libssh4-0.9.8-150600.11.9.1<>,@i1cp9|3gCv~(9; $NjjdLDmvi&>bWxzL.Hrm'˳XpgI-Rٚ P}7!M\ݖ>pӸ8C(2qY}ߠċ c ލJ{s2K %Y:/\ cyTaIH=-d…JkQ֊?Qe˛n5NFv.o->@H?Hd   * .4<T ` l   0TR(8/9H/: />Dd@DsFDGDHDIDXDYD\E ]E8^EubEcFddFeFfFlFuGvGwGxGyHzHdHtHxH~HClibssh40.9.8150600.11.9.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)i1cnebbiolo LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxppc64le 8cA큤i1bi1bi1bb;eyb;3a4f14d785f3b91075892f1106f5e5af923ecd9fa32abe8ee36fb4a965a0a5bb95b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150600.11.9.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(ppc-64)@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld64.so.2()(64bit)ld64.so.2(GLIBC_2.22)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.38)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3io@hEh@h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@pmonreal@suse.compmonreal@suse.compmonreal@suse.comlucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Security fixes: * CVE-2026-0964: SCP Protocol Path Traversal in ssh_scp_pull_request() (bsc#1258049) * CVE-2026-0965: Possible Denial of Service when parsing unexpected configuration files (bsc#1258045) * CVE-2026-0966: Buffer underflow in ssh_get_hexa() on invalid input (bsc#1258054) * CVE-2026-0967: Specially crafted patterns could cause DoS (bsc#1258081) * CVE-2026-0968: OOB Read in sftp_parse_longname() (bsc#1258080) * Add patches: - libssh-CVE-2026-0964-scp-Reject-invalid-paths-received-thro.patch - libssh-CVE-2026-0965-config-Do-not-attempt-to-read-non-regu.patch - libssh-CVE-2026-0966-misc-Avoid-heap-buffer-underflow-in-ss.patch - libssh-CVE-2026-0966-tests-Test-coverage-for-ssh_get_hexa.patch - libssh-CVE-2026-0966-doc-Update-guided-tour-to-use-SHA256-f.patch - libssh-CVE-2026-0967-match-Avoid-recursive-matching-ReDoS.patch - libssh-CVE-2026-0968-sftp-Sanitize-input-handling-in-sftp_p.patch- Security fix: [CVE-2025-8277, bsc#1249375] * Memory Exhaustion via Repeated Key Exchange * Add patches: - libssh-CVE-2025-8277-packet-Adjust-packet-filter-to-work-wh.patch - libssh-CVE-2025-8277-Fix-memory-leak-of-unused-ephemeral-ke.patch - libssh-CVE-2025-8277-ecdh-Free-previously-allocated-pubkeys.patch- Security fix: [CVE-2025-8114, bsc#1246974] * NULL pointer dereference when calculating session ID during KEX * Add libssh-CVE-2025-8114.patch- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfignebbiolo 17709919710.9.8-150600.11.9.10.9.8-150600.11.9.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:42761/SUSE_SLE-15-SP6_Update/7200c6c40d8e1c282b314a4d553a485d-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=275d5b84292ac43efa082f52ab9c1047f1a81f7c, strippeddirectoryASCII textPPPPPPPPPPRRRR RRR R R RR RR35— &hYWutf-84c582adfc4f6e6b277ad123b6a165cffbda9239be90a490e509edb3a87f6c19a?7zXZ !t/o[]"k%{U}d涻L,%:'Ȃ{1Aq׈DWy(cp=9j- MYⷸ`C_ fO("s`mdG8!8&WDJ{2ʛ)8Qm^ol})+J a@kyвVԘrٜͯ쾧4dTZѭГJޣdKQx.̀ 1醷*]wU¤$]QOU+75hR'P@/SGxU* Z!'Q \jQ J66L1XQLv,8ص!l]Ӧ QyIYH:tᵎ H7t pF^&~&/? K .Ҹ(|)XkL}G@҈6UDG{dDƒb~F*ǃrn.UO<KsB'*MTuŴmˡ&iC(iSfe+]*_8IlEć3qgy-;h(Xd/K[qE^8]#,ܑ:CqRhV2\pTov(-%P~Ub )ΘnsdePK>BȨQg0{j6p%t /}*sAX#08B98y!}w/D>kʏb.-,uwΎ+ s*FBGb#3j)=WDOu)9[HXlT~%}Jpy薟Z"RJYxuU$b  Rv2}˥)1@bIgM1c//vZ.1F{%:q6ř >,2G>1dSLn`wsHci'~Du`  a6lh{;Z9~P ]R ;l1ĄcJXO.-@KWE t-BHSŎjăWsO-r[kouT5Tw"u┄!e?0GJ:p Zt,nG@up[dW0Znr(G1V?@VC>'M0ˏ2ZR&elG^·T5a3uaEߨW(|"^`4$V{(Yw`٥pUOkEOa,*ZZ5Khfse?R Gˑwr] ;Ɩ^5w 8>fvU(d~tTP ّf$]\iwy'+T@ ]{R[Y 1/|Lp,%Uл|t˗䬥DžJbhEPqĦ=d|*껛uv%hi;'[ON%OcꒁOI Hm>GWa߈I5e0ʼnEMQ߲ucMRΗˉ1OĐb@LxEܺ/6$ kbN'}H&;tT$u D]܈q|#@ ȇ qo*ϳ;e8szO5"BUX]dq.j}85_ƭaKk"<*kKUK݉--Zs#$ ھEsr7Swv}}sKN&=,@֔Kh7~1a9۵| CƗCi6Wb_e{Ӟt2!p`{أ^V8U+%x̔! `)ҍ٢صg#;붭As@۸5raLTдrTl[+bt#(PCv}b+s~ _:(8vԏ* TW=:x"ɨ<*T w`,i7i:$Yժۆz>NUkTd|i0V&< q}ʐJmc6o#(u Ȣu?ܖܪd]2\OXHN_gm4 ĀӓUylYl3<<ޝV,*40_VI-f8V) ,()3>p!hb@o@֬*Hn5k `577Q81`z& h=_ܵxuV MfkӹbўR9p WiS3fbWw͘?mSnrXۇI,ii ;(,cŏeVM@YRC_çU%3:g >>}m)qqR8Qd~ ZĜxUign5Z zy8wc{\LN /_VJ>hH{Nm#Aɵ㴾,QA<+wLb86E6bev=vDվzhXE:PtOc%]Zt8F1eqxl& Qtوh:RZfɨU:ɽTSb6~lLy[̦p(&ܥ])_-$HHSi瘇"L`ktMyr #0n^6/4[f e/\rZ;̂^)\`4!6PBb}55G$0LjkiDUqweaR>_vѣuy_fh!xqV/B]t V/!~ \6^ܗ +_<=VdGv$⡖;?u/݅:$B7Ue0 ,8cr\vb2d0brŨAI-:!pʃt^["yL$%Zt_-@60|{0䐱NɈPf\9;ub$c[Fԙd0S?MᬍB۶%>}-tܴAy+ae;  bX*W\.Wߩۇ K%Z%Nϣ9Eivf"8~4U;y1 ztq$1%"ʡچ`D"Rb졳#llP$w%4%v9\MevE":(\(6c0(u}W$D9_]@rMݘ'CortoESFR;{/ Zw.dri5%y _"_I}'K5m# !(9llSj|BBΈЛnk!h-q(N0onh|Y0]P7<8cpwGؗ*8< Ç(PN0RNɋ#S9IM i{k[\]mȦb.\]_:nQ0(q^o"a]N&=2h(3ȕ1`2ѭQD{2+XqZM I)?n˸nC39*BUġ{aEn?t2auG+&XL5ETWr'EպHt?>R<HNkwt GSE^aAUt 2g)ݘIn8 >5ZbnIc'Ά$ !!eYz!\yƲ<NK`Gjx6q@ߢANC-|y^R䏓2nSA5# $/Bo"e_hЌ⿸!/\(ఄMW3a()))j/P!^"˰m38h i{ҏ+jC0&b67xǖs:yE.ʌҌ`=ڛ| $/QAypѬkN5*|Jɽ+vc`b&jTѱԒ_ |\DRz!R5єl2KHTy6A}#f/0!b7 _E Sa?6|}ވCE=k!5^KRƂ&1&0aۑG|0*1]DKx$(pBlR:3_\,cF;Ntb"h Stav7`\I]\%rcSAgȄۧV$Y\2`X8eEC3Y ŵ`\'ǝ!S0 E{Bo`]Q5_/anK>>0#bKM= mpuEπb앞N9AJ%L5TY.S%]Ilfwxad7=ɔsڃEU7ñ_Zۂ%Ery"%&]ʔOۄ[o̰Z:ɦ}tMT;\8Ytr"t&g ?=øaSkGOr0MjRN99TrOe J?b=o#*$UqȔVlm,cwwѿ4q;3wc43 Ef˃,J/Pf ,U ¨ ΉWZIn 8FQz!7̼rS7;gIXk{VPdO N?bَID`|8D'WT0`P4JnQ fQ߄ZrB!r+٠amLh/U֎m!0#"R,n:uIO>%L* ~cEe A1=v{3fMp%XM(AwѨkii=] 1?i\ hH<ZI?{g`2Y &TZ 嘁miɊcإm-`)d^*@+ [JBq<":.So&,ƠN/)By؁6䔯Á2_@HYlcCIN0:O $]aG>b\bQm5sc'{p*#2vfؗE%( {FmVh8撉` i?A-̗#bL=uT\,;𽪇3WNgSpqPu* 9Z>K!#k|g(0mC ;[긿+[C#[Iڌm},I'\…%U\m`q*A.Y *;d' Mn}P3щJcWCsF3@t􇃵G`ܔL Hba[Ecx_; ?Z/HOgn .Si"~\D sN8@kcf媒XHAX+ '{ɶ.'"vҫB§|z[%M;us ,L~|mZd|J} I7} Wʣ 0P]i"HT_~3ҶraVyFYzt.\trUY׊u&w塘3vėd(*)"?(a疭`SF:%ǚS|$n!T%x( 3=Ty+zhߙ$OAQ\6ԄhO!MOIĺ||Ijmy$6/"qr#5e:E6:F,j AAnS,ԓ!¦FIa'sMd9V\uk6j5ɸjU }**p_G-F=}S2 ]Q5j$ܑV ~nGK ^+E %ѓ #+'QgbA@:껓0҇0QxYַ vڱΦ$vAЋoͫ ͸;D#H"JËkE8`)zwCI>,Tl4 58o8"d+cD =٪d0Ďhq3sE!nV ]* K=A' HL/@VGQ,/b8 ZqÈNctg`܇{>fttuK&-Bc*9tJ&%J}W! wl|6l/?ݬZ9 paHfI}P2E#ՙ6/-+n<.ΨR3.w٪glZsn7fduz*oLB75ʃ'"ZBJ}jў@T##kF f.=(b *5~̆9}9eG-m8 +Opm82˿T3)^4r$ݞxq͟GP;pG"WO|#KzPL ezia ~e&6{xkQdeҎ$B#\̨ `%JqkЫ= ART= 5?\^ |ދ^nP6:fXP[>$3Ь^],knahX'4 XM2_Yoȝz%9жrqaSJ||'ae0NߊVdpa1e4P%?;]2\j}~ǟ*qBIp<+F kՑ8%wEl@#m[Qdi-[ dH qfg.2uV_dSauLr_yR ]֝IRRwO)QAZ݂NFxFgGM,>gD1=4 O]?>̪cpA N}~+Y!SQ5 w['pDNG"g<,qcɛZ&dU;ߝɁ4*7[m&RMe`BRh71uO4 H&Xq% X%qIz_Ùs#9*赑2zŤ  ˔h4K h7@$|vʩ;P?*E] FL<4&K_6eb^?=Bn.>PJ}O$JӢPL4@Szu$햶s200y^{` {LS< @2d_Yܧ~,>ʍ̘FS)xm1bŌ*?AMq26xykOlmV_:(\m ]5)4M~NP:;nLd2v솗[ݧc-˛aiR?PE(v[JB@]6y 3cZcdqY*ϨolE 31:bxT Jl쮉XQ)Q~%4W/^ 0#x|])`ŰV˦{VC47u^ u^}&P>+lgR}(^Y`6yA}Jg| tAiTHpؐAVHhٱzD{Dr킊Ȭ1RvD Y"` (hj,8ON#i0Tƛ?[l*qg\A̘욫~aOX8 T_ ;GEaZӏw[ ԽbeuV[~! ):!b#4m+ XRi2C CԐ`JLeμ.Yq*@pbGtm,:Jz pmJ5*ö d洎*TR22X\v8^I EցEף2^^Q8BX : ĻB$I%ˀڀg'U@GU#gO.n,ZΑH фx-<60?:#$CGeEQx~>.8;C',Hh};mW5"FIQЗAMsSMgj\{H2y{$)c.'`=IN5.VHɎa5;ttƃ-NmXQZ0<6&@ kߝK YZ "༰zUZ>Okl3O574V[/xE h*;W!L2CqtudL'KyBdudb* pN@weM?$%=~$K"MYznU9᠎@;6S9dm%i'$_K;dzN>@ɮ-_@muRB2G0d& rA"amJ㚭C.Eg#;3~M.y0⦎՗Ur{VNhw78 Rf|(`O(+޽g[q#~T ِ2('T }h;?Ӈz}Cs-I3O2]l|El .悰EPt)-$ @'hPrs<_aeҦ9z'9 uVE)^ѝ㄁Z bh~d/k>ޮ~k~0tcnzQ!#532cÈWS\]#cmVciWjʖLf?)3A;0XunSzm%^[#*kwi;nkTWqщ"`vMQ݅A~-ϊZH2 NpuST z# >l3=bj `IZS߫&myjôE~Ch闐Tt+ׂ(W\8xn+Q/*ڜx.4fƷBV7#Y0|X<nr w/$COvm,5{XYN?KC'*Tk„CQTcN$T 6`xqsBhhUu/zY0CŜ[Qv&V?q[ gb5F:?&2[F5MW5fUm4si\6Vjp^֬cs83&˱:*$ #_+}Κ\1+|e֐WD_{P8m$exH/gcW -`'fRO ??\Kb f]ο͖0':QmR&aEL eU^̊+<{L-s@k+!E1N0Nmk%%~r}7}1pO?d;n-<) n,@&xT/|nMy"s.h|3sSN+) WE[ ȩ==d_Oy[D ".N.i$-8ݬ@2IM8G_QUB@y+kV+~׽{1¹/l@,^JgB=OV;SB" -~ϰ(M);qN&_#7-,F#TyW ʱ_l6br-&xf'OhSmJ5{C&vdZo:~&eC]UG-ovvu - 0IM%0YIˆ@Y\`NT?;SnXn)i oCGR JhQvu [LWٚlEB-. n\P2Ө{GAȡTh*L'蜗|@);V&GCLQ9 7(-QM) W$,FigbײjԪs054cM:WvضiMQ7b[j㛂7<ٶ{%|]hԴ.tvrff$y[LGo5NbD))JMnjP 5znыbƏu-~v4'e6iꉼ=-mǑvIMI2(˓JV'+\WA"CL>J> B'*&di[˽`o{'grMC wd5Zf%;4vi-#֤b=J$hL#^? `j82M^ŠS=JvN|-pd*Gwۂvd [(5=gQFƴ"ef2'jj!l"5GAuY8w\.*XQCv:uK+ _b,ڂ<J?_Y* TBz,JOV?/?v7!vr*Ho.u{h|,^4 "lK@"`q"r$|")vib%$nj:mY6 J85?CaCi`R=[{H7}ᆥ90U{aƂQl|c'.z'4'LۦR0"]ÏԟYQﭤ ~Li!kAP_@r%?A肈}񓪨\L%[(s1wёvY#k \5n=;gY_w}[bN?gHo66orvk~ P; |~3D],,{ +oߜVwDRh>p  ٱG$>oi /6!a>&k^l}$+ fn2yϛӞޕ*EcBcEOah®ߋF"6j-X(2j%&/HMfu΁|jpNڏh(fmCB9b%ol_Jaħku]L9({jEw($ 8eMDi3Z >lntDS,݀}o0EW)7Trqc盁ׇ1s@ n5顇N.&}p 1wNV"c1J7P( hŰ0 $/r?[aJ\mVJΣ#;+<&ꉢc"AdtSըEq83zH rL7/a\2G?鍂+E"YhQ4 =bQFEĮczՉnBU{;`:i吲iM[0x+"'vM0؍'xs^s`>r]O0Q1u/M8zQS$)mY"WJ;C46r#&؆&=^.I>g7:zP i/*΀ ͍teX*Md\HPA g;T2y/bn\c<@O"-zzfĎ;f"5"^f=[`!6m@tTi~tC( *8ټD>㝎6GmnrKDP읷i'e.ـK\UerM~;˯?XqR7Lfy*R B5}Z:`fI}N;Oaumg qy*Kn\1.ew46ս2P[}@oZs6j+C;K vG:Ԁ*o_v9l"w AhqXly%vKe7h< O-y`f25$A|0",7P ͰSLr:,>ڟM}mR㠼^ͪujZ>Js "0&^9/5Mx^oJg=G g;뫭9 p=W5AT6q3͸Y5v´kuJ]NRS;EpQHrB}c.zid6î}u;I5kT{CqhDb qh5~n[CT/9=JJFEG"n47E"A{AU]Lz!]`ʟq&h k.f['ؕodշ<$a ̞\9Y1wuM|Ybw; 1Z=u@e-,O Q쓪f(}O4ʣ_%OC;_JtMEp'*}lJ21rbC7  p trY0e ë6AndA{ˊJiNlW/c1R9Nl5o #\u={A[*FHd #Gjk '% &ڍW4 8,#(D݇<4ԕY4&QC޿ a_=|:hڟʥ=''ٹddnMg~ BxlOH!mC}#Fs1- v&6/}N  HQlA0f ?lËڪr<6eDFXL 𜖚@.ctkU<͠81kcᰕz3.Am?r>B#\z{ wd8OJnicDB凮&l޲u4kAf!eNW93#Λy2a,PdCfOZݷ3RʶnFNOy%hoG0c b} EDWX,(tt08UmP|5`ل,4NOv{3_&|8JS9鹬'H?@l>gDŔ؛Xp;T.iIELU73FC>7ezZ565Ocx3dg l hJ}s1.OuFK|u:.e?rddx_j𷭋5#՛.%DVM}I⑆"k[69VrV+6r}]q쫪abWbxŤ&Ϭ0<q [\4A徔hLc$3Y=>p0J}19hwjAXQ COg"xEҦ4=`챺4D`:|c&CG>|;*Zy! rӻ] UO8MBT;l2)-X ^b%S4C55ii.Y=8:m{-TәʾO,:<#|KApu kUkQte`)^oX{2[t71aYD0G5>@ ?jMTjggMCى>lh> 1Zaxy,s\:2YfOӌ`rgnzco ʆn&-be'f vf:ZR>ؐHvW!qEZ{3{yo69^Oa_v)?J K/ظ:@-ZuB3v[Ow5m//e#/n!p:cb`B>/No(ߋx