libssh4-0.9.8-150400.3.6.1<>,xe p9|sJ9#QG` %=%XERz3p* kB~շȇwf'pj@u֠Yjұ7o7+A#gǖGW6t38dS,UsM@vv3tn_琹jP|]rLwto Aqxt)eT?QeeO i#m7$S6qlItHyȘ(y0% az_ij1SnhDh?v>@A?Ad   ) .4<T ` l   0l-(d8l+9 +: F+>=$@=3F=BG=XH=pI=X=Y=\=]=^>1b>wc? d?e?f?l?u?v?w@|x@y@zA A0A4A:A|Clibssh40.9.8150400.3.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)e s390zp34SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxs390xLcA큤eee b;eyb;570ce4059914fd88c114604c294e6fdc44d3cd159c57fbd13016f486295203b595b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150400.3.6.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(s390-64)@@@@@@@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld64.so.1()(64bit)ld64.so.1(GLIBC_2.3)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1d)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@adam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigs390zp34 17093068890.9.8-150400.3.6.10.9.8-150400.3.6.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32835/SUSE_SLE-15-SP4_Update/9850c19a44a9b3ec779ffbc6155eaab2-libssh.SUSE_SLE-15-SP4_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=96485e93f624a433161a62b427f4e425300e7daf, strippeddirectoryASCII textPPPPPPPPPPRRRR RR R R RR RRRRRRRRR׼בEh>WXutf-82778da444b7fa53be181c1316109ca3cb10ab14c8f42bec220f5fbe1ee9e22d6?7zXZ !t/]KE]"k%{U}d涻L,%:ޱѰѡe|5W!uf)Ȳ6u~|o@>~?#,EIɮ/6uk.IV7e^ꪏN^= q+VE~Fk"q0Ϯ ("/=NE[,?" g%'JH&C ݟcG|-Nm% ql҆Sh5S{j!pee@ 5o-Q[3+!+ݝۉł̷ 'r.%т9c.Ȱs%Y7JI GlVk 0jH8mA$hQ/Gq Ļc Zƫ7'S׋l[mDMk1y$@9H}777MɯߜɨdaЅz4ɳQ:GE͸6BsByt;FNxIcmR ^aɗ(e~ezS+l7[9Ë}*m'Z*"&டbb=RϋlbJq~zh$PW ~[oؽL*O0PGhmAE\;u"~.K ;35:_VB8iJ\E@˭r! rXGmpzC=aRIsh{p)l0AU&LM;lohnL]د$?\"ZϏ`XlևoB\j׭3}'L;w`xEHAHiuHǚFcnųirɘFFI޷#mRYoKa jLr:^aihzv tPݟ?UݿLo鉙Ԅ7Ib eBk [!huI2f@:fؒBQr?H0!ud Yg6ϸ m  nݟF^O"ʲ@>ӦZpTQ=@ZXb;K Q8dhvl#U%քWŽ!T(:ijNNG$QD0SŏV)sKąP97}; ϛ+>Gbn/T+*}s+avG03)RMW2GOlҐ̫_pyYޟJΒMZijqL8ϒO$_U]9Lok30i3#LZ+!{HhEi|6ЏI_ .huj#u+?S"oQ'6k?pkwM*+Y6%!r ZW_b*=WjǤHs 6ޭv1tGCd^Pxp$jzKg *Dc\v" 2 sqIL#w{5v-03IoM]Γ5\7Š$b_WiB O#3o~ eM"OO*=`ZƷl}ܔq|{3\ %C;^EO 5:]t͝* z80BIJ,w5TENC{BlxAQOPTy>[Б~XH8#`L0w g(#V8&!Ir/3|].4|}@`I\,i>Yy;L|MN>(>kbmKM5)6xehgEEckVή_%Jlh'Mnв,g62x [ dq̜9릏SM~ҕ6}/ $&4$;^"4(9CWVW_pƠ!OSYΚ,szlH+7o37Ih ?$2[MNh,GY]_1~}*sɁ`'S`U%? T~mGH0@KfᮮHbV>ѕ{l1*ӊ9J4o4Ad+(=@Rxs6 8-,v@y~: K<Ѧe~c# ̧59ݰF~Y{5l/ՅIvjm\;@8 @YRL?f;-b/[~]=t@02F:*1eY^DƸE[I'NO{4jހ>SYB|x|O.q|5 ܼӂf@ C7GB*?ӈdx۔(Cdb1AtSZjp\ r6 }t#5nJHY)Z<~x}RI۩Am>.³1,s(A6 S=kREѳ*;74:zfՕ{ΔsQr@×Ymztl0i'DOto  VȺA[7 4,>3eLkMlqBjsO/gX&/CA@9y0Kp"0ポ->/i\lgaz +$)NMiAR~y'GY;sX5LU7[CԾ3d׳4cӗ-Qr v,'(Ztq Пҝ@U -Gʔx!EHwH}PY|u|X@x i*D;OE)qo$; 0/V:hZWEFڎw5dmH^-@\ׄ.]TD`t ,w%66oZbˊFwsU$G-T;0jT6׈61~Ha> f#:2ek{=CŸLB,c Uc7Vח#9 !9.틭 ^[ODp>']kM(FTn& JfUQ֫=(RƑhu\U7uYs{ց_+ydiiDALV+D ɽ8I#KX1"P9<C3-]WGaܹbhKdxWT[OL& Z#4ҦH|aL x(jmQEق5__)XέF Ze/Ywi3KFτI {.GD%V^ejFزs'~ Rb r}Q͘eɠ(Oy Aow=pM p BZǓ)?8 %Ѵ֫!xPd2kFDW U|p:J3$;5,#V$dRrp[Q>5/tb`%\y*CSK UQP<}&11x4vVGY;[=TIa@w2wu@='D鈊Oу}/O~~5u0XC{BjBAL6A|WJt8Ӝ j L.0?&h 2$j J1B2%cT"]edS"~nb\%t5G0/G;Ӓ{S(E)7Qv=KdL "S4?nx׎.c!3Yj :eIϒgMXn<#*Vv(z;0Nmni]5ƈ,;ʞϷ%S|}.rظR-l{M:bcMu KYCRm%k H/.]Rn0_?·g&2q 3?!X{9QV\7GK I~CG?/Fxa(K mdLyrm(ʝ.uퟱla l@vsDžDhyiP, _" xs=;mടܢAdnڦS.xQ"geHua<ueYMEĚSIh $LF5\X\0|H$XPrK\G`VͽHPV|]u37XrJoW3ά$Tncֆ־bݯͼRG3 XU*<%a [9tR/(GN@1.4#V!`t5Y<8~l\8b_mݴ"ČzJRl<'D=μ\gJt BȻ/-0*#20aE u9]]:S`6 Ka!G Sz@ҍ"Yl$S) ɠ\u3ѵeZhJG5vġ%j~J"P- rHHAYQk"6WWESi׭k+R5"gIa!m>ϠV CF l>|ZK/oxt8? c{wRt:LV _cN]21ilLjw !p I䫵9;./\pkv+<-NPQRJm@mPڶl2jP5/1q7MZ7_(/pz~0Y sjT^-g)dҝJVuP E (LpsT}K4383*6B'e ||k;څeCY6 zIАMu@`|B?bFB [K"vTN^n9`p?>w6Sk7bO8 yUAٔ`1q{DuVvf?pYlE$׶[r.>ٞFrv 3:goi7̋亮;'š2;Q^521 @5)\:O}+ܕU!{m%#H,D lxeILr:Y]>ro#P:3 6TG? 4Ud#yK+q h ݗIKjh#ȡ e8?VH 1֙vv\ME(o[Ń+C #,<5n'Ʉ;~D,;%Wu67`Kŭ%y8XUߝ/u-UQ\Js[UxգaJS!-ĴKa{9=rm)+OhTx1[7oؾ_k+u۴H גX•/$~R .0DPz4Wk7\eG&*z04O(ocU27 +q ڬLFޱJ oqqt1Mr00h CHP_xɿxu'oi/ .E\I}lpm/t}MFo۱U'' |5l9te|Z0@]~ 3+ ~6EW #'s) ɋ[`gx}i_ w7ѫMX{t^(uEkqUb0'5rŮum ^k֜.HǮz =V){u*#nL@r2nOAws۬U𕄽 b2 *m+YmCN'rDWp?dʜ%G Z::|'lk"X<ΐUO3lCL#Ha?ŗSZ!ٞu8k0*,8Ston+RMk:qʆk|B&p%H_Ӷڄ|-V3F4yܧy'=4c*-+CAW, e! h PE-2*.4Sə%&T7!Z'A32ҭ=fF uaBюc@?NfZ>˶0hI«"d/ׯOO;ܫ1!MTs bo5cVh*4$q ϳh Ź彽q5=ZA>H?&\j=]]& i=LxH~]^Gnp`ʣOݐ]X(>"uCSӯS2T!zeG'\N-+CTd< ^n@[*p73[9m[-G%Z#9S|j/0rF0%cKpY5Pu?L?(O*> -{ "=}/Mx)bP_SCWzb?ɘ*[a7 ֬nUWN9TFfa 'B,/ѹl3r AC7XIL} =iLf)䥷bĐ ZZ׌0xW XVx9&$'X:[Hvc,-DNӹl=Gh(%t]_&"itE`r g,)V{aq?:yMA Ix NyE`7сO@K@d%Py1u'UM>._T|Xm\H$yxNcK zb&{8a8L^{2d,0RU/5E5 hJId !BxN25+*GcC饔vzR8E6_E >( :×3bHL=z@tFog3YKPbG3n%k, L|PNg-Ǩ0]~Ho]&Db V剟Q}P)U1BrRkWmb 5\Y u߼1snp-nc4yO۶ۜfc F64ˑ|F/ ݮ8`dl9?E]DRmI ǽ1^laf*,>=S|7"K KCFg ꘙNSSrFamE氿(^㤍b%K TbS4KG.]cPTkxGV[$zCs8QGp}Iij!s6ׇCdS^&fTI.2j~}z#"/\Uzǧk$\LO}f͈ ~X{'1%g wmC/ΙU6"~߭: IkUW$sҟߣGqo}4k^MiZq!fw8K[yeC˨x)b˂.7zЖ4F{J!vV_`ˁ^c+ZqMcln!%a~U)x#]Sl٨^,q0|NU! mO@NB(=t_G|fQv97, ;`I`i[,DGamOQ ªB/\紆?!RԻNq m ==޲9¬8~aPG->,Q棶@Yy=R{T-, E(Mfy̘P(mOL&7Y.EYmg耐kSt)eڗi O%-u3_C x}fO!Sg (%\W3d ܸ [ROBOtv2БSBS axS2-7*7jU16=̾(# c%2`)3W!7ݼսG8kAE"]T EissxvRwD*VjMϹ"7rƘ~v }YY՚'G+,i<kAʬnZzhepS, Ru6skHA_+;(&[c~z?lƃwݤ3؛ م'Su3$ ;a2[Ϫ?]%8 ]'cBU!v<Ͱ8:_F29\K-_biJ|/a_0*X}X]9[Biqz,n,_?h% k7V:w3$tx12գ0g:`aۣAбC"g]JF5/w״PwTT/S)MGO[ 7OV3^HLj_Oǿ_i6q2GFTv!u:rH)( \OE,tFZ6xEfUM^L_pb.9_)2ה\gU4˲Bet9Z4˷O*KUGԌlf_G!Kf$'#鐠t;HKvH5dKn]5LeJER4|#-[f*܆Ӟ8LZ0YBmHWk2.2EG }G%ӆ)^AQ{c&9jPWn:e?ב{(aIYR a^QHyh189~.:I1՛֣QcֵrV[?}fGZ楝 㯧mV 뾻[\[8OuFW"2f^-$,iFWL$ ne^>ˁA@gZ5@{vU!n|ۢTU:ɋFPSȏo`wYѤ5}=382^g}V;"Y<-j#c%3r))Ҩ?.%WΕcR)YcY,0'm>7 !JG%>Baټ(pnkK-"ƞ _S1iwQ.GSLo\8⸟R¬̜ƛ$Sto'b] MLu1XZld9õ_-YqB͑ux6H̛_mg^Ή:Ð"rWcރoCCām<$ 1.j7@RcnjWlٷDͧ`YPJ{6s;K5fpA׾>Ǎ1{EUr ;OZAHvO$k ި^[ _A_1Jf؃$%SƬR/_sx2gp+&l.ᾡlGشzSuquU UB>fUI4H~>ow/V"\5הJ/.s ]a5CLRCtc!Mɒ$GiM~-Ex:pzz!H[@b;@+& )U\PLuVtĵ+׆Df-Q,G矒]SG`$GzaoW֬)?Sp8.Dp `޵XY)-~<)Y.*?IbqOY7.=6H[ 0R]P6EL]fԾg)1Z X6Մh_Y Q$)Pj/zEL N/A<3ܟg |镳 yFIԋ!1^UpEcUD8Ô}x9~Ѭ!+HG10Uw>ud }A>хhg(zO !t੧T<7ٖE&߶P8Yf.PƨW+OiRfYYgh>XN P /uN/C`,ȑ96:ECskv 5kG4[\;~wOܯq NzI/ 7Ώ8l M#Yl10J|ю9yc]'6U34cA-wۧ8hQ?21RWqk[@,KI ͓t/W?ea V>NƒuFp__3IȎ`Ws”` +<6R .l'Nat͇y|3Q4FA{Xi_]>ՒA@?jGuTT~jaO3Ss>&ζ!!=v~ʕa/R_5̕.>K}Ix8W OsSepLwl{5;kFq)P: (^"?fhdܧQK J 7ǞMb eWJt*uA O;׌o{~Ya<`qT8)45eL!B_|<&%;;vbg"H|쭎,36~&(Y] k{3kͬdt MhAB/:ҟRS5 $^q495@|% ඤz,Wm ٮlݪ{]KpW j$S„jqin㿟gŌJSUf`ZO^恳+_b1eUAiǚZGiFC1B2"i\G1gP}i,j-Y~w?)m.`ԓ :F-di8'$kbAXK*gPW JH(!!_z3 ڜ#\N{cIU~t>01 ~ȷ1