@l1)E&9_I%dc2s!`?H0=V{f&hv>v^H*g%BW{8kq8Ro~w$`r^mETTg|msU|NA z(r?N?)dRdwkL6x%wJoT#&f0dMSg`YgdV1)R6c}cozU~;eQt&WjOuK)FpNcfnrDKC{ zYx+mM{yiKzo1bAh)D&On1m2j)J3mOT1tfYzlWS^WwKeor*MC=0YD2!|W}F>)A+xbw zgriqQr8A4`lADG?!WVX~+EjeT3i{|BPfk|o= zo92jywV?2((Ia3F2fMOn{%i5%QQU;NJdsRRp8EuMil_Ax>A5NwbCfcLO9q`q;&%XjAr{yK63=K8 zF!LLF&@5{_>M0KzZW7cbeQCfpRYlQ=h0Kt^9%SV8ar)PY_`s=tSLz>L_?y%P=rAWX z=#EK@ZmN@WL};X#4Gtc7xv>*+`Z4TWz>p^90iG;(*T2>vxR;hw@QYoM&RSwDGB8;z zXoxKb(*#=w^AMI1cgI3V=P;m$R|iw%YY?nU>fdbxLH*%^1~!>~y24|vcnqkq1*Y2l zViD~`PZpg6xWW{Nq2y@XCXnN53xz{G$&Up#6C~~|v2=C+LTj!ZoBb}T_BJX^1xlPP zmV^(Y>{M%Wb8zkot_e2j`Q>CSbJ(Kyk0=9Yr$nTi<)jb#(m=mW21|b#Ch_)6xMVWH zJkRr^&wY*fMFEzdViqx8;tg>l2T2fJ3MvTfQiuS4FCuVkeuG1TTZh~)T<6qj)G$}B}e`r zXYUjwTGV9gmTeomY}>YN+qSitLHmqQAwvt%`b+ITnvgVrKh_B{)GlY3XeO^=U#=@CM{8@G(1zLB3 z)_~{3#kB02{^-hR)+}(pTF*Q~u`+>AdRTZdU2%3ifxPCqC|M|PN6I*p?HTVhHSv3q zT9e)UN$4?zrp4!Yh;`Ot*rI*XGp0^wqI8dv#PTo8BDx-Xhoi491z}w5a*2FS%k)nN zu3v$cmM3nRnXi0YIlugrh87dwSgEdjeS;uah*o2m*Z`f8+7|L=?H>YK05!5$Q2HaQ zL?AK|dRoeJOpEAReYHKv*>vOQ_nBj*NxY z*E=63))!Zi2Ji)&)J@DTx8&2szNN?21^?uJrj33+TK2QfP2tI9Z#~ooE1NYz@i9X$ z2tzXs#0N+E0J|(<4{iVJL~V$rnC;J%9r3CIW3crn zyB3n|oyD`cADn-X?Eg;U-T~ocuvq^p%b7yzQ6X)iDhcWH$f4Y4mU9ssqy&YGpPD(f z9$#w1S}C29$?*2iTq8uM{yqEnvG=YR8bB_WGj|JNGy#dwc|1BlnI|^S9>Ht6W|2W2@PNk(SzECg${e0Y@Dlo#D>L>M{l%~`RlLGoOh3`%UT;y; zLRIgU;uc(Gc)Uw)bDwRHsbA+Y)FCMI>($VP)h5?-h9Imiq3+7Tlrd8cUzMht%Jm_Z zG0a1Pm?Rl<6RC=P?&X?X@51bS8k0t3kvTXB7xkAIXrH^S7XRI~R9$Z=g~Q@8$(#nPK2}0Vbz@%fntAC4Ja-T~sh-$Fv-I{{xz?ciljuZkQES z@zNgBK}<>o`k=4J5qTbWtXETw&x_LYO2~8srPA#|OD{IEo7x1o-rS^IMDoVOR~^z) zaOYnK!hY!-U$MWK-gin3&4SHY0QX+Ps?I`<85g-f&XFQiXQgSdL)H4NoM%LD}Lw8Ed)%reC+mC4@IAjrezYt^3$%Mj=Xk*gT$ga^8+AOlo-` zw}Kz9kB3JCU$0Aj@-DjH_Om>%3WN6pUjX2cEHa|ei#LbXkFmCG?*uuILSFScCg`~S zLQe|})crJ(?1SXPK#dE~S#ayPS3NgrbK3{mn0*sTOzU2od_>wTn&{5PN-_KJ#PwFf zCQ4J#%Qhh%FH74m(`=@y>{WFLFT6f7W^%Gn@DqtnITyL$x4Q6$Uzzuu z6=LSqUEqglz#d9nqv{_h`I{+|-WY;CFY1Ufc1o#QT&^Wif5W=|y01n)@0lN!;$7Ed z-uP_PWU1^=p6~hoRB8i`uTZFi0%F1_vYN`UOcygiDL`QfMqxE7(^>>C=8#{K5i;R> z@X%+6ad)*ala58MmUb@&ATtb-P{Zn`e%!PE&b&iA>DHa8-X$6#N0B|+_X@u;)x*VX$H zW_WYO39q_l-ycB*h}j}L+hLs0kPr@A;g`wyN#pyq70;GHMq*plfw#8z@i6^rciCk0 zys_bWsP6-nK>Y>N#Fc?Sz0faHD90~>bP5^E^4ex-XX)2Uy?w%*=rO#jKc>rDTigkj zai(XgX-DjEdeC?tIOVw{4JW3gxwM<2f4SVowka7iyz_V?M*1T&^{zT1#!I89ieQrm5!!ym+%~4F}+W2rtiL>AgMfuV; zg;n9$mu<%)7A!2aMi8P9+tLU>?9CYhq7}0`f3sBPH+g$F#*IAYgqzsP8p=9qujl)l z_4R444+7W-M$(_G-E}#`lcopcuZ`o& zw#lp-w|6(s;=UNzfU?^Lrska_J+R8_i4D3cXzm65XwwO&Y1Eh(jyoX;@^g+af{3e` z#JuqUPJ6@UFRE-;&if>>mN=&>{~cX}`MWyeEHXY%I$7}olMA!nvh8oo#Z+uS9Z~FO zdkuA19A2w}@hVZh8{0TZN!4k z+xuoxiW3$kl&TEVRHTuVA@4>Vrzg>a$ zrigcuR?+4s_lB*2Q!{7DlHvVS(+|e(T1A*JPlt}h49pnUPfGjupHYg5XGM*#0x$?c zVDwe(j&#QUTaC%u#!WME1P7FSM3ZS_v8=*FgNlhRxY<1tt7osFp@=VY4#K0M)UllMSA zJ{_A($VCxFE#pdHC1v>C_BySmr}jA+ouqXxeNrVR%6fyfyoXXG#mlt#UunIiZLRF6RUACOc z8`z#$LbLS&2nDCSjj7x%=(f=ot-4l8@JXD&*riViS_RvO8%o5h-N)F zv4-L8o7vM99#Y|GQ}ah5d`EIc#JecEcCN2w_tKA4>!mX{QbeyvVRnQ^vq=_)aBNPV&C6_om_eXY!GcJ~hMI!pBne4r_9(=!lMyc@Pc$=eH z1CdLNt-P>^f!{KvY-1u@=<|H*q8bc4;KnG4+6C_T?rwnuVM6ePKDn4*ZHP$#5pqKS zCa#br)?3kSL~w}tAP)D9v0}oCzGFxSwuRJc6wZgi@dw zi_j2G|FnS|%9>%N?1sT_Fjc`+gL(;qe{~>~fPP_C(M6?szm3_p2fs;$tsZO{iv98h zcQL$o7o;(7le6o?E33umD1-htiHa-^-S$8#dZ&%$T?T0Ua6NbS30dqh;Q$NyJvps} zfDwVGJJ`7k4K|42dsi5TIF)D6r>Y{Z;Bi+A;+qyIB%lP=DnbBk7P6|@8F9FnqiBzu6+*6mTcon(C7M0on-7xB| z$@tiOLjQN+r2>+4o7Qil)QA3mN|a8{jxI*dE{^}73Rm@)Pb&JW$54Yg3@Y_EovTnl zr_Tg|jV%<}%LgAoP&*V~cONTqOHmCWc)QA4I~tKp&OAj3+hnur-kx-1%^(5G;cT2f zUQVla&JxJ*_Is0xZ|R3j<=<`Y7pQPE-@OSSN<%cNXKfEvqzWlYXs;uFfa%+7WZ2l*+eQ`yy_-*Y*kS8>R3KC(;&>DsNPWItfUbTgkdxO`RjFWiE!JK zoIe1S8H(z-H5NCuXZueHxmSMj2@2K?m9qEgp&d-X?q)TW(>_GtOEE8h2X0QLH9|mwnL!D9|XWJ%CQ|)>l*Rt(T<>&a!b^3X3qwl3=`E0pUo*W*9IV1$C0=+J|%)h|p z$S`-dx3WK*$nK@QGon}_sA4@Hm_8`3HA_yNFFm}2+NkAft*4LFa{>z%H;*WEL=rwn zq5ZJ%n2XHQ>LD8O;D9IJBs6tFji{_EFh{CROntaV9N4|$vWb5g9Ib3JW-}9K* z_^u>UU+is*M&5#t@Sw7wy06lDnbgq>msxnm;c`ZF%wt2sck|TZT-u0bd{eu($+*7X zx08%;jYK#}JXjUHO*89JZuF{g#dcqg9IarB->vlCC!xuMxazM%+EE5LxS@izVXiYo zGkSvakJD|u-T^sry=BUNr4&I|9((iIG9}ER80ZHrGh#i!okXEB_?({+$yM|pzH%^n ztTk7X-2k7}+}p9=rmfE>3j!UayKYwPxxAd*v zoz9v?-7;u&OhQ?^mJG}^j*+q)KkEj6b!21 zZv|bVUd0if!rd{si?OH;MFUK^0Mt)K8XLD%!cf^K4M0~{zo9^qDFISh4*Hu-3DRq) zcD`3;z`iO`S=Mk8O3j`OG(&VMjRP`dX5>DKZM$VLRO!wIfW}IL(ZI+Fruhh>H`zU= zaAai1a9(t&C{8XSxr1|7BTr)|>@P*JS0}NAV{-^h8R!O+bY~yH3_2Vz(^s!_5s3Wg z+i)*78y7tnSjGBfp?^1qd|c3sLOL@96^Wk5v_4H&Zm!qz?HYbI`r$KssZ*086r>1j zIZ`vD(yI!k{>|b&EnpF^$JxKf68r_|-R0H%-u1d?HUfO63U60PrWr1+{>cpeGFeC0 z+hV^h2iOfsYpj*+LeII{VaCWL4KdZH@@^2?+`{o&85Q}a#&ao>6=$8+(vx@#1}0dT zUBUn@aDO*8Nht6zSru~{p;|TN!5nSnCs|dI=yt@Rl5O!YVyXpUTOtPDRQ#?266n26 zahT4fkk$025v3BsmOQ+D6x}9oi!}@uN?3Hk!Xo2@8Ru7k${gsLdVJ;DPKD1So4Pl~;zU~`D($-xyM4A&W}5ax z;UBm?!X(X@87w)FoMXzNKKb|Q2R#_ zFvjo7)t?Rlq8~Nz(;QIL9#7y_OjaemdJIkg-Y9eEH*$huqw-AwaaYR-rjuUC0E;NW zeGRX2AbScd%3~!dv^~yTwwl4MatXz{?1~SnT5SGlXs)dMcD;(m!H|fIQFG(3+~qH= z^f4HM5^Zj!U3khM3>vv%mSK?AWSOHgtSiN;>a9&bpw^FCTMbK(#0yzr^7ejIhSS^2 z4_Z{UV7h;PJ;sdcL`{w?^CL$^w_RuoqQ&!j^>qJm_gj(e3U#v8lUnFpPw~7qC8yVzY5s@OV-A*vcqP(@9+hcdqXITZISTAhsuN6WxrlxADLd0g>TJY zmDe0M>{?fOF&Kh%?D;YcjUh=%yd=KDU9SjWop)r%na&u{fDIcEAn~;o*;<60c`Zg% z;dyoYv7>L*980g7sGI`TN)#C|QD`tFQCGUl-%eB+m~?iZ#CFZAt8YfTEj3P49~Xpi zkE>&u6ovU)hVV}`StJW4lz)Q18d6Pz412qBa;05+^KWRKSS7jNvC{LEUJf@dOtMOw zsZG*}VmlJMI za_jLBgI;~_oqm9y>*@`=m#6M<^jf-<8f14MO@+mMfdx7`xek>nbiaA9!`5Ta9 z%e^_OC-Z(*ajOU=#nk;78|<_UiF8SA3BS(6E5Xa`+C3GTef9*XquD!vZu2T>_l?R) ze$JC7?ZQ{`D(tQrV})vgAy^oH|0d=7*6dxR#!^sfyTaN|q?_JDG?{Yz5}CB`LD+en zc9bQ!9lS**Ik_&eLKr(**{-mZe@W_2H*uh6jbc7-&V$^yO{);wl$JnnVu#W36iM?z zz16OBjVdGQMEd)X04Pn?hgI$r=ux2}7EkK;_pciRY$a-Ea|ZAGQ)?3o2aivCOKuTJ z0|$DCrbP89Ito>y)glET7R*&%)Da?S0RT(05$vUAHk5UUBFW36v~lAmnh;aZ$*=Ezmql(O zP2WR{HLd)1twryeP#G(iNkRN3!pz8J4i#XyUc4Z<8i35YQgQCiJ$`zAC|4T0xLa2yftQ&zMmi1%hy%C`RYMLRu6fLG z4d4AepnWDLM$?^BITrgu3$`}<=h;mg;TBL$@D#$@Z`mX`cWj>IK?VXG!OY#EV1fEZ zow1<^8u_52eJzzhr47qx+mPYIxJ`!>29VALDMiM%#8^#;E+=HyK$2yeQ8QYAU`Gac z8%VhrxV26i#!-kpszQ&is6EB)X1IS`!4+`)U3Mg|e9mvQB7e=JIY=t0>-otVRovMX zT%MegC7>K|3>lGH*A5^16j}zG^0T$LsIYHiIoQo-N2QAhmiy6DrJr?xcG(5*_~Sbm z&gd%G3$`MtkWdY zbMlq)*qUTlkgK(DgChnEqU&q+!VGS(cb_W84R+7r_s*lh$#V%5%l$1Yu)m_HHoO|=vBf;<3ZyIV2-2~_P%gTG?kMz6` zXA|Dy!F0ArOBFDmZ=EVxj9SIej^tWz>}E1S?`F7?YhyD_bpWB^QNav^Z>)F~yg0b8 zxNSrADA@@;$LTcB37CC6Ss6t ze_uvEta2^^l7x;D5_f~cz7+|6Aa*tn45z(<#3-gAJf3pW{ihFK-pt9#v*gZe!IFz( z7KVS;4<#dS$Rzh^1*5ROFO4V-4^lWy$sglsCCA-LI#FeY)7wamYOhkA4dJSvNK_=8 z%PXdsd5DR`7o+R|#5Z%6&`kOosK>}%;e&qprBA2y8NELN!rN)t3xw==-vPKfqn;h2 zn|lD6+Uru{vQDyc%Z0#{t~KMHXFlGwoLTwxfcoUZ1FX$e3!#Q|9d-gsZF_VG)>z(& z&11WWk;`Q&8l$_n4a&-N5O32_ux!DGtk8 zSMi?}t@1EFXDa*TlB2}{UdLSSfFoj@b3ekkw9Qe9T8=O=6{yfrRa4RkgV$kdxOonU zsd8aJ0sPWQe@d8aMH8Z|6OWd@^U85eLb4EHpx~uxip}%LdZ`~5&QlPo=c#S==T95= z^{-FkS%GJ(!$3IBEc#9YIpI!n0-K89TV$rurdJwb@$SCXw6OTwL|h}#e_MY$Y%~Po z)pc4@%avGog(3=3*%3qHO;s184O_vYGXV5s(bB>x?_)uOdavEq;h$IF?UxwnuHLiL zDmuEm0%IZ6c${oTff?eqSCiOEts}p0;N4kS!!esq78Q51pLxpf!yq6C$U6dXlx0d9 zq)T+oDhO8Y(NMzdKLIC`o*9}>KDb=2321M#y#FS{T;o}zQkFL+u|jFG)<%@&1I>Df zEZbuI<5TiNivem&CTTKUHNP$!Yb;3<(gpGLxvStgO422Ut%_Q}=n zN-N5do|-2Bxr!lYHSDJeUDkSZX4Vs$h3VYlVf8)liNmhz~u@ zBJXuFLTe^=x3PJ*ts>w4s>7B+yq^W~g`c+PARa=wo1>>V$NL!f+Jb|pfvhWu0CXxx zg*~|{(Zx@uEkN~^TDu2lthm(_A1JftCA1NS(A}ceI27F5mrt(_6BA8WYyB9*Mut8@ z7p5?cAv?;Mu*54$e#tF@Fn+~S3XTC*`@M*g96kkScD*{i_O^CM545UaYA63vd9x9q z%lL_o)C3>- zJtoz`UA`wieD*5t#uGE&uT{fcStN?6S!*KBCxeB*=Ux}EYTL+~&U9|eHM$H!7sON_ z;XK{X_yg|N?`e33PnUoi%}x5YWeZT}kS!*=hvhCq5#DRl(UAzWG$AF1M>XAgh-&kT zR70xrXs=)cck)bLC!bYNkK76^m}(K5kEZ%y@U zZ-=19{E&idqhlgGBjaL4bFGqJ|FpX+DAu4B)1=)d?3JtSOp0?HaZn{3um$BHA)Q25 zNRJ^q5T+3n>0~(Ll_XS+Vy-!1&Q{Sb6Bhc)kMDt1t!G8%NoE5PRR*DVVQiZftS1Ys zFn7xCqKZaOWK1I2a|7V298bhyNMeGoU^w`P4$(y(HlsU$;P&1DISEpE(gK4GYWQxv zYc8f?#8zvr$zJE7Two%14C(^P3P6jHa*d7SS|hKP`q zTZ^#=c$!ejU@h0}SHFV%Tsc|9ta4~Z#3$PnB1A?HpxAi_DsZZgF#9a=`hGeMrjo3f z-@K7adi~@Zu)X={1^d6WBy=URr29pM4*cU<5&%^#zG2|16thtY&mX&So`5H;ywZuL z2rno_gm1NZ?6y5>qVhh=5AFA#Z57yi23Wdd6dr|@pB&%A(LuPXwjn#mEAwNhuv`X9 zIZAuR9NgFaSH<8SlXBwZIZ~*QmP*@4?$>_ICVE0h0sgG%XN;IBe?7RIKTM0$SW$g} zDq3FOr7Iww3&wFp3Zav6aww*TWA{zXDKF>j56LwWX-!p!>TZ>k!p)~Bh8}DWr@wkE z$1FTqiRYdoUruvF)&K#lGZmh!L#<8d4INR zg`E2v{Ce$p@YKRRc@0=#W1q-)?W3=?K&$+?Xm)RifaNRD4L@se>_*(2A zBx|!^NDh}z{6lh}Cv9^17VZWPRhk7ov&&b1R-OL8DVxGC;fJpt2WItZa7?T>5k@_y zkjTFS(8gY-g3qZh2%-n>tA(P971rNhSqliY7byE3T;m(mYmLyK;E8joFzs?;6w-%^ z3aa54u1-o7*jP@(8V^=&{L1!dYUuko2idIyw29aJN`hGR=JePFt)=fiF5H!^*S<%f z!+z80XfOebBeSF_I-*X#uCCtBOCp*PDLqCy&R7_;xE2}|W@}gSIRr0R;qto*BIoC% zvR<1bI(r?wE0d2pWx9u9gd{QGVg5yxhjh-U%!3&R+ZRyQ;!$2a}IIU!wXgPeLp{?uYJE_+8p5#~oy=yO-y5N5#23(25V8 zVe10rexHN~GzG_{StX>KDS+*Y?FTTjFsG_dJpvg-GCEB|uqxX0vRZLd6Orj4rWH!9qiKWC2XKZppcqdKT@^p;(sk9 z8brgE58+XRRTl{^zPKXJWtcQ`x$$$2Z}~Q<@`fgZ1)jbYdDTJUS((JN`k7nQP^Y zpVtWYfr!|lFR$_#b+QjVbyKZ+?P}q0jfvCqIM!Na3=RwS{exmNuNPi^XB!^>YSM=n zw1p@v%Uy>wsILlDgsCD;pgCcG78 z7YOjz>%m$8WwG=Dz1fRl>SZOolAJ8U3^7zb}^1KssZqX9Ofa}^2o zO6?by+|X+f5GK+z!`$hzeV`UK|NG{wpKH7M2P=OcHgXpjA0MV8(J;sSD@!%u0Kkg2 z7KbrxMv2um3jlkGX!l8hM_^L$=e%7b32?>7su(_zG4aNNcE*{);|5Ng%>3S_=Lkm39-PTvR9ZxLQ$!^GtYokjyR zzxf`j1zcmUYyCJx_u&qZg_v8 zI)T9eY;g`dA;WbzTn7qIjEdZHWpSKTnx`8vZxPE8>PH3t_ z2f1>l$)py2e$TvU@f1abZwp^1&zKCNFOB6fr2=hzH^Rgg@kTA8vkx60^3ih*$#Y@c zDV_2WG$Vm&VR!CXSO`K0;e!0lv^~U`ERMncnw^}f%{r{N7IgugjP^hQQB|9rr|0Gq zGv|~rKpaPpY|~AOwh$#bu^%rj({{(^PZX>xR5ba9xu{|)lgJr1y^`DX3+Ud)hKLf? zBK!z#C6&=Dd%ZzLz$DFFX1i^|KSRqnBk)rIh;g25a|8amLl59n%|$sbx>Acu|0>MD zMy^IwlJcs5d4ao0qbeo?1$bCMfo%z7Q^!{v?m%x*PXm|Gm%~PEDiEzWv|{*!!ksrT zGlgU3YS1a6Bbl&f#8cYx8^FP{AZ?yQ%Nn%+Z_a-QZRA(m%3{j!o?Q$2xPI(8M!C}y zJxT}5?bWc?ng}9Am(RP&h6E*};Sk%Aj)Ix5?k-u!7d~hyQfUnTwL|{3Nz(xX<(j@f zlgM9&ekKw_LrHm3N|B%*UJXVC-&{sKiW@#mwtE+=Wc1Y69P^)NU>87X-mc0aY{=E` zcAsH&ks|x!MR3&y-gE;q@O+scSB>tRmWkc&}@I;#d%fvjdV!Kar zGN<>q{(>Hn5y~x9B$FQLD-R(o`aRqzE4zS4$$sJ)cFpRSVj_!dzqQ@JPX6*>8ed!9 zUrhd^w!*m7u{O!uq-HdE7xpM*t2CcXbWp`2QjEWT_PX0SB}4X^-zO9Q(L{|u&Y9SS z1pvtYC7iMSFY>6ggpi1=lE{{(meU3+n(s_aueqt&C8nrE$JKT7Z=b6~g)NCGzAKGa zkeJ*+2#K0sbNTz72Yr)#O!nD@Cv7=DJSfQNZQ2d)QPTU&Y;MA_W)NJbe7a1HuJet~ zB#Slc)%Cj>p=ZoC@tM5a=i|A<4E-uB@8@nRV_=UyrEzL=bt@yZ#nDc8um5A?=?1$_ zee18ATSdmv*S&2M;?2$SzJZh0->0jQr>&_0E^qBwEw+iNFVD9JU|vGNoyno7a+eZt z`ROS=4;#~OVWz$3dJEwS<6r#6S+4a(@Fk@}diB0aKC5b^ENXxGcDg0?ox`5UUPqE^ z(9#BC4)mFDh*r6zb&O$wB-%afXp8CQ)ewCD;;q1dS22#(5^RYlrdP4L#e2b0#}~n5 zo|3A+WUV~B7~zP4UFA3Y)ya{zCd1_sf&M~PQf=+VoYXd48jvL!wu4muOd zFtvo_EYKvtjVA+`?k$w%k-HWBslJR7goVoMZ0tN}Hds!y4(NpBLUZv${O7;@+%TSr zJ=l}|uDU`ozV&VXLE;M0FmU{-&O}Vyp>QgnDXA%eHK0wiKB>~+>(>`S7|}$e%;*~r zichk7f7GhWL)p9sdp)*fuNrkiI4_YA@SBD1c;k~~4)aLTSjQp(WXG6|3p|pgb}*~w z@nrH}J#@?OfbtbgY8Wg&NK_DZ@A)aPeS!+DI7pn#iDWaAPXDqxq^6%Hu(5GEO5+Y$95YpoU}1;p7>wy36^ zN>ydZ(c?-w^*3gVxlGZXd3-%3ySkeRQ#=I$q=*^V+^Oop^{$xN`JVsYk-3n)BaCy1y;Y3REtksYel zH^}%hhOi6c5NwktBK123Nanv8S)u^f4r^fFkGe=31mxXGa9Jw~l&Y=ZqI|;eMyR$T z*Ztb;mo9BHy#Sdk{ILF$jpqspR16V)%)D~JK+xFOya5n5$J`m6^p%d|0)??pB-W-_ zl2Gc!ZtX!j(>}h@BY-9667T5yi{9Iw7*pGB#M^4H6`Ey6zU8`_5h#t&xCJVzEMlWU z*G!nU&~t$f^JA(y;3ZZ7f3zmzBZT9YM$H$Qie@>-7soDc5XOC?dQR^aaQ;$cT%p6B zBGWF;mx4oOyapS#-b)jUGg@P7g8KQ%zWtGk094rNU6%2;VY3C~;&unw7MK%BPw?bL zH7Dx7W70(Ils>v1vW!DU6*gJNJMgLKO=U^l_qe}zS<;={Pczj;Tls*Ps1;|4^n@|flr0skTlxlSb&ZhDVxy>etO3O=?W`GJ`?L+Xk`p5o}ag7_>%o*y$>i%x{t zXW0zoB^7sa?(Lf0Pxi@)$7Q^WP9bN@KREJitW*bX(hRi^NnY@W7`*7gM-hqh=>+0# zVYj&m(95Y!v_GQ=A9$|C=?;3Ha`Rb-+gD%Jkjc^Esm`-5ZET)e%mh?L(HIN~f-sk< zj(s1LA8s$P_tule-$d{g@R4OnfN14Z`X!zFW_R%Qj-?i_V_W z@l)favj97STWj}v;JfsF@%S4J+-ZdT#j&AA!H*H$AwU^@ae)$8ml5ir?0yd9q4$Ar z5|rxU@-q8NI!x#Y`PARfaK50EBJ;z(D9_#kR?86)0BW>Exy)S&Zohbq^2 zCDId|fx19GO~Z16(6Uu#Bw!P$snVImS@S}i2NJqk%4)dO{L?N3s(H|U)xH4)@40pY z*pI=8yxopA^$KrB=8`Hc59v|Y2tofKPWucV-d@cQ38ra&7#$bCW~CM{dc_DixGLVnnRWx=V0-TyzWxG7wlbCSTW(*@iMzh zxVw|f-1zeW3$i=pq`BG?){O*kws1)!{E#m$co*tWghu%G0rtJ?Ig<^d!J$~uwAJ>T zQH+QqX*b%2tST&mzKGt82DI$?K2}EnpVgzI`ou!*)(b9#J zycEK69O-jFG_qF~0260j`Z1}~I+OutjG*dBI_skf2HOAiH*)&_iEcY>y{*gz;LFqJ?-*2^AkAU`)!RXJ`Z~4~$vy zCqgSJKer5f62y#2NlLG29$C`lYoBo0|L`F{DY0*tQZA_&VVhqN8v@nZ|DbPrL|7Q_ z(hmYKX-ku)s|w5va`#4;+>L~KTyO8^hbyWHG$w^UNdw4&>7`N0|K$^_W{f^$u3v_n z=<3~FFu&y#8!=9a2VxxMigyA&y9 zlmj#7#Gvd^A#y7Fp_irWrwqVLc{pf$oBL^Q1gB%VXJC|M)D@k?B(3XL<;w)@}9QNgk-iW~#v2BBPgO`Eeh5AFQNLRTf1-*RlFnQ6^JY|eQ?m*k-2o5PyZ#C*7S*AUME_H`k&Nu(tI|8GImDFzSceG>n zP7jSz_22}snc?E%*Oe>2ahiH~`U9_f$<*h^isWBq{;e#O!m4Asi$Q`vR{xa&m$jTZ zZXnDE-0@~nvsdvXibgdM@cs`AoduLC zaoF3Yo5T{;B5D{|36149Ycw6%bk}ej8vnO-9pbN&>a%l|nys%jC;6pkn`iT%+`lK! zx^}&7+rcf)p5z`cI|CyNJO3Pe&hvQ*<~_-zCh}IU3Qbu7>`=EC~`m_LGwm0!Q>l_i-F~Y=W<-i?uMRAHJ&J`9&EUtRG0Wo)@ z5V|*ahn&DZ>CyioSpjJh63|_DiidDYMaX#-UN1QFbWwZXwbRtjI@-a=30TZ?v{{#= zQQbCcB4z_D#)Z~Xq2lMCFqDe*5DjHna(!A#VEwJr$jI%W-x!w5``gkfuqtpop+;km zH;KNZcjlj4*Y~=FQ;WQ>%7_(tnFc9)QefBUEaQre#L?1&mPc6a7s;QlpZG{poM5Yf zlwTsDfClDE8p)GTjhVx+$FVcU>e47vWNEJE4oZJ;-hZmSo*YXadtpA5I9y>F)JtOoV&-7fqZs%J@50#7Gpofc8P{2lT&B-b&;XPH6vL7XNFp z{4XwzYT_ay($F*FGE;M~QZ$s)lQRv9^ovZpj&f5{G?LU~boGkjl4I1g;dJ0-3bXXH zOboM3vxiXQGjwxL)XT8sG?G(e()Ehu6qGVYP!iHDisYrt%Tp6GQcE(E6^Hvk|4}O> z+wZ0QEfWGj{w|*XMYzs(_IlPPt|r#B&hE}sk~GvZG_(}Q|M`{QjRAf+7XSC*_JFitqCP}6kNh)ogB%~)E0ihqA}yk-V_3b!b_M;_SDN37SiH4C1}a{+8=v?&2RhdWs!wV1crF z#js?5k&y?Hl1?omvp;T8k!}p0lDK?wA_MmF@DO>DmN(g36eH)0x4t`(ScaHZp;=pk z#~)-)YGjfJb;bcfy7*?1j=va6+HlhdE&Zq1wa=;yIHz?P&_pSPT9@edy?+y@MR+OV zG>^H)$ja&$XxgR7MJFF1VJR<+RWE{y!l_r6weSc~kcsLeF23-cQfE zIDFgLMrK})PhGEP=DXD@9 zoZWr{h9kdRC-u(k@wxp?TnvNM_6};MI;PpsRw^Fur2{6eG&Yv%Z`z%Nvv$W_6%_!3 zT(7(B-Zss`qfaFFex;P7yPunj6C;NvG_Ts~GesVhaVfO3L9oOMxTVD@eY_UPn{44=)SyW4!~RsckKsV#8`s2JU!Y%c8@oQ_xF8ar8E%D5z>_+C?``Yaw7K{ zFSb&?PgN9gT<^fc}D5ZFnv|=H@=G2(ra%mNex6|9F+z!*X6EwUNU9467lf zB|3%ZShV|rA2@9LJN2P_w(ORz@ej;9w$(@&H}2e#a};L?1>fxmbk$P@*Vx^lFp4OZ zkzVeN+ds4ZnrSP3=cD|rXjcHfxdl@}U~)q%jOe!WZ{OT(5JH-9GQGl#*+_^{MHZ6d zN$yz#x3RR7U|Lp^@Ahz72sFjAM6%CYN~O|HSgNVyeB-t%CsYo6iDx&>M3EAusv_#j zmPh6B|5{S4CrQEJ+Z*Uo64VnVkbtTy$GL#rX?BG|31Lh&iD=L{_B64*;!S-yuljni z7UAD~e@joC@_y%DF?pmTH>ye3Yi6QM(>w zI!=!(M6)jz^1&ztIBL;{mUaUqp`siqUtCPOh=HzxGx0k;1 zgXLZihW3l6s*_*QllgCP5341Mqr$e;%9r+U@x#Xr3u~OR7MP0s31%`Yct#;Y9RbsI zaebDNj6mkLQ)0!H<_*^1Yva>r>#pfc6bs1?DY3{i$6NL>qx?3$a10gcO{f>iqVZBd z-DwUQ|4OpERM;S`S0-5wLhE)_K!xJ7Lw7zOnA?+OLkXU6e>8n~AYp`BEuKteU6eE* z!fw=DZ7sf);uz_nDR+^UL5_doEy0f~rmuHGDq6Y+H|WkBfNe6{r&n0x)td9h`zsi* zs?G8%#)hDnsZ;<(K3T0=v~Rz7@u)RC%vf2ExUHjPAFftlc18%CCu_0j3oKMnXOh2_u$uq@p@8Mmz z7J94na`tdG65!tYy22F7u^lm+I$1)OTMk+e-M3cr;WLGT5@H5&S`SYQkQ^CKW21G# ztQj8_OBt8Nd6mC!5Odyti;iy|5|@|ym!kF8?uBYKLXH;S73=pkm|c6ma3=j5@wJjW zKIFydeal8l-ZukX(4v@V-+G^(I#^z;a*B6W=pI_GiqI_>M!D0j<2smCbu3P8eB&hb z;P6yT9TVK(a?gUb>463)#YvCP(DJeZqL?m>RX!Mx?pUlEWRS!HHbWpbj;BUa4^YvN zX8hQw1h$6Pnc7nN#U|=oK>u&s$AR|FbS*dneOhzt^>@to5bGd& z_KcZiT;7vbc^B9FHov4(*8*T`Z3Rq_cvUy705*s%Fr_hyrTIWRk6%0MkyOGWuHAs= zJPLt(+PsoPGUn#OX6_?MA>4L3kPw9(h-1_s82Y zTUY0Inwh3ENA}bU(#tJqKcYg<5c7PgD_);^S}wPu$d7mui5KnalJ`?!I9Nnzp zk0E4vd2~}rL-Wh;^i{A}y>e`iD&II@_B^4c#W4B-Zep36!(IoIc2{S|?_xC@7V^z7 z7|%E(&?iPIkJy4~uFt@wgHRc`@YRcyO&xUrcrdsT6Z@3_Qv9f8CTcD~uv z4Cr$g<7jiNmrxO%;t%CpsXH!fR+WUgsU$XpU9>I@V$6(+jNeScXb4@{PTkOWN35`@2M(3a#s z2^f)}=vgi(aKR=WGH7Qq>7IGT>i%|a!z&bUOXOXG; zYi?_bJ$lT%RbnyCF@N7~1-{XpY5u554c;W`b=sV&wb$a;Jckw?tZ*H1D9M%|V?~J} z`T3@Y^Sy;rYS#PZ!}NnL>EB7}v0U+uaE)@(k7Ik=!$9>Sf||*|DW1(;IrNwb)p0^C z8AP@ReJof&dO2-|rd==o^V)0#u*@>I*J_3Qmy}Q5E7fEGe5=QOGvn!P$85&0k;ar=d?rQpfbbyC zA>~;O{fFi0cTf4hN2UMWx%odovV$j`i>HIB$$y@Uth1{fJ9U5na8yA6DE`0Ol(FG| zy^qep)ONaCv#EHzk@Rb}PU6z@lTQe(f0FIy#@8Jl-|~Sp zt8Z(Grl;IC=jNaK*FWDtL4O0YHcSswFX2>ZuF6ljA?a0eWPGyi@`6+(kceAJ1cvCjUR$na0eg`&cP>gAEKJl|d(NHKV&1)s<2Sd3-*Mcphg82FG9NT&sjI+#D(uR7c$x z67`y)GRnPQ9^5lERxuL;U zr}Us)M~fSu>X)!-xV!mB>8d}D`5%Zffy^~50=pT$cD7W1#!m<_=fi`bLW!CEkzp0E z9tSqqYBqlBDX&B+(3LXn&7)h}0JA>qa-JgnD|o5{@~lC;k43>-_!Hu z^S;YiUD!cm_fiuOW>uZo(8C3W-NY^dFCt;SyNsx_#bb{_cRmihD+W|M@AG&>&PqI< z3Y$F_@X)fni8z>UjW%T>B_3nOVL)eyG(r#ZGOJ z%d2@}bo1V;efQ0LvNoU}(rilo4IN=jCpvQ7=~4`%rFa#3DOTpV%z|LaZ%jh+SE0en zEeHbqM?7C1e~2o%KDOjKBA6WF9U2Gq)s*?|WZ3PC(oybmrL!bL++S4%rx@b;4G1 zP%=skr`~)>NOI11{sVh~N=w24a9PsJyRvP!1$>T-{zu#B$h@`Zj{S5wVQ|GyQ*6=_ z{@$ky7uWvSS!aMnP>B7GkT>7qhsEWb>4eM$w4bqKSf@Sav$BiWN4Y(?hrYhYoqZf$ zV4wA7&H?C4#45)8G;Bf&fNwtg2dJ)O-}|t#JB^y~E!694+qoApg#YzlBwRnqGbUpH zBCrr{ghep`rf0;UaAy#ek3^*~2EK!bHQ*s|nB5gX93Lr=qldttaBIn+fkq59D22a9KAP77~hc0Xp97Za0MG;(Dg~KJ77VZ=@1b(64&v?*sDJ*gktb2UIh1jL_mYan%AtY zpJE^yqZPZO-@o{|Kdrt@*ZGnGiox^(&F53>Nd3@2D1w5BHW?#*ALG{j{mgm?Lg4tm zYM+Z=^Wq9(1X_k;0PjAm^py;O$!hn%&_6w{wk(`D$hB5e-fQj6B08;#hgtVw(47Qr z>MX0(WCq{REp%ftyyN%0^)cq+FuY~^KSHeGk}NyE96zPqp8)#YzQ$nFqf`$%bpEW& z)R;x;)I(0yu)6X1=XSmcVAw#^$eMx>It_70aX-EX3X;8R$_g0;TL;4Slj+AHQSdGO zu#dgfQH$`Uh?|l!ar!Cha1hSn_%90yxK_$6LaTC7{96N#%hUz<9t1k zp%pAXk?uD>s1EZtfw;DGM@`$hDN3bu9~ej{c9PQ>bofv%kHS|kW6l(!Ih-0)2Q<6D+KUnrQYS>2UFf4k2x)pnnx`)r zbGjNDbAjJQ=r{|oL7p9~!|N9}J8@TL@>F)_6WP|gat%eQ>CZBCw5(KpnO1pt&|s2Ak}&1V%)X*o1q6FlJ3KDYE9LUr;nTnY8v`>%9?8=SU^6Zi9F-59OqNdGHOK+G ze+Nt;sA}wJjEwmI4teT+Q9nH#s6*vBbnMr(W1}4;HosXa!fX=a;lRw7AZEZXK%$?# z$C83TFCFE({Oq8kr{u-&f`PrQ41QJrcky9o*tVD5l+spT8Y>hp3}X(k%-ilkOw**m_m2=v~&{NfTd2wR$4 zd#;m{*w534Af8scKB2~O$jJQ(WL6f!$ml;}m!|49Q!{HpS#yat9^zZQH5akb)LV=x zaizD{iJ}1I+_0U&pF-Esi5mQ*8dQ~F<00;H`#FrWQ>vI!PrT=OYK%&ShcbFd@wVRB z48sLChJ6T=3B1pT2?J}9u;)6bDeALDnR9&Lv==g43|NX_(64)I!Cnj{gV+*T$r*fU zTt(okK5t>dw_P-ap7>CW;*<5WGX(4!kN6cp<1T-bhCv}GjH!qdRmm5Io#vzFiW9EG z^RO%Yav`8*M?o`idF|Q%R0kc^;zk_eP{#JN(?^U5x~R#$IY;?M3d9$^*1&I z6EdFwBJZnO|Jaa`mckD#pJ4O~Gp0{cvc78^4_t>B%e2GSAJaNweLc#5gbp(gLpJT8 ziAk?Id%8PmkBdlFkWM*9O#OwZ|GnAT_Ywq5K>aT6Y~NXtr_(u?*hrlyoj^jH6&qC} zZ6ObyZsVMkoPjPtyj4(SRCBm@8$89o+zbHLRXggmc+n-Q){%>4pxJ?aVW(HJn%MIS zS>5L4p+CR2WGc^M!_*6yxPM=g*X;ud$fT+d!pdAN!O{2>x)_D_7Nr@11aIonT`hLt zv`>C2!9O_d`y^*~k?DwBD-7w#yctHb1KLes2PQ^K6WXyqQMlQuG1Z(DyIfFRE*bak zDj|sa`XePxaJ{Te;4B+45!?tDY!f9nRW0 zP3Kh8E>*cV-K4G}IA&r>Il&e>kUMcg$SEr5UpjhEyB$F^tr2gFVX_O;PIVR-0kob% zbV(pLwiB4u!lgeb>`E4&M&LXV7?iHjsnRBt$;-I8RDwVgYqz%gy@l?S#yWtJ!uD(R z)WkQhy|g%-+wYg%OjvH7nEh!^uvK&z#*xfhba|?<_rO+*t!iiExfA*6AqCi|A?sTj z{t)4su=vU=h{rLn_$fp$lzOuJ_U2&-Wss>sL!K=D43oW1RW?zw#gsX^Rzu5K2pwyX zislZidCSf}{(dMO=ZYr_6Bc=!6KcbFatAVxE6%i-y>y1h^ix8P%^sEvhof%@VWD+= z>fe?NN6|1tlp7-~r(leIjFp?}6ovBMu}LY%<;1_xnGYzY+|)`0UM7JAMS)QI+PEz# zSuD0|%h0Dv^IgiNF7h!RY*5+86~Y*`$E>ky#+d6HNB0>jj0VQtv&hmLA#Q3$Yumb* zX-d0-o)WcN8V#q;B#6FOFjdlJgOX&bSDF1ZyZo2hN>1?o#qZHoIo=J}j~IO5hW;)z z;NZ8jvL3iAO1$z=`^Tm+;Y{Qlq2+o|J>>QhKJ-?(&;c0!Fz=NY8h;zPP1Qzh+5+C0 zmenXy-Frmnuiiy=vqyrt$Z>}rk8Y++P4nk3d+jN(1g4U|I5JygLp@H8y0SH@5$;hA z+cooWB%9N`gT$jo`<9q8E!i?@_jW&E@5}+iO%)DhXPm^+fK=1EpU2D|K4y=2z_~h!@0PltJd#OxzR~XL^2`^v{9|u23AE;58(Siu1s#Lx4J1yj0^ysUjDj;lz z)$^v+P)54^(u}03DqAkXYNi};_pL}iTpBYe8$%> zX*cECSd5qn_Kbp)b^an>ANi`^DkXJQahhTA1y2Q_7yv8f$}e{PG^1m)^nt(*em9PI zDB_)4FIf!`(VdwRjA~pH;nZjCcDUM;mYb4U6%;=}w3Fwthy7jEJ1*o;b4&4r9EOWY z-hMl{urWPu^0$CWeMFer4Q5B?s15p*q^B5hJy7>A;N}?RtxhYNvI1XJ6w4Ki2dUf} z%`iqn$HMsz%G1N-rQiJ-_&Fc`)Qtz$>|IJ-M0)Pn1DaHbyK@)l zPlAtASl0@-WvnjO3TqB@ge2Cmk@f{^7Y^XE6LhKqkYhPdA!!GXQ~N3Yw*Qwc-&Cq+ zM<`g|y!9rpZ14D%`$pwIM-{t6d&Wr<+vv4c|KaUt^rFvvyen+rA9CPtkx)noVaSLA z1e74b7!nDbFo&Q51t=jwAR$8-lES%hCP|!w)OoS&7|3w#1c&1ug7$kUo8zAOz$i96 ztR(w&#Ge$J;J?|1$(!~J>lW@0X0?hg5$bW+wuN#mTqNs+gFD2E*{vN(S}5K_V+Pg+c(WR_k#Ed zPi4Yu&DuBnM9=ZG9~9Na#P#NgM3N-=xbN5Skr)Y_)4sE9RJW8g6e}EUb(HLDU$eC; z<;d?`QfQAoFq+%&IRiOyuZ_J&5XSoMi~MkWnD0$aI55#r8qMjxme_S^X606=v@p9T zx{aad6#5lRq=8>E#!nO`&Na`*)g!EP1E=2xOyG1xaf35Re|$3W!+T5$2EVYVmdyk0 zZnCeniv)o;qpODi-hQ4l4)LZ1Guc@<1_0IKpXzqo6CKiNr=PnXHw*gdktQe)-t4S< z67sq*%htN_yIY35YF$D_18j4rC)uCj734aY(*91YN)V6_rlf_8Z)Ss@Y45;*^0IM# zE?;RLpdNjV#YXYad3~su6s2ZeYMB6Jqf`6-*b&6~ow?w9;q~>Pi;Cv+7x`U?hs>9C z#H##MoCCrbLvi@wP#(KXQvd9~&9&x_goGewYX6|Te=6(mh0o?IC%ZD~#wCy6JQ29s z#wGUJ$$69XiuHc5XcFAV%^9)RVr-P%=+2>`y2h1jSsRd@T&BlcQl$pR?ol$LWVOw1 zJ?~Wa?7WLFob=`buB#-+;uT489v8#Xi+709c{hrDrlh;c3KwX`B?wuIY6T%TI{Cn< zA1K{0Wp^iw_<*v&Pf7`g(7t9agrRSv)n^`H&Wp2$2( z5}BOzouT}7H7N0zSJ=lpz&?QPu3Vcn(X)+6S?WEmt&PAb*U*zXxX6jSrn?PA_RAXo z;{SmKK+UFu%Kis*_vH@uf$Z?ZGcI2MsdNUFg(8-S0v1dWfj|)|NCKqH(I`Y7RR|H~ z50(YuDzP9e(ZlSv6Ub&VLhKXVgR#|Uuk@B1hHNhZQl1}l5*B9*D*kVG@z69Y&2%RP{cS8{iO{2kG^r0!?y6$iDy-anzt=7XB!2Z8acP!{!_|M(1` z>RjfF-O|eI+oOe6@-%#Y$lwtlQs#Me%>Q+OiXdoU?V_Q4SA_*ohu6H_^Rt;L9|rLc z$^t&8`1Hp-=6g6eln;;MPqiV*c@1zj{;n8O&1g_x&f?}mD>p?C=h$JUsFE>UJgj2Q zQyC^kKnq7I+|z2U#_&4%mh>M>bm7TKF47T{`Q~ZrsQ@v~hB>s)d!~GHdJH2&fiJZ) z3Lp#Utr;bphPWyi{z1kW@|ccJ?`puN#EE%qL7sRmATx=0J#~H-l!lcnigH8}3!O83 zfT;SV!GznKAvgGdftg6>Ews`Olzy@shU5o}*YhQ(w}2 zH+TrU4=JoU*H?L)3SO1Rc5Gj~{9A#jcldKhMAzcki3Jx=DEl0?*DsT`{TRAcZ{uju z%u{Ou>X*>!J7i3F-aWfR=IF)AH~@~myPd&8WO;Ey=JlO<_sn^s@QjmR)<=POqbix* zMw;;&-*(reyFD3&$GC4ClTiRUo1>Le^ZJzeK8KBo%RtlSMNhS-9|!xv6T@eaHp0t} zZe!lC+$53QE+IL2sJB5g0B>lw!eP%69hURlCp))!#ReO^G;PyMbYRWsVNN9%r=)gU zp~WNXRr4n2hzx}IiHg8iAFPNpG7TW4F$mGyjgQ|_kE^_N$LjgP=qNmSD;42DbFoNI zy8yq4f#_fJqs`$H^z9G2!HK`qH2=V<{n#g>BqEHk0s;smPH6uMVktpXfFckeB#0;k zk`{d8aCv3(8Jd>lBJD}wh_>GpnE!Z~3rVYK!SLU(3TnPuJxWYJs1l7<)3y@o!I~Z1 zMnQTpTM0BW?T4ADAeHvxmfGT4K9c4j+Gas5q&kJyE|m>blS0@yW*6zl*uoi6vHKZP z(g;{)b$3r(Qc!jdvE6r0iROhsRBv^0X23Q$!d}l_>XhWmuchk;>LB4GG=~pr0$*FL zYuF#SlBa7_>a`main$e&w#S~A>?3BrX~rRc^aQx2duf?$65r z0RzS$?H>STf0Mr6UeBDWdegqDI{l5Zh)+_pf3q;HmY?2c4F8D9*yR1+1%Z7lN1>`A z96EcsRkh2PRI!P(`>LUhuyo>RvSPVLU+>H#r5(+-j-z%+3jM5)b|0<#d zYVHa5h+>{ResY3gQ$y*E?O(Cwth-ekvqPxtu3cTaN}Wa-egFJr$n$MO9C-<7dI5MY z_SEsHpBOv(+f`M1Io#NpUH1{B8o&AIMflvwfo|T1=+6Dj)GuvWsJvVcRR=`hYOrO) z<@5H3+OYQ_hy)XbaZ%LKoCb;PMrGW`lDOzlO>L&@qa&D~~y3 zT35+UEwO;3JLzczi^2V9?XEhIKsm^jGCTSqa5bgq5vU;FIYA8Tf(IBCdXKTqh<|0p zCJwmt-BuP$Kd63h14=` z4_T$v(pVQc#m^+k2jDtIhB#txNxs`C7w}v7CmzWC*aukKxD}CdHF}j?n7&J@0&qD~ z-!TO8VDwFeu-?jZ`6aQx$FWL{8R6+8(nbZkrkxT#8@Z(uuT0MFvvx++`N&yq+eC15`+fP!{VsBC$9bFxu}+tSwhn*7VU~<5`hz znv>`CPn)({Jv~J*;6imIpWgxkr~oNwq}1mOYqR`VFEueUewdI=C=OU!ls}twhLh#f zCnqw7qa8%_PCq$6G_pDvb5THm<6`1*@K1qc>P5!2{5(Z&O18~BZ?*ys?9#=$v! zmsXTnvzKUtAWoPMw0|*I;}DrZtzZ`s5ulAY{$Vei@A}3LWoMc9ck@_>w~rlXaQI}? z7cL|_Dci=N)hh+DCABDEKP@?`1beyWQF6Dwr!#F_`zUtE{bBF}dox8pXNv$`yv=3h zn%QN1uLgI3ttIngDhG65v!)D{-w#+Ql#kaUl3zI8i{1C-!#9bsV4|3&cDJ%gSS>pcrdz^!(j-w{yfAf9H^P{&ZUz2@Vr;z7Y{)J!_T;WZccPpwy0W~$p&g7uHx>p}vBqYYk-3H!G z4hW=w4J2F}vA8ZPuJ$#1%ac_j!-VF&ToE^%Y&AKy6MMRJG>Yl2iWLV$*>;Kk7Iqy# z(aD$;(ts*0TwiQC@;*A0z>|QyLAG?r*Zan3H+A(i?yiwYthYYbRYGrld^S5m2X-ex z8h_M2U)K8?#{04@Z`F3OH4QOAPG zm$&ZNRw6NbTa0Ci!^y=PR~CEMBj3;N1QxbR@_VYo`*0Z5gOJzSCk zm6HxN!d>zGP3@p__(>w`#{1{(bsf-KJZW~Jgwv|ciBjn$Di@nrl=EO22EwT3wQ|VOwvyU( zAj!q&L3#rsEtPA_%B~QWrAMro=JJ>AqPOz+q&Ir-6*!gaMHjdtUtX0$f_Mw0H<&It zjpp0;tOtDC@Cgd(>wQW-wY8jxuWo|^R`^GxL8Y@ZZsu7U)G1R)DFe22436xQ=lG`Q zCaOOE!iaJQWmxgGJ3bfe(N(vveXkeh>oq8adyJ|7TAy0teWK~bEFB;#dz}LvXQkfW>4e;Lec}P4Bw1_h70r*mrnT8JLg)wO5*XzSX z%C&G%?YBf0+l3UtSG3Yk#(}y6WdFRz@SN_(ZD;oQ01r1iIWgnVq|U?$u_c~|$Z-QH z5qwmud|f=I)&M%wWn;E!<&UUf6FZ!4Wxel~&2Rugobsl|WFoO%aP$pVDn1nzD;3(A zg!#3OtT~-Q=u{Gq+=4)E6@(bmIq|B!%V*!7P$J3>PrY3|G_llS*G_M`1NOfcn$-DU z2#rwJt$ycFwc*NcI%kWEYD@N~ zGo;O*()H-r=SCTr9IOSsNsaq&Lct@apLiUk9?4b>5c>9&Ed~*Ki>*1*qY&wp@XYQr zfb!M*w6l!X#Ymd439k`r?h82D(jGTt1PY#IzO7?&-S1oVuis5PT8gUJ@^~xL5ILe( zGKE3m`F1NB7l*zfVqW4+AA|i}2loIm875&*QL}o@SQQov_GA*PuGfickSI)MQ^5kk zGVh-*w6XcG%YNzSy(3ZiSiNXJX}X`(#-E?%zT~$2xewAPxkV5_Bjc&%h75uT)dNF@ zK*R#SV&9x$Lxe#76~+VFdK}{LgugDIsYW$C6l83xz)IRBT)yU!c1QzKl?C$W*pfDy zC5*kWz(v@SLOZI0klmI~DBZsO6|vrk6J>kk_OX7)q4T$A+F-UDqEBYFl&!j0GHfgO zBCQ<$-AG(M(aCjN&OHoCHdvr?HsAaweR?!P>`~x7$8j_}76xM7OG<4v%YDm?dD-SZ z#{VLU@-@GOPWAAGY+6rmCaWR(<)uR~-4h;?Vj7{ z1vD&PvFi@8YVHx;;kM#C*Y!;zCAB?lprbDBHHAi1wDkg>0m>X%N;3Bz*lpPi+;=+z_NUgk_vKW;ciNfzZ#sm_&goY`&`bjx zN85s%i_a|G9Nrbj_9%5&z?l*z92%+ek~>?6IzT>XV9U_ z>BtoNoArSCoW_7AyjE}zNq4uX8aeovCMV`{Elyg6?qsq)~(ggM!V; zVfo+{7_HxHHWJ!xu!N)N)%P_bW&n zT(nw7h|{v7h9f=irEZb8BA061hY?z91rf>1CivY3@X9mo9)aJK+pnnIq%Hm%lWu=m z=iI5J80jHlpvP?k`*cqvGH{$_HTBO?G5@D>L@ZgrxOQN5gy7D^nH>&>44s#br6SAv zjvVYVTvrdv;37jcha@1E%xe+0YXT|N&n-AO-~74u@`t|IV4vr~oW|RjB!3a1s7-@| zk2J9`0YWeXOei8o5JgIe0!%psQZXOuv-|t9}c>6P=LRp{iMs~G*Y^*|jPTd7Gs)z;PG~0_|FEo^IIxaZ-O5^O1 zK)Y`vr=d1fuwsi%HRI6b8mt#xrNF>!Hz4KPsx6ByPzt^fe1Rx?(%#FOn)%LI8c*YU zwM*%5Qj9ozhUVU2Lg07PI(4~qR;-a6(+8dHk2&SZxPP7uU&JrnMOk;K)qnVl_V~@C z7b2|I3bZE9v^Og*&}e0`|$B-%eXhfqa%d0{ACFvRR?+?~bHn zV+}wvx7e{lnQP=iIqUcM)T#t5a=aREl$#Y(Mbr!IGzrO68{dmk6m;m>q$V(R3OD+M zSNp0;2y&^Jpv}3RCoUrZc?)`lSeb}W_o%bnTf&r{MqD8C8qfFAZ$fMEXRC~;{9P=~ z&Roe_%#$xS(2vf*9)(h9X(VtpHk!n<=D{#ED#%%Wo09CO4&Q!Qj?go z%{0&^(!dKqP5|F7EAtIUyEd)AOjQmu^w3+7&$v-LRtLo zgjv%%j(G)GG_lF9m+5CL*^GM@!Tibl(+9Z2{L^{RYsdGHSOIUj*qM;WR|IpxrfZF$ zu4c;MiQ09!TLY2$(~~f#Vx%{(X;C%{LRjzOE%lovkF#_dp)NSv$rmPT2~A`Tmy4Uu z)4TKyNA6Cj-APc4_@T>*MYlGUp#J(*I!f2|QUr{oaXw)2D}m8ccZ`ZyMByaU&DkWq z0AA2Zn~rmHoO0@+%Ocqk7Nto*aT6QsEMKN3Fy2cIj`Eu$@7f=*A}za(hZ_k+M~3Ua zpDvh6#Z!iemATo6ffrmihPbpQ#*=`=eHW;_e_JqnH+@cXR*bW=a%w1An{f?QbFkx{ z8Mit+c*jzb4`O?&X@fBQO4?G$qj*3C#`HX>oxZd~CyXWL#p2MDWNvdjp0exDd{E{z zGBLp#li{4I^Tog|pI$B%5rbMHHomn7CaSLHD*u=KUEJ$h;IHiRW)FJ@OYrY~g5Ny3 z5TbREB&e7qMu}QQ>Fh!-2}7c`PXa{L5rsHG{xvb8ZMeo{b7{YR5CzblAb4N<{vaxi z`fd0=EwaZegv5iOULFv6tS#d?s**a)^p@cHgK&_Y-hLAVYS(CA(W8H;#>Nq}qeZ^C zvvfW14cDNSy#GEeqIJ;q1#xs1j=>WHW_X4-_ znuckI0DG9N4Owd}a%Uvnzat)m-WG4+smEZUp4-p&Ln?T2NUBmHqPFvEIkG2cUDU|olKlU-fx)XSkk z)^v{ZqrJ=-E%HQ7CPO%83 zYBTo8UA7D_$Q)Q9^Zug=_k|Vs7Ll4suHC`2bNIP}cbiY@z0V)@K9Z{6evCE2T%Oda z%F0;;fc%6wz10Vy@1~rENAIey0^N<`eXfd-6toTnH1kpYY&R+Z z1jfdJm&n&DsySHXo$A5RV<&c+4jI<{6=xBLZyX4>DSlc9b5ET0*l!|xP-GUGEqsHED-C2>uRJv%|V>~kOpv*u8V*>k|FU|gg` z*-D%+LD586uXvjsZ>(vcG3Q~_k)x;ecfwXMTUpwrxN5Ywo1B2$&_cLl;O;g&;xeO? z_a~XONW8^~K34}^WK7~brq^`Js919|p(UNJw{e9mXEb}I`mn3T6l8^@LcIjf;Cz9E)OsXHiB7Cs&RY>2*U zVJuGhYpK_6@Nkt;7txO#xOhoAC!oZn z5!Y5NGX`|{w>d-4ke5U4DRJWQS+(}*adaF#jnZ$s<5)lR_L^sJH}F>0>9hAa`U~6# z8m!{vHirFI(wwLE$A7HCB;&})jXK~ZQpMl3;89Z7;*C1Qzq(Be+ZInZ*FvHVcexytd9{`OkwFZC~N1(bO20oG0NXSDP~&Fq>VQ?$@sB_eILJosdRlv zb_KwLX&xmTL!Q}on#eOgqlrY<>vpiED{R1!+xV$ z6Kn$Zp@~K@)?*Os>nD4W)Ij{fNq+hj$;;L#{>}qSqs5{pHe$-{Ir!$umk??w7vHVz zcIpJoR0=mrQoLx>=AvTxxrs&nCeWbn8mBWDC${aTpyR~lMC+LLIl5s`w@Un#Vzv}H{+ihiP|?n1dBuhLY_VPRiwwz( z{W?%D2JnFmt$_<#55)@+jaVOpw)ayF@bJnysyiu-t>usQ-n0emLx1Jq}52D zg@OZ({^@{XA*t9D^fwuSaIc%`aY?fKx;o0mqi?o@%?*$3s@^G#f@~j7J&R1_!Odj* zv_Z)CA1eDP=%FcD5TNOJw)YJlzL!$&Y$p}V#*Gu63}YR}qu2D2_j49kh4?J)&4S{K z?pAaeW&8!?8}~cQ0rEQL%Zf+68NQCoeN`iz55=9%kw*ph9XE5sY2+44r}tn~+95ZFclB6RzlOU=_UD;~ZNME%x^ zCCRLGLvsDG`L=pqk_i+e=TMbCi-r8z`A(e2P{LXvY+y|sBb?2O+?sR_oWnr-&6&q1 z2`l$1h|{eot;HU>C$Lz3zu>j7k6?o{+n3HJG00mU_2aaOBu$uB$F;_} zl$dYW<1quUBWp|l2TVY-zqSY;vSH_jg~@jQ3XN&DZ7G4Tz6bfUyC|b*>epG ztpDb==X46ZH9wA@)ry|p0k$f6mz)0DrV8jU<)-FEwbTiajjtw>>A6sHp8;GTzQs6! z_iDEI$Cie2DyQ6*%=%REHA#DIl%k%JHVZ zQ0KxPFAU2$mW1#&2o?>|SSozUeHj95rX7MTxW5dqAnMqL?rNc6hQU7SS|@HR>Ci-# zTVYtME)aZw>PuA}DeJ=B>j;|?1<028w!0+g0@)7_43iF}_1ZZzQ1i%y(=F>eur@&^ z7!esAs$kIey8v`S-7{|YFw1CQ$W0+_4Elb@Z0de#(JUvsMY3)gS~yo*SbdEtF=DY{ zEXIxf7NfVPt?RZ;%8DmmLOyw<8)16ytpbGr#-{8il2Bm+IrBU-~ zgk6v4M~0n222Uflp@WkJv^FRUp<~b%yr^y1H3q!8F?WJ_F(~iti;7HfZg#?iy*H9l zFxP}Eie2e4*X}sLy#yrJ3#<>jvtPtPI(6M*-mUzF7O#2Uk0Vutr=%5$2WtC>9_%jl zZHg&`2 zgSnGdfB2=cG`($-F{mdAV4Hv>ng_}$7fck+ zOkXTM|2wI3ebLxR=NzbJ&b_NVGm!zFV*|^q4k<7LLgFpZ1Z<#%bI|UO*TFI*Q|xZ9 zo2RGDsWYj@7hme_(q5x>>TUt>U>*RR?PZ%SvK;9~F|O9$b9}l*^-YB-3r_SCF|KWdug!>kMb48bb|-#w?t%_dK$B%QL!HP0zwgZm={ARQR6Ip6G++yX1M=MVBqH!hGg29{D?w$koZr!eiGKJ0zF_ zHYOsZ3M+5)soh=Ft~h`_nGdLOKG9}f5a5~jUQluw~ zZRDeX-AVDz81&O&fDTp>*?I9V?YQ2iN5nIzQYSo2+>G@1mf3U7Tb2(&h1R+Ij8Q;$k?{EC0N?c8gtAw<`}2_At5KZLha}MU1le- zQT!`{zb^j1KI~2B{Z1xQmn>N^MEV*#H_L%`l}+Vwb=T7wdnCmK^QXBmFPU{K5%ne| zC1G^3A{+Ll-jg_a38*VkosRcAwumPfTOj$4Ui%IcsJoNl{>`2!JSA>;Wu|9^K2-1F zNI6P*(dE|?GP|N3hXz*S(-3O>j$PRv6tD^2-_!#h*-?zI^v3jp_$g75Kof_avF_qq zJK)#WZ4M$Y?A4IK-^H!9gB><6HY`G=Wy7j^#+?f3+avN2irS(&h1iGFZ&!R^F4<9K z3zTHv{(d?f+G^krBXr$8eX+srre81yLC%dABbkmTmzs5IZsSm^{@ za;=ltUmeqC5s($HS4jvkFh)e60E}{ADw`3YDnvgtSLAk(oNi$PDQMx6>pk#o#_VH0 zng&;(C~!3*0}T`c`*$4wZP(%eO0es_voYI4h{Ug#m@k@XoJs$!Y8kWz8Avy zz|PLV<%7#`i**(={0a|b3Z2pmvA6*?42s>VlKyx)Z_c063WdYjkjJ$aEGd#xi%wij z-4e;Wu%fuvIT;$G)Xjzt91T~<95+b(u=8LN6jwylVj0`zoLal2v?Nh%J+gCrPCwj< z_e2av)ufd=KBaPcL0YHU#M7#4uG>!%ji3D&u|F90v%MQIOW@oJ%)z^=ko&wGD_v=H zMf0598GlU6fH2>%TQFBL|BDXBpZmPYABLUK2J{EPY}lc8;^UmFaWLF;MPT{9v)bEV zO#8w}`PLw#Iy10xPRW+7ugBBdHE#pDXa|Nx!pzIqsv6_l#M+KyyU}dR$&=9#N-haR z*uS&n0-3GNI5Kf;k(bBLw0k4Mo3Eu+Qj5Ny>?l<;h3@_mRnj_0wU2cQPsRySDh%^7 z;wgj(qL^Xn78UC^v8F;~#>9QV%;&1t(A{YegmesJTz8{9ne8-E4+g9ZJrZPj^B@gM zg|rkcwYQm!?q1==2$Ams+bO5nQ|s}?yOl^pPbM1Rnc}oXw^Sq(9h# zUAvZ8lly2Xr$JNqw!2T$eSa|XCJs^jURPyyrme;83O{72EG_w~YLI>u`XVRR7Q{ZO zDY%i^NjhE5h%WwiKikSiqf2i8;`*q4|Lgw|>S!3Yq1^xRFX{h05tKy7sQo{49u5Cz z&eHL+Ej^8!IjXcMS^MZG}%TTl34=*s>plvk+eBNvDwLmCCT|9g-~oTpLF->Mzjp8k zxA75IW~=DU^S~}6bGXjN<}$&}FC)sg;xq&&DE-r2za5ay=4P?wO$Sk(KNQB`F))hr z<*`cOq5JaVL4zZC-?e@dQ`l>0C`(g#wvg{0qI8X_*01%a@FoF{vBAR(Va>omRjD-q;-lpfd)pLY~`+g*hSMVEf}xa5NDR98Io z`x8OyGWRUs=kD=f^0_(5kZPn;zATwzJp+$U$P~6CVn~8giO#_rrsY#0!Ez(9VbeZx z6}eLlb}x=hOk7xBnK6jh#vbo`KP=EF-ze=YPieEA*>!{x66mJU$&)AJy8f>7BU`X;7|B| z@~bX&{BkE}&-|b<3noENql#aBKiKM7 zsmL>|#)uX!%&qQ;LFY;)^w*fNt&*RFD4P!#>lWM3Gz>T|xErP(O_zu4GU4m845un} z+3-aFgV7uFn)Ka}CI8C)m$O`pw)-Ou4nf!zoxeQ+oD=*6`TzLEUlIDRU-)C*34#(d ziqSNMvLwwA#OHG2oB?w-IRVfzP5>DN0VOyP{sIeSb{lqKfiK63%JDCTQCWc6E99-< zNG99Ga=pL$IQ-kg4 zbT}rsswIdL5x#N;TT+8r}nI z>ci*rU0GZnU_t!YA5I6l+>@AR*Lw6i2U04$JF&#vvAp8d`uAlwCQuT$5q+e)yxZN3 z8GApJK*5ZxB;D7s@$NFBnqi&@<-UCTvDYJ*nbodqK1;Xe(lg;fxym_>Br0~05uM7H zz8(&4xhqcMAd|KZt+owD(L|4>M|JJLn@BnK@=(&Dn%NK@>lCkny6_iaYD5PA6L37@ZB@Xt@* zk&oPq56!V_h)kT@x1)JXo~R=nO1XVBdOskM__H_kAJ2t8d2;*#+WWmEa!zsL?{O2p z?DZ!v`SOcpG$s0{Q8Ms*{z2kJ4YA407|-T_Pw;y;vAYTB>d@T3ja{^y8^R{V>2A<3 z=E;;$V=NvjAu{_U1zO~Rk=gzIl3&+Xw-a#daeQ`9TOsm(Ej6=jcnV^ER(A)prHORN zQqtMFejyT&MQ*;hK=2gcKqvEb*H=~@`0vF zXngNa%leh}TcO=+Y9=oZuRO3s9?bpmfC!iLlJPGqKXmz9-$_yldu(qhicdIfM9~R^ z9UDx>v`JVH?ClwEb4;mA7CYF2AK!YbHS7`xd-ohK*H?~LZbuo{=CIA)JYZIHKI6(mi#=SRLGMnevFnvUwX0U6SnfLMjC)iSNxsP zBrxgnDs$d1-07<^gK+!en=DxXfr#%uY5wrZ^>bhN>1{HXJ@M7<`O5_C_89c-!HPG( zGnY2@bNXd)b^dVk`VQs{hj-Q&yFhsaeG%vCKfHzNJGl!=GOGR;uOYbq5g_lmTh2D_t zg&MkfEGop*De8>U7q2XN^0^EyR4AD#93%~C?pI@GGx#2MIB{!h_nPx#0>6`?32b!1 zdr_sF%b}RhGL1eBq&OAtThl=LF}xpkvGEqJCo;tJi=W`VVtcsa7KbPKHr`YMvjY9v zc`SEWK?A-DIz_tostXcgNg>-Nio+nROi#HFH`re3XhHe8@w6Q$lB@b4ghd+bdAfs7 z(gA*|`Z@zay}tP1@yhicf?i}Umz zesjxNGdFOhU&6Qas9=ilf^@2(F8D14V zMh@|0-l3{8$y0JTkVbuu^`6<^Ouri@!l z`m)bZlc;%C(3N3dN1>dC-SX~zn>gOi>&D7hXD6mhY z$pD!%Lml2{r@V=W!}~2~W?dSyL(${t$1J?33r}-nq{9^BfMA-v(!u_A&qOnAmNB_2 zP$07TZ^M(iWbHizKFKS(sNvo^?*HZd2lq1({EMf3g_=K}@`K+3N|O|hP$a=3IKyHD zO0p!01KS}Mr1-30^J#)lL;(Z=CwrT$YUN|(HYx%P{BdBZ%p%|bafKd={x|)(G7RXO zw_tGK{Im6JSH4AT!2}@TeDgk7x!TIoKpG{viOq6w2#T`502<&jiGaaXCIhFYpb<=h z+{_jDQg(BnjDc1f;9$JFhfEBB$4>~!oO99F@P(u z%^x1hhJXiUsGjLv`Q8NvI=4;!CuP_maUw_jtPGR9W$&51`c)ZbIR0I7YhF?%bKP@( zz!X!s)f5y4b@8uZuG^+=;l88vg+ei5j0=ZLZT6-b*jDhqF4f<>NIu>P+p=ES|wB=`P8`9!}OZ zyWI!x@K9P!<8+~p4$zzyO?^;8=dd4-W2Yx0RyC({R7ASMD&tdYGcC~ZfSTTK`+Q&G z29LA0m(I{LI_Qmg91e>s)t+?E+p};KMClUWPbZ2iZrY)|?O%)AzNM4zM2PJ* zb}XRo30Yo)EkbX>XQs0lA9l88_;%~)(~C%);W$*r?KZmyH>qgLvyr!EZ*>?PC4NGfA4GesVT5yONY+*ndF>Tjxkoeo}XC%dwI8UhT zdB~O?Ru;p?g1nB8GUn^d8C|u5B~tN*z^IF7!11~*<{h@fTKFoG=~1*y3uf~ZdDh^S zXq5O4eMTakJ$Wy#nWzZpeRh++&9f?)sVa-9%F|aGSVYBCL;){i^%DvkmW$5!I&MLT zyY-4AhrhYPN}wgh+W_#iJFS8Lh^Kg@}P~I1z><{W5twXs+){6n(^g4d? z61d={sc&Jhmb|XLu3)V<*PBD8zz3UcWV1q?mzH1ADV>r>lF+6)=IYa< zrW{E_p2;5dQ+bj;D?}i$X{?n9aWAI8xwGa~?78vMIUF52N4zsOh5JW6-R z*}6#u`5ZdS)Ipl{M5J@@6falGXph{>zbfQPeJPZFDiwEak^x5&yNp$3cr{2vmdnk) z3fYMkh61f8$Pmv#zg&>fL}*ylI~ul#YyPxO&Jwjo3ETW!k_&acU1x(CaH=sb_ucOJ z&Zt{%JOmf=->(UzG^X3LVjN|G#1Do;2voGR~m6S^78 zPEvN0Z;(+QVv8f23~BmM%k9%(k?mQtFI031rigW9{BpQh6D6J}K9wJ@!!dqy#v?ys z0ybzd|RRm%EeUvYI`|b1S?r@K!fjFTs{qode zyyVOdvRhNC_eZ~~<^$(;;r+zQZkyZZEa26vtnAhYO6%(OY1rAw^^L*fq8+kRjykuo z<6x+bOvY7=b!&AB)SL*7p?&^NT^*~vw+tmDV&pc}E3dCg6~u{&-S;?iM8lvzgm1YX zAp3pct-vb$%Ubuf=gaffhyHQ*#5?g~q}zDD#S&{dZ+q z;tI7@#rO$Huu~b!-Yi$#jLl1s86&LeQkyhWig{b=}<=2Z- zF&G#;nbZEGK31Upba&UKBdKEDF2P*?WF?}+$f*qF&9~tdJJS|AVgLbv@Nv)pt=QU~ zFsAtOb@+6AB6NNjLk7^Sm|uD$KgS*YLVm~2m!g{C`i8LcOOy2@UhL}&<>(@`r(#Ln zoBV-rXR`CP_MJc2&W_!OfMB?AnHQBGY!BuU`pF*eM+3c0>bhgde%KQor$D=-8Kf7E z^vGOx98V&GX`;d_7Du1ey3?DS)~G(>_0VUc zHOI7;@xqJNJ@AA}BMOaOCEpcAoQ^t;V zFx*T{+~e3Cdm<~>s^9HHg@~uNf7J_4l?(d&u9aid=hyW|?KiOQkLS8sQnp>)71wO| z6hZ$RFZ<2$@^>%!w{Qxau~=}Rolx8STDChmG?O_hyM zpq~y724Wy12WQ(1=+{J>E__A1d^?9<@0MX`qs&8?6Z=JBI6}S3t5V7NR8a&~Xlv0@<{b zam@9j>pidD5$}Q~#=9=soy-Dijgyux>fL`~B&{x~`ntbyAuVf|#)8fr;<6#H&XSbU z%TJGEe`W&he&U_07y7JGqL6Y3cckPzon7fCbt1@laZdcUSFVMUu2Ah5K4Dt-Yi2W;IFgiS606c2DD) zNa4DG-I=!X&=rY0omx;@cUf8!$aJ^{{=LzM9lyJq7>kSQoUeSFkeCxJKOc_2oSM)* zbx*4brWzal@Je_i0x4naX``+3QfoIHaUe&UncykE9rwcTsNMe@L-}(DK$%Rlgj>wz zce8?a9j13(LiId4v;c0Q&+(Q!1$kGyll7{#8{L$!P`a&`7J+wu?zNg(>n4)+USt1UUV8+uPws%(tehxvQZT2sv$!)Z1&4GbJ8zQ6?l$vc!5{MiV%nYe zDEggUA~+qobtv5&RY?eBQQ?Csp>=ztA{CzB43W>-LbVEg%zI_#-`HC9>~!dE?Cg5- z_1B@h=$vl9{1YKK(u}YYtE9JJ(ChM;aylm%%#6PbAvj6GGIB+pvbkuWP-EUNRf|06 zJ0B*POIqzI(;@{83-6gPH~-=Ew5L7~WzZu33Ap{L`ToC!yZ?RH|1$vp?zR6GiBWos zlp?_KG`(dNtT46`NdTKH(4DXJFxy1lIS63*+ z`gU+~&TNd60cRx?aC`X$5|b3T)>;rCTlB(8X&D;u)`<9bi~~F-H&g3uo0eZcf`I3b zLl*?x48=iVu_7_X0>B43&fA<8o^9sYe~-j8IBFlWzeVEalW2qg?~wSgaO77cUfIYG zNc^4X`k$jR^jEC+8!CszFHsr#E7tovs0@7%%b%n20A__hPLumstEX{w+ zh<{HlV0q?Yuph8TU)h)lYZN|QrNgW&J7Xc4Vviwr=r9z=++FYpzYrJphF$b)e6A<1 zFw|FY-eKkLR@+3}MyJtf?qZo_$BSX3hjX19I;>~@v{&?XMb9Cr-Wc#XbU!p>u z@>sZ-j2qZ$UziheVqp@$^L1<+M?;gF`!mm=@>FWM93HymK0e~}(-J63v=4;IvI<2@ zedV0PhM{=G^JViMP9;kS;;k0TI2;msyg^hW@x9r4z6C1=lU#>uY_@3aMcR&eUAxyT zc}eQ=g+zFQ?>0t0c|WNI{*#PY(&n7A;0MH|$)qn=wd>2#xi9a1DE}#b@_V&_^@#Q< z)~1KK$-}p)Lh(eF?;P9X((Yn)iiPnbZ-i`tCrK2okQ8@uc@>VwmCK3?tRlnYq{_SX zU%N7UTW216Wt0;y8p7OV!Jsk0ZXcuGCq?dIOjdi&RGuHNJbly-Ii%X|s2J{hw&ki! z`Sf{KTUK+smHY1;V;{k@I}b(m(E+5Dp6@%Ii^#b zz4==TUH9TK_b%yfrWGQgcPjgm;STlP$4wxSkgnGIiWyFi?bY!1 zJ_{{`JTP28^CVR*(d8ZFyWonOhk1hWKp!!*2x&EY8|@v_%NN&;t>__*k1LUSTzIDz zENF19)NeyHm*>~M`I^1ZG+Cdl0Jg&9cc1tPb$|0EUxD=Vr~fdzMIj7Mk}OTL6oKLl zLw`EI#cUnbI0C}2Y?EIzTRvp8$*fl%3VfUiFqxc!!K=^bnm6;dnA*CyB!Emd0aOzh zS<{>F8v!0M84G&0E4~5;H4LAe!h6!7TOtqycKaAZM{v>@1=8?=YQPzK z58T)gQ@l)8y@A^F0czhK+g9@D4CQ~g66otv{$8bve?sP`^t6?aU z{3dWq;%_I-Fh)%~xxq3V@W*>T&bO7BN;$QEq_OzakB~A`vK(cP(ZR^`gz3`*maOyb zZNx)zsq**WkNPp`t;FBm?Vj=|v&vvcQ$sVZAIznP;s}wLWA6(L9FaM1-_?OWQC=0` zcM2BG-SYs4HEb4Bdg-nS?7?&`(V4|bv*M*kZv7%=YOghq*p;$pFL3bl=2LurU>oe_ z_bqx*<>THuUnqVuG;4<|Cz$S-^CeB@^Sh=T6nZOn67%$x^RmfqAR3pln!*iUC*$rZ z>cIuO27%NHn|78k2v1z_eZaWi8rK_iBL~XO3Ple z+*x|im%FrhIVvCMQ^60RRY9+KAubmoTIu`2ZpG{4jL6y~)?X1KOUC<${=-tejwqx9N+p7R6q`$v`E z1Avu{Q`g_t4fMAm<}Y6I8N~eY^dBIGC25?&7>ve%a*d|RPuCI&M>pu4(RY_25j!<#cjH*<~@5UYeiU0zx?2Fzc(d*0B*RM=0#{qVbDUj2#AhZC0+=@Hv&6o`+G; z61;UmNCx5!fTackPA<{E7eoIHG5Ma^A5M$cILK!yUH|E|nBr|o zKSRv+*ndC7{J4^T0x_fNn&zB5Bl0vvnB;VaXSLvs=NPjUsM+Jjh#l|Nx{qE><)K!Jb$axUPBr%a83$+M zbv-q{b21=%@60lrms5A<@RHjdGmKcv=UGLM$qNh4G24>1B3pTk`KU?3okX-MOSAWp zYs7-PL)0?MjEEMmg|(4!YHVN5Bys(c>el2_MO?zj2)D0i#r4%Ah%`AFc{oM)R-+t= zHkDV5!ZB9UdFzG8)=_%rFVmEI43YiM4F&p0(G-=^( z=}$(Ni_-}mar234ti2WtlH)D+J<=Z4nIELkzh7_nYj$CZ7eEHS$KLeL9&;1@*XokgUfGG%#6TqAa{j~Q7vfom$ z_X4>v1;ig11H>Xk2K*-D&7cWqz{n`G@{rHTOUi6q2M5F?L%`VV$`WD}2&z}o1N^0P zFakquCi*LmVH?d^?}Pn{ywKagD!#rf2Lr2A4A=*Z?c#i+gzuBI_GcI&nM6bdQ;z!CB97Fsh1n!N&Ji~CO{V3 z{l~~MO>*&dKezsbEOyfPV|4b%KcR}tEg!_i{sUD$9{aWm==V|O^Ho4!Q00$R{KCHS zGxy4wH*)CV?_fK{Q#OQkViygBI}=U6To{F=I?;UKDpCX#F~)G_Vs1D^O?9klxhnm! z<#o=6G?`6x)!=J1zc|9p9iK9M^YFa1XIIv`Ow+YvwG*zT{W4gg-XV|Eg}#Q?J9=~( z*@qBZRoO{Od@{e9Z>v^`0tvJk$=>Qg(&CJI)IPs(=GA#)r)q_?Ys5A)-0pPv#`IS2 zKm&6uBkirhO2_#ljrgHI!1Vow2fBezU{4&cix5Q({d`oRxu=dv3o3*%7n?No9x>WYagBT8JCrTFav9;4s58f0z1${3FUUL z)yIdOO?Dy%x6Am{@?~U$x9=#g=Qx|3meZ2vwI;pmY$TPD;u=Z~M>j3)K;#o4sOQ8h z)vWrr+xiWda89FCao`ssU>oYJDW*u+q&a?zh7Oa2)HkEx4(c<4 zdx>uK;Ysgc>hb7cYr%%L(Z}Y;`J^9ZH5$HtXD_BY-Wt{m`ukdV?AI#j6wTG|%d^`br_W)Aft^UFI!sKcdd7sqQNR1zKD5Gv7Y7|R$A%3(iAKJ`*Z6HS)E$2iUCtAySI=1QU48A` z1>X^SERwoTU~WXw`1~07@8|wjKSzeWn-cVd(S>sGQ|h*7^6kdhp3H3m&Jf-vU#LGh zT75QSC!ueT3rAii1>73zFfpi39j3x7ij8D4t6ui70?J38)jY2A*G`hA1D zG3g*b9&o41_NM$99iY=Fr;^nx5^PI#x9l~;iOKtqRgNwp@B5{al)~ zmN%Q3_{N|?7Z%h|6d1o+89bOKOTbuiM1TSZSaZbSd=w~(ex>w{Q!q&e5#@p95(-F`jVO!kqy8gA~qPL);oY|((vMr8&i!o#q5Dvl+o0}yDiYV-F0_A^5lbN=LWnMrR-8~rO{3nWmn?y?v_hEh z3ts!jM}-cPL%nS83||j&G`x&k)%1KRX8K}V%z=f50U5|!ewCkL^%Rk(fmeH%eIX)s z>RicxN2Hg!WhvC>%CwgEiMWro{{AD<=R4~NC+godHSv4Ya>A3ziDL93IW(e!qxj(w z_SM3PcR3N@*wjcNX%4a+Ua~XVx!J&noAgKR{6z7qgHeq*%J> z!Ddyo(!Sk@%UUOPR^Bl4$oU6l-CL96c|EDP+36gMm_^yiV9wVufhuDMoyr ziu;ia0{9so?-%kiWCV7A$BSaclWu1JC~z(7$92cp_Kz(6+OPXa0{7bMl8xOD%8YF) z6?h|jdEsy5Cj4K$%lE-TpWfkzAO)JGiBEkO)}1cfWSJn3XNw{I&}0%6pm)r=kC0%; zL2{7CM*qT%klqXeG4K&XfbwyDDX=AE!B&WD;Y1O(c@;+B!RSMiN&TDsl`IpCCAuZCfjx1vJ0c>mOENgPO}Y*B0s{#e2sMErAp$&? z{;t*d1Y(fK;p^Tf@_YBw++$PuIcb15A=6PO^_!x<_T#3e!t?31^33{zmCqQPUm;cl znTBiJ_D|DECe8lpj6jMI&@H3^@^=Ah^GeZ*uVN6{+q52Fm-@ozWdEiDw>>3&CC%_% zWO=b}r0N@J9IeH~zebjSB$j_X1_c!l|1{NWyW;+8t`++iPlnJB$a~iKNc{ejT%~}# zH_02-ANi*O$Ug;dM*&;<--IWCAqDlT{Bo|vuV0Uk9r;v;-!(vik;P{XQ0P~Isl;w% zJ6xxxm#9fHDam=#E8)aX@Z;^muB>xN+QY!&6?t^uS(5iW~>Yu@|5bg z_NA_$RfzmxkNGYb&hQYl^nOI*-h^(RhP%R9yNTrs+leMj5Lu1hU^L(lWZ`wRSCf0> zNjcW=g3pF~NP1Xd3nY03h`rtg;*#Tlm-|sdk^Cu%r*qk~QA#N0yV5=FOx{t~@YT>h zMJ?(4*Z|!?1^N@J{1~FDrUP#9JLbj?XN!)X_UoYUEhI$QFAY%WvkvH|4NyJmddE0$ zF4lBA_KNJU=@lj4(4drif}N6nYFQPjsF&04pT4&rPeN5Wc_t8Ag&gQi6jRdnhwIP_ zk?p^mNYJ zu|#`mvW9^)_M}vCXPwF!UuNf~7|qR0oJ3b_(K<4V>_jzXqsX{W=ednLjf|>r#LNDr z@d5L=Kz?T}$-$B3QJw9$d%doR8?@oeeU^v9CU(JOUOQfg!@4**!ywLv{m`#iAi*5z z8?y=__@!-EipM`@znDNyB=KaGov<^w@Cp;K4og1vk_E+gXE9|+P8gSPC0ubo^?=Rj#KcVJ-;WA%g@oz8jgH_W@M2qaT{EBX`A)xiWTHQQMs-vLjmxi+i_r&0i7d*fMLY7`d>*4NIfM%hjayZ;30tm z0u!@fsbH2N1L_iT(`^DDBzmJJ!29rTkud|v*c|?lNq!y|lz);Ik7Wya4{cN?+ua^6BzTdCn{Z?QTro7dOJ9qHN$GU;J*OOC9TuG%&5ZGQu zd#AmH!!P#CJ<<4DI%mW>t4CN`EA~vZTTn zPI7lAjmK10eb2+8=ldN4)4K)g&zN&5v{+9~v?C9Zjh%{fY*6NF#a^AYY`G_A`1n$H zX#a-2<8>)4y6Bl*0bknn+YjNv?1Xt^6ftonPVx8+v#zT zhNem>BY0`Ytae2CR8@i)G|w+}3iN3fx8>usi>|zV>#50hF;Z(BQMm3p z+Z4{akO`2v@3q^GeUQ|J%ZXZO#>AcyVG8#oR}z{O`Xtvi7yE` zC=@0_by>1v?|FxdJL`wr*pVcywD)(=9hNNEy~g8W3lIO|B5@95C>iAXUaj?~$Sia& zzFH_6?#d;xDA+ozKRhs@s%~l3b}%Dib|CHxZtY~jTXNd!cc^3uUDCcUC2}p6_j%55 zA#_g)w`V-rT^{b)!~0Td*NVy@Tq?}@0CXfBa9w6*p$)WXW^GAfO_AwqJn-U=7IA`5|cKzkIE4V*r2o#J`pNQ_0p6NP2?=~#{ zaHI!TOPk%_%KM_NDYm}B6#;YVZ?P-|SXRS-Bl+jkpTI%)#C;8!g87vSB_867F7lP2 z*oBAJfPalE!xP;%F}Tuc|1%qcJj}1s^M@MU#@I1F`_J#dVMCRbw0$=>=e-Xuhnga{ z9Q+PM(5gQ_IGulL#5pzh!=Qm8SrSOPUb*NS0*yFTvPi(G;+3`82=iPSsCW9oo_27R z+Nv+OzmYQ#krxLjx{}%o`pVum!94)L-yC`S(9?51bnx}r>kriIH^MBTPG8-{@WLDO zP7hwzfYof&gzCFHzr;!?7aS)O)}d(ZoK5BE$vw2hHJsjI7`iT&L-A)hWeKIGe3aOB1cYzHG%ZRJqORw7U z*DY?J$IVopZgM8j@#WN0W$x>@NNJ@pI6z(1=Cx5y%DdQIcQbcx4&qTYAM(BK7nTg8 z>czx!d{%a-zCVnIqP$SOkeJ?19#O}cplGt}$w3%tME91EL}@!nGDe3xYucMIsO&k{kc8(Qxx%cf_n4tu=c%COGA>m`A`_b&B((;m(X=R2*yJ@ zW4-R&gDmS9WlrxBlyurGR=u;xa69Vz>bbkzT4p%!x_7e-hJ!J0Yo{m-_ip)ELY5W& zvCw^L@mylr@ti>2t;l5;KHT8f443(H@#u=@H6MMRZ+Jey{CT-5J}uwr_u0h?ip_3M z;da1!G)*o|$w1={tFE0>^s)}?Q=?c%{=vo1Sobe$)xhD)+Zq^;dW`K!-Z$?PUAaE3 zJx(Ozz&BBPL#THX*utn;e%I$#6ZlcPqt%{lynJW*o$x4J<61wJ#A!~i$U(9KW1E+M zRwqtTPst8)s`kWtH{(uU@FMclO7E6)x9@U2Wi@!<`VPT={{SW#qxw2*bSG=a@A2ZJ z`S|q-&VSthgZqyivi@o@B!;jQ{qwQRf9Xo!4r~7MD&ON5h0!SRYNs&*TR$Qs!hDKo z?B?dWMROq=m0G#a3OxA-_u1yr;_b*~rEk&aKi*#{i!?Eh_NS_&sF%*@{^Fo@z@q9A-sp)V_ABF_|)&xQ~3)HhS=%_cz-1V$s1Q@g3QH44=W&<;tjKwKj4m=rpyj3 z9@V>A$jkuzKjfvV5?5 z=$}Yu?o7PDJI&2F>}uHzCQr9skmo*gq3*TmRuICVCLLeyZgHSIJ#L4e&`z1IBD!uL zS6w73G&;uNO}O2;0QDI)R@*Z~L~lkl^_ftu)3pJPB`boxcic&#D)H%@7QcGp$Cskq zdp~?!oPNp z=G-~e#Rw_QS%2n*bdL}HN@d^b4l0CX2__1^7IVrkiTcJCC%YxrlX#XEb9z=I@}T3C z4GT2C`1`AWdR3?Au{x$4db#&8)X%OOP>Ojyz1Ht)%yin27g4GxliPPo?ohHZZ6iZ+Qo)Q)P^789n?@M!gJADVv9M0bP1j)k(Cw(el^&RE-ecW?*6OSoPGPGm}&nwI`<=S5|pdy z`K7lfZ0um7`F;vVi;$ofWy&pcMVHLZ(K(UD^TSUi&x-hdMd9%pYUoI4K{1iG;!lW2 z_J{=2*PI+-gBao#%Gc7&V*<{SxGp$yj;HL;rqMTem&li%IG@&l|7mVYud*9FNd7x9G$FOWu1mJ&JAHg75r_^R758 zyxDJfBfN(WgVI!G?#x|P_nzAk-5pU?pM)?A60V!hRpS$(8` zt&#uh#=f0r(kf6O7ikvRyW_2LU_^OiW?sxUcUY({+>LbgoP?y@9hs{nS1$H~a*zU85k8*B&=xDNVNZS?yf7N?X*X?|;~*GmSKSckk3e>@V8=);R9O;Vr*OaC47Ga@zIO`SvV?YW?aJZ} zyir%6n_HH(U6Q^$*lOoB>cG&jEf9{;;q<_{_*yYaTZ41PZ1Np;+Y-debaH-$t6?KT#w>B(VFMR5 zq&oO2PZi$}!2(KYy|qO-jbzr6G^5d~avG~il}wZN6ttZRT1Kw%{k#<|n2sJ0vzww2 zzIuCL?U~X>G;NKybh=rNXjx%#H|+E4F&QN&#&4!rU-<(+CreV{#7?^v#RJrJu$9$A z3VyMZp4&E|&IMC=IZSw-s{$S((7d*bW%nBOp2f%|l-TF9lP>Mo@)H+OALc7=YIL(f z?~Svjy5gw%BvwK0H9Ymn6TIf!C9K=(AFN?B)7l*lbzgky;6IVFZ=cZ4e^Vp^;Rpi% zOzi&g!QZ&tZw~xnz4@12E%;|i7XCQMVF&BkxzA3zb{>R%WS6P*NG71@@dEyJLLH@! zI%VP`Uyy$?>-$@j_|QJ`Xl>ltUiPUVF47}wu+uCEJ{Enc-zhIs$;U1LJPK)crblE) zMttXMSbiAX72ldVvz=)oM}ZAU9@k6pV|Dt-pkyEQf9NQ@Nj?UAU~yFTK%W~#|I%nj z2o41xQ2Zka@o(helY}sSN>4Bt}Jp7rptOcb_*qIfHa8JxE4lk}!tvqk3U z;+yWV04h)sG9L>%;F}kn_9qVWy$0E(SN%{~-l|!HzSSWAux$q1>yH%7y^)LLelZw1 z3V#ItkE>a}HX3fVX>PP>n~WSqK)|1>fY>~2=feq3{^|%PbMp6Q{=+?%ZvH*D0DMU< z$X}8R)sbA-zeK&1!gt9ql#QG~t)@&DN(y(!lXFhLEiC za=qX)q9i#!=+*6+uoub5{3<;=usd_?6LHe8-R6ZP-oj-9wTbYnXfzSqcK63oJU>u3Q ziwSW|nm4Bzyms?TqG?}1p=U)Y^JA&x%@&?e*7krmAiVuNXJctbKB5(PZ0)@K>>}4| zF$(68*lSY`j)^hj+?SW;RK5}6Zr_ubQoKZM0Ku*w%&j{^!3w#lwxOcbhbhtBX>x@Y zNHtk3q5X@^mTHMVk%+l5*H<||jI@O_q3-J_ zDVS*F$x^JPVTz5KK||MGyu9`2)MWEh2Po&LV()bPA#+atmcj*UBC@2ASQ@kw0i~%u zY2vk5_2@oGeo+vXBr8q5hx(`+EGF>d>cijgN6_wceqx&2Q-$nq+kokvYcqwTPaMR4 zlg;_}$>kH7@U#b!H9)1W*=S`#dlTSJh?5-(pj+2=b= z>#F)iiLV720i&JfR>yc0Jb51b%fo%H z&s$s)z$J@`kcF`oPT&!*Q@$02(P~f8qn^*N_7$m7&OL70IqP4F%&aq(oykYhTdRCo zP7@4pvcsw}(_7I~o{gzZs8h@j(*^SJ{VSC!rK(^@3vq+tq4OGWYN_CFs;91Ryj?+W z03_0pJsd;0@t)*EV5kgyoyKs`UIhJmZ3r0d4;f`i=a{)bb+~ijb5$)s zK22Wm=sLtYoh_jl5~#J{#E8*=I9)9PQ&!DKx=UW{Uv)6$s>3mfXhfH^NK90}5CAq( zWZH=A98{Q_I#D3T&Bnj1a4>OYc9z2S!F#rzdWS2NJDuTBYG$X&rp_Rvj{33>fRDD*<+KNxd9ObC4nKo z(FM7^^3-BSws=zo!kxE=KT=KTac!hH zT9{$#c$*X-or?5d6!NJX{7@-0|9=ZvTK@xCx>k@O{6v<%Z2Lb>mbCvxvUCX(w(|nd zFnqGb^ZdF;)sI(7+6+9=Y%=;Xyg9ZsC}af0>Y7mR-Y@dTif(hGQYdQXY4tL0nW~Q{ zzXwx^!28)yZrUC4JKsP=S*b?59mntbnV8*`m^u7p+ybp6GoZ!}aN&)$F8fg&|MI(_Q;_qz)7?ZV!&D1nKUBj!TW)sV!=vyyx#)kd$_C@0T$b zp08P7mhj<)=SGR(H}SqO$oQ^dGXy|Rc|k2SaHhDW*GH3V{A5`4L(oxlHs&~fMh>n( zt5EAVZzwu_*{JHujWtu{)CJ3cGeWzxF)fs<;|>-3Cpyp__&!sq_SDH5v0~X@iWxFRy=vEFq>Ac=T)Msy0Cbb2ogC_tdzt( zLENh4T~NW*3ptHH8T_(tcWP#8=|T; zj2EsQ%s!>1R?|R#JAeUsmOXoZ3@ay5H1775RJhh!!=BWm$MZp;+!Ll+m1&28+6)Y(C00vC!~;CkEV$?L@llyTLWYcxU?2Q{xNE|N^*-=71S=KY0_RY5a+mDbdL zzVZV*s0s4V$r4|nTX}BN6M+uX{07{Lz?76VO!3YAQ?f*}^cApNkH2XO9o@M%di6DE zI}Pa7v8Idg&fm{Kc-gYPZrx2&SJSL652|6XbWGvK8+P#Zfy}X1YN%AQUtTB07>253 zL+qSxT61~z*eg8=3a`xzgtEj$UZZD)-Tc$5p|VS-*`Wi-Vn3W&nYm~uagyocmCbhN zZmZDi(xcp*ik0}4Vx){0>-DL{EW3G6~W1CpZ7m=z(&CB5I2ee}@Mi(n#J zpi-I@FL{ui$033=52L=fb|S4UC$J@3TPLWIh6FG$2ay8yF~-~D60~8^O>S}1W^p#d zXsGG#)swMdUm#3y>7=R}5zj)<*~t~l=*IE}KmB(yK6o}B1G|qxHL`D@v z_Ny^(IN;K5utAXgKF0Z@6~jfmVpvk>Ny}W#OJ0ex&m=w^X1t}36$$}}!E0eURbK3>Wu5lCbGqJcq3lXh{MPQV*XE)M zapv3gJBkDStx8&zCQsB;#9Q^v0TV&Bg?l2VN2#c?KA6vif#H%JploV}D+CK&sX zn4(8G)jKGGnU~bh7wBF=d3*urxgsWN(IMDfy_C4WUSop0(!})3_FnXc?atB^XaAs( z^S|AqEu13zuP;WAUuer$4rA;ef2(HUALEA|48j_Q^__WCNjRUAA2T zI}OUdbf;$@4Hx7n_axAN5#W)2qVlh+gb;MtM(?~VhknDw%KTWp+&Ny3d~~SMV=1(R z4tj-rl*z!)1&-D+{OBYDKUNVr_37*{jvh3kIOJIN3lkshmP2hUKXk6)o!|W>7vttn zkHqvJDnY+GLHtB|Y~EXd%SLzKSdZLVVK6Mj7Sy9U>>Ko^JdpNd~JO%klp7yTjj^%jU$=9>rQH!}B)M*XQz;xK@w zSHtz-FO{R(*Cw=Msqj-e`s@4qJGTe?r~CUmw+H;E`} zX?Vvv+v-svC-4pm)UOb3)&YZG+UDyIJga*|uDz^LguaB+c7|W{z`7fP#zJF)aft+y zw44@k?lwi3Fd#1I!Pn{vgrm?rNt(~;+s%^k?m-dx_1;KW0vi_`S`{6XVjLR{zj`=S z02W*ywxb5{4_Zrkt9mU`L@^H->=s8qmH0TwivjkYpxno0>7md+;|x)goP7?e1>e5$ z7vMh;nBTcV|EaSN0_bxN8?eYG_2nfBW>2r8_dXNG`a1%%^Bez)y!Y6jf*-~T1S&q= zE^wq^<%v$k*{fL8Ev!@yt+X7tDZJlaNiT2l^t_uAqF7P5ghFP zRxGPny`*a?oE_?MeqbBiBm9DdgU~sfJ7t|j4gE?@#W;D@`OPHA93UWoSNAtz8W1)I zMOWh&50Zi#Drvc5!c+dbE0zxyes{7soORa7)$z} zNXsnJKBXjCzLn~xk&G6rv1n+`ySf$P6-$Q6?m5B6OHVf@`Q8ErRWxRth?^_3ZFf(?lo~X}C5sE3reM$xa66Oh1j`HlNuxCP->&UB z?tlG&dMy24@PEM|NbUHy@9;si1L=N3&VPFBH!S?m$NgA~gWw?YOGwN=&3+#P27_rPOm?21AaBEe=;iISHt@CsD5213jDfI)L5N?!tE0U-B%Mgnseasfug&;m{9K% zJTuRiL36ylKdK(xl&;r3TQ1l;Y!Iqp{zq}-Kl>9aYY*Eo8*Dn z9dNE6IV|a9mAwMwNsPlL3vpzD*pyQK!a^aEoK<26lkA)D@(v01^FaOJz#-r-BWV*! z1kEWm9j)Is#v0|?N2{)&rpW)MZJcGmFNGc@BTK3#OR^@5^i#sCQjYOdwCjv}zE#-n zvb%o;4r9l{!ES2!Dht_|0tDy=nudt{I$UAzH}L4%@)ouPwpg|K@H{- zjjJn#bbOgMTI748Ru3;QM;w`3E)lTD2si!G-Si*Hp^=GYkG(eJ- zTc!_{5TzDZvZtOFpjyLD4-h_&Fikv6^CA^Wk?76!5tpqca*p0eCs1`zf$BiuiJU!z zU?cjqyc2jB6vtklK{zRX-(pwwL5`>1Df{gv-mdWM#u&6jXEF3zg3!(^dI2`pd+C;o zMhfreF2tNytrW9*z){6zF6qr>75y5m_|}daA=;iNBKAWFi6qnD8C^-hl!JRRKkr<@ zx_6PC$|1V7Xjg}rXvCeY)LW`Ihd0SPwjqJ@b}Xi|Zwe@0gb1M-2n~5d(qqPxOf% zZ5kPPAR+oGV*ugfMf&T4**%cVsE-5n9!q`<2O;pVtKPA*+~d$sZw3q>RT6t#jDyF< zl==vvAirBsC=S(u9k=oHI1%~Lye9DjqW2^Bv4PaT;7@A_{3*TIBjf!tJ7L)4Rp?7o z2zrFUd#rmbZzM+mynmE`kevK$#I_E^UVlJr@Rx`!(El8hqN54UB zZ`Qf^C)D<4;Mn-9q5a*F0lypC???7eEEAN+Qgik^H77*7u*N%_`HjGuxALH>u5^m3 zdjRdVQmC3ST1VOL(GDyQ@?gq2&ejWZ?JD}s%~XF8h7%QIiZ_jtge zAg&2Tqf~G9qa*6tbcJR@Ya-x;!4Jj?pEN6q8RDuD7pMtygHz9OD-Lc8lg{&u$H2>S zHKAClgiA+Onh+{IxkL~x6}pL;>qu^0zIt@Bul5pH3EJooijXxDgAS;xaBBk{f!(|3 z6TkF`B=%A*nC!`@VQhn@C3)lE;6>H*JroAQy>D1eT_qzRhwxp8?09if5|AqEBwe_O zBS)u#6_R+4ZX2_mkE^f93Zs*U@XEQH`U1fqNJ0|)Psr_9^I;)X{jD6hZg|aYY54US ztHb)vo*ku+MFL3r^7wTQoMjN}J97IwayvV6OHWzk_kWrCK@G7e%z)95?^tZtIMBfq zQ84xX4gRbtz5AdF>W2BpgVt)-FKcKA5FhJmK!#}hM*0Kc7RVp3*AGhj(dV_s(U{7U zl+Auq2|8f^^EeOIj_iQ#Qr90GKSHI=@6=a`32aCX*&#lu>U*W1inmjh zYmDedeM6wj!e{wb3?K$PhRb-B_?m3HzNbjiZG-plv|B;GV>vmzw3INPFk+@)<7v0} zjUl4;yd=EnW)fNH0>C#!fi}zA6RSV zJj^r^qayJu1TOykem@0fincTUfGVaVbZA3d^`-gm%k{2I{(GiYlwPIRV@VfPaQ?pW z;trc!Gc?r~FtraKrZ4Z4|7-Z!)#wG{3PUWIY5~lLNZJPs1em>;B9=u*IQcZNB(4LgvL0+wM4urbm#z zpJ2z=1UrIR^t0xF06%f$gNff|m<#xb-qGYE@tS{@_rU|7OYDRG&_~GtJmCK5!=w&P zgnZ`?d*EJvqU(>{1dbdj@11>+$&uYYj48;YV+Z_81u`Kyzy|uh+ON>cWuJYgxfz7( zuR&V=j)cG$IUZg8$%cr{?gF?^1$(#<|JkDGvVX?!+q-yWYW1N_JG$Ry;hU%M!f=+u zeB0qmMpcl%_Ga??whsOu)W1n}YY(*E*rNeL9Kl}mG{MXOF>J4~T`G5uacbWq1mpre0onCKE<22P3xO|lGgY7(#0@Ekz8!6V;(kXP~a3aL)pZXhQoW&~ax*Y8r* zrDs~WE~PjiGO)nwz0b9!Beo}22zO}QLs!CP;_PPi6)HqzLMQjze9qPBW{|o9BMs&@mu9b4{u{R6rjA7Xs@e(06pxjH zU_heiIG?J4NzLHFxlubVb&c@?##^#RO37r^Ep)+Gy+Zow+TffKq>pLR;}MQGDp3Hd zjQHF0*;9g^H};7w(pY&O2Q=sS z5foR3sYMFOPBeX^T1%=k8{*{qDJrY*eX}ohTE~5Zw7tKaZ@4YSD#j^ZY1jksP&LD} zi)Of54)nm+7k?+f@cFbmxJF zM+*@S7War2?C}f5px?usSbIl z;RWm0LP0T2%$n{U_B6CbMjH9+4vXURj=-mfel3Y*Dy%AdM6VJMpPk!{4FS8pKiHD+ zvW%md3#%2a2_FPQ)r!-cod~|3bgOMp13!EA!0ODt!sMb zD3DN!+&;x^(hStt*NZCO#hZ-T3NLp;?aY+iGF@$bCk*di)49w|&H|JsE#L~{vKH0yo+^~NHMKaYFL2y{ z6n>SQQQD{;;e8};Qc4r=^LAbClEjY)X$U#pCOc~Z9?pAY%2>4VZJbTcGfwJ2ba8rP zbVF(*94EMU+fRYKh&XvO#9Vazm8~IU0ikJ>5un;?*We;zgSYM!3FWcbIyRK-6LOXiV*obIXz_r&T)VNITUHnoqw*G2^P{{bQE}q= zxPE(9J!vwPYt%{MLR_LV3gw*aZ5I|JSs26WUM9?RbFks=`Be}TVo ztVE7OiR37sgs@L8q&(^<_qT9)WGX1=$S7bRrTRnDB0IEOadc;5zwaEuiz9gg!G{{t z(cAK&IB9WkD~LL(B6q5_^PZgec(r`$IbrzVc{>4uKEsB;h%bKngLCNUT0Y7t_o4hH zJ(9qUWtsGQ?m`X+1LcFY7{`AuKWQ3S4%jjls0W$_ z&g}P0g8g;dFav)ouN1s*0<9k<3U4+J@5n7b@)g@xf!6QaG+ti#D{TSaG9#=f>>)+$ zSYDg#T*mr3WAp4hOCCRd8ReDNHTrw`CVy-L{GS)z{bOnSZ!?}0cqP+0@?K%Tp2E26 zz>wnN_Klc(tbZpKva~mowJ&CQAJKC3-CPKlPPc{kL{{4M{)_-=Y)sfrNS?3Y&}6Oy z#v~zYArNi`>)b9=$urs0nah0CD-9t*_^h1t7tB3X$Bu$0Ai~YlEUus}uGBMARhqyx zv)1TZr!J1hUFE8O;%@N}`E_9}@ajKE-py}e%{1+*cQnvSX1`TfXwn8_bl~Ob=UkF3 zVH)18!Uzt7r|8YE`sE@%o_K-NH?#$v*F+>JC--#^$TT@$1jjE=+_Y8Q{gDf_8lX*& zfyr!nF?c`IWOqgjLSwD>XuWK3yv^kGMWzggsb>JZ$Ufz3N@j0o+ctQtiHnoL$`aj^ zLZ3XdIYCL$;OQ492GhyY>)Xq`s_5_xp9@GzVs#5p_U7ikhy?#BeOYy?nEiEfsM7?|J_iU5Q`x@c&>v;cfcxY$ zMd14vHp}esfxzG_ZPT=6F%T_TbUHIDE#ByOze`%QXqjeiwCEjwx#KU8RSfvqp<+5( z)ac0CndbhUoSBJcY1*sy0}YTaD!MvO5L?IJdEamU%kwl~&HI^zXg?$UJT}BL)6ybJ zNAqz){?AwRj=#}yVv(d%nt9V=MgxSkUtzye@j0WmUtu5eKJ>(5?#D>>1L|XBiN$Tl ziT4u;#|YwMr2BsREqwVP`3#+>RrlL2InRA+%Y3@m@GySHejLv5Up;`3nccjsIwV&YgC2sW0R8`MZ2W(~g z|AFY1NH+LcAlx6_eEs8rQsJeI;dV6gkK(Io1aCX$g*tk0Ljj@EW`1PIrLT&ip0R_8;O(CjDS0r%PQ%d~NV8+FDA4=CV@!sb-u7($5iw}Rbxw=Y z4v*ZTl|@vLi&dA8_C5gP10NrdHOrOBNDtw5e&0~Giz395y`D8yrk;yVf^{xOA6C(f za2+56YvvdH>cUMR0Yp*zHV?}?EjZOmhxTS>__vz@U9}c^+Lm>nE4~I_P>Pe}gJn92 zsoqrp-7%E6RjdYNeCs;L(fEkst(Qc@~E4o zezS0z9cfXNJVJ^?kLZg%Fmgm2`|E-{nxOXAhfM@{7*3Sfr=Pt17moc-X^1-XV!vFy z{D_+$zFr@fMGQO&p7x-IDvvzvVG)TP!4sAqBSf(yU?M-ur1(eK2#1a)dW!rP{yFL} zX8cPtM&Z+8wBEl3A1tT-n^o3FVaWSQkj@vf1>ipx3SSeOzP$$^Ipa1EXZ@M}FPij6 zI}@L2%=3#H&mLs}zK|dJ*sm3?^Pl>jz6K&!8rH7atY2kR+w?yNB8%>N7@)g*up#h2 ziMQMPd?nBPH|_Sh_4c47v^;dQKz=!9?{AWL00Vv1b=^OZI6C>Bi-qiP-&Wc1@{aDp z@Lm5E)C6T%Qhlc)yv8ra*Lj`c@e3pVDMQLqZf^S-6Q( zq9RUl^GA0Jo`D4MWhSHxLh&iFKOZG~N%v{LNizV&FV9=>Eay%T8ewbiYQ1!}7q8(0 z@!2xxJUQMM*tSh5xLml?gvPJc>@pU*X3K4af%P&paHyGGX(#mac6KqesV2P11?^?} z+9R={;d+&an5OR$%){nm;DQa|>Q>!#GfhT?LR>eQRp}=Os-ZbryPAOE`$rA@{R=V+Q zOR7y8Q$cidr$;R{zVfmY)~xzm-5DFhZRNx`2CkpFYp^_SS1q5_(jgR8epmOi%HD)@ zR{F8l9}#EW5vPu>6JFC2-z;-)R+Y4wFx( zK+3~*%x`RjTEU#)RVIiJ3S1;Tt5g75E2;^l_;uA8ytdMm-MN>zuwsapi9b}0_}kQt`Ft@^jr0rA9a^7SHV?k|6!YlbP)=G1Dj0GQ zEaSw7MeGaAfR&rRh)tkB0b7P$O0?%E2j>?$9cEp?uxSCcq3=j)!TJT8ky$|vK$w*@oVv<Lb0C9cGly71=92p*^A7*IP9f?}maC+<=vSHEF84 zkb7uu_aGKcK>*;JedYIOsV&8kIGwXfsAb%nQ2ZVYc)8MJ8p?KgALjTRPes=>GQpGH z#PKiW-k@#(JO;I|mZnVlAyq_r%d~CS>Gl@tEmjt%Jya$XnbdAX9XNvv+wPi(?;ze3 z#(Z@b>YqONnf?5|L%#E#U+(_HGBrhkC`92nfkGe! zLLfom=)MUi2^b;>5+^|j!+xp5co?pH@|VyjyNTh)vNeoc zMGnrB9_;Bzi5@NP_)-6zK}Wk4{&AZ=bbUTj{0RD~IVX-(FY>$8?4cC=@xLyMBS~D6 zM=dx(9A|`)BWIj^RD+MV@V{X6U{LUfejT#H#liOy;<$^$qXzj@sl&%Q`r(3u{EMXi zk{uaGN?~Qcu_K#Sf|Ky#5cQTW#dc@2_en52o$ArjlLUgB!h4*0 z=l|3nq-jEHx2f3H9!%|#q*5Pr1Nh1}s{H!R@+Dh#_JbbwE=PLyODmK7VFL5z&VL zg6;H>6eY@G+6yW^?G0CC%$tRdIpabmIYt)uJtf2hkBD>hI*$a_OE7nW@clHW5Qqs( zy*{BE17)Zm+(7*bx{g7a=&0YNmurfBUg%fT8|j1+X^F~F+oJgpx(disCYBR$zJ@j7 zGsMefburhJ>%D%2DM_|V?M`dkELm4%gCw=1o2m&5O7M*%jK1+qUNcR007yt1NoIqH zV8)ElpoO7!_V`psIU+;cMS7|O)J&Hsk*5=uQY$g4cvpZ9QLd4Ax!r+$oS)7@SCX!u zg-13L!HK58JF)-YCc@w4|rVMDU4&igE-9Ls(nVSYDck0GTSB!^i|wOfv(Dl%8Ot|PV>SIrPi5= z;i83l;cpUQXF+jJ@S150q_;}!w2kZ&F%VY0Llbr($^jT!-f1DN3r2V5Yc6x=3&D5t zI~uKX;^`!pr(_^`Ort=NaC;ZiPE+k!RG51Yhs4DKl3ruG>LR}hT`HSChRW_)aK8Sn zeaqZv>UX7g$HED4v~T^ob<3Tv&<&+k6S`urfYZbN^q5}4sdD*0b#4JaxCHEs=snrl z4q-QHpIy#p&gI1G?FQZ&6SN*FF^04pt`#}`ZL$Yiu$B*sM_udS>ZNl$ly7VmHgZH>FkNXQe z@^k)ME0oE}s&oFN@AMjVD3`)i!?@^@&pK1&Km=Dsa@sgIN>F~I-=P=j`}gXLco%bh zn_aC~?n6fk$&%Feh>}04l5F7x%Ah)$F$7?tfwe?kwA{T*A(ZRVXeOQCDu+VN6Lt}D zr^_-F8jC&HStm^Bt5~IX%pd&Lg0C+bFxHl{TRgl#uHnHa-ID-=JA)>|u*?_+=LXFp{KxdryXVxkpYe7Uw&|XN`!71;SFUv>09^-&h;+ znPlAFE}Gc(%_yhqq;|8VWe-47&%EE7cm#(Qxy**}_WQc6by0V3T!gm|f3guNx_Nt~ zc6qN-emk;%4y|z`4K(KGt!gJJx$iHn_MCK_GZ5v*PO@UC{JaxiX30(0lvT z)-!mHp-u{d)Q|p0TF>GC$6C+-2d?xtTF>FXY&}0xO6ievD$t|;?l2Mkw7?PYQPG!W z2Zh;r%~66^?o8>|eRkBLlMUyeybpOSdmn0t#gX?Rih~K^@R5Ilh{Hf{Ct3T8ocxF% z{#G*)I+T5Oibs&2uDp+TLy;b&DNT;I#K#$;fR5@#GWmG4Cr4@ugpT|Z^;um%q!~Y| zKp^@dkDner82c9n|Npo3T>iQB{O~sg|3A}uF8`y}^H)ec)9_Spw<1hJ(`m3<*^+SW zN3@p%^vl`q&|{OHueW|dNG?-jhj~m%bXH_@u3uFa6DgDRVkm_tkS(Q=RPA>#^>=!% z8x|0rE*|%^ytLM}DqMZ?ZfEL7O*&XT4f-s+r~H|jAl8D2vtW(wU3%VDwQK3N67DMv z0M!>a?6al4$-)Uq9@5K%=J(bWgFn1N!Ni9VeT(dSp$HJprc-$}+O%^xl5=r6dB1?` z<5HQpTWG@jUEiQr>yMm$sVu?XTG}s#yD8n7rmh-k$;Y%^gq>leg*=EhH2@( zQ+cJo>fsvY7gW_I*7*;u=bB|Sku{XLQLlhL#N)|>i&JxXqLC16BuqR`ul{D=&>rtd z!9%w3W$0bGlkc0;b*HLs6YxZfa?qGG3rz2&mQT@k-xxgE;-*W7sBFJIG+h(gEu6lzcL4s@WS&WoVTv7!7#KmD*K)!H&tjjPrw;a!r3H zAak2u*KIj%2Axl?-rKDSFiv6cxG>HCL_C-tpTjrX*bgSbAoMBW+PD8);q{+){a)hr ztKEJm_rg(xBnXruNC-h790h;5;*t~}=OFYzr9J9Svcm%b%a2sTj(9uV?bwv2$Lh=e z8vFH%%b{Tc9T0_l?2f?fsJA+b&!MAZ>=2wIj?4mzA6Gbbz>n6q{ZjC6^;VE0yO9>3 zTmX6;pL|N*Q{)&Mh8z$_eQLc({Ht@s4tM0I)eiYA!yIXdkH*S@)#RZEQ=$iqAGSq* z?Y#GsTag@crW!R%Ic)zHXMa{+OpY%!X8vC8U)_Na^w_r&O^10`Sa?^{;!997FW1=k*;+1y*FI&1TaOkKTKS|E{tf` z1L%G#?>a{Mv$w+zZhzY(Z$}S*kFvvbeG=;RZFX<11N8mJDPHE&YkZ(?LZ8H2fxVT! zB;SN)-pXgurK}>O5Ouj}XIZ7vOjx6)pz!;<$IxB_d=9rf?Ld__ zWjgpAJc!IK2)k~Z4J4i6(|X0;xum{cSNfH~mlNQ`LcN3IiL1011wSi)ScFwX_jWAuEhUEaOkeI_r;O6G@31K^4e4c%R-QsddRGw@3ZCN4e0$Nk-P1uGPif zkW{!Yn4c>PDyPz{mc05PRllvPk`$~4D4z3o_$Xb5_z4jnos}%=B~l`Tu-j8R_x((W z!IsMIZ;kVQD(SftEz|QuSG5%}iXk4d)0-ROR3B=MslGIq%d}ZkOH7H8Gc z`2E@c1#XGre{d_J@A>AYE#HWjo0zK{D&9nnzg}k5SF3Ug-!8K~Zl^0o3|Gh?V)6>S z<8n)&?M=KPx*JdR4d*ZQYkSK&gV8C3Qp+P!cHXv+>OR#$GOuL@^Q5^k_4SP1On~cz zKDX0aF1JV-a%sdRQ4Np@X>oVY;NCK-9 z6gKug)OG@=Imq059zj_4c}D%Q3?Z0I_6Yp-Acd%Txl8M7k^fR*@i83MefJvAB2huD zca7J4n$TA*iHYHH6APP@@5OYH*auJHCp+nMHC-}9MDEOaDs|IV)HiVHv&ej9F>H<0 z;O30gvv|ZH>$$qwgULz-UgUopimd7BCwVh`PftVtB_85m-?ytfaPOe<6D<9M!@fb( zFAw>#BAEcuBm0fRIF3^=1`^0&NdzJU4&oSw;xGylBmsjUvQHJ*FY)VRJ%pu)yP1^NzsmO=`ZnXkBD~YD3YUJi^7jG;UnIoK8hsC;g$y`$0Gi| zk@&b6W#Eyi-s3?0cRBGR4#WS2mq(d#3Ln)2DRu;a*cVqL_#+~Q9clG_&mBICPhfYn zd%?#)d*rx}8HGN+e#EEGdVf(KV>&?jFY!x=j+`&pe8VrV5b9EWfrIG1ulk%pI-@?Z_z|gm9V^{G1w9_AJ z^Ofc>lD2)X9yqMfmpx=bbk08T4FrDPsPWZLZP$warpDHwlxIOkS%t}!E(nX<_~gc$%;*Di zk?&J1cpEkIUFW!_8WLmXCl-`Bm4>i7=tL`Nd9LU{$nE|gs0rYx5 zdt`ezb!VU}DcSFsc+ra3<5q^A>n)HHgsO0hOT&31H~f^v8kQOR^!w6<{pSMUWLQo! zp3O2Wp=gEHL5Z6~(W8u!F?JJem1w6B+yHO#pfRE~NT~qe5Pl3*}22gXxUagsw z;g021>%Ik0V6;>1JWp!=l=WwMb(Y0O0*rf{ll67~dYpEKYed49W*H@eU-^{&Pm!oF0HF(dj z@MZU+&k^(BI}jiS0b(BR7zGFrVi3cx|3GE?waZl=&*|=3xw0~mcz8%j5j!Gw>;TZg z#~m(&L18u5mh*|vGsjZ!{c0A-4O zI(%&&i@jCpAzfgr9K(A>G6gEiZW`>EqYRh)`FNSlL=~^c!#gV_9a#5e^{o*o@;F@L z%N5ETLw&$`xiZ9!f8;9WhFto-o_&|w18y=x1)9=Mye*=a=SoVo-(C|!(EZtL1-)A285e1#eIW3&IWF;@fe4MwBbjsqJ`9iVz(lGi6Z0G9TIr-+y zf4zh2*Q83|>kh6bo_iEbl)QfF&5)u5#GuH#Ft_SA2cL1kr}D&Bgopant?fl0&Bb** z-F!;57M@LEPI*n2-iJ-cHM@J&Ws%`6WoYaAXuR|@pxTkNWi7cdmS;%=yI>Hz!NbOO z`)k@7sSTp+*f$X8iE4n7{4k`9yhc01X! zKyUp*ZVY?IMzf^5a8TpwL=Ly{rqov&IhT$Gy!_!TDy^Zz)OD74;^x`Kn@C2xhqXn! zcS|V+km?P|T{+)~C-K~)-g*<$^X0~+riBB+`969`br)WBb1yZM&PE&IE^!7nXzRTD zl8tYm3t{EsF;^hE5K9ZC%X7K#aO+;?HxMH}j%?^4WlKiitn1pawW|qBc(d{DrL*c5 zY)O88WCE@Cfm)!IDOXt$_A-MJfHDOPNUdr5AMbd zXiU&KJG92d06W5>_B42I_E*>>Rc zy)U1#fuLK4RCCmW)5t42;00p@DK2}2k&uN$WJ26Pf^*_(zYAch9tdy6skN^B-WaGe zM3Zh;V@e$xsw_2uFam8sU6g9JMrpV;g!G`4NQ2w{Zjs@mZgjU$Wo0wxNtTi=(0%To zqblT|p{nnn_FYtke1)n|8iH{GB54e#XnaRiB!&^66ac-$to`^7w;+U|5R63d?=*o$ zA4Ssx!ej^TIC9wOkr>!9)E?u1nO+=6#}5av`gT?Tq7U*W@gYA_@$r==N2VIbkC>dq zkLD`~`AIA;gO79oLqNR0bdLX+P(Px?_fS>-k&ufIJa*{uM@QEelpb8l^rMq=h~wgSjGNL>uLiKu4rR$Wc8y4{HFg z_yp2x10?vx2%>-!&fJP)Syd{?_>{I&cOPn}^jqOBx+{5y@5Wl`C$7NqCGr!3Njwy@ zq5%YS@`b?|!-9n0d*n^<8|I}(=eGvl?|KJ5)pFin#YYO^gzm?S+UTTkX$q1Q^oB4E z7(?Q*jEihzSW7#5W^)Z-0tCAptDLK;8^eI(d2W6w5e{SIh#*1`@{%6;wxAcNbUwunPCi; zH^HGo@)WOPTpNwM6(6Hv52B?)$5a^K#5^m7Y2qX)H=*@my2_4zZWx*sz*}?73%cXU zxw;$1noG~B8_K>$qDi+i|2J~Tt}uktw0k%rkpJS9-w_iKDnRW2A>G>+dqiq}6#b zV%8gRg%{T555r-%5yrQXXH+3W8A@we!o zWO2P+i_0Y!pE3`CE;t6Y^Jr=%AYHM2`h>4f!CPF!$ibMQ2#H=Zxmc>{*WwbsbCOo( z{+OR|wZAH&3nW9dS9PYz-xOA*(&TB~l>Pj}saPA8f|?_{(?V_k!75Brt@Hg0MZ|!1}%-iC3@OGlcS(BOiEy-D2x?BZk zL8bzttFK4U#8#Dfy;ayCDw>?RsPi^BkuMuZ040fIC+aD4uMP1FeFxmD$l5biHqQtH zJgY~{4GPOM`Yf_bMoNwp^}?X3kCf!^y^dC6I9Ph-H5}T4>OV(S=s!bM-#_iUs0#fG zRqcQYq9KxiVG`Qm)RCGZPmqCU#E5c(rc9^ykW^kYhXo4-jNs4Gs7B+?GABI;ASp^utMM*fIG9~IwE8Y}zs zz9jjFcA4#0{vN8L4gvc^{XRPshW4lKS3dv|e*C;|CZ~>U8o7hMv~A@ibY_R&q)t5%TP~-#js((rhU{z|C$(3!2@swt*)`@> zeYT`f1XwX~pg1@%(E0vyW!QkiQX=?+R0DS~Asrcxbih@q3 z=RNXKn`}gQ>Tj*8F{p%vYv4GYCDhLt&6?};0t1 zu}4UN&m_nfB9{6DzN^=^j0k>29hYl*`K4||>#<0QY8>Bwye@Hi-ew?Mr)7TwbTh=3S9_GAbgpiE z)n{{!zdSU0apz#e*p01ts6`kNC}yrTFj%irP4R}k`)O>d|^)y9(3tbF!lzI zv$IX40ZYH3+90!&yohr`U@VA`v4NU55Li<^fl0-G{SCFDKSWhaksEKNdNGgNdYPlp zw)782C4^7R+k320 zX^&{P0LrDgC7@tEwBCJJeLbS#%Y8Bh3Zo5SzcSn=k!RD2%KbH8_&kwBmUdn$==mEv z4Xp$S4qL44)k~Dk8c$4uOF>7ecCash=Y`<;@qNiyITEv!d`gF^}McXZkTfDD%`0&%^5(sx- zIUPw-%<==*9bORu! zI!$8W#3NbD;M!+b*Pi0wM4UMsdX?b*h*DrHPo3K3c`0M5AXs_-*s-#(%uJ92sKVKk z8?_jIA9GAkQEcv8PSMrQo*8>Cm5%1-lH?lhA?o6r^6%_uEiX=Qjtze2yf+nLlOSI#v^0obcGCE!(x4TiB4P9w5S0oYyl|Ce1 zEQ+Dtpu7Xxl2K4&1@g?SWi+VLSor{&w{|F7Pg%TRFB# zqckY*kfVQcFbl27ty>mXe(=@_4#2R2{<^$!c`wgdKmNe%$NDV&LE^r^p34{A#h)IP z+T`F|&hz}=>3%HPkNtP@Y`zv-{dJ8usZe z-ht1Kj1GyU=*TD?L$5!o&O0Q_pbzeX4v`}oJ(L;o^hY%R4*J>w;SQgU#1--BvO$kd zVk$XkH~X2#1?ZzOXMe)Jw>&zkj`*jm2F5<)9+9Ioh|!-f{AekTK7%2TDM|Z{;D5?= zsSlx!miQTc8E0Hg^fACga1Sxa6W8NCWPPh;kYj7$tI?0Hv+=IVs$aMzg{qpDx{aKJ z`e@uO53hcOgRVOcLV=H>`|%|2^Q0+2=ux!}8G)a1(8xz#+8Ku`#F=FiRD+YoeMo%G z|I&VAZa+~uZFSZ^RL-N#hWV-W<~|>d!oM7=*!pX(&EMYkuXhdnlWqUJ>w{tg{56gZ z7vk&v?Nk(!JR0e-*&BFyW~ys3Kuf@m5xXLaM^9J*nQQz|Hq@uf$ff05UrG15f6I=4 z-t^POfmya=n76TL{0$SwEJ=X4lwH;H{CBGQP=S{e{eH#5S-oL~S`Q$)&bRy8Acers zahakcb7ieu0nPZzV>~T(0DrF-=E@|>9yO;ZgER!GXF;CaTdq0#=InaS`-znKn?{f< zzOAj#bZ&0-C)_P4s%C(ALCtrk@1fQGHQ~r9sXH&RhZB6enddk5B#GOEgw30w^;>Yw z*T?H}w0z6r#%VJVOh8cSyG@l*Q|Q~f@uWJ)n6mhOVy{c`l=9+2&}KED!}Zou(_I4m*>uBiGF^Vf#{pQ@)@SI2H?F@<+IW8xHTd2^M7>2V{09up_2s&i zev<&h!#kNsVLqd%q6*(ohh8%7ohNRkqU8CP` zMF$m&XKcif3%2tj_- zGJfY2$q(Oi_kt+=srY4QPDhy77{RD$wv(`R!0Xefw2!we1`W$F<8 zOFn*fKL|lbbLZ~V(&Up6pbm$-J1G=8nmfPa6u(q(K1CxeIfVUoF9>}(jW`NOaQqXa zb9b%rQM)-ZDf{Y2O^Wz*vEoO?DuzG(8}M|(KTeSlBCtU7 z=hc-><)q09JCGcsu=o4^nchFWyUk~|FP;VXHxBXeEWp2Uh=*qZjts#+b%@8Vfq&x= zk6i=*%pt0C`VlKhUci^Xs>HH)r@tEpBi*%1?Jn|0#0|Ep_GsI@>T;*XVTnF zJMiq0We$@DU|P)0^8*9kV@K+YX4+dG6ubG$P6GIrm)M=e6}loF7TyIX5;ToaxGW(w z(dr+?S8phQnYDI@Sr4XS>P`{_rWq^?bs?L&R~X8zsejFKshu}mSc4GHcv%kJzTuXI zYjwR20J#cjI5VK4dYn~pMw}BfMa_X(_@%d`0W(o zkh}q+3#+Jcg-7SGBlAzJ>8~Y#{#AJKPZs)}75(iZzqX(lLZc+MTS^GR2%6k2=qJh` zX&gck2tn}up>O7NGwiTLRCE-saqJ+qY@ zM{u*BpQ0b_0Q9(InjIE4&yV@2_$T9=e8LOtlkP>xgT%j^R6P1jW{ZEs^FNI$s!voA z{bE3wtzYn0V!om?sa&i@G+F}xW+NF}{BK1S%q;$5jnZFRqpy{X#3QHsCE>d<*oU!S zF}tz+LcafEP@P|nsh6*nja>UT(`xv6`SsQ0xKV$Vo*ryo{OIgGj^}*T@6LDy#0a!V z9FzT$o`%dWL~8CBx*_rD5F>ICpMOpaC+i`hDE+>Xng0o9QXlcf^IiEs&S}dvOG%N@1;hYwX^1v1Ry7UqNE9m@^V*e7OL|YD z05QRYCB_?^YnB8{H>lbciA%Ep@Iq#%G{3L7#c2dNh>)hE{xCp2GUOzn!V z(w4wq&07{W* z%LD{T!N%y{qREt(d>d~fSagv7_7L^JKujH6ar0+=jCG=tK0to5& zY);&!Y7VGoidM*ERgQgBR~XC_Zcg3m*%4XMFa`hOkW58jmqm7LVWnbucVGb3U-Tvt z-aIL=Nlr-0P~7-4>%u41F*E;e-t1R_JL_X6K?jP7tBjt?RlzO#A)Aq%0o`?vnKUTQ zT_vyTnk%Ktqb*}MCeV~i0yNK{{crZJ(;YOE)v7H5?0LjB3>#w8?7Rll{%`bDf7{#q zn<(O+EcC~|?>EuIr)Y^`yWfLQX!nB%4U@zkN1(?L6$(QM49310JnX=K$KMflu)!ky zAZ8tM-r3QpwPSH8J$w~S9N9H|4+y^9Fin1Xl6MzG(T9`SgO1(z5$T5$MjX;JyQe}w zn&Bz^nYB$Flr!`gBl;cRw>!J&)4#U6-Tc!neGuuXgAlfV&(Wj9JNopy9V1@Qqj-8S z#-gLM+p7s+;kwM=jt@8 z$rF^ozgxpPd;#!lXE4yC)ZLn5Ny|xlh$`=CT~IcZMFsQu9!NjkJAb?`5yQ-(AuRx- zAQaWiC;ri!SG(oT_r_07mZUvbNhaS-DZxe&r4<-rE80XhcM{dXXl|&t_FyxffF~o( zx);WCV`-C&8@tDFt>`)~^k!N<Pm#WBLxg=;{Sc4 z`BO{lPj(9X7gqBht@Jyy`PC}Fv6~nU;}C@76it#S36Ug8qr2TarYk@&LBJS-emm(x zefoToV^Y(hL7E@w`WQQs{72W(7hwnVL)tjzHGVs0NDq5^jAcxZ-2ZNx_EYyb;mEjr z1R;)02lW$2cK`M0-u+T)_+HF_f652sho+l7lc6?+%e4 zn@B&j?Yb7Cg$pN-wHJ$nr5so~%Ce@|S^z(so=b`W5#_Kk!vAh~{OqQGrtQM07>to!eC9{Xp2G2s#Y4PL)FzS{apP%i#}p$_*@nql%aUcKU$#H4dWCV(*j)lcX7L%V z#IYCo(R&6uqZ&Y!R*ps(6YC=q9Y`QA3-b&1&W3&Uk=fjohA8DyukHp;wwN> z1m!uUDO+?-0XP>vW!xQad=JrdDWTIDez46tU=iUbduw0lA!1LJ3K@b*0#n~`UcyJHb zHU?E2Ye45obUE00uZB)eLF3i^LS5R|rF_WrngXDeO{(PKbdzd&b+jx!N(Zw0Re-p4 zf{m<&OUZaKtEe?l#0Y_KdUmnZ_C$rowwD08@KWHHgf+Q_l_yh!%H6@=?WvMS@$O67 z%o;1XvElVa-jiJR@XO1OaoLE&NQ=Z*1PoQ+WcPTLuMe4bIsbgUV5R@!B}6zYnOAL* zbT`u6Y%g|5lu=PGwr{h|>hQvHvuO=T&iaMp`{bTpRkgEt&bZ6a zLwV~s2UgwEC50xx92htSb^4avQnatu^E^6a*!gq%CU}(!M{HCs7{!id<~m@BlpY+v zFO{=@B(6>*dtiQUfV;wZVy{!&Oxvl|yof?Wag9*#)@5WDR^%f@ycxNf#@mfTLh!Fo z_|#RM(|<56=7$3-m3f&&WBF`rZ30PtWMb2gs!2p0K!^hS4r4RY9PYXNpk%|41{5?9i$Rj1a?>zpf*B@eJ)DfcNpZQn_`O$hs57>#t zM{K;qQRtXk`lqlBIba+0i~Oo#D?PrBV-9{=nXfj_&)Kf6WXTle@khI^R+Ay^i4@4O+JHCaQ2 z4KmwQe)Jll(GtoqNxax7WfMxF+$@wb+#bmjQ9%R$BwI7(1KoyJ17jBCn=)%Ehl&bQ zzzR>m@YZNz9}1Uu+g^3yDal0oqL+u34<`d9+RH|u>mxXbWL7h z7RL&3gch8=2*GV$>zZ%hmz-Nm0*S!xvQWwWdF68;OmXRaeLd_~yWXJyE%f(u+dnM^ zlIltMiv26BUe;3a&oVhG`>UKCVyidq?1Xx36CnV0j*qnS=0ZGGx#D;x!=zuA>N3*) z%7GN&qI^TpLX#<#S6a~Ys=Zr6zh7@!_O9d%yly9GQqWF2O~iCFuKK%u8jzHgY00n4 zZ9(F9QF>>rIu~Bg8fnY)ZIZoj+z8RHFe(7+x|>1*ggHxAXZFI9LO{}^USjox4tJw; zI*)lE?X!9;H5KyQ)n_4QdR@cC=^|G;0~4L+&ZTqB9=t!-qR98R%}gk->-q9BDeT!Y zp^*0A`Et%6I3l1G=9=haszuAsL=@+M@Qm-sjb_mNZ5Yqu^xRb9TF;qbUf6)bg2Wqo zQi+st6B51YL`>CiFAeUO*J+Kq@&zRQ;#;G9ZR5c>U0K!0{86;wOp%dfyMmjOzFHIX z_^+Dbe}Q_yf%PVW2AK*ax;IZ15;2lh8IamzRY&97N^QR?2Lr#U2Y&+?esCevFR&Bw zBY~R}vaYtnJB+NUt@^HkS+H-Xps_)Y+yz1O9ikr0Xw#TUgsOsH+;&o!>f}qCn{)17>O(f;vE;7j@a#L)mT1tOf_c2_k zDyF6fBDLezMu4!C)7zfq=mzr5wz=?q;4nDLgj;SB&`Ej+Ni~w8Y@m(cU;F-XpNeHF zo-cm(2J;mH=c%x-^1eai5v0aazr^=dB9mw?OJQE#C+IwuBw>>0@DhaB>@W%ZWSg#% ze23c&mjc93@lxbU*PYRpR-6aVXWTlVQ03RbU_>##JYPr%u`q7Zq@gM6n~MqM!QS4k z*CdY&s2&e`0v&nE*qaqfwD6RfOu+-qMlp7Gj7R&ifzi(ed`MqUgU zda*~aS!(qyldc!-gyk#RuPV9Z`3OC(P%cj@Geq12M@Uno=&bgJ7C9{lq&%>-1|ao} zh%rXkomIjJKAb5<$#2g)McEHLfwY%8nU7weifo02-4}4rYr7?+bd5qYUqu$sTwP!v zUD^@|dD&spUj~MbwLkt*X#HbYXBXKIpXZv6W&faM`A4o5 zKk!;6Wle$iX>zP>-{Z;%plI)K^A*uPl<02OBw| z4*-kgN0U|*9ejZ7BSwUN)cL88%Vr!O?5Mbq*pGB_lxL{Vkr+OX5a|IY6ZGH) zB=HVt{}d;p2PJ^|6(t~tNAB=gh zFK?m$SOo4+fc$CHJJcO4U9HY6mWzB7|5c-v!Y{59U7Wk?YJyXn*8aaE@%v(8`c9f* zxmL{Z3r>_>*EU`GXLZ)Ug%!W_iTw#y{G;0h{>pv+(QN{M86+ANxenwKo2JtKyRWwq#>!T zcT<7#NKYb4FB-@vB03L|Du5IueJh>5P9~_!Z%Cg#NoM5RbbY4kBLGHObb`i?b3(mP z!99pNro3G@kUyP8L3|@P3+k|LnoA+H=DjdiEO6W%e5ofKjOFbF2ptr>-HWb8Q5z1$ z8qz}%_M+3EcW!^P5`?X4CF8Zh_9083}aT)IqZWlAd0t*3_dU?W@b#Mh9Eu zv{RwJNcFLeW+uCB31YPS##HF?xLxMcCR<^zA}AU^ast>_s`EQhhdtlroWcjNCoc@j zK44?MnEC*r5ZZxbsy8$2Ya2I7)nMg zvReDw7R_Gg7ZJBzix!*icAG5mebm$egyR!U?w>|tuJjdR-ka;DOf4gP9b8(_(x%XS z+{sODp~N;bYRwi-9?vJkrJ0vw^0eHxE|z70!_vO1+`*G?R##FmLZfXwUYd-hQ^y-q zn{Z38EMdbtK(OjFJB$RFU2`g2{9<)89uV(z1y6N3jbZLu4}K3X3Y(KN z=#8EQ+6e2K6K?|Gbf+t*f+5>dG4fE|7RPpjk$J*Rux{r}tk2abZckPtWaK1h#w=O! z(v14_oD2IzV;TvrLBtk?O3zF&HMb*<+`y1;IBeuQLA%|1Uocy|xgp$N!IRi%lG`~?IzZ^hj=H@&ulL+ojs!Lr`aEOy!i;W z46t%C)%;5-SeYZLbb+lA853G7TSAJDP6~z$O&2z?D$WFIuZi zk>jhJ8ddT&R_FvLQaRm<_GX-`;G~wu1S6sJb}hWF1QEM021rO^nqPpbTDYh{+KYzM zH#1&>cdI;z;= z(lm*a2#jLiB+^6&fBldsqCY~B`GMr}^gwIyp|A8Kg&x$Jvo`8;-7(H z;NPId<2HeRfEIsqo51((^Jkv_cWC}mFPPCQub+SfrUY!6Z-)w_9c=W==pj%RZb?L@ ztrn<3j>b>v!A*?gkV3ALHFUzt%eK99r)=9h@WeFm8s!)&%sdTkHX*7EW}a6R}&;vQ~SR-oF<`zTAW2 zr9Wcx6^`2Ki4o+&epKB5I@R$Dr_d_z?QT$i{fqPK-wylvv#iR0{b1r>8SH<&$j_Gg z51#egnZqQ7lQaU+`#%VWNCY7W3L|#FN*xjN(V&EUrmcLt_H*!ju%kMILPuRE!Vbn^mLH-kUuGIdAETM3hs4SrT_2Rh z_;@IazGI=`PrWGqRH63$py`nxfbvg$DLa~kQS8vT+x^C&DU%?Fbx9tl8Qq~)5hgmS~84qmr$SbZGw9q-ngDFSoP;Vg!> zp@?Xo65G5z6EC$R^KFCo&F>rUm;9m7fBhzh&Nj zL!7u}L1)SD7fU@0lYcg7LuSzPX0-6*^S%JSMPFoex8sL;La1Pw?lp^rIR>7P2x}p0 z&0s3jZdcawuI|{}0UX9t`#y24Fd|CC$Z{#Xg1a;)sRCE<_R>LNe^YwTG?d6y*l0_q zwDhbz&$>J%D~?gZ^bZD5Y8Z(?qIg(`0>8{%ThGF}&lK zCwyi5{?>^<+q*wL={JxRMQDmbU zEA${CW*^ba6#X&#OlQaFqgK3s$LUXz`rA@fhuqbdu~*SCqa*zY8SIc2$A6@-gA_=7 zWJM1(h3um$l^p1Fw|dBT2eGFIlYGA}9Un@d=?8pL@gZ`x1K-{DQ6C2RZjQ;1GARxn zU%S=bFF<~*?0&KRL?r)d{QGW+Vfui@JGzdtzbjQ`obST<&g}mjr&@UnK7M4r)$7f% z%C{(r)*kl%T*s9y&#dFxTvK0zR4bX~pN+j8R;Ptl+W>0JPbAIf6G6BJs)S(drn%I!#>6jUeK-V6*wyzaytjl z+^ZD&IZX}#W<_$Iwo{`i?zsF}E5dY{hImr{UX46> zqWMhTJHUc!>?UjX@_eP5^ogvhQo`rOVJ-5*vaToAL3^`%2rzD-hAE4$#^_; zvjlAD#P-;rr)>6wd_{`dCu=1uWVY=^AjPO*G11FASPI-44Owq{PkrZ|(?v#cr$1kT zcaY=NI#lOUL-bR!VabD`kQTRy>)q}b@Ubml0Ai@L2^=E{~)DS$gX zXmF;2JQ&E?yq)dfB-=BF5++!1O`iuPdDV>2%&bk4?Fs@PQ(L-g0!^x>2cZI_;^ulm ze!fAN>I+xsmZ#SJExw+_Zk}x;Qf}HF-aKt`s%ITY&kD~H62Ea>qrW488Ckejd8L=Gk_$)Uv?sL9oC-c7=H zES5dbqL8NR5m%;SxlEHVC5%Pb#F>axjXZ7QoNN$XpI^%v;`QeZ*MRck_L;3iUkQNz ztwHR+Wf(d}IBU0=eZHqooIqnr8doiKt^M8X;$KNsG061bu1NP7DN_u>z{FZbg)>*D z>bI^+kK3bz34Hf;7l#q5_qD`92UgUvo<)FomP8YbMy+M%yG9ph<81fF{*f3+mZ~x* zyRvzE)ysq|Z)~VyTL6K>wIXK~T&QUtfvfpeN#zv{M0dXz!>Cg_e{(aXE{G(JD_d3J z`&rTr2*Vx9fty)?AqF~Ezf_9iQ71f`pnxCfJ}h z??h&UW80z_-0X-7vIKinYBra` z^|l4{pX%(pqJ zw&|f0m48nRbO%HSjG~Vu;i2X6i7OG}h*4?yLlDG|LUH;T_qHG0qs90$LY|Bc2zJQ0 zCH{qi(^l(19m*wBv1=%dT!PZ3slM3fNmO@y^UA@v6cOZ%G$>p3ewt8K2rZxNOw zx@CN+t7B|ufST{5{3Dc=!0M*12g(8tnDv{36|4Q7T>;%n6%9B?dO^&?K=2F&7MGOD!&#OWZePZ0J_XO4nS;x+Q6KABueF&0Hg18=gl3;yccJET(g=ce!W z`P?NF1#9T!m;!JL?5kFuSpKm&h^=-6mQ+!& z$CO*NG-`sH09p|u&&9M-wFXrDDs zcJ;Ob^m<($3}Pch$2(rE=6=8t$m^+8_pn9-EyB72j5maAV>&s%Q^nq}bAiW3v0mMh zc7e;X7T4Yvg(=2f)oSgY5Mh!FTy%)c%>z~o_LCUb>}GkCv&JJF4ftzt8C$UWp|?W- z$tyn@hva=h=+HgAOU`+P=84e{!ZcIxBqN_uckLw64FPN<-~ zI3!tho@WOZ|C>k)_+Cl^L&bYLmaQ?iaS{rBE#LZ?xS4|T+i6(9f4b{;YsBXSYP@DX zcdml<%wMuA&E29rz}(# z#)dexgiOO3zxHM|MO#k^7Xj7;d-i~)s0~(rtxZGMB`oJR;m#{(p9vd&$@dR&8b6|! zBzj4aZHu8UnkitJa=jDwSZovST$Vj_WeKoc`iG=R9f$wuD+S$nZAuX8BrKA!VPZw7{>xgwu zopn6Duv1A?XUgI7H$XWVocr^@>dUi@P1$5QD0vJ?sOJ>kOa|)Jbd*Dk`|{BK8jU0M z1epv>{xZ_y+wluI?t^l^Q#JjsFVZ_dJ@@}P`e^_A$kSU{_QTOkn|*oUzuRm))!99& z|7*;RuT4BWx$ju{ULhv-v|IP@3(3>EUX0~M~n za0hv-)>Y+qt-xRA(7(T$(+(VEQK4d-pXJ~=$DPtIkZO?ldJ0x-*%xbm)+G>Otq!f9 z`fHE*>t8CH_!RoaJHEKPnV-k>;;yl;9;E~H=M&X)Q7P6j zO7}h7g`x|+Mt)a^XBJKn=N=>YkR3$|?h7(x7PT|?s~;B!(*NYt>ZCPy_fl7ZZ+0<) z-Hl%sGjZt*{YMRzd(7I#pgR;@{||F-*5s(!bc^2eD|}C!%{)0`UjPDx5J({AJLW+Q z0x<~v`U6y#?QU1UZol#Evrj}q&_%{po)p`N{X~BMF)-mvH*fE)({RJg(H2@W#G+FL}g`L_Lwr=z% zv=%SU@qC4*fKNi^?dhKKxTW3`flR=#@F*Jmi#nZ_B7?B()#yRXv#ekxPc?1op1#>j z6t!qJ@omBc_4DG^?)!L5ZA5mqc1Q_+zRyiTp6yN4?HQIggQo6_)d&|dO+dt8Y>Jvm ziCV8NlRV-U)+uw;T#L?F?f`S7SWoB_5PT9ei|M|`w_Yy}kJE4dCAeaFib<}1c7hK+ z_?nO}C=?=`;OkRz-jIu^&3sk`PkQuqLHLEM z8oh8e7~={7rFrk?tHPKVuXZ=66KVZypD0Tr0#AJ}ZSN=rdklKVsYWhGz}LAFO23$d z!N}3M^#S9azDX!9XNwhe#k~#C4XMij>bx8+Si|P{G0HJI(B3cb99RLW-A?YaWBLQ~ zL?v_rkW@q0(1~TAwKQ$!>h@khJZLx7lbD?x<-4(hMj}yYYE(!jSLwpdK>|ZDc{-RG6c;vr#_6Yia z7Kr?RcXR&|iL5vFS13Xt1imvKXoSIF5@!$uN04n+AVz*Ep&pXEyi>fh$mng>%T@{8 zS!r0fIrY{3GxSbth<^{GuR9yyt@mIBA~?K(3MTwE_zyw17aQjR*-}+0wG|iXU}Gg9 z_?BeCe>Q9xMz_ns8y?#8X81-@!--8Cg^0F-AxUj;irPtP+VuW#y1;+( zy1(Ldf&b)n|FhE-md)w@=-Ph;rM%aJKb>v|{3oybQ>SaGuTNeE@G+E7K-AKDYgM~$ zRI$%(D@xh6%~?o)AvfjCBD--AcHRXdhRsJB?ffA(HLAC4K4qVhDU9hmRu-=~z{S z=8#)fl%nFy#wF)&Bey!u0$@>@dXL4}58e!p7N1Q78G(9ft z(@EQ_A0pmUl05%vy|@A37QJbM1CCgc?^!Qqd8iH9=qiPR4xbVwb>w2LLzh>$XgRv=1s1h_Y)%8JITtF!*6Hp#!T-jDje?*-sEPY};>Nxb^FOz!fdat@CR z*I9yC3D)VPvaQ7PAJ4unlj1 z6~Rr3;V=oEjzGjMqK)J*#wbie-rHAjLXH`v<>p22{wxsG&_^yC+7P{ z*@XZ0B!9>z{N)7SDdEBtK@ceYwQ?1{rTAAjuo_%+Px@1PkpP4D$rboMeIndqPa0V_ ze(3<#_%@{Xx<&Yn3bG!w#)_LmLH98ln?B#BS&RQpV?U#XM0+RNE<=Uy z{%Mo3B{n_Y_4Z)=o08zBEx2p!ZXxwPMq>?0k!Yt?C!6E~3~%x1dQTC)`L->5hPP75 zKNT&?%>iJ45S0Z<=+!SJ{|}t=Lp9(4n58hQ{70KVpUsVq=8v!zGNWG2u|uqQS$zH{ ziwblv43RB6OFcq#I)GaW4?eSoFe*tQ_+TzcR<==1d zpY9O&r(67|I|Q~{{B^;BgX=nzCLHLLvm2YUU<`Qb)U)Qti)div9e%o5A-+~q;#!U| zi_eoCSm;G`&~%#Ta31;6XFRo6>7wr#%;q0wz?2`R)$|9dppqvhRC7|r*JKU#$SbCl z@00vOy6&|;ICOkd%4)7u+J0m5baXB*d1?p%@-KH==2UAiZrwthFyf$%A_!g?GGFd+ zhVX8i^OZSJl6-_95`FL~-`xk@1Yfj~Jpd~A{qw;%NnIu(WFfnWkmZj+m1Pq28(i^|VGmBr~x^fL%rx_iwr8((_Ji~@29M->Q zvvkO4O}h{9@@kX22Hu@_*A76S&`Rc5WTZ-AZy|%Nw%yqpMTxqwM8k;(XGpY^gDzAN z5v(y6hFsm5R;h2NEU2{%FdI**1(L}~ICkW=%H#9VH}Ii+hUxGO^Av9d*{~k*l?9s< zA0K$?Rg^@~tvKQMOl{z*T!)HQ6YbjKpq^cDnu`_uYS?vu8oJ!FmNoFNBPMGY7`{&V zklESj9>Ox42m#3_Aad3ZZO#+3C7dWsPW`utLxd-mpVGjnIaR^`Ej8f+SH9*S0DTf@ovoOs;$9anh zE`Mt_`=ihSu)Hgc_0;F|lw@V?TvJYXpra7Y*QB`(*RkNB=~ygpBAF%P{YJ3+$XEpm zPfxeFgeH)b&|tl;I$khc5qXZC`IV+4%5^xB4UlyO z&2D|mfb#MlteRgQY}lFO1P8B%At5Wkd8@03_fa=PY&q&;eyHtB?42*9-hkO^cQ^{? zR!9U0x2$C$XtGd`eON6l);=?+gyzD3HG##~t?{iF0bXvI&k%4Dba- zwQzK~240ywJ?@1=vfDF5CI({u)i>pvAjJClkpR#{IG5lk zzY#K#977Vc*1d<3m?_J-_D>8!o;_}Uq9-tx6Ngu3CNkY?zUUgGEHvl?EZegDOR~|* z7g;=08Z^}rw|;dp!iGA=C-(!nhMsqWIG-)5rkselLNRMw^U=e=$p?rgoM8S!UC4@f zG8V5y=&2>V>#cMf^L}RI2tK|+?@40M@t5J(MZTHBZ;pIRlw|o{7Ma`l9hd+8`L{J@ z|JYe<$0q)OQbH5A{qt`sR{vus{e)-#aKi7WzfcrO6YKkdkOWQR2#%vDLNF*rGbBk7 zE1;tY@=Fp*u#1j{YY>lY6xeO{E48s>*C2k&^Ar2%7I@?8u0b>M^-MH4-O$t;&2I{z z^hOe1kr)~5Eo1Z+U5O}cdlkSLe#ebWSDY7R9kez!%?L%qTjsG~2_AqRC?(ygNm$(-) zt1;)?i=`)&mC_XQ^Oxm^HH`WZJ>3p}$~f`4dbHun^sS*+5Oj)bbBPtMcAw+?{?N@W%;nABxVvUnQOOf;;Hu$20@&uw~1Im$o&S zeT=VtU(C;KE5>_^fhxf-;QR5lnyeb%0=hlSj@_HBRX5Zo)SEoZ>}PmgUDxfFapNQ) z#O%?RJ_Fh9HM2yheg8{5zFw30Jm8NLekwczf0Bq}extYiINsntO*cTf1Otvjdsl|Q zeMWt8oCfA{0X-&^iCVy$krU&Dk*i8Bc=6_U(p#cB@tMoF$vePg>P*rLa7KebO1V@( z(OhAU=pKg^Yb{U?x91xX2i?_|sUt!iA~@#;FcDLPEA9m*UvGJm4=#X+hz?PY2IVjQ zkLhovKV5DNctQ!`0PC<JHW(`t4Y7q=vat4^bhg2a>u`(0NMH}q-_xPuOg z&*8UopUY%d7RiEiM92=pSRDN%Nv6}NACD;zT*bs)!9?q#gTc|dkRELge{>;Ou906K{sDWWy(u4P~@tL^v1AEcqaXYQZ$2x^#z!iGXSXW6(g$Tb2fxYhFj&3TyDFl0(iGdK z+y7$!*ALF~zd8QXPyTT1cMX381#goo0;MN|VZ2d7XzKL|l$>z7CjacxH4l>&6@m2T7$o6adh&k|O z!{yl?zzgcm$Nn6@@5uP~Da-rFcIyXGL`#_elHG3ABRnjg^O#~($ZqbV@NTO=z#h-Q z(MZ5|h)0OUxh$%qe#2i|2=y(usvZz6&@KOD72M5)8EbbQ-=_KOKF++)fcDnk>ic7? z!RN-$ZL0X=SOZS|i`!BT9CHSuTI}{a5GrzwX*O?5Zp_T2w#U`yVe9Rh=esbfMmCGt zXVQZ)ox3RAY&iq0J9D+S-bVA+YR}(F&)9Sz^iG&GKtH<|FG-xGzvXB)7td>lB$&s> z_RBpMl_de`opiziIKXRa983Va-gG3_l*5UoXUGiT7T4}&A3eh( zv<4@Ku|U%7eCH>ti=`QaXZpEo8p4Mar0-C|u1UiIqq?xiC&`iu{|K8W861f?BmnOA)GC;pujlR=+g*fMXv}8)?M4js4fc*A z>I@CK$gDOOMRLe}Z4H(VBH@_}wcL*y;7TpK9A><%is}2>^RLYS1@^4=ceQ7I6uU~1 z&hGhrwO7lpmM)aX1o@tqF90L(S$iJbE6y@6-+3V@8K_-CuSI3bxK1BaogO^FMH-os@u*~CMGqP|E#@|lSQA`o{tC4B1@9v$zq63mXZ_K2N6gaBmY4Rn7*B44$A*0wD;%6odB9fkA*ISE zu4=NGUu9_lVwgBQygbe8B)=vB>`D@P9VT#CO0mt7afo`QytOxqNQb%P@5}8$f{>=k zuhCcEw+uK>&VzqLmYW=}`3Wkd=#&tp6DK@J$nB3*R=MWHrS* z8QR~>B+8q%YO^AF?%rq%>AoHMi@E#%gV*^Zz5nxTe3$KCVJXAFFpO+6B^Zst%+|+1 zk@)I82?Qk=lKHw8{GkB1dcBz03b)(H9(o%nM}&Lyg>TX#NV1QQ3x7|)W~yzTYHt9= zlFeU*={9q2n^8e;vnLREi{`eO*W?z5uAXt*KiY~74Eht#8194f(!C-a2iu9Z!57hX zB)KcwrQ|jlZyQjtJ78=NeN%iNbg_>E4}*O!P_Tu;Ft&O5^_(%hMUU`5t0BXiXQck{ zjJh0$`idZ{1ASjKXzAQs(a684+`%6zciG|ZUU7|jvd@~ZWUubUeN?eTXSQUQfkaGe z#McCl{ob4*uzADNdv#f#MdJIOlt;oFcleJ5M)RZT9rzYohP!~r(H>;+qt>~VGtJtD zW0YBfW$(#f)&so5Tb}o}`U8uqhwKepObd1LY_)qVtZj9JgEwCeDxs~=Rh1?7hv-;0 z4}Xb*bJYjz)w!>36b={8@*S-WYi11z)rx-4(`G;=cHu?Z+doDD18WLFFA1S8>xX7!C>h^%8LiP#;x|%#^Tikf1I9q&yE4& z-EByF*@27}C*(jSW|7Raz^an~y9UB>|&hej_QNHsclr%Xh$om zUwBcx%ry{~&RJ37M|-_f%? z67W`=g_MV#p!;&lH{@#X&X>Z}dL4T{yIER%vM#K&espYe ze|EqX8q0bj-fDB?o2S3v-lIK1$NPaY1yix}J5;y=8+9u0JjN)0jTfeU^9aZ!9C*N$ z76_?;3}x*Q)2MRKlf0=0Tr3e0FSP|r#Cmx&<`P*oq$4dS1miH&VR^>=sXt0|-jsmL zo|UtfPq!@f7t;;&qr1G6$PWpE7fv}sJe;$4eh=$+&n=#mU5hWL%B~{SM3R<5SAe+S zkboXXlxc@NJ!t&{T_m;=XF|!NJf#gP$oS>`dTGQVVDrv>Pjg&fsW;cH`;g_2D@9x9#KxXXH+>aiZ;#j-bCWHVg9e*c3A&H}AolDLmi~_Y zW8p&LH^n^Y@`*k<_9s0Oj~^)i1|q+J!+YELLmiI0uOLyf$LK8zsvv*DGwLSU&rsTu z9O~)~wA`2MVSDX4#2t{uQx&0h9@SdAkqK8+^;n_Vjy9v^1A(5u7lM1OUI+X`F;9c@ zDwJMTxI(xUo|fL$8SAXCC2?Hg*$RcU%5zU;urco%4PId#vR6r(4^1W@{s!Ar)A~kv zvA*>{?DN=m%8RxMu9fQi$F}m%^#K05ApgyJ0DoPO|7Jaazb?psvmU@-7v!(&@vBgF zb=e0VRPK<3H}v%|3$BUkTEBX|=1%)nKZWL0CKv0xVqz@Y#ba^pT#g9^%h1m%T@A5QEZ$S9itU z*L&eb-%jG9)oQb~94I_5$b}YQm@5v6butEi;?G{$T^zUUeRX((qfu(Sb&f77VT-At^& zCv)x#!tt2!Y6L2siAO?pMW`u27tuVy*O2 z;yt|^sFz)#oAV053+r~(0ejpT9rkjj9t+JSb5$T`>D~h8RMrAf>TuG=UfoSUbOKhq zh0>sf6Mq>-1}j1YKhrtS`!}OTg?sPr1(XGTl{53#`c!1t&7zj4$+cr38rCDEE~YWzZnMvya%R}0 zLxr|+?sCpEN^|js$k8fT2He4ZE^@*QJR#BL5l=4Xi6)p zjUffUU&ZzXRRJ`$1Hhc26JuH7yUcW@Oq3+J!1!D}b1yIzw52{G|u>R@bIGQrG^7fl4K?@eNYQaGj4ic z^@bGmjIzSy04QncDLw6mMrjzH9&ZnSPh!uv55eoe%kxGZ6_|puK5bvOSsn%ZdY`VN zW_Q}Fe#T7>xJ>ab#XIZ-x86h->i8&?m0;|gkB-%(&- zs+sNqSxC5aw&?_2E_nE-kC=Y5oeHd-PbH&Ic zz2VI;*ibI{Ggym%^xqJ>nDZvjw-Ks|U~BDNaX3P3N!hL4INA!0oAzk5;oFee3!cG- zut{Rew1&vG^CmnRZAstlS?J#}>>nF!<_*@~yT8KP?;C1X2-kf9X%8Rme*ZnB-4Gn` zZy}s<;P_7jcUch}@ZUmO!_p4htX?3*jE{`#)+6)LG=r#zXoa>LX(xKAd(Vu%C0n=7 zoX>4@7PNaU6Zn(N6W>&Qr+#jE(4#Q>Tr901vr+$Y+wFeaf4ytq-`w`cxZ&@UuYhXl zv;LWVeGjtlyq;Sf*IPKwL&dxAAlvIathb&R`|Ug8;-T3#`1rk^7zW}!rAxfGJ{W!Z zUo;2IOZyt1oW*jCzI3Mg zit#qh+JZs)%SGhSNV~|JfIlUc_3)+wN5uLGl2qo5@N=5~=0120;$lB`MAcnwclWO^(T!xjBdHgYa$( z`H42)AGOyVR3qc}#uI6^Woi6H2gb{yW7?o(#dCyhT;qOmP`ki?r-79MZ9 zUz?OFyb(0;uhSE&X$|9@rNL}c&hSpE#E>nGfW&*RB)Rb_qdft_#GAx3%Iqhme`3cO zax?tNp7TI=9o4N?hVAp5J_N*qt;&Y(ot?qXx7;dmtCfd0)4%#5B-na!Rzsg8Tb(Z2 z87y(SmHwiCOizfxX2+2~(h~+N%lex--1Lj)8`3o!(F-=F?_v z=6UaTtZn#1AgHvATa10Oa#UP8>C|Jscr%&(J$oQ|Jk(Vag8zN}d*Sy(lNSv#y4 z?n6M~`;AV?UB3|cdZ>K#>0ve-2Ct4{1lG_qvrxN?-Q81sXXp&3|p^d1MH zGOc^`N#^tbbt9%0@{bF|eG5ab?50nfwfr8EC|G+sUSaW&zH0*S?InwVoT8$Eq4B%? z8m|}MZI2}uM@j)rb{9?_Yc6Go)rAxaH*@I45;F8#K+!2Ywy$~-K>#*Ydc2ni<~He* zDj{JK^7=k;MeDx;>rwmla!t$EJdyB2&cZjL9_mb?iW?4MwM$w6OF*VU#B^y{(H5hmL!D7lWU?lDRnHLAb#VwD6Z z1d4{>^wND!F$w=Vz%_F-PeKp}E&O7SaFExb(*T!B9P@HaQden&%*LGr1}!(U`T24! zV|L;~8BE|dx?!p)OmB%CIbFbBhdXwAFOAs%WlnSJQq71sytH0Fj?Wb}h%b4-WvW(u z#*@3EU26V)?wD-W!?slqdT?~OR0!ujoPqARNEbM0Z+s_X#~_G%It@CDkvyosT(vv) z%=&}gwh)wtcy99uf7VY3mah)SBQRbDdW))2?@7J}xUn1xnj{lZVeR@W8W3N{_TOtj z5QEs%2^CfZE55V!OS5nfj~VMQ{6-@N{-yzu39M}}UKcJ)Cm!^}`RGaYJv%LTxtB!5 zl^-K0pR3>o*-Yi1ficYAg4md{AA>A!lU(x}LOV&Va5NRo};pR2XV@pvl=(;e$c!H$IQ!PfwMZkJ$3+^&Os0(%X z+p~BY(WQhG1<=I7L$5Qp*f(Na+1K^4J!a4+p?HrKHEg*RtDi?#5Q$K|t` z-raN@DXRy}yX)KrwtipiWy$jH;k%_69I?j*JDo+a0wM6Ju<|$!F*SnPDq>Tr<6ZYrWNgn?*b?BvfV=0nhD zPj5Q{+NHoa9BWGRq7%y{1ra_z+Y=@a)MvGBZ`W;c`w2EskkdMQ6r>25N!D6k?VFmINI41H2c}v&O^-VqRIG zHl(q!j$G6@!jzpjy<(b^P*||Pu2dF5>*wT}xrTwe9Y*znD}GudU;-y; zbOloD3yS!XSCpW?!_3A>UBlEE+wldmNnRm)L1zUZTYyPzExOzIp|4v~R)|CF?JFC5 z2i=0sb@w$GCDC2(eILTPVjW@^sA8B+vviGF*Wc*RW+83C_)e}}k==^2;GG1#;y9Ap zqS|eeCc4G58*2&O2XpRq9}?LpP}_VCYHO_7W+&|@+2m077@yhIx6*%{g(PMhbVA2Z z=yY}ci>68uy0BYMN^IrQ{rF>cpPwyOJv@Kx=h$=;gpWXEz*K zw~GUR?({DZ(E0Jojt@1j2?$s?ZJ1S`IkLQ4F0(3APrbhL52;U%#kC0Sx~GU{ycC3T zc`SD97{^d6NX#;#w9~T`;JE1SC@pr&%akx1%Z4y_zAXmpAJ;FUewf9Qj^XrKz6n^T zx~C>1+U4jsWq**vH~R*hqZkcWyAKDQv(A~B)-R=n8$;%raZ=fbBsmQ>Q4^+jx|~FT zPn@>Oc51$P`kKE)VBijJAgn>7a3BdRa+A?Jm#7_HwK}kd5t)2KdcU#$u3P+k3YK_% zbA*#e-KQ=}XV3>Q3NJOwO4#ZR4nYytH#cx6wV2-xLh$Vf(_Z?LmhNS|I##!pGjkT_ zAcId8Qa@su2jukb4ReT?k80|aLA8?dYH_6)(;30vUZ;Dh_}%&Gida26Pq%Jq!}qNS z$q@2E9;`D^htvIiJ4iL$N|(@XAzmS=%25@V>S*d%Lg&D*2b%{QQR7wcc&s08r=uBvxH{MbZubzs^QJ1h--xc!pjIaWk z@keq4R7E=B)XVPp)VYDE-g^`2Ew+CSG6ah{SEb(7J4#|Wc~5ReD0kMYJrX5Q(;7JH zfdc+*dD=L`Fl=HWxWHExT5@n>Z(5F^F*U2%N4lOP^ykn@p4u=*Zw+Ih z+4~G00q^t})WZk1l35*757w;Cp0FO6tzfEG`MbpPPl?qnky{Opm?Ld`H0Db|Pn&!S zaIQD9oj&?CF~mGkMGJF}B<+2Ee^GD#2CX=PQ!q#^&FOFe8d0ojVlLVhSmvqrR-8eD zvSZQduaXUE!6%)#79oZ;t|WDO6r>k|Lw&x5_r(Hf4gn1JRUNLyqS4^8of=I_?RoYO}hd0xRCb?ZKME2$?qx`yn(J(R8i(FX+~gP5->HJ z^}8aqb8qVDM5=Au4a+F;XnnYxDXl2*bEKdeaC)4_<79El-22EQ3B!?ZC1WOK@2MW| z{J?@~>^BrL-dK$V3kUR0B64W5mgQoEC~F|~i6){ifikTwmlR0xLc^0NUkbknIDr?A zE+GcK=Dx@20*V}MzFs3ITtYDRDEU=B0J5bF(+V`&obJK1Bf;f@)llcNw<>VNcEF*= z3U$2hBXQKu^8&K72-Z%CzMojOoF4!(ycQKgV!Gg&xSUJ0D6#cB&^wN4V!z|dqfzWM z#G!i*wFk7y>HEcqFRNLa+dE)%g4{DLQ7h-&QM20^O_%mBf2Nn29?KveI6K}Kfc zFkPbpZ?kcVJKeKVJlUIoair%MG%UO?gxW6HF29^D^KrdhgY(e;izX#F-~>ivLAvjwMH z@}EpL`L1n*C9-ujk-;vfmHdwUtj0hm8`&kEirnBRx6xZVOp^3i$>UXnRO$! zE3+WvKG$a#CS9+wDaY)C)uV8$a;(p?KHvwbhy3T3CVdAM^(VkGxq3<8L=BZ}OW+fS z7x!yjm43K2FY^oTERIhOg$?P`Ebef zH8y;9rmpoZH?>%JQ?sM^_Emtnkg`liAo)&_!D#TCQ_R?q5OJBso=@JPRz@F*t=OX> z;%UPSTu8=R7u9czI78hG$RaC+$6n9QN(~0k(|FZa>yRBWMLAyV5+4WW0a|&Zp2D#@ z=1GXxr4_MrUI)411SDWz#&RZ(#7%ocaFWeu7arpEvyb4}ogpZ}aY!n{BbP2ul5)-u zU?0WZvxDgeeLob)8DKCma_a^n9~Qs73#G4EJY**7?8xCOiW2)GVz`vb2VyzOj0fpF z2d$qyArofsvgkEXW~-?<^>UZN{OaaeHuxr|^^0W#U~9wu4g<)#_m(Y~I?rl#(nnsb zqZcLXX4cAI#S6gJb;jzvN0)J+`+P1vS1)Uf$=jp>j`LJcDRw)!wXnGoZN+0orSVT47+xgdrT66v>~fQZF(xq3qzh=aZ;S>6nYA6 zG4M12Ei|V3$sSbOr1jx?G;+G^#mSEs^Zo>a5mkB=LBoY6uLqUJhp`gFuP|zzo1cj;dJULDx#I7oE!dTU5eW7~s7_*O#SukFDMor`rYDQKP$?ALVE?U4*V`=|x`RpjB~V*S1tQcWI|eC> z%+r@GdwHi1Z}qQA9!Bg9U(k{`Gd@l-dCXQ9FuCi61olMPiR~Mp)B)BBmk6cmrahxa z2)%3;nNyGe83UY}o0Zr+OrGSdI^kD4KThk%qinV#)ZAy~Ds)&BJUa{m?snn-5n`Rj<0}uqPQZua(s?=lr78fb}=jIsXw@cU{4* zumx{HzCcv0X8fGIfGx{XynA?DXs0Vt;4HtEoUC8ak$FRo_DU4z=tT64>#+XJwIKA) zNH7L$L$V@|mUjc4j==z;kQ*)0Xn6pbHE?@UpKh$Ev1g;czdkBfW9m&Sd$&07p5Nwb z4}lR~*N@X0m>}m@66cRsdZx+y4Y(6p{{XXT1#5yQ7W11u8Im}PrE~HD&kbU*-y+#+Rx#3EaH;#|?qASKKp4IdWe2Ym1zpb$z#Ix4WM; zxPyw2(O9(xr9b*OI3^$54l4fN6$*;$#&o< zlxPn|B2jaO zC_OQu5y^0^?d2o}G!)J}Z}sGp!i}ynU9#1K%8j_xHfVE3T^1)xK2_slIlcxBx*s(u z^>tYytG6Ri7XhG1rE=vLrUY?2OXH|(N;_P7jh2z~S|q4o5J(kgIub zINE(7&(s9)>+|GE^M4&!W50-luwTGI*jG4c{b67RrbrTHaB2lV*cwi+!8OdRK{mbq znP9LlNgvyUTztbYE2c=P4XDKQ&ekI~9JGbndmSSE7{C4X%-oIThi^^MD`df~(@|AS$Fc21l~T z{cGrqAzQcerUVx5b3=lS+J_MPh;m}9Yv3QHjd;6o@Q*l%8#e!MkKf@S#J#y%?Ln7$ z4A7)V;_SNI${$I6Eb-Muw_nCU8w3LWf`Q)u76biFpZnippbY{6I|h1l>rU!-1hr4X z)*8wkSy*N{zIGq9&!sf0)nLX+NGQ>jvRa)2U4*f`orjcMBG>C`IF0c2+f3yB#hu@e z$iC$5YPZq6FzlEy#4LWk)5@RA-XF*k_&1UkUwEY+7>3E^9yrz?c!?v#`9-`1DHQSf zM;>OTo!A2>v4yaPkdw}a4v*$W5ki-QXr5wIKqeS9sooK{S)p=RxBX)#d z)oFQGQ`5hS9v_M~czLjvI3z0IErxv5=sAt;_VRBe9e()2KO?|1vx9JP*EZUgZCGV*%pxT(Tdn;JHs}ZmJ;5&Uc z`nv3ylAC4%jc;YonB1b9^*c=Nb0OhqBNMN2*=k+37vYv1L-vS^T))phGajpjAmWV> zhVKGLn_+-A>e;5mw<`l;^p>{UVkc(%jqh>b8h1r|(_Few-rfjg=+@1)*~MM%e|->Y z7jgI}<3Vr6!!5oy9<)RW!u-%dd;NSpp9|M>haZi{`+wMY!2kD*hj#b}cB`iJMH#Ok zNY$XHq$KdzCa{0@D6RmQ0uIqRf61}TlG25#i$Ffl<)UkZA(Ui# zm|P^?aP#(N%t)r2@XJRQ;Hx z(yq_f`%#6@caAneU{7O2P;Rca~F$Npop{FN{|ekV6s(c$eY+ zjr#Vyyh}x?W`Ms(7y1zU!bA_XueWCLxM~*sb~5?JULFW5;MD8TS;FIZa)cn34Q+Yg zMO2K2dK*RuK$PVipuc@I7447koFP7vtuBeLonN+_`$!}(I-&A4B;{F@k2hXAC z>)cTD1Y1o6Wwy&~(sblT9bV6~!A5E;z5Ii@6}*jQ0*`+-TKr9^=A(ZY{&8fO zD8GO|W!NI~0LPWrJgRLr#tmgk&#|9@DQ;Hc)BFvXaO@vPq98Bjhab}Yu(a}Z>s z0e{n^@7EI$n^8BN?W#5z>@zind^?c^!>^6h3w#o9&$eOf_sY_(=X(3%5Z^e{Tz@Qh z-X5p_;lz*aF)hqqfK5_c2oM<9~oGm`E@qg{!>Hf^tnh|TZdHD zfitWp*rjPTf4!>jJ{})$^T#>?<~INMpnp2G!4_@)W*gjX;XdCLZT&G#etVqf_a{d0 z8L&R5xxdF-A?#lWzxJ3lt7Jz30dw)soQ&n0&M1+vFiJHLG3b>^>Xq&D$g84H?M=H+ z|1WRv)#WC(b_?J0EA~C#cSH_7#(O~$AQ2>zfID&!Ngzb{^#^2^+jf_?yWhRX>EX6r z2rVs@RnMC933IlrWVIKpzG6>op$NIei)916%HslSpuv=RRwbSWOY7?pp3CE0h1gR^ z&c<2qLt&+)n2$)LpjXg*tS{D~2^oTAtp_x8il!F)q2pE5{tQcj2qctLa>kGE?&Vb9Z=LnxTi$Q?5=2y*01kuja8 zcmg@YRAt-hMDkR-9cR|nc0#_a`~y&!@~VKrk?WD_!43%eyhMr!k@Kw6H&Y$(@ph-_ zOd*rU^(vTc6^<4hbBw0=V!~i4z??J@OUMpP=F9QN;o2YOWqs=)6>TV9G>CGJ6AbeG z)6QlIaH#Ab*}!}z6!}Hum1_@JDlFxL%Z3n{+)+Q@Wb|q- zWjckI6p$|$90S!2y)RLv<+?>_{gF)3Xe^$7slz8n@3Bj+K75p>GKA>+#(xZc5BfUU zKSm6w)`=JUj-R^#H(VJTh$OE{#7Iz*ksVFVL3H6@)3N=FBR_1dc!?HY;x^y&-eQvx zK$XJcjNKhf9&ls$^|evfl-6g}zEGWvxzr6RAGlG2XO!fpd^{EK;W$O7ph(D!5}vXe0QZOKaib^`NQ>_r;%o5h)&UTgR8VkM$!Kb_X`z5@ur zju5U8wi}O59|EsuJ9e%%F3Ey%vF=fJg&flnD$%qxb{93jI*x4$w7DG|{&uEm7p0h0 zN4Rce?Wa&HN(%`jxXmfNBXlL4#FGoi*nxX|v>YyS^R6 zcUX7YAGZASj)8x=<)3#9{Ov8vGWXee_eCi*dmnh*`@qWt1_{&~rRGp9B_X-0nm+lU zlP<6)(@375xYY6MOIvWHdny6GBNWuS4or14rn#YSjwvkZu^*si+M<%^TBX=NqET=X zBFk?@Bh$~}RGqn((ibjU0#?&(cwwa53Yn?9z?})C(;t^1x%R_$$d!i#WG-h2s^>>v za6aig&Rm`!dd;i(6b47&Y-9AZCWn5IrV~Dn*ufe|0zc50M@LQHcj?o&9%)~BQ=z*} zu3U@Dsw~DRNa#@&O5hRc&-(5N1F5)*if&Z*bQR8cv|wlbIA=)er*(09OqO*$(cFUH zYVR?yN!a8#(%4-MsJ4_|4zD9SQsJ|~0;3F3UsOqKy?ZhkH?d(kv6Gk@iGV>q)b>S2 zPFZlBU552V7y#phX#L2VI|qE< z*z!XbKvz!NKb*FXMbNtIg)ix9HfuS^E8~060Q@$A`AK8TE_1UzY?w}(0Ub5BH>G9y zW$;%InLPV82nk%;VuML22p-!5-6VtZC{I%SJT)gBp;KO6s->4$&#wXAi0LD1hp_&l zCA>%6F7BRlTXoE1y<2puJr;#LChcWR*dote-E$!Eu1JJ4ST1(J0Zy;YSVm!kKKD8u zl8NZ+T7%+*uXLj&BfrDQ#Z_I3@Y2O&FLmDr^WNs)=Uo*LkQ#} zuu|hPvc@F$()o<@`Z+pIGzZ4%;e3^zet?p(c+dk899|i)u?u2+gbMAhiTAk81xO}Y z9h|MQoun0H76NLyZqYduzVAkaBjr7!J zMrDA(oti1{2ws~j=DTV`4n8%?q}y4&Tc5?KWLXD*=%+#o+?5*O(VCbKTmjd>gmq0*>5?O${v%}0nZBx^s-EIn)?S}Q5_iFAtjQR+Em86HLP8jPpA!Zd}N~) z1Wb3bAJwwF;-dDXW0N@!Dum?4k@Ab4Y$sDpz%F&~6O%fms2aAHmOmHh^)^Xp2vK<# zy`X>MpKF@R|B2fA-#ft?=I%(dXHdAd@7n(T_|KyJ|H(q%)cODBBHsfwiXw3WgAjV} zZbe}T!amL5P{f|Nfswt zizG+zUJ~4Z7xZ3q!)gJwXKJ?VyZl?cLpnTt3(W;P9^8A6(mmzA?E?+B_xoF*hVETQ z)Hf?aIa!tvngd4d?wZ5+y;IfY7F^#zEmK*?s1otGe&+!rZ47XWtj-#X^!F0? zXJFU3-*Y5agkB<%UcTz^&Z@<{J{0=TZ|aYiAp(8tQ2Nj&20nK`WlbCUn924gb)!V8 z6|K6Z;$H;agm2e?_r;Q>KFR&-Dl>gaJ~7kL5gp8P)mh-bWT#msQduZ}0Xrz$xBO=| ztKCfn_G|?oqNi#5|BEwEDaA zK<(4$bv?hffQa2{e8Ix8NptLQdv*Fsm=$6G^D&l!IY$FDTn_&Btm}b0c9`N1+O0Za zZiczKGai=XMhm@{U2u-o`bMl@!zQz!zy%)pOCCkMaO-+@>EXdNBo(UtdX38`q?gnM zIm%?n@JAN9^7m~c%2Ow0zdEep>edkla5y45H;GR6=FU;}86|$T4qL?Tm1-}&eDcpw z*tErb$dWeE7t|N#$1=q11+2{MiUNdpyQ|BK#-6^TNt53RT|1NK79!K_`=rYRCAu$p z#ijUO!%sKc>d5`X(n$bjy_JD zwUkQVh$+AJvUu#hH6@p|QXUP_6boY8A>B`x z8&R_@(b_ky9*=}UG6RhYz)4$}b9-b%{|YWTf6BJcNmCJrl(OaeEPIM@VunNY(z#f% zS{}N1M+uX2ipW>}={gZ$n^<&4sURxKhEZH2Rznv*flqb=TJ~zg2R^+|2R}acSRT=Y z$-RoqLmpJsogSB0K>@yV3(=RY6{aT~I6LSHr(3Agb7|J%=74Umzh25vQ1JZpFWgI| z@iw|3yIoXm=#*MpU zLnsjQAp#>Vd=!8RBGN~5l(%l-<%i0$6|>A;YF`eKIwwo$&JI}?%;}2MH|v)}-d|v# zJY7AN4Va?_ZRdYd&~8WDm1^EQchqI3;sf8`r^kVx$H()}Y+1iHQpxNFJ-CKEbx$Mv*A6hoI0Qq zA!Z{$3gQ|gMVpB2gq*W${D>(6`f~%=ybC9y>c}E_SfIbh`*HG1+L@ z09>**UpQ#(mBTUf?{lmk;V8O+L&}s!YR17~@;w|WUyQY}lA#)5{lt?xV*qSGlfP^D zk-QrR;DH;Me=04yDC3;YC*QS5zQ0=p5na6CzEs1Sj38WEY(YM39&L}tD9iaA8|5SE zuMiN8OnE}%=-Kg)yl|KYNUc0IrddxE^5um*O(?*J^Ko#m7m&&;=CK{=b{cP|Kl`G~ z9temTM8~;Q=Nl?d#bwSw?dtS#Io$9PbdDFa49BM&UKI(9Z0LZ=Vlh?(M6zyn-$E%M zp=9p(cSVi~tI2v2e`u%Ib`~7Q7#$ugT#@!O^D@^rc@*gwrlBfx<(0GMuJ9KAJm5^H z@Tp!;Y-!$(V>jK5c1hg3@@(@151-^qNDs*QBq-0L{zOk6gx#$w#f8VAbc^{p0*x{a z?eXOV8TWG6G>6mn%Hc(nk5OGxSm=M~S| zZuoIQ8t9baV#+<^j^!xJDi9%jUE1_+zFdQeld-4=Byu|v*5unbGL)HnfE*zcTe;+E zrLDWfbu5d!C-VMZhK9Rh*?$EZ{%WCr1P!-Eet?D;jgtsU!6-tL2uxterxQ*a@Y=l} zu)QgPO!wYxD&41(Hi);k9i)4?3?_HeCN%hi`i1%qx}z^L+Sfqd4$?UG9`6qK9ip*>9g01J0i2>d6oa7Tr}e*z14R0wB?Ho|5;&i{zGg0QK$|-sgnI=)* zYn)}DQdJeb;=3|H`k1UmSwmp8YQtskwLM53hfA;?O%D>tB0>jJ2{bWQA(mdqIr9(G z{pOJB^YGv<8Nekq3%)c7BD7N7zJ))|8YxEZsuRB20)%1Q{q?FkO%mj!)IRbzz|U15 z=}XVZ#^<*WOv~8WQ#?j1-)L9MDzmc*g10*qU2{T(-XApJugRWYiJu)B0=^ra$X~pW zyCooW1Wn2U?(zD>)A<_AN73ljNWQYgNRm7bmKuvUIDdV{QArAqOr9iiAvjQ;PM0SY zdaT2BcM!-JXvJ?qIS@M8#W$s#?n76>AogM;PRyTBGk0NiNby@&{o~*)IKOAy2J*K< z^nbA2&w={yE%kl4CJ>B55E7#?6i2q-Q2f)r+2lP~gTi~0D;(^NX38yv6bq+O^W@a4(af$gUcaVtee|>n-u#oVyYGjmB>)ZGjzm5Bbo) z3fIU-yDafeC~Ri{^%h0j0(kOesEF9(Hu)AAA>h5zvh93VxlDGhj-)&1kKdJ@o!cjS zOYn9C(C}W3!K2?Yd1CLypudTw$xiQet7THj9*I{>(By6mxQ3siGTqbmJ}-Bz?YYZ(xg0IspTKs7k(+pZ2^gyMeSD+=$xL7Oak#$VSFaO? zOQxYL)Oo@U?ZEDQr*tW}do7Xa4*7^FI%bab#V;n1CC(*ldIk{q=_3!LOO-v9Mc{K= zX~$xCp*-FeI0^>Ze9@>oWCe?4OzKonkE2L$VZTwkT)RdL5Ym3mvC?DgON0ou47U-S zJW;kkRPIfCX*tqhMeCUilpOqALwYHuHO@R{6zV>@PdvHW)nPam~a!x+ZoXqCV}zd$uzgTR&}7uZjKqYZGjcmP+lYCY&c;bMUY1L z&US_7lngYh`ZP|NEv2EEjhEMGbDqSq?$aCro4*%FE>wo{xyDCFV$qt_gKQEYt77HH zSmkPU%|P6y%s_ z6A3MwE?_bsQW#+lQ#5*{iJT#{x;SDfn&xR#L8aDjNH?mNH1oJP;#Ua~vynfuOl;U% zdbmGr6(H${*x-#zkjX31W&G5cM4%*xjJ`aQI-$COsfok_ic^;JU<{pjIWv)^`NH#vjV|ldTq4xK zIVDBA7Ky>V9HwcB@Z0>Tc*~{4pJ9BFymX2w8{p-X}&s*`yyOS*S>wmn;08eU+yOgI*$y#=UR_rbBcT z2maQhMq#osdavuNXRJx(v5+HEo}^w@hUN~Ppuu^idP&xfoG~E{F45WcGYFWppxc}q zFO#YsshVe)T-R*mT!84rbVjWR#$mzjrpl8iXK}-`5!|pHTsoglFb9!9eRgIDzFNqQ zUupYUTZeuo3&t!%b8yJx(Idnmel#5TPbMAyE=>C;1pj}#)<1=gKhb;?-e4oP{d*H6 zj^Q|tQ21xK5vO;Qh`e1JH-xu0xxhPgjG&zqZ(oM=TcteOC39)$Q{0F}d$TMK@ANu` z_X#KD4IN=@2Xqm!tG;btBIsLW7yct6_paP+Z6f{^Zrs2jvR8EW5wLjg=iS?dqWwxj z?mGv|CPW3JMFH|3RUo6?f|BDI`r1J6y z)$hNr03Ds;Z&ramq5HsJCOpoqY2chE9$v2rVx(+gb;{znHVX}^JBwbbAo8s|GpZ#K zca;GgIgAd*A!U@D^{O?BSZ_gd(1+Fa$WoasA;OJ?1v+&m$p%$em)CUl55AJY=VyK& zfm_1{?1+HWS)7(9b2+MB_rFeqT)8uT=S~{<>R{vI1IyFsPZxc~$ebm#lUChm+IF&~cdC6)^^)n#H)w(8SSnB&5y{?9&lElec zYO&q8z(F;6WF394KjlP;vmjg4?Hrl^q*O0fZ5UK$ku`hM<9A=!-+%QnZubBG%OHO4 zp#0w~@U3I=^E-YVYJ*9VAPAVGNfg5{dRGJ4f-;0cFagszN`9&@mF^*RBgF}}Q|>)J zzcaBL$A{h`QM*7$ut(dsMAPT`Qg5sJ?RikL2gNP&1@PNz0^TDc{Co!4)HdJDGU+sR@N?$93P(YLrdP3>iP9C-_kzNb94 zd%h^9@53E$CC?y!CkN8MQ<(orz*9GpfMhUroiL{|_3&Ug!q2o`-D$nW3)zOgu@A#r z*Fff%S04u(shaT5D8s&I5K3t_4Gvn^@5F)1>2#;FlZ!zu92i0#6etqm~biK}M z`61xROkX6=uQTw&#gbK3lbNLK>$t@nOQA>?-fgymTl{T$Z697!OxDy&!P?$}@G<#u z{^2cb4}Ltx%s)T&XL%g>t#-)CmI&!`_Fv6#R6Fu=i8SsaLdJC%vfhw^d3=VKGr^C- z7CdJ29-@ctJgnj%=lvW8CnyS*!))ocam`7gk43l_;WiyDt995Bz5{+Xnwi=OXrtTK zOK%F7z9gb5FYM_W+NWB95Iiw+&CVZZvE@+F6ZCX2&o9wXWn<=nK#S;$+#iQJbnd4I zs$Rq6Ydk&GEU2YdjT6M992F4EYVEp3J+FulcOGqE;vuK!=V=0z=GDATIvF~b!ju+O zU?S{*1WSw@K}>(Bm-7SaF5z0)t;r%NT`K3(N^hsWo60xIoB)_p2^xlo<)MVlwMkt2 z`n+F6c6AaHYzWF`j8fC+{yrCAum+2sn8S$=P)Y|8iPc=-PKL?wDvLaf*S62#$K749 z6NI!k+Adzl#i_BeP#xoXzdDspl(SXbY6#bF*;Aq>4*^U!nqHEC;z2mb*Bn0Rets-z z6pm}7!mj5~yKpN^3bWg*IdNbElI>ypC}-osDO&Dl)nmANguneaT^RTf zHNjbi0>O(n2=Zv_#*UlvA+lF4K`{PyN}GuFu?D!=Gom}M2N>LPL{=|QdPr4P!t;n) z&C7Ox-LAGGb)H3Q3MVwj>UIsh3CAz#Z7tQ#1A2ev47VEjHuBx0Is0L7C{M3Q0Pk8z zW+N)b zeQ>%ELX5%n&3iawdy!*`X?r8=qgw>}>2x$b*fqf^LJPqcpMX4PG@2Y2;}k%ZLox|Q z_zCOt0_?j3ab9)OK~aHS`tzl)R~sCzS>7h8a9v|u?Fksb@oBJ>nLqoru4?)qCwwWT zy~nN^;%va_+*g{+;ZvaXm3>%vSJPwaMGL%O)YMZcftT$uVhwR);lyPi%ytahMm}o@ zUf;;Mjo9N-9}^nGqy}{30eswN=is-_<95iq*DD1gp6@0Q=Zq2M?$hlAHgK7&hil{= zDMl~6KEp9hRV$F7&dtL1s5MySd{(i$5SUW80<9Ex^F~%vOp&D*?ukp*Kg8wf)+ocq zC-Mo7%%QN+Lv{{>^US%?Wu&7uqK+&Kl^a-Ybf083dSvSwL9_N`9&3p}2iudn`=hRS z5|<=PpFH%ozU&22>*SbFjSQ}^CBJUz0CWtk8tK6rEv96lwZtS?Clb>*fBEm1989 zRQb~NQ*?i^IE^pD*j%?C4IxV#(g3JCCEXlQQEbg5AWyAy3HI+X9@CC}o5AOaPZh)I z^j0wBMJuK{vYni15cpo5Ch>*=c;3z7gKH^IX$=b>;7oD3I^kKTKXokg_u-f>o0jme zn`|cMWck+@c=QDtiQJBk^#A#IY{OSyZa%hS6MrGILKCj!M~8F?#%(r^5eQhProLGL(> zeyfn|=3(T!}7E}-3Wq9aKtCPLt6NkI73GsG8gWt6uWLG%Y0VPH3MI7usN}HlP z%f|72EC#0kpyJ;$>tHXSC*TK!yUJ#F}hRnGeWPwB@K zzAb37Uy<4LP0c{ME-ZijI-{zs46O3^Nw=;W7B#-isFoks?CqKss3P>Uh`T0#mk>A$ zQ|y|KR+)&i#Rz$lnGal8UAF7CVX|U~IwRnVAKcy<{fz)eh;vuXY&v}ygU$5E6TU4d z3tv$x_pN{)^E=*EC2tZKPx_kA*wwF(XG{fP=n(x1 zm5n`kG3L(2jfa^~v!Y8dgb`wBS|<}%4GiepDjF?(o$T^Q^#kBTsQVYm@*ncwrX1P5 ze&L&r&Gct_E)voLdT)Vj@%`RU=gDJPM&z{FX1^@V{FLKS`G8?2|0++XA?`LF>i{^Z zGz+t+rFw}IZwfuyJ=vY1TibfkOf1>A(mmqvRi=rn7~K$Mt-(;MG9MCXD`XmXI*%Z;HGd#&le9gXcRIDU<8 zBJw4`>HlLl#e2r@ry%>gdp~05U+?>Y?IIXS(geK=J&_o^MMxT^VQdSMB!xq}9ux{A z-)QRl%m;e0K}N(HEnyWY0cg8ZooyC>$KN5^W;WHf z&sgOzSw{YA$Saw>*!<0-;vMpMVR?_{fAg(?es;~!^q+hyoUpF!sBzYq7ebZ2f8+s8 z$KJ^J7PWw{VM|iKvh;sa4xSUQ2SRjxoie*=G2xEX2Zc#%zkb}8sW?lXEgCxY;sbUN zXM5?+)Ui1(a(o6+{Or|M+Y~f#ug9#NkRlx()q?A~#OqG3x z1q=#;u*N@?X6%hZ3lGa$1CI2tC$4oUwbllyB~QBK2D&_NIlohL5Za_)HKHJs5z~W-qaPXgWD^Lc&VhyEk*uDt! z#HT*TS65U#fQO!ElzS0jKd<)z9cGwsuYTx0T>OdX_qfC!@aPogcz>AZX}%pizUMA% za=u}q#4InM#Pw4jk93P;`O@BfQUl>>?)&3w;|KTk7Css9I4{>DGSuViNhl;`NL$2L zT$L{gz5=v>4Y2zRORkjbR&FH%uV(ngGMf9w4kwird}==U+fYi(EC?udm>c%$J?o;cn0K0#;&Hd zxd1wGg^Do7g@TsmBBX?^1N6qT*vbVtRhW~%;Ba?(uU16N( z58ZXz&fUoY{N)HS@y67DS>k0Z-&EkT7@yl&rX0ws#Rr`+c}PeOZ3!r7|J0t3?Nf~+ zct=()TwInlTG}YDo(~MWSax{nC-RwD*Vm;w(f$j~BO7@RBL!~XZU9bdG5i39 zV5XyG%X)kf9qiX=w?misQFF_+2d=r&dK%bE3RuIy4I7Mi_b32-Uuvij7839qWvVY1gw$r6sUXRO5RXd?aIc;d%e+jQCLr z+bIKWHAw7QogW10=BI;weK1m6=BI*?OZDl}VnuNwAc!6&mcHmNr}h#bPIIm{4_FoZ zvrOfgUxnlm9L!3nA39;)?rq>5T-*VltnA;z`H=yk+4;ntyf#oBW#od>NPDXS z^Uk4roW?v`?v*9pKrRLyvf|BiNI&~x;lu^-3ULeH+@jQ$f(RIb5R%04jaCvkLX+sOo{3ZB78daB3y6fEPv!0ccqd?Z z`o|YH3iK_aw9~nC*SsX(?xMToLcCMM1o;#(1?XNC2%(+pA#bxS|px zC2xb*UEGd-w`F5{wPU*olY9MxM)uA{Bo#Xz@dwt3re$@i;;Uu@P8p>B%wJ&Hp@Ms++}R zli_&AI~h`Ps&F{6olYg%;E#f7 zS}IG&b2(+4U*0kSa!UYJ#0=oZU{glF^<~R_l?}u|tuO8G(ID zt=x6&0kB5?#X_RgBag~$U*rmNOI?|-39E@4hr;Tqn6*a6)B9aGm~~@G&7F19uu|?f z8-qn)m=VWw;#*1_repQYZz6@*te_z0sjmz#;B!h|Ef4Yyw(y@f#+|R3yFh9yW#>Ti z1^@=D*O@+@S^q*cHQoCMP^N663hd6*CigMtfd&nx4|#I0lPw&lv0*#qx-e;sD_0&! z|BdDn;$8`SV@Z4(nW%&ZtWPD{sYfy6`Yo{l{MKUJ`?Qgme;3pEKm#gj=8m^(r{P1b zXd&6>PN#@NAim=C`MOKiv3YEGKpq299SfX5RURHVl+g(=jTqYif{v=JN$4W|Qt`U< zxHW5JhA&ns9xQG6O4LbmTZ;JO*;9>iSY4apgu|>$On4q<^9nd@ql{6=vdL{(PYIuO>f;O1 z@=FI+Xw(J#%Q%}LJeC#C>bE00h?i1%&ScEJq@V;4(ZeD#Y%l1FtT)y7tMPFL#?+?Ox(w!48j4kL5p^xN20oDHHHpm@`P>erk;<@Ip(dP zWQP1PlMfMerGsIE6PrB1MH^4|Pyt`{3`F&_TbHxIA@Zfy?mlxei@02E#qXc&345}& zeAQq%%3V1;fv!52(x8EJdGiNFazhnJ%X3g{98RmwB-;3Ce6LQu3(~&HElVWyah@X$ z9L#?kNxd7S}>5#3y@Z-Up!NJX4Sse{oSojzf2S~ zVJ-aW+VV9;4}3{X3EPv^MJ?kmMyo$vQ;+SB!x4AiR1JAg67#^9gjFR3V)aaJG!$$< zVG_>-Ulkrz;cX@+XBxjx%6S{M+wj~Dr$*$_PcuF2z5DE2)P1O9|! zye9HhC06xJ)Ylu|F1vmwmC=`@ZiW%BQ#S`gUF5u!*9PR45!G(=paahZeHz;dJ3Q-k zp*`1bQPzHavW_ho?sJ+oDz!mJXSv2CQhJm7A zV?|rmv&LA|eb$+KojU@T;G=zPIYd}4pciU+{4jo0DHk22ZSfTcW(?owH|+91l1EMAK zI3}cCiyOyYtSwwol=c)tr-@9b9{bb7*GiU6P;Uj~HYum>EQYUYA|Hg5<90Yp4_Zwx zHZw5>UJ+LUx|uD zZG|M=@H7@n13yng<-pN_PaIk1{JV7G;5%@-jkSEM!{7-+)@^i?yGTFg6u+~vT&^Lm z#O@IRiAQcbEI2@f5guE-^wk33iFqs9!ouV1Ptl#|BlodF#h2)Iv7=zedvt~WQ+Y}z9B5|?) zFY*ST+zWiWS-5^UxY8;=O#1bkgX?<)^#=#nLVG*7Mr->56m&OnjYjX!s5APF{PJ7} zde1P4&Z?~J^Gn+aCHN(KS2-|K0;bQ4ss%p0U_JCSe6fQ45)+i#UlioeucJMbiQ0Bu zTf%Ku?Y@ZT^*|sQP{g;d?dB!q@cVa>={;@rZx(rTU*I$OhDs?C>%f=QH7jrmZm($+ zIk7`Ay8P7JDh~MUWt*~Mwx|LS;WNJU&*%~g?O`-5$GBWtp9z^9PW`)gQkOF4P1D`j z?NtK1yMqU$8~4pD&lgKHL_l&D34@#D`V_;5MASu$TqN~AWg|p3D#{Q>lLgO=i>;)m z*K2z|Nejz#7cJ4UQzj7r#EL3t93SL^q9=Ic$1t@f)*?P6?Rb}`?Ae^wl3JqB}#go4B1T4+qUf zG_iDMUvEQ9y~hR6B9SJZqzEMZp0@KmS~S1R&dp1(9<)%$lw)|{je8+^aaWf7h)R#F zko}liU(I2;!$5YK?^oQav3Y*I9*};nb^lCNV4nIjv7J0sN+u2$U(t7=xaJfU}>~=ccsnQI* zXEma$N}zx?rS$1pd%0;HZl=oDBN8`3d3VcFhhbR@Y55R_!ZCmvz37f&bg&TRz_k$? z>3*=}z=ko+z{R(Z_9{tb)MUg>ohRjfRN)g7vg>d_#XH}=S25B_B(QNGKrXGJpnODXE&nZ!E`{rarSS^f#X{uh?}0JEPg z^#h(oaTdgh3O3rZ>Si;J{<+7qrE$LZyF)@bY1lJj0nhmR+oPF+lIuRH{272 zyVBR^y~DvirLjvVqi1v(J^q#vQ@f}SDZ!5s`ozRQYeLiG+h)VvTqF>3fLwmDI zkiOk-h`o$U2k(aDcvn!x@g1LTuR*^x;5U>VeX+)U-weGm@3sO#>@GUgyT3T1_FwV4 z-IySM>rML}>1dV@0DD$b_wHr$aMRHn@_9P2`N+QkUlVXA>$^rz|d^^~YiWXMgfck#A-Bn|n#BWU}+Mf&lY54J!h3K35IPiDm$M4Wc z61U(?c5nz=rUkJ>GJ#1liq{oL5e*9zOH-O74C6yK-=XfM_^l`RsO)z)&FR;;-$0h% zAMUWPbk1FDeHA*#&`pyZ9iUnfnsHz6jk{ytd+;K$aHJxyGch=IsZx(#R~`e*A5!-b zT@KH67RXA)bu|wy8DbtlOzN)-BMhOA_=^1Ut-AJxS8}sdO%!@NO;N-0u)CHRL4 z&TK#yq-lQlNhz;cbwq9^1nhTIj0;S^l*JNXLZR(X}(+~QV6MEf|V zBDvp|`+~oK&r)F^NNIUTOc;%HV=8Q?6a^kGEP9^Xzs!#S|3rTLoBH^%IZ*8i=O{b_ zmq1TN_+=ok(rUy3dHG}KC9mXI%+SRr>p1S+@sUv1JZ&z%)Z;E1U%GW(@$(Q0r3y@i zdayAE{8$cXwImNOzBtqaRQuv!)u=%>efp#XnK%#)<4FLKKFd4C zGSA2#xKe1>Y)MyAEj5p2%iAhw=*TJqK;DgLx zIJ)#zM0EkNI4@K2ZN58LBCA}kI2V^=KqOF?Lr&+H==Q>1?xL&h%rj7E1hKLpliu5Z zeEjVbhu zk?Fg0@@>F`zfX;X+RI!awVQts@ANe@;+3fcl!{!i(78z(sr)m z)LU$l+702*bQd}b!|k~IRSzbyAAHHXqY0w+BX5`2h8G;Kcu zzrR-gxczSXAMPI+mGRtOmpIxtvoM{EaT+8mdV2Yu@=ZiiM zPqbk2Gt-n+YT8J;m^K95Tx%F7FTyEy>A_-Dz$5F(k^K-J3n48WUOgYrcv<6!P}nCY z$|Nnq9(K7*76i|W38b%}@+bv%F>JI5!4t1?uVxRG(x`J{5fa;1;2lPz<_U`uu1DSuvPD^k*}AQuakV0Zl=SMnHRRjku^b{ zW0UKWgJ(<6G!cEweSBj9&Q4!Cv3-W6IjTeHX-uiPFVcjab2wLLLPwu?Fq84#K=3w1$&1sd_~DWLU>PAZ;WIMfm=9*eib2i$zWn% zB?$IR{1yPWfEyrt&t&*+>!jXhdD}w7J3?+dC(^g+=UcmY3-#NhIJUnY_HG^60(bJ} z3k0-Ln%|OzXdg7Jz6}~G%$d9}N-wOdf?dhK_;A0o+)nw4Vcnmzf`i4?&hzWQ;njrh z^O0xFZ$pNNqs2F)jcOqS%o|?*J#?+kU*&%=m6tdCzx}!H>GCh0dh7QWcTYX%XUnNy z>=5|f7Js)x;D;^#1N)&B95)0i`T!fP-kCd|DO81Q&$tPfTV^eji5*(2F4F6IsBp0{ zQpvsJhvN&2WHP%~3W{?s?#LG(km8GcYwd$OBnS&);G_~kPt3P#(c&kUzr9F@)E>w{ zH zDaI}H%(Ej#>ybL2yL&_o+doXKd-tK46J&DI8FCKsu+W#f{ zA@y{2Uacd$L)(r`C8aM+iLQ8cKdSl?4YN3TM~@f#Grh%rs^&ly8FY#S4tL!(t+OxW zPKeGzcOae?sJz&O0f*+OzZ?>7OCIjj16Q`3R_ch+$anJzyOQD*9R}PV+C?Y@L>qUF z7hY%)=5ivCY>*$Y)^uhYLJiF^jW_06#a%6&X$8VsdS%FY&hACPyIPfL86ZSiGJQQT zkFh44Be{CZ^J2lgedsH){=d|{*OsHm)-`(1Q|x=4?-$;DWBeC*BaE;T+~I{02!Vuo z`U6yDbyarN?&{wAT%6I>IWkcYBGRmwGuB#j`Xe>6I7t_8XX3f4$m2v0suz;*8e zK?udbpLSTSh!{h52W4cpbWXP%EwnWU{BMG6JJ`B!K*S#Yv2_pnxqAJ6CWY?qs?_c@ zv`$GR+ga6S>l*C>BiZ(E%dTQu_x*MhwQeN%uWW|m?R;!&zK^yWAaYN{l3U7lePC#J zrOtL;5@HiN-RuR|U2-J^_>S&FY}-kZ{V;7Eyxs+-+qMSoc7)Mi+6=L$ZSRW2Z|FWn zL^!WQlyBy^`!l)^Kco9i$CoFb0qzgb*P-Uw9@|6Et_& z6E{DMHhZDAsb!ZNctjC&orD?Pz_7@=)vQM4tjk?cA33D};K-3}wp5RdIzE$l1hoXo z2%KRccXV0WrMwtryL@uZzft@vwM|~F|NraU_QMY@_dmSyDd_$FT_1t&7kB*7Sc*dg zxYhfTBt<|7iD4uOlh9VQg2NO+At*r-2tq(G34`QM;~xZVaGTnVH3(z_${@T+A7{yS z2(gt0lN(%)cb({<$m@WJNXC1kEWG$YqljzE-dpUpn)rcx8+} z2|C$)|6R4p`kUzGc7RXoyJ(F05%2YVdGLNy?uyjbxAnux$M!n#!vOZXbwiGImYpueEg#WCs3q-18DpP+Ddsq15ObM{UNC?py+e<~ zvBsTCfN5ilfkRe0+6sYn2M$95a!{vyRoM-^4=xLt^Q}10UQzG}dwHRE8Sq*rKB!=S zHU!N>3j!qW9znh(YG|i~E$&!tE0oJm^UJ-9JrAzb}-n2lO zU^)Wd-DO-jDnFjooD5BYy*1clj4N?|dAN1IKE@$1&6Q&f2WJ2xJv}NpZ?!l7Vc&a@ zd2l^Xo!|rffWdMZNZlWhl=p~}5vlW{oQroAI`3m#TqeB@B49$OX92m9-MhK(z^@tN zZY3n}5j#q{+3@K~nxM{) z^wBDuU^-j+A&>{T7bh21DAq&$cvAT=%Jo`#Zn#okIhV9QBeoe&OW zRdN~WLB~g`TRs^+rpJ6@9`rYs1#9E_XLklZ%Z_~6P=C7neo`1QuT2c5KtcJ~3E`Zp zZs#xNFw*BmSZDr$zX=$kOYQq&*uw}yi`%Ms*3%q0UHB3BWqGm?c_~cX zaSaMRMvr(tVXBP>_F&_x2oQ`yCb}nsb>-e;?)gfjC&lOE1&13CF@i2R*8|1BF1F<( zV*XO^svo|rk)6TZW!VbQ9#@N2)<2>nf@p6=dG-O0^64S!3AIIJT)ouEOqQ+XH145N z8Qz_cYoHS0oANE=`ULU-f49ngcy|>O^gSv$OJ+_-(7E8?>z0T|388MNfQ31@aL4w2 zU~DW`^~4FgE1ESGAZk|>atci;7m6&(f~X%#!7f?qz((_+$+s(G-*IDt(%Y*UIfb5+{b+Q} zp=#Dh+o{SOFqZNN2j)mMC;q*a%F#zLp2tfVXwva12t@QMyh}I2Pwzw*ZgWdgWIzL6 zXzM;_`}J=DzsJxO^BgToEsKuvS4A|V?hr2wr%m~i>P|a8F)?X#=RBVXn~@VYXF<9_ zZ{iJ)0VQ*mvxlbOZNd5(hS%5}Pkn!Lo*Z&_WB(TO&sTkUF|Vh|5Ng~}EL%5M1FX5j zJ0!@D?fgEZ0VAvXAj(o^Y3-VDPr7US(h*oB~82t z+#hf7x3Qj9#Lu>Gv*A0w`As@A{Z2R&1|ed_a(|5fwWjBPYt9dx__yZ!p=%7mNrVDd zj*KD%1>!J)g9J|DI0B+~1&$=WVdrntU^MRN==TevP zomwI|0ROC%?vMJ{>SB(cAw9h4^9ualL1XS*^yg~n?vLu1oV>DTC;plftEN5wRcfPN zn$VY=m^|vser;>q2QTH9$Nv7Qfq(MY-#<0*Pab=F>W@?y@bg@l+CYA#+Dw(*gxB|Z=YnvfIl3z zez540XRMxMLDmjNc<6KMda|Eq^TrLjv#q^)GC98@a~S~yliz2iKmVqUdP{RmO_z*M zR!GO4>+Jf%@>AU7|tr?t=#RF9GG%bqpa@AhZ`bZ?MgrYx88xsqG>EsAp`TEM+ z1KbKh?)|vfx?O2ZXr=n#mZHl5#Vav`UY>^Kj=z|;U_gQlA@d@i$>)$J8pp$T2l*S8 z=YNE_-P_{79ESh1IsY7ne`CHMNIXap7)lT;g@vb?&qv_B6I*{$O@Jkp+qTSpa+4M!WiTBXA z*=9i7iNH#~*I>9Z_%PiaGJj=}z9}>BqRZQxMqAcz4azG`U-yR1$^+Vt1=ayDym4_1 z**>ldNu#|UBKvrnJubt0b>PbBNo+frSf4co|B}0RTah02%_7~D2IITgGn}J#o^WYI4wh4sUfSTR}csiPK&HYtFxMT@}2uM ziPQ$Q8w(b9HW&FNyUPTr`+5t-JZ#-aCxf=Q1W*|5C(ldQ;p+}cHJS+u_@Xb z&8|le&2xRe*|SPO@_l&qm{fy_m!gy~i*b8X+!zQs?oEJAu3v`=!-}!iANtMd4_<7x zPbgcO+c~m|G?O|dwPd4u#7~bWboER+<@gFkzz;23Q)^u2sW-RWoO#hSetw;yM@OCd zeCVx-vLWeYQG%=>N^(2AJu405Ab{WQgT;XhF8hHO+YMY`5aT^-&3ed>64VadaPUOK z^f*Q5DY!ZhJ(Rwb<_KLQEgP?H6+c|lT+xMrS8 z89ym(?YM$kb)BB|hw!Z{UOuP(!2~W?j!kqfj^T9VN|1hhErI-*q}aD!-tQ__fL}?9 zvGEXOXgJ3*8IDU+j(YQW6NBCt+7F6i!1t13KhY)rLc>q<`&=U|AB0NTottV1uR@eN zZ5ObBy0Tay_X34%b6o9EoO$+6SX{jht4%^Y)5>5k-c@&(dhn}R<-CDZEBlyF?3siN z7RWXIZ1l;CcaC>-3a#6D7;X{?CMQ^VkT?cWX?7EBdxZkGr&&81g}m6;cvk4vqqG2bue^Ka9}iwwbO%9nb7xM2<%KQ*4zNQ zan}Igo-sX&>7x*c#!V_B<$8J8aF^uQ)08OKHBv_}42&{e->K@WKy=WA(%L0~0Vfo* zg9xTla>j}C8?@FRPZS@KOX?O1B0q0${rXzCLE(`&^FpE}&ZsWkl`-XJ`Ys{B<2{~V z(|BcZjDfE+rQl~uEuU6}*;71$Re@8Hy#6H)aI*4T7oWQDq8%}(>ThCii54(D>SIYZ zm!RZx(_$snTrOisf_Lpv<;ULfD2XAt2`^7q<`}rQR+5+sPA2}%?kqIAoofYAo0)_JLD`?qpxINmh!Qglz0 zP+yyTL3~GYyKemY*jwS%UirFFa%wAh#dctr?lSV5d*)xNue0U`&eCtT=o;-=GBHb3 z4OKd2ny1gM0-D5sGE=K=-gg3U5=YE?VwLRt2aff7KXw zAK;s#;Z*=fK)AnxYYXnMVkyYrOwe%RNh<01qt8~jxPyy4w)VI8hJt`^iIkGwk|-a^ zlntP*K#fMUKawdwT>DtYcha5zY#G3|j{jsCKV+uAEQ1L&M*AT%{qYl6H!g_=Wtvf< z`0PLZUK-xORHO$>VW%GQSHOXBiUfu?p?UdmF;6uvfs7|hU12^W$Z3aXYCPDxFHo)a zyohFUkbuiP5mSbd>Ck;u+x|r%(9ep7R#psrr?xHemMeqdlS%1$dXj`V2i*I;(Cc^h zPiouW#sWVX{3BJ)b!DXkB3*AFqB5eIop$3lOq$Qk29|5JEr@CDtAPr>BBj zQ3|y6c5R(syLjfx=O}bLe_QDwzFYc`#1?L-_2Vy84|W|)3fV$s`bDgO+z#iWU1tE@ zo6u5fFN#U_nw?~;%}F)eAuQzXQzAM!wx1KO~7ah)!-J=rT^2bQH zUC-j(B51EcU1Quj2Hd}llTBJG!uK+vaMR-i|I+SPu(n+C{Owdw;Y}JGDnir?5dN8n zp2mL;d9`xZEOX?)$@~tS+N18zl~y}e$Bk=8%= zkBBvEoIe_ljA)DZ5wU)__VE;dM67@K6u|ZvKR(4DW)gqtC82QwkXUysb1g8DvjbPY zE{L8pD}#UenAEWF(J;oxLu?in#Sd)RM%QagU2#ggT`~~UL3sq;HP;RK;Zf-MOTAP# zjN%cI$EYfCFIRYoXidh<5rl8v33FlhEV*i3lB570h?rxZ0q~LsRK90b7%}bSEL9{t zM2tkF!|TWs{EG@ZyFbQb>!t^LVDHavxrC14@T}(Fm-FobGzU8-*~Yn^8&N1OsZ475 z=z!<*a-;h*&RSg2U2feegmvFgO%Eh|E4=opXW*JxoO&RB#77yrN3*?t zTRT=?_aM_B$;F`RtdD9Esk+k<23@>`{l}zeAbgJI3oxC9z6*(Z8KKvSUfJsNdUCG= zDrj1+BFB|#UT=KRP>|W(np`dY`uNmW()5zl_FO_|;K|N}+D1i-gl89*r!_WGRrmZl7oteq~}bbav>17jDz6W76QQaqJmFUGr1RIeLzGn1~h05%e8yz z2nk4XKivp1KAc;TLxu3+GUOUs?@ymN@B)%e0O!0j3Y%{Ia`B6@n+a|V^@Tc=n0kgS z*$wp8q;DQ`1dlvE&E=eR0R=`6)GC8M%4a~0dzTY9KZh?IvGT};?1f9U;9`(Gp&E2R zQi(lvoMW6psZ1E8{*^t#Fq4PHas!+N(uurip6KAzFV^x@-cpP9#y48W zgL6xKcuDLH5Z~=?!0&8t-|cR!Y(w{HNOP3AK9_1#fP}R2rnX-6&*XZ)_TT$D8orEd z_GQ(h7lWC{@I=~*f~RE%RM(@ZL0BuAhG>8qvy91z(Rmv97Yn=b#c*_48O2{O3!@|i z>#-+TLxCHT`Q`pZT^5LN0)sQOR6Sux>4~4IW6Fw0qlN7!h+TL9 zQfu3j6rwJ!+FNW&TSRqGOIIS^bqB_<5sS!tjD$MNhY5K`^P@=>{!t&8B!vj=3YZp? zC~GXgd5I$D@$Y8?c9qOAe5W58;=gh;G`<@uwRN(hg8u*6iiV3WgyZ{u$KD$W5kcQzhSxA)+s>HD5}A%5P?8YO~1 z_x4)vBeM~cC=zf)eUGK+sl()jO ztz0_UkQA~zCz9mu>Vc|6MR$jTtBX>fWrTUqg@ps`3=iO z0p6em`AxP{W3t$|4G)C`eMo(F^H1THEXqGi!2ThUxz1)^raru2@9Q#(fIdj_gafZ=GM<|yA$P;L6S_OZ@?w@l!7*7@(23H;7F|J^cwZaeAxK4JuD zwN707rk=Uf27T3dTU(V1jCLe>I=_SjOXiM^>MLCmcORBAGC#0Bj+YcZE#P%&fPQ?v zS(;WZ*Q0*2JGnyRt0;3rp`O6uMrUdgWL_vc*F+NWF}M_dd3bWCem@l6(NEXMnXuzl;23Oq@D2eL(<8_%s=eqSPqQo7BSB-y9(j=H z_c*31|6NIvE;Ruqs;o)e7lojU`B+hIACDGsR?g2`hrY5lzcQ)W4rf5=t_P!+^XU0T zg_h8{(;XDy3FZyKPhJ1uX*k^pv7*mabhnH%rU;Tr)R5;FN-%8KO2FY40>@h-w1M<3sJ-= z@lJ5^s3u;_zj(A0Sd`+XG1a=D&|lacElw!oG9}Ndi#9SBPokks;uE*5MAQ(?X1n<_u0 zgE`PID>e!QyZL5pWd@Q5XPXx&-R;UEQxzK-82$n^z%Um6=3*y?7@O-0QPEfTAaJMm z%N{23Lt9}qpRAQiAx`K2EeD{z+WQ9 zyQGiklXD2C=^c>^I_o3~6Mg|eh5R-PL5wq-ud{jurM<;3$*&EGj8FUJ1Pzn_8F1_8Z z4U6@c1i{)dS9x=p&NFBNwRk+Br7h)DbjGY6iV~SaBU8qQ%|oJpV}Ovoy84vzLe?|!FndTX-(@AgqfG=U@DZoE;p8WkK0~5&dV?3{ z5jHZ`miGE~?;PKG-j7R}EHiV)z1zjOXB?P?!99R+{Tb3KdXpS9JX%~wV_Y0Rp3knv zatoBL!h+2d=w2B8UhJunDFe+;wlf_J62q^^+qkEfPFa7mRb@)#<7)w3nmXH8M6*(Z zN-ItP!mYdG=7kN}1#LIB&r9Z|Kfx(xNJ4LrHg^?peZ-?Sr9BL4P+uv!k=iqMXk#B|Id< zIRSIZ!i~`w@l{GAj=Vgi>OVk?TczB2gD?Mm==h&a{Ywn_SJVEOsn|~FKoEscia;?C zM@Wz&AZW#tKlksBHrSW$hiO={AwqKZ153%RV+_Q${_PbJhQyXKz|f!fz@b}#2nlbX z58YebHkYw4x~I@qewQFyq9EK2x7WGj-I04M6U=@ECeg2=sq3Uzx`9y)-O53>qzJV2 zr)*~7#CAfM?3E?q?nD;G8+wGOt(pXbw}*$}T^k~%mB0t8TmdAcIm~BJxnKK!&7YSH{M|KwUNZ1^*Zg_O!0)g5=Q$AIha`wZ z5Ru`RD5A}*_QvML0)_+%mBL2XA*iRUb!!Q zD5~~5UTMvbR`Z-S(xXMoIdceHILGtL^Yr3_gEU3aF-*|<{VwuhEEh{dJ7mmn0LR6w z%z}3sr-k?BZBg}t2JtLLkrC_st-R5VP+sE@?dKT1TEu@Cl@SvC|0*i~#-VzKG zTec*@f2FFC?XAu6uB3tQ){Y>$g-bly3j8)njWq^iTW%RA_oQ#KXL*0wnTKt09wE04 zA>KLtI%67bt#!mcOT5-WUFFMu=cZ;GW!9dZY|dq)@I#|NT=Uz39_Cm9 zN@|VHnt8g9cz>boC$$7r%^KBx>`n##ejc4_Me;&=Z0A?$3Rq*-`BD@Q5Pb|J6$k)y zKKVE9R<|de(|G<@B1PvP%EL^JV@99;l)|>W&bJk?=jXRos?lkM=zZBV5zbbBF5qrx zj;ZL9MgTfET`fyFv}f(`v?@Fv5YSaLj(=i2SW(PFp5w+klvIDRF)(+J6&^hT;ri@- zB!2cRpowwKK6&l>!XG}Sys>~*k9WVAtBfj23CWKb{+`%_$o6S@^dHj03J4Uv>EvMD zPu>f#$G_1utp=WvEaTd;&fE6C&MNH)hNbOw*PjFZe{B)8kvu${zPb@}Grv@1NV@3g5RLHki}wk6=#SK)9wNKW@cac~FX@$THTjt`S9 zjZQ?H($Y!-){SCQuK4ThdAl9yqTRPnY&tMUsgqSCy9(OeO(tkf2R$$y6Z}(ojQ4bDY%Za=YIzFwQP#l>`|4mGj*Y<@Y|n(eQo`m6aR z1ARON>v_83RG#C`jOp-#YgLr(*bE0mh%&CBdDb}k;}rJcRKmsbb(Bicnw2m(YdM~4HRbgx9N}=wi_zF524qH-ea-jquWYXbwkY4-;f*x*i!||6xiCcaARNBKSTMEHx zM;X?%!KPo=P^%GcN+XQ8Nm4=9JRr5UBk~>C99%mP8&he$f{r4EzQKna5{aw+M4xLQ zzGtcJon!EFxF7N2&hUffR6)1^mG?}J4`w-?`_Xz{Pb{5D@l{oVK?Cb!s8P)AgeEj~ zsV;CB#*f2%HVQqr8=8^3lYa*KM^a^LQu>LEB|H!UbeDC#ZjgWJ+<@n0-E6>3kLR zG1l(#qd?pc78aM?%E3)66G{1rwu|?|5QYX%c&$IOF5*rL51t4xdC)Ui9FBauJgLML zFKs2lOQO>9gwHJirv0HgPl?!SuM_!#NYGA(!f)3$$lA+Yi?=y#0;Juy~(tk{ad8w;(Iu!2qZ0R z{jA;!e}GS$6O-~11b-C$b>k1zNp~muu09gk)L;-2RrA;SR^a0x0|+kZs*3cK(=&9S zEefGNeZK!~eJkK60#|=jadYY^SB>QCnIe*?w)$o(+UC^&EKiY7XGNYXaw#8U5@{b*KpNG2r7#yaNZ-ov^nB%~9># zubw2=tt-R{DiUFWn+qx;(RA~jv`t!@z@36u5V$cf;gSErfl zLT+`d9%;WulJ2gkN+vQr0#B6vvPMTcr7s3SK+cgkav^}nk>uVTG*)`6BJpjgp+lIB z)of;n-u6=%xy#&D%^`S~516|?xgt-ADt{XTgR#zy1RlkSt+1;}6ZnDdXaTY50)@$> z;H-Rl`KOmzL+p{3aPfZ8YS{yqo>U7^8Ry8^w>f@XqHEqng=_m=CnzsO zu*v5UKF;Y)?+)nDq%z`kRTT7KrH}5_VUNS1zXF(?B5}grASCu6UcHiUZMu7Kgjm6F zKD45IyoqhG{@{*La)0^VjSzkB%oh|q2s!o3l1g>)FX6;tB7mS(gI2uFM6_;vyi{crr&(!tRN>9TLq z!KVNA=g7G7D13`WSWOxhPip5+ZPMuHEWPjpjn7BfsxaMSA=?DOi7VG|`_)&8arHXB zdy8h}BOvVci`I=>ck3173GNJ8TA9y!x$-N%om7tQJ_@I0P}usA8QW{~kI7g1y3#4o zv%RY3SA4imz&Mthcy2{G-_*z)c>`RSw#17DeHA17dJXt`aZI^Sj#ir*ne&A-?v7S` zU^t#RxRtJJCOUFoV4n(bw6~$mI$n5RWBiXg@bgv&zD_c@j*M!hKWdzH((G|O+6pN?qb%JeqlIJOB_ZO;Ve=zWKh!Z9RaCq~!rUotH?)iKGbFroGYxc8M+gSb)PUrnz6rVSAAEs;u#n0i=2iy!1< zbu`Tj{*0$%1Ku&^&#Gk=t%?5D{k-zum-aL@9ptl<_q6;HsZdRP18Mw*e_I=6=>AVon!uPwzIFV{lbit@u@Vi%5SOXqK zl#&*|i^(IVy%=ax=u7h8b7cnJhrdxZ^@Y#=q4{f}_!=j_yV|_}rw=~`+uy$FBewqJ zh96=nhQT;Q;3SFSDBhi(^u4EPgw{Wv^N*v!r z7b$e(o%r5?0;Ai3;~I81F|zFEVr9r4xOV-pINa!Rf^QkC6yNlI$#CzOMz&W%h ztu-3l=zbb*u^2~ojS6b3n?hFt{g*v8pUsMGJ~ur`&C270;Z9!!97POPulnsnxfl2<-TUL9uYA%iP55g_#I(&J@2fBI zSAE7!Z)^s>yEs~(1RBlC-JS0~4k7uEb41~b)?(E70}#XfcQ$&O!-GE#`bx}go%8>e zS#kfA%o$hp8jGHTIs3_@t#m7DABB3Vq{}%0Nxo;jQ~``o@bF6vCgb$N1UGSutIfkh zidyhvKww3yNxgZHeR|h(lR4abH9$+OcI*7+KVPN@yhT}{Z{hKY=Os;qE=NqSNK;iP z3<=I?;L%hGIl=CTl|B<*eUp;;Rx+mxAup=*R{|gqF0mCyJgxe9IA$kbE>pM{&rnBr z8D*0Bfw&6Q%vp~9R47(lx#kcajc1mLLYKKKIqQ%&iCU^8uYnTR@VHY#-hN*cgl`C+ zAEHahRBZ~1&<$TW@^q+zvva-02X>Ir(dK~}Lf}E{mLQwhrsnVR%&BL~!SWQUg`7Ey zcl#RT<++sJ<%wjIgXPTPQMiQbvQ_ya0LwK;@2`Oka~Tw6?dm+N%Rvpwu@i>B&AfSHA7?jNH`XmF%ZX+~MfuI}OLkW=q#cWcZ6?#;KXo5#m+anUlo*cmC@S3L1c z0xL}@K%9M6Rfi~h$j_CU#qS|c+DcxWta(4!maxPsed@K)f++c*^2&`AS5kCiGAN=# zy&O>H^$O1q3T9d839FB*pm!Yp#x*Z(Os8wKWDzHe5%82R&_N05Iwe382p82?46$l%S3uC}df{B) z=#;~DQ{7TlHO=Q@nVe|05y~&*qam{EnCp5z`&uXGSCd%=`#sKSSG+Ocb?~!tzTh_> zyh^!xxOz12k;j7?E$^#FhaC}SiWX%te3L77bSaLq#g}8xlf(I!<_w_k%AcZkX(qd5 z1Q?66H4x|}tdT-EI<}fA@1$Cu4Ua3M9~|E0;q6b?E2_bfn}{(E=tvr46kKsgzy)K!Q$sx|okZaCT z+sU)=f<+>s>sTTt?@lTE!2dCX;{OSR`sGc(f>8X=Aru872uUF;8bK%sBT)nzh1U^3%`!yTPTKH|GbZU)j6)(DVccjVycswk=vJj2##?y}{&NVm;-qNTTurcz z3X*$WcN%RItP~dwH-5WLj3B$?LbmBoM?1qLf2kR>k5~cIrh2_o$<3xF-GpH zd=c8RW9})PheMINO#)=Y;3vY)xS@+s2`w_r5Ol+XlgoRcEjqeJO&)0$Zr>Qq5~MO+xRW3#UugdYsZ{f z_G<<0Ukh!0*4YBSq+`vAeXP4cA0}XBskwS7u-jqcD>C}ik;FGWEuKao+XRT<{Vp(* zt=6b=kMN}_7MR6EtpQuN&w}c$4y|ix8hwnt0=4p&|311c(Uj^K(%tmO;@30X z!pb{+erKM(y+*%=_E{uh@~d}YmcT|375-@41>0;up|12oC@Y+stN#|dmKyyTQpVbL2IuzgC+}$R-d-M0+ z=wJ1;M#G^&&DjE}hHiRVfVNcQ?t1xgv1FMW_njoSr770pFIt%+y2Fp3DrT zgWM|$G*lq>9BjkT`p4T!jJCM;=`s=c1vFG(iQ$%mpC?Yhv8GDTq<)9leDH&nAH3{y zl}t4?gYBzohO;^`NbiI1P??IwV9bLtTfhUdG;eIYK7^iJwWdibzCM05$?T#bpB>tjDFel+ z1X}3e%n!q7Pq22w-Ttca$fvgI_)0OokLy`QcFvtHhEh&zRah8(p$*_~Q0AXD)NJOa zv~$C;q7U;sN4-Y4p~HGo+-^}%5QG|<sy4 zd2^$Eq?{T2mHQ(yD`Y#E=O<{PH<#Ax(d27m$Z=>hPaEuf29$tFYXiQL0#rdhs3h2Uw3tdnw4S?g)Lg&tN?OF+Jn2U%v zhVobHgfJH7tHCp%&ynDtZ|#$SWh^mCx?1#Z{Ua}~%ga?L0ABK=Dil4=t2b^a9RnO+ z`RmT9_kMyCNV-+jP-FbdImm77xEC-}mSf>Q88EK=Ig^3IISRt#XltG?kAluVvBlI7 zf@I$GWYL;SdSyr6TfMWyIVT7~e69htZsHcrAp)CVKr1JmDO5v9uSqi$XLum&iEC;B zmCgpAJu~z+T&#E2fU^5+h;yeh_aJGJCwA!0Y1;zBKzN#$U-J6hy`~zX8!eoxJd^{& zWLw<1of68JHNR@_c^Qts4HvAW5be}-ve|zo^Ao+RTA4oM0Zcb4cz8S+35Jn*wg%X>z*Gi=+gu*}yM)9AT zAAW_6$O;&@q$ovfnSd|WtmrN=jqEx#D}3AZS)reT%1wc0uf#)k>%nAK!w%sMV6I={ zdsp>}3o(3Sy(zXK!gb_UYM1;<^d{PJ!7DQ-u`NT3AscuM!;KCn&?cn1KFk-un1oxA z;mYKR-8L589~gpm1y*A30tfeAZg2;i$X3^v{iT5l8*FGK{bqh>rZU-FW!`oRwq|sC zK%&P&{aFed{G8)89ghEq^&7bI&8xnwFz+q%)-4fNtc27{B6>qSGmcvEFU^ieK>6?} zpRgTuB^U6gwQb*(wtdHwH3#5%y^b3Tifl$OXK*pN??Gffu5fo{-|?(-F8Iwd_PcAq zrTns%f4UUlV=e!5DZn>6|BI#kd;3_22Tn5n6xV&=ea9*tK37XRKaF>$wNY;5Rdc-+ z_pA+^8HE}2E(<7AAv2-0h6l4;LpXOpn8~n*K=y)GnOd58c(l}!~d zJFcNT%N{qfoz9Fq5;ZwM#(_%3$l7yRAKuROYd3{P_S%c&#w#2>J{nvsKTQF z54yQqTA8gK9PxJpH1C&H&q;!)Or%MYaV_&O9I6^SJP|)oE(hZo>itOy0{;~k?mMH7 z98dm@*2b?ooim*3%2RQ@#kkNVgo0U{&_t^6KFAqpeN^($iCNKqVu zUogK&B~qE7#YKxm{*o=5p5G<%(m7Qa3}t2l*Q1EoNuXD>ZhSO-VaDO{tfOS zG~Esr<6Y=%jg1kpad&tx>WTL=Nfg@;FvB%W|BCOYTj$HVTVTZAM}uuC<~97Uj6S5c z-Wwv^{cfr4ZPsD&eyq6;-VPU%?Id))9gDWX(S997w`GR=29hOz$@j;N2;#*b`q)n@ zaMe=DxkO{$+0%0m5aE2rw&13Zjepk1{@dXh_@^;V`bbdirhwJAnC8Zfx4lF4XRg16 zX&%-bc{`O@KEgEc!^M)p|L&52pKUpRXGy^4HT}+#zE4~Oe<7@GsXk5&OVmY9YBeD4 zJjQEvGPQcS%`An?0nmWFxTJ9T>bZ!u7bermM^+8BiWv<=3r~8^{gx^cCgwYszfM&` zWCq33bi14l`q-^pcS8BlVP@HjmE`R7uee?&!L9Kg8W{|h43c&+5O12Gga*WVN09}jY2@0-fobu**tYm~GoD|NKyF4T=cP~MY zb3nX1-2{MCJVWuSWC?DM7j@RO{;m_Kba-B2n_KkxaQ*TBW$w+o-Ndpcz;}K{y{o&Kr&_BYK+Kbv zr#EH^0TN;qzrI0EyKJXjnN{D{y*gK>^BM_s?!D3`;_TQFtc=COwXEm9B}zD56~+vQ z8~?~F4AJ-BG3<#6(DpaXNFVxTR(SD!mTAgs;0+bA4d>9PJgt`(>}|LnmlWv?BNntn z7%r%^K=h@(^*4a@b3>jKv8^fd?ppWK59?a-P-uNEXJ;6o{aYFti0P5+sTvha+joAv zBBy-D-=XdZz6|A-(HcrzZ(DnIf$B&wLQ^`tW3E z=w!t91erjeltm?uNnaI+m`#)qUP3v1=z}vt<}@cyBpY4biMl#c@-}Wk_5l+2t0!sL zGDoZh%;+25Dh}a9DaPLxx0748vIrWHJ?N$(Z==7GA+u9c`K+g4HN%diO7>=*C-k5RhjRBtx zG5&UgEk@Hu2AtW=AAMVqn&*qY?D&RfP)uLEg6x!29l*I=xJl(dukmKMYl8v7+Oia) zpB4&FYtWm+Nk?Pd-8jz=VAEe+lE0-c zlOY)GYzQr|zG))x3ALyCCYnz~y&`sq+Zln)tuYn)R_LOIXmvhfh7I7ltIM<}mY3Lu zCeXT1Ib^|n$FIxIUQ>U)1z6 z-NiDHmS;U=!E?RKYqS;~iFBF<_PQXUytUpGq-5UKC1J38TmpDuvW(C^PDNGC@_pd$ z8FW59!==#?P%XXJCK+I*HF??N%F^K!=#lRZDSJoLZhG4TkeAU$S3H8iekl|H=ZcU69 zh(jl0N&?rm*H(Hr`82S2fO`>Uq=PaqH}4onF{hjj6(7n za1+Gw0y}n1KXEMkD-p@T>UVqyC5Iw%=jw;%5jpzs82pzYa5$Pi_&0v;@r&kTcUHgO z6H#dMeAFg#XonNX>c0*+jeZ)d^LgwTYJ~K^~tT(cBbUBxEzGFC?D5BGKL*_{A zJ*phdyC!X|-rhK?tWuBU-1z!h;Q%XS%Ftq1)zzV0QUbaUX20eDqFCJHvOxHbc#RMx zl{=KCHR~Z}z}WGEzv4|%EZbd7vLa~|RjH6WX2=TCVbk0nOWp0c>y&IM9O*G2K0>=u%JAJA%^B3Olci2* z8Fw3X2kGcB*lQoBi)Vm2lUKDwsoBB=O0mD68AjqR0?^z*&B|1bmtF4cIEqAiCXzR( zz22NgWV02&bEZk6O_I}|Dl$voaxecD_>Pobo6ZAXR6?PVFtPMlMKd|@BAFzN1Xb(w zGHNNqVD{+H$RYbP)JRzTqC|VLarG7gkL_3$>< zr;Cj*$OOPaCk_ zIE1|y%k`-@hyMJ{Fkl1vj)Gm+cj(dt^}HkSJWCBi%(V0(oAo(eQ<)-L6WXE)u=u;g z`CV~a&x>R2JO<}Mhb(jEL1LA2%{F5lUoho$5*!r_id0OC6BZGwc8iTWJ^+Ma^!dpZ z%XH>R^9D;ic8W<*2-k5;z3kCfb`<3?GQSlNV)Fip*e<0MMi(*QMDY@UAi<13hj%*| z-kq|tvu^MwbgX&Lw3F-ensm*0-&s+8&xFNRo=KjHMlD@IvuCDeHG%aqp?bezdBBJ8 z%EVJCIp=~VtS6iX)$FZL|Dq22=b6sU@>+>ElaI%|jV1zLS9a@wTxcS4c`F+>lzFTt zJ4SaL;rt}v?8&fcZCp3`q=Ac0`z%Mfdx1lrI;69An|Vp2hy!5;y~SuU>obeOZ;iLc zH!nPgCM|A|9}3_gy*CIIlqsW~Cu4yqhg1_mZC&+PBAHBq&PTjngDV_SnfxJgoP1;! z#R^t!POpNmD3o^Yq}=*4&tmai3XiojZn;2P4LO661)OJbsePNP8Hadm;EdIwbPC-n z-E0=p=q>iM>J*P%(Z&yjCzv>etk#NSstx8zk0oFN5v!0#HhUAZZ-dzdSKjHvbs**7Zm#l+|fxy<}k>BxoIS31=-kkdV9%TwVyHFJY&_s-!Lap6`WK{yqE z{0BMp%uc$Pf4G|ST_W8PYl6T>>U_~OMR&{o!DLBZwEGuHm;b{qh9Y@o*MG>}Fy6-L z0B*y6*3V(~|GSs|mU#dB%YKgvNrHk&>NAT+!6;6nBt&34OhkwsE+RBS9C3 zBUF@5j~O`O`W19Bddg7ndSI>KP~6aRWc@OhvP?EP&+@RIeebfGzlN-lS* zgkt%QmA@*a96S8HA$SPbegIXD=np%z+ZmX?-vx|oEc)Z|brj&o{#FBIh=0vm<013S zl%e)Bm;4XH%H9WH;_v!d{tBv6hZh{jJ48UX?!8&ZgO2UEujtA-5)9<^i(>NF-;>vi z%P)rOZI>^KN%-^l_T`uXKbDl+;p`83C0PCm#$KCLTz6d9)G{yBQD8S|uzxKIQ+#Hf zI5Zj{3Y9uJvr5_-P!ihk2RwHAflyb4V{TtztO#9M@7^3K2%anG-@^62kCl1r|A~%A zp3gWzH$c1iT{GMbMe8iCb*XKV@8bE*muPOkmmR~st_2zF_bi;eD^?rElprm`$rkGP zX1Wy*V7_<;iOm_sF4v~Ten8=rAOq=YC%sOrqO(PuaBIA%FulFVwUi5&h<3Y)7x)u0 z%|JpwN{9;Vn=svPv1V6AqF?-51-A{?CrIQq*9lo(WJ1x8({#Cq^;5|3N+KHSoQ;?c zJkv}0>hJluA{!__V|>2}#|aASidD1VxK&nndV?x1yy6vua!|R&r}z6_wetd~ z*VE+;(`zWaC#xHtw@A_$;u60fx8e*jishOq-dqVVA>wRD6C546*N&g_wxjL_ngUut z+SGG~#da#vHPDNh)l`+aU1a8-a>@My%FDepFrETga|>RS4cRj3bMg~o@2@NZn8~xD zNJ|Ba(<8TJ)$W~O`I#8t9SlFzp>rkd^fqtI!pfPdD@u3wJ%roeo$v8-=~;jgb#HQw z0=4G!!F!Te>&l5opy#5tN$H*gE0E*J4_^0K!wifn9VmHUI#MExt20JDz!Na)vX7|6 zc{4C7(bt3Uq&`4d?%Qh;qjaBA(nXunr?sgM!@4rB#>G<1<9&>gr56w&b*(&5y?|Gn zX05@}uq0w(B5V0vLiF*bzAle@V4cnNHNOl?ZC-TGSCKs?mZhls4fJ6b2`6F12{ND+ z70dV@`F_;J4q@1tcPDkS{#`u6(cc4p+2CWIvP{I)Q;}8u)Vl%Yhs4b{W?P$nhJC;v zV&C85KJ&@$KMnjQIDT6!n_tV5(&gpoR^{9oj0c1;Zq30hxT}`OC(lP}-QkPJD9CIn z8s{_x-13gohPhrz(*A~}1}yW=Y2DQ@<82@clz5Erx-UL+rgC5oGTb4e1;4lKQDWPQ znwGm9jZNu$YX1^0!b|Z3qe)&k6XZDvU1?H3cI^FG8|(bwpU)(A z(0x@ENG#x1Nu=zMG?19LlUVkd;R?M z$L%ruL@SrY#}AP_U>@<=sobBiUmE_vR}wv1(8#CV3zY{r++QzCj_(CVkF7xZ6AB3Z z^6Y{^p@Q4bQi+WneirHc$Dr@Pe87JR`o35uep5aF z8uT5_-Bte)^c}~Ri~j}m9heXJpMbst^8x=2==(m~9{3mN`?b-+H=hNrlEIf)HKRhj zR9d-=9E0gP38?C8&04r&_(Hy#??h>*-XWg@%k*-1E#H1rQo6=KSZzoC+VkG&z932W zZaSCq_WJ?gxRT!Tc*RFK456xb=T9kr_WE9`#`(#zfx`G%UtGuE_$&aw3b%dR``y&m zPORYtP|{OvdqN+I7pKGHPgY3)Q;FiAjTSOS7p=3-O2uogGxu>@`jWZ5GR3wobd@>i zR4*DITE+r6iQ^E1=iQ`p3oXdf50Al8Hj;>xsjcKig^GlwQhRv_)VrDjk>}F~Xf5ZM zfaP~(0Nv^!rf|8rO#Cd%=Wx%W-toeg)G`-ypTpmutNHzWi*S3j$@BFni{aBC`Nvrn z{=pCku@l#iu<(aDn*YIdzRk`2x7YZgiG^kBOga)=Q3f{f7zfko*_5aV<-h{4?SB85K;Ck24{9v`}`Yy%*o(&-~B<5!g{-_otDc>7S!H zlO3iEByxB{l%Mi?c$PySTE1T=`K$6O3P*Vbzwv5WM7bw4pQcp$^>scT_lFbVVN+AU8R!l1r8dDQUo+w9)k!b&UYe6eEHnhNwkAi zLXdUcSV84p=OB#nBc3@p#$gcHmXO(|HU!$t2IDutVCaRdu}TzP7aEmQC3w3z>$nf} zvT}Qs=FdhPz8OLE$}y1%haa9fXhg5!DO0izUV)IHs<~&85=|SD?ZwE|PdGY3Cc&6> zui{C2!msamwt~0(Y&be;b&ZboKwMjMn2;1`sn((`UPsqE&21PaQ}?-EHk+BT)X(D! zBtz5-I^8LdnAK4iy6`SPvN613M} z_B?8uvuugf}}Do~ug%A2>wfEAn_ zAE!VHF2S8{eYUICM8QzDo|v1rgPn_GN+RUcLg8g6MP8<_J`I>O>#{Wb*ebD`t(abh zjWK3N`nk?zz$h6KcYWTqjd8wjm7EV-&;3@qBL-HN#r8|)EyGtawp8)3|5u5u;N^hK z9HV>GqAij9375A#X+J5Dkt>u-457VgG)J>3Zku-+2us$|?GALlG;Ys$4WtM(M<~1L z!m{71hy7JOfnDUYE--~#?FCHanQUPjMx>Y>vD_KaJN`c$$M^rAf#ZR+Vy}#dG3ml0 zUmjo}hRZ%r_*|f3>*K_fVdvv{k;PODw^R3h^#H^1jPV;!r(YD*KRhWMNoC|$zS1pl z3*50rt;xQ=$=MV#Z;g!MCg7JCayc>j zNIiO;=c`fXjMuy(ad&yVTJl;N4~|f*3csl}#Gb6sVO`-Ihe+du=o<3?zeB~Fn3!38 zb5ZAv8X6f=1zy+p99Nl?qTohQ0_LW#QymgFLLDFblVOHm7$B2^`qZ|N*C z89RDD)clp@WD1^`X6mpy=xI@5auB*FcR@z)Z;E0X>e zcUwP<_BW^>g4DTt5)Zr|Yj=M;P5VDyGCxa0PP^z8(!g!!=-1d)UT^EHAz*+8P1R885of4?nD%`9&dixt^4YOHu2}MniOZ+9 z5wf)Ue;abnhj``(+I;!HZ^yCo_0}c-I6wZc|KpFK`|knf-#_asocz-n-@`-#g%0y; z62>5e#t8@_5RArmEQ#UpF*kDzWz#5ypcKA8iN=0~A$O>DIC8=$s^>MIA(EZ_?VrBKRJUt06YQ= zerJDuC~ML~&W&Wp`3QP6X^v3Dk6MRJ4m3#8hkB^MkKq~&Ic941l^-wgQSlV%XU75k z7-%O)+bP2j07>Tm%+bH3=-kJcBKW4$N!y+ZlBYXAD?BDNCm}2nZ=nnxAIpzPANm5= z+fQ~75cZu>*2CqI=A$*Xkn1yT`N~45N#j>2K4Ys`Gts|hNW%E@M49)w!$2@aXy_Qm z{$_W`Wt;9Y=#DKRL-@n)a6blocX0V{Rs(#$oWER+6fHaxNq_tdj@yC&s2I;PXPJvC zhL3$#eLYsZx$nS_ltYMhO68=4WOsMF3mH3*o&>s5L91N`vQ ztm7OoA8(^UyEhV9ZQ**es!lp}bjn}KlVzd|qU$ex%9rP>XyxO^TVQPNV07o2y!9(% z;g;)+dAz-Avv~I>aa2^AELAC$DC)zufxl~O_|xy7OZIzaY{?7Y<7n>Bl7yXF%<_FimNGifHg6W&Qp%8x?2~|tEh%Xy^de+nfWzW~$W5_pl0+TeSEL5z z_%^$NvQ*cyf8C?!lCeA%iIx^stsO8N?v?|T7!T#;@FE~8?&Uu$Y5#dS`_D?*FUlB7 zk@%69b<`}HLNRnNV&q=eXcD8SPe3b1!URS`ACp4rmvY0DI!5bI@-xKuu@~HH1NGsT z`{%y+cmsa%Dm;AgvtPUTV~77LK_8`OuZBDAJaSO+LsNL{@Z|>yKD_upqCxs&cDTPL zjP0!ZcP{?P;l96@SOPz$U-oK5eEj=~?343_A3K;7bX*9^kCt`@w}Umy{nYU0-1@uR`>XCI{zs?C zC1Nv0J3&w1*Z{baeb;I}&{^xNql1xu1daMH)qy`Zet|!Ael^%HMai95h>xnEdbMvf z(`=Tw4_tUgaC@(pdFL2T?uEv>bM=wLMpwAb%lw5?W7>AyV78e+ znV7T}ZBsP{VZB~RX_hCFpX2c|#+mRkJ@H{?2pf{nT~l7G z=Hl_?^%Sd@%q8^*C{*X+`{hKrAbLCBoDOZh`%^&sWxo?aXl|Vt zh;MNVVM0@7n_CO)RW>_Sw#dVQ`u1#T5_nv^kq_gd;BUB5&)tc7PE^Stc^^1K6Ftq? zTbtHA=QlNq4d5xx6G+>aX$&Cjfy+BGh|eW2AQ@o~W%(l9#-v+{xA3P=yO<#C=yZTv z2$8Yvs$ML>>-&v)`qjx=^_^c&u$>tvNeIXNUZ56u6DFWd)=PMXpWK=RB5`vHtnwt3 zv(Nlf3V=)KOfD~;5m0R%L)=O`TddddQr#LR2c9Ue7it)R1H}&h_4N~{UiHFxyF zRdkM4KGilu7cZXbp2p?5zzG9UVHmnzOYph4A(!_VJPnssqwiV>?_BztW2696H@$w< zO^zV`oj<)+M}mTZl6r=`taIKIHnN^CtnqeGfeB(>7ig0)BcJu?2( zX=;1E#>=JJ9&c)ply2pu3$nS5Vi}bZj%#~y8Sy=qIj=c@L;3NUDWrJ_x$;y5NFima zQU?2br>6H0)cXos_TsyP{=ji8sBRfAToxXMHd?{D@&(A$O^)k0RuGJhc~;JyufA^<@9yJ*s}2uz^o$Af@5bYkWAG&*4Mb!ixztJIScp zl{0T-g@p|%jB0c?dcFwP&BUHbzW?0lR>d8xG+4l!r>EAbLH91}zBA|(`>5k?AbTWO z^h(&@xfuPpQ@XkZw{>hfzV?~=7`~qu2WCuZVHx{q17{9n@9T7<1TCqDbot{5osQ>)zuXyVFGrxyZ6p7J? zERUusii9W{hM~hbAKI}MOzeLUC;`L2=7Q+Q?H)VCcsu1fToH%^P-P#dW%3hVS3n2i zDTr@_wm-LP^P}sKeteX3{Ah|&pJdYP6K%Smihm-DcCtwC2g#2o*vAz=`CTCC4#-I4 z(=slOZbm{K&4e9N7XI)5QH-KtI9v z=trlwuZD#Fk_(Cl7fimH6k1lU=1{2hWM43gvkruFlDt2+Yt3J!+duVl_7$=m>1|LP zDpMR9hvxB90>0SsVcxml{pWYRd5;i8<^r7*Slw5Axxy#pPs@O>wC`n zVphm~i4Fxm2ifmeUy)nkDq=y_`x=`2RFQdKAIY?94D{p{N5%(fjWb5agXqA{M>Rdc(ZhWJa@|r z2EZO;l1rgG)(J`BF%?R!`}^XSo2km*nBM>S5AhJ5oUcz_B zWY6FDT0iq&#VN^75#hAWA34HTzWABqn$tgsn!Hm+;IrSfG4Z$Qv-|bw@uTt`Wvn!Z zmGnQd+;&v-)@ymWd@Nb*1o#r>#=j5IiQ)bc=Juy*XNS6@FS7MD%k9Y}l0U`B6$N(Q z=*7X>L?!44K7uisf{Z7#NrPC0~{@_i# zQer`DXW=p5ZFj~{92=Jz@Usdv*VA6k-y1IF*@I6{IrvB(T-}rL^Nrpnx)CyBnpPZ# zY1(QnytwV(@Y`Kr=R^QaT-kAtghn32OvF_$(BY$KF{Fm3u6SHn3HZ96URYT2(~a>? z?pY;~E7haEBF0>|0oFjqUG?4usR(0bV`x>MB;1n*wk&mHU_>R>ACaJ;mOXlePJ>J_ zz`BQ4(|m8NDh5c3zbxey!0gJ0p_2 z-&)?>3wWPYj7|t=n9J*xpWlyJb=#X-K&w3)jYCT?9t&x+^}0Z%=zh1b4_+;{wAv$F!v&x)DJ%YtDxD(ZCXwa&a z4kTc5;oG96UP^>Bvchlg=d_+7sAdJK*ieR*%DAjE6*ByJO~RD{eN7bkzEeeTiU^<_ zWUwqqN?WZH{s?nVJfTjp-@q51VUm9v{_>-vJ=JC5sUaTV9MM_sKc=A(Ij)XgB=d{> zwnLNjliS95`654HEOx)yvM?$!JO-ZnJh#`!eut`w+j9rE@Cv);<+|{#qYf)8-2iek z)aOm#nJz3LTq&gl1(nc=O*Y>oLbcHg1;fGo(y-Uml29{w3*L1~{9>NP_ta;A!{g!E zhvt{*G^3Jjff4LjywgLl6;6#N)aA_!Xmb?w3`9p7C+*;<(ga8 z-iDgLltdy2pr1X`XNhP{1Cf?uu*_hv@L4A4XT2iXysIz-_0R*&~UW;sSQi zJs!`&$!~*6K+HxO!3PKx&3xipHgfNSexC8=7Wd3rC=XVE&Fcfu@WgygiYh5fz_G@B zkxOKvDk#Kd&I_C6If5D;H%5`cmsu!E3&LO8ZHP|dbE~zN02l>@CwG2-&xw!6OBGpo zAl^HFH4%@m`0Q;;Z+><4QUgl*C2tcq z$CFb!SGjJBO7K~^%Jo3KCFuZ*10`Hbo642ex>hb zl&%k5Gs(!vyX#gsN-;!Cxsjx8!jaXUC;v+DWfxc;5OMcmSXf`1TzFXUa8(4BQ5KL; z!;+X&@NJ&Q)K?z@F{M$tIG!8cl@gizwihqfe-PLEod^97UiBC6`@enPKm0%cVPn5{ zzW>iI@(U;YpP%)kBmRND4ub#~p=gYvFa)Iul*H-%)A&n%xr3D*6YcEp;F0hrfu}qs zz;*;imWSeOM>acFg39BszuBZG(gXIS(9sIquR+2GK*B#kw};mhbs(rC^@lvBwo2@n z&LVbDl>QU>og6s*xb@}a@uUO3eS(bOLbEKkz-BB;U@T3sEb99{pILeE}OwrW>d}{cn6W@?1=B@&)l+RtsTWL z@;49Tb^OuC{-*|=e1?ulpq1Yk`|HO2`ToUi9{9s<{<{bDZx8d5eFJJGAzQ&R-FTk)n3j(L*Ih{ysd%N%YYIr~O6lKodFJUusCEsZ% zdo?>MliE&Y0@i2C1;$7qZ3T!VF?Q9k$Pt=rRqsgjoaDY}Fle1uo({^$1<9)(LtE`# z*U+l>uJuYUAlbx2`}a$f>--Thc96Keq*qPx#YXPq6MxH!;UAiI{<$Xo?X$iWp?{t6 z=c0om5DL*GLSQh7K}R4YhCw9qOOY(}3CqZ#PpBAtkhNnki#R%HhX>~;H#?^ep+bHn zfBmxP6d$V)IQuf6dgxP8>bSrcRtA59w|9EC*PtWlJ3X|mIsH!x{(Tta{_rt_b`UInhgSegFu$_S&-uAK0p$ zoEaI)z4EZgddh+jolZE_o6nh5m9Q^*ub(mbU20EF%p!UY+mPIU3k~^7)D&8qr^I=X zrJsz;U|;GtdmWt9MxA5sfG@Ij= zr-dcYga+><9-VemoF3Xwe`DG6PM?x9FQbnxQ`MXKz~aY?0wVCvp2C_g;1xY}iFBH_aCyUX^1Ko9Fw%?rimK`%u5;3$1ADn5G5#pqHc;OE zDGl4`QdWe<7l3u=xAT_K+oM^8tcMk~HWM;*tg{$xZyDOQS&$!YwOWK)3W$tz-hF!x zC$X`Lbe!J6l_)6+>{;KoZ|A0c%9Xd84=o_aF*LMgYjQmlPgS?ykx2IzB}MbRkE1vk zphQ1R9Ro;7Tlg@@-<$2!MT{hCDWX{N+9{@@qJCT1%=I}vPPB?OAiDVIKK-;H(i7|9OXLbRRn$`tx5if8+HTUba}?dm)j`0qj9chXnnJB3m~Jco5r-& zLwn^S#w^wt6*Le;mUjQdUnp6qd?FuL3p5K}*BMl;`X)`!aDB28bblwNCZW%!vKZEu zwe}rGjZ(H-(>FSC^1%tMS~UAFuoCiLVWq!1>(5vT`7>6+FdBmnqW0Mgry*=7YXn07 z(o`KTj!owb`b_)~pEe+U7;ZqH%vSu9mwh<7CG{nL(Y z4g{7R(yE;p9R?ZX$2g-n+|?oapi1=bl6t88P+=XL=${d#9b6qy4myUDh>wvvRvbp~ zS$0r1?Bgj{ARi-j=!23z4a^)p{6lv1v_rM@V-~!_IkMRC;D3dcUPEB8XD{hjzUlw8 zd3&QM3k|qBV35!~M&(X}Y(TS9I5QKVpNTVQ z_SDE`s&fhCmI~5@CYJZh;wa+<-L-2In|bD{=zfEWi#9K?r6y&Fz2vWgyaRSPDSla~ z5~4U)R^68SImEC>Y2#v>3oqxS3AM_ev0-U3zss4&Es2UOJ)!S#GN+&dO4`11u%MaT zNk=AO$&LD)s1m+d+w)N<-~@YAUZqoVC-wWITHLs&-DQ;9hXc2&=>sR!WPL=+RUw9X zf{^Md(>?2M<Se7=lTI(AGZwS9No+s zYshYwZE#+3G_8Yyu*9PpH(&8jt>Y9|MCjx-eosO9=<5}?13-S!y@O(`oXWL6g7@}r zkAXktv~{i|WflviFz)6leXBk6S_S*!lko{DM%W+h&Q%jYBvF5ArskauP2wBA0&ms3 zPPLmTkt}iiTUO|A21etZ5M(d45bs0=J5!_xNSdJ2qGPf$=Tu`) zebl|86ny9u0JX|>vD|T+IN_aDE)R!YFJ8u48d$K)7A(Ub?Gj@AgyV;qnC*Ixb0^*v z{-mSa`wXx!-J%j?fz^5)mcS<`ajLA-*RmBS=AP%LIZ zdduew9IA7F%6)#iZY5pWBm;&8mHICvl;dbTk3!M8)!9bgIBiC?lHRK1`FQ0^O#rLL zKknx^I&<5t>|dc7oCrOtRJItpF%cB9X9ZuHTLlSX`Mlr6$&D11g!EcUCnLiK+)EQ< zH?~?crMW*;om!cad-UPl73b7FnUarC`=^NBc*@*=BgnO~>NPv-d^6Js=2U=U3Nnb; z6r|yqFzzpvpo|30+UvDoauv0)@k*Kn169`Nd!Az6^Eugc8cJT)$-GQHKpq-{@y51A z!--t^8pwHvjS5R4sZ$eAtnsaCfge+To_#3Aq9i*HaN?Sm^l4uiqXCFOW1^XiTt5h~ zk+Dzr3gU}*L0Vpp>vbSSsrFxBCG@|-N`H0MpRp493#>%r7zD#8aSY5rB!!bCh9b}} zB?M@3?Aq*L1gDO17aBY4XYnsWZT#4*Ii{(TPd4CT9`WmarTlm<2_M@#$d0i--WDl+ zxR6mF{Z;-MpCPDYt_AuC2@>dlWf<|h!5Qq>%t}7V28UjpIyR!x&u|WuACfBqKb&&u z&)(IJn|8Rg1HFCCJIcf9103xOK4KHmV>O3VJ^iG+CLiVc-$-;l)YK9216G=3?IoL4 zqaY9+|5+&Y4VVD`6P$Da6X4g#ME_ej>4TO2CphU?4e-}EN&mMIFaX0?rMq1u{oSgM z$SvMfb`5w@A(|vtp-EV;u&$6Rs5HVmJ*g$!o9h00p8c3c5+y{SzP#7+27-Mk=Avv1 zEHC)!ZSIxsMBW*xcGi}_1t+krc7=ntZL0{+V?4AFE4PQ7iJthXv27CY)r%!uMewTEeTocWcilnK z`J8sNZXn6#Y7|VJgkkd22}ENJeKK377vk->2&m*O5KlfQTrV7&m8C{v-sJ+Z+lvpy zs{j)z#MSTkbiIU1q$WNL+wpkHY)#%#LV<<z|b%4B0j#=dto`6WAx#8vs1JqK`Z~vr+ldvGN zD+ltRQG1z#K5499{J4)@arlr`k)N0>G(GCsUKaP4!hSa+b2xVAAJ>W_GWs*EgB*M7 zF!I@Fr;m=>QE2f`aLXs%3r3HBvrkprs~1%s_3X&%`bbU->R2C~9#1C!(uVPu6>Aae zIa>QHd$QIqq@Dk-S1jxQR~5_ptBU1rxpe6gd8}Ud3ua^it4pKi#3;E0(gh!JaSmob zvMcy?=kg3Jl)K9&#I{Y>@O=X;DI)tU!ECzfaa^^N&U_A`jCb$0d^~G6gz@Owdgddt z8+Mek8`Vh}b<=k&*R1Mn15(ugPb-$gxJLTQO42V0(?^Tcy$48PQ1LqvE7Qo&uhr zQ&p3Gg(EA^uq4wGP&Jf!?Z|s=OgsN#E_tP05`U<#*lX~L>}ANg?5&ARP zhokr}x1^xY5OR_oJ@*}>?6rl$4~2P&9sRnaKb9RGGx}rNkNvu6r5|tB9Xx%>;KQM# zrW~pFLOz*QheyxnIeRhOR|CU`mCm7jKtIZX@)%Ftua;8(ME+W-nID<~_?yR#$pm?+ z(CMj|%==5jlwb*ppSNNT9hJ^oEAXSEOswekV-cCJdPw1rKt3af6_WrTKGtD8jVJZL zeD;Bl(Z1*pNx*-nfny|M!7S3)l_)hyo6$ymROWT+LxuGXJTc2|z&v{GmI z8YKG3c9Qtbr9(QpZC;Thb8so1@;T(h4BUJ>dmnDD(5JD?$5TfL8u7gOM`l2~V?_DW zygQ)0N&F-LoS~O)E_vKa*L}jgI5bDPbh!4Ho9_J2s)(Px=zggHY=k~)$Mp_g#UlK` z2R-)vdf!;DVtUY+s6h1Vq+Ab~_@W*I6(!x{;3R6r4H5C|ih4IcM-eTWBT2|s4nIc} zKlJ4kAZMXbdiW8Q5L}SKPNBzwtB77wu*-G5wJ>V-EY>^qg=dl=2#dTRr=_eON1?GE zH{mrCFp33uQmZP&(q(jLZpgt|oY}MJr@?l_9Y5wi^ThMyc?*@6zhXjB-^<6nKS`dSl*|)@92iZPrcl`U1>dpe8L`3? z&7})fugP~O$Z?dxv}wm}PA)RNxcsD8nB9*_lE%9tAMryTczsWYo~p3(g*VlFK@Bub z53j>X)g_3`&;6m*FWBuJHjTOCf|RQ(jOuyTcpPOuzsds=>!cf$!>R1W$R&}z`D(@# zA+D(Sg0O}Qtb}>c(c221{*97qS!7{+q6Bh;t)4SH+~sDwu7{XOF7J0e7(~H6A8t4J zN41BX8555J1$WEtC7C#Na1W+e|O^(qzI8waA)>R(0lfkJ>d&|t|Cp3)CInEL* zpm=vK>zFHlKtO-3Ny%N$Opmsm=4{^@<(YolZq#IFGBS_6r4Z%o{K{A-T?R|^bJmCE z&h30HrE{7oulIH>rCl_77L>M2n~AB+SM0U5yl=*gzU{c~sD?R*N*GG=RcO~I7J6~U z+vUvsuBN}gwkiBSj^*0Uzc}j~^+AA*D!j6#^>bTscep3VpSaZ@9QMJletF1`smcTp z{-Gp8(HMhb6iMPVNij4{&>&zL#c`1D^r?*k0eBXkY;{xy%vIRo`t0)rtUwK?jin+qV!fB6)2o^ic4m;^73Z~icA8MuVc`!BiNT9~O8 zk9G;>{&MCd73MWiv7I~M*ZTyI)3$E9XGF4hb1(@9l!Xm zs>sJ}ff ze(Y8Og{V}h9=-kC&-e9-0!K8*{E~&yk{qmSDm23xwc7OVRlu$?w~22jI^T&J%6LX_ zDr9?Cfj5=1zH!W2uGc&5_M_bX4U6l)*$I5S{Yd%AFx)Ti3uwJe@Z{~SdKOh?eFN>o zA2P+fISQiTBdser)JyhV`3(JBKi3M|i~H9#++VNZuI#VD)xAYCep@cP!|fQGT;!OS z>U74b$!H`W8c(l~vMRAVQLr&I+ezrTDyP1C-HSKoCYM`7+HQVr_C%GGERwEweBpfQ z3SZ)m9+df7A}M})9FGR7d2>5{*r@yg&WqlEg!8{~*v~lsw?lrwd6ZmBYK&q?6am}! z2u+eCjBPo6YgJ7!%z6u8K22l+(&!BI-6$BiTI2NBl5_>n_5a1T)(U)JVXzEB=AUok zBVeik&V+2E0|vC+m~EMM#oe`}25YM%sC&~bvJcy!9_-5h3g_2K9HGFR0*S$HD~WGW zd+=t%Q-BU2=q3{2rm|MgxYU3u9ly}l|B?X|t|aH&z94H2%+$nh)`>Xc@pkE3f!Zah^6=E5soEX*Pr; z;H^<~@p3}<@B1&Z?EhDB-b4TI;=JXB|3BjVTrG#wBjAIFSL#m4hSKvqMtZbpkHmC3 z>Pp-Koe5NjZc2vaS!mwh;m+!PCOF%B?qPwG+=_I(EwpKs{nTnKWhn!DGG(c|Ntjz` zgx`|7bmDZgR}$z_sBnBS9&&Xx{T&=RuZy#!=qieNLgw~sz_zyV?f{JVW2k@rIUoi_n z+0K3k|0W7;4+`?~0sl_*Q$(z%PSV19-{AjdwI45f<~apQ?&@2$!%_KmM?%Ed&)UsM zoc}&Pfn9XrTdwL+`d-eU4t;gO1M{^3FPiQZEkUQV0Hu+*NU=j&OQ14x(w6HQkyQ9p}$21TS8* zw0-r!ZRGAEVIxzBr{~`MRjK>~)T@$Zd0g~dsK;4)kuopa5Qp<}!AZ|Q8X zW^5@0F85vb50s}rfRAOfILwg$5#s&Ev7Z9oPsja$cL)QFZb_7)aDrwi7)*_Dc*Qva zV^D%#881P6+RgwW&RYZx7&32`iUkTL-U$wn0;soekb3}n55+e#+Mn<)rodom#gmmx z5*eVj)TRbo|76>`H1MR|=IHU4CFgB?zTziF{A%J&0fzd8p27rhg{grg{ZHm|H`$xQ!A}}0*$-nT_WN`<@ zm9L*)#RGfp2@b{#Rl%OT`HlvE3efBI^gfoIUfrAaR(9vdxgPRiI&|2hW%bsW4lsoB zJ4G7aF6*Gwd4F-ZSi+Ao-r!4Hv0Udq5r1 zp-HN0>6O)Gj7S=Lp{wQtisP3cUi6_Gmm`djY3s>?VM)E3EPPJWOLinI0eZN|K0UG; zBD^eZ&vlPzU?oKhDH`GQqfdj-pyIf%0{!6$Sx^=nS3d8XD(yHgMwk z&`u?MO2tliF}I<-t0*h?i#HDRV?RiRsY>y9>Wrf!xXjZD@_>zn35s4hw!HT`rO$Pi zK0ACTRSZ>LIklwog~`rVSbA?nwhQuc#%`k$y~%in_YY?frCpjq=V6!^GNJLw?CSP% ztkl*^I7Q4h4;8Ed6yXkAu!8zF#wi zRsgl3D&NMm;dFPWHJ#|1+%AoJSLNNrr+dM&kCCt6j5E|<8cR=}s)&wMTQ$lX#AYW+_h{}Otr$}Gl^XGd25mc`hX0=I;@%%NjDBz4*x; z4@7#%qB<~K+8z+hm!PLBJKlS|X86JJFUzy;Yh`|lGTo+B5_RH%x5Vl(a&$k|s6-y_ zFOfj^zNOw@R{P*jP%{*HEBcc1yyTSxw?2J6qe}Z^5n`m*U$jK*n={?IOtZx5KnXFf z?sYZV{Wi%0WG5~k_57U{{@Y_ek*a@s?gxqb+w*>4PBcwp7>1AtuzW-bgj%T+Myx*y zf+R4U#%Pp5kx$o~*Rl;X&G0P+00j#yF$}i!RxjA#JPgt4Rml;l)f(j2uf9(aimWSJd3}`ZvTjnUg9`2|O;Wx@M}2vb?{;z4ics2^5fu9M zJ2`%HKC}NQHCba(2;ufmEFNxflH7OmnZ+zsiyvJnPIF)!u2oc>QkL?yRz3*m<1&ir zKJCi)?)KX0glam_@U$97YxtOp;Nf-7INf@kdKf#RY=`axtO;hXAE)tJQj`8>Y=&N( z`~H3&E>xi=c?QMOY_~&D(_;ho1w%D&``D!MAdSMn636~&O?v8Jc8Sgkb1V+RFTN+<}|0IcY79EeFNM!<%+8YEq^|&2Z3oAE6vI z&n7e;d(nCI3eFNIuRYN-6=b=UE4PfemVs?Qb#=Zbgno^!v!8aaDJb>Sb4<3%qe}M_ zhudMbs<%3_w3uU8 z0{ci_wSww1Jetb;1dEE_pL3aw?W2z9{)(`Ewb$;?Yd%e=a2Z`y5_B^0QEuSs`3U)Q zL73bje+UNG?_9(iy}d%?fh>>d-Z)ZdCAM~sAv|tB9D3zko!mT(*Bd|4$K9e@P+m#~ zKZ|C6W69?%lbkZ2@3?(P+n3#vf!H5?>uGmCr6&K?9e}>`zW&DzQ;u^k&x)?Ah*=90 zktBKY4Q1=w#ki*`^O>dM*VUP~mk)359DBHK#B8@5P0jHN+e>xx1sMrTko%_+4lBlA zFXDL?VXTlETJwFsr})ds;HorwGDwZRuHJ1ydV&kGJJ~EwJYpF{d$(?M^jei!&oVRV zP>E&V%IuS=iQ!{tf9&U=9`0{%+) zti!K4~Fsu^(wqj0$ohZwKl zn-@9hXUmYUG~C2JmKDejmD}UF)~%iQNQehC2CQWy1H2RO7(T~=-tO%HTc}Z~Y29A$ zzZ1F_;@p7C6}U^&n;Fs!UUWPilIQr2Nl5p0r+Zv;zL}5b6aD*rr=RGH_y?5eZ_oV& zB@%z2L~Bt+6BvTSB!yB4#;nW;#R-feDHsJ_*#u0`pZ1b~$7&8_@M#7(5fH<}fKaS# zsMyq0F$VTqVrmo5GoJ?~ZGHBY_<+t20tS;nnN9$L1^5aEPMmJ`u~Y_jT=E1c8&;Nt zCciQ-!+~gmD1d4MxRq_)DRPsWScS~1}7~tpn)&)e) z=sPMReYJ(1*S}#9IsCl|wpRW4m@2^A?lJU(3AQDJ9HTEL*kk?eRn`~zF$d{8ng#(= z>@Qt3gqh?7qi~X(_0pK3?&7YSp#q*vY5$#{D#AvCU5pRE|$67hY{kIkxHJ zsRl*(Jjjk2x?E>sJ&W0MaykS6wg(EU;n zx@%oJ896!(^M==gi;kFG+$?wK-IGF`wrxk=q&|vm2`_l~{W5c!3Qe!4Ul)0_dg?hN zXiN!bKCEEmnc^2S~E%Lhhq1&3fKEHSW;`RUc|C}A+=l1yj#`!*=?Vr!}qeKkH zNs_{F28AgQ0!I?aXV6CFpo{{ZiksFn-`djaBWroZ&|tY@#SUy+0;B+}e6F#efj1($ zHQAGo)L$$C`y+V)G+-&Sm3R~Y955)%z@i6^tbcyB^+y3O#v}vnbYj~`1Yu4%5KMsO zkYo!Bjsf5TaR&|NnDpk(Na0^Q=xfahL>L7C!JGishi{>BDTssm$FZOeYM10&n_OYF zD7#Y{ezB?7&%xR1;m4p}h`qI@YP+NS;i^APj^(Z_+~z(uL7Y6$;K)Z7d1dG4a#B6f ze5-ahp1vx}1aVfJ@7(u=1V#GHC)$s>`}cN=ApiVpE*z=~;RJy&VbyVG{mYsN4#tGK z@a?fN{HYqXYxcX2c;i4vNs~;N(Y{lS5h-TXNdVH;x11-};_>OUu#H6-`Yjn+b`(~UdJ;*NhjimZk*j_Jhnxgqq&kc94hckL+{Fg3dhp--XZG(3Fs zZ3S6Bn`7m-Hh!VSTh<2#qc~H0g52|Gp*i;9s297Hl%LA6+MT!~IXt!d?!ZOo<GV0aXQ(-^a&Ap_GZ6QmIw!zdazMCR}4%D;9pA>fMYV7(v8|; zJCOoB8GwHZ8fz=4uGbppe=0#UJ)fy@%871=CgC%wGdix5KMxCVe{Mv9G`G9Tn;&5T znR)XR`?eM+GbdP{;@WPcn6TtpHph9MB|{FPD4ukijt-lA1O`Z=aso?p7CH?f2sr<1 zk?sQ;31DNZJ1mIE3?~iQRw&@j+qPntuaAwM@b}cazxFm7_2?=RWV@~6+|u>zp6!YC z!FDyy6WxpHd9E!ow(VJwYQf`S{F>FyS-gGII9dE~-sQi`(EO7=njzi!GZsOUgrjzyhS>`1q<6=9A7@jG;4lxXsvbq!!jH4?JcUAp@3kEpL0v1%)^)Z! zr@b!26SG=exc2FiyfMrQCsbpIcikQ_1jAp~sqo4rcwZH1_L%81(mDYVboNkq%?QV~ zV(t-RBmTp{t~cAi+4YW7g-lf%K_2ztS&YUhohN z`Akppt?{%{Z5{Ts<5GWqj@Ul9KW&m_Nb#%tMSt(3C?eMyWh@DDx_UTZKQJ=E~ zbF-9vcj(g6#E7@rgOZ(}4HJQVtIFT?`(9SQddBVt2KHXK^MoF1abisBN!M_D#hEr; z?z?ko4VHcArp#&;GZtP!D_>WH6wDY;jAP-hr(i?AKzAshos$0s{ zORyJzV=htO6YF=qv7B3dMCa0FFK^c_7eeeggA}A)a(wQgw%R4S1M|{T4LdaN{Dtl= zbN|poDSZc|i}+6VXqflweWiWM3F2EOBN(|LJgR$-NQV~mF(o&vLwM&|+4l8t-Z9>u zZ10Ybpc99^1w?-L2}kV3%IJ&Y8o>`kv)I9G)S(C-P-O@HC9scHZ?;*i@QINvWu7qu z)}D@xTF#c|EetahQed`ncNCqhxRBx9BSX%|s2$`VF2`qHlW6j2_6S=%=@UGvR6`E1 zF@%WrK2OsReY782V-iH|Fcp>I>vXGbIFq{PXX@W}e#kn%TD|#kO$Yj?5IVOxb!!<_ z$oo@?8h8A)q^K-EENwLWINIS*Xz^rI9YWtNnw3ng6`IEhI{Wmp^TOOXs~_Ehu3jek=p&crqd+%{LUAw&uKV3y&AG3U4?@H$F-gV4y+k1IO>Jr_T zWA@087lPcw`azRUbm-7D6i`Eyy)0)?@@3z&s#xMLnkjTVKJT%hA9u_9>cm#X4lrI5 z?w$+yOUy9k#nsQfbkiWancRo!Q%`|vzzOskQ|M%xF1rU@2$n+jKmFB$T2k^ zXSrR*CVO4A=3}Nekbz#NVEvt+W>WQ0<3eg<4!@`CaX9BhzDMstbU9n(%7Bjtes1Q8 zP;|sif@5)S59UjTc5R?1wjMq&9sY`1U+{Mt?TBotiorvLBdrQ{o~K`MVO#~~J_KM=4V484-g(;wk2JaEA?09* zNN$O{V1bGPs%{giht#_1frcXa8(Sp8D&ynB@1J~DOQg6RVtT( zWOZ`0p-fRwJtySW{=+uU%T1#Oh!_U8R@ds5-pm3(+4_&2H(mjhA%6cA*2JZ9;hWFV zAfi*n$`(y3}s2B7H+-v@sd#TQ4hE(ro?sb{h$9{`@0qO<)H{1(Q zFX$WhsyeM=EE!yBc(t zJS&ej9~C=`?j)*Ap^Duk_D{RR+Ut&6QTMcicDL4g3;b!HAM*nzpO{;Y5mUZb@Rw`4 zvu_;umA}B=@$|_StEQZw&Xe}sAXt|xqbK$5b=glca^|gHF5djKqyvGk_2*v3w=Gug zN&8H(duEC&+}aGjqm!vEu*n3r-QFUxj#-GoRTy_X-9EsgfTUpD+;{OaW0z`uZ^#p? z4(b&#&UsH?+(0+S(=`b*L2`u$b1f(i!m$c(`{+DG?_)LYYoylw=d#GA)?OJzubA-< zwpi^I%gRghFXNrmWx5$E<*$FS@BW%U`j2MWm!SYog09=w=by`a*?-x0|FLoRU!Lu| zw%zZa>4#|r&Cm>m(Kvx&1VZ5`zLu{P(0Gv)%phwyOERDDZ>%7KZgJ%ax^1YYV5)$S zo2L@+j{_?lz&95L%ct)>;CF3rGxFbiflT z2NfsttD-e!wq1}-qPqegvhBJe+eM-%z))bImw>B{QBbk2m%7%ZF|jS}=HT&S6AKhy z^7aaFOTcKb)UjeVjs0^^53IhX-(`6YXBEBntp;0#R1gSoU}gTU@G5==&7)a~p~{6H z;|gQT?>y9xWaiY^N80S*-8TQGkFmv!Y)P7M>}P{4aY%Td+HmHaC{WNSkS}K7!STU+ zuP6D|Ec+O3fL#u-=K*c|u*;8*P}@4}0zmZJI&AS%dHwBbp+C9Y&#o5w-OK$|Uk?I} zJ(ji5U3+hnQs{SChT&sMJ++Prma2Io{@uIneOrHZ#f&~j>MZ5?9EAaG=4r}9{%{ku zy$fr0k1Y@SQX!{`l^-1v=Vjszl}((SMivk@a#DJ&OO74(-j|-;+njLZh8;vs58Wj7 z&k7Ms?pxI_q;oKb__M`)>fLGM{@sS(Sz$oG;rIG;U+=*R+>Nc+2lcdK=*b@_(#?Zf zzJrL>K6m%>5NWy3Rn*yP*tomnM#kS9*gDp%>0aAKp|C4-3yu$Cu?z7XZrzaT9zLac%Z+O8@Tws`bALsJ}Yfp98A( zBcLKH1tmxZLueXCF$_geiX<2qUD+p&G3fd?jZyHY_IVh(b>$c^`UT7T#FmJ>ZJ>c5 zQ38xQ5(Ho@gZ(NUInK7;8v{nhIS!`0E0C^`Om1*WZ{h?%K+(+~eWR)c0iKEdD!ppu zn#snDS6Yn5VA(ECzb0#;TgPt&&lOrT7&Q7;*o-m2m~$8aH@+n>W1D^6N@R&mtebB( ze#I7G1(W~S1}p)hVt-|ZW+BFuBtdhdKt65%fv0&d{jCkSi3y6I+kk(Js?e`+>NjA@ z1~3JEQyKh+s0#h*P2lINh5qDnKXX`zexW{ahTcWp2N;6tm!p{Rc1~3NE4}Vh+e6&T zOL>g0I|(tA7x1f}(Hp`qBw3v^J3SGD$;d{~$9Ksd9yL5=B7NLT>=lb0BNpjIylcG@ z)#|BzERZd5*Igsg$7d?r{kS_#V{s6t=~?;etGK>Np+BKOkkrS@mD8U|dNovfGV3b0 zRc0!nQqK!dt7Tfb3dlWS9#e{&w9C2X5a6?FND`7rdUhUq44$<{(3qpI$Kus>c%eIB z0i=qg?-R!{!jrKy}u*b?e5Zcf!|_ZAk26PN0P;K)`q;0 zzw2lW>tWi@hG4>$(-JJA2}6{5*jdu2>FBjsi4<=x3_+`zH#O;vA(Mq*+C_wHWzUXw zDfjvJh^ym7>4 z`XM~nUYA}gzprJah{Q&y?Seyu-A*H?Iq~=smYszz*w>!I`d3!$&d@PtBQ74u9slOc z_XS_?N7QqG8Qd^V7)%EB{OIZF>XWhWzs{I&Q_2}P?j>@HjwUws(DFa154?vKMoK{3 zuFp{{8!>#`uO{cqvU~eh*Fb-&KKMa=z%wayU%w`gyGo zCut!Y{o2F!U1)FIeP`1Jg*)|;I<;2*>p1A9*WX)=Uc#X(A_r+l@`J5yc6Yx8&+X_@ej#kxn_XN{fWU&@tx z#Kv*z9uH5Z@#7TTv$rFkS?bjWkZ`SrbNj-?^&TDXZc-Z`*JqcsBhdEo7Bp_hSHmPf z^5mha&LS{XQ%V>8GKb8)mEI-fWHG0hNt-=QmR~v1;`j-!i};Lk&b7SqrZtJ)u54a$ zFX8iw5?Z&5+#_`$<3QNG2`D>0h~sO_yb(FRXmxnt*`eKacmKlpA?20f0cUqR^l z$G*KAn&A_qs$1y`3&)8hp!0CDEa_-^G^}cxC(Fq`5%X#YzUdpZaF0{_LSV5GSlUe+_J^f7G{`BB)OznR-@CRZBJgEqjVo)5VF%(_7 z7(vq*L6I=NeuSeGO3^6ssj8g@m2A4n*s;xjq}V(>GZOG0ki)r6Hi26w{qHRPRjIo^ zh2HXGC?G%pMe0hFK!|7oHb+)M1Y>|+VF(aLtaNET8I%1x{Z*+;Z^<(&!$Y?kHo-Tq zm1Hx{+KO(B1ieBKWkUdxmSupCtu=49#h9*TG7Zvc05427o8x4wy@C851={?7BxayL zi2YUSCKMIF0-fPSp)6r^hZx!V&iZsdtA8dG_=}ibM#Duk6|8rp4{k{BU$#-cTXzv4 zftwr`9^YG(`d@m=?<3QJ!Nu3!AmCn?Sp%ypi#e-xvtr1W>VBE@j|YFDY(EIB|Ir&1 z5Y2JclP8!mLhJvoD~}qIN~~30{jdv7!KI(?TlV~>Yq8^OX~ANf8@~$}e3H?V5GskJcATV2m}bJfatf(82ha5z zNnFJ!!?2)ayCC!s>dF16z4kM8E%S%a+mo9{LEtRWA@PDVYx*;t9ND-UWQLWgFrONm zaZ@wV(}M?>j}Ed)f;uNOu}`cLYa_}`JAd*LC|_6nloQqtdGnph@^J)B`%I0z(<3|yw$$KD!; zr40@@46@L8iH(bQGI#dD}<6SFbGbs|5#-uY0JZ$8RTV{RoxFeM@QI#tCj!v=# zMU7DQA~<)Fmsj23=5q*yh2W|nJgU9_DvL;unEPZt+$tFi&3v6{ukf7flv1Ohg|v6J zp+dC6K$jIB zqUB84>}8MIKF;y(@G+0w>_dO$kn^RxQ9&Gc8Ks7GcQcMrZ(YpG^u1U&q;uA{24jil z>-J-J+UVZej;gN5=5g-e2+|U9DU7{qi6`P09t*#m-Bw}ULs!uaX?M3YI@7c&o4o{{ zj?j3#cPRRtoU%vx9o3c?|!bEbxhfamezPS3G?K_^MRdg%3d-(a* zUwD)@-1tN;F&h`U)mmuIYszptJ5SG1f~IP@Md!JpfGoV6Uk-Iq@ce9tWASveFej3^ zesf_b1;;eUl|AZ15FGFr*INXI6~h2$K!0@^0)DCfi%Y z-z8e>&P(Ms*vU2Lsl;6(RV$Qnj&Nj=XTi>MA2RS=3@^h?%*r#%ENFk{yu&Hx+`_m% zIqymC*fY(U6Y{#Nmh)^xts38U@nYznq(*Os>Q^9EM6^u$)lZ3;jynD_)&FY4_;&VDK!WD58v38EJxPQ2%E#?Zd zepeBMLd&%{!XFl1oc8$jJvC1M5}U|CM~J-$$3*7K!HP_oW#)^wS8HQO-Se2dsl#)Z zhU)mFq(h1?jo+tljG#3s4PFJie|6XsdJ&KAELpos#ouBb$<+F*YQSwCYUeZ)V!Cy; zY95)S85N(8@Y`8G94_IqdroP$>#7n`uMN4!U3m`mg1)t~C|Q`cL(4(rcLc}5%+5;Q z)MF`&yJ2S4k&xCxEo67c^HsZPh6^#YJ~ja<&X2WvwdeIE4t)Nw^!udVd(AVW+QMIV z_79qD-%+IR1K0nUnElqlpAoa45B#2(p(F_t2*Q8_K?cSdgd$M_rU;az5C(^FjKop& z)4e(1$xeOk*%O-#Ax$@{o*a0!Bh0o?OaWOav3~0Fh8a_Uk#DvIvJ*I%ofZUW_X92I zCM~75{N$At;hPf&z3m6*=)W=MS0e}vn8_8{=6gqiUfg?x_a~eTP%`LuIN4uY!rybU ze{vfV-Bt?>a(rE? z>m*^1<%|)A9B>O^o3lOWx0@3Be!HK^HC8km-9nof8o6Fipt z0~vqoupc#LG=*XK3Wx|y!X$yBFis&TfiVcZ*0pOr3l#XD2CkCZ3^fBdvX+OyzlQ;E zlV@N%WUU!jU;=Jzn}cQidAbF&)rHhntK!=P0j#rNz%LDG^eIpiljt^ID1hEQ-lnX{ z`pB=+E!NK!F;GlkIasw>(Jk9NHknPg4{zfJ7y--5D7CE+XItI{4US4TIT={fp+OA} z!Zi?3p0A}Ywms*c16O%zGi3W~wZ(`oRC^DZ+rhw!G75Co8Q8x=q^jEZ2%Wz++Xdd^ zvIDbx$QL5t`m%2O9j<)A8GwWv@=dAs5>&MR@#@8 zi}f)`b<(d7DzPe#)45{1k3AX1mEZ(ZFJJsOtvdRU^8XcHAwd9?J#lhm;QU#Mli;xD z4?N|>?F2tXXIRqr;xp(o^;z9S;YmnO5yM}w(u@xI@y3~HQSY$zkQ2dl*5s<>Nig;S z)CV!u__LG9dKn+c8cp!7R6K6+u&hg;LWmpccqZVLEN87woSZtj-1(ZjA+m|sCJwQc z@}MKrPImiX%JBEzy0c%qy1yZowovHA2Y!)r_xqz!x_d)al@VyYW;E63!J9ve&!DgB zv(YDRElrG5-_)-}i-1+ua}m|+MCUU?xxVl;+QID_E`imlj3kt9V^pW@vL zLKy~VS3(0~m2Rp7YD<(}VGN4_K7C2+!H|DvpSy}6G?duA0DL3yZ|OjPZ`C0{wYEYP=(rJ^SYmS@UXd5ybY%q%Oz??~7&2Qv zB5)NUzyeBAfc=$x^Q;72$W7G&{N*=?Hw0P9=06*A~mz2U~0)x2T9e&@vIO`ma z<+E%*pP{M{0KGrKyf6K(zc3F1p!XkO-lRHT#I?}&;1|rBRH6Q3%!5|Y+nR%ajCt$5 zLata1`tchhe(fC4?3V9#Ic;5pzG3z0cxSk9V!D%_IkuwBdycDNB!Y15xbvDhp!=Mu z&>53)ra)3BG}B>buf#;;4>agH`BdX0T_X1hH#% z`+kz2%tONPZ4XZ_c{{WZI>dVd{p& z;MnmRwbA2#isLsTU5V?X>%Ehq<*+`o+9=Zn?h4}TK3*YAtanBCoGTwi2SObhZ`@V% ztG~!Zh-ZDU;4Z44m8oU#>aDrSrC3eoK@Ge5t@>|6fZ!>AKBs$i=7t-RCS~+^1()mn zu1{fi#tz2-_VYT>o$+?!WJ~uE0;O)~#oM*$?HDdIbji7pdtpldHqg>Tm0diEP1?V9 z*JPRymQl19Hty^r;w6(qu;cFLDt^|$%bRtMtVKhtW+&ID#SYpdb);DWQ2lE;uQ9F&r|>vwN^y`$b)RT>)~?@qZCdb=qu zl=`K_wy8G)EGuZdbZNg!l=CU_1=8`g7OrKe9U1iy9Ze>oP5dbGYwf_YUtLUpN1+X6 z;yr?k9h~2iOmQ zren^l1QLC_ElwBt@ji7(z0*1$XYV$IbJa0dN{Zf1ygR(xRz3$#R-X2{rSIdnISE%p zZR}!C>EmgX7p-H>+kws=r~NgKj1FpGcaW4l;_z*4VzSE6240725r?~%ut!{%fjf*V zz1ZCe7PdkRa>c~UT#|@99dC;QJylAgXv2Et+>0GqSb15l?DzqjO~qjk?*9RK_ODpZ zXzik@dQ7!ic60pk>c`4^9-*o5DL821@xEwN;^oY3x%)H9p_Gp4ZJtvpbLeW8xgPi^ zP28pTGKsh;$F)q-JNBYNuh)8Vsxy26HQ43Y7@=a$C6fyh3fB~V(bxi>xbv0j^AYuK zeO#myXE^gN9td$ct^_Jbb;Fe_rJLjQo>_A6QVrQ}$WnUhOdlI37k;!a_N?vL2miQW zSnk5{i8Tl2=}4Ug!7E>CUgUd`q;zCFHy`IW^12-|TqvnAjbn9++!)yfhwSyvhLVGo zPaD6oq9iJj-DTTKMI`xmvaOk|1PJV*ZJTB*W5NrtPMd9^ z)>*!CozL?hFyLO2kU-+F)`4gO+IZ^;=#57qDWGC2$6KEO(t{9CG@>{lc5eqg{3 zQ55J_^8}D5@EV)3$y&M=3>bl~ypMoEWt?teTx5&aPPY8TuMTjVH^53LiOov|{t`>E zvax@xJEa!Xo%lC16E`wKJqogG{OqV+e@fT$dn%LbbQ}M^MFIhfH^2HsyzrN%UOj&0 zWoDp(TtheVwI;bUU4mvU6b0&Ej=2I`e$b}_^20&LS+K;Wh?CIu@u0LhBp!K>l}F|4orh<$GXuHj!y z!_85?d~_Fk7yAC7Pm~}RYf(SlVf$ENgMQp$6IeA=uD7@C9>(SwW&DnN-j6yW+T?@d zUhgxN>CLH1?u(<%Mn7pb^*~|)8$AU0&*!Ljz3Xw zGTsc{kXI$rogna}kZVJ{hn+h(BV ziuO1y<$U#>fQ4obIVh+USNmFnF@=b(WFbZD^;}?miA3xDuvLr))2f!zP7{&NkH#r? z)t&KKV^P!&x*qq_{_vvjaGs$gDjS7{W{wfqq$8L62Vx>uW2P^HC-3TOa1jrKwyezg zcytd1!CV4pxjs_?e$kj{HQu2rO=sDiW&5Bli)PHb65SP;$7+S28Q3kTjwO~orMIVC zBTh;m>;T<73^(o`%TM=cw!@2muQ)AXj21agC?~%B9Uni+3&mH>=|~?q!luUdRkv+e zy2QP6pn{QZ#)77)nAA<D|Q zX3c~5e2Tu;yu-eA#Q%a->_Y75j$LeG7ZRU-Kwhd`Wp{OTzcVrAC|iLALjFnT$$U

*VnQ% zI~ypjUnFcmhv;kgtMS!8#x)9jjhk{sZk0Nzc#wng{ZN)d2>G`Eur*oA$;k zFT<dv%1EMq9HD zPin4cktCFNg2yJusM19@?tvo6jSEWB)`ME%5u!#66;T1QQ^Tp;w$UWxr$=S(72$!? zHy?aoY^`CmA$BDlykY^de;KB^Nu;>rI-jw(kk-M>13bxXkYU^DoYD}U1_vgDHCJVb z9A1=|K41x~?70npxo32_ymJRCnA24dyyQKdc0vriB;R8P7KB3RfyS404L&L_k4Stt1e#fwyb9iQYX)%l*pVQdMr>0an~b!UzAX}u8;X37k$S5M z#C_u?A{4DR56|F2GoX-6t61WAaj_nS4W|GZu-M$PxA7vTmVYtd2K|o2=OD!eO9do} zW5b5Qc5z`Ig=yd%HEFZfKR0Rf5o4|@pis}+c57;$Qip+*RNCJ^?-(L@O1s4qW8dcc zDwx9Aa14G>)@8Y0U)!ApB{{CDoy-C!DW6*6`O*;cc5T4ohKY5Zp92kiEy^?8PR0d3 z=~g*xqNQ9F;$*<%E%j!{;pJQ0cYt{ICuN55KJ5vPBetj=nnLDCW=8QLLcET^wDzoY0L}$iP<`K_&+=GDRpe*XP@kX z9b!T80mzasX^cC3ihqjkaPnicg#VL(4=_c2f(1g$SAl&f)I;PNeu!n!#fOG8Vr5@?r=`nnZ5=R4JzvvD}v2X5n$7lk1 z3_9c=J>4-wK_Al-*k5L5bKZgO((k)$uJbnPMJ9p}C(kY>v1v_e>f`Fc^PjBDR^Y!u zb_cKn{!?UU@LzV`fFF=urTiJ$9o>dsAiD$D0sjrMJI(?AHL|<@OD`veabCbgK^V?? zJf31VE?(FylD**NRZL291C4C`eSX*&$B+0!8`(To@mS48#l!C7-SpxW&|aZ@y8Bd1 z&JtdM%Wx6($_yOiSz|#ouWg+eSSPaVGApN;=~2g=T-5_JyTxRs{F;^g7hU0;h|w zkZ*3t23I`%;`F5>7L0t=shf-5jjsSO?mc471(%r6A;a!dDaN5p(fU*JWZd!nzmpr| zWKC9g?LWR7)BPYP`4)1RE%TJzvw!^Q**{53{NK6a_p1AsSNnbOB@u{1aF{wwKq&-8 zNCd}82&L$qXCvs&sZo@|f7;mCIdBvoy5qf?!O$W2-C5^e#}37Aa!}eM(h54p{10cQ zpC@bWf1gu_8~RRLBl^?f_#`qS@KI*d=x8+Tg%G2Tt7e~2n4N2XoTYy4Q9yl4<<8>M z&#NC+3E9!fps6GK3)_iybTI3^ChrgS8{R4ZzGM*4hqpt=xES@xV?>jqR_|-T(QA%B z?&*JRp?CdgUE1%B4Wk>sSJn_(^uvNKWXGvKMPcR=$!ja>ylY#4^AaxuU+m@ z!={@*AL5bUyX8s1m!!onetKWJBg$TvUrqGUzx-xY_h&84m(WGvx75W$2*aSp{^!@& zE%?i^-%_{2?a!f$fU+^o_Z6bHnl!Ms5V<$|D>m`j8)F12K0{-H(x+1WEsb&1xi1&m ztHoOW;{E+eDD$&qM&QqpTm%RjByCE=g1V-LDTtIrBDynp>W_MFdXy$$9_?SzgH*YW};j z`h9$2FI(vUN?HBeSNxY{^@pqdfN3#;BoKtg(L)}y!&;Q4DQd^LJJzKj3dTu<#Oa^r zk$)1tca(~MJUx^2sD32;@hAS^L^A#CP)0{#%zxf5#y>sh9XlQ#0_oA4-Jxer9M$lc z-^h;UZSwKj%RVZZC_Uyt4l6(OSNoLtXWAq=o*KtTH9Z~>M?3h)?Me^x0t7wwFZY+k zKVE?`d2CgpU-l`XqnK0ip^3rqk9ILT3{2^dK@IlTGq=-Wx{Uv(kCAULSIa7dl*ApY zkll*1L9_j|UtIlhwBv7=*2D5x`kSToccUN7j%0ax`&wEzo!8$NUU=(H2pL~2VX)(v zvHiNV0!MBAZ%QlhRd@I=OY86FLO!K+`^};c_{*7)3j}xJnW3mzjl3s!g3tU|#x&-W zTVW|QkhnZ}M?FrprMd9r34LkoIkXRrq^KH!XCp5GuD6)QZ>krJs?o`UF_aC+<%pe2 z9+32eb+S!AkrtA^Jy}vQ&2!c_d3Rqs$)xD#3HDm;o**66@&vc2Z_fplhvD zp1Jj^k4#cMDhL?~EkHJZ7UnEZ%hNU}@y;Kb)R?sMTTcXkdxEqm+o%N&Z-5H;48i8f zXv#X*bPGxh^f0$qGRAnN>UN4tETtzj2}B7)c0TmBk<>}CB{Is9L=_N3v#-8 z?!A_Da31D2tkqn}B_I}-n{OaQB19uOtS*FHULjID+H}+AfnTB~XkfQ{&DPIK z*w>kmL4V!*5r-dl?+WziCpk#0m}~uM@&UWrfe07L0QX&^Ed>5JQE_oWXa;uP&-zLSkQULA%_VF&yo?h=fqz&edydE>x-Y zJ_GyLR3i48vLi(bA{PX@Uk2imi~(;ypM9SBuNI3JY+>oyOx~ca3RD;<2Kwk{=L7~9 z3z|C03JX33&gbZk1XC4&=L_uTooDp%rJax%Y}sjtLpqu=Cr=&F)aEzL!`j>6EP?U3 z)}bY5;|bt~IzG2vKVhdu+^e4rM{g}}oA+fU!@-;*n!Ug-qx9@4gtwuoo4UX?mfpO1 zi!^u!UaIWyZE{;=n9JK$Z(E{JIMlPOXYyiX7wo+FcFR?#XRn;pb4LCc);4xe%z2SU z`vj~+^#mVL)D2;7JtKk4cW^mfx$Tk4n*4r~`i{;{>*QG#o8KP`W`plByu^=Tx}j90 z0vh&0@i-AlelKSlah|Yn$2av^;Ui~Qq6PNq(q1iY zT0q~$DEXxl=tG8M-LQRog8#-$h$ve+V_Fwcu;q)vXdgY^<>LGg^ABHOcc>_a9#38^rt9r~e+_5jYJK6itvM1nmzff`lj%KeW&YjnObpVfI$y84qa$A|R+3fU^w;-e)&Fnb!oS|xv?TY`O+sX$ulG1m^eqQ6 zS{G_>BT79imr%ckk4(_tXwP7ki}5B(2FYZ%{D7ZNa~wOEBM&vsf+|r{m|YSaki4JL zt)J9N;F4S(5vpp6X(lyNtLpeP#6g@oHCw#B#4Tpr{?imE@UM0@>yyZb@Jc<>aQ{eY zlSr!l_}gU*Lo9pGx2lmiB3`TI7l~ zuznKA!Sz9FdGuY1D)K!-t(Tx7%0N&_p(P^gFuk|}cdzZG!D;t@#aG8LhowD@JB@S6C+GdV6L)~aBJp+LqUHdQ)mtb(sF6*Axzfpl5e=m4k z$O_i?PR-^2IE?Hw#{V3T-T(9T@E?ix-#G6(o&M7~Ka7{)5J^xNO%WJM;wXh-6hcr4 zhGGx~!7zezZDKW86iRn);;_ZQhYZU!BpL5HCG$gCo{UXreO={e(wP*jXtMaXMzVy#DUI-h!j00b5=a++y`^}!}`tRNu@T*(bW`IiK_{L#}m^-{Hxb2ou1dWV4h_di(8gX=aRk@OJ$ygb7w`$xq*^D&-}N zc-)Tbw+uzqgxrboY1$n0IlW#Y5IvKwHpRO~x%x{ru0cw=b28oD9fzk0)^D>a%FD`y z)JxDgJ|cQC_LeY}3_rb12?(HAtlF?CAR+RWvJpeM)aju79wsk(j`{tLF4il-x0oUq zfu$mL0(%AFMd$UX_wQl}D0L8o$|K!s3dJPw5faF{h%E*&x6bf+#~AR}b#-2m?_s&A z=M>d-54bBDKZ3S6Uw{fNYs;#7r92t!yY8mQMlUUb!|aMBwHHnvIZ|91&zPoy3FzzV zDL>&^Hd*iFvGh3*%*%j!POo!97l$}bp}t*l@d?!fWF`6B5*xlFLtZsQSywwlKS|Gr zT1)a`+CNOh1KnwIW7IFFDFXOPbGg(RAjx`45}mC3P)hT zvl|E05+B(2lFEzoI$b7Ds;}oQvP^>6to6-YG0$oqnSINhs=6GO7cmxvEa0HcnoNU|h1>dzv!UcmU4+v234a9z17?4j)FUq<7)mNh&5r zP)DHno44dMRuA&^(RtZ4G+wCD+wJ}AJ60iQz~US{6&O<9E@J_Ap;D_z?Afrm{~%-S zT%5E!+lhO1NtK3m#sTc%`%{i@PnvX=YIp%TO4x=>D$JQoS`AG|nGwgUOruCJbE}Ec zubnOOXQIZPkh*JFxm>{OaC*QxWQng>2CjF=9d-}{)!exgsOsI{M6YGeTbz1K6tc}Z zIK_plETdfyi}v(2f>z)-BvIq#L)Q(U`u5gVIV12LqtKvw>kpl*DIL>q zkfd+Vh#4SKcf=T8eeqV4*Hb?a7+}2AT&=XKB#Zmbwa43ad&)B*tIn*$;CPx(qV(+7 zli8W1>!EODCW{;f$rBVK?6C#FE3^64AIGI*BeYrPM2fNZ#h32XP&^{3k?-<@hpx2b zZv(8WnugH$fYR4~y54$1B!C%@@ztVBe^7W9Vl!omCNjcTaq@@vLsgxaH<@taO@s{o zUL0Fym&N0IuFqj?z`f&aoIiPKO4LV>e{kLZ{eS&Ko711hul>#Qe~4TA!?{0t+LIJT zq8N^$FbR>!q0b>;41sqlOcF4GKm<%523E&ZFpd2bqb0;A2QvEPS%0#Gj(lqB@H2ou z?SdUm?TG6T+U)%E=Oe&mbhMcF=c1o>2pk`6<3p750ae&1${YT~qwQ=o`^04vpXcP* zuQ3|*u|GIsgP;RpVc17e^ywn+bbSYv2y{@~{q+vN)A(S*H1r|u*+H-2&n$5A89z>- zkL&%%o^*c>_Lu2Gd~$H$X828t{d`Dk1Ws#nhDh%c;7i1};1rf2#8f!QCsg9{4v?MMPD5I{TY+qY-VJUGVN|m?v>Tsp@0)RYg6$0S zq#~w>)XXYtxPE$dWbYOcIwX8|FSVlnH6s*4p zr$&fQVN1kl9d(lxKkhyWaRMs}5tn&_EztD-MxNf)qSr}Rp37?bKJ>&C;J#O3Kf=wi z!>m?%ZXB!*VHpi_db%i%fj6(4QswRmcC*~rL`6qs(Yd}6FWg=pc2a>meV$*Iu)jHO z{xL}U?-=y|C;$$O9T#k?rNMU4QZ9#R!gkZLwitin<_3H=%y)Kfj?Z{ssBG$fWo2%~ z3TT<1(;#O3fV9ZcV)?td4DWg73Sy)awt(s}B(xN0+v}wjUr#h7$g;VXn%g-PfiqWn zHtRS$pO=-Hg)`d=AQ5$oJfWeSl)ZA*O=rb?1!!5WdHB?ACZA^3dLFXnqbc`qy-%{X ztWRTzw%u!<>A;Qfk?j_5Dap2xl+C~2`<4Ny&CoD^sg=omreZT?gHq3TTv%bg;J2C{ z9P`!Zrv3C)VU)3CNZ{z{BxGE4F^@JT;!x%a#mQ54B|k=79%%^>i;nB{FXkp7Nb>L&{d z_Fpb$e|i4DSj?~==ZbKWhDZv-VT49#3?*qC+7~jIJd*QJl7di*_-ypj_z^wu(EnNt$13-B+D~dfU z%8Dr`j(=E7@k9$xxGZO<=p!%%cXpOd^sXOG5UAuvfFZz85XehSV~RjJn9BxTeo}4y`R;Y zg2`YC8FAWS((B46gRQ^#mr^$~in_Id$t8R$ebDkWfa${%i>h8eOtiz1!TZVQm{@?C zO$lvPR?PJW3+z9Q4*@@mzx!Elp6xFc*I-@bWJ747BLS{+{5ETVBA8!~1St`d6!kgp zH@#l3{z5QBbyF_$YsX3t@g?Yx0F1$@u{`E_t8w)j$vk3-W>#gmebUa=rnIRY9Q)NE z^RC+}E_^8ua~;8De5o*xlw%-EDe}IKCIxdS336WCJ{B-HiK?Ys%TgURB&Eu1em{1K&TArZKB9G|!BEQ;;Y@yX4q5 z&e%9(+qP}nwr!lTZQHhO+xDH^jg5`};qLB3MMp=!)ECiTS5|gb=KiYkL}$^PH!VV3 z1ilVgzC_Nz86#ixfQaAu2dShk{36X0i<}hYkk}Cm&(R2+Bdy zU9X$wuHDuZKwViCiS_#-_iCETIxf$c5;F_d_013kj`4E(5Ofg_3B%*Of`~*Mn<$`q zw%Toir!C(Q5Wix}$=Z{(DC0Ht7XxunBlLvWdWp>r-GWt1;&X4jN4P`|zi2%5n^Z~1 z$-y=<-*|$ngNJZxzj%o%8BC>ev<4;Q7D>cZE(!HYMHN4rF62r(v5T^Yy}gXh>DxZU z+-$eD{i*Rgs>#ZAfB|)DH(7BJdK5wt3?W z5V^l9)SihU=Y-9%YLVKMLjF!o2xSUq5jezZcq{e@6GtZ**L zu1>*!UK5WV=@EqvM|6ZGa1BNZd;@(xd-G+l-)lYx8Sd#Org$DaUSDk#EFL_B<1N{Q23D~_W5Sy*D%7@8qltj+ z8)UrPM5KX^YYD5&+c4@ZOfPZz;el83n%jqAVLmNe?Xm`BrC_698zxLmGb`-yMT_F< zCyvH#F*Df?^H?|{=lV*}0`5_Y`uPXItdr;f2+QlZ1?3YWd-{ExS@GrM$2%0@ZEFn; zV}LBNy_=eiT3GV3tCo)Obbej>Wc@Q)IJhjv?U&|M@oRZV>W7e#E!=(&wfMM=>{O5z zfvQ0e6)`;}(4&0Gykt|51A8DR*5qUuKm|D1B$-6uIKjgF_&FhlKdeAB>ZX$+;9BRK z6MX-3pjLhL8TeHt9PO3r_cLQEcV~)p-($btlKwKG=rd^~;HnW`fD)~TBCPj8i`5Sq z&};TblwowA$|lDSz^vY!BAx)CpnRHwo!^FD!kvAvb`Mru}lsyoB2<@ zzO@ltd)^1PqSzm(%Gz_>5>?(wGryxbM6)JWmY<_EQTfypB4t&zVQs5u3q1 zGrNNx^&hg0#`=D45iN`b+>qy(!o%khFjgm~)}x%W0q(4&o~C%`$iSW`1cx1?-Fr%3 zXf_XKpj`KqEB6p8=!mbtaLYH$inpxC4Q*PuKunodZ*kzIx&w^cuiVutmYV}u5d!J;tRKIEZo%6M;R_&I%Ke2}FEuVkwwU3W@$9_e!2D_>CHpw9DHBC^( zss)m28AfltPXW8-)4vwBP(;(>4$dIsSuidqjgYWI(Fg+(c^(7A>PT`B8`bes-PoJ~ zc1$LJO2$To zdWwfyf84_MdEzgk9d^qmA|ik+Fv8EiVUyK_M(=?0X#-6B6yR^ka-xAN9B<) z^$LY`Mk^~s1OE&w1Ocvq@zobbto-ZtHvu$YF^(rw>)e@%KRUI_9zj@?L43lspIWN6 zrD}*@Yn{vGBSROnGUdbL65g6zC}1Vjs>=uKJ{O@oxdSyUY+VKq#N(nG+>Cj|LG$BZO)iYk#mP@QdRHdibZ1wbzt~5Tp ziGN_pRjRr|jk4COd!G4DSBK!uOI6WbQ%5?YyzE!lQCF#C9Xzg})1nfo6@y93TJ}s@ zCqg1T4GvsH1{nIHq`1K8QK%Um2adzUcjEsS+P&KF88lbC74N=r$y%geeaixJwj48W zJ^ODphaPy>u_O}ss1M4Xz%zBRetbdw`yuBW?2fb zeE*+pzux#B%`bFW1coQexXJ-YMADE)#6zUm6})3a~-n7aOfL3h_mL_?YIA_HfU|b42ahcYZz+H(R104_Fyky%{lP199OYPgWgGh4erz`$uJ=<4djO%=P!D8QN-u{7BUTaWMx`cilyZ5e=Q|*j4e>SU z_8E#sEDM2RF^MzC%@ge*8%H?Pk=c6Ur~jE)_X0-_Y}k8UY43zKwcyOy^~E30tFXGfHB0vxeaan^a8 zFMha%kKa{h_CNX{nKh68S+;hW63?tmR}ijgLqsYKZ2~0zgvG^ zPxa3|q@GY`a+s?yxByqC7tGvZ{G?uTm;ihf!5G~UQp7gAVVBa-pUo00a92?@q~~}C z-@DA-SeJ*Gg)rLoL0N#$m{=Dyi7&2q?qS}vl$^<_Q^#!??t;tNlpDV2@7AVkh|4&F z{+u|Hd$;wxZYssk2Y}P{agcprf9-XVr=1*?4PZzk` zr$Sybd^TT1(3-8j?F>FYdlv!1os&8%!All0n(wf)CLn!Z>T+|mcd{83EUSKwvy}Wb zP-$E?B9^pVn-{7b;Gul@?_xO?p0@Mo!Nyx4WQ^x}oKn~Z4(WE`v`BxiTaL*E(R=X% z38gM+-6}qRUsKo>qnWh})*kltTMQZ`w$i;^5jcGu^w*Z*lAa+jH6*DsM~rPF4GY2> zs6Ib1MX;@6MJW3Crb9L2Y4oFDy(*AEX7MqZ{Y$ynjt9DG6HzNakGktztFwP?JD+-h zsUA4mS5gyQ$yoXgs7ZJ^jzH)2p&M_A{X#Sj5;xjrsb(JRH~%hpX;OM*f0Gv?j&|B7 zXCjYoXzqZ)N%3L&%K|?PQ26I&b&$kAPn)kt5dILoSVZK$&IJeOeYNDIbNE2b>nxM+ zhs6rk&0LCq*42^5;Pefo&~twx>A&aP&V&{f%s9q=Q~6loo6O1UoSm)~MvfLBAiwoR zxH4pVJ>NX9hZct_k^dxL!9U);y)l&Icu$6j?UzP+{^dGP|aF9K$WB!L{li({J@{0%vj$RBX>XcivxJJAtYL_so`+GMqhrV-9SB@XEXFZ(>ZGo zcw>yWS=<-xJ+%+B(90nuEznimQoi2xv(|d%KlLhcV>FzB9K6Gvks(zHcK1Mw`)synSO+PJO=`3v^No3 zgb?Xu)-i8VlFn=n7Dhf5%KQOb&gOzNm(72HWTo>H_Cb)~4os7ffoTWIIkU;`{zxQd z6_pZ9y@L%$O^appVZo*&$N_;F8_e})d6La?1V_EJ5->2IsRJZAd3nzsk1>fM0;}fp zvGX_M8{-gLxTC*hn4+l9OiMe*^2|YT?E!Nir*b1e@1*` z+Jk)TmPL)h4h&FUC@az`@@JGyu%f6%W?|Y4@Q>xkl)uhwD>! zzaa+WpAq}%mWuKXyz2K@OX&EQu?W-Pft=y_$UxCsyzQc!X~9}d)7`%lAv5xE+?b`& zpG|Idz}Zu98Oqpu1v4`PbBy-r@!vy)!IITywvn{={EKga!yY;Iz zZu>gQZ1BneUp84_#O4m_;|H_^j&^OLUK+ID_)JL7h1iGIC2l`peK-(_WxCU&EsXqN z5zDfgWD+)h2=Lb(cYGf7bC?Bfv~J4UQJk6d6{!4kpwCG9`l(bMp>o69S5ZAJxq}|T zRy(}}+mYC5%wHnj$_`AtQ`%SrT?iu>D<>DqxLPDD;JEEb>y&44Yp?P6u)to2ea@0Q zo;V&%2eeF%GpOzf;6Ao;N(gDJm3btIWP0$SOmuR3$*_D0pWh-;({^TZl*gNH8kuqX zph0Q2l?Ji*SPg_i9-W_$&jO`H%>PI@#h+$-;V?7P`qP|$wjMLOC`=ukDerNOIG->B z!^o>FO|IPn^iJj8GJRc^ImmB1$G`+_aEf%q(QL(CBVCpRg<45>WJ&qvre})H1*(U- zL*amdAp!ngG|S;bMYsuvH*ao|N=IPvhLw4!;-vDJaMJf6pywuXcL8t7->Dq~VPGj3gQOzk)=;%$A*Pebx}4dd1y=R_dQ!-b14OVcu^}PQJ|_$~Q@z zmmCemcpOUi5sR2{Zpt&Ab~>CP-+TAh9a~|y@1D7cUgyv?r`Hjc!PLO19~&xx$L|Z3 zAbA~*N@F$!$j!H{j@bwrK<#kahqVF4BO+KXiYBPAMRiY1$OXUSXV9Ew|Z`#buu~@A&MSoLv2m^;h6ZRcTS>&MYoa$2PumJPoHV{Dzp>>g2@LB z<2r`;P5OQvV$+FJ^J7~wwqH*e z4VsMuq9@d{z3QuA7J}O^8W5MHV*o4czsy?AEw&S)(fvi+l59NMv%gw|!ai4p)Jw9a zPK)yQFo)SJl_pI?Q_+xEHUFgs?WLQ7 zTB(W8Ra$f@G!1MGZdiiL^1sYpuq<(}%YrWHo?%|vyOl7WI4&td07GWPoMJ6zruU$Ai@h6j`z4AL4SKkO3PS62&?GS=sIK(EV~E*a(-mE z8$6ohrmyu0^Ft(`_nnWx$hMW#Lx(Ko9@jNkZ?va3Tz!$e`PQ`&-VE6IeY~5=x_4Yf zB5e(Lf_1@JbMAy>gaKSF>rxi1R2~vp<$9~(-_jZZXfJ&3dPqQo~v3`RDjg zjRSfAR7?J}wFp(8-#1H+mLh-HH0lzAvGV<-z?{!Q!p_6O!%>^E7}h*fR(WJ86kQor znm(+dFT8p)5jen+j552kV%C()lH7ZDd4{c0>U21BCHw%%9QsW&DHSo1=@63BTAd(@ zK8gs)np;~(uT(i2Mwcg~5=rLNjEmC_uQ#`3#yzAcau{k;Qe07s;X<`@AlD?QGuIIQ z%@7p>B{(19z>1NnSKaq;Usdd%L3|Yu+f{Tzr?;|`8FXV&cBwI5AV}#Bc3(0(4^N@( z`J&-OpmDCKCsP%wbJ(=JMFM)YvM@A?-8^#-mCXu`VLqh^9a%LYNbqo zhu?qwG@F_TMxzL&-F24dhjAzrs`C3I#2r9eDM33OSfxt4MtDWBT?>u|fcr#WqjarJWOqHkbRlTC{;>97=t zkw&OWkEr*@P#T6G;NWFBp%jAx=u!q8E3fssgPIa4S1O}I{@EHy(F%(B_5cHZc)ZV7 zW%nj)O7R|j%aE6Jr7S!Ok3TaLUx#k){k)CDGrnvj{(Hc4cKYdi+i`aCb-#w!hKL9d zvk=`UuBUB5fkPfelnKq9jUR`U4@D#pK_vGleDwkO5tbmkr;lHo!w~ zvbaY9j91L4?jr^21&#X++_)htP&ZI|TiYiSQ_Xij6!bAWg#%xDN~HVtNZ38Og2SFZ zvfu-FwJR%z8-g=y=Nrc#S~WnR+6VUu=G(hXpZOB5*cUt8?|)5xJ{zy6d&qFA9~0=s za=%NPVKr#))x&sMqfGh)s5*N?6T}IB`Uud!AJ7F&>>ZLhHT8GFWb{y05tbKku0vob z)=z?ImYlA+MuBO0-RCCieO?k>`U8ZyyX-Xcq9wYK7X)kKkJ9N*lJnA@fMO>cuk~d| z?DO-{Zi}I>$}(oXO%3&5|`I&%Xk-i#Q;OQ`W6uu$2 zU_@*Eqq$*DxkPg72^ch_S!Tge>n7ScsKsR11z`y%_vYe^Glj(vRt8~LxXe<(o~&)Y zZiZOx9%^=({(fU08~|5bse>+=k-fNreA-CI$8F&G6p8l$FJE*w7hdW5DFsH1fxf5V zkH-@nGk(+P-Ub{E=t5h@p5@^9Q2jGdYuMbFL|sIeFIfy1uE-muy#%6v`AzD z1YJGWU5P0J}h758{3Y{-ditEakkhq$$ZQijak`plDe}*R93K###kfCC>^l)Fx{p| zJ6zfu({NymLLy^~zki0(3Dk4G1jpFIzZzpSBMc^pylkO#)~q3zzb>4z!!j~%QIkE* zPW0O0_*fed(I$j{rEeUDCMvY?`%sBEc&;F_W6MvBOk`X?9^S=pr%~FT9q<*L6-9RG z*A#Z{Q~J`7{6t_3zm%G~*~#KKQ*&&Q+zPE$X#DPv)3W4eu(&XH{9q??r8eAX-DAA4>;e+_ zH8t{SI<}X7__lr!)~7uThWn7~AM|m*+_tc@uSR@#6kq8@VLPF>1rVr(np3zhFoG+( zB`{f!j`)}MX{|aB?TAJ`U_Gt+v$%Ng`qsnpAg|# z&lip?swP1u$S~rYa(mORMC9Dv)4XY_D++ymRgo+fj2Oz32G{%a%He-s+FDxW6w!!B z<;UzcrkC<+FPf0*OMx!VyD7RKns)V#k>JOYWmXu(oDbL{nDud+`B7!Hjj3$b{*NjSq^oSSR(v*@{C^56g*F0Hq+Dep6m zm$R=2U^sZ1E~15RrVh!UF#JY%FP=<4l#JqM!1(%jjD0xy#-laII6UmVq0hkYrBe5X zz%iq-*T>%mA5?j>fbVgyZe0UCP&|!zha*|MZ>tdVx*kQhc|<(-8n?je*SU^8C?Y>a zJcF;ldgz_cygqPv)$az6ou(|3j=?|(TwfN1#qZPZk&RBfg|)+skL@LYtP$kRehYIp zn<`Han{0cM&7Na*oa}Le+beOJ{jP;&Pu~G9Jnpc#PM?;u=Cc@pE72YFyNsuX4=|YT ziM}t(y7i45`u#Qi0Ndr606r=jtMGa|&te{(Q2!-h`hYH@lZpPjG4;1+;yJT~kt*?S z+iv&Irzwf{2i58~t9!03WecN7L)ua!-X9dS-0#uJ%-s*U;pwSkP!b!VF z4ml+iz>OLK$KJ}yp3%s!0+B+KN5|1K)oN8L(qJd%8sRyhYOX!^OrtRCsP<9H$fW~H zE*-sBkK>t2jiz~JaKQ*0maURn7?an}-EmQex9 zNZ3%0a?c)1(uL-Q66Uu3{9vpoF(Wg=H^;~?Tb3)4x1YLOSE`?(e&0`vwb+HFvS@d| zRXs5q;zN7CM5dWtUCQgcH&0HGuLT>3gmv@Ll8(2!*KI=72T#T&QeSKXmcC7ZMp?Ce z*AXKhT#^U97vunGYXN?Aq=G`ah5CwI$4BCNs zw6!!~3>Ro6p;!RvV|M;gD^2ZM?r;~|g3KCz$rb5KlLz~eR~W%hoUgNB+f=K=zJFR) zG0uk2_1*{m;^j!3umL8coo{mMGROmLild&lrk@&XU^Y4^Libd%A1-3azwGoxOkcwevZWY2r57+kr-&O+JJ5vZDZVHWtqZY?{+dAVT|Oq{`m zRn-RA7{PR7_{Eu~2$@h(A>l|Y*FtH%B`DaQ=VDEpIhvKdjZ3x}j{=x0b2ou))dW%r z9(|QhFEkm>3iYoXJIQ6)34W09}l(x|GN`(H<9Uu+ zoL?^BijwtWiv1j(+aY>#iKVw=(ln}RmyAR+brK{3W4p`OzQjoK^q)8{Or?+|K3qT~ ziU;cnXXs?`>E&*ZvMHnM2tTB0gFSHwXmimdD0Yb1Yf!Ycy3Ki6`NDMkG^FW4ur7-3 zNgslH<6ctDqC9_NF0Z0seU1>uMOJs$WMX#8Qd4bHlL>|su!tFTF&xhbv3^J+hEWL8 z9d^NJMF>nMfyq#uKg!&j329)P@Fr|ePz6$IBtg+`dGDl-2&7|7$zUC{hvY*_!c;(u z)Hz@R0?i42r-v^GAEp#64MmN6rxXT~n?gj#c9i>BW~CV6X(Fqd!MW${5a@!4D~wQu zI!#<$tIj{4XR4}uZQH8UoS7+e+y-hlTCzcJeDIq4p_|6K_lWQvl@8+Qi*TpM1)v|| zi!#sl8vo1^P;dY_|h5Fvjuv}pqo-ganPk}ql19-$7Ux*l$*@h z>c_9*X9`j{{qeHFzhEaD1x}bf1_e>C8tG>`AeI?fA8p1oG*C$3Xe2uMX)9 z5VcW6Gk13+*?NiSivs-XrEz?QFs|>j7HqAvGUnh|b3ibjORx_ABrI(` z4ROMbZv)klcck>2nbg^KQr#J{Z`(hzXE0Y82dm#28EH+-t&Ht#9i4t_ zi&mDm-C#lRS*c+&qn*dEAcukpjDS&7MW>5v)J{afP!P-~rqmaV#}X$&ZhvaI5tFY! zV%vTci0AToxx4N#EHHw0-+nAsWt#DC%2EOgLzqVxD4gZrU6CLStH#JUPOdaBDoM-y znVhA!$7VuH8-u)?(ktEef*5{k)K6ORSf8x#_w8R04jleA5o$QclOM3A}5AHHo;SK$@leI>;utHFb5PC zwgu{)q1A!zJdMuLdcrATT`xUk*VrJbv98s2+hWJI&nhWsOz=iRFKjsQbraF$ms~w91*6`JU5ZE&o=a_7n8r*(BwX$J?*IOQ{>nd71)&41?M%s6K!)VoqD0&sGw85+^uq4SK@LxU6sJ*udIw z1L;6HF%Q(7tlg1qo95O#bTIRhSSs}JXN*zCba5u=MddC+pu|YHshBwl*hreTypqko zJ}1mT+&kv%(qsXE2Q!ybgMLuJT#pMx#QGBI0n*JVQ&4;_1xmH^38NeH6p~hkvusLV zlQPA-Ea}Nl{HZ2Nm7CJVWukH7HRiU{@wqXTM-g6>Q>_zT9lp%7FrQSbs$1Ic$4g#U z=wHlvv_K4eg<2Pk;mwH8!2+6kkXwKqyPVSE>01oapW4iWw=m??n%za208@#jYZ5nb zN4Z>F0Mr{P13$c7*s^Q9aDhGL`l~pzF*e2lb2A|}KOP61lYJqgRp@Oq59&(eQ-L$q zoah$|XO8`36fnH*KOJS30ekW7-rQ7&R^WfYB2{PKdy09>3DiwA~m*{q1oKI&xxblJ%4YLb(dzt<`Oeuoiv; zTe(#*c0y4!!-&NMBF^%auPbiT>rM(87H^AifV>b!)9IrOM{L>%FW~^ay1k45P(X2& zi_YC36ZL5d+55`Nr$r3SIpQZ)E^$fjMhTTD+m%U}-dN&}tEYfS-)>GwnHiaFT=1Sh zU0qxRj89WNlYZyQW08nyw(L~4>4|}n6Rx({k{%%0!<+FKD#)}f7fIsl(c!E!+3bXL za0|8`T{@F!hb{x-3}N?C4N>6aH+*p##1s>!5z_WNZ_%HbrdC3Fpj(AnaMNL;D;G@R zK{PM-VT?Q>@KM#B+i_98gX)U>Qx9BsKeDaZdy*oZD-IKPpjKz`Ui_u23pe563(S8{ z#~ld3?%MpCJd$p;?sxd@6$4mCosvfuX4M!Uw_qFjLcZ4mjNG$Sgcuo29ca<8nRmbQ zJXDREa>w$6UjhIT7@?_kDRs%UXK;0{cH%l`H6JsbJ;bnV;?b$b14#<#selNi<*4(= z4sZ4JU|0!Xn6`R7fx)ky-3R8GsYVSFh0PREIOQ96CjGa8++oe@eX+a%}Z)u-de#giZ{7!`ProSOu6_6-4g+E?-Y@5tODDt>Tx(bwPrIk2 zks#VnXUH_EmX4jaZX}*GB1K;ZA|GMYlbk8yO3`6@ zW<@9(%6;XF#1?(a9l6T4D;!*y*VGX-C-r?Z0yD*Z%i=}vbEM8e4ms5f%;t+vKbH)C41CA45`u^BKVj&=>+W9|?Q_Fw|E!>4v@dAn zjoZEibvU9~OW4sXPI{K?$%MiTE2zgHU$@u$-((g-a6gVA0q~l_93<;+S<+aa^yq?a ztQfQQ5K-Aj{|xz+P;*@l5B|*E@`ePG2WtULK2Q~ce=_NtYcXFSBBnK#!`6ia%c+c> z8D)=bNZj3S#zDKs71#B0dpmUVdq}B@E|~z?$rS|=dCnUX!Y8jyeFH4&zhNpXB7e3%y$a?vsrnWzQ<590-JJF=^Q?oPdd@#=Yvr7uUf zIJOV}7+=7CSaqOl9AQA!@V_`^*H=u7=#puZjTXH6;O{ab&#!c2*iA)cE@AFdPX(ov z<3$aI5fPOboPecp@uY!{vaB{TSD^XpTDU&dyY1}w#&@V#P4~U5R*bgmFLQ%*iofXF4&(cm@8;=i5+e1 z1W+Yh_qyaJpur9Mu@<>t=q9E>Bpy5#%OJ<_IjQB?{MfI~Ej@I>Q2~t3Pn?Z%Ib!Ih zgg;+i)FN}>5H4N_8Iuw{y2 zl$VU!efejN9!dnJV;_q1IScu`<=%O&Fz$Xcz?q~p(66T3c=6rs-3ZRP?~8cL%ji+X zCfu{G%O{p8u$Mu3@HKaOY9)S1LvZ1~kVp^2jKquo@&GDHsH_mYG#WO*MAc*7l|ZN% zR%!43{Aenl?f6h5P9qw%CF(6EAkRy!BQ2lJI9B+okU9EIhAdev<@{qcMBzw*h#ZFF zCQT0Q)^EL>N82vfpc}(dI?tBw+`pawS&S}0D&bfy=(41J%2;tH5_wrj{HF6Ts!DQl z^&}!H!EDzH9&{vVJ~2I&N~jq}`OWM;gE#$6zF0Y4;+m|KxVZLS#+(ef!v3JL!)CFA z)lxUPj?J5BI|t)*$}~bQ|BL$Z%6FJ{SYavewJG=pKUx||Y*N1;$B)urpQfK^{LP0k z^iiX6(mXU5IbGHMOIz-=yf51kn~Nf#S(AOblT% z=?czx^WFOa-Imci0ixrz1HVx~JF23mVlltS$b2jH&<39U>yB?MtpVFr4J87k^8`@o z(u^AL?*jS>-eo8vCOL(jsm)QQ7KI^TB@uwRprV$s{#{OE026x@X!)t{I^4>`o-Xvn zcRbMwf0WHsWlk;^CCC*o^u@rxGi+8a1t&oyqtw|u-AHO}(gR}j0eG};sC5O%!B*+R z5ar}$Ln|d_TUz)jo%DQb)|Py`s{cz9tWHWACteYX1&;-m0Aw~q%`MhrXd#KK{jmBm zG=t1mEjSoRiliMoPDxFH&Fc0_4&mP!T77#iNx#$Bk(Gab8we$k^0K=d^ffH@EAjx6 zzd?6kuZGP$B8yWBlBV3Hm4q|NT^6z;Xu|Md+Yh ztKEFI){y{-`?7uMW(~7!$i{}#M(Gokt(VfR*@7z(y?Lx?lTMY{TY_PlA0*oQ@p8*f zQx%=&ix0Wehln;vw0lRmg|jn)O_N7tIsj8(v;HSA22m?3v9D97LvUGziDp%i`7#8c zv1b-DhMQXuAVV`A6vZAW%R%R||BdB!U5p+62UYQl<`q>S#zv`C#3m-i zl>z2Kh2KcZ#z@L2pp4VPp{BoSs=xPqs`>l0%!S|DpziL>i%5!u%kJ)=(%L}Zgh`;n z-QC|v!b#HJ+=sNZ?(U4sgopT8mnC};ox^#9K- zhpvIXqp_}`t&NSbq0|4G?vbjsEH*pBcebv6UnsDU8KF=6!zWlI{5x!vyks2#v4UeJ=Wn;`~ciO4<5#8%SQ%? zaWi1S{+*Hp0cF*jAO|~bRk2z8)kO(uM3BARW-ibl5E@|!{Y)_O6EV$Bzz+~d zNBGH^LPLcHp-t=wseX_Sz*u>d{u{DHN0U8Eu<0K&XgsMgkbL1nxt)m9m_MLz0&z2a zGg5zmtSgCXCx#XS7zn44B}d8=Py~$(PFDe<*`v#Gs`+-_)d~ETGLqs#12DUJF?}$y zzT)vZ$;pLk(7Oe@j`si9gItl@7OD9U5+sMR#+Ok&RdAv7+Xe$mD24OWWB@B(!&ZDW zsHRgRjLBw(Nx91$gB=ls812gH*C0Gzpvs%(bKY(qy46rRYtLNh7>7{Wg$wr*y^82A zN!SNg5N=ht2+$yO6^{Q(v$myn()w~g=0d|l3t>FR-S;s*5!q|Y z{De-=V@pK5C5({|mXRd!4&K8{SatqFJKmo>z`~XG>#zhLFtT2%zw@>Wsbzu(xMShi9|vLv1>yvLmh+AS3HNysLt&N)j4t!v zC(OUP(`XKApGGN?c|x3SgRbg6&O0Q#B`a)#LT5zQmi@xLjZBRoAH-_TACMn2~ zYrQ+aX&n$)rhqJ1aGrX4 z8VTCkU5a*!sk-v3&D%D8sn(wAC0D~=N?BBjD?a@fH)7Nj(>9SIuvP$lQk{*0Cl>2# zYin;@1LLAmkXP%Mund(3{#$B!hQ)h;RM7E5pa9Z#o05s_K|HPtgRV)3$hw$VnE74_ z*wRm&h6@zI|2%`-IE)WXIE3LRl&@jo8`-m(%aSG~?36>{NfvB#Y%-{mr@Q~kyV3do zYylhR|4L$MAAuN2ZS7CDpiOf>-SzAEo_`PSal-GQ5#=4%llM=j8I|LdKGNJsPhCnw z@It?a4VW_Jcs#(L8? zcDQE(hsJB(yd=KGk56TU!L_ZBtQ1E~)|i>F24ZEg2aMddsvK67C(ON1|WHX33 zxSiw2H2P=^+^0RC@cwhPP>d?@ZnR^5U+eaj zk?%WIr#BDu`P0KoV!tq{VPQvmh6LuznMJxZ%H>Na*mq6%?mXNZh*vl4dueM79#6dZ zm?jWoPP#tJC|`aV(3{q)Sya1PX|8gb+%)dKIS#A@R4FNkC;#789E_GgvMA@$*Q}=6O?N_g1>1LP>}Yq4Sk);b zC)3hlRp@@%3|uzvMA}iwe{O$|v>J;Z<+z3nTib7WWAbF|c>POQos@(-B1C-u=J~32 z8fjomv>!NIJV60ePp#KDPmZQ-V*A4CxEb~5@)%(?!E}(;vJobVBA+Ign`m2GriR8w zL`sP&IkHm7C?ef5qbixk(Z)TO)L2624mJP@Bd!-7m&w4fs{87>BwZ#H%1qzlRaEGm z)sANEmcF-3_zoouOH)kF$6Bbuee6cq=u}tsHG|nM~XRd}o|j zIOD551-tiK7xiDiznD$XAVEW1Hb`UIm~=89?`X;K&d8`^@7FC zfBtbIAQ8-hdx*ju8L~Bb?#~yG2UACv9L#8Y%tniJ;VL90hQryl&~<3Z6u3ah?`x{K z-k8^YkBRt=rxZ170~L>x87LmX>~`q$^>Z3ZXyoFtBOL7egTH}A7h$Nrvp?eSY9y=z zQEOREO_)7yb%4eVLd?mu0qGwz{TN0Ikt?P((+Tpi!W#hdmd1gwzAw0D^s-y51bYWW z>BgxmHzt=eR<90&r#}VROPzdwoq*nakG524ec##7T4C0B)1+3Ptmus+F+bR{a(cct z-e}`SrfXXYuPmDPAn zZhxI!8dt8t(*TK8x-u=|)@+GN(6B=$@OqBv%KS@(6+O&fHW(Vy!kX9s(l({|hgReP zPzfufpj4TtM!V2}l9liwK5cjQ=W-Iyb<8JchQnA`!a8YNnkFEkwEBh;>aV#o?NDG` zqAG4g&=|vZF1jT(GIC0$Y8x6Si>Rt9yw&Iyebv@o&2h|+qV
H>&Uy;|OC5ZR|) z8~&=#B+xQWJF$oa_;a;PH(pa;W+Crf$85#{NET!pxbv}5s^A|_#N%OAt{`>PSgsjH z!@Q7bvo>=~9L(=KC{%tylE^XCz1ZomuvwgD#AUo2M66;bF5DQ`Uc{x^=ptI%1Ty{zI|Dl3zL=@b?&&@})}qK|1CJo;3&(#~#9Y=E*^>xqrvugq0`qx zgEhA`U{?_(>}b?@vHggNl@uS(=U{2i2rhkS%29<}BnK79cxg*<2`NXHTd4B#&rX$Oz>xw;HteyJNQ z!kVzyljRPFIV{o>cNy=bHzm$zng3$!oZ176wk#Ukc2coz+qP}nwr$(CZM$M872CYI zkKHfbKVd(dZ=b!^oMYU*8a<<+4!l2Gq3?%t=Xa!)Qg}s0gwAS}i5su`1pyr5Tydh1 z@^tHW8q7_Ou9=}&=o)P$Ny?BIFl|9S)*VG#}GqwnuTp3OkiyWh~Kl3S<9b zuh5$H(bt3!?X4%=wEy|qVcnBzn(&M8V43|)4Hi=_6=C%aZ$tKlyVOEngqCg13~2`S$X#-~KP{>bDZeB&3|t%TdWqMsdT*hJ<9 z-=Hf`iUqMu+aG1AwNi<|XCZZzJ1FuPTZp#3$G6qANeg?Yf;Y_nFqT)<0TZbL(Oc)jN%^@xS=f@{-A@k zDgg3qD}#&j7bmy~58W!_j#$*!l^` z%Lf}ws@^-S;u!k>v{H06FO$ii@AKSw6Rjjlxq59%#BFMwM&!VCd%x4n`-3>Hx)21( zCPI_0TD?Z=5}B(kpVSX8pd3)uL~oi`oT*T~!fKA=lCbkk5BX~k_n|#y6i^(D^fOSj z#ho9i8lStGgMbJjU9ChXv8o|R(V6!;c6BLl?j>w)n$5+pL7khtXw~15qr0yCl4UMqo)1*0R7J&455v~Pb^FT088!V4-bPaH`n zY@uGXCE5J(*-;?VXxtuvarJ-FUqsS)syyFTvshWiPAILay~4^UEnKs{C`Hv!S+Q9~ zb14xe`m$b8@zDBP!U#Y4eqLE#JN?(S?WuR$R0dRU#XN+npQ{4qwuyA=m~g6YZjYkx zCbN+mZGzP*nR#e$z0O4;#$7n^#6@E=``I}3)7|y?TP%adL)e! zJmclgRAN^46~@k~bE%k8cPv`;Cn3+V12&c&6Y|wd=bvy)UQ=TdnT!&flIJ(+$D=^& z%&eC%HV;WYe$_=~Z_Vr57<`?V9Q;#ZjIx&c0^#?jw8Yju_?I^P#YSN?0V&VN=10=w zR{VCvZxan$!>z`I z;`=-f;F-aWk2T!xs0Jk$NT`mviM09U5MM6V&-3Xy40B&%P5}z+z-_3Ho;xK^Q-dOp zyDmzV6%$5gshV2A|Kz|s8pJnAWj)1uREdE!(tQ__h+=T$Dw=FBZ(3sBzFik44@DMP*gUTr)blp7FOx; z-zX=hfS3i5Buif72BhS;0ps2KfNkU>&?o$27jI;H{od}LG~TbQ_U@L{etdw|{GR`! z>-m8S^Q9c0!}Mai0);#~txAu68p0T3ACqLO5=ea#yCL)3(p-9YtlCIkvu%?VuMdbFbECq@W zGwOs=Ht7h$bx$l$Owi%HQHH*Rvw~iglKiEFsw;b}(~tycpf(DFY7VpsE|{-rkTTB^ zKMOzpS|j^S1zTc#LXY6`@`Y#OV-NgBHaioaLsFkJ5}e%oC@)}sVxmQ76vSDKY5?uf z!!u9i4a+ky5xNy!{vI*Tq)N#v0#u7w<_x)(L7W!yZ9x#`kUuZd`#AffZhqM*gdW

!sThDh^y|P5mH3SrAgor#Ei00a$k!40-3`9Id?eH!WIFtQGDwR*`d5T$v%I zGSFvo$PVIk7S%oKSS?0ZGQi=SVv@24dfU^S>8*A}FA{Qi)D!&)oqTRj(4Z1OO#o`}4+roo0hk&)HNNz98mFk<*cH3y3Br|w1LMh}d%oUoM>a%HGo zI%X;nAFN1Tp382bS;lzLzAmsiv^gMgpc#PK<7NA?VUKjs#dNU2m;VEPgcAKJKLiD< zPL%SfOxKXiKvH`uh%Yp^3Ug(N$BFvG_cJmMJI5n0n zVUc;cAe3(2r>{UjP_Tmp5Nrms0Clt=_AJ56#ZOz@KbOpw*RE`Ldc+8(*2_opV*U^_ zU|0G{SL&9Nf-PvsmiUy6urV0X>!W}wu`n13(xdyHMx?kn+j&Slr9{3EfOAs6A3wr# zxLqSnRfv{-K#GHt0zvZyh0htgp-t$;6b=rnzF|T97z;C-asdMFFH$Yn#Y82Gr8rEy z1*aHXB99HBAe0#L9GyV)D7ai}^k7aB86K&g7+%PceKh(3FJ}0wQ337+L)~u6ftWCG<$8;y8(y8lpMzJp z@yZ~>p7`3Ko%<#|rF3ZG=*|chbf{jeiQlVrFJf)46i(GNeXY< zHU->Ls0$^SF9N1b92L?=qnvAYf|8TUuy~j;9OO_m)doSJwIRgi3P7%Ij+6k3PX!5W zOiz!j1)8Y@Q8!vE4i)J31C6yc37C-EY#fJH=hJ?=@guWfnGh)adaC*7L6Zgw$$!Sk z3$r_pA4OS?U$N@C5&hLIHA~lbdTgB(&qG_Iot`{CQDzN{W;D8+2qNE?ESAlj9zjDA zAu4;k(alnOoJ%AIw3*5C+HH2m?dQvWFJ9a_rw>L_!5m3;h%Y-k8ro+jm#e++^8*c#YU!p;x{|eRCZkwbM3MPQ49Wk5qN5^!p1P!tot}Y zL;(bQm37{FI!Efd=?NV+@SOC=*_F~0UTmM*XV#o$czA9p{JA^aKj5j*9_PZ7`!*a3 z)!e*4z(qr%W_SXhBnyHx8a0Fr+E|`P{3*sdGmt5k(-+zmjRp1&eg7zY;)0KHA$m;5 zA8;KY2Vq#+-Z$-Z65lKrA^|(_Fz_w!`at%LLXJbb2nSqMUsjr8oL-Opos`Oq5Ca`| zmDbdthXz9ge4Zrw;igG(B1$6;aKJsCJm%~^U{0(^;fD3Td;%(Zl+xKtlOJWxeV5o+YK5M06tzo6hZ0qFMs4ON`Zv`$^SXJd~VtD>$PdnEet19Pq~)4-y(l&)g9W zbAv7)FE_j@P|4?r0xDVuWFgB#Rh}!|Acnx9@zoNvKm;BT!Ni}=f)ZSvw(Qn=uF1rocqf{^|K?jKE8_6F^c_HG9}ZaNDNO2d4MVFNN#Fl*Q2a&|?E&ac@P zx_O2&xKOGy!d(O$2rqtR(G;MWRAVwSo2J$QrB6YCB?3vg3Ngts+FVjUm5X_SY)|_1h3ge>4?*k@w##9 zQnsbPP)4ZWDc{1|#>ylZ6&WMq6|^ZAp}EKVXVO^TV4Ye_q(Vq`+A_q{J|KJ-0GbYW zFeo`iw!FYEw1TmkZpiiXQW<20^bZ3`rMq?T8IBF=KTWESo5gFHr&kl2N&8r+9m*@IeYMDmIi^g0$q8 z#9Spl#+#W%Hpn9 zM^Dxyy=1@<69SQ%6Z}Xt0#E~7VP;ZkyZ4dsxRy%LSB|@+L#cUFQ^VBO4&oPHe^kuN z*%~_nao6s{Al2Ye_%S!ar=+0INUfk08Qed0hovKw?X^8sGmuoo+3keVrJqp~VvcX& zLy4x4$3i;8wuTI#myADKPY%*ICcD*90X%U|L(3VYAz>@RS|VQF>~|mYaSB{;P8m&4 zzyFA{2MWoX^WC`EB;;&%#ZqWWkNlOpSwpM1fQI$@q1VD1fCmQMa6=YnIPLht-6@cq zj+W2jZeD!%BiQKStRY)s_~*7{pi+Dstu9~p5S+20!7mLp_jZg&oGE*ZYU5+HB2Sf~ zdU}9`$8H0I0U{iWxV)1|^qpZk3Bo5Gs0M;oB>)a{*?$v0Xc$dyRlQ@iF4CQGQp!hW zh!bQ2lM8tfENn3%V+j?J^>3o-$l_of@ZlwAD^P+&;3tF)H3*?d}K*=(^Y3pW;WS{-C(|1dLJA{(Ixr)E440)1;O+ zEJEIJ8}j!}&j=4NKj!N;v#g2|)-XYyN6uiXawflvlY&=FvEh zPL51+IzDxg8>I_KT_YcVf0m`dhxLp1Lg}FW)~~0dnRrx$j6nJyPt{i!KU-#KzXLO> zak4`>I|`ZF)d~As3j5vp)U65eyOT>cnnq6H04kh2d#Rtny%q;o)V++ri8*G_Drvh^ zOV{LB7h(w~-x*0Z?+}Y|j}05tuKFtdam%|()iGlpBC@FLQFH#5Fk@=C-)fN8^6P0i zne%DNg3Lp2N=)Y1fD`G-g7YoAO>#ox5^R%E#qRd_csY8XIJ4=9ZeX`I>>pdn+%>!Q z%^vfNtnj$TZU;iSd8Y;Qy1TTRW@Za*vwb3U=I9Hl?nu>`eG4ibm_X5eH4V z0c_t3@T#87u)=fbp0%477&{5mZ1*D(mcTdiHujivlbemA zn4KQ?H(9rw*|aP{IH3_2g_7jE(WH~XY=1^LI8o!$|N_ICef<2X2{!?hY%4mgt4{ z^3^&Lc?{k6v@0%RsOvmw@97U?!!VknvAT~C&oR~=u{7u+Y8VIqzhCn?Bi^l0fi#|H z;h6Lr?-4&5jJRi3yl=lOFW1z(lPxcZ4tN>8r4=?Wn}*X&46#m0BWeple?))cnpY)Q zr10av9#R?E2!|vll(ZlPbUcknQa(}K8FLn?+>|!1>aM5o<5iMNp$nkcDot&9r9na2orojKHaXs*e5L+qFOadn)43h?Teg$H)Xpo_c{Ud)K%5$I zX4+6fzlU%=`(|17vLoz)1E;D!8GjB?xZIJ2$o}%nT$g$(KdzPD-m-g1aQItR=baC| z_~PmBGzGnSUUv^gK&NNL~w~a27LbjjYu4-C>Rv@8&SbQ z-i5${$Gq_i99$%uV+^&rxbo2RLm7fZ%Uki4AA4h)O@=;z)4UAGpz4J6Z)4t-kv zueetU<76#D9g`ylG&4X`UFcJq+ZKI?k>A|}f|r|k=jQgd^62T}p}FSKNOm4U3C-!| zz01Hx6QW-t5==tSpJj}`w#V}@0)HxJF??boG%sArBV&4elDSseo3_n(q~9%z;e6OrTwvuq#oRaggB50 zAtzcLBW-8w3QXGrWJo&m;hglSt>`*2pyg7HrLyY>90*0u0&+gx=JCBeaO*AuxdyUB zZVPxZORl-tZOaX7JODE+7Yu{+N8aM7%LQwrN!|?Sr#x z=@OkeipO|C?qio;n4u1787S9(soMb0w$9Z|9Go{4pw$8868c+q}$kyjSm);@0; z@4pRIQO^z9^u8{Zd`{?Xb9I2CZUmTUG*fM4n4}Czx`f>*8XXVX8&?#Q7Uu^SL+|70AgV0u?18EkH)_y%6z^utw zjvdB4-rYP`$wK>p)jr}8^777ggO?-mcKLgybDz~2@WDTZNg07T4Q2y9^vw#N7cUC8 zRc2xre6^?D#}DC4Wxdu9syLHm5MS+I1@Ly)Bh#~!#suaYYMF}DO;7CmebSPvxu(B- zQq;I&z5R+Uj(N|rMExI)uVeq@N_Qyq zM4OXK{Cii!(@td=zWByGBjCg2_Jsf$HN*$tdn(`QBR7A#T{hpgP?q}qvBbdN(ULzj z2V35I_$~zwiuo?7{@8%=)P5Pc;540w^t=h!iSV+YD+L4XgS(N!HKAEs?hTK30sxd6 z-}}H0>YX>|;=IQ0D`O}BBgv>K{nr7V3%P7Y`i6abd4Dz~&ABMF`xD=a&Xs|K;x1My zfLFUu!o1-Se+sw+iLNd~8siHMu#Po1;_i?vZY&RXpK3kOi>rK?T9k(n zsIYETNWEO0sFi!rV#pLXVOJR6FsH-krkV0LBnMrf3D5-%NI}h${6AgPyZ;s90B)YJ z$0G*-;LHC1gg6{cob2svolO4QGvcvw+Z;{#U9glcpCM+*hZB=o3~E}~XhWn{Z z5Kpb@E*H)=@jz9R$W7tmI$x)jQ{p%@J6A}&u;WYfAU#lwzKilrKVf5&a4qsfQ}mWf7)o@jvMSH%m@#jAqEt79+C*1P{Wwuq`z|Oar&2x6 z6~sG}?p0x>R0QrYiv|sH^+-?f@&IKbLEN^nJN~csGww>tjhUlL1e2$;CW^-bU=y+= zI*7`ZdiN}og^L!Ql*Y(9H|@!q!Yjj#wZG+6WR(_$>fI$AxAL9@oWxtmEfopf1@IG{yK3`<=S)J-Z3=C)W61XU$L!eOzK@Fd=AE-e4*m# z$YrbE<9C&xPyNqT*BrQC>|@(b{5yUOOZlBU!ZwOW59LRYfYtQ{OyuR5iVA%ujQbgy zu3K*8_kcW(FB8U}V01^ort~eTAVFp`EKrov$2`C_V@~h-Ep6*Y-UyqGcvin01Grc&0<@z?V>JK3?hIlWH>^k(wJ9uvQ0hU%jzW7Ud48}+$@ zh^eWx%1!mNVv3M{zsMs&-6I{`{G_ zCTXKfP-jg(qGXw77I01a0>bQ(TkLWfngVi=waPXuPW4Rk zhr=P^P%@9qIdo%DEAFW$B+A2jo&D{TV{P+=TA1S@wH^U{dk`AGV(SIM+)sDUdpol_ zKmF$X&QDJm5L|}Q%#$<;k|_3V29cU4?PCv1x*m-Ywp&v(a9IL=b{9Aiwnk4#J(C6e zxF&bVf7|+IW@f3QCKR%_%oCI%VC_au9sWNKA^P1WeaUBrPJ1V2jopF8z|ReS%rnAY)!0jBF+QECX2Ni4|L5_pUT21}jbjVd}F6}0{V>_K`9eR`m0i&tUKc!``?NR&(|aJM>X$s6V6_IN($9k$KQ)zWUS zTgWu_`QowOfwa@3NuZTk0L+HXtQoOY#c6AAT`uE)XI3xwc7vp9UiI9}(bCq9*2(Je z@b&ob;LHy_RN>3fEe}b#dyX@|Up1xC&F#kOad&xw!N&>4`%wU%YS#?ajr=RL8fmwU zC<@&8<|p!s#+QTF4@`LOA8IE*aPiZ>@hJljpk;STL(igsX4wkEFNM@+RgxffcqHc* zsk{>xtT!p!2d~^A^Uz^cvW9I_aaYSmL|S?k?)FzoO4r(`4%9qdL(G9TpVO_Po$lT3 z1AqW8*(5rO<&#?a1UzAuRb($6kL+$hLs-!` zsW!jFp0&;C((nqz+Wi;Dxc~@GQEiW~5?bbJEMCUXlL zY0BaiG@qct!m>3uM38eQ4udm;4~3-~(l z5wM;{;5kGH}^)fMbn1#lPAPyx2WCs?rXv>HWw$;H;)E{ahKmSZM;tWbR8$9m!JK*BwaECQk|9k z@L&06RDo5y?!5T)IVL+IH5zjkauKpx>0%A+uZ ztrTMpQ$I6>K_5XorWz6!`7O~aJ6%24CqYRuBI@0^XS}Y(=DBHX}Z?dz& zuKXF4Og@z2xlRT49UQm_%gMHOa}mN?frLvb=r;=!*5Xb7b7059(n==qFL)vti(7d} zZ~W#t9{;Mvaw9RLV%fAjJe{?^R0KP5$^=vW8}XmuV4IEl^F$dz1zRrb1Vr7O1LRLn zYKyln9h&D3K!TpcTGxe7hdMD6W5&E;6h(^Rnp#JV1wRkp5}~laI~;MmY$BzE5M18wzMKGw7a6MB^B>>=Kee-MOUPq6cgirEebfMTz=idjUNZIe-luNQ*it zCO~>^1vE)=pzE2{y;?pZ^oVcxoV%I>c<5w&Kr)FeBPml97U>X9RNlf6Gp#=z*hWyK z7O6D-A9!}VChwL}NYLiLIU>2Qf5Z~(LLby-jnU90X31dS5aFBynXOOJ(!Arn030xP z|0ER0B0PFG6p3f*_A&xe7ooK!w9qP!GSM$m?xWw+wRD$;c!G27ES?YTgsFX{jsl*z z1fO6pW~+B$n-wEFQT zgY!hwYK}(@SA7tzD0zqLOX4QEk+eC1*21iURUu|;I|n~t`0l}D$=`upDLR=r z)q%#DR(_NxPPxSHw*hO531?QX`ikX@&iWWL^{;VM%Aa+MLm-lo!(YkgiK^{XrTO}& zn;|R89{jKL@Y{FHcCfZf?5G8vmB6DFvk!iJLM+x$NOo3FFQ>N`tB;+B!*Aex&5HL* z!nE|E@ul{|obAg>;2lR`z+iXTcB(4tV)1Uag-%v4TPHhLJBF?hBZ z2N!#rNA@~rcbjL20$;8lBS%L&OE*eJm!~7xg1A{)m+;ePYn|ucsDScE;W{se%BVs? z9S)D_UEhj5x>qp+q1=GY>;XeQCg0r>*lCt1OcXv#FE68R`X_Cs;StIe?Xw3A&N1Bj zi0h8+2UX#^Kwj+cZaT8jW?(=RXJ03=qa7Y4QTGc9efx0Od}g5O4g)faY9a)VqDSrq z%YHs}m4i<4{<(RIjQlV`ly!Ms05E(i5nwK0$VA3v6(p9YsB4^E8Bb*-koVIJr;)ee zfr@>=h3Mux!CvI^-2j)F2~n;MH|%ND$D+Gox!tu@uCGJ&>VVJLET1IlEN~ondyEuG z_;d|rZ9}w_Ycg+IJt0H{fJ8?$bO=>q z)6(c@I4ulcbB0u6kxO#P^<@*Oc$aBD9u~#KeJp#xM@A;WldF1Tp8H^7wf*jM==9hjkV z+rOoO*I=!(OWpkLZ2Uq-O5>YIuLA*!R+pqD1Hy)k1BlY3)36)><=&}W_Lq^&sNQ>~Rur)AM)OO%R%J{@>j0%+huuufAdi8}2+I|B z)LLPPdotR|i6s3Nyn0r5h!h3n)IURf+PQtPFs%OmI%!8ws%hpc{eL4VQ4K@1;RFEz zTqFx`AzJQ>B4(b2*_R{aeeIpDfXy=bBRnXoHof5#4NJl3kQ+y2d?%5r^)2wo%2%@X zPKhpKzD5Hhc_phqfP;0TNrO-28dlws=ylg9jX!J49s1PNetBXWQ&P6&{M`o~hX)I~ zmiaXWIUj&iUtR!+DUE?XJAs@icq;JO4V&2JE*r0W8NFRQa`+6OG2AQ>Np)l>M zY_UGIzR&drK=`3(3H@Bx5e}RUP)dA^nyjG&2^9PY`|AymvOiL+AqyrxPZ`&=d)_G@ zV7^%Rtge@7T|0c<=qvZ5k*Li&qKvRaAe7k@X`_aZNdUfV~7nX#paO1;z;>?O;Bb?sWmxgit z#`0CG^lgF5fT?iMEcqVRUiHYlr`PgR9@tqWbtC;bIP(oF0OCh7UY< z%@63Y@yd9%^A~TJ{xe>%Req4{oy=c?mu0cP)RggV?-dJZ$ap2$gk6XEcDbNQndkPq zrI`RMD5drwP)Fok=fBQQSDk5Ph1(A6a8mmG^6LyL zN_5PUvto#j=<~pKG`EPg-XCra25t%}5MEJTS*O6kGg5GaajfU!dIArJmC{#s3tuE` zL4bI+u~D!F;QceT1leQ#G*n|y@~^_&cFNi{EQH}0oid%jfY%g}19YkicbC+0k91tz zbQW6gIiK-c3DbUug%d~yypIp**mfvvt_Jcle93-*eZt@ zoBd5(z){rNZwqXkDP;%I`t&1rU?TD08O5wk(|uc zr5BZePdeV(_+A29nPZ!123Q=*!cREF^VJGfU0x!fa25yCP3`OTz}NbMCQ2_7D&Hqp z)s_X5N>UeIf55FOv+Aiv?DK=JELR9ph?&#N-||*WBW96}!whcQBu`%7hEgbZ+g-P~ zE&WDi1USo8pUJYsRty0i)T0_ftk8$?Y(_;SKEoKSv+mU&dPgsF+3{-=QC)NTUgE5h z7Oebh{13cI3m+m?mxf6x4Iq->PA~$?X8d?ulRAC3Y)!Fsl)l0dqmm#`AX|!mMtG~e6!(dwd)kcaq=$Pb>-xei7SaB%D!z}Kt9}8yj&t1MEzO)!%64Ot!+mKonxG5JaeWa0`vR8FTrNhvGcl_1&&P) zC^~Fu-PaJU^=S@edOq(go*bRjo}q4yYP=?nZpj*0uo2BUP1u-->gWVWhfmxy9&1Q< zh#$^{^JTju3+gc}Z&nnaLc>chtow=upm&=qXhVGNLU>9 zB+T**vFf=^O!m-Bjhkw|LH$h?*=STX{i{*4%(>HiEJ<|Xoy!eigUlY0ac)hfXFhlB zeR&F(jQd+x9eZRa`{=Z+O@;f zaqmsDPwTuFDw9Jwa;d=y4pW)iCwX1Wq+ltmxal$hcEvb&W>vO3>7WK`($%4*e9J*? zJ0Q@{YKq0*(8DfMuC9Tn^L1O2rWU=UL4HBxF4lpUmSdL7PTSLVa4`fXod#|q-^uXQ zHB=lV(P zY|a?`3Nh*VlUs#ewyp!Ou`8bEcnm}d*gmBrPTWh=Dl0ZR#8ZB z7uWWi+p9#hwqq&ktadBM`AO|P*r-hltuI8eTU5r(cg`;>l27>(p= zj;Yl070ttIODgA8j`L7CpnEb5l6j~pGRb=KcF5&X$&~k!al>h1La%=Lt4t!jnN8G; zQvyeYIRPQab^w)Beue}PC62&x6!@mU`54A%$h|4y^cnB9*1l^?^%lYw6jg}{KI$A~ zUgd>NlrvcyaMsYwL8H6f`8wWYLp7&YL#_;ahN+RG8yfLRlyU&LVYh?&p2=YJVpu1} zmyj1?U(cOL3$FexeIX2$3dfv;@7gR7zl*l%kk z>;Q1sg9Jh8VFi;06Wxft`YZh56tl*v_3F`vUk_g5;ChF}8|lEw+i>x4!pk^k!B#II ze3hVCtpxW^`Eq%^7O+G9{p62)ZQS|wy(E4fFd0UO4{+!H8Qt7LlzjUD&O*CC$jm93 z?!*0qK?VU4zBI&}K{XN?qfB~6CMwmm-yHw(j-!fW1bmD)PXrdpCS04$B+iUb^I0H1 z7ViLfcNwcwXT3CKQNe4c>lM5 z*OVhph1=g4AU~i7q!oIdeU>e9EOW5-S)sstzT5Oe^k2S1rP$>k&q}}#Jv9ZnE(n`& zHE5X}8g9Fs4#gOhXG)LNi$9H@LU7)wj4>;~CyERDQ@bJKG!`EqkqJ0_%P=Kk?3wby z3VL9SYz}z-FBS>A6V}AvTHlqgUUuZ1C!r`I^}tw_ zL0yHNH1}cAix%W_|6X~)Nn=_e7n)MQi)WjIToP-ycQ~Dg@2Fu;c8lQzh8}`tu~ky_2Xo zfP7365e6cfSV9;Is(>}9k&3zCRV5ucLAeEUf?rR>%rB}FTrp@^-^kmb#4hLg%x@_5 zG4@g#guNb0bU-D}%d=qUQ!;}A*ri{A$tXD?_O%`C2~E5rM{HuRBcS~f-Fb1DIs(*= z-$E_U6p6YX4E7c537JO~e{jrzh*JNi-1F-{29&h9rh(5ipm86}?{qJ^VzsUgvSM}V ziwZ0XYj%2WQu#CxZY%XsfmJNf+t>@4thASD_1^(XsqAj4c9SKa5EY*?S&~e93r+Me zIs$4EOAh)tHuII-I2Vrz{~hr`TCzx{m)ha)2r`*S7Z6Lel9lG+7vebpT7p}+8|fLm zWpJOOWq&~#F>D${PDg}ufWb;6oqy&Qcwr~GDFidjoFuWu9okbEg(DkR+{kJEd&zW1 z{0`P}iG0lZgo5Xd{RQU99+g0CAjsPBf4QlFxkBFIjpmuC?v)Tr3@817Cexy6<#5qS| z^SyS-g8PpBYmy>5kd=&%A>y%uw%GUiISN>4gj#|4UlyQo_>w`tj@i<55}EQdN{$9o=rWo_5RRv&#URAGe>=J60RO zW36@?=k@>w&!4-_Fft*84eB`4IBsUras5KP&&$YvNK1SvhCo4k@tq7c_*vNpq;hCv z0|Q5NLO-X$M#vi(DkZX|A=r1R?eii+Xw>fl9xdHWPHI&u22E7ck=;N^rj2Ak!ixEu z^$l^u@DonMP=(CXC=xFDXT2YvqD)9T%dn-T!wO*H6ZIsymytzvy=Zm$7Lr3EssY}R z)w!D%X0n)JalHsPrD7v;TtkRF$Ig=3i{v=kOljFUF&YTbjJ0Oz z07Sh`4}*ZCo*zRxX1IU*X*Aa(I?G@|Xe2M~U1cG{xtS-X0Y2MHw(g@PxsBM>0E6>e zy9-&x_xl&p|@~Bn!AtvCPix0{gbO$kPt8pgQARyvD z;e=`7XqcW(36275RVlOQ8yTKBsszRKmH;)8`9kdUuO1aby81ZS2E+TPcKn@t$D@vW z8yTlX4?KLFnpVF}ii=@>%QL=(7>;2+CCE5O(m5uon<|@6Tq1{w&kC$@zYtCW*65XT zy)`$-n2ajCu;F@?e~z$RL`Vl?pMWDV1x(Z>b4-G0n9D%tC1P zTPUIX$4;;>Hi;i<7zsIJ~ORWWf zdN$l=*Fc-XcN|^;nNYCS7L$>mh7j`09*`z&wje_;+ePN;i;Gn4mvB@C6>m~sZPJq3 zR-%|ebfp%IiDC@^HZ%aXOquEec^a#2FBIM@wp1tF(MKu)+ZtXQ82xH=2x6{q<%t!T zQLw_v65RCDNQd=p4cSn~bzm?N;*(UaX}Fes<5&RHIoM*ul3*^nxRl2OWL(i#^vAbF z!diMFITwq`_`AeXJ5OjqSWk!yUCIY3($*h*D60Ff#XY|%cW{!BuQocuF2$JTn4$Nf z$B5k@Kd3ohr+g0P!np9dv*CR~?JaQr4#b6R*i81bpm1)IpuL7VPanB?JKAEuKqMX3 zh6MHqM%DI&ANy3)VMgPp^-VT_{~qn01~2?3cGGK-+HL+%Mt7t5G-LD3i4pc)Kg}UX zU6hfY;T3p>>dW-JT!r{cIwx?0*2}Pl&su+aRX5J-^j!Zw$+mfp0(NWJ0NJtL)s_z; z(#r|QOuvx!VC+&P5)G4OuU5(S?aMfkqGP!setc?B>2pE_$L+(!k`uywob*CKo@^Zr zy3%bC*_uqIA<7a<|nzqsgO0?JAgL(Z~|+* zYOTVVohoQYahb}a674=XwUL=y+u{lV@_U>doSC=Da-xk(sz<4i8z8zf_YEN(%8-B> zSG_B1U|~CniZ&A%HAFFP=-px%W0mjp7hP~c4Cy#hMgeBvUcExBjSA)=FDO@JD5h08 zJ4B0kdh&G28zh36vLM^AQZ4rq)nMg&`8zLaNj|{d4Im0`1 z0J_XK-=d8jq~)Uj1~?P4>3uZhC>KGXt$x3tq-U0-xu@%Ax^5`kqiqeFTx0<)X!637OizT{sEn04PvX(_)I)gRZ4_qMFpt6X)1URwMTGvY?D z6->`22JsVynKOQ@HkIyY+@#4fFBv=!Iy{qeujJS*8R*nj+FPQlHdl(OFbqDK|atjY6QW zJ=q&&^s!&Gi1d9;Vol*uPs?`j(xcauxvBmdfYfJVvRH}aN=uNiQP%6hACbwVhZr}@)dIXV zE2fR4n;A<8u4O-*^I!Ki&MTVcvdSDQ|0)%G)6rTlb}4inKli{?Y}h$%m55_dA^baG zR{X6x=Ht^gh^k3#$Qd~b_!>L(N2z!iU%}p^ZAlC+R&kyJdyL7VYN(nwPWxN)>>kMG zn1$y*p?*F}MU#yW8vW<}z4!iPsIf=Qo)doHU?7z~U+4c2b`DX3M2nV9+qN?+ZQHhO z+qP}nwr$(CD{Z5zyVoDQ!C!9>^B4ur-RJD&fm%3=g$CR9pX0{Oas>hL3{P49LC)8p z3TNqkQ7mo8CAW?AKTgctHc^M7REF6$%tWEq;lFk?UuEQqtef?j z{)NyIx^~mFlw*>e|GrMh1pvdAI3Elz^ND4}A#l)iv7M8qabCv7-wQCjaa)I+-Z<-I zzhvfNMpG5ZdxgN)z=cua>QTLFrm96dH}L{B$c{4*-v_12KjW0x@7?J;@S;UZaycy= z^}s|$Jl>|CfpxzAZ6psArznwe_I`f` z6>aD*mrEL*uk9tRCZx#PJEFwj!;uJ(ucEab<>u;u#C-U)(sjy$Id?dyEGQ|CkNo z*XkR-W&_UPm+-axf=$*mg!~MT>szK(iY2s#*!ScBJDts0`lJ2Dfz7hfffNUH4+dG0 z1H=Kt3VB&jplHv(cw*H@May8opOHTz6}CJf4Z3_~(Dyp{h_I`FelNhojkbihdSkPh zyL;7>GKsMba{j&Qs6r}Za@)}SIV8cL@)pjup^fjzyIbGKr_-(cT13@aGi@auCIw@x zs41OQ>(g4FbnR%8l(t?$@`S24ZmpS}=;Ds`Nx((yP_KWcVw~fVe-*{&5sT+Cro9$( z!phBm3|1*Q4$XfpwbZtwQ$lAqhRr)ua=muyT&RuNO!Yj&H5rcUxMfai3xqTK=1B;$ zFiKJ4smz%u`ucoEZI6n89BWaB{+<0tLr?2~SB<|Ges{pFa;q{j$bHYbsGAq(8ozhT z8L9ggBqUb=rWjcm*~7&~vNi7WMjuOQuLiaDU|0WkXE#O)puxGh zWT0~o#Uy9=V|V!xC(T3UTGCu%JDN);+66C_Y8A6y#a5xBS_!QpYLu43WmgWZ;w`J_ z%4hrZLF)xg0~?!54T7tV;RJUL@RX*LKX0pSoRb*(%RTKyR3SZHBt87z!B_mG}B8x9W zR!?NCSzT?RT2s~e@zdL+QW@=0ccEnC&B;j=)pPY&5PXqHf=Tq(DSaa5-n zzl#^HS_=8)c_@@vR(o|kPBau$PUY*LrZcfRJ#7)SGCH%fx;jxu?hjRiEr5XEzZ(>V zm9#T$uMU+3M=s6OljXrbPo6FvSp+6H=$A5?5hU$$m)OFCw-6eUnN%EfdSfa6X-$pP zllqZ!LM~g#!WIMj$rtlY3iirtCY*b#fj42&5c05;d8i%zr2$04B;slw3XyF7)a{zU z0=*|_=$PD%o4ETiWS0lUpu}{eCE~*mG=TkkVERu_*0Tk?(iNr*QI@^DeD4PVf#@dp zw%}jw(rV*Cqt`+-CJ^GeC z`X5ZWc_UVUIpmErf=qhhpQ0BSa~A!h-zT+|BUsp9xglHSY|P_wPOEKY=nHI3MM)b~ zh&$RiKHr99dD^joV0y&G@#Ciz_-%!Y!rXL;Iv~!y?Hi|UDs@6I;-gxEal#!GOW7o< z%f8#7{)n9bvK1oDG)>ewegR9GK~IMTWh%+Gha`Zxb#D?8>D@saW32gGvqm6vW{$<~ zgq?IpGQ&ixqPWkdxNA{a=cVNrIHr=%*BJX{Q_hG|t5~3}98#Rgo=CcB{S)B*UjESX z;75i`P&Xq66hIiD`XuFci%`N4U#NhC6|DDy{$KF?!PJM`=~Z~)Bv%~AfYR68e|>b& z+KBqZ*#uMUa{;sh9Yf9(M?$F-`uwF7;0htQ5JZM_;jyDnyUI1UA^HcH-S@d-;VilYT4ss6qnc{?9m56K^F{RrQEFN>w1Myf zNQCjupaJv2D3$>hgF3YRl_McQ0MthB&s|lECTTLRc z(56Cq)S8YqFwcvMsxYI4FtG@AVR-#M-p`8mF~5Qs#Kz9d)Wpin(wy%vzCg>Diq!I_ z^ED|3L8Yz)HvAsX?&;uuPMZ99zE0`}`NY=vexLuovE9Fw72W&wUK3~A#nKi{;nNls zt^FxelYb|xHAI*Ku2%qXyJwZKqFysnu)@X$9(#*N>fXDx@`(o_C?!+&aI{fJDbRW3 z1Ykk1o;;+L`S)X!>>o9Wv4OX|;;H~lLon{q-404jQ8CIcSU+{@f9{EHd@q~qzxtuu ze~gAX&IphQ($OAP6{X_?>@TQ_CB{FsZki3+X6UAu3^~h)fSiso&pbVa_6dvJO3=|G z@}ZVlDQKAQvE&1fc>zRPTd!a8PP9d4ICvc!ba`31o(hd9QDE=G14%pJDCqu07HuAuu+& zO=AXQ0!khpGD~c2?PWWp(fIh~PkWyPIvW(UN_?>jw^(mHP4-BYG>#zfMkV<`qdIty zB!7_F82ZA-`^44A0z5nPoPW#%OoHJNE~X8wtz!BqhQ!&9tgJl(H~3YA+r4K}gaUx+ zS?zk@wc-u|yZ){RS$)F379s0^Lh3GH*eS^oL@kOv6d*AqNRr{oj1s6HFo#rH|5n=B*xqb^`%+w?omo><5qjC)j665*4`)+_rTGE%n7qpfAfVbF?KqG&xmR)?7;(RGEV(lQ}^h;LT+S-u3lj|Ho zEQH9du*UP)_{rYL2{uB4oj~%s<2x+$NgGX+b&e|Z#&wW{JrUOi8Qgh=HLG$+ffJOB zK0`NWA7`AtE=w+qpdj-Ad-d!V(>z}2fRpvlJ+tr`x?0(pSsMGW=`3#{K95nMK0;Kzze#T|$z{o=5YQxcb~u1V5lsx{_$#)Fty;b$~| z6XQS`p!2$0(kA51!rZiJQB@t0*?qubj&|Dx{v{*QMiXLm=c*avHkydH(tf%uslUOp z)@I0-&D#s5-(oXLRSI6C2hUA&a9vgf7FmlWoLpnLe zP^Opqh92IzP(%7(_|9AwU=2I|pj>lzs=SVp@y0{(|-^#}i4Yo0ud=#TXd)pi8YU_fyStN{H@kkX#E6aecx>C&hX440OZ09A%VDq9Qq&z^}v|i2*^M$?rds`LV$+9Gs+;WIfMaN5p>v$WVpLi_ zXC3PDOE3yZRYE+f@>^`6*TW2yis~Vc0oN@!rsznZ#76;nH*v-^S+fmR_KkJwJD8Zq z=}BF}qA1dWWHv>thiBtx%?GoM@DxSYSGue*`jqYe>KX_{>45O{Q;?E{Sy;Pka|pbB z0>9#R2WAB-8&jgZO3Ml4}NzML*b5jxwN0M3mIS8th zo0u@U>aX5qlNCk)hycC>j;H~U4G91RF2<^JMi{53nP;%5c3>`CCHqarASCQUqu}ob zJ}WWJrUlV_sBtiKOSa0uXlJ6R6<}H@kNKmIN?_Bk5_+BOUm|}IzHV0#9y3r)Zrg?p zS+;^+Oc_Id2uM+1Vck98W)gWmoM8)c#p4JnLIU%KV*1J~AJMLDe~B8h*Pop}^qO!fqwOWXfm*S-a_ zfwM&bE5d%5Vemz$dNMvQR%Q8wLWLCshC^qWFZHku1I?^b z7Z8o8x|ra=(TwukI$h!{`w$uIs}3YqmL9pX89-RQ3e=vx<-(z5fDfx7r2i9V6iEAL=1v}Ocr~Tz1T{21wBUV9f)Hmx- zD{fd{Kul}`vz7k{j*xVb?50I-TWrOst7=Bn}uj#8YB>6*nfdxtJ@8JKZfJ_L<8 zfk6>yupFuP6bSc|>2eW242M6-wraJ@;4CY*6}nCEmTlYz&F5$##dyeTryc&dzbp`Q zPRnb4%*E?zvNy&Hu64yh`w>T9_Vt*m)pfBE!TkLhLru4aAj4>TsX#>1{=f3NU%nmq z03w)^fHrCy&N8tA!kz%|@NIq)hdh=yqVF@64jpK2OW-h^)>UPE;c!qd=59*PWmSh; zcz{O!-|WObeu$WI0N>Qqhcag?kBSz^*KUvz5WfwUkY7$6r6tY0hepA^r4iujiIebb z=^A|ks`BUXf;jqKA&m_IgsC43+16B;e(}3vK?n(Y2m%n_uc(J1a&H%l$mFS_c7Cw6ce~qu&iUxDP+)1?d`+I8ktRxJD#p^%MZh8ir>1 z?T4jm!UVb@vH(%U%FdSXfwLoY)pMxfibxVI=H9)bZpt>WJcl8*vp;7^`yL;%t<>lf ziGs@J%uQzjk(HQ~^=(is@9`WMt!qO9TXBFn7PN_NWMz4@8!?>K%H}v?Y;K}nbmB1a z6MNl|u_2R(E0*X^;Wfgoj&8^o zpm>$&A1FoM_yR`%h52eIp#ct-6GbPA(PqUm?E>lHHfb*k2o5-86}-^Iz>&zQ^E6TI zPE_v25KY1>S^KycDHc?`NEsGV*p63yLd`wD@_4j0S9_19nv&1uk}!_O19L-rrR+Z| zHk}Cv%uW@96bMU_mLv}%3GuR4Y0qA2rSHB7)8-UZ6lmwefGXwusGQOkx&8@)fDGDm zJf>Y?JA2aAD_p=>wJeIZKs3sG(3oHQB`nE_jP1agcqtIfT`T%nNX67JFj;OjyJ1(Q z@EDmTm*qEO*sydRdeD-_!lmUDZ;Ho9nW0VX5mNTm45bgbTA*8m7}OIZaS;{%-MdPc z2TJrD^ZR1rjh6a!026n=&ijcaYOO=>{BBC3)ia~A7&(o4*@ZaNZ(hovS z(wQYVyc*>pZrE1wD2EzTs85)|Ahz;-=$v2_a-ZPE1`PPVq!K)}RhfeaPAZrPwQv^g z->|T&$@|RaE#2N$2_xc2RWR4~n@Ny!j>`d7<-=754n9}Yd7G^@I(Z;!Nw0OJJcsx( zFyt7>-ocV5hB62M_F$~4+#9bDmpMDxMKI%wr%LjJVPr$r(-sC76ajJblzyNw^HQMF zXcUnIG|DAZ8ziQtlMtQnUv86n)6v-&kTCf=f{dv#6mN36NNi~HA*aa?oIAP|z|AGt zN{|8~P~lOKIONX+(;^uY>MpS54B(6KLF!ai(G`VcFQG9a*{hwgnCgtH)QQlNAD0`G zEDQzK^gT606pM0diD**ilW9`_hI8+*;=3S1@l1m9FflVQ$NWxdo~Eie;`Szv{wn7C zCQ?1sI9t?ePyhZ?fgJ}kChJa9>DKIzByg*bx)H$h+bl}TnktuyQ;AbItkW<8Izvv9 z%2m0TyWV;MqFv$^EuU9NM|6#iGo%MoRxHsI!#6{Xp#tJ~jEo47tf0KaHg&m^mg`*y z(0B;mD4C0F8$j(Vdh(Z#a~wvn{?PYr9pPF|G?izuD#(OEw&sqnEve|B14{$1AwVy)1mz^>z3HZOd|$7w*`iNx&%xc^83 zm|g*{__oC!3A;E)qiDeOzEcM;zkOR!=eb}@spx49kOahg+tNwg_7~e?jbkwCHjRhx zA+WPY2Ff>(QI1$1kH$6H*Gd+i9!We$OShoMSwhZ0*zp&DO#x^C9vVtkSUe$-rX>&4}iXPCAPgwM&{B3Y-k z>1j2dgVpFR&a#*H>_*uq4-`^H47PbPSC~(Wd65~aN2(R_8C3G1L+&-yFLaN=$p>Yit1^lQgak_qAct(G z#1V%BQjdvtXE?`$7UY1@T5m4suwEA} zx(J`EBO~5qU13nf`NrVmtG&m76< z;=GRLF}kIEVN1OIN%#cVLaLBUJ@3c+oli_KOP)hq%Y;r|EhvezsX^+vWe`%Wj}@B= zTJ4GmFb0kK{_JNu!KjYz_D%2GVdx(16jOFX5vEeOq^1eRLR6Nwm)V#8)N!=fkoP2n z_+W`&+(oOIl#Rw4r4oP*mAz80Ei5x99jVqu5MsFrDJQ|7nue87vO(+!o3>Y1F0I%r z1*|tRk;+c04oGYXjhYWsLZ~%G7OBP~a0oGQOHmk_IzjQ!vs}UaV2=tUg;G>1}G?z z#S)EgRhjH^Dmg^Y5Po3LVtsf-K@=EoARLkGLu2)ub1>sq9`wyGIH3UMst1P^#zW=G zvt~8VH)*CIit%TXK$ViJD|7>=DRtS{96Hl=5v7?iZilFAW(&H-k7F2mi|mGLi$HrB zeqtPDf0&?%Y`JuD;K;dyq&|q-r&-^aa(d_Npy`f+ELMd@KkXs$3l?sW9;bp(R-p}6 z$V>;HtDbUl=SkQVyz+7;3e9Kb{*V>ej4{i1Hv_tAvn3ly_$ArK*o<`Lua;0%K5cT; zy8|InAFR-E7(#5#n`oxgB$ZS%u7!>n3GrZZZ#fAu z6jYNGpcu-HK!v_+E|ie`I0)6y@tm9LE75MeD|#9Q7n$j;q0BQIgH-{?4RjT~JvdE4 zQ_#($j;3{$X}^p{`?Ns*fOQAgZiN)al(Zl+EG&Z3%5V!daHVaeP3pWPHI33kES0iC zjy|!mS}CppV}GlgHw)+&haABqg|t*s>_j~0-!iV*4JeZqV8S0#1Slo&McCL_e*!epeD$ww#?D+o%xm_wE|j9zlm814Q;E-jWOO|aZu+d)-1+t%D9 zf_v=FnW$Crl`SusAqhDlxQLr$82ZCEO_uDCyj3{YfqXFMBH>I-9`Wdv(m-%AZ+U<8 z5I#12A%tQUy)~q-={bI2s#y`)Kg*%$@KUM_XdeE)Gg%CeB2aLk=kJiJy?0!+?5fg0 z5c0K6P1-zO53c%tlzyh4Y|>88y@qMjKz^jBSE)GY0jQd2UHbC)56Ak~tn3OcXpKgq z#=j^Y3MpLBK0IfLIhLq{U(U#!rj61*_GC@#9g;!)ox#+qn*dAA(mn=rbo_FtvucuA zn2%3Oql3s@PS&@vPsQ-hwRTN9VbznatwEJMvk$%G(K6;@9a8;t8@f;;Qsyo4gI^>n zeI%)@<&k{wNiIGK5;^2N<#Fk3d55#XEUI=8ANlcJxJR+bt!=Yv3v4t0x?vF60(W-4 z$@}}^0_boUBh>QHU&e;Y>AkM(&WnUOP6Rh@ZmFZ5 zZ{!9uEu7`&JpG(CaC5S+k_X53n!G+U=^BE6tWf$9Fm0LQBcT`V_ATi4%OXhCH@e1s zs9EQ!MUeF4zAI|l-)q)*EqeLu`Re9fY10lfwfop$)&+ilmi+VD9UslbV%I&@a~xmJ z0pMII)#aZn3FB6I$qK_Ff)v~7qFop|_Lk4!a)#2hk@_WY8KJYCKrX-SaY$pEOTh9B zk?K0P@>fSGiDh#HCpUQ{r!3c!)vD6+Maj&v_-i0TAq~Tis=q(xGE2UDtDmM;0cQEL z038Ub3=CrDIxI+}lRw~#(O{tFZ=j_L;ToF7TABoUIzNut`Qs`PK-Z$i=*mjZ0%T5_ z5x{nr^=f}st7T|1X?GNTyAAfuj|(5L@@0QLAnUE+ba{T=wGH!I`xJ<0@{@Nq!4Jmw zH@Sy2KYkJJZ^mjrpD;2X!d@SvW3&lE!o$pIHl4_sHO=rir^YlCj4fA@FFfcqtQz%l z^OMEUv!h$Qh{uoZgJ=@`g&f zWh!O_8n~kiH9X9xd`OQ|hh$JzIjObwg17)JcH^;M694DZXs{k-Yo> zBX~^!e%F8Av|ir3^>|fLMZ-5#*6RY8rFXG+-soXAY8A=~rvpIUVmsCPd_zNlCJbd%*QukNCIL#u@8+nHJ&6PIBolx85PqEnw^7UD;)`^MmQ&);1iY)WpHyBZrM_@M=0LAW zQaW@UsWNtjXpxgkk|A9OIdY2^j9s@O{51XE^( zqbSc2N2fH=1TiBtd{<<=shFKRs>+_qW=xu8jVDW?LInBkeU+b zT86;0P-t3N?TEZk-(rSzu02KXwlnDaod0j5u}L|@n@k>%`7;ANugqEtB#bWtcnDB~U3Hj8I?wAX<`_D0mi zE?3-cqoU|ZIOILD3cfZGTT*p#RxhxdEIW=sq;lI_(8gp5u@pps$(F2zQLtR~_efP` z7WP!pI3s+}Wa`d9-_4~!l=u#xK=mQ@XN9YjUTF98;C%{~h9?5dt6hb`Rg(i2Dq&MA z6>gY@(01XHxAZvs`B)VxKd%2qV2t(BUxCc6>4S~7cm+1i*}i2-hl1CD+T1q>wSQQi zS7LLKT}yxN;8&+Et|%#2_?v0teF-(JtArJ>;wR zL>%%1Z3cStX#^CznXv198@ys!6m<8*)cLaaW#CfEaDO26DFA`qCk!@gy1nbNc{^!8 zfBQO_dTctsIwu8h4y9p)h7>U+nE7G`x});QPVdLe)}t(iV}FwM>UVVIwfK|GiG1v3 z5Nb;iOU{?UbWA}Q5#2C5(pnkSQr)^i!Ci#Vg#ulV-NLe<3tVZ;;&LoNJ5rg+JjtnI z81Bg(FSeyAEVH#<9BTuiVtdA*Z2ig={gy??Q#j{Y7yqv)kiU0RxxIOsLBChO>^$>e zsWoY2AxC%PThp6D>@HQd?KLPCet=VL#0vXfOr~p-lwS#o0wpUq$e;HW%mmD628|P{ zXIFWgusA{~=ZB^hD@E&dR^DZovF;CTWGq^X<8S6jBT*Lr64&&wUQ=IHwEds8G7TAH=x z=qtB>I_*=cb^u zK<3?rn>YFk>c^ItIzKl%XQ~QHlihvTqq1BC)6iOj5N4C-z4#s@FVR6W?2cBjEvHhs zCtzRt0&pOpoS})~#Cu%!y%DJT1Mk7~$8$JLks=gMy$53qkvBL3tj86WeZH(221CM9 z&PMc)8F*N5nh<#9A|HAe^!BzgnbCHed_@xDIJ0?wXyq@W4D6^x!`4$p@9JWySW@#E z(<{Ig`{h7dKs|n>9|iR3nu4)c{*%~t8li0LZ+mEg47k@&%$v}lWu1NpbIfWIvD#*{ zdhO`j{`J^?iIa&mm|tfRTdQimnbHUgt1_`K<8$V3D82kUGaA4)RJg!vD~jbOVK?aX z2X}QsRet*>Pgim)MP+@g-6S3YM(NO84@v|s*S?#V=^!?)IZSBKK90IiSH)cuoz)qL z6elQz{P~kNxzz*YK6X5?pf8>1-z)VRoNQeT*HoAAhTs7+&B7KZ4`)%4bLZ(%7V!4> z3v_G1{Od*r`us=3XfqnvYHtTqTQakTJ!{Bcz(w9%RG7F!jmtqV(BmgMbw-<*+Wq@lwnBl-Ds}4T3pStEnpWC=t*+@DB$Q zhUmB*0`2%?3ob3z*EeJ5#H<0JuR|SK-39hqWWkfzZTw0E<2z3wMt&kZ%~5iJOy2FJ zhnbR`$HLes_d!5#=e~{8#~qEoq@1tY=Siqm*&qus%Z(7DAO|Y2Y%9QR2VDvtM+CQY z7%`qVFHrQH#NIJ9gphdO8mUIqU9pw{ccNB+DUB%9iOJt3N%!5x&T>8tEdUB7>K7epAI?^NXKH$+af#Tc1? zW-oWUTyU-}%wWH!AhD{}X1rpO$CtpGdhYkI`^Nnd)~oBwxly~;MHZtjwxT!nUGSja zojwS7S5D!XU2#hi(rmh%bOstwXhLoq`mk&>-F2Dt6yu0Rj(#xaj>P?YvB6|6xS?({ zKZ_i~xCiHiYBuxdW&@Y6OW)oHAWp%?uBJHw4#J%@?vcPN#GhI{1`!{EjFR@$Cbf#CRP8@gj>nNl?bIV)YLuwVAfZG=2>f?M84h22w|{dn z^}zrrHria=T56SrftYxBc)lN;U+p!Ftq?(`IxC@3L5OtEG!!5+N;OEU*rld=cpj@a zj~zU_+KMp^Qb{O}UtK5ZM2ewMdm@J<;}k4QL{&Q!i_azh|UrHpE6qEDTJ6;KM1tI->8Xf{=qC<(O zcBCkdSmBjo{H|G&Qh-*WU6LR<1gkDZjF<-0h4!F38lg=hIWCFfqB&y4az>Hqa!Mzk zN15`EBB%bt6 zu8L(xsWMJURXbVPZacQr_wL<$h6oX;r81JD2@bfFfjB`NkRgre2M%!s8X%2C-rvxU zMstZKSHHV}aS+^=RyaaqhLqz4P(5&lszjOWW89p~CgGhBD?f;&tuF zdsJq+J;zwqN3w+(akl9-RX8@Gqd|6oqnFuWdS`wY-2gWsZY5w3SRj}<5nMfx&51%g zey=LBpLJyv=yScmAlNldQgAB(K~ojUSskdNaxxJ4iYUB39vpG3AyRDONYXfBS3k9Z zhyPsf{eyDbsQmZDfY|{vs8d>q#o~NAn2t_N1R7K>p;hVuI>nmwcxs)nnND|2!Vp$E zmZ%FV5sMQ>pF;g=Pmjco@HKk@&~EJ% z4Lmc$cVmx|!Nie6xE+BFpPXT8gRqM>$XkUjtmG5P)W%9EwRqx(^dgF`yMnb?KAdON zjT7rE#8(aql{f@U6{E`_yycrOu@E{3chEU@XS0YAEBLX`{{xLNL=Rx zo_O5}@Qwo~85CnD`E*>|<>M;%K|z~F<_jdIg>&+>5N+tk_LSAR2c>Q>dVgqbf4=hU zQka5D7AksWJR;CG-V$zV9aKN_<^P|#9rBOB$jiE@U4!B4FSZv zFVujVc{azARgizzTO9VesQ@iG8}}n7=mEl)+6ABNUMA`D-%o2}%AMY-eV$je^?AP+ zP}t9#2SU_poydQjckh^=(=)XM{A1sb``j=GF}&@e|fRn3FS zA;(6$24{7^zXfpnGf@f-Qw&?OB3Pmm1tmnVq~ic-YurpjK(G)Y*{yqygtTikTfNms zJH5Aewz=mXAlb7#jktnp>G!dmB7)gw+bMl-uDZ7yA2al;*b8^yvuhd}`|UT$PmH*> z&~KX>qtPMkqy?qUm9$k!_;eGGS;4T4>Nkv#_0D`r0r6|a5O!u<4*SHa-Q0`yr?*WRLzN3-0ltscf*V)tSm*M+-=~?8< zj}R_Nn$50oKd4(y3o^yk{P&V!Bl21FjD|R_YM7-eh@Ou_&2td2jRo3At86}u21!SH zP8k+5N%w4nl7^g_*r5-}Y}^$b#&bb@|c+f|q&4 zd3A3DX$MXlrm308PCA-d9IZ56&9EBovpT^0h}Ri@Jv_Ak;Z3c3B`_AWTJr0V2)ayPE}dG)#xI*Of|p+MkYc5gv67C+$L z4}5mB$Odt!^Ad2zm9H_%{_dvnY?@=WUq1KxK(O1I>825$|kj|jA$U;pJJTnBnlWPf~%nQ9p| zM?RqY_``}B>ev(L0JLn0EbAc(Q9j~%Or2-l`2q;WW`dB*BS}uoN?vD`(LjPlB{UUa zB8Ext&9*qT&~qH&idZ%!qcFMP{&S1ayELon| zpCV!g&f>!psgLIA#)UKsE|XZ~Y<+}XzOi3zJkKKC#qtnp(QEA1GxOQ4HZbp%@^@oz z#@q;o;4g3P9F91>MWcGgJCvvEC99s6snxTCyMl_#MN^EcxKu{v`qDkCa~%>iPK#G6 z$iw54irL$iRWg3#Hij~)mVZq05t0f?)Oa@Q-xWc?fZ=*rPW22`zcuih752b}k>V)n zBx_eP#vFGB^yDNV1{RRzaRlbGoN5hprm3RY30UJM&RJVbzGTlvHHM=CtkWf>q5|Z5 zoI0EE`3UrvtYp)}mR( zVM-3()VZI&nrdahvYgXq>UZ+48x$^_kL|DdTGTtQugXP5uixX$O&0xrT;Vx zp&8k(CR5@rQtBBnYx|i=7sE(ODUBEF)y|2Qp9Py#R(+C%z_`IqkV@%8%m(lv1~Y__ zE;-5!vx4xa;qz!V8=nI-1{~|CCZgIN;#2LBw*fw1L>oIn)V4adh2*QX?Q@VE3E2tC zlK2&PXsVC@XuL%k%-dn^z7E8kNurQxBrF-(U=oVi8OXm8bz40U^|L|^fQo^*U4**l zE=WnS^?3%C__}$K__=<+*0h@Z>06ZK?{wED>H0#lW#>>2#JVXkEHyWk)UZR(b=kGs z+w3fe{~odWOL?1)f)ybe7yZ_)#QOm z+N$wQ5P&X-@g?Fbz~^t3FsTx=$_@PjM6NsA^fZ!n31KE4QEJ{hOk9?$*qe|&%(zsz zAuw5`A|W*UeAHH`7N!q!$PyUN0}%pY&8*2AoB5$3H5Q7n#gGj(z_;s{&0N7nPZ;)h z`^-}}h9-em3}MR$1MDY3^_bo9emK9nejm&DJ}j)?DZuTMTb3-Pje~Dt4u0Ds8zm*? z{;38AWLOX18fBp$T0%N=%ujA9>0#ZdAyl>~dVF{yZY>ZtHfr9lIrmh!V&CQtYc&(T zKZ1}$>CC>;n)!$W0U|K-Gp|{epj|({KSO%k{U)gW5?@>?igf=t11`;U9lS>w{uN}d zCApz5-8ib!GamRFlEJ$>Ikgttu?p&-MceNSr9jCjPf zkbO4%+|wBBbST~VNXr7Uha+gl{ea05F2^FZ$y9MpWaVT^L?&PL;icw_XIO zgialXhwIbNMJlfYT~JsqSDMAxH;{F6enP9V6xS;U3(rTW*#-Qj2mr3GYpZH9$zY#J0VX+?F&dYT zIXnZz4s-3taI6d2WCCL?l(s6&8NP({KO1d>Hc4%b=L**5J`QsfDssGknjjsAG~b^H zvxwh5hA*%sBeZM@_DnJ7-GDf9X4FoTwn)k+M4%Sk8=L9 zVjpPL%;m7g9!vRb+Z1TxsjL-t&f}^l5lug3!qC##0FYjcwqV<5x^9Qm!{WFpXte=% zS#gxj6mO&^c%J2^W`t%?ptMmj>6t`Zn+cs*S!;+e=}5Q8AQR&cY~)lbAA~#qVJDmC zunn*?>jvwqYnsmAJy1~7F0@2-vR1fS$DUb1EYodxk=#&2E?rb^4SvME)U`94gZb?F zG2&KE{|r6Jc+Vh+oE>B>D)alTyF=LpySkkbKl;pirH}FFNe`>ptobTdwrw$oy_tZ9 z^7td+v7!4QnBx2lR@z+LO7wHu$+VZ5p^<+{=mU_yk zsm=J0U#+aWOiWubExL{Vo4@y>BS)0s<_Y85Xu;@R*K9xwP>xwT>X8i{=(p$dL^1oW4ue)!H!mU$Uv@Vq*KM>{f~8yo1>ryveXaSgW0+zj_Ti!E z{Dq-{+Dsi*X4mW}csiV^R0c&u{R9sJZESlF@?Y9=BmjacY9PZ78PacUW7)p3a7LX0 zsw&S8Yv@**jr1cZ)73VrkHH=}(US(7?@J_GC-g1W7Srk9AT0Fdyh={zBIzKK^(Ngc ztlxZ3Ak1DLE_}{MRWFyY_Xei32AEk~d zpTxy`%$0k0w*IUobP2Vlb0SPsHn46vYS=O)wzsgGFkuUy+pv5+#WolSuxkabrH<;m z;gQzP;><#7cjEEdLVCt7Sl>Ha@aQTVEs6fSnhr1J=`ddxo_6uA1y}TEi6i+1M3I<1 zMbU+S>rO(s5xxoAg1g74$I>tE&OI+#r(tK|W?B@Vio!beAykTSia2!~9vFl#M1P6K z3m{@^?M{V08?M+%A^S}%N9^|$J_q^th;5=!o~G#J?6T(YQTC8pY=Rlp47x#tnI?)X z`qGO7CpK~7Sqmmr8%JS*ZNA-IB^tT;xI9GElmZ6bWk;_Y{rI@OMfpUQ#&7TTPW`gr z8BN)tsKsQ*z9x~U$5|<66?1@MOowjw0^c=vD{F3>;+Gz6ZXsuEa;9JtZ?@F#X-JlR zK2m+#?wHg=?1|4zs$PznrvdGc9MqA9+OFD9i^QHjrcEA!`+e>eLs19{75^lvbcZKl zkWE=}O&rne1U4kH$*%VL*J({rY73kX85wr6FY|gHE;{X$f5@P@5`G}+r^V8a3B2|= zZp*v4b9`*C3ISeCpo0&jO_G^NRv5wp=dDgi4bAw$U*E61Amat*5@~dsPdS#$gdZ} z=l7oERo%tyof$+vh_mMh{GZ9*O)$o~>c2!!=if#4Uz0t14_aprdlO^QNd_o?dKl38 zp0c-nUHf@#_I6Zm0g8pt)Z%7`yBDb1I5vYcgKt?dFDyb6$&e3!ib~6Y3S8=xkRJq* z<-&%^H=I7`>`A|)?(7bu~ zedl62?j5HPpG|>=n_N4ZvJZK9n4YIhC^e{8OR8bDs6*tSbvOu`YTOhrd6>q<4l-ql z=_Ob7cGwg&xjbLXX2R%QFGRjoC|?*?M^D7mu>aInr&vA9)+ir;HO4rNuuC>iYPVb% zp`BPHkeAV>M29qYlP^q(yuz}!Kxtvl3N)pqHpLsN05YnNuxt(;~BsR>IZ!eFR~K&f)4F ztmhsy>tE{5?&`?>HS+awC6%?BN@I`bOE+?7Opzc;b7#kk6C=|5!9M-uzNmeb69bas z#rLUolOlV`Tw`6YdZ%O~YF8uicyz<^nhQp8_Vv9L#;QW?)-v0qK@+Mlvox@91b#i?gf`;(y3S2ca)!5C0kZ}383Z^ARgof*T$}62KR1d@&86^r@c4BrNVq-5 zk^zynte()4u9{;;?GQ@Jsc4NeDI$(N0EQ45I#Y|fRK1KEmP;Oo7HwA=bs|uLOr~(_ zlGKI{BSNQ5x&-tI%jPMP~Z?)B{tdLt398)fpR!#wv*c_0^F`=Zmt)3)% zyCA)%cN4ABX6iIp8;>XHWYf_)mr~L~d^V$#&R*5MDM6%wvDh59kCiudPq~FW+>=Eh z*^F_-631GsSUt7;D&q87(VEWW36zvT6ivh?L{TcoybTwhWq}j=<$|7w;ZS-)MGy2- zXV)p^QL~k4*4Iw@q(^p2+1R90S@f6+im@n#)UL?8*bp_Y=TREU!We6DQe`dWa+%w~ z8N_!c_?4yOovsi`{BSJCknbiCNK%f?M!;S?uSQ&zp7W$9K6;R{sCb5{uYB6jB#|a3 z$F0d!Y^BjsuI1Y{mU8PUSbQw4FIRzzkj3d99}W+P*oVH&Cu4QVu;llo+!uQg+D;W1 z$H9kx<*z;HOO|{8oESs)B$O(*yXjuWSkl14nj-tzELohII$4`-XTpZ&NEjy?QfcSf zssmctVvj0ZM-`_~EPw=GimsUAe67WA2y?wGIpgD{-yE zJmd6w_5hwj4nqNQl;3Dg)#5nO;zO(MhdoX2rMd zElJPtuD^AMS!uK&A$dS2?0Ra;F5PDgv~1lG)Gxo?RFu)(LYbLSpDr($onx@LYdCB1 zm;*5&&cANWjTq1?7PVX)Yl(xPJGWu|hGC6ZvDa~kLlF)M=<=}+)zJIQ^tW0h*ouYO zVrt^TK=+`YZKB=}+lEd&bKItzU|IUan1j$G4{R!eirFF@4Z!XrYYAqca)xsdF-!Yb zrf{j)154bvGC$(JcQhTivQj54A7Htg%NkY=zrIo41`14GWH*=6{7_gSzjDWxn*?nU zrti*4Hb|qXRHS8AQM0F39)Epa?&q_>(^kQ~^!`EV=#D_c8l&pgQ|P@+(I*YKt|BsF zFUT!-lDtzrxIZG~W|Z|a4F)qRNWfRWPP13{XOEv#9D~qo{9@Enr`^<3>op$3SlK20 z0a^Y{f^x9#?y3kiD$l;;tYwVuLZ6y%_?*^8oEl%atPQH`TNt$bGw^M3HY{h(5THV_C}DA4jN;77=Qf8J9#+pg2DvU>hmw!I za31yr`UWt92CVj%g=uewuR`tvc|u!T6B2E`OUj!!8J7|Hj=g&XwnQoBI#NB@p_1# z-naqzNDwWR51jE;4_B6VabpXgQw7sfLIGoop~ z(t7W*{cY(1#=|gd5w0V(s*3GAtFl)d#M`krQ~e;PI`h{h|3wJa3BX}+_kp|{;Jmyj zpYE;nT*n@a6?O2gwkNlSL+p~s&mUysU{a$QghfHb3uEcKjj#5fIidp#xX)l%V#JqL zHBjGIAVzXe$&ivosd*E>iniG9CG8Aa@_R^$EV>g0%7&w*RpbghG5s+)qbX-Xj#6$iZFat1xpu%Gf!ztRtzM(qX*%Af z{1rXsZ<^aKa6`ox^cG5*U|sh2Y8MtsLD+-nfa4+h)?KmxnH#kCBg7o|iZ-mgpsTcP zLEc7b2iwnR6V;n?X&m9NU!zO)o=wv>cWZO$z2rWP$aM7AgrF}2Ku%UCY9XaZKwY=4vhKXju}+YHZBx|*-+A8h%*6oYfZRd*AEA=4j@+3K_0R68l=;B#Z+prN~ zvRA{PW{2@wW~Z4=_gaZNee;xGRiwO9K4)5ik~LEg8&pk85YiV0v5mfNqpvT@9&Pj3^A1G4_bwtSAw2qu47^!Pfy1j zyn0XJJ%?*2iA0Cv2;M18o%<~FQ_lErevOBgNV2G5;x}Rw2wbKf1ykET71JC=QDSk! zMlCRc7B;*Z6yyf2QY`>2&1ar@1X9+;Og0qqgGU0Kw|?iRdX-}w5-h7%M*6P)L#9Bq z>rEW%gk5#M8ITsc@mK*_CQ945M-3vV6^?L|^j5WKuOLYA<^0yCl=xL|P&SX7m_kvRr4`gq7y@iMp~3EzvMitlo^PEKZC z@}A60pNwFiGZY=$vQ3G%0cqqRnjt>~>x9?YwOnfkD(>$JUy3#IzTL`MUS$}$A3jH# zutX`V>>clBtyv3EFT}5|>Xhmhafb^S_2nPZb(e8F?@U8U)La2O$pol@;Zzv*#fCH#SA4Hp7JA9Pyy1;{89xuVabYGhdB6_vyM*lP9@b5=Ad z@`b53kC46G7`#9sCI_;_NNlMk{j4^&jiXW2s5uaPE1a1spYab1;zRA#Ed*O+T-2K; zAxrttSe&`3wayj^ANFa5kEw;28F1!9(F&!h+BnWW!x6k`>Td9^duK`)aMCyJL zPA7IsLX)&u1`j@u6VfiCtd4ES>#khzpB^mk=`9MkoPtaqx6r4Qq}9UdH6hbk-tN%7Wu4i^1fZ z4}rPyWmY1dqeGH|!p}oCkA6Y{&cH2x@iNS!NK6F0ex?$SX(8-|Xj#9fRn!Oc+S=eO zT8|sjA53__%uL1>+ZUe#VcQyEyqBwe-$!mv;H|r?Hh&c3Rr$V?*+im5+sdX}+r{L1 zveo!h91gGL;ZHSQ$CPcr`qwIYhn^ITQm+oQUFx_uR<$QG_^YRyp6J&mMp5|8Z6UUF z?pDr5;!vl6F68cDpV4(q3v!&^WLp-<#aSILa4P|#H%?WkA z4m$`ybHE?y^Xt5k@G>Sp>X)6Z1G(tNONa6IaVgr7CsK#X8LsGq2h7eL8^h-cO7Q2y z8B4JbtRZUg;a?Uun=7|9PZwq!(@Y{FP7EbDCwIDWTb*HlKR4IsdIvi*xJtd&KS^?C zDE?6Bh~YlgTioZ>hfTORD}OAT!^0Rm3iQ+9Una=ztoMFzuy^MoY?sGwS*)D`s_Tua z!wu$~%pB@`3;?Jrn7_`elsGG^Qr57 z=y7$?p z7~N>De3_Zajz7l^KGWqoLwndSI4%yF8_Q^~uCZv?Dz(C2LRFl8rwuIhJRVC7(BEnf z#;V|=rhx($EmVq&%Ly4-S10m2&@zaDDo+gkP(3XiRw&p?g$L6OMQUyFa||3!q!(MQ ziA-Y~Ems_wi*<#!4NZsMLCS#I>jWq7$J8r#d$c({Ni^8gD%L)mSzK)Jo5}s5X_dO^ zW0AX#vD#tJ`k?yqz(}=q^l8x=Y{ssH(!(9;&cJYxzu#nSkbgM!&-jQf^!9=Mwn#=r9VK^s0!B^b(MSFtz)>L^PH#!^J3C z8}Of@l_ETw3BG++YBafLmhW2n!zhQ{gh-$~{VJLA3NEJeW+gzPfAiT_?e>HCpUBMq zREvW39})Yv5(tRlzaq2$E1Pq4aIpP{%WnK^TyV$Q_C3C%p|$8iv>hq6yf|ya?j}*} zT7;##iP1Hrm4HEIL35`D;CK<0Bagmrd2K5j_zU%jeoyck=8%z%-*hI;y5OfC9sjgf8@a9rRP z+pY;|*EP3#*uJB&hPNtOJa^u8nf)jD*vrSq&sM8T^I?VTcX3tB5p7LGgO{3>(=z)I z!oy1AIeCGZkxf6>i;OPIONI6QV$H{p3B8m$3L9VEe`XrTtM!LD)Ap>^Cz~de-xRl~ zT1u5ct+%BH>25TSF#!5Hs{H!Zol&1xJA?GylDn&RAFn($nIs*BxoY)kV8fHmpMJ-Y zyV)x);9G;1=8m;zx7Ulj^X#~n^SIwEux5M_E0>p@EC||ySATeb5TTP-RXl8V{#bkA zF4P-Eg=&+4L2tKsJa*EqdWd0fL>IROdM9(dc+)v|!Pr$%+o6k{(-q!LxUJPu=piyl zcjbrPA}Nq#Ixx)D&+hhOlhvJ*#}uQbxb0x9S8oB))(gS>HR}5(sx(gm-d>Jz+*>Er zy}ud6me6BB*yB8=>dPtvah7YA91OYz`m%NNdiec5zO6|ks0b5KA|xGA{Zy(i?{ZMA zBdzt%j2F#jlx=CasxHmb(nbWp;4y#g`ZbsBa@z!6{xg5^eJ+^R<+tjAlDhqpGLc60 zeEYhX>dWnUyA9nJPg-c-F4>Dd7J7*KyBt;B=5*bCE}F6-)`21bZjIqKKS!I~)B(B7 zhfRZ1Fvy)Zq_F@;j=J4BVfwpcjD~>&1ZL`@yP+@$(V0+uqPVt&e!ZN-jf`IyHKSNp z(=EyWhs_4!~9RmYs zr+NwlsI$Oes9ZS=mD-nCZYOOZy`mq|rK7)0gZRWvK?NvLKKEWT@sw)>N&K>{5@Lw7 z0USid0*E@us9uZ(Q_W+zKa0_k{BAF=t$LvA3S?BbRcbF<3=ybJlHF~uvbfIDUQDD; zBjUcrfJKn|=Cqor=1aAKz|SbyKN%>M{HHW7_-i2G{3d`nCqS$HK9;{6-Umb!Qys9i zf7&|n@2|RN#NKyB_{xun5UDAvmv7zzjHig#Ug`)&mVPzO;UrBf_FJXYR`~#pwZv=* zkZa|G(nZWF2T*qWCWoS+yXI-k)0ry~U8iF&D7DW^N8);hyI$h#WYhM3> z789XQrM7-yd13jM0v))^F2Ke)Vfloa3;%HUX!I3!^Gs%xDvp1%ndeA%xeOqtbxb!Y z4G5}b{Z|Q_Nc#a?m7adYFa7B#Gc=k{D&J|@Wbb|`JuFX^9e9jI*gG?+?#t`MVH-cV z*&jaT!7D%=2ecANB0f~R*-s53a2Z`I8~c3L0Jp*_GsJi9=gMS|zGdIwA->p3pxaVp-SqOEp#eG3H;-R4Ye_iuk_8u#ow!6egz+St)|T}b;K1QAbxTB zS3!$?>ihYGg(*jXkDtMOtTtQlE#z@Zz_*hlEA2k;H&eB!Bz!=z!^K6+oqldmA!)$Z z{p;6Tjl=9-@8{GUBaXTBuMF(p0uuS+Os;QRD{i30XG%GAp>yj{G)eWuu`;8sAjDGb zkCap}E0Wb%2|T(a;^s@cf~8Ze8xc|FWa_(wAfx?%ix80RwK>W%N$RQl<$?S6nHH;f zP>ewU@8BpaKH|c)Ao@f%z@&+$H#HUBqTzP^;{*c4RHoTNO@mcx^B_*R>D(4k!lvU9 zHQm4I9{F3!Vp0d}^3?!U*!>K!LgOb!z97SuNv5ZQQ98kTE2s@Y`(%kAodfo%=7Om; zoAfoOL~OLrszLzDm<<;Uj9Q(L7izWj>Bo5dh&jCq`M3)!)w`OVPJcrT8 zz=y{fQHI`{Ult7zInt!id(M!gglL4Jv?Ur6FozrLZMB)aha{yZcSCKyfb^TwwG<=r zh(pY{4XaSdl~de2nqoJX(+oVo)ew1+4V|KB_21a=Q}~57vq+Q`ZB!R_DVU^Lif3Nk z!yaO3|6oDFmUwlen(>7|=U2dOcJ8oXtIQ2O^IL`l*%iwSXVXmomNgcfVqQ-rsX08n zvgc`BG>O8T2yCUxLKD0JY7b`GY9mrpyidbpoU@Sm6FqvrF$_LuW7c}%g{a~wi zoB3F}9>w^Ef>i=HTUzj+&{wYVHsfc9leE`;DVe6=t1=1Ma=Y5A>}3{!EqVSbiw3r# znEuwXhMu(06dF0s18xe4^#>Zb07n^D%$F9|cD z0t_$;!J1h_VJzk=XB!op@(P)+?kff6_jZ|iOD(zWC2cag(y@W8OhBB3V6213YyqWk zA}Ldh)KbJ)G~ed9-Dql5-c%dN*+LuV^1{PfuHts5MS?RNb3o$E001rAlJYc*&U>a) z%6P@PJ+-*|u{7C0t3drY*iQ@GBrj$Qrc>zStfUmB`Y8g1oDmkj6LM;MMt^=w_0LPz zOFW@Gs!=J8r*vkweIVN(taR`~1j}olf=70j@-1)f z20fbljd33{+n5tAkUnxQp;S&ZOM>vb4~4p^pXG=a3PrSU+4VNI+s)`Im!$V7j`EkJ zu4Z63qorY=$9ogYE|EXFr zzMjdx3;DjlmZ-&nYeuDD50_ZjcH^c^KPxIVdazVYYT#J$xfk*Iv<*7k#IUuuGkz2s z7wf0Z()9V1QvFpA$5C<5ubC?xR`J6q7@R<`%=?VYC=@z&gDKGwAX6TK%q(Nv&muyX zMWIFgOqDkIsEv4zM;1}0th zK1p6BX{G>hY_j{sPWAB+GY#ad#Od99o{-R-FIcU(@kF0@u*Z_E#5i8k#zH*N5JFrb z`JqG3RDG|3WK4X?v=;sR+yWvs`0{&L^L_{yVW8ufev<0;-(g}8V*@C(c6mHXZRPoN zQ~2>+Cn1Gs{<><5-{(d)^FYVK%2q+_8P@Noh+zW;Jo>$|oY*{&!$~Iw8D? z81>$E_+49!GARi@5s1Izs44IT8v&3gP7>W>=^f#Lx@G~UnZt~MhJNa3C5_{}f58-= zbaJ3WLhV)bKD|+X)g^!Lx+uCXbd|FI5{i=tonA;(Sg4e-kXP?eMpA-!^V(zmEp!bB z5;G(39BxR?qVdfuM8QNP>HVmpi}pec$i;aQEdOF$9s;A;dSW_~hbD{-RQ{cHa?62Lkm`MWVIb3gQ1I$**- znr*x?goX5qEWXktLljv=9j?o=+dLx`3?i9S=3wi){IR-AJ#REfqy$m4M7CpfxMt*H zSxB+|k5OODTMHEuFct|h3f1ABJYWbJr9=y#m*_smSnkKex)Z^g^rMG7hD~7|dDM<+ z$>K)|Q!_B@#3IY$M^@9Hs^k88@si zl5V=c=}2f#m`?W|SG8sd_W3ouqs z73;wEy17WXREvukAnTVw#XahQu-#NE_VPBs7YR8*S!Sh(U*nQgbzoTG7;D>A4bFQ; zur_5teWZ^m7}Z1&2lmfvii^gZNwM912{gy`f`XsJ>D|>7k6nz_;Zdn5wd_}y)fxz+}Z5F^Ys1)|DEp?$z|>0uORWhX1f&Se(B6+8htJwO)fb_22Vra^D-VnCxkgw()=5_ z9yF8fwx23A+>zf339 zO>}vDnxiDbYJ6$sv~u;SaT&gGy}x_NHZ`bdY;649RW+r$g*`UhBWBt18<1ER_&)wc zi>r~HK%`{DW?%}Pi+mzXNg`BnCe}Lo#{ALpF2@a-n6TVkm!_(PS_Q1RpfQf;p;hTB z3ZsLr$tv0y9vZ*@jT`n1p}IbTwolFK0W9jN&b|>Bme={O1bC zkD%g3?hvuBl8U>&0u@paT=DRDXD*(uAHp40e6>|}z87FkW zrn`#$BvVSq2bY}{jeNs!y*`ki+;zv)qR)VS1M1x4;*?l)_?@!5MG4inVd3PI(8RL+ zEd$rE^OI%fl-Rg)F1lFA3p6{xT774B2L^%ao<+$>LIiXTsGGUxKa4rt*B>vbL=#^w z42zP=v0hW?jeR#z8x9=>?Lw9lDsW1lVB_Ibcp`rJpDW;T>f=?*sWduLcFJ=m(h=t_ zZBu0^6(&k579K%^v^qGlrsL~|71zxN1qt)#y>jwHS1!nKO}p49j&TYr2A&M>lR<`S z`TTnHo_hnl_7x4i2!?=v7t8PBbw#Q-lAteQBv!=wbkS|IWG^r&O&{|*%7MjG8AT?i zudfE#qUJptg<2K3~!dwtVe8RsrSTk!xV_lcjl-(rDrH z9NPqs!hvv}E{`D6M;DM~tg4OUR+ZT>2tQs~C3mk}MtyM?4H?}@!m(A-x}nq>OD`0} zs5FbQJQWf{gcpC>DmqqK)Xul3aGSjkW;+N9g+!E83XT{j8!KIgXeh;CR~G^o0;V#F zJLxk5Rxrl$=^KKfpCjxN7&>&C<&76`ui>d+6lff>@saQ*jwaXdO)@1iL1&nymk&zB zU>1~edMIwwrWt7lqL%yT)=A1}{S}X zs7fuz5HoeV7D+p~#xGlofo|sD!fek~QPUF28WaKX0+L?*yg7OBQhF)q=BU8D+tu$8 zGa|MB(EVlg)N?VEdo z6$Ccv@1v?Jv5EOc$+O7RF5&iZaV{QMs75ewWm2#RZ3X+iqbXK+8D#&^(_|EuD^&at z894-s7)7T;+V8gyslXinMSXuwp(;^<&i(TT^JhA95Eb8lO85cKOxlc@0+EHE?N`Vd zelzeqneXkqt?2?SM?`{X(JGrZ7!GPrN7F@7?8j-)fc+Jn8s5cbO?_0)eToQ`7bGN1|dSSEMmab4hC z_b15vTqgM?Qkscq=q87flSlLE>$X>59=zXHsZ=zpB#tD?JE~pd1Om82BqS+Y;u>3N zY|XE$f51{xFA6o)fjkKBDPhlXwf{UOB$d-g}cIxPI2uAjNZuE!pYFodaDOU7gh$$)K5_ z1xyHoo=?=&7Pe|3UjKT2Qjz<9@5EpJ1NrxQQIRgzlMHuOa-eaD%C!hEO>v!RjMLHW zCXtUjM?(B-nzlWZ22OQvRZ4(y0s}QmaS}~V2)w2?SCUFNRDPk{vi$h| z6|P?mp9<+~s8*MH4?Ws6K5vK{d<%d%&$=b8y<80WG4|m^0mtgZRix!$(8D(%se^5r zn#LW1{K!BBM2pZ>RygfS^a4q$8l%WeOf;yak#A@^9z~Ze$QDO`fJu_Y$vP zk#4PRzr_vjw}7^0-jFRlg*T6cB)R)VDv<>momYYnD80Zb z7H?G9uTOMc+tDuLGzJBEXWq-2)cfoTdL0 z!`n>XF~?8x-lxpJM-lw@-95uXa$29eFG|6SAWWd}+=P`@7sWU<@Bx__k5Ff^T)u!G zd$523;K}#oNnNaCH z1@?FlNsv=n9f0@mTxMPyKeqlYQhKngZkjPce-aP7Ltsita)R-jMSsViz#+?fI#^!R zg~yG+|9uq;XdGR2Qu5SL&Iz+rp%8RlljQjBhY6Edf)w$TRMVyf^uhF$6TxcJm@tH*RMNN&Elf-|qr5+7f_0FJ1Lyh8 zqP4iIq7tB0u96|9_&B%iyuyNwT-^Bm6Qn_$P2XxYkhXK|2SIxtgDZb+S%tz%D^KY&;HBl+%`q6FIxPa=uYq2;&kQEnidk>iio9DUwj)%6liH)Yyi|u!|^< zZ|tTiHv!!)f9s}ztE`V$pgF2NEIWFU;4F8C+K<%Qj)QA>J$OvO!^|z^aVC<^sHk&Y zYET^5sWGlRUHiHTIfQgR;Repu|Bxf3YfB!!7R99ChO<0?xoIg6Ngc6wxvZ{*m2#{w z;R88l`H`$V$juvP7N#Y%QyG`~$>VSyM(uQ8DX*TOf3XW=Ux?f{oT7K!cz?HC$Yldv z`C_@PKh|)O%MNOK3^H})6Jj7=wU`Pw2nkp_N}hV7R#l^}S~l1SIKC|2d3*nhiEg3v z&s8o{O!FBBxD**wB?w|Vpi&e|@a5!PWU3ZfUvr zz}BeE98=m;Gj;X`M}Z`ojJ&gX+|4%;QhDaiJwei<7F;>g@pHawDlwSfp2F*}x4L5@Ut z%OU_6>Rt`HI~s;jNHz)Qx`R(vsWM>BPeB@7ray6MS0q%w<`OxIoMgT_z$6U)UKhaAdS2y8=D9ka=8Y{ z1-NyBzRyy<=3W}J7U*y+H-qEE2MSRkZkYObtm`NLjO+8Z_L+ebD5y-|ene{zc1dcU zHFYm!lMDBK3!D5RhRCcv$GZIm#1;&>i}lOd=67vSQ>hIbY2;#uCR+m;)0y}?TMQjK z48A$iq6J;O%CsIZjWBUMVBKmMEHM=JIlC%HmttTcLm-QMJX>6299Y%J#!gk! z7{QO0POTb%G9hVsPoIg?xT1-^aYM$SGHuW0cyLTr&wjt238XDcz&l7!T8_S3m#NQpD_67~q4o03y&~Ype#m#1~X|A>C1AR)?+PJ8N1&&r<^Lhn;pBhehWwhnVlgGr({$8>rS{lm%3rF6lVgW!F$OZmf(FGRq7 zGHw!Rxrftv)Csc;8G+1gFEA;#Gj$hHy07tSk`X342e@G#|JyC=BWcWs^?A_SWe#V-0 z={FOllLT4A9iI{}Hc~M=i895+a`B1}$8pvY+2*ZCq*N>=)XRG< z$07k`h7A>F@+ZR_$n}{^`+#MViZ%4fc^s!X0-j47%2!f?RpQO zO&hEJg3#Z|w9dL1doC((VEgNM@M!{$Ph>)<1+Q0-dQmsAQiqvhCS}kp!#ZuUX$mLJ zVGeo?#I9BlF+=O18ky%ww>GNsCt zrr(?H$Y;p0&l>ueCi8NN6cqyuIR-_K-MWn^chWBy@G?4U(dQu_d`AR^YlxnW0s%h) zxrHfmZJJ8%oDw^^%eT8;zpT%y27^JCvNeH-=5K@a)|0ToZ6g-Df*@Zsv z_^k;y$?`cDBeetS@;8~KSZl(L3NT)6Z^NZG6h$SVm?)T7)S*GR0I1cjXA8+$4ys8m z@SxQMyT3{J7o1Z>SryrK7Ue-a^U((fFzMdgP`%QpE`h)Ml4v3Ae!3!`>1DzLlzkai z2!6yzZ{`9}vDbvGJ-EAgr=BKlEszA)gxTU?UJx)9Ye@W98;w{j%e~2Ws z%M23hEV+&(ls@x3-{pUNUSKL5KUL@>7HR$7&Q|oxA3St$9k1Q}L3gDLG`i|_zrs-k zH1c(KPIr}lp@6C~4N3uC%8lYKB6UBjyxf=?^fo)6+s0^7nQ3lZsf&z&Wp!9>=E1wF z;IbF)kR%zU-MPuUJh(?7vHp$G_zRsLuZQX^7^-HX2ThB<+9KP*RZDv;Nw3nChQ@iA z%$s4T;+I5~FX1*79qIDsWXqrNTAo>u_}iY$*#;|Uv!K73f@ltkZMNr*7kc>z-jobY z;mbl=NP7rp;L6(riQb#4ol$7U`H|pvn80`i!oZ$D)0QmYA=+LiUHjk#$=>FEd2ayS zs>I~83F<*8I-NF6O}S7UEu?pOZ=IX<=-eHofpol_chGpU!32bB+*6Yly6xd0)i@q~ zD@QV054oqdIhlBrpgg!^G%MZ#`hq5(Muc|;_ z2ZgSY>WxhsNT@$`z`&jf)@8n_{}U$0i;^V9M}cHT*Hvj{yTYCgQLQlg52^OHFoMdE z_us-Td){5M#(m&UyuhIRU;-AJnAhw@`zD6ut6S0Cj(Qz4R+Cu%j}~4ZG?Ufb4V9<$ z7plqL2UKoe37hM#`dLp@=WU9#ln73{SdirYe5pygE2oZHYRKgInMH9`i$<3`u(j*g zS6sKcJpbi1fHX{tZnFQ4jyprZij8}~&&Sz=kNZt1ZG2=UgQjaiaN8t&ZT_~yhg(|YWlY#pQ>53|-pe-Cd$8`{~CgImLP_(e7MywrASdC|-?fds82AEJXK6VFdPX=N(J$Z)}SA)OA8|_!k@OnS7 z46949g`%gL{4RQzL~rV3O%%>#&EdS%rrt66#F477y$rQ-O72|TW9ucg=4U)+HBkmy z1PvXovjoXozX?~3fBed_Q=ZqfmEs@!-O6y069e(Thvnt(zs`nOp%D?RybO+g3rZij zVP*LQQ?IO}v;v>Df_+Ko!S6HZ;H#mCQdqgCjFO(bca6z)mGDh$O}2~>bX~(I6W-Z% zqMrdeX*$`w=aa9JblRjmmX;8_HQI0?D9qCPkoCChpnoXi{`J!pCyHQmOq8Pv;%gL; z%p=nI)=S;Qe`cArIOVK+5UFr3L0P0Wcp3Uf&m%}o6j4_i-X}q$cu+{RHp48^#cer*#wR!A zJNr;3*=aPA$`4=PnEz|aF%AroRMl$X9fYKv225tIyffJOI@|?FZBra{&OY+31`mQI zQY@auRM_c6^SWo1UmR_kwU~5k{k7@>~AoyE5wD`e#MDBU=XqBB^LQ9u+;Tc59t zc6Yzj?kkt>CUK}RE6Eqfd;C-ZVMI?z%yB@ERk3e#eE`=mqPf5x`5O{mi+!eCDH8HbLuFU>R13&oiL(9+QCc24N_Of zXqw?FXcqbjvvSK(?rSU(C}wQA$}uHb?a*@R|Cws|zWv>Cd7$D6{0!-?PSua3 z&PWj0bUHynyDvbTlaJ45f{@826O##MnkO%h^$g}pbcNEi18V}dC20j?uZ;ofbNAXrm^E& zPM@iLixMf>=Rl>-oxu8md#Kc*TS)I7?3Tp?^U|li{26v2j754{D3N3w)qs!aa;B4x zvCvW*k0JQ5M(w7-PoQ`i#tVq-vSHmUcCe>pKm`qg{?)aAENWVgD2#dN-xUPfCCV9^MC>a476A1B47hxZ2COhZKx!mFK+ONufa~UJWy|2=V(aQ`WbfkW;OzR( zgWH31=d#uQ()A6a`i4}Mwn2V%;|}m#TUSyyXj!MAnX%)?M=U0ap#ir9vJ|^|@4M@P zOav2Mbn>}*9zY5D1AF%ev}eJ3Y|&L^Q#pp!?9INR)l65~taB!fH6+MjO6_H;@|wcv zib6$I;Kr$7>SMq#L^Va!cXBvCQq|R=_1(35rrnr=UsC1PNvSqyWb}wUCSZGdaq7+@ zLqNCZXUnyJUu1dPotj_kmz?CIo_*NqNFlJCVDURC6>@jh%<096ZLj26%SfpWlb?%Q zCl(yUMI9wOth@e{%XSQ5CjtDWcu&{c1A3qq36S$mlMPejh|fL&lrK9 z3x>VmVXc8UqasduyP<=`UQ8Y2o92*HA5e1hLlt}4`)7!-GB(uFN42D!IwB-N)2w7= zQ_Hbot2bq-nofS^n)R6l`!rwqQ_B9@#ZGt?+~FRwLDY26hhjy@q4;XiR@*5TsbP0B zBNsul7>^EM8c@YQgZ5$a>uKQcKJ|9_Y2a%kNonG?lfgk-M0`}kIQ>z&bPx+X$L={Y zpBG{hW}IPOcPzFQv0_d^8fB4d92&AW19g(grRo%4e`oiRTkxSOR$H4faMStki49z6 zl%M%IBfvG}IHW7u8Lj9aY|w1wnCwv$7s`AHT3Y&=|474Fbk7I=&3f7{6!RvAVheh_ zYx5poyT@}h#?F|d(}7;z1e8M+Cq)y#s8TDVq}Gn~P3iKOof;<4b;wHr+s)0-kGee9 zx~A2fu`yMUH4I9|nbyLG@D8BFZ0C^WwGt<| z3TdAPz=3gpy$Ff&*duf?&xDuSA9;7VBK05V?JJWNeRMBT*Lo@1@8jjbGm1I3vVGmT z^|*PYah~w+v?mZ@srs4pAJSw^=}GBMY1p#Y62V*3x)UPF)DBpW2)A}sUp+Axa zG|~f9Q&TH7F)V2b{`052*A_AIPRw#}0{I*-*h>z1iE7;ysOA=|6o<(UlSlTn?1@(G9w=JHg#I&U)VZDp}q#79;2p^d9jfO&7Py9>(<8pV$#&&nup5SIzY;H zkTPhl=U6FlL}4#VSaE2;{rF?#fZRMVdhdl*v3gBV8Bu~IWWX1Rb)T&yMOo0ig|sOH zxWfUSwv8Xrk0&I)KYlm|IMpJ9;`s;Mc5#>-#r+ue`xWX2lt0kW43^g6Pn5A6{i(Jy z@ihdl;j~^(Q(l;7I4sv+O<2E=XmPvHj^cxGo`|1lzrOjt`UGqyG8m@8%EyNX26MZ4 zeO)u~?)fi7R(p>!^YxV%x}XZMlb3Q<1{rUlXPpCpWy;~mZP1DuF82pu#jqU-*4*6+ zFr0gJ5>1F(kJljlP{OIslWN`-GyFKFQ8)x|>_fu7G^r@=+PgV>!;O^zvUHSY|5|j7 z9`mC?2v;yjz(cDZn3CF}o~~Ket+VTEQTD^CrEYYh6Dkj8udmOcE>X{igPW}lo)PR= zTcNWWm`mK{jJllnEy&hnmuVq1L~n3JT`a74+yp}%SZ_E6oP z$o+S8z5I_c?A$BFdLnH3%pkY)O^o-DArE63#pe$ba&`ceT2t(I>3ZqF}POG-g3nON%nsvGlZxdjofA&-8J$a&vuDA}z$v^{kW$?}5=hFf#T z!HZnXtR%sozYWJ9=Jo0yVY)F6&egwlFMeiKv-3JO^N4epsAI^O}RE{|` zYxRM$m@CJkgre{;!gVsDSL#($J*o0gWqM1vG$Qer&f5e(i#E(TsWT`u)Hea!YptY} z{Ng6q(j2p;h`MOc=p2E4F}dYKuDsFF%CVXf1~5_`_SLLWL?AGJOmR7QIYL3=V?jCv zfU}!GD+*C4uWwYdMtV`>-qgU8<~OszSeo=Y?wQH{Nv2iE~omIxC=O z(2c&Q(n{-+(|!=OrdE_hp|W@|briU)>EqioceZvuR)fQ`TB{g7QDeK)^g+MqOYVI60xqURNDOGf$QhimXnZ}mb<%5?l0}c zHv=^89kk9!!RuRMn2yPXQpnN1_|L2P9(|ruf)tMUJje6V-n z#NJ-XlGj{ST^(jFa4C=%0>i5M+N=KB9X5kV79&@Lo`JQhX0;^Z-w>&EgC2>2Y-x23 zKqZ_aK3R@p`=XStd*F-`M=mb@NKH;XFZZYsp{wXkH$xV+Zz?PbLG+y3=cRy4AyTsY z=I%>Yg%h=G7{gTj5y;o0tG9K?USDQITx|R^^{9<@?O8LLe$g2=41z`g!nfs0ne;*R zwNNy{@Zzs!maNFu-0p!NN-#tKlDJE{CPz`XAe<`dTbONBruocjyBTiupjmzL501+f??cbm$DOGQNPF31);B@X^20WN-PozhgB0Gqkj#iL+r1b>Q4xPzi(j7r<)1Q z8o3`d56;-*u&8Oc6_YAv@PMFY+EY`_&t8lzrenMqB}@x7>7!|+fz5&6kA0xI`dxXJ zttN4T;7RzDE2b3l33ZJ{69MUUaKG!9M3-~gk;=OD$|*%$Kmi*aBUO7Y!wZq5d|h5* z>Bt}XXlD3?`KMe8OHAigA}*Bq_U`8Np8bzL#v5=|UG16v^zQy|7__HI6RqdvfQ=>7 zobw9>?raxQ*593KaON?*Cn`7EKlY&zm{g5V;LZ;G2WW#^S#;A$W+*C&JNPG!*uD^3 zA`QC#a&!8?a~%cna^OMjB6H(dAyF&Z0iPPAEIPJwWL_!)sQPo>2!UHxMh~U9#>%i* zYv4guhWoCd|K~{2USBP9_$#OPublt?jJ5weQrJ7%xqJNT>7zVlyTyReeMOBnS-_Tm z4h++dK424w7Mnm3mJ6|}rwL-BbW&6s;Om`M6_z1h1RZj6eLH>K*l-FW#4-RLCFIZb zGV1xOD18sprs)R8Q<~m|aVjfg2~2BN|6D7v0yEI$=a?;VWtZ&BjqjIB3ZRd$R0q4( z5uaL)lH2Nchl&_`B$OGr^?oEGnjfg?Ld5Eq-n#($PT%@f|c|19;4W5`yU`yeWZoxX6I{THS$))H*tBhT3r;sp0iek&m1=DblM5E<$* z<@U-8TxHmetMW>46B&;7DDw`}k!O{jmPg>(*jwl=T^c=3cfc3e?E3`K z{HCCNvlsz5C}_w&4gEf>E3tdOcyhlN0u?Djf?b6p_Pn5bT!{}mb zGpMMJ8Eb)$$jB)(8JbkOVLy7QM-82b5q)3ZSmspxD6jm3ttQ7NJ3DZ;(vh~rpZ^sU z_{(#K>4O0Ph$H^jC*RG`;y+X8iTXh778^p(7d6Bk;jWNF>l$sVAQX%FJOMTfm?TZsvHj^x7JJcVms*Y53j(-&RSJ{MowrKo zmCo`)JKgl3k2ZnS$@YJzle8n6GiO%?)J0BgGGkshMGLNM+BMBB3|>WibK*9Km9D-g zlIl-FxV{)Y5iEUqGk?%8+1V@S+XvJvNk+7juO4j8P$ zcKaYL&%jhK?IwbT>FumVdw>nFllwUw5+t@N$`VVUOx z`Kvh2YF^84(T3Qs!)rt4qkG#<$mMF7hG~cWE3cKcD37wVE=Nwo{_zh_c1aL6)Sl2p z&DlhHq4LzVZBQv^P01|EB7#NPXi|gaEu^tFob=p3SSWyAHVu;q4bWRm%%+RA2m zlqg;!hHk~c;c&Y;VXX%xPvtH;!QI1@!yzP^J)uVd%MCUlIn=C-F)^`sLJ?Z%gS}%m zSmwG4bc5@|UQ>;4cvqfLV1r%F zIwxb+5leUs%AArGK(hmmQk}yuf9Tj4G&rHMhj+Wcl^MUp>b`P$rW>Bf^a8DgQRs6) zUB12oyl&4sdEJu)4;-y!3{3i@8~3%0lxljm0>%6bSOcUDAss5qXU){T zE~H)>(kZ_W&aQMAr=AtZfuMI=w1f!>gX<2EO7=wGW@+t9ItcZuHo1;(px1X1Tkpjg zyHw`&DPcj&NFWom1+7#Px)Mv?i)>aM#L+-S^GjNvRq z)_L`{tN%#3NJs+G9{9TwDn*H8!mhbvOeVIN^-Q^H-JB##C@-?T3f9rm#z~LEW|fYs z4JKeR3aGY%!TK9bUo;f+RZQw=tXVB5I96ACE1FuO&@^xi1rBq35CE81C7n9G)aY7s zG#9JQM~Yffq_AGe2uVP+)di@6mZS+S-k89mLTr+KU&38X$a*Bm(JzT7G%1^0m(68c z${ojY#`EEyAh%xHCU9o5Bb|oHNpwhrwY!e~D08`IM1^17_~{DO!09lkpIwQn^=%)s z(C_W_`h1=4s8gLz?{3NCn`$b!Uh%K^vR-T_jg*wd2u`?Hvv)C2*>VywbPV zrUx@g0Z&6TMYe)H;)Q=;9n+X~I8tx;B?1TFbse2?Jg4#%{h-z(-rd0~63(V`X(Tg; zp-R?#9*F(8ySTVW$QADKl{?$T9;Ih_)>Y4%**AqbBbt=0 zaM?+9?TIB-cW)(g;%FYQvNO*#=vdK;q-VopM#M|4VEVrGKVz4C45oPeQq__OEJLd^ zdIn<_q6!z<@r@6gx>}l+Ff1){e;;E?6Pq1=BY{S*K0(#&k$xhLdRCXYMI1d;gD+5QGwTVQ8oy$k4>tTWgmu zcy}pRGUcLy-FK1{=fkc2I5Z_@+Zz@a@UAZ;OxE}JIV$rV)B7*j|LkZ6`{u3?p#cDr z@c)}lRsXl6`F|Nwzm=**^LJBKJL2!AssJW@3SCmN3~6Tdnf4eXYV^5|)U)d5o(Fe| z@L-y32?6mywdCc0JzdcEs!EBkTC!w?;XXq~ZyO_?DHq8h2bBz>WP|Y&&Q;7q?Mj>W z#4VFvyl--sj}zBzO1#f%<6Xxc?mv~s+P%J{D#gZz=pj^#juudJykA@p!($TGlHMKP zf~H2~s?%u^?o~%WEK|;>YS9qd3eTAadxAN1@?_uoIy-(^!*_+z|a_(siB z1@Gp;lUb9yk|RlacbHuV9uwOR$celRs~Fdg$Wi;~FSC z<`a)^;)VgODj56VMW(flT!DAL3?@z{OGKb?ej@NkN+AM|(_gR(a}GxWY-_NJ|=kCSVxa$PV#h4@@IrHli>f4rv`{Hq3HbSPrv zBvxd;)FQSNx`ZhrbQ)CCT4S7BkTN7E*x_+C;SBl#c}=7SP$YCwthJPYkYO3L2v_ka zgGyMZc~+nXhGObMyy-9LJ@>k=e*(|63f?t>q#!j46j)XTH5_qDWphGJ(UIpiF2*hY8^{3fQFXR9dj5;id=%{2_yp^F2c<-wa?4 zLg8<-zvKqo8qhx6Z13a*=b`_x<@Dw0ZilWhhllv>%FLZ1z&K;rgXQ($mpM(lfPjDZ zrt8U`DSK!B1er~1Z1iV4ZC56+HcNa*O8l68fjyLX93C8Q*gz{(>Es3a*uFmU%tG|9S%`?|-5 zFwQVmgd)bPk+(MQ7xM$`45z^_%=gOT&plgsyTNK?p^}+Z<1#kr9Op<$WJ=8W7l@Y- z*T!>Xu@r~es9Ov0?@W`h9BUYX*ta-kP-4wehKAVaA!oXEympJa<18Lb8at5-Q3v*d zBot;kP&#wmsP`Yc`Aw+Z1LFoTLfP*lvLQA1-Ml#k-NrMi=>e-iBxOfFT? z6Htx}62x1YL7*~jDm>G4a-~#PQYeH35Fh)sDix|c)eG%{<%D&E_GTPuuv8MQ7&Umf zDEM>7Rg-wT6Nsr{2EZEym(;egHr2Wgy7egB+ygLT;wf@t>z1%m8Jz*bCU-)afxn__`r ztc*7BS(%Sv61{_Q{VRy`1p}=v=b+*6y03!5@^rmqB};m$%d@;;Ijo-L#HH$=R~Yju zftfxWpfh9-BSGx+4P{z-}^0%n^mg{k5GX)PTx*0sMl+bz;C1S z^`9|%pTDVp(4MUBm9U(!f@3qBK&<+#l~qUBvfO}DEqPfACc3(V3CM|%?Uq%ELoW*R zVWHHJj%{3N=6yEB^*BaC|+(=sy*?M+vqyQz^DOe5Vsi5}bO0Yka zTEQtfbXD3CXvWg#Fj1d!r~bCw2g0x?qv6g`X-?~U!72HK=v4tZ^ajgdw9xnUF0qv< zY_QNZMfP|Ih47#6_%^$x_w_95) z*R4)(XSRWz?m-D!K09 zwm77Y#OZo}Bi-J`K)fTBzl@}s&tjp|8aS~tN!)x}4if`ohg=7MqQBX0n z!(pYTw!53>Ik%RY%3gnY9DH}$4B#y6!r5&{@bmOjm4Y|?tt%ge_Dul1!D_VEW!JWw zN3E^!sOoIm>~(2K-kI8dtWURWT)YO`6IE_mXcZE3j{3dB`u=e61lX#IfM73ZoNY6m znz;9hlD_Qq>^kU{334jeB`EId^DdL#&{UpW^!dw9_sH;WIWGV#=S|!h#k;9V!DKbP z^!5wz(@5=B4WUp>T&;w$sN^GzPC~GqDnQNpx!DtPK_#0UuHHB(-P8GjQxIPkE84iJ z$QBJ#@WK@9?~~9td*+ZK`G~wky`y~b&YmOAbzXyW124$E;fx>(L!fL{2a!KY0NI(N zD?Asm;aq9a69-)7j|+tMHX#hr*DjcBra3Z*2lqR&dqD9dzV^93+ot z&D`hUWh>9YY{W)hHHDGT8exDtokYZmKk&jpYk31r+>trurfMBtCoGDxjrj<~^w-|D{4R}s|lZcb-r zuZ|FewqzTl3Q9j?6Jx^2o~@EnLxQzimkbYw(GQKGjk;GL@l7K*eTq@H)9+APO1t9Z z(ez+aE6)FYU&bG&=NYDUQv%>#k?t9Gu*93Xw6FwodRaRk41VwRM_$!u` zzgm(ZW@5gm9?$YihcHsXe}dJ+4NI{!kq=X^T!g- z*&tOba`|(c?r$I$`BnmEc@AVqlNSe(^oQ(oi;E*jmKlPkA^mnE70h;J$M{i~0 z9yei0aquubJ6^r?+P;EYkmcWaUR)@QW%P3T{!?aGYC^*XO|D;qwSWV>#xmiiHFMg$ zPqFsaR=myt$$+3)gBQw$asKvR!Nkn#qDvuTQ{mk8T0QY~^^ep17yJM0tt~Kd-9umi z00=4n>)zVg!p79jlzpGFbe9(`s#md~j(XH~P#G3j#|+pC?7(bOfd z>`K3jN``rv9jOQ3d}vobO+w~{T(sfcK=*Ez)X?uj9_H2tlZ{5YCJE4XGLXHfriR0W zmPN+%dRobM0el=*SULgW)MAZXf7aI2pT_w0c>g{)M%2*}AVluG%`Qr^rNLFVvS9u=+(ZxLup(946}nB%U9fhmI|Ws%P_z%D6d=WU+3x{H>EEPv zMb)OD2{ta};HMb?_LRNi)wD3#I~2$4u%?ot!*`zd8{+AGtGbG*X&M^=$xtq0NY^(( z_oo`MyZf81EB$pJ+xQaVm6hQcS>2m9Gh)d5;;)!Mj5#8NVUyT5ZnPO$*<5X{yxBDh ze(T3a$9sR93u&W}-JCq}dS}9<41(}#;F?>F*IT7wi}@|LvvuRvxX}=cyD71>J$@5n z#N$1CrJX1H520W<%7do$T(>LzFAv$9E*Gbv+3Nk9!k*?Owp+Ivt)6m{#O_TUZLSqv zHF8*@X4KG*eIzyKg$!R48J?~AaP`bjVk3_nOq$IZ0kDm&cQTNgEC%2T`PYW_7$YcK z3rQP~w3q_45ID}S*y*9m-MNr&+gPzPddVQ75cn*~hKAj+g zvcKUVl(uC>DpYYLDjLY4P)}1zi zG2v+f=5x~E`CQujo6bOez`b!4ig;Sq7ryRqxF4)-&!$;x6w^-4JoMME4=J_7Z#Q)K z)IM7LzXtYrBpfAFRrOc4-SL-DUf-Y8fL#LR#W~k8t1OlQ`qkr~93>Uz z0W^EZu$Vww66Xw5lPAm7rZomx8rqT2z5Wa~CD3I+y;P(f@6|4{Q=2Js3URFfYFkh{ zLzHvs80f;HfTVIVkzVLzpv3M*(L(srT)XAJHLY#eT%w*|%AsOYnH%bLKV^AbKXi7-?QXrOgPt;t)=Mu6mmdx;Gzuw$98{ zKwTdA#_oP-Z1xwbf*j)2bx2|dptzgAVcvlK?1hB%*;&SWi4;`|& z0x8|r?@`ysNM9_)Br!YJLkq?Vlei<+FJiNRvOiGL+ca4U$F#zO#xF&I_$9 zSDG}BV9qcSi(9}TyTWS>_B@VaZ!rizkw_NW*AR(GNM;K)aA$X6m)BxF4j!_8CM6^FB zd&(lKr1zp>4_p=2UTF2caT5~R+#E@K(XcTMa}3fa>^fqaZfZ)^z?4YEh}sc-$tuTT z?j;FwEbXi@H#uNY07NcV3ZVrj(YMBT9{k5IQdEIR^3fpsEQ;7ANn9>ea$|(1U88?n zjU(${CK0-HFklXydcXg@^5+?&z`7(*K`|tKehM>su$fLWUlBini)=#Mh`GAcTwdyl z#t><{Dvg)jdP`812UqyW0rh1@5dLC=Zz|(YUZaG8TJYcGo#Ms`R*D>qJW(OMhJn%`zeZlYgDEafyXXa)nhNpierelPj^$Y~Z z+n(I2!P-*ljj?2M1t0>1Y#7;6*WZ9su+z#$Gf_U72Sr*8vwxF+3(6+mpa2vw3)ar< zyOzx7-*!24yIRR~88cf@jqUjwz!_;@35St6f0)8bg~gLb{=oxU5hidxW5r4%Hs za5}uR?M1@|dwH~|^05(lzZ%2%*Ggs4=Eku&eFx8)A|<#hT7h+!9B_<3-#FBUy&TP{ zb6}J{3w6jqj|%tQrIP3iUd6fiYq~o6+2DHOJr(*_bKNswUcS!~7^cbRS!3Egwe$PL zL2CUC+g}-8aJ&T5%VLEO4l$O_z^wx>{I<`OETHskhMP)4$>-$M=Z|c}*1M7{$dRKS zfg@CrMK!~Qe&EbxuQO)?m2hcn6H;vFUuufI5?^N5^c*NvbuhYVgrC(Yg=AbmCbK)s zlT~V6`}PYw1ioTDPv09+>VBTjMl5d(UQS4C`VvhoY4V10(Vywe_011nlpLGyhK$^& zyu12|4gE79KN9{;9gMNBN3~#dttGi(yu)xULKg4hUOm7|IrdmfgCHz& zp|->4Bq^*?kxd2{WYZ^X^Y9+zP~JGTVV7GHM@+byKLE>jBN>Q4!k!j)0(SpQoACuL zO-ieDixCTDY5gX;SC)&8H!z$=1z#R2l9Pusa!QNHUh zm$!b*h;?u)!)T+AqdcqrQZ=2t?2oa4JjXqgaJ$_$I%m87>mdIzVEW~wua-Uc{=wcp z{qXUcQLjlbU7F71hP{c~*|qvkM7Fbk6vh>6PdH||BlWo#G`}5kxsxP$`7r!9ESNsg z@cOBW)oqWl6sP;e!4sD4b@APGfE9l1Geoh=emvtk_o5ztb8%1oWi|wd|Hdh^()7(XFYNC-^Z$gb}8Gl0e*OT8cHhJ2Ko256QCkLtR(#T1ec) zF7^4~p~Ck!&e&f=VcfWK;GdT>6u|k>fy(6f&b1l6_T)HFSe?LWfY1h;?FFECvis%r zUS5gV{a{u;Hm!AhkcO=*c_X=4+z}p)_Ur>z96cc1$LfYuqPqzso;+og375m-)Nf$% zXV)oy8M;3{s|}q_FINWQ%sHYIWec{2SfpBY)7+V-29?e*yD1&%d9SH7e%69`5w4GR z|8t(vMdcT1_@y7Pf9VIh{|;u+*SD~>aMsuV9cXNlWbKL=5JK<1p{RfV2g}oV?+9m< zS~e*NB;dWUI2l;fU|h$@EdKpq)d!HA9DD3OjCC`A8_Y$n2c(rjmrd3yv1V#JASkWZ zrCTVODH0;bsF}bviQ8(L)f=fb05=jN@rkikgaR(-+&}<&vmMz~RddUp_qIEzxYGj=T|xG4N5Tf05Batn9=_WZwDs!xcH{Dz zX1&exc3t777B2utKg5crl0S$0xQJ>h6kL&Ay&ap6y1gXmPHgx%qD$%cUH)4+kHGQRtzrq9IdZq>GO-JZN8hqS+%=fnQ zROrK94B?njF-S57q%mWz@A|U~73B(cQCa|~?{WYK*ON|@^RJM!^D|BDC;uD#e~Rx& z;6zRi`YSx_e=WYF=`Toc>ty;XevkT|-7nMN`=;+;k7oqjs#Hy%18z6I={zC4WiSy5 zD0(ozIB`gnfF-%X8v1kBbp)>|7iiM&|3TO)vg_uC-`8a z@1|jN`^Wys{KIUgLMZ)5{ATxQuAT#`Uo&*i(b|Uu@*PPu;8Y8PdgV0GCswQoNIKqC zwY92y6)h@4?_UGJr?7@{`acM(nyV3rb7s7_pSLZjCokwODBTb+5bI+!)a1rd5869M zEo2&yY3t(~wB%%Sch>!fv(~|}P&wgQzQ)~}e+Scl4cw6i{kbiS_m{YZm{QLZpd1Ym zYu{=YFIiErYPehs76x?JebQj#eLI4wt+<1e?)toz`q(ARsyIro_k-HHe4?P^u}ffm z6+P*eeeu}l1USr2hbvSxyk8U!aQ3s&jys*sBlwROpseyF?WjQ!rt+thPL-Cy8&4Ce zbJoq|M{tP#_8p~|LbR#-`|D7XL+lAuNYbhhRA-Kb=|QslZ{;^7%f$pX%|{+qikNB6 zGYnWK4V>KEywsU%D{;u>73W)X2F7U}5M%un-W8KrTs2d4Gn_N|&O*Av(rg9gVu1~K zT|qPocVWmKjU;AZu~q$u)M+UoAwO84Q;Hks7=bshSAMw zsu!b@-8$hMNY>T83+Qo>ZTuKvHxrS2EqA;mMBz!m-AcG4_D%<*Z6Qe{7#2th(^$(x zDY$Je$Q1}fj)c?0NB_x(glh`qJDI{@NoW@(p7LpYbJjkWk&W)gYi_xA;OE9!TOnLe zk7Zc4XqV?Zry^etIuCYDOsB5E4k9(B5~oZ^bvuX8<%VKzV9o@%E1@F7E<6C9Ly8X- zi!X%Mam$K%qpdzxri4P`lZ=*QO|xC!8HZE_u@IrU3Z7)FFnBG7g2M#E+)XSGf|_C+ zP$paeBpWhk34--_k9x`LFZ1)FWs)lkBv1>n2TIj5j=-c6LOSbRExd2Z?vkqy9$dEs z@^(yub^V6`=;|)jY=sv7eA$SjZ^C>Ti4lLh?1=@!V(}>$jNh2-EDl_?$DRQf#WLJ^ z?FMI*IUG#9>;KSh2$uA+OUP)KlL2RtS4g=@Qc84^ONvDbi{HBsnWO_L70Sp&|O-Ne&UZjZ+c6{BNOho?~2%b4zE=PI`x z3s_?~_u1Tz*&^BBdsD)?5NiqHRN3$~17YP~ugq|UVGQ$gR9i(s&=X1LE^I>AD6!_E zH36-XwC)ozD;$q4O~eVQ_XQ}*?n@jG_z*Q2uOurL9P4L3GY({9xZA)4^YM(HoZn_p zsJ^~<#lB}py72?QwP4)VJxM0r(c3kKfyXlouZ~a>n!219qx@pjQN%j@kDm)KY|g2? zQW?HsP+_$Mvo8-+dpCz4dt6s8zRrXPyis1+W;B~ddPOvy9M$DGa-lOtTMH?GD^{wPys5)npN zMIIw1+pJ7~zunjZkO(L>Dz~Y(xVXrv(jW>HEu6ct^UfurI_-RL>6>l4Xtqlw(U|Gs zkawhoNz!Q1zF2oWdjD`DekMtLd*!0$i&qKvip#w?h^j+yFay(mT|)QJ$guKTy~^sJ~nr}rg@Lp88^s1 z5W;_6e|}nLn@X0d)iz1g+52^K;l|93uC3i3Kc=lVngv-p*l;0jN4^NGp9b94K`kK=`a(nrl;kNX( zY2QxUrW&BN_2do8CZ3N#WfGFzY*#IY`+^;I%})G&hf?I~9pf`SDvjP_n!^Vo{YH~n z9<*R+y8Tb2_iQqu;HL1UnEDT{*MxPNnM8w|A-sAH6iZONe@kOq7vsGAJs>o`{8%t2 zE4cVDD=$5~c$L)OO)Hk5-m}{Z?M*BWadEpaV7ENphk|V*`{1_Zfzr{W=$#F1hr)xo zV)*W4_YN3yNrY9(g0oWW7o$G5R9`{1b$gc$Kltl3l7)n{wryMLIK@PN*f%npJQ5og zPRR5JKjO0Qvft`H@4tGSo+Agw6P(=dp^C{2(z2#tz0UfR)vp~UnC1FG=A4SvCnRQ> z5IJ)vLI1qmgCq`B-2)_0 zRNj`=i`k+Mt<|9$_Ug>xaGY2n@WtO29lB8rXGX0B4ZQ{NenuAqaD45-!u4@ub^Cdl z2xbB+b4ka0(aQpnpMF?%n|MO~^lyr5cfwSI1CqJuW_&-C?_N;dIll z{z){pj2`plFx+wLXY_g1jjOF;qY5){L(n&Pu}37w{FhkF^YlpaC8d3DKF0W+oIc1g zG5IB)*inT*5Fn7r?TZQ5o4O>#FI|Zo?ch>w`vBnAiFOa<$CDWhZsxhyl-fUBs(MFV z6>C{FEgGp327XeVTNne-2>8Qy&lv|=|5Wb@RG}n20<1L?!-=CknNJyL3)cK9@G_x1 z#5yb_@+k)^tAgop^kO;ML};<~4@R_gOb(PP#>s973>=sMPl`G_&MOc-T0(htP;+#F zX{Lukh&K7b&z|3mZ|>0^?^AD95Za%Fx?d88N?0l8U;qRIV^*K&>4Ga#4<8pMmNX`~ z>KwvaqoADFk$wvFcGE_`ALDTCmJ-JII6qyGJ50X3=$RpcY>S)6_vzLrj|PV)q{{dD zb^YQ5q#IF?YF>U3wpQ4NJ+3=ML80hAw@H5wr&~Ss`)K1rKGmYH_vfMRXhBxLVv`4Y z3B|lauEo+-tCfmTqF`42Tg@{#UbV`0zM3d;gf_&%frH^^*6=yf#gBv2or|a6?{Bwy zL6NkAE)dm>Wlm$Hx?(X){(^W#OG-b+TOg5^rN1sVYLb9f*0fiUz%wo9`PzprULANN zG?c;@I|YCtvauyu;v8}wX%1&=(?F4fqHBf2$1CFGDB544j)t76`cKNuWe zu&-^kBY?G@ySHV?3Fx3p#vWq0&YgHJf|LRM*tqaf74|)~-8OvEf^6G5EC*`#?RoIB zO5L)a5w9>MPs}4FWn4B6_Xq!n)BWBWU;EJP+9j5k<5A+J5J3jIYzkVC1?>qX(EL|JK*)=}R)$hKVd3c4?dmnT0v;b>TZ*{K@xQH`W6SRXeV*Ne-n1k-x}6J9 zI9)x#VF0rVxE&cW{y4kovg50(B0F6BvbHn+*t$uFr2ZNCorMh(o}LOL00De3S@^ig zuo8SNKI*!8 zx;CphHBPP%%$>RC|6Uc=RGy1oKV3ylA>eQN+c<&$6h@1~nuD$!qBk6v4N}Q5+N9VFU2xuzt(<-p9fR zw>jb{H>5dp3`_h3dOrZu6)2fIy$QVX8!Pi`^(t?D#(_2$O^1-R61wP|1Oej?!6d9_ zDZ?3Iqet^2&;jPuezI$n=}ImfG!U9Peyvfm!HA44NMqpe&ofJ@u7I@Ic$iX8NHts} z=6ny`kr+tf=r!1}9Rbq^rw3QGG}dr?cRdrzX=%_2V6t(-243>EuyaE9Z!*im;k7|I ztE0*UeBUn&3PPoKPyJ({(skYhf1-nn$zYsq%`FPWp;F9q{uYkHW|<1gU|>y`^Z`J( zB$lopC4`_u%%@=ZkKu*MP866FIBwG7oK|uh$x#KzDJ9}h!+TKx2o2cv!mhx4ZLj!{2(@lSc)Gmx}KWg#^<|kV+B~{yu|>53j6hUN>Dwp!)BYqmkl7Y7C&|c z`~B^m-MpLFgwgoMY=;C9_s5AZdoNv}5W>i70CH z+SQ7H6Vr6TzV+i}&-%9o#B{`(q=J-GC@g0n;A#AS^e!h&{1PC1dk*(2L8+>>q}+6| zY&?z(hPz!roCA5o>;dfD!y1B4{P!j*kZY`YXg3Kb$OwSSE$4vP3D>~hQTeT&7oh#` zlp+AYn&)y{3H;dwc^T~3rrw1qa7i*Zd*s&1G?yv__1^_VUDXM|1Vm?h0NA^>0-e&` zK*oVZ-Vh}A4sNy?Wt36N+>b9IK6w!*^E-w=W^?UkDw=!Ux?#yV|O z%rh0Snlq!%Ym8BdkR#(=!Fg5v^D!2Zp%T@nD49+V|CDGWBcZP)tOJ$FYP4)rAsN+0 za?n+2t#E9-9nSP-KdemZBqx{CB_h8HuGK(4Rfx_?#PU!(hd3-gmlZ3@y7&D=ULLIY z^~0h{-1L&34EYb`xlwk5YxJB(DHgv8;yB(`cIRJB?JH90QXf%O$g4XPBIS^o6>ZQxJ{20&$)m809Re zvlYuEE*G2#Rg}fEjzbxPf+v;8BrLm*%Os{I@Shj@Lo2WYuD(8k;E>^#6-)xg$4*Ly zDuO6WR#{#7^Q-D>Q88xXI@S9SGVxS)o3?8dV$!!3Xf4txQks4f3J)@`=SkELIHKe* zL`t|6ajiD=R^C@KPc{K$I;+9S5iq&;E6*3{$pMzCoJ$nR4fVKYQ`J>AF&HWh2tSXvV_=NFQPvtu?4Z%@m|^q&#N~mkHklt)q)9PuC8| z-mwf`NI&VIyc4q)a91mlqC)<$6lS4PL%LPfcN`)9TLri$-<) zM<we4|4HUn}< zdEFRah_FuIjcom#ATI;zF)kA55+gr82`^CrtBT^;N%0ak#6dKQs07i2DWcr#5^FYF z=|S#X$yczFW!TKQ>oK!gIBvA$z&)~R>*XXS74YGjgZYqh;$S71w2c)(qmVoF^6Jn7;BY%{Pn;|1qy9?zaN zSMqmf;1-t1Ov2w$dt(SdW;|esZ0^JQ#upavwnL(EW&%6}aQce|UNH|Qx5N+s0UR#} z=2MoZ!Hhh#ijI`}*Te{~qMU-x>xnH$!A@a>dspQe_3!BluL2U|43rgIH1Q`MpVD+Zc-FL0BpMxF!tY$teYUk9ysWxjA?v8k3(gXaj`ajn z!H^r$G<%tewa!>(kuWH+);;y;Ng}bsV)BFqp2e1FJ>^GnGKOXmQbGkmzb`b}`KVVeA~D zGYPjf{Ksa;wr$(CZQHhO+v?bMI_cQ9ZFX+Xo!vV+qgpkoL9JTfuC@1mpXcK*qb})H z39xtvF;zLLKxdC!DMSfNUKgj}%S(p6?jrqE$s<$~^UE>MhsC>`V;F9sZ7%(Xsa_|q zY%`bIXS%zZWV7C^u2IkGZO>24!B_1jx43VXp~vX9$EUhb0GwJ0H58LHI+W^9@ip=v zrlcf4NZxxDpTh+lHUJ%%>>Z*R)RU-yMv`KD>M=-rRsL9CuI}ffqZ8ZpV~b{nb39kb zY%7n4p$NA7Bs#O+6ONlNep$@#c^~57-1#+NMS?Gp!_`(R>g9Pa2n0PNQ{%JX)ac8i$UnL*THm!)G>EjOiu+(H!h-TE6fjl$ zP(FB7D@{0W(ps9U!S#(7xN!$5V5ujg+0b-Hpz&4uOF>eMba38;=-TDBwEt4LS=H=l zAfudyq#8`Q*X z=9#WV)}6u=G7PWZQ@8%eyp4_0O)1{<;P}ZbNq@HyC`3)P>v_19gr3 zTByE)q7NGSMF)F>FsEsFI}1Q_F7BTRxKDx3y=)F4bS}B#3JU=8I(=4p@M^~iaPphxR~#3K?BPAl508bckfk~bD=lgh7vKPIPNH}5tP zxME8|ZNZ&#*BA6X3~Eo!#~os5M{%E7$ChFBo2pdDsG~G7Z{|GHPcA`q5qD*bN&y#q z^@DEN6BKt=VKlq>MPt2v_x-esq5e&$zu(CkpeV)UpeYgkAVEZc@eMj#0Aado zB8LLo0cC#9A0y09!^*`UO5~$>j>3e=AXN3D^71PuvJPP!m;|P6%1O548-dm%aAM`p zUFL|RbpgUckl?#Uhi@_GK`cFnxu?sJ!iF3H> z0+miVPK(7NVVy-AP1B~80l?#;RYktMCAgZUF1099%()8Mi+h#StFkqdcbrk2!^$cz zq~@5t+HyXWrS+te?rVHN>aRSgG9_@esy0s4U6hl4E=wb2BBUrNH*77sz33Rc$OUGI-pUB8JfeZCZ*ImRP`DNuzBawkA zBsEijBccE~RG1^xckSj-1w7Mfb>!79su)YXXpO(P;bgW<=4*)9vpZKmts3O7;2`}^ zwya)#e|6fzSkW`<=qTqz@+@g|(qdVA%Dcr?X@u+9vHes?M?%euKx{%C4Oo#zTh;cx zl5qc)UTY7)HlrK*-3ty!NV(Ud7VRe!l-4*uuBy2tkE8tWO-a#Gw4(m9Nmv*J3`J$CH1ldiR^X#% z)s~nARFaEsNZ+S4j!6|&w9GqE3Y_6gyFfMd+O2KkEj-E8e6u}}DiaNZld#N=-18Nv zb>3>!ow!ueKddb74)$kAF0Adne60heEmrT*fseE?UffJ9r>-7~SY4envMyJBhjYxo zSPJUMxcWwdM`_?Jiswq~7txL`5?gGs=9wv!Ds&ps^dez&WU5{7oby?^d{Ixz&B;hv zbWoiDCn1&Spc)8gYFi#_M*1Hh*!U85pk85B-ZANP$u*Oqi_pv+J{)4D;C(wxEs@1M z+J#5*8bjx@uFvj=R}&D5cRwOmdmY#{@*eW#uRI<^a=R8HxT76_Vp>QtcIW2O3&JyCi;{aQz8f=M#U!Bh?9q!QQ{gXE^8*bNY;>aWB7Sbb0ym27 zyD+!y#qlkC=lk!CaTDu6_#UZ_EBk$wljj)zve_E8O(MHZzYoHHYnY1|to{;TmB`}C z33Mp>JoExDvr|*j>xHeuJX}4}8n#)S(n;Q#vs1|a`9&mdoA~nL>V3LuAA*2NH^zA} z2gv0xi-cyG8}_f-NU??u+~k`G#q5Kj^zgYIM1G<%b`O_xT5M<8)aCn7AP7%V12_syZDv7t8>QTV3fj}K&BXo@jd^FU3yj#3C zYnoDSZ-YvS{nIk?@_k+9>Kj#?4M$EJY__Cn(rH)Erb`TZD5gW%H8ke~0=&Pt^N!x7 z_4M@2MoRx_-5DugPq7#Bv#w41_3j)*(Oze;7Fqpa`u!9J*N4`ou1R;uF@QLOgP?$+j^Evr~nq`iF3@rbw*&`L*Ta z`RL{MxRTt)F9VgpwWE~>0^bfHWQiz#e8%l@KK*;~pVzUpUi3=z2zTs?0f5Jt`ESRg z5{vzAafR5V>41CxrwIcFkI`87UX5LqTP)E)t0|br4NxZqmd02X^?+N^9(Inpo#Cy& zmLfYVtOJkH)-l{9^ynUQ0vm3Pv)+mTUe+^Lb#`MXe&s=5Xe@iQTYj_%9v*>yYBnWN zzn`i7q|od^>mTkJP-L$^$6D~44Ok&B+-}4S6umgpSwGM2s>lhmduj1Cds5>%^&7F5d@y@W)m+Y zn$?WeQ`AX|M(sa;hLXQ1ZYCL4ltlqswj(dz0`MxXQcnE3U-T84dAi*WHrD5vmwG7Urt`0!= zvsEiD43IetgXCasI1QubAb<=*6#*?GcoGfR4H)h-l?<{~pNnM=Uqh3kzKYHzxj|^d zyBV|)NzqOkSvD)uo+8Uv)|2jB+^1c6IL_3F1I7NC0EeRdB?8>292&g24;{nTpe~#I z2|OKGC%OHT(C;kt7ZA9=s{@76h&~tV()vsca)e>H=-h&G0~>|ehXubB5eF@BY|sfU zcvkHIw{&)YzgiTFBpfx8nIlEd>VT|eaJV}a`h`l!#iH~ms6>f%XG=^KFVePIo=60r z;s1F~(Vf$K@FIYZ_y>z-D{$2=(78`|na|scQVt3Fl&}a`!*KVF&eXn9cbOuhz>nQD z3=LEVNyNo05-2VGXj}AsRz@BA`f_5L`w(^1z1O(S};x$)~0j(<lu)loC!IihPO!UZjEOX6FRnY~nUvZB@n9L{zn-I|4EXu4yu~p|J-EXW5 z|9=2o(tvLg+mZZaS{l;dkdw@oEY?7v<5^=B;_0SPz@11qhAV?qryT$85xut~Hq7<-01$Cp9k#Gwt zVs1MOfRW|{NfgQ)r*P^=S)RifQOW`qhbA#vd&5FjOgFF!nLsj{#*_UQYGD^j;S#6L{al1bVB?T?zTJ;` zB}EX9jTq56WuIWgJ?@(50r`N3o2w~nkxr|@0b&k>6jU=Ew^L_@t47*%LbZt ztw+dmRD>y^by34hvI}spQxaeK&d%%&|IiJKEI$Sx^?Avqt))p&1-)I)F8-#t9$GpH zWWqIO($%YOe!Z1JU3c7KqLn2)StNZEy2ksN2#)geL#lwdCFCKQIG4?2%?-M{dO`?m zMt-5Mpa+4!-&3??X81x|YR$HXp(ZqvpHe`4HLmb8S@9BFd$dNb;>DBN!j(isAKfpkhN1&OIr7xNJ;ChA-L>XZQD z(LZKHw~gx@z~?sVO-?;_)T=b9qSPITQa0A=L{xqRLFqpWr@~D6PF&1#GMuE^%S-`0GhS@^IbXh>uU3rw+IjTw=={0#@pADe zC)9_0A)-BXN@cImlj{p)W8^~vl|J>VuS;^SKUtqG3Z%dBsI1hMBVPr}DEOqE8;-1+D758krhjNsH#<$0NjiltqJ#mU#unbP1;V?^9zV|E)V|wG{?C)( zHGpb7O*-Z=O`00EWxQ=U;}3K$3wR%ws@t%OQTdrx3O~qq3@*}1_KeJ|9(`*rf1CEp zjZ7ltxiIsf%c#PnM)HfRvTyyQcQcj9WaI)d0Z<`=F9w)kHMFU@&3rC!km(q4sAaav6wiwKv@FoDBDX-KZyrH23 zzx=%tM5cgiqvXL|oy-Q?c3qIDT=Jf17-?YhUKd;eoK1x$BSKP-)`*Ec_6(r&<*IkL z0RK8A5)W3X@p3&wl68d9ABP;s-VT;7Kh3q|LyouhXCWfu z8O)qU0Gs6J)cNr$_ELI5T~HiI?QV9a;;e&AYAEj=K7<-1Ca?414nFxvuBPs@I0$9_ zND5(VzG{W0%EKpXuiF$66-qt=7ZZ%C#b^Cl#)xaBd8%~xZegDg<)D0}9Cb!W1r= z0&Mqr>gf=#0-=H5f{w)~gpUg zKYTkt5;-o%3WVOF4Hv|p&ErpvhJD#6%Ji^=wQTd-)ZT1&_;_$}u($d_pA=DVA=QE% zu+B54hLgf3E^2`cLYO65RAbMSk|t~?wZE7y<56ZP5iIjNzo;xTl&%|_^(}~C3qp%eXSv7(Sv7S?WRS6+_t8B;zSGQ`3^QSXfp3{pot@g$q zC7>CA%lapcuc!^wvz?7dnc7%urBq%hWVTk2t+XW1$PMUd9^Q~XH0!nLeg{6*26g)h zj2Ga!psGf*+PE9nrCaHWV&o-gp{Gtnk~SXacW-2ff-ovq zU9X)4@JjRe7zqybDPUX|AK3qUl0h#y!jI6*8x{y{l)PsICJzI<)K!b&n*O^(F{kR9 zVp!j@n~&4-iC`xHxmA>?TPj$WrClH#KH5`$jR&tL9Lx z3FW-SrfU9K-9`oXxdPucyzvW_r4r zuiE|4;UJScOUpKRd?^Q1-Nz2HYSrR2_Ei(ah$Ye)lakt^76Ym}gIs%1XKG1 zQ`N7iKvilNSGx=W$U?Qfvq8KKD_JL5%a#r&w1Zt%-H4(!G*?~aq<0S21CwK$BNQsX>xfRj98`w`q#f_A!2$)ikz1zDORpSKfI^TNUN0Xb#TPLs z3c8H%b!=wq)ts5$9;Js)} z26$|Q@w3@N%UmjmdtiZ2M{}l;MfBHJYFgz6SeVL%KT^&qQ&b;pJ#MUcd+B|> zGB@39>)<){l#PdgEO=#7UrBxM$-0o|B*s$2`6ARAgQ7ubyK=n&PTgu&F^kVH1EQph zo)WA{1ad2?hJB||+WeOo+z%j**D>)%=4V|`ZpqH-Gcxp1vDaMhj*xV)+~gahp8oqE z{U*R!_p#s#9N+Vo(;s21Y1|@h+Nr1271<3ItXnZ|(Pz^NHP=>Q#z*?h7?g$XMu^_S z2!#?|C2z=Qs`3pgyL7Uv`Yxs+9Od4g?{%wP_Jgi;a=~r;Md;P~$Qm1{yf=%k$Fyg- zO}n!UG$W)M}mnu5%?ZQe%!T8>oHcas_wB#bbP1ThRAAP4Ev-S$r6bXJ`bx z<8RhE#ebdQ?PzeC_orO&a+}8nxgqsiCTqUE48M2oU~xyI*`I9<7;5XFAK5a(?o$1| zC@_W@Zz`AtK1`f9$1!5LLrx4iN^C_}67EB=tuHg|{3%>9^ zK9Q?K>1QUxQAoBLQbguzwnkBq)6u=s8Ro zHye%VAcgt?aDaNE7{(~|@ExzJWrmLzm?61cM=17`(FC)fhk@XS40lC0Y4cujs-R!+ z8GN;mJzvzl1e+{$72PSbP3*~6^vAD8y3LB03*(& z0CIz6ntN6h@T5|8;XS{dh2MuhuRbpiEjanPxp^;$f73hcdHYQR&-n0DNT$_TxrrCO zJM#In^K*HYCdwThwPfo~0qZ2g@6I?cx)FKCO6o&+3f$uJN({y`ssEuT~6G?_&i=QqvN!84B%Hu?fewJ&>;YPEVF6rliHUy?n8>0X-_l z?j3kA1SFaq7e^lOan>T^_W-Vw(VU-j{N7Svb?XrD<}T#WI~hmp&&-GwN-x7s&Se*Q zMTXdC=5GX$yH{ZUesA9qVSeKO-*n2MMmYz=F95)n8vyvBEdWeCTukkpE$!{-9Xwqu z?CtbzERCG$U7c)xuFUlRi!uAT`RRt1a(nA(UP_jbhA}!rzh-^Y$6wc zx7zkIHu8>AH6AX3>;t|oUvik4=f{%*K9~F0R_8ruraY(RiX2A4gC(;{knmwM*t5eG z2R8{If3e>U645QZ z^P1wCVZCl!Fur3Cp%02;zIyYxFp5B=~9<$tzScT&u{Da6q92e9?|jW1g*QO$zbPy zj#xyRZ}RbTy*hO7m?FFyf4|z?+}1Azq+;OYeD<<(tZ@q`B0U9N-j=nzd01+{WXHeR z7c>66iS!WGTTTr)n{fNK+pE2^<1jC{l=v;rLjq3Wx@@^O=8cP<%*7&Ar^ z@Cpltt0~e^xtG7D52_-6*Jxzb#}(}XGOw(n;*<+Ibjv&&MBpkP!T#2slr+1gpW3U= z`9F!37tig~l>Yv;RcqX;Ibl;Awl*4_vGu!+4etWOPK9Z+#*o6+a(1O0!|oh*DVj=7 z`zhysMmeW7D(4SQtNtKR-U{Ptoq}k2pR#OU+-95{{ORL>W)A*SXZhCl&DPhH>1EG% z{m$3x*~7s1*Vpaj+}#AfSGoB~-}i(5_rG&^abv!YJg@JLJ99yfZ{n!r$LH&h{jvA# z*uS+`x%xZ*%n;}{zFEg%t}Nb)%NS|IF4TghbI<33)JF8>Cc+5CQ~)J84q&9t8XK=0x6@^*OMyV+kB=8S2j^w_Pzb>6%<5P0UC5aGq~3Kr^gc9#tpR~_ecP<`*=%qT`KqfS=UBxQ zeaz2##@KDuonA^8wNw>3r*=2%``W!SG)#3InQ$(T&(GtVahKDFf9Z~Z(2Jsh(f4`e zpH=pB?t0%WqvFY6STNuROvE`Zea+_Hu*s zY;1qCfG)GsNRCB2ya`q!W_;MiSW=rvA47a^^)a4%cc;mvo{6yr7f@n9JR|xH$6rRM zq?;g?#8Kw6`9x1Jbgf-WYQZjBMjx6hwEUr@A#*`(&_hre;HpnIgijfdMh})Ja{Uwo zL66u;->U^TiR8V2*kHONTi_v49r1UdC^+{_SbtYTFc$r`YoLF471}LOX}AmA?2`y` z!!kgA)HdM4d>Ql2(T<9+Dp)P>Dq0lj((*Goc(=?88Q|)J3}{1$0An@44fueCS*MT} zs@PJ5A$bAz>xObH0Sj`<@LP4<7n6(;ErTN04^{&Gh#(vzYV_Gr ze5%D4(zMjVjM>z880>WDV>7~y_d4h?8}4EM^8T)X{=sE8mv zL3BV0C6K_th*%U5)~ggXc)ci~R_cfo-C;*NBS$kxSd&@6I=OM}0fwMzK5k%*H{Q^p zdrSZf9D-Y1fxj^Qu>$v%o4^~*?3b`NHqcR!Aa@z1j1WySLS{vfYSNt~tMBdcHh0jr`%ookvf&8VggxM8YlF?dG3Z1y-5AemeX$p4Y=y-`7k-(YTA+KXQe~h@zsZ9 zW4uLg?zVdRy;#ndCA$6JfN}2*>0<0M=(~*8>uQ+q2SR8EQ8)&G_oqX1f1WT<3P;{} zWxDWYHF|k2CE?<_G+!$lp{~9b*V$<#g_=Mh*UsHaeWcoz8{++^`?V-URIht<9CJ^P13>nov-~(T&iBdMu z4hL^c*PR7>(uy}TQ|2QHq`~4bVs;&bGlIB$)5R_I84CG92kr}f4SEdrz#{2TI20q7 zDIX1|tPv{`$w^}qRY(vEv32;|vQ;!~DJJKlur})+jJCi8U;1S!JCGz*kA}f>OO-?lDW|-NfHNMhpYiK7j*~M-n{jc5;j%A< zvRJRc;T6|17}Ln#`4t{kUnD`8CmO+JD!rtST;y@jF1g0bBm!zv%17ac<^x?~i!fi0e7g+iL& zs$8L}oEnw8M+#%+b5M{8JE#h&_CCm|IvHUibt0z@xRlF3UE#8mhg1qfkKu&$S*h?loIhf55ST3fZmG((F0%} zM}y~3J|ipAn^+=}KGCLa2vXAs;;Nttxk%_tB#=@=V`UIG8xlmwkUVUN%r~C%e+5NF z=O+Zk=n#*}SJE{lG6P*ud0joaMd1H|r?FZ4$vltm^NYATkO=w*%dV zp&x){qmRcp1A8`5vFplprudBiO%!B_(h9ynQWj zBmK(E!CD|V#rY>>PE|Qm3QI_si@+>4ElCZhs1G}kbst-T)FEP3$CgP4UPBK@*T?~) za5uCcC0J}1OEQq@n0Cat;B{-LN_BbF$kD|Um7_ZWl5o_7TVWEySCq#oqv zz=c$yt2``fq;QcOv+3xBTNF;{WhqEq%y?*=iP$>MzkumUM9jn%=c!yGL@W$C!gbJs zA^B$11#9?6a$q6w8D+;|5Rl0#?pL$@fXo0u=)1f6zx>fQTQv<~r{2J9XQ5a}Qx<4E zmSZmU*Ro^VFvEC{P5fa}>2NM#y(_5|TMw)a$AK3qhOgDK_-P8)KD`Hn8EX+W0O7P{ z$n%}64)0dh8qe`i8ta?mY#F5L((Ao4T9ljUFLWXE;y};{E1368scs~$Gzza zP2rosf8w_Vp3y6+ZU+ht49gTkL1cbOTsjVKhz|$%OY`gnAm$zm3a|PJ1VphqutKHc zg{0ZrN&ZsTPF!hoS+FbmCj16HK_nd01C(DnMaT{WDY5UB)K~rrpmA#|MWslYjje1X1S+*cmGKuWo74eor>)39UYs}K z=uZX2)>BqZ(jNlu2hUn>f2UaCO-rKeEGadij{5Q`Pscy^BCH1am&yo?P7zHGknA89 z@lqtM9&07b+17Do>6f$`io}!ap^(cwa8eU3K(B+A5gDnTBuZpwq)4s{DEV}0+*soY zNX76TPzZioV9+PvxS`Gl_uYmNo$^MTRBTR8H`ST{>XqtD zF;58Wh}Jr9apqhSvW z5~)l=(zXCKD^#MfohSssW-Pnn7*@?Ma7p%;Lj`vDHB=bococPb--Tr)CNK+&+unc6 ziKH;rmdLc}VK<&dCWQM7Iv)PHdR#yaxnmcu;RyK_Dc)G!#7z@VK$E3mO-uh9l?G#4 zurv5qmq^@H(DEPgE;raWiPGAV9+7=j&AWv}>p)%xSHw(B9(Rxj*-S(~g{#2u`ti%4 zdR&2PcB+BEwqc5P`1*VoyeK>_eIG4alfcUCdSv2A;ZY>7e+1UX7(Q{tO-LCV)`YS(os&b_(~bI*&O?nv6;R4xPO0(wM_R;)yCtH_aAQ^mL7b zDVOm%pJ^p#>11ZU(BHeBtC8WMMHjiEktA(oUy+hrag$DyKk%ohx|F(BOkH>+Ku6K# zrW=?ifl}QS5R!Bfs12vmS>qbIYc$tD(wo;MqwYPQ^KufS%QnT&qS1p#6lXc2lw2Ps z-JB5tsxk;Qrm2xr1OMi>^XI*cc3Xg#yTv8(va1SP(k5Ed!)%Fy(Xie?MG#!1F^- zK0(>wMMNr6&!9qjPvLZS9O&#_?nc26aSXt4vw0(k**#2%G<${S7H$UdNGu8t9(e$z z_43INqq=ANKDP6txdq9(Tp0R^aKrqeV98mPVyP#BM$%%;6s^zO76K z9#bU=27FNdvrcB%#O<7u){wT9jsl4+a}miUn@?go9aH2QRl!vrD9>IhSZ@$NRtn^h zA#8*lR*{NbP$5eDQvXF2KGtC*ryJL}e99!x)=!ac_Q;XlsNPG-t3&q|l3(y4kBTtB ziAE=8y4?k;+X*0Dmq1O=3t@2ZXsz5{aJ$X<`}l{grhXEzmeZ zt?%|qj=f*}irXixSodo65ErkJB@C?WQY}3=idGjuC7umj?FP9=&&64e+eINsG0qs} z9-=CgGEgaVP!y`|~1T=?9?%n;H(a=U+nX^X<0--l-iwY zllci}EA;6I(Z**j`SM)t3_9`him5_?R}>sj!7Gx24YRELgGp`?($P2)`mo=!#52Qw_bk*AbXCZ7hVcZMuPc{ zbxk7gUwVA68uG5Q6)ANNAwz&-if#5(CNC}o!$&KBQp;BJ+Dge)ZTzGTvrqB0Vg znNSxGm2C6Ql1h0_DxXSrZhqK?;NhTv8PyTU_g=G-s|>PjEF68YM=doXV(C@l5;IK` z*I`ms7vUUkN2-eDyCNl_+oS3VMKsqQ9mI}L+L+ zRTux2HXiQgg)YxgQoT6Hv89}C*BEY0p0dt?6BST_;O=G=S;_BC1q7k8(-5s_f@{T) zY+4k(RTYfuu@JyCki(R7CB`L0LoRNj$IQ|kyoN$ICSnds2OFEo!mSOY)gA_5(lZ%= zX=TW?sf#eTm`Vj_#ayTi?ik>8`$332o)o;S*TYSaER1vzT6dbtv4zNkv44y+k*LOG zv6X|P$vMa~a=;tWgtjQA4aO69oi~wPn?W27DE?c$(o&-`op^Cc;-AO`mDpYtN3<+P zgT+1E3d||}%`f>90V2xdjW`T*Ga5=-Rvs(*H)`>)v526}6l^S~ZXo*d#Ml)?N{_Fp zFmc4FK5e~Sfk8MtdgM0$3W*8qeIq!G6`dVbZ6GxKBWTsfFpRSCKnQ>uvxOU#aY=Cu z#>8%_HkKqv1yTx&2;#!c_a+Rnk&MGsZVIVUQQe4=KtQ}`=~@$_1FRd!+KgP*3azIR zO23V8(mue};go8B8+%DjStv|8Lbjkg1esFE^F>UZKfM z8Vto)d$t16X{^yi)H7)T4*g?*VUZ1TrQV*6hXeC52EBtM2=hu+Euu#t>}DBO1VyYX z`8=|qO+(tR{z9F>akrT!^agNaH5{R8~2ma(Sxfjb{l7(cGblome9#$9LzTZjYZIW02D|UBkhJ|5rT5$P&M{2NN|(?9fVMjAF9%@>brLtu-hqf{pXhNIj2&vLahA09`SAL#9F4)^j%}b| zKu}SVNSrhe+#k{jutu2$@@@gx!Mi~1aACBtxl*0%hET>kzH$yVhlbM5)JqvOzF+>b zfw_HM$GxY`;eh49Wrczy+j8RXUzrm`;HZzQrJJ%_Z~YqDUVvi)#aeSR1%vp<$)n;k z`&;f};GOC88V7Fxt1Kh1YzX9bTZo7U2)%H;Y!mRCGDin~3&&fwQy%OBviZLEYwhJ% z^V04ClplZ7)Cf_=FnJ2;m?H=hPnN|Qcj5*Toe54vVQaFIxQz1z*vG|hPBbvb`m67t zp%Alh%&P&6#|_fobgZHBW&{-b*6Qb)XBG<67;!Cj<1Mng74hwN1wd{g zz93H9Yd*iGw#X3No6cTG;W}J*h6l#2>V;(|P`0^thZ}}0#8f+50S3~JvEUGt8^J=} z72bARL|DnmU3WYIU;n()WXk&VSWj~i9r#-5QSFosMzYRB(l@BJdjrA6SYOHl_9{0L z^Zyj;e5{q+&b2E?49XtYn?ZQrUZnvyU35Rtg+Gy1G>MThYea4GlHW;ySIrw~TkMOO?UA+aIjmwJzF z`Q!8j5}B>@0K0RYWt0075-R~-L?@3A#>F}BdRuy=N`Gqn8=JFQg1UzwO4 z`D-U%h+P|njnOD~%b}~zxSHaYtZoAYezk-y#Cd|5NzJV$Gsz?-dDFdbW&Se(?vktp z1?*Yk+|ISnZ;MwlNoR&s8!~;G{9%xb7Oio^xT#bwmx?7j(`bNh*)DG8_p7@vS#9b% zWn$Bkj#X>3)J{WnH3E-hlH3UxH+2q9<3&fKO_|fgt$!u6WkzsbboC33dgY=Tli^o! z^Z4nE(0W01UaB5`h-Uhc)gMe_=aWBs1A=NLY2l`N8C}8Z5UCt|?$J2pqj4;BQ8Is1 zrZT8A5~KIGt2I#GVONaZG}A&IyBF@T$dlLRX=8I_GPGuae`%r1&3@UIEAuLsjxz;s ztRTeH@OQXEk%JokZPi+S-T(LG=&@K%AHIYRnWswr_T*0|mYj?)M*fYH@5_I=+c|)~ zx!%oawePMQBbJ_=Ja_bT=;Xr7iJPzE&XqjT!-BTF4=zq4nDHvjC&0pGNoOz-$pU{Z z5t>YF488EBcsP06fZm)M1bc4cG)k7)3K|qSCbB|r?xm6KRkPx&24Wfk$mE-SV9>1O zkq(`>OrX3n7%f;Z{ z@rqX8#I$>t(0BZs>z@i36a-@$^_dwSQb;fev-H_&^!cJ6hiYY&-6c&;cgNEXBD6@( z^;zG1d}4oy*^Q{3>Fi68E&)6sHC`65SMA%iEXM;|joXpa0oJ`>?%kiOfcGYjIAxnj zy~5h%)25DT&<%E_G?-kk0y9vxQT=@N-7_ zmY$h)u1K6MMKqL#Bu+LK;io}c=;NZ)9%A^*hZF}99znC*;-s_fo)j08L0y=~PMarz z>!&Lp9R|U9v?N#X|3%IDQ|HI={koTuo2$>fS6}()_k`0ANk7;l6-7lv3VT({lBa@QG#u_NP84(h5Uu-GZ=fa}iC7X8CIp)Fd#!gCTvA;03$ z+SUeX6*^oUWa1yq%$avk82c{u>H&aDG3z9B`mdMPA}j^AnF!2w3hBxwJEsSIzYp0| zex~@EeF0h~htkdNY@XAvuaYt71@NOgC!aw2uv64{H~*jAUrvfuF+Ozib|tzprb&ma zDKQtMf`czAvxc1bry)#Rpe^ZQU$rQmudoA6L7t5rN5tnG~x#3)WTH3D5C z&a4^=6HB?^Ck=2(kfB|WGU8`*h|jk$Vsn97jBWwL4Pu$W@KKlC&os%OgTMY+7rLaE zJPsD;8*;J5_wjT0;pF1z$9m;Pu-7Ms3+WLzsjs}1DOXbUP!%W1bu}3Ouwp6J6u$7yVuv&Z#y$g7xbyc8+(Q3026jzBeEReJA+UJMe%N?cDQN+EZSYLbW90@& zh<)>grc)%Wv4vVPD{}9RA~3al({Zf6wOGW@S**61Bk8~i$ zHEzysL!5o4Gni3w;^5Xj^;p$Z8EBHQ;Yu#E61q|a(dz>*i|MNAKXE>YzCro1j)&N4 zABR)diQ)4>MalgMG5_FApwS8ky5V(UO@{FObY+WXoxQ%t_coWy_3`M`5@oQN%{Q2j zWphnnVkMd|#kOqdo(l{P-pNt~=sgMrPbdy{><%jOr7>v7O$F%mt!;1z-vMP(deL{N z6s4su$%m4#yXC`u(FFCdndeDWkaYy!LoxEMJBy&(()>#jm21gWQL{a+Uh2zm_@6O0 z=WQ{IRcqP)@haY0!&oOl5OjkGJVS<9zJn}JR^6AT$az)&2u@!zylimc(5+-JG4zX` z?FJq~=HpfN05-yYX8|ZWoimZ->_W|WCHMHdO{WX?*=c&^i9jE%G`dYRYKY60T?%Ah zZ|ENkxbXg8;N;WOtOlThEC&gNPp=rFi%D!m;JtwhRS$QB8&>n{l&00ZFfBNvr$o~M z|Ijc1&Y6l|@@(!j$cor&VmpMoU5Sh$UhZ z4VQ9cVeamvN`>WzmfuaK2-h=Thg}eM!Eenw!fg0YV{Ea zseH&H$GLfmF4rHf<=C=-5lD=tr#LTv%2PbB6k+2@mK7Wg^egX!6LIdFqG z`&x+$3nXiYU($tPFtxtz`fn7{nwM%S(4FLI4ib&0zZ_xtCJWXYHTHoP?{9e;mKVA~ z=$pN~r?!6z@&!<_*}P=%&&?~ENnNggNdjco>j%vo*u{-U1Cx0 z!9uTE?Tg$d7>*R2OY_y3?dPPf)i!-@s-b$cp@Z0FhktfYkRVyA%L3z7S)G^6&$HFP zRS1SA6CK8u2}3XhYV%^*>(K?;&brAFTXXoH?NMfz{~g}-THWY_ubJ<^n(v>53vAW4 zJ+5-ItPL zVc@)YoBH^7O36Io>;E~madneqiO2u|$)SOZ7zMByu(|bF&|1U)C8>M_S=bnsa7nOP6w>fJy2om&D<#H9LRw z>H7mn0803ITi)(3dDd1&$v>FHty6lI{vV)T=6L8qb7o*-=5DYsnHBWv&?IW#tzV54a+Zj4@?YGqA!j)1+vY zK%WB-Qg($#nJHmZ>1984;xrg+Lfx_=4YT|#H6@RfLO@TM7aq;d&Yl53}OD!dq#NKw{Z3nNrJwRY1jS2Bg zlv4dx)DcHQi9GbA(#~)wG{a_?p;NP1?O=Vto&j%}Gzi{S_+^rbqRI({nwZk^-IR#7 z2g1F>p@AGPjpjs_M7X>eB9@`&iD!h}oWP-sfOSc#Z@0n-SkwS|ydwQ;E<29lc_n$L zh`R>O1j!OIW^As9X1<9-4GiXbR3yZT59pYK6(b{}<-~j9J<3xH%D|qS6EcOSVOe+< zhm1D(73m*Uwznlqp7=Fu+B%>NpSzT0;pZ_Ls1cS4=z?s~P6Ze=oj4uP(%_b2u_u<2 z7SZzKG3FG>47WU4fD0`NVduo(tg?cTGHqD`4P*xtDUc4p zl5q4ay>re5ou`O8k_5 zUBC}hh;aB?pp25%!hdtcsUgM>&I5oTN>sP-?Qe-|#-F^^mr&MCS>hZ|^#UXcQPM)| zfWIYh3|0)}^vWvE0XqUpfjBELl{czjv5IN|;zgOTyqIOyjq?$fSg8s8@ysM;V2K{1 z0YzFIZ{ADk%`30Kbj%`*Z%@&yGS2+0mQ*=kd(SgS0ak@@xA# zTE6)6^)UVwNb4`G-HkumVVjY|W7C_Zi}MQlkbh4Pwj7y}kNBP#zFobzum@jfNB55h zYo{mqj=*mAeNQ`{FUB_T-X|k$Rex+4GRT{uhxbCHGnU3r>8eKF)Tlf{S7Y$W?tle{ysdTCx3hI=sv{G z9`W=MoFi)b;a2{w*zL}4^y}eeH6f1=GYAa0eO)*Yj?CSI7sJOqx_U5tu)FXDE0_e2 zyv<}rl>BY@8^#!Jzkm8`@ja~Exs#8xKe+#k;i&to>Z^S5L<2pTdog6e^intW5QBu# z87rB<{Hxh`Lc$kYdI99mwTNg?Yup@fuLG_H&32_;>pBACeXSl8!dGsL~&1{h*n+>OO(2UEx5xJ7Wj6 z11p;9Q__YK0|UMalT1{hEZ!8ehJzxKr?)2h~WMA zJzetg9SHNN=RjM|W$KvkXckTieu(+uo^;6momQIbhCz&$Lj8lpG2fPw-v~GWz+D^- zJ3P_3q?;<%JVx91=>`;1mIq8;XoD7gq;nnZ=K22)X{MV;M$jzUe11q3g4%o!GarE! z=na7%Y+pKO`Ln1qU2gySa6i%S!qW>1_I4Gl4*UCE4|M`fiC}3uesclIGevOY;(MSE zP5RLCxodY*&yVPy<$~Vjv{&Z)pSvhE5b#B{z#~qP((4BV%kyZs_Nw#Wxa2t+uo_## z)QEtkoFxUa3#Or4VgWHJXOLnszx;cPw1J#CiiDHjVz3f1=lZXK0lLp(#$kQjG*R{< z#Lwb{i)mnm8rBRdCvbr)L0_Ldaex~%p*FD(xHS+Qp9uC}H?fxjO?s)&qcu7!I3NfZ z?mC8mwhfOH5CD-RoqLm=u|bh=VsWK+$!73|AqZ#%I0$xp!TS8Fa(n}CaNZ7%>iEcE4z5@zBr9Mp!5Wgo@1eZTCxo7uO~%v&?b&n7pE#OV9oig{Bp3 ztk(j_11SdOGZSbR5?8xI;RO?+1q~@sw*&(7o?4D3Mv;QR!1=A7cg6raQ91AVAxWVN z!#SJbFv(S~v2w%*RtmJ^WkWVn4V<)N6yVdf;jkn_EOtghJ%|12RvdRELBLViB>{*fa?CXB zB^H>pz{lG5sXq))O?fvcet@>E?Uuj0%@1x*QD2GScUDO2N8xV-kk|0*>p$3Df(N2C z$H^yq=xi<7Vdd!$xWc5sc(P0_8OWLI_4iPwS4=$#;E48dplzI6C=THu;)P|z1Oj0A z0<`Eh2{;9w^^}%H-1V~rmCIX1F@_B#!hK0Iw_)d+3gQg!8ku(erqzN|g#4I=A zU_#7r8jMrD$btZEG)NF!frFkE!??O`;3s^HOCY0?SfxH7MC5gf5p~IeDbqD+mD}^= z_f~co%tX1!5bLY3UrlkZKA@hlQ;(yg9@UWrF3^j>JN4!be|M)A`0q!?OFt+7Aj*R=arALsazg$D(E!Wb*pnK}aJS1ipL^N2$Mo&gx!+_}|zkgYj3C%-V*oP8{G zX)6@Cd7dNZR-}33>OB+St*@6(+78?ofisn@AVwLw;nDA8+mu zffs9ue7y9+fu*cVw8<9MwcmaiLg1WYn24TkyvmPk2 zzorqxAR_kHPXak2T8@wij9+Pt>L{PX^IiFgrQfPwiBFYnxQQUKuC?0}Jjicheq#@S z4rzL`L+TeF%$DVzd}u1(edx1mUNd}sJ9T~;fbD|%S6usIwUxm zehLe5c^RtTTs9dFnr1Oo#O!(|w))89oUfTy^i(Jt7H3==d&1~E(cI)J=FSf{{|s?j zt&ea-x0JwXro9J>!t3^SD}GofO=4r=SCyxYNDQQuV#m{$0>T(bRsQDnFw}+ zA(oXcJzl{{u*~K|MMWX{j6j|1|sEiD!)%YI(Vz$o; zKaA!DrgacRnhzFY!COp{Yij}WYXJ){!4zr6JQ&9t-bqofp@FV}Gq7nEH*ocCnojau zun?KLWwh~2GHW?lAr`L(B4Oyd);?jGDANN`*vDaFTC{1i%;`rx>W|SN)ZHuW+md?{ zowSMId~yHOfKWk3`s97$${sx68*GXeg@S`;_IlV1Tb(k5F001$O4fB=o2{O4xJB+;Cwyw#Y3HzXQYIaS1MB>rkH&~{_kyTLnu{e zv1{oJ6DxAzYDRtadBzEU_8gd7$M1G}d-1j*H!Zx9LxZX|hg!RKD=RJ>W^m zSKI>fUxjKp9q!RQb|KV>$09F4#H9#f3-IL_&Jb#Jq`9Pv~w{NW(p1GJD2}oS+{~QBT!WA*Rsm za=q$UMWOc&vG=01vEM?n1c=MlAARF5n?`_UNvi;?Pqd|9?~~chGp_`vSfscWGwi=m z!yMe;5(W1rNC#;uIJ{Du>V@Cf3YG`k$B&rR!~kJktvVH%EHzpZ*gk@RTa%(K=BN-b z7acG1sWX5GHTHwP1*tlv8lYjQkw(RC5WI8L>34mW43EQeOd2nhmybDZ;7c%geSz+{ z-0iDhYmkTpP@`Y%)n8}|XB)NhTyf|P#h>Ih!{6608FkQy04h-}yT;l-1J`FLQ{=%! zSz?RkuTGeApH=UnisbtwdUxR2Ua69* zY|CDlY8!}SS_9ntQWNk5O{RU2mMvP4Ngt&1JUhEZNjK2O*I(e(jcPJ3je|dJKQusd zFfpHc8nKHI+cj3=&=l}^j?NBsQtrpZ=3wPqIyn(thFO(PQLbrqf$>(4y{$|G-35>mjPT7L1Ncc>0GhF% zZ3Zrg61|WvrX&&ycKs7QUZ}AR%{XnJ)dPwwCUzw#pw^J}sl9Pk7W$*Ypw>g<7O6u1^WL#E~sRA#v5@7MH{<+!9A_3`{ z#w9q`^CEdWa^nIAPRRsw$bGf9S43)9o#xzXH^S=yFjm3PGVzBmOEw9nQuix=dJ!B` z(DNtSK8jfEqG6ddxf1uhQjX#y2A;2FVgI!bNPDl53XRgSg3-k5yi{5S4>+RiwyaLP zRGYFGV*6>5Infl?<$$I^%N?u}#i{dqdAns@+He}i?k>e1DFzI7#Rlt?p6GUW0+Yh_ zDoseX7TX|n9;hgoEe=W#Jvf&egVVaZt^4mCU{JfmT=c&o++ zfa%+dEENjDL}eT^XO|HXbcC^=ken?Y?D0%F6JiVsHQBrl2LntoO_9_+Qj7^VuJR|; zPLQVlbZCQCmE6(HTg*QVuVicG-6$NKSHRsR1lLRC8_Z|I^VJWb%>oy=LNveVFq(-eEZZ>{>f@EJ`g&ppk&Q%VbS=IereTfW;T7&CM)-mN6AxM7 zO=$kU=@A?hvUp!8nW z%0w4y+N?E!nJ3bCWdp;9@v%}rqKS{3y+GVatPxJdT#d;;cvf7mm;CsSbSIhYp!Ugg z-q|18PnxrXwbZpuaq;39kk0KZ@dfMkvYZUL`Wi#;kF|5T2Zi^pk;LD9xr6{$;#NJ0 zhANHT>~}uXRe@!&VyOE^@8uDon{r;S?@z#2t@q$(Edf{jV$q(P#!bBC4| z+-k6RSGZVO3!S_B8c{v{(vKRHm7S19MX~t-E*Rax!*#&kpKv%fEFw%d5l4j@3{tI) zNFM0?)_*g2GAD67{znxD=8Q2L@+E+;_Y4}3z$9ZPgV_*<+zn&&dB5?mshG6@zM~3t zZG7n}MqOHFJI;}gP$Xy$C|*`kEGRfedU$(jG6ix4@`E4l64*QNq*w_N_A=fDL{=bH z*n-){TXRT0Nr{#$T@5RD^M|rW#f{qJRd3SMW~P$m=Q$g&AM%2H-kH*V{GYDnzL6{z zbh}qtTBS+reMfGzAu89C8^tymX+|_((E_n7-PI_9)5s@SMs6oL|G9!glAVjd#-!6W znDh0wG|@==n?O^$=EkNeh4YRmGT1Qdq3?Ky(w6K6l%QNWHfUX9X#0wYT*SY6?PQPJ zEcKlB@$Q6wAL>YWVUw;Y-QSe3;bicRr}hL_X9+jp4(WMVZ-t-qNCqYyzAvvdx7VRC zZA$-QaV^_66e)3{bZ2VyLH6Ew7$2R|X)P$i;vK!rd;7yaH0qfNoI~fHVv=liR^slr ziZ)ltIr}rP%x^Va7yxFYb&C}miPYjYA*EPBE=U%{lgn7Yj?aQMVVxMWWY}al>E*-4 zE#?BpIkg-nw^7w7?W3RY5pk(-#YW|@Iv-aB@`KC@*ylM|ya-0#mkT!ZD$!h7%MFDUOt*RjP*g##4AIrGFp})lN~dyF&(8*hi(cLB20!(DCbxE+Asxt^YC^%@7I?gJ(J@Q|UP9CF-3?^qA0bTL%zy!mbgl1DEC zkSkXV=_j+@+xz`{>b6fD$FilDC>&89`A>OC9Z3hKqg~h$Tz|E+u2|d3JBP?Xz?Ap} zrDBijYk3U?{bdI3j?%cMHN{t~#)MqPCRp`M(@>8m4=27+-IP_G6}MIurcR7rmpsqB zUV(}C_MeRWABT`RaT_uD7pf7VUhIGc8uDh(-F~*TNN&)rd(W!fu!)c&*2fFG$z~G2 zYku7d5M&tNW-4_Pu>R(yTZ`Y6$hn?iXkl_C)sElrab1Ei`uh}Brz?*Eb@%Q~Vb6yu z6;jd$Dp#<@ZmTdgRh4C}Z1-7*>-|R0@;W(BxxWKZ(1y@TbM<- zP(Zn{TrOf8kbb~z;E-}$&3bza=VB`E>;+wtGG+y*WeifUHR^Qvafep#$u14nM3>mn zj3o2$Ri$WT12_NRCv0-$q8$LUg?f3uua^AS*pxlyQS@lxwAGK7h}01 z&#c|ZcDGxP+jcSoa93EF7&_mfl^x;!+_Hw%Cth{@)}n8f-Ujx7E87XZN}RkN%D+Yg zT8;ktBkE)aw5*pZ-cta2+(qZB7}pe;2hAYlB+sqxZBW$1y+YiW_&B|K;OUfkv$RJw zxbP!L=F*Ys?YT)d2Z8(&MHH0Tr573QR`?GUC2>FdP>)mqqabEUtJz;_b}A!lW_%hg z>Nq}P>O8qZPa0>=3{@HjsjuD!Vws^nhpM@ixf2LI>R{-lp1jSqr&T@rx;l^GZAwdi zz8_jStlW>ip3?leadikokDyfcJhZ2tPwG*vkc>`|Rv0UUkiKF;uhJ`alzrEXFNA2sNxTobLgxQ^mO4W<8Y&;XNt^pqi$tm#T$`uh1BgUCKTVF8(iP_ zrSwQ-fJ!B$CKa@ma<8d(piTs^L-*SC6F9{`l`YHj6@X&G6Pd}Yw*1dGtna}*#KL1& zd@Fc;FSe?frx!{bp!dus%F)lB2~D5wzRa6Ml7g7&j>C* z2El@F&g)>gHse|Qp>TDos{qWEPj?wP1=3+%-|<8sRGolPX6SFdj0UsIQfkhtlhAPn zR`z_moDVHz^w-YR?Cln_QEc{BlZtlD7%sjoq);iN6mb)aECv{HB(Tz&6SC10z6Bol zIs13Yu_a%vs=81e>jy;xUd)Ld5Z|MibfNEn6g>6=h+zeB20;I+uVGVZDRBlM*8PMo zUCkFuOV?fk49#|@+0+EO#T8UEpI@#zc_5(K@;H`du5dsLdIeFfIk}|VFg>O5?y8ZBwh&!QU9>^`lJgZV?^3?MwjaZk znUSWQhsn>|w9hS(W=qR%l8&Pd6VV#@s)yH5X%<4vd%PRZsIGa-T?m=@!ksrQJPv|9 z##(fIpGDI`nmIq(K*`!_qG{ALQA=@Xjn-}>FWS)pQpRDZ(YsrPRGI8bMFcd*){mlV z<;Ko)gfxPr3&;m8f8#fzSq*ob5q%%tc$|)f@w8E#an&*5-HPt;xfsj{6cPWb6JR9?DmVrjFzc$lJa?qO53hKkydqu>s|4 z+d^v6w0&fT^KCBc%h5*0V)PaMN4YLUM!C>phu|XmyFSRAK)tiG3a)km&|&zP7a6}{ zv{7EIey>s3SZLJjIkzFO9GGooe^bwFOSzgV07gTo zW&NACFYCt>QPu8Ye!L3?s^2;1j(=cJKLbR%cl#IQ1!~#n`{ki*ZcGfI6%hHp)gVk(q_+tn6UMG4gu0`VdLr`zpsnY< zY9T>MSD)SnB`8a1mgelE_b&+qH^fCvYi`piK20HRd>xrj@e=`E0$AR*%|#?UN|EdW zJaMW%2fMdYLT8KB2pD?@ZhdBvif(E~si$09b&+=E50ScOqFTO6zpiEnqO`{3nZ15_ zx=(RD;4Qrr40A`C3xb4l^3?L*r2qpIy|e2>%@3gZUUX{bEdt#`Ol%|ZymV?+jq01Z zas?HCB!k1@i}rjAD6X3)$zG78gq*Q~!7r6iB;sO^AUBfxqW6+bV%9xO(o>W%CqmCd zYnaa9&3%Sv@o0Lnpkk{D9is)_%!><(Jx+vRw>d}x`$>%6%|IZDZJ4ggtE^HSbEaw? z>rVt(?GY0+8Ccz9bjz2%LciP0_LZG~Ds;0la@QUZ^XWE^p=(&00E@;56X}|{wBfSk zGCNmB`C#N$p`Ky0POBPIB-WbNOc)1x`hso<=!Yn}9UUWE1*PqPN#+`|)udJcW)b_P zr~UY%%_fN-kFOlXNBq26Cj3sX+frWB6WYK{Rbp*gm%ZhcyEt0=CM@-d*2vi6s`>&^ zcyTLH!J&o)hS_A`yD;xy0>jR=<$`j-92P;9_jO%@o&FlTXd84Gf!)nu;tVsou7vyWxLchV`~B?WSKBH`34daAOF{e*hnMeH zRnHDZ{^#m3t|F@bg4`SZ@Mmv3dY=_D*{jW??Qr4c^!$degK6*MGSd8zG0#gdF?HR( zt#59E{Oe$!msf!u;I~SHnP{!8fd|k(eYjU}K#$uU-b$>sV={aXfp|@KCqiFU3j@gF z5t?iC?s4sI)U@292S~l7fx_@vI0Yr&y3aP=H`9=qJ-#Tq~v+BQB?7z#9L9k zdLz7WMv02woyPf*EAkc15n-QzL%ixM;a~n zzRZPuP%Ebj;CZ7}43Pqe`zL|DWx5CH*!|Nc%-ix`57NGwr}TYi;~Lu{gXD$~O4a0j zw?VKyHW%Lyt)jQWmyMSAE^>eIME2YLZpW_ru78zS-0W!u#;+49TJ`>`$+ zS-GQ?`o&fFhNy~L&l4Y+j!2BAj&gDBv8UA2!b(wKZIBl#`*CC?OQ9PTjMTY7;Y&P=QW??m}7epK~%Q#Z!%8XR0|`MwmtGuABeG< zmM1DvG_>V!BZG!op1eO)WMg$)@yb>3*Okp^ znnN9QOyl=kTo?oD|I~eUk-M`Xvo>i+(X`t^fUYHo*{p6^G~dM>ML$lVb4SvouGeG& z%;$$$RhEJv{|W^c-ehmC9Br+gY5}8a>dGt{*dG>a@G1>~bbUBG+n?@3{_h-}*m^6J z{-uiND&{L!WT>qLoYr%j>bsVzxV}6d-Axv7$2z_zh|n0D z%3au)`?Q8`jk98Z-IJ*Oo-tvJPL33jxfeZ;E0)Fs?hvX}r20#(yWpPJ6DG1U{HM zqU=TdTxZcGro(3%bRb^wI0R+!i-*m8JE_32wxXLly&#&Y@t8I%yfG+ise@r+%*B>e z^A~F`b{wCxx(8fkT8_nfQLk-j`9)l41yZQDNjXi6`B(H?zxp!8G*Q#N0}!L*q+tzK|51JF`cmg5I}c`2wPxb!;P zn-=njf+pWb-zibtxEANd_M5Qdu5GNBuUNg8RaJS=Uk2klDyxpOsCKf2o}+doM_(Dy zW4EfQI6gWFYqGHS>xlm-%~nN+L-?3X+|@ycFV6=4)X6@FN=>45v?;o7Yf=0w!INZ_ zD#VJa*(xFaX`UuNG}bgf-CYOGy5Xf{vkwT(uS5&@0XHPRFK!F-1o6ZW^+1H02a``- zbzu*|UxKQd_B-8oqlvRUYHG*LtsJ5k-unD@P1d|n*QU~ND{ft?KEW8l00?Az8vx*k zMuX;jG>zJgv9|Ym8~1gNZ28L^#eaohyBr#%W6-b4;c}MEgJ0>+TXChvnOT4o>&*q@ zVG(e4#HsppG-a`Jy6rKsD@{i5p|uuJ&$@D)zY6Yv;JiN48IBXG3m0cU^woM zrCQ^te`^rARTGOo(>ZhcL^+y*Qzsh59f<9mpDE89aUxEsYV~g(7TjTbMbJ`V-9)HeFZ`s{>8SUH{^V{Sx-0a z+BmPLw_VQ|n|130)Bf{YYbd>mwOLhlJ<6;*YrWvFPH;MZ7;z{;2Z?HOT8Z7*61(J{ z&qtXUnYphfljYo;>As9}P3IN&vNVdLJ$l|H4?n$NC$nLXo%{>(-}C(cBK!bA|9Sko z82{b>J7em&MZGlerj&eJg23Jo!Y%w2xfDF1sZExLEsNgy zB>kUUw>dWw@wPSr`KK1L~AMdSIA}fY`!>W)H(ze`{@IW)cn=~8Py<^2%WMlGKf=k*r0DaRI zko?!|UvFHRHrRnUtt-fnseK}TP(=lx>uRIscBlu1;C*)H=aqhgfgCRyaOzO z0gdhoyioms!$P7|5*I*&v!4fUQrDy+<1h74v-}y!Q6gZO9H+;e86c8=aXpQbYy)zr z?~sOmW*-LBj=dJWa0pA<&L7$%nMZl%{h{rIMId}oCzFG9e}ba3m|R7%*}Voxq!8Ad zf>vakzI>dUe70-o&R(l@F_>;b$Hy|$8<-ISqIXR4Fu07#O1FZ1_rlZiS8D*4b%#xT z!duj(1>XD4NToqnxZw%-(oFExlMW%VIiZ>Ir#;q<)vtiv0)7kwks)^*9(TEzT=NU| zG~U_!Q+p?nN+0D%6%P99*ZIQZJjx0pmC~3_SrmTR`$)Uy zjJ70L(gcYkdrN$vRoSVTQAKUWckvG!lYN{Xjs9mq?&RO(#Zds25)kUj;Q6Cw-b3RWoaS|HrE$owd{0MkN4S3|^? zESX-4FM;v?R42wPgt4do6KNp@+{Hj!TrRP&Z@!?g-^e>}VX@H--0&4{r*uF?d?vj55?C+9BkEqM!JY0(Wt(CB^Eaa0ukORlU zoj25C42)p{Wp5KIV$7Zs6;1I-tiv7OUShAP>zP2oP{|wzrKmCz3i_AOBXG#oZSjMy z0od!#Sb`htny%_*%rNc-X}kB*ZOaSVe;66*Kv+m$P4W50roKO*PnO` zC-Ms(Q-&|Hf`q)q_N&|y``0sgFXpF`0|vayaG-Xsyast3e78Kxgwo^kXTI`BdN??+TSJSEc)-o)Wx6lTD@wo#Bz;#33*KFJt*6^dGR_;d15jM5mi9gWok%dT(4Sv8r|f(#HmIoan)ANi>+$Ej%D~Ng1S9N$}Q;CcFYzej>|<3 z8|kvf;G4Zb?}eMljAy&u;DxzmmaEcj>`w=q9N2Ui_pUdtu`V0=bA>xAk%x;d(bv=6 zI3FuHv&|gNK!3aPlDxcDM8bO(KNzrv`Nozcg!1Z_M#I%NzT0W| zRoCv31iM$>?zRXfU>~jFXQhgrW^oVUVx{Qx5=dU)-V-aR?nm=CObGx~gZ-2JPl&~~+M>?F<58sic-2L-b zv#WmCO3{ClXQTN~&PBgYEw4Q{`-0BQzO{4KblA^pe-(e{u-v5UJX8gAnM^0J1Z-am zB|pV?C4G2fH)*HUKer3dd9`_5WG-M!4c9(ze3x_ig`vq~M~qEaEZ9ums>N4jk`2B2 zyn?Q}G1yMa#08ZNCGOg|ubW01{`$Oh1(*8qo$(yW^c}INIvQH<88w%|60xkvf?fZ^ zhkU~S_ibFNRpJ{FjH@fA zoEOq0K@9qHW!#7ceHEbL+!(xti!l72vzvF5H#W<6mvE$_1X(u=;^yV`!OHucq1v=z zqZ8$T>db~rscowG(4UrlNh&W^{7N&f(QmgKzfO|D_dxQre$6wvE;OStX<`clh1$85-pO1c@>duT6BMr>LL+lA8F7if#(55 zQD)Q#(CYDak-BDqU=Mj}IGPZf8DZQ=76|Y<06eFW0$}erJ)~EB9~E0$Fv@2wnMWvn zDKWcok9|ANZACoIvQ1O!ArXA+6KoJo5s6j}%Kf6}z3Z}0g9?q%4!}b|oP`)FxhIt8 zA&xaWvSP=w6UhqR${jZ-1g9V1hY$h%*YMJlCAVv+T?!l|gt$U_N5eFSg!+^c994t> z57T}p@s%^5Z*UTqfIbepXM-y9W%Rd0%9vq&ZAXQKDV8j6z#j>smIJO}* zAhq4J^LzpQO9XmTUVFqCkY6&OmTl&6PPsS5M!@=MNu}g{aEf3mLT=aSqOl`os^;~1 z?eck3Q=kMMIh;tY?E=@m zLof+KauE#bnYjm?_iy+WXmU2`ZQ~gsAnrD0!l#%iHg?FIKi5Z_*wADT&?#X6;7@`E z`lf#x0pPNi=Y+syGxmdK%H3UWqwFmGMPi^UpG6am!sj++d$I9t#EG1-g2MHeT7Fuv z{k2|bgNVz3;N6C={8^PE49&i9_hWQE?uOV z7VIwgEijqu<^8ygCQTCQU1_h^eZNfs?uj=uqn7}MgX^NkjtC^V|_5o zhP|Zn?Q#OJ+e22L9!no@le|B>5$GmsLx}bs&c5Ehe&0LcLw%=OY(Kx}M=kyveZKDB ztxaPWt;ElByYL_CZTb<|ZN1UY=j{;*c$hx1yOODo1i~V;8PG^{voG=4w(DDkpiT*Z z4Pgrq*|w&DsGd8j6A$sXf|II?Fm>N4xi|tF6Q>GpO7a_#r8WEJOd!~g18le<3pU2E z;0t-L_IBUZm(_lXp#0DFVCa4G0_70iyxq7u`nf&zq4+PK?4)nmKmI-#f1h^kLdoyy zFU06)!EV0?KotZ7_zr}<8@>RnvnFzy%JIBQ#vdDp^5&84QiH+EUx=(*{Ks-Vp$A~G z9_D0hInYXSi1I?m`#T08VHlCG)HvSJ6~)Y1_R10>;4lRO5%0CeD5-1)HBQwdpr3|e z_6&&i;S-5BS%02keLZ2jK!XmHU;0gBb2*s%`*2z|_-P0v?Xg+Bii^dzXe!$_e^Mb5 z)Tm^h;q$N7WcfLLJ|t(Jfd3wG$YhL~8R{!d;rtZDNGo|vfY%LJkYU6!sgUhwTcJB}x+2-VvtzvQdJ!FM% zy2D=3v%lwZ==o3T)iN&7CZDG;Chl+rB@2=`l+-A5gs$Ib<5Mb^B(wq|{ETG}*zW%R zd_TX(7Z2!v8rY55>-m4m785R>4UC<^Am$6tf-R86oZM^uU<3g~Od2YTo#1iIzTTyl z)9%U>^gj9CCBjC`XxLVbb?!D&kCUrtEOw(z5bwGWisa7P0!XI@JAuiUA6qt$z=MAGh)_(`DQu$fR=eFNXYi2dB9 zUmE^GvARv#EuqrWDuEXsX{H0IfP4@_f)1m1s4!Oji(AmyF0atXuvGu4YKqon+JMzR zxFY(OIGCnJ82P5tO*aA9;QIN7BxVXwJQk_0PtUAWbT$4NHa zt<*5LxiXnH4$Iujv8O1J4w){Txk$)x`?2kH_6ynFiBF2wugo`KB^qJU!% z1*Sj@=V@V`#w7)a&&J_qwk(_JWG+=CSR7`3NBBo@o^NaNg|P9J+9T{2q-Bs> zy>Ff8#o4{HL!T3Ln&|!odn`I25&+j2rb(e;@MUK}t{7yk@E*&YFGUB14@DhRkqtF` zB%4k-XMk*6it+@h5o^~i{Krp}Jk>_-Jh0A6l&T?#L*vJLM4qTNy>~O& zFe!1aO;Q=!|3!mLc{Ak>J#OM+6=WAcDP>(5qFzj$Av{(M*+tg8@yJpL)YJ2ZZ*kZ6~%+VLqQ%$ zjDctawi6DtGc*TwEc{ZmNHzXwGfrL$B$sARf+kVvPX*7pAL;c zKgLAgn1+R9Zp9BFN06GsYFDWf(E~b+3~Q6OcfEc!O=D&=I-@+$^=%b{xV1eo=A%2a#Re`9B}CRG|Fo|73-nJ6SRv78pFe&+bq#JkD9-%`kor%Pg$>` z4A(IU2=J{)Hc~KsT2^LVP|^5Gdz9ZD(Vj*Dnzy}ZI$I$@iw~Bp!8TZ;Gi;wxoJPc; zZP=_$ZNTS2Y=AO^4-a7W^|Mm2AmE5t(VV&~-ZpJllD~*s(~z9Km^i!t03KIS8v>)o z<{QS2+|pNfO6Blu#?(pl%&|6TCP>-l&U+MSMwQm~lcdenx%8;JNP(W~$F`BhXCki` z@Xf8_Edp(aqVsHgT}Tf?H4TtftA2n{;EqATt=6tFkOc^DMwIL&!u2+c?yomOp2Gst zy}FfRgl*RDGy=NR<;poX0bl*dd0>nW?$DG8(P40Sn=u!b*zoE%OzvhmxM(E$aEl-+dQgQ> zj7=|xTWBQ>F*{Py=AU!54HTbxf1FZ47(@N6Z&fEgP^3ZOreKUom>3%@IucjKMcJ}& z;f`AlP^wogMS*|A!24#0%VXlo?J6SxSs zK!Mzmm>AHiC>F@Woym-?HCw9q2j2k}P9nVeUP`#J;X2CC80a zWkVud-^V$2gc676506du0L}eT0$t+2RFD<0Y6t-Yt?|&wKN9Z<$wc;w7spx9GEO#- z5)dzFf;^O)5h5_6kTfBaaiVx(?Smtn8;3hFw&#fEY`TM9$@gqiTO7-0jRYqLzb^wQGah@DKv7yXb`^UcyN#a~*xu>l z{G^s2gss*{vcmYsK~N&)*PBqRN><0_bgbKboPH0;f4BXdZHI5Qt>M@IK!CX?{vyt% zV&jEyvxL-TOEp~rd|`BMqL4M`T(3}GvF<7C=2^B}qKGiDBgn>RAmAhK>95$b;y^R* z+o_>61S^{_tz}mt;~apl8sD;N3mq+luJccy3=rouQ^z2c^s=@|+iVS&W(j-*S1}8vbII$_u%A`QuD#5_Wm;JJ@C6d(m)`ockC9e72Qe{0&A4#WnfoOzi!Wc zo$6g{;QY65X=Dj^tE>5+TGh)7xhYQCX7PcI7A5bxE(ksJRZ9~(b=SA3SaW(E+BDEb zsYCSOSKrPKKeo;wg!4=+fbgW^^sictjAhp!v-lRRTC&~&Vk8=HR#dM!7XpB?m6zH2 zP24YiQ^jRjbo#lSwIcp#Qo`#M7nX?VZoCI?JG#!x>})oQz8@KyY7SH-nb01(TC`32 zDzU=4BU%Evey9-I9D`#r|ISafE=tu@dMwmWCSWug4TDP+D=4*UmGGq}t5IWKZyqzF zBJCUwRHAcI4@MWOkodAP!K4wDPZAbHwE^>ilx!%U8EaooUpLS}@s@p#QS_6)uSiy# z-K~0MFHMSoy7Sv7sIUkS?OsFMFgxkIl|FRa&TA=cP#jyOmO`JOQjJk`=BFbzYu86j z)NLUvEr-7Byi*#J=n|KWDf9?bgukF1z}Sh{)J`*tfX6IDJ)9V$}3s6{%{Yjf#B}$F2UU;xVr@>xCVEJ;BLX)-Ccsa1PziP|CjgQ zJ8zPg%)Gg;vwEE@7VPS-uHIc$-KS47O$nCpqV5df(Q%@w9ej2J9}`@(7OFS2^w{Sp zKM%vjgPimp{HwTv?(p=I2jU!^Km3ViP`})lqzTOe6z)Bo(uH7y;@kxqu}cx=gueP| z&q0*0cwLFzb88xXPkFsw36tou%?<#{)?P>=@DrPtb{=AKABl?iGoTb|<`_V_Q%#=k zVr*}4XxcTJfOn&#A4D(mW76eu+GH0G-o%6@64rd+6YjQwI6_*s$1r*Gy0GYrMnj*s zMTd9dl&YKPnGl7bXq+l84VixDn|t0CS&!i8M9Q|eFQ^o!r<%Jh6I2AfiV?gimh~=F zT;wOmV^KtAM|y+WH7H+zZReK_U0mL>k{NbYUr7g|e??3;VyUh>Veq&Lw<*$BTaX>D zlZWPekKzCd5|iSn4(iWi5M9RYw!(%LX=7e{iRKxaB}z!Ym&7Sf;i>iNn$UbwLR5x1 z5$V-@gY!Hap~+^^r{)Ap&DFaUGS;ceaW75PRlHci9C)tegu_lRToNmWlZ_7Tb4A5d zV#Q}Ms7H@i$uXOElNuZtQE52`C4A0gEcLBVhc`_@ANW+m@B?M$ zKo2q5!Ya}+YZLvuZNRi0qmxHR@a~~jt}u>ttmoZ25G5GfT1#cP97(jUs;6s$caric zaU2iLIZsQp3YEN@xxr{bdYMyChg0?APTDs_`V^brmw8{Yd_ff?*+&#w{OY)$f|4Fpp~0_mtF>`=!U@2^ zW|ND;d4~8g@%nw={NMZMLjUW;tL{%1x6uE^hI&35(oq5$0HDne00{r*60B@pbghiv z8h_9A&T(4;ciHRLuc#Y82QNF~5mvs{1X~hKEtt_;$qSh|)Nuk8OgvOa)tFUOL^=EX zaO?4kM0D7JJfo?x6M;b~ln8O+o2WYj)`_P)VoOtNQj_{{YkV^bT)t>qyaCmW*ob8Y zno6+~t%(NXMA!<|@>0{AVaYHNsS9%*dKE$pnV9($Dk}Aq+3S4yx@1$$0_S!N%{>X) z{ST_(?kS(>#wy6O#!E9a4Ce=xRaHJLa9pU)bGQXgAWE)_g4XMVmx*7Qyl4pz&L7TC z?wXg%!60ggKS`&eT`w+3CJ%{I2ay)gCSeZzhUSQ+LAhv@fHqXFJ@kQWkw`_9iWMma zy~O$2_(Zi8*aCZZM=-q0)qqZBZqER3rdKyK)`h3UZi zu~^A=o*G;8HacVD^%~71&Ei!Airc(=uac5g-uY$;%WtY9Douk9?8pMd*6+2ASbMkF z(6+E;V^Cv0VGzVuO6VMaYSK0eOkY2NzT@_C`QTjhDlJJVJGY+RHjc}F0-F-+APDb% zadwC%sq50b90cUsTLdlLp+Gl;c)tOGzGu3HL#82E_NZCDQji@p(|zm%hy&lm2ANDV zLVT%+VQ@)^Tmr%A1FekF-on}_Pyuq#Ina-cImq(kZZAOJZ<6xywlrtk8{6s@pgCc63gvC>p2MSi14O7I6c`q?SJ2eMcCff%6ESb zGPMSR5ze908=~;OJJj@8Q&spY|AiURfg8!&XA2HqLTUNA^YyG64-EkNX;`&*9my#x zTtMn0>>jQ79rhBE9qB{8MM)}U{Q0h=pE1FLiKXHfmLbRDTs=ct!LIPgMxr2hNoa-< zHe;MmzD&DKl5v`c4Gu9ZZoDs`2aPwY^+fDI-*S=~7R%LQL3LNWn^( zq4WpZ5zRHaU*7^h|p8Ou68f3hpePBCFm*Vmg& zf24KvS-_YK%8r-|!*7m{2;$!$g39@H(4u$F)RR)ayqEY0lHurxkkSRPU4P+>g!|5r zIIlz$o@aq_aUzYRtu(X!$aJ;6cAOcc>b-tbr0Kcs0pVip&2jaVuHAEy^noL&ZkLpX z7sF`Hml#XeW-W0;b;z1MGmLyjS8Kc^42?oG9!ufO_h2KJQmXWFZX1YU=q?xP;|g#K z470VM-E0rv?!SJb9?_Ru!jc+r><-mHwA=#UUSg=U*tQUdW*39?9`%ToJ4}!msJ;`> zqC|crhlE1gC|M)<0j_J7Fjba6-5lXoBX9Wzzu{x}n5--?}V?7Vn+R8VJ%3={}N00phIQ*TX2GqCH*v zphMYcu?h)f;SVF(5TUYYObzH?6_g{8EK9%id)seOBu^Oxyv6hU%B*e;Z4-|5epPl@ z5yR0zK-gq_F&oV<-~@@y3syZhP8dJTQ`%S~oSng2EGoI2G$9&QSHP?L9>XhrCQshDFi4Ds>ap$_t8G>PGMBqJYk;*C>Hrcaq7$)kz*bs7d`75Ma0E45d12KyVNw&d%kF6#~28}uP zr3=pz^ZlRRfgal_p6D?=)#Kl;auh`^p@dil`n;<(sgCweHrThx8`cf}<^lCO6FAdX zrjwnm)ff+X(sgw3w>+nioNN)CRICX`ejZ2dghc ze%*-lGk(ns?M|>6-4F?+OxvOtE3{up$}%knTwNO4u}-FwAp$}-zH*m+j)9_!2@P*| zH)t57Iq&QAJq9-+feuK%-G24#2m_;JUb3cmBytJ^&9v7oy+$o>EWQW`&R7S-`xa{w z@t=cTG^=I`LQd*)$#L>wc%aG^+7;rxv^1AINj9fmg?=R~_?~1kYSFbRL2SmXFL_X( zPFPf)jddXT75Utf(X5hv@DoeAwK-!8RxL`hV6s<~?@l6L@R)%eXU4q5C*=)eHVqI08$vv8Y3L4JVvdSJqbvq~-! zorKDArOow?pd!q4bp2!SjMk-(^{Es%S1Nfi?l@$}fo>RxYd*+>Aql*w(P$oCcxCxS zo{b8Nhnvyp%OaVisd7~r&Q<&f3YsY_2a$?B=7ZBL>lpL5-SbLI;R=In zlER7HI@GT-#&I5q^jJ}RA@Xk70>f5HyTjj)PFBZuQL>#Dz50S>b@3}@IeEBi6^DpH zOB9P`gTszT6QgB~=eUUD%|1ypdeT_gCv#-fTfC3pLrriWXpsfOEpkXb27O6pRwWU=kL-0Uby89428>`jk+^b6REqrW4 z6h4l{3QML4W>^p&u+`OCfe%sD;81-cv))fN=$9_$fyYvdHSDUhAwed!p$z!wML+t= zlON-&`#rQQg5`7hGNJ^zAJ;o>_}DUp<`p+(Cxi62omq)tAiGPr)Y0yb9g@6xijXI9 zX8i1N&u7pBxoG*-r!JLJecg1K@;T56&o#ST;B1F>;Fp^?(?!N*2x-yazo1 zYxRSs%wlyTpn^Tf{-CFqtpe))BX*Y#jX^U$ znXzP|xPg#9&@G%(WT?^&eD-A1{4{pqW+v2XEG3O2s=TRmO+Dy=1;FOM6pQH^%xRy2 zwD_{|p;RHk=bMJkkS8*PhYL@Isc!#*s`lU)x#L$o;Aj^^nY%}3Cs;ffX97tiYBk#o z3H3-Pj08{ba+y0hIH%XiZ+A4HQ``iuun?v$^YZ*qUtYi+(?19!psFnA`$Ag<45~0i zF}5nFQ`4{7SL<*bX6nTaBb2H~AyCqn92=L* z6>@l`u>_{4lxXlqxG=N;*IEP3+Oa7Fkxe79F%5FiDNIn}J?{j=6i*Ks$*5r<$PAI1 z5xK(d6sN^`I41?SjQ&A(o#E$#!lmM2 z3nOHcx_cPs!0S!7hA%HH9+LBKIMn?Tm^L1JN&B*e5(YT^2AZfc4cSFTya9-S4L9S7 zW{sH!`juSPJ%Hwj?C0(MM9)Co^~vQ`#?* z>#dve(zk8e&4l=t8OcaCZDIC>uL$CT&@;Y9D*`WPpd~oVqv=x= z+=P_$eSMC)&w>?iXc3#6UqMK`ySA*`ycgpqab3S3O1hXa07E$A|0E7cIZh0VOZ2TA z_p9D(ePlUu&-KO7u=BXDxFC=(Bi-T@@L8VKA%gqU&aK%nSdb-3K8eQ^ugc*&#l z@-nF-Q7ovhN8{b*l`x(T$F!n4n!fb=66+A0~R z(2-yjDT#mNipocNq&U)%^>aCM2`1&Fd&BzWZbudt$K$G-v zH{KHOI(9Ju$#M>WLFfyqtOQu6N)_B?7(nOTx0txO>*pw_6a-C3#EXs?gPfTPK)899WWKs~;pfrZvoRHmbvoM3yP zCm5EnAVGr5t|1G9=V`T=&(EBue19Spd6lS{HSe>lG@d1uU`lys?vErA%+(Y}M@&jf zGS+nkP>P=Pf;qcfX0}h6Y!RN-v|JS^Tz$bKu=*zQ%C?T z)-no9m;GxhJskrtYX10VWJh(JnhlgnD6qbO)ci$rzW8Q__$@(VQWi9wnP$N(F{$iD zUDvtFa98LuYCHi~80`Qih7=iivx?8C1UJ*pQY-Z!AN*s@YF*ZsgAhmH)gviXRC+#v z+L4w_B_Gm?RmgADw0+Y}lkXy-Q~#C1!U|g)iCPk(o@K-VAjSt5hqIPtGsX0#-qC=yFEPgZ<=}XJ zeR3kTtYx(Q4Hf_Txd2huo(@Wo4*O^`lYGS}7itS(-PvAiB{f9h45AWnPDPEQZyZhf zwW7k;w)L$Ich(*h&Ka0cDudVMf$1^&M~e{B)I4I|5$!8~oq3cyvLL9w_HmlRgxc4@rX; zrJ5h=9h}?pU*cnA-7TyT*UYpXXVCVrMSa%Xyz_i)c9}6px`z%@53tor6Vn2>xtu`q zWN^zJDBv_U>Zq*Ml2-RR8Av|m*}(CAdzhhzEoh))+4D9SZ(dDSRkBZK_QjWL=hovx-BBn0@=y-K_0&N*uIa0O6!Wu*)l0oD?FP3Z3c5g`SXCBm3Z&#~zz?#jID z_Y0@2d|PmLBy&jrG1?0W?-~5Io{G_@FYNGZ56hF2vzwQj`#s^){fULUw;Lmb^EdXw zN2ICGh>)m^t1rXBi1l%Jdb@h67i;|i2j1)OpP~F?@c5vE5l7Dn;h#;y*_jd>$4eV2 ztK2EJSVH4)!>#NV?q-NeX6{Z%ET637d%<_mV2! zR=GS*#vj~r*SMO~vp3`_JBNLud?S#N+LPKg&<6IEDM_V-xgBjzQHc4)tyzBw6Z>uI z$4JSl?9Giz+co%pyzFh-Y%vV+^pWm|B8atTo~ZnYTJ*PYXg~W>#c?OlFo^d z?5@o9E0MkLHgk0|uN<*DjJ zN^XTgQeb&EBG8d5gXoeRbTKhW7iwwSDY2%5p;YYa6Bi`wdb8Y=^|3^yPZ5@j@ zKmp?rk0Jo?Q}9&om;&yTy(1Q3hlS(LhH3832m@kKYAmF@<87|6wA}Ky$cbWgcJP;# z%}v0ozB?KipBUZJne4b0-aUSGmU^IM1r(@%{5mUVxv>PB(K53$70bOCw@QC9$Zo5BLJyT+spz z1Y??lWI_4yw7k?+FMa&@>|cE$JXgg?R>QmT`lj9JVO^fxL#dX1kS&YlVt$SH91T{` zagg@(!n%q1!gyVTitzpg;}MFC@5iATajbQ(M+@7DZ`Tm?o2@zG{rHG&QH7jUwoj<> zOtUe2F!XF>+C^{>3Pxk7H@Y^`94V9zB#jUGQH$>kx!l4OiW4|xzfM8rERcdLKAkUr zvx}6uAYybq{iY1e2@EjJObe{?A9+H&e-`x8ZP{;^TQGf_s3tjAIQ^mh-Nsm>d`1-C z`dVp8J7D38vGmTJREG1i&@)!CBbcc{Qz$UXZu86(nN3aQdZV9ljV-@q^JRTOWiVQB1n&8xCgN*vs31jL2)= zi&uUOA2MVcR!+-q-blaLWV@i0Fu*~@9Ow-QG}?yH+KL|Vg7!)yvAZQ%jltt#pocfu z5@>)!9EDMreyiYmusAD2)Et&hz!!x4GI}mEHh2=~!HUJZ;@)Bf>bB96!hd}@zj&SH zozI6&M{_Vs)EmzsAhVqeIqK;7+-v@t(l|l{vi+^z#vwWqKJoBkD36H#XrL>6F8$7w z;Wxq8i=7A!+5*8=xPXxQH_{C|)DZ?gVtp~B_#fd=H?|>m)~>u9@E}*z7-0lMioq*@D1t=Epk;oXArV)hC&yg8?zpZftq(#`;uYxgo0Bosb4m?@x<11go7j>UO!^1Q~G1)23!vq6-DpqixlH=?BBP z|16)R57&Jrgm3U-4t#ydoySHIu~XfdZ9_nteiKe`P{4{1R(7~L`Sc_8ny|o!V;C^S z_wYF%@-zbs&Z`2>NwF4r-bhg)DstLL8%&Uwe%qWTNtD4DxqoeG6)E9j*5k22a65lw z;@v>RV8EGP&KGkZ0B@Q#SUGQHg>==>H~rC?N!Nkn_$_0dv{{2m?%}7!R4;-B0q(TQ z!P(|IRX}U1V*zEl@iMflCEaWGbFS9w*uGB= zj14kKhVYZjmTVfJ-;r;m zWoQCa_`BtqE>{1tg_Z!paox&L7l8$UE!g^&FQyBZ`O1_FR$jk9&_gf&SV@ku=*op2 z$CA1_CRQp3r_@TfH*aN3*B9Qh7Lb$0pM^D+$tYSLwUmZgm9=I>?~TP{G*NvErBi!C ztI$t+*;$#>Allkab4j2dy{**bQq@^8^92;`)2`%;Ev3i04 zIKO^$v5VxD9~s2x5cIs}oj-oj{OFC}r(EPs);0p?-+DZ92|Ta4V;q&~hhp(d#EEGzm zFB#1CNcflCl`m8J9&5|w{7>DyqT+CGI3N_Yzf>b*ih=t$!_{Dt4Ml8wcg^0DLgRz^ zF@TT4;Apo$g6JgE!%rQ0RUF*zEPD{VMY%8tZvNKk=+@`p2E&R*9Mw9C0&SEwNkd<# zj4~d?R3u6vxyk+VNJ$$4Vv_(rky`9Y%0yq_D)N%$(SdaD@Y1>iiA~t2m>!!NU+6K} z0>)^6SM_Y9)gGhC3buF)w`hA%!Y%>$y$p)8UCH*?hi@v80Ce0kTh9;fA=cTX3oK!N z=N9Os#enOf{MU($ly_=irVD-O^eVm&p0X3uH*j`ww>Y}q8No$U#6q8Sqt7=8-lSzo+%BFUZK^0CA zFwhe0R&Nek6~{B8xim6msrIAw+CoTP&F%{NK<3H-Mj<-IUU^9a?PUn%c|#@VeQ#E0 zjU_rRVcjf~TzgSmU`hkal1`Mba~D1R(GOnBy1HLTjLv(xJ|Nvbffk;3YX0?5HirWq zhM0jsG*{P`*h09gH_t2|dK?hykYI)JbR`Pug zKO-ju3EGO<%gXDA4$qiu?-&?yQ#&&7RQy(HqMm|1gQ zwf$O6CoQd2=o%$39>s#Lr+{Z!&wWC=p7?&BBRD89@MLPuF7*R{&@MO&jpZ3pw3mFS`# zDNuQ%!BKCljJF;HhgC%jW^DG-O5%%x$mY67)ald}n%L1-J+$#9vk??MLRnH3wh;)A z%P>NOAI;_z3j=y4d9zQs??O61%3X!a|fbBCBC3 zS7dSE=0Z4eus1(g8x*A(1glyuOgo@2H>y2Is=iW{wLc+4!_f$*G>$5XF{rF2Cq$Di z2h`QOs2-4u96{zCeI>Y2G*;<*eKCBTrTm`7lXOz^U-TrCIKM_-c}| zzhli{r*+@3&e3~viuOXxJRkQU#P>a5d7;?x8ta3YB%N#qs~lZyYuvgxi)tF^BG&49 zNW5~KG8Afo8&%eKSB;NQ;7EVwKz)!ZwzZ{S4fn+y6tj=A`Werk=+dZ<^ zlANQEQy8Q0Q(1UxJW{;$yn}Oq$=*gn+cN`yZnl*bqs!~D0O=U|Seq_L|8@O3APMGL zPV<8E&AE`{ba3=Vi>BZrS&8J<5v^vwS3S>CasR-z!FFKKm|m*1+QdhdOMe+uI_Zb_ zf`rGgTB3*x*QrF-{{=}3#j>R00$8r_MNNvU z(rxmDVR?)kF43hJZR3LB{+K=1{n1W0ahMo=*w3bx?mr-_>4TQ;ToC2&M@cKG1WIMs_CyJ zE?G=Be;J2~M?SDTp<0I9waaYJ#~oKH#~seMfidCG8D%PBUSVV<&g`2O_h&iG*o)3z zM@^_;>mYY)5)*1Qx$Q;&l7@dt_?mnk59Rqe>Moubk)nUMGPO^(Sw$hYf=9Wz zI%cgTWEdfGS>8h^`BDwXBC7SWOVOW?caONXp;>>rO|Gt5NVzGZ^kXr}w3nI8gSX&Z zerXJZ>xMl(r~MEihN;VzpEsmUnw^>8#H3YQtt~Xgb0@`pst{&o@O1+H^5*rmTW*P8vl^0 zrINwv#(UFnLLEv(-POT9HM5D_z6X4R7hf%1f|Aq(Rr^#XIT4y9YkI@?RLX#2!N-)s zGVF+}RV0Qq-kSW4bk;WXQd8SZt5543FwvC8e61DT<4jye1#c+mlrKyS|39 zHyfK1hCEN<3>S{R)3*Z^h%X8B*t*vncXg|-o`Xf4f(|Ra&XWuyM+_d)HJ>)qd-(05 zq9Ud4<;IlfIFz5@ngz#w`8_EY++9kCxQ8?~9M856w?6gt_3ieFcKjU43B5aJ(g&Vf z2?17MF!!4qCJfE=9UP6FbZu-Mto5zT-HjdS4Xw=od@e?2L=d)z0bXRPO_s36g76xW zcSKJc8@_&a`LeqqN*Hs9hTm4Pc31$1FBOn}ypZZB&x)8S!>zzI23JIQENU=x7b10? z@lJTTH~s}H5kY*-MjC#v<%(#-qweS6xlE^@?y=x}d`8Ux2B0RuTQUBFW?So<+x*x4 z7=1XFj@$JYE#45_(qhvhTlcZjg>xc@jV?{2b!y-C#$^k)-8qn8G&qz1!aj*A3(svW z0C7Kh4Vy|e&lvH~bT^NHrt#fGk*VfM(eV!<=hkG7GDS#=N@Mx*xe9Ld9Yban>TcyX zB@d;y*qH3OtSH~|@+gK#`q-3i>Xr4yz7#C$<)1r~f+H{3tT~Uo549+B=FSk^qYIB=`7Z65J#Qh|$X15j3WHN@FM= zNI%305tej0!Q+T{22}N72%JI&R8qrV7R#qvHLC6mWcg}8#pU}Rmy>CEHXEplF$vPV z_T(b=jRuL~}ebO*cQm`%*7+r_W1cRzsb3X!a^EvMHgUsjqY^KQ|(mJ?_ z={ao=c(*pG+@w|2k$VAa<|t!BqEr+m!9)78oVm{RLdYCvU9#$oE1`uUaRoEqU@rVj z&fE1qc>Vb^#Mm`%rd1cwRXiNqeo+`}1h)2C4d)3jrh^T<+Va8!Xci9$zAM8CEqqIM za@%dv+_Ud`;4VJ>@N-lU%3`lMMxR&$9hHj7Mqi4U8nN0p%&pYLF^wZa+6>|w!^cMe zh68KWoJK?*kGI2c7kI~q2=8&n6gg13GBU~L`E)p@C$R{yOPO7kdCe9CxfBIS8B`RV zA}1m^yw4658t6_tS_88m{UX?72jG*PV$l4IHTa4_QilU*EWOacDtaMcc&j6n6OJ!- zhI4e)ki@KCq;MC3-C<0>zC~Z8wmauDjxO|#944`A-i{s`(3@dwepDZ1Oxeh4Yk4Kt z^DYFS%oV0og60M$*|um}HY{LkR%YDJUX3DLu#n6@U*z8O72F(!8dhnZ#1^7AG=$KT zKuAhbJ|dZtn^9(lcSsM@1cif$u3A-46CY=c8}de=Nk2cO9?sP4A9J!Y!xYT z%<`tG$H#y`m%(O&iu%K@mc!|Xy*{|8rkaP9gsgGctjDE3r!$_$=F#zwhn`w&tkdw1 zB4#%MJ))6ZS#4_dGHZ!E7_bWVEqh_!Y5?6sq5rvi6I(83Oa^-iV76QnI&d6k!f^cr ze*dzRrD!GoO6^QWOQ;=D*ISL$@Cpjf1utnkhq%jeKx(7M#rq5^G6`NOUc8b5WGWFJMl_BUy)Hq4s zFL%j9o?_*52*1pf0W;JZJwLtoi>{Q3_vf<7wlz?5WegUtP+DG?PsI-Blqoe5@N*NW z!jv}-^6(Kuty#^@%E$=T$H;7$X5fKn(TgnqG8@pj8(Y5O7d|OUWKgNONOnJ;ji5K6u7{mTpj{fLQy0~dZgRRh^W#R{)EwE~U1x^VVq4MSxg z#fLN!Tf`Z=K&~xieK7hLvK!GiPRD)U$oMJVWS7I66>JtyiA*YvIvb7*lF}XE3#V_8 zAuv`(@4|G-M11SUzZRd zshIDh03Cc8kA7}oX()lpwdxF9BHlL1pc;s4tpGESy0R zhn7N@v~{<9uH*^9%LL`o774>rS%_4Fn4ryWkAvm=e7tr~?gQh=d}B9AbW_StsLAlP z@r1%?&E|CHA-%XONX>rQpO@v8#BeO0%oKTdtOo0AeXZTYl&4GNTWubOOmV4F#srZKJ}dRHN1|;LOd@RmcotpzT7}G;0H2H;Mq7pv z64zJ0E@J^|q_L)M5Xh+Y31u^g@yr# z(aBGCe6K@0Ukg5(1}cOgW&Yq+wv=xS@t}9MGWf|l+skLKKfQvrthB3BlG!4%yaXl{ zrR#09_EK%0HhX>m?q!ORmC{ih5(=0JZi$VIzE)ftjdV+47%nWXGF%n&d`tY=;w$EY zK9&gSLyysmfJ>3{n*s|)^G+6K<_ifj}vB>7a zVGr~eV?Pw}Siq-aOy3qOH~3dv#|6 zUf+8XZTNcVMgQAfDyQNKF6P&?%V|uS<;x-gF4>kI-I++D+dLhZb9I@xkIw9gPa9SRk7$^I2)%J}P?2v)H-MvA( ze2!bbm``llIpvRU9ERO_9kPjPV9NXaB!@IguB&c9j~uHjx32Rfz3~nNb8@ddd5w{x zHrifx;!T>gW7*^_@{5Uun=NP?!n`eno<@6H#I*ZveRi;R1J9*dL)5TO{&S603^rzF zyXhrdqSW;{F4`Et_qcM@nyIp`9Yno2YW+s>KcO+eZ(L+2koBgaB0|#~bvdtL&6ymk z+j~+LVWRI%qWmIF=eA= z4j#5iS)W0?ke-bI5^~eJ{c|DvDeRPE>28ONkNNfyAFO$z;LyQQ&bR4iUA50TPrVDy zh)RvA`_oU&&E9K|8;Yy2O;^^<0z^bDHa}QAO_;f-&rgT*wat@w74En zqO(J^VKX#BiO*OG=aj$~_4;cMoyIX>`!mrx8O4rXOgi*9Ai4UiJkQ&|Ov*lv4-KV; zQldF`F5S+WavEXNOwBhl5B>yU&ka!SNqzKbd=U`Y5s5(jj+Z#^p>LYJ+X8TBXLfJN zG5X+4u=Ai2jDLRFT6Lv{?w2VdNAw~fr^9D;Q{D=MA32itpex#{3lBL_7%NzKMz=@* zs1l5{TzjUg@RRyyS(C9!eV)n89auc5vAUQ1aBV>sj?thMzOq%?h9{RN5(>_Gl*zn% z{_|x9%qg4492GD!IdW1rB>n97PinrKn|#&U-e!o@*6J%z+?BBJC`MTOlk-gZa19!G zZ|~qHlp84)i>_EU-HiB#wG;7mWrr*2(l{%m7I8T@m>wbHE3Sqqn9Ed$NWD^(dAc(O1?$-LP-THP2fo+|1@_#RTX;1k*z`HKH12qEH-o8j zl=^~c;~cNaLy9i99nfX`qGb#dUdK;BufcCMEKAs^2eg9u79?x`>4tSMkGvr3p*=^N z&0P3IHv18qkLF_Gd6?(3z+OxLMUMh^T`_xP_3ClqtJzFH<93HLu?cjvM+!;TvfROA zr?cGS8sqjTs|G7bZ_6E&oR?J6dIGPN`_k#ZtvJ!0&l=tLOt#uSvlfmKBQ8N6U3V_L zN`QTlZm;ZyH397psy@&FIdsk#R@p7=kAI^{20T=a;PL$6vO2oGdTPXiWB-6O;LUBo zhY|jPc9$q@mECZyka%XQ1LVg&$91ESW*6Yg9Q5G8@9_SENR^hEjs^J7$lTG1*4)O# zmfp(T5O}SQu_L{-gs`ZrlBkZNuI(}d(!1M2j*D4I1$LF?ku_-p97~D!xJvzo;_w$} z254zH-rqh!EZf9IN1uJZJ)_HKk#C%j>|#p%dbP3>=@k%sgPhsH_YSPbk=FN?e8tz> zz{i#)hk{4w*Ge9f&1)$ShGzd8!Vl_(%m+& z9r%&pm2chhm8fVYRcYVp)0_CbEBXt0c9?ep;44xSML!S8ap_do0!uw zF)*>xF*4FIGW~^JTPrEZtuP>Y-&S&jO8S@AX_1j67S`oR;{_59_uK^F?oYes*&FF< zE>^B{(&|KGh=!eVuY0Y#=)RJAnLV|qQHlJ%RAPn8Cn#dXTAwkP_N$%_LIoiAwT9L{ zy5u$`^46zUV#LYLEy<~}n_ZlKXuS4#xiJ1nQPn9CyS0XUa&C-Ipan^oa%pU(Wrw=K z=2H1ri8N|lGKHonucY9ixv!y{NgJkmQ&hgd-U+>VX>c9r^0LwSot4TVB8X@2>=`NS z2!rglLWP7BFbNEgH%SNFDZv)n#9~;)DH544D23{(TO){mEiEE38z55bK#OR9_@Ie5 zPwdZXSfWf*GRQ`iZJsh#S|Ti;Fc$Ad_m;}iT9gN5?llRIP;n8VM`1vGH_m$Jv?Uk!*H&{=zwk9F-4=%Ryh_oy=A#0zt z)y*HKg7iKC*aS>lmvlBajtNuQeB0O|S6`)8+(5+%IEB~;#$AA5uF}oFt?B`>2;kMh zmhFF`@3%4_bvh=l9=w60Mf~bx1t7JnSDI^8WjTP3>l(Co6F_ls28%H{~HM9SmO-W zdn=;{!&D#vueY?jVAce&ThemE@?*~|mbiQ#d;iAfHNLh;F*}Tt&&p+E;w;%md-xo|Wd{xGUoIXSR#*DJc+@>dBWC;DfM|Dy_p!$vpvTcbOzrG42{= ztQ!GaO>08cfK1!Xq|tqtko9~N6^K9s2Ne@VJ()f8`pl6B2$RMn%sbaP7JwIV zvLaR9`B)6qzAwVk&2<<3N7siwOuQ{S~RJgYTqQOH?H;|`X2ZJ zVG1!rc4y#ccd3x^2Xsq}W8xw{4%T&>`q3pksec-jBk$M?|t1S&5D0*VF(e18)F4Y1*K*1A5K<9G?AU;rEd zfB}5`yZC^7|KA_iFVnqsGI3k%mw@vH_1^%%rw@o65Lrvu z*2c-$#z|M%&Cb|ShtAd7>dyeS49;3#{XsG888R`-;JUZQPNd%vUM>2Gr;#=%`yXC9Rqu{2k|oi zE$~jn{|0a{);F>?{;5;sz_GbI-(QUaY7icn_y68XE)v2$}Wv$fF$5-SkP$VMON&oVOn ziCq8X#r~wQ|FR>Uo)6PNjq3q5&hUc-tjvERK~Yp#PEq9N_KyMZeH4MH3cyPL13E{} zKS5U$7ZsKM8GHagsT-&l0MOn6%s+rH{3CD)StVsbX=zc#p9OU3t{RFV0ss}{|NlzP zf6K`8rTg$tS}!B2EGQzVEci3NKIRc*EfDk!SV{g34t$>a_E!H6A9x&+{=awFenzy7 z41|gT&fZg$pY5fo=68s{TabS}qD77Gg;jxV1lsmbN>6S6rxN~lRN4QelssR-mVYYX zwtnwx4Z9m9r-?Y>CJ7N z9Q18WjlUmx{ds_&IlgXT0-=Bx#R91Qfc#F{G(Z~vZ(jMC5a|C!c)CXVPWr#VZ8L;E z9020+0N1cTn_`}C_+R51+FIM`|GXA_Cl<&;01rGD0IiwTCXZTs8?Huj+H^7y=0Z1W4KeY2TVM0@tr!X!1J* zkWc@s5dZ7>{gLPEh4Pnpc5ZY|z~%mbtkVQ(dU9OA4!;2|X+HvX{xzVXt&y?eFIs4< zH~gx%7yxK00Q<=>xiS8-h0acnENs6SnwnXfB~f6%L4j-xTqXY~dA=f@zXSctNcGqB zz&Zw6Fh}wBOR+S2s4}C7>yl0;!Mt2T7W}|53kw$9<2-muy@>OE?1x z0$zIZN6GVjKlocg|Kt3~|H#Vyy-o1_A?o{R5s&>Jg#FSoTA-5WzMHoouuA+OYvunU z3+PTexar#20;%8ed*J)CiTLCw=6GU+FEW2?oc+dZ z@nt|4v?1pItM}g`^L#ZY{ttcporyB*^u+bP0063G|NmER{#%?ekiUPulK$d|leN(= z81~|@=|K+&=m@O9W#x~O=j)9453t`FJ2;wu4-Ec?8{qO7c~=9RU!_2n0tQBZ6kwo* z^bZ7B8Jp@Gy8Qyb(Ja%=3%K4`0LSA;di`GeuUo;`v>s9b13de)ox{gEnh15S^12w{{cKOWc{8R_?7Q>&1=Z2 z0_=n}u>Lr_lW+fl1YO-f&fxt_h!hk8cQNn)z!A_u>AvghUnS4i1(+52U(a5{U(H^6 z`Leh+Ak+GY0|1o&1_nO!e3b)!hwWf&?+i@yIMN&1+FF|b(sk!>G5O>PG@21$Fz}=E zs-FC}u=>tUX1_2*@dkxb4MG4Q|LxD=09M}LVgk3fzSGOE=4ZL@Yb;Zsqx}hJhCjwG zO?`ihYX(%ouRzP_^cXFGfTh4x1H}(|H6Hj|(BH-x?+0&@N`d-J3jG-sefV!te@jps z?&CbDKn0Wo>yHY6y!czx?|$vC6d)^BqbkIC?_pz~L_I5nd8 zU_jhjV5R-R7(zh*7FSpIUrXbEozMN58&2GWg_VHnU<3yDq(4Bx5$o84$g*7&JMq{wiA_? zIsQOoV#J?0vOwT(kpMm)>ed(Vq*jn^&F@c!~JK*5`%7O(hMs}`& zZAAuZ;l~_OuKM5M0(ZZd8G##M|9#-#*P%`9Ue?G4&=1Q5a?p>-uw$KnF5_QW;GgG< z#0SEW?=kiF3QUs!QSy8Vtp2%>UxrQOTb*=3H349NmG=(;-8%0qC6;UN+(f^Uz{&Ud&qnOD5K+JE0BE`wpkL|!E0|#ipKju4*{{u0< zi-leU1)VDZHTDKrfAn~soqwmZeyJhQ-s#uNDMcH-vx|{38)3z5P4b|3!A~ zM<+_p{qG=u=MP(^mD)FJg930>z<=^f{$FR;7t&M|#z%qTLtv>5b6X}s%1RkTprrX^n6k_$LD4`k5q+sBvXEe?kXS4sGAY7}{{3z` z@9wvAcaLt2z5RaYe&;*i-*fKi(!?~IBspX`1v`EC)P*mBTaf412$^=li>O4XOItS} zQ`NvXIM6!R4w;r?DJiGwYCsKkxx%lnwAuux=w?OiVsEkAhZVYMFZDo{X>C}+c8+Bs zWA|B_&*JebB1Digrv)1F@C<`K|LM>Ew{XOXo2fIN(uS=txdj9}4u@ct+#3VFtTFFf zGAe&V$R3pvj{B@RYWY@Ost*N|?|vmCBB?B+PV@Yt7OYbgZRjMUVd-KFc>TaL=XM0t z`E7K-FXLlWG%chOaKlcd0IWjx^kTw`)C>gG^*SB2V&&ua9yp{08&$xs&orHCL+=ncba)@_nVMYz3 zCa)drDZ(-?#y!i*pfaXb3)r|EV;k)PI={@-=LnW%=3v0zyJ-dFj!z3-ohXuQkM(bCz;QP0#|EyqS1%c;4%U%W!iCfmf^|-CL3^xrLA=NswIM10NFT(!4PsW7XIwK}&{48o zSE@TR6Xrh)QH2s)oaMrfV)L9$){+VISDzQrS)BdAg$=cqu2iSS|3cjx-4pneSA|sV ze*fjdbqQz?Fo55mzL%Q~TWUu;N9n9KB*kjj{{QO`j(`EX>+yq=6q)m5<+B zzncqIHXsc2ppc)Wl9cTxkJ)0hAe?cSuoWm$<|&4oCw9UK9B-g3 zKXSELFno{8TA?Q|`Dd_5q6wuNN+VunM0@J6fG0}e56LGwj+x^+)}4l+8e0TRpWabk containerRoot=${containerRoot}`); return { pythonPath, workingDirectory, @@ -104,7 +134,9 @@ function resolveOptions() { endpoint, interval, extraForceArgs, - extraWatchArgs + extraWatchArgs, + hostRoot, + containerRoot }; } function getTargetPath(config) { @@ -176,6 +208,37 @@ function needsForceSync(targetPath) { return true; } } +async function ensurePythonDependencies(pythonPath) { + const missing = []; + let pythonError; + for (const moduleName of REQUIRED_PYTHON_MODULES) { + const check = spawnSync(pythonPath, ['-c', `import ${moduleName}`], { encoding: 'utf8' }); + if (check.error) { + pythonError = check.error; + break; + } + if (check.status !== 0) { + missing.push(moduleName); + } + } + if (pythonError) { + const message = `Context Engine Uploader: failed to run ${pythonPath}. Update contextEngineUploader.pythonPath.`; + vscode.window.showErrorMessage(message); + log(`Dependency check failed: ${pythonError.message || pythonError}`); + return false; + } + if (missing.length) { + const installCommand = `${pythonPath} -m pip install ${REQUIRED_PYTHON_MODULES.join(' ')}`; + log(`Missing Python modules: ${missing.join(', ')}. Run: ${installCommand}`); + const action = await vscode.window.showErrorMessage(`Context Engine Uploader: missing Python modules (${missing.join(', ')}).`, 'Copy install command'); + if (action === 'Copy install command') { + await vscode.env.clipboard.writeText(installCommand); + vscode.window.showInformationMessage('Pip install command copied to clipboard.'); + } + return false; + } + return true; +} function setStatusBarState(mode) { if (!statusBarItem) { return; @@ -195,7 +258,7 @@ function setStatusBarState(mode) { function runOnce(options) { return new Promise(resolve => { const args = buildArgs(options, 'force'); - const child = spawn(options.pythonPath, args, { cwd: options.workingDirectory }); + const child = spawn(options.pythonPath, args, { cwd: options.workingDirectory, env: buildChildEnv(options) }); forceProcess = child; attachOutput(child, 'force'); let finished = false; @@ -219,7 +282,7 @@ function runOnce(options) { } function startWatch(options) { const args = buildArgs(options, 'watch'); - const child = spawn(options.pythonPath, args, { cwd: options.workingDirectory }); + const child = spawn(options.pythonPath, args, { cwd: options.workingDirectory, env: buildChildEnv(options) }); watchProcess = child; attachOutput(child, 'watch'); setStatusBarState('watch'); @@ -317,6 +380,20 @@ function log(message) { const timestamp = new Date().toISOString(); outputChannel.appendLine(`[${timestamp}] ${message}`); } +function buildChildEnv(options) { + const env = { + ...process.env, + WORKSPACE_PATH: options.targetPath, + WATCH_ROOT: options.targetPath + }; + if (options.hostRoot) { + env.HOST_ROOT = options.hostRoot; + } + if (options.containerRoot) { + env.CONTAINER_ROOT = options.containerRoot; + } + return env; +} function deactivate() { return stopProcesses(); } diff --git a/vscode-extension/context-engine-uploader/package.json b/vscode-extension/context-engine-uploader/package.json index 58faf436..4e4c2ac2 100644 --- a/vscode-extension/context-engine-uploader/package.json +++ b/vscode-extension/context-engine-uploader/package.json @@ -1,7 +1,7 @@ { "name": "context-engine-uploader", "displayName": "Context Engine Uploader", - "description": "Runs the Context-Engine remote upload client with a force sync on startup followed by watch mode.", + "description": "Runs the Context-Engine remote upload client with a force sync on startup followed by watch mode. Requires Python with pip install requests urllib3 charset_normalizer.", "version": "0.1.1", "publisher": "context-engine", "engines": { @@ -88,6 +88,16 @@ "default": [], "description": "Additional CLI arguments appended to watch mode." }, + "contextEngineUploader.hostRoot": { + "type": "string", + "default": "", + "description": "Host path prefix that should be rewritten to the container root before uploads. Defaults to targetPath." + }, + "contextEngineUploader.containerRoot": { + "type": "string", + "default": "/work", + "description": "Container path that mirrors the host root on the upload server." + }, "contextEngineUploader.bundleSizeLimitMB": { "type": "number", "default": 100, diff --git a/vscode-extension/context-engine-uploader/python_libs/bin/normalizer b/vscode-extension/context-engine-uploader/python_libs/bin/normalizer deleted file mode 100755 index f10b70c4..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/bin/normalizer +++ /dev/null @@ -1,8 +0,0 @@ -#!/usr/local/bin/python3 -# -*- coding: utf-8 -*- -import re -import sys -from charset_normalizer.cli import cli_detect -if __name__ == '__main__': - sys.argv[0] = re.sub(r'(-script\.pyw|\.exe)?$', '', sys.argv[0]) - sys.exit(cli_detect()) diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/INSTALLER b/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/INSTALLER deleted file mode 100644 index a1b589e3..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/INSTALLER +++ /dev/null @@ -1 +0,0 @@ -pip diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/METADATA b/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/METADATA deleted file mode 100644 index 6939bac7..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/METADATA +++ /dev/null @@ -1,78 +0,0 @@ -Metadata-Version: 2.4 -Name: certifi -Version: 2025.11.12 -Summary: Python package for providing Mozilla's CA Bundle. -Home-page: https://github.com/certifi/python-certifi -Author: Kenneth Reitz -Author-email: me@kennethreitz.com -License: MPL-2.0 -Project-URL: Source, https://github.com/certifi/python-certifi -Classifier: Development Status :: 5 - Production/Stable -Classifier: Intended Audience :: Developers -Classifier: License :: OSI Approved :: Mozilla Public License 2.0 (MPL 2.0) -Classifier: Natural Language :: English -Classifier: Programming Language :: Python -Classifier: Programming Language :: Python :: 3 -Classifier: Programming Language :: Python :: 3 :: Only -Classifier: Programming Language :: Python :: 3.7 -Classifier: Programming Language :: Python :: 3.8 -Classifier: Programming Language :: Python :: 3.9 -Classifier: Programming Language :: Python :: 3.10 -Classifier: Programming Language :: Python :: 3.11 -Classifier: Programming Language :: Python :: 3.12 -Classifier: Programming Language :: Python :: 3.13 -Classifier: Programming Language :: Python :: 3.14 -Requires-Python: >=3.7 -License-File: LICENSE -Dynamic: author -Dynamic: author-email -Dynamic: classifier -Dynamic: description -Dynamic: home-page -Dynamic: license -Dynamic: license-file -Dynamic: project-url -Dynamic: requires-python -Dynamic: summary - -Certifi: Python SSL Certificates -================================ - -Certifi provides Mozilla's carefully curated collection of Root Certificates for -validating the trustworthiness of SSL certificates while verifying the identity -of TLS hosts. It has been extracted from the `Requests`_ project. - -Installation ------------- - -``certifi`` is available on PyPI. Simply install it with ``pip``:: - - $ pip install certifi - -Usage ------ - -To reference the installed certificate authority (CA) bundle, you can use the -built-in function:: - - >>> import certifi - - >>> certifi.where() - '/usr/local/lib/python3.7/site-packages/certifi/cacert.pem' - -Or from the command line:: - - $ python -m certifi - /usr/local/lib/python3.7/site-packages/certifi/cacert.pem - -Enjoy! - -.. _`Requests`: https://requests.readthedocs.io/en/master/ - -Addition/Removal of Certificates --------------------------------- - -Certifi does not support any addition/removal or other modification of the -CA trust store content. This project is intended to provide a reliable and -highly portable root of trust to python deployments. Look to upstream projects -for methods to use alternate trust. diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/RECORD b/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/RECORD deleted file mode 100644 index 02f61876..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/RECORD +++ /dev/null @@ -1,14 +0,0 @@ -certifi-2025.11.12.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4 -certifi-2025.11.12.dist-info/METADATA,sha256=_JprGu_1lWSdHlruRBKcorXnrfvBDhvX_6KRr8HQbLc,2475 -certifi-2025.11.12.dist-info/RECORD,, -certifi-2025.11.12.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91 -certifi-2025.11.12.dist-info/licenses/LICENSE,sha256=6TcW2mucDVpKHfYP5pWzcPBpVgPSH2-D8FPkLPwQyvc,989 -certifi-2025.11.12.dist-info/top_level.txt,sha256=KMu4vUCfsjLrkPbSNdgdekS-pVJzBAJFO__nI8NF6-U,8 -certifi/__init__.py,sha256=1BRSxNMnZW7CZ2oJtYWLoJgfHfcB9i273exwiPwfjJM,94 -certifi/__main__.py,sha256=xBBoj905TUWBLRGANOcf7oi6e-3dMP4cEoG9OyMs11g,243 -certifi/__pycache__/__init__.cpython-37.pyc,, -certifi/__pycache__/__main__.cpython-37.pyc,, -certifi/__pycache__/core.cpython-37.pyc,, -certifi/cacert.pem,sha256=oa1dZD4hxDtb7XTH4IkdzbWPavUcis4eTwINZUqlKhY,283932 -certifi/core.py,sha256=XFXycndG5pf37ayeF8N32HUuDafsyhkVMbO4BAPWHa0,3394 -certifi/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/WHEEL b/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/WHEEL deleted file mode 100644 index e7fa31b6..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/WHEEL +++ /dev/null @@ -1,5 +0,0 @@ -Wheel-Version: 1.0 -Generator: setuptools (80.9.0) -Root-Is-Purelib: true -Tag: py3-none-any - diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/licenses/LICENSE b/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/licenses/LICENSE deleted file mode 100644 index 62b076cd..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/licenses/LICENSE +++ /dev/null @@ -1,20 +0,0 @@ -This package contains a modified version of ca-bundle.crt: - -ca-bundle.crt -- Bundle of CA Root Certificates - -This is a bundle of X.509 certificates of public Certificate Authorities -(CA). These were automatically extracted from Mozilla's root certificates -file (certdata.txt). This file can be found in the mozilla source tree: -https://hg.mozilla.org/mozilla-central/file/tip/security/nss/lib/ckfw/builtins/certdata.txt -It contains the certificates in PEM format and therefore -can be directly used with curl / libcurl / php_curl, or with -an Apache+mod_ssl webserver for SSL client authentication. -Just configure this file as the SSLCACertificateFile.# - -***** BEGIN LICENSE BLOCK ***** -This Source Code Form is subject to the terms of the Mozilla Public License, -v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain -one at http://mozilla.org/MPL/2.0/. - -***** END LICENSE BLOCK ***** -@(#) $RCSfile: certdata.txt,v $ $Revision: 1.80 $ $Date: 2011/11/03 15:11:58 $ diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/top_level.txt b/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/top_level.txt deleted file mode 100644 index 963eac53..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/certifi-2025.11.12.dist-info/top_level.txt +++ /dev/null @@ -1 +0,0 @@ -certifi diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi/__init__.py b/vscode-extension/context-engine-uploader/python_libs/certifi/__init__.py deleted file mode 100644 index f11f5ae4..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/certifi/__init__.py +++ /dev/null @@ -1,4 +0,0 @@ -from .core import contents, where - -__all__ = ["contents", "where"] -__version__ = "2025.11.12" diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi/__main__.py b/vscode-extension/context-engine-uploader/python_libs/certifi/__main__.py deleted file mode 100644 index 8945b5da..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/certifi/__main__.py +++ /dev/null @@ -1,12 +0,0 @@ -import argparse - -from certifi import contents, where - -parser = argparse.ArgumentParser() -parser.add_argument("-c", "--contents", action="store_true") -args = parser.parse_args() - -if args.contents: - print(contents()) -else: - print(where()) diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi/cacert.pem b/vscode-extension/context-engine-uploader/python_libs/certifi/cacert.pem deleted file mode 100644 index ebcb66fe..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/certifi/cacert.pem +++ /dev/null @@ -1,4678 +0,0 @@ - -# Issuer: CN=Entrust Root Certification Authority O=Entrust, Inc. OU=www.entrust.net/CPS is incorporated by reference/(c) 2006 Entrust, Inc. -# Subject: CN=Entrust Root Certification Authority O=Entrust, Inc. OU=www.entrust.net/CPS is incorporated by reference/(c) 2006 Entrust, Inc. -# Label: "Entrust Root Certification Authority" -# Serial: 1164660820 -# MD5 Fingerprint: d6:a5:c3:ed:5d:dd:3e:00:c1:3d:87:92:1f:1d:3f:e4 -# SHA1 Fingerprint: b3:1e:b1:b7:40:e3:6c:84:02:da:dc:37:d4:4d:f5:d4:67:49:52:f9 -# SHA256 Fingerprint: 73:c1:76:43:4f:1b:c6:d5:ad:f4:5b:0e:76:e7:27:28:7c:8d:e5:76:16:c1:e6:e6:14:1a:2b:2c:bc:7d:8e:4c ------BEGIN CERTIFICATE----- -MIIEkTCCA3mgAwIBAgIERWtQVDANBgkqhkiG9w0BAQUFADCBsDELMAkGA1UEBhMC -VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0 -Lm5ldC9DUFMgaXMgaW5jb3Jwb3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMW -KGMpIDIwMDYgRW50cnVzdCwgSW5jLjEtMCsGA1UEAxMkRW50cnVzdCBSb290IENl -cnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA2MTEyNzIwMjM0MloXDTI2MTEyNzIw -NTM0MlowgbAxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMTkw -NwYDVQQLEzB3d3cuZW50cnVzdC5uZXQvQ1BTIGlzIGluY29ycG9yYXRlZCBieSBy -ZWZlcmVuY2UxHzAdBgNVBAsTFihjKSAyMDA2IEVudHJ1c3QsIEluYy4xLTArBgNV -BAMTJEVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASIwDQYJ -KoZIhvcNAQEBBQADggEPADCCAQoCggEBALaVtkNC+sZtKm9I35RMOVcF7sN5EUFo -Nu3s/poBj6E4KPz3EEZmLk0eGrEaTsbRwJWIsMn/MYszA9u3g3s+IIRe7bJWKKf4 -4LlAcTfFy0cOlypowCKVYhXbR9n10Cv/gkvJrT7eTNuQgFA/CYqEAOwwCj0Yzfv9 -KlmaI5UXLEWeH25DeW0MXJj+SKfFI0dcXv1u5x609mhF0YaDW6KKjbHjKYD+JXGI -rb68j6xSlkuqUY3kEzEZ6E5Nn9uss2rVvDlUccp6en+Q3X0dgNmBu1kmwhH+5pPi -94DkZfs0Nw4pgHBNrziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOB -sDCBrTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zArBgNVHRAEJDAi -gA8yMDA2MTEyNzIwMjM0MlqBDzIwMjYxMTI3MjA1MzQyWjAfBgNVHSMEGDAWgBRo -kORnpKZTgMeGZqTx90tD+4S9bTAdBgNVHQ4EFgQUaJDkZ6SmU4DHhmak8fdLQ/uE -vW0wHQYJKoZIhvZ9B0EABBAwDhsIVjcuMTo0LjADAgSQMA0GCSqGSIb3DQEBBQUA -A4IBAQCT1DCw1wMgKtD5Y+iRDAUgqV8ZyntyTtSx29CW+1RaGSwMCPeyvIWonX9t -O1KzKtvn1ISMY/YPyyYBkVBs9F8U4pN0wBOeMDpQ47RgxRzwIkSNcUesyBrJ6Zua -AGAT/3B+XxFNSRuzFVJ7yVTav52Vr2ua2J7p8eRDjeIRRDq/r72DQnNSi6q7pynP -9WQcCk3RvKqsnyrQ/39/2n3qse0wJcGE2jTSW3iDVuycNsMm4hH2Z0kdkquM++v/ -eu6FSqdQgPCnXEqULl8FmTxSQeDNtGPPAUO6nIPcj2A781q0tHuu2guQOHXvgR1m -0vdXcDazv/wor3ElhVsT/h5/WrQ8 ------END CERTIFICATE----- - -# Issuer: CN=QuoVadis Root CA 2 O=QuoVadis Limited -# Subject: CN=QuoVadis Root CA 2 O=QuoVadis Limited -# Label: "QuoVadis Root CA 2" -# Serial: 1289 -# MD5 Fingerprint: 5e:39:7b:dd:f8:ba:ec:82:e9:ac:62:ba:0c:54:00:2b -# SHA1 Fingerprint: ca:3a:fb:cf:12:40:36:4b:44:b2:16:20:88:80:48:39:19:93:7c:f7 -# SHA256 Fingerprint: 85:a0:dd:7d:d7:20:ad:b7:ff:05:f8:3d:54:2b:20:9d:c7:ff:45:28:f7:d6:77:b1:83:89:fe:a5:e5:c4:9e:86 ------BEGIN CERTIFICATE----- -MIIFtzCCA5+gAwIBAgICBQkwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x -GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv -b3QgQ0EgMjAeFw0wNjExMjQxODI3MDBaFw0zMTExMjQxODIzMzNaMEUxCzAJBgNV -BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W -YWRpcyBSb290IENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCa -GMpLlA0ALa8DKYrwD4HIrkwZhR0In6spRIXzL4GtMh6QRr+jhiYaHv5+HBg6XJxg -Fyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55J -WpzmM+Yklvc/ulsrHHo1wtZn/qtmUIttKGAr79dgw8eTvI02kfN/+NsRE8Scd3bB -rrcCaoF6qUWD4gXmuVbBlDePSHFjIuwXZQeVikvfj8ZaCuWw419eaxGrDPmF60Tp -+ARz8un+XJiM9XOva7R+zdRcAitMOeGylZUtQofX1bOQQ7dsE/He3fbE+Ik/0XX1 -ksOR1YqI0JDs3G3eicJlcZaLDQP9nL9bFqyS2+r+eXyt66/3FsvbzSUr5R/7mp/i -Ucw6UwxI5g69ybR2BlLmEROFcmMDBOAENisgGQLodKcftslWZvB1JdxnwQ5hYIiz -PtGo/KPaHbDRsSNU30R2be1B2MGyIrZTHN81Hdyhdyox5C315eXbyOD/5YDXC2Og -/zOhD7osFRXql7PSorW+8oyWHhqPHWykYTe5hnMz15eWniN9gqRMgeKh0bpnX5UH -oycR7hYQe7xFSkyyBNKr79X9DFHOUGoIMfmR2gyPZFwDwzqLID9ujWc9Otb+fVuI -yV77zGHcizN300QyNQliBJIWENieJ0f7OyHj+OsdWwIDAQABo4GwMIGtMA8GA1Ud -EwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1UdDgQWBBQahGK8SEwzJQTU7tD2 -A8QZRtGUazBuBgNVHSMEZzBlgBQahGK8SEwzJQTU7tD2A8QZRtGUa6FJpEcwRTEL -MAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMT -ElF1b1ZhZGlzIFJvb3QgQ0EgMoICBQkwDQYJKoZIhvcNAQEFBQADggIBAD4KFk2f -BluornFdLwUvZ+YTRYPENvbzwCYMDbVHZF34tHLJRqUDGCdViXh9duqWNIAXINzn -g/iN/Ae42l9NLmeyhP3ZRPx3UIHmfLTJDQtyU/h2BwdBR5YM++CCJpNVjP4iH2Bl -fF/nJrP3MpCYUNQ3cVX2kiF495V5+vgtJodmVjB3pjd4M1IQWK4/YY7yarHvGH5K -WWPKjaJW1acvvFYfzznB4vsKqBUsfU16Y8Zsl0Q80m/DShcK+JDSV6IZUaUtl0Ha -B0+pUNqQjZRG4T7wlP0QADj1O+hA4bRuVhogzG9Yje0uRY/W6ZM/57Es3zrWIozc -hLsib9D45MY56QSIPMO661V6bYCZJPVsAfv4l7CUW+v90m/xd2gNNWQjrLhVoQPR -TUIZ3Ph1WVaj+ahJefivDrkRoHy3au000LYmYjgahwz46P0u05B/B5EqHdZ+XIWD -mbA4CD/pXvk1B+TJYm5Xf6dQlfe6yJvmjqIBxdZmv3lh8zwc4bmCXF2gw+nYSL0Z -ohEUGW6yhhtoPkg3Goi3XZZenMfvJ2II4pEZXNLxId26F0KCl3GBUzGpn/Z9Yr9y -4aOTHcyKJloJONDO1w2AFrR4pTqHTI2KpdVGl/IsELm8VCLAAVBpQ570su9t+Oza -8eOx79+Rj1QqCyXBJhnEUhAFZdWCEOrCMc0u ------END CERTIFICATE----- - -# Issuer: CN=QuoVadis Root CA 3 O=QuoVadis Limited -# Subject: CN=QuoVadis Root CA 3 O=QuoVadis Limited -# Label: "QuoVadis Root CA 3" -# Serial: 1478 -# MD5 Fingerprint: 31:85:3c:62:94:97:63:b9:aa:fd:89:4e:af:6f:e0:cf -# SHA1 Fingerprint: 1f:49:14:f7:d8:74:95:1d:dd:ae:02:c0:be:fd:3a:2d:82:75:51:85 -# SHA256 Fingerprint: 18:f1:fc:7f:20:5d:f8:ad:dd:eb:7f:e0:07:dd:57:e3:af:37:5a:9c:4d:8d:73:54:6b:f4:f1:fe:d1:e1:8d:35 ------BEGIN CERTIFICATE----- -MIIGnTCCBIWgAwIBAgICBcYwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x -GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv -b3QgQ0EgMzAeFw0wNjExMjQxOTExMjNaFw0zMTExMjQxOTA2NDRaMEUxCzAJBgNV -BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W -YWRpcyBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDM -V0IWVJzmmNPTTe7+7cefQzlKZbPoFog02w1ZkXTPkrgEQK0CSzGrvI2RaNggDhoB -4hp7Thdd4oq3P5kazethq8Jlph+3t723j/z9cI8LoGe+AaJZz3HmDyl2/7FWeUUr -H556VOijKTVopAFPD6QuN+8bv+OPEKhyq1hX51SGyMnzW9os2l2ObjyjPtr7guXd -8lyyBTNvijbO0BNO/79KDDRMpsMhvVAEVeuxu537RR5kFd5VAYwCdrXLoT9Cabwv -vWhDFlaJKjdhkf2mrk7AyxRllDdLkgbvBNDInIjbC3uBr7E9KsRlOni27tyAsdLT -mZw67mtaa7ONt9XOnMK+pUsvFrGeaDsGb659n/je7Mwpp5ijJUMv7/FfJuGITfhe -btfZFG4ZM2mnO4SJk8RTVROhUXhA+LjJou57ulJCg54U7QVSWllWp5f8nT8KKdjc -T5EOE7zelaTfi5m+rJsziO+1ga8bxiJTyPbH7pcUsMV8eFLI8M5ud2CEpukqdiDt -WAEXMJPpGovgc2PZapKUSU60rUqFxKMiMPwJ7Wgic6aIDFUhWMXhOp8q3crhkODZ -c6tsgLjoC2SToJyMGf+z0gzskSaHirOi4XCPLArlzW1oUevaPwV/izLmE1xr/l9A -4iLItLRkT9a6fUg+qGkM17uGcclzuD87nSVL2v9A6wIDAQABo4IBlTCCAZEwDwYD -VR0TAQH/BAUwAwEB/zCB4QYDVR0gBIHZMIHWMIHTBgkrBgEEAb5YAAMwgcUwgZMG -CCsGAQUFBwICMIGGGoGDQW55IHVzZSBvZiB0aGlzIENlcnRpZmljYXRlIGNvbnN0 -aXR1dGVzIGFjY2VwdGFuY2Ugb2YgdGhlIFF1b1ZhZGlzIFJvb3QgQ0EgMyBDZXJ0 -aWZpY2F0ZSBQb2xpY3kgLyBDZXJ0aWZpY2F0aW9uIFByYWN0aWNlIFN0YXRlbWVu -dC4wLQYIKwYBBQUHAgEWIWh0dHA6Ly93d3cucXVvdmFkaXNnbG9iYWwuY29tL2Nw -czALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFPLAE+CCQz777i9nMpY1XNu4ywLQMG4G -A1UdIwRnMGWAFPLAE+CCQz777i9nMpY1XNu4ywLQoUmkRzBFMQswCQYDVQQGEwJC -TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDEbMBkGA1UEAxMSUXVvVmFkaXMg -Um9vdCBDQSAzggIFxjANBgkqhkiG9w0BAQUFAAOCAgEAT62gLEz6wPJv92ZVqyM0 -7ucp2sNbtrCD2dDQ4iH782CnO11gUyeim/YIIirnv6By5ZwkajGxkHon24QRiSem -d1o417+shvzuXYO8BsbRd2sPbSQvS3pspweWyuOEn62Iix2rFo1bZhfZFvSLgNLd -+LJ2w/w4E6oM3kJpK27zPOuAJ9v1pkQNn1pVWQvVDVJIxa6f8i+AxeoyUDUSly7B -4f/xI4hROJ/yZlZ25w9Rl6VSDE1JUZU2Pb+iSwwQHYaZTKrzchGT5Or2m9qoXadN -t54CrnMAyNojA+j56hl0YgCUyyIgvpSnWbWCar6ZeXqp8kokUvd0/bpO5qgdAm6x -DYBEwa7TIzdfu4V8K5Iu6H6li92Z4b8nby1dqnuH/grdS/yO9SbkbnBCbjPsMZ57 -k8HkyWkaPcBrTiJt7qtYTcbQQcEr6k8Sh17rRdhs9ZgC06DYVYoGmRmioHfRMJ6s -zHXug/WwYjnPbFfiTNKRCw51KBuav/0aQ/HKd/s7j2G4aSgWQgRecCocIdiP4b0j -Wy10QJLZYxkNc91pvGJHvOB0K7Lrfb5BG7XARsWhIstfTsEokt4YutUqKLsRixeT -mJlglFwjz1onl14LBQaTNx47aTbrqZ5hHY8y2o4M1nQ+ewkk2gF3R8Q7zTSMmfXK -4SVhM7JZG+Ju1zdXtg2pEto= ------END CERTIFICATE----- - -# Issuer: CN=DigiCert Assured ID Root CA O=DigiCert Inc OU=www.digicert.com -# Subject: CN=DigiCert Assured ID Root CA O=DigiCert Inc OU=www.digicert.com -# Label: "DigiCert Assured ID Root CA" -# Serial: 17154717934120587862167794914071425081 -# MD5 Fingerprint: 87:ce:0b:7b:2a:0e:49:00:e1:58:71:9b:37:a8:93:72 -# SHA1 Fingerprint: 05:63:b8:63:0d:62:d7:5a:bb:c8:ab:1e:4b:df:b5:a8:99:b2:4d:43 -# SHA256 Fingerprint: 3e:90:99:b5:01:5e:8f:48:6c:00:bc:ea:9d:11:1e:e7:21:fa:ba:35:5a:89:bc:f1:df:69:56:1e:3d:c6:32:5c ------BEGIN CERTIFICATE----- -MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBl -MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 -d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv -b3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQswCQYDVQQG -EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl -cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwggEi -MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7c -JpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYP -mDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+ -wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4 -VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1roV9Iq4/ -AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whfGHdPAgMB -AAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW -BBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYun -pyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRC -dWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTf -fwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+fT8r87cm -NW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5QZ7dsvfPx -H2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe -+o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g== ------END CERTIFICATE----- - -# Issuer: CN=DigiCert Global Root CA O=DigiCert Inc OU=www.digicert.com -# Subject: CN=DigiCert Global Root CA O=DigiCert Inc OU=www.digicert.com -# Label: "DigiCert Global Root CA" -# Serial: 10944719598952040374951832963794454346 -# MD5 Fingerprint: 79:e4:a9:84:0d:7d:3a:96:d7:c0:4f:e2:43:4c:89:2e -# SHA1 Fingerprint: a8:98:5d:3a:65:e5:e5:c4:b2:d7:d6:6d:40:c6:dd:2f:b1:9c:54:36 -# SHA256 Fingerprint: 43:48:a0:e9:44:4c:78:cb:26:5e:05:8d:5e:89:44:b4:d8:4f:96:62:bd:26:db:25:7f:89:34:a4:43:c7:01:61 ------BEGIN CERTIFICATE----- -MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh -MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 -d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD -QTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAwMDAwMDBaMGExCzAJBgNVBAYTAlVT -MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j -b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkqhkiG -9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsB -CSDMAZOnTjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97 -nh6Vfe63SKMI2tavegw5BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt -43C/dxC//AH2hdmoRBBYMql1GNXRor5H4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7P -T19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y7vrTC0LUq7dBMtoM1O/4 -gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQABo2MwYTAO -BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbR -TLtm8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUw -DQYJKoZIhvcNAQEFBQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/Esr -hMAtudXH/vTBH1jLuG2cenTnmCmrEbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg -06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIttep3Sp+dWOIrWcBAI+0tKIJF -PnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886UAb3LujEV0ls -YSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk -CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4= ------END CERTIFICATE----- - -# Issuer: CN=DigiCert High Assurance EV Root CA O=DigiCert Inc OU=www.digicert.com -# Subject: CN=DigiCert High Assurance EV Root CA O=DigiCert Inc OU=www.digicert.com -# Label: "DigiCert High Assurance EV Root CA" -# Serial: 3553400076410547919724730734378100087 -# MD5 Fingerprint: d4:74:de:57:5c:39:b2:d3:9c:85:83:c5:c0:65:49:8a -# SHA1 Fingerprint: 5f:b7:ee:06:33:e2:59:db:ad:0c:4c:9a:e6:d3:8f:1a:61:c7:dc:25 -# SHA256 Fingerprint: 74:31:e5:f4:c3:c1:ce:46:90:77:4f:0b:61:e0:54:40:88:3b:a9:a0:1e:d0:0b:a6:ab:d7:80:6e:d3:b1:18:cf ------BEGIN CERTIFICATE----- -MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBs -MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 -d3cuZGlnaWNlcnQuY29tMSswKQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5j -ZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTMxMTExMDAwMDAwMFowbDEL -MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 -LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2Ug -RVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm -+9S75S0tMqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTW -PNt0OKRKzE0lgvdKpVMSOO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEM -xChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFB -Ik5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3 -hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsg -EsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQF -MAMBAf8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaA -FLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3Nec -nzyIZgYIVyHbIUf4KmeqvxgydkAQV8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6z -eM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFpmyPInngiK3BD41VHMWEZ71jF -hS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkKmNEVX58Svnw2 -Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe -vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep -+OkuE6N36B9K ------END CERTIFICATE----- - -# Issuer: CN=SwissSign Gold CA - G2 O=SwissSign AG -# Subject: CN=SwissSign Gold CA - G2 O=SwissSign AG -# Label: "SwissSign Gold CA - G2" -# Serial: 13492815561806991280 -# MD5 Fingerprint: 24:77:d9:a8:91:d1:3b:fa:88:2d:c2:ff:f8:cd:33:93 -# SHA1 Fingerprint: d8:c5:38:8a:b7:30:1b:1b:6e:d4:7a:e6:45:25:3a:6f:9f:1a:27:61 -# SHA256 Fingerprint: 62:dd:0b:e9:b9:f5:0a:16:3e:a0:f8:e7:5c:05:3b:1e:ca:57:ea:55:c8:68:8f:64:7c:68:81:f2:c8:35:7b:95 ------BEGIN CERTIFICATE----- -MIIFujCCA6KgAwIBAgIJALtAHEP1Xk+wMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV -BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2ln -biBHb2xkIENBIC0gRzIwHhcNMDYxMDI1MDgzMDM1WhcNMzYxMDI1MDgzMDM1WjBF -MQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dpc3NTaWduIEFHMR8wHQYDVQQDExZT -d2lzc1NpZ24gR29sZCBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC -CgKCAgEAr+TufoskDhJuqVAtFkQ7kpJcyrhdhJJCEyq8ZVeCQD5XJM1QiyUqt2/8 -76LQwB8CJEoTlo8jE+YoWACjR8cGp4QjK7u9lit/VcyLwVcfDmJlD909Vopz2q5+ -bbqBHH5CjCA12UNNhPqE21Is8w4ndwtrvxEvcnifLtg+5hg3Wipy+dpikJKVyh+c -6bM8K8vzARO/Ws/BtQpgvd21mWRTuKCWs2/iJneRjOBiEAKfNA+k1ZIzUd6+jbqE -emA8atufK+ze3gE/bk3lUIbLtK/tREDFylqM2tIrfKjuvqblCqoOpd8FUrdVxyJd -MmqXl2MT28nbeTZ7hTpKxVKJ+STnnXepgv9VHKVxaSvRAiTysybUa9oEVeXBCsdt -MDeQKuSeFDNeFhdVxVu1yzSJkvGdJo+hB9TGsnhQ2wwMC3wLjEHXuendjIj3o02y -MszYF9rNt85mndT9Xv+9lz4pded+p2JYryU0pUHHPbwNUMoDAw8IWh+Vc3hiv69y -FGkOpeUDDniOJihC8AcLYiAQZzlG+qkDzAQ4embvIIO1jEpWjpEA/I5cgt6IoMPi -aG59je883WX0XaxR7ySArqpWl2/5rX3aYT+YdzylkbYcjCbaZaIJbcHiVOO5ykxM -gI93e2CaHt+28kgeDrpOVG2Y4OGiGqJ3UM/EY5LsRxmd6+ZrzsECAwEAAaOBrDCB -qTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUWyV7 -lqRlUX64OfPAeGZe6Drn8O4wHwYDVR0jBBgwFoAUWyV7lqRlUX64OfPAeGZe6Drn -8O4wRgYDVR0gBD8wPTA7BglghXQBWQECAQEwLjAsBggrBgEFBQcCARYgaHR0cDov -L3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBACe6 -45R88a7A3hfm5djV9VSwg/S7zV4Fe0+fdWavPOhWfvxyeDgD2StiGwC5+OlgzczO -UYrHUDFu4Up+GC9pWbY9ZIEr44OE5iKHjn3g7gKZYbge9LgriBIWhMIxkziWMaa5 -O1M/wySTVltpkuzFwbs4AOPsF6m43Md8AYOfMke6UiI0HTJ6CVanfCU2qT1L2sCC -bwq7EsiHSycR+R4tx5M/nttfJmtS2S6K8RTGRI0Vqbe/vd6mGu6uLftIdxf+u+yv -GPUqUfA5hJeVbG4bwyvEdGB5JbAKJ9/fXtI5z0V9QkvfsywexcZdylU6oJxpmo/a -77KwPJ+HbBIrZXAVUjEaJM9vMSNQH4xPjyPDdEFjHFWoFN0+4FFQz/EbMFYOkrCC -hdiDyyJkvC24JdVUorgG6q2SpCSgwYa1ShNqR88uC1aVVMvOmttqtKay20EIhid3 -92qgQmwLOM7XdVAyksLfKzAiSNDVQTglXaTpXZ/GlHXQRf0wl0OPkKsKx4ZzYEpp -Ld6leNcG2mqeSz53OiATIgHQv2ieY2BrNU0LbbqhPcCT4H8js1WtciVORvnSFu+w -ZMEBnunKoGqYDs/YYPIvSbjkQuE4NRb0yG5P94FW6LqjviOvrv1vA+ACOzB2+htt -Qc8Bsem4yWb02ybzOqR08kkkW8mw0FfB+j564ZfJ ------END CERTIFICATE----- - -# Issuer: CN=SecureTrust CA O=SecureTrust Corporation -# Subject: CN=SecureTrust CA O=SecureTrust Corporation -# Label: "SecureTrust CA" -# Serial: 17199774589125277788362757014266862032 -# MD5 Fingerprint: dc:32:c3:a7:6d:25:57:c7:68:09:9d:ea:2d:a9:a2:d1 -# SHA1 Fingerprint: 87:82:c6:c3:04:35:3b:cf:d2:96:92:d2:59:3e:7d:44:d9:34:ff:11 -# SHA256 Fingerprint: f1:c1:b5:0a:e5:a2:0d:d8:03:0e:c9:f6:bc:24:82:3d:d3:67:b5:25:57:59:b4:e7:1b:61:fc:e9:f7:37:5d:73 ------BEGIN CERTIFICATE----- -MIIDuDCCAqCgAwIBAgIQDPCOXAgWpa1Cf/DrJxhZ0DANBgkqhkiG9w0BAQUFADBI -MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x -FzAVBgNVBAMTDlNlY3VyZVRydXN0IENBMB4XDTA2MTEwNzE5MzExOFoXDTI5MTIz -MTE5NDA1NVowSDELMAkGA1UEBhMCVVMxIDAeBgNVBAoTF1NlY3VyZVRydXN0IENv -cnBvcmF0aW9uMRcwFQYDVQQDEw5TZWN1cmVUcnVzdCBDQTCCASIwDQYJKoZIhvcN -AQEBBQADggEPADCCAQoCggEBAKukgeWVzfX2FI7CT8rU4niVWJxB4Q2ZQCQXOZEz -Zum+4YOvYlyJ0fwkW2Gz4BERQRwdbvC4u/jep4G6pkjGnx29vo6pQT64lO0pGtSO -0gMdA+9tDWccV9cGrcrI9f4Or2YlSASWC12juhbDCE/RRvgUXPLIXgGZbf2IzIao -wW8xQmxSPmjL8xk037uHGFaAJsTQ3MBv396gwpEWoGQRS0S8Hvbn+mPeZqx2pHGj -7DaUaHp3pLHnDi+BeuK1cobvomuL8A/b01k/unK8RCSc43Oz969XL0Imnal0ugBS -8kvNU3xHCzaFDmapCJcWNFfBZveA4+1wVMeT4C4oFVmHursCAwEAAaOBnTCBmjAT -BgkrBgEEAYI3FAIEBh4EAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB -/zAdBgNVHQ4EFgQUQjK2FvoE/f5dS3rD/fdMQB1aQ68wNAYDVR0fBC0wKzApoCeg -JYYjaHR0cDovL2NybC5zZWN1cmV0cnVzdC5jb20vU1RDQS5jcmwwEAYJKwYBBAGC -NxUBBAMCAQAwDQYJKoZIhvcNAQEFBQADggEBADDtT0rhWDpSclu1pqNlGKa7UTt3 -6Z3q059c4EVlew3KW+JwULKUBRSuSceNQQcSc5R+DCMh/bwQf2AQWnL1mA6s7Ll/ -3XpvXdMc9P+IBWlCqQVxyLesJugutIxq/3HcuLHfmbx8IVQr5Fiiu1cprp6poxkm -D5kuCLDv/WnPmRoJjeOnnyvJNjR7JLN4TJUXpAYmHrZkUjZfYGfZnMUFdAvnZyPS -CPyI6a6Lf+Ew9Dd+/cYy2i2eRDAwbO4H3tI0/NL/QPZL9GZGBlSm8jIKYyYwa5vR -3ItHuuG51WLQoqD0ZwV4KWMabwTW+MZMo5qxN7SN5ShLHZ4swrhovO0C7jE= ------END CERTIFICATE----- - -# Issuer: CN=Secure Global CA O=SecureTrust Corporation -# Subject: CN=Secure Global CA O=SecureTrust Corporation -# Label: "Secure Global CA" -# Serial: 9751836167731051554232119481456978597 -# MD5 Fingerprint: cf:f4:27:0d:d4:ed:dc:65:16:49:6d:3d:da:bf:6e:de -# SHA1 Fingerprint: 3a:44:73:5a:e5:81:90:1f:24:86:61:46:1e:3b:9c:c4:5f:f5:3a:1b -# SHA256 Fingerprint: 42:00:f5:04:3a:c8:59:0e:bb:52:7d:20:9e:d1:50:30:29:fb:cb:d4:1c:a1:b5:06:ec:27:f1:5a:de:7d:ac:69 ------BEGIN CERTIFICATE----- -MIIDvDCCAqSgAwIBAgIQB1YipOjUiolN9BPI8PjqpTANBgkqhkiG9w0BAQUFADBK -MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x -GTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwHhcNMDYxMTA3MTk0MjI4WhcNMjkx -MjMxMTk1MjA2WjBKMQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3Qg -Q29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwggEiMA0GCSqG -SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvNS7YrGxVaQZx5RNoJLNP2MwhR/jxYDiJ -iQPpvepeRlMJ3Fz1Wuj3RSoC6zFh1ykzTM7HfAo3fg+6MpjhHZevj8fcyTiW89sa -/FHtaMbQbqR8JNGuQsiWUGMu4P51/pinX0kuleM5M2SOHqRfkNJnPLLZ/kG5VacJ -jnIFHovdRIWCQtBJwB1g8NEXLJXr9qXBkqPFwqcIYA1gBBCWeZ4WNOaptvolRTnI -HmX5k/Wq8VLcmZg9pYYaDDUz+kulBAYVHDGA76oYa8J719rO+TMg1fW9ajMtgQT7 -sFzUnKPiXB3jqUJ1XnvUd+85VLrJChgbEplJL4hL/VBi0XPnj3pDAgMBAAGjgZ0w -gZowEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQF -MAMBAf8wHQYDVR0OBBYEFK9EBMJBfkiD2045AuzshHrmzsmkMDQGA1UdHwQtMCsw -KaAnoCWGI2h0dHA6Ly9jcmwuc2VjdXJldHJ1c3QuY29tL1NHQ0EuY3JsMBAGCSsG -AQQBgjcVAQQDAgEAMA0GCSqGSIb3DQEBBQUAA4IBAQBjGghAfaReUw132HquHw0L -URYD7xh8yOOvaliTFGCRsoTciE6+OYo68+aCiV0BN7OrJKQVDpI1WkpEXk5X+nXO -H0jOZvQ8QCaSmGwb7iRGDBezUqXbpZGRzzfTb+cnCDpOGR86p1hcF895P4vkp9Mm -I50mD1hp/Ed+stCNi5O/KU9DaXR2Z0vPB4zmAve14bRDtUstFJ/53CYNv6ZHdAbY -iNE6KTCEztI5gGIbqMdXSbxqVVFnFUq+NQfk1XWYN3kwFNspnWzFacxHVaIw98xc -f8LDmBxrThaA63p4ZUWiABqvDA1VZDRIuJK58bRQKfJPIx/abKwfROHdI3hRW8cW ------END CERTIFICATE----- - -# Issuer: CN=COMODO Certification Authority O=COMODO CA Limited -# Subject: CN=COMODO Certification Authority O=COMODO CA Limited -# Label: "COMODO Certification Authority" -# Serial: 104350513648249232941998508985834464573 -# MD5 Fingerprint: 5c:48:dc:f7:42:72:ec:56:94:6d:1c:cc:71:35:80:75 -# SHA1 Fingerprint: 66:31:bf:9e:f7:4f:9e:b6:c9:d5:a6:0c:ba:6a:be:d1:f7:bd:ef:7b -# SHA256 Fingerprint: 0c:2c:d6:3d:f7:80:6f:a3:99:ed:e8:09:11:6b:57:5b:f8:79:89:f0:65:18:f9:80:8c:86:05:03:17:8b:af:66 ------BEGIN CERTIFICATE----- -MIIEHTCCAwWgAwIBAgIQToEtioJl4AsC7j41AkblPTANBgkqhkiG9w0BAQUFADCB -gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G -A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV -BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEyMDEwMDAw -MDBaFw0yOTEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl -YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P -RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 -aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3 -UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI -2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 -Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp -+2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ -DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O -nKVIrLsm9wIDAQABo4GOMIGLMB0GA1UdDgQWBBQLWOWLxkwVN6RAqTCpIb5HNlpW -/zAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBJBgNVHR8EQjBAMD6g -PKA6hjhodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9DZXJ0aWZpY2F0aW9u -QXV0aG9yaXR5LmNybDANBgkqhkiG9w0BAQUFAAOCAQEAPpiem/Yb6dc5t3iuHXIY -SdOH5EOC6z/JqvWote9VfCFSZfnVDeFs9D6Mk3ORLgLETgdxb8CPOGEIqB6BCsAv -IC9Bi5HcSEW88cbeunZrM8gALTFGTO3nnc+IlP8zwFboJIYmuNg4ON8qa90SzMc/ -RxdMosIGlgnW2/4/PEZB31jiVg88O8EckzXZOFKs7sjsLjBOlDW0JB9LeGna8gI4 -zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd -BA6+C4OmF4O5MBKgxTMVBbkN+8cFduPYSo38NBejxiEovjBFMR7HeL5YYTisO+IB -ZQ== ------END CERTIFICATE----- - -# Issuer: CN=COMODO ECC Certification Authority O=COMODO CA Limited -# Subject: CN=COMODO ECC Certification Authority O=COMODO CA Limited -# Label: "COMODO ECC Certification Authority" -# Serial: 41578283867086692638256921589707938090 -# MD5 Fingerprint: 7c:62:ff:74:9d:31:53:5e:68:4a:d5:78:aa:1e:bf:23 -# SHA1 Fingerprint: 9f:74:4e:9f:2b:4d:ba:ec:0f:31:2c:50:b6:56:3b:8e:2d:93:c3:11 -# SHA256 Fingerprint: 17:93:92:7a:06:14:54:97:89:ad:ce:2f:8f:34:f7:f0:b6:6d:0f:3a:e3:a3:b8:4d:21:ec:15:db:ba:4f:ad:c7 ------BEGIN CERTIFICATE----- -MIICiTCCAg+gAwIBAgIQH0evqmIAcFBUTAGem2OZKjAKBggqhkjOPQQDAzCBhTEL -MAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE -BxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMT -IkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwMzA2MDAw -MDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdy -ZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09N -T0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlv -biBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQDR3svdcmCFYX7deSR -FtSrYpn1PlILBs5BAH+X4QokPB0BBO490o0JlwzgdeT6+3eKKvUDYEs2ixYjFq0J -cfRK9ChQtP6IHG4/bC8vCVlbpVsLM5niwz2J+Wos77LTBumjQjBAMB0GA1UdDgQW -BBR1cacZSBm8nZ3qQUfflMRId5nTeTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ -BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjEA7wNbeqy3eApyt4jf/7VGFAkK+qDm -fQjGGoe9GKhzvSbKYAydzpmfz1wPMOG+FDHqAjAU9JM8SaczepBGR7NjfRObTrdv -GDeAU/7dIOA1mjbRxwG55tzd8/8dLDoWV9mSOdY= ------END CERTIFICATE----- - -# Issuer: CN=Certigna O=Dhimyotis -# Subject: CN=Certigna O=Dhimyotis -# Label: "Certigna" -# Serial: 18364802974209362175 -# MD5 Fingerprint: ab:57:a6:5b:7d:42:82:19:b5:d8:58:26:28:5e:fd:ff -# SHA1 Fingerprint: b1:2e:13:63:45:86:a4:6f:1a:b2:60:68:37:58:2d:c4:ac:fd:94:97 -# SHA256 Fingerprint: e3:b6:a2:db:2e:d7:ce:48:84:2f:7a:c5:32:41:c7:b7:1d:54:14:4b:fb:40:c1:1f:3f:1d:0b:42:f5:ee:a1:2d ------BEGIN CERTIFICATE----- -MIIDqDCCApCgAwIBAgIJAP7c4wEPyUj/MA0GCSqGSIb3DQEBBQUAMDQxCzAJBgNV -BAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hMB4X -DTA3MDYyOTE1MTMwNVoXDTI3MDYyOTE1MTMwNVowNDELMAkGA1UEBhMCRlIxEjAQ -BgNVBAoMCURoaW15b3RpczERMA8GA1UEAwwIQ2VydGlnbmEwggEiMA0GCSqGSIb3 -DQEBAQUAA4IBDwAwggEKAoIBAQDIaPHJ1tazNHUmgh7stL7qXOEm7RFHYeGifBZ4 -QCHkYJ5ayGPhxLGWkv8YbWkj4Sti993iNi+RB7lIzw7sebYs5zRLcAglozyHGxny -gQcPOJAZ0xH+hrTy0V4eHpbNgGzOOzGTtvKg0KmVEn2lmsxryIRWijOp5yIVUxbw -zBfsV1/pogqYCd7jX5xv3EjjhQsVWqa6n6xI4wmy9/Qy3l40vhx4XUJbzg4ij02Q -130yGLMLLGq/jj8UEYkgDncUtT2UCIf3JR7VsmAA7G8qKCVuKj4YYxclPz5EIBb2 -JsglrgVKtOdjLPOMFlN+XPsRGgjBRmKfIrjxwo1p3Po6WAbfAgMBAAGjgbwwgbkw -DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUGu3+QTmQtCRZvgHyUtVF9lo53BEw -ZAYDVR0jBF0wW4AUGu3+QTmQtCRZvgHyUtVF9lo53BGhOKQ2MDQxCzAJBgNVBAYT -AkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hggkA/tzj -AQ/JSP8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG -9w0BAQUFAAOCAQEAhQMeknH2Qq/ho2Ge6/PAD/Kl1NqV5ta+aDY9fm4fTIrv0Q8h -bV6lUmPOEvjvKtpv6zf+EwLHyzs+ImvaYS5/1HI93TDhHkxAGYwP15zRgzB7mFnc -fca5DClMoTOi62c6ZYTTluLtdkVwj7Ur3vkj1kluPBS1xp81HlDQwY9qcEQCYsuu -HWhBp6pX6FOqB9IG9tUUBguRA3UsbHK1YZWaDYu5Def131TN3ubY1gkIl2PlwS6w -t0QmwCbAr1UwnjvVNioZBPRcHv/PLLf/0P2HQBHVESO7SMAhqaQoLf0V+LBOK/Qw -WyH8EZE0vkHve52Xdf+XlcCWWC/qu0bXu+TZLg== ------END CERTIFICATE----- - -# Issuer: O=Chunghwa Telecom Co., Ltd. OU=ePKI Root Certification Authority -# Subject: O=Chunghwa Telecom Co., Ltd. OU=ePKI Root Certification Authority -# Label: "ePKI Root Certification Authority" -# Serial: 28956088682735189655030529057352760477 -# MD5 Fingerprint: 1b:2e:00:ca:26:06:90:3d:ad:fe:6f:15:68:d3:6b:b3 -# SHA1 Fingerprint: 67:65:0d:f1:7e:8e:7e:5b:82:40:a4:f4:56:4b:cf:e2:3d:69:c6:f0 -# SHA256 Fingerprint: c0:a6:f4:dc:63:a2:4b:fd:cf:54:ef:2a:6a:08:2a:0a:72:de:35:80:3e:2f:f5:ff:52:7a:e5:d8:72:06:df:d5 ------BEGIN CERTIFICATE----- -MIIFsDCCA5igAwIBAgIQFci9ZUdcr7iXAF7kBtK8nTANBgkqhkiG9w0BAQUFADBe -MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 -ZC4xKjAoBgNVBAsMIWVQS0kgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAe -Fw0wNDEyMjAwMjMxMjdaFw0zNDEyMjAwMjMxMjdaMF4xCzAJBgNVBAYTAlRXMSMw -IQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEqMCgGA1UECwwhZVBL -SSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEF -AAOCAg8AMIICCgKCAgEA4SUP7o3biDN1Z82tH306Tm2d0y8U82N0ywEhajfqhFAH -SyZbCUNsIZ5qyNUD9WBpj8zwIuQf5/dqIjG3LBXy4P4AakP/h2XGtRrBp0xtInAh -ijHyl3SJCRImHJ7K2RKilTza6We/CKBk49ZCt0Xvl/T29de1ShUCWH2YWEtgvM3X -DZoTM1PRYfl61dd4s5oz9wCGzh1NlDivqOx4UXCKXBCDUSH3ET00hl7lSM2XgYI1 -TBnsZfZrxQWh7kcT1rMhJ5QQCtkkO7q+RBNGMD+XPNjX12ruOzjjK9SXDrkb5wdJ -fzcq+Xd4z1TtW0ado4AOkUPB1ltfFLqfpo0kR0BZv3I4sjZsN/+Z0V0OWQqraffA -sgRFelQArr5T9rXn4fg8ozHSqf4hUmTFpmfwdQcGlBSBVcYn5AGPF8Fqcde+S/uU -WH1+ETOxQvdibBjWzwloPn9s9h6PYq2lY9sJpx8iQkEeb5mKPtf5P0B6ebClAZLS -nT0IFaUQAS2zMnaolQ2zepr7BxB4EW/hj8e6DyUadCrlHJhBmd8hh+iVBmoKs2pH -dmX2Os+PYhcZewoozRrSgx4hxyy/vv9haLdnG7t4TY3OZ+XkwY63I2binZB1NJip -NiuKmpS5nezMirH4JYlcWrYvjB9teSSnUmjDhDXiZo1jDiVN1Rmy5nk3pyKdVDEC -AwEAAaNqMGgwHQYDVR0OBBYEFB4M97Zn8uGSJglFwFU5Lnc/QkqiMAwGA1UdEwQF -MAMBAf8wOQYEZyoHAAQxMC8wLQIBADAJBgUrDgMCGgUAMAcGBWcqAwAABBRFsMLH -ClZ87lt4DJX5GFPBphzYEDANBgkqhkiG9w0BAQUFAAOCAgEACbODU1kBPpVJufGB -uvl2ICO1J2B01GqZNF5sAFPZn/KmsSQHRGoqxqWOeBLoR9lYGxMqXnmbnwoqZ6Yl -PwZpVnPDimZI+ymBV3QGypzqKOg4ZyYr8dW1P2WT+DZdjo2NQCCHGervJ8A9tDkP -JXtoUHRVnAxZfVo9QZQlUgjgRywVMRnVvwdVxrsStZf0X4OFunHB2WyBEXYKCrC/ -gpf36j36+uwtqSiUO1bd0lEursC9CBWMd1I0ltabrNMdjmEPNXubrjlpC2JgQCA2 -j6/7Nu4tCEoduL+bXPjqpRugc6bY+G7gMwRfaKonh+3ZwZCc7b3jajWvY9+rGNm6 -5ulK6lCKD2GTHuItGeIwlDWSXQ62B68ZgI9HkFFLLk3dheLSClIKF5r8GrBQAuUB -o2M3IUxExJtRmREOc5wGj1QupyheRDmHVi03vYVElOEMSyycw5KFNGHLD7ibSkNS -/jQ6fbjpKdx2qcgw+BRxgMYeNkh0IkFch4LoGHGLQYlE535YW6i4jRPpp2zDR+2z -Gp1iro2C6pSe3VkQw63d4k3jMdXH7OjysP6SHhYKGvzZ8/gntsm+HbRsZJB/9OTE -W9c3rkIO3aQab3yIVMUWbuF6aC74Or8NpDyJO3inTmODBCEIZ43ygknQW/2xzQ+D -hNQ+IIX3Sj0rnP0qCglN6oH4EZw= ------END CERTIFICATE----- - -# Issuer: O=certSIGN OU=certSIGN ROOT CA -# Subject: O=certSIGN OU=certSIGN ROOT CA -# Label: "certSIGN ROOT CA" -# Serial: 35210227249154 -# MD5 Fingerprint: 18:98:c0:d6:e9:3a:fc:f9:b0:f5:0c:f7:4b:01:44:17 -# SHA1 Fingerprint: fa:b7:ee:36:97:26:62:fb:2d:b0:2a:f6:bf:03:fd:e8:7c:4b:2f:9b -# SHA256 Fingerprint: ea:a9:62:c4:fa:4a:6b:af:eb:e4:15:19:6d:35:1c:cd:88:8d:4f:53:f3:fa:8a:e6:d7:c4:66:a9:4e:60:42:bb ------BEGIN CERTIFICATE----- -MIIDODCCAiCgAwIBAgIGIAYFFnACMA0GCSqGSIb3DQEBBQUAMDsxCzAJBgNVBAYT -AlJPMREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBD -QTAeFw0wNjA3MDQxNzIwMDRaFw0zMTA3MDQxNzIwMDRaMDsxCzAJBgNVBAYTAlJP -MREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBDQTCC -ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALczuX7IJUqOtdu0KBuqV5Do -0SLTZLrTk+jUrIZhQGpgV2hUhE28alQCBf/fm5oqrl0Hj0rDKH/v+yv6efHHrfAQ -UySQi2bJqIirr1qjAOm+ukbuW3N7LBeCgV5iLKECZbO9xSsAfsT8AzNXDe3i+s5d -RdY4zTW2ssHQnIFKquSyAVwdj1+ZxLGt24gh65AIgoDzMKND5pCCrlUoSe1b16kQ -OA7+j0xbm0bqQfWwCHTD0IgztnzXdN/chNFDDnU5oSVAKOp4yw4sLjmdjItuFhwv -JoIQ4uNllAoEwF73XVv4EOLQunpL+943AAAaWyjj0pxzPjKHmKHJUS/X3qwzs08C -AwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0O -BBYEFOCMm9slSbPxfIbWskKHC9BroNnkMA0GCSqGSIb3DQEBBQUAA4IBAQA+0hyJ -LjX8+HXd5n9liPRyTMks1zJO890ZeUe9jjtbkw9QSSQTaxQGcu8J06Gh40CEyecY -MnQ8SG4Pn0vU9x7Tk4ZkVJdjclDVVc/6IJMCopvDI5NOFlV2oHB5bc0hH88vLbwZ -44gx+FkagQnIl6Z0x2DEW8xXjrJ1/RsCCdtZb3KTafcxQdaIOL+Hsr0Wefmq5L6I -Jd1hJyMctTEHBDa0GpC9oHRxUIltvBTjD4au8as+x6AJzKNI0eDbZOeStc+vckNw -i/nDhDwTqn6Sm1dTk/pwwpEOMfmbZ13pljheX7NzTogVZ96edhBiIL5VaZVDADlN -9u6wWk5JRFRYX0KD ------END CERTIFICATE----- - -# Issuer: CN=NetLock Arany (Class Gold) F\u0151tan\xfas\xedtv\xe1ny O=NetLock Kft. OU=Tan\xfas\xedtv\xe1nykiad\xf3k (Certification Services) -# Subject: CN=NetLock Arany (Class Gold) F\u0151tan\xfas\xedtv\xe1ny O=NetLock Kft. OU=Tan\xfas\xedtv\xe1nykiad\xf3k (Certification Services) -# Label: "NetLock Arany (Class Gold) F\u0151tan\xfas\xedtv\xe1ny" -# Serial: 80544274841616 -# MD5 Fingerprint: c5:a1:b7:ff:73:dd:d6:d7:34:32:18:df:fc:3c:ad:88 -# SHA1 Fingerprint: 06:08:3f:59:3f:15:a1:04:a0:69:a4:6b:a9:03:d0:06:b7:97:09:91 -# SHA256 Fingerprint: 6c:61:da:c3:a2:de:f0:31:50:6b:e0:36:d2:a6:fe:40:19:94:fb:d1:3d:f9:c8:d4:66:59:92:74:c4:46:ec:98 ------BEGIN CERTIFICATE----- -MIIEFTCCAv2gAwIBAgIGSUEs5AAQMA0GCSqGSIb3DQEBCwUAMIGnMQswCQYDVQQG -EwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3 -MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNl -cnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWR -dGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUwODIxWhcNMjgxMjA2MTUwODIxWjCB -pzELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQKDAxOZXRM -b2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAoQ2VydGlm -aWNhdGlvbiBTZXJ2aWNlcykxNTAzBgNVBAMMLE5ldExvY2sgQXJhbnkgKENsYXNz -IEdvbGQpIEbFkXRhbsO6c8OtdHbDoW55MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A -MIIBCgKCAQEAxCRec75LbRTDofTjl5Bu0jBFHjzuZ9lk4BqKf8owyoPjIMHj9DrT -lF8afFttvzBPhCf2nx9JvMaZCpDyD/V/Q4Q3Y1GLeqVw/HpYzY6b7cNGbIRwXdrz -AZAj/E4wqX7hJ2Pn7WQ8oLjJM2P+FpD/sLj916jAwJRDC7bVWaaeVtAkH3B5r9s5 -VA1lddkVQZQBr17s9o3x/61k/iCa11zr/qYfCGSji3ZVrR47KGAuhyXoqq8fxmRG -ILdwfzzeSNuWU7c5d+Qa4scWhHaXWy+7GRWF+GmF9ZmnqfI0p6m2pgP8b4Y9VHx2 -BJtr+UBdADTHLpl1neWIA6pN+APSQnbAGwIDAKiLo0UwQzASBgNVHRMBAf8ECDAG -AQH/AgEEMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUzPpnk/C2uNClwB7zU/2M -U9+D15YwDQYJKoZIhvcNAQELBQADggEBAKt/7hwWqZw8UQCgwBEIBaeZ5m8BiFRh -bvG5GK1Krf6BQCOUL/t1fC8oS2IkgYIL9WHxHG64YTjrgfpioTtaYtOUZcTh5m2C -+C8lcLIhJsFyUR+MLMOEkMNaj7rP9KdlpeuY0fsFskZ1FSNqb4VjMIDw1Z4fKRzC -bLBQWV2QWzuoDTDPv31/zvGdg73JRm4gpvlhUbohL3u+pRVjodSVh/GeufOJ8z2F -uLjbvrW5KfnaNwUASZQDhETnv0Mxz3WLJdH0pmT1kvarBes96aULNmLazAZfNou2 -XjG4Kvte9nHfRCaexOYNkbQudZWAUWpLMKawYqGT8ZvYzsRjdT9ZR7E= ------END CERTIFICATE----- - -# Issuer: CN=Microsec e-Szigno Root CA 2009 O=Microsec Ltd. -# Subject: CN=Microsec e-Szigno Root CA 2009 O=Microsec Ltd. -# Label: "Microsec e-Szigno Root CA 2009" -# Serial: 14014712776195784473 -# MD5 Fingerprint: f8:49:f4:03:bc:44:2d:83:be:48:69:7d:29:64:fc:b1 -# SHA1 Fingerprint: 89:df:74:fe:5c:f4:0f:4a:80:f9:e3:37:7d:54:da:91:e1:01:31:8e -# SHA256 Fingerprint: 3c:5f:81:fe:a5:fa:b8:2c:64:bf:a2:ea:ec:af:cd:e8:e0:77:fc:86:20:a7:ca:e5:37:16:3d:f3:6e:db:f3:78 ------BEGIN CERTIFICATE----- -MIIECjCCAvKgAwIBAgIJAMJ+QwRORz8ZMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYD -VQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0 -ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0G -CSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5odTAeFw0wOTA2MTYxMTMwMThaFw0y -OTEyMzAxMTMwMThaMIGCMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3Qx -FjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3pp -Z25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5o -dTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOn4j/NjrdqG2KfgQvvP -kd6mJviZpWNwrZuuyjNAfW2WbqEORO7hE52UQlKavXWFdCyoDh2Tthi3jCyoz/tc -cbna7P7ofo/kLx2yqHWH2Leh5TvPmUpG0IMZfcChEhyVbUr02MelTTMuhTlAdX4U -fIASmFDHQWe4oIBhVKZsTh/gnQ4H6cm6M+f+wFUoLAKApxn1ntxVUwOXewdI/5n7 -N4okxFnMUBBjjqqpGrCEGob5X7uxUG6k0QrM1XF+H6cbfPVTbiJfyyvm1HxdrtbC -xkzlBQHZ7Vf8wSN5/PrIJIOV87VqUQHQd9bpEqH5GoP7ghu5sJf0dgYzQ0mg/wu1 -+rUCAwEAAaOBgDB+MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G -A1UdDgQWBBTLD8bfQkPMPcu1SCOhGnqmKrs0aDAfBgNVHSMEGDAWgBTLD8bfQkPM -Pcu1SCOhGnqmKrs0aDAbBgNVHREEFDASgRBpbmZvQGUtc3ppZ25vLmh1MA0GCSqG -SIb3DQEBCwUAA4IBAQDJ0Q5eLtXMs3w+y/w9/w0olZMEyL/azXm4Q5DwpL7v8u8h -mLzU1F0G9u5C7DBsoKqpyvGvivo/C3NqPuouQH4frlRheesuCDfXI/OMn74dseGk -ddug4lQUsbocKaQY9hK6ohQU4zE1yED/t+AFdlfBHFny+L/k7SViXITwfn4fs775 -tyERzAMBVnCnEJIeGzSBHq2cGsMEPO0CYdYeBvNfOofyK/FFh+U9rNHHV4S9a67c -2Pm2G2JwCz02yULyMtd6YebS2z3PyKnJm9zbWETXbzivf3jTo60adbocwTZ8jx5t -HMN1Rq41Bab2XD0h7lbwyYIiLXpUq3DDfSJlgnCW ------END CERTIFICATE----- - -# Issuer: CN=GlobalSign O=GlobalSign OU=GlobalSign Root CA - R3 -# Subject: CN=GlobalSign O=GlobalSign OU=GlobalSign Root CA - R3 -# Label: "GlobalSign Root CA - R3" -# Serial: 4835703278459759426209954 -# MD5 Fingerprint: c5:df:b8:49:ca:05:13:55:ee:2d:ba:1a:c3:3e:b0:28 -# SHA1 Fingerprint: d6:9b:56:11:48:f0:1c:77:c5:45:78:c1:09:26:df:5b:85:69:76:ad -# SHA256 Fingerprint: cb:b5:22:d7:b7:f1:27:ad:6a:01:13:86:5b:df:1c:d4:10:2e:7d:07:59:af:63:5a:7c:f4:72:0d:c9:63:c5:3b ------BEGIN CERTIFICATE----- -MIIDXzCCAkegAwIBAgILBAAAAAABIVhTCKIwDQYJKoZIhvcNAQELBQAwTDEgMB4G -A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNp -Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDkwMzE4MTAwMDAwWhcNMjkwMzE4 -MTAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEG -A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBAMwldpB5BngiFvXAg7aEyiie/QV2EcWtiHL8 -RgJDx7KKnQRfJMsuS+FggkbhUqsMgUdwbN1k0ev1LKMPgj0MK66X17YUhhB5uzsT -gHeMCOFJ0mpiLx9e+pZo34knlTifBtc+ycsmWQ1z3rDI6SYOgxXG71uL0gRgykmm -KPZpO/bLyCiR5Z2KYVc3rHQU3HTgOu5yLy6c+9C7v/U9AOEGM+iCK65TpjoWc4zd -QQ4gOsC0p6Hpsk+QLjJg6VfLuQSSaGjlOCZgdbKfd/+RFO+uIEn8rUAVSNECMWEZ -XriX7613t2Saer9fwRPvm2L7DWzgVGkWqQPabumDk3F2xmmFghcCAwEAAaNCMEAw -DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI/wS3+o -LkUkrk1Q+mOai97i3Ru8MA0GCSqGSIb3DQEBCwUAA4IBAQBLQNvAUKr+yAzv95ZU -RUm7lgAJQayzE4aGKAczymvmdLm6AC2upArT9fHxD4q/c2dKg8dEe3jgr25sbwMp -jjM5RcOO5LlXbKr8EpbsU8Yt5CRsuZRj+9xTaGdWPoO4zzUhw8lo/s7awlOqzJCK -6fBdRoyV3XpYKBovHd7NADdBj+1EbddTKJd+82cEHhXXipa0095MJ6RMG3NzdvQX -mcIfeg7jLQitChws/zyrVQ4PkX4268NXSb7hLi18YIvDQVETI53O9zJrlAGomecs -Mx86OyXShkDOOyyGeMlhLxS67ttVb9+E7gUJTb0o2HLO02JQZR7rkpeDMdmztcpH -WD9f ------END CERTIFICATE----- - -# Issuer: CN=Izenpe.com O=IZENPE S.A. -# Subject: CN=Izenpe.com O=IZENPE S.A. -# Label: "Izenpe.com" -# Serial: 917563065490389241595536686991402621 -# MD5 Fingerprint: a6:b0:cd:85:80:da:5c:50:34:a3:39:90:2f:55:67:73 -# SHA1 Fingerprint: 2f:78:3d:25:52:18:a7:4a:65:39:71:b5:2c:a2:9c:45:15:6f:e9:19 -# SHA256 Fingerprint: 25:30:cc:8e:98:32:15:02:ba:d9:6f:9b:1f:ba:1b:09:9e:2d:29:9e:0f:45:48:bb:91:4f:36:3b:c0:d4:53:1f ------BEGIN CERTIFICATE----- -MIIF8TCCA9mgAwIBAgIQALC3WhZIX7/hy/WL1xnmfTANBgkqhkiG9w0BAQsFADA4 -MQswCQYDVQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6 -ZW5wZS5jb20wHhcNMDcxMjEzMTMwODI4WhcNMzcxMjEzMDgyNzI1WjA4MQswCQYD -VQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6ZW5wZS5j -b20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ03rKDx6sp4boFmVq -scIbRTJxldn+EFvMr+eleQGPicPK8lVx93e+d5TzcqQsRNiekpsUOqHnJJAKClaO -xdgmlOHZSOEtPtoKct2jmRXagaKH9HtuJneJWK3W6wyyQXpzbm3benhB6QiIEn6H -LmYRY2xU+zydcsC8Lv/Ct90NduM61/e0aL6i9eOBbsFGb12N4E3GVFWJGjMxCrFX -uaOKmMPsOzTFlUFpfnXCPCDFYbpRR6AgkJOhkEvzTnyFRVSa0QUmQbC1TR0zvsQD -yCV8wXDbO/QJLVQnSKwv4cSsPsjLkkxTOTcj7NMB+eAJRE1NZMDhDVqHIrytG6P+ -JrUV86f8hBnp7KGItERphIPzidF0BqnMC9bC3ieFUCbKF7jJeodWLBoBHmy+E60Q -rLUk9TiRodZL2vG70t5HtfG8gfZZa88ZU+mNFctKy6lvROUbQc/hhqfK0GqfvEyN -BjNaooXlkDWgYlwWTvDjovoDGrQscbNYLN57C9saD+veIR8GdwYDsMnvmfzAuU8L -hij+0rnq49qlw0dpEuDb8PYZi+17cNcC1u2HGCgsBCRMd+RIihrGO5rUD8r6ddIB -QFqNeb+Lz0vPqhbBleStTIo+F5HUsWLlguWABKQDfo2/2n+iD5dPDNMN+9fR5XJ+ -HMh3/1uaD7euBUbl8agW7EekFwIDAQABo4H2MIHzMIGwBgNVHREEgagwgaWBD2lu -Zm9AaXplbnBlLmNvbaSBkTCBjjFHMEUGA1UECgw+SVpFTlBFIFMuQS4gLSBDSUYg -QTAxMzM3MjYwLVJNZXJjLlZpdG9yaWEtR2FzdGVpeiBUMTA1NSBGNjIgUzgxQzBB -BgNVBAkMOkF2ZGEgZGVsIE1lZGl0ZXJyYW5lbyBFdG9yYmlkZWEgMTQgLSAwMTAx -MCBWaXRvcmlhLUdhc3RlaXowDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC -AQYwHQYDVR0OBBYEFB0cZQ6o8iV7tJHP5LGx5r1VdGwFMA0GCSqGSIb3DQEBCwUA -A4ICAQB4pgwWSp9MiDrAyw6lFn2fuUhfGI8NYjb2zRlrrKvV9pF9rnHzP7MOeIWb -laQnIUdCSnxIOvVFfLMMjlF4rJUT3sb9fbgakEyrkgPH7UIBzg/YsfqikuFgba56 -awmqxinuaElnMIAkejEWOVt+8Rwu3WwJrfIxwYJOubv5vr8qhT/AQKM6WfxZSzwo -JNu0FXWuDYi6LnPAvViH5ULy617uHjAimcs30cQhbIHsvm0m5hzkQiCeR7Csg1lw -LDXWrzY0tM07+DKo7+N4ifuNRSzanLh+QBxh5z6ikixL8s36mLYp//Pye6kfLqCT -VyvehQP5aTfLnnhqBbTFMXiJ7HqnheG5ezzevh55hM6fcA5ZwjUukCox2eRFekGk -LhObNA5me0mrZJfQRsN5nXJQY6aYWwa9SG3YOYNw6DXwBdGqvOPbyALqfP2C2sJb -UjWumDqtujWTI6cfSN01RpiyEGjkpTHCClguGYEQyVB1/OpaFs4R1+7vUIgtYf8/ -QnMFlEPVjjxOAToZpR9GTnfQXeWBIiGH/pR9hNiTrdZoQ0iy2+tzJOeRf1SktoA+ -naM8THLCV8Sg1Mw4J87VBp6iSNnpn86CcDaTmjvfliHjWbcM2pE38P1ZWrOZyGls -QyYBNWNgVYkDOnXYukrZVP/u3oDYLdE41V4tC5h9Pmzb/CaIxw== ------END CERTIFICATE----- - -# Issuer: CN=Go Daddy Root Certificate Authority - G2 O=GoDaddy.com, Inc. -# Subject: CN=Go Daddy Root Certificate Authority - G2 O=GoDaddy.com, Inc. -# Label: "Go Daddy Root Certificate Authority - G2" -# Serial: 0 -# MD5 Fingerprint: 80:3a:bc:22:c1:e6:fb:8d:9b:3b:27:4a:32:1b:9a:01 -# SHA1 Fingerprint: 47:be:ab:c9:22:ea:e8:0e:78:78:34:62:a7:9f:45:c2:54:fd:e6:8b -# SHA256 Fingerprint: 45:14:0b:32:47:eb:9c:c8:c5:b4:f0:d7:b5:30:91:f7:32:92:08:9e:6e:5a:63:e2:74:9d:d3:ac:a9:19:8e:da ------BEGIN CERTIFICATE----- -MIIDxTCCAq2gAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMx -EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAYBgNVBAoT -EUdvRGFkZHkuY29tLCBJbmMuMTEwLwYDVQQDEyhHbyBEYWRkeSBSb290IENlcnRp -ZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIz -NTk1OVowgYMxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6b25hMRMwEQYDVQQH -EwpTY290dHNkYWxlMRowGAYDVQQKExFHb0RhZGR5LmNvbSwgSW5jLjExMC8GA1UE -AxMoR28gRGFkZHkgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIw -DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL9xYgjx+lk09xvJGKP3gElY6SKD -E6bFIEMBO4Tx5oVJnyfq9oQbTqC023CYxzIBsQU+B07u9PpPL1kwIuerGVZr4oAH -/PMWdYA5UXvl+TW2dE6pjYIT5LY/qQOD+qK+ihVqf94Lw7YZFAXK6sOoBJQ7Rnwy -DfMAZiLIjWltNowRGLfTshxgtDj6AozO091GB94KPutdfMh8+7ArU6SSYmlRJQVh -GkSBjCypQ5Yj36w6gZoOKcUcqeldHraenjAKOc7xiID7S13MMuyFYkMlNAJWJwGR -tDtwKj9useiciAF9n9T521NtYJ2/LOdYq7hfRvzOxBsDPAnrSTFcaUaz4EcCAwEA -AaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE -FDqahQcQZyi27/a9BUFuIMGU2g/eMA0GCSqGSIb3DQEBCwUAA4IBAQCZ21151fmX -WWcDYfF+OwYxdS2hII5PZYe096acvNjpL9DbWu7PdIxztDhC2gV7+AJ1uP2lsdeu -9tfeE8tTEH6KRtGX+rcuKxGrkLAngPnon1rpN5+r5N9ss4UXnT3ZJE95kTXWXwTr -gIOrmgIttRD02JDHBHNA7XIloKmf7J6raBKZV8aPEjoJpL1E/QYVN8Gb5DKj7Tjo -2GTzLH4U/ALqn83/B2gX2yKQOC16jdFU8WnjXzPKej17CuPKf1855eJ1usV2GDPO -LPAvTK33sefOT6jEm0pUBsV/fdUID+Ic/n4XuKxe9tQWskMJDE32p2u0mYRlynqI -4uJEvlz36hz1 ------END CERTIFICATE----- - -# Issuer: CN=Starfield Root Certificate Authority - G2 O=Starfield Technologies, Inc. -# Subject: CN=Starfield Root Certificate Authority - G2 O=Starfield Technologies, Inc. -# Label: "Starfield Root Certificate Authority - G2" -# Serial: 0 -# MD5 Fingerprint: d6:39:81:c6:52:7e:96:69:fc:fc:ca:66:ed:05:f2:96 -# SHA1 Fingerprint: b5:1c:06:7c:ee:2b:0c:3d:f8:55:ab:2d:92:f4:fe:39:d4:e7:0f:0e -# SHA256 Fingerprint: 2c:e1:cb:0b:f9:d2:f9:e1:02:99:3f:be:21:51:52:c3:b2:dd:0c:ab:de:1c:68:e5:31:9b:83:91:54:db:b7:f5 ------BEGIN CERTIFICATE----- -MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMx -EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT -HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAMTKVN0YXJmaWVs -ZCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAw -MFoXDTM3MTIzMTIzNTk1OVowgY8xCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6 -b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFyZmllbGQgVGVj -aG5vbG9naWVzLCBJbmMuMTIwMAYDVQQDEylTdGFyZmllbGQgUm9vdCBDZXJ0aWZp -Y2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC -ggEBAL3twQP89o/8ArFvW59I2Z154qK3A2FWGMNHttfKPTUuiUP3oWmb3ooa/RMg -nLRJdzIpVv257IzdIvpy3Cdhl+72WoTsbhm5iSzchFvVdPtrX8WJpRBSiUZV9Lh1 -HOZ/5FSuS/hVclcCGfgXcVnrHigHdMWdSL5stPSksPNkN3mSwOxGXn/hbVNMYq/N -Hwtjuzqd+/x5AJhhdM8mgkBj87JyahkNmcrUDnXMN/uLicFZ8WJ/X7NfZTD4p7dN -dloedl40wOiWVpmKs/B/pM293DIxfJHP4F8R+GuqSVzRmZTRouNjWwl2tVZi4Ut0 -HZbUJtQIBFnQmA4O5t78w+wfkPECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAO -BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFHwMMh+n2TB/xH1oo2Kooc6rB1snMA0G -CSqGSIb3DQEBCwUAA4IBAQARWfolTwNvlJk7mh+ChTnUdgWUXuEok21iXQnCoKjU -sHU48TRqneSfioYmUeYs0cYtbpUgSpIB7LiKZ3sx4mcujJUDJi5DnUox9g61DLu3 -4jd/IroAow57UvtruzvE03lRTs2Q9GcHGcg8RnoNAX3FWOdt5oUwF5okxBDgBPfg -8n/Uqgr/Qh037ZTlZFkSIHc40zI+OIF1lnP6aI+xy84fxez6nH7PfrHxBy22/L/K -pL/QlwVKvOoYKAKQvVR4CSFx09F9HdkWsKlhPdAKACL8x3vLCWRFCztAgfd9fDL1 -mMpYjn0q7pBZc2T5NnReJaH1ZgUufzkVqSr7UIuOhWn0 ------END CERTIFICATE----- - -# Issuer: CN=Starfield Services Root Certificate Authority - G2 O=Starfield Technologies, Inc. -# Subject: CN=Starfield Services Root Certificate Authority - G2 O=Starfield Technologies, Inc. -# Label: "Starfield Services Root Certificate Authority - G2" -# Serial: 0 -# MD5 Fingerprint: 17:35:74:af:7b:61:1c:eb:f4:f9:3c:e2:ee:40:f9:a2 -# SHA1 Fingerprint: 92:5a:8f:8d:2c:6d:04:e0:66:5f:59:6a:ff:22:d8:63:e8:25:6f:3f -# SHA256 Fingerprint: 56:8d:69:05:a2:c8:87:08:a4:b3:02:51:90:ed:cf:ed:b1:97:4a:60:6a:13:c6:e5:29:0f:cb:2a:e6:3e:da:b5 ------BEGIN CERTIFICATE----- -MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMx -EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT -HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVs -ZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5 -MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNVBAYTAlVTMRAwDgYD -VQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFy -ZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2Vy -dmljZXMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20p -OsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm2 -8xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4PahHQUw2eeBGg6345AWh1K -Ts9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLPLJGmpufe -hRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk -6mFBrMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAw -DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q -AdcwKziIorhtSpzyEZGDMA0GCSqGSIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMI -bw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPPE95Dz+I0swSdHynVv/heyNXB -ve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTyxQGjhdByPq1z -qwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd -iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn -0q23KXB56jzaYyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCN -sSi6 ------END CERTIFICATE----- - -# Issuer: CN=AffirmTrust Commercial O=AffirmTrust -# Subject: CN=AffirmTrust Commercial O=AffirmTrust -# Label: "AffirmTrust Commercial" -# Serial: 8608355977964138876 -# MD5 Fingerprint: 82:92:ba:5b:ef:cd:8a:6f:a6:3d:55:f9:84:f6:d6:b7 -# SHA1 Fingerprint: f9:b5:b6:32:45:5f:9c:be:ec:57:5f:80:dc:e9:6e:2c:c7:b2:78:b7 -# SHA256 Fingerprint: 03:76:ab:1d:54:c5:f9:80:3c:e4:b2:e2:01:a0:ee:7e:ef:7b:57:b6:36:e8:a9:3c:9b:8d:48:60:c9:6f:5f:a7 ------BEGIN CERTIFICATE----- -MIIDTDCCAjSgAwIBAgIId3cGJyapsXwwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UE -BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz -dCBDb21tZXJjaWFsMB4XDTEwMDEyOTE0MDYwNloXDTMwMTIzMTE0MDYwNlowRDEL -MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp -cm1UcnVzdCBDb21tZXJjaWFsMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC -AQEA9htPZwcroRX1BiLLHwGy43NFBkRJLLtJJRTWzsO3qyxPxkEylFf6EqdbDuKP -Hx6GGaeqtS25Xw2Kwq+FNXkyLbscYjfysVtKPcrNcV/pQr6U6Mje+SJIZMblq8Yr -ba0F8PrVC8+a5fBQpIs7R6UjW3p6+DM/uO+Zl+MgwdYoic+U+7lF7eNAFxHUdPAL -MeIrJmqbTFeurCA+ukV6BfO9m2kVrn1OIGPENXY6BwLJN/3HR+7o8XYdcxXyl6S1 -yHp52UKqK39c/s4mT6NmgTWvRLpUHhwwMmWd5jyTXlBOeuM61G7MGvv50jeuJCqr -VwMiKA1JdX+3KNp1v47j3A55MQIDAQABo0IwQDAdBgNVHQ4EFgQUnZPGU4teyq8/ -nx4P5ZmVvCT2lI8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ -KoZIhvcNAQELBQADggEBAFis9AQOzcAN/wr91LoWXym9e2iZWEnStB03TX8nfUYG -XUPGhi4+c7ImfU+TqbbEKpqrIZcUsd6M06uJFdhrJNTxFq7YpFzUf1GO7RgBsZNj -vbz4YYCanrHOQnDiqX0GJX0nof5v7LMeJNrjS1UaADs1tDvZ110w/YETifLCBivt -Z8SOyUOyXGsViQK8YvxO8rUzqrJv0wqiUOP2O+guRMLbZjipM1ZI8W0bM40NjD9g -N53Tym1+NH4Nn3J2ixufcv1SNUFFApYvHLKac0khsUlHRUe072o0EclNmsxZt9YC -nlpOZbWUrhvfKbAW8b8Angc6F2S1BLUjIZkKlTuXfO8= ------END CERTIFICATE----- - -# Issuer: CN=AffirmTrust Networking O=AffirmTrust -# Subject: CN=AffirmTrust Networking O=AffirmTrust -# Label: "AffirmTrust Networking" -# Serial: 8957382827206547757 -# MD5 Fingerprint: 42:65:ca:be:01:9a:9a:4c:a9:8c:41:49:cd:c0:d5:7f -# SHA1 Fingerprint: 29:36:21:02:8b:20:ed:02:f5:66:c5:32:d1:d6:ed:90:9f:45:00:2f -# SHA256 Fingerprint: 0a:81:ec:5a:92:97:77:f1:45:90:4a:f3:8d:5d:50:9f:66:b5:e2:c5:8f:cd:b5:31:05:8b:0e:17:f3:f0:b4:1b ------BEGIN CERTIFICATE----- -MIIDTDCCAjSgAwIBAgIIfE8EORzUmS0wDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UE -BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz -dCBOZXR3b3JraW5nMB4XDTEwMDEyOTE0MDgyNFoXDTMwMTIzMTE0MDgyNFowRDEL -MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp -cm1UcnVzdCBOZXR3b3JraW5nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC -AQEAtITMMxcua5Rsa2FSoOujz3mUTOWUgJnLVWREZY9nZOIG41w3SfYvm4SEHi3y -YJ0wTsyEheIszx6e/jarM3c1RNg1lho9Nuh6DtjVR6FqaYvZ/Ls6rnla1fTWcbua -kCNrmreIdIcMHl+5ni36q1Mr3Lt2PpNMCAiMHqIjHNRqrSK6mQEubWXLviRmVSRL -QESxG9fhwoXA3hA/Pe24/PHxI1Pcv2WXb9n5QHGNfb2V1M6+oF4nI979ptAmDgAp -6zxG8D1gvz9Q0twmQVGeFDdCBKNwV6gbh+0t+nvujArjqWaJGctB+d1ENmHP4ndG -yH329JKBNv3bNPFyfvMMFr20FQIDAQABo0IwQDAdBgNVHQ4EFgQUBx/S55zawm6i -QLSwelAQUHTEyL0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ -KoZIhvcNAQEFBQADggEBAIlXshZ6qML91tmbmzTCnLQyFE2npN/svqe++EPbkTfO -tDIuUFUaNU52Q3Eg75N3ThVwLofDwR1t3Mu1J9QsVtFSUzpE0nPIxBsFZVpikpzu -QY0x2+c06lkh1QF612S4ZDnNye2v7UsDSKegmQGA3GWjNq5lWUhPgkvIZfFXHeVZ -Lgo/bNjR9eUJtGxUAArgFU2HdW23WJZa3W3SAKD0m0i+wzekujbgfIeFlxoVot4u -olu9rxj5kFDNcFn4J2dHy8egBzp90SxdbBk6ZrV9/ZFvgrG+CJPbFEfxojfHRZ48 -x3evZKiT3/Zpg4Jg8klCNO1aAFSFHBY2kgxc+qatv9s= ------END CERTIFICATE----- - -# Issuer: CN=AffirmTrust Premium O=AffirmTrust -# Subject: CN=AffirmTrust Premium O=AffirmTrust -# Label: "AffirmTrust Premium" -# Serial: 7893706540734352110 -# MD5 Fingerprint: c4:5d:0e:48:b6:ac:28:30:4e:0a:bc:f9:38:16:87:57 -# SHA1 Fingerprint: d8:a6:33:2c:e0:03:6f:b1:85:f6:63:4f:7d:6a:06:65:26:32:28:27 -# SHA256 Fingerprint: 70:a7:3f:7f:37:6b:60:07:42:48:90:45:34:b1:14:82:d5:bf:0e:69:8e:cc:49:8d:f5:25:77:eb:f2:e9:3b:9a ------BEGIN CERTIFICATE----- -MIIFRjCCAy6gAwIBAgIIbYwURrGmCu4wDQYJKoZIhvcNAQEMBQAwQTELMAkGA1UE -BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVz -dCBQcmVtaXVtMB4XDTEwMDEyOTE0MTAzNloXDTQwMTIzMTE0MTAzNlowQTELMAkG -A1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1U -cnVzdCBQcmVtaXVtMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxBLf -qV/+Qd3d9Z+K4/as4Tx4mrzY8H96oDMq3I0gW64tb+eT2TZwamjPjlGjhVtnBKAQ -JG9dKILBl1fYSCkTtuG+kU3fhQxTGJoeJKJPj/CihQvL9Cl/0qRY7iZNyaqoe5rZ -+jjeRFcV5fiMyNlI4g0WJx0eyIOFJbe6qlVBzAMiSy2RjYvmia9mx+n/K+k8rNrS -s8PhaJyJ+HoAVt70VZVs+7pk3WKL3wt3MutizCaam7uqYoNMtAZ6MMgpv+0GTZe5 -HMQxK9VfvFMSF5yZVylmd2EhMQcuJUmdGPLu8ytxjLW6OQdJd/zvLpKQBY0tL3d7 -70O/Nbua2Plzpyzy0FfuKE4mX4+QaAkvuPjcBukumj5Rp9EixAqnOEhss/n/fauG -V+O61oV4d7pD6kh/9ti+I20ev9E2bFhc8e6kGVQa9QPSdubhjL08s9NIS+LI+H+S -qHZGnEJlPqQewQcDWkYtuJfzt9WyVSHvutxMAJf7FJUnM7/oQ0dG0giZFmA7mn7S -5u046uwBHjxIVkkJx0w3AJ6IDsBz4W9m6XJHMD4Q5QsDyZpCAGzFlH5hxIrff4Ia -C1nEWTJ3s7xgaVY5/bQGeyzWZDbZvUjthB9+pSKPKrhC9IK31FOQeE4tGv2Bb0TX -OwF0lkLgAOIua+rF7nKsu7/+6qqo+Nz2snmKtmcCAwEAAaNCMEAwHQYDVR0OBBYE -FJ3AZ6YMItkm9UWrpmVSESfYRaxjMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ -BAQDAgEGMA0GCSqGSIb3DQEBDAUAA4ICAQCzV00QYk465KzquByvMiPIs0laUZx2 -KI15qldGF9X1Uva3ROgIRL8YhNILgM3FEv0AVQVhh0HctSSePMTYyPtwni94loMg -Nt58D2kTiKV1NpgIpsbfrM7jWNa3Pt668+s0QNiigfV4Py/VpfzZotReBA4Xrf5B -8OWycvpEgjNC6C1Y91aMYj+6QrCcDFx+LmUmXFNPALJ4fqENmS2NuB2OosSw/WDQ -MKSOyARiqcTtNd56l+0OOF6SL5Nwpamcb6d9Ex1+xghIsV5n61EIJenmJWtSKZGc -0jlzCFfemQa0W50QBuHCAKi4HEoCChTQwUHK+4w1IX2COPKpVJEZNZOUbWo6xbLQ -u4mGk+ibyQ86p3q4ofB4Rvr8Ny/lioTz3/4E2aFooC8k4gmVBtWVyuEklut89pMF -u+1z6S3RdTnX5yTb2E5fQ4+e0BQ5v1VwSJlXMbSc7kqYA5YwH2AG7hsj/oFgIxpH -YoWlzBk0gG+zrBrjn/B7SK3VAdlntqlyk+otZrWyuOQ9PLLvTIzq6we/qzWaVYa8 -GKa1qF60g2xraUDTn9zxw2lrueFtCfTxqlB2Cnp9ehehVZZCmTEJ3WARjQUwfuaO -RtGdFNrHF+QFlozEJLUbzxQHskD4o55BhrwE0GuWyCqANP2/7waj3VjFhT0+j/6e -KeC2uAloGRwYQw== ------END CERTIFICATE----- - -# Issuer: CN=AffirmTrust Premium ECC O=AffirmTrust -# Subject: CN=AffirmTrust Premium ECC O=AffirmTrust -# Label: "AffirmTrust Premium ECC" -# Serial: 8401224907861490260 -# MD5 Fingerprint: 64:b0:09:55:cf:b1:d5:99:e2:be:13:ab:a6:5d:ea:4d -# SHA1 Fingerprint: b8:23:6b:00:2f:1d:16:86:53:01:55:6c:11:a4:37:ca:eb:ff:c3:bb -# SHA256 Fingerprint: bd:71:fd:f6:da:97:e4:cf:62:d1:64:7a:dd:25:81:b0:7d:79:ad:f8:39:7e:b4:ec:ba:9c:5e:84:88:82:14:23 ------BEGIN CERTIFICATE----- -MIIB/jCCAYWgAwIBAgIIdJclisc/elQwCgYIKoZIzj0EAwMwRTELMAkGA1UEBhMC -VVMxFDASBgNVBAoMC0FmZmlybVRydXN0MSAwHgYDVQQDDBdBZmZpcm1UcnVzdCBQ -cmVtaXVtIEVDQzAeFw0xMDAxMjkxNDIwMjRaFw00MDEyMzExNDIwMjRaMEUxCzAJ -BgNVBAYTAlVTMRQwEgYDVQQKDAtBZmZpcm1UcnVzdDEgMB4GA1UEAwwXQWZmaXJt -VHJ1c3QgUHJlbWl1bSBFQ0MwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNMF4bFZ0D -0KF5Nbc6PJJ6yhUczWLznCZcBz3lVPqj1swS6vQUX+iOGasvLkjmrBhDeKzQN8O9 -ss0s5kfiGuZjuD0uL3jET9v0D6RoTFVya5UdThhClXjMNzyR4ptlKymjQjBAMB0G -A1UdDgQWBBSaryl6wBE1NSZRMADDav5A1a7WPDAPBgNVHRMBAf8EBTADAQH/MA4G -A1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNnADBkAjAXCfOHiFBar8jAQr9HX/Vs -aobgxCd05DhT1wV/GzTjxi+zygk8N53X57hG8f2h4nECMEJZh0PUUd+60wkyWs6I -flc9nF9Ca/UHLbXwgpP5WW+uZPpY5Yse42O+tYHNbwKMeQ== ------END CERTIFICATE----- - -# Issuer: CN=Certum Trusted Network CA O=Unizeto Technologies S.A. OU=Certum Certification Authority -# Subject: CN=Certum Trusted Network CA O=Unizeto Technologies S.A. OU=Certum Certification Authority -# Label: "Certum Trusted Network CA" -# Serial: 279744 -# MD5 Fingerprint: d5:e9:81:40:c5:18:69:fc:46:2c:89:75:62:0f:aa:78 -# SHA1 Fingerprint: 07:e0:32:e0:20:b7:2c:3f:19:2f:06:28:a2:59:3a:19:a7:0f:06:9e -# SHA256 Fingerprint: 5c:58:46:8d:55:f5:8e:49:7e:74:39:82:d2:b5:00:10:b6:d1:65:37:4a:cf:83:a7:d4:a3:2d:b7:68:c4:40:8e ------BEGIN CERTIFICATE----- -MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBM -MSIwIAYDVQQKExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5D -ZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBU -cnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIyMTIwNzM3WhcNMjkxMjMxMTIwNzM3 -WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMg -Uy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSIw -IAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0B -AQEFAAOCAQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rH -UV+rpDKmYYe2bg+G0jACl/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LM -TXPb865Px1bVWqeWifrzq2jUI4ZZJ88JJ7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVU -BBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4fOQtf/WsX+sWn7Et0brM -kUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0cvW0QM8x -AcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNV -HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNV -HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15y -sHhE49wcrwn9I0j6vSrEuVUEtRCjjSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfL -I9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1mS1FhIrlQgnXdAIv94nYmem8 -J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5ajZt3hrvJBW8qY -VoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI -03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyw= ------END CERTIFICATE----- - -# Issuer: CN=TWCA Root Certification Authority O=TAIWAN-CA OU=Root CA -# Subject: CN=TWCA Root Certification Authority O=TAIWAN-CA OU=Root CA -# Label: "TWCA Root Certification Authority" -# Serial: 1 -# MD5 Fingerprint: aa:08:8f:f6:f9:7b:b7:f2:b1:a7:1e:9b:ea:ea:bd:79 -# SHA1 Fingerprint: cf:9e:87:6d:d3:eb:fc:42:26:97:a3:b5:a3:7a:a0:76:a9:06:23:48 -# SHA256 Fingerprint: bf:d8:8f:e1:10:1c:41:ae:3e:80:1b:f8:be:56:35:0e:e9:ba:d1:a6:b9:bd:51:5e:dc:5c:6d:5b:87:11:ac:44 ------BEGIN CERTIFICATE----- -MIIDezCCAmOgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMQswCQYDVQQGEwJUVzES -MBAGA1UECgwJVEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFU -V0NBIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwODI4MDcyNDMz -WhcNMzAxMjMxMTU1OTU5WjBfMQswCQYDVQQGEwJUVzESMBAGA1UECgwJVEFJV0FO -LUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NBIFJvb3QgQ2VydGlm -aWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -AQCwfnK4pAOU5qfeCTiRShFAh6d8WWQUe7UREN3+v9XAu1bihSX0NXIP+FPQQeFE -AcK0HMMxQhZHhTMidrIKbw/lJVBPhYa+v5guEGcevhEFhgWQxFnQfHgQsIBct+HH -K3XLfJ+utdGdIzdjp9xCoi2SBBtQwXu4PhvJVgSLL1KbralW6cH/ralYhzC2gfeX -RfwZVzsrb+RH9JlF/h3x+JejiB03HFyP4HYlmlD4oFT/RJB2I9IyxsOrBr/8+7/z -rX2SYgJbKdM1o5OaQ2RgXbL6Mv87BK9NQGr5x+PvI/1ry+UPizgN7gr8/g+YnzAx -3WxSZfmLgb4i4RxYA7qRG4kHAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV -HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqOFsmjd6LWvJPelSDGRjjCDWmujANBgkq -hkiG9w0BAQUFAAOCAQEAPNV3PdrfibqHDAhUaiBQkr6wQT25JmSDCi/oQMCXKCeC -MErJk/9q56YAf4lCmtYR5VPOL8zy2gXE/uJQxDqGfczafhAJO5I1KlOy/usrBdls -XebQ79NqZp4VKIV66IIArB6nCWlWQtNoURi+VJq/REG6Sb4gumlc7rh3zc5sH62D -lhh9DrUUOYTxKOkto557HnpyWoOzeW/vtPzQCqVYT0bf+215WfKEIlKuD8z7fDvn -aspHYcN6+NOSBB+4IIThNlQWx0DeO4pz3N/GCUzf7Nr/1FNCocnyYh0igzyXxfkZ -YiesZSLX0zzG5Y6yU8xJzrww/nsOM5D77dIUkR8Hrw== ------END CERTIFICATE----- - -# Issuer: O=SECOM Trust Systems CO.,LTD. OU=Security Communication RootCA2 -# Subject: O=SECOM Trust Systems CO.,LTD. OU=Security Communication RootCA2 -# Label: "Security Communication RootCA2" -# Serial: 0 -# MD5 Fingerprint: 6c:39:7d:a4:0e:55:59:b2:3f:d6:41:b1:12:50:de:43 -# SHA1 Fingerprint: 5f:3b:8c:f2:f8:10:b3:7d:78:b4:ce:ec:19:19:c3:73:34:b9:c7:74 -# SHA256 Fingerprint: 51:3b:2c:ec:b8:10:d4:cd:e5:dd:85:39:1a:df:c6:c2:dd:60:d8:7b:b7:36:d2:b5:21:48:4a:a4:7a:0e:be:f6 ------BEGIN CERTIFICATE----- -MIIDdzCCAl+gAwIBAgIBADANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJKUDEl -MCMGA1UEChMcU0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UECxMe -U2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBSb290Q0EyMB4XDTA5MDUyOTA1MDAzOVoX -DTI5MDUyOTA1MDAzOVowXTELMAkGA1UEBhMCSlAxJTAjBgNVBAoTHFNFQ09NIFRy -dXN0IFN5c3RlbXMgQ08uLExURC4xJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmlj -YXRpb24gUm9vdENBMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANAV -OVKxUrO6xVmCxF1SrjpDZYBLx/KWvNs2l9amZIyoXvDjChz335c9S672XewhtUGr -zbl+dp+++T42NKA7wfYxEUV0kz1XgMX5iZnK5atq1LXaQZAQwdbWQonCv/Q4EpVM -VAX3NuRFg3sUZdbcDE3R3n4MqzvEFb46VqZab3ZpUql6ucjrappdUtAtCms1FgkQ -hNBqyjoGADdH5H5XTz+L62e4iKrFvlNVspHEfbmwhRkGeC7bYRr6hfVKkaHnFtWO -ojnflLhwHyg/i/xAXmODPIMqGplrz95Zajv8bxbXH/1KEOtOghY6rCcMU/Gt1SSw -awNQwS08Ft1ENCcadfsCAwEAAaNCMEAwHQYDVR0OBBYEFAqFqXdlBZh8QIH4D5cs -OPEK7DzPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3 -DQEBCwUAA4IBAQBMOqNErLlFsceTfsgLCkLfZOoc7llsCLqJX2rKSpWeeo8HxdpF -coJxDjrSzG+ntKEju/Ykn8sX/oymzsLS28yN/HH8AynBbF0zX2S2ZTuJbxh2ePXc -okgfGT+Ok+vx+hfuzU7jBBJV1uXk3fs+BXziHV7Gp7yXT2g69ekuCkO2r1dcYmh8 -t/2jioSgrGK+KwmHNPBqAbubKVY8/gA3zyNs8U6qtnRGEmyR7jTV7JqR50S+kDFy -1UkC9gLl9B/rfNmWVan/7Ir5mUf/NVoCqgTLiluHcSmRvaS0eg29mvVXIwAHIRc/ -SjnRBUkLp7Y3gaVdjKozXoEofKd9J+sAro03 ------END CERTIFICATE----- - -# Issuer: CN=Actalis Authentication Root CA O=Actalis S.p.A./03358520967 -# Subject: CN=Actalis Authentication Root CA O=Actalis S.p.A./03358520967 -# Label: "Actalis Authentication Root CA" -# Serial: 6271844772424770508 -# MD5 Fingerprint: 69:c1:0d:4f:07:a3:1b:c3:fe:56:3d:04:bc:11:f6:a6 -# SHA1 Fingerprint: f3:73:b3:87:06:5a:28:84:8a:f2:f3:4a:ce:19:2b:dd:c7:8e:9c:ac -# SHA256 Fingerprint: 55:92:60:84:ec:96:3a:64:b9:6e:2a:be:01:ce:0b:a8:6a:64:fb:fe:bc:c7:aa:b5:af:c1:55:b3:7f:d7:60:66 ------BEGIN CERTIFICATE----- -MIIFuzCCA6OgAwIBAgIIVwoRl0LE48wwDQYJKoZIhvcNAQELBQAwazELMAkGA1UE -BhMCSVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8w -MzM1ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290 -IENBMB4XDTExMDkyMjExMjIwMloXDTMwMDkyMjExMjIwMlowazELMAkGA1UEBhMC -SVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1 -ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290IENB -MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp8bEpSmkLO/lGMWwUKNv -UTufClrJwkg4CsIcoBh/kbWHuUA/3R1oHwiD1S0eiKD4j1aPbZkCkpAW1V8IbInX -4ay8IMKx4INRimlNAJZaby/ARH6jDuSRzVju3PvHHkVH3Se5CAGfpiEd9UEtL0z9 -KK3giq0itFZljoZUj5NDKd45RnijMCO6zfB9E1fAXdKDa0hMxKufgFpbOr3JpyI/ -gCczWw63igxdBzcIy2zSekciRDXFzMwujt0q7bd9Zg1fYVEiVRvjRuPjPdA1Yprb -rxTIW6HMiRvhMCb8oJsfgadHHwTrozmSBp+Z07/T6k9QnBn+locePGX2oxgkg4YQ -51Q+qDp2JE+BIcXjDwL4k5RHILv+1A7TaLndxHqEguNTVHnd25zS8gebLra8Pu2F -be8lEfKXGkJh90qX6IuxEAf6ZYGyojnP9zz/GPvG8VqLWeICrHuS0E4UT1lF9gxe -KF+w6D9Fz8+vm2/7hNN3WpVvrJSEnu68wEqPSpP4RCHiMUVhUE4Q2OM1fEwZtN4F -v6MGn8i1zeQf1xcGDXqVdFUNaBr8EBtiZJ1t4JWgw5QHVw0U5r0F+7if5t+L4sbn -fpb2U8WANFAoWPASUHEXMLrmeGO89LKtmyuy/uE5jF66CyCU3nuDuP/jVo23Eek7 -jPKxwV2dpAtMK9myGPW1n0sCAwEAAaNjMGEwHQYDVR0OBBYEFFLYiDrIn3hm7Ynz -ezhwlMkCAjbQMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUUtiIOsifeGbt -ifN7OHCUyQICNtAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAL -e3KHwGCmSUyIWOYdiPcUZEim2FgKDk8TNd81HdTtBjHIgT5q1d07GjLukD0R0i70 -jsNjLiNmsGe+b7bAEzlgqqI0JZN1Ut6nna0Oh4lScWoWPBkdg/iaKWW+9D+a2fDz -WochcYBNy+A4mz+7+uAwTc+G02UQGRjRlwKxK3JCaKygvU5a2hi/a5iB0P2avl4V -SM0RFbnAKVy06Ij3Pjaut2L9HmLecHgQHEhb2rykOLpn7VU+Xlff1ANATIGk0k9j -pwlCCRT8AKnCgHNPLsBA2RF7SOp6AsDT6ygBJlh0wcBzIm2Tlf05fbsq4/aC4yyX -X04fkZT6/iyj2HYauE2yOE+b+h1IYHkm4vP9qdCa6HCPSXrW5b0KDtst842/6+Ok -fcvHlXHo2qN8xcL4dJIEG4aspCJTQLas/kx2z/uUMsA1n3Y/buWQbqCmJqK4LL7R -K4X9p2jIugErsWx0Hbhzlefut8cl8ABMALJ+tguLHPPAUJ4lueAI3jZm/zel0btU -ZCzJJ7VLkn5l/9Mt4blOvH+kQSGQQXemOR/qnuOf0GZvBeyqdn6/axag67XH/JJU -LysRJyU3eExRarDzzFhdFPFqSBX/wge2sY0PjlxQRrM9vwGYT7JZVEc+NHt4bVaT -LnPqZih4zR0Uv6CPLy64Lo7yFIrM6bV8+2ydDKXhlg== ------END CERTIFICATE----- - -# Issuer: CN=Buypass Class 2 Root CA O=Buypass AS-983163327 -# Subject: CN=Buypass Class 2 Root CA O=Buypass AS-983163327 -# Label: "Buypass Class 2 Root CA" -# Serial: 2 -# MD5 Fingerprint: 46:a7:d2:fe:45:fb:64:5a:a8:59:90:9b:78:44:9b:29 -# SHA1 Fingerprint: 49:0a:75:74:de:87:0a:47:fe:58:ee:f6:c7:6b:eb:c6:0b:12:40:99 -# SHA256 Fingerprint: 9a:11:40:25:19:7c:5b:b9:5d:94:e6:3d:55:cd:43:79:08:47:b6:46:b2:3c:df:11:ad:a4:a0:0e:ff:15:fb:48 ------BEGIN CERTIFICATE----- -MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd -MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg -Q2xhc3MgMiBSb290IENBMB4XDTEwMTAyNjA4MzgwM1oXDTQwMTAyNjA4MzgwM1ow -TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw -HgYDVQQDDBdCdXlwYXNzIENsYXNzIDIgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB -BQADggIPADCCAgoCggIBANfHXvfBB9R3+0Mh9PT1aeTuMgHbo4Yf5FkNuud1g1Lr -6hxhFUi7HQfKjK6w3Jad6sNgkoaCKHOcVgb/S2TwDCo3SbXlzwx87vFKu3MwZfPV -L4O2fuPn9Z6rYPnT8Z2SdIrkHJasW4DptfQxh6NR/Md+oW+OU3fUl8FVM5I+GC91 -1K2GScuVr1QGbNgGE41b/+EmGVnAJLqBcXmQRFBoJJRfuLMR8SlBYaNByyM21cHx -MlAQTn/0hpPshNOOvEu/XAFOBz3cFIqUCqTqc/sLUegTBxj6DvEr0VQVfTzh97QZ -QmdiXnfgolXsttlpF9U6r0TtSsWe5HonfOV116rLJeffawrbD02TTqigzXsu8lkB -arcNuAeBfos4GzjmCleZPe4h6KP1DBbdi+w0jpwqHAAVF41og9JwnxgIzRFo1clr -Us3ERo/ctfPYV3Me6ZQ5BL/T3jjetFPsaRyifsSP5BtwrfKi+fv3FmRmaZ9JUaLi -FRhnBkp/1Wy1TbMz4GHrXb7pmA8y1x1LPC5aAVKRCfLf6o3YBkBjqhHk/sM3nhRS -P/TizPJhk9H9Z2vXUq6/aKtAQ6BXNVN48FP4YUIHZMbXb5tMOA1jrGKvNouicwoN -9SG9dKpN6nIDSdvHXx1iY8f93ZHsM+71bbRuMGjeyNYmsHVee7QHIJihdjK4TWxP -AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMmAd+BikoL1Rpzz -uvdMw964o605MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAU18h -9bqwOlI5LJKwbADJ784g7wbylp7ppHR/ehb8t/W2+xUbP6umwHJdELFx7rxP462s -A20ucS6vxOOto70MEae0/0qyexAQH6dXQbLArvQsWdZHEIjzIVEpMMpghq9Gqx3t -OluwlN5E40EIosHsHdb9T7bWR9AUC8rmyrV7d35BH16Dx7aMOZawP5aBQW9gkOLo -+fsicdl9sz1Gv7SEr5AcD48Saq/v7h56rgJKihcrdv6sVIkkLE8/trKnToyokZf7 -KcZ7XC25y2a2t6hbElGFtQl+Ynhw/qlqYLYdDnkM/crqJIByw5c/8nerQyIKx+u2 -DISCLIBrQYoIwOula9+ZEsuK1V6ADJHgJgg2SMX6OBE1/yWDLfJ6v9r9jv6ly0Us -H8SIU653DtmadsWOLB2jutXsMq7Aqqz30XpN69QH4kj3Io6wpJ9qzo6ysmD0oyLQ -I+uUWnpp3Q+/QFesa1lQ2aOZ4W7+jQF5JyMV3pKdewlNWudLSDBaGOYKbeaP4NK7 -5t98biGCwWg5TbSYWGZizEqQXsP6JwSxeRV0mcy+rSDeJmAc61ZRpqPq5KM/p/9h -3PFaTWwyI0PurKju7koSCTxdccK+efrCh2gdC/1cacwG0Jp9VJkqyTkaGa9LKkPz -Y11aWOIv4x3kqdbQCtCev9eBCfHJxyYNrJgWVqA= ------END CERTIFICATE----- - -# Issuer: CN=Buypass Class 3 Root CA O=Buypass AS-983163327 -# Subject: CN=Buypass Class 3 Root CA O=Buypass AS-983163327 -# Label: "Buypass Class 3 Root CA" -# Serial: 2 -# MD5 Fingerprint: 3d:3b:18:9e:2c:64:5a:e8:d5:88:ce:0e:f9:37:c2:ec -# SHA1 Fingerprint: da:fa:f7:fa:66:84:ec:06:8f:14:50:bd:c7:c2:81:a5:bc:a9:64:57 -# SHA256 Fingerprint: ed:f7:eb:bc:a2:7a:2a:38:4d:38:7b:7d:40:10:c6:66:e2:ed:b4:84:3e:4c:29:b4:ae:1d:5b:93:32:e6:b2:4d ------BEGIN CERTIFICATE----- -MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd -MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg -Q2xhc3MgMyBSb290IENBMB4XDTEwMTAyNjA4Mjg1OFoXDTQwMTAyNjA4Mjg1OFow -TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw -HgYDVQQDDBdCdXlwYXNzIENsYXNzIDMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB -BQADggIPADCCAgoCggIBAKXaCpUWUOOV8l6ddjEGMnqb8RB2uACatVI2zSRHsJ8Y -ZLya9vrVediQYkwiL944PdbgqOkcLNt4EemOaFEVcsfzM4fkoF0LXOBXByow9c3E -N3coTRiR5r/VUv1xLXA+58bEiuPwKAv0dpihi4dVsjoT/Lc+JzeOIuOoTyrvYLs9 -tznDDgFHmV0ST9tD+leh7fmdvhFHJlsTmKtdFoqwNxxXnUX/iJY2v7vKB3tvh2PX -0DJq1l1sDPGzbjniazEuOQAnFN44wOwZZoYS6J1yFhNkUsepNxz9gjDthBgd9K5c -/3ATAOux9TN6S9ZV+AWNS2mw9bMoNlwUxFFzTWsL8TQH2xc519woe2v1n/MuwU8X -KhDzzMro6/1rqy6any2CbgTUUgGTLT2G/H783+9CHaZr77kgxve9oKeV/afmiSTY -zIw0bOIjL9kSGiG5VZFvC5F5GQytQIgLcOJ60g7YaEi7ghM5EFjp2CoHxhLbWNvS -O1UQRwUVZ2J+GGOmRj8JDlQyXr8NYnon74Do29lLBlo3WiXQCBJ31G8JUJc9yB3D -34xFMFbG02SrZvPAXpacw8Tvw3xrizp5f7NJzz3iiZ+gMEuFuZyUJHmPfWupRWgP -K9Dx2hzLabjKSWJtyNBjYt1gD1iqj6G8BaVmos8bdrKEZLFMOVLAMLrwjEsCsLa3 -AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFEe4zf/lb+74suwv -Tg75JbCOPGvDMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAACAj -QTUEkMJAYmDv4jVM1z+s4jSQuKFvdvoWFqRINyzpkMLyPPgKn9iB5btb2iUspKdV -cSQy9sgL8rxq+JOssgfCX5/bzMiKqr5qb+FJEMwx14C7u8jYog5kV+qi9cKpMRXS -IGrs/CIBKM+GuIAeqcwRpTzyFrNHnfzSgCHEy9BHcEGhyoMZCCxt8l13nIoUE9Q2 -HJLw5QY33KbmkJs4j1xrG0aGQ0JfPgEHU1RdZX33inOhmlRaHylDFCfChQ+1iHsa -O5S3HWCntZznKWlXWpuTekMwGwPXYshApqr8ZORK15FTAaggiG6cX0S5y2CBNOxv -033aSF/rtJC8LakcC6wc1aJoIIAE1vyxjy+7SjENSoYc6+I2KSb12tjE8nVhz36u -dmNKekBlk4f4HoCMhuWG1o8O/FMsYOgWYRqiPkN7zTlgVGr18okmAWiDSKIz6MkE -kbIRNBE+6tBDGR8Dk5AM/1E9V/RBbuHLoL7ryWPNbczk+DaqaJ3tvV2XcEQNtg41 -3OEMXbugUZTLfhbrES+jkkXITHHZvMmZUldGL1DPvTVp9D0VzgalLA8+9oG6lLvD -u79leNKGef9JOxqDDPDeeOzI8k1MGt6CKfjBWtrt7uYnXuhF0J0cUahoq0Tj0Itq -4/g7u9xN12TyUb7mqqta6THuBrxzvxNiCp/HuZc= ------END CERTIFICATE----- - -# Issuer: CN=T-TeleSec GlobalRoot Class 3 O=T-Systems Enterprise Services GmbH OU=T-Systems Trust Center -# Subject: CN=T-TeleSec GlobalRoot Class 3 O=T-Systems Enterprise Services GmbH OU=T-Systems Trust Center -# Label: "T-TeleSec GlobalRoot Class 3" -# Serial: 1 -# MD5 Fingerprint: ca:fb:40:a8:4e:39:92:8a:1d:fe:8e:2f:c4:27:ea:ef -# SHA1 Fingerprint: 55:a6:72:3e:cb:f2:ec:cd:c3:23:74:70:19:9d:2a:be:11:e3:81:d1 -# SHA256 Fingerprint: fd:73:da:d3:1c:64:4f:f1:b4:3b:ef:0c:cd:da:96:71:0b:9c:d9:87:5e:ca:7e:31:70:7a:f3:e9:6d:52:2b:bd ------BEGIN CERTIFICATE----- -MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx -KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd -BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl -YyBHbG9iYWxSb290IENsYXNzIDMwHhcNMDgxMDAxMTAyOTU2WhcNMzMxMDAxMjM1 -OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy -aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 -ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDMwggEiMA0G -CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9dZPwYiJvJK7genasfb3ZJNW4t/zN -8ELg63iIVl6bmlQdTQyK9tPPcPRStdiTBONGhnFBSivwKixVA9ZIw+A5OO3yXDw/ -RLyTPWGrTs0NvvAgJ1gORH8EGoel15YUNpDQSXuhdfsaa3Ox+M6pCSzyU9XDFES4 -hqX2iys52qMzVNn6chr3IhUciJFrf2blw2qAsCTz34ZFiP0Zf3WHHx+xGwpzJFu5 -ZeAsVMhg02YXP+HMVDNzkQI6pn97djmiH5a2OK61yJN0HZ65tOVgnS9W0eDrXltM -EnAMbEQgqxHY9Bn20pxSN+f6tsIxO0rUFJmtxxr1XV/6B7h8DR/Wgx6zAgMBAAGj -QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS1 -A/d2O2GCahKqGFPrAyGUv/7OyjANBgkqhkiG9w0BAQsFAAOCAQEAVj3vlNW92nOy -WL6ukK2YJ5f+AbGwUgC4TeQbIXQbfsDuXmkqJa9c1h3a0nnJ85cp4IaH3gRZD/FZ -1GSFS5mvJQQeyUapl96Cshtwn5z2r3Ex3XsFpSzTucpH9sry9uetuUg/vBa3wW30 -6gmv7PO15wWeph6KU1HWk4HMdJP2udqmJQV0eVp+QD6CSyYRMG7hP0HHRwA11fXT -91Q+gT3aSWqas+8QPebrb9HIIkfLzM8BMZLZGOMivgkeGj5asuRrDFR6fUNOuIml -e9eiPZaGzPImNC1qkp2aGtAw4l1OBLBfiyB+d8E9lYLRRpo7PHi4b6HQDWSieB4p -TpPDpFQUWw== ------END CERTIFICATE----- - -# Issuer: CN=D-TRUST Root Class 3 CA 2 2009 O=D-Trust GmbH -# Subject: CN=D-TRUST Root Class 3 CA 2 2009 O=D-Trust GmbH -# Label: "D-TRUST Root Class 3 CA 2 2009" -# Serial: 623603 -# MD5 Fingerprint: cd:e0:25:69:8d:47:ac:9c:89:35:90:f7:fd:51:3d:2f -# SHA1 Fingerprint: 58:e8:ab:b0:36:15:33:fb:80:f7:9b:1b:6d:29:d3:ff:8d:5f:00:f0 -# SHA256 Fingerprint: 49:e7:a4:42:ac:f0:ea:62:87:05:00:54:b5:25:64:b6:50:e4:f4:9e:42:e3:48:d6:aa:38:e0:39:e9:57:b1:c1 ------BEGIN CERTIFICATE----- -MIIEMzCCAxugAwIBAgIDCYPzMA0GCSqGSIb3DQEBCwUAME0xCzAJBgNVBAYTAkRF -MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBD -bGFzcyAzIENBIDIgMjAwOTAeFw0wOTExMDUwODM1NThaFw0yOTExMDUwODM1NTha -ME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMM -HkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTCCASIwDQYJKoZIhvcNAQEB -BQADggEPADCCAQoCggEBANOySs96R+91myP6Oi/WUEWJNTrGa9v+2wBoqOADER03 -UAifTUpolDWzU9GUY6cgVq/eUXjsKj3zSEhQPgrfRlWLJ23DEE0NkVJD2IfgXU42 -tSHKXzlABF9bfsyjxiupQB7ZNoTWSPOSHjRGICTBpFGOShrvUD9pXRl/RcPHAY9R -ySPocq60vFYJfxLLHLGvKZAKyVXMD9O0Gu1HNVpK7ZxzBCHQqr0ME7UAyiZsxGsM -lFqVlNpQmvH/pStmMaTJOKDfHR+4CS7zp+hnUquVH+BGPtikw8paxTGA6Eian5Rp -/hnd2HN8gcqW3o7tszIFZYQ05ub9VxC1X3a/L7AQDcUCAwEAAaOCARowggEWMA8G -A1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFP3aFMSfMN4hvR5COfyrYyNJ4PGEMA4G -A1UdDwEB/wQEAwIBBjCB0wYDVR0fBIHLMIHIMIGAoH6gfIZ6bGRhcDovL2RpcmVj -dG9yeS5kLXRydXN0Lm5ldC9DTj1ELVRSVVNUJTIwUm9vdCUyMENsYXNzJTIwMyUy -MENBJTIwMiUyMDIwMDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRl -cmV2b2NhdGlvbmxpc3QwQ6BBoD+GPWh0dHA6Ly93d3cuZC10cnVzdC5uZXQvY3Js -L2QtdHJ1c3Rfcm9vdF9jbGFzc18zX2NhXzJfMjAwOS5jcmwwDQYJKoZIhvcNAQEL -BQADggEBAH+X2zDI36ScfSF6gHDOFBJpiBSVYEQBrLLpME+bUMJm2H6NMLVwMeni -acfzcNsgFYbQDfC+rAF1hM5+n02/t2A7nPPKHeJeaNijnZflQGDSNiH+0LS4F9p0 -o3/U37CYAqxva2ssJSRyoWXuJVrl5jLn8t+rSfrzkGkj2wTZ51xY/GXUl77M/C4K -zCUqNQT4YJEVdT1B/yMfGchs64JTBKbkTCJNjYy6zltz7GRUUG3RnFX7acM2w4y8 -PIWmawomDeCTmGCufsYkl4phX5GOZpIJhzbNi5stPvZR1FDUWSi9g/LMKHtThm3Y -Johw1+qRzT65ysCQblrGXnRl11z+o+I= ------END CERTIFICATE----- - -# Issuer: CN=D-TRUST Root Class 3 CA 2 EV 2009 O=D-Trust GmbH -# Subject: CN=D-TRUST Root Class 3 CA 2 EV 2009 O=D-Trust GmbH -# Label: "D-TRUST Root Class 3 CA 2 EV 2009" -# Serial: 623604 -# MD5 Fingerprint: aa:c6:43:2c:5e:2d:cd:c4:34:c0:50:4f:11:02:4f:b6 -# SHA1 Fingerprint: 96:c9:1b:0b:95:b4:10:98:42:fa:d0:d8:22:79:fe:60:fa:b9:16:83 -# SHA256 Fingerprint: ee:c5:49:6b:98:8c:e9:86:25:b9:34:09:2e:ec:29:08:be:d0:b0:f3:16:c2:d4:73:0c:84:ea:f1:f3:d3:48:81 ------BEGIN CERTIFICATE----- -MIIEQzCCAyugAwIBAgIDCYP0MA0GCSqGSIb3DQEBCwUAMFAxCzAJBgNVBAYTAkRF -MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBD -bGFzcyAzIENBIDIgRVYgMjAwOTAeFw0wOTExMDUwODUwNDZaFw0yOTExMDUwODUw -NDZaMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNV -BAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAwOTCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBAJnxhDRwui+3MKCOvXwEz75ivJn9gpfSegpn -ljgJ9hBOlSJzmY3aFS3nBfwZcyK3jpgAvDw9rKFs+9Z5JUut8Mxk2og+KbgPCdM0 -3TP1YtHhzRnp7hhPTFiu4h7WDFsVWtg6uMQYZB7jM7K1iXdODL/ZlGsTl28So/6Z -qQTMFexgaDbtCHu39b+T7WYxg4zGcTSHThfqr4uRjRxWQa4iN1438h3Z0S0NL2lR -p75mpoo6Kr3HGrHhFPC+Oh25z1uxav60sUYgovseO3Dvk5h9jHOW8sXvhXCtKSb8 -HgQ+HKDYD8tSg2J87otTlZCpV6LqYQXY+U3EJ/pure3511H3a6UCAwEAAaOCASQw -ggEgMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNOUikxiEyoZLsyvcop9Ntea -HNxnMA4GA1UdDwEB/wQEAwIBBjCB3QYDVR0fBIHVMIHSMIGHoIGEoIGBhn9sZGFw -Oi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290JTIwQ2xh -c3MlMjAzJTIwQ0ElMjAyJTIwRVYlMjAyMDA5LE89RC1UcnVzdCUyMEdtYkgsQz1E -RT9jZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0MEagRKBChkBodHRwOi8vd3d3LmQt -dHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfM19jYV8yX2V2XzIwMDku -Y3JsMA0GCSqGSIb3DQEBCwUAA4IBAQA07XtaPKSUiO8aEXUHL7P+PPoeUSbrh/Yp -3uDx1MYkCenBz1UbtDDZzhr+BlGmFaQt77JLvyAoJUnRpjZ3NOhk31KxEcdzes05 -nsKtjHEh8lprr988TlWvsoRlFIm5d8sqMb7Po23Pb0iUMkZv53GMoKaEGTcH8gNF -CSuGdXzfX2lXANtu2KZyIktQ1HWYVt+3GP9DQ1CuekR78HlR10M9p9OB0/DJT7na -xpeG0ILD5EJt/rDiZE4OJudANCa1CInXCGNjOCd1HjPqbqjdn5lPdE2BiYBL3ZqX -KVwvvoFBuYz/6n1gBp7N1z3TLqMVvKjmJuVvw9y4AyHqnxbxLFS1 ------END CERTIFICATE----- - -# Issuer: CN=CA Disig Root R2 O=Disig a.s. -# Subject: CN=CA Disig Root R2 O=Disig a.s. -# Label: "CA Disig Root R2" -# Serial: 10572350602393338211 -# MD5 Fingerprint: 26:01:fb:d8:27:a7:17:9a:45:54:38:1a:43:01:3b:03 -# SHA1 Fingerprint: b5:61:eb:ea:a4:de:e4:25:4b:69:1a:98:a5:57:47:c2:34:c7:d9:71 -# SHA256 Fingerprint: e2:3d:4a:03:6d:7b:70:e9:f5:95:b1:42:20:79:d2:b9:1e:df:bb:1f:b6:51:a0:63:3e:aa:8a:9d:c5:f8:07:03 ------BEGIN CERTIFICATE----- -MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNV -BAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMu -MRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQy -MDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sxEzARBgNVBAcTCkJyYXRpc2xhdmEx -EzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERpc2lnIFJvb3QgUjIw -ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbCw3Oe -NcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNH -PWSb6WiaxswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3I -x2ymrdMxp7zo5eFm1tL7A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbe -QTg06ov80egEFGEtQX6sx3dOy1FU+16SGBsEWmjGycT6txOgmLcRK7fWV8x8nhfR -yyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqVg8NTEQxzHQuyRpDRQjrO -QG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa5Beny912 -H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJ -QfYEkoopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUD -i/ZnWejBBhG93c+AAk9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORs -nLMOPReisjQS1n6yqEm70XooQL6iFh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1 -rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud -DwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5uQu0wDQYJKoZI -hvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM -tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqf -GopTpti72TVVsRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkb -lvdhuDvEK7Z4bLQjb/D907JedR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka -+elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W81k/BfDxujRNt+3vrMNDcTa/F1bal -TFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjxmHHEt38OFdAlab0i -nSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01utI3 -gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18Dr -G5gPcFw0sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3Os -zMOl6W8KjptlwlCFtaOgUxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8x -L4ysEr3vQCj8KWefshNPZiTEUxnpHikV7+ZtsH8tZ/3zbBt1RqPlShfppNcL ------END CERTIFICATE----- - -# Issuer: CN=ACCVRAIZ1 O=ACCV OU=PKIACCV -# Subject: CN=ACCVRAIZ1 O=ACCV OU=PKIACCV -# Label: "ACCVRAIZ1" -# Serial: 6828503384748696800 -# MD5 Fingerprint: d0:a0:5a:ee:05:b6:09:94:21:a1:7d:f1:b2:29:82:02 -# SHA1 Fingerprint: 93:05:7a:88:15:c6:4f:ce:88:2f:fa:91:16:52:28:78:bc:53:64:17 -# SHA256 Fingerprint: 9a:6e:c0:12:e1:a7:da:9d:be:34:19:4d:47:8a:d7:c0:db:18:22:fb:07:1d:f1:29:81:49:6e:d1:04:38:41:13 ------BEGIN CERTIFICATE----- -MIIH0zCCBbugAwIBAgIIXsO3pkN/pOAwDQYJKoZIhvcNAQEFBQAwQjESMBAGA1UE -AwwJQUNDVlJBSVoxMRAwDgYDVQQLDAdQS0lBQ0NWMQ0wCwYDVQQKDARBQ0NWMQsw -CQYDVQQGEwJFUzAeFw0xMTA1MDUwOTM3MzdaFw0zMDEyMzEwOTM3MzdaMEIxEjAQ -BgNVBAMMCUFDQ1ZSQUlaMTEQMA4GA1UECwwHUEtJQUNDVjENMAsGA1UECgwEQUND -VjELMAkGA1UEBhMCRVMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCb -qau/YUqXry+XZpp0X9DZlv3P4uRm7x8fRzPCRKPfmt4ftVTdFXxpNRFvu8gMjmoY -HtiP2Ra8EEg2XPBjs5BaXCQ316PWywlxufEBcoSwfdtNgM3802/J+Nq2DoLSRYWo -G2ioPej0RGy9ocLLA76MPhMAhN9KSMDjIgro6TenGEyxCQ0jVn8ETdkXhBilyNpA -lHPrzg5XPAOBOp0KoVdDaaxXbXmQeOW1tDvYvEyNKKGno6e6Ak4l0Squ7a4DIrhr -IA8wKFSVf+DuzgpmndFALW4ir50awQUZ0m/A8p/4e7MCQvtQqR0tkw8jq8bBD5L/ -0KIV9VMJcRz/RROE5iZe+OCIHAr8Fraocwa48GOEAqDGWuzndN9wrqODJerWx5eH -k6fGioozl2A3ED6XPm4pFdahD9GILBKfb6qkxkLrQaLjlUPTAYVtjrs78yM2x/47 -4KElB0iryYl0/wiPgL/AlmXz7uxLaL2diMMxs0Dx6M/2OLuc5NF/1OVYm3z61PMO -m3WR5LpSLhl+0fXNWhn8ugb2+1KoS5kE3fj5tItQo05iifCHJPqDQsGH+tUtKSpa -cXpkatcnYGMN285J9Y0fkIkyF/hzQ7jSWpOGYdbhdQrqeWZ2iE9x6wQl1gpaepPl -uUsXQA+xtrn13k/c4LOsOxFwYIRKQ26ZIMApcQrAZQIDAQABo4ICyzCCAscwfQYI -KwYBBQUHAQEEcTBvMEwGCCsGAQUFBzAChkBodHRwOi8vd3d3LmFjY3YuZXMvZmls -ZWFkbWluL0FyY2hpdm9zL2NlcnRpZmljYWRvcy9yYWl6YWNjdjEuY3J0MB8GCCsG -AQUFBzABhhNodHRwOi8vb2NzcC5hY2N2LmVzMB0GA1UdDgQWBBTSh7Tj3zcnk1X2 -VuqB5TbMjB4/vTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNKHtOPfNyeT -VfZW6oHlNsyMHj+9MIIBcwYDVR0gBIIBajCCAWYwggFiBgRVHSAAMIIBWDCCASIG -CCsGAQUFBwICMIIBFB6CARAAQQB1AHQAbwByAGkAZABhAGQAIABkAGUAIABDAGUA -cgB0AGkAZgBpAGMAYQBjAGkA8wBuACAAUgBhAO0AegAgAGQAZQAgAGwAYQAgAEEA -QwBDAFYAIAAoAEEAZwBlAG4AYwBpAGEAIABkAGUAIABUAGUAYwBuAG8AbABvAGcA -7QBhACAAeQAgAEMAZQByAHQAaQBmAGkAYwBhAGMAaQDzAG4AIABFAGwAZQBjAHQA -cgDzAG4AaQBjAGEALAAgAEMASQBGACAAUQA0ADYAMAAxADEANQA2AEUAKQAuACAA -QwBQAFMAIABlAG4AIABoAHQAdABwADoALwAvAHcAdwB3AC4AYQBjAGMAdgAuAGUA -czAwBggrBgEFBQcCARYkaHR0cDovL3d3dy5hY2N2LmVzL2xlZ2lzbGFjaW9uX2Mu -aHRtMFUGA1UdHwROMEwwSqBIoEaGRGh0dHA6Ly93d3cuYWNjdi5lcy9maWxlYWRt -aW4vQXJjaGl2b3MvY2VydGlmaWNhZG9zL3JhaXphY2N2MV9kZXIuY3JsMA4GA1Ud -DwEB/wQEAwIBBjAXBgNVHREEEDAOgQxhY2N2QGFjY3YuZXMwDQYJKoZIhvcNAQEF -BQADggIBAJcxAp/n/UNnSEQU5CmH7UwoZtCPNdpNYbdKl02125DgBS4OxnnQ8pdp -D70ER9m+27Up2pvZrqmZ1dM8MJP1jaGo/AaNRPTKFpV8M9xii6g3+CfYCS0b78gU -JyCpZET/LtZ1qmxNYEAZSUNUY9rizLpm5U9EelvZaoErQNV/+QEnWCzI7UiRfD+m -AM/EKXMRNt6GGT6d7hmKG9Ww7Y49nCrADdg9ZuM8Db3VlFzi4qc1GwQA9j9ajepD -vV+JHanBsMyZ4k0ACtrJJ1vnE5Bc5PUzolVt3OAJTS+xJlsndQAJxGJ3KQhfnlms -tn6tn1QwIgPBHnFk/vk4CpYY3QIUrCPLBhwepH2NDd4nQeit2hW3sCPdK6jT2iWH -7ehVRE2I9DZ+hJp4rPcOVkkO1jMl1oRQQmwgEh0q1b688nCBpHBgvgW1m54ERL5h -I6zppSSMEYCUWqKiuUnSwdzRp+0xESyeGabu4VXhwOrPDYTkF7eifKXeVSUG7szA -h1xA2syVP1XgNce4hL60Xc16gwFy7ofmXx2utYXGJt/mwZrpHgJHnyqobalbz+xF -d3+YJ5oyXSrjhO7FmGYvliAd3djDJ9ew+f7Zfc3Qn48LFFhRny+Lwzgt3uiP1o2H -pPVWQxaZLPSkVrQ0uGE3ycJYgBugl6H8WY3pEfbRD0tVNEYqi4Y7 ------END CERTIFICATE----- - -# Issuer: CN=TWCA Global Root CA O=TAIWAN-CA OU=Root CA -# Subject: CN=TWCA Global Root CA O=TAIWAN-CA OU=Root CA -# Label: "TWCA Global Root CA" -# Serial: 3262 -# MD5 Fingerprint: f9:03:7e:cf:e6:9e:3c:73:7a:2a:90:07:69:ff:2b:96 -# SHA1 Fingerprint: 9c:bb:48:53:f6:a4:f6:d3:52:a4:e8:32:52:55:60:13:f5:ad:af:65 -# SHA256 Fingerprint: 59:76:90:07:f7:68:5d:0f:cd:50:87:2f:9f:95:d5:75:5a:5b:2b:45:7d:81:f3:69:2b:61:0a:98:67:2f:0e:1b ------BEGIN CERTIFICATE----- -MIIFQTCCAymgAwIBAgICDL4wDQYJKoZIhvcNAQELBQAwUTELMAkGA1UEBhMCVFcx -EjAQBgNVBAoTCVRBSVdBTi1DQTEQMA4GA1UECxMHUm9vdCBDQTEcMBoGA1UEAxMT -VFdDQSBHbG9iYWwgUm9vdCBDQTAeFw0xMjA2MjcwNjI4MzNaFw0zMDEyMzExNTU5 -NTlaMFExCzAJBgNVBAYTAlRXMRIwEAYDVQQKEwlUQUlXQU4tQ0ExEDAOBgNVBAsT -B1Jvb3QgQ0ExHDAaBgNVBAMTE1RXQ0EgR2xvYmFsIFJvb3QgQ0EwggIiMA0GCSqG -SIb3DQEBAQUAA4ICDwAwggIKAoICAQCwBdvI64zEbooh745NnHEKH1Jw7W2CnJfF -10xORUnLQEK1EjRsGcJ0pDFfhQKX7EMzClPSnIyOt7h52yvVavKOZsTuKwEHktSz -0ALfUPZVr2YOy+BHYC8rMjk1Ujoog/h7FsYYuGLWRyWRzvAZEk2tY/XTP3VfKfCh -MBwqoJimFb3u/Rk28OKRQ4/6ytYQJ0lM793B8YVwm8rqqFpD/G2Gb3PpN0Wp8DbH -zIh1HrtsBv+baz4X7GGqcXzGHaL3SekVtTzWoWH1EfcFbx39Eb7QMAfCKbAJTibc -46KokWofwpFFiFzlmLhxpRUZyXx1EcxwdE8tmx2RRP1WKKD+u4ZqyPpcC1jcxkt2 -yKsi2XMPpfRaAok/T54igu6idFMqPVMnaR1sjjIsZAAmY2E2TqNGtz99sy2sbZCi -laLOz9qC5wc0GZbpuCGqKX6mOL6OKUohZnkfs8O1CWfe1tQHRvMq2uYiN2DLgbYP -oA/pyJV/v1WRBXrPPRXAb94JlAGD1zQbzECl8LibZ9WYkTunhHiVJqRaCPgrdLQA -BDzfuBSO6N+pjWxnkjMdwLfS7JLIvgm/LCkFbwJrnu+8vyq8W8BQj0FwcYeyTbcE -qYSjMq+u7msXi7Kx/mzhkIyIqJdIzshNy/MGz19qCkKxHh53L46g5pIOBvwFItIm -4TFRfTLcDwIDAQABoyMwITAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB -/zANBgkqhkiG9w0BAQsFAAOCAgEAXzSBdu+WHdXltdkCY4QWwa6gcFGn90xHNcgL -1yg9iXHZqjNB6hQbbCEAwGxCGX6faVsgQt+i0trEfJdLjbDorMjupWkEmQqSpqsn -LhpNgb+E1HAerUf+/UqdM+DyucRFCCEK2mlpc3INvjT+lIutwx4116KD7+U4x6WF -H6vPNOw/KP4M8VeGTslV9xzU2KV9Bnpv1d8Q34FOIWWxtuEXeZVFBs5fzNxGiWNo -RI2T9GRwoD2dKAXDOXC4Ynsg/eTb6QihuJ49CcdP+yz4k3ZB3lLg4VfSnQO8d57+ -nile98FRYB/e2guyLXW3Q0iT5/Z5xoRdgFlglPx4mI88k1HtQJAH32RjJMtOcQWh -15QaiDLxInQirqWm2BJpTGCjAu4r7NRjkgtevi92a6O2JryPA9gK8kxkRr05YuWW -6zRjESjMlfGt7+/cgFhI6Uu46mWs6fyAtbXIRfmswZ/ZuepiiI7E8UuDEq3mi4TW -nsLrgxifarsbJGAzcMzs9zLzXNl5fe+epP7JI8Mk7hWSsT2RTyaGvWZzJBPqpK5j -wa19hAM8EHiGG3njxPPyBJUgriOCxLM6AGK/5jYk4Ve6xx6QddVfP5VhK8E7zeWz -aGHQRiapIVJpLesux+t3zqY6tQMzT3bR51xUAV3LePTJDL/PEo4XLSNolOer/qmy -KwbQBM0= ------END CERTIFICATE----- - -# Issuer: CN=TeliaSonera Root CA v1 O=TeliaSonera -# Subject: CN=TeliaSonera Root CA v1 O=TeliaSonera -# Label: "TeliaSonera Root CA v1" -# Serial: 199041966741090107964904287217786801558 -# MD5 Fingerprint: 37:41:49:1b:18:56:9a:26:f5:ad:c2:66:fb:40:a5:4c -# SHA1 Fingerprint: 43:13:bb:96:f1:d5:86:9b:c1:4e:6a:92:f6:cf:f6:34:69:87:82:37 -# SHA256 Fingerprint: dd:69:36:fe:21:f8:f0:77:c1:23:a1:a5:21:c1:22:24:f7:22:55:b7:3e:03:a7:26:06:93:e8:a2:4b:0f:a3:89 ------BEGIN CERTIFICATE----- -MIIFODCCAyCgAwIBAgIRAJW+FqD3LkbxezmCcvqLzZYwDQYJKoZIhvcNAQEFBQAw -NzEUMBIGA1UECgwLVGVsaWFTb25lcmExHzAdBgNVBAMMFlRlbGlhU29uZXJhIFJv -b3QgQ0EgdjEwHhcNMDcxMDE4MTIwMDUwWhcNMzIxMDE4MTIwMDUwWjA3MRQwEgYD -VQQKDAtUZWxpYVNvbmVyYTEfMB0GA1UEAwwWVGVsaWFTb25lcmEgUm9vdCBDQSB2 -MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMK+6yfwIaPzaSZVfp3F -VRaRXP3vIb9TgHot0pGMYzHw7CTww6XScnwQbfQ3t+XmfHnqjLWCi65ItqwA3GV1 -7CpNX8GH9SBlK4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3GwYq/t75rH2D+1665I+X -Z75Ljo1kB1c4VWk0Nj0TSO9P4tNmHqTPGrdeNjPUtAa9GAH9d4RQAEX1jF3oI7x+ -/jXh7VB7qTCNGdMJjmhnXb88lxhTuylixcpecsHHltTbLaC0H2kD7OriUPEMPPCs -81Mt8Bz17Ww5OXOAFshSsCPN4D7c3TxHoLs1iuKYaIu+5b9y7tL6pe0S7fyYGKkm -dtwoSxAgHNN/Fnct7W+A90m7UwW7XWjH1Mh1Fj+JWov3F0fUTPHSiXk+TT2YqGHe -Oh7S+F4D4MHJHIzTjU3TlTazN19jY5szFPAtJmtTfImMMsJu7D0hADnJoWjiUIMu -sDor8zagrC/kb2HCUQk5PotTubtn2txTuXZZNp1D5SDgPTJghSJRt8czu90VL6R4 -pgd7gUY2BIbdeTXHlSw7sKMXNeVzH7RcWe/a6hBle3rQf5+ztCo3O3CLm1u5K7fs -slESl1MpWtTwEhDcTwK7EpIvYtQ/aUN8Ddb8WHUBiJ1YFkveupD/RwGJBmr2X7KQ -arMCpgKIv7NHfirZ1fpoeDVNAgMBAAGjPzA9MA8GA1UdEwEB/wQFMAMBAf8wCwYD -VR0PBAQDAgEGMB0GA1UdDgQWBBTwj1k4ALP1j5qWDNXr+nuqF+gTEjANBgkqhkiG -9w0BAQUFAAOCAgEAvuRcYk4k9AwI//DTDGjkk0kiP0Qnb7tt3oNmzqjMDfz1mgbl -dxSR651Be5kqhOX//CHBXfDkH1e3damhXwIm/9fH907eT/j3HEbAek9ALCI18Bmx -0GtnLLCo4MBANzX2hFxc469CeP6nyQ1Q6g2EdvZR74NTxnr/DlZJLo961gzmJ1Tj -TQpgcmLNkQfWpb/ImWvtxBnmq0wROMVvMeJuScg/doAmAyYp4Db29iBT4xdwNBed -Y2gea+zDTYa4EzAvXUYNR0PVG6pZDrlcjQZIrXSHX8f8MVRBE+LHIQ6e4B4N4cB7 -Q4WQxYpYxmUKeFfyxiMPAdkgS94P+5KFdSpcc41teyWRyu5FrgZLAMzTsVlQ2jqI -OylDRl6XK1TOU2+NSueW+r9xDkKLfP0ooNBIytrEgUy7onOTJsjrDNYmiLbAJM+7 -vVvrdX3pCI6GMyx5dwlppYn8s3CQh3aP0yK7Qs69cwsgJirQmz1wHiRszYd2qReW -t88NkvuOGKmYSdGe/mBEciG5Ge3C9THxOUiIkCR1VBatzvT4aRRkOfujuLpwQMcn -HL/EVlP6Y2XQ8xwOFvVrhlhNGNTkDY6lnVuR3HYkUD/GKvvZt5y11ubQ2egZixVx -SK236thZiNSQvxaz2emsWWFUyBy6ysHK4bkgTI86k4mloMy/0/Z1pHWWbVY= ------END CERTIFICATE----- - -# Issuer: CN=T-TeleSec GlobalRoot Class 2 O=T-Systems Enterprise Services GmbH OU=T-Systems Trust Center -# Subject: CN=T-TeleSec GlobalRoot Class 2 O=T-Systems Enterprise Services GmbH OU=T-Systems Trust Center -# Label: "T-TeleSec GlobalRoot Class 2" -# Serial: 1 -# MD5 Fingerprint: 2b:9b:9e:e4:7b:6c:1f:00:72:1a:cc:c1:77:79:df:6a -# SHA1 Fingerprint: 59:0d:2d:7d:88:4f:40:2e:61:7e:a5:62:32:17:65:cf:17:d8:94:e9 -# SHA256 Fingerprint: 91:e2:f5:78:8d:58:10:eb:a7:ba:58:73:7d:e1:54:8a:8e:ca:cd:01:45:98:bc:0b:14:3e:04:1b:17:05:25:52 ------BEGIN CERTIFICATE----- -MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx -KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd -BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl -YyBHbG9iYWxSb290IENsYXNzIDIwHhcNMDgxMDAxMTA0MDE0WhcNMzMxMDAxMjM1 -OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy -aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 -ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwggEiMA0G -CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCqX9obX+hzkeXaXPSi5kfl82hVYAUd -AqSzm1nzHoqvNK38DcLZSBnuaY/JIPwhqgcZ7bBcrGXHX+0CfHt8LRvWurmAwhiC -FoT6ZrAIxlQjgeTNuUk/9k9uN0goOA/FvudocP05l03Sx5iRUKrERLMjfTlH6VJi -1hKTXrcxlkIF+3anHqP1wvzpesVsqXFP6st4vGCvx9702cu+fjOlbpSD8DT6Iavq -jnKgP6TeMFvvhk1qlVtDRKgQFRzlAVfFmPHmBiiRqiDFt1MmUUOyCxGVWOHAD3bZ -wI18gfNycJ5v/hqO2V81xrJvNHy+SE/iWjnX2J14np+GPgNeGYtEotXHAgMBAAGj -QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS/ -WSA2AHmgoCJrjNXyYdK4LMuCSjANBgkqhkiG9w0BAQsFAAOCAQEAMQOiYQsfdOhy -NsZt+U2e+iKo4YFWz827n+qrkRk4r6p8FU3ztqONpfSO9kSpp+ghla0+AGIWiPAC -uvxhI+YzmzB6azZie60EI4RYZeLbK4rnJVM3YlNfvNoBYimipidx5joifsFvHZVw -IEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR3p1m0IvVVGb6 -g1XqfMIpiRvpb7PO4gWEyS8+eIVibslfwXhjdFjASBgMmTnrpMwatXlajRWc2BQN -9noHV8cigwUtPJslJj0Ys6lDfMjIq2SPDqO/nBudMNva0Bkuqjzx+zOAduTNrRlP -BSeOE6Fuwg== ------END CERTIFICATE----- - -# Issuer: CN=Atos TrustedRoot 2011 O=Atos -# Subject: CN=Atos TrustedRoot 2011 O=Atos -# Label: "Atos TrustedRoot 2011" -# Serial: 6643877497813316402 -# MD5 Fingerprint: ae:b9:c4:32:4b:ac:7f:5d:66:cc:77:94:bb:2a:77:56 -# SHA1 Fingerprint: 2b:b1:f5:3e:55:0c:1d:c5:f1:d4:e6:b7:6a:46:4b:55:06:02:ac:21 -# SHA256 Fingerprint: f3:56:be:a2:44:b7:a9:1e:b3:5d:53:ca:9a:d7:86:4a:ce:01:8e:2d:35:d5:f8:f9:6d:df:68:a6:f4:1a:a4:74 ------BEGIN CERTIFICATE----- -MIIDdzCCAl+gAwIBAgIIXDPLYixfszIwDQYJKoZIhvcNAQELBQAwPDEeMBwGA1UE -AwwVQXRvcyBUcnVzdGVkUm9vdCAyMDExMQ0wCwYDVQQKDARBdG9zMQswCQYDVQQG -EwJERTAeFw0xMTA3MDcxNDU4MzBaFw0zMDEyMzEyMzU5NTlaMDwxHjAcBgNVBAMM -FUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMC -REUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVhTuXbyo7LjvPpvMp -Nb7PGKw+qtn4TaA+Gke5vJrf8v7MPkfoepbCJI419KkM/IL9bcFyYie96mvr54rM -VD6QUM+A1JX76LWC1BTFtqlVJVfbsVD2sGBkWXppzwO3bw2+yj5vdHLqqjAqc2K+ -SZFhyBH+DgMq92og3AIVDV4VavzjgsG1xZ1kCWyjWZgHJ8cblithdHFsQ/H3NYkQ -4J7sVaE3IqKHBAUsR320HLliKWYoyrfhk/WklAOZuXCFteZI6o1Q/NnezG8HDt0L -cp2AMBYHlT8oDv3FdU9T1nSatCQujgKRz3bFmx5VdJx4IbHwLfELn8LVlhgf8FQi -eowHAgMBAAGjfTB7MB0GA1UdDgQWBBSnpQaxLKYJYO7Rl+lwrrw7GWzbITAPBgNV -HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKelBrEspglg7tGX6XCuvDsZbNshMBgG -A1UdIAQRMA8wDQYLKwYBBAGwLQMEAQEwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3 -DQEBCwUAA4IBAQAmdzTblEiGKkGdLD4GkGDEjKwLVLgfuXvTBznk+j57sj1O7Z8j -vZfza1zv7v1Apt+hk6EKhqzvINB5Ab149xnYJDE0BAGmuhWawyfc2E8PzBhj/5kP -DpFrdRbhIfzYJsdHt6bPWHJxfrrhTZVHO8mvbaG0weyJ9rQPOLXiZNwlz6bb65pc -maHFCN795trV1lpFDMS3wrUU77QR/w4VtfX128a961qn8FYiqTxlVMYVqL2Gns2D -lmh6cYGJ4Qvh6hEbaAjMaZ7snkGeRDImeuKHCnE96+RapNLbxc3G3mB/ufNPRJLv -KrcYPqcZ2Qt9sTdBQrC6YB3y/gkRsPCHe6ed ------END CERTIFICATE----- - -# Issuer: CN=QuoVadis Root CA 1 G3 O=QuoVadis Limited -# Subject: CN=QuoVadis Root CA 1 G3 O=QuoVadis Limited -# Label: "QuoVadis Root CA 1 G3" -# Serial: 687049649626669250736271037606554624078720034195 -# MD5 Fingerprint: a4:bc:5b:3f:fe:37:9a:fa:64:f0:e2:fa:05:3d:0b:ab -# SHA1 Fingerprint: 1b:8e:ea:57:96:29:1a:c9:39:ea:b8:0a:81:1a:73:73:c0:93:79:67 -# SHA256 Fingerprint: 8a:86:6f:d1:b2:76:b5:7e:57:8e:92:1c:65:82:8a:2b:ed:58:e9:f2:f2:88:05:41:34:b7:f1:f4:bf:c9:cc:74 ------BEGIN CERTIFICATE----- -MIIFYDCCA0igAwIBAgIUeFhfLq0sGUvjNwc1NBMotZbUZZMwDQYJKoZIhvcNAQEL -BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc -BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMSBHMzAeFw0xMjAxMTIxNzI3NDRaFw00 -MjAxMTIxNzI3NDRaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM -aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEgRzMwggIiMA0GCSqG -SIb3DQEBAQUAA4ICDwAwggIKAoICAQCgvlAQjunybEC0BJyFuTHK3C3kEakEPBtV -wedYMB0ktMPvhd6MLOHBPd+C5k+tR4ds7FtJwUrVu4/sh6x/gpqG7D0DmVIB0jWe -rNrwU8lmPNSsAgHaJNM7qAJGr6Qc4/hzWHa39g6QDbXwz8z6+cZM5cOGMAqNF341 -68Xfuw6cwI2H44g4hWf6Pser4BOcBRiYz5P1sZK0/CPTz9XEJ0ngnjybCKOLXSoh -4Pw5qlPafX7PGglTvF0FBM+hSo+LdoINofjSxxR3W5A2B4GbPgb6Ul5jxaYA/qXp -UhtStZI5cgMJYr2wYBZupt0lwgNm3fME0UDiTouG9G/lg6AnhF4EwfWQvTA9xO+o -abw4m6SkltFi2mnAAZauy8RRNOoMqv8hjlmPSlzkYZqn0ukqeI1RPToV7qJZjqlc -3sX5kCLliEVx3ZGZbHqfPT2YfF72vhZooF6uCyP8Wg+qInYtyaEQHeTTRCOQiJ/G -KubX9ZqzWB4vMIkIG1SitZgj7Ah3HJVdYdHLiZxfokqRmu8hqkkWCKi9YSgxyXSt -hfbZxbGL0eUQMk1fiyA6PEkfM4VZDdvLCXVDaXP7a3F98N/ETH3Goy7IlXnLc6KO -Tk0k+17kBL5yG6YnLUlamXrXXAkgt3+UuU/xDRxeiEIbEbfnkduebPRq34wGmAOt -zCjvpUfzUwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB -BjAdBgNVHQ4EFgQUo5fW816iEOGrRZ88F2Q87gFwnMwwDQYJKoZIhvcNAQELBQAD -ggIBABj6W3X8PnrHX3fHyt/PX8MSxEBd1DKquGrX1RUVRpgjpeaQWxiZTOOtQqOC -MTaIzen7xASWSIsBx40Bz1szBpZGZnQdT+3Btrm0DWHMY37XLneMlhwqI2hrhVd2 -cDMT/uFPpiN3GPoajOi9ZcnPP/TJF9zrx7zABC4tRi9pZsMbj/7sPtPKlL92CiUN -qXsCHKnQO18LwIE6PWThv6ctTr1NxNgpxiIY0MWscgKCP6o6ojoilzHdCGPDdRS5 -YCgtW2jgFqlmgiNR9etT2DGbe+m3nUvriBbP+V04ikkwj+3x6xn0dxoxGE1nVGwv -b2X52z3sIexe9PSLymBlVNFxZPT5pqOBMzYzcfCkeF9OrYMh3jRJjehZrJ3ydlo2 -8hP0r+AJx2EqbPfgna67hkooby7utHnNkDPDs3b69fBsnQGQ+p6Q9pxyz0fawx/k -NSBT8lTR32GDpgLiJTjehTItXnOQUl1CxM49S+H5GYQd1aJQzEH7QRTDvdbJWqNj -ZgKAvQU6O0ec7AAmTPWIUb+oI38YB7AL7YsmoWTTYUrrXJ/es69nA7Mf3W1daWhp -q1467HxpvMc7hU6eFbm0FU/DlXpY18ls6Wy58yljXrQs8C097Vpl4KlbQMJImYFt -nh8GKjwStIsPm6Ik8KaN1nrgS7ZklmOVhMJKzRwuJIczYOXD ------END CERTIFICATE----- - -# Issuer: CN=QuoVadis Root CA 2 G3 O=QuoVadis Limited -# Subject: CN=QuoVadis Root CA 2 G3 O=QuoVadis Limited -# Label: "QuoVadis Root CA 2 G3" -# Serial: 390156079458959257446133169266079962026824725800 -# MD5 Fingerprint: af:0c:86:6e:bf:40:2d:7f:0b:3e:12:50:ba:12:3d:06 -# SHA1 Fingerprint: 09:3c:61:f3:8b:8b:dc:7d:55:df:75:38:02:05:00:e1:25:f5:c8:36 -# SHA256 Fingerprint: 8f:e4:fb:0a:f9:3a:4d:0d:67:db:0b:eb:b2:3e:37:c7:1b:f3:25:dc:bc:dd:24:0e:a0:4d:af:58:b4:7e:18:40 ------BEGIN CERTIFICATE----- -MIIFYDCCA0igAwIBAgIURFc0JFuBiZs18s64KztbpybwdSgwDQYJKoZIhvcNAQEL -BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc -BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMiBHMzAeFw0xMjAxMTIxODU5MzJaFw00 -MjAxMTIxODU5MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM -aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDIgRzMwggIiMA0GCSqG -SIb3DQEBAQUAA4ICDwAwggIKAoICAQChriWyARjcV4g/Ruv5r+LrI3HimtFhZiFf -qq8nUeVuGxbULX1QsFN3vXg6YOJkApt8hpvWGo6t/x8Vf9WVHhLL5hSEBMHfNrMW -n4rjyduYNM7YMxcoRvynyfDStNVNCXJJ+fKH46nafaF9a7I6JaltUkSs+L5u+9ym -c5GQYaYDFCDy54ejiK2toIz/pgslUiXnFgHVy7g1gQyjO/Dh4fxaXc6AcW34Sas+ -O7q414AB+6XrW7PFXmAqMaCvN+ggOp+oMiwMzAkd056OXbxMmO7FGmh77FOm6RQ1 -o9/NgJ8MSPsc9PG/Srj61YxxSscfrf5BmrODXfKEVu+lV0POKa2Mq1W/xPtbAd0j -IaFYAI7D0GoT7RPjEiuA3GfmlbLNHiJuKvhB1PLKFAeNilUSxmn1uIZoL1NesNKq -IcGY5jDjZ1XHm26sGahVpkUG0CM62+tlXSoREfA7T8pt9DTEceT/AFr2XK4jYIVz -8eQQsSWu1ZK7E8EM4DnatDlXtas1qnIhO4M15zHfeiFuuDIIfR0ykRVKYnLP43eh -vNURG3YBZwjgQQvD6xVu+KQZ2aKrr+InUlYrAoosFCT5v0ICvybIxo/gbjh9Uy3l -7ZizlWNof/k19N+IxWA1ksB8aRxhlRbQ694Lrz4EEEVlWFA4r0jyWbYW8jwNkALG -cC4BrTwV1wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB -BjAdBgNVHQ4EFgQU7edvdlq/YOxJW8ald7tyFnGbxD0wDQYJKoZIhvcNAQELBQAD -ggIBAJHfgD9DCX5xwvfrs4iP4VGyvD11+ShdyLyZm3tdquXK4Qr36LLTn91nMX66 -AarHakE7kNQIXLJgapDwyM4DYvmL7ftuKtwGTTwpD4kWilhMSA/ohGHqPHKmd+RC -roijQ1h5fq7KpVMNqT1wvSAZYaRsOPxDMuHBR//47PERIjKWnML2W2mWeyAMQ0Ga -W/ZZGYjeVYg3UQt4XAoeo0L9x52ID8DyeAIkVJOviYeIyUqAHerQbj5hLja7NQ4n -lv1mNDthcnPxFlxHBlRJAHpYErAK74X9sbgzdWqTHBLmYF5vHX/JHyPLhGGfHoJE -+V+tYlUkmlKY7VHnoX6XOuYvHxHaU4AshZ6rNRDbIl9qxV6XU/IyAgkwo1jwDQHV -csaxfGl7w/U2Rcxhbl5MlMVerugOXou/983g7aEOGzPuVBj+D77vfoRrQ+NwmNtd -dbINWQeFFSM51vHfqSYP1kjHs6Yi9TM3WpVHn3u6GBVv/9YUZINJ0gpnIdsPNWNg -KCLjsZWDzYWm3S8P52dSbrsvhXz1SnPnxT7AvSESBT/8twNJAlvIJebiVDj1eYeM -HVOyToV7BjjHLPj4sHKNJeV3UvQDHEimUF+IIDBu8oJDqz2XhOdT+yHBTw8imoa4 -WSr2Rz0ZiC3oheGe7IUIarFsNMkd7EgrO3jtZsSOeWmD3n+M ------END CERTIFICATE----- - -# Issuer: CN=QuoVadis Root CA 3 G3 O=QuoVadis Limited -# Subject: CN=QuoVadis Root CA 3 G3 O=QuoVadis Limited -# Label: "QuoVadis Root CA 3 G3" -# Serial: 268090761170461462463995952157327242137089239581 -# MD5 Fingerprint: df:7d:b9:ad:54:6f:68:a1:df:89:57:03:97:43:b0:d7 -# SHA1 Fingerprint: 48:12:bd:92:3c:a8:c4:39:06:e7:30:6d:27:96:e6:a4:cf:22:2e:7d -# SHA256 Fingerprint: 88:ef:81:de:20:2e:b0:18:45:2e:43:f8:64:72:5c:ea:5f:bd:1f:c2:d9:d2:05:73:07:09:c5:d8:b8:69:0f:46 ------BEGIN CERTIFICATE----- -MIIFYDCCA0igAwIBAgIULvWbAiin23r/1aOp7r0DoM8Sah0wDQYJKoZIhvcNAQEL -BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc -BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMyBHMzAeFw0xMjAxMTIyMDI2MzJaFw00 -MjAxMTIyMDI2MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM -aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMgRzMwggIiMA0GCSqG -SIb3DQEBAQUAA4ICDwAwggIKAoICAQCzyw4QZ47qFJenMioKVjZ/aEzHs286IxSR -/xl/pcqs7rN2nXrpixurazHb+gtTTK/FpRp5PIpM/6zfJd5O2YIyC0TeytuMrKNu -FoM7pmRLMon7FhY4futD4tN0SsJiCnMK3UmzV9KwCoWdcTzeo8vAMvMBOSBDGzXR -U7Ox7sWTaYI+FrUoRqHe6okJ7UO4BUaKhvVZR74bbwEhELn9qdIoyhA5CcoTNs+c -ra1AdHkrAj80//ogaX3T7mH1urPnMNA3I4ZyYUUpSFlob3emLoG+B01vr87ERROR -FHAGjx+f+IdpsQ7vw4kZ6+ocYfx6bIrc1gMLnia6Et3UVDmrJqMz6nWB2i3ND0/k -A9HvFZcba5DFApCTZgIhsUfei5pKgLlVj7WiL8DWM2fafsSntARE60f75li59wzw -eyuxwHApw0BiLTtIadwjPEjrewl5qW3aqDCYz4ByA4imW0aucnl8CAMhZa634Ryl -sSqiMd5mBPfAdOhx3v89WcyWJhKLhZVXGqtrdQtEPREoPHtht+KPZ0/l7DxMYIBp -VzgeAVuNVejH38DMdyM0SXV89pgR6y3e7UEuFAUCf+D+IOs15xGsIs5XPd7JMG0Q -A4XN8f+MFrXBsj6IbGB/kE+V9/YtrQE5BwT6dYB9v0lQ7e/JxHwc64B+27bQ3RP+ -ydOc17KXqQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB -BjAdBgNVHQ4EFgQUxhfQvKjqAkPyGwaZXSuQILnXnOQwDQYJKoZIhvcNAQELBQAD -ggIBADRh2Va1EodVTd2jNTFGu6QHcrxfYWLopfsLN7E8trP6KZ1/AvWkyaiTt3px -KGmPc+FSkNrVvjrlt3ZqVoAh313m6Tqe5T72omnHKgqwGEfcIHB9UqM+WXzBusnI -FUBhynLWcKzSt/Ac5IYp8M7vaGPQtSCKFWGafoaYtMnCdvvMujAWzKNhxnQT5Wvv -oxXqA/4Ti2Tk08HS6IT7SdEQTXlm66r99I0xHnAUrdzeZxNMgRVhvLfZkXdxGYFg -u/BYpbWcC/ePIlUnwEsBbTuZDdQdm2NnL9DuDcpmvJRPpq3t/O5jrFc/ZSXPsoaP -0Aj/uHYUbt7lJ+yreLVTubY/6CD50qi+YUbKh4yE8/nxoGibIh6BJpsQBJFxwAYf -3KDTuVan45gtf4Od34wrnDKOMpTwATwiKp9Dwi7DmDkHOHv8XgBCH/MyJnmDhPbl -8MFREsALHgQjDFSlTC9JxUrRtm5gDWv8a4uFJGS3iQ6rJUdbPM9+Sb3H6QrG2vd+ -DhcI00iX0HGS8A85PjRqHH3Y8iKuu2n0M7SmSFXRDw4m6Oy2Cy2nhTXN/VnIn9HN -PlopNLk9hM6xZdRZkZFWdSHBd575euFgndOtBBj0fOtek49TSiIp+EgrPk2GrFt/ -ywaZWWDYWGWVjUTR939+J399roD1B0y2PpxxVJkES/1Y+Zj0 ------END CERTIFICATE----- - -# Issuer: CN=DigiCert Assured ID Root G2 O=DigiCert Inc OU=www.digicert.com -# Subject: CN=DigiCert Assured ID Root G2 O=DigiCert Inc OU=www.digicert.com -# Label: "DigiCert Assured ID Root G2" -# Serial: 15385348160840213938643033620894905419 -# MD5 Fingerprint: 92:38:b9:f8:63:24:82:65:2c:57:33:e6:fe:81:8f:9d -# SHA1 Fingerprint: a1:4b:48:d9:43:ee:0a:0e:40:90:4f:3c:e0:a4:c0:91:93:51:5d:3f -# SHA256 Fingerprint: 7d:05:eb:b6:82:33:9f:8c:94:51:ee:09:4e:eb:fe:fa:79:53:a1:14:ed:b2:f4:49:49:45:2f:ab:7d:2f:c1:85 ------BEGIN CERTIFICATE----- -MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBl -MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 -d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv -b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQG -EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl -cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwggEi -MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSA -n61UQbVH35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4Htecc -biJVMWWXvdMX0h5i89vqbFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9Hp -EgjAALAcKxHad3A2m67OeYfcgnDmCXRwVWmvo2ifv922ebPynXApVfSr/5Vh88lA -bx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OPYLfykqGxvYmJHzDNw6Yu -YjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+RnlTGNAgMB -AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQW -BBTOw0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPI -QW5pJ6d1Ee88hjZv0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I -0jJmwYrA8y8678Dj1JGG0VDjA9tzd29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4Gni -lmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAWhsI6yLETcDbYz+70CjTVW0z9 -B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0MjomZmWzwPDCv -ON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo -IhNzbM8m9Yop5w== ------END CERTIFICATE----- - -# Issuer: CN=DigiCert Assured ID Root G3 O=DigiCert Inc OU=www.digicert.com -# Subject: CN=DigiCert Assured ID Root G3 O=DigiCert Inc OU=www.digicert.com -# Label: "DigiCert Assured ID Root G3" -# Serial: 15459312981008553731928384953135426796 -# MD5 Fingerprint: 7c:7f:65:31:0c:81:df:8d:ba:3e:99:e2:5c:ad:6e:fb -# SHA1 Fingerprint: f5:17:a2:4f:9a:48:c6:c9:f8:a2:00:26:9f:dc:0f:48:2c:ab:30:89 -# SHA256 Fingerprint: 7e:37:cb:8b:4c:47:09:0c:ab:36:55:1b:a6:f4:5d:b8:40:68:0f:ba:16:6a:95:2d:b1:00:71:7f:43:05:3f:c2 ------BEGIN CERTIFICATE----- -MIICRjCCAc2gAwIBAgIQC6Fa+h3foLVJRK/NJKBs7DAKBggqhkjOPQQDAzBlMQsw -CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu -ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg -RzMwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQGEwJV -UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu -Y29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwdjAQBgcq -hkjOPQIBBgUrgQQAIgNiAAQZ57ysRGXtzbg/WPuNsVepRC0FFfLvC/8QdJ+1YlJf -Zn4f5dwbRXkLzMZTCp2NXQLZqVneAlr2lSoOjThKiknGvMYDOAdfVdp+CW7if17Q -RSAPWXYQ1qAk8C3eNvJsKTmjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ -BAQDAgGGMB0GA1UdDgQWBBTL0L2p4ZgFUaFNN6KDec6NHSrkhDAKBggqhkjOPQQD -AwNnADBkAjAlpIFFAmsSS3V0T8gj43DydXLefInwz5FyYZ5eEJJZVrmDxxDnOOlY -JjZ91eQ0hjkCMHw2U/Aw5WJjOpnitqM7mzT6HtoQknFekROn3aRukswy1vUhZscv -6pZjamVFkpUBtA== ------END CERTIFICATE----- - -# Issuer: CN=DigiCert Global Root G2 O=DigiCert Inc OU=www.digicert.com -# Subject: CN=DigiCert Global Root G2 O=DigiCert Inc OU=www.digicert.com -# Label: "DigiCert Global Root G2" -# Serial: 4293743540046975378534879503202253541 -# MD5 Fingerprint: e4:a6:8a:c8:54:ac:52:42:46:0a:fd:72:48:1b:2a:44 -# SHA1 Fingerprint: df:3c:24:f9:bf:d6:66:76:1b:26:80:73:fe:06:d1:cc:8d:4f:82:a4 -# SHA256 Fingerprint: cb:3c:cb:b7:60:31:e5:e0:13:8f:8d:d3:9a:23:f9:de:47:ff:c3:5e:43:c1:14:4c:ea:27:d4:6a:5a:b1:cb:5f ------BEGIN CERTIFICATE----- -MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh -MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 -d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH -MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT -MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j -b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG -9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI -2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx -1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ -q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz -tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ -vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP -BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV -5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY -1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 -NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG -Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 -8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe -pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl -MrY= ------END CERTIFICATE----- - -# Issuer: CN=DigiCert Global Root G3 O=DigiCert Inc OU=www.digicert.com -# Subject: CN=DigiCert Global Root G3 O=DigiCert Inc OU=www.digicert.com -# Label: "DigiCert Global Root G3" -# Serial: 7089244469030293291760083333884364146 -# MD5 Fingerprint: f5:5d:a4:50:a5:fb:28:7e:1e:0f:0d:cc:96:57:56:ca -# SHA1 Fingerprint: 7e:04:de:89:6a:3e:66:6d:00:e6:87:d3:3f:fa:d9:3b:e8:3d:34:9e -# SHA256 Fingerprint: 31:ad:66:48:f8:10:41:38:c7:38:f3:9e:a4:32:01:33:39:3e:3a:18:cc:02:29:6e:f9:7c:2a:c9:ef:67:31:d0 ------BEGIN CERTIFICATE----- -MIICPzCCAcWgAwIBAgIQBVVWvPJepDU1w6QP1atFcjAKBggqhkjOPQQDAzBhMQsw -CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu -ZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMzAe -Fw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVTMRUw -EwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20x -IDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEczMHYwEAYHKoZIzj0CAQYF -K4EEACIDYgAE3afZu4q4C/sLfyHS8L6+c/MzXRq8NOrexpu80JX28MzQC7phW1FG -fp4tn+6OYwwX7Adw9c+ELkCDnOg/QW07rdOkFFk2eJ0DQ+4QE2xy3q6Ip6FrtUPO -Z9wj/wMco+I+o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAd -BgNVHQ4EFgQUs9tIpPmhxdiuNkHMEWNpYim8S8YwCgYIKoZIzj0EAwMDaAAwZQIx -AK288mw/EkrRLTnDCgmXc/SINoyIJ7vmiI1Qhadj+Z4y3maTD/HMsQmP3Wyr+mt/ -oAIwOWZbwmSNuJ5Q3KjVSaLtx9zRSX8XAbjIho9OjIgrqJqpisXRAL34VOKa5Vt8 -sycX ------END CERTIFICATE----- - -# Issuer: CN=DigiCert Trusted Root G4 O=DigiCert Inc OU=www.digicert.com -# Subject: CN=DigiCert Trusted Root G4 O=DigiCert Inc OU=www.digicert.com -# Label: "DigiCert Trusted Root G4" -# Serial: 7451500558977370777930084869016614236 -# MD5 Fingerprint: 78:f2:fc:aa:60:1f:2f:b4:eb:c9:37:ba:53:2e:75:49 -# SHA1 Fingerprint: dd:fb:16:cd:49:31:c9:73:a2:03:7d:3f:c8:3a:4d:7d:77:5d:05:e4 -# SHA256 Fingerprint: 55:2f:7b:dc:f1:a7:af:9e:6c:e6:72:01:7f:4f:12:ab:f7:72:40:c7:8e:76:1a:c2:03:d1:d9:d2:0a:c8:99:88 ------BEGIN CERTIFICATE----- -MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBi -MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 -d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3Qg -RzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBiMQswCQYDVQQGEwJV -UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu -Y29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqG -SIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3y -ithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1If -xp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDV -ySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiO -DCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQ -jdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/ -CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCi -EhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADM -fRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QY -uKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXK -chYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t -9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB -hjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD -ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2 -SV1EY+CtnJYYZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd -+SeuMIW59mdNOj6PWTkiU0TryF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWc -fFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy7zBZLq7gcfJW5GqXb5JQbZaNaHqa -sjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iahixTXTBmyUEFxPT9N -cCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN5r5N -0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie -4u1Ki7wb/UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mI -r/OSmbaz5mEP0oUA51Aa5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1 -/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tKG48BtieVU+i2iW1bvGjUI+iLUaJW+fCm -gKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP82Z+ ------END CERTIFICATE----- - -# Issuer: CN=COMODO RSA Certification Authority O=COMODO CA Limited -# Subject: CN=COMODO RSA Certification Authority O=COMODO CA Limited -# Label: "COMODO RSA Certification Authority" -# Serial: 101909084537582093308941363524873193117 -# MD5 Fingerprint: 1b:31:b0:71:40:36:cc:14:36:91:ad:c4:3e:fd:ec:18 -# SHA1 Fingerprint: af:e5:d2:44:a8:d1:19:42:30:ff:47:9f:e2:f8:97:bb:cd:7a:8c:b4 -# SHA256 Fingerprint: 52:f0:e1:c4:e5:8e:c6:29:29:1b:60:31:7f:07:46:71:b8:5d:7e:a8:0d:5b:07:27:34:63:53:4b:32:b4:02:34 ------BEGIN CERTIFICATE----- -MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCB -hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G -A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV -BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMTE5 -MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgT -EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR -Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNh -dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR -6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8X -pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC -9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV -/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cgoLEf -Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z -+pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7w -qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZah -SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVIC -u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y1Dma/RMhnEw6abf -Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq -crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E -FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB -/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvl -wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM -4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYcwlYRm6mnPTXJ9OV -2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgtZx8jb8uk2Intzna -FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ -CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK -boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmcke -jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yL -S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17zbqD5daWb -QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl -0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7ILaZRfyHB -NVOFBkpdn627G190 ------END CERTIFICATE----- - -# Issuer: CN=USERTrust RSA Certification Authority O=The USERTRUST Network -# Subject: CN=USERTrust RSA Certification Authority O=The USERTRUST Network -# Label: "USERTrust RSA Certification Authority" -# Serial: 2645093764781058787591871645665788717 -# MD5 Fingerprint: 1b:fe:69:d1:91:b7:19:33:a3:72:a8:0f:e1:55:e5:b5 -# SHA1 Fingerprint: 2b:8f:1b:57:33:0d:bb:a2:d0:7a:6c:51:f7:0e:e9:0d:da:b9:ad:8e -# SHA256 Fingerprint: e7:93:c9:b0:2f:d8:aa:13:e2:1c:31:22:8a:cc:b0:81:19:64:3b:74:9c:89:89:64:b1:74:6d:46:c3:d4:cb:d2 ------BEGIN CERTIFICATE----- -MIIF3jCCA8agAwIBAgIQAf1tMPyjylGoG7xkDjUDLTANBgkqhkiG9w0BAQwFADCB -iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl -cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV -BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAw -MjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNV -BAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU -aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2Vy -dGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK -AoICAQCAEmUXNg7D2wiz0KxXDXbtzSfTTK1Qg2HiqiBNCS1kCdzOiZ/MPans9s/B -3PHTsdZ7NygRK0faOca8Ohm0X6a9fZ2jY0K2dvKpOyuR+OJv0OwWIJAJPuLodMkY -tJHUYmTbf6MG8YgYapAiPLz+E/CHFHv25B+O1ORRxhFnRghRy4YUVD+8M/5+bJz/ -Fp0YvVGONaanZshyZ9shZrHUm3gDwFA66Mzw3LyeTP6vBZY1H1dat//O+T23LLb2 -VN3I5xI6Ta5MirdcmrS3ID3KfyI0rn47aGYBROcBTkZTmzNg95S+UzeQc0PzMsNT -79uq/nROacdrjGCT3sTHDN/hMq7MkztReJVni+49Vv4M0GkPGw/zJSZrM233bkf6 -c0Plfg6lZrEpfDKEY1WJxA3Bk1QwGROs0303p+tdOmw1XNtB1xLaqUkL39iAigmT -Yo61Zs8liM2EuLE/pDkP2QKe6xJMlXzzawWpXhaDzLhn4ugTncxbgtNMs+1b/97l -c6wjOy0AvzVVdAlJ2ElYGn+SNuZRkg7zJn0cTRe8yexDJtC/QV9AqURE9JnnV4ee -UB9XVKg+/XRjL7FQZQnmWEIuQxpMtPAlR1n6BB6T1CZGSlCBst6+eLf8ZxXhyVeE -Hg9j1uliutZfVS7qXMYoCAQlObgOK6nyTJccBz8NUvXt7y+CDwIDAQABo0IwQDAd -BgNVHQ4EFgQUU3m/WqorSs9UgOHYm8Cd8rIDZsswDgYDVR0PAQH/BAQDAgEGMA8G -A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAFzUfA3P9wF9QZllDHPF -Up/L+M+ZBn8b2kMVn54CVVeWFPFSPCeHlCjtHzoBN6J2/FNQwISbxmtOuowhT6KO -VWKR82kV2LyI48SqC/3vqOlLVSoGIG1VeCkZ7l8wXEskEVX/JJpuXior7gtNn3/3 -ATiUFJVDBwn7YKnuHKsSjKCaXqeYalltiz8I+8jRRa8YFWSQEg9zKC7F4iRO/Fjs -8PRF/iKz6y+O0tlFYQXBl2+odnKPi4w2r78NBc5xjeambx9spnFixdjQg3IM8WcR -iQycE0xyNN+81XHfqnHd4blsjDwSXWXavVcStkNr/+XeTWYRUc+ZruwXtuhxkYze -Sf7dNXGiFSeUHM9h4ya7b6NnJSFd5t0dCy5oGzuCr+yDZ4XUmFF0sbmZgIn/f3gZ -XHlKYC6SQK5MNyosycdiyA5d9zZbyuAlJQG03RoHnHcAP9Dc1ew91Pq7P8yF1m9/ -qS3fuQL39ZeatTXaw2ewh0qpKJ4jjv9cJ2vhsE/zB+4ALtRZh8tSQZXq9EfX7mRB -VXyNWQKV3WKdwrnuWih0hKWbt5DHDAff9Yk2dDLWKMGwsAvgnEzDHNb842m1R0aB -L6KCq9NjRHDEjf8tM7qtj3u1cIiuPhnPQCjY/MiQu12ZIvVS5ljFH4gxQ+6IHdfG -jjxDah2nGN59PRbxYvnKkKj9 ------END CERTIFICATE----- - -# Issuer: CN=USERTrust ECC Certification Authority O=The USERTRUST Network -# Subject: CN=USERTrust ECC Certification Authority O=The USERTRUST Network -# Label: "USERTrust ECC Certification Authority" -# Serial: 123013823720199481456569720443997572134 -# MD5 Fingerprint: fa:68:bc:d9:b5:7f:ad:fd:c9:1d:06:83:28:cc:24:c1 -# SHA1 Fingerprint: d1:cb:ca:5d:b2:d5:2a:7f:69:3b:67:4d:e5:f0:5a:1d:0c:95:7d:f0 -# SHA256 Fingerprint: 4f:f4:60:d5:4b:9c:86:da:bf:bc:fc:57:12:e0:40:0d:2b:ed:3f:bc:4d:4f:bd:aa:86:e0:6a:dc:d2:a9:ad:7a ------BEGIN CERTIFICATE----- -MIICjzCCAhWgAwIBAgIQXIuZxVqUxdJxVt7NiYDMJjAKBggqhkjOPQQDAzCBiDEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNl -eSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMT -JVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMjAx -MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT -Ck5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUg -VVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlm -aWNhdGlvbiBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQarFRaqflo -I+d61SRvU8Za2EurxtW20eZzca7dnNYMYf3boIkDuAUU7FfO7l0/4iGzzvfUinng -o4N+LZfQYcTxmdwlkWOrfzCjtHDix6EznPO/LlxTsV+zfTJ/ijTjeXmjQjBAMB0G -A1UdDgQWBBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAOBgNVHQ8BAf8EBAMCAQYwDwYD -VR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjA2Z6EWCNzklwBBHU6+4WMB -zzuqQhFkoJ2UOQIReVx7Hfpkue4WQrO/isIJxOzksU0CMQDpKmFHjFJKS04YcPbW -RNZu9YO6bVi9JNlWSOrvxKJGgYhqOkbRqZtNyWHa0V1Xahg= ------END CERTIFICATE----- - -# Issuer: CN=GlobalSign O=GlobalSign OU=GlobalSign ECC Root CA - R5 -# Subject: CN=GlobalSign O=GlobalSign OU=GlobalSign ECC Root CA - R5 -# Label: "GlobalSign ECC Root CA - R5" -# Serial: 32785792099990507226680698011560947931244 -# MD5 Fingerprint: 9f:ad:3b:1c:02:1e:8a:ba:17:74:38:81:0c:a2:bc:08 -# SHA1 Fingerprint: 1f:24:c6:30:cd:a4:18:ef:20:69:ff:ad:4f:dd:5f:46:3a:1b:69:aa -# SHA256 Fingerprint: 17:9f:bc:14:8a:3d:d0:0f:d2:4e:a1:34:58:cc:43:bf:a7:f5:9c:81:82:d7:83:a5:13:f6:eb:ec:10:0c:89:24 ------BEGIN CERTIFICATE----- -MIICHjCCAaSgAwIBAgIRYFlJ4CYuu1X5CneKcflK2GwwCgYIKoZIzj0EAwMwUDEk -MCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpH -bG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoX -DTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBD -QSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu -MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAER0UOlvt9Xb/pOdEh+J8LttV7HpI6SFkc -8GIxLcB6KP4ap1yztsyX50XUWPrRd21DosCHZTQKH3rd6zwzocWdTaRvQZU4f8ke -hOvRnkmSh5SHDDqFSmafnVmTTZdhBoZKo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYD -VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUPeYpSJvqB8ohREom3m7e0oPQn1kwCgYI -KoZIzj0EAwMDaAAwZQIxAOVpEslu28YxuglB4Zf4+/2a4n0Sye18ZNPLBSWLVtmg -515dTguDnFt2KaAJJiFqYgIwcdK1j1zqO+F4CYWodZI7yFz9SO8NdCKoCOJuxUnO -xwy8p2Fp8fc74SrL+SvzZpA3 ------END CERTIFICATE----- - -# Issuer: CN=IdenTrust Commercial Root CA 1 O=IdenTrust -# Subject: CN=IdenTrust Commercial Root CA 1 O=IdenTrust -# Label: "IdenTrust Commercial Root CA 1" -# Serial: 13298821034946342390520003877796839426 -# MD5 Fingerprint: b3:3e:77:73:75:ee:a0:d3:e3:7e:49:63:49:59:bb:c7 -# SHA1 Fingerprint: df:71:7e:aa:4a:d9:4e:c9:55:84:99:60:2d:48:de:5f:bc:f0:3a:25 -# SHA256 Fingerprint: 5d:56:49:9b:e4:d2:e0:8b:cf:ca:d0:8a:3e:38:72:3d:50:50:3b:de:70:69:48:e4:2f:55:60:30:19:e5:28:ae ------BEGIN CERTIFICATE----- -MIIFYDCCA0igAwIBAgIQCgFCgAAAAUUjyES1AAAAAjANBgkqhkiG9w0BAQsFADBK -MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVu -VHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwHhcNMTQwMTE2MTgxMjIzWhcNMzQw -MTE2MTgxMjIzWjBKMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScw -JQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwggIiMA0GCSqG -SIb3DQEBAQUAA4ICDwAwggIKAoICAQCnUBneP5k91DNG8W9RYYKyqU+PZ4ldhNlT -3Qwo2dfw/66VQ3KZ+bVdfIrBQuExUHTRgQ18zZshq0PirK1ehm7zCYofWjK9ouuU -+ehcCuz/mNKvcbO0U59Oh++SvL3sTzIwiEsXXlfEU8L2ApeN2WIrvyQfYo3fw7gp -S0l4PJNgiCL8mdo2yMKi1CxUAGc1bnO/AljwpN3lsKImesrgNqUZFvX9t++uP0D1 -bVoE/c40yiTcdCMbXTMTEl3EASX2MN0CXZ/g1Ue9tOsbobtJSdifWwLziuQkkORi -T0/Br4sOdBeo0XKIanoBScy0RnnGF7HamB4HWfp1IYVl3ZBWzvurpWCdxJ35UrCL -vYf5jysjCiN2O/cz4ckA82n5S6LgTrx+kzmEB/dEcH7+B1rlsazRGMzyNeVJSQjK -Vsk9+w8YfYs7wRPCTY/JTw436R+hDmrfYi7LNQZReSzIJTj0+kuniVyc0uMNOYZK -dHzVWYfCP04MXFL0PfdSgvHqo6z9STQaKPNBiDoT7uje/5kdX7rL6B7yuVBgwDHT -c+XvvqDtMwt0viAgxGds8AgDelWAf0ZOlqf0Hj7h9tgJ4TNkK2PXMl6f+cB7D3hv -l7yTmvmcEpB4eoCHFddydJxVdHixuuFucAS6T6C6aMN7/zHwcz09lCqxC0EOoP5N -iGVreTO01wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB -/zAdBgNVHQ4EFgQU7UQZwNPwBovupHu+QucmVMiONnYwDQYJKoZIhvcNAQELBQAD -ggIBAA2ukDL2pkt8RHYZYR4nKM1eVO8lvOMIkPkp165oCOGUAFjvLi5+U1KMtlwH -6oi6mYtQlNeCgN9hCQCTrQ0U5s7B8jeUeLBfnLOic7iPBZM4zY0+sLj7wM+x8uwt -LRvM7Kqas6pgghstO8OEPVeKlh6cdbjTMM1gCIOQ045U8U1mwF10A0Cj7oV+wh93 -nAbowacYXVKV7cndJZ5t+qntozo00Fl72u1Q8zW/7esUTTHHYPTa8Yec4kjixsU3 -+wYQ+nVZZjFHKdp2mhzpgq7vmrlR94gjmmmVYjzlVYA211QC//G5Xc7UI2/YRYRK -W2XviQzdFKcgyxilJbQN+QHwotL0AMh0jqEqSI5l2xPE4iUXfeu+h1sXIFRRk0pT -AwvsXcoz7WL9RccvW9xYoIA55vrX/hMUpu09lEpCdNTDd1lzzY9GvlU47/rokTLq -l1gEIt44w8y8bckzOmoKaT+gyOpyj4xjhiO9bTyWnpXgSUyqorkqG5w2gXjtw+hG -4iZZRHUe2XWJUc0QhJ1hYMtd+ZciTY6Y5uN/9lu7rs3KSoFrXgvzUeF0K+l+J6fZ -mUlO+KWA2yUPHGNiiskzZ2s8EIPGrd6ozRaOjfAHN3Gf8qv8QfXBi+wAN10J5U6A -7/qxXDgGpRtK4dw4LTzcqx+QGtVKnO7RcGzM7vRX+Bi6hG6H ------END CERTIFICATE----- - -# Issuer: CN=IdenTrust Public Sector Root CA 1 O=IdenTrust -# Subject: CN=IdenTrust Public Sector Root CA 1 O=IdenTrust -# Label: "IdenTrust Public Sector Root CA 1" -# Serial: 13298821034946342390521976156843933698 -# MD5 Fingerprint: 37:06:a5:b0:fc:89:9d:ba:f4:6b:8c:1a:64:cd:d5:ba -# SHA1 Fingerprint: ba:29:41:60:77:98:3f:f4:f3:ef:f2:31:05:3b:2e:ea:6d:4d:45:fd -# SHA256 Fingerprint: 30:d0:89:5a:9a:44:8a:26:20:91:63:55:22:d1:f5:20:10:b5:86:7a:ca:e1:2c:78:ef:95:8f:d4:f4:38:9f:2f ------BEGIN CERTIFICATE----- -MIIFZjCCA06gAwIBAgIQCgFCgAAAAUUjz0Z8AAAAAjANBgkqhkiG9w0BAQsFADBN -MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MSowKAYDVQQDEyFJZGVu -VHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwHhcNMTQwMTE2MTc1MzMyWhcN -MzQwMTE2MTc1MzMyWjBNMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0 -MSowKAYDVQQDEyFJZGVuVHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwggIi -MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2IpT8pEiv6EdrCvsnduTyP4o7 -ekosMSqMjbCpwzFrqHd2hCa2rIFCDQjrVVi7evi8ZX3yoG2LqEfpYnYeEe4IFNGy -RBb06tD6Hi9e28tzQa68ALBKK0CyrOE7S8ItneShm+waOh7wCLPQ5CQ1B5+ctMlS -bdsHyo+1W/CD80/HLaXIrcuVIKQxKFdYWuSNG5qrng0M8gozOSI5Cpcu81N3uURF -/YTLNiCBWS2ab21ISGHKTN9T0a9SvESfqy9rg3LvdYDaBjMbXcjaY8ZNzaxmMc3R -3j6HEDbhuaR672BQssvKplbgN6+rNBM5Jeg5ZuSYeqoSmJxZZoY+rfGwyj4GD3vw -EUs3oERte8uojHH01bWRNszwFcYr3lEXsZdMUD2xlVl8BX0tIdUAvwFnol57plzy -9yLxkA2T26pEUWbMfXYD62qoKjgZl3YNa4ph+bz27nb9cCvdKTz4Ch5bQhyLVi9V -GxyhLrXHFub4qjySjmm2AcG1hp2JDws4lFTo6tyePSW8Uybt1as5qsVATFSrsrTZ -2fjXctscvG29ZV/viDUqZi/u9rNl8DONfJhBaUYPQxxp+pu10GFqzcpL2UyQRqsV -WaFHVCkugyhfHMKiq3IXAAaOReyL4jM9f9oZRORicsPfIsbyVtTdX5Vy7W1f90gD -W/3FKqD2cyOEEBsB5wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ -BAUwAwEB/zAdBgNVHQ4EFgQU43HgntinQtnbcZFrlJPrw6PRFKMwDQYJKoZIhvcN -AQELBQADggIBAEf63QqwEZE4rU1d9+UOl1QZgkiHVIyqZJnYWv6IAcVYpZmxI1Qj -t2odIFflAWJBF9MJ23XLblSQdf4an4EKwt3X9wnQW3IV5B4Jaj0z8yGa5hV+rVHV -DRDtfULAj+7AmgjVQdZcDiFpboBhDhXAuM/FSRJSzL46zNQuOAXeNf0fb7iAaJg9 -TaDKQGXSc3z1i9kKlT/YPyNtGtEqJBnZhbMX73huqVjRI9PHE+1yJX9dsXNw0H8G -lwmEKYBhHfpe/3OsoOOJuBxxFcbeMX8S3OFtm6/n6J91eEyrRjuazr8FGF1NFTwW -mhlQBJqymm9li1JfPFgEKCXAZmExfrngdbkaqIHWchezxQMxNRF4eKLg6TCMf4Df -WN88uieW4oA0beOY02QnrEh+KHdcxiVhJfiFDGX6xDIvpZgF5PgLZxYWxoK4Mhn5 -+bl53B/N66+rDt0b20XkeucC4pVd/GnwU2lhlXV5C15V5jgclKlZM57IcXR5f1GJ -tshquDDIajjDbp7hNxbqBWJMWxJH7ae0s1hWx0nzfxJoCTFx8G34Tkf71oXuxVhA -GaQdp/lLQzfcaFpPz+vCZHTetBXZ9FRUGi8c15dxVJCO2SCdUyt/q4/i6jC8UDfv -8Ue1fXwsBOxonbRJRBD0ckscZOf85muQ3Wl9af0AVqW3rLatt8o+Ae+c ------END CERTIFICATE----- - -# Issuer: CN=Entrust Root Certification Authority - G2 O=Entrust, Inc. OU=See www.entrust.net/legal-terms/(c) 2009 Entrust, Inc. - for authorized use only -# Subject: CN=Entrust Root Certification Authority - G2 O=Entrust, Inc. OU=See www.entrust.net/legal-terms/(c) 2009 Entrust, Inc. - for authorized use only -# Label: "Entrust Root Certification Authority - G2" -# Serial: 1246989352 -# MD5 Fingerprint: 4b:e2:c9:91:96:65:0c:f4:0e:5a:93:92:a0:0a:fe:b2 -# SHA1 Fingerprint: 8c:f4:27:fd:79:0c:3a:d1:66:06:8d:e8:1e:57:ef:bb:93:22:72:d4 -# SHA256 Fingerprint: 43:df:57:74:b0:3e:7f:ef:5f:e4:0d:93:1a:7b:ed:f1:bb:2e:6b:42:73:8c:4e:6d:38:41:10:3d:3a:a7:f3:39 ------BEGIN CERTIFICATE----- -MIIEPjCCAyagAwIBAgIESlOMKDANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMC -VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50 -cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3Qs -IEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVz -dCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwHhcNMDkwNzA3MTcy -NTU0WhcNMzAxMjA3MTc1NTU0WjCBvjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu -dHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwt -dGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0 -aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmlj -YXRpb24gQXV0aG9yaXR5IC0gRzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK -AoIBAQC6hLZy254Ma+KZ6TABp3bqMriVQRrJ2mFOWHLP/vaCeb9zYQYKpSfYs1/T -RU4cctZOMvJyig/3gxnQaoCAAEUesMfnmr8SVycco2gvCoe9amsOXmXzHHfV1IWN -cCG0szLni6LVhjkCsbjSR87kyUnEO6fe+1R9V77w6G7CebI6C1XiUJgWMhNcL3hW -wcKUs/Ja5CeanyTXxuzQmyWC48zCxEXFjJd6BmsqEZ+pCm5IO2/b1BEZQvePB7/1 -U1+cPvQXLOZprE4yTGJ36rfo5bs0vBmLrpxR57d+tVOxMyLlbc9wPBr64ptntoP0 -jaWvYkxN4FisZDQSA/i2jZRjJKRxAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAP -BgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqciZ60B7vfec7aVHUbI2fkBJmqzAN -BgkqhkiG9w0BAQsFAAOCAQEAeZ8dlsa2eT8ijYfThwMEYGprmi5ZiXMRrEPR9RP/ -jTkrwPK9T3CMqS/qF8QLVJ7UG5aYMzyorWKiAHarWWluBh1+xLlEjZivEtRh2woZ -Rkfz6/djwUAFQKXSt/S1mja/qYh2iARVBCuch38aNzx+LaUa2NSJXsq9rD1s2G2v -1fN2D807iDginWyTmsQ9v4IbZT+mD12q/OWyFcq1rca8PdCE6OoGcrBNOTJ4vz4R -nAuknZoh8/CbCzB428Hch0P+vGOaysXCHMnHjf87ElgI5rY97HosTvuDls4MPGmH -VHOkc8KT/1EQrBVUAdj8BbGJoX90g5pJ19xOe4pIb4tF9g== ------END CERTIFICATE----- - -# Issuer: CN=Entrust Root Certification Authority - EC1 O=Entrust, Inc. OU=See www.entrust.net/legal-terms/(c) 2012 Entrust, Inc. - for authorized use only -# Subject: CN=Entrust Root Certification Authority - EC1 O=Entrust, Inc. OU=See www.entrust.net/legal-terms/(c) 2012 Entrust, Inc. - for authorized use only -# Label: "Entrust Root Certification Authority - EC1" -# Serial: 51543124481930649114116133369 -# MD5 Fingerprint: b6:7e:1d:f0:58:c5:49:6c:24:3b:3d:ed:98:18:ed:bc -# SHA1 Fingerprint: 20:d8:06:40:df:9b:25:f5:12:25:3a:11:ea:f7:59:8a:eb:14:b5:47 -# SHA256 Fingerprint: 02:ed:0e:b2:8c:14:da:45:16:5c:56:67:91:70:0d:64:51:d7:fb:56:f0:b2:ab:1d:3b:8e:b0:70:e5:6e:df:f5 ------BEGIN CERTIFICATE----- -MIIC+TCCAoCgAwIBAgINAKaLeSkAAAAAUNCR+TAKBggqhkjOPQQDAzCBvzELMAkG -A1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3 -d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDEyIEVu -dHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEzMDEGA1UEAxMq -RW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRUMxMB4XDTEy -MTIxODE1MjUzNloXDTM3MTIxODE1NTUzNlowgb8xCzAJBgNVBAYTAlVTMRYwFAYD -VQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0 -L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxMiBFbnRydXN0LCBJbmMuIC0g -Zm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMzAxBgNVBAMTKkVudHJ1c3QgUm9vdCBD -ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEVDMTB2MBAGByqGSM49AgEGBSuBBAAi -A2IABIQTydC6bUF74mzQ61VfZgIaJPRbiWlH47jCffHyAsWfoPZb1YsGGYZPUxBt -ByQnoaD41UcZYUx9ypMn6nQM72+WCf5j7HBdNq1nd67JnXxVRDqiY1Ef9eNi1KlH -Bz7MIKNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O -BBYEFLdj5xrdjekIplWDpOBqUEFlEUJJMAoGCCqGSM49BAMDA2cAMGQCMGF52OVC -R98crlOZF7ZvHH3hvxGU0QOIdeSNiaSKd0bebWHvAvX7td/M/k7//qnmpwIwW5nX -hTcGtXsI/esni0qU+eH6p44mCOh8kmhtc9hvJqwhAriZtyZBWyVgrtBIGu4G ------END CERTIFICATE----- - -# Issuer: CN=CFCA EV ROOT O=China Financial Certification Authority -# Subject: CN=CFCA EV ROOT O=China Financial Certification Authority -# Label: "CFCA EV ROOT" -# Serial: 407555286 -# MD5 Fingerprint: 74:e1:b6:ed:26:7a:7a:44:30:33:94:ab:7b:27:81:30 -# SHA1 Fingerprint: e2:b8:29:4b:55:84:ab:6b:58:c2:90:46:6c:ac:3f:b8:39:8f:84:83 -# SHA256 Fingerprint: 5c:c3:d7:8e:4e:1d:5e:45:54:7a:04:e6:87:3e:64:f9:0c:f9:53:6d:1c:cc:2e:f8:00:f3:55:c4:c5:fd:70:fd ------BEGIN CERTIFICATE----- -MIIFjTCCA3WgAwIBAgIEGErM1jANBgkqhkiG9w0BAQsFADBWMQswCQYDVQQGEwJD -TjEwMC4GA1UECgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9y -aXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJPT1QwHhcNMTIwODA4MDMwNzAxWhcNMjkx -MjMxMDMwNzAxWjBWMQswCQYDVQQGEwJDTjEwMC4GA1UECgwnQ2hpbmEgRmluYW5j -aWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJP -T1QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDXXWvNED8fBVnVBU03 -sQ7smCuOFR36k0sXgiFxEFLXUWRwFsJVaU2OFW2fvwwbwuCjZ9YMrM8irq93VCpL -TIpTUnrD7i7es3ElweldPe6hL6P3KjzJIx1qqx2hp/Hz7KDVRM8Vz3IvHWOX6Jn5 -/ZOkVIBMUtRSqy5J35DNuF++P96hyk0g1CXohClTt7GIH//62pCfCqktQT+x8Rgp -7hZZLDRJGqgG16iI0gNyejLi6mhNbiyWZXvKWfry4t3uMCz7zEasxGPrb382KzRz -EpR/38wmnvFyXVBlWY9ps4deMm/DGIq1lY+wejfeWkU7xzbh72fROdOXW3NiGUgt -hxwG+3SYIElz8AXSG7Ggo7cbcNOIabla1jj0Ytwli3i/+Oh+uFzJlU9fpy25IGvP -a931DfSCt/SyZi4QKPaXWnuWFo8BGS1sbn85WAZkgwGDg8NNkt0yxoekN+kWzqot -aK8KgWU6cMGbrU1tVMoqLUuFG7OA5nBFDWteNfB/O7ic5ARwiRIlk9oKmSJgamNg -TnYGmE69g60dWIolhdLHZR4tjsbftsbhf4oEIRUpdPA+nJCdDC7xij5aqgwJHsfV -PKPtl8MeNPo4+QgO48BdK4PRVmrJtqhUUy54Mmc9gn900PvhtgVguXDbjgv5E1hv -cWAQUhC5wUEJ73IfZzF4/5YFjQIDAQABo2MwYTAfBgNVHSMEGDAWgBTj/i39KNAL -tbq2osS/BqoFjJP7LzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd -BgNVHQ4EFgQU4/4t/SjQC7W6tqLEvwaqBYyT+y8wDQYJKoZIhvcNAQELBQADggIB -ACXGumvrh8vegjmWPfBEp2uEcwPenStPuiB/vHiyz5ewG5zz13ku9Ui20vsXiObT -ej/tUxPQ4i9qecsAIyjmHjdXNYmEwnZPNDatZ8POQQaIxffu2Bq41gt/UP+TqhdL -jOztUmCypAbqTuv0axn96/Ua4CUqmtzHQTb3yHQFhDmVOdYLO6Qn+gjYXB74BGBS -ESgoA//vU2YApUo0FmZ8/Qmkrp5nGm9BC2sGE5uPhnEFtC+NiWYzKXZUmhH4J/qy -P5Hgzg0b8zAarb8iXRvTvyUFTeGSGn+ZnzxEk8rUQElsgIfXBDrDMlI1Dlb4pd19 -xIsNER9Tyx6yF7Zod1rg1MvIB671Oi6ON7fQAUtDKXeMOZePglr4UeWJoBjnaH9d -Ci77o0cOPaYjesYBx4/IXr9tgFa+iiS6M+qf4TIRnvHST4D2G0CvOJ4RUHlzEhLN -5mydLIhyPDCBBpEi6lmt2hkuIsKNuYyH4Ga8cyNfIWRjgEj1oDwYPZTISEEdQLpe -/v5WOaHIz16eGWRGENoXkbcFgKyLmZJ956LYBws2J+dIeWCKw9cTXPhyQN9Ky8+Z -AAoACxGV2lZFA4gKn2fQ1XmxqI1AbQ3CekD6819kR5LLU7m7Wc5P/dAVUwHY3+vZ -5nbv0CO7O6l5s9UCKc2Jo5YPSjXnTkLAdc0Hz+Ys63su ------END CERTIFICATE----- - -# Issuer: CN=OISTE WISeKey Global Root GB CA O=WISeKey OU=OISTE Foundation Endorsed -# Subject: CN=OISTE WISeKey Global Root GB CA O=WISeKey OU=OISTE Foundation Endorsed -# Label: "OISTE WISeKey Global Root GB CA" -# Serial: 157768595616588414422159278966750757568 -# MD5 Fingerprint: a4:eb:b9:61:28:2e:b7:2f:98:b0:35:26:90:99:51:1d -# SHA1 Fingerprint: 0f:f9:40:76:18:d3:d7:6a:4b:98:f0:a8:35:9e:0c:fd:27:ac:cc:ed -# SHA256 Fingerprint: 6b:9c:08:e8:6e:b0:f7:67:cf:ad:65:cd:98:b6:21:49:e5:49:4a:67:f5:84:5e:7b:d1:ed:01:9f:27:b8:6b:d6 ------BEGIN CERTIFICATE----- -MIIDtTCCAp2gAwIBAgIQdrEgUnTwhYdGs/gjGvbCwDANBgkqhkiG9w0BAQsFADBt -MQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUg -Rm91bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9i -YWwgUm9vdCBHQiBDQTAeFw0xNDEyMDExNTAwMzJaFw0zOTEyMDExNTEwMzFaMG0x -CzAJBgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBG -b3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2Jh -bCBSb290IEdCIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2Be3 -HEokKtaXscriHvt9OO+Y9bI5mE4nuBFde9IllIiCFSZqGzG7qFshISvYD06fWvGx -WuR51jIjK+FTzJlFXHtPrby/h0oLS5daqPZI7H17Dc0hBt+eFf1Biki3IPShehtX -1F1Q/7pn2COZH8g/497/b1t3sWtuuMlk9+HKQUYOKXHQuSP8yYFfTvdv37+ErXNk -u7dCjmn21HYdfp2nuFeKUWdy19SouJVUQHMD9ur06/4oQnc/nSMbsrY9gBQHTC5P -99UKFg29ZkM3fiNDecNAhvVMKdqOmq0NpQSHiB6F4+lT1ZvIiwNjeOvgGUpuuy9r -M2RYk61pv48b74JIxwIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw -AwEB/zAdBgNVHQ4EFgQUNQ/INmNe4qPs+TtmFc5RUuORmj0wEAYJKwYBBAGCNxUB -BAMCAQAwDQYJKoZIhvcNAQELBQADggEBAEBM+4eymYGQfp3FsLAmzYh7KzKNbrgh -cViXfa43FK8+5/ea4n32cZiZBKpDdHij40lhPnOMTZTg+XHEthYOU3gf1qKHLwI5 -gSk8rxWYITD+KJAAjNHhy/peyP34EEY7onhCkRd0VQreUGdNZtGn//3ZwLWoo4rO -ZvUPQ82nK1d7Y0Zqqi5S2PTt4W2tKZB4SLrhI6qjiey1q5bAtEuiHZeeevJuQHHf -aPFlTc58Bd9TZaml8LGXBHAVRgOY1NK/VLSgWH1Sb9pWJmLU2NuJMW8c8CLC02Ic -Nc1MaRVUGpCY3useX8p3x8uOPUNpnJpY0CQ73xtAln41rYHHTnG6iBM= ------END CERTIFICATE----- - -# Issuer: CN=SZAFIR ROOT CA2 O=Krajowa Izba Rozliczeniowa S.A. -# Subject: CN=SZAFIR ROOT CA2 O=Krajowa Izba Rozliczeniowa S.A. -# Label: "SZAFIR ROOT CA2" -# Serial: 357043034767186914217277344587386743377558296292 -# MD5 Fingerprint: 11:64:c1:89:b0:24:b1:8c:b1:07:7e:89:9e:51:9e:99 -# SHA1 Fingerprint: e2:52:fa:95:3f:ed:db:24:60:bd:6e:28:f3:9c:cc:cf:5e:b3:3f:de -# SHA256 Fingerprint: a1:33:9d:33:28:1a:0b:56:e5:57:d3:d3:2b:1c:e7:f9:36:7e:b0:94:bd:5f:a7:2a:7e:50:04:c8:de:d7:ca:fe ------BEGIN CERTIFICATE----- -MIIDcjCCAlqgAwIBAgIUPopdB+xV0jLVt+O2XwHrLdzk1uQwDQYJKoZIhvcNAQEL -BQAwUTELMAkGA1UEBhMCUEwxKDAmBgNVBAoMH0tyYWpvd2EgSXpiYSBSb3psaWN6 -ZW5pb3dhIFMuQS4xGDAWBgNVBAMMD1NaQUZJUiBST09UIENBMjAeFw0xNTEwMTkw -NzQzMzBaFw0zNTEwMTkwNzQzMzBaMFExCzAJBgNVBAYTAlBMMSgwJgYDVQQKDB9L -cmFqb3dhIEl6YmEgUm96bGljemVuaW93YSBTLkEuMRgwFgYDVQQDDA9TWkFGSVIg -Uk9PVCBDQTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3vD5QqEvN -QLXOYeeWyrSh2gwisPq1e3YAd4wLz32ohswmUeQgPYUM1ljj5/QqGJ3a0a4m7utT -3PSQ1hNKDJA8w/Ta0o4NkjrcsbH/ON7Dui1fgLkCvUqdGw+0w8LBZwPd3BucPbOw -3gAeqDRHu5rr/gsUvTaE2g0gv/pby6kWIK05YO4vdbbnl5z5Pv1+TW9NL++IDWr6 -3fE9biCloBK0TXC5ztdyO4mTp4CEHCdJckm1/zuVnsHMyAHs6A6KCpbns6aH5db5 -BSsNl0BwPLqsdVqc1U2dAgrSS5tmS0YHF2Wtn2yIANwiieDhZNRnvDF5YTy7ykHN -XGoAyDw4jlivAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD -AgEGMB0GA1UdDgQWBBQuFqlKGLXLzPVvUPMjX/hd56zwyDANBgkqhkiG9w0BAQsF -AAOCAQEAtXP4A9xZWx126aMqe5Aosk3AM0+qmrHUuOQn/6mWmc5G4G18TKI4pAZw -8PRBEew/R40/cof5O/2kbytTAOD/OblqBw7rHRz2onKQy4I9EYKL0rufKq8h5mOG -nXkZ7/e7DDWQw4rtTw/1zBLZpD67oPwglV9PJi8RI4NOdQcPv5vRtB3pEAT+ymCP -oky4rc/hkA/NrgrHXXu3UNLUYfrVFdvXn4dRVOul4+vJhaAlIDf7js4MNIThPIGy -d05DpYhfhmehPea0XGG2Ptv+tyjFogeutcrKjSoS75ftwjCkySp6+/NNIxuZMzSg -LvWpCz/UXeHPhJ/iGcJfitYgHuNztw== ------END CERTIFICATE----- - -# Issuer: CN=Certum Trusted Network CA 2 O=Unizeto Technologies S.A. OU=Certum Certification Authority -# Subject: CN=Certum Trusted Network CA 2 O=Unizeto Technologies S.A. OU=Certum Certification Authority -# Label: "Certum Trusted Network CA 2" -# Serial: 44979900017204383099463764357512596969 -# MD5 Fingerprint: 6d:46:9e:d9:25:6d:08:23:5b:5e:74:7d:1e:27:db:f2 -# SHA1 Fingerprint: d3:dd:48:3e:2b:bf:4c:05:e8:af:10:f5:fa:76:26:cf:d3:dc:30:92 -# SHA256 Fingerprint: b6:76:f2:ed:da:e8:77:5c:d3:6c:b0:f6:3c:d1:d4:60:39:61:f4:9e:62:65:ba:01:3a:2f:03:07:b6:d0:b8:04 ------BEGIN CERTIFICATE----- -MIIF0jCCA7qgAwIBAgIQIdbQSk8lD8kyN/yqXhKN6TANBgkqhkiG9w0BAQ0FADCB -gDELMAkGA1UEBhMCUEwxIjAgBgNVBAoTGVVuaXpldG8gVGVjaG5vbG9naWVzIFMu -QS4xJzAlBgNVBAsTHkNlcnR1bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEkMCIG -A1UEAxMbQ2VydHVtIFRydXN0ZWQgTmV0d29yayBDQSAyMCIYDzIwMTExMDA2MDgz -OTU2WhgPMjA0NjEwMDYwODM5NTZaMIGAMQswCQYDVQQGEwJQTDEiMCAGA1UEChMZ -VW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRp -ZmljYXRpb24gQXV0aG9yaXR5MSQwIgYDVQQDExtDZXJ0dW0gVHJ1c3RlZCBOZXR3 -b3JrIENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9+Xj45tWA -DGSdhhuWZGc/IjoedQF97/tcZ4zJzFxrqZHmuULlIEub2pt7uZld2ZuAS9eEQCsn -0+i6MLs+CRqnSZXvK0AkwpfHp+6bJe+oCgCXhVqqndwpyeI1B+twTUrWwbNWuKFB -OJvR+zF/j+Bf4bE/D44WSWDXBo0Y+aomEKsq09DRZ40bRr5HMNUuctHFY9rnY3lE -fktjJImGLjQ/KUxSiyqnwOKRKIm5wFv5HdnnJ63/mgKXwcZQkpsCLL2puTRZCr+E -Sv/f/rOf69me4Jgj7KZrdxYq28ytOxykh9xGc14ZYmhFV+SQgkK7QtbwYeDBoz1m -o130GO6IyY0XRSmZMnUCMe4pJshrAua1YkV/NxVaI2iJ1D7eTiew8EAMvE0Xy02i -sx7QBlrd9pPPV3WZ9fqGGmd4s7+W/jTcvedSVuWz5XV710GRBdxdaeOVDUO5/IOW -OZV7bIBaTxNyxtd9KXpEulKkKtVBRgkg/iKgtlswjbyJDNXXcPiHUv3a76xRLgez -Tv7QCdpw75j6VuZt27VXS9zlLCUVyJ4ueE742pyehizKV/Ma5ciSixqClnrDvFAS -adgOWkaLOusm+iPJtrCBvkIApPjW/jAux9JG9uWOdf3yzLnQh1vMBhBgu4M1t15n -3kfsmUjxpKEV/q2MYo45VU85FrmxY53/twIDAQABo0IwQDAPBgNVHRMBAf8EBTAD -AQH/MB0GA1UdDgQWBBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMC -AQYwDQYJKoZIhvcNAQENBQADggIBAHGlDs7k6b8/ONWJWsQCYftMxRQXLYtPU2sQ -F/xlhMcQSZDe28cmk4gmb3DWAl45oPePq5a1pRNcgRRtDoGCERuKTsZPpd1iHkTf -CVn0W3cLN+mLIMb4Ck4uWBzrM9DPhmDJ2vuAL55MYIR4PSFk1vtBHxgP58l1cb29 -XN40hz5BsA72udY/CROWFC/emh1auVbONTqwX3BNXuMp8SMoclm2q8KMZiYcdywm -djWLKKdpoPk79SPdhRB0yZADVpHnr7pH1BKXESLjokmUbOe3lEu6LaTaM4tMpkT/ -WjzGHWTYtTHkpjx6qFcL2+1hGsvxznN3Y6SHb0xRONbkX8eftoEq5IVIeVheO/jb -AoJnwTnbw3RLPTYe+SmTiGhbqEQZIfCn6IENLOiTNrQ3ssqwGyZ6miUfmpqAnksq -P/ujmv5zMnHCnsZy4YpoJ/HkD7TETKVhk/iXEAcqMCWpuchxuO9ozC1+9eB+D4Ko -b7a6bINDd82Kkhehnlt4Fj1F4jNy3eFmypnTycUm/Q1oBEauttmbjL4ZvrHG8hnj -XALKLNhvSgfZyTXaQHXyxKcZb55CEJh15pWLYLztxRLXis7VmFxWlgPF7ncGNf/P -5O4/E2Hu29othfDNrp2yGAlFw5Khchf8R7agCyzxxN5DaAhqXzvwdmP7zAYspsbi -DrW5viSP ------END CERTIFICATE----- - -# Issuer: CN=Hellenic Academic and Research Institutions RootCA 2015 O=Hellenic Academic and Research Institutions Cert. Authority -# Subject: CN=Hellenic Academic and Research Institutions RootCA 2015 O=Hellenic Academic and Research Institutions Cert. Authority -# Label: "Hellenic Academic and Research Institutions RootCA 2015" -# Serial: 0 -# MD5 Fingerprint: ca:ff:e2:db:03:d9:cb:4b:e9:0f:ad:84:fd:7b:18:ce -# SHA1 Fingerprint: 01:0c:06:95:a6:98:19:14:ff:bf:5f:c6:b0:b6:95:ea:29:e9:12:a6 -# SHA256 Fingerprint: a0:40:92:9a:02:ce:53:b4:ac:f4:f2:ff:c6:98:1c:e4:49:6f:75:5e:6d:45:fe:0b:2a:69:2b:cd:52:52:3f:36 ------BEGIN CERTIFICATE----- -MIIGCzCCA/OgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBpjELMAkGA1UEBhMCR1Ix -DzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5k -IFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMT -N0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9v -dENBIDIwMTUwHhcNMTUwNzA3MTAxMTIxWhcNNDAwNjMwMTAxMTIxWjCBpjELMAkG -A1UEBhMCR1IxDzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNh -ZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkx -QDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1 -dGlvbnMgUm9vdENBIDIwMTUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC -AQDC+Kk/G4n8PDwEXT2QNrCROnk8ZlrvbTkBSRq0t89/TSNTt5AA4xMqKKYx8ZEA -4yjsriFBzh/a/X0SWwGDD7mwX5nh8hKDgE0GPt+sr+ehiGsxr/CL0BgzuNtFajT0 -AoAkKAoCFZVedioNmToUW/bLy1O8E00BiDeUJRtCvCLYjqOWXjrZMts+6PAQZe10 -4S+nfK8nNLspfZu2zwnI5dMK/IhlZXQK3HMcXM1AsRzUtoSMTFDPaI6oWa7CJ06C -ojXdFPQf/7J31Ycvqm59JCfnxssm5uX+Zwdj2EUN3TpZZTlYepKZcj2chF6IIbjV -9Cz82XBST3i4vTwri5WY9bPRaM8gFH5MXF/ni+X1NYEZN9cRCLdmvtNKzoNXADrD -gfgXy5I2XdGj2HUb4Ysn6npIQf1FGQatJ5lOwXBH3bWfgVMS5bGMSF0xQxfjjMZ6 -Y5ZLKTBOhE5iGV48zpeQpX8B653g+IuJ3SWYPZK2fu/Z8VFRfS0myGlZYeCsargq -NhEEelC9MoS+L9xy1dcdFkfkR2YgP/SWxa+OAXqlD3pk9Q0Yh9muiNX6hME6wGko -LfINaFGq46V3xqSQDqE3izEjR8EJCOtu93ib14L8hCCZSRm2Ekax+0VVFqmjZayc -Bw/qa9wfLgZy7IaIEuQt218FL+TwA9MmM+eAws1CoRc0CwIDAQABo0IwQDAPBgNV -HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUcRVnyMjJvXVd -ctA4GGqd83EkVAswDQYJKoZIhvcNAQELBQADggIBAHW7bVRLqhBYRjTyYtcWNl0I -XtVsyIe9tC5G8jH4fOpCtZMWVdyhDBKg2mF+D1hYc2Ryx+hFjtyp8iY/xnmMsVMI -M4GwVhO+5lFc2JsKT0ucVlMC6U/2DWDqTUJV6HwbISHTGzrMd/K4kPFox/la/vot -9L/J9UUbzjgQKjeKeaO04wlshYaT/4mWJ3iBj2fjRnRUjtkNaeJK9E10A/+yd+2V -Z5fkscWrv2oj6NSU4kQoYsRL4vDY4ilrGnB+JGGTe08DMiUNRSQrlrRGar9KC/ea -j8GsGsVn82800vpzY4zvFrCopEYq+OsS7HK07/grfoxSwIuEVPkvPuNVqNxmsdnh -X9izjFk0WaSrT2y7HxjbdavYy5LNlDhhDgcGH0tGEPEVvo2FXDtKK4F5D7Rpn0lQ -l033DlZdwJVqwjbDG2jJ9SrcR5q+ss7FJej6A7na+RZukYT1HCjI/CbM1xyQVqdf -bzoEvM14iQuODy+jqk+iGxI9FghAD/FGTNeqewjBCvVtJ94Cj8rDtSvK6evIIVM4 -pcw72Hc3MKJP2W/R8kCtQXoXxdZKNYm3QdV8hn9VTYNKpXMgwDqvkPGaJI7ZjnHK -e7iG2rKPmT4dEw0SEe7Uq/DpFXYC5ODfqiAeW2GFZECpkJcNrVPSWh2HagCXZWK0 -vm9qp/UsQu0yrbYhnr68 ------END CERTIFICATE----- - -# Issuer: CN=Hellenic Academic and Research Institutions ECC RootCA 2015 O=Hellenic Academic and Research Institutions Cert. Authority -# Subject: CN=Hellenic Academic and Research Institutions ECC RootCA 2015 O=Hellenic Academic and Research Institutions Cert. Authority -# Label: "Hellenic Academic and Research Institutions ECC RootCA 2015" -# Serial: 0 -# MD5 Fingerprint: 81:e5:b4:17:eb:c2:f5:e1:4b:0d:41:7b:49:92:fe:ef -# SHA1 Fingerprint: 9f:f1:71:8d:92:d5:9a:f3:7d:74:97:b4:bc:6f:84:68:0b:ba:b6:66 -# SHA256 Fingerprint: 44:b5:45:aa:8a:25:e6:5a:73:ca:15:dc:27:fc:36:d2:4c:1c:b9:95:3a:06:65:39:b1:15:82:dc:48:7b:48:33 ------BEGIN CERTIFICATE----- -MIICwzCCAkqgAwIBAgIBADAKBggqhkjOPQQDAjCBqjELMAkGA1UEBhMCR1IxDzAN -BgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl -c2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxRDBCBgNVBAMTO0hl -bGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgRUNDIFJv -b3RDQSAyMDE1MB4XDTE1MDcwNzEwMzcxMloXDTQwMDYzMDEwMzcxMlowgaoxCzAJ -BgNVBAYTAkdSMQ8wDQYDVQQHEwZBdGhlbnMxRDBCBgNVBAoTO0hlbGxlbmljIEFj -YWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9yaXR5 -MUQwQgYDVQQDEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0 -dXRpb25zIEVDQyBSb290Q0EgMjAxNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABJKg -QehLgoRc4vgxEZmGZE4JJS+dQS8KrjVPdJWyUWRrjWvmP3CV8AVER6ZyOFB2lQJa -jq4onvktTpnvLEhvTCUp6NFxW98dwXU3tNf6e3pCnGoKVlp8aQuqgAkkbH7BRqNC -MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLQi -C4KZJAEOnLvkDv2/+5cgk5kqMAoGCCqGSM49BAMCA2cAMGQCMGfOFmI4oqxiRaep -lSTAGiecMjvAwNW6qef4BENThe5SId6d9SWDPp5YSy/XZxMOIQIwBeF1Ad5o7Sof -TUwJCA3sS61kFyjndc5FZXIhF8siQQ6ME5g4mlRtm8rifOoCWCKR ------END CERTIFICATE----- - -# Issuer: CN=ISRG Root X1 O=Internet Security Research Group -# Subject: CN=ISRG Root X1 O=Internet Security Research Group -# Label: "ISRG Root X1" -# Serial: 172886928669790476064670243504169061120 -# MD5 Fingerprint: 0c:d2:f9:e0:da:17:73:e9:ed:86:4d:a5:e3:70:e7:4e -# SHA1 Fingerprint: ca:bd:2a:79:a1:07:6a:31:f2:1d:25:36:35:cb:03:9d:43:29:a5:e8 -# SHA256 Fingerprint: 96:bc:ec:06:26:49:76:f3:74:60:77:9a:cf:28:c5:a7:cf:e8:a3:c0:aa:e1:1a:8f:fc:ee:05:c0:bd:df:08:c6 ------BEGIN CERTIFICATE----- -MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAw -TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh -cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4 -WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJu -ZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBY -MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54rVygc -h77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+ -0TM8ukj13Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6U -A5/TR5d8mUgjU+g4rk8Kb4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sW -T8KOEUt+zwvo/7V3LvSye0rgTBIlDHCNAymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyH -B5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ4Q7e2RCOFvu396j3x+UC -B5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf1b0SHzUv -KBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWn -OlFuhjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTn -jh8BCNAw1FtxNrQHusEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbw -qHyGO0aoSCqI3Haadr8faqU9GY/rOPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CI -rU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV -HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY9umbbjANBgkq -hkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL -ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ -3BebYhtF8GaV0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KK -NFtY2PwByVS5uCbMiogziUwthDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5 -ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJwTdwJx4nLCgdNbOhdjsnvzqvHu7Ur -TkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nxe5AW0wdeRlN8NwdC -jNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZAJzVc -oyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq -4RgqsahDYVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPA -mRGunUHBcnWEvgJBQl9nJEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57d -emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCc= ------END CERTIFICATE----- - -# Issuer: O=FNMT-RCM OU=AC RAIZ FNMT-RCM -# Subject: O=FNMT-RCM OU=AC RAIZ FNMT-RCM -# Label: "AC RAIZ FNMT-RCM" -# Serial: 485876308206448804701554682760554759 -# MD5 Fingerprint: e2:09:04:b4:d3:bd:d1:a0:14:fd:1a:d2:47:c4:57:1d -# SHA1 Fingerprint: ec:50:35:07:b2:15:c4:95:62:19:e2:a8:9a:5b:42:99:2c:4c:2c:20 -# SHA256 Fingerprint: eb:c5:57:0c:29:01:8c:4d:67:b1:aa:12:7b:af:12:f7:03:b4:61:1e:bc:17:b7:da:b5:57:38:94:17:9b:93:fa ------BEGIN CERTIFICATE----- -MIIFgzCCA2ugAwIBAgIPXZONMGc2yAYdGsdUhGkHMA0GCSqGSIb3DQEBCwUAMDsx -CzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJ -WiBGTk1ULVJDTTAeFw0wODEwMjkxNTU5NTZaFw0zMDAxMDEwMDAwMDBaMDsxCzAJ -BgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBG -Tk1ULVJDTTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALpxgHpMhm5/ -yBNtwMZ9HACXjywMI7sQmkCpGreHiPibVmr75nuOi5KOpyVdWRHbNi63URcfqQgf -BBckWKo3Shjf5TnUV/3XwSyRAZHiItQDwFj8d0fsjz50Q7qsNI1NOHZnjrDIbzAz -WHFctPVrbtQBULgTfmxKo0nRIBnuvMApGGWn3v7v3QqQIecaZ5JCEJhfTzC8PhxF -tBDXaEAUwED653cXeuYLj2VbPNmaUtu1vZ5Gzz3rkQUCwJaydkxNEJY7kvqcfw+Z -374jNUUeAlz+taibmSXaXvMiwzn15Cou08YfxGyqxRxqAQVKL9LFwag0Jl1mpdIC -IfkYtwb1TplvqKtMUejPUBjFd8g5CSxJkjKZqLsXF3mwWsXmo8RZZUc1g16p6DUL -mbvkzSDGm0oGObVo/CK67lWMK07q87Hj/LaZmtVC+nFNCM+HHmpxffnTtOmlcYF7 -wk5HlqX2doWjKI/pgG6BU6VtX7hI+cL5NqYuSf+4lsKMB7ObiFj86xsc3i1w4peS -MKGJ47xVqCfWS+2QrYv6YyVZLag13cqXM7zlzced0ezvXg5KkAYmY6252TUtB7p2 -ZSysV4999AeU14ECll2jB0nVetBX+RvnU0Z1qrB5QstocQjpYL05ac70r8NWQMet -UqIJ5G+GR4of6ygnXYMgrwTJbFaai0b1AgMBAAGjgYMwgYAwDwYDVR0TAQH/BAUw -AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFPd9xf3E6Jobd2Sn9R2gzL+H -YJptMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1odHRwOi8vd3d3 -LmNlcnQuZm5tdC5lcy9kcGNzLzANBgkqhkiG9w0BAQsFAAOCAgEAB5BK3/MjTvDD -nFFlm5wioooMhfNzKWtN/gHiqQxjAb8EZ6WdmF/9ARP67Jpi6Yb+tmLSbkyU+8B1 -RXxlDPiyN8+sD8+Nb/kZ94/sHvJwnvDKuO+3/3Y3dlv2bojzr2IyIpMNOmqOFGYM -LVN0V2Ue1bLdI4E7pWYjJ2cJj+F3qkPNZVEI7VFY/uY5+ctHhKQV8Xa7pO6kO8Rf -77IzlhEYt8llvhjho6Tc+hj507wTmzl6NLrTQfv6MooqtyuGC2mDOL7Nii4LcK2N -JpLuHvUBKwrZ1pebbuCoGRw6IYsMHkCtA+fdZn71uSANA+iW+YJF1DngoABd15jm -fZ5nc8OaKveri6E6FO80vFIOiZiaBECEHX5FaZNXzuvO+FB8TxxuBEOb+dY7Ixjp -6o7RTUaN8Tvkasq6+yO3m/qZASlaWFot4/nUbQ4mrcFuNLwy+AwF+mWj2zs3gyLp -1txyM/1d8iC9djwj2ij3+RvrWWTV3F9yfiD8zYm1kGdNYno/Tq0dwzn+evQoFt9B -9kiABdcPUXmsEKvU7ANm5mqwujGSQkBqvjrTcuFqN1W8rB2Vt2lh8kORdOag0wok -RqEIr9baRRmW1FMdW4R58MD3R++Lj8UGrp1MYp3/RgT408m2ECVAdf4WqslKYIYv -uu8wd+RU4riEmViAqhOLUTpPSPaLtrM= ------END CERTIFICATE----- - -# Issuer: CN=Amazon Root CA 1 O=Amazon -# Subject: CN=Amazon Root CA 1 O=Amazon -# Label: "Amazon Root CA 1" -# Serial: 143266978916655856878034712317230054538369994 -# MD5 Fingerprint: 43:c6:bf:ae:ec:fe:ad:2f:18:c6:88:68:30:fc:c8:e6 -# SHA1 Fingerprint: 8d:a7:f9:65:ec:5e:fc:37:91:0f:1c:6e:59:fd:c1:cc:6a:6e:de:16 -# SHA256 Fingerprint: 8e:cd:e6:88:4f:3d:87:b1:12:5b:a3:1a:c3:fc:b1:3d:70:16:de:7f:57:cc:90:4f:e1:cb:97:c6:ae:98:19:6e ------BEGIN CERTIFICATE----- -MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF -ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 -b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL -MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv -b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj -ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM -9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw -IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 -VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L -93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm -jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC -AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA -A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI -U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs -N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv -o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU -5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy -rqXRfboQnoZsG4q5WTP468SQvvG5 ------END CERTIFICATE----- - -# Issuer: CN=Amazon Root CA 2 O=Amazon -# Subject: CN=Amazon Root CA 2 O=Amazon -# Label: "Amazon Root CA 2" -# Serial: 143266982885963551818349160658925006970653239 -# MD5 Fingerprint: c8:e5:8d:ce:a8:42:e2:7a:c0:2a:5c:7c:9e:26:bf:66 -# SHA1 Fingerprint: 5a:8c:ef:45:d7:a6:98:59:76:7a:8c:8b:44:96:b5:78:cf:47:4b:1a -# SHA256 Fingerprint: 1b:a5:b2:aa:8c:65:40:1a:82:96:01:18:f8:0b:ec:4f:62:30:4d:83:ce:c4:71:3a:19:c3:9c:01:1e:a4:6d:b4 ------BEGIN CERTIFICATE----- -MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF -ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 -b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL -MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv -b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK -gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ -W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg -1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K -8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r -2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me -z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR -8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj -mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz -7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 -+XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI -0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB -Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm -UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 -LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY -+gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS -k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl -7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm -btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl -urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ -fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 -n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE -76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H -9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT -4PsJYGw= ------END CERTIFICATE----- - -# Issuer: CN=Amazon Root CA 3 O=Amazon -# Subject: CN=Amazon Root CA 3 O=Amazon -# Label: "Amazon Root CA 3" -# Serial: 143266986699090766294700635381230934788665930 -# MD5 Fingerprint: a0:d4:ef:0b:f7:b5:d8:49:95:2a:ec:f5:c4:fc:81:87 -# SHA1 Fingerprint: 0d:44:dd:8c:3c:8c:1a:1a:58:75:64:81:e9:0f:2e:2a:ff:b3:d2:6e -# SHA256 Fingerprint: 18:ce:6c:fe:7b:f1:4e:60:b2:e3:47:b8:df:e8:68:cb:31:d0:2e:bb:3a:da:27:15:69:f5:03:43:b4:6d:b3:a4 ------BEGIN CERTIFICATE----- -MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5 -MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g -Um9vdCBDQSAzMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG -A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg -Q0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZBf8ANm+gBG1bG8lKl -ui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjrZt6j -QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSr -ttvXBp43rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkr -BqWTrBqYaGFy+uGh0PsceGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteM -YyRIHN8wfdVoOw== ------END CERTIFICATE----- - -# Issuer: CN=Amazon Root CA 4 O=Amazon -# Subject: CN=Amazon Root CA 4 O=Amazon -# Label: "Amazon Root CA 4" -# Serial: 143266989758080763974105200630763877849284878 -# MD5 Fingerprint: 89:bc:27:d5:eb:17:8d:06:6a:69:d5:fd:89:47:b4:cd -# SHA1 Fingerprint: f6:10:84:07:d6:f8:bb:67:98:0c:c2:e2:44:c2:eb:ae:1c:ef:63:be -# SHA256 Fingerprint: e3:5d:28:41:9e:d0:20:25:cf:a6:90:38:cd:62:39:62:45:8d:a5:c6:95:fb:de:a3:c2:2b:0b:fb:25:89:70:92 ------BEGIN CERTIFICATE----- -MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5 -MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g -Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG -A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg -Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi -9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk -M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB -/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB -MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw -CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW -1KyLa2tJElMzrdfkviT8tQp21KW8EA== ------END CERTIFICATE----- - -# Issuer: CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK OU=Kamu Sertifikasyon Merkezi - Kamu SM -# Subject: CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK OU=Kamu Sertifikasyon Merkezi - Kamu SM -# Label: "TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1" -# Serial: 1 -# MD5 Fingerprint: dc:00:81:dc:69:2f:3e:2f:b0:3b:f6:3d:5a:91:8e:49 -# SHA1 Fingerprint: 31:43:64:9b:ec:ce:27:ec:ed:3a:3f:0b:8f:0d:e4:e8:91:dd:ee:ca -# SHA256 Fingerprint: 46:ed:c3:68:90:46:d5:3a:45:3f:b3:10:4a:b8:0d:ca:ec:65:8b:26:60:ea:16:29:dd:7e:86:79:90:64:87:16 ------BEGIN CERTIFICATE----- -MIIEYzCCA0ugAwIBAgIBATANBgkqhkiG9w0BAQsFADCB0jELMAkGA1UEBhMCVFIx -GDAWBgNVBAcTD0dlYnplIC0gS29jYWVsaTFCMEAGA1UEChM5VHVya2l5ZSBCaWxp -bXNlbCB2ZSBUZWtub2xvamlrIEFyYXN0aXJtYSBLdXJ1bXUgLSBUVUJJVEFLMS0w -KwYDVQQLEyRLYW11IFNlcnRpZmlrYXN5b24gTWVya2V6aSAtIEthbXUgU00xNjA0 -BgNVBAMTLVRVQklUQUsgS2FtdSBTTSBTU0wgS29rIFNlcnRpZmlrYXNpIC0gU3Vy -dW0gMTAeFw0xMzExMjUwODI1NTVaFw00MzEwMjUwODI1NTVaMIHSMQswCQYDVQQG -EwJUUjEYMBYGA1UEBxMPR2ViemUgLSBLb2NhZWxpMUIwQAYDVQQKEzlUdXJraXll -IEJpbGltc2VsIHZlIFRla25vbG9qaWsgQXJhc3Rpcm1hIEt1cnVtdSAtIFRVQklU -QUsxLTArBgNVBAsTJEthbXUgU2VydGlmaWthc3lvbiBNZXJrZXppIC0gS2FtdSBT -TTE2MDQGA1UEAxMtVFVCSVRBSyBLYW11IFNNIFNTTCBLb2sgU2VydGlmaWthc2kg -LSBTdXJ1bSAxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr3UwM6q7 -a9OZLBI3hNmNe5eA027n/5tQlT6QlVZC1xl8JoSNkvoBHToP4mQ4t4y86Ij5iySr -LqP1N+RAjhgleYN1Hzv/bKjFxlb4tO2KRKOrbEz8HdDc72i9z+SqzvBV96I01INr -N3wcwv61A+xXzry0tcXtAA9TNypN9E8Mg/uGz8v+jE69h/mniyFXnHrfA2eJLJ2X -YacQuFWQfw4tJzh03+f92k4S400VIgLI4OD8D62K18lUUMw7D8oWgITQUVbDjlZ/ -iSIzL+aFCr2lqBs23tPcLG07xxO9WSMs5uWk99gL7eqQQESolbuT1dCANLZGeA4f -AJNG4e7p+exPFwIDAQABo0IwQDAdBgNVHQ4EFgQUZT/HiobGPN08VFw1+DrtUgxH -V8gwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL -BQADggEBACo/4fEyjq7hmFxLXs9rHmoJ0iKpEsdeV31zVmSAhHqT5Am5EM2fKifh -AHe+SMg1qIGf5LgsyX8OsNJLN13qudULXjS99HMpw+0mFZx+CFOKWI3QSyjfwbPf -IPP54+M638yclNhOT8NrF7f3cuitZjO1JVOr4PhMqZ398g26rrnZqsZr+ZO7rqu4 -lzwDGrpDxpa5RXI4s6ehlj2Re37AIVNMh+3yC1SVUZPVIqUNivGTDj5UDrDYyU7c -8jEyVupk+eq1nRZmQnLzf9OxMUP8pI4X8W0jq5Rm+K37DwhuJi1/FwcJsoz7UMCf -lo3Ptv0AnVoUmr8CRPXBwp8iXqIPoeM= ------END CERTIFICATE----- - -# Issuer: CN=GDCA TrustAUTH R5 ROOT O=GUANG DONG CERTIFICATE AUTHORITY CO.,LTD. -# Subject: CN=GDCA TrustAUTH R5 ROOT O=GUANG DONG CERTIFICATE AUTHORITY CO.,LTD. -# Label: "GDCA TrustAUTH R5 ROOT" -# Serial: 9009899650740120186 -# MD5 Fingerprint: 63:cc:d9:3d:34:35:5c:6f:53:a3:e2:08:70:48:1f:b4 -# SHA1 Fingerprint: 0f:36:38:5b:81:1a:25:c3:9b:31:4e:83:ca:e9:34:66:70:cc:74:b4 -# SHA256 Fingerprint: bf:ff:8f:d0:44:33:48:7d:6a:8a:a6:0c:1a:29:76:7a:9f:c2:bb:b0:5e:42:0f:71:3a:13:b9:92:89:1d:38:93 ------BEGIN CERTIFICATE----- -MIIFiDCCA3CgAwIBAgIIfQmX/vBH6nowDQYJKoZIhvcNAQELBQAwYjELMAkGA1UE -BhMCQ04xMjAwBgNVBAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZ -IENPLixMVEQuMR8wHQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMB4XDTE0 -MTEyNjA1MTMxNVoXDTQwMTIzMTE1NTk1OVowYjELMAkGA1UEBhMCQ04xMjAwBgNV -BAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZIENPLixMVEQuMR8w -HQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMIICIjANBgkqhkiG9w0BAQEF -AAOCAg8AMIICCgKCAgEA2aMW8Mh0dHeb7zMNOwZ+Vfy1YI92hhJCfVZmPoiC7XJj -Dp6L3TQsAlFRwxn9WVSEyfFrs0yw6ehGXTjGoqcuEVe6ghWinI9tsJlKCvLriXBj -TnnEt1u9ol2x8kECK62pOqPseQrsXzrj/e+APK00mxqriCZ7VqKChh/rNYmDf1+u -KU49tm7srsHwJ5uu4/Ts765/94Y9cnrrpftZTqfrlYwiOXnhLQiPzLyRuEH3FMEj -qcOtmkVEs7LXLM3GKeJQEK5cy4KOFxg2fZfmiJqwTTQJ9Cy5WmYqsBebnh52nUpm -MUHfP/vFBu8btn4aRjb3ZGM74zkYI+dndRTVdVeSN72+ahsmUPI2JgaQxXABZG12 -ZuGR224HwGGALrIuL4xwp9E7PLOR5G62xDtw8mySlwnNR30YwPO7ng/Wi64HtloP -zgsMR6flPri9fcebNaBhlzpBdRfMK5Z3KpIhHtmVdiBnaM8Nvd/WHwlqmuLMc3Gk -L30SgLdTMEZeS1SZD2fJpcjyIMGC7J0R38IC+xo70e0gmu9lZJIQDSri3nDxGGeC -jGHeuLzRL5z7D9Ar7Rt2ueQ5Vfj4oR24qoAATILnsn8JuLwwoC8N9VKejveSswoA -HQBUlwbgsQfZxw9cZX08bVlX5O2ljelAU58VS6Bx9hoh49pwBiFYFIeFd3mqgnkC -AwEAAaNCMEAwHQYDVR0OBBYEFOLJQJ9NzuiaoXzPDj9lxSmIahlRMA8GA1UdEwEB -/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQDRSVfg -p8xoWLoBDysZzY2wYUWsEe1jUGn4H3++Fo/9nesLqjJHdtJnJO29fDMylyrHBYZm -DRd9FBUb1Ov9H5r2XpdptxolpAqzkT9fNqyL7FeoPueBihhXOYV0GkLH6VsTX4/5 -COmSdI31R9KrO9b7eGZONn356ZLpBN79SWP8bfsUcZNnL0dKt7n/HipzcEYwv1ry -L3ml4Y0M2fmyYzeMN2WFcGpcWwlyua1jPLHd+PwyvzeG5LuOmCd+uh8W4XAR8gPf -JWIyJyYYMoSf/wA6E7qaTfRPuBRwIrHKK5DOKcFw9C+df/KQHtZa37dG/OaG+svg -IHZ6uqbL9XzeYqWxi+7egmaKTjowHz+Ay60nugxe19CxVsp3cbK1daFQqUBDF8Io -2c9Si1vIY9RCPqAzekYu9wogRlR+ak8x8YF+QnQ4ZXMn7sZ8uI7XpTrXmKGcjBBV -09tL7ECQ8s1uV9JiDnxXk7Gnbc2dg7sq5+W2O3FYrf3RRbxake5TFW/TRQl1brqQ -XR4EzzffHqhmsYzmIGrv/EhOdJhCrylvLmrH+33RZjEizIYAfmaDDEL0vTSSwxrq -T8p+ck0LcIymSLumoRT2+1hEmRSuqguTaaApJUqlyyvdimYHFngVV3Eb7PVHhPOe -MTd61X8kreS8/f3MboPoDKi3QWwH3b08hpcv0g== ------END CERTIFICATE----- - -# Issuer: CN=SSL.com Root Certification Authority RSA O=SSL Corporation -# Subject: CN=SSL.com Root Certification Authority RSA O=SSL Corporation -# Label: "SSL.com Root Certification Authority RSA" -# Serial: 8875640296558310041 -# MD5 Fingerprint: 86:69:12:c0:70:f1:ec:ac:ac:c2:d5:bc:a5:5b:a1:29 -# SHA1 Fingerprint: b7:ab:33:08:d1:ea:44:77:ba:14:80:12:5a:6f:bd:a9:36:49:0c:bb -# SHA256 Fingerprint: 85:66:6a:56:2e:e0:be:5c:e9:25:c1:d8:89:0a:6f:76:a8:7e:c1:6d:4d:7d:5f:29:ea:74:19:cf:20:12:3b:69 ------BEGIN CERTIFICATE----- -MIIF3TCCA8WgAwIBAgIIeyyb0xaAMpkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UE -BhMCVVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQK -DA9TU0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZp -Y2F0aW9uIEF1dGhvcml0eSBSU0EwHhcNMTYwMjEyMTczOTM5WhcNNDEwMjEyMTcz -OTM5WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv -dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNv -bSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFJTQTCCAiIwDQYJKoZIhvcN -AQEBBQADggIPADCCAgoCggIBAPkP3aMrfcvQKv7sZ4Wm5y4bunfh4/WvpOz6Sl2R -xFdHaxh3a3by/ZPkPQ/CFp4LZsNWlJ4Xg4XOVu/yFv0AYvUiCVToZRdOQbngT0aX -qhvIuG5iXmmxX9sqAn78bMrzQdjt0Oj8P2FI7bADFB0QDksZ4LtO7IZl/zbzXmcC -C52GVWH9ejjt/uIZALdvoVBidXQ8oPrIJZK0bnoix/geoeOy3ZExqysdBP+lSgQ3 -6YWkMyv94tZVNHwZpEpox7Ko07fKoZOI68GXvIz5HdkihCR0xwQ9aqkpk8zruFvh -/l8lqjRYyMEjVJ0bmBHDOJx+PYZspQ9AhnwC9FwCTyjLrnGfDzrIM/4RJTXq/LrF -YD3ZfBjVsqnTdXgDciLKOsMf7yzlLqn6niy2UUb9rwPW6mBo6oUWNmuF6R7As93E -JNyAKoFBbZQ+yODJgUEAnl6/f8UImKIYLEJAs/lvOCdLToD0PYFH4Ih86hzOtXVc -US4cK38acijnALXRdMbX5J+tB5O2UzU1/Dfkw/ZdFr4hc96SCvigY2q8lpJqPvi8 -ZVWb3vUNiSYE/CUapiVpy8JtynziWV+XrOvvLsi81xtZPCvM8hnIk2snYxnP/Okm -+Mpxm3+T/jRnhE6Z6/yzeAkzcLpmpnbtG3PrGqUNxCITIJRWCk4sbE6x/c+cCbqi -M+2HAgMBAAGjYzBhMB0GA1UdDgQWBBTdBAkHovV6fVJTEpKV7jiAJQ2mWTAPBgNV -HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFN0ECQei9Xp9UlMSkpXuOIAlDaZZMA4G -A1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAIBgRlCn7Jp0cHh5wYfGV -cpNxJK1ok1iOMq8bs3AD/CUrdIWQPXhq9LmLpZc7tRiRux6n+UBbkflVma8eEdBc -Hadm47GUBwwyOabqG7B52B2ccETjit3E+ZUfijhDPwGFpUenPUayvOUiaPd7nNgs -PgohyC0zrL/FgZkxdMF1ccW+sfAjRfSda/wZY52jvATGGAslu1OJD7OAUN5F7kR/ -q5R4ZJjT9ijdh9hwZXT7DrkT66cPYakylszeu+1jTBi7qUD3oFRuIIhxdRjqerQ0 -cuAjJ3dctpDqhiVAq+8zD8ufgr6iIPv2tS0a5sKFsXQP+8hlAqRSAUfdSSLBv9jr -a6x+3uxjMxW3IwiPxg+NQVrdjsW5j+VFP3jbutIbQLH+cU0/4IGiul607BXgk90I -H37hVZkLId6Tngr75qNJvTYw/ud3sqB1l7UtgYgXZSD32pAAn8lSzDLKNXz1PQ/Y -K9f1JmzJBjSWFupwWRoyeXkLtoh/D1JIPb9s2KJELtFOt3JY04kTlf5Eq/jXixtu -nLwsoFvVagCvXzfh1foQC5ichucmj87w7G6KVwuA406ywKBjYZC6VWg3dGq2ktuf -oYYitmUnDuy2n0Jg5GfCtdpBC8TTi2EbvPofkSvXRAdeuims2cXp71NIWuuA8ShY -Ic2wBlX7Jz9TkHCpBB5XJ7k= ------END CERTIFICATE----- - -# Issuer: CN=SSL.com Root Certification Authority ECC O=SSL Corporation -# Subject: CN=SSL.com Root Certification Authority ECC O=SSL Corporation -# Label: "SSL.com Root Certification Authority ECC" -# Serial: 8495723813297216424 -# MD5 Fingerprint: 2e:da:e4:39:7f:9c:8f:37:d1:70:9f:26:17:51:3a:8e -# SHA1 Fingerprint: c3:19:7c:39:24:e6:54:af:1b:c4:ab:20:95:7a:e2:c3:0e:13:02:6a -# SHA256 Fingerprint: 34:17:bb:06:cc:60:07:da:1b:96:1c:92:0b:8a:b4:ce:3f:ad:82:0e:4a:a3:0b:9a:cb:c4:a7:4e:bd:ce:bc:65 ------BEGIN CERTIFICATE----- -MIICjTCCAhSgAwIBAgIIdebfy8FoW6gwCgYIKoZIzj0EAwIwfDELMAkGA1UEBhMC -VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T -U0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZpY2F0 -aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNDAzWhcNNDEwMjEyMTgxNDAz -WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hvdXN0 -b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNvbSBS -b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49AgEGBSuB -BAAiA2IABEVuqVDEpiM2nl8ojRfLliJkP9x6jh3MCLOicSS6jkm5BBtHllirLZXI -7Z4INcgn64mMU1jrYor+8FsPazFSY0E7ic3s7LaNGdM0B9y7xgZ/wkWV7Mt/qCPg -CemB+vNH06NjMGEwHQYDVR0OBBYEFILRhXMw5zUE044CkvvlpNHEIejNMA8GA1Ud -EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUgtGFczDnNQTTjgKS++Wk0cQh6M0wDgYD -VR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2cAMGQCMG/n61kRpGDPYbCWe+0F+S8T -kdzt5fxQaxFGRrMcIQBiu77D5+jNB5n5DQtdcj7EqgIwH7y6C+IwJPt8bYBVCpk+ -gA0z5Wajs6O7pdWLjwkspl1+4vAHCGht0nxpbl/f5Wpl ------END CERTIFICATE----- - -# Issuer: CN=SSL.com EV Root Certification Authority RSA R2 O=SSL Corporation -# Subject: CN=SSL.com EV Root Certification Authority RSA R2 O=SSL Corporation -# Label: "SSL.com EV Root Certification Authority RSA R2" -# Serial: 6248227494352943350 -# MD5 Fingerprint: e1:1e:31:58:1a:ae:54:53:02:f6:17:6a:11:7b:4d:95 -# SHA1 Fingerprint: 74:3a:f0:52:9b:d0:32:a0:f4:4a:83:cd:d4:ba:a9:7b:7c:2e:c4:9a -# SHA256 Fingerprint: 2e:7b:f1:6c:c2:24:85:a7:bb:e2:aa:86:96:75:07:61:b0:ae:39:be:3b:2f:e9:d0:cc:6d:4e:f7:34:91:42:5c ------BEGIN CERTIFICATE----- -MIIF6zCCA9OgAwIBAgIIVrYpzTS8ePYwDQYJKoZIhvcNAQELBQAwgYIxCzAJBgNV -BAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4GA1UEBwwHSG91c3RvbjEYMBYGA1UE -CgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQDDC5TU0wuY29tIEVWIFJvb3QgQ2Vy -dGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIyMB4XDTE3MDUzMTE4MTQzN1oXDTQy -MDUzMDE4MTQzN1owgYIxCzAJBgNVBAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4G -A1UEBwwHSG91c3RvbjEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQD -DC5TU0wuY29tIEVWIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIy -MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAjzZlQOHWTcDXtOlG2mvq -M0fNTPl9fb69LT3w23jhhqXZuglXaO1XPqDQCEGD5yhBJB/jchXQARr7XnAjssuf -OePPxU7Gkm0mxnu7s9onnQqG6YE3Bf7wcXHswxzpY6IXFJ3vG2fThVUCAtZJycxa -4bH3bzKfydQ7iEGonL3Lq9ttewkfokxykNorCPzPPFTOZw+oz12WGQvE43LrrdF9 -HSfvkusQv1vrO6/PgN3B0pYEW3p+pKk8OHakYo6gOV7qd89dAFmPZiw+B6KjBSYR -aZfqhbcPlgtLyEDhULouisv3D5oi53+aNxPN8k0TayHRwMwi8qFG9kRpnMphNQcA -b9ZhCBHqurj26bNg5U257J8UZslXWNvNh2n4ioYSA0e/ZhN2rHd9NCSFg83XqpyQ -Gp8hLH94t2S42Oim9HizVcuE0jLEeK6jj2HdzghTreyI/BXkmg3mnxp3zkyPuBQV -PWKchjgGAGYS5Fl2WlPAApiiECtoRHuOec4zSnaqW4EWG7WK2NAAe15itAnWhmMO -pgWVSbooi4iTsjQc2KRVbrcc0N6ZVTsj9CLg+SlmJuwgUHfbSguPvuUCYHBBXtSu -UDkiFCbLsjtzdFVHB3mBOagwE0TlBIqulhMlQg+5U8Sb/M3kHN48+qvWBkofZ6aY -MBzdLNvcGJVXZsb/XItW9XcCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNV -HSMEGDAWgBT5YLvU49U09rj1BoAlp3PbRmmonjAdBgNVHQ4EFgQU+WC71OPVNPa4 -9QaAJadz20ZpqJ4wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQBW -s47LCp1Jjr+kxJG7ZhcFUZh1++VQLHqe8RT6q9OKPv+RKY9ji9i0qVQBDb6Thi/5 -Sm3HXvVX+cpVHBK+Rw82xd9qt9t1wkclf7nxY/hoLVUE0fKNsKTPvDxeH3jnpaAg -cLAExbf3cqfeIg29MyVGjGSSJuM+LmOW2puMPfgYCdcDzH2GguDKBAdRUNf/ktUM -79qGn5nX67evaOI5JpS6aLe/g9Pqemc9YmeuJeVy6OLk7K4S9ksrPJ/psEDzOFSz -/bdoyNrGj1E8svuR3Bznm53htw1yj+KkxKl4+esUrMZDBcJlOSgYAsOCsp0FvmXt -ll9ldDz7CTUue5wT/RsPXcdtgTpWD8w74a8CLyKsRspGPKAcTNZEtF4uXBVmCeEm -Kf7GUmG6sXP/wwyc5WxqlD8UykAWlYTzWamsX0xhk23RO8yilQwipmdnRC652dKK -QbNmC1r7fSOl8hqw/96bg5Qu0T/fkreRrwU7ZcegbLHNYhLDkBvjJc40vG93drEQ -w/cFGsDWr3RiSBd3kmmQYRzelYB0VI8YHMPzA9C/pEN1hlMYegouCRw2n5H9gooi -S9EOUCXdywMMF8mDAAhONU2Ki+3wApRmLER/y5UnlhetCTCstnEXbosX9hwJ1C07 -mKVx01QT2WDz9UtmT/rx7iASjbSsV7FFY6GsdqnC+w== ------END CERTIFICATE----- - -# Issuer: CN=SSL.com EV Root Certification Authority ECC O=SSL Corporation -# Subject: CN=SSL.com EV Root Certification Authority ECC O=SSL Corporation -# Label: "SSL.com EV Root Certification Authority ECC" -# Serial: 3182246526754555285 -# MD5 Fingerprint: 59:53:22:65:83:42:01:54:c0:ce:42:b9:5a:7c:f2:90 -# SHA1 Fingerprint: 4c:dd:51:a3:d1:f5:20:32:14:b0:c6:c5:32:23:03:91:c7:46:42:6d -# SHA256 Fingerprint: 22:a2:c1:f7:bd:ed:70:4c:c1:e7:01:b5:f4:08:c3:10:88:0f:e9:56:b5:de:2a:4a:44:f9:9c:87:3a:25:a7:c8 ------BEGIN CERTIFICATE----- -MIIClDCCAhqgAwIBAgIILCmcWxbtBZUwCgYIKoZIzj0EAwIwfzELMAkGA1UEBhMC -VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T -U0wgQ29ycG9yYXRpb24xNDAyBgNVBAMMK1NTTC5jb20gRVYgUm9vdCBDZXJ0aWZp -Y2F0aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNTIzWhcNNDEwMjEyMTgx -NTIzWjB/MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv -dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjE0MDIGA1UEAwwrU1NMLmNv -bSBFViBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49 -AgEGBSuBBAAiA2IABKoSR5CYG/vvw0AHgyBO8TCCogbR8pKGYfL2IWjKAMTH6kMA -VIbc/R/fALhBYlzccBYy3h+Z1MzFB8gIH2EWB1E9fVwHU+M1OIzfzZ/ZLg1Kthku -WnBaBu2+8KGwytAJKaNjMGEwHQYDVR0OBBYEFFvKXuXe0oGqzagtZFG22XKbl+ZP -MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUW8pe5d7SgarNqC1kUbbZcpuX -5k8wDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2gAMGUCMQCK5kCJN+vp1RPZ -ytRrJPOwPYdGWBrssd9v+1a6cGvHOMzosYxPD/fxZ3YOg9AeUY8CMD32IygmTMZg -h5Mmm7I1HrrW9zzRHM76JTymGoEVW/MSD2zuZYrJh6j5B+BimoxcSg== ------END CERTIFICATE----- - -# Issuer: CN=GlobalSign O=GlobalSign OU=GlobalSign Root CA - R6 -# Subject: CN=GlobalSign O=GlobalSign OU=GlobalSign Root CA - R6 -# Label: "GlobalSign Root CA - R6" -# Serial: 1417766617973444989252670301619537 -# MD5 Fingerprint: 4f:dd:07:e4:d4:22:64:39:1e:0c:37:42:ea:d1:c6:ae -# SHA1 Fingerprint: 80:94:64:0e:b5:a7:a1:ca:11:9c:1f:dd:d5:9f:81:02:63:a7:fb:d1 -# SHA256 Fingerprint: 2c:ab:ea:fe:37:d0:6c:a2:2a:ba:73:91:c0:03:3d:25:98:29:52:c4:53:64:73:49:76:3a:3a:b5:ad:6c:cf:69 ------BEGIN CERTIFICATE----- -MIIFgzCCA2ugAwIBAgIORea7A4Mzw4VlSOb/RVEwDQYJKoZIhvcNAQEMBQAwTDEg -MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjYxEzARBgNVBAoTCkdsb2Jh -bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTQxMjEwMDAwMDAwWhcNMzQx -MjEwMDAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSNjET -MBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCAiIwDQYJ -KoZIhvcNAQEBBQADggIPADCCAgoCggIBAJUH6HPKZvnsFMp7PPcNCPG0RQssgrRI -xutbPK6DuEGSMxSkb3/pKszGsIhrxbaJ0cay/xTOURQh7ErdG1rG1ofuTToVBu1k -ZguSgMpE3nOUTvOniX9PeGMIyBJQbUJmL025eShNUhqKGoC3GYEOfsSKvGRMIRxD -aNc9PIrFsmbVkJq3MQbFvuJtMgamHvm566qjuL++gmNQ0PAYid/kD3n16qIfKtJw -LnvnvJO7bVPiSHyMEAc4/2ayd2F+4OqMPKq0pPbzlUoSB239jLKJz9CgYXfIWHSw -1CM69106yqLbnQneXUQtkPGBzVeS+n68UARjNN9rkxi+azayOeSsJDa38O+2HBNX -k7besvjihbdzorg1qkXy4J02oW9UivFyVm4uiMVRQkQVlO6jxTiWm05OWgtH8wY2 -SXcwvHE35absIQh1/OZhFj931dmRl4QKbNQCTXTAFO39OfuD8l4UoQSwC+n+7o/h -bguyCLNhZglqsQY6ZZZZwPA1/cnaKI0aEYdwgQqomnUdnjqGBQCe24DWJfncBZ4n -WUx2OVvq+aWh2IMP0f/fMBH5hc8zSPXKbWQULHpYT9NLCEnFlWQaYw55PfWzjMpY -rZxCRXluDocZXFSxZba/jJvcE+kNb7gu3GduyYsRtYQUigAZcIN5kZeR1Bonvzce -MgfYFGM8KEyvAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTAD -AQH/MB0GA1UdDgQWBBSubAWjkxPioufi1xzWx/B/yGdToDAfBgNVHSMEGDAWgBSu -bAWjkxPioufi1xzWx/B/yGdToDANBgkqhkiG9w0BAQwFAAOCAgEAgyXt6NH9lVLN -nsAEoJFp5lzQhN7craJP6Ed41mWYqVuoPId8AorRbrcWc+ZfwFSY1XS+wc3iEZGt -Ixg93eFyRJa0lV7Ae46ZeBZDE1ZXs6KzO7V33EByrKPrmzU+sQghoefEQzd5Mr61 -55wsTLxDKZmOMNOsIeDjHfrYBzN2VAAiKrlNIC5waNrlU/yDXNOd8v9EDERm8tLj -vUYAGm0CuiVdjaExUd1URhxN25mW7xocBFymFe944Hn+Xds+qkxV/ZoVqW/hpvvf -cDDpw+5CRu3CkwWJ+n1jez/QcYF8AOiYrg54NMMl+68KnyBr3TsTjxKM4kEaSHpz -oHdpx7Zcf4LIHv5YGygrqGytXm3ABdJ7t+uA/iU3/gKbaKxCXcPu9czc8FB10jZp -nOZ7BN9uBmm23goJSFmH63sUYHpkqmlD75HHTOwY3WzvUy2MmeFe8nI+z1TIvWfs -pA9MRf/TuTAjB0yPEL+GltmZWrSZVxykzLsViVO6LAUP5MSeGbEYNNVMnbrt9x+v -JJUEeKgDu+6B5dpffItKoZB0JaezPkvILFa9x8jvOOJckvB595yEunQtYQEgfn7R -8k8HWV+LLUNS60YMlOH1Zkd5d9VUWx+tJDfLRVpOoERIyNiwmcUVhAn21klJwGW4 -5hpxbqCo8YLoRT5s1gLXCmeDBVrJpBA= ------END CERTIFICATE----- - -# Issuer: CN=OISTE WISeKey Global Root GC CA O=WISeKey OU=OISTE Foundation Endorsed -# Subject: CN=OISTE WISeKey Global Root GC CA O=WISeKey OU=OISTE Foundation Endorsed -# Label: "OISTE WISeKey Global Root GC CA" -# Serial: 44084345621038548146064804565436152554 -# MD5 Fingerprint: a9:d6:b9:2d:2f:93:64:f8:a5:69:ca:91:e9:68:07:23 -# SHA1 Fingerprint: e0:11:84:5e:34:de:be:88:81:b9:9c:f6:16:26:d1:96:1f:c3:b9:31 -# SHA256 Fingerprint: 85:60:f9:1c:36:24:da:ba:95:70:b5:fe:a0:db:e3:6f:f1:1a:83:23:be:94:86:85:4f:b3:f3:4a:55:71:19:8d ------BEGIN CERTIFICATE----- -MIICaTCCAe+gAwIBAgIQISpWDK7aDKtARb8roi066jAKBggqhkjOPQQDAzBtMQsw -CQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUgRm91 -bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwg -Um9vdCBHQyBDQTAeFw0xNzA1MDkwOTQ4MzRaFw00MjA1MDkwOTU4MzNaMG0xCzAJ -BgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBGb3Vu -ZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2JhbCBS -b290IEdDIENBMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAETOlQwMYPchi82PG6s4ni -eUqjFqdrVCTbUf/q9Akkwwsin8tqJ4KBDdLArzHkdIJuyiXZjHWd8dvQmqJLIX4W -p2OQ0jnUsYd4XxiWD1AbNTcPasbc2RNNpI6QN+a9WzGRo1QwUjAOBgNVHQ8BAf8E -BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUSIcUrOPDnpBgOtfKie7T -rYy0UGYwEAYJKwYBBAGCNxUBBAMCAQAwCgYIKoZIzj0EAwMDaAAwZQIwJsdpW9zV -57LnyAyMjMPdeYwbY9XJUpROTYJKcx6ygISpJcBMWm1JKWB4E+J+SOtkAjEA2zQg -Mgj/mkkCtojeFK9dbJlxjRo/i9fgojaGHAeCOnZT/cKi7e97sIBPWA9LUzm9 ------END CERTIFICATE----- - -# Issuer: CN=UCA Global G2 Root O=UniTrust -# Subject: CN=UCA Global G2 Root O=UniTrust -# Label: "UCA Global G2 Root" -# Serial: 124779693093741543919145257850076631279 -# MD5 Fingerprint: 80:fe:f0:c4:4a:f0:5c:62:32:9f:1c:ba:78:a9:50:f8 -# SHA1 Fingerprint: 28:f9:78:16:19:7a:ff:18:25:18:aa:44:fe:c1:a0:ce:5c:b6:4c:8a -# SHA256 Fingerprint: 9b:ea:11:c9:76:fe:01:47:64:c1:be:56:a6:f9:14:b5:a5:60:31:7a:bd:99:88:39:33:82:e5:16:1a:a0:49:3c ------BEGIN CERTIFICATE----- -MIIFRjCCAy6gAwIBAgIQXd+x2lqj7V2+WmUgZQOQ7zANBgkqhkiG9w0BAQsFADA9 -MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxGzAZBgNVBAMMElVDQSBH -bG9iYWwgRzIgUm9vdDAeFw0xNjAzMTEwMDAwMDBaFw00MDEyMzEwMDAwMDBaMD0x -CzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDEbMBkGA1UEAwwSVUNBIEds -b2JhbCBHMiBSb290MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxeYr -b3zvJgUno4Ek2m/LAfmZmqkywiKHYUGRO8vDaBsGxUypK8FnFyIdK+35KYmToni9 -kmugow2ifsqTs6bRjDXVdfkX9s9FxeV67HeToI8jrg4aA3++1NDtLnurRiNb/yzm -VHqUwCoV8MmNsHo7JOHXaOIxPAYzRrZUEaalLyJUKlgNAQLx+hVRZ2zA+te2G3/R -VogvGjqNO7uCEeBHANBSh6v7hn4PJGtAnTRnvI3HLYZveT6OqTwXS3+wmeOwcWDc -C/Vkw85DvG1xudLeJ1uK6NjGruFZfc8oLTW4lVYa8bJYS7cSN8h8s+1LgOGN+jIj -tm+3SJUIsUROhYw6AlQgL9+/V087OpAh18EmNVQg7Mc/R+zvWr9LesGtOxdQXGLY -D0tK3Cv6brxzks3sx1DoQZbXqX5t2Okdj4q1uViSukqSKwxW/YDrCPBeKW4bHAyv -j5OJrdu9o54hyokZ7N+1wxrrFv54NkzWbtA+FxyQF2smuvt6L78RHBgOLXMDj6Dl -NaBa4kx1HXHhOThTeEDMg5PXCp6dW4+K5OXgSORIskfNTip1KnvyIvbJvgmRlld6 -iIis7nCs+dwp4wwcOxJORNanTrAmyPPZGpeRaOrvjUYG0lZFWJo8DA+DuAUlwznP -O6Q0ibd5Ei9Hxeepl2n8pndntd978XplFeRhVmUCAwEAAaNCMEAwDgYDVR0PAQH/ -BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFIHEjMz15DD/pQwIX4wV -ZyF0Ad/fMA0GCSqGSIb3DQEBCwUAA4ICAQATZSL1jiutROTL/7lo5sOASD0Ee/oj -L3rtNtqyzm325p7lX1iPyzcyochltq44PTUbPrw7tgTQvPlJ9Zv3hcU2tsu8+Mg5 -1eRfB70VVJd0ysrtT7q6ZHafgbiERUlMjW+i67HM0cOU2kTC5uLqGOiiHycFutfl -1qnN3e92mI0ADs0b+gO3joBYDic/UvuUospeZcnWhNq5NXHzJsBPd+aBJ9J3O5oU -b3n09tDh05S60FdRvScFDcH9yBIw7m+NESsIndTUv4BFFJqIRNow6rSn4+7vW4LV -PtateJLbXDzz2K36uGt/xDYotgIVilQsnLAXc47QN6MUPJiVAAwpBVueSUmxX8fj -y88nZY41F7dXyDDZQVu5FLbowg+UMaeUmMxq67XhJ/UQqAHojhJi6IjMtX9Gl8Cb -EGY4GjZGXyJoPd/JxhMnq1MGrKI8hgZlb7F+sSlEmqO6SWkoaY/X5V+tBIZkbxqg -DMUIYs6Ao9Dz7GjevjPHF1t/gMRMTLGmhIrDO7gJzRSBuhjjVFc2/tsvfEehOjPI -+Vg7RE+xygKJBJYoaMVLuCaJu9YzL1DV/pqJuhgyklTGW+Cd+V7lDSKb9triyCGy -YiGqhkCyLmTTX8jjfhFnRR8F/uOi77Oos/N9j/gMHyIfLXC0uAE0djAA5SN4p1bX -UB+K+wb1whnw0A== ------END CERTIFICATE----- - -# Issuer: CN=UCA Extended Validation Root O=UniTrust -# Subject: CN=UCA Extended Validation Root O=UniTrust -# Label: "UCA Extended Validation Root" -# Serial: 106100277556486529736699587978573607008 -# MD5 Fingerprint: a1:f3:5f:43:c6:34:9b:da:bf:8c:7e:05:53:ad:96:e2 -# SHA1 Fingerprint: a3:a1:b0:6f:24:61:23:4a:e3:36:a5:c2:37:fc:a6:ff:dd:f0:d7:3a -# SHA256 Fingerprint: d4:3a:f9:b3:54:73:75:5c:96:84:fc:06:d7:d8:cb:70:ee:5c:28:e7:73:fb:29:4e:b4:1e:e7:17:22:92:4d:24 ------BEGIN CERTIFICATE----- -MIIFWjCCA0KgAwIBAgIQT9Irj/VkyDOeTzRYZiNwYDANBgkqhkiG9w0BAQsFADBH -MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNVBAMMHFVDQSBF -eHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwHhcNMTUwMzEzMDAwMDAwWhcNMzgxMjMx -MDAwMDAwWjBHMQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNV -BAMMHFVDQSBFeHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwggIiMA0GCSqGSIb3DQEB -AQUAA4ICDwAwggIKAoICAQCpCQcoEwKwmeBkqh5DFnpzsZGgdT6o+uM4AHrsiWog -D4vFsJszA1qGxliG1cGFu0/GnEBNyr7uaZa4rYEwmnySBesFK5pI0Lh2PpbIILvS -sPGP2KxFRv+qZ2C0d35qHzwaUnoEPQc8hQ2E0B92CvdqFN9y4zR8V05WAT558aop -O2z6+I9tTcg1367r3CTueUWnhbYFiN6IXSV8l2RnCdm/WhUFhvMJHuxYMjMR83dk -sHYf5BA1FxvyDrFspCqjc/wJHx4yGVMR59mzLC52LqGj3n5qiAno8geK+LLNEOfi -c0CTuwjRP+H8C5SzJe98ptfRr5//lpr1kXuYC3fUfugH0mK1lTnj8/FtDw5lhIpj -VMWAtuCeS31HJqcBCF3RiJ7XwzJE+oJKCmhUfzhTA8ykADNkUVkLo4KRel7sFsLz -KuZi2irbWWIQJUoqgQtHB0MGcIfS+pMRKXpITeuUx3BNr2fVUbGAIAEBtHoIppB/ -TuDvB0GHr2qlXov7z1CymlSvw4m6WC31MJixNnI5fkkE/SmnTHnkBVfblLkWU41G -sx2VYVdWf6/wFlthWG82UBEL2KwrlRYaDh8IzTY0ZRBiZtWAXxQgXy0MoHgKaNYs -1+lvK9JKBZP8nm9rZ/+I8U6laUpSNwXqxhaN0sSZ0YIrO7o1dfdRUVjzyAfd5LQD -fwIDAQABo0IwQDAdBgNVHQ4EFgQU2XQ65DA9DfcS3H5aBZ8eNJr34RQwDwYDVR0T -AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQELBQADggIBADaN -l8xCFWQpN5smLNb7rhVpLGsaGvdftvkHTFnq88nIua7Mui563MD1sC3AO6+fcAUR -ap8lTwEpcOPlDOHqWnzcSbvBHiqB9RZLcpHIojG5qtr8nR/zXUACE/xOHAbKsxSQ -VBcZEhrxH9cMaVr2cXj0lH2RC47skFSOvG+hTKv8dGT9cZr4QQehzZHkPJrgmzI5 -c6sq1WnIeJEmMX3ixzDx/BR4dxIOE/TdFpS/S2d7cFOFyrC78zhNLJA5wA3CXWvp -4uXViI3WLL+rG761KIcSF3Ru/H38j9CHJrAb+7lsq+KePRXBOy5nAliRn+/4Qh8s -t2j1da3Ptfb/EX3C8CSlrdP6oDyp+l3cpaDvRKS+1ujl5BOWF3sGPjLtx7dCvHaj -2GU4Kzg1USEODm8uNBNA4StnDG1KQTAYI1oyVZnJF+A83vbsea0rWBmirSwiGpWO -vpaQXUJXxPkUAzUrHC1RVwinOt4/5Mi0A3PCwSaAuwtCH60NryZy2sy+s6ODWA2C -xR9GUeOcGMyNm43sSet1UNWMKFnKdDTajAshqx7qG+XH/RU+wBeq+yNuJkbL+vmx -cmtpzyKEC2IPrNkZAJSidjzULZrtBJ4tBmIQN1IchXIbJ+XMxjHsN+xjWZsLHXbM -fjKaiJUINlK73nZfdklJrX+9ZSCyycErdhh2n1ax ------END CERTIFICATE----- - -# Issuer: CN=Certigna Root CA O=Dhimyotis OU=0002 48146308100036 -# Subject: CN=Certigna Root CA O=Dhimyotis OU=0002 48146308100036 -# Label: "Certigna Root CA" -# Serial: 269714418870597844693661054334862075617 -# MD5 Fingerprint: 0e:5c:30:62:27:eb:5b:bc:d7:ae:62:ba:e9:d5:df:77 -# SHA1 Fingerprint: 2d:0d:52:14:ff:9e:ad:99:24:01:74:20:47:6e:6c:85:27:27:f5:43 -# SHA256 Fingerprint: d4:8d:3d:23:ee:db:50:a4:59:e5:51:97:60:1c:27:77:4b:9d:7b:18:c9:4d:5a:05:95:11:a1:02:50:b9:31:68 ------BEGIN CERTIFICATE----- -MIIGWzCCBEOgAwIBAgIRAMrpG4nxVQMNo+ZBbcTjpuEwDQYJKoZIhvcNAQELBQAw -WjELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCURoaW15b3RpczEcMBoGA1UECwwTMDAw -MiA0ODE0NjMwODEwMDAzNjEZMBcGA1UEAwwQQ2VydGlnbmEgUm9vdCBDQTAeFw0x -MzEwMDEwODMyMjdaFw0zMzEwMDEwODMyMjdaMFoxCzAJBgNVBAYTAkZSMRIwEAYD -VQQKDAlEaGlteW90aXMxHDAaBgNVBAsMEzAwMDIgNDgxNDYzMDgxMDAwMzYxGTAX -BgNVBAMMEENlcnRpZ25hIFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw -ggIKAoICAQDNGDllGlmx6mQWDoyUJJV8g9PFOSbcDO8WV43X2KyjQn+Cyu3NW9sO -ty3tRQgXstmzy9YXUnIo245Onoq2C/mehJpNdt4iKVzSs9IGPjA5qXSjklYcoW9M -CiBtnyN6tMbaLOQdLNyzKNAT8kxOAkmhVECe5uUFoC2EyP+YbNDrihqECB63aCPu -I9Vwzm1RaRDuoXrC0SIxwoKF0vJVdlB8JXrJhFwLrN1CTivngqIkicuQstDuI7pm -TLtipPlTWmR7fJj6o0ieD5Wupxj0auwuA0Wv8HT4Ks16XdG+RCYyKfHx9WzMfgIh -C59vpD++nVPiz32pLHxYGpfhPTc3GGYo0kDFUYqMwy3OU4gkWGQwFsWq4NYKpkDf -ePb1BHxpE4S80dGnBs8B92jAqFe7OmGtBIyT46388NtEbVncSVmurJqZNjBBe3Yz -IoejwpKGbvlw7q6Hh5UbxHq9MfPU0uWZ/75I7HX1eBYdpnDBfzwboZL7z8g81sWT -Co/1VTp2lc5ZmIoJlXcymoO6LAQ6l73UL77XbJuiyn1tJslV1c/DeVIICZkHJC1k -JWumIWmbat10TWuXekG9qxf5kBdIjzb5LdXF2+6qhUVB+s06RbFo5jZMm5BX7CO5 -hwjCxAnxl4YqKE3idMDaxIzb3+KhF1nOJFl0Mdp//TBt2dzhauH8XwIDAQABo4IB -GjCCARYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE -FBiHVuBud+4kNTxOc5of1uHieX4rMB8GA1UdIwQYMBaAFBiHVuBud+4kNTxOc5of -1uHieX4rMEQGA1UdIAQ9MDswOQYEVR0gADAxMC8GCCsGAQUFBwIBFiNodHRwczov -L3d3d3cuY2VydGlnbmEuZnIvYXV0b3JpdGVzLzBtBgNVHR8EZjBkMC+gLaArhilo -dHRwOi8vY3JsLmNlcnRpZ25hLmZyL2NlcnRpZ25hcm9vdGNhLmNybDAxoC+gLYYr -aHR0cDovL2NybC5kaGlteW90aXMuY29tL2NlcnRpZ25hcm9vdGNhLmNybDANBgkq -hkiG9w0BAQsFAAOCAgEAlLieT/DjlQgi581oQfccVdV8AOItOoldaDgvUSILSo3L -6btdPrtcPbEo/uRTVRPPoZAbAh1fZkYJMyjhDSSXcNMQH+pkV5a7XdrnxIxPTGRG -HVyH41neQtGbqH6mid2PHMkwgu07nM3A6RngatgCdTer9zQoKJHyBApPNeNgJgH6 -0BGM+RFq7q89w1DTj18zeTyGqHNFkIwgtnJzFyO+B2XleJINugHA64wcZr+shncB -lA2c5uk5jR+mUYyZDDl34bSb+hxnV29qao6pK0xXeXpXIs/NX2NGjVxZOob4Mkdi -o2cNGJHc+6Zr9UhhcyNZjgKnvETq9Emd8VRY+WCv2hikLyhF3HqgiIZd8zvn/yk1 -gPxkQ5Tm4xxvvq0OKmOZK8l+hfZx6AYDlf7ej0gcWtSS6Cvu5zHbugRqh5jnxV/v -faci9wHYTfmJ0A6aBVmknpjZbyvKcL5kwlWj9Omvw5Ip3IgWJJk8jSaYtlu3zM63 -Nwf9JtmYhST/WSMDmu2dnajkXjjO11INb9I/bbEFa0nOipFGc/T2L/Coc3cOZayh -jWZSaX5LaAzHHjcng6WMxwLkFM1JAbBzs/3GkDpv0mztO+7skb6iQ12LAEpmJURw -3kAP+HwV96LOPNdeE4yBFxgX0b3xdxA61GU5wSesVywlVP+i2k+KYTlerj1KjL0= ------END CERTIFICATE----- - -# Issuer: CN=emSign Root CA - G1 O=eMudhra Technologies Limited OU=emSign PKI -# Subject: CN=emSign Root CA - G1 O=eMudhra Technologies Limited OU=emSign PKI -# Label: "emSign Root CA - G1" -# Serial: 235931866688319308814040 -# MD5 Fingerprint: 9c:42:84:57:dd:cb:0b:a7:2e:95:ad:b6:f3:da:bc:ac -# SHA1 Fingerprint: 8a:c7:ad:8f:73:ac:4e:c1:b5:75:4d:a5:40:f4:fc:cf:7c:b5:8e:8c -# SHA256 Fingerprint: 40:f6:af:03:46:a9:9a:a1:cd:1d:55:5a:4e:9c:ce:62:c7:f9:63:46:03:ee:40:66:15:83:3d:c8:c8:d0:03:67 ------BEGIN CERTIFICATE----- -MIIDlDCCAnygAwIBAgIKMfXkYgxsWO3W2DANBgkqhkiG9w0BAQsFADBnMQswCQYD -VQQGEwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBU -ZWNobm9sb2dpZXMgTGltaXRlZDEcMBoGA1UEAxMTZW1TaWduIFJvb3QgQ0EgLSBH -MTAeFw0xODAyMTgxODMwMDBaFw00MzAyMTgxODMwMDBaMGcxCzAJBgNVBAYTAklO -MRMwEQYDVQQLEwplbVNpZ24gUEtJMSUwIwYDVQQKExxlTXVkaHJhIFRlY2hub2xv -Z2llcyBMaW1pdGVkMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEcxMIIBIjAN -BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAk0u76WaK7p1b1TST0Bsew+eeuGQz -f2N4aLTNLnF115sgxk0pvLZoYIr3IZpWNVrzdr3YzZr/k1ZLpVkGoZM0Kd0WNHVO -8oG0x5ZOrRkVUkr+PHB1cM2vK6sVmjM8qrOLqs1D/fXqcP/tzxE7lM5OMhbTI0Aq -d7OvPAEsbO2ZLIvZTmmYsvePQbAyeGHWDV/D+qJAkh1cF+ZwPjXnorfCYuKrpDhM -tTk1b+oDafo6VGiFbdbyL0NVHpENDtjVaqSW0RM8LHhQ6DqS0hdW5TUaQBw+jSzt -Od9C4INBdN+jzcKGYEho42kLVACL5HZpIQ15TjQIXhTCzLG3rdd8cIrHhQIDAQAB -o0IwQDAdBgNVHQ4EFgQU++8Nhp6w492pufEhF38+/PB3KxowDgYDVR0PAQH/BAQD -AgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFn/8oz1h31x -PaOfG1vR2vjTnGs2vZupYeveFix0PZ7mddrXuqe8QhfnPZHr5X3dPpzxz5KsbEjM -wiI/aTvFthUvozXGaCocV685743QNcMYDHsAVhzNixl03r4PEuDQqqE/AjSxcM6d -GNYIAwlG7mDgfrbESQRRfXBgvKqy/3lyeqYdPV8q+Mri/Tm3R7nrft8EI6/6nAYH -6ftjk4BAtcZsCjEozgyfz7MjNYBBjWzEN3uBL4ChQEKF6dk4jeihU80Bv2noWgby -RQuQ+q7hv53yrlc8pa6yVvSLZUDp/TGBLPQ5Cdjua6e0ph0VpZj3AYHYhX3zUVxx -iN66zB+Afko= ------END CERTIFICATE----- - -# Issuer: CN=emSign ECC Root CA - G3 O=eMudhra Technologies Limited OU=emSign PKI -# Subject: CN=emSign ECC Root CA - G3 O=eMudhra Technologies Limited OU=emSign PKI -# Label: "emSign ECC Root CA - G3" -# Serial: 287880440101571086945156 -# MD5 Fingerprint: ce:0b:72:d1:9f:88:8e:d0:50:03:e8:e3:b8:8b:67:40 -# SHA1 Fingerprint: 30:43:fa:4f:f2:57:dc:a0:c3:80:ee:2e:58:ea:78:b2:3f:e6:bb:c1 -# SHA256 Fingerprint: 86:a1:ec:ba:08:9c:4a:8d:3b:be:27:34:c6:12:ba:34:1d:81:3e:04:3c:f9:e8:a8:62:cd:5c:57:a3:6b:be:6b ------BEGIN CERTIFICATE----- -MIICTjCCAdOgAwIBAgIKPPYHqWhwDtqLhDAKBggqhkjOPQQDAzBrMQswCQYDVQQG -EwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNo -bm9sb2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0g -RzMwHhcNMTgwMjE4MTgzMDAwWhcNNDMwMjE4MTgzMDAwWjBrMQswCQYDVQQGEwJJ -TjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNobm9s -b2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0gRzMw -djAQBgcqhkjOPQIBBgUrgQQAIgNiAAQjpQy4LRL1KPOxst3iAhKAnjlfSU2fySU0 -WXTsuwYc58Byr+iuL+FBVIcUqEqy6HyC5ltqtdyzdc6LBtCGI79G1Y4PPwT01xyS -fvalY8L1X44uT6EYGQIrMgqCZH0Wk9GjQjBAMB0GA1UdDgQWBBR8XQKEE9TMipuB -zhccLikenEhjQjAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggq -hkjOPQQDAwNpADBmAjEAvvNhzwIQHWSVB7gYboiFBS+DCBeQyh+KTOgNG3qxrdWB -CUfvO6wIBHxcmbHtRwfSAjEAnbpV/KlK6O3t5nYBQnvI+GDZjVGLVTv7jHvrZQnD -+JbNR6iC8hZVdyR+EhCVBCyj ------END CERTIFICATE----- - -# Issuer: CN=emSign Root CA - C1 O=eMudhra Inc OU=emSign PKI -# Subject: CN=emSign Root CA - C1 O=eMudhra Inc OU=emSign PKI -# Label: "emSign Root CA - C1" -# Serial: 825510296613316004955058 -# MD5 Fingerprint: d8:e3:5d:01:21:fa:78:5a:b0:df:ba:d2:ee:2a:5f:68 -# SHA1 Fingerprint: e7:2e:f1:df:fc:b2:09:28:cf:5d:d4:d5:67:37:b1:51:cb:86:4f:01 -# SHA256 Fingerprint: 12:56:09:aa:30:1d:a0:a2:49:b9:7a:82:39:cb:6a:34:21:6f:44:dc:ac:9f:39:54:b1:42:92:f2:e8:c8:60:8f ------BEGIN CERTIFICATE----- -MIIDczCCAlugAwIBAgILAK7PALrEzzL4Q7IwDQYJKoZIhvcNAQELBQAwVjELMAkG -A1UEBhMCVVMxEzARBgNVBAsTCmVtU2lnbiBQS0kxFDASBgNVBAoTC2VNdWRocmEg -SW5jMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEMxMB4XDTE4MDIxODE4MzAw -MFoXDTQzMDIxODE4MzAwMFowVjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln -biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMRwwGgYDVQQDExNlbVNpZ24gUm9v -dCBDQSAtIEMxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAz+upufGZ -BczYKCFK83M0UYRWEPWgTywS4/oTmifQz/l5GnRfHXk5/Fv4cI7gklL35CX5VIPZ -HdPIWoU/Xse2B+4+wM6ar6xWQio5JXDWv7V7Nq2s9nPczdcdioOl+yuQFTdrHCZH -3DspVpNqs8FqOp099cGXOFgFixwR4+S0uF2FHYP+eF8LRWgYSKVGczQ7/g/IdrvH -GPMF0Ybzhe3nudkyrVWIzqa2kbBPrH4VI5b2P/AgNBbeCsbEBEV5f6f9vtKppa+c -xSMq9zwhbL2vj07FOrLzNBL834AaSaTUqZX3noleoomslMuoaJuvimUnzYnu3Yy1 -aylwQ6BpC+S5DwIDAQABo0IwQDAdBgNVHQ4EFgQU/qHgcB4qAzlSWkK+XJGFehiq -TbUwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL -BQADggEBAMJKVvoVIXsoounlHfv4LcQ5lkFMOycsxGwYFYDGrK9HWS8mC+M2sO87 -/kOXSTKZEhVb3xEp/6tT+LvBeA+snFOvV71ojD1pM/CjoCNjO2RnIkSt1XHLVip4 -kqNPEjE2NuLe/gDEo2APJ62gsIq1NnpSob0n9CAnYuhNlCQT5AoE6TyrLshDCUrG -YQTlSTR+08TI9Q/Aqum6VF7zYytPT1DU/rl7mYw9wC68AivTxEDkigcxHpvOJpkT -+xHqmiIMERnHXhuBUDDIlhJu58tBf5E7oke3VIAb3ADMmpDqw8NQBmIMMMAVSKeo -WXzhriKi4gp6D/piq1JM4fHfyr6DDUI= ------END CERTIFICATE----- - -# Issuer: CN=emSign ECC Root CA - C3 O=eMudhra Inc OU=emSign PKI -# Subject: CN=emSign ECC Root CA - C3 O=eMudhra Inc OU=emSign PKI -# Label: "emSign ECC Root CA - C3" -# Serial: 582948710642506000014504 -# MD5 Fingerprint: 3e:53:b3:a3:81:ee:d7:10:f8:d3:b0:1d:17:92:f5:d5 -# SHA1 Fingerprint: b6:af:43:c2:9b:81:53:7d:f6:ef:6b:c3:1f:1f:60:15:0c:ee:48:66 -# SHA256 Fingerprint: bc:4d:80:9b:15:18:9d:78:db:3e:1d:8c:f4:f9:72:6a:79:5d:a1:64:3c:a5:f1:35:8e:1d:db:0e:dc:0d:7e:b3 ------BEGIN CERTIFICATE----- -MIICKzCCAbGgAwIBAgIKe3G2gla4EnycqDAKBggqhkjOPQQDAzBaMQswCQYDVQQG -EwJVUzETMBEGA1UECxMKZW1TaWduIFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJbmMx -IDAeBgNVBAMTF2VtU2lnbiBFQ0MgUm9vdCBDQSAtIEMzMB4XDTE4MDIxODE4MzAw -MFoXDTQzMDIxODE4MzAwMFowWjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln -biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMSAwHgYDVQQDExdlbVNpZ24gRUND -IFJvb3QgQ0EgLSBDMzB2MBAGByqGSM49AgEGBSuBBAAiA2IABP2lYa57JhAd6bci -MK4G9IGzsUJxlTm801Ljr6/58pc1kjZGDoeVjbk5Wum739D+yAdBPLtVb4Ojavti -sIGJAnB9SMVK4+kiVCJNk7tCDK93nCOmfddhEc5lx/h//vXyqaNCMEAwHQYDVR0O -BBYEFPtaSNCAIEDyqOkAB2kZd6fmw/TPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB -Af8EBTADAQH/MAoGCCqGSM49BAMDA2gAMGUCMQC02C8Cif22TGK6Q04ThHK1rt0c -3ta13FaPWEBaLd4gTCKDypOofu4SQMfWh0/434UCMBwUZOR8loMRnLDRWmFLpg9J -0wD8ofzkpf9/rdcw0Md3f76BB1UwUCAU9Vc4CqgxUQ== ------END CERTIFICATE----- - -# Issuer: CN=Hongkong Post Root CA 3 O=Hongkong Post -# Subject: CN=Hongkong Post Root CA 3 O=Hongkong Post -# Label: "Hongkong Post Root CA 3" -# Serial: 46170865288971385588281144162979347873371282084 -# MD5 Fingerprint: 11:fc:9f:bd:73:30:02:8a:fd:3f:f3:58:b9:cb:20:f0 -# SHA1 Fingerprint: 58:a2:d0:ec:20:52:81:5b:c1:f3:f8:64:02:24:4e:c2:8e:02:4b:02 -# SHA256 Fingerprint: 5a:2f:c0:3f:0c:83:b0:90:bb:fa:40:60:4b:09:88:44:6c:76:36:18:3d:f9:84:6e:17:10:1a:44:7f:b8:ef:d6 ------BEGIN CERTIFICATE----- -MIIFzzCCA7egAwIBAgIUCBZfikyl7ADJk0DfxMauI7gcWqQwDQYJKoZIhvcNAQEL -BQAwbzELMAkGA1UEBhMCSEsxEjAQBgNVBAgTCUhvbmcgS29uZzESMBAGA1UEBxMJ -SG9uZyBLb25nMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25n -a29uZyBQb3N0IFJvb3QgQ0EgMzAeFw0xNzA2MDMwMjI5NDZaFw00MjA2MDMwMjI5 -NDZaMG8xCzAJBgNVBAYTAkhLMRIwEAYDVQQIEwlIb25nIEtvbmcxEjAQBgNVBAcT -CUhvbmcgS29uZzEWMBQGA1UEChMNSG9uZ2tvbmcgUG9zdDEgMB4GA1UEAxMXSG9u -Z2tvbmcgUG9zdCBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK -AoICAQCziNfqzg8gTr7m1gNt7ln8wlffKWihgw4+aMdoWJwcYEuJQwy51BWy7sFO -dem1p+/l6TWZ5Mwc50tfjTMwIDNT2aa71T4Tjukfh0mtUC1Qyhi+AViiE3CWu4mI -VoBc+L0sPOFMV4i707mV78vH9toxdCim5lSJ9UExyuUmGs2C4HDaOym71QP1mbpV -9WTRYA6ziUm4ii8F0oRFKHyPaFASePwLtVPLwpgchKOesL4jpNrcyCse2m5FHomY -2vkALgbpDDtw1VAliJnLzXNg99X/NWfFobxeq81KuEXryGgeDQ0URhLj0mRiikKY -vLTGCAj4/ahMZJx2Ab0vqWwzD9g/KLg8aQFChn5pwckGyuV6RmXpwtZQQS4/t+Tt -bNe/JgERohYpSms0BpDsE9K2+2p20jzt8NYt3eEV7KObLyzJPivkaTv/ciWxNoZb -x39ri1UbSsUgYT2uy1DhCDq+sI9jQVMwCFk8mB13umOResoQUGC/8Ne8lYePl8X+ -l2oBlKN8W4UdKjk60FSh0Tlxnf0h+bV78OLgAo9uliQlLKAeLKjEiafv7ZkGL7YK -TE/bosw3Gq9HhS2KX8Q0NEwA/RiTZxPRN+ZItIsGxVd7GYYKecsAyVKvQv83j+Gj -Hno9UKtjBucVtT+2RTeUN7F+8kjDf8V1/peNRY8apxpyKBpADwIDAQABo2MwYTAP -BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAfBgNVHSMEGDAWgBQXnc0e -i9Y5K3DTXNSguB+wAPzFYTAdBgNVHQ4EFgQUF53NHovWOStw01zUoLgfsAD8xWEw -DQYJKoZIhvcNAQELBQADggIBAFbVe27mIgHSQpsY1Q7XZiNc4/6gx5LS6ZStS6LG -7BJ8dNVI0lkUmcDrudHr9EgwW62nV3OZqdPlt9EuWSRY3GguLmLYauRwCy0gUCCk -MpXRAJi70/33MvJJrsZ64Ee+bs7Lo3I6LWldy8joRTnU+kLBEUx3XZL7av9YROXr -gZ6voJmtvqkBZss4HTzfQx/0TW60uhdG/H39h4F5ag0zD/ov+BS5gLNdTaqX4fnk -GMX41TiMJjz98iji7lpJiCzfeT2OnpA8vUFKOt1b9pq0zj8lMH8yfaIDlNDceqFS -3m6TjRgm/VWsvY+b0s+v54Ysyx8Jb6NvqYTUc79NoXQbTiNg8swOqn+knEwlqLJm -Ozj/2ZQw9nKEvmhVEA/GcywWaZMH/rFF7buiVWqw2rVKAiUnhde3t4ZEFolsgCs+ -l6mc1X5VTMbeRRAc6uk7nwNT7u56AQIWeNTowr5GdogTPyK7SBIdUgC0An4hGh6c -JfTzPV4e0hz5sy229zdcxsshTrD3mUcYhcErulWuBurQB7Lcq9CClnXO0lD+mefP -L5/ndtFhKvshuzHQqp9HpLIiyhY6UFfEW0NnxWViA0kB60PZ2Pierc+xYw5F9KBa -LJstxabArahH9CdMOA0uG0k7UvToiIMrVCjU8jVStDKDYmlkDJGcn5fqdBb9HxEG -mpv0 ------END CERTIFICATE----- - -# Issuer: CN=Microsoft ECC Root Certificate Authority 2017 O=Microsoft Corporation -# Subject: CN=Microsoft ECC Root Certificate Authority 2017 O=Microsoft Corporation -# Label: "Microsoft ECC Root Certificate Authority 2017" -# Serial: 136839042543790627607696632466672567020 -# MD5 Fingerprint: dd:a1:03:e6:4a:93:10:d1:bf:f0:19:42:cb:fe:ed:67 -# SHA1 Fingerprint: 99:9a:64:c3:7f:f4:7d:9f:ab:95:f1:47:69:89:14:60:ee:c4:c3:c5 -# SHA256 Fingerprint: 35:8d:f3:9d:76:4a:f9:e1:b7:66:e9:c9:72:df:35:2e:e1:5c:fa:c2:27:af:6a:d1:d7:0e:8e:4a:6e:dc:ba:02 ------BEGIN CERTIFICATE----- -MIICWTCCAd+gAwIBAgIQZvI9r4fei7FK6gxXMQHC7DAKBggqhkjOPQQDAzBlMQsw -CQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYD -VQQDEy1NaWNyb3NvZnQgRUNDIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw -MTcwHhcNMTkxMjE4MjMwNjQ1WhcNNDIwNzE4MjMxNjA0WjBlMQswCQYDVQQGEwJV -UzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYDVQQDEy1NaWNy -b3NvZnQgRUNDIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTcwdjAQBgcq -hkjOPQIBBgUrgQQAIgNiAATUvD0CQnVBEyPNgASGAlEvaqiBYgtlzPbKnR5vSmZR -ogPZnZH6thaxjG7efM3beaYvzrvOcS/lpaso7GMEZpn4+vKTEAXhgShC48Zo9OYb -hGBKia/teQ87zvH2RPUBeMCjVDBSMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8E -BTADAQH/MB0GA1UdDgQWBBTIy5lycFIM+Oa+sgRXKSrPQhDtNTAQBgkrBgEEAYI3 -FQEEAwIBADAKBggqhkjOPQQDAwNoADBlAjBY8k3qDPlfXu5gKcs68tvWMoQZP3zV -L8KxzJOuULsJMsbG7X7JNpQS5GiFBqIb0C8CMQCZ6Ra0DvpWSNSkMBaReNtUjGUB -iudQZsIxtzm6uBoiB078a1QWIP8rtedMDE2mT3M= ------END CERTIFICATE----- - -# Issuer: CN=Microsoft RSA Root Certificate Authority 2017 O=Microsoft Corporation -# Subject: CN=Microsoft RSA Root Certificate Authority 2017 O=Microsoft Corporation -# Label: "Microsoft RSA Root Certificate Authority 2017" -# Serial: 40975477897264996090493496164228220339 -# MD5 Fingerprint: 10:ff:00:ff:cf:c9:f8:c7:7a:c0:ee:35:8e:c9:0f:47 -# SHA1 Fingerprint: 73:a5:e6:4a:3b:ff:83:16:ff:0e:dc:cc:61:8a:90:6e:4e:ae:4d:74 -# SHA256 Fingerprint: c7:41:f7:0f:4b:2a:8d:88:bf:2e:71:c1:41:22:ef:53:ef:10:eb:a0:cf:a5:e6:4c:fa:20:f4:18:85:30:73:e0 ------BEGIN CERTIFICATE----- -MIIFqDCCA5CgAwIBAgIQHtOXCV/YtLNHcB6qvn9FszANBgkqhkiG9w0BAQwFADBl -MQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYw -NAYDVQQDEy1NaWNyb3NvZnQgUlNBIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 -IDIwMTcwHhcNMTkxMjE4MjI1MTIyWhcNNDIwNzE4MjMwMDIzWjBlMQswCQYDVQQG -EwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYDVQQDEy1N -aWNyb3NvZnQgUlNBIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTcwggIi -MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKW76UM4wplZEWCpW9R2LBifOZ -Nt9GkMml7Xhqb0eRaPgnZ1AzHaGm++DlQ6OEAlcBXZxIQIJTELy/xztokLaCLeX0 -ZdDMbRnMlfl7rEqUrQ7eS0MdhweSE5CAg2Q1OQT85elss7YfUJQ4ZVBcF0a5toW1 -HLUX6NZFndiyJrDKxHBKrmCk3bPZ7Pw71VdyvD/IybLeS2v4I2wDwAW9lcfNcztm -gGTjGqwu+UcF8ga2m3P1eDNbx6H7JyqhtJqRjJHTOoI+dkC0zVJhUXAoP8XFWvLJ -jEm7FFtNyP9nTUwSlq31/niol4fX/V4ggNyhSyL71Imtus5Hl0dVe49FyGcohJUc -aDDv70ngNXtk55iwlNpNhTs+VcQor1fznhPbRiefHqJeRIOkpcrVE7NLP8TjwuaG -YaRSMLl6IE9vDzhTyzMMEyuP1pq9KsgtsRx9S1HKR9FIJ3Jdh+vVReZIZZ2vUpC6 -W6IYZVcSn2i51BVrlMRpIpj0M+Dt+VGOQVDJNE92kKz8OMHY4Xu54+OU4UZpyw4K -UGsTuqwPN1q3ErWQgR5WrlcihtnJ0tHXUeOrO8ZV/R4O03QK0dqq6mm4lyiPSMQH -+FJDOvTKVTUssKZqwJz58oHhEmrARdlns87/I6KJClTUFLkqqNfs+avNJVgyeY+Q -W5g5xAgGwax/Dj0ApQIDAQABo1QwUjAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/ -BAUwAwEB/zAdBgNVHQ4EFgQUCctZf4aycI8awznjwNnpv7tNsiMwEAYJKwYBBAGC -NxUBBAMCAQAwDQYJKoZIhvcNAQEMBQADggIBAKyvPl3CEZaJjqPnktaXFbgToqZC -LgLNFgVZJ8og6Lq46BrsTaiXVq5lQ7GPAJtSzVXNUzltYkyLDVt8LkS/gxCP81OC -gMNPOsduET/m4xaRhPtthH80dK2Jp86519efhGSSvpWhrQlTM93uCupKUY5vVau6 -tZRGrox/2KJQJWVggEbbMwSubLWYdFQl3JPk+ONVFT24bcMKpBLBaYVu32TxU5nh -SnUgnZUP5NbcA/FZGOhHibJXWpS2qdgXKxdJ5XbLwVaZOjex/2kskZGT4d9Mozd2 -TaGf+G0eHdP67Pv0RR0Tbc/3WeUiJ3IrhvNXuzDtJE3cfVa7o7P4NHmJweDyAmH3 -pvwPuxwXC65B2Xy9J6P9LjrRk5Sxcx0ki69bIImtt2dmefU6xqaWM/5TkshGsRGR -xpl/j8nWZjEgQRCHLQzWwa80mMpkg/sTV9HB8Dx6jKXB/ZUhoHHBk2dxEuqPiApp -GWSZI1b7rCoucL5mxAyE7+WL85MB+GqQk2dLsmijtWKP6T+MejteD+eMuMZ87zf9 -dOLITzNy4ZQ5bb0Sr74MTnB8G2+NszKTc0QWbej09+CVgI+WXTik9KveCjCHk9hN -AHFiRSdLOkKEW39lt2c0Ui2cFmuqqNh7o0JMcccMyj6D5KbvtwEwXlGjefVwaaZB -RA+GsCyRxj3qrg+E ------END CERTIFICATE----- - -# Issuer: CN=e-Szigno Root CA 2017 O=Microsec Ltd. -# Subject: CN=e-Szigno Root CA 2017 O=Microsec Ltd. -# Label: "e-Szigno Root CA 2017" -# Serial: 411379200276854331539784714 -# MD5 Fingerprint: de:1f:f6:9e:84:ae:a7:b4:21:ce:1e:58:7d:d1:84:98 -# SHA1 Fingerprint: 89:d4:83:03:4f:9e:9a:48:80:5f:72:37:d4:a9:a6:ef:cb:7c:1f:d1 -# SHA256 Fingerprint: be:b0:0b:30:83:9b:9b:c3:2c:32:e4:44:79:05:95:06:41:f2:64:21:b1:5e:d0:89:19:8b:51:8a:e2:ea:1b:99 ------BEGIN CERTIFICATE----- -MIICQDCCAeWgAwIBAgIMAVRI7yH9l1kN9QQKMAoGCCqGSM49BAMCMHExCzAJBgNV -BAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMgTHRk -LjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25vIFJv -b3QgQ0EgMjAxNzAeFw0xNzA4MjIxMjA3MDZaFw00MjA4MjIxMjA3MDZaMHExCzAJ -BgNVBAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMg -THRkLjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25v -IFJvb3QgQ0EgMjAxNzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJbcPYrYsHtv -xie+RJCxs1YVe45DJH0ahFnuY2iyxl6H0BVIHqiQrb1TotreOpCmYF9oMrWGQd+H -Wyx7xf58etqjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G -A1UdDgQWBBSHERUI0arBeAyxr87GyZDvvzAEwDAfBgNVHSMEGDAWgBSHERUI0arB -eAyxr87GyZDvvzAEwDAKBggqhkjOPQQDAgNJADBGAiEAtVfd14pVCzbhhkT61Nlo -jbjcI4qKDdQvfepz7L9NbKgCIQDLpbQS+ue16M9+k/zzNY9vTlp8tLxOsvxyqltZ -+efcMQ== ------END CERTIFICATE----- - -# Issuer: O=CERTSIGN SA OU=certSIGN ROOT CA G2 -# Subject: O=CERTSIGN SA OU=certSIGN ROOT CA G2 -# Label: "certSIGN Root CA G2" -# Serial: 313609486401300475190 -# MD5 Fingerprint: 8c:f1:75:8a:c6:19:cf:94:b7:f7:65:20:87:c3:97:c7 -# SHA1 Fingerprint: 26:f9:93:b4:ed:3d:28:27:b0:b9:4b:a7:e9:15:1d:a3:8d:92:e5:32 -# SHA256 Fingerprint: 65:7c:fe:2f:a7:3f:aa:38:46:25:71:f3:32:a2:36:3a:46:fc:e7:02:09:51:71:07:02:cd:fb:b6:ee:da:33:05 ------BEGIN CERTIFICATE----- -MIIFRzCCAy+gAwIBAgIJEQA0tk7GNi02MA0GCSqGSIb3DQEBCwUAMEExCzAJBgNV -BAYTAlJPMRQwEgYDVQQKEwtDRVJUU0lHTiBTQTEcMBoGA1UECxMTY2VydFNJR04g -Uk9PVCBDQSBHMjAeFw0xNzAyMDYwOTI3MzVaFw00MjAyMDYwOTI3MzVaMEExCzAJ -BgNVBAYTAlJPMRQwEgYDVQQKEwtDRVJUU0lHTiBTQTEcMBoGA1UECxMTY2VydFNJ -R04gUk9PVCBDQSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMDF -dRmRfUR0dIf+DjuW3NgBFszuY5HnC2/OOwppGnzC46+CjobXXo9X69MhWf05N0Iw -vlDqtg+piNguLWkh59E3GE59kdUWX2tbAMI5Qw02hVK5U2UPHULlj88F0+7cDBrZ -uIt4ImfkabBoxTzkbFpG583H+u/E7Eu9aqSs/cwoUe+StCmrqzWaTOTECMYmzPhp -n+Sc8CnTXPnGFiWeI8MgwT0PPzhAsP6CRDiqWhqKa2NYOLQV07YRaXseVO6MGiKs -cpc/I1mbySKEwQdPzH/iV8oScLumZfNpdWO9lfsbl83kqK/20U6o2YpxJM02PbyW -xPFsqa7lzw1uKA2wDrXKUXt4FMMgL3/7FFXhEZn91QqhngLjYl/rNUssuHLoPj1P -rCy7Lobio3aP5ZMqz6WryFyNSwb/EkaseMsUBzXgqd+L6a8VTxaJW732jcZZroiF -DsGJ6x9nxUWO/203Nit4ZoORUSs9/1F3dmKh7Gc+PoGD4FapUB8fepmrY7+EF3fx -DTvf95xhszWYijqy7DwaNz9+j5LP2RIUZNoQAhVB/0/E6xyjyfqZ90bp4RjZsbgy -LcsUDFDYg2WD7rlcz8sFWkz6GZdr1l0T08JcVLwyc6B49fFtHsufpaafItzRUZ6C -eWRgKRM+o/1Pcmqr4tTluCRVLERLiohEnMqE0yo7AgMBAAGjQjBAMA8GA1UdEwEB -/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBSCIS1mxteg4BXrzkwJ -d8RgnlRuAzANBgkqhkiG9w0BAQsFAAOCAgEAYN4auOfyYILVAzOBywaK8SJJ6ejq -kX/GM15oGQOGO0MBzwdw5AgeZYWR5hEit/UCI46uuR59H35s5r0l1ZUa8gWmr4UC -b6741jH/JclKyMeKqdmfS0mbEVeZkkMR3rYzpMzXjWR91M08KCy0mpbqTfXERMQl -qiCA2ClV9+BB/AYm/7k29UMUA2Z44RGx2iBfRgB4ACGlHgAoYXhvqAEBj500mv/0 -OJD7uNGzcgbJceaBxXntC6Z58hMLnPddDnskk7RI24Zf3lCGeOdA5jGokHZwYa+c -NywRtYK3qq4kNFtyDGkNzVmf9nGvnAvRCjj5BiKDUyUM/FHE5r7iOZULJK2v0ZXk -ltd0ZGtxTgI8qoXzIKNDOXZbbFD+mpwUHmUUihW9o4JFWklWatKcsWMy5WHgUyIO -pwpJ6st+H6jiYoD2EEVSmAYY3qXNL3+q1Ok+CHLsIwMCPKaq2LxndD0UF/tUSxfj -03k9bWtJySgOLnRQvwzZRjoQhsmnP+mg7H/rpXdYaXHmgwo38oZJar55CJD2AhZk -PuXaTH4MNMn5X7azKFGnpyuqSfqNZSlO42sTp5SjLVFteAxEy9/eCG/Oo2Sr05WE -1LlSVHJ7liXMvGnjSG4N0MedJ5qq+BOS3R7fY581qRY27Iy4g/Q9iY/NtBde17MX -QRBdJ3NghVdJIgc= ------END CERTIFICATE----- - -# Issuer: CN=Trustwave Global Certification Authority O=Trustwave Holdings, Inc. -# Subject: CN=Trustwave Global Certification Authority O=Trustwave Holdings, Inc. -# Label: "Trustwave Global Certification Authority" -# Serial: 1846098327275375458322922162 -# MD5 Fingerprint: f8:1c:18:2d:2f:ba:5f:6d:a1:6c:bc:c7:ab:91:c7:0e -# SHA1 Fingerprint: 2f:8f:36:4f:e1:58:97:44:21:59:87:a5:2a:9a:d0:69:95:26:7f:b5 -# SHA256 Fingerprint: 97:55:20:15:f5:dd:fc:3c:87:88:c0:06:94:45:55:40:88:94:45:00:84:f1:00:86:70:86:bc:1a:2b:b5:8d:c8 ------BEGIN CERTIFICATE----- -MIIF2jCCA8KgAwIBAgIMBfcOhtpJ80Y1LrqyMA0GCSqGSIb3DQEBCwUAMIGIMQsw -CQYDVQQGEwJVUzERMA8GA1UECAwISWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28x -ITAfBgNVBAoMGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1 -c3R3YXZlIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xNzA4MjMx -OTM0MTJaFw00MjA4MjMxOTM0MTJaMIGIMQswCQYDVQQGEwJVUzERMA8GA1UECAwI -SWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28xITAfBgNVBAoMGFRydXN0d2F2ZSBI -b2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1c3R3YXZlIEdsb2JhbCBDZXJ0aWZp -Y2F0aW9uIEF1dGhvcml0eTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB -ALldUShLPDeS0YLOvR29zd24q88KPuFd5dyqCblXAj7mY2Hf8g+CY66j96xz0Xzn -swuvCAAJWX/NKSqIk4cXGIDtiLK0thAfLdZfVaITXdHG6wZWiYj+rDKd/VzDBcdu -7oaJuogDnXIhhpCujwOl3J+IKMujkkkP7NAP4m1ET4BqstTnoApTAbqOl5F2brz8 -1Ws25kCI1nsvXwXoLG0R8+eyvpJETNKXpP7ScoFDB5zpET71ixpZfR9oWN0EACyW -80OzfpgZdNmcc9kYvkHHNHnZ9GLCQ7mzJ7Aiy/k9UscwR7PJPrhq4ufogXBeQotP -JqX+OsIgbrv4Fo7NDKm0G2x2EOFYeUY+VM6AqFcJNykbmROPDMjWLBz7BegIlT1l -RtzuzWniTY+HKE40Cz7PFNm73bZQmq131BnW2hqIyE4bJ3XYsgjxroMwuREOzYfw -hI0Vcnyh78zyiGG69Gm7DIwLdVcEuE4qFC49DxweMqZiNu5m4iK4BUBjECLzMx10 -coos9TkpoNPnG4CELcU9402x/RpvumUHO1jsQkUm+9jaJXLE9gCxInm943xZYkqc -BW89zubWR2OZxiRvchLIrH+QtAuRcOi35hYQcRfO3gZPSEF9NUqjifLJS3tBEW1n -twiYTOURGa5CgNz7kAXU+FDKvuStx8KU1xad5hePrzb7AgMBAAGjQjBAMA8GA1Ud -EwEB/wQFMAMBAf8wHQYDVR0OBBYEFJngGWcNYtt2s9o9uFvo/ULSMQ6HMA4GA1Ud -DwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAmHNw4rDT7TnsTGDZqRKGFx6W -0OhUKDtkLSGm+J1WE2pIPU/HPinbbViDVD2HfSMF1OQc3Og4ZYbFdada2zUFvXfe -uyk3QAUHw5RSn8pk3fEbK9xGChACMf1KaA0HZJDmHvUqoai7PF35owgLEQzxPy0Q -lG/+4jSHg9bP5Rs1bdID4bANqKCqRieCNqcVtgimQlRXtpla4gt5kNdXElE1GYhB -aCXUNxeEFfsBctyV3lImIJgm4nb1J2/6ADtKYdkNy1GTKv0WBpanI5ojSP5RvbbE -sLFUzt5sQa0WZ37b/TjNuThOssFgy50X31ieemKyJo90lZvkWx3SD92YHJtZuSPT -MaCm/zjdzyBP6VhWOmfD0faZmZ26NraAL4hHT4a/RDqA5Dccprrql5gR0IRiR2Qe -qu5AvzSxnI9O4fKSTx+O856X3vOmeWqJcU9LJxdI/uz0UA9PSX3MReO9ekDFQdxh -VicGaeVyQYHTtgGJoC86cnn+OjC/QezHYj6RS8fZMXZC+fc8Y+wmjHMMfRod6qh8 -h6jCJ3zhM0EPz8/8AKAigJ5Kp28AsEFFtyLKaEjFQqKu3R3y4G5OBVixwJAWKqQ9 -EEC+j2Jjg6mcgn0tAumDMHzLJ8n9HmYAsC7TIS+OMxZsmO0QqAfWzJPP29FpHOTK -yeC2nOnOcXHebD8WpHk= ------END CERTIFICATE----- - -# Issuer: CN=Trustwave Global ECC P256 Certification Authority O=Trustwave Holdings, Inc. -# Subject: CN=Trustwave Global ECC P256 Certification Authority O=Trustwave Holdings, Inc. -# Label: "Trustwave Global ECC P256 Certification Authority" -# Serial: 4151900041497450638097112925 -# MD5 Fingerprint: 5b:44:e3:8d:5d:36:86:26:e8:0d:05:d2:59:a7:83:54 -# SHA1 Fingerprint: b4:90:82:dd:45:0c:be:8b:5b:b1:66:d3:e2:a4:08:26:cd:ed:42:cf -# SHA256 Fingerprint: 94:5b:bc:82:5e:a5:54:f4:89:d1:fd:51:a7:3d:df:2e:a6:24:ac:70:19:a0:52:05:22:5c:22:a7:8c:cf:a8:b4 ------BEGIN CERTIFICATE----- -MIICYDCCAgegAwIBAgIMDWpfCD8oXD5Rld9dMAoGCCqGSM49BAMCMIGRMQswCQYD -VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf -BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 -YXZlIEdsb2JhbCBFQ0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x -NzA4MjMxOTM1MTBaFw00MjA4MjMxOTM1MTBaMIGRMQswCQYDVQQGEwJVUzERMA8G -A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 -d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF -Q0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTBZMBMGByqGSM49AgEGCCqG -SM49AwEHA0IABH77bOYj43MyCMpg5lOcunSNGLB4kFKA3TjASh3RqMyTpJcGOMoN -FWLGjgEqZZ2q3zSRLoHB5DOSMcT9CTqmP62jQzBBMA8GA1UdEwEB/wQFMAMBAf8w -DwYDVR0PAQH/BAUDAwcGADAdBgNVHQ4EFgQUo0EGrJBt0UrrdaVKEJmzsaGLSvcw -CgYIKoZIzj0EAwIDRwAwRAIgB+ZU2g6gWrKuEZ+Hxbb/ad4lvvigtwjzRM4q3wgh -DDcCIC0mA6AFvWvR9lz4ZcyGbbOcNEhjhAnFjXca4syc4XR7 ------END CERTIFICATE----- - -# Issuer: CN=Trustwave Global ECC P384 Certification Authority O=Trustwave Holdings, Inc. -# Subject: CN=Trustwave Global ECC P384 Certification Authority O=Trustwave Holdings, Inc. -# Label: "Trustwave Global ECC P384 Certification Authority" -# Serial: 2704997926503831671788816187 -# MD5 Fingerprint: ea:cf:60:c4:3b:b9:15:29:40:a1:97:ed:78:27:93:d6 -# SHA1 Fingerprint: e7:f3:a3:c8:cf:6f:c3:04:2e:6d:0e:67:32:c5:9e:68:95:0d:5e:d2 -# SHA256 Fingerprint: 55:90:38:59:c8:c0:c3:eb:b8:75:9e:ce:4e:25:57:22:5f:f5:75:8b:bd:38:eb:d4:82:76:60:1e:1b:d5:80:97 ------BEGIN CERTIFICATE----- -MIICnTCCAiSgAwIBAgIMCL2Fl2yZJ6SAaEc7MAoGCCqGSM49BAMDMIGRMQswCQYD -VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf -BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 -YXZlIEdsb2JhbCBFQ0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x -NzA4MjMxOTM2NDNaFw00MjA4MjMxOTM2NDNaMIGRMQswCQYDVQQGEwJVUzERMA8G -A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 -d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF -Q0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTB2MBAGByqGSM49AgEGBSuB -BAAiA2IABGvaDXU1CDFHBa5FmVXxERMuSvgQMSOjfoPTfygIOiYaOs+Xgh+AtycJ -j9GOMMQKmw6sWASr9zZ9lCOkmwqKi6vr/TklZvFe/oyujUF5nQlgziip04pt89ZF -1PKYhDhloKNDMEEwDwYDVR0TAQH/BAUwAwEB/zAPBgNVHQ8BAf8EBQMDBwYAMB0G -A1UdDgQWBBRVqYSJ0sEyvRjLbKYHTsjnnb6CkDAKBggqhkjOPQQDAwNnADBkAjA3 -AZKXRRJ+oPM+rRk6ct30UJMDEr5E0k9BpIycnR+j9sKS50gU/k6bpZFXrsY3crsC -MGclCrEMXu6pY5Jv5ZAL/mYiykf9ijH3g/56vxC+GCsej/YpHpRZ744hN8tRmKVu -Sw== ------END CERTIFICATE----- - -# Issuer: CN=NAVER Global Root Certification Authority O=NAVER BUSINESS PLATFORM Corp. -# Subject: CN=NAVER Global Root Certification Authority O=NAVER BUSINESS PLATFORM Corp. -# Label: "NAVER Global Root Certification Authority" -# Serial: 9013692873798656336226253319739695165984492813 -# MD5 Fingerprint: c8:7e:41:f6:25:3b:f5:09:b3:17:e8:46:3d:bf:d0:9b -# SHA1 Fingerprint: 8f:6b:f2:a9:27:4a:da:14:a0:c4:f4:8e:61:27:f9:c0:1e:78:5d:d1 -# SHA256 Fingerprint: 88:f4:38:dc:f8:ff:d1:fa:8f:42:91:15:ff:e5:f8:2a:e1:e0:6e:0c:70:c3:75:fa:ad:71:7b:34:a4:9e:72:65 ------BEGIN CERTIFICATE----- -MIIFojCCA4qgAwIBAgIUAZQwHqIL3fXFMyqxQ0Rx+NZQTQ0wDQYJKoZIhvcNAQEM -BQAwaTELMAkGA1UEBhMCS1IxJjAkBgNVBAoMHU5BVkVSIEJVU0lORVNTIFBMQVRG -T1JNIENvcnAuMTIwMAYDVQQDDClOQVZFUiBHbG9iYWwgUm9vdCBDZXJ0aWZpY2F0 -aW9uIEF1dGhvcml0eTAeFw0xNzA4MTgwODU4NDJaFw0zNzA4MTgyMzU5NTlaMGkx -CzAJBgNVBAYTAktSMSYwJAYDVQQKDB1OQVZFUiBCVVNJTkVTUyBQTEFURk9STSBD -b3JwLjEyMDAGA1UEAwwpTkFWRVIgR2xvYmFsIFJvb3QgQ2VydGlmaWNhdGlvbiBB -dXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC21PGTXLVA -iQqrDZBbUGOukJR0F0Vy1ntlWilLp1agS7gvQnXp2XskWjFlqxcX0TM62RHcQDaH -38dq6SZeWYp34+hInDEW+j6RscrJo+KfziFTowI2MMtSAuXaMl3Dxeb57hHHi8lE -HoSTGEq0n+USZGnQJoViAbbJAh2+g1G7XNr4rRVqmfeSVPc0W+m/6imBEtRTkZaz -kVrd/pBzKPswRrXKCAfHcXLJZtM0l/aM9BhK4dA9WkW2aacp+yPOiNgSnABIqKYP -szuSjXEOdMWLyEz59JuOuDxp7W87UC9Y7cSw0BwbagzivESq2M0UXZR4Yb8Obtoq -vC8MC3GmsxY/nOb5zJ9TNeIDoKAYv7vxvvTWjIcNQvcGufFt7QSUqP620wbGQGHf -nZ3zVHbOUzoBppJB7ASjjw2i1QnK1sua8e9DXcCrpUHPXFNwcMmIpi3Ua2FzUCaG -YQ5fG8Ir4ozVu53BA0K6lNpfqbDKzE0K70dpAy8i+/Eozr9dUGWokG2zdLAIx6yo -0es+nPxdGoMuK8u180SdOqcXYZaicdNwlhVNt0xz7hlcxVs+Qf6sdWA7G2POAN3a -CJBitOUt7kinaxeZVL6HSuOpXgRM6xBtVNbv8ejyYhbLgGvtPe31HzClrkvJE+2K -AQHJuFFYwGY6sWZLxNUxAmLpdIQM201GLQIDAQABo0IwQDAdBgNVHQ4EFgQU0p+I -36HNLL3s9TsBAZMzJ7LrYEswDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMB -Af8wDQYJKoZIhvcNAQEMBQADggIBADLKgLOdPVQG3dLSLvCkASELZ0jKbY7gyKoN -qo0hV4/GPnrK21HUUrPUloSlWGB/5QuOH/XcChWB5Tu2tyIvCZwTFrFsDDUIbatj -cu3cvuzHV+YwIHHW1xDBE1UBjCpD5EHxzzp6U5LOogMFDTjfArsQLtk70pt6wKGm -+LUx5vR1yblTmXVHIloUFcd4G7ad6Qz4G3bxhYTeodoS76TiEJd6eN4MUZeoIUCL -hr0N8F5OSza7OyAfikJW4Qsav3vQIkMsRIz75Sq0bBwcupTgE34h5prCy8VCZLQe -lHsIJchxzIdFV4XTnyliIoNRlwAYl3dqmJLJfGBs32x9SuRwTMKeuB330DTHD8z7 -p/8Dvq1wkNoL3chtl1+afwkyQf3NosxabUzyqkn+Zvjp2DXrDige7kgvOtB5CTh8 -piKCk5XQA76+AqAF3SAi428diDRgxuYKuQl1C/AH6GmWNcf7I4GOODm4RStDeKLR -LBT/DShycpWbXgnbiUSYqqFJu3FS8r/2/yehNq+4tneI3TqkbZs0kNwUXTC/t+sX -5Ie3cdCh13cV1ELX8vMxmV2b3RZtP+oGI/hGoiLtk/bdmuYqh7GYVPEi92tF4+KO -dh2ajcQGjTa3FPOdVGm3jjzVpG2Tgbet9r1ke8LJaDmgkpzNNIaRkPpkUZ3+/uul -9XXeifdy ------END CERTIFICATE----- - -# Issuer: CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS O=FNMT-RCM OU=Ceres -# Subject: CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS O=FNMT-RCM OU=Ceres -# Label: "AC RAIZ FNMT-RCM SERVIDORES SEGUROS" -# Serial: 131542671362353147877283741781055151509 -# MD5 Fingerprint: 19:36:9c:52:03:2f:d2:d1:bb:23:cc:dd:1e:12:55:bb -# SHA1 Fingerprint: 62:ff:d9:9e:c0:65:0d:03:ce:75:93:d2:ed:3f:2d:32:c9:e3:e5:4a -# SHA256 Fingerprint: 55:41:53:b1:3d:2c:f9:dd:b7:53:bf:be:1a:4e:0a:e0:8d:0a:a4:18:70:58:fe:60:a2:b8:62:b2:e4:b8:7b:cb ------BEGIN CERTIFICATE----- -MIICbjCCAfOgAwIBAgIQYvYybOXE42hcG2LdnC6dlTAKBggqhkjOPQQDAzB4MQsw -CQYDVQQGEwJFUzERMA8GA1UECgwIRk5NVC1SQ00xDjAMBgNVBAsMBUNlcmVzMRgw -FgYDVQRhDA9WQVRFUy1RMjgyNjAwNEoxLDAqBgNVBAMMI0FDIFJBSVogRk5NVC1S -Q00gU0VSVklET1JFUyBTRUdVUk9TMB4XDTE4MTIyMDA5MzczM1oXDTQzMTIyMDA5 -MzczM1oweDELMAkGA1UEBhMCRVMxETAPBgNVBAoMCEZOTVQtUkNNMQ4wDAYDVQQL -DAVDZXJlczEYMBYGA1UEYQwPVkFURVMtUTI4MjYwMDRKMSwwKgYDVQQDDCNBQyBS -QUlaIEZOTVQtUkNNIFNFUlZJRE9SRVMgU0VHVVJPUzB2MBAGByqGSM49AgEGBSuB -BAAiA2IABPa6V1PIyqvfNkpSIeSX0oNnnvBlUdBeh8dHsVnyV0ebAAKTRBdp20LH -sbI6GA60XYyzZl2hNPk2LEnb80b8s0RpRBNm/dfF/a82Tc4DTQdxz69qBdKiQ1oK -Um8BA06Oi6NCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD -VR0OBBYEFAG5L++/EYZg8k/QQW6rcx/n0m5JMAoGCCqGSM49BAMDA2kAMGYCMQCu -SuMrQMN0EfKVrRYj3k4MGuZdpSRea0R7/DjiT8ucRRcRTBQnJlU5dUoDzBOQn5IC -MQD6SmxgiHPz7riYYqnOK8LZiqZwMR2vsJRM60/G49HzYqc8/5MuB1xJAWdpEgJy -v+c= ------END CERTIFICATE----- - -# Issuer: CN=GlobalSign Root R46 O=GlobalSign nv-sa -# Subject: CN=GlobalSign Root R46 O=GlobalSign nv-sa -# Label: "GlobalSign Root R46" -# Serial: 1552617688466950547958867513931858518042577 -# MD5 Fingerprint: c4:14:30:e4:fa:66:43:94:2a:6a:1b:24:5f:19:d0:ef -# SHA1 Fingerprint: 53:a2:b0:4b:ca:6b:d6:45:e6:39:8a:8e:c4:0d:d2:bf:77:c3:a2:90 -# SHA256 Fingerprint: 4f:a3:12:6d:8d:3a:11:d1:c4:85:5a:4f:80:7c:ba:d6:cf:91:9d:3a:5a:88:b0:3b:ea:2c:63:72:d9:3c:40:c9 ------BEGIN CERTIFICATE----- -MIIFWjCCA0KgAwIBAgISEdK7udcjGJ5AXwqdLdDfJWfRMA0GCSqGSIb3DQEBDAUA -MEYxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYD -VQQDExNHbG9iYWxTaWduIFJvb3QgUjQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMy -MDAwMDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt -c2ExHDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB -AQUAA4ICDwAwggIKAoICAQCsrHQy6LNl5brtQyYdpokNRbopiLKkHWPd08EsCVeJ -OaFV6Wc0dwxu5FUdUiXSE2te4R2pt32JMl8Nnp8semNgQB+msLZ4j5lUlghYruQG -vGIFAha/r6gjA7aUD7xubMLL1aa7DOn2wQL7Id5m3RerdELv8HQvJfTqa1VbkNud -316HCkD7rRlr+/fKYIje2sGP1q7Vf9Q8g+7XFkyDRTNrJ9CG0Bwta/OrffGFqfUo -0q3v84RLHIf8E6M6cqJaESvWJ3En7YEtbWaBkoe0G1h6zD8K+kZPTXhc+CtI4wSE -y132tGqzZfxCnlEmIyDLPRT5ge1lFgBPGmSXZgjPjHvjK8Cd+RTyG/FWaha/LIWF -zXg4mutCagI0GIMXTpRW+LaCtfOW3T3zvn8gdz57GSNrLNRyc0NXfeD412lPFzYE -+cCQYDdF3uYM2HSNrpyibXRdQr4G9dlkbgIQrImwTDsHTUB+JMWKmIJ5jqSngiCN -I/onccnfxkF0oE32kRbcRoxfKWMxWXEM2G/CtjJ9++ZdU6Z+Ffy7dXxd7Pj2Fxzs -x2sZy/N78CsHpdlseVR2bJ0cpm4O6XkMqCNqo98bMDGfsVR7/mrLZqrcZdCinkqa -ByFrgY/bxFn63iLABJzjqls2k+g9vXqhnQt2sQvHnf3PmKgGwvgqo6GDoLclcqUC -4wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV -HQ4EFgQUA1yrc4GHqMywptWU4jaWSf8FmSwwDQYJKoZIhvcNAQEMBQADggIBAHx4 -7PYCLLtbfpIrXTncvtgdokIzTfnvpCo7RGkerNlFo048p9gkUbJUHJNOxO97k4Vg -JuoJSOD1u8fpaNK7ajFxzHmuEajwmf3lH7wvqMxX63bEIaZHU1VNaL8FpO7XJqti -2kM3S+LGteWygxk6x9PbTZ4IevPuzz5i+6zoYMzRx6Fcg0XERczzF2sUyQQCPtIk -pnnpHs6i58FZFZ8d4kuaPp92CC1r2LpXFNqD6v6MVenQTqnMdzGxRBF6XLE+0xRF -FRhiJBPSy03OXIPBNvIQtQ6IbbjhVp+J3pZmOUdkLG5NrmJ7v2B0GbhWrJKsFjLt -rWhV/pi60zTe9Mlhww6G9kuEYO4Ne7UyWHmRVSyBQ7N0H3qqJZ4d16GLuc1CLgSk -ZoNNiTW2bKg2SnkheCLQQrzRQDGQob4Ez8pn7fXwgNNgyYMqIgXQBztSvwyeqiv5 -u+YfjyW6hY0XHgL+XVAEV8/+LbzvXMAaq7afJMbfc2hIkCwU9D9SGuTSyxTDYWnP -4vkYxboznxSjBF25cfe1lNj2M8FawTSLfJvdkzrnE6JwYZ+vj+vYxXX4M2bUdGc6 -N3ec592kD3ZDZopD8p/7DEJ4Y9HiD2971KE9dJeFt0g5QdYg/NA6s/rob8SKunE3 -vouXsXgxT7PntgMTzlSdriVZzH81Xwj3QEUxeCp6 ------END CERTIFICATE----- - -# Issuer: CN=GlobalSign Root E46 O=GlobalSign nv-sa -# Subject: CN=GlobalSign Root E46 O=GlobalSign nv-sa -# Label: "GlobalSign Root E46" -# Serial: 1552617690338932563915843282459653771421763 -# MD5 Fingerprint: b5:b8:66:ed:de:08:83:e3:c9:e2:01:34:06:ac:51:6f -# SHA1 Fingerprint: 39:b4:6c:d5:fe:80:06:eb:e2:2f:4a:bb:08:33:a0:af:db:b9:dd:84 -# SHA256 Fingerprint: cb:b9:c4:4d:84:b8:04:3e:10:50:ea:31:a6:9f:51:49:55:d7:bf:d2:e2:c6:b4:93:01:01:9a:d6:1d:9f:50:58 ------BEGIN CERTIFICATE----- -MIICCzCCAZGgAwIBAgISEdK7ujNu1LzmJGjFDYQdmOhDMAoGCCqGSM49BAMDMEYx -CzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYDVQQD -ExNHbG9iYWxTaWduIFJvb3QgRTQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMyMDAw -MDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2Ex -HDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBFNDYwdjAQBgcqhkjOPQIBBgUrgQQA -IgNiAAScDrHPt+ieUnd1NPqlRqetMhkytAepJ8qUuwzSChDH2omwlwxwEwkBjtjq -R+q+soArzfwoDdusvKSGN+1wCAB16pMLey5SnCNoIwZD7JIvU4Tb+0cUB+hflGdd -yXqBPCCjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud -DgQWBBQxCpCPtsad0kRLgLWi5h+xEk8blTAKBggqhkjOPQQDAwNoADBlAjEA31SQ -7Zvvi5QCkxeCmb6zniz2C5GMn0oUsfZkvLtoURMMA/cVi4RguYv/Uo7njLwcAjA8 -+RHUjE7AwWHCFUyqqx0LMV87HOIAl0Qx5v5zli/altP+CAezNIm8BZ/3Hobui3A= ------END CERTIFICATE----- - -# Issuer: CN=ANF Secure Server Root CA O=ANF Autoridad de Certificacion OU=ANF CA Raiz -# Subject: CN=ANF Secure Server Root CA O=ANF Autoridad de Certificacion OU=ANF CA Raiz -# Label: "ANF Secure Server Root CA" -# Serial: 996390341000653745 -# MD5 Fingerprint: 26:a6:44:5a:d9:af:4e:2f:b2:1d:b6:65:b0:4e:e8:96 -# SHA1 Fingerprint: 5b:6e:68:d0:cc:15:b6:a0:5f:1e:c1:5f:ae:02:fc:6b:2f:5d:6f:74 -# SHA256 Fingerprint: fb:8f:ec:75:91:69:b9:10:6b:1e:51:16:44:c6:18:c5:13:04:37:3f:6c:06:43:08:8d:8b:ef:fd:1b:99:75:99 ------BEGIN CERTIFICATE----- -MIIF7zCCA9egAwIBAgIIDdPjvGz5a7EwDQYJKoZIhvcNAQELBQAwgYQxEjAQBgNV -BAUTCUc2MzI4NzUxMDELMAkGA1UEBhMCRVMxJzAlBgNVBAoTHkFORiBBdXRvcmlk -YWQgZGUgQ2VydGlmaWNhY2lvbjEUMBIGA1UECxMLQU5GIENBIFJhaXoxIjAgBgNV -BAMTGUFORiBTZWN1cmUgU2VydmVyIFJvb3QgQ0EwHhcNMTkwOTA0MTAwMDM4WhcN -MzkwODMwMTAwMDM4WjCBhDESMBAGA1UEBRMJRzYzMjg3NTEwMQswCQYDVQQGEwJF -UzEnMCUGA1UEChMeQU5GIEF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uMRQwEgYD -VQQLEwtBTkYgQ0EgUmFpejEiMCAGA1UEAxMZQU5GIFNlY3VyZSBTZXJ2ZXIgUm9v -dCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANvrayvmZFSVgpCj -cqQZAZ2cC4Ffc0m6p6zzBE57lgvsEeBbphzOG9INgxwruJ4dfkUyYA8H6XdYfp9q -yGFOtibBTI3/TO80sh9l2Ll49a2pcbnvT1gdpd50IJeh7WhM3pIXS7yr/2WanvtH -2Vdy8wmhrnZEE26cLUQ5vPnHO6RYPUG9tMJJo8gN0pcvB2VSAKduyK9o7PQUlrZX -H1bDOZ8rbeTzPvY1ZNoMHKGESy9LS+IsJJ1tk0DrtSOOMspvRdOoiXsezx76W0OL -zc2oD2rKDF65nkeP8Nm2CgtYZRczuSPkdxl9y0oukntPLxB3sY0vaJxizOBQ+OyR -p1RMVwnVdmPF6GUe7m1qzwmd+nxPrWAI/VaZDxUse6mAq4xhj0oHdkLePfTdsiQz -W7i1o0TJrH93PB0j7IKppuLIBkwC/qxcmZkLLxCKpvR/1Yd0DVlJRfbwcVw5Kda/ -SiOL9V8BY9KHcyi1Swr1+KuCLH5zJTIdC2MKF4EA/7Z2Xue0sUDKIbvVgFHlSFJn -LNJhiQcND85Cd8BEc5xEUKDbEAotlRyBr+Qc5RQe8TZBAQIvfXOn3kLMTOmJDVb3 -n5HUA8ZsyY/b2BzgQJhdZpmYgG4t/wHFzstGH6wCxkPmrqKEPMVOHj1tyRRM4y5B -u8o5vzY8KhmqQYdOpc5LMnndkEl/AgMBAAGjYzBhMB8GA1UdIwQYMBaAFJxf0Gxj -o1+TypOYCK2Mh6UsXME3MB0GA1UdDgQWBBScX9BsY6Nfk8qTmAitjIelLFzBNzAO -BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC -AgEATh65isagmD9uw2nAalxJUqzLK114OMHVVISfk/CHGT0sZonrDUL8zPB1hT+L -9IBdeeUXZ701guLyPI59WzbLWoAAKfLOKyzxj6ptBZNscsdW699QIyjlRRA96Gej -rw5VD5AJYu9LWaL2U/HANeQvwSS9eS9OICI7/RogsKQOLHDtdD+4E5UGUcjohybK -pFtqFiGS3XNgnhAY3jyB6ugYw3yJ8otQPr0R4hUDqDZ9MwFsSBXXiJCZBMXM5gf0 -vPSQ7RPi6ovDj6MzD8EpTBNO2hVWcXNyglD2mjN8orGoGjR0ZVzO0eurU+AagNjq -OknkJjCb5RyKqKkVMoaZkgoQI1YS4PbOTOK7vtuNknMBZi9iPrJyJ0U27U1W45eZ -/zo1PqVUSlJZS2Db7v54EX9K3BR5YLZrZAPbFYPhor72I5dQ8AkzNqdxliXzuUJ9 -2zg/LFis6ELhDtjTO0wugumDLmsx2d1Hhk9tl5EuT+IocTUW0fJz/iUrB0ckYyfI -+PbZa/wSMVYIwFNCr5zQM378BvAxRAMU8Vjq8moNqRGyg77FGr8H6lnco4g175x2 -MjxNBiLOFeXdntiP2t7SxDnlF4HPOEfrf4htWRvfn0IUrn7PqLBmZdo3r5+qPeoo -tt7VMVgWglvquxl1AnMaykgaIZOQCo6ThKd9OyMYkomgjaw= ------END CERTIFICATE----- - -# Issuer: CN=Certum EC-384 CA O=Asseco Data Systems S.A. OU=Certum Certification Authority -# Subject: CN=Certum EC-384 CA O=Asseco Data Systems S.A. OU=Certum Certification Authority -# Label: "Certum EC-384 CA" -# Serial: 160250656287871593594747141429395092468 -# MD5 Fingerprint: b6:65:b3:96:60:97:12:a1:ec:4e:e1:3d:a3:c6:c9:f1 -# SHA1 Fingerprint: f3:3e:78:3c:ac:df:f4:a2:cc:ac:67:55:69:56:d7:e5:16:3c:e1:ed -# SHA256 Fingerprint: 6b:32:80:85:62:53:18:aa:50:d1:73:c9:8d:8b:da:09:d5:7e:27:41:3d:11:4c:f7:87:a0:f5:d0:6c:03:0c:f6 ------BEGIN CERTIFICATE----- -MIICZTCCAeugAwIBAgIQeI8nXIESUiClBNAt3bpz9DAKBggqhkjOPQQDAzB0MQsw -CQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEuMScw -JQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAXBgNVBAMT -EENlcnR1bSBFQy0zODQgQ0EwHhcNMTgwMzI2MDcyNDU0WhcNNDMwMzI2MDcyNDU0 -WjB0MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBT -LkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAX -BgNVBAMTEENlcnR1bSBFQy0zODQgQ0EwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATE -KI6rGFtqvm5kN2PkzeyrOvfMobgOgknXhimfoZTy42B4mIF4Bk3y7JoOV2CDn7Tm -Fy8as10CW4kjPMIRBSqniBMY81CE1700LCeJVf/OTOffph8oxPBUw7l8t1Ot68Kj -QjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI0GZnQkdjrzife81r1HfS+8 -EF9LMA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNoADBlAjADVS2m5hjEfO/J -UG7BJw+ch69u1RsIGL2SKcHvlJF40jocVYli5RsJHrpka/F2tNQCMQC0QoSZ/6vn -nvuRlydd3LBbMHHOXjgaatkl5+r3YZJW+OraNsKHZZYuciUvf9/DE8k= ------END CERTIFICATE----- - -# Issuer: CN=Certum Trusted Root CA O=Asseco Data Systems S.A. OU=Certum Certification Authority -# Subject: CN=Certum Trusted Root CA O=Asseco Data Systems S.A. OU=Certum Certification Authority -# Label: "Certum Trusted Root CA" -# Serial: 40870380103424195783807378461123655149 -# MD5 Fingerprint: 51:e1:c2:e7:fe:4c:84:af:59:0e:2f:f4:54:6f:ea:29 -# SHA1 Fingerprint: c8:83:44:c0:18:ae:9f:cc:f1:87:b7:8f:22:d1:c5:d7:45:84:ba:e5 -# SHA256 Fingerprint: fe:76:96:57:38:55:77:3e:37:a9:5e:7a:d4:d9:cc:96:c3:01:57:c1:5d:31:76:5b:a9:b1:57:04:e1:ae:78:fd ------BEGIN CERTIFICATE----- -MIIFwDCCA6igAwIBAgIQHr9ZULjJgDdMBvfrVU+17TANBgkqhkiG9w0BAQ0FADB6 -MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEu -MScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxHzAdBgNV -BAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwHhcNMTgwMzE2MTIxMDEzWhcNNDMw -MzE2MTIxMDEzWjB6MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEg -U3lzdGVtcyBTLkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRo -b3JpdHkxHzAdBgNVBAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwggIiMA0GCSqG -SIb3DQEBAQUAA4ICDwAwggIKAoICAQDRLY67tzbqbTeRn06TpwXkKQMlzhyC93yZ -n0EGze2jusDbCSzBfN8pfktlL5On1AFrAygYo9idBcEq2EXxkd7fO9CAAozPOA/q -p1x4EaTByIVcJdPTsuclzxFUl6s1wB52HO8AU5853BSlLCIls3Jy/I2z5T4IHhQq -NwuIPMqw9MjCoa68wb4pZ1Xi/K1ZXP69VyywkI3C7Te2fJmItdUDmj0VDT06qKhF -8JVOJVkdzZhpu9PMMsmN74H+rX2Ju7pgE8pllWeg8xn2A1bUatMn4qGtg/BKEiJ3 -HAVz4hlxQsDsdUaakFjgao4rpUYwBI4Zshfjvqm6f1bxJAPXsiEodg42MEx51UGa -mqi4NboMOvJEGyCI98Ul1z3G4z5D3Yf+xOr1Uz5MZf87Sst4WmsXXw3Hw09Omiqi -7VdNIuJGmj8PkTQkfVXjjJU30xrwCSss0smNtA0Aq2cpKNgB9RkEth2+dv5yXMSF -ytKAQd8FqKPVhJBPC/PgP5sZ0jeJP/J7UhyM9uH3PAeXjA6iWYEMspA90+NZRu0P -qafegGtaqge2Gcu8V/OXIXoMsSt0Puvap2ctTMSYnjYJdmZm/Bo/6khUHL4wvYBQ -v3y1zgD2DGHZ5yQD4OMBgQ692IU0iL2yNqh7XAjlRICMb/gv1SHKHRzQ+8S1h9E6 -Tsd2tTVItQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSM+xx1 -vALTn04uSNn5YFSqxLNP+jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQENBQAD -ggIBAEii1QALLtA/vBzVtVRJHlpr9OTy4EA34MwUe7nJ+jW1dReTagVphZzNTxl4 -WxmB82M+w85bj/UvXgF2Ez8sALnNllI5SW0ETsXpD4YN4fqzX4IS8TrOZgYkNCvo -zMrnadyHncI013nR03e4qllY/p0m+jiGPp2Kh2RX5Rc64vmNueMzeMGQ2Ljdt4NR -5MTMI9UGfOZR0800McD2RrsLrfw9EAUqO0qRJe6M1ISHgCq8CYyqOhNf6DR5UMEQ -GfnTKB7U0VEwKbOukGfWHwpjscWpxkIxYxeU72nLL/qMFH3EQxiJ2fAyQOaA4kZf -5ePBAFmo+eggvIksDkc0C+pXwlM2/KfUrzHN/gLldfq5Jwn58/U7yn2fqSLLiMmq -0Uc9NneoWWRrJ8/vJ8HjJLWG965+Mk2weWjROeiQWMODvA8s1pfrzgzhIMfatz7D -P78v3DSk+yshzWePS/Tj6tQ/50+6uaWTRRxmHyH6ZF5v4HaUMst19W7l9o/HuKTM -qJZ9ZPskWkoDbGs4xugDQ5r3V7mzKWmTOPQD8rv7gmsHINFSH5pkAnuYZttcTVoP -0ISVoDwUQwbKytu4QTbaakRnh6+v40URFWkIsr4WOZckbxJF0WddCajJFdr60qZf -E2Efv4WstK2tBZQIgx51F9NxO5NQI1mg7TyRVJ12AMXDuDjb ------END CERTIFICATE----- - -# Issuer: CN=TunTrust Root CA O=Agence Nationale de Certification Electronique -# Subject: CN=TunTrust Root CA O=Agence Nationale de Certification Electronique -# Label: "TunTrust Root CA" -# Serial: 108534058042236574382096126452369648152337120275 -# MD5 Fingerprint: 85:13:b9:90:5b:36:5c:b6:5e:b8:5a:f8:e0:31:57:b4 -# SHA1 Fingerprint: cf:e9:70:84:0f:e0:73:0f:9d:f6:0c:7f:2c:4b:ee:20:46:34:9c:bb -# SHA256 Fingerprint: 2e:44:10:2a:b5:8c:b8:54:19:45:1c:8e:19:d9:ac:f3:66:2c:af:bc:61:4b:6a:53:96:0a:30:f7:d0:e2:eb:41 ------BEGIN CERTIFICATE----- -MIIFszCCA5ugAwIBAgIUEwLV4kBMkkaGFmddtLu7sms+/BMwDQYJKoZIhvcNAQEL -BQAwYTELMAkGA1UEBhMCVE4xNzA1BgNVBAoMLkFnZW5jZSBOYXRpb25hbGUgZGUg -Q2VydGlmaWNhdGlvbiBFbGVjdHJvbmlxdWUxGTAXBgNVBAMMEFR1blRydXN0IFJv -b3QgQ0EwHhcNMTkwNDI2MDg1NzU2WhcNNDQwNDI2MDg1NzU2WjBhMQswCQYDVQQG -EwJUTjE3MDUGA1UECgwuQWdlbmNlIE5hdGlvbmFsZSBkZSBDZXJ0aWZpY2F0aW9u -IEVsZWN0cm9uaXF1ZTEZMBcGA1UEAwwQVHVuVHJ1c3QgUm9vdCBDQTCCAiIwDQYJ -KoZIhvcNAQEBBQADggIPADCCAgoCggIBAMPN0/y9BFPdDCA61YguBUtB9YOCfvdZ -n56eY+hz2vYGqU8ftPkLHzmMmiDQfgbU7DTZhrx1W4eI8NLZ1KMKsmwb60ksPqxd -2JQDoOw05TDENX37Jk0bbjBU2PWARZw5rZzJJQRNmpA+TkBuimvNKWfGzC3gdOgF -VwpIUPp6Q9p+7FuaDmJ2/uqdHYVy7BG7NegfJ7/Boce7SBbdVtfMTqDhuazb1YMZ -GoXRlJfXyqNlC/M4+QKu3fZnz8k/9YosRxqZbwUN/dAdgjH8KcwAWJeRTIAAHDOF -li/LQcKLEITDCSSJH7UP2dl3RxiSlGBcx5kDPP73lad9UKGAwqmDrViWVSHbhlnU -r8a83YFuB9tgYv7sEG7aaAH0gxupPqJbI9dkxt/con3YS7qC0lH4Zr8GRuR5KiY2 -eY8fTpkdso8MDhz/yV3A/ZAQprE38806JG60hZC/gLkMjNWb1sjxVj8agIl6qeIb -MlEsPvLfe/ZdeikZjuXIvTZxi11Mwh0/rViizz1wTaZQmCXcI/m4WEEIcb9PuISg -jwBUFfyRbVinljvrS5YnzWuioYasDXxU5mZMZl+QviGaAkYt5IPCgLnPSz7ofzwB -7I9ezX/SKEIBlYrilz0QIX32nRzFNKHsLA4KUiwSVXAkPcvCFDVDXSdOvsC9qnyW -5/yeYa1E0wCXAgMBAAGjYzBhMB0GA1UdDgQWBBQGmpsfU33x9aTI04Y+oXNZtPdE -ITAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFAaamx9TffH1pMjThj6hc1m0 -90QhMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAqgVutt0Vyb+z -xiD2BkewhpMl0425yAA/l/VSJ4hxyXT968pk21vvHl26v9Hr7lxpuhbI87mP0zYu -QEkHDVneixCwSQXi/5E/S7fdAo74gShczNxtr18UnH1YeA32gAm56Q6XKRm4t+v4 -FstVEuTGfbvE7Pi1HE4+Z7/FXxttbUcoqgRYYdZ2vyJ/0Adqp2RT8JeNnYA/u8EH -22Wv5psymsNUk8QcCMNE+3tjEUPRahphanltkE8pjkcFwRJpadbGNjHh/PqAulxP -xOu3Mqz4dWEX1xAZufHSCe96Qp1bWgvUxpVOKs7/B9dPfhgGiPEZtdmYu65xxBzn -dFlY7wyJz4sfdZMaBBSSSFCp61cpABbjNhzI+L/wM9VBD8TMPN3pM0MBkRArHtG5 -Xc0yGYuPjCB31yLEQtyEFpslbei0VXF/sHyz03FJuc9SpAQ/3D2gu68zngowYI7b -nV2UqL1g52KAdoGDDIzMMEZJ4gzSqK/rYXHv5yJiqfdcZGyfFoxnNidF9Ql7v/YQ -CvGwjVRDjAS6oz/v4jXH+XTgbzRB0L9zZVcg+ZtnemZoJE6AZb0QmQZZ8mWvuMZH -u/2QeItBcy6vVR/cO5JyboTT0GFMDcx2V+IthSIVNg3rAZ3r2OvEhJn7wAzMMujj -d9qDRIueVSjAi1jTkD5OGwDxFa2DK5o= ------END CERTIFICATE----- - -# Issuer: CN=HARICA TLS RSA Root CA 2021 O=Hellenic Academic and Research Institutions CA -# Subject: CN=HARICA TLS RSA Root CA 2021 O=Hellenic Academic and Research Institutions CA -# Label: "HARICA TLS RSA Root CA 2021" -# Serial: 76817823531813593706434026085292783742 -# MD5 Fingerprint: 65:47:9b:58:86:dd:2c:f0:fc:a2:84:1f:1e:96:c4:91 -# SHA1 Fingerprint: 02:2d:05:82:fa:88:ce:14:0c:06:79:de:7f:14:10:e9:45:d7:a5:6d -# SHA256 Fingerprint: d9:5d:0e:8e:da:79:52:5b:f9:be:b1:1b:14:d2:10:0d:32:94:98:5f:0c:62:d9:fa:bd:9c:d9:99:ec:cb:7b:1d ------BEGIN CERTIFICATE----- -MIIFpDCCA4ygAwIBAgIQOcqTHO9D88aOk8f0ZIk4fjANBgkqhkiG9w0BAQsFADBs -MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl -c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBSU0Eg -Um9vdCBDQSAyMDIxMB4XDTIxMDIxOTEwNTUzOFoXDTQ1MDIxMzEwNTUzN1owbDEL -MAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl -YXJjaCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgUlNBIFJv -b3QgQ0EgMjAyMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvC569l -mwVnlskNJLnQDmT8zuIkGCyEf3dRywQRNrhe7Wlxp57kJQmXZ8FHws+RFjZiPTgE -4VGC/6zStGndLuwRo0Xua2s7TL+MjaQenRG56Tj5eg4MmOIjHdFOY9TnuEFE+2uv -a9of08WRiFukiZLRgeaMOVig1mlDqa2YUlhu2wr7a89o+uOkXjpFc5gH6l8Cct4M -pbOfrqkdtx2z/IpZ525yZa31MJQjB/OCFks1mJxTuy/K5FrZx40d/JiZ+yykgmvw -Kh+OC19xXFyuQnspiYHLA6OZyoieC0AJQTPb5lh6/a6ZcMBaD9YThnEvdmn8kN3b -LW7R8pv1GmuebxWMevBLKKAiOIAkbDakO/IwkfN4E8/BPzWr8R0RI7VDIp4BkrcY -AuUR0YLbFQDMYTfBKnya4dC6s1BG7oKsnTH4+yPiAwBIcKMJJnkVU2DzOFytOOqB -AGMUuTNe3QvboEUHGjMJ+E20pwKmafTCWQWIZYVWrkvL4N48fS0ayOn7H6NhStYq -E613TBoYm5EPWNgGVMWX+Ko/IIqmhaZ39qb8HOLubpQzKoNQhArlT4b4UEV4AIHr -W2jjJo3Me1xR9BQsQL4aYB16cmEdH2MtiKrOokWQCPxrvrNQKlr9qEgYRtaQQJKQ -CoReaDH46+0N0x3GfZkYVVYnZS6NRcUk7M7jAgMBAAGjQjBAMA8GA1UdEwEB/wQF -MAMBAf8wHQYDVR0OBBYEFApII6ZgpJIKM+qTW8VX6iVNvRLuMA4GA1UdDwEB/wQE -AwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAPpBIqm5iFSVmewzVjIuJndftTgfvnNAU -X15QvWiWkKQUEapobQk1OUAJ2vQJLDSle1mESSmXdMgHHkdt8s4cUCbjnj1AUz/3 -f5Z2EMVGpdAgS1D0NTsY9FVqQRtHBmg8uwkIYtlfVUKqrFOFrJVWNlar5AWMxaja -H6NpvVMPxP/cyuN+8kyIhkdGGvMA9YCRotxDQpSbIPDRzbLrLFPCU3hKTwSUQZqP -JzLB5UkZv/HywouoCjkxKLR9YjYsTewfM7Z+d21+UPCfDtcRj88YxeMn/ibvBZ3P -zzfF0HvaO7AWhAw6k9a+F9sPPg4ZeAnHqQJyIkv3N3a6dcSFA1pj1bF1BcK5vZSt -jBWZp5N99sXzqnTPBIWUmAD04vnKJGW/4GKvyMX6ssmeVkjaef2WdhW+o45WxLM0 -/L5H9MG0qPzVMIho7suuyWPEdr6sOBjhXlzPrjoiUevRi7PzKzMHVIf6tLITe7pT -BGIBnfHAT+7hOtSLIBD6Alfm78ELt5BGnBkpjNxvoEppaZS3JGWg/6w/zgH7IS79 -aPib8qXPMThcFarmlwDB31qlpzmq6YR/PFGoOtmUW4y/Twhx5duoXNTSpv4Ao8YW -xw/ogM4cKGR0GQjTQuPOAF1/sdwTsOEFy9EgqoZ0njnnkf3/W9b3raYvAwtt41dU -63ZTGI0RmLo= ------END CERTIFICATE----- - -# Issuer: CN=HARICA TLS ECC Root CA 2021 O=Hellenic Academic and Research Institutions CA -# Subject: CN=HARICA TLS ECC Root CA 2021 O=Hellenic Academic and Research Institutions CA -# Label: "HARICA TLS ECC Root CA 2021" -# Serial: 137515985548005187474074462014555733966 -# MD5 Fingerprint: ae:f7:4c:e5:66:35:d1:b7:9b:8c:22:93:74:d3:4b:b0 -# SHA1 Fingerprint: bc:b0:c1:9d:e9:98:92:70:19:38:57:e9:8d:a7:b4:5d:6e:ee:01:48 -# SHA256 Fingerprint: 3f:99:cc:47:4a:cf:ce:4d:fe:d5:87:94:66:5e:47:8d:15:47:73:9f:2e:78:0f:1b:b4:ca:9b:13:30:97:d4:01 ------BEGIN CERTIFICATE----- -MIICVDCCAdugAwIBAgIQZ3SdjXfYO2rbIvT/WeK/zjAKBggqhkjOPQQDAzBsMQsw -CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh -cmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBFQ0MgUm9v -dCBDQSAyMDIxMB4XDTIxMDIxOTExMDExMFoXDTQ1MDIxMzExMDEwOVowbDELMAkG -A1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJj -aCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgRUNDIFJvb3Qg -Q0EgMjAyMTB2MBAGByqGSM49AgEGBSuBBAAiA2IABDgI/rGgltJ6rK9JOtDA4MM7 -KKrxcm1lAEeIhPyaJmuqS7psBAqIXhfyVYf8MLA04jRYVxqEU+kw2anylnTDUR9Y -STHMmE5gEYd103KUkE+bECUqqHgtvpBBWJAVcqeht6NCMEAwDwYDVR0TAQH/BAUw -AwEB/zAdBgNVHQ4EFgQUyRtTgRL+BNUW0aq8mm+3oJUZbsowDgYDVR0PAQH/BAQD -AgGGMAoGCCqGSM49BAMDA2cAMGQCMBHervjcToiwqfAircJRQO9gcS3ujwLEXQNw -SaSS6sUUiHCm0w2wqsosQJz76YJumgIwK0eaB8bRwoF8yguWGEEbo/QwCZ61IygN -nxS2PFOiTAZpffpskcYqSUXm7LcT4Tps ------END CERTIFICATE----- - -# Issuer: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 -# Subject: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 -# Label: "Autoridad de Certificacion Firmaprofesional CIF A62634068" -# Serial: 1977337328857672817 -# MD5 Fingerprint: 4e:6e:9b:54:4c:ca:b7:fa:48:e4:90:b1:15:4b:1c:a3 -# SHA1 Fingerprint: 0b:be:c2:27:22:49:cb:39:aa:db:35:5c:53:e3:8c:ae:78:ff:b6:fe -# SHA256 Fingerprint: 57:de:05:83:ef:d2:b2:6e:03:61:da:99:da:9d:f4:64:8d:ef:7e:e8:44:1c:3b:72:8a:fa:9b:cd:e0:f9:b2:6a ------BEGIN CERTIFICATE----- -MIIGFDCCA/ygAwIBAgIIG3Dp0v+ubHEwDQYJKoZIhvcNAQELBQAwUTELMAkGA1UE -BhMCRVMxQjBABgNVBAMMOUF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIEZpcm1h -cHJvZmVzaW9uYWwgQ0lGIEE2MjYzNDA2ODAeFw0xNDA5MjMxNTIyMDdaFw0zNjA1 -MDUxNTIyMDdaMFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUg -Q2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjgwggIi -MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKlmuO6vj78aI14H9M2uDDUtd9 -thDIAl6zQyrET2qyyhxdKJp4ERppWVevtSBC5IsP5t9bpgOSL/UR5GLXMnE42QQM -cas9UX4PB99jBVzpv5RvwSmCwLTaUbDBPLutN0pcyvFLNg4kq7/DhHf9qFD0sefG -L9ItWY16Ck6WaVICqjaY7Pz6FIMMNx/Jkjd/14Et5cS54D40/mf0PmbR0/RAz15i -NA9wBj4gGFrO93IbJWyTdBSTo3OxDqqHECNZXyAFGUftaI6SEspd/NYrspI8IM/h -X68gvqB2f3bl7BqGYTM+53u0P6APjqK5am+5hyZvQWyIplD9amML9ZMWGxmPsu2b -m8mQ9QEM3xk9Dz44I8kvjwzRAv4bVdZO0I08r0+k8/6vKtMFnXkIoctXMbScyJCy -Z/QYFpM6/EfY0XiWMR+6KwxfXZmtY4laJCB22N/9q06mIqqdXuYnin1oKaPnirja -EbsXLZmdEyRG98Xi2J+Of8ePdG1asuhy9azuJBCtLxTa/y2aRnFHvkLfuwHb9H/T -KI8xWVvTyQKmtFLKbpf7Q8UIJm+K9Lv9nyiqDdVF8xM6HdjAeI9BZzwelGSuewvF -6NkBiDkal4ZkQdU7hwxu+g/GvUgUvzlN1J5Bto+WHWOWk9mVBngxaJ43BjuAiUVh -OSPHG0SjFeUc+JIwuwIDAQABo4HvMIHsMB0GA1UdDgQWBBRlzeurNR4APn7VdMAc -tHNHDhpkLzASBgNVHRMBAf8ECDAGAQH/AgEBMIGmBgNVHSAEgZ4wgZswgZgGBFUd -IAAwgY8wLwYIKwYBBQUHAgEWI2h0dHA6Ly93d3cuZmlybWFwcm9mZXNpb25hbC5j -b20vY3BzMFwGCCsGAQUFBwICMFAeTgBQAGEAcwBlAG8AIABkAGUAIABsAGEAIABC -AG8AbgBhAG4AbwB2AGEAIAA0ADcAIABCAGEAcgBjAGUAbABvAG4AYQAgADAAOAAw -ADEANzAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggIBAHSHKAIrdx9m -iWTtj3QuRhy7qPj4Cx2Dtjqn6EWKB7fgPiDL4QjbEwj4KKE1soCzC1HA01aajTNF -Sa9J8OA9B3pFE1r/yJfY0xgsfZb43aJlQ3CTkBW6kN/oGbDbLIpgD7dvlAceHabJ -hfa9NPhAeGIQcDq+fUs5gakQ1JZBu/hfHAsdCPKxsIl68veg4MSPi3i1O1ilI45P -Vf42O+AMt8oqMEEgtIDNrvx2ZnOorm7hfNoD6JQg5iKj0B+QXSBTFCZX2lSX3xZE -EAEeiGaPcjiT3SC3NL7X8e5jjkd5KAb881lFJWAiMxujX6i6KtoaPc1A6ozuBRWV -1aUsIC+nmCjuRfzxuIgALI9C2lHVnOUTaHFFQ4ueCyE8S1wF3BqfmI7avSKecs2t -CsvMo2ebKHTEm9caPARYpoKdrcd7b/+Alun4jWq9GJAd/0kakFI3ky88Al2CdgtR -5xbHV/g4+afNmyJU72OwFW1TZQNKXkqgsqeOSQBZONXH9IBk9W6VULgRfhVwOEqw -f9DEMnDAGf/JOC0ULGb0QkTmVXYbgBVX/8Cnp6o5qtjTcNAuuuuUavpfNIbnYrX9 -ivAwhZTJryQCL2/W3Wf+47BVTwSYT6RBVuKT0Gro1vP7ZeDOdcQxWQzugsgMYDNK -GbqEZycPvEJdvSRUDewdcAZfpLz6IHxV ------END CERTIFICATE----- - -# Issuer: CN=vTrus ECC Root CA O=iTrusChina Co.,Ltd. -# Subject: CN=vTrus ECC Root CA O=iTrusChina Co.,Ltd. -# Label: "vTrus ECC Root CA" -# Serial: 630369271402956006249506845124680065938238527194 -# MD5 Fingerprint: de:4b:c1:f5:52:8c:9b:43:e1:3e:8f:55:54:17:8d:85 -# SHA1 Fingerprint: f6:9c:db:b0:fc:f6:02:13:b6:52:32:a6:a3:91:3f:16:70:da:c3:e1 -# SHA256 Fingerprint: 30:fb:ba:2c:32:23:8e:2a:98:54:7a:f9:79:31:e5:50:42:8b:9b:3f:1c:8e:eb:66:33:dc:fa:86:c5:b2:7d:d3 ------BEGIN CERTIFICATE----- -MIICDzCCAZWgAwIBAgIUbmq8WapTvpg5Z6LSa6Q75m0c1towCgYIKoZIzj0EAwMw -RzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28uLEx0ZC4xGjAY -BgNVBAMTEXZUcnVzIEVDQyBSb290IENBMB4XDTE4MDczMTA3MjY0NFoXDTQzMDcz -MTA3MjY0NFowRzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28u -LEx0ZC4xGjAYBgNVBAMTEXZUcnVzIEVDQyBSb290IENBMHYwEAYHKoZIzj0CAQYF -K4EEACIDYgAEZVBKrox5lkqqHAjDo6LN/llWQXf9JpRCux3NCNtzslt188+cToL0 -v/hhJoVs1oVbcnDS/dtitN9Ti72xRFhiQgnH+n9bEOf+QP3A2MMrMudwpremIFUd -e4BdS49nTPEQo0IwQDAdBgNVHQ4EFgQUmDnNvtiyjPeyq+GtJK97fKHbH88wDwYD -VR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwCgYIKoZIzj0EAwMDaAAwZQIw -V53dVvHH4+m4SVBrm2nDb+zDfSXkV5UTQJtS0zvzQBm8JsctBp61ezaf9SXUY2sA -AjEA6dPGnlaaKsyh2j/IZivTWJwghfqrkYpwcBE4YGQLYgmRWAD5Tfs0aNoJrSEG -GJTO ------END CERTIFICATE----- - -# Issuer: CN=vTrus Root CA O=iTrusChina Co.,Ltd. -# Subject: CN=vTrus Root CA O=iTrusChina Co.,Ltd. -# Label: "vTrus Root CA" -# Serial: 387574501246983434957692974888460947164905180485 -# MD5 Fingerprint: b8:c9:37:df:fa:6b:31:84:64:c5:ea:11:6a:1b:75:fc -# SHA1 Fingerprint: 84:1a:69:fb:f5:cd:1a:25:34:13:3d:e3:f8:fc:b8:99:d0:c9:14:b7 -# SHA256 Fingerprint: 8a:71:de:65:59:33:6f:42:6c:26:e5:38:80:d0:0d:88:a1:8d:a4:c6:a9:1f:0d:cb:61:94:e2:06:c5:c9:63:87 ------BEGIN CERTIFICATE----- -MIIFVjCCAz6gAwIBAgIUQ+NxE9izWRRdt86M/TX9b7wFjUUwDQYJKoZIhvcNAQEL -BQAwQzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28uLEx0ZC4x -FjAUBgNVBAMTDXZUcnVzIFJvb3QgQ0EwHhcNMTgwNzMxMDcyNDA1WhcNNDMwNzMx -MDcyNDA1WjBDMQswCQYDVQQGEwJDTjEcMBoGA1UEChMTaVRydXNDaGluYSBDby4s -THRkLjEWMBQGA1UEAxMNdlRydXMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEBBQAD -ggIPADCCAgoCggIBAL1VfGHTuB0EYgWgrmy3cLRB6ksDXhA/kFocizuwZotsSKYc -IrrVQJLuM7IjWcmOvFjai57QGfIvWcaMY1q6n6MLsLOaXLoRuBLpDLvPbmyAhykU -AyyNJJrIZIO1aqwTLDPxn9wsYTwaP3BVm60AUn/PBLn+NvqcwBauYv6WTEN+VRS+ -GrPSbcKvdmaVayqwlHeFXgQPYh1jdfdr58tbmnDsPmcF8P4HCIDPKNsFxhQnL4Z9 -8Cfe/+Z+M0jnCx5Y0ScrUw5XSmXX+6KAYPxMvDVTAWqXcoKv8R1w6Jz1717CbMdH -flqUhSZNO7rrTOiwCcJlwp2dCZtOtZcFrPUGoPc2BX70kLJrxLT5ZOrpGgrIDajt -J8nU57O5q4IikCc9Kuh8kO+8T/3iCiSn3mUkpF3qwHYw03dQ+A0Em5Q2AXPKBlim -0zvc+gRGE1WKyURHuFE5Gi7oNOJ5y1lKCn+8pu8fA2dqWSslYpPZUxlmPCdiKYZN -pGvu/9ROutW04o5IWgAZCfEF2c6Rsffr6TlP9m8EQ5pV9T4FFL2/s1m02I4zhKOQ -UqqzApVg+QxMaPnu1RcN+HFXtSXkKe5lXa/R7jwXC1pDxaWG6iSe4gUH3DRCEpHW -OXSuTEGC2/KmSNGzm/MzqvOmwMVO9fSddmPmAsYiS8GVP1BkLFTltvA8Kc9XAgMB -AAGjQjBAMB0GA1UdDgQWBBRUYnBj8XWEQ1iO0RYgscasGrz2iTAPBgNVHRMBAf8E -BTADAQH/MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAKbqSSaet -8PFww+SX8J+pJdVrnjT+5hpk9jprUrIQeBqfTNqK2uwcN1LgQkv7bHbKJAs5EhWd -nxEt/Hlk3ODg9d3gV8mlsnZwUKT+twpw1aA08XXXTUm6EdGz2OyC/+sOxL9kLX1j -bhd47F18iMjrjld22VkE+rxSH0Ws8HqA7Oxvdq6R2xCOBNyS36D25q5J08FsEhvM -Kar5CKXiNxTKsbhm7xqC5PD48acWabfbqWE8n/Uxy+QARsIvdLGx14HuqCaVvIiv -TDUHKgLKeBRtRytAVunLKmChZwOgzoy8sHJnxDHO2zTlJQNgJXtxmOTAGytfdELS -S8VZCAeHvsXDf+eW2eHcKJfWjwXj9ZtOyh1QRwVTsMo554WgicEFOwE30z9J4nfr -I8iIZjs9OXYhRvHsXyO466JmdXTBQPfYaJqT4i2pLr0cox7IdMakLXogqzu4sEb9 -b91fUlV1YvCXoHzXOP0l382gmxDPi7g4Xl7FtKYCNqEeXxzP4padKar9mK5S4fNB -UvupLnKWnyfjqnN9+BojZns7q2WwMgFLFT49ok8MKzWixtlnEjUwzXYuFrOZnk1P -Ti07NEPhmg4NpGaXutIcSkwsKouLgU9xGqndXHt7CMUADTdA43x7VF8vhV929ven -sBxXVsFy6K2ir40zSbofitzmdHxghm+Hl3s= ------END CERTIFICATE----- - -# Issuer: CN=ISRG Root X2 O=Internet Security Research Group -# Subject: CN=ISRG Root X2 O=Internet Security Research Group -# Label: "ISRG Root X2" -# Serial: 87493402998870891108772069816698636114 -# MD5 Fingerprint: d3:9e:c4:1e:23:3c:a6:df:cf:a3:7e:6d:e0:14:e6:e5 -# SHA1 Fingerprint: bd:b1:b9:3c:d5:97:8d:45:c6:26:14:55:f8:db:95:c7:5a:d1:53:af -# SHA256 Fingerprint: 69:72:9b:8e:15:a8:6e:fc:17:7a:57:af:b7:17:1d:fc:64:ad:d2:8c:2f:ca:8c:f1:50:7e:34:45:3c:cb:14:70 ------BEGIN CERTIFICATE----- -MIICGzCCAaGgAwIBAgIQQdKd0XLq7qeAwSxs6S+HUjAKBggqhkjOPQQDAzBPMQsw -CQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJuZXQgU2VjdXJpdHkgUmVzZWFyY2gg -R3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBYMjAeFw0yMDA5MDQwMDAwMDBaFw00 -MDA5MTcxNjAwMDBaME8xCzAJBgNVBAYTAlVTMSkwJwYDVQQKEyBJbnRlcm5ldCBT -ZWN1cml0eSBSZXNlYXJjaCBHcm91cDEVMBMGA1UEAxMMSVNSRyBSb290IFgyMHYw -EAYHKoZIzj0CAQYFK4EEACIDYgAEzZvVn4CDCuwJSvMWSj5cz3es3mcFDR0HttwW -+1qLFNvicWDEukWVEYmO6gbf9yoWHKS5xcUy4APgHoIYOIvXRdgKam7mAHf7AlF9 -ItgKbppbd9/w+kHsOdx1ymgHDB/qo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0T -AQH/BAUwAwEB/zAdBgNVHQ4EFgQUfEKWrt5LSDv6kviejM9ti6lyN5UwCgYIKoZI -zj0EAwMDaAAwZQIwe3lORlCEwkSHRhtFcP9Ymd70/aTSVaYgLXTWNLxBo1BfASdW -tL4ndQavEi51mI38AjEAi/V3bNTIZargCyzuFJ0nN6T5U6VR5CmD1/iQMVtCnwr1 -/q4AaOeMSQ+2b1tbFfLn ------END CERTIFICATE----- - -# Issuer: CN=HiPKI Root CA - G1 O=Chunghwa Telecom Co., Ltd. -# Subject: CN=HiPKI Root CA - G1 O=Chunghwa Telecom Co., Ltd. -# Label: "HiPKI Root CA - G1" -# Serial: 60966262342023497858655262305426234976 -# MD5 Fingerprint: 69:45:df:16:65:4b:e8:68:9a:8f:76:5f:ff:80:9e:d3 -# SHA1 Fingerprint: 6a:92:e4:a8:ee:1b:ec:96:45:37:e3:29:57:49:cd:96:e3:e5:d2:60 -# SHA256 Fingerprint: f0:15:ce:3c:c2:39:bf:ef:06:4b:e9:f1:d2:c4:17:e1:a0:26:4a:0a:94:be:1f:0c:8d:12:18:64:eb:69:49:cc ------BEGIN CERTIFICATE----- -MIIFajCCA1KgAwIBAgIQLd2szmKXlKFD6LDNdmpeYDANBgkqhkiG9w0BAQsFADBP -MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 -ZC4xGzAZBgNVBAMMEkhpUEtJIFJvb3QgQ0EgLSBHMTAeFw0xOTAyMjIwOTQ2MDRa -Fw0zNzEyMzExNTU5NTlaME8xCzAJBgNVBAYTAlRXMSMwIQYDVQQKDBpDaHVuZ2h3 -YSBUZWxlY29tIENvLiwgTHRkLjEbMBkGA1UEAwwSSGlQS0kgUm9vdCBDQSAtIEcx -MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA9B5/UnMyDHPkvRN0o9Qw -qNCuS9i233VHZvR85zkEHmpwINJaR3JnVfSl6J3VHiGh8Ge6zCFovkRTv4354twv -Vcg3Px+kwJyz5HdcoEb+d/oaoDjq7Zpy3iu9lFc6uux55199QmQ5eiY29yTw1S+6 -lZgRZq2XNdZ1AYDgr/SEYYwNHl98h5ZeQa/rh+r4XfEuiAU+TCK72h8q3VJGZDnz -Qs7ZngyzsHeXZJzA9KMuH5UHsBffMNsAGJZMoYFL3QRtU6M9/Aes1MU3guvklQgZ -KILSQjqj2FPseYlgSGDIcpJQ3AOPgz+yQlda22rpEZfdhSi8MEyr48KxRURHH+CK -FgeW0iEPU8DtqX7UTuybCeyvQqww1r/REEXgphaypcXTT3OUM3ECoWqj1jOXTyFj -HluP2cFeRXF3D4FdXyGarYPM+l7WjSNfGz1BryB1ZlpK9p/7qxj3ccC2HTHsOyDr -y+K49a6SsvfhhEvyovKTmiKe0xRvNlS9H15ZFblzqMF8b3ti6RZsR1pl8w4Rm0bZ -/W3c1pzAtH2lsN0/Vm+h+fbkEkj9Bn8SV7apI09bA8PgcSojt/ewsTu8mL3WmKgM -a/aOEmem8rJY5AIJEzypuxC00jBF8ez3ABHfZfjcK0NVvxaXxA/VLGGEqnKG/uY6 -fsI/fe78LxQ+5oXdUG+3Se0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNV -HQ4EFgQU8ncX+l6o/vY9cdVouslGDDjYr7AwDgYDVR0PAQH/BAQDAgGGMA0GCSqG -SIb3DQEBCwUAA4ICAQBQUfB13HAE4/+qddRxosuej6ip0691x1TPOhwEmSKsxBHi -7zNKpiMdDg1H2DfHb680f0+BazVP6XKlMeJ45/dOlBhbQH3PayFUhuaVevvGyuqc -SE5XCV0vrPSltJczWNWseanMX/mF+lLFjfiRFOs6DRfQUsJ748JzjkZ4Bjgs6Fza -ZsT0pPBWGTMpWmWSBUdGSquEwx4noR8RkpkndZMPvDY7l1ePJlsMu5wP1G4wB9Tc -XzZoZjmDlicmisjEOf6aIW/Vcobpf2Lll07QJNBAsNB1CI69aO4I1258EHBGG3zg -iLKecoaZAeO/n0kZtCW+VmWuF2PlHt/o/0elv+EmBYTksMCv5wiZqAxeJoBF1Pho -L5aPruJKHJwWDBNvOIf2u8g0X5IDUXlwpt/L9ZlNec1OvFefQ05rLisY+GpzjLrF -Ne85akEez3GoorKGB1s6yeHvP2UEgEcyRHCVTjFnanRbEEV16rCf0OY1/k6fi8wr -kkVbbiVghUbN0aqwdmaTd5a+g744tiROJgvM7XpWGuDpWsZkrUx6AEhEL7lAuxM+ -vhV4nYWBSipX3tUZQ9rbyltHhoMLP7YNdnhzeSJesYAfz77RP1YQmCuVh6EfnWQU -YDksswBVLuT1sw5XxJFBAJw/6KXf6vb/yPCtbVKoF6ubYfwSUTXkJf2vqmqGOQ== ------END CERTIFICATE----- - -# Issuer: CN=GlobalSign O=GlobalSign OU=GlobalSign ECC Root CA - R4 -# Subject: CN=GlobalSign O=GlobalSign OU=GlobalSign ECC Root CA - R4 -# Label: "GlobalSign ECC Root CA - R4" -# Serial: 159662223612894884239637590694 -# MD5 Fingerprint: 26:29:f8:6d:e1:88:bf:a2:65:7f:aa:c4:cd:0f:7f:fc -# SHA1 Fingerprint: 6b:a0:b0:98:e1:71:ef:5a:ad:fe:48:15:80:77:10:f4:bd:6f:0b:28 -# SHA256 Fingerprint: b0:85:d7:0b:96:4f:19:1a:73:e4:af:0d:54:ae:7a:0e:07:aa:fd:af:9b:71:dd:08:62:13:8a:b7:32:5a:24:a2 ------BEGIN CERTIFICATE----- -MIIB3DCCAYOgAwIBAgINAgPlfvU/k/2lCSGypjAKBggqhkjOPQQDAjBQMSQwIgYD -VQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0gUjQxEzARBgNVBAoTCkdsb2Jh -bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTIxMTEzMDAwMDAwWhcNMzgw -MTE5MDMxNDA3WjBQMSQwIgYDVQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0g -UjQxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wWTAT -BgcqhkjOPQIBBggqhkjOPQMBBwNCAAS4xnnTj2wlDp8uORkcA6SumuU5BwkWymOx -uYb4ilfBV85C+nOh92VC/x7BALJucw7/xyHlGKSq2XE/qNS5zowdo0IwQDAOBgNV -HQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVLB7rUW44kB/ -+wpu+74zyTyjhNUwCgYIKoZIzj0EAwIDRwAwRAIgIk90crlgr/HmnKAWBVBfw147 -bmF0774BxL4YSFlhgjICICadVGNA3jdgUM/I2O2dgq43mLyjj0xMqTQrbO/7lZsm ------END CERTIFICATE----- - -# Issuer: CN=GTS Root R1 O=Google Trust Services LLC -# Subject: CN=GTS Root R1 O=Google Trust Services LLC -# Label: "GTS Root R1" -# Serial: 159662320309726417404178440727 -# MD5 Fingerprint: 05:fe:d0:bf:71:a8:a3:76:63:da:01:e0:d8:52:dc:40 -# SHA1 Fingerprint: e5:8c:1c:c4:91:3b:38:63:4b:e9:10:6e:e3:ad:8e:6b:9d:d9:81:4a -# SHA256 Fingerprint: d9:47:43:2a:bd:e7:b7:fa:90:fc:2e:6b:59:10:1b:12:80:e0:e1:c7:e4:e4:0f:a3:c6:88:7f:ff:57:a7:f4:cf ------BEGIN CERTIFICATE----- -MIIFVzCCAz+gAwIBAgINAgPlk28xsBNJiGuiFzANBgkqhkiG9w0BAQwFADBHMQsw -CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU -MBIGA1UEAxMLR1RTIFJvb3QgUjEwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw -MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp -Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjEwggIiMA0GCSqGSIb3DQEBAQUA -A4ICDwAwggIKAoICAQC2EQKLHuOhd5s73L+UPreVp0A8of2C+X0yBoJx9vaMf/vo -27xqLpeXo4xL+Sv2sfnOhB2x+cWX3u+58qPpvBKJXqeqUqv4IyfLpLGcY9vXmX7w -Cl7raKb0xlpHDU0QM+NOsROjyBhsS+z8CZDfnWQpJSMHobTSPS5g4M/SCYe7zUjw -TcLCeoiKu7rPWRnWr4+wB7CeMfGCwcDfLqZtbBkOtdh+JhpFAz2weaSUKK0Pfybl -qAj+lug8aJRT7oM6iCsVlgmy4HqMLnXWnOunVmSPlk9orj2XwoSPwLxAwAtcvfaH -szVsrBhQf4TgTM2S0yDpM7xSma8ytSmzJSq0SPly4cpk9+aCEI3oncKKiPo4Zor8 -Y/kB+Xj9e1x3+naH+uzfsQ55lVe0vSbv1gHR6xYKu44LtcXFilWr06zqkUspzBmk -MiVOKvFlRNACzqrOSbTqn3yDsEB750Orp2yjj32JgfpMpf/VjsPOS+C12LOORc92 -wO1AK/1TD7Cn1TsNsYqiA94xrcx36m97PtbfkSIS5r762DL8EGMUUXLeXdYWk70p -aDPvOmbsB4om3xPXV2V4J95eSRQAogB/mqghtqmxlbCluQ0WEdrHbEg8QOB+DVrN -VjzRlwW5y0vtOUucxD/SVRNuJLDWcfr0wbrM7Rv1/oFB2ACYPTrIrnqYNxgFlQID -AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E -FgQU5K8rJnEaK0gnhS9SZizv8IkTcT4wDQYJKoZIhvcNAQEMBQADggIBAJ+qQibb -C5u+/x6Wki4+omVKapi6Ist9wTrYggoGxval3sBOh2Z5ofmmWJyq+bXmYOfg6LEe -QkEzCzc9zolwFcq1JKjPa7XSQCGYzyI0zzvFIoTgxQ6KfF2I5DUkzps+GlQebtuy -h6f88/qBVRRiClmpIgUxPoLW7ttXNLwzldMXG+gnoot7TiYaelpkttGsN/H9oPM4 -7HLwEXWdyzRSjeZ2axfG34arJ45JK3VmgRAhpuo+9K4l/3wV3s6MJT/KYnAK9y8J -ZgfIPxz88NtFMN9iiMG1D53Dn0reWVlHxYciNuaCp+0KueIHoI17eko8cdLiA6Ef -MgfdG+RCzgwARWGAtQsgWSl4vflVy2PFPEz0tv/bal8xa5meLMFrUKTX5hgUvYU/ -Z6tGn6D/Qqc6f1zLXbBwHSs09dR2CQzreExZBfMzQsNhFRAbd03OIozUhfJFfbdT -6u9AWpQKXCBfTkBdYiJ23//OYb2MI3jSNwLgjt7RETeJ9r/tSQdirpLsQBqvFAnZ -0E6yove+7u7Y/9waLd64NnHi/Hm3lCXRSHNboTXns5lndcEZOitHTtNCjv0xyBZm -2tIMPNuzjsmhDYAPexZ3FL//2wmUspO8IFgV6dtxQ/PeEMMA3KgqlbbC1j+Qa3bb -bP6MvPJwNQzcmRk13NfIRmPVNnGuV/u3gm3c ------END CERTIFICATE----- - -# Issuer: CN=GTS Root R2 O=Google Trust Services LLC -# Subject: CN=GTS Root R2 O=Google Trust Services LLC -# Label: "GTS Root R2" -# Serial: 159662449406622349769042896298 -# MD5 Fingerprint: 1e:39:c0:53:e6:1e:29:82:0b:ca:52:55:36:5d:57:dc -# SHA1 Fingerprint: 9a:44:49:76:32:db:de:fa:d0:bc:fb:5a:7b:17:bd:9e:56:09:24:94 -# SHA256 Fingerprint: 8d:25:cd:97:22:9d:bf:70:35:6b:da:4e:b3:cc:73:40:31:e2:4c:f0:0f:af:cf:d3:2d:c7:6e:b5:84:1c:7e:a8 ------BEGIN CERTIFICATE----- -MIIFVzCCAz+gAwIBAgINAgPlrsWNBCUaqxElqjANBgkqhkiG9w0BAQwFADBHMQsw -CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU -MBIGA1UEAxMLR1RTIFJvb3QgUjIwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw -MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp -Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjIwggIiMA0GCSqGSIb3DQEBAQUA -A4ICDwAwggIKAoICAQDO3v2m++zsFDQ8BwZabFn3GTXd98GdVarTzTukk3LvCvpt -nfbwhYBboUhSnznFt+4orO/LdmgUud+tAWyZH8QiHZ/+cnfgLFuv5AS/T3KgGjSY -6Dlo7JUle3ah5mm5hRm9iYz+re026nO8/4Piy33B0s5Ks40FnotJk9/BW9BuXvAu -MC6C/Pq8tBcKSOWIm8Wba96wyrQD8Nr0kLhlZPdcTK3ofmZemde4wj7I0BOdre7k -RXuJVfeKH2JShBKzwkCX44ofR5GmdFrS+LFjKBC4swm4VndAoiaYecb+3yXuPuWg -f9RhD1FLPD+M2uFwdNjCaKH5wQzpoeJ/u1U8dgbuak7MkogwTZq9TwtImoS1mKPV -+3PBV2HdKFZ1E66HjucMUQkQdYhMvI35ezzUIkgfKtzra7tEscszcTJGr61K8Yzo -dDqs5xoic4DSMPclQsciOzsSrZYuxsN2B6ogtzVJV+mSSeh2FnIxZyuWfoqjx5RW -Ir9qS34BIbIjMt/kmkRtWVtd9QCgHJvGeJeNkP+byKq0rxFROV7Z+2et1VsRnTKa -G73VululycslaVNVJ1zgyjbLiGH7HrfQy+4W+9OmTN6SpdTi3/UGVN4unUu0kzCq -gc7dGtxRcw1PcOnlthYhGXmy5okLdWTK1au8CcEYof/UVKGFPP0UJAOyh9OktwID -AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E -FgQUu//KjiOfT5nK2+JopqUVJxce2Q4wDQYJKoZIhvcNAQEMBQADggIBAB/Kzt3H -vqGf2SdMC9wXmBFqiN495nFWcrKeGk6c1SuYJF2ba3uwM4IJvd8lRuqYnrYb/oM8 -0mJhwQTtzuDFycgTE1XnqGOtjHsB/ncw4c5omwX4Eu55MaBBRTUoCnGkJE+M3DyC -B19m3H0Q/gxhswWV7uGugQ+o+MePTagjAiZrHYNSVc61LwDKgEDg4XSsYPWHgJ2u -NmSRXbBoGOqKYcl3qJfEycel/FVL8/B/uWU9J2jQzGv6U53hkRrJXRqWbTKH7QMg -yALOWr7Z6v2yTcQvG99fevX4i8buMTolUVVnjWQye+mew4K6Ki3pHrTgSAai/Gev -HyICc/sgCq+dVEuhzf9gR7A/Xe8bVr2XIZYtCtFenTgCR2y59PYjJbigapordwj6 -xLEokCZYCDzifqrXPW+6MYgKBesntaFJ7qBFVHvmJ2WZICGoo7z7GJa7Um8M7YNR -TOlZ4iBgxcJlkoKM8xAfDoqXvneCbT+PHV28SSe9zE8P4c52hgQjxcCMElv924Sg -JPFI/2R80L5cFtHvma3AH/vLrrw4IgYmZNralw4/KBVEqE8AyvCazM90arQ+POuV -7LXTWtiBmelDGDfrs7vRWGJB82bSj6p4lVQgw1oudCvV0b4YacCs1aTPObpRhANl -6WLAYv7YTVWW4tAR+kg0Eeye7QUd5MjWHYbL ------END CERTIFICATE----- - -# Issuer: CN=GTS Root R3 O=Google Trust Services LLC -# Subject: CN=GTS Root R3 O=Google Trust Services LLC -# Label: "GTS Root R3" -# Serial: 159662495401136852707857743206 -# MD5 Fingerprint: 3e:e7:9d:58:02:94:46:51:94:e5:e0:22:4a:8b:e7:73 -# SHA1 Fingerprint: ed:e5:71:80:2b:c8:92:b9:5b:83:3c:d2:32:68:3f:09:cd:a0:1e:46 -# SHA256 Fingerprint: 34:d8:a7:3e:e2:08:d9:bc:db:0d:95:65:20:93:4b:4e:40:e6:94:82:59:6e:8b:6f:73:c8:42:6b:01:0a:6f:48 ------BEGIN CERTIFICATE----- -MIICCTCCAY6gAwIBAgINAgPluILrIPglJ209ZjAKBggqhkjOPQQDAzBHMQswCQYD -VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG -A1UEAxMLR1RTIFJvb3QgUjMwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw -WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz -IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjMwdjAQBgcqhkjOPQIBBgUrgQQAIgNi -AAQfTzOHMymKoYTey8chWEGJ6ladK0uFxh1MJ7x/JlFyb+Kf1qPKzEUURout736G -jOyxfi//qXGdGIRFBEFVbivqJn+7kAHjSxm65FSWRQmx1WyRRK2EE46ajA2ADDL2 -4CejQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW -BBTB8Sa6oC2uhYHP0/EqEr24Cmf9vDAKBggqhkjOPQQDAwNpADBmAjEA9uEglRR7 -VKOQFhG/hMjqb2sXnh5GmCCbn9MN2azTL818+FsuVbu/3ZL3pAzcMeGiAjEA/Jdm -ZuVDFhOD3cffL74UOO0BzrEXGhF16b0DjyZ+hOXJYKaV11RZt+cRLInUue4X ------END CERTIFICATE----- - -# Issuer: CN=GTS Root R4 O=Google Trust Services LLC -# Subject: CN=GTS Root R4 O=Google Trust Services LLC -# Label: "GTS Root R4" -# Serial: 159662532700760215368942768210 -# MD5 Fingerprint: 43:96:83:77:19:4d:76:b3:9d:65:52:e4:1d:22:a5:e8 -# SHA1 Fingerprint: 77:d3:03:67:b5:e0:0c:15:f6:0c:38:61:df:7c:e1:3b:92:46:4d:47 -# SHA256 Fingerprint: 34:9d:fa:40:58:c5:e2:63:12:3b:39:8a:e7:95:57:3c:4e:13:13:c8:3f:e6:8f:93:55:6c:d5:e8:03:1b:3c:7d ------BEGIN CERTIFICATE----- -MIICCTCCAY6gAwIBAgINAgPlwGjvYxqccpBQUjAKBggqhkjOPQQDAzBHMQswCQYD -VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG -A1UEAxMLR1RTIFJvb3QgUjQwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw -WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz -IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjQwdjAQBgcqhkjOPQIBBgUrgQQAIgNi -AATzdHOnaItgrkO4NcWBMHtLSZ37wWHO5t5GvWvVYRg1rkDdc/eJkTBa6zzuhXyi -QHY7qca4R9gq55KRanPpsXI5nymfopjTX15YhmUPoYRlBtHci8nHc8iMai/lxKvR -HYqjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW -BBSATNbrdP9JNqPV2Py1PsVq8JQdjDAKBggqhkjOPQQDAwNpADBmAjEA6ED/g94D -9J+uHXqnLrmvT/aDHQ4thQEd0dlq7A/Cr8deVl5c1RxYIigL9zC2L7F8AjEA8GE8 -p/SgguMh1YQdc4acLa/KNJvxn7kjNuK8YAOdgLOaVsjh4rsUecrNIdSUtUlD ------END CERTIFICATE----- - -# Issuer: CN=Telia Root CA v2 O=Telia Finland Oyj -# Subject: CN=Telia Root CA v2 O=Telia Finland Oyj -# Label: "Telia Root CA v2" -# Serial: 7288924052977061235122729490515358 -# MD5 Fingerprint: 0e:8f:ac:aa:82:df:85:b1:f4:dc:10:1c:fc:99:d9:48 -# SHA1 Fingerprint: b9:99:cd:d1:73:50:8a:c4:47:05:08:9c:8c:88:fb:be:a0:2b:40:cd -# SHA256 Fingerprint: 24:2b:69:74:2f:cb:1e:5b:2a:bf:98:89:8b:94:57:21:87:54:4e:5b:4d:99:11:78:65:73:62:1f:6a:74:b8:2c ------BEGIN CERTIFICATE----- -MIIFdDCCA1ygAwIBAgIPAWdfJ9b+euPkrL4JWwWeMA0GCSqGSIb3DQEBCwUAMEQx -CzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZMBcGA1UE -AwwQVGVsaWEgUm9vdCBDQSB2MjAeFw0xODExMjkxMTU1NTRaFw00MzExMjkxMTU1 -NTRaMEQxCzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZ -MBcGA1UEAwwQVGVsaWEgUm9vdCBDQSB2MjCCAiIwDQYJKoZIhvcNAQEBBQADggIP -ADCCAgoCggIBALLQPwe84nvQa5n44ndp586dpAO8gm2h/oFlH0wnrI4AuhZ76zBq -AMCzdGh+sq/H1WKzej9Qyow2RCRj0jbpDIX2Q3bVTKFgcmfiKDOlyzG4OiIjNLh9 -vVYiQJ3q9HsDrWj8soFPmNB06o3lfc1jw6P23pLCWBnglrvFxKk9pXSW/q/5iaq9 -lRdU2HhE8Qx3FZLgmEKnpNaqIJLNwaCzlrI6hEKNfdWV5Nbb6WLEWLN5xYzTNTOD -n3WhUidhOPFZPY5Q4L15POdslv5e2QJltI5c0BE0312/UqeBAMN/mUWZFdUXyApT -7GPzmX3MaRKGwhfwAZ6/hLzRUssbkmbOpFPlob/E2wnW5olWK8jjfN7j/4nlNW4o -6GwLI1GpJQXrSPjdscr6bAhR77cYbETKJuFzxokGgeWKrLDiKca5JLNrRBH0pUPC -TEPlcDaMtjNXepUugqD0XBCzYYP2AgWGLnwtbNwDRm41k9V6lS/eINhbfpSQBGq6 -WT0EBXWdN6IOLj3rwaRSg/7Qa9RmjtzG6RJOHSpXqhC8fF6CfaamyfItufUXJ63R -DolUK5X6wK0dmBR4M0KGCqlztft0DbcbMBnEWg4cJ7faGND/isgFuvGqHKI3t+ZI -pEYslOqodmJHixBTB0hXbOKSTbauBcvcwUpej6w9GU7C7WB1K9vBykLVAgMBAAGj -YzBhMB8GA1UdIwQYMBaAFHKs5DN5qkWH9v2sHZ7Wxy+G2CQ5MB0GA1UdDgQWBBRy -rOQzeapFh/b9rB2e1scvhtgkOTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUw -AwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAoDtZpwmUPjaE0n4vOaWWl/oRrfxn83EJ -8rKJhGdEr7nv7ZbsnGTbMjBvZ5qsfl+yqwE2foH65IRe0qw24GtixX1LDoJt0nZi -0f6X+J8wfBj5tFJ3gh1229MdqfDBmgC9bXXYfef6xzijnHDoRnkDry5023X4blMM -A8iZGok1GTzTyVR8qPAs5m4HeW9q4ebqkYJpCh3DflminmtGFZhb069GHWLIzoBS -SRE/yQQSwxN8PzuKlts8oB4KtItUsiRnDe+Cy748fdHif64W1lZYudogsYMVoe+K -TTJvQS8TUoKU1xrBeKJR3Stwbbca+few4GeXVtt8YVMJAygCQMez2P2ccGrGKMOF -6eLtGpOg3kuYooQ+BXcBlj37tCAPnHICehIv1aO6UXivKitEZU61/Qrowc15h2Er -3oBXRb9n8ZuRXqWk7FlIEA04x7D6w0RtBPV4UBySllva9bguulvP5fBqnUsvWHMt -Ty3EHD70sz+rFQ47GUGKpMFXEmZxTPpT41frYpUJnlTd0cI8Vzy9OK2YZLe4A5pT -VmBds9hCG1xLEooc6+t9xnppxyd/pPiL8uSUZodL6ZQHCRJ5irLrdATczvREWeAW -ysUsWNc8e89ihmpQfTU2Zqf7N+cox9jQraVplI/owd8k+BsHMYeB2F326CjYSlKA -rBPuUBQemMc= ------END CERTIFICATE----- - -# Issuer: CN=D-TRUST BR Root CA 1 2020 O=D-Trust GmbH -# Subject: CN=D-TRUST BR Root CA 1 2020 O=D-Trust GmbH -# Label: "D-TRUST BR Root CA 1 2020" -# Serial: 165870826978392376648679885835942448534 -# MD5 Fingerprint: b5:aa:4b:d5:ed:f7:e3:55:2e:8f:72:0a:f3:75:b8:ed -# SHA1 Fingerprint: 1f:5b:98:f0:e3:b5:f7:74:3c:ed:e6:b0:36:7d:32:cd:f4:09:41:67 -# SHA256 Fingerprint: e5:9a:aa:81:60:09:c2:2b:ff:5b:25:ba:d3:7d:f3:06:f0:49:79:7c:1f:81:d8:5a:b0:89:e6:57:bd:8f:00:44 ------BEGIN CERTIFICATE----- -MIIC2zCCAmCgAwIBAgIQfMmPK4TX3+oPyWWa00tNljAKBggqhkjOPQQDAzBIMQsw -CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlELVRS -VVNUIEJSIFJvb3QgQ0EgMSAyMDIwMB4XDTIwMDIxMTA5NDUwMFoXDTM1MDIxMTA5 -NDQ1OVowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEiMCAG -A1UEAxMZRC1UUlVTVCBCUiBSb290IENBIDEgMjAyMDB2MBAGByqGSM49AgEGBSuB -BAAiA2IABMbLxyjR+4T1mu9CFCDhQ2tuda38KwOE1HaTJddZO0Flax7mNCq7dPYS -zuht56vkPE4/RAiLzRZxy7+SmfSk1zxQVFKQhYN4lGdnoxwJGT11NIXe7WB9xwy0 -QVK5buXuQqOCAQ0wggEJMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFHOREKv/ -VbNafAkl1bK6CKBrqx9tMA4GA1UdDwEB/wQEAwIBBjCBxgYDVR0fBIG+MIG7MD6g -PKA6hjhodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X2JyX3Jvb3Rf -Y2FfMV8yMDIwLmNybDB5oHegdYZzbGRhcDovL2RpcmVjdG9yeS5kLXRydXN0Lm5l -dC9DTj1ELVRSVVNUJTIwQlIlMjBSb290JTIwQ0ElMjAxJTIwMjAyMCxPPUQtVHJ1 -c3QlMjBHbWJILEM9REU/Y2VydGlmaWNhdGVyZXZvY2F0aW9ubGlzdDAKBggqhkjO -PQQDAwNpADBmAjEAlJAtE/rhY/hhY+ithXhUkZy4kzg+GkHaQBZTQgjKL47xPoFW -wKrY7RjEsK70PvomAjEA8yjixtsrmfu3Ubgko6SUeho/5jbiA1czijDLgsfWFBHV -dWNbFJWcHwHP2NVypw87 ------END CERTIFICATE----- - -# Issuer: CN=D-TRUST EV Root CA 1 2020 O=D-Trust GmbH -# Subject: CN=D-TRUST EV Root CA 1 2020 O=D-Trust GmbH -# Label: "D-TRUST EV Root CA 1 2020" -# Serial: 126288379621884218666039612629459926992 -# MD5 Fingerprint: 8c:2d:9d:70:9f:48:99:11:06:11:fb:e9:cb:30:c0:6e -# SHA1 Fingerprint: 61:db:8c:21:59:69:03:90:d8:7c:9c:12:86:54:cf:9d:3d:f4:dd:07 -# SHA256 Fingerprint: 08:17:0d:1a:a3:64:53:90:1a:2f:95:92:45:e3:47:db:0c:8d:37:ab:aa:bc:56:b8:1a:a1:00:dc:95:89:70:db ------BEGIN CERTIFICATE----- -MIIC2zCCAmCgAwIBAgIQXwJB13qHfEwDo6yWjfv/0DAKBggqhkjOPQQDAzBIMQsw -CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlELVRS -VVNUIEVWIFJvb3QgQ0EgMSAyMDIwMB4XDTIwMDIxMTEwMDAwMFoXDTM1MDIxMTA5 -NTk1OVowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEiMCAG -A1UEAxMZRC1UUlVTVCBFViBSb290IENBIDEgMjAyMDB2MBAGByqGSM49AgEGBSuB -BAAiA2IABPEL3YZDIBnfl4XoIkqbz52Yv7QFJsnL46bSj8WeeHsxiamJrSc8ZRCC -/N/DnU7wMyPE0jL1HLDfMxddxfCxivnvubcUyilKwg+pf3VlSSowZ/Rk99Yad9rD -wpdhQntJraOCAQ0wggEJMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFH8QARY3 -OqQo5FD4pPfsazK2/umLMA4GA1UdDwEB/wQEAwIBBjCBxgYDVR0fBIG+MIG7MD6g -PKA6hjhodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X2V2X3Jvb3Rf -Y2FfMV8yMDIwLmNybDB5oHegdYZzbGRhcDovL2RpcmVjdG9yeS5kLXRydXN0Lm5l -dC9DTj1ELVRSVVNUJTIwRVYlMjBSb290JTIwQ0ElMjAxJTIwMjAyMCxPPUQtVHJ1 -c3QlMjBHbWJILEM9REU/Y2VydGlmaWNhdGVyZXZvY2F0aW9ubGlzdDAKBggqhkjO -PQQDAwNpADBmAjEAyjzGKnXCXnViOTYAYFqLwZOZzNnbQTs7h5kXO9XMT8oi96CA -y/m0sRtW9XLS/BnRAjEAkfcwkz8QRitxpNA7RJvAKQIFskF3UfN5Wp6OFKBOQtJb -gfM0agPnIjhQW+0ZT0MW ------END CERTIFICATE----- - -# Issuer: CN=DigiCert TLS ECC P384 Root G5 O=DigiCert, Inc. -# Subject: CN=DigiCert TLS ECC P384 Root G5 O=DigiCert, Inc. -# Label: "DigiCert TLS ECC P384 Root G5" -# Serial: 13129116028163249804115411775095713523 -# MD5 Fingerprint: d3:71:04:6a:43:1c:db:a6:59:e1:a8:a3:aa:c5:71:ed -# SHA1 Fingerprint: 17:f3:de:5e:9f:0f:19:e9:8e:f6:1f:32:26:6e:20:c4:07:ae:30:ee -# SHA256 Fingerprint: 01:8e:13:f0:77:25:32:cf:80:9b:d1:b1:72:81:86:72:83:fc:48:c6:e1:3b:e9:c6:98:12:85:4a:49:0c:1b:05 ------BEGIN CERTIFICATE----- -MIICGTCCAZ+gAwIBAgIQCeCTZaz32ci5PhwLBCou8zAKBggqhkjOPQQDAzBOMQsw -CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJjAkBgNVBAMTHURp -Z2lDZXJ0IFRMUyBFQ0MgUDM4NCBSb290IEc1MB4XDTIxMDExNTAwMDAwMFoXDTQ2 -MDExNDIzNTk1OVowTjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJ -bmMuMSYwJAYDVQQDEx1EaWdpQ2VydCBUTFMgRUNDIFAzODQgUm9vdCBHNTB2MBAG -ByqGSM49AgEGBSuBBAAiA2IABMFEoc8Rl1Ca3iOCNQfN0MsYndLxf3c1TzvdlHJS -7cI7+Oz6e2tYIOyZrsn8aLN1udsJ7MgT9U7GCh1mMEy7H0cKPGEQQil8pQgO4CLp -0zVozptjn4S1mU1YoI71VOeVyaNCMEAwHQYDVR0OBBYEFMFRRVBZqz7nLFr6ICIS -B4CIfBFqMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MAoGCCqGSM49 -BAMDA2gAMGUCMQCJao1H5+z8blUD2WdsJk6Dxv3J+ysTvLd6jLRl0mlpYxNjOyZQ -LgGheQaRnUi/wr4CMEfDFXuxoJGZSZOoPHzoRgaLLPIxAJSdYsiJvRmEFOml+wG4 -DXZDjC5Ty3zfDBeWUA== ------END CERTIFICATE----- - -# Issuer: CN=DigiCert TLS RSA4096 Root G5 O=DigiCert, Inc. -# Subject: CN=DigiCert TLS RSA4096 Root G5 O=DigiCert, Inc. -# Label: "DigiCert TLS RSA4096 Root G5" -# Serial: 11930366277458970227240571539258396554 -# MD5 Fingerprint: ac:fe:f7:34:96:a9:f2:b3:b4:12:4b:e4:27:41:6f:e1 -# SHA1 Fingerprint: a7:88:49:dc:5d:7c:75:8c:8c:de:39:98:56:b3:aa:d0:b2:a5:71:35 -# SHA256 Fingerprint: 37:1a:00:dc:05:33:b3:72:1a:7e:eb:40:e8:41:9e:70:79:9d:2b:0a:0f:2c:1d:80:69:31:65:f7:ce:c4:ad:75 ------BEGIN CERTIFICATE----- -MIIFZjCCA06gAwIBAgIQCPm0eKj6ftpqMzeJ3nzPijANBgkqhkiG9w0BAQwFADBN -MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJTAjBgNVBAMT -HERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcN -NDYwMTE0MjM1OTU5WjBNMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs -IEluYy4xJTAjBgNVBAMTHERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzUwggIi -MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCz0PTJeRGd/fxmgefM1eS87IE+ -ajWOLrfn3q/5B03PMJ3qCQuZvWxX2hhKuHisOjmopkisLnLlvevxGs3npAOpPxG0 -2C+JFvuUAT27L/gTBaF4HI4o4EXgg/RZG5Wzrn4DReW+wkL+7vI8toUTmDKdFqgp -wgscONyfMXdcvyej/Cestyu9dJsXLfKB2l2w4SMXPohKEiPQ6s+d3gMXsUJKoBZM -pG2T6T867jp8nVid9E6P/DsjyG244gXazOvswzH016cpVIDPRFtMbzCe88zdH5RD -nU1/cHAN1DrRN/BsnZvAFJNY781BOHW8EwOVfH/jXOnVDdXifBBiqmvwPXbzP6Po -sMH976pXTayGpxi0KcEsDr9kvimM2AItzVwv8n/vFfQMFawKsPHTDU9qTXeXAaDx -Zre3zu/O7Oyldcqs4+Fj97ihBMi8ez9dLRYiVu1ISf6nL3kwJZu6ay0/nTvEF+cd -Lvvyz6b84xQslpghjLSR6Rlgg/IwKwZzUNWYOwbpx4oMYIwo+FKbbuH2TbsGJJvX -KyY//SovcfXWJL5/MZ4PbeiPT02jP/816t9JXkGPhvnxd3lLG7SjXi/7RgLQZhNe -XoVPzthwiHvOAbWWl9fNff2C+MIkwcoBOU+NosEUQB+cZtUMCUbW8tDRSHZWOkPL -tgoRObqME2wGtZ7P6wIDAQABo0IwQDAdBgNVHQ4EFgQUUTMc7TZArxfTJc1paPKv -TiM+s0EwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcN -AQEMBQADggIBAGCmr1tfV9qJ20tQqcQjNSH/0GEwhJG3PxDPJY7Jv0Y02cEhJhxw -GXIeo8mH/qlDZJY6yFMECrZBu8RHANmfGBg7sg7zNOok992vIGCukihfNudd5N7H -PNtQOa27PShNlnx2xlv0wdsUpasZYgcYQF+Xkdycx6u1UQ3maVNVzDl92sURVXLF -O4uJ+DQtpBflF+aZfTCIITfNMBc9uPK8qHWgQ9w+iUuQrm0D4ByjoJYJu32jtyoQ -REtGBzRj7TG5BO6jm5qu5jF49OokYTurWGT/u4cnYiWB39yhL/btp/96j1EuMPik -AdKFOV8BmZZvWltwGUb+hmA+rYAQCd05JS9Yf7vSdPD3Rh9GOUrYU9DzLjtxpdRv -/PNn5AeP3SYZ4Y1b+qOTEZvpyDrDVWiakuFSdjjo4bq9+0/V77PnSIMx8IIh47a+ -p6tv75/fTM8BuGJqIz3nCU2AG3swpMPdB380vqQmsvZB6Akd4yCYqjdP//fx4ilw -MUc/dNAUFvohigLVigmUdy7yWSiLfFCSCmZ4OIN1xLVaqBHG5cGdZlXPU8Sv13WF -qUITVuwhd4GTWgzqltlJyqEI8pc7bZsEGCREjnwB8twl2F6GmrE52/WRMmrRpnCK -ovfepEWFJqgejF0pW8hL2JpqA15w8oVPbEtoL8pU9ozaMv7Da4M/OMZ+ ------END CERTIFICATE----- - -# Issuer: CN=Certainly Root R1 O=Certainly -# Subject: CN=Certainly Root R1 O=Certainly -# Label: "Certainly Root R1" -# Serial: 188833316161142517227353805653483829216 -# MD5 Fingerprint: 07:70:d4:3e:82:87:a0:fa:33:36:13:f4:fa:33:e7:12 -# SHA1 Fingerprint: a0:50:ee:0f:28:71:f4:27:b2:12:6d:6f:50:96:25:ba:cc:86:42:af -# SHA256 Fingerprint: 77:b8:2c:d8:64:4c:43:05:f7:ac:c5:cb:15:6b:45:67:50:04:03:3d:51:c6:0c:62:02:a8:e0:c3:34:67:d3:a0 ------BEGIN CERTIFICATE----- -MIIFRzCCAy+gAwIBAgIRAI4P+UuQcWhlM1T01EQ5t+AwDQYJKoZIhvcNAQELBQAw -PTELMAkGA1UEBhMCVVMxEjAQBgNVBAoTCUNlcnRhaW5seTEaMBgGA1UEAxMRQ2Vy -dGFpbmx5IFJvb3QgUjEwHhcNMjEwNDAxMDAwMDAwWhcNNDYwNDAxMDAwMDAwWjA9 -MQswCQYDVQQGEwJVUzESMBAGA1UEChMJQ2VydGFpbmx5MRowGAYDVQQDExFDZXJ0 -YWlubHkgUm9vdCBSMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANA2 -1B/q3avk0bbm+yLA3RMNansiExyXPGhjZjKcA7WNpIGD2ngwEc/csiu+kr+O5MQT -vqRoTNoCaBZ0vrLdBORrKt03H2As2/X3oXyVtwxwhi7xOu9S98zTm/mLvg7fMbed -aFySpvXl8wo0tf97ouSHocavFwDvA5HtqRxOcT3Si2yJ9HiG5mpJoM610rCrm/b0 -1C7jcvk2xusVtyWMOvwlDbMicyF0yEqWYZL1LwsYpfSt4u5BvQF5+paMjRcCMLT5 -r3gajLQ2EBAHBXDQ9DGQilHFhiZ5shGIXsXwClTNSaa/ApzSRKft43jvRl5tcdF5 -cBxGX1HpyTfcX35pe0HfNEXgO4T0oYoKNp43zGJS4YkNKPl6I7ENPT2a/Z2B7yyQ -wHtETrtJ4A5KVpK8y7XdeReJkd5hiXSSqOMyhb5OhaRLWcsrxXiOcVTQAjeZjOVJ -6uBUcqQRBi8LjMFbvrWhsFNunLhgkR9Za/kt9JQKl7XsxXYDVBtlUrpMklZRNaBA -2CnbrlJ2Oy0wQJuK0EJWtLeIAaSHO1OWzaMWj/Nmqhexx2DgwUMFDO6bW2BvBlyH -Wyf5QBGenDPBt+U1VwV/J84XIIwc/PH72jEpSe31C4SnT8H2TsIonPru4K8H+zMR -eiFPCyEQtkA6qyI6BJyLm4SGcprSp6XEtHWRqSsjAgMBAAGjQjBAMA4GA1UdDwEB -/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTgqj8ljZ9EXME66C6u -d0yEPmcM9DANBgkqhkiG9w0BAQsFAAOCAgEAuVevuBLaV4OPaAszHQNTVfSVcOQr -PbA56/qJYv331hgELyE03fFo8NWWWt7CgKPBjcZq91l3rhVkz1t5BXdm6ozTaw3d -8VkswTOlMIAVRQdFGjEitpIAq5lNOo93r6kiyi9jyhXWx8bwPWz8HA2YEGGeEaIi -1wrykXprOQ4vMMM2SZ/g6Q8CRFA3lFV96p/2O7qUpUzpvD5RtOjKkjZUbVwlKNrd -rRT90+7iIgXr0PK3aBLXWopBGsaSpVo7Y0VPv+E6dyIvXL9G+VoDhRNCX8reU9di -taY1BMJH/5n9hN9czulegChB8n3nHpDYT3Y+gjwN/KUD+nsa2UUeYNrEjvn8K8l7 -lcUq/6qJ34IxD3L/DCfXCh5WAFAeDJDBlrXYFIW7pw0WwfgHJBu6haEaBQmAupVj -yTrsJZ9/nbqkRxWbRHDxakvWOF5D8xh+UG7pWijmZeZ3Gzr9Hb4DJqPb1OG7fpYn -Kx3upPvaJVQTA945xsMfTZDsjxtK0hzthZU4UHlG1sGQUDGpXJpuHfUzVounmdLy -yCwzk5Iwx06MZTMQZBf9JBeW0Y3COmor6xOLRPIh80oat3df1+2IpHLlOR+Vnb5n -wXARPbv0+Em34yaXOp/SX3z7wJl8OSngex2/DaeP0ik0biQVy96QXr8axGbqwua6 -OV+KmalBWQewLK8= ------END CERTIFICATE----- - -# Issuer: CN=Certainly Root E1 O=Certainly -# Subject: CN=Certainly Root E1 O=Certainly -# Label: "Certainly Root E1" -# Serial: 8168531406727139161245376702891150584 -# MD5 Fingerprint: 0a:9e:ca:cd:3e:52:50:c6:36:f3:4b:a3:ed:a7:53:e9 -# SHA1 Fingerprint: f9:e1:6d:dc:01:89:cf:d5:82:45:63:3e:c5:37:7d:c2:eb:93:6f:2b -# SHA256 Fingerprint: b4:58:5f:22:e4:ac:75:6a:4e:86:12:a1:36:1c:5d:9d:03:1a:93:fd:84:fe:bb:77:8f:a3:06:8b:0f:c4:2d:c2 ------BEGIN CERTIFICATE----- -MIIB9zCCAX2gAwIBAgIQBiUzsUcDMydc+Y2aub/M+DAKBggqhkjOPQQDAzA9MQsw -CQYDVQQGEwJVUzESMBAGA1UEChMJQ2VydGFpbmx5MRowGAYDVQQDExFDZXJ0YWlu -bHkgUm9vdCBFMTAeFw0yMTA0MDEwMDAwMDBaFw00NjA0MDEwMDAwMDBaMD0xCzAJ -BgNVBAYTAlVTMRIwEAYDVQQKEwlDZXJ0YWlubHkxGjAYBgNVBAMTEUNlcnRhaW5s -eSBSb290IEUxMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE3m/4fxzf7flHh4axpMCK -+IKXgOqPyEpeKn2IaKcBYhSRJHpcnqMXfYqGITQYUBsQ3tA3SybHGWCA6TS9YBk2 -QNYphwk8kXr2vBMj3VlOBF7PyAIcGFPBMdjaIOlEjeR2o0IwQDAOBgNVHQ8BAf8E -BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU8ygYy2R17ikq6+2uI1g4 -hevIIgcwCgYIKoZIzj0EAwMDaAAwZQIxALGOWiDDshliTd6wT99u0nCK8Z9+aozm -ut6Dacpps6kFtZaSF4fC0urQe87YQVt8rgIwRt7qy12a7DLCZRawTDBcMPPaTnOG -BtjOiQRINzf43TNRnXCve1XYAS59BWQOhriR ------END CERTIFICATE----- - -# Issuer: CN=Security Communication ECC RootCA1 O=SECOM Trust Systems CO.,LTD. -# Subject: CN=Security Communication ECC RootCA1 O=SECOM Trust Systems CO.,LTD. -# Label: "Security Communication ECC RootCA1" -# Serial: 15446673492073852651 -# MD5 Fingerprint: 7e:43:b0:92:68:ec:05:43:4c:98:ab:5d:35:2e:7e:86 -# SHA1 Fingerprint: b8:0e:26:a9:bf:d2:b2:3b:c0:ef:46:c9:ba:c7:bb:f6:1d:0d:41:41 -# SHA256 Fingerprint: e7:4f:bd:a5:5b:d5:64:c4:73:a3:6b:44:1a:a7:99:c8:a6:8e:07:74:40:e8:28:8b:9f:a1:e5:0e:4b:ba:ca:11 ------BEGIN CERTIFICATE----- -MIICODCCAb6gAwIBAgIJANZdm7N4gS7rMAoGCCqGSM49BAMDMGExCzAJBgNVBAYT -AkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMSswKQYD -VQQDEyJTZWN1cml0eSBDb21tdW5pY2F0aW9uIEVDQyBSb290Q0ExMB4XDTE2MDYx -NjA1MTUyOFoXDTM4MDExODA1MTUyOFowYTELMAkGA1UEBhMCSlAxJTAjBgNVBAoT -HFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xKzApBgNVBAMTIlNlY3VyaXR5 -IENvbW11bmljYXRpb24gRUNDIFJvb3RDQTEwdjAQBgcqhkjOPQIBBgUrgQQAIgNi -AASkpW9gAwPDvTH00xecK4R1rOX9PVdu12O/5gSJko6BnOPpR27KkBLIE+Cnnfdl -dB9sELLo5OnvbYUymUSxXv3MdhDYW72ixvnWQuRXdtyQwjWpS4g8EkdtXP9JTxpK -ULGjQjBAMB0GA1UdDgQWBBSGHOf+LaVKiwj+KBH6vqNm+GBZLzAOBgNVHQ8BAf8E -BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjAVXUI9/Lbu -9zuxNuie9sRGKEkz0FhDKmMpzE2xtHqiuQ04pV1IKv3LsnNdo4gIxwwCMQDAqy0O -be0YottT6SXbVQjgUMzfRGEWgqtJsLKB7HOHeLRMsmIbEvoWTSVLY70eN9k= ------END CERTIFICATE----- - -# Issuer: CN=BJCA Global Root CA1 O=BEIJING CERTIFICATE AUTHORITY -# Subject: CN=BJCA Global Root CA1 O=BEIJING CERTIFICATE AUTHORITY -# Label: "BJCA Global Root CA1" -# Serial: 113562791157148395269083148143378328608 -# MD5 Fingerprint: 42:32:99:76:43:33:36:24:35:07:82:9b:28:f9:d0:90 -# SHA1 Fingerprint: d5:ec:8d:7b:4c:ba:79:f4:e7:e8:cb:9d:6b:ae:77:83:10:03:21:6a -# SHA256 Fingerprint: f3:89:6f:88:fe:7c:0a:88:27:66:a7:fa:6a:d2:74:9f:b5:7a:7f:3e:98:fb:76:9c:1f:a7:b0:9c:2c:44:d5:ae ------BEGIN CERTIFICATE----- -MIIFdDCCA1ygAwIBAgIQVW9l47TZkGobCdFsPsBsIDANBgkqhkiG9w0BAQsFADBU -MQswCQYDVQQGEwJDTjEmMCQGA1UECgwdQkVJSklORyBDRVJUSUZJQ0FURSBBVVRI -T1JJVFkxHTAbBgNVBAMMFEJKQ0EgR2xvYmFsIFJvb3QgQ0ExMB4XDTE5MTIxOTAz -MTYxN1oXDTQ0MTIxMjAzMTYxN1owVDELMAkGA1UEBhMCQ04xJjAkBgNVBAoMHUJF -SUpJTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZMR0wGwYDVQQDDBRCSkNBIEdsb2Jh -bCBSb290IENBMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPFmCL3Z -xRVhy4QEQaVpN3cdwbB7+sN3SJATcmTRuHyQNZ0YeYjjlwE8R4HyDqKYDZ4/N+AZ -spDyRhySsTphzvq3Rp4Dhtczbu33RYx2N95ulpH3134rhxfVizXuhJFyV9xgw8O5 -58dnJCNPYwpj9mZ9S1WnP3hkSWkSl+BMDdMJoDIwOvqfwPKcxRIqLhy1BDPapDgR -at7GGPZHOiJBhyL8xIkoVNiMpTAK+BcWyqw3/XmnkRd4OJmtWO2y3syJfQOcs4ll -5+M7sSKGjwZteAf9kRJ/sGsciQ35uMt0WwfCyPQ10WRjeulumijWML3mG90Vr4Tq -nMfK9Q7q8l0ph49pczm+LiRvRSGsxdRpJQaDrXpIhRMsDQa4bHlW/KNnMoH1V6XK -V0Jp6VwkYe/iMBhORJhVb3rCk9gZtt58R4oRTklH2yiUAguUSiz5EtBP6DF+bHq/ -pj+bOT0CFqMYs2esWz8sgytnOYFcuX6U1WTdno9uruh8W7TXakdI136z1C2OVnZO -z2nxbkRs1CTqjSShGL+9V/6pmTW12xB3uD1IutbB5/EjPtffhZ0nPNRAvQoMvfXn -jSXWgXSHRtQpdaJCbPdzied9v3pKH9MiyRVVz99vfFXQpIsHETdfg6YmV6YBW37+ -WGgHqel62bno/1Afq8K0wM7o6v0PvY1NuLxxAgMBAAGjQjBAMB0GA1UdDgQWBBTF -7+3M2I0hxkjk49cULqcWk+WYATAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE -AwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAUoKsITQfI/Ki2Pm4rzc2IInRNwPWaZ+4 -YRC6ojGYWUfo0Q0lHhVBDOAqVdVXUsv45Mdpox1NcQJeXyFFYEhcCY5JEMEE3Kli -awLwQ8hOnThJdMkycFRtwUf8jrQ2ntScvd0g1lPJGKm1Vrl2i5VnZu69mP6u775u -+2D2/VnGKhs/I0qUJDAnyIm860Qkmss9vk/Ves6OF8tiwdneHg56/0OGNFK8YT88 -X7vZdrRTvJez/opMEi4r89fO4aL/3Xtw+zuhTaRjAv04l5U/BXCga99igUOLtFkN -SoxUnMW7gZ/NfaXvCyUeOiDbHPwfmGcCCtRzRBPbUYQaVQNW4AB+dAb/OMRyHdOo -P2gxXdMJxy6MW2Pg6Nwe0uxhHvLe5e/2mXZgLR6UcnHGCyoyx5JO1UbXHfmpGQrI -+pXObSOYqgs4rZpWDW+N8TEAiMEXnM0ZNjX+VVOg4DwzX5Ze4jLp3zO7Bkqp2IRz -znfSxqxx4VyjHQy7Ct9f4qNx2No3WqB4K/TUfet27fJhcKVlmtOJNBir+3I+17Q9 -eVzYH6Eze9mCUAyTF6ps3MKCuwJXNq+YJyo5UOGwifUll35HaBC07HPKs5fRJNz2 -YqAo07WjuGS3iGJCz51TzZm+ZGiPTx4SSPfSKcOYKMryMguTjClPPGAyzQWWYezy -r/6zcCwupvI= ------END CERTIFICATE----- - -# Issuer: CN=BJCA Global Root CA2 O=BEIJING CERTIFICATE AUTHORITY -# Subject: CN=BJCA Global Root CA2 O=BEIJING CERTIFICATE AUTHORITY -# Label: "BJCA Global Root CA2" -# Serial: 58605626836079930195615843123109055211 -# MD5 Fingerprint: 5e:0a:f6:47:5f:a6:14:e8:11:01:95:3f:4d:01:eb:3c -# SHA1 Fingerprint: f4:27:86:eb:6e:b8:6d:88:31:67:02:fb:ba:66:a4:53:00:aa:7a:a6 -# SHA256 Fingerprint: 57:4d:f6:93:1e:27:80:39:66:7b:72:0a:fd:c1:60:0f:c2:7e:b6:6d:d3:09:29:79:fb:73:85:64:87:21:28:82 ------BEGIN CERTIFICATE----- -MIICJTCCAaugAwIBAgIQLBcIfWQqwP6FGFkGz7RK6zAKBggqhkjOPQQDAzBUMQsw -CQYDVQQGEwJDTjEmMCQGA1UECgwdQkVJSklORyBDRVJUSUZJQ0FURSBBVVRIT1JJ -VFkxHTAbBgNVBAMMFEJKQ0EgR2xvYmFsIFJvb3QgQ0EyMB4XDTE5MTIxOTAzMTgy -MVoXDTQ0MTIxMjAzMTgyMVowVDELMAkGA1UEBhMCQ04xJjAkBgNVBAoMHUJFSUpJ -TkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZMR0wGwYDVQQDDBRCSkNBIEdsb2JhbCBS -b290IENBMjB2MBAGByqGSM49AgEGBSuBBAAiA2IABJ3LgJGNU2e1uVCxA/jlSR9B -IgmwUVJY1is0j8USRhTFiy8shP8sbqjV8QnjAyEUxEM9fMEsxEtqSs3ph+B99iK+ -+kpRuDCK/eHeGBIK9ke35xe/J4rUQUyWPGCWwf0VHKNCMEAwHQYDVR0OBBYEFNJK -sVF/BvDRgh9Obl+rg/xI1LCRMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD -AgEGMAoGCCqGSM49BAMDA2gAMGUCMBq8W9f+qdJUDkpd0m2xQNz0Q9XSSpkZElaA -94M04TVOSG0ED1cxMDAtsaqdAzjbBgIxAMvMh1PLet8gUXOQwKhbYdDFUDn9hf7B -43j4ptZLvZuHjw/l1lOWqzzIQNph91Oj9w== ------END CERTIFICATE----- - -# Issuer: CN=Sectigo Public Server Authentication Root E46 O=Sectigo Limited -# Subject: CN=Sectigo Public Server Authentication Root E46 O=Sectigo Limited -# Label: "Sectigo Public Server Authentication Root E46" -# Serial: 88989738453351742415770396670917916916 -# MD5 Fingerprint: 28:23:f8:b2:98:5c:37:16:3b:3e:46:13:4e:b0:b3:01 -# SHA1 Fingerprint: ec:8a:39:6c:40:f0:2e:bc:42:75:d4:9f:ab:1c:1a:5b:67:be:d2:9a -# SHA256 Fingerprint: c9:0f:26:f0:fb:1b:40:18:b2:22:27:51:9b:5c:a2:b5:3e:2c:a5:b3:be:5c:f1:8e:fe:1b:ef:47:38:0c:53:83 ------BEGIN CERTIFICATE----- -MIICOjCCAcGgAwIBAgIQQvLM2htpN0RfFf51KBC49DAKBggqhkjOPQQDAzBfMQsw -CQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1T -ZWN0aWdvIFB1YmxpYyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBFNDYwHhcN -MjEwMzIyMDAwMDAwWhcNNDYwMzIxMjM1OTU5WjBfMQswCQYDVQQGEwJHQjEYMBYG -A1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1TZWN0aWdvIFB1YmxpYyBT -ZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBFNDYwdjAQBgcqhkjOPQIBBgUrgQQA -IgNiAAR2+pmpbiDt+dd34wc7qNs9Xzjoq1WmVk/WSOrsfy2qw7LFeeyZYX8QeccC -WvkEN/U0NSt3zn8gj1KjAIns1aeibVvjS5KToID1AZTc8GgHHs3u/iVStSBDHBv+ -6xnOQ6OjQjBAMB0GA1UdDgQWBBTRItpMWfFLXyY4qp3W7usNw/upYTAOBgNVHQ8B -Af8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNnADBkAjAn7qRa -qCG76UeXlImldCBteU/IvZNeWBj7LRoAasm4PdCkT0RHlAFWovgzJQxC36oCMB3q -4S6ILuH5px0CMk7yn2xVdOOurvulGu7t0vzCAxHrRVxgED1cf5kDW21USAGKcw== ------END CERTIFICATE----- - -# Issuer: CN=Sectigo Public Server Authentication Root R46 O=Sectigo Limited -# Subject: CN=Sectigo Public Server Authentication Root R46 O=Sectigo Limited -# Label: "Sectigo Public Server Authentication Root R46" -# Serial: 156256931880233212765902055439220583700 -# MD5 Fingerprint: 32:10:09:52:00:d5:7e:6c:43:df:15:c0:b1:16:93:e5 -# SHA1 Fingerprint: ad:98:f9:f3:e4:7d:75:3b:65:d4:82:b3:a4:52:17:bb:6e:f5:e4:38 -# SHA256 Fingerprint: 7b:b6:47:a6:2a:ee:ac:88:bf:25:7a:a5:22:d0:1f:fe:a3:95:e0:ab:45:c7:3f:93:f6:56:54:ec:38:f2:5a:06 ------BEGIN CERTIFICATE----- -MIIFijCCA3KgAwIBAgIQdY39i658BwD6qSWn4cetFDANBgkqhkiG9w0BAQwFADBf -MQswCQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQD -Ey1TZWN0aWdvIFB1YmxpYyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBSNDYw -HhcNMjEwMzIyMDAwMDAwWhcNNDYwMzIxMjM1OTU5WjBfMQswCQYDVQQGEwJHQjEY -MBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1TZWN0aWdvIFB1Ymxp -YyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB -AQUAA4ICDwAwggIKAoICAQCTvtU2UnXYASOgHEdCSe5jtrch/cSV1UgrJnwUUxDa -ef0rty2k1Cz66jLdScK5vQ9IPXtamFSvnl0xdE8H/FAh3aTPaE8bEmNtJZlMKpnz -SDBh+oF8HqcIStw+KxwfGExxqjWMrfhu6DtK2eWUAtaJhBOqbchPM8xQljeSM9xf -iOefVNlI8JhD1mb9nxc4Q8UBUQvX4yMPFF1bFOdLvt30yNoDN9HWOaEhUTCDsG3X -ME6WW5HwcCSrv0WBZEMNvSE6Lzzpng3LILVCJ8zab5vuZDCQOc2TZYEhMbUjUDM3 -IuM47fgxMMxF/mL50V0yeUKH32rMVhlATc6qu/m1dkmU8Sf4kaWD5QazYw6A3OAS -VYCmO2a0OYctyPDQ0RTp5A1NDvZdV3LFOxxHVp3i1fuBYYzMTYCQNFu31xR13NgE -SJ/AwSiItOkcyqex8Va3e0lMWeUgFaiEAin6OJRpmkkGj80feRQXEgyDet4fsZfu -+Zd4KKTIRJLpfSYFplhym3kT2BFfrsU4YjRosoYwjviQYZ4ybPUHNs2iTG7sijbt -8uaZFURww3y8nDnAtOFr94MlI1fZEoDlSfB1D++N6xybVCi0ITz8fAr/73trdf+L -HaAZBav6+CuBQug4urv7qv094PPK306Xlynt8xhW6aWWrL3DkJiy4Pmi1KZHQ3xt -zwIDAQABo0IwQDAdBgNVHQ4EFgQUVnNYZJX5khqwEioEYnmhQBWIIUkwDgYDVR0P -AQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAC9c -mTz8Bl6MlC5w6tIyMY208FHVvArzZJ8HXtXBc2hkeqK5Duj5XYUtqDdFqij0lgVQ -YKlJfp/imTYpE0RHap1VIDzYm/EDMrraQKFz6oOht0SmDpkBm+S8f74TlH7Kph52 -gDY9hAaLMyZlbcp+nv4fjFg4exqDsQ+8FxG75gbMY/qB8oFM2gsQa6H61SilzwZA -Fv97fRheORKkU55+MkIQpiGRqRxOF3yEvJ+M0ejf5lG5Nkc/kLnHvALcWxxPDkjB -JYOcCj+esQMzEhonrPcibCTRAUH4WAP+JWgiH5paPHxsnnVI84HxZmduTILA7rpX -DhjvLpr3Etiga+kFpaHpaPi8TD8SHkXoUsCjvxInebnMMTzD9joiFgOgyY9mpFui -TdaBJQbpdqQACj7LzTWb4OE4y2BThihCQRxEV+ioratF4yUQvNs+ZUH7G6aXD+u5 -dHn5HrwdVw1Hr8Mvn4dGp+smWg9WY7ViYG4A++MnESLn/pmPNPW56MORcr3Ywx65 -LvKRRFHQV80MNNVIIb/bE/FmJUNS0nAiNs2fxBx1IK1jcmMGDw4nztJqDby1ORrp -0XZ60Vzk50lJLVU3aPAaOpg+VBeHVOmmJ1CJeyAvP/+/oYtKR5j/K3tJPsMpRmAY -QqszKbrAKbkTidOIijlBO8n9pu0f9GBj39ItVQGL ------END CERTIFICATE----- - -# Issuer: CN=SSL.com TLS RSA Root CA 2022 O=SSL Corporation -# Subject: CN=SSL.com TLS RSA Root CA 2022 O=SSL Corporation -# Label: "SSL.com TLS RSA Root CA 2022" -# Serial: 148535279242832292258835760425842727825 -# MD5 Fingerprint: d8:4e:c6:59:30:d8:fe:a0:d6:7a:5a:2c:2c:69:78:da -# SHA1 Fingerprint: ec:2c:83:40:72:af:26:95:10:ff:0e:f2:03:ee:31:70:f6:78:9d:ca -# SHA256 Fingerprint: 8f:af:7d:2e:2c:b4:70:9b:b8:e0:b3:36:66:bf:75:a5:dd:45:b5:de:48:0f:8e:a8:d4:bf:e6:be:bc:17:f2:ed ------BEGIN CERTIFICATE----- -MIIFiTCCA3GgAwIBAgIQb77arXO9CEDii02+1PdbkTANBgkqhkiG9w0BAQsFADBO -MQswCQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSUwIwYDVQQD -DBxTU0wuY29tIFRMUyBSU0EgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzQyMloX -DTQ2MDgxOTE2MzQyMVowTjELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBDb3Jw -b3JhdGlvbjElMCMGA1UEAwwcU1NMLmNvbSBUTFMgUlNBIFJvb3QgQ0EgMjAyMjCC -AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANCkCXJPQIgSYT41I57u9nTP -L3tYPc48DRAokC+X94xI2KDYJbFMsBFMF3NQ0CJKY7uB0ylu1bUJPiYYf7ISf5OY -t6/wNr/y7hienDtSxUcZXXTzZGbVXcdotL8bHAajvI9AI7YexoS9UcQbOcGV0ins -S657Lb85/bRi3pZ7QcacoOAGcvvwB5cJOYF0r/c0WRFXCsJbwST0MXMwgsadugL3 -PnxEX4MN8/HdIGkWCVDi1FW24IBydm5MR7d1VVm0U3TZlMZBrViKMWYPHqIbKUBO -L9975hYsLfy/7PO0+r4Y9ptJ1O4Fbtk085zx7AGL0SDGD6C1vBdOSHtRwvzpXGk3 -R2azaPgVKPC506QVzFpPulJwoxJF3ca6TvvC0PeoUidtbnm1jPx7jMEWTO6Af77w -dr5BUxIzrlo4QqvXDz5BjXYHMtWrifZOZ9mxQnUjbvPNQrL8VfVThxc7wDNY8VLS -+YCk8OjwO4s4zKTGkH8PnP2L0aPP2oOnaclQNtVcBdIKQXTbYxE3waWglksejBYS -d66UNHsef8JmAOSqg+qKkK3ONkRN0VHpvB/zagX9wHQfJRlAUW7qglFA35u5CCoG -AtUjHBPW6dvbxrB6y3snm/vg1UYk7RBLY0ulBY+6uB0rpvqR4pJSvezrZ5dtmi2f -gTIFZzL7SAg/2SW4BCUvAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j -BBgwFoAU+y437uOEeicuzRk1sTN8/9REQrkwHQYDVR0OBBYEFPsuN+7jhHonLs0Z -NbEzfP/UREK5MA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAjYlt -hEUY8U+zoO9opMAdrDC8Z2awms22qyIZZtM7QbUQnRC6cm4pJCAcAZli05bg4vsM -QtfhWsSWTVTNj8pDU/0quOr4ZcoBwq1gaAafORpR2eCNJvkLTqVTJXojpBzOCBvf -R4iyrT7gJ4eLSYwfqUdYe5byiB0YrrPRpgqU+tvT5TgKa3kSM/tKWTcWQA673vWJ -DPFs0/dRa1419dvAJuoSc06pkZCmF8NsLzjUo3KUQyxi4U5cMj29TH0ZR6LDSeeW -P4+a0zvkEdiLA9z2tmBVGKaBUfPhqBVq6+AL8BQx1rmMRTqoENjwuSfr98t67wVy -lrXEj5ZzxOhWc5y8aVFjvO9nHEMaX3cZHxj4HCUp+UmZKbaSPaKDN7EgkaibMOlq -bLQjk2UEqxHzDh1TJElTHaE/nUiSEeJ9DU/1172iWD54nR4fK/4huxoTtrEoZP2w -AgDHbICivRZQIA9ygV/MlP+7mea6kMvq+cYMwq7FGc4zoWtcu358NFcXrfA/rs3q -r5nsLFR+jM4uElZI7xc7P0peYNLcdDa8pUNjyw9bowJWCZ4kLOGGgYz+qxcs+sji -Mho6/4UIyYOf8kpIEFR3N+2ivEC+5BB09+Rbu7nzifmPQdjH5FCQNYA+HLhNkNPU -98OwoX6EyneSMSy4kLGCenROmxMmtNVQZlR4rmA= ------END CERTIFICATE----- - -# Issuer: CN=SSL.com TLS ECC Root CA 2022 O=SSL Corporation -# Subject: CN=SSL.com TLS ECC Root CA 2022 O=SSL Corporation -# Label: "SSL.com TLS ECC Root CA 2022" -# Serial: 26605119622390491762507526719404364228 -# MD5 Fingerprint: 99:d7:5c:f1:51:36:cc:e9:ce:d9:19:2e:77:71:56:c5 -# SHA1 Fingerprint: 9f:5f:d9:1a:54:6d:f5:0c:71:f0:ee:7a:bd:17:49:98:84:73:e2:39 -# SHA256 Fingerprint: c3:2f:fd:9f:46:f9:36:d1:6c:36:73:99:09:59:43:4b:9a:d6:0a:af:bb:9e:7c:f3:36:54:f1:44:cc:1b:a1:43 ------BEGIN CERTIFICATE----- -MIICOjCCAcCgAwIBAgIQFAP1q/s3ixdAW+JDsqXRxDAKBggqhkjOPQQDAzBOMQsw -CQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSUwIwYDVQQDDBxT -U0wuY29tIFRMUyBFQ0MgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzM0OFoXDTQ2 -MDgxOTE2MzM0N1owTjELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBDb3Jwb3Jh -dGlvbjElMCMGA1UEAwwcU1NMLmNvbSBUTFMgRUNDIFJvb3QgQ0EgMjAyMjB2MBAG -ByqGSM49AgEGBSuBBAAiA2IABEUpNXP6wrgjzhR9qLFNoFs27iosU8NgCTWyJGYm -acCzldZdkkAZDsalE3D07xJRKF3nzL35PIXBz5SQySvOkkJYWWf9lCcQZIxPBLFN -SeR7T5v15wj4A4j3p8OSSxlUgaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME -GDAWgBSJjy+j6CugFFR781a4Jl9nOAuc0DAdBgNVHQ4EFgQUiY8vo+groBRUe/NW -uCZfZzgLnNAwDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMDA2gAMGUCMFXjIlbp -15IkWE8elDIPDAI2wv2sdDJO4fscgIijzPvX6yv/N33w7deedWo1dlJF4AIxAMeN -b0Igj762TVntd00pxCAgRWSGOlDGxK0tk/UYfXLtqc/ErFc2KAhl3zx5Zn6g6g== ------END CERTIFICATE----- - -# Issuer: CN=Atos TrustedRoot Root CA ECC TLS 2021 O=Atos -# Subject: CN=Atos TrustedRoot Root CA ECC TLS 2021 O=Atos -# Label: "Atos TrustedRoot Root CA ECC TLS 2021" -# Serial: 81873346711060652204712539181482831616 -# MD5 Fingerprint: 16:9f:ad:f1:70:ad:79:d6:ed:29:b4:d1:c5:79:70:a8 -# SHA1 Fingerprint: 9e:bc:75:10:42:b3:02:f3:81:f4:f7:30:62:d4:8f:c3:a7:51:b2:dd -# SHA256 Fingerprint: b2:fa:e5:3e:14:cc:d7:ab:92:12:06:47:01:ae:27:9c:1d:89:88:fa:cb:77:5f:a8:a0:08:91:4e:66:39:88:a8 ------BEGIN CERTIFICATE----- -MIICFTCCAZugAwIBAgIQPZg7pmY9kGP3fiZXOATvADAKBggqhkjOPQQDAzBMMS4w -LAYDVQQDDCVBdG9zIFRydXN0ZWRSb290IFJvb3QgQ0EgRUNDIFRMUyAyMDIxMQ0w -CwYDVQQKDARBdG9zMQswCQYDVQQGEwJERTAeFw0yMTA0MjIwOTI2MjNaFw00MTA0 -MTcwOTI2MjJaMEwxLjAsBgNVBAMMJUF0b3MgVHJ1c3RlZFJvb3QgUm9vdCBDQSBF -Q0MgVExTIDIwMjExDTALBgNVBAoMBEF0b3MxCzAJBgNVBAYTAkRFMHYwEAYHKoZI -zj0CAQYFK4EEACIDYgAEloZYKDcKZ9Cg3iQZGeHkBQcfl+3oZIK59sRxUM6KDP/X -tXa7oWyTbIOiaG6l2b4siJVBzV3dscqDY4PMwL502eCdpO5KTlbgmClBk1IQ1SQ4 -AjJn8ZQSb+/Xxd4u/RmAo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR2 -KCXWfeBmmnoJsmo7jjPXNtNPojAOBgNVHQ8BAf8EBAMCAYYwCgYIKoZIzj0EAwMD -aAAwZQIwW5kp85wxtolrbNa9d+F851F+uDrNozZffPc8dz7kUK2o59JZDCaOMDtu -CCrCp1rIAjEAmeMM56PDr9NJLkaCI2ZdyQAUEv049OGYa3cpetskz2VAv9LcjBHo -9H1/IISpQuQo ------END CERTIFICATE----- - -# Issuer: CN=Atos TrustedRoot Root CA RSA TLS 2021 O=Atos -# Subject: CN=Atos TrustedRoot Root CA RSA TLS 2021 O=Atos -# Label: "Atos TrustedRoot Root CA RSA TLS 2021" -# Serial: 111436099570196163832749341232207667876 -# MD5 Fingerprint: d4:d3:46:b8:9a:c0:9c:76:5d:9e:3a:c3:b9:99:31:d2 -# SHA1 Fingerprint: 18:52:3b:0d:06:37:e4:d6:3a:df:23:e4:98:fb:5b:16:fb:86:74:48 -# SHA256 Fingerprint: 81:a9:08:8e:a5:9f:b3:64:c5:48:a6:f8:55:59:09:9b:6f:04:05:ef:bf:18:e5:32:4e:c9:f4:57:ba:00:11:2f ------BEGIN CERTIFICATE----- -MIIFZDCCA0ygAwIBAgIQU9XP5hmTC/srBRLYwiqipDANBgkqhkiG9w0BAQwFADBM -MS4wLAYDVQQDDCVBdG9zIFRydXN0ZWRSb290IFJvb3QgQ0EgUlNBIFRMUyAyMDIx -MQ0wCwYDVQQKDARBdG9zMQswCQYDVQQGEwJERTAeFw0yMTA0MjIwOTIxMTBaFw00 -MTA0MTcwOTIxMDlaMEwxLjAsBgNVBAMMJUF0b3MgVHJ1c3RlZFJvb3QgUm9vdCBD -QSBSU0EgVExTIDIwMjExDTALBgNVBAoMBEF0b3MxCzAJBgNVBAYTAkRFMIICIjAN -BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtoAOxHm9BYx9sKOdTSJNy/BBl01Z -4NH+VoyX8te9j2y3I49f1cTYQcvyAh5x5en2XssIKl4w8i1mx4QbZFc4nXUtVsYv -Ye+W/CBGvevUez8/fEc4BKkbqlLfEzfTFRVOvV98r61jx3ncCHvVoOX3W3WsgFWZ -kmGbzSoXfduP9LVq6hdKZChmFSlsAvFr1bqjM9xaZ6cF4r9lthawEO3NUDPJcFDs -GY6wx/J0W2tExn2WuZgIWWbeKQGb9Cpt0xU6kGpn8bRrZtkh68rZYnxGEFzedUln -nkL5/nWpo63/dgpnQOPF943HhZpZnmKaau1Fh5hnstVKPNe0OwANwI8f4UDErmwh -3El+fsqyjW22v5MvoVw+j8rtgI5Y4dtXz4U2OLJxpAmMkokIiEjxQGMYsluMWuPD -0xeqqxmjLBvk1cbiZnrXghmmOxYsL3GHX0WelXOTwkKBIROW1527k2gV+p2kHYzy -geBYBr3JtuP2iV2J+axEoctr+hbxx1A9JNr3w+SH1VbxT5Aw+kUJWdo0zuATHAR8 -ANSbhqRAvNncTFd+rrcztl524WWLZt+NyteYr842mIycg5kDcPOvdO3GDjbnvezB -c6eUWsuSZIKmAMFwoW4sKeFYV+xafJlrJaSQOoD0IJ2azsct+bJLKZWD6TWNp0lI -pw9MGZHQ9b8Q4HECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU -dEmZ0f+0emhFdcN+tNzMzjkz2ggwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEB -DAUAA4ICAQAjQ1MkYlxt/T7Cz1UAbMVWiLkO3TriJQ2VSpfKgInuKs1l+NsW4AmS -4BjHeJi78+xCUvuppILXTdiK/ORO/auQxDh1MoSf/7OwKwIzNsAQkG8dnK/haZPs -o0UvFJ/1TCplQ3IM98P4lYsU84UgYt1UU90s3BiVaU+DR3BAM1h3Egyi61IxHkzJ -qM7F78PRreBrAwA0JrRUITWXAdxfG/F851X6LWh3e9NpzNMOa7pNdkTWwhWaJuyw -xfW70Xp0wmzNxbVe9kzmWy2B27O3Opee7c9GslA9hGCZcbUztVdF5kJHdWoOsAgM -rr3e97sPWD2PAzHoPYJQyi9eDF20l74gNAf0xBLh7tew2VktafcxBPTy+av5EzH4 -AXcOPUIjJsyacmdRIXrMPIWo6iFqO9taPKU0nprALN+AnCng33eU0aKAQv9qTFsR -0PXNor6uzFFcw9VUewyu1rkGd4Di7wcaaMxZUa1+XGdrudviB0JbuAEFWDlN5LuY -o7Ey7Nmj1m+UI/87tyll5gfp77YZ6ufCOB0yiJA8EytuzO+rdwY0d4RPcuSBhPm5 -dDTedk+SKlOxJTnbPP/lPqYO5Wue/9vsL3SD3460s6neFE3/MaNFcyT6lSnMEpcE -oji2jbDwN/zIIX8/syQbPYtuzE2wFg2WHYMfRsCbvUOZ58SWLs5fyQ== ------END CERTIFICATE----- - -# Issuer: CN=TrustAsia Global Root CA G3 O=TrustAsia Technologies, Inc. -# Subject: CN=TrustAsia Global Root CA G3 O=TrustAsia Technologies, Inc. -# Label: "TrustAsia Global Root CA G3" -# Serial: 576386314500428537169965010905813481816650257167 -# MD5 Fingerprint: 30:42:1b:b7:bb:81:75:35:e4:16:4f:53:d2:94:de:04 -# SHA1 Fingerprint: 63:cf:b6:c1:27:2b:56:e4:88:8e:1c:23:9a:b6:2e:81:47:24:c3:c7 -# SHA256 Fingerprint: e0:d3:22:6a:eb:11:63:c2:e4:8f:f9:be:3b:50:b4:c6:43:1b:e7:bb:1e:ac:c5:c3:6b:5d:5e:c5:09:03:9a:08 ------BEGIN CERTIFICATE----- -MIIFpTCCA42gAwIBAgIUZPYOZXdhaqs7tOqFhLuxibhxkw8wDQYJKoZIhvcNAQEM -BQAwWjELMAkGA1UEBhMCQ04xJTAjBgNVBAoMHFRydXN0QXNpYSBUZWNobm9sb2dp -ZXMsIEluYy4xJDAiBgNVBAMMG1RydXN0QXNpYSBHbG9iYWwgUm9vdCBDQSBHMzAe -Fw0yMTA1MjAwMjEwMTlaFw00NjA1MTkwMjEwMTlaMFoxCzAJBgNVBAYTAkNOMSUw -IwYDVQQKDBxUcnVzdEFzaWEgVGVjaG5vbG9naWVzLCBJbmMuMSQwIgYDVQQDDBtU -cnVzdEFzaWEgR2xvYmFsIFJvb3QgQ0EgRzMwggIiMA0GCSqGSIb3DQEBAQUAA4IC -DwAwggIKAoICAQDAMYJhkuSUGwoqZdC+BqmHO1ES6nBBruL7dOoKjbmzTNyPtxNS -T1QY4SxzlZHFZjtqz6xjbYdT8PfxObegQ2OwxANdV6nnRM7EoYNl9lA+sX4WuDqK -AtCWHwDNBSHvBm3dIZwZQ0WhxeiAysKtQGIXBsaqvPPW5vxQfmZCHzyLpnl5hkA1 -nyDvP+uLRx+PjsXUjrYsyUQE49RDdT/VP68czH5GX6zfZBCK70bwkPAPLfSIC7Ep -qq+FqklYqL9joDiR5rPmd2jE+SoZhLsO4fWvieylL1AgdB4SQXMeJNnKziyhWTXA -yB1GJ2Faj/lN03J5Zh6fFZAhLf3ti1ZwA0pJPn9pMRJpxx5cynoTi+jm9WAPzJMs -hH/x/Gr8m0ed262IPfN2dTPXS6TIi/n1Q1hPy8gDVI+lhXgEGvNz8teHHUGf59gX -zhqcD0r83ERoVGjiQTz+LISGNzzNPy+i2+f3VANfWdP3kXjHi3dqFuVJhZBFcnAv -kV34PmVACxmZySYgWmjBNb9Pp1Hx2BErW+Canig7CjoKH8GB5S7wprlppYiU5msT -f9FkPz2ccEblooV7WIQn3MSAPmeamseaMQ4w7OYXQJXZRe0Blqq/DPNL0WP3E1jA -uPP6Z92bfW1K/zJMtSU7/xxnD4UiWQWRkUF3gdCFTIcQcf+eQxuulXUtgQIDAQAB -o2MwYTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFEDk5PIj7zjKsK5Xf/Ih -MBY027ySMB0GA1UdDgQWBBRA5OTyI+84yrCuV3/yITAWNNu8kjAOBgNVHQ8BAf8E -BAMCAQYwDQYJKoZIhvcNAQEMBQADggIBACY7UeFNOPMyGLS0XuFlXsSUT9SnYaP4 -wM8zAQLpw6o1D/GUE3d3NZ4tVlFEbuHGLige/9rsR82XRBf34EzC4Xx8MnpmyFq2 -XFNFV1pF1AWZLy4jVe5jaN/TG3inEpQGAHUNcoTpLrxaatXeL1nHo+zSh2bbt1S1 -JKv0Q3jbSwTEb93mPmY+KfJLaHEih6D4sTNjduMNhXJEIlU/HHzp/LgV6FL6qj6j -ITk1dImmasI5+njPtqzn59ZW/yOSLlALqbUHM/Q4X6RJpstlcHboCoWASzY9M/eV -VHUl2qzEc4Jl6VL1XP04lQJqaTDFHApXB64ipCz5xUG3uOyfT0gA+QEEVcys+TIx -xHWVBqB/0Y0n3bOppHKH/lmLmnp0Ft0WpWIp6zqW3IunaFnT63eROfjXy9mPX1on -AX1daBli2MjN9LdyR75bl87yraKZk62Uy5P2EgmVtqvXO9A/EcswFi55gORngS1d -7XB4tmBZrOFdRWOPyN9yaFvqHbgB8X7754qz41SgOAngPN5C8sLtLpvzHzW2Ntjj -gKGLzZlkD8Kqq7HK9W+eQ42EVJmzbsASZthwEPEGNTNDqJwuuhQxzhB/HIbjj9LV -+Hfsm6vxL2PZQl/gZ4FkkfGXL/xuJvYz+NO1+MRiqzFRJQJ6+N1rZdVtTTDIZbpo -FGWsJwt0ivKH ------END CERTIFICATE----- - -# Issuer: CN=TrustAsia Global Root CA G4 O=TrustAsia Technologies, Inc. -# Subject: CN=TrustAsia Global Root CA G4 O=TrustAsia Technologies, Inc. -# Label: "TrustAsia Global Root CA G4" -# Serial: 451799571007117016466790293371524403291602933463 -# MD5 Fingerprint: 54:dd:b2:d7:5f:d8:3e:ed:7c:e0:0b:2e:cc:ed:eb:eb -# SHA1 Fingerprint: 57:73:a5:61:5d:80:b2:e6:ac:38:82:fc:68:07:31:ac:9f:b5:92:5a -# SHA256 Fingerprint: be:4b:56:cb:50:56:c0:13:6a:52:6d:f4:44:50:8d:aa:36:a0:b5:4f:42:e4:ac:38:f7:2a:f4:70:e4:79:65:4c ------BEGIN CERTIFICATE----- -MIICVTCCAdygAwIBAgIUTyNkuI6XY57GU4HBdk7LKnQV1tcwCgYIKoZIzj0EAwMw -WjELMAkGA1UEBhMCQ04xJTAjBgNVBAoMHFRydXN0QXNpYSBUZWNobm9sb2dpZXMs -IEluYy4xJDAiBgNVBAMMG1RydXN0QXNpYSBHbG9iYWwgUm9vdCBDQSBHNDAeFw0y -MTA1MjAwMjEwMjJaFw00NjA1MTkwMjEwMjJaMFoxCzAJBgNVBAYTAkNOMSUwIwYD -VQQKDBxUcnVzdEFzaWEgVGVjaG5vbG9naWVzLCBJbmMuMSQwIgYDVQQDDBtUcnVz -dEFzaWEgR2xvYmFsIFJvb3QgQ0EgRzQwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATx -s8045CVD5d4ZCbuBeaIVXxVjAd7Cq92zphtnS4CDr5nLrBfbK5bKfFJV4hrhPVbw -LxYI+hW8m7tH5j/uqOFMjPXTNvk4XatwmkcN4oFBButJ+bAp3TPsUKV/eSm4IJij -YzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUpbtKl86zK3+kMd6Xg1mD -pm9xy94wHQYDVR0OBBYEFKW7SpfOsyt/pDHel4NZg6ZvccveMA4GA1UdDwEB/wQE -AwIBBjAKBggqhkjOPQQDAwNnADBkAjBe8usGzEkxn0AAbbd+NvBNEU/zy4k6LHiR -UKNbwMp1JvK/kF0LgoxgKJ/GcJpo5PECMFxYDlZ2z1jD1xCMuo6u47xkdUfFVZDj -/bpV6wfEU6s3qe4hsiFbYI89MvHVI5TWWA== ------END CERTIFICATE----- - -# Issuer: CN=Telekom Security TLS ECC Root 2020 O=Deutsche Telekom Security GmbH -# Subject: CN=Telekom Security TLS ECC Root 2020 O=Deutsche Telekom Security GmbH -# Label: "Telekom Security TLS ECC Root 2020" -# Serial: 72082518505882327255703894282316633856 -# MD5 Fingerprint: c1:ab:fe:6a:10:2c:03:8d:bc:1c:22:32:c0:85:a7:fd -# SHA1 Fingerprint: c0:f8:96:c5:a9:3b:01:06:21:07:da:18:42:48:bc:e9:9d:88:d5:ec -# SHA256 Fingerprint: 57:8a:f4:de:d0:85:3f:4e:59:98:db:4a:ea:f9:cb:ea:8d:94:5f:60:b6:20:a3:8d:1a:3c:13:b2:bc:7b:a8:e1 ------BEGIN CERTIFICATE----- -MIICQjCCAcmgAwIBAgIQNjqWjMlcsljN0AFdxeVXADAKBggqhkjOPQQDAzBjMQsw -CQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBH -bWJIMSswKQYDVQQDDCJUZWxla29tIFNlY3VyaXR5IFRMUyBFQ0MgUm9vdCAyMDIw -MB4XDTIwMDgyNTA3NDgyMFoXDTQ1MDgyNTIzNTk1OVowYzELMAkGA1UEBhMCREUx -JzAlBgNVBAoMHkRldXRzY2hlIFRlbGVrb20gU2VjdXJpdHkgR21iSDErMCkGA1UE -AwwiVGVsZWtvbSBTZWN1cml0eSBUTFMgRUNDIFJvb3QgMjAyMDB2MBAGByqGSM49 -AgEGBSuBBAAiA2IABM6//leov9Wq9xCazbzREaK9Z0LMkOsVGJDZos0MKiXrPk/O -tdKPD/M12kOLAoC+b1EkHQ9rK8qfwm9QMuU3ILYg/4gND21Ju9sGpIeQkpT0CdDP -f8iAC8GXs7s1J8nCG6NCMEAwHQYDVR0OBBYEFONyzG6VmUex5rNhTNHLq+O6zd6f -MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMAoGCCqGSM49BAMDA2cA -MGQCMHVSi7ekEE+uShCLsoRbQuHmKjYC2qBuGT8lv9pZMo7k+5Dck2TOrbRBR2Di -z6fLHgIwN0GMZt9Ba9aDAEH9L1r3ULRn0SyocddDypwnJJGDSA3PzfdUga/sf+Rn -27iQ7t0l ------END CERTIFICATE----- - -# Issuer: CN=Telekom Security TLS RSA Root 2023 O=Deutsche Telekom Security GmbH -# Subject: CN=Telekom Security TLS RSA Root 2023 O=Deutsche Telekom Security GmbH -# Label: "Telekom Security TLS RSA Root 2023" -# Serial: 44676229530606711399881795178081572759 -# MD5 Fingerprint: bf:5b:eb:54:40:cd:48:71:c4:20:8d:7d:de:0a:42:f2 -# SHA1 Fingerprint: 54:d3:ac:b3:bd:57:56:f6:85:9d:ce:e5:c3:21:e2:d4:ad:83:d0:93 -# SHA256 Fingerprint: ef:c6:5c:ad:bb:59:ad:b6:ef:e8:4d:a2:23:11:b3:56:24:b7:1b:3b:1e:a0:da:8b:66:55:17:4e:c8:97:86:46 ------BEGIN CERTIFICATE----- -MIIFszCCA5ugAwIBAgIQIZxULej27HF3+k7ow3BXlzANBgkqhkiG9w0BAQwFADBj -MQswCQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0 -eSBHbWJIMSswKQYDVQQDDCJUZWxla29tIFNlY3VyaXR5IFRMUyBSU0EgUm9vdCAy -MDIzMB4XDTIzMDMyODEyMTY0NVoXDTQ4MDMyNzIzNTk1OVowYzELMAkGA1UEBhMC -REUxJzAlBgNVBAoMHkRldXRzY2hlIFRlbGVrb20gU2VjdXJpdHkgR21iSDErMCkG -A1UEAwwiVGVsZWtvbSBTZWN1cml0eSBUTFMgUlNBIFJvb3QgMjAyMzCCAiIwDQYJ -KoZIhvcNAQEBBQADggIPADCCAgoCggIBAO01oYGA88tKaVvC+1GDrib94W7zgRJ9 -cUD/h3VCKSHtgVIs3xLBGYSJwb3FKNXVS2xE1kzbB5ZKVXrKNoIENqil/Cf2SfHV -cp6R+SPWcHu79ZvB7JPPGeplfohwoHP89v+1VmLhc2o0mD6CuKyVU/QBoCcHcqMA -U6DksquDOFczJZSfvkgdmOGjup5czQRxUX11eKvzWarE4GC+j4NSuHUaQTXtvPM6 -Y+mpFEXX5lLRbtLevOP1Czvm4MS9Q2QTps70mDdsipWol8hHD/BeEIvnHRz+sTug -BTNoBUGCwQMrAcjnj02r6LX2zWtEtefdi+zqJbQAIldNsLGyMcEWzv/9FIS3R/qy -8XDe24tsNlikfLMR0cN3f1+2JeANxdKz+bi4d9s3cXFH42AYTyS2dTd4uaNir73J -co4vzLuu2+QVUhkHM/tqty1LkCiCc/4YizWN26cEar7qwU02OxY2kTLvtkCJkUPg -8qKrBC7m8kwOFjQgrIfBLX7JZkcXFBGk8/ehJImr2BrIoVyxo/eMbcgByU/J7MT8 -rFEz0ciD0cmfHdRHNCk+y7AO+oMLKFjlKdw/fKifybYKu6boRhYPluV75Gp6SG12 -mAWl3G0eQh5C2hrgUve1g8Aae3g1LDj1H/1Joy7SWWO/gLCMk3PLNaaZlSJhZQNg -+y+TS/qanIA7AgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUtqeX -gj10hZv3PJ+TmpV5dVKMbUcwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBS2 -p5eCPXSFm/c8n5OalXl1UoxtRzANBgkqhkiG9w0BAQwFAAOCAgEAqMxhpr51nhVQ -pGv7qHBFfLp+sVr8WyP6Cnf4mHGCDG3gXkaqk/QeoMPhk9tLrbKmXauw1GLLXrtm -9S3ul0A8Yute1hTWjOKWi0FpkzXmuZlrYrShF2Y0pmtjxrlO8iLpWA1WQdH6DErw -M807u20hOq6OcrXDSvvpfeWxm4bu4uB9tPcy/SKE8YXJN3nptT+/XOR0so8RYgDd -GGah2XsjX/GO1WfoVNpbOms2b/mBsTNHM3dA+VKq3dSDz4V4mZqTuXNnQkYRIer+ -CqkbGmVps4+uFrb2S1ayLfmlyOw7YqPta9BO1UAJpB+Y1zqlklkg5LB9zVtzaL1t -xKITDmcZuI1CfmwMmm6gJC3VRRvcxAIU/oVbZZfKTpBQCHpCNfnqwmbU+AGuHrS+ -w6jv/naaoqYfRvaE7fzbzsQCzndILIyy7MMAo+wsVRjBfhnu4S/yrYObnqsZ38aK -L4x35bcF7DvB7L6Gs4a8wPfc5+pbrrLMtTWGS9DiP7bY+A4A7l3j941Y/8+LN+lj -X273CXE2whJdV/LItM3z7gLfEdxquVeEHVlNjM7IDiPCtyaaEBRx/pOyiriA8A4Q -ntOoUAw3gi/q4Iqd4Sw5/7W0cwDk90imc6y/st53BIe0o82bNSQ3+pCTE4FCxpgm -dTdmQRCsu/WU48IxK63nI1bMNSWSs1A= ------END CERTIFICATE----- - -# Issuer: CN=FIRMAPROFESIONAL CA ROOT-A WEB O=Firmaprofesional SA -# Subject: CN=FIRMAPROFESIONAL CA ROOT-A WEB O=Firmaprofesional SA -# Label: "FIRMAPROFESIONAL CA ROOT-A WEB" -# Serial: 65916896770016886708751106294915943533 -# MD5 Fingerprint: 82:b2:ad:45:00:82:b0:66:63:f8:5f:c3:67:4e:ce:a3 -# SHA1 Fingerprint: a8:31:11:74:a6:14:15:0d:ca:77:dd:0e:e4:0c:5d:58:fc:a0:72:a5 -# SHA256 Fingerprint: be:f2:56:da:f2:6e:9c:69:bd:ec:16:02:35:97:98:f3:ca:f7:18:21:a0:3e:01:82:57:c5:3c:65:61:7f:3d:4a ------BEGIN CERTIFICATE----- -MIICejCCAgCgAwIBAgIQMZch7a+JQn81QYehZ1ZMbTAKBggqhkjOPQQDAzBuMQsw -CQYDVQQGEwJFUzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25hbCBTQTEYMBYGA1UE -YQwPVkFURVMtQTYyNjM0MDY4MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFMIENB -IFJPT1QtQSBXRUIwHhcNMjIwNDA2MDkwMTM2WhcNNDcwMzMxMDkwMTM2WjBuMQsw -CQYDVQQGEwJFUzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25hbCBTQTEYMBYGA1UE -YQwPVkFURVMtQTYyNjM0MDY4MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFMIENB -IFJPT1QtQSBXRUIwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAARHU+osEaR3xyrq89Zf -e9MEkVz6iMYiuYMQYneEMy3pA4jU4DP37XcsSmDq5G+tbbT4TIqk5B/K6k84Si6C -cyvHZpsKjECcfIr28jlgst7L7Ljkb+qbXbdTkBgyVcUgt5SjYzBhMA8GA1UdEwEB -/wQFMAMBAf8wHwYDVR0jBBgwFoAUk+FDY1w8ndYn81LsF7Kpryz3dvgwHQYDVR0O -BBYEFJPhQ2NcPJ3WJ/NS7Beyqa8s93b4MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjO -PQQDAwNoADBlAjAdfKR7w4l1M+E7qUW/Runpod3JIha3RxEL2Jq68cgLcFBTApFw -hVmpHqTm6iMxoAACMQD94vizrxa5HnPEluPBMBnYfubDl94cT7iJLzPrSA8Z94dG -XSaQpYXFuXqUPoeovQA= ------END CERTIFICATE----- - -# Issuer: CN=TWCA CYBER Root CA O=TAIWAN-CA OU=Root CA -# Subject: CN=TWCA CYBER Root CA O=TAIWAN-CA OU=Root CA -# Label: "TWCA CYBER Root CA" -# Serial: 85076849864375384482682434040119489222 -# MD5 Fingerprint: 0b:33:a0:97:52:95:d4:a9:fd:bb:db:6e:a3:55:5b:51 -# SHA1 Fingerprint: f6:b1:1c:1a:83:38:e9:7b:db:b3:a8:c8:33:24:e0:2d:9c:7f:26:66 -# SHA256 Fingerprint: 3f:63:bb:28:14:be:17:4e:c8:b6:43:9c:f0:8d:6d:56:f0:b7:c4:05:88:3a:56:48:a3:34:42:4d:6b:3e:c5:58 ------BEGIN CERTIFICATE----- -MIIFjTCCA3WgAwIBAgIQQAE0jMIAAAAAAAAAATzyxjANBgkqhkiG9w0BAQwFADBQ -MQswCQYDVQQGEwJUVzESMBAGA1UEChMJVEFJV0FOLUNBMRAwDgYDVQQLEwdSb290 -IENBMRswGQYDVQQDExJUV0NBIENZQkVSIFJvb3QgQ0EwHhcNMjIxMTIyMDY1NDI5 -WhcNNDcxMTIyMTU1OTU5WjBQMQswCQYDVQQGEwJUVzESMBAGA1UEChMJVEFJV0FO -LUNBMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJUV0NBIENZQkVSIFJvb3Qg -Q0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDG+Moe2Qkgfh1sTs6P -40czRJzHyWmqOlt47nDSkvgEs1JSHWdyKKHfi12VCv7qze33Kc7wb3+szT3vsxxF -avcokPFhV8UMxKNQXd7UtcsZyoC5dc4pztKFIuwCY8xEMCDa6pFbVuYdHNWdZsc/ -34bKS1PE2Y2yHer43CdTo0fhYcx9tbD47nORxc5zb87uEB8aBs/pJ2DFTxnk684i -JkXXYJndzk834H/nY62wuFm40AZoNWDTNq5xQwTxaWV4fPMf88oon1oglWa0zbfu -j3ikRRjpJi+NmykosaS3Om251Bw4ckVYsV7r8Cibt4LK/c/WMw+f+5eesRycnupf -Xtuq3VTpMCEobY5583WSjCb+3MX2w7DfRFlDo7YDKPYIMKoNM+HvnKkHIuNZW0CP -2oi3aQiotyMuRAlZN1vH4xfyIutuOVLF3lSnmMlLIJXcRolftBL5hSmO68gnFSDA -S9TMfAxsNAwmmyYxpjyn9tnQS6Jk/zuZQXLB4HCX8SS7K8R0IrGsayIyJNN4KsDA -oS/xUgXJP+92ZuJF2A09rZXIx4kmyA+upwMu+8Ff+iDhcK2wZSA3M2Cw1a/XDBzC -kHDXShi8fgGwsOsVHkQGzaRP6AzRwyAQ4VRlnrZR0Bp2a0JaWHY06rc3Ga4udfmW -5cFZ95RXKSWNOkyrTZpB0F8mAwIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwDwYD -VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBSdhWEUfMFib5do5E83QOGt4A1WNzAd -BgNVHQ4EFgQUnYVhFHzBYm+XaORPN0DhreANVjcwDQYJKoZIhvcNAQEMBQADggIB -AGSPesRiDrWIzLjHhg6hShbNcAu3p4ULs3a2D6f/CIsLJc+o1IN1KriWiLb73y0t -tGlTITVX1olNc79pj3CjYcya2x6a4CD4bLubIp1dhDGaLIrdaqHXKGnK/nZVekZn -68xDiBaiA9a5F/gZbG0jAn/xX9AKKSM70aoK7akXJlQKTcKlTfjF/biBzysseKNn -TKkHmvPfXvt89YnNdJdhEGoHK4Fa0o635yDRIG4kqIQnoVesqlVYL9zZyvpoBJ7t -RCT5dEA7IzOrg1oYJkK2bVS1FmAwbLGg+LhBoF1JSdJlBTrq/p1hvIbZv97Tujqx -f36SNI7JAG7cmL3c7IAFrQI932XtCwP39xaEBDG6k5TY8hL4iuO/Qq+n1M0RFxbI -Qh0UqEL20kCGoE8jypZFVmAGzbdVAaYBlGX+bgUJurSkquLvWL69J1bY73NxW0Qz -8ppy6rBePm6pUlvscG21h483XjyMnM7k8M4MZ0HMzvaAq07MTFb1wWFZk7Q+ptq4 -NxKfKjLji7gh7MMrZQzvIt6IKTtM1/r+t+FHvpw+PoP7UV31aPcuIYXcv/Fa4nzX -xeSDwWrruoBa3lwtcHb4yOWHh8qgnaHlIhInD0Q9HWzq1MKLL295q39QpsQZp6F6 -t5b5wR9iWqJDB0BeJsas7a5wFsWqynKKTbDPAYsDP27X ------END CERTIFICATE----- - -# Issuer: CN=SecureSign Root CA12 O=Cybertrust Japan Co., Ltd. -# Subject: CN=SecureSign Root CA12 O=Cybertrust Japan Co., Ltd. -# Label: "SecureSign Root CA12" -# Serial: 587887345431707215246142177076162061960426065942 -# MD5 Fingerprint: c6:89:ca:64:42:9b:62:08:49:0b:1e:7f:e9:07:3d:e8 -# SHA1 Fingerprint: 7a:22:1e:3d:de:1b:06:ac:9e:c8:47:70:16:8e:3c:e5:f7:6b:06:f4 -# SHA256 Fingerprint: 3f:03:4b:b5:70:4d:44:b2:d0:85:45:a0:20:57:de:93:eb:f3:90:5f:ce:72:1a:cb:c7:30:c0:6d:da:ee:90:4e ------BEGIN CERTIFICATE----- -MIIDcjCCAlqgAwIBAgIUZvnHwa/swlG07VOX5uaCwysckBYwDQYJKoZIhvcNAQEL -BQAwUTELMAkGA1UEBhMCSlAxIzAhBgNVBAoTGkN5YmVydHJ1c3QgSmFwYW4gQ28u -LCBMdGQuMR0wGwYDVQQDExRTZWN1cmVTaWduIFJvb3QgQ0ExMjAeFw0yMDA0MDgw -NTM2NDZaFw00MDA0MDgwNTM2NDZaMFExCzAJBgNVBAYTAkpQMSMwIQYDVQQKExpD -eWJlcnRydXN0IEphcGFuIENvLiwgTHRkLjEdMBsGA1UEAxMUU2VjdXJlU2lnbiBS -b290IENBMTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC6OcE3emhF -KxS06+QT61d1I02PJC0W6K6OyX2kVzsqdiUzg2zqMoqUm048luT9Ub+ZyZN+v/mt -p7JIKwccJ/VMvHASd6SFVLX9kHrko+RRWAPNEHl57muTH2SOa2SroxPjcf59q5zd -J1M3s6oYwlkm7Fsf0uZlfO+TvdhYXAvA42VvPMfKWeP+bl+sg779XSVOKik71gur -FzJ4pOE+lEa+Ym6b3kaosRbnhW70CEBFEaCeVESE99g2zvVQR9wsMJvuwPWW0v4J -hscGWa5Pro4RmHvzC1KqYiaqId+OJTN5lxZJjfU+1UefNzFJM3IFTQy2VYzxV4+K -h9GtxRESOaCtAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD -AgEGMB0GA1UdDgQWBBRXNPN0zwRL1SXm8UC2LEzZLemgrTANBgkqhkiG9w0BAQsF -AAOCAQEAPrvbFxbS8hQBICw4g0utvsqFepq2m2um4fylOqyttCg6r9cBg0krY6Ld -mmQOmFxv3Y67ilQiLUoT865AQ9tPkbeGGuwAtEGBpE/6aouIs3YIcipJQMPTw4WJ -mBClnW8Zt7vPemVV2zfrPIpyMpcemik+rY3moxtt9XUa5rBouVui7mlHJzWhhpmA -8zNL4WukJsPvdFlseqJkth5Ew1DgDzk9qTPxpfPSvWKErI4cqc1avTc7bgoitPQV -55FYxTpE05Uo2cBl6XLK0A+9H7MV2anjpEcJnuDLN/v9vZfVvhgaaaI5gdka9at/ -yOPiZwud9AzqVN/Ssq+xIvEg37xEHA== ------END CERTIFICATE----- - -# Issuer: CN=SecureSign Root CA14 O=Cybertrust Japan Co., Ltd. -# Subject: CN=SecureSign Root CA14 O=Cybertrust Japan Co., Ltd. -# Label: "SecureSign Root CA14" -# Serial: 575790784512929437950770173562378038616896959179 -# MD5 Fingerprint: 71:0d:72:fa:92:19:65:5e:89:04:ac:16:33:f0:bc:d5 -# SHA1 Fingerprint: dd:50:c0:f7:79:b3:64:2e:74:a2:b8:9d:9f:d3:40:dd:bb:f0:f2:4f -# SHA256 Fingerprint: 4b:00:9c:10:34:49:4f:9a:b5:6b:ba:3b:a1:d6:27:31:fc:4d:20:d8:95:5a:dc:ec:10:a9:25:60:72:61:e3:38 ------BEGIN CERTIFICATE----- -MIIFcjCCA1qgAwIBAgIUZNtaDCBO6Ncpd8hQJ6JaJ90t8sswDQYJKoZIhvcNAQEM -BQAwUTELMAkGA1UEBhMCSlAxIzAhBgNVBAoTGkN5YmVydHJ1c3QgSmFwYW4gQ28u -LCBMdGQuMR0wGwYDVQQDExRTZWN1cmVTaWduIFJvb3QgQ0ExNDAeFw0yMDA0MDgw -NzA2MTlaFw00NTA0MDgwNzA2MTlaMFExCzAJBgNVBAYTAkpQMSMwIQYDVQQKExpD -eWJlcnRydXN0IEphcGFuIENvLiwgTHRkLjEdMBsGA1UEAxMUU2VjdXJlU2lnbiBS -b290IENBMTQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDF0nqh1oq/ -FjHQmNE6lPxauG4iwWL3pwon71D2LrGeaBLwbCRjOfHw3xDG3rdSINVSW0KZnvOg -vlIfX8xnbacuUKLBl422+JX1sLrcneC+y9/3OPJH9aaakpUqYllQC6KxNedlsmGy -6pJxaeQp8E+BgQQ8sqVb1MWoWWd7VRxJq3qdwudzTe/NCcLEVxLbAQ4jeQkHO6Lo -/IrPj8BGJJw4J+CDnRugv3gVEOuGTgpa/d/aLIJ+7sr2KeH6caH3iGicnPCNvg9J -kdjqOvn90Ghx2+m1K06Ckm9mH+Dw3EzsytHqunQG+bOEkJTRX45zGRBdAuVwpcAQ -0BB8b8VYSbSwbprafZX1zNoCr7gsfXmPvkPx+SgojQlD+Ajda8iLLCSxjVIHvXib -y8posqTdDEx5YMaZ0ZPxMBoH064iwurO8YQJzOAUbn8/ftKChazcqRZOhaBgy/ac -18izju3Gm5h1DVXoX+WViwKkrkMpKBGk5hIwAUt1ax5mnXkvpXYvHUC0bcl9eQjs -0Wq2XSqypWa9a4X0dFbD9ed1Uigspf9mR6XU/v6eVL9lfgHWMI+lNpyiUBzuOIAB -SMbHdPTGrMNASRZhdCyvjG817XsYAFs2PJxQDcqSMxDxJklt33UkN4Ii1+iW/RVL -ApY+B3KVfqs9TC7XyvDf4Fg/LS8EmjijAQIDAQABo0IwQDAPBgNVHRMBAf8EBTAD -AQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUBpOjCl4oaTeqYR3r6/wtbyPk -86AwDQYJKoZIhvcNAQEMBQADggIBAJaAcgkGfpzMkwQWu6A6jZJOtxEaCnFxEM0E -rX+lRVAQZk5KQaID2RFPeje5S+LGjzJmdSX7684/AykmjbgWHfYfM25I5uj4V7Ib -ed87hwriZLoAymzvftAj63iP/2SbNDefNWWipAA9EiOWWF3KY4fGoweITedpdopT -zfFP7ELyk+OZpDc8h7hi2/DsHzc/N19DzFGdtfCXwreFamgLRB7lUe6TzktuhsHS -DCRZNhqfLJGP4xjblJUK7ZGqDpncllPjYYPGFrojutzdfhrGe0K22VoF3Jpf1d+4 -2kd92jjbrDnVHmtsKheMYc2xbXIBw8MgAGJoFjHVdqqGuw6qnsb58Nn4DSEC5MUo -FlkRudlpcyqSeLiSV5sI8jrlL5WwWLdrIBRtFO8KvH7YVdiI2i/6GaX7i+B/OfVy -K4XELKzvGUWSTLNhB9xNH27SgRNcmvMSZ4PPmz+Ln52kuaiWA3rF7iDeM9ovnhp6 -dB7h7sxaOgTdsxoEqBRjrLdHEoOabPXm6RUVkRqEGQ6UROcSjiVbgGcZ3GOTEAtl -Lor6CZpO2oYofaphNdgOpygau1LgePhsumywbrmHXumZNTfxPWQrqaA0k89jL9WB -365jJ6UeTo3cKXhZ+PmhIIynJkBugnLNeLLIjzwec+fBH7/PzqUqm9tEZDKgu39c -JRNItX+S ------END CERTIFICATE----- - -# Issuer: CN=SecureSign Root CA15 O=Cybertrust Japan Co., Ltd. -# Subject: CN=SecureSign Root CA15 O=Cybertrust Japan Co., Ltd. -# Label: "SecureSign Root CA15" -# Serial: 126083514594751269499665114766174399806381178503 -# MD5 Fingerprint: 13:30:fc:c4:62:a6:a9:de:b5:c1:68:af:b5:d2:31:47 -# SHA1 Fingerprint: cb:ba:83:c8:c1:5a:5d:f1:f9:73:6f:ca:d7:ef:28:13:06:4a:07:7d -# SHA256 Fingerprint: e7:78:f0:f0:95:fe:84:37:29:cd:1a:00:82:17:9e:53:14:a9:c2:91:44:28:05:e1:fb:1d:8f:b6:b8:88:6c:3a ------BEGIN CERTIFICATE----- -MIICIzCCAamgAwIBAgIUFhXHw9hJp75pDIqI7fBw+d23PocwCgYIKoZIzj0EAwMw -UTELMAkGA1UEBhMCSlAxIzAhBgNVBAoTGkN5YmVydHJ1c3QgSmFwYW4gQ28uLCBM -dGQuMR0wGwYDVQQDExRTZWN1cmVTaWduIFJvb3QgQ0ExNTAeFw0yMDA0MDgwODMy -NTZaFw00NTA0MDgwODMyNTZaMFExCzAJBgNVBAYTAkpQMSMwIQYDVQQKExpDeWJl -cnRydXN0IEphcGFuIENvLiwgTHRkLjEdMBsGA1UEAxMUU2VjdXJlU2lnbiBSb290 -IENBMTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQLUHSNZDKZmbPSYAi4Io5GdCx4 -wCtELW1fHcmuS1Iggz24FG1Th2CeX2yF2wYUleDHKP+dX+Sq8bOLbe1PL0vJSpSR -ZHX+AezB2Ot6lHhWGENfa4HL9rzatAy2KZMIaY+jQjBAMA8GA1UdEwEB/wQFMAMB -Af8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBTrQciu/NWeUUj1vYv0hyCTQSvT -9DAKBggqhkjOPQQDAwNoADBlAjEA2S6Jfl5OpBEHvVnCB96rMjhTKkZEBhd6zlHp -4P9mLQlO4E/0BdGF9jVg3PVys0Z9AjBEmEYagoUeYWmJSwdLZrWeqrqgHkHZAXQ6 -bkU6iYAZezKYVWOr62Nuk22rGwlgMU4= ------END CERTIFICATE----- - -# Issuer: CN=D-TRUST BR Root CA 2 2023 O=D-Trust GmbH -# Subject: CN=D-TRUST BR Root CA 2 2023 O=D-Trust GmbH -# Label: "D-TRUST BR Root CA 2 2023" -# Serial: 153168538924886464690566649552453098598 -# MD5 Fingerprint: e1:09:ed:d3:60:d4:56:1b:47:1f:b7:0c:5f:1b:5f:85 -# SHA1 Fingerprint: 2d:b0:70:ee:71:94:af:69:68:17:db:79:ce:58:9f:a0:6b:96:f7:87 -# SHA256 Fingerprint: 05:52:e6:f8:3f:df:65:e8:fa:96:70:e6:66:df:28:a4:e2:13:40:b5:10:cb:e5:25:66:f9:7c:4f:b9:4b:2b:d1 ------BEGIN CERTIFICATE----- -MIIFqTCCA5GgAwIBAgIQczswBEhb2U14LnNLyaHcZjANBgkqhkiG9w0BAQ0FADBI -MQswCQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlE -LVRSVVNUIEJSIFJvb3QgQ0EgMiAyMDIzMB4XDTIzMDUwOTA4NTYzMVoXDTM4MDUw -OTA4NTYzMFowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEi -MCAGA1UEAxMZRC1UUlVTVCBCUiBSb290IENBIDIgMjAyMzCCAiIwDQYJKoZIhvcN -AQEBBQADggIPADCCAgoCggIBAK7/CVmRgApKaOYkP7in5Mg6CjoWzckjYaCTcfKr -i3OPoGdlYNJUa2NRb0kz4HIHE304zQaSBylSa053bATTlfrdTIzZXcFhfUvnKLNE -gXtRr90zsWh81k5M/itoucpmacTsXld/9w3HnDY25QdgrMBM6ghs7wZ8T1soegj8 -k12b9py0i4a6Ibn08OhZWiihNIQaJZG2tY/vsvmA+vk9PBFy2OMvhnbFeSzBqZCT -Rphny4NqoFAjpzv2gTng7fC5v2Xx2Mt6++9zA84A9H3X4F07ZrjcjrqDy4d2A/wl -2ecjbwb9Z/Pg/4S8R7+1FhhGaRTMBffb00msa8yr5LULQyReS2tNZ9/WtT5PeB+U -cSTq3nD88ZP+npNa5JRal1QMNXtfbO4AHyTsA7oC9Xb0n9Sa7YUsOCIvx9gvdhFP -/Wxc6PWOJ4d/GUohR5AdeY0cW/jPSoXk7bNbjb7EZChdQcRurDhaTyN0dKkSw/bS -uREVMweR2Ds3OmMwBtHFIjYoYiMQ4EbMl6zWK11kJNXuHA7e+whadSr2Y23OC0K+ -0bpwHJwh5Q8xaRfX/Aq03u2AnMuStIv13lmiWAmlY0cL4UEyNEHZmrHZqLAbWt4N -DfTisl01gLmB1IRpkQLLddCNxbU9CZEJjxShFHR5PtbJFR2kWVki3PaKRT08EtY+ -XTIvAgMBAAGjgY4wgYswDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUZ5Dw1t61 -GNVGKX5cq/ieCLxklRAwDgYDVR0PAQH/BAQDAgEGMEkGA1UdHwRCMEAwPqA8oDqG -OGh0dHA6Ly9jcmwuZC10cnVzdC5uZXQvY3JsL2QtdHJ1c3RfYnJfcm9vdF9jYV8y -XzIwMjMuY3JsMA0GCSqGSIb3DQEBDQUAA4ICAQA097N3U9swFrktpSHxQCF16+tI -FoE9c+CeJyrrd6kTpGoKWloUMz1oH4Guaf2Mn2VsNELZLdB/eBaxOqwjMa1ef67n -riv6uvw8l5VAk1/DLQOj7aRvU9f6QA4w9QAgLABMjDu0ox+2v5Eyq6+SmNMW5tTR -VFxDWy6u71cqqLRvpO8NVhTaIasgdp4D/Ca4nj8+AybmTNudX0KEPUUDAxxZiMrc -LmEkWqTqJwtzEr5SswrPMhfiHocaFpVIbVrg0M8JkiZmkdijYQ6qgYF/6FKC0ULn -4B0Y+qSFNueG4A3rvNTJ1jxD8V1Jbn6Bm2m1iWKPiFLY1/4nwSPFyysCu7Ff/vtD -hQNGvl3GyiEm/9cCnnRK3PgTFbGBVzbLZVzRHTF36SXDw7IyN9XxmAnkbWOACKsG -koHU6XCPpz+y7YaMgmo1yEJagtFSGkUPFaUA8JR7ZSdXOUPPfH/mvTWze/EZTN46 -ls/pdu4D58JDUjxqgejBWoC9EV2Ta/vH5mQ/u2kc6d0li690yVRAysuTEwrt+2aS -Ecr1wPrYg1UDfNPFIkZ1cGt5SAYqgpq/5usWDiJFAbzdNpQ0qTUmiteXue4Icr80 -knCDgKs4qllo3UCkGJCy89UDyibK79XH4I9TjvAA46jtn/mtd+ArY0+ew+43u3gJ -hJ65bvspmZDogNOfJA== ------END CERTIFICATE----- - -# Issuer: CN=TrustAsia TLS ECC Root CA O=TrustAsia Technologies, Inc. -# Subject: CN=TrustAsia TLS ECC Root CA O=TrustAsia Technologies, Inc. -# Label: "TrustAsia TLS ECC Root CA" -# Serial: 310892014698942880364840003424242768478804666567 -# MD5 Fingerprint: 09:48:04:77:d2:fc:65:93:71:66:b1:11:95:4f:06:8c -# SHA1 Fingerprint: b5:ec:39:f3:a1:66:37:ae:c3:05:94:57:e2:be:11:be:b7:a1:7f:36 -# SHA256 Fingerprint: c0:07:6b:9e:f0:53:1f:b1:a6:56:d6:7c:4e:be:97:cd:5d:ba:a4:1e:f4:45:98:ac:c2:48:98:78:c9:2d:87:11 ------BEGIN CERTIFICATE----- -MIICMTCCAbegAwIBAgIUNnThTXxlE8msg1UloD5Sfi9QaMcwCgYIKoZIzj0EAwMw -WDELMAkGA1UEBhMCQ04xJTAjBgNVBAoTHFRydXN0QXNpYSBUZWNobm9sb2dpZXMs -IEluYy4xIjAgBgNVBAMTGVRydXN0QXNpYSBUTFMgRUNDIFJvb3QgQ0EwHhcNMjQw -NTE1MDU0MTU2WhcNNDQwNTE1MDU0MTU1WjBYMQswCQYDVQQGEwJDTjElMCMGA1UE -ChMcVHJ1c3RBc2lhIFRlY2hub2xvZ2llcywgSW5jLjEiMCAGA1UEAxMZVHJ1c3RB -c2lhIFRMUyBFQ0MgUm9vdCBDQTB2MBAGByqGSM49AgEGBSuBBAAiA2IABLh/pVs/ -AT598IhtrimY4ZtcU5nb9wj/1WrgjstEpvDBjL1P1M7UiFPoXlfXTr4sP/MSpwDp -guMqWzJ8S5sUKZ74LYO1644xST0mYekdcouJtgq7nDM1D9rs3qlKH8kzsaNCMEAw -DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQULIVTu7FDzTLqnqOH/qKYqKaT6RAw -DgYDVR0PAQH/BAQDAgEGMAoGCCqGSM49BAMDA2gAMGUCMFRH18MtYYZI9HlaVQ01 -L18N9mdsd0AaRuf4aFtOJx24mH1/k78ITcTaRTChD15KeAIxAKORh/IRM4PDwYqR -OkwrULG9IpRdNYlzg8WbGf60oenUoWa2AaU2+dhoYSi3dOGiMQ== ------END CERTIFICATE----- - -# Issuer: CN=TrustAsia TLS RSA Root CA O=TrustAsia Technologies, Inc. -# Subject: CN=TrustAsia TLS RSA Root CA O=TrustAsia Technologies, Inc. -# Label: "TrustAsia TLS RSA Root CA" -# Serial: 160405846464868906657516898462547310235378010780 -# MD5 Fingerprint: 3b:9e:c3:86:0f:34:3c:6b:c5:46:c4:8e:1d:e7:19:12 -# SHA1 Fingerprint: a5:46:50:c5:62:ea:95:9a:1a:a7:04:6f:17:58:c7:29:53:3d:03:fa -# SHA256 Fingerprint: 06:c0:8d:7d:af:d8:76:97:1e:b1:12:4f:e6:7f:84:7e:c0:c7:a1:58:d3:ea:53:cb:e9:40:e2:ea:97:91:f4:c3 ------BEGIN CERTIFICATE----- -MIIFgDCCA2igAwIBAgIUHBjYz+VTPyI1RlNUJDxsR9FcSpwwDQYJKoZIhvcNAQEM -BQAwWDELMAkGA1UEBhMCQ04xJTAjBgNVBAoTHFRydXN0QXNpYSBUZWNobm9sb2dp -ZXMsIEluYy4xIjAgBgNVBAMTGVRydXN0QXNpYSBUTFMgUlNBIFJvb3QgQ0EwHhcN -MjQwNTE1MDU0MTU3WhcNNDQwNTE1MDU0MTU2WjBYMQswCQYDVQQGEwJDTjElMCMG -A1UEChMcVHJ1c3RBc2lhIFRlY2hub2xvZ2llcywgSW5jLjEiMCAGA1UEAxMZVHJ1 -c3RBc2lhIFRMUyBSU0EgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC -AgoCggIBAMMWuBtqpERz5dZO9LnPWwvB0ZqB9WOwj0PBuwhaGnrhB3YmH49pVr7+ -NmDQDIPNlOrnxS1cLwUWAp4KqC/lYCZUlviYQB2srp10Zy9U+5RjmOMmSoPGlbYJ -Q1DNDX3eRA5gEk9bNb2/mThtfWza4mhzH/kxpRkQcwUqwzIZheo0qt1CHjCNP561 -HmHVb70AcnKtEj+qpklz8oYVlQwQX1Fkzv93uMltrOXVmPGZLmzjyUT5tUMnCE32 -ft5EebuyjBza00tsLtbDeLdM1aTk2tyKjg7/D8OmYCYozza/+lcK7Fs/6TAWe8Tb -xNRkoDD75f0dcZLdKY9BWN4ArTr9PXwaqLEX8E40eFgl1oUh63kd0Nyrz2I8sMeX -i9bQn9P+PN7F4/w6g3CEIR0JwqH8uyghZVNgepBtljhb//HXeltt08lwSUq6HTrQ -UNoyIBnkiz/r1RYmNzz7dZ6wB3C4FGB33PYPXFIKvF1tjVEK2sUYyJtt3LCDs3+j -TnhMmCWr8n4uIF6CFabW2I+s5c0yhsj55NqJ4js+k8UTav/H9xj8Z7XvGCxUq0DT -bE3txci3OE9kxJRMT6DNrqXGJyV1J23G2pyOsAWZ1SgRxSHUuPzHlqtKZFlhaxP8 -S8ySpg+kUb8OWJDZgoM5pl+z+m6Ss80zDoWo8SnTq1mt1tve1CuBAgMBAAGjQjBA -MA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFLgHkXlcBvRG/XtZylomkadFK/hT -MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQwFAAOCAgEAIZtqBSBdGBanEqT3 -Rz/NyjuujsCCztxIJXgXbODgcMTWltnZ9r96nBO7U5WS/8+S4PPFJzVXqDuiGev4 -iqME3mmL5Dw8veWv0BIb5Ylrc5tvJQJLkIKvQMKtuppgJFqBTQUYo+IzeXoLH5Pt -7DlK9RME7I10nYEKqG/odv6LTytpEoYKNDbdgptvT+Bz3Ul/KD7JO6NXBNiT2Twp -2xIQaOHEibgGIOcberyxk2GaGUARtWqFVwHxtlotJnMnlvm5P1vQiJ3koP26TpUJ -g3933FEFlJ0gcXax7PqJtZwuhfG5WyRasQmr2soaB82G39tp27RIGAAtvKLEiUUj -pQ7hRGU+isFqMB3iYPg6qocJQrmBktwliJiJ8Xw18WLK7nn4GS/+X/jbh87qqA8M -pugLoDzga5SYnH+tBuYc6kIQX+ImFTw3OffXvO645e8D7r0i+yiGNFjEWn9hongP -XvPKnbwbPKfILfanIhHKA9jnZwqKDss1jjQ52MjqjZ9k4DewbNfFj8GQYSbbJIwe -SsCI3zWQzj8C9GRh3sfIB5XeMhg6j6JCQCTl1jNdfK7vsU1P1FeQNWrcrgSXSYk0 -ly4wBOeY99sLAZDBHwo/+ML+TvrbmnNzFrwFuHnYWa8G5z9nODmxfKuU4CkUpijy -323imttUQ/hHWKNddBWcwauwxzQ= ------END CERTIFICATE----- - -# Issuer: CN=D-TRUST EV Root CA 2 2023 O=D-Trust GmbH -# Subject: CN=D-TRUST EV Root CA 2 2023 O=D-Trust GmbH -# Label: "D-TRUST EV Root CA 2 2023" -# Serial: 139766439402180512324132425437959641711 -# MD5 Fingerprint: 96:b4:78:09:f0:09:cb:77:eb:bb:1b:4d:6f:36:bc:b6 -# SHA1 Fingerprint: a5:5b:d8:47:6c:8f:19:f7:4c:f4:6d:6b:b6:c2:79:82:22:df:54:8b -# SHA256 Fingerprint: 8e:82:21:b2:e7:d4:00:78:36:a1:67:2f:0d:cc:29:9c:33:bc:07:d3:16:f1:32:fa:1a:20:6d:58:71:50:f1:ce ------BEGIN CERTIFICATE----- -MIIFqTCCA5GgAwIBAgIQaSYJfoBLTKCnjHhiU19abzANBgkqhkiG9w0BAQ0FADBI -MQswCQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlE -LVRSVVNUIEVWIFJvb3QgQ0EgMiAyMDIzMB4XDTIzMDUwOTA5MTAzM1oXDTM4MDUw -OTA5MTAzMlowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEi -MCAGA1UEAxMZRC1UUlVTVCBFViBSb290IENBIDIgMjAyMzCCAiIwDQYJKoZIhvcN -AQEBBQADggIPADCCAgoCggIBANiOo4mAC7JXUtypU0w3uX9jFxPvp1sjW2l1sJkK -F8GLxNuo4MwxusLyzV3pt/gdr2rElYfXR8mV2IIEUD2BCP/kPbOx1sWy/YgJ25yE -7CUXFId/MHibaljJtnMoPDT3mfd/06b4HEV8rSyMlD/YZxBTfiLNTiVR8CUkNRFe -EMbsh2aJgWi6zCudR3Mfvc2RpHJqnKIbGKBv7FD0fUDCqDDPvXPIEysQEx6Lmqg6 -lHPTGGkKSv/BAQP/eX+1SH977ugpbzZMlWGG2Pmic4ruri+W7mjNPU0oQvlFKzIb -RlUWaqZLKfm7lVa/Rh3sHZMdwGWyH6FDrlaeoLGPaxK3YG14C8qKXO0elg6DpkiV -jTujIcSuWMYAsoS0I6SWhjW42J7YrDRJmGOVxcttSEfi8i4YHtAxq9107PncjLgc -jmgjutDzUNzPZY9zOjLHfP7KgiJPvo5iR2blzYfi6NUPGJ/lBHJLRjwQ8kTCZFZx -TnXonMkmdMV9WdEKWw9t/p51HBjGGjp82A0EzM23RWV6sY+4roRIPrN6TagD4uJ+ -ARZZaBhDM7DS3LAaQzXupdqpRlyuhoFBAUp0JuyfBr/CBTdkdXgpaP3F9ev+R/nk -hbDhezGdpn9yo7nELC7MmVcOIQxFAZRl62UJxmMiCzNJkkg8/M3OsD6Onov4/knF -NXJHAgMBAAGjgY4wgYswDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUqvyREBuH -kV8Wub9PS5FeAByxMoAwDgYDVR0PAQH/BAQDAgEGMEkGA1UdHwRCMEAwPqA8oDqG -OGh0dHA6Ly9jcmwuZC10cnVzdC5uZXQvY3JsL2QtdHJ1c3RfZXZfcm9vdF9jYV8y -XzIwMjMuY3JsMA0GCSqGSIb3DQEBDQUAA4ICAQCTy6UfmRHsmg1fLBWTxj++EI14 -QvBukEdHjqOSMo1wj/Zbjb6JzkcBahsgIIlbyIIQbODnmaprxiqgYzWRaoUlrRc4 -pZt+UPJ26oUFKidBK7GB0aL2QHWpDsvxVUjY7NHss+jOFKE17MJeNRqrphYBBo7q -3C+jisosketSjl8MmxfPy3MHGcRqwnNU73xDUmPBEcrCRbH0O1P1aa4846XerOhU -t7KR/aypH/KH5BfGSah82ApB9PI+53c0BFLd6IHyTS9URZ0V4U/M5d40VxDJI3IX -cI1QcB9WbMy5/zpaT2N6w25lBx2Eof+pDGOJbbJAiDnXH3dotfyc1dZnaVuodNv8 -ifYbMvekJKZ2t0dT741Jj6m2g1qllpBFYfXeA08mD6iL8AOWsKwV0HFaanuU5nCT -2vFp4LJiTZ6P/4mdm13NRemUAiKN4DV/6PEEeXFsVIP4M7kFMhtYVRFP0OUnR3Hs -7dpn1mKmS00PaaLJvOwiS5THaJQXfuKOKD62xur1NGyfN4gHONuGcfrNlUhDbqNP -gofXNJhuS5N5YHVpD/Aa1VP6IQzCP+k/HxiMkl14p3ZnGbuy6n/pcAlWVqOwDAst -Nl7F6cTVg8uGF5csbBNvh1qvSaYd2804BC5f4ko1Di1L+KIkBI3Y4WNeApI02phh -XBxvWHZks/wCuPWdCg== ------END CERTIFICATE----- - -# Issuer: CN=SwissSign RSA TLS Root CA 2022 - 1 O=SwissSign AG -# Subject: CN=SwissSign RSA TLS Root CA 2022 - 1 O=SwissSign AG -# Label: "SwissSign RSA TLS Root CA 2022 - 1" -# Serial: 388078645722908516278762308316089881486363258315 -# MD5 Fingerprint: 16:2e:e4:19:76:81:85:ba:8e:91:58:f1:15:ef:72:39 -# SHA1 Fingerprint: 81:34:0a:be:4c:cd:ce:cc:e7:7d:cc:8a:d4:57:e2:45:a0:77:5d:ce -# SHA256 Fingerprint: 19:31:44:f4:31:e0:fd:db:74:07:17:d4:de:92:6a:57:11:33:88:4b:43:60:d3:0e:27:29:13:cb:e6:60:ce:41 ------BEGIN CERTIFICATE----- -MIIFkzCCA3ugAwIBAgIUQ/oMX04bgBhE79G0TzUfRPSA7cswDQYJKoZIhvcNAQEL -BQAwUTELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzErMCkGA1UE -AxMiU3dpc3NTaWduIFJTQSBUTFMgUm9vdCBDQSAyMDIyIC0gMTAeFw0yMjA2MDgx -MTA4MjJaFw00NzA2MDgxMTA4MjJaMFExCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxT -d2lzc1NpZ24gQUcxKzApBgNVBAMTIlN3aXNzU2lnbiBSU0EgVExTIFJvb3QgQ0Eg -MjAyMiAtIDEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDLKmjiC8NX -vDVjvHClO/OMPE5Xlm7DTjak9gLKHqquuN6orx122ro10JFwB9+zBvKK8i5VUXu7 -LCTLf5ImgKO0lPaCoaTo+nUdWfMHamFk4saMla+ju45vVs9xzF6BYQ1t8qsCLqSX -5XH8irCRIFucdFJtrhUnWXjyCcplDn/L9Ovn3KlMd/YrFgSVrpxxpT8q2kFC5zyE -EPThPYxr4iuRR1VPuFa+Rd4iUU1OKNlfGUEGjw5NBuBwQCMBauTLE5tzrE0USJIt -/m2n+IdreXXhvhCxqohAWVTXz8TQm0SzOGlkjIHRI36qOTw7D59Ke4LKa2/KIj4x -0LDQKhySio/YGZxH5D4MucLNvkEM+KRHBdvBFzA4OmnczcNpI/2aDwLOEGrOyvi5 -KaM2iYauC8BPY7kGWUleDsFpswrzd34unYyzJ5jSmY0lpx+Gs6ZUcDj8fV3oT4MM -0ZPlEuRU2j7yrTrePjxF8CgPBrnh25d7mUWe3f6VWQQvdT/TromZhqwUtKiE+shd -OxtYk8EXlFXIC+OCeYSf8wCENO7cMdWP8vpPlkwGqnj73mSiI80fPsWMvDdUDrta -clXvyFu1cvh43zcgTFeRc5JzrBh3Q4IgaezprClG5QtO+DdziZaKHG29777YtvTK -wP1H8K4LWCDFyB02rpeNUIMmJCn3nTsPBQIDAQABo2MwYTAPBgNVHRMBAf8EBTAD -AQH/MA4GA1UdDwEB/wQEAwIBBjAfBgNVHSMEGDAWgBRvjmKLk0Ow4UD2p8P98Q+4 -DxU4pTAdBgNVHQ4EFgQUb45ii5NDsOFA9qfD/fEPuA8VOKUwDQYJKoZIhvcNAQEL -BQADggIBAKwsKUF9+lz1GpUYvyypiqkkVHX1uECry6gkUSsYP2OprphWKwVDIqO3 -10aewCoSPY6WlkDfDDOLazeROpW7OSltwAJsipQLBwJNGD77+3v1dj2b9l4wBlgz -Hqp41eZUBDqyggmNzhYzWUUo8aWjlw5DI/0LIICQ/+Mmz7hkkeUFjxOgdg3XNwwQ -iJb0Pr6VvfHDffCjw3lHC1ySFWPtUnWK50Zpy1FVCypM9fJkT6lc/2cyjlUtMoIc -gC9qkfjLvH4YoiaoLqNTKIftV+Vlek4ASltOU8liNr3CjlvrzG4ngRhZi0Rjn9UM -ZfQpZX+RLOV/fuiJz48gy20HQhFRJjKKLjpHE7iNvUcNCfAWpO2Whi4Z2L6MOuhF -LhG6rlrnub+xzI/goP+4s9GFe3lmozm1O2bYQL7Pt2eLSMkZJVX8vY3PXtpOpvJp -zv1/THfQwUY1mFwjmwJFQ5Ra3bxHrSL+ul4vkSkphnsh3m5kt8sNjzdbowhq6/Td -Ao9QAwKxuDdollDruF/UKIqlIgyKhPBZLtU30WHlQnNYKoH3dtvi4k0NX/a3vgW0 -rk4N3hY9A4GzJl5LuEsAz/+MF7psYC0nhzck5npgL7XTgwSqT0N1osGDsieYK7EO -gLrAhV5Cud+xYJHT6xh+cHiudoO+cVrQkOPKwRYlZ0rwtnu64ZzZ ------END CERTIFICATE----- - -# Issuer: CN=OISTE Server Root ECC G1 O=OISTE Foundation -# Subject: CN=OISTE Server Root ECC G1 O=OISTE Foundation -# Label: "OISTE Server Root ECC G1" -# Serial: 47819833811561661340092227008453318557 -# MD5 Fingerprint: 42:a7:d2:35:ae:02:92:db:19:76:08:de:2f:05:b4:d4 -# SHA1 Fingerprint: 3b:f6:8b:09:ae:2a:92:7b:ba:e3:8d:3f:11:95:d9:e6:44:0c:45:e2 -# SHA256 Fingerprint: ee:c9:97:c0:c3:0f:21:6f:7e:3b:8b:30:7d:2b:ae:42:41:2d:75:3f:c8:21:9d:af:d1:52:0b:25:72:85:0f:49 ------BEGIN CERTIFICATE----- -MIICNTCCAbqgAwIBAgIQI/nD1jWvjyhLH/BU6n6XnTAKBggqhkjOPQQDAzBLMQsw -CQYDVQQGEwJDSDEZMBcGA1UECgwQT0lTVEUgRm91bmRhdGlvbjEhMB8GA1UEAwwY -T0lTVEUgU2VydmVyIFJvb3QgRUNDIEcxMB4XDTIzMDUzMTE0NDIyOFoXDTQ4MDUy -NDE0NDIyN1owSzELMAkGA1UEBhMCQ0gxGTAXBgNVBAoMEE9JU1RFIEZvdW5kYXRp -b24xITAfBgNVBAMMGE9JU1RFIFNlcnZlciBSb290IEVDQyBHMTB2MBAGByqGSM49 -AgEGBSuBBAAiA2IABBcv+hK8rBjzCvRE1nZCnrPoH7d5qVi2+GXROiFPqOujvqQy -cvO2Ackr/XeFblPdreqqLiWStukhEaivtUwL85Zgmjvn6hp4LrQ95SjeHIC6XG4N -2xml4z+cKrhAS93mT6NjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBQ3 -TYhlz/w9itWj8UnATgwQb0K0nDAdBgNVHQ4EFgQUN02IZc/8PYrVo/FJwE4MEG9C -tJwwDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMDA2kAMGYCMQCpKjAd0MKfkFFR -QD6VVCHNFmb3U2wIFjnQEnx/Yxvf4zgAOdktUyBFCxxgZzFDJe0CMQCSia7pXGKD -YmH5LVerVrkR3SW+ak5KGoJr3M/TvEqzPNcum9v4KGm8ay3sMaE641c= ------END CERTIFICATE----- - -# Issuer: CN=OISTE Server Root RSA G1 O=OISTE Foundation -# Subject: CN=OISTE Server Root RSA G1 O=OISTE Foundation -# Label: " OISTE Server Root RSA G1" -# Serial: 113845518112613905024960613408179309848 -# MD5 Fingerprint: 23:a7:9e:d4:70:b8:b9:14:57:41:8a:7e:44:59:e2:68 -# SHA1 Fingerprint: f7:00:34:25:94:88:68:31:e4:34:87:3f:70:fe:86:b3:86:9f:f0:6e -# SHA256 Fingerprint: 9a:e3:62:32:a5:18:9f:fd:db:35:3d:fd:26:52:0c:01:53:95:d2:27:77:da:c5:9d:b5:7b:98:c0:89:a6:51:e6 ------BEGIN CERTIFICATE----- -MIIFgzCCA2ugAwIBAgIQVaXZZ5Qoxu0M+ifdWwFNGDANBgkqhkiG9w0BAQwFADBL -MQswCQYDVQQGEwJDSDEZMBcGA1UECgwQT0lTVEUgRm91bmRhdGlvbjEhMB8GA1UE -AwwYT0lTVEUgU2VydmVyIFJvb3QgUlNBIEcxMB4XDTIzMDUzMTE0MzcxNloXDTQ4 -MDUyNDE0MzcxNVowSzELMAkGA1UEBhMCQ0gxGTAXBgNVBAoMEE9JU1RFIEZvdW5k -YXRpb24xITAfBgNVBAMMGE9JU1RFIFNlcnZlciBSb290IFJTQSBHMTCCAiIwDQYJ -KoZIhvcNAQEBBQADggIPADCCAgoCggIBAKqu9KuCz/vlNwvn1ZatkOhLKdxVYOPM -vLO8LZK55KN68YG0nnJyQ98/qwsmtO57Gmn7KNByXEptaZnwYx4M0rH/1ow00O7b -rEi56rAUjtgHqSSY3ekJvqgiG1k50SeH3BzN+Puz6+mTeO0Pzjd8JnduodgsIUzk -ik/HEzxux9UTl7Ko2yRpg1bTacuCErudG/L4NPKYKyqOBGf244ehHa1uzjZ0Dl4z -O8vbUZeUapU8zhhabkvG/AePLhq5SvdkNCncpo1Q4Y2LS+VIG24ugBA/5J8bZT8R -tOpXaZ+0AOuFJJkk9SGdl6r7NH8CaxWQrbueWhl/pIzY+m0o/DjH40ytas7ZTpOS -jswMZ78LS5bOZmdTaMsXEY5Z96ycG7mOaES3GK/m5Q9l3JUJsJMStR8+lKXHiHUh -sd4JJCpM4rzsTGdHwimIuQq6+cF0zowYJmXa92/GjHtoXAvuY8BeS/FOzJ8vD+Ho -mnqT8eDI278n5mUpezbgMxVz8p1rhAhoKzYHKyfMeNhqhw5HdPSqoBNdZH702xSu -+zrkL8Fl47l6QGzwBrd7KJvX4V84c5Ss2XCTLdyEr0YconosP4EmQufU2MVshGYR -i3drVByjtdgQ8K4p92cIiBdcuJd5z+orKu5YM+Vt6SmqZQENghPsJQtdLEByFSnT -kCz3GkPVavBpAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU -8snBDw1jALvsRQ5KH7WxszbNDo0wHQYDVR0OBBYEFPLJwQ8NYwC77EUOSh+1sbM2 -zQ6NMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQwFAAOCAgEANGd5sjrG5T33 -I3K5Ce+SrScfoE4KsvXaFwyihdJ+klH9FWXXXGtkFu6KRcoMQzZENdl//nk6HOjG -5D1rd9QhEOP28yBOqb6J8xycqd+8MDoX0TJD0KqKchxRKEzdNsjkLWd9kYccnbz8 -qyiWXmFcuCIzGEgWUOrKL+mlSdx/PKQZvDatkuK59EvV6wit53j+F8Bdh3foZ3dP -AGav9LEDOr4SfEE15fSmG0eLy3n31r8Xbk5l8PjaV8GUgeV6Vg27Rn9vkf195hfk -gSe7BYhW3SCl95gtkRlpMV+bMPKZrXJAlszYd2abtNUOshD+FKrDgHGdPY3ofRRs -YWSGRqbXVMW215AWRqWFyp464+YTFrYVI8ypKVL9AMb2kI5Wj4kI3Zaq5tNqqYY1 -9tVFeEJKRvwDyF7YZvZFZSS0vod7VSCd9521Kvy5YhnLbDuv0204bKt7ph6N/Ome -/msVuduCmsuY33OhkKCgxeDoAaijFJzIwZqsFVAzje18KotzlUBDJvyBpCpfOZC3 -J8tRd/iWkx7P8nd9H0aTolkelUTFLXVksNb54Dxp6gS1HAviRkRNQzuXSXERvSS2 -wq1yVAb+axj5d9spLFKebXd7Yv0PTY6YMjAwcRLWJTXjn/hvnLXrahut6hDTlhZy -BiElxky8j3C7DOReIoMt0r7+hVu05L0= ------END CERTIFICATE----- diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi/core.py b/vscode-extension/context-engine-uploader/python_libs/certifi/core.py deleted file mode 100644 index 1c9661cc..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/certifi/core.py +++ /dev/null @@ -1,83 +0,0 @@ -""" -certifi.py -~~~~~~~~~~ - -This module returns the installation location of cacert.pem or its contents. -""" -import sys -import atexit - -def exit_cacert_ctx() -> None: - _CACERT_CTX.__exit__(None, None, None) # type: ignore[union-attr] - - -if sys.version_info >= (3, 11): - - from importlib.resources import as_file, files - - _CACERT_CTX = None - _CACERT_PATH = None - - def where() -> str: - # This is slightly terrible, but we want to delay extracting the file - # in cases where we're inside of a zipimport situation until someone - # actually calls where(), but we don't want to re-extract the file - # on every call of where(), so we'll do it once then store it in a - # global variable. - global _CACERT_CTX - global _CACERT_PATH - if _CACERT_PATH is None: - # This is slightly janky, the importlib.resources API wants you to - # manage the cleanup of this file, so it doesn't actually return a - # path, it returns a context manager that will give you the path - # when you enter it and will do any cleanup when you leave it. In - # the common case of not needing a temporary file, it will just - # return the file system location and the __exit__() is a no-op. - # - # We also have to hold onto the actual context manager, because - # it will do the cleanup whenever it gets garbage collected, so - # we will also store that at the global level as well. - _CACERT_CTX = as_file(files("certifi").joinpath("cacert.pem")) - _CACERT_PATH = str(_CACERT_CTX.__enter__()) - atexit.register(exit_cacert_ctx) - - return _CACERT_PATH - - def contents() -> str: - return files("certifi").joinpath("cacert.pem").read_text(encoding="ascii") - -else: - - from importlib.resources import path as get_path, read_text - - _CACERT_CTX = None - _CACERT_PATH = None - - def where() -> str: - # This is slightly terrible, but we want to delay extracting the - # file in cases where we're inside of a zipimport situation until - # someone actually calls where(), but we don't want to re-extract - # the file on every call of where(), so we'll do it once then store - # it in a global variable. - global _CACERT_CTX - global _CACERT_PATH - if _CACERT_PATH is None: - # This is slightly janky, the importlib.resources API wants you - # to manage the cleanup of this file, so it doesn't actually - # return a path, it returns a context manager that will give - # you the path when you enter it and will do any cleanup when - # you leave it. In the common case of not needing a temporary - # file, it will just return the file system location and the - # __exit__() is a no-op. - # - # We also have to hold onto the actual context manager, because - # it will do the cleanup whenever it gets garbage collected, so - # we will also store that at the global level as well. - _CACERT_CTX = get_path("certifi", "cacert.pem") - _CACERT_PATH = str(_CACERT_CTX.__enter__()) - atexit.register(exit_cacert_ctx) - - return _CACERT_PATH - - def contents() -> str: - return read_text("certifi", "cacert.pem", encoding="ascii") diff --git a/vscode-extension/context-engine-uploader/python_libs/certifi/py.typed b/vscode-extension/context-engine-uploader/python_libs/certifi/py.typed deleted file mode 100644 index e69de29b..00000000 diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/INSTALLER b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/INSTALLER deleted file mode 100644 index a1b589e3..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/INSTALLER +++ /dev/null @@ -1 +0,0 @@ -pip diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/METADATA b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/METADATA deleted file mode 100644 index 8d32edcc..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/METADATA +++ /dev/null @@ -1,764 +0,0 @@ -Metadata-Version: 2.4 -Name: charset-normalizer -Version: 3.4.4 -Summary: The Real First Universal Charset Detector. Open, modern and actively maintained alternative to Chardet. -Author-email: "Ahmed R. TAHRI" -Maintainer-email: "Ahmed R. TAHRI" -License: MIT -Project-URL: Changelog, https://github.com/jawah/charset_normalizer/blob/master/CHANGELOG.md -Project-URL: Documentation, https://charset-normalizer.readthedocs.io/ -Project-URL: Code, https://github.com/jawah/charset_normalizer -Project-URL: Issue tracker, https://github.com/jawah/charset_normalizer/issues -Keywords: encoding,charset,charset-detector,detector,normalization,unicode,chardet,detect -Classifier: Development Status :: 5 - Production/Stable -Classifier: Intended Audience :: Developers -Classifier: Operating System :: OS Independent -Classifier: Programming Language :: Python -Classifier: Programming Language :: Python :: 3 -Classifier: Programming Language :: Python :: 3.7 -Classifier: Programming Language :: Python :: 3.8 -Classifier: Programming Language :: Python :: 3.9 -Classifier: Programming Language :: Python :: 3.10 -Classifier: Programming Language :: Python :: 3.11 -Classifier: Programming Language :: Python :: 3.12 -Classifier: Programming Language :: Python :: 3.13 -Classifier: Programming Language :: Python :: 3.14 -Classifier: Programming Language :: Python :: 3 :: Only -Classifier: Programming Language :: Python :: Implementation :: CPython -Classifier: Programming Language :: Python :: Implementation :: PyPy -Classifier: Topic :: Text Processing :: Linguistic -Classifier: Topic :: Utilities -Classifier: Typing :: Typed -Requires-Python: >=3.7 -Description-Content-Type: text/markdown -License-File: LICENSE -Provides-Extra: unicode-backport -Dynamic: license-file - -

Charset Detection, for Everyone 👋

- -

- The Real First Universal Charset Detector
- - - - - Download Count Total - - - - -

-

- Featured Packages
- - Static Badge - - - Static Badge - -

-

- In other language (unofficial port - by the community)
- - Static Badge - -

- -> A library that helps you read text from an unknown charset encoding.
Motivated by `chardet`, -> I'm trying to resolve the issue by taking a new approach. -> All IANA character set names for which the Python core library provides codecs are supported. - -

- >>>>> 👉 Try Me Online Now, Then Adopt Me 👈 <<<<< -

- -This project offers you an alternative to **Universal Charset Encoding Detector**, also known as **Chardet**. - -| Feature | [Chardet](https://github.com/chardet/chardet) | Charset Normalizer | [cChardet](https://github.com/PyYoshi/cChardet) | -|--------------------------------------------------|:---------------------------------------------:|:--------------------------------------------------------------------------------------------------:|:-----------------------------------------------:| -| `Fast` | ❌ | ✅ | ✅ | -| `Universal**` | ❌ | ✅ | ❌ | -| `Reliable` **without** distinguishable standards | ❌ | ✅ | ✅ | -| `Reliable` **with** distinguishable standards | ✅ | ✅ | ✅ | -| `License` | LGPL-2.1
_restrictive_ | MIT | MPL-1.1
_restrictive_ | -| `Native Python` | ✅ | ✅ | ❌ | -| `Detect spoken language` | ❌ | ✅ | N/A | -| `UnicodeDecodeError Safety` | ❌ | ✅ | ❌ | -| `Whl Size (min)` | 193.6 kB | 42 kB | ~200 kB | -| `Supported Encoding` | 33 | 🎉 [99](https://charset-normalizer.readthedocs.io/en/latest/user/support.html#supported-encodings) | 40 | - -

-Reading Normalized TextCat Reading Text -

- -*\*\* : They are clearly using specific code for a specific encoding even if covering most of used one*
- -## ⚡ Performance - -This package offer better performance than its counterpart Chardet. Here are some numbers. - -| Package | Accuracy | Mean per file (ms) | File per sec (est) | -|-----------------------------------------------|:--------:|:------------------:|:------------------:| -| [chardet](https://github.com/chardet/chardet) | 86 % | 63 ms | 16 file/sec | -| charset-normalizer | **98 %** | **10 ms** | 100 file/sec | - -| Package | 99th percentile | 95th percentile | 50th percentile | -|-----------------------------------------------|:---------------:|:---------------:|:---------------:| -| [chardet](https://github.com/chardet/chardet) | 265 ms | 71 ms | 7 ms | -| charset-normalizer | 100 ms | 50 ms | 5 ms | - -_updated as of december 2024 using CPython 3.12_ - -Chardet's performance on larger file (1MB+) are very poor. Expect huge difference on large payload. - -> Stats are generated using 400+ files using default parameters. More details on used files, see GHA workflows. -> And yes, these results might change at any time. The dataset can be updated to include more files. -> The actual delays heavily depends on your CPU capabilities. The factors should remain the same. -> Keep in mind that the stats are generous and that Chardet accuracy vs our is measured using Chardet initial capability -> (e.g. Supported Encoding) Challenge-them if you want. - -## ✨ Installation - -Using pip: - -```sh -pip install charset-normalizer -U -``` - -## 🚀 Basic Usage - -### CLI -This package comes with a CLI. - -``` -usage: normalizer [-h] [-v] [-a] [-n] [-m] [-r] [-f] [-t THRESHOLD] - file [file ...] - -The Real First Universal Charset Detector. Discover originating encoding used -on text file. Normalize text to unicode. - -positional arguments: - files File(s) to be analysed - -optional arguments: - -h, --help show this help message and exit - -v, --verbose Display complementary information about file if any. - Stdout will contain logs about the detection process. - -a, --with-alternative - Output complementary possibilities if any. Top-level - JSON WILL be a list. - -n, --normalize Permit to normalize input file. If not set, program - does not write anything. - -m, --minimal Only output the charset detected to STDOUT. Disabling - JSON output. - -r, --replace Replace file when trying to normalize it instead of - creating a new one. - -f, --force Replace file without asking if you are sure, use this - flag with caution. - -t THRESHOLD, --threshold THRESHOLD - Define a custom maximum amount of chaos allowed in - decoded content. 0. <= chaos <= 1. - --version Show version information and exit. -``` - -```bash -normalizer ./data/sample.1.fr.srt -``` - -or - -```bash -python -m charset_normalizer ./data/sample.1.fr.srt -``` - -🎉 Since version 1.4.0 the CLI produce easily usable stdout result in JSON format. - -```json -{ - "path": "/home/default/projects/charset_normalizer/data/sample.1.fr.srt", - "encoding": "cp1252", - "encoding_aliases": [ - "1252", - "windows_1252" - ], - "alternative_encodings": [ - "cp1254", - "cp1256", - "cp1258", - "iso8859_14", - "iso8859_15", - "iso8859_16", - "iso8859_3", - "iso8859_9", - "latin_1", - "mbcs" - ], - "language": "French", - "alphabets": [ - "Basic Latin", - "Latin-1 Supplement" - ], - "has_sig_or_bom": false, - "chaos": 0.149, - "coherence": 97.152, - "unicode_path": null, - "is_preferred": true -} -``` - -### Python -*Just print out normalized text* -```python -from charset_normalizer import from_path - -results = from_path('./my_subtitle.srt') - -print(str(results.best())) -``` - -*Upgrade your code without effort* -```python -from charset_normalizer import detect -``` - -The above code will behave the same as **chardet**. We ensure that we offer the best (reasonable) BC result possible. - -See the docs for advanced usage : [readthedocs.io](https://charset-normalizer.readthedocs.io/en/latest/) - -## 😇 Why - -When I started using Chardet, I noticed that it was not suited to my expectations, and I wanted to propose a -reliable alternative using a completely different method. Also! I never back down on a good challenge! - -I **don't care** about the **originating charset** encoding, because **two different tables** can -produce **two identical rendered string.** -What I want is to get readable text, the best I can. - -In a way, **I'm brute forcing text decoding.** How cool is that ? 😎 - -Don't confuse package **ftfy** with charset-normalizer or chardet. ftfy goal is to repair Unicode string whereas charset-normalizer to convert raw file in unknown encoding to unicode. - -## 🍰 How - - - Discard all charset encoding table that could not fit the binary content. - - Measure noise, or the mess once opened (by chunks) with a corresponding charset encoding. - - Extract matches with the lowest mess detected. - - Additionally, we measure coherence / probe for a language. - -**Wait a minute**, what is noise/mess and coherence according to **YOU ?** - -*Noise :* I opened hundred of text files, **written by humans**, with the wrong encoding table. **I observed**, then -**I established** some ground rules about **what is obvious** when **it seems like** a mess (aka. defining noise in rendered text). - I know that my interpretation of what is noise is probably incomplete, feel free to contribute in order to - improve or rewrite it. - -*Coherence :* For each language there is on earth, we have computed ranked letter appearance occurrences (the best we can). So I thought -that intel is worth something here. So I use those records against decoded text to check if I can detect intelligent design. - -## ⚡ Known limitations - - - Language detection is unreliable when text contains two or more languages sharing identical letters. (eg. HTML (english tags) + Turkish content (Sharing Latin characters)) - - Every charset detector heavily depends on sufficient content. In common cases, do not bother run detection on very tiny content. - -## ⚠️ About Python EOLs - -**If you are running:** - -- Python >=2.7,<3.5: Unsupported -- Python 3.5: charset-normalizer < 2.1 -- Python 3.6: charset-normalizer < 3.1 -- Python 3.7: charset-normalizer < 4.0 - -Upgrade your Python interpreter as soon as possible. - -## 👤 Contributing - -Contributions, issues and feature requests are very much welcome.
-Feel free to check [issues page](https://github.com/ousret/charset_normalizer/issues) if you want to contribute. - -## 📝 License - -Copyright © [Ahmed TAHRI @Ousret](https://github.com/Ousret).
-This project is [MIT](https://github.com/Ousret/charset_normalizer/blob/master/LICENSE) licensed. - -Characters frequencies used in this project © 2012 [Denny Vrandečić](http://simia.net/letters/) - -## 💼 For Enterprise - -Professional support for charset-normalizer is available as part of the [Tidelift -Subscription][1]. Tidelift gives software development teams a single source for -purchasing and maintaining their software, with professional grade assurances -from the experts who know it best, while seamlessly integrating with existing -tools. - -[1]: https://tidelift.com/subscription/pkg/pypi-charset-normalizer?utm_source=pypi-charset-normalizer&utm_medium=readme - -[![OpenSSF Best Practices](https://www.bestpractices.dev/projects/7297/badge)](https://www.bestpractices.dev/projects/7297) - -# Changelog -All notable changes to charset-normalizer will be documented in this file. This project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html). -The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/). - -## [3.4.4](https://github.com/Ousret/charset_normalizer/compare/3.4.2...3.4.4) (2025-10-13) - -### Changed -- Bound `setuptools` to a specific constraint `setuptools>=68,<=81`. -- Raised upper bound of mypyc for the optional pre-built extension to v1.18.2 - -### Removed -- `setuptools-scm` as a build dependency. - -### Misc -- Enforced hashes in `dev-requirements.txt` and created `ci-requirements.txt` for security purposes. -- Additional pre-built wheels for riscv64, s390x, and armv7l architectures. -- Restore ` multiple.intoto.jsonl` in GitHub releases in addition to individual attestation file per wheel. - -## [3.4.3](https://github.com/Ousret/charset_normalizer/compare/3.4.2...3.4.3) (2025-08-09) - -### Changed -- mypy(c) is no longer a required dependency at build time if `CHARSET_NORMALIZER_USE_MYPYC` isn't set to `1`. (#595) (#583) -- automatically lower confidence on small bytes samples that are not Unicode in `detect` output legacy function. (#391) - -### Added -- Custom build backend to overcome inability to mark mypy as an optional dependency in the build phase. -- Support for Python 3.14 - -### Fixed -- sdist archive contained useless directories. -- automatically fallback on valid UTF-16 or UTF-32 even if the md says it's noisy. (#633) - -### Misc -- SBOM are automatically published to the relevant GitHub release to comply with regulatory changes. - Each published wheel comes with its SBOM. We choose CycloneDX as the format. -- Prebuilt optimized wheel are no longer distributed by default for CPython 3.7 due to a change in cibuildwheel. - -## [3.4.2](https://github.com/Ousret/charset_normalizer/compare/3.4.1...3.4.2) (2025-05-02) - -### Fixed -- Addressed the DeprecationWarning in our CLI regarding `argparse.FileType` by backporting the target class into the package. (#591) -- Improved the overall reliability of the detector with CJK Ideographs. (#605) (#587) - -### Changed -- Optional mypyc compilation upgraded to version 1.15 for Python >= 3.8 - -## [3.4.1](https://github.com/Ousret/charset_normalizer/compare/3.4.0...3.4.1) (2024-12-24) - -### Changed -- Project metadata are now stored using `pyproject.toml` instead of `setup.cfg` using setuptools as the build backend. -- Enforce annotation delayed loading for a simpler and consistent types in the project. -- Optional mypyc compilation upgraded to version 1.14 for Python >= 3.8 - -### Added -- pre-commit configuration. -- noxfile. - -### Removed -- `build-requirements.txt` as per using `pyproject.toml` native build configuration. -- `bin/integration.py` and `bin/serve.py` in favor of downstream integration test (see noxfile). -- `setup.cfg` in favor of `pyproject.toml` metadata configuration. -- Unused `utils.range_scan` function. - -### Fixed -- Converting content to Unicode bytes may insert `utf_8` instead of preferred `utf-8`. (#572) -- Deprecation warning "'count' is passed as positional argument" when converting to Unicode bytes on Python 3.13+ - -## [3.4.0](https://github.com/Ousret/charset_normalizer/compare/3.3.2...3.4.0) (2024-10-08) - -### Added -- Argument `--no-preemptive` in the CLI to prevent the detector to search for hints. -- Support for Python 3.13 (#512) - -### Fixed -- Relax the TypeError exception thrown when trying to compare a CharsetMatch with anything else than a CharsetMatch. -- Improved the general reliability of the detector based on user feedbacks. (#520) (#509) (#498) (#407) (#537) -- Declared charset in content (preemptive detection) not changed when converting to utf-8 bytes. (#381) - -## [3.3.2](https://github.com/Ousret/charset_normalizer/compare/3.3.1...3.3.2) (2023-10-31) - -### Fixed -- Unintentional memory usage regression when using large payload that match several encoding (#376) -- Regression on some detection case showcased in the documentation (#371) - -### Added -- Noise (md) probe that identify malformed arabic representation due to the presence of letters in isolated form (credit to my wife) - -## [3.3.1](https://github.com/Ousret/charset_normalizer/compare/3.3.0...3.3.1) (2023-10-22) - -### Changed -- Optional mypyc compilation upgraded to version 1.6.1 for Python >= 3.8 -- Improved the general detection reliability based on reports from the community - -## [3.3.0](https://github.com/Ousret/charset_normalizer/compare/3.2.0...3.3.0) (2023-09-30) - -### Added -- Allow to execute the CLI (e.g. normalizer) through `python -m charset_normalizer.cli` or `python -m charset_normalizer` -- Support for 9 forgotten encoding that are supported by Python but unlisted in `encoding.aliases` as they have no alias (#323) - -### Removed -- (internal) Redundant utils.is_ascii function and unused function is_private_use_only -- (internal) charset_normalizer.assets is moved inside charset_normalizer.constant - -### Changed -- (internal) Unicode code blocks in constants are updated using the latest v15.0.0 definition to improve detection -- Optional mypyc compilation upgraded to version 1.5.1 for Python >= 3.8 - -### Fixed -- Unable to properly sort CharsetMatch when both chaos/noise and coherence were close due to an unreachable condition in \_\_lt\_\_ (#350) - -## [3.2.0](https://github.com/Ousret/charset_normalizer/compare/3.1.0...3.2.0) (2023-06-07) - -### Changed -- Typehint for function `from_path` no longer enforce `PathLike` as its first argument -- Minor improvement over the global detection reliability - -### Added -- Introduce function `is_binary` that relies on main capabilities, and optimized to detect binaries -- Propagate `enable_fallback` argument throughout `from_bytes`, `from_path`, and `from_fp` that allow a deeper control over the detection (default True) -- Explicit support for Python 3.12 - -### Fixed -- Edge case detection failure where a file would contain 'very-long' camel cased word (Issue #289) - -## [3.1.0](https://github.com/Ousret/charset_normalizer/compare/3.0.1...3.1.0) (2023-03-06) - -### Added -- Argument `should_rename_legacy` for legacy function `detect` and disregard any new arguments without errors (PR #262) - -### Removed -- Support for Python 3.6 (PR #260) - -### Changed -- Optional speedup provided by mypy/c 1.0.1 - -## [3.0.1](https://github.com/Ousret/charset_normalizer/compare/3.0.0...3.0.1) (2022-11-18) - -### Fixed -- Multi-bytes cutter/chunk generator did not always cut correctly (PR #233) - -### Changed -- Speedup provided by mypy/c 0.990 on Python >= 3.7 - -## [3.0.0](https://github.com/Ousret/charset_normalizer/compare/2.1.1...3.0.0) (2022-10-20) - -### Added -- Extend the capability of explain=True when cp_isolation contains at most two entries (min one), will log in details of the Mess-detector results -- Support for alternative language frequency set in charset_normalizer.assets.FREQUENCIES -- Add parameter `language_threshold` in `from_bytes`, `from_path` and `from_fp` to adjust the minimum expected coherence ratio -- `normalizer --version` now specify if current version provide extra speedup (meaning mypyc compilation whl) - -### Changed -- Build with static metadata using 'build' frontend -- Make the language detection stricter -- Optional: Module `md.py` can be compiled using Mypyc to provide an extra speedup up to 4x faster than v2.1 - -### Fixed -- CLI with opt --normalize fail when using full path for files -- TooManyAccentuatedPlugin induce false positive on the mess detection when too few alpha character have been fed to it -- Sphinx warnings when generating the documentation - -### Removed -- Coherence detector no longer return 'Simple English' instead return 'English' -- Coherence detector no longer return 'Classical Chinese' instead return 'Chinese' -- Breaking: Method `first()` and `best()` from CharsetMatch -- UTF-7 will no longer appear as "detected" without a recognized SIG/mark (is unreliable/conflict with ASCII) -- Breaking: Class aliases CharsetDetector, CharsetDoctor, CharsetNormalizerMatch and CharsetNormalizerMatches -- Breaking: Top-level function `normalize` -- Breaking: Properties `chaos_secondary_pass`, `coherence_non_latin` and `w_counter` from CharsetMatch -- Support for the backport `unicodedata2` - -## [3.0.0rc1](https://github.com/Ousret/charset_normalizer/compare/3.0.0b2...3.0.0rc1) (2022-10-18) - -### Added -- Extend the capability of explain=True when cp_isolation contains at most two entries (min one), will log in details of the Mess-detector results -- Support for alternative language frequency set in charset_normalizer.assets.FREQUENCIES -- Add parameter `language_threshold` in `from_bytes`, `from_path` and `from_fp` to adjust the minimum expected coherence ratio - -### Changed -- Build with static metadata using 'build' frontend -- Make the language detection stricter - -### Fixed -- CLI with opt --normalize fail when using full path for files -- TooManyAccentuatedPlugin induce false positive on the mess detection when too few alpha character have been fed to it - -### Removed -- Coherence detector no longer return 'Simple English' instead return 'English' -- Coherence detector no longer return 'Classical Chinese' instead return 'Chinese' - -## [3.0.0b2](https://github.com/Ousret/charset_normalizer/compare/3.0.0b1...3.0.0b2) (2022-08-21) - -### Added -- `normalizer --version` now specify if current version provide extra speedup (meaning mypyc compilation whl) - -### Removed -- Breaking: Method `first()` and `best()` from CharsetMatch -- UTF-7 will no longer appear as "detected" without a recognized SIG/mark (is unreliable/conflict with ASCII) - -### Fixed -- Sphinx warnings when generating the documentation - -## [3.0.0b1](https://github.com/Ousret/charset_normalizer/compare/2.1.0...3.0.0b1) (2022-08-15) - -### Changed -- Optional: Module `md.py` can be compiled using Mypyc to provide an extra speedup up to 4x faster than v2.1 - -### Removed -- Breaking: Class aliases CharsetDetector, CharsetDoctor, CharsetNormalizerMatch and CharsetNormalizerMatches -- Breaking: Top-level function `normalize` -- Breaking: Properties `chaos_secondary_pass`, `coherence_non_latin` and `w_counter` from CharsetMatch -- Support for the backport `unicodedata2` - -## [2.1.1](https://github.com/Ousret/charset_normalizer/compare/2.1.0...2.1.1) (2022-08-19) - -### Deprecated -- Function `normalize` scheduled for removal in 3.0 - -### Changed -- Removed useless call to decode in fn is_unprintable (#206) - -### Fixed -- Third-party library (i18n xgettext) crashing not recognizing utf_8 (PEP 263) with underscore from [@aleksandernovikov](https://github.com/aleksandernovikov) (#204) - -## [2.1.0](https://github.com/Ousret/charset_normalizer/compare/2.0.12...2.1.0) (2022-06-19) - -### Added -- Output the Unicode table version when running the CLI with `--version` (PR #194) - -### Changed -- Re-use decoded buffer for single byte character sets from [@nijel](https://github.com/nijel) (PR #175) -- Fixing some performance bottlenecks from [@deedy5](https://github.com/deedy5) (PR #183) - -### Fixed -- Workaround potential bug in cpython with Zero Width No-Break Space located in Arabic Presentation Forms-B, Unicode 1.1 not acknowledged as space (PR #175) -- CLI default threshold aligned with the API threshold from [@oleksandr-kuzmenko](https://github.com/oleksandr-kuzmenko) (PR #181) - -### Removed -- Support for Python 3.5 (PR #192) - -### Deprecated -- Use of backport unicodedata from `unicodedata2` as Python is quickly catching up, scheduled for removal in 3.0 (PR #194) - -## [2.0.12](https://github.com/Ousret/charset_normalizer/compare/2.0.11...2.0.12) (2022-02-12) - -### Fixed -- ASCII miss-detection on rare cases (PR #170) - -## [2.0.11](https://github.com/Ousret/charset_normalizer/compare/2.0.10...2.0.11) (2022-01-30) - -### Added -- Explicit support for Python 3.11 (PR #164) - -### Changed -- The logging behavior have been completely reviewed, now using only TRACE and DEBUG levels (PR #163 #165) - -## [2.0.10](https://github.com/Ousret/charset_normalizer/compare/2.0.9...2.0.10) (2022-01-04) - -### Fixed -- Fallback match entries might lead to UnicodeDecodeError for large bytes sequence (PR #154) - -### Changed -- Skipping the language-detection (CD) on ASCII (PR #155) - -## [2.0.9](https://github.com/Ousret/charset_normalizer/compare/2.0.8...2.0.9) (2021-12-03) - -### Changed -- Moderating the logging impact (since 2.0.8) for specific environments (PR #147) - -### Fixed -- Wrong logging level applied when setting kwarg `explain` to True (PR #146) - -## [2.0.8](https://github.com/Ousret/charset_normalizer/compare/2.0.7...2.0.8) (2021-11-24) -### Changed -- Improvement over Vietnamese detection (PR #126) -- MD improvement on trailing data and long foreign (non-pure latin) data (PR #124) -- Efficiency improvements in cd/alphabet_languages from [@adbar](https://github.com/adbar) (PR #122) -- call sum() without an intermediary list following PEP 289 recommendations from [@adbar](https://github.com/adbar) (PR #129) -- Code style as refactored by Sourcery-AI (PR #131) -- Minor adjustment on the MD around european words (PR #133) -- Remove and replace SRTs from assets / tests (PR #139) -- Initialize the library logger with a `NullHandler` by default from [@nmaynes](https://github.com/nmaynes) (PR #135) -- Setting kwarg `explain` to True will add provisionally (bounded to function lifespan) a specific stream handler (PR #135) - -### Fixed -- Fix large (misleading) sequence giving UnicodeDecodeError (PR #137) -- Avoid using too insignificant chunk (PR #137) - -### Added -- Add and expose function `set_logging_handler` to configure a specific StreamHandler from [@nmaynes](https://github.com/nmaynes) (PR #135) -- Add `CHANGELOG.md` entries, format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) (PR #141) - -## [2.0.7](https://github.com/Ousret/charset_normalizer/compare/2.0.6...2.0.7) (2021-10-11) -### Added -- Add support for Kazakh (Cyrillic) language detection (PR #109) - -### Changed -- Further, improve inferring the language from a given single-byte code page (PR #112) -- Vainly trying to leverage PEP263 when PEP3120 is not supported (PR #116) -- Refactoring for potential performance improvements in loops from [@adbar](https://github.com/adbar) (PR #113) -- Various detection improvement (MD+CD) (PR #117) - -### Removed -- Remove redundant logging entry about detected language(s) (PR #115) - -### Fixed -- Fix a minor inconsistency between Python 3.5 and other versions regarding language detection (PR #117 #102) - -## [2.0.6](https://github.com/Ousret/charset_normalizer/compare/2.0.5...2.0.6) (2021-09-18) -### Fixed -- Unforeseen regression with the loss of the backward-compatibility with some older minor of Python 3.5.x (PR #100) -- Fix CLI crash when using --minimal output in certain cases (PR #103) - -### Changed -- Minor improvement to the detection efficiency (less than 1%) (PR #106 #101) - -## [2.0.5](https://github.com/Ousret/charset_normalizer/compare/2.0.4...2.0.5) (2021-09-14) -### Changed -- The project now comply with: flake8, mypy, isort and black to ensure a better overall quality (PR #81) -- The BC-support with v1.x was improved, the old staticmethods are restored (PR #82) -- The Unicode detection is slightly improved (PR #93) -- Add syntax sugar \_\_bool\_\_ for results CharsetMatches list-container (PR #91) - -### Removed -- The project no longer raise warning on tiny content given for detection, will be simply logged as warning instead (PR #92) - -### Fixed -- In some rare case, the chunks extractor could cut in the middle of a multi-byte character and could mislead the mess detection (PR #95) -- Some rare 'space' characters could trip up the UnprintablePlugin/Mess detection (PR #96) -- The MANIFEST.in was not exhaustive (PR #78) - -## [2.0.4](https://github.com/Ousret/charset_normalizer/compare/2.0.3...2.0.4) (2021-07-30) -### Fixed -- The CLI no longer raise an unexpected exception when no encoding has been found (PR #70) -- Fix accessing the 'alphabets' property when the payload contains surrogate characters (PR #68) -- The logger could mislead (explain=True) on detected languages and the impact of one MBCS match (PR #72) -- Submatch factoring could be wrong in rare edge cases (PR #72) -- Multiple files given to the CLI were ignored when publishing results to STDOUT. (After the first path) (PR #72) -- Fix line endings from CRLF to LF for certain project files (PR #67) - -### Changed -- Adjust the MD to lower the sensitivity, thus improving the global detection reliability (PR #69 #76) -- Allow fallback on specified encoding if any (PR #71) - -## [2.0.3](https://github.com/Ousret/charset_normalizer/compare/2.0.2...2.0.3) (2021-07-16) -### Changed -- Part of the detection mechanism has been improved to be less sensitive, resulting in more accurate detection results. Especially ASCII. (PR #63) -- According to the community wishes, the detection will fall back on ASCII or UTF-8 in a last-resort case. (PR #64) - -## [2.0.2](https://github.com/Ousret/charset_normalizer/compare/2.0.1...2.0.2) (2021-07-15) -### Fixed -- Empty/Too small JSON payload miss-detection fixed. Report from [@tseaver](https://github.com/tseaver) (PR #59) - -### Changed -- Don't inject unicodedata2 into sys.modules from [@akx](https://github.com/akx) (PR #57) - -## [2.0.1](https://github.com/Ousret/charset_normalizer/compare/2.0.0...2.0.1) (2021-07-13) -### Fixed -- Make it work where there isn't a filesystem available, dropping assets frequencies.json. Report from [@sethmlarson](https://github.com/sethmlarson). (PR #55) -- Using explain=False permanently disable the verbose output in the current runtime (PR #47) -- One log entry (language target preemptive) was not show in logs when using explain=True (PR #47) -- Fix undesired exception (ValueError) on getitem of instance CharsetMatches (PR #52) - -### Changed -- Public function normalize default args values were not aligned with from_bytes (PR #53) - -### Added -- You may now use charset aliases in cp_isolation and cp_exclusion arguments (PR #47) - -## [2.0.0](https://github.com/Ousret/charset_normalizer/compare/1.4.1...2.0.0) (2021-07-02) -### Changed -- 4x to 5 times faster than the previous 1.4.0 release. At least 2x faster than Chardet. -- Accent has been made on UTF-8 detection, should perform rather instantaneous. -- The backward compatibility with Chardet has been greatly improved. The legacy detect function returns an identical charset name whenever possible. -- The detection mechanism has been slightly improved, now Turkish content is detected correctly (most of the time) -- The program has been rewritten to ease the readability and maintainability. (+Using static typing)+ -- utf_7 detection has been reinstated. - -### Removed -- This package no longer require anything when used with Python 3.5 (Dropped cached_property) -- Removed support for these languages: Catalan, Esperanto, Kazakh, Baque, Volapük, Azeri, Galician, Nynorsk, Macedonian, and Serbocroatian. -- The exception hook on UnicodeDecodeError has been removed. - -### Deprecated -- Methods coherence_non_latin, w_counter, chaos_secondary_pass of the class CharsetMatch are now deprecated and scheduled for removal in v3.0 - -### Fixed -- The CLI output used the relative path of the file(s). Should be absolute. - -## [1.4.1](https://github.com/Ousret/charset_normalizer/compare/1.4.0...1.4.1) (2021-05-28) -### Fixed -- Logger configuration/usage no longer conflict with others (PR #44) - -## [1.4.0](https://github.com/Ousret/charset_normalizer/compare/1.3.9...1.4.0) (2021-05-21) -### Removed -- Using standard logging instead of using the package loguru. -- Dropping nose test framework in favor of the maintained pytest. -- Choose to not use dragonmapper package to help with gibberish Chinese/CJK text. -- Require cached_property only for Python 3.5 due to constraint. Dropping for every other interpreter version. -- Stop support for UTF-7 that does not contain a SIG. -- Dropping PrettyTable, replaced with pure JSON output in CLI. - -### Fixed -- BOM marker in a CharsetNormalizerMatch instance could be False in rare cases even if obviously present. Due to the sub-match factoring process. -- Not searching properly for the BOM when trying utf32/16 parent codec. - -### Changed -- Improving the package final size by compressing frequencies.json. -- Huge improvement over the larges payload. - -### Added -- CLI now produces JSON consumable output. -- Return ASCII if given sequences fit. Given reasonable confidence. - -## [1.3.9](https://github.com/Ousret/charset_normalizer/compare/1.3.8...1.3.9) (2021-05-13) - -### Fixed -- In some very rare cases, you may end up getting encode/decode errors due to a bad bytes payload (PR #40) - -## [1.3.8](https://github.com/Ousret/charset_normalizer/compare/1.3.7...1.3.8) (2021-05-12) - -### Fixed -- Empty given payload for detection may cause an exception if trying to access the `alphabets` property. (PR #39) - -## [1.3.7](https://github.com/Ousret/charset_normalizer/compare/1.3.6...1.3.7) (2021-05-12) - -### Fixed -- The legacy detect function should return UTF-8-SIG if sig is present in the payload. (PR #38) - -## [1.3.6](https://github.com/Ousret/charset_normalizer/compare/1.3.5...1.3.6) (2021-02-09) - -### Changed -- Amend the previous release to allow prettytable 2.0 (PR #35) - -## [1.3.5](https://github.com/Ousret/charset_normalizer/compare/1.3.4...1.3.5) (2021-02-08) - -### Fixed -- Fix error while using the package with a python pre-release interpreter (PR #33) - -### Changed -- Dependencies refactoring, constraints revised. - -### Added -- Add python 3.9 and 3.10 to the supported interpreters - -MIT License - -Copyright (c) 2025 TAHRI Ahmed R. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/RECORD b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/RECORD deleted file mode 100644 index 64a4aeb4..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/RECORD +++ /dev/null @@ -1,33 +0,0 @@ -../../bin/normalizer,sha256=bbgUytMy8nRnSBN4Ir8hSApNQf-X4hQeYscx_PGSyhs,239 -charset_normalizer-3.4.4.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4 -charset_normalizer-3.4.4.dist-info/METADATA,sha256=jVuUFBti8dav19YLvWissTihVdF2ozUY4KKMw7jdkBQ,37303 -charset_normalizer-3.4.4.dist-info/RECORD,, -charset_normalizer-3.4.4.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91 -charset_normalizer-3.4.4.dist-info/entry_points.txt,sha256=ADSTKrkXZ3hhdOVFi6DcUEHQRS0xfxDIE_pEz4wLIXA,65 -charset_normalizer-3.4.4.dist-info/licenses/LICENSE,sha256=bQ1Bv-FwrGx9wkjJpj4lTQ-0WmDVCoJX0K-SxuJJuIc,1071 -charset_normalizer-3.4.4.dist-info/top_level.txt,sha256=7ASyzePr8_xuZWJsnqJjIBtyV8vhEo0wBCv1MPRRi3Q,19 -charset_normalizer/__init__.py,sha256=OKRxRv2Zhnqk00tqkN0c1BtJjm165fWXLydE52IKuHc,1590 -charset_normalizer/__main__.py,sha256=yzYxMR-IhKRHYwcSlavEv8oGdwxsR89mr2X09qXGdps,109 -charset_normalizer/__pycache__/__init__.cpython-37.pyc,, -charset_normalizer/__pycache__/__main__.cpython-37.pyc,, -charset_normalizer/__pycache__/api.cpython-37.pyc,, -charset_normalizer/__pycache__/cd.cpython-37.pyc,, -charset_normalizer/__pycache__/constant.cpython-37.pyc,, -charset_normalizer/__pycache__/legacy.cpython-37.pyc,, -charset_normalizer/__pycache__/md.cpython-37.pyc,, -charset_normalizer/__pycache__/models.cpython-37.pyc,, -charset_normalizer/__pycache__/utils.cpython-37.pyc,, -charset_normalizer/__pycache__/version.cpython-37.pyc,, -charset_normalizer/api.py,sha256=V07i8aVeCD8T2fSia3C-fn0i9t8qQguEBhsqszg32Ns,22668 -charset_normalizer/cd.py,sha256=WKTo1HDb-H9HfCDc3Bfwq5jzS25Ziy9SE2a74SgTq88,12522 -charset_normalizer/cli/__init__.py,sha256=D8I86lFk2-py45JvqxniTirSj_sFyE6sjaY_0-G1shc,136 -charset_normalizer/cli/__main__.py,sha256=dMaXG6IJXRvqq8z2tig7Qb83-BpWTln55ooiku5_uvg,12646 -charset_normalizer/cli/__pycache__/__init__.cpython-37.pyc,, -charset_normalizer/cli/__pycache__/__main__.cpython-37.pyc,, -charset_normalizer/constant.py,sha256=7UVY4ldYhmQMHUdgQ_sgZmzcQ0xxYxpBunqSZ-XJZ8U,42713 -charset_normalizer/legacy.py,sha256=sYBzSpzsRrg_wF4LP536pG64BItw7Tqtc3SMQAHvFLM,2731 -charset_normalizer/md.py,sha256=-_oN3h3_X99nkFfqamD3yu45DC_wfk5odH0Tr_CQiXs,20145 -charset_normalizer/models.py,sha256=lKXhOnIPtiakbK3i__J9wpOfzx3JDTKj7Dn3Rg0VaRI,12394 -charset_normalizer/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 -charset_normalizer/utils.py,sha256=sTejPgrdlNsKNucZfJCxJ95lMTLA0ShHLLE3n5wpT9Q,12170 -charset_normalizer/version.py,sha256=nKE4qBNk5WA4LIJ_yIH_aSDfvtsyizkWMg-PUG-UZVk,115 diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/WHEEL b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/WHEEL deleted file mode 100644 index e7fa31b6..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/WHEEL +++ /dev/null @@ -1,5 +0,0 @@ -Wheel-Version: 1.0 -Generator: setuptools (80.9.0) -Root-Is-Purelib: true -Tag: py3-none-any - diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/entry_points.txt b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/entry_points.txt deleted file mode 100644 index 65619e73..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/entry_points.txt +++ /dev/null @@ -1,2 +0,0 @@ -[console_scripts] -normalizer = charset_normalizer.cli:cli_detect diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/licenses/LICENSE b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/licenses/LICENSE deleted file mode 100644 index 9725772c..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/licenses/LICENSE +++ /dev/null @@ -1,21 +0,0 @@ -MIT License - -Copyright (c) 2025 TAHRI Ahmed R. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/top_level.txt b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/top_level.txt deleted file mode 100644 index 66958f0a..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer-3.4.4.dist-info/top_level.txt +++ /dev/null @@ -1 +0,0 @@ -charset_normalizer diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/__init__.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/__init__.py deleted file mode 100644 index 0d3a3799..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/__init__.py +++ /dev/null @@ -1,48 +0,0 @@ -""" -Charset-Normalizer -~~~~~~~~~~~~~~ -The Real First Universal Charset Detector. -A library that helps you read text from an unknown charset encoding. -Motivated by chardet, This package is trying to resolve the issue by taking a new approach. -All IANA character set names for which the Python core library provides codecs are supported. - -Basic usage: - >>> from charset_normalizer import from_bytes - >>> results = from_bytes('Bсеки човек има право на образование. Oбразованието!'.encode('utf_8')) - >>> best_guess = results.best() - >>> str(best_guess) - 'Bсеки човек има право на образование. Oбразованието!' - -Others methods and usages are available - see the full documentation -at . -:copyright: (c) 2021 by Ahmed TAHRI -:license: MIT, see LICENSE for more details. -""" - -from __future__ import annotations - -import logging - -from .api import from_bytes, from_fp, from_path, is_binary -from .legacy import detect -from .models import CharsetMatch, CharsetMatches -from .utils import set_logging_handler -from .version import VERSION, __version__ - -__all__ = ( - "from_fp", - "from_path", - "from_bytes", - "is_binary", - "detect", - "CharsetMatch", - "CharsetMatches", - "__version__", - "VERSION", - "set_logging_handler", -) - -# Attach a NullHandler to the top level logger by default -# https://docs.python.org/3.3/howto/logging.html#configuring-logging-for-a-library - -logging.getLogger("charset_normalizer").addHandler(logging.NullHandler()) diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/__main__.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/__main__.py deleted file mode 100644 index e0e76f7b..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/__main__.py +++ /dev/null @@ -1,6 +0,0 @@ -from __future__ import annotations - -from .cli import cli_detect - -if __name__ == "__main__": - cli_detect() diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/api.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/api.py deleted file mode 100644 index ebd96390..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/api.py +++ /dev/null @@ -1,669 +0,0 @@ -from __future__ import annotations - -import logging -from os import PathLike -from typing import BinaryIO - -from .cd import ( - coherence_ratio, - encoding_languages, - mb_encoding_languages, - merge_coherence_ratios, -) -from .constant import IANA_SUPPORTED, TOO_BIG_SEQUENCE, TOO_SMALL_SEQUENCE, TRACE -from .md import mess_ratio -from .models import CharsetMatch, CharsetMatches -from .utils import ( - any_specified_encoding, - cut_sequence_chunks, - iana_name, - identify_sig_or_bom, - is_cp_similar, - is_multi_byte_encoding, - should_strip_sig_or_bom, -) - -logger = logging.getLogger("charset_normalizer") -explain_handler = logging.StreamHandler() -explain_handler.setFormatter( - logging.Formatter("%(asctime)s | %(levelname)s | %(message)s") -) - - -def from_bytes( - sequences: bytes | bytearray, - steps: int = 5, - chunk_size: int = 512, - threshold: float = 0.2, - cp_isolation: list[str] | None = None, - cp_exclusion: list[str] | None = None, - preemptive_behaviour: bool = True, - explain: bool = False, - language_threshold: float = 0.1, - enable_fallback: bool = True, -) -> CharsetMatches: - """ - Given a raw bytes sequence, return the best possibles charset usable to render str objects. - If there is no results, it is a strong indicator that the source is binary/not text. - By default, the process will extract 5 blocks of 512o each to assess the mess and coherence of a given sequence. - And will give up a particular code page after 20% of measured mess. Those criteria are customizable at will. - - The preemptive behavior DOES NOT replace the traditional detection workflow, it prioritize a particular code page - but never take it for granted. Can improve the performance. - - You may want to focus your attention to some code page or/and not others, use cp_isolation and cp_exclusion for that - purpose. - - This function will strip the SIG in the payload/sequence every time except on UTF-16, UTF-32. - By default the library does not setup any handler other than the NullHandler, if you choose to set the 'explain' - toggle to True it will alter the logger configuration to add a StreamHandler that is suitable for debugging. - Custom logging format and handler can be set manually. - """ - - if not isinstance(sequences, (bytearray, bytes)): - raise TypeError( - "Expected object of type bytes or bytearray, got: {}".format( - type(sequences) - ) - ) - - if explain: - previous_logger_level: int = logger.level - logger.addHandler(explain_handler) - logger.setLevel(TRACE) - - length: int = len(sequences) - - if length == 0: - logger.debug("Encoding detection on empty bytes, assuming utf_8 intention.") - if explain: # Defensive: ensure exit path clean handler - logger.removeHandler(explain_handler) - logger.setLevel(previous_logger_level or logging.WARNING) - return CharsetMatches([CharsetMatch(sequences, "utf_8", 0.0, False, [], "")]) - - if cp_isolation is not None: - logger.log( - TRACE, - "cp_isolation is set. use this flag for debugging purpose. " - "limited list of encoding allowed : %s.", - ", ".join(cp_isolation), - ) - cp_isolation = [iana_name(cp, False) for cp in cp_isolation] - else: - cp_isolation = [] - - if cp_exclusion is not None: - logger.log( - TRACE, - "cp_exclusion is set. use this flag for debugging purpose. " - "limited list of encoding excluded : %s.", - ", ".join(cp_exclusion), - ) - cp_exclusion = [iana_name(cp, False) for cp in cp_exclusion] - else: - cp_exclusion = [] - - if length <= (chunk_size * steps): - logger.log( - TRACE, - "override steps (%i) and chunk_size (%i) as content does not fit (%i byte(s) given) parameters.", - steps, - chunk_size, - length, - ) - steps = 1 - chunk_size = length - - if steps > 1 and length / steps < chunk_size: - chunk_size = int(length / steps) - - is_too_small_sequence: bool = len(sequences) < TOO_SMALL_SEQUENCE - is_too_large_sequence: bool = len(sequences) >= TOO_BIG_SEQUENCE - - if is_too_small_sequence: - logger.log( - TRACE, - "Trying to detect encoding from a tiny portion of ({}) byte(s).".format( - length - ), - ) - elif is_too_large_sequence: - logger.log( - TRACE, - "Using lazy str decoding because the payload is quite large, ({}) byte(s).".format( - length - ), - ) - - prioritized_encodings: list[str] = [] - - specified_encoding: str | None = ( - any_specified_encoding(sequences) if preemptive_behaviour else None - ) - - if specified_encoding is not None: - prioritized_encodings.append(specified_encoding) - logger.log( - TRACE, - "Detected declarative mark in sequence. Priority +1 given for %s.", - specified_encoding, - ) - - tested: set[str] = set() - tested_but_hard_failure: list[str] = [] - tested_but_soft_failure: list[str] = [] - - fallback_ascii: CharsetMatch | None = None - fallback_u8: CharsetMatch | None = None - fallback_specified: CharsetMatch | None = None - - results: CharsetMatches = CharsetMatches() - - early_stop_results: CharsetMatches = CharsetMatches() - - sig_encoding, sig_payload = identify_sig_or_bom(sequences) - - if sig_encoding is not None: - prioritized_encodings.append(sig_encoding) - logger.log( - TRACE, - "Detected a SIG or BOM mark on first %i byte(s). Priority +1 given for %s.", - len(sig_payload), - sig_encoding, - ) - - prioritized_encodings.append("ascii") - - if "utf_8" not in prioritized_encodings: - prioritized_encodings.append("utf_8") - - for encoding_iana in prioritized_encodings + IANA_SUPPORTED: - if cp_isolation and encoding_iana not in cp_isolation: - continue - - if cp_exclusion and encoding_iana in cp_exclusion: - continue - - if encoding_iana in tested: - continue - - tested.add(encoding_iana) - - decoded_payload: str | None = None - bom_or_sig_available: bool = sig_encoding == encoding_iana - strip_sig_or_bom: bool = bom_or_sig_available and should_strip_sig_or_bom( - encoding_iana - ) - - if encoding_iana in {"utf_16", "utf_32"} and not bom_or_sig_available: - logger.log( - TRACE, - "Encoding %s won't be tested as-is because it require a BOM. Will try some sub-encoder LE/BE.", - encoding_iana, - ) - continue - if encoding_iana in {"utf_7"} and not bom_or_sig_available: - logger.log( - TRACE, - "Encoding %s won't be tested as-is because detection is unreliable without BOM/SIG.", - encoding_iana, - ) - continue - - try: - is_multi_byte_decoder: bool = is_multi_byte_encoding(encoding_iana) - except (ModuleNotFoundError, ImportError): - logger.log( - TRACE, - "Encoding %s does not provide an IncrementalDecoder", - encoding_iana, - ) - continue - - try: - if is_too_large_sequence and is_multi_byte_decoder is False: - str( - ( - sequences[: int(50e4)] - if strip_sig_or_bom is False - else sequences[len(sig_payload) : int(50e4)] - ), - encoding=encoding_iana, - ) - else: - decoded_payload = str( - ( - sequences - if strip_sig_or_bom is False - else sequences[len(sig_payload) :] - ), - encoding=encoding_iana, - ) - except (UnicodeDecodeError, LookupError) as e: - if not isinstance(e, LookupError): - logger.log( - TRACE, - "Code page %s does not fit given bytes sequence at ALL. %s", - encoding_iana, - str(e), - ) - tested_but_hard_failure.append(encoding_iana) - continue - - similar_soft_failure_test: bool = False - - for encoding_soft_failed in tested_but_soft_failure: - if is_cp_similar(encoding_iana, encoding_soft_failed): - similar_soft_failure_test = True - break - - if similar_soft_failure_test: - logger.log( - TRACE, - "%s is deemed too similar to code page %s and was consider unsuited already. Continuing!", - encoding_iana, - encoding_soft_failed, - ) - continue - - r_ = range( - 0 if not bom_or_sig_available else len(sig_payload), - length, - int(length / steps), - ) - - multi_byte_bonus: bool = ( - is_multi_byte_decoder - and decoded_payload is not None - and len(decoded_payload) < length - ) - - if multi_byte_bonus: - logger.log( - TRACE, - "Code page %s is a multi byte encoding table and it appear that at least one character " - "was encoded using n-bytes.", - encoding_iana, - ) - - max_chunk_gave_up: int = int(len(r_) / 4) - - max_chunk_gave_up = max(max_chunk_gave_up, 2) - early_stop_count: int = 0 - lazy_str_hard_failure = False - - md_chunks: list[str] = [] - md_ratios = [] - - try: - for chunk in cut_sequence_chunks( - sequences, - encoding_iana, - r_, - chunk_size, - bom_or_sig_available, - strip_sig_or_bom, - sig_payload, - is_multi_byte_decoder, - decoded_payload, - ): - md_chunks.append(chunk) - - md_ratios.append( - mess_ratio( - chunk, - threshold, - explain is True and 1 <= len(cp_isolation) <= 2, - ) - ) - - if md_ratios[-1] >= threshold: - early_stop_count += 1 - - if (early_stop_count >= max_chunk_gave_up) or ( - bom_or_sig_available and strip_sig_or_bom is False - ): - break - except ( - UnicodeDecodeError - ) as e: # Lazy str loading may have missed something there - logger.log( - TRACE, - "LazyStr Loading: After MD chunk decode, code page %s does not fit given bytes sequence at ALL. %s", - encoding_iana, - str(e), - ) - early_stop_count = max_chunk_gave_up - lazy_str_hard_failure = True - - # We might want to check the sequence again with the whole content - # Only if initial MD tests passes - if ( - not lazy_str_hard_failure - and is_too_large_sequence - and not is_multi_byte_decoder - ): - try: - sequences[int(50e3) :].decode(encoding_iana, errors="strict") - except UnicodeDecodeError as e: - logger.log( - TRACE, - "LazyStr Loading: After final lookup, code page %s does not fit given bytes sequence at ALL. %s", - encoding_iana, - str(e), - ) - tested_but_hard_failure.append(encoding_iana) - continue - - mean_mess_ratio: float = sum(md_ratios) / len(md_ratios) if md_ratios else 0.0 - if mean_mess_ratio >= threshold or early_stop_count >= max_chunk_gave_up: - tested_but_soft_failure.append(encoding_iana) - logger.log( - TRACE, - "%s was excluded because of initial chaos probing. Gave up %i time(s). " - "Computed mean chaos is %f %%.", - encoding_iana, - early_stop_count, - round(mean_mess_ratio * 100, ndigits=3), - ) - # Preparing those fallbacks in case we got nothing. - if ( - enable_fallback - and encoding_iana - in ["ascii", "utf_8", specified_encoding, "utf_16", "utf_32"] - and not lazy_str_hard_failure - ): - fallback_entry = CharsetMatch( - sequences, - encoding_iana, - threshold, - bom_or_sig_available, - [], - decoded_payload, - preemptive_declaration=specified_encoding, - ) - if encoding_iana == specified_encoding: - fallback_specified = fallback_entry - elif encoding_iana == "ascii": - fallback_ascii = fallback_entry - else: - fallback_u8 = fallback_entry - continue - - logger.log( - TRACE, - "%s passed initial chaos probing. Mean measured chaos is %f %%", - encoding_iana, - round(mean_mess_ratio * 100, ndigits=3), - ) - - if not is_multi_byte_decoder: - target_languages: list[str] = encoding_languages(encoding_iana) - else: - target_languages = mb_encoding_languages(encoding_iana) - - if target_languages: - logger.log( - TRACE, - "{} should target any language(s) of {}".format( - encoding_iana, str(target_languages) - ), - ) - - cd_ratios = [] - - # We shall skip the CD when its about ASCII - # Most of the time its not relevant to run "language-detection" on it. - if encoding_iana != "ascii": - for chunk in md_chunks: - chunk_languages = coherence_ratio( - chunk, - language_threshold, - ",".join(target_languages) if target_languages else None, - ) - - cd_ratios.append(chunk_languages) - - cd_ratios_merged = merge_coherence_ratios(cd_ratios) - - if cd_ratios_merged: - logger.log( - TRACE, - "We detected language {} using {}".format( - cd_ratios_merged, encoding_iana - ), - ) - - current_match = CharsetMatch( - sequences, - encoding_iana, - mean_mess_ratio, - bom_or_sig_available, - cd_ratios_merged, - ( - decoded_payload - if ( - is_too_large_sequence is False - or encoding_iana in [specified_encoding, "ascii", "utf_8"] - ) - else None - ), - preemptive_declaration=specified_encoding, - ) - - results.append(current_match) - - if ( - encoding_iana in [specified_encoding, "ascii", "utf_8"] - and mean_mess_ratio < 0.1 - ): - # If md says nothing to worry about, then... stop immediately! - if mean_mess_ratio == 0.0: - logger.debug( - "Encoding detection: %s is most likely the one.", - current_match.encoding, - ) - if explain: # Defensive: ensure exit path clean handler - logger.removeHandler(explain_handler) - logger.setLevel(previous_logger_level) - return CharsetMatches([current_match]) - - early_stop_results.append(current_match) - - if ( - len(early_stop_results) - and (specified_encoding is None or specified_encoding in tested) - and "ascii" in tested - and "utf_8" in tested - ): - probable_result: CharsetMatch = early_stop_results.best() # type: ignore[assignment] - logger.debug( - "Encoding detection: %s is most likely the one.", - probable_result.encoding, - ) - if explain: # Defensive: ensure exit path clean handler - logger.removeHandler(explain_handler) - logger.setLevel(previous_logger_level) - - return CharsetMatches([probable_result]) - - if encoding_iana == sig_encoding: - logger.debug( - "Encoding detection: %s is most likely the one as we detected a BOM or SIG within " - "the beginning of the sequence.", - encoding_iana, - ) - if explain: # Defensive: ensure exit path clean handler - logger.removeHandler(explain_handler) - logger.setLevel(previous_logger_level) - return CharsetMatches([results[encoding_iana]]) - - if len(results) == 0: - if fallback_u8 or fallback_ascii or fallback_specified: - logger.log( - TRACE, - "Nothing got out of the detection process. Using ASCII/UTF-8/Specified fallback.", - ) - - if fallback_specified: - logger.debug( - "Encoding detection: %s will be used as a fallback match", - fallback_specified.encoding, - ) - results.append(fallback_specified) - elif ( - (fallback_u8 and fallback_ascii is None) - or ( - fallback_u8 - and fallback_ascii - and fallback_u8.fingerprint != fallback_ascii.fingerprint - ) - or (fallback_u8 is not None) - ): - logger.debug("Encoding detection: utf_8 will be used as a fallback match") - results.append(fallback_u8) - elif fallback_ascii: - logger.debug("Encoding detection: ascii will be used as a fallback match") - results.append(fallback_ascii) - - if results: - logger.debug( - "Encoding detection: Found %s as plausible (best-candidate) for content. With %i alternatives.", - results.best().encoding, # type: ignore - len(results) - 1, - ) - else: - logger.debug("Encoding detection: Unable to determine any suitable charset.") - - if explain: - logger.removeHandler(explain_handler) - logger.setLevel(previous_logger_level) - - return results - - -def from_fp( - fp: BinaryIO, - steps: int = 5, - chunk_size: int = 512, - threshold: float = 0.20, - cp_isolation: list[str] | None = None, - cp_exclusion: list[str] | None = None, - preemptive_behaviour: bool = True, - explain: bool = False, - language_threshold: float = 0.1, - enable_fallback: bool = True, -) -> CharsetMatches: - """ - Same thing than the function from_bytes but using a file pointer that is already ready. - Will not close the file pointer. - """ - return from_bytes( - fp.read(), - steps, - chunk_size, - threshold, - cp_isolation, - cp_exclusion, - preemptive_behaviour, - explain, - language_threshold, - enable_fallback, - ) - - -def from_path( - path: str | bytes | PathLike, # type: ignore[type-arg] - steps: int = 5, - chunk_size: int = 512, - threshold: float = 0.20, - cp_isolation: list[str] | None = None, - cp_exclusion: list[str] | None = None, - preemptive_behaviour: bool = True, - explain: bool = False, - language_threshold: float = 0.1, - enable_fallback: bool = True, -) -> CharsetMatches: - """ - Same thing than the function from_bytes but with one extra step. Opening and reading given file path in binary mode. - Can raise IOError. - """ - with open(path, "rb") as fp: - return from_fp( - fp, - steps, - chunk_size, - threshold, - cp_isolation, - cp_exclusion, - preemptive_behaviour, - explain, - language_threshold, - enable_fallback, - ) - - -def is_binary( - fp_or_path_or_payload: PathLike | str | BinaryIO | bytes, # type: ignore[type-arg] - steps: int = 5, - chunk_size: int = 512, - threshold: float = 0.20, - cp_isolation: list[str] | None = None, - cp_exclusion: list[str] | None = None, - preemptive_behaviour: bool = True, - explain: bool = False, - language_threshold: float = 0.1, - enable_fallback: bool = False, -) -> bool: - """ - Detect if the given input (file, bytes, or path) points to a binary file. aka. not a string. - Based on the same main heuristic algorithms and default kwargs at the sole exception that fallbacks match - are disabled to be stricter around ASCII-compatible but unlikely to be a string. - """ - if isinstance(fp_or_path_or_payload, (str, PathLike)): - guesses = from_path( - fp_or_path_or_payload, - steps=steps, - chunk_size=chunk_size, - threshold=threshold, - cp_isolation=cp_isolation, - cp_exclusion=cp_exclusion, - preemptive_behaviour=preemptive_behaviour, - explain=explain, - language_threshold=language_threshold, - enable_fallback=enable_fallback, - ) - elif isinstance( - fp_or_path_or_payload, - ( - bytes, - bytearray, - ), - ): - guesses = from_bytes( - fp_or_path_or_payload, - steps=steps, - chunk_size=chunk_size, - threshold=threshold, - cp_isolation=cp_isolation, - cp_exclusion=cp_exclusion, - preemptive_behaviour=preemptive_behaviour, - explain=explain, - language_threshold=language_threshold, - enable_fallback=enable_fallback, - ) - else: - guesses = from_fp( - fp_or_path_or_payload, - steps=steps, - chunk_size=chunk_size, - threshold=threshold, - cp_isolation=cp_isolation, - cp_exclusion=cp_exclusion, - preemptive_behaviour=preemptive_behaviour, - explain=explain, - language_threshold=language_threshold, - enable_fallback=enable_fallback, - ) - - return not guesses diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cd.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cd.py deleted file mode 100644 index 71a3ed51..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cd.py +++ /dev/null @@ -1,395 +0,0 @@ -from __future__ import annotations - -import importlib -from codecs import IncrementalDecoder -from collections import Counter -from functools import lru_cache -from typing import Counter as TypeCounter - -from .constant import ( - FREQUENCIES, - KO_NAMES, - LANGUAGE_SUPPORTED_COUNT, - TOO_SMALL_SEQUENCE, - ZH_NAMES, -) -from .md import is_suspiciously_successive_range -from .models import CoherenceMatches -from .utils import ( - is_accentuated, - is_latin, - is_multi_byte_encoding, - is_unicode_range_secondary, - unicode_range, -) - - -def encoding_unicode_range(iana_name: str) -> list[str]: - """ - Return associated unicode ranges in a single byte code page. - """ - if is_multi_byte_encoding(iana_name): - raise OSError("Function not supported on multi-byte code page") - - decoder = importlib.import_module(f"encodings.{iana_name}").IncrementalDecoder - - p: IncrementalDecoder = decoder(errors="ignore") - seen_ranges: dict[str, int] = {} - character_count: int = 0 - - for i in range(0x40, 0xFF): - chunk: str = p.decode(bytes([i])) - - if chunk: - character_range: str | None = unicode_range(chunk) - - if character_range is None: - continue - - if is_unicode_range_secondary(character_range) is False: - if character_range not in seen_ranges: - seen_ranges[character_range] = 0 - seen_ranges[character_range] += 1 - character_count += 1 - - return sorted( - [ - character_range - for character_range in seen_ranges - if seen_ranges[character_range] / character_count >= 0.15 - ] - ) - - -def unicode_range_languages(primary_range: str) -> list[str]: - """ - Return inferred languages used with a unicode range. - """ - languages: list[str] = [] - - for language, characters in FREQUENCIES.items(): - for character in characters: - if unicode_range(character) == primary_range: - languages.append(language) - break - - return languages - - -@lru_cache() -def encoding_languages(iana_name: str) -> list[str]: - """ - Single-byte encoding language association. Some code page are heavily linked to particular language(s). - This function does the correspondence. - """ - unicode_ranges: list[str] = encoding_unicode_range(iana_name) - primary_range: str | None = None - - for specified_range in unicode_ranges: - if "Latin" not in specified_range: - primary_range = specified_range - break - - if primary_range is None: - return ["Latin Based"] - - return unicode_range_languages(primary_range) - - -@lru_cache() -def mb_encoding_languages(iana_name: str) -> list[str]: - """ - Multi-byte encoding language association. Some code page are heavily linked to particular language(s). - This function does the correspondence. - """ - if ( - iana_name.startswith("shift_") - or iana_name.startswith("iso2022_jp") - or iana_name.startswith("euc_j") - or iana_name == "cp932" - ): - return ["Japanese"] - if iana_name.startswith("gb") or iana_name in ZH_NAMES: - return ["Chinese"] - if iana_name.startswith("iso2022_kr") or iana_name in KO_NAMES: - return ["Korean"] - - return [] - - -@lru_cache(maxsize=LANGUAGE_SUPPORTED_COUNT) -def get_target_features(language: str) -> tuple[bool, bool]: - """ - Determine main aspects from a supported language if it contains accents and if is pure Latin. - """ - target_have_accents: bool = False - target_pure_latin: bool = True - - for character in FREQUENCIES[language]: - if not target_have_accents and is_accentuated(character): - target_have_accents = True - if target_pure_latin and is_latin(character) is False: - target_pure_latin = False - - return target_have_accents, target_pure_latin - - -def alphabet_languages( - characters: list[str], ignore_non_latin: bool = False -) -> list[str]: - """ - Return associated languages associated to given characters. - """ - languages: list[tuple[str, float]] = [] - - source_have_accents = any(is_accentuated(character) for character in characters) - - for language, language_characters in FREQUENCIES.items(): - target_have_accents, target_pure_latin = get_target_features(language) - - if ignore_non_latin and target_pure_latin is False: - continue - - if target_have_accents is False and source_have_accents: - continue - - character_count: int = len(language_characters) - - character_match_count: int = len( - [c for c in language_characters if c in characters] - ) - - ratio: float = character_match_count / character_count - - if ratio >= 0.2: - languages.append((language, ratio)) - - languages = sorted(languages, key=lambda x: x[1], reverse=True) - - return [compatible_language[0] for compatible_language in languages] - - -def characters_popularity_compare( - language: str, ordered_characters: list[str] -) -> float: - """ - Determine if a ordered characters list (by occurrence from most appearance to rarest) match a particular language. - The result is a ratio between 0. (absolutely no correspondence) and 1. (near perfect fit). - Beware that is function is not strict on the match in order to ease the detection. (Meaning close match is 1.) - """ - if language not in FREQUENCIES: - raise ValueError(f"{language} not available") - - character_approved_count: int = 0 - FREQUENCIES_language_set = set(FREQUENCIES[language]) - - ordered_characters_count: int = len(ordered_characters) - target_language_characters_count: int = len(FREQUENCIES[language]) - - large_alphabet: bool = target_language_characters_count > 26 - - for character, character_rank in zip( - ordered_characters, range(0, ordered_characters_count) - ): - if character not in FREQUENCIES_language_set: - continue - - character_rank_in_language: int = FREQUENCIES[language].index(character) - expected_projection_ratio: float = ( - target_language_characters_count / ordered_characters_count - ) - character_rank_projection: int = int(character_rank * expected_projection_ratio) - - if ( - large_alphabet is False - and abs(character_rank_projection - character_rank_in_language) > 4 - ): - continue - - if ( - large_alphabet is True - and abs(character_rank_projection - character_rank_in_language) - < target_language_characters_count / 3 - ): - character_approved_count += 1 - continue - - characters_before_source: list[str] = FREQUENCIES[language][ - 0:character_rank_in_language - ] - characters_after_source: list[str] = FREQUENCIES[language][ - character_rank_in_language: - ] - characters_before: list[str] = ordered_characters[0:character_rank] - characters_after: list[str] = ordered_characters[character_rank:] - - before_match_count: int = len( - set(characters_before) & set(characters_before_source) - ) - - after_match_count: int = len( - set(characters_after) & set(characters_after_source) - ) - - if len(characters_before_source) == 0 and before_match_count <= 4: - character_approved_count += 1 - continue - - if len(characters_after_source) == 0 and after_match_count <= 4: - character_approved_count += 1 - continue - - if ( - before_match_count / len(characters_before_source) >= 0.4 - or after_match_count / len(characters_after_source) >= 0.4 - ): - character_approved_count += 1 - continue - - return character_approved_count / len(ordered_characters) - - -def alpha_unicode_split(decoded_sequence: str) -> list[str]: - """ - Given a decoded text sequence, return a list of str. Unicode range / alphabet separation. - Ex. a text containing English/Latin with a bit a Hebrew will return two items in the resulting list; - One containing the latin letters and the other hebrew. - """ - layers: dict[str, str] = {} - - for character in decoded_sequence: - if character.isalpha() is False: - continue - - character_range: str | None = unicode_range(character) - - if character_range is None: - continue - - layer_target_range: str | None = None - - for discovered_range in layers: - if ( - is_suspiciously_successive_range(discovered_range, character_range) - is False - ): - layer_target_range = discovered_range - break - - if layer_target_range is None: - layer_target_range = character_range - - if layer_target_range not in layers: - layers[layer_target_range] = character.lower() - continue - - layers[layer_target_range] += character.lower() - - return list(layers.values()) - - -def merge_coherence_ratios(results: list[CoherenceMatches]) -> CoherenceMatches: - """ - This function merge results previously given by the function coherence_ratio. - The return type is the same as coherence_ratio. - """ - per_language_ratios: dict[str, list[float]] = {} - for result in results: - for sub_result in result: - language, ratio = sub_result - if language not in per_language_ratios: - per_language_ratios[language] = [ratio] - continue - per_language_ratios[language].append(ratio) - - merge = [ - ( - language, - round( - sum(per_language_ratios[language]) / len(per_language_ratios[language]), - 4, - ), - ) - for language in per_language_ratios - ] - - return sorted(merge, key=lambda x: x[1], reverse=True) - - -def filter_alt_coherence_matches(results: CoherenceMatches) -> CoherenceMatches: - """ - We shall NOT return "English—" in CoherenceMatches because it is an alternative - of "English". This function only keeps the best match and remove the em-dash in it. - """ - index_results: dict[str, list[float]] = dict() - - for result in results: - language, ratio = result - no_em_name: str = language.replace("—", "") - - if no_em_name not in index_results: - index_results[no_em_name] = [] - - index_results[no_em_name].append(ratio) - - if any(len(index_results[e]) > 1 for e in index_results): - filtered_results: CoherenceMatches = [] - - for language in index_results: - filtered_results.append((language, max(index_results[language]))) - - return filtered_results - - return results - - -@lru_cache(maxsize=2048) -def coherence_ratio( - decoded_sequence: str, threshold: float = 0.1, lg_inclusion: str | None = None -) -> CoherenceMatches: - """ - Detect ANY language that can be identified in given sequence. The sequence will be analysed by layers. - A layer = Character extraction by alphabets/ranges. - """ - - results: list[tuple[str, float]] = [] - ignore_non_latin: bool = False - - sufficient_match_count: int = 0 - - lg_inclusion_list = lg_inclusion.split(",") if lg_inclusion is not None else [] - if "Latin Based" in lg_inclusion_list: - ignore_non_latin = True - lg_inclusion_list.remove("Latin Based") - - for layer in alpha_unicode_split(decoded_sequence): - sequence_frequencies: TypeCounter[str] = Counter(layer) - most_common = sequence_frequencies.most_common() - - character_count: int = sum(o for c, o in most_common) - - if character_count <= TOO_SMALL_SEQUENCE: - continue - - popular_character_ordered: list[str] = [c for c, o in most_common] - - for language in lg_inclusion_list or alphabet_languages( - popular_character_ordered, ignore_non_latin - ): - ratio: float = characters_popularity_compare( - language, popular_character_ordered - ) - - if ratio < threshold: - continue - elif ratio >= 0.8: - sufficient_match_count += 1 - - results.append((language, round(ratio, 4))) - - if sufficient_match_count >= 3: - break - - return sorted( - filter_alt_coherence_matches(results), key=lambda x: x[1], reverse=True - ) diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cli/__init__.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cli/__init__.py deleted file mode 100644 index 543a5a4d..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cli/__init__.py +++ /dev/null @@ -1,8 +0,0 @@ -from __future__ import annotations - -from .__main__ import cli_detect, query_yes_no - -__all__ = ( - "cli_detect", - "query_yes_no", -) diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cli/__main__.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cli/__main__.py deleted file mode 100644 index cb64156a..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/cli/__main__.py +++ /dev/null @@ -1,381 +0,0 @@ -from __future__ import annotations - -import argparse -import sys -import typing -from json import dumps -from os.path import abspath, basename, dirname, join, realpath -from platform import python_version -from unicodedata import unidata_version - -import charset_normalizer.md as md_module -from charset_normalizer import from_fp -from charset_normalizer.models import CliDetectionResult -from charset_normalizer.version import __version__ - - -def query_yes_no(question: str, default: str = "yes") -> bool: - """Ask a yes/no question via input() and return their answer. - - "question" is a string that is presented to the user. - "default" is the presumed answer if the user just hits . - It must be "yes" (the default), "no" or None (meaning - an answer is required of the user). - - The "answer" return value is True for "yes" or False for "no". - - Credit goes to (c) https://stackoverflow.com/questions/3041986/apt-command-line-interface-like-yes-no-input - """ - valid = {"yes": True, "y": True, "ye": True, "no": False, "n": False} - if default is None: - prompt = " [y/n] " - elif default == "yes": - prompt = " [Y/n] " - elif default == "no": - prompt = " [y/N] " - else: - raise ValueError("invalid default answer: '%s'" % default) - - while True: - sys.stdout.write(question + prompt) - choice = input().lower() - if default is not None and choice == "": - return valid[default] - elif choice in valid: - return valid[choice] - else: - sys.stdout.write("Please respond with 'yes' or 'no' (or 'y' or 'n').\n") - - -class FileType: - """Factory for creating file object types - - Instances of FileType are typically passed as type= arguments to the - ArgumentParser add_argument() method. - - Keyword Arguments: - - mode -- A string indicating how the file is to be opened. Accepts the - same values as the builtin open() function. - - bufsize -- The file's desired buffer size. Accepts the same values as - the builtin open() function. - - encoding -- The file's encoding. Accepts the same values as the - builtin open() function. - - errors -- A string indicating how encoding and decoding errors are to - be handled. Accepts the same value as the builtin open() function. - - Backported from CPython 3.12 - """ - - def __init__( - self, - mode: str = "r", - bufsize: int = -1, - encoding: str | None = None, - errors: str | None = None, - ): - self._mode = mode - self._bufsize = bufsize - self._encoding = encoding - self._errors = errors - - def __call__(self, string: str) -> typing.IO: # type: ignore[type-arg] - # the special argument "-" means sys.std{in,out} - if string == "-": - if "r" in self._mode: - return sys.stdin.buffer if "b" in self._mode else sys.stdin - elif any(c in self._mode for c in "wax"): - return sys.stdout.buffer if "b" in self._mode else sys.stdout - else: - msg = f'argument "-" with mode {self._mode}' - raise ValueError(msg) - - # all other arguments are used as file names - try: - return open(string, self._mode, self._bufsize, self._encoding, self._errors) - except OSError as e: - message = f"can't open '{string}': {e}" - raise argparse.ArgumentTypeError(message) - - def __repr__(self) -> str: - args = self._mode, self._bufsize - kwargs = [("encoding", self._encoding), ("errors", self._errors)] - args_str = ", ".join( - [repr(arg) for arg in args if arg != -1] - + [f"{kw}={arg!r}" for kw, arg in kwargs if arg is not None] - ) - return f"{type(self).__name__}({args_str})" - - -def cli_detect(argv: list[str] | None = None) -> int: - """ - CLI assistant using ARGV and ArgumentParser - :param argv: - :return: 0 if everything is fine, anything else equal trouble - """ - parser = argparse.ArgumentParser( - description="The Real First Universal Charset Detector. " - "Discover originating encoding used on text file. " - "Normalize text to unicode." - ) - - parser.add_argument( - "files", type=FileType("rb"), nargs="+", help="File(s) to be analysed" - ) - parser.add_argument( - "-v", - "--verbose", - action="store_true", - default=False, - dest="verbose", - help="Display complementary information about file if any. " - "Stdout will contain logs about the detection process.", - ) - parser.add_argument( - "-a", - "--with-alternative", - action="store_true", - default=False, - dest="alternatives", - help="Output complementary possibilities if any. Top-level JSON WILL be a list.", - ) - parser.add_argument( - "-n", - "--normalize", - action="store_true", - default=False, - dest="normalize", - help="Permit to normalize input file. If not set, program does not write anything.", - ) - parser.add_argument( - "-m", - "--minimal", - action="store_true", - default=False, - dest="minimal", - help="Only output the charset detected to STDOUT. Disabling JSON output.", - ) - parser.add_argument( - "-r", - "--replace", - action="store_true", - default=False, - dest="replace", - help="Replace file when trying to normalize it instead of creating a new one.", - ) - parser.add_argument( - "-f", - "--force", - action="store_true", - default=False, - dest="force", - help="Replace file without asking if you are sure, use this flag with caution.", - ) - parser.add_argument( - "-i", - "--no-preemptive", - action="store_true", - default=False, - dest="no_preemptive", - help="Disable looking at a charset declaration to hint the detector.", - ) - parser.add_argument( - "-t", - "--threshold", - action="store", - default=0.2, - type=float, - dest="threshold", - help="Define a custom maximum amount of noise allowed in decoded content. 0. <= noise <= 1.", - ) - parser.add_argument( - "--version", - action="version", - version="Charset-Normalizer {} - Python {} - Unicode {} - SpeedUp {}".format( - __version__, - python_version(), - unidata_version, - "OFF" if md_module.__file__.lower().endswith(".py") else "ON", - ), - help="Show version information and exit.", - ) - - args = parser.parse_args(argv) - - if args.replace is True and args.normalize is False: - if args.files: - for my_file in args.files: - my_file.close() - print("Use --replace in addition of --normalize only.", file=sys.stderr) - return 1 - - if args.force is True and args.replace is False: - if args.files: - for my_file in args.files: - my_file.close() - print("Use --force in addition of --replace only.", file=sys.stderr) - return 1 - - if args.threshold < 0.0 or args.threshold > 1.0: - if args.files: - for my_file in args.files: - my_file.close() - print("--threshold VALUE should be between 0. AND 1.", file=sys.stderr) - return 1 - - x_ = [] - - for my_file in args.files: - matches = from_fp( - my_file, - threshold=args.threshold, - explain=args.verbose, - preemptive_behaviour=args.no_preemptive is False, - ) - - best_guess = matches.best() - - if best_guess is None: - print( - 'Unable to identify originating encoding for "{}". {}'.format( - my_file.name, - ( - "Maybe try increasing maximum amount of chaos." - if args.threshold < 1.0 - else "" - ), - ), - file=sys.stderr, - ) - x_.append( - CliDetectionResult( - abspath(my_file.name), - None, - [], - [], - "Unknown", - [], - False, - 1.0, - 0.0, - None, - True, - ) - ) - else: - x_.append( - CliDetectionResult( - abspath(my_file.name), - best_guess.encoding, - best_guess.encoding_aliases, - [ - cp - for cp in best_guess.could_be_from_charset - if cp != best_guess.encoding - ], - best_guess.language, - best_guess.alphabets, - best_guess.bom, - best_guess.percent_chaos, - best_guess.percent_coherence, - None, - True, - ) - ) - - if len(matches) > 1 and args.alternatives: - for el in matches: - if el != best_guess: - x_.append( - CliDetectionResult( - abspath(my_file.name), - el.encoding, - el.encoding_aliases, - [ - cp - for cp in el.could_be_from_charset - if cp != el.encoding - ], - el.language, - el.alphabets, - el.bom, - el.percent_chaos, - el.percent_coherence, - None, - False, - ) - ) - - if args.normalize is True: - if best_guess.encoding.startswith("utf") is True: - print( - '"{}" file does not need to be normalized, as it already came from unicode.'.format( - my_file.name - ), - file=sys.stderr, - ) - if my_file.closed is False: - my_file.close() - continue - - dir_path = dirname(realpath(my_file.name)) - file_name = basename(realpath(my_file.name)) - - o_: list[str] = file_name.split(".") - - if args.replace is False: - o_.insert(-1, best_guess.encoding) - if my_file.closed is False: - my_file.close() - elif ( - args.force is False - and query_yes_no( - 'Are you sure to normalize "{}" by replacing it ?'.format( - my_file.name - ), - "no", - ) - is False - ): - if my_file.closed is False: - my_file.close() - continue - - try: - x_[0].unicode_path = join(dir_path, ".".join(o_)) - - with open(x_[0].unicode_path, "wb") as fp: - fp.write(best_guess.output()) - except OSError as e: - print(str(e), file=sys.stderr) - if my_file.closed is False: - my_file.close() - return 2 - - if my_file.closed is False: - my_file.close() - - if args.minimal is False: - print( - dumps( - [el.__dict__ for el in x_] if len(x_) > 1 else x_[0].__dict__, - ensure_ascii=True, - indent=4, - ) - ) - else: - for my_file in args.files: - print( - ", ".join( - [ - el.encoding or "undefined" - for el in x_ - if el.path == abspath(my_file.name) - ] - ) - ) - - return 0 - - -if __name__ == "__main__": - cli_detect() diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/constant.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/constant.py deleted file mode 100644 index cc71a019..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/constant.py +++ /dev/null @@ -1,2015 +0,0 @@ -from __future__ import annotations - -from codecs import BOM_UTF8, BOM_UTF16_BE, BOM_UTF16_LE, BOM_UTF32_BE, BOM_UTF32_LE -from encodings.aliases import aliases -from re import IGNORECASE -from re import compile as re_compile - -# Contain for each eligible encoding a list of/item bytes SIG/BOM -ENCODING_MARKS: dict[str, bytes | list[bytes]] = { - "utf_8": BOM_UTF8, - "utf_7": [ - b"\x2b\x2f\x76\x38", - b"\x2b\x2f\x76\x39", - b"\x2b\x2f\x76\x2b", - b"\x2b\x2f\x76\x2f", - b"\x2b\x2f\x76\x38\x2d", - ], - "gb18030": b"\x84\x31\x95\x33", - "utf_32": [BOM_UTF32_BE, BOM_UTF32_LE], - "utf_16": [BOM_UTF16_BE, BOM_UTF16_LE], -} - -TOO_SMALL_SEQUENCE: int = 32 -TOO_BIG_SEQUENCE: int = int(10e6) - -UTF8_MAXIMAL_ALLOCATION: int = 1_112_064 - -# Up-to-date Unicode ucd/15.0.0 -UNICODE_RANGES_COMBINED: dict[str, range] = { - "Control character": range(32), - "Basic Latin": range(32, 128), - "Latin-1 Supplement": range(128, 256), - "Latin Extended-A": range(256, 384), - "Latin Extended-B": range(384, 592), - "IPA Extensions": range(592, 688), - "Spacing Modifier Letters": range(688, 768), - "Combining Diacritical Marks": range(768, 880), - "Greek and Coptic": range(880, 1024), - "Cyrillic": range(1024, 1280), - "Cyrillic Supplement": range(1280, 1328), - "Armenian": range(1328, 1424), - "Hebrew": range(1424, 1536), - "Arabic": range(1536, 1792), - "Syriac": range(1792, 1872), - "Arabic Supplement": range(1872, 1920), - "Thaana": range(1920, 1984), - "NKo": range(1984, 2048), - "Samaritan": range(2048, 2112), - "Mandaic": range(2112, 2144), - "Syriac Supplement": range(2144, 2160), - "Arabic Extended-B": range(2160, 2208), - "Arabic Extended-A": range(2208, 2304), - "Devanagari": range(2304, 2432), - "Bengali": range(2432, 2560), - "Gurmukhi": range(2560, 2688), - "Gujarati": range(2688, 2816), - "Oriya": range(2816, 2944), - "Tamil": range(2944, 3072), - "Telugu": range(3072, 3200), - "Kannada": range(3200, 3328), - "Malayalam": range(3328, 3456), - "Sinhala": range(3456, 3584), - "Thai": range(3584, 3712), - "Lao": range(3712, 3840), - "Tibetan": range(3840, 4096), - "Myanmar": range(4096, 4256), - "Georgian": range(4256, 4352), - "Hangul Jamo": range(4352, 4608), - "Ethiopic": range(4608, 4992), - "Ethiopic Supplement": range(4992, 5024), - "Cherokee": range(5024, 5120), - "Unified Canadian Aboriginal Syllabics": range(5120, 5760), - "Ogham": range(5760, 5792), - "Runic": range(5792, 5888), - "Tagalog": range(5888, 5920), - "Hanunoo": range(5920, 5952), - "Buhid": range(5952, 5984), - "Tagbanwa": range(5984, 6016), - "Khmer": range(6016, 6144), - "Mongolian": range(6144, 6320), - "Unified Canadian Aboriginal Syllabics Extended": range(6320, 6400), - "Limbu": range(6400, 6480), - "Tai Le": range(6480, 6528), - "New Tai Lue": range(6528, 6624), - "Khmer Symbols": range(6624, 6656), - "Buginese": range(6656, 6688), - "Tai Tham": range(6688, 6832), - "Combining Diacritical Marks Extended": range(6832, 6912), - "Balinese": range(6912, 7040), - "Sundanese": range(7040, 7104), - "Batak": range(7104, 7168), - "Lepcha": range(7168, 7248), - "Ol Chiki": range(7248, 7296), - "Cyrillic Extended-C": range(7296, 7312), - "Georgian Extended": range(7312, 7360), - "Sundanese Supplement": range(7360, 7376), - "Vedic Extensions": range(7376, 7424), - "Phonetic Extensions": range(7424, 7552), - "Phonetic Extensions Supplement": range(7552, 7616), - "Combining Diacritical Marks Supplement": range(7616, 7680), - "Latin Extended Additional": range(7680, 7936), - "Greek Extended": range(7936, 8192), - "General Punctuation": range(8192, 8304), - "Superscripts and Subscripts": range(8304, 8352), - "Currency Symbols": range(8352, 8400), - "Combining Diacritical Marks for Symbols": range(8400, 8448), - "Letterlike Symbols": range(8448, 8528), - "Number Forms": range(8528, 8592), - "Arrows": range(8592, 8704), - "Mathematical Operators": range(8704, 8960), - "Miscellaneous Technical": range(8960, 9216), - "Control Pictures": range(9216, 9280), - "Optical Character Recognition": range(9280, 9312), - "Enclosed Alphanumerics": range(9312, 9472), - "Box Drawing": range(9472, 9600), - "Block Elements": range(9600, 9632), - "Geometric Shapes": range(9632, 9728), - "Miscellaneous Symbols": range(9728, 9984), - "Dingbats": range(9984, 10176), - "Miscellaneous Mathematical Symbols-A": range(10176, 10224), - "Supplemental Arrows-A": range(10224, 10240), - "Braille Patterns": range(10240, 10496), - "Supplemental Arrows-B": range(10496, 10624), - "Miscellaneous Mathematical Symbols-B": range(10624, 10752), - "Supplemental Mathematical Operators": range(10752, 11008), - "Miscellaneous Symbols and Arrows": range(11008, 11264), - "Glagolitic": range(11264, 11360), - "Latin Extended-C": range(11360, 11392), - "Coptic": range(11392, 11520), - "Georgian Supplement": range(11520, 11568), - "Tifinagh": range(11568, 11648), - "Ethiopic Extended": range(11648, 11744), - "Cyrillic Extended-A": range(11744, 11776), - "Supplemental Punctuation": range(11776, 11904), - "CJK Radicals Supplement": range(11904, 12032), - "Kangxi Radicals": range(12032, 12256), - "Ideographic Description Characters": range(12272, 12288), - "CJK Symbols and Punctuation": range(12288, 12352), - "Hiragana": range(12352, 12448), - "Katakana": range(12448, 12544), - "Bopomofo": range(12544, 12592), - "Hangul Compatibility Jamo": range(12592, 12688), - "Kanbun": range(12688, 12704), - "Bopomofo Extended": range(12704, 12736), - "CJK Strokes": range(12736, 12784), - "Katakana Phonetic Extensions": range(12784, 12800), - "Enclosed CJK Letters and Months": range(12800, 13056), - "CJK Compatibility": range(13056, 13312), - "CJK Unified Ideographs Extension A": range(13312, 19904), - "Yijing Hexagram Symbols": range(19904, 19968), - "CJK Unified Ideographs": range(19968, 40960), - "Yi Syllables": range(40960, 42128), - "Yi Radicals": range(42128, 42192), - "Lisu": range(42192, 42240), - "Vai": range(42240, 42560), - "Cyrillic Extended-B": range(42560, 42656), - "Bamum": range(42656, 42752), - "Modifier Tone Letters": range(42752, 42784), - "Latin Extended-D": range(42784, 43008), - "Syloti Nagri": range(43008, 43056), - "Common Indic Number Forms": range(43056, 43072), - "Phags-pa": range(43072, 43136), - "Saurashtra": range(43136, 43232), - "Devanagari Extended": range(43232, 43264), - "Kayah Li": range(43264, 43312), - "Rejang": range(43312, 43360), - "Hangul Jamo Extended-A": range(43360, 43392), - "Javanese": range(43392, 43488), - "Myanmar Extended-B": range(43488, 43520), - "Cham": range(43520, 43616), - "Myanmar Extended-A": range(43616, 43648), - "Tai Viet": range(43648, 43744), - "Meetei Mayek Extensions": range(43744, 43776), - "Ethiopic Extended-A": range(43776, 43824), - "Latin Extended-E": range(43824, 43888), - "Cherokee Supplement": range(43888, 43968), - "Meetei Mayek": range(43968, 44032), - "Hangul Syllables": range(44032, 55216), - "Hangul Jamo Extended-B": range(55216, 55296), - "High Surrogates": range(55296, 56192), - "High Private Use Surrogates": range(56192, 56320), - "Low Surrogates": range(56320, 57344), - "Private Use Area": range(57344, 63744), - "CJK Compatibility Ideographs": range(63744, 64256), - "Alphabetic Presentation Forms": range(64256, 64336), - "Arabic Presentation Forms-A": range(64336, 65024), - "Variation Selectors": range(65024, 65040), - "Vertical Forms": range(65040, 65056), - "Combining Half Marks": range(65056, 65072), - "CJK Compatibility Forms": range(65072, 65104), - "Small Form Variants": range(65104, 65136), - "Arabic Presentation Forms-B": range(65136, 65280), - "Halfwidth and Fullwidth Forms": range(65280, 65520), - "Specials": range(65520, 65536), - "Linear B Syllabary": range(65536, 65664), - "Linear B Ideograms": range(65664, 65792), - "Aegean Numbers": range(65792, 65856), - "Ancient Greek Numbers": range(65856, 65936), - "Ancient Symbols": range(65936, 66000), - "Phaistos Disc": range(66000, 66048), - "Lycian": range(66176, 66208), - "Carian": range(66208, 66272), - "Coptic Epact Numbers": range(66272, 66304), - "Old Italic": range(66304, 66352), - "Gothic": range(66352, 66384), - "Old Permic": range(66384, 66432), - "Ugaritic": range(66432, 66464), - "Old Persian": range(66464, 66528), - "Deseret": range(66560, 66640), - "Shavian": range(66640, 66688), - "Osmanya": range(66688, 66736), - "Osage": range(66736, 66816), - "Elbasan": range(66816, 66864), - "Caucasian Albanian": range(66864, 66928), - "Vithkuqi": range(66928, 67008), - "Linear A": range(67072, 67456), - "Latin Extended-F": range(67456, 67520), - "Cypriot Syllabary": range(67584, 67648), - "Imperial Aramaic": range(67648, 67680), - "Palmyrene": range(67680, 67712), - "Nabataean": range(67712, 67760), - "Hatran": range(67808, 67840), - "Phoenician": range(67840, 67872), - "Lydian": range(67872, 67904), - "Meroitic Hieroglyphs": range(67968, 68000), - "Meroitic Cursive": range(68000, 68096), - "Kharoshthi": range(68096, 68192), - "Old South Arabian": range(68192, 68224), - "Old North Arabian": range(68224, 68256), - "Manichaean": range(68288, 68352), - "Avestan": range(68352, 68416), - "Inscriptional Parthian": range(68416, 68448), - "Inscriptional Pahlavi": range(68448, 68480), - "Psalter Pahlavi": range(68480, 68528), - "Old Turkic": range(68608, 68688), - "Old Hungarian": range(68736, 68864), - "Hanifi Rohingya": range(68864, 68928), - "Rumi Numeral Symbols": range(69216, 69248), - "Yezidi": range(69248, 69312), - "Arabic Extended-C": range(69312, 69376), - "Old Sogdian": range(69376, 69424), - "Sogdian": range(69424, 69488), - "Old Uyghur": range(69488, 69552), - "Chorasmian": range(69552, 69600), - "Elymaic": range(69600, 69632), - "Brahmi": range(69632, 69760), - "Kaithi": range(69760, 69840), - "Sora Sompeng": range(69840, 69888), - "Chakma": range(69888, 69968), - "Mahajani": range(69968, 70016), - "Sharada": range(70016, 70112), - "Sinhala Archaic Numbers": range(70112, 70144), - "Khojki": range(70144, 70224), - "Multani": range(70272, 70320), - "Khudawadi": range(70320, 70400), - "Grantha": range(70400, 70528), - "Newa": range(70656, 70784), - "Tirhuta": range(70784, 70880), - "Siddham": range(71040, 71168), - "Modi": range(71168, 71264), - "Mongolian Supplement": range(71264, 71296), - "Takri": range(71296, 71376), - "Ahom": range(71424, 71504), - "Dogra": range(71680, 71760), - "Warang Citi": range(71840, 71936), - "Dives Akuru": range(71936, 72032), - "Nandinagari": range(72096, 72192), - "Zanabazar Square": range(72192, 72272), - "Soyombo": range(72272, 72368), - "Unified Canadian Aboriginal Syllabics Extended-A": range(72368, 72384), - "Pau Cin Hau": range(72384, 72448), - "Devanagari Extended-A": range(72448, 72544), - "Bhaiksuki": range(72704, 72816), - "Marchen": range(72816, 72896), - "Masaram Gondi": range(72960, 73056), - "Gunjala Gondi": range(73056, 73136), - "Makasar": range(73440, 73472), - "Kawi": range(73472, 73568), - "Lisu Supplement": range(73648, 73664), - "Tamil Supplement": range(73664, 73728), - "Cuneiform": range(73728, 74752), - "Cuneiform Numbers and Punctuation": range(74752, 74880), - "Early Dynastic Cuneiform": range(74880, 75088), - "Cypro-Minoan": range(77712, 77824), - "Egyptian Hieroglyphs": range(77824, 78896), - "Egyptian Hieroglyph Format Controls": range(78896, 78944), - "Anatolian Hieroglyphs": range(82944, 83584), - "Bamum Supplement": range(92160, 92736), - "Mro": range(92736, 92784), - "Tangsa": range(92784, 92880), - "Bassa Vah": range(92880, 92928), - "Pahawh Hmong": range(92928, 93072), - "Medefaidrin": range(93760, 93856), - "Miao": range(93952, 94112), - "Ideographic Symbols and Punctuation": range(94176, 94208), - "Tangut": range(94208, 100352), - "Tangut Components": range(100352, 101120), - "Khitan Small Script": range(101120, 101632), - "Tangut Supplement": range(101632, 101760), - "Kana Extended-B": range(110576, 110592), - "Kana Supplement": range(110592, 110848), - "Kana Extended-A": range(110848, 110896), - "Small Kana Extension": range(110896, 110960), - "Nushu": range(110960, 111360), - "Duployan": range(113664, 113824), - "Shorthand Format Controls": range(113824, 113840), - "Znamenny Musical Notation": range(118528, 118736), - "Byzantine Musical Symbols": range(118784, 119040), - "Musical Symbols": range(119040, 119296), - "Ancient Greek Musical Notation": range(119296, 119376), - "Kaktovik Numerals": range(119488, 119520), - "Mayan Numerals": range(119520, 119552), - "Tai Xuan Jing Symbols": range(119552, 119648), - "Counting Rod Numerals": range(119648, 119680), - "Mathematical Alphanumeric Symbols": range(119808, 120832), - "Sutton SignWriting": range(120832, 121520), - "Latin Extended-G": range(122624, 122880), - "Glagolitic Supplement": range(122880, 122928), - "Cyrillic Extended-D": range(122928, 123024), - "Nyiakeng Puachue Hmong": range(123136, 123216), - "Toto": range(123536, 123584), - "Wancho": range(123584, 123648), - "Nag Mundari": range(124112, 124160), - "Ethiopic Extended-B": range(124896, 124928), - "Mende Kikakui": range(124928, 125152), - "Adlam": range(125184, 125280), - "Indic Siyaq Numbers": range(126064, 126144), - "Ottoman Siyaq Numbers": range(126208, 126288), - "Arabic Mathematical Alphabetic Symbols": range(126464, 126720), - "Mahjong Tiles": range(126976, 127024), - "Domino Tiles": range(127024, 127136), - "Playing Cards": range(127136, 127232), - "Enclosed Alphanumeric Supplement": range(127232, 127488), - "Enclosed Ideographic Supplement": range(127488, 127744), - "Miscellaneous Symbols and Pictographs": range(127744, 128512), - "Emoticons range(Emoji)": range(128512, 128592), - "Ornamental Dingbats": range(128592, 128640), - "Transport and Map Symbols": range(128640, 128768), - "Alchemical Symbols": range(128768, 128896), - "Geometric Shapes Extended": range(128896, 129024), - "Supplemental Arrows-C": range(129024, 129280), - "Supplemental Symbols and Pictographs": range(129280, 129536), - "Chess Symbols": range(129536, 129648), - "Symbols and Pictographs Extended-A": range(129648, 129792), - "Symbols for Legacy Computing": range(129792, 130048), - "CJK Unified Ideographs Extension B": range(131072, 173792), - "CJK Unified Ideographs Extension C": range(173824, 177984), - "CJK Unified Ideographs Extension D": range(177984, 178208), - "CJK Unified Ideographs Extension E": range(178208, 183984), - "CJK Unified Ideographs Extension F": range(183984, 191472), - "CJK Compatibility Ideographs Supplement": range(194560, 195104), - "CJK Unified Ideographs Extension G": range(196608, 201552), - "CJK Unified Ideographs Extension H": range(201552, 205744), - "Tags": range(917504, 917632), - "Variation Selectors Supplement": range(917760, 918000), - "Supplementary Private Use Area-A": range(983040, 1048576), - "Supplementary Private Use Area-B": range(1048576, 1114112), -} - - -UNICODE_SECONDARY_RANGE_KEYWORD: list[str] = [ - "Supplement", - "Extended", - "Extensions", - "Modifier", - "Marks", - "Punctuation", - "Symbols", - "Forms", - "Operators", - "Miscellaneous", - "Drawing", - "Block", - "Shapes", - "Supplemental", - "Tags", -] - -RE_POSSIBLE_ENCODING_INDICATION = re_compile( - r"(?:(?:encoding)|(?:charset)|(?:coding))(?:[\:= ]{1,10})(?:[\"\']?)([a-zA-Z0-9\-_]+)(?:[\"\']?)", - IGNORECASE, -) - -IANA_NO_ALIASES = [ - "cp720", - "cp737", - "cp856", - "cp874", - "cp875", - "cp1006", - "koi8_r", - "koi8_t", - "koi8_u", -] - -IANA_SUPPORTED: list[str] = sorted( - filter( - lambda x: x.endswith("_codec") is False - and x not in {"rot_13", "tactis", "mbcs"}, - list(set(aliases.values())) + IANA_NO_ALIASES, - ) -) - -IANA_SUPPORTED_COUNT: int = len(IANA_SUPPORTED) - -# pre-computed code page that are similar using the function cp_similarity. -IANA_SUPPORTED_SIMILAR: dict[str, list[str]] = { - "cp037": ["cp1026", "cp1140", "cp273", "cp500"], - "cp1026": ["cp037", "cp1140", "cp273", "cp500"], - "cp1125": ["cp866"], - "cp1140": ["cp037", "cp1026", "cp273", "cp500"], - "cp1250": ["iso8859_2"], - "cp1251": ["kz1048", "ptcp154"], - "cp1252": ["iso8859_15", "iso8859_9", "latin_1"], - "cp1253": ["iso8859_7"], - "cp1254": ["iso8859_15", "iso8859_9", "latin_1"], - "cp1257": ["iso8859_13"], - "cp273": ["cp037", "cp1026", "cp1140", "cp500"], - "cp437": ["cp850", "cp858", "cp860", "cp861", "cp862", "cp863", "cp865"], - "cp500": ["cp037", "cp1026", "cp1140", "cp273"], - "cp850": ["cp437", "cp857", "cp858", "cp865"], - "cp857": ["cp850", "cp858", "cp865"], - "cp858": ["cp437", "cp850", "cp857", "cp865"], - "cp860": ["cp437", "cp861", "cp862", "cp863", "cp865"], - "cp861": ["cp437", "cp860", "cp862", "cp863", "cp865"], - "cp862": ["cp437", "cp860", "cp861", "cp863", "cp865"], - "cp863": ["cp437", "cp860", "cp861", "cp862", "cp865"], - "cp865": ["cp437", "cp850", "cp857", "cp858", "cp860", "cp861", "cp862", "cp863"], - "cp866": ["cp1125"], - "iso8859_10": ["iso8859_14", "iso8859_15", "iso8859_4", "iso8859_9", "latin_1"], - "iso8859_11": ["tis_620"], - "iso8859_13": ["cp1257"], - "iso8859_14": [ - "iso8859_10", - "iso8859_15", - "iso8859_16", - "iso8859_3", - "iso8859_9", - "latin_1", - ], - "iso8859_15": [ - "cp1252", - "cp1254", - "iso8859_10", - "iso8859_14", - "iso8859_16", - "iso8859_3", - "iso8859_9", - "latin_1", - ], - "iso8859_16": [ - "iso8859_14", - "iso8859_15", - "iso8859_2", - "iso8859_3", - "iso8859_9", - "latin_1", - ], - "iso8859_2": ["cp1250", "iso8859_16", "iso8859_4"], - "iso8859_3": ["iso8859_14", "iso8859_15", "iso8859_16", "iso8859_9", "latin_1"], - "iso8859_4": ["iso8859_10", "iso8859_2", "iso8859_9", "latin_1"], - "iso8859_7": ["cp1253"], - "iso8859_9": [ - "cp1252", - "cp1254", - "cp1258", - "iso8859_10", - "iso8859_14", - "iso8859_15", - "iso8859_16", - "iso8859_3", - "iso8859_4", - "latin_1", - ], - "kz1048": ["cp1251", "ptcp154"], - "latin_1": [ - "cp1252", - "cp1254", - "cp1258", - "iso8859_10", - "iso8859_14", - "iso8859_15", - "iso8859_16", - "iso8859_3", - "iso8859_4", - "iso8859_9", - ], - "mac_iceland": ["mac_roman", "mac_turkish"], - "mac_roman": ["mac_iceland", "mac_turkish"], - "mac_turkish": ["mac_iceland", "mac_roman"], - "ptcp154": ["cp1251", "kz1048"], - "tis_620": ["iso8859_11"], -} - - -CHARDET_CORRESPONDENCE: dict[str, str] = { - "iso2022_kr": "ISO-2022-KR", - "iso2022_jp": "ISO-2022-JP", - "euc_kr": "EUC-KR", - "tis_620": "TIS-620", - "utf_32": "UTF-32", - "euc_jp": "EUC-JP", - "koi8_r": "KOI8-R", - "iso8859_1": "ISO-8859-1", - "iso8859_2": "ISO-8859-2", - "iso8859_5": "ISO-8859-5", - "iso8859_6": "ISO-8859-6", - "iso8859_7": "ISO-8859-7", - "iso8859_8": "ISO-8859-8", - "utf_16": "UTF-16", - "cp855": "IBM855", - "mac_cyrillic": "MacCyrillic", - "gb2312": "GB2312", - "gb18030": "GB18030", - "cp932": "CP932", - "cp866": "IBM866", - "utf_8": "utf-8", - "utf_8_sig": "UTF-8-SIG", - "shift_jis": "SHIFT_JIS", - "big5": "Big5", - "cp1250": "windows-1250", - "cp1251": "windows-1251", - "cp1252": "Windows-1252", - "cp1253": "windows-1253", - "cp1255": "windows-1255", - "cp1256": "windows-1256", - "cp1254": "Windows-1254", - "cp949": "CP949", -} - - -COMMON_SAFE_ASCII_CHARACTERS: set[str] = { - "<", - ">", - "=", - ":", - "/", - "&", - ";", - "{", - "}", - "[", - "]", - ",", - "|", - '"', - "-", - "(", - ")", -} - -# Sample character sets — replace with full lists if needed -COMMON_CHINESE_CHARACTERS = "的一是在不了有和人这中大为上个国我以要他时来用们生到作地于出就分对成会可主发年动同工也能下过子说产种面而方后多定行学法所民得经十三之进着等部度家电力里如水化高自二理起小物现实加量都两体制机当使点从业本去把性好应开它合还因由其些然前外天政四日那社义事平形相全表间样与关各重新线内数正心反你明看原又么利比或但质气第向道命此变条只没结解问意建月公无系军很情者最立代想已通并提直题党程展五果料象员革位入常文总次品式活设及管特件长求老头基资边流路级少图山统接知较将组见计别她手角期根论运农指几九区强放决西被干做必战先回则任取据处队南给色光门即保治北造百规热领七海口东导器压志世金增争济阶油思术极交受联什认六共权收证改清己美再采转更单风切打白教速花带安场身车例真务具万每目至达走积示议声报斗完类八离华名确才科张信马节话米整空元况今集温传土许步群广石记需段研界拉林律叫且究观越织装影算低持音众书布复容儿须际商非验连断深难近矿千周委素技备半办青省列习响约支般史感劳便团往酸历市克何除消构府太准精值号率族维划选标写存候毛亲快效斯院查江型眼王按格养易置派层片始却专状育厂京识适属圆包火住调满县局照参红细引听该铁价严龙飞" - -COMMON_JAPANESE_CHARACTERS = "日一国年大十二本中長出三時行見月分後前生五間上東四今金九入学高円子外八六下来気小七山話女北午百書先名川千水半男西電校語土木聞食車何南万毎白天母火右読友左休父雨" - -COMMON_KOREAN_CHARACTERS = "一二三四五六七八九十百千萬上下左右中人女子大小山川日月火水木金土父母天地國名年時文校學生" - -# Combine all into a set -COMMON_CJK_CHARACTERS = set( - "".join( - [ - COMMON_CHINESE_CHARACTERS, - COMMON_JAPANESE_CHARACTERS, - COMMON_KOREAN_CHARACTERS, - ] - ) -) - -KO_NAMES: set[str] = {"johab", "cp949", "euc_kr"} -ZH_NAMES: set[str] = {"big5", "cp950", "big5hkscs", "hz"} - -# Logging LEVEL below DEBUG -TRACE: int = 5 - - -# Language label that contain the em dash "—" -# character are to be considered alternative seq to origin -FREQUENCIES: dict[str, list[str]] = { - "English": [ - "e", - "a", - "t", - "i", - "o", - "n", - "s", - "r", - "h", - "l", - "d", - "c", - "u", - "m", - "f", - "p", - "g", - "w", - "y", - "b", - "v", - "k", - "x", - "j", - "z", - "q", - ], - "English—": [ - "e", - "a", - "t", - "i", - "o", - "n", - "s", - "r", - "h", - "l", - "d", - "c", - "m", - "u", - "f", - "p", - "g", - "w", - "b", - "y", - "v", - "k", - "j", - "x", - "z", - "q", - ], - "German": [ - "e", - "n", - "i", - "r", - "s", - "t", - "a", - "d", - "h", - "u", - "l", - "g", - "o", - "c", - "m", - "b", - "f", - "k", - "w", - "z", - "p", - "v", - "ü", - "ä", - "ö", - "j", - ], - "French": [ - "e", - "a", - "s", - "n", - "i", - "t", - "r", - "l", - "u", - "o", - "d", - "c", - "p", - "m", - "é", - "v", - "g", - "f", - "b", - "h", - "q", - "à", - "x", - "è", - "y", - "j", - ], - "Dutch": [ - "e", - "n", - "a", - "i", - "r", - "t", - "o", - "d", - "s", - "l", - "g", - "h", - "v", - "m", - "u", - "k", - "c", - "p", - "b", - "w", - "j", - "z", - "f", - "y", - "x", - "ë", - ], - "Italian": [ - "e", - "i", - "a", - "o", - "n", - "l", - "t", - "r", - "s", - "c", - "d", - "u", - "p", - "m", - "g", - "v", - "f", - "b", - "z", - "h", - "q", - "è", - "à", - "k", - "y", - "ò", - ], - "Polish": [ - "a", - "i", - "o", - "e", - "n", - "r", - "z", - "w", - "s", - "c", - "t", - "k", - "y", - "d", - "p", - "m", - "u", - "l", - "j", - "ł", - "g", - "b", - "h", - "ą", - "ę", - "ó", - ], - "Spanish": [ - "e", - "a", - "o", - "n", - "s", - "r", - "i", - "l", - "d", - "t", - "c", - "u", - "m", - "p", - "b", - "g", - "v", - "f", - "y", - "ó", - "h", - "q", - "í", - "j", - "z", - "á", - ], - "Russian": [ - "о", - "а", - "е", - "и", - "н", - "с", - "т", - "р", - "в", - "л", - "к", - "м", - "д", - "п", - "у", - "г", - "я", - "ы", - "з", - "б", - "й", - "ь", - "ч", - "х", - "ж", - "ц", - ], - # Jap-Kanji - "Japanese": [ - "人", - "一", - "大", - "亅", - "丁", - "丨", - "竹", - "笑", - "口", - "日", - "今", - "二", - "彳", - "行", - "十", - "土", - "丶", - "寸", - "寺", - "時", - "乙", - "丿", - "乂", - "气", - "気", - "冂", - "巾", - "亠", - "市", - "目", - "儿", - "見", - "八", - "小", - "凵", - "県", - "月", - "彐", - "門", - "間", - "木", - "東", - "山", - "出", - "本", - "中", - "刀", - "分", - "耳", - "又", - "取", - "最", - "言", - "田", - "心", - "思", - "刂", - "前", - "京", - "尹", - "事", - "生", - "厶", - "云", - "会", - "未", - "来", - "白", - "冫", - "楽", - "灬", - "馬", - "尸", - "尺", - "駅", - "明", - "耂", - "者", - "了", - "阝", - "都", - "高", - "卜", - "占", - "厂", - "广", - "店", - "子", - "申", - "奄", - "亻", - "俺", - "上", - "方", - "冖", - "学", - "衣", - "艮", - "食", - "自", - ], - # Jap-Katakana - "Japanese—": [ - "ー", - "ン", - "ス", - "・", - "ル", - "ト", - "リ", - "イ", - "ア", - "ラ", - "ッ", - "ク", - "ド", - "シ", - "レ", - "ジ", - "タ", - "フ", - "ロ", - "カ", - "テ", - "マ", - "ィ", - "グ", - "バ", - "ム", - "プ", - "オ", - "コ", - "デ", - "ニ", - "ウ", - "メ", - "サ", - "ビ", - "ナ", - "ブ", - "ャ", - "エ", - "ュ", - "チ", - "キ", - "ズ", - "ダ", - "パ", - "ミ", - "ェ", - "ョ", - "ハ", - "セ", - "ベ", - "ガ", - "モ", - "ツ", - "ネ", - "ボ", - "ソ", - "ノ", - "ァ", - "ヴ", - "ワ", - "ポ", - "ペ", - "ピ", - "ケ", - "ゴ", - "ギ", - "ザ", - "ホ", - "ゲ", - "ォ", - "ヤ", - "ヒ", - "ユ", - "ヨ", - "ヘ", - "ゼ", - "ヌ", - "ゥ", - "ゾ", - "ヶ", - "ヂ", - "ヲ", - "ヅ", - "ヵ", - "ヱ", - "ヰ", - "ヮ", - "ヽ", - "゠", - "ヾ", - "ヷ", - "ヿ", - "ヸ", - "ヹ", - "ヺ", - ], - # Jap-Hiragana - "Japanese——": [ - "の", - "に", - "る", - "た", - "と", - "は", - "し", - "い", - "を", - "で", - "て", - "が", - "な", - "れ", - "か", - "ら", - "さ", - "っ", - "り", - "す", - "あ", - "も", - "こ", - "ま", - "う", - "く", - "よ", - "き", - "ん", - "め", - "お", - "け", - "そ", - "つ", - "だ", - "や", - "え", - "ど", - "わ", - "ち", - "み", - "せ", - "じ", - "ば", - "へ", - "び", - "ず", - "ろ", - "ほ", - "げ", - "む", - "べ", - "ひ", - "ょ", - "ゆ", - "ぶ", - "ご", - "ゃ", - "ね", - "ふ", - "ぐ", - "ぎ", - "ぼ", - "ゅ", - "づ", - "ざ", - "ぞ", - "ぬ", - "ぜ", - "ぱ", - "ぽ", - "ぷ", - "ぴ", - "ぃ", - "ぁ", - "ぇ", - "ぺ", - "ゞ", - "ぢ", - "ぉ", - "ぅ", - "ゐ", - "ゝ", - "ゑ", - "゛", - "゜", - "ゎ", - "ゔ", - "゚", - "ゟ", - "゙", - "ゕ", - "ゖ", - ], - "Portuguese": [ - "a", - "e", - "o", - "s", - "i", - "r", - "d", - "n", - "t", - "m", - "u", - "c", - "l", - "p", - "g", - "v", - "b", - "f", - "h", - "ã", - "q", - "é", - "ç", - "á", - "z", - "í", - ], - "Swedish": [ - "e", - "a", - "n", - "r", - "t", - "s", - "i", - "l", - "d", - "o", - "m", - "k", - "g", - "v", - "h", - "f", - "u", - "p", - "ä", - "c", - "b", - "ö", - "å", - "y", - "j", - "x", - ], - "Chinese": [ - "的", - "一", - "是", - "不", - "了", - "在", - "人", - "有", - "我", - "他", - "这", - "个", - "们", - "中", - "来", - "上", - "大", - "为", - "和", - "国", - "地", - "到", - "以", - "说", - "时", - "要", - "就", - "出", - "会", - "可", - "也", - "你", - "对", - "生", - "能", - "而", - "子", - "那", - "得", - "于", - "着", - "下", - "自", - "之", - "年", - "过", - "发", - "后", - "作", - "里", - "用", - "道", - "行", - "所", - "然", - "家", - "种", - "事", - "成", - "方", - "多", - "经", - "么", - "去", - "法", - "学", - "如", - "都", - "同", - "现", - "当", - "没", - "动", - "面", - "起", - "看", - "定", - "天", - "分", - "还", - "进", - "好", - "小", - "部", - "其", - "些", - "主", - "样", - "理", - "心", - "她", - "本", - "前", - "开", - "但", - "因", - "只", - "从", - "想", - "实", - ], - "Ukrainian": [ - "о", - "а", - "н", - "і", - "и", - "р", - "в", - "т", - "е", - "с", - "к", - "л", - "у", - "д", - "м", - "п", - "з", - "я", - "ь", - "б", - "г", - "й", - "ч", - "х", - "ц", - "ї", - ], - "Norwegian": [ - "e", - "r", - "n", - "t", - "a", - "s", - "i", - "o", - "l", - "d", - "g", - "k", - "m", - "v", - "f", - "p", - "u", - "b", - "h", - "å", - "y", - "j", - "ø", - "c", - "æ", - "w", - ], - "Finnish": [ - "a", - "i", - "n", - "t", - "e", - "s", - "l", - "o", - "u", - "k", - "ä", - "m", - "r", - "v", - "j", - "h", - "p", - "y", - "d", - "ö", - "g", - "c", - "b", - "f", - "w", - "z", - ], - "Vietnamese": [ - "n", - "h", - "t", - "i", - "c", - "g", - "a", - "o", - "u", - "m", - "l", - "r", - "à", - "đ", - "s", - "e", - "v", - "p", - "b", - "y", - "ư", - "d", - "á", - "k", - "ộ", - "ế", - ], - "Czech": [ - "o", - "e", - "a", - "n", - "t", - "s", - "i", - "l", - "v", - "r", - "k", - "d", - "u", - "m", - "p", - "í", - "c", - "h", - "z", - "á", - "y", - "j", - "b", - "ě", - "é", - "ř", - ], - "Hungarian": [ - "e", - "a", - "t", - "l", - "s", - "n", - "k", - "r", - "i", - "o", - "z", - "á", - "é", - "g", - "m", - "b", - "y", - "v", - "d", - "h", - "u", - "p", - "j", - "ö", - "f", - "c", - ], - "Korean": [ - "이", - "다", - "에", - "의", - "는", - "로", - "하", - "을", - "가", - "고", - "지", - "서", - "한", - "은", - "기", - "으", - "년", - "대", - "사", - "시", - "를", - "리", - "도", - "인", - "스", - "일", - ], - "Indonesian": [ - "a", - "n", - "e", - "i", - "r", - "t", - "u", - "s", - "d", - "k", - "m", - "l", - "g", - "p", - "b", - "o", - "h", - "y", - "j", - "c", - "w", - "f", - "v", - "z", - "x", - "q", - ], - "Turkish": [ - "a", - "e", - "i", - "n", - "r", - "l", - "ı", - "k", - "d", - "t", - "s", - "m", - "y", - "u", - "o", - "b", - "ü", - "ş", - "v", - "g", - "z", - "h", - "c", - "p", - "ç", - "ğ", - ], - "Romanian": [ - "e", - "i", - "a", - "r", - "n", - "t", - "u", - "l", - "o", - "c", - "s", - "d", - "p", - "m", - "ă", - "f", - "v", - "î", - "g", - "b", - "ș", - "ț", - "z", - "h", - "â", - "j", - ], - "Farsi": [ - "ا", - "ی", - "ر", - "د", - "ن", - "ه", - "و", - "م", - "ت", - "ب", - "س", - "ل", - "ک", - "ش", - "ز", - "ف", - "گ", - "ع", - "خ", - "ق", - "ج", - "آ", - "پ", - "ح", - "ط", - "ص", - ], - "Arabic": [ - "ا", - "ل", - "ي", - "م", - "و", - "ن", - "ر", - "ت", - "ب", - "ة", - "ع", - "د", - "س", - "ف", - "ه", - "ك", - "ق", - "أ", - "ح", - "ج", - "ش", - "ط", - "ص", - "ى", - "خ", - "إ", - ], - "Danish": [ - "e", - "r", - "n", - "t", - "a", - "i", - "s", - "d", - "l", - "o", - "g", - "m", - "k", - "f", - "v", - "u", - "b", - "h", - "p", - "å", - "y", - "ø", - "æ", - "c", - "j", - "w", - ], - "Serbian": [ - "а", - "и", - "о", - "е", - "н", - "р", - "с", - "у", - "т", - "к", - "ј", - "в", - "д", - "м", - "п", - "л", - "г", - "з", - "б", - "a", - "i", - "e", - "o", - "n", - "ц", - "ш", - ], - "Lithuanian": [ - "i", - "a", - "s", - "o", - "r", - "e", - "t", - "n", - "u", - "k", - "m", - "l", - "p", - "v", - "d", - "j", - "g", - "ė", - "b", - "y", - "ų", - "š", - "ž", - "c", - "ą", - "į", - ], - "Slovene": [ - "e", - "a", - "i", - "o", - "n", - "r", - "s", - "l", - "t", - "j", - "v", - "k", - "d", - "p", - "m", - "u", - "z", - "b", - "g", - "h", - "č", - "c", - "š", - "ž", - "f", - "y", - ], - "Slovak": [ - "o", - "a", - "e", - "n", - "i", - "r", - "v", - "t", - "s", - "l", - "k", - "d", - "m", - "p", - "u", - "c", - "h", - "j", - "b", - "z", - "á", - "y", - "ý", - "í", - "č", - "é", - ], - "Hebrew": [ - "י", - "ו", - "ה", - "ל", - "ר", - "ב", - "ת", - "מ", - "א", - "ש", - "נ", - "ע", - "ם", - "ד", - "ק", - "ח", - "פ", - "ס", - "כ", - "ג", - "ט", - "צ", - "ן", - "ז", - "ך", - ], - "Bulgarian": [ - "а", - "и", - "о", - "е", - "н", - "т", - "р", - "с", - "в", - "л", - "к", - "д", - "п", - "м", - "з", - "г", - "я", - "ъ", - "у", - "б", - "ч", - "ц", - "й", - "ж", - "щ", - "х", - ], - "Croatian": [ - "a", - "i", - "o", - "e", - "n", - "r", - "j", - "s", - "t", - "u", - "k", - "l", - "v", - "d", - "m", - "p", - "g", - "z", - "b", - "c", - "č", - "h", - "š", - "ž", - "ć", - "f", - ], - "Hindi": [ - "क", - "र", - "स", - "न", - "त", - "म", - "ह", - "प", - "य", - "ल", - "व", - "ज", - "द", - "ग", - "ब", - "श", - "ट", - "अ", - "ए", - "थ", - "भ", - "ड", - "च", - "ध", - "ष", - "इ", - ], - "Estonian": [ - "a", - "i", - "e", - "s", - "t", - "l", - "u", - "n", - "o", - "k", - "r", - "d", - "m", - "v", - "g", - "p", - "j", - "h", - "ä", - "b", - "õ", - "ü", - "f", - "c", - "ö", - "y", - ], - "Thai": [ - "า", - "น", - "ร", - "อ", - "ก", - "เ", - "ง", - "ม", - "ย", - "ล", - "ว", - "ด", - "ท", - "ส", - "ต", - "ะ", - "ป", - "บ", - "ค", - "ห", - "แ", - "จ", - "พ", - "ช", - "ข", - "ใ", - ], - "Greek": [ - "α", - "τ", - "ο", - "ι", - "ε", - "ν", - "ρ", - "σ", - "κ", - "η", - "π", - "ς", - "υ", - "μ", - "λ", - "ί", - "ό", - "ά", - "γ", - "έ", - "δ", - "ή", - "ω", - "χ", - "θ", - "ύ", - ], - "Tamil": [ - "க", - "த", - "ப", - "ட", - "ர", - "ம", - "ல", - "ன", - "வ", - "ற", - "ய", - "ள", - "ச", - "ந", - "இ", - "ண", - "அ", - "ஆ", - "ழ", - "ங", - "எ", - "உ", - "ஒ", - "ஸ", - ], - "Kazakh": [ - "а", - "ы", - "е", - "н", - "т", - "р", - "л", - "і", - "д", - "с", - "м", - "қ", - "к", - "о", - "б", - "и", - "у", - "ғ", - "ж", - "ң", - "з", - "ш", - "й", - "п", - "г", - "ө", - ], -} - -LANGUAGE_SUPPORTED_COUNT: int = len(FREQUENCIES) diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/legacy.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/legacy.py deleted file mode 100644 index 360a3107..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/legacy.py +++ /dev/null @@ -1,80 +0,0 @@ -from __future__ import annotations - -from typing import TYPE_CHECKING, Any -from warnings import warn - -from .api import from_bytes -from .constant import CHARDET_CORRESPONDENCE, TOO_SMALL_SEQUENCE - -# TODO: remove this check when dropping Python 3.7 support -if TYPE_CHECKING: - from typing_extensions import TypedDict - - class ResultDict(TypedDict): - encoding: str | None - language: str - confidence: float | None - - -def detect( - byte_str: bytes, should_rename_legacy: bool = False, **kwargs: Any -) -> ResultDict: - """ - chardet legacy method - Detect the encoding of the given byte string. It should be mostly backward-compatible. - Encoding name will match Chardet own writing whenever possible. (Not on encoding name unsupported by it) - This function is deprecated and should be used to migrate your project easily, consult the documentation for - further information. Not planned for removal. - - :param byte_str: The byte sequence to examine. - :param should_rename_legacy: Should we rename legacy encodings - to their more modern equivalents? - """ - if len(kwargs): - warn( - f"charset-normalizer disregard arguments '{','.join(list(kwargs.keys()))}' in legacy function detect()" - ) - - if not isinstance(byte_str, (bytearray, bytes)): - raise TypeError( # pragma: nocover - f"Expected object of type bytes or bytearray, got: {type(byte_str)}" - ) - - if isinstance(byte_str, bytearray): - byte_str = bytes(byte_str) - - r = from_bytes(byte_str).best() - - encoding = r.encoding if r is not None else None - language = r.language if r is not None and r.language != "Unknown" else "" - confidence = 1.0 - r.chaos if r is not None else None - - # automatically lower confidence - # on small bytes samples. - # https://github.com/jawah/charset_normalizer/issues/391 - if ( - confidence is not None - and confidence >= 0.9 - and encoding - not in { - "utf_8", - "ascii", - } - and r.bom is False # type: ignore[union-attr] - and len(byte_str) < TOO_SMALL_SEQUENCE - ): - confidence -= 0.2 - - # Note: CharsetNormalizer does not return 'UTF-8-SIG' as the sig get stripped in the detection/normalization process - # but chardet does return 'utf-8-sig' and it is a valid codec name. - if r is not None and encoding == "utf_8" and r.bom: - encoding += "_sig" - - if should_rename_legacy is False and encoding in CHARDET_CORRESPONDENCE: - encoding = CHARDET_CORRESPONDENCE[encoding] - - return { - "encoding": encoding, - "language": language, - "confidence": confidence, - } diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/md.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/md.py deleted file mode 100644 index 12ce024b..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/md.py +++ /dev/null @@ -1,635 +0,0 @@ -from __future__ import annotations - -from functools import lru_cache -from logging import getLogger - -from .constant import ( - COMMON_SAFE_ASCII_CHARACTERS, - TRACE, - UNICODE_SECONDARY_RANGE_KEYWORD, -) -from .utils import ( - is_accentuated, - is_arabic, - is_arabic_isolated_form, - is_case_variable, - is_cjk, - is_emoticon, - is_hangul, - is_hiragana, - is_katakana, - is_latin, - is_punctuation, - is_separator, - is_symbol, - is_thai, - is_unprintable, - remove_accent, - unicode_range, - is_cjk_uncommon, -) - - -class MessDetectorPlugin: - """ - Base abstract class used for mess detection plugins. - All detectors MUST extend and implement given methods. - """ - - def eligible(self, character: str) -> bool: - """ - Determine if given character should be fed in. - """ - raise NotImplementedError # pragma: nocover - - def feed(self, character: str) -> None: - """ - The main routine to be executed upon character. - Insert the logic in witch the text would be considered chaotic. - """ - raise NotImplementedError # pragma: nocover - - def reset(self) -> None: # pragma: no cover - """ - Permit to reset the plugin to the initial state. - """ - raise NotImplementedError - - @property - def ratio(self) -> float: - """ - Compute the chaos ratio based on what your feed() has seen. - Must NOT be lower than 0.; No restriction gt 0. - """ - raise NotImplementedError # pragma: nocover - - -class TooManySymbolOrPunctuationPlugin(MessDetectorPlugin): - def __init__(self) -> None: - self._punctuation_count: int = 0 - self._symbol_count: int = 0 - self._character_count: int = 0 - - self._last_printable_char: str | None = None - self._frenzy_symbol_in_word: bool = False - - def eligible(self, character: str) -> bool: - return character.isprintable() - - def feed(self, character: str) -> None: - self._character_count += 1 - - if ( - character != self._last_printable_char - and character not in COMMON_SAFE_ASCII_CHARACTERS - ): - if is_punctuation(character): - self._punctuation_count += 1 - elif ( - character.isdigit() is False - and is_symbol(character) - and is_emoticon(character) is False - ): - self._symbol_count += 2 - - self._last_printable_char = character - - def reset(self) -> None: # Abstract - self._punctuation_count = 0 - self._character_count = 0 - self._symbol_count = 0 - - @property - def ratio(self) -> float: - if self._character_count == 0: - return 0.0 - - ratio_of_punctuation: float = ( - self._punctuation_count + self._symbol_count - ) / self._character_count - - return ratio_of_punctuation if ratio_of_punctuation >= 0.3 else 0.0 - - -class TooManyAccentuatedPlugin(MessDetectorPlugin): - def __init__(self) -> None: - self._character_count: int = 0 - self._accentuated_count: int = 0 - - def eligible(self, character: str) -> bool: - return character.isalpha() - - def feed(self, character: str) -> None: - self._character_count += 1 - - if is_accentuated(character): - self._accentuated_count += 1 - - def reset(self) -> None: # Abstract - self._character_count = 0 - self._accentuated_count = 0 - - @property - def ratio(self) -> float: - if self._character_count < 8: - return 0.0 - - ratio_of_accentuation: float = self._accentuated_count / self._character_count - return ratio_of_accentuation if ratio_of_accentuation >= 0.35 else 0.0 - - -class UnprintablePlugin(MessDetectorPlugin): - def __init__(self) -> None: - self._unprintable_count: int = 0 - self._character_count: int = 0 - - def eligible(self, character: str) -> bool: - return True - - def feed(self, character: str) -> None: - if is_unprintable(character): - self._unprintable_count += 1 - self._character_count += 1 - - def reset(self) -> None: # Abstract - self._unprintable_count = 0 - - @property - def ratio(self) -> float: - if self._character_count == 0: - return 0.0 - - return (self._unprintable_count * 8) / self._character_count - - -class SuspiciousDuplicateAccentPlugin(MessDetectorPlugin): - def __init__(self) -> None: - self._successive_count: int = 0 - self._character_count: int = 0 - - self._last_latin_character: str | None = None - - def eligible(self, character: str) -> bool: - return character.isalpha() and is_latin(character) - - def feed(self, character: str) -> None: - self._character_count += 1 - if ( - self._last_latin_character is not None - and is_accentuated(character) - and is_accentuated(self._last_latin_character) - ): - if character.isupper() and self._last_latin_character.isupper(): - self._successive_count += 1 - # Worse if its the same char duplicated with different accent. - if remove_accent(character) == remove_accent(self._last_latin_character): - self._successive_count += 1 - self._last_latin_character = character - - def reset(self) -> None: # Abstract - self._successive_count = 0 - self._character_count = 0 - self._last_latin_character = None - - @property - def ratio(self) -> float: - if self._character_count == 0: - return 0.0 - - return (self._successive_count * 2) / self._character_count - - -class SuspiciousRange(MessDetectorPlugin): - def __init__(self) -> None: - self._suspicious_successive_range_count: int = 0 - self._character_count: int = 0 - self._last_printable_seen: str | None = None - - def eligible(self, character: str) -> bool: - return character.isprintable() - - def feed(self, character: str) -> None: - self._character_count += 1 - - if ( - character.isspace() - or is_punctuation(character) - or character in COMMON_SAFE_ASCII_CHARACTERS - ): - self._last_printable_seen = None - return - - if self._last_printable_seen is None: - self._last_printable_seen = character - return - - unicode_range_a: str | None = unicode_range(self._last_printable_seen) - unicode_range_b: str | None = unicode_range(character) - - if is_suspiciously_successive_range(unicode_range_a, unicode_range_b): - self._suspicious_successive_range_count += 1 - - self._last_printable_seen = character - - def reset(self) -> None: # Abstract - self._character_count = 0 - self._suspicious_successive_range_count = 0 - self._last_printable_seen = None - - @property - def ratio(self) -> float: - if self._character_count <= 13: - return 0.0 - - ratio_of_suspicious_range_usage: float = ( - self._suspicious_successive_range_count * 2 - ) / self._character_count - - return ratio_of_suspicious_range_usage - - -class SuperWeirdWordPlugin(MessDetectorPlugin): - def __init__(self) -> None: - self._word_count: int = 0 - self._bad_word_count: int = 0 - self._foreign_long_count: int = 0 - - self._is_current_word_bad: bool = False - self._foreign_long_watch: bool = False - - self._character_count: int = 0 - self._bad_character_count: int = 0 - - self._buffer: str = "" - self._buffer_accent_count: int = 0 - self._buffer_glyph_count: int = 0 - - def eligible(self, character: str) -> bool: - return True - - def feed(self, character: str) -> None: - if character.isalpha(): - self._buffer += character - if is_accentuated(character): - self._buffer_accent_count += 1 - if ( - self._foreign_long_watch is False - and (is_latin(character) is False or is_accentuated(character)) - and is_cjk(character) is False - and is_hangul(character) is False - and is_katakana(character) is False - and is_hiragana(character) is False - and is_thai(character) is False - ): - self._foreign_long_watch = True - if ( - is_cjk(character) - or is_hangul(character) - or is_katakana(character) - or is_hiragana(character) - or is_thai(character) - ): - self._buffer_glyph_count += 1 - return - if not self._buffer: - return - if ( - character.isspace() or is_punctuation(character) or is_separator(character) - ) and self._buffer: - self._word_count += 1 - buffer_length: int = len(self._buffer) - - self._character_count += buffer_length - - if buffer_length >= 4: - if self._buffer_accent_count / buffer_length >= 0.5: - self._is_current_word_bad = True - # Word/Buffer ending with an upper case accentuated letter are so rare, - # that we will consider them all as suspicious. Same weight as foreign_long suspicious. - elif ( - is_accentuated(self._buffer[-1]) - and self._buffer[-1].isupper() - and all(_.isupper() for _ in self._buffer) is False - ): - self._foreign_long_count += 1 - self._is_current_word_bad = True - elif self._buffer_glyph_count == 1: - self._is_current_word_bad = True - self._foreign_long_count += 1 - if buffer_length >= 24 and self._foreign_long_watch: - camel_case_dst = [ - i - for c, i in zip(self._buffer, range(0, buffer_length)) - if c.isupper() - ] - probable_camel_cased: bool = False - - if camel_case_dst and (len(camel_case_dst) / buffer_length <= 0.3): - probable_camel_cased = True - - if not probable_camel_cased: - self._foreign_long_count += 1 - self._is_current_word_bad = True - - if self._is_current_word_bad: - self._bad_word_count += 1 - self._bad_character_count += len(self._buffer) - self._is_current_word_bad = False - - self._foreign_long_watch = False - self._buffer = "" - self._buffer_accent_count = 0 - self._buffer_glyph_count = 0 - elif ( - character not in {"<", ">", "-", "=", "~", "|", "_"} - and character.isdigit() is False - and is_symbol(character) - ): - self._is_current_word_bad = True - self._buffer += character - - def reset(self) -> None: # Abstract - self._buffer = "" - self._is_current_word_bad = False - self._foreign_long_watch = False - self._bad_word_count = 0 - self._word_count = 0 - self._character_count = 0 - self._bad_character_count = 0 - self._foreign_long_count = 0 - - @property - def ratio(self) -> float: - if self._word_count <= 10 and self._foreign_long_count == 0: - return 0.0 - - return self._bad_character_count / self._character_count - - -class CjkUncommonPlugin(MessDetectorPlugin): - """ - Detect messy CJK text that probably means nothing. - """ - - def __init__(self) -> None: - self._character_count: int = 0 - self._uncommon_count: int = 0 - - def eligible(self, character: str) -> bool: - return is_cjk(character) - - def feed(self, character: str) -> None: - self._character_count += 1 - - if is_cjk_uncommon(character): - self._uncommon_count += 1 - return - - def reset(self) -> None: # Abstract - self._character_count = 0 - self._uncommon_count = 0 - - @property - def ratio(self) -> float: - if self._character_count < 8: - return 0.0 - - uncommon_form_usage: float = self._uncommon_count / self._character_count - - # we can be pretty sure it's garbage when uncommon characters are widely - # used. otherwise it could just be traditional chinese for example. - return uncommon_form_usage / 10 if uncommon_form_usage > 0.5 else 0.0 - - -class ArchaicUpperLowerPlugin(MessDetectorPlugin): - def __init__(self) -> None: - self._buf: bool = False - - self._character_count_since_last_sep: int = 0 - - self._successive_upper_lower_count: int = 0 - self._successive_upper_lower_count_final: int = 0 - - self._character_count: int = 0 - - self._last_alpha_seen: str | None = None - self._current_ascii_only: bool = True - - def eligible(self, character: str) -> bool: - return True - - def feed(self, character: str) -> None: - is_concerned = character.isalpha() and is_case_variable(character) - chunk_sep = is_concerned is False - - if chunk_sep and self._character_count_since_last_sep > 0: - if ( - self._character_count_since_last_sep <= 64 - and character.isdigit() is False - and self._current_ascii_only is False - ): - self._successive_upper_lower_count_final += ( - self._successive_upper_lower_count - ) - - self._successive_upper_lower_count = 0 - self._character_count_since_last_sep = 0 - self._last_alpha_seen = None - self._buf = False - self._character_count += 1 - self._current_ascii_only = True - - return - - if self._current_ascii_only is True and character.isascii() is False: - self._current_ascii_only = False - - if self._last_alpha_seen is not None: - if (character.isupper() and self._last_alpha_seen.islower()) or ( - character.islower() and self._last_alpha_seen.isupper() - ): - if self._buf is True: - self._successive_upper_lower_count += 2 - self._buf = False - else: - self._buf = True - else: - self._buf = False - - self._character_count += 1 - self._character_count_since_last_sep += 1 - self._last_alpha_seen = character - - def reset(self) -> None: # Abstract - self._character_count = 0 - self._character_count_since_last_sep = 0 - self._successive_upper_lower_count = 0 - self._successive_upper_lower_count_final = 0 - self._last_alpha_seen = None - self._buf = False - self._current_ascii_only = True - - @property - def ratio(self) -> float: - if self._character_count == 0: - return 0.0 - - return self._successive_upper_lower_count_final / self._character_count - - -class ArabicIsolatedFormPlugin(MessDetectorPlugin): - def __init__(self) -> None: - self._character_count: int = 0 - self._isolated_form_count: int = 0 - - def reset(self) -> None: # Abstract - self._character_count = 0 - self._isolated_form_count = 0 - - def eligible(self, character: str) -> bool: - return is_arabic(character) - - def feed(self, character: str) -> None: - self._character_count += 1 - - if is_arabic_isolated_form(character): - self._isolated_form_count += 1 - - @property - def ratio(self) -> float: - if self._character_count < 8: - return 0.0 - - isolated_form_usage: float = self._isolated_form_count / self._character_count - - return isolated_form_usage - - -@lru_cache(maxsize=1024) -def is_suspiciously_successive_range( - unicode_range_a: str | None, unicode_range_b: str | None -) -> bool: - """ - Determine if two Unicode range seen next to each other can be considered as suspicious. - """ - if unicode_range_a is None or unicode_range_b is None: - return True - - if unicode_range_a == unicode_range_b: - return False - - if "Latin" in unicode_range_a and "Latin" in unicode_range_b: - return False - - if "Emoticons" in unicode_range_a or "Emoticons" in unicode_range_b: - return False - - # Latin characters can be accompanied with a combining diacritical mark - # eg. Vietnamese. - if ("Latin" in unicode_range_a or "Latin" in unicode_range_b) and ( - "Combining" in unicode_range_a or "Combining" in unicode_range_b - ): - return False - - keywords_range_a, keywords_range_b = ( - unicode_range_a.split(" "), - unicode_range_b.split(" "), - ) - - for el in keywords_range_a: - if el in UNICODE_SECONDARY_RANGE_KEYWORD: - continue - if el in keywords_range_b: - return False - - # Japanese Exception - range_a_jp_chars, range_b_jp_chars = ( - unicode_range_a - in ( - "Hiragana", - "Katakana", - ), - unicode_range_b in ("Hiragana", "Katakana"), - ) - if (range_a_jp_chars or range_b_jp_chars) and ( - "CJK" in unicode_range_a or "CJK" in unicode_range_b - ): - return False - if range_a_jp_chars and range_b_jp_chars: - return False - - if "Hangul" in unicode_range_a or "Hangul" in unicode_range_b: - if "CJK" in unicode_range_a or "CJK" in unicode_range_b: - return False - if unicode_range_a == "Basic Latin" or unicode_range_b == "Basic Latin": - return False - - # Chinese/Japanese use dedicated range for punctuation and/or separators. - if ("CJK" in unicode_range_a or "CJK" in unicode_range_b) or ( - unicode_range_a in ["Katakana", "Hiragana"] - and unicode_range_b in ["Katakana", "Hiragana"] - ): - if "Punctuation" in unicode_range_a or "Punctuation" in unicode_range_b: - return False - if "Forms" in unicode_range_a or "Forms" in unicode_range_b: - return False - if unicode_range_a == "Basic Latin" or unicode_range_b == "Basic Latin": - return False - - return True - - -@lru_cache(maxsize=2048) -def mess_ratio( - decoded_sequence: str, maximum_threshold: float = 0.2, debug: bool = False -) -> float: - """ - Compute a mess ratio given a decoded bytes sequence. The maximum threshold does stop the computation earlier. - """ - - detectors: list[MessDetectorPlugin] = [ - md_class() for md_class in MessDetectorPlugin.__subclasses__() - ] - - length: int = len(decoded_sequence) + 1 - - mean_mess_ratio: float = 0.0 - - if length < 512: - intermediary_mean_mess_ratio_calc: int = 32 - elif length <= 1024: - intermediary_mean_mess_ratio_calc = 64 - else: - intermediary_mean_mess_ratio_calc = 128 - - for character, index in zip(decoded_sequence + "\n", range(length)): - for detector in detectors: - if detector.eligible(character): - detector.feed(character) - - if ( - index > 0 and index % intermediary_mean_mess_ratio_calc == 0 - ) or index == length - 1: - mean_mess_ratio = sum(dt.ratio for dt in detectors) - - if mean_mess_ratio >= maximum_threshold: - break - - if debug: - logger = getLogger("charset_normalizer") - - logger.log( - TRACE, - "Mess-detector extended-analysis start. " - f"intermediary_mean_mess_ratio_calc={intermediary_mean_mess_ratio_calc} mean_mess_ratio={mean_mess_ratio} " - f"maximum_threshold={maximum_threshold}", - ) - - if len(decoded_sequence) > 16: - logger.log(TRACE, f"Starting with: {decoded_sequence[:16]}") - logger.log(TRACE, f"Ending with: {decoded_sequence[-16::]}") - - for dt in detectors: - logger.log(TRACE, f"{dt.__class__}: {dt.ratio}") - - return round(mean_mess_ratio, 3) diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/models.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/models.py deleted file mode 100644 index 1042758f..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/models.py +++ /dev/null @@ -1,360 +0,0 @@ -from __future__ import annotations - -from encodings.aliases import aliases -from hashlib import sha256 -from json import dumps -from re import sub -from typing import Any, Iterator, List, Tuple - -from .constant import RE_POSSIBLE_ENCODING_INDICATION, TOO_BIG_SEQUENCE -from .utils import iana_name, is_multi_byte_encoding, unicode_range - - -class CharsetMatch: - def __init__( - self, - payload: bytes, - guessed_encoding: str, - mean_mess_ratio: float, - has_sig_or_bom: bool, - languages: CoherenceMatches, - decoded_payload: str | None = None, - preemptive_declaration: str | None = None, - ): - self._payload: bytes = payload - - self._encoding: str = guessed_encoding - self._mean_mess_ratio: float = mean_mess_ratio - self._languages: CoherenceMatches = languages - self._has_sig_or_bom: bool = has_sig_or_bom - self._unicode_ranges: list[str] | None = None - - self._leaves: list[CharsetMatch] = [] - self._mean_coherence_ratio: float = 0.0 - - self._output_payload: bytes | None = None - self._output_encoding: str | None = None - - self._string: str | None = decoded_payload - - self._preemptive_declaration: str | None = preemptive_declaration - - def __eq__(self, other: object) -> bool: - if not isinstance(other, CharsetMatch): - if isinstance(other, str): - return iana_name(other) == self.encoding - return False - return self.encoding == other.encoding and self.fingerprint == other.fingerprint - - def __lt__(self, other: object) -> bool: - """ - Implemented to make sorted available upon CharsetMatches items. - """ - if not isinstance(other, CharsetMatch): - raise ValueError - - chaos_difference: float = abs(self.chaos - other.chaos) - coherence_difference: float = abs(self.coherence - other.coherence) - - # Below 1% difference --> Use Coherence - if chaos_difference < 0.01 and coherence_difference > 0.02: - return self.coherence > other.coherence - elif chaos_difference < 0.01 and coherence_difference <= 0.02: - # When having a difficult decision, use the result that decoded as many multi-byte as possible. - # preserve RAM usage! - if len(self._payload) >= TOO_BIG_SEQUENCE: - return self.chaos < other.chaos - return self.multi_byte_usage > other.multi_byte_usage - - return self.chaos < other.chaos - - @property - def multi_byte_usage(self) -> float: - return 1.0 - (len(str(self)) / len(self.raw)) - - def __str__(self) -> str: - # Lazy Str Loading - if self._string is None: - self._string = str(self._payload, self._encoding, "strict") - return self._string - - def __repr__(self) -> str: - return f"" - - def add_submatch(self, other: CharsetMatch) -> None: - if not isinstance(other, CharsetMatch) or other == self: - raise ValueError( - "Unable to add instance <{}> as a submatch of a CharsetMatch".format( - other.__class__ - ) - ) - - other._string = None # Unload RAM usage; dirty trick. - self._leaves.append(other) - - @property - def encoding(self) -> str: - return self._encoding - - @property - def encoding_aliases(self) -> list[str]: - """ - Encoding name are known by many name, using this could help when searching for IBM855 when it's listed as CP855. - """ - also_known_as: list[str] = [] - for u, p in aliases.items(): - if self.encoding == u: - also_known_as.append(p) - elif self.encoding == p: - also_known_as.append(u) - return also_known_as - - @property - def bom(self) -> bool: - return self._has_sig_or_bom - - @property - def byte_order_mark(self) -> bool: - return self._has_sig_or_bom - - @property - def languages(self) -> list[str]: - """ - Return the complete list of possible languages found in decoded sequence. - Usually not really useful. Returned list may be empty even if 'language' property return something != 'Unknown'. - """ - return [e[0] for e in self._languages] - - @property - def language(self) -> str: - """ - Most probable language found in decoded sequence. If none were detected or inferred, the property will return - "Unknown". - """ - if not self._languages: - # Trying to infer the language based on the given encoding - # Its either English or we should not pronounce ourselves in certain cases. - if "ascii" in self.could_be_from_charset: - return "English" - - # doing it there to avoid circular import - from charset_normalizer.cd import encoding_languages, mb_encoding_languages - - languages = ( - mb_encoding_languages(self.encoding) - if is_multi_byte_encoding(self.encoding) - else encoding_languages(self.encoding) - ) - - if len(languages) == 0 or "Latin Based" in languages: - return "Unknown" - - return languages[0] - - return self._languages[0][0] - - @property - def chaos(self) -> float: - return self._mean_mess_ratio - - @property - def coherence(self) -> float: - if not self._languages: - return 0.0 - return self._languages[0][1] - - @property - def percent_chaos(self) -> float: - return round(self.chaos * 100, ndigits=3) - - @property - def percent_coherence(self) -> float: - return round(self.coherence * 100, ndigits=3) - - @property - def raw(self) -> bytes: - """ - Original untouched bytes. - """ - return self._payload - - @property - def submatch(self) -> list[CharsetMatch]: - return self._leaves - - @property - def has_submatch(self) -> bool: - return len(self._leaves) > 0 - - @property - def alphabets(self) -> list[str]: - if self._unicode_ranges is not None: - return self._unicode_ranges - # list detected ranges - detected_ranges: list[str | None] = [unicode_range(char) for char in str(self)] - # filter and sort - self._unicode_ranges = sorted(list({r for r in detected_ranges if r})) - return self._unicode_ranges - - @property - def could_be_from_charset(self) -> list[str]: - """ - The complete list of encoding that output the exact SAME str result and therefore could be the originating - encoding. - This list does include the encoding available in property 'encoding'. - """ - return [self._encoding] + [m.encoding for m in self._leaves] - - def output(self, encoding: str = "utf_8") -> bytes: - """ - Method to get re-encoded bytes payload using given target encoding. Default to UTF-8. - Any errors will be simply ignored by the encoder NOT replaced. - """ - if self._output_encoding is None or self._output_encoding != encoding: - self._output_encoding = encoding - decoded_string = str(self) - if ( - self._preemptive_declaration is not None - and self._preemptive_declaration.lower() - not in ["utf-8", "utf8", "utf_8"] - ): - patched_header = sub( - RE_POSSIBLE_ENCODING_INDICATION, - lambda m: m.string[m.span()[0] : m.span()[1]].replace( - m.groups()[0], - iana_name(self._output_encoding).replace("_", "-"), # type: ignore[arg-type] - ), - decoded_string[:8192], - count=1, - ) - - decoded_string = patched_header + decoded_string[8192:] - - self._output_payload = decoded_string.encode(encoding, "replace") - - return self._output_payload # type: ignore - - @property - def fingerprint(self) -> str: - """ - Retrieve the unique SHA256 computed using the transformed (re-encoded) payload. Not the original one. - """ - return sha256(self.output()).hexdigest() - - -class CharsetMatches: - """ - Container with every CharsetMatch items ordered by default from most probable to the less one. - Act like a list(iterable) but does not implements all related methods. - """ - - def __init__(self, results: list[CharsetMatch] | None = None): - self._results: list[CharsetMatch] = sorted(results) if results else [] - - def __iter__(self) -> Iterator[CharsetMatch]: - yield from self._results - - def __getitem__(self, item: int | str) -> CharsetMatch: - """ - Retrieve a single item either by its position or encoding name (alias may be used here). - Raise KeyError upon invalid index or encoding not present in results. - """ - if isinstance(item, int): - return self._results[item] - if isinstance(item, str): - item = iana_name(item, False) - for result in self._results: - if item in result.could_be_from_charset: - return result - raise KeyError - - def __len__(self) -> int: - return len(self._results) - - def __bool__(self) -> bool: - return len(self._results) > 0 - - def append(self, item: CharsetMatch) -> None: - """ - Insert a single match. Will be inserted accordingly to preserve sort. - Can be inserted as a submatch. - """ - if not isinstance(item, CharsetMatch): - raise ValueError( - "Cannot append instance '{}' to CharsetMatches".format( - str(item.__class__) - ) - ) - # We should disable the submatch factoring when the input file is too heavy (conserve RAM usage) - if len(item.raw) < TOO_BIG_SEQUENCE: - for match in self._results: - if match.fingerprint == item.fingerprint and match.chaos == item.chaos: - match.add_submatch(item) - return - self._results.append(item) - self._results = sorted(self._results) - - def best(self) -> CharsetMatch | None: - """ - Simply return the first match. Strict equivalent to matches[0]. - """ - if not self._results: - return None - return self._results[0] - - def first(self) -> CharsetMatch | None: - """ - Redundant method, call the method best(). Kept for BC reasons. - """ - return self.best() - - -CoherenceMatch = Tuple[str, float] -CoherenceMatches = List[CoherenceMatch] - - -class CliDetectionResult: - def __init__( - self, - path: str, - encoding: str | None, - encoding_aliases: list[str], - alternative_encodings: list[str], - language: str, - alphabets: list[str], - has_sig_or_bom: bool, - chaos: float, - coherence: float, - unicode_path: str | None, - is_preferred: bool, - ): - self.path: str = path - self.unicode_path: str | None = unicode_path - self.encoding: str | None = encoding - self.encoding_aliases: list[str] = encoding_aliases - self.alternative_encodings: list[str] = alternative_encodings - self.language: str = language - self.alphabets: list[str] = alphabets - self.has_sig_or_bom: bool = has_sig_or_bom - self.chaos: float = chaos - self.coherence: float = coherence - self.is_preferred: bool = is_preferred - - @property - def __dict__(self) -> dict[str, Any]: # type: ignore - return { - "path": self.path, - "encoding": self.encoding, - "encoding_aliases": self.encoding_aliases, - "alternative_encodings": self.alternative_encodings, - "language": self.language, - "alphabets": self.alphabets, - "has_sig_or_bom": self.has_sig_or_bom, - "chaos": self.chaos, - "coherence": self.coherence, - "unicode_path": self.unicode_path, - "is_preferred": self.is_preferred, - } - - def to_json(self) -> str: - return dumps(self.__dict__, ensure_ascii=True, indent=4) diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/py.typed b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/py.typed deleted file mode 100644 index e69de29b..00000000 diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/utils.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/utils.py deleted file mode 100644 index 6bf0384c..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/utils.py +++ /dev/null @@ -1,414 +0,0 @@ -from __future__ import annotations - -import importlib -import logging -import unicodedata -from codecs import IncrementalDecoder -from encodings.aliases import aliases -from functools import lru_cache -from re import findall -from typing import Generator - -from _multibytecodec import ( # type: ignore[import-not-found,import] - MultibyteIncrementalDecoder, -) - -from .constant import ( - ENCODING_MARKS, - IANA_SUPPORTED_SIMILAR, - RE_POSSIBLE_ENCODING_INDICATION, - UNICODE_RANGES_COMBINED, - UNICODE_SECONDARY_RANGE_KEYWORD, - UTF8_MAXIMAL_ALLOCATION, - COMMON_CJK_CHARACTERS, -) - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_accentuated(character: str) -> bool: - try: - description: str = unicodedata.name(character) - except ValueError: # Defensive: unicode database outdated? - return False - return ( - "WITH GRAVE" in description - or "WITH ACUTE" in description - or "WITH CEDILLA" in description - or "WITH DIAERESIS" in description - or "WITH CIRCUMFLEX" in description - or "WITH TILDE" in description - or "WITH MACRON" in description - or "WITH RING ABOVE" in description - ) - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def remove_accent(character: str) -> str: - decomposed: str = unicodedata.decomposition(character) - if not decomposed: - return character - - codes: list[str] = decomposed.split(" ") - - return chr(int(codes[0], 16)) - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def unicode_range(character: str) -> str | None: - """ - Retrieve the Unicode range official name from a single character. - """ - character_ord: int = ord(character) - - for range_name, ord_range in UNICODE_RANGES_COMBINED.items(): - if character_ord in ord_range: - return range_name - - return None - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_latin(character: str) -> bool: - try: - description: str = unicodedata.name(character) - except ValueError: # Defensive: unicode database outdated? - return False - return "LATIN" in description - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_punctuation(character: str) -> bool: - character_category: str = unicodedata.category(character) - - if "P" in character_category: - return True - - character_range: str | None = unicode_range(character) - - if character_range is None: - return False - - return "Punctuation" in character_range - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_symbol(character: str) -> bool: - character_category: str = unicodedata.category(character) - - if "S" in character_category or "N" in character_category: - return True - - character_range: str | None = unicode_range(character) - - if character_range is None: - return False - - return "Forms" in character_range and character_category != "Lo" - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_emoticon(character: str) -> bool: - character_range: str | None = unicode_range(character) - - if character_range is None: - return False - - return "Emoticons" in character_range or "Pictographs" in character_range - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_separator(character: str) -> bool: - if character.isspace() or character in {"|", "+", "<", ">"}: - return True - - character_category: str = unicodedata.category(character) - - return "Z" in character_category or character_category in {"Po", "Pd", "Pc"} - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_case_variable(character: str) -> bool: - return character.islower() != character.isupper() - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_cjk(character: str) -> bool: - try: - character_name = unicodedata.name(character) - except ValueError: # Defensive: unicode database outdated? - return False - - return "CJK" in character_name - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_hiragana(character: str) -> bool: - try: - character_name = unicodedata.name(character) - except ValueError: # Defensive: unicode database outdated? - return False - - return "HIRAGANA" in character_name - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_katakana(character: str) -> bool: - try: - character_name = unicodedata.name(character) - except ValueError: # Defensive: unicode database outdated? - return False - - return "KATAKANA" in character_name - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_hangul(character: str) -> bool: - try: - character_name = unicodedata.name(character) - except ValueError: # Defensive: unicode database outdated? - return False - - return "HANGUL" in character_name - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_thai(character: str) -> bool: - try: - character_name = unicodedata.name(character) - except ValueError: # Defensive: unicode database outdated? - return False - - return "THAI" in character_name - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_arabic(character: str) -> bool: - try: - character_name = unicodedata.name(character) - except ValueError: # Defensive: unicode database outdated? - return False - - return "ARABIC" in character_name - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_arabic_isolated_form(character: str) -> bool: - try: - character_name = unicodedata.name(character) - except ValueError: # Defensive: unicode database outdated? - return False - - return "ARABIC" in character_name and "ISOLATED FORM" in character_name - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_cjk_uncommon(character: str) -> bool: - return character not in COMMON_CJK_CHARACTERS - - -@lru_cache(maxsize=len(UNICODE_RANGES_COMBINED)) -def is_unicode_range_secondary(range_name: str) -> bool: - return any(keyword in range_name for keyword in UNICODE_SECONDARY_RANGE_KEYWORD) - - -@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) -def is_unprintable(character: str) -> bool: - return ( - character.isspace() is False # includes \n \t \r \v - and character.isprintable() is False - and character != "\x1a" # Why? Its the ASCII substitute character. - and character != "\ufeff" # bug discovered in Python, - # Zero Width No-Break Space located in Arabic Presentation Forms-B, Unicode 1.1 not acknowledged as space. - ) - - -def any_specified_encoding(sequence: bytes, search_zone: int = 8192) -> str | None: - """ - Extract using ASCII-only decoder any specified encoding in the first n-bytes. - """ - if not isinstance(sequence, bytes): - raise TypeError - - seq_len: int = len(sequence) - - results: list[str] = findall( - RE_POSSIBLE_ENCODING_INDICATION, - sequence[: min(seq_len, search_zone)].decode("ascii", errors="ignore"), - ) - - if len(results) == 0: - return None - - for specified_encoding in results: - specified_encoding = specified_encoding.lower().replace("-", "_") - - encoding_alias: str - encoding_iana: str - - for encoding_alias, encoding_iana in aliases.items(): - if encoding_alias == specified_encoding: - return encoding_iana - if encoding_iana == specified_encoding: - return encoding_iana - - return None - - -@lru_cache(maxsize=128) -def is_multi_byte_encoding(name: str) -> bool: - """ - Verify is a specific encoding is a multi byte one based on it IANA name - """ - return name in { - "utf_8", - "utf_8_sig", - "utf_16", - "utf_16_be", - "utf_16_le", - "utf_32", - "utf_32_le", - "utf_32_be", - "utf_7", - } or issubclass( - importlib.import_module(f"encodings.{name}").IncrementalDecoder, - MultibyteIncrementalDecoder, - ) - - -def identify_sig_or_bom(sequence: bytes) -> tuple[str | None, bytes]: - """ - Identify and extract SIG/BOM in given sequence. - """ - - for iana_encoding in ENCODING_MARKS: - marks: bytes | list[bytes] = ENCODING_MARKS[iana_encoding] - - if isinstance(marks, bytes): - marks = [marks] - - for mark in marks: - if sequence.startswith(mark): - return iana_encoding, mark - - return None, b"" - - -def should_strip_sig_or_bom(iana_encoding: str) -> bool: - return iana_encoding not in {"utf_16", "utf_32"} - - -def iana_name(cp_name: str, strict: bool = True) -> str: - """Returns the Python normalized encoding name (Not the IANA official name).""" - cp_name = cp_name.lower().replace("-", "_") - - encoding_alias: str - encoding_iana: str - - for encoding_alias, encoding_iana in aliases.items(): - if cp_name in [encoding_alias, encoding_iana]: - return encoding_iana - - if strict: - raise ValueError(f"Unable to retrieve IANA for '{cp_name}'") - - return cp_name - - -def cp_similarity(iana_name_a: str, iana_name_b: str) -> float: - if is_multi_byte_encoding(iana_name_a) or is_multi_byte_encoding(iana_name_b): - return 0.0 - - decoder_a = importlib.import_module(f"encodings.{iana_name_a}").IncrementalDecoder - decoder_b = importlib.import_module(f"encodings.{iana_name_b}").IncrementalDecoder - - id_a: IncrementalDecoder = decoder_a(errors="ignore") - id_b: IncrementalDecoder = decoder_b(errors="ignore") - - character_match_count: int = 0 - - for i in range(255): - to_be_decoded: bytes = bytes([i]) - if id_a.decode(to_be_decoded) == id_b.decode(to_be_decoded): - character_match_count += 1 - - return character_match_count / 254 - - -def is_cp_similar(iana_name_a: str, iana_name_b: str) -> bool: - """ - Determine if two code page are at least 80% similar. IANA_SUPPORTED_SIMILAR dict was generated using - the function cp_similarity. - """ - return ( - iana_name_a in IANA_SUPPORTED_SIMILAR - and iana_name_b in IANA_SUPPORTED_SIMILAR[iana_name_a] - ) - - -def set_logging_handler( - name: str = "charset_normalizer", - level: int = logging.INFO, - format_string: str = "%(asctime)s | %(levelname)s | %(message)s", -) -> None: - logger = logging.getLogger(name) - logger.setLevel(level) - - handler = logging.StreamHandler() - handler.setFormatter(logging.Formatter(format_string)) - logger.addHandler(handler) - - -def cut_sequence_chunks( - sequences: bytes, - encoding_iana: str, - offsets: range, - chunk_size: int, - bom_or_sig_available: bool, - strip_sig_or_bom: bool, - sig_payload: bytes, - is_multi_byte_decoder: bool, - decoded_payload: str | None = None, -) -> Generator[str, None, None]: - if decoded_payload and is_multi_byte_decoder is False: - for i in offsets: - chunk = decoded_payload[i : i + chunk_size] - if not chunk: - break - yield chunk - else: - for i in offsets: - chunk_end = i + chunk_size - if chunk_end > len(sequences) + 8: - continue - - cut_sequence = sequences[i : i + chunk_size] - - if bom_or_sig_available and strip_sig_or_bom is False: - cut_sequence = sig_payload + cut_sequence - - chunk = cut_sequence.decode( - encoding_iana, - errors="ignore" if is_multi_byte_decoder else "strict", - ) - - # multi-byte bad cutting detector and adjustment - # not the cleanest way to perform that fix but clever enough for now. - if is_multi_byte_decoder and i > 0: - chunk_partial_size_chk: int = min(chunk_size, 16) - - if ( - decoded_payload - and chunk[:chunk_partial_size_chk] not in decoded_payload - ): - for j in range(i, i - 4, -1): - cut_sequence = sequences[j:chunk_end] - - if bom_or_sig_available and strip_sig_or_bom is False: - cut_sequence = sig_payload + cut_sequence - - chunk = cut_sequence.decode(encoding_iana, errors="ignore") - - if chunk[:chunk_partial_size_chk] in decoded_payload: - break - - yield chunk diff --git a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/version.py b/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/version.py deleted file mode 100644 index c843e533..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/charset_normalizer/version.py +++ /dev/null @@ -1,8 +0,0 @@ -""" -Expose version -""" - -from __future__ import annotations - -__version__ = "3.4.4" -VERSION = __version__.split(".") diff --git a/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/INSTALLER b/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/INSTALLER deleted file mode 100644 index a1b589e3..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/INSTALLER +++ /dev/null @@ -1 +0,0 @@ -pip diff --git a/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/LICENSE.md b/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/LICENSE.md deleted file mode 100644 index 19b6b452..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/LICENSE.md +++ /dev/null @@ -1,31 +0,0 @@ -BSD 3-Clause License - -Copyright (c) 2013-2024, Kim Davies and contributors. -All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are -met: - -1. Redistributions of source code must retain the above copyright - notice, this list of conditions and the following disclaimer. - -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. - -3. Neither the name of the copyright holder nor the names of its - contributors may be used to endorse or promote products derived from - this software without specific prior written permission. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS -"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT -LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR -A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT -HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, -SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED -TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR -PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF -LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING -NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS -SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/METADATA b/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/METADATA deleted file mode 100644 index c42623e9..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/METADATA +++ /dev/null @@ -1,250 +0,0 @@ -Metadata-Version: 2.1 -Name: idna -Version: 3.10 -Summary: Internationalized Domain Names in Applications (IDNA) -Author-email: Kim Davies -Requires-Python: >=3.6 -Description-Content-Type: text/x-rst -Classifier: Development Status :: 5 - Production/Stable -Classifier: Intended Audience :: Developers -Classifier: Intended Audience :: System Administrators -Classifier: License :: OSI Approved :: BSD License -Classifier: Operating System :: OS Independent -Classifier: Programming Language :: Python -Classifier: Programming Language :: Python :: 3 -Classifier: Programming Language :: Python :: 3 :: Only -Classifier: Programming Language :: Python :: 3.6 -Classifier: Programming Language :: Python :: 3.7 -Classifier: Programming Language :: Python :: 3.8 -Classifier: Programming Language :: Python :: 3.9 -Classifier: Programming Language :: Python :: 3.10 -Classifier: Programming Language :: Python :: 3.11 -Classifier: Programming Language :: Python :: 3.12 -Classifier: Programming Language :: Python :: 3.13 -Classifier: Programming Language :: Python :: Implementation :: CPython -Classifier: Programming Language :: Python :: Implementation :: PyPy -Classifier: Topic :: Internet :: Name Service (DNS) -Classifier: Topic :: Software Development :: Libraries :: Python Modules -Classifier: Topic :: Utilities -Requires-Dist: ruff >= 0.6.2 ; extra == "all" -Requires-Dist: mypy >= 1.11.2 ; extra == "all" -Requires-Dist: pytest >= 8.3.2 ; extra == "all" -Requires-Dist: flake8 >= 7.1.1 ; extra == "all" -Project-URL: Changelog, https://github.com/kjd/idna/blob/master/HISTORY.rst -Project-URL: Issue tracker, https://github.com/kjd/idna/issues -Project-URL: Source, https://github.com/kjd/idna -Provides-Extra: all - -Internationalized Domain Names in Applications (IDNA) -===================================================== - -Support for the Internationalized Domain Names in -Applications (IDNA) protocol as specified in `RFC 5891 -`_. This is the latest version of -the protocol and is sometimes referred to as “IDNA 2008”. - -This library also provides support for Unicode Technical -Standard 46, `Unicode IDNA Compatibility Processing -`_. - -This acts as a suitable replacement for the “encodings.idna” -module that comes with the Python standard library, but which -only supports the older superseded IDNA specification (`RFC 3490 -`_). - -Basic functions are simply executed: - -.. code-block:: pycon - - >>> import idna - >>> idna.encode('ドメイン.テスト') - b'xn--eckwd4c7c.xn--zckzah' - >>> print(idna.decode('xn--eckwd4c7c.xn--zckzah')) - ドメイン.テスト - - -Installation ------------- - -This package is available for installation from PyPI: - -.. code-block:: bash - - $ python3 -m pip install idna - - -Usage ------ - -For typical usage, the ``encode`` and ``decode`` functions will take a -domain name argument and perform a conversion to A-labels or U-labels -respectively. - -.. code-block:: pycon - - >>> import idna - >>> idna.encode('ドメイン.テスト') - b'xn--eckwd4c7c.xn--zckzah' - >>> print(idna.decode('xn--eckwd4c7c.xn--zckzah')) - ドメイン.テスト - -You may use the codec encoding and decoding methods using the -``idna.codec`` module: - -.. code-block:: pycon - - >>> import idna.codec - >>> print('домен.испытание'.encode('idna2008')) - b'xn--d1acufc.xn--80akhbyknj4f' - >>> print(b'xn--d1acufc.xn--80akhbyknj4f'.decode('idna2008')) - домен.испытание - -Conversions can be applied at a per-label basis using the ``ulabel`` or -``alabel`` functions if necessary: - -.. code-block:: pycon - - >>> idna.alabel('测试') - b'xn--0zwm56d' - -Compatibility Mapping (UTS #46) -+++++++++++++++++++++++++++++++ - -As described in `RFC 5895 `_, the -IDNA specification does not normalize input from different potential -ways a user may input a domain name. This functionality, known as -a “mapping”, is considered by the specification to be a local -user-interface issue distinct from IDNA conversion functionality. - -This library provides one such mapping that was developed by the -Unicode Consortium. Known as `Unicode IDNA Compatibility Processing -`_, it provides for both a regular -mapping for typical applications, as well as a transitional mapping to -help migrate from older IDNA 2003 applications. Strings are -preprocessed according to Section 4.4 “Preprocessing for IDNA2008” -prior to the IDNA operations. - -For example, “Königsgäßchen” is not a permissible label as *LATIN -CAPITAL LETTER K* is not allowed (nor are capital letters in general). -UTS 46 will convert this into lower case prior to applying the IDNA -conversion. - -.. code-block:: pycon - - >>> import idna - >>> idna.encode('Königsgäßchen') - ... - idna.core.InvalidCodepoint: Codepoint U+004B at position 1 of 'Königsgäßchen' not allowed - >>> idna.encode('Königsgäßchen', uts46=True) - b'xn--knigsgchen-b4a3dun' - >>> print(idna.decode('xn--knigsgchen-b4a3dun')) - königsgäßchen - -Transitional processing provides conversions to help transition from -the older 2003 standard to the current standard. For example, in the -original IDNA specification, the *LATIN SMALL LETTER SHARP S* (ß) was -converted into two *LATIN SMALL LETTER S* (ss), whereas in the current -IDNA specification this conversion is not performed. - -.. code-block:: pycon - - >>> idna.encode('Königsgäßchen', uts46=True, transitional=True) - 'xn--knigsgsschen-lcb0w' - -Implementers should use transitional processing with caution, only in -rare cases where conversion from legacy labels to current labels must be -performed (i.e. IDNA implementations that pre-date 2008). For typical -applications that just need to convert labels, transitional processing -is unlikely to be beneficial and could produce unexpected incompatible -results. - -``encodings.idna`` Compatibility -++++++++++++++++++++++++++++++++ - -Function calls from the Python built-in ``encodings.idna`` module are -mapped to their IDNA 2008 equivalents using the ``idna.compat`` module. -Simply substitute the ``import`` clause in your code to refer to the new -module name. - -Exceptions ----------- - -All errors raised during the conversion following the specification -should raise an exception derived from the ``idna.IDNAError`` base -class. - -More specific exceptions that may be generated as ``idna.IDNABidiError`` -when the error reflects an illegal combination of left-to-right and -right-to-left characters in a label; ``idna.InvalidCodepoint`` when -a specific codepoint is an illegal character in an IDN label (i.e. -INVALID); and ``idna.InvalidCodepointContext`` when the codepoint is -illegal based on its positional context (i.e. it is CONTEXTO or CONTEXTJ -but the contextual requirements are not satisfied.) - -Building and Diagnostics ------------------------- - -The IDNA and UTS 46 functionality relies upon pre-calculated lookup -tables for performance. These tables are derived from computing against -eligibility criteria in the respective standards. These tables are -computed using the command-line script ``tools/idna-data``. - -This tool will fetch relevant codepoint data from the Unicode repository -and perform the required calculations to identify eligibility. There are -three main modes: - -* ``idna-data make-libdata``. Generates ``idnadata.py`` and - ``uts46data.py``, the pre-calculated lookup tables used for IDNA and - UTS 46 conversions. Implementers who wish to track this library against - a different Unicode version may use this tool to manually generate a - different version of the ``idnadata.py`` and ``uts46data.py`` files. - -* ``idna-data make-table``. Generate a table of the IDNA disposition - (e.g. PVALID, CONTEXTJ, CONTEXTO) in the format found in Appendix - B.1 of RFC 5892 and the pre-computed tables published by `IANA - `_. - -* ``idna-data U+0061``. Prints debugging output on the various - properties associated with an individual Unicode codepoint (in this - case, U+0061), that are used to assess the IDNA and UTS 46 status of a - codepoint. This is helpful in debugging or analysis. - -The tool accepts a number of arguments, described using ``idna-data --h``. Most notably, the ``--version`` argument allows the specification -of the version of Unicode to be used in computing the table data. For -example, ``idna-data --version 9.0.0 make-libdata`` will generate -library data against Unicode 9.0.0. - - -Additional Notes ----------------- - -* **Packages**. The latest tagged release version is published in the - `Python Package Index `_. - -* **Version support**. This library supports Python 3.6 and higher. - As this library serves as a low-level toolkit for a variety of - applications, many of which strive for broad compatibility with older - Python versions, there is no rush to remove older interpreter support. - Removing support for older versions should be well justified in that the - maintenance burden has become too high. - -* **Python 2**. Python 2 is supported by version 2.x of this library. - Use "idna<3" in your requirements file if you need this library for - a Python 2 application. Be advised that these versions are no longer - actively developed. - -* **Testing**. The library has a test suite based on each rule of the - IDNA specification, as well as tests that are provided as part of the - Unicode Technical Standard 46, `Unicode IDNA Compatibility Processing - `_. - -* **Emoji**. It is an occasional request to support emoji domains in - this library. Encoding of symbols like emoji is expressly prohibited by - the technical standard IDNA 2008 and emoji domains are broadly phased - out across the domain industry due to associated security risks. For - now, applications that need to support these non-compliant labels - may wish to consider trying the encode/decode operation in this library - first, and then falling back to using `encodings.idna`. See `the Github - project `_ for more discussion. - diff --git a/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/RECORD b/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/RECORD deleted file mode 100644 index 7a4ed46b..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/RECORD +++ /dev/null @@ -1,22 +0,0 @@ -idna-3.10.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4 -idna-3.10.dist-info/LICENSE.md,sha256=pZ8LDvNjWHQQmkRhykT_enDVBpboFHZ7-vch1Mmw2w8,1541 -idna-3.10.dist-info/METADATA,sha256=URR5ZyDfQ1PCEGhkYoojqfi2Ra0tau2--lhwG4XSfjI,10158 -idna-3.10.dist-info/RECORD,, -idna-3.10.dist-info/WHEEL,sha256=EZbGkh7Ie4PoZfRQ8I0ZuP9VklN_TvcZ6DSE5Uar4z4,81 -idna/__init__.py,sha256=MPqNDLZbXqGaNdXxAFhiqFPKEQXju2jNQhCey6-5eJM,868 -idna/__pycache__/__init__.cpython-37.pyc,, -idna/__pycache__/codec.cpython-37.pyc,, -idna/__pycache__/compat.cpython-37.pyc,, -idna/__pycache__/core.cpython-37.pyc,, -idna/__pycache__/idnadata.cpython-37.pyc,, -idna/__pycache__/intranges.cpython-37.pyc,, -idna/__pycache__/package_data.cpython-37.pyc,, -idna/__pycache__/uts46data.cpython-37.pyc,, -idna/codec.py,sha256=PEew3ItwzjW4hymbasnty2N2OXvNcgHB-JjrBuxHPYY,3422 -idna/compat.py,sha256=RzLy6QQCdl9784aFhb2EX9EKGCJjg0P3PilGdeXXcx8,316 -idna/core.py,sha256=YJYyAMnwiQEPjVC4-Fqu_p4CJ6yKKuDGmppBNQNQpFs,13239 -idna/idnadata.py,sha256=W30GcIGvtOWYwAjZj4ZjuouUutC6ffgNuyjJy7fZ-lo,78306 -idna/intranges.py,sha256=amUtkdhYcQG8Zr-CoMM_kVRacxkivC1WgxN1b63KKdU,1898 -idna/package_data.py,sha256=q59S3OXsc5VI8j6vSD0sGBMyk6zZ4vWFREE88yCJYKs,21 -idna/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 -idna/uts46data.py,sha256=rt90K9J40gUSwppDPCrhjgi5AA6pWM65dEGRSf6rIhM,239289 diff --git a/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/WHEEL b/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/WHEEL deleted file mode 100644 index 3b5e64b5..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna-3.10.dist-info/WHEEL +++ /dev/null @@ -1,4 +0,0 @@ -Wheel-Version: 1.0 -Generator: flit 3.9.0 -Root-Is-Purelib: true -Tag: py3-none-any diff --git a/vscode-extension/context-engine-uploader/python_libs/idna/__init__.py b/vscode-extension/context-engine-uploader/python_libs/idna/__init__.py deleted file mode 100644 index cfdc030a..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna/__init__.py +++ /dev/null @@ -1,45 +0,0 @@ -from .core import ( - IDNABidiError, - IDNAError, - InvalidCodepoint, - InvalidCodepointContext, - alabel, - check_bidi, - check_hyphen_ok, - check_initial_combiner, - check_label, - check_nfc, - decode, - encode, - ulabel, - uts46_remap, - valid_contextj, - valid_contexto, - valid_label_length, - valid_string_length, -) -from .intranges import intranges_contain -from .package_data import __version__ - -__all__ = [ - "__version__", - "IDNABidiError", - "IDNAError", - "InvalidCodepoint", - "InvalidCodepointContext", - "alabel", - "check_bidi", - "check_hyphen_ok", - "check_initial_combiner", - "check_label", - "check_nfc", - "decode", - "encode", - "intranges_contain", - "ulabel", - "uts46_remap", - "valid_contextj", - "valid_contexto", - "valid_label_length", - "valid_string_length", -] diff --git a/vscode-extension/context-engine-uploader/python_libs/idna/codec.py b/vscode-extension/context-engine-uploader/python_libs/idna/codec.py deleted file mode 100644 index 913abfd6..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna/codec.py +++ /dev/null @@ -1,122 +0,0 @@ -import codecs -import re -from typing import Any, Optional, Tuple - -from .core import IDNAError, alabel, decode, encode, ulabel - -_unicode_dots_re = re.compile("[\u002e\u3002\uff0e\uff61]") - - -class Codec(codecs.Codec): - def encode(self, data: str, errors: str = "strict") -> Tuple[bytes, int]: - if errors != "strict": - raise IDNAError('Unsupported error handling "{}"'.format(errors)) - - if not data: - return b"", 0 - - return encode(data), len(data) - - def decode(self, data: bytes, errors: str = "strict") -> Tuple[str, int]: - if errors != "strict": - raise IDNAError('Unsupported error handling "{}"'.format(errors)) - - if not data: - return "", 0 - - return decode(data), len(data) - - -class IncrementalEncoder(codecs.BufferedIncrementalEncoder): - def _buffer_encode(self, data: str, errors: str, final: bool) -> Tuple[bytes, int]: - if errors != "strict": - raise IDNAError('Unsupported error handling "{}"'.format(errors)) - - if not data: - return b"", 0 - - labels = _unicode_dots_re.split(data) - trailing_dot = b"" - if labels: - if not labels[-1]: - trailing_dot = b"." - del labels[-1] - elif not final: - # Keep potentially unfinished label until the next call - del labels[-1] - if labels: - trailing_dot = b"." - - result = [] - size = 0 - for label in labels: - result.append(alabel(label)) - if size: - size += 1 - size += len(label) - - # Join with U+002E - result_bytes = b".".join(result) + trailing_dot - size += len(trailing_dot) - return result_bytes, size - - -class IncrementalDecoder(codecs.BufferedIncrementalDecoder): - def _buffer_decode(self, data: Any, errors: str, final: bool) -> Tuple[str, int]: - if errors != "strict": - raise IDNAError('Unsupported error handling "{}"'.format(errors)) - - if not data: - return ("", 0) - - if not isinstance(data, str): - data = str(data, "ascii") - - labels = _unicode_dots_re.split(data) - trailing_dot = "" - if labels: - if not labels[-1]: - trailing_dot = "." - del labels[-1] - elif not final: - # Keep potentially unfinished label until the next call - del labels[-1] - if labels: - trailing_dot = "." - - result = [] - size = 0 - for label in labels: - result.append(ulabel(label)) - if size: - size += 1 - size += len(label) - - result_str = ".".join(result) + trailing_dot - size += len(trailing_dot) - return (result_str, size) - - -class StreamWriter(Codec, codecs.StreamWriter): - pass - - -class StreamReader(Codec, codecs.StreamReader): - pass - - -def search_function(name: str) -> Optional[codecs.CodecInfo]: - if name != "idna2008": - return None - return codecs.CodecInfo( - name=name, - encode=Codec().encode, - decode=Codec().decode, - incrementalencoder=IncrementalEncoder, - incrementaldecoder=IncrementalDecoder, - streamwriter=StreamWriter, - streamreader=StreamReader, - ) - - -codecs.register(search_function) diff --git a/vscode-extension/context-engine-uploader/python_libs/idna/compat.py b/vscode-extension/context-engine-uploader/python_libs/idna/compat.py deleted file mode 100644 index 1df9f2a7..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna/compat.py +++ /dev/null @@ -1,15 +0,0 @@ -from typing import Any, Union - -from .core import decode, encode - - -def ToASCII(label: str) -> bytes: - return encode(label) - - -def ToUnicode(label: Union[bytes, bytearray]) -> str: - return decode(label) - - -def nameprep(s: Any) -> None: - raise NotImplementedError("IDNA 2008 does not utilise nameprep protocol") diff --git a/vscode-extension/context-engine-uploader/python_libs/idna/core.py b/vscode-extension/context-engine-uploader/python_libs/idna/core.py deleted file mode 100644 index 9115f123..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna/core.py +++ /dev/null @@ -1,437 +0,0 @@ -import bisect -import re -import unicodedata -from typing import Optional, Union - -from . import idnadata -from .intranges import intranges_contain - -_virama_combining_class = 9 -_alabel_prefix = b"xn--" -_unicode_dots_re = re.compile("[\u002e\u3002\uff0e\uff61]") - - -class IDNAError(UnicodeError): - """Base exception for all IDNA-encoding related problems""" - - pass - - -class IDNABidiError(IDNAError): - """Exception when bidirectional requirements are not satisfied""" - - pass - - -class InvalidCodepoint(IDNAError): - """Exception when a disallowed or unallocated codepoint is used""" - - pass - - -class InvalidCodepointContext(IDNAError): - """Exception when the codepoint is not valid in the context it is used""" - - pass - - -def _combining_class(cp: int) -> int: - v = unicodedata.combining(chr(cp)) - if v == 0: - if not unicodedata.name(chr(cp)): - raise ValueError("Unknown character in unicodedata") - return v - - -def _is_script(cp: str, script: str) -> bool: - return intranges_contain(ord(cp), idnadata.scripts[script]) - - -def _punycode(s: str) -> bytes: - return s.encode("punycode") - - -def _unot(s: int) -> str: - return "U+{:04X}".format(s) - - -def valid_label_length(label: Union[bytes, str]) -> bool: - if len(label) > 63: - return False - return True - - -def valid_string_length(label: Union[bytes, str], trailing_dot: bool) -> bool: - if len(label) > (254 if trailing_dot else 253): - return False - return True - - -def check_bidi(label: str, check_ltr: bool = False) -> bool: - # Bidi rules should only be applied if string contains RTL characters - bidi_label = False - for idx, cp in enumerate(label, 1): - direction = unicodedata.bidirectional(cp) - if direction == "": - # String likely comes from a newer version of Unicode - raise IDNABidiError("Unknown directionality in label {} at position {}".format(repr(label), idx)) - if direction in ["R", "AL", "AN"]: - bidi_label = True - if not bidi_label and not check_ltr: - return True - - # Bidi rule 1 - direction = unicodedata.bidirectional(label[0]) - if direction in ["R", "AL"]: - rtl = True - elif direction == "L": - rtl = False - else: - raise IDNABidiError("First codepoint in label {} must be directionality L, R or AL".format(repr(label))) - - valid_ending = False - number_type: Optional[str] = None - for idx, cp in enumerate(label, 1): - direction = unicodedata.bidirectional(cp) - - if rtl: - # Bidi rule 2 - if direction not in [ - "R", - "AL", - "AN", - "EN", - "ES", - "CS", - "ET", - "ON", - "BN", - "NSM", - ]: - raise IDNABidiError("Invalid direction for codepoint at position {} in a right-to-left label".format(idx)) - # Bidi rule 3 - if direction in ["R", "AL", "EN", "AN"]: - valid_ending = True - elif direction != "NSM": - valid_ending = False - # Bidi rule 4 - if direction in ["AN", "EN"]: - if not number_type: - number_type = direction - else: - if number_type != direction: - raise IDNABidiError("Can not mix numeral types in a right-to-left label") - else: - # Bidi rule 5 - if direction not in ["L", "EN", "ES", "CS", "ET", "ON", "BN", "NSM"]: - raise IDNABidiError("Invalid direction for codepoint at position {} in a left-to-right label".format(idx)) - # Bidi rule 6 - if direction in ["L", "EN"]: - valid_ending = True - elif direction != "NSM": - valid_ending = False - - if not valid_ending: - raise IDNABidiError("Label ends with illegal codepoint directionality") - - return True - - -def check_initial_combiner(label: str) -> bool: - if unicodedata.category(label[0])[0] == "M": - raise IDNAError("Label begins with an illegal combining character") - return True - - -def check_hyphen_ok(label: str) -> bool: - if label[2:4] == "--": - raise IDNAError("Label has disallowed hyphens in 3rd and 4th position") - if label[0] == "-" or label[-1] == "-": - raise IDNAError("Label must not start or end with a hyphen") - return True - - -def check_nfc(label: str) -> None: - if unicodedata.normalize("NFC", label) != label: - raise IDNAError("Label must be in Normalization Form C") - - -def valid_contextj(label: str, pos: int) -> bool: - cp_value = ord(label[pos]) - - if cp_value == 0x200C: - if pos > 0: - if _combining_class(ord(label[pos - 1])) == _virama_combining_class: - return True - - ok = False - for i in range(pos - 1, -1, -1): - joining_type = idnadata.joining_types.get(ord(label[i])) - if joining_type == ord("T"): - continue - elif joining_type in [ord("L"), ord("D")]: - ok = True - break - else: - break - - if not ok: - return False - - ok = False - for i in range(pos + 1, len(label)): - joining_type = idnadata.joining_types.get(ord(label[i])) - if joining_type == ord("T"): - continue - elif joining_type in [ord("R"), ord("D")]: - ok = True - break - else: - break - return ok - - if cp_value == 0x200D: - if pos > 0: - if _combining_class(ord(label[pos - 1])) == _virama_combining_class: - return True - return False - - else: - return False - - -def valid_contexto(label: str, pos: int, exception: bool = False) -> bool: - cp_value = ord(label[pos]) - - if cp_value == 0x00B7: - if 0 < pos < len(label) - 1: - if ord(label[pos - 1]) == 0x006C and ord(label[pos + 1]) == 0x006C: - return True - return False - - elif cp_value == 0x0375: - if pos < len(label) - 1 and len(label) > 1: - return _is_script(label[pos + 1], "Greek") - return False - - elif cp_value == 0x05F3 or cp_value == 0x05F4: - if pos > 0: - return _is_script(label[pos - 1], "Hebrew") - return False - - elif cp_value == 0x30FB: - for cp in label: - if cp == "\u30fb": - continue - if _is_script(cp, "Hiragana") or _is_script(cp, "Katakana") or _is_script(cp, "Han"): - return True - return False - - elif 0x660 <= cp_value <= 0x669: - for cp in label: - if 0x6F0 <= ord(cp) <= 0x06F9: - return False - return True - - elif 0x6F0 <= cp_value <= 0x6F9: - for cp in label: - if 0x660 <= ord(cp) <= 0x0669: - return False - return True - - return False - - -def check_label(label: Union[str, bytes, bytearray]) -> None: - if isinstance(label, (bytes, bytearray)): - label = label.decode("utf-8") - if len(label) == 0: - raise IDNAError("Empty Label") - - check_nfc(label) - check_hyphen_ok(label) - check_initial_combiner(label) - - for pos, cp in enumerate(label): - cp_value = ord(cp) - if intranges_contain(cp_value, idnadata.codepoint_classes["PVALID"]): - continue - elif intranges_contain(cp_value, idnadata.codepoint_classes["CONTEXTJ"]): - try: - if not valid_contextj(label, pos): - raise InvalidCodepointContext( - "Joiner {} not allowed at position {} in {}".format(_unot(cp_value), pos + 1, repr(label)) - ) - except ValueError: - raise IDNAError( - "Unknown codepoint adjacent to joiner {} at position {} in {}".format( - _unot(cp_value), pos + 1, repr(label) - ) - ) - elif intranges_contain(cp_value, idnadata.codepoint_classes["CONTEXTO"]): - if not valid_contexto(label, pos): - raise InvalidCodepointContext( - "Codepoint {} not allowed at position {} in {}".format(_unot(cp_value), pos + 1, repr(label)) - ) - else: - raise InvalidCodepoint( - "Codepoint {} at position {} of {} not allowed".format(_unot(cp_value), pos + 1, repr(label)) - ) - - check_bidi(label) - - -def alabel(label: str) -> bytes: - try: - label_bytes = label.encode("ascii") - ulabel(label_bytes) - if not valid_label_length(label_bytes): - raise IDNAError("Label too long") - return label_bytes - except UnicodeEncodeError: - pass - - check_label(label) - label_bytes = _alabel_prefix + _punycode(label) - - if not valid_label_length(label_bytes): - raise IDNAError("Label too long") - - return label_bytes - - -def ulabel(label: Union[str, bytes, bytearray]) -> str: - if not isinstance(label, (bytes, bytearray)): - try: - label_bytes = label.encode("ascii") - except UnicodeEncodeError: - check_label(label) - return label - else: - label_bytes = label - - label_bytes = label_bytes.lower() - if label_bytes.startswith(_alabel_prefix): - label_bytes = label_bytes[len(_alabel_prefix) :] - if not label_bytes: - raise IDNAError("Malformed A-label, no Punycode eligible content found") - if label_bytes.decode("ascii")[-1] == "-": - raise IDNAError("A-label must not end with a hyphen") - else: - check_label(label_bytes) - return label_bytes.decode("ascii") - - try: - label = label_bytes.decode("punycode") - except UnicodeError: - raise IDNAError("Invalid A-label") - check_label(label) - return label - - -def uts46_remap(domain: str, std3_rules: bool = True, transitional: bool = False) -> str: - """Re-map the characters in the string according to UTS46 processing.""" - from .uts46data import uts46data - - output = "" - - for pos, char in enumerate(domain): - code_point = ord(char) - try: - uts46row = uts46data[code_point if code_point < 256 else bisect.bisect_left(uts46data, (code_point, "Z")) - 1] - status = uts46row[1] - replacement: Optional[str] = None - if len(uts46row) == 3: - replacement = uts46row[2] - if ( - status == "V" - or (status == "D" and not transitional) - or (status == "3" and not std3_rules and replacement is None) - ): - output += char - elif replacement is not None and ( - status == "M" or (status == "3" and not std3_rules) or (status == "D" and transitional) - ): - output += replacement - elif status != "I": - raise IndexError() - except IndexError: - raise InvalidCodepoint( - "Codepoint {} not allowed at position {} in {}".format(_unot(code_point), pos + 1, repr(domain)) - ) - - return unicodedata.normalize("NFC", output) - - -def encode( - s: Union[str, bytes, bytearray], - strict: bool = False, - uts46: bool = False, - std3_rules: bool = False, - transitional: bool = False, -) -> bytes: - if not isinstance(s, str): - try: - s = str(s, "ascii") - except UnicodeDecodeError: - raise IDNAError("should pass a unicode string to the function rather than a byte string.") - if uts46: - s = uts46_remap(s, std3_rules, transitional) - trailing_dot = False - result = [] - if strict: - labels = s.split(".") - else: - labels = _unicode_dots_re.split(s) - if not labels or labels == [""]: - raise IDNAError("Empty domain") - if labels[-1] == "": - del labels[-1] - trailing_dot = True - for label in labels: - s = alabel(label) - if s: - result.append(s) - else: - raise IDNAError("Empty label") - if trailing_dot: - result.append(b"") - s = b".".join(result) - if not valid_string_length(s, trailing_dot): - raise IDNAError("Domain too long") - return s - - -def decode( - s: Union[str, bytes, bytearray], - strict: bool = False, - uts46: bool = False, - std3_rules: bool = False, -) -> str: - try: - if not isinstance(s, str): - s = str(s, "ascii") - except UnicodeDecodeError: - raise IDNAError("Invalid ASCII in A-label") - if uts46: - s = uts46_remap(s, std3_rules, False) - trailing_dot = False - result = [] - if not strict: - labels = _unicode_dots_re.split(s) - else: - labels = s.split(".") - if not labels or labels == [""]: - raise IDNAError("Empty domain") - if not labels[-1]: - del labels[-1] - trailing_dot = True - for label in labels: - s = ulabel(label) - if s: - result.append(s) - else: - raise IDNAError("Empty label") - if trailing_dot: - result.append("") - return ".".join(result) diff --git a/vscode-extension/context-engine-uploader/python_libs/idna/idnadata.py b/vscode-extension/context-engine-uploader/python_libs/idna/idnadata.py deleted file mode 100644 index 4be60046..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna/idnadata.py +++ /dev/null @@ -1,4243 +0,0 @@ -# This file is automatically generated by tools/idna-data - -__version__ = "15.1.0" -scripts = { - "Greek": ( - 0x37000000374, - 0x37500000378, - 0x37A0000037E, - 0x37F00000380, - 0x38400000385, - 0x38600000387, - 0x3880000038B, - 0x38C0000038D, - 0x38E000003A2, - 0x3A3000003E2, - 0x3F000000400, - 0x1D2600001D2B, - 0x1D5D00001D62, - 0x1D6600001D6B, - 0x1DBF00001DC0, - 0x1F0000001F16, - 0x1F1800001F1E, - 0x1F2000001F46, - 0x1F4800001F4E, - 0x1F5000001F58, - 0x1F5900001F5A, - 0x1F5B00001F5C, - 0x1F5D00001F5E, - 0x1F5F00001F7E, - 0x1F8000001FB5, - 0x1FB600001FC5, - 0x1FC600001FD4, - 0x1FD600001FDC, - 0x1FDD00001FF0, - 0x1FF200001FF5, - 0x1FF600001FFF, - 0x212600002127, - 0xAB650000AB66, - 0x101400001018F, - 0x101A0000101A1, - 0x1D2000001D246, - ), - "Han": ( - 0x2E8000002E9A, - 0x2E9B00002EF4, - 0x2F0000002FD6, - 0x300500003006, - 0x300700003008, - 0x30210000302A, - 0x30380000303C, - 0x340000004DC0, - 0x4E000000A000, - 0xF9000000FA6E, - 0xFA700000FADA, - 0x16FE200016FE4, - 0x16FF000016FF2, - 0x200000002A6E0, - 0x2A7000002B73A, - 0x2B7400002B81E, - 0x2B8200002CEA2, - 0x2CEB00002EBE1, - 0x2EBF00002EE5E, - 0x2F8000002FA1E, - 0x300000003134B, - 0x31350000323B0, - ), - "Hebrew": ( - 0x591000005C8, - 0x5D0000005EB, - 0x5EF000005F5, - 0xFB1D0000FB37, - 0xFB380000FB3D, - 0xFB3E0000FB3F, - 0xFB400000FB42, - 0xFB430000FB45, - 0xFB460000FB50, - ), - "Hiragana": ( - 0x304100003097, - 0x309D000030A0, - 0x1B0010001B120, - 0x1B1320001B133, - 0x1B1500001B153, - 0x1F2000001F201, - ), - "Katakana": ( - 0x30A1000030FB, - 0x30FD00003100, - 0x31F000003200, - 0x32D0000032FF, - 0x330000003358, - 0xFF660000FF70, - 0xFF710000FF9E, - 0x1AFF00001AFF4, - 0x1AFF50001AFFC, - 0x1AFFD0001AFFF, - 0x1B0000001B001, - 0x1B1200001B123, - 0x1B1550001B156, - 0x1B1640001B168, - ), -} -joining_types = { - 0xAD: 84, - 0x300: 84, - 0x301: 84, - 0x302: 84, - 0x303: 84, - 0x304: 84, - 0x305: 84, - 0x306: 84, - 0x307: 84, - 0x308: 84, - 0x309: 84, - 0x30A: 84, - 0x30B: 84, - 0x30C: 84, - 0x30D: 84, - 0x30E: 84, - 0x30F: 84, - 0x310: 84, - 0x311: 84, - 0x312: 84, - 0x313: 84, - 0x314: 84, - 0x315: 84, - 0x316: 84, - 0x317: 84, - 0x318: 84, - 0x319: 84, - 0x31A: 84, - 0x31B: 84, - 0x31C: 84, - 0x31D: 84, - 0x31E: 84, - 0x31F: 84, - 0x320: 84, - 0x321: 84, - 0x322: 84, - 0x323: 84, - 0x324: 84, - 0x325: 84, - 0x326: 84, - 0x327: 84, - 0x328: 84, - 0x329: 84, - 0x32A: 84, - 0x32B: 84, - 0x32C: 84, - 0x32D: 84, - 0x32E: 84, - 0x32F: 84, - 0x330: 84, - 0x331: 84, - 0x332: 84, - 0x333: 84, - 0x334: 84, - 0x335: 84, - 0x336: 84, - 0x337: 84, - 0x338: 84, - 0x339: 84, - 0x33A: 84, - 0x33B: 84, - 0x33C: 84, - 0x33D: 84, - 0x33E: 84, - 0x33F: 84, - 0x340: 84, - 0x341: 84, - 0x342: 84, - 0x343: 84, - 0x344: 84, - 0x345: 84, - 0x346: 84, - 0x347: 84, - 0x348: 84, - 0x349: 84, - 0x34A: 84, - 0x34B: 84, - 0x34C: 84, - 0x34D: 84, - 0x34E: 84, - 0x34F: 84, - 0x350: 84, - 0x351: 84, - 0x352: 84, - 0x353: 84, - 0x354: 84, - 0x355: 84, - 0x356: 84, - 0x357: 84, - 0x358: 84, - 0x359: 84, - 0x35A: 84, - 0x35B: 84, - 0x35C: 84, - 0x35D: 84, - 0x35E: 84, - 0x35F: 84, - 0x360: 84, - 0x361: 84, - 0x362: 84, - 0x363: 84, - 0x364: 84, - 0x365: 84, - 0x366: 84, - 0x367: 84, - 0x368: 84, - 0x369: 84, - 0x36A: 84, - 0x36B: 84, - 0x36C: 84, - 0x36D: 84, - 0x36E: 84, - 0x36F: 84, - 0x483: 84, - 0x484: 84, - 0x485: 84, - 0x486: 84, - 0x487: 84, - 0x488: 84, - 0x489: 84, - 0x591: 84, - 0x592: 84, - 0x593: 84, - 0x594: 84, - 0x595: 84, - 0x596: 84, - 0x597: 84, - 0x598: 84, - 0x599: 84, - 0x59A: 84, - 0x59B: 84, - 0x59C: 84, - 0x59D: 84, - 0x59E: 84, - 0x59F: 84, - 0x5A0: 84, - 0x5A1: 84, - 0x5A2: 84, - 0x5A3: 84, - 0x5A4: 84, - 0x5A5: 84, - 0x5A6: 84, - 0x5A7: 84, - 0x5A8: 84, - 0x5A9: 84, - 0x5AA: 84, - 0x5AB: 84, - 0x5AC: 84, - 0x5AD: 84, - 0x5AE: 84, - 0x5AF: 84, - 0x5B0: 84, - 0x5B1: 84, - 0x5B2: 84, - 0x5B3: 84, - 0x5B4: 84, - 0x5B5: 84, - 0x5B6: 84, - 0x5B7: 84, - 0x5B8: 84, - 0x5B9: 84, - 0x5BA: 84, - 0x5BB: 84, - 0x5BC: 84, - 0x5BD: 84, - 0x5BF: 84, - 0x5C1: 84, - 0x5C2: 84, - 0x5C4: 84, - 0x5C5: 84, - 0x5C7: 84, - 0x610: 84, - 0x611: 84, - 0x612: 84, - 0x613: 84, - 0x614: 84, - 0x615: 84, - 0x616: 84, - 0x617: 84, - 0x618: 84, - 0x619: 84, - 0x61A: 84, - 0x61C: 84, - 0x620: 68, - 0x622: 82, - 0x623: 82, - 0x624: 82, - 0x625: 82, - 0x626: 68, - 0x627: 82, - 0x628: 68, - 0x629: 82, - 0x62A: 68, - 0x62B: 68, - 0x62C: 68, - 0x62D: 68, - 0x62E: 68, - 0x62F: 82, - 0x630: 82, - 0x631: 82, - 0x632: 82, - 0x633: 68, - 0x634: 68, - 0x635: 68, - 0x636: 68, - 0x637: 68, - 0x638: 68, - 0x639: 68, - 0x63A: 68, - 0x63B: 68, - 0x63C: 68, - 0x63D: 68, - 0x63E: 68, - 0x63F: 68, - 0x640: 67, - 0x641: 68, - 0x642: 68, - 0x643: 68, - 0x644: 68, - 0x645: 68, - 0x646: 68, - 0x647: 68, - 0x648: 82, - 0x649: 68, - 0x64A: 68, - 0x64B: 84, - 0x64C: 84, - 0x64D: 84, - 0x64E: 84, - 0x64F: 84, - 0x650: 84, - 0x651: 84, - 0x652: 84, - 0x653: 84, - 0x654: 84, - 0x655: 84, - 0x656: 84, - 0x657: 84, - 0x658: 84, - 0x659: 84, - 0x65A: 84, - 0x65B: 84, - 0x65C: 84, - 0x65D: 84, - 0x65E: 84, - 0x65F: 84, - 0x66E: 68, - 0x66F: 68, - 0x670: 84, - 0x671: 82, - 0x672: 82, - 0x673: 82, - 0x675: 82, - 0x676: 82, - 0x677: 82, - 0x678: 68, - 0x679: 68, - 0x67A: 68, - 0x67B: 68, - 0x67C: 68, - 0x67D: 68, - 0x67E: 68, - 0x67F: 68, - 0x680: 68, - 0x681: 68, - 0x682: 68, - 0x683: 68, - 0x684: 68, - 0x685: 68, - 0x686: 68, - 0x687: 68, - 0x688: 82, - 0x689: 82, - 0x68A: 82, - 0x68B: 82, - 0x68C: 82, - 0x68D: 82, - 0x68E: 82, - 0x68F: 82, - 0x690: 82, - 0x691: 82, - 0x692: 82, - 0x693: 82, - 0x694: 82, - 0x695: 82, - 0x696: 82, - 0x697: 82, - 0x698: 82, - 0x699: 82, - 0x69A: 68, - 0x69B: 68, - 0x69C: 68, - 0x69D: 68, - 0x69E: 68, - 0x69F: 68, - 0x6A0: 68, - 0x6A1: 68, - 0x6A2: 68, - 0x6A3: 68, - 0x6A4: 68, - 0x6A5: 68, - 0x6A6: 68, - 0x6A7: 68, - 0x6A8: 68, - 0x6A9: 68, - 0x6AA: 68, - 0x6AB: 68, - 0x6AC: 68, - 0x6AD: 68, - 0x6AE: 68, - 0x6AF: 68, - 0x6B0: 68, - 0x6B1: 68, - 0x6B2: 68, - 0x6B3: 68, - 0x6B4: 68, - 0x6B5: 68, - 0x6B6: 68, - 0x6B7: 68, - 0x6B8: 68, - 0x6B9: 68, - 0x6BA: 68, - 0x6BB: 68, - 0x6BC: 68, - 0x6BD: 68, - 0x6BE: 68, - 0x6BF: 68, - 0x6C0: 82, - 0x6C1: 68, - 0x6C2: 68, - 0x6C3: 82, - 0x6C4: 82, - 0x6C5: 82, - 0x6C6: 82, - 0x6C7: 82, - 0x6C8: 82, - 0x6C9: 82, - 0x6CA: 82, - 0x6CB: 82, - 0x6CC: 68, - 0x6CD: 82, - 0x6CE: 68, - 0x6CF: 82, - 0x6D0: 68, - 0x6D1: 68, - 0x6D2: 82, - 0x6D3: 82, - 0x6D5: 82, - 0x6D6: 84, - 0x6D7: 84, - 0x6D8: 84, - 0x6D9: 84, - 0x6DA: 84, - 0x6DB: 84, - 0x6DC: 84, - 0x6DF: 84, - 0x6E0: 84, - 0x6E1: 84, - 0x6E2: 84, - 0x6E3: 84, - 0x6E4: 84, - 0x6E7: 84, - 0x6E8: 84, - 0x6EA: 84, - 0x6EB: 84, - 0x6EC: 84, - 0x6ED: 84, - 0x6EE: 82, - 0x6EF: 82, - 0x6FA: 68, - 0x6FB: 68, - 0x6FC: 68, - 0x6FF: 68, - 0x70F: 84, - 0x710: 82, - 0x711: 84, - 0x712: 68, - 0x713: 68, - 0x714: 68, - 0x715: 82, - 0x716: 82, - 0x717: 82, - 0x718: 82, - 0x719: 82, - 0x71A: 68, - 0x71B: 68, - 0x71C: 68, - 0x71D: 68, - 0x71E: 82, - 0x71F: 68, - 0x720: 68, - 0x721: 68, - 0x722: 68, - 0x723: 68, - 0x724: 68, - 0x725: 68, - 0x726: 68, - 0x727: 68, - 0x728: 82, - 0x729: 68, - 0x72A: 82, - 0x72B: 68, - 0x72C: 82, - 0x72D: 68, - 0x72E: 68, - 0x72F: 82, - 0x730: 84, - 0x731: 84, - 0x732: 84, - 0x733: 84, - 0x734: 84, - 0x735: 84, - 0x736: 84, - 0x737: 84, - 0x738: 84, - 0x739: 84, - 0x73A: 84, - 0x73B: 84, - 0x73C: 84, - 0x73D: 84, - 0x73E: 84, - 0x73F: 84, - 0x740: 84, - 0x741: 84, - 0x742: 84, - 0x743: 84, - 0x744: 84, - 0x745: 84, - 0x746: 84, - 0x747: 84, - 0x748: 84, - 0x749: 84, - 0x74A: 84, - 0x74D: 82, - 0x74E: 68, - 0x74F: 68, - 0x750: 68, - 0x751: 68, - 0x752: 68, - 0x753: 68, - 0x754: 68, - 0x755: 68, - 0x756: 68, - 0x757: 68, - 0x758: 68, - 0x759: 82, - 0x75A: 82, - 0x75B: 82, - 0x75C: 68, - 0x75D: 68, - 0x75E: 68, - 0x75F: 68, - 0x760: 68, - 0x761: 68, - 0x762: 68, - 0x763: 68, - 0x764: 68, - 0x765: 68, - 0x766: 68, - 0x767: 68, - 0x768: 68, - 0x769: 68, - 0x76A: 68, - 0x76B: 82, - 0x76C: 82, - 0x76D: 68, - 0x76E: 68, - 0x76F: 68, - 0x770: 68, - 0x771: 82, - 0x772: 68, - 0x773: 82, - 0x774: 82, - 0x775: 68, - 0x776: 68, - 0x777: 68, - 0x778: 82, - 0x779: 82, - 0x77A: 68, - 0x77B: 68, - 0x77C: 68, - 0x77D: 68, - 0x77E: 68, - 0x77F: 68, - 0x7A6: 84, - 0x7A7: 84, - 0x7A8: 84, - 0x7A9: 84, - 0x7AA: 84, - 0x7AB: 84, - 0x7AC: 84, - 0x7AD: 84, - 0x7AE: 84, - 0x7AF: 84, - 0x7B0: 84, - 0x7CA: 68, - 0x7CB: 68, - 0x7CC: 68, - 0x7CD: 68, - 0x7CE: 68, - 0x7CF: 68, - 0x7D0: 68, - 0x7D1: 68, - 0x7D2: 68, - 0x7D3: 68, - 0x7D4: 68, - 0x7D5: 68, - 0x7D6: 68, - 0x7D7: 68, - 0x7D8: 68, - 0x7D9: 68, - 0x7DA: 68, - 0x7DB: 68, - 0x7DC: 68, - 0x7DD: 68, - 0x7DE: 68, - 0x7DF: 68, - 0x7E0: 68, - 0x7E1: 68, - 0x7E2: 68, - 0x7E3: 68, - 0x7E4: 68, - 0x7E5: 68, - 0x7E6: 68, - 0x7E7: 68, - 0x7E8: 68, - 0x7E9: 68, - 0x7EA: 68, - 0x7EB: 84, - 0x7EC: 84, - 0x7ED: 84, - 0x7EE: 84, - 0x7EF: 84, - 0x7F0: 84, - 0x7F1: 84, - 0x7F2: 84, - 0x7F3: 84, - 0x7FA: 67, - 0x7FD: 84, - 0x816: 84, - 0x817: 84, - 0x818: 84, - 0x819: 84, - 0x81B: 84, - 0x81C: 84, - 0x81D: 84, - 0x81E: 84, - 0x81F: 84, - 0x820: 84, - 0x821: 84, - 0x822: 84, - 0x823: 84, - 0x825: 84, - 0x826: 84, - 0x827: 84, - 0x829: 84, - 0x82A: 84, - 0x82B: 84, - 0x82C: 84, - 0x82D: 84, - 0x840: 82, - 0x841: 68, - 0x842: 68, - 0x843: 68, - 0x844: 68, - 0x845: 68, - 0x846: 82, - 0x847: 82, - 0x848: 68, - 0x849: 82, - 0x84A: 68, - 0x84B: 68, - 0x84C: 68, - 0x84D: 68, - 0x84E: 68, - 0x84F: 68, - 0x850: 68, - 0x851: 68, - 0x852: 68, - 0x853: 68, - 0x854: 82, - 0x855: 68, - 0x856: 82, - 0x857: 82, - 0x858: 82, - 0x859: 84, - 0x85A: 84, - 0x85B: 84, - 0x860: 68, - 0x862: 68, - 0x863: 68, - 0x864: 68, - 0x865: 68, - 0x867: 82, - 0x868: 68, - 0x869: 82, - 0x86A: 82, - 0x870: 82, - 0x871: 82, - 0x872: 82, - 0x873: 82, - 0x874: 82, - 0x875: 82, - 0x876: 82, - 0x877: 82, - 0x878: 82, - 0x879: 82, - 0x87A: 82, - 0x87B: 82, - 0x87C: 82, - 0x87D: 82, - 0x87E: 82, - 0x87F: 82, - 0x880: 82, - 0x881: 82, - 0x882: 82, - 0x883: 67, - 0x884: 67, - 0x885: 67, - 0x886: 68, - 0x889: 68, - 0x88A: 68, - 0x88B: 68, - 0x88C: 68, - 0x88D: 68, - 0x88E: 82, - 0x898: 84, - 0x899: 84, - 0x89A: 84, - 0x89B: 84, - 0x89C: 84, - 0x89D: 84, - 0x89E: 84, - 0x89F: 84, - 0x8A0: 68, - 0x8A1: 68, - 0x8A2: 68, - 0x8A3: 68, - 0x8A4: 68, - 0x8A5: 68, - 0x8A6: 68, - 0x8A7: 68, - 0x8A8: 68, - 0x8A9: 68, - 0x8AA: 82, - 0x8AB: 82, - 0x8AC: 82, - 0x8AE: 82, - 0x8AF: 68, - 0x8B0: 68, - 0x8B1: 82, - 0x8B2: 82, - 0x8B3: 68, - 0x8B4: 68, - 0x8B5: 68, - 0x8B6: 68, - 0x8B7: 68, - 0x8B8: 68, - 0x8B9: 82, - 0x8BA: 68, - 0x8BB: 68, - 0x8BC: 68, - 0x8BD: 68, - 0x8BE: 68, - 0x8BF: 68, - 0x8C0: 68, - 0x8C1: 68, - 0x8C2: 68, - 0x8C3: 68, - 0x8C4: 68, - 0x8C5: 68, - 0x8C6: 68, - 0x8C7: 68, - 0x8C8: 68, - 0x8CA: 84, - 0x8CB: 84, - 0x8CC: 84, - 0x8CD: 84, - 0x8CE: 84, - 0x8CF: 84, - 0x8D0: 84, - 0x8D1: 84, - 0x8D2: 84, - 0x8D3: 84, - 0x8D4: 84, - 0x8D5: 84, - 0x8D6: 84, - 0x8D7: 84, - 0x8D8: 84, - 0x8D9: 84, - 0x8DA: 84, - 0x8DB: 84, - 0x8DC: 84, - 0x8DD: 84, - 0x8DE: 84, - 0x8DF: 84, - 0x8E0: 84, - 0x8E1: 84, - 0x8E3: 84, - 0x8E4: 84, - 0x8E5: 84, - 0x8E6: 84, - 0x8E7: 84, - 0x8E8: 84, - 0x8E9: 84, - 0x8EA: 84, - 0x8EB: 84, - 0x8EC: 84, - 0x8ED: 84, - 0x8EE: 84, - 0x8EF: 84, - 0x8F0: 84, - 0x8F1: 84, - 0x8F2: 84, - 0x8F3: 84, - 0x8F4: 84, - 0x8F5: 84, - 0x8F6: 84, - 0x8F7: 84, - 0x8F8: 84, - 0x8F9: 84, - 0x8FA: 84, - 0x8FB: 84, - 0x8FC: 84, - 0x8FD: 84, - 0x8FE: 84, - 0x8FF: 84, - 0x900: 84, - 0x901: 84, - 0x902: 84, - 0x93A: 84, - 0x93C: 84, - 0x941: 84, - 0x942: 84, - 0x943: 84, - 0x944: 84, - 0x945: 84, - 0x946: 84, - 0x947: 84, - 0x948: 84, - 0x94D: 84, - 0x951: 84, - 0x952: 84, - 0x953: 84, - 0x954: 84, - 0x955: 84, - 0x956: 84, - 0x957: 84, - 0x962: 84, - 0x963: 84, - 0x981: 84, - 0x9BC: 84, - 0x9C1: 84, - 0x9C2: 84, - 0x9C3: 84, - 0x9C4: 84, - 0x9CD: 84, - 0x9E2: 84, - 0x9E3: 84, - 0x9FE: 84, - 0xA01: 84, - 0xA02: 84, - 0xA3C: 84, - 0xA41: 84, - 0xA42: 84, - 0xA47: 84, - 0xA48: 84, - 0xA4B: 84, - 0xA4C: 84, - 0xA4D: 84, - 0xA51: 84, - 0xA70: 84, - 0xA71: 84, - 0xA75: 84, - 0xA81: 84, - 0xA82: 84, - 0xABC: 84, - 0xAC1: 84, - 0xAC2: 84, - 0xAC3: 84, - 0xAC4: 84, - 0xAC5: 84, - 0xAC7: 84, - 0xAC8: 84, - 0xACD: 84, - 0xAE2: 84, - 0xAE3: 84, - 0xAFA: 84, - 0xAFB: 84, - 0xAFC: 84, - 0xAFD: 84, - 0xAFE: 84, - 0xAFF: 84, - 0xB01: 84, - 0xB3C: 84, - 0xB3F: 84, - 0xB41: 84, - 0xB42: 84, - 0xB43: 84, - 0xB44: 84, - 0xB4D: 84, - 0xB55: 84, - 0xB56: 84, - 0xB62: 84, - 0xB63: 84, - 0xB82: 84, - 0xBC0: 84, - 0xBCD: 84, - 0xC00: 84, - 0xC04: 84, - 0xC3C: 84, - 0xC3E: 84, - 0xC3F: 84, - 0xC40: 84, - 0xC46: 84, - 0xC47: 84, - 0xC48: 84, - 0xC4A: 84, - 0xC4B: 84, - 0xC4C: 84, - 0xC4D: 84, - 0xC55: 84, - 0xC56: 84, - 0xC62: 84, - 0xC63: 84, - 0xC81: 84, - 0xCBC: 84, - 0xCBF: 84, - 0xCC6: 84, - 0xCCC: 84, - 0xCCD: 84, - 0xCE2: 84, - 0xCE3: 84, - 0xD00: 84, - 0xD01: 84, - 0xD3B: 84, - 0xD3C: 84, - 0xD41: 84, - 0xD42: 84, - 0xD43: 84, - 0xD44: 84, - 0xD4D: 84, - 0xD62: 84, - 0xD63: 84, - 0xD81: 84, - 0xDCA: 84, - 0xDD2: 84, - 0xDD3: 84, - 0xDD4: 84, - 0xDD6: 84, - 0xE31: 84, - 0xE34: 84, - 0xE35: 84, - 0xE36: 84, - 0xE37: 84, - 0xE38: 84, - 0xE39: 84, - 0xE3A: 84, - 0xE47: 84, - 0xE48: 84, - 0xE49: 84, - 0xE4A: 84, - 0xE4B: 84, - 0xE4C: 84, - 0xE4D: 84, - 0xE4E: 84, - 0xEB1: 84, - 0xEB4: 84, - 0xEB5: 84, - 0xEB6: 84, - 0xEB7: 84, - 0xEB8: 84, - 0xEB9: 84, - 0xEBA: 84, - 0xEBB: 84, - 0xEBC: 84, - 0xEC8: 84, - 0xEC9: 84, - 0xECA: 84, - 0xECB: 84, - 0xECC: 84, - 0xECD: 84, - 0xECE: 84, - 0xF18: 84, - 0xF19: 84, - 0xF35: 84, - 0xF37: 84, - 0xF39: 84, - 0xF71: 84, - 0xF72: 84, - 0xF73: 84, - 0xF74: 84, - 0xF75: 84, - 0xF76: 84, - 0xF77: 84, - 0xF78: 84, - 0xF79: 84, - 0xF7A: 84, - 0xF7B: 84, - 0xF7C: 84, - 0xF7D: 84, - 0xF7E: 84, - 0xF80: 84, - 0xF81: 84, - 0xF82: 84, - 0xF83: 84, - 0xF84: 84, - 0xF86: 84, - 0xF87: 84, - 0xF8D: 84, - 0xF8E: 84, - 0xF8F: 84, - 0xF90: 84, - 0xF91: 84, - 0xF92: 84, - 0xF93: 84, - 0xF94: 84, - 0xF95: 84, - 0xF96: 84, - 0xF97: 84, - 0xF99: 84, - 0xF9A: 84, - 0xF9B: 84, - 0xF9C: 84, - 0xF9D: 84, - 0xF9E: 84, - 0xF9F: 84, - 0xFA0: 84, - 0xFA1: 84, - 0xFA2: 84, - 0xFA3: 84, - 0xFA4: 84, - 0xFA5: 84, - 0xFA6: 84, - 0xFA7: 84, - 0xFA8: 84, - 0xFA9: 84, - 0xFAA: 84, - 0xFAB: 84, - 0xFAC: 84, - 0xFAD: 84, - 0xFAE: 84, - 0xFAF: 84, - 0xFB0: 84, - 0xFB1: 84, - 0xFB2: 84, - 0xFB3: 84, - 0xFB4: 84, - 0xFB5: 84, - 0xFB6: 84, - 0xFB7: 84, - 0xFB8: 84, - 0xFB9: 84, - 0xFBA: 84, - 0xFBB: 84, - 0xFBC: 84, - 0xFC6: 84, - 0x102D: 84, - 0x102E: 84, - 0x102F: 84, - 0x1030: 84, - 0x1032: 84, - 0x1033: 84, - 0x1034: 84, - 0x1035: 84, - 0x1036: 84, - 0x1037: 84, - 0x1039: 84, - 0x103A: 84, - 0x103D: 84, - 0x103E: 84, - 0x1058: 84, - 0x1059: 84, - 0x105E: 84, - 0x105F: 84, - 0x1060: 84, - 0x1071: 84, - 0x1072: 84, - 0x1073: 84, - 0x1074: 84, - 0x1082: 84, - 0x1085: 84, - 0x1086: 84, - 0x108D: 84, - 0x109D: 84, - 0x135D: 84, - 0x135E: 84, - 0x135F: 84, - 0x1712: 84, - 0x1713: 84, - 0x1714: 84, - 0x1732: 84, - 0x1733: 84, - 0x1752: 84, - 0x1753: 84, - 0x1772: 84, - 0x1773: 84, - 0x17B4: 84, - 0x17B5: 84, - 0x17B7: 84, - 0x17B8: 84, - 0x17B9: 84, - 0x17BA: 84, - 0x17BB: 84, - 0x17BC: 84, - 0x17BD: 84, - 0x17C6: 84, - 0x17C9: 84, - 0x17CA: 84, - 0x17CB: 84, - 0x17CC: 84, - 0x17CD: 84, - 0x17CE: 84, - 0x17CF: 84, - 0x17D0: 84, - 0x17D1: 84, - 0x17D2: 84, - 0x17D3: 84, - 0x17DD: 84, - 0x1807: 68, - 0x180A: 67, - 0x180B: 84, - 0x180C: 84, - 0x180D: 84, - 0x180F: 84, - 0x1820: 68, - 0x1821: 68, - 0x1822: 68, - 0x1823: 68, - 0x1824: 68, - 0x1825: 68, - 0x1826: 68, - 0x1827: 68, - 0x1828: 68, - 0x1829: 68, - 0x182A: 68, - 0x182B: 68, - 0x182C: 68, - 0x182D: 68, - 0x182E: 68, - 0x182F: 68, - 0x1830: 68, - 0x1831: 68, - 0x1832: 68, - 0x1833: 68, - 0x1834: 68, - 0x1835: 68, - 0x1836: 68, - 0x1837: 68, - 0x1838: 68, - 0x1839: 68, - 0x183A: 68, - 0x183B: 68, - 0x183C: 68, - 0x183D: 68, - 0x183E: 68, - 0x183F: 68, - 0x1840: 68, - 0x1841: 68, - 0x1842: 68, - 0x1843: 68, - 0x1844: 68, - 0x1845: 68, - 0x1846: 68, - 0x1847: 68, - 0x1848: 68, - 0x1849: 68, - 0x184A: 68, - 0x184B: 68, - 0x184C: 68, - 0x184D: 68, - 0x184E: 68, - 0x184F: 68, - 0x1850: 68, - 0x1851: 68, - 0x1852: 68, - 0x1853: 68, - 0x1854: 68, - 0x1855: 68, - 0x1856: 68, - 0x1857: 68, - 0x1858: 68, - 0x1859: 68, - 0x185A: 68, - 0x185B: 68, - 0x185C: 68, - 0x185D: 68, - 0x185E: 68, - 0x185F: 68, - 0x1860: 68, - 0x1861: 68, - 0x1862: 68, - 0x1863: 68, - 0x1864: 68, - 0x1865: 68, - 0x1866: 68, - 0x1867: 68, - 0x1868: 68, - 0x1869: 68, - 0x186A: 68, - 0x186B: 68, - 0x186C: 68, - 0x186D: 68, - 0x186E: 68, - 0x186F: 68, - 0x1870: 68, - 0x1871: 68, - 0x1872: 68, - 0x1873: 68, - 0x1874: 68, - 0x1875: 68, - 0x1876: 68, - 0x1877: 68, - 0x1878: 68, - 0x1885: 84, - 0x1886: 84, - 0x1887: 68, - 0x1888: 68, - 0x1889: 68, - 0x188A: 68, - 0x188B: 68, - 0x188C: 68, - 0x188D: 68, - 0x188E: 68, - 0x188F: 68, - 0x1890: 68, - 0x1891: 68, - 0x1892: 68, - 0x1893: 68, - 0x1894: 68, - 0x1895: 68, - 0x1896: 68, - 0x1897: 68, - 0x1898: 68, - 0x1899: 68, - 0x189A: 68, - 0x189B: 68, - 0x189C: 68, - 0x189D: 68, - 0x189E: 68, - 0x189F: 68, - 0x18A0: 68, - 0x18A1: 68, - 0x18A2: 68, - 0x18A3: 68, - 0x18A4: 68, - 0x18A5: 68, - 0x18A6: 68, - 0x18A7: 68, - 0x18A8: 68, - 0x18A9: 84, - 0x18AA: 68, - 0x1920: 84, - 0x1921: 84, - 0x1922: 84, - 0x1927: 84, - 0x1928: 84, - 0x1932: 84, - 0x1939: 84, - 0x193A: 84, - 0x193B: 84, - 0x1A17: 84, - 0x1A18: 84, - 0x1A1B: 84, - 0x1A56: 84, - 0x1A58: 84, - 0x1A59: 84, - 0x1A5A: 84, - 0x1A5B: 84, - 0x1A5C: 84, - 0x1A5D: 84, - 0x1A5E: 84, - 0x1A60: 84, - 0x1A62: 84, - 0x1A65: 84, - 0x1A66: 84, - 0x1A67: 84, - 0x1A68: 84, - 0x1A69: 84, - 0x1A6A: 84, - 0x1A6B: 84, - 0x1A6C: 84, - 0x1A73: 84, - 0x1A74: 84, - 0x1A75: 84, - 0x1A76: 84, - 0x1A77: 84, - 0x1A78: 84, - 0x1A79: 84, - 0x1A7A: 84, - 0x1A7B: 84, - 0x1A7C: 84, - 0x1A7F: 84, - 0x1AB0: 84, - 0x1AB1: 84, - 0x1AB2: 84, - 0x1AB3: 84, - 0x1AB4: 84, - 0x1AB5: 84, - 0x1AB6: 84, - 0x1AB7: 84, - 0x1AB8: 84, - 0x1AB9: 84, - 0x1ABA: 84, - 0x1ABB: 84, - 0x1ABC: 84, - 0x1ABD: 84, - 0x1ABE: 84, - 0x1ABF: 84, - 0x1AC0: 84, - 0x1AC1: 84, - 0x1AC2: 84, - 0x1AC3: 84, - 0x1AC4: 84, - 0x1AC5: 84, - 0x1AC6: 84, - 0x1AC7: 84, - 0x1AC8: 84, - 0x1AC9: 84, - 0x1ACA: 84, - 0x1ACB: 84, - 0x1ACC: 84, - 0x1ACD: 84, - 0x1ACE: 84, - 0x1B00: 84, - 0x1B01: 84, - 0x1B02: 84, - 0x1B03: 84, - 0x1B34: 84, - 0x1B36: 84, - 0x1B37: 84, - 0x1B38: 84, - 0x1B39: 84, - 0x1B3A: 84, - 0x1B3C: 84, - 0x1B42: 84, - 0x1B6B: 84, - 0x1B6C: 84, - 0x1B6D: 84, - 0x1B6E: 84, - 0x1B6F: 84, - 0x1B70: 84, - 0x1B71: 84, - 0x1B72: 84, - 0x1B73: 84, - 0x1B80: 84, - 0x1B81: 84, - 0x1BA2: 84, - 0x1BA3: 84, - 0x1BA4: 84, - 0x1BA5: 84, - 0x1BA8: 84, - 0x1BA9: 84, - 0x1BAB: 84, - 0x1BAC: 84, - 0x1BAD: 84, - 0x1BE6: 84, - 0x1BE8: 84, - 0x1BE9: 84, - 0x1BED: 84, - 0x1BEF: 84, - 0x1BF0: 84, - 0x1BF1: 84, - 0x1C2C: 84, - 0x1C2D: 84, - 0x1C2E: 84, - 0x1C2F: 84, - 0x1C30: 84, - 0x1C31: 84, - 0x1C32: 84, - 0x1C33: 84, - 0x1C36: 84, - 0x1C37: 84, - 0x1CD0: 84, - 0x1CD1: 84, - 0x1CD2: 84, - 0x1CD4: 84, - 0x1CD5: 84, - 0x1CD6: 84, - 0x1CD7: 84, - 0x1CD8: 84, - 0x1CD9: 84, - 0x1CDA: 84, - 0x1CDB: 84, - 0x1CDC: 84, - 0x1CDD: 84, - 0x1CDE: 84, - 0x1CDF: 84, - 0x1CE0: 84, - 0x1CE2: 84, - 0x1CE3: 84, - 0x1CE4: 84, - 0x1CE5: 84, - 0x1CE6: 84, - 0x1CE7: 84, - 0x1CE8: 84, - 0x1CED: 84, - 0x1CF4: 84, - 0x1CF8: 84, - 0x1CF9: 84, - 0x1DC0: 84, - 0x1DC1: 84, - 0x1DC2: 84, - 0x1DC3: 84, - 0x1DC4: 84, - 0x1DC5: 84, - 0x1DC6: 84, - 0x1DC7: 84, - 0x1DC8: 84, - 0x1DC9: 84, - 0x1DCA: 84, - 0x1DCB: 84, - 0x1DCC: 84, - 0x1DCD: 84, - 0x1DCE: 84, - 0x1DCF: 84, - 0x1DD0: 84, - 0x1DD1: 84, - 0x1DD2: 84, - 0x1DD3: 84, - 0x1DD4: 84, - 0x1DD5: 84, - 0x1DD6: 84, - 0x1DD7: 84, - 0x1DD8: 84, - 0x1DD9: 84, - 0x1DDA: 84, - 0x1DDB: 84, - 0x1DDC: 84, - 0x1DDD: 84, - 0x1DDE: 84, - 0x1DDF: 84, - 0x1DE0: 84, - 0x1DE1: 84, - 0x1DE2: 84, - 0x1DE3: 84, - 0x1DE4: 84, - 0x1DE5: 84, - 0x1DE6: 84, - 0x1DE7: 84, - 0x1DE8: 84, - 0x1DE9: 84, - 0x1DEA: 84, - 0x1DEB: 84, - 0x1DEC: 84, - 0x1DED: 84, - 0x1DEE: 84, - 0x1DEF: 84, - 0x1DF0: 84, - 0x1DF1: 84, - 0x1DF2: 84, - 0x1DF3: 84, - 0x1DF4: 84, - 0x1DF5: 84, - 0x1DF6: 84, - 0x1DF7: 84, - 0x1DF8: 84, - 0x1DF9: 84, - 0x1DFA: 84, - 0x1DFB: 84, - 0x1DFC: 84, - 0x1DFD: 84, - 0x1DFE: 84, - 0x1DFF: 84, - 0x200B: 84, - 0x200D: 67, - 0x200E: 84, - 0x200F: 84, - 0x202A: 84, - 0x202B: 84, - 0x202C: 84, - 0x202D: 84, - 0x202E: 84, - 0x2060: 84, - 0x2061: 84, - 0x2062: 84, - 0x2063: 84, - 0x2064: 84, - 0x206A: 84, - 0x206B: 84, - 0x206C: 84, - 0x206D: 84, - 0x206E: 84, - 0x206F: 84, - 0x20D0: 84, - 0x20D1: 84, - 0x20D2: 84, - 0x20D3: 84, - 0x20D4: 84, - 0x20D5: 84, - 0x20D6: 84, - 0x20D7: 84, - 0x20D8: 84, - 0x20D9: 84, - 0x20DA: 84, - 0x20DB: 84, - 0x20DC: 84, - 0x20DD: 84, - 0x20DE: 84, - 0x20DF: 84, - 0x20E0: 84, - 0x20E1: 84, - 0x20E2: 84, - 0x20E3: 84, - 0x20E4: 84, - 0x20E5: 84, - 0x20E6: 84, - 0x20E7: 84, - 0x20E8: 84, - 0x20E9: 84, - 0x20EA: 84, - 0x20EB: 84, - 0x20EC: 84, - 0x20ED: 84, - 0x20EE: 84, - 0x20EF: 84, - 0x20F0: 84, - 0x2CEF: 84, - 0x2CF0: 84, - 0x2CF1: 84, - 0x2D7F: 84, - 0x2DE0: 84, - 0x2DE1: 84, - 0x2DE2: 84, - 0x2DE3: 84, - 0x2DE4: 84, - 0x2DE5: 84, - 0x2DE6: 84, - 0x2DE7: 84, - 0x2DE8: 84, - 0x2DE9: 84, - 0x2DEA: 84, - 0x2DEB: 84, - 0x2DEC: 84, - 0x2DED: 84, - 0x2DEE: 84, - 0x2DEF: 84, - 0x2DF0: 84, - 0x2DF1: 84, - 0x2DF2: 84, - 0x2DF3: 84, - 0x2DF4: 84, - 0x2DF5: 84, - 0x2DF6: 84, - 0x2DF7: 84, - 0x2DF8: 84, - 0x2DF9: 84, - 0x2DFA: 84, - 0x2DFB: 84, - 0x2DFC: 84, - 0x2DFD: 84, - 0x2DFE: 84, - 0x2DFF: 84, - 0x302A: 84, - 0x302B: 84, - 0x302C: 84, - 0x302D: 84, - 0x3099: 84, - 0x309A: 84, - 0xA66F: 84, - 0xA670: 84, - 0xA671: 84, - 0xA672: 84, - 0xA674: 84, - 0xA675: 84, - 0xA676: 84, - 0xA677: 84, - 0xA678: 84, - 0xA679: 84, - 0xA67A: 84, - 0xA67B: 84, - 0xA67C: 84, - 0xA67D: 84, - 0xA69E: 84, - 0xA69F: 84, - 0xA6F0: 84, - 0xA6F1: 84, - 0xA802: 84, - 0xA806: 84, - 0xA80B: 84, - 0xA825: 84, - 0xA826: 84, - 0xA82C: 84, - 0xA840: 68, - 0xA841: 68, - 0xA842: 68, - 0xA843: 68, - 0xA844: 68, - 0xA845: 68, - 0xA846: 68, - 0xA847: 68, - 0xA848: 68, - 0xA849: 68, - 0xA84A: 68, - 0xA84B: 68, - 0xA84C: 68, - 0xA84D: 68, - 0xA84E: 68, - 0xA84F: 68, - 0xA850: 68, - 0xA851: 68, - 0xA852: 68, - 0xA853: 68, - 0xA854: 68, - 0xA855: 68, - 0xA856: 68, - 0xA857: 68, - 0xA858: 68, - 0xA859: 68, - 0xA85A: 68, - 0xA85B: 68, - 0xA85C: 68, - 0xA85D: 68, - 0xA85E: 68, - 0xA85F: 68, - 0xA860: 68, - 0xA861: 68, - 0xA862: 68, - 0xA863: 68, - 0xA864: 68, - 0xA865: 68, - 0xA866: 68, - 0xA867: 68, - 0xA868: 68, - 0xA869: 68, - 0xA86A: 68, - 0xA86B: 68, - 0xA86C: 68, - 0xA86D: 68, - 0xA86E: 68, - 0xA86F: 68, - 0xA870: 68, - 0xA871: 68, - 0xA872: 76, - 0xA8C4: 84, - 0xA8C5: 84, - 0xA8E0: 84, - 0xA8E1: 84, - 0xA8E2: 84, - 0xA8E3: 84, - 0xA8E4: 84, - 0xA8E5: 84, - 0xA8E6: 84, - 0xA8E7: 84, - 0xA8E8: 84, - 0xA8E9: 84, - 0xA8EA: 84, - 0xA8EB: 84, - 0xA8EC: 84, - 0xA8ED: 84, - 0xA8EE: 84, - 0xA8EF: 84, - 0xA8F0: 84, - 0xA8F1: 84, - 0xA8FF: 84, - 0xA926: 84, - 0xA927: 84, - 0xA928: 84, - 0xA929: 84, - 0xA92A: 84, - 0xA92B: 84, - 0xA92C: 84, - 0xA92D: 84, - 0xA947: 84, - 0xA948: 84, - 0xA949: 84, - 0xA94A: 84, - 0xA94B: 84, - 0xA94C: 84, - 0xA94D: 84, - 0xA94E: 84, - 0xA94F: 84, - 0xA950: 84, - 0xA951: 84, - 0xA980: 84, - 0xA981: 84, - 0xA982: 84, - 0xA9B3: 84, - 0xA9B6: 84, - 0xA9B7: 84, - 0xA9B8: 84, - 0xA9B9: 84, - 0xA9BC: 84, - 0xA9BD: 84, - 0xA9E5: 84, - 0xAA29: 84, - 0xAA2A: 84, - 0xAA2B: 84, - 0xAA2C: 84, - 0xAA2D: 84, - 0xAA2E: 84, - 0xAA31: 84, - 0xAA32: 84, - 0xAA35: 84, - 0xAA36: 84, - 0xAA43: 84, - 0xAA4C: 84, - 0xAA7C: 84, - 0xAAB0: 84, - 0xAAB2: 84, - 0xAAB3: 84, - 0xAAB4: 84, - 0xAAB7: 84, - 0xAAB8: 84, - 0xAABE: 84, - 0xAABF: 84, - 0xAAC1: 84, - 0xAAEC: 84, - 0xAAED: 84, - 0xAAF6: 84, - 0xABE5: 84, - 0xABE8: 84, - 0xABED: 84, - 0xFB1E: 84, - 0xFE00: 84, - 0xFE01: 84, - 0xFE02: 84, - 0xFE03: 84, - 0xFE04: 84, - 0xFE05: 84, - 0xFE06: 84, - 0xFE07: 84, - 0xFE08: 84, - 0xFE09: 84, - 0xFE0A: 84, - 0xFE0B: 84, - 0xFE0C: 84, - 0xFE0D: 84, - 0xFE0E: 84, - 0xFE0F: 84, - 0xFE20: 84, - 0xFE21: 84, - 0xFE22: 84, - 0xFE23: 84, - 0xFE24: 84, - 0xFE25: 84, - 0xFE26: 84, - 0xFE27: 84, - 0xFE28: 84, - 0xFE29: 84, - 0xFE2A: 84, - 0xFE2B: 84, - 0xFE2C: 84, - 0xFE2D: 84, - 0xFE2E: 84, - 0xFE2F: 84, - 0xFEFF: 84, - 0xFFF9: 84, - 0xFFFA: 84, - 0xFFFB: 84, - 0x101FD: 84, - 0x102E0: 84, - 0x10376: 84, - 0x10377: 84, - 0x10378: 84, - 0x10379: 84, - 0x1037A: 84, - 0x10A01: 84, - 0x10A02: 84, - 0x10A03: 84, - 0x10A05: 84, - 0x10A06: 84, - 0x10A0C: 84, - 0x10A0D: 84, - 0x10A0E: 84, - 0x10A0F: 84, - 0x10A38: 84, - 0x10A39: 84, - 0x10A3A: 84, - 0x10A3F: 84, - 0x10AC0: 68, - 0x10AC1: 68, - 0x10AC2: 68, - 0x10AC3: 68, - 0x10AC4: 68, - 0x10AC5: 82, - 0x10AC7: 82, - 0x10AC9: 82, - 0x10ACA: 82, - 0x10ACD: 76, - 0x10ACE: 82, - 0x10ACF: 82, - 0x10AD0: 82, - 0x10AD1: 82, - 0x10AD2: 82, - 0x10AD3: 68, - 0x10AD4: 68, - 0x10AD5: 68, - 0x10AD6: 68, - 0x10AD7: 76, - 0x10AD8: 68, - 0x10AD9: 68, - 0x10ADA: 68, - 0x10ADB: 68, - 0x10ADC: 68, - 0x10ADD: 82, - 0x10ADE: 68, - 0x10ADF: 68, - 0x10AE0: 68, - 0x10AE1: 82, - 0x10AE4: 82, - 0x10AE5: 84, - 0x10AE6: 84, - 0x10AEB: 68, - 0x10AEC: 68, - 0x10AED: 68, - 0x10AEE: 68, - 0x10AEF: 82, - 0x10B80: 68, - 0x10B81: 82, - 0x10B82: 68, - 0x10B83: 82, - 0x10B84: 82, - 0x10B85: 82, - 0x10B86: 68, - 0x10B87: 68, - 0x10B88: 68, - 0x10B89: 82, - 0x10B8A: 68, - 0x10B8B: 68, - 0x10B8C: 82, - 0x10B8D: 68, - 0x10B8E: 82, - 0x10B8F: 82, - 0x10B90: 68, - 0x10B91: 82, - 0x10BA9: 82, - 0x10BAA: 82, - 0x10BAB: 82, - 0x10BAC: 82, - 0x10BAD: 68, - 0x10BAE: 68, - 0x10D00: 76, - 0x10D01: 68, - 0x10D02: 68, - 0x10D03: 68, - 0x10D04: 68, - 0x10D05: 68, - 0x10D06: 68, - 0x10D07: 68, - 0x10D08: 68, - 0x10D09: 68, - 0x10D0A: 68, - 0x10D0B: 68, - 0x10D0C: 68, - 0x10D0D: 68, - 0x10D0E: 68, - 0x10D0F: 68, - 0x10D10: 68, - 0x10D11: 68, - 0x10D12: 68, - 0x10D13: 68, - 0x10D14: 68, - 0x10D15: 68, - 0x10D16: 68, - 0x10D17: 68, - 0x10D18: 68, - 0x10D19: 68, - 0x10D1A: 68, - 0x10D1B: 68, - 0x10D1C: 68, - 0x10D1D: 68, - 0x10D1E: 68, - 0x10D1F: 68, - 0x10D20: 68, - 0x10D21: 68, - 0x10D22: 82, - 0x10D23: 68, - 0x10D24: 84, - 0x10D25: 84, - 0x10D26: 84, - 0x10D27: 84, - 0x10EAB: 84, - 0x10EAC: 84, - 0x10EFD: 84, - 0x10EFE: 84, - 0x10EFF: 84, - 0x10F30: 68, - 0x10F31: 68, - 0x10F32: 68, - 0x10F33: 82, - 0x10F34: 68, - 0x10F35: 68, - 0x10F36: 68, - 0x10F37: 68, - 0x10F38: 68, - 0x10F39: 68, - 0x10F3A: 68, - 0x10F3B: 68, - 0x10F3C: 68, - 0x10F3D: 68, - 0x10F3E: 68, - 0x10F3F: 68, - 0x10F40: 68, - 0x10F41: 68, - 0x10F42: 68, - 0x10F43: 68, - 0x10F44: 68, - 0x10F46: 84, - 0x10F47: 84, - 0x10F48: 84, - 0x10F49: 84, - 0x10F4A: 84, - 0x10F4B: 84, - 0x10F4C: 84, - 0x10F4D: 84, - 0x10F4E: 84, - 0x10F4F: 84, - 0x10F50: 84, - 0x10F51: 68, - 0x10F52: 68, - 0x10F53: 68, - 0x10F54: 82, - 0x10F70: 68, - 0x10F71: 68, - 0x10F72: 68, - 0x10F73: 68, - 0x10F74: 82, - 0x10F75: 82, - 0x10F76: 68, - 0x10F77: 68, - 0x10F78: 68, - 0x10F79: 68, - 0x10F7A: 68, - 0x10F7B: 68, - 0x10F7C: 68, - 0x10F7D: 68, - 0x10F7E: 68, - 0x10F7F: 68, - 0x10F80: 68, - 0x10F81: 68, - 0x10F82: 84, - 0x10F83: 84, - 0x10F84: 84, - 0x10F85: 84, - 0x10FB0: 68, - 0x10FB2: 68, - 0x10FB3: 68, - 0x10FB4: 82, - 0x10FB5: 82, - 0x10FB6: 82, - 0x10FB8: 68, - 0x10FB9: 82, - 0x10FBA: 82, - 0x10FBB: 68, - 0x10FBC: 68, - 0x10FBD: 82, - 0x10FBE: 68, - 0x10FBF: 68, - 0x10FC1: 68, - 0x10FC2: 82, - 0x10FC3: 82, - 0x10FC4: 68, - 0x10FC9: 82, - 0x10FCA: 68, - 0x10FCB: 76, - 0x11001: 84, - 0x11038: 84, - 0x11039: 84, - 0x1103A: 84, - 0x1103B: 84, - 0x1103C: 84, - 0x1103D: 84, - 0x1103E: 84, - 0x1103F: 84, - 0x11040: 84, - 0x11041: 84, - 0x11042: 84, - 0x11043: 84, - 0x11044: 84, - 0x11045: 84, - 0x11046: 84, - 0x11070: 84, - 0x11073: 84, - 0x11074: 84, - 0x1107F: 84, - 0x11080: 84, - 0x11081: 84, - 0x110B3: 84, - 0x110B4: 84, - 0x110B5: 84, - 0x110B6: 84, - 0x110B9: 84, - 0x110BA: 84, - 0x110C2: 84, - 0x11100: 84, - 0x11101: 84, - 0x11102: 84, - 0x11127: 84, - 0x11128: 84, - 0x11129: 84, - 0x1112A: 84, - 0x1112B: 84, - 0x1112D: 84, - 0x1112E: 84, - 0x1112F: 84, - 0x11130: 84, - 0x11131: 84, - 0x11132: 84, - 0x11133: 84, - 0x11134: 84, - 0x11173: 84, - 0x11180: 84, - 0x11181: 84, - 0x111B6: 84, - 0x111B7: 84, - 0x111B8: 84, - 0x111B9: 84, - 0x111BA: 84, - 0x111BB: 84, - 0x111BC: 84, - 0x111BD: 84, - 0x111BE: 84, - 0x111C9: 84, - 0x111CA: 84, - 0x111CB: 84, - 0x111CC: 84, - 0x111CF: 84, - 0x1122F: 84, - 0x11230: 84, - 0x11231: 84, - 0x11234: 84, - 0x11236: 84, - 0x11237: 84, - 0x1123E: 84, - 0x11241: 84, - 0x112DF: 84, - 0x112E3: 84, - 0x112E4: 84, - 0x112E5: 84, - 0x112E6: 84, - 0x112E7: 84, - 0x112E8: 84, - 0x112E9: 84, - 0x112EA: 84, - 0x11300: 84, - 0x11301: 84, - 0x1133B: 84, - 0x1133C: 84, - 0x11340: 84, - 0x11366: 84, - 0x11367: 84, - 0x11368: 84, - 0x11369: 84, - 0x1136A: 84, - 0x1136B: 84, - 0x1136C: 84, - 0x11370: 84, - 0x11371: 84, - 0x11372: 84, - 0x11373: 84, - 0x11374: 84, - 0x11438: 84, - 0x11439: 84, - 0x1143A: 84, - 0x1143B: 84, - 0x1143C: 84, - 0x1143D: 84, - 0x1143E: 84, - 0x1143F: 84, - 0x11442: 84, - 0x11443: 84, - 0x11444: 84, - 0x11446: 84, - 0x1145E: 84, - 0x114B3: 84, - 0x114B4: 84, - 0x114B5: 84, - 0x114B6: 84, - 0x114B7: 84, - 0x114B8: 84, - 0x114BA: 84, - 0x114BF: 84, - 0x114C0: 84, - 0x114C2: 84, - 0x114C3: 84, - 0x115B2: 84, - 0x115B3: 84, - 0x115B4: 84, - 0x115B5: 84, - 0x115BC: 84, - 0x115BD: 84, - 0x115BF: 84, - 0x115C0: 84, - 0x115DC: 84, - 0x115DD: 84, - 0x11633: 84, - 0x11634: 84, - 0x11635: 84, - 0x11636: 84, - 0x11637: 84, - 0x11638: 84, - 0x11639: 84, - 0x1163A: 84, - 0x1163D: 84, - 0x1163F: 84, - 0x11640: 84, - 0x116AB: 84, - 0x116AD: 84, - 0x116B0: 84, - 0x116B1: 84, - 0x116B2: 84, - 0x116B3: 84, - 0x116B4: 84, - 0x116B5: 84, - 0x116B7: 84, - 0x1171D: 84, - 0x1171E: 84, - 0x1171F: 84, - 0x11722: 84, - 0x11723: 84, - 0x11724: 84, - 0x11725: 84, - 0x11727: 84, - 0x11728: 84, - 0x11729: 84, - 0x1172A: 84, - 0x1172B: 84, - 0x1182F: 84, - 0x11830: 84, - 0x11831: 84, - 0x11832: 84, - 0x11833: 84, - 0x11834: 84, - 0x11835: 84, - 0x11836: 84, - 0x11837: 84, - 0x11839: 84, - 0x1183A: 84, - 0x1193B: 84, - 0x1193C: 84, - 0x1193E: 84, - 0x11943: 84, - 0x119D4: 84, - 0x119D5: 84, - 0x119D6: 84, - 0x119D7: 84, - 0x119DA: 84, - 0x119DB: 84, - 0x119E0: 84, - 0x11A01: 84, - 0x11A02: 84, - 0x11A03: 84, - 0x11A04: 84, - 0x11A05: 84, - 0x11A06: 84, - 0x11A07: 84, - 0x11A08: 84, - 0x11A09: 84, - 0x11A0A: 84, - 0x11A33: 84, - 0x11A34: 84, - 0x11A35: 84, - 0x11A36: 84, - 0x11A37: 84, - 0x11A38: 84, - 0x11A3B: 84, - 0x11A3C: 84, - 0x11A3D: 84, - 0x11A3E: 84, - 0x11A47: 84, - 0x11A51: 84, - 0x11A52: 84, - 0x11A53: 84, - 0x11A54: 84, - 0x11A55: 84, - 0x11A56: 84, - 0x11A59: 84, - 0x11A5A: 84, - 0x11A5B: 84, - 0x11A8A: 84, - 0x11A8B: 84, - 0x11A8C: 84, - 0x11A8D: 84, - 0x11A8E: 84, - 0x11A8F: 84, - 0x11A90: 84, - 0x11A91: 84, - 0x11A92: 84, - 0x11A93: 84, - 0x11A94: 84, - 0x11A95: 84, - 0x11A96: 84, - 0x11A98: 84, - 0x11A99: 84, - 0x11C30: 84, - 0x11C31: 84, - 0x11C32: 84, - 0x11C33: 84, - 0x11C34: 84, - 0x11C35: 84, - 0x11C36: 84, - 0x11C38: 84, - 0x11C39: 84, - 0x11C3A: 84, - 0x11C3B: 84, - 0x11C3C: 84, - 0x11C3D: 84, - 0x11C3F: 84, - 0x11C92: 84, - 0x11C93: 84, - 0x11C94: 84, - 0x11C95: 84, - 0x11C96: 84, - 0x11C97: 84, - 0x11C98: 84, - 0x11C99: 84, - 0x11C9A: 84, - 0x11C9B: 84, - 0x11C9C: 84, - 0x11C9D: 84, - 0x11C9E: 84, - 0x11C9F: 84, - 0x11CA0: 84, - 0x11CA1: 84, - 0x11CA2: 84, - 0x11CA3: 84, - 0x11CA4: 84, - 0x11CA5: 84, - 0x11CA6: 84, - 0x11CA7: 84, - 0x11CAA: 84, - 0x11CAB: 84, - 0x11CAC: 84, - 0x11CAD: 84, - 0x11CAE: 84, - 0x11CAF: 84, - 0x11CB0: 84, - 0x11CB2: 84, - 0x11CB3: 84, - 0x11CB5: 84, - 0x11CB6: 84, - 0x11D31: 84, - 0x11D32: 84, - 0x11D33: 84, - 0x11D34: 84, - 0x11D35: 84, - 0x11D36: 84, - 0x11D3A: 84, - 0x11D3C: 84, - 0x11D3D: 84, - 0x11D3F: 84, - 0x11D40: 84, - 0x11D41: 84, - 0x11D42: 84, - 0x11D43: 84, - 0x11D44: 84, - 0x11D45: 84, - 0x11D47: 84, - 0x11D90: 84, - 0x11D91: 84, - 0x11D95: 84, - 0x11D97: 84, - 0x11EF3: 84, - 0x11EF4: 84, - 0x11F00: 84, - 0x11F01: 84, - 0x11F36: 84, - 0x11F37: 84, - 0x11F38: 84, - 0x11F39: 84, - 0x11F3A: 84, - 0x11F40: 84, - 0x11F42: 84, - 0x13430: 84, - 0x13431: 84, - 0x13432: 84, - 0x13433: 84, - 0x13434: 84, - 0x13435: 84, - 0x13436: 84, - 0x13437: 84, - 0x13438: 84, - 0x13439: 84, - 0x1343A: 84, - 0x1343B: 84, - 0x1343C: 84, - 0x1343D: 84, - 0x1343E: 84, - 0x1343F: 84, - 0x13440: 84, - 0x13447: 84, - 0x13448: 84, - 0x13449: 84, - 0x1344A: 84, - 0x1344B: 84, - 0x1344C: 84, - 0x1344D: 84, - 0x1344E: 84, - 0x1344F: 84, - 0x13450: 84, - 0x13451: 84, - 0x13452: 84, - 0x13453: 84, - 0x13454: 84, - 0x13455: 84, - 0x16AF0: 84, - 0x16AF1: 84, - 0x16AF2: 84, - 0x16AF3: 84, - 0x16AF4: 84, - 0x16B30: 84, - 0x16B31: 84, - 0x16B32: 84, - 0x16B33: 84, - 0x16B34: 84, - 0x16B35: 84, - 0x16B36: 84, - 0x16F4F: 84, - 0x16F8F: 84, - 0x16F90: 84, - 0x16F91: 84, - 0x16F92: 84, - 0x16FE4: 84, - 0x1BC9D: 84, - 0x1BC9E: 84, - 0x1BCA0: 84, - 0x1BCA1: 84, - 0x1BCA2: 84, - 0x1BCA3: 84, - 0x1CF00: 84, - 0x1CF01: 84, - 0x1CF02: 84, - 0x1CF03: 84, - 0x1CF04: 84, - 0x1CF05: 84, - 0x1CF06: 84, - 0x1CF07: 84, - 0x1CF08: 84, - 0x1CF09: 84, - 0x1CF0A: 84, - 0x1CF0B: 84, - 0x1CF0C: 84, - 0x1CF0D: 84, - 0x1CF0E: 84, - 0x1CF0F: 84, - 0x1CF10: 84, - 0x1CF11: 84, - 0x1CF12: 84, - 0x1CF13: 84, - 0x1CF14: 84, - 0x1CF15: 84, - 0x1CF16: 84, - 0x1CF17: 84, - 0x1CF18: 84, - 0x1CF19: 84, - 0x1CF1A: 84, - 0x1CF1B: 84, - 0x1CF1C: 84, - 0x1CF1D: 84, - 0x1CF1E: 84, - 0x1CF1F: 84, - 0x1CF20: 84, - 0x1CF21: 84, - 0x1CF22: 84, - 0x1CF23: 84, - 0x1CF24: 84, - 0x1CF25: 84, - 0x1CF26: 84, - 0x1CF27: 84, - 0x1CF28: 84, - 0x1CF29: 84, - 0x1CF2A: 84, - 0x1CF2B: 84, - 0x1CF2C: 84, - 0x1CF2D: 84, - 0x1CF30: 84, - 0x1CF31: 84, - 0x1CF32: 84, - 0x1CF33: 84, - 0x1CF34: 84, - 0x1CF35: 84, - 0x1CF36: 84, - 0x1CF37: 84, - 0x1CF38: 84, - 0x1CF39: 84, - 0x1CF3A: 84, - 0x1CF3B: 84, - 0x1CF3C: 84, - 0x1CF3D: 84, - 0x1CF3E: 84, - 0x1CF3F: 84, - 0x1CF40: 84, - 0x1CF41: 84, - 0x1CF42: 84, - 0x1CF43: 84, - 0x1CF44: 84, - 0x1CF45: 84, - 0x1CF46: 84, - 0x1D167: 84, - 0x1D168: 84, - 0x1D169: 84, - 0x1D173: 84, - 0x1D174: 84, - 0x1D175: 84, - 0x1D176: 84, - 0x1D177: 84, - 0x1D178: 84, - 0x1D179: 84, - 0x1D17A: 84, - 0x1D17B: 84, - 0x1D17C: 84, - 0x1D17D: 84, - 0x1D17E: 84, - 0x1D17F: 84, - 0x1D180: 84, - 0x1D181: 84, - 0x1D182: 84, - 0x1D185: 84, - 0x1D186: 84, - 0x1D187: 84, - 0x1D188: 84, - 0x1D189: 84, - 0x1D18A: 84, - 0x1D18B: 84, - 0x1D1AA: 84, - 0x1D1AB: 84, - 0x1D1AC: 84, - 0x1D1AD: 84, - 0x1D242: 84, - 0x1D243: 84, - 0x1D244: 84, - 0x1DA00: 84, - 0x1DA01: 84, - 0x1DA02: 84, - 0x1DA03: 84, - 0x1DA04: 84, - 0x1DA05: 84, - 0x1DA06: 84, - 0x1DA07: 84, - 0x1DA08: 84, - 0x1DA09: 84, - 0x1DA0A: 84, - 0x1DA0B: 84, - 0x1DA0C: 84, - 0x1DA0D: 84, - 0x1DA0E: 84, - 0x1DA0F: 84, - 0x1DA10: 84, - 0x1DA11: 84, - 0x1DA12: 84, - 0x1DA13: 84, - 0x1DA14: 84, - 0x1DA15: 84, - 0x1DA16: 84, - 0x1DA17: 84, - 0x1DA18: 84, - 0x1DA19: 84, - 0x1DA1A: 84, - 0x1DA1B: 84, - 0x1DA1C: 84, - 0x1DA1D: 84, - 0x1DA1E: 84, - 0x1DA1F: 84, - 0x1DA20: 84, - 0x1DA21: 84, - 0x1DA22: 84, - 0x1DA23: 84, - 0x1DA24: 84, - 0x1DA25: 84, - 0x1DA26: 84, - 0x1DA27: 84, - 0x1DA28: 84, - 0x1DA29: 84, - 0x1DA2A: 84, - 0x1DA2B: 84, - 0x1DA2C: 84, - 0x1DA2D: 84, - 0x1DA2E: 84, - 0x1DA2F: 84, - 0x1DA30: 84, - 0x1DA31: 84, - 0x1DA32: 84, - 0x1DA33: 84, - 0x1DA34: 84, - 0x1DA35: 84, - 0x1DA36: 84, - 0x1DA3B: 84, - 0x1DA3C: 84, - 0x1DA3D: 84, - 0x1DA3E: 84, - 0x1DA3F: 84, - 0x1DA40: 84, - 0x1DA41: 84, - 0x1DA42: 84, - 0x1DA43: 84, - 0x1DA44: 84, - 0x1DA45: 84, - 0x1DA46: 84, - 0x1DA47: 84, - 0x1DA48: 84, - 0x1DA49: 84, - 0x1DA4A: 84, - 0x1DA4B: 84, - 0x1DA4C: 84, - 0x1DA4D: 84, - 0x1DA4E: 84, - 0x1DA4F: 84, - 0x1DA50: 84, - 0x1DA51: 84, - 0x1DA52: 84, - 0x1DA53: 84, - 0x1DA54: 84, - 0x1DA55: 84, - 0x1DA56: 84, - 0x1DA57: 84, - 0x1DA58: 84, - 0x1DA59: 84, - 0x1DA5A: 84, - 0x1DA5B: 84, - 0x1DA5C: 84, - 0x1DA5D: 84, - 0x1DA5E: 84, - 0x1DA5F: 84, - 0x1DA60: 84, - 0x1DA61: 84, - 0x1DA62: 84, - 0x1DA63: 84, - 0x1DA64: 84, - 0x1DA65: 84, - 0x1DA66: 84, - 0x1DA67: 84, - 0x1DA68: 84, - 0x1DA69: 84, - 0x1DA6A: 84, - 0x1DA6B: 84, - 0x1DA6C: 84, - 0x1DA75: 84, - 0x1DA84: 84, - 0x1DA9B: 84, - 0x1DA9C: 84, - 0x1DA9D: 84, - 0x1DA9E: 84, - 0x1DA9F: 84, - 0x1DAA1: 84, - 0x1DAA2: 84, - 0x1DAA3: 84, - 0x1DAA4: 84, - 0x1DAA5: 84, - 0x1DAA6: 84, - 0x1DAA7: 84, - 0x1DAA8: 84, - 0x1DAA9: 84, - 0x1DAAA: 84, - 0x1DAAB: 84, - 0x1DAAC: 84, - 0x1DAAD: 84, - 0x1DAAE: 84, - 0x1DAAF: 84, - 0x1E000: 84, - 0x1E001: 84, - 0x1E002: 84, - 0x1E003: 84, - 0x1E004: 84, - 0x1E005: 84, - 0x1E006: 84, - 0x1E008: 84, - 0x1E009: 84, - 0x1E00A: 84, - 0x1E00B: 84, - 0x1E00C: 84, - 0x1E00D: 84, - 0x1E00E: 84, - 0x1E00F: 84, - 0x1E010: 84, - 0x1E011: 84, - 0x1E012: 84, - 0x1E013: 84, - 0x1E014: 84, - 0x1E015: 84, - 0x1E016: 84, - 0x1E017: 84, - 0x1E018: 84, - 0x1E01B: 84, - 0x1E01C: 84, - 0x1E01D: 84, - 0x1E01E: 84, - 0x1E01F: 84, - 0x1E020: 84, - 0x1E021: 84, - 0x1E023: 84, - 0x1E024: 84, - 0x1E026: 84, - 0x1E027: 84, - 0x1E028: 84, - 0x1E029: 84, - 0x1E02A: 84, - 0x1E08F: 84, - 0x1E130: 84, - 0x1E131: 84, - 0x1E132: 84, - 0x1E133: 84, - 0x1E134: 84, - 0x1E135: 84, - 0x1E136: 84, - 0x1E2AE: 84, - 0x1E2EC: 84, - 0x1E2ED: 84, - 0x1E2EE: 84, - 0x1E2EF: 84, - 0x1E4EC: 84, - 0x1E4ED: 84, - 0x1E4EE: 84, - 0x1E4EF: 84, - 0x1E8D0: 84, - 0x1E8D1: 84, - 0x1E8D2: 84, - 0x1E8D3: 84, - 0x1E8D4: 84, - 0x1E8D5: 84, - 0x1E8D6: 84, - 0x1E900: 68, - 0x1E901: 68, - 0x1E902: 68, - 0x1E903: 68, - 0x1E904: 68, - 0x1E905: 68, - 0x1E906: 68, - 0x1E907: 68, - 0x1E908: 68, - 0x1E909: 68, - 0x1E90A: 68, - 0x1E90B: 68, - 0x1E90C: 68, - 0x1E90D: 68, - 0x1E90E: 68, - 0x1E90F: 68, - 0x1E910: 68, - 0x1E911: 68, - 0x1E912: 68, - 0x1E913: 68, - 0x1E914: 68, - 0x1E915: 68, - 0x1E916: 68, - 0x1E917: 68, - 0x1E918: 68, - 0x1E919: 68, - 0x1E91A: 68, - 0x1E91B: 68, - 0x1E91C: 68, - 0x1E91D: 68, - 0x1E91E: 68, - 0x1E91F: 68, - 0x1E920: 68, - 0x1E921: 68, - 0x1E922: 68, - 0x1E923: 68, - 0x1E924: 68, - 0x1E925: 68, - 0x1E926: 68, - 0x1E927: 68, - 0x1E928: 68, - 0x1E929: 68, - 0x1E92A: 68, - 0x1E92B: 68, - 0x1E92C: 68, - 0x1E92D: 68, - 0x1E92E: 68, - 0x1E92F: 68, - 0x1E930: 68, - 0x1E931: 68, - 0x1E932: 68, - 0x1E933: 68, - 0x1E934: 68, - 0x1E935: 68, - 0x1E936: 68, - 0x1E937: 68, - 0x1E938: 68, - 0x1E939: 68, - 0x1E93A: 68, - 0x1E93B: 68, - 0x1E93C: 68, - 0x1E93D: 68, - 0x1E93E: 68, - 0x1E93F: 68, - 0x1E940: 68, - 0x1E941: 68, - 0x1E942: 68, - 0x1E943: 68, - 0x1E944: 84, - 0x1E945: 84, - 0x1E946: 84, - 0x1E947: 84, - 0x1E948: 84, - 0x1E949: 84, - 0x1E94A: 84, - 0x1E94B: 84, - 0xE0001: 84, - 0xE0020: 84, - 0xE0021: 84, - 0xE0022: 84, - 0xE0023: 84, - 0xE0024: 84, - 0xE0025: 84, - 0xE0026: 84, - 0xE0027: 84, - 0xE0028: 84, - 0xE0029: 84, - 0xE002A: 84, - 0xE002B: 84, - 0xE002C: 84, - 0xE002D: 84, - 0xE002E: 84, - 0xE002F: 84, - 0xE0030: 84, - 0xE0031: 84, - 0xE0032: 84, - 0xE0033: 84, - 0xE0034: 84, - 0xE0035: 84, - 0xE0036: 84, - 0xE0037: 84, - 0xE0038: 84, - 0xE0039: 84, - 0xE003A: 84, - 0xE003B: 84, - 0xE003C: 84, - 0xE003D: 84, - 0xE003E: 84, - 0xE003F: 84, - 0xE0040: 84, - 0xE0041: 84, - 0xE0042: 84, - 0xE0043: 84, - 0xE0044: 84, - 0xE0045: 84, - 0xE0046: 84, - 0xE0047: 84, - 0xE0048: 84, - 0xE0049: 84, - 0xE004A: 84, - 0xE004B: 84, - 0xE004C: 84, - 0xE004D: 84, - 0xE004E: 84, - 0xE004F: 84, - 0xE0050: 84, - 0xE0051: 84, - 0xE0052: 84, - 0xE0053: 84, - 0xE0054: 84, - 0xE0055: 84, - 0xE0056: 84, - 0xE0057: 84, - 0xE0058: 84, - 0xE0059: 84, - 0xE005A: 84, - 0xE005B: 84, - 0xE005C: 84, - 0xE005D: 84, - 0xE005E: 84, - 0xE005F: 84, - 0xE0060: 84, - 0xE0061: 84, - 0xE0062: 84, - 0xE0063: 84, - 0xE0064: 84, - 0xE0065: 84, - 0xE0066: 84, - 0xE0067: 84, - 0xE0068: 84, - 0xE0069: 84, - 0xE006A: 84, - 0xE006B: 84, - 0xE006C: 84, - 0xE006D: 84, - 0xE006E: 84, - 0xE006F: 84, - 0xE0070: 84, - 0xE0071: 84, - 0xE0072: 84, - 0xE0073: 84, - 0xE0074: 84, - 0xE0075: 84, - 0xE0076: 84, - 0xE0077: 84, - 0xE0078: 84, - 0xE0079: 84, - 0xE007A: 84, - 0xE007B: 84, - 0xE007C: 84, - 0xE007D: 84, - 0xE007E: 84, - 0xE007F: 84, - 0xE0100: 84, - 0xE0101: 84, - 0xE0102: 84, - 0xE0103: 84, - 0xE0104: 84, - 0xE0105: 84, - 0xE0106: 84, - 0xE0107: 84, - 0xE0108: 84, - 0xE0109: 84, - 0xE010A: 84, - 0xE010B: 84, - 0xE010C: 84, - 0xE010D: 84, - 0xE010E: 84, - 0xE010F: 84, - 0xE0110: 84, - 0xE0111: 84, - 0xE0112: 84, - 0xE0113: 84, - 0xE0114: 84, - 0xE0115: 84, - 0xE0116: 84, - 0xE0117: 84, - 0xE0118: 84, - 0xE0119: 84, - 0xE011A: 84, - 0xE011B: 84, - 0xE011C: 84, - 0xE011D: 84, - 0xE011E: 84, - 0xE011F: 84, - 0xE0120: 84, - 0xE0121: 84, - 0xE0122: 84, - 0xE0123: 84, - 0xE0124: 84, - 0xE0125: 84, - 0xE0126: 84, - 0xE0127: 84, - 0xE0128: 84, - 0xE0129: 84, - 0xE012A: 84, - 0xE012B: 84, - 0xE012C: 84, - 0xE012D: 84, - 0xE012E: 84, - 0xE012F: 84, - 0xE0130: 84, - 0xE0131: 84, - 0xE0132: 84, - 0xE0133: 84, - 0xE0134: 84, - 0xE0135: 84, - 0xE0136: 84, - 0xE0137: 84, - 0xE0138: 84, - 0xE0139: 84, - 0xE013A: 84, - 0xE013B: 84, - 0xE013C: 84, - 0xE013D: 84, - 0xE013E: 84, - 0xE013F: 84, - 0xE0140: 84, - 0xE0141: 84, - 0xE0142: 84, - 0xE0143: 84, - 0xE0144: 84, - 0xE0145: 84, - 0xE0146: 84, - 0xE0147: 84, - 0xE0148: 84, - 0xE0149: 84, - 0xE014A: 84, - 0xE014B: 84, - 0xE014C: 84, - 0xE014D: 84, - 0xE014E: 84, - 0xE014F: 84, - 0xE0150: 84, - 0xE0151: 84, - 0xE0152: 84, - 0xE0153: 84, - 0xE0154: 84, - 0xE0155: 84, - 0xE0156: 84, - 0xE0157: 84, - 0xE0158: 84, - 0xE0159: 84, - 0xE015A: 84, - 0xE015B: 84, - 0xE015C: 84, - 0xE015D: 84, - 0xE015E: 84, - 0xE015F: 84, - 0xE0160: 84, - 0xE0161: 84, - 0xE0162: 84, - 0xE0163: 84, - 0xE0164: 84, - 0xE0165: 84, - 0xE0166: 84, - 0xE0167: 84, - 0xE0168: 84, - 0xE0169: 84, - 0xE016A: 84, - 0xE016B: 84, - 0xE016C: 84, - 0xE016D: 84, - 0xE016E: 84, - 0xE016F: 84, - 0xE0170: 84, - 0xE0171: 84, - 0xE0172: 84, - 0xE0173: 84, - 0xE0174: 84, - 0xE0175: 84, - 0xE0176: 84, - 0xE0177: 84, - 0xE0178: 84, - 0xE0179: 84, - 0xE017A: 84, - 0xE017B: 84, - 0xE017C: 84, - 0xE017D: 84, - 0xE017E: 84, - 0xE017F: 84, - 0xE0180: 84, - 0xE0181: 84, - 0xE0182: 84, - 0xE0183: 84, - 0xE0184: 84, - 0xE0185: 84, - 0xE0186: 84, - 0xE0187: 84, - 0xE0188: 84, - 0xE0189: 84, - 0xE018A: 84, - 0xE018B: 84, - 0xE018C: 84, - 0xE018D: 84, - 0xE018E: 84, - 0xE018F: 84, - 0xE0190: 84, - 0xE0191: 84, - 0xE0192: 84, - 0xE0193: 84, - 0xE0194: 84, - 0xE0195: 84, - 0xE0196: 84, - 0xE0197: 84, - 0xE0198: 84, - 0xE0199: 84, - 0xE019A: 84, - 0xE019B: 84, - 0xE019C: 84, - 0xE019D: 84, - 0xE019E: 84, - 0xE019F: 84, - 0xE01A0: 84, - 0xE01A1: 84, - 0xE01A2: 84, - 0xE01A3: 84, - 0xE01A4: 84, - 0xE01A5: 84, - 0xE01A6: 84, - 0xE01A7: 84, - 0xE01A8: 84, - 0xE01A9: 84, - 0xE01AA: 84, - 0xE01AB: 84, - 0xE01AC: 84, - 0xE01AD: 84, - 0xE01AE: 84, - 0xE01AF: 84, - 0xE01B0: 84, - 0xE01B1: 84, - 0xE01B2: 84, - 0xE01B3: 84, - 0xE01B4: 84, - 0xE01B5: 84, - 0xE01B6: 84, - 0xE01B7: 84, - 0xE01B8: 84, - 0xE01B9: 84, - 0xE01BA: 84, - 0xE01BB: 84, - 0xE01BC: 84, - 0xE01BD: 84, - 0xE01BE: 84, - 0xE01BF: 84, - 0xE01C0: 84, - 0xE01C1: 84, - 0xE01C2: 84, - 0xE01C3: 84, - 0xE01C4: 84, - 0xE01C5: 84, - 0xE01C6: 84, - 0xE01C7: 84, - 0xE01C8: 84, - 0xE01C9: 84, - 0xE01CA: 84, - 0xE01CB: 84, - 0xE01CC: 84, - 0xE01CD: 84, - 0xE01CE: 84, - 0xE01CF: 84, - 0xE01D0: 84, - 0xE01D1: 84, - 0xE01D2: 84, - 0xE01D3: 84, - 0xE01D4: 84, - 0xE01D5: 84, - 0xE01D6: 84, - 0xE01D7: 84, - 0xE01D8: 84, - 0xE01D9: 84, - 0xE01DA: 84, - 0xE01DB: 84, - 0xE01DC: 84, - 0xE01DD: 84, - 0xE01DE: 84, - 0xE01DF: 84, - 0xE01E0: 84, - 0xE01E1: 84, - 0xE01E2: 84, - 0xE01E3: 84, - 0xE01E4: 84, - 0xE01E5: 84, - 0xE01E6: 84, - 0xE01E7: 84, - 0xE01E8: 84, - 0xE01E9: 84, - 0xE01EA: 84, - 0xE01EB: 84, - 0xE01EC: 84, - 0xE01ED: 84, - 0xE01EE: 84, - 0xE01EF: 84, -} -codepoint_classes = { - "PVALID": ( - 0x2D0000002E, - 0x300000003A, - 0x610000007B, - 0xDF000000F7, - 0xF800000100, - 0x10100000102, - 0x10300000104, - 0x10500000106, - 0x10700000108, - 0x1090000010A, - 0x10B0000010C, - 0x10D0000010E, - 0x10F00000110, - 0x11100000112, - 0x11300000114, - 0x11500000116, - 0x11700000118, - 0x1190000011A, - 0x11B0000011C, - 0x11D0000011E, - 0x11F00000120, - 0x12100000122, - 0x12300000124, - 0x12500000126, - 0x12700000128, - 0x1290000012A, - 0x12B0000012C, - 0x12D0000012E, - 0x12F00000130, - 0x13100000132, - 0x13500000136, - 0x13700000139, - 0x13A0000013B, - 0x13C0000013D, - 0x13E0000013F, - 0x14200000143, - 0x14400000145, - 0x14600000147, - 0x14800000149, - 0x14B0000014C, - 0x14D0000014E, - 0x14F00000150, - 0x15100000152, - 0x15300000154, - 0x15500000156, - 0x15700000158, - 0x1590000015A, - 0x15B0000015C, - 0x15D0000015E, - 0x15F00000160, - 0x16100000162, - 0x16300000164, - 0x16500000166, - 0x16700000168, - 0x1690000016A, - 0x16B0000016C, - 0x16D0000016E, - 0x16F00000170, - 0x17100000172, - 0x17300000174, - 0x17500000176, - 0x17700000178, - 0x17A0000017B, - 0x17C0000017D, - 0x17E0000017F, - 0x18000000181, - 0x18300000184, - 0x18500000186, - 0x18800000189, - 0x18C0000018E, - 0x19200000193, - 0x19500000196, - 0x1990000019C, - 0x19E0000019F, - 0x1A1000001A2, - 0x1A3000001A4, - 0x1A5000001A6, - 0x1A8000001A9, - 0x1AA000001AC, - 0x1AD000001AE, - 0x1B0000001B1, - 0x1B4000001B5, - 0x1B6000001B7, - 0x1B9000001BC, - 0x1BD000001C4, - 0x1CE000001CF, - 0x1D0000001D1, - 0x1D2000001D3, - 0x1D4000001D5, - 0x1D6000001D7, - 0x1D8000001D9, - 0x1DA000001DB, - 0x1DC000001DE, - 0x1DF000001E0, - 0x1E1000001E2, - 0x1E3000001E4, - 0x1E5000001E6, - 0x1E7000001E8, - 0x1E9000001EA, - 0x1EB000001EC, - 0x1ED000001EE, - 0x1EF000001F1, - 0x1F5000001F6, - 0x1F9000001FA, - 0x1FB000001FC, - 0x1FD000001FE, - 0x1FF00000200, - 0x20100000202, - 0x20300000204, - 0x20500000206, - 0x20700000208, - 0x2090000020A, - 0x20B0000020C, - 0x20D0000020E, - 0x20F00000210, - 0x21100000212, - 0x21300000214, - 0x21500000216, - 0x21700000218, - 0x2190000021A, - 0x21B0000021C, - 0x21D0000021E, - 0x21F00000220, - 0x22100000222, - 0x22300000224, - 0x22500000226, - 0x22700000228, - 0x2290000022A, - 0x22B0000022C, - 0x22D0000022E, - 0x22F00000230, - 0x23100000232, - 0x2330000023A, - 0x23C0000023D, - 0x23F00000241, - 0x24200000243, - 0x24700000248, - 0x2490000024A, - 0x24B0000024C, - 0x24D0000024E, - 0x24F000002B0, - 0x2B9000002C2, - 0x2C6000002D2, - 0x2EC000002ED, - 0x2EE000002EF, - 0x30000000340, - 0x34200000343, - 0x3460000034F, - 0x35000000370, - 0x37100000372, - 0x37300000374, - 0x37700000378, - 0x37B0000037E, - 0x39000000391, - 0x3AC000003CF, - 0x3D7000003D8, - 0x3D9000003DA, - 0x3DB000003DC, - 0x3DD000003DE, - 0x3DF000003E0, - 0x3E1000003E2, - 0x3E3000003E4, - 0x3E5000003E6, - 0x3E7000003E8, - 0x3E9000003EA, - 0x3EB000003EC, - 0x3ED000003EE, - 0x3EF000003F0, - 0x3F3000003F4, - 0x3F8000003F9, - 0x3FB000003FD, - 0x43000000460, - 0x46100000462, - 0x46300000464, - 0x46500000466, - 0x46700000468, - 0x4690000046A, - 0x46B0000046C, - 0x46D0000046E, - 0x46F00000470, - 0x47100000472, - 0x47300000474, - 0x47500000476, - 0x47700000478, - 0x4790000047A, - 0x47B0000047C, - 0x47D0000047E, - 0x47F00000480, - 0x48100000482, - 0x48300000488, - 0x48B0000048C, - 0x48D0000048E, - 0x48F00000490, - 0x49100000492, - 0x49300000494, - 0x49500000496, - 0x49700000498, - 0x4990000049A, - 0x49B0000049C, - 0x49D0000049E, - 0x49F000004A0, - 0x4A1000004A2, - 0x4A3000004A4, - 0x4A5000004A6, - 0x4A7000004A8, - 0x4A9000004AA, - 0x4AB000004AC, - 0x4AD000004AE, - 0x4AF000004B0, - 0x4B1000004B2, - 0x4B3000004B4, - 0x4B5000004B6, - 0x4B7000004B8, - 0x4B9000004BA, - 0x4BB000004BC, - 0x4BD000004BE, - 0x4BF000004C0, - 0x4C2000004C3, - 0x4C4000004C5, - 0x4C6000004C7, - 0x4C8000004C9, - 0x4CA000004CB, - 0x4CC000004CD, - 0x4CE000004D0, - 0x4D1000004D2, - 0x4D3000004D4, - 0x4D5000004D6, - 0x4D7000004D8, - 0x4D9000004DA, - 0x4DB000004DC, - 0x4DD000004DE, - 0x4DF000004E0, - 0x4E1000004E2, - 0x4E3000004E4, - 0x4E5000004E6, - 0x4E7000004E8, - 0x4E9000004EA, - 0x4EB000004EC, - 0x4ED000004EE, - 0x4EF000004F0, - 0x4F1000004F2, - 0x4F3000004F4, - 0x4F5000004F6, - 0x4F7000004F8, - 0x4F9000004FA, - 0x4FB000004FC, - 0x4FD000004FE, - 0x4FF00000500, - 0x50100000502, - 0x50300000504, - 0x50500000506, - 0x50700000508, - 0x5090000050A, - 0x50B0000050C, - 0x50D0000050E, - 0x50F00000510, - 0x51100000512, - 0x51300000514, - 0x51500000516, - 0x51700000518, - 0x5190000051A, - 0x51B0000051C, - 0x51D0000051E, - 0x51F00000520, - 0x52100000522, - 0x52300000524, - 0x52500000526, - 0x52700000528, - 0x5290000052A, - 0x52B0000052C, - 0x52D0000052E, - 0x52F00000530, - 0x5590000055A, - 0x56000000587, - 0x58800000589, - 0x591000005BE, - 0x5BF000005C0, - 0x5C1000005C3, - 0x5C4000005C6, - 0x5C7000005C8, - 0x5D0000005EB, - 0x5EF000005F3, - 0x6100000061B, - 0x62000000640, - 0x64100000660, - 0x66E00000675, - 0x679000006D4, - 0x6D5000006DD, - 0x6DF000006E9, - 0x6EA000006F0, - 0x6FA00000700, - 0x7100000074B, - 0x74D000007B2, - 0x7C0000007F6, - 0x7FD000007FE, - 0x8000000082E, - 0x8400000085C, - 0x8600000086B, - 0x87000000888, - 0x8890000088F, - 0x898000008E2, - 0x8E300000958, - 0x96000000964, - 0x96600000970, - 0x97100000984, - 0x9850000098D, - 0x98F00000991, - 0x993000009A9, - 0x9AA000009B1, - 0x9B2000009B3, - 0x9B6000009BA, - 0x9BC000009C5, - 0x9C7000009C9, - 0x9CB000009CF, - 0x9D7000009D8, - 0x9E0000009E4, - 0x9E6000009F2, - 0x9FC000009FD, - 0x9FE000009FF, - 0xA0100000A04, - 0xA0500000A0B, - 0xA0F00000A11, - 0xA1300000A29, - 0xA2A00000A31, - 0xA3200000A33, - 0xA3500000A36, - 0xA3800000A3A, - 0xA3C00000A3D, - 0xA3E00000A43, - 0xA4700000A49, - 0xA4B00000A4E, - 0xA5100000A52, - 0xA5C00000A5D, - 0xA6600000A76, - 0xA8100000A84, - 0xA8500000A8E, - 0xA8F00000A92, - 0xA9300000AA9, - 0xAAA00000AB1, - 0xAB200000AB4, - 0xAB500000ABA, - 0xABC00000AC6, - 0xAC700000ACA, - 0xACB00000ACE, - 0xAD000000AD1, - 0xAE000000AE4, - 0xAE600000AF0, - 0xAF900000B00, - 0xB0100000B04, - 0xB0500000B0D, - 0xB0F00000B11, - 0xB1300000B29, - 0xB2A00000B31, - 0xB3200000B34, - 0xB3500000B3A, - 0xB3C00000B45, - 0xB4700000B49, - 0xB4B00000B4E, - 0xB5500000B58, - 0xB5F00000B64, - 0xB6600000B70, - 0xB7100000B72, - 0xB8200000B84, - 0xB8500000B8B, - 0xB8E00000B91, - 0xB9200000B96, - 0xB9900000B9B, - 0xB9C00000B9D, - 0xB9E00000BA0, - 0xBA300000BA5, - 0xBA800000BAB, - 0xBAE00000BBA, - 0xBBE00000BC3, - 0xBC600000BC9, - 0xBCA00000BCE, - 0xBD000000BD1, - 0xBD700000BD8, - 0xBE600000BF0, - 0xC0000000C0D, - 0xC0E00000C11, - 0xC1200000C29, - 0xC2A00000C3A, - 0xC3C00000C45, - 0xC4600000C49, - 0xC4A00000C4E, - 0xC5500000C57, - 0xC5800000C5B, - 0xC5D00000C5E, - 0xC6000000C64, - 0xC6600000C70, - 0xC8000000C84, - 0xC8500000C8D, - 0xC8E00000C91, - 0xC9200000CA9, - 0xCAA00000CB4, - 0xCB500000CBA, - 0xCBC00000CC5, - 0xCC600000CC9, - 0xCCA00000CCE, - 0xCD500000CD7, - 0xCDD00000CDF, - 0xCE000000CE4, - 0xCE600000CF0, - 0xCF100000CF4, - 0xD0000000D0D, - 0xD0E00000D11, - 0xD1200000D45, - 0xD4600000D49, - 0xD4A00000D4F, - 0xD5400000D58, - 0xD5F00000D64, - 0xD6600000D70, - 0xD7A00000D80, - 0xD8100000D84, - 0xD8500000D97, - 0xD9A00000DB2, - 0xDB300000DBC, - 0xDBD00000DBE, - 0xDC000000DC7, - 0xDCA00000DCB, - 0xDCF00000DD5, - 0xDD600000DD7, - 0xDD800000DE0, - 0xDE600000DF0, - 0xDF200000DF4, - 0xE0100000E33, - 0xE3400000E3B, - 0xE4000000E4F, - 0xE5000000E5A, - 0xE8100000E83, - 0xE8400000E85, - 0xE8600000E8B, - 0xE8C00000EA4, - 0xEA500000EA6, - 0xEA700000EB3, - 0xEB400000EBE, - 0xEC000000EC5, - 0xEC600000EC7, - 0xEC800000ECF, - 0xED000000EDA, - 0xEDE00000EE0, - 0xF0000000F01, - 0xF0B00000F0C, - 0xF1800000F1A, - 0xF2000000F2A, - 0xF3500000F36, - 0xF3700000F38, - 0xF3900000F3A, - 0xF3E00000F43, - 0xF4400000F48, - 0xF4900000F4D, - 0xF4E00000F52, - 0xF5300000F57, - 0xF5800000F5C, - 0xF5D00000F69, - 0xF6A00000F6D, - 0xF7100000F73, - 0xF7400000F75, - 0xF7A00000F81, - 0xF8200000F85, - 0xF8600000F93, - 0xF9400000F98, - 0xF9900000F9D, - 0xF9E00000FA2, - 0xFA300000FA7, - 0xFA800000FAC, - 0xFAD00000FB9, - 0xFBA00000FBD, - 0xFC600000FC7, - 0x10000000104A, - 0x10500000109E, - 0x10D0000010FB, - 0x10FD00001100, - 0x120000001249, - 0x124A0000124E, - 0x125000001257, - 0x125800001259, - 0x125A0000125E, - 0x126000001289, - 0x128A0000128E, - 0x1290000012B1, - 0x12B2000012B6, - 0x12B8000012BF, - 0x12C0000012C1, - 0x12C2000012C6, - 0x12C8000012D7, - 0x12D800001311, - 0x131200001316, - 0x13180000135B, - 0x135D00001360, - 0x138000001390, - 0x13A0000013F6, - 0x14010000166D, - 0x166F00001680, - 0x16810000169B, - 0x16A0000016EB, - 0x16F1000016F9, - 0x170000001716, - 0x171F00001735, - 0x174000001754, - 0x17600000176D, - 0x176E00001771, - 0x177200001774, - 0x1780000017B4, - 0x17B6000017D4, - 0x17D7000017D8, - 0x17DC000017DE, - 0x17E0000017EA, - 0x18100000181A, - 0x182000001879, - 0x1880000018AB, - 0x18B0000018F6, - 0x19000000191F, - 0x19200000192C, - 0x19300000193C, - 0x19460000196E, - 0x197000001975, - 0x1980000019AC, - 0x19B0000019CA, - 0x19D0000019DA, - 0x1A0000001A1C, - 0x1A2000001A5F, - 0x1A6000001A7D, - 0x1A7F00001A8A, - 0x1A9000001A9A, - 0x1AA700001AA8, - 0x1AB000001ABE, - 0x1ABF00001ACF, - 0x1B0000001B4D, - 0x1B5000001B5A, - 0x1B6B00001B74, - 0x1B8000001BF4, - 0x1C0000001C38, - 0x1C4000001C4A, - 0x1C4D00001C7E, - 0x1CD000001CD3, - 0x1CD400001CFB, - 0x1D0000001D2C, - 0x1D2F00001D30, - 0x1D3B00001D3C, - 0x1D4E00001D4F, - 0x1D6B00001D78, - 0x1D7900001D9B, - 0x1DC000001E00, - 0x1E0100001E02, - 0x1E0300001E04, - 0x1E0500001E06, - 0x1E0700001E08, - 0x1E0900001E0A, - 0x1E0B00001E0C, - 0x1E0D00001E0E, - 0x1E0F00001E10, - 0x1E1100001E12, - 0x1E1300001E14, - 0x1E1500001E16, - 0x1E1700001E18, - 0x1E1900001E1A, - 0x1E1B00001E1C, - 0x1E1D00001E1E, - 0x1E1F00001E20, - 0x1E2100001E22, - 0x1E2300001E24, - 0x1E2500001E26, - 0x1E2700001E28, - 0x1E2900001E2A, - 0x1E2B00001E2C, - 0x1E2D00001E2E, - 0x1E2F00001E30, - 0x1E3100001E32, - 0x1E3300001E34, - 0x1E3500001E36, - 0x1E3700001E38, - 0x1E3900001E3A, - 0x1E3B00001E3C, - 0x1E3D00001E3E, - 0x1E3F00001E40, - 0x1E4100001E42, - 0x1E4300001E44, - 0x1E4500001E46, - 0x1E4700001E48, - 0x1E4900001E4A, - 0x1E4B00001E4C, - 0x1E4D00001E4E, - 0x1E4F00001E50, - 0x1E5100001E52, - 0x1E5300001E54, - 0x1E5500001E56, - 0x1E5700001E58, - 0x1E5900001E5A, - 0x1E5B00001E5C, - 0x1E5D00001E5E, - 0x1E5F00001E60, - 0x1E6100001E62, - 0x1E6300001E64, - 0x1E6500001E66, - 0x1E6700001E68, - 0x1E6900001E6A, - 0x1E6B00001E6C, - 0x1E6D00001E6E, - 0x1E6F00001E70, - 0x1E7100001E72, - 0x1E7300001E74, - 0x1E7500001E76, - 0x1E7700001E78, - 0x1E7900001E7A, - 0x1E7B00001E7C, - 0x1E7D00001E7E, - 0x1E7F00001E80, - 0x1E8100001E82, - 0x1E8300001E84, - 0x1E8500001E86, - 0x1E8700001E88, - 0x1E8900001E8A, - 0x1E8B00001E8C, - 0x1E8D00001E8E, - 0x1E8F00001E90, - 0x1E9100001E92, - 0x1E9300001E94, - 0x1E9500001E9A, - 0x1E9C00001E9E, - 0x1E9F00001EA0, - 0x1EA100001EA2, - 0x1EA300001EA4, - 0x1EA500001EA6, - 0x1EA700001EA8, - 0x1EA900001EAA, - 0x1EAB00001EAC, - 0x1EAD00001EAE, - 0x1EAF00001EB0, - 0x1EB100001EB2, - 0x1EB300001EB4, - 0x1EB500001EB6, - 0x1EB700001EB8, - 0x1EB900001EBA, - 0x1EBB00001EBC, - 0x1EBD00001EBE, - 0x1EBF00001EC0, - 0x1EC100001EC2, - 0x1EC300001EC4, - 0x1EC500001EC6, - 0x1EC700001EC8, - 0x1EC900001ECA, - 0x1ECB00001ECC, - 0x1ECD00001ECE, - 0x1ECF00001ED0, - 0x1ED100001ED2, - 0x1ED300001ED4, - 0x1ED500001ED6, - 0x1ED700001ED8, - 0x1ED900001EDA, - 0x1EDB00001EDC, - 0x1EDD00001EDE, - 0x1EDF00001EE0, - 0x1EE100001EE2, - 0x1EE300001EE4, - 0x1EE500001EE6, - 0x1EE700001EE8, - 0x1EE900001EEA, - 0x1EEB00001EEC, - 0x1EED00001EEE, - 0x1EEF00001EF0, - 0x1EF100001EF2, - 0x1EF300001EF4, - 0x1EF500001EF6, - 0x1EF700001EF8, - 0x1EF900001EFA, - 0x1EFB00001EFC, - 0x1EFD00001EFE, - 0x1EFF00001F08, - 0x1F1000001F16, - 0x1F2000001F28, - 0x1F3000001F38, - 0x1F4000001F46, - 0x1F5000001F58, - 0x1F6000001F68, - 0x1F7000001F71, - 0x1F7200001F73, - 0x1F7400001F75, - 0x1F7600001F77, - 0x1F7800001F79, - 0x1F7A00001F7B, - 0x1F7C00001F7D, - 0x1FB000001FB2, - 0x1FB600001FB7, - 0x1FC600001FC7, - 0x1FD000001FD3, - 0x1FD600001FD8, - 0x1FE000001FE3, - 0x1FE400001FE8, - 0x1FF600001FF7, - 0x214E0000214F, - 0x218400002185, - 0x2C3000002C60, - 0x2C6100002C62, - 0x2C6500002C67, - 0x2C6800002C69, - 0x2C6A00002C6B, - 0x2C6C00002C6D, - 0x2C7100002C72, - 0x2C7300002C75, - 0x2C7600002C7C, - 0x2C8100002C82, - 0x2C8300002C84, - 0x2C8500002C86, - 0x2C8700002C88, - 0x2C8900002C8A, - 0x2C8B00002C8C, - 0x2C8D00002C8E, - 0x2C8F00002C90, - 0x2C9100002C92, - 0x2C9300002C94, - 0x2C9500002C96, - 0x2C9700002C98, - 0x2C9900002C9A, - 0x2C9B00002C9C, - 0x2C9D00002C9E, - 0x2C9F00002CA0, - 0x2CA100002CA2, - 0x2CA300002CA4, - 0x2CA500002CA6, - 0x2CA700002CA8, - 0x2CA900002CAA, - 0x2CAB00002CAC, - 0x2CAD00002CAE, - 0x2CAF00002CB0, - 0x2CB100002CB2, - 0x2CB300002CB4, - 0x2CB500002CB6, - 0x2CB700002CB8, - 0x2CB900002CBA, - 0x2CBB00002CBC, - 0x2CBD00002CBE, - 0x2CBF00002CC0, - 0x2CC100002CC2, - 0x2CC300002CC4, - 0x2CC500002CC6, - 0x2CC700002CC8, - 0x2CC900002CCA, - 0x2CCB00002CCC, - 0x2CCD00002CCE, - 0x2CCF00002CD0, - 0x2CD100002CD2, - 0x2CD300002CD4, - 0x2CD500002CD6, - 0x2CD700002CD8, - 0x2CD900002CDA, - 0x2CDB00002CDC, - 0x2CDD00002CDE, - 0x2CDF00002CE0, - 0x2CE100002CE2, - 0x2CE300002CE5, - 0x2CEC00002CED, - 0x2CEE00002CF2, - 0x2CF300002CF4, - 0x2D0000002D26, - 0x2D2700002D28, - 0x2D2D00002D2E, - 0x2D3000002D68, - 0x2D7F00002D97, - 0x2DA000002DA7, - 0x2DA800002DAF, - 0x2DB000002DB7, - 0x2DB800002DBF, - 0x2DC000002DC7, - 0x2DC800002DCF, - 0x2DD000002DD7, - 0x2DD800002DDF, - 0x2DE000002E00, - 0x2E2F00002E30, - 0x300500003008, - 0x302A0000302E, - 0x303C0000303D, - 0x304100003097, - 0x30990000309B, - 0x309D0000309F, - 0x30A1000030FB, - 0x30FC000030FF, - 0x310500003130, - 0x31A0000031C0, - 0x31F000003200, - 0x340000004DC0, - 0x4E000000A48D, - 0xA4D00000A4FE, - 0xA5000000A60D, - 0xA6100000A62C, - 0xA6410000A642, - 0xA6430000A644, - 0xA6450000A646, - 0xA6470000A648, - 0xA6490000A64A, - 0xA64B0000A64C, - 0xA64D0000A64E, - 0xA64F0000A650, - 0xA6510000A652, - 0xA6530000A654, - 0xA6550000A656, - 0xA6570000A658, - 0xA6590000A65A, - 0xA65B0000A65C, - 0xA65D0000A65E, - 0xA65F0000A660, - 0xA6610000A662, - 0xA6630000A664, - 0xA6650000A666, - 0xA6670000A668, - 0xA6690000A66A, - 0xA66B0000A66C, - 0xA66D0000A670, - 0xA6740000A67E, - 0xA67F0000A680, - 0xA6810000A682, - 0xA6830000A684, - 0xA6850000A686, - 0xA6870000A688, - 0xA6890000A68A, - 0xA68B0000A68C, - 0xA68D0000A68E, - 0xA68F0000A690, - 0xA6910000A692, - 0xA6930000A694, - 0xA6950000A696, - 0xA6970000A698, - 0xA6990000A69A, - 0xA69B0000A69C, - 0xA69E0000A6E6, - 0xA6F00000A6F2, - 0xA7170000A720, - 0xA7230000A724, - 0xA7250000A726, - 0xA7270000A728, - 0xA7290000A72A, - 0xA72B0000A72C, - 0xA72D0000A72E, - 0xA72F0000A732, - 0xA7330000A734, - 0xA7350000A736, - 0xA7370000A738, - 0xA7390000A73A, - 0xA73B0000A73C, - 0xA73D0000A73E, - 0xA73F0000A740, - 0xA7410000A742, - 0xA7430000A744, - 0xA7450000A746, - 0xA7470000A748, - 0xA7490000A74A, - 0xA74B0000A74C, - 0xA74D0000A74E, - 0xA74F0000A750, - 0xA7510000A752, - 0xA7530000A754, - 0xA7550000A756, - 0xA7570000A758, - 0xA7590000A75A, - 0xA75B0000A75C, - 0xA75D0000A75E, - 0xA75F0000A760, - 0xA7610000A762, - 0xA7630000A764, - 0xA7650000A766, - 0xA7670000A768, - 0xA7690000A76A, - 0xA76B0000A76C, - 0xA76D0000A76E, - 0xA76F0000A770, - 0xA7710000A779, - 0xA77A0000A77B, - 0xA77C0000A77D, - 0xA77F0000A780, - 0xA7810000A782, - 0xA7830000A784, - 0xA7850000A786, - 0xA7870000A789, - 0xA78C0000A78D, - 0xA78E0000A790, - 0xA7910000A792, - 0xA7930000A796, - 0xA7970000A798, - 0xA7990000A79A, - 0xA79B0000A79C, - 0xA79D0000A79E, - 0xA79F0000A7A0, - 0xA7A10000A7A2, - 0xA7A30000A7A4, - 0xA7A50000A7A6, - 0xA7A70000A7A8, - 0xA7A90000A7AA, - 0xA7AF0000A7B0, - 0xA7B50000A7B6, - 0xA7B70000A7B8, - 0xA7B90000A7BA, - 0xA7BB0000A7BC, - 0xA7BD0000A7BE, - 0xA7BF0000A7C0, - 0xA7C10000A7C2, - 0xA7C30000A7C4, - 0xA7C80000A7C9, - 0xA7CA0000A7CB, - 0xA7D10000A7D2, - 0xA7D30000A7D4, - 0xA7D50000A7D6, - 0xA7D70000A7D8, - 0xA7D90000A7DA, - 0xA7F60000A7F8, - 0xA7FA0000A828, - 0xA82C0000A82D, - 0xA8400000A874, - 0xA8800000A8C6, - 0xA8D00000A8DA, - 0xA8E00000A8F8, - 0xA8FB0000A8FC, - 0xA8FD0000A92E, - 0xA9300000A954, - 0xA9800000A9C1, - 0xA9CF0000A9DA, - 0xA9E00000A9FF, - 0xAA000000AA37, - 0xAA400000AA4E, - 0xAA500000AA5A, - 0xAA600000AA77, - 0xAA7A0000AAC3, - 0xAADB0000AADE, - 0xAAE00000AAF0, - 0xAAF20000AAF7, - 0xAB010000AB07, - 0xAB090000AB0F, - 0xAB110000AB17, - 0xAB200000AB27, - 0xAB280000AB2F, - 0xAB300000AB5B, - 0xAB600000AB69, - 0xABC00000ABEB, - 0xABEC0000ABEE, - 0xABF00000ABFA, - 0xAC000000D7A4, - 0xFA0E0000FA10, - 0xFA110000FA12, - 0xFA130000FA15, - 0xFA1F0000FA20, - 0xFA210000FA22, - 0xFA230000FA25, - 0xFA270000FA2A, - 0xFB1E0000FB1F, - 0xFE200000FE30, - 0xFE730000FE74, - 0x100000001000C, - 0x1000D00010027, - 0x100280001003B, - 0x1003C0001003E, - 0x1003F0001004E, - 0x100500001005E, - 0x10080000100FB, - 0x101FD000101FE, - 0x102800001029D, - 0x102A0000102D1, - 0x102E0000102E1, - 0x1030000010320, - 0x1032D00010341, - 0x103420001034A, - 0x103500001037B, - 0x103800001039E, - 0x103A0000103C4, - 0x103C8000103D0, - 0x104280001049E, - 0x104A0000104AA, - 0x104D8000104FC, - 0x1050000010528, - 0x1053000010564, - 0x10597000105A2, - 0x105A3000105B2, - 0x105B3000105BA, - 0x105BB000105BD, - 0x1060000010737, - 0x1074000010756, - 0x1076000010768, - 0x1078000010781, - 0x1080000010806, - 0x1080800010809, - 0x1080A00010836, - 0x1083700010839, - 0x1083C0001083D, - 0x1083F00010856, - 0x1086000010877, - 0x108800001089F, - 0x108E0000108F3, - 0x108F4000108F6, - 0x1090000010916, - 0x109200001093A, - 0x10980000109B8, - 0x109BE000109C0, - 0x10A0000010A04, - 0x10A0500010A07, - 0x10A0C00010A14, - 0x10A1500010A18, - 0x10A1900010A36, - 0x10A3800010A3B, - 0x10A3F00010A40, - 0x10A6000010A7D, - 0x10A8000010A9D, - 0x10AC000010AC8, - 0x10AC900010AE7, - 0x10B0000010B36, - 0x10B4000010B56, - 0x10B6000010B73, - 0x10B8000010B92, - 0x10C0000010C49, - 0x10CC000010CF3, - 0x10D0000010D28, - 0x10D3000010D3A, - 0x10E8000010EAA, - 0x10EAB00010EAD, - 0x10EB000010EB2, - 0x10EFD00010F1D, - 0x10F2700010F28, - 0x10F3000010F51, - 0x10F7000010F86, - 0x10FB000010FC5, - 0x10FE000010FF7, - 0x1100000011047, - 0x1106600011076, - 0x1107F000110BB, - 0x110C2000110C3, - 0x110D0000110E9, - 0x110F0000110FA, - 0x1110000011135, - 0x1113600011140, - 0x1114400011148, - 0x1115000011174, - 0x1117600011177, - 0x11180000111C5, - 0x111C9000111CD, - 0x111CE000111DB, - 0x111DC000111DD, - 0x1120000011212, - 0x1121300011238, - 0x1123E00011242, - 0x1128000011287, - 0x1128800011289, - 0x1128A0001128E, - 0x1128F0001129E, - 0x1129F000112A9, - 0x112B0000112EB, - 0x112F0000112FA, - 0x1130000011304, - 0x113050001130D, - 0x1130F00011311, - 0x1131300011329, - 0x1132A00011331, - 0x1133200011334, - 0x113350001133A, - 0x1133B00011345, - 0x1134700011349, - 0x1134B0001134E, - 0x1135000011351, - 0x1135700011358, - 0x1135D00011364, - 0x113660001136D, - 0x1137000011375, - 0x114000001144B, - 0x114500001145A, - 0x1145E00011462, - 0x11480000114C6, - 0x114C7000114C8, - 0x114D0000114DA, - 0x11580000115B6, - 0x115B8000115C1, - 0x115D8000115DE, - 0x1160000011641, - 0x1164400011645, - 0x116500001165A, - 0x11680000116B9, - 0x116C0000116CA, - 0x117000001171B, - 0x1171D0001172C, - 0x117300001173A, - 0x1174000011747, - 0x118000001183B, - 0x118C0000118EA, - 0x118FF00011907, - 0x119090001190A, - 0x1190C00011914, - 0x1191500011917, - 0x1191800011936, - 0x1193700011939, - 0x1193B00011944, - 0x119500001195A, - 0x119A0000119A8, - 0x119AA000119D8, - 0x119DA000119E2, - 0x119E3000119E5, - 0x11A0000011A3F, - 0x11A4700011A48, - 0x11A5000011A9A, - 0x11A9D00011A9E, - 0x11AB000011AF9, - 0x11C0000011C09, - 0x11C0A00011C37, - 0x11C3800011C41, - 0x11C5000011C5A, - 0x11C7200011C90, - 0x11C9200011CA8, - 0x11CA900011CB7, - 0x11D0000011D07, - 0x11D0800011D0A, - 0x11D0B00011D37, - 0x11D3A00011D3B, - 0x11D3C00011D3E, - 0x11D3F00011D48, - 0x11D5000011D5A, - 0x11D6000011D66, - 0x11D6700011D69, - 0x11D6A00011D8F, - 0x11D9000011D92, - 0x11D9300011D99, - 0x11DA000011DAA, - 0x11EE000011EF7, - 0x11F0000011F11, - 0x11F1200011F3B, - 0x11F3E00011F43, - 0x11F5000011F5A, - 0x11FB000011FB1, - 0x120000001239A, - 0x1248000012544, - 0x12F9000012FF1, - 0x1300000013430, - 0x1344000013456, - 0x1440000014647, - 0x1680000016A39, - 0x16A4000016A5F, - 0x16A6000016A6A, - 0x16A7000016ABF, - 0x16AC000016ACA, - 0x16AD000016AEE, - 0x16AF000016AF5, - 0x16B0000016B37, - 0x16B4000016B44, - 0x16B5000016B5A, - 0x16B6300016B78, - 0x16B7D00016B90, - 0x16E6000016E80, - 0x16F0000016F4B, - 0x16F4F00016F88, - 0x16F8F00016FA0, - 0x16FE000016FE2, - 0x16FE300016FE5, - 0x16FF000016FF2, - 0x17000000187F8, - 0x1880000018CD6, - 0x18D0000018D09, - 0x1AFF00001AFF4, - 0x1AFF50001AFFC, - 0x1AFFD0001AFFF, - 0x1B0000001B123, - 0x1B1320001B133, - 0x1B1500001B153, - 0x1B1550001B156, - 0x1B1640001B168, - 0x1B1700001B2FC, - 0x1BC000001BC6B, - 0x1BC700001BC7D, - 0x1BC800001BC89, - 0x1BC900001BC9A, - 0x1BC9D0001BC9F, - 0x1CF000001CF2E, - 0x1CF300001CF47, - 0x1DA000001DA37, - 0x1DA3B0001DA6D, - 0x1DA750001DA76, - 0x1DA840001DA85, - 0x1DA9B0001DAA0, - 0x1DAA10001DAB0, - 0x1DF000001DF1F, - 0x1DF250001DF2B, - 0x1E0000001E007, - 0x1E0080001E019, - 0x1E01B0001E022, - 0x1E0230001E025, - 0x1E0260001E02B, - 0x1E08F0001E090, - 0x1E1000001E12D, - 0x1E1300001E13E, - 0x1E1400001E14A, - 0x1E14E0001E14F, - 0x1E2900001E2AF, - 0x1E2C00001E2FA, - 0x1E4D00001E4FA, - 0x1E7E00001E7E7, - 0x1E7E80001E7EC, - 0x1E7ED0001E7EF, - 0x1E7F00001E7FF, - 0x1E8000001E8C5, - 0x1E8D00001E8D7, - 0x1E9220001E94C, - 0x1E9500001E95A, - 0x200000002A6E0, - 0x2A7000002B73A, - 0x2B7400002B81E, - 0x2B8200002CEA2, - 0x2CEB00002EBE1, - 0x2EBF00002EE5E, - 0x300000003134B, - 0x31350000323B0, - ), - "CONTEXTJ": (0x200C0000200E,), - "CONTEXTO": ( - 0xB7000000B8, - 0x37500000376, - 0x5F3000005F5, - 0x6600000066A, - 0x6F0000006FA, - 0x30FB000030FC, - ), -} diff --git a/vscode-extension/context-engine-uploader/python_libs/idna/intranges.py b/vscode-extension/context-engine-uploader/python_libs/idna/intranges.py deleted file mode 100644 index 7bfaa8d8..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna/intranges.py +++ /dev/null @@ -1,57 +0,0 @@ -""" -Given a list of integers, made up of (hopefully) a small number of long runs -of consecutive integers, compute a representation of the form -((start1, end1), (start2, end2) ...). Then answer the question "was x present -in the original list?" in time O(log(# runs)). -""" - -import bisect -from typing import List, Tuple - - -def intranges_from_list(list_: List[int]) -> Tuple[int, ...]: - """Represent a list of integers as a sequence of ranges: - ((start_0, end_0), (start_1, end_1), ...), such that the original - integers are exactly those x such that start_i <= x < end_i for some i. - - Ranges are encoded as single integers (start << 32 | end), not as tuples. - """ - - sorted_list = sorted(list_) - ranges = [] - last_write = -1 - for i in range(len(sorted_list)): - if i + 1 < len(sorted_list): - if sorted_list[i] == sorted_list[i + 1] - 1: - continue - current_range = sorted_list[last_write + 1 : i + 1] - ranges.append(_encode_range(current_range[0], current_range[-1] + 1)) - last_write = i - - return tuple(ranges) - - -def _encode_range(start: int, end: int) -> int: - return (start << 32) | end - - -def _decode_range(r: int) -> Tuple[int, int]: - return (r >> 32), (r & ((1 << 32) - 1)) - - -def intranges_contain(int_: int, ranges: Tuple[int, ...]) -> bool: - """Determine if `int_` falls into one of the ranges in `ranges`.""" - tuple_ = _encode_range(int_, 0) - pos = bisect.bisect_left(ranges, tuple_) - # we could be immediately ahead of a tuple (start, end) - # with start < int_ <= end - if pos > 0: - left, right = _decode_range(ranges[pos - 1]) - if left <= int_ < right: - return True - # or we could be immediately behind a tuple (int_, end) - if pos < len(ranges): - left, _ = _decode_range(ranges[pos]) - if left == int_: - return True - return False diff --git a/vscode-extension/context-engine-uploader/python_libs/idna/package_data.py b/vscode-extension/context-engine-uploader/python_libs/idna/package_data.py deleted file mode 100644 index 514ff7e2..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna/package_data.py +++ /dev/null @@ -1 +0,0 @@ -__version__ = "3.10" diff --git a/vscode-extension/context-engine-uploader/python_libs/idna/py.typed b/vscode-extension/context-engine-uploader/python_libs/idna/py.typed deleted file mode 100644 index e69de29b..00000000 diff --git a/vscode-extension/context-engine-uploader/python_libs/idna/uts46data.py b/vscode-extension/context-engine-uploader/python_libs/idna/uts46data.py deleted file mode 100644 index eb894327..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/idna/uts46data.py +++ /dev/null @@ -1,8681 +0,0 @@ -# This file is automatically generated by tools/idna-data -# vim: set fileencoding=utf-8 : - -from typing import List, Tuple, Union - -"""IDNA Mapping Table from UTS46.""" - - -__version__ = "15.1.0" - - -def _seg_0() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x0, "3"), - (0x1, "3"), - (0x2, "3"), - (0x3, "3"), - (0x4, "3"), - (0x5, "3"), - (0x6, "3"), - (0x7, "3"), - (0x8, "3"), - (0x9, "3"), - (0xA, "3"), - (0xB, "3"), - (0xC, "3"), - (0xD, "3"), - (0xE, "3"), - (0xF, "3"), - (0x10, "3"), - (0x11, "3"), - (0x12, "3"), - (0x13, "3"), - (0x14, "3"), - (0x15, "3"), - (0x16, "3"), - (0x17, "3"), - (0x18, "3"), - (0x19, "3"), - (0x1A, "3"), - (0x1B, "3"), - (0x1C, "3"), - (0x1D, "3"), - (0x1E, "3"), - (0x1F, "3"), - (0x20, "3"), - (0x21, "3"), - (0x22, "3"), - (0x23, "3"), - (0x24, "3"), - (0x25, "3"), - (0x26, "3"), - (0x27, "3"), - (0x28, "3"), - (0x29, "3"), - (0x2A, "3"), - (0x2B, "3"), - (0x2C, "3"), - (0x2D, "V"), - (0x2E, "V"), - (0x2F, "3"), - (0x30, "V"), - (0x31, "V"), - (0x32, "V"), - (0x33, "V"), - (0x34, "V"), - (0x35, "V"), - (0x36, "V"), - (0x37, "V"), - (0x38, "V"), - (0x39, "V"), - (0x3A, "3"), - (0x3B, "3"), - (0x3C, "3"), - (0x3D, "3"), - (0x3E, "3"), - (0x3F, "3"), - (0x40, "3"), - (0x41, "M", "a"), - (0x42, "M", "b"), - (0x43, "M", "c"), - (0x44, "M", "d"), - (0x45, "M", "e"), - (0x46, "M", "f"), - (0x47, "M", "g"), - (0x48, "M", "h"), - (0x49, "M", "i"), - (0x4A, "M", "j"), - (0x4B, "M", "k"), - (0x4C, "M", "l"), - (0x4D, "M", "m"), - (0x4E, "M", "n"), - (0x4F, "M", "o"), - (0x50, "M", "p"), - (0x51, "M", "q"), - (0x52, "M", "r"), - (0x53, "M", "s"), - (0x54, "M", "t"), - (0x55, "M", "u"), - (0x56, "M", "v"), - (0x57, "M", "w"), - (0x58, "M", "x"), - (0x59, "M", "y"), - (0x5A, "M", "z"), - (0x5B, "3"), - (0x5C, "3"), - (0x5D, "3"), - (0x5E, "3"), - (0x5F, "3"), - (0x60, "3"), - (0x61, "V"), - (0x62, "V"), - (0x63, "V"), - ] - - -def _seg_1() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x64, "V"), - (0x65, "V"), - (0x66, "V"), - (0x67, "V"), - (0x68, "V"), - (0x69, "V"), - (0x6A, "V"), - (0x6B, "V"), - (0x6C, "V"), - (0x6D, "V"), - (0x6E, "V"), - (0x6F, "V"), - (0x70, "V"), - (0x71, "V"), - (0x72, "V"), - (0x73, "V"), - (0x74, "V"), - (0x75, "V"), - (0x76, "V"), - (0x77, "V"), - (0x78, "V"), - (0x79, "V"), - (0x7A, "V"), - (0x7B, "3"), - (0x7C, "3"), - (0x7D, "3"), - (0x7E, "3"), - (0x7F, "3"), - (0x80, "X"), - (0x81, "X"), - (0x82, "X"), - (0x83, "X"), - (0x84, "X"), - (0x85, "X"), - (0x86, "X"), - (0x87, "X"), - (0x88, "X"), - (0x89, "X"), - (0x8A, "X"), - (0x8B, "X"), - (0x8C, "X"), - (0x8D, "X"), - (0x8E, "X"), - (0x8F, "X"), - (0x90, "X"), - (0x91, "X"), - (0x92, "X"), - (0x93, "X"), - (0x94, "X"), - (0x95, "X"), - (0x96, "X"), - (0x97, "X"), - (0x98, "X"), - (0x99, "X"), - (0x9A, "X"), - (0x9B, "X"), - (0x9C, "X"), - (0x9D, "X"), - (0x9E, "X"), - (0x9F, "X"), - (0xA0, "3", " "), - (0xA1, "V"), - (0xA2, "V"), - (0xA3, "V"), - (0xA4, "V"), - (0xA5, "V"), - (0xA6, "V"), - (0xA7, "V"), - (0xA8, "3", " ̈"), - (0xA9, "V"), - (0xAA, "M", "a"), - (0xAB, "V"), - (0xAC, "V"), - (0xAD, "I"), - (0xAE, "V"), - (0xAF, "3", " ̄"), - (0xB0, "V"), - (0xB1, "V"), - (0xB2, "M", "2"), - (0xB3, "M", "3"), - (0xB4, "3", " ́"), - (0xB5, "M", "μ"), - (0xB6, "V"), - (0xB7, "V"), - (0xB8, "3", " ̧"), - (0xB9, "M", "1"), - (0xBA, "M", "o"), - (0xBB, "V"), - (0xBC, "M", "1⁄4"), - (0xBD, "M", "1⁄2"), - (0xBE, "M", "3⁄4"), - (0xBF, "V"), - (0xC0, "M", "à"), - (0xC1, "M", "á"), - (0xC2, "M", "â"), - (0xC3, "M", "ã"), - (0xC4, "M", "ä"), - (0xC5, "M", "å"), - (0xC6, "M", "æ"), - (0xC7, "M", "ç"), - ] - - -def _seg_2() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xC8, "M", "è"), - (0xC9, "M", "é"), - (0xCA, "M", "ê"), - (0xCB, "M", "ë"), - (0xCC, "M", "ì"), - (0xCD, "M", "í"), - (0xCE, "M", "î"), - (0xCF, "M", "ï"), - (0xD0, "M", "ð"), - (0xD1, "M", "ñ"), - (0xD2, "M", "ò"), - (0xD3, "M", "ó"), - (0xD4, "M", "ô"), - (0xD5, "M", "õ"), - (0xD6, "M", "ö"), - (0xD7, "V"), - (0xD8, "M", "ø"), - (0xD9, "M", "ù"), - (0xDA, "M", "ú"), - (0xDB, "M", "û"), - (0xDC, "M", "ü"), - (0xDD, "M", "ý"), - (0xDE, "M", "þ"), - (0xDF, "D", "ss"), - (0xE0, "V"), - (0xE1, "V"), - (0xE2, "V"), - (0xE3, "V"), - (0xE4, "V"), - (0xE5, "V"), - (0xE6, "V"), - (0xE7, "V"), - (0xE8, "V"), - (0xE9, "V"), - (0xEA, "V"), - (0xEB, "V"), - (0xEC, "V"), - (0xED, "V"), - (0xEE, "V"), - (0xEF, "V"), - (0xF0, "V"), - (0xF1, "V"), - (0xF2, "V"), - (0xF3, "V"), - (0xF4, "V"), - (0xF5, "V"), - (0xF6, "V"), - (0xF7, "V"), - (0xF8, "V"), - (0xF9, "V"), - (0xFA, "V"), - (0xFB, "V"), - (0xFC, "V"), - (0xFD, "V"), - (0xFE, "V"), - (0xFF, "V"), - (0x100, "M", "ā"), - (0x101, "V"), - (0x102, "M", "ă"), - (0x103, "V"), - (0x104, "M", "ą"), - (0x105, "V"), - (0x106, "M", "ć"), - (0x107, "V"), - (0x108, "M", "ĉ"), - (0x109, "V"), - (0x10A, "M", "ċ"), - (0x10B, "V"), - (0x10C, "M", "č"), - (0x10D, "V"), - (0x10E, "M", "ď"), - (0x10F, "V"), - (0x110, "M", "đ"), - (0x111, "V"), - (0x112, "M", "ē"), - (0x113, "V"), - (0x114, "M", "ĕ"), - (0x115, "V"), - (0x116, "M", "ė"), - (0x117, "V"), - (0x118, "M", "ę"), - (0x119, "V"), - (0x11A, "M", "ě"), - (0x11B, "V"), - (0x11C, "M", "ĝ"), - (0x11D, "V"), - (0x11E, "M", "ğ"), - (0x11F, "V"), - (0x120, "M", "ġ"), - (0x121, "V"), - (0x122, "M", "ģ"), - (0x123, "V"), - (0x124, "M", "ĥ"), - (0x125, "V"), - (0x126, "M", "ħ"), - (0x127, "V"), - (0x128, "M", "ĩ"), - (0x129, "V"), - (0x12A, "M", "ī"), - (0x12B, "V"), - ] - - -def _seg_3() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x12C, "M", "ĭ"), - (0x12D, "V"), - (0x12E, "M", "į"), - (0x12F, "V"), - (0x130, "M", "i̇"), - (0x131, "V"), - (0x132, "M", "ij"), - (0x134, "M", "ĵ"), - (0x135, "V"), - (0x136, "M", "ķ"), - (0x137, "V"), - (0x139, "M", "ĺ"), - (0x13A, "V"), - (0x13B, "M", "ļ"), - (0x13C, "V"), - (0x13D, "M", "ľ"), - (0x13E, "V"), - (0x13F, "M", "l·"), - (0x141, "M", "ł"), - (0x142, "V"), - (0x143, "M", "ń"), - (0x144, "V"), - (0x145, "M", "ņ"), - (0x146, "V"), - (0x147, "M", "ň"), - (0x148, "V"), - (0x149, "M", "ʼn"), - (0x14A, "M", "ŋ"), - (0x14B, "V"), - (0x14C, "M", "ō"), - (0x14D, "V"), - (0x14E, "M", "ŏ"), - (0x14F, "V"), - (0x150, "M", "ő"), - (0x151, "V"), - (0x152, "M", "œ"), - (0x153, "V"), - (0x154, "M", "ŕ"), - (0x155, "V"), - (0x156, "M", "ŗ"), - (0x157, "V"), - (0x158, "M", "ř"), - (0x159, "V"), - (0x15A, "M", "ś"), - (0x15B, "V"), - (0x15C, "M", "ŝ"), - (0x15D, "V"), - (0x15E, "M", "ş"), - (0x15F, "V"), - (0x160, "M", "š"), - (0x161, "V"), - (0x162, "M", "ţ"), - (0x163, "V"), - (0x164, "M", "ť"), - (0x165, "V"), - (0x166, "M", "ŧ"), - (0x167, "V"), - (0x168, "M", "ũ"), - (0x169, "V"), - (0x16A, "M", "ū"), - (0x16B, "V"), - (0x16C, "M", "ŭ"), - (0x16D, "V"), - (0x16E, "M", "ů"), - (0x16F, "V"), - (0x170, "M", "ű"), - (0x171, "V"), - (0x172, "M", "ų"), - (0x173, "V"), - (0x174, "M", "ŵ"), - (0x175, "V"), - (0x176, "M", "ŷ"), - (0x177, "V"), - (0x178, "M", "ÿ"), - (0x179, "M", "ź"), - (0x17A, "V"), - (0x17B, "M", "ż"), - (0x17C, "V"), - (0x17D, "M", "ž"), - (0x17E, "V"), - (0x17F, "M", "s"), - (0x180, "V"), - (0x181, "M", "ɓ"), - (0x182, "M", "ƃ"), - (0x183, "V"), - (0x184, "M", "ƅ"), - (0x185, "V"), - (0x186, "M", "ɔ"), - (0x187, "M", "ƈ"), - (0x188, "V"), - (0x189, "M", "ɖ"), - (0x18A, "M", "ɗ"), - (0x18B, "M", "ƌ"), - (0x18C, "V"), - (0x18E, "M", "ǝ"), - (0x18F, "M", "ə"), - (0x190, "M", "ɛ"), - (0x191, "M", "ƒ"), - (0x192, "V"), - (0x193, "M", "ɠ"), - ] - - -def _seg_4() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x194, "M", "ɣ"), - (0x195, "V"), - (0x196, "M", "ɩ"), - (0x197, "M", "ɨ"), - (0x198, "M", "ƙ"), - (0x199, "V"), - (0x19C, "M", "ɯ"), - (0x19D, "M", "ɲ"), - (0x19E, "V"), - (0x19F, "M", "ɵ"), - (0x1A0, "M", "ơ"), - (0x1A1, "V"), - (0x1A2, "M", "ƣ"), - (0x1A3, "V"), - (0x1A4, "M", "ƥ"), - (0x1A5, "V"), - (0x1A6, "M", "ʀ"), - (0x1A7, "M", "ƨ"), - (0x1A8, "V"), - (0x1A9, "M", "ʃ"), - (0x1AA, "V"), - (0x1AC, "M", "ƭ"), - (0x1AD, "V"), - (0x1AE, "M", "ʈ"), - (0x1AF, "M", "ư"), - (0x1B0, "V"), - (0x1B1, "M", "ʊ"), - (0x1B2, "M", "ʋ"), - (0x1B3, "M", "ƴ"), - (0x1B4, "V"), - (0x1B5, "M", "ƶ"), - (0x1B6, "V"), - (0x1B7, "M", "ʒ"), - (0x1B8, "M", "ƹ"), - (0x1B9, "V"), - (0x1BC, "M", "ƽ"), - (0x1BD, "V"), - (0x1C4, "M", "dž"), - (0x1C7, "M", "lj"), - (0x1CA, "M", "nj"), - (0x1CD, "M", "ǎ"), - (0x1CE, "V"), - (0x1CF, "M", "ǐ"), - (0x1D0, "V"), - (0x1D1, "M", "ǒ"), - (0x1D2, "V"), - (0x1D3, "M", "ǔ"), - (0x1D4, "V"), - (0x1D5, "M", "ǖ"), - (0x1D6, "V"), - (0x1D7, "M", "ǘ"), - (0x1D8, "V"), - (0x1D9, "M", "ǚ"), - (0x1DA, "V"), - (0x1DB, "M", "ǜ"), - (0x1DC, "V"), - (0x1DE, "M", "ǟ"), - (0x1DF, "V"), - (0x1E0, "M", "ǡ"), - (0x1E1, "V"), - (0x1E2, "M", "ǣ"), - (0x1E3, "V"), - (0x1E4, "M", "ǥ"), - (0x1E5, "V"), - (0x1E6, "M", "ǧ"), - (0x1E7, "V"), - (0x1E8, "M", "ǩ"), - (0x1E9, "V"), - (0x1EA, "M", "ǫ"), - (0x1EB, "V"), - (0x1EC, "M", "ǭ"), - (0x1ED, "V"), - (0x1EE, "M", "ǯ"), - (0x1EF, "V"), - (0x1F1, "M", "dz"), - (0x1F4, "M", "ǵ"), - (0x1F5, "V"), - (0x1F6, "M", "ƕ"), - (0x1F7, "M", "ƿ"), - (0x1F8, "M", "ǹ"), - (0x1F9, "V"), - (0x1FA, "M", "ǻ"), - (0x1FB, "V"), - (0x1FC, "M", "ǽ"), - (0x1FD, "V"), - (0x1FE, "M", "ǿ"), - (0x1FF, "V"), - (0x200, "M", "ȁ"), - (0x201, "V"), - (0x202, "M", "ȃ"), - (0x203, "V"), - (0x204, "M", "ȅ"), - (0x205, "V"), - (0x206, "M", "ȇ"), - (0x207, "V"), - (0x208, "M", "ȉ"), - (0x209, "V"), - (0x20A, "M", "ȋ"), - (0x20B, "V"), - (0x20C, "M", "ȍ"), - ] - - -def _seg_5() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x20D, "V"), - (0x20E, "M", "ȏ"), - (0x20F, "V"), - (0x210, "M", "ȑ"), - (0x211, "V"), - (0x212, "M", "ȓ"), - (0x213, "V"), - (0x214, "M", "ȕ"), - (0x215, "V"), - (0x216, "M", "ȗ"), - (0x217, "V"), - (0x218, "M", "ș"), - (0x219, "V"), - (0x21A, "M", "ț"), - (0x21B, "V"), - (0x21C, "M", "ȝ"), - (0x21D, "V"), - (0x21E, "M", "ȟ"), - (0x21F, "V"), - (0x220, "M", "ƞ"), - (0x221, "V"), - (0x222, "M", "ȣ"), - (0x223, "V"), - (0x224, "M", "ȥ"), - (0x225, "V"), - (0x226, "M", "ȧ"), - (0x227, "V"), - (0x228, "M", "ȩ"), - (0x229, "V"), - (0x22A, "M", "ȫ"), - (0x22B, "V"), - (0x22C, "M", "ȭ"), - (0x22D, "V"), - (0x22E, "M", "ȯ"), - (0x22F, "V"), - (0x230, "M", "ȱ"), - (0x231, "V"), - (0x232, "M", "ȳ"), - (0x233, "V"), - (0x23A, "M", "ⱥ"), - (0x23B, "M", "ȼ"), - (0x23C, "V"), - (0x23D, "M", "ƚ"), - (0x23E, "M", "ⱦ"), - (0x23F, "V"), - (0x241, "M", "ɂ"), - (0x242, "V"), - (0x243, "M", "ƀ"), - (0x244, "M", "ʉ"), - (0x245, "M", "ʌ"), - (0x246, "M", "ɇ"), - (0x247, "V"), - (0x248, "M", "ɉ"), - (0x249, "V"), - (0x24A, "M", "ɋ"), - (0x24B, "V"), - (0x24C, "M", "ɍ"), - (0x24D, "V"), - (0x24E, "M", "ɏ"), - (0x24F, "V"), - (0x2B0, "M", "h"), - (0x2B1, "M", "ɦ"), - (0x2B2, "M", "j"), - (0x2B3, "M", "r"), - (0x2B4, "M", "ɹ"), - (0x2B5, "M", "ɻ"), - (0x2B6, "M", "ʁ"), - (0x2B7, "M", "w"), - (0x2B8, "M", "y"), - (0x2B9, "V"), - (0x2D8, "3", " ̆"), - (0x2D9, "3", " ̇"), - (0x2DA, "3", " ̊"), - (0x2DB, "3", " ̨"), - (0x2DC, "3", " ̃"), - (0x2DD, "3", " ̋"), - (0x2DE, "V"), - (0x2E0, "M", "ɣ"), - (0x2E1, "M", "l"), - (0x2E2, "M", "s"), - (0x2E3, "M", "x"), - (0x2E4, "M", "ʕ"), - (0x2E5, "V"), - (0x340, "M", "̀"), - (0x341, "M", "́"), - (0x342, "V"), - (0x343, "M", "̓"), - (0x344, "M", "̈́"), - (0x345, "M", "ι"), - (0x346, "V"), - (0x34F, "I"), - (0x350, "V"), - (0x370, "M", "ͱ"), - (0x371, "V"), - (0x372, "M", "ͳ"), - (0x373, "V"), - (0x374, "M", "ʹ"), - (0x375, "V"), - (0x376, "M", "ͷ"), - (0x377, "V"), - ] - - -def _seg_6() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x378, "X"), - (0x37A, "3", " ι"), - (0x37B, "V"), - (0x37E, "3", ";"), - (0x37F, "M", "ϳ"), - (0x380, "X"), - (0x384, "3", " ́"), - (0x385, "3", " ̈́"), - (0x386, "M", "ά"), - (0x387, "M", "·"), - (0x388, "M", "έ"), - (0x389, "M", "ή"), - (0x38A, "M", "ί"), - (0x38B, "X"), - (0x38C, "M", "ό"), - (0x38D, "X"), - (0x38E, "M", "ύ"), - (0x38F, "M", "ώ"), - (0x390, "V"), - (0x391, "M", "α"), - (0x392, "M", "β"), - (0x393, "M", "γ"), - (0x394, "M", "δ"), - (0x395, "M", "ε"), - (0x396, "M", "ζ"), - (0x397, "M", "η"), - (0x398, "M", "θ"), - (0x399, "M", "ι"), - (0x39A, "M", "κ"), - (0x39B, "M", "λ"), - (0x39C, "M", "μ"), - (0x39D, "M", "ν"), - (0x39E, "M", "ξ"), - (0x39F, "M", "ο"), - (0x3A0, "M", "π"), - (0x3A1, "M", "ρ"), - (0x3A2, "X"), - (0x3A3, "M", "σ"), - (0x3A4, "M", "τ"), - (0x3A5, "M", "υ"), - (0x3A6, "M", "φ"), - (0x3A7, "M", "χ"), - (0x3A8, "M", "ψ"), - (0x3A9, "M", "ω"), - (0x3AA, "M", "ϊ"), - (0x3AB, "M", "ϋ"), - (0x3AC, "V"), - (0x3C2, "D", "σ"), - (0x3C3, "V"), - (0x3CF, "M", "ϗ"), - (0x3D0, "M", "β"), - (0x3D1, "M", "θ"), - (0x3D2, "M", "υ"), - (0x3D3, "M", "ύ"), - (0x3D4, "M", "ϋ"), - (0x3D5, "M", "φ"), - (0x3D6, "M", "π"), - (0x3D7, "V"), - (0x3D8, "M", "ϙ"), - (0x3D9, "V"), - (0x3DA, "M", "ϛ"), - (0x3DB, "V"), - (0x3DC, "M", "ϝ"), - (0x3DD, "V"), - (0x3DE, "M", "ϟ"), - (0x3DF, "V"), - (0x3E0, "M", "ϡ"), - (0x3E1, "V"), - (0x3E2, "M", "ϣ"), - (0x3E3, "V"), - (0x3E4, "M", "ϥ"), - (0x3E5, "V"), - (0x3E6, "M", "ϧ"), - (0x3E7, "V"), - (0x3E8, "M", "ϩ"), - (0x3E9, "V"), - (0x3EA, "M", "ϫ"), - (0x3EB, "V"), - (0x3EC, "M", "ϭ"), - (0x3ED, "V"), - (0x3EE, "M", "ϯ"), - (0x3EF, "V"), - (0x3F0, "M", "κ"), - (0x3F1, "M", "ρ"), - (0x3F2, "M", "σ"), - (0x3F3, "V"), - (0x3F4, "M", "θ"), - (0x3F5, "M", "ε"), - (0x3F6, "V"), - (0x3F7, "M", "ϸ"), - (0x3F8, "V"), - (0x3F9, "M", "σ"), - (0x3FA, "M", "ϻ"), - (0x3FB, "V"), - (0x3FD, "M", "ͻ"), - (0x3FE, "M", "ͼ"), - (0x3FF, "M", "ͽ"), - (0x400, "M", "ѐ"), - (0x401, "M", "ё"), - (0x402, "M", "ђ"), - ] - - -def _seg_7() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x403, "M", "ѓ"), - (0x404, "M", "є"), - (0x405, "M", "ѕ"), - (0x406, "M", "і"), - (0x407, "M", "ї"), - (0x408, "M", "ј"), - (0x409, "M", "љ"), - (0x40A, "M", "њ"), - (0x40B, "M", "ћ"), - (0x40C, "M", "ќ"), - (0x40D, "M", "ѝ"), - (0x40E, "M", "ў"), - (0x40F, "M", "џ"), - (0x410, "M", "а"), - (0x411, "M", "б"), - (0x412, "M", "в"), - (0x413, "M", "г"), - (0x414, "M", "д"), - (0x415, "M", "е"), - (0x416, "M", "ж"), - (0x417, "M", "з"), - (0x418, "M", "и"), - (0x419, "M", "й"), - (0x41A, "M", "к"), - (0x41B, "M", "л"), - (0x41C, "M", "м"), - (0x41D, "M", "н"), - (0x41E, "M", "о"), - (0x41F, "M", "п"), - (0x420, "M", "р"), - (0x421, "M", "с"), - (0x422, "M", "т"), - (0x423, "M", "у"), - (0x424, "M", "ф"), - (0x425, "M", "х"), - (0x426, "M", "ц"), - (0x427, "M", "ч"), - (0x428, "M", "ш"), - (0x429, "M", "щ"), - (0x42A, "M", "ъ"), - (0x42B, "M", "ы"), - (0x42C, "M", "ь"), - (0x42D, "M", "э"), - (0x42E, "M", "ю"), - (0x42F, "M", "я"), - (0x430, "V"), - (0x460, "M", "ѡ"), - (0x461, "V"), - (0x462, "M", "ѣ"), - (0x463, "V"), - (0x464, "M", "ѥ"), - (0x465, "V"), - (0x466, "M", "ѧ"), - (0x467, "V"), - (0x468, "M", "ѩ"), - (0x469, "V"), - (0x46A, "M", "ѫ"), - (0x46B, "V"), - (0x46C, "M", "ѭ"), - (0x46D, "V"), - (0x46E, "M", "ѯ"), - (0x46F, "V"), - (0x470, "M", "ѱ"), - (0x471, "V"), - (0x472, "M", "ѳ"), - (0x473, "V"), - (0x474, "M", "ѵ"), - (0x475, "V"), - (0x476, "M", "ѷ"), - (0x477, "V"), - (0x478, "M", "ѹ"), - (0x479, "V"), - (0x47A, "M", "ѻ"), - (0x47B, "V"), - (0x47C, "M", "ѽ"), - (0x47D, "V"), - (0x47E, "M", "ѿ"), - (0x47F, "V"), - (0x480, "M", "ҁ"), - (0x481, "V"), - (0x48A, "M", "ҋ"), - (0x48B, "V"), - (0x48C, "M", "ҍ"), - (0x48D, "V"), - (0x48E, "M", "ҏ"), - (0x48F, "V"), - (0x490, "M", "ґ"), - (0x491, "V"), - (0x492, "M", "ғ"), - (0x493, "V"), - (0x494, "M", "ҕ"), - (0x495, "V"), - (0x496, "M", "җ"), - (0x497, "V"), - (0x498, "M", "ҙ"), - (0x499, "V"), - (0x49A, "M", "қ"), - (0x49B, "V"), - (0x49C, "M", "ҝ"), - (0x49D, "V"), - ] - - -def _seg_8() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x49E, "M", "ҟ"), - (0x49F, "V"), - (0x4A0, "M", "ҡ"), - (0x4A1, "V"), - (0x4A2, "M", "ң"), - (0x4A3, "V"), - (0x4A4, "M", "ҥ"), - (0x4A5, "V"), - (0x4A6, "M", "ҧ"), - (0x4A7, "V"), - (0x4A8, "M", "ҩ"), - (0x4A9, "V"), - (0x4AA, "M", "ҫ"), - (0x4AB, "V"), - (0x4AC, "M", "ҭ"), - (0x4AD, "V"), - (0x4AE, "M", "ү"), - (0x4AF, "V"), - (0x4B0, "M", "ұ"), - (0x4B1, "V"), - (0x4B2, "M", "ҳ"), - (0x4B3, "V"), - (0x4B4, "M", "ҵ"), - (0x4B5, "V"), - (0x4B6, "M", "ҷ"), - (0x4B7, "V"), - (0x4B8, "M", "ҹ"), - (0x4B9, "V"), - (0x4BA, "M", "һ"), - (0x4BB, "V"), - (0x4BC, "M", "ҽ"), - (0x4BD, "V"), - (0x4BE, "M", "ҿ"), - (0x4BF, "V"), - (0x4C0, "X"), - (0x4C1, "M", "ӂ"), - (0x4C2, "V"), - (0x4C3, "M", "ӄ"), - (0x4C4, "V"), - (0x4C5, "M", "ӆ"), - (0x4C6, "V"), - (0x4C7, "M", "ӈ"), - (0x4C8, "V"), - (0x4C9, "M", "ӊ"), - (0x4CA, "V"), - (0x4CB, "M", "ӌ"), - (0x4CC, "V"), - (0x4CD, "M", "ӎ"), - (0x4CE, "V"), - (0x4D0, "M", "ӑ"), - (0x4D1, "V"), - (0x4D2, "M", "ӓ"), - (0x4D3, "V"), - (0x4D4, "M", "ӕ"), - (0x4D5, "V"), - (0x4D6, "M", "ӗ"), - (0x4D7, "V"), - (0x4D8, "M", "ә"), - (0x4D9, "V"), - (0x4DA, "M", "ӛ"), - (0x4DB, "V"), - (0x4DC, "M", "ӝ"), - (0x4DD, "V"), - (0x4DE, "M", "ӟ"), - (0x4DF, "V"), - (0x4E0, "M", "ӡ"), - (0x4E1, "V"), - (0x4E2, "M", "ӣ"), - (0x4E3, "V"), - (0x4E4, "M", "ӥ"), - (0x4E5, "V"), - (0x4E6, "M", "ӧ"), - (0x4E7, "V"), - (0x4E8, "M", "ө"), - (0x4E9, "V"), - (0x4EA, "M", "ӫ"), - (0x4EB, "V"), - (0x4EC, "M", "ӭ"), - (0x4ED, "V"), - (0x4EE, "M", "ӯ"), - (0x4EF, "V"), - (0x4F0, "M", "ӱ"), - (0x4F1, "V"), - (0x4F2, "M", "ӳ"), - (0x4F3, "V"), - (0x4F4, "M", "ӵ"), - (0x4F5, "V"), - (0x4F6, "M", "ӷ"), - (0x4F7, "V"), - (0x4F8, "M", "ӹ"), - (0x4F9, "V"), - (0x4FA, "M", "ӻ"), - (0x4FB, "V"), - (0x4FC, "M", "ӽ"), - (0x4FD, "V"), - (0x4FE, "M", "ӿ"), - (0x4FF, "V"), - (0x500, "M", "ԁ"), - (0x501, "V"), - (0x502, "M", "ԃ"), - ] - - -def _seg_9() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x503, "V"), - (0x504, "M", "ԅ"), - (0x505, "V"), - (0x506, "M", "ԇ"), - (0x507, "V"), - (0x508, "M", "ԉ"), - (0x509, "V"), - (0x50A, "M", "ԋ"), - (0x50B, "V"), - (0x50C, "M", "ԍ"), - (0x50D, "V"), - (0x50E, "M", "ԏ"), - (0x50F, "V"), - (0x510, "M", "ԑ"), - (0x511, "V"), - (0x512, "M", "ԓ"), - (0x513, "V"), - (0x514, "M", "ԕ"), - (0x515, "V"), - (0x516, "M", "ԗ"), - (0x517, "V"), - (0x518, "M", "ԙ"), - (0x519, "V"), - (0x51A, "M", "ԛ"), - (0x51B, "V"), - (0x51C, "M", "ԝ"), - (0x51D, "V"), - (0x51E, "M", "ԟ"), - (0x51F, "V"), - (0x520, "M", "ԡ"), - (0x521, "V"), - (0x522, "M", "ԣ"), - (0x523, "V"), - (0x524, "M", "ԥ"), - (0x525, "V"), - (0x526, "M", "ԧ"), - (0x527, "V"), - (0x528, "M", "ԩ"), - (0x529, "V"), - (0x52A, "M", "ԫ"), - (0x52B, "V"), - (0x52C, "M", "ԭ"), - (0x52D, "V"), - (0x52E, "M", "ԯ"), - (0x52F, "V"), - (0x530, "X"), - (0x531, "M", "ա"), - (0x532, "M", "բ"), - (0x533, "M", "գ"), - (0x534, "M", "դ"), - (0x535, "M", "ե"), - (0x536, "M", "զ"), - (0x537, "M", "է"), - (0x538, "M", "ը"), - (0x539, "M", "թ"), - (0x53A, "M", "ժ"), - (0x53B, "M", "ի"), - (0x53C, "M", "լ"), - (0x53D, "M", "խ"), - (0x53E, "M", "ծ"), - (0x53F, "M", "կ"), - (0x540, "M", "հ"), - (0x541, "M", "ձ"), - (0x542, "M", "ղ"), - (0x543, "M", "ճ"), - (0x544, "M", "մ"), - (0x545, "M", "յ"), - (0x546, "M", "ն"), - (0x547, "M", "շ"), - (0x548, "M", "ո"), - (0x549, "M", "չ"), - (0x54A, "M", "պ"), - (0x54B, "M", "ջ"), - (0x54C, "M", "ռ"), - (0x54D, "M", "ս"), - (0x54E, "M", "վ"), - (0x54F, "M", "տ"), - (0x550, "M", "ր"), - (0x551, "M", "ց"), - (0x552, "M", "ւ"), - (0x553, "M", "փ"), - (0x554, "M", "ք"), - (0x555, "M", "օ"), - (0x556, "M", "ֆ"), - (0x557, "X"), - (0x559, "V"), - (0x587, "M", "եւ"), - (0x588, "V"), - (0x58B, "X"), - (0x58D, "V"), - (0x590, "X"), - (0x591, "V"), - (0x5C8, "X"), - (0x5D0, "V"), - (0x5EB, "X"), - (0x5EF, "V"), - (0x5F5, "X"), - (0x606, "V"), - (0x61C, "X"), - (0x61D, "V"), - ] - - -def _seg_10() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x675, "M", "اٴ"), - (0x676, "M", "وٴ"), - (0x677, "M", "ۇٴ"), - (0x678, "M", "يٴ"), - (0x679, "V"), - (0x6DD, "X"), - (0x6DE, "V"), - (0x70E, "X"), - (0x710, "V"), - (0x74B, "X"), - (0x74D, "V"), - (0x7B2, "X"), - (0x7C0, "V"), - (0x7FB, "X"), - (0x7FD, "V"), - (0x82E, "X"), - (0x830, "V"), - (0x83F, "X"), - (0x840, "V"), - (0x85C, "X"), - (0x85E, "V"), - (0x85F, "X"), - (0x860, "V"), - (0x86B, "X"), - (0x870, "V"), - (0x88F, "X"), - (0x898, "V"), - (0x8E2, "X"), - (0x8E3, "V"), - (0x958, "M", "क़"), - (0x959, "M", "ख़"), - (0x95A, "M", "ग़"), - (0x95B, "M", "ज़"), - (0x95C, "M", "ड़"), - (0x95D, "M", "ढ़"), - (0x95E, "M", "फ़"), - (0x95F, "M", "य़"), - (0x960, "V"), - (0x984, "X"), - (0x985, "V"), - (0x98D, "X"), - (0x98F, "V"), - (0x991, "X"), - (0x993, "V"), - (0x9A9, "X"), - (0x9AA, "V"), - (0x9B1, "X"), - (0x9B2, "V"), - (0x9B3, "X"), - (0x9B6, "V"), - (0x9BA, "X"), - (0x9BC, "V"), - (0x9C5, "X"), - (0x9C7, "V"), - (0x9C9, "X"), - (0x9CB, "V"), - (0x9CF, "X"), - (0x9D7, "V"), - (0x9D8, "X"), - (0x9DC, "M", "ড়"), - (0x9DD, "M", "ঢ়"), - (0x9DE, "X"), - (0x9DF, "M", "য়"), - (0x9E0, "V"), - (0x9E4, "X"), - (0x9E6, "V"), - (0x9FF, "X"), - (0xA01, "V"), - (0xA04, "X"), - (0xA05, "V"), - (0xA0B, "X"), - (0xA0F, "V"), - (0xA11, "X"), - (0xA13, "V"), - (0xA29, "X"), - (0xA2A, "V"), - (0xA31, "X"), - (0xA32, "V"), - (0xA33, "M", "ਲ਼"), - (0xA34, "X"), - (0xA35, "V"), - (0xA36, "M", "ਸ਼"), - (0xA37, "X"), - (0xA38, "V"), - (0xA3A, "X"), - (0xA3C, "V"), - (0xA3D, "X"), - (0xA3E, "V"), - (0xA43, "X"), - (0xA47, "V"), - (0xA49, "X"), - (0xA4B, "V"), - (0xA4E, "X"), - (0xA51, "V"), - (0xA52, "X"), - (0xA59, "M", "ਖ਼"), - (0xA5A, "M", "ਗ਼"), - (0xA5B, "M", "ਜ਼"), - (0xA5C, "V"), - (0xA5D, "X"), - ] - - -def _seg_11() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xA5E, "M", "ਫ਼"), - (0xA5F, "X"), - (0xA66, "V"), - (0xA77, "X"), - (0xA81, "V"), - (0xA84, "X"), - (0xA85, "V"), - (0xA8E, "X"), - (0xA8F, "V"), - (0xA92, "X"), - (0xA93, "V"), - (0xAA9, "X"), - (0xAAA, "V"), - (0xAB1, "X"), - (0xAB2, "V"), - (0xAB4, "X"), - (0xAB5, "V"), - (0xABA, "X"), - (0xABC, "V"), - (0xAC6, "X"), - (0xAC7, "V"), - (0xACA, "X"), - (0xACB, "V"), - (0xACE, "X"), - (0xAD0, "V"), - (0xAD1, "X"), - (0xAE0, "V"), - (0xAE4, "X"), - (0xAE6, "V"), - (0xAF2, "X"), - (0xAF9, "V"), - (0xB00, "X"), - (0xB01, "V"), - (0xB04, "X"), - (0xB05, "V"), - (0xB0D, "X"), - (0xB0F, "V"), - (0xB11, "X"), - (0xB13, "V"), - (0xB29, "X"), - (0xB2A, "V"), - (0xB31, "X"), - (0xB32, "V"), - (0xB34, "X"), - (0xB35, "V"), - (0xB3A, "X"), - (0xB3C, "V"), - (0xB45, "X"), - (0xB47, "V"), - (0xB49, "X"), - (0xB4B, "V"), - (0xB4E, "X"), - (0xB55, "V"), - (0xB58, "X"), - (0xB5C, "M", "ଡ଼"), - (0xB5D, "M", "ଢ଼"), - (0xB5E, "X"), - (0xB5F, "V"), - (0xB64, "X"), - (0xB66, "V"), - (0xB78, "X"), - (0xB82, "V"), - (0xB84, "X"), - (0xB85, "V"), - (0xB8B, "X"), - (0xB8E, "V"), - (0xB91, "X"), - (0xB92, "V"), - (0xB96, "X"), - (0xB99, "V"), - (0xB9B, "X"), - (0xB9C, "V"), - (0xB9D, "X"), - (0xB9E, "V"), - (0xBA0, "X"), - (0xBA3, "V"), - (0xBA5, "X"), - (0xBA8, "V"), - (0xBAB, "X"), - (0xBAE, "V"), - (0xBBA, "X"), - (0xBBE, "V"), - (0xBC3, "X"), - (0xBC6, "V"), - (0xBC9, "X"), - (0xBCA, "V"), - (0xBCE, "X"), - (0xBD0, "V"), - (0xBD1, "X"), - (0xBD7, "V"), - (0xBD8, "X"), - (0xBE6, "V"), - (0xBFB, "X"), - (0xC00, "V"), - (0xC0D, "X"), - (0xC0E, "V"), - (0xC11, "X"), - (0xC12, "V"), - (0xC29, "X"), - (0xC2A, "V"), - ] - - -def _seg_12() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xC3A, "X"), - (0xC3C, "V"), - (0xC45, "X"), - (0xC46, "V"), - (0xC49, "X"), - (0xC4A, "V"), - (0xC4E, "X"), - (0xC55, "V"), - (0xC57, "X"), - (0xC58, "V"), - (0xC5B, "X"), - (0xC5D, "V"), - (0xC5E, "X"), - (0xC60, "V"), - (0xC64, "X"), - (0xC66, "V"), - (0xC70, "X"), - (0xC77, "V"), - (0xC8D, "X"), - (0xC8E, "V"), - (0xC91, "X"), - (0xC92, "V"), - (0xCA9, "X"), - (0xCAA, "V"), - (0xCB4, "X"), - (0xCB5, "V"), - (0xCBA, "X"), - (0xCBC, "V"), - (0xCC5, "X"), - (0xCC6, "V"), - (0xCC9, "X"), - (0xCCA, "V"), - (0xCCE, "X"), - (0xCD5, "V"), - (0xCD7, "X"), - (0xCDD, "V"), - (0xCDF, "X"), - (0xCE0, "V"), - (0xCE4, "X"), - (0xCE6, "V"), - (0xCF0, "X"), - (0xCF1, "V"), - (0xCF4, "X"), - (0xD00, "V"), - (0xD0D, "X"), - (0xD0E, "V"), - (0xD11, "X"), - (0xD12, "V"), - (0xD45, "X"), - (0xD46, "V"), - (0xD49, "X"), - (0xD4A, "V"), - (0xD50, "X"), - (0xD54, "V"), - (0xD64, "X"), - (0xD66, "V"), - (0xD80, "X"), - (0xD81, "V"), - (0xD84, "X"), - (0xD85, "V"), - (0xD97, "X"), - (0xD9A, "V"), - (0xDB2, "X"), - (0xDB3, "V"), - (0xDBC, "X"), - (0xDBD, "V"), - (0xDBE, "X"), - (0xDC0, "V"), - (0xDC7, "X"), - (0xDCA, "V"), - (0xDCB, "X"), - (0xDCF, "V"), - (0xDD5, "X"), - (0xDD6, "V"), - (0xDD7, "X"), - (0xDD8, "V"), - (0xDE0, "X"), - (0xDE6, "V"), - (0xDF0, "X"), - (0xDF2, "V"), - (0xDF5, "X"), - (0xE01, "V"), - (0xE33, "M", "ํา"), - (0xE34, "V"), - (0xE3B, "X"), - (0xE3F, "V"), - (0xE5C, "X"), - (0xE81, "V"), - (0xE83, "X"), - (0xE84, "V"), - (0xE85, "X"), - (0xE86, "V"), - (0xE8B, "X"), - (0xE8C, "V"), - (0xEA4, "X"), - (0xEA5, "V"), - (0xEA6, "X"), - (0xEA7, "V"), - (0xEB3, "M", "ໍາ"), - (0xEB4, "V"), - ] - - -def _seg_13() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xEBE, "X"), - (0xEC0, "V"), - (0xEC5, "X"), - (0xEC6, "V"), - (0xEC7, "X"), - (0xEC8, "V"), - (0xECF, "X"), - (0xED0, "V"), - (0xEDA, "X"), - (0xEDC, "M", "ຫນ"), - (0xEDD, "M", "ຫມ"), - (0xEDE, "V"), - (0xEE0, "X"), - (0xF00, "V"), - (0xF0C, "M", "་"), - (0xF0D, "V"), - (0xF43, "M", "གྷ"), - (0xF44, "V"), - (0xF48, "X"), - (0xF49, "V"), - (0xF4D, "M", "ཌྷ"), - (0xF4E, "V"), - (0xF52, "M", "དྷ"), - (0xF53, "V"), - (0xF57, "M", "བྷ"), - (0xF58, "V"), - (0xF5C, "M", "ཛྷ"), - (0xF5D, "V"), - (0xF69, "M", "ཀྵ"), - (0xF6A, "V"), - (0xF6D, "X"), - (0xF71, "V"), - (0xF73, "M", "ཱི"), - (0xF74, "V"), - (0xF75, "M", "ཱུ"), - (0xF76, "M", "ྲྀ"), - (0xF77, "M", "ྲཱྀ"), - (0xF78, "M", "ླྀ"), - (0xF79, "M", "ླཱྀ"), - (0xF7A, "V"), - (0xF81, "M", "ཱྀ"), - (0xF82, "V"), - (0xF93, "M", "ྒྷ"), - (0xF94, "V"), - (0xF98, "X"), - (0xF99, "V"), - (0xF9D, "M", "ྜྷ"), - (0xF9E, "V"), - (0xFA2, "M", "ྡྷ"), - (0xFA3, "V"), - (0xFA7, "M", "ྦྷ"), - (0xFA8, "V"), - (0xFAC, "M", "ྫྷ"), - (0xFAD, "V"), - (0xFB9, "M", "ྐྵ"), - (0xFBA, "V"), - (0xFBD, "X"), - (0xFBE, "V"), - (0xFCD, "X"), - (0xFCE, "V"), - (0xFDB, "X"), - (0x1000, "V"), - (0x10A0, "X"), - (0x10C7, "M", "ⴧ"), - (0x10C8, "X"), - (0x10CD, "M", "ⴭ"), - (0x10CE, "X"), - (0x10D0, "V"), - (0x10FC, "M", "ნ"), - (0x10FD, "V"), - (0x115F, "X"), - (0x1161, "V"), - (0x1249, "X"), - (0x124A, "V"), - (0x124E, "X"), - (0x1250, "V"), - (0x1257, "X"), - (0x1258, "V"), - (0x1259, "X"), - (0x125A, "V"), - (0x125E, "X"), - (0x1260, "V"), - (0x1289, "X"), - (0x128A, "V"), - (0x128E, "X"), - (0x1290, "V"), - (0x12B1, "X"), - (0x12B2, "V"), - (0x12B6, "X"), - (0x12B8, "V"), - (0x12BF, "X"), - (0x12C0, "V"), - (0x12C1, "X"), - (0x12C2, "V"), - (0x12C6, "X"), - (0x12C8, "V"), - (0x12D7, "X"), - (0x12D8, "V"), - (0x1311, "X"), - (0x1312, "V"), - ] - - -def _seg_14() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1316, "X"), - (0x1318, "V"), - (0x135B, "X"), - (0x135D, "V"), - (0x137D, "X"), - (0x1380, "V"), - (0x139A, "X"), - (0x13A0, "V"), - (0x13F6, "X"), - (0x13F8, "M", "Ᏸ"), - (0x13F9, "M", "Ᏹ"), - (0x13FA, "M", "Ᏺ"), - (0x13FB, "M", "Ᏻ"), - (0x13FC, "M", "Ᏼ"), - (0x13FD, "M", "Ᏽ"), - (0x13FE, "X"), - (0x1400, "V"), - (0x1680, "X"), - (0x1681, "V"), - (0x169D, "X"), - (0x16A0, "V"), - (0x16F9, "X"), - (0x1700, "V"), - (0x1716, "X"), - (0x171F, "V"), - (0x1737, "X"), - (0x1740, "V"), - (0x1754, "X"), - (0x1760, "V"), - (0x176D, "X"), - (0x176E, "V"), - (0x1771, "X"), - (0x1772, "V"), - (0x1774, "X"), - (0x1780, "V"), - (0x17B4, "X"), - (0x17B6, "V"), - (0x17DE, "X"), - (0x17E0, "V"), - (0x17EA, "X"), - (0x17F0, "V"), - (0x17FA, "X"), - (0x1800, "V"), - (0x1806, "X"), - (0x1807, "V"), - (0x180B, "I"), - (0x180E, "X"), - (0x180F, "I"), - (0x1810, "V"), - (0x181A, "X"), - (0x1820, "V"), - (0x1879, "X"), - (0x1880, "V"), - (0x18AB, "X"), - (0x18B0, "V"), - (0x18F6, "X"), - (0x1900, "V"), - (0x191F, "X"), - (0x1920, "V"), - (0x192C, "X"), - (0x1930, "V"), - (0x193C, "X"), - (0x1940, "V"), - (0x1941, "X"), - (0x1944, "V"), - (0x196E, "X"), - (0x1970, "V"), - (0x1975, "X"), - (0x1980, "V"), - (0x19AC, "X"), - (0x19B0, "V"), - (0x19CA, "X"), - (0x19D0, "V"), - (0x19DB, "X"), - (0x19DE, "V"), - (0x1A1C, "X"), - (0x1A1E, "V"), - (0x1A5F, "X"), - (0x1A60, "V"), - (0x1A7D, "X"), - (0x1A7F, "V"), - (0x1A8A, "X"), - (0x1A90, "V"), - (0x1A9A, "X"), - (0x1AA0, "V"), - (0x1AAE, "X"), - (0x1AB0, "V"), - (0x1ACF, "X"), - (0x1B00, "V"), - (0x1B4D, "X"), - (0x1B50, "V"), - (0x1B7F, "X"), - (0x1B80, "V"), - (0x1BF4, "X"), - (0x1BFC, "V"), - (0x1C38, "X"), - (0x1C3B, "V"), - (0x1C4A, "X"), - (0x1C4D, "V"), - (0x1C80, "M", "в"), - ] - - -def _seg_15() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1C81, "M", "д"), - (0x1C82, "M", "о"), - (0x1C83, "M", "с"), - (0x1C84, "M", "т"), - (0x1C86, "M", "ъ"), - (0x1C87, "M", "ѣ"), - (0x1C88, "M", "ꙋ"), - (0x1C89, "X"), - (0x1C90, "M", "ა"), - (0x1C91, "M", "ბ"), - (0x1C92, "M", "გ"), - (0x1C93, "M", "დ"), - (0x1C94, "M", "ე"), - (0x1C95, "M", "ვ"), - (0x1C96, "M", "ზ"), - (0x1C97, "M", "თ"), - (0x1C98, "M", "ი"), - (0x1C99, "M", "კ"), - (0x1C9A, "M", "ლ"), - (0x1C9B, "M", "მ"), - (0x1C9C, "M", "ნ"), - (0x1C9D, "M", "ო"), - (0x1C9E, "M", "პ"), - (0x1C9F, "M", "ჟ"), - (0x1CA0, "M", "რ"), - (0x1CA1, "M", "ს"), - (0x1CA2, "M", "ტ"), - (0x1CA3, "M", "უ"), - (0x1CA4, "M", "ფ"), - (0x1CA5, "M", "ქ"), - (0x1CA6, "M", "ღ"), - (0x1CA7, "M", "ყ"), - (0x1CA8, "M", "შ"), - (0x1CA9, "M", "ჩ"), - (0x1CAA, "M", "ც"), - (0x1CAB, "M", "ძ"), - (0x1CAC, "M", "წ"), - (0x1CAD, "M", "ჭ"), - (0x1CAE, "M", "ხ"), - (0x1CAF, "M", "ჯ"), - (0x1CB0, "M", "ჰ"), - (0x1CB1, "M", "ჱ"), - (0x1CB2, "M", "ჲ"), - (0x1CB3, "M", "ჳ"), - (0x1CB4, "M", "ჴ"), - (0x1CB5, "M", "ჵ"), - (0x1CB6, "M", "ჶ"), - (0x1CB7, "M", "ჷ"), - (0x1CB8, "M", "ჸ"), - (0x1CB9, "M", "ჹ"), - (0x1CBA, "M", "ჺ"), - (0x1CBB, "X"), - (0x1CBD, "M", "ჽ"), - (0x1CBE, "M", "ჾ"), - (0x1CBF, "M", "ჿ"), - (0x1CC0, "V"), - (0x1CC8, "X"), - (0x1CD0, "V"), - (0x1CFB, "X"), - (0x1D00, "V"), - (0x1D2C, "M", "a"), - (0x1D2D, "M", "æ"), - (0x1D2E, "M", "b"), - (0x1D2F, "V"), - (0x1D30, "M", "d"), - (0x1D31, "M", "e"), - (0x1D32, "M", "ǝ"), - (0x1D33, "M", "g"), - (0x1D34, "M", "h"), - (0x1D35, "M", "i"), - (0x1D36, "M", "j"), - (0x1D37, "M", "k"), - (0x1D38, "M", "l"), - (0x1D39, "M", "m"), - (0x1D3A, "M", "n"), - (0x1D3B, "V"), - (0x1D3C, "M", "o"), - (0x1D3D, "M", "ȣ"), - (0x1D3E, "M", "p"), - (0x1D3F, "M", "r"), - (0x1D40, "M", "t"), - (0x1D41, "M", "u"), - (0x1D42, "M", "w"), - (0x1D43, "M", "a"), - (0x1D44, "M", "ɐ"), - (0x1D45, "M", "ɑ"), - (0x1D46, "M", "ᴂ"), - (0x1D47, "M", "b"), - (0x1D48, "M", "d"), - (0x1D49, "M", "e"), - (0x1D4A, "M", "ə"), - (0x1D4B, "M", "ɛ"), - (0x1D4C, "M", "ɜ"), - (0x1D4D, "M", "g"), - (0x1D4E, "V"), - (0x1D4F, "M", "k"), - (0x1D50, "M", "m"), - (0x1D51, "M", "ŋ"), - (0x1D52, "M", "o"), - (0x1D53, "M", "ɔ"), - ] - - -def _seg_16() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D54, "M", "ᴖ"), - (0x1D55, "M", "ᴗ"), - (0x1D56, "M", "p"), - (0x1D57, "M", "t"), - (0x1D58, "M", "u"), - (0x1D59, "M", "ᴝ"), - (0x1D5A, "M", "ɯ"), - (0x1D5B, "M", "v"), - (0x1D5C, "M", "ᴥ"), - (0x1D5D, "M", "β"), - (0x1D5E, "M", "γ"), - (0x1D5F, "M", "δ"), - (0x1D60, "M", "φ"), - (0x1D61, "M", "χ"), - (0x1D62, "M", "i"), - (0x1D63, "M", "r"), - (0x1D64, "M", "u"), - (0x1D65, "M", "v"), - (0x1D66, "M", "β"), - (0x1D67, "M", "γ"), - (0x1D68, "M", "ρ"), - (0x1D69, "M", "φ"), - (0x1D6A, "M", "χ"), - (0x1D6B, "V"), - (0x1D78, "M", "н"), - (0x1D79, "V"), - (0x1D9B, "M", "ɒ"), - (0x1D9C, "M", "c"), - (0x1D9D, "M", "ɕ"), - (0x1D9E, "M", "ð"), - (0x1D9F, "M", "ɜ"), - (0x1DA0, "M", "f"), - (0x1DA1, "M", "ɟ"), - (0x1DA2, "M", "ɡ"), - (0x1DA3, "M", "ɥ"), - (0x1DA4, "M", "ɨ"), - (0x1DA5, "M", "ɩ"), - (0x1DA6, "M", "ɪ"), - (0x1DA7, "M", "ᵻ"), - (0x1DA8, "M", "ʝ"), - (0x1DA9, "M", "ɭ"), - (0x1DAA, "M", "ᶅ"), - (0x1DAB, "M", "ʟ"), - (0x1DAC, "M", "ɱ"), - (0x1DAD, "M", "ɰ"), - (0x1DAE, "M", "ɲ"), - (0x1DAF, "M", "ɳ"), - (0x1DB0, "M", "ɴ"), - (0x1DB1, "M", "ɵ"), - (0x1DB2, "M", "ɸ"), - (0x1DB3, "M", "ʂ"), - (0x1DB4, "M", "ʃ"), - (0x1DB5, "M", "ƫ"), - (0x1DB6, "M", "ʉ"), - (0x1DB7, "M", "ʊ"), - (0x1DB8, "M", "ᴜ"), - (0x1DB9, "M", "ʋ"), - (0x1DBA, "M", "ʌ"), - (0x1DBB, "M", "z"), - (0x1DBC, "M", "ʐ"), - (0x1DBD, "M", "ʑ"), - (0x1DBE, "M", "ʒ"), - (0x1DBF, "M", "θ"), - (0x1DC0, "V"), - (0x1E00, "M", "ḁ"), - (0x1E01, "V"), - (0x1E02, "M", "ḃ"), - (0x1E03, "V"), - (0x1E04, "M", "ḅ"), - (0x1E05, "V"), - (0x1E06, "M", "ḇ"), - (0x1E07, "V"), - (0x1E08, "M", "ḉ"), - (0x1E09, "V"), - (0x1E0A, "M", "ḋ"), - (0x1E0B, "V"), - (0x1E0C, "M", "ḍ"), - (0x1E0D, "V"), - (0x1E0E, "M", "ḏ"), - (0x1E0F, "V"), - (0x1E10, "M", "ḑ"), - (0x1E11, "V"), - (0x1E12, "M", "ḓ"), - (0x1E13, "V"), - (0x1E14, "M", "ḕ"), - (0x1E15, "V"), - (0x1E16, "M", "ḗ"), - (0x1E17, "V"), - (0x1E18, "M", "ḙ"), - (0x1E19, "V"), - (0x1E1A, "M", "ḛ"), - (0x1E1B, "V"), - (0x1E1C, "M", "ḝ"), - (0x1E1D, "V"), - (0x1E1E, "M", "ḟ"), - (0x1E1F, "V"), - (0x1E20, "M", "ḡ"), - (0x1E21, "V"), - (0x1E22, "M", "ḣ"), - (0x1E23, "V"), - ] - - -def _seg_17() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1E24, "M", "ḥ"), - (0x1E25, "V"), - (0x1E26, "M", "ḧ"), - (0x1E27, "V"), - (0x1E28, "M", "ḩ"), - (0x1E29, "V"), - (0x1E2A, "M", "ḫ"), - (0x1E2B, "V"), - (0x1E2C, "M", "ḭ"), - (0x1E2D, "V"), - (0x1E2E, "M", "ḯ"), - (0x1E2F, "V"), - (0x1E30, "M", "ḱ"), - (0x1E31, "V"), - (0x1E32, "M", "ḳ"), - (0x1E33, "V"), - (0x1E34, "M", "ḵ"), - (0x1E35, "V"), - (0x1E36, "M", "ḷ"), - (0x1E37, "V"), - (0x1E38, "M", "ḹ"), - (0x1E39, "V"), - (0x1E3A, "M", "ḻ"), - (0x1E3B, "V"), - (0x1E3C, "M", "ḽ"), - (0x1E3D, "V"), - (0x1E3E, "M", "ḿ"), - (0x1E3F, "V"), - (0x1E40, "M", "ṁ"), - (0x1E41, "V"), - (0x1E42, "M", "ṃ"), - (0x1E43, "V"), - (0x1E44, "M", "ṅ"), - (0x1E45, "V"), - (0x1E46, "M", "ṇ"), - (0x1E47, "V"), - (0x1E48, "M", "ṉ"), - (0x1E49, "V"), - (0x1E4A, "M", "ṋ"), - (0x1E4B, "V"), - (0x1E4C, "M", "ṍ"), - (0x1E4D, "V"), - (0x1E4E, "M", "ṏ"), - (0x1E4F, "V"), - (0x1E50, "M", "ṑ"), - (0x1E51, "V"), - (0x1E52, "M", "ṓ"), - (0x1E53, "V"), - (0x1E54, "M", "ṕ"), - (0x1E55, "V"), - (0x1E56, "M", "ṗ"), - (0x1E57, "V"), - (0x1E58, "M", "ṙ"), - (0x1E59, "V"), - (0x1E5A, "M", "ṛ"), - (0x1E5B, "V"), - (0x1E5C, "M", "ṝ"), - (0x1E5D, "V"), - (0x1E5E, "M", "ṟ"), - (0x1E5F, "V"), - (0x1E60, "M", "ṡ"), - (0x1E61, "V"), - (0x1E62, "M", "ṣ"), - (0x1E63, "V"), - (0x1E64, "M", "ṥ"), - (0x1E65, "V"), - (0x1E66, "M", "ṧ"), - (0x1E67, "V"), - (0x1E68, "M", "ṩ"), - (0x1E69, "V"), - (0x1E6A, "M", "ṫ"), - (0x1E6B, "V"), - (0x1E6C, "M", "ṭ"), - (0x1E6D, "V"), - (0x1E6E, "M", "ṯ"), - (0x1E6F, "V"), - (0x1E70, "M", "ṱ"), - (0x1E71, "V"), - (0x1E72, "M", "ṳ"), - (0x1E73, "V"), - (0x1E74, "M", "ṵ"), - (0x1E75, "V"), - (0x1E76, "M", "ṷ"), - (0x1E77, "V"), - (0x1E78, "M", "ṹ"), - (0x1E79, "V"), - (0x1E7A, "M", "ṻ"), - (0x1E7B, "V"), - (0x1E7C, "M", "ṽ"), - (0x1E7D, "V"), - (0x1E7E, "M", "ṿ"), - (0x1E7F, "V"), - (0x1E80, "M", "ẁ"), - (0x1E81, "V"), - (0x1E82, "M", "ẃ"), - (0x1E83, "V"), - (0x1E84, "M", "ẅ"), - (0x1E85, "V"), - (0x1E86, "M", "ẇ"), - (0x1E87, "V"), - ] - - -def _seg_18() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1E88, "M", "ẉ"), - (0x1E89, "V"), - (0x1E8A, "M", "ẋ"), - (0x1E8B, "V"), - (0x1E8C, "M", "ẍ"), - (0x1E8D, "V"), - (0x1E8E, "M", "ẏ"), - (0x1E8F, "V"), - (0x1E90, "M", "ẑ"), - (0x1E91, "V"), - (0x1E92, "M", "ẓ"), - (0x1E93, "V"), - (0x1E94, "M", "ẕ"), - (0x1E95, "V"), - (0x1E9A, "M", "aʾ"), - (0x1E9B, "M", "ṡ"), - (0x1E9C, "V"), - (0x1E9E, "M", "ß"), - (0x1E9F, "V"), - (0x1EA0, "M", "ạ"), - (0x1EA1, "V"), - (0x1EA2, "M", "ả"), - (0x1EA3, "V"), - (0x1EA4, "M", "ấ"), - (0x1EA5, "V"), - (0x1EA6, "M", "ầ"), - (0x1EA7, "V"), - (0x1EA8, "M", "ẩ"), - (0x1EA9, "V"), - (0x1EAA, "M", "ẫ"), - (0x1EAB, "V"), - (0x1EAC, "M", "ậ"), - (0x1EAD, "V"), - (0x1EAE, "M", "ắ"), - (0x1EAF, "V"), - (0x1EB0, "M", "ằ"), - (0x1EB1, "V"), - (0x1EB2, "M", "ẳ"), - (0x1EB3, "V"), - (0x1EB4, "M", "ẵ"), - (0x1EB5, "V"), - (0x1EB6, "M", "ặ"), - (0x1EB7, "V"), - (0x1EB8, "M", "ẹ"), - (0x1EB9, "V"), - (0x1EBA, "M", "ẻ"), - (0x1EBB, "V"), - (0x1EBC, "M", "ẽ"), - (0x1EBD, "V"), - (0x1EBE, "M", "ế"), - (0x1EBF, "V"), - (0x1EC0, "M", "ề"), - (0x1EC1, "V"), - (0x1EC2, "M", "ể"), - (0x1EC3, "V"), - (0x1EC4, "M", "ễ"), - (0x1EC5, "V"), - (0x1EC6, "M", "ệ"), - (0x1EC7, "V"), - (0x1EC8, "M", "ỉ"), - (0x1EC9, "V"), - (0x1ECA, "M", "ị"), - (0x1ECB, "V"), - (0x1ECC, "M", "ọ"), - (0x1ECD, "V"), - (0x1ECE, "M", "ỏ"), - (0x1ECF, "V"), - (0x1ED0, "M", "ố"), - (0x1ED1, "V"), - (0x1ED2, "M", "ồ"), - (0x1ED3, "V"), - (0x1ED4, "M", "ổ"), - (0x1ED5, "V"), - (0x1ED6, "M", "ỗ"), - (0x1ED7, "V"), - (0x1ED8, "M", "ộ"), - (0x1ED9, "V"), - (0x1EDA, "M", "ớ"), - (0x1EDB, "V"), - (0x1EDC, "M", "ờ"), - (0x1EDD, "V"), - (0x1EDE, "M", "ở"), - (0x1EDF, "V"), - (0x1EE0, "M", "ỡ"), - (0x1EE1, "V"), - (0x1EE2, "M", "ợ"), - (0x1EE3, "V"), - (0x1EE4, "M", "ụ"), - (0x1EE5, "V"), - (0x1EE6, "M", "ủ"), - (0x1EE7, "V"), - (0x1EE8, "M", "ứ"), - (0x1EE9, "V"), - (0x1EEA, "M", "ừ"), - (0x1EEB, "V"), - (0x1EEC, "M", "ử"), - (0x1EED, "V"), - (0x1EEE, "M", "ữ"), - (0x1EEF, "V"), - (0x1EF0, "M", "ự"), - ] - - -def _seg_19() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1EF1, "V"), - (0x1EF2, "M", "ỳ"), - (0x1EF3, "V"), - (0x1EF4, "M", "ỵ"), - (0x1EF5, "V"), - (0x1EF6, "M", "ỷ"), - (0x1EF7, "V"), - (0x1EF8, "M", "ỹ"), - (0x1EF9, "V"), - (0x1EFA, "M", "ỻ"), - (0x1EFB, "V"), - (0x1EFC, "M", "ỽ"), - (0x1EFD, "V"), - (0x1EFE, "M", "ỿ"), - (0x1EFF, "V"), - (0x1F08, "M", "ἀ"), - (0x1F09, "M", "ἁ"), - (0x1F0A, "M", "ἂ"), - (0x1F0B, "M", "ἃ"), - (0x1F0C, "M", "ἄ"), - (0x1F0D, "M", "ἅ"), - (0x1F0E, "M", "ἆ"), - (0x1F0F, "M", "ἇ"), - (0x1F10, "V"), - (0x1F16, "X"), - (0x1F18, "M", "ἐ"), - (0x1F19, "M", "ἑ"), - (0x1F1A, "M", "ἒ"), - (0x1F1B, "M", "ἓ"), - (0x1F1C, "M", "ἔ"), - (0x1F1D, "M", "ἕ"), - (0x1F1E, "X"), - (0x1F20, "V"), - (0x1F28, "M", "ἠ"), - (0x1F29, "M", "ἡ"), - (0x1F2A, "M", "ἢ"), - (0x1F2B, "M", "ἣ"), - (0x1F2C, "M", "ἤ"), - (0x1F2D, "M", "ἥ"), - (0x1F2E, "M", "ἦ"), - (0x1F2F, "M", "ἧ"), - (0x1F30, "V"), - (0x1F38, "M", "ἰ"), - (0x1F39, "M", "ἱ"), - (0x1F3A, "M", "ἲ"), - (0x1F3B, "M", "ἳ"), - (0x1F3C, "M", "ἴ"), - (0x1F3D, "M", "ἵ"), - (0x1F3E, "M", "ἶ"), - (0x1F3F, "M", "ἷ"), - (0x1F40, "V"), - (0x1F46, "X"), - (0x1F48, "M", "ὀ"), - (0x1F49, "M", "ὁ"), - (0x1F4A, "M", "ὂ"), - (0x1F4B, "M", "ὃ"), - (0x1F4C, "M", "ὄ"), - (0x1F4D, "M", "ὅ"), - (0x1F4E, "X"), - (0x1F50, "V"), - (0x1F58, "X"), - (0x1F59, "M", "ὑ"), - (0x1F5A, "X"), - (0x1F5B, "M", "ὓ"), - (0x1F5C, "X"), - (0x1F5D, "M", "ὕ"), - (0x1F5E, "X"), - (0x1F5F, "M", "ὗ"), - (0x1F60, "V"), - (0x1F68, "M", "ὠ"), - (0x1F69, "M", "ὡ"), - (0x1F6A, "M", "ὢ"), - (0x1F6B, "M", "ὣ"), - (0x1F6C, "M", "ὤ"), - (0x1F6D, "M", "ὥ"), - (0x1F6E, "M", "ὦ"), - (0x1F6F, "M", "ὧ"), - (0x1F70, "V"), - (0x1F71, "M", "ά"), - (0x1F72, "V"), - (0x1F73, "M", "έ"), - (0x1F74, "V"), - (0x1F75, "M", "ή"), - (0x1F76, "V"), - (0x1F77, "M", "ί"), - (0x1F78, "V"), - (0x1F79, "M", "ό"), - (0x1F7A, "V"), - (0x1F7B, "M", "ύ"), - (0x1F7C, "V"), - (0x1F7D, "M", "ώ"), - (0x1F7E, "X"), - (0x1F80, "M", "ἀι"), - (0x1F81, "M", "ἁι"), - (0x1F82, "M", "ἂι"), - (0x1F83, "M", "ἃι"), - (0x1F84, "M", "ἄι"), - (0x1F85, "M", "ἅι"), - (0x1F86, "M", "ἆι"), - (0x1F87, "M", "ἇι"), - ] - - -def _seg_20() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1F88, "M", "ἀι"), - (0x1F89, "M", "ἁι"), - (0x1F8A, "M", "ἂι"), - (0x1F8B, "M", "ἃι"), - (0x1F8C, "M", "ἄι"), - (0x1F8D, "M", "ἅι"), - (0x1F8E, "M", "ἆι"), - (0x1F8F, "M", "ἇι"), - (0x1F90, "M", "ἠι"), - (0x1F91, "M", "ἡι"), - (0x1F92, "M", "ἢι"), - (0x1F93, "M", "ἣι"), - (0x1F94, "M", "ἤι"), - (0x1F95, "M", "ἥι"), - (0x1F96, "M", "ἦι"), - (0x1F97, "M", "ἧι"), - (0x1F98, "M", "ἠι"), - (0x1F99, "M", "ἡι"), - (0x1F9A, "M", "ἢι"), - (0x1F9B, "M", "ἣι"), - (0x1F9C, "M", "ἤι"), - (0x1F9D, "M", "ἥι"), - (0x1F9E, "M", "ἦι"), - (0x1F9F, "M", "ἧι"), - (0x1FA0, "M", "ὠι"), - (0x1FA1, "M", "ὡι"), - (0x1FA2, "M", "ὢι"), - (0x1FA3, "M", "ὣι"), - (0x1FA4, "M", "ὤι"), - (0x1FA5, "M", "ὥι"), - (0x1FA6, "M", "ὦι"), - (0x1FA7, "M", "ὧι"), - (0x1FA8, "M", "ὠι"), - (0x1FA9, "M", "ὡι"), - (0x1FAA, "M", "ὢι"), - (0x1FAB, "M", "ὣι"), - (0x1FAC, "M", "ὤι"), - (0x1FAD, "M", "ὥι"), - (0x1FAE, "M", "ὦι"), - (0x1FAF, "M", "ὧι"), - (0x1FB0, "V"), - (0x1FB2, "M", "ὰι"), - (0x1FB3, "M", "αι"), - (0x1FB4, "M", "άι"), - (0x1FB5, "X"), - (0x1FB6, "V"), - (0x1FB7, "M", "ᾶι"), - (0x1FB8, "M", "ᾰ"), - (0x1FB9, "M", "ᾱ"), - (0x1FBA, "M", "ὰ"), - (0x1FBB, "M", "ά"), - (0x1FBC, "M", "αι"), - (0x1FBD, "3", " ̓"), - (0x1FBE, "M", "ι"), - (0x1FBF, "3", " ̓"), - (0x1FC0, "3", " ͂"), - (0x1FC1, "3", " ̈͂"), - (0x1FC2, "M", "ὴι"), - (0x1FC3, "M", "ηι"), - (0x1FC4, "M", "ήι"), - (0x1FC5, "X"), - (0x1FC6, "V"), - (0x1FC7, "M", "ῆι"), - (0x1FC8, "M", "ὲ"), - (0x1FC9, "M", "έ"), - (0x1FCA, "M", "ὴ"), - (0x1FCB, "M", "ή"), - (0x1FCC, "M", "ηι"), - (0x1FCD, "3", " ̓̀"), - (0x1FCE, "3", " ̓́"), - (0x1FCF, "3", " ̓͂"), - (0x1FD0, "V"), - (0x1FD3, "M", "ΐ"), - (0x1FD4, "X"), - (0x1FD6, "V"), - (0x1FD8, "M", "ῐ"), - (0x1FD9, "M", "ῑ"), - (0x1FDA, "M", "ὶ"), - (0x1FDB, "M", "ί"), - (0x1FDC, "X"), - (0x1FDD, "3", " ̔̀"), - (0x1FDE, "3", " ̔́"), - (0x1FDF, "3", " ̔͂"), - (0x1FE0, "V"), - (0x1FE3, "M", "ΰ"), - (0x1FE4, "V"), - (0x1FE8, "M", "ῠ"), - (0x1FE9, "M", "ῡ"), - (0x1FEA, "M", "ὺ"), - (0x1FEB, "M", "ύ"), - (0x1FEC, "M", "ῥ"), - (0x1FED, "3", " ̈̀"), - (0x1FEE, "3", " ̈́"), - (0x1FEF, "3", "`"), - (0x1FF0, "X"), - (0x1FF2, "M", "ὼι"), - (0x1FF3, "M", "ωι"), - (0x1FF4, "M", "ώι"), - (0x1FF5, "X"), - (0x1FF6, "V"), - ] - - -def _seg_21() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1FF7, "M", "ῶι"), - (0x1FF8, "M", "ὸ"), - (0x1FF9, "M", "ό"), - (0x1FFA, "M", "ὼ"), - (0x1FFB, "M", "ώ"), - (0x1FFC, "M", "ωι"), - (0x1FFD, "3", " ́"), - (0x1FFE, "3", " ̔"), - (0x1FFF, "X"), - (0x2000, "3", " "), - (0x200B, "I"), - (0x200C, "D", ""), - (0x200E, "X"), - (0x2010, "V"), - (0x2011, "M", "‐"), - (0x2012, "V"), - (0x2017, "3", " ̳"), - (0x2018, "V"), - (0x2024, "X"), - (0x2027, "V"), - (0x2028, "X"), - (0x202F, "3", " "), - (0x2030, "V"), - (0x2033, "M", "′′"), - (0x2034, "M", "′′′"), - (0x2035, "V"), - (0x2036, "M", "‵‵"), - (0x2037, "M", "‵‵‵"), - (0x2038, "V"), - (0x203C, "3", "!!"), - (0x203D, "V"), - (0x203E, "3", " ̅"), - (0x203F, "V"), - (0x2047, "3", "??"), - (0x2048, "3", "?!"), - (0x2049, "3", "!?"), - (0x204A, "V"), - (0x2057, "M", "′′′′"), - (0x2058, "V"), - (0x205F, "3", " "), - (0x2060, "I"), - (0x2061, "X"), - (0x2064, "I"), - (0x2065, "X"), - (0x2070, "M", "0"), - (0x2071, "M", "i"), - (0x2072, "X"), - (0x2074, "M", "4"), - (0x2075, "M", "5"), - (0x2076, "M", "6"), - (0x2077, "M", "7"), - (0x2078, "M", "8"), - (0x2079, "M", "9"), - (0x207A, "3", "+"), - (0x207B, "M", "−"), - (0x207C, "3", "="), - (0x207D, "3", "("), - (0x207E, "3", ")"), - (0x207F, "M", "n"), - (0x2080, "M", "0"), - (0x2081, "M", "1"), - (0x2082, "M", "2"), - (0x2083, "M", "3"), - (0x2084, "M", "4"), - (0x2085, "M", "5"), - (0x2086, "M", "6"), - (0x2087, "M", "7"), - (0x2088, "M", "8"), - (0x2089, "M", "9"), - (0x208A, "3", "+"), - (0x208B, "M", "−"), - (0x208C, "3", "="), - (0x208D, "3", "("), - (0x208E, "3", ")"), - (0x208F, "X"), - (0x2090, "M", "a"), - (0x2091, "M", "e"), - (0x2092, "M", "o"), - (0x2093, "M", "x"), - (0x2094, "M", "ə"), - (0x2095, "M", "h"), - (0x2096, "M", "k"), - (0x2097, "M", "l"), - (0x2098, "M", "m"), - (0x2099, "M", "n"), - (0x209A, "M", "p"), - (0x209B, "M", "s"), - (0x209C, "M", "t"), - (0x209D, "X"), - (0x20A0, "V"), - (0x20A8, "M", "rs"), - (0x20A9, "V"), - (0x20C1, "X"), - (0x20D0, "V"), - (0x20F1, "X"), - (0x2100, "3", "a/c"), - (0x2101, "3", "a/s"), - (0x2102, "M", "c"), - (0x2103, "M", "°c"), - (0x2104, "V"), - ] - - -def _seg_22() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x2105, "3", "c/o"), - (0x2106, "3", "c/u"), - (0x2107, "M", "ɛ"), - (0x2108, "V"), - (0x2109, "M", "°f"), - (0x210A, "M", "g"), - (0x210B, "M", "h"), - (0x210F, "M", "ħ"), - (0x2110, "M", "i"), - (0x2112, "M", "l"), - (0x2114, "V"), - (0x2115, "M", "n"), - (0x2116, "M", "no"), - (0x2117, "V"), - (0x2119, "M", "p"), - (0x211A, "M", "q"), - (0x211B, "M", "r"), - (0x211E, "V"), - (0x2120, "M", "sm"), - (0x2121, "M", "tel"), - (0x2122, "M", "tm"), - (0x2123, "V"), - (0x2124, "M", "z"), - (0x2125, "V"), - (0x2126, "M", "ω"), - (0x2127, "V"), - (0x2128, "M", "z"), - (0x2129, "V"), - (0x212A, "M", "k"), - (0x212B, "M", "å"), - (0x212C, "M", "b"), - (0x212D, "M", "c"), - (0x212E, "V"), - (0x212F, "M", "e"), - (0x2131, "M", "f"), - (0x2132, "X"), - (0x2133, "M", "m"), - (0x2134, "M", "o"), - (0x2135, "M", "א"), - (0x2136, "M", "ב"), - (0x2137, "M", "ג"), - (0x2138, "M", "ד"), - (0x2139, "M", "i"), - (0x213A, "V"), - (0x213B, "M", "fax"), - (0x213C, "M", "π"), - (0x213D, "M", "γ"), - (0x213F, "M", "π"), - (0x2140, "M", "∑"), - (0x2141, "V"), - (0x2145, "M", "d"), - (0x2147, "M", "e"), - (0x2148, "M", "i"), - (0x2149, "M", "j"), - (0x214A, "V"), - (0x2150, "M", "1⁄7"), - (0x2151, "M", "1⁄9"), - (0x2152, "M", "1⁄10"), - (0x2153, "M", "1⁄3"), - (0x2154, "M", "2⁄3"), - (0x2155, "M", "1⁄5"), - (0x2156, "M", "2⁄5"), - (0x2157, "M", "3⁄5"), - (0x2158, "M", "4⁄5"), - (0x2159, "M", "1⁄6"), - (0x215A, "M", "5⁄6"), - (0x215B, "M", "1⁄8"), - (0x215C, "M", "3⁄8"), - (0x215D, "M", "5⁄8"), - (0x215E, "M", "7⁄8"), - (0x215F, "M", "1⁄"), - (0x2160, "M", "i"), - (0x2161, "M", "ii"), - (0x2162, "M", "iii"), - (0x2163, "M", "iv"), - (0x2164, "M", "v"), - (0x2165, "M", "vi"), - (0x2166, "M", "vii"), - (0x2167, "M", "viii"), - (0x2168, "M", "ix"), - (0x2169, "M", "x"), - (0x216A, "M", "xi"), - (0x216B, "M", "xii"), - (0x216C, "M", "l"), - (0x216D, "M", "c"), - (0x216E, "M", "d"), - (0x216F, "M", "m"), - (0x2170, "M", "i"), - (0x2171, "M", "ii"), - (0x2172, "M", "iii"), - (0x2173, "M", "iv"), - (0x2174, "M", "v"), - (0x2175, "M", "vi"), - (0x2176, "M", "vii"), - (0x2177, "M", "viii"), - (0x2178, "M", "ix"), - (0x2179, "M", "x"), - (0x217A, "M", "xi"), - (0x217B, "M", "xii"), - (0x217C, "M", "l"), - ] - - -def _seg_23() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x217D, "M", "c"), - (0x217E, "M", "d"), - (0x217F, "M", "m"), - (0x2180, "V"), - (0x2183, "X"), - (0x2184, "V"), - (0x2189, "M", "0⁄3"), - (0x218A, "V"), - (0x218C, "X"), - (0x2190, "V"), - (0x222C, "M", "∫∫"), - (0x222D, "M", "∫∫∫"), - (0x222E, "V"), - (0x222F, "M", "∮∮"), - (0x2230, "M", "∮∮∮"), - (0x2231, "V"), - (0x2329, "M", "〈"), - (0x232A, "M", "〉"), - (0x232B, "V"), - (0x2427, "X"), - (0x2440, "V"), - (0x244B, "X"), - (0x2460, "M", "1"), - (0x2461, "M", "2"), - (0x2462, "M", "3"), - (0x2463, "M", "4"), - (0x2464, "M", "5"), - (0x2465, "M", "6"), - (0x2466, "M", "7"), - (0x2467, "M", "8"), - (0x2468, "M", "9"), - (0x2469, "M", "10"), - (0x246A, "M", "11"), - (0x246B, "M", "12"), - (0x246C, "M", "13"), - (0x246D, "M", "14"), - (0x246E, "M", "15"), - (0x246F, "M", "16"), - (0x2470, "M", "17"), - (0x2471, "M", "18"), - (0x2472, "M", "19"), - (0x2473, "M", "20"), - (0x2474, "3", "(1)"), - (0x2475, "3", "(2)"), - (0x2476, "3", "(3)"), - (0x2477, "3", "(4)"), - (0x2478, "3", "(5)"), - (0x2479, "3", "(6)"), - (0x247A, "3", "(7)"), - (0x247B, "3", "(8)"), - (0x247C, "3", "(9)"), - (0x247D, "3", "(10)"), - (0x247E, "3", "(11)"), - (0x247F, "3", "(12)"), - (0x2480, "3", "(13)"), - (0x2481, "3", "(14)"), - (0x2482, "3", "(15)"), - (0x2483, "3", "(16)"), - (0x2484, "3", "(17)"), - (0x2485, "3", "(18)"), - (0x2486, "3", "(19)"), - (0x2487, "3", "(20)"), - (0x2488, "X"), - (0x249C, "3", "(a)"), - (0x249D, "3", "(b)"), - (0x249E, "3", "(c)"), - (0x249F, "3", "(d)"), - (0x24A0, "3", "(e)"), - (0x24A1, "3", "(f)"), - (0x24A2, "3", "(g)"), - (0x24A3, "3", "(h)"), - (0x24A4, "3", "(i)"), - (0x24A5, "3", "(j)"), - (0x24A6, "3", "(k)"), - (0x24A7, "3", "(l)"), - (0x24A8, "3", "(m)"), - (0x24A9, "3", "(n)"), - (0x24AA, "3", "(o)"), - (0x24AB, "3", "(p)"), - (0x24AC, "3", "(q)"), - (0x24AD, "3", "(r)"), - (0x24AE, "3", "(s)"), - (0x24AF, "3", "(t)"), - (0x24B0, "3", "(u)"), - (0x24B1, "3", "(v)"), - (0x24B2, "3", "(w)"), - (0x24B3, "3", "(x)"), - (0x24B4, "3", "(y)"), - (0x24B5, "3", "(z)"), - (0x24B6, "M", "a"), - (0x24B7, "M", "b"), - (0x24B8, "M", "c"), - (0x24B9, "M", "d"), - (0x24BA, "M", "e"), - (0x24BB, "M", "f"), - (0x24BC, "M", "g"), - (0x24BD, "M", "h"), - (0x24BE, "M", "i"), - (0x24BF, "M", "j"), - (0x24C0, "M", "k"), - ] - - -def _seg_24() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x24C1, "M", "l"), - (0x24C2, "M", "m"), - (0x24C3, "M", "n"), - (0x24C4, "M", "o"), - (0x24C5, "M", "p"), - (0x24C6, "M", "q"), - (0x24C7, "M", "r"), - (0x24C8, "M", "s"), - (0x24C9, "M", "t"), - (0x24CA, "M", "u"), - (0x24CB, "M", "v"), - (0x24CC, "M", "w"), - (0x24CD, "M", "x"), - (0x24CE, "M", "y"), - (0x24CF, "M", "z"), - (0x24D0, "M", "a"), - (0x24D1, "M", "b"), - (0x24D2, "M", "c"), - (0x24D3, "M", "d"), - (0x24D4, "M", "e"), - (0x24D5, "M", "f"), - (0x24D6, "M", "g"), - (0x24D7, "M", "h"), - (0x24D8, "M", "i"), - (0x24D9, "M", "j"), - (0x24DA, "M", "k"), - (0x24DB, "M", "l"), - (0x24DC, "M", "m"), - (0x24DD, "M", "n"), - (0x24DE, "M", "o"), - (0x24DF, "M", "p"), - (0x24E0, "M", "q"), - (0x24E1, "M", "r"), - (0x24E2, "M", "s"), - (0x24E3, "M", "t"), - (0x24E4, "M", "u"), - (0x24E5, "M", "v"), - (0x24E6, "M", "w"), - (0x24E7, "M", "x"), - (0x24E8, "M", "y"), - (0x24E9, "M", "z"), - (0x24EA, "M", "0"), - (0x24EB, "V"), - (0x2A0C, "M", "∫∫∫∫"), - (0x2A0D, "V"), - (0x2A74, "3", "::="), - (0x2A75, "3", "=="), - (0x2A76, "3", "==="), - (0x2A77, "V"), - (0x2ADC, "M", "⫝̸"), - (0x2ADD, "V"), - (0x2B74, "X"), - (0x2B76, "V"), - (0x2B96, "X"), - (0x2B97, "V"), - (0x2C00, "M", "ⰰ"), - (0x2C01, "M", "ⰱ"), - (0x2C02, "M", "ⰲ"), - (0x2C03, "M", "ⰳ"), - (0x2C04, "M", "ⰴ"), - (0x2C05, "M", "ⰵ"), - (0x2C06, "M", "ⰶ"), - (0x2C07, "M", "ⰷ"), - (0x2C08, "M", "ⰸ"), - (0x2C09, "M", "ⰹ"), - (0x2C0A, "M", "ⰺ"), - (0x2C0B, "M", "ⰻ"), - (0x2C0C, "M", "ⰼ"), - (0x2C0D, "M", "ⰽ"), - (0x2C0E, "M", "ⰾ"), - (0x2C0F, "M", "ⰿ"), - (0x2C10, "M", "ⱀ"), - (0x2C11, "M", "ⱁ"), - (0x2C12, "M", "ⱂ"), - (0x2C13, "M", "ⱃ"), - (0x2C14, "M", "ⱄ"), - (0x2C15, "M", "ⱅ"), - (0x2C16, "M", "ⱆ"), - (0x2C17, "M", "ⱇ"), - (0x2C18, "M", "ⱈ"), - (0x2C19, "M", "ⱉ"), - (0x2C1A, "M", "ⱊ"), - (0x2C1B, "M", "ⱋ"), - (0x2C1C, "M", "ⱌ"), - (0x2C1D, "M", "ⱍ"), - (0x2C1E, "M", "ⱎ"), - (0x2C1F, "M", "ⱏ"), - (0x2C20, "M", "ⱐ"), - (0x2C21, "M", "ⱑ"), - (0x2C22, "M", "ⱒ"), - (0x2C23, "M", "ⱓ"), - (0x2C24, "M", "ⱔ"), - (0x2C25, "M", "ⱕ"), - (0x2C26, "M", "ⱖ"), - (0x2C27, "M", "ⱗ"), - (0x2C28, "M", "ⱘ"), - (0x2C29, "M", "ⱙ"), - (0x2C2A, "M", "ⱚ"), - (0x2C2B, "M", "ⱛ"), - (0x2C2C, "M", "ⱜ"), - ] - - -def _seg_25() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x2C2D, "M", "ⱝ"), - (0x2C2E, "M", "ⱞ"), - (0x2C2F, "M", "ⱟ"), - (0x2C30, "V"), - (0x2C60, "M", "ⱡ"), - (0x2C61, "V"), - (0x2C62, "M", "ɫ"), - (0x2C63, "M", "ᵽ"), - (0x2C64, "M", "ɽ"), - (0x2C65, "V"), - (0x2C67, "M", "ⱨ"), - (0x2C68, "V"), - (0x2C69, "M", "ⱪ"), - (0x2C6A, "V"), - (0x2C6B, "M", "ⱬ"), - (0x2C6C, "V"), - (0x2C6D, "M", "ɑ"), - (0x2C6E, "M", "ɱ"), - (0x2C6F, "M", "ɐ"), - (0x2C70, "M", "ɒ"), - (0x2C71, "V"), - (0x2C72, "M", "ⱳ"), - (0x2C73, "V"), - (0x2C75, "M", "ⱶ"), - (0x2C76, "V"), - (0x2C7C, "M", "j"), - (0x2C7D, "M", "v"), - (0x2C7E, "M", "ȿ"), - (0x2C7F, "M", "ɀ"), - (0x2C80, "M", "ⲁ"), - (0x2C81, "V"), - (0x2C82, "M", "ⲃ"), - (0x2C83, "V"), - (0x2C84, "M", "ⲅ"), - (0x2C85, "V"), - (0x2C86, "M", "ⲇ"), - (0x2C87, "V"), - (0x2C88, "M", "ⲉ"), - (0x2C89, "V"), - (0x2C8A, "M", "ⲋ"), - (0x2C8B, "V"), - (0x2C8C, "M", "ⲍ"), - (0x2C8D, "V"), - (0x2C8E, "M", "ⲏ"), - (0x2C8F, "V"), - (0x2C90, "M", "ⲑ"), - (0x2C91, "V"), - (0x2C92, "M", "ⲓ"), - (0x2C93, "V"), - (0x2C94, "M", "ⲕ"), - (0x2C95, "V"), - (0x2C96, "M", "ⲗ"), - (0x2C97, "V"), - (0x2C98, "M", "ⲙ"), - (0x2C99, "V"), - (0x2C9A, "M", "ⲛ"), - (0x2C9B, "V"), - (0x2C9C, "M", "ⲝ"), - (0x2C9D, "V"), - (0x2C9E, "M", "ⲟ"), - (0x2C9F, "V"), - (0x2CA0, "M", "ⲡ"), - (0x2CA1, "V"), - (0x2CA2, "M", "ⲣ"), - (0x2CA3, "V"), - (0x2CA4, "M", "ⲥ"), - (0x2CA5, "V"), - (0x2CA6, "M", "ⲧ"), - (0x2CA7, "V"), - (0x2CA8, "M", "ⲩ"), - (0x2CA9, "V"), - (0x2CAA, "M", "ⲫ"), - (0x2CAB, "V"), - (0x2CAC, "M", "ⲭ"), - (0x2CAD, "V"), - (0x2CAE, "M", "ⲯ"), - (0x2CAF, "V"), - (0x2CB0, "M", "ⲱ"), - (0x2CB1, "V"), - (0x2CB2, "M", "ⲳ"), - (0x2CB3, "V"), - (0x2CB4, "M", "ⲵ"), - (0x2CB5, "V"), - (0x2CB6, "M", "ⲷ"), - (0x2CB7, "V"), - (0x2CB8, "M", "ⲹ"), - (0x2CB9, "V"), - (0x2CBA, "M", "ⲻ"), - (0x2CBB, "V"), - (0x2CBC, "M", "ⲽ"), - (0x2CBD, "V"), - (0x2CBE, "M", "ⲿ"), - (0x2CBF, "V"), - (0x2CC0, "M", "ⳁ"), - (0x2CC1, "V"), - (0x2CC2, "M", "ⳃ"), - (0x2CC3, "V"), - (0x2CC4, "M", "ⳅ"), - (0x2CC5, "V"), - (0x2CC6, "M", "ⳇ"), - ] - - -def _seg_26() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x2CC7, "V"), - (0x2CC8, "M", "ⳉ"), - (0x2CC9, "V"), - (0x2CCA, "M", "ⳋ"), - (0x2CCB, "V"), - (0x2CCC, "M", "ⳍ"), - (0x2CCD, "V"), - (0x2CCE, "M", "ⳏ"), - (0x2CCF, "V"), - (0x2CD0, "M", "ⳑ"), - (0x2CD1, "V"), - (0x2CD2, "M", "ⳓ"), - (0x2CD3, "V"), - (0x2CD4, "M", "ⳕ"), - (0x2CD5, "V"), - (0x2CD6, "M", "ⳗ"), - (0x2CD7, "V"), - (0x2CD8, "M", "ⳙ"), - (0x2CD9, "V"), - (0x2CDA, "M", "ⳛ"), - (0x2CDB, "V"), - (0x2CDC, "M", "ⳝ"), - (0x2CDD, "V"), - (0x2CDE, "M", "ⳟ"), - (0x2CDF, "V"), - (0x2CE0, "M", "ⳡ"), - (0x2CE1, "V"), - (0x2CE2, "M", "ⳣ"), - (0x2CE3, "V"), - (0x2CEB, "M", "ⳬ"), - (0x2CEC, "V"), - (0x2CED, "M", "ⳮ"), - (0x2CEE, "V"), - (0x2CF2, "M", "ⳳ"), - (0x2CF3, "V"), - (0x2CF4, "X"), - (0x2CF9, "V"), - (0x2D26, "X"), - (0x2D27, "V"), - (0x2D28, "X"), - (0x2D2D, "V"), - (0x2D2E, "X"), - (0x2D30, "V"), - (0x2D68, "X"), - (0x2D6F, "M", "ⵡ"), - (0x2D70, "V"), - (0x2D71, "X"), - (0x2D7F, "V"), - (0x2D97, "X"), - (0x2DA0, "V"), - (0x2DA7, "X"), - (0x2DA8, "V"), - (0x2DAF, "X"), - (0x2DB0, "V"), - (0x2DB7, "X"), - (0x2DB8, "V"), - (0x2DBF, "X"), - (0x2DC0, "V"), - (0x2DC7, "X"), - (0x2DC8, "V"), - (0x2DCF, "X"), - (0x2DD0, "V"), - (0x2DD7, "X"), - (0x2DD8, "V"), - (0x2DDF, "X"), - (0x2DE0, "V"), - (0x2E5E, "X"), - (0x2E80, "V"), - (0x2E9A, "X"), - (0x2E9B, "V"), - (0x2E9F, "M", "母"), - (0x2EA0, "V"), - (0x2EF3, "M", "龟"), - (0x2EF4, "X"), - (0x2F00, "M", "一"), - (0x2F01, "M", "丨"), - (0x2F02, "M", "丶"), - (0x2F03, "M", "丿"), - (0x2F04, "M", "乙"), - (0x2F05, "M", "亅"), - (0x2F06, "M", "二"), - (0x2F07, "M", "亠"), - (0x2F08, "M", "人"), - (0x2F09, "M", "儿"), - (0x2F0A, "M", "入"), - (0x2F0B, "M", "八"), - (0x2F0C, "M", "冂"), - (0x2F0D, "M", "冖"), - (0x2F0E, "M", "冫"), - (0x2F0F, "M", "几"), - (0x2F10, "M", "凵"), - (0x2F11, "M", "刀"), - (0x2F12, "M", "力"), - (0x2F13, "M", "勹"), - (0x2F14, "M", "匕"), - (0x2F15, "M", "匚"), - (0x2F16, "M", "匸"), - (0x2F17, "M", "十"), - (0x2F18, "M", "卜"), - (0x2F19, "M", "卩"), - ] - - -def _seg_27() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x2F1A, "M", "厂"), - (0x2F1B, "M", "厶"), - (0x2F1C, "M", "又"), - (0x2F1D, "M", "口"), - (0x2F1E, "M", "囗"), - (0x2F1F, "M", "土"), - (0x2F20, "M", "士"), - (0x2F21, "M", "夂"), - (0x2F22, "M", "夊"), - (0x2F23, "M", "夕"), - (0x2F24, "M", "大"), - (0x2F25, "M", "女"), - (0x2F26, "M", "子"), - (0x2F27, "M", "宀"), - (0x2F28, "M", "寸"), - (0x2F29, "M", "小"), - (0x2F2A, "M", "尢"), - (0x2F2B, "M", "尸"), - (0x2F2C, "M", "屮"), - (0x2F2D, "M", "山"), - (0x2F2E, "M", "巛"), - (0x2F2F, "M", "工"), - (0x2F30, "M", "己"), - (0x2F31, "M", "巾"), - (0x2F32, "M", "干"), - (0x2F33, "M", "幺"), - (0x2F34, "M", "广"), - (0x2F35, "M", "廴"), - (0x2F36, "M", "廾"), - (0x2F37, "M", "弋"), - (0x2F38, "M", "弓"), - (0x2F39, "M", "彐"), - (0x2F3A, "M", "彡"), - (0x2F3B, "M", "彳"), - (0x2F3C, "M", "心"), - (0x2F3D, "M", "戈"), - (0x2F3E, "M", "戶"), - (0x2F3F, "M", "手"), - (0x2F40, "M", "支"), - (0x2F41, "M", "攴"), - (0x2F42, "M", "文"), - (0x2F43, "M", "斗"), - (0x2F44, "M", "斤"), - (0x2F45, "M", "方"), - (0x2F46, "M", "无"), - (0x2F47, "M", "日"), - (0x2F48, "M", "曰"), - (0x2F49, "M", "月"), - (0x2F4A, "M", "木"), - (0x2F4B, "M", "欠"), - (0x2F4C, "M", "止"), - (0x2F4D, "M", "歹"), - (0x2F4E, "M", "殳"), - (0x2F4F, "M", "毋"), - (0x2F50, "M", "比"), - (0x2F51, "M", "毛"), - (0x2F52, "M", "氏"), - (0x2F53, "M", "气"), - (0x2F54, "M", "水"), - (0x2F55, "M", "火"), - (0x2F56, "M", "爪"), - (0x2F57, "M", "父"), - (0x2F58, "M", "爻"), - (0x2F59, "M", "爿"), - (0x2F5A, "M", "片"), - (0x2F5B, "M", "牙"), - (0x2F5C, "M", "牛"), - (0x2F5D, "M", "犬"), - (0x2F5E, "M", "玄"), - (0x2F5F, "M", "玉"), - (0x2F60, "M", "瓜"), - (0x2F61, "M", "瓦"), - (0x2F62, "M", "甘"), - (0x2F63, "M", "生"), - (0x2F64, "M", "用"), - (0x2F65, "M", "田"), - (0x2F66, "M", "疋"), - (0x2F67, "M", "疒"), - (0x2F68, "M", "癶"), - (0x2F69, "M", "白"), - (0x2F6A, "M", "皮"), - (0x2F6B, "M", "皿"), - (0x2F6C, "M", "目"), - (0x2F6D, "M", "矛"), - (0x2F6E, "M", "矢"), - (0x2F6F, "M", "石"), - (0x2F70, "M", "示"), - (0x2F71, "M", "禸"), - (0x2F72, "M", "禾"), - (0x2F73, "M", "穴"), - (0x2F74, "M", "立"), - (0x2F75, "M", "竹"), - (0x2F76, "M", "米"), - (0x2F77, "M", "糸"), - (0x2F78, "M", "缶"), - (0x2F79, "M", "网"), - (0x2F7A, "M", "羊"), - (0x2F7B, "M", "羽"), - (0x2F7C, "M", "老"), - (0x2F7D, "M", "而"), - ] - - -def _seg_28() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x2F7E, "M", "耒"), - (0x2F7F, "M", "耳"), - (0x2F80, "M", "聿"), - (0x2F81, "M", "肉"), - (0x2F82, "M", "臣"), - (0x2F83, "M", "自"), - (0x2F84, "M", "至"), - (0x2F85, "M", "臼"), - (0x2F86, "M", "舌"), - (0x2F87, "M", "舛"), - (0x2F88, "M", "舟"), - (0x2F89, "M", "艮"), - (0x2F8A, "M", "色"), - (0x2F8B, "M", "艸"), - (0x2F8C, "M", "虍"), - (0x2F8D, "M", "虫"), - (0x2F8E, "M", "血"), - (0x2F8F, "M", "行"), - (0x2F90, "M", "衣"), - (0x2F91, "M", "襾"), - (0x2F92, "M", "見"), - (0x2F93, "M", "角"), - (0x2F94, "M", "言"), - (0x2F95, "M", "谷"), - (0x2F96, "M", "豆"), - (0x2F97, "M", "豕"), - (0x2F98, "M", "豸"), - (0x2F99, "M", "貝"), - (0x2F9A, "M", "赤"), - (0x2F9B, "M", "走"), - (0x2F9C, "M", "足"), - (0x2F9D, "M", "身"), - (0x2F9E, "M", "車"), - (0x2F9F, "M", "辛"), - (0x2FA0, "M", "辰"), - (0x2FA1, "M", "辵"), - (0x2FA2, "M", "邑"), - (0x2FA3, "M", "酉"), - (0x2FA4, "M", "釆"), - (0x2FA5, "M", "里"), - (0x2FA6, "M", "金"), - (0x2FA7, "M", "長"), - (0x2FA8, "M", "門"), - (0x2FA9, "M", "阜"), - (0x2FAA, "M", "隶"), - (0x2FAB, "M", "隹"), - (0x2FAC, "M", "雨"), - (0x2FAD, "M", "靑"), - (0x2FAE, "M", "非"), - (0x2FAF, "M", "面"), - (0x2FB0, "M", "革"), - (0x2FB1, "M", "韋"), - (0x2FB2, "M", "韭"), - (0x2FB3, "M", "音"), - (0x2FB4, "M", "頁"), - (0x2FB5, "M", "風"), - (0x2FB6, "M", "飛"), - (0x2FB7, "M", "食"), - (0x2FB8, "M", "首"), - (0x2FB9, "M", "香"), - (0x2FBA, "M", "馬"), - (0x2FBB, "M", "骨"), - (0x2FBC, "M", "高"), - (0x2FBD, "M", "髟"), - (0x2FBE, "M", "鬥"), - (0x2FBF, "M", "鬯"), - (0x2FC0, "M", "鬲"), - (0x2FC1, "M", "鬼"), - (0x2FC2, "M", "魚"), - (0x2FC3, "M", "鳥"), - (0x2FC4, "M", "鹵"), - (0x2FC5, "M", "鹿"), - (0x2FC6, "M", "麥"), - (0x2FC7, "M", "麻"), - (0x2FC8, "M", "黃"), - (0x2FC9, "M", "黍"), - (0x2FCA, "M", "黑"), - (0x2FCB, "M", "黹"), - (0x2FCC, "M", "黽"), - (0x2FCD, "M", "鼎"), - (0x2FCE, "M", "鼓"), - (0x2FCF, "M", "鼠"), - (0x2FD0, "M", "鼻"), - (0x2FD1, "M", "齊"), - (0x2FD2, "M", "齒"), - (0x2FD3, "M", "龍"), - (0x2FD4, "M", "龜"), - (0x2FD5, "M", "龠"), - (0x2FD6, "X"), - (0x3000, "3", " "), - (0x3001, "V"), - (0x3002, "M", "."), - (0x3003, "V"), - (0x3036, "M", "〒"), - (0x3037, "V"), - (0x3038, "M", "十"), - (0x3039, "M", "卄"), - (0x303A, "M", "卅"), - (0x303B, "V"), - (0x3040, "X"), - ] - - -def _seg_29() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x3041, "V"), - (0x3097, "X"), - (0x3099, "V"), - (0x309B, "3", " ゙"), - (0x309C, "3", " ゚"), - (0x309D, "V"), - (0x309F, "M", "より"), - (0x30A0, "V"), - (0x30FF, "M", "コト"), - (0x3100, "X"), - (0x3105, "V"), - (0x3130, "X"), - (0x3131, "M", "ᄀ"), - (0x3132, "M", "ᄁ"), - (0x3133, "M", "ᆪ"), - (0x3134, "M", "ᄂ"), - (0x3135, "M", "ᆬ"), - (0x3136, "M", "ᆭ"), - (0x3137, "M", "ᄃ"), - (0x3138, "M", "ᄄ"), - (0x3139, "M", "ᄅ"), - (0x313A, "M", "ᆰ"), - (0x313B, "M", "ᆱ"), - (0x313C, "M", "ᆲ"), - (0x313D, "M", "ᆳ"), - (0x313E, "M", "ᆴ"), - (0x313F, "M", "ᆵ"), - (0x3140, "M", "ᄚ"), - (0x3141, "M", "ᄆ"), - (0x3142, "M", "ᄇ"), - (0x3143, "M", "ᄈ"), - (0x3144, "M", "ᄡ"), - (0x3145, "M", "ᄉ"), - (0x3146, "M", "ᄊ"), - (0x3147, "M", "ᄋ"), - (0x3148, "M", "ᄌ"), - (0x3149, "M", "ᄍ"), - (0x314A, "M", "ᄎ"), - (0x314B, "M", "ᄏ"), - (0x314C, "M", "ᄐ"), - (0x314D, "M", "ᄑ"), - (0x314E, "M", "ᄒ"), - (0x314F, "M", "ᅡ"), - (0x3150, "M", "ᅢ"), - (0x3151, "M", "ᅣ"), - (0x3152, "M", "ᅤ"), - (0x3153, "M", "ᅥ"), - (0x3154, "M", "ᅦ"), - (0x3155, "M", "ᅧ"), - (0x3156, "M", "ᅨ"), - (0x3157, "M", "ᅩ"), - (0x3158, "M", "ᅪ"), - (0x3159, "M", "ᅫ"), - (0x315A, "M", "ᅬ"), - (0x315B, "M", "ᅭ"), - (0x315C, "M", "ᅮ"), - (0x315D, "M", "ᅯ"), - (0x315E, "M", "ᅰ"), - (0x315F, "M", "ᅱ"), - (0x3160, "M", "ᅲ"), - (0x3161, "M", "ᅳ"), - (0x3162, "M", "ᅴ"), - (0x3163, "M", "ᅵ"), - (0x3164, "X"), - (0x3165, "M", "ᄔ"), - (0x3166, "M", "ᄕ"), - (0x3167, "M", "ᇇ"), - (0x3168, "M", "ᇈ"), - (0x3169, "M", "ᇌ"), - (0x316A, "M", "ᇎ"), - (0x316B, "M", "ᇓ"), - (0x316C, "M", "ᇗ"), - (0x316D, "M", "ᇙ"), - (0x316E, "M", "ᄜ"), - (0x316F, "M", "ᇝ"), - (0x3170, "M", "ᇟ"), - (0x3171, "M", "ᄝ"), - (0x3172, "M", "ᄞ"), - (0x3173, "M", "ᄠ"), - (0x3174, "M", "ᄢ"), - (0x3175, "M", "ᄣ"), - (0x3176, "M", "ᄧ"), - (0x3177, "M", "ᄩ"), - (0x3178, "M", "ᄫ"), - (0x3179, "M", "ᄬ"), - (0x317A, "M", "ᄭ"), - (0x317B, "M", "ᄮ"), - (0x317C, "M", "ᄯ"), - (0x317D, "M", "ᄲ"), - (0x317E, "M", "ᄶ"), - (0x317F, "M", "ᅀ"), - (0x3180, "M", "ᅇ"), - (0x3181, "M", "ᅌ"), - (0x3182, "M", "ᇱ"), - (0x3183, "M", "ᇲ"), - (0x3184, "M", "ᅗ"), - (0x3185, "M", "ᅘ"), - (0x3186, "M", "ᅙ"), - (0x3187, "M", "ᆄ"), - (0x3188, "M", "ᆅ"), - ] - - -def _seg_30() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x3189, "M", "ᆈ"), - (0x318A, "M", "ᆑ"), - (0x318B, "M", "ᆒ"), - (0x318C, "M", "ᆔ"), - (0x318D, "M", "ᆞ"), - (0x318E, "M", "ᆡ"), - (0x318F, "X"), - (0x3190, "V"), - (0x3192, "M", "一"), - (0x3193, "M", "二"), - (0x3194, "M", "三"), - (0x3195, "M", "四"), - (0x3196, "M", "上"), - (0x3197, "M", "中"), - (0x3198, "M", "下"), - (0x3199, "M", "甲"), - (0x319A, "M", "乙"), - (0x319B, "M", "丙"), - (0x319C, "M", "丁"), - (0x319D, "M", "天"), - (0x319E, "M", "地"), - (0x319F, "M", "人"), - (0x31A0, "V"), - (0x31E4, "X"), - (0x31F0, "V"), - (0x3200, "3", "(ᄀ)"), - (0x3201, "3", "(ᄂ)"), - (0x3202, "3", "(ᄃ)"), - (0x3203, "3", "(ᄅ)"), - (0x3204, "3", "(ᄆ)"), - (0x3205, "3", "(ᄇ)"), - (0x3206, "3", "(ᄉ)"), - (0x3207, "3", "(ᄋ)"), - (0x3208, "3", "(ᄌ)"), - (0x3209, "3", "(ᄎ)"), - (0x320A, "3", "(ᄏ)"), - (0x320B, "3", "(ᄐ)"), - (0x320C, "3", "(ᄑ)"), - (0x320D, "3", "(ᄒ)"), - (0x320E, "3", "(가)"), - (0x320F, "3", "(나)"), - (0x3210, "3", "(다)"), - (0x3211, "3", "(라)"), - (0x3212, "3", "(마)"), - (0x3213, "3", "(바)"), - (0x3214, "3", "(사)"), - (0x3215, "3", "(아)"), - (0x3216, "3", "(자)"), - (0x3217, "3", "(차)"), - (0x3218, "3", "(카)"), - (0x3219, "3", "(타)"), - (0x321A, "3", "(파)"), - (0x321B, "3", "(하)"), - (0x321C, "3", "(주)"), - (0x321D, "3", "(오전)"), - (0x321E, "3", "(오후)"), - (0x321F, "X"), - (0x3220, "3", "(一)"), - (0x3221, "3", "(二)"), - (0x3222, "3", "(三)"), - (0x3223, "3", "(四)"), - (0x3224, "3", "(五)"), - (0x3225, "3", "(六)"), - (0x3226, "3", "(七)"), - (0x3227, "3", "(八)"), - (0x3228, "3", "(九)"), - (0x3229, "3", "(十)"), - (0x322A, "3", "(月)"), - (0x322B, "3", "(火)"), - (0x322C, "3", "(水)"), - (0x322D, "3", "(木)"), - (0x322E, "3", "(金)"), - (0x322F, "3", "(土)"), - (0x3230, "3", "(日)"), - (0x3231, "3", "(株)"), - (0x3232, "3", "(有)"), - (0x3233, "3", "(社)"), - (0x3234, "3", "(名)"), - (0x3235, "3", "(特)"), - (0x3236, "3", "(財)"), - (0x3237, "3", "(祝)"), - (0x3238, "3", "(労)"), - (0x3239, "3", "(代)"), - (0x323A, "3", "(呼)"), - (0x323B, "3", "(学)"), - (0x323C, "3", "(監)"), - (0x323D, "3", "(企)"), - (0x323E, "3", "(資)"), - (0x323F, "3", "(協)"), - (0x3240, "3", "(祭)"), - (0x3241, "3", "(休)"), - (0x3242, "3", "(自)"), - (0x3243, "3", "(至)"), - (0x3244, "M", "問"), - (0x3245, "M", "幼"), - (0x3246, "M", "文"), - (0x3247, "M", "箏"), - (0x3248, "V"), - (0x3250, "M", "pte"), - (0x3251, "M", "21"), - ] - - -def _seg_31() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x3252, "M", "22"), - (0x3253, "M", "23"), - (0x3254, "M", "24"), - (0x3255, "M", "25"), - (0x3256, "M", "26"), - (0x3257, "M", "27"), - (0x3258, "M", "28"), - (0x3259, "M", "29"), - (0x325A, "M", "30"), - (0x325B, "M", "31"), - (0x325C, "M", "32"), - (0x325D, "M", "33"), - (0x325E, "M", "34"), - (0x325F, "M", "35"), - (0x3260, "M", "ᄀ"), - (0x3261, "M", "ᄂ"), - (0x3262, "M", "ᄃ"), - (0x3263, "M", "ᄅ"), - (0x3264, "M", "ᄆ"), - (0x3265, "M", "ᄇ"), - (0x3266, "M", "ᄉ"), - (0x3267, "M", "ᄋ"), - (0x3268, "M", "ᄌ"), - (0x3269, "M", "ᄎ"), - (0x326A, "M", "ᄏ"), - (0x326B, "M", "ᄐ"), - (0x326C, "M", "ᄑ"), - (0x326D, "M", "ᄒ"), - (0x326E, "M", "가"), - (0x326F, "M", "나"), - (0x3270, "M", "다"), - (0x3271, "M", "라"), - (0x3272, "M", "마"), - (0x3273, "M", "바"), - (0x3274, "M", "사"), - (0x3275, "M", "아"), - (0x3276, "M", "자"), - (0x3277, "M", "차"), - (0x3278, "M", "카"), - (0x3279, "M", "타"), - (0x327A, "M", "파"), - (0x327B, "M", "하"), - (0x327C, "M", "참고"), - (0x327D, "M", "주의"), - (0x327E, "M", "우"), - (0x327F, "V"), - (0x3280, "M", "一"), - (0x3281, "M", "二"), - (0x3282, "M", "三"), - (0x3283, "M", "四"), - (0x3284, "M", "五"), - (0x3285, "M", "六"), - (0x3286, "M", "七"), - (0x3287, "M", "八"), - (0x3288, "M", "九"), - (0x3289, "M", "十"), - (0x328A, "M", "月"), - (0x328B, "M", "火"), - (0x328C, "M", "水"), - (0x328D, "M", "木"), - (0x328E, "M", "金"), - (0x328F, "M", "土"), - (0x3290, "M", "日"), - (0x3291, "M", "株"), - (0x3292, "M", "有"), - (0x3293, "M", "社"), - (0x3294, "M", "名"), - (0x3295, "M", "特"), - (0x3296, "M", "財"), - (0x3297, "M", "祝"), - (0x3298, "M", "労"), - (0x3299, "M", "秘"), - (0x329A, "M", "男"), - (0x329B, "M", "女"), - (0x329C, "M", "適"), - (0x329D, "M", "優"), - (0x329E, "M", "印"), - (0x329F, "M", "注"), - (0x32A0, "M", "項"), - (0x32A1, "M", "休"), - (0x32A2, "M", "写"), - (0x32A3, "M", "正"), - (0x32A4, "M", "上"), - (0x32A5, "M", "中"), - (0x32A6, "M", "下"), - (0x32A7, "M", "左"), - (0x32A8, "M", "右"), - (0x32A9, "M", "医"), - (0x32AA, "M", "宗"), - (0x32AB, "M", "学"), - (0x32AC, "M", "監"), - (0x32AD, "M", "企"), - (0x32AE, "M", "資"), - (0x32AF, "M", "協"), - (0x32B0, "M", "夜"), - (0x32B1, "M", "36"), - (0x32B2, "M", "37"), - (0x32B3, "M", "38"), - (0x32B4, "M", "39"), - (0x32B5, "M", "40"), - ] - - -def _seg_32() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x32B6, "M", "41"), - (0x32B7, "M", "42"), - (0x32B8, "M", "43"), - (0x32B9, "M", "44"), - (0x32BA, "M", "45"), - (0x32BB, "M", "46"), - (0x32BC, "M", "47"), - (0x32BD, "M", "48"), - (0x32BE, "M", "49"), - (0x32BF, "M", "50"), - (0x32C0, "M", "1月"), - (0x32C1, "M", "2月"), - (0x32C2, "M", "3月"), - (0x32C3, "M", "4月"), - (0x32C4, "M", "5月"), - (0x32C5, "M", "6月"), - (0x32C6, "M", "7月"), - (0x32C7, "M", "8月"), - (0x32C8, "M", "9月"), - (0x32C9, "M", "10月"), - (0x32CA, "M", "11月"), - (0x32CB, "M", "12月"), - (0x32CC, "M", "hg"), - (0x32CD, "M", "erg"), - (0x32CE, "M", "ev"), - (0x32CF, "M", "ltd"), - (0x32D0, "M", "ア"), - (0x32D1, "M", "イ"), - (0x32D2, "M", "ウ"), - (0x32D3, "M", "エ"), - (0x32D4, "M", "オ"), - (0x32D5, "M", "カ"), - (0x32D6, "M", "キ"), - (0x32D7, "M", "ク"), - (0x32D8, "M", "ケ"), - (0x32D9, "M", "コ"), - (0x32DA, "M", "サ"), - (0x32DB, "M", "シ"), - (0x32DC, "M", "ス"), - (0x32DD, "M", "セ"), - (0x32DE, "M", "ソ"), - (0x32DF, "M", "タ"), - (0x32E0, "M", "チ"), - (0x32E1, "M", "ツ"), - (0x32E2, "M", "テ"), - (0x32E3, "M", "ト"), - (0x32E4, "M", "ナ"), - (0x32E5, "M", "ニ"), - (0x32E6, "M", "ヌ"), - (0x32E7, "M", "ネ"), - (0x32E8, "M", "ノ"), - (0x32E9, "M", "ハ"), - (0x32EA, "M", "ヒ"), - (0x32EB, "M", "フ"), - (0x32EC, "M", "ヘ"), - (0x32ED, "M", "ホ"), - (0x32EE, "M", "マ"), - (0x32EF, "M", "ミ"), - (0x32F0, "M", "ム"), - (0x32F1, "M", "メ"), - (0x32F2, "M", "モ"), - (0x32F3, "M", "ヤ"), - (0x32F4, "M", "ユ"), - (0x32F5, "M", "ヨ"), - (0x32F6, "M", "ラ"), - (0x32F7, "M", "リ"), - (0x32F8, "M", "ル"), - (0x32F9, "M", "レ"), - (0x32FA, "M", "ロ"), - (0x32FB, "M", "ワ"), - (0x32FC, "M", "ヰ"), - (0x32FD, "M", "ヱ"), - (0x32FE, "M", "ヲ"), - (0x32FF, "M", "令和"), - (0x3300, "M", "アパート"), - (0x3301, "M", "アルファ"), - (0x3302, "M", "アンペア"), - (0x3303, "M", "アール"), - (0x3304, "M", "イニング"), - (0x3305, "M", "インチ"), - (0x3306, "M", "ウォン"), - (0x3307, "M", "エスクード"), - (0x3308, "M", "エーカー"), - (0x3309, "M", "オンス"), - (0x330A, "M", "オーム"), - (0x330B, "M", "カイリ"), - (0x330C, "M", "カラット"), - (0x330D, "M", "カロリー"), - (0x330E, "M", "ガロン"), - (0x330F, "M", "ガンマ"), - (0x3310, "M", "ギガ"), - (0x3311, "M", "ギニー"), - (0x3312, "M", "キュリー"), - (0x3313, "M", "ギルダー"), - (0x3314, "M", "キロ"), - (0x3315, "M", "キログラム"), - (0x3316, "M", "キロメートル"), - (0x3317, "M", "キロワット"), - (0x3318, "M", "グラム"), - (0x3319, "M", "グラムトン"), - ] - - -def _seg_33() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x331A, "M", "クルゼイロ"), - (0x331B, "M", "クローネ"), - (0x331C, "M", "ケース"), - (0x331D, "M", "コルナ"), - (0x331E, "M", "コーポ"), - (0x331F, "M", "サイクル"), - (0x3320, "M", "サンチーム"), - (0x3321, "M", "シリング"), - (0x3322, "M", "センチ"), - (0x3323, "M", "セント"), - (0x3324, "M", "ダース"), - (0x3325, "M", "デシ"), - (0x3326, "M", "ドル"), - (0x3327, "M", "トン"), - (0x3328, "M", "ナノ"), - (0x3329, "M", "ノット"), - (0x332A, "M", "ハイツ"), - (0x332B, "M", "パーセント"), - (0x332C, "M", "パーツ"), - (0x332D, "M", "バーレル"), - (0x332E, "M", "ピアストル"), - (0x332F, "M", "ピクル"), - (0x3330, "M", "ピコ"), - (0x3331, "M", "ビル"), - (0x3332, "M", "ファラッド"), - (0x3333, "M", "フィート"), - (0x3334, "M", "ブッシェル"), - (0x3335, "M", "フラン"), - (0x3336, "M", "ヘクタール"), - (0x3337, "M", "ペソ"), - (0x3338, "M", "ペニヒ"), - (0x3339, "M", "ヘルツ"), - (0x333A, "M", "ペンス"), - (0x333B, "M", "ページ"), - (0x333C, "M", "ベータ"), - (0x333D, "M", "ポイント"), - (0x333E, "M", "ボルト"), - (0x333F, "M", "ホン"), - (0x3340, "M", "ポンド"), - (0x3341, "M", "ホール"), - (0x3342, "M", "ホーン"), - (0x3343, "M", "マイクロ"), - (0x3344, "M", "マイル"), - (0x3345, "M", "マッハ"), - (0x3346, "M", "マルク"), - (0x3347, "M", "マンション"), - (0x3348, "M", "ミクロン"), - (0x3349, "M", "ミリ"), - (0x334A, "M", "ミリバール"), - (0x334B, "M", "メガ"), - (0x334C, "M", "メガトン"), - (0x334D, "M", "メートル"), - (0x334E, "M", "ヤード"), - (0x334F, "M", "ヤール"), - (0x3350, "M", "ユアン"), - (0x3351, "M", "リットル"), - (0x3352, "M", "リラ"), - (0x3353, "M", "ルピー"), - (0x3354, "M", "ルーブル"), - (0x3355, "M", "レム"), - (0x3356, "M", "レントゲン"), - (0x3357, "M", "ワット"), - (0x3358, "M", "0点"), - (0x3359, "M", "1点"), - (0x335A, "M", "2点"), - (0x335B, "M", "3点"), - (0x335C, "M", "4点"), - (0x335D, "M", "5点"), - (0x335E, "M", "6点"), - (0x335F, "M", "7点"), - (0x3360, "M", "8点"), - (0x3361, "M", "9点"), - (0x3362, "M", "10点"), - (0x3363, "M", "11点"), - (0x3364, "M", "12点"), - (0x3365, "M", "13点"), - (0x3366, "M", "14点"), - (0x3367, "M", "15点"), - (0x3368, "M", "16点"), - (0x3369, "M", "17点"), - (0x336A, "M", "18点"), - (0x336B, "M", "19点"), - (0x336C, "M", "20点"), - (0x336D, "M", "21点"), - (0x336E, "M", "22点"), - (0x336F, "M", "23点"), - (0x3370, "M", "24点"), - (0x3371, "M", "hpa"), - (0x3372, "M", "da"), - (0x3373, "M", "au"), - (0x3374, "M", "bar"), - (0x3375, "M", "ov"), - (0x3376, "M", "pc"), - (0x3377, "M", "dm"), - (0x3378, "M", "dm2"), - (0x3379, "M", "dm3"), - (0x337A, "M", "iu"), - (0x337B, "M", "平成"), - (0x337C, "M", "昭和"), - (0x337D, "M", "大正"), - ] - - -def _seg_34() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x337E, "M", "明治"), - (0x337F, "M", "株式会社"), - (0x3380, "M", "pa"), - (0x3381, "M", "na"), - (0x3382, "M", "μa"), - (0x3383, "M", "ma"), - (0x3384, "M", "ka"), - (0x3385, "M", "kb"), - (0x3386, "M", "mb"), - (0x3387, "M", "gb"), - (0x3388, "M", "cal"), - (0x3389, "M", "kcal"), - (0x338A, "M", "pf"), - (0x338B, "M", "nf"), - (0x338C, "M", "μf"), - (0x338D, "M", "μg"), - (0x338E, "M", "mg"), - (0x338F, "M", "kg"), - (0x3390, "M", "hz"), - (0x3391, "M", "khz"), - (0x3392, "M", "mhz"), - (0x3393, "M", "ghz"), - (0x3394, "M", "thz"), - (0x3395, "M", "μl"), - (0x3396, "M", "ml"), - (0x3397, "M", "dl"), - (0x3398, "M", "kl"), - (0x3399, "M", "fm"), - (0x339A, "M", "nm"), - (0x339B, "M", "μm"), - (0x339C, "M", "mm"), - (0x339D, "M", "cm"), - (0x339E, "M", "km"), - (0x339F, "M", "mm2"), - (0x33A0, "M", "cm2"), - (0x33A1, "M", "m2"), - (0x33A2, "M", "km2"), - (0x33A3, "M", "mm3"), - (0x33A4, "M", "cm3"), - (0x33A5, "M", "m3"), - (0x33A6, "M", "km3"), - (0x33A7, "M", "m∕s"), - (0x33A8, "M", "m∕s2"), - (0x33A9, "M", "pa"), - (0x33AA, "M", "kpa"), - (0x33AB, "M", "mpa"), - (0x33AC, "M", "gpa"), - (0x33AD, "M", "rad"), - (0x33AE, "M", "rad∕s"), - (0x33AF, "M", "rad∕s2"), - (0x33B0, "M", "ps"), - (0x33B1, "M", "ns"), - (0x33B2, "M", "μs"), - (0x33B3, "M", "ms"), - (0x33B4, "M", "pv"), - (0x33B5, "M", "nv"), - (0x33B6, "M", "μv"), - (0x33B7, "M", "mv"), - (0x33B8, "M", "kv"), - (0x33B9, "M", "mv"), - (0x33BA, "M", "pw"), - (0x33BB, "M", "nw"), - (0x33BC, "M", "μw"), - (0x33BD, "M", "mw"), - (0x33BE, "M", "kw"), - (0x33BF, "M", "mw"), - (0x33C0, "M", "kω"), - (0x33C1, "M", "mω"), - (0x33C2, "X"), - (0x33C3, "M", "bq"), - (0x33C4, "M", "cc"), - (0x33C5, "M", "cd"), - (0x33C6, "M", "c∕kg"), - (0x33C7, "X"), - (0x33C8, "M", "db"), - (0x33C9, "M", "gy"), - (0x33CA, "M", "ha"), - (0x33CB, "M", "hp"), - (0x33CC, "M", "in"), - (0x33CD, "M", "kk"), - (0x33CE, "M", "km"), - (0x33CF, "M", "kt"), - (0x33D0, "M", "lm"), - (0x33D1, "M", "ln"), - (0x33D2, "M", "log"), - (0x33D3, "M", "lx"), - (0x33D4, "M", "mb"), - (0x33D5, "M", "mil"), - (0x33D6, "M", "mol"), - (0x33D7, "M", "ph"), - (0x33D8, "X"), - (0x33D9, "M", "ppm"), - (0x33DA, "M", "pr"), - (0x33DB, "M", "sr"), - (0x33DC, "M", "sv"), - (0x33DD, "M", "wb"), - (0x33DE, "M", "v∕m"), - (0x33DF, "M", "a∕m"), - (0x33E0, "M", "1日"), - (0x33E1, "M", "2日"), - ] - - -def _seg_35() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x33E2, "M", "3日"), - (0x33E3, "M", "4日"), - (0x33E4, "M", "5日"), - (0x33E5, "M", "6日"), - (0x33E6, "M", "7日"), - (0x33E7, "M", "8日"), - (0x33E8, "M", "9日"), - (0x33E9, "M", "10日"), - (0x33EA, "M", "11日"), - (0x33EB, "M", "12日"), - (0x33EC, "M", "13日"), - (0x33ED, "M", "14日"), - (0x33EE, "M", "15日"), - (0x33EF, "M", "16日"), - (0x33F0, "M", "17日"), - (0x33F1, "M", "18日"), - (0x33F2, "M", "19日"), - (0x33F3, "M", "20日"), - (0x33F4, "M", "21日"), - (0x33F5, "M", "22日"), - (0x33F6, "M", "23日"), - (0x33F7, "M", "24日"), - (0x33F8, "M", "25日"), - (0x33F9, "M", "26日"), - (0x33FA, "M", "27日"), - (0x33FB, "M", "28日"), - (0x33FC, "M", "29日"), - (0x33FD, "M", "30日"), - (0x33FE, "M", "31日"), - (0x33FF, "M", "gal"), - (0x3400, "V"), - (0xA48D, "X"), - (0xA490, "V"), - (0xA4C7, "X"), - (0xA4D0, "V"), - (0xA62C, "X"), - (0xA640, "M", "ꙁ"), - (0xA641, "V"), - (0xA642, "M", "ꙃ"), - (0xA643, "V"), - (0xA644, "M", "ꙅ"), - (0xA645, "V"), - (0xA646, "M", "ꙇ"), - (0xA647, "V"), - (0xA648, "M", "ꙉ"), - (0xA649, "V"), - (0xA64A, "M", "ꙋ"), - (0xA64B, "V"), - (0xA64C, "M", "ꙍ"), - (0xA64D, "V"), - (0xA64E, "M", "ꙏ"), - (0xA64F, "V"), - (0xA650, "M", "ꙑ"), - (0xA651, "V"), - (0xA652, "M", "ꙓ"), - (0xA653, "V"), - (0xA654, "M", "ꙕ"), - (0xA655, "V"), - (0xA656, "M", "ꙗ"), - (0xA657, "V"), - (0xA658, "M", "ꙙ"), - (0xA659, "V"), - (0xA65A, "M", "ꙛ"), - (0xA65B, "V"), - (0xA65C, "M", "ꙝ"), - (0xA65D, "V"), - (0xA65E, "M", "ꙟ"), - (0xA65F, "V"), - (0xA660, "M", "ꙡ"), - (0xA661, "V"), - (0xA662, "M", "ꙣ"), - (0xA663, "V"), - (0xA664, "M", "ꙥ"), - (0xA665, "V"), - (0xA666, "M", "ꙧ"), - (0xA667, "V"), - (0xA668, "M", "ꙩ"), - (0xA669, "V"), - (0xA66A, "M", "ꙫ"), - (0xA66B, "V"), - (0xA66C, "M", "ꙭ"), - (0xA66D, "V"), - (0xA680, "M", "ꚁ"), - (0xA681, "V"), - (0xA682, "M", "ꚃ"), - (0xA683, "V"), - (0xA684, "M", "ꚅ"), - (0xA685, "V"), - (0xA686, "M", "ꚇ"), - (0xA687, "V"), - (0xA688, "M", "ꚉ"), - (0xA689, "V"), - (0xA68A, "M", "ꚋ"), - (0xA68B, "V"), - (0xA68C, "M", "ꚍ"), - (0xA68D, "V"), - (0xA68E, "M", "ꚏ"), - (0xA68F, "V"), - (0xA690, "M", "ꚑ"), - (0xA691, "V"), - ] - - -def _seg_36() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xA692, "M", "ꚓ"), - (0xA693, "V"), - (0xA694, "M", "ꚕ"), - (0xA695, "V"), - (0xA696, "M", "ꚗ"), - (0xA697, "V"), - (0xA698, "M", "ꚙ"), - (0xA699, "V"), - (0xA69A, "M", "ꚛ"), - (0xA69B, "V"), - (0xA69C, "M", "ъ"), - (0xA69D, "M", "ь"), - (0xA69E, "V"), - (0xA6F8, "X"), - (0xA700, "V"), - (0xA722, "M", "ꜣ"), - (0xA723, "V"), - (0xA724, "M", "ꜥ"), - (0xA725, "V"), - (0xA726, "M", "ꜧ"), - (0xA727, "V"), - (0xA728, "M", "ꜩ"), - (0xA729, "V"), - (0xA72A, "M", "ꜫ"), - (0xA72B, "V"), - (0xA72C, "M", "ꜭ"), - (0xA72D, "V"), - (0xA72E, "M", "ꜯ"), - (0xA72F, "V"), - (0xA732, "M", "ꜳ"), - (0xA733, "V"), - (0xA734, "M", "ꜵ"), - (0xA735, "V"), - (0xA736, "M", "ꜷ"), - (0xA737, "V"), - (0xA738, "M", "ꜹ"), - (0xA739, "V"), - (0xA73A, "M", "ꜻ"), - (0xA73B, "V"), - (0xA73C, "M", "ꜽ"), - (0xA73D, "V"), - (0xA73E, "M", "ꜿ"), - (0xA73F, "V"), - (0xA740, "M", "ꝁ"), - (0xA741, "V"), - (0xA742, "M", "ꝃ"), - (0xA743, "V"), - (0xA744, "M", "ꝅ"), - (0xA745, "V"), - (0xA746, "M", "ꝇ"), - (0xA747, "V"), - (0xA748, "M", "ꝉ"), - (0xA749, "V"), - (0xA74A, "M", "ꝋ"), - (0xA74B, "V"), - (0xA74C, "M", "ꝍ"), - (0xA74D, "V"), - (0xA74E, "M", "ꝏ"), - (0xA74F, "V"), - (0xA750, "M", "ꝑ"), - (0xA751, "V"), - (0xA752, "M", "ꝓ"), - (0xA753, "V"), - (0xA754, "M", "ꝕ"), - (0xA755, "V"), - (0xA756, "M", "ꝗ"), - (0xA757, "V"), - (0xA758, "M", "ꝙ"), - (0xA759, "V"), - (0xA75A, "M", "ꝛ"), - (0xA75B, "V"), - (0xA75C, "M", "ꝝ"), - (0xA75D, "V"), - (0xA75E, "M", "ꝟ"), - (0xA75F, "V"), - (0xA760, "M", "ꝡ"), - (0xA761, "V"), - (0xA762, "M", "ꝣ"), - (0xA763, "V"), - (0xA764, "M", "ꝥ"), - (0xA765, "V"), - (0xA766, "M", "ꝧ"), - (0xA767, "V"), - (0xA768, "M", "ꝩ"), - (0xA769, "V"), - (0xA76A, "M", "ꝫ"), - (0xA76B, "V"), - (0xA76C, "M", "ꝭ"), - (0xA76D, "V"), - (0xA76E, "M", "ꝯ"), - (0xA76F, "V"), - (0xA770, "M", "ꝯ"), - (0xA771, "V"), - (0xA779, "M", "ꝺ"), - (0xA77A, "V"), - (0xA77B, "M", "ꝼ"), - (0xA77C, "V"), - (0xA77D, "M", "ᵹ"), - (0xA77E, "M", "ꝿ"), - (0xA77F, "V"), - ] - - -def _seg_37() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xA780, "M", "ꞁ"), - (0xA781, "V"), - (0xA782, "M", "ꞃ"), - (0xA783, "V"), - (0xA784, "M", "ꞅ"), - (0xA785, "V"), - (0xA786, "M", "ꞇ"), - (0xA787, "V"), - (0xA78B, "M", "ꞌ"), - (0xA78C, "V"), - (0xA78D, "M", "ɥ"), - (0xA78E, "V"), - (0xA790, "M", "ꞑ"), - (0xA791, "V"), - (0xA792, "M", "ꞓ"), - (0xA793, "V"), - (0xA796, "M", "ꞗ"), - (0xA797, "V"), - (0xA798, "M", "ꞙ"), - (0xA799, "V"), - (0xA79A, "M", "ꞛ"), - (0xA79B, "V"), - (0xA79C, "M", "ꞝ"), - (0xA79D, "V"), - (0xA79E, "M", "ꞟ"), - (0xA79F, "V"), - (0xA7A0, "M", "ꞡ"), - (0xA7A1, "V"), - (0xA7A2, "M", "ꞣ"), - (0xA7A3, "V"), - (0xA7A4, "M", "ꞥ"), - (0xA7A5, "V"), - (0xA7A6, "M", "ꞧ"), - (0xA7A7, "V"), - (0xA7A8, "M", "ꞩ"), - (0xA7A9, "V"), - (0xA7AA, "M", "ɦ"), - (0xA7AB, "M", "ɜ"), - (0xA7AC, "M", "ɡ"), - (0xA7AD, "M", "ɬ"), - (0xA7AE, "M", "ɪ"), - (0xA7AF, "V"), - (0xA7B0, "M", "ʞ"), - (0xA7B1, "M", "ʇ"), - (0xA7B2, "M", "ʝ"), - (0xA7B3, "M", "ꭓ"), - (0xA7B4, "M", "ꞵ"), - (0xA7B5, "V"), - (0xA7B6, "M", "ꞷ"), - (0xA7B7, "V"), - (0xA7B8, "M", "ꞹ"), - (0xA7B9, "V"), - (0xA7BA, "M", "ꞻ"), - (0xA7BB, "V"), - (0xA7BC, "M", "ꞽ"), - (0xA7BD, "V"), - (0xA7BE, "M", "ꞿ"), - (0xA7BF, "V"), - (0xA7C0, "M", "ꟁ"), - (0xA7C1, "V"), - (0xA7C2, "M", "ꟃ"), - (0xA7C3, "V"), - (0xA7C4, "M", "ꞔ"), - (0xA7C5, "M", "ʂ"), - (0xA7C6, "M", "ᶎ"), - (0xA7C7, "M", "ꟈ"), - (0xA7C8, "V"), - (0xA7C9, "M", "ꟊ"), - (0xA7CA, "V"), - (0xA7CB, "X"), - (0xA7D0, "M", "ꟑ"), - (0xA7D1, "V"), - (0xA7D2, "X"), - (0xA7D3, "V"), - (0xA7D4, "X"), - (0xA7D5, "V"), - (0xA7D6, "M", "ꟗ"), - (0xA7D7, "V"), - (0xA7D8, "M", "ꟙ"), - (0xA7D9, "V"), - (0xA7DA, "X"), - (0xA7F2, "M", "c"), - (0xA7F3, "M", "f"), - (0xA7F4, "M", "q"), - (0xA7F5, "M", "ꟶ"), - (0xA7F6, "V"), - (0xA7F8, "M", "ħ"), - (0xA7F9, "M", "œ"), - (0xA7FA, "V"), - (0xA82D, "X"), - (0xA830, "V"), - (0xA83A, "X"), - (0xA840, "V"), - (0xA878, "X"), - (0xA880, "V"), - (0xA8C6, "X"), - (0xA8CE, "V"), - (0xA8DA, "X"), - (0xA8E0, "V"), - (0xA954, "X"), - ] - - -def _seg_38() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xA95F, "V"), - (0xA97D, "X"), - (0xA980, "V"), - (0xA9CE, "X"), - (0xA9CF, "V"), - (0xA9DA, "X"), - (0xA9DE, "V"), - (0xA9FF, "X"), - (0xAA00, "V"), - (0xAA37, "X"), - (0xAA40, "V"), - (0xAA4E, "X"), - (0xAA50, "V"), - (0xAA5A, "X"), - (0xAA5C, "V"), - (0xAAC3, "X"), - (0xAADB, "V"), - (0xAAF7, "X"), - (0xAB01, "V"), - (0xAB07, "X"), - (0xAB09, "V"), - (0xAB0F, "X"), - (0xAB11, "V"), - (0xAB17, "X"), - (0xAB20, "V"), - (0xAB27, "X"), - (0xAB28, "V"), - (0xAB2F, "X"), - (0xAB30, "V"), - (0xAB5C, "M", "ꜧ"), - (0xAB5D, "M", "ꬷ"), - (0xAB5E, "M", "ɫ"), - (0xAB5F, "M", "ꭒ"), - (0xAB60, "V"), - (0xAB69, "M", "ʍ"), - (0xAB6A, "V"), - (0xAB6C, "X"), - (0xAB70, "M", "Ꭰ"), - (0xAB71, "M", "Ꭱ"), - (0xAB72, "M", "Ꭲ"), - (0xAB73, "M", "Ꭳ"), - (0xAB74, "M", "Ꭴ"), - (0xAB75, "M", "Ꭵ"), - (0xAB76, "M", "Ꭶ"), - (0xAB77, "M", "Ꭷ"), - (0xAB78, "M", "Ꭸ"), - (0xAB79, "M", "Ꭹ"), - (0xAB7A, "M", "Ꭺ"), - (0xAB7B, "M", "Ꭻ"), - (0xAB7C, "M", "Ꭼ"), - (0xAB7D, "M", "Ꭽ"), - (0xAB7E, "M", "Ꭾ"), - (0xAB7F, "M", "Ꭿ"), - (0xAB80, "M", "Ꮀ"), - (0xAB81, "M", "Ꮁ"), - (0xAB82, "M", "Ꮂ"), - (0xAB83, "M", "Ꮃ"), - (0xAB84, "M", "Ꮄ"), - (0xAB85, "M", "Ꮅ"), - (0xAB86, "M", "Ꮆ"), - (0xAB87, "M", "Ꮇ"), - (0xAB88, "M", "Ꮈ"), - (0xAB89, "M", "Ꮉ"), - (0xAB8A, "M", "Ꮊ"), - (0xAB8B, "M", "Ꮋ"), - (0xAB8C, "M", "Ꮌ"), - (0xAB8D, "M", "Ꮍ"), - (0xAB8E, "M", "Ꮎ"), - (0xAB8F, "M", "Ꮏ"), - (0xAB90, "M", "Ꮐ"), - (0xAB91, "M", "Ꮑ"), - (0xAB92, "M", "Ꮒ"), - (0xAB93, "M", "Ꮓ"), - (0xAB94, "M", "Ꮔ"), - (0xAB95, "M", "Ꮕ"), - (0xAB96, "M", "Ꮖ"), - (0xAB97, "M", "Ꮗ"), - (0xAB98, "M", "Ꮘ"), - (0xAB99, "M", "Ꮙ"), - (0xAB9A, "M", "Ꮚ"), - (0xAB9B, "M", "Ꮛ"), - (0xAB9C, "M", "Ꮜ"), - (0xAB9D, "M", "Ꮝ"), - (0xAB9E, "M", "Ꮞ"), - (0xAB9F, "M", "Ꮟ"), - (0xABA0, "M", "Ꮠ"), - (0xABA1, "M", "Ꮡ"), - (0xABA2, "M", "Ꮢ"), - (0xABA3, "M", "Ꮣ"), - (0xABA4, "M", "Ꮤ"), - (0xABA5, "M", "Ꮥ"), - (0xABA6, "M", "Ꮦ"), - (0xABA7, "M", "Ꮧ"), - (0xABA8, "M", "Ꮨ"), - (0xABA9, "M", "Ꮩ"), - (0xABAA, "M", "Ꮪ"), - (0xABAB, "M", "Ꮫ"), - (0xABAC, "M", "Ꮬ"), - (0xABAD, "M", "Ꮭ"), - (0xABAE, "M", "Ꮮ"), - ] - - -def _seg_39() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xABAF, "M", "Ꮯ"), - (0xABB0, "M", "Ꮰ"), - (0xABB1, "M", "Ꮱ"), - (0xABB2, "M", "Ꮲ"), - (0xABB3, "M", "Ꮳ"), - (0xABB4, "M", "Ꮴ"), - (0xABB5, "M", "Ꮵ"), - (0xABB6, "M", "Ꮶ"), - (0xABB7, "M", "Ꮷ"), - (0xABB8, "M", "Ꮸ"), - (0xABB9, "M", "Ꮹ"), - (0xABBA, "M", "Ꮺ"), - (0xABBB, "M", "Ꮻ"), - (0xABBC, "M", "Ꮼ"), - (0xABBD, "M", "Ꮽ"), - (0xABBE, "M", "Ꮾ"), - (0xABBF, "M", "Ꮿ"), - (0xABC0, "V"), - (0xABEE, "X"), - (0xABF0, "V"), - (0xABFA, "X"), - (0xAC00, "V"), - (0xD7A4, "X"), - (0xD7B0, "V"), - (0xD7C7, "X"), - (0xD7CB, "V"), - (0xD7FC, "X"), - (0xF900, "M", "豈"), - (0xF901, "M", "更"), - (0xF902, "M", "車"), - (0xF903, "M", "賈"), - (0xF904, "M", "滑"), - (0xF905, "M", "串"), - (0xF906, "M", "句"), - (0xF907, "M", "龜"), - (0xF909, "M", "契"), - (0xF90A, "M", "金"), - (0xF90B, "M", "喇"), - (0xF90C, "M", "奈"), - (0xF90D, "M", "懶"), - (0xF90E, "M", "癩"), - (0xF90F, "M", "羅"), - (0xF910, "M", "蘿"), - (0xF911, "M", "螺"), - (0xF912, "M", "裸"), - (0xF913, "M", "邏"), - (0xF914, "M", "樂"), - (0xF915, "M", "洛"), - (0xF916, "M", "烙"), - (0xF917, "M", "珞"), - (0xF918, "M", "落"), - (0xF919, "M", "酪"), - (0xF91A, "M", "駱"), - (0xF91B, "M", "亂"), - (0xF91C, "M", "卵"), - (0xF91D, "M", "欄"), - (0xF91E, "M", "爛"), - (0xF91F, "M", "蘭"), - (0xF920, "M", "鸞"), - (0xF921, "M", "嵐"), - (0xF922, "M", "濫"), - (0xF923, "M", "藍"), - (0xF924, "M", "襤"), - (0xF925, "M", "拉"), - (0xF926, "M", "臘"), - (0xF927, "M", "蠟"), - (0xF928, "M", "廊"), - (0xF929, "M", "朗"), - (0xF92A, "M", "浪"), - (0xF92B, "M", "狼"), - (0xF92C, "M", "郎"), - (0xF92D, "M", "來"), - (0xF92E, "M", "冷"), - (0xF92F, "M", "勞"), - (0xF930, "M", "擄"), - (0xF931, "M", "櫓"), - (0xF932, "M", "爐"), - (0xF933, "M", "盧"), - (0xF934, "M", "老"), - (0xF935, "M", "蘆"), - (0xF936, "M", "虜"), - (0xF937, "M", "路"), - (0xF938, "M", "露"), - (0xF939, "M", "魯"), - (0xF93A, "M", "鷺"), - (0xF93B, "M", "碌"), - (0xF93C, "M", "祿"), - (0xF93D, "M", "綠"), - (0xF93E, "M", "菉"), - (0xF93F, "M", "錄"), - (0xF940, "M", "鹿"), - (0xF941, "M", "論"), - (0xF942, "M", "壟"), - (0xF943, "M", "弄"), - (0xF944, "M", "籠"), - (0xF945, "M", "聾"), - (0xF946, "M", "牢"), - (0xF947, "M", "磊"), - (0xF948, "M", "賂"), - (0xF949, "M", "雷"), - ] - - -def _seg_40() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xF94A, "M", "壘"), - (0xF94B, "M", "屢"), - (0xF94C, "M", "樓"), - (0xF94D, "M", "淚"), - (0xF94E, "M", "漏"), - (0xF94F, "M", "累"), - (0xF950, "M", "縷"), - (0xF951, "M", "陋"), - (0xF952, "M", "勒"), - (0xF953, "M", "肋"), - (0xF954, "M", "凜"), - (0xF955, "M", "凌"), - (0xF956, "M", "稜"), - (0xF957, "M", "綾"), - (0xF958, "M", "菱"), - (0xF959, "M", "陵"), - (0xF95A, "M", "讀"), - (0xF95B, "M", "拏"), - (0xF95C, "M", "樂"), - (0xF95D, "M", "諾"), - (0xF95E, "M", "丹"), - (0xF95F, "M", "寧"), - (0xF960, "M", "怒"), - (0xF961, "M", "率"), - (0xF962, "M", "異"), - (0xF963, "M", "北"), - (0xF964, "M", "磻"), - (0xF965, "M", "便"), - (0xF966, "M", "復"), - (0xF967, "M", "不"), - (0xF968, "M", "泌"), - (0xF969, "M", "數"), - (0xF96A, "M", "索"), - (0xF96B, "M", "參"), - (0xF96C, "M", "塞"), - (0xF96D, "M", "省"), - (0xF96E, "M", "葉"), - (0xF96F, "M", "說"), - (0xF970, "M", "殺"), - (0xF971, "M", "辰"), - (0xF972, "M", "沈"), - (0xF973, "M", "拾"), - (0xF974, "M", "若"), - (0xF975, "M", "掠"), - (0xF976, "M", "略"), - (0xF977, "M", "亮"), - (0xF978, "M", "兩"), - (0xF979, "M", "凉"), - (0xF97A, "M", "梁"), - (0xF97B, "M", "糧"), - (0xF97C, "M", "良"), - (0xF97D, "M", "諒"), - (0xF97E, "M", "量"), - (0xF97F, "M", "勵"), - (0xF980, "M", "呂"), - (0xF981, "M", "女"), - (0xF982, "M", "廬"), - (0xF983, "M", "旅"), - (0xF984, "M", "濾"), - (0xF985, "M", "礪"), - (0xF986, "M", "閭"), - (0xF987, "M", "驪"), - (0xF988, "M", "麗"), - (0xF989, "M", "黎"), - (0xF98A, "M", "力"), - (0xF98B, "M", "曆"), - (0xF98C, "M", "歷"), - (0xF98D, "M", "轢"), - (0xF98E, "M", "年"), - (0xF98F, "M", "憐"), - (0xF990, "M", "戀"), - (0xF991, "M", "撚"), - (0xF992, "M", "漣"), - (0xF993, "M", "煉"), - (0xF994, "M", "璉"), - (0xF995, "M", "秊"), - (0xF996, "M", "練"), - (0xF997, "M", "聯"), - (0xF998, "M", "輦"), - (0xF999, "M", "蓮"), - (0xF99A, "M", "連"), - (0xF99B, "M", "鍊"), - (0xF99C, "M", "列"), - (0xF99D, "M", "劣"), - (0xF99E, "M", "咽"), - (0xF99F, "M", "烈"), - (0xF9A0, "M", "裂"), - (0xF9A1, "M", "說"), - (0xF9A2, "M", "廉"), - (0xF9A3, "M", "念"), - (0xF9A4, "M", "捻"), - (0xF9A5, "M", "殮"), - (0xF9A6, "M", "簾"), - (0xF9A7, "M", "獵"), - (0xF9A8, "M", "令"), - (0xF9A9, "M", "囹"), - (0xF9AA, "M", "寧"), - (0xF9AB, "M", "嶺"), - (0xF9AC, "M", "怜"), - (0xF9AD, "M", "玲"), - ] - - -def _seg_41() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xF9AE, "M", "瑩"), - (0xF9AF, "M", "羚"), - (0xF9B0, "M", "聆"), - (0xF9B1, "M", "鈴"), - (0xF9B2, "M", "零"), - (0xF9B3, "M", "靈"), - (0xF9B4, "M", "領"), - (0xF9B5, "M", "例"), - (0xF9B6, "M", "禮"), - (0xF9B7, "M", "醴"), - (0xF9B8, "M", "隸"), - (0xF9B9, "M", "惡"), - (0xF9BA, "M", "了"), - (0xF9BB, "M", "僚"), - (0xF9BC, "M", "寮"), - (0xF9BD, "M", "尿"), - (0xF9BE, "M", "料"), - (0xF9BF, "M", "樂"), - (0xF9C0, "M", "燎"), - (0xF9C1, "M", "療"), - (0xF9C2, "M", "蓼"), - (0xF9C3, "M", "遼"), - (0xF9C4, "M", "龍"), - (0xF9C5, "M", "暈"), - (0xF9C6, "M", "阮"), - (0xF9C7, "M", "劉"), - (0xF9C8, "M", "杻"), - (0xF9C9, "M", "柳"), - (0xF9CA, "M", "流"), - (0xF9CB, "M", "溜"), - (0xF9CC, "M", "琉"), - (0xF9CD, "M", "留"), - (0xF9CE, "M", "硫"), - (0xF9CF, "M", "紐"), - (0xF9D0, "M", "類"), - (0xF9D1, "M", "六"), - (0xF9D2, "M", "戮"), - (0xF9D3, "M", "陸"), - (0xF9D4, "M", "倫"), - (0xF9D5, "M", "崙"), - (0xF9D6, "M", "淪"), - (0xF9D7, "M", "輪"), - (0xF9D8, "M", "律"), - (0xF9D9, "M", "慄"), - (0xF9DA, "M", "栗"), - (0xF9DB, "M", "率"), - (0xF9DC, "M", "隆"), - (0xF9DD, "M", "利"), - (0xF9DE, "M", "吏"), - (0xF9DF, "M", "履"), - (0xF9E0, "M", "易"), - (0xF9E1, "M", "李"), - (0xF9E2, "M", "梨"), - (0xF9E3, "M", "泥"), - (0xF9E4, "M", "理"), - (0xF9E5, "M", "痢"), - (0xF9E6, "M", "罹"), - (0xF9E7, "M", "裏"), - (0xF9E8, "M", "裡"), - (0xF9E9, "M", "里"), - (0xF9EA, "M", "離"), - (0xF9EB, "M", "匿"), - (0xF9EC, "M", "溺"), - (0xF9ED, "M", "吝"), - (0xF9EE, "M", "燐"), - (0xF9EF, "M", "璘"), - (0xF9F0, "M", "藺"), - (0xF9F1, "M", "隣"), - (0xF9F2, "M", "鱗"), - (0xF9F3, "M", "麟"), - (0xF9F4, "M", "林"), - (0xF9F5, "M", "淋"), - (0xF9F6, "M", "臨"), - (0xF9F7, "M", "立"), - (0xF9F8, "M", "笠"), - (0xF9F9, "M", "粒"), - (0xF9FA, "M", "狀"), - (0xF9FB, "M", "炙"), - (0xF9FC, "M", "識"), - (0xF9FD, "M", "什"), - (0xF9FE, "M", "茶"), - (0xF9FF, "M", "刺"), - (0xFA00, "M", "切"), - (0xFA01, "M", "度"), - (0xFA02, "M", "拓"), - (0xFA03, "M", "糖"), - (0xFA04, "M", "宅"), - (0xFA05, "M", "洞"), - (0xFA06, "M", "暴"), - (0xFA07, "M", "輻"), - (0xFA08, "M", "行"), - (0xFA09, "M", "降"), - (0xFA0A, "M", "見"), - (0xFA0B, "M", "廓"), - (0xFA0C, "M", "兀"), - (0xFA0D, "M", "嗀"), - (0xFA0E, "V"), - (0xFA10, "M", "塚"), - (0xFA11, "V"), - (0xFA12, "M", "晴"), - ] - - -def _seg_42() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFA13, "V"), - (0xFA15, "M", "凞"), - (0xFA16, "M", "猪"), - (0xFA17, "M", "益"), - (0xFA18, "M", "礼"), - (0xFA19, "M", "神"), - (0xFA1A, "M", "祥"), - (0xFA1B, "M", "福"), - (0xFA1C, "M", "靖"), - (0xFA1D, "M", "精"), - (0xFA1E, "M", "羽"), - (0xFA1F, "V"), - (0xFA20, "M", "蘒"), - (0xFA21, "V"), - (0xFA22, "M", "諸"), - (0xFA23, "V"), - (0xFA25, "M", "逸"), - (0xFA26, "M", "都"), - (0xFA27, "V"), - (0xFA2A, "M", "飯"), - (0xFA2B, "M", "飼"), - (0xFA2C, "M", "館"), - (0xFA2D, "M", "鶴"), - (0xFA2E, "M", "郞"), - (0xFA2F, "M", "隷"), - (0xFA30, "M", "侮"), - (0xFA31, "M", "僧"), - (0xFA32, "M", "免"), - (0xFA33, "M", "勉"), - (0xFA34, "M", "勤"), - (0xFA35, "M", "卑"), - (0xFA36, "M", "喝"), - (0xFA37, "M", "嘆"), - (0xFA38, "M", "器"), - (0xFA39, "M", "塀"), - (0xFA3A, "M", "墨"), - (0xFA3B, "M", "層"), - (0xFA3C, "M", "屮"), - (0xFA3D, "M", "悔"), - (0xFA3E, "M", "慨"), - (0xFA3F, "M", "憎"), - (0xFA40, "M", "懲"), - (0xFA41, "M", "敏"), - (0xFA42, "M", "既"), - (0xFA43, "M", "暑"), - (0xFA44, "M", "梅"), - (0xFA45, "M", "海"), - (0xFA46, "M", "渚"), - (0xFA47, "M", "漢"), - (0xFA48, "M", "煮"), - (0xFA49, "M", "爫"), - (0xFA4A, "M", "琢"), - (0xFA4B, "M", "碑"), - (0xFA4C, "M", "社"), - (0xFA4D, "M", "祉"), - (0xFA4E, "M", "祈"), - (0xFA4F, "M", "祐"), - (0xFA50, "M", "祖"), - (0xFA51, "M", "祝"), - (0xFA52, "M", "禍"), - (0xFA53, "M", "禎"), - (0xFA54, "M", "穀"), - (0xFA55, "M", "突"), - (0xFA56, "M", "節"), - (0xFA57, "M", "練"), - (0xFA58, "M", "縉"), - (0xFA59, "M", "繁"), - (0xFA5A, "M", "署"), - (0xFA5B, "M", "者"), - (0xFA5C, "M", "臭"), - (0xFA5D, "M", "艹"), - (0xFA5F, "M", "著"), - (0xFA60, "M", "褐"), - (0xFA61, "M", "視"), - (0xFA62, "M", "謁"), - (0xFA63, "M", "謹"), - (0xFA64, "M", "賓"), - (0xFA65, "M", "贈"), - (0xFA66, "M", "辶"), - (0xFA67, "M", "逸"), - (0xFA68, "M", "難"), - (0xFA69, "M", "響"), - (0xFA6A, "M", "頻"), - (0xFA6B, "M", "恵"), - (0xFA6C, "M", "𤋮"), - (0xFA6D, "M", "舘"), - (0xFA6E, "X"), - (0xFA70, "M", "並"), - (0xFA71, "M", "况"), - (0xFA72, "M", "全"), - (0xFA73, "M", "侀"), - (0xFA74, "M", "充"), - (0xFA75, "M", "冀"), - (0xFA76, "M", "勇"), - (0xFA77, "M", "勺"), - (0xFA78, "M", "喝"), - (0xFA79, "M", "啕"), - (0xFA7A, "M", "喙"), - (0xFA7B, "M", "嗢"), - (0xFA7C, "M", "塚"), - ] - - -def _seg_43() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFA7D, "M", "墳"), - (0xFA7E, "M", "奄"), - (0xFA7F, "M", "奔"), - (0xFA80, "M", "婢"), - (0xFA81, "M", "嬨"), - (0xFA82, "M", "廒"), - (0xFA83, "M", "廙"), - (0xFA84, "M", "彩"), - (0xFA85, "M", "徭"), - (0xFA86, "M", "惘"), - (0xFA87, "M", "慎"), - (0xFA88, "M", "愈"), - (0xFA89, "M", "憎"), - (0xFA8A, "M", "慠"), - (0xFA8B, "M", "懲"), - (0xFA8C, "M", "戴"), - (0xFA8D, "M", "揄"), - (0xFA8E, "M", "搜"), - (0xFA8F, "M", "摒"), - (0xFA90, "M", "敖"), - (0xFA91, "M", "晴"), - (0xFA92, "M", "朗"), - (0xFA93, "M", "望"), - (0xFA94, "M", "杖"), - (0xFA95, "M", "歹"), - (0xFA96, "M", "殺"), - (0xFA97, "M", "流"), - (0xFA98, "M", "滛"), - (0xFA99, "M", "滋"), - (0xFA9A, "M", "漢"), - (0xFA9B, "M", "瀞"), - (0xFA9C, "M", "煮"), - (0xFA9D, "M", "瞧"), - (0xFA9E, "M", "爵"), - (0xFA9F, "M", "犯"), - (0xFAA0, "M", "猪"), - (0xFAA1, "M", "瑱"), - (0xFAA2, "M", "甆"), - (0xFAA3, "M", "画"), - (0xFAA4, "M", "瘝"), - (0xFAA5, "M", "瘟"), - (0xFAA6, "M", "益"), - (0xFAA7, "M", "盛"), - (0xFAA8, "M", "直"), - (0xFAA9, "M", "睊"), - (0xFAAA, "M", "着"), - (0xFAAB, "M", "磌"), - (0xFAAC, "M", "窱"), - (0xFAAD, "M", "節"), - (0xFAAE, "M", "类"), - (0xFAAF, "M", "絛"), - (0xFAB0, "M", "練"), - (0xFAB1, "M", "缾"), - (0xFAB2, "M", "者"), - (0xFAB3, "M", "荒"), - (0xFAB4, "M", "華"), - (0xFAB5, "M", "蝹"), - (0xFAB6, "M", "襁"), - (0xFAB7, "M", "覆"), - (0xFAB8, "M", "視"), - (0xFAB9, "M", "調"), - (0xFABA, "M", "諸"), - (0xFABB, "M", "請"), - (0xFABC, "M", "謁"), - (0xFABD, "M", "諾"), - (0xFABE, "M", "諭"), - (0xFABF, "M", "謹"), - (0xFAC0, "M", "變"), - (0xFAC1, "M", "贈"), - (0xFAC2, "M", "輸"), - (0xFAC3, "M", "遲"), - (0xFAC4, "M", "醙"), - (0xFAC5, "M", "鉶"), - (0xFAC6, "M", "陼"), - (0xFAC7, "M", "難"), - (0xFAC8, "M", "靖"), - (0xFAC9, "M", "韛"), - (0xFACA, "M", "響"), - (0xFACB, "M", "頋"), - (0xFACC, "M", "頻"), - (0xFACD, "M", "鬒"), - (0xFACE, "M", "龜"), - (0xFACF, "M", "𢡊"), - (0xFAD0, "M", "𢡄"), - (0xFAD1, "M", "𣏕"), - (0xFAD2, "M", "㮝"), - (0xFAD3, "M", "䀘"), - (0xFAD4, "M", "䀹"), - (0xFAD5, "M", "𥉉"), - (0xFAD6, "M", "𥳐"), - (0xFAD7, "M", "𧻓"), - (0xFAD8, "M", "齃"), - (0xFAD9, "M", "龎"), - (0xFADA, "X"), - (0xFB00, "M", "ff"), - (0xFB01, "M", "fi"), - (0xFB02, "M", "fl"), - (0xFB03, "M", "ffi"), - (0xFB04, "M", "ffl"), - (0xFB05, "M", "st"), - ] - - -def _seg_44() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFB07, "X"), - (0xFB13, "M", "մն"), - (0xFB14, "M", "մե"), - (0xFB15, "M", "մի"), - (0xFB16, "M", "վն"), - (0xFB17, "M", "մխ"), - (0xFB18, "X"), - (0xFB1D, "M", "יִ"), - (0xFB1E, "V"), - (0xFB1F, "M", "ײַ"), - (0xFB20, "M", "ע"), - (0xFB21, "M", "א"), - (0xFB22, "M", "ד"), - (0xFB23, "M", "ה"), - (0xFB24, "M", "כ"), - (0xFB25, "M", "ל"), - (0xFB26, "M", "ם"), - (0xFB27, "M", "ר"), - (0xFB28, "M", "ת"), - (0xFB29, "3", "+"), - (0xFB2A, "M", "שׁ"), - (0xFB2B, "M", "שׂ"), - (0xFB2C, "M", "שּׁ"), - (0xFB2D, "M", "שּׂ"), - (0xFB2E, "M", "אַ"), - (0xFB2F, "M", "אָ"), - (0xFB30, "M", "אּ"), - (0xFB31, "M", "בּ"), - (0xFB32, "M", "גּ"), - (0xFB33, "M", "דּ"), - (0xFB34, "M", "הּ"), - (0xFB35, "M", "וּ"), - (0xFB36, "M", "זּ"), - (0xFB37, "X"), - (0xFB38, "M", "טּ"), - (0xFB39, "M", "יּ"), - (0xFB3A, "M", "ךּ"), - (0xFB3B, "M", "כּ"), - (0xFB3C, "M", "לּ"), - (0xFB3D, "X"), - (0xFB3E, "M", "מּ"), - (0xFB3F, "X"), - (0xFB40, "M", "נּ"), - (0xFB41, "M", "סּ"), - (0xFB42, "X"), - (0xFB43, "M", "ףּ"), - (0xFB44, "M", "פּ"), - (0xFB45, "X"), - (0xFB46, "M", "צּ"), - (0xFB47, "M", "קּ"), - (0xFB48, "M", "רּ"), - (0xFB49, "M", "שּ"), - (0xFB4A, "M", "תּ"), - (0xFB4B, "M", "וֹ"), - (0xFB4C, "M", "בֿ"), - (0xFB4D, "M", "כֿ"), - (0xFB4E, "M", "פֿ"), - (0xFB4F, "M", "אל"), - (0xFB50, "M", "ٱ"), - (0xFB52, "M", "ٻ"), - (0xFB56, "M", "پ"), - (0xFB5A, "M", "ڀ"), - (0xFB5E, "M", "ٺ"), - (0xFB62, "M", "ٿ"), - (0xFB66, "M", "ٹ"), - (0xFB6A, "M", "ڤ"), - (0xFB6E, "M", "ڦ"), - (0xFB72, "M", "ڄ"), - (0xFB76, "M", "ڃ"), - (0xFB7A, "M", "چ"), - (0xFB7E, "M", "ڇ"), - (0xFB82, "M", "ڍ"), - (0xFB84, "M", "ڌ"), - (0xFB86, "M", "ڎ"), - (0xFB88, "M", "ڈ"), - (0xFB8A, "M", "ژ"), - (0xFB8C, "M", "ڑ"), - (0xFB8E, "M", "ک"), - (0xFB92, "M", "گ"), - (0xFB96, "M", "ڳ"), - (0xFB9A, "M", "ڱ"), - (0xFB9E, "M", "ں"), - (0xFBA0, "M", "ڻ"), - (0xFBA4, "M", "ۀ"), - (0xFBA6, "M", "ہ"), - (0xFBAA, "M", "ھ"), - (0xFBAE, "M", "ے"), - (0xFBB0, "M", "ۓ"), - (0xFBB2, "V"), - (0xFBC3, "X"), - (0xFBD3, "M", "ڭ"), - (0xFBD7, "M", "ۇ"), - (0xFBD9, "M", "ۆ"), - (0xFBDB, "M", "ۈ"), - (0xFBDD, "M", "ۇٴ"), - (0xFBDE, "M", "ۋ"), - (0xFBE0, "M", "ۅ"), - (0xFBE2, "M", "ۉ"), - (0xFBE4, "M", "ې"), - (0xFBE8, "M", "ى"), - ] - - -def _seg_45() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFBEA, "M", "ئا"), - (0xFBEC, "M", "ئە"), - (0xFBEE, "M", "ئو"), - (0xFBF0, "M", "ئۇ"), - (0xFBF2, "M", "ئۆ"), - (0xFBF4, "M", "ئۈ"), - (0xFBF6, "M", "ئې"), - (0xFBF9, "M", "ئى"), - (0xFBFC, "M", "ی"), - (0xFC00, "M", "ئج"), - (0xFC01, "M", "ئح"), - (0xFC02, "M", "ئم"), - (0xFC03, "M", "ئى"), - (0xFC04, "M", "ئي"), - (0xFC05, "M", "بج"), - (0xFC06, "M", "بح"), - (0xFC07, "M", "بخ"), - (0xFC08, "M", "بم"), - (0xFC09, "M", "بى"), - (0xFC0A, "M", "بي"), - (0xFC0B, "M", "تج"), - (0xFC0C, "M", "تح"), - (0xFC0D, "M", "تخ"), - (0xFC0E, "M", "تم"), - (0xFC0F, "M", "تى"), - (0xFC10, "M", "تي"), - (0xFC11, "M", "ثج"), - (0xFC12, "M", "ثم"), - (0xFC13, "M", "ثى"), - (0xFC14, "M", "ثي"), - (0xFC15, "M", "جح"), - (0xFC16, "M", "جم"), - (0xFC17, "M", "حج"), - (0xFC18, "M", "حم"), - (0xFC19, "M", "خج"), - (0xFC1A, "M", "خح"), - (0xFC1B, "M", "خم"), - (0xFC1C, "M", "سج"), - (0xFC1D, "M", "سح"), - (0xFC1E, "M", "سخ"), - (0xFC1F, "M", "سم"), - (0xFC20, "M", "صح"), - (0xFC21, "M", "صم"), - (0xFC22, "M", "ضج"), - (0xFC23, "M", "ضح"), - (0xFC24, "M", "ضخ"), - (0xFC25, "M", "ضم"), - (0xFC26, "M", "طح"), - (0xFC27, "M", "طم"), - (0xFC28, "M", "ظم"), - (0xFC29, "M", "عج"), - (0xFC2A, "M", "عم"), - (0xFC2B, "M", "غج"), - (0xFC2C, "M", "غم"), - (0xFC2D, "M", "فج"), - (0xFC2E, "M", "فح"), - (0xFC2F, "M", "فخ"), - (0xFC30, "M", "فم"), - (0xFC31, "M", "فى"), - (0xFC32, "M", "في"), - (0xFC33, "M", "قح"), - (0xFC34, "M", "قم"), - (0xFC35, "M", "قى"), - (0xFC36, "M", "قي"), - (0xFC37, "M", "كا"), - (0xFC38, "M", "كج"), - (0xFC39, "M", "كح"), - (0xFC3A, "M", "كخ"), - (0xFC3B, "M", "كل"), - (0xFC3C, "M", "كم"), - (0xFC3D, "M", "كى"), - (0xFC3E, "M", "كي"), - (0xFC3F, "M", "لج"), - (0xFC40, "M", "لح"), - (0xFC41, "M", "لخ"), - (0xFC42, "M", "لم"), - (0xFC43, "M", "لى"), - (0xFC44, "M", "لي"), - (0xFC45, "M", "مج"), - (0xFC46, "M", "مح"), - (0xFC47, "M", "مخ"), - (0xFC48, "M", "مم"), - (0xFC49, "M", "مى"), - (0xFC4A, "M", "مي"), - (0xFC4B, "M", "نج"), - (0xFC4C, "M", "نح"), - (0xFC4D, "M", "نخ"), - (0xFC4E, "M", "نم"), - (0xFC4F, "M", "نى"), - (0xFC50, "M", "ني"), - (0xFC51, "M", "هج"), - (0xFC52, "M", "هم"), - (0xFC53, "M", "هى"), - (0xFC54, "M", "هي"), - (0xFC55, "M", "يج"), - (0xFC56, "M", "يح"), - (0xFC57, "M", "يخ"), - (0xFC58, "M", "يم"), - (0xFC59, "M", "يى"), - (0xFC5A, "M", "يي"), - ] - - -def _seg_46() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFC5B, "M", "ذٰ"), - (0xFC5C, "M", "رٰ"), - (0xFC5D, "M", "ىٰ"), - (0xFC5E, "3", " ٌّ"), - (0xFC5F, "3", " ٍّ"), - (0xFC60, "3", " َّ"), - (0xFC61, "3", " ُّ"), - (0xFC62, "3", " ِّ"), - (0xFC63, "3", " ّٰ"), - (0xFC64, "M", "ئر"), - (0xFC65, "M", "ئز"), - (0xFC66, "M", "ئم"), - (0xFC67, "M", "ئن"), - (0xFC68, "M", "ئى"), - (0xFC69, "M", "ئي"), - (0xFC6A, "M", "بر"), - (0xFC6B, "M", "بز"), - (0xFC6C, "M", "بم"), - (0xFC6D, "M", "بن"), - (0xFC6E, "M", "بى"), - (0xFC6F, "M", "بي"), - (0xFC70, "M", "تر"), - (0xFC71, "M", "تز"), - (0xFC72, "M", "تم"), - (0xFC73, "M", "تن"), - (0xFC74, "M", "تى"), - (0xFC75, "M", "تي"), - (0xFC76, "M", "ثر"), - (0xFC77, "M", "ثز"), - (0xFC78, "M", "ثم"), - (0xFC79, "M", "ثن"), - (0xFC7A, "M", "ثى"), - (0xFC7B, "M", "ثي"), - (0xFC7C, "M", "فى"), - (0xFC7D, "M", "في"), - (0xFC7E, "M", "قى"), - (0xFC7F, "M", "قي"), - (0xFC80, "M", "كا"), - (0xFC81, "M", "كل"), - (0xFC82, "M", "كم"), - (0xFC83, "M", "كى"), - (0xFC84, "M", "كي"), - (0xFC85, "M", "لم"), - (0xFC86, "M", "لى"), - (0xFC87, "M", "لي"), - (0xFC88, "M", "ما"), - (0xFC89, "M", "مم"), - (0xFC8A, "M", "نر"), - (0xFC8B, "M", "نز"), - (0xFC8C, "M", "نم"), - (0xFC8D, "M", "نن"), - (0xFC8E, "M", "نى"), - (0xFC8F, "M", "ني"), - (0xFC90, "M", "ىٰ"), - (0xFC91, "M", "ير"), - (0xFC92, "M", "يز"), - (0xFC93, "M", "يم"), - (0xFC94, "M", "ين"), - (0xFC95, "M", "يى"), - (0xFC96, "M", "يي"), - (0xFC97, "M", "ئج"), - (0xFC98, "M", "ئح"), - (0xFC99, "M", "ئخ"), - (0xFC9A, "M", "ئم"), - (0xFC9B, "M", "ئه"), - (0xFC9C, "M", "بج"), - (0xFC9D, "M", "بح"), - (0xFC9E, "M", "بخ"), - (0xFC9F, "M", "بم"), - (0xFCA0, "M", "به"), - (0xFCA1, "M", "تج"), - (0xFCA2, "M", "تح"), - (0xFCA3, "M", "تخ"), - (0xFCA4, "M", "تم"), - (0xFCA5, "M", "ته"), - (0xFCA6, "M", "ثم"), - (0xFCA7, "M", "جح"), - (0xFCA8, "M", "جم"), - (0xFCA9, "M", "حج"), - (0xFCAA, "M", "حم"), - (0xFCAB, "M", "خج"), - (0xFCAC, "M", "خم"), - (0xFCAD, "M", "سج"), - (0xFCAE, "M", "سح"), - (0xFCAF, "M", "سخ"), - (0xFCB0, "M", "سم"), - (0xFCB1, "M", "صح"), - (0xFCB2, "M", "صخ"), - (0xFCB3, "M", "صم"), - (0xFCB4, "M", "ضج"), - (0xFCB5, "M", "ضح"), - (0xFCB6, "M", "ضخ"), - (0xFCB7, "M", "ضم"), - (0xFCB8, "M", "طح"), - (0xFCB9, "M", "ظم"), - (0xFCBA, "M", "عج"), - (0xFCBB, "M", "عم"), - (0xFCBC, "M", "غج"), - (0xFCBD, "M", "غم"), - (0xFCBE, "M", "فج"), - ] - - -def _seg_47() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFCBF, "M", "فح"), - (0xFCC0, "M", "فخ"), - (0xFCC1, "M", "فم"), - (0xFCC2, "M", "قح"), - (0xFCC3, "M", "قم"), - (0xFCC4, "M", "كج"), - (0xFCC5, "M", "كح"), - (0xFCC6, "M", "كخ"), - (0xFCC7, "M", "كل"), - (0xFCC8, "M", "كم"), - (0xFCC9, "M", "لج"), - (0xFCCA, "M", "لح"), - (0xFCCB, "M", "لخ"), - (0xFCCC, "M", "لم"), - (0xFCCD, "M", "له"), - (0xFCCE, "M", "مج"), - (0xFCCF, "M", "مح"), - (0xFCD0, "M", "مخ"), - (0xFCD1, "M", "مم"), - (0xFCD2, "M", "نج"), - (0xFCD3, "M", "نح"), - (0xFCD4, "M", "نخ"), - (0xFCD5, "M", "نم"), - (0xFCD6, "M", "نه"), - (0xFCD7, "M", "هج"), - (0xFCD8, "M", "هم"), - (0xFCD9, "M", "هٰ"), - (0xFCDA, "M", "يج"), - (0xFCDB, "M", "يح"), - (0xFCDC, "M", "يخ"), - (0xFCDD, "M", "يم"), - (0xFCDE, "M", "يه"), - (0xFCDF, "M", "ئم"), - (0xFCE0, "M", "ئه"), - (0xFCE1, "M", "بم"), - (0xFCE2, "M", "به"), - (0xFCE3, "M", "تم"), - (0xFCE4, "M", "ته"), - (0xFCE5, "M", "ثم"), - (0xFCE6, "M", "ثه"), - (0xFCE7, "M", "سم"), - (0xFCE8, "M", "سه"), - (0xFCE9, "M", "شم"), - (0xFCEA, "M", "شه"), - (0xFCEB, "M", "كل"), - (0xFCEC, "M", "كم"), - (0xFCED, "M", "لم"), - (0xFCEE, "M", "نم"), - (0xFCEF, "M", "نه"), - (0xFCF0, "M", "يم"), - (0xFCF1, "M", "يه"), - (0xFCF2, "M", "ـَّ"), - (0xFCF3, "M", "ـُّ"), - (0xFCF4, "M", "ـِّ"), - (0xFCF5, "M", "طى"), - (0xFCF6, "M", "طي"), - (0xFCF7, "M", "عى"), - (0xFCF8, "M", "عي"), - (0xFCF9, "M", "غى"), - (0xFCFA, "M", "غي"), - (0xFCFB, "M", "سى"), - (0xFCFC, "M", "سي"), - (0xFCFD, "M", "شى"), - (0xFCFE, "M", "شي"), - (0xFCFF, "M", "حى"), - (0xFD00, "M", "حي"), - (0xFD01, "M", "جى"), - (0xFD02, "M", "جي"), - (0xFD03, "M", "خى"), - (0xFD04, "M", "خي"), - (0xFD05, "M", "صى"), - (0xFD06, "M", "صي"), - (0xFD07, "M", "ضى"), - (0xFD08, "M", "ضي"), - (0xFD09, "M", "شج"), - (0xFD0A, "M", "شح"), - (0xFD0B, "M", "شخ"), - (0xFD0C, "M", "شم"), - (0xFD0D, "M", "شر"), - (0xFD0E, "M", "سر"), - (0xFD0F, "M", "صر"), - (0xFD10, "M", "ضر"), - (0xFD11, "M", "طى"), - (0xFD12, "M", "طي"), - (0xFD13, "M", "عى"), - (0xFD14, "M", "عي"), - (0xFD15, "M", "غى"), - (0xFD16, "M", "غي"), - (0xFD17, "M", "سى"), - (0xFD18, "M", "سي"), - (0xFD19, "M", "شى"), - (0xFD1A, "M", "شي"), - (0xFD1B, "M", "حى"), - (0xFD1C, "M", "حي"), - (0xFD1D, "M", "جى"), - (0xFD1E, "M", "جي"), - (0xFD1F, "M", "خى"), - (0xFD20, "M", "خي"), - (0xFD21, "M", "صى"), - (0xFD22, "M", "صي"), - ] - - -def _seg_48() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFD23, "M", "ضى"), - (0xFD24, "M", "ضي"), - (0xFD25, "M", "شج"), - (0xFD26, "M", "شح"), - (0xFD27, "M", "شخ"), - (0xFD28, "M", "شم"), - (0xFD29, "M", "شر"), - (0xFD2A, "M", "سر"), - (0xFD2B, "M", "صر"), - (0xFD2C, "M", "ضر"), - (0xFD2D, "M", "شج"), - (0xFD2E, "M", "شح"), - (0xFD2F, "M", "شخ"), - (0xFD30, "M", "شم"), - (0xFD31, "M", "سه"), - (0xFD32, "M", "شه"), - (0xFD33, "M", "طم"), - (0xFD34, "M", "سج"), - (0xFD35, "M", "سح"), - (0xFD36, "M", "سخ"), - (0xFD37, "M", "شج"), - (0xFD38, "M", "شح"), - (0xFD39, "M", "شخ"), - (0xFD3A, "M", "طم"), - (0xFD3B, "M", "ظم"), - (0xFD3C, "M", "اً"), - (0xFD3E, "V"), - (0xFD50, "M", "تجم"), - (0xFD51, "M", "تحج"), - (0xFD53, "M", "تحم"), - (0xFD54, "M", "تخم"), - (0xFD55, "M", "تمج"), - (0xFD56, "M", "تمح"), - (0xFD57, "M", "تمخ"), - (0xFD58, "M", "جمح"), - (0xFD5A, "M", "حمي"), - (0xFD5B, "M", "حمى"), - (0xFD5C, "M", "سحج"), - (0xFD5D, "M", "سجح"), - (0xFD5E, "M", "سجى"), - (0xFD5F, "M", "سمح"), - (0xFD61, "M", "سمج"), - (0xFD62, "M", "سمم"), - (0xFD64, "M", "صحح"), - (0xFD66, "M", "صمم"), - (0xFD67, "M", "شحم"), - (0xFD69, "M", "شجي"), - (0xFD6A, "M", "شمخ"), - (0xFD6C, "M", "شمم"), - (0xFD6E, "M", "ضحى"), - (0xFD6F, "M", "ضخم"), - (0xFD71, "M", "طمح"), - (0xFD73, "M", "طمم"), - (0xFD74, "M", "طمي"), - (0xFD75, "M", "عجم"), - (0xFD76, "M", "عمم"), - (0xFD78, "M", "عمى"), - (0xFD79, "M", "غمم"), - (0xFD7A, "M", "غمي"), - (0xFD7B, "M", "غمى"), - (0xFD7C, "M", "فخم"), - (0xFD7E, "M", "قمح"), - (0xFD7F, "M", "قمم"), - (0xFD80, "M", "لحم"), - (0xFD81, "M", "لحي"), - (0xFD82, "M", "لحى"), - (0xFD83, "M", "لجج"), - (0xFD85, "M", "لخم"), - (0xFD87, "M", "لمح"), - (0xFD89, "M", "محج"), - (0xFD8A, "M", "محم"), - (0xFD8B, "M", "محي"), - (0xFD8C, "M", "مجح"), - (0xFD8D, "M", "مجم"), - (0xFD8E, "M", "مخج"), - (0xFD8F, "M", "مخم"), - (0xFD90, "X"), - (0xFD92, "M", "مجخ"), - (0xFD93, "M", "همج"), - (0xFD94, "M", "همم"), - (0xFD95, "M", "نحم"), - (0xFD96, "M", "نحى"), - (0xFD97, "M", "نجم"), - (0xFD99, "M", "نجى"), - (0xFD9A, "M", "نمي"), - (0xFD9B, "M", "نمى"), - (0xFD9C, "M", "يمم"), - (0xFD9E, "M", "بخي"), - (0xFD9F, "M", "تجي"), - (0xFDA0, "M", "تجى"), - (0xFDA1, "M", "تخي"), - (0xFDA2, "M", "تخى"), - (0xFDA3, "M", "تمي"), - (0xFDA4, "M", "تمى"), - (0xFDA5, "M", "جمي"), - (0xFDA6, "M", "جحى"), - (0xFDA7, "M", "جمى"), - (0xFDA8, "M", "سخى"), - (0xFDA9, "M", "صحي"), - (0xFDAA, "M", "شحي"), - ] - - -def _seg_49() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFDAB, "M", "ضحي"), - (0xFDAC, "M", "لجي"), - (0xFDAD, "M", "لمي"), - (0xFDAE, "M", "يحي"), - (0xFDAF, "M", "يجي"), - (0xFDB0, "M", "يمي"), - (0xFDB1, "M", "ممي"), - (0xFDB2, "M", "قمي"), - (0xFDB3, "M", "نحي"), - (0xFDB4, "M", "قمح"), - (0xFDB5, "M", "لحم"), - (0xFDB6, "M", "عمي"), - (0xFDB7, "M", "كمي"), - (0xFDB8, "M", "نجح"), - (0xFDB9, "M", "مخي"), - (0xFDBA, "M", "لجم"), - (0xFDBB, "M", "كمم"), - (0xFDBC, "M", "لجم"), - (0xFDBD, "M", "نجح"), - (0xFDBE, "M", "جحي"), - (0xFDBF, "M", "حجي"), - (0xFDC0, "M", "مجي"), - (0xFDC1, "M", "فمي"), - (0xFDC2, "M", "بحي"), - (0xFDC3, "M", "كمم"), - (0xFDC4, "M", "عجم"), - (0xFDC5, "M", "صمم"), - (0xFDC6, "M", "سخي"), - (0xFDC7, "M", "نجي"), - (0xFDC8, "X"), - (0xFDCF, "V"), - (0xFDD0, "X"), - (0xFDF0, "M", "صلے"), - (0xFDF1, "M", "قلے"), - (0xFDF2, "M", "الله"), - (0xFDF3, "M", "اكبر"), - (0xFDF4, "M", "محمد"), - (0xFDF5, "M", "صلعم"), - (0xFDF6, "M", "رسول"), - (0xFDF7, "M", "عليه"), - (0xFDF8, "M", "وسلم"), - (0xFDF9, "M", "صلى"), - (0xFDFA, "3", "صلى الله عليه وسلم"), - (0xFDFB, "3", "جل جلاله"), - (0xFDFC, "M", "ریال"), - (0xFDFD, "V"), - (0xFE00, "I"), - (0xFE10, "3", ","), - (0xFE11, "M", "、"), - (0xFE12, "X"), - (0xFE13, "3", ":"), - (0xFE14, "3", ";"), - (0xFE15, "3", "!"), - (0xFE16, "3", "?"), - (0xFE17, "M", "〖"), - (0xFE18, "M", "〗"), - (0xFE19, "X"), - (0xFE20, "V"), - (0xFE30, "X"), - (0xFE31, "M", "—"), - (0xFE32, "M", "–"), - (0xFE33, "3", "_"), - (0xFE35, "3", "("), - (0xFE36, "3", ")"), - (0xFE37, "3", "{"), - (0xFE38, "3", "}"), - (0xFE39, "M", "〔"), - (0xFE3A, "M", "〕"), - (0xFE3B, "M", "【"), - (0xFE3C, "M", "】"), - (0xFE3D, "M", "《"), - (0xFE3E, "M", "》"), - (0xFE3F, "M", "〈"), - (0xFE40, "M", "〉"), - (0xFE41, "M", "「"), - (0xFE42, "M", "」"), - (0xFE43, "M", "『"), - (0xFE44, "M", "』"), - (0xFE45, "V"), - (0xFE47, "3", "["), - (0xFE48, "3", "]"), - (0xFE49, "3", " ̅"), - (0xFE4D, "3", "_"), - (0xFE50, "3", ","), - (0xFE51, "M", "、"), - (0xFE52, "X"), - (0xFE54, "3", ";"), - (0xFE55, "3", ":"), - (0xFE56, "3", "?"), - (0xFE57, "3", "!"), - (0xFE58, "M", "—"), - (0xFE59, "3", "("), - (0xFE5A, "3", ")"), - (0xFE5B, "3", "{"), - (0xFE5C, "3", "}"), - (0xFE5D, "M", "〔"), - (0xFE5E, "M", "〕"), - (0xFE5F, "3", "#"), - (0xFE60, "3", "&"), - (0xFE61, "3", "*"), - ] - - -def _seg_50() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFE62, "3", "+"), - (0xFE63, "M", "-"), - (0xFE64, "3", "<"), - (0xFE65, "3", ">"), - (0xFE66, "3", "="), - (0xFE67, "X"), - (0xFE68, "3", "\\"), - (0xFE69, "3", "$"), - (0xFE6A, "3", "%"), - (0xFE6B, "3", "@"), - (0xFE6C, "X"), - (0xFE70, "3", " ً"), - (0xFE71, "M", "ـً"), - (0xFE72, "3", " ٌ"), - (0xFE73, "V"), - (0xFE74, "3", " ٍ"), - (0xFE75, "X"), - (0xFE76, "3", " َ"), - (0xFE77, "M", "ـَ"), - (0xFE78, "3", " ُ"), - (0xFE79, "M", "ـُ"), - (0xFE7A, "3", " ِ"), - (0xFE7B, "M", "ـِ"), - (0xFE7C, "3", " ّ"), - (0xFE7D, "M", "ـّ"), - (0xFE7E, "3", " ْ"), - (0xFE7F, "M", "ـْ"), - (0xFE80, "M", "ء"), - (0xFE81, "M", "آ"), - (0xFE83, "M", "أ"), - (0xFE85, "M", "ؤ"), - (0xFE87, "M", "إ"), - (0xFE89, "M", "ئ"), - (0xFE8D, "M", "ا"), - (0xFE8F, "M", "ب"), - (0xFE93, "M", "ة"), - (0xFE95, "M", "ت"), - (0xFE99, "M", "ث"), - (0xFE9D, "M", "ج"), - (0xFEA1, "M", "ح"), - (0xFEA5, "M", "خ"), - (0xFEA9, "M", "د"), - (0xFEAB, "M", "ذ"), - (0xFEAD, "M", "ر"), - (0xFEAF, "M", "ز"), - (0xFEB1, "M", "س"), - (0xFEB5, "M", "ش"), - (0xFEB9, "M", "ص"), - (0xFEBD, "M", "ض"), - (0xFEC1, "M", "ط"), - (0xFEC5, "M", "ظ"), - (0xFEC9, "M", "ع"), - (0xFECD, "M", "غ"), - (0xFED1, "M", "ف"), - (0xFED5, "M", "ق"), - (0xFED9, "M", "ك"), - (0xFEDD, "M", "ل"), - (0xFEE1, "M", "م"), - (0xFEE5, "M", "ن"), - (0xFEE9, "M", "ه"), - (0xFEED, "M", "و"), - (0xFEEF, "M", "ى"), - (0xFEF1, "M", "ي"), - (0xFEF5, "M", "لآ"), - (0xFEF7, "M", "لأ"), - (0xFEF9, "M", "لإ"), - (0xFEFB, "M", "لا"), - (0xFEFD, "X"), - (0xFEFF, "I"), - (0xFF00, "X"), - (0xFF01, "3", "!"), - (0xFF02, "3", '"'), - (0xFF03, "3", "#"), - (0xFF04, "3", "$"), - (0xFF05, "3", "%"), - (0xFF06, "3", "&"), - (0xFF07, "3", "'"), - (0xFF08, "3", "("), - (0xFF09, "3", ")"), - (0xFF0A, "3", "*"), - (0xFF0B, "3", "+"), - (0xFF0C, "3", ","), - (0xFF0D, "M", "-"), - (0xFF0E, "M", "."), - (0xFF0F, "3", "/"), - (0xFF10, "M", "0"), - (0xFF11, "M", "1"), - (0xFF12, "M", "2"), - (0xFF13, "M", "3"), - (0xFF14, "M", "4"), - (0xFF15, "M", "5"), - (0xFF16, "M", "6"), - (0xFF17, "M", "7"), - (0xFF18, "M", "8"), - (0xFF19, "M", "9"), - (0xFF1A, "3", ":"), - (0xFF1B, "3", ";"), - (0xFF1C, "3", "<"), - (0xFF1D, "3", "="), - (0xFF1E, "3", ">"), - ] - - -def _seg_51() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFF1F, "3", "?"), - (0xFF20, "3", "@"), - (0xFF21, "M", "a"), - (0xFF22, "M", "b"), - (0xFF23, "M", "c"), - (0xFF24, "M", "d"), - (0xFF25, "M", "e"), - (0xFF26, "M", "f"), - (0xFF27, "M", "g"), - (0xFF28, "M", "h"), - (0xFF29, "M", "i"), - (0xFF2A, "M", "j"), - (0xFF2B, "M", "k"), - (0xFF2C, "M", "l"), - (0xFF2D, "M", "m"), - (0xFF2E, "M", "n"), - (0xFF2F, "M", "o"), - (0xFF30, "M", "p"), - (0xFF31, "M", "q"), - (0xFF32, "M", "r"), - (0xFF33, "M", "s"), - (0xFF34, "M", "t"), - (0xFF35, "M", "u"), - (0xFF36, "M", "v"), - (0xFF37, "M", "w"), - (0xFF38, "M", "x"), - (0xFF39, "M", "y"), - (0xFF3A, "M", "z"), - (0xFF3B, "3", "["), - (0xFF3C, "3", "\\"), - (0xFF3D, "3", "]"), - (0xFF3E, "3", "^"), - (0xFF3F, "3", "_"), - (0xFF40, "3", "`"), - (0xFF41, "M", "a"), - (0xFF42, "M", "b"), - (0xFF43, "M", "c"), - (0xFF44, "M", "d"), - (0xFF45, "M", "e"), - (0xFF46, "M", "f"), - (0xFF47, "M", "g"), - (0xFF48, "M", "h"), - (0xFF49, "M", "i"), - (0xFF4A, "M", "j"), - (0xFF4B, "M", "k"), - (0xFF4C, "M", "l"), - (0xFF4D, "M", "m"), - (0xFF4E, "M", "n"), - (0xFF4F, "M", "o"), - (0xFF50, "M", "p"), - (0xFF51, "M", "q"), - (0xFF52, "M", "r"), - (0xFF53, "M", "s"), - (0xFF54, "M", "t"), - (0xFF55, "M", "u"), - (0xFF56, "M", "v"), - (0xFF57, "M", "w"), - (0xFF58, "M", "x"), - (0xFF59, "M", "y"), - (0xFF5A, "M", "z"), - (0xFF5B, "3", "{"), - (0xFF5C, "3", "|"), - (0xFF5D, "3", "}"), - (0xFF5E, "3", "~"), - (0xFF5F, "M", "⦅"), - (0xFF60, "M", "⦆"), - (0xFF61, "M", "."), - (0xFF62, "M", "「"), - (0xFF63, "M", "」"), - (0xFF64, "M", "、"), - (0xFF65, "M", "・"), - (0xFF66, "M", "ヲ"), - (0xFF67, "M", "ァ"), - (0xFF68, "M", "ィ"), - (0xFF69, "M", "ゥ"), - (0xFF6A, "M", "ェ"), - (0xFF6B, "M", "ォ"), - (0xFF6C, "M", "ャ"), - (0xFF6D, "M", "ュ"), - (0xFF6E, "M", "ョ"), - (0xFF6F, "M", "ッ"), - (0xFF70, "M", "ー"), - (0xFF71, "M", "ア"), - (0xFF72, "M", "イ"), - (0xFF73, "M", "ウ"), - (0xFF74, "M", "エ"), - (0xFF75, "M", "オ"), - (0xFF76, "M", "カ"), - (0xFF77, "M", "キ"), - (0xFF78, "M", "ク"), - (0xFF79, "M", "ケ"), - (0xFF7A, "M", "コ"), - (0xFF7B, "M", "サ"), - (0xFF7C, "M", "シ"), - (0xFF7D, "M", "ス"), - (0xFF7E, "M", "セ"), - (0xFF7F, "M", "ソ"), - (0xFF80, "M", "タ"), - (0xFF81, "M", "チ"), - (0xFF82, "M", "ツ"), - ] - - -def _seg_52() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFF83, "M", "テ"), - (0xFF84, "M", "ト"), - (0xFF85, "M", "ナ"), - (0xFF86, "M", "ニ"), - (0xFF87, "M", "ヌ"), - (0xFF88, "M", "ネ"), - (0xFF89, "M", "ノ"), - (0xFF8A, "M", "ハ"), - (0xFF8B, "M", "ヒ"), - (0xFF8C, "M", "フ"), - (0xFF8D, "M", "ヘ"), - (0xFF8E, "M", "ホ"), - (0xFF8F, "M", "マ"), - (0xFF90, "M", "ミ"), - (0xFF91, "M", "ム"), - (0xFF92, "M", "メ"), - (0xFF93, "M", "モ"), - (0xFF94, "M", "ヤ"), - (0xFF95, "M", "ユ"), - (0xFF96, "M", "ヨ"), - (0xFF97, "M", "ラ"), - (0xFF98, "M", "リ"), - (0xFF99, "M", "ル"), - (0xFF9A, "M", "レ"), - (0xFF9B, "M", "ロ"), - (0xFF9C, "M", "ワ"), - (0xFF9D, "M", "ン"), - (0xFF9E, "M", "゙"), - (0xFF9F, "M", "゚"), - (0xFFA0, "X"), - (0xFFA1, "M", "ᄀ"), - (0xFFA2, "M", "ᄁ"), - (0xFFA3, "M", "ᆪ"), - (0xFFA4, "M", "ᄂ"), - (0xFFA5, "M", "ᆬ"), - (0xFFA6, "M", "ᆭ"), - (0xFFA7, "M", "ᄃ"), - (0xFFA8, "M", "ᄄ"), - (0xFFA9, "M", "ᄅ"), - (0xFFAA, "M", "ᆰ"), - (0xFFAB, "M", "ᆱ"), - (0xFFAC, "M", "ᆲ"), - (0xFFAD, "M", "ᆳ"), - (0xFFAE, "M", "ᆴ"), - (0xFFAF, "M", "ᆵ"), - (0xFFB0, "M", "ᄚ"), - (0xFFB1, "M", "ᄆ"), - (0xFFB2, "M", "ᄇ"), - (0xFFB3, "M", "ᄈ"), - (0xFFB4, "M", "ᄡ"), - (0xFFB5, "M", "ᄉ"), - (0xFFB6, "M", "ᄊ"), - (0xFFB7, "M", "ᄋ"), - (0xFFB8, "M", "ᄌ"), - (0xFFB9, "M", "ᄍ"), - (0xFFBA, "M", "ᄎ"), - (0xFFBB, "M", "ᄏ"), - (0xFFBC, "M", "ᄐ"), - (0xFFBD, "M", "ᄑ"), - (0xFFBE, "M", "ᄒ"), - (0xFFBF, "X"), - (0xFFC2, "M", "ᅡ"), - (0xFFC3, "M", "ᅢ"), - (0xFFC4, "M", "ᅣ"), - (0xFFC5, "M", "ᅤ"), - (0xFFC6, "M", "ᅥ"), - (0xFFC7, "M", "ᅦ"), - (0xFFC8, "X"), - (0xFFCA, "M", "ᅧ"), - (0xFFCB, "M", "ᅨ"), - (0xFFCC, "M", "ᅩ"), - (0xFFCD, "M", "ᅪ"), - (0xFFCE, "M", "ᅫ"), - (0xFFCF, "M", "ᅬ"), - (0xFFD0, "X"), - (0xFFD2, "M", "ᅭ"), - (0xFFD3, "M", "ᅮ"), - (0xFFD4, "M", "ᅯ"), - (0xFFD5, "M", "ᅰ"), - (0xFFD6, "M", "ᅱ"), - (0xFFD7, "M", "ᅲ"), - (0xFFD8, "X"), - (0xFFDA, "M", "ᅳ"), - (0xFFDB, "M", "ᅴ"), - (0xFFDC, "M", "ᅵ"), - (0xFFDD, "X"), - (0xFFE0, "M", "¢"), - (0xFFE1, "M", "£"), - (0xFFE2, "M", "¬"), - (0xFFE3, "3", " ̄"), - (0xFFE4, "M", "¦"), - (0xFFE5, "M", "¥"), - (0xFFE6, "M", "₩"), - (0xFFE7, "X"), - (0xFFE8, "M", "│"), - (0xFFE9, "M", "←"), - (0xFFEA, "M", "↑"), - (0xFFEB, "M", "→"), - (0xFFEC, "M", "↓"), - (0xFFED, "M", "■"), - ] - - -def _seg_53() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0xFFEE, "M", "○"), - (0xFFEF, "X"), - (0x10000, "V"), - (0x1000C, "X"), - (0x1000D, "V"), - (0x10027, "X"), - (0x10028, "V"), - (0x1003B, "X"), - (0x1003C, "V"), - (0x1003E, "X"), - (0x1003F, "V"), - (0x1004E, "X"), - (0x10050, "V"), - (0x1005E, "X"), - (0x10080, "V"), - (0x100FB, "X"), - (0x10100, "V"), - (0x10103, "X"), - (0x10107, "V"), - (0x10134, "X"), - (0x10137, "V"), - (0x1018F, "X"), - (0x10190, "V"), - (0x1019D, "X"), - (0x101A0, "V"), - (0x101A1, "X"), - (0x101D0, "V"), - (0x101FE, "X"), - (0x10280, "V"), - (0x1029D, "X"), - (0x102A0, "V"), - (0x102D1, "X"), - (0x102E0, "V"), - (0x102FC, "X"), - (0x10300, "V"), - (0x10324, "X"), - (0x1032D, "V"), - (0x1034B, "X"), - (0x10350, "V"), - (0x1037B, "X"), - (0x10380, "V"), - (0x1039E, "X"), - (0x1039F, "V"), - (0x103C4, "X"), - (0x103C8, "V"), - (0x103D6, "X"), - (0x10400, "M", "𐐨"), - (0x10401, "M", "𐐩"), - (0x10402, "M", "𐐪"), - (0x10403, "M", "𐐫"), - (0x10404, "M", "𐐬"), - (0x10405, "M", "𐐭"), - (0x10406, "M", "𐐮"), - (0x10407, "M", "𐐯"), - (0x10408, "M", "𐐰"), - (0x10409, "M", "𐐱"), - (0x1040A, "M", "𐐲"), - (0x1040B, "M", "𐐳"), - (0x1040C, "M", "𐐴"), - (0x1040D, "M", "𐐵"), - (0x1040E, "M", "𐐶"), - (0x1040F, "M", "𐐷"), - (0x10410, "M", "𐐸"), - (0x10411, "M", "𐐹"), - (0x10412, "M", "𐐺"), - (0x10413, "M", "𐐻"), - (0x10414, "M", "𐐼"), - (0x10415, "M", "𐐽"), - (0x10416, "M", "𐐾"), - (0x10417, "M", "𐐿"), - (0x10418, "M", "𐑀"), - (0x10419, "M", "𐑁"), - (0x1041A, "M", "𐑂"), - (0x1041B, "M", "𐑃"), - (0x1041C, "M", "𐑄"), - (0x1041D, "M", "𐑅"), - (0x1041E, "M", "𐑆"), - (0x1041F, "M", "𐑇"), - (0x10420, "M", "𐑈"), - (0x10421, "M", "𐑉"), - (0x10422, "M", "𐑊"), - (0x10423, "M", "𐑋"), - (0x10424, "M", "𐑌"), - (0x10425, "M", "𐑍"), - (0x10426, "M", "𐑎"), - (0x10427, "M", "𐑏"), - (0x10428, "V"), - (0x1049E, "X"), - (0x104A0, "V"), - (0x104AA, "X"), - (0x104B0, "M", "𐓘"), - (0x104B1, "M", "𐓙"), - (0x104B2, "M", "𐓚"), - (0x104B3, "M", "𐓛"), - (0x104B4, "M", "𐓜"), - (0x104B5, "M", "𐓝"), - (0x104B6, "M", "𐓞"), - (0x104B7, "M", "𐓟"), - (0x104B8, "M", "𐓠"), - (0x104B9, "M", "𐓡"), - ] - - -def _seg_54() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x104BA, "M", "𐓢"), - (0x104BB, "M", "𐓣"), - (0x104BC, "M", "𐓤"), - (0x104BD, "M", "𐓥"), - (0x104BE, "M", "𐓦"), - (0x104BF, "M", "𐓧"), - (0x104C0, "M", "𐓨"), - (0x104C1, "M", "𐓩"), - (0x104C2, "M", "𐓪"), - (0x104C3, "M", "𐓫"), - (0x104C4, "M", "𐓬"), - (0x104C5, "M", "𐓭"), - (0x104C6, "M", "𐓮"), - (0x104C7, "M", "𐓯"), - (0x104C8, "M", "𐓰"), - (0x104C9, "M", "𐓱"), - (0x104CA, "M", "𐓲"), - (0x104CB, "M", "𐓳"), - (0x104CC, "M", "𐓴"), - (0x104CD, "M", "𐓵"), - (0x104CE, "M", "𐓶"), - (0x104CF, "M", "𐓷"), - (0x104D0, "M", "𐓸"), - (0x104D1, "M", "𐓹"), - (0x104D2, "M", "𐓺"), - (0x104D3, "M", "𐓻"), - (0x104D4, "X"), - (0x104D8, "V"), - (0x104FC, "X"), - (0x10500, "V"), - (0x10528, "X"), - (0x10530, "V"), - (0x10564, "X"), - (0x1056F, "V"), - (0x10570, "M", "𐖗"), - (0x10571, "M", "𐖘"), - (0x10572, "M", "𐖙"), - (0x10573, "M", "𐖚"), - (0x10574, "M", "𐖛"), - (0x10575, "M", "𐖜"), - (0x10576, "M", "𐖝"), - (0x10577, "M", "𐖞"), - (0x10578, "M", "𐖟"), - (0x10579, "M", "𐖠"), - (0x1057A, "M", "𐖡"), - (0x1057B, "X"), - (0x1057C, "M", "𐖣"), - (0x1057D, "M", "𐖤"), - (0x1057E, "M", "𐖥"), - (0x1057F, "M", "𐖦"), - (0x10580, "M", "𐖧"), - (0x10581, "M", "𐖨"), - (0x10582, "M", "𐖩"), - (0x10583, "M", "𐖪"), - (0x10584, "M", "𐖫"), - (0x10585, "M", "𐖬"), - (0x10586, "M", "𐖭"), - (0x10587, "M", "𐖮"), - (0x10588, "M", "𐖯"), - (0x10589, "M", "𐖰"), - (0x1058A, "M", "𐖱"), - (0x1058B, "X"), - (0x1058C, "M", "𐖳"), - (0x1058D, "M", "𐖴"), - (0x1058E, "M", "𐖵"), - (0x1058F, "M", "𐖶"), - (0x10590, "M", "𐖷"), - (0x10591, "M", "𐖸"), - (0x10592, "M", "𐖹"), - (0x10593, "X"), - (0x10594, "M", "𐖻"), - (0x10595, "M", "𐖼"), - (0x10596, "X"), - (0x10597, "V"), - (0x105A2, "X"), - (0x105A3, "V"), - (0x105B2, "X"), - (0x105B3, "V"), - (0x105BA, "X"), - (0x105BB, "V"), - (0x105BD, "X"), - (0x10600, "V"), - (0x10737, "X"), - (0x10740, "V"), - (0x10756, "X"), - (0x10760, "V"), - (0x10768, "X"), - (0x10780, "V"), - (0x10781, "M", "ː"), - (0x10782, "M", "ˑ"), - (0x10783, "M", "æ"), - (0x10784, "M", "ʙ"), - (0x10785, "M", "ɓ"), - (0x10786, "X"), - (0x10787, "M", "ʣ"), - (0x10788, "M", "ꭦ"), - (0x10789, "M", "ʥ"), - (0x1078A, "M", "ʤ"), - (0x1078B, "M", "ɖ"), - (0x1078C, "M", "ɗ"), - ] - - -def _seg_55() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1078D, "M", "ᶑ"), - (0x1078E, "M", "ɘ"), - (0x1078F, "M", "ɞ"), - (0x10790, "M", "ʩ"), - (0x10791, "M", "ɤ"), - (0x10792, "M", "ɢ"), - (0x10793, "M", "ɠ"), - (0x10794, "M", "ʛ"), - (0x10795, "M", "ħ"), - (0x10796, "M", "ʜ"), - (0x10797, "M", "ɧ"), - (0x10798, "M", "ʄ"), - (0x10799, "M", "ʪ"), - (0x1079A, "M", "ʫ"), - (0x1079B, "M", "ɬ"), - (0x1079C, "M", "𝼄"), - (0x1079D, "M", "ꞎ"), - (0x1079E, "M", "ɮ"), - (0x1079F, "M", "𝼅"), - (0x107A0, "M", "ʎ"), - (0x107A1, "M", "𝼆"), - (0x107A2, "M", "ø"), - (0x107A3, "M", "ɶ"), - (0x107A4, "M", "ɷ"), - (0x107A5, "M", "q"), - (0x107A6, "M", "ɺ"), - (0x107A7, "M", "𝼈"), - (0x107A8, "M", "ɽ"), - (0x107A9, "M", "ɾ"), - (0x107AA, "M", "ʀ"), - (0x107AB, "M", "ʨ"), - (0x107AC, "M", "ʦ"), - (0x107AD, "M", "ꭧ"), - (0x107AE, "M", "ʧ"), - (0x107AF, "M", "ʈ"), - (0x107B0, "M", "ⱱ"), - (0x107B1, "X"), - (0x107B2, "M", "ʏ"), - (0x107B3, "M", "ʡ"), - (0x107B4, "M", "ʢ"), - (0x107B5, "M", "ʘ"), - (0x107B6, "M", "ǀ"), - (0x107B7, "M", "ǁ"), - (0x107B8, "M", "ǂ"), - (0x107B9, "M", "𝼊"), - (0x107BA, "M", "𝼞"), - (0x107BB, "X"), - (0x10800, "V"), - (0x10806, "X"), - (0x10808, "V"), - (0x10809, "X"), - (0x1080A, "V"), - (0x10836, "X"), - (0x10837, "V"), - (0x10839, "X"), - (0x1083C, "V"), - (0x1083D, "X"), - (0x1083F, "V"), - (0x10856, "X"), - (0x10857, "V"), - (0x1089F, "X"), - (0x108A7, "V"), - (0x108B0, "X"), - (0x108E0, "V"), - (0x108F3, "X"), - (0x108F4, "V"), - (0x108F6, "X"), - (0x108FB, "V"), - (0x1091C, "X"), - (0x1091F, "V"), - (0x1093A, "X"), - (0x1093F, "V"), - (0x10940, "X"), - (0x10980, "V"), - (0x109B8, "X"), - (0x109BC, "V"), - (0x109D0, "X"), - (0x109D2, "V"), - (0x10A04, "X"), - (0x10A05, "V"), - (0x10A07, "X"), - (0x10A0C, "V"), - (0x10A14, "X"), - (0x10A15, "V"), - (0x10A18, "X"), - (0x10A19, "V"), - (0x10A36, "X"), - (0x10A38, "V"), - (0x10A3B, "X"), - (0x10A3F, "V"), - (0x10A49, "X"), - (0x10A50, "V"), - (0x10A59, "X"), - (0x10A60, "V"), - (0x10AA0, "X"), - (0x10AC0, "V"), - (0x10AE7, "X"), - (0x10AEB, "V"), - (0x10AF7, "X"), - (0x10B00, "V"), - ] - - -def _seg_56() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x10B36, "X"), - (0x10B39, "V"), - (0x10B56, "X"), - (0x10B58, "V"), - (0x10B73, "X"), - (0x10B78, "V"), - (0x10B92, "X"), - (0x10B99, "V"), - (0x10B9D, "X"), - (0x10BA9, "V"), - (0x10BB0, "X"), - (0x10C00, "V"), - (0x10C49, "X"), - (0x10C80, "M", "𐳀"), - (0x10C81, "M", "𐳁"), - (0x10C82, "M", "𐳂"), - (0x10C83, "M", "𐳃"), - (0x10C84, "M", "𐳄"), - (0x10C85, "M", "𐳅"), - (0x10C86, "M", "𐳆"), - (0x10C87, "M", "𐳇"), - (0x10C88, "M", "𐳈"), - (0x10C89, "M", "𐳉"), - (0x10C8A, "M", "𐳊"), - (0x10C8B, "M", "𐳋"), - (0x10C8C, "M", "𐳌"), - (0x10C8D, "M", "𐳍"), - (0x10C8E, "M", "𐳎"), - (0x10C8F, "M", "𐳏"), - (0x10C90, "M", "𐳐"), - (0x10C91, "M", "𐳑"), - (0x10C92, "M", "𐳒"), - (0x10C93, "M", "𐳓"), - (0x10C94, "M", "𐳔"), - (0x10C95, "M", "𐳕"), - (0x10C96, "M", "𐳖"), - (0x10C97, "M", "𐳗"), - (0x10C98, "M", "𐳘"), - (0x10C99, "M", "𐳙"), - (0x10C9A, "M", "𐳚"), - (0x10C9B, "M", "𐳛"), - (0x10C9C, "M", "𐳜"), - (0x10C9D, "M", "𐳝"), - (0x10C9E, "M", "𐳞"), - (0x10C9F, "M", "𐳟"), - (0x10CA0, "M", "𐳠"), - (0x10CA1, "M", "𐳡"), - (0x10CA2, "M", "𐳢"), - (0x10CA3, "M", "𐳣"), - (0x10CA4, "M", "𐳤"), - (0x10CA5, "M", "𐳥"), - (0x10CA6, "M", "𐳦"), - (0x10CA7, "M", "𐳧"), - (0x10CA8, "M", "𐳨"), - (0x10CA9, "M", "𐳩"), - (0x10CAA, "M", "𐳪"), - (0x10CAB, "M", "𐳫"), - (0x10CAC, "M", "𐳬"), - (0x10CAD, "M", "𐳭"), - (0x10CAE, "M", "𐳮"), - (0x10CAF, "M", "𐳯"), - (0x10CB0, "M", "𐳰"), - (0x10CB1, "M", "𐳱"), - (0x10CB2, "M", "𐳲"), - (0x10CB3, "X"), - (0x10CC0, "V"), - (0x10CF3, "X"), - (0x10CFA, "V"), - (0x10D28, "X"), - (0x10D30, "V"), - (0x10D3A, "X"), - (0x10E60, "V"), - (0x10E7F, "X"), - (0x10E80, "V"), - (0x10EAA, "X"), - (0x10EAB, "V"), - (0x10EAE, "X"), - (0x10EB0, "V"), - (0x10EB2, "X"), - (0x10EFD, "V"), - (0x10F28, "X"), - (0x10F30, "V"), - (0x10F5A, "X"), - (0x10F70, "V"), - (0x10F8A, "X"), - (0x10FB0, "V"), - (0x10FCC, "X"), - (0x10FE0, "V"), - (0x10FF7, "X"), - (0x11000, "V"), - (0x1104E, "X"), - (0x11052, "V"), - (0x11076, "X"), - (0x1107F, "V"), - (0x110BD, "X"), - (0x110BE, "V"), - (0x110C3, "X"), - (0x110D0, "V"), - (0x110E9, "X"), - (0x110F0, "V"), - ] - - -def _seg_57() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x110FA, "X"), - (0x11100, "V"), - (0x11135, "X"), - (0x11136, "V"), - (0x11148, "X"), - (0x11150, "V"), - (0x11177, "X"), - (0x11180, "V"), - (0x111E0, "X"), - (0x111E1, "V"), - (0x111F5, "X"), - (0x11200, "V"), - (0x11212, "X"), - (0x11213, "V"), - (0x11242, "X"), - (0x11280, "V"), - (0x11287, "X"), - (0x11288, "V"), - (0x11289, "X"), - (0x1128A, "V"), - (0x1128E, "X"), - (0x1128F, "V"), - (0x1129E, "X"), - (0x1129F, "V"), - (0x112AA, "X"), - (0x112B0, "V"), - (0x112EB, "X"), - (0x112F0, "V"), - (0x112FA, "X"), - (0x11300, "V"), - (0x11304, "X"), - (0x11305, "V"), - (0x1130D, "X"), - (0x1130F, "V"), - (0x11311, "X"), - (0x11313, "V"), - (0x11329, "X"), - (0x1132A, "V"), - (0x11331, "X"), - (0x11332, "V"), - (0x11334, "X"), - (0x11335, "V"), - (0x1133A, "X"), - (0x1133B, "V"), - (0x11345, "X"), - (0x11347, "V"), - (0x11349, "X"), - (0x1134B, "V"), - (0x1134E, "X"), - (0x11350, "V"), - (0x11351, "X"), - (0x11357, "V"), - (0x11358, "X"), - (0x1135D, "V"), - (0x11364, "X"), - (0x11366, "V"), - (0x1136D, "X"), - (0x11370, "V"), - (0x11375, "X"), - (0x11400, "V"), - (0x1145C, "X"), - (0x1145D, "V"), - (0x11462, "X"), - (0x11480, "V"), - (0x114C8, "X"), - (0x114D0, "V"), - (0x114DA, "X"), - (0x11580, "V"), - (0x115B6, "X"), - (0x115B8, "V"), - (0x115DE, "X"), - (0x11600, "V"), - (0x11645, "X"), - (0x11650, "V"), - (0x1165A, "X"), - (0x11660, "V"), - (0x1166D, "X"), - (0x11680, "V"), - (0x116BA, "X"), - (0x116C0, "V"), - (0x116CA, "X"), - (0x11700, "V"), - (0x1171B, "X"), - (0x1171D, "V"), - (0x1172C, "X"), - (0x11730, "V"), - (0x11747, "X"), - (0x11800, "V"), - (0x1183C, "X"), - (0x118A0, "M", "𑣀"), - (0x118A1, "M", "𑣁"), - (0x118A2, "M", "𑣂"), - (0x118A3, "M", "𑣃"), - (0x118A4, "M", "𑣄"), - (0x118A5, "M", "𑣅"), - (0x118A6, "M", "𑣆"), - (0x118A7, "M", "𑣇"), - (0x118A8, "M", "𑣈"), - (0x118A9, "M", "𑣉"), - (0x118AA, "M", "𑣊"), - ] - - -def _seg_58() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x118AB, "M", "𑣋"), - (0x118AC, "M", "𑣌"), - (0x118AD, "M", "𑣍"), - (0x118AE, "M", "𑣎"), - (0x118AF, "M", "𑣏"), - (0x118B0, "M", "𑣐"), - (0x118B1, "M", "𑣑"), - (0x118B2, "M", "𑣒"), - (0x118B3, "M", "𑣓"), - (0x118B4, "M", "𑣔"), - (0x118B5, "M", "𑣕"), - (0x118B6, "M", "𑣖"), - (0x118B7, "M", "𑣗"), - (0x118B8, "M", "𑣘"), - (0x118B9, "M", "𑣙"), - (0x118BA, "M", "𑣚"), - (0x118BB, "M", "𑣛"), - (0x118BC, "M", "𑣜"), - (0x118BD, "M", "𑣝"), - (0x118BE, "M", "𑣞"), - (0x118BF, "M", "𑣟"), - (0x118C0, "V"), - (0x118F3, "X"), - (0x118FF, "V"), - (0x11907, "X"), - (0x11909, "V"), - (0x1190A, "X"), - (0x1190C, "V"), - (0x11914, "X"), - (0x11915, "V"), - (0x11917, "X"), - (0x11918, "V"), - (0x11936, "X"), - (0x11937, "V"), - (0x11939, "X"), - (0x1193B, "V"), - (0x11947, "X"), - (0x11950, "V"), - (0x1195A, "X"), - (0x119A0, "V"), - (0x119A8, "X"), - (0x119AA, "V"), - (0x119D8, "X"), - (0x119DA, "V"), - (0x119E5, "X"), - (0x11A00, "V"), - (0x11A48, "X"), - (0x11A50, "V"), - (0x11AA3, "X"), - (0x11AB0, "V"), - (0x11AF9, "X"), - (0x11B00, "V"), - (0x11B0A, "X"), - (0x11C00, "V"), - (0x11C09, "X"), - (0x11C0A, "V"), - (0x11C37, "X"), - (0x11C38, "V"), - (0x11C46, "X"), - (0x11C50, "V"), - (0x11C6D, "X"), - (0x11C70, "V"), - (0x11C90, "X"), - (0x11C92, "V"), - (0x11CA8, "X"), - (0x11CA9, "V"), - (0x11CB7, "X"), - (0x11D00, "V"), - (0x11D07, "X"), - (0x11D08, "V"), - (0x11D0A, "X"), - (0x11D0B, "V"), - (0x11D37, "X"), - (0x11D3A, "V"), - (0x11D3B, "X"), - (0x11D3C, "V"), - (0x11D3E, "X"), - (0x11D3F, "V"), - (0x11D48, "X"), - (0x11D50, "V"), - (0x11D5A, "X"), - (0x11D60, "V"), - (0x11D66, "X"), - (0x11D67, "V"), - (0x11D69, "X"), - (0x11D6A, "V"), - (0x11D8F, "X"), - (0x11D90, "V"), - (0x11D92, "X"), - (0x11D93, "V"), - (0x11D99, "X"), - (0x11DA0, "V"), - (0x11DAA, "X"), - (0x11EE0, "V"), - (0x11EF9, "X"), - (0x11F00, "V"), - (0x11F11, "X"), - (0x11F12, "V"), - (0x11F3B, "X"), - (0x11F3E, "V"), - ] - - -def _seg_59() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x11F5A, "X"), - (0x11FB0, "V"), - (0x11FB1, "X"), - (0x11FC0, "V"), - (0x11FF2, "X"), - (0x11FFF, "V"), - (0x1239A, "X"), - (0x12400, "V"), - (0x1246F, "X"), - (0x12470, "V"), - (0x12475, "X"), - (0x12480, "V"), - (0x12544, "X"), - (0x12F90, "V"), - (0x12FF3, "X"), - (0x13000, "V"), - (0x13430, "X"), - (0x13440, "V"), - (0x13456, "X"), - (0x14400, "V"), - (0x14647, "X"), - (0x16800, "V"), - (0x16A39, "X"), - (0x16A40, "V"), - (0x16A5F, "X"), - (0x16A60, "V"), - (0x16A6A, "X"), - (0x16A6E, "V"), - (0x16ABF, "X"), - (0x16AC0, "V"), - (0x16ACA, "X"), - (0x16AD0, "V"), - (0x16AEE, "X"), - (0x16AF0, "V"), - (0x16AF6, "X"), - (0x16B00, "V"), - (0x16B46, "X"), - (0x16B50, "V"), - (0x16B5A, "X"), - (0x16B5B, "V"), - (0x16B62, "X"), - (0x16B63, "V"), - (0x16B78, "X"), - (0x16B7D, "V"), - (0x16B90, "X"), - (0x16E40, "M", "𖹠"), - (0x16E41, "M", "𖹡"), - (0x16E42, "M", "𖹢"), - (0x16E43, "M", "𖹣"), - (0x16E44, "M", "𖹤"), - (0x16E45, "M", "𖹥"), - (0x16E46, "M", "𖹦"), - (0x16E47, "M", "𖹧"), - (0x16E48, "M", "𖹨"), - (0x16E49, "M", "𖹩"), - (0x16E4A, "M", "𖹪"), - (0x16E4B, "M", "𖹫"), - (0x16E4C, "M", "𖹬"), - (0x16E4D, "M", "𖹭"), - (0x16E4E, "M", "𖹮"), - (0x16E4F, "M", "𖹯"), - (0x16E50, "M", "𖹰"), - (0x16E51, "M", "𖹱"), - (0x16E52, "M", "𖹲"), - (0x16E53, "M", "𖹳"), - (0x16E54, "M", "𖹴"), - (0x16E55, "M", "𖹵"), - (0x16E56, "M", "𖹶"), - (0x16E57, "M", "𖹷"), - (0x16E58, "M", "𖹸"), - (0x16E59, "M", "𖹹"), - (0x16E5A, "M", "𖹺"), - (0x16E5B, "M", "𖹻"), - (0x16E5C, "M", "𖹼"), - (0x16E5D, "M", "𖹽"), - (0x16E5E, "M", "𖹾"), - (0x16E5F, "M", "𖹿"), - (0x16E60, "V"), - (0x16E9B, "X"), - (0x16F00, "V"), - (0x16F4B, "X"), - (0x16F4F, "V"), - (0x16F88, "X"), - (0x16F8F, "V"), - (0x16FA0, "X"), - (0x16FE0, "V"), - (0x16FE5, "X"), - (0x16FF0, "V"), - (0x16FF2, "X"), - (0x17000, "V"), - (0x187F8, "X"), - (0x18800, "V"), - (0x18CD6, "X"), - (0x18D00, "V"), - (0x18D09, "X"), - (0x1AFF0, "V"), - (0x1AFF4, "X"), - (0x1AFF5, "V"), - (0x1AFFC, "X"), - (0x1AFFD, "V"), - ] - - -def _seg_60() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1AFFF, "X"), - (0x1B000, "V"), - (0x1B123, "X"), - (0x1B132, "V"), - (0x1B133, "X"), - (0x1B150, "V"), - (0x1B153, "X"), - (0x1B155, "V"), - (0x1B156, "X"), - (0x1B164, "V"), - (0x1B168, "X"), - (0x1B170, "V"), - (0x1B2FC, "X"), - (0x1BC00, "V"), - (0x1BC6B, "X"), - (0x1BC70, "V"), - (0x1BC7D, "X"), - (0x1BC80, "V"), - (0x1BC89, "X"), - (0x1BC90, "V"), - (0x1BC9A, "X"), - (0x1BC9C, "V"), - (0x1BCA0, "I"), - (0x1BCA4, "X"), - (0x1CF00, "V"), - (0x1CF2E, "X"), - (0x1CF30, "V"), - (0x1CF47, "X"), - (0x1CF50, "V"), - (0x1CFC4, "X"), - (0x1D000, "V"), - (0x1D0F6, "X"), - (0x1D100, "V"), - (0x1D127, "X"), - (0x1D129, "V"), - (0x1D15E, "M", "𝅗𝅥"), - (0x1D15F, "M", "𝅘𝅥"), - (0x1D160, "M", "𝅘𝅥𝅮"), - (0x1D161, "M", "𝅘𝅥𝅯"), - (0x1D162, "M", "𝅘𝅥𝅰"), - (0x1D163, "M", "𝅘𝅥𝅱"), - (0x1D164, "M", "𝅘𝅥𝅲"), - (0x1D165, "V"), - (0x1D173, "X"), - (0x1D17B, "V"), - (0x1D1BB, "M", "𝆹𝅥"), - (0x1D1BC, "M", "𝆺𝅥"), - (0x1D1BD, "M", "𝆹𝅥𝅮"), - (0x1D1BE, "M", "𝆺𝅥𝅮"), - (0x1D1BF, "M", "𝆹𝅥𝅯"), - (0x1D1C0, "M", "𝆺𝅥𝅯"), - (0x1D1C1, "V"), - (0x1D1EB, "X"), - (0x1D200, "V"), - (0x1D246, "X"), - (0x1D2C0, "V"), - (0x1D2D4, "X"), - (0x1D2E0, "V"), - (0x1D2F4, "X"), - (0x1D300, "V"), - (0x1D357, "X"), - (0x1D360, "V"), - (0x1D379, "X"), - (0x1D400, "M", "a"), - (0x1D401, "M", "b"), - (0x1D402, "M", "c"), - (0x1D403, "M", "d"), - (0x1D404, "M", "e"), - (0x1D405, "M", "f"), - (0x1D406, "M", "g"), - (0x1D407, "M", "h"), - (0x1D408, "M", "i"), - (0x1D409, "M", "j"), - (0x1D40A, "M", "k"), - (0x1D40B, "M", "l"), - (0x1D40C, "M", "m"), - (0x1D40D, "M", "n"), - (0x1D40E, "M", "o"), - (0x1D40F, "M", "p"), - (0x1D410, "M", "q"), - (0x1D411, "M", "r"), - (0x1D412, "M", "s"), - (0x1D413, "M", "t"), - (0x1D414, "M", "u"), - (0x1D415, "M", "v"), - (0x1D416, "M", "w"), - (0x1D417, "M", "x"), - (0x1D418, "M", "y"), - (0x1D419, "M", "z"), - (0x1D41A, "M", "a"), - (0x1D41B, "M", "b"), - (0x1D41C, "M", "c"), - (0x1D41D, "M", "d"), - (0x1D41E, "M", "e"), - (0x1D41F, "M", "f"), - (0x1D420, "M", "g"), - (0x1D421, "M", "h"), - (0x1D422, "M", "i"), - (0x1D423, "M", "j"), - (0x1D424, "M", "k"), - ] - - -def _seg_61() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D425, "M", "l"), - (0x1D426, "M", "m"), - (0x1D427, "M", "n"), - (0x1D428, "M", "o"), - (0x1D429, "M", "p"), - (0x1D42A, "M", "q"), - (0x1D42B, "M", "r"), - (0x1D42C, "M", "s"), - (0x1D42D, "M", "t"), - (0x1D42E, "M", "u"), - (0x1D42F, "M", "v"), - (0x1D430, "M", "w"), - (0x1D431, "M", "x"), - (0x1D432, "M", "y"), - (0x1D433, "M", "z"), - (0x1D434, "M", "a"), - (0x1D435, "M", "b"), - (0x1D436, "M", "c"), - (0x1D437, "M", "d"), - (0x1D438, "M", "e"), - (0x1D439, "M", "f"), - (0x1D43A, "M", "g"), - (0x1D43B, "M", "h"), - (0x1D43C, "M", "i"), - (0x1D43D, "M", "j"), - (0x1D43E, "M", "k"), - (0x1D43F, "M", "l"), - (0x1D440, "M", "m"), - (0x1D441, "M", "n"), - (0x1D442, "M", "o"), - (0x1D443, "M", "p"), - (0x1D444, "M", "q"), - (0x1D445, "M", "r"), - (0x1D446, "M", "s"), - (0x1D447, "M", "t"), - (0x1D448, "M", "u"), - (0x1D449, "M", "v"), - (0x1D44A, "M", "w"), - (0x1D44B, "M", "x"), - (0x1D44C, "M", "y"), - (0x1D44D, "M", "z"), - (0x1D44E, "M", "a"), - (0x1D44F, "M", "b"), - (0x1D450, "M", "c"), - (0x1D451, "M", "d"), - (0x1D452, "M", "e"), - (0x1D453, "M", "f"), - (0x1D454, "M", "g"), - (0x1D455, "X"), - (0x1D456, "M", "i"), - (0x1D457, "M", "j"), - (0x1D458, "M", "k"), - (0x1D459, "M", "l"), - (0x1D45A, "M", "m"), - (0x1D45B, "M", "n"), - (0x1D45C, "M", "o"), - (0x1D45D, "M", "p"), - (0x1D45E, "M", "q"), - (0x1D45F, "M", "r"), - (0x1D460, "M", "s"), - (0x1D461, "M", "t"), - (0x1D462, "M", "u"), - (0x1D463, "M", "v"), - (0x1D464, "M", "w"), - (0x1D465, "M", "x"), - (0x1D466, "M", "y"), - (0x1D467, "M", "z"), - (0x1D468, "M", "a"), - (0x1D469, "M", "b"), - (0x1D46A, "M", "c"), - (0x1D46B, "M", "d"), - (0x1D46C, "M", "e"), - (0x1D46D, "M", "f"), - (0x1D46E, "M", "g"), - (0x1D46F, "M", "h"), - (0x1D470, "M", "i"), - (0x1D471, "M", "j"), - (0x1D472, "M", "k"), - (0x1D473, "M", "l"), - (0x1D474, "M", "m"), - (0x1D475, "M", "n"), - (0x1D476, "M", "o"), - (0x1D477, "M", "p"), - (0x1D478, "M", "q"), - (0x1D479, "M", "r"), - (0x1D47A, "M", "s"), - (0x1D47B, "M", "t"), - (0x1D47C, "M", "u"), - (0x1D47D, "M", "v"), - (0x1D47E, "M", "w"), - (0x1D47F, "M", "x"), - (0x1D480, "M", "y"), - (0x1D481, "M", "z"), - (0x1D482, "M", "a"), - (0x1D483, "M", "b"), - (0x1D484, "M", "c"), - (0x1D485, "M", "d"), - (0x1D486, "M", "e"), - (0x1D487, "M", "f"), - (0x1D488, "M", "g"), - ] - - -def _seg_62() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D489, "M", "h"), - (0x1D48A, "M", "i"), - (0x1D48B, "M", "j"), - (0x1D48C, "M", "k"), - (0x1D48D, "M", "l"), - (0x1D48E, "M", "m"), - (0x1D48F, "M", "n"), - (0x1D490, "M", "o"), - (0x1D491, "M", "p"), - (0x1D492, "M", "q"), - (0x1D493, "M", "r"), - (0x1D494, "M", "s"), - (0x1D495, "M", "t"), - (0x1D496, "M", "u"), - (0x1D497, "M", "v"), - (0x1D498, "M", "w"), - (0x1D499, "M", "x"), - (0x1D49A, "M", "y"), - (0x1D49B, "M", "z"), - (0x1D49C, "M", "a"), - (0x1D49D, "X"), - (0x1D49E, "M", "c"), - (0x1D49F, "M", "d"), - (0x1D4A0, "X"), - (0x1D4A2, "M", "g"), - (0x1D4A3, "X"), - (0x1D4A5, "M", "j"), - (0x1D4A6, "M", "k"), - (0x1D4A7, "X"), - (0x1D4A9, "M", "n"), - (0x1D4AA, "M", "o"), - (0x1D4AB, "M", "p"), - (0x1D4AC, "M", "q"), - (0x1D4AD, "X"), - (0x1D4AE, "M", "s"), - (0x1D4AF, "M", "t"), - (0x1D4B0, "M", "u"), - (0x1D4B1, "M", "v"), - (0x1D4B2, "M", "w"), - (0x1D4B3, "M", "x"), - (0x1D4B4, "M", "y"), - (0x1D4B5, "M", "z"), - (0x1D4B6, "M", "a"), - (0x1D4B7, "M", "b"), - (0x1D4B8, "M", "c"), - (0x1D4B9, "M", "d"), - (0x1D4BA, "X"), - (0x1D4BB, "M", "f"), - (0x1D4BC, "X"), - (0x1D4BD, "M", "h"), - (0x1D4BE, "M", "i"), - (0x1D4BF, "M", "j"), - (0x1D4C0, "M", "k"), - (0x1D4C1, "M", "l"), - (0x1D4C2, "M", "m"), - (0x1D4C3, "M", "n"), - (0x1D4C4, "X"), - (0x1D4C5, "M", "p"), - (0x1D4C6, "M", "q"), - (0x1D4C7, "M", "r"), - (0x1D4C8, "M", "s"), - (0x1D4C9, "M", "t"), - (0x1D4CA, "M", "u"), - (0x1D4CB, "M", "v"), - (0x1D4CC, "M", "w"), - (0x1D4CD, "M", "x"), - (0x1D4CE, "M", "y"), - (0x1D4CF, "M", "z"), - (0x1D4D0, "M", "a"), - (0x1D4D1, "M", "b"), - (0x1D4D2, "M", "c"), - (0x1D4D3, "M", "d"), - (0x1D4D4, "M", "e"), - (0x1D4D5, "M", "f"), - (0x1D4D6, "M", "g"), - (0x1D4D7, "M", "h"), - (0x1D4D8, "M", "i"), - (0x1D4D9, "M", "j"), - (0x1D4DA, "M", "k"), - (0x1D4DB, "M", "l"), - (0x1D4DC, "M", "m"), - (0x1D4DD, "M", "n"), - (0x1D4DE, "M", "o"), - (0x1D4DF, "M", "p"), - (0x1D4E0, "M", "q"), - (0x1D4E1, "M", "r"), - (0x1D4E2, "M", "s"), - (0x1D4E3, "M", "t"), - (0x1D4E4, "M", "u"), - (0x1D4E5, "M", "v"), - (0x1D4E6, "M", "w"), - (0x1D4E7, "M", "x"), - (0x1D4E8, "M", "y"), - (0x1D4E9, "M", "z"), - (0x1D4EA, "M", "a"), - (0x1D4EB, "M", "b"), - (0x1D4EC, "M", "c"), - (0x1D4ED, "M", "d"), - (0x1D4EE, "M", "e"), - (0x1D4EF, "M", "f"), - ] - - -def _seg_63() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D4F0, "M", "g"), - (0x1D4F1, "M", "h"), - (0x1D4F2, "M", "i"), - (0x1D4F3, "M", "j"), - (0x1D4F4, "M", "k"), - (0x1D4F5, "M", "l"), - (0x1D4F6, "M", "m"), - (0x1D4F7, "M", "n"), - (0x1D4F8, "M", "o"), - (0x1D4F9, "M", "p"), - (0x1D4FA, "M", "q"), - (0x1D4FB, "M", "r"), - (0x1D4FC, "M", "s"), - (0x1D4FD, "M", "t"), - (0x1D4FE, "M", "u"), - (0x1D4FF, "M", "v"), - (0x1D500, "M", "w"), - (0x1D501, "M", "x"), - (0x1D502, "M", "y"), - (0x1D503, "M", "z"), - (0x1D504, "M", "a"), - (0x1D505, "M", "b"), - (0x1D506, "X"), - (0x1D507, "M", "d"), - (0x1D508, "M", "e"), - (0x1D509, "M", "f"), - (0x1D50A, "M", "g"), - (0x1D50B, "X"), - (0x1D50D, "M", "j"), - (0x1D50E, "M", "k"), - (0x1D50F, "M", "l"), - (0x1D510, "M", "m"), - (0x1D511, "M", "n"), - (0x1D512, "M", "o"), - (0x1D513, "M", "p"), - (0x1D514, "M", "q"), - (0x1D515, "X"), - (0x1D516, "M", "s"), - (0x1D517, "M", "t"), - (0x1D518, "M", "u"), - (0x1D519, "M", "v"), - (0x1D51A, "M", "w"), - (0x1D51B, "M", "x"), - (0x1D51C, "M", "y"), - (0x1D51D, "X"), - (0x1D51E, "M", "a"), - (0x1D51F, "M", "b"), - (0x1D520, "M", "c"), - (0x1D521, "M", "d"), - (0x1D522, "M", "e"), - (0x1D523, "M", "f"), - (0x1D524, "M", "g"), - (0x1D525, "M", "h"), - (0x1D526, "M", "i"), - (0x1D527, "M", "j"), - (0x1D528, "M", "k"), - (0x1D529, "M", "l"), - (0x1D52A, "M", "m"), - (0x1D52B, "M", "n"), - (0x1D52C, "M", "o"), - (0x1D52D, "M", "p"), - (0x1D52E, "M", "q"), - (0x1D52F, "M", "r"), - (0x1D530, "M", "s"), - (0x1D531, "M", "t"), - (0x1D532, "M", "u"), - (0x1D533, "M", "v"), - (0x1D534, "M", "w"), - (0x1D535, "M", "x"), - (0x1D536, "M", "y"), - (0x1D537, "M", "z"), - (0x1D538, "M", "a"), - (0x1D539, "M", "b"), - (0x1D53A, "X"), - (0x1D53B, "M", "d"), - (0x1D53C, "M", "e"), - (0x1D53D, "M", "f"), - (0x1D53E, "M", "g"), - (0x1D53F, "X"), - (0x1D540, "M", "i"), - (0x1D541, "M", "j"), - (0x1D542, "M", "k"), - (0x1D543, "M", "l"), - (0x1D544, "M", "m"), - (0x1D545, "X"), - (0x1D546, "M", "o"), - (0x1D547, "X"), - (0x1D54A, "M", "s"), - (0x1D54B, "M", "t"), - (0x1D54C, "M", "u"), - (0x1D54D, "M", "v"), - (0x1D54E, "M", "w"), - (0x1D54F, "M", "x"), - (0x1D550, "M", "y"), - (0x1D551, "X"), - (0x1D552, "M", "a"), - (0x1D553, "M", "b"), - (0x1D554, "M", "c"), - (0x1D555, "M", "d"), - (0x1D556, "M", "e"), - ] - - -def _seg_64() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D557, "M", "f"), - (0x1D558, "M", "g"), - (0x1D559, "M", "h"), - (0x1D55A, "M", "i"), - (0x1D55B, "M", "j"), - (0x1D55C, "M", "k"), - (0x1D55D, "M", "l"), - (0x1D55E, "M", "m"), - (0x1D55F, "M", "n"), - (0x1D560, "M", "o"), - (0x1D561, "M", "p"), - (0x1D562, "M", "q"), - (0x1D563, "M", "r"), - (0x1D564, "M", "s"), - (0x1D565, "M", "t"), - (0x1D566, "M", "u"), - (0x1D567, "M", "v"), - (0x1D568, "M", "w"), - (0x1D569, "M", "x"), - (0x1D56A, "M", "y"), - (0x1D56B, "M", "z"), - (0x1D56C, "M", "a"), - (0x1D56D, "M", "b"), - (0x1D56E, "M", "c"), - (0x1D56F, "M", "d"), - (0x1D570, "M", "e"), - (0x1D571, "M", "f"), - (0x1D572, "M", "g"), - (0x1D573, "M", "h"), - (0x1D574, "M", "i"), - (0x1D575, "M", "j"), - (0x1D576, "M", "k"), - (0x1D577, "M", "l"), - (0x1D578, "M", "m"), - (0x1D579, "M", "n"), - (0x1D57A, "M", "o"), - (0x1D57B, "M", "p"), - (0x1D57C, "M", "q"), - (0x1D57D, "M", "r"), - (0x1D57E, "M", "s"), - (0x1D57F, "M", "t"), - (0x1D580, "M", "u"), - (0x1D581, "M", "v"), - (0x1D582, "M", "w"), - (0x1D583, "M", "x"), - (0x1D584, "M", "y"), - (0x1D585, "M", "z"), - (0x1D586, "M", "a"), - (0x1D587, "M", "b"), - (0x1D588, "M", "c"), - (0x1D589, "M", "d"), - (0x1D58A, "M", "e"), - (0x1D58B, "M", "f"), - (0x1D58C, "M", "g"), - (0x1D58D, "M", "h"), - (0x1D58E, "M", "i"), - (0x1D58F, "M", "j"), - (0x1D590, "M", "k"), - (0x1D591, "M", "l"), - (0x1D592, "M", "m"), - (0x1D593, "M", "n"), - (0x1D594, "M", "o"), - (0x1D595, "M", "p"), - (0x1D596, "M", "q"), - (0x1D597, "M", "r"), - (0x1D598, "M", "s"), - (0x1D599, "M", "t"), - (0x1D59A, "M", "u"), - (0x1D59B, "M", "v"), - (0x1D59C, "M", "w"), - (0x1D59D, "M", "x"), - (0x1D59E, "M", "y"), - (0x1D59F, "M", "z"), - (0x1D5A0, "M", "a"), - (0x1D5A1, "M", "b"), - (0x1D5A2, "M", "c"), - (0x1D5A3, "M", "d"), - (0x1D5A4, "M", "e"), - (0x1D5A5, "M", "f"), - (0x1D5A6, "M", "g"), - (0x1D5A7, "M", "h"), - (0x1D5A8, "M", "i"), - (0x1D5A9, "M", "j"), - (0x1D5AA, "M", "k"), - (0x1D5AB, "M", "l"), - (0x1D5AC, "M", "m"), - (0x1D5AD, "M", "n"), - (0x1D5AE, "M", "o"), - (0x1D5AF, "M", "p"), - (0x1D5B0, "M", "q"), - (0x1D5B1, "M", "r"), - (0x1D5B2, "M", "s"), - (0x1D5B3, "M", "t"), - (0x1D5B4, "M", "u"), - (0x1D5B5, "M", "v"), - (0x1D5B6, "M", "w"), - (0x1D5B7, "M", "x"), - (0x1D5B8, "M", "y"), - (0x1D5B9, "M", "z"), - (0x1D5BA, "M", "a"), - ] - - -def _seg_65() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D5BB, "M", "b"), - (0x1D5BC, "M", "c"), - (0x1D5BD, "M", "d"), - (0x1D5BE, "M", "e"), - (0x1D5BF, "M", "f"), - (0x1D5C0, "M", "g"), - (0x1D5C1, "M", "h"), - (0x1D5C2, "M", "i"), - (0x1D5C3, "M", "j"), - (0x1D5C4, "M", "k"), - (0x1D5C5, "M", "l"), - (0x1D5C6, "M", "m"), - (0x1D5C7, "M", "n"), - (0x1D5C8, "M", "o"), - (0x1D5C9, "M", "p"), - (0x1D5CA, "M", "q"), - (0x1D5CB, "M", "r"), - (0x1D5CC, "M", "s"), - (0x1D5CD, "M", "t"), - (0x1D5CE, "M", "u"), - (0x1D5CF, "M", "v"), - (0x1D5D0, "M", "w"), - (0x1D5D1, "M", "x"), - (0x1D5D2, "M", "y"), - (0x1D5D3, "M", "z"), - (0x1D5D4, "M", "a"), - (0x1D5D5, "M", "b"), - (0x1D5D6, "M", "c"), - (0x1D5D7, "M", "d"), - (0x1D5D8, "M", "e"), - (0x1D5D9, "M", "f"), - (0x1D5DA, "M", "g"), - (0x1D5DB, "M", "h"), - (0x1D5DC, "M", "i"), - (0x1D5DD, "M", "j"), - (0x1D5DE, "M", "k"), - (0x1D5DF, "M", "l"), - (0x1D5E0, "M", "m"), - (0x1D5E1, "M", "n"), - (0x1D5E2, "M", "o"), - (0x1D5E3, "M", "p"), - (0x1D5E4, "M", "q"), - (0x1D5E5, "M", "r"), - (0x1D5E6, "M", "s"), - (0x1D5E7, "M", "t"), - (0x1D5E8, "M", "u"), - (0x1D5E9, "M", "v"), - (0x1D5EA, "M", "w"), - (0x1D5EB, "M", "x"), - (0x1D5EC, "M", "y"), - (0x1D5ED, "M", "z"), - (0x1D5EE, "M", "a"), - (0x1D5EF, "M", "b"), - (0x1D5F0, "M", "c"), - (0x1D5F1, "M", "d"), - (0x1D5F2, "M", "e"), - (0x1D5F3, "M", "f"), - (0x1D5F4, "M", "g"), - (0x1D5F5, "M", "h"), - (0x1D5F6, "M", "i"), - (0x1D5F7, "M", "j"), - (0x1D5F8, "M", "k"), - (0x1D5F9, "M", "l"), - (0x1D5FA, "M", "m"), - (0x1D5FB, "M", "n"), - (0x1D5FC, "M", "o"), - (0x1D5FD, "M", "p"), - (0x1D5FE, "M", "q"), - (0x1D5FF, "M", "r"), - (0x1D600, "M", "s"), - (0x1D601, "M", "t"), - (0x1D602, "M", "u"), - (0x1D603, "M", "v"), - (0x1D604, "M", "w"), - (0x1D605, "M", "x"), - (0x1D606, "M", "y"), - (0x1D607, "M", "z"), - (0x1D608, "M", "a"), - (0x1D609, "M", "b"), - (0x1D60A, "M", "c"), - (0x1D60B, "M", "d"), - (0x1D60C, "M", "e"), - (0x1D60D, "M", "f"), - (0x1D60E, "M", "g"), - (0x1D60F, "M", "h"), - (0x1D610, "M", "i"), - (0x1D611, "M", "j"), - (0x1D612, "M", "k"), - (0x1D613, "M", "l"), - (0x1D614, "M", "m"), - (0x1D615, "M", "n"), - (0x1D616, "M", "o"), - (0x1D617, "M", "p"), - (0x1D618, "M", "q"), - (0x1D619, "M", "r"), - (0x1D61A, "M", "s"), - (0x1D61B, "M", "t"), - (0x1D61C, "M", "u"), - (0x1D61D, "M", "v"), - (0x1D61E, "M", "w"), - ] - - -def _seg_66() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D61F, "M", "x"), - (0x1D620, "M", "y"), - (0x1D621, "M", "z"), - (0x1D622, "M", "a"), - (0x1D623, "M", "b"), - (0x1D624, "M", "c"), - (0x1D625, "M", "d"), - (0x1D626, "M", "e"), - (0x1D627, "M", "f"), - (0x1D628, "M", "g"), - (0x1D629, "M", "h"), - (0x1D62A, "M", "i"), - (0x1D62B, "M", "j"), - (0x1D62C, "M", "k"), - (0x1D62D, "M", "l"), - (0x1D62E, "M", "m"), - (0x1D62F, "M", "n"), - (0x1D630, "M", "o"), - (0x1D631, "M", "p"), - (0x1D632, "M", "q"), - (0x1D633, "M", "r"), - (0x1D634, "M", "s"), - (0x1D635, "M", "t"), - (0x1D636, "M", "u"), - (0x1D637, "M", "v"), - (0x1D638, "M", "w"), - (0x1D639, "M", "x"), - (0x1D63A, "M", "y"), - (0x1D63B, "M", "z"), - (0x1D63C, "M", "a"), - (0x1D63D, "M", "b"), - (0x1D63E, "M", "c"), - (0x1D63F, "M", "d"), - (0x1D640, "M", "e"), - (0x1D641, "M", "f"), - (0x1D642, "M", "g"), - (0x1D643, "M", "h"), - (0x1D644, "M", "i"), - (0x1D645, "M", "j"), - (0x1D646, "M", "k"), - (0x1D647, "M", "l"), - (0x1D648, "M", "m"), - (0x1D649, "M", "n"), - (0x1D64A, "M", "o"), - (0x1D64B, "M", "p"), - (0x1D64C, "M", "q"), - (0x1D64D, "M", "r"), - (0x1D64E, "M", "s"), - (0x1D64F, "M", "t"), - (0x1D650, "M", "u"), - (0x1D651, "M", "v"), - (0x1D652, "M", "w"), - (0x1D653, "M", "x"), - (0x1D654, "M", "y"), - (0x1D655, "M", "z"), - (0x1D656, "M", "a"), - (0x1D657, "M", "b"), - (0x1D658, "M", "c"), - (0x1D659, "M", "d"), - (0x1D65A, "M", "e"), - (0x1D65B, "M", "f"), - (0x1D65C, "M", "g"), - (0x1D65D, "M", "h"), - (0x1D65E, "M", "i"), - (0x1D65F, "M", "j"), - (0x1D660, "M", "k"), - (0x1D661, "M", "l"), - (0x1D662, "M", "m"), - (0x1D663, "M", "n"), - (0x1D664, "M", "o"), - (0x1D665, "M", "p"), - (0x1D666, "M", "q"), - (0x1D667, "M", "r"), - (0x1D668, "M", "s"), - (0x1D669, "M", "t"), - (0x1D66A, "M", "u"), - (0x1D66B, "M", "v"), - (0x1D66C, "M", "w"), - (0x1D66D, "M", "x"), - (0x1D66E, "M", "y"), - (0x1D66F, "M", "z"), - (0x1D670, "M", "a"), - (0x1D671, "M", "b"), - (0x1D672, "M", "c"), - (0x1D673, "M", "d"), - (0x1D674, "M", "e"), - (0x1D675, "M", "f"), - (0x1D676, "M", "g"), - (0x1D677, "M", "h"), - (0x1D678, "M", "i"), - (0x1D679, "M", "j"), - (0x1D67A, "M", "k"), - (0x1D67B, "M", "l"), - (0x1D67C, "M", "m"), - (0x1D67D, "M", "n"), - (0x1D67E, "M", "o"), - (0x1D67F, "M", "p"), - (0x1D680, "M", "q"), - (0x1D681, "M", "r"), - (0x1D682, "M", "s"), - ] - - -def _seg_67() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D683, "M", "t"), - (0x1D684, "M", "u"), - (0x1D685, "M", "v"), - (0x1D686, "M", "w"), - (0x1D687, "M", "x"), - (0x1D688, "M", "y"), - (0x1D689, "M", "z"), - (0x1D68A, "M", "a"), - (0x1D68B, "M", "b"), - (0x1D68C, "M", "c"), - (0x1D68D, "M", "d"), - (0x1D68E, "M", "e"), - (0x1D68F, "M", "f"), - (0x1D690, "M", "g"), - (0x1D691, "M", "h"), - (0x1D692, "M", "i"), - (0x1D693, "M", "j"), - (0x1D694, "M", "k"), - (0x1D695, "M", "l"), - (0x1D696, "M", "m"), - (0x1D697, "M", "n"), - (0x1D698, "M", "o"), - (0x1D699, "M", "p"), - (0x1D69A, "M", "q"), - (0x1D69B, "M", "r"), - (0x1D69C, "M", "s"), - (0x1D69D, "M", "t"), - (0x1D69E, "M", "u"), - (0x1D69F, "M", "v"), - (0x1D6A0, "M", "w"), - (0x1D6A1, "M", "x"), - (0x1D6A2, "M", "y"), - (0x1D6A3, "M", "z"), - (0x1D6A4, "M", "ı"), - (0x1D6A5, "M", "ȷ"), - (0x1D6A6, "X"), - (0x1D6A8, "M", "α"), - (0x1D6A9, "M", "β"), - (0x1D6AA, "M", "γ"), - (0x1D6AB, "M", "δ"), - (0x1D6AC, "M", "ε"), - (0x1D6AD, "M", "ζ"), - (0x1D6AE, "M", "η"), - (0x1D6AF, "M", "θ"), - (0x1D6B0, "M", "ι"), - (0x1D6B1, "M", "κ"), - (0x1D6B2, "M", "λ"), - (0x1D6B3, "M", "μ"), - (0x1D6B4, "M", "ν"), - (0x1D6B5, "M", "ξ"), - (0x1D6B6, "M", "ο"), - (0x1D6B7, "M", "π"), - (0x1D6B8, "M", "ρ"), - (0x1D6B9, "M", "θ"), - (0x1D6BA, "M", "σ"), - (0x1D6BB, "M", "τ"), - (0x1D6BC, "M", "υ"), - (0x1D6BD, "M", "φ"), - (0x1D6BE, "M", "χ"), - (0x1D6BF, "M", "ψ"), - (0x1D6C0, "M", "ω"), - (0x1D6C1, "M", "∇"), - (0x1D6C2, "M", "α"), - (0x1D6C3, "M", "β"), - (0x1D6C4, "M", "γ"), - (0x1D6C5, "M", "δ"), - (0x1D6C6, "M", "ε"), - (0x1D6C7, "M", "ζ"), - (0x1D6C8, "M", "η"), - (0x1D6C9, "M", "θ"), - (0x1D6CA, "M", "ι"), - (0x1D6CB, "M", "κ"), - (0x1D6CC, "M", "λ"), - (0x1D6CD, "M", "μ"), - (0x1D6CE, "M", "ν"), - (0x1D6CF, "M", "ξ"), - (0x1D6D0, "M", "ο"), - (0x1D6D1, "M", "π"), - (0x1D6D2, "M", "ρ"), - (0x1D6D3, "M", "σ"), - (0x1D6D5, "M", "τ"), - (0x1D6D6, "M", "υ"), - (0x1D6D7, "M", "φ"), - (0x1D6D8, "M", "χ"), - (0x1D6D9, "M", "ψ"), - (0x1D6DA, "M", "ω"), - (0x1D6DB, "M", "∂"), - (0x1D6DC, "M", "ε"), - (0x1D6DD, "M", "θ"), - (0x1D6DE, "M", "κ"), - (0x1D6DF, "M", "φ"), - (0x1D6E0, "M", "ρ"), - (0x1D6E1, "M", "π"), - (0x1D6E2, "M", "α"), - (0x1D6E3, "M", "β"), - (0x1D6E4, "M", "γ"), - (0x1D6E5, "M", "δ"), - (0x1D6E6, "M", "ε"), - (0x1D6E7, "M", "ζ"), - (0x1D6E8, "M", "η"), - ] - - -def _seg_68() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D6E9, "M", "θ"), - (0x1D6EA, "M", "ι"), - (0x1D6EB, "M", "κ"), - (0x1D6EC, "M", "λ"), - (0x1D6ED, "M", "μ"), - (0x1D6EE, "M", "ν"), - (0x1D6EF, "M", "ξ"), - (0x1D6F0, "M", "ο"), - (0x1D6F1, "M", "π"), - (0x1D6F2, "M", "ρ"), - (0x1D6F3, "M", "θ"), - (0x1D6F4, "M", "σ"), - (0x1D6F5, "M", "τ"), - (0x1D6F6, "M", "υ"), - (0x1D6F7, "M", "φ"), - (0x1D6F8, "M", "χ"), - (0x1D6F9, "M", "ψ"), - (0x1D6FA, "M", "ω"), - (0x1D6FB, "M", "∇"), - (0x1D6FC, "M", "α"), - (0x1D6FD, "M", "β"), - (0x1D6FE, "M", "γ"), - (0x1D6FF, "M", "δ"), - (0x1D700, "M", "ε"), - (0x1D701, "M", "ζ"), - (0x1D702, "M", "η"), - (0x1D703, "M", "θ"), - (0x1D704, "M", "ι"), - (0x1D705, "M", "κ"), - (0x1D706, "M", "λ"), - (0x1D707, "M", "μ"), - (0x1D708, "M", "ν"), - (0x1D709, "M", "ξ"), - (0x1D70A, "M", "ο"), - (0x1D70B, "M", "π"), - (0x1D70C, "M", "ρ"), - (0x1D70D, "M", "σ"), - (0x1D70F, "M", "τ"), - (0x1D710, "M", "υ"), - (0x1D711, "M", "φ"), - (0x1D712, "M", "χ"), - (0x1D713, "M", "ψ"), - (0x1D714, "M", "ω"), - (0x1D715, "M", "∂"), - (0x1D716, "M", "ε"), - (0x1D717, "M", "θ"), - (0x1D718, "M", "κ"), - (0x1D719, "M", "φ"), - (0x1D71A, "M", "ρ"), - (0x1D71B, "M", "π"), - (0x1D71C, "M", "α"), - (0x1D71D, "M", "β"), - (0x1D71E, "M", "γ"), - (0x1D71F, "M", "δ"), - (0x1D720, "M", "ε"), - (0x1D721, "M", "ζ"), - (0x1D722, "M", "η"), - (0x1D723, "M", "θ"), - (0x1D724, "M", "ι"), - (0x1D725, "M", "κ"), - (0x1D726, "M", "λ"), - (0x1D727, "M", "μ"), - (0x1D728, "M", "ν"), - (0x1D729, "M", "ξ"), - (0x1D72A, "M", "ο"), - (0x1D72B, "M", "π"), - (0x1D72C, "M", "ρ"), - (0x1D72D, "M", "θ"), - (0x1D72E, "M", "σ"), - (0x1D72F, "M", "τ"), - (0x1D730, "M", "υ"), - (0x1D731, "M", "φ"), - (0x1D732, "M", "χ"), - (0x1D733, "M", "ψ"), - (0x1D734, "M", "ω"), - (0x1D735, "M", "∇"), - (0x1D736, "M", "α"), - (0x1D737, "M", "β"), - (0x1D738, "M", "γ"), - (0x1D739, "M", "δ"), - (0x1D73A, "M", "ε"), - (0x1D73B, "M", "ζ"), - (0x1D73C, "M", "η"), - (0x1D73D, "M", "θ"), - (0x1D73E, "M", "ι"), - (0x1D73F, "M", "κ"), - (0x1D740, "M", "λ"), - (0x1D741, "M", "μ"), - (0x1D742, "M", "ν"), - (0x1D743, "M", "ξ"), - (0x1D744, "M", "ο"), - (0x1D745, "M", "π"), - (0x1D746, "M", "ρ"), - (0x1D747, "M", "σ"), - (0x1D749, "M", "τ"), - (0x1D74A, "M", "υ"), - (0x1D74B, "M", "φ"), - (0x1D74C, "M", "χ"), - (0x1D74D, "M", "ψ"), - (0x1D74E, "M", "ω"), - ] - - -def _seg_69() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D74F, "M", "∂"), - (0x1D750, "M", "ε"), - (0x1D751, "M", "θ"), - (0x1D752, "M", "κ"), - (0x1D753, "M", "φ"), - (0x1D754, "M", "ρ"), - (0x1D755, "M", "π"), - (0x1D756, "M", "α"), - (0x1D757, "M", "β"), - (0x1D758, "M", "γ"), - (0x1D759, "M", "δ"), - (0x1D75A, "M", "ε"), - (0x1D75B, "M", "ζ"), - (0x1D75C, "M", "η"), - (0x1D75D, "M", "θ"), - (0x1D75E, "M", "ι"), - (0x1D75F, "M", "κ"), - (0x1D760, "M", "λ"), - (0x1D761, "M", "μ"), - (0x1D762, "M", "ν"), - (0x1D763, "M", "ξ"), - (0x1D764, "M", "ο"), - (0x1D765, "M", "π"), - (0x1D766, "M", "ρ"), - (0x1D767, "M", "θ"), - (0x1D768, "M", "σ"), - (0x1D769, "M", "τ"), - (0x1D76A, "M", "υ"), - (0x1D76B, "M", "φ"), - (0x1D76C, "M", "χ"), - (0x1D76D, "M", "ψ"), - (0x1D76E, "M", "ω"), - (0x1D76F, "M", "∇"), - (0x1D770, "M", "α"), - (0x1D771, "M", "β"), - (0x1D772, "M", "γ"), - (0x1D773, "M", "δ"), - (0x1D774, "M", "ε"), - (0x1D775, "M", "ζ"), - (0x1D776, "M", "η"), - (0x1D777, "M", "θ"), - (0x1D778, "M", "ι"), - (0x1D779, "M", "κ"), - (0x1D77A, "M", "λ"), - (0x1D77B, "M", "μ"), - (0x1D77C, "M", "ν"), - (0x1D77D, "M", "ξ"), - (0x1D77E, "M", "ο"), - (0x1D77F, "M", "π"), - (0x1D780, "M", "ρ"), - (0x1D781, "M", "σ"), - (0x1D783, "M", "τ"), - (0x1D784, "M", "υ"), - (0x1D785, "M", "φ"), - (0x1D786, "M", "χ"), - (0x1D787, "M", "ψ"), - (0x1D788, "M", "ω"), - (0x1D789, "M", "∂"), - (0x1D78A, "M", "ε"), - (0x1D78B, "M", "θ"), - (0x1D78C, "M", "κ"), - (0x1D78D, "M", "φ"), - (0x1D78E, "M", "ρ"), - (0x1D78F, "M", "π"), - (0x1D790, "M", "α"), - (0x1D791, "M", "β"), - (0x1D792, "M", "γ"), - (0x1D793, "M", "δ"), - (0x1D794, "M", "ε"), - (0x1D795, "M", "ζ"), - (0x1D796, "M", "η"), - (0x1D797, "M", "θ"), - (0x1D798, "M", "ι"), - (0x1D799, "M", "κ"), - (0x1D79A, "M", "λ"), - (0x1D79B, "M", "μ"), - (0x1D79C, "M", "ν"), - (0x1D79D, "M", "ξ"), - (0x1D79E, "M", "ο"), - (0x1D79F, "M", "π"), - (0x1D7A0, "M", "ρ"), - (0x1D7A1, "M", "θ"), - (0x1D7A2, "M", "σ"), - (0x1D7A3, "M", "τ"), - (0x1D7A4, "M", "υ"), - (0x1D7A5, "M", "φ"), - (0x1D7A6, "M", "χ"), - (0x1D7A7, "M", "ψ"), - (0x1D7A8, "M", "ω"), - (0x1D7A9, "M", "∇"), - (0x1D7AA, "M", "α"), - (0x1D7AB, "M", "β"), - (0x1D7AC, "M", "γ"), - (0x1D7AD, "M", "δ"), - (0x1D7AE, "M", "ε"), - (0x1D7AF, "M", "ζ"), - (0x1D7B0, "M", "η"), - (0x1D7B1, "M", "θ"), - (0x1D7B2, "M", "ι"), - (0x1D7B3, "M", "κ"), - ] - - -def _seg_70() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1D7B4, "M", "λ"), - (0x1D7B5, "M", "μ"), - (0x1D7B6, "M", "ν"), - (0x1D7B7, "M", "ξ"), - (0x1D7B8, "M", "ο"), - (0x1D7B9, "M", "π"), - (0x1D7BA, "M", "ρ"), - (0x1D7BB, "M", "σ"), - (0x1D7BD, "M", "τ"), - (0x1D7BE, "M", "υ"), - (0x1D7BF, "M", "φ"), - (0x1D7C0, "M", "χ"), - (0x1D7C1, "M", "ψ"), - (0x1D7C2, "M", "ω"), - (0x1D7C3, "M", "∂"), - (0x1D7C4, "M", "ε"), - (0x1D7C5, "M", "θ"), - (0x1D7C6, "M", "κ"), - (0x1D7C7, "M", "φ"), - (0x1D7C8, "M", "ρ"), - (0x1D7C9, "M", "π"), - (0x1D7CA, "M", "ϝ"), - (0x1D7CC, "X"), - (0x1D7CE, "M", "0"), - (0x1D7CF, "M", "1"), - (0x1D7D0, "M", "2"), - (0x1D7D1, "M", "3"), - (0x1D7D2, "M", "4"), - (0x1D7D3, "M", "5"), - (0x1D7D4, "M", "6"), - (0x1D7D5, "M", "7"), - (0x1D7D6, "M", "8"), - (0x1D7D7, "M", "9"), - (0x1D7D8, "M", "0"), - (0x1D7D9, "M", "1"), - (0x1D7DA, "M", "2"), - (0x1D7DB, "M", "3"), - (0x1D7DC, "M", "4"), - (0x1D7DD, "M", "5"), - (0x1D7DE, "M", "6"), - (0x1D7DF, "M", "7"), - (0x1D7E0, "M", "8"), - (0x1D7E1, "M", "9"), - (0x1D7E2, "M", "0"), - (0x1D7E3, "M", "1"), - (0x1D7E4, "M", "2"), - (0x1D7E5, "M", "3"), - (0x1D7E6, "M", "4"), - (0x1D7E7, "M", "5"), - (0x1D7E8, "M", "6"), - (0x1D7E9, "M", "7"), - (0x1D7EA, "M", "8"), - (0x1D7EB, "M", "9"), - (0x1D7EC, "M", "0"), - (0x1D7ED, "M", "1"), - (0x1D7EE, "M", "2"), - (0x1D7EF, "M", "3"), - (0x1D7F0, "M", "4"), - (0x1D7F1, "M", "5"), - (0x1D7F2, "M", "6"), - (0x1D7F3, "M", "7"), - (0x1D7F4, "M", "8"), - (0x1D7F5, "M", "9"), - (0x1D7F6, "M", "0"), - (0x1D7F7, "M", "1"), - (0x1D7F8, "M", "2"), - (0x1D7F9, "M", "3"), - (0x1D7FA, "M", "4"), - (0x1D7FB, "M", "5"), - (0x1D7FC, "M", "6"), - (0x1D7FD, "M", "7"), - (0x1D7FE, "M", "8"), - (0x1D7FF, "M", "9"), - (0x1D800, "V"), - (0x1DA8C, "X"), - (0x1DA9B, "V"), - (0x1DAA0, "X"), - (0x1DAA1, "V"), - (0x1DAB0, "X"), - (0x1DF00, "V"), - (0x1DF1F, "X"), - (0x1DF25, "V"), - (0x1DF2B, "X"), - (0x1E000, "V"), - (0x1E007, "X"), - (0x1E008, "V"), - (0x1E019, "X"), - (0x1E01B, "V"), - (0x1E022, "X"), - (0x1E023, "V"), - (0x1E025, "X"), - (0x1E026, "V"), - (0x1E02B, "X"), - (0x1E030, "M", "а"), - (0x1E031, "M", "б"), - (0x1E032, "M", "в"), - (0x1E033, "M", "г"), - (0x1E034, "M", "д"), - (0x1E035, "M", "е"), - (0x1E036, "M", "ж"), - ] - - -def _seg_71() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1E037, "M", "з"), - (0x1E038, "M", "и"), - (0x1E039, "M", "к"), - (0x1E03A, "M", "л"), - (0x1E03B, "M", "м"), - (0x1E03C, "M", "о"), - (0x1E03D, "M", "п"), - (0x1E03E, "M", "р"), - (0x1E03F, "M", "с"), - (0x1E040, "M", "т"), - (0x1E041, "M", "у"), - (0x1E042, "M", "ф"), - (0x1E043, "M", "х"), - (0x1E044, "M", "ц"), - (0x1E045, "M", "ч"), - (0x1E046, "M", "ш"), - (0x1E047, "M", "ы"), - (0x1E048, "M", "э"), - (0x1E049, "M", "ю"), - (0x1E04A, "M", "ꚉ"), - (0x1E04B, "M", "ә"), - (0x1E04C, "M", "і"), - (0x1E04D, "M", "ј"), - (0x1E04E, "M", "ө"), - (0x1E04F, "M", "ү"), - (0x1E050, "M", "ӏ"), - (0x1E051, "M", "а"), - (0x1E052, "M", "б"), - (0x1E053, "M", "в"), - (0x1E054, "M", "г"), - (0x1E055, "M", "д"), - (0x1E056, "M", "е"), - (0x1E057, "M", "ж"), - (0x1E058, "M", "з"), - (0x1E059, "M", "и"), - (0x1E05A, "M", "к"), - (0x1E05B, "M", "л"), - (0x1E05C, "M", "о"), - (0x1E05D, "M", "п"), - (0x1E05E, "M", "с"), - (0x1E05F, "M", "у"), - (0x1E060, "M", "ф"), - (0x1E061, "M", "х"), - (0x1E062, "M", "ц"), - (0x1E063, "M", "ч"), - (0x1E064, "M", "ш"), - (0x1E065, "M", "ъ"), - (0x1E066, "M", "ы"), - (0x1E067, "M", "ґ"), - (0x1E068, "M", "і"), - (0x1E069, "M", "ѕ"), - (0x1E06A, "M", "џ"), - (0x1E06B, "M", "ҫ"), - (0x1E06C, "M", "ꙑ"), - (0x1E06D, "M", "ұ"), - (0x1E06E, "X"), - (0x1E08F, "V"), - (0x1E090, "X"), - (0x1E100, "V"), - (0x1E12D, "X"), - (0x1E130, "V"), - (0x1E13E, "X"), - (0x1E140, "V"), - (0x1E14A, "X"), - (0x1E14E, "V"), - (0x1E150, "X"), - (0x1E290, "V"), - (0x1E2AF, "X"), - (0x1E2C0, "V"), - (0x1E2FA, "X"), - (0x1E2FF, "V"), - (0x1E300, "X"), - (0x1E4D0, "V"), - (0x1E4FA, "X"), - (0x1E7E0, "V"), - (0x1E7E7, "X"), - (0x1E7E8, "V"), - (0x1E7EC, "X"), - (0x1E7ED, "V"), - (0x1E7EF, "X"), - (0x1E7F0, "V"), - (0x1E7FF, "X"), - (0x1E800, "V"), - (0x1E8C5, "X"), - (0x1E8C7, "V"), - (0x1E8D7, "X"), - (0x1E900, "M", "𞤢"), - (0x1E901, "M", "𞤣"), - (0x1E902, "M", "𞤤"), - (0x1E903, "M", "𞤥"), - (0x1E904, "M", "𞤦"), - (0x1E905, "M", "𞤧"), - (0x1E906, "M", "𞤨"), - (0x1E907, "M", "𞤩"), - (0x1E908, "M", "𞤪"), - (0x1E909, "M", "𞤫"), - (0x1E90A, "M", "𞤬"), - (0x1E90B, "M", "𞤭"), - (0x1E90C, "M", "𞤮"), - (0x1E90D, "M", "𞤯"), - ] - - -def _seg_72() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1E90E, "M", "𞤰"), - (0x1E90F, "M", "𞤱"), - (0x1E910, "M", "𞤲"), - (0x1E911, "M", "𞤳"), - (0x1E912, "M", "𞤴"), - (0x1E913, "M", "𞤵"), - (0x1E914, "M", "𞤶"), - (0x1E915, "M", "𞤷"), - (0x1E916, "M", "𞤸"), - (0x1E917, "M", "𞤹"), - (0x1E918, "M", "𞤺"), - (0x1E919, "M", "𞤻"), - (0x1E91A, "M", "𞤼"), - (0x1E91B, "M", "𞤽"), - (0x1E91C, "M", "𞤾"), - (0x1E91D, "M", "𞤿"), - (0x1E91E, "M", "𞥀"), - (0x1E91F, "M", "𞥁"), - (0x1E920, "M", "𞥂"), - (0x1E921, "M", "𞥃"), - (0x1E922, "V"), - (0x1E94C, "X"), - (0x1E950, "V"), - (0x1E95A, "X"), - (0x1E95E, "V"), - (0x1E960, "X"), - (0x1EC71, "V"), - (0x1ECB5, "X"), - (0x1ED01, "V"), - (0x1ED3E, "X"), - (0x1EE00, "M", "ا"), - (0x1EE01, "M", "ب"), - (0x1EE02, "M", "ج"), - (0x1EE03, "M", "د"), - (0x1EE04, "X"), - (0x1EE05, "M", "و"), - (0x1EE06, "M", "ز"), - (0x1EE07, "M", "ح"), - (0x1EE08, "M", "ط"), - (0x1EE09, "M", "ي"), - (0x1EE0A, "M", "ك"), - (0x1EE0B, "M", "ل"), - (0x1EE0C, "M", "م"), - (0x1EE0D, "M", "ن"), - (0x1EE0E, "M", "س"), - (0x1EE0F, "M", "ع"), - (0x1EE10, "M", "ف"), - (0x1EE11, "M", "ص"), - (0x1EE12, "M", "ق"), - (0x1EE13, "M", "ر"), - (0x1EE14, "M", "ش"), - (0x1EE15, "M", "ت"), - (0x1EE16, "M", "ث"), - (0x1EE17, "M", "خ"), - (0x1EE18, "M", "ذ"), - (0x1EE19, "M", "ض"), - (0x1EE1A, "M", "ظ"), - (0x1EE1B, "M", "غ"), - (0x1EE1C, "M", "ٮ"), - (0x1EE1D, "M", "ں"), - (0x1EE1E, "M", "ڡ"), - (0x1EE1F, "M", "ٯ"), - (0x1EE20, "X"), - (0x1EE21, "M", "ب"), - (0x1EE22, "M", "ج"), - (0x1EE23, "X"), - (0x1EE24, "M", "ه"), - (0x1EE25, "X"), - (0x1EE27, "M", "ح"), - (0x1EE28, "X"), - (0x1EE29, "M", "ي"), - (0x1EE2A, "M", "ك"), - (0x1EE2B, "M", "ل"), - (0x1EE2C, "M", "م"), - (0x1EE2D, "M", "ن"), - (0x1EE2E, "M", "س"), - (0x1EE2F, "M", "ع"), - (0x1EE30, "M", "ف"), - (0x1EE31, "M", "ص"), - (0x1EE32, "M", "ق"), - (0x1EE33, "X"), - (0x1EE34, "M", "ش"), - (0x1EE35, "M", "ت"), - (0x1EE36, "M", "ث"), - (0x1EE37, "M", "خ"), - (0x1EE38, "X"), - (0x1EE39, "M", "ض"), - (0x1EE3A, "X"), - (0x1EE3B, "M", "غ"), - (0x1EE3C, "X"), - (0x1EE42, "M", "ج"), - (0x1EE43, "X"), - (0x1EE47, "M", "ح"), - (0x1EE48, "X"), - (0x1EE49, "M", "ي"), - (0x1EE4A, "X"), - (0x1EE4B, "M", "ل"), - (0x1EE4C, "X"), - (0x1EE4D, "M", "ن"), - (0x1EE4E, "M", "س"), - ] - - -def _seg_73() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1EE4F, "M", "ع"), - (0x1EE50, "X"), - (0x1EE51, "M", "ص"), - (0x1EE52, "M", "ق"), - (0x1EE53, "X"), - (0x1EE54, "M", "ش"), - (0x1EE55, "X"), - (0x1EE57, "M", "خ"), - (0x1EE58, "X"), - (0x1EE59, "M", "ض"), - (0x1EE5A, "X"), - (0x1EE5B, "M", "غ"), - (0x1EE5C, "X"), - (0x1EE5D, "M", "ں"), - (0x1EE5E, "X"), - (0x1EE5F, "M", "ٯ"), - (0x1EE60, "X"), - (0x1EE61, "M", "ب"), - (0x1EE62, "M", "ج"), - (0x1EE63, "X"), - (0x1EE64, "M", "ه"), - (0x1EE65, "X"), - (0x1EE67, "M", "ح"), - (0x1EE68, "M", "ط"), - (0x1EE69, "M", "ي"), - (0x1EE6A, "M", "ك"), - (0x1EE6B, "X"), - (0x1EE6C, "M", "م"), - (0x1EE6D, "M", "ن"), - (0x1EE6E, "M", "س"), - (0x1EE6F, "M", "ع"), - (0x1EE70, "M", "ف"), - (0x1EE71, "M", "ص"), - (0x1EE72, "M", "ق"), - (0x1EE73, "X"), - (0x1EE74, "M", "ش"), - (0x1EE75, "M", "ت"), - (0x1EE76, "M", "ث"), - (0x1EE77, "M", "خ"), - (0x1EE78, "X"), - (0x1EE79, "M", "ض"), - (0x1EE7A, "M", "ظ"), - (0x1EE7B, "M", "غ"), - (0x1EE7C, "M", "ٮ"), - (0x1EE7D, "X"), - (0x1EE7E, "M", "ڡ"), - (0x1EE7F, "X"), - (0x1EE80, "M", "ا"), - (0x1EE81, "M", "ب"), - (0x1EE82, "M", "ج"), - (0x1EE83, "M", "د"), - (0x1EE84, "M", "ه"), - (0x1EE85, "M", "و"), - (0x1EE86, "M", "ز"), - (0x1EE87, "M", "ح"), - (0x1EE88, "M", "ط"), - (0x1EE89, "M", "ي"), - (0x1EE8A, "X"), - (0x1EE8B, "M", "ل"), - (0x1EE8C, "M", "م"), - (0x1EE8D, "M", "ن"), - (0x1EE8E, "M", "س"), - (0x1EE8F, "M", "ع"), - (0x1EE90, "M", "ف"), - (0x1EE91, "M", "ص"), - (0x1EE92, "M", "ق"), - (0x1EE93, "M", "ر"), - (0x1EE94, "M", "ش"), - (0x1EE95, "M", "ت"), - (0x1EE96, "M", "ث"), - (0x1EE97, "M", "خ"), - (0x1EE98, "M", "ذ"), - (0x1EE99, "M", "ض"), - (0x1EE9A, "M", "ظ"), - (0x1EE9B, "M", "غ"), - (0x1EE9C, "X"), - (0x1EEA1, "M", "ب"), - (0x1EEA2, "M", "ج"), - (0x1EEA3, "M", "د"), - (0x1EEA4, "X"), - (0x1EEA5, "M", "و"), - (0x1EEA6, "M", "ز"), - (0x1EEA7, "M", "ح"), - (0x1EEA8, "M", "ط"), - (0x1EEA9, "M", "ي"), - (0x1EEAA, "X"), - (0x1EEAB, "M", "ل"), - (0x1EEAC, "M", "م"), - (0x1EEAD, "M", "ن"), - (0x1EEAE, "M", "س"), - (0x1EEAF, "M", "ع"), - (0x1EEB0, "M", "ف"), - (0x1EEB1, "M", "ص"), - (0x1EEB2, "M", "ق"), - (0x1EEB3, "M", "ر"), - (0x1EEB4, "M", "ش"), - (0x1EEB5, "M", "ت"), - (0x1EEB6, "M", "ث"), - (0x1EEB7, "M", "خ"), - (0x1EEB8, "M", "ذ"), - ] - - -def _seg_74() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1EEB9, "M", "ض"), - (0x1EEBA, "M", "ظ"), - (0x1EEBB, "M", "غ"), - (0x1EEBC, "X"), - (0x1EEF0, "V"), - (0x1EEF2, "X"), - (0x1F000, "V"), - (0x1F02C, "X"), - (0x1F030, "V"), - (0x1F094, "X"), - (0x1F0A0, "V"), - (0x1F0AF, "X"), - (0x1F0B1, "V"), - (0x1F0C0, "X"), - (0x1F0C1, "V"), - (0x1F0D0, "X"), - (0x1F0D1, "V"), - (0x1F0F6, "X"), - (0x1F101, "3", "0,"), - (0x1F102, "3", "1,"), - (0x1F103, "3", "2,"), - (0x1F104, "3", "3,"), - (0x1F105, "3", "4,"), - (0x1F106, "3", "5,"), - (0x1F107, "3", "6,"), - (0x1F108, "3", "7,"), - (0x1F109, "3", "8,"), - (0x1F10A, "3", "9,"), - (0x1F10B, "V"), - (0x1F110, "3", "(a)"), - (0x1F111, "3", "(b)"), - (0x1F112, "3", "(c)"), - (0x1F113, "3", "(d)"), - (0x1F114, "3", "(e)"), - (0x1F115, "3", "(f)"), - (0x1F116, "3", "(g)"), - (0x1F117, "3", "(h)"), - (0x1F118, "3", "(i)"), - (0x1F119, "3", "(j)"), - (0x1F11A, "3", "(k)"), - (0x1F11B, "3", "(l)"), - (0x1F11C, "3", "(m)"), - (0x1F11D, "3", "(n)"), - (0x1F11E, "3", "(o)"), - (0x1F11F, "3", "(p)"), - (0x1F120, "3", "(q)"), - (0x1F121, "3", "(r)"), - (0x1F122, "3", "(s)"), - (0x1F123, "3", "(t)"), - (0x1F124, "3", "(u)"), - (0x1F125, "3", "(v)"), - (0x1F126, "3", "(w)"), - (0x1F127, "3", "(x)"), - (0x1F128, "3", "(y)"), - (0x1F129, "3", "(z)"), - (0x1F12A, "M", "〔s〕"), - (0x1F12B, "M", "c"), - (0x1F12C, "M", "r"), - (0x1F12D, "M", "cd"), - (0x1F12E, "M", "wz"), - (0x1F12F, "V"), - (0x1F130, "M", "a"), - (0x1F131, "M", "b"), - (0x1F132, "M", "c"), - (0x1F133, "M", "d"), - (0x1F134, "M", "e"), - (0x1F135, "M", "f"), - (0x1F136, "M", "g"), - (0x1F137, "M", "h"), - (0x1F138, "M", "i"), - (0x1F139, "M", "j"), - (0x1F13A, "M", "k"), - (0x1F13B, "M", "l"), - (0x1F13C, "M", "m"), - (0x1F13D, "M", "n"), - (0x1F13E, "M", "o"), - (0x1F13F, "M", "p"), - (0x1F140, "M", "q"), - (0x1F141, "M", "r"), - (0x1F142, "M", "s"), - (0x1F143, "M", "t"), - (0x1F144, "M", "u"), - (0x1F145, "M", "v"), - (0x1F146, "M", "w"), - (0x1F147, "M", "x"), - (0x1F148, "M", "y"), - (0x1F149, "M", "z"), - (0x1F14A, "M", "hv"), - (0x1F14B, "M", "mv"), - (0x1F14C, "M", "sd"), - (0x1F14D, "M", "ss"), - (0x1F14E, "M", "ppv"), - (0x1F14F, "M", "wc"), - (0x1F150, "V"), - (0x1F16A, "M", "mc"), - (0x1F16B, "M", "md"), - (0x1F16C, "M", "mr"), - (0x1F16D, "V"), - (0x1F190, "M", "dj"), - (0x1F191, "V"), - ] - - -def _seg_75() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1F1AE, "X"), - (0x1F1E6, "V"), - (0x1F200, "M", "ほか"), - (0x1F201, "M", "ココ"), - (0x1F202, "M", "サ"), - (0x1F203, "X"), - (0x1F210, "M", "手"), - (0x1F211, "M", "字"), - (0x1F212, "M", "双"), - (0x1F213, "M", "デ"), - (0x1F214, "M", "二"), - (0x1F215, "M", "多"), - (0x1F216, "M", "解"), - (0x1F217, "M", "天"), - (0x1F218, "M", "交"), - (0x1F219, "M", "映"), - (0x1F21A, "M", "無"), - (0x1F21B, "M", "料"), - (0x1F21C, "M", "前"), - (0x1F21D, "M", "後"), - (0x1F21E, "M", "再"), - (0x1F21F, "M", "新"), - (0x1F220, "M", "初"), - (0x1F221, "M", "終"), - (0x1F222, "M", "生"), - (0x1F223, "M", "販"), - (0x1F224, "M", "声"), - (0x1F225, "M", "吹"), - (0x1F226, "M", "演"), - (0x1F227, "M", "投"), - (0x1F228, "M", "捕"), - (0x1F229, "M", "一"), - (0x1F22A, "M", "三"), - (0x1F22B, "M", "遊"), - (0x1F22C, "M", "左"), - (0x1F22D, "M", "中"), - (0x1F22E, "M", "右"), - (0x1F22F, "M", "指"), - (0x1F230, "M", "走"), - (0x1F231, "M", "打"), - (0x1F232, "M", "禁"), - (0x1F233, "M", "空"), - (0x1F234, "M", "合"), - (0x1F235, "M", "満"), - (0x1F236, "M", "有"), - (0x1F237, "M", "月"), - (0x1F238, "M", "申"), - (0x1F239, "M", "割"), - (0x1F23A, "M", "営"), - (0x1F23B, "M", "配"), - (0x1F23C, "X"), - (0x1F240, "M", "〔本〕"), - (0x1F241, "M", "〔三〕"), - (0x1F242, "M", "〔二〕"), - (0x1F243, "M", "〔安〕"), - (0x1F244, "M", "〔点〕"), - (0x1F245, "M", "〔打〕"), - (0x1F246, "M", "〔盗〕"), - (0x1F247, "M", "〔勝〕"), - (0x1F248, "M", "〔敗〕"), - (0x1F249, "X"), - (0x1F250, "M", "得"), - (0x1F251, "M", "可"), - (0x1F252, "X"), - (0x1F260, "V"), - (0x1F266, "X"), - (0x1F300, "V"), - (0x1F6D8, "X"), - (0x1F6DC, "V"), - (0x1F6ED, "X"), - (0x1F6F0, "V"), - (0x1F6FD, "X"), - (0x1F700, "V"), - (0x1F777, "X"), - (0x1F77B, "V"), - (0x1F7DA, "X"), - (0x1F7E0, "V"), - (0x1F7EC, "X"), - (0x1F7F0, "V"), - (0x1F7F1, "X"), - (0x1F800, "V"), - (0x1F80C, "X"), - (0x1F810, "V"), - (0x1F848, "X"), - (0x1F850, "V"), - (0x1F85A, "X"), - (0x1F860, "V"), - (0x1F888, "X"), - (0x1F890, "V"), - (0x1F8AE, "X"), - (0x1F8B0, "V"), - (0x1F8B2, "X"), - (0x1F900, "V"), - (0x1FA54, "X"), - (0x1FA60, "V"), - (0x1FA6E, "X"), - (0x1FA70, "V"), - (0x1FA7D, "X"), - (0x1FA80, "V"), - (0x1FA89, "X"), - ] - - -def _seg_76() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x1FA90, "V"), - (0x1FABE, "X"), - (0x1FABF, "V"), - (0x1FAC6, "X"), - (0x1FACE, "V"), - (0x1FADC, "X"), - (0x1FAE0, "V"), - (0x1FAE9, "X"), - (0x1FAF0, "V"), - (0x1FAF9, "X"), - (0x1FB00, "V"), - (0x1FB93, "X"), - (0x1FB94, "V"), - (0x1FBCB, "X"), - (0x1FBF0, "M", "0"), - (0x1FBF1, "M", "1"), - (0x1FBF2, "M", "2"), - (0x1FBF3, "M", "3"), - (0x1FBF4, "M", "4"), - (0x1FBF5, "M", "5"), - (0x1FBF6, "M", "6"), - (0x1FBF7, "M", "7"), - (0x1FBF8, "M", "8"), - (0x1FBF9, "M", "9"), - (0x1FBFA, "X"), - (0x20000, "V"), - (0x2A6E0, "X"), - (0x2A700, "V"), - (0x2B73A, "X"), - (0x2B740, "V"), - (0x2B81E, "X"), - (0x2B820, "V"), - (0x2CEA2, "X"), - (0x2CEB0, "V"), - (0x2EBE1, "X"), - (0x2EBF0, "V"), - (0x2EE5E, "X"), - (0x2F800, "M", "丽"), - (0x2F801, "M", "丸"), - (0x2F802, "M", "乁"), - (0x2F803, "M", "𠄢"), - (0x2F804, "M", "你"), - (0x2F805, "M", "侮"), - (0x2F806, "M", "侻"), - (0x2F807, "M", "倂"), - (0x2F808, "M", "偺"), - (0x2F809, "M", "備"), - (0x2F80A, "M", "僧"), - (0x2F80B, "M", "像"), - (0x2F80C, "M", "㒞"), - (0x2F80D, "M", "𠘺"), - (0x2F80E, "M", "免"), - (0x2F80F, "M", "兔"), - (0x2F810, "M", "兤"), - (0x2F811, "M", "具"), - (0x2F812, "M", "𠔜"), - (0x2F813, "M", "㒹"), - (0x2F814, "M", "內"), - (0x2F815, "M", "再"), - (0x2F816, "M", "𠕋"), - (0x2F817, "M", "冗"), - (0x2F818, "M", "冤"), - (0x2F819, "M", "仌"), - (0x2F81A, "M", "冬"), - (0x2F81B, "M", "况"), - (0x2F81C, "M", "𩇟"), - (0x2F81D, "M", "凵"), - (0x2F81E, "M", "刃"), - (0x2F81F, "M", "㓟"), - (0x2F820, "M", "刻"), - (0x2F821, "M", "剆"), - (0x2F822, "M", "割"), - (0x2F823, "M", "剷"), - (0x2F824, "M", "㔕"), - (0x2F825, "M", "勇"), - (0x2F826, "M", "勉"), - (0x2F827, "M", "勤"), - (0x2F828, "M", "勺"), - (0x2F829, "M", "包"), - (0x2F82A, "M", "匆"), - (0x2F82B, "M", "北"), - (0x2F82C, "M", "卉"), - (0x2F82D, "M", "卑"), - (0x2F82E, "M", "博"), - (0x2F82F, "M", "即"), - (0x2F830, "M", "卽"), - (0x2F831, "M", "卿"), - (0x2F834, "M", "𠨬"), - (0x2F835, "M", "灰"), - (0x2F836, "M", "及"), - (0x2F837, "M", "叟"), - (0x2F838, "M", "𠭣"), - (0x2F839, "M", "叫"), - (0x2F83A, "M", "叱"), - (0x2F83B, "M", "吆"), - (0x2F83C, "M", "咞"), - (0x2F83D, "M", "吸"), - (0x2F83E, "M", "呈"), - (0x2F83F, "M", "周"), - (0x2F840, "M", "咢"), - ] - - -def _seg_77() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x2F841, "M", "哶"), - (0x2F842, "M", "唐"), - (0x2F843, "M", "啓"), - (0x2F844, "M", "啣"), - (0x2F845, "M", "善"), - (0x2F847, "M", "喙"), - (0x2F848, "M", "喫"), - (0x2F849, "M", "喳"), - (0x2F84A, "M", "嗂"), - (0x2F84B, "M", "圖"), - (0x2F84C, "M", "嘆"), - (0x2F84D, "M", "圗"), - (0x2F84E, "M", "噑"), - (0x2F84F, "M", "噴"), - (0x2F850, "M", "切"), - (0x2F851, "M", "壮"), - (0x2F852, "M", "城"), - (0x2F853, "M", "埴"), - (0x2F854, "M", "堍"), - (0x2F855, "M", "型"), - (0x2F856, "M", "堲"), - (0x2F857, "M", "報"), - (0x2F858, "M", "墬"), - (0x2F859, "M", "𡓤"), - (0x2F85A, "M", "売"), - (0x2F85B, "M", "壷"), - (0x2F85C, "M", "夆"), - (0x2F85D, "M", "多"), - (0x2F85E, "M", "夢"), - (0x2F85F, "M", "奢"), - (0x2F860, "M", "𡚨"), - (0x2F861, "M", "𡛪"), - (0x2F862, "M", "姬"), - (0x2F863, "M", "娛"), - (0x2F864, "M", "娧"), - (0x2F865, "M", "姘"), - (0x2F866, "M", "婦"), - (0x2F867, "M", "㛮"), - (0x2F868, "X"), - (0x2F869, "M", "嬈"), - (0x2F86A, "M", "嬾"), - (0x2F86C, "M", "𡧈"), - (0x2F86D, "M", "寃"), - (0x2F86E, "M", "寘"), - (0x2F86F, "M", "寧"), - (0x2F870, "M", "寳"), - (0x2F871, "M", "𡬘"), - (0x2F872, "M", "寿"), - (0x2F873, "M", "将"), - (0x2F874, "X"), - (0x2F875, "M", "尢"), - (0x2F876, "M", "㞁"), - (0x2F877, "M", "屠"), - (0x2F878, "M", "屮"), - (0x2F879, "M", "峀"), - (0x2F87A, "M", "岍"), - (0x2F87B, "M", "𡷤"), - (0x2F87C, "M", "嵃"), - (0x2F87D, "M", "𡷦"), - (0x2F87E, "M", "嵮"), - (0x2F87F, "M", "嵫"), - (0x2F880, "M", "嵼"), - (0x2F881, "M", "巡"), - (0x2F882, "M", "巢"), - (0x2F883, "M", "㠯"), - (0x2F884, "M", "巽"), - (0x2F885, "M", "帨"), - (0x2F886, "M", "帽"), - (0x2F887, "M", "幩"), - (0x2F888, "M", "㡢"), - (0x2F889, "M", "𢆃"), - (0x2F88A, "M", "㡼"), - (0x2F88B, "M", "庰"), - (0x2F88C, "M", "庳"), - (0x2F88D, "M", "庶"), - (0x2F88E, "M", "廊"), - (0x2F88F, "M", "𪎒"), - (0x2F890, "M", "廾"), - (0x2F891, "M", "𢌱"), - (0x2F893, "M", "舁"), - (0x2F894, "M", "弢"), - (0x2F896, "M", "㣇"), - (0x2F897, "M", "𣊸"), - (0x2F898, "M", "𦇚"), - (0x2F899, "M", "形"), - (0x2F89A, "M", "彫"), - (0x2F89B, "M", "㣣"), - (0x2F89C, "M", "徚"), - (0x2F89D, "M", "忍"), - (0x2F89E, "M", "志"), - (0x2F89F, "M", "忹"), - (0x2F8A0, "M", "悁"), - (0x2F8A1, "M", "㤺"), - (0x2F8A2, "M", "㤜"), - (0x2F8A3, "M", "悔"), - (0x2F8A4, "M", "𢛔"), - (0x2F8A5, "M", "惇"), - (0x2F8A6, "M", "慈"), - (0x2F8A7, "M", "慌"), - (0x2F8A8, "M", "慎"), - ] - - -def _seg_78() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x2F8A9, "M", "慌"), - (0x2F8AA, "M", "慺"), - (0x2F8AB, "M", "憎"), - (0x2F8AC, "M", "憲"), - (0x2F8AD, "M", "憤"), - (0x2F8AE, "M", "憯"), - (0x2F8AF, "M", "懞"), - (0x2F8B0, "M", "懲"), - (0x2F8B1, "M", "懶"), - (0x2F8B2, "M", "成"), - (0x2F8B3, "M", "戛"), - (0x2F8B4, "M", "扝"), - (0x2F8B5, "M", "抱"), - (0x2F8B6, "M", "拔"), - (0x2F8B7, "M", "捐"), - (0x2F8B8, "M", "𢬌"), - (0x2F8B9, "M", "挽"), - (0x2F8BA, "M", "拼"), - (0x2F8BB, "M", "捨"), - (0x2F8BC, "M", "掃"), - (0x2F8BD, "M", "揤"), - (0x2F8BE, "M", "𢯱"), - (0x2F8BF, "M", "搢"), - (0x2F8C0, "M", "揅"), - (0x2F8C1, "M", "掩"), - (0x2F8C2, "M", "㨮"), - (0x2F8C3, "M", "摩"), - (0x2F8C4, "M", "摾"), - (0x2F8C5, "M", "撝"), - (0x2F8C6, "M", "摷"), - (0x2F8C7, "M", "㩬"), - (0x2F8C8, "M", "敏"), - (0x2F8C9, "M", "敬"), - (0x2F8CA, "M", "𣀊"), - (0x2F8CB, "M", "旣"), - (0x2F8CC, "M", "書"), - (0x2F8CD, "M", "晉"), - (0x2F8CE, "M", "㬙"), - (0x2F8CF, "M", "暑"), - (0x2F8D0, "M", "㬈"), - (0x2F8D1, "M", "㫤"), - (0x2F8D2, "M", "冒"), - (0x2F8D3, "M", "冕"), - (0x2F8D4, "M", "最"), - (0x2F8D5, "M", "暜"), - (0x2F8D6, "M", "肭"), - (0x2F8D7, "M", "䏙"), - (0x2F8D8, "M", "朗"), - (0x2F8D9, "M", "望"), - (0x2F8DA, "M", "朡"), - (0x2F8DB, "M", "杞"), - (0x2F8DC, "M", "杓"), - (0x2F8DD, "M", "𣏃"), - (0x2F8DE, "M", "㭉"), - (0x2F8DF, "M", "柺"), - (0x2F8E0, "M", "枅"), - (0x2F8E1, "M", "桒"), - (0x2F8E2, "M", "梅"), - (0x2F8E3, "M", "𣑭"), - (0x2F8E4, "M", "梎"), - (0x2F8E5, "M", "栟"), - (0x2F8E6, "M", "椔"), - (0x2F8E7, "M", "㮝"), - (0x2F8E8, "M", "楂"), - (0x2F8E9, "M", "榣"), - (0x2F8EA, "M", "槪"), - (0x2F8EB, "M", "檨"), - (0x2F8EC, "M", "𣚣"), - (0x2F8ED, "M", "櫛"), - (0x2F8EE, "M", "㰘"), - (0x2F8EF, "M", "次"), - (0x2F8F0, "M", "𣢧"), - (0x2F8F1, "M", "歔"), - (0x2F8F2, "M", "㱎"), - (0x2F8F3, "M", "歲"), - (0x2F8F4, "M", "殟"), - (0x2F8F5, "M", "殺"), - (0x2F8F6, "M", "殻"), - (0x2F8F7, "M", "𣪍"), - (0x2F8F8, "M", "𡴋"), - (0x2F8F9, "M", "𣫺"), - (0x2F8FA, "M", "汎"), - (0x2F8FB, "M", "𣲼"), - (0x2F8FC, "M", "沿"), - (0x2F8FD, "M", "泍"), - (0x2F8FE, "M", "汧"), - (0x2F8FF, "M", "洖"), - (0x2F900, "M", "派"), - (0x2F901, "M", "海"), - (0x2F902, "M", "流"), - (0x2F903, "M", "浩"), - (0x2F904, "M", "浸"), - (0x2F905, "M", "涅"), - (0x2F906, "M", "𣴞"), - (0x2F907, "M", "洴"), - (0x2F908, "M", "港"), - (0x2F909, "M", "湮"), - (0x2F90A, "M", "㴳"), - (0x2F90B, "M", "滋"), - (0x2F90C, "M", "滇"), - ] - - -def _seg_79() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x2F90D, "M", "𣻑"), - (0x2F90E, "M", "淹"), - (0x2F90F, "M", "潮"), - (0x2F910, "M", "𣽞"), - (0x2F911, "M", "𣾎"), - (0x2F912, "M", "濆"), - (0x2F913, "M", "瀹"), - (0x2F914, "M", "瀞"), - (0x2F915, "M", "瀛"), - (0x2F916, "M", "㶖"), - (0x2F917, "M", "灊"), - (0x2F918, "M", "災"), - (0x2F919, "M", "灷"), - (0x2F91A, "M", "炭"), - (0x2F91B, "M", "𠔥"), - (0x2F91C, "M", "煅"), - (0x2F91D, "M", "𤉣"), - (0x2F91E, "M", "熜"), - (0x2F91F, "X"), - (0x2F920, "M", "爨"), - (0x2F921, "M", "爵"), - (0x2F922, "M", "牐"), - (0x2F923, "M", "𤘈"), - (0x2F924, "M", "犀"), - (0x2F925, "M", "犕"), - (0x2F926, "M", "𤜵"), - (0x2F927, "M", "𤠔"), - (0x2F928, "M", "獺"), - (0x2F929, "M", "王"), - (0x2F92A, "M", "㺬"), - (0x2F92B, "M", "玥"), - (0x2F92C, "M", "㺸"), - (0x2F92E, "M", "瑇"), - (0x2F92F, "M", "瑜"), - (0x2F930, "M", "瑱"), - (0x2F931, "M", "璅"), - (0x2F932, "M", "瓊"), - (0x2F933, "M", "㼛"), - (0x2F934, "M", "甤"), - (0x2F935, "M", "𤰶"), - (0x2F936, "M", "甾"), - (0x2F937, "M", "𤲒"), - (0x2F938, "M", "異"), - (0x2F939, "M", "𢆟"), - (0x2F93A, "M", "瘐"), - (0x2F93B, "M", "𤾡"), - (0x2F93C, "M", "𤾸"), - (0x2F93D, "M", "𥁄"), - (0x2F93E, "M", "㿼"), - (0x2F93F, "M", "䀈"), - (0x2F940, "M", "直"), - (0x2F941, "M", "𥃳"), - (0x2F942, "M", "𥃲"), - (0x2F943, "M", "𥄙"), - (0x2F944, "M", "𥄳"), - (0x2F945, "M", "眞"), - (0x2F946, "M", "真"), - (0x2F948, "M", "睊"), - (0x2F949, "M", "䀹"), - (0x2F94A, "M", "瞋"), - (0x2F94B, "M", "䁆"), - (0x2F94C, "M", "䂖"), - (0x2F94D, "M", "𥐝"), - (0x2F94E, "M", "硎"), - (0x2F94F, "M", "碌"), - (0x2F950, "M", "磌"), - (0x2F951, "M", "䃣"), - (0x2F952, "M", "𥘦"), - (0x2F953, "M", "祖"), - (0x2F954, "M", "𥚚"), - (0x2F955, "M", "𥛅"), - (0x2F956, "M", "福"), - (0x2F957, "M", "秫"), - (0x2F958, "M", "䄯"), - (0x2F959, "M", "穀"), - (0x2F95A, "M", "穊"), - (0x2F95B, "M", "穏"), - (0x2F95C, "M", "𥥼"), - (0x2F95D, "M", "𥪧"), - (0x2F95F, "X"), - (0x2F960, "M", "䈂"), - (0x2F961, "M", "𥮫"), - (0x2F962, "M", "篆"), - (0x2F963, "M", "築"), - (0x2F964, "M", "䈧"), - (0x2F965, "M", "𥲀"), - (0x2F966, "M", "糒"), - (0x2F967, "M", "䊠"), - (0x2F968, "M", "糨"), - (0x2F969, "M", "糣"), - (0x2F96A, "M", "紀"), - (0x2F96B, "M", "𥾆"), - (0x2F96C, "M", "絣"), - (0x2F96D, "M", "䌁"), - (0x2F96E, "M", "緇"), - (0x2F96F, "M", "縂"), - (0x2F970, "M", "繅"), - (0x2F971, "M", "䌴"), - (0x2F972, "M", "𦈨"), - (0x2F973, "M", "𦉇"), - ] - - -def _seg_80() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x2F974, "M", "䍙"), - (0x2F975, "M", "𦋙"), - (0x2F976, "M", "罺"), - (0x2F977, "M", "𦌾"), - (0x2F978, "M", "羕"), - (0x2F979, "M", "翺"), - (0x2F97A, "M", "者"), - (0x2F97B, "M", "𦓚"), - (0x2F97C, "M", "𦔣"), - (0x2F97D, "M", "聠"), - (0x2F97E, "M", "𦖨"), - (0x2F97F, "M", "聰"), - (0x2F980, "M", "𣍟"), - (0x2F981, "M", "䏕"), - (0x2F982, "M", "育"), - (0x2F983, "M", "脃"), - (0x2F984, "M", "䐋"), - (0x2F985, "M", "脾"), - (0x2F986, "M", "媵"), - (0x2F987, "M", "𦞧"), - (0x2F988, "M", "𦞵"), - (0x2F989, "M", "𣎓"), - (0x2F98A, "M", "𣎜"), - (0x2F98B, "M", "舁"), - (0x2F98C, "M", "舄"), - (0x2F98D, "M", "辞"), - (0x2F98E, "M", "䑫"), - (0x2F98F, "M", "芑"), - (0x2F990, "M", "芋"), - (0x2F991, "M", "芝"), - (0x2F992, "M", "劳"), - (0x2F993, "M", "花"), - (0x2F994, "M", "芳"), - (0x2F995, "M", "芽"), - (0x2F996, "M", "苦"), - (0x2F997, "M", "𦬼"), - (0x2F998, "M", "若"), - (0x2F999, "M", "茝"), - (0x2F99A, "M", "荣"), - (0x2F99B, "M", "莭"), - (0x2F99C, "M", "茣"), - (0x2F99D, "M", "莽"), - (0x2F99E, "M", "菧"), - (0x2F99F, "M", "著"), - (0x2F9A0, "M", "荓"), - (0x2F9A1, "M", "菊"), - (0x2F9A2, "M", "菌"), - (0x2F9A3, "M", "菜"), - (0x2F9A4, "M", "𦰶"), - (0x2F9A5, "M", "𦵫"), - (0x2F9A6, "M", "𦳕"), - (0x2F9A7, "M", "䔫"), - (0x2F9A8, "M", "蓱"), - (0x2F9A9, "M", "蓳"), - (0x2F9AA, "M", "蔖"), - (0x2F9AB, "M", "𧏊"), - (0x2F9AC, "M", "蕤"), - (0x2F9AD, "M", "𦼬"), - (0x2F9AE, "M", "䕝"), - (0x2F9AF, "M", "䕡"), - (0x2F9B0, "M", "𦾱"), - (0x2F9B1, "M", "𧃒"), - (0x2F9B2, "M", "䕫"), - (0x2F9B3, "M", "虐"), - (0x2F9B4, "M", "虜"), - (0x2F9B5, "M", "虧"), - (0x2F9B6, "M", "虩"), - (0x2F9B7, "M", "蚩"), - (0x2F9B8, "M", "蚈"), - (0x2F9B9, "M", "蜎"), - (0x2F9BA, "M", "蛢"), - (0x2F9BB, "M", "蝹"), - (0x2F9BC, "M", "蜨"), - (0x2F9BD, "M", "蝫"), - (0x2F9BE, "M", "螆"), - (0x2F9BF, "X"), - (0x2F9C0, "M", "蟡"), - (0x2F9C1, "M", "蠁"), - (0x2F9C2, "M", "䗹"), - (0x2F9C3, "M", "衠"), - (0x2F9C4, "M", "衣"), - (0x2F9C5, "M", "𧙧"), - (0x2F9C6, "M", "裗"), - (0x2F9C7, "M", "裞"), - (0x2F9C8, "M", "䘵"), - (0x2F9C9, "M", "裺"), - (0x2F9CA, "M", "㒻"), - (0x2F9CB, "M", "𧢮"), - (0x2F9CC, "M", "𧥦"), - (0x2F9CD, "M", "䚾"), - (0x2F9CE, "M", "䛇"), - (0x2F9CF, "M", "誠"), - (0x2F9D0, "M", "諭"), - (0x2F9D1, "M", "變"), - (0x2F9D2, "M", "豕"), - (0x2F9D3, "M", "𧲨"), - (0x2F9D4, "M", "貫"), - (0x2F9D5, "M", "賁"), - (0x2F9D6, "M", "贛"), - (0x2F9D7, "M", "起"), - ] - - -def _seg_81() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: - return [ - (0x2F9D8, "M", "𧼯"), - (0x2F9D9, "M", "𠠄"), - (0x2F9DA, "M", "跋"), - (0x2F9DB, "M", "趼"), - (0x2F9DC, "M", "跰"), - (0x2F9DD, "M", "𠣞"), - (0x2F9DE, "M", "軔"), - (0x2F9DF, "M", "輸"), - (0x2F9E0, "M", "𨗒"), - (0x2F9E1, "M", "𨗭"), - (0x2F9E2, "M", "邔"), - (0x2F9E3, "M", "郱"), - (0x2F9E4, "M", "鄑"), - (0x2F9E5, "M", "𨜮"), - (0x2F9E6, "M", "鄛"), - (0x2F9E7, "M", "鈸"), - (0x2F9E8, "M", "鋗"), - (0x2F9E9, "M", "鋘"), - (0x2F9EA, "M", "鉼"), - (0x2F9EB, "M", "鏹"), - (0x2F9EC, "M", "鐕"), - (0x2F9ED, "M", "𨯺"), - (0x2F9EE, "M", "開"), - (0x2F9EF, "M", "䦕"), - (0x2F9F0, "M", "閷"), - (0x2F9F1, "M", "𨵷"), - (0x2F9F2, "M", "䧦"), - (0x2F9F3, "M", "雃"), - (0x2F9F4, "M", "嶲"), - (0x2F9F5, "M", "霣"), - (0x2F9F6, "M", "𩅅"), - (0x2F9F7, "M", "𩈚"), - (0x2F9F8, "M", "䩮"), - (0x2F9F9, "M", "䩶"), - (0x2F9FA, "M", "韠"), - (0x2F9FB, "M", "𩐊"), - (0x2F9FC, "M", "䪲"), - (0x2F9FD, "M", "𩒖"), - (0x2F9FE, "M", "頋"), - (0x2FA00, "M", "頩"), - (0x2FA01, "M", "𩖶"), - (0x2FA02, "M", "飢"), - (0x2FA03, "M", "䬳"), - (0x2FA04, "M", "餩"), - (0x2FA05, "M", "馧"), - (0x2FA06, "M", "駂"), - (0x2FA07, "M", "駾"), - (0x2FA08, "M", "䯎"), - (0x2FA09, "M", "𩬰"), - (0x2FA0A, "M", "鬒"), - (0x2FA0B, "M", "鱀"), - (0x2FA0C, "M", "鳽"), - (0x2FA0D, "M", "䳎"), - (0x2FA0E, "M", "䳭"), - (0x2FA0F, "M", "鵧"), - (0x2FA10, "M", "𪃎"), - (0x2FA11, "M", "䳸"), - (0x2FA12, "M", "𪄅"), - (0x2FA13, "M", "𪈎"), - (0x2FA14, "M", "𪊑"), - (0x2FA15, "M", "麻"), - (0x2FA16, "M", "䵖"), - (0x2FA17, "M", "黹"), - (0x2FA18, "M", "黾"), - (0x2FA19, "M", "鼅"), - (0x2FA1A, "M", "鼏"), - (0x2FA1B, "M", "鼖"), - (0x2FA1C, "M", "鼻"), - (0x2FA1D, "M", "𪘀"), - (0x2FA1E, "X"), - (0x30000, "V"), - (0x3134B, "X"), - (0x31350, "V"), - (0x323B0, "X"), - (0xE0100, "I"), - (0xE01F0, "X"), - ] - - -uts46data = tuple( - _seg_0() - + _seg_1() - + _seg_2() - + _seg_3() - + _seg_4() - + _seg_5() - + _seg_6() - + _seg_7() - + _seg_8() - + _seg_9() - + _seg_10() - + _seg_11() - + _seg_12() - + _seg_13() - + _seg_14() - + _seg_15() - + _seg_16() - + _seg_17() - + _seg_18() - + _seg_19() - + _seg_20() - + _seg_21() - + _seg_22() - + _seg_23() - + _seg_24() - + _seg_25() - + _seg_26() - + _seg_27() - + _seg_28() - + _seg_29() - + _seg_30() - + _seg_31() - + _seg_32() - + _seg_33() - + _seg_34() - + _seg_35() - + _seg_36() - + _seg_37() - + _seg_38() - + _seg_39() - + _seg_40() - + _seg_41() - + _seg_42() - + _seg_43() - + _seg_44() - + _seg_45() - + _seg_46() - + _seg_47() - + _seg_48() - + _seg_49() - + _seg_50() - + _seg_51() - + _seg_52() - + _seg_53() - + _seg_54() - + _seg_55() - + _seg_56() - + _seg_57() - + _seg_58() - + _seg_59() - + _seg_60() - + _seg_61() - + _seg_62() - + _seg_63() - + _seg_64() - + _seg_65() - + _seg_66() - + _seg_67() - + _seg_68() - + _seg_69() - + _seg_70() - + _seg_71() - + _seg_72() - + _seg_73() - + _seg_74() - + _seg_75() - + _seg_76() - + _seg_77() - + _seg_78() - + _seg_79() - + _seg_80() - + _seg_81() -) # type: Tuple[Union[Tuple[int, str], Tuple[int, str, str]], ...] diff --git a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/INSTALLER b/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/INSTALLER deleted file mode 100644 index a1b589e3..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/INSTALLER +++ /dev/null @@ -1 +0,0 @@ -pip diff --git a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/LICENSE b/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/LICENSE deleted file mode 100644 index 67db8588..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/LICENSE +++ /dev/null @@ -1,175 +0,0 @@ - - Apache License - Version 2.0, January 2004 - http://www.apache.org/licenses/ - - TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION - - 1. Definitions. - - "License" shall mean the terms and conditions for use, reproduction, - and distribution as defined by Sections 1 through 9 of this document. - - "Licensor" shall mean the copyright owner or entity authorized by - the copyright owner that is granting the License. - - "Legal Entity" shall mean the union of the acting entity and all - other entities that control, are controlled by, or are under common - control with that entity. For the purposes of this definition, - "control" means (i) the power, direct or indirect, to cause the - direction or management of such entity, whether by contract or - otherwise, or (ii) ownership of fifty percent (50%) or more of the - outstanding shares, or (iii) beneficial ownership of such entity. - - "You" (or "Your") shall mean an individual or Legal Entity - exercising permissions granted by this License. - - "Source" form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation - source, and configuration files. - - "Object" form shall mean any form resulting from mechanical - transformation or translation of a Source form, including but - not limited to compiled object code, generated documentation, - and conversions to other media types. - - "Work" shall mean the work of authorship, whether in Source or - Object form, made available under the License, as indicated by a - copyright notice that is included in or attached to the work - (an example is provided in the Appendix below). - - "Derivative Works" shall mean any work, whether in Source or Object - form, that is based on (or derived from) the Work and for which the - editorial revisions, annotations, elaborations, or other modifications - represent, as a whole, an original work of authorship. For the purposes - of this License, Derivative Works shall not include works that remain - separable from, or merely link (or bind by name) to the interfaces of, - the Work and Derivative Works thereof. - - "Contribution" shall mean any work of authorship, including - the original version of the Work and any modifications or additions - to that Work or Derivative Works thereof, that is intentionally - submitted to Licensor for inclusion in the Work by the copyright owner - or by an individual or Legal Entity authorized to submit on behalf of - the copyright owner. For the purposes of this definition, "submitted" - means any form of electronic, verbal, or written communication sent - to the Licensor or its representatives, including but not limited to - communication on electronic mailing lists, source code control systems, - and issue tracking systems that are managed by, or on behalf of, the - Licensor for the purpose of discussing and improving the Work, but - excluding communication that is conspicuously marked or otherwise - designated in writing by the copyright owner as "Not a Contribution." - - "Contributor" shall mean Licensor and any individual or Legal Entity - on behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work. - - 2. Grant of Copyright License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - copyright license to reproduce, prepare Derivative Works of, - publicly display, publicly perform, sublicense, and distribute the - Work and such Derivative Works in Source or Object form. - - 3. Grant of Patent License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, - use, offer to sell, sell, import, and otherwise transfer the Work, - where such license applies only to those patent claims licensable - by such Contributor that are necessarily infringed by their - Contribution(s) alone or by combination of their Contribution(s) - with the Work to which such Contribution(s) was submitted. If You - institute patent litigation against any entity (including a - cross-claim or counterclaim in a lawsuit) alleging that the Work - or a Contribution incorporated within the Work constitutes direct - or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate - as of the date such litigation is filed. - - 4. Redistribution. You may reproduce and distribute copies of the - Work or Derivative Works thereof in any medium, with or without - modifications, and in Source or Object form, provided that You - meet the following conditions: - - (a) You must give any other recipients of the Work or - Derivative Works a copy of this License; and - - (b) You must cause any modified files to carry prominent notices - stating that You changed the files; and - - (c) You must retain, in the Source form of any Derivative Works - that You distribute, all copyright, patent, trademark, and - attribution notices from the Source form of the Work, - excluding those notices that do not pertain to any part of - the Derivative Works; and - - (d) If the Work includes a "NOTICE" text file as part of its - distribution, then any Derivative Works that You distribute must - include a readable copy of the attribution notices contained - within such NOTICE file, excluding those notices that do not - pertain to any part of the Derivative Works, in at least one - of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or - documentation, if provided along with the Derivative Works; or, - within a display generated by the Derivative Works, if and - wherever such third-party notices normally appear. The contents - of the NOTICE file are for informational purposes only and - do not modify the License. You may add Your own attribution - notices within Derivative Works that You distribute, alongside - or as an addendum to the NOTICE text from the Work, provided - that such additional attribution notices cannot be construed - as modifying the License. - - You may add Your own copyright statement to Your modifications and - may provide additional or different license terms and conditions - for use, reproduction, or distribution of Your modifications, or - for any such Derivative Works as a whole, provided Your use, - reproduction, and distribution of the Work otherwise complies with - the conditions stated in this License. - - 5. Submission of Contributions. Unless You explicitly state otherwise, - any Contribution intentionally submitted for inclusion in the Work - by You to the Licensor shall be under the terms and conditions of - this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify - the terms of any separate license agreement you may have executed - with Licensor regarding such Contributions. - - 6. Trademarks. This License does not grant permission to use the trade - names, trademarks, service marks, or product names of the Licensor, - except as required for reasonable and customary use in describing the - origin of the Work and reproducing the content of the NOTICE file. - - 7. Disclaimer of Warranty. Unless required by applicable law or - agreed to in writing, Licensor provides the Work (and each - Contributor provides its Contributions) on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or - implied, including, without limitation, any warranties or conditions - of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A - PARTICULAR PURPOSE. You are solely responsible for determining the - appropriateness of using or redistributing the Work and assume any - risks associated with Your exercise of permissions under this License. - - 8. Limitation of Liability. In no event and under no legal theory, - whether in tort (including negligence), contract, or otherwise, - unless required by applicable law (such as deliberate and grossly - negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a - result of this License or out of the use or inability to use the - Work (including but not limited to damages for loss of goodwill, - work stoppage, computer failure or malfunction, or any and all - other commercial damages or losses), even if such Contributor - has been advised of the possibility of such damages. - - 9. Accepting Warranty or Additional Liability. While redistributing - the Work or Derivative Works thereof, You may choose to offer, - and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this - License. However, in accepting such obligations, You may act only - on Your own behalf and on Your sole responsibility, not on behalf - of any other Contributor, and only if You agree to indemnify, - defend, and hold each Contributor harmless for any liability - incurred by, or claims asserted against, such Contributor by reason - of your accepting any such warranty or additional liability. diff --git a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/METADATA b/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/METADATA deleted file mode 100644 index 05779fa2..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/METADATA +++ /dev/null @@ -1,122 +0,0 @@ -Metadata-Version: 2.1 -Name: requests -Version: 2.31.0 -Summary: Python HTTP for Humans. -Home-page: https://requests.readthedocs.io -Author: Kenneth Reitz -Author-email: me@kennethreitz.org -License: Apache 2.0 -Project-URL: Documentation, https://requests.readthedocs.io -Project-URL: Source, https://github.com/psf/requests -Platform: UNKNOWN -Classifier: Development Status :: 5 - Production/Stable -Classifier: Environment :: Web Environment -Classifier: Intended Audience :: Developers -Classifier: License :: OSI Approved :: Apache Software License -Classifier: Natural Language :: English -Classifier: Operating System :: OS Independent -Classifier: Programming Language :: Python -Classifier: Programming Language :: Python :: 3 -Classifier: Programming Language :: Python :: 3.7 -Classifier: Programming Language :: Python :: 3.8 -Classifier: Programming Language :: Python :: 3.9 -Classifier: Programming Language :: Python :: 3.10 -Classifier: Programming Language :: Python :: 3.11 -Classifier: Programming Language :: Python :: 3 :: Only -Classifier: Programming Language :: Python :: Implementation :: CPython -Classifier: Programming Language :: Python :: Implementation :: PyPy -Classifier: Topic :: Internet :: WWW/HTTP -Classifier: Topic :: Software Development :: Libraries -Requires-Python: >=3.7 -Description-Content-Type: text/markdown -License-File: LICENSE -Requires-Dist: charset-normalizer (<4,>=2) -Requires-Dist: idna (<4,>=2.5) -Requires-Dist: urllib3 (<3,>=1.21.1) -Requires-Dist: certifi (>=2017.4.17) -Provides-Extra: security -Provides-Extra: socks -Requires-Dist: PySocks (!=1.5.7,>=1.5.6) ; extra == 'socks' -Provides-Extra: use_chardet_on_py3 -Requires-Dist: chardet (<6,>=3.0.2) ; extra == 'use_chardet_on_py3' - -# Requests - -**Requests** is a simple, yet elegant, HTTP library. - -```python ->>> import requests ->>> r = requests.get('https://httpbin.org/basic-auth/user/pass', auth=('user', 'pass')) ->>> r.status_code -200 ->>> r.headers['content-type'] -'application/json; charset=utf8' ->>> r.encoding -'utf-8' ->>> r.text -'{"authenticated": true, ...' ->>> r.json() -{'authenticated': True, ...} -``` - -Requests allows you to send HTTP/1.1 requests extremely easily. There’s no need to manually add query strings to your URLs, or to form-encode your `PUT` & `POST` data — but nowadays, just use the `json` method! - -Requests is one of the most downloaded Python packages today, pulling in around `30M downloads / week`— according to GitHub, Requests is currently [depended upon](https://github.com/psf/requests/network/dependents?package_id=UGFja2FnZS01NzA4OTExNg%3D%3D) by `1,000,000+` repositories. You may certainly put your trust in this code. - -[![Downloads](https://pepy.tech/badge/requests/month)](https://pepy.tech/project/requests) -[![Supported Versions](https://img.shields.io/pypi/pyversions/requests.svg)](https://pypi.org/project/requests) -[![Contributors](https://img.shields.io/github/contributors/psf/requests.svg)](https://github.com/psf/requests/graphs/contributors) - -## Installing Requests and Supported Versions - -Requests is available on PyPI: - -```console -$ python -m pip install requests -``` - -Requests officially supports Python 3.7+. - -## Supported Features & Best–Practices - -Requests is ready for the demands of building robust and reliable HTTP–speaking applications, for the needs of today. - -- Keep-Alive & Connection Pooling -- International Domains and URLs -- Sessions with Cookie Persistence -- Browser-style TLS/SSL Verification -- Basic & Digest Authentication -- Familiar `dict`–like Cookies -- Automatic Content Decompression and Decoding -- Multi-part File Uploads -- SOCKS Proxy Support -- Connection Timeouts -- Streaming Downloads -- Automatic honoring of `.netrc` -- Chunked HTTP Requests - -## API Reference and User Guide available on [Read the Docs](https://requests.readthedocs.io) - -[![Read the Docs](https://raw.githubusercontent.com/psf/requests/main/ext/ss.png)](https://requests.readthedocs.io) - -## Cloning the repository - -When cloning the Requests repository, you may need to add the `-c -fetch.fsck.badTimezone=ignore` flag to avoid an error about a bad commit (see -[this issue](https://github.com/psf/requests/issues/2690) for more background): - -```shell -git clone -c fetch.fsck.badTimezone=ignore https://github.com/psf/requests.git -``` - -You can also apply this setting to your global Git config: - -```shell -git config --global fetch.fsck.badTimezone ignore -``` - ---- - -[![Kenneth Reitz](https://raw.githubusercontent.com/psf/requests/main/ext/kr.png)](https://kennethreitz.org) [![Python Software Foundation](https://raw.githubusercontent.com/psf/requests/main/ext/psf.png)](https://www.python.org/psf) - - diff --git a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/RECORD b/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/RECORD deleted file mode 100644 index 5d5bdf5d..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/RECORD +++ /dev/null @@ -1,43 +0,0 @@ -requests-2.31.0.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4 -requests-2.31.0.dist-info/LICENSE,sha256=CeipvOyAZxBGUsFoaFqwkx54aPnIKEtm9a5u2uXxEws,10142 -requests-2.31.0.dist-info/METADATA,sha256=eCPokOnbb0FROLrfl0R5EpDvdufsb9CaN4noJH__54I,4634 -requests-2.31.0.dist-info/RECORD,, -requests-2.31.0.dist-info/REQUESTED,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 -requests-2.31.0.dist-info/WHEEL,sha256=pkctZYzUS4AYVn6dJ-7367OJZivF2e8RA9b_ZBjif18,92 -requests-2.31.0.dist-info/top_level.txt,sha256=fMSVmHfb5rbGOo6xv-O_tUX6j-WyixssE-SnwcDRxNQ,9 -requests/__init__.py,sha256=LvmKhjIz8mHaKXthC2Mv5ykZ1d92voyf3oJpd-VuAig,4963 -requests/__pycache__/__init__.cpython-37.pyc,, -requests/__pycache__/__version__.cpython-37.pyc,, -requests/__pycache__/_internal_utils.cpython-37.pyc,, -requests/__pycache__/adapters.cpython-37.pyc,, -requests/__pycache__/api.cpython-37.pyc,, -requests/__pycache__/auth.cpython-37.pyc,, -requests/__pycache__/certs.cpython-37.pyc,, -requests/__pycache__/compat.cpython-37.pyc,, -requests/__pycache__/cookies.cpython-37.pyc,, -requests/__pycache__/exceptions.cpython-37.pyc,, -requests/__pycache__/help.cpython-37.pyc,, -requests/__pycache__/hooks.cpython-37.pyc,, -requests/__pycache__/models.cpython-37.pyc,, -requests/__pycache__/packages.cpython-37.pyc,, -requests/__pycache__/sessions.cpython-37.pyc,, -requests/__pycache__/status_codes.cpython-37.pyc,, -requests/__pycache__/structures.cpython-37.pyc,, -requests/__pycache__/utils.cpython-37.pyc,, -requests/__version__.py,sha256=ssI3Ezt7PaxgkOW45GhtwPUclo_SO_ygtIm4A74IOfw,435 -requests/_internal_utils.py,sha256=nMQymr4hs32TqVo5AbCrmcJEhvPUh7xXlluyqwslLiQ,1495 -requests/adapters.py,sha256=v_FmjU5KZ76k-YttShZYB5RprIzhhL8Y3zgW9p4eBQ8,19553 -requests/api.py,sha256=q61xcXq4tmiImrvcSVLTbFyCiD2F-L_-hWKGbz4y8vg,6449 -requests/auth.py,sha256=h-HLlVx9j8rKV5hfSAycP2ApOSglTz77R0tz7qCbbEE,10187 -requests/certs.py,sha256=Z9Sb410Anv6jUFTyss0jFFhU6xst8ctELqfy8Ev23gw,429 -requests/compat.py,sha256=yxntVOSEHGMrn7FNr_32EEam1ZNAdPRdSE13_yaHzTk,1451 -requests/cookies.py,sha256=kD3kNEcCj-mxbtf5fJsSaT86eGoEYpD3X0CSgpzl7BM,18560 -requests/exceptions.py,sha256=DhveFBclVjTRxhRduVpO-GbMYMID2gmjdLfNEqNpI_U,3811 -requests/help.py,sha256=gPX5d_H7Xd88aDABejhqGgl9B1VFRTt5BmiYvL3PzIQ,3875 -requests/hooks.py,sha256=CiuysiHA39V5UfcCBXFIx83IrDpuwfN9RcTUgv28ftQ,733 -requests/models.py,sha256=-DlKi0or8gFAM6VzutobXvvBW_2wrJuOF5NfndTIddA,35223 -requests/packages.py,sha256=DXgv-FJIczZITmv0vEBAhWj4W-5CGCIN_ksvgR17Dvs,957 -requests/sessions.py,sha256=-LvTzrPtetSTrR3buxu4XhdgMrJFLB1q5D7P--L2Xhw,30373 -requests/status_codes.py,sha256=FvHmT5uH-_uimtRz5hH9VCbt7VV-Nei2J9upbej6j8g,4235 -requests/structures.py,sha256=-IbmhVz06S-5aPSZuUthZ6-6D9XOjRuTXHOabY041XM,2912 -requests/utils.py,sha256=6sx2X3cIVA8BgWOg8odxFy-_lbWDFETU8HI4fU4Rmqw,33448 diff --git a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/REQUESTED b/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/REQUESTED deleted file mode 100644 index e69de29b..00000000 diff --git a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/WHEEL b/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/WHEEL deleted file mode 100644 index 1f37c02f..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/WHEEL +++ /dev/null @@ -1,5 +0,0 @@ -Wheel-Version: 1.0 -Generator: bdist_wheel (0.40.0) -Root-Is-Purelib: true -Tag: py3-none-any - diff --git a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/top_level.txt b/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/top_level.txt deleted file mode 100644 index f2293605..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests-2.31.0.dist-info/top_level.txt +++ /dev/null @@ -1 +0,0 @@ -requests diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/__init__.py b/vscode-extension/context-engine-uploader/python_libs/requests/__init__.py deleted file mode 100644 index 300a16c5..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/__init__.py +++ /dev/null @@ -1,180 +0,0 @@ -# __ -# /__) _ _ _ _ _/ _ -# / ( (- (/ (/ (- _) / _) -# / - -""" -Requests HTTP Library -~~~~~~~~~~~~~~~~~~~~~ - -Requests is an HTTP library, written in Python, for human beings. -Basic GET usage: - - >>> import requests - >>> r = requests.get('https://www.python.org') - >>> r.status_code - 200 - >>> b'Python is a programming language' in r.content - True - -... or POST: - - >>> payload = dict(key1='value1', key2='value2') - >>> r = requests.post('https://httpbin.org/post', data=payload) - >>> print(r.text) - { - ... - "form": { - "key1": "value1", - "key2": "value2" - }, - ... - } - -The other HTTP methods are supported - see `requests.api`. Full documentation -is at . - -:copyright: (c) 2017 by Kenneth Reitz. -:license: Apache 2.0, see LICENSE for more details. -""" - -import warnings - -import urllib3 - -from .exceptions import RequestsDependencyWarning - -try: - from charset_normalizer import __version__ as charset_normalizer_version -except ImportError: - charset_normalizer_version = None - -try: - from chardet import __version__ as chardet_version -except ImportError: - chardet_version = None - - -def check_compatibility(urllib3_version, chardet_version, charset_normalizer_version): - urllib3_version = urllib3_version.split(".") - assert urllib3_version != ["dev"] # Verify urllib3 isn't installed from git. - - # Sometimes, urllib3 only reports its version as 16.1. - if len(urllib3_version) == 2: - urllib3_version.append("0") - - # Check urllib3 for compatibility. - major, minor, patch = urllib3_version # noqa: F811 - major, minor, patch = int(major), int(minor), int(patch) - # urllib3 >= 1.21.1 - assert major >= 1 - if major == 1: - assert minor >= 21 - - # Check charset_normalizer for compatibility. - if chardet_version: - major, minor, patch = chardet_version.split(".")[:3] - major, minor, patch = int(major), int(minor), int(patch) - # chardet_version >= 3.0.2, < 6.0.0 - assert (3, 0, 2) <= (major, minor, patch) < (6, 0, 0) - elif charset_normalizer_version: - major, minor, patch = charset_normalizer_version.split(".")[:3] - major, minor, patch = int(major), int(minor), int(patch) - # charset_normalizer >= 2.0.0 < 4.0.0 - assert (2, 0, 0) <= (major, minor, patch) < (4, 0, 0) - else: - raise Exception("You need either charset_normalizer or chardet installed") - - -def _check_cryptography(cryptography_version): - # cryptography < 1.3.4 - try: - cryptography_version = list(map(int, cryptography_version.split("."))) - except ValueError: - return - - if cryptography_version < [1, 3, 4]: - warning = "Old version of cryptography ({}) may cause slowdown.".format( - cryptography_version - ) - warnings.warn(warning, RequestsDependencyWarning) - - -# Check imported dependencies for compatibility. -try: - check_compatibility( - urllib3.__version__, chardet_version, charset_normalizer_version - ) -except (AssertionError, ValueError): - warnings.warn( - "urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported " - "version!".format( - urllib3.__version__, chardet_version, charset_normalizer_version - ), - RequestsDependencyWarning, - ) - -# Attempt to enable urllib3's fallback for SNI support -# if the standard library doesn't support SNI or the -# 'ssl' library isn't available. -try: - try: - import ssl - except ImportError: - ssl = None - - if not getattr(ssl, "HAS_SNI", False): - from urllib3.contrib import pyopenssl - - pyopenssl.inject_into_urllib3() - - # Check cryptography version - from cryptography import __version__ as cryptography_version - - _check_cryptography(cryptography_version) -except ImportError: - pass - -# urllib3's DependencyWarnings should be silenced. -from urllib3.exceptions import DependencyWarning - -warnings.simplefilter("ignore", DependencyWarning) - -# Set default logging handler to avoid "No handler found" warnings. -import logging -from logging import NullHandler - -from . import packages, utils -from .__version__ import ( - __author__, - __author_email__, - __build__, - __cake__, - __copyright__, - __description__, - __license__, - __title__, - __url__, - __version__, -) -from .api import delete, get, head, options, patch, post, put, request -from .exceptions import ( - ConnectionError, - ConnectTimeout, - FileModeWarning, - HTTPError, - JSONDecodeError, - ReadTimeout, - RequestException, - Timeout, - TooManyRedirects, - URLRequired, -) -from .models import PreparedRequest, Request, Response -from .sessions import Session, session -from .status_codes import codes - -logging.getLogger(__name__).addHandler(NullHandler()) - -# FileModeWarnings go off per the default. -warnings.simplefilter("default", FileModeWarning, append=True) diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/__version__.py b/vscode-extension/context-engine-uploader/python_libs/requests/__version__.py deleted file mode 100644 index 5063c3f8..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/__version__.py +++ /dev/null @@ -1,14 +0,0 @@ -# .-. .-. .-. . . .-. .-. .-. .-. -# |( |- |.| | | |- `-. | `-. -# ' ' `-' `-`.`-' `-' `-' ' `-' - -__title__ = "requests" -__description__ = "Python HTTP for Humans." -__url__ = "https://requests.readthedocs.io" -__version__ = "2.31.0" -__build__ = 0x023100 -__author__ = "Kenneth Reitz" -__author_email__ = "me@kennethreitz.org" -__license__ = "Apache 2.0" -__copyright__ = "Copyright Kenneth Reitz" -__cake__ = "\u2728 \U0001f370 \u2728" diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/_internal_utils.py b/vscode-extension/context-engine-uploader/python_libs/requests/_internal_utils.py deleted file mode 100644 index f2cf635e..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/_internal_utils.py +++ /dev/null @@ -1,50 +0,0 @@ -""" -requests._internal_utils -~~~~~~~~~~~~~~ - -Provides utility functions that are consumed internally by Requests -which depend on extremely few external helpers (such as compat) -""" -import re - -from .compat import builtin_str - -_VALID_HEADER_NAME_RE_BYTE = re.compile(rb"^[^:\s][^:\r\n]*$") -_VALID_HEADER_NAME_RE_STR = re.compile(r"^[^:\s][^:\r\n]*$") -_VALID_HEADER_VALUE_RE_BYTE = re.compile(rb"^\S[^\r\n]*$|^$") -_VALID_HEADER_VALUE_RE_STR = re.compile(r"^\S[^\r\n]*$|^$") - -_HEADER_VALIDATORS_STR = (_VALID_HEADER_NAME_RE_STR, _VALID_HEADER_VALUE_RE_STR) -_HEADER_VALIDATORS_BYTE = (_VALID_HEADER_NAME_RE_BYTE, _VALID_HEADER_VALUE_RE_BYTE) -HEADER_VALIDATORS = { - bytes: _HEADER_VALIDATORS_BYTE, - str: _HEADER_VALIDATORS_STR, -} - - -def to_native_string(string, encoding="ascii"): - """Given a string object, regardless of type, returns a representation of - that string in the native string type, encoding and decoding where - necessary. This assumes ASCII unless told otherwise. - """ - if isinstance(string, builtin_str): - out = string - else: - out = string.decode(encoding) - - return out - - -def unicode_is_ascii(u_string): - """Determine if unicode string only contains ASCII characters. - - :param str u_string: unicode string to check. Must be unicode - and not Python 2 `str`. - :rtype: bool - """ - assert isinstance(u_string, str) - try: - u_string.encode("ascii") - return True - except UnicodeEncodeError: - return False diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/adapters.py b/vscode-extension/context-engine-uploader/python_libs/requests/adapters.py deleted file mode 100644 index 78e3bb6e..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/adapters.py +++ /dev/null @@ -1,538 +0,0 @@ -""" -requests.adapters -~~~~~~~~~~~~~~~~~ - -This module contains the transport adapters that Requests uses to define -and maintain connections. -""" - -import os.path -import socket # noqa: F401 - -from urllib3.exceptions import ClosedPoolError, ConnectTimeoutError -from urllib3.exceptions import HTTPError as _HTTPError -from urllib3.exceptions import InvalidHeader as _InvalidHeader -from urllib3.exceptions import ( - LocationValueError, - MaxRetryError, - NewConnectionError, - ProtocolError, -) -from urllib3.exceptions import ProxyError as _ProxyError -from urllib3.exceptions import ReadTimeoutError, ResponseError -from urllib3.exceptions import SSLError as _SSLError -from urllib3.poolmanager import PoolManager, proxy_from_url -from urllib3.util import Timeout as TimeoutSauce -from urllib3.util import parse_url -from urllib3.util.retry import Retry - -from .auth import _basic_auth_str -from .compat import basestring, urlparse -from .cookies import extract_cookies_to_jar -from .exceptions import ( - ConnectionError, - ConnectTimeout, - InvalidHeader, - InvalidProxyURL, - InvalidSchema, - InvalidURL, - ProxyError, - ReadTimeout, - RetryError, - SSLError, -) -from .models import Response -from .structures import CaseInsensitiveDict -from .utils import ( - DEFAULT_CA_BUNDLE_PATH, - extract_zipped_paths, - get_auth_from_url, - get_encoding_from_headers, - prepend_scheme_if_needed, - select_proxy, - urldefragauth, -) - -try: - from urllib3.contrib.socks import SOCKSProxyManager -except ImportError: - - def SOCKSProxyManager(*args, **kwargs): - raise InvalidSchema("Missing dependencies for SOCKS support.") - - -DEFAULT_POOLBLOCK = False -DEFAULT_POOLSIZE = 10 -DEFAULT_RETRIES = 0 -DEFAULT_POOL_TIMEOUT = None - - -class BaseAdapter: - """The Base Transport Adapter""" - - def __init__(self): - super().__init__() - - def send( - self, request, stream=False, timeout=None, verify=True, cert=None, proxies=None - ): - """Sends PreparedRequest object. Returns Response object. - - :param request: The :class:`PreparedRequest ` being sent. - :param stream: (optional) Whether to stream the request content. - :param timeout: (optional) How long to wait for the server to send - data before giving up, as a float, or a :ref:`(connect timeout, - read timeout) ` tuple. - :type timeout: float or tuple - :param verify: (optional) Either a boolean, in which case it controls whether we verify - the server's TLS certificate, or a string, in which case it must be a path - to a CA bundle to use - :param cert: (optional) Any user-provided SSL certificate to be trusted. - :param proxies: (optional) The proxies dictionary to apply to the request. - """ - raise NotImplementedError - - def close(self): - """Cleans up adapter specific items.""" - raise NotImplementedError - - -class HTTPAdapter(BaseAdapter): - """The built-in HTTP Adapter for urllib3. - - Provides a general-case interface for Requests sessions to contact HTTP and - HTTPS urls by implementing the Transport Adapter interface. This class will - usually be created by the :class:`Session ` class under the - covers. - - :param pool_connections: The number of urllib3 connection pools to cache. - :param pool_maxsize: The maximum number of connections to save in the pool. - :param max_retries: The maximum number of retries each connection - should attempt. Note, this applies only to failed DNS lookups, socket - connections and connection timeouts, never to requests where data has - made it to the server. By default, Requests does not retry failed - connections. If you need granular control over the conditions under - which we retry a request, import urllib3's ``Retry`` class and pass - that instead. - :param pool_block: Whether the connection pool should block for connections. - - Usage:: - - >>> import requests - >>> s = requests.Session() - >>> a = requests.adapters.HTTPAdapter(max_retries=3) - >>> s.mount('http://', a) - """ - - __attrs__ = [ - "max_retries", - "config", - "_pool_connections", - "_pool_maxsize", - "_pool_block", - ] - - def __init__( - self, - pool_connections=DEFAULT_POOLSIZE, - pool_maxsize=DEFAULT_POOLSIZE, - max_retries=DEFAULT_RETRIES, - pool_block=DEFAULT_POOLBLOCK, - ): - if max_retries == DEFAULT_RETRIES: - self.max_retries = Retry(0, read=False) - else: - self.max_retries = Retry.from_int(max_retries) - self.config = {} - self.proxy_manager = {} - - super().__init__() - - self._pool_connections = pool_connections - self._pool_maxsize = pool_maxsize - self._pool_block = pool_block - - self.init_poolmanager(pool_connections, pool_maxsize, block=pool_block) - - def __getstate__(self): - return {attr: getattr(self, attr, None) for attr in self.__attrs__} - - def __setstate__(self, state): - # Can't handle by adding 'proxy_manager' to self.__attrs__ because - # self.poolmanager uses a lambda function, which isn't pickleable. - self.proxy_manager = {} - self.config = {} - - for attr, value in state.items(): - setattr(self, attr, value) - - self.init_poolmanager( - self._pool_connections, self._pool_maxsize, block=self._pool_block - ) - - def init_poolmanager( - self, connections, maxsize, block=DEFAULT_POOLBLOCK, **pool_kwargs - ): - """Initializes a urllib3 PoolManager. - - This method should not be called from user code, and is only - exposed for use when subclassing the - :class:`HTTPAdapter `. - - :param connections: The number of urllib3 connection pools to cache. - :param maxsize: The maximum number of connections to save in the pool. - :param block: Block when no free connections are available. - :param pool_kwargs: Extra keyword arguments used to initialize the Pool Manager. - """ - # save these values for pickling - self._pool_connections = connections - self._pool_maxsize = maxsize - self._pool_block = block - - self.poolmanager = PoolManager( - num_pools=connections, - maxsize=maxsize, - block=block, - **pool_kwargs, - ) - - def proxy_manager_for(self, proxy, **proxy_kwargs): - """Return urllib3 ProxyManager for the given proxy. - - This method should not be called from user code, and is only - exposed for use when subclassing the - :class:`HTTPAdapter `. - - :param proxy: The proxy to return a urllib3 ProxyManager for. - :param proxy_kwargs: Extra keyword arguments used to configure the Proxy Manager. - :returns: ProxyManager - :rtype: urllib3.ProxyManager - """ - if proxy in self.proxy_manager: - manager = self.proxy_manager[proxy] - elif proxy.lower().startswith("socks"): - username, password = get_auth_from_url(proxy) - manager = self.proxy_manager[proxy] = SOCKSProxyManager( - proxy, - username=username, - password=password, - num_pools=self._pool_connections, - maxsize=self._pool_maxsize, - block=self._pool_block, - **proxy_kwargs, - ) - else: - proxy_headers = self.proxy_headers(proxy) - manager = self.proxy_manager[proxy] = proxy_from_url( - proxy, - proxy_headers=proxy_headers, - num_pools=self._pool_connections, - maxsize=self._pool_maxsize, - block=self._pool_block, - **proxy_kwargs, - ) - - return manager - - def cert_verify(self, conn, url, verify, cert): - """Verify a SSL certificate. This method should not be called from user - code, and is only exposed for use when subclassing the - :class:`HTTPAdapter `. - - :param conn: The urllib3 connection object associated with the cert. - :param url: The requested URL. - :param verify: Either a boolean, in which case it controls whether we verify - the server's TLS certificate, or a string, in which case it must be a path - to a CA bundle to use - :param cert: The SSL certificate to verify. - """ - if url.lower().startswith("https") and verify: - - cert_loc = None - - # Allow self-specified cert location. - if verify is not True: - cert_loc = verify - - if not cert_loc: - cert_loc = extract_zipped_paths(DEFAULT_CA_BUNDLE_PATH) - - if not cert_loc or not os.path.exists(cert_loc): - raise OSError( - f"Could not find a suitable TLS CA certificate bundle, " - f"invalid path: {cert_loc}" - ) - - conn.cert_reqs = "CERT_REQUIRED" - - if not os.path.isdir(cert_loc): - conn.ca_certs = cert_loc - else: - conn.ca_cert_dir = cert_loc - else: - conn.cert_reqs = "CERT_NONE" - conn.ca_certs = None - conn.ca_cert_dir = None - - if cert: - if not isinstance(cert, basestring): - conn.cert_file = cert[0] - conn.key_file = cert[1] - else: - conn.cert_file = cert - conn.key_file = None - if conn.cert_file and not os.path.exists(conn.cert_file): - raise OSError( - f"Could not find the TLS certificate file, " - f"invalid path: {conn.cert_file}" - ) - if conn.key_file and not os.path.exists(conn.key_file): - raise OSError( - f"Could not find the TLS key file, invalid path: {conn.key_file}" - ) - - def build_response(self, req, resp): - """Builds a :class:`Response ` object from a urllib3 - response. This should not be called from user code, and is only exposed - for use when subclassing the - :class:`HTTPAdapter ` - - :param req: The :class:`PreparedRequest ` used to generate the response. - :param resp: The urllib3 response object. - :rtype: requests.Response - """ - response = Response() - - # Fallback to None if there's no status_code, for whatever reason. - response.status_code = getattr(resp, "status", None) - - # Make headers case-insensitive. - response.headers = CaseInsensitiveDict(getattr(resp, "headers", {})) - - # Set encoding. - response.encoding = get_encoding_from_headers(response.headers) - response.raw = resp - response.reason = response.raw.reason - - if isinstance(req.url, bytes): - response.url = req.url.decode("utf-8") - else: - response.url = req.url - - # Add new cookies from the server. - extract_cookies_to_jar(response.cookies, req, resp) - - # Give the Response some context. - response.request = req - response.connection = self - - return response - - def get_connection(self, url, proxies=None): - """Returns a urllib3 connection for the given URL. This should not be - called from user code, and is only exposed for use when subclassing the - :class:`HTTPAdapter `. - - :param url: The URL to connect to. - :param proxies: (optional) A Requests-style dictionary of proxies used on this request. - :rtype: urllib3.ConnectionPool - """ - proxy = select_proxy(url, proxies) - - if proxy: - proxy = prepend_scheme_if_needed(proxy, "http") - proxy_url = parse_url(proxy) - if not proxy_url.host: - raise InvalidProxyURL( - "Please check proxy URL. It is malformed " - "and could be missing the host." - ) - proxy_manager = self.proxy_manager_for(proxy) - conn = proxy_manager.connection_from_url(url) - else: - # Only scheme should be lower case - parsed = urlparse(url) - url = parsed.geturl() - conn = self.poolmanager.connection_from_url(url) - - return conn - - def close(self): - """Disposes of any internal state. - - Currently, this closes the PoolManager and any active ProxyManager, - which closes any pooled connections. - """ - self.poolmanager.clear() - for proxy in self.proxy_manager.values(): - proxy.clear() - - def request_url(self, request, proxies): - """Obtain the url to use when making the final request. - - If the message is being sent through a HTTP proxy, the full URL has to - be used. Otherwise, we should only use the path portion of the URL. - - This should not be called from user code, and is only exposed for use - when subclassing the - :class:`HTTPAdapter `. - - :param request: The :class:`PreparedRequest ` being sent. - :param proxies: A dictionary of schemes or schemes and hosts to proxy URLs. - :rtype: str - """ - proxy = select_proxy(request.url, proxies) - scheme = urlparse(request.url).scheme - - is_proxied_http_request = proxy and scheme != "https" - using_socks_proxy = False - if proxy: - proxy_scheme = urlparse(proxy).scheme.lower() - using_socks_proxy = proxy_scheme.startswith("socks") - - url = request.path_url - if is_proxied_http_request and not using_socks_proxy: - url = urldefragauth(request.url) - - return url - - def add_headers(self, request, **kwargs): - """Add any headers needed by the connection. As of v2.0 this does - nothing by default, but is left for overriding by users that subclass - the :class:`HTTPAdapter `. - - This should not be called from user code, and is only exposed for use - when subclassing the - :class:`HTTPAdapter `. - - :param request: The :class:`PreparedRequest ` to add headers to. - :param kwargs: The keyword arguments from the call to send(). - """ - pass - - def proxy_headers(self, proxy): - """Returns a dictionary of the headers to add to any request sent - through a proxy. This works with urllib3 magic to ensure that they are - correctly sent to the proxy, rather than in a tunnelled request if - CONNECT is being used. - - This should not be called from user code, and is only exposed for use - when subclassing the - :class:`HTTPAdapter `. - - :param proxy: The url of the proxy being used for this request. - :rtype: dict - """ - headers = {} - username, password = get_auth_from_url(proxy) - - if username: - headers["Proxy-Authorization"] = _basic_auth_str(username, password) - - return headers - - def send( - self, request, stream=False, timeout=None, verify=True, cert=None, proxies=None - ): - """Sends PreparedRequest object. Returns Response object. - - :param request: The :class:`PreparedRequest ` being sent. - :param stream: (optional) Whether to stream the request content. - :param timeout: (optional) How long to wait for the server to send - data before giving up, as a float, or a :ref:`(connect timeout, - read timeout) ` tuple. - :type timeout: float or tuple or urllib3 Timeout object - :param verify: (optional) Either a boolean, in which case it controls whether - we verify the server's TLS certificate, or a string, in which case it - must be a path to a CA bundle to use - :param cert: (optional) Any user-provided SSL certificate to be trusted. - :param proxies: (optional) The proxies dictionary to apply to the request. - :rtype: requests.Response - """ - - try: - conn = self.get_connection(request.url, proxies) - except LocationValueError as e: - raise InvalidURL(e, request=request) - - self.cert_verify(conn, request.url, verify, cert) - url = self.request_url(request, proxies) - self.add_headers( - request, - stream=stream, - timeout=timeout, - verify=verify, - cert=cert, - proxies=proxies, - ) - - chunked = not (request.body is None or "Content-Length" in request.headers) - - if isinstance(timeout, tuple): - try: - connect, read = timeout - timeout = TimeoutSauce(connect=connect, read=read) - except ValueError: - raise ValueError( - f"Invalid timeout {timeout}. Pass a (connect, read) timeout tuple, " - f"or a single float to set both timeouts to the same value." - ) - elif isinstance(timeout, TimeoutSauce): - pass - else: - timeout = TimeoutSauce(connect=timeout, read=timeout) - - try: - resp = conn.urlopen( - method=request.method, - url=url, - body=request.body, - headers=request.headers, - redirect=False, - assert_same_host=False, - preload_content=False, - decode_content=False, - retries=self.max_retries, - timeout=timeout, - chunked=chunked, - ) - - except (ProtocolError, OSError) as err: - raise ConnectionError(err, request=request) - - except MaxRetryError as e: - if isinstance(e.reason, ConnectTimeoutError): - # TODO: Remove this in 3.0.0: see #2811 - if not isinstance(e.reason, NewConnectionError): - raise ConnectTimeout(e, request=request) - - if isinstance(e.reason, ResponseError): - raise RetryError(e, request=request) - - if isinstance(e.reason, _ProxyError): - raise ProxyError(e, request=request) - - if isinstance(e.reason, _SSLError): - # This branch is for urllib3 v1.22 and later. - raise SSLError(e, request=request) - - raise ConnectionError(e, request=request) - - except ClosedPoolError as e: - raise ConnectionError(e, request=request) - - except _ProxyError as e: - raise ProxyError(e) - - except (_SSLError, _HTTPError) as e: - if isinstance(e, _SSLError): - # This branch is for urllib3 versions earlier than v1.22 - raise SSLError(e, request=request) - elif isinstance(e, ReadTimeoutError): - raise ReadTimeout(e, request=request) - elif isinstance(e, _InvalidHeader): - raise InvalidHeader(e, request=request) - else: - raise - - return self.build_response(request, resp) diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/api.py b/vscode-extension/context-engine-uploader/python_libs/requests/api.py deleted file mode 100644 index cd0b3eea..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/api.py +++ /dev/null @@ -1,157 +0,0 @@ -""" -requests.api -~~~~~~~~~~~~ - -This module implements the Requests API. - -:copyright: (c) 2012 by Kenneth Reitz. -:license: Apache2, see LICENSE for more details. -""" - -from . import sessions - - -def request(method, url, **kwargs): - """Constructs and sends a :class:`Request `. - - :param method: method for the new :class:`Request` object: ``GET``, ``OPTIONS``, ``HEAD``, ``POST``, ``PUT``, ``PATCH``, or ``DELETE``. - :param url: URL for the new :class:`Request` object. - :param params: (optional) Dictionary, list of tuples or bytes to send - in the query string for the :class:`Request`. - :param data: (optional) Dictionary, list of tuples, bytes, or file-like - object to send in the body of the :class:`Request`. - :param json: (optional) A JSON serializable Python object to send in the body of the :class:`Request`. - :param headers: (optional) Dictionary of HTTP Headers to send with the :class:`Request`. - :param cookies: (optional) Dict or CookieJar object to send with the :class:`Request`. - :param files: (optional) Dictionary of ``'name': file-like-objects`` (or ``{'name': file-tuple}``) for multipart encoding upload. - ``file-tuple`` can be a 2-tuple ``('filename', fileobj)``, 3-tuple ``('filename', fileobj, 'content_type')`` - or a 4-tuple ``('filename', fileobj, 'content_type', custom_headers)``, where ``'content-type'`` is a string - defining the content type of the given file and ``custom_headers`` a dict-like object containing additional headers - to add for the file. - :param auth: (optional) Auth tuple to enable Basic/Digest/Custom HTTP Auth. - :param timeout: (optional) How many seconds to wait for the server to send data - before giving up, as a float, or a :ref:`(connect timeout, read - timeout) ` tuple. - :type timeout: float or tuple - :param allow_redirects: (optional) Boolean. Enable/disable GET/OPTIONS/POST/PUT/PATCH/DELETE/HEAD redirection. Defaults to ``True``. - :type allow_redirects: bool - :param proxies: (optional) Dictionary mapping protocol to the URL of the proxy. - :param verify: (optional) Either a boolean, in which case it controls whether we verify - the server's TLS certificate, or a string, in which case it must be a path - to a CA bundle to use. Defaults to ``True``. - :param stream: (optional) if ``False``, the response content will be immediately downloaded. - :param cert: (optional) if String, path to ssl client cert file (.pem). If Tuple, ('cert', 'key') pair. - :return: :class:`Response ` object - :rtype: requests.Response - - Usage:: - - >>> import requests - >>> req = requests.request('GET', 'https://httpbin.org/get') - >>> req - - """ - - # By using the 'with' statement we are sure the session is closed, thus we - # avoid leaving sockets open which can trigger a ResourceWarning in some - # cases, and look like a memory leak in others. - with sessions.Session() as session: - return session.request(method=method, url=url, **kwargs) - - -def get(url, params=None, **kwargs): - r"""Sends a GET request. - - :param url: URL for the new :class:`Request` object. - :param params: (optional) Dictionary, list of tuples or bytes to send - in the query string for the :class:`Request`. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :return: :class:`Response ` object - :rtype: requests.Response - """ - - return request("get", url, params=params, **kwargs) - - -def options(url, **kwargs): - r"""Sends an OPTIONS request. - - :param url: URL for the new :class:`Request` object. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :return: :class:`Response ` object - :rtype: requests.Response - """ - - return request("options", url, **kwargs) - - -def head(url, **kwargs): - r"""Sends a HEAD request. - - :param url: URL for the new :class:`Request` object. - :param \*\*kwargs: Optional arguments that ``request`` takes. If - `allow_redirects` is not provided, it will be set to `False` (as - opposed to the default :meth:`request` behavior). - :return: :class:`Response ` object - :rtype: requests.Response - """ - - kwargs.setdefault("allow_redirects", False) - return request("head", url, **kwargs) - - -def post(url, data=None, json=None, **kwargs): - r"""Sends a POST request. - - :param url: URL for the new :class:`Request` object. - :param data: (optional) Dictionary, list of tuples, bytes, or file-like - object to send in the body of the :class:`Request`. - :param json: (optional) A JSON serializable Python object to send in the body of the :class:`Request`. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :return: :class:`Response ` object - :rtype: requests.Response - """ - - return request("post", url, data=data, json=json, **kwargs) - - -def put(url, data=None, **kwargs): - r"""Sends a PUT request. - - :param url: URL for the new :class:`Request` object. - :param data: (optional) Dictionary, list of tuples, bytes, or file-like - object to send in the body of the :class:`Request`. - :param json: (optional) A JSON serializable Python object to send in the body of the :class:`Request`. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :return: :class:`Response ` object - :rtype: requests.Response - """ - - return request("put", url, data=data, **kwargs) - - -def patch(url, data=None, **kwargs): - r"""Sends a PATCH request. - - :param url: URL for the new :class:`Request` object. - :param data: (optional) Dictionary, list of tuples, bytes, or file-like - object to send in the body of the :class:`Request`. - :param json: (optional) A JSON serializable Python object to send in the body of the :class:`Request`. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :return: :class:`Response ` object - :rtype: requests.Response - """ - - return request("patch", url, data=data, **kwargs) - - -def delete(url, **kwargs): - r"""Sends a DELETE request. - - :param url: URL for the new :class:`Request` object. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :return: :class:`Response ` object - :rtype: requests.Response - """ - - return request("delete", url, **kwargs) diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/auth.py b/vscode-extension/context-engine-uploader/python_libs/requests/auth.py deleted file mode 100644 index 9733686d..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/auth.py +++ /dev/null @@ -1,315 +0,0 @@ -""" -requests.auth -~~~~~~~~~~~~~ - -This module contains the authentication handlers for Requests. -""" - -import hashlib -import os -import re -import threading -import time -import warnings -from base64 import b64encode - -from ._internal_utils import to_native_string -from .compat import basestring, str, urlparse -from .cookies import extract_cookies_to_jar -from .utils import parse_dict_header - -CONTENT_TYPE_FORM_URLENCODED = "application/x-www-form-urlencoded" -CONTENT_TYPE_MULTI_PART = "multipart/form-data" - - -def _basic_auth_str(username, password): - """Returns a Basic Auth string.""" - - # "I want us to put a big-ol' comment on top of it that - # says that this behaviour is dumb but we need to preserve - # it because people are relying on it." - # - Lukasa - # - # These are here solely to maintain backwards compatibility - # for things like ints. This will be removed in 3.0.0. - if not isinstance(username, basestring): - warnings.warn( - "Non-string usernames will no longer be supported in Requests " - "3.0.0. Please convert the object you've passed in ({!r}) to " - "a string or bytes object in the near future to avoid " - "problems.".format(username), - category=DeprecationWarning, - ) - username = str(username) - - if not isinstance(password, basestring): - warnings.warn( - "Non-string passwords will no longer be supported in Requests " - "3.0.0. Please convert the object you've passed in ({!r}) to " - "a string or bytes object in the near future to avoid " - "problems.".format(type(password)), - category=DeprecationWarning, - ) - password = str(password) - # -- End Removal -- - - if isinstance(username, str): - username = username.encode("latin1") - - if isinstance(password, str): - password = password.encode("latin1") - - authstr = "Basic " + to_native_string( - b64encode(b":".join((username, password))).strip() - ) - - return authstr - - -class AuthBase: - """Base class that all auth implementations derive from""" - - def __call__(self, r): - raise NotImplementedError("Auth hooks must be callable.") - - -class HTTPBasicAuth(AuthBase): - """Attaches HTTP Basic Authentication to the given Request object.""" - - def __init__(self, username, password): - self.username = username - self.password = password - - def __eq__(self, other): - return all( - [ - self.username == getattr(other, "username", None), - self.password == getattr(other, "password", None), - ] - ) - - def __ne__(self, other): - return not self == other - - def __call__(self, r): - r.headers["Authorization"] = _basic_auth_str(self.username, self.password) - return r - - -class HTTPProxyAuth(HTTPBasicAuth): - """Attaches HTTP Proxy Authentication to a given Request object.""" - - def __call__(self, r): - r.headers["Proxy-Authorization"] = _basic_auth_str(self.username, self.password) - return r - - -class HTTPDigestAuth(AuthBase): - """Attaches HTTP Digest Authentication to the given Request object.""" - - def __init__(self, username, password): - self.username = username - self.password = password - # Keep state in per-thread local storage - self._thread_local = threading.local() - - def init_per_thread_state(self): - # Ensure state is initialized just once per-thread - if not hasattr(self._thread_local, "init"): - self._thread_local.init = True - self._thread_local.last_nonce = "" - self._thread_local.nonce_count = 0 - self._thread_local.chal = {} - self._thread_local.pos = None - self._thread_local.num_401_calls = None - - def build_digest_header(self, method, url): - """ - :rtype: str - """ - - realm = self._thread_local.chal["realm"] - nonce = self._thread_local.chal["nonce"] - qop = self._thread_local.chal.get("qop") - algorithm = self._thread_local.chal.get("algorithm") - opaque = self._thread_local.chal.get("opaque") - hash_utf8 = None - - if algorithm is None: - _algorithm = "MD5" - else: - _algorithm = algorithm.upper() - # lambdas assume digest modules are imported at the top level - if _algorithm == "MD5" or _algorithm == "MD5-SESS": - - def md5_utf8(x): - if isinstance(x, str): - x = x.encode("utf-8") - return hashlib.md5(x).hexdigest() - - hash_utf8 = md5_utf8 - elif _algorithm == "SHA": - - def sha_utf8(x): - if isinstance(x, str): - x = x.encode("utf-8") - return hashlib.sha1(x).hexdigest() - - hash_utf8 = sha_utf8 - elif _algorithm == "SHA-256": - - def sha256_utf8(x): - if isinstance(x, str): - x = x.encode("utf-8") - return hashlib.sha256(x).hexdigest() - - hash_utf8 = sha256_utf8 - elif _algorithm == "SHA-512": - - def sha512_utf8(x): - if isinstance(x, str): - x = x.encode("utf-8") - return hashlib.sha512(x).hexdigest() - - hash_utf8 = sha512_utf8 - - KD = lambda s, d: hash_utf8(f"{s}:{d}") # noqa:E731 - - if hash_utf8 is None: - return None - - # XXX not implemented yet - entdig = None - p_parsed = urlparse(url) - #: path is request-uri defined in RFC 2616 which should not be empty - path = p_parsed.path or "/" - if p_parsed.query: - path += f"?{p_parsed.query}" - - A1 = f"{self.username}:{realm}:{self.password}" - A2 = f"{method}:{path}" - - HA1 = hash_utf8(A1) - HA2 = hash_utf8(A2) - - if nonce == self._thread_local.last_nonce: - self._thread_local.nonce_count += 1 - else: - self._thread_local.nonce_count = 1 - ncvalue = f"{self._thread_local.nonce_count:08x}" - s = str(self._thread_local.nonce_count).encode("utf-8") - s += nonce.encode("utf-8") - s += time.ctime().encode("utf-8") - s += os.urandom(8) - - cnonce = hashlib.sha1(s).hexdigest()[:16] - if _algorithm == "MD5-SESS": - HA1 = hash_utf8(f"{HA1}:{nonce}:{cnonce}") - - if not qop: - respdig = KD(HA1, f"{nonce}:{HA2}") - elif qop == "auth" or "auth" in qop.split(","): - noncebit = f"{nonce}:{ncvalue}:{cnonce}:auth:{HA2}" - respdig = KD(HA1, noncebit) - else: - # XXX handle auth-int. - return None - - self._thread_local.last_nonce = nonce - - # XXX should the partial digests be encoded too? - base = ( - f'username="{self.username}", realm="{realm}", nonce="{nonce}", ' - f'uri="{path}", response="{respdig}"' - ) - if opaque: - base += f', opaque="{opaque}"' - if algorithm: - base += f', algorithm="{algorithm}"' - if entdig: - base += f', digest="{entdig}"' - if qop: - base += f', qop="auth", nc={ncvalue}, cnonce="{cnonce}"' - - return f"Digest {base}" - - def handle_redirect(self, r, **kwargs): - """Reset num_401_calls counter on redirects.""" - if r.is_redirect: - self._thread_local.num_401_calls = 1 - - def handle_401(self, r, **kwargs): - """ - Takes the given response and tries digest-auth, if needed. - - :rtype: requests.Response - """ - - # If response is not 4xx, do not auth - # See https://github.com/psf/requests/issues/3772 - if not 400 <= r.status_code < 500: - self._thread_local.num_401_calls = 1 - return r - - if self._thread_local.pos is not None: - # Rewind the file position indicator of the body to where - # it was to resend the request. - r.request.body.seek(self._thread_local.pos) - s_auth = r.headers.get("www-authenticate", "") - - if "digest" in s_auth.lower() and self._thread_local.num_401_calls < 2: - - self._thread_local.num_401_calls += 1 - pat = re.compile(r"digest ", flags=re.IGNORECASE) - self._thread_local.chal = parse_dict_header(pat.sub("", s_auth, count=1)) - - # Consume content and release the original connection - # to allow our new request to reuse the same one. - r.content - r.close() - prep = r.request.copy() - extract_cookies_to_jar(prep._cookies, r.request, r.raw) - prep.prepare_cookies(prep._cookies) - - prep.headers["Authorization"] = self.build_digest_header( - prep.method, prep.url - ) - _r = r.connection.send(prep, **kwargs) - _r.history.append(r) - _r.request = prep - - return _r - - self._thread_local.num_401_calls = 1 - return r - - def __call__(self, r): - # Initialize per-thread state, if needed - self.init_per_thread_state() - # If we have a saved nonce, skip the 401 - if self._thread_local.last_nonce: - r.headers["Authorization"] = self.build_digest_header(r.method, r.url) - try: - self._thread_local.pos = r.body.tell() - except AttributeError: - # In the case of HTTPDigestAuth being reused and the body of - # the previous request was a file-like object, pos has the - # file position of the previous body. Ensure it's set to - # None. - self._thread_local.pos = None - r.register_hook("response", self.handle_401) - r.register_hook("response", self.handle_redirect) - self._thread_local.num_401_calls = 1 - - return r - - def __eq__(self, other): - return all( - [ - self.username == getattr(other, "username", None), - self.password == getattr(other, "password", None), - ] - ) - - def __ne__(self, other): - return not self == other diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/certs.py b/vscode-extension/context-engine-uploader/python_libs/requests/certs.py deleted file mode 100644 index be422c3e..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/certs.py +++ /dev/null @@ -1,17 +0,0 @@ -#!/usr/bin/env python - -""" -requests.certs -~~~~~~~~~~~~~~ - -This module returns the preferred default CA certificate bundle. There is -only one — the one from the certifi package. - -If you are packaging Requests, e.g., for a Linux distribution or a managed -environment, you can change the definition of where() to return a separately -packaged CA bundle. -""" -from certifi import where - -if __name__ == "__main__": - print(where()) diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/compat.py b/vscode-extension/context-engine-uploader/python_libs/requests/compat.py deleted file mode 100644 index 6776163c..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/compat.py +++ /dev/null @@ -1,79 +0,0 @@ -""" -requests.compat -~~~~~~~~~~~~~~~ - -This module previously handled import compatibility issues -between Python 2 and Python 3. It remains for backwards -compatibility until the next major version. -""" - -try: - import chardet -except ImportError: - import charset_normalizer as chardet - -import sys - -# ------- -# Pythons -# ------- - -# Syntax sugar. -_ver = sys.version_info - -#: Python 2.x? -is_py2 = _ver[0] == 2 - -#: Python 3.x? -is_py3 = _ver[0] == 3 - -# json/simplejson module import resolution -has_simplejson = False -try: - import simplejson as json - - has_simplejson = True -except ImportError: - import json - -if has_simplejson: - from simplejson import JSONDecodeError -else: - from json import JSONDecodeError - -# Keep OrderedDict for backwards compatibility. -from collections import OrderedDict -from collections.abc import Callable, Mapping, MutableMapping -from http import cookiejar as cookielib -from http.cookies import Morsel -from io import StringIO - -# -------------- -# Legacy Imports -# -------------- -from urllib.parse import ( - quote, - quote_plus, - unquote, - unquote_plus, - urldefrag, - urlencode, - urljoin, - urlparse, - urlsplit, - urlunparse, -) -from urllib.request import ( - getproxies, - getproxies_environment, - parse_http_list, - proxy_bypass, - proxy_bypass_environment, -) - -builtin_str = str -str = str -bytes = bytes -basestring = (str, bytes) -numeric_types = (int, float) -integer_types = (int,) diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/cookies.py b/vscode-extension/context-engine-uploader/python_libs/requests/cookies.py deleted file mode 100644 index bf54ab23..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/cookies.py +++ /dev/null @@ -1,561 +0,0 @@ -""" -requests.cookies -~~~~~~~~~~~~~~~~ - -Compatibility code to be able to use `cookielib.CookieJar` with requests. - -requests.utils imports from here, so be careful with imports. -""" - -import calendar -import copy -import time - -from ._internal_utils import to_native_string -from .compat import Morsel, MutableMapping, cookielib, urlparse, urlunparse - -try: - import threading -except ImportError: - import dummy_threading as threading - - -class MockRequest: - """Wraps a `requests.Request` to mimic a `urllib2.Request`. - - The code in `cookielib.CookieJar` expects this interface in order to correctly - manage cookie policies, i.e., determine whether a cookie can be set, given the - domains of the request and the cookie. - - The original request object is read-only. The client is responsible for collecting - the new headers via `get_new_headers()` and interpreting them appropriately. You - probably want `get_cookie_header`, defined below. - """ - - def __init__(self, request): - self._r = request - self._new_headers = {} - self.type = urlparse(self._r.url).scheme - - def get_type(self): - return self.type - - def get_host(self): - return urlparse(self._r.url).netloc - - def get_origin_req_host(self): - return self.get_host() - - def get_full_url(self): - # Only return the response's URL if the user hadn't set the Host - # header - if not self._r.headers.get("Host"): - return self._r.url - # If they did set it, retrieve it and reconstruct the expected domain - host = to_native_string(self._r.headers["Host"], encoding="utf-8") - parsed = urlparse(self._r.url) - # Reconstruct the URL as we expect it - return urlunparse( - [ - parsed.scheme, - host, - parsed.path, - parsed.params, - parsed.query, - parsed.fragment, - ] - ) - - def is_unverifiable(self): - return True - - def has_header(self, name): - return name in self._r.headers or name in self._new_headers - - def get_header(self, name, default=None): - return self._r.headers.get(name, self._new_headers.get(name, default)) - - def add_header(self, key, val): - """cookielib has no legitimate use for this method; add it back if you find one.""" - raise NotImplementedError( - "Cookie headers should be added with add_unredirected_header()" - ) - - def add_unredirected_header(self, name, value): - self._new_headers[name] = value - - def get_new_headers(self): - return self._new_headers - - @property - def unverifiable(self): - return self.is_unverifiable() - - @property - def origin_req_host(self): - return self.get_origin_req_host() - - @property - def host(self): - return self.get_host() - - -class MockResponse: - """Wraps a `httplib.HTTPMessage` to mimic a `urllib.addinfourl`. - - ...what? Basically, expose the parsed HTTP headers from the server response - the way `cookielib` expects to see them. - """ - - def __init__(self, headers): - """Make a MockResponse for `cookielib` to read. - - :param headers: a httplib.HTTPMessage or analogous carrying the headers - """ - self._headers = headers - - def info(self): - return self._headers - - def getheaders(self, name): - self._headers.getheaders(name) - - -def extract_cookies_to_jar(jar, request, response): - """Extract the cookies from the response into a CookieJar. - - :param jar: cookielib.CookieJar (not necessarily a RequestsCookieJar) - :param request: our own requests.Request object - :param response: urllib3.HTTPResponse object - """ - if not (hasattr(response, "_original_response") and response._original_response): - return - # the _original_response field is the wrapped httplib.HTTPResponse object, - req = MockRequest(request) - # pull out the HTTPMessage with the headers and put it in the mock: - res = MockResponse(response._original_response.msg) - jar.extract_cookies(res, req) - - -def get_cookie_header(jar, request): - """ - Produce an appropriate Cookie header string to be sent with `request`, or None. - - :rtype: str - """ - r = MockRequest(request) - jar.add_cookie_header(r) - return r.get_new_headers().get("Cookie") - - -def remove_cookie_by_name(cookiejar, name, domain=None, path=None): - """Unsets a cookie by name, by default over all domains and paths. - - Wraps CookieJar.clear(), is O(n). - """ - clearables = [] - for cookie in cookiejar: - if cookie.name != name: - continue - if domain is not None and domain != cookie.domain: - continue - if path is not None and path != cookie.path: - continue - clearables.append((cookie.domain, cookie.path, cookie.name)) - - for domain, path, name in clearables: - cookiejar.clear(domain, path, name) - - -class CookieConflictError(RuntimeError): - """There are two cookies that meet the criteria specified in the cookie jar. - Use .get and .set and include domain and path args in order to be more specific. - """ - - -class RequestsCookieJar(cookielib.CookieJar, MutableMapping): - """Compatibility class; is a cookielib.CookieJar, but exposes a dict - interface. - - This is the CookieJar we create by default for requests and sessions that - don't specify one, since some clients may expect response.cookies and - session.cookies to support dict operations. - - Requests does not use the dict interface internally; it's just for - compatibility with external client code. All requests code should work - out of the box with externally provided instances of ``CookieJar``, e.g. - ``LWPCookieJar`` and ``FileCookieJar``. - - Unlike a regular CookieJar, this class is pickleable. - - .. warning:: dictionary operations that are normally O(1) may be O(n). - """ - - def get(self, name, default=None, domain=None, path=None): - """Dict-like get() that also supports optional domain and path args in - order to resolve naming collisions from using one cookie jar over - multiple domains. - - .. warning:: operation is O(n), not O(1). - """ - try: - return self._find_no_duplicates(name, domain, path) - except KeyError: - return default - - def set(self, name, value, **kwargs): - """Dict-like set() that also supports optional domain and path args in - order to resolve naming collisions from using one cookie jar over - multiple domains. - """ - # support client code that unsets cookies by assignment of a None value: - if value is None: - remove_cookie_by_name( - self, name, domain=kwargs.get("domain"), path=kwargs.get("path") - ) - return - - if isinstance(value, Morsel): - c = morsel_to_cookie(value) - else: - c = create_cookie(name, value, **kwargs) - self.set_cookie(c) - return c - - def iterkeys(self): - """Dict-like iterkeys() that returns an iterator of names of cookies - from the jar. - - .. seealso:: itervalues() and iteritems(). - """ - for cookie in iter(self): - yield cookie.name - - def keys(self): - """Dict-like keys() that returns a list of names of cookies from the - jar. - - .. seealso:: values() and items(). - """ - return list(self.iterkeys()) - - def itervalues(self): - """Dict-like itervalues() that returns an iterator of values of cookies - from the jar. - - .. seealso:: iterkeys() and iteritems(). - """ - for cookie in iter(self): - yield cookie.value - - def values(self): - """Dict-like values() that returns a list of values of cookies from the - jar. - - .. seealso:: keys() and items(). - """ - return list(self.itervalues()) - - def iteritems(self): - """Dict-like iteritems() that returns an iterator of name-value tuples - from the jar. - - .. seealso:: iterkeys() and itervalues(). - """ - for cookie in iter(self): - yield cookie.name, cookie.value - - def items(self): - """Dict-like items() that returns a list of name-value tuples from the - jar. Allows client-code to call ``dict(RequestsCookieJar)`` and get a - vanilla python dict of key value pairs. - - .. seealso:: keys() and values(). - """ - return list(self.iteritems()) - - def list_domains(self): - """Utility method to list all the domains in the jar.""" - domains = [] - for cookie in iter(self): - if cookie.domain not in domains: - domains.append(cookie.domain) - return domains - - def list_paths(self): - """Utility method to list all the paths in the jar.""" - paths = [] - for cookie in iter(self): - if cookie.path not in paths: - paths.append(cookie.path) - return paths - - def multiple_domains(self): - """Returns True if there are multiple domains in the jar. - Returns False otherwise. - - :rtype: bool - """ - domains = [] - for cookie in iter(self): - if cookie.domain is not None and cookie.domain in domains: - return True - domains.append(cookie.domain) - return False # there is only one domain in jar - - def get_dict(self, domain=None, path=None): - """Takes as an argument an optional domain and path and returns a plain - old Python dict of name-value pairs of cookies that meet the - requirements. - - :rtype: dict - """ - dictionary = {} - for cookie in iter(self): - if (domain is None or cookie.domain == domain) and ( - path is None or cookie.path == path - ): - dictionary[cookie.name] = cookie.value - return dictionary - - def __contains__(self, name): - try: - return super().__contains__(name) - except CookieConflictError: - return True - - def __getitem__(self, name): - """Dict-like __getitem__() for compatibility with client code. Throws - exception if there are more than one cookie with name. In that case, - use the more explicit get() method instead. - - .. warning:: operation is O(n), not O(1). - """ - return self._find_no_duplicates(name) - - def __setitem__(self, name, value): - """Dict-like __setitem__ for compatibility with client code. Throws - exception if there is already a cookie of that name in the jar. In that - case, use the more explicit set() method instead. - """ - self.set(name, value) - - def __delitem__(self, name): - """Deletes a cookie given a name. Wraps ``cookielib.CookieJar``'s - ``remove_cookie_by_name()``. - """ - remove_cookie_by_name(self, name) - - def set_cookie(self, cookie, *args, **kwargs): - if ( - hasattr(cookie.value, "startswith") - and cookie.value.startswith('"') - and cookie.value.endswith('"') - ): - cookie.value = cookie.value.replace('\\"', "") - return super().set_cookie(cookie, *args, **kwargs) - - def update(self, other): - """Updates this jar with cookies from another CookieJar or dict-like""" - if isinstance(other, cookielib.CookieJar): - for cookie in other: - self.set_cookie(copy.copy(cookie)) - else: - super().update(other) - - def _find(self, name, domain=None, path=None): - """Requests uses this method internally to get cookie values. - - If there are conflicting cookies, _find arbitrarily chooses one. - See _find_no_duplicates if you want an exception thrown if there are - conflicting cookies. - - :param name: a string containing name of cookie - :param domain: (optional) string containing domain of cookie - :param path: (optional) string containing path of cookie - :return: cookie.value - """ - for cookie in iter(self): - if cookie.name == name: - if domain is None or cookie.domain == domain: - if path is None or cookie.path == path: - return cookie.value - - raise KeyError(f"name={name!r}, domain={domain!r}, path={path!r}") - - def _find_no_duplicates(self, name, domain=None, path=None): - """Both ``__get_item__`` and ``get`` call this function: it's never - used elsewhere in Requests. - - :param name: a string containing name of cookie - :param domain: (optional) string containing domain of cookie - :param path: (optional) string containing path of cookie - :raises KeyError: if cookie is not found - :raises CookieConflictError: if there are multiple cookies - that match name and optionally domain and path - :return: cookie.value - """ - toReturn = None - for cookie in iter(self): - if cookie.name == name: - if domain is None or cookie.domain == domain: - if path is None or cookie.path == path: - if toReturn is not None: - # if there are multiple cookies that meet passed in criteria - raise CookieConflictError( - f"There are multiple cookies with name, {name!r}" - ) - # we will eventually return this as long as no cookie conflict - toReturn = cookie.value - - if toReturn: - return toReturn - raise KeyError(f"name={name!r}, domain={domain!r}, path={path!r}") - - def __getstate__(self): - """Unlike a normal CookieJar, this class is pickleable.""" - state = self.__dict__.copy() - # remove the unpickleable RLock object - state.pop("_cookies_lock") - return state - - def __setstate__(self, state): - """Unlike a normal CookieJar, this class is pickleable.""" - self.__dict__.update(state) - if "_cookies_lock" not in self.__dict__: - self._cookies_lock = threading.RLock() - - def copy(self): - """Return a copy of this RequestsCookieJar.""" - new_cj = RequestsCookieJar() - new_cj.set_policy(self.get_policy()) - new_cj.update(self) - return new_cj - - def get_policy(self): - """Return the CookiePolicy instance used.""" - return self._policy - - -def _copy_cookie_jar(jar): - if jar is None: - return None - - if hasattr(jar, "copy"): - # We're dealing with an instance of RequestsCookieJar - return jar.copy() - # We're dealing with a generic CookieJar instance - new_jar = copy.copy(jar) - new_jar.clear() - for cookie in jar: - new_jar.set_cookie(copy.copy(cookie)) - return new_jar - - -def create_cookie(name, value, **kwargs): - """Make a cookie from underspecified parameters. - - By default, the pair of `name` and `value` will be set for the domain '' - and sent on every request (this is sometimes called a "supercookie"). - """ - result = { - "version": 0, - "name": name, - "value": value, - "port": None, - "domain": "", - "path": "/", - "secure": False, - "expires": None, - "discard": True, - "comment": None, - "comment_url": None, - "rest": {"HttpOnly": None}, - "rfc2109": False, - } - - badargs = set(kwargs) - set(result) - if badargs: - raise TypeError( - f"create_cookie() got unexpected keyword arguments: {list(badargs)}" - ) - - result.update(kwargs) - result["port_specified"] = bool(result["port"]) - result["domain_specified"] = bool(result["domain"]) - result["domain_initial_dot"] = result["domain"].startswith(".") - result["path_specified"] = bool(result["path"]) - - return cookielib.Cookie(**result) - - -def morsel_to_cookie(morsel): - """Convert a Morsel object into a Cookie containing the one k/v pair.""" - - expires = None - if morsel["max-age"]: - try: - expires = int(time.time() + int(morsel["max-age"])) - except ValueError: - raise TypeError(f"max-age: {morsel['max-age']} must be integer") - elif morsel["expires"]: - time_template = "%a, %d-%b-%Y %H:%M:%S GMT" - expires = calendar.timegm(time.strptime(morsel["expires"], time_template)) - return create_cookie( - comment=morsel["comment"], - comment_url=bool(morsel["comment"]), - discard=False, - domain=morsel["domain"], - expires=expires, - name=morsel.key, - path=morsel["path"], - port=None, - rest={"HttpOnly": morsel["httponly"]}, - rfc2109=False, - secure=bool(morsel["secure"]), - value=morsel.value, - version=morsel["version"] or 0, - ) - - -def cookiejar_from_dict(cookie_dict, cookiejar=None, overwrite=True): - """Returns a CookieJar from a key/value dictionary. - - :param cookie_dict: Dict of key/values to insert into CookieJar. - :param cookiejar: (optional) A cookiejar to add the cookies to. - :param overwrite: (optional) If False, will not replace cookies - already in the jar with new ones. - :rtype: CookieJar - """ - if cookiejar is None: - cookiejar = RequestsCookieJar() - - if cookie_dict is not None: - names_from_jar = [cookie.name for cookie in cookiejar] - for name in cookie_dict: - if overwrite or (name not in names_from_jar): - cookiejar.set_cookie(create_cookie(name, cookie_dict[name])) - - return cookiejar - - -def merge_cookies(cookiejar, cookies): - """Add cookies to cookiejar and returns a merged CookieJar. - - :param cookiejar: CookieJar object to add the cookies to. - :param cookies: Dictionary or CookieJar object to be added. - :rtype: CookieJar - """ - if not isinstance(cookiejar, cookielib.CookieJar): - raise ValueError("You can only merge into CookieJar") - - if isinstance(cookies, dict): - cookiejar = cookiejar_from_dict(cookies, cookiejar=cookiejar, overwrite=False) - elif isinstance(cookies, cookielib.CookieJar): - try: - cookiejar.update(cookies) - except AttributeError: - for cookie_in_jar in cookies: - cookiejar.set_cookie(cookie_in_jar) - - return cookiejar diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/exceptions.py b/vscode-extension/context-engine-uploader/python_libs/requests/exceptions.py deleted file mode 100644 index e1cedf88..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/exceptions.py +++ /dev/null @@ -1,141 +0,0 @@ -""" -requests.exceptions -~~~~~~~~~~~~~~~~~~~ - -This module contains the set of Requests' exceptions. -""" -from urllib3.exceptions import HTTPError as BaseHTTPError - -from .compat import JSONDecodeError as CompatJSONDecodeError - - -class RequestException(IOError): - """There was an ambiguous exception that occurred while handling your - request. - """ - - def __init__(self, *args, **kwargs): - """Initialize RequestException with `request` and `response` objects.""" - response = kwargs.pop("response", None) - self.response = response - self.request = kwargs.pop("request", None) - if response is not None and not self.request and hasattr(response, "request"): - self.request = self.response.request - super().__init__(*args, **kwargs) - - -class InvalidJSONError(RequestException): - """A JSON error occurred.""" - - -class JSONDecodeError(InvalidJSONError, CompatJSONDecodeError): - """Couldn't decode the text into json""" - - def __init__(self, *args, **kwargs): - """ - Construct the JSONDecodeError instance first with all - args. Then use it's args to construct the IOError so that - the json specific args aren't used as IOError specific args - and the error message from JSONDecodeError is preserved. - """ - CompatJSONDecodeError.__init__(self, *args) - InvalidJSONError.__init__(self, *self.args, **kwargs) - - -class HTTPError(RequestException): - """An HTTP error occurred.""" - - -class ConnectionError(RequestException): - """A Connection error occurred.""" - - -class ProxyError(ConnectionError): - """A proxy error occurred.""" - - -class SSLError(ConnectionError): - """An SSL error occurred.""" - - -class Timeout(RequestException): - """The request timed out. - - Catching this error will catch both - :exc:`~requests.exceptions.ConnectTimeout` and - :exc:`~requests.exceptions.ReadTimeout` errors. - """ - - -class ConnectTimeout(ConnectionError, Timeout): - """The request timed out while trying to connect to the remote server. - - Requests that produced this error are safe to retry. - """ - - -class ReadTimeout(Timeout): - """The server did not send any data in the allotted amount of time.""" - - -class URLRequired(RequestException): - """A valid URL is required to make a request.""" - - -class TooManyRedirects(RequestException): - """Too many redirects.""" - - -class MissingSchema(RequestException, ValueError): - """The URL scheme (e.g. http or https) is missing.""" - - -class InvalidSchema(RequestException, ValueError): - """The URL scheme provided is either invalid or unsupported.""" - - -class InvalidURL(RequestException, ValueError): - """The URL provided was somehow invalid.""" - - -class InvalidHeader(RequestException, ValueError): - """The header value provided was somehow invalid.""" - - -class InvalidProxyURL(InvalidURL): - """The proxy URL provided is invalid.""" - - -class ChunkedEncodingError(RequestException): - """The server declared chunked encoding but sent an invalid chunk.""" - - -class ContentDecodingError(RequestException, BaseHTTPError): - """Failed to decode response content.""" - - -class StreamConsumedError(RequestException, TypeError): - """The content for this response was already consumed.""" - - -class RetryError(RequestException): - """Custom retries logic failed""" - - -class UnrewindableBodyError(RequestException): - """Requests encountered an error when trying to rewind a body.""" - - -# Warnings - - -class RequestsWarning(Warning): - """Base warning for Requests.""" - - -class FileModeWarning(RequestsWarning, DeprecationWarning): - """A file was opened in text mode, but Requests determined its binary length.""" - - -class RequestsDependencyWarning(RequestsWarning): - """An imported dependency doesn't match the expected version range.""" diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/help.py b/vscode-extension/context-engine-uploader/python_libs/requests/help.py deleted file mode 100644 index 8fbcd656..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/help.py +++ /dev/null @@ -1,134 +0,0 @@ -"""Module containing bug report helper(s).""" - -import json -import platform -import ssl -import sys - -import idna -import urllib3 - -from . import __version__ as requests_version - -try: - import charset_normalizer -except ImportError: - charset_normalizer = None - -try: - import chardet -except ImportError: - chardet = None - -try: - from urllib3.contrib import pyopenssl -except ImportError: - pyopenssl = None - OpenSSL = None - cryptography = None -else: - import cryptography - import OpenSSL - - -def _implementation(): - """Return a dict with the Python implementation and version. - - Provide both the name and the version of the Python implementation - currently running. For example, on CPython 3.10.3 it will return - {'name': 'CPython', 'version': '3.10.3'}. - - This function works best on CPython and PyPy: in particular, it probably - doesn't work for Jython or IronPython. Future investigation should be done - to work out the correct shape of the code for those platforms. - """ - implementation = platform.python_implementation() - - if implementation == "CPython": - implementation_version = platform.python_version() - elif implementation == "PyPy": - implementation_version = "{}.{}.{}".format( - sys.pypy_version_info.major, - sys.pypy_version_info.minor, - sys.pypy_version_info.micro, - ) - if sys.pypy_version_info.releaselevel != "final": - implementation_version = "".join( - [implementation_version, sys.pypy_version_info.releaselevel] - ) - elif implementation == "Jython": - implementation_version = platform.python_version() # Complete Guess - elif implementation == "IronPython": - implementation_version = platform.python_version() # Complete Guess - else: - implementation_version = "Unknown" - - return {"name": implementation, "version": implementation_version} - - -def info(): - """Generate information for a bug report.""" - try: - platform_info = { - "system": platform.system(), - "release": platform.release(), - } - except OSError: - platform_info = { - "system": "Unknown", - "release": "Unknown", - } - - implementation_info = _implementation() - urllib3_info = {"version": urllib3.__version__} - charset_normalizer_info = {"version": None} - chardet_info = {"version": None} - if charset_normalizer: - charset_normalizer_info = {"version": charset_normalizer.__version__} - if chardet: - chardet_info = {"version": chardet.__version__} - - pyopenssl_info = { - "version": None, - "openssl_version": "", - } - if OpenSSL: - pyopenssl_info = { - "version": OpenSSL.__version__, - "openssl_version": f"{OpenSSL.SSL.OPENSSL_VERSION_NUMBER:x}", - } - cryptography_info = { - "version": getattr(cryptography, "__version__", ""), - } - idna_info = { - "version": getattr(idna, "__version__", ""), - } - - system_ssl = ssl.OPENSSL_VERSION_NUMBER - system_ssl_info = {"version": f"{system_ssl:x}" if system_ssl is not None else ""} - - return { - "platform": platform_info, - "implementation": implementation_info, - "system_ssl": system_ssl_info, - "using_pyopenssl": pyopenssl is not None, - "using_charset_normalizer": chardet is None, - "pyOpenSSL": pyopenssl_info, - "urllib3": urllib3_info, - "chardet": chardet_info, - "charset_normalizer": charset_normalizer_info, - "cryptography": cryptography_info, - "idna": idna_info, - "requests": { - "version": requests_version, - }, - } - - -def main(): - """Pretty-print the bug information as JSON.""" - print(json.dumps(info(), sort_keys=True, indent=2)) - - -if __name__ == "__main__": - main() diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/hooks.py b/vscode-extension/context-engine-uploader/python_libs/requests/hooks.py deleted file mode 100644 index d181ba2e..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/hooks.py +++ /dev/null @@ -1,33 +0,0 @@ -""" -requests.hooks -~~~~~~~~~~~~~~ - -This module provides the capabilities for the Requests hooks system. - -Available hooks: - -``response``: - The response generated from a Request. -""" -HOOKS = ["response"] - - -def default_hooks(): - return {event: [] for event in HOOKS} - - -# TODO: response is the only one - - -def dispatch_hook(key, hooks, hook_data, **kwargs): - """Dispatches a hook dictionary on a given piece of data.""" - hooks = hooks or {} - hooks = hooks.get(key) - if hooks: - if hasattr(hooks, "__call__"): - hooks = [hooks] - for hook in hooks: - _hook_data = hook(hook_data, **kwargs) - if _hook_data is not None: - hook_data = _hook_data - return hook_data diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/models.py b/vscode-extension/context-engine-uploader/python_libs/requests/models.py deleted file mode 100644 index 617a4134..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/models.py +++ /dev/null @@ -1,1034 +0,0 @@ -""" -requests.models -~~~~~~~~~~~~~~~ - -This module contains the primary objects that power Requests. -""" - -import datetime - -# Import encoding now, to avoid implicit import later. -# Implicit import within threads may cause LookupError when standard library is in a ZIP, -# such as in Embedded Python. See https://github.com/psf/requests/issues/3578. -import encodings.idna # noqa: F401 -from io import UnsupportedOperation - -from urllib3.exceptions import ( - DecodeError, - LocationParseError, - ProtocolError, - ReadTimeoutError, - SSLError, -) -from urllib3.fields import RequestField -from urllib3.filepost import encode_multipart_formdata -from urllib3.util import parse_url - -from ._internal_utils import to_native_string, unicode_is_ascii -from .auth import HTTPBasicAuth -from .compat import ( - Callable, - JSONDecodeError, - Mapping, - basestring, - builtin_str, - chardet, - cookielib, -) -from .compat import json as complexjson -from .compat import urlencode, urlsplit, urlunparse -from .cookies import _copy_cookie_jar, cookiejar_from_dict, get_cookie_header -from .exceptions import ( - ChunkedEncodingError, - ConnectionError, - ContentDecodingError, - HTTPError, - InvalidJSONError, - InvalidURL, -) -from .exceptions import JSONDecodeError as RequestsJSONDecodeError -from .exceptions import MissingSchema -from .exceptions import SSLError as RequestsSSLError -from .exceptions import StreamConsumedError -from .hooks import default_hooks -from .status_codes import codes -from .structures import CaseInsensitiveDict -from .utils import ( - check_header_validity, - get_auth_from_url, - guess_filename, - guess_json_utf, - iter_slices, - parse_header_links, - requote_uri, - stream_decode_response_unicode, - super_len, - to_key_val_list, -) - -#: The set of HTTP status codes that indicate an automatically -#: processable redirect. -REDIRECT_STATI = ( - codes.moved, # 301 - codes.found, # 302 - codes.other, # 303 - codes.temporary_redirect, # 307 - codes.permanent_redirect, # 308 -) - -DEFAULT_REDIRECT_LIMIT = 30 -CONTENT_CHUNK_SIZE = 10 * 1024 -ITER_CHUNK_SIZE = 512 - - -class RequestEncodingMixin: - @property - def path_url(self): - """Build the path URL to use.""" - - url = [] - - p = urlsplit(self.url) - - path = p.path - if not path: - path = "/" - - url.append(path) - - query = p.query - if query: - url.append("?") - url.append(query) - - return "".join(url) - - @staticmethod - def _encode_params(data): - """Encode parameters in a piece of data. - - Will successfully encode parameters when passed as a dict or a list of - 2-tuples. Order is retained if data is a list of 2-tuples but arbitrary - if parameters are supplied as a dict. - """ - - if isinstance(data, (str, bytes)): - return data - elif hasattr(data, "read"): - return data - elif hasattr(data, "__iter__"): - result = [] - for k, vs in to_key_val_list(data): - if isinstance(vs, basestring) or not hasattr(vs, "__iter__"): - vs = [vs] - for v in vs: - if v is not None: - result.append( - ( - k.encode("utf-8") if isinstance(k, str) else k, - v.encode("utf-8") if isinstance(v, str) else v, - ) - ) - return urlencode(result, doseq=True) - else: - return data - - @staticmethod - def _encode_files(files, data): - """Build the body for a multipart/form-data request. - - Will successfully encode files when passed as a dict or a list of - tuples. Order is retained if data is a list of tuples but arbitrary - if parameters are supplied as a dict. - The tuples may be 2-tuples (filename, fileobj), 3-tuples (filename, fileobj, contentype) - or 4-tuples (filename, fileobj, contentype, custom_headers). - """ - if not files: - raise ValueError("Files must be provided.") - elif isinstance(data, basestring): - raise ValueError("Data must not be a string.") - - new_fields = [] - fields = to_key_val_list(data or {}) - files = to_key_val_list(files or {}) - - for field, val in fields: - if isinstance(val, basestring) or not hasattr(val, "__iter__"): - val = [val] - for v in val: - if v is not None: - # Don't call str() on bytestrings: in Py3 it all goes wrong. - if not isinstance(v, bytes): - v = str(v) - - new_fields.append( - ( - field.decode("utf-8") - if isinstance(field, bytes) - else field, - v.encode("utf-8") if isinstance(v, str) else v, - ) - ) - - for (k, v) in files: - # support for explicit filename - ft = None - fh = None - if isinstance(v, (tuple, list)): - if len(v) == 2: - fn, fp = v - elif len(v) == 3: - fn, fp, ft = v - else: - fn, fp, ft, fh = v - else: - fn = guess_filename(v) or k - fp = v - - if isinstance(fp, (str, bytes, bytearray)): - fdata = fp - elif hasattr(fp, "read"): - fdata = fp.read() - elif fp is None: - continue - else: - fdata = fp - - rf = RequestField(name=k, data=fdata, filename=fn, headers=fh) - rf.make_multipart(content_type=ft) - new_fields.append(rf) - - body, content_type = encode_multipart_formdata(new_fields) - - return body, content_type - - -class RequestHooksMixin: - def register_hook(self, event, hook): - """Properly register a hook.""" - - if event not in self.hooks: - raise ValueError(f'Unsupported event specified, with event name "{event}"') - - if isinstance(hook, Callable): - self.hooks[event].append(hook) - elif hasattr(hook, "__iter__"): - self.hooks[event].extend(h for h in hook if isinstance(h, Callable)) - - def deregister_hook(self, event, hook): - """Deregister a previously registered hook. - Returns True if the hook existed, False if not. - """ - - try: - self.hooks[event].remove(hook) - return True - except ValueError: - return False - - -class Request(RequestHooksMixin): - """A user-created :class:`Request ` object. - - Used to prepare a :class:`PreparedRequest `, which is sent to the server. - - :param method: HTTP method to use. - :param url: URL to send. - :param headers: dictionary of headers to send. - :param files: dictionary of {filename: fileobject} files to multipart upload. - :param data: the body to attach to the request. If a dictionary or - list of tuples ``[(key, value)]`` is provided, form-encoding will - take place. - :param json: json for the body to attach to the request (if files or data is not specified). - :param params: URL parameters to append to the URL. If a dictionary or - list of tuples ``[(key, value)]`` is provided, form-encoding will - take place. - :param auth: Auth handler or (user, pass) tuple. - :param cookies: dictionary or CookieJar of cookies to attach to this request. - :param hooks: dictionary of callback hooks, for internal usage. - - Usage:: - - >>> import requests - >>> req = requests.Request('GET', 'https://httpbin.org/get') - >>> req.prepare() - - """ - - def __init__( - self, - method=None, - url=None, - headers=None, - files=None, - data=None, - params=None, - auth=None, - cookies=None, - hooks=None, - json=None, - ): - - # Default empty dicts for dict params. - data = [] if data is None else data - files = [] if files is None else files - headers = {} if headers is None else headers - params = {} if params is None else params - hooks = {} if hooks is None else hooks - - self.hooks = default_hooks() - for (k, v) in list(hooks.items()): - self.register_hook(event=k, hook=v) - - self.method = method - self.url = url - self.headers = headers - self.files = files - self.data = data - self.json = json - self.params = params - self.auth = auth - self.cookies = cookies - - def __repr__(self): - return f"" - - def prepare(self): - """Constructs a :class:`PreparedRequest ` for transmission and returns it.""" - p = PreparedRequest() - p.prepare( - method=self.method, - url=self.url, - headers=self.headers, - files=self.files, - data=self.data, - json=self.json, - params=self.params, - auth=self.auth, - cookies=self.cookies, - hooks=self.hooks, - ) - return p - - -class PreparedRequest(RequestEncodingMixin, RequestHooksMixin): - """The fully mutable :class:`PreparedRequest ` object, - containing the exact bytes that will be sent to the server. - - Instances are generated from a :class:`Request ` object, and - should not be instantiated manually; doing so may produce undesirable - effects. - - Usage:: - - >>> import requests - >>> req = requests.Request('GET', 'https://httpbin.org/get') - >>> r = req.prepare() - >>> r - - - >>> s = requests.Session() - >>> s.send(r) - - """ - - def __init__(self): - #: HTTP verb to send to the server. - self.method = None - #: HTTP URL to send the request to. - self.url = None - #: dictionary of HTTP headers. - self.headers = None - # The `CookieJar` used to create the Cookie header will be stored here - # after prepare_cookies is called - self._cookies = None - #: request body to send to the server. - self.body = None - #: dictionary of callback hooks, for internal usage. - self.hooks = default_hooks() - #: integer denoting starting position of a readable file-like body. - self._body_position = None - - def prepare( - self, - method=None, - url=None, - headers=None, - files=None, - data=None, - params=None, - auth=None, - cookies=None, - hooks=None, - json=None, - ): - """Prepares the entire request with the given parameters.""" - - self.prepare_method(method) - self.prepare_url(url, params) - self.prepare_headers(headers) - self.prepare_cookies(cookies) - self.prepare_body(data, files, json) - self.prepare_auth(auth, url) - - # Note that prepare_auth must be last to enable authentication schemes - # such as OAuth to work on a fully prepared request. - - # This MUST go after prepare_auth. Authenticators could add a hook - self.prepare_hooks(hooks) - - def __repr__(self): - return f"" - - def copy(self): - p = PreparedRequest() - p.method = self.method - p.url = self.url - p.headers = self.headers.copy() if self.headers is not None else None - p._cookies = _copy_cookie_jar(self._cookies) - p.body = self.body - p.hooks = self.hooks - p._body_position = self._body_position - return p - - def prepare_method(self, method): - """Prepares the given HTTP method.""" - self.method = method - if self.method is not None: - self.method = to_native_string(self.method.upper()) - - @staticmethod - def _get_idna_encoded_host(host): - import idna - - try: - host = idna.encode(host, uts46=True).decode("utf-8") - except idna.IDNAError: - raise UnicodeError - return host - - def prepare_url(self, url, params): - """Prepares the given HTTP URL.""" - #: Accept objects that have string representations. - #: We're unable to blindly call unicode/str functions - #: as this will include the bytestring indicator (b'') - #: on python 3.x. - #: https://github.com/psf/requests/pull/2238 - if isinstance(url, bytes): - url = url.decode("utf8") - else: - url = str(url) - - # Remove leading whitespaces from url - url = url.lstrip() - - # Don't do any URL preparation for non-HTTP schemes like `mailto`, - # `data` etc to work around exceptions from `url_parse`, which - # handles RFC 3986 only. - if ":" in url and not url.lower().startswith("http"): - self.url = url - return - - # Support for unicode domain names and paths. - try: - scheme, auth, host, port, path, query, fragment = parse_url(url) - except LocationParseError as e: - raise InvalidURL(*e.args) - - if not scheme: - raise MissingSchema( - f"Invalid URL {url!r}: No scheme supplied. " - f"Perhaps you meant https://{url}?" - ) - - if not host: - raise InvalidURL(f"Invalid URL {url!r}: No host supplied") - - # In general, we want to try IDNA encoding the hostname if the string contains - # non-ASCII characters. This allows users to automatically get the correct IDNA - # behaviour. For strings containing only ASCII characters, we need to also verify - # it doesn't start with a wildcard (*), before allowing the unencoded hostname. - if not unicode_is_ascii(host): - try: - host = self._get_idna_encoded_host(host) - except UnicodeError: - raise InvalidURL("URL has an invalid label.") - elif host.startswith(("*", ".")): - raise InvalidURL("URL has an invalid label.") - - # Carefully reconstruct the network location - netloc = auth or "" - if netloc: - netloc += "@" - netloc += host - if port: - netloc += f":{port}" - - # Bare domains aren't valid URLs. - if not path: - path = "/" - - if isinstance(params, (str, bytes)): - params = to_native_string(params) - - enc_params = self._encode_params(params) - if enc_params: - if query: - query = f"{query}&{enc_params}" - else: - query = enc_params - - url = requote_uri(urlunparse([scheme, netloc, path, None, query, fragment])) - self.url = url - - def prepare_headers(self, headers): - """Prepares the given HTTP headers.""" - - self.headers = CaseInsensitiveDict() - if headers: - for header in headers.items(): - # Raise exception on invalid header value. - check_header_validity(header) - name, value = header - self.headers[to_native_string(name)] = value - - def prepare_body(self, data, files, json=None): - """Prepares the given HTTP body data.""" - - # Check if file, fo, generator, iterator. - # If not, run through normal process. - - # Nottin' on you. - body = None - content_type = None - - if not data and json is not None: - # urllib3 requires a bytes-like body. Python 2's json.dumps - # provides this natively, but Python 3 gives a Unicode string. - content_type = "application/json" - - try: - body = complexjson.dumps(json, allow_nan=False) - except ValueError as ve: - raise InvalidJSONError(ve, request=self) - - if not isinstance(body, bytes): - body = body.encode("utf-8") - - is_stream = all( - [ - hasattr(data, "__iter__"), - not isinstance(data, (basestring, list, tuple, Mapping)), - ] - ) - - if is_stream: - try: - length = super_len(data) - except (TypeError, AttributeError, UnsupportedOperation): - length = None - - body = data - - if getattr(body, "tell", None) is not None: - # Record the current file position before reading. - # This will allow us to rewind a file in the event - # of a redirect. - try: - self._body_position = body.tell() - except OSError: - # This differentiates from None, allowing us to catch - # a failed `tell()` later when trying to rewind the body - self._body_position = object() - - if files: - raise NotImplementedError( - "Streamed bodies and files are mutually exclusive." - ) - - if length: - self.headers["Content-Length"] = builtin_str(length) - else: - self.headers["Transfer-Encoding"] = "chunked" - else: - # Multi-part file uploads. - if files: - (body, content_type) = self._encode_files(files, data) - else: - if data: - body = self._encode_params(data) - if isinstance(data, basestring) or hasattr(data, "read"): - content_type = None - else: - content_type = "application/x-www-form-urlencoded" - - self.prepare_content_length(body) - - # Add content-type if it wasn't explicitly provided. - if content_type and ("content-type" not in self.headers): - self.headers["Content-Type"] = content_type - - self.body = body - - def prepare_content_length(self, body): - """Prepare Content-Length header based on request method and body""" - if body is not None: - length = super_len(body) - if length: - # If length exists, set it. Otherwise, we fallback - # to Transfer-Encoding: chunked. - self.headers["Content-Length"] = builtin_str(length) - elif ( - self.method not in ("GET", "HEAD") - and self.headers.get("Content-Length") is None - ): - # Set Content-Length to 0 for methods that can have a body - # but don't provide one. (i.e. not GET or HEAD) - self.headers["Content-Length"] = "0" - - def prepare_auth(self, auth, url=""): - """Prepares the given HTTP auth data.""" - - # If no Auth is explicitly provided, extract it from the URL first. - if auth is None: - url_auth = get_auth_from_url(self.url) - auth = url_auth if any(url_auth) else None - - if auth: - if isinstance(auth, tuple) and len(auth) == 2: - # special-case basic HTTP auth - auth = HTTPBasicAuth(*auth) - - # Allow auth to make its changes. - r = auth(self) - - # Update self to reflect the auth changes. - self.__dict__.update(r.__dict__) - - # Recompute Content-Length - self.prepare_content_length(self.body) - - def prepare_cookies(self, cookies): - """Prepares the given HTTP cookie data. - - This function eventually generates a ``Cookie`` header from the - given cookies using cookielib. Due to cookielib's design, the header - will not be regenerated if it already exists, meaning this function - can only be called once for the life of the - :class:`PreparedRequest ` object. Any subsequent calls - to ``prepare_cookies`` will have no actual effect, unless the "Cookie" - header is removed beforehand. - """ - if isinstance(cookies, cookielib.CookieJar): - self._cookies = cookies - else: - self._cookies = cookiejar_from_dict(cookies) - - cookie_header = get_cookie_header(self._cookies, self) - if cookie_header is not None: - self.headers["Cookie"] = cookie_header - - def prepare_hooks(self, hooks): - """Prepares the given hooks.""" - # hooks can be passed as None to the prepare method and to this - # method. To prevent iterating over None, simply use an empty list - # if hooks is False-y - hooks = hooks or [] - for event in hooks: - self.register_hook(event, hooks[event]) - - -class Response: - """The :class:`Response ` object, which contains a - server's response to an HTTP request. - """ - - __attrs__ = [ - "_content", - "status_code", - "headers", - "url", - "history", - "encoding", - "reason", - "cookies", - "elapsed", - "request", - ] - - def __init__(self): - self._content = False - self._content_consumed = False - self._next = None - - #: Integer Code of responded HTTP Status, e.g. 404 or 200. - self.status_code = None - - #: Case-insensitive Dictionary of Response Headers. - #: For example, ``headers['content-encoding']`` will return the - #: value of a ``'Content-Encoding'`` response header. - self.headers = CaseInsensitiveDict() - - #: File-like object representation of response (for advanced usage). - #: Use of ``raw`` requires that ``stream=True`` be set on the request. - #: This requirement does not apply for use internally to Requests. - self.raw = None - - #: Final URL location of Response. - self.url = None - - #: Encoding to decode with when accessing r.text. - self.encoding = None - - #: A list of :class:`Response ` objects from - #: the history of the Request. Any redirect responses will end - #: up here. The list is sorted from the oldest to the most recent request. - self.history = [] - - #: Textual reason of responded HTTP Status, e.g. "Not Found" or "OK". - self.reason = None - - #: A CookieJar of Cookies the server sent back. - self.cookies = cookiejar_from_dict({}) - - #: The amount of time elapsed between sending the request - #: and the arrival of the response (as a timedelta). - #: This property specifically measures the time taken between sending - #: the first byte of the request and finishing parsing the headers. It - #: is therefore unaffected by consuming the response content or the - #: value of the ``stream`` keyword argument. - self.elapsed = datetime.timedelta(0) - - #: The :class:`PreparedRequest ` object to which this - #: is a response. - self.request = None - - def __enter__(self): - return self - - def __exit__(self, *args): - self.close() - - def __getstate__(self): - # Consume everything; accessing the content attribute makes - # sure the content has been fully read. - if not self._content_consumed: - self.content - - return {attr: getattr(self, attr, None) for attr in self.__attrs__} - - def __setstate__(self, state): - for name, value in state.items(): - setattr(self, name, value) - - # pickled objects do not have .raw - setattr(self, "_content_consumed", True) - setattr(self, "raw", None) - - def __repr__(self): - return f"" - - def __bool__(self): - """Returns True if :attr:`status_code` is less than 400. - - This attribute checks if the status code of the response is between - 400 and 600 to see if there was a client error or a server error. If - the status code, is between 200 and 400, this will return True. This - is **not** a check to see if the response code is ``200 OK``. - """ - return self.ok - - def __nonzero__(self): - """Returns True if :attr:`status_code` is less than 400. - - This attribute checks if the status code of the response is between - 400 and 600 to see if there was a client error or a server error. If - the status code, is between 200 and 400, this will return True. This - is **not** a check to see if the response code is ``200 OK``. - """ - return self.ok - - def __iter__(self): - """Allows you to use a response as an iterator.""" - return self.iter_content(128) - - @property - def ok(self): - """Returns True if :attr:`status_code` is less than 400, False if not. - - This attribute checks if the status code of the response is between - 400 and 600 to see if there was a client error or a server error. If - the status code is between 200 and 400, this will return True. This - is **not** a check to see if the response code is ``200 OK``. - """ - try: - self.raise_for_status() - except HTTPError: - return False - return True - - @property - def is_redirect(self): - """True if this Response is a well-formed HTTP redirect that could have - been processed automatically (by :meth:`Session.resolve_redirects`). - """ - return "location" in self.headers and self.status_code in REDIRECT_STATI - - @property - def is_permanent_redirect(self): - """True if this Response one of the permanent versions of redirect.""" - return "location" in self.headers and self.status_code in ( - codes.moved_permanently, - codes.permanent_redirect, - ) - - @property - def next(self): - """Returns a PreparedRequest for the next request in a redirect chain, if there is one.""" - return self._next - - @property - def apparent_encoding(self): - """The apparent encoding, provided by the charset_normalizer or chardet libraries.""" - return chardet.detect(self.content)["encoding"] - - def iter_content(self, chunk_size=1, decode_unicode=False): - """Iterates over the response data. When stream=True is set on the - request, this avoids reading the content at once into memory for - large responses. The chunk size is the number of bytes it should - read into memory. This is not necessarily the length of each item - returned as decoding can take place. - - chunk_size must be of type int or None. A value of None will - function differently depending on the value of `stream`. - stream=True will read data as it arrives in whatever size the - chunks are received. If stream=False, data is returned as - a single chunk. - - If decode_unicode is True, content will be decoded using the best - available encoding based on the response. - """ - - def generate(): - # Special case for urllib3. - if hasattr(self.raw, "stream"): - try: - yield from self.raw.stream(chunk_size, decode_content=True) - except ProtocolError as e: - raise ChunkedEncodingError(e) - except DecodeError as e: - raise ContentDecodingError(e) - except ReadTimeoutError as e: - raise ConnectionError(e) - except SSLError as e: - raise RequestsSSLError(e) - else: - # Standard file-like object. - while True: - chunk = self.raw.read(chunk_size) - if not chunk: - break - yield chunk - - self._content_consumed = True - - if self._content_consumed and isinstance(self._content, bool): - raise StreamConsumedError() - elif chunk_size is not None and not isinstance(chunk_size, int): - raise TypeError( - f"chunk_size must be an int, it is instead a {type(chunk_size)}." - ) - # simulate reading small chunks of the content - reused_chunks = iter_slices(self._content, chunk_size) - - stream_chunks = generate() - - chunks = reused_chunks if self._content_consumed else stream_chunks - - if decode_unicode: - chunks = stream_decode_response_unicode(chunks, self) - - return chunks - - def iter_lines( - self, chunk_size=ITER_CHUNK_SIZE, decode_unicode=False, delimiter=None - ): - """Iterates over the response data, one line at a time. When - stream=True is set on the request, this avoids reading the - content at once into memory for large responses. - - .. note:: This method is not reentrant safe. - """ - - pending = None - - for chunk in self.iter_content( - chunk_size=chunk_size, decode_unicode=decode_unicode - ): - - if pending is not None: - chunk = pending + chunk - - if delimiter: - lines = chunk.split(delimiter) - else: - lines = chunk.splitlines() - - if lines and lines[-1] and chunk and lines[-1][-1] == chunk[-1]: - pending = lines.pop() - else: - pending = None - - yield from lines - - if pending is not None: - yield pending - - @property - def content(self): - """Content of the response, in bytes.""" - - if self._content is False: - # Read the contents. - if self._content_consumed: - raise RuntimeError("The content for this response was already consumed") - - if self.status_code == 0 or self.raw is None: - self._content = None - else: - self._content = b"".join(self.iter_content(CONTENT_CHUNK_SIZE)) or b"" - - self._content_consumed = True - # don't need to release the connection; that's been handled by urllib3 - # since we exhausted the data. - return self._content - - @property - def text(self): - """Content of the response, in unicode. - - If Response.encoding is None, encoding will be guessed using - ``charset_normalizer`` or ``chardet``. - - The encoding of the response content is determined based solely on HTTP - headers, following RFC 2616 to the letter. If you can take advantage of - non-HTTP knowledge to make a better guess at the encoding, you should - set ``r.encoding`` appropriately before accessing this property. - """ - - # Try charset from content-type - content = None - encoding = self.encoding - - if not self.content: - return "" - - # Fallback to auto-detected encoding. - if self.encoding is None: - encoding = self.apparent_encoding - - # Decode unicode from given encoding. - try: - content = str(self.content, encoding, errors="replace") - except (LookupError, TypeError): - # A LookupError is raised if the encoding was not found which could - # indicate a misspelling or similar mistake. - # - # A TypeError can be raised if encoding is None - # - # So we try blindly encoding. - content = str(self.content, errors="replace") - - return content - - def json(self, **kwargs): - r"""Returns the json-encoded content of a response, if any. - - :param \*\*kwargs: Optional arguments that ``json.loads`` takes. - :raises requests.exceptions.JSONDecodeError: If the response body does not - contain valid json. - """ - - if not self.encoding and self.content and len(self.content) > 3: - # No encoding set. JSON RFC 4627 section 3 states we should expect - # UTF-8, -16 or -32. Detect which one to use; If the detection or - # decoding fails, fall back to `self.text` (using charset_normalizer to make - # a best guess). - encoding = guess_json_utf(self.content) - if encoding is not None: - try: - return complexjson.loads(self.content.decode(encoding), **kwargs) - except UnicodeDecodeError: - # Wrong UTF codec detected; usually because it's not UTF-8 - # but some other 8-bit codec. This is an RFC violation, - # and the server didn't bother to tell us what codec *was* - # used. - pass - except JSONDecodeError as e: - raise RequestsJSONDecodeError(e.msg, e.doc, e.pos) - - try: - return complexjson.loads(self.text, **kwargs) - except JSONDecodeError as e: - # Catch JSON-related errors and raise as requests.JSONDecodeError - # This aliases json.JSONDecodeError and simplejson.JSONDecodeError - raise RequestsJSONDecodeError(e.msg, e.doc, e.pos) - - @property - def links(self): - """Returns the parsed header links of the response, if any.""" - - header = self.headers.get("link") - - resolved_links = {} - - if header: - links = parse_header_links(header) - - for link in links: - key = link.get("rel") or link.get("url") - resolved_links[key] = link - - return resolved_links - - def raise_for_status(self): - """Raises :class:`HTTPError`, if one occurred.""" - - http_error_msg = "" - if isinstance(self.reason, bytes): - # We attempt to decode utf-8 first because some servers - # choose to localize their reason strings. If the string - # isn't utf-8, we fall back to iso-8859-1 for all other - # encodings. (See PR #3538) - try: - reason = self.reason.decode("utf-8") - except UnicodeDecodeError: - reason = self.reason.decode("iso-8859-1") - else: - reason = self.reason - - if 400 <= self.status_code < 500: - http_error_msg = ( - f"{self.status_code} Client Error: {reason} for url: {self.url}" - ) - - elif 500 <= self.status_code < 600: - http_error_msg = ( - f"{self.status_code} Server Error: {reason} for url: {self.url}" - ) - - if http_error_msg: - raise HTTPError(http_error_msg, response=self) - - def close(self): - """Releases the connection back to the pool. Once this method has been - called the underlying ``raw`` object must not be accessed again. - - *Note: Should not normally need to be called explicitly.* - """ - if not self._content_consumed: - self.raw.close() - - release_conn = getattr(self.raw, "release_conn", None) - if release_conn is not None: - release_conn() diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/packages.py b/vscode-extension/context-engine-uploader/python_libs/requests/packages.py deleted file mode 100644 index 77c45c9e..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/packages.py +++ /dev/null @@ -1,28 +0,0 @@ -import sys - -try: - import chardet -except ImportError: - import warnings - - import charset_normalizer as chardet - - warnings.filterwarnings("ignore", "Trying to detect", module="charset_normalizer") - -# This code exists for backwards compatibility reasons. -# I don't like it either. Just look the other way. :) - -for package in ("urllib3", "idna"): - locals()[package] = __import__(package) - # This traversal is apparently necessary such that the identities are - # preserved (requests.packages.urllib3.* is urllib3.*) - for mod in list(sys.modules): - if mod == package or mod.startswith(f"{package}."): - sys.modules[f"requests.packages.{mod}"] = sys.modules[mod] - -target = chardet.__name__ -for mod in list(sys.modules): - if mod == target or mod.startswith(f"{target}."): - target = target.replace(target, "chardet") - sys.modules[f"requests.packages.{target}"] = sys.modules[mod] -# Kinda cool, though, right? diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/sessions.py b/vscode-extension/context-engine-uploader/python_libs/requests/sessions.py deleted file mode 100644 index dbcf2a7b..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/sessions.py +++ /dev/null @@ -1,833 +0,0 @@ -""" -requests.sessions -~~~~~~~~~~~~~~~~~ - -This module provides a Session object to manage and persist settings across -requests (cookies, auth, proxies). -""" -import os -import sys -import time -from collections import OrderedDict -from datetime import timedelta - -from ._internal_utils import to_native_string -from .adapters import HTTPAdapter -from .auth import _basic_auth_str -from .compat import Mapping, cookielib, urljoin, urlparse -from .cookies import ( - RequestsCookieJar, - cookiejar_from_dict, - extract_cookies_to_jar, - merge_cookies, -) -from .exceptions import ( - ChunkedEncodingError, - ContentDecodingError, - InvalidSchema, - TooManyRedirects, -) -from .hooks import default_hooks, dispatch_hook - -# formerly defined here, reexposed here for backward compatibility -from .models import ( # noqa: F401 - DEFAULT_REDIRECT_LIMIT, - REDIRECT_STATI, - PreparedRequest, - Request, -) -from .status_codes import codes -from .structures import CaseInsensitiveDict -from .utils import ( # noqa: F401 - DEFAULT_PORTS, - default_headers, - get_auth_from_url, - get_environ_proxies, - get_netrc_auth, - requote_uri, - resolve_proxies, - rewind_body, - should_bypass_proxies, - to_key_val_list, -) - -# Preferred clock, based on which one is more accurate on a given system. -if sys.platform == "win32": - preferred_clock = time.perf_counter -else: - preferred_clock = time.time - - -def merge_setting(request_setting, session_setting, dict_class=OrderedDict): - """Determines appropriate setting for a given request, taking into account - the explicit setting on that request, and the setting in the session. If a - setting is a dictionary, they will be merged together using `dict_class` - """ - - if session_setting is None: - return request_setting - - if request_setting is None: - return session_setting - - # Bypass if not a dictionary (e.g. verify) - if not ( - isinstance(session_setting, Mapping) and isinstance(request_setting, Mapping) - ): - return request_setting - - merged_setting = dict_class(to_key_val_list(session_setting)) - merged_setting.update(to_key_val_list(request_setting)) - - # Remove keys that are set to None. Extract keys first to avoid altering - # the dictionary during iteration. - none_keys = [k for (k, v) in merged_setting.items() if v is None] - for key in none_keys: - del merged_setting[key] - - return merged_setting - - -def merge_hooks(request_hooks, session_hooks, dict_class=OrderedDict): - """Properly merges both requests and session hooks. - - This is necessary because when request_hooks == {'response': []}, the - merge breaks Session hooks entirely. - """ - if session_hooks is None or session_hooks.get("response") == []: - return request_hooks - - if request_hooks is None or request_hooks.get("response") == []: - return session_hooks - - return merge_setting(request_hooks, session_hooks, dict_class) - - -class SessionRedirectMixin: - def get_redirect_target(self, resp): - """Receives a Response. Returns a redirect URI or ``None``""" - # Due to the nature of how requests processes redirects this method will - # be called at least once upon the original response and at least twice - # on each subsequent redirect response (if any). - # If a custom mixin is used to handle this logic, it may be advantageous - # to cache the redirect location onto the response object as a private - # attribute. - if resp.is_redirect: - location = resp.headers["location"] - # Currently the underlying http module on py3 decode headers - # in latin1, but empirical evidence suggests that latin1 is very - # rarely used with non-ASCII characters in HTTP headers. - # It is more likely to get UTF8 header rather than latin1. - # This causes incorrect handling of UTF8 encoded location headers. - # To solve this, we re-encode the location in latin1. - location = location.encode("latin1") - return to_native_string(location, "utf8") - return None - - def should_strip_auth(self, old_url, new_url): - """Decide whether Authorization header should be removed when redirecting""" - old_parsed = urlparse(old_url) - new_parsed = urlparse(new_url) - if old_parsed.hostname != new_parsed.hostname: - return True - # Special case: allow http -> https redirect when using the standard - # ports. This isn't specified by RFC 7235, but is kept to avoid - # breaking backwards compatibility with older versions of requests - # that allowed any redirects on the same host. - if ( - old_parsed.scheme == "http" - and old_parsed.port in (80, None) - and new_parsed.scheme == "https" - and new_parsed.port in (443, None) - ): - return False - - # Handle default port usage corresponding to scheme. - changed_port = old_parsed.port != new_parsed.port - changed_scheme = old_parsed.scheme != new_parsed.scheme - default_port = (DEFAULT_PORTS.get(old_parsed.scheme, None), None) - if ( - not changed_scheme - and old_parsed.port in default_port - and new_parsed.port in default_port - ): - return False - - # Standard case: root URI must match - return changed_port or changed_scheme - - def resolve_redirects( - self, - resp, - req, - stream=False, - timeout=None, - verify=True, - cert=None, - proxies=None, - yield_requests=False, - **adapter_kwargs, - ): - """Receives a Response. Returns a generator of Responses or Requests.""" - - hist = [] # keep track of history - - url = self.get_redirect_target(resp) - previous_fragment = urlparse(req.url).fragment - while url: - prepared_request = req.copy() - - # Update history and keep track of redirects. - # resp.history must ignore the original request in this loop - hist.append(resp) - resp.history = hist[1:] - - try: - resp.content # Consume socket so it can be released - except (ChunkedEncodingError, ContentDecodingError, RuntimeError): - resp.raw.read(decode_content=False) - - if len(resp.history) >= self.max_redirects: - raise TooManyRedirects( - f"Exceeded {self.max_redirects} redirects.", response=resp - ) - - # Release the connection back into the pool. - resp.close() - - # Handle redirection without scheme (see: RFC 1808 Section 4) - if url.startswith("//"): - parsed_rurl = urlparse(resp.url) - url = ":".join([to_native_string(parsed_rurl.scheme), url]) - - # Normalize url case and attach previous fragment if needed (RFC 7231 7.1.2) - parsed = urlparse(url) - if parsed.fragment == "" and previous_fragment: - parsed = parsed._replace(fragment=previous_fragment) - elif parsed.fragment: - previous_fragment = parsed.fragment - url = parsed.geturl() - - # Facilitate relative 'location' headers, as allowed by RFC 7231. - # (e.g. '/path/to/resource' instead of 'http://domain.tld/path/to/resource') - # Compliant with RFC3986, we percent encode the url. - if not parsed.netloc: - url = urljoin(resp.url, requote_uri(url)) - else: - url = requote_uri(url) - - prepared_request.url = to_native_string(url) - - self.rebuild_method(prepared_request, resp) - - # https://github.com/psf/requests/issues/1084 - if resp.status_code not in ( - codes.temporary_redirect, - codes.permanent_redirect, - ): - # https://github.com/psf/requests/issues/3490 - purged_headers = ("Content-Length", "Content-Type", "Transfer-Encoding") - for header in purged_headers: - prepared_request.headers.pop(header, None) - prepared_request.body = None - - headers = prepared_request.headers - headers.pop("Cookie", None) - - # Extract any cookies sent on the response to the cookiejar - # in the new request. Because we've mutated our copied prepared - # request, use the old one that we haven't yet touched. - extract_cookies_to_jar(prepared_request._cookies, req, resp.raw) - merge_cookies(prepared_request._cookies, self.cookies) - prepared_request.prepare_cookies(prepared_request._cookies) - - # Rebuild auth and proxy information. - proxies = self.rebuild_proxies(prepared_request, proxies) - self.rebuild_auth(prepared_request, resp) - - # A failed tell() sets `_body_position` to `object()`. This non-None - # value ensures `rewindable` will be True, allowing us to raise an - # UnrewindableBodyError, instead of hanging the connection. - rewindable = prepared_request._body_position is not None and ( - "Content-Length" in headers or "Transfer-Encoding" in headers - ) - - # Attempt to rewind consumed file-like object. - if rewindable: - rewind_body(prepared_request) - - # Override the original request. - req = prepared_request - - if yield_requests: - yield req - else: - - resp = self.send( - req, - stream=stream, - timeout=timeout, - verify=verify, - cert=cert, - proxies=proxies, - allow_redirects=False, - **adapter_kwargs, - ) - - extract_cookies_to_jar(self.cookies, prepared_request, resp.raw) - - # extract redirect url, if any, for the next loop - url = self.get_redirect_target(resp) - yield resp - - def rebuild_auth(self, prepared_request, response): - """When being redirected we may want to strip authentication from the - request to avoid leaking credentials. This method intelligently removes - and reapplies authentication where possible to avoid credential loss. - """ - headers = prepared_request.headers - url = prepared_request.url - - if "Authorization" in headers and self.should_strip_auth( - response.request.url, url - ): - # If we get redirected to a new host, we should strip out any - # authentication headers. - del headers["Authorization"] - - # .netrc might have more auth for us on our new host. - new_auth = get_netrc_auth(url) if self.trust_env else None - if new_auth is not None: - prepared_request.prepare_auth(new_auth) - - def rebuild_proxies(self, prepared_request, proxies): - """This method re-evaluates the proxy configuration by considering the - environment variables. If we are redirected to a URL covered by - NO_PROXY, we strip the proxy configuration. Otherwise, we set missing - proxy keys for this URL (in case they were stripped by a previous - redirect). - - This method also replaces the Proxy-Authorization header where - necessary. - - :rtype: dict - """ - headers = prepared_request.headers - scheme = urlparse(prepared_request.url).scheme - new_proxies = resolve_proxies(prepared_request, proxies, self.trust_env) - - if "Proxy-Authorization" in headers: - del headers["Proxy-Authorization"] - - try: - username, password = get_auth_from_url(new_proxies[scheme]) - except KeyError: - username, password = None, None - - # urllib3 handles proxy authorization for us in the standard adapter. - # Avoid appending this to TLS tunneled requests where it may be leaked. - if not scheme.startswith('https') and username and password: - headers["Proxy-Authorization"] = _basic_auth_str(username, password) - - return new_proxies - - def rebuild_method(self, prepared_request, response): - """When being redirected we may want to change the method of the request - based on certain specs or browser behavior. - """ - method = prepared_request.method - - # https://tools.ietf.org/html/rfc7231#section-6.4.4 - if response.status_code == codes.see_other and method != "HEAD": - method = "GET" - - # Do what the browsers do, despite standards... - # First, turn 302s into GETs. - if response.status_code == codes.found and method != "HEAD": - method = "GET" - - # Second, if a POST is responded to with a 301, turn it into a GET. - # This bizarre behaviour is explained in Issue 1704. - if response.status_code == codes.moved and method == "POST": - method = "GET" - - prepared_request.method = method - - -class Session(SessionRedirectMixin): - """A Requests session. - - Provides cookie persistence, connection-pooling, and configuration. - - Basic Usage:: - - >>> import requests - >>> s = requests.Session() - >>> s.get('https://httpbin.org/get') - - - Or as a context manager:: - - >>> with requests.Session() as s: - ... s.get('https://httpbin.org/get') - - """ - - __attrs__ = [ - "headers", - "cookies", - "auth", - "proxies", - "hooks", - "params", - "verify", - "cert", - "adapters", - "stream", - "trust_env", - "max_redirects", - ] - - def __init__(self): - - #: A case-insensitive dictionary of headers to be sent on each - #: :class:`Request ` sent from this - #: :class:`Session `. - self.headers = default_headers() - - #: Default Authentication tuple or object to attach to - #: :class:`Request `. - self.auth = None - - #: Dictionary mapping protocol or protocol and host to the URL of the proxy - #: (e.g. {'http': 'foo.bar:3128', 'http://host.name': 'foo.bar:4012'}) to - #: be used on each :class:`Request `. - self.proxies = {} - - #: Event-handling hooks. - self.hooks = default_hooks() - - #: Dictionary of querystring data to attach to each - #: :class:`Request `. The dictionary values may be lists for - #: representing multivalued query parameters. - self.params = {} - - #: Stream response content default. - self.stream = False - - #: SSL Verification default. - #: Defaults to `True`, requiring requests to verify the TLS certificate at the - #: remote end. - #: If verify is set to `False`, requests will accept any TLS certificate - #: presented by the server, and will ignore hostname mismatches and/or - #: expired certificates, which will make your application vulnerable to - #: man-in-the-middle (MitM) attacks. - #: Only set this to `False` for testing. - self.verify = True - - #: SSL client certificate default, if String, path to ssl client - #: cert file (.pem). If Tuple, ('cert', 'key') pair. - self.cert = None - - #: Maximum number of redirects allowed. If the request exceeds this - #: limit, a :class:`TooManyRedirects` exception is raised. - #: This defaults to requests.models.DEFAULT_REDIRECT_LIMIT, which is - #: 30. - self.max_redirects = DEFAULT_REDIRECT_LIMIT - - #: Trust environment settings for proxy configuration, default - #: authentication and similar. - self.trust_env = True - - #: A CookieJar containing all currently outstanding cookies set on this - #: session. By default it is a - #: :class:`RequestsCookieJar `, but - #: may be any other ``cookielib.CookieJar`` compatible object. - self.cookies = cookiejar_from_dict({}) - - # Default connection adapters. - self.adapters = OrderedDict() - self.mount("https://", HTTPAdapter()) - self.mount("http://", HTTPAdapter()) - - def __enter__(self): - return self - - def __exit__(self, *args): - self.close() - - def prepare_request(self, request): - """Constructs a :class:`PreparedRequest ` for - transmission and returns it. The :class:`PreparedRequest` has settings - merged from the :class:`Request ` instance and those of the - :class:`Session`. - - :param request: :class:`Request` instance to prepare with this - session's settings. - :rtype: requests.PreparedRequest - """ - cookies = request.cookies or {} - - # Bootstrap CookieJar. - if not isinstance(cookies, cookielib.CookieJar): - cookies = cookiejar_from_dict(cookies) - - # Merge with session cookies - merged_cookies = merge_cookies( - merge_cookies(RequestsCookieJar(), self.cookies), cookies - ) - - # Set environment's basic authentication if not explicitly set. - auth = request.auth - if self.trust_env and not auth and not self.auth: - auth = get_netrc_auth(request.url) - - p = PreparedRequest() - p.prepare( - method=request.method.upper(), - url=request.url, - files=request.files, - data=request.data, - json=request.json, - headers=merge_setting( - request.headers, self.headers, dict_class=CaseInsensitiveDict - ), - params=merge_setting(request.params, self.params), - auth=merge_setting(auth, self.auth), - cookies=merged_cookies, - hooks=merge_hooks(request.hooks, self.hooks), - ) - return p - - def request( - self, - method, - url, - params=None, - data=None, - headers=None, - cookies=None, - files=None, - auth=None, - timeout=None, - allow_redirects=True, - proxies=None, - hooks=None, - stream=None, - verify=None, - cert=None, - json=None, - ): - """Constructs a :class:`Request `, prepares it and sends it. - Returns :class:`Response ` object. - - :param method: method for the new :class:`Request` object. - :param url: URL for the new :class:`Request` object. - :param params: (optional) Dictionary or bytes to be sent in the query - string for the :class:`Request`. - :param data: (optional) Dictionary, list of tuples, bytes, or file-like - object to send in the body of the :class:`Request`. - :param json: (optional) json to send in the body of the - :class:`Request`. - :param headers: (optional) Dictionary of HTTP Headers to send with the - :class:`Request`. - :param cookies: (optional) Dict or CookieJar object to send with the - :class:`Request`. - :param files: (optional) Dictionary of ``'filename': file-like-objects`` - for multipart encoding upload. - :param auth: (optional) Auth tuple or callable to enable - Basic/Digest/Custom HTTP Auth. - :param timeout: (optional) How long to wait for the server to send - data before giving up, as a float, or a :ref:`(connect timeout, - read timeout) ` tuple. - :type timeout: float or tuple - :param allow_redirects: (optional) Set to True by default. - :type allow_redirects: bool - :param proxies: (optional) Dictionary mapping protocol or protocol and - hostname to the URL of the proxy. - :param stream: (optional) whether to immediately download the response - content. Defaults to ``False``. - :param verify: (optional) Either a boolean, in which case it controls whether we verify - the server's TLS certificate, or a string, in which case it must be a path - to a CA bundle to use. Defaults to ``True``. When set to - ``False``, requests will accept any TLS certificate presented by - the server, and will ignore hostname mismatches and/or expired - certificates, which will make your application vulnerable to - man-in-the-middle (MitM) attacks. Setting verify to ``False`` - may be useful during local development or testing. - :param cert: (optional) if String, path to ssl client cert file (.pem). - If Tuple, ('cert', 'key') pair. - :rtype: requests.Response - """ - # Create the Request. - req = Request( - method=method.upper(), - url=url, - headers=headers, - files=files, - data=data or {}, - json=json, - params=params or {}, - auth=auth, - cookies=cookies, - hooks=hooks, - ) - prep = self.prepare_request(req) - - proxies = proxies or {} - - settings = self.merge_environment_settings( - prep.url, proxies, stream, verify, cert - ) - - # Send the request. - send_kwargs = { - "timeout": timeout, - "allow_redirects": allow_redirects, - } - send_kwargs.update(settings) - resp = self.send(prep, **send_kwargs) - - return resp - - def get(self, url, **kwargs): - r"""Sends a GET request. Returns :class:`Response` object. - - :param url: URL for the new :class:`Request` object. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :rtype: requests.Response - """ - - kwargs.setdefault("allow_redirects", True) - return self.request("GET", url, **kwargs) - - def options(self, url, **kwargs): - r"""Sends a OPTIONS request. Returns :class:`Response` object. - - :param url: URL for the new :class:`Request` object. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :rtype: requests.Response - """ - - kwargs.setdefault("allow_redirects", True) - return self.request("OPTIONS", url, **kwargs) - - def head(self, url, **kwargs): - r"""Sends a HEAD request. Returns :class:`Response` object. - - :param url: URL for the new :class:`Request` object. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :rtype: requests.Response - """ - - kwargs.setdefault("allow_redirects", False) - return self.request("HEAD", url, **kwargs) - - def post(self, url, data=None, json=None, **kwargs): - r"""Sends a POST request. Returns :class:`Response` object. - - :param url: URL for the new :class:`Request` object. - :param data: (optional) Dictionary, list of tuples, bytes, or file-like - object to send in the body of the :class:`Request`. - :param json: (optional) json to send in the body of the :class:`Request`. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :rtype: requests.Response - """ - - return self.request("POST", url, data=data, json=json, **kwargs) - - def put(self, url, data=None, **kwargs): - r"""Sends a PUT request. Returns :class:`Response` object. - - :param url: URL for the new :class:`Request` object. - :param data: (optional) Dictionary, list of tuples, bytes, or file-like - object to send in the body of the :class:`Request`. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :rtype: requests.Response - """ - - return self.request("PUT", url, data=data, **kwargs) - - def patch(self, url, data=None, **kwargs): - r"""Sends a PATCH request. Returns :class:`Response` object. - - :param url: URL for the new :class:`Request` object. - :param data: (optional) Dictionary, list of tuples, bytes, or file-like - object to send in the body of the :class:`Request`. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :rtype: requests.Response - """ - - return self.request("PATCH", url, data=data, **kwargs) - - def delete(self, url, **kwargs): - r"""Sends a DELETE request. Returns :class:`Response` object. - - :param url: URL for the new :class:`Request` object. - :param \*\*kwargs: Optional arguments that ``request`` takes. - :rtype: requests.Response - """ - - return self.request("DELETE", url, **kwargs) - - def send(self, request, **kwargs): - """Send a given PreparedRequest. - - :rtype: requests.Response - """ - # Set defaults that the hooks can utilize to ensure they always have - # the correct parameters to reproduce the previous request. - kwargs.setdefault("stream", self.stream) - kwargs.setdefault("verify", self.verify) - kwargs.setdefault("cert", self.cert) - if "proxies" not in kwargs: - kwargs["proxies"] = resolve_proxies(request, self.proxies, self.trust_env) - - # It's possible that users might accidentally send a Request object. - # Guard against that specific failure case. - if isinstance(request, Request): - raise ValueError("You can only send PreparedRequests.") - - # Set up variables needed for resolve_redirects and dispatching of hooks - allow_redirects = kwargs.pop("allow_redirects", True) - stream = kwargs.get("stream") - hooks = request.hooks - - # Get the appropriate adapter to use - adapter = self.get_adapter(url=request.url) - - # Start time (approximately) of the request - start = preferred_clock() - - # Send the request - r = adapter.send(request, **kwargs) - - # Total elapsed time of the request (approximately) - elapsed = preferred_clock() - start - r.elapsed = timedelta(seconds=elapsed) - - # Response manipulation hooks - r = dispatch_hook("response", hooks, r, **kwargs) - - # Persist cookies - if r.history: - - # If the hooks create history then we want those cookies too - for resp in r.history: - extract_cookies_to_jar(self.cookies, resp.request, resp.raw) - - extract_cookies_to_jar(self.cookies, request, r.raw) - - # Resolve redirects if allowed. - if allow_redirects: - # Redirect resolving generator. - gen = self.resolve_redirects(r, request, **kwargs) - history = [resp for resp in gen] - else: - history = [] - - # Shuffle things around if there's history. - if history: - # Insert the first (original) request at the start - history.insert(0, r) - # Get the last request made - r = history.pop() - r.history = history - - # If redirects aren't being followed, store the response on the Request for Response.next(). - if not allow_redirects: - try: - r._next = next( - self.resolve_redirects(r, request, yield_requests=True, **kwargs) - ) - except StopIteration: - pass - - if not stream: - r.content - - return r - - def merge_environment_settings(self, url, proxies, stream, verify, cert): - """ - Check the environment and merge it with some settings. - - :rtype: dict - """ - # Gather clues from the surrounding environment. - if self.trust_env: - # Set environment's proxies. - no_proxy = proxies.get("no_proxy") if proxies is not None else None - env_proxies = get_environ_proxies(url, no_proxy=no_proxy) - for (k, v) in env_proxies.items(): - proxies.setdefault(k, v) - - # Look for requests environment configuration - # and be compatible with cURL. - if verify is True or verify is None: - verify = ( - os.environ.get("REQUESTS_CA_BUNDLE") - or os.environ.get("CURL_CA_BUNDLE") - or verify - ) - - # Merge all the kwargs. - proxies = merge_setting(proxies, self.proxies) - stream = merge_setting(stream, self.stream) - verify = merge_setting(verify, self.verify) - cert = merge_setting(cert, self.cert) - - return {"proxies": proxies, "stream": stream, "verify": verify, "cert": cert} - - def get_adapter(self, url): - """ - Returns the appropriate connection adapter for the given URL. - - :rtype: requests.adapters.BaseAdapter - """ - for (prefix, adapter) in self.adapters.items(): - - if url.lower().startswith(prefix.lower()): - return adapter - - # Nothing matches :-/ - raise InvalidSchema(f"No connection adapters were found for {url!r}") - - def close(self): - """Closes all adapters and as such the session""" - for v in self.adapters.values(): - v.close() - - def mount(self, prefix, adapter): - """Registers a connection adapter to a prefix. - - Adapters are sorted in descending order by prefix length. - """ - self.adapters[prefix] = adapter - keys_to_move = [k for k in self.adapters if len(k) < len(prefix)] - - for key in keys_to_move: - self.adapters[key] = self.adapters.pop(key) - - def __getstate__(self): - state = {attr: getattr(self, attr, None) for attr in self.__attrs__} - return state - - def __setstate__(self, state): - for attr, value in state.items(): - setattr(self, attr, value) - - -def session(): - """ - Returns a :class:`Session` for context-management. - - .. deprecated:: 1.0.0 - - This method has been deprecated since version 1.0.0 and is only kept for - backwards compatibility. New code should use :class:`~requests.sessions.Session` - to create a session. This may be removed at a future date. - - :rtype: Session - """ - return Session() diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/status_codes.py b/vscode-extension/context-engine-uploader/python_libs/requests/status_codes.py deleted file mode 100644 index 4bd072be..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/status_codes.py +++ /dev/null @@ -1,128 +0,0 @@ -r""" -The ``codes`` object defines a mapping from common names for HTTP statuses -to their numerical codes, accessible either as attributes or as dictionary -items. - -Example:: - - >>> import requests - >>> requests.codes['temporary_redirect'] - 307 - >>> requests.codes.teapot - 418 - >>> requests.codes['\o/'] - 200 - -Some codes have multiple names, and both upper- and lower-case versions of -the names are allowed. For example, ``codes.ok``, ``codes.OK``, and -``codes.okay`` all correspond to the HTTP status code 200. -""" - -from .structures import LookupDict - -_codes = { - # Informational. - 100: ("continue",), - 101: ("switching_protocols",), - 102: ("processing",), - 103: ("checkpoint",), - 122: ("uri_too_long", "request_uri_too_long"), - 200: ("ok", "okay", "all_ok", "all_okay", "all_good", "\\o/", "✓"), - 201: ("created",), - 202: ("accepted",), - 203: ("non_authoritative_info", "non_authoritative_information"), - 204: ("no_content",), - 205: ("reset_content", "reset"), - 206: ("partial_content", "partial"), - 207: ("multi_status", "multiple_status", "multi_stati", "multiple_stati"), - 208: ("already_reported",), - 226: ("im_used",), - # Redirection. - 300: ("multiple_choices",), - 301: ("moved_permanently", "moved", "\\o-"), - 302: ("found",), - 303: ("see_other", "other"), - 304: ("not_modified",), - 305: ("use_proxy",), - 306: ("switch_proxy",), - 307: ("temporary_redirect", "temporary_moved", "temporary"), - 308: ( - "permanent_redirect", - "resume_incomplete", - "resume", - ), # "resume" and "resume_incomplete" to be removed in 3.0 - # Client Error. - 400: ("bad_request", "bad"), - 401: ("unauthorized",), - 402: ("payment_required", "payment"), - 403: ("forbidden",), - 404: ("not_found", "-o-"), - 405: ("method_not_allowed", "not_allowed"), - 406: ("not_acceptable",), - 407: ("proxy_authentication_required", "proxy_auth", "proxy_authentication"), - 408: ("request_timeout", "timeout"), - 409: ("conflict",), - 410: ("gone",), - 411: ("length_required",), - 412: ("precondition_failed", "precondition"), - 413: ("request_entity_too_large",), - 414: ("request_uri_too_large",), - 415: ("unsupported_media_type", "unsupported_media", "media_type"), - 416: ( - "requested_range_not_satisfiable", - "requested_range", - "range_not_satisfiable", - ), - 417: ("expectation_failed",), - 418: ("im_a_teapot", "teapot", "i_am_a_teapot"), - 421: ("misdirected_request",), - 422: ("unprocessable_entity", "unprocessable"), - 423: ("locked",), - 424: ("failed_dependency", "dependency"), - 425: ("unordered_collection", "unordered"), - 426: ("upgrade_required", "upgrade"), - 428: ("precondition_required", "precondition"), - 429: ("too_many_requests", "too_many"), - 431: ("header_fields_too_large", "fields_too_large"), - 444: ("no_response", "none"), - 449: ("retry_with", "retry"), - 450: ("blocked_by_windows_parental_controls", "parental_controls"), - 451: ("unavailable_for_legal_reasons", "legal_reasons"), - 499: ("client_closed_request",), - # Server Error. - 500: ("internal_server_error", "server_error", "/o\\", "✗"), - 501: ("not_implemented",), - 502: ("bad_gateway",), - 503: ("service_unavailable", "unavailable"), - 504: ("gateway_timeout",), - 505: ("http_version_not_supported", "http_version"), - 506: ("variant_also_negotiates",), - 507: ("insufficient_storage",), - 509: ("bandwidth_limit_exceeded", "bandwidth"), - 510: ("not_extended",), - 511: ("network_authentication_required", "network_auth", "network_authentication"), -} - -codes = LookupDict(name="status_codes") - - -def _init(): - for code, titles in _codes.items(): - for title in titles: - setattr(codes, title, code) - if not title.startswith(("\\", "/")): - setattr(codes, title.upper(), code) - - def doc(code): - names = ", ".join(f"``{n}``" for n in _codes[code]) - return "* %d: %s" % (code, names) - - global __doc__ - __doc__ = ( - __doc__ + "\n" + "\n".join(doc(code) for code in sorted(_codes)) - if __doc__ is not None - else None - ) - - -_init() diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/structures.py b/vscode-extension/context-engine-uploader/python_libs/requests/structures.py deleted file mode 100644 index 188e13e4..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/structures.py +++ /dev/null @@ -1,99 +0,0 @@ -""" -requests.structures -~~~~~~~~~~~~~~~~~~~ - -Data structures that power Requests. -""" - -from collections import OrderedDict - -from .compat import Mapping, MutableMapping - - -class CaseInsensitiveDict(MutableMapping): - """A case-insensitive ``dict``-like object. - - Implements all methods and operations of - ``MutableMapping`` as well as dict's ``copy``. Also - provides ``lower_items``. - - All keys are expected to be strings. The structure remembers the - case of the last key to be set, and ``iter(instance)``, - ``keys()``, ``items()``, ``iterkeys()``, and ``iteritems()`` - will contain case-sensitive keys. However, querying and contains - testing is case insensitive:: - - cid = CaseInsensitiveDict() - cid['Accept'] = 'application/json' - cid['aCCEPT'] == 'application/json' # True - list(cid) == ['Accept'] # True - - For example, ``headers['content-encoding']`` will return the - value of a ``'Content-Encoding'`` response header, regardless - of how the header name was originally stored. - - If the constructor, ``.update``, or equality comparison - operations are given keys that have equal ``.lower()``s, the - behavior is undefined. - """ - - def __init__(self, data=None, **kwargs): - self._store = OrderedDict() - if data is None: - data = {} - self.update(data, **kwargs) - - def __setitem__(self, key, value): - # Use the lowercased key for lookups, but store the actual - # key alongside the value. - self._store[key.lower()] = (key, value) - - def __getitem__(self, key): - return self._store[key.lower()][1] - - def __delitem__(self, key): - del self._store[key.lower()] - - def __iter__(self): - return (casedkey for casedkey, mappedvalue in self._store.values()) - - def __len__(self): - return len(self._store) - - def lower_items(self): - """Like iteritems(), but with all lowercase keys.""" - return ((lowerkey, keyval[1]) for (lowerkey, keyval) in self._store.items()) - - def __eq__(self, other): - if isinstance(other, Mapping): - other = CaseInsensitiveDict(other) - else: - return NotImplemented - # Compare insensitively - return dict(self.lower_items()) == dict(other.lower_items()) - - # Copy is required - def copy(self): - return CaseInsensitiveDict(self._store.values()) - - def __repr__(self): - return str(dict(self.items())) - - -class LookupDict(dict): - """Dictionary lookup object.""" - - def __init__(self, name=None): - self.name = name - super().__init__() - - def __repr__(self): - return f"" - - def __getitem__(self, key): - # We allow fall-through here, so values default to None - - return self.__dict__.get(key, None) - - def get(self, key, default=None): - return self.__dict__.get(key, default) diff --git a/vscode-extension/context-engine-uploader/python_libs/requests/utils.py b/vscode-extension/context-engine-uploader/python_libs/requests/utils.py deleted file mode 100644 index a367417f..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/requests/utils.py +++ /dev/null @@ -1,1094 +0,0 @@ -""" -requests.utils -~~~~~~~~~~~~~~ - -This module provides utility functions that are used within Requests -that are also useful for external consumption. -""" - -import codecs -import contextlib -import io -import os -import re -import socket -import struct -import sys -import tempfile -import warnings -import zipfile -from collections import OrderedDict - -from urllib3.util import make_headers, parse_url - -from . import certs -from .__version__ import __version__ - -# to_native_string is unused here, but imported here for backwards compatibility -from ._internal_utils import ( # noqa: F401 - _HEADER_VALIDATORS_BYTE, - _HEADER_VALIDATORS_STR, - HEADER_VALIDATORS, - to_native_string, -) -from .compat import ( - Mapping, - basestring, - bytes, - getproxies, - getproxies_environment, - integer_types, -) -from .compat import parse_http_list as _parse_list_header -from .compat import ( - proxy_bypass, - proxy_bypass_environment, - quote, - str, - unquote, - urlparse, - urlunparse, -) -from .cookies import cookiejar_from_dict -from .exceptions import ( - FileModeWarning, - InvalidHeader, - InvalidURL, - UnrewindableBodyError, -) -from .structures import CaseInsensitiveDict - -NETRC_FILES = (".netrc", "_netrc") - -DEFAULT_CA_BUNDLE_PATH = certs.where() - -DEFAULT_PORTS = {"http": 80, "https": 443} - -# Ensure that ', ' is used to preserve previous delimiter behavior. -DEFAULT_ACCEPT_ENCODING = ", ".join( - re.split(r",\s*", make_headers(accept_encoding=True)["accept-encoding"]) -) - - -if sys.platform == "win32": - # provide a proxy_bypass version on Windows without DNS lookups - - def proxy_bypass_registry(host): - try: - import winreg - except ImportError: - return False - - try: - internetSettings = winreg.OpenKey( - winreg.HKEY_CURRENT_USER, - r"Software\Microsoft\Windows\CurrentVersion\Internet Settings", - ) - # ProxyEnable could be REG_SZ or REG_DWORD, normalizing it - proxyEnable = int(winreg.QueryValueEx(internetSettings, "ProxyEnable")[0]) - # ProxyOverride is almost always a string - proxyOverride = winreg.QueryValueEx(internetSettings, "ProxyOverride")[0] - except (OSError, ValueError): - return False - if not proxyEnable or not proxyOverride: - return False - - # make a check value list from the registry entry: replace the - # '' string by the localhost entry and the corresponding - # canonical entry. - proxyOverride = proxyOverride.split(";") - # now check if we match one of the registry values. - for test in proxyOverride: - if test == "": - if "." not in host: - return True - test = test.replace(".", r"\.") # mask dots - test = test.replace("*", r".*") # change glob sequence - test = test.replace("?", r".") # change glob char - if re.match(test, host, re.I): - return True - return False - - def proxy_bypass(host): # noqa - """Return True, if the host should be bypassed. - - Checks proxy settings gathered from the environment, if specified, - or the registry. - """ - if getproxies_environment(): - return proxy_bypass_environment(host) - else: - return proxy_bypass_registry(host) - - -def dict_to_sequence(d): - """Returns an internal sequence dictionary update.""" - - if hasattr(d, "items"): - d = d.items() - - return d - - -def super_len(o): - total_length = None - current_position = 0 - - if hasattr(o, "__len__"): - total_length = len(o) - - elif hasattr(o, "len"): - total_length = o.len - - elif hasattr(o, "fileno"): - try: - fileno = o.fileno() - except (io.UnsupportedOperation, AttributeError): - # AttributeError is a surprising exception, seeing as how we've just checked - # that `hasattr(o, 'fileno')`. It happens for objects obtained via - # `Tarfile.extractfile()`, per issue 5229. - pass - else: - total_length = os.fstat(fileno).st_size - - # Having used fstat to determine the file length, we need to - # confirm that this file was opened up in binary mode. - if "b" not in o.mode: - warnings.warn( - ( - "Requests has determined the content-length for this " - "request using the binary size of the file: however, the " - "file has been opened in text mode (i.e. without the 'b' " - "flag in the mode). This may lead to an incorrect " - "content-length. In Requests 3.0, support will be removed " - "for files in text mode." - ), - FileModeWarning, - ) - - if hasattr(o, "tell"): - try: - current_position = o.tell() - except OSError: - # This can happen in some weird situations, such as when the file - # is actually a special file descriptor like stdin. In this - # instance, we don't know what the length is, so set it to zero and - # let requests chunk it instead. - if total_length is not None: - current_position = total_length - else: - if hasattr(o, "seek") and total_length is None: - # StringIO and BytesIO have seek but no usable fileno - try: - # seek to end of file - o.seek(0, 2) - total_length = o.tell() - - # seek back to current position to support - # partially read file-like objects - o.seek(current_position or 0) - except OSError: - total_length = 0 - - if total_length is None: - total_length = 0 - - return max(0, total_length - current_position) - - -def get_netrc_auth(url, raise_errors=False): - """Returns the Requests tuple auth for a given url from netrc.""" - - netrc_file = os.environ.get("NETRC") - if netrc_file is not None: - netrc_locations = (netrc_file,) - else: - netrc_locations = (f"~/{f}" for f in NETRC_FILES) - - try: - from netrc import NetrcParseError, netrc - - netrc_path = None - - for f in netrc_locations: - try: - loc = os.path.expanduser(f) - except KeyError: - # os.path.expanduser can fail when $HOME is undefined and - # getpwuid fails. See https://bugs.python.org/issue20164 & - # https://github.com/psf/requests/issues/1846 - return - - if os.path.exists(loc): - netrc_path = loc - break - - # Abort early if there isn't one. - if netrc_path is None: - return - - ri = urlparse(url) - - # Strip port numbers from netloc. This weird `if...encode`` dance is - # used for Python 3.2, which doesn't support unicode literals. - splitstr = b":" - if isinstance(url, str): - splitstr = splitstr.decode("ascii") - host = ri.netloc.split(splitstr)[0] - - try: - _netrc = netrc(netrc_path).authenticators(host) - if _netrc: - # Return with login / password - login_i = 0 if _netrc[0] else 1 - return (_netrc[login_i], _netrc[2]) - except (NetrcParseError, OSError): - # If there was a parsing error or a permissions issue reading the file, - # we'll just skip netrc auth unless explicitly asked to raise errors. - if raise_errors: - raise - - # App Engine hackiness. - except (ImportError, AttributeError): - pass - - -def guess_filename(obj): - """Tries to guess the filename of the given object.""" - name = getattr(obj, "name", None) - if name and isinstance(name, basestring) and name[0] != "<" and name[-1] != ">": - return os.path.basename(name) - - -def extract_zipped_paths(path): - """Replace nonexistent paths that look like they refer to a member of a zip - archive with the location of an extracted copy of the target, or else - just return the provided path unchanged. - """ - if os.path.exists(path): - # this is already a valid path, no need to do anything further - return path - - # find the first valid part of the provided path and treat that as a zip archive - # assume the rest of the path is the name of a member in the archive - archive, member = os.path.split(path) - while archive and not os.path.exists(archive): - archive, prefix = os.path.split(archive) - if not prefix: - # If we don't check for an empty prefix after the split (in other words, archive remains unchanged after the split), - # we _can_ end up in an infinite loop on a rare corner case affecting a small number of users - break - member = "/".join([prefix, member]) - - if not zipfile.is_zipfile(archive): - return path - - zip_file = zipfile.ZipFile(archive) - if member not in zip_file.namelist(): - return path - - # we have a valid zip archive and a valid member of that archive - tmp = tempfile.gettempdir() - extracted_path = os.path.join(tmp, member.split("/")[-1]) - if not os.path.exists(extracted_path): - # use read + write to avoid the creating nested folders, we only want the file, avoids mkdir racing condition - with atomic_open(extracted_path) as file_handler: - file_handler.write(zip_file.read(member)) - return extracted_path - - -@contextlib.contextmanager -def atomic_open(filename): - """Write a file to the disk in an atomic fashion""" - tmp_descriptor, tmp_name = tempfile.mkstemp(dir=os.path.dirname(filename)) - try: - with os.fdopen(tmp_descriptor, "wb") as tmp_handler: - yield tmp_handler - os.replace(tmp_name, filename) - except BaseException: - os.remove(tmp_name) - raise - - -def from_key_val_list(value): - """Take an object and test to see if it can be represented as a - dictionary. Unless it can not be represented as such, return an - OrderedDict, e.g., - - :: - - >>> from_key_val_list([('key', 'val')]) - OrderedDict([('key', 'val')]) - >>> from_key_val_list('string') - Traceback (most recent call last): - ... - ValueError: cannot encode objects that are not 2-tuples - >>> from_key_val_list({'key': 'val'}) - OrderedDict([('key', 'val')]) - - :rtype: OrderedDict - """ - if value is None: - return None - - if isinstance(value, (str, bytes, bool, int)): - raise ValueError("cannot encode objects that are not 2-tuples") - - return OrderedDict(value) - - -def to_key_val_list(value): - """Take an object and test to see if it can be represented as a - dictionary. If it can be, return a list of tuples, e.g., - - :: - - >>> to_key_val_list([('key', 'val')]) - [('key', 'val')] - >>> to_key_val_list({'key': 'val'}) - [('key', 'val')] - >>> to_key_val_list('string') - Traceback (most recent call last): - ... - ValueError: cannot encode objects that are not 2-tuples - - :rtype: list - """ - if value is None: - return None - - if isinstance(value, (str, bytes, bool, int)): - raise ValueError("cannot encode objects that are not 2-tuples") - - if isinstance(value, Mapping): - value = value.items() - - return list(value) - - -# From mitsuhiko/werkzeug (used with permission). -def parse_list_header(value): - """Parse lists as described by RFC 2068 Section 2. - - In particular, parse comma-separated lists where the elements of - the list may include quoted-strings. A quoted-string could - contain a comma. A non-quoted string could have quotes in the - middle. Quotes are removed automatically after parsing. - - It basically works like :func:`parse_set_header` just that items - may appear multiple times and case sensitivity is preserved. - - The return value is a standard :class:`list`: - - >>> parse_list_header('token, "quoted value"') - ['token', 'quoted value'] - - To create a header from the :class:`list` again, use the - :func:`dump_header` function. - - :param value: a string with a list header. - :return: :class:`list` - :rtype: list - """ - result = [] - for item in _parse_list_header(value): - if item[:1] == item[-1:] == '"': - item = unquote_header_value(item[1:-1]) - result.append(item) - return result - - -# From mitsuhiko/werkzeug (used with permission). -def parse_dict_header(value): - """Parse lists of key, value pairs as described by RFC 2068 Section 2 and - convert them into a python dict: - - >>> d = parse_dict_header('foo="is a fish", bar="as well"') - >>> type(d) is dict - True - >>> sorted(d.items()) - [('bar', 'as well'), ('foo', 'is a fish')] - - If there is no value for a key it will be `None`: - - >>> parse_dict_header('key_without_value') - {'key_without_value': None} - - To create a header from the :class:`dict` again, use the - :func:`dump_header` function. - - :param value: a string with a dict header. - :return: :class:`dict` - :rtype: dict - """ - result = {} - for item in _parse_list_header(value): - if "=" not in item: - result[item] = None - continue - name, value = item.split("=", 1) - if value[:1] == value[-1:] == '"': - value = unquote_header_value(value[1:-1]) - result[name] = value - return result - - -# From mitsuhiko/werkzeug (used with permission). -def unquote_header_value(value, is_filename=False): - r"""Unquotes a header value. (Reversal of :func:`quote_header_value`). - This does not use the real unquoting but what browsers are actually - using for quoting. - - :param value: the header value to unquote. - :rtype: str - """ - if value and value[0] == value[-1] == '"': - # this is not the real unquoting, but fixing this so that the - # RFC is met will result in bugs with internet explorer and - # probably some other browsers as well. IE for example is - # uploading files with "C:\foo\bar.txt" as filename - value = value[1:-1] - - # if this is a filename and the starting characters look like - # a UNC path, then just return the value without quotes. Using the - # replace sequence below on a UNC path has the effect of turning - # the leading double slash into a single slash and then - # _fix_ie_filename() doesn't work correctly. See #458. - if not is_filename or value[:2] != "\\\\": - return value.replace("\\\\", "\\").replace('\\"', '"') - return value - - -def dict_from_cookiejar(cj): - """Returns a key/value dictionary from a CookieJar. - - :param cj: CookieJar object to extract cookies from. - :rtype: dict - """ - - cookie_dict = {} - - for cookie in cj: - cookie_dict[cookie.name] = cookie.value - - return cookie_dict - - -def add_dict_to_cookiejar(cj, cookie_dict): - """Returns a CookieJar from a key/value dictionary. - - :param cj: CookieJar to insert cookies into. - :param cookie_dict: Dict of key/values to insert into CookieJar. - :rtype: CookieJar - """ - - return cookiejar_from_dict(cookie_dict, cj) - - -def get_encodings_from_content(content): - """Returns encodings from given content string. - - :param content: bytestring to extract encodings from. - """ - warnings.warn( - ( - "In requests 3.0, get_encodings_from_content will be removed. For " - "more information, please see the discussion on issue #2266. (This" - " warning should only appear once.)" - ), - DeprecationWarning, - ) - - charset_re = re.compile(r']', flags=re.I) - pragma_re = re.compile(r']', flags=re.I) - xml_re = re.compile(r'^<\?xml.*?encoding=["\']*(.+?)["\'>]') - - return ( - charset_re.findall(content) - + pragma_re.findall(content) - + xml_re.findall(content) - ) - - -def _parse_content_type_header(header): - """Returns content type and parameters from given header - - :param header: string - :return: tuple containing content type and dictionary of - parameters - """ - - tokens = header.split(";") - content_type, params = tokens[0].strip(), tokens[1:] - params_dict = {} - items_to_strip = "\"' " - - for param in params: - param = param.strip() - if param: - key, value = param, True - index_of_equals = param.find("=") - if index_of_equals != -1: - key = param[:index_of_equals].strip(items_to_strip) - value = param[index_of_equals + 1 :].strip(items_to_strip) - params_dict[key.lower()] = value - return content_type, params_dict - - -def get_encoding_from_headers(headers): - """Returns encodings from given HTTP Header Dict. - - :param headers: dictionary to extract encoding from. - :rtype: str - """ - - content_type = headers.get("content-type") - - if not content_type: - return None - - content_type, params = _parse_content_type_header(content_type) - - if "charset" in params: - return params["charset"].strip("'\"") - - if "text" in content_type: - return "ISO-8859-1" - - if "application/json" in content_type: - # Assume UTF-8 based on RFC 4627: https://www.ietf.org/rfc/rfc4627.txt since the charset was unset - return "utf-8" - - -def stream_decode_response_unicode(iterator, r): - """Stream decodes an iterator.""" - - if r.encoding is None: - yield from iterator - return - - decoder = codecs.getincrementaldecoder(r.encoding)(errors="replace") - for chunk in iterator: - rv = decoder.decode(chunk) - if rv: - yield rv - rv = decoder.decode(b"", final=True) - if rv: - yield rv - - -def iter_slices(string, slice_length): - """Iterate over slices of a string.""" - pos = 0 - if slice_length is None or slice_length <= 0: - slice_length = len(string) - while pos < len(string): - yield string[pos : pos + slice_length] - pos += slice_length - - -def get_unicode_from_response(r): - """Returns the requested content back in unicode. - - :param r: Response object to get unicode content from. - - Tried: - - 1. charset from content-type - 2. fall back and replace all unicode characters - - :rtype: str - """ - warnings.warn( - ( - "In requests 3.0, get_unicode_from_response will be removed. For " - "more information, please see the discussion on issue #2266. (This" - " warning should only appear once.)" - ), - DeprecationWarning, - ) - - tried_encodings = [] - - # Try charset from content-type - encoding = get_encoding_from_headers(r.headers) - - if encoding: - try: - return str(r.content, encoding) - except UnicodeError: - tried_encodings.append(encoding) - - # Fall back: - try: - return str(r.content, encoding, errors="replace") - except TypeError: - return r.content - - -# The unreserved URI characters (RFC 3986) -UNRESERVED_SET = frozenset( - "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" + "0123456789-._~" -) - - -def unquote_unreserved(uri): - """Un-escape any percent-escape sequences in a URI that are unreserved - characters. This leaves all reserved, illegal and non-ASCII bytes encoded. - - :rtype: str - """ - parts = uri.split("%") - for i in range(1, len(parts)): - h = parts[i][0:2] - if len(h) == 2 and h.isalnum(): - try: - c = chr(int(h, 16)) - except ValueError: - raise InvalidURL(f"Invalid percent-escape sequence: '{h}'") - - if c in UNRESERVED_SET: - parts[i] = c + parts[i][2:] - else: - parts[i] = f"%{parts[i]}" - else: - parts[i] = f"%{parts[i]}" - return "".join(parts) - - -def requote_uri(uri): - """Re-quote the given URI. - - This function passes the given URI through an unquote/quote cycle to - ensure that it is fully and consistently quoted. - - :rtype: str - """ - safe_with_percent = "!#$%&'()*+,/:;=?@[]~" - safe_without_percent = "!#$&'()*+,/:;=?@[]~" - try: - # Unquote only the unreserved characters - # Then quote only illegal characters (do not quote reserved, - # unreserved, or '%') - return quote(unquote_unreserved(uri), safe=safe_with_percent) - except InvalidURL: - # We couldn't unquote the given URI, so let's try quoting it, but - # there may be unquoted '%'s in the URI. We need to make sure they're - # properly quoted so they do not cause issues elsewhere. - return quote(uri, safe=safe_without_percent) - - -def address_in_network(ip, net): - """This function allows you to check if an IP belongs to a network subnet - - Example: returns True if ip = 192.168.1.1 and net = 192.168.1.0/24 - returns False if ip = 192.168.1.1 and net = 192.168.100.0/24 - - :rtype: bool - """ - ipaddr = struct.unpack("=L", socket.inet_aton(ip))[0] - netaddr, bits = net.split("/") - netmask = struct.unpack("=L", socket.inet_aton(dotted_netmask(int(bits))))[0] - network = struct.unpack("=L", socket.inet_aton(netaddr))[0] & netmask - return (ipaddr & netmask) == (network & netmask) - - -def dotted_netmask(mask): - """Converts mask from /xx format to xxx.xxx.xxx.xxx - - Example: if mask is 24 function returns 255.255.255.0 - - :rtype: str - """ - bits = 0xFFFFFFFF ^ (1 << 32 - mask) - 1 - return socket.inet_ntoa(struct.pack(">I", bits)) - - -def is_ipv4_address(string_ip): - """ - :rtype: bool - """ - try: - socket.inet_aton(string_ip) - except OSError: - return False - return True - - -def is_valid_cidr(string_network): - """ - Very simple check of the cidr format in no_proxy variable. - - :rtype: bool - """ - if string_network.count("/") == 1: - try: - mask = int(string_network.split("/")[1]) - except ValueError: - return False - - if mask < 1 or mask > 32: - return False - - try: - socket.inet_aton(string_network.split("/")[0]) - except OSError: - return False - else: - return False - return True - - -@contextlib.contextmanager -def set_environ(env_name, value): - """Set the environment variable 'env_name' to 'value' - - Save previous value, yield, and then restore the previous value stored in - the environment variable 'env_name'. - - If 'value' is None, do nothing""" - value_changed = value is not None - if value_changed: - old_value = os.environ.get(env_name) - os.environ[env_name] = value - try: - yield - finally: - if value_changed: - if old_value is None: - del os.environ[env_name] - else: - os.environ[env_name] = old_value - - -def should_bypass_proxies(url, no_proxy): - """ - Returns whether we should bypass proxies or not. - - :rtype: bool - """ - # Prioritize lowercase environment variables over uppercase - # to keep a consistent behaviour with other http projects (curl, wget). - def get_proxy(key): - return os.environ.get(key) or os.environ.get(key.upper()) - - # First check whether no_proxy is defined. If it is, check that the URL - # we're getting isn't in the no_proxy list. - no_proxy_arg = no_proxy - if no_proxy is None: - no_proxy = get_proxy("no_proxy") - parsed = urlparse(url) - - if parsed.hostname is None: - # URLs don't always have hostnames, e.g. file:/// urls. - return True - - if no_proxy: - # We need to check whether we match here. We need to see if we match - # the end of the hostname, both with and without the port. - no_proxy = (host for host in no_proxy.replace(" ", "").split(",") if host) - - if is_ipv4_address(parsed.hostname): - for proxy_ip in no_proxy: - if is_valid_cidr(proxy_ip): - if address_in_network(parsed.hostname, proxy_ip): - return True - elif parsed.hostname == proxy_ip: - # If no_proxy ip was defined in plain IP notation instead of cidr notation & - # matches the IP of the index - return True - else: - host_with_port = parsed.hostname - if parsed.port: - host_with_port += f":{parsed.port}" - - for host in no_proxy: - if parsed.hostname.endswith(host) or host_with_port.endswith(host): - # The URL does match something in no_proxy, so we don't want - # to apply the proxies on this URL. - return True - - with set_environ("no_proxy", no_proxy_arg): - # parsed.hostname can be `None` in cases such as a file URI. - try: - bypass = proxy_bypass(parsed.hostname) - except (TypeError, socket.gaierror): - bypass = False - - if bypass: - return True - - return False - - -def get_environ_proxies(url, no_proxy=None): - """ - Return a dict of environment proxies. - - :rtype: dict - """ - if should_bypass_proxies(url, no_proxy=no_proxy): - return {} - else: - return getproxies() - - -def select_proxy(url, proxies): - """Select a proxy for the url, if applicable. - - :param url: The url being for the request - :param proxies: A dictionary of schemes or schemes and hosts to proxy URLs - """ - proxies = proxies or {} - urlparts = urlparse(url) - if urlparts.hostname is None: - return proxies.get(urlparts.scheme, proxies.get("all")) - - proxy_keys = [ - urlparts.scheme + "://" + urlparts.hostname, - urlparts.scheme, - "all://" + urlparts.hostname, - "all", - ] - proxy = None - for proxy_key in proxy_keys: - if proxy_key in proxies: - proxy = proxies[proxy_key] - break - - return proxy - - -def resolve_proxies(request, proxies, trust_env=True): - """This method takes proxy information from a request and configuration - input to resolve a mapping of target proxies. This will consider settings - such a NO_PROXY to strip proxy configurations. - - :param request: Request or PreparedRequest - :param proxies: A dictionary of schemes or schemes and hosts to proxy URLs - :param trust_env: Boolean declaring whether to trust environment configs - - :rtype: dict - """ - proxies = proxies if proxies is not None else {} - url = request.url - scheme = urlparse(url).scheme - no_proxy = proxies.get("no_proxy") - new_proxies = proxies.copy() - - if trust_env and not should_bypass_proxies(url, no_proxy=no_proxy): - environ_proxies = get_environ_proxies(url, no_proxy=no_proxy) - - proxy = environ_proxies.get(scheme, environ_proxies.get("all")) - - if proxy: - new_proxies.setdefault(scheme, proxy) - return new_proxies - - -def default_user_agent(name="python-requests"): - """ - Return a string representing the default user agent. - - :rtype: str - """ - return f"{name}/{__version__}" - - -def default_headers(): - """ - :rtype: requests.structures.CaseInsensitiveDict - """ - return CaseInsensitiveDict( - { - "User-Agent": default_user_agent(), - "Accept-Encoding": DEFAULT_ACCEPT_ENCODING, - "Accept": "*/*", - "Connection": "keep-alive", - } - ) - - -def parse_header_links(value): - """Return a list of parsed link headers proxies. - - i.e. Link: ; rel=front; type="image/jpeg",; rel=back;type="image/jpeg" - - :rtype: list - """ - - links = [] - - replace_chars = " '\"" - - value = value.strip(replace_chars) - if not value: - return links - - for val in re.split(", *<", value): - try: - url, params = val.split(";", 1) - except ValueError: - url, params = val, "" - - link = {"url": url.strip("<> '\"")} - - for param in params.split(";"): - try: - key, value = param.split("=") - except ValueError: - break - - link[key.strip(replace_chars)] = value.strip(replace_chars) - - links.append(link) - - return links - - -# Null bytes; no need to recreate these on each call to guess_json_utf -_null = "\x00".encode("ascii") # encoding to ASCII for Python 3 -_null2 = _null * 2 -_null3 = _null * 3 - - -def guess_json_utf(data): - """ - :rtype: str - """ - # JSON always starts with two ASCII characters, so detection is as - # easy as counting the nulls and from their location and count - # determine the encoding. Also detect a BOM, if present. - sample = data[:4] - if sample in (codecs.BOM_UTF32_LE, codecs.BOM_UTF32_BE): - return "utf-32" # BOM included - if sample[:3] == codecs.BOM_UTF8: - return "utf-8-sig" # BOM included, MS style (discouraged) - if sample[:2] in (codecs.BOM_UTF16_LE, codecs.BOM_UTF16_BE): - return "utf-16" # BOM included - nullcount = sample.count(_null) - if nullcount == 0: - return "utf-8" - if nullcount == 2: - if sample[::2] == _null2: # 1st and 3rd are null - return "utf-16-be" - if sample[1::2] == _null2: # 2nd and 4th are null - return "utf-16-le" - # Did not detect 2 valid UTF-16 ascii-range characters - if nullcount == 3: - if sample[:3] == _null3: - return "utf-32-be" - if sample[1:] == _null3: - return "utf-32-le" - # Did not detect a valid UTF-32 ascii-range character - return None - - -def prepend_scheme_if_needed(url, new_scheme): - """Given a URL that may or may not have a scheme, prepend the given scheme. - Does not replace a present scheme with the one provided as an argument. - - :rtype: str - """ - parsed = parse_url(url) - scheme, auth, host, port, path, query, fragment = parsed - - # A defect in urlparse determines that there isn't a netloc present in some - # urls. We previously assumed parsing was overly cautious, and swapped the - # netloc and path. Due to a lack of tests on the original defect, this is - # maintained with parse_url for backwards compatibility. - netloc = parsed.netloc - if not netloc: - netloc, path = path, netloc - - if auth: - # parse_url doesn't provide the netloc with auth - # so we'll add it ourselves. - netloc = "@".join([auth, netloc]) - if scheme is None: - scheme = new_scheme - if path is None: - path = "" - - return urlunparse((scheme, netloc, path, "", query, fragment)) - - -def get_auth_from_url(url): - """Given a url with authentication components, extract them into a tuple of - username,password. - - :rtype: (str,str) - """ - parsed = urlparse(url) - - try: - auth = (unquote(parsed.username), unquote(parsed.password)) - except (AttributeError, TypeError): - auth = ("", "") - - return auth - - -def check_header_validity(header): - """Verifies that header parts don't contain leading whitespace - reserved characters, or return characters. - - :param header: tuple, in the format (name, value). - """ - name, value = header - _validate_header_part(header, name, 0) - _validate_header_part(header, value, 1) - - -def _validate_header_part(header, header_part, header_validator_index): - if isinstance(header_part, str): - validator = _HEADER_VALIDATORS_STR[header_validator_index] - elif isinstance(header_part, bytes): - validator = _HEADER_VALIDATORS_BYTE[header_validator_index] - else: - raise InvalidHeader( - f"Header part ({header_part!r}) from {header} " - f"must be of type str or bytes, not {type(header_part)}" - ) - - if not validator.match(header_part): - header_kind = "name" if header_validator_index == 0 else "value" - raise InvalidHeader( - f"Invalid leading whitespace, reserved character(s), or return" - f"character(s) in header {header_kind}: {header_part!r}" - ) - - -def urldefragauth(url): - """ - Given a url remove the fragment and the authentication part. - - :rtype: str - """ - scheme, netloc, path, params, query, fragment = urlparse(url) - - # see func:`prepend_scheme_if_needed` - if not netloc: - netloc, path = path, netloc - - netloc = netloc.rsplit("@", 1)[-1] - - return urlunparse((scheme, netloc, path, params, query, "")) - - -def rewind_body(prepared_request): - """Move file pointer back to its recorded starting position - so it can be read again on redirect. - """ - body_seek = getattr(prepared_request.body, "seek", None) - if body_seek is not None and isinstance( - prepared_request._body_position, integer_types - ): - try: - body_seek(prepared_request._body_position) - except OSError: - raise UnrewindableBodyError( - "An error occurred when rewinding request body for redirect." - ) - else: - raise UnrewindableBodyError("Unable to rewind request body for redirect.") diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/INSTALLER b/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/INSTALLER deleted file mode 100644 index a1b589e3..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/INSTALLER +++ /dev/null @@ -1 +0,0 @@ -pip diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/METADATA b/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/METADATA deleted file mode 100644 index fc87b7c0..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/METADATA +++ /dev/null @@ -1,158 +0,0 @@ -Metadata-Version: 2.1 -Name: urllib3 -Version: 2.0.7 -Summary: HTTP library with thread-safe connection pooling, file post, and more. -Project-URL: Changelog, https://github.com/urllib3/urllib3/blob/main/CHANGES.rst -Project-URL: Documentation, https://urllib3.readthedocs.io -Project-URL: Code, https://github.com/urllib3/urllib3 -Project-URL: Issue tracker, https://github.com/urllib3/urllib3/issues -Author-email: Andrey Petrov -Maintainer-email: Seth Michael Larson , Quentin Pradet -License-File: LICENSE.txt -Keywords: filepost,http,httplib,https,pooling,ssl,threadsafe,urllib -Classifier: Environment :: Web Environment -Classifier: Intended Audience :: Developers -Classifier: License :: OSI Approved :: MIT License -Classifier: Operating System :: OS Independent -Classifier: Programming Language :: Python -Classifier: Programming Language :: Python :: 3 -Classifier: Programming Language :: Python :: 3 :: Only -Classifier: Programming Language :: Python :: 3.7 -Classifier: Programming Language :: Python :: 3.8 -Classifier: Programming Language :: Python :: 3.9 -Classifier: Programming Language :: Python :: 3.10 -Classifier: Programming Language :: Python :: 3.11 -Classifier: Programming Language :: Python :: 3.12 -Classifier: Programming Language :: Python :: Implementation :: CPython -Classifier: Programming Language :: Python :: Implementation :: PyPy -Classifier: Topic :: Internet :: WWW/HTTP -Classifier: Topic :: Software Development :: Libraries -Requires-Python: >=3.7 -Provides-Extra: brotli -Requires-Dist: brotli>=1.0.9; platform_python_implementation == 'CPython' and extra == 'brotli' -Requires-Dist: brotlicffi>=0.8.0; platform_python_implementation != 'CPython' and extra == 'brotli' -Provides-Extra: secure -Requires-Dist: certifi; extra == 'secure' -Requires-Dist: cryptography>=1.9; extra == 'secure' -Requires-Dist: idna>=2.0.0; extra == 'secure' -Requires-Dist: pyopenssl>=17.1.0; extra == 'secure' -Requires-Dist: urllib3-secure-extra; extra == 'secure' -Provides-Extra: socks -Requires-Dist: pysocks!=1.5.7,<2.0,>=1.5.6; extra == 'socks' -Provides-Extra: zstd -Requires-Dist: zstandard>=0.18.0; extra == 'zstd' -Description-Content-Type: text/markdown - -

- -![urllib3](https://github.com/urllib3/urllib3/raw/main/docs/_static/banner_github.svg) - -

- -

- PyPI Version - Python Versions - Join our Discord - Coverage Status - Build Status on GitHub - Documentation Status
- OpenSSF Scorecard - SLSA 3 - CII Best Practices -

- -urllib3 is a powerful, *user-friendly* HTTP client for Python. Much of the -Python ecosystem already uses urllib3 and you should too. -urllib3 brings many critical features that are missing from the Python -standard libraries: - -- Thread safety. -- Connection pooling. -- Client-side SSL/TLS verification. -- File uploads with multipart encoding. -- Helpers for retrying requests and dealing with HTTP redirects. -- Support for gzip, deflate, brotli, and zstd encoding. -- Proxy support for HTTP and SOCKS. -- 100% test coverage. - -urllib3 is powerful and easy to use: - -```python3 ->>> import urllib3 ->>> resp = urllib3.request("GET", "http://httpbin.org/robots.txt") ->>> resp.status -200 ->>> resp.data -b"User-agent: *\nDisallow: /deny\n" -``` - -## Installing - -urllib3 can be installed with [pip](https://pip.pypa.io): - -```bash -$ python -m pip install urllib3 -``` - -Alternatively, you can grab the latest source code from [GitHub](https://github.com/urllib3/urllib3): - -```bash -$ git clone https://github.com/urllib3/urllib3.git -$ cd urllib3 -$ pip install . -``` - - -## Documentation - -urllib3 has usage and reference documentation at [urllib3.readthedocs.io](https://urllib3.readthedocs.io). - - -## Community - -urllib3 has a [community Discord channel](https://discord.gg/urllib3) for asking questions and -collaborating with other contributors. Drop by and say hello 👋 - - -## Contributing - -urllib3 happily accepts contributions. Please see our -[contributing documentation](https://urllib3.readthedocs.io/en/latest/contributing.html) -for some tips on getting started. - - -## Security Disclosures - -To report a security vulnerability, please use the -[Tidelift security contact](https://tidelift.com/security). -Tidelift will coordinate the fix and disclosure with maintainers. - - -## Maintainers - -- [@sethmlarson](https://github.com/sethmlarson) (Seth M. Larson) -- [@pquentin](https://github.com/pquentin) (Quentin Pradet) -- [@theacodes](https://github.com/theacodes) (Thea Flowers) -- [@haikuginger](https://github.com/haikuginger) (Jess Shapiro) -- [@lukasa](https://github.com/lukasa) (Cory Benfield) -- [@sigmavirus24](https://github.com/sigmavirus24) (Ian Stapleton Cordasco) -- [@shazow](https://github.com/shazow) (Andrey Petrov) - -👋 - - -## Sponsorship - -If your company benefits from this library, please consider [sponsoring its -development](https://urllib3.readthedocs.io/en/latest/sponsors.html). - - -## For Enterprise - -Professional support for urllib3 is available as part of the [Tidelift -Subscription][1]. Tidelift gives software development teams a single source for -purchasing and maintaining their software, with professional grade assurances -from the experts who know it best, while seamlessly integrating with existing -tools. - -[1]: https://tidelift.com/subscription/pkg/pypi-urllib3?utm_source=pypi-urllib3&utm_medium=referral&utm_campaign=readme diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/RECORD b/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/RECORD deleted file mode 100644 index 0b135161..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/RECORD +++ /dev/null @@ -1,70 +0,0 @@ -urllib3-2.0.7.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4 -urllib3-2.0.7.dist-info/METADATA,sha256=wRZalZQEW4d3SSm1Zd3hw0QCRVMbnCEPuWiT-M1bJ7U,6591 -urllib3-2.0.7.dist-info/RECORD,, -urllib3-2.0.7.dist-info/WHEEL,sha256=9QBuHhg6FNW7lppboF2vKVbCGTVzsFykgRQjjlajrhA,87 -urllib3-2.0.7.dist-info/licenses/LICENSE.txt,sha256=Ew46ZNX91dCWp1JpRjSn2d8oRGnehuVzIQAmgEHj1oY,1093 -urllib3/__init__.py,sha256=OV22EiB-j4tci8776nQPuyOorDZSvsbzlS1_3SP9fmo,5307 -urllib3/__pycache__/__init__.cpython-37.pyc,, -urllib3/__pycache__/_base_connection.cpython-37.pyc,, -urllib3/__pycache__/_collections.cpython-37.pyc,, -urllib3/__pycache__/_request_methods.cpython-37.pyc,, -urllib3/__pycache__/_version.cpython-37.pyc,, -urllib3/__pycache__/connection.cpython-37.pyc,, -urllib3/__pycache__/connectionpool.cpython-37.pyc,, -urllib3/__pycache__/exceptions.cpython-37.pyc,, -urllib3/__pycache__/fields.cpython-37.pyc,, -urllib3/__pycache__/filepost.cpython-37.pyc,, -urllib3/__pycache__/poolmanager.cpython-37.pyc,, -urllib3/__pycache__/response.cpython-37.pyc,, -urllib3/_base_connection.py,sha256=4GpGs3Qa8WU_y6e7UkTteQWLzu8Q8e7O3xEb_Hj2JjI,5652 -urllib3/_collections.py,sha256=g6OCJDb4bFfVDKkVvZQXBQMwtDsh_UI6-aj2-zmnLEc,17392 -urllib3/_request_methods.py,sha256=rTM3FfErdUIVfuqGYJvrnI-HLvBePTLDWKdzosJoyx4,7756 -urllib3/_version.py,sha256=QQcgyYI4X3r9Z6_6msm-EbKizkFo3jQPz08ADaWVZJc,98 -urllib3/connection.py,sha256=RwaDviX3S_l4GmqITQQAGYLtRtyOee3E1OYkO6Jrx3E,33832 -urllib3/connectionpool.py,sha256=ytM1wOT1zwJ0jl-h5d99PG-ufqIiRRtF41Wz_Gdn4iY,43256 -urllib3/contrib/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 -urllib3/contrib/__pycache__/__init__.cpython-37.pyc,, -urllib3/contrib/__pycache__/pyopenssl.cpython-37.pyc,, -urllib3/contrib/__pycache__/securetransport.cpython-37.pyc,, -urllib3/contrib/__pycache__/socks.cpython-37.pyc,, -urllib3/contrib/_securetransport/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 -urllib3/contrib/_securetransport/__pycache__/__init__.cpython-37.pyc,, -urllib3/contrib/_securetransport/__pycache__/bindings.cpython-37.pyc,, -urllib3/contrib/_securetransport/__pycache__/low_level.cpython-37.pyc,, -urllib3/contrib/_securetransport/bindings.py,sha256=N8r6aifbJ-dNS5v-YTPsBl7d0R1GhTi6FiUOdZMGdoo,14452 -urllib3/contrib/_securetransport/low_level.py,sha256=14Dhp_jima5J824obfFX5oBORYiAnULtUJ_TB8CEscY,16220 -urllib3/contrib/pyopenssl.py,sha256=l6Wzpc701s8gDnYg-UriakWuSfJU0vfNMj03V9ycCUc,19171 -urllib3/contrib/securetransport.py,sha256=tDglxxJvySdRih4JsawEKHitPytWUBJ6glrDrje4yM8,34121 -urllib3/contrib/socks.py,sha256=xbqs-P-UHH5L5a_dKvxKetFyV9lKuxkcV9K9Oiyd-gI,7715 -urllib3/exceptions.py,sha256=rOVHX1HOAb_TZwJZTqprLRTNAJQUWnrXDYaR8XBk1tY,9385 -urllib3/fields.py,sha256=XvSMfnSMqeOn9o-6Eb3Fl9MN2MNjiHsmEff_HR5jhEI,11026 -urllib3/filepost.py,sha256=-9qJT11cNGjO9dqnI20-oErZuTvNaM18xZZPCjZSbOE,2395 -urllib3/poolmanager.py,sha256=-HlU7Fr1q8GLBm7SUmAX9Yiy9jVog1k7PKck6smmcw0,22886 -urllib3/py.typed,sha256=UaCuPFa3H8UAakbt-5G8SPacldTOGvJv18pPjUJ5gDY,93 -urllib3/response.py,sha256=kLnppZw7Syn-70drmHhy1jvEvd-xvHNmrNiVaCZKL54,39999 -urllib3/util/__init__.py,sha256=WsFx_PdwI25do8AcdW-Xj3rvUrI3NsgeQULp6S0sPeU,1051 -urllib3/util/__pycache__/__init__.cpython-37.pyc,, -urllib3/util/__pycache__/connection.cpython-37.pyc,, -urllib3/util/__pycache__/proxy.cpython-37.pyc,, -urllib3/util/__pycache__/request.cpython-37.pyc,, -urllib3/util/__pycache__/response.cpython-37.pyc,, -urllib3/util/__pycache__/retry.cpython-37.pyc,, -urllib3/util/__pycache__/ssl_.cpython-37.pyc,, -urllib3/util/__pycache__/ssl_match_hostname.cpython-37.pyc,, -urllib3/util/__pycache__/ssltransport.cpython-37.pyc,, -urllib3/util/__pycache__/timeout.cpython-37.pyc,, -urllib3/util/__pycache__/url.cpython-37.pyc,, -urllib3/util/__pycache__/util.cpython-37.pyc,, -urllib3/util/__pycache__/wait.cpython-37.pyc,, -urllib3/util/connection.py,sha256=QeUUEuNmhznpuKNPL-B0IVOkMdMCu8oJX62OC0Vpzug,4462 -urllib3/util/proxy.py,sha256=seP8-Q5B6bB0dMtwPj-YcZZQ30vHuLqRu-tI0JZ2fzs,1148 -urllib3/util/request.py,sha256=5w7bjcFNwXffvFyqogq8KmJhKagKdiiD5EusYH-rxgU,8083 -urllib3/util/response.py,sha256=vQE639uoEhj1vpjEdxu5lNIhJCSUZkd7pqllUI0BZOA,3374 -urllib3/util/retry.py,sha256=WB-7x1m7fQH_-Qqtrk2OGvz93GvBTxc-pRn8Vf3p4mg,18384 -urllib3/util/ssl_.py,sha256=SFRzzcgEb-grMnaLPlUG8qjayg5Vgvvf9hmXy4e4dtI,19403 -urllib3/util/ssl_match_hostname.py,sha256=gaWqixoYtQ_GKO8fcRGFj3VXeMoqyxQQuUTPgWeiL_M,5812 -urllib3/util/ssltransport.py,sha256=jGmDxXI-nPBfMib-kjksI5TxUQyooYpekd0sjo1ibdg,9045 -urllib3/util/timeout.py,sha256=iXlm7hqG7ij7y27z23giTzsjyg3KIiVyjhsQsiWLDHA,10529 -urllib3/util/url.py,sha256=wHORhp80RAXyTlAIkTqLFzSrkU7J34ZDxX-tN65MBZk,15213 -urllib3/util/util.py,sha256=j3lbZK1jPyiwD34T8IgJzdWEZVT-4E-0vYIJi9UjeNA,1146 -urllib3/util/wait.py,sha256=_ph8IrUR3sqPqi0OopQgJUlH4wzkGeM5CiyA7XGGtmI,4423 diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/WHEEL b/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/WHEEL deleted file mode 100644 index ba1a8af2..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/WHEEL +++ /dev/null @@ -1,4 +0,0 @@ -Wheel-Version: 1.0 -Generator: hatchling 1.18.0 -Root-Is-Purelib: true -Tag: py3-none-any diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/licenses/LICENSE.txt b/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/licenses/LICENSE.txt deleted file mode 100644 index e6183d02..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3-2.0.7.dist-info/licenses/LICENSE.txt +++ /dev/null @@ -1,21 +0,0 @@ -MIT License - -Copyright (c) 2008-2020 Andrey Petrov and contributors. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/__init__.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/__init__.py deleted file mode 100644 index 32c1f002..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/__init__.py +++ /dev/null @@ -1,166 +0,0 @@ -""" -Python HTTP library with thread-safe connection pooling, file post support, user friendly, and more -""" - -from __future__ import annotations - -# Set default logging handler to avoid "No handler found" warnings. -import logging -import typing -import warnings -from logging import NullHandler - -from . import exceptions -from ._base_connection import _TYPE_BODY -from ._collections import HTTPHeaderDict -from ._version import __version__ -from .connectionpool import HTTPConnectionPool, HTTPSConnectionPool, connection_from_url -from .filepost import _TYPE_FIELDS, encode_multipart_formdata -from .poolmanager import PoolManager, ProxyManager, proxy_from_url -from .response import BaseHTTPResponse, HTTPResponse -from .util.request import make_headers -from .util.retry import Retry -from .util.timeout import Timeout - -# Ensure that Python is compiled with OpenSSL 1.1.1+ -# If the 'ssl' module isn't available at all that's -# fine, we only care if the module is available. -try: - import ssl -except ImportError: - pass -else: - if not ssl.OPENSSL_VERSION.startswith("OpenSSL "): # Defensive: - warnings.warn( - "urllib3 v2.0 only supports OpenSSL 1.1.1+, currently " - f"the 'ssl' module is compiled with {ssl.OPENSSL_VERSION!r}. " - "See: https://github.com/urllib3/urllib3/issues/3020", - exceptions.NotOpenSSLWarning, - ) - elif ssl.OPENSSL_VERSION_INFO < (1, 1, 1): # Defensive: - raise ImportError( - "urllib3 v2.0 only supports OpenSSL 1.1.1+, currently " - f"the 'ssl' module is compiled with {ssl.OPENSSL_VERSION!r}. " - "See: https://github.com/urllib3/urllib3/issues/2168" - ) - -# === NOTE TO REPACKAGERS AND VENDORS === -# Please delete this block, this logic is only -# for urllib3 being distributed via PyPI. -# See: https://github.com/urllib3/urllib3/issues/2680 -try: - import urllib3_secure_extra # type: ignore # noqa: F401 -except ModuleNotFoundError: - pass -else: - warnings.warn( - "'urllib3[secure]' extra is deprecated and will be removed " - "in urllib3 v2.1.0. Read more in this issue: " - "https://github.com/urllib3/urllib3/issues/2680", - category=DeprecationWarning, - stacklevel=2, - ) - -__author__ = "Andrey Petrov (andrey.petrov@shazow.net)" -__license__ = "MIT" -__version__ = __version__ - -__all__ = ( - "HTTPConnectionPool", - "HTTPHeaderDict", - "HTTPSConnectionPool", - "PoolManager", - "ProxyManager", - "HTTPResponse", - "Retry", - "Timeout", - "add_stderr_logger", - "connection_from_url", - "disable_warnings", - "encode_multipart_formdata", - "make_headers", - "proxy_from_url", - "request", - "BaseHTTPResponse", -) - -logging.getLogger(__name__).addHandler(NullHandler()) - - -def add_stderr_logger( - level: int = logging.DEBUG, -) -> logging.StreamHandler[typing.TextIO]: - """ - Helper for quickly adding a StreamHandler to the logger. Useful for - debugging. - - Returns the handler after adding it. - """ - # This method needs to be in this __init__.py to get the __name__ correct - # even if urllib3 is vendored within another package. - logger = logging.getLogger(__name__) - handler = logging.StreamHandler() - handler.setFormatter(logging.Formatter("%(asctime)s %(levelname)s %(message)s")) - logger.addHandler(handler) - logger.setLevel(level) - logger.debug("Added a stderr logging handler to logger: %s", __name__) - return handler - - -# ... Clean up. -del NullHandler - - -# All warning filters *must* be appended unless you're really certain that they -# shouldn't be: otherwise, it's very hard for users to use most Python -# mechanisms to silence them. -# SecurityWarning's always go off by default. -warnings.simplefilter("always", exceptions.SecurityWarning, append=True) -# InsecurePlatformWarning's don't vary between requests, so we keep it default. -warnings.simplefilter("default", exceptions.InsecurePlatformWarning, append=True) - - -def disable_warnings(category: type[Warning] = exceptions.HTTPWarning) -> None: - """ - Helper for quickly disabling all urllib3 warnings. - """ - warnings.simplefilter("ignore", category) - - -_DEFAULT_POOL = PoolManager() - - -def request( - method: str, - url: str, - *, - body: _TYPE_BODY | None = None, - fields: _TYPE_FIELDS | None = None, - headers: typing.Mapping[str, str] | None = None, - preload_content: bool | None = True, - decode_content: bool | None = True, - redirect: bool | None = True, - retries: Retry | bool | int | None = None, - timeout: Timeout | float | int | None = 3, - json: typing.Any | None = None, -) -> BaseHTTPResponse: - """ - A convenience, top-level request method. It uses a module-global ``PoolManager`` instance. - Therefore, its side effects could be shared across dependencies relying on it. - To avoid side effects create a new ``PoolManager`` instance and use it instead. - The method does not accept low-level ``**urlopen_kw`` keyword arguments. - """ - - return _DEFAULT_POOL.request( - method, - url, - body=body, - fields=fields, - headers=headers, - preload_content=preload_content, - decode_content=decode_content, - redirect=redirect, - retries=retries, - timeout=timeout, - json=json, - ) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/_base_connection.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/_base_connection.py deleted file mode 100644 index 25b633af..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/_base_connection.py +++ /dev/null @@ -1,173 +0,0 @@ -from __future__ import annotations - -import typing - -from .util.connection import _TYPE_SOCKET_OPTIONS -from .util.timeout import _DEFAULT_TIMEOUT, _TYPE_TIMEOUT -from .util.url import Url - -_TYPE_BODY = typing.Union[bytes, typing.IO[typing.Any], typing.Iterable[bytes], str] - - -class ProxyConfig(typing.NamedTuple): - ssl_context: ssl.SSLContext | None - use_forwarding_for_https: bool - assert_hostname: None | str | Literal[False] - assert_fingerprint: str | None - - -class _ResponseOptions(typing.NamedTuple): - # TODO: Remove this in favor of a better - # HTTP request/response lifecycle tracking. - request_method: str - request_url: str - preload_content: bool - decode_content: bool - enforce_content_length: bool - - -if typing.TYPE_CHECKING: - import ssl - - from typing_extensions import Literal, Protocol - - from .response import BaseHTTPResponse - - class BaseHTTPConnection(Protocol): - default_port: typing.ClassVar[int] - default_socket_options: typing.ClassVar[_TYPE_SOCKET_OPTIONS] - - host: str - port: int - timeout: None | ( - float - ) # Instance doesn't store _DEFAULT_TIMEOUT, must be resolved. - blocksize: int - source_address: tuple[str, int] | None - socket_options: _TYPE_SOCKET_OPTIONS | None - - proxy: Url | None - proxy_config: ProxyConfig | None - - is_verified: bool - proxy_is_verified: bool | None - - def __init__( - self, - host: str, - port: int | None = None, - *, - timeout: _TYPE_TIMEOUT = _DEFAULT_TIMEOUT, - source_address: tuple[str, int] | None = None, - blocksize: int = 8192, - socket_options: _TYPE_SOCKET_OPTIONS | None = ..., - proxy: Url | None = None, - proxy_config: ProxyConfig | None = None, - ) -> None: - ... - - def set_tunnel( - self, - host: str, - port: int | None = None, - headers: typing.Mapping[str, str] | None = None, - scheme: str = "http", - ) -> None: - ... - - def connect(self) -> None: - ... - - def request( - self, - method: str, - url: str, - body: _TYPE_BODY | None = None, - headers: typing.Mapping[str, str] | None = None, - # We know *at least* botocore is depending on the order of the - # first 3 parameters so to be safe we only mark the later ones - # as keyword-only to ensure we have space to extend. - *, - chunked: bool = False, - preload_content: bool = True, - decode_content: bool = True, - enforce_content_length: bool = True, - ) -> None: - ... - - def getresponse(self) -> BaseHTTPResponse: - ... - - def close(self) -> None: - ... - - @property - def is_closed(self) -> bool: - """Whether the connection either is brand new or has been previously closed. - If this property is True then both ``is_connected`` and ``has_connected_to_proxy`` - properties must be False. - """ - - @property - def is_connected(self) -> bool: - """Whether the connection is actively connected to any origin (proxy or target)""" - - @property - def has_connected_to_proxy(self) -> bool: - """Whether the connection has successfully connected to its proxy. - This returns False if no proxy is in use. Used to determine whether - errors are coming from the proxy layer or from tunnelling to the target origin. - """ - - class BaseHTTPSConnection(BaseHTTPConnection, Protocol): - default_port: typing.ClassVar[int] - default_socket_options: typing.ClassVar[_TYPE_SOCKET_OPTIONS] - - # Certificate verification methods - cert_reqs: int | str | None - assert_hostname: None | str | Literal[False] - assert_fingerprint: str | None - ssl_context: ssl.SSLContext | None - - # Trusted CAs - ca_certs: str | None - ca_cert_dir: str | None - ca_cert_data: None | str | bytes - - # TLS version - ssl_minimum_version: int | None - ssl_maximum_version: int | None - ssl_version: int | str | None # Deprecated - - # Client certificates - cert_file: str | None - key_file: str | None - key_password: str | None - - def __init__( - self, - host: str, - port: int | None = None, - *, - timeout: _TYPE_TIMEOUT = _DEFAULT_TIMEOUT, - source_address: tuple[str, int] | None = None, - blocksize: int = 16384, - socket_options: _TYPE_SOCKET_OPTIONS | None = ..., - proxy: Url | None = None, - proxy_config: ProxyConfig | None = None, - cert_reqs: int | str | None = None, - assert_hostname: None | str | Literal[False] = None, - assert_fingerprint: str | None = None, - server_hostname: str | None = None, - ssl_context: ssl.SSLContext | None = None, - ca_certs: str | None = None, - ca_cert_dir: str | None = None, - ca_cert_data: None | str | bytes = None, - ssl_minimum_version: int | None = None, - ssl_maximum_version: int | None = None, - ssl_version: int | str | None = None, # Deprecated - cert_file: str | None = None, - key_file: str | None = None, - key_password: str | None = None, - ) -> None: - ... diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/_collections.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/_collections.py deleted file mode 100644 index 8bdfb767..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/_collections.py +++ /dev/null @@ -1,481 +0,0 @@ -from __future__ import annotations - -import typing -from collections import OrderedDict -from enum import Enum, auto -from threading import RLock - -if typing.TYPE_CHECKING: - # We can only import Protocol if TYPE_CHECKING because it's a development - # dependency, and is not available at runtime. - from typing_extensions import Protocol, Self - - class HasGettableStringKeys(Protocol): - def keys(self) -> typing.Iterator[str]: - ... - - def __getitem__(self, key: str) -> str: - ... - - -__all__ = ["RecentlyUsedContainer", "HTTPHeaderDict"] - - -# Key type -_KT = typing.TypeVar("_KT") -# Value type -_VT = typing.TypeVar("_VT") -# Default type -_DT = typing.TypeVar("_DT") - -ValidHTTPHeaderSource = typing.Union[ - "HTTPHeaderDict", - typing.Mapping[str, str], - typing.Iterable[typing.Tuple[str, str]], - "HasGettableStringKeys", -] - - -class _Sentinel(Enum): - not_passed = auto() - - -def ensure_can_construct_http_header_dict( - potential: object, -) -> ValidHTTPHeaderSource | None: - if isinstance(potential, HTTPHeaderDict): - return potential - elif isinstance(potential, typing.Mapping): - # Full runtime checking of the contents of a Mapping is expensive, so for the - # purposes of typechecking, we assume that any Mapping is the right shape. - return typing.cast(typing.Mapping[str, str], potential) - elif isinstance(potential, typing.Iterable): - # Similarly to Mapping, full runtime checking of the contents of an Iterable is - # expensive, so for the purposes of typechecking, we assume that any Iterable - # is the right shape. - return typing.cast(typing.Iterable[typing.Tuple[str, str]], potential) - elif hasattr(potential, "keys") and hasattr(potential, "__getitem__"): - return typing.cast("HasGettableStringKeys", potential) - else: - return None - - -class RecentlyUsedContainer(typing.Generic[_KT, _VT], typing.MutableMapping[_KT, _VT]): - """ - Provides a thread-safe dict-like container which maintains up to - ``maxsize`` keys while throwing away the least-recently-used keys beyond - ``maxsize``. - - :param maxsize: - Maximum number of recent elements to retain. - - :param dispose_func: - Every time an item is evicted from the container, - ``dispose_func(value)`` is called. Callback which will get called - """ - - _container: typing.OrderedDict[_KT, _VT] - _maxsize: int - dispose_func: typing.Callable[[_VT], None] | None - lock: RLock - - def __init__( - self, - maxsize: int = 10, - dispose_func: typing.Callable[[_VT], None] | None = None, - ) -> None: - super().__init__() - self._maxsize = maxsize - self.dispose_func = dispose_func - self._container = OrderedDict() - self.lock = RLock() - - def __getitem__(self, key: _KT) -> _VT: - # Re-insert the item, moving it to the end of the eviction line. - with self.lock: - item = self._container.pop(key) - self._container[key] = item - return item - - def __setitem__(self, key: _KT, value: _VT) -> None: - evicted_item = None - with self.lock: - # Possibly evict the existing value of 'key' - try: - # If the key exists, we'll overwrite it, which won't change the - # size of the pool. Because accessing a key should move it to - # the end of the eviction line, we pop it out first. - evicted_item = key, self._container.pop(key) - self._container[key] = value - except KeyError: - # When the key does not exist, we insert the value first so that - # evicting works in all cases, including when self._maxsize is 0 - self._container[key] = value - if len(self._container) > self._maxsize: - # If we didn't evict an existing value, and we've hit our maximum - # size, then we have to evict the least recently used item from - # the beginning of the container. - evicted_item = self._container.popitem(last=False) - - # After releasing the lock on the pool, dispose of any evicted value. - if evicted_item is not None and self.dispose_func: - _, evicted_value = evicted_item - self.dispose_func(evicted_value) - - def __delitem__(self, key: _KT) -> None: - with self.lock: - value = self._container.pop(key) - - if self.dispose_func: - self.dispose_func(value) - - def __len__(self) -> int: - with self.lock: - return len(self._container) - - def __iter__(self) -> typing.NoReturn: - raise NotImplementedError( - "Iteration over this class is unlikely to be threadsafe." - ) - - def clear(self) -> None: - with self.lock: - # Copy pointers to all values, then wipe the mapping - values = list(self._container.values()) - self._container.clear() - - if self.dispose_func: - for value in values: - self.dispose_func(value) - - def keys(self) -> set[_KT]: # type: ignore[override] - with self.lock: - return set(self._container.keys()) - - -class HTTPHeaderDictItemView(typing.Set[typing.Tuple[str, str]]): - """ - HTTPHeaderDict is unusual for a Mapping[str, str] in that it has two modes of - address. - - If we directly try to get an item with a particular name, we will get a string - back that is the concatenated version of all the values: - - >>> d['X-Header-Name'] - 'Value1, Value2, Value3' - - However, if we iterate over an HTTPHeaderDict's items, we will optionally combine - these values based on whether combine=True was called when building up the dictionary - - >>> d = HTTPHeaderDict({"A": "1", "B": "foo"}) - >>> d.add("A", "2", combine=True) - >>> d.add("B", "bar") - >>> list(d.items()) - [ - ('A', '1, 2'), - ('B', 'foo'), - ('B', 'bar'), - ] - - This class conforms to the interface required by the MutableMapping ABC while - also giving us the nonstandard iteration behavior we want; items with duplicate - keys, ordered by time of first insertion. - """ - - _headers: HTTPHeaderDict - - def __init__(self, headers: HTTPHeaderDict) -> None: - self._headers = headers - - def __len__(self) -> int: - return len(list(self._headers.iteritems())) - - def __iter__(self) -> typing.Iterator[tuple[str, str]]: - return self._headers.iteritems() - - def __contains__(self, item: object) -> bool: - if isinstance(item, tuple) and len(item) == 2: - passed_key, passed_val = item - if isinstance(passed_key, str) and isinstance(passed_val, str): - return self._headers._has_value_for_header(passed_key, passed_val) - return False - - -class HTTPHeaderDict(typing.MutableMapping[str, str]): - """ - :param headers: - An iterable of field-value pairs. Must not contain multiple field names - when compared case-insensitively. - - :param kwargs: - Additional field-value pairs to pass in to ``dict.update``. - - A ``dict`` like container for storing HTTP Headers. - - Field names are stored and compared case-insensitively in compliance with - RFC 7230. Iteration provides the first case-sensitive key seen for each - case-insensitive pair. - - Using ``__setitem__`` syntax overwrites fields that compare equal - case-insensitively in order to maintain ``dict``'s api. For fields that - compare equal, instead create a new ``HTTPHeaderDict`` and use ``.add`` - in a loop. - - If multiple fields that are equal case-insensitively are passed to the - constructor or ``.update``, the behavior is undefined and some will be - lost. - - >>> headers = HTTPHeaderDict() - >>> headers.add('Set-Cookie', 'foo=bar') - >>> headers.add('set-cookie', 'baz=quxx') - >>> headers['content-length'] = '7' - >>> headers['SET-cookie'] - 'foo=bar, baz=quxx' - >>> headers['Content-Length'] - '7' - """ - - _container: typing.MutableMapping[str, list[str]] - - def __init__(self, headers: ValidHTTPHeaderSource | None = None, **kwargs: str): - super().__init__() - self._container = {} # 'dict' is insert-ordered in Python 3.7+ - if headers is not None: - if isinstance(headers, HTTPHeaderDict): - self._copy_from(headers) - else: - self.extend(headers) - if kwargs: - self.extend(kwargs) - - def __setitem__(self, key: str, val: str) -> None: - # avoid a bytes/str comparison by decoding before httplib - if isinstance(key, bytes): - key = key.decode("latin-1") - self._container[key.lower()] = [key, val] - - def __getitem__(self, key: str) -> str: - val = self._container[key.lower()] - return ", ".join(val[1:]) - - def __delitem__(self, key: str) -> None: - del self._container[key.lower()] - - def __contains__(self, key: object) -> bool: - if isinstance(key, str): - return key.lower() in self._container - return False - - def setdefault(self, key: str, default: str = "") -> str: - return super().setdefault(key, default) - - def __eq__(self, other: object) -> bool: - maybe_constructable = ensure_can_construct_http_header_dict(other) - if maybe_constructable is None: - return False - else: - other_as_http_header_dict = type(self)(maybe_constructable) - - return {k.lower(): v for k, v in self.itermerged()} == { - k.lower(): v for k, v in other_as_http_header_dict.itermerged() - } - - def __ne__(self, other: object) -> bool: - return not self.__eq__(other) - - def __len__(self) -> int: - return len(self._container) - - def __iter__(self) -> typing.Iterator[str]: - # Only provide the originally cased names - for vals in self._container.values(): - yield vals[0] - - def discard(self, key: str) -> None: - try: - del self[key] - except KeyError: - pass - - def add(self, key: str, val: str, *, combine: bool = False) -> None: - """Adds a (name, value) pair, doesn't overwrite the value if it already - exists. - - If this is called with combine=True, instead of adding a new header value - as a distinct item during iteration, this will instead append the value to - any existing header value with a comma. If no existing header value exists - for the key, then the value will simply be added, ignoring the combine parameter. - - >>> headers = HTTPHeaderDict(foo='bar') - >>> headers.add('Foo', 'baz') - >>> headers['foo'] - 'bar, baz' - >>> list(headers.items()) - [('foo', 'bar'), ('foo', 'baz')] - >>> headers.add('foo', 'quz', combine=True) - >>> list(headers.items()) - [('foo', 'bar, baz, quz')] - """ - # avoid a bytes/str comparison by decoding before httplib - if isinstance(key, bytes): - key = key.decode("latin-1") - key_lower = key.lower() - new_vals = [key, val] - # Keep the common case aka no item present as fast as possible - vals = self._container.setdefault(key_lower, new_vals) - if new_vals is not vals: - # if there are values here, then there is at least the initial - # key/value pair - assert len(vals) >= 2 - if combine: - vals[-1] = vals[-1] + ", " + val - else: - vals.append(val) - - def extend(self, *args: ValidHTTPHeaderSource, **kwargs: str) -> None: - """Generic import function for any type of header-like object. - Adapted version of MutableMapping.update in order to insert items - with self.add instead of self.__setitem__ - """ - if len(args) > 1: - raise TypeError( - f"extend() takes at most 1 positional arguments ({len(args)} given)" - ) - other = args[0] if len(args) >= 1 else () - - if isinstance(other, HTTPHeaderDict): - for key, val in other.iteritems(): - self.add(key, val) - elif isinstance(other, typing.Mapping): - for key, val in other.items(): - self.add(key, val) - elif isinstance(other, typing.Iterable): - other = typing.cast(typing.Iterable[typing.Tuple[str, str]], other) - for key, value in other: - self.add(key, value) - elif hasattr(other, "keys") and hasattr(other, "__getitem__"): - # THIS IS NOT A TYPESAFE BRANCH - # In this branch, the object has a `keys` attr but is not a Mapping or any of - # the other types indicated in the method signature. We do some stuff with - # it as though it partially implements the Mapping interface, but we're not - # doing that stuff safely AT ALL. - for key in other.keys(): - self.add(key, other[key]) - - for key, value in kwargs.items(): - self.add(key, value) - - @typing.overload - def getlist(self, key: str) -> list[str]: - ... - - @typing.overload - def getlist(self, key: str, default: _DT) -> list[str] | _DT: - ... - - def getlist( - self, key: str, default: _Sentinel | _DT = _Sentinel.not_passed - ) -> list[str] | _DT: - """Returns a list of all the values for the named field. Returns an - empty list if the key doesn't exist.""" - try: - vals = self._container[key.lower()] - except KeyError: - if default is _Sentinel.not_passed: - # _DT is unbound; empty list is instance of List[str] - return [] - # _DT is bound; default is instance of _DT - return default - else: - # _DT may or may not be bound; vals[1:] is instance of List[str], which - # meets our external interface requirement of `Union[List[str], _DT]`. - return vals[1:] - - def _prepare_for_method_change(self) -> Self: - """ - Remove content-specific header fields before changing the request - method to GET or HEAD according to RFC 9110, Section 15.4. - """ - content_specific_headers = [ - "Content-Encoding", - "Content-Language", - "Content-Location", - "Content-Type", - "Content-Length", - "Digest", - "Last-Modified", - ] - for header in content_specific_headers: - self.discard(header) - return self - - # Backwards compatibility for httplib - getheaders = getlist - getallmatchingheaders = getlist - iget = getlist - - # Backwards compatibility for http.cookiejar - get_all = getlist - - def __repr__(self) -> str: - return f"{type(self).__name__}({dict(self.itermerged())})" - - def _copy_from(self, other: HTTPHeaderDict) -> None: - for key in other: - val = other.getlist(key) - self._container[key.lower()] = [key, *val] - - def copy(self) -> HTTPHeaderDict: - clone = type(self)() - clone._copy_from(self) - return clone - - def iteritems(self) -> typing.Iterator[tuple[str, str]]: - """Iterate over all header lines, including duplicate ones.""" - for key in self: - vals = self._container[key.lower()] - for val in vals[1:]: - yield vals[0], val - - def itermerged(self) -> typing.Iterator[tuple[str, str]]: - """Iterate over all headers, merging duplicate ones together.""" - for key in self: - val = self._container[key.lower()] - yield val[0], ", ".join(val[1:]) - - def items(self) -> HTTPHeaderDictItemView: # type: ignore[override] - return HTTPHeaderDictItemView(self) - - def _has_value_for_header(self, header_name: str, potential_value: str) -> bool: - if header_name in self: - return potential_value in self._container[header_name.lower()][1:] - return False - - def __ior__(self, other: object) -> HTTPHeaderDict: - # Supports extending a header dict in-place using operator |= - # combining items with add instead of __setitem__ - maybe_constructable = ensure_can_construct_http_header_dict(other) - if maybe_constructable is None: - return NotImplemented - self.extend(maybe_constructable) - return self - - def __or__(self, other: object) -> HTTPHeaderDict: - # Supports merging header dicts using operator | - # combining items with add instead of __setitem__ - maybe_constructable = ensure_can_construct_http_header_dict(other) - if maybe_constructable is None: - return NotImplemented - result = self.copy() - result.extend(maybe_constructable) - return result - - def __ror__(self, other: object) -> HTTPHeaderDict: - # Supports merging header dicts using operator | when other is on left side - # combining items with add instead of __setitem__ - maybe_constructable = ensure_can_construct_http_header_dict(other) - if maybe_constructable is None: - return NotImplemented - result = type(self)(maybe_constructable) - result.extend(self) - return result diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/_request_methods.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/_request_methods.py deleted file mode 100644 index 1d0f3465..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/_request_methods.py +++ /dev/null @@ -1,217 +0,0 @@ -from __future__ import annotations - -import json as _json -import typing -from urllib.parse import urlencode - -from ._base_connection import _TYPE_BODY -from ._collections import HTTPHeaderDict -from .filepost import _TYPE_FIELDS, encode_multipart_formdata -from .response import BaseHTTPResponse - -__all__ = ["RequestMethods"] - -_TYPE_ENCODE_URL_FIELDS = typing.Union[ - typing.Sequence[typing.Tuple[str, typing.Union[str, bytes]]], - typing.Mapping[str, typing.Union[str, bytes]], -] - - -class RequestMethods: - """ - Convenience mixin for classes who implement a :meth:`urlopen` method, such - as :class:`urllib3.HTTPConnectionPool` and - :class:`urllib3.PoolManager`. - - Provides behavior for making common types of HTTP request methods and - decides which type of request field encoding to use. - - Specifically, - - :meth:`.request_encode_url` is for sending requests whose fields are - encoded in the URL (such as GET, HEAD, DELETE). - - :meth:`.request_encode_body` is for sending requests whose fields are - encoded in the *body* of the request using multipart or www-form-urlencoded - (such as for POST, PUT, PATCH). - - :meth:`.request` is for making any kind of request, it will look up the - appropriate encoding format and use one of the above two methods to make - the request. - - Initializer parameters: - - :param headers: - Headers to include with all requests, unless other headers are given - explicitly. - """ - - _encode_url_methods = {"DELETE", "GET", "HEAD", "OPTIONS"} - - def __init__(self, headers: typing.Mapping[str, str] | None = None) -> None: - self.headers = headers or {} - - def urlopen( - self, - method: str, - url: str, - body: _TYPE_BODY | None = None, - headers: typing.Mapping[str, str] | None = None, - encode_multipart: bool = True, - multipart_boundary: str | None = None, - **kw: typing.Any, - ) -> BaseHTTPResponse: # Abstract - raise NotImplementedError( - "Classes extending RequestMethods must implement " - "their own ``urlopen`` method." - ) - - def request( - self, - method: str, - url: str, - body: _TYPE_BODY | None = None, - fields: _TYPE_FIELDS | None = None, - headers: typing.Mapping[str, str] | None = None, - json: typing.Any | None = None, - **urlopen_kw: typing.Any, - ) -> BaseHTTPResponse: - """ - Make a request using :meth:`urlopen` with the appropriate encoding of - ``fields`` based on the ``method`` used. - - This is a convenience method that requires the least amount of manual - effort. It can be used in most situations, while still having the - option to drop down to more specific methods when necessary, such as - :meth:`request_encode_url`, :meth:`request_encode_body`, - or even the lowest level :meth:`urlopen`. - """ - method = method.upper() - - if json is not None and body is not None: - raise TypeError( - "request got values for both 'body' and 'json' parameters which are mutually exclusive" - ) - - if json is not None: - if headers is None: - headers = self.headers.copy() # type: ignore - if not ("content-type" in map(str.lower, headers.keys())): - headers["Content-Type"] = "application/json" # type: ignore - - body = _json.dumps(json, separators=(",", ":"), ensure_ascii=False).encode( - "utf-8" - ) - - if body is not None: - urlopen_kw["body"] = body - - if method in self._encode_url_methods: - return self.request_encode_url( - method, - url, - fields=fields, # type: ignore[arg-type] - headers=headers, - **urlopen_kw, - ) - else: - return self.request_encode_body( - method, url, fields=fields, headers=headers, **urlopen_kw - ) - - def request_encode_url( - self, - method: str, - url: str, - fields: _TYPE_ENCODE_URL_FIELDS | None = None, - headers: typing.Mapping[str, str] | None = None, - **urlopen_kw: str, - ) -> BaseHTTPResponse: - """ - Make a request using :meth:`urlopen` with the ``fields`` encoded in - the url. This is useful for request methods like GET, HEAD, DELETE, etc. - """ - if headers is None: - headers = self.headers - - extra_kw: dict[str, typing.Any] = {"headers": headers} - extra_kw.update(urlopen_kw) - - if fields: - url += "?" + urlencode(fields) - - return self.urlopen(method, url, **extra_kw) - - def request_encode_body( - self, - method: str, - url: str, - fields: _TYPE_FIELDS | None = None, - headers: typing.Mapping[str, str] | None = None, - encode_multipart: bool = True, - multipart_boundary: str | None = None, - **urlopen_kw: str, - ) -> BaseHTTPResponse: - """ - Make a request using :meth:`urlopen` with the ``fields`` encoded in - the body. This is useful for request methods like POST, PUT, PATCH, etc. - - When ``encode_multipart=True`` (default), then - :func:`urllib3.encode_multipart_formdata` is used to encode - the payload with the appropriate content type. Otherwise - :func:`urllib.parse.urlencode` is used with the - 'application/x-www-form-urlencoded' content type. - - Multipart encoding must be used when posting files, and it's reasonably - safe to use it in other times too. However, it may break request - signing, such as with OAuth. - - Supports an optional ``fields`` parameter of key/value strings AND - key/filetuple. A filetuple is a (filename, data, MIME type) tuple where - the MIME type is optional. For example:: - - fields = { - 'foo': 'bar', - 'fakefile': ('foofile.txt', 'contents of foofile'), - 'realfile': ('barfile.txt', open('realfile').read()), - 'typedfile': ('bazfile.bin', open('bazfile').read(), - 'image/jpeg'), - 'nonamefile': 'contents of nonamefile field', - } - - When uploading a file, providing a filename (the first parameter of the - tuple) is optional but recommended to best mimic behavior of browsers. - - Note that if ``headers`` are supplied, the 'Content-Type' header will - be overwritten because it depends on the dynamic random boundary string - which is used to compose the body of the request. The random boundary - string can be explicitly set with the ``multipart_boundary`` parameter. - """ - if headers is None: - headers = self.headers - - extra_kw: dict[str, typing.Any] = {"headers": HTTPHeaderDict(headers)} - body: bytes | str - - if fields: - if "body" in urlopen_kw: - raise TypeError( - "request got values for both 'fields' and 'body', can only specify one." - ) - - if encode_multipart: - body, content_type = encode_multipart_formdata( - fields, boundary=multipart_boundary - ) - else: - body, content_type = ( - urlencode(fields), # type: ignore[arg-type] - "application/x-www-form-urlencoded", - ) - - extra_kw["body"] = body - extra_kw["headers"].setdefault("Content-Type", content_type) - - extra_kw.update(urlopen_kw) - - return self.urlopen(method, url, **extra_kw) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/_version.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/_version.py deleted file mode 100644 index e2b88f1d..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/_version.py +++ /dev/null @@ -1,4 +0,0 @@ -# This file is protected via CODEOWNERS -from __future__ import annotations - -__version__ = "2.0.7" diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/connection.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/connection.py deleted file mode 100644 index 4a71225c..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/connection.py +++ /dev/null @@ -1,906 +0,0 @@ -from __future__ import annotations - -import datetime -import logging -import os -import re -import socket -import sys -import typing -import warnings -from http.client import HTTPConnection as _HTTPConnection -from http.client import HTTPException as HTTPException # noqa: F401 -from http.client import ResponseNotReady -from socket import timeout as SocketTimeout - -if typing.TYPE_CHECKING: - from typing_extensions import Literal - - from .response import HTTPResponse - from .util.ssl_ import _TYPE_PEER_CERT_RET_DICT - from .util.ssltransport import SSLTransport - -from ._collections import HTTPHeaderDict -from .util.response import assert_header_parsing -from .util.timeout import _DEFAULT_TIMEOUT, _TYPE_TIMEOUT, Timeout -from .util.util import to_str -from .util.wait import wait_for_read - -try: # Compiled with SSL? - import ssl - - BaseSSLError = ssl.SSLError -except (ImportError, AttributeError): - ssl = None # type: ignore[assignment] - - class BaseSSLError(BaseException): # type: ignore[no-redef] - pass - - -from ._base_connection import _TYPE_BODY -from ._base_connection import ProxyConfig as ProxyConfig -from ._base_connection import _ResponseOptions as _ResponseOptions -from ._version import __version__ -from .exceptions import ( - ConnectTimeoutError, - HeaderParsingError, - NameResolutionError, - NewConnectionError, - ProxyError, - SystemTimeWarning, -) -from .util import SKIP_HEADER, SKIPPABLE_HEADERS, connection, ssl_ -from .util.request import body_to_chunks -from .util.ssl_ import assert_fingerprint as _assert_fingerprint -from .util.ssl_ import ( - create_urllib3_context, - is_ipaddress, - resolve_cert_reqs, - resolve_ssl_version, - ssl_wrap_socket, -) -from .util.ssl_match_hostname import CertificateError, match_hostname -from .util.url import Url - -# Not a no-op, we're adding this to the namespace so it can be imported. -ConnectionError = ConnectionError -BrokenPipeError = BrokenPipeError - - -log = logging.getLogger(__name__) - -port_by_scheme = {"http": 80, "https": 443} - -# When it comes time to update this value as a part of regular maintenance -# (ie test_recent_date is failing) update it to ~6 months before the current date. -RECENT_DATE = datetime.date(2022, 1, 1) - -_CONTAINS_CONTROL_CHAR_RE = re.compile(r"[^-!#$%&'*+.^_`|~0-9a-zA-Z]") - -_HAS_SYS_AUDIT = hasattr(sys, "audit") - - -class HTTPConnection(_HTTPConnection): - """ - Based on :class:`http.client.HTTPConnection` but provides an extra constructor - backwards-compatibility layer between older and newer Pythons. - - Additional keyword parameters are used to configure attributes of the connection. - Accepted parameters include: - - - ``source_address``: Set the source address for the current connection. - - ``socket_options``: Set specific options on the underlying socket. If not specified, then - defaults are loaded from ``HTTPConnection.default_socket_options`` which includes disabling - Nagle's algorithm (sets TCP_NODELAY to 1) unless the connection is behind a proxy. - - For example, if you wish to enable TCP Keep Alive in addition to the defaults, - you might pass: - - .. code-block:: python - - HTTPConnection.default_socket_options + [ - (socket.SOL_SOCKET, socket.SO_KEEPALIVE, 1), - ] - - Or you may want to disable the defaults by passing an empty list (e.g., ``[]``). - """ - - default_port: typing.ClassVar[int] = port_by_scheme["http"] # type: ignore[misc] - - #: Disable Nagle's algorithm by default. - #: ``[(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)]`` - default_socket_options: typing.ClassVar[connection._TYPE_SOCKET_OPTIONS] = [ - (socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) - ] - - #: Whether this connection verifies the host's certificate. - is_verified: bool = False - - #: Whether this proxy connection verified the proxy host's certificate. - # If no proxy is currently connected to the value will be ``None``. - proxy_is_verified: bool | None = None - - blocksize: int - source_address: tuple[str, int] | None - socket_options: connection._TYPE_SOCKET_OPTIONS | None - - _has_connected_to_proxy: bool - _response_options: _ResponseOptions | None - _tunnel_host: str | None - _tunnel_port: int | None - _tunnel_scheme: str | None - - def __init__( - self, - host: str, - port: int | None = None, - *, - timeout: _TYPE_TIMEOUT = _DEFAULT_TIMEOUT, - source_address: tuple[str, int] | None = None, - blocksize: int = 16384, - socket_options: None - | (connection._TYPE_SOCKET_OPTIONS) = default_socket_options, - proxy: Url | None = None, - proxy_config: ProxyConfig | None = None, - ) -> None: - super().__init__( - host=host, - port=port, - timeout=Timeout.resolve_default_timeout(timeout), - source_address=source_address, - blocksize=blocksize, - ) - self.socket_options = socket_options - self.proxy = proxy - self.proxy_config = proxy_config - - self._has_connected_to_proxy = False - self._response_options = None - self._tunnel_host: str | None = None - self._tunnel_port: int | None = None - self._tunnel_scheme: str | None = None - - # https://github.com/python/mypy/issues/4125 - # Mypy treats this as LSP violation, which is considered a bug. - # If `host` is made a property it violates LSP, because a writeable attribute is overridden with a read-only one. - # However, there is also a `host` setter so LSP is not violated. - # Potentially, a `@host.deleter` might be needed depending on how this issue will be fixed. - @property - def host(self) -> str: - """ - Getter method to remove any trailing dots that indicate the hostname is an FQDN. - - In general, SSL certificates don't include the trailing dot indicating a - fully-qualified domain name, and thus, they don't validate properly when - checked against a domain name that includes the dot. In addition, some - servers may not expect to receive the trailing dot when provided. - - However, the hostname with trailing dot is critical to DNS resolution; doing a - lookup with the trailing dot will properly only resolve the appropriate FQDN, - whereas a lookup without a trailing dot will search the system's search domain - list. Thus, it's important to keep the original host around for use only in - those cases where it's appropriate (i.e., when doing DNS lookup to establish the - actual TCP connection across which we're going to send HTTP requests). - """ - return self._dns_host.rstrip(".") - - @host.setter - def host(self, value: str) -> None: - """ - Setter for the `host` property. - - We assume that only urllib3 uses the _dns_host attribute; httplib itself - only uses `host`, and it seems reasonable that other libraries follow suit. - """ - self._dns_host = value - - def _new_conn(self) -> socket.socket: - """Establish a socket connection and set nodelay settings on it. - - :return: New socket connection. - """ - try: - sock = connection.create_connection( - (self._dns_host, self.port), - self.timeout, - source_address=self.source_address, - socket_options=self.socket_options, - ) - except socket.gaierror as e: - raise NameResolutionError(self.host, self, e) from e - except SocketTimeout as e: - raise ConnectTimeoutError( - self, - f"Connection to {self.host} timed out. (connect timeout={self.timeout})", - ) from e - - except OSError as e: - raise NewConnectionError( - self, f"Failed to establish a new connection: {e}" - ) from e - - # Audit hooks are only available in Python 3.8+ - if _HAS_SYS_AUDIT: - sys.audit("http.client.connect", self, self.host, self.port) - - return sock - - def set_tunnel( - self, - host: str, - port: int | None = None, - headers: typing.Mapping[str, str] | None = None, - scheme: str = "http", - ) -> None: - if scheme not in ("http", "https"): - raise ValueError( - f"Invalid proxy scheme for tunneling: {scheme!r}, must be either 'http' or 'https'" - ) - super().set_tunnel(host, port=port, headers=headers) - self._tunnel_scheme = scheme - - def connect(self) -> None: - self.sock = self._new_conn() - if self._tunnel_host: - # If we're tunneling it means we're connected to our proxy. - self._has_connected_to_proxy = True - - # TODO: Fix tunnel so it doesn't depend on self.sock state. - self._tunnel() # type: ignore[attr-defined] - - # If there's a proxy to be connected to we are fully connected. - # This is set twice (once above and here) due to forwarding proxies - # not using tunnelling. - self._has_connected_to_proxy = bool(self.proxy) - - @property - def is_closed(self) -> bool: - return self.sock is None - - @property - def is_connected(self) -> bool: - if self.sock is None: - return False - return not wait_for_read(self.sock, timeout=0.0) - - @property - def has_connected_to_proxy(self) -> bool: - return self._has_connected_to_proxy - - def close(self) -> None: - try: - super().close() - finally: - # Reset all stateful properties so connection - # can be re-used without leaking prior configs. - self.sock = None - self.is_verified = False - self.proxy_is_verified = None - self._has_connected_to_proxy = False - self._response_options = None - self._tunnel_host = None - self._tunnel_port = None - self._tunnel_scheme = None - - def putrequest( - self, - method: str, - url: str, - skip_host: bool = False, - skip_accept_encoding: bool = False, - ) -> None: - """""" - # Empty docstring because the indentation of CPython's implementation - # is broken but we don't want this method in our documentation. - match = _CONTAINS_CONTROL_CHAR_RE.search(method) - if match: - raise ValueError( - f"Method cannot contain non-token characters {method!r} (found at least {match.group()!r})" - ) - - return super().putrequest( - method, url, skip_host=skip_host, skip_accept_encoding=skip_accept_encoding - ) - - def putheader(self, header: str, *values: str) -> None: - """""" - if not any(isinstance(v, str) and v == SKIP_HEADER for v in values): - super().putheader(header, *values) - elif to_str(header.lower()) not in SKIPPABLE_HEADERS: - skippable_headers = "', '".join( - [str.title(header) for header in sorted(SKIPPABLE_HEADERS)] - ) - raise ValueError( - f"urllib3.util.SKIP_HEADER only supports '{skippable_headers}'" - ) - - # `request` method's signature intentionally violates LSP. - # urllib3's API is different from `http.client.HTTPConnection` and the subclassing is only incidental. - def request( # type: ignore[override] - self, - method: str, - url: str, - body: _TYPE_BODY | None = None, - headers: typing.Mapping[str, str] | None = None, - *, - chunked: bool = False, - preload_content: bool = True, - decode_content: bool = True, - enforce_content_length: bool = True, - ) -> None: - # Update the inner socket's timeout value to send the request. - # This only triggers if the connection is re-used. - if self.sock is not None: - self.sock.settimeout(self.timeout) - - # Store these values to be fed into the HTTPResponse - # object later. TODO: Remove this in favor of a real - # HTTP lifecycle mechanism. - - # We have to store these before we call .request() - # because sometimes we can still salvage a response - # off the wire even if we aren't able to completely - # send the request body. - self._response_options = _ResponseOptions( - request_method=method, - request_url=url, - preload_content=preload_content, - decode_content=decode_content, - enforce_content_length=enforce_content_length, - ) - - if headers is None: - headers = {} - header_keys = frozenset(to_str(k.lower()) for k in headers) - skip_accept_encoding = "accept-encoding" in header_keys - skip_host = "host" in header_keys - self.putrequest( - method, url, skip_accept_encoding=skip_accept_encoding, skip_host=skip_host - ) - - # Transform the body into an iterable of sendall()-able chunks - # and detect if an explicit Content-Length is doable. - chunks_and_cl = body_to_chunks(body, method=method, blocksize=self.blocksize) - chunks = chunks_and_cl.chunks - content_length = chunks_and_cl.content_length - - # When chunked is explicit set to 'True' we respect that. - if chunked: - if "transfer-encoding" not in header_keys: - self.putheader("Transfer-Encoding", "chunked") - else: - # Detect whether a framing mechanism is already in use. If so - # we respect that value, otherwise we pick chunked vs content-length - # depending on the type of 'body'. - if "content-length" in header_keys: - chunked = False - elif "transfer-encoding" in header_keys: - chunked = True - - # Otherwise we go off the recommendation of 'body_to_chunks()'. - else: - chunked = False - if content_length is None: - if chunks is not None: - chunked = True - self.putheader("Transfer-Encoding", "chunked") - else: - self.putheader("Content-Length", str(content_length)) - - # Now that framing headers are out of the way we send all the other headers. - if "user-agent" not in header_keys: - self.putheader("User-Agent", _get_default_user_agent()) - for header, value in headers.items(): - self.putheader(header, value) - self.endheaders() - - # If we're given a body we start sending that in chunks. - if chunks is not None: - for chunk in chunks: - # Sending empty chunks isn't allowed for TE: chunked - # as it indicates the end of the body. - if not chunk: - continue - if isinstance(chunk, str): - chunk = chunk.encode("utf-8") - if chunked: - self.send(b"%x\r\n%b\r\n" % (len(chunk), chunk)) - else: - self.send(chunk) - - # Regardless of whether we have a body or not, if we're in - # chunked mode we want to send an explicit empty chunk. - if chunked: - self.send(b"0\r\n\r\n") - - def request_chunked( - self, - method: str, - url: str, - body: _TYPE_BODY | None = None, - headers: typing.Mapping[str, str] | None = None, - ) -> None: - """ - Alternative to the common request method, which sends the - body with chunked encoding and not as one block - """ - warnings.warn( - "HTTPConnection.request_chunked() is deprecated and will be removed " - "in urllib3 v2.1.0. Instead use HTTPConnection.request(..., chunked=True).", - category=DeprecationWarning, - stacklevel=2, - ) - self.request(method, url, body=body, headers=headers, chunked=True) - - def getresponse( # type: ignore[override] - self, - ) -> HTTPResponse: - """ - Get the response from the server. - - If the HTTPConnection is in the correct state, returns an instance of HTTPResponse or of whatever object is returned by the response_class variable. - - If a request has not been sent or if a previous response has not be handled, ResponseNotReady is raised. If the HTTP response indicates that the connection should be closed, then it will be closed before the response is returned. When the connection is closed, the underlying socket is closed. - """ - # Raise the same error as http.client.HTTPConnection - if self._response_options is None: - raise ResponseNotReady() - - # Reset this attribute for being used again. - resp_options = self._response_options - self._response_options = None - - # Since the connection's timeout value may have been updated - # we need to set the timeout on the socket. - self.sock.settimeout(self.timeout) - - # This is needed here to avoid circular import errors - from .response import HTTPResponse - - # Get the response from http.client.HTTPConnection - httplib_response = super().getresponse() - - try: - assert_header_parsing(httplib_response.msg) - except (HeaderParsingError, TypeError) as hpe: - log.warning( - "Failed to parse headers (url=%s): %s", - _url_from_connection(self, resp_options.request_url), - hpe, - exc_info=True, - ) - - headers = HTTPHeaderDict(httplib_response.msg.items()) - - response = HTTPResponse( - body=httplib_response, - headers=headers, - status=httplib_response.status, - version=httplib_response.version, - reason=httplib_response.reason, - preload_content=resp_options.preload_content, - decode_content=resp_options.decode_content, - original_response=httplib_response, - enforce_content_length=resp_options.enforce_content_length, - request_method=resp_options.request_method, - request_url=resp_options.request_url, - ) - return response - - -class HTTPSConnection(HTTPConnection): - """ - Many of the parameters to this constructor are passed to the underlying SSL - socket by means of :py:func:`urllib3.util.ssl_wrap_socket`. - """ - - default_port = port_by_scheme["https"] # type: ignore[misc] - - cert_reqs: int | str | None = None - ca_certs: str | None = None - ca_cert_dir: str | None = None - ca_cert_data: None | str | bytes = None - ssl_version: int | str | None = None - ssl_minimum_version: int | None = None - ssl_maximum_version: int | None = None - assert_fingerprint: str | None = None - - def __init__( - self, - host: str, - port: int | None = None, - *, - timeout: _TYPE_TIMEOUT = _DEFAULT_TIMEOUT, - source_address: tuple[str, int] | None = None, - blocksize: int = 16384, - socket_options: None - | (connection._TYPE_SOCKET_OPTIONS) = HTTPConnection.default_socket_options, - proxy: Url | None = None, - proxy_config: ProxyConfig | None = None, - cert_reqs: int | str | None = None, - assert_hostname: None | str | Literal[False] = None, - assert_fingerprint: str | None = None, - server_hostname: str | None = None, - ssl_context: ssl.SSLContext | None = None, - ca_certs: str | None = None, - ca_cert_dir: str | None = None, - ca_cert_data: None | str | bytes = None, - ssl_minimum_version: int | None = None, - ssl_maximum_version: int | None = None, - ssl_version: int | str | None = None, # Deprecated - cert_file: str | None = None, - key_file: str | None = None, - key_password: str | None = None, - ) -> None: - super().__init__( - host, - port=port, - timeout=timeout, - source_address=source_address, - blocksize=blocksize, - socket_options=socket_options, - proxy=proxy, - proxy_config=proxy_config, - ) - - self.key_file = key_file - self.cert_file = cert_file - self.key_password = key_password - self.ssl_context = ssl_context - self.server_hostname = server_hostname - self.assert_hostname = assert_hostname - self.assert_fingerprint = assert_fingerprint - self.ssl_version = ssl_version - self.ssl_minimum_version = ssl_minimum_version - self.ssl_maximum_version = ssl_maximum_version - self.ca_certs = ca_certs and os.path.expanduser(ca_certs) - self.ca_cert_dir = ca_cert_dir and os.path.expanduser(ca_cert_dir) - self.ca_cert_data = ca_cert_data - - # cert_reqs depends on ssl_context so calculate last. - if cert_reqs is None: - if self.ssl_context is not None: - cert_reqs = self.ssl_context.verify_mode - else: - cert_reqs = resolve_cert_reqs(None) - self.cert_reqs = cert_reqs - - def set_cert( - self, - key_file: str | None = None, - cert_file: str | None = None, - cert_reqs: int | str | None = None, - key_password: str | None = None, - ca_certs: str | None = None, - assert_hostname: None | str | Literal[False] = None, - assert_fingerprint: str | None = None, - ca_cert_dir: str | None = None, - ca_cert_data: None | str | bytes = None, - ) -> None: - """ - This method should only be called once, before the connection is used. - """ - warnings.warn( - "HTTPSConnection.set_cert() is deprecated and will be removed " - "in urllib3 v2.1.0. Instead provide the parameters to the " - "HTTPSConnection constructor.", - category=DeprecationWarning, - stacklevel=2, - ) - - # If cert_reqs is not provided we'll assume CERT_REQUIRED unless we also - # have an SSLContext object in which case we'll use its verify_mode. - if cert_reqs is None: - if self.ssl_context is not None: - cert_reqs = self.ssl_context.verify_mode - else: - cert_reqs = resolve_cert_reqs(None) - - self.key_file = key_file - self.cert_file = cert_file - self.cert_reqs = cert_reqs - self.key_password = key_password - self.assert_hostname = assert_hostname - self.assert_fingerprint = assert_fingerprint - self.ca_certs = ca_certs and os.path.expanduser(ca_certs) - self.ca_cert_dir = ca_cert_dir and os.path.expanduser(ca_cert_dir) - self.ca_cert_data = ca_cert_data - - def connect(self) -> None: - sock: socket.socket | ssl.SSLSocket - self.sock = sock = self._new_conn() - server_hostname: str = self.host - tls_in_tls = False - - # Do we need to establish a tunnel? - if self._tunnel_host is not None: - # We're tunneling to an HTTPS origin so need to do TLS-in-TLS. - if self._tunnel_scheme == "https": - self.sock = sock = self._connect_tls_proxy(self.host, sock) - tls_in_tls = True - - # If we're tunneling it means we're connected to our proxy. - self._has_connected_to_proxy = True - - self._tunnel() # type: ignore[attr-defined] - # Override the host with the one we're requesting data from. - server_hostname = self._tunnel_host - - if self.server_hostname is not None: - server_hostname = self.server_hostname - - is_time_off = datetime.date.today() < RECENT_DATE - if is_time_off: - warnings.warn( - ( - f"System time is way off (before {RECENT_DATE}). This will probably " - "lead to SSL verification errors" - ), - SystemTimeWarning, - ) - - sock_and_verified = _ssl_wrap_socket_and_match_hostname( - sock=sock, - cert_reqs=self.cert_reqs, - ssl_version=self.ssl_version, - ssl_minimum_version=self.ssl_minimum_version, - ssl_maximum_version=self.ssl_maximum_version, - ca_certs=self.ca_certs, - ca_cert_dir=self.ca_cert_dir, - ca_cert_data=self.ca_cert_data, - cert_file=self.cert_file, - key_file=self.key_file, - key_password=self.key_password, - server_hostname=server_hostname, - ssl_context=self.ssl_context, - tls_in_tls=tls_in_tls, - assert_hostname=self.assert_hostname, - assert_fingerprint=self.assert_fingerprint, - ) - self.sock = sock_and_verified.socket - self.is_verified = sock_and_verified.is_verified - - # If there's a proxy to be connected to we are fully connected. - # This is set twice (once above and here) due to forwarding proxies - # not using tunnelling. - self._has_connected_to_proxy = bool(self.proxy) - - def _connect_tls_proxy(self, hostname: str, sock: socket.socket) -> ssl.SSLSocket: - """ - Establish a TLS connection to the proxy using the provided SSL context. - """ - # `_connect_tls_proxy` is called when self._tunnel_host is truthy. - proxy_config = typing.cast(ProxyConfig, self.proxy_config) - ssl_context = proxy_config.ssl_context - sock_and_verified = _ssl_wrap_socket_and_match_hostname( - sock, - cert_reqs=self.cert_reqs, - ssl_version=self.ssl_version, - ssl_minimum_version=self.ssl_minimum_version, - ssl_maximum_version=self.ssl_maximum_version, - ca_certs=self.ca_certs, - ca_cert_dir=self.ca_cert_dir, - ca_cert_data=self.ca_cert_data, - server_hostname=hostname, - ssl_context=ssl_context, - assert_hostname=proxy_config.assert_hostname, - assert_fingerprint=proxy_config.assert_fingerprint, - # Features that aren't implemented for proxies yet: - cert_file=None, - key_file=None, - key_password=None, - tls_in_tls=False, - ) - self.proxy_is_verified = sock_and_verified.is_verified - return sock_and_verified.socket # type: ignore[return-value] - - -class _WrappedAndVerifiedSocket(typing.NamedTuple): - """ - Wrapped socket and whether the connection is - verified after the TLS handshake - """ - - socket: ssl.SSLSocket | SSLTransport - is_verified: bool - - -def _ssl_wrap_socket_and_match_hostname( - sock: socket.socket, - *, - cert_reqs: None | str | int, - ssl_version: None | str | int, - ssl_minimum_version: int | None, - ssl_maximum_version: int | None, - cert_file: str | None, - key_file: str | None, - key_password: str | None, - ca_certs: str | None, - ca_cert_dir: str | None, - ca_cert_data: None | str | bytes, - assert_hostname: None | str | Literal[False], - assert_fingerprint: str | None, - server_hostname: str | None, - ssl_context: ssl.SSLContext | None, - tls_in_tls: bool = False, -) -> _WrappedAndVerifiedSocket: - """Logic for constructing an SSLContext from all TLS parameters, passing - that down into ssl_wrap_socket, and then doing certificate verification - either via hostname or fingerprint. This function exists to guarantee - that both proxies and targets have the same behavior when connecting via TLS. - """ - default_ssl_context = False - if ssl_context is None: - default_ssl_context = True - context = create_urllib3_context( - ssl_version=resolve_ssl_version(ssl_version), - ssl_minimum_version=ssl_minimum_version, - ssl_maximum_version=ssl_maximum_version, - cert_reqs=resolve_cert_reqs(cert_reqs), - ) - else: - context = ssl_context - - context.verify_mode = resolve_cert_reqs(cert_reqs) - - # In some cases, we want to verify hostnames ourselves - if ( - # `ssl` can't verify fingerprints or alternate hostnames - assert_fingerprint - or assert_hostname - # assert_hostname can be set to False to disable hostname checking - or assert_hostname is False - # We still support OpenSSL 1.0.2, which prevents us from verifying - # hostnames easily: https://github.com/pyca/pyopenssl/pull/933 - or ssl_.IS_PYOPENSSL - or not ssl_.HAS_NEVER_CHECK_COMMON_NAME - ): - context.check_hostname = False - - # Try to load OS default certs if none are given. - # We need to do the hasattr() check for our custom - # pyOpenSSL and SecureTransport SSLContext objects - # because neither support load_default_certs(). - if ( - not ca_certs - and not ca_cert_dir - and not ca_cert_data - and default_ssl_context - and hasattr(context, "load_default_certs") - ): - context.load_default_certs() - - # Ensure that IPv6 addresses are in the proper format and don't have a - # scope ID. Python's SSL module fails to recognize scoped IPv6 addresses - # and interprets them as DNS hostnames. - if server_hostname is not None: - normalized = server_hostname.strip("[]") - if "%" in normalized: - normalized = normalized[: normalized.rfind("%")] - if is_ipaddress(normalized): - server_hostname = normalized - - ssl_sock = ssl_wrap_socket( - sock=sock, - keyfile=key_file, - certfile=cert_file, - key_password=key_password, - ca_certs=ca_certs, - ca_cert_dir=ca_cert_dir, - ca_cert_data=ca_cert_data, - server_hostname=server_hostname, - ssl_context=context, - tls_in_tls=tls_in_tls, - ) - - try: - if assert_fingerprint: - _assert_fingerprint( - ssl_sock.getpeercert(binary_form=True), assert_fingerprint - ) - elif ( - context.verify_mode != ssl.CERT_NONE - and not context.check_hostname - and assert_hostname is not False - ): - cert: _TYPE_PEER_CERT_RET_DICT = ssl_sock.getpeercert() # type: ignore[assignment] - - # Need to signal to our match_hostname whether to use 'commonName' or not. - # If we're using our own constructed SSLContext we explicitly set 'False' - # because PyPy hard-codes 'True' from SSLContext.hostname_checks_common_name. - if default_ssl_context: - hostname_checks_common_name = False - else: - hostname_checks_common_name = ( - getattr(context, "hostname_checks_common_name", False) or False - ) - - _match_hostname( - cert, - assert_hostname or server_hostname, # type: ignore[arg-type] - hostname_checks_common_name, - ) - - return _WrappedAndVerifiedSocket( - socket=ssl_sock, - is_verified=context.verify_mode == ssl.CERT_REQUIRED - or bool(assert_fingerprint), - ) - except BaseException: - ssl_sock.close() - raise - - -def _match_hostname( - cert: _TYPE_PEER_CERT_RET_DICT | None, - asserted_hostname: str, - hostname_checks_common_name: bool = False, -) -> None: - # Our upstream implementation of ssl.match_hostname() - # only applies this normalization to IP addresses so it doesn't - # match DNS SANs so we do the same thing! - stripped_hostname = asserted_hostname.strip("[]") - if is_ipaddress(stripped_hostname): - asserted_hostname = stripped_hostname - - try: - match_hostname(cert, asserted_hostname, hostname_checks_common_name) - except CertificateError as e: - log.warning( - "Certificate did not match expected hostname: %s. Certificate: %s", - asserted_hostname, - cert, - ) - # Add cert to exception and reraise so client code can inspect - # the cert when catching the exception, if they want to - e._peer_cert = cert # type: ignore[attr-defined] - raise - - -def _wrap_proxy_error(err: Exception, proxy_scheme: str | None) -> ProxyError: - # Look for the phrase 'wrong version number', if found - # then we should warn the user that we're very sure that - # this proxy is HTTP-only and they have a configuration issue. - error_normalized = " ".join(re.split("[^a-z]", str(err).lower())) - is_likely_http_proxy = ( - "wrong version number" in error_normalized - or "unknown protocol" in error_normalized - ) - http_proxy_warning = ( - ". Your proxy appears to only use HTTP and not HTTPS, " - "try changing your proxy URL to be HTTP. See: " - "https://urllib3.readthedocs.io/en/latest/advanced-usage.html" - "#https-proxy-error-http-proxy" - ) - new_err = ProxyError( - f"Unable to connect to proxy" - f"{http_proxy_warning if is_likely_http_proxy and proxy_scheme == 'https' else ''}", - err, - ) - new_err.__cause__ = err - return new_err - - -def _get_default_user_agent() -> str: - return f"python-urllib3/{__version__}" - - -class DummyConnection: - """Used to detect a failed ConnectionCls import.""" - - -if not ssl: - HTTPSConnection = DummyConnection # type: ignore[misc, assignment] # noqa: F811 - - -VerifiedHTTPSConnection = HTTPSConnection - - -def _url_from_connection( - conn: HTTPConnection | HTTPSConnection, path: str | None = None -) -> str: - """Returns the URL from a given connection. This is mainly used for testing and logging.""" - - scheme = "https" if isinstance(conn, HTTPSConnection) else "http" - - return Url(scheme=scheme, host=conn.host, port=conn.port, path=path).url diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/connectionpool.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/connectionpool.py deleted file mode 100644 index c6ca3902..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/connectionpool.py +++ /dev/null @@ -1,1183 +0,0 @@ -from __future__ import annotations - -import errno -import logging -import queue -import sys -import typing -import warnings -import weakref -from socket import timeout as SocketTimeout -from types import TracebackType - -from ._base_connection import _TYPE_BODY -from ._collections import HTTPHeaderDict -from ._request_methods import RequestMethods -from .connection import ( - BaseSSLError, - BrokenPipeError, - DummyConnection, - HTTPConnection, - HTTPException, - HTTPSConnection, - ProxyConfig, - _wrap_proxy_error, -) -from .connection import port_by_scheme as port_by_scheme -from .exceptions import ( - ClosedPoolError, - EmptyPoolError, - FullPoolError, - HostChangedError, - InsecureRequestWarning, - LocationValueError, - MaxRetryError, - NewConnectionError, - ProtocolError, - ProxyError, - ReadTimeoutError, - SSLError, - TimeoutError, -) -from .response import BaseHTTPResponse -from .util.connection import is_connection_dropped -from .util.proxy import connection_requires_http_tunnel -from .util.request import _TYPE_BODY_POSITION, set_file_position -from .util.retry import Retry -from .util.ssl_match_hostname import CertificateError -from .util.timeout import _DEFAULT_TIMEOUT, _TYPE_DEFAULT, Timeout -from .util.url import Url, _encode_target -from .util.url import _normalize_host as normalize_host -from .util.url import parse_url -from .util.util import to_str - -if typing.TYPE_CHECKING: - import ssl - - from typing_extensions import Literal - - from ._base_connection import BaseHTTPConnection, BaseHTTPSConnection - -log = logging.getLogger(__name__) - -_TYPE_TIMEOUT = typing.Union[Timeout, float, _TYPE_DEFAULT, None] - -_SelfT = typing.TypeVar("_SelfT") - - -# Pool objects -class ConnectionPool: - """ - Base class for all connection pools, such as - :class:`.HTTPConnectionPool` and :class:`.HTTPSConnectionPool`. - - .. note:: - ConnectionPool.urlopen() does not normalize or percent-encode target URIs - which is useful if your target server doesn't support percent-encoded - target URIs. - """ - - scheme: str | None = None - QueueCls = queue.LifoQueue - - def __init__(self, host: str, port: int | None = None) -> None: - if not host: - raise LocationValueError("No host specified.") - - self.host = _normalize_host(host, scheme=self.scheme) - self.port = port - - # This property uses 'normalize_host()' (not '_normalize_host()') - # to avoid removing square braces around IPv6 addresses. - # This value is sent to `HTTPConnection.set_tunnel()` if called - # because square braces are required for HTTP CONNECT tunneling. - self._tunnel_host = normalize_host(host, scheme=self.scheme).lower() - - def __str__(self) -> str: - return f"{type(self).__name__}(host={self.host!r}, port={self.port!r})" - - def __enter__(self: _SelfT) -> _SelfT: - return self - - def __exit__( - self, - exc_type: type[BaseException] | None, - exc_val: BaseException | None, - exc_tb: TracebackType | None, - ) -> Literal[False]: - self.close() - # Return False to re-raise any potential exceptions - return False - - def close(self) -> None: - """ - Close all pooled connections and disable the pool. - """ - - -# This is taken from http://hg.python.org/cpython/file/7aaba721ebc0/Lib/socket.py#l252 -_blocking_errnos = {errno.EAGAIN, errno.EWOULDBLOCK} - - -class HTTPConnectionPool(ConnectionPool, RequestMethods): - """ - Thread-safe connection pool for one host. - - :param host: - Host used for this HTTP Connection (e.g. "localhost"), passed into - :class:`http.client.HTTPConnection`. - - :param port: - Port used for this HTTP Connection (None is equivalent to 80), passed - into :class:`http.client.HTTPConnection`. - - :param timeout: - Socket timeout in seconds for each individual connection. This can - be a float or integer, which sets the timeout for the HTTP request, - or an instance of :class:`urllib3.util.Timeout` which gives you more - fine-grained control over request timeouts. After the constructor has - been parsed, this is always a `urllib3.util.Timeout` object. - - :param maxsize: - Number of connections to save that can be reused. More than 1 is useful - in multithreaded situations. If ``block`` is set to False, more - connections will be created but they will not be saved once they've - been used. - - :param block: - If set to True, no more than ``maxsize`` connections will be used at - a time. When no free connections are available, the call will block - until a connection has been released. This is a useful side effect for - particular multithreaded situations where one does not want to use more - than maxsize connections per host to prevent flooding. - - :param headers: - Headers to include with all requests, unless other headers are given - explicitly. - - :param retries: - Retry configuration to use by default with requests in this pool. - - :param _proxy: - Parsed proxy URL, should not be used directly, instead, see - :class:`urllib3.ProxyManager` - - :param _proxy_headers: - A dictionary with proxy headers, should not be used directly, - instead, see :class:`urllib3.ProxyManager` - - :param \\**conn_kw: - Additional parameters are used to create fresh :class:`urllib3.connection.HTTPConnection`, - :class:`urllib3.connection.HTTPSConnection` instances. - """ - - scheme = "http" - ConnectionCls: ( - type[BaseHTTPConnection] | type[BaseHTTPSConnection] - ) = HTTPConnection - - def __init__( - self, - host: str, - port: int | None = None, - timeout: _TYPE_TIMEOUT | None = _DEFAULT_TIMEOUT, - maxsize: int = 1, - block: bool = False, - headers: typing.Mapping[str, str] | None = None, - retries: Retry | bool | int | None = None, - _proxy: Url | None = None, - _proxy_headers: typing.Mapping[str, str] | None = None, - _proxy_config: ProxyConfig | None = None, - **conn_kw: typing.Any, - ): - ConnectionPool.__init__(self, host, port) - RequestMethods.__init__(self, headers) - - if not isinstance(timeout, Timeout): - timeout = Timeout.from_float(timeout) - - if retries is None: - retries = Retry.DEFAULT - - self.timeout = timeout - self.retries = retries - - self.pool: queue.LifoQueue[typing.Any] | None = self.QueueCls(maxsize) - self.block = block - - self.proxy = _proxy - self.proxy_headers = _proxy_headers or {} - self.proxy_config = _proxy_config - - # Fill the queue up so that doing get() on it will block properly - for _ in range(maxsize): - self.pool.put(None) - - # These are mostly for testing and debugging purposes. - self.num_connections = 0 - self.num_requests = 0 - self.conn_kw = conn_kw - - if self.proxy: - # Enable Nagle's algorithm for proxies, to avoid packet fragmentation. - # We cannot know if the user has added default socket options, so we cannot replace the - # list. - self.conn_kw.setdefault("socket_options", []) - - self.conn_kw["proxy"] = self.proxy - self.conn_kw["proxy_config"] = self.proxy_config - - # Do not pass 'self' as callback to 'finalize'. - # Then the 'finalize' would keep an endless living (leak) to self. - # By just passing a reference to the pool allows the garbage collector - # to free self if nobody else has a reference to it. - pool = self.pool - - # Close all the HTTPConnections in the pool before the - # HTTPConnectionPool object is garbage collected. - weakref.finalize(self, _close_pool_connections, pool) - - def _new_conn(self) -> BaseHTTPConnection: - """ - Return a fresh :class:`HTTPConnection`. - """ - self.num_connections += 1 - log.debug( - "Starting new HTTP connection (%d): %s:%s", - self.num_connections, - self.host, - self.port or "80", - ) - - conn = self.ConnectionCls( - host=self.host, - port=self.port, - timeout=self.timeout.connect_timeout, - **self.conn_kw, - ) - return conn - - def _get_conn(self, timeout: float | None = None) -> BaseHTTPConnection: - """ - Get a connection. Will return a pooled connection if one is available. - - If no connections are available and :prop:`.block` is ``False``, then a - fresh connection is returned. - - :param timeout: - Seconds to wait before giving up and raising - :class:`urllib3.exceptions.EmptyPoolError` if the pool is empty and - :prop:`.block` is ``True``. - """ - conn = None - - if self.pool is None: - raise ClosedPoolError(self, "Pool is closed.") - - try: - conn = self.pool.get(block=self.block, timeout=timeout) - - except AttributeError: # self.pool is None - raise ClosedPoolError(self, "Pool is closed.") from None # Defensive: - - except queue.Empty: - if self.block: - raise EmptyPoolError( - self, - "Pool is empty and a new connection can't be opened due to blocking mode.", - ) from None - pass # Oh well, we'll create a new connection then - - # If this is a persistent connection, check if it got disconnected - if conn and is_connection_dropped(conn): - log.debug("Resetting dropped connection: %s", self.host) - conn.close() - - return conn or self._new_conn() - - def _put_conn(self, conn: BaseHTTPConnection | None) -> None: - """ - Put a connection back into the pool. - - :param conn: - Connection object for the current host and port as returned by - :meth:`._new_conn` or :meth:`._get_conn`. - - If the pool is already full, the connection is closed and discarded - because we exceeded maxsize. If connections are discarded frequently, - then maxsize should be increased. - - If the pool is closed, then the connection will be closed and discarded. - """ - if self.pool is not None: - try: - self.pool.put(conn, block=False) - return # Everything is dandy, done. - except AttributeError: - # self.pool is None. - pass - except queue.Full: - # Connection never got put back into the pool, close it. - if conn: - conn.close() - - if self.block: - # This should never happen if you got the conn from self._get_conn - raise FullPoolError( - self, - "Pool reached maximum size and no more connections are allowed.", - ) from None - - log.warning( - "Connection pool is full, discarding connection: %s. Connection pool size: %s", - self.host, - self.pool.qsize(), - ) - - # Connection never got put back into the pool, close it. - if conn: - conn.close() - - def _validate_conn(self, conn: BaseHTTPConnection) -> None: - """ - Called right before a request is made, after the socket is created. - """ - - def _prepare_proxy(self, conn: BaseHTTPConnection) -> None: - # Nothing to do for HTTP connections. - pass - - def _get_timeout(self, timeout: _TYPE_TIMEOUT) -> Timeout: - """Helper that always returns a :class:`urllib3.util.Timeout`""" - if timeout is _DEFAULT_TIMEOUT: - return self.timeout.clone() - - if isinstance(timeout, Timeout): - return timeout.clone() - else: - # User passed us an int/float. This is for backwards compatibility, - # can be removed later - return Timeout.from_float(timeout) - - def _raise_timeout( - self, - err: BaseSSLError | OSError | SocketTimeout, - url: str, - timeout_value: _TYPE_TIMEOUT | None, - ) -> None: - """Is the error actually a timeout? Will raise a ReadTimeout or pass""" - - if isinstance(err, SocketTimeout): - raise ReadTimeoutError( - self, url, f"Read timed out. (read timeout={timeout_value})" - ) from err - - # See the above comment about EAGAIN in Python 3. - if hasattr(err, "errno") and err.errno in _blocking_errnos: - raise ReadTimeoutError( - self, url, f"Read timed out. (read timeout={timeout_value})" - ) from err - - def _make_request( - self, - conn: BaseHTTPConnection, - method: str, - url: str, - body: _TYPE_BODY | None = None, - headers: typing.Mapping[str, str] | None = None, - retries: Retry | None = None, - timeout: _TYPE_TIMEOUT = _DEFAULT_TIMEOUT, - chunked: bool = False, - response_conn: BaseHTTPConnection | None = None, - preload_content: bool = True, - decode_content: bool = True, - enforce_content_length: bool = True, - ) -> BaseHTTPResponse: - """ - Perform a request on a given urllib connection object taken from our - pool. - - :param conn: - a connection from one of our connection pools - - :param method: - HTTP request method (such as GET, POST, PUT, etc.) - - :param url: - The URL to perform the request on. - - :param body: - Data to send in the request body, either :class:`str`, :class:`bytes`, - an iterable of :class:`str`/:class:`bytes`, or a file-like object. - - :param headers: - Dictionary of custom headers to send, such as User-Agent, - If-None-Match, etc. If None, pool headers are used. If provided, - these headers completely replace any pool-specific headers. - - :param retries: - Configure the number of retries to allow before raising a - :class:`~urllib3.exceptions.MaxRetryError` exception. - - Pass ``None`` to retry until you receive a response. Pass a - :class:`~urllib3.util.retry.Retry` object for fine-grained control - over different types of retries. - Pass an integer number to retry connection errors that many times, - but no other types of errors. Pass zero to never retry. - - If ``False``, then retries are disabled and any exception is raised - immediately. Also, instead of raising a MaxRetryError on redirects, - the redirect response will be returned. - - :type retries: :class:`~urllib3.util.retry.Retry`, False, or an int. - - :param timeout: - If specified, overrides the default timeout for this one - request. It may be a float (in seconds) or an instance of - :class:`urllib3.util.Timeout`. - - :param chunked: - If True, urllib3 will send the body using chunked transfer - encoding. Otherwise, urllib3 will send the body using the standard - content-length form. Defaults to False. - - :param response_conn: - Set this to ``None`` if you will handle releasing the connection or - set the connection to have the response release it. - - :param preload_content: - If True, the response's body will be preloaded during construction. - - :param decode_content: - If True, will attempt to decode the body based on the - 'content-encoding' header. - - :param enforce_content_length: - Enforce content length checking. Body returned by server must match - value of Content-Length header, if present. Otherwise, raise error. - """ - self.num_requests += 1 - - timeout_obj = self._get_timeout(timeout) - timeout_obj.start_connect() - conn.timeout = Timeout.resolve_default_timeout(timeout_obj.connect_timeout) - - try: - # Trigger any extra validation we need to do. - try: - self._validate_conn(conn) - except (SocketTimeout, BaseSSLError) as e: - self._raise_timeout(err=e, url=url, timeout_value=conn.timeout) - raise - - # _validate_conn() starts the connection to an HTTPS proxy - # so we need to wrap errors with 'ProxyError' here too. - except ( - OSError, - NewConnectionError, - TimeoutError, - BaseSSLError, - CertificateError, - SSLError, - ) as e: - new_e: Exception = e - if isinstance(e, (BaseSSLError, CertificateError)): - new_e = SSLError(e) - # If the connection didn't successfully connect to it's proxy - # then there - if isinstance( - new_e, (OSError, NewConnectionError, TimeoutError, SSLError) - ) and (conn and conn.proxy and not conn.has_connected_to_proxy): - new_e = _wrap_proxy_error(new_e, conn.proxy.scheme) - raise new_e - - # conn.request() calls http.client.*.request, not the method in - # urllib3.request. It also calls makefile (recv) on the socket. - try: - conn.request( - method, - url, - body=body, - headers=headers, - chunked=chunked, - preload_content=preload_content, - decode_content=decode_content, - enforce_content_length=enforce_content_length, - ) - - # We are swallowing BrokenPipeError (errno.EPIPE) since the server is - # legitimately able to close the connection after sending a valid response. - # With this behaviour, the received response is still readable. - except BrokenPipeError: - pass - except OSError as e: - # MacOS/Linux - # EPROTOTYPE is needed on macOS - # https://erickt.github.io/blog/2014/11/19/adventures-in-debugging-a-potential-osx-kernel-bug/ - if e.errno != errno.EPROTOTYPE: - raise - - # Reset the timeout for the recv() on the socket - read_timeout = timeout_obj.read_timeout - - if not conn.is_closed: - # In Python 3 socket.py will catch EAGAIN and return None when you - # try and read into the file pointer created by http.client, which - # instead raises a BadStatusLine exception. Instead of catching - # the exception and assuming all BadStatusLine exceptions are read - # timeouts, check for a zero timeout before making the request. - if read_timeout == 0: - raise ReadTimeoutError( - self, url, f"Read timed out. (read timeout={read_timeout})" - ) - conn.timeout = read_timeout - - # Receive the response from the server - try: - response = conn.getresponse() - except (BaseSSLError, OSError) as e: - self._raise_timeout(err=e, url=url, timeout_value=read_timeout) - raise - - # Set properties that are used by the pooling layer. - response.retries = retries - response._connection = response_conn # type: ignore[attr-defined] - response._pool = self # type: ignore[attr-defined] - - log.debug( - '%s://%s:%s "%s %s %s" %s %s', - self.scheme, - self.host, - self.port, - method, - url, - # HTTP version - conn._http_vsn_str, # type: ignore[attr-defined] - response.status, - response.length_remaining, # type: ignore[attr-defined] - ) - - return response - - def close(self) -> None: - """ - Close all pooled connections and disable the pool. - """ - if self.pool is None: - return - # Disable access to the pool - old_pool, self.pool = self.pool, None - - # Close all the HTTPConnections in the pool. - _close_pool_connections(old_pool) - - def is_same_host(self, url: str) -> bool: - """ - Check if the given ``url`` is a member of the same host as this - connection pool. - """ - if url.startswith("/"): - return True - - # TODO: Add optional support for socket.gethostbyname checking. - scheme, _, host, port, *_ = parse_url(url) - scheme = scheme or "http" - if host is not None: - host = _normalize_host(host, scheme=scheme) - - # Use explicit default port for comparison when none is given - if self.port and not port: - port = port_by_scheme.get(scheme) - elif not self.port and port == port_by_scheme.get(scheme): - port = None - - return (scheme, host, port) == (self.scheme, self.host, self.port) - - def urlopen( # type: ignore[override] - self, - method: str, - url: str, - body: _TYPE_BODY | None = None, - headers: typing.Mapping[str, str] | None = None, - retries: Retry | bool | int | None = None, - redirect: bool = True, - assert_same_host: bool = True, - timeout: _TYPE_TIMEOUT = _DEFAULT_TIMEOUT, - pool_timeout: int | None = None, - release_conn: bool | None = None, - chunked: bool = False, - body_pos: _TYPE_BODY_POSITION | None = None, - preload_content: bool = True, - decode_content: bool = True, - **response_kw: typing.Any, - ) -> BaseHTTPResponse: - """ - Get a connection from the pool and perform an HTTP request. This is the - lowest level call for making a request, so you'll need to specify all - the raw details. - - .. note:: - - More commonly, it's appropriate to use a convenience method - such as :meth:`request`. - - .. note:: - - `release_conn` will only behave as expected if - `preload_content=False` because we want to make - `preload_content=False` the default behaviour someday soon without - breaking backwards compatibility. - - :param method: - HTTP request method (such as GET, POST, PUT, etc.) - - :param url: - The URL to perform the request on. - - :param body: - Data to send in the request body, either :class:`str`, :class:`bytes`, - an iterable of :class:`str`/:class:`bytes`, or a file-like object. - - :param headers: - Dictionary of custom headers to send, such as User-Agent, - If-None-Match, etc. If None, pool headers are used. If provided, - these headers completely replace any pool-specific headers. - - :param retries: - Configure the number of retries to allow before raising a - :class:`~urllib3.exceptions.MaxRetryError` exception. - - Pass ``None`` to retry until you receive a response. Pass a - :class:`~urllib3.util.retry.Retry` object for fine-grained control - over different types of retries. - Pass an integer number to retry connection errors that many times, - but no other types of errors. Pass zero to never retry. - - If ``False``, then retries are disabled and any exception is raised - immediately. Also, instead of raising a MaxRetryError on redirects, - the redirect response will be returned. - - :type retries: :class:`~urllib3.util.retry.Retry`, False, or an int. - - :param redirect: - If True, automatically handle redirects (status codes 301, 302, - 303, 307, 308). Each redirect counts as a retry. Disabling retries - will disable redirect, too. - - :param assert_same_host: - If ``True``, will make sure that the host of the pool requests is - consistent else will raise HostChangedError. When ``False``, you can - use the pool on an HTTP proxy and request foreign hosts. - - :param timeout: - If specified, overrides the default timeout for this one - request. It may be a float (in seconds) or an instance of - :class:`urllib3.util.Timeout`. - - :param pool_timeout: - If set and the pool is set to block=True, then this method will - block for ``pool_timeout`` seconds and raise EmptyPoolError if no - connection is available within the time period. - - :param bool preload_content: - If True, the response's body will be preloaded into memory. - - :param bool decode_content: - If True, will attempt to decode the body based on the - 'content-encoding' header. - - :param release_conn: - If False, then the urlopen call will not release the connection - back into the pool once a response is received (but will release if - you read the entire contents of the response such as when - `preload_content=True`). This is useful if you're not preloading - the response's content immediately. You will need to call - ``r.release_conn()`` on the response ``r`` to return the connection - back into the pool. If None, it takes the value of ``preload_content`` - which defaults to ``True``. - - :param bool chunked: - If True, urllib3 will send the body using chunked transfer - encoding. Otherwise, urllib3 will send the body using the standard - content-length form. Defaults to False. - - :param int body_pos: - Position to seek to in file-like body in the event of a retry or - redirect. Typically this won't need to be set because urllib3 will - auto-populate the value when needed. - """ - parsed_url = parse_url(url) - destination_scheme = parsed_url.scheme - - if headers is None: - headers = self.headers - - if not isinstance(retries, Retry): - retries = Retry.from_int(retries, redirect=redirect, default=self.retries) - - if release_conn is None: - release_conn = preload_content - - # Check host - if assert_same_host and not self.is_same_host(url): - raise HostChangedError(self, url, retries) - - # Ensure that the URL we're connecting to is properly encoded - if url.startswith("/"): - url = to_str(_encode_target(url)) - else: - url = to_str(parsed_url.url) - - conn = None - - # Track whether `conn` needs to be released before - # returning/raising/recursing. Update this variable if necessary, and - # leave `release_conn` constant throughout the function. That way, if - # the function recurses, the original value of `release_conn` will be - # passed down into the recursive call, and its value will be respected. - # - # See issue #651 [1] for details. - # - # [1] - release_this_conn = release_conn - - http_tunnel_required = connection_requires_http_tunnel( - self.proxy, self.proxy_config, destination_scheme - ) - - # Merge the proxy headers. Only done when not using HTTP CONNECT. We - # have to copy the headers dict so we can safely change it without those - # changes being reflected in anyone else's copy. - if not http_tunnel_required: - headers = headers.copy() # type: ignore[attr-defined] - headers.update(self.proxy_headers) # type: ignore[union-attr] - - # Must keep the exception bound to a separate variable or else Python 3 - # complains about UnboundLocalError. - err = None - - # Keep track of whether we cleanly exited the except block. This - # ensures we do proper cleanup in finally. - clean_exit = False - - # Rewind body position, if needed. Record current position - # for future rewinds in the event of a redirect/retry. - body_pos = set_file_position(body, body_pos) - - try: - # Request a connection from the queue. - timeout_obj = self._get_timeout(timeout) - conn = self._get_conn(timeout=pool_timeout) - - conn.timeout = timeout_obj.connect_timeout # type: ignore[assignment] - - # Is this a closed/new connection that requires CONNECT tunnelling? - if self.proxy is not None and http_tunnel_required and conn.is_closed: - try: - self._prepare_proxy(conn) - except (BaseSSLError, OSError, SocketTimeout) as e: - self._raise_timeout( - err=e, url=self.proxy.url, timeout_value=conn.timeout - ) - raise - - # If we're going to release the connection in ``finally:``, then - # the response doesn't need to know about the connection. Otherwise - # it will also try to release it and we'll have a double-release - # mess. - response_conn = conn if not release_conn else None - - # Make the request on the HTTPConnection object - response = self._make_request( - conn, - method, - url, - timeout=timeout_obj, - body=body, - headers=headers, - chunked=chunked, - retries=retries, - response_conn=response_conn, - preload_content=preload_content, - decode_content=decode_content, - **response_kw, - ) - - # Everything went great! - clean_exit = True - - except EmptyPoolError: - # Didn't get a connection from the pool, no need to clean up - clean_exit = True - release_this_conn = False - raise - - except ( - TimeoutError, - HTTPException, - OSError, - ProtocolError, - BaseSSLError, - SSLError, - CertificateError, - ProxyError, - ) as e: - # Discard the connection for these exceptions. It will be - # replaced during the next _get_conn() call. - clean_exit = False - new_e: Exception = e - if isinstance(e, (BaseSSLError, CertificateError)): - new_e = SSLError(e) - if isinstance( - new_e, - ( - OSError, - NewConnectionError, - TimeoutError, - SSLError, - HTTPException, - ), - ) and (conn and conn.proxy and not conn.has_connected_to_proxy): - new_e = _wrap_proxy_error(new_e, conn.proxy.scheme) - elif isinstance(new_e, (OSError, HTTPException)): - new_e = ProtocolError("Connection aborted.", new_e) - - retries = retries.increment( - method, url, error=new_e, _pool=self, _stacktrace=sys.exc_info()[2] - ) - retries.sleep() - - # Keep track of the error for the retry warning. - err = e - - finally: - if not clean_exit: - # We hit some kind of exception, handled or otherwise. We need - # to throw the connection away unless explicitly told not to. - # Close the connection, set the variable to None, and make sure - # we put the None back in the pool to avoid leaking it. - if conn: - conn.close() - conn = None - release_this_conn = True - - if release_this_conn: - # Put the connection back to be reused. If the connection is - # expired then it will be None, which will get replaced with a - # fresh connection during _get_conn. - self._put_conn(conn) - - if not conn: - # Try again - log.warning( - "Retrying (%r) after connection broken by '%r': %s", retries, err, url - ) - return self.urlopen( - method, - url, - body, - headers, - retries, - redirect, - assert_same_host, - timeout=timeout, - pool_timeout=pool_timeout, - release_conn=release_conn, - chunked=chunked, - body_pos=body_pos, - preload_content=preload_content, - decode_content=decode_content, - **response_kw, - ) - - # Handle redirect? - redirect_location = redirect and response.get_redirect_location() - if redirect_location: - if response.status == 303: - # Change the method according to RFC 9110, Section 15.4.4. - method = "GET" - # And lose the body not to transfer anything sensitive. - body = None - headers = HTTPHeaderDict(headers)._prepare_for_method_change() - - try: - retries = retries.increment(method, url, response=response, _pool=self) - except MaxRetryError: - if retries.raise_on_redirect: - response.drain_conn() - raise - return response - - response.drain_conn() - retries.sleep_for_retry(response) - log.debug("Redirecting %s -> %s", url, redirect_location) - return self.urlopen( - method, - redirect_location, - body, - headers, - retries=retries, - redirect=redirect, - assert_same_host=assert_same_host, - timeout=timeout, - pool_timeout=pool_timeout, - release_conn=release_conn, - chunked=chunked, - body_pos=body_pos, - preload_content=preload_content, - decode_content=decode_content, - **response_kw, - ) - - # Check if we should retry the HTTP response. - has_retry_after = bool(response.headers.get("Retry-After")) - if retries.is_retry(method, response.status, has_retry_after): - try: - retries = retries.increment(method, url, response=response, _pool=self) - except MaxRetryError: - if retries.raise_on_status: - response.drain_conn() - raise - return response - - response.drain_conn() - retries.sleep(response) - log.debug("Retry: %s", url) - return self.urlopen( - method, - url, - body, - headers, - retries=retries, - redirect=redirect, - assert_same_host=assert_same_host, - timeout=timeout, - pool_timeout=pool_timeout, - release_conn=release_conn, - chunked=chunked, - body_pos=body_pos, - preload_content=preload_content, - decode_content=decode_content, - **response_kw, - ) - - return response - - -class HTTPSConnectionPool(HTTPConnectionPool): - """ - Same as :class:`.HTTPConnectionPool`, but HTTPS. - - :class:`.HTTPSConnection` uses one of ``assert_fingerprint``, - ``assert_hostname`` and ``host`` in this order to verify connections. - If ``assert_hostname`` is False, no verification is done. - - The ``key_file``, ``cert_file``, ``cert_reqs``, ``ca_certs``, - ``ca_cert_dir``, ``ssl_version``, ``key_password`` are only used if :mod:`ssl` - is available and are fed into :meth:`urllib3.util.ssl_wrap_socket` to upgrade - the connection socket into an SSL socket. - """ - - scheme = "https" - ConnectionCls: type[BaseHTTPSConnection] = HTTPSConnection - - def __init__( - self, - host: str, - port: int | None = None, - timeout: _TYPE_TIMEOUT | None = _DEFAULT_TIMEOUT, - maxsize: int = 1, - block: bool = False, - headers: typing.Mapping[str, str] | None = None, - retries: Retry | bool | int | None = None, - _proxy: Url | None = None, - _proxy_headers: typing.Mapping[str, str] | None = None, - key_file: str | None = None, - cert_file: str | None = None, - cert_reqs: int | str | None = None, - key_password: str | None = None, - ca_certs: str | None = None, - ssl_version: int | str | None = None, - ssl_minimum_version: ssl.TLSVersion | None = None, - ssl_maximum_version: ssl.TLSVersion | None = None, - assert_hostname: str | Literal[False] | None = None, - assert_fingerprint: str | None = None, - ca_cert_dir: str | None = None, - **conn_kw: typing.Any, - ) -> None: - super().__init__( - host, - port, - timeout, - maxsize, - block, - headers, - retries, - _proxy, - _proxy_headers, - **conn_kw, - ) - - self.key_file = key_file - self.cert_file = cert_file - self.cert_reqs = cert_reqs - self.key_password = key_password - self.ca_certs = ca_certs - self.ca_cert_dir = ca_cert_dir - self.ssl_version = ssl_version - self.ssl_minimum_version = ssl_minimum_version - self.ssl_maximum_version = ssl_maximum_version - self.assert_hostname = assert_hostname - self.assert_fingerprint = assert_fingerprint - - def _prepare_proxy(self, conn: HTTPSConnection) -> None: # type: ignore[override] - """Establishes a tunnel connection through HTTP CONNECT.""" - if self.proxy and self.proxy.scheme == "https": - tunnel_scheme = "https" - else: - tunnel_scheme = "http" - - conn.set_tunnel( - scheme=tunnel_scheme, - host=self._tunnel_host, - port=self.port, - headers=self.proxy_headers, - ) - conn.connect() - - def _new_conn(self) -> BaseHTTPSConnection: - """ - Return a fresh :class:`urllib3.connection.HTTPConnection`. - """ - self.num_connections += 1 - log.debug( - "Starting new HTTPS connection (%d): %s:%s", - self.num_connections, - self.host, - self.port or "443", - ) - - if not self.ConnectionCls or self.ConnectionCls is DummyConnection: # type: ignore[comparison-overlap] - raise ImportError( - "Can't connect to HTTPS URL because the SSL module is not available." - ) - - actual_host: str = self.host - actual_port = self.port - if self.proxy is not None and self.proxy.host is not None: - actual_host = self.proxy.host - actual_port = self.proxy.port - - return self.ConnectionCls( - host=actual_host, - port=actual_port, - timeout=self.timeout.connect_timeout, - cert_file=self.cert_file, - key_file=self.key_file, - key_password=self.key_password, - cert_reqs=self.cert_reqs, - ca_certs=self.ca_certs, - ca_cert_dir=self.ca_cert_dir, - assert_hostname=self.assert_hostname, - assert_fingerprint=self.assert_fingerprint, - ssl_version=self.ssl_version, - ssl_minimum_version=self.ssl_minimum_version, - ssl_maximum_version=self.ssl_maximum_version, - **self.conn_kw, - ) - - def _validate_conn(self, conn: BaseHTTPConnection) -> None: - """ - Called right before a request is made, after the socket is created. - """ - super()._validate_conn(conn) - - # Force connect early to allow us to validate the connection. - if conn.is_closed: - conn.connect() - - if not conn.is_verified: - warnings.warn( - ( - f"Unverified HTTPS request is being made to host '{conn.host}'. " - "Adding certificate verification is strongly advised. See: " - "https://urllib3.readthedocs.io/en/latest/advanced-usage.html" - "#tls-warnings" - ), - InsecureRequestWarning, - ) - - -def connection_from_url(url: str, **kw: typing.Any) -> HTTPConnectionPool: - """ - Given a url, return an :class:`.ConnectionPool` instance of its host. - - This is a shortcut for not having to parse out the scheme, host, and port - of the url before creating an :class:`.ConnectionPool` instance. - - :param url: - Absolute URL string that must include the scheme. Port is optional. - - :param \\**kw: - Passes additional parameters to the constructor of the appropriate - :class:`.ConnectionPool`. Useful for specifying things like - timeout, maxsize, headers, etc. - - Example:: - - >>> conn = connection_from_url('http://google.com/') - >>> r = conn.request('GET', '/') - """ - scheme, _, host, port, *_ = parse_url(url) - scheme = scheme or "http" - port = port or port_by_scheme.get(scheme, 80) - if scheme == "https": - return HTTPSConnectionPool(host, port=port, **kw) # type: ignore[arg-type] - else: - return HTTPConnectionPool(host, port=port, **kw) # type: ignore[arg-type] - - -@typing.overload -def _normalize_host(host: None, scheme: str | None) -> None: - ... - - -@typing.overload -def _normalize_host(host: str, scheme: str | None) -> str: - ... - - -def _normalize_host(host: str | None, scheme: str | None) -> str | None: - """ - Normalize hosts for comparisons and use with sockets. - """ - - host = normalize_host(host, scheme) - - # httplib doesn't like it when we include brackets in IPv6 addresses - # Specifically, if we include brackets but also pass the port then - # httplib crazily doubles up the square brackets on the Host header. - # Instead, we need to make sure we never pass ``None`` as the port. - # However, for backward compatibility reasons we can't actually - # *assert* that. See http://bugs.python.org/issue28539 - if host and host.startswith("[") and host.endswith("]"): - host = host[1:-1] - return host - - -def _url_from_pool( - pool: HTTPConnectionPool | HTTPSConnectionPool, path: str | None = None -) -> str: - """Returns the URL from a given connection pool. This is mainly used for testing and logging.""" - return Url(scheme=pool.scheme, host=pool.host, port=pool.port, path=path).url - - -def _close_pool_connections(pool: queue.LifoQueue[typing.Any]) -> None: - """Drains a queue of connections and closes each one.""" - try: - while True: - conn = pool.get(block=False) - if conn: - conn.close() - except queue.Empty: - pass # Done. diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/__init__.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/__init__.py deleted file mode 100644 index e69de29b..00000000 diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/__init__.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/__init__.py deleted file mode 100644 index e69de29b..00000000 diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/bindings.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/bindings.py deleted file mode 100644 index 3e4cd466..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/bindings.py +++ /dev/null @@ -1,430 +0,0 @@ -# type: ignore - -""" -This module uses ctypes to bind a whole bunch of functions and constants from -SecureTransport. The goal here is to provide the low-level API to -SecureTransport. These are essentially the C-level functions and constants, and -they're pretty gross to work with. - -This code is a bastardised version of the code found in Will Bond's oscrypto -library. An enormous debt is owed to him for blazing this trail for us. For -that reason, this code should be considered to be covered both by urllib3's -license and by oscrypto's: - - Copyright (c) 2015-2016 Will Bond - - Permission is hereby granted, free of charge, to any person obtaining a - copy of this software and associated documentation files (the "Software"), - to deal in the Software without restriction, including without limitation - the rights to use, copy, modify, merge, publish, distribute, sublicense, - and/or sell copies of the Software, and to permit persons to whom the - Software is furnished to do so, subject to the following conditions: - - The above copyright notice and this permission notice shall be included in - all copies or substantial portions of the Software. - - THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR - IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, - FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE - AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER - LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING - FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER - DEALINGS IN THE SOFTWARE. -""" - -from __future__ import annotations - -import platform -from ctypes import ( - CDLL, - CFUNCTYPE, - POINTER, - c_bool, - c_byte, - c_char_p, - c_int32, - c_long, - c_size_t, - c_uint32, - c_ulong, - c_void_p, -) -from ctypes.util import find_library - -if platform.system() != "Darwin": - raise ImportError("Only macOS is supported") - -version = platform.mac_ver()[0] -version_info = tuple(map(int, version.split("."))) -if version_info < (10, 8): - raise OSError( - f"Only OS X 10.8 and newer are supported, not {version_info[0]}.{version_info[1]}" - ) - - -def load_cdll(name: str, macos10_16_path: str) -> CDLL: - """Loads a CDLL by name, falling back to known path on 10.16+""" - try: - # Big Sur is technically 11 but we use 10.16 due to the Big Sur - # beta being labeled as 10.16. - path: str | None - if version_info >= (10, 16): - path = macos10_16_path - else: - path = find_library(name) - if not path: - raise OSError # Caught and reraised as 'ImportError' - return CDLL(path, use_errno=True) - except OSError: - raise ImportError(f"The library {name} failed to load") from None - - -Security = load_cdll( - "Security", "/System/Library/Frameworks/Security.framework/Security" -) -CoreFoundation = load_cdll( - "CoreFoundation", - "/System/Library/Frameworks/CoreFoundation.framework/CoreFoundation", -) - - -Boolean = c_bool -CFIndex = c_long -CFStringEncoding = c_uint32 -CFData = c_void_p -CFString = c_void_p -CFArray = c_void_p -CFMutableArray = c_void_p -CFDictionary = c_void_p -CFError = c_void_p -CFType = c_void_p -CFTypeID = c_ulong - -CFTypeRef = POINTER(CFType) -CFAllocatorRef = c_void_p - -OSStatus = c_int32 - -CFDataRef = POINTER(CFData) -CFStringRef = POINTER(CFString) -CFArrayRef = POINTER(CFArray) -CFMutableArrayRef = POINTER(CFMutableArray) -CFDictionaryRef = POINTER(CFDictionary) -CFArrayCallBacks = c_void_p -CFDictionaryKeyCallBacks = c_void_p -CFDictionaryValueCallBacks = c_void_p - -SecCertificateRef = POINTER(c_void_p) -SecExternalFormat = c_uint32 -SecExternalItemType = c_uint32 -SecIdentityRef = POINTER(c_void_p) -SecItemImportExportFlags = c_uint32 -SecItemImportExportKeyParameters = c_void_p -SecKeychainRef = POINTER(c_void_p) -SSLProtocol = c_uint32 -SSLCipherSuite = c_uint32 -SSLContextRef = POINTER(c_void_p) -SecTrustRef = POINTER(c_void_p) -SSLConnectionRef = c_uint32 -SecTrustResultType = c_uint32 -SecTrustOptionFlags = c_uint32 -SSLProtocolSide = c_uint32 -SSLConnectionType = c_uint32 -SSLSessionOption = c_uint32 - - -try: - Security.SecItemImport.argtypes = [ - CFDataRef, - CFStringRef, - POINTER(SecExternalFormat), - POINTER(SecExternalItemType), - SecItemImportExportFlags, - POINTER(SecItemImportExportKeyParameters), - SecKeychainRef, - POINTER(CFArrayRef), - ] - Security.SecItemImport.restype = OSStatus - - Security.SecCertificateGetTypeID.argtypes = [] - Security.SecCertificateGetTypeID.restype = CFTypeID - - Security.SecIdentityGetTypeID.argtypes = [] - Security.SecIdentityGetTypeID.restype = CFTypeID - - Security.SecKeyGetTypeID.argtypes = [] - Security.SecKeyGetTypeID.restype = CFTypeID - - Security.SecCertificateCreateWithData.argtypes = [CFAllocatorRef, CFDataRef] - Security.SecCertificateCreateWithData.restype = SecCertificateRef - - Security.SecCertificateCopyData.argtypes = [SecCertificateRef] - Security.SecCertificateCopyData.restype = CFDataRef - - Security.SecCopyErrorMessageString.argtypes = [OSStatus, c_void_p] - Security.SecCopyErrorMessageString.restype = CFStringRef - - Security.SecIdentityCreateWithCertificate.argtypes = [ - CFTypeRef, - SecCertificateRef, - POINTER(SecIdentityRef), - ] - Security.SecIdentityCreateWithCertificate.restype = OSStatus - - Security.SecKeychainCreate.argtypes = [ - c_char_p, - c_uint32, - c_void_p, - Boolean, - c_void_p, - POINTER(SecKeychainRef), - ] - Security.SecKeychainCreate.restype = OSStatus - - Security.SecKeychainDelete.argtypes = [SecKeychainRef] - Security.SecKeychainDelete.restype = OSStatus - - Security.SecPKCS12Import.argtypes = [ - CFDataRef, - CFDictionaryRef, - POINTER(CFArrayRef), - ] - Security.SecPKCS12Import.restype = OSStatus - - SSLReadFunc = CFUNCTYPE(OSStatus, SSLConnectionRef, c_void_p, POINTER(c_size_t)) - SSLWriteFunc = CFUNCTYPE( - OSStatus, SSLConnectionRef, POINTER(c_byte), POINTER(c_size_t) - ) - - Security.SSLSetIOFuncs.argtypes = [SSLContextRef, SSLReadFunc, SSLWriteFunc] - Security.SSLSetIOFuncs.restype = OSStatus - - Security.SSLSetPeerID.argtypes = [SSLContextRef, c_char_p, c_size_t] - Security.SSLSetPeerID.restype = OSStatus - - Security.SSLSetCertificate.argtypes = [SSLContextRef, CFArrayRef] - Security.SSLSetCertificate.restype = OSStatus - - Security.SSLSetCertificateAuthorities.argtypes = [SSLContextRef, CFTypeRef, Boolean] - Security.SSLSetCertificateAuthorities.restype = OSStatus - - Security.SSLSetConnection.argtypes = [SSLContextRef, SSLConnectionRef] - Security.SSLSetConnection.restype = OSStatus - - Security.SSLSetPeerDomainName.argtypes = [SSLContextRef, c_char_p, c_size_t] - Security.SSLSetPeerDomainName.restype = OSStatus - - Security.SSLHandshake.argtypes = [SSLContextRef] - Security.SSLHandshake.restype = OSStatus - - Security.SSLRead.argtypes = [SSLContextRef, c_char_p, c_size_t, POINTER(c_size_t)] - Security.SSLRead.restype = OSStatus - - Security.SSLWrite.argtypes = [SSLContextRef, c_char_p, c_size_t, POINTER(c_size_t)] - Security.SSLWrite.restype = OSStatus - - Security.SSLClose.argtypes = [SSLContextRef] - Security.SSLClose.restype = OSStatus - - Security.SSLGetNumberSupportedCiphers.argtypes = [SSLContextRef, POINTER(c_size_t)] - Security.SSLGetNumberSupportedCiphers.restype = OSStatus - - Security.SSLGetSupportedCiphers.argtypes = [ - SSLContextRef, - POINTER(SSLCipherSuite), - POINTER(c_size_t), - ] - Security.SSLGetSupportedCiphers.restype = OSStatus - - Security.SSLSetEnabledCiphers.argtypes = [ - SSLContextRef, - POINTER(SSLCipherSuite), - c_size_t, - ] - Security.SSLSetEnabledCiphers.restype = OSStatus - - Security.SSLGetNumberEnabledCiphers.argtype = [SSLContextRef, POINTER(c_size_t)] - Security.SSLGetNumberEnabledCiphers.restype = OSStatus - - Security.SSLGetEnabledCiphers.argtypes = [ - SSLContextRef, - POINTER(SSLCipherSuite), - POINTER(c_size_t), - ] - Security.SSLGetEnabledCiphers.restype = OSStatus - - Security.SSLGetNegotiatedCipher.argtypes = [SSLContextRef, POINTER(SSLCipherSuite)] - Security.SSLGetNegotiatedCipher.restype = OSStatus - - Security.SSLGetNegotiatedProtocolVersion.argtypes = [ - SSLContextRef, - POINTER(SSLProtocol), - ] - Security.SSLGetNegotiatedProtocolVersion.restype = OSStatus - - Security.SSLCopyPeerTrust.argtypes = [SSLContextRef, POINTER(SecTrustRef)] - Security.SSLCopyPeerTrust.restype = OSStatus - - Security.SecTrustSetAnchorCertificates.argtypes = [SecTrustRef, CFArrayRef] - Security.SecTrustSetAnchorCertificates.restype = OSStatus - - Security.SecTrustSetAnchorCertificatesOnly.argstypes = [SecTrustRef, Boolean] - Security.SecTrustSetAnchorCertificatesOnly.restype = OSStatus - - Security.SecTrustEvaluate.argtypes = [SecTrustRef, POINTER(SecTrustResultType)] - Security.SecTrustEvaluate.restype = OSStatus - - Security.SecTrustGetCertificateCount.argtypes = [SecTrustRef] - Security.SecTrustGetCertificateCount.restype = CFIndex - - Security.SecTrustGetCertificateAtIndex.argtypes = [SecTrustRef, CFIndex] - Security.SecTrustGetCertificateAtIndex.restype = SecCertificateRef - - Security.SSLCreateContext.argtypes = [ - CFAllocatorRef, - SSLProtocolSide, - SSLConnectionType, - ] - Security.SSLCreateContext.restype = SSLContextRef - - Security.SSLSetSessionOption.argtypes = [SSLContextRef, SSLSessionOption, Boolean] - Security.SSLSetSessionOption.restype = OSStatus - - Security.SSLSetProtocolVersionMin.argtypes = [SSLContextRef, SSLProtocol] - Security.SSLSetProtocolVersionMin.restype = OSStatus - - Security.SSLSetProtocolVersionMax.argtypes = [SSLContextRef, SSLProtocol] - Security.SSLSetProtocolVersionMax.restype = OSStatus - - try: - Security.SSLSetALPNProtocols.argtypes = [SSLContextRef, CFArrayRef] - Security.SSLSetALPNProtocols.restype = OSStatus - except AttributeError: - # Supported only in 10.12+ - pass - - Security.SecCopyErrorMessageString.argtypes = [OSStatus, c_void_p] - Security.SecCopyErrorMessageString.restype = CFStringRef - - Security.SSLReadFunc = SSLReadFunc - Security.SSLWriteFunc = SSLWriteFunc - Security.SSLContextRef = SSLContextRef - Security.SSLProtocol = SSLProtocol - Security.SSLCipherSuite = SSLCipherSuite - Security.SecIdentityRef = SecIdentityRef - Security.SecKeychainRef = SecKeychainRef - Security.SecTrustRef = SecTrustRef - Security.SecTrustResultType = SecTrustResultType - Security.SecExternalFormat = SecExternalFormat - Security.OSStatus = OSStatus - - Security.kSecImportExportPassphrase = CFStringRef.in_dll( - Security, "kSecImportExportPassphrase" - ) - Security.kSecImportItemIdentity = CFStringRef.in_dll( - Security, "kSecImportItemIdentity" - ) - - # CoreFoundation time! - CoreFoundation.CFRetain.argtypes = [CFTypeRef] - CoreFoundation.CFRetain.restype = CFTypeRef - - CoreFoundation.CFRelease.argtypes = [CFTypeRef] - CoreFoundation.CFRelease.restype = None - - CoreFoundation.CFGetTypeID.argtypes = [CFTypeRef] - CoreFoundation.CFGetTypeID.restype = CFTypeID - - CoreFoundation.CFStringCreateWithCString.argtypes = [ - CFAllocatorRef, - c_char_p, - CFStringEncoding, - ] - CoreFoundation.CFStringCreateWithCString.restype = CFStringRef - - CoreFoundation.CFStringGetCStringPtr.argtypes = [CFStringRef, CFStringEncoding] - CoreFoundation.CFStringGetCStringPtr.restype = c_char_p - - CoreFoundation.CFStringGetCString.argtypes = [ - CFStringRef, - c_char_p, - CFIndex, - CFStringEncoding, - ] - CoreFoundation.CFStringGetCString.restype = c_bool - - CoreFoundation.CFDataCreate.argtypes = [CFAllocatorRef, c_char_p, CFIndex] - CoreFoundation.CFDataCreate.restype = CFDataRef - - CoreFoundation.CFDataGetLength.argtypes = [CFDataRef] - CoreFoundation.CFDataGetLength.restype = CFIndex - - CoreFoundation.CFDataGetBytePtr.argtypes = [CFDataRef] - CoreFoundation.CFDataGetBytePtr.restype = c_void_p - - CoreFoundation.CFDictionaryCreate.argtypes = [ - CFAllocatorRef, - POINTER(CFTypeRef), - POINTER(CFTypeRef), - CFIndex, - CFDictionaryKeyCallBacks, - CFDictionaryValueCallBacks, - ] - CoreFoundation.CFDictionaryCreate.restype = CFDictionaryRef - - CoreFoundation.CFDictionaryGetValue.argtypes = [CFDictionaryRef, CFTypeRef] - CoreFoundation.CFDictionaryGetValue.restype = CFTypeRef - - CoreFoundation.CFArrayCreate.argtypes = [ - CFAllocatorRef, - POINTER(CFTypeRef), - CFIndex, - CFArrayCallBacks, - ] - CoreFoundation.CFArrayCreate.restype = CFArrayRef - - CoreFoundation.CFArrayCreateMutable.argtypes = [ - CFAllocatorRef, - CFIndex, - CFArrayCallBacks, - ] - CoreFoundation.CFArrayCreateMutable.restype = CFMutableArrayRef - - CoreFoundation.CFArrayAppendValue.argtypes = [CFMutableArrayRef, c_void_p] - CoreFoundation.CFArrayAppendValue.restype = None - - CoreFoundation.CFArrayGetCount.argtypes = [CFArrayRef] - CoreFoundation.CFArrayGetCount.restype = CFIndex - - CoreFoundation.CFArrayGetValueAtIndex.argtypes = [CFArrayRef, CFIndex] - CoreFoundation.CFArrayGetValueAtIndex.restype = c_void_p - - CoreFoundation.kCFAllocatorDefault = CFAllocatorRef.in_dll( - CoreFoundation, "kCFAllocatorDefault" - ) - CoreFoundation.kCFTypeArrayCallBacks = c_void_p.in_dll( - CoreFoundation, "kCFTypeArrayCallBacks" - ) - CoreFoundation.kCFTypeDictionaryKeyCallBacks = c_void_p.in_dll( - CoreFoundation, "kCFTypeDictionaryKeyCallBacks" - ) - CoreFoundation.kCFTypeDictionaryValueCallBacks = c_void_p.in_dll( - CoreFoundation, "kCFTypeDictionaryValueCallBacks" - ) - - CoreFoundation.CFTypeRef = CFTypeRef - CoreFoundation.CFArrayRef = CFArrayRef - CoreFoundation.CFStringRef = CFStringRef - CoreFoundation.CFDictionaryRef = CFDictionaryRef - -except AttributeError: - raise ImportError("Error initializing ctypes") from None - - -class CFConst: - """ - A class object that acts as essentially a namespace for CoreFoundation - constants. - """ - - kCFStringEncodingUTF8 = CFStringEncoding(0x08000100) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/low_level.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/low_level.py deleted file mode 100644 index e2356997..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/_securetransport/low_level.py +++ /dev/null @@ -1,474 +0,0 @@ -""" -Low-level helpers for the SecureTransport bindings. - -These are Python functions that are not directly related to the high-level APIs -but are necessary to get them to work. They include a whole bunch of low-level -CoreFoundation messing about and memory management. The concerns in this module -are almost entirely about trying to avoid memory leaks and providing -appropriate and useful assistance to the higher-level code. -""" -from __future__ import annotations - -import base64 -import ctypes -import itertools -import os -import re -import ssl -import struct -import tempfile -import typing - -from .bindings import ( # type: ignore[attr-defined] - CFArray, - CFConst, - CFData, - CFDictionary, - CFMutableArray, - CFString, - CFTypeRef, - CoreFoundation, - SecKeychainRef, - Security, -) - -# This regular expression is used to grab PEM data out of a PEM bundle. -_PEM_CERTS_RE = re.compile( - b"-----BEGIN CERTIFICATE-----\n(.*?)\n-----END CERTIFICATE-----", re.DOTALL -) - - -def _cf_data_from_bytes(bytestring: bytes) -> CFData: - """ - Given a bytestring, create a CFData object from it. This CFData object must - be CFReleased by the caller. - """ - return CoreFoundation.CFDataCreate( - CoreFoundation.kCFAllocatorDefault, bytestring, len(bytestring) - ) - - -def _cf_dictionary_from_tuples( - tuples: list[tuple[typing.Any, typing.Any]] -) -> CFDictionary: - """ - Given a list of Python tuples, create an associated CFDictionary. - """ - dictionary_size = len(tuples) - - # We need to get the dictionary keys and values out in the same order. - keys = (t[0] for t in tuples) - values = (t[1] for t in tuples) - cf_keys = (CoreFoundation.CFTypeRef * dictionary_size)(*keys) - cf_values = (CoreFoundation.CFTypeRef * dictionary_size)(*values) - - return CoreFoundation.CFDictionaryCreate( - CoreFoundation.kCFAllocatorDefault, - cf_keys, - cf_values, - dictionary_size, - CoreFoundation.kCFTypeDictionaryKeyCallBacks, - CoreFoundation.kCFTypeDictionaryValueCallBacks, - ) - - -def _cfstr(py_bstr: bytes) -> CFString: - """ - Given a Python binary data, create a CFString. - The string must be CFReleased by the caller. - """ - c_str = ctypes.c_char_p(py_bstr) - cf_str = CoreFoundation.CFStringCreateWithCString( - CoreFoundation.kCFAllocatorDefault, - c_str, - CFConst.kCFStringEncodingUTF8, - ) - return cf_str - - -def _create_cfstring_array(lst: list[bytes]) -> CFMutableArray: - """ - Given a list of Python binary data, create an associated CFMutableArray. - The array must be CFReleased by the caller. - - Raises an ssl.SSLError on failure. - """ - cf_arr = None - try: - cf_arr = CoreFoundation.CFArrayCreateMutable( - CoreFoundation.kCFAllocatorDefault, - 0, - ctypes.byref(CoreFoundation.kCFTypeArrayCallBacks), - ) - if not cf_arr: - raise MemoryError("Unable to allocate memory!") - for item in lst: - cf_str = _cfstr(item) - if not cf_str: - raise MemoryError("Unable to allocate memory!") - try: - CoreFoundation.CFArrayAppendValue(cf_arr, cf_str) - finally: - CoreFoundation.CFRelease(cf_str) - except BaseException as e: - if cf_arr: - CoreFoundation.CFRelease(cf_arr) - raise ssl.SSLError(f"Unable to allocate array: {e}") from None - return cf_arr - - -def _cf_string_to_unicode(value: CFString) -> str | None: - """ - Creates a Unicode string from a CFString object. Used entirely for error - reporting. - - Yes, it annoys me quite a lot that this function is this complex. - """ - value_as_void_p = ctypes.cast(value, ctypes.POINTER(ctypes.c_void_p)) - - string = CoreFoundation.CFStringGetCStringPtr( - value_as_void_p, CFConst.kCFStringEncodingUTF8 - ) - if string is None: - buffer = ctypes.create_string_buffer(1024) - result = CoreFoundation.CFStringGetCString( - value_as_void_p, buffer, 1024, CFConst.kCFStringEncodingUTF8 - ) - if not result: - raise OSError("Error copying C string from CFStringRef") - string = buffer.value - if string is not None: - string = string.decode("utf-8") - return string # type: ignore[no-any-return] - - -def _assert_no_error( - error: int, exception_class: type[BaseException] | None = None -) -> None: - """ - Checks the return code and throws an exception if there is an error to - report - """ - if error == 0: - return - - cf_error_string = Security.SecCopyErrorMessageString(error, None) - output = _cf_string_to_unicode(cf_error_string) - CoreFoundation.CFRelease(cf_error_string) - - if output is None or output == "": - output = f"OSStatus {error}" - - if exception_class is None: - exception_class = ssl.SSLError - - raise exception_class(output) - - -def _cert_array_from_pem(pem_bundle: bytes) -> CFArray: - """ - Given a bundle of certs in PEM format, turns them into a CFArray of certs - that can be used to validate a cert chain. - """ - # Normalize the PEM bundle's line endings. - pem_bundle = pem_bundle.replace(b"\r\n", b"\n") - - der_certs = [ - base64.b64decode(match.group(1)) for match in _PEM_CERTS_RE.finditer(pem_bundle) - ] - if not der_certs: - raise ssl.SSLError("No root certificates specified") - - cert_array = CoreFoundation.CFArrayCreateMutable( - CoreFoundation.kCFAllocatorDefault, - 0, - ctypes.byref(CoreFoundation.kCFTypeArrayCallBacks), - ) - if not cert_array: - raise ssl.SSLError("Unable to allocate memory!") - - try: - for der_bytes in der_certs: - certdata = _cf_data_from_bytes(der_bytes) - if not certdata: - raise ssl.SSLError("Unable to allocate memory!") - cert = Security.SecCertificateCreateWithData( - CoreFoundation.kCFAllocatorDefault, certdata - ) - CoreFoundation.CFRelease(certdata) - if not cert: - raise ssl.SSLError("Unable to build cert object!") - - CoreFoundation.CFArrayAppendValue(cert_array, cert) - CoreFoundation.CFRelease(cert) - except Exception: - # We need to free the array before the exception bubbles further. - # We only want to do that if an error occurs: otherwise, the caller - # should free. - CoreFoundation.CFRelease(cert_array) - raise - - return cert_array - - -def _is_cert(item: CFTypeRef) -> bool: - """ - Returns True if a given CFTypeRef is a certificate. - """ - expected = Security.SecCertificateGetTypeID() - return CoreFoundation.CFGetTypeID(item) == expected # type: ignore[no-any-return] - - -def _is_identity(item: CFTypeRef) -> bool: - """ - Returns True if a given CFTypeRef is an identity. - """ - expected = Security.SecIdentityGetTypeID() - return CoreFoundation.CFGetTypeID(item) == expected # type: ignore[no-any-return] - - -def _temporary_keychain() -> tuple[SecKeychainRef, str]: - """ - This function creates a temporary Mac keychain that we can use to work with - credentials. This keychain uses a one-time password and a temporary file to - store the data. We expect to have one keychain per socket. The returned - SecKeychainRef must be freed by the caller, including calling - SecKeychainDelete. - - Returns a tuple of the SecKeychainRef and the path to the temporary - directory that contains it. - """ - # Unfortunately, SecKeychainCreate requires a path to a keychain. This - # means we cannot use mkstemp to use a generic temporary file. Instead, - # we're going to create a temporary directory and a filename to use there. - # This filename will be 8 random bytes expanded into base64. We also need - # some random bytes to password-protect the keychain we're creating, so we - # ask for 40 random bytes. - random_bytes = os.urandom(40) - filename = base64.b16encode(random_bytes[:8]).decode("utf-8") - password = base64.b16encode(random_bytes[8:]) # Must be valid UTF-8 - tempdirectory = tempfile.mkdtemp() - - keychain_path = os.path.join(tempdirectory, filename).encode("utf-8") - - # We now want to create the keychain itself. - keychain = Security.SecKeychainRef() - status = Security.SecKeychainCreate( - keychain_path, len(password), password, False, None, ctypes.byref(keychain) - ) - _assert_no_error(status) - - # Having created the keychain, we want to pass it off to the caller. - return keychain, tempdirectory - - -def _load_items_from_file( - keychain: SecKeychainRef, path: str -) -> tuple[list[CFTypeRef], list[CFTypeRef]]: - """ - Given a single file, loads all the trust objects from it into arrays and - the keychain. - Returns a tuple of lists: the first list is a list of identities, the - second a list of certs. - """ - certificates = [] - identities = [] - result_array = None - - with open(path, "rb") as f: - raw_filedata = f.read() - - try: - filedata = CoreFoundation.CFDataCreate( - CoreFoundation.kCFAllocatorDefault, raw_filedata, len(raw_filedata) - ) - result_array = CoreFoundation.CFArrayRef() - result = Security.SecItemImport( - filedata, # cert data - None, # Filename, leaving it out for now - None, # What the type of the file is, we don't care - None, # what's in the file, we don't care - 0, # import flags - None, # key params, can include passphrase in the future - keychain, # The keychain to insert into - ctypes.byref(result_array), # Results - ) - _assert_no_error(result) - - # A CFArray is not very useful to us as an intermediary - # representation, so we are going to extract the objects we want - # and then free the array. We don't need to keep hold of keys: the - # keychain already has them! - result_count = CoreFoundation.CFArrayGetCount(result_array) - for index in range(result_count): - item = CoreFoundation.CFArrayGetValueAtIndex(result_array, index) - item = ctypes.cast(item, CoreFoundation.CFTypeRef) - - if _is_cert(item): - CoreFoundation.CFRetain(item) - certificates.append(item) - elif _is_identity(item): - CoreFoundation.CFRetain(item) - identities.append(item) - finally: - if result_array: - CoreFoundation.CFRelease(result_array) - - CoreFoundation.CFRelease(filedata) - - return (identities, certificates) - - -def _load_client_cert_chain(keychain: SecKeychainRef, *paths: str | None) -> CFArray: - """ - Load certificates and maybe keys from a number of files. Has the end goal - of returning a CFArray containing one SecIdentityRef, and then zero or more - SecCertificateRef objects, suitable for use as a client certificate trust - chain. - """ - # Ok, the strategy. - # - # This relies on knowing that macOS will not give you a SecIdentityRef - # unless you have imported a key into a keychain. This is a somewhat - # artificial limitation of macOS (for example, it doesn't necessarily - # affect iOS), but there is nothing inside Security.framework that lets you - # get a SecIdentityRef without having a key in a keychain. - # - # So the policy here is we take all the files and iterate them in order. - # Each one will use SecItemImport to have one or more objects loaded from - # it. We will also point at a keychain that macOS can use to work with the - # private key. - # - # Once we have all the objects, we'll check what we actually have. If we - # already have a SecIdentityRef in hand, fab: we'll use that. Otherwise, - # we'll take the first certificate (which we assume to be our leaf) and - # ask the keychain to give us a SecIdentityRef with that cert's associated - # key. - # - # We'll then return a CFArray containing the trust chain: one - # SecIdentityRef and then zero-or-more SecCertificateRef objects. The - # responsibility for freeing this CFArray will be with the caller. This - # CFArray must remain alive for the entire connection, so in practice it - # will be stored with a single SSLSocket, along with the reference to the - # keychain. - certificates = [] - identities = [] - - # Filter out bad paths. - filtered_paths = (path for path in paths if path) - - try: - for file_path in filtered_paths: - new_identities, new_certs = _load_items_from_file(keychain, file_path) - identities.extend(new_identities) - certificates.extend(new_certs) - - # Ok, we have everything. The question is: do we have an identity? If - # not, we want to grab one from the first cert we have. - if not identities: - new_identity = Security.SecIdentityRef() - status = Security.SecIdentityCreateWithCertificate( - keychain, certificates[0], ctypes.byref(new_identity) - ) - _assert_no_error(status) - identities.append(new_identity) - - # We now want to release the original certificate, as we no longer - # need it. - CoreFoundation.CFRelease(certificates.pop(0)) - - # We now need to build a new CFArray that holds the trust chain. - trust_chain = CoreFoundation.CFArrayCreateMutable( - CoreFoundation.kCFAllocatorDefault, - 0, - ctypes.byref(CoreFoundation.kCFTypeArrayCallBacks), - ) - for item in itertools.chain(identities, certificates): - # ArrayAppendValue does a CFRetain on the item. That's fine, - # because the finally block will release our other refs to them. - CoreFoundation.CFArrayAppendValue(trust_chain, item) - - return trust_chain - finally: - for obj in itertools.chain(identities, certificates): - CoreFoundation.CFRelease(obj) - - -TLS_PROTOCOL_VERSIONS = { - "SSLv2": (0, 2), - "SSLv3": (3, 0), - "TLSv1": (3, 1), - "TLSv1.1": (3, 2), - "TLSv1.2": (3, 3), -} - - -def _build_tls_unknown_ca_alert(version: str) -> bytes: - """ - Builds a TLS alert record for an unknown CA. - """ - ver_maj, ver_min = TLS_PROTOCOL_VERSIONS[version] - severity_fatal = 0x02 - description_unknown_ca = 0x30 - msg = struct.pack(">BB", severity_fatal, description_unknown_ca) - msg_len = len(msg) - record_type_alert = 0x15 - record = struct.pack(">BBBH", record_type_alert, ver_maj, ver_min, msg_len) + msg - return record - - -class SecurityConst: - """ - A class object that acts as essentially a namespace for Security constants. - """ - - kSSLSessionOptionBreakOnServerAuth = 0 - - kSSLProtocol2 = 1 - kSSLProtocol3 = 2 - kTLSProtocol1 = 4 - kTLSProtocol11 = 7 - kTLSProtocol12 = 8 - # SecureTransport does not support TLS 1.3 even if there's a constant for it - kTLSProtocol13 = 10 - kTLSProtocolMaxSupported = 999 - - kSSLClientSide = 1 - kSSLStreamType = 0 - - kSecFormatPEMSequence = 10 - - kSecTrustResultInvalid = 0 - kSecTrustResultProceed = 1 - # This gap is present on purpose: this was kSecTrustResultConfirm, which - # is deprecated. - kSecTrustResultDeny = 3 - kSecTrustResultUnspecified = 4 - kSecTrustResultRecoverableTrustFailure = 5 - kSecTrustResultFatalTrustFailure = 6 - kSecTrustResultOtherError = 7 - - errSSLProtocol = -9800 - errSSLWouldBlock = -9803 - errSSLClosedGraceful = -9805 - errSSLClosedNoNotify = -9816 - errSSLClosedAbort = -9806 - - errSSLXCertChainInvalid = -9807 - errSSLCrypto = -9809 - errSSLInternal = -9810 - errSSLCertExpired = -9814 - errSSLCertNotYetValid = -9815 - errSSLUnknownRootCert = -9812 - errSSLNoRootCert = -9813 - errSSLHostNameMismatch = -9843 - errSSLPeerHandshakeFail = -9824 - errSSLPeerUserCancelled = -9839 - errSSLWeakPeerEphemeralDHKey = -9850 - errSSLServerAuthCompleted = -9841 - errSSLRecordOverflow = -9847 - - errSecVerifyFailed = -67808 - errSecNoTrustSettings = -25263 - errSecItemNotFound = -25300 - errSecInvalidTrustSettings = -25262 diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/pyopenssl.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/pyopenssl.py deleted file mode 100644 index 74b35883..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/pyopenssl.py +++ /dev/null @@ -1,548 +0,0 @@ -""" -Module for using pyOpenSSL as a TLS backend. This module was relevant before -the standard library ``ssl`` module supported SNI, but now that we've dropped -support for Python 2.7 all relevant Python versions support SNI so -**this module is no longer recommended**. - -This needs the following packages installed: - -* `pyOpenSSL`_ (tested with 16.0.0) -* `cryptography`_ (minimum 1.3.4, from pyopenssl) -* `idna`_ (minimum 2.0, from cryptography) - -However, pyOpenSSL depends on cryptography, which depends on idna, so while we -use all three directly here we end up having relatively few packages required. - -You can install them with the following command: - -.. code-block:: bash - - $ python -m pip install pyopenssl cryptography idna - -To activate certificate checking, call -:func:`~urllib3.contrib.pyopenssl.inject_into_urllib3` from your Python code -before you begin making HTTP requests. This can be done in a ``sitecustomize`` -module, or at any other time before your application begins using ``urllib3``, -like this: - -.. code-block:: python - - try: - import urllib3.contrib.pyopenssl - urllib3.contrib.pyopenssl.inject_into_urllib3() - except ImportError: - pass - -.. _pyopenssl: https://www.pyopenssl.org -.. _cryptography: https://cryptography.io -.. _idna: https://github.com/kjd/idna -""" - -from __future__ import annotations - -import OpenSSL.SSL # type: ignore[import] -from cryptography import x509 - -try: - from cryptography.x509 import UnsupportedExtension # type: ignore[attr-defined] -except ImportError: - # UnsupportedExtension is gone in cryptography >= 2.1.0 - class UnsupportedExtension(Exception): # type: ignore[no-redef] - pass - - -import logging -import ssl -import typing -from io import BytesIO -from socket import socket as socket_cls -from socket import timeout - -from .. import util - -if typing.TYPE_CHECKING: - from OpenSSL.crypto import X509 # type: ignore[import] - - -__all__ = ["inject_into_urllib3", "extract_from_urllib3"] - -# Map from urllib3 to PyOpenSSL compatible parameter-values. -_openssl_versions = { - util.ssl_.PROTOCOL_TLS: OpenSSL.SSL.SSLv23_METHOD, # type: ignore[attr-defined] - util.ssl_.PROTOCOL_TLS_CLIENT: OpenSSL.SSL.SSLv23_METHOD, # type: ignore[attr-defined] - ssl.PROTOCOL_TLSv1: OpenSSL.SSL.TLSv1_METHOD, -} - -if hasattr(ssl, "PROTOCOL_TLSv1_1") and hasattr(OpenSSL.SSL, "TLSv1_1_METHOD"): - _openssl_versions[ssl.PROTOCOL_TLSv1_1] = OpenSSL.SSL.TLSv1_1_METHOD - -if hasattr(ssl, "PROTOCOL_TLSv1_2") and hasattr(OpenSSL.SSL, "TLSv1_2_METHOD"): - _openssl_versions[ssl.PROTOCOL_TLSv1_2] = OpenSSL.SSL.TLSv1_2_METHOD - - -_stdlib_to_openssl_verify = { - ssl.CERT_NONE: OpenSSL.SSL.VERIFY_NONE, - ssl.CERT_OPTIONAL: OpenSSL.SSL.VERIFY_PEER, - ssl.CERT_REQUIRED: OpenSSL.SSL.VERIFY_PEER - + OpenSSL.SSL.VERIFY_FAIL_IF_NO_PEER_CERT, -} -_openssl_to_stdlib_verify = {v: k for k, v in _stdlib_to_openssl_verify.items()} - -# The SSLvX values are the most likely to be missing in the future -# but we check them all just to be sure. -_OP_NO_SSLv2_OR_SSLv3: int = getattr(OpenSSL.SSL, "OP_NO_SSLv2", 0) | getattr( - OpenSSL.SSL, "OP_NO_SSLv3", 0 -) -_OP_NO_TLSv1: int = getattr(OpenSSL.SSL, "OP_NO_TLSv1", 0) -_OP_NO_TLSv1_1: int = getattr(OpenSSL.SSL, "OP_NO_TLSv1_1", 0) -_OP_NO_TLSv1_2: int = getattr(OpenSSL.SSL, "OP_NO_TLSv1_2", 0) -_OP_NO_TLSv1_3: int = getattr(OpenSSL.SSL, "OP_NO_TLSv1_3", 0) - -_openssl_to_ssl_minimum_version: dict[int, int] = { - ssl.TLSVersion.MINIMUM_SUPPORTED: _OP_NO_SSLv2_OR_SSLv3, - ssl.TLSVersion.TLSv1: _OP_NO_SSLv2_OR_SSLv3, - ssl.TLSVersion.TLSv1_1: _OP_NO_SSLv2_OR_SSLv3 | _OP_NO_TLSv1, - ssl.TLSVersion.TLSv1_2: _OP_NO_SSLv2_OR_SSLv3 | _OP_NO_TLSv1 | _OP_NO_TLSv1_1, - ssl.TLSVersion.TLSv1_3: ( - _OP_NO_SSLv2_OR_SSLv3 | _OP_NO_TLSv1 | _OP_NO_TLSv1_1 | _OP_NO_TLSv1_2 - ), - ssl.TLSVersion.MAXIMUM_SUPPORTED: ( - _OP_NO_SSLv2_OR_SSLv3 | _OP_NO_TLSv1 | _OP_NO_TLSv1_1 | _OP_NO_TLSv1_2 - ), -} -_openssl_to_ssl_maximum_version: dict[int, int] = { - ssl.TLSVersion.MINIMUM_SUPPORTED: ( - _OP_NO_SSLv2_OR_SSLv3 - | _OP_NO_TLSv1 - | _OP_NO_TLSv1_1 - | _OP_NO_TLSv1_2 - | _OP_NO_TLSv1_3 - ), - ssl.TLSVersion.TLSv1: ( - _OP_NO_SSLv2_OR_SSLv3 | _OP_NO_TLSv1_1 | _OP_NO_TLSv1_2 | _OP_NO_TLSv1_3 - ), - ssl.TLSVersion.TLSv1_1: _OP_NO_SSLv2_OR_SSLv3 | _OP_NO_TLSv1_2 | _OP_NO_TLSv1_3, - ssl.TLSVersion.TLSv1_2: _OP_NO_SSLv2_OR_SSLv3 | _OP_NO_TLSv1_3, - ssl.TLSVersion.TLSv1_3: _OP_NO_SSLv2_OR_SSLv3, - ssl.TLSVersion.MAXIMUM_SUPPORTED: _OP_NO_SSLv2_OR_SSLv3, -} - -# OpenSSL will only write 16K at a time -SSL_WRITE_BLOCKSIZE = 16384 - -orig_util_SSLContext = util.ssl_.SSLContext - - -log = logging.getLogger(__name__) - - -def inject_into_urllib3() -> None: - "Monkey-patch urllib3 with PyOpenSSL-backed SSL-support." - - _validate_dependencies_met() - - util.SSLContext = PyOpenSSLContext # type: ignore[assignment] - util.ssl_.SSLContext = PyOpenSSLContext # type: ignore[assignment] - util.IS_PYOPENSSL = True - util.ssl_.IS_PYOPENSSL = True - - -def extract_from_urllib3() -> None: - "Undo monkey-patching by :func:`inject_into_urllib3`." - - util.SSLContext = orig_util_SSLContext - util.ssl_.SSLContext = orig_util_SSLContext - util.IS_PYOPENSSL = False - util.ssl_.IS_PYOPENSSL = False - - -def _validate_dependencies_met() -> None: - """ - Verifies that PyOpenSSL's package-level dependencies have been met. - Throws `ImportError` if they are not met. - """ - # Method added in `cryptography==1.1`; not available in older versions - from cryptography.x509.extensions import Extensions - - if getattr(Extensions, "get_extension_for_class", None) is None: - raise ImportError( - "'cryptography' module missing required functionality. " - "Try upgrading to v1.3.4 or newer." - ) - - # pyOpenSSL 0.14 and above use cryptography for OpenSSL bindings. The _x509 - # attribute is only present on those versions. - from OpenSSL.crypto import X509 - - x509 = X509() - if getattr(x509, "_x509", None) is None: - raise ImportError( - "'pyOpenSSL' module missing required functionality. " - "Try upgrading to v0.14 or newer." - ) - - -def _dnsname_to_stdlib(name: str) -> str | None: - """ - Converts a dNSName SubjectAlternativeName field to the form used by the - standard library on the given Python version. - - Cryptography produces a dNSName as a unicode string that was idna-decoded - from ASCII bytes. We need to idna-encode that string to get it back, and - then on Python 3 we also need to convert to unicode via UTF-8 (the stdlib - uses PyUnicode_FromStringAndSize on it, which decodes via UTF-8). - - If the name cannot be idna-encoded then we return None signalling that - the name given should be skipped. - """ - - def idna_encode(name: str) -> bytes | None: - """ - Borrowed wholesale from the Python Cryptography Project. It turns out - that we can't just safely call `idna.encode`: it can explode for - wildcard names. This avoids that problem. - """ - import idna - - try: - for prefix in ["*.", "."]: - if name.startswith(prefix): - name = name[len(prefix) :] - return prefix.encode("ascii") + idna.encode(name) - return idna.encode(name) - except idna.core.IDNAError: - return None - - # Don't send IPv6 addresses through the IDNA encoder. - if ":" in name: - return name - - encoded_name = idna_encode(name) - if encoded_name is None: - return None - return encoded_name.decode("utf-8") - - -def get_subj_alt_name(peer_cert: X509) -> list[tuple[str, str]]: - """ - Given an PyOpenSSL certificate, provides all the subject alternative names. - """ - cert = peer_cert.to_cryptography() - - # We want to find the SAN extension. Ask Cryptography to locate it (it's - # faster than looping in Python) - try: - ext = cert.extensions.get_extension_for_class(x509.SubjectAlternativeName).value - except x509.ExtensionNotFound: - # No such extension, return the empty list. - return [] - except ( - x509.DuplicateExtension, - UnsupportedExtension, - x509.UnsupportedGeneralNameType, - UnicodeError, - ) as e: - # A problem has been found with the quality of the certificate. Assume - # no SAN field is present. - log.warning( - "A problem was encountered with the certificate that prevented " - "urllib3 from finding the SubjectAlternativeName field. This can " - "affect certificate validation. The error was %s", - e, - ) - return [] - - # We want to return dNSName and iPAddress fields. We need to cast the IPs - # back to strings because the match_hostname function wants them as - # strings. - # Sadly the DNS names need to be idna encoded and then, on Python 3, UTF-8 - # decoded. This is pretty frustrating, but that's what the standard library - # does with certificates, and so we need to attempt to do the same. - # We also want to skip over names which cannot be idna encoded. - names = [ - ("DNS", name) - for name in map(_dnsname_to_stdlib, ext.get_values_for_type(x509.DNSName)) - if name is not None - ] - names.extend( - ("IP Address", str(name)) for name in ext.get_values_for_type(x509.IPAddress) - ) - - return names - - -class WrappedSocket: - """API-compatibility wrapper for Python OpenSSL's Connection-class.""" - - def __init__( - self, - connection: OpenSSL.SSL.Connection, - socket: socket_cls, - suppress_ragged_eofs: bool = True, - ) -> None: - self.connection = connection - self.socket = socket - self.suppress_ragged_eofs = suppress_ragged_eofs - self._io_refs = 0 - self._closed = False - - def fileno(self) -> int: - return self.socket.fileno() - - # Copy-pasted from Python 3.5 source code - def _decref_socketios(self) -> None: - if self._io_refs > 0: - self._io_refs -= 1 - if self._closed: - self.close() - - def recv(self, *args: typing.Any, **kwargs: typing.Any) -> bytes: - try: - data = self.connection.recv(*args, **kwargs) - except OpenSSL.SSL.SysCallError as e: - if self.suppress_ragged_eofs and e.args == (-1, "Unexpected EOF"): - return b"" - else: - raise OSError(e.args[0], str(e)) from e - except OpenSSL.SSL.ZeroReturnError: - if self.connection.get_shutdown() == OpenSSL.SSL.RECEIVED_SHUTDOWN: - return b"" - else: - raise - except OpenSSL.SSL.WantReadError as e: - if not util.wait_for_read(self.socket, self.socket.gettimeout()): - raise timeout("The read operation timed out") from e - else: - return self.recv(*args, **kwargs) - - # TLS 1.3 post-handshake authentication - except OpenSSL.SSL.Error as e: - raise ssl.SSLError(f"read error: {e!r}") from e - else: - return data # type: ignore[no-any-return] - - def recv_into(self, *args: typing.Any, **kwargs: typing.Any) -> int: - try: - return self.connection.recv_into(*args, **kwargs) # type: ignore[no-any-return] - except OpenSSL.SSL.SysCallError as e: - if self.suppress_ragged_eofs and e.args == (-1, "Unexpected EOF"): - return 0 - else: - raise OSError(e.args[0], str(e)) from e - except OpenSSL.SSL.ZeroReturnError: - if self.connection.get_shutdown() == OpenSSL.SSL.RECEIVED_SHUTDOWN: - return 0 - else: - raise - except OpenSSL.SSL.WantReadError as e: - if not util.wait_for_read(self.socket, self.socket.gettimeout()): - raise timeout("The read operation timed out") from e - else: - return self.recv_into(*args, **kwargs) - - # TLS 1.3 post-handshake authentication - except OpenSSL.SSL.Error as e: - raise ssl.SSLError(f"read error: {e!r}") from e - - def settimeout(self, timeout: float) -> None: - return self.socket.settimeout(timeout) - - def _send_until_done(self, data: bytes) -> int: - while True: - try: - return self.connection.send(data) # type: ignore[no-any-return] - except OpenSSL.SSL.WantWriteError as e: - if not util.wait_for_write(self.socket, self.socket.gettimeout()): - raise timeout() from e - continue - except OpenSSL.SSL.SysCallError as e: - raise OSError(e.args[0], str(e)) from e - - def sendall(self, data: bytes) -> None: - total_sent = 0 - while total_sent < len(data): - sent = self._send_until_done( - data[total_sent : total_sent + SSL_WRITE_BLOCKSIZE] - ) - total_sent += sent - - def shutdown(self) -> None: - # FIXME rethrow compatible exceptions should we ever use this - self.connection.shutdown() - - def close(self) -> None: - self._closed = True - if self._io_refs <= 0: - self._real_close() - - def _real_close(self) -> None: - try: - return self.connection.close() # type: ignore[no-any-return] - except OpenSSL.SSL.Error: - return - - def getpeercert( - self, binary_form: bool = False - ) -> dict[str, list[typing.Any]] | None: - x509 = self.connection.get_peer_certificate() - - if not x509: - return x509 # type: ignore[no-any-return] - - if binary_form: - return OpenSSL.crypto.dump_certificate(OpenSSL.crypto.FILETYPE_ASN1, x509) # type: ignore[no-any-return] - - return { - "subject": ((("commonName", x509.get_subject().CN),),), # type: ignore[dict-item] - "subjectAltName": get_subj_alt_name(x509), - } - - def version(self) -> str: - return self.connection.get_protocol_version_name() # type: ignore[no-any-return] - - -WrappedSocket.makefile = socket_cls.makefile # type: ignore[attr-defined] - - -class PyOpenSSLContext: - """ - I am a wrapper class for the PyOpenSSL ``Context`` object. I am responsible - for translating the interface of the standard library ``SSLContext`` object - to calls into PyOpenSSL. - """ - - def __init__(self, protocol: int) -> None: - self.protocol = _openssl_versions[protocol] - self._ctx = OpenSSL.SSL.Context(self.protocol) - self._options = 0 - self.check_hostname = False - self._minimum_version: int = ssl.TLSVersion.MINIMUM_SUPPORTED - self._maximum_version: int = ssl.TLSVersion.MAXIMUM_SUPPORTED - - @property - def options(self) -> int: - return self._options - - @options.setter - def options(self, value: int) -> None: - self._options = value - self._set_ctx_options() - - @property - def verify_mode(self) -> int: - return _openssl_to_stdlib_verify[self._ctx.get_verify_mode()] - - @verify_mode.setter - def verify_mode(self, value: ssl.VerifyMode) -> None: - self._ctx.set_verify(_stdlib_to_openssl_verify[value], _verify_callback) - - def set_default_verify_paths(self) -> None: - self._ctx.set_default_verify_paths() - - def set_ciphers(self, ciphers: bytes | str) -> None: - if isinstance(ciphers, str): - ciphers = ciphers.encode("utf-8") - self._ctx.set_cipher_list(ciphers) - - def load_verify_locations( - self, - cafile: str | None = None, - capath: str | None = None, - cadata: bytes | None = None, - ) -> None: - if cafile is not None: - cafile = cafile.encode("utf-8") # type: ignore[assignment] - if capath is not None: - capath = capath.encode("utf-8") # type: ignore[assignment] - try: - self._ctx.load_verify_locations(cafile, capath) - if cadata is not None: - self._ctx.load_verify_locations(BytesIO(cadata)) - except OpenSSL.SSL.Error as e: - raise ssl.SSLError(f"unable to load trusted certificates: {e!r}") from e - - def load_cert_chain( - self, - certfile: str, - keyfile: str | None = None, - password: str | None = None, - ) -> None: - try: - self._ctx.use_certificate_chain_file(certfile) - if password is not None: - if not isinstance(password, bytes): - password = password.encode("utf-8") # type: ignore[assignment] - self._ctx.set_passwd_cb(lambda *_: password) - self._ctx.use_privatekey_file(keyfile or certfile) - except OpenSSL.SSL.Error as e: - raise ssl.SSLError(f"Unable to load certificate chain: {e!r}") from e - - def set_alpn_protocols(self, protocols: list[bytes | str]) -> None: - protocols = [util.util.to_bytes(p, "ascii") for p in protocols] - return self._ctx.set_alpn_protos(protocols) # type: ignore[no-any-return] - - def wrap_socket( - self, - sock: socket_cls, - server_side: bool = False, - do_handshake_on_connect: bool = True, - suppress_ragged_eofs: bool = True, - server_hostname: bytes | str | None = None, - ) -> WrappedSocket: - cnx = OpenSSL.SSL.Connection(self._ctx, sock) - - # If server_hostname is an IP, don't use it for SNI, per RFC6066 Section 3 - if server_hostname and not util.ssl_.is_ipaddress(server_hostname): - if isinstance(server_hostname, str): - server_hostname = server_hostname.encode("utf-8") - cnx.set_tlsext_host_name(server_hostname) - - cnx.set_connect_state() - - while True: - try: - cnx.do_handshake() - except OpenSSL.SSL.WantReadError as e: - if not util.wait_for_read(sock, sock.gettimeout()): - raise timeout("select timed out") from e - continue - except OpenSSL.SSL.Error as e: - raise ssl.SSLError(f"bad handshake: {e!r}") from e - break - - return WrappedSocket(cnx, sock) - - def _set_ctx_options(self) -> None: - self._ctx.set_options( - self._options - | _openssl_to_ssl_minimum_version[self._minimum_version] - | _openssl_to_ssl_maximum_version[self._maximum_version] - ) - - @property - def minimum_version(self) -> int: - return self._minimum_version - - @minimum_version.setter - def minimum_version(self, minimum_version: int) -> None: - self._minimum_version = minimum_version - self._set_ctx_options() - - @property - def maximum_version(self) -> int: - return self._maximum_version - - @maximum_version.setter - def maximum_version(self, maximum_version: int) -> None: - self._maximum_version = maximum_version - self._set_ctx_options() - - -def _verify_callback( - cnx: OpenSSL.SSL.Connection, - x509: X509, - err_no: int, - err_depth: int, - return_code: int, -) -> bool: - return err_no == 0 diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/securetransport.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/securetransport.py deleted file mode 100644 index 11beb3df..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/securetransport.py +++ /dev/null @@ -1,913 +0,0 @@ -""" -SecureTranport support for urllib3 via ctypes. - -This makes platform-native TLS available to urllib3 users on macOS without the -use of a compiler. This is an important feature because the Python Package -Index is moving to become a TLSv1.2-or-higher server, and the default OpenSSL -that ships with macOS is not capable of doing TLSv1.2. The only way to resolve -this is to give macOS users an alternative solution to the problem, and that -solution is to use SecureTransport. - -We use ctypes here because this solution must not require a compiler. That's -because pip is not allowed to require a compiler either. - -This is not intended to be a seriously long-term solution to this problem. -The hope is that PEP 543 will eventually solve this issue for us, at which -point we can retire this contrib module. But in the short term, we need to -solve the impending tire fire that is Python on Mac without this kind of -contrib module. So...here we are. - -To use this module, simply import and inject it:: - - import urllib3.contrib.securetransport - urllib3.contrib.securetransport.inject_into_urllib3() - -Happy TLSing! - -This code is a bastardised version of the code found in Will Bond's oscrypto -library. An enormous debt is owed to him for blazing this trail for us. For -that reason, this code should be considered to be covered both by urllib3's -license and by oscrypto's: - -.. code-block:: - - Copyright (c) 2015-2016 Will Bond - - Permission is hereby granted, free of charge, to any person obtaining a - copy of this software and associated documentation files (the "Software"), - to deal in the Software without restriction, including without limitation - the rights to use, copy, modify, merge, publish, distribute, sublicense, - and/or sell copies of the Software, and to permit persons to whom the - Software is furnished to do so, subject to the following conditions: - - The above copyright notice and this permission notice shall be included in - all copies or substantial portions of the Software. - - THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR - IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, - FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE - AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER - LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING - FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER - DEALINGS IN THE SOFTWARE. -""" - -from __future__ import annotations - -import contextlib -import ctypes -import errno -import os.path -import shutil -import socket -import ssl -import struct -import threading -import typing -import warnings -import weakref -from socket import socket as socket_cls - -from .. import util -from ._securetransport.bindings import ( # type: ignore[attr-defined] - CoreFoundation, - Security, -) -from ._securetransport.low_level import ( - SecurityConst, - _assert_no_error, - _build_tls_unknown_ca_alert, - _cert_array_from_pem, - _create_cfstring_array, - _load_client_cert_chain, - _temporary_keychain, -) - -warnings.warn( - "'urllib3.contrib.securetransport' module is deprecated and will be removed " - "in urllib3 v2.1.0. Read more in this issue: " - "https://github.com/urllib3/urllib3/issues/2681", - category=DeprecationWarning, - stacklevel=2, -) - -if typing.TYPE_CHECKING: - from typing_extensions import Literal - -__all__ = ["inject_into_urllib3", "extract_from_urllib3"] - -orig_util_SSLContext = util.ssl_.SSLContext - -# This dictionary is used by the read callback to obtain a handle to the -# calling wrapped socket. This is a pretty silly approach, but for now it'll -# do. I feel like I should be able to smuggle a handle to the wrapped socket -# directly in the SSLConnectionRef, but for now this approach will work I -# guess. -# -# We need to lock around this structure for inserts, but we don't do it for -# reads/writes in the callbacks. The reasoning here goes as follows: -# -# 1. It is not possible to call into the callbacks before the dictionary is -# populated, so once in the callback the id must be in the dictionary. -# 2. The callbacks don't mutate the dictionary, they only read from it, and -# so cannot conflict with any of the insertions. -# -# This is good: if we had to lock in the callbacks we'd drastically slow down -# the performance of this code. -_connection_refs: weakref.WeakValueDictionary[ - int, WrappedSocket -] = weakref.WeakValueDictionary() -_connection_ref_lock = threading.Lock() - -# Limit writes to 16kB. This is OpenSSL's limit, but we'll cargo-cult it over -# for no better reason than we need *a* limit, and this one is right there. -SSL_WRITE_BLOCKSIZE = 16384 - -# Basically this is simple: for PROTOCOL_SSLv23 we turn it into a low of -# TLSv1 and a high of TLSv1.2. For everything else, we pin to that version. -# TLSv1 to 1.2 are supported on macOS 10.8+ -_protocol_to_min_max = { - util.ssl_.PROTOCOL_TLS: (SecurityConst.kTLSProtocol1, SecurityConst.kTLSProtocol12), # type: ignore[attr-defined] - util.ssl_.PROTOCOL_TLS_CLIENT: ( # type: ignore[attr-defined] - SecurityConst.kTLSProtocol1, - SecurityConst.kTLSProtocol12, - ), -} - -if hasattr(ssl, "PROTOCOL_SSLv2"): - _protocol_to_min_max[ssl.PROTOCOL_SSLv2] = ( - SecurityConst.kSSLProtocol2, - SecurityConst.kSSLProtocol2, - ) -if hasattr(ssl, "PROTOCOL_SSLv3"): - _protocol_to_min_max[ssl.PROTOCOL_SSLv3] = ( - SecurityConst.kSSLProtocol3, - SecurityConst.kSSLProtocol3, - ) -if hasattr(ssl, "PROTOCOL_TLSv1"): - _protocol_to_min_max[ssl.PROTOCOL_TLSv1] = ( - SecurityConst.kTLSProtocol1, - SecurityConst.kTLSProtocol1, - ) -if hasattr(ssl, "PROTOCOL_TLSv1_1"): - _protocol_to_min_max[ssl.PROTOCOL_TLSv1_1] = ( - SecurityConst.kTLSProtocol11, - SecurityConst.kTLSProtocol11, - ) -if hasattr(ssl, "PROTOCOL_TLSv1_2"): - _protocol_to_min_max[ssl.PROTOCOL_TLSv1_2] = ( - SecurityConst.kTLSProtocol12, - SecurityConst.kTLSProtocol12, - ) - - -_tls_version_to_st: dict[int, int] = { - ssl.TLSVersion.MINIMUM_SUPPORTED: SecurityConst.kTLSProtocol1, - ssl.TLSVersion.TLSv1: SecurityConst.kTLSProtocol1, - ssl.TLSVersion.TLSv1_1: SecurityConst.kTLSProtocol11, - ssl.TLSVersion.TLSv1_2: SecurityConst.kTLSProtocol12, - ssl.TLSVersion.MAXIMUM_SUPPORTED: SecurityConst.kTLSProtocol12, -} - - -def inject_into_urllib3() -> None: - """ - Monkey-patch urllib3 with SecureTransport-backed SSL-support. - """ - util.SSLContext = SecureTransportContext # type: ignore[assignment] - util.ssl_.SSLContext = SecureTransportContext # type: ignore[assignment] - util.IS_SECURETRANSPORT = True - util.ssl_.IS_SECURETRANSPORT = True - - -def extract_from_urllib3() -> None: - """ - Undo monkey-patching by :func:`inject_into_urllib3`. - """ - util.SSLContext = orig_util_SSLContext - util.ssl_.SSLContext = orig_util_SSLContext - util.IS_SECURETRANSPORT = False - util.ssl_.IS_SECURETRANSPORT = False - - -def _read_callback( - connection_id: int, data_buffer: int, data_length_pointer: bytearray -) -> int: - """ - SecureTransport read callback. This is called by ST to request that data - be returned from the socket. - """ - wrapped_socket = None - try: - wrapped_socket = _connection_refs.get(connection_id) - if wrapped_socket is None: - return SecurityConst.errSSLInternal - base_socket = wrapped_socket.socket - - requested_length = data_length_pointer[0] - - timeout = wrapped_socket.gettimeout() - error = None - read_count = 0 - - try: - while read_count < requested_length: - if timeout is None or timeout >= 0: - if not util.wait_for_read(base_socket, timeout): - raise OSError(errno.EAGAIN, "timed out") - - remaining = requested_length - read_count - buffer = (ctypes.c_char * remaining).from_address( - data_buffer + read_count - ) - chunk_size = base_socket.recv_into(buffer, remaining) - read_count += chunk_size - if not chunk_size: - if not read_count: - return SecurityConst.errSSLClosedGraceful - break - except OSError as e: - error = e.errno - - if error is not None and error != errno.EAGAIN: - data_length_pointer[0] = read_count - if error == errno.ECONNRESET or error == errno.EPIPE: - return SecurityConst.errSSLClosedAbort - raise - - data_length_pointer[0] = read_count - - if read_count != requested_length: - return SecurityConst.errSSLWouldBlock - - return 0 - except Exception as e: - if wrapped_socket is not None: - wrapped_socket._exception = e - return SecurityConst.errSSLInternal - - -def _write_callback( - connection_id: int, data_buffer: int, data_length_pointer: bytearray -) -> int: - """ - SecureTransport write callback. This is called by ST to request that data - actually be sent on the network. - """ - wrapped_socket = None - try: - wrapped_socket = _connection_refs.get(connection_id) - if wrapped_socket is None: - return SecurityConst.errSSLInternal - base_socket = wrapped_socket.socket - - bytes_to_write = data_length_pointer[0] - data = ctypes.string_at(data_buffer, bytes_to_write) - - timeout = wrapped_socket.gettimeout() - error = None - sent = 0 - - try: - while sent < bytes_to_write: - if timeout is None or timeout >= 0: - if not util.wait_for_write(base_socket, timeout): - raise OSError(errno.EAGAIN, "timed out") - chunk_sent = base_socket.send(data) - sent += chunk_sent - - # This has some needless copying here, but I'm not sure there's - # much value in optimising this data path. - data = data[chunk_sent:] - except OSError as e: - error = e.errno - - if error is not None and error != errno.EAGAIN: - data_length_pointer[0] = sent - if error == errno.ECONNRESET or error == errno.EPIPE: - return SecurityConst.errSSLClosedAbort - raise - - data_length_pointer[0] = sent - - if sent != bytes_to_write: - return SecurityConst.errSSLWouldBlock - - return 0 - except Exception as e: - if wrapped_socket is not None: - wrapped_socket._exception = e - return SecurityConst.errSSLInternal - - -# We need to keep these two objects references alive: if they get GC'd while -# in use then SecureTransport could attempt to call a function that is in freed -# memory. That would be...uh...bad. Yeah, that's the word. Bad. -_read_callback_pointer = Security.SSLReadFunc(_read_callback) -_write_callback_pointer = Security.SSLWriteFunc(_write_callback) - - -class WrappedSocket: - """ - API-compatibility wrapper for Python's OpenSSL wrapped socket object. - """ - - def __init__(self, socket: socket_cls) -> None: - self.socket = socket - self.context = None - self._io_refs = 0 - self._closed = False - self._real_closed = False - self._exception: Exception | None = None - self._keychain = None - self._keychain_dir: str | None = None - self._client_cert_chain = None - - # We save off the previously-configured timeout and then set it to - # zero. This is done because we use select and friends to handle the - # timeouts, but if we leave the timeout set on the lower socket then - # Python will "kindly" call select on that socket again for us. Avoid - # that by forcing the timeout to zero. - self._timeout = self.socket.gettimeout() - self.socket.settimeout(0) - - @contextlib.contextmanager - def _raise_on_error(self) -> typing.Generator[None, None, None]: - """ - A context manager that can be used to wrap calls that do I/O from - SecureTransport. If any of the I/O callbacks hit an exception, this - context manager will correctly propagate the exception after the fact. - This avoids silently swallowing those exceptions. - - It also correctly forces the socket closed. - """ - self._exception = None - - # We explicitly don't catch around this yield because in the unlikely - # event that an exception was hit in the block we don't want to swallow - # it. - yield - if self._exception is not None: - exception, self._exception = self._exception, None - self._real_close() - raise exception - - def _set_alpn_protocols(self, protocols: list[bytes] | None) -> None: - """ - Sets up the ALPN protocols on the context. - """ - if not protocols: - return - protocols_arr = _create_cfstring_array(protocols) - try: - result = Security.SSLSetALPNProtocols(self.context, protocols_arr) - _assert_no_error(result) - finally: - CoreFoundation.CFRelease(protocols_arr) - - def _custom_validate(self, verify: bool, trust_bundle: bytes | None) -> None: - """ - Called when we have set custom validation. We do this in two cases: - first, when cert validation is entirely disabled; and second, when - using a custom trust DB. - Raises an SSLError if the connection is not trusted. - """ - # If we disabled cert validation, just say: cool. - if not verify or trust_bundle is None: - return - - successes = ( - SecurityConst.kSecTrustResultUnspecified, - SecurityConst.kSecTrustResultProceed, - ) - try: - trust_result = self._evaluate_trust(trust_bundle) - if trust_result in successes: - return - reason = f"error code: {int(trust_result)}" - exc = None - except Exception as e: - # Do not trust on error - reason = f"exception: {e!r}" - exc = e - - # SecureTransport does not send an alert nor shuts down the connection. - rec = _build_tls_unknown_ca_alert(self.version()) - self.socket.sendall(rec) - # close the connection immediately - # l_onoff = 1, activate linger - # l_linger = 0, linger for 0 seoncds - opts = struct.pack("ii", 1, 0) - self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_LINGER, opts) - self._real_close() - raise ssl.SSLError(f"certificate verify failed, {reason}") from exc - - def _evaluate_trust(self, trust_bundle: bytes) -> int: - # We want data in memory, so load it up. - if os.path.isfile(trust_bundle): - with open(trust_bundle, "rb") as f: - trust_bundle = f.read() - - cert_array = None - trust = Security.SecTrustRef() - - try: - # Get a CFArray that contains the certs we want. - cert_array = _cert_array_from_pem(trust_bundle) - - # Ok, now the hard part. We want to get the SecTrustRef that ST has - # created for this connection, shove our CAs into it, tell ST to - # ignore everything else it knows, and then ask if it can build a - # chain. This is a buuuunch of code. - result = Security.SSLCopyPeerTrust(self.context, ctypes.byref(trust)) - _assert_no_error(result) - if not trust: - raise ssl.SSLError("Failed to copy trust reference") - - result = Security.SecTrustSetAnchorCertificates(trust, cert_array) - _assert_no_error(result) - - result = Security.SecTrustSetAnchorCertificatesOnly(trust, True) - _assert_no_error(result) - - trust_result = Security.SecTrustResultType() - result = Security.SecTrustEvaluate(trust, ctypes.byref(trust_result)) - _assert_no_error(result) - finally: - if trust: - CoreFoundation.CFRelease(trust) - - if cert_array is not None: - CoreFoundation.CFRelease(cert_array) - - return trust_result.value # type: ignore[no-any-return] - - def handshake( - self, - server_hostname: bytes | str | None, - verify: bool, - trust_bundle: bytes | None, - min_version: int, - max_version: int, - client_cert: str | None, - client_key: str | None, - client_key_passphrase: typing.Any, - alpn_protocols: list[bytes] | None, - ) -> None: - """ - Actually performs the TLS handshake. This is run automatically by - wrapped socket, and shouldn't be needed in user code. - """ - # First, we do the initial bits of connection setup. We need to create - # a context, set its I/O funcs, and set the connection reference. - self.context = Security.SSLCreateContext( - None, SecurityConst.kSSLClientSide, SecurityConst.kSSLStreamType - ) - result = Security.SSLSetIOFuncs( - self.context, _read_callback_pointer, _write_callback_pointer - ) - _assert_no_error(result) - - # Here we need to compute the handle to use. We do this by taking the - # id of self modulo 2**31 - 1. If this is already in the dictionary, we - # just keep incrementing by one until we find a free space. - with _connection_ref_lock: - handle = id(self) % 2147483647 - while handle in _connection_refs: - handle = (handle + 1) % 2147483647 - _connection_refs[handle] = self - - result = Security.SSLSetConnection(self.context, handle) - _assert_no_error(result) - - # If we have a server hostname, we should set that too. - # RFC6066 Section 3 tells us not to use SNI when the host is an IP, but we have - # to do it anyway to match server_hostname against the server certificate - if server_hostname: - if not isinstance(server_hostname, bytes): - server_hostname = server_hostname.encode("utf-8") - - result = Security.SSLSetPeerDomainName( - self.context, server_hostname, len(server_hostname) - ) - _assert_no_error(result) - - # Setup the ALPN protocols. - self._set_alpn_protocols(alpn_protocols) - - # Set the minimum and maximum TLS versions. - result = Security.SSLSetProtocolVersionMin(self.context, min_version) - _assert_no_error(result) - - result = Security.SSLSetProtocolVersionMax(self.context, max_version) - _assert_no_error(result) - - # If there's a trust DB, we need to use it. We do that by telling - # SecureTransport to break on server auth. We also do that if we don't - # want to validate the certs at all: we just won't actually do any - # authing in that case. - if not verify or trust_bundle is not None: - result = Security.SSLSetSessionOption( - self.context, SecurityConst.kSSLSessionOptionBreakOnServerAuth, True - ) - _assert_no_error(result) - - # If there's a client cert, we need to use it. - if client_cert: - self._keychain, self._keychain_dir = _temporary_keychain() - self._client_cert_chain = _load_client_cert_chain( - self._keychain, client_cert, client_key - ) - result = Security.SSLSetCertificate(self.context, self._client_cert_chain) - _assert_no_error(result) - - while True: - with self._raise_on_error(): - result = Security.SSLHandshake(self.context) - - if result == SecurityConst.errSSLWouldBlock: - raise socket.timeout("handshake timed out") - elif result == SecurityConst.errSSLServerAuthCompleted: - self._custom_validate(verify, trust_bundle) - continue - else: - _assert_no_error(result) - break - - def fileno(self) -> int: - return self.socket.fileno() - - # Copy-pasted from Python 3.5 source code - def _decref_socketios(self) -> None: - if self._io_refs > 0: - self._io_refs -= 1 - if self._closed: - self.close() - - def recv(self, bufsiz: int) -> bytes: - buffer = ctypes.create_string_buffer(bufsiz) - bytes_read = self.recv_into(buffer, bufsiz) - data = buffer[:bytes_read] - return typing.cast(bytes, data) - - def recv_into( - self, buffer: ctypes.Array[ctypes.c_char], nbytes: int | None = None - ) -> int: - # Read short on EOF. - if self._real_closed: - return 0 - - if nbytes is None: - nbytes = len(buffer) - - buffer = (ctypes.c_char * nbytes).from_buffer(buffer) - processed_bytes = ctypes.c_size_t(0) - - with self._raise_on_error(): - result = Security.SSLRead( - self.context, buffer, nbytes, ctypes.byref(processed_bytes) - ) - - # There are some result codes that we want to treat as "not always - # errors". Specifically, those are errSSLWouldBlock, - # errSSLClosedGraceful, and errSSLClosedNoNotify. - if result == SecurityConst.errSSLWouldBlock: - # If we didn't process any bytes, then this was just a time out. - # However, we can get errSSLWouldBlock in situations when we *did* - # read some data, and in those cases we should just read "short" - # and return. - if processed_bytes.value == 0: - # Timed out, no data read. - raise socket.timeout("recv timed out") - elif result in ( - SecurityConst.errSSLClosedGraceful, - SecurityConst.errSSLClosedNoNotify, - ): - # The remote peer has closed this connection. We should do so as - # well. Note that we don't actually return here because in - # principle this could actually be fired along with return data. - # It's unlikely though. - self._real_close() - else: - _assert_no_error(result) - - # Ok, we read and probably succeeded. We should return whatever data - # was actually read. - return processed_bytes.value - - def settimeout(self, timeout: float) -> None: - self._timeout = timeout - - def gettimeout(self) -> float | None: - return self._timeout - - def send(self, data: bytes) -> int: - processed_bytes = ctypes.c_size_t(0) - - with self._raise_on_error(): - result = Security.SSLWrite( - self.context, data, len(data), ctypes.byref(processed_bytes) - ) - - if result == SecurityConst.errSSLWouldBlock and processed_bytes.value == 0: - # Timed out - raise socket.timeout("send timed out") - else: - _assert_no_error(result) - - # We sent, and probably succeeded. Tell them how much we sent. - return processed_bytes.value - - def sendall(self, data: bytes) -> None: - total_sent = 0 - while total_sent < len(data): - sent = self.send(data[total_sent : total_sent + SSL_WRITE_BLOCKSIZE]) - total_sent += sent - - def shutdown(self) -> None: - with self._raise_on_error(): - Security.SSLClose(self.context) - - def close(self) -> None: - self._closed = True - # TODO: should I do clean shutdown here? Do I have to? - if self._io_refs <= 0: - self._real_close() - - def _real_close(self) -> None: - self._real_closed = True - if self.context: - CoreFoundation.CFRelease(self.context) - self.context = None - if self._client_cert_chain: - CoreFoundation.CFRelease(self._client_cert_chain) - self._client_cert_chain = None - if self._keychain: - Security.SecKeychainDelete(self._keychain) - CoreFoundation.CFRelease(self._keychain) - shutil.rmtree(self._keychain_dir) - self._keychain = self._keychain_dir = None - return self.socket.close() - - def getpeercert(self, binary_form: bool = False) -> bytes | None: - # Urgh, annoying. - # - # Here's how we do this: - # - # 1. Call SSLCopyPeerTrust to get hold of the trust object for this - # connection. - # 2. Call SecTrustGetCertificateAtIndex for index 0 to get the leaf. - # 3. To get the CN, call SecCertificateCopyCommonName and process that - # string so that it's of the appropriate type. - # 4. To get the SAN, we need to do something a bit more complex: - # a. Call SecCertificateCopyValues to get the data, requesting - # kSecOIDSubjectAltName. - # b. Mess about with this dictionary to try to get the SANs out. - # - # This is gross. Really gross. It's going to be a few hundred LoC extra - # just to repeat something that SecureTransport can *already do*. So my - # operating assumption at this time is that what we want to do is - # instead to just flag to urllib3 that it shouldn't do its own hostname - # validation when using SecureTransport. - if not binary_form: - raise ValueError("SecureTransport only supports dumping binary certs") - trust = Security.SecTrustRef() - certdata = None - der_bytes = None - - try: - # Grab the trust store. - result = Security.SSLCopyPeerTrust(self.context, ctypes.byref(trust)) - _assert_no_error(result) - if not trust: - # Probably we haven't done the handshake yet. No biggie. - return None - - cert_count = Security.SecTrustGetCertificateCount(trust) - if not cert_count: - # Also a case that might happen if we haven't handshaked. - # Handshook? Handshaken? - return None - - leaf = Security.SecTrustGetCertificateAtIndex(trust, 0) - assert leaf - - # Ok, now we want the DER bytes. - certdata = Security.SecCertificateCopyData(leaf) - assert certdata - - data_length = CoreFoundation.CFDataGetLength(certdata) - data_buffer = CoreFoundation.CFDataGetBytePtr(certdata) - der_bytes = ctypes.string_at(data_buffer, data_length) - finally: - if certdata: - CoreFoundation.CFRelease(certdata) - if trust: - CoreFoundation.CFRelease(trust) - - return der_bytes - - def version(self) -> str: - protocol = Security.SSLProtocol() - result = Security.SSLGetNegotiatedProtocolVersion( - self.context, ctypes.byref(protocol) - ) - _assert_no_error(result) - if protocol.value == SecurityConst.kTLSProtocol13: - raise ssl.SSLError("SecureTransport does not support TLS 1.3") - elif protocol.value == SecurityConst.kTLSProtocol12: - return "TLSv1.2" - elif protocol.value == SecurityConst.kTLSProtocol11: - return "TLSv1.1" - elif protocol.value == SecurityConst.kTLSProtocol1: - return "TLSv1" - elif protocol.value == SecurityConst.kSSLProtocol3: - return "SSLv3" - elif protocol.value == SecurityConst.kSSLProtocol2: - return "SSLv2" - else: - raise ssl.SSLError(f"Unknown TLS version: {protocol!r}") - - -def makefile( - self: socket_cls, - mode: ( - Literal["r"] | Literal["w"] | Literal["rw"] | Literal["wr"] | Literal[""] - ) = "r", - buffering: int | None = None, - *args: typing.Any, - **kwargs: typing.Any, -) -> typing.BinaryIO | typing.TextIO: - # We disable buffering with SecureTransport because it conflicts with - # the buffering that ST does internally (see issue #1153 for more). - buffering = 0 - return socket_cls.makefile(self, mode, buffering, *args, **kwargs) - - -WrappedSocket.makefile = makefile # type: ignore[attr-defined] - - -class SecureTransportContext: - """ - I am a wrapper class for the SecureTransport library, to translate the - interface of the standard library ``SSLContext`` object to calls into - SecureTransport. - """ - - def __init__(self, protocol: int) -> None: - self._minimum_version: int = ssl.TLSVersion.MINIMUM_SUPPORTED - self._maximum_version: int = ssl.TLSVersion.MAXIMUM_SUPPORTED - if protocol not in (None, ssl.PROTOCOL_TLS, ssl.PROTOCOL_TLS_CLIENT): - self._min_version, self._max_version = _protocol_to_min_max[protocol] - - self._options = 0 - self._verify = False - self._trust_bundle: bytes | None = None - self._client_cert: str | None = None - self._client_key: str | None = None - self._client_key_passphrase = None - self._alpn_protocols: list[bytes] | None = None - - @property - def check_hostname(self) -> Literal[True]: - """ - SecureTransport cannot have its hostname checking disabled. For more, - see the comment on getpeercert() in this file. - """ - return True - - @check_hostname.setter - def check_hostname(self, value: typing.Any) -> None: - """ - SecureTransport cannot have its hostname checking disabled. For more, - see the comment on getpeercert() in this file. - """ - - @property - def options(self) -> int: - # TODO: Well, crap. - # - # So this is the bit of the code that is the most likely to cause us - # trouble. Essentially we need to enumerate all of the SSL options that - # users might want to use and try to see if we can sensibly translate - # them, or whether we should just ignore them. - return self._options - - @options.setter - def options(self, value: int) -> None: - # TODO: Update in line with above. - self._options = value - - @property - def verify_mode(self) -> int: - return ssl.CERT_REQUIRED if self._verify else ssl.CERT_NONE - - @verify_mode.setter - def verify_mode(self, value: int) -> None: - self._verify = value == ssl.CERT_REQUIRED - - def set_default_verify_paths(self) -> None: - # So, this has to do something a bit weird. Specifically, what it does - # is nothing. - # - # This means that, if we had previously had load_verify_locations - # called, this does not undo that. We need to do that because it turns - # out that the rest of the urllib3 code will attempt to load the - # default verify paths if it hasn't been told about any paths, even if - # the context itself was sometime earlier. We resolve that by just - # ignoring it. - pass - - def load_default_certs(self) -> None: - return self.set_default_verify_paths() - - def set_ciphers(self, ciphers: typing.Any) -> None: - raise ValueError("SecureTransport doesn't support custom cipher strings") - - def load_verify_locations( - self, - cafile: str | None = None, - capath: str | None = None, - cadata: bytes | None = None, - ) -> None: - # OK, we only really support cadata and cafile. - if capath is not None: - raise ValueError("SecureTransport does not support cert directories") - - # Raise if cafile does not exist. - if cafile is not None: - with open(cafile): - pass - - self._trust_bundle = cafile or cadata # type: ignore[assignment] - - def load_cert_chain( - self, - certfile: str, - keyfile: str | None = None, - password: str | None = None, - ) -> None: - self._client_cert = certfile - self._client_key = keyfile - self._client_cert_passphrase = password - - def set_alpn_protocols(self, protocols: list[str | bytes]) -> None: - """ - Sets the ALPN protocols that will later be set on the context. - - Raises a NotImplementedError if ALPN is not supported. - """ - if not hasattr(Security, "SSLSetALPNProtocols"): - raise NotImplementedError( - "SecureTransport supports ALPN only in macOS 10.12+" - ) - self._alpn_protocols = [util.util.to_bytes(p, "ascii") for p in protocols] - - def wrap_socket( - self, - sock: socket_cls, - server_side: bool = False, - do_handshake_on_connect: bool = True, - suppress_ragged_eofs: bool = True, - server_hostname: bytes | str | None = None, - ) -> WrappedSocket: - # So, what do we do here? Firstly, we assert some properties. This is a - # stripped down shim, so there is some functionality we don't support. - # See PEP 543 for the real deal. - assert not server_side - assert do_handshake_on_connect - assert suppress_ragged_eofs - - # Ok, we're good to go. Now we want to create the wrapped socket object - # and store it in the appropriate place. - wrapped_socket = WrappedSocket(sock) - - # Now we can handshake - wrapped_socket.handshake( - server_hostname, - self._verify, - self._trust_bundle, - _tls_version_to_st[self._minimum_version], - _tls_version_to_st[self._maximum_version], - self._client_cert, - self._client_key, - self._client_key_passphrase, - self._alpn_protocols, - ) - return wrapped_socket - - @property - def minimum_version(self) -> int: - return self._minimum_version - - @minimum_version.setter - def minimum_version(self, minimum_version: int) -> None: - self._minimum_version = minimum_version - - @property - def maximum_version(self) -> int: - return self._maximum_version - - @maximum_version.setter - def maximum_version(self, maximum_version: int) -> None: - self._maximum_version = maximum_version diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/socks.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/socks.py deleted file mode 100644 index 5e552dda..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/contrib/socks.py +++ /dev/null @@ -1,233 +0,0 @@ -""" -This module contains provisional support for SOCKS proxies from within -urllib3. This module supports SOCKS4, SOCKS4A (an extension of SOCKS4), and -SOCKS5. To enable its functionality, either install PySocks or install this -module with the ``socks`` extra. - -The SOCKS implementation supports the full range of urllib3 features. It also -supports the following SOCKS features: - -- SOCKS4A (``proxy_url='socks4a://...``) -- SOCKS4 (``proxy_url='socks4://...``) -- SOCKS5 with remote DNS (``proxy_url='socks5h://...``) -- SOCKS5 with local DNS (``proxy_url='socks5://...``) -- Usernames and passwords for the SOCKS proxy - -.. note:: - It is recommended to use ``socks5h://`` or ``socks4a://`` schemes in - your ``proxy_url`` to ensure that DNS resolution is done from the remote - server instead of client-side when connecting to a domain name. - -SOCKS4 supports IPv4 and domain names with the SOCKS4A extension. SOCKS5 -supports IPv4, IPv6, and domain names. - -When connecting to a SOCKS4 proxy the ``username`` portion of the ``proxy_url`` -will be sent as the ``userid`` section of the SOCKS request: - -.. code-block:: python - - proxy_url="socks4a://@proxy-host" - -When connecting to a SOCKS5 proxy the ``username`` and ``password`` portion -of the ``proxy_url`` will be sent as the username/password to authenticate -with the proxy: - -.. code-block:: python - - proxy_url="socks5h://:@proxy-host" - -""" - -from __future__ import annotations - -try: - import socks # type: ignore[import] -except ImportError: - import warnings - - from ..exceptions import DependencyWarning - - warnings.warn( - ( - "SOCKS support in urllib3 requires the installation of optional " - "dependencies: specifically, PySocks. For more information, see " - "https://urllib3.readthedocs.io/en/latest/contrib.html#socks-proxies" - ), - DependencyWarning, - ) - raise - -import typing -from socket import timeout as SocketTimeout - -from ..connection import HTTPConnection, HTTPSConnection -from ..connectionpool import HTTPConnectionPool, HTTPSConnectionPool -from ..exceptions import ConnectTimeoutError, NewConnectionError -from ..poolmanager import PoolManager -from ..util.url import parse_url - -try: - import ssl -except ImportError: - ssl = None # type: ignore[assignment] - -try: - from typing import TypedDict - - class _TYPE_SOCKS_OPTIONS(TypedDict): - socks_version: int - proxy_host: str | None - proxy_port: str | None - username: str | None - password: str | None - rdns: bool - -except ImportError: # Python 3.7 - _TYPE_SOCKS_OPTIONS = typing.Dict[str, typing.Any] # type: ignore[misc, assignment] - - -class SOCKSConnection(HTTPConnection): - """ - A plain-text HTTP connection that connects via a SOCKS proxy. - """ - - def __init__( - self, - _socks_options: _TYPE_SOCKS_OPTIONS, - *args: typing.Any, - **kwargs: typing.Any, - ) -> None: - self._socks_options = _socks_options - super().__init__(*args, **kwargs) - - def _new_conn(self) -> socks.socksocket: - """ - Establish a new connection via the SOCKS proxy. - """ - extra_kw: dict[str, typing.Any] = {} - if self.source_address: - extra_kw["source_address"] = self.source_address - - if self.socket_options: - extra_kw["socket_options"] = self.socket_options - - try: - conn = socks.create_connection( - (self.host, self.port), - proxy_type=self._socks_options["socks_version"], - proxy_addr=self._socks_options["proxy_host"], - proxy_port=self._socks_options["proxy_port"], - proxy_username=self._socks_options["username"], - proxy_password=self._socks_options["password"], - proxy_rdns=self._socks_options["rdns"], - timeout=self.timeout, - **extra_kw, - ) - - except SocketTimeout as e: - raise ConnectTimeoutError( - self, - f"Connection to {self.host} timed out. (connect timeout={self.timeout})", - ) from e - - except socks.ProxyError as e: - # This is fragile as hell, but it seems to be the only way to raise - # useful errors here. - if e.socket_err: - error = e.socket_err - if isinstance(error, SocketTimeout): - raise ConnectTimeoutError( - self, - f"Connection to {self.host} timed out. (connect timeout={self.timeout})", - ) from e - else: - # Adding `from e` messes with coverage somehow, so it's omitted. - # See #2386. - raise NewConnectionError( - self, f"Failed to establish a new connection: {error}" - ) - else: - raise NewConnectionError( - self, f"Failed to establish a new connection: {e}" - ) from e - - except OSError as e: # Defensive: PySocks should catch all these. - raise NewConnectionError( - self, f"Failed to establish a new connection: {e}" - ) from e - - return conn - - -# We don't need to duplicate the Verified/Unverified distinction from -# urllib3/connection.py here because the HTTPSConnection will already have been -# correctly set to either the Verified or Unverified form by that module. This -# means the SOCKSHTTPSConnection will automatically be the correct type. -class SOCKSHTTPSConnection(SOCKSConnection, HTTPSConnection): - pass - - -class SOCKSHTTPConnectionPool(HTTPConnectionPool): - ConnectionCls = SOCKSConnection - - -class SOCKSHTTPSConnectionPool(HTTPSConnectionPool): - ConnectionCls = SOCKSHTTPSConnection - - -class SOCKSProxyManager(PoolManager): - """ - A version of the urllib3 ProxyManager that routes connections via the - defined SOCKS proxy. - """ - - pool_classes_by_scheme = { - "http": SOCKSHTTPConnectionPool, - "https": SOCKSHTTPSConnectionPool, - } - - def __init__( - self, - proxy_url: str, - username: str | None = None, - password: str | None = None, - num_pools: int = 10, - headers: typing.Mapping[str, str] | None = None, - **connection_pool_kw: typing.Any, - ): - parsed = parse_url(proxy_url) - - if username is None and password is None and parsed.auth is not None: - split = parsed.auth.split(":") - if len(split) == 2: - username, password = split - if parsed.scheme == "socks5": - socks_version = socks.PROXY_TYPE_SOCKS5 - rdns = False - elif parsed.scheme == "socks5h": - socks_version = socks.PROXY_TYPE_SOCKS5 - rdns = True - elif parsed.scheme == "socks4": - socks_version = socks.PROXY_TYPE_SOCKS4 - rdns = False - elif parsed.scheme == "socks4a": - socks_version = socks.PROXY_TYPE_SOCKS4 - rdns = True - else: - raise ValueError(f"Unable to determine SOCKS version from {proxy_url}") - - self.proxy_url = proxy_url - - socks_options = { - "socks_version": socks_version, - "proxy_host": parsed.host, - "proxy_port": parsed.port, - "username": username, - "password": password, - "rdns": rdns, - } - connection_pool_kw["_socks_options"] = socks_options - - super().__init__(num_pools, headers, **connection_pool_kw) - - self.pool_classes_by_scheme = SOCKSProxyManager.pool_classes_by_scheme diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/exceptions.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/exceptions.py deleted file mode 100644 index 5bb92369..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/exceptions.py +++ /dev/null @@ -1,318 +0,0 @@ -from __future__ import annotations - -import socket -import typing -import warnings -from email.errors import MessageDefect -from http.client import IncompleteRead as httplib_IncompleteRead - -if typing.TYPE_CHECKING: - from .connection import HTTPConnection - from .connectionpool import ConnectionPool - from .response import HTTPResponse - from .util.retry import Retry - -# Base Exceptions - - -class HTTPError(Exception): - """Base exception used by this module.""" - - -class HTTPWarning(Warning): - """Base warning used by this module.""" - - -_TYPE_REDUCE_RESULT = typing.Tuple[ - typing.Callable[..., object], typing.Tuple[object, ...] -] - - -class PoolError(HTTPError): - """Base exception for errors caused within a pool.""" - - def __init__(self, pool: ConnectionPool, message: str) -> None: - self.pool = pool - super().__init__(f"{pool}: {message}") - - def __reduce__(self) -> _TYPE_REDUCE_RESULT: - # For pickling purposes. - return self.__class__, (None, None) - - -class RequestError(PoolError): - """Base exception for PoolErrors that have associated URLs.""" - - def __init__(self, pool: ConnectionPool, url: str, message: str) -> None: - self.url = url - super().__init__(pool, message) - - def __reduce__(self) -> _TYPE_REDUCE_RESULT: - # For pickling purposes. - return self.__class__, (None, self.url, None) - - -class SSLError(HTTPError): - """Raised when SSL certificate fails in an HTTPS connection.""" - - -class ProxyError(HTTPError): - """Raised when the connection to a proxy fails.""" - - # The original error is also available as __cause__. - original_error: Exception - - def __init__(self, message: str, error: Exception) -> None: - super().__init__(message, error) - self.original_error = error - - -class DecodeError(HTTPError): - """Raised when automatic decoding based on Content-Type fails.""" - - -class ProtocolError(HTTPError): - """Raised when something unexpected happens mid-request/response.""" - - -#: Renamed to ProtocolError but aliased for backwards compatibility. -ConnectionError = ProtocolError - - -# Leaf Exceptions - - -class MaxRetryError(RequestError): - """Raised when the maximum number of retries is exceeded. - - :param pool: The connection pool - :type pool: :class:`~urllib3.connectionpool.HTTPConnectionPool` - :param str url: The requested Url - :param reason: The underlying error - :type reason: :class:`Exception` - - """ - - def __init__( - self, pool: ConnectionPool, url: str, reason: Exception | None = None - ) -> None: - self.reason = reason - - message = f"Max retries exceeded with url: {url} (Caused by {reason!r})" - - super().__init__(pool, url, message) - - -class HostChangedError(RequestError): - """Raised when an existing pool gets a request for a foreign host.""" - - def __init__( - self, pool: ConnectionPool, url: str, retries: Retry | int = 3 - ) -> None: - message = f"Tried to open a foreign host with url: {url}" - super().__init__(pool, url, message) - self.retries = retries - - -class TimeoutStateError(HTTPError): - """Raised when passing an invalid state to a timeout""" - - -class TimeoutError(HTTPError): - """Raised when a socket timeout error occurs. - - Catching this error will catch both :exc:`ReadTimeoutErrors - ` and :exc:`ConnectTimeoutErrors `. - """ - - -class ReadTimeoutError(TimeoutError, RequestError): - """Raised when a socket timeout occurs while receiving data from a server""" - - -# This timeout error does not have a URL attached and needs to inherit from the -# base HTTPError -class ConnectTimeoutError(TimeoutError): - """Raised when a socket timeout occurs while connecting to a server""" - - -class NewConnectionError(ConnectTimeoutError, HTTPError): - """Raised when we fail to establish a new connection. Usually ECONNREFUSED.""" - - def __init__(self, conn: HTTPConnection, message: str) -> None: - self.conn = conn - super().__init__(f"{conn}: {message}") - - @property - def pool(self) -> HTTPConnection: - warnings.warn( - "The 'pool' property is deprecated and will be removed " - "in urllib3 v2.1.0. Use 'conn' instead.", - DeprecationWarning, - stacklevel=2, - ) - - return self.conn - - -class NameResolutionError(NewConnectionError): - """Raised when host name resolution fails.""" - - def __init__(self, host: str, conn: HTTPConnection, reason: socket.gaierror): - message = f"Failed to resolve '{host}' ({reason})" - super().__init__(conn, message) - - -class EmptyPoolError(PoolError): - """Raised when a pool runs out of connections and no more are allowed.""" - - -class FullPoolError(PoolError): - """Raised when we try to add a connection to a full pool in blocking mode.""" - - -class ClosedPoolError(PoolError): - """Raised when a request enters a pool after the pool has been closed.""" - - -class LocationValueError(ValueError, HTTPError): - """Raised when there is something wrong with a given URL input.""" - - -class LocationParseError(LocationValueError): - """Raised when get_host or similar fails to parse the URL input.""" - - def __init__(self, location: str) -> None: - message = f"Failed to parse: {location}" - super().__init__(message) - - self.location = location - - -class URLSchemeUnknown(LocationValueError): - """Raised when a URL input has an unsupported scheme.""" - - def __init__(self, scheme: str): - message = f"Not supported URL scheme {scheme}" - super().__init__(message) - - self.scheme = scheme - - -class ResponseError(HTTPError): - """Used as a container for an error reason supplied in a MaxRetryError.""" - - GENERIC_ERROR = "too many error responses" - SPECIFIC_ERROR = "too many {status_code} error responses" - - -class SecurityWarning(HTTPWarning): - """Warned when performing security reducing actions""" - - -class InsecureRequestWarning(SecurityWarning): - """Warned when making an unverified HTTPS request.""" - - -class NotOpenSSLWarning(SecurityWarning): - """Warned when using unsupported SSL library""" - - -class SystemTimeWarning(SecurityWarning): - """Warned when system time is suspected to be wrong""" - - -class InsecurePlatformWarning(SecurityWarning): - """Warned when certain TLS/SSL configuration is not available on a platform.""" - - -class DependencyWarning(HTTPWarning): - """ - Warned when an attempt is made to import a module with missing optional - dependencies. - """ - - -class ResponseNotChunked(ProtocolError, ValueError): - """Response needs to be chunked in order to read it as chunks.""" - - -class BodyNotHttplibCompatible(HTTPError): - """ - Body should be :class:`http.client.HTTPResponse` like - (have an fp attribute which returns raw chunks) for read_chunked(). - """ - - -class IncompleteRead(HTTPError, httplib_IncompleteRead): - """ - Response length doesn't match expected Content-Length - - Subclass of :class:`http.client.IncompleteRead` to allow int value - for ``partial`` to avoid creating large objects on streamed reads. - """ - - def __init__(self, partial: int, expected: int) -> None: - self.partial = partial # type: ignore[assignment] - self.expected = expected - - def __repr__(self) -> str: - return "IncompleteRead(%i bytes read, %i more expected)" % ( - self.partial, # type: ignore[str-format] - self.expected, - ) - - -class InvalidChunkLength(HTTPError, httplib_IncompleteRead): - """Invalid chunk length in a chunked response.""" - - def __init__(self, response: HTTPResponse, length: bytes) -> None: - self.partial: int = response.tell() # type: ignore[assignment] - self.expected: int | None = response.length_remaining - self.response = response - self.length = length - - def __repr__(self) -> str: - return "InvalidChunkLength(got length %r, %i bytes read)" % ( - self.length, - self.partial, - ) - - -class InvalidHeader(HTTPError): - """The header provided was somehow invalid.""" - - -class ProxySchemeUnknown(AssertionError, URLSchemeUnknown): - """ProxyManager does not support the supplied scheme""" - - # TODO(t-8ch): Stop inheriting from AssertionError in v2.0. - - def __init__(self, scheme: str | None) -> None: - # 'localhost' is here because our URL parser parses - # localhost:8080 -> scheme=localhost, remove if we fix this. - if scheme == "localhost": - scheme = None - if scheme is None: - message = "Proxy URL had no scheme, should start with http:// or https://" - else: - message = f"Proxy URL had unsupported scheme {scheme}, should use http:// or https://" - super().__init__(message) - - -class ProxySchemeUnsupported(ValueError): - """Fetching HTTPS resources through HTTPS proxies is unsupported""" - - -class HeaderParsingError(HTTPError): - """Raised by assert_header_parsing, but we convert it to a log.warning statement.""" - - def __init__( - self, defects: list[MessageDefect], unparsed_data: bytes | str | None - ) -> None: - message = f"{defects or 'Unknown'}, unparsed data: {unparsed_data!r}" - super().__init__(message) - - -class UnrewindableBodyError(HTTPError): - """urllib3 encountered an error when trying to rewind a body""" diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/fields.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/fields.py deleted file mode 100644 index 51d898e2..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/fields.py +++ /dev/null @@ -1,345 +0,0 @@ -from __future__ import annotations - -import email.utils -import mimetypes -import typing - -_TYPE_FIELD_VALUE = typing.Union[str, bytes] -_TYPE_FIELD_VALUE_TUPLE = typing.Union[ - _TYPE_FIELD_VALUE, - typing.Tuple[str, _TYPE_FIELD_VALUE], - typing.Tuple[str, _TYPE_FIELD_VALUE, str], -] - - -def guess_content_type( - filename: str | None, default: str = "application/octet-stream" -) -> str: - """ - Guess the "Content-Type" of a file. - - :param filename: - The filename to guess the "Content-Type" of using :mod:`mimetypes`. - :param default: - If no "Content-Type" can be guessed, default to `default`. - """ - if filename: - return mimetypes.guess_type(filename)[0] or default - return default - - -def format_header_param_rfc2231(name: str, value: _TYPE_FIELD_VALUE) -> str: - """ - Helper function to format and quote a single header parameter using the - strategy defined in RFC 2231. - - Particularly useful for header parameters which might contain - non-ASCII values, like file names. This follows - `RFC 2388 Section 4.4 `_. - - :param name: - The name of the parameter, a string expected to be ASCII only. - :param value: - The value of the parameter, provided as ``bytes`` or `str``. - :returns: - An RFC-2231-formatted unicode string. - - .. deprecated:: 2.0.0 - Will be removed in urllib3 v2.1.0. This is not valid for - ``multipart/form-data`` header parameters. - """ - import warnings - - warnings.warn( - "'format_header_param_rfc2231' is deprecated and will be " - "removed in urllib3 v2.1.0. This is not valid for " - "multipart/form-data header parameters.", - DeprecationWarning, - stacklevel=2, - ) - - if isinstance(value, bytes): - value = value.decode("utf-8") - - if not any(ch in value for ch in '"\\\r\n'): - result = f'{name}="{value}"' - try: - result.encode("ascii") - except (UnicodeEncodeError, UnicodeDecodeError): - pass - else: - return result - - value = email.utils.encode_rfc2231(value, "utf-8") - value = f"{name}*={value}" - - return value - - -def format_multipart_header_param(name: str, value: _TYPE_FIELD_VALUE) -> str: - """ - Format and quote a single multipart header parameter. - - This follows the `WHATWG HTML Standard`_ as of 2021/06/10, matching - the behavior of current browser and curl versions. Values are - assumed to be UTF-8. The ``\\n``, ``\\r``, and ``"`` characters are - percent encoded. - - .. _WHATWG HTML Standard: - https://html.spec.whatwg.org/multipage/ - form-control-infrastructure.html#multipart-form-data - - :param name: - The name of the parameter, an ASCII-only ``str``. - :param value: - The value of the parameter, a ``str`` or UTF-8 encoded - ``bytes``. - :returns: - A string ``name="value"`` with the escaped value. - - .. versionchanged:: 2.0.0 - Matches the WHATWG HTML Standard as of 2021/06/10. Control - characters are no longer percent encoded. - - .. versionchanged:: 2.0.0 - Renamed from ``format_header_param_html5`` and - ``format_header_param``. The old names will be removed in - urllib3 v2.1.0. - """ - if isinstance(value, bytes): - value = value.decode("utf-8") - - # percent encode \n \r " - value = value.translate({10: "%0A", 13: "%0D", 34: "%22"}) - return f'{name}="{value}"' - - -def format_header_param_html5(name: str, value: _TYPE_FIELD_VALUE) -> str: - """ - .. deprecated:: 2.0.0 - Renamed to :func:`format_multipart_header_param`. Will be - removed in urllib3 v2.1.0. - """ - import warnings - - warnings.warn( - "'format_header_param_html5' has been renamed to " - "'format_multipart_header_param'. The old name will be " - "removed in urllib3 v2.1.0.", - DeprecationWarning, - stacklevel=2, - ) - return format_multipart_header_param(name, value) - - -def format_header_param(name: str, value: _TYPE_FIELD_VALUE) -> str: - """ - .. deprecated:: 2.0.0 - Renamed to :func:`format_multipart_header_param`. Will be - removed in urllib3 v2.1.0. - """ - import warnings - - warnings.warn( - "'format_header_param' has been renamed to " - "'format_multipart_header_param'. The old name will be " - "removed in urllib3 v2.1.0.", - DeprecationWarning, - stacklevel=2, - ) - return format_multipart_header_param(name, value) - - -class RequestField: - """ - A data container for request body parameters. - - :param name: - The name of this request field. Must be unicode. - :param data: - The data/value body. - :param filename: - An optional filename of the request field. Must be unicode. - :param headers: - An optional dict-like object of headers to initially use for the field. - - .. versionchanged:: 2.0.0 - The ``header_formatter`` parameter is deprecated and will - be removed in urllib3 v2.1.0. - """ - - def __init__( - self, - name: str, - data: _TYPE_FIELD_VALUE, - filename: str | None = None, - headers: typing.Mapping[str, str] | None = None, - header_formatter: typing.Callable[[str, _TYPE_FIELD_VALUE], str] | None = None, - ): - self._name = name - self._filename = filename - self.data = data - self.headers: dict[str, str | None] = {} - if headers: - self.headers = dict(headers) - - if header_formatter is not None: - import warnings - - warnings.warn( - "The 'header_formatter' parameter is deprecated and " - "will be removed in urllib3 v2.1.0.", - DeprecationWarning, - stacklevel=2, - ) - self.header_formatter = header_formatter - else: - self.header_formatter = format_multipart_header_param - - @classmethod - def from_tuples( - cls, - fieldname: str, - value: _TYPE_FIELD_VALUE_TUPLE, - header_formatter: typing.Callable[[str, _TYPE_FIELD_VALUE], str] | None = None, - ) -> RequestField: - """ - A :class:`~urllib3.fields.RequestField` factory from old-style tuple parameters. - - Supports constructing :class:`~urllib3.fields.RequestField` from - parameter of key/value strings AND key/filetuple. A filetuple is a - (filename, data, MIME type) tuple where the MIME type is optional. - For example:: - - 'foo': 'bar', - 'fakefile': ('foofile.txt', 'contents of foofile'), - 'realfile': ('barfile.txt', open('realfile').read()), - 'typedfile': ('bazfile.bin', open('bazfile').read(), 'image/jpeg'), - 'nonamefile': 'contents of nonamefile field', - - Field names and filenames must be unicode. - """ - filename: str | None - content_type: str | None - data: _TYPE_FIELD_VALUE - - if isinstance(value, tuple): - if len(value) == 3: - filename, data, content_type = typing.cast( - typing.Tuple[str, _TYPE_FIELD_VALUE, str], value - ) - else: - filename, data = typing.cast( - typing.Tuple[str, _TYPE_FIELD_VALUE], value - ) - content_type = guess_content_type(filename) - else: - filename = None - content_type = None - data = value - - request_param = cls( - fieldname, data, filename=filename, header_formatter=header_formatter - ) - request_param.make_multipart(content_type=content_type) - - return request_param - - def _render_part(self, name: str, value: _TYPE_FIELD_VALUE) -> str: - """ - Override this method to change how each multipart header - parameter is formatted. By default, this calls - :func:`format_multipart_header_param`. - - :param name: - The name of the parameter, an ASCII-only ``str``. - :param value: - The value of the parameter, a ``str`` or UTF-8 encoded - ``bytes``. - - :meta public: - """ - return self.header_formatter(name, value) - - def _render_parts( - self, - header_parts: ( - dict[str, _TYPE_FIELD_VALUE | None] - | typing.Sequence[tuple[str, _TYPE_FIELD_VALUE | None]] - ), - ) -> str: - """ - Helper function to format and quote a single header. - - Useful for single headers that are composed of multiple items. E.g., - 'Content-Disposition' fields. - - :param header_parts: - A sequence of (k, v) tuples or a :class:`dict` of (k, v) to format - as `k1="v1"; k2="v2"; ...`. - """ - iterable: typing.Iterable[tuple[str, _TYPE_FIELD_VALUE | None]] - - parts = [] - if isinstance(header_parts, dict): - iterable = header_parts.items() - else: - iterable = header_parts - - for name, value in iterable: - if value is not None: - parts.append(self._render_part(name, value)) - - return "; ".join(parts) - - def render_headers(self) -> str: - """ - Renders the headers for this request field. - """ - lines = [] - - sort_keys = ["Content-Disposition", "Content-Type", "Content-Location"] - for sort_key in sort_keys: - if self.headers.get(sort_key, False): - lines.append(f"{sort_key}: {self.headers[sort_key]}") - - for header_name, header_value in self.headers.items(): - if header_name not in sort_keys: - if header_value: - lines.append(f"{header_name}: {header_value}") - - lines.append("\r\n") - return "\r\n".join(lines) - - def make_multipart( - self, - content_disposition: str | None = None, - content_type: str | None = None, - content_location: str | None = None, - ) -> None: - """ - Makes this request field into a multipart request field. - - This method overrides "Content-Disposition", "Content-Type" and - "Content-Location" headers to the request parameter. - - :param content_disposition: - The 'Content-Disposition' of the request body. Defaults to 'form-data' - :param content_type: - The 'Content-Type' of the request body. - :param content_location: - The 'Content-Location' of the request body. - - """ - content_disposition = (content_disposition or "form-data") + "; ".join( - [ - "", - self._render_parts( - (("name", self._name), ("filename", self._filename)) - ), - ] - ) - - self.headers["Content-Disposition"] = content_disposition - self.headers["Content-Type"] = content_type - self.headers["Content-Location"] = content_location diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/filepost.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/filepost.py deleted file mode 100644 index 1c90a211..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/filepost.py +++ /dev/null @@ -1,89 +0,0 @@ -from __future__ import annotations - -import binascii -import codecs -import os -import typing -from io import BytesIO - -from .fields import _TYPE_FIELD_VALUE_TUPLE, RequestField - -writer = codecs.lookup("utf-8")[3] - -_TYPE_FIELDS_SEQUENCE = typing.Sequence[ - typing.Union[typing.Tuple[str, _TYPE_FIELD_VALUE_TUPLE], RequestField] -] -_TYPE_FIELDS = typing.Union[ - _TYPE_FIELDS_SEQUENCE, - typing.Mapping[str, _TYPE_FIELD_VALUE_TUPLE], -] - - -def choose_boundary() -> str: - """ - Our embarrassingly-simple replacement for mimetools.choose_boundary. - """ - return binascii.hexlify(os.urandom(16)).decode() - - -def iter_field_objects(fields: _TYPE_FIELDS) -> typing.Iterable[RequestField]: - """ - Iterate over fields. - - Supports list of (k, v) tuples and dicts, and lists of - :class:`~urllib3.fields.RequestField`. - - """ - iterable: typing.Iterable[RequestField | tuple[str, _TYPE_FIELD_VALUE_TUPLE]] - - if isinstance(fields, typing.Mapping): - iterable = fields.items() - else: - iterable = fields - - for field in iterable: - if isinstance(field, RequestField): - yield field - else: - yield RequestField.from_tuples(*field) - - -def encode_multipart_formdata( - fields: _TYPE_FIELDS, boundary: str | None = None -) -> tuple[bytes, str]: - """ - Encode a dictionary of ``fields`` using the multipart/form-data MIME format. - - :param fields: - Dictionary of fields or list of (key, :class:`~urllib3.fields.RequestField`). - Values are processed by :func:`urllib3.fields.RequestField.from_tuples`. - - :param boundary: - If not specified, then a random boundary will be generated using - :func:`urllib3.filepost.choose_boundary`. - """ - body = BytesIO() - if boundary is None: - boundary = choose_boundary() - - for field in iter_field_objects(fields): - body.write(f"--{boundary}\r\n".encode("latin-1")) - - writer(body).write(field.render_headers()) - data = field.data - - if isinstance(data, int): - data = str(data) # Backwards compatibility - - if isinstance(data, str): - writer(body).write(data) - else: - body.write(data) - - body.write(b"\r\n") - - body.write(f"--{boundary}--\r\n".encode("latin-1")) - - content_type = f"multipart/form-data; boundary={boundary}" - - return body.getvalue(), content_type diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/poolmanager.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/poolmanager.py deleted file mode 100644 index 3c92a14d..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/poolmanager.py +++ /dev/null @@ -1,637 +0,0 @@ -from __future__ import annotations - -import functools -import logging -import typing -import warnings -from types import TracebackType -from urllib.parse import urljoin - -from ._collections import HTTPHeaderDict, RecentlyUsedContainer -from ._request_methods import RequestMethods -from .connection import ProxyConfig -from .connectionpool import HTTPConnectionPool, HTTPSConnectionPool, port_by_scheme -from .exceptions import ( - LocationValueError, - MaxRetryError, - ProxySchemeUnknown, - URLSchemeUnknown, -) -from .response import BaseHTTPResponse -from .util.connection import _TYPE_SOCKET_OPTIONS -from .util.proxy import connection_requires_http_tunnel -from .util.retry import Retry -from .util.timeout import Timeout -from .util.url import Url, parse_url - -if typing.TYPE_CHECKING: - import ssl - - from typing_extensions import Literal - -__all__ = ["PoolManager", "ProxyManager", "proxy_from_url"] - - -log = logging.getLogger(__name__) - -SSL_KEYWORDS = ( - "key_file", - "cert_file", - "cert_reqs", - "ca_certs", - "ssl_version", - "ssl_minimum_version", - "ssl_maximum_version", - "ca_cert_dir", - "ssl_context", - "key_password", - "server_hostname", -) -# Default value for `blocksize` - a new parameter introduced to -# http.client.HTTPConnection & http.client.HTTPSConnection in Python 3.7 -_DEFAULT_BLOCKSIZE = 16384 - -_SelfT = typing.TypeVar("_SelfT") - - -class PoolKey(typing.NamedTuple): - """ - All known keyword arguments that could be provided to the pool manager, its - pools, or the underlying connections. - - All custom key schemes should include the fields in this key at a minimum. - """ - - key_scheme: str - key_host: str - key_port: int | None - key_timeout: Timeout | float | int | None - key_retries: Retry | bool | int | None - key_block: bool | None - key_source_address: tuple[str, int] | None - key_key_file: str | None - key_key_password: str | None - key_cert_file: str | None - key_cert_reqs: str | None - key_ca_certs: str | None - key_ssl_version: int | str | None - key_ssl_minimum_version: ssl.TLSVersion | None - key_ssl_maximum_version: ssl.TLSVersion | None - key_ca_cert_dir: str | None - key_ssl_context: ssl.SSLContext | None - key_maxsize: int | None - key_headers: frozenset[tuple[str, str]] | None - key__proxy: Url | None - key__proxy_headers: frozenset[tuple[str, str]] | None - key__proxy_config: ProxyConfig | None - key_socket_options: _TYPE_SOCKET_OPTIONS | None - key__socks_options: frozenset[tuple[str, str]] | None - key_assert_hostname: bool | str | None - key_assert_fingerprint: str | None - key_server_hostname: str | None - key_blocksize: int | None - - -def _default_key_normalizer( - key_class: type[PoolKey], request_context: dict[str, typing.Any] -) -> PoolKey: - """ - Create a pool key out of a request context dictionary. - - According to RFC 3986, both the scheme and host are case-insensitive. - Therefore, this function normalizes both before constructing the pool - key for an HTTPS request. If you wish to change this behaviour, provide - alternate callables to ``key_fn_by_scheme``. - - :param key_class: - The class to use when constructing the key. This should be a namedtuple - with the ``scheme`` and ``host`` keys at a minimum. - :type key_class: namedtuple - :param request_context: - A dictionary-like object that contain the context for a request. - :type request_context: dict - - :return: A namedtuple that can be used as a connection pool key. - :rtype: PoolKey - """ - # Since we mutate the dictionary, make a copy first - context = request_context.copy() - context["scheme"] = context["scheme"].lower() - context["host"] = context["host"].lower() - - # These are both dictionaries and need to be transformed into frozensets - for key in ("headers", "_proxy_headers", "_socks_options"): - if key in context and context[key] is not None: - context[key] = frozenset(context[key].items()) - - # The socket_options key may be a list and needs to be transformed into a - # tuple. - socket_opts = context.get("socket_options") - if socket_opts is not None: - context["socket_options"] = tuple(socket_opts) - - # Map the kwargs to the names in the namedtuple - this is necessary since - # namedtuples can't have fields starting with '_'. - for key in list(context.keys()): - context["key_" + key] = context.pop(key) - - # Default to ``None`` for keys missing from the context - for field in key_class._fields: - if field not in context: - context[field] = None - - # Default key_blocksize to _DEFAULT_BLOCKSIZE if missing from the context - if context.get("key_blocksize") is None: - context["key_blocksize"] = _DEFAULT_BLOCKSIZE - - return key_class(**context) - - -#: A dictionary that maps a scheme to a callable that creates a pool key. -#: This can be used to alter the way pool keys are constructed, if desired. -#: Each PoolManager makes a copy of this dictionary so they can be configured -#: globally here, or individually on the instance. -key_fn_by_scheme = { - "http": functools.partial(_default_key_normalizer, PoolKey), - "https": functools.partial(_default_key_normalizer, PoolKey), -} - -pool_classes_by_scheme = {"http": HTTPConnectionPool, "https": HTTPSConnectionPool} - - -class PoolManager(RequestMethods): - """ - Allows for arbitrary requests while transparently keeping track of - necessary connection pools for you. - - :param num_pools: - Number of connection pools to cache before discarding the least - recently used pool. - - :param headers: - Headers to include with all requests, unless other headers are given - explicitly. - - :param \\**connection_pool_kw: - Additional parameters are used to create fresh - :class:`urllib3.connectionpool.ConnectionPool` instances. - - Example: - - .. code-block:: python - - import urllib3 - - http = urllib3.PoolManager(num_pools=2) - - resp1 = http.request("GET", "https://google.com/") - resp2 = http.request("GET", "https://google.com/mail") - resp3 = http.request("GET", "https://yahoo.com/") - - print(len(http.pools)) - # 2 - - """ - - proxy: Url | None = None - proxy_config: ProxyConfig | None = None - - def __init__( - self, - num_pools: int = 10, - headers: typing.Mapping[str, str] | None = None, - **connection_pool_kw: typing.Any, - ) -> None: - super().__init__(headers) - self.connection_pool_kw = connection_pool_kw - - self.pools: RecentlyUsedContainer[PoolKey, HTTPConnectionPool] - self.pools = RecentlyUsedContainer(num_pools) - - # Locally set the pool classes and keys so other PoolManagers can - # override them. - self.pool_classes_by_scheme = pool_classes_by_scheme - self.key_fn_by_scheme = key_fn_by_scheme.copy() - - def __enter__(self: _SelfT) -> _SelfT: - return self - - def __exit__( - self, - exc_type: type[BaseException] | None, - exc_val: BaseException | None, - exc_tb: TracebackType | None, - ) -> Literal[False]: - self.clear() - # Return False to re-raise any potential exceptions - return False - - def _new_pool( - self, - scheme: str, - host: str, - port: int, - request_context: dict[str, typing.Any] | None = None, - ) -> HTTPConnectionPool: - """ - Create a new :class:`urllib3.connectionpool.ConnectionPool` based on host, port, scheme, and - any additional pool keyword arguments. - - If ``request_context`` is provided, it is provided as keyword arguments - to the pool class used. This method is used to actually create the - connection pools handed out by :meth:`connection_from_url` and - companion methods. It is intended to be overridden for customization. - """ - pool_cls: type[HTTPConnectionPool] = self.pool_classes_by_scheme[scheme] - if request_context is None: - request_context = self.connection_pool_kw.copy() - - # Default blocksize to _DEFAULT_BLOCKSIZE if missing or explicitly - # set to 'None' in the request_context. - if request_context.get("blocksize") is None: - request_context["blocksize"] = _DEFAULT_BLOCKSIZE - - # Although the context has everything necessary to create the pool, - # this function has historically only used the scheme, host, and port - # in the positional args. When an API change is acceptable these can - # be removed. - for key in ("scheme", "host", "port"): - request_context.pop(key, None) - - if scheme == "http": - for kw in SSL_KEYWORDS: - request_context.pop(kw, None) - - return pool_cls(host, port, **request_context) - - def clear(self) -> None: - """ - Empty our store of pools and direct them all to close. - - This will not affect in-flight connections, but they will not be - re-used after completion. - """ - self.pools.clear() - - def connection_from_host( - self, - host: str | None, - port: int | None = None, - scheme: str | None = "http", - pool_kwargs: dict[str, typing.Any] | None = None, - ) -> HTTPConnectionPool: - """ - Get a :class:`urllib3.connectionpool.ConnectionPool` based on the host, port, and scheme. - - If ``port`` isn't given, it will be derived from the ``scheme`` using - ``urllib3.connectionpool.port_by_scheme``. If ``pool_kwargs`` is - provided, it is merged with the instance's ``connection_pool_kw`` - variable and used to create the new connection pool, if one is - needed. - """ - - if not host: - raise LocationValueError("No host specified.") - - request_context = self._merge_pool_kwargs(pool_kwargs) - request_context["scheme"] = scheme or "http" - if not port: - port = port_by_scheme.get(request_context["scheme"].lower(), 80) - request_context["port"] = port - request_context["host"] = host - - return self.connection_from_context(request_context) - - def connection_from_context( - self, request_context: dict[str, typing.Any] - ) -> HTTPConnectionPool: - """ - Get a :class:`urllib3.connectionpool.ConnectionPool` based on the request context. - - ``request_context`` must at least contain the ``scheme`` key and its - value must be a key in ``key_fn_by_scheme`` instance variable. - """ - if "strict" in request_context: - warnings.warn( - "The 'strict' parameter is no longer needed on Python 3+. " - "This will raise an error in urllib3 v2.1.0.", - DeprecationWarning, - ) - request_context.pop("strict") - - scheme = request_context["scheme"].lower() - pool_key_constructor = self.key_fn_by_scheme.get(scheme) - if not pool_key_constructor: - raise URLSchemeUnknown(scheme) - pool_key = pool_key_constructor(request_context) - - return self.connection_from_pool_key(pool_key, request_context=request_context) - - def connection_from_pool_key( - self, pool_key: PoolKey, request_context: dict[str, typing.Any] - ) -> HTTPConnectionPool: - """ - Get a :class:`urllib3.connectionpool.ConnectionPool` based on the provided pool key. - - ``pool_key`` should be a namedtuple that only contains immutable - objects. At a minimum it must have the ``scheme``, ``host``, and - ``port`` fields. - """ - with self.pools.lock: - # If the scheme, host, or port doesn't match existing open - # connections, open a new ConnectionPool. - pool = self.pools.get(pool_key) - if pool: - return pool - - # Make a fresh ConnectionPool of the desired type - scheme = request_context["scheme"] - host = request_context["host"] - port = request_context["port"] - pool = self._new_pool(scheme, host, port, request_context=request_context) - self.pools[pool_key] = pool - - return pool - - def connection_from_url( - self, url: str, pool_kwargs: dict[str, typing.Any] | None = None - ) -> HTTPConnectionPool: - """ - Similar to :func:`urllib3.connectionpool.connection_from_url`. - - If ``pool_kwargs`` is not provided and a new pool needs to be - constructed, ``self.connection_pool_kw`` is used to initialize - the :class:`urllib3.connectionpool.ConnectionPool`. If ``pool_kwargs`` - is provided, it is used instead. Note that if a new pool does not - need to be created for the request, the provided ``pool_kwargs`` are - not used. - """ - u = parse_url(url) - return self.connection_from_host( - u.host, port=u.port, scheme=u.scheme, pool_kwargs=pool_kwargs - ) - - def _merge_pool_kwargs( - self, override: dict[str, typing.Any] | None - ) -> dict[str, typing.Any]: - """ - Merge a dictionary of override values for self.connection_pool_kw. - - This does not modify self.connection_pool_kw and returns a new dict. - Any keys in the override dictionary with a value of ``None`` are - removed from the merged dictionary. - """ - base_pool_kwargs = self.connection_pool_kw.copy() - if override: - for key, value in override.items(): - if value is None: - try: - del base_pool_kwargs[key] - except KeyError: - pass - else: - base_pool_kwargs[key] = value - return base_pool_kwargs - - def _proxy_requires_url_absolute_form(self, parsed_url: Url) -> bool: - """ - Indicates if the proxy requires the complete destination URL in the - request. Normally this is only needed when not using an HTTP CONNECT - tunnel. - """ - if self.proxy is None: - return False - - return not connection_requires_http_tunnel( - self.proxy, self.proxy_config, parsed_url.scheme - ) - - def urlopen( # type: ignore[override] - self, method: str, url: str, redirect: bool = True, **kw: typing.Any - ) -> BaseHTTPResponse: - """ - Same as :meth:`urllib3.HTTPConnectionPool.urlopen` - with custom cross-host redirect logic and only sends the request-uri - portion of the ``url``. - - The given ``url`` parameter must be absolute, such that an appropriate - :class:`urllib3.connectionpool.ConnectionPool` can be chosen for it. - """ - u = parse_url(url) - - if u.scheme is None: - warnings.warn( - "URLs without a scheme (ie 'https://') are deprecated and will raise an error " - "in a future version of urllib3. To avoid this DeprecationWarning ensure all URLs " - "start with 'https://' or 'http://'. Read more in this issue: " - "https://github.com/urllib3/urllib3/issues/2920", - category=DeprecationWarning, - stacklevel=2, - ) - - conn = self.connection_from_host(u.host, port=u.port, scheme=u.scheme) - - kw["assert_same_host"] = False - kw["redirect"] = False - - if "headers" not in kw: - kw["headers"] = self.headers - - if self._proxy_requires_url_absolute_form(u): - response = conn.urlopen(method, url, **kw) - else: - response = conn.urlopen(method, u.request_uri, **kw) - - redirect_location = redirect and response.get_redirect_location() - if not redirect_location: - return response - - # Support relative URLs for redirecting. - redirect_location = urljoin(url, redirect_location) - - if response.status == 303: - # Change the method according to RFC 9110, Section 15.4.4. - method = "GET" - # And lose the body not to transfer anything sensitive. - kw["body"] = None - kw["headers"] = HTTPHeaderDict(kw["headers"])._prepare_for_method_change() - - retries = kw.get("retries") - if not isinstance(retries, Retry): - retries = Retry.from_int(retries, redirect=redirect) - - # Strip headers marked as unsafe to forward to the redirected location. - # Check remove_headers_on_redirect to avoid a potential network call within - # conn.is_same_host() which may use socket.gethostbyname() in the future. - if retries.remove_headers_on_redirect and not conn.is_same_host( - redirect_location - ): - new_headers = kw["headers"].copy() - for header in kw["headers"]: - if header.lower() in retries.remove_headers_on_redirect: - new_headers.pop(header, None) - kw["headers"] = new_headers - - try: - retries = retries.increment(method, url, response=response, _pool=conn) - except MaxRetryError: - if retries.raise_on_redirect: - response.drain_conn() - raise - return response - - kw["retries"] = retries - kw["redirect"] = redirect - - log.info("Redirecting %s -> %s", url, redirect_location) - - response.drain_conn() - return self.urlopen(method, redirect_location, **kw) - - -class ProxyManager(PoolManager): - """ - Behaves just like :class:`PoolManager`, but sends all requests through - the defined proxy, using the CONNECT method for HTTPS URLs. - - :param proxy_url: - The URL of the proxy to be used. - - :param proxy_headers: - A dictionary containing headers that will be sent to the proxy. In case - of HTTP they are being sent with each request, while in the - HTTPS/CONNECT case they are sent only once. Could be used for proxy - authentication. - - :param proxy_ssl_context: - The proxy SSL context is used to establish the TLS connection to the - proxy when using HTTPS proxies. - - :param use_forwarding_for_https: - (Defaults to False) If set to True will forward requests to the HTTPS - proxy to be made on behalf of the client instead of creating a TLS - tunnel via the CONNECT method. **Enabling this flag means that request - and response headers and content will be visible from the HTTPS proxy** - whereas tunneling keeps request and response headers and content - private. IP address, target hostname, SNI, and port are always visible - to an HTTPS proxy even when this flag is disabled. - - :param proxy_assert_hostname: - The hostname of the certificate to verify against. - - :param proxy_assert_fingerprint: - The fingerprint of the certificate to verify against. - - Example: - - .. code-block:: python - - import urllib3 - - proxy = urllib3.ProxyManager("https://localhost:3128/") - - resp1 = proxy.request("GET", "https://google.com/") - resp2 = proxy.request("GET", "https://httpbin.org/") - - print(len(proxy.pools)) - # 1 - - resp3 = proxy.request("GET", "https://httpbin.org/") - resp4 = proxy.request("GET", "https://twitter.com/") - - print(len(proxy.pools)) - # 3 - - """ - - def __init__( - self, - proxy_url: str, - num_pools: int = 10, - headers: typing.Mapping[str, str] | None = None, - proxy_headers: typing.Mapping[str, str] | None = None, - proxy_ssl_context: ssl.SSLContext | None = None, - use_forwarding_for_https: bool = False, - proxy_assert_hostname: None | str | Literal[False] = None, - proxy_assert_fingerprint: str | None = None, - **connection_pool_kw: typing.Any, - ) -> None: - if isinstance(proxy_url, HTTPConnectionPool): - str_proxy_url = f"{proxy_url.scheme}://{proxy_url.host}:{proxy_url.port}" - else: - str_proxy_url = proxy_url - proxy = parse_url(str_proxy_url) - - if proxy.scheme not in ("http", "https"): - raise ProxySchemeUnknown(proxy.scheme) - - if not proxy.port: - port = port_by_scheme.get(proxy.scheme, 80) - proxy = proxy._replace(port=port) - - self.proxy = proxy - self.proxy_headers = proxy_headers or {} - self.proxy_ssl_context = proxy_ssl_context - self.proxy_config = ProxyConfig( - proxy_ssl_context, - use_forwarding_for_https, - proxy_assert_hostname, - proxy_assert_fingerprint, - ) - - connection_pool_kw["_proxy"] = self.proxy - connection_pool_kw["_proxy_headers"] = self.proxy_headers - connection_pool_kw["_proxy_config"] = self.proxy_config - - super().__init__(num_pools, headers, **connection_pool_kw) - - def connection_from_host( - self, - host: str | None, - port: int | None = None, - scheme: str | None = "http", - pool_kwargs: dict[str, typing.Any] | None = None, - ) -> HTTPConnectionPool: - if scheme == "https": - return super().connection_from_host( - host, port, scheme, pool_kwargs=pool_kwargs - ) - - return super().connection_from_host( - self.proxy.host, self.proxy.port, self.proxy.scheme, pool_kwargs=pool_kwargs # type: ignore[union-attr] - ) - - def _set_proxy_headers( - self, url: str, headers: typing.Mapping[str, str] | None = None - ) -> typing.Mapping[str, str]: - """ - Sets headers needed by proxies: specifically, the Accept and Host - headers. Only sets headers not provided by the user. - """ - headers_ = {"Accept": "*/*"} - - netloc = parse_url(url).netloc - if netloc: - headers_["Host"] = netloc - - if headers: - headers_.update(headers) - return headers_ - - def urlopen( # type: ignore[override] - self, method: str, url: str, redirect: bool = True, **kw: typing.Any - ) -> BaseHTTPResponse: - "Same as HTTP(S)ConnectionPool.urlopen, ``url`` must be absolute." - u = parse_url(url) - if not connection_requires_http_tunnel(self.proxy, self.proxy_config, u.scheme): - # For connections using HTTP CONNECT, httplib sets the necessary - # headers on the CONNECT to the proxy. If we're not using CONNECT, - # we'll definitely need to set 'Host' at the very least. - headers = kw.get("headers", self.headers) - kw["headers"] = self._set_proxy_headers(url, headers) - - return super().urlopen(method, url, redirect=redirect, **kw) - - -def proxy_from_url(url: str, **kw: typing.Any) -> ProxyManager: - return ProxyManager(proxy_url=url, **kw) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/py.typed b/vscode-extension/context-engine-uploader/python_libs/urllib3/py.typed deleted file mode 100644 index 5f3ea3d9..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/py.typed +++ /dev/null @@ -1,2 +0,0 @@ -# Instruct type checkers to look for inline type annotations in this package. -# See PEP 561. diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/response.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/response.py deleted file mode 100644 index 12097ea9..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/response.py +++ /dev/null @@ -1,1132 +0,0 @@ -from __future__ import annotations - -import collections -import io -import json as _json -import logging -import re -import sys -import typing -import warnings -import zlib -from contextlib import contextmanager -from http.client import HTTPMessage as _HttplibHTTPMessage -from http.client import HTTPResponse as _HttplibHTTPResponse -from socket import timeout as SocketTimeout - -try: - try: - import brotlicffi as brotli # type: ignore[import] - except ImportError: - import brotli # type: ignore[import] -except ImportError: - brotli = None - -try: - import zstandard as zstd # type: ignore[import] - - # The package 'zstandard' added the 'eof' property starting - # in v0.18.0 which we require to ensure a complete and - # valid zstd stream was fed into the ZstdDecoder. - # See: https://github.com/urllib3/urllib3/pull/2624 - _zstd_version = _zstd_version = tuple( - map(int, re.search(r"^([0-9]+)\.([0-9]+)", zstd.__version__).groups()) # type: ignore[union-attr] - ) - if _zstd_version < (0, 18): # Defensive: - zstd = None - -except (AttributeError, ImportError, ValueError): # Defensive: - zstd = None - -from . import util -from ._base_connection import _TYPE_BODY -from ._collections import HTTPHeaderDict -from .connection import BaseSSLError, HTTPConnection, HTTPException -from .exceptions import ( - BodyNotHttplibCompatible, - DecodeError, - HTTPError, - IncompleteRead, - InvalidChunkLength, - InvalidHeader, - ProtocolError, - ReadTimeoutError, - ResponseNotChunked, - SSLError, -) -from .util.response import is_fp_closed, is_response_to_head -from .util.retry import Retry - -if typing.TYPE_CHECKING: - from typing_extensions import Literal - - from .connectionpool import HTTPConnectionPool - -log = logging.getLogger(__name__) - - -class ContentDecoder: - def decompress(self, data: bytes) -> bytes: - raise NotImplementedError() - - def flush(self) -> bytes: - raise NotImplementedError() - - -class DeflateDecoder(ContentDecoder): - def __init__(self) -> None: - self._first_try = True - self._data = b"" - self._obj = zlib.decompressobj() - - def decompress(self, data: bytes) -> bytes: - if not data: - return data - - if not self._first_try: - return self._obj.decompress(data) - - self._data += data - try: - decompressed = self._obj.decompress(data) - if decompressed: - self._first_try = False - self._data = None # type: ignore[assignment] - return decompressed - except zlib.error: - self._first_try = False - self._obj = zlib.decompressobj(-zlib.MAX_WBITS) - try: - return self.decompress(self._data) - finally: - self._data = None # type: ignore[assignment] - - def flush(self) -> bytes: - return self._obj.flush() - - -class GzipDecoderState: - FIRST_MEMBER = 0 - OTHER_MEMBERS = 1 - SWALLOW_DATA = 2 - - -class GzipDecoder(ContentDecoder): - def __init__(self) -> None: - self._obj = zlib.decompressobj(16 + zlib.MAX_WBITS) - self._state = GzipDecoderState.FIRST_MEMBER - - def decompress(self, data: bytes) -> bytes: - ret = bytearray() - if self._state == GzipDecoderState.SWALLOW_DATA or not data: - return bytes(ret) - while True: - try: - ret += self._obj.decompress(data) - except zlib.error: - previous_state = self._state - # Ignore data after the first error - self._state = GzipDecoderState.SWALLOW_DATA - if previous_state == GzipDecoderState.OTHER_MEMBERS: - # Allow trailing garbage acceptable in other gzip clients - return bytes(ret) - raise - data = self._obj.unused_data - if not data: - return bytes(ret) - self._state = GzipDecoderState.OTHER_MEMBERS - self._obj = zlib.decompressobj(16 + zlib.MAX_WBITS) - - def flush(self) -> bytes: - return self._obj.flush() - - -if brotli is not None: - - class BrotliDecoder(ContentDecoder): - # Supports both 'brotlipy' and 'Brotli' packages - # since they share an import name. The top branches - # are for 'brotlipy' and bottom branches for 'Brotli' - def __init__(self) -> None: - self._obj = brotli.Decompressor() - if hasattr(self._obj, "decompress"): - setattr(self, "decompress", self._obj.decompress) - else: - setattr(self, "decompress", self._obj.process) - - def flush(self) -> bytes: - if hasattr(self._obj, "flush"): - return self._obj.flush() # type: ignore[no-any-return] - return b"" - - -if zstd is not None: - - class ZstdDecoder(ContentDecoder): - def __init__(self) -> None: - self._obj = zstd.ZstdDecompressor().decompressobj() - - def decompress(self, data: bytes) -> bytes: - if not data: - return b"" - data_parts = [self._obj.decompress(data)] - while self._obj.eof and self._obj.unused_data: - unused_data = self._obj.unused_data - self._obj = zstd.ZstdDecompressor().decompressobj() - data_parts.append(self._obj.decompress(unused_data)) - return b"".join(data_parts) - - def flush(self) -> bytes: - ret = self._obj.flush() # note: this is a no-op - if not self._obj.eof: - raise DecodeError("Zstandard data is incomplete") - return ret # type: ignore[no-any-return] - - -class MultiDecoder(ContentDecoder): - """ - From RFC7231: - If one or more encodings have been applied to a representation, the - sender that applied the encodings MUST generate a Content-Encoding - header field that lists the content codings in the order in which - they were applied. - """ - - def __init__(self, modes: str) -> None: - self._decoders = [_get_decoder(m.strip()) for m in modes.split(",")] - - def flush(self) -> bytes: - return self._decoders[0].flush() - - def decompress(self, data: bytes) -> bytes: - for d in reversed(self._decoders): - data = d.decompress(data) - return data - - -def _get_decoder(mode: str) -> ContentDecoder: - if "," in mode: - return MultiDecoder(mode) - - if mode == "gzip": - return GzipDecoder() - - if brotli is not None and mode == "br": - return BrotliDecoder() - - if zstd is not None and mode == "zstd": - return ZstdDecoder() - - return DeflateDecoder() - - -class BytesQueueBuffer: - """Memory-efficient bytes buffer - - To return decoded data in read() and still follow the BufferedIOBase API, we need a - buffer to always return the correct amount of bytes. - - This buffer should be filled using calls to put() - - Our maximum memory usage is determined by the sum of the size of: - - * self.buffer, which contains the full data - * the largest chunk that we will copy in get() - - The worst case scenario is a single chunk, in which case we'll make a full copy of - the data inside get(). - """ - - def __init__(self) -> None: - self.buffer: typing.Deque[bytes] = collections.deque() - self._size: int = 0 - - def __len__(self) -> int: - return self._size - - def put(self, data: bytes) -> None: - self.buffer.append(data) - self._size += len(data) - - def get(self, n: int) -> bytes: - if n == 0: - return b"" - elif not self.buffer: - raise RuntimeError("buffer is empty") - elif n < 0: - raise ValueError("n should be > 0") - - fetched = 0 - ret = io.BytesIO() - while fetched < n: - remaining = n - fetched - chunk = self.buffer.popleft() - chunk_length = len(chunk) - if remaining < chunk_length: - left_chunk, right_chunk = chunk[:remaining], chunk[remaining:] - ret.write(left_chunk) - self.buffer.appendleft(right_chunk) - self._size -= remaining - break - else: - ret.write(chunk) - self._size -= chunk_length - fetched += chunk_length - - if not self.buffer: - break - - return ret.getvalue() - - -class BaseHTTPResponse(io.IOBase): - CONTENT_DECODERS = ["gzip", "deflate"] - if brotli is not None: - CONTENT_DECODERS += ["br"] - if zstd is not None: - CONTENT_DECODERS += ["zstd"] - REDIRECT_STATUSES = [301, 302, 303, 307, 308] - - DECODER_ERROR_CLASSES: tuple[type[Exception], ...] = (IOError, zlib.error) - if brotli is not None: - DECODER_ERROR_CLASSES += (brotli.error,) - - if zstd is not None: - DECODER_ERROR_CLASSES += (zstd.ZstdError,) - - def __init__( - self, - *, - headers: typing.Mapping[str, str] | typing.Mapping[bytes, bytes] | None = None, - status: int, - version: int, - reason: str | None, - decode_content: bool, - request_url: str | None, - retries: Retry | None = None, - ) -> None: - if isinstance(headers, HTTPHeaderDict): - self.headers = headers - else: - self.headers = HTTPHeaderDict(headers) # type: ignore[arg-type] - self.status = status - self.version = version - self.reason = reason - self.decode_content = decode_content - self._has_decoded_content = False - self._request_url: str | None = request_url - self.retries = retries - - self.chunked = False - tr_enc = self.headers.get("transfer-encoding", "").lower() - # Don't incur the penalty of creating a list and then discarding it - encodings = (enc.strip() for enc in tr_enc.split(",")) - if "chunked" in encodings: - self.chunked = True - - self._decoder: ContentDecoder | None = None - - def get_redirect_location(self) -> str | None | Literal[False]: - """ - Should we redirect and where to? - - :returns: Truthy redirect location string if we got a redirect status - code and valid location. ``None`` if redirect status and no - location. ``False`` if not a redirect status code. - """ - if self.status in self.REDIRECT_STATUSES: - return self.headers.get("location") - return False - - @property - def data(self) -> bytes: - raise NotImplementedError() - - def json(self) -> typing.Any: - """ - Parses the body of the HTTP response as JSON. - - To use a custom JSON decoder pass the result of :attr:`HTTPResponse.data` to the decoder. - - This method can raise either `UnicodeDecodeError` or `json.JSONDecodeError`. - - Read more :ref:`here `. - """ - data = self.data.decode("utf-8") - return _json.loads(data) - - @property - def url(self) -> str | None: - raise NotImplementedError() - - @url.setter - def url(self, url: str | None) -> None: - raise NotImplementedError() - - @property - def connection(self) -> HTTPConnection | None: - raise NotImplementedError() - - @property - def retries(self) -> Retry | None: - return self._retries - - @retries.setter - def retries(self, retries: Retry | None) -> None: - # Override the request_url if retries has a redirect location. - if retries is not None and retries.history: - self.url = retries.history[-1].redirect_location - self._retries = retries - - def stream( - self, amt: int | None = 2**16, decode_content: bool | None = None - ) -> typing.Iterator[bytes]: - raise NotImplementedError() - - def read( - self, - amt: int | None = None, - decode_content: bool | None = None, - cache_content: bool = False, - ) -> bytes: - raise NotImplementedError() - - def read_chunked( - self, - amt: int | None = None, - decode_content: bool | None = None, - ) -> typing.Iterator[bytes]: - raise NotImplementedError() - - def release_conn(self) -> None: - raise NotImplementedError() - - def drain_conn(self) -> None: - raise NotImplementedError() - - def close(self) -> None: - raise NotImplementedError() - - def _init_decoder(self) -> None: - """ - Set-up the _decoder attribute if necessary. - """ - # Note: content-encoding value should be case-insensitive, per RFC 7230 - # Section 3.2 - content_encoding = self.headers.get("content-encoding", "").lower() - if self._decoder is None: - if content_encoding in self.CONTENT_DECODERS: - self._decoder = _get_decoder(content_encoding) - elif "," in content_encoding: - encodings = [ - e.strip() - for e in content_encoding.split(",") - if e.strip() in self.CONTENT_DECODERS - ] - if encodings: - self._decoder = _get_decoder(content_encoding) - - def _decode( - self, data: bytes, decode_content: bool | None, flush_decoder: bool - ) -> bytes: - """ - Decode the data passed in and potentially flush the decoder. - """ - if not decode_content: - if self._has_decoded_content: - raise RuntimeError( - "Calling read(decode_content=False) is not supported after " - "read(decode_content=True) was called." - ) - return data - - try: - if self._decoder: - data = self._decoder.decompress(data) - self._has_decoded_content = True - except self.DECODER_ERROR_CLASSES as e: - content_encoding = self.headers.get("content-encoding", "").lower() - raise DecodeError( - "Received response with content-encoding: %s, but " - "failed to decode it." % content_encoding, - e, - ) from e - if flush_decoder: - data += self._flush_decoder() - - return data - - def _flush_decoder(self) -> bytes: - """ - Flushes the decoder. Should only be called if the decoder is actually - being used. - """ - if self._decoder: - return self._decoder.decompress(b"") + self._decoder.flush() - return b"" - - # Compatibility methods for `io` module - def readinto(self, b: bytearray) -> int: - temp = self.read(len(b)) - if len(temp) == 0: - return 0 - else: - b[: len(temp)] = temp - return len(temp) - - # Compatibility methods for http.client.HTTPResponse - def getheaders(self) -> HTTPHeaderDict: - warnings.warn( - "HTTPResponse.getheaders() is deprecated and will be removed " - "in urllib3 v2.1.0. Instead access HTTPResponse.headers directly.", - category=DeprecationWarning, - stacklevel=2, - ) - return self.headers - - def getheader(self, name: str, default: str | None = None) -> str | None: - warnings.warn( - "HTTPResponse.getheader() is deprecated and will be removed " - "in urllib3 v2.1.0. Instead use HTTPResponse.headers.get(name, default).", - category=DeprecationWarning, - stacklevel=2, - ) - return self.headers.get(name, default) - - # Compatibility method for http.cookiejar - def info(self) -> HTTPHeaderDict: - return self.headers - - def geturl(self) -> str | None: - return self.url - - -class HTTPResponse(BaseHTTPResponse): - """ - HTTP Response container. - - Backwards-compatible with :class:`http.client.HTTPResponse` but the response ``body`` is - loaded and decoded on-demand when the ``data`` property is accessed. This - class is also compatible with the Python standard library's :mod:`io` - module, and can hence be treated as a readable object in the context of that - framework. - - Extra parameters for behaviour not present in :class:`http.client.HTTPResponse`: - - :param preload_content: - If True, the response's body will be preloaded during construction. - - :param decode_content: - If True, will attempt to decode the body based on the - 'content-encoding' header. - - :param original_response: - When this HTTPResponse wrapper is generated from an :class:`http.client.HTTPResponse` - object, it's convenient to include the original for debug purposes. It's - otherwise unused. - - :param retries: - The retries contains the last :class:`~urllib3.util.retry.Retry` that - was used during the request. - - :param enforce_content_length: - Enforce content length checking. Body returned by server must match - value of Content-Length header, if present. Otherwise, raise error. - """ - - def __init__( - self, - body: _TYPE_BODY = "", - headers: typing.Mapping[str, str] | typing.Mapping[bytes, bytes] | None = None, - status: int = 0, - version: int = 0, - reason: str | None = None, - preload_content: bool = True, - decode_content: bool = True, - original_response: _HttplibHTTPResponse | None = None, - pool: HTTPConnectionPool | None = None, - connection: HTTPConnection | None = None, - msg: _HttplibHTTPMessage | None = None, - retries: Retry | None = None, - enforce_content_length: bool = True, - request_method: str | None = None, - request_url: str | None = None, - auto_close: bool = True, - ) -> None: - super().__init__( - headers=headers, - status=status, - version=version, - reason=reason, - decode_content=decode_content, - request_url=request_url, - retries=retries, - ) - - self.enforce_content_length = enforce_content_length - self.auto_close = auto_close - - self._body = None - self._fp: _HttplibHTTPResponse | None = None - self._original_response = original_response - self._fp_bytes_read = 0 - self.msg = msg - - if body and isinstance(body, (str, bytes)): - self._body = body - - self._pool = pool - self._connection = connection - - if hasattr(body, "read"): - self._fp = body # type: ignore[assignment] - - # Are we using the chunked-style of transfer encoding? - self.chunk_left: int | None = None - - # Determine length of response - self.length_remaining = self._init_length(request_method) - - # Used to return the correct amount of bytes for partial read()s - self._decoded_buffer = BytesQueueBuffer() - - # If requested, preload the body. - if preload_content and not self._body: - self._body = self.read(decode_content=decode_content) - - def release_conn(self) -> None: - if not self._pool or not self._connection: - return None - - self._pool._put_conn(self._connection) - self._connection = None - - def drain_conn(self) -> None: - """ - Read and discard any remaining HTTP response data in the response connection. - - Unread data in the HTTPResponse connection blocks the connection from being released back to the pool. - """ - try: - self.read() - except (HTTPError, OSError, BaseSSLError, HTTPException): - pass - - @property - def data(self) -> bytes: - # For backwards-compat with earlier urllib3 0.4 and earlier. - if self._body: - return self._body # type: ignore[return-value] - - if self._fp: - return self.read(cache_content=True) - - return None # type: ignore[return-value] - - @property - def connection(self) -> HTTPConnection | None: - return self._connection - - def isclosed(self) -> bool: - return is_fp_closed(self._fp) - - def tell(self) -> int: - """ - Obtain the number of bytes pulled over the wire so far. May differ from - the amount of content returned by :meth:``urllib3.response.HTTPResponse.read`` - if bytes are encoded on the wire (e.g, compressed). - """ - return self._fp_bytes_read - - def _init_length(self, request_method: str | None) -> int | None: - """ - Set initial length value for Response content if available. - """ - length: int | None - content_length: str | None = self.headers.get("content-length") - - if content_length is not None: - if self.chunked: - # This Response will fail with an IncompleteRead if it can't be - # received as chunked. This method falls back to attempt reading - # the response before raising an exception. - log.warning( - "Received response with both Content-Length and " - "Transfer-Encoding set. This is expressly forbidden " - "by RFC 7230 sec 3.3.2. Ignoring Content-Length and " - "attempting to process response as Transfer-Encoding: " - "chunked." - ) - return None - - try: - # RFC 7230 section 3.3.2 specifies multiple content lengths can - # be sent in a single Content-Length header - # (e.g. Content-Length: 42, 42). This line ensures the values - # are all valid ints and that as long as the `set` length is 1, - # all values are the same. Otherwise, the header is invalid. - lengths = {int(val) for val in content_length.split(",")} - if len(lengths) > 1: - raise InvalidHeader( - "Content-Length contained multiple " - "unmatching values (%s)" % content_length - ) - length = lengths.pop() - except ValueError: - length = None - else: - if length < 0: - length = None - - else: # if content_length is None - length = None - - # Convert status to int for comparison - # In some cases, httplib returns a status of "_UNKNOWN" - try: - status = int(self.status) - except ValueError: - status = 0 - - # Check for responses that shouldn't include a body - if status in (204, 304) or 100 <= status < 200 or request_method == "HEAD": - length = 0 - - return length - - @contextmanager - def _error_catcher(self) -> typing.Generator[None, None, None]: - """ - Catch low-level python exceptions, instead re-raising urllib3 - variants, so that low-level exceptions are not leaked in the - high-level api. - - On exit, release the connection back to the pool. - """ - clean_exit = False - - try: - try: - yield - - except SocketTimeout as e: - # FIXME: Ideally we'd like to include the url in the ReadTimeoutError but - # there is yet no clean way to get at it from this context. - raise ReadTimeoutError(self._pool, None, "Read timed out.") from e # type: ignore[arg-type] - - except BaseSSLError as e: - # FIXME: Is there a better way to differentiate between SSLErrors? - if "read operation timed out" not in str(e): - # SSL errors related to framing/MAC get wrapped and reraised here - raise SSLError(e) from e - - raise ReadTimeoutError(self._pool, None, "Read timed out.") from e # type: ignore[arg-type] - - except (HTTPException, OSError) as e: - # This includes IncompleteRead. - raise ProtocolError(f"Connection broken: {e!r}", e) from e - - # If no exception is thrown, we should avoid cleaning up - # unnecessarily. - clean_exit = True - finally: - # If we didn't terminate cleanly, we need to throw away our - # connection. - if not clean_exit: - # The response may not be closed but we're not going to use it - # anymore so close it now to ensure that the connection is - # released back to the pool. - if self._original_response: - self._original_response.close() - - # Closing the response may not actually be sufficient to close - # everything, so if we have a hold of the connection close that - # too. - if self._connection: - self._connection.close() - - # If we hold the original response but it's closed now, we should - # return the connection back to the pool. - if self._original_response and self._original_response.isclosed(): - self.release_conn() - - def _fp_read(self, amt: int | None = None) -> bytes: - """ - Read a response with the thought that reading the number of bytes - larger than can fit in a 32-bit int at a time via SSL in some - known cases leads to an overflow error that has to be prevented - if `amt` or `self.length_remaining` indicate that a problem may - happen. - - The known cases: - * 3.8 <= CPython < 3.9.7 because of a bug - https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900. - * urllib3 injected with pyOpenSSL-backed SSL-support. - * CPython < 3.10 only when `amt` does not fit 32-bit int. - """ - assert self._fp - c_int_max = 2**31 - 1 - if ( - ( - (amt and amt > c_int_max) - or (self.length_remaining and self.length_remaining > c_int_max) - ) - and not util.IS_SECURETRANSPORT - and (util.IS_PYOPENSSL or sys.version_info < (3, 10)) - ): - buffer = io.BytesIO() - # Besides `max_chunk_amt` being a maximum chunk size, it - # affects memory overhead of reading a response by this - # method in CPython. - # `c_int_max` equal to 2 GiB - 1 byte is the actual maximum - # chunk size that does not lead to an overflow error, but - # 256 MiB is a compromise. - max_chunk_amt = 2**28 - while amt is None or amt != 0: - if amt is not None: - chunk_amt = min(amt, max_chunk_amt) - amt -= chunk_amt - else: - chunk_amt = max_chunk_amt - data = self._fp.read(chunk_amt) - if not data: - break - buffer.write(data) - del data # to reduce peak memory usage by `max_chunk_amt`. - return buffer.getvalue() - else: - # StringIO doesn't like amt=None - return self._fp.read(amt) if amt is not None else self._fp.read() - - def _raw_read( - self, - amt: int | None = None, - ) -> bytes: - """ - Reads `amt` of bytes from the socket. - """ - if self._fp is None: - return None # type: ignore[return-value] - - fp_closed = getattr(self._fp, "closed", False) - - with self._error_catcher(): - data = self._fp_read(amt) if not fp_closed else b"" - if amt is not None and amt != 0 and not data: - # Platform-specific: Buggy versions of Python. - # Close the connection when no data is returned - # - # This is redundant to what httplib/http.client _should_ - # already do. However, versions of python released before - # December 15, 2012 (http://bugs.python.org/issue16298) do - # not properly close the connection in all cases. There is - # no harm in redundantly calling close. - self._fp.close() - if ( - self.enforce_content_length - and self.length_remaining is not None - and self.length_remaining != 0 - ): - # This is an edge case that httplib failed to cover due - # to concerns of backward compatibility. We're - # addressing it here to make sure IncompleteRead is - # raised during streaming, so all calls with incorrect - # Content-Length are caught. - raise IncompleteRead(self._fp_bytes_read, self.length_remaining) - - if data: - self._fp_bytes_read += len(data) - if self.length_remaining is not None: - self.length_remaining -= len(data) - return data - - def read( - self, - amt: int | None = None, - decode_content: bool | None = None, - cache_content: bool = False, - ) -> bytes: - """ - Similar to :meth:`http.client.HTTPResponse.read`, but with two additional - parameters: ``decode_content`` and ``cache_content``. - - :param amt: - How much of the content to read. If specified, caching is skipped - because it doesn't make sense to cache partial content as the full - response. - - :param decode_content: - If True, will attempt to decode the body based on the - 'content-encoding' header. - - :param cache_content: - If True, will save the returned data such that the same result is - returned despite of the state of the underlying file object. This - is useful if you want the ``.data`` property to continue working - after having ``.read()`` the file object. (Overridden if ``amt`` is - set.) - """ - self._init_decoder() - if decode_content is None: - decode_content = self.decode_content - - if amt is not None: - cache_content = False - - if len(self._decoded_buffer) >= amt: - return self._decoded_buffer.get(amt) - - data = self._raw_read(amt) - - flush_decoder = amt is None or (amt != 0 and not data) - - if not data and len(self._decoded_buffer) == 0: - return data - - if amt is None: - data = self._decode(data, decode_content, flush_decoder) - if cache_content: - self._body = data - else: - # do not waste memory on buffer when not decoding - if not decode_content: - if self._has_decoded_content: - raise RuntimeError( - "Calling read(decode_content=False) is not supported after " - "read(decode_content=True) was called." - ) - return data - - decoded_data = self._decode(data, decode_content, flush_decoder) - self._decoded_buffer.put(decoded_data) - - while len(self._decoded_buffer) < amt and data: - # TODO make sure to initially read enough data to get past the headers - # For example, the GZ file header takes 10 bytes, we don't want to read - # it one byte at a time - data = self._raw_read(amt) - decoded_data = self._decode(data, decode_content, flush_decoder) - self._decoded_buffer.put(decoded_data) - data = self._decoded_buffer.get(amt) - - return data - - def stream( - self, amt: int | None = 2**16, decode_content: bool | None = None - ) -> typing.Generator[bytes, None, None]: - """ - A generator wrapper for the read() method. A call will block until - ``amt`` bytes have been read from the connection or until the - connection is closed. - - :param amt: - How much of the content to read. The generator will return up to - much data per iteration, but may return less. This is particularly - likely when using compressed data. However, the empty string will - never be returned. - - :param decode_content: - If True, will attempt to decode the body based on the - 'content-encoding' header. - """ - if self.chunked and self.supports_chunked_reads(): - yield from self.read_chunked(amt, decode_content=decode_content) - else: - while not is_fp_closed(self._fp) or len(self._decoded_buffer) > 0: - data = self.read(amt=amt, decode_content=decode_content) - - if data: - yield data - - # Overrides from io.IOBase - def readable(self) -> bool: - return True - - def close(self) -> None: - if not self.closed and self._fp: - self._fp.close() - - if self._connection: - self._connection.close() - - if not self.auto_close: - io.IOBase.close(self) - - @property - def closed(self) -> bool: - if not self.auto_close: - return io.IOBase.closed.__get__(self) # type: ignore[no-any-return] - elif self._fp is None: - return True - elif hasattr(self._fp, "isclosed"): - return self._fp.isclosed() - elif hasattr(self._fp, "closed"): - return self._fp.closed - else: - return True - - def fileno(self) -> int: - if self._fp is None: - raise OSError("HTTPResponse has no file to get a fileno from") - elif hasattr(self._fp, "fileno"): - return self._fp.fileno() - else: - raise OSError( - "The file-like object this HTTPResponse is wrapped " - "around has no file descriptor" - ) - - def flush(self) -> None: - if ( - self._fp is not None - and hasattr(self._fp, "flush") - and not getattr(self._fp, "closed", False) - ): - return self._fp.flush() - - def supports_chunked_reads(self) -> bool: - """ - Checks if the underlying file-like object looks like a - :class:`http.client.HTTPResponse` object. We do this by testing for - the fp attribute. If it is present we assume it returns raw chunks as - processed by read_chunked(). - """ - return hasattr(self._fp, "fp") - - def _update_chunk_length(self) -> None: - # First, we'll figure out length of a chunk and then - # we'll try to read it from socket. - if self.chunk_left is not None: - return None - line = self._fp.fp.readline() # type: ignore[union-attr] - line = line.split(b";", 1)[0] - try: - self.chunk_left = int(line, 16) - except ValueError: - # Invalid chunked protocol response, abort. - self.close() - raise InvalidChunkLength(self, line) from None - - def _handle_chunk(self, amt: int | None) -> bytes: - returned_chunk = None - if amt is None: - chunk = self._fp._safe_read(self.chunk_left) # type: ignore[union-attr] - returned_chunk = chunk - self._fp._safe_read(2) # type: ignore[union-attr] # Toss the CRLF at the end of the chunk. - self.chunk_left = None - elif self.chunk_left is not None and amt < self.chunk_left: - value = self._fp._safe_read(amt) # type: ignore[union-attr] - self.chunk_left = self.chunk_left - amt - returned_chunk = value - elif amt == self.chunk_left: - value = self._fp._safe_read(amt) # type: ignore[union-attr] - self._fp._safe_read(2) # type: ignore[union-attr] # Toss the CRLF at the end of the chunk. - self.chunk_left = None - returned_chunk = value - else: # amt > self.chunk_left - returned_chunk = self._fp._safe_read(self.chunk_left) # type: ignore[union-attr] - self._fp._safe_read(2) # type: ignore[union-attr] # Toss the CRLF at the end of the chunk. - self.chunk_left = None - return returned_chunk # type: ignore[no-any-return] - - def read_chunked( - self, amt: int | None = None, decode_content: bool | None = None - ) -> typing.Generator[bytes, None, None]: - """ - Similar to :meth:`HTTPResponse.read`, but with an additional - parameter: ``decode_content``. - - :param amt: - How much of the content to read. If specified, caching is skipped - because it doesn't make sense to cache partial content as the full - response. - - :param decode_content: - If True, will attempt to decode the body based on the - 'content-encoding' header. - """ - self._init_decoder() - # FIXME: Rewrite this method and make it a class with a better structured logic. - if not self.chunked: - raise ResponseNotChunked( - "Response is not chunked. " - "Header 'transfer-encoding: chunked' is missing." - ) - if not self.supports_chunked_reads(): - raise BodyNotHttplibCompatible( - "Body should be http.client.HTTPResponse like. " - "It should have have an fp attribute which returns raw chunks." - ) - - with self._error_catcher(): - # Don't bother reading the body of a HEAD request. - if self._original_response and is_response_to_head(self._original_response): - self._original_response.close() - return None - - # If a response is already read and closed - # then return immediately. - if self._fp.fp is None: # type: ignore[union-attr] - return None - - while True: - self._update_chunk_length() - if self.chunk_left == 0: - break - chunk = self._handle_chunk(amt) - decoded = self._decode( - chunk, decode_content=decode_content, flush_decoder=False - ) - if decoded: - yield decoded - - if decode_content: - # On CPython and PyPy, we should never need to flush the - # decoder. However, on Jython we *might* need to, so - # lets defensively do it anyway. - decoded = self._flush_decoder() - if decoded: # Platform-specific: Jython. - yield decoded - - # Chunk content ends with \r\n: discard it. - while self._fp is not None: - line = self._fp.fp.readline() - if not line: - # Some sites may not end with '\r\n'. - break - if line == b"\r\n": - break - - # We read everything; close the "file". - if self._original_response: - self._original_response.close() - - @property - def url(self) -> str | None: - """ - Returns the URL that was the source of this response. - If the request that generated this response redirected, this method - will return the final redirect location. - """ - return self._request_url - - @url.setter - def url(self, url: str) -> None: - self._request_url = url - - def __iter__(self) -> typing.Iterator[bytes]: - buffer: list[bytes] = [] - for chunk in self.stream(decode_content=True): - if b"\n" in chunk: - chunks = chunk.split(b"\n") - yield b"".join(buffer) + chunks[0] + b"\n" - for x in chunks[1:-1]: - yield x + b"\n" - if chunks[-1]: - buffer = [chunks[-1]] - else: - buffer = [] - else: - buffer.append(chunk) - if buffer: - yield b"".join(buffer) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/__init__.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/__init__.py deleted file mode 100644 index ff56c55b..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/__init__.py +++ /dev/null @@ -1,44 +0,0 @@ -# For backwards compatibility, provide imports that used to be here. -from __future__ import annotations - -from .connection import is_connection_dropped -from .request import SKIP_HEADER, SKIPPABLE_HEADERS, make_headers -from .response import is_fp_closed -from .retry import Retry -from .ssl_ import ( - ALPN_PROTOCOLS, - IS_PYOPENSSL, - IS_SECURETRANSPORT, - SSLContext, - assert_fingerprint, - create_urllib3_context, - resolve_cert_reqs, - resolve_ssl_version, - ssl_wrap_socket, -) -from .timeout import Timeout -from .url import Url, parse_url -from .wait import wait_for_read, wait_for_write - -__all__ = ( - "IS_PYOPENSSL", - "IS_SECURETRANSPORT", - "SSLContext", - "ALPN_PROTOCOLS", - "Retry", - "Timeout", - "Url", - "assert_fingerprint", - "create_urllib3_context", - "is_connection_dropped", - "is_fp_closed", - "parse_url", - "make_headers", - "resolve_cert_reqs", - "resolve_ssl_version", - "ssl_wrap_socket", - "wait_for_read", - "wait_for_write", - "SKIP_HEADER", - "SKIPPABLE_HEADERS", -) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/connection.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/connection.py deleted file mode 100644 index 5c7da73f..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/connection.py +++ /dev/null @@ -1,137 +0,0 @@ -from __future__ import annotations - -import socket -import typing - -from ..exceptions import LocationParseError -from .timeout import _DEFAULT_TIMEOUT, _TYPE_TIMEOUT - -_TYPE_SOCKET_OPTIONS = typing.Sequence[typing.Tuple[int, int, typing.Union[int, bytes]]] - -if typing.TYPE_CHECKING: - from .._base_connection import BaseHTTPConnection - - -def is_connection_dropped(conn: BaseHTTPConnection) -> bool: # Platform-specific - """ - Returns True if the connection is dropped and should be closed. - :param conn: :class:`urllib3.connection.HTTPConnection` object. - """ - return not conn.is_connected - - -# This function is copied from socket.py in the Python 2.7 standard -# library test suite. Added to its signature is only `socket_options`. -# One additional modification is that we avoid binding to IPv6 servers -# discovered in DNS if the system doesn't have IPv6 functionality. -def create_connection( - address: tuple[str, int], - timeout: _TYPE_TIMEOUT = _DEFAULT_TIMEOUT, - source_address: tuple[str, int] | None = None, - socket_options: _TYPE_SOCKET_OPTIONS | None = None, -) -> socket.socket: - """Connect to *address* and return the socket object. - - Convenience function. Connect to *address* (a 2-tuple ``(host, - port)``) and return the socket object. Passing the optional - *timeout* parameter will set the timeout on the socket instance - before attempting to connect. If no *timeout* is supplied, the - global default timeout setting returned by :func:`socket.getdefaulttimeout` - is used. If *source_address* is set it must be a tuple of (host, port) - for the socket to bind as a source address before making the connection. - An host of '' or port 0 tells the OS to use the default. - """ - - host, port = address - if host.startswith("["): - host = host.strip("[]") - err = None - - # Using the value from allowed_gai_family() in the context of getaddrinfo lets - # us select whether to work with IPv4 DNS records, IPv6 records, or both. - # The original create_connection function always returns all records. - family = allowed_gai_family() - - try: - host.encode("idna") - except UnicodeError: - raise LocationParseError(f"'{host}', label empty or too long") from None - - for res in socket.getaddrinfo(host, port, family, socket.SOCK_STREAM): - af, socktype, proto, canonname, sa = res - sock = None - try: - sock = socket.socket(af, socktype, proto) - - # If provided, set socket level options before connecting. - _set_socket_options(sock, socket_options) - - if timeout is not _DEFAULT_TIMEOUT: - sock.settimeout(timeout) - if source_address: - sock.bind(source_address) - sock.connect(sa) - # Break explicitly a reference cycle - err = None - return sock - - except OSError as _: - err = _ - if sock is not None: - sock.close() - - if err is not None: - try: - raise err - finally: - # Break explicitly a reference cycle - err = None - else: - raise OSError("getaddrinfo returns an empty list") - - -def _set_socket_options( - sock: socket.socket, options: _TYPE_SOCKET_OPTIONS | None -) -> None: - if options is None: - return - - for opt in options: - sock.setsockopt(*opt) - - -def allowed_gai_family() -> socket.AddressFamily: - """This function is designed to work in the context of - getaddrinfo, where family=socket.AF_UNSPEC is the default and - will perform a DNS search for both IPv6 and IPv4 records.""" - - family = socket.AF_INET - if HAS_IPV6: - family = socket.AF_UNSPEC - return family - - -def _has_ipv6(host: str) -> bool: - """Returns True if the system can bind an IPv6 address.""" - sock = None - has_ipv6 = False - - if socket.has_ipv6: - # has_ipv6 returns true if cPython was compiled with IPv6 support. - # It does not tell us if the system has IPv6 support enabled. To - # determine that we must bind to an IPv6 address. - # https://github.com/urllib3/urllib3/pull/611 - # https://bugs.python.org/issue658327 - try: - sock = socket.socket(socket.AF_INET6) - sock.bind((host, 0)) - has_ipv6 = True - except Exception: - pass - - if sock: - sock.close() - return has_ipv6 - - -HAS_IPV6 = _has_ipv6("::1") diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/proxy.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/proxy.py deleted file mode 100644 index 908fc662..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/proxy.py +++ /dev/null @@ -1,43 +0,0 @@ -from __future__ import annotations - -import typing - -from .url import Url - -if typing.TYPE_CHECKING: - from ..connection import ProxyConfig - - -def connection_requires_http_tunnel( - proxy_url: Url | None = None, - proxy_config: ProxyConfig | None = None, - destination_scheme: str | None = None, -) -> bool: - """ - Returns True if the connection requires an HTTP CONNECT through the proxy. - - :param URL proxy_url: - URL of the proxy. - :param ProxyConfig proxy_config: - Proxy configuration from poolmanager.py - :param str destination_scheme: - The scheme of the destination. (i.e https, http, etc) - """ - # If we're not using a proxy, no way to use a tunnel. - if proxy_url is None: - return False - - # HTTP destinations never require tunneling, we always forward. - if destination_scheme == "http": - return False - - # Support for forwarding with HTTPS proxies and HTTPS destinations. - if ( - proxy_url.scheme == "https" - and proxy_config - and proxy_config.use_forwarding_for_https - ): - return False - - # Otherwise always use a tunnel. - return True diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/request.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/request.py deleted file mode 100644 index 7d6866f3..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/request.py +++ /dev/null @@ -1,256 +0,0 @@ -from __future__ import annotations - -import io -import typing -from base64 import b64encode -from enum import Enum - -from ..exceptions import UnrewindableBodyError -from .util import to_bytes - -if typing.TYPE_CHECKING: - from typing_extensions import Final - -# Pass as a value within ``headers`` to skip -# emitting some HTTP headers that are added automatically. -# The only headers that are supported are ``Accept-Encoding``, -# ``Host``, and ``User-Agent``. -SKIP_HEADER = "@@@SKIP_HEADER@@@" -SKIPPABLE_HEADERS = frozenset(["accept-encoding", "host", "user-agent"]) - -ACCEPT_ENCODING = "gzip,deflate" -try: - try: - import brotlicffi as _unused_module_brotli # type: ignore[import] # noqa: F401 - except ImportError: - import brotli as _unused_module_brotli # type: ignore[import] # noqa: F401 -except ImportError: - pass -else: - ACCEPT_ENCODING += ",br" -try: - import zstandard as _unused_module_zstd # type: ignore[import] # noqa: F401 -except ImportError: - pass -else: - ACCEPT_ENCODING += ",zstd" - - -class _TYPE_FAILEDTELL(Enum): - token = 0 - - -_FAILEDTELL: Final[_TYPE_FAILEDTELL] = _TYPE_FAILEDTELL.token - -_TYPE_BODY_POSITION = typing.Union[int, _TYPE_FAILEDTELL] - -# When sending a request with these methods we aren't expecting -# a body so don't need to set an explicit 'Content-Length: 0' -# The reason we do this in the negative instead of tracking methods -# which 'should' have a body is because unknown methods should be -# treated as if they were 'POST' which *does* expect a body. -_METHODS_NOT_EXPECTING_BODY = {"GET", "HEAD", "DELETE", "TRACE", "OPTIONS", "CONNECT"} - - -def make_headers( - keep_alive: bool | None = None, - accept_encoding: bool | list[str] | str | None = None, - user_agent: str | None = None, - basic_auth: str | None = None, - proxy_basic_auth: str | None = None, - disable_cache: bool | None = None, -) -> dict[str, str]: - """ - Shortcuts for generating request headers. - - :param keep_alive: - If ``True``, adds 'connection: keep-alive' header. - - :param accept_encoding: - Can be a boolean, list, or string. - ``True`` translates to 'gzip,deflate'. If either the ``brotli`` or - ``brotlicffi`` package is installed 'gzip,deflate,br' is used instead. - List will get joined by comma. - String will be used as provided. - - :param user_agent: - String representing the user-agent you want, such as - "python-urllib3/0.6" - - :param basic_auth: - Colon-separated username:password string for 'authorization: basic ...' - auth header. - - :param proxy_basic_auth: - Colon-separated username:password string for 'proxy-authorization: basic ...' - auth header. - - :param disable_cache: - If ``True``, adds 'cache-control: no-cache' header. - - Example: - - .. code-block:: python - - import urllib3 - - print(urllib3.util.make_headers(keep_alive=True, user_agent="Batman/1.0")) - # {'connection': 'keep-alive', 'user-agent': 'Batman/1.0'} - print(urllib3.util.make_headers(accept_encoding=True)) - # {'accept-encoding': 'gzip,deflate'} - """ - headers: dict[str, str] = {} - if accept_encoding: - if isinstance(accept_encoding, str): - pass - elif isinstance(accept_encoding, list): - accept_encoding = ",".join(accept_encoding) - else: - accept_encoding = ACCEPT_ENCODING - headers["accept-encoding"] = accept_encoding - - if user_agent: - headers["user-agent"] = user_agent - - if keep_alive: - headers["connection"] = "keep-alive" - - if basic_auth: - headers[ - "authorization" - ] = f"Basic {b64encode(basic_auth.encode('latin-1')).decode()}" - - if proxy_basic_auth: - headers[ - "proxy-authorization" - ] = f"Basic {b64encode(proxy_basic_auth.encode('latin-1')).decode()}" - - if disable_cache: - headers["cache-control"] = "no-cache" - - return headers - - -def set_file_position( - body: typing.Any, pos: _TYPE_BODY_POSITION | None -) -> _TYPE_BODY_POSITION | None: - """ - If a position is provided, move file to that point. - Otherwise, we'll attempt to record a position for future use. - """ - if pos is not None: - rewind_body(body, pos) - elif getattr(body, "tell", None) is not None: - try: - pos = body.tell() - except OSError: - # This differentiates from None, allowing us to catch - # a failed `tell()` later when trying to rewind the body. - pos = _FAILEDTELL - - return pos - - -def rewind_body(body: typing.IO[typing.AnyStr], body_pos: _TYPE_BODY_POSITION) -> None: - """ - Attempt to rewind body to a certain position. - Primarily used for request redirects and retries. - - :param body: - File-like object that supports seek. - - :param int pos: - Position to seek to in file. - """ - body_seek = getattr(body, "seek", None) - if body_seek is not None and isinstance(body_pos, int): - try: - body_seek(body_pos) - except OSError as e: - raise UnrewindableBodyError( - "An error occurred when rewinding request body for redirect/retry." - ) from e - elif body_pos is _FAILEDTELL: - raise UnrewindableBodyError( - "Unable to record file position for rewinding " - "request body during a redirect/retry." - ) - else: - raise ValueError( - f"body_pos must be of type integer, instead it was {type(body_pos)}." - ) - - -class ChunksAndContentLength(typing.NamedTuple): - chunks: typing.Iterable[bytes] | None - content_length: int | None - - -def body_to_chunks( - body: typing.Any | None, method: str, blocksize: int -) -> ChunksAndContentLength: - """Takes the HTTP request method, body, and blocksize and - transforms them into an iterable of chunks to pass to - socket.sendall() and an optional 'Content-Length' header. - - A 'Content-Length' of 'None' indicates the length of the body - can't be determined so should use 'Transfer-Encoding: chunked' - for framing instead. - """ - - chunks: typing.Iterable[bytes] | None - content_length: int | None - - # No body, we need to make a recommendation on 'Content-Length' - # based on whether that request method is expected to have - # a body or not. - if body is None: - chunks = None - if method.upper() not in _METHODS_NOT_EXPECTING_BODY: - content_length = 0 - else: - content_length = None - - # Bytes or strings become bytes - elif isinstance(body, (str, bytes)): - chunks = (to_bytes(body),) - content_length = len(chunks[0]) - - # File-like object, TODO: use seek() and tell() for length? - elif hasattr(body, "read"): - - def chunk_readable() -> typing.Iterable[bytes]: - nonlocal body, blocksize - encode = isinstance(body, io.TextIOBase) - while True: - datablock = body.read(blocksize) - if not datablock: - break - if encode: - datablock = datablock.encode("iso-8859-1") - yield datablock - - chunks = chunk_readable() - content_length = None - - # Otherwise we need to start checking via duck-typing. - else: - try: - # Check if the body implements the buffer API. - mv = memoryview(body) - except TypeError: - try: - # Check if the body is an iterable - chunks = iter(body) - content_length = None - except TypeError: - raise TypeError( - f"'body' must be a bytes-like object, file-like " - f"object, or iterable. Instead was {body!r}" - ) from None - else: - # Since it implements the buffer API can be passed directly to socket.sendall() - chunks = (body,) - content_length = mv.nbytes - - return ChunksAndContentLength(chunks=chunks, content_length=content_length) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/response.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/response.py deleted file mode 100644 index 0f457869..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/response.py +++ /dev/null @@ -1,101 +0,0 @@ -from __future__ import annotations - -import http.client as httplib -from email.errors import MultipartInvariantViolationDefect, StartBoundaryNotFoundDefect - -from ..exceptions import HeaderParsingError - - -def is_fp_closed(obj: object) -> bool: - """ - Checks whether a given file-like object is closed. - - :param obj: - The file-like object to check. - """ - - try: - # Check `isclosed()` first, in case Python3 doesn't set `closed`. - # GH Issue #928 - return obj.isclosed() # type: ignore[no-any-return, attr-defined] - except AttributeError: - pass - - try: - # Check via the official file-like-object way. - return obj.closed # type: ignore[no-any-return, attr-defined] - except AttributeError: - pass - - try: - # Check if the object is a container for another file-like object that - # gets released on exhaustion (e.g. HTTPResponse). - return obj.fp is None # type: ignore[attr-defined] - except AttributeError: - pass - - raise ValueError("Unable to determine whether fp is closed.") - - -def assert_header_parsing(headers: httplib.HTTPMessage) -> None: - """ - Asserts whether all headers have been successfully parsed. - Extracts encountered errors from the result of parsing headers. - - Only works on Python 3. - - :param http.client.HTTPMessage headers: Headers to verify. - - :raises urllib3.exceptions.HeaderParsingError: - If parsing errors are found. - """ - - # This will fail silently if we pass in the wrong kind of parameter. - # To make debugging easier add an explicit check. - if not isinstance(headers, httplib.HTTPMessage): - raise TypeError(f"expected httplib.Message, got {type(headers)}.") - - unparsed_data = None - - # get_payload is actually email.message.Message.get_payload; - # we're only interested in the result if it's not a multipart message - if not headers.is_multipart(): - payload = headers.get_payload() - - if isinstance(payload, (bytes, str)): - unparsed_data = payload - - # httplib is assuming a response body is available - # when parsing headers even when httplib only sends - # header data to parse_headers() This results in - # defects on multipart responses in particular. - # See: https://github.com/urllib3/urllib3/issues/800 - - # So we ignore the following defects: - # - StartBoundaryNotFoundDefect: - # The claimed start boundary was never found. - # - MultipartInvariantViolationDefect: - # A message claimed to be a multipart but no subparts were found. - defects = [ - defect - for defect in headers.defects - if not isinstance( - defect, (StartBoundaryNotFoundDefect, MultipartInvariantViolationDefect) - ) - ] - - if defects or unparsed_data: - raise HeaderParsingError(defects=defects, unparsed_data=unparsed_data) - - -def is_response_to_head(response: httplib.HTTPResponse) -> bool: - """ - Checks whether the request of a response has been a HEAD-request. - - :param http.client.HTTPResponse response: - Response to check if the originating request - used 'HEAD' as a method. - """ - # FIXME: Can we do this somehow without accessing private httplib _method? - method_str = response._method # type: str # type: ignore[attr-defined] - return method_str.upper() == "HEAD" diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/retry.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/retry.py deleted file mode 100644 index 7572bfd2..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/retry.py +++ /dev/null @@ -1,529 +0,0 @@ -from __future__ import annotations - -import email -import logging -import random -import re -import time -import typing -from itertools import takewhile -from types import TracebackType - -from ..exceptions import ( - ConnectTimeoutError, - InvalidHeader, - MaxRetryError, - ProtocolError, - ProxyError, - ReadTimeoutError, - ResponseError, -) -from .util import reraise - -if typing.TYPE_CHECKING: - from ..connectionpool import ConnectionPool - from ..response import BaseHTTPResponse - -log = logging.getLogger(__name__) - - -# Data structure for representing the metadata of requests that result in a retry. -class RequestHistory(typing.NamedTuple): - method: str | None - url: str | None - error: Exception | None - status: int | None - redirect_location: str | None - - -class Retry: - """Retry configuration. - - Each retry attempt will create a new Retry object with updated values, so - they can be safely reused. - - Retries can be defined as a default for a pool: - - .. code-block:: python - - retries = Retry(connect=5, read=2, redirect=5) - http = PoolManager(retries=retries) - response = http.request("GET", "https://example.com/") - - Or per-request (which overrides the default for the pool): - - .. code-block:: python - - response = http.request("GET", "https://example.com/", retries=Retry(10)) - - Retries can be disabled by passing ``False``: - - .. code-block:: python - - response = http.request("GET", "https://example.com/", retries=False) - - Errors will be wrapped in :class:`~urllib3.exceptions.MaxRetryError` unless - retries are disabled, in which case the causing exception will be raised. - - :param int total: - Total number of retries to allow. Takes precedence over other counts. - - Set to ``None`` to remove this constraint and fall back on other - counts. - - Set to ``0`` to fail on the first retry. - - Set to ``False`` to disable and imply ``raise_on_redirect=False``. - - :param int connect: - How many connection-related errors to retry on. - - These are errors raised before the request is sent to the remote server, - which we assume has not triggered the server to process the request. - - Set to ``0`` to fail on the first retry of this type. - - :param int read: - How many times to retry on read errors. - - These errors are raised after the request was sent to the server, so the - request may have side-effects. - - Set to ``0`` to fail on the first retry of this type. - - :param int redirect: - How many redirects to perform. Limit this to avoid infinite redirect - loops. - - A redirect is a HTTP response with a status code 301, 302, 303, 307 or - 308. - - Set to ``0`` to fail on the first retry of this type. - - Set to ``False`` to disable and imply ``raise_on_redirect=False``. - - :param int status: - How many times to retry on bad status codes. - - These are retries made on responses, where status code matches - ``status_forcelist``. - - Set to ``0`` to fail on the first retry of this type. - - :param int other: - How many times to retry on other errors. - - Other errors are errors that are not connect, read, redirect or status errors. - These errors might be raised after the request was sent to the server, so the - request might have side-effects. - - Set to ``0`` to fail on the first retry of this type. - - If ``total`` is not set, it's a good idea to set this to 0 to account - for unexpected edge cases and avoid infinite retry loops. - - :param Collection allowed_methods: - Set of uppercased HTTP method verbs that we should retry on. - - By default, we only retry on methods which are considered to be - idempotent (multiple requests with the same parameters end with the - same state). See :attr:`Retry.DEFAULT_ALLOWED_METHODS`. - - Set to a ``None`` value to retry on any verb. - - :param Collection status_forcelist: - A set of integer HTTP status codes that we should force a retry on. - A retry is initiated if the request method is in ``allowed_methods`` - and the response status code is in ``status_forcelist``. - - By default, this is disabled with ``None``. - - :param float backoff_factor: - A backoff factor to apply between attempts after the second try - (most errors are resolved immediately by a second try without a - delay). urllib3 will sleep for:: - - {backoff factor} * (2 ** ({number of previous retries})) - - seconds. If `backoff_jitter` is non-zero, this sleep is extended by:: - - random.uniform(0, {backoff jitter}) - - seconds. For example, if the backoff_factor is 0.1, then :func:`Retry.sleep` will - sleep for [0.0s, 0.2s, 0.4s, 0.8s, ...] between retries. No backoff will ever - be longer than `backoff_max`. - - By default, backoff is disabled (factor set to 0). - - :param bool raise_on_redirect: Whether, if the number of redirects is - exhausted, to raise a MaxRetryError, or to return a response with a - response code in the 3xx range. - - :param bool raise_on_status: Similar meaning to ``raise_on_redirect``: - whether we should raise an exception, or return a response, - if status falls in ``status_forcelist`` range and retries have - been exhausted. - - :param tuple history: The history of the request encountered during - each call to :meth:`~Retry.increment`. The list is in the order - the requests occurred. Each list item is of class :class:`RequestHistory`. - - :param bool respect_retry_after_header: - Whether to respect Retry-After header on status codes defined as - :attr:`Retry.RETRY_AFTER_STATUS_CODES` or not. - - :param Collection remove_headers_on_redirect: - Sequence of headers to remove from the request when a response - indicating a redirect is returned before firing off the redirected - request. - """ - - #: Default methods to be used for ``allowed_methods`` - DEFAULT_ALLOWED_METHODS = frozenset( - ["HEAD", "GET", "PUT", "DELETE", "OPTIONS", "TRACE"] - ) - - #: Default status codes to be used for ``status_forcelist`` - RETRY_AFTER_STATUS_CODES = frozenset([413, 429, 503]) - - #: Default headers to be used for ``remove_headers_on_redirect`` - DEFAULT_REMOVE_HEADERS_ON_REDIRECT = frozenset(["Cookie", "Authorization"]) - - #: Default maximum backoff time. - DEFAULT_BACKOFF_MAX = 120 - - # Backward compatibility; assigned outside of the class. - DEFAULT: typing.ClassVar[Retry] - - def __init__( - self, - total: bool | int | None = 10, - connect: int | None = None, - read: int | None = None, - redirect: bool | int | None = None, - status: int | None = None, - other: int | None = None, - allowed_methods: typing.Collection[str] | None = DEFAULT_ALLOWED_METHODS, - status_forcelist: typing.Collection[int] | None = None, - backoff_factor: float = 0, - backoff_max: float = DEFAULT_BACKOFF_MAX, - raise_on_redirect: bool = True, - raise_on_status: bool = True, - history: tuple[RequestHistory, ...] | None = None, - respect_retry_after_header: bool = True, - remove_headers_on_redirect: typing.Collection[ - str - ] = DEFAULT_REMOVE_HEADERS_ON_REDIRECT, - backoff_jitter: float = 0.0, - ) -> None: - self.total = total - self.connect = connect - self.read = read - self.status = status - self.other = other - - if redirect is False or total is False: - redirect = 0 - raise_on_redirect = False - - self.redirect = redirect - self.status_forcelist = status_forcelist or set() - self.allowed_methods = allowed_methods - self.backoff_factor = backoff_factor - self.backoff_max = backoff_max - self.raise_on_redirect = raise_on_redirect - self.raise_on_status = raise_on_status - self.history = history or () - self.respect_retry_after_header = respect_retry_after_header - self.remove_headers_on_redirect = frozenset( - h.lower() for h in remove_headers_on_redirect - ) - self.backoff_jitter = backoff_jitter - - def new(self, **kw: typing.Any) -> Retry: - params = dict( - total=self.total, - connect=self.connect, - read=self.read, - redirect=self.redirect, - status=self.status, - other=self.other, - allowed_methods=self.allowed_methods, - status_forcelist=self.status_forcelist, - backoff_factor=self.backoff_factor, - backoff_max=self.backoff_max, - raise_on_redirect=self.raise_on_redirect, - raise_on_status=self.raise_on_status, - history=self.history, - remove_headers_on_redirect=self.remove_headers_on_redirect, - respect_retry_after_header=self.respect_retry_after_header, - backoff_jitter=self.backoff_jitter, - ) - - params.update(kw) - return type(self)(**params) # type: ignore[arg-type] - - @classmethod - def from_int( - cls, - retries: Retry | bool | int | None, - redirect: bool | int | None = True, - default: Retry | bool | int | None = None, - ) -> Retry: - """Backwards-compatibility for the old retries format.""" - if retries is None: - retries = default if default is not None else cls.DEFAULT - - if isinstance(retries, Retry): - return retries - - redirect = bool(redirect) and None - new_retries = cls(retries, redirect=redirect) - log.debug("Converted retries value: %r -> %r", retries, new_retries) - return new_retries - - def get_backoff_time(self) -> float: - """Formula for computing the current backoff - - :rtype: float - """ - # We want to consider only the last consecutive errors sequence (Ignore redirects). - consecutive_errors_len = len( - list( - takewhile(lambda x: x.redirect_location is None, reversed(self.history)) - ) - ) - if consecutive_errors_len <= 1: - return 0 - - backoff_value = self.backoff_factor * (2 ** (consecutive_errors_len - 1)) - if self.backoff_jitter != 0.0: - backoff_value += random.random() * self.backoff_jitter - return float(max(0, min(self.backoff_max, backoff_value))) - - def parse_retry_after(self, retry_after: str) -> float: - seconds: float - # Whitespace: https://tools.ietf.org/html/rfc7230#section-3.2.4 - if re.match(r"^\s*[0-9]+\s*$", retry_after): - seconds = int(retry_after) - else: - retry_date_tuple = email.utils.parsedate_tz(retry_after) - if retry_date_tuple is None: - raise InvalidHeader(f"Invalid Retry-After header: {retry_after}") - - retry_date = email.utils.mktime_tz(retry_date_tuple) - seconds = retry_date - time.time() - - seconds = max(seconds, 0) - - return seconds - - def get_retry_after(self, response: BaseHTTPResponse) -> float | None: - """Get the value of Retry-After in seconds.""" - - retry_after = response.headers.get("Retry-After") - - if retry_after is None: - return None - - return self.parse_retry_after(retry_after) - - def sleep_for_retry(self, response: BaseHTTPResponse) -> bool: - retry_after = self.get_retry_after(response) - if retry_after: - time.sleep(retry_after) - return True - - return False - - def _sleep_backoff(self) -> None: - backoff = self.get_backoff_time() - if backoff <= 0: - return - time.sleep(backoff) - - def sleep(self, response: BaseHTTPResponse | None = None) -> None: - """Sleep between retry attempts. - - This method will respect a server's ``Retry-After`` response header - and sleep the duration of the time requested. If that is not present, it - will use an exponential backoff. By default, the backoff factor is 0 and - this method will return immediately. - """ - - if self.respect_retry_after_header and response: - slept = self.sleep_for_retry(response) - if slept: - return - - self._sleep_backoff() - - def _is_connection_error(self, err: Exception) -> bool: - """Errors when we're fairly sure that the server did not receive the - request, so it should be safe to retry. - """ - if isinstance(err, ProxyError): - err = err.original_error - return isinstance(err, ConnectTimeoutError) - - def _is_read_error(self, err: Exception) -> bool: - """Errors that occur after the request has been started, so we should - assume that the server began processing it. - """ - return isinstance(err, (ReadTimeoutError, ProtocolError)) - - def _is_method_retryable(self, method: str) -> bool: - """Checks if a given HTTP method should be retried upon, depending if - it is included in the allowed_methods - """ - if self.allowed_methods and method.upper() not in self.allowed_methods: - return False - return True - - def is_retry( - self, method: str, status_code: int, has_retry_after: bool = False - ) -> bool: - """Is this method/status code retryable? (Based on allowlists and control - variables such as the number of total retries to allow, whether to - respect the Retry-After header, whether this header is present, and - whether the returned status code is on the list of status codes to - be retried upon on the presence of the aforementioned header) - """ - if not self._is_method_retryable(method): - return False - - if self.status_forcelist and status_code in self.status_forcelist: - return True - - return bool( - self.total - and self.respect_retry_after_header - and has_retry_after - and (status_code in self.RETRY_AFTER_STATUS_CODES) - ) - - def is_exhausted(self) -> bool: - """Are we out of retries?""" - retry_counts = [ - x - for x in ( - self.total, - self.connect, - self.read, - self.redirect, - self.status, - self.other, - ) - if x - ] - if not retry_counts: - return False - - return min(retry_counts) < 0 - - def increment( - self, - method: str | None = None, - url: str | None = None, - response: BaseHTTPResponse | None = None, - error: Exception | None = None, - _pool: ConnectionPool | None = None, - _stacktrace: TracebackType | None = None, - ) -> Retry: - """Return a new Retry object with incremented retry counters. - - :param response: A response object, or None, if the server did not - return a response. - :type response: :class:`~urllib3.response.BaseHTTPResponse` - :param Exception error: An error encountered during the request, or - None if the response was received successfully. - - :return: A new ``Retry`` object. - """ - if self.total is False and error: - # Disabled, indicate to re-raise the error. - raise reraise(type(error), error, _stacktrace) - - total = self.total - if total is not None: - total -= 1 - - connect = self.connect - read = self.read - redirect = self.redirect - status_count = self.status - other = self.other - cause = "unknown" - status = None - redirect_location = None - - if error and self._is_connection_error(error): - # Connect retry? - if connect is False: - raise reraise(type(error), error, _stacktrace) - elif connect is not None: - connect -= 1 - - elif error and self._is_read_error(error): - # Read retry? - if read is False or method is None or not self._is_method_retryable(method): - raise reraise(type(error), error, _stacktrace) - elif read is not None: - read -= 1 - - elif error: - # Other retry? - if other is not None: - other -= 1 - - elif response and response.get_redirect_location(): - # Redirect retry? - if redirect is not None: - redirect -= 1 - cause = "too many redirects" - response_redirect_location = response.get_redirect_location() - if response_redirect_location: - redirect_location = response_redirect_location - status = response.status - - else: - # Incrementing because of a server error like a 500 in - # status_forcelist and the given method is in the allowed_methods - cause = ResponseError.GENERIC_ERROR - if response and response.status: - if status_count is not None: - status_count -= 1 - cause = ResponseError.SPECIFIC_ERROR.format(status_code=response.status) - status = response.status - - history = self.history + ( - RequestHistory(method, url, error, status, redirect_location), - ) - - new_retry = self.new( - total=total, - connect=connect, - read=read, - redirect=redirect, - status=status_count, - other=other, - history=history, - ) - - if new_retry.is_exhausted(): - reason = error or ResponseError(cause) - raise MaxRetryError(_pool, url, reason) from reason # type: ignore[arg-type] - - log.debug("Incremented Retry for (url='%s'): %r", url, new_retry) - - return new_retry - - def __repr__(self) -> str: - return ( - f"{type(self).__name__}(total={self.total}, connect={self.connect}, " - f"read={self.read}, redirect={self.redirect}, status={self.status})" - ) - - -# For backwards compatibility (equivalent to pre-v1.9): -Retry.DEFAULT = Retry(3) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssl_.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssl_.py deleted file mode 100644 index e35e3940..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssl_.py +++ /dev/null @@ -1,515 +0,0 @@ -from __future__ import annotations - -import hmac -import os -import socket -import sys -import typing -import warnings -from binascii import unhexlify -from hashlib import md5, sha1, sha256 - -from ..exceptions import ProxySchemeUnsupported, SSLError -from .url import _BRACELESS_IPV6_ADDRZ_RE, _IPV4_RE - -SSLContext = None -SSLTransport = None -HAS_NEVER_CHECK_COMMON_NAME = False -IS_PYOPENSSL = False -IS_SECURETRANSPORT = False -ALPN_PROTOCOLS = ["http/1.1"] - -_TYPE_VERSION_INFO = typing.Tuple[int, int, int, str, int] - -# Maps the length of a digest to a possible hash function producing this digest -HASHFUNC_MAP = {32: md5, 40: sha1, 64: sha256} - - -def _is_bpo_43522_fixed( - implementation_name: str, - version_info: _TYPE_VERSION_INFO, - pypy_version_info: _TYPE_VERSION_INFO | None, -) -> bool: - """Return True for CPython 3.8.9+, 3.9.3+ or 3.10+ and PyPy 7.3.8+ where - setting SSLContext.hostname_checks_common_name to False works. - - Outside of CPython and PyPy we don't know which implementations work - or not so we conservatively use our hostname matching as we know that works - on all implementations. - - https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963 - https://foss.heptapod.net/pypy/pypy/-/issues/3539 - """ - if implementation_name == "pypy": - # https://foss.heptapod.net/pypy/pypy/-/issues/3129 - return pypy_version_info >= (7, 3, 8) and version_info >= (3, 8) # type: ignore[operator] - elif implementation_name == "cpython": - major_minor = version_info[:2] - micro = version_info[2] - return ( - (major_minor == (3, 8) and micro >= 9) - or (major_minor == (3, 9) and micro >= 3) - or major_minor >= (3, 10) - ) - else: # Defensive: - return False - - -def _is_has_never_check_common_name_reliable( - openssl_version: str, - openssl_version_number: int, - implementation_name: str, - version_info: _TYPE_VERSION_INFO, - pypy_version_info: _TYPE_VERSION_INFO | None, -) -> bool: - # As of May 2023, all released versions of LibreSSL fail to reject certificates with - # only common names, see https://github.com/urllib3/urllib3/pull/3024 - is_openssl = openssl_version.startswith("OpenSSL ") - # Before fixing OpenSSL issue #14579, the SSL_new() API was not copying hostflags - # like X509_CHECK_FLAG_NEVER_CHECK_SUBJECT, which tripped up CPython. - # https://github.com/openssl/openssl/issues/14579 - # This was released in OpenSSL 1.1.1l+ (>=0x101010cf) - is_openssl_issue_14579_fixed = openssl_version_number >= 0x101010CF - - return is_openssl and ( - is_openssl_issue_14579_fixed - or _is_bpo_43522_fixed(implementation_name, version_info, pypy_version_info) - ) - - -if typing.TYPE_CHECKING: - from ssl import VerifyMode - - from typing_extensions import Literal, TypedDict - - from .ssltransport import SSLTransport as SSLTransportType - - class _TYPE_PEER_CERT_RET_DICT(TypedDict, total=False): - subjectAltName: tuple[tuple[str, str], ...] - subject: tuple[tuple[tuple[str, str], ...], ...] - serialNumber: str - - -# Mapping from 'ssl.PROTOCOL_TLSX' to 'TLSVersion.X' -_SSL_VERSION_TO_TLS_VERSION: dict[int, int] = {} - -try: # Do we have ssl at all? - import ssl - from ssl import ( # type: ignore[assignment] - CERT_REQUIRED, - HAS_NEVER_CHECK_COMMON_NAME, - OP_NO_COMPRESSION, - OP_NO_TICKET, - OPENSSL_VERSION, - OPENSSL_VERSION_NUMBER, - PROTOCOL_TLS, - PROTOCOL_TLS_CLIENT, - OP_NO_SSLv2, - OP_NO_SSLv3, - SSLContext, - TLSVersion, - ) - - PROTOCOL_SSLv23 = PROTOCOL_TLS - - # Setting SSLContext.hostname_checks_common_name = False didn't work before CPython - # 3.8.9, 3.9.3, and 3.10 (but OK on PyPy) or OpenSSL 1.1.1l+ - if HAS_NEVER_CHECK_COMMON_NAME and not _is_has_never_check_common_name_reliable( - OPENSSL_VERSION, - OPENSSL_VERSION_NUMBER, - sys.implementation.name, - sys.version_info, - sys.pypy_version_info if sys.implementation.name == "pypy" else None, # type: ignore[attr-defined] - ): - HAS_NEVER_CHECK_COMMON_NAME = False - - # Need to be careful here in case old TLS versions get - # removed in future 'ssl' module implementations. - for attr in ("TLSv1", "TLSv1_1", "TLSv1_2"): - try: - _SSL_VERSION_TO_TLS_VERSION[getattr(ssl, f"PROTOCOL_{attr}")] = getattr( - TLSVersion, attr - ) - except AttributeError: # Defensive: - continue - - from .ssltransport import SSLTransport # type: ignore[assignment] -except ImportError: - OP_NO_COMPRESSION = 0x20000 # type: ignore[assignment] - OP_NO_TICKET = 0x4000 # type: ignore[assignment] - OP_NO_SSLv2 = 0x1000000 # type: ignore[assignment] - OP_NO_SSLv3 = 0x2000000 # type: ignore[assignment] - PROTOCOL_SSLv23 = PROTOCOL_TLS = 2 # type: ignore[assignment] - PROTOCOL_TLS_CLIENT = 16 # type: ignore[assignment] - - -_TYPE_PEER_CERT_RET = typing.Union["_TYPE_PEER_CERT_RET_DICT", bytes, None] - - -def assert_fingerprint(cert: bytes | None, fingerprint: str) -> None: - """ - Checks if given fingerprint matches the supplied certificate. - - :param cert: - Certificate as bytes object. - :param fingerprint: - Fingerprint as string of hexdigits, can be interspersed by colons. - """ - - if cert is None: - raise SSLError("No certificate for the peer.") - - fingerprint = fingerprint.replace(":", "").lower() - digest_length = len(fingerprint) - hashfunc = HASHFUNC_MAP.get(digest_length) - if not hashfunc: - raise SSLError(f"Fingerprint of invalid length: {fingerprint}") - - # We need encode() here for py32; works on py2 and p33. - fingerprint_bytes = unhexlify(fingerprint.encode()) - - cert_digest = hashfunc(cert).digest() - - if not hmac.compare_digest(cert_digest, fingerprint_bytes): - raise SSLError( - f'Fingerprints did not match. Expected "{fingerprint}", got "{cert_digest.hex()}"' - ) - - -def resolve_cert_reqs(candidate: None | int | str) -> VerifyMode: - """ - Resolves the argument to a numeric constant, which can be passed to - the wrap_socket function/method from the ssl module. - Defaults to :data:`ssl.CERT_REQUIRED`. - If given a string it is assumed to be the name of the constant in the - :mod:`ssl` module or its abbreviation. - (So you can specify `REQUIRED` instead of `CERT_REQUIRED`. - If it's neither `None` nor a string we assume it is already the numeric - constant which can directly be passed to wrap_socket. - """ - if candidate is None: - return CERT_REQUIRED - - if isinstance(candidate, str): - res = getattr(ssl, candidate, None) - if res is None: - res = getattr(ssl, "CERT_" + candidate) - return res # type: ignore[no-any-return] - - return candidate # type: ignore[return-value] - - -def resolve_ssl_version(candidate: None | int | str) -> int: - """ - like resolve_cert_reqs - """ - if candidate is None: - return PROTOCOL_TLS - - if isinstance(candidate, str): - res = getattr(ssl, candidate, None) - if res is None: - res = getattr(ssl, "PROTOCOL_" + candidate) - return typing.cast(int, res) - - return candidate - - -def create_urllib3_context( - ssl_version: int | None = None, - cert_reqs: int | None = None, - options: int | None = None, - ciphers: str | None = None, - ssl_minimum_version: int | None = None, - ssl_maximum_version: int | None = None, -) -> ssl.SSLContext: - """Creates and configures an :class:`ssl.SSLContext` instance for use with urllib3. - - :param ssl_version: - The desired protocol version to use. This will default to - PROTOCOL_SSLv23 which will negotiate the highest protocol that both - the server and your installation of OpenSSL support. - - This parameter is deprecated instead use 'ssl_minimum_version'. - :param ssl_minimum_version: - The minimum version of TLS to be used. Use the 'ssl.TLSVersion' enum for specifying the value. - :param ssl_maximum_version: - The maximum version of TLS to be used. Use the 'ssl.TLSVersion' enum for specifying the value. - Not recommended to set to anything other than 'ssl.TLSVersion.MAXIMUM_SUPPORTED' which is the - default value. - :param cert_reqs: - Whether to require the certificate verification. This defaults to - ``ssl.CERT_REQUIRED``. - :param options: - Specific OpenSSL options. These default to ``ssl.OP_NO_SSLv2``, - ``ssl.OP_NO_SSLv3``, ``ssl.OP_NO_COMPRESSION``, and ``ssl.OP_NO_TICKET``. - :param ciphers: - Which cipher suites to allow the server to select. Defaults to either system configured - ciphers if OpenSSL 1.1.1+, otherwise uses a secure default set of ciphers. - :returns: - Constructed SSLContext object with specified options - :rtype: SSLContext - """ - if SSLContext is None: - raise TypeError("Can't create an SSLContext object without an ssl module") - - # This means 'ssl_version' was specified as an exact value. - if ssl_version not in (None, PROTOCOL_TLS, PROTOCOL_TLS_CLIENT): - # Disallow setting 'ssl_version' and 'ssl_minimum|maximum_version' - # to avoid conflicts. - if ssl_minimum_version is not None or ssl_maximum_version is not None: - raise ValueError( - "Can't specify both 'ssl_version' and either " - "'ssl_minimum_version' or 'ssl_maximum_version'" - ) - - # 'ssl_version' is deprecated and will be removed in the future. - else: - # Use 'ssl_minimum_version' and 'ssl_maximum_version' instead. - ssl_minimum_version = _SSL_VERSION_TO_TLS_VERSION.get( - ssl_version, TLSVersion.MINIMUM_SUPPORTED - ) - ssl_maximum_version = _SSL_VERSION_TO_TLS_VERSION.get( - ssl_version, TLSVersion.MAXIMUM_SUPPORTED - ) - - # This warning message is pushing users to use 'ssl_minimum_version' - # instead of both min/max. Best practice is to only set the minimum version and - # keep the maximum version to be it's default value: 'TLSVersion.MAXIMUM_SUPPORTED' - warnings.warn( - "'ssl_version' option is deprecated and will be " - "removed in urllib3 v2.1.0. Instead use 'ssl_minimum_version'", - category=DeprecationWarning, - stacklevel=2, - ) - - # PROTOCOL_TLS is deprecated in Python 3.10 so we always use PROTOCOL_TLS_CLIENT - context = SSLContext(PROTOCOL_TLS_CLIENT) - - if ssl_minimum_version is not None: - context.minimum_version = ssl_minimum_version - else: # Python <3.10 defaults to 'MINIMUM_SUPPORTED' so explicitly set TLSv1.2 here - context.minimum_version = TLSVersion.TLSv1_2 - - if ssl_maximum_version is not None: - context.maximum_version = ssl_maximum_version - - # Unless we're given ciphers defer to either system ciphers in - # the case of OpenSSL 1.1.1+ or use our own secure default ciphers. - if ciphers: - context.set_ciphers(ciphers) - - # Setting the default here, as we may have no ssl module on import - cert_reqs = ssl.CERT_REQUIRED if cert_reqs is None else cert_reqs - - if options is None: - options = 0 - # SSLv2 is easily broken and is considered harmful and dangerous - options |= OP_NO_SSLv2 - # SSLv3 has several problems and is now dangerous - options |= OP_NO_SSLv3 - # Disable compression to prevent CRIME attacks for OpenSSL 1.0+ - # (issue #309) - options |= OP_NO_COMPRESSION - # TLSv1.2 only. Unless set explicitly, do not request tickets. - # This may save some bandwidth on wire, and although the ticket is encrypted, - # there is a risk associated with it being on wire, - # if the server is not rotating its ticketing keys properly. - options |= OP_NO_TICKET - - context.options |= options - - # Enable post-handshake authentication for TLS 1.3, see GH #1634. PHA is - # necessary for conditional client cert authentication with TLS 1.3. - # The attribute is None for OpenSSL <= 1.1.0 or does not exist in older - # versions of Python. We only enable on Python 3.7.4+ or if certificate - # verification is enabled to work around Python issue #37428 - # See: https://bugs.python.org/issue37428 - if (cert_reqs == ssl.CERT_REQUIRED or sys.version_info >= (3, 7, 4)) and getattr( - context, "post_handshake_auth", None - ) is not None: - context.post_handshake_auth = True - - # The order of the below lines setting verify_mode and check_hostname - # matter due to safe-guards SSLContext has to prevent an SSLContext with - # check_hostname=True, verify_mode=NONE/OPTIONAL. - # We always set 'check_hostname=False' for pyOpenSSL so we rely on our own - # 'ssl.match_hostname()' implementation. - if cert_reqs == ssl.CERT_REQUIRED and not IS_PYOPENSSL: - context.verify_mode = cert_reqs - context.check_hostname = True - else: - context.check_hostname = False - context.verify_mode = cert_reqs - - try: - context.hostname_checks_common_name = False - except AttributeError: # Defensive: for CPython < 3.8.9 and 3.9.3; for PyPy < 7.3.8 - pass - - # Enable logging of TLS session keys via defacto standard environment variable - # 'SSLKEYLOGFILE', if the feature is available (Python 3.8+). Skip empty values. - if hasattr(context, "keylog_filename"): - sslkeylogfile = os.environ.get("SSLKEYLOGFILE") - if sslkeylogfile: - context.keylog_filename = sslkeylogfile - - return context - - -@typing.overload -def ssl_wrap_socket( - sock: socket.socket, - keyfile: str | None = ..., - certfile: str | None = ..., - cert_reqs: int | None = ..., - ca_certs: str | None = ..., - server_hostname: str | None = ..., - ssl_version: int | None = ..., - ciphers: str | None = ..., - ssl_context: ssl.SSLContext | None = ..., - ca_cert_dir: str | None = ..., - key_password: str | None = ..., - ca_cert_data: None | str | bytes = ..., - tls_in_tls: Literal[False] = ..., -) -> ssl.SSLSocket: - ... - - -@typing.overload -def ssl_wrap_socket( - sock: socket.socket, - keyfile: str | None = ..., - certfile: str | None = ..., - cert_reqs: int | None = ..., - ca_certs: str | None = ..., - server_hostname: str | None = ..., - ssl_version: int | None = ..., - ciphers: str | None = ..., - ssl_context: ssl.SSLContext | None = ..., - ca_cert_dir: str | None = ..., - key_password: str | None = ..., - ca_cert_data: None | str | bytes = ..., - tls_in_tls: bool = ..., -) -> ssl.SSLSocket | SSLTransportType: - ... - - -def ssl_wrap_socket( - sock: socket.socket, - keyfile: str | None = None, - certfile: str | None = None, - cert_reqs: int | None = None, - ca_certs: str | None = None, - server_hostname: str | None = None, - ssl_version: int | None = None, - ciphers: str | None = None, - ssl_context: ssl.SSLContext | None = None, - ca_cert_dir: str | None = None, - key_password: str | None = None, - ca_cert_data: None | str | bytes = None, - tls_in_tls: bool = False, -) -> ssl.SSLSocket | SSLTransportType: - """ - All arguments except for server_hostname, ssl_context, tls_in_tls, ca_cert_data and - ca_cert_dir have the same meaning as they do when using - :func:`ssl.create_default_context`, :meth:`ssl.SSLContext.load_cert_chain`, - :meth:`ssl.SSLContext.set_ciphers` and :meth:`ssl.SSLContext.wrap_socket`. - - :param server_hostname: - When SNI is supported, the expected hostname of the certificate - :param ssl_context: - A pre-made :class:`SSLContext` object. If none is provided, one will - be created using :func:`create_urllib3_context`. - :param ciphers: - A string of ciphers we wish the client to support. - :param ca_cert_dir: - A directory containing CA certificates in multiple separate files, as - supported by OpenSSL's -CApath flag or the capath argument to - SSLContext.load_verify_locations(). - :param key_password: - Optional password if the keyfile is encrypted. - :param ca_cert_data: - Optional string containing CA certificates in PEM format suitable for - passing as the cadata parameter to SSLContext.load_verify_locations() - :param tls_in_tls: - Use SSLTransport to wrap the existing socket. - """ - context = ssl_context - if context is None: - # Note: This branch of code and all the variables in it are only used in tests. - # We should consider deprecating and removing this code. - context = create_urllib3_context(ssl_version, cert_reqs, ciphers=ciphers) - - if ca_certs or ca_cert_dir or ca_cert_data: - try: - context.load_verify_locations(ca_certs, ca_cert_dir, ca_cert_data) - except OSError as e: - raise SSLError(e) from e - - elif ssl_context is None and hasattr(context, "load_default_certs"): - # try to load OS default certs; works well on Windows. - context.load_default_certs() - - # Attempt to detect if we get the goofy behavior of the - # keyfile being encrypted and OpenSSL asking for the - # passphrase via the terminal and instead error out. - if keyfile and key_password is None and _is_key_file_encrypted(keyfile): - raise SSLError("Client private key is encrypted, password is required") - - if certfile: - if key_password is None: - context.load_cert_chain(certfile, keyfile) - else: - context.load_cert_chain(certfile, keyfile, key_password) - - try: - context.set_alpn_protocols(ALPN_PROTOCOLS) - except NotImplementedError: # Defensive: in CI, we always have set_alpn_protocols - pass - - ssl_sock = _ssl_wrap_socket_impl(sock, context, tls_in_tls, server_hostname) - return ssl_sock - - -def is_ipaddress(hostname: str | bytes) -> bool: - """Detects whether the hostname given is an IPv4 or IPv6 address. - Also detects IPv6 addresses with Zone IDs. - - :param str hostname: Hostname to examine. - :return: True if the hostname is an IP address, False otherwise. - """ - if isinstance(hostname, bytes): - # IDN A-label bytes are ASCII compatible. - hostname = hostname.decode("ascii") - return bool(_IPV4_RE.match(hostname) or _BRACELESS_IPV6_ADDRZ_RE.match(hostname)) - - -def _is_key_file_encrypted(key_file: str) -> bool: - """Detects if a key file is encrypted or not.""" - with open(key_file) as f: - for line in f: - # Look for Proc-Type: 4,ENCRYPTED - if "ENCRYPTED" in line: - return True - - return False - - -def _ssl_wrap_socket_impl( - sock: socket.socket, - ssl_context: ssl.SSLContext, - tls_in_tls: bool, - server_hostname: str | None = None, -) -> ssl.SSLSocket | SSLTransportType: - if tls_in_tls: - if not SSLTransport: - # Import error, ssl is not available. - raise ProxySchemeUnsupported( - "TLS in TLS requires support for the 'ssl' module" - ) - - SSLTransport._validate_ssl_context_for_tls_in_tls(ssl_context) - return SSLTransport(sock, ssl_context, server_hostname) - - return ssl_context.wrap_socket(sock, server_hostname=server_hostname) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssl_match_hostname.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssl_match_hostname.py deleted file mode 100644 index 453cfd42..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssl_match_hostname.py +++ /dev/null @@ -1,159 +0,0 @@ -"""The match_hostname() function from Python 3.5, essential when using SSL.""" - -# Note: This file is under the PSF license as the code comes from the python -# stdlib. http://docs.python.org/3/license.html -# It is modified to remove commonName support. - -from __future__ import annotations - -import ipaddress -import re -import typing -from ipaddress import IPv4Address, IPv6Address - -if typing.TYPE_CHECKING: - from .ssl_ import _TYPE_PEER_CERT_RET_DICT - -__version__ = "3.5.0.1" - - -class CertificateError(ValueError): - pass - - -def _dnsname_match( - dn: typing.Any, hostname: str, max_wildcards: int = 1 -) -> typing.Match[str] | None | bool: - """Matching according to RFC 6125, section 6.4.3 - - http://tools.ietf.org/html/rfc6125#section-6.4.3 - """ - pats = [] - if not dn: - return False - - # Ported from python3-syntax: - # leftmost, *remainder = dn.split(r'.') - parts = dn.split(r".") - leftmost = parts[0] - remainder = parts[1:] - - wildcards = leftmost.count("*") - if wildcards > max_wildcards: - # Issue #17980: avoid denials of service by refusing more - # than one wildcard per fragment. A survey of established - # policy among SSL implementations showed it to be a - # reasonable choice. - raise CertificateError( - "too many wildcards in certificate DNS name: " + repr(dn) - ) - - # speed up common case w/o wildcards - if not wildcards: - return bool(dn.lower() == hostname.lower()) - - # RFC 6125, section 6.4.3, subitem 1. - # The client SHOULD NOT attempt to match a presented identifier in which - # the wildcard character comprises a label other than the left-most label. - if leftmost == "*": - # When '*' is a fragment by itself, it matches a non-empty dotless - # fragment. - pats.append("[^.]+") - elif leftmost.startswith("xn--") or hostname.startswith("xn--"): - # RFC 6125, section 6.4.3, subitem 3. - # The client SHOULD NOT attempt to match a presented identifier - # where the wildcard character is embedded within an A-label or - # U-label of an internationalized domain name. - pats.append(re.escape(leftmost)) - else: - # Otherwise, '*' matches any dotless string, e.g. www* - pats.append(re.escape(leftmost).replace(r"\*", "[^.]*")) - - # add the remaining fragments, ignore any wildcards - for frag in remainder: - pats.append(re.escape(frag)) - - pat = re.compile(r"\A" + r"\.".join(pats) + r"\Z", re.IGNORECASE) - return pat.match(hostname) - - -def _ipaddress_match(ipname: str, host_ip: IPv4Address | IPv6Address) -> bool: - """Exact matching of IP addresses. - - RFC 9110 section 4.3.5: "A reference identity of IP-ID contains the decoded - bytes of the IP address. An IP version 4 address is 4 octets, and an IP - version 6 address is 16 octets. [...] A reference identity of type IP-ID - matches if the address is identical to an iPAddress value of the - subjectAltName extension of the certificate." - """ - # OpenSSL may add a trailing newline to a subjectAltName's IP address - # Divergence from upstream: ipaddress can't handle byte str - ip = ipaddress.ip_address(ipname.rstrip()) - return bool(ip.packed == host_ip.packed) - - -def match_hostname( - cert: _TYPE_PEER_CERT_RET_DICT | None, - hostname: str, - hostname_checks_common_name: bool = False, -) -> None: - """Verify that *cert* (in decoded format as returned by - SSLSocket.getpeercert()) matches the *hostname*. RFC 2818 and RFC 6125 - rules are followed, but IP addresses are not accepted for *hostname*. - - CertificateError is raised on failure. On success, the function - returns nothing. - """ - if not cert: - raise ValueError( - "empty or no certificate, match_hostname needs a " - "SSL socket or SSL context with either " - "CERT_OPTIONAL or CERT_REQUIRED" - ) - try: - # Divergence from upstream: ipaddress can't handle byte str - # - # The ipaddress module shipped with Python < 3.9 does not support - # scoped IPv6 addresses so we unconditionally strip the Zone IDs for - # now. Once we drop support for Python 3.9 we can remove this branch. - if "%" in hostname: - host_ip = ipaddress.ip_address(hostname[: hostname.rfind("%")]) - else: - host_ip = ipaddress.ip_address(hostname) - - except ValueError: - # Not an IP address (common case) - host_ip = None - dnsnames = [] - san: tuple[tuple[str, str], ...] = cert.get("subjectAltName", ()) - key: str - value: str - for key, value in san: - if key == "DNS": - if host_ip is None and _dnsname_match(value, hostname): - return - dnsnames.append(value) - elif key == "IP Address": - if host_ip is not None and _ipaddress_match(value, host_ip): - return - dnsnames.append(value) - - # We only check 'commonName' if it's enabled and we're not verifying - # an IP address. IP addresses aren't valid within 'commonName'. - if hostname_checks_common_name and host_ip is None and not dnsnames: - for sub in cert.get("subject", ()): - for key, value in sub: - if key == "commonName": - if _dnsname_match(value, hostname): - return - dnsnames.append(value) - - if len(dnsnames) > 1: - raise CertificateError( - "hostname %r " - "doesn't match either of %s" % (hostname, ", ".join(map(repr, dnsnames))) - ) - elif len(dnsnames) == 1: - raise CertificateError(f"hostname {hostname!r} doesn't match {dnsnames[0]!r}") - else: - raise CertificateError("no appropriate subjectAltName fields were found") diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssltransport.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssltransport.py deleted file mode 100644 index 5ec86473..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/ssltransport.py +++ /dev/null @@ -1,280 +0,0 @@ -from __future__ import annotations - -import io -import socket -import ssl -import typing - -from ..exceptions import ProxySchemeUnsupported - -if typing.TYPE_CHECKING: - from typing_extensions import Literal - - from .ssl_ import _TYPE_PEER_CERT_RET, _TYPE_PEER_CERT_RET_DICT - - -_SelfT = typing.TypeVar("_SelfT", bound="SSLTransport") -_WriteBuffer = typing.Union[bytearray, memoryview] -_ReturnValue = typing.TypeVar("_ReturnValue") - -SSL_BLOCKSIZE = 16384 - - -class SSLTransport: - """ - The SSLTransport wraps an existing socket and establishes an SSL connection. - - Contrary to Python's implementation of SSLSocket, it allows you to chain - multiple TLS connections together. It's particularly useful if you need to - implement TLS within TLS. - - The class supports most of the socket API operations. - """ - - @staticmethod - def _validate_ssl_context_for_tls_in_tls(ssl_context: ssl.SSLContext) -> None: - """ - Raises a ProxySchemeUnsupported if the provided ssl_context can't be used - for TLS in TLS. - - The only requirement is that the ssl_context provides the 'wrap_bio' - methods. - """ - - if not hasattr(ssl_context, "wrap_bio"): - raise ProxySchemeUnsupported( - "TLS in TLS requires SSLContext.wrap_bio() which isn't " - "available on non-native SSLContext" - ) - - def __init__( - self, - socket: socket.socket, - ssl_context: ssl.SSLContext, - server_hostname: str | None = None, - suppress_ragged_eofs: bool = True, - ) -> None: - """ - Create an SSLTransport around socket using the provided ssl_context. - """ - self.incoming = ssl.MemoryBIO() - self.outgoing = ssl.MemoryBIO() - - self.suppress_ragged_eofs = suppress_ragged_eofs - self.socket = socket - - self.sslobj = ssl_context.wrap_bio( - self.incoming, self.outgoing, server_hostname=server_hostname - ) - - # Perform initial handshake. - self._ssl_io_loop(self.sslobj.do_handshake) - - def __enter__(self: _SelfT) -> _SelfT: - return self - - def __exit__(self, *_: typing.Any) -> None: - self.close() - - def fileno(self) -> int: - return self.socket.fileno() - - def read(self, len: int = 1024, buffer: typing.Any | None = None) -> int | bytes: - return self._wrap_ssl_read(len, buffer) - - def recv(self, buflen: int = 1024, flags: int = 0) -> int | bytes: - if flags != 0: - raise ValueError("non-zero flags not allowed in calls to recv") - return self._wrap_ssl_read(buflen) - - def recv_into( - self, - buffer: _WriteBuffer, - nbytes: int | None = None, - flags: int = 0, - ) -> None | int | bytes: - if flags != 0: - raise ValueError("non-zero flags not allowed in calls to recv_into") - if nbytes is None: - nbytes = len(buffer) - return self.read(nbytes, buffer) - - def sendall(self, data: bytes, flags: int = 0) -> None: - if flags != 0: - raise ValueError("non-zero flags not allowed in calls to sendall") - count = 0 - with memoryview(data) as view, view.cast("B") as byte_view: - amount = len(byte_view) - while count < amount: - v = self.send(byte_view[count:]) - count += v - - def send(self, data: bytes, flags: int = 0) -> int: - if flags != 0: - raise ValueError("non-zero flags not allowed in calls to send") - return self._ssl_io_loop(self.sslobj.write, data) - - def makefile( - self, - mode: str, - buffering: int | None = None, - *, - encoding: str | None = None, - errors: str | None = None, - newline: str | None = None, - ) -> typing.BinaryIO | typing.TextIO | socket.SocketIO: - """ - Python's httpclient uses makefile and buffered io when reading HTTP - messages and we need to support it. - - This is unfortunately a copy and paste of socket.py makefile with small - changes to point to the socket directly. - """ - if not set(mode) <= {"r", "w", "b"}: - raise ValueError(f"invalid mode {mode!r} (only r, w, b allowed)") - - writing = "w" in mode - reading = "r" in mode or not writing - assert reading or writing - binary = "b" in mode - rawmode = "" - if reading: - rawmode += "r" - if writing: - rawmode += "w" - raw = socket.SocketIO(self, rawmode) # type: ignore[arg-type] - self.socket._io_refs += 1 # type: ignore[attr-defined] - if buffering is None: - buffering = -1 - if buffering < 0: - buffering = io.DEFAULT_BUFFER_SIZE - if buffering == 0: - if not binary: - raise ValueError("unbuffered streams must be binary") - return raw - buffer: typing.BinaryIO - if reading and writing: - buffer = io.BufferedRWPair(raw, raw, buffering) # type: ignore[assignment] - elif reading: - buffer = io.BufferedReader(raw, buffering) - else: - assert writing - buffer = io.BufferedWriter(raw, buffering) - if binary: - return buffer - text = io.TextIOWrapper(buffer, encoding, errors, newline) - text.mode = mode # type: ignore[misc] - return text - - def unwrap(self) -> None: - self._ssl_io_loop(self.sslobj.unwrap) - - def close(self) -> None: - self.socket.close() - - @typing.overload - def getpeercert( - self, binary_form: Literal[False] = ... - ) -> _TYPE_PEER_CERT_RET_DICT | None: - ... - - @typing.overload - def getpeercert(self, binary_form: Literal[True]) -> bytes | None: - ... - - def getpeercert(self, binary_form: bool = False) -> _TYPE_PEER_CERT_RET: - return self.sslobj.getpeercert(binary_form) # type: ignore[return-value] - - def version(self) -> str | None: - return self.sslobj.version() - - def cipher(self) -> tuple[str, str, int] | None: - return self.sslobj.cipher() - - def selected_alpn_protocol(self) -> str | None: - return self.sslobj.selected_alpn_protocol() - - def selected_npn_protocol(self) -> str | None: - return self.sslobj.selected_npn_protocol() - - def shared_ciphers(self) -> list[tuple[str, str, int]] | None: - return self.sslobj.shared_ciphers() - - def compression(self) -> str | None: - return self.sslobj.compression() - - def settimeout(self, value: float | None) -> None: - self.socket.settimeout(value) - - def gettimeout(self) -> float | None: - return self.socket.gettimeout() - - def _decref_socketios(self) -> None: - self.socket._decref_socketios() # type: ignore[attr-defined] - - def _wrap_ssl_read(self, len: int, buffer: bytearray | None = None) -> int | bytes: - try: - return self._ssl_io_loop(self.sslobj.read, len, buffer) - except ssl.SSLError as e: - if e.errno == ssl.SSL_ERROR_EOF and self.suppress_ragged_eofs: - return 0 # eof, return 0. - else: - raise - - # func is sslobj.do_handshake or sslobj.unwrap - @typing.overload - def _ssl_io_loop(self, func: typing.Callable[[], None]) -> None: - ... - - # func is sslobj.write, arg1 is data - @typing.overload - def _ssl_io_loop(self, func: typing.Callable[[bytes], int], arg1: bytes) -> int: - ... - - # func is sslobj.read, arg1 is len, arg2 is buffer - @typing.overload - def _ssl_io_loop( - self, - func: typing.Callable[[int, bytearray | None], bytes], - arg1: int, - arg2: bytearray | None, - ) -> bytes: - ... - - def _ssl_io_loop( - self, - func: typing.Callable[..., _ReturnValue], - arg1: None | bytes | int = None, - arg2: bytearray | None = None, - ) -> _ReturnValue: - """Performs an I/O loop between incoming/outgoing and the socket.""" - should_loop = True - ret = None - - while should_loop: - errno = None - try: - if arg1 is None and arg2 is None: - ret = func() - elif arg2 is None: - ret = func(arg1) - else: - ret = func(arg1, arg2) - except ssl.SSLError as e: - if e.errno not in (ssl.SSL_ERROR_WANT_READ, ssl.SSL_ERROR_WANT_WRITE): - # WANT_READ, and WANT_WRITE are expected, others are not. - raise e - errno = e.errno - - buf = self.outgoing.read() - self.socket.sendall(buf) - - if errno is None: - should_loop = False - elif errno == ssl.SSL_ERROR_WANT_READ: - buf = self.socket.recv(SSL_BLOCKSIZE) - if buf: - self.incoming.write(buf) - else: - self.incoming.write_eof() - return typing.cast(_ReturnValue, ret) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/timeout.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/timeout.py deleted file mode 100644 index ec090f69..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/timeout.py +++ /dev/null @@ -1,279 +0,0 @@ -from __future__ import annotations - -import time -import typing -from enum import Enum -from socket import getdefaulttimeout - -from ..exceptions import TimeoutStateError - -if typing.TYPE_CHECKING: - from typing_extensions import Final - - -class _TYPE_DEFAULT(Enum): - # This value should never be passed to socket.settimeout() so for safety we use a -1. - # socket.settimout() raises a ValueError for negative values. - token = -1 - - -_DEFAULT_TIMEOUT: Final[_TYPE_DEFAULT] = _TYPE_DEFAULT.token - -_TYPE_TIMEOUT = typing.Optional[typing.Union[float, _TYPE_DEFAULT]] - - -class Timeout: - """Timeout configuration. - - Timeouts can be defined as a default for a pool: - - .. code-block:: python - - import urllib3 - - timeout = urllib3.util.Timeout(connect=2.0, read=7.0) - - http = urllib3.PoolManager(timeout=timeout) - - resp = http.request("GET", "https://example.com/") - - print(resp.status) - - Or per-request (which overrides the default for the pool): - - .. code-block:: python - - response = http.request("GET", "https://example.com/", timeout=Timeout(10)) - - Timeouts can be disabled by setting all the parameters to ``None``: - - .. code-block:: python - - no_timeout = Timeout(connect=None, read=None) - response = http.request("GET", "https://example.com/", timeout=no_timeout) - - - :param total: - This combines the connect and read timeouts into one; the read timeout - will be set to the time leftover from the connect attempt. In the - event that both a connect timeout and a total are specified, or a read - timeout and a total are specified, the shorter timeout will be applied. - - Defaults to None. - - :type total: int, float, or None - - :param connect: - The maximum amount of time (in seconds) to wait for a connection - attempt to a server to succeed. Omitting the parameter will default the - connect timeout to the system default, probably `the global default - timeout in socket.py - `_. - None will set an infinite timeout for connection attempts. - - :type connect: int, float, or None - - :param read: - The maximum amount of time (in seconds) to wait between consecutive - read operations for a response from the server. Omitting the parameter - will default the read timeout to the system default, probably `the - global default timeout in socket.py - `_. - None will set an infinite timeout. - - :type read: int, float, or None - - .. note:: - - Many factors can affect the total amount of time for urllib3 to return - an HTTP response. - - For example, Python's DNS resolver does not obey the timeout specified - on the socket. Other factors that can affect total request time include - high CPU load, high swap, the program running at a low priority level, - or other behaviors. - - In addition, the read and total timeouts only measure the time between - read operations on the socket connecting the client and the server, - not the total amount of time for the request to return a complete - response. For most requests, the timeout is raised because the server - has not sent the first byte in the specified time. This is not always - the case; if a server streams one byte every fifteen seconds, a timeout - of 20 seconds will not trigger, even though the request will take - several minutes to complete. - - If your goal is to cut off any request after a set amount of wall clock - time, consider having a second "watcher" thread to cut off a slow - request. - """ - - #: A sentinel object representing the default timeout value - DEFAULT_TIMEOUT: _TYPE_TIMEOUT = _DEFAULT_TIMEOUT - - def __init__( - self, - total: _TYPE_TIMEOUT = None, - connect: _TYPE_TIMEOUT = _DEFAULT_TIMEOUT, - read: _TYPE_TIMEOUT = _DEFAULT_TIMEOUT, - ) -> None: - self._connect = self._validate_timeout(connect, "connect") - self._read = self._validate_timeout(read, "read") - self.total = self._validate_timeout(total, "total") - self._start_connect: float | None = None - - def __repr__(self) -> str: - return f"{type(self).__name__}(connect={self._connect!r}, read={self._read!r}, total={self.total!r})" - - # __str__ provided for backwards compatibility - __str__ = __repr__ - - @staticmethod - def resolve_default_timeout(timeout: _TYPE_TIMEOUT) -> float | None: - return getdefaulttimeout() if timeout is _DEFAULT_TIMEOUT else timeout - - @classmethod - def _validate_timeout(cls, value: _TYPE_TIMEOUT, name: str) -> _TYPE_TIMEOUT: - """Check that a timeout attribute is valid. - - :param value: The timeout value to validate - :param name: The name of the timeout attribute to validate. This is - used to specify in error messages. - :return: The validated and casted version of the given value. - :raises ValueError: If it is a numeric value less than or equal to - zero, or the type is not an integer, float, or None. - """ - if value is None or value is _DEFAULT_TIMEOUT: - return value - - if isinstance(value, bool): - raise ValueError( - "Timeout cannot be a boolean value. It must " - "be an int, float or None." - ) - try: - float(value) - except (TypeError, ValueError): - raise ValueError( - "Timeout value %s was %s, but it must be an " - "int, float or None." % (name, value) - ) from None - - try: - if value <= 0: - raise ValueError( - "Attempted to set %s timeout to %s, but the " - "timeout cannot be set to a value less " - "than or equal to 0." % (name, value) - ) - except TypeError: - raise ValueError( - "Timeout value %s was %s, but it must be an " - "int, float or None." % (name, value) - ) from None - - return value - - @classmethod - def from_float(cls, timeout: _TYPE_TIMEOUT) -> Timeout: - """Create a new Timeout from a legacy timeout value. - - The timeout value used by httplib.py sets the same timeout on the - connect(), and recv() socket requests. This creates a :class:`Timeout` - object that sets the individual timeouts to the ``timeout`` value - passed to this function. - - :param timeout: The legacy timeout value. - :type timeout: integer, float, :attr:`urllib3.util.Timeout.DEFAULT_TIMEOUT`, or None - :return: Timeout object - :rtype: :class:`Timeout` - """ - return Timeout(read=timeout, connect=timeout) - - def clone(self) -> Timeout: - """Create a copy of the timeout object - - Timeout properties are stored per-pool but each request needs a fresh - Timeout object to ensure each one has its own start/stop configured. - - :return: a copy of the timeout object - :rtype: :class:`Timeout` - """ - # We can't use copy.deepcopy because that will also create a new object - # for _GLOBAL_DEFAULT_TIMEOUT, which socket.py uses as a sentinel to - # detect the user default. - return Timeout(connect=self._connect, read=self._read, total=self.total) - - def start_connect(self) -> float: - """Start the timeout clock, used during a connect() attempt - - :raises urllib3.exceptions.TimeoutStateError: if you attempt - to start a timer that has been started already. - """ - if self._start_connect is not None: - raise TimeoutStateError("Timeout timer has already been started.") - self._start_connect = time.monotonic() - return self._start_connect - - def get_connect_duration(self) -> float: - """Gets the time elapsed since the call to :meth:`start_connect`. - - :return: Elapsed time in seconds. - :rtype: float - :raises urllib3.exceptions.TimeoutStateError: if you attempt - to get duration for a timer that hasn't been started. - """ - if self._start_connect is None: - raise TimeoutStateError( - "Can't get connect duration for timer that has not started." - ) - return time.monotonic() - self._start_connect - - @property - def connect_timeout(self) -> _TYPE_TIMEOUT: - """Get the value to use when setting a connection timeout. - - This will be a positive float or integer, the value None - (never timeout), or the default system timeout. - - :return: Connect timeout. - :rtype: int, float, :attr:`Timeout.DEFAULT_TIMEOUT` or None - """ - if self.total is None: - return self._connect - - if self._connect is None or self._connect is _DEFAULT_TIMEOUT: - return self.total - - return min(self._connect, self.total) # type: ignore[type-var] - - @property - def read_timeout(self) -> float | None: - """Get the value for the read timeout. - - This assumes some time has elapsed in the connection timeout and - computes the read timeout appropriately. - - If self.total is set, the read timeout is dependent on the amount of - time taken by the connect timeout. If the connection time has not been - established, a :exc:`~urllib3.exceptions.TimeoutStateError` will be - raised. - - :return: Value to use for the read timeout. - :rtype: int, float or None - :raises urllib3.exceptions.TimeoutStateError: If :meth:`start_connect` - has not yet been called on this object. - """ - if ( - self.total is not None - and self.total is not _DEFAULT_TIMEOUT - and self._read is not None - and self._read is not _DEFAULT_TIMEOUT - ): - # In case the connect timeout has not yet been established. - if self._start_connect is None: - return self._read - return max(0, min(self.total - self.get_connect_duration(), self._read)) - elif self.total is not None and self.total is not _DEFAULT_TIMEOUT: - return max(0, self.total - self.get_connect_duration()) - else: - return self.resolve_default_timeout(self._read) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/url.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/url.py deleted file mode 100644 index d53ea932..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/url.py +++ /dev/null @@ -1,471 +0,0 @@ -from __future__ import annotations - -import re -import typing - -from ..exceptions import LocationParseError -from .util import to_str - -# We only want to normalize urls with an HTTP(S) scheme. -# urllib3 infers URLs without a scheme (None) to be http. -_NORMALIZABLE_SCHEMES = ("http", "https", None) - -# Almost all of these patterns were derived from the -# 'rfc3986' module: https://github.com/python-hyper/rfc3986 -_PERCENT_RE = re.compile(r"%[a-fA-F0-9]{2}") -_SCHEME_RE = re.compile(r"^(?:[a-zA-Z][a-zA-Z0-9+-]*:|/)") -_URI_RE = re.compile( - r"^(?:([a-zA-Z][a-zA-Z0-9+.-]*):)?" - r"(?://([^\\/?#]*))?" - r"([^?#]*)" - r"(?:\?([^#]*))?" - r"(?:#(.*))?$", - re.UNICODE | re.DOTALL, -) - -_IPV4_PAT = r"(?:[0-9]{1,3}\.){3}[0-9]{1,3}" -_HEX_PAT = "[0-9A-Fa-f]{1,4}" -_LS32_PAT = "(?:{hex}:{hex}|{ipv4})".format(hex=_HEX_PAT, ipv4=_IPV4_PAT) -_subs = {"hex": _HEX_PAT, "ls32": _LS32_PAT} -_variations = [ - # 6( h16 ":" ) ls32 - "(?:%(hex)s:){6}%(ls32)s", - # "::" 5( h16 ":" ) ls32 - "::(?:%(hex)s:){5}%(ls32)s", - # [ h16 ] "::" 4( h16 ":" ) ls32 - "(?:%(hex)s)?::(?:%(hex)s:){4}%(ls32)s", - # [ *1( h16 ":" ) h16 ] "::" 3( h16 ":" ) ls32 - "(?:(?:%(hex)s:)?%(hex)s)?::(?:%(hex)s:){3}%(ls32)s", - # [ *2( h16 ":" ) h16 ] "::" 2( h16 ":" ) ls32 - "(?:(?:%(hex)s:){0,2}%(hex)s)?::(?:%(hex)s:){2}%(ls32)s", - # [ *3( h16 ":" ) h16 ] "::" h16 ":" ls32 - "(?:(?:%(hex)s:){0,3}%(hex)s)?::%(hex)s:%(ls32)s", - # [ *4( h16 ":" ) h16 ] "::" ls32 - "(?:(?:%(hex)s:){0,4}%(hex)s)?::%(ls32)s", - # [ *5( h16 ":" ) h16 ] "::" h16 - "(?:(?:%(hex)s:){0,5}%(hex)s)?::%(hex)s", - # [ *6( h16 ":" ) h16 ] "::" - "(?:(?:%(hex)s:){0,6}%(hex)s)?::", -] - -_UNRESERVED_PAT = r"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789._\-~" -_IPV6_PAT = "(?:" + "|".join([x % _subs for x in _variations]) + ")" -_ZONE_ID_PAT = "(?:%25|%)(?:[" + _UNRESERVED_PAT + "]|%[a-fA-F0-9]{2})+" -_IPV6_ADDRZ_PAT = r"\[" + _IPV6_PAT + r"(?:" + _ZONE_ID_PAT + r")?\]" -_REG_NAME_PAT = r"(?:[^\[\]%:/?#]|%[a-fA-F0-9]{2})*" -_TARGET_RE = re.compile(r"^(/[^?#]*)(?:\?([^#]*))?(?:#.*)?$") - -_IPV4_RE = re.compile("^" + _IPV4_PAT + "$") -_IPV6_RE = re.compile("^" + _IPV6_PAT + "$") -_IPV6_ADDRZ_RE = re.compile("^" + _IPV6_ADDRZ_PAT + "$") -_BRACELESS_IPV6_ADDRZ_RE = re.compile("^" + _IPV6_ADDRZ_PAT[2:-2] + "$") -_ZONE_ID_RE = re.compile("(" + _ZONE_ID_PAT + r")\]$") - -_HOST_PORT_PAT = ("^(%s|%s|%s)(?::0*?(|0|[1-9][0-9]{0,4}))?$") % ( - _REG_NAME_PAT, - _IPV4_PAT, - _IPV6_ADDRZ_PAT, -) -_HOST_PORT_RE = re.compile(_HOST_PORT_PAT, re.UNICODE | re.DOTALL) - -_UNRESERVED_CHARS = set( - "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789._-~" -) -_SUB_DELIM_CHARS = set("!$&'()*+,;=") -_USERINFO_CHARS = _UNRESERVED_CHARS | _SUB_DELIM_CHARS | {":"} -_PATH_CHARS = _USERINFO_CHARS | {"@", "/"} -_QUERY_CHARS = _FRAGMENT_CHARS = _PATH_CHARS | {"?"} - - -class Url( - typing.NamedTuple( - "Url", - [ - ("scheme", typing.Optional[str]), - ("auth", typing.Optional[str]), - ("host", typing.Optional[str]), - ("port", typing.Optional[int]), - ("path", typing.Optional[str]), - ("query", typing.Optional[str]), - ("fragment", typing.Optional[str]), - ], - ) -): - """ - Data structure for representing an HTTP URL. Used as a return value for - :func:`parse_url`. Both the scheme and host are normalized as they are - both case-insensitive according to RFC 3986. - """ - - def __new__( # type: ignore[no-untyped-def] - cls, - scheme: str | None = None, - auth: str | None = None, - host: str | None = None, - port: int | None = None, - path: str | None = None, - query: str | None = None, - fragment: str | None = None, - ): - if path and not path.startswith("/"): - path = "/" + path - if scheme is not None: - scheme = scheme.lower() - return super().__new__(cls, scheme, auth, host, port, path, query, fragment) - - @property - def hostname(self) -> str | None: - """For backwards-compatibility with urlparse. We're nice like that.""" - return self.host - - @property - def request_uri(self) -> str: - """Absolute path including the query string.""" - uri = self.path or "/" - - if self.query is not None: - uri += "?" + self.query - - return uri - - @property - def authority(self) -> str | None: - """ - Authority component as defined in RFC 3986 3.2. - This includes userinfo (auth), host and port. - - i.e. - userinfo@host:port - """ - userinfo = self.auth - netloc = self.netloc - if netloc is None or userinfo is None: - return netloc - else: - return f"{userinfo}@{netloc}" - - @property - def netloc(self) -> str | None: - """ - Network location including host and port. - - If you need the equivalent of urllib.parse's ``netloc``, - use the ``authority`` property instead. - """ - if self.host is None: - return None - if self.port: - return f"{self.host}:{self.port}" - return self.host - - @property - def url(self) -> str: - """ - Convert self into a url - - This function should more or less round-trip with :func:`.parse_url`. The - returned url may not be exactly the same as the url inputted to - :func:`.parse_url`, but it should be equivalent by the RFC (e.g., urls - with a blank port will have : removed). - - Example: - - .. code-block:: python - - import urllib3 - - U = urllib3.util.parse_url("https://google.com/mail/") - - print(U.url) - # "https://google.com/mail/" - - print( urllib3.util.Url("https", "username:password", - "host.com", 80, "/path", "query", "fragment" - ).url - ) - # "https://username:password@host.com:80/path?query#fragment" - """ - scheme, auth, host, port, path, query, fragment = self - url = "" - - # We use "is not None" we want things to happen with empty strings (or 0 port) - if scheme is not None: - url += scheme + "://" - if auth is not None: - url += auth + "@" - if host is not None: - url += host - if port is not None: - url += ":" + str(port) - if path is not None: - url += path - if query is not None: - url += "?" + query - if fragment is not None: - url += "#" + fragment - - return url - - def __str__(self) -> str: - return self.url - - -@typing.overload -def _encode_invalid_chars( - component: str, allowed_chars: typing.Container[str] -) -> str: # Abstract - ... - - -@typing.overload -def _encode_invalid_chars( - component: None, allowed_chars: typing.Container[str] -) -> None: # Abstract - ... - - -def _encode_invalid_chars( - component: str | None, allowed_chars: typing.Container[str] -) -> str | None: - """Percent-encodes a URI component without reapplying - onto an already percent-encoded component. - """ - if component is None: - return component - - component = to_str(component) - - # Normalize existing percent-encoded bytes. - # Try to see if the component we're encoding is already percent-encoded - # so we can skip all '%' characters but still encode all others. - component, percent_encodings = _PERCENT_RE.subn( - lambda match: match.group(0).upper(), component - ) - - uri_bytes = component.encode("utf-8", "surrogatepass") - is_percent_encoded = percent_encodings == uri_bytes.count(b"%") - encoded_component = bytearray() - - for i in range(0, len(uri_bytes)): - # Will return a single character bytestring - byte = uri_bytes[i : i + 1] - byte_ord = ord(byte) - if (is_percent_encoded and byte == b"%") or ( - byte_ord < 128 and byte.decode() in allowed_chars - ): - encoded_component += byte - continue - encoded_component.extend(b"%" + (hex(byte_ord)[2:].encode().zfill(2).upper())) - - return encoded_component.decode() - - -def _remove_path_dot_segments(path: str) -> str: - # See http://tools.ietf.org/html/rfc3986#section-5.2.4 for pseudo-code - segments = path.split("/") # Turn the path into a list of segments - output = [] # Initialize the variable to use to store output - - for segment in segments: - # '.' is the current directory, so ignore it, it is superfluous - if segment == ".": - continue - # Anything other than '..', should be appended to the output - if segment != "..": - output.append(segment) - # In this case segment == '..', if we can, we should pop the last - # element - elif output: - output.pop() - - # If the path starts with '/' and the output is empty or the first string - # is non-empty - if path.startswith("/") and (not output or output[0]): - output.insert(0, "") - - # If the path starts with '/.' or '/..' ensure we add one more empty - # string to add a trailing '/' - if path.endswith(("/.", "/..")): - output.append("") - - return "/".join(output) - - -@typing.overload -def _normalize_host(host: None, scheme: str | None) -> None: - ... - - -@typing.overload -def _normalize_host(host: str, scheme: str | None) -> str: - ... - - -def _normalize_host(host: str | None, scheme: str | None) -> str | None: - if host: - if scheme in _NORMALIZABLE_SCHEMES: - is_ipv6 = _IPV6_ADDRZ_RE.match(host) - if is_ipv6: - # IPv6 hosts of the form 'a::b%zone' are encoded in a URL as - # such per RFC 6874: 'a::b%25zone'. Unquote the ZoneID - # separator as necessary to return a valid RFC 4007 scoped IP. - match = _ZONE_ID_RE.search(host) - if match: - start, end = match.span(1) - zone_id = host[start:end] - - if zone_id.startswith("%25") and zone_id != "%25": - zone_id = zone_id[3:] - else: - zone_id = zone_id[1:] - zone_id = _encode_invalid_chars(zone_id, _UNRESERVED_CHARS) - return f"{host[:start].lower()}%{zone_id}{host[end:]}" - else: - return host.lower() - elif not _IPV4_RE.match(host): - return to_str( - b".".join([_idna_encode(label) for label in host.split(".")]), - "ascii", - ) - return host - - -def _idna_encode(name: str) -> bytes: - if not name.isascii(): - try: - import idna - except ImportError: - raise LocationParseError( - "Unable to parse URL without the 'idna' module" - ) from None - - try: - return idna.encode(name.lower(), strict=True, std3_rules=True) - except idna.IDNAError: - raise LocationParseError( - f"Name '{name}' is not a valid IDNA label" - ) from None - - return name.lower().encode("ascii") - - -def _encode_target(target: str) -> str: - """Percent-encodes a request target so that there are no invalid characters - - Pre-condition for this function is that 'target' must start with '/'. - If that is the case then _TARGET_RE will always produce a match. - """ - match = _TARGET_RE.match(target) - if not match: # Defensive: - raise LocationParseError(f"{target!r} is not a valid request URI") - - path, query = match.groups() - encoded_target = _encode_invalid_chars(path, _PATH_CHARS) - if query is not None: - query = _encode_invalid_chars(query, _QUERY_CHARS) - encoded_target += "?" + query - return encoded_target - - -def parse_url(url: str) -> Url: - """ - Given a url, return a parsed :class:`.Url` namedtuple. Best-effort is - performed to parse incomplete urls. Fields not provided will be None. - This parser is RFC 3986 and RFC 6874 compliant. - - The parser logic and helper functions are based heavily on - work done in the ``rfc3986`` module. - - :param str url: URL to parse into a :class:`.Url` namedtuple. - - Partly backwards-compatible with :mod:`urllib.parse`. - - Example: - - .. code-block:: python - - import urllib3 - - print( urllib3.util.parse_url('http://google.com/mail/')) - # Url(scheme='http', host='google.com', port=None, path='/mail/', ...) - - print( urllib3.util.parse_url('google.com:80')) - # Url(scheme=None, host='google.com', port=80, path=None, ...) - - print( urllib3.util.parse_url('/foo?bar')) - # Url(scheme=None, host=None, port=None, path='/foo', query='bar', ...) - """ - if not url: - # Empty - return Url() - - source_url = url - if not _SCHEME_RE.search(url): - url = "//" + url - - scheme: str | None - authority: str | None - auth: str | None - host: str | None - port: str | None - port_int: int | None - path: str | None - query: str | None - fragment: str | None - - try: - scheme, authority, path, query, fragment = _URI_RE.match(url).groups() # type: ignore[union-attr] - normalize_uri = scheme is None or scheme.lower() in _NORMALIZABLE_SCHEMES - - if scheme: - scheme = scheme.lower() - - if authority: - auth, _, host_port = authority.rpartition("@") - auth = auth or None - host, port = _HOST_PORT_RE.match(host_port).groups() # type: ignore[union-attr] - if auth and normalize_uri: - auth = _encode_invalid_chars(auth, _USERINFO_CHARS) - if port == "": - port = None - else: - auth, host, port = None, None, None - - if port is not None: - port_int = int(port) - if not (0 <= port_int <= 65535): - raise LocationParseError(url) - else: - port_int = None - - host = _normalize_host(host, scheme) - - if normalize_uri and path: - path = _remove_path_dot_segments(path) - path = _encode_invalid_chars(path, _PATH_CHARS) - if normalize_uri and query: - query = _encode_invalid_chars(query, _QUERY_CHARS) - if normalize_uri and fragment: - fragment = _encode_invalid_chars(fragment, _FRAGMENT_CHARS) - - except (ValueError, AttributeError) as e: - raise LocationParseError(source_url) from e - - # For the sake of backwards compatibility we put empty - # string values for path if there are any defined values - # beyond the path in the URL. - # TODO: Remove this when we break backwards compatibility. - if not path: - if query is not None or fragment is not None: - path = "" - else: - path = None - - return Url( - scheme=scheme, - auth=auth, - host=host, - port=port_int, - path=path, - query=query, - fragment=fragment, - ) diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/util.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/util.py deleted file mode 100644 index 35c77e40..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/util.py +++ /dev/null @@ -1,42 +0,0 @@ -from __future__ import annotations - -import typing -from types import TracebackType - - -def to_bytes( - x: str | bytes, encoding: str | None = None, errors: str | None = None -) -> bytes: - if isinstance(x, bytes): - return x - elif not isinstance(x, str): - raise TypeError(f"not expecting type {type(x).__name__}") - if encoding or errors: - return x.encode(encoding or "utf-8", errors=errors or "strict") - return x.encode() - - -def to_str( - x: str | bytes, encoding: str | None = None, errors: str | None = None -) -> str: - if isinstance(x, str): - return x - elif not isinstance(x, bytes): - raise TypeError(f"not expecting type {type(x).__name__}") - if encoding or errors: - return x.decode(encoding or "utf-8", errors=errors or "strict") - return x.decode() - - -def reraise( - tp: type[BaseException] | None, - value: BaseException, - tb: TracebackType | None = None, -) -> typing.NoReturn: - try: - if value.__traceback__ is not tb: - raise value.with_traceback(tb) - raise value - finally: - value = None # type: ignore[assignment] - tb = None diff --git a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/wait.py b/vscode-extension/context-engine-uploader/python_libs/urllib3/util/wait.py deleted file mode 100644 index aeca0c7a..00000000 --- a/vscode-extension/context-engine-uploader/python_libs/urllib3/util/wait.py +++ /dev/null @@ -1,124 +0,0 @@ -from __future__ import annotations - -import select -import socket -from functools import partial - -__all__ = ["wait_for_read", "wait_for_write"] - - -# How should we wait on sockets? -# -# There are two types of APIs you can use for waiting on sockets: the fancy -# modern stateful APIs like epoll/kqueue, and the older stateless APIs like -# select/poll. The stateful APIs are more efficient when you have a lots of -# sockets to keep track of, because you can set them up once and then use them -# lots of times. But we only ever want to wait on a single socket at a time -# and don't want to keep track of state, so the stateless APIs are actually -# more efficient. So we want to use select() or poll(). -# -# Now, how do we choose between select() and poll()? On traditional Unixes, -# select() has a strange calling convention that makes it slow, or fail -# altogether, for high-numbered file descriptors. The point of poll() is to fix -# that, so on Unixes, we prefer poll(). -# -# On Windows, there is no poll() (or at least Python doesn't provide a wrapper -# for it), but that's OK, because on Windows, select() doesn't have this -# strange calling convention; plain select() works fine. -# -# So: on Windows we use select(), and everywhere else we use poll(). We also -# fall back to select() in case poll() is somehow broken or missing. - - -def select_wait_for_socket( - sock: socket.socket, - read: bool = False, - write: bool = False, - timeout: float | None = None, -) -> bool: - if not read and not write: - raise RuntimeError("must specify at least one of read=True, write=True") - rcheck = [] - wcheck = [] - if read: - rcheck.append(sock) - if write: - wcheck.append(sock) - # When doing a non-blocking connect, most systems signal success by - # marking the socket writable. Windows, though, signals success by marked - # it as "exceptional". We paper over the difference by checking the write - # sockets for both conditions. (The stdlib selectors module does the same - # thing.) - fn = partial(select.select, rcheck, wcheck, wcheck) - rready, wready, xready = fn(timeout) - return bool(rready or wready or xready) - - -def poll_wait_for_socket( - sock: socket.socket, - read: bool = False, - write: bool = False, - timeout: float | None = None, -) -> bool: - if not read and not write: - raise RuntimeError("must specify at least one of read=True, write=True") - mask = 0 - if read: - mask |= select.POLLIN - if write: - mask |= select.POLLOUT - poll_obj = select.poll() - poll_obj.register(sock, mask) - - # For some reason, poll() takes timeout in milliseconds - def do_poll(t: float | None) -> list[tuple[int, int]]: - if t is not None: - t *= 1000 - return poll_obj.poll(t) - - return bool(do_poll(timeout)) - - -def _have_working_poll() -> bool: - # Apparently some systems have a select.poll that fails as soon as you try - # to use it, either due to strange configuration or broken monkeypatching - # from libraries like eventlet/greenlet. - try: - poll_obj = select.poll() - poll_obj.poll(0) - except (AttributeError, OSError): - return False - else: - return True - - -def wait_for_socket( - sock: socket.socket, - read: bool = False, - write: bool = False, - timeout: float | None = None, -) -> bool: - # We delay choosing which implementation to use until the first time we're - # called. We could do it at import time, but then we might make the wrong - # decision if someone goes wild with monkeypatching select.poll after - # we're imported. - global wait_for_socket - if _have_working_poll(): - wait_for_socket = poll_wait_for_socket - elif hasattr(select, "select"): - wait_for_socket = select_wait_for_socket - return wait_for_socket(sock, read, write, timeout) - - -def wait_for_read(sock: socket.socket, timeout: float | None = None) -> bool: - """Waits for reading to be available on a given socket. - Returns True if the socket is readable, or False if the timeout expired. - """ - return wait_for_socket(sock, read=True, timeout=timeout) - - -def wait_for_write(sock: socket.socket, timeout: float | None = None) -> bool: - """Waits for writing to be available on a given socket. - Returns True if the socket is readable, or False if the timeout expired. - """ - return wait_for_socket(sock, write=True, timeout=timeout) diff --git a/vscode-extension/context-engine-uploader/standalone_upload_client.py b/vscode-extension/context-engine-uploader/standalone_upload_client.py deleted file mode 100644 index 2f0416ac..00000000 --- a/vscode-extension/context-engine-uploader/standalone_upload_client.py +++ /dev/null @@ -1,1266 +0,0 @@ -#!/usr/bin/env python3 -""" -Standalone Remote Upload Client for Context-Engine. - -This is a self-contained version of the remote upload client that doesn't require -the full Context-Engine repository. It includes only the essential functions -needed for delta bundle creation and upload. - -Example usage: - python3 standalone_upload_client.py --path /path/to/your/project --server https://your-server.com -""" - -import os -import json -import time -import uuid -import hashlib -import tarfile -import tempfile -import logging -import argparse -import sys -from pathlib import Path -from typing import Dict, List, Any, Optional, Tuple -from datetime import datetime - -CURRENT_DIR = Path(__file__).resolve().parent -LIB_DIR = CURRENT_DIR / "python_libs" -if LIB_DIR.exists(): - sys.path.insert(0, str(LIB_DIR)) - -import requests -from requests.adapters import HTTPAdapter -from urllib3.util.retry import Retry - -# Configure logging -logging.basicConfig(level=logging.INFO) -logger = logging.getLogger(__name__) - -# ============================================================================= -# EMBEDDED DEPENDENCIES (Extracted from Context-Engine) -# ============================================================================= - -# Language detection mapping (from ingest_code.py) -CODE_EXTS = { - ".py": "python", - ".js": "javascript", - ".ts": "typescript", - ".tsx": "typescript", - ".jsx": "javascript", - ".java": "java", - ".go": "go", - ".rs": "rust", - ".rb": "ruby", - ".php": "php", - ".c": "c", - ".h": "c", - ".cpp": "cpp", - ".cc": "cpp", - ".hpp": "cpp", - ".cs": "csharp", - ".kt": "kotlin", - ".swift": "swift", - ".scala": "scala", - ".sh": "shell", - ".ps1": "powershell", - ".psm1": "powershell", - ".psd1": "powershell", - ".sql": "sql", - ".md": "markdown", - ".yml": "yaml", - ".yaml": "yaml", - ".toml": "toml", - ".ini": "ini", - ".cfg": "ini", - ".conf": "ini", - ".xml": "xml", - ".html": "html", - ".htm": "html", - ".css": "css", - ".scss": "scss", - ".sass": "sass", - ".less": "less", - ".json": "json", - "Dockerfile": "dockerfile", - "Makefile": "makefile", - ".tf": "terraform", - ".tfvars": "terraform", - ".hcl": "terraform", - ".vue": "vue", - ".svelte": "svelte", - ".elm": "elm", - ".dart": "dart", - ".lua": "lua", - ".r": "r", - ".R": "r", - ".m": "matlab", - ".pl": "perl", - ".swift": "swift", - ".kt": "kotlin", - ".cljs": "clojure", - ".clj": "clojure", - ".hs": "haskell", - ".ml": "ocaml", - ".zig": "zig", - ".nim": "nim", - ".v": "verilog", - ".sv": "verilog", - ".vhdl": "vhdl", - ".asm": "assembly", - ".s": "assembly", - ". Dockerfile": "dockerfile", -} - -def hash_id(text: str, path: str, start: int, end: int) -> str: - """Generate hash ID for content (from ingest_code.py).""" - h = hashlib.sha1( - f"{path}:{start}-{end}\n{text}".encode("utf-8", errors="ignore") - ).hexdigest() - return h[:16] - -def get_collection_name(repo_name: Optional[str] = None) -> str: - """Generate collection name with 8-char hash for local workspaces. - - Simplified version from workspace_state.py. - """ - if not repo_name: - return "default-collection" - hash_obj = hashlib.sha256(repo_name.encode()) - short_hash = hash_obj.hexdigest()[:8] - return f"{repo_name}-{short_hash}" - -def _extract_repo_name_from_path(workspace_path: str) -> str: - """Extract repository name from workspace path. - - Simplified version from workspace_state.py. - """ - try: - path = Path(workspace_path).resolve() - # Get the directory name as repo name - return path.name - except Exception: - return "unknown-repo" - -# Simple file-based hash cache (simplified from workspace_state.py) -class SimpleHashCache: - """Simple file-based hash cache for tracking file changes.""" - - def __init__(self, workspace_path: str, repo_name: str): - self.workspace_path = Path(workspace_path).resolve() - self.repo_name = repo_name - self.cache_dir = self.workspace_path / ".context-engine" - self.cache_file = self.cache_dir / "file_cache.json" - self.cache_dir.mkdir(exist_ok=True) - - def _load_cache(self) -> Dict[str, str]: - """Load cache from disk.""" - if not self.cache_file.exists(): - return {} - try: - with open(self.cache_file, 'r', encoding='utf-8') as f: - data = json.load(f) - return data.get("file_hashes", {}) - except Exception: - return {} - - def _save_cache(self, file_hashes: Dict[str, str]): - """Save cache to disk.""" - try: - data = { - "file_hashes": file_hashes, - "updated_at": datetime.now().isoformat() - } - with open(self.cache_file, 'w', encoding='utf-8') as f: - json.dump(data, f, indent=2) - except Exception: - pass - - def get_hash(self, file_path: str) -> str: - """Get cached file hash.""" - file_hashes = self._load_cache() - abs_path = str(Path(file_path).resolve()) - return file_hashes.get(abs_path, "") - - def set_hash(self, file_path: str, file_hash: str): - """Set cached file hash.""" - file_hashes = self._load_cache() - abs_path = str(Path(file_path).resolve()) - file_hashes[abs_path] = file_hash - self._save_cache(file_hashes) - -# Create global cache instance (will be initialized in RemoteUploadClient) -_hash_cache: Optional[SimpleHashCache] = None - -def get_cached_file_hash(file_path: str, repo_name: Optional[str] = None) -> str: - """Get cached file hash for tracking changes.""" - global _hash_cache - if _hash_cache: - return _hash_cache.get_hash(file_path) - return "" - -def set_cached_file_hash(file_path: str, file_hash: str, repo_name: Optional[str] = None): - """Set cached file hash for tracking changes.""" - global _hash_cache - if _hash_cache: - _hash_cache.set_hash(file_path, file_hash) - - -class RemoteUploadClient: - """Client for uploading delta bundles to remote server.""" - - def _translate_to_container_path(self, host_path: str) -> str: - """Translate host path to container path for API communication.""" - # Use environment variable for path mapping if available - host_root = os.environ.get("HOST_ROOT", "/home/coder/project/Context-Engine/dev-workspace") - container_root = os.environ.get("CONTAINER_ROOT", "/work") - - if host_path.startswith(host_root): - return host_path.replace(host_root, container_root) - else: - # Fallback: if path doesn't match expected pattern, use as-is - return host_path - - def __init__(self, upload_endpoint: str, workspace_path: str, collection_name: str, - max_retries: int = 3, timeout: int = 30, metadata_path: Optional[str] = None): - """Initialize remote upload client.""" - self.upload_endpoint = upload_endpoint.rstrip('/') - self.workspace_path = workspace_path - self.collection_name = collection_name - self.max_retries = max_retries - self.timeout = timeout - self.temp_dir = None - - # Set environment variables for cache functions - os.environ["WORKSPACE_PATH"] = workspace_path - - # Store repo name and initialize hash cache - self.repo_name = _extract_repo_name_from_path(workspace_path) - # Fallback to directory name if repo detection fails (for non-git repos) - if not self.repo_name: - self.repo_name = Path(workspace_path).name - global _hash_cache - _hash_cache = SimpleHashCache(workspace_path, self.repo_name) - - # Setup HTTP session with simple retry - self.session = requests.Session() - retry_strategy = Retry(total=max_retries, backoff_factor=1, status_forcelist=[429, 500, 502, 503, 504]) - adapter = HTTPAdapter(max_retries=retry_strategy) - self.session.mount("http://", adapter) - self.session.mount("https://", adapter) - - def __enter__(self): - """Context manager entry.""" - return self - - def __exit__(self, exc_type, exc_val, exc_tb): - """Context manager exit with cleanup.""" - self.cleanup() - - def cleanup(self): - """Clean up temporary directories.""" - if self.temp_dir and os.path.exists(self.temp_dir): - try: - import shutil - shutil.rmtree(self.temp_dir) - logger.debug(f"[remote_upload] Cleaned up temporary directory: {self.temp_dir}") - except Exception as e: - logger.warning(f"[remote_upload] Failed to cleanup temp directory {self.temp_dir}: {e}") - finally: - self.temp_dir = None - - def get_mapping_summary(self) -> Dict[str, Any]: - """Return derived collection mapping details.""" - container_path = self._translate_to_container_path(self.workspace_path) - return { - "repo_name": self.repo_name, - "collection_name": self.collection_name, - "source_path": self.workspace_path, - "container_path": container_path, - "upload_endpoint": self.upload_endpoint, - } - - def log_mapping_summary(self) -> None: - """Log mapping summary for user visibility.""" - info = self.get_mapping_summary() - logger.info("[remote_upload] Collection mapping:") - logger.info(f" repo_name: {info['repo_name']}") - logger.info(f" collection_name: {info['collection_name']}") - logger.info(f" source_path: {info['source_path']}") - logger.info(f" container_path: {info['container_path']}") - - def _get_temp_bundle_dir(self) -> Path: - """Get or create temporary directory for bundle creation.""" - if not self.temp_dir: - self.temp_dir = tempfile.mkdtemp(prefix="delta_bundle_") - return Path(self.temp_dir) - # CLI is stateless - sequence tracking is handled by server - - def detect_file_changes(self, changed_paths: List[Path]) -> Dict[str, List]: - """ - Detect what type of changes occurred for each file path. - - Args: - changed_paths: List of changed file paths - - Returns: - Dictionary with change types: created, updated, deleted, moved, unchanged - """ - changes = { - "created": [], - "updated": [], - "deleted": [], - "moved": [], - "unchanged": [] - } - - for path in changed_paths: - abs_path = str(path.resolve()) - cached_hash = get_cached_file_hash(abs_path, self.repo_name) - - if not path.exists(): - # File was deleted - if cached_hash: - changes["deleted"].append(path) - else: - # File exists - calculate current hash - try: - with open(path, 'rb') as f: - content = f.read() - current_hash = hashlib.sha1(content).hexdigest() - - if not cached_hash: - # New file - changes["created"].append(path) - elif cached_hash != current_hash: - # Modified file - changes["updated"].append(path) - else: - # Unchanged (might be a move detection candidate) - changes["unchanged"].append(path) - - # Update cache - set_cached_file_hash(abs_path, current_hash, self.repo_name) - except Exception: - # Skip files that can't be read - continue - - # Detect moves by looking for files with same content hash - # but different paths (requires additional tracking) - changes["moved"] = self._detect_moves(changes["created"], changes["deleted"]) - - return changes - - def _detect_moves(self, created_files: List[Path], deleted_files: List[Path]) -> List[Tuple[Path, Path]]: - """ - Detect file moves by matching content hashes between created and deleted files. - - Args: - created_files: List of newly created files - deleted_files: List of deleted files - - Returns: - List of (source, destination) path tuples for detected moves - """ - moves = [] - deleted_hashes = {} - - # Build hash map for deleted files - for deleted_path in deleted_files: - try: - # Try to get cached hash first, fallback to file content - cached_hash = get_cached_file_hash(str(deleted_path), self.repo_name) - if cached_hash: - deleted_hashes[cached_hash] = deleted_path - continue - - # If no cached hash, try to read from file if it still exists - if deleted_path.exists(): - with open(deleted_path, 'rb') as f: - content = f.read() - file_hash = hashlib.sha1(content).hexdigest() - deleted_hashes[file_hash] = deleted_path - except Exception: - continue - - # Match created files with deleted files by hash - for created_path in created_files: - try: - with open(created_path, 'rb') as f: - content = f.read() - file_hash = hashlib.sha1(content).hexdigest() - - if file_hash in deleted_hashes: - source_path = deleted_hashes[file_hash] - moves.append((source_path, created_path)) - # Remove from consideration - del deleted_hashes[file_hash] - except Exception: - continue - - return moves - - def create_delta_bundle(self, changes: Dict[str, List]) -> Tuple[str, Dict[str, Any]]: - """ - Create a delta bundle from detected changes. - - Args: - changes: Dictionary of file changes by type - - Returns: - Tuple of (bundle_path, manifest_metadata) - """ - bundle_id = str(uuid.uuid4()) - # CLI is stateless - server handles sequence numbers - created_at = datetime.now().isoformat() - - # Create temporary directory for bundle - with tempfile.TemporaryDirectory() as temp_dir: - temp_path = Path(temp_dir) - - # Create directory structure - files_dir = temp_path / "files" - metadata_dir = temp_path / "metadata" - files_dir.mkdir() - metadata_dir.mkdir() - - # Create subdirectories - (files_dir / "created").mkdir() - (files_dir / "updated").mkdir() - (files_dir / "moved").mkdir() - - operations = [] - total_size = 0 - file_hashes = {} - - # Process created files - for path in changes["created"]: - rel_path = str(path.relative_to(Path(self.workspace_path))) - try: - with open(path, 'rb') as f: - content = f.read() - file_hash = hashlib.sha1(content).hexdigest() - content_hash = f"sha1:{file_hash}" - - # Write file to bundle - bundle_file_path = files_dir / "created" / rel_path - bundle_file_path.parent.mkdir(parents=True, exist_ok=True) - bundle_file_path.write_bytes(content) - - # Get file info - stat = path.stat() - language = CODE_EXTS.get(path.suffix.lower(), "unknown") - - operation = { - "operation": "created", - "path": rel_path, - "relative_path": rel_path, - "absolute_path": str(path.resolve()), - "size_bytes": stat.st_size, - "content_hash": content_hash, - "file_hash": f"sha1:{hash_id(content.decode('utf-8', errors='ignore'), rel_path, 1, len(content.splitlines()))}", - "modified_time": datetime.fromtimestamp(stat.st_mtime).isoformat(), - "language": language - } - operations.append(operation) - file_hashes[rel_path] = f"sha1:{file_hash}" - total_size += stat.st_size - - except Exception as e: - print(f"[bundle_create] Error processing created file {path}: {e}") - continue - - # Process updated files - for path in changes["updated"]: - rel_path = str(path.relative_to(Path(self.workspace_path))) - try: - with open(path, 'rb') as f: - content = f.read() - file_hash = hashlib.sha1(content).hexdigest() - content_hash = f"sha1:{file_hash}" - previous_hash = get_cached_file_hash(str(path.resolve()), self.repo_name) - - # Write file to bundle - bundle_file_path = files_dir / "updated" / rel_path - bundle_file_path.parent.mkdir(parents=True, exist_ok=True) - bundle_file_path.write_bytes(content) - - # Get file info - stat = path.stat() - language = CODE_EXTS.get(path.suffix.lower(), "unknown") - - operation = { - "operation": "updated", - "path": rel_path, - "relative_path": rel_path, - "absolute_path": str(path.resolve()), - "size_bytes": stat.st_size, - "content_hash": content_hash, - "previous_hash": f"sha1:{previous_hash}" if previous_hash else None, - "file_hash": f"sha1:{hash_id(content.decode('utf-8', errors='ignore'), rel_path, 1, len(content.splitlines()))}", - "modified_time": datetime.fromtimestamp(stat.st_mtime).isoformat(), - "language": language - } - operations.append(operation) - file_hashes[rel_path] = f"sha1:{file_hash}" - total_size += stat.st_size - - except Exception as e: - print(f"[bundle_create] Error processing updated file {path}: {e}") - continue - - # Process moved files - for source_path, dest_path in changes["moved"]: - dest_rel_path = str(dest_path.relative_to(Path(self.workspace_path))) - source_rel_path = str(source_path.relative_to(Path(self.workspace_path))) - try: - with open(dest_path, 'rb') as f: - content = f.read() - file_hash = hashlib.sha1(content).hexdigest() - content_hash = f"sha1:{file_hash}" - - # Write file to bundle - bundle_file_path = files_dir / "moved" / dest_rel_path - bundle_file_path.parent.mkdir(parents=True, exist_ok=True) - bundle_file_path.write_bytes(content) - - # Get file info - stat = dest_path.stat() - language = CODE_EXTS.get(dest_path.suffix.lower(), "unknown") - - operation = { - "operation": "moved", - "path": dest_rel_path, - "relative_path": dest_rel_path, - "absolute_path": str(dest_path.resolve()), - "source_path": source_rel_path, - "source_relative_path": source_rel_path, - "source_absolute_path": str(source_path.resolve()), - "size_bytes": stat.st_size, - "content_hash": content_hash, - "file_hash": f"sha1:{idx.hash_id(content.decode('utf-8', errors='ignore'), dest_rel_path, 1, len(content.splitlines()))}", - "modified_time": datetime.fromtimestamp(stat.st_mtime).isoformat(), - "language": language - } - operations.append(operation) - file_hashes[dest_rel_path] = f"sha1:{file_hash}" - total_size += stat.st_size - - except Exception as e: - print(f"[bundle_create] Error processing moved file {source_path} -> {dest_path}: {e}") - continue - - # Process deleted files - for path in changes["deleted"]: - rel_path = str(path.relative_to(Path(self.workspace_path))) - try: - previous_hash = get_cached_file_hash(str(path.resolve()), self.repo_name) - - operation = { - "operation": "deleted", - "path": rel_path, - "relative_path": rel_path, - "absolute_path": str(path.resolve()), - "previous_hash": f"sha1:{previous_hash}" if previous_hash else None, - "file_hash": None, - "modified_time": datetime.now().isoformat(), - "language": idx.CODE_EXTS.get(path.suffix.lower(), "unknown") - } - operations.append(operation) - - except Exception as e: - print(f"[bundle_create] Error processing deleted file {path}: {e}") - continue - - # Create manifest - manifest = { - "version": "1.0", - "bundle_id": bundle_id, - "workspace_path": self.workspace_path, - "collection_name": self.collection_name, - "created_at": created_at, - # CLI is stateless - server will assign sequence numbers - "sequence_number": None, # Server will assign - "parent_sequence": None, # Server will determine - "operations": { - "created": len(changes["created"]), - "updated": len(changes["updated"]), - "deleted": len(changes["deleted"]), - "moved": len(changes["moved"]) - }, - "total_files": len(operations), - "total_size_bytes": total_size, - "compression": "gzip", - "encoding": "utf-8" - } - - # Write manifest - (temp_path / "manifest.json").write_text(json.dumps(manifest, indent=2)) - - # Write operations metadata - operations_metadata = { - "operations": operations - } - (metadata_dir / "operations.json").write_text(json.dumps(operations_metadata, indent=2)) - - # Write hashes - hashes_metadata = { - "workspace_path": self.workspace_path, - "updated_at": created_at, - "file_hashes": file_hashes - } - (metadata_dir / "hashes.json").write_text(json.dumps(hashes_metadata, indent=2)) - - # Create tarball in temporary directory - temp_bundle_dir = self._get_temp_bundle_dir() - bundle_path = temp_bundle_dir / f"{bundle_id}.tar.gz" - with tarfile.open(bundle_path, "w:gz") as tar: - tar.add(temp_path, arcname=f"{bundle_id}") - - return str(bundle_path), manifest - - def upload_bundle(self, bundle_path: str, manifest: Dict[str, Any]) -> Dict[str, Any]: - """ - Upload delta bundle to remote server with exponential backoff retry. - - Args: - bundle_path: Path to the bundle tarball - manifest: Bundle manifest metadata - - Returns: - Server response dictionary - """ - last_error = None - - for attempt in range(self.max_retries + 1): - try: - # Simple exponential backoff - if attempt > 0: - delay = min(2 ** (attempt - 1), 30) # 1, 2, 4, 8... capped at 30s - logger.info(f"[remote_upload] Retry attempt {attempt + 1}/{self.max_retries + 1} after {delay}s delay") - time.sleep(delay) - - # Verify bundle exists - if not os.path.exists(bundle_path): - return {"success": False, "error": {"code": "BUNDLE_NOT_FOUND", "message": f"Bundle not found: {bundle_path}"}} - - # Check bundle size (100MB limit) - bundle_size = os.path.getsize(bundle_path) - if bundle_size > 100 * 1024 * 1024: - return {"success": False, "error": {"code": "BUNDLE_TOO_LARGE", "message": f"Bundle too large: {bundle_size} bytes"}} - - with open(bundle_path, 'rb') as bundle_file: - files = { - 'bundle': (f"{manifest['bundle_id']}.tar.gz", bundle_file, 'application/gzip') - } - - data = { - 'workspace_path': self._translate_to_container_path(self.workspace_path), - 'collection_name': self.collection_name, - # CLI is stateless - server handles sequence numbers - 'force': 'false', - 'source_path': self.workspace_path, - } - - logger.info(f"[remote_upload] Uploading bundle {manifest['bundle_id']} (size: {bundle_size} bytes)") - - response = self.session.post( - f"{self.upload_endpoint}/api/v1/delta/upload", - files=files, - data=data, - timeout=self.timeout - ) - - if response.status_code == 200: - result = response.json() - logger.info(f"[remote_upload] Successfully uploaded bundle {manifest['bundle_id']}") - return result - # Handle error - error_msg = f"Upload failed with status {response.status_code}" - try: - error_detail = response.json() - error_detail_msg = error_detail.get('error', {}).get('message', 'Unknown error') - error_msg += f": {error_detail_msg}" - error_code = error_detail.get('error', {}).get('code', 'HTTP_ERROR') - except: - error_msg += f": {response.text[:200]}" - error_code = "HTTP_ERROR" - - last_error = {"success": False, "error": {"code": error_code, "message": error_msg, "status_code": response.status_code}} - - # Don't retry on client errors (except 429) - if 400 <= response.status_code < 500 and response.status_code != 429: - return last_error - - logger.warning(f"[remote_upload] Upload attempt {attempt + 1} failed: {error_msg}") - - except requests.exceptions.Timeout as e: - last_error = {"success": False, "error": {"code": "TIMEOUT_ERROR", "message": f"Upload timeout: {str(e)}"}} - logger.warning(f"[remote_upload] Upload timeout on attempt {attempt + 1}: {e}") - - except requests.exceptions.ConnectionError as e: - last_error = {"success": False, "error": {"code": "CONNECTION_ERROR", "message": f"Connection error: {str(e)}"}} - logger.warning(f"[remote_upload] Connection error on attempt {attempt + 1}: {e}") - - except requests.exceptions.RequestException as e: - last_error = {"success": False, "error": {"code": "NETWORK_ERROR", "message": f"Network error: {str(e)}"}} - logger.warning(f"[remote_upload] Network error on attempt {attempt + 1}: {e}") - - except Exception as e: - last_error = {"success": False, "error": {"code": "UPLOAD_ERROR", "message": f"Upload error: {str(e)}"}} - logger.error(f"[remote_upload] Unexpected error on attempt {attempt + 1}: {e}") - - # All retries exhausted - logger.error(f"[remote_upload] All {self.max_retries + 1} upload attempts failed for bundle {manifest.get('bundle_id', 'unknown')}") - return last_error or { - "success": False, - "error": { - "code": "MAX_RETRIES_EXCEEDED", - "message": f"Upload failed after {self.max_retries + 1} attempts" - } - } - - def get_server_status(self) -> Dict[str, Any]: - """Get server status with simplified error handling.""" - try: - container_workspace_path = self._translate_to_container_path(self.workspace_path) - - response = self.session.get( - f"{self.upload_endpoint}/api/v1/delta/status", - params={'workspace_path': container_workspace_path}, - timeout=min(self.timeout, 10) - ) - - if response.status_code == 200: - return response.json() - - # Handle error response - error_msg = f"Status check failed with HTTP {response.status_code}" - try: - error_detail = response.json() - error_msg += f": {error_detail.get('error', {}).get('message', 'Unknown error')}" - except: - error_msg += f": {response.text[:100]}" - - return {"success": False, "error": {"code": "STATUS_ERROR", "message": error_msg}} - - except requests.exceptions.Timeout: - return {"success": False, "error": {"code": "STATUS_TIMEOUT", "message": "Status check timeout"}} - except requests.exceptions.ConnectionError: - return {"success": False, "error": {"code": "CONNECTION_ERROR", "message": f"Cannot connect to server"}} - except Exception as e: - return {"success": False, "error": {"code": "STATUS_CHECK_ERROR", "message": f"Status check error: {str(e)}"}} - - def has_meaningful_changes(self, changes: Dict[str, List]) -> bool: - """Check if changes warrant a delta upload.""" - total_changes = sum(len(files) for op, files in changes.items() if op != "unchanged") - return total_changes > 0 - - def process_changes_and_upload(self, changes: Dict[str, List]) -> bool: - """ - Process pre-computed changes and upload delta bundle. - Includes comprehensive error handling and graceful fallback. - - Args: - changes: Dictionary of file changes by type - - Returns: - True if upload was successful, False otherwise - """ - try: - logger.info(f"[remote_upload] Processing pre-computed changes") - - # Validate input - if not changes: - logger.info("[remote_upload] No changes provided") - return True - - if not self.has_meaningful_changes(changes): - logger.info("[remote_upload] No meaningful changes detected, skipping upload") - return True - - # Log change summary - total_changes = sum(len(files) for op, files in changes.items() if op != "unchanged") - logger.info(f"[remote_upload] Detected {total_changes} meaningful changes: " - f"{len(changes['created'])} created, {len(changes['updated'])} updated, " - f"{len(changes['deleted'])} deleted, {len(changes['moved'])} moved") - - # Create delta bundle - bundle_path = None - try: - bundle_path, manifest = self.create_delta_bundle(changes) - logger.info(f"[remote_upload] Created delta bundle: {manifest['bundle_id']} " - f"(size: {manifest['total_size_bytes']} bytes)") - - # Validate bundle was created successfully - if not bundle_path or not os.path.exists(bundle_path): - raise RuntimeError(f"Failed to create bundle at {bundle_path}") - - except Exception as e: - logger.error(f"[remote_upload] Error creating delta bundle: {e}") - # Clean up any temporary files on failure - self.cleanup() - return False - - # Upload bundle with retry logic - try: - response = self.upload_bundle(bundle_path, manifest) - - if response.get("success", False): - processed_ops = response.get('processed_operations', {}) - logger.info(f"[remote_upload] Successfully uploaded bundle {manifest['bundle_id']}") - logger.info(f"[remote_upload] Processed operations: {processed_ops}") - - # Clean up temporary bundle after successful upload - try: - if os.path.exists(bundle_path): - os.remove(bundle_path) - logger.debug(f"[remote_upload] Cleaned up temporary bundle: {bundle_path}") - # Also clean up the entire temp directory if this is the last bundle - self.cleanup() - except Exception as cleanup_error: - logger.warning(f"[remote_upload] Failed to cleanup bundle {bundle_path}: {cleanup_error}") - - return True - else: - error_msg = response.get('error', {}).get('message', 'Unknown upload error') - logger.error(f"[remote_upload] Upload failed: {error_msg}") - return False - - except Exception as e: - logger.error(f"[remote_upload] Error uploading bundle: {e}") - return False - - except Exception as e: - logger.error(f"[remote_upload] Unexpected error in process_changes_and_upload: {e}") - return False - - def watch_loop(self, interval: int = 5): - """Main file watching loop using existing detection and upload methods.""" - logger.info(f"[watch] Starting file monitoring (interval: {interval}s)") - logger.info(f"[watch] Monitoring: {self.workspace_path}") - logger.info(f"[watch] Press Ctrl+C to stop") - - try: - while True: - try: - # Use existing change detection (get all files in workspace) - all_files = self.get_all_code_files() - changes = self.detect_file_changes(all_files) - - # Count only meaningful changes (exclude unchanged) - meaningful_changes = len(changes.get("created", [])) + len(changes.get("updated", [])) + len(changes.get("deleted", [])) + len(changes.get("moved", [])) - - if meaningful_changes > 0: - logger.info(f"[watch] Detected {meaningful_changes} changes: { {k: len(v) for k, v in changes.items() if k != 'unchanged'} }") - - # Use existing upload method - success = self.process_changes_and_upload(changes) - - if success: - logger.info(f"[watch] Successfully uploaded changes") - else: - logger.error(f"[watch] Failed to upload changes") - else: - logger.debug(f"[watch] No changes detected") # Debug level to avoid spam - - # Sleep until next check - time.sleep(interval) - - except KeyboardInterrupt: - logger.info(f"[watch] Received interrupt signal, stopping...") - break - except Exception as e: - logger.error(f"[watch] Error in watch loop: {e}") - time.sleep(interval) # Continue even after errors - - except KeyboardInterrupt: - logger.info(f"[watch] File monitoring stopped by user") - - def get_all_code_files(self) -> List[Path]: - """Get all code files in the workspace.""" - all_files = [] - try: - workspace_path = Path(self.workspace_path) - for ext in CODE_EXTS: - all_files.extend(workspace_path.rglob(f"*{ext}")) - - # Filter out directories and hidden files - all_files = [ - f for f in all_files - if f.is_file() - and not any(part.startswith('.') for part in f.parts) - and '.context-engine' not in str(f) - ] - except Exception as e: - logger.error(f"[watch] Error scanning files: {e}") - - return all_files - - def process_and_upload_changes(self, changed_paths: List[Path]) -> bool: - """ - Process changed paths and upload delta bundle if meaningful changes exist. - Includes comprehensive error handling and graceful fallback. - - Args: - changed_paths: List of changed file paths - - Returns: - True if upload was successful, False otherwise - """ - try: - logger.info(f"[remote_upload] Processing {len(changed_paths)} changed paths") - - # Validate input - if not changed_paths: - logger.info("[remote_upload] No changed paths provided") - return True - - # Detect changes - try: - changes = self.detect_file_changes(changed_paths) - except Exception as e: - logger.error(f"[remote_upload] Error detecting file changes: {e}") - return False - - if not self.has_meaningful_changes(changes): - logger.info("[remote_upload] No meaningful changes detected, skipping upload") - return True - - # Log change summary - total_changes = sum(len(files) for op, files in changes.items() if op != "unchanged") - logger.info(f"[remote_upload] Detected {total_changes} meaningful changes: " - f"{len(changes['created'])} created, {len(changes['updated'])} updated, " - f"{len(changes['deleted'])} deleted, {len(changes['moved'])} moved") - - # Create delta bundle - bundle_path = None - try: - bundle_path, manifest = self.create_delta_bundle(changes) - logger.info(f"[remote_upload] Created delta bundle: {manifest['bundle_id']} " - f"(size: {manifest['total_size_bytes']} bytes)") - - # Validate bundle was created successfully - if not bundle_path or not os.path.exists(bundle_path): - raise RuntimeError(f"Failed to create bundle at {bundle_path}") - - except Exception as e: - logger.error(f"[remote_upload] Error creating delta bundle: {e}") - # Clean up any temporary files on failure - self.cleanup() - return False - - # Upload bundle with retry logic - try: - response = self.upload_bundle(bundle_path, manifest) - - if response.get("success", False): - processed_ops = response.get('processed_operations', {}) - logger.info(f"[remote_upload] Successfully uploaded bundle {manifest['bundle_id']}") - logger.info(f"[remote_upload] Processed operations: {processed_ops}") - - # Clean up temporary bundle after successful upload - try: - if os.path.exists(bundle_path): - os.remove(bundle_path) - logger.debug(f"[remote_upload] Cleaned up temporary bundle: {bundle_path}") - # Also clean up the entire temp directory if this is the last bundle - self.cleanup() - except Exception as cleanup_error: - logger.warning(f"[remote_upload] Failed to cleanup bundle {bundle_path}: {cleanup_error}") - - return True - else: - error = response.get("error", {}) - error_code = error.get("code", "UNKNOWN") - error_msg = error.get("message", "Unknown error") - - logger.error(f"[remote_upload] Upload failed: {error_msg}") - - # Handle specific error types - # CLI is stateless - server handles sequence management - if error_code in ["BUNDLE_TOO_LARGE", "BUNDLE_NOT_FOUND"]: - # These are unrecoverable errors - logger.error(f"[remote_upload] Unrecoverable error ({error_code}): {error_msg}") - return False - elif error_code in ["TIMEOUT_ERROR", "CONNECTION_ERROR", "NETWORK_ERROR"]: - # These might be temporary, suggest fallback - logger.warning(f"[remote_upload] Network-related error ({error_code}): {error_msg}") - logger.warning("[remote_upload] Consider falling back to local mode if this persists") - return False - else: - # Other errors - logger.error(f"[remote_upload] Upload error ({error_code}): {error_msg}") - return False - - except Exception as e: - logger.error(f"[remote_upload] Unexpected error during upload: {e}") - return False - - except Exception as e: - logger.error(f"[remote_upload] Critical error in process_and_upload_changes: {e}") - logger.exception("[remote_upload] Full traceback:") - return False - -def get_remote_config(cli_path: Optional[str] = None) -> Dict[str, str]: - """Get remote upload configuration from environment variables and command-line arguments.""" - # Use command-line path if provided, otherwise fall back to environment variables - if cli_path: - workspace_path = cli_path - else: - workspace_path = os.environ.get("WATCH_ROOT", os.environ.get("WORKSPACE_PATH", "/work")) - - # Use auto-generated collection name based on repo name - repo_name = _extract_repo_name_from_path(workspace_path) - # Fallback to directory name if repo detection fails - if not repo_name: - repo_name = Path(workspace_path).name - collection_name = get_collection_name(repo_name) - - return { - "upload_endpoint": os.environ.get("REMOTE_UPLOAD_ENDPOINT", "http://localhost:8080"), - "workspace_path": workspace_path, - "collection_name": collection_name, - "max_retries": int(os.environ.get("REMOTE_UPLOAD_MAX_RETRIES", "3")), - "timeout": int(os.environ.get("REMOTE_UPLOAD_TIMEOUT", "30")) - } - - -def main(): - """Main entry point for the remote upload client.""" - parser = argparse.ArgumentParser( - description="Remote upload client for delta bundles in Context-Engine", - formatter_class=argparse.RawDescriptionHelpFormatter, - epilog=""" -Examples: - # Upload from current directory or environment variables - python remote_upload_client.py - - # Upload from specific directory - python remote_upload_client.py --path /path/to/repo - - # Upload from specific directory with custom endpoint - python remote_upload_client.py --path /path/to/repo --endpoint http://remote-server:8080 - """ - ) - - parser.add_argument( - "--path", - type=str, - help="Path to the directory to upload (overrides WATCH_ROOT/WORKSPACE_PATH environment variables)" - ) - - parser.add_argument( - "--endpoint", - type=str, - help="Remote upload endpoint (overrides REMOTE_UPLOAD_ENDPOINT environment variable)" - ) - - parser.add_argument( - "--max-retries", - type=int, - help="Maximum number of upload retries (overrides REMOTE_UPLOAD_MAX_RETRIES environment variable)" - ) - - parser.add_argument( - "--timeout", - type=int, - help="Request timeout in seconds (overrides REMOTE_UPLOAD_TIMEOUT environment variable)" - ) - - parser.add_argument( - "--force", - action="store_true", - help="Force upload of all files (ignore cached state and treat all files as new)" - ) - - parser.add_argument( - "--show-mapping", - action="store_true", - help="Print collection↔workspace mapping information and exit" - ) - - parser.add_argument( - "--watch", "-w", - action="store_true", - help="Watch for file changes and upload automatically (continuous mode)" - ) - - parser.add_argument( - "--interval", "-i", - type=int, - default=5, - help="Watch interval in seconds (default: 5)" - ) - - args = parser.parse_args() - - # Validate path if provided - if args.path: - if not os.path.exists(args.path): - logger.error(f"Path does not exist: {args.path}") - return 1 - - if not os.path.isdir(args.path): - logger.error(f"Path is not a directory: {args.path}") - return 1 - - args.path = os.path.abspath(args.path) - logger.info(f"Using specified path: {args.path}") - - # Get configuration - config = get_remote_config(args.path) - - # Override config with command-line arguments if provided - if args.endpoint: - config["upload_endpoint"] = args.endpoint - if args.max_retries is not None: - config["max_retries"] = args.max_retries - if args.timeout is not None: - config["timeout"] = args.timeout - - logger.info(f"Workspace path: {config['workspace_path']}") - logger.info(f"Collection name: {config['collection_name']}") - logger.info(f"Upload endpoint: {config['upload_endpoint']}") - - if args.show_mapping: - with RemoteUploadClient( - upload_endpoint=config["upload_endpoint"], - workspace_path=config["workspace_path"], - collection_name=config["collection_name"], - max_retries=config["max_retries"], - timeout=config["timeout"], - ) as client: - client.log_mapping_summary() - return 0 - - # Handle watch mode - if args.watch: - logger.info("Starting watch mode for continuous file monitoring") - try: - with RemoteUploadClient( - upload_endpoint=config["upload_endpoint"], - workspace_path=config["workspace_path"], - collection_name=config["collection_name"], - max_retries=config["max_retries"], - timeout=config["timeout"] - ) as client: - - logger.info("Remote upload client initialized successfully") - client.log_mapping_summary() - - # Test server connection first - logger.info("Checking server status...") - status = client.get_server_status() - is_success = ( - isinstance(status, dict) and - 'workspace_path' in status and - 'collection_name' in status and - status.get('status') == 'ready' - ) - if not is_success: - error = status.get("error", {}) - logger.error(f"Cannot connect to server: {error.get('message', 'Unknown error')}") - return 1 - - logger.info("Server connection successful") - logger.info(f"Starting file monitoring with {args.interval}s interval") - - # Start the watch loop - client.watch_loop(interval=args.interval) - - return 0 - - except KeyboardInterrupt: - logger.info("Watch mode stopped by user") - return 0 - except Exception as e: - logger.error(f"Watch mode failed: {e}") - return 1 - - # Single upload mode (original logic) - # Initialize client with context manager for cleanup - try: - with RemoteUploadClient( - upload_endpoint=config["upload_endpoint"], - workspace_path=config["workspace_path"], - collection_name=config["collection_name"], - max_retries=config["max_retries"], - timeout=config["timeout"] - ) as client: - - logger.info("Remote upload client initialized successfully") - - client.log_mapping_summary() - - # Test server connection - logger.info("Checking server status...") - status = client.get_server_status() - # For delta endpoint, success is indicated by having expected fields (not a "success" boolean) - is_success = ( - isinstance(status, dict) and - 'workspace_path' in status and - 'collection_name' in status and - status.get('status') == 'ready' - ) - if not is_success: - error = status.get("error", {}) - logger.error(f"Cannot connect to server: {error.get('message', 'Unknown error')}") - return 1 - - logger.info("Server connection successful") - - # Scan repository and upload files - logger.info("Scanning repository for files...") - workspace_path = Path(config['workspace_path']) - - # Find all files in the repository - all_files = [] - for file_path in workspace_path.rglob('*'): - if file_path.is_file() and not file_path.name.startswith('.'): - rel_path = file_path.relative_to(workspace_path) - # Skip .codebase directory and other metadata - if not str(rel_path).startswith('.codebase'): - all_files.append(file_path) - - logger.info(f"Found {len(all_files)} files to upload") - - if not all_files: - logger.warning("No files found to upload") - return 0 - - # Detect changes (treat all files as changes for initial upload) - if args.force: - # Force mode: treat all files as created - changes = {"created": all_files, "updated": [], "deleted": [], "moved": [], "unchanged": []} - else: - changes = client.detect_file_changes(all_files) - - if not client.has_meaningful_changes(changes): - logger.info("No meaningful changes to upload") - return 0 - - logger.info(f"Changes detected: {len(changes.get('created', []))} created, {len(changes.get('updated', []))} updated, {len(changes.get('deleted', []))} deleted") - - # Process and upload changes - logger.info("Uploading files to remote server...") - success = client.process_changes_and_upload(changes) - - if success: - logger.info("Repository upload completed successfully!") - logger.info(f"Collection name: {config['collection_name']}") - logger.info(f"Files uploaded: {len(all_files)}") - else: - logger.error("Repository upload failed!") - return 1 - - return 0 - - except Exception as e: - logger.error(f"Failed to initialize remote upload client: {e}") - return 1 - - -if __name__ == "__main__": - import sys - sys.exit(main()) From 5e384f4a44e533b1f78cbe646eed4a13a8868bdb Mon Sep 17 00:00:00 2001 From: Reese Date: Sat, 22 Nov 2025 14:25:18 +0000 Subject: [PATCH 2/2] feat(vscode-ext): add optional Python dependency bundling to build process - Add `--bundle-deps` flag to build scripts for bundling Python dependencies into VSIX - Update Dockerfile to support BUNDLE_DEPS build argument and install Python/pip - Modify build.sh and build.bat to optionally install requests/urllib3/charset_normalizer into python_libs - Configure extension.js to automatically detect bundled python_libs and set PYTHONPATH - Add Build.md documentation for build arguments --- vscode-extension/build/Build.md | 2 ++ vscode-extension/build/Dockerfile | 12 +++++++----- vscode-extension/build/build.bat | 16 ++++++++++++++++ vscode-extension/build/build.sh | 8 ++++++++ .../context-engine-uploader/extension.js | 10 ++++++++++ 5 files changed, 43 insertions(+), 5 deletions(-) create mode 100644 vscode-extension/build/Build.md diff --git a/vscode-extension/build/Build.md b/vscode-extension/build/Build.md new file mode 100644 index 00000000..6f3b441f --- /dev/null +++ b/vscode-extension/build/Build.md @@ -0,0 +1,2 @@ +Args: +bundle-deps # Include python dependencies in the vsix \ No newline at end of file diff --git a/vscode-extension/build/Dockerfile b/vscode-extension/build/Dockerfile index e591fbbc..57760c2c 100644 --- a/vscode-extension/build/Dockerfile +++ b/vscode-extension/build/Dockerfile @@ -1,17 +1,19 @@ -# Docker build for clean VSCode extension +# Docker build for VSCode extension FROM node:18-alpine -# Install bash/coreutils for staging logic and vsce for packaging -RUN apk add --no-cache bash coreutils \ +ARG BUNDLE_DEPS=false + +# Install bash/coreutils and Python for staging logic and optional dependency bundling, plus vsce for packaging +RUN apk add --no-cache bash coreutils python3 py3-pip \ && npm install -g @vscode/vsce # Copy entire repository into the image WORKDIR /workspace COPY ../.. /workspace -# Run the shared build script to produce a clean VSIX into /workspace/vscode-extension/out +# Run the shared build script to produce a VSIX into /workspace/vscode-extension/out WORKDIR /workspace/vscode-extension/build -RUN bash build.sh +RUN if [ "$BUNDLE_DEPS" = "true" ]; then bash build.sh --bundle-deps; else bash build.sh; fi # Expose the output directory as the final working directory WORKDIR /workspace/vscode-extension/out \ No newline at end of file diff --git a/vscode-extension/build/build.bat b/vscode-extension/build/build.bat index cfb6f5dc..8696ca5d 100644 --- a/vscode-extension/build/build.bat +++ b/vscode-extension/build/build.bat @@ -2,6 +2,11 @@ setlocal EnableExtensions pushd "%~dp0" +set "BUNDLE_DEPS=0" +set "PYTHON_BIN=%PYTHON_BIN%" +if "%PYTHON_BIN%"=="" set "PYTHON_BIN=python" +if /I "%1"=="bundle-deps" set "BUNDLE_DEPS=1" + for %%I in ("..\context-engine-uploader") do set "EXT_DIR=%%~fI" for %%I in ("..\out") do set "OUT_DIR=%%~fI" for %%I in ("..\..\scripts\standalone_upload_client.py") do set "SRC_SCRIPT=%%~fI" @@ -50,6 +55,17 @@ if errorlevel 1 ( goto cleanup ) +REM Optional: bundle Python dependencies into the staged extension when requested +if "%BUNDLE_DEPS%"=="1" ( + echo Bundling Python dependencies into staged extension using %PYTHON_BIN%... + "%PYTHON_BIN%" -m pip install -t "%STAGE_DIR%\python_libs" requests urllib3 charset_normalizer + if errorlevel 1 ( + echo Failed to install Python dependencies into staged extension. + set "BUILD_RESULT=1" + goto cleanup + ) +) + pushd "%STAGE_DIR%" echo Packaging extension... npx @vscode/vsce package --no-dependencies --out "%OUT_DIR%" diff --git a/vscode-extension/build/build.sh b/vscode-extension/build/build.sh index 4e8bf797..783832f3 100644 --- a/vscode-extension/build/build.sh +++ b/vscode-extension/build/build.sh @@ -7,6 +7,8 @@ OUT_DIR="$SCRIPT_DIR/../out" SRC_SCRIPT="$SCRIPT_DIR/../../scripts/standalone_upload_client.py" CLIENT="standalone_upload_client.py" STAGE_DIR="$OUT_DIR/extension-stage" +BUNDLE_DEPS="${1:-}" +PYTHON_BIN="${PYTHON_BIN:-python3}" cleanup() { rm -rf "$STAGE_DIR" @@ -32,6 +34,12 @@ cp -a "$EXT_DIR/." "$STAGE_DIR/" cp "$OUT_DIR/$CLIENT" "$STAGE_DIR/$CLIENT" chmod +x "$STAGE_DIR/$CLIENT" +# Optional: bundle Python deps into the staged extension when requested +if [[ "$BUNDLE_DEPS" == "--bundle-deps" ]]; then + echo "Bundling Python dependencies into staged extension using $PYTHON_BIN..." + "$PYTHON_BIN" -m pip install -t "$STAGE_DIR/python_libs" requests urllib3 charset_normalizer +fi + pushd "$STAGE_DIR" >/dev/null echo "Packaging extension..." npx @vscode/vsce package --no-dependencies --out "$OUT_DIR" diff --git a/vscode-extension/context-engine-uploader/extension.js b/vscode-extension/context-engine-uploader/extension.js index 42c4a47c..d6cd6119 100644 --- a/vscode-extension/context-engine-uploader/extension.js +++ b/vscode-extension/context-engine-uploader/extension.js @@ -391,6 +391,16 @@ function buildChildEnv(options) { } if (options.containerRoot) { env.CONTAINER_ROOT = options.containerRoot; + } + try { + const libsPath = path.join(options.workingDirectory, 'python_libs'); + if (fs.existsSync(libsPath)) { + const existing = process.env.PYTHONPATH || ''; + env.PYTHONPATH = existing ? `${libsPath}${path.delimiter}${existing}` : libsPath; + log(`Detected bundled python_libs at ${libsPath}; setting PYTHONPATH for child process.`); + } + } catch (error) { + log(`Failed to configure PYTHONPATH for bundled deps: ${error instanceof Error ? error.message : String(error)}`); } return env; }