libssh2-1-1.11.0-150000.4.22.1<>,He p9|NW6W#O4B`T=hXLm *j\1[Y??SJGo&E]3C9Ta> o 7/cD; $i0rZ ڰcޥT5.L?9zM]h?$Wó?=vYuy?ixD!՗(Nsj{76;N>v0*gv#$BzA}v[ܶP&~t$#Ժ݁>il[Ε"\>@I?Id  ! J ,0Ijw     . @HR\f(89:/>F@FFFGFHFIFXFYF\G]G^G.bG:cGdHaeHffHilHkuHvHwIxI$yI, zIPI`IdIjIClibssh2-11.11.0150000.4.22.1A library implementing the SSH2 protocollibssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.e h02-armsrv3(SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Development/Libraries/C and C++https://www.libssh2.org/linuxaarch64(ee63105374bdd81e6b90635a57c37dab2dbae323ec56e56f2cb9f77cf60f7686e1libssh2.so.1.0.1rootrootrootrootlibssh2_org-1.11.0-150000.4.22.1.src.rpmlibssh2-1libssh2-1(aarch-64)libssh2.so.1()(64bit)@@@@@@@@    /sbin/ldconfig/sbin/ldconfigld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.25)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1ee;d@daA@_@_G@]@\\@\MZ]@YTYA%@VIUzU.@otto.hollmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comdavid.anes@suse.compmonreal@suse.comdimstar@opensuse.orgpmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comdimstar@opensuse.orgjengelh@inai.detchvatal@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.com- Security fix: [bsc#1218127, CVE-2023-48795] * Add 'strict KEX' to fix CVE-2023-48795 "Terrapin Attack" * Add libssh2_org-CVE-2023-48795.patch- Upgrade to version 1.11.0 in SLE-15: [jsc#PED-7040] * Add the keyring file: libssh2_org.keyring * Rebase libssh2-ocloexec.patch * Remove libssh2_org-CVE-2020-22218.patch- Security fix: [bsc#1214527, CVE-2020-22218] * The function _libssh2_packet_add() allows to access out of bounds memory. * Add libssh2_org-CVE-2020-22218.patch- Update to 1.11.0: * Enhancements and bugfixes - Adds support for encrypt-then-mac (ETM) MACs - Adds support for AES-GCM crypto protocols - Adds support for sk-ecdsa-sha2-nistp256 and sk-ssh-ed25519 keys - Adds support for RSA certificate authentication - Adds FIDO support with *_sk() functions - Adds RSA-SHA2 key upgrading to OpenSSL, WinCNG, mbedTLS, OS400 backends - Adds Agent Forwarding and libssh2_agent_sign() - Adds support for Channel Signal message libssh2_channel_signal_ex() - Adds support to get the user auth banner message libssh2_userauth_banner() - Adds LIBSSH2_NO_{MD5, HMAC_RIPEMD, DSA, RSA, RSA_SHA1, ECDSA, ED25519, AES_CBC, AES_CTR, BLOWFISH, RC4, CAST, 3DES} options - Adds direct stream UNIX sockets with libssh2_channel_direct_streamlocal_ex() - Adds wolfSSL support to CMake file - Adds mbedTLS 3.x support - Adds LibreSSL 3.5 support - Adds support for CMake "unity" builds - Adds CMake support for building shared and static libs in a single pass - Adds symbol hiding support to CMake - Adds support for libssh2.rc for all build tools - Adds .zip, .tar.xz and .tar.bz2 release tarballs - Enables ed25519 key support for LibreSSL 3.7.0 or higher - Improves OpenSSL 1.1 and 3 compatibility - Now requires OpenSSL 1.0.2 or newer - Now requires CMake 3.1 or newer - SFTP: Adds libssh2_sftp_open_ex_r() and libssh2_sftp_open_r() extended APIs - SFTP: No longer has a packet limit when reading a directory - SFTP: now parses attribute extensions if they exist - SFTP: no longer will busy loop if SFTP fails to initialize - SFTP: now clear various errors as expected - SFTP: no longer skips files if the line buffer is too small - SCP: add option to not quote paths - SCP: Enables 64-bit offset support unconditionally - Now skips leading \r and \n characters in banner_receive() - Enables secure memory zeroing with all build tools on all platforms - No longer logs SSH_MSG_REQUEST_FAILURE packets from keepalive - Speed up base64 encoding by 7x - Assert if there is an attempt to write a value that is too large - WinCNG: fix memory leak in _libssh2_dh_secret() - Added protection against possible null pointer dereferences - Agent now handles overly large comment lengths - Now ensure KEX replies don't include extra bytes - Fixed possible buffer overflow when receiving SSH_MSG_USERAUTH_BANNER - Fixed possible buffer overflow in keyboard interactive code path - Fixed overlapping memcpy() - Fixed Windows UWP builds - Fixed DLL import name - Renamed local RANDOM_PADDING macro to avoid unexpected define on Windows - Support for building with gcc versions older than 8 - Improvements to CMake, Makefile, NMakefile, GNUmakefile, autoreconf files - Restores ANSI C89 compliance - Enabled new compiler warnings and fixed/silenced them - Improved error messages - Now uses CIFuzz - Numerous minor code improvements - Improvements to CI builds - Improvements to unit tests - Improvements to doc files - Improvements to example files - Removed "old gex" build option - Removed no-encryption/no-mac builds - Removed support for NetWare and Watcom wmake build files * Rebase libssh2-ocloexec.patch- Bump to version 1.10.0 Enhancements and bugfixes: * support ECDSA certificate authentication * fix detailed _libssh2_error being overwritten by generic errors * unified error handling * fix _libssh2_random() silently discarding errors * don't error if using keys without RSA * avoid OpenSSL latent error in FIPS mode * fix EVP_Cipher interface change in openssl 3 * fix potential overwrite of buffer when reading stdout of command * use string_buf in ecdh_sha2_nistp() to avoid attempting to parse malformed data * correct a typo which may lead to stack overflow * fix random big number generation to match openssl * added key exchange group16-sha512 and group18-sha512. * add support for an OSS Fuzzer fuzzing target * adds support for ECDSA for both key exchange and host key algorithms * clean up curve25519 code * update the min, preferred and max DH group values based on RFC 8270. * changed type of LIBSSH2_FX_* constants to unsigned long * added diffie-hellman-group14-sha256 kex * fix for use of uninitialized aes_ctr_cipher.key_len when using HAVE_OPAQUE_STRUCTS, regression * fixes memory leaks and use after free AES EVP_CIPHER contexts when using OpenSSL 1.0.x. * fixes crash with delayed compression option using Bitvise server. * adds support for PKIX key reading * use new API to parse data in packet_x11_open() for better bounds checking. * double the static buffer size when reading and writing known hosts * improved bounds checking in packet_queue_listener * improve message parsing (CVE-2019-17498) * improve bounds checking in kex_agree_methods() * adding SSH agent forwarding. * fix agent forwarding message, updated example. * added integration test code and cmake target. Added example to cmake list. * don't call `libssh2_crypto_exit()` until `_libssh2_initialized` count is down to zero. * add an EWOULDBLOCK check for better portability * fix off by one error when loading public keys with no id * fix use-after-free crash on reinitialization of openssl backend * preserve error info from agent_list_identities() * make sure the error code is set in _libssh2_channel_open() * fixed misspellings * fix potential typecast error for `_libssh2_ecdsa_key_get_curve_type` * rename _libssh2_ecdsa_key_get_curve_type to _libssh2_ecdsa_get_curve_type - Rebased patch libssh2-ocloexec.path - Removed patch libssh2_org-CVE-2019-17498.patch: the security fix is already included in the latest version.- Version update to 1.9.0: [bsc#1178083, jsc#SLE-16922] Enhancements and bugfixes: * adds ECDSA keys and host key support when using OpenSSL * adds ED25519 key and host key support when using OpenSSL 1.1.1 * adds OpenSSH style key file reading * adds AES CTR mode support when using WinCNG * adds PEM passphrase protected file support for Libgcrypt and WinCNG * adds SHA256 hostkey fingerprint * adds libssh2_agent_get_identity_path() and libssh2_agent_set_identity_path() * adds explicit zeroing of sensitive data in memory * adds additional bounds checks to network buffer reads * adds the ability to use the server default permissions when creating sftp directories * adds support for building with OpenSSL no engine flag * adds support for building with LibreSSL * increased sftp packet size to 256k * fixed oversized packet handling in sftp * fixed building with OpenSSL 1.1 * fixed a possible crash if sftp stat gets an unexpected response * fixed incorrect parsing of the KEX preference string value * fixed conditional RSA and AES-CTR support * fixed a small memory leak during the key exchange process * fixed a possible memory leak of the ssh banner string * fixed various small memory leaks in the backends * fixed possible out of bounds read when parsing public keys from the server * fixed possible out of bounds read when parsing invalid PEM files * no longer null terminates the scp remote exec command * now handle errors when diffie hellman key pair generation fails * improved building instructions * improved unit tests - Rebased patches: * libssh2-ocloexec.patch * libssh2_org-CVE-2019-17498.patch - Remove patches fixed in this version: libssh2_org-CVE-2019-3855.patch libssh2_org-CVE-2019-3856.patch libssh2_org-CVE-2019-3857.patch libssh2_org-CVE-2019-3858.patch libssh2_org-CVE-2019-3859.patch libssh2_org-CVE-2019-3859-fix.patch libssh2_org-CVE-2019-3860.patch libssh2_org-CVE-2019-3861.patch libssh2_org-CVE-2019-3862.patch libssh2_org-CVE-2019-3863.patch- Drop man and groff BuildRequires: both are no longer used in current versions.- Security fix: [bsc#1154862, CVE-2019-17498] * The SSH_MSG_DISCONNECT:packet.c logic has an integer overflow in a bounds check that might lead to disclose sensitive information or cause a denial of service * Add patch libssh2_org-CVE-2019-17498.patch- Fix upstream patch for CVE-2019-3859 [bsc#1133528, bsc#1130103] - Added libssh2_org-CVE-2019-3859-fix.patch- Version update to 1.8.2: [bsc#1130103] Bug fixes: * Fixed the misapplied userauth patch that broke 1.8.1 * moved the MAX size declarations from the public header- Security fixes: * [bsc#1128471, CVE-2019-3855] Possible integer overflow in transport read allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3855.patch * [bsc#1128472, CVE-2019-3856] Possible integer overflow in keyboard interactive handling allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3856.patch * [bsc#1128474, CVE-2019-3857] Possible integer overflow leading to zero-byte allocation and out-of-bounds with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3857.patch * [bsc#1128476, CVE-2019-3858] Possible zero-byte allocation leading to an out-of-bounds read with a specially crafted SFTP packet - libssh2_org-CVE-2019-3858.patch * [bsc#1128480, CVE-2019-3859] Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev - libssh2_org-CVE-2019-3859.patch * [bsc#1128481, CVE-2019-3860] Out-of-bounds reads with specially crafted SFTP packets - libssh2_org-CVE-2019-3860.patch * [bsc#1128490, CVE-2019-3861] Out-of-bounds reads with specially crafted SSH packets - libssh2_org-CVE-2019-3861.patch * [bsc#1128492, CVE-2019-3862] Out-of-bounds memory comparison with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3862.patch * [bsc#1128493, CVE-2019-3863] Integer overflow in user authenicate keyboard interactive allows out-of-bounds writes with specially crafted keyboard responses - libssh2_org-CVE-2019-3863.patch- Drop openssh BuildRequires: this is only used for one of the minor self-tests.- Remove --with-pic which is only for static libs- Version update to 1.8.0: * support openssl-1.1 * many bugfixes - Fixes bsc#1042660 - Remove obsolete conditionals that are no longer needed- update to 1.7.0 * Fixes CVE-2016-0787 (boo#967026) * Changes: libssh2_session_set_last_error: Add function mac: Add support for HMAC-SHA-256 and HMAC-SHA-512 WinCNG: support for SHA256/512 HMAC kex: Added diffie-hellman-group-exchange-sha256 support OS/400 crypto library QC3 support * and many bugfixes- update to 1.6.0 Changes: Added CMake build system Added libssh2_userauth_publickey_frommemory() Bug fixes: wait_socket: wrong use of difftime() userauth: Fixed prompt text no longer being copied to the prompts struct mingw build: allow to pass custom CFLAGS Let mansyntax.sh work regardless of where it is called from Init HMAC_CTX before using it direct_tcpip: Fixed channel write WinCNG: fixed backend breakage OpenSSL: caused by introducing libssh2_hmac_ctx_init userauth.c: fix possible dereferences of a null pointer wincng: Added explicit clear memory feature to WinCNG backend openssl.c: fix possible segfault in case EVP_DigestInit fails wincng: fix return code of libssh2_md5_init() kex: do not ignore failure of libssh2_sha1_init() scp: fix that scp_send may transmit not initialised memory scp.c: improved command length calculation nonblocking examples: fix warning about unused tvdiff on Mac OS X configure: make clear-memory default but WARN if backend unsupported OpenSSL: Enable use of OpenSSL that doesn't have DSA OpenSSL: Use correct no-blowfish #define kex: fix libgcrypt memory leaks of bignum libssh2_channel_open: more detailed error message wincng: fixed memleak in (block) cipher destructor- update to 1.5.0 * fixes CVE-2015-1782 (bnc#921070) - tarball verification * added libssh2_org.keyring * added libssh2-1.5.0.tar.gz.asc Changes in 1.5.0: Added Windows Cryptography API: Next Generation based backend Bug fixes: Security Advisory: Using `SSH_MSG_KEXINIT` data unbounded, CVE-2015-1782 missing _libssh2_error in _libssh2_channel_write knownhost: Fix DSS keys being detected as unknown. knownhost: Restore behaviour of `libssh2_knownhost_writeline` with short buffer. libssh2.h: on Windows, a socket is of type SOCKET, not int libssh2_priv.h: a 1 bit bit-field should be unsigned windows build: do not export externals from static library Fixed two potential use-after-frees of the payload buffer Fixed a few memory leaks in error paths userauth: Fixed an attempt to free from stack on error agent_list_identities: Fixed memory leak on OOM knownhosts: Abort if the hosts buffer is too small sftp_close_handle: ensure the handle is always closed channel_close: Close the channel even in the case of errors docs: added missing libssh2_session_handshake.3 file docs: fixed a bunch of typos userauth_password: pass on the underlying error code _libssh2_channel_forward_cancel: accessed struct after free _libssh2_packet_add: avoid using uninitialized memory _libssh2_channel_forward_cancel: avoid memory leaks on error _libssh2_channel_write: client spins on write when window full windows build: fix build errors publickey_packet_receive: avoid junk in returned pointers channel_receive_window_adjust: store windows size always userauth_hostbased_fromfile: zero assign to avoid uninitialized use configure: change LIBS not LDFLAGS when checking for libs agent_connect_unix: make sure there's a trailing zero MinGW build: Fixed redefine warnings. sftpdir.c: added authentication method detection. Watcom build: added support for WinCNG build. configure.ac: replace AM_CONFIG_HEADER with AC_CONFIG_HEADERS sftp_statvfs: fix for servers not supporting statfvs extension knownhost.c: use LIBSSH2_FREE macro instead of free Fixed compilation using mingw-w64 knownhost.c: fixed that 'key_type_len' may be used uninitialized configure: Display individual crypto backends on separate lines examples on Windows: check for WSAStartup return code examples on Windows: check for socket return code agent.c: check return code of MapViewOfFile kex.c: fix possible NULL pointer de-reference with session->kex packet.c: fix possible NULL pointer de-reference within listen_state tests on Windows: check for WSAStartup return code userauth.c: improve readability and clarity of for-loops examples on Windows: use native SOCKET-type instead of int packet.c: i < 256 was always true and i would overflow to 0 kex.c: make sure mlist is not set to NULL session.c: check return value of session_nonblock in debug mode session.c: check return value of session_nonblock during startup userauth.c: make sure that sp_len is positive and avoid overflows knownhost.c: fix use of uninitialized argument variable wrote openssl: initialise the digest context before calling EVP_DigestInit() libssh2_agent_init: init ->fd to LIBSSH2_INVALID_SOCKET configure.ac: Add zlib to Requires.private in libssh2.pc if using zlib configure.ac: Rework crypto library detection configure.ac: Reorder --with-* options in --help output configure.ac: Call zlib zlib and not libz in text but keep option names Fix non-autotools builds: Always define the LIBSSH2_OPENSSL CPP macro sftp: seek: Don't flush buffers on same offset sftp: statvfs: Along error path, reset the correct 'state' variable. sftp: Add support for fsync (OpenSSH extension). _libssh2_channel_read: fix data drop when out of window comp_method_zlib_decomp: Improve buffer growing algorithm _libssh2_channel_read: Honour window_size_initial window_size: redid window handling for flow control reasons knownhosts: handle unknown key types/sbin/ldconfig/sbin/ldconfigh02-armsrv3 17030640741.11.0-150000.4.22.11.11.0-150000.4.22.1libssh2.so.1libssh2.so.1.0.1/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:31955/SUSE_SLE-15_Update/4690c3e3ef3d5589f213a6b5fa521482-libssh2_org.SUSE_SLE-15_Updatedrpmxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=0c9a7eb15b752d2204e5cd0b126a3eae1e30a694, stripped PRRRRR RRRAg3_@6(utf-8ab09feaa95842dd7504ceaddd57ae5a1b5015b8a1892009adfac408afeadda6b?7zXZ !t/d@]"k%]d涻eQQG^"*@8sX=:>j-.;w1Èc[[}Jc1Hmyi8n<$iX$o?7U {R}aF<xxI\Xoeᕵk[uLOF99u8'iK= I<ŖX%,Ĝ>ꩌs\AB^,p$ClZCA5&șe+`OƎ&PᏡQګpbTܿExNnKa8 vz3}$͞C pje办 j-0BHoܮ8@1֠Ue@ZλtYhO#z\+!T9\)8?J?YCXG?+~X}Mf|5ȝq:lގ\-Td~l":: opp!ȆHr}jXfI_;[S:nE3$=)q$W$''l3'sL$ (\N!ǍpFLtښȈHނ`xP3LPnAQ:l){ݗuHx2- p]wzlQN2- WJ7T+<>J VG[S. >Ԯ2d^hZI嵧IUOkG8F_H }-3lf, #!;[ Cke>sX8'UkN]U.yoK^<~ ;zRYW):+pǧ;A1Gh;T#wΆ3i-ӆNvͽ:#6CDEסė^ \SSAfTi; TX ~ߓm_v6Igew[?fD_ZORw9[Q={E0\O1\}5\=\vW[W`.K#IHIM+b.JzE]yr`0-/JKN@٧|lPC;&1oSC :.48*!`{jz 3qCr)@m'Nk4) C`a"3CanU_7ct4yB0R{~~Ү-Փi!,(B~>{d߻ f@"! bS?cazNte^ gCa4N;hRWH> Ibu,0yǁ;tl 88T>z(~ {T; Q&$0I]}DRN!'FCZN|\w\{N]`!0lX}5 F, #gGH|u4OA'z:hj-*ͮ5f{S7 !Td~ pJ>2p=@KIQu5-M_.6j+&k%X)T*xX˨$:NuY Ғ 3qYUV"$>IH ?Vرou-O6&6`8no¯~KzXԛAH\6dǹvz}Y=N#^;M0Yp4Sc(l'lrIēB׻O bi3_TP _rrc4r2^:I^$L+d ']t7q~N+ /y{+gygl:CGJ_vD3i`W){BhK!s?x}W\L/XE붿 WjCg강{Lw&siafuX_-sKp$Q*Ea%a[F C]+b*ޤ2Ǿd}]nدT> .2-II)7Y"zvN$woqOds1} Avʤu´ $TmS7dDuIK.ۨy%4uKXI3xOgmT\j$M'X#4p*XC\C@Ets:2pS0$8jjwݐ7 */V5bR[pIϽúwOMwq Çs@7pd[BHuf۝BW}bgrWD\MGzAWd ȧCmB%ԲCm'_a,Ηq#sEhz`JoL%Ao5CVƜ| cSČ=FSM;&\:~{aos`@&vy(1dWi`z#$7]!k 2)~[R#3fi&m!vbYuIT(/uN=í _,T:fເ}J%^[D+J|E9X|άծ໔ 3sfi8"_h(vug܊2عBP깧`sn-9E#? yoIS'Ux*n:TWaCu64`66^"gDJ-nc7R,įmugz3(ow~8t5QE70?(޳ V XR!l>U!_'m^~~å̲mŢ_eBR3r`d@wn1/!,XJsZ1Vyh~i.\ap[LUH?X:bVQ W$ qoi_4O`u 1ЬbQ0c)]cql"iNjt98dZf}-k,r,+6kd5덌z/ A6jѻ#-dcVwʞ'e>)*sZ٬r%2 jZ0Sq@skt[8R"Ll`sm*9>.@К˝Ad~rZt\^T?AO Uݷd"%eCJ'2@Җ/ n_1eus Ҥ8 &R/؝C V;,, e-'VJ|PT,hU"yg5˅bjpoZMBZUV?oFSwRM/.1C-(=gѝGLVr;,XM66.s c+3ϗ䙺r*E#5Y+^ j˴$8qsV#^*O(XNhjn+Kʦ{2d >S *\av R:umb7wu,Mȷ-ݙ~˞u;uz*7}O'5A4Ks(LN OG)fn fXk I Dj*M3CgrR䞍Y80sy쌙!lXa$ɪ[i1( վliE`t0rF3 }]F_qѕWJh^ES.KkFR.qsSOCя`?eW9 ;+Y5LEyi r*VF;oi `S2= u77zm?3KĀPZྐ(7ͺOxL_Ո&̴thyYov&锯K0غߺ^1K˾>eoLc6K~ G9sb 􌢆Z.DBծ OɬAB'Cg .Dp>Xߪ_O#Āx5Dv+ 8nH0k6#8UjB(=gEKЌTg/p,')bŤ!uܑq 7xWk5I-?K0"ŭRlJ(p"&YTW GpTbn\DLL_9@;E]4cDYш0Dsq)Fƒu5\(y]ŀJH\7hb{;J=Vf$^2āUϮgpz,9" 3M5"Dѵ(.@Z¨ VOӥץAB~[8l_夒D1`7:u~T{ Ssv̠7=:t<((nȪiQIC2iDMoQZIœթ%җbL0^bm`:a@.9h{'G"6AUb) {M%-T^U8YgJ#{Gc[f:*}d\"uT7}/9*XÊ]33G mt q+v!C~6ui ⴚZ**aDPjY X2mmx'[Dٮl(eHlr>v2 1)Zq9-X80oe_vl-6cz-Qkd498vŤILAk+\J{4)EߣG4íZ 1?qsB|ßR)iMZܿS넼S1@`}@=-mqϪA[!4.]zTZ}"ZID4^v_el ÜۋM`|-d:%4e;A['3ou`Nƽ1yuMyyŎ"48 ZWt3X遮f, @WS;t qyo\^AH ﴐ?{ G)HhI6&TֳS߬ql1ŨM=u*уK2ŝZ ʦ sZ#؝'V3auOC3`=EA5-JXg/ Ke :ABmtt! t~>{o/Z#Y*iYT&G;yqZ@N1EKHe-TmH=(Iy&A,=vx P9L%* 7L~ɅUǰL <GQs±/s{" 1)>|nsj&SA焤f$n L& |gtڄ F?oz")[ݼ.+l\F}b~Iu;6-`aSGW 7#8!X:_8\>n\-уt'+6UZD#5w-`x@8rdCȚT CI@"`D>dk V½o)=ݔǍza=) X]s8JP3ƀXD!|/׼UHzf3u0^$0,,ָ 'PsUu c'i!8kE4s\AxC{^SF^PIIxKn. ߍx"YgH 0nG>.L_V,K&p_|(Gbڪ&a/fyK d$TS̉@B c*mO^81)ڂ/6wwMW]r)E8"?1o\r<ZR9 lqur6-r-6?a^|ڸGh\{#t^}c!ߡ[l=╿g (1}OVH,=0cEC"HR}U|m,L1 Gp;)S\@@Em +@:؎sݟetBǑ%ܸhB*e+ 5zzt{xj0>q`XC}.0l_;~v磠)Ao$29m#Qa*dyx׷lf 4_'rL*Wk^ f[a д j JCmH);1(M lg@9~u2QQ1z,z8tv㧤)L$H:Vra(ά9hԦ`c9tѴ+u ÝP4mYr|OS0uom#*T*{t[ދ*s$}J)8B.u۟R ]]Oh(W`a~:^VD!c1BTN^< q.D9yI;X]#7\ɥmE9զc@, 4<&Y9llF ZϘRҬٞBoRz3SUl1Pi!ލl3Ma%ݪZ> _ Li O9/Q'+H-+UDo&k:yk]2~X;|Mi0/>*zWbP]W!5A^4xu겲42aOtلAUzAHa,]10Γ/i4$aM y0#DCX;) Ttt޸Gs}VGO@-9?X*Ґg78mq:Чˑ!$;I.qK6N wm~UpDXEY> }u墡"E%a6։j[i~+k`c- (B?Y{|e%aӾtiF(7DqozA2zVuBJ61@渾eA(GNg1F2֩i| )`/tІaBKɪRt9r6cl.M`x`=f_ zX2FkXB_;z~ T˟5]*I ӿСP1~7Dς1!9͜&:oĭe3,9D[k)>ŝIʚw[4 ȥ|G#Kq#ѱ]8n͢V6F,+볹F*^7`RNP@m=TW`- ` p$Mڊ0@ E ^a\'`6=N^waKT.6i/=丒Q>R XWߖn+X(܋`qx!"T'ED`8nåwdž5;G,_IW"a8#z4cc6E\Fi n{rd (])ΚgM 5Ul 2șe e8rNsL;riQw3}`5 < ;50)h~8b VJZвM[1^Dnhcc|Dd-qy΁cu@~*OuI'^팟=[y܆,mAuJ;hVRnퟅWotalL3wq_-(eH3FABEk֡@o^;lhmrJfVjml=ͳN^+ 81Gw7Uy#-|\YeX?Ksi#:%00N!o̘J9%a5~;4R3=c왟bstDX+JVmٝ14!9o*ikIzL^&Orw=wThm)9XYQn@"Pl~)8p>TiV p)e^1x/\9ЊCFs|A> XE}I jR#\p 6N~.yYp%V^a?*:z?BOx/TQoX5eU!.Qup]j<2"`Ctgi{~ oj M7V<aWoN[ T}@5fH:iC8M tUmv[ >C_;,2哔]{u?%dzU|>5%*V)yS@y)Xnմ{7m/`cTܼ`MB =En-r+Bk;wg" I;\Qߍs^7tl;AJjݓKqd_N\K^ra'YA@_:ϓ&XUD#QrXrEK(J):fYVJuV2lweX"f~oc΢ɒKQIa?jlB}nX,ɰ_s{<[zZMʽ DJ~H>0Bup̈M , ~ 4\34[xn4 Cm7G ]wFKvZ` L"ueg.-"CUOW͎4X4]2cv^v^MIY ϋ+E!i(__f!N{X2580_}&-~6L.i|r|˷q3%tj89'.kk .Bmi&'%ObӋbَ}%z,ܳR?΂|6#,ZbvIT;#\"*i(k !Z7ΐقf2$3SCO' ,e@<+g e+=fR0;myb~A6]pTH<4,aVOa(Df޺nIڄ׍?fr;62qYؖG3yZTqkxy q-•'YI*aq^uj7A<ȝ 0VsϡOD{dBjϹ*)MI^yGѰ'ɔ,ǠuL/J]b>؅~CX8ʑ˴Uh%M/OBG,*g>4 ,Am!Zq\ıG^*M6%݈pqrP:MLZ&W )?D|6w_F}]֘/_74, yH}댪bT&6:lpMwl 9p%ʭB55M/j`mČ'|(tZU,5¢ +;/Zr&v<ԛs@ "r-[.FB:jҴmBbA4ne COQVU3X E El}2:a'ʳ]|=:ϑ ipyړ7kF)hF\!홟^c%4_JЕ]ט;`X7?7vpαEHle>;{& q8wWp/&\e_[mm KoVDLZmz!.Mڷ~42L^^de]yJP@P<Y94(k2I`Cl?VZ:Ј4Aw=s*EPj 5q\ٸ+QƳ)p+SS(Y%K4/GwIJ+w] _69& cRz9ңI#T$id{q%2\?~BlKb''! .juuPO\ys?1i7Vuf*ƙuB $fZX9oߋJ,2Qź4jk&"U#tJp7.Z 3E-zaG瓬 TXOvt`b#eV17vtɉ $B)}9A0Lՙ tfH5Ž'X\ M"y٥r+h"qp[sU09yyb$#F oVZ(FG,1G|WJ,.P߷yCd J#kbO[p4%/^jST0b6()m_H[Sl3рe# YZ